content
stringlengths
0
1.88M
url
stringlengths
0
5.28k
It's almost six whole years since Irrational Games came out with the fairly ground-breaking BioShock, way back in August of 2007. That game, billed as a spiritual sequel to Irrational's PC classic System Shock 2, took somewhat of a step back in the RPG department, but for console gamers, there wasn't anything quite like it at the time. Skipping over the wholly unnecessary sequel developed by 2K Marin, and it seems fitting that Irrational will be closing out this console generation similar to how they opened it. You play as Booker DeWitt, an actual voiced and developed character, unlike the previous game's blank slate, Jack. The underwater city of Rapture is swapped out for the floating city of Columbia, where you are seemingly tasked to "bring back the girl, and wipe away the debt." Gameplay-wise, it's business as usual; if you've played BioShock before, you'll feel right at home, though there have been a few significant changes to the way the combat works in Infinite. There are a standard array of weapons, which all fall into the typical shooter archetypes: a pistol, machine gun, carbine, shotgun, etc. However, this time around, you can only hold two weapons at once, meaning you might want to think more carefully about how you enter an engagement, and be mindful of your ammo counts a bit more often than you necessarily would be in the first game. It's pretty in Columbia. The magical powers, called "vigors" this time around (which require salt, as opposed to EVE), are pretty similar, with the biggest change being able to hold down the button to make a trap version of most of them. Traps were their own specific plasmids in the original BioShock, so being able to easily create traps with the regular fire and lightning vigors in Infinite lead me to using traps a hell of a lot more than in the previous game. There's some decent variety in the vigors available, though I found myself sticking to a core few more often than not. The lightning vigor, or "Shock Jockey" is always useful, and the Bucking Bronco vigor lets you easily hit and briefly incapacitate large groups of enemies quickly, and with a few exceptions here and there, I didn't find myself deviating from this all too often. Combat is as interesting as always. Gone are the gene tonics from before, with character buffs coming in the form of gear, pieces of loot that you can find that provide a variety of random effects. Having a 70% chance to ignite enemies with a meleé attack, receiving brief invulnerability whenever you use a health recovery item, or your weapon having a 40% chance to instantly have its magazine refill without reloading are some of the effects which can definitely help you out of a sticky situation. Using the Charge vigor to instantly lunge into an enemy from a good distance away, then have him explode into flames upon impact never ceases to be incredibly satisfying. Also, available to buff yourself are Infusions, which are usually found a off the beaten path and each one allows you to increase your shield, health or salt capacity, giving you a little more option for your character than in the older games. You could be like me and try and evenly spread them across each stat, or you could min-max your character and raise your shields super high, at the expense of your health and salt reserves. The only thing I found to be disappointing about the combat in Infinite was the weapon upgrades. Each weapon has a number of upgrades available to them that can be bought freely from vending machines throughout the game, but the only upgrades available for any of the weapons are standard damage, magazine-size, reload and recoil buffs. Compared to some of the more interesting upgrades in the previous games, as well as the fact the appearance of your weapons don't change after each upgrade, there's no real feeling of progression here. It's only a minor gripe, however, and the combat in Infinite is as fun as ever. It's interesting and there's enough breaks throughout the game that it never starts to feel overwhelming or repetitive. The story is absolutely where BioShock Infinite shines, however. I obviously can't delve too much into details without encroaching on spoiler territory, but if you go through Infinite expecting a massive plot twist (this is a Ken Levine game, after all), you're not going to have that one particular "would you kindly?" moment from the first game. Although there is a particular twist that stands out, it's a combination of a number of things that come together to create a fantastic and absolutely satisfying conclusion to the story. The game is also absolutely littered with references and foreshadowing, which can make a subsequent playthrough an almost equally great experience. Elizabeth is one of the best companions in video games. Ever. The characterisation is also top-tier, with Elizabeth being one of the best and most realised video games companions of... well, ever. After first meeting her about an hour or so into the game, she remains by your side for the majority of the rest of your 10-12 hour experience. Outside of combat, she will occasionally find and give you money, and can also be used to lockpick various safes and doors that lead to hidden areas. The game will often remind you that in-combat, you won't have to deal with her as she can "take care of herself". This is because the enemy AI simply ignores her, which can lead to somewhat of a disconnect with that game, but it's something I managed to get over fairly quickly. She will often find and throw you health, salt and ammo in battle, and her special ability lets her use "tears" to call in objects from... somewhere. Again, spoilers. These can range from turrets and cover as well as just general supplies like ammo or med kits. As useful as she in combat though, she's also just a joy to be around. Irrational have very successfully crafted a character that you grow attached to and care about throughout the course of the game. Irrational Games have created absolute masterclass in video game storytelling with fantastically crafted character arcs that leave you wanting so, so much more. This alongside gameplay that is as competent as ever means that BioShock Infinite is not only going to be one of, if not the best game this year, but one of the best games this entire generation.
ADHD Drug Side Effects May Lower Bone Density: Study The findings of new research suggest that children who receive popular medication for attention deficit hyperactivity disorder (ADHD), such as Ritalin or Adderall, may face a risk of having lower bone density, putting them at risk later in life. According to a press release issued by the Endocrine Society on April 3, researchers have found that bone density was lower among children who used ADHD medications. The study was presented at the Endocrine Society’s 98th annual meeting in Boston. The findings are considered preliminary, as the research has not been published in a peer-reviewed medical journal. ADHD affects more than 6 million children in the U.S., according to estimates by the U.S. Centers for Disease Control and Prevention (CDC). While drugs used to treat the condition are generally considered safe, a number of potential health concerns have been linked to side effects of ADHD drugs, including the potential for cardiovascular events. If the findings regarding bone density problems with ADHD drugs are confirmed, a large population of youth may be at risk as they get older, following years of use. Alexis Feuer, MD, a pediatric endocrinologist at Weill Cornell Medicine in New York City, and a team of researchers studied bone density in nearly 6,500 youth, ages eight to 20, who participated in the National Health and Nutrition Examination Survey (NHANES), a survey the CDC conducts to assess the health of U.S. adults and children. Survey data from 2005 and 2010 was analyzed for youth who had bone density scans. The scans evaluated bone mineral content, the weight of the bone, which is often a better measurement for children; as well as bone mineral density, a measurement that helps determine bone strength. A total of 159 children and teens used stimulants, such as Concerta or Ritalin, methylphenidate-containing drugs, or medications like Adderall that contain methamphetamine, compared to 6,330 children who did not. Among users of ADHD medications like Ritalin, the average bone mineral content at the lumbar spine was 5.1 percent lower and 5.3 percent lower at the hip than nonusers of ADHD meds. As for bone density, users of Ritalin and Adderall had 3.9 percent lower in measurements at the spine and 3.7 percent lower at the hip compared with nonusers of the medications. “Adolescence and young adulthood are critically important times for accruing peak bone mass—the largest and densest bone,” Feuer said. “Failure to obtain adequate bone mass by early adulthood may result in an increased fracture risk or even the development of osteoporosis later in adulthood.” Researchers emphasized this does not prove medications like Ritalin and Adderall cause lower bone density. Instead, they say more studies are needed that evaluate the levels of bone density and bone mineral content at more than one point in time.
https://www.aboutlawsuits.com/adhd-bone-study-98252/
Tap here to turn on desktop notifications to get the news sent straight to you. Open Search Log In Join HuffPost Plus PROP 37 ENVIRONMENT You Need to Know: The Facts and Debate About GMOs By Eve Turow Paul , Contributor Author and Food Culture Expert GMOs, or Genetically Modified Organisms, have frequented news headlines over the last few years. But you still may be asking yourself: "What exactly are GMOs?" Here is the basic rundown of all you need to know. FOOD Where Does the GE Food Labeling Movement Go From Here? By Michele Simon , Contributor Public health lawyer Before the GE food labeling movement marches on to the next state, we need to examine and understand these industry tactics to better prepare for them. ENVIRONMENT Tougher Tactics Desperately Needed to Win War on GMO Food By Jonathan Greenberg , Contributor Investigative journalist, founder of The MauiIndependent.org a... Like millions of parents and activists who oppose genetically modified food, I feel that the stakes are very high in this battle the safety of our world's food supply. If we are to win it, we are going to have to fight tougher. And smarter. ENVIRONMENT All Eyes on Washington State for GE Food Labeling By Michele Simon , Contributor Public health lawyer While some may prefer a national solution to labeling GE foods versus going state by state, history has shown that Washington, D.C. is gridlocked and we won't get movement at the federal level until the states take action on this issue. IMPACT From Growing Profit to Growing Food: Challenging Corporate Rule By Beverly Bell , Contributor Other Worlds Just outside of the small town of Maumelle, Arkansas sits your run-of-the-mill American strip mall. And as in so many other box store hubs, a Walmart dominates the landscape. But something is a shade different about this one; its big, looming letters are not the standard blue. ENVIRONMENT Monday Tracks: GMO Debate Rages On After Prop 37 Failure By Lynne Peeples , Contributor Environment and Public Health Reporter, The Huffington Post What we didn't realize at the time was that the real Frankenstein's monster was not GM technology, but our reaction against PARENTING 'Snobby Kids Eat Organic' By Catherine McCord , Contributor Mom, chef, & founder of Weelicious.com Recently, a teacher told me she had been talking to parents about the importance of serving their children organic food at school. The parents adamantly disagreed. Their reason? "We don't want our kids to be snobs." ENVIRONMENT Despite Prop 37 Vote on GMOs, Transparency Will Win Out By Andrew Winston , Contributor Corporate Strategy Advisor; Author, The Big Pivot (co-author G... Perhaps Prop 37, the ballot initiative that would have required food companies to put a label on packaging if they used GMOs, was poorly constructed. But its defeat is a blip in the arc of history. The power of openness and transparency is a relentless tide that's only getting stronger. ENVIRONMENT The Future of Food Series: Exponential Solutions to Transforming Our Food System By Christiana Wyly , Contributor Executive Director of the Food Choice Taskforce, Coordinator o... By 2050, we need to figure out how to not only feed but also nourish the three billion new people who will be joining the seven billion of us who are already here on the planet. And we need to figure out how to do this as effectively, ethically and as environmentally sensibly as possible. FOOD It's Time We Occupied Well Street: The Incomprehensible Defeat of Prop. 37 By David Fagin , Contributor Writer, musician, food snob Do you have info to share with HuffPost reporters? Here’s how. FOOD Meeting My Meat By Jenna Goldring , Contributor Duke University Senior, Cultural Anthropology Major, McKinney ... One would think that having killed a chicken and seen it previously alive and kicking, that it would be difficult to actually eat it. Strangely, however, it had the opposite effect. FOOD Just Label It Video: Stars Speak Up for National GMO Labeling By Gary Hirshberg , Contributor Chairman and Founding Partner of Just Label It, Chairman and C... How do we overcome the money and influence of the chemical companies controlling our federal government's approach to GE foods and labeling? We need millions of Americans to tell our federal government officials that we want transparency, honesty and labeling in our food system. ENVIRONMENT Ten Grassroots Lessons From Monsanto's Swift-Boating of the Prop37/Label GMO Campaign By Jonathan Greenberg , Contributor Investigative journalist, founder of The MauiIndependent.org a... Our consumer movement made the costly mistake of arming itself with peace signs and love beads for what turned out to be a gunfight with a ruthless, assault rifle-equipped enemy. ENVIRONMENT Lies, Dirty Tricks and $45 Million Kill GMO Labeling in California By Michele Simon , Contributor Public health lawyer Despite polling in mid-September showing an overwhelming lead, the measure lost by 53 to 47 percent, which is relatively close considering the "No" side's tactics. ENVIRONMENT Prop 37 GMO Labeling Law Defeated By Corporate Dollars And Deception, Proponents Say By Lynne Peeples "I think this election was largely a story of money. We didn't have the funds to compete," Stacy Malkan, media director of LOS ANGELES Prop 37 Defeated: California Voters Reject Mandatory GMO-Labeling By Anna Almendrala California voters rejected Prop 37, which would have required retailers and food companies to label products made with genetically LOS ANGELES Prop 37: HuffPost Live Debates The Pros And Cons Of Labeling Genetically-Modified Food (UPDATE) In late September, 61 percent of polled Californians supported Prop 37. But just a month later, that opinion flipped upside SCIENCE WATCH: Climate Change & GMOs On Election Day By Cara Santa Maria FOOD GMOs in Food: Better Safe -- Or, at Least, Informed -- Than Sorry? (Or, Vote 'Yes' on California Proposition 37) By Steve Heilig , Contributor Health care ethicist, epidemiologist, and environmentalist At this point, it's almost as much a philosophical decision as a scientific one. FOOD The Dirty Tricks of the 'No on 37' Campaign Are Nothing New By Andrew Gunther , Contributor Program Director, Animal Welfare Approved If there is one thing that the "No on 37" campaign can say with complete honesty, it's that they have ready access to literally millions of dollars, all kindly donated by the world's largest biotechnology and pesticide producers and food industry leaders. FOOD Just Label It: Take a Strong Stand for the American People By Gary Hirshberg , Contributor Chairman and Founding Partner of Just Label It, Chairman and C... Just Label It salutes those who are fighting in California for the right to know. They are helping set the table for a national movement toward labeling of GE foods and have raised the profile of this issue far beyond California's borders. WELLNESS Kellogg's New Pitch: From Seed to Spoon. Really? By Christina Pirello , Contributor Authority on natural and whole foods For all the ads showing mother nature at her most glorious, Kellogg's Corn Flakes are anything but natural and anything but good for us. FOOD Know What's In Your Food By Michael Green , Contributor Executive Director, Center for Environmental Health Independent doctors and scientists have warned about health and environmental risks from GMO foods, yet our federal regulators have let us down us by allowing these risky new foods to go unlabeled. Californians have the chance to address this situation by voting Yes on Prop 37 next week. LOS ANGELES Prop 37 Donors Revealed: From Monsanto & Hershey To Controversial Alternative Health Doctor This story comes courtesy of California Watch. Proponents of the measure, who have raised $7.3 million from donors - including FOOD 'I Think There Is A Food Movement Rising' By Carey Polis ENVIRONMENT Why We Must Vote Yes on Prop 37 By Shiva Rose , Contributor Actress, activist, mother. Curator for http://www.thelocalrose... This month here in California, we will have a chance to know what is in our food supply. PREVIOUS NEXT Page 1 2 Real Life. Real News. Real Voices. Help us tell more of the stories that matter from voices that too often remain unheard. Join HuffPost Plus U.S. Canada U.K.
https://www.huffpost.com/topic/prop-37
College teaching experience since 1977 includes: Houston Community College, Austin Community College, Lone Star Community College. Texas Professional Mid-Management Administrator's Certificate, Texas Professional Curriculum and Supervision Certificate.What would you say is the defining moment in your life when you knew you were destined to become a creative professional? Since I teach a traditional academic discipline—history—and have also held many positions other than classroom teaching in public education, I consider my field professional education. Like all career areas there are fundamentals in education, but there are also multiple opportunities to express creativity. When I first entered the field of gifted and talented education, I began to learn how significant a role creativity can play in curriculum and instruction. How do you weave your professional background into the classroom experience to provide an industry veteran's sense of the realities / challenges / opportunities of the profession? I relate the history content to the present and challenge my students to become more interested in the present by keeping up with events. I also emphasize that understanding the past will help them to understand the present and, regardless of their goals and future plans, their lives will be impacted by larger events beyond their personal experiences. Is there a class assignment that exemplifies your approach to teaching and mentoring? Similarly, how does your approach inspire each student to push themselves beyond their own perceived limits? My students are challenged to become the teacher by presenting a proposal for a museum exhibit on a historical subject. This assignment requires research, visual designing, writing, and oral presentation skills. The general skill they have to demonstrate is planning over a period of time, which may be the greatest challenge of all. What role does collaboration contribute to students' success, especially when students from other programs contribute to the same project? There are classroom discussions that allow an exchange of ideas, occasional problem-solving of historical questions in small groups, and the opportunity to work in pairs on their museum projects. In your opinion, what is the single most important thing you impart to your students to help them succeed in your class and in the real world? Alternatively, what is the most critical advice you would offer any student as he / she embarks on a creative career? In my class, students who demonstrate a commitment to clear goals, reflecting high standards, and a willingness to complete whatever work is necessary to reach those goals will succeed, and this is just as true in their careers. Is there anything else you'd like us to know about you, your experience, or your role as a faculty member at The Art Institutes? Never believe that you have nothing else to learn in your career. The most accomplished and interesting people I know are life-long learners.
https://www.artinstitutes.edu/houston/about/faculty/kaye-arnold
One of the largest US neighbourhood-scale sustainability plans launched The Battery Park City Sustainability Plan is a comprehensive pathway of strategies, goals, and specific actions to achieve progressive sustainability targets over the next decade to make NY State carbon neutral by 2050
The New York Assembly’s Judiciary Committee will soon issue subpoenas as part of its impeachment investigation into Gov. Andrew Cuomo, a member of the committee said on Wednesday. The announcement was made by state assemblyman Charles Lavine, a Democrat who chairs the body’s Judiciary Committee, who has been named as the head of the panel conducting the impeachment investigation. At the end of a meeting in Albany, he said the committee will issue subpoenas to compel documents and sworn statements from witnesses to corroborate existing evidence. “The purpose of this process is to both gather substantive evidence, as well as to assess the credibility and corroborate information learned during interviews,” Lavine said. The Judiciary Committee since mid-March has been probing allegations against Cuomo of sexual misconduct. At least 10 women have separately came forward with to name the embattled governor. Cuomo is also being probed over allegations that he directed staff to illegally withhold or mispresent information regarding the number of COVID-19 nursing home resident deaths, and whether he directed or had knowledge of executive personnel withholding information regarding safety concerns with bridges in the state. Assemblyman Tom Abinanti, a Democrat, said the subpoenas will likely be issued to “a whole wide range of categories of people.” “This is the next step in the process, it’s a normal step. We all expected this was going to happen.” Cuomo has said the interactions detailed by the women who have come forward with sexual misconduct allegations against him “may have been insensitive or too personal” but denied inappropriately touching anybody or propositioning them. He has apologized for his conduct. Cuomo’s office has also acknowledged withholding information on COVID-19 deaths from state legislators. The governor has refused to resign, despite growing calls for him to do so, saying it’s up to voters to decide who governs the state. Lavine didn’t indicate on Wednesday when he expects the impeachment investigation will end. Law firm Davis Polk, which was appointed by Speaker Carl Heastie to lead the probe, has collected more than 100,000 pages of records, he said, adding that the firm has reviewed “tens of thousands of pages of documents,” including emails, text messages, photographs, personnel records, training materials, and policies. A separate probe is taking place under the aegis of the state’s attorney general, Democrat Letitia James. Lawyers Joon Kim and Anne Clark are leading that investigation, which has no defined timeline. President Joe Biden said in March that Cuomo should resign if an investigation confirms the multiple allegations of sexual misconduct made against him. Cuomo’s office didn’t immediately respond to a request for comment by The Epoch Times. Zachary Stieber contributed to this report.
https://walls-work.org/new-york-assembly-will-issue-subpoenas-in-cuomo-impeachment-probe/
Back in 2013 I launched Chicagoano TV, a spin-off of my successful news blog, Chicagoano. With the priceless help of videographer Ingrid França and anchorman Ana Paula Gomes, who had previously worked at Brazil’s TV Cultura, we produced exclusive coverage of events in Chicago’s Brazilian-American community and beyond. We were thrilled to cover the opening night of the fourth edition of the MOSTRA Brazilian Film Series — a gala event and film screening at Columbia College Chicago. Video is in Portuguese. We stopped by the dress rehearsal for State Street Dance Studio’s production of “The Nutcracker” featuring four dancers from Brazil. In this preview, Raoni Xavier tells viewers (in Portuguese) why they should check these performances at the Batavia Fine Arts Centre. And now here’s our actual coverage of State Street Dance Studio’s production of “The Nutcracker,” featuring performance footage and behind-the-scenes interviews (mostly in Portuguese, with some subtitles). We were there hen Swing Brasileiro, Bloco Maximo and Passistas Samba Dancers came together at Mayne Stage to celebrate carnival 2014. Enjoy concert footage and behind-the-scenes interviews, in English and Portuguese.
https://sergiobarreto.me/portfolio-item/294/
Designing ornament today is a daring task, in both practice and academia and must overcome the bounds of the clean and the white. It is precisely this architectural element, the white wall that is associated with museums, as well as the obsessive and extreme urge for a disembodied and neutral space. So against this, I propose a space out of an intense physicality, and aim to create an environment for the encounter of art that is both tactile and sensuous. It is this, in my opinion that has made exhibition spaces, cold and soulless, lacking a joy and a beauty that can be partly, if not entirely be brought back by ornamentation. Having the body as a motif, the main element in the museum of life is the anthropomorphic column that adopts the iconography of the (flayed) body, and posture reflected through the entire structure by moments of compression and tension that express the effort of the body to retain its position. The museum of death conceptually and physically renders a scene of horror, and creates unquestionably a foreboding space However, also other than that, the ornament in this case, reintroduces an intense physicality and reflection towards the environment and enhances the sensation of the encounter for art, which should have been, in the absence of ornament – the white and the clean.
https://www.nikolaznaor.com/museum-of-life-and-death.html
Pisa, 07 february 2019. Tauopathies, such as Alzheimer Disease, are neurodegenerative pathologies caused by Tau protein disfunction. Tau is expressed in neurons and is involved in neuronal cells communication processes. Its main function is the cytoskeleton stabilization and the trafficking of synaptic vesicles toward synapsis. In pathological brain, Tau undergoes modifications, detaching from cytoskeleton and forming neurotoxic aggregates known as neurofibrillary tangles. Although 40 years of strong efforts investigating the processes leading to the formation of neurofibrillary tangles and the consequent neuronal death, the molecular mechanisms involved are still unknown . The team coordinated by Dr. Cristina Di Primio at Laboratory of Biology of Scuola Normale Superiore Bio@SNS (Director Prof. Antonino Cattaneo) discovered a new function of Tau protein: a small amount of Tau localizes in the neuronal nucleus and modulates the expression of genes involved in the pathology. To This result has been obtained in cultured healthy and pathological human neurons, by isolating the nuclei and analyzing the DNA and the factors involved in its regulation. This methodology allowed to uncover that, in healthy neurons, Tau regulates the expression of a set of genes involved in the synaptic transmission while, in the pathological conditions it determines an altered gene expression and mimics the initial stage of the Alzheimer Disease. This novel function reveals an unknown molecular mechanism that might explain the onset of the Alzheimer Disease and indicates nuclear Tau protein as a new target for development of therapeutic strategies. The study is published in the Journal of Molecular Biology by Giacomo Siano (First Author), a PhD student of the neuroscience program together with students and post-docs of Scuola Normale Superiore and the Department of Clinical and Experimental Medicine of University of Pisa.
http://normalenews.sns.it/a-novel-therapeutic-target-for-alzheimer-disease/
The history of the Bourbon domination of Sicily begins in 1734, when Charles of Bourbon conquered it to the detriment of the Habsburgs of Austria. The following year, Charles was crowned King of Sicily. Charles was the son of Philip V and was not destined to be sovereign because he was not the firstborn. Only for the stubbornness of his mother he did claim the kingdom of the Farnese and the Medici. In 1734 he conquered, with the Spanish army, the Kingdom of Naples and subsequently Sicily. He was the first of the Bourbon dynasty in Sicily, which represents a rich period for the island from a cultural and economic point of view Carlo reigned over Sicily until 1759 when his stepbrother died without leaving heirs and leaving him to became the king of Spain. At that point his son Ferdinand III of Sicily ascended the throne. Ferdinand ruled the island for 65 years, until 1816. It was one of the longest regency periods in history. His title of ruler was unexpected, due to a series of fortunate circumstances. Ferdinand was the third son of Charles so he was not destined for the throne. But the death of his uncle, King Ferdinand VI of Spain, without having left heirs forced his father to leave for Spain to occupy the throne. Carlo brought with him his eldest son, Carlo Antonio, who at that point became the dolphin of Spain. Ferdinand’s other older brother, Filippo, had severe mental disorders and was therefore excluded from the line of succession. He remained thus as ruler of the Two Sicilies Ferdinand, giving life to one of the longest reigns in history. Ferdinand became king of the Kingdom of the two Sicilies at the tender age of 8, for this reason he was assisted up to the age of 16 by a Council of Regency established by his father. When he came of age the Council of Regency turned into a Council of State as the sovereign began to reign autonomously. During his reign, the period that followed the French revolution is noteworthy as Ferdinand, deployed against Napoleon, had to flee to Sicily twice, leaving Naples. The first time, in 1802, he was very well received by the Sicilians. This is because Ferdinand had declared to the Sicilian people that he wanted to stay and move his court to Sicily. In reality, the stay in Sicily was nothing more than an escape. As soon as he was able, on the strength of an agreement with Napoleon, he returned to Naples. When in 1806 he was again forced to flee from Naples to Sicily, this time he was not welcomed by the Sicilian population. In 1810 he asked the Sicilian Parliament for help to curb the French threat. This caused a revolution to break out which forced Ferdinand to promulgate the “Constitution of Sicily” and establish a government of Sicilian notables. In 1815, immediately after the Congress of Vienna, Ferdinand saw his right to the Kingdom of Naples reconstitute. The year after he established the annexation of the Kingdom of Sicily, effectively giving life to the Kingdom of the two Sicilies. He then took the name of Ferdinand I of the two Sicilies. The Kingdom of Sicily and its Constitution were abolished, resulting in a revolt movement that resulted in a real revolution in 1820. This huge protest put Francesco, Ferdinand’s eldest son who was left as lieutenant of Sicily, on the run An autonomous government was thus established on the island which adopted the constitution of 1812. Ferdinand opposed the reconstitution of a Kingdom of Sicily and after many bloody battles, he managed to subdue the island. In 1825 Ferdinando died, leaving the kingdom in the hands of his son Francesco I. Francesco I reigned for only 5 years until his death in 1830. His son, in that year, became King with the name of Ferdinand II of the Two Sicilies. During the reign of Ferdinand, another revolt broke out in Sicily, called: “cholera riots” precisely because they derive from the situation of tension and poverty caused by this disease. This took place in 1837, the same year the revolts were quelled and order was restored. During 1848, yet another revolt broke out that drove the Bourbons off the island and the kingdom of Sicily was re-established. Ferdinand, to regain possession, bombed the island (hence the nickname “King Bomba”). The island returned to Bourbon rule in 1849. The riots and discontent continued. Meanwhile the kingdom passed into the hands of Ferdinand’s son, Francesco II. He could only reign for a year, given and considered the expedition of the thousand that meant that Sicily was annexed to the kingdom of Italy in 1860.
https://www.sicilianmagpie.com/en/bourbon-sicily/
Drama is an expressive art form that develops our children's artistic and creative abilities from Early Learning to Year 12. Dramatic play, dance and movement are important aspects of our ELC programmes which encourage our children to explore different modes of expression. Our primary school students participate in a range of dramatic activities at both Bostock House (ELC-Year 4) and Toorak Campus (ELC-Year 6), developing an understanding of fantasy and reality, exploring feelings and issues, as well as using a variety of drama skills, such as mime, improvisation, role-play, movement and use of voice. Drama is an elective subject at Middle School (Years 5-8), with an emphasis on creative and confident expression. Years 5 and 6 students experience creative movement, learn techniques for improvisation and mime, and are encouraged to experiment with a variety of styles to communicate their ideas. Years 7 and 8 students move beyond game-playing and improvisation into the types of activities which require greater technique and invention. Drama is an elective subject in Year 10 as a one semester course which provides an introduction to acting skills complemented by discussions on applied stagecaft, theatre history and play excerpts. Students learn the elements of theatrical production: stage and set design, lighting, costume, make-up and sound. Ensemble rehearsals build towards a dramatic production that is performed for a public audience. The School offers both the Victorian Certificate of Education (VCE) and International Baccalaureate (IB) Diploma in Years 11 and 12. VCE Theatre Studies offers a balance between the craft of performance and the skills of production. The subject offers four units of study, exploring elements of stagecraft, performance and production as well as focusing on research and interpretation. In the IB, Theatre Arts encourages practical engagement in all levels of theatrical conception and applied stagecraft as well as developing critical thinking, reflective analysis and the technical skills required for students to express themselves creatively. For more information about our Academic Programme please open our 2016 Curriculum Guide.
https://www.ggs.vic.edu.au/School/The-Arts/Drama/Academic-Programme
FIELD OF THE INVENTION BACKGROUND OF THE INVENTION BRIEF SUMMARY OF THE INVENTION DETAILED DESCRIPTION OF THE INVENTION The present invention generally relates to the detection of Web sites used to practice fraud, and more particularly to a method for locating Web sites replicating legitimate sites and used fraudulently for “phishing”. E-commerce Web sites and fiduciary institutions such as banks and credit card companies face an increasing problem posed by phishing. Phishing may be generally defined as creating fake copies of legitimate Web sites and then using various ruses to try to direct unwary users to the fraudulent sites to gather identity related information for use in subsequent fraudulent transactions. Typically, a phishing site replicates unique and easily recognizable portions of a legitimate site, such as its trademarks or logos, or familiar text instructions, to delude the user into thinking he or she is on the legitimate site. Often page structure, images and text are copied directly from the legitimate site to the phishing site so that portions of the phishing site are often identical with the legitimate site. To thwart phishing, site owners constantly warn their customers not to give out identity-related information, but such warnings are insufficiently heeded in the face of clever phishing techniques. There are two principal phishing techniques in vogue. In one phishing technique, the user is lured to the phishing site by means of a phony email message, purporting to be from the legitimate site owner, requesting the user to access a site whose link appears in the email and to enter information-such as the user's user id and password-to prevent some imminent undesired consequence, such as having the account closed. Attempts to counter this phishing technique generally are aimed at the email message used as the lure, by adopting enhanced security arrangements. In another phishing technique, the lure is not email but the ubiquitous use of public search sites (e.g., Google or Yahoo) to find items of interest to the user. In this technique, the phishing site mimics a site that can be expected to be the target of public search requests, and relies on the similarity of the site to a genuine site and the searcher's inability to distinguish legitimate from fraudulent sites in a list of sites found in a search report. For example, during periods following natural disasters, many relief agencies solicit funds and sites set up to accept donations will be located through Web searches using general search terms such as “tsunami relief efforts” or “Darfur relief efforts”. Legitimate sites are accessible to phishers and according they are able to “borrow” a substantial amount of content, such as photos of destruction, letters of appeal and gratitude, and other content for use on a phishing site. The phishing site takes advantage of the popularity of the event and the relative anonymity and/or obscurity of the relief agencies to lure unsuspecting users to the phony sites, which then request information, usually credit card information, to be subsequently used in fraudulent transactions. A related phishing technique, also dependent on searches, but this time on a flawed search input, devises sites that are one keystroke error away from a legitimate site's URL, such as www.banklfamerica.com, taking the user to a phishing site. In each of these phishing techniques, while the paths urging the user toward the phishing site may differ, the attempt is to lure the user to a fake Web site that mimics substantial portions of the legitimate Web site but contains a “hook”—a request for confidential identity information that, when supplied, can be used to complete fraudulent transactions. Legitimate owners of fraudulently copied Web sites may lose business or donations. In addition, companies that users have a fiduciary connection with, such as a bank, credit card, or an e-commerce site (e.g. Amazon.com), may have to bear all or some of the costs if the customer's account is defrauded. Credit card issuers often absorb the costs of fraudulent card use and may be required by law to limit the card user's liability. Users, even if reimbursed for direct account losses, may suffer temporary loss of credit, impairment to their credit ratings and an enormously difficult and time consuming job of getting the affair resolved and records corrected. Some approaches to thwart access to phishing sites have been adopted by browser program suppliers. Some examples include the deactivation of links in received emails, or alerting users that various sites they are accessing “might be” phishing sites if they have any characteristics the browsers may choose to associate with phishing sites. However, the present state of the art is such that phishing filters in browsers typically produce so many false positives or warnings that they frequently are seen by users as an annoying interference, and users choose to “continue” to access the sites despite the warnings. Accordingly, it would be advantageous to enable the Web to be effectively and quickly searched to locate phishing Web sites having a structural similarity to a known site so that they can be countered before they are able to inflict significant harm. There is a further need to provide practical and economical methods arranged and configured to enable such detection. There has been considerable work done in the prior art on structural comparison of Web sites, primarily in the context of operating search engines to detect the presence of mirrored Web sites and to disregard them so as to reduce the ongoing crawling work that a spider has to do in maintaining a search index, and to reduce redundancy in responses to a client's search query. For example, U.S. Pat. No. 6,286,006 to Bharat et al. detects mirrored host pairs using information about a large set of pages, including URLs. The identities of the detected mirrored hosts are then saved so that browsers, crawlers, proxy servers, or the like can correctly identify mirrored web sites and not recrawl them or return redundant information in response to a search request. In the disclosure of this patent, a search engine looks at the URLs of page's hosts to determine whether the hosts are potentially mirrored. In another example, U.S. Pat. No. 6,658,423 to Pugh et al. discloses duplicate and near-duplicate detection techniques for operating a search engine which assign a number of fingerprints to a given document by extracting parts from the document, assigning the extracted parts to one or more of a predetermined number of lists, and generating a fingerprint from each of the populated lists. Two documents are considered to be near-duplicates if any one of their fingerprints matches. These previous techniques are adapted to find mirrored Web sites, which either are identical to hosts or are “near-duplicate” copies with insignificant content differences from the host. Pugh et al. additionally claim to be able to detect copyright infringements. However, these techniques would not be practical solutions for locating phishing sites, first, because they involve the work of completely crawling the Web (a process which is neither economical nor quick) to look for near-replicas of specific pages or portions of a Web site and then essentially to remove them from future consideration. Instead, to detect phishing, it is desirable to be able to quickly find all instances in which selected portions of one known Web site (or a few known Web sites) are present elsewhere in the Web. The detection techniques of U.S. Pat. Nos. 6,286,006 and 6,658,423 are also not appropriate for detecting phishing sites because they require starting with a complete copy of the URLs or contents of all the sites on the Web before looking for duplications. Pugh et al. explicitly requires the presence of Web documents in toto before the fingerprints used to detect duplication can be assigned. Because an extremely tiny and evanescent fraction of Web sites are phishing Web sites, these prior art techniques-designed for the very different purpose of countering the adverse effects on Web searching of many legitimate forms of Web redundancy—are neither sufficiently focused on the desired result nor sufficiently fast to be useful in detecting phishing sites. Proceedings of the ACM SIGMOD Annual Conference, San Jose Another form of structural comparison is disclosed in Sergey Brin, James Davis and Hector Garcia-Molina, “Copy Detection Mechanisms for Digital Documents,” 1995 (May 1995) incorporated herein by reference. An available version of the paper can be found, for example, at http://dbpubs.stanford.edu:8090/pub/showDoc.Fulltext?lang=en&doc=1995-43&format=pdf&compression=&name=1995-43.pdf. This paper discloses a method which determines whether an identified document is a copy of a specific preidentified copyrighted article. As described in the paper “the service will detect not just exact copies, but also documents that overlap in significant ways.” However, the method requires that the document to be tested for legitimacy be identified to start with, and thus would not be of use in finding a “phishing” web site whose location and existence are unknown. Accordingly, there remains a need for a method for detecting phishing sites that is effective, efficient in the sense that it does not require massive computational capacity, and at the same is quick and simple so that legitimate Web site owners can be made aware of phishing sites without great cost and on a prompt basis. The present invention provides a method to look for near-replicas of known legitimate Web sites on the Web which is both simple and effective, and which makes advantageous use of current Internet indexing technology (such as that provided by AltaVista, Google, etc.) to locate sites which may be similar (in terms of structure and/or content) to a given site. The present invention does not attempt to detect all instances of duplication on the Web as in the prior art, but narrows the duplicate detection by first selecting specific known Web sites suspected of being “phished,” selects substrings distinctive to the specific Web sites, and uses an available public database index to make a first search for the presence of the selected substrings in other sites on the Web. The results of this search then form a pool of candidates for further analysis with respect to additional characteristics of the selected Web sites and possible identification as phishing replicas. The first search for selected substrings and the further analysis with respect to additional characteristics lend themselves to being performed as part of a process using a software routine to perform the method steps. There are several ways to look for the near replicas used for phishing. In one aspect of the invention, a method looks for structural similarities to a selected Web site at the URL level, which is effective if the phishing site has simply replicated the legitimate Web site including its hierarchy. Numerous search engines have a URL: search facility which allows one to look for strings in the URL database rather than the indexed contents of the Web pages. For example, AltaVista's advanced search facility has this feature. In this aspect of the invention, the method proceeds by first dividing the selected legitimate Web site's URL into a plurality of substrings, and then performing a first search for the substrings in a URL database. This is a quick search and the number of URL substrings that one has to look for is fairly limited. The search results can be fetched selectively, i.e., each substring search can be individually retrieved, and then the pages found in the first search are compared against the legitimate site's pages using additional comparison techniques to identify phishing sites. Use of a first URL search may be ineffective if a phisher elects to forego the replication of the legitimate site's URL, even though such replication might give the phishing site an enhanced appearance of authenticity, in favor of an attempt to evade detection with URL dissimilarity. Thus, in a second aspect of the invention, the first search performed by the present detection method using indexed public search engines is for substrings present in the content of the one or more selected Web sites that are suspected of being phished. The method proceeds by selecting distinctive substrings in the legitimate Web site content that would be included in a phishing site such as those corresponding to identifying characteristics, such as trade names, trademarks, logos, taglines or familiar textual phrases, and then searching the selected one or more substrings using a public search engine. Selecting several such substrings for searching will narrow the search results, and it is likely that phishing sites will use a plurality of such identifiers in order to appear legitimate. Search results obtained from such content substring searches are then further analyzed for comparison to the selected legitimate Web site. Such further analysis may take the form of visual scrutiny, further searching of the first search results or focus-crawling of the first search results to compare individual pages. Other comparison techniques, such as examining meta-information (e.g., through HEAD method requests) to compare attributes such as byte count may be used to look for similarities. If the tree structure of a legitimate site is essentially copied into a phishing site, with a few minor changes, even with different URLs, the intra-site link structure of the two sites will be very similar. Thus, in another aspect of the invention, the identifying characteristic of the Web site that is suspected of being phished is the tree structure of its intra-site links. The tree structure of the selected Web site is identified, and compared with suspected phishing sites to find those that have similar tree structures. Given that the methods of the present invention provide a low cost way to detect near replicas used for phishing, it is possible to use them to offer a service to periodically compare any selected site or portion of a selected site against what is on the Web to look for new occurrences of illegitimate replicas or near-replicas. Therefore, in another aspect of the invention, a method periodically conducts one or more of the searches described above, e.g., on behalf of a fiduciary site or an e-commerce site, to look for phishing sites that are popping up in different parts of the Internet, and in another aspect the method includes a service that periodically searches for phishing sites. Given the low cost associated with the present invention, and its ability to leverage the use of public search indices already created for general searching purposes, it is possible to offer an end-user service to detect phishing which would be fast and effective. These and other objects, advantages and features of the invention are set forth in the attached description. FIG. 1 FIG. 1 100 110 120 120 120 120 is a high-level block diagram showing the environment in which phishing takes place together with some aspects of the present invention for detecting phishing sites. This environment includes a network (such as the Internet for example) through which a user, by means such as a customer-user device , accesses information from one or more content providers (servers) . For illustrative purposes, shows a content provider L which represents a legitimate Web site operated, for example, by a financial institution to provide account services to customers, such as bill payment, credit card payment, account transfers, and wire transfers. Content provider P represents a phishing Web site which is an unauthorized replica of the legitimate Web site L to be used for fraudulent purposes, such as obtaining account identity and password information that will allow the operators of the phishing Web site to fraudulently access the user's account. FIG. 1 130 110 140 110 140 140 120 120 120 Also shown in is an email server through which customer-user device sends and receives email messages, and a search facility (server) (such as that operated by Google, Inc. or AltaVista) which Web-crawls and indexes Web content and permits customer user device to submit a search query to the search facility to retrieve content of interest on the Web in response to a search request. As pointed out above, when a user submits a search query to the search facility to retrieve content of interest, the search results may include content from the near-replica phishing Web site P in addition to, or instead of, content from the legitimate Web site L, and the user may then enter, and be taken in by, the fraudulent site P. FIG. 1 110 120 120 110 120 also illustrates a phishing site detection device D in accordance with the present invention that performs the methods of the present invention to detect illegitimate replicas of selected legitimate Web sites, such as site L. Illustratively, the selected Web site is the legitimate site L, and the intended purpose of the method performed by the detection device D is to detect illegitimate phishing site P. 110 112 114 116 112 100 118 112 110 110 130 130 The customer-user device may include a browser which may include a navigator and a user interface . The browser may access the network via input/output interface . For example, in the context of a personal computer, the browser may be a browser such as “Internet Explorer” from Microsoft Corporation of Redmond, Wash., or “Netscape” from Netscape Communications, Inc. and the input/output interface may include a telephone or cable modem or network interface card (or NIC) and networking software. Other examples of possible user devices include wireless devices, such as personal digital assistants and mobile telephones. The user device may connect with email server using an email program such as Microsoft Office Outlook arranged to access the user's email account at email server . 110 300 300 FIG. 1A FIG. 1A FIG. 1A The phishing site detection device D includes processors and memories shown in greater detail in that are arranged to receive, store and perform software instructions which carry out the methods of the present invention. The functions of such processors may be implemented using hardware, software or a combination of the two and may be implemented in a computer system as shown in . The present invention, in one aspect, is directed to one or more computer systems capable of carrying out the methods of the invention; in another aspect, the present invention is directed to a computer-usable program code storage medium to cause a computer to perform the methods of the invention. Various software embodiments are described in terms of the example computer system shown in . After reading this description, it will become apparent to a person skilled in the relevant art how to implement the invention using other computer systems and/or computer architectures. 300 304 304 306 300 308 310 310 312 314 314 318 318 314 318 FIG. 1A The computer system shown in includes one or more processors, such as processor . The processor is connected to a communication bus . Computer system also includes a main memory , preferably random access memory (RAM), and can also include a secondary memory . The secondary memory can include, for example, a hard disk drive and/or a removable storage drive , representing a floppy disk drive, a magnetic tape drive, an optical disk drive, etc. The removable storage drive reads from and/or writes to a removable storage unit in a well known manner. Removable storage unit represents a floppy disk, magnetic tape, optical disk, or similar device which is read by and written to by removable storage drive . As will be appreciated, the removable storage unit includes a computer usable storage medium for storing computer software and/or data. 310 300 322 320 322 320 318 300 In alternative embodiments, secondary memory may include other similar means for allowing computer programs or other instructions to be loaded into computer system . Such means can include, for example, a removable storage unit and an interface . Examples of such include a program cartridge and cartridge interface (such as that found in video game devices), a removable memory chip (such as an EPROM, or PROM) and associated socket, and other removable storage units and interfaces which allow software and data to be transferred from the removable storage unit to computer system . 300 324 324 300 100 324 324 324 326 324 328 328 326 FIG. 1 Computer system can also include a communications interface . Communications interface allows software and data to be transferred between computer system and external devices, such as the network shown in . Examples of communications interface can include a modem, a network interface (such as an Ethernet card), a communications port, a PCMCIA slot and card, etc. Software and data transferred via communications interface are in the form of signals which can be electronic, electromagnetic, optical or other signals capable of being received by communications interface . These signals are provided to communications interface via a channel . This channel carries signals and can be implemented using wire or cable, fiber optics, a phone line, a cellular phone link, an RF link and other communications channels. 318 312 326 300 In this specification, the terms “computer program medium” and “computer usable medium” are used to generally refer to media such as removable storage device , a hard disk installed in hard disk drive , and signals . These computer program products are means for providing software to computer system . 308 310 324 300 304 300 Computer programs (also called computer control logic) are stored in main memory and/or secondary memory . Computer programs can also be received via communications interface . Such computer programs, when executed, enable the computer system to perform the features of the present invention as discussed herein. In particular, the computer programs, when executed, enable the processor to perform the features of the present invention. Accordingly, such computer programs represent controllers of the computer system . 300 314 312 324 304 304 In an embodiment where the invention is implemented using software, the software may be stored in a computer program product and loaded into computer system using removable storage drive , hard drive or communications interface . The control logic (software), when executed by the processor , causes the processor to perform the functions of the invention as described herein. In another embodiment, the invention is implemented primarily in hardware using, for example, hardware components such as application specific integrated circuits (ASICs). Implementation of the hardware state machine so as to perform the functions described herein will be apparent to persons skilled in the relevant art(s). It will be apparent that the invention may be implemented using a combination of both hardware and software. 110 112 114 116 112 100 324 300 112 324 The search device D may include a browser D which may include a navigator D and a user interface D. The browser D may access the network via input/output interface . For example, where the computer system is provided by a personal computer, the browser D may be a browser such as “Internet Explorer” from Microsoft Corporation of Redmond, Wash., or “Netscape” from Netscape Communications, Inc. and the communications interface may include a telephone or cable modem or network interface card (or NIC) and networking software. FIG. 1 120 120 126 124 122 120 126 Referring again to , each of the content providers L or P may include stored resources or content , a resource retrieval device that accesses and provides content in response to a request, and input/output interfaces . These operations of the content providers may be performed by computers, such as personal computers or servers for example. The stored resources may be embodied as data stored on a storage medium such as a magnetic disk. In this particular example, the stored content may be interpreted to include addressable content, such as a Web page or pages constituting a Web site for example. 140 150 152 100 154 142 144 154 146 148 146 118 140 100 The public search facility may perform crawling, indexing/sorting, and query processing functions. At a crawling facility , a crawling operation gets content from various sources accessible via the network , and stores such content, or a form of such content, as indicated by . Then, at an automated indexing/sorting facility , an automated indexing/sorting operation may access the stored content and may generate a content index (e.g., an inverted index) and content ratings (e.g., page ranks) . Finally, a query processing operation accepts queries and returns query results based on the content index (and the content ratings) . Input-output interface S connects the search facility with the network . The crawling, indexing/sorting and query processing functions may be performed by one or more computers. 110 120 120 112 140 User device may connect with and access content from content providers L and P by entering their URLs in browser , either manually by entering a URL or by clicking on a hypertext link in a document, such as in a Web page retrieved by entering a URL or in a Web page obtained as a result of making a search query to the search facility . 120 120 110 140 A typical phishing scam is one in which the phishing site P is made to mimic the content of a legitimate site L which is operated by a legitimate owner, such as a fiduciary institution offering banking or credit card services. In this example, the user device submits a search query to search facility with a search request such as “Citibank credit card payment”. 120 110 140 The operator of legitimate site L alternatively may be a charitable institution, which exists for the purpose of providing information about, and soliciting donations for, a general charitable purpose such as an emergency relief effort, or an effort to combat a medical condition, such as Alzheimer's disease. In this example, the user device submits a search query to search facility with a generic search request for “tsunami relief efforts” or “Alzheimer's disease” for example. 120 120 140 120 120 120 120 In either of the search examples above, because the phishing site P contents are replicas or near-duplicates of the legitimate site L, the search report from search facility will likely return both the legitimate site L and the phishing site P in a search report. A certain number of users then will access the phishing site P in the mistaken belief they are accessing legitimate site L, and will then be induced to submit confidential information such as credit card information that subsequently will be used fraudulently. 120 120 120 Even gullible users will balk if the phishing site P is transparently phony or totally unfamiliar, so invariably the phishing site P incorporates several familiar characteristic features of the legitimate institution's real Web site L. In general, a phishing Web site will try to look similar to the legitimate Web site at the visible level (even though there will be key changes geared to the site's nefarious purpose of eliciting identity information). FIGS. 2 and 3 FIGS. 2 and 3 L P 120 120 160 162 164 166 168 170 120 120 120 120 show respectively examples of a real Web site page Pfrom a financial site L, and a phishing Web site page Pfrom site P. The distinctively recognizable and characteristic features of the legitimate site that predictably are copied in the phishing site include one or more of the following: the trade name of the site owner (for example, “First Bank”), trademarks or service marks of the site owner (“Freedom” banking services), taglines (“the bank with a heart”), formats of typefaces, design logos , standard blocks of text , and page layout styles (relative locations of page elements). Often, a home page of the legitimate site L will be copied in its entirety, with the user being instructed to access a linked page by clicking on an intra-site link heading such as “user preferences” which then takes the user to a special page created by the phishing operator, which may itself mimic a page from the legitimate Web site L but deliver the information entered on that page to the phishing operator. The URL of the phishing site P may copy substrings of or the hierarchical structure of the URL of the legitimate site L, as shown by the URLs associated with . 120 120 Where the legitimate site L is a charitable institution, as in the second example of a phishing scam given above, the distinctively recognizable and characteristic feature of the legitimate site L that are predictably copied will include the topic of the charity (“tsunami” or “Alzheimer's”), the name of the charity, information about celebrities or other persons associated with the charity, pictures, letters and the like. P L 120 120 140 120 120 120 FIG. 1 Even though the page Pfrom phishing site P will invariably copy many or all of the characteristic features of a page Pfrom legitimate site L, as indicated above, it also will invariably have the property, because of the need to implement its fraudulent purpose, that it contains differences from the legitimate site which will prevent it from being identified as a “mirror” or “near-duplicate” of the legitimate site by the search engine techniques described above with reference to U.S. Pat. Nos. 6,286,006 and 6,658,423. Accordingly, the public search facility shown in that crawls the Web content and creates an search index of the Web (and disregards mirror sites) will include in its index references to the phishing site P in addition to references to the legitimate site L (while disregarding sites that are true mirrors to site L). 120 120 Applicants have discovered that these characteristic similarities and dissimilarities between the legitimate site L and phishing site P allow phishing sites to be found by methods which include first, selecting one or more legitimate sites suspected of being the object of a phishing scam (or sites for which a repeated periodic search for replicas is desired), then selecting distinctive substrings of the legitimate sites and submitting first search queries for these substrings to a public search facility which previously has crawled the Web and indexed its content, and then further analyzing the results of such first search queries to compare them to the preselected legitimate site to locate unauthorized replicas that are phishing sites. Such methods are relatively quick and simple, use search resources that are readily available and frequently updated, lend themselves to searching using computer software arranged to perform the method steps, and require very little time and computing equipment compared to techniques which require massive Web crawling to take place. 400 400 410 120 411 120 412 FIG. 4 FIG. 4A FIG. 4A A first method for finding a phishing site according to the invention is shown in flow diagram form in . Method proceeds in step by selecting one or more legitimate Web sites, such as L, for which phishing replicas are to be found. In step , the method identifies the URL of the selected legitimate site L (an illustrative example of which is shown in ). In step , substrings of the URL (such as substrings a, b, c and d indicated in ) are selected. 414 416 140 418 420 120 FIG. 4A FIG. 1 In step , search queries using the selected URL substrings are formulated. For example, a search query for the URL substrings in might be “us-fbank.” Techniques for selecting URL substrings for optimal searching are suggested in “A Low-bandwidth Network File System” by Athicha Muthitacharoen, Benjie Chen and David Mazieres of MIT, incorporated by reference, a copy of which is located at http://pdos.csail.mit.edu/papers/lbfs:sosp01/lbfs.pdf In step the search queries are submitted to a public search facility, such a search facility in , that is able to search URLs. Such URL searching facilities are available, an example being the search facility offered by AltaVista. In step the search reports are received. Such search reports typically will be in the form of a list of Web sites responsive to the query, with snippets of information relating to each of the sites. In step the retrieved sites are compared with legitimate site L (and any other legitimate related sites that may have been preselected) and all the legitimate duplicate sites are removed. 422 422 422 422 422 a b In step , the remaining candidate sites retrieved in the search report are further analyzed to determine if they have further characteristics that would identify them are phishing sites. The analysis of step may be accomplished by a visual comparison of sites, or alternatively, the analysis step may include a step of performing a focus search of the identified sites to quantify similarity, or a step of comparing page details in header information, such as byte count, to identify similarity. As noted above, the tree structures of intra-site links in legitimate sites can be expected to be duplicated in phishing sites, and therefore a comparison of tree structures can help verify whether sites identified by URL substring searching are phishing sites. The structures can be compared for the overall site, as well as the relative locations (or number of pages) where searched common substrings occur. 426 422 120 400 In step , the sites which analysis step detects as fraudulent replicas or near-duplicates have appropriate action taken in response. Such action may include, for example, alerting the institution which owns legitimate site L, alerting law enforcement authorities, posting information about the detected site, or initiating steps to deny access to the detected site. The foregoing method efficiently detects phishing sites because it is able to work from data already collected and indexed by search engines, and does not require the billions of pages on the Web to be reexamined. 400 110 140 100 400 400 424 FIG. 1 FIG. 1A FIG. 4 The method , as described above, is one that can be performed by a detection device D that, as shown in , has access to public search facility over the Internet . The steps of method advantageously can be performed by software instructions controlling the computer system of . Because the public search facility has already created and maintains an index of the Web, the search can proceed rapidly and results obtained quickly. Because results are quickly obtained, the method can be repeated as shown in by return loop on a periodic basis, for example once a day, as a service provided to legitimate site owners for fraud prevention. FIG. 5 FIG. 2 500 500 510 511 120 512 120 illustrates a second method according to the invention for finding a phishing site according to the invention. In method , step preselects one or more legitimate sites for which replicas are to be found. In step , the method identifies the content of legitimate site L, and in step substrings of content of the legitimate site L are selected. Such substrings may correspond to distinctive, characteristic content of the site, and may be the characteristic and easily recognized features previously identified in , such as trade name, trademarks or service marks, taglines, formats, designs, or text blocks of the legitimate site. 514 FIG. 2 In step , search queries using the selected substrings are formulated. For example, a series of search queries based on the example of might be “first bank” and “the bank with a heart” and the code for the “heart” logo. 120 FIGS. 6 and 7 Alternatively, or additionally, substrings may be selected on the basis of the tree structure of the intra-site links of the legitimate site L as described below with reference to . 516 500 140 518 520 120 FIG. 1 In step in method the search queries are submitted to a public search facility such as the facility shown in . Such searching facilities for content are available, an example being the search facility offered by Google. In step the search reports are received. Such search reports typically will be in the form of a list of Web sites responsive to the query, with snippets of information relating to each of the sites. In step the received list of sites is compared with legitimate site L (and any other legitimate related sites that may exist) and all the legitimate sites removed. 522 522 522 522 522 526 522 120 b In step , the remaining sites in the search report are further analyzed to determine if they have further characteristics that would identify them are phishing sites. Step may be accomplished by a visual comparison of sites, or alternatively, the analysis step may include a step a of performing a focus search of the identified sites to identify similarity, or a step of comparing header information, such as byte count, to identify similarity. In step , the sites which analysis step detects as fraudulent replicas or near-duplicates have appropriate action taken in response. Such action may include, for example, alerting the institution which owns legitimate site L, alerting law enforcement authorities, posting information about the detected site, or initiating steps to deny access to the detected site. 500 110 140 100 500 500 524 400 500 FIG. 1 FIG. 1A The method , as described above, is one that can be performed by a detection device D that, as shown in , has access to public search facility over the Internet . The steps of method advantageously can be performed by software instructions controlling the computer system of . Because the public search facility has already created and maintains an index of the Web, the search can proceed rapidly and results obtained quickly. Because results are quickly obtained, the method can be repeated as shown by return loop on a periodic basis, for example once a day, as a service provided to legitimate site owners for fraud prevention. Methods and , which look for similarities in URLs, content and structure, can be run serially or combined, repeated periodically, and offered as a service to detect fraud. FIG. 6 FIG. 6 FIG. 6 600 602 1 1 1 2 1 3 604 606 608 604 2 1 1 2 12 610 612 606 608 2 21 2 22 2 23 614 616 618 2 31 2 32 620 622 614 622 602 620 is a diagram of a tree structure of an exemplary site S whose pages have intra-site links to other pages. For example, the home page of a news site may have links to “business”, “sports” and “entertainment”. The “business” page further may be linked to “finance”, “stocks” and “currency exchange”, and “sports” further may be linked to “baseball”, “football” and so forth. As illustrated graphically in , the tree structure of site S has a home page with links L., L. and L. branching to pages , and . Page , in turn, has links L. and L. branching to pages and . Similarly, pages and have links L., L. and L. to pages , and and links L. and L. to pages and . The pages through may, in turn, have further links to further pages (which, for simplicity of illustration are not shown). The number and tier location of the links (branches) form what is referred to as the tree structure of the site S. The tree structure of site S may be determined by a visual inspection of the links on pages through and graphically represented as shown in , or may be detected by a computer program analysis of the links of a site S and numerically represented, using computer programs known to the art. FIG. 7 FIGS. 4 and 5 FIG. 4 FIG. 5 700 120 702 704 706 400 500 708 710 712 710 714 716 700 422 522 shows a method arranged to search for replicas or near-duplicates of a legitimate site L by searching for duplicate or near-duplicate tree structures. Step preselects sites to be searched and step identifies tree structures in the preselected sites, preferably using known computer program techniques. In step , suspected phishing sites are identified, as for example using the search methods or illustrated in . Alternatively, a search technique can be devised to look for tree structures directly, but in most instances it is preferable to narrow the list of suspected sites first using a URL or content search. In step the suspected sites have their tree structures analyzed, preferably using known computer program techniques. In step , the tree structures of the legitimate sites are compared with the tree structures of the suspected sites to detect sites with similar (i.e., duplicate or near-duplicate structures), and in step suspected sites which have tree structures which are duplicates or near-duplicates of the legitimate sites are selected. As will be apparent to those skilled in the art, the comparison step preferably is controlled to select a degree of similarity between tree structures which is sufficiently focused to effectively target duplicate sites but not so focused as to permit minor changes in tree structure by phishing sites to evade detection. In step the selected suspect sites with duplicate or near-duplicate tree structures may be further analyzed, e.g., by using previously described techniques or a visual inspection, to identify sites that are phishing sites, and in step responsive actions may be taken to counter the identified phishing sites. The method which has been described can be used, for example, as part or all of step in or step in , or can be operated as a stand-alone method to search for and analyze suspected phishing sites. Thus, the invention describes a method enabling a phishing site to be detected. While the present invention has been described with reference to preferred and exemplary embodiments, it will be understood by those of ordinary skill in the art that various changes may be made and equivalents may be substituted for elements thereof without departing from the scope of the invention. In addition, many modifications may be made to adapt a particular situation to the teachings of the invention without departing from the scope thereof. Therefore, it is intended that the invention not be limited to the particular embodiments disclosed, but that the invention include all embodiments falling within the scope of the appended claims. BRIEF DESCRIPTION OF THE DRAWINGS The foregoing summary of the invention, as well as the following detailed description of the preferred embodiments, is better understood when read in conjunction with the accompanying drawings, which are included by way of example and not by way of limitation with regard to the claimed invention: FIG. 1 is a block diagram showing elements of the Internet involved in phishing, as well as elements used in detecting phishing sites using methods according to the invention. FIG. 1A is a block diagram showing details of a computer system suitable for running software performing the methods of the present invention to operate a phishing site detection device according to the invention. FIG. 2 shows a diagram of the features of an example of a legitimate Web site page. FIG. 3 shows a diagram of the features of an example of a Web site page used for phishing and replicating portions of the legitimate Web site page. FIG. 4 shows a schematic diagram of a first method according to the invention. FIG. 4A shows a URL associated with a legitimate Web site. FIG. 5 shows a diagram of a second method according to the invention. FIG. 6 shows a diagram of a tree structure of the intra-site links of an exemplary Web site. FIG. 7 shows a diagram of a method for locating phishing sites using tree structures.
PROBLEM TO BE SOLVED: To achieve the accurate execution of the advance notice performances as vital information which the players are notified of without hindering the proceeding of the games while requiring a longer period than the shortest time of 'one game'. SOLUTION: While the starter advance notice performance is executed, the operation for the subsequent game (bet operation or the like) is conducted and when the indication of the advance notice performance is given even in the subsequent game, the indication of the later advance notice performance is discarded to put priority on the starter advance notice performance thereby accomplishing the continuation of the starter advance notice performance. As a result, the players can be notified accurately of more important information with a notion that a longer advance notice performance has relatively important information over a plurality of games. This also can make the games proceed by the will (operation) of the players as in the past, in stead of continuing the advance notice performance to be adjusted to the progress of the games, thereby by no means hindering the progress of the games. COPYRIGHT: (C)2006,JPO&NCIPI
If you look up into the night sky on a very clear night, in an area with very little light pollution, you will see a band of stars splashed across the sky. That band is the Milky Way, the spiral galaxy in which our Solar System lies, and where almost every object you can see with your naked eye calls home. The Solar System is inside the disk of the Milky Way, and orbits in one of the spiral arms at 26,000 light years from the center of the galaxy. We can’t see the spiral structure of the galaxy from our planet because we are inside the disk and have no means of taking images from above or below the galaxy. Images of the Milky Way’s spiral structure are created from computer modeling based on information from stars as they orbit the galaxy. Much of the Milky Way is invisible to us because we have to look through the plane of its disk – a lot of the Milky Way is on the other side of the galaxy, and there is so much dust and so many bright stars closer to us that we can’t see the stars behind all of this matter. Of the 5,000 to 8,000 stars in the Milky Way visible to the human eye from Earth, one can usually only see about 2,500 at a time. In fact, the few thousand stars we can see of the Milky Way with our naked eye are only about 0.000003% of the 200-400 billion stars that inhabit the spiral! To see a picture of the entire Milky Way from the surface of the Earth at once, you have to create a mosaic of photographs taken at different times. This is because the Milky Way moves overhead at night with the rotation of the Earth, so can’t be viewed all at once from one spot. Many panoramas of our galaxy can be found on the web, but here’s a few to get you started: NASA’s Astronomy Picture of the Day, the Spitzer Space Telescope’s very detailed, very large (55-meters long when printed) mosaic available for your perusal here – it’s a large image, so give it a little time to load – and a drawing by Knut Lundmark of over 7,000 stars in the Milky Way made in the 1950s. To learn more about the Milky Way, visit the rest of the section here at the Guide to Space, listen to Episode 99 of Astronomy Cast, or visit the Students for the Exploration and Development of Space.
https://www.universetoday.com/23173/the-milky-way-from-earth/?shared=email&msg=fail
5.1 Processed images are used for many purposes by the forensic science community. They can yield information not readily apparent in the original image, which can assist an expert in drawing a conclusion that might not otherwise be reached. 5.2 This guide addresses image processing and related legal considerations in the following three categories: 5.2.1 Image enhancement, 5.2.2 Image restoration, and 5.2.3 Image compression. 1. Scope 1.1 This guide provides digital image processing guidelines to ensure the production of quality forensic imagery for use as evidence in a court of law. 1.2 This guide briefly describes advantages, disadvantages, and potential limitations of each major process. 1.3 This standard cannot replace knowledge, skills, or abilities acquired through education, training, and experience, and is to be used in conjunction with professional judgment by individuals with such discipline-specific knowledge, skills, and abilities. 1.4 This standard does not purport to address all of the safety concerns, if any, associated with its use. It is the responsibility of the user of this standard to establish appropriate safety, health, and environmental practices and determine the applicability of regulatory limitations prior to use. 1.5 This international standard was developed in accordance with internationally recognized principles on standardization established in the Decision on Principles for the Development of International Standards, Guides and Recommendations issued by the World Trade Organization Technical Barriers to Trade (TBT) Committee. 2. Referenced Documents (purchase separately) The documents listed below are referenced within the subject standard but are not provided as part of the standard.
https://www.astm.org/Standards/E2825.htm
REFERENCES CITED OTHER PUBLICATIONS BACKGROUND OF THE INVENTION SUMMARY OF THE INVENTION DESCRIPTION OF THE PREFERRED EMBODIMENTS U.S. PATENT DOCUMENTS RE36488 January 2000 Minne et al. RE36488 January 2000 Elinqs et al. Re. 33937 May 1995 Schubert 5,444,244 August 1995 Kirk et al. 5,477,732 December 1995 Yasue et al. 5,483,822 January 2001 Albrecht et al. 5,503,010 April 1996 Yamanaka 5,519,212 May 1995 Elings et al. 5,519,212 May 1996 Bayer et al. 5,646,339 July 1997 Bayer et al. 5,646,339 July 1997 Minne et al. 5,742,377 April 1998 Han et al. 5,742,377 April 1998 Minne et al. 5,763,768 June 1996 Henderson et al. 5,804,708 September 1998 Yamanaka et al. 5,866,805 February 1999 Muramatsu et al. 5,866,805 February 1999 Han et al. 5,877,412 March 1999 Minne et al. 5,883,705 March 1999 Elings et al. 5,924,845 July 1999 Bagley et al. 5,994,820 November 1999 Kleindiek 6,006,593 December 1999 Yamanaka 6,051,833 April 2000 Yasutake 6,075,585 June 2000 Binning et al. 6,075,585 June 2000 Minne et al. 6,079,255 June 2000 Thomson et al. 6,249,000 June 2001 Muramatsu et al. 6,298,715 October 2001 Fretigny et al. 6,298,715 October 2001 Thomson et al. 6,349,591 February 2002 Zypman et al. 6,349,591 February 2002 Fretigny et al. 6,452,170 September 2002 Kendall 6,452,170 September 2002 Zypman et al. 6,465,782 October 2002 Israelachvili 6,578,410 June 2003 Howald et al. 6,767,696 July 2004 Sahin et al. 6,880,386 April 2005 Krotil et al. 6,935,167 August 2005 7,089,787 August 2006 Sahin et al. T. Drobek, R. W. Stark, and W. M. Heckl, Physical Review B [Condensed Matter and Materials Physics] 64, 045401/1-5 (2001). F. Krause, F. Kaisinaer, H. Starke, G. Persch, and U. Hartmann, Thin Solid Films 264, 141-7 (1995). R. W. Stark, T. Drobek, and W. M. Heckl, Applied Physics Letters 74, 3296-8 (1999). T. Drobek, R. W. Stark, and W. M. Heckl, Physical Review B 6404 (2001). R. W. Stark, G. Schiffer, M. Stark, R. Guckenberaer, and A. Stemmer, Physical Review B 69 (2004). R. W. Stark and W. M. Heckl, Surface Science 457, 219-228 (2000). R. W. Stark, Nanotechnology 15, 347-351 (2004). R. W. Stark, G. Schiffer, and A. Stemmer, Physical Review B 68 (2003). M. Stark, R. W. Stark, W. M. Heckl, and R. Guckenberger, Proceedings of the National Academy of Sciences of the United States of America 99, 8473-8478 (2002). J. D. Batteas, A. N. Round, B. Yan, S. Danq, R. Estephan, and R. E. Stark, Abstracts of Papers of the American Chemical Society 221, U343-U343 (2001). M. Stark, R. W. Stark, W. M. Heckl, and R. Guckenberger, Applied Physics Letters 77, 3293-3295 (2000). M. Stark and R. Guckenberaer, Review of Scientific Instruments 70, 3614-3619 (1999). R. Szoszkiewicz, A. J. Kulik, and G. Gremaud, Journal of Chemical Physics 122 (2005). O. Matsuda, T. Terada, K. Inagaki, and O. B. Wright, Japanese Journal of Applied Physics Part 1—Regular Papers Short Notes & Review Papers 41, 3545-3546 (2002). K. Inagaki, O. Matsuda, and O. B. Wright, Applied Physics Letters 80, 2386-2388 (2002). A. P. McGuigan, B. D. Huey, G. A. D. Briggs, O. V. Kolosov, Y. Tsukahara, and M. Yanaka, Applied Physics Letters 80, 1180-1182 (2002). M. T. Cuberes, G. A. D. Briggs, and O. Kolosov, Nanotechnoloav 12, 53-59 (2001). M. T. Cuberes, H. E. Assender, G. A. D. Briggs, and O. V. Kolosov, Journal of Physics D-Applied Physics 33, 2347-2355 (2000). U. Rabe, V. Scherer, S. Hirsekorn, and W. Arnold, Journal of Vacuum Science & Technology B 15, 1506-1511 (1997). K. Yamanaka, H. Ogiso, and O. Kolosov, Applied Physics Letters 64, 178-180 (1994). J. Tamayo, L. Gonzalez, Y. GonzaLez, and R. Garcia, Applied Physics Letters 68, 2297-9 (1996). R. Garcia, J. Tamayo, M. Calleia, and F. Garcia, Applied Physics A [Materials Science Processing] 66, S309-12 (1998). P. J. James, M. Antognozzi, J. Tamayo, T. J. McMaster, J. M. Newton, and M. J. Miles, Langmuir 17, 349-60 (2001). O. Sahin and A. Atalar, Applied Physics Letters 79, 4455-7 (2001). O. Sahin and A. Atalar, Applied Physics Letters 78, 2973-5 (2001). O. Sahin, G. Yaralioglu, R. Grow, S. F. Zappe, A. Atalar, C. Quate, and O. Solgaard, Sensors and Actuators a-Physical 114, 183-190 (2004). O. Sahin, C. F. Quate, O. Solgaard and A. Atalar, Physical Review B 69, 165416 (2004). U. Rabe, S. Hirsekorn, M. Reinstadtler, T. Sulzbach, Ch. Lehrer and W. Arnold, Nanotechnology 18, 1 (2007). R. Szoszkiewicz, A. J. Kulik, and G. Gremaud, Journal of Chemical Physics 122 (2005). L. Muthuswami, P. M. Aiayan, and R. E. Geer, in Microscopy of Semiconducting Materials 2003 (2003), p. 633-636. L. Muthuswami and R. E. Geer, Applied Physics Letters 84, 5082-5084 (2004). O. Matsuda, T. Terada, K. Inagaki, and O. B. Wright, Japanese Journal of Applied Physics Part 1-Regular Papers Short Notes & Review Papers 41, 3545-3546 (2002). K. Inagaki, O. Matsuda, and O. B. Wright, Applied Physics Letters 80, 2386-2388 (2002). A. P. McGuigan, B. D. Huey, G. A. D. Briggs, O. V. Kolosov, Y. Tsukahara, and M. Yanaka, Applied Physics Letters 80, 1180-1182 (2002). M. T. Cuberes, G. A. D. Briggs, and 0. Kolosov, Nanotechnology 12, 53-59 (2001). M. T. Cuberes, H. E. Assender, G. A. D. Briggs, and O. V. Kolosov, Journal of Physics D-Applied Physics 33, 2347-2355 (2000). U. Rabe, V. Scherer, S. Hirsekorn, and W. Arnold, Journal of Vacuum Science & Technology B 15, 1506-1511 (1997). K. Yamanaka, H. Ogiso, and O. Kolosov, Applied Physics Letters 64, 178-180 (1994). Kazushi Yamonaka et al, Japanese J. Apple Phys. vol. 34, Part t, No. 5B, pp 2879-2882, May 1995. D. D. Koleske et al; Rev. Ser, Int., vol. 66, No. 9, pp. 4566-4574, September 1995. T. Goddenhenrich et al., Rev. Sci. Instrum. 65 (9), September 1994, pp. 2870-2873. Sahin et al., Transducers '03, The 12th International Conference on Solid State Sensors, Actuators and Microsystems, Boston, Jun. 8-12, 2003, pp. 1124-1127. Sahin et al., Applied Physics Letters, vol. 79, No. 26, Dec. 24, 2001, pp. 4455-4457. Stark et al., Applied Physics Letters, vol. 74, No. 22, May 31, 1999, pp. 3296-3298. Hillenbrand et al., Applied Physics Letters, vol. 26, No. 23, Jun. 5, 2000, pp. 3478-3480. Rabe et al., Surface and Interface Analysis, 2002, vol. 33, pp. 65-70. Stark et al., PNAS, Jun. 25, 2002, vol. 99, No. 13, pp. 8473-8478. Stark et al., Review of Scientific Instruments,” December 2003, pp. 5111-5114, vol. 74, No. 12, pp. 5111-5114. D. Ziegler et al., Nanotechnology 18 225505 (2007). For the sake of convenience, the current description focuses on systems and techniques that may be realized in a particular embodiment of cantilever-based instruments, the atomic force microscope (AFM). Cantilever-based instruments include such instruments as AFMs, molecular force probe instruments (1D or 3D), high-resolution profilometers (including mechanical stylus profilometers), surface modification instruments, chemical or biological sensing probes, and micro-actuated devices. The systems and techniques described herein may be realized in such other cantilever-based instruments. An AFM is a device used to produce images of surface topography (and/or other sample characteristics) based on information obtained from scanning (e.g., rastering) a sharp probe on the end of a cantilever relative to the surface of the sample. Topographical and/or other features of the surface are detected by detecting changes in deflection and/or oscillation characteristics of the cantilever (e.g., by detecting small changes in deflection, phase, frequency, etc., and using feedback to return the system to a reference state). By scanning the probe relative to the sample, a “map” of the sample topography or other sample characteristics may be obtained. Changes in deflection or in oscillation of the cantilever are typically detected by an optical lever arrangement whereby a light beam is directed onto the cantilever in the same reference frame as the optical lever. The beam reflected from the cantilever illuminates a position sensitive detector (PSD). As the deflection or oscillation of the cantilever changes, the position of the reflected spot on the PSD changes, causing a change in the output from the PSD. Changes in the deflection or oscillation of the cantilever are typically made to trigger a change in the vertical position of the cantilever base relative to the sample (referred to herein as a change in the Z position, where Z is generally orthogonal to the XY plane defined by the sample), in order to maintain the deflection or oscillation at a constant pre-set value. It is this feedback that is typically used to generate an AFM image. AFMs can be operated in a number of different sample characterization modes, including contact mode where the tip of the cantilever is in constant contact with the sample surface, and AC modes where the tip makes no contact or only intermittent contact with the surface. Actuators are commonly used in AFMs, for example to raster the probe or to change the position of the cantilever base relative to the sample surface. The purpose of actuators is to provide relative movement between different parts of the AFM; for example, between the probe and the sample. For different purposes and different results, it may be useful to actuate the sample, the cantilever or the tip or some combination of both. Sensors are also commonly used in AFMs. They are used to detect movement, position, or other attributes of various components of the AFM, including movement created by actuators. For the purposes of the specification, unless otherwise specified, the term “actuator” refers to a broad array of devices that convert input signals into physical motion, including piezo activated flexures, piezo tubes, piezo stacks, blocks, bimorphs, unimorphs, linear motors, electrostrictive actuators, electrostatic motors, capacitive motors, voice coil actuators and magnetostrictive actuators, and the term “position sensor” or “sensor” refers to a device that converts a physical parameter such as displacement, velocity or acceleration into one or more signals such as an electrical signal, including capacitive sensors, inductive sensors (including eddy current sensors), differential transformers (such as described in co-pending applications US20020175677A1 and US20040075428A1, Linear Variable Differential Transformers for High Precision Position Measurements, and US20040056653A1, Linear Variable Differential Transformer with Digital Electronics, which are hereby incorporated by reference in their entirety), variable reluctance, optical interferometry, optical deflection detectors (including those referred to above as a PSD and those described in co-pending applications US20030209060A1 and US20040079142A1, Apparatus and Method for Isolating and Measuring Movement in Metrology Apparatus, which are hereby incorporated by reference in their entirety), strain gages, piezo sensors, magnetostrictive and electrostrictive sensors. In both the contact and AC sample-characterization modes, the interaction between the stylus and the sample surface induces a discernable effect on a probe-based operational parameter, such as the cantilever deflection, the cantilever oscillation amplitude, the phase of the cantilever oscillation relative to the drive signal driving the oscillation or the frequency of the cantilever oscillation, all of which are detectable by a sensor. In this regard, the resultant sensor-generated signal is used as a feedback control signal for the Z actuator to maintain a designated probe-based operational parameter constant. In contact mode, the designated parameter may be cantilever deflection. In AC modes, the designated parameter may be oscillation amplitude, phase or frequency. The feedback signal also provides a measurement of the sample characteristic of interest. For example, when the designated parameter in an AC mode is oscillation amplitude, the feedback signal may be used to maintain the amplitude of cantilever oscillation constant to measure changes in the height of the sample surface or other sample characteristics. The periodic interactions between the tip and sample in AC modes induces cantilever flexural motion at higher frequencies. Measuring the motion allows interactions between the tip and sample to be explored. A variety of tip and sample mechanical properties including conservative and dissipative interactions may be explored. Stark, et al., have pioneered analyzing the flexural response of a cantilever at higher frequencies as nonlinear interactions between the tip and the sample. In their experiments, they explored the amplitude and phase at numerous higher oscillation frequencies and related these signals to the mechanical properties of the sample. 0 0 0 Unlike the plucked guitar strings of elementary physics classes, cantilevers normally do not have higher oscillation frequencies that fall on harmonics of the fundamental frequency. The first three modes of a simple diving board cantilever, for example, are at the fundamental resonant frequency (f), 6.19fand 17.5 f. An introductory text in cantilever mechanics such as Sarid has many more details. Through careful engineering of cantilever mass distributions, Sahin, et al., have developed a class of cantilevers whose higher modes do fall on higher harmonics of the fundamental resonant frequency. By doing this, they have observed that cantilevers driven at the fundamental exhibit enhanced contrast, based on their simulations on mechanical properties of the sample surface. This approach is has the disadvantage of requiring costly and difficult to manufacture special cantilevers. The simple harmonic oscillator (SHO) model gives a convenient description at the limit of the steady state amplitude of the eigenmode A of a cantilever oscillating in an AC mode: <math overflow="scroll"><mrow><mrow><mrow><mi>SHOAmp</mi><mo></mo><mstyle><mspace width="0.3em" height="0.3ex" /></mstyle><mo></mo><mn>0</mn><mo></mo><mstyle><mspace width="0.8em" height="0.8ex" /></mstyle><mo></mo><mi>A</mi></mrow><mo>=</mo><mfrac><mrow><msub><mi>F</mi><mn>0</mn></msub><mo>/</mo><mi>m</mi></mrow><msqrt><mrow><msup><mrow><mo>(</mo><mrow><msubsup><mi>ω</mi><mn>0</mn><mn>2</mn></msubsup><mo>-</mo><msup><mi>ω</mi><mn>2</mn></msup></mrow><mo>)</mo></mrow><mn>2</mn></msup><mo>-</mo><msup><mrow><mo>(</mo><mrow><msub><mi>ωω</mi><mn>0</mn></msub><mo>-</mo><mi>Q</mi></mrow><mo>)</mo></mrow><mn>2</mn></msup></mrow></msqrt></mfrac></mrow><mo>,</mo></mrow></math> 0 0 where Fis the drive amplitude (typically at the base of the cantilever), m is the mass, ω is the drive frequency in units of rad/sec, ωis the resonant frequency and Q is the “quality” factor, a measure of the damping. If, as is often the case, the cantilever is driven through excitations at its base, the expression becomes <math overflow="scroll"><mrow><mrow><mrow><mi>SHOAmp</mi><mo></mo><mstyle><mspace width="0.3em" height="0.3ex" /></mstyle><mo></mo><mn>1</mn><mo></mo><mstyle><mspace width="0.8em" height="0.8ex" /></mstyle><mo></mo><mi>A</mi></mrow><mo>=</mo><mfrac><mrow><msub><mi>A</mi><mi>drive</mi></msub><mo></mo><msubsup><mi>ω</mi><mn>0</mn><mn>2</mn></msubsup></mrow><msqrt><mrow><msup><mrow><mo>(</mo><mrow><msubsup><mi>ω</mi><mn>0</mn><mn>2</mn></msubsup><mo>-</mo><msup><mi>ω</mi><mn>2</mn></msup></mrow><mo>)</mo></mrow><mn>2</mn></msup><mo>-</mo><msup><mrow><mo>(</mo><mrow><msub><mi>ω</mi><mn>0</mn></msub><mo></mo><mrow><mi>ω</mi><mo>/</mo><mi>Q</mi></mrow></mrow><mo>)</mo></mrow><mn>2</mn></msup></mrow></msqrt></mfrac></mrow><mo>,</mo></mrow></math> 0 drive 0 drive 2 where F/m has been replaced with Aω, where Ais the drive amplitude (at the oscillator). The phase angle φ is described by an associated equation <math overflow="scroll"><mrow><mrow><mi>SHOPhase</mi><mo></mo><mstyle><mspace width="0.8em" height="0.8ex" /></mstyle><mo></mo><mi>ϕ</mi></mrow><mo>=</mo><mrow><mrow><msup><mi>tan</mi><mrow><mo>-</mo><mn>1</mn></mrow></msup><mo></mo><mrow><mo>[</mo><mfrac><msub><mi>ωω</mi><mn>0</mn></msub><mrow><mi>Q</mi><mo></mo><mrow><mo>(</mo><mrow><msubsup><mi>ω</mi><mn>0</mn><mn>2</mn></msubsup><mo>-</mo><msup><mi>ω</mi><mn>2</mn></msup></mrow><mo>)</mo></mrow></mrow></mfrac><mo>]</mo></mrow></mrow><mo>.</mo></mrow></mrow></math> drive 0 When these equations are fulfilled, the amplitude and phase of the cantilever are completely determined by the user's choice of the drive frequency and three independent parameters: A, ωand Q. In some very early work, Martin, et al., drove the cantilever at two frequencies. The cantilever response at the lower, non-resonant frequency was used as a feedback signal to control the surface tracking and produced a topographic image of the surface. The response at the higher frequency was used to characterize what the authors interpreted as differences in the non-contact forces above the Si and photo-resist on a patterned sample. Recently, Rodriguez and Garcia published a theoretical simulation of a non-contact, attractive mode technique where the cantilever was driven at its two lowest eigenfrequencies. In their simulations, they observed that the phase of the second mode had a strong dependence on the Hamaker constant of the material being imaged, implying that this technique could be used to extract chemical information about the surfaces being imaged. Crittenden et al. have explored using higher harmonics for similar purposes. There are a number of modes where the instrument is operated in a hybrid mode where a contact mode feedback loop is maintained while some parameter is modulated. Examples include force modulation and piezo-response imaging. Force modulation involves maintaining a contact mode feedback loop while also driving the cantilever at a frequency and then measuring its response. When the cantilever makes contact with the surface of the sample while being so driven, its resonant behavior changes significantly. The resonant frequency typically increases, depending on the details of the contact mechanics. In any event, one may learn more about the surface properties because force modulation is sensitive to the elastic response of the sample surface. In particular, dissipative interactions may be measured by measuring the phase of the cantilever response with respect to the drive. A well-known shortcoming of force modulation and other contact mode techniques is that the while the contact forces may be controlled well, other factors affecting the measurement may render it ill-defined. In particular, the contact area of the tip with the sample, usually referred to as contact stiffness, may vary greatly depending on tip and sample properties. This in turn means that the change in resonance while maintaining a contact mode feedback loop, which may be called the contact resonance, is ill-defined. It varies depending on the contact stiffness. This problem has resulted in prior art techniques avoiding operation at or near resonance. Cantilevers are continuous flexural members with a continuum of vibrational modes. The present invention describes different apparatus and methods for exciting the cantilever simultaneously at two or more different frequencies and the useful information revealed in the images and measurements resulting from such methods. Often, these frequencies will be at or near two or more of the cantilever vibrational eigenmodes Past work with AC mode AFMs has been concerned with higher vibrational modes in the cantilever, with linear interactions between the tip and the sample. The present invention, however, is centered around non-linear interactions between the tip and sample that couple energy between two or more different cantilever vibrational modes, usually kept separate in the case of linear interactions. Observing the response of the cantilever at two or more different vibrational modes has some advantages in the case of even purely linear interactions however. For example, if the cantilever is interacting with a sample that has some frequency dependent property, this may show itself as a difference in the mechanical response of the cantilever at the different vibrational modes. FIG. 1 is a block diagram of a preferred embodiment of an apparatus for probing multiple eigenmodes of a cantilever in accordance with the present invention. 1010 1020 1030 1040 1020 1050 1060 1030 1010 1070 The sample is positioned below the cantilever probe . The chip of the cantilever probe is driven by a mechanical actuator , preferably a piezoelectric actuator, but other methods to induce cantilever motion known to those versed in the art could also be used. The motion of the cantilever probe relative to the frame of the microscope is measured with a detector , which could be an optical lever or another method known to those versed in the art. The cantilever chip is moved relative to the sample by a scanning apparatus , preferably a piezo/flexure combination, but other methods known to those versed in the art could also be used. 1030 1040 1080 1090 1100 1080 1090 1110 1120 1110 1120 The motion imparted to the cantilever chip by actuator is controlled by excitation electronics that include at least two frequency synthesizers and . There could be additional synthesizers if more than two cantilever eigenmodes are to be employed. The signals from these frequency synthesizers could be summed together by an analog circuit element or, preferably, a digital circuit element that performs the same function. The two frequency synthesizers and provide reference signals to lockin amplifiers and , respectively. In the case where more than two eigenmodes are to be employed, the number of lockin amplifiers will also be increased. As with other electronic components in this apparatus, the lockin amplifiers and can be made with analog circuitry or with digital circuitry or a hybrid of both. For a digital lockin amplifier, one interesting and attractive feature is that the lockin analysis can be performed on the same data stream for both eigenmodes. This implies that the same position sensitive detector and analog to digital converter can be used to extract information at the two distinct eigenmodes. The lockin amplifiers could also be replaced with rms measurement circuitry where the rms amplitude of the cantilever oscillation is used as a feedback signal. FIG. 1 1030 1130 1140 There are a number of variations in the apparatus that a person skilled in the art could use to extract information relative to the different eigenmodes employed in the present invention. Preferably, a direct digital synthesizer (DDS) could be used to create sine and cosine quadrature pairs of oscillating voltages, each at a frequency matched to the eigenmodes of the cantilever probe that are of interest. This implementation also allows dc voltages to be applied, allowing methods such as scanning Kelvin probing or simultaneous current measurements between the tip and the sample. The amplitude and phase of each eigenmode can be measured and used in a feedback loop calculated by the controller or simply reported to the user interface where it is displayed, stored and/or processed further in an off-line manner. Instead of, or in addition to, the amplitude and phase of the cantilever motion, the quadrature pairs, usually designated x and y, can be calculated and used in a manner similar to the amplitude and phase. FIG. 1 1040 0 i 0 1 In one method of using the apparatus, the cantilever is driven at or near two or more resonances by the single “shake” piezo . Operating in a manner similar to AC mode where the cantilever amplitude is maintained constant and used as a feedback signal, but employing the teachings of the present invention, there are now a number of choices for the feedback loop. Although the work here will focus on using the amplitude of the fundamental (A), we were able to successfully image using one of the higher mode amplitudes (A) as a feedback signal as well as a sum of all the amplitudes A+A+ . . . . One can also choose to exclude one or more modes from such a sum. So for example, where three modes are employed, the sum of the first and second could be used to operate the feedback loop and the third could be used as a carry along signal. Because higher eigenmodes have a significantly higher dynamic stiffness, the energy of these modes can be much larger that that of lower eigenmodes. The method may be used to operate the apparatus with one flexural mode experiencing a net attractive force and the other a net repulsive force, as well as operating with each mode experiencing the same net sign of force, attractive or repulsive. Using this method, with the cantilever experiencing attractive and repulsive interactions in different eigenmodes, may provide additional information about sample properties. 10 One preferred technique for using the aforesaid method is as follows. First, excite the probe tip at or near a resonant frequency of the cantilever keeping the tip sufficiently far from the sample surface that it oscillates at the free amplitude Aunaffected by the proximity of the cantilever to the sample surface and without making contact with the sample surface. At this stage, the cantilever is not touching the surface; it turns around before it interacts with significant repulsive forces. 1 1 10 Second, reduce the relative distance in the Z direction between the base of the cantilever and the sample surface so that the amplitude of the probe tip Ais affected by the proximity of the sample surface without the probe tip making contact with the sample surface. The phase pwill be greater than p, the free first eigenmode phase. This amplitude is maintained at an essentially constant value during scanning without the probe tip making contact with the sample surface by setting up a feedback loop that controls the distance between the base of the cantilever and the sample surface. 2 2 2 2 20 2 2 20 Third, keeping the first eigenmode drive and surface controlling feedback loop with the same values, excite a second eigenmode of the cantilever at an amplitude A. Increase Auntil the second eigenmode phase pshows that the cantilever eigenmode is interacting with predominantly repulsive forces; that is, that pis less than p, the free second eigenmode phase. This second amplitude Ais not included in the feedback loop and is allowed to freely roam over a large range of values. In fact, it is typically better if variations in Acan be as large as possible, ranging from 0 to A, the free second eigenmode amplitude. 1 1 2 2 Fourth, the feedback amplitude and phase, Aand p, respectively, as well as the carry along second eigenmode amplitude and phase, Aand p, respectively, should be measured and displayed. Alternatively, the drive amplitude and/or phase of the second frequency can be continually adjusted to maintain the second amplitude and/or phase at an essentially constant value. In this case, it is useful to display and record the drive amplitude and/or frequency required to maintain the second amplitude and/or phase at an essentially constant value. A second preferred technique for using the aforesaid method follows the first two steps of first preferred technique just described and then continues with the following two steps: 2 2 2 2 20 2 1 10 2 2 Third, keeping the first eigenmode drive and surface controlling feedback loop with the same values, excite a second eigenmode (or harmonic) of the cantilever at an amplitude A. Increase Auntil the second eigenmode phase pshows that the cantilever eigenmode is interacting with predominantly repulsive forces; that is, that pis less than p, the free second eigenmode phase. At this point, the second eigenmode amplitude Ashould be adjusted so that the first eigenmode phase pbecomes predominantly less than p, the free first eigenmode phase. In this case, the adjustment of the second eigenmode amplitude Ahas induced the first eigenmode of the cantilever to interact with the surface in a repulsive manner. As with the first preferred technique, the second eigenmode amplitude Ais not used in the tip-surface distance feedback loop and should be allowed range widely over many values. 1 1 2 2 Fourth, the feedback amplitude and phase, Aand p, respectively, as well as the carry along second eigenmode amplitude and phase, Aand p, respectively, should be measured and displayed. FIG. 1 Either of the preferred techniques just described could be performed in a second method of using the apparatus where the phase of the oscillating cantilever is used in a feedback loop and the oscillation frequency is varied to maintain phase essentially constant. In this case, it is preferable to use the oscillation frequency as an input into a z-feedback loop that controls the cantilever-sample separation. Relative changes in various parameters such as the amplitude and phase or in-phase and quadrature components of the cantilever at these different frequencies could also be used to extract information about the sample properties. A third preferred technique for using the aforesaid method provides an alternative for conventional operation in a repulsive mode, that is where the tip is experiencing a net repulsive force. The conventional approach for so operating would be to use a large amplitude in combination with a lower setpoint, and a cantilever with a very sharp tip. Using this third preferred technique, however, the operator begins, just as with the first two techniques, by choosing an amplitude and setpoint for the fundamental eigenmode that is small enough to guarantee that the cantilever is experiencing attractive forces, that is, that the cantilever is in non-contact mode. As noted before, this operational mode can be identified by observing the phase of the cantilever oscillation. In the non-contact case, the phase shift is positive, implying that the resonant frequency has been lowered. With these conditions on the first eigenmode, the second eigenmode excitation can be introduced and the amplitude, drive frequency and, if applicable, set point chosen with the following considerations in mind: 1. Both eigenmodes are in the attractive mode, that is to say that the phase shift of both modes is positive, implying both eigenmode frequencies have been shifted negatively by the tip-sample interactions. Generally, this requires a small amplitude for the second eigenmode. 2. The fundamental eigenmode remains attractive while the second eigenmode is in a state where the tip-sample interactions cause it to be in both the attractive and the repulsive modes as it is positioned relative to the surface. 3. The fundamental eigenmode is in an attractive mode and the second eiegenmode is in a repulsive mode. 4. In the absence of any second mode excitation, the first eigenmode is interacting with the surface in the attractive mode. After the second eigenmode is excited, the first eigenmode is in a repulsive mode. This change is induced by the addition of the second eigenmode energy. The second eigenmode is in a state where the tip-sample interactions cause it to be attractive and/or repulsive. 5. The first eigenmode is in a repulsive mode and the second mode is in a repulsive mode. FIG. 4 4000 4010 4000 4020 4030 4040 4050 4060 The transition from attractive to repulsive mode in the first eigenmode, as induced by the second eigenmode excitation, is illustrated in , where the amplitude and phase of the first and second eigenmodes are plotted as a function of the distance between the base of the cantilever and the surface of the sample. The point where the tip begins to interact significantly with the surface is indicated with a solid line . The fundamental amplitude of the cantilever decreases as the cantilever starts to interact with the surface, denoted by the solid line . The associated phase shows a positive shift, consistent with overall attractive interactions. For these curves, the second eigenmode amplitude is zero and therefore not plotted in the Figure (and neither is phase, for the same reason). Next, the second eigenmode is excited and the same curves are re-measured, together with the amplitude and phase of the second eigenmode, and . There is a notable change in the fundamental eigenmode amplitude and more strikingly, the fundamental eigenmode phase . The fundamental phase in fact shows a brief positive excursion, but then transitions to a negative phase shift, indicating an overall repulsive interaction between the tip and sample. The free amplitude of the first eigenmode is identical in both cases, the only difference in the measurement being the addition of energy exciting the higher oscillatory eigenmode. This excitation is sufficient to drive the fundamental eigenmode into repulsive interactions with the sample surface. Furthermore, the phase curve of the second eigenmode indicates that it is also interacting overall repulsively with the sample surface. 1 2 2 2 More complicated feedback schemes can also be envisioned. For example, one of the eigenmode signals can be used for topographical feedback while the other signals could be used in other feedback loops. An example would be that Ais used to control the tip-sample separation while a separate feedback loop was used to keep Aat an essentially constant value rather than allowing it to range freely over many values. A similar feedback loop could be used to keep the phase of the second frequency drive pat a predetermined value with or without the feedback loop on Abeing implemented. As another example of yet another type of feedback that could be used, Q-control can also be used in connection with any of the techniques for using the aforesaid method. Using Q-control on any or all of the eigenmodes employed can enhance their sensitivity to the tip-sample forces and therefore mechanical or other properties of the sample. It can also be used to change the response time of the eigenmodes employed which may be advantageous for more rapidly imaging a sample. For example, the value of Q for one eigenmode could be increased and the value for another decreased. This may enhance the result of mixed attractive/repulsive mode imaging because it is generally easier to keep one eignmode interacting with the sample in repulsive mode with a reduced Q-value or, conversely, in attractive mode with an enhanced Q-value. By reducing the O-value of the lowest eigenmode and enhancing the Q-value of the next eigenmode, it is possible to encourage the mixed mode operation of the cantilever; the zeroth eigenmode will be in repulsive mode while the first eigenmode will more likely remain in attractive mode. Q-control can be implemented using analog, digital or hybrid analog-digital electronics. It can be accomplished using an integrated control system such as that in the Asylum Research Corporation MFP-3D Controller or by after-market modules such as the nanoAnalytics Q-box. In addition to driving the cantilever at or near more than one eigenmode, it is possible to also excite the cantilever at or near one or more harmonics and/or one or more eigenmodes. It has been known for some time that nonlinear interactions between the tip and the sample can transfer energy into cantilever harmonics. In some cases this energy transfer can be large but it is usually quite small, on the order of a percent of less of the energy in the eigenmode. Because of this, the amplitude of motion at a harmonic, even in the presence of significant nonlinear coupling is usually quite small. Using the methods described here, it is possible to enhance the contrast of these harmonics by directly driving the cantilever at the frequency of the harmonic. To further enhance the contrast of this imaging technique it is useful to adjust the phase of the higher frequency drive relative to that of the lower. This method improves the contrast of both conventional cantilevers and the specially engineered “harmonic” cantilevers described by Sahin et al and other researchers. On many samples, the results of imaging with the present invention are similar to, and in some cases superior to, the results of conventional phase imaging. However, while phase imaging often requires a judicious choice of setpoint and drive amplitude to maximize the phase contrast, the method of the present invention exhibits high contrast over a much wider range of imaging parameters. Moreover, the method also works in fluid and vacuum, as well as air and the higher flexural modes show unexpected and intriguing contrast in those environments, even on samples such as DNA and cells that have been imaged numerous times before using more conventional techniques. Although there is a wide range of operating parameters that yield interesting and useful data, there are situations where more careful tuning of the operational parameters will yield enhanced results. Some of these are discussed below. Of particular interest can be regions in set point and drive amplitude space where there is a transition from attractive to repulsive (or vice versa) interactions in one or more of the cantilever eigenmodes or harmonics. FIG. 5 FIG. 1 FIG. 5 5010 5020 5030 5040 5030 5041 5042 5050 5053 5041 5042 5051 5052 The superior results of imaging with the present invention may be seen from an inspection of the images. An example is shown in . For this example, the apparatus was operated using the fundamental eignemode amplitude as the error signal and the second eigenmode as a carry-along signal. The topography image in shows collagen fibers on a glass surface, an image typical of results with conventional AC mode from similar samples. The fundamental eigenmode amplitude image is relatively similar, consistent with the fundamental eignemode amplitude being used in the feedback loop. The fundamental eigenmode phase channel image shows some contrast corresponding to edges in the topography image. This is consistent with the interaction being more attractive at these regions, again to be expected from surface energy considerations (larger areas in proximity will have larger long-range attractive forces). Since the fundamental eignemode amplitude is being held relatively constant and there is a relationship between the amplitude and phase, the phase will be constrained, subject to energy balance and the feedback loop that is operating to keep the amplitude constant. The second eigenmode amplitude image shows contrast that is similar to the fundamental eigenmode phase image . However, there are some differences, especially over regions thought to be contaminants and . Finally, the second eigenmode phase image shows the most surprisingly large amount of contrast. The background substrate shows a bright, positive phase contrast. The putative contaminant patches, , and show strikingly dark, negative phase shift contrast. Finally, regions where the collagen fibers are suspended show dark, negative phase contrast. In these last regions, the suspended collagen fibers are presumably absorbing some of the vibrational energy of the second eigenmode amplitude and thus, changing the response. When an AFM is operated in conventional amplitude modulated (AM) AC mode with phase detection, the cantilever amplitude is maintained constant and used as a feedback signal. Accordingly, the values of the signal used in the loop are constrained not only by energy balance but also by the feedback loop itself. Furthermore, if the amplitude of the cantilever is constrained, the phase will also be constrained, subject to conditions discussed below. In conventional AC mode it is not unusual for the amplitude to vary by a very small amount, depending on the gains of the loop. This means that, even if there are mechanical properties of the sample that might lead to increased dissipation or a frequency shift of the cantilever, the z-feedback loop in part corrects for these changes and thus in this sense, avoids presenting them to the user. If the technique for using the present invention involves a mode that is excited but not used in the feedback loop, there will be no explicit constraints on the behavior of this mode. Instead it will range freely over many values of the amplitude and phase, constrained only by energy balance. That is to say, the energy that is used to excite the cantilever motion must be balanced by the energy lost to the tip-sample interactions and the intrinsic dissipation of the cantilever. This may explain the enhanced contrast we observe in images generated with the techniques of the present invention. FIG. 6 FIG. 5 6010 6020 6030 demonstrates this idea more explicitly. The first image is an image of the number of pixels at different amplitudes (horizontal axis) and phases (vertical axis) in the fundamental eigenmode data for the collagen sample of . As expected, the amplitude values are constrained to a narrow range around −0.6 Amax by the z-feedback loop. Constraining the amplitude values in turn, limits the values that the phase can take to the narrow range around 25°. Thus, when the pixel counts are plotted, there is a bright spot with only small variations. Small variations in turn imply limited contrast. The second image plots the number of pixels at different amplitudes and phases in the second eigenmode data for the collagen sample. Since the amplitude of this eigenmode was not constrained by a feedback loop, it varies from -Amax to close to zero. Similarly, the phase ranges over many values. This freedom allows greatly increased contrast in the second eigenmode images. The present invention may also be used in apparatus that induce motion in the cantilever other than through a piezoelectric actuator. These could include direct electric driving of the cantilever (“active cantilevers”), magnetic actuation schemes, ultrasonic excitations, scanning Kelvin probe and electrostatic actuation schemes. Direct electric driving of the cantilever (“active cantilevers”) using the present invention has several advantages over conventional piezo force microscopy (PFM) where the cantilever is generally scanned over the sample in contact mode and the cantilever voltage is modulated in a manner to excite motion in the sample which in turn causes the cantilever to oscillate. FIG. 2 FIG. 1 FIG. 2 FIG. 1 FIG. 2 FIG. 1 FIG. 2 1080 1020 1040 1030 1020 1080 2010 1040 1090 1090 1020 1010 1020 1080 1020 1010 1080 1090 2030 is a block diagram of a preferred embodiment of an apparatus for using the present invention with an active cantilever. This apparatus has similarities to that shown in , as well as differences. In the apparatus, like the apparatus, one of the frequency sources is used to excite motion of the cantilever probe through a mechanical actuator , preferably a piezoelectric actuator, but other methods to induce cantilever motion known to those versed in the art could also be used, which drives the chip of the cantilever probe , However, in the apparatus, the frequency source communicates directly with the actuator instead of being summed together with the second frequency source , as in the apparatus. The second frequency source in the apparatus is used to vary the potential of the cantilever probe which in turn causes the sample to excite motion in the cantilever probe at a different eigenmode than that excited by the first frequency source . The resulting motion of the cantilever probe interacting with the sample will contain information on the sample topography and other properties at the eigenmode excited by the first frequency source and information regarding the voltage dependent properties of the sample at the eigenmode excited by the second frequency source . The sample holder can optionally be held at a potential, or at ground, to enhance the effect. FIG. 2 1080 1090 In one method of using the apparatus, the amplitude of the cantilever at the frequency of the first source is used as the error signal. The amplitude and phase (or in-phase and quadrature components) at the frequency of the second source or a harmonic thereof will contain information about the motion of the sample and therefore the voltage dependent properties of the sample. One example of these properties is the piezo-response of the sample. Another is the electrical conductivity, charge or other properties that can result in long range electrostatic forces between the tip and the sample. FIG. 3 FIG. 3 FIG. 2 FIG. 2 FIG. 3 1080 1090 1020 1090 3010 3020 3020 3010 3020 is a block diagram of a preferred embodiment of an apparatus for using the present invention with the second frequency source modulating a magnetic field that changes a property of the surface. In the apparatus, the situation with the first frequency source is identical to the situation in the apparatus. However, instead of the second frequency source being used to vary the potential of the cantilever probe , as with the apparatus, in the apparatus the second frequency source modulates the current through an excitation coil which in turn modulates the magnetic state of a magnetic circuit element . Magnetic circuit element could be used to modulate the field near an active sample or the excitation coil . Alternatively, magnetic circuit element could comprise the sample, as in the case of a magnetic recording head. FIG. 3 1080 1090 The apparatus can be used with any other sort of ‘active’ sample where the interaction between the cantilever and the sample can be modulated at or near one or more of the cantilever flexural resonances by one of the frequency sources or . This could also be extended to high frequency measurements such as described in Proksch et al., Appl. Phys. Lett., vol. (1999). Instead of the modulation described in that paper, the envelope of the high frequency carrier could be driven with a harmonic of one or more flexural resonances. This method of measuring signals other than topographic has the advantage of requiring only one pass to complete as opposed to “LiftMode” or Nap mode that require temporally separated measurements of the topographic and other signals. Another example of a preferred embodiment of an apparatus and method for using the present invention is from the field of ultrasonic force microscopy. In this embodiment, one or more eigenmodes are used for the z-feedback loop and one or more additional eigenmodes can be used to measure the high frequency properties of the sample. The high frequency carrier is amplitude modulated and either used to drive the sample directly or to drive it using the cantilever as a waveguide. The cantilever deflection provides a rectified measure of the sample response at the carrier frequency. Another group of embodiments for the present invention has similarities to the conventional force modulation technique described in the Background to the Invention and conventional PFM where the cantilever is scanned over the sample in contact mode and a varying voltage is applied to the cantilever. In general this group may be described as contact resonance embodiments. However, these embodiments, like the other embodiments already described, make use of multiple excitation signals. FIG. 8 FIG. 8 1020 1010 1010 1070 1030 1020 1020 1080 1090 1020 1100 1080 1090 1110 1120 1020 1050 1060 1030 1010 1070 1020 1130 1140 is a block diagram of the first of these embodiments, which may be referred to as Dual Frequency Resonance Tracking Piezo Force Microscopy (DFRT PFM). In the DFRT PFM apparatus of the cantilever probe is positioned above a sample with piezoelectric properties and scanned relative to the sample by a scanning apparatus using contact mode. Unlike conventional contact mode however the chip of the cantilever probe , or the cantilever probe itself (alternative not shown), is driven by excitation electronics that include at least two frequency synthesizers and . The cantilever probe responds to this excitation by buckling up and down much as a plucked guitar string. The signals from these frequency synthesizers could be summed together by an analog circuit element or, preferably, a digital circuit element that performs the same function. The two frequency synthesizers and provide reference signals to lockin amplifiers and , respectively. The motion of the cantilever probe relative to the frame of the microscope is measured with a detector , which could be an optical lever or another method known to those versed in the art. The cantilever chip is moved relative to the sample in order to maintain constant force by a scanning apparatus , preferably a piezo/flexure combination, but other methods known to those versed in the art could also be used. The amplitude and phase of each frequency at which the cantilever probe is excited can be measured and used in a feedback loop calculated by the controller or simply reported to the user interface where it is displayed, stored and/or processed further in an off-line manner. Instead of, or in addition to, the amplitude and phase of the cantilever motion, the quadrature pairs, usually designated x and y, can be calculated and used in a manner similar to the amplitude and phase. FIG. 8 1020 1020 In one method of using the apparatus, the topography of the sample would be measured in contact mode while the amplitude and phase of the cantilever probe response to the applied potential at the lowest contact resonance and at the next highest contact resonance is simultaneously measured. The responses can be analyzed to determine whether they originate from the actual piezoelectric response of the sample or from crosstalk between the topography and any electric forces between the tip of the cantilever probe and the sample. Even more information can be obtained if more frequencies are utilized. FIG. 12 12015 12010 12085 12080 12015 12010 12095 12090 12105 12095 12100 12105 0 0 0 0 also shows three examples of the changes in the native phase and amplitude of a cantilever with a resonant frequency fcaused by interactions between the tip and the sample using DFRT PFM methods. These examples are a subset of changes that can be observed. In the first example, the resonant frequency is significantly lowered to f′ but not damped. The phase and amplitude change but little relative to the native phase and amplitude . In the second example the resonant frequency is again lowered to f′, this time with damping of the amplitude. Here the phase is widened and the amplitude is appreciably flattened. Finally, in the third example, the resonant frequency is again dropped to f′, this time with a reduction in the response amplitude. This yields a phase curve with an offset but with the same width as the second case and a reduced amplitude curve with the damping equivalent to that of the second example. If there is an offset in the phase versus frequency curve as there is in this third example, prior art phase locked-loop electronics will not maintain stable operation. For example, if the phase set-point was made to be 90 degrees, it would never be possible to find a frequency in curve where this condition was met. One example of these things occurring in a practical situation is in DRFT PFM when the tip crosses from an electric domain with one orientation to a second domain with another orientation. The response induced by the second domain will typically have a phase offset with respect to the first. This is, in fact where the large contrast in DFRT PFM phase signals originates. FIG. 9 shows the cantilever response when the applied potential is swept from dc to 2 MHz using the DFRT PFM apparatus. Three resonance peaks are visible. Depending on the cantilever probe and the details of the tip-sample contact mechanics, the number, magnitude, breadth and frequency of the peaks is subject to change. Sweeps such as these are useful in choosing the operating points for imaging and other measurements. In a practical experiment, any or all of these resonance peaks or the frequencies in between could be exploited by the methods suggested above. FIG. 19 19010 shows a measurement that can be made using DFRT PFM techniques. A phase image shows ferroelectric domains written onto a sol-gel PZT surface. Because of the excellent separation between topography and PFM response possible with DFRT PFM, the phase image shows only piezo response, there is no topographic roughness coupling into the phase. The written domains appear as bright regions. The writing was accomplished by locally performing and measuring hysteresis loops by applying a DC bias to the tip during normal DFRT PFM operation. This allows the local switching fields to be measured. 19030 19020 19040 19010 The piezo phase during a measurement made at location and the amplitude are plotted as a function of the applied DC bias voltage. The loops were made following Stephen Jesse et al, Rev. Sci. Inst. 77, 073702 (2006). Other loops were taken at the bright locations in image , but are not shown in the Figure. 19010 19050 19060 19070 19080 DFRT PFM is very stable over time in contrast to single frequency techniques. This allows time dependent processes to be studied as is demonstrated by the sequence of images, , , , and taken over the span of 1.5 hours. In these images, the written domains are clearly shrinking over time. FIG. 8 1010 1020 1010 1080 1090 In addition to DFRT PFM, another contact resonance embodiment for the present invention is a form of thermal modulated microscopy which may be referred to as Dual Frequency Resonance Tracking Ztherm Microscopy (DFRT ZT). is a block diagram of a DFRT ZT apparatus (as well as a block diagram of DFRT PFM), with the modifications that (i) the sample does not necessarily have piezoelectric properties, (ii) the cantilever probe is of a specialized type and (iii) and the sample holder on which the sample sits is optionally held at ground or driven by excitation electronics that include at least the two frequency synthesizers and . The DFRT ZT apparatus and DFRT ZT methods will be discussed more fully following a discussion of conventional local thermal analysis (LTA) and improvements in which are necessary to make LTA more sensitive and may also be useful to make DFRT ZT measurements more sensitive. FIG. 13 FIG. 13 m LTA may be used to characterize materials, such as polymers, multilayer films and coatings, at micro and smaller scales. It is done with a conventional AFM equipped with a heating device that causes the temperature of the tip of a specialized cantilever probe to increase rapidly. As the temperature of the tip increases, the small region of the sample under the tip usually expands, causing the cantilever to deflect upwards. The amount of deflection is a function of the tip temperature and measures localized thermal expansion. When the region of the sample under the tip warms enough to soften, this process can begin to reverse as the tip penetrates the still expanding sample. depicts the change in deflection as the tip temperature is ramped. The crossover between the expansion and melting portions of the curve (labeled Tin ) is usually referred to as the transition temperature. FIG. 13 In addition to measuring deflection at fixed locations for LTA, the AFM used to measure deflection may also be used to image the sample to identify locations of interest and to image and measure features of the region under the tip after the LTA measurement is completed. The inset image in shows the topography of the indent created by the measurement. The specialized cantilever probe used in LTA is similar to conventional silicon cantilever probes used in AFMs, except that it is shaped into two separated legs that meet at the tip. One such probe available on the market is the THERMALEVER™ PROBE of ANASYS Instruments Corp. A number of improvements are necessary to make LTA more sensitive. Some of these improvements may also be useful to make DFRT ZT measurements more sensitive. FIG. 14( a 14001 14002 14001 d ref temp tip d tip tip ref tip Tip-Sample Bias Voltage Control. The most straightforward way of heating the cantilever tip of the specialized cantilever probe used in LTA is, as depicted in ), to drive one leg of the probe with an applied voltage while the other is held at ground. Specifically, a potential Vis applied to one leg of the cantilever through a reference resistor Rand the other leg is grounded. The voltage Kmeasured between the reference resistor and the driven leg of the cantilever probe can be used as a measure of the probe temperature. In this case, the potential at the tip is roughly V≈VR/2(R+R), where Ris the resistance of the specialized cantilever probe in question and assuming the resistance of the heated cantilever probe is symmetric with respect to the tip location. With this setup the tip potential is coupled to the heater current; the hotter the tip the higher the tip potential. FIG. 11( b 14001 14002 14010 14011 14001 14002 d potential temp ref tip potential To mitigate this unwanted effect, a differential drive scheme, shown in ), may be used. With this scheme each leg of the cantilever probe and is driven with a separate amplifier, and , respectively, allowing both the current through and the potential at the tip of the cantilever probe to be controlled separately by voltages Vand Vrespectively. The voltage Kmeasured between each of the two reference resistors Rand each leg of the cantilever probe and can be used as a measure of the cantilever probe temperature. Again with the assumption that the resistance of the heated cantilever probe is symmetric around the tip location, the potential of the tip is V≈Veven if a rather large heater current is flowing through the cantilever probe. FIG. 14( FIG. 14( a b As already noted, with the setup depicted in ) the increase in the temperature of the tip during LTA is coupled with an increase in the tip potential which in turn creates a bias between the tip and the sample. Depending on the electrical properties of the sample, an electrical bias between the tip and the sample can have a substantial effect on the deflection of the cantilever tip measured by the AFM detector. For example, many polymers are also dielectrics and in the presence of an applied electrical field will induce a charge on their surface. This interaction results in an attractive force between the cantilever tip and the sample that will change the loading and therefore the contact mechanics. The setup depicted in ) is intended to mitigate this crosstalk. Calibration and Correction of Parasitic Bending. The specialized cantilever probes made for LTA are subject to unwanted bending and twisting effects as they are energized. Bending and twisting will appear to the AFM detector as a deflection of the cantilever and, unless measured and corrected for, will appear as a signal indistinguishable from deflection caused by tip-sample interactions. Even more deleterious, since the cantilever is bending, it will change the loading force on the sample. This parasitic effect typically varies from cantilever probe to cantilever probe and can change over time. If the sign of the bending is positive, the cantilever deflects away from the sample surface as its temperature rises, tending to reduce the loading force, while if the sign is negative, the cantilever is pressed into the surface. FIG. 20 The inventors have devised techniques to calibrate and then correct the parasitic bending of the cantilever probe so that the load on the sample surface remains constant during heating cycles. The basic idea is to first calibrate the bending by ramping the temperature of the cantilever tip (that is ramping the voltage or current across the tip) while measuring deflection. This should be done over the temperature range of interest (and ideally a bit beyond) at a reference point above the sample. An example is shown by the circles in where the parasitic bending is positive (the cantilever deflects away from the sample as the tip is heated). This would have the effect of lowering the contact force as the temperature increases. FIG. 20 There are many ways to use this information to correct measurements. The current approach of the inventors is to fit the deflection data to a polynomial and then subtract the polynomial from the deflection data. The solid line bisecting the circles in the line so fitted; the straight dashed line is the “conditioned deflection. More particularly, the “conditioned” deflection displayed and used in LTA measurements may be given by d =d c +c V+c V +c V +L c raw 0 1 2 3 2 3 −η() c raw i where dis the “conditioned” deflection voltage, dis the unprocessed deflection voltage measured by the photodetector electronics of the AFM, V are cantilever leg drive voltages and care the polynomial coefficients acquired from the reference curve fit. The pre-factor η is typically unity unless it is desirable to otherwise specify. Some examples of the utility of non-unity values of the pre-factor η are discussed below. FIG. 21 The position of a heated cantilever tip relative to surface of the sample changes the heat transfer characteristics of the cantilever. Accordingly the compensation relationships of the above equation change with changes in proximity of the sample. shows the effect on the measured parasitic bending of changing the relative position of the cantilever and sample from a separation of 1 mm (top curve) to a separation of 200 nm (bottom curve). It is evident that the compensation calibration should be made as close to the measurement position as possible. It is also apparent that errors associated with incorrect compensation become more critical as the temperature increases. Feedback on Cantilever Deflection. It has been suggested elsewhere that LTA measurements are more sensitive when a feedback loop is used to keep cantilever deflection constant and the measurement is based on movement of the z-position of the base of the cantilever probe required for this purpose rather than using cantilever deflection for the measurement. This suggestion is based on the claim that feedback obviates some of the effects of unwanted bending and twisting that give rise to the need for compensation. When feedback is used there are two useful signals: one from the piezo used to move the z-position of the base of the cantilever probe and the other from any sensor which verifies the movement. The latter signal is more reliable as piezo motion is susceptible to hysteresis and creep. Using a signal from a feedback loop used to keep cantilever deflection constant instead of signal from cantilever deflection itself has the advantage that the load on the sample is constant. This in turn allows smaller volumes of material to be probed. FIG. 13 FIG. 22 FIG. 22( FIG. 22( FIG. 22 FIGS. 22( FIGS. 22( FIG. 22( FIG. 22( 10 8 4 n a b c d a b c d 22 22 Threshold Triggering of Cantilever Probe Pull-off. Repeatability of thermal curves of the type shown in can be improved with automatic, high speed triggering of the pull-off after temperature has dropped a defined amount from the transition temperature. This is true whether a feedback loop is used to keep cantilever deflection constant and the measurement is based on movement of in the z-position of the base of the cantilever probe required for this purpose (closed loop) or whether cantilever deflection is used for the measurement (open loop). Threshold triggering is implemented with software that continuously monitors the signal in use (feedback or deflection) and stores the maximum value. When the measured signal drops a defined amount below the recorded maximum value, the z-piezo is instructed to pull the cantilever probe away from the surface of the sample while it is still at a high temperature. An example is shown in depicting thermal curves made on a Polyethylene terephthalate (abbreviated as PET or PETE (CHO)) sample using both open loop and closed loop methods, each with a 50 nm trigger pull-off. ) shows four thermal curves made at different positions on a PET surface using open loop detection while ) shows four other thermal curves using closed loop detection. There us a significant difference between the position of the maxima for the curves in the two parts of . This is consistent with a higher loading force causing an earlier melting onset in the case of the curves made with open loop detection. ) and () are images taken after the thermal curve measurements depicted in ) and (), respectively, with the resulting pits visible. It will be noted that there are systematic pile-ups next to the open loop pits of ), and no pile-ups next to the closed loop pits of ). This may originate from lateral motion of the tip as the load, and therefore the distance between the base of the cantilever probe and the sample surface, changes. The pit depths for the two methods however are virtually identical, a phenomenon that may be traceable to the relatively large trigger pull-off value. FIG. 22 The measurements depicted in raise the question of what is the fundamental minimum limit on the volume of probed material in thermal measurements. At least two conditions seem evident to establish this limit empirically. First it is necessary to use smaller forces to minimize the contact area of the tip. Second it is necessary to avoid having the cantilever tip rapidly plunge into the melted material after the transition temperature is reached. One can satisfy the latter condition by establishing a low pull-off trigger value. FIG. 23 FIGS. 23( FIGS. 23( a b c b c 23 23 23 shows the results of a test to establish fundamental minimum limit on the volume of probed material in thermal measurements. ), () and () are cross sections of open loop (solid lines) and closed loop (dashed lines) pits created with pull off trigger values of 25 nm, 10 nm and 5 nm. Due to the increased load, the depth and width of the open-loop pits are systematically larger than the closed-loop pits. The arrow between ) and () shows the locations of attempted 1 nm pull off trigger value which resulted in an early pull-off for both the open loop and closed loop detection methods. This is close to the thermal noise limit of the deflection detector in the AFM and likely represents a fundamental limit on the pull off trigger value. Assuming this is the case, the limit for this particular specialized cantilever probe using the open loop method is a pit roughly 100 nm in diameter and 100 nm deep, while for the closed loop technique, the limit is roughly 75 nm in diameter and 50 nm deep. Approximating the pits as cylinders of those dimensions yields an open loop volume of −800 zeptoliters and a closed loop volume of 200 zeptoliters. With the above four improvements necessary to make LTA more sensitive in mind, a meaningful comparison of LTA with DFRT ZT is now possible. In general DFRT ZT provides much higher sensitivity to thermo-mechanical changes at the cantilever tip-sample junction than does cantilever deflection detection, whether open loop or closed loop, used with LTA. FIG. 24 FIG. 8 FIG. 24 FIG. 24 1010 2420 2030 1080 1090 1100 1030 2420 2030 1100 2420 2420 is a block diagram showing the DFRT ZT apparatus. As already noted this block diagram is fundamentally the same as the block diagram of DFRT PFM, , with the modifications that (i) the sample does not necessarily have piezoelectric properties, (ii) the cantilever probe is a specialized cantilever probe available on the market from ANASYS Instruments Corp. (the same cantilever probe used in LTA and (iii) the sample holder is optionally held at ground as shown in or modulated by excitation electronics that include at least the two frequency synthesizers and which are summed together by an analog circuit element (or preferably, a digital circuit element that performs the same function) that instead of driving the chip of the cantilever probe , as shown in , instead drives the sample holder (alternative not shown). In yet other alternatives the analog circuit element (or digital circuit element that performs the same function) could be made to drive the potential across the legs of the cantilever probe or the current (temperature) through the legs of the cantilever probe (alternatives not shown). 1080 1090 2420 1080 1090 1110 1120 2420 1050 1060 1060 1110 1120 1030 1010 1070 2420 1130 1140 Preferably the two sinusoidal voltages produced by the frequency synthesizers and include one below the resonant frequency of the cantilever probe and the other above the resonant frequency. The two frequency synthesizers and also provide reference signals to lockin amplifiers and , respectively. The motion of the cantilever probe relative to the frame of the microscope is measured with a detector , which could be an optical lever or another method known to those versed in the art, and a signal from the detector is also provided to the lockin amplifiers and . The cantilever chip is moved relative to the sample in order to maintain constant force by a scanning apparatus , preferably a piezo/flexure combination, but other methods known to those versed in the art could also be used. The amplitude and phase of each frequency at which the cantilever probe is excited can be measured and used in a feedback loop calculated by the controller or simply reported to the user interlace where it is displayed, stored and/or processed further in an off-line manner. Instead of, or in addition to, the amplitude and phase of the cantilever motion, the quadrature pairs, usually designated x and y, can be calculated and used in a manner similar to the amplitude and phase. FIG. 24 2420 1010 1070 As indicated above the AFM used to measure deflection at fixed locations for LTA measurements, may also be used to image the sample to identify locations of interest and to image and measure features of the region under the tip after the LTA measurement is completed. The DFRT ZT apparatus shown in may be used in the same ways and may as well be used to make contact resonance measurements. Most of these measurements will made at fixed locations as with LTA. However it is also possible to make contact resonance measurements while scanning the cantilever probe relative to the sample using the scanning apparatus . 2030 2420 1030 The sample holder is modulated, and not the cantilever probe or cantilever chip 2030 The temperature of the cantilever tip is ramped at a frequency significantly below the frequency of modulation of the sample holder 1010 Using a differential drive scheme the potential at the cantilever tip is set at −0 volts to limit electrostatic forces between the tip and the sample Parasitic bending has been corrected with an appropriate correction For the purposes of this disclosure however the inventors have limited themselves to demonstrating that contact resonance techniques yields results that are superior to those yielded by LTA and with less damage to the sample. For the purposes of this demonstration, the inventors have limited themselves to the following conditions: FIG. 25 shows at the left five measurements of a PET sample: (a) cantilever tip temperature, (b) z-sensor (closed loop measurement of deflection) change, (c) cantilever deflection (open loop measurement of deflection) change, (d) contact resonant frequency and (e) cantilever amplitude, and at the right zooms into a larger picture of a smaller part of the measurements on the left (a′, b′, c′, d′ and e′). The first, fourth and fifth of these measurements were taken both in closed loop and open loop; the second measurement could only be closed loop and the third only open loop. FIGS. 25( FIG. 25( FIGS. 25( FIGS. 25( FIG. 25( FIG. 25( a a a b b c c b c 25 25 25 ) and (′) show the cantilever tip temperature during a time-sequence of four heating-cooling cycles of the sample for two situations: one open loop (feedback disabled) and one closed loop (feedback enabled). ′) shows clearly that the temperature of the tip with open loop detection is somewhat lower than the temperature with closed loop detection. This is consistent with the expectation that the separation of the tip and the sample area under the tip is greater (and therefore heat transfer from tip to sample is less) with open loop detection. ) and (′) show the z-sensor (closed loop measurement of deflection) change during the four heating-cooling cycles. ) and (′) show cantilever deflection (open loop measurement of deflection) change. It is evident that the ) curve (closed loop measurement) is quite similar to the ) curve (open loop measurement). FIGS. 25( FIGS. 25( d e e 25 25 ) and (d′) show the contact resonant frequency during the four heating-cooling cycles for two situations: one open loop (feedback disabled) and the other closed loop (feedback enabled). Both figures show clearly that contact resonance frequency is higher with open loop detection than the contact resonance frequency with closed loop detection, and that the total frequency shift over a heating-cooling cycle is always less with open loop detection than with closed loop detection. On the cooling portion of the cycle, the contact resonance frequency actually increases, implying that the polymer crystallizes around the cantilever tip, encasing it in a relatively stiff, high-area contact. Finally, the cantilever amplitudes are plotted in ) and (′). Since the resonant frequency is tracked, the amplitude is a direct measure of the quality factor (inversely proportional to the dissipation) of the cantilever. Both figures show clearly that the Q factor/amplitude is lower with open loop detection than with closed loop detection, and that dissipation is higher with open loop detection than with closed loop detection. This is consistent with the expectation that a larger volume of sample material is affected with open loop detection than with closed loop. FIGS. 25( FIGS. 25( FIG. 13 FIG. 25 FIG. 13 b b c c 25 25 It may not be completely evident, but the z-sensor (closed loop measurement of deflection) curves shown in ) and (′) and the cantilever deflection (open loop measurement of deflection) curves shown in ) and (′) represent measurements that stop short of any crossover as shown in . That is the four heating-cooling cycles depicted in do not come to a transition temperature peak as depicted in . Thus, modification of the sample has been held to a minimum relative to LTA. Furthermore use closed loop detection with contact resonance measurements results in lower forces and sample penetration than use of open loop detection with contact resonance. This is more than an aesthetic consideration. First, with the differences in forces and sample penetration, there would have to be compelling reasons to use open loop detection and there are none. Second, as noted above, both detection methods have the disadvantage that when the tip cools after a temperature ramp, polymer samples will re-crystallize around the tip, freezing it in place. If care is not taken, the cantilever itself can be damaged or destroyed if it is withdrawn from the sample without reheating. However with contact resonance techniques mechanical changes in the tip-sample contact can be observed at much lower temperatures, making this problem easier to deal with. FIG. 26 FIG. 26 FIG. 25 FIG. 26 FIG. 13 These conclusions relative to the superiority of contact resonance techniques are reinforced by the images shown in . The two curves at the top of are cross-section images of a series of pits made with cantilever deflection, the top curve with feedback enabled and the curve below it with feedback disabled. Below the two curves is an image of the surface of the sample taken after the pits were made. The four indentations at the top of the image are indentations corresponding to the series of pits made with cantilever deflection, feedback enabled, and the four indentations below are indentations corresponding to the series of pits made with cantilever deflection, feedback disabled. These pits were in the small size limit where the difference between the open loop and feedback techniques is in the increased load from cantilever deflection as the surface locally expands. Like the curves shown on the pits of represent measurements that stop short of any crossover as shown in FIG. 26 One important conclusion that can be drawn from is that if pits are being formed well before any turnover in both the open loop and closed loop cases, there is significant plastic material flow well before the conventional LTA melting temperature defined for a material. This in turn raises significant questions about absolute temperature calibrations based on this crossover point. While there is clearly repeatability in the crossover measurements, the existence of these pits means that the onset of the local melting is occurring much earlier than is apparent from conventional LTA measurements. In AC mode atomic force microscopy, relatively tiny tip-sample interactions can cause the motion of a cantilever probe oscillating at resonance to change, and with it the resonant frequency, phase and amplitude and deflection of the probe. Those changes of course are the basis of the inferences that make AC mode so useful. With contact resonance techniques, whether DFRT PFM or DFRT ZT, the contact between the tip and the sample also can cause the resonant frequency, phase and amplitude of the cantilever probe to change dramatically. The resonant frequency of the cantilever probe using contact resonance techniques depends on the properties of the contact, particularly the contact stiffness. Contact stiffness in turn is a function of the local mechanical properties of the tip and sample and the contact area. In general, all other mechanical properties being equal, increasing the contact stiffness by increasing the contact area, will increase the resonant frequency of the oscillating cantilever probe. This interdependence of the resonant properties of the oscillating cantilever probe and the contact area represents a significant shortcoming of contact resonance techniques. It results in “topographical crosstalk” that leads to significant interpretational issues. For example, it is difficult to know whether or not a phase or amplitude change of the probe is due to some sample property of interest or simply to a change in the contact area. The apparatus used in contact resonance techniques can also cause the resonant frequency, phase and amplitude of the cantilever probe to change unpredictably. Examples are discussed by Rabe et al., Rev. Sci. Instr. 67, 3281 (1996) and others since then. One of the most difficult issues is that the means for holding the sample and the cantilever probe involve mechanical devices with complicated, frequency dependent responses. Since these devices have their own resonances and damping, which are only rarely associated with the sample and tip interaction, they may cause artifacts in the data produced by the apparatus. For example, phase and amplitude shifts caused by the spurious instrumental resonances may freely mix with the resonance and amplitude shifts that originate with tip-sample interactions. It is advantageous to track more than two resonant frequencies as the probe scans over the surface when using contact resonance techniques. Increasing the number of frequencies tracked provides more information and makes it possible to over-constrain the determination of various physical properties. As is well known in the art, this is advantageous since multiple measurements will allow better determination of parameter values and provide an estimation of errors. FIG. 15 15010 15030 15020 1 2 1 2 Since the phase of the cantilever response is not a well behaved quantity for feedback purposes in DFRT PFM and DFRT ZT, we have developed other methods for measuring and/or tracking shifts in the resonant frequency of the probe. One method is based on making amplitude measurements at more than one frequency, both of which are at or near a resonant frequency. illustrates the idea. The original resonant frequency curve has amplitudes A and A, respectively, at the two drive frequencies fand f. 15050 15035 15025 1 2 1 2 2 However, if the resonant frequency shifted to a lower value, the curve shifts to and the amplitudes at the measurement frequencies change, A′ increasing and A′ decreasing. If the resonant frequency were higher, the situation would reverse, that is the amplitude A′, at drive frequency fwould decrease and A′at fwould increase. 1 2 1 2 1 2 1 2 There are many methods to track the resonant frequency with information on the response at more than one frequency. One method with DFRT PFM and DFRT ZT is to define an error signal that is the difference between the amplitude at fand the amplitude at f, that is Aminus A. A simpler example would be to run the feedback loop such that Aminus A=0, although other values could equally well be chosen. Alternatively both fand fcould be adjusted so that the error signal, the difference in the amplitudes, is maintained. The average of these frequencies (or even simply one of them) provides the user with a measure of the contact resonance frequency and therefore the local contact stiffness. It is also possible to measure the damping and drive with the two values of amplitude. When the resonant frequency has been tracked properly, the peak amplitude is directly related to the amplitude on either side of resonance. One convenient way to monitor this is to simply look at the sum of the two amplitudes. This provides a better signal to noise measurement than does only one of the amplitude measurements. Other, more complicated feedback loops could also be used to track the resonant frequency. Examples include more complex functions of the measured amplitudes, phases (or equivalently, the in-phase and quadrature components), cantilever deflection or lateral and/or torsional motion. The values of the two amplitudes also allow conclusions to be drawn about damping and drive amplitudes. For example, in the case of constant damping, an increase in the sum of the two amplitudes indicates an increase in the drive amplitude while the difference indicates a shift in the resonant frequency. Finally, it is possible to modulate the drive amplitude and/or frequencies and/or phases of one or more of the frequencies. The response is used to decode the resonant frequency and, optionally, adjust it to follow changes induced by the tip-sample interactions. FIG. 10 10010 10020 10030 10040 10050 shows the results of a measurement of a piezo-electric material using DFRT PFM methods. Contact mode is used to image the sample topography and contact resonance techniques used to image the first frequency amplitude , the second frequency amplitude , the first frequency phase and the second frequency phase . In this experiment, the two frequencies were chosen to be close to the first contact resonance, at roughly the half-maximum point, with the first frequency on the lower side of the resonance curve and the second on the upper side. This arrangement allowed some of the effects of crosstalk to be examined and potentially eliminated in subsequent imaging. FIG. 2 FIG. 2 Another multiple frequency technique is depicted in , an apparatus for using the present invention with a conductive cantilever to measure piezo-electric material using DFRT PFM methods. The apparatus may be advantageous in examining the effects of crosstalk with a view to potentially eliminating them in subsequent imaging. In the apparatus of the response to driving the tip voltage of the cantilever, due to the piezoelectric action acting through the contact mechanics, will typically change as the probe is scanned over the surface. The first signal will then be representative of changes in the contact mechanics between the tip and sample. The second signal will depend both on contact mechanics and on the piezo electrical forces induced by the second excitation signal between the tip and sample. Differences between the response to the first excitation and the response to the second are thus indicative of piezoelectric properties of the sample and allow the contact mechanics to be separated from such properties. drive drive 0 As noted, the user often does not have independent knowledge about the drive or damping in contact resonance. Furthermore, models may be of limited help because they too require information not readily available. In the simple harmonic oscillator model for example, the drive amplitude A, drive phase φ, resonant frequency ωand quality factor Q (representative of the damping) will all vary as a function of the lateral tip position over the sample and may also vary in time depending on cantilever mounting schemes or other instrumental factors. In conventional PFM, only two time averaged quantities are measured, the amplitude and the phase of the cantilever (or equivalently, the in-phase and quadrature components). However, in dual or multiple frequency excitations, more measurements may be made, and this will allow additional parameters to be extracted. In the context of the SHO model, by measuring the response at two frequencies at or near a particular resonance, it is possible to extract four model parameters. When the two frequencies are on either side of resonance, as in the case of DFRT PFM or DFRT ZT for example, the difference in the amplitudes provides a measure of the resonant frequency, the sum of the amplitudes provides a measure of the drive amplitude and damping of the tip-sample interaction (or quality factor), the difference in the phase values provides a measure of the quality factor and the sum of the phases provides a measure of the tip-sample drive phase. 1 2 1 2 drive drive 0 Simply put, with measurements at two different frequencies, we measure four time averaged quantities, A, A, φ, φthat allow us to solve for the four unknown parameters A, φ, ωand Q. FIG. 18 drive 0 drive 1 1 2 2 1 drive drive 18010 18012 18014 18030 18032 2 18034 18050 1 18052 2 18054 18032 18034 illustrates the usefulness of measuring the phase as a means of separating changes in the quality factor Q from changes in the drive amplitude A. Curve shows the amplitude response of an oscillator with a resonance frequency of ω=320 kHz, a quality factor Q=110 and a drive amplitude A=0.06 nm. Using DFRT PFM or DFRT ZT techniques, the amplitude A is measured at a drive frequency fand the amplitude A is measured at a drive frequency f. Curve shows what happens when the Q value increases to 150. The first amplitude A increases because of this increase in Q, as does the second amplitude A. Curve shows what happens when the quality factor Q, remains at 110 and the drive amplitude Aincreases from 0.06 nm to 0.09 nm. Now, the amplitude measurements made at f and f are exactly the same as in the case where the Q value increased to 150, and , respectively. The amplitude response does not separate the difference between increasing the Q value and increasing the drive amplitude A. 18020 18040 18060 18010 18030 18050 18020 18060 18022 18062 18024 18064 18042 18044 1 2 drive 1 2 1 2 This difficulty is surmounted by measuring the phase. Curves , and are the phase curves corresponding to the amplitude curves , and respectively. As with the amplitude measurements, the phase is measured at discrete frequency values, fand f. The phase curve remains unchanged when the drive amplitude Aincreases from 0.06 nm to 0.09 nm. Note that the phase measurements and at ffor the curves with the same quality factor are the same, as are the phase measurements and at f. When the quality factor Q increases, the fphase decreases and the fphase increases. These changes clearly separate drive amplitude changes from Q value changes. 18070 18080 In the case where the phase baseline does not change, it is possible to obtain the Q value from one of the phase measurements. However, as in the case of PFM and thermal modulated microscopy, the phase baseline may well change. In this case, it is advantageous to look at the difference in the two phase values. When the Q increases, this difference will also increase. If we increase the number of frequencies beyond two, other parameters can be evaluated such as the linearity of the response or the validity of the simple harmonic oscillator model Once the amplitude, phase, quadrature or in-phase component is measured at more than one frequency, there are numerous deductions that can be made about the mechanical response of the cantilever to various forces. These deductions can be made based around a model, such as the simple harmonic oscillator model or extended, continuous models of the cantilever or other sensor. The deductions can also be made using a purely phenomenological approach. One simple example in measuring passive mechanical properties is that an overall change in the integrated amplitude of the sensor response implies a change in the damping of the sensor. In contrast, a shift in the “center” of the amplitude in amplitude versus frequency measurements implies that the conservative interactions between the sensor and the sample have changed. This idea can be extended to more and more frequencies for a better estimate of the resonant behavior. It will be apparent to those skilled in the art that this represents one manner of providing a spectrum of the sensor response over a certain frequency range. The spectral analysis can be either scalar or vector. This analysis has the advantage that the speed of these measurements is quite high with respect to other frequency dependent excitations. In measuring the frequency response of a sensor, it is not required to excite the sensor with a constant, continuous signal. Other alternatives such as so-called band excitation, pulsed excitations and others could be used. The only requirement is that the appropriate reference signal be supplied to the detection means. FIG. 16 1 8 shows one embodiment of a multi-frequency approach, with eight frequencies being driven fthrough f. As the resonance curve changes in response to tip-surface interactions, a more complete map of the frequency response is traced out. This may be particularly useful when measuring non-linear interactions between the tip and the sample because in that case the simple harmonic oscillator model no longer applies. The amplitude and phase characteristics of the sensor may be significantly more complex. As an example of this sort of measurement, one can drive the cantilever at one or more frequencies near resonance and measure the response at nearby frequencies. Scanning ion conductance microscopy, scanning electrochemical microscopy, scanning tunneling microscopy, scanning spreading resistance microscopy and current sensitive atomic force microscopy are all examples of localized transport measurements that make use of alternating signals, sometimes with an applied dc bias. Electrical force microscopy, Kelvin probe microscopy and scanning capacitance microscopy are other examples of measurement modes that make use of alternating signals, sometimes with an applied dc bias. These and other techniques known in the art can benefit greatly from excitation at more than one frequency. Furthermore, it can also be beneficial if excitation of a mechanical parameter at one or more frequencies is combined with electrical excitation at the same or other frequencies. The responses due to these various excitations can also be used in feedback loops, as is the case with Kelvin force microscopy where there is typically a feedback loop operating between a mechanical parameter of the cantilever dynamics and the tip-sample potential. The described embodiments of the invention are only considered to be preferred and illustrative of the inventive concept. The scope of the invention is not to be restricted to such embodiments. Various and numerous other arrangements may be devised by one skilled in the art without departing from the spirit and scope of the invention. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 Preferred embodiment for probing multiple eigenmodes of a cantilever. FIG. 2 Preferred embodiment for exciting voltage-dependent motion in the cantilever probe. FIG. 3 Preferred embodiment for probing an active device. FIG. 4 Phase and amplitude shifts of the fundamental eigenmode with and without the second eigenmode being driven. FIG. 5 Images of collagen fibers taken with the preferred embodiment. FIG. 6 Two dimensional histogram plots of the amplitude and phase for the first and second eigenmodes. FIG. 8 Preferred embodiment for probing an active sample in contact while measuring dynamic contact properties (Dual Frequency Resonance Tracking Piezo Force Microscopy (DFRT PFM)). FIG. 9 Resonance peaks in sweep of applied potential from dc to 2 MHz. FIG. 10 Images of a piezoelectric sample when the cantilever potential was driven at two different frequencies, one slightly below and the other slightly above the same contact resonance frequency. FIG. 12 Amplitude versus frequency and phase versus frequency curves simultaneous measured at different frequencies. FIG. 13 Conventional Local Thermal Analysis. FIG. 14 Differential Drive Control for Tip-Sample Bias Voltage Control. FIG. 15 Amplitude and phase curves changing in response to varying tip-sample interactions being driven first at a single frequency and then at two different frequencies. FIG. 16 Amplitude versus frequency sweeps around the second resonance made while feeding back on the first mode amplitude. FIG. 18 Amplitude versus frequency and phase versus frequency curves simultaneous measured at different frequencies. FIG. 19 Images of a piezoelectric sample when the cantilever potential was driven at two different frequencies, one slightly below and the other slightly above the same contact resonance frequency. FIG. 20 Compensation for Parasitic Bending. FIG. 21 Effect of Change in Tip-Sample Separation on Parasitic Bending. FIG. 22 Thermal Deflection Measurements with Open Loop and Closed Loop Detection and Pull-off Trigger set at 50 nm below Maximum Transition Temperature. FIG. 23 Thermal Deflection Pits with Open Loop and Closed Loop Detection and Varying Pull-off Trigger Values. FIG. 24 DFRT ZT Apparatus FIG. 25 Correlation of Contract Resonance Measurements with Thermal Deflection Measurements (Open Loop and Closed Loop Detection) FIG. 26 Thermal Deflection Measurements (Open Loop and Closed Loop Detection)
In Canada we live in a democratic nation, this means that we can elect the political party that we think will serve our best interests. There is an election every four years, if at any time in those four years an issue might arise that needs to be addressed by the citizens, the government can have a plebiscite, referendum or a consensus decision making meeting to get the citizens involved in the decision process. I think that these processes are a great political tool, as the results of these processes are a direct example of public opinion and can not be argued, Canadians should participate in political decisions whenever possible. We Will Write a Custom Essay Specifically For You For Only $13.90/page! order now A plebiscite is a direct vote by citizens on a specific question, given to them by their government to determine the citizen??™s wishes. In Canada there has been many plebiscite??™s, one of the most memorable one was regarding the video lottery terminals, the question was should they be removed from bars and pubs. There was forty plebiscite??™s conducted across Alberta communities, the results were that the majority of Albertan??™s wanted to keep the VLT??™s in the bars and pubs, and leave the decision about using them up to the individual. The government does not have to act upon the results of the plebiscite, but in this case they did, and removed the VLT??™s from the communities that voted against them. Plebiscites can also be held at the local level of government as well, Calgary voted in a plebiscite to add fluoride to the city??™s drinking water in 1989. The vote was a yes and the city implemented fluoride in our drinking water, the issue was revisited in 1998, Calgarians were asked if they still supported fluoride in the drinking water, fifty five percent of the city voted yes. City??™s can always revisit an issue, people??™s needs and opinions change over time, it is good that government can hold a plebiscite when needed. A referendum is a special vote in which all eligible citizen??™s may vote on an important issue put to them by a government, this is a form of direct democracy. One of the most controversial referendums in Canada was the Charlottetown Accord, in 1992. The question was ???do you agree that the constitution of Canada should be renewed on the basis of the agreement reached on August 28th 1992??? Fifty four percent of the eligible voters in Canada voted against the Accord, although New Brunswick, Newfoundland, Ontario, PEI, and the North West Territories voted in favor of the accord majority rules an Canada and the Accord was struck down. The government could not go ahead with its proposed revisions to the Canadian constitution. Consensus decision making is a form of decision making where there is no vote, instead individuals in a group share ideas, solutions and concerns to find a resolution that all members of the group can accept. An example of consensus decision making is the Tsuu Tin??™a First Nations Peacemaker Court, the group has four rounds of discussion to determine the wrong that has been committed, and what impact the wrong has had on the individual or community it was done to. Then the victim, offender and the community representatives try to reach an agreement on the case that will best suit everyone involved. The people that get elected in Canada do not always represent the values and opinions of every person in their riding even when plebiscites and referendums are held they can??™t please every person. When the government fails to address the needs of society, it can cause people to become enraged, to be fair the government can??™t always meet the needs of every person, and when frustrations reach a boiling point, protests and even riots can occur. An example of this was in February during the Vancouver Olympic torch run, some Canadians who didn??™t think the Government should be spending so much money on the Olympics when Vancouver has a large homelessness problem. The frustrated citizens disrupted the torch run, causing it to be re-routed, and had to miss the tribute to the war veterans. Sometimes people want their voices to be heard and will get their point across at the expense of others. If any of these government tools are going to work, and be successful, we have to assume that Canadians are well informed, and are voting for what they truly believe. Political Parties spend millions of dollars on advertising and campaigning trying to sway our votes; it does not always reach everyone. Sometimes people get to the voting station and find they don??™t know much or anything about the people involved or the issues they are voting on, if they go out and vote at all. The people who don??™t vote cant really comment on the outcome of the vote, Canada spends lots of money trying to encourage people to get out to the voting stations and make an informed choice; there are many alternatives for individuals who can??™t physically get out to vote. In Canada we are very lucky that we live in a democratic society, I believe that when a decision in the government is going to affect how we live our every day lives, Canadians should have a say in what is going to happen. Whether it is a plebiscite to see what the majority opinion is, a referendum or consensus decision, Canadians should have a say in a decision that will affect everyone.
https://systemsinfluenza.org/politics-4/
The Independent Communications Authority of South Africa (Icasa) has released a new draft regulation aimed at improving service to post offices across the country. In an explanatory statement, Icasa adviser Dr Charley Lewis said the settlements are being proposed in direct response to complaints received about the postal sector. “There are a number of complaints or issues that require the attention of authorities in the postal service industry. It is therefore important that we undertake this process in order to ensure better levels of service, as well as to set deadlines for handling complaints, ”he said. Lewis added that the post office serves the poorest and most vulnerable sectors of the population, particularly communities in rural areas, where service may differ from that provided in urban areas. “It is therefore required of the postal services licensee to provide good quality services to all communities, regardless of their social status, location, languages they speak or any disabilities they may have.” , did he declare. Changes Along with administrative changes such as the correct display of opening hours and post codes, regulations also state that queues should be drastically reduced at post offices across the country. “Customer service time should not exceed seven minutes for postal services ”, specifies the draft regulation. “In the event that the wait time exceeds seven minutes, the license holder, or the person delegated by the license holder, must intervene to resolve the problem in the interest of the customers.” Other proposed changes include: - The post office must set up an electronic payment system for postal services; - In the event that the post office needs to relocate or permanently close, the permit holder must post such notice to customers at least 60 days prior to such closure or relocation; - The post office relocation or closure notice must include the location of the nearest post office; - A post office must communicate with its customers in English and any other dominant official language in the region where the post office is located; - The post office must collect and submit quarterly reports on customer complaints it receives; - The staff of all post offices have in-depth and precise knowledge of their related products and services; - Staff must wear corporate clothing and name badges; - A client’s personal information must be treated in accordance with the requirements set out in the Privacy Act; - Customers should be informed of the insurance possibilities for lost or damaged letters or parcels when concluding postal service transactions. Read: South Africa was 3 weeks away from spectrum licensing and falling data prices: regulator .
https://www.thebharatexpressnews.com/government-wants-to-reduce-post-office-wait-times-to-7-minutes-maximum/
ISLAMABAD: Petrol and diesel prices have been reduced for the current fortnight from April 1-15. New petrol price is Rs110.35 per litre, down from Rs111.90 and new diesel price is Rs113.08 per litre, down from Rs116.08. Landed cost or ex-refinery cost of petrol is Rs72.28 per litre. A maximum of Rs30 per litre can be charged as petroleum development levy (PDL) under the rules but it has been kept at a low level of Rs11.23. Similar is the price structure of diesel. Light diesel oil (LDO) and kerosene prices have been slashed by Rs1.56 and Rs1.55 per litre respectively. On LDO and kerosene, taxes are not usually charged to keep prices low. In the prevailing circumstances, petroleum prices could not have been possibly lower than what have been announced. The Brent crude price dived to one of the lowest levels in recent history to $18.38 per barrel in April 2020. Thereafter, in the Jun-Nov period, it remained stable in the range of $40-42 and after November, there has been a fast increase at a rate of $7 per month. Current Brent price is around $64 per barrel. Correspondingly, petrol and diesel prices increased from Rs80-82 per litre in May 2020 to the current price level above Rs110 per litre. In Pakistan, petrol prices have traditionally been the lowest in the region, while in the case of diesel prices have been varying. Latest international data, as on March 29, 2021, puts Pakistan in the lowest oil price category except for Sri Lanka. In Sri Lanka, diesel price is at $0.523 per litre against Pakistan’s $0.755. Pakistan’s petrol price is, however, the lowest at $0.728 per litre against India’s $1.274, Bangladesh’s $1.05 and even Sri Lanka’s $0.809. Traditionally, petrol prices have been higher in India compared to Pakistan and diesel prices used to be lower. Indian oil pricing policy has changed towards higher taxation and prices. Internationally, oil pricing policies can be classified into four categories: Lowest prices in oil exporting countries of the Middle East, countries with low oil prices between the lowest and US benchmark prices, countries with more than US benchmark and below highest prices in Europe, and countries with highest prices like Norway, Sweden, etc. For example, the current gasoline prices are $2 per litre and diesel is sold at $1.742 per litre. American oil prices are taken as a benchmark as these are stable and least taxed among developed countries and market economies. Current diesel price in the US is $0.818 and petrol price is $0.843. Pakistan’s prices used to be in category-III but now they are under category-II of low prices. Welfare implications Another general trend in pricing policies has been that diesel is almost universally taxed lesser than petrol. The argument has been that diesel is used in public and goods transport and has welfare and competitiveness implications. In Pakistan also, this used to be the case. For some years, under the influence of a US-based IFI consultant, the policy has been changed in line with the US with no differential treatment. There is a need to reconsider this policy in Pakistan. Admittedly, the political impact of increase in petrol prices is direct and immediate but within no time the impact of diesel prices results in consumer prices of commodities, causing inflation. The combined consumption of petrol and diesel in Pakistan is around 16 million tons or 200 billion litres. A tax of Re1 per litre earns the government Rs200 billion. It is the easiest way to collect taxes as opposed to others. In the case of electricity, a tariff increase of Re1 per kilowatt-hour has an impact of Rs100 billion or slightly higher. An increase of Re1 per litre in oil prices has, at current prices and even generally, an impact of 1% on prices. However, a Re1 increase in electricity tariff has an impact of 20% on poor, 10% on middle class and 5% on the higher economic class. It may be useful for the policymakers to consider energy prices as a whole to estimate government income vs welfare impact on people. Electricity prices in Pakistan are the highest in the region, but oil prices are almost the lowest in US dollar terms, although due to heavy currency depreciation, the rupee price impact has been high. Comparatively, the pain on public (also the industrial and export sectors) and the consequent political and economic impact of the increase in oil prices may be lesser within a certain price range. The drive to reduce or eliminate circular debt may be moderated by the aforementioned considerations. One of the main causes of rising electricity cost and circular debt is the unutilised capacity and the rising capacity charges. It would be unfair and impractical to try to pass on all of this to the consumer. It would be fair to levy a capacity charge of up to 60%. Any capacity charge due to lower than 60% capacity utilisation has to be postponed until the capacity utilisation increases to an adequate level and the capacity charge comes down. Some part of the circular debt may have to be absorbed in the general debt as proposed by an IPP report. Concluding, a review may be conducted of diesel vs petrol pricing, cross electricity-oil price linkage and welfare differentiation and consideration of energy pricing in its totality. The policy of charging lower tax (PDL) on higher international prices and higher tax on lower international prices, as is the case currently, is welcome and should continue with adjustment in diesel vs petrol prices.
https://tribune.com.pk/story/2293254/impact-of-taxes-on-fuel-prices
Estonia's healthcare costs per person are the highest in the Baltics, while the most doctors per 10,000 residents are employed in Lithuania, figures from the National Institute for Health Development (NIHD) show. Healthcare costs per person in the Baltics were highest in Estonia, exceeding the €1,000 margin in 2015. In addition, the life expectancy of Estonian residents exceeded that of Latvians and Lithuanians, according to data in an NIHD overview published on Tuesday titled "Health in the Baltic Countries 2015." Although life expectancy has increased in all three Baltic countries in recent years, it nonetheless remains significantly below the EU average, which is 77.9 years for men and 83.3 years for women. Latvian and Lithuanian men have the lowest life expectancy in the EU, while Estonian men, with a life expectancy of 73.2 years, rank seventh from the bottom in the EU. Estonian women's life expectancy is likewise higher than those of women in Latvia and Lithuania, but nonetheless comes in one year below the EU average. Many people in the Baltics die due to injuries or other external reasons. "The number of suicides and traffic deaths has significantly decreased in the past 15-20 years," said NIHD Health Statistics Department analyst Riina Tilk. "Nevertheless, alongside circulatory system diseases and malignant tumors, deaths caused by injuries or other external reasons still remain the third main cause of death." The number of new tuberculosis (TB) cases in the last ten years had decreased in Estonia and Latvia by approximately one half and Lithuania by one third. The continued problem, however, is the great number of multidrug-resistant cases of TB both among new and retreatment cases. As a result, the World Health Organization (WHO) categorizes all three Baltic countries among dangerous countries with a continued high risk of TB in the European region. The spread of HIV is of particularly high concern in Estonia and Latvia. In 2015, Estonia saw the most registrations of new HIV cases per person in Europe, totaling 20.5 cases per 100,000 residents, while the highest number of AIDS cases, 6.7 cases per 100,000 residents, was recorded in Latvia. Lithuania also saw new HIV cases increase by one half compared to 2005 — to 5.4 cases per 100,000 people. Health expenditure to GDP ratios among lowest in EU Larger reforms of hospital networks took place in all three Baltic countries from 2002-2012. Since then, more changes have taken place in the statistics of hospital beds and their use. There has been an increase in the number of nursing care beds and a decrease in curative care beds. Comparing 2005 and 2015 figures, the number of day care cases in hospitals had doubled in Estonia, tripled in Lithuania and increased fivefold in Latvia. Additionally, there was an increase in the number of ambulatory admissions — of 30 percent in Lithuania, 11 percent in Latvia and one percent in Estonia. As of 2015, Lithuania employed 38 doctors per 10,000 people, while Estonia and Latvia followed with respectively 31 and 30 doctors per 10,000 people. Doctors in Estonia, Latvia and Lithuania averaged respectively 53, 54 and 49 years in age. The shares of the three Baltics' GDPs dedicated to health expenditures were among the lowest in Europe: in 2015, the share was 6.5 percent in Estonia and Lithuania and 5.5 percent in Latvia according to 2014 data. The average health expenditure per person was the highest in Estonia — €1,004, compared to Lithuania's €837 and Latvia's €650. The majority of this expenditure was spent on curative care, which in Estonia accounted for 56 percent, Lithuania 49 percent and Latvia 48 percent of all healthcare-related costs. "Health in the Baltic Countries 2015," a compendium published by the Health Statistics Department of the NIHD and health statisticians from Latvia and Lithuania, provides an overview of the demographic and socioeconomic indicators of the three Baltic countries, people's health behavior and reproductive health, mortality and morbidity rates, the use of healthcare services and health expenditures in 2015. Many of the comparisons were provided with a wider context by mean of the presentation of European average indicators, and more important changes were also analyzed across a longer time period.
- Liaising with customers regarding technical aspects of the development of specifications for new products as well as supporting the review of customer inquiries for technical merit and feasibility. - Review customer inquiries and specifications to assess feasibility and develop design concepts. - Design and develop custom products such as EGR valves, coolant valves, fuel injectors, and other high speed and proportional solenoid valves for air, water, oils, and other media applications. - Development of project plans and proposals: Establish engineering activities involved and associated schedule of work - Work with a local and global cross-functional group including engineers, manufacturing, sales, purchasing and product management personnel to carry out project requirements in line with the company’s NPD (New Product Development) Stage Gate process and systems. - Support all Company Policies - Engineering the design of new and improved product for manufacturability and performance, assembly, agency compliance, and lifecycle to customer requirements and to cost targets - Compliance evaluation and documentation of technical files in regulatory issues. - Promote and implement OFI’s in product design, cost down, VA-VE and quality areas. - Project manage and drive NPD programmes as required. - Utilize company supplied design and operational tools such as CAD and ERP systems, as well employing Six Sigma principles and other appropriate engineering tools as required. - Creation and development of technical design documentation including but not limited to product drawings, schematics, FMEAs, and product specifications. - Creation and execution of test qualification plans and product verification requirements alongside specification compliance matrices. - Oversee and participate in the building and testing of product prototypes and reporting and documenting of engineering RnD activities. - Apply metrics to monitor and verify success levels of projects. - Provide technical support to internal and external customers as required. - International travel to the companies facilities, tradeshows, suppliers, and customers for project and technical support purposes. - Practice good housekeeping - Follow safety rules - Foster an atmosphere of teamwork focused on Continuous Improvement. - Assist and participate where requested in the development of engineering staff through recommendation and/or execution of relevant internal and/or external courses. - Other related tasks as assigned by the engineering manager. Drive and Support a Culture of Continuous Improvement - Ensure your area is properly organized to maintain 5S - Identify opportunities for improvement - Improve and apply knowledge and skills of products, applications, & manufacturing processes to facilitate learning and growth among self and fellow team members. Key Result Accountabilities - Compliance to company procedures and processes. - Ensure all documentation is accurately completed before submitting - Co-ordinate with all departments in an effective and professional manner - Ensure execution of the project schedules. - Respond to customers with timely support - Adhere to all company policies and procedures as set out in contracts. - Provide rapid response to internal and external customer requests. Required Characteristics - Good communicator - Team player - Dedicated worker - Self-starter - Demonstrates leadership qualities - Comprehensive problem solving/decision making skills - Technically innovative with good electromechanical acumen. - Communication skills – must be able to present complex technical data, both orally and in writing, in concise terms to all organisational levels. - Actively complies with all rules and regulations set down by the company - Actively maintains up-to-date knowledge base on relevant technical skills and market trends Qualifications/Job Requirements - Graduate Degree in Engineering: Electrical/Electronics, Electromechanical, Mechanical. - 5+ years’ experience in engineered technical product design within a manufacturing environment - Experience in development of commercial control valves/electroelectrohydraulics design, with specific experience in electrical vehicle coolant control valves, high temperature exhaust systems, hydraulic, oil is a distinct advantage. - Experience in an automotive product design and development environment (IATF 16949) is advantageous. - Self-motivated with an aptitude for working in teams or on an individual basis. - Excellent verbal, written, and presentation communications skills. - Proficient in 3D modelling of complex parts in Creo Parametric. - Experienced in the use of Geometric tolerancing (GD&T) - Proficient in the use of Software tools where provided and as necessary including but not limited to : o Creo Parametric 3D modelling o AutoCAD 2D o LabView o MS Office tools o DFMEA, & PFMEA - Skills in the following areas would be advantageous: o MATLAB o MathCAD o Minitab o Ansys / FEM Magnetic Finite Element Analysis o Computational Fluid Dynamics FEA o Lean Six Sigma manufacturing principles: ▪ DMF/DFA, design for LSS, ▪ Process improvement ▪ VA/VE engineering - Knowledgeable in materials and manufacturing methods, component design and engineering processes. - Experience in designing forgings, castings, stampings, injection moulded and sintered components is preferred For further information on this role in Galway please contact Shannon McCrossan on 0868168273/ [email protected] Check out all our open jobs on our HERO Recruitment website – https://www.hero.ie/ Please Note: Under its obligation under the Data Protection legislation, HERO Recruitment will not forward your details to any company without your prior approval. Data can only be transferred outside of the EEA on the basis of standards contractual clauses, to a country for whom an adequacy decision has been given by the European Commission or where the express permission of the data subject has been given. You have supplied us with your personal data in the process of applying for a position. Our client company may have personnel outside of the EEA who will review your data. We will apply the appropriate criteria in respect of the data transfer depending on the location of those personnel.
https://www.hero.ie/jobs/product-engineer-gort-galway/
A list of recommended mystery books for elementary grades. Adler, David A. Andy Russell, not wanted by the police. Ellsworth Smith is summoned by letter to a home he doesn't remember. His return stirs up ghosts... and a mystery. Allison, Jennifer. Gilda Joyce: the ladies of the lake. Gilda Joyce investigates the drowning death of a student whose ghost supposedly haunts the campus of a girls� school. Anderson, Janet S. The last treasure. Power, poetry, mystery and magic take the reader on a memorable treasure hunt of the mind. Bowers, Vivien. Crime scene: how investigators use science to track down the bad guys. This award winning book is visually appealing, balancing serious information and just plain fun. Brockmeier, Kevin. Grooves: a kind of mystery. A seventh-grader sets out to save the blue jean factory workers from greedy entrepreneur Howard Thigpen. Byars, Betsy. The black tower. Herculeah Jones goes to visit old Mr. Shivers Hunt, resident of the forbidding Hunt House. Cavendish, Grace. Assassin: the Lady Grace mysteries. Maid of honor of Elizabeth I must solve a murder mystery and clear the name of her betrothed. Flint Future Detective Club members solve the mystery of a quadrillion-dollar bill with the image of James Brown on it. Eden, Alexandra. To Oz and back: a Bones and the Duchess mystery. A 12-year old with Aspergers and a genial ex-cop investigate the disappearance of two girls from a rural east coast community. Fast, Natali. The secret apartment. Eleven-year-old Jillian's life is changing and she's not happy about it. She now has a new stepfather, a stepsister, and a home in New York City. Two eighth-grade sports reporters reunite at the U.S. Open Tennis Championships where they investigate the mysterious disappearance of a top Russian player. Harris, Elizabeth Snoke. Crime scene: science fair projects. Analyze handwriting, extract DNA, lift fingerprints and learn what blood spatter patterns tell. Roni, a high school crime reporter, teams up with a science geek to investigate the beating and kidnapping of a classmate. Hirsch, Odo. Something's fishy, Hazel Green. Hazel discovers that the fishmonger, Mr. Petrusca, has a secret and determines to help him. Hoobler, Dorothy and Thomas. The ghost in the Tokaido Inn. Seikei, a merchant's son who longs to be a samurai, attempts to solve the mystery of a stolen jewel. Jackson, Donna M. The wildlife detectives: how forensic scientists fight crimes against nature. Wildlife detectives at the National Fish and Wildlife Forensics Laboratory in Ashland, Oregon, analyze clues to catch and convict people responsible for crimes against animals. Karbo, Karen. Minerva Clark goes to the dogs. A 13-year-old sleuth in Portland, Oregon, gets herself mixed up with a crooked animal shelter worker and some very strange animals. Karr, Kathleen. The 7th knot. Two brothers touring Europe in the 19th century become embroiled in a mystery when they go in search of their uncle's enigmatic missing valet. LaBatt, Mary. The secret of Sagawa Lake. At a cabin in the woods, Sam discovers an old diary which reveals some surprising secrets. Lawrence, Caroline. The enemies of Jupiter. An epidemic is sweeping Rome and it is up to Jonathan, Flavia, Nubia and Lupus to discover who is behind the terrifying outbreak. Lewis, J. Patrick. Once upon a tomb: gravely humorous verses. 21 poems in this collection tell, in hilarious verse, the story of an untimely demise. Four teenagers investigate when boathouses at the Les Cheneaux Islands resorts are looted. When her grandmother's friend Zola disappears, Crystal and her cousin set out to find her. Crystal does not let her paraplegic status stop her. Nilse, Anna. Art fraud detective: spot the difference, solve the crime! Use sharp eyes and the included magnifying glass to spot the fakes for 35 paintings from the National Gallery in London. A spot-the-difference puzzle, a mystery story, and a reference book all in one! Obrist, Jurg. Case closed?!: 40 mini-mysteries for you to solve. The reader can use visual clues and deductive reasoning to help Daisy and Ridley solve forty puzzling mysteries. Parker, Janice. Forgeries, fingerprints, and forensics. Introduces methods police and detectives use science to fight crime. Platt, Richard. Crime scene: the ultimate guide to forensic science. Photographs from actual crime scenes combine with 3-D diagrams and scientific close-ups to explain everything from ear prints to toxicology and encrypted files. At Pish Posh, her parents' restaurant, Clara Frankofile fails to observe the mysterious events occurring right under her nose. The death of an eccentric millionaire brings together heirs who must uncover the circumstances of his death before they can claim their inheritance. Invisible Detective can solve any mystery, great or small. Only four kids know the truth about him and fight crime in his name. Nikki is determined to find out what secret her new stepmom, Crystal, is hiding. Science detectives: how scientists solved six real-life mysteries. Introduces methods police and detectives use science to fight crime. The editors of YES Mag cover Typhoid Mary, 4000 year old Otzi, the original "hobbits" and the reason for 1600 dead, rotting vultures! Seabrooke, Brenda. The haunting of Swain's Fancy. Taylor attempts to solve the mystery of ghosts who haunt the site of an historic home where she spends her summer. Simner, Janni Lee. Secret of the three treasures. While pretending to be the heroine of her father's adventure novels, Tiernay discovers new friends, buried Revolutionary War treasure, and answers to a long-ago mystery. Van Leeuwen, Jean. The Great Googlestein Museum mystery. A hilarious adventure about three mice who leave their home in a New York City department store and escape to the outside world of Central Park and the Guggenheim Museum. Wells, Rosemary. Leave well enough alone. Working for a wealthy family in an affluent neighborhood, Dorothy stumbles upon a secret. Whybrow, Ian. Little Wolf, Forest Detective. Little Wolf relates his adventures as a member of Yelloweyes Forest Detective Agency. Yolen, Jane. Roanoke, the Lost Colony: an unsolved mystery from history. When John White returned to Roanoke in 1590, he found the colony deserted and the letters CRO carved into a tree. Unravel the mystery!
http://longviewlibrary.org/books/books-kids-clues.php
Magmar attempts to steal the Jewel Lords' newest creation. Contents Synopsis Magmar, Saberstone, and Spearhead are riding the Stone Wing when "something" suddenly becomes jammed and they crash in the Rock Glades. Seeing something flashing in the distance, they discover the stronghold of the Jewel Lords—the Crystal Palace. Hidden by the rock grass, they spot Boulder saying his farwells to Solitaire and leaving on his Stone Pot. After Solitaire punches in a code to enter the palace, Magmar, curious as to what his enemies are up to, follows. Saberstone tries punching in the code, but is unable to remember it, so Spearhead uses his head, literally smashing the panel with his cranium. This manages to work and the three enter the open gate. Inside, the villains stumble in the dark till they find the Jewel Lords in a laboratory. They perform an experiment that produces a "true nuclo-crystal" with unbelievable power. The experiment's resulting smoke induces coughing fits in Magmar and his henchmen, alerting the Jewel Lords to their presence. Magmar bluffs that his forces are greater than they seem and Spearhead grabs the hot nuclo-crystal, only to drop it. Sunstone tries to grab it, but is burned himself as well. Magmar grabs the crystal and has the Jewel Lords tied up. Sunstone isn't worried and reveals to his fellow Jewels that Magmar is only in possession of a projection he made. Also, fortunately, Boulder and his gang of good Rock Lords were checking out the area and have come to the Jewel Lords' rescue. Magmar and his cronies escape through the roof. Solitaire remarks to let them go, explaining that Sunstone still has the actual nuclo-crystal, while Magmar only has an illusion. Out in the Rock Glades, Magmar thinks he's dropped the crystal and orders his minions to search for it... Featured characters (Numbers indicate order of appearance.) |Good Rock Lords||Evil Rock Lords| | || | Notes - This minicomic was packaged with the third wave of Rock Lords product. - This issue technically has no title. In lieu of one, the line stated by Saberstone on the cover is used for convenience. Errors - On page six, Solitaire says "here" instead of "hear".
http://gbwiki.shoutwiki.com/wiki/There%27s_Ssomething_Flashing_over_There
View more of the Sun's opinion section Warfare has traditionally been executed within easily defined periods of time and geographic boundaries. These conflicts have been fought on identifiable terrain in the air, on the ground, under the sea and, as of the last 20 years, in space. Even the changing tools of war have been easily defined: the rifle, bomb, aircraft, tank, ship, et al. Some of the newer tools, such as the improvised explosive device, are equally tangible and identifiable. But the internet has opened a whole new domain for warfare. There are no geographical boundaries. Cyberwarfare is a game-changer in how we assess our enemies, meet their challenges and enact policies that match the growth of the cyberdomain. To understand cyberwarfare, we need a clear understanding of what the term means and how this form of battle differs from traditional warfare. Unfortunately, no universal definition of cyberwarfare exists. Even agreement on a single way to spell the term has proven elusive. Is it “cyber warfare,” “Cyber-Warfare,” “Cyberwarfare” or “Cyber warfare”? The subtle differences reflect a large difference in the word’s connotation. Is the emphasis on “cyber”? Is the emphasis on “war” to reflect an offensive focus versus a more conventional defensive positioning? Or is the term meant to reflect a select type of warfare? Is it only limited to actions taken on a computer? It also is important to differentiate a cyberattack from cyberwarfare. Calling it “war” implies a wider scope and longevity. An attack is understood to be a singular event, while war is a series of attacks. My emphasis is on using a digital means to attack an opponent — what constitutes an attack and the warranted response. Cyberwarfare should not be thought of as computer against computer, but a much broader concept. These attacks could range from state-sponsored infiltration with the objective of disrupting information systems to hackers trying to make a political statement or influence outcomes. With the advent of nonstate-sponsored terrorist organizations and the ubiquity of internet access, offensive cyberattacks have become frequent occurrences. Reaching agreement on terms and meanings will be critical to achieving and determining how to best deal with this new type of warfare. The Department of Defense and others have spent billions viewing cyberspace and solutions in traditional physical terms — likely because that is what is familiar to them. A new paradigm must be developed that reflects the realities of cyberspace, which expands the battlefield past the supposedly-safe borders of our homeland and into almost every aspect of our lives. That so much activity relies on this technology means escaping the impact of cyberwarfare is unlikely. The capacity for a single solution is equally unlikely. What do we do? All of these developments present the Department of Defense with a new challenge and beg the question: What will “traditional warfare” mean in 2025 or 2030? The American military does not possess sufficient numbers of skilled operators to counter this growing threat, much less obtain superiority in the cyberspace domain. We need to train for a different set of skills and knowledge. The tools that will advance U.S. military capabilities are also creating vulnerabilities since they operate on the same internet that is under attack. As U.S. policies evolve and incorporate innovative technologies into defense systems, they need to be designed with an eye toward security. Developing a strong military without protecting the electrical grids at home is short-sighted and will hinder longer-term success. A proactive planning approach will prove the most effective way to move forward. The focus must be on finding solutions within the network. As history has shown, military strategy must adapt to new domains. Cyberspace is that next domain. A traditional system that cannot respond in “digital time” to a multi-pronged threat or that cannot provide protection while attacking others may be of little use in the future. It would be the equivalent of the Polish army attempting to use their horse cavalry team against the German armored brigades at the beginning of World War II. Society and warfare have evolved from horses against metal to metal against the matrix. Going forward, many political and military questions will need to be addressed as we determine how to conduct and respond to cyberwarfare. Unanimous agreement is unlikely, but an informed dialogue with the public on these issues is essential. That will pave the way for compromise necessary to establish new policies and principles for this complicated subject of cyberwarfare. Marie Neill Sciarrone is co-founder and president of Trinity Cyber LLC and a former special assistant to the president for homeland security. She originally wrote a longer version of this essay for The Catalyst: A Journal of Ideas from the Bush Institute. This is being distributed by InsideSources.c
Indisputably one of the 20th century's most important literary figures, Kurt Vonnegut Jr. needed "repeated reassurance" that the batches of personal and professional ephemera he sent over a period of 10 years to the IU Lilly Library "were actually wanted," according to Seth Bowers, one of four undergraduate IU students who curated "Mustard Gas and Roses: The Life and Works of Kurt Vonnegut," an exhibit that runs at the Lilly main gallery through Sept. 8. Even after the Lilly Library officially secured the bulk of Vonnegut's letters and manuscripts in 1997, the complex iconoclast, who many regarded as the Mark Twain of 1960s counterculture, continued feeding materials to the library until shortly before his death in April at 84. A lean representation of the entire collection, the exhibit includes correspondence, sketches, photographs, drafts of manuscripts and even rejection letters, all of which humanize the larger-than-life Indianapolis native who achieved celebrity both in and out of wonkish book circles with his piquant, politically subversive brand of satire and noisy contempt for social injustice wherever he saw it. The exhibit was organized by Bowers, Lisa Dunk, Sarah Taylor and David Pavkovich, all Wells Scholars who were on the heels of another collaborative Lilly project before catching wind of the Vonnegut gold mine through their exchanges with the library's director, Breon Mitchell. "We were wondering what we could do next, and when we suggested putting the exhibit together, Breon agreed to let us," Bowers says. "He trusted us." Unusually sophisticated for their ages, all four seem keenly aware of what an extraordinary gig they landed in being able to spelunk through precious literary artifacts for eight months and have their efforts culminate in a top-notch exhibit. The precocious foursome gives big shout-outs to Rebecca Cape, head of reference and public services, and Mitchell for their contributions as de facto advisors throughout the project. "Dr. Mitchell helped conceptually, and Becky had a lot of direct, hands-on involvement," Bowers says. Pavkovich, a self-described student of Vonnegut since the sixth grade, culled the exhibit's title from the absurdist 1969 masterpiece, Slaughterhouse-Five. The novel's protagonist, Billy Pilgrim, gets a nocturnal, drunken call from someone (intended to be Vonnegut himself) whose breath the narrator describes as smelling of "mustard gas and roses" - one of many motifs repeated throughout the novel. "I thought it was a wonderfully ironic juxtaposition," Pavkovich says. "In such a short phrase Vonnegut managed to convey an image laden with desolation and beauty or even death and life." Based in part on his own harrowing experience as a prisoner of war during the Allied bombing of Dresden, Slaughterhouse-Five was Vonnegut's decisively anti-war, metafictive meditation on the big themes cited by Pavkovich, along with an underlying exploration of theodicy. The exhibit features three radically different and painstakingly crafted drafts of the novel's first chapter - peppered with Vonnegut's boldly handwritten notes - as well as copies of the tour de force in 25 different languages. Another display reveals Vonnegut's softer side, as well as the obvious delight he took in knowing that his papers would remain safe in the hands of the Lilly Library. A year and a half before his death, the writer was approached through correspondence by an exuberant Los Angeles teacher and his fifth grade army of baby Vonnegut enthusiasts. The class was elated when their hero not only wrote back but made a surprise call to Mr. Sigler. The display features the children's lovingly assembled book of Vonnegut quotes and a note penned by Vonnegut to the students, ending with, "P.S. your artwork will be preserved for all eternity with my papers at Indiana University!" Bowers says that many of the writer's personal papers were destroyed in an apartment fire in 2000, but that he appeared to be thankful that the remaining items would be preserved by the Lilly Library. Bowers adds that Vonnegut was also aware that the exhibit was being organized in the months leading up to his death, and he "seemed excited." "He was in frequent contact with Dr. Mitchell and was actually planning on coming to Indianapolis for the city's 'Year of Vonnegut' activities." Vonnegut died in April - before he could make the Indianapolis trip - from irreversible brain injuries related to a fall he took several weeks earlier. The exhibit was still being developed, and Dunk ruefully recalls her personal reaction to the icon's death. "After spending so much intimate time with his materials and memoirs, it was as though his work had come to feel like 'my baby,'" she says. "The process of going through captions and other writings related to the project, and changing them to past tense, was surreal, and very sad." A July reception for the exhibit, attended by many, including Vonnegut's official biographer Charles J. Shields, demonstrated that the writer still has unqualified appeal even in death. Dunk is not surprised that a contemporary audience would go gaga over a cult figure from the 1960s. "I think he still has a definite presence," she says. "The themes he explored are so resonant: war, tragedy, human expression and of course the terrible things he saw personally." Indeed, the way in which Vonnegut's humanistic ideas - sometimes misinterpreted as misanthropy - about an often topsy-turvy, increasingly entropic world, will undoubtedly continue to capture the imaginations of those looking to art for clarity. As Pavkovich puts it, "I will always be amazed by his belief that despite whatever terrible deeds humanity has committed or deplorable conditions we have set up in ignorance or depravity that there is still a part of us that is good." As Vonnegut himself was fond of saying, "And so it goes. So it goes." Lori Canada can be reached at .
http://bloomingtonalternative.com/articles/2007/08/01/8574
Event Series: ML Conferences ML Conference is Germany’s first major conference on machine learning and artificial intelligence! Chatbots, voice control, virtual assistants like Siri or Alexa – artificial intelligence is a topic that’s hard to avoid these days if you are an IT professional. A growing number of businesses are developing an increased interest in machine learning. Customer service, internal processes, and sales increase are only some of the many areas where artificial intelligence is being used. But what are the opportunities and risks of artificial intelligence for business and society? This and other questions will be answered at Germany’s first major machine learning conference. Leading experts will be on hand to introduce participants to the newest technologies on the market, e.g. Tensorflow, R, and the latest deep learning toolkits.
https://infosec-conferences.com/event-series/ml-conferences/
May 07, 2020, 16:25 ET SALT LAKE CITY, May 7, 2020 /PRNewswire/ -- WGU Labs, Inc., an affiliate of online nonprofit Western Governors University (WGU), has announced a research and market development agreement with Denver-based InScribe Education. The InScribe platform leverages the power of people and communities, as well as artificial intelligence, to connect learners with answers, resources, and individuals they need to succeed in their postsecondary journeys. While InScribe strives to improve every stage of the student learning lifecycle, WGU Labs will research the platform's impact on WGU's enrollment process, outcomes, and student experience. Engendering a sense of belonging early in a prospective student's enrollment experience is critical to that student's matriculation. And, while chatbots and static Q&A webpages can offer standardized responses to prospective students' basic questions, they cannot replace the confidence-inspiring, community-building results of human-to-human interaction, even when that interaction is online. InScribe aims to provide that level of engagement, at scale, through community-powered support and artificial intelligence. "We all seek meaningful, relevant human connections in so many aspects of life, including learning," said WGU Labs Managing Director Todd Bloom. "Learning is an investment in many senses of the word. Therefore, opportunities to connect with others going through a similar life experience are so important to one's successful outcomes, whether related to educational access, progress, and/or completion." "We value the expertise of the WGU Labs team and their commitment to supporting solutions that make a measurable and meaningful difference for postsecondary students," said InScribe Co-Founder and CEO Katy Kappler. "Like WGU, we're committed to providing an experience that meets the needs of today's student—one that is highly flexible, always available, and tailored to each learner's specific needs and challenges." Postsecondary institutions are increasingly focused on boosting access and improving retention and completion rates. InScribe's peer-to-peer, community-based approach allows schools to tackle this issue by offering scalable support for students. Institutions can increase student engagement and improve outcomes, all while decreasing the cost of support. Kappler and her team's philosophy is centered around the belief that education is not a "solo sport." Through their partnership with WGU Labs, InScribe will continue to demonstrate its community-building capabilities and its importance to postsecondary access and student success. About WGU Labs WGU Labs is a nonprofit that is an affiliate of WGU. WGU Labs primarily provides research, services, inventions, and builds, and secondarily provides investments in strategically aligned innovative learning solutions that improve quality and advance educational outcomes for learners everywhere. Building on social psychology, learning science, and industry trends, WGU Labs accelerates education startups and develops its own research-supported, scalable products. Learn more about WGU Labs at https://wgulabs.org/. About InScribe InScribe is a digital student support platform that leverages the power of community and artificial intelligence to connect students with the answers, resources, and individuals they need to succeed. InScribe's digital communities cut across the traditional support silos in higher education, giving students a single place to turn when they need help—no matter the topic or time of day. Students benefit from on-demand, peer-to-peer, and student-to-expert collaboration that helps them feel more connected and increases student engagement, satisfaction, and retention. Learn more about InScribe at https://www.inscribeapp.com/. Follow WGU: http://www.facebook.com/wgu.edu http://www.linkedin.com/companies/western-governors-university http://twitter.com/wgu http://www.youtube.com/WesternGovernorsUniv http://news.wgu.edu/news/news.xml www.wgulabs.org Contact for media inquiries:
https://www.prnewswire.com/news-releases/wgu-labs-inscribe-partner-to-create-community-among-prospective-online-students-301055302.html?tc=eml_cleartime
With GCSEs returning for the first time in three years, student revision must be done correctly, so how can this be done? Look at these 4 great tips. The Guardian recently released a story highlighting how in the UK “close to 2 million teenagers will be gearing up for their exams”. It suggested how students should start revising over Easter to get ahead and avoid stress before exams start. So, here are 4 tips that could help with revision over Easter and beyond: 1. Set goals for your revision Setting goals and objectives during your revision can be extremely beneficial. According to a study: “Setting goals are linked with higher motivation, self-esteem, self-confidence, and autonomy (Locke & Latham, 2006), and research has established a strong connection between goal-setting and success (Matthews, 2015).” Expanding further on this, setting goals administers a driven focus for students which can ensure time spent during revision isn’t wasted. Furthermore, by setting revision goals you can evaluate your current workflow and change it accordingly to help you meet the specific goals that you set. 2. Take breaks for mental health and academic progression Student mental health has become an enormous issue in previous years and exam season inflicts an incredible amount of stress on teenagers. That’s why it’s vital to take breaks from revision. According to a study: “By administrating a brief, 6–7‐min relaxation technique or physical activity, the decrease of fatigue can be enhanced beyond the level of a normal rest break, with concomitant increases in vigour and thus potentially work engagement and productivity.” Taking regular breaks from revision can replenish and rejuvenate students’ motivation to continue with their studies and reach their certain goals. Additionally, mental health can be supported by allowing relaxation for a short period which subsequently improves learning capabilities. 3. Complete practice papers and do online courses Have you heard the expression “practice makes perfect”? It has been proven time and time again to be true and concerning GCSE revision it’s no different. According to a study comparing students who did practice papers and those who didn’t: “Students using the practice test as a revision aide scored an average of 9.28% more in the examination that those who did not use the test.” It is evident that constantly practising with past papers will provide immense benefits for academic progression. Additionally, if online practice papers are completed, progress can be tracked and even instant feedback can generate a quicker analysis of revision. 4. Put a structured revision schedule in place Organising a focused revision schedule enables a clear focus for students during their revision. “Research has shown that you gain more benefit from studying a topic if you break that study over a period of time rather than cramming it all into the same amount of time in one go.” Once a schedule is in place students can identify areas for improvement and tackle them strategically. Gap analysis is a fantastic model that helps students identify certain attainment scores that need to be met so that they can progress. Some students may struggle with their revision, but they will get support inside their school. What about those students who struggle to access mainstream education? How are they getting support with their revision? EDClass can help with revision for students learning at home EDClass prioritises online safeguarding of students allowing them to learn comfortably and at their own pace. Continuous assessment is provided throughout teaching and learning and instant feedback is supplied to students so revision is tracked and seamless. The platform also includes over 17,000 integrated lessons and 2,000 video lessons are available on EDClass TV covering the 2022 GCSE exam topics. If you would like some more information on how EDClass can help then please call 01909 568 338, send an email to [email protected] or book a free online demonstration here.
https://blog.edclass.com/4-tips-on-how-to-smash-gcse-revision/
Socalisation Periods in Foxes The experiences fox cubs have within their first two months of life are important in influencing their behaviour right into and throughout adulthood. This early period is known as the "socialisation period" and usually occurs in the safe environment of the den and its immediate vicinity. It is during this "socialisation period" that fox cubs will learn what is "normal" and "safe" within their environment, and everything they come across during this time is likely to be considered acceptable throughout their lives as a result. Equally, anything fox cubs do not come across during this time is much more likely to produce a fear response later in life. The greater the variety of positive experiences they have during this time, the more likely it is they will develop the necessary skills required to cope with novel experiences in the future. Socialisation periods vary between different species. The window of opportunity in dogs, for example, is much longer than it is in foxes. While foxes are canids, they have a socialisation window that is similar to that of cats. Socialisation should always be based on species specific information and studies have indicated that the socialisation period in foxes has been identified as being between 3-7 weeks of age. During this time, the cub’s brain and sensory system are still in development, and the stimulation they encounter will influence how they develop. Foxes do not have an inbuilt desire to be with people, (with the exception of the experimentally domesticated foxes), so the tolerance and desire to be around people is a learned behaviour. Early handling (by a variety of people) during this time is essential in order to socialise the cubs with humans. This must begin no later than 3 weeks of age and continue through to 6 weeks of age, before the onset of fear and hazard avoidance response begin at around 6-7 weeks of age in silver fox cubs. In wild foxes, the socialisation period begins at around 2-3 weeks of age and closes at around 4-5 weeks of age, at which point they begin to develop fear and hazard avoidance responses. However that period is longer in silver foxes (as long as 6-9 weeks), as studies have shown; "The physiological boundaries of the sensitive period of primary socialization were studied in the silver fox (Vulpes fulvus Desm). A total of 273 farm-bred foxes from 59 litters were observed from 1976 to 1978; pups were produced by vixens from two populations, one selected for domesticated behaviour and the other unselected. Results indicate that the age when the eyes are fully open, when the response to sound first appears and when exploratory behaviour is first shown in strange surroundings is 3 weeks, on average. The age when the socialization period starts appears to be 20–25 days old. The optimum period of the formation of primary social bonds appears to be 30–35 days, when maximum exploration in a novel situation is shown. The 40–45 days period appears to be the upper boundary of primary socialization in unselected foxes because pups show fear in response to novel stimuli, which prevents exploration. In pups from the population of domesticated foxes, the sensitive period of socialization is prolonged to over 60–65 days old" Domestication in the Silver Fox (Vulpes Vulpes Desm): Changes in physiological boundaries of the sensitive period of primary socialisation - Belyaev, Plyusnina & Trut, 1985 It is extremely difficult to socialise fox cubs that have had no human contact after weaning, and it is even more difficult again, after they have reached sexual maturity. While fox cubs kept as pets should enter the home environment before the onset of fear becomes established at around 6-7 weeks, it is worth bearing in mind that both genetic influences from the parents and learned responses from living at the breeders, will play a role in how friendly the fox is towards people once it matures. A good breeder will familiarise themselves with their breeding vixens, providing positive associations through gentle interaction from the onset of pregnancy through to weaning. They will begin spending time with the cubs, from around 2-3 weeks of age. Handling is introduced through stroking the cub before picking them up briefly and placing them back with their mother and/or litter mates. The time spent handling the cubs is gradually increased over the following weeks. Being born and raised in a breeder setting can present it's own challenges however, as the breeding environment may, as a result, be considered "normal" by the cubs, rather than the home environment and all the bustle that comes with it. A strict programme that requires owners to introduce and repeat various positive experiences is required to ensure such cubs develop the skills they will require to adapt quickly to their new environment, (before the socialisation window closes at 6-9 weeks). Studies have shown that handling fox cubs during their socialisation period closes reduces stress responses to handling later in life, influencing how friendly the fox will be and how willing it is to approach new people later in life. In addition to handling the cubs, gently performing health checks (such as examining the ears, mouth, feet and tail), will prove invaluable later in life when your fox attends the vet practice for their routine medical assessments. "The effects of handling from 2 to 8 weeks of age were studied in 32 silver fox cubs up to 6 months of age and compared with the behaviour and stress parameters of 46 control cubs, raised under normal rearing conditions.Differences in fear of humans and novel stimuli measured by three different behavioural tests, differences in exploratory behaviour measured in a open field test and differences in levels of plasma cortisol were revealed and attributed to the handling of the experimental group. The behavioural and physiological results showed that handled animals were less stressed, whereas control animals showed signs of long-term stress" Effects of early handling on later behaviour and stress responses in the silver fox (Vulpes vulpes), 1990 The process of both imprinting and socialisation allows a bond to be developed between animals and their human carers and can make the difference between a nervous adult that is fearful, and a confident adult that is comfortable in it's environment. One of the most important points to remember about socialisation, is that the experiences and interactions must be positive for each cub involved. It is also important to remember that no experiences are as damaging as negative experiences. Filial Imprinting In psychology and ethology, imprinting is a phase-sensitive learning process (occurring before a particular stage of development). It is a rapid process that is considered independent from other stages of developmental learning and behaviour (where young animals acquire the behavioural characteristics of it's parents), describing the "critical period" in which an animal learns to accept a stimulus, and therefore said to be "imprinted" onto the subject as a result. The concept that was first discovered in domestic chickens by amateur biologist, Douglas Spalding, but was made famous by the work of Austrian ethologist, Konrad Lorenz, who described the process while studying Greylag geese in the 1930's. "In the mid 1930s German ethologist Konrad Lorenz popularized filial imprinting, the process by which a newborn animal learns to recognize the unique characteristics of its parent, typically its mother. This phenomenon was termed imprinting (translated from the German wordprägung) by Lorenz's mentor, Oskar Heinroth, who believed that the sensory stimulus encountered by the hatchling was immediately, and irreversibly, "stamped" onto the animal's brain. Lorenz demonstrated this with his famous goslings, which had spent their first hours of life with him and subsequently followed him everywhere; as adults they preferred the company of humans over fellow avians" Newborns can Bond with a "Mother" of a Different Species - Scientific American, 2007 Young fox cubs also have a "critical period" in which they form filial attachments to whatever species they encounter, this critical period for kin recognition closes at around 3-4 weeks of age. Before this window closes, for imprinting to occur, the cub must spend as much time with people as possible. After this time has passed, young foxes must then learn to accept new and novel stimulus through repeated, consistent, positive exposure, preferably before the "socialisation period" ends at 6-7 weeks (or 8-9 for more domesticated foxes). Foxes whose critical period has passed can still learn to tolerate and even enjoy human contact, but they will not bond with humans in the same way as those who had human contact before this window closed. The difference can be compared to learning who your family is, that you are a certain species and learning who your neighbours and friends are, and that they are of a different species - for wild foxes, who are often raised in badger setts, (but only see their parents and relatives in the first few weeks), its accepting the presence of badgers, learning to respect their ways and being able to live comfortably around them, even forming social bonds with them as a result, but it's not the same as seeing them as family or a member of their own kind. While the imprinting process is simple in it's application (humans just need to be around the young during their critical period for it to occur), it is not as simple as it sounds; "Baby animals have an internal "preference" for things which physically resemble their real parents. Fox kits are "hard-wired" to bond preferentially with real foxes. They "know" what foxes are supposed to look like - if presented with fox parents and human foster "parents" simultaneously, they "know" which ones are the real parents and will bond preferentially with the adult foxes. Therefore, we must separate them from adult canids during this critical period so that optimal bonding with humans will take place"Socialisation and Related Processes - Management of the Red Fox in Captivity - Jessica Addams & Andrew Miller, 2007 It is also important to know that there can be unwanted side effects of imprinting later down the line when a young cub reaches sexual maturity. When an animal see's you as it's parents or family, they can become a lot more challenging during adolescence than those animals that see humans as interspecies friends. Foxes can become aggressive towards you if they view you as a "parent" that is refusing to let them leave home and develop, or they can even become protective and territorial, if they decided to view you as their chosen "mate" and your home as their chosen territory. This is down to a natural drive, that would normally be directed towards family members and others of the same species during this time, it is part of the normal developmental process in foxes. Foxes that do not see you as kin, will not direct this drive at you, though the hormonal changes will equally influence their behaviour during this time. Preparing for Your Fox Cub Fox cubs start their new lives in their new homes just before they complete the weaning process, at around 4-6 weeks of age. It is not advised, or legal, in the UK to purchase young animals before weaning is established (under the Animal Welfare Act 2006 - "able to behave normally" and "to be protected from suffering"), which means much of the socialisation process during the "critical period" is largely down to the breeder - highlighting the importance of good breeding practices. Leaving the comfort and security of the litter and starting life in a new home is a scary ordeal for young cubs. The circumstances in which they were born and the ability of the mother to protect and care for them, can influence how well they bond with people. A lot of patience and understanding is required in the first few weeks of bringing you fox cub home and it is important to remember, that although small, fox cubs can inflict painful bites and scratches when frightened. Foxes do not adapt well to change. Those caring for, or those considering taking on, a young fox cub should ensure they are fully educated on their unique needs and are well prepared for their new addition in advance. Tips for Preparation; - Prepare a room for your fox cub, stock up on fox food, training treats and toys, ensure you have at least 2 weeks off from work and social commitments (in order to ensure you have the necessary time to bond with your new fox cub, assisting them with their adjustment). - Pre-book a veterinary appointment for your fox cub with an exotic pet vet that can treat foxes in advance. It is best to collect your fox at a time that enables you to go directly to the vet for your fox's initial health check, worming treatment and microchip implant - taking your cub to the vet at this time means the visit occurs within the socialisation window, helping to reduce unnecessary stress later down the line. Whilst here, remember to book an appointment for any vaccinations that will be required in future. - "Fox-proof" the room, ensuring it is a safe, comfortable and quiet environment for your fox to be. Remove all wires and valuables, ensure windows can be secured from escape and add puppy gates to the doorways (use chicken wire to stop young cubs getting through gaps). - Use a travel crate as a bed to aid desensitisation and for the crate to be seen as a "safe place" into adulthood. Remove the door, so your fox does not feel like the crate can be used to contain them against their will, and add soft warm bedding (a soft toy to cuddle up to can also help to make them feel more secure). - Place the travel crate within an extra large dog crate, which will to allow you to safely contain your cub when necessary. Ensure all edges are secure and use a dog lead clip or lock to secure it closed (foxes, even cubs, are master of escape). - Place a large litter tray in the crate, so your cub has a defined toilet spot (you can also use this spot to contain them during the toilet training process, releasing them once they have eliminated). - Consider investing in a good set of animal handling gloves and sleeves (to prevent bites and scratches during the training process), and in a couple of animal herding boards (to help you "herd" young foxes back into their containment areas during training). - By 5-10 months of age your fox cub will be reaching adolescence and will require a 100 sq ft, secure enclosure (minimum per fox), so either ensure you have this in advance, or that you are able to provide for this need, when the time comes. From the age of 5-10 months fox cubs will also require neutering (if you do not intend to breed), so consider saving for this in advance. Bonding with Your New Fox Cub It can take anywhere between 2-8 weeks for fox cubs to bond with their new carers depending on their age and temperament. With the right care and training, it is also possible to successfully socialise foxes that are re-homed at 9 weeks of age and older, however, they may only bond with one person, be nervous, hard to handle and find it challenging living life as a pet. "All animals bond with their owners/caretakers. But there are steps that all owners should take to make sure they have successfully bonded with their fox. It's especially important to remember to be patience when bonding. Bonding with your fox can be as quick as in a couple of days. But it could even take months, or even longer. It is very different per owner and fox. If you take it slow and at their pace, you'll have a much better chance at success" Ten Steps to Aid Bonding; - When your cub is first brought to their new home, containment in a large dog crate, placed in a quiet and safe room away from noise, children and other animals for the first day or so is essential for their adjustment. Visit your fox as frequently as possible during this time, checking the litter box and the status of the crate (immediately clean the litter tray and replace soiled bedding or spoiled food, if necessary, and don't forget to wash your hands). - Once your fox cub is comfortable in their new environment, they can be let out into the secured and fox-proofed room for short supervised periods, in order to explore and adjust further, until they only need to be shut in their crate when necessary. Before opening the crate to change litter, food or water etc, ensure the room is escape proof. When you reach in to the crate, don't do so with outstretched fingers - curled fingers are less threatening. In fox cubs, caution overrides curiosity and they will defend themselves rather than investigate your fingers. As they become less frightened and more curious, you can attempt leaning in through the cage door and tempting them to play with you. - Well fed fox cubs are more relaxed, more tolerant and will sleep much more of the time compared to their hungry counterparts, so ensure you have a good feeding schedule to get off to the best start. Ensure newly weaned animals have constant access to fresh water, a quality animal milk or milk replacer and to quality dry puppy food (soaked if necessary), with tiny amounts of cooked chicken (ensure the puppy diet contains taurine, if not, add a small amount of kitten food in the mix to compensate). - For the first few days, spend time as much time with your cub as you can - without trying to handle them - speak and move softly, reward them with verbal praise and offer them a tasty, suitable treat if they interact with you. Once they are comfortable with you and their environment, provide them with free access to the room in the morning when you feed them, placing them in the crate only if necessary (such as overnight for their safety). A radio or TV can be left on quietly to get your cub used to the sound of different human voices. Cloth rubbed with the scents of home, or from the people and pets they that will now be a part of their lives can also be used to help them with the adjustment process. - Learn to read you cubs body language and respect what it tells you. Frightened cubs may bite out of fear. If you notice any fear signals such as aggression, give them more space and slow down your socialisation process. Encourage your fox cub to play with you by using a variety of stimulating toys and playful noises, (play is a process all animals have to learn, and you are now your cubs tutor). After play sessions have ended, reward your fox cub with verbal praise and a treat for positively interacting with you. Play is a great way to earn trust. - When acclimatising your cub to your presence, the goal is that they initiate the first contact. Fox cubs will most often do this by climbing over you and by mouthing and pawing at your clothes and hands. You can help encourage such contact by playing with toys and by dropping tasty food rewards. Eventually they will overcome their fear and will be climbing all over you, but beware, as small fox teeth and nails can be sharp! If they apply too much pressure "Yelp!" and cease the contact by moving back. - Once your cub is initiating contact, you can begin getting your fox used to you being the one to initiate contact. Begin by getting your fox used to the presence of your hand and reward them for tolerating the presence of your hand for short periods by removing it. Gradually decrease the proximity as your cub becomes comfortable with each previous stage. Once your cub is happy with your hand being close, you can being getting them used to petting by gently stoking them for a few seconds. Remember not to approach from the front, as your cub may lash out in self defence. Instead approach from the side (keeping fingers tucked in) and repeat the process several times a day. If you cub panics, stop stroking them, continue to talk reassuringly and remain confident. If you cub thinks you are scared, it may start to resist your advances. - Once they are comfortable with petting, you can begin to make attempts to handle them. Securely, but gently, grip by the nape of the neck, and with a towel or soft bedding in your lap, place the cub down gently (you can also wrap the cub in a towel or soft fleece when you pick them up). Move your hands slowly when handling them, as they may not have yet made the connection between the hands and the nurturing and bonding that takes place through them, and to begin with, gloves and/or protective sleeves may be necessary. Stroke the cub gently while speaking in soft reassuring tones, until you feel the cub has relaxed. Once they have relaxed, release them if they wish, or if they fall asleep, you can snuggle up for a cuddle until they wake. If the cub panics, put the place them in their crate and in the next session go back to the previous stoking phase until they are confident with this before attempting handling again. - Before feeding and before play ensure you interact with and/or handle your fox gently, in a manner they will tolerate for a few moments. This ensure they develop positive associations towards handling that are connected to their care and well-being. After feeding, after play and after waking, ensure you place your fox cub in their toilet spot (do not restrict them for toilet training when they are first learning to bond with you). - When your cub has adjusted well and is playing and responding to you in a trustful manner, it is the time to encourage friends to visit and handle them as often as possible. Socialization with other people is essential to ensuring they are able to tolerate new people and situations. Fox cubs need plenty of contact with people - not just physical contact, but just the presence of people nearby without contact is just as important. Get people to walk past or sit around chatting, apparently ignoring the cub, this way, the cub learns that these strange humans aren't a threat to them. Note: A small proportion of fox cubs may remain untamed, despite a breeders and owner's best efforts. This is due to genetics, a fear and mistrust of man that is passed down from their parents line. It is best not to continue making attempts to "domesticate" such an animal, instead it is best to provide a large secure enclosure with lots of species specific enrichment to keep them entertained. It is also advised to neuter such animals from 5 months, to ensure hormonal changes do not add to the frustration of captive life, as well as ensuring that the fearful genetics are not passed on to future lines of animals intended to be kept as pets. Feeding Your Fox Cub (over 5 weeks) Ensure newly weaned animals have constant access to fresh water, as well as to a quality puppy milk or milk replacer (follow the directions on the container and top-up or change, as necessary), at all times. It can be difficult for new fox owners to know what to feed their fox cub, but it is best to start simple and consistent. Quality puppy food (wet and dry - soak dry food if necessary), with tiny amounts of raw and boiled chicken can be used as a staple diet 3-4 times daily. Other foods, such as insects, rodents, day old chicks and eggs (both cooked and raw) can then be introduced gradually into the diet. All the food used should be of a high quality and kept fresh. Ensure you keep all food and water bowls clean, washing them thoroughly after each use. Fox cubs can eat 3-4 pouches of wet food per day and sometimes more. This can be in addition to milk, chicken, dry food and treats. Do not be concerned about their eating as much as they like. They are growing and need a lot of nourishment. When first introducing newly weaned cubs to the milk supplement and puppy diet, take your finger and dip it into the bowl and wipe on the lips or side of the mouth. You need to make sure they can eat and drink the food without choking on it or coughing. The bowls or dishes should be low and wide for easier access. The milk builds the immune system and is essential for those cubs not completely weaned. Check the stools for diarrhoea, signs of constipation or worms and be sure they show no difficulty in urinating, such as straining. Special attention to the keeping the litter tray clean is necessary, as many cubs will lie in the litter tray for reassurance. They have not made the total connection that the litter tray is only for litter and prefer to play and lie in the box as part of their safe place to be. Social Learning and Habituation Observational learning is a process of social learning where an animal learns from observing the behaviour of others. "Socialisation", generally refers to animals getting used to people and/or other animals (animate stimuli) but another essential aspect of socialisation is habituating the cubs to inanimate stimuli such as a variety of novel objects and household sounds, utilising a process is known as "social referencing". Social referencing occurs when an animal's first response to a novel stimulus they are unsure of, is to gauge the reaction of others within the social group (a form of imitation). This behaviour allows animals to ensure they avoid making costly mistakes and teaches them valuable lessons, by relying on the experience of others. Showing your cub you are comfortable with lots of different sounds, sights, situations and people, will help them to learn from your example. Habituation is the process whereby an animal becomes accustomed and desensitised to different environmental factors (such as; sights, sounds, smells and objects), through repeated exposure. When habituating your cub to new things, remember to include experiences that involve all the fox’s different senses and don't forget to interact with things you want your cub to explore, for example: - During weaning, provide increasing amounts of solid food, introducing a variety of flavours and textures. Show them new foods are safe by eating some (or by pretending to eat some) and then sharing it with them. - Provide a variety of safe floor textures and climbing surfaces for the cub to walk on - Provide a variety of natural and man-made toys for them to explore and play with them in their view - Different scents can be collected on a clean cloth by rubbing it on other animals and people, allow them to see you interacting with these people and animals. - Provide a variety of new objects in different shapes and sizes that can be investigated, allow them to see you manipulating and interacting with these objects. - Novel sounds can be provided by utilising kitten and puppy socialisation CD's . Ignore these different sounds as you intend them to, if they react to something they hear, do not draw attention to it. In short, early handling produces friendlier foxes and studies have shown that this is important for the long-term welfare of the fox. Socialised foxes showed relaxed behaviour when approached by an unfamiliar person. In comparison, unsocialised fox cubs showed signs of distress in the same situation. It is therefore crucial that foxes intended to be kept as life-long companion animals are given plenty of opportunity for sufficient socialisation from the first 2-3 weeks of age right up until 7-9 weeks of age (and beyond). The Importance of Socalisation In addition to improving welfare, another benefit of socialisation is the effect it has on increasing the human-animal bond. Although there is some individual variation, the critical socialisation period appears to spontaneously come to an end at about 7 weeks of age, so the responsibility for socialising the cubs during that narrow window of opportunity lies predominately with the breeder or rescue centre. However, it is necessary owners to continue the socialising and social referencing process with positive experiences into and beyond this window closing, at around 6-9 weeks of age. Definitions of the Basic Terms used when Rearing Fox Cubs; - Hand-Rearing - the rearing of a young animal by humans. Does not produce imprinting, unless exposure to humans for the purpose of rearing occurs during the "critical period", but it does socialise cubs with humans during the "socialisation period". - Critical Period - the first few weeks of a fox's life, in which it will "imprint" on people or animals during this time, viewing the source as a "mother" figure. In foxes, this critical period begins at birth and lasts up to 3-4 weeks. - Imprinting - the exposure of a juvenile animal to humans during it's "critical period" in order to get them to accept humans as lifelong caregivers. If exposure to other canids occurs during this time, fox cubs are much more likely to imprint on those instead. - Socialisation - the process of exposing an animal to humans, their environments and to new situations. Repeated positive exposure allows confidence to be build and for trust to be formed. Socialisation can occur at any age, but is much more successful if done during the "socialisation period" when cubs are naturally trusting. - Socialisation Period - the time when young fox cubs learn to accept what is a normal part of their everyday environment, which begins at 3-4 weeks and ends by 6-7 weeks of age, (or possibly up to 8-9 weeks for some foxes). Once this period closes, cubs become naturally more reactive and fearful towards things they have had no previous exposure to. - Social Referencing - the association of how to respond to a novel object or situation based on the reaction of others within the social group. (Previously, the term "social referencing" has been applied to describe the process of habituation). - Imitation - when an animal observes and replicates the behaviour of another animal, adapting their behaviour as a result. It is a process that facilitates the transfer of information across species and generations. - Habituation - Habituation is where an animal, after a period of repeated exposure to a stimulus, without immediate consequences, stops responding. Habituation is important in complex environments, by habituating to less important signals, an animal is able to focus it's attention on the most important aspects of its environment. - Fear/Hazard Avoidance Response - after the socialisation window closes - anywhere between 6-9 weeks - young foxes naturally begin to display fear and avoidance responses. This increase in fearfulness is a gradual process, but more reactive foxes will develop this fear and hazard avoidance response earlier. - Flight Distance - the distance an animal is comfortable maintaining in your presence - outside the flight zone there is no movement, move into the flight zone and you will get movement away from you as the animal re-establishes it's desired distance, (or "fight" if there is no option for flight). - Taming - the reduction of an animal's "flight distance" to allow human contact. An animal can be tamed at any age and all animals can potentially be tamed, wild, domesticated or otherwise. Socialisation occurs concurrently as the animal interacts with the people taming it. - Domestication - the selective breeding of an animal or plant by man, for specific desired traits which are genetically ensured to pass on to future generations; this can be for traits such a coat colour (creating colour morphs that could not exist in wild populations), or for behavioural traits (such as tameness towards humans).
https://www.blackfoxes.co.uk/socalisation-periods-in-foxes.php
This award acknowledges the value and need to recognize outstanding school business managers in Wisconsin and their contributions to public education. The purpose of the School Business Manager of the Year award is to recognize the recent (within the last five years) outstanding contributions of the recipient to their local school district and community and to the business manager profession. The individual will be recognized for implementing innovative projects within their district, improving systems and processes to improve efficiencies, and/or forging creative partnerships with their community and improving student learning. (Nominations for career accomplishments should apply for the Wallace E. Zastrow Award.) To be eligible the nominee must: Selection criteria will be based on candidate contributions. The examples below are only a sampling of possible activities/projects and are not a comprehensive list. Leadership in the Schools – The nominee has dedicated her/himself to improving the learning environment for students through: The WASBO Board of Directors considers nominations at its Board meeting following the nomination deadline and selects the award recipient. The Board of Directors will review all nominations submitted annually. Nothing in the award description prevents the Board of Directors from honoring two (2) co-equal School Business Manager(s) of the Year if the Board of Directors, upon reviewing all nominations, determine that two co-equal awards should be granted. If the Board determines to recognize two co-equal nominees, each recipient shall receive identical recognition. It is not necessarily the intent of the Board of Directors to recognize two recipients every year. Awards each year will be based on the nominations presented for consideration. The Board’s decision is final.
https://wasbo.com/WASBO/About_Us/Professional_Recognition_Details/School_Business_Manager_of_the_Year.aspx
Magnetite Mines Executive Chairman Peter Schubert has provided the company with a $200,000 loan. The loan is under a Convertible Loan Agreement and has a 5 per cent interest per annum. The company can pay back the loan after six months. The funds will be going towards general working capital requirements. Magnetite Mines is an exploration and development company that is focused on its iron ore project, Razorback, in Braemar, 250 kilometres northeast of Adelaide, South Australia. Razorback Project is a 3.9 billion tonne iron ore project in east Braemar and is surrounded by 1,791 square kilometres of mineral exploration tenements. Since 2009, Magnetite has invested $35 million in the project which has included; 52,000 metres of drilling and completing a positive pre-feasibility study. Magnetite Non- Executive Director Mal Randall is pleased and thankful with the loan from Peter. “The board appreciates Peter providing the company with a loan at a stage. Where the company is completing an investigation in relation to a low-capital, low tonnage start-up available at the Razorback project and surrounding areas exploiting the higher grade mineralisation together with established mining related infrastructure,” Mal said. Combining the Razorback Iron Project and Ironback Hill resource estimates, the company’s total Mineral Resources inventory in the Braemar stands at 3.9 billion tonnes at 19.7 per cent of iron ore. Iron ore is the production of iron, most of the iron produced is created into steel. Steel is used to make automobiles, ships, beams in buildings, furniture and thousands of other everyday items.
https://themarketherald.com.au/magnetite-mines-secures-200k-loan-from-peter-schubert-2019-09-16/
How much does an Energy Dispatcher make in Georgiana, AL? The average Energy Dispatcher salary in Georgiana, AL is $65,599 as of April 26, 2022, but the range typically falls between $50,096 and $67,389. Salary ranges can vary widely depending on many important factors, including education, certifications, additional skills, the number of years you have spent in your profession. With more online, real-time compensation data than any other website, Salary.com helps you determine your exact pay target. Energy Dispatcher determines generation requirements and controls the volume of gas to meet obligations. Focuses on optimizing economics to ensure minimum energy supply costs. Being an Energy Dispatcher requires at least an associate degree. Typically reports to a supervisor or a manager. To be an Energy Dispatcher typically requires 3-5 years of related experience. Has gained proficiency in multiple competencies relevant to the job. Works independently within established procedures associated with the specific job function. (Copyright 2022 Salary.com)... View full job description See user submitted job responsibilities for Energy Dispatcher. Salary.com's CompAnalyst platform offers:
https://www.salary.com/research/salary/benchmark/energy-dispatcher-salary/georgiana-al
kalaii is a brazilian creative studio of pattern and design, founded in 2016 by Juliana Kalaigian to put in practice her passion for art and design. tapping into the expertise of the designer, kalaii builds exclusive patterns which can be easily transferred to decor items, fashion, stationery, and others. mandalas, geometric representations symbolizing the dynamic relationship between man and the universe, are the background for the studio's creations. their shapes and lines allow for an infinity of color applications, different tones and textures, creating special forms with unique plasticity. kalaii's StoreFilter Sort by:
https://society6.com/jukalaii
BJP NATIONAL EXECUTIVE BJP Hurt attack On spot: Rahul Gandhi in Kolkata after the flyover collapse | Salil Bera MLAs in Congress-run states dissent as party leadership fails to hear their concerns Party leaders say while Rahul Gandhi has been effective in raising issues against the Modi regime, he should focus more on party affairs. Former Uttarakhand chief minister Vijay Bahuguna, who is now leading the rebel group, waited for two years to get Rahul's appointment. March 28 saw a spurt in activity at 10 Janpath. Himachal Pradesh Chief Minister Virbhadra Singh finally managed to meet Congress president Sonia Gandhi after three months of waiting. The same day, Sonia decided to change her party's president in Manipur. That very day Uttarakhand, where the Congress government was besieged with rebellion, was put under president’s rule. The jolt of losing a second state to president’s rule in a span of two months, the first being Arunachal Pradesh, has pushed the Congress leadership to display a much greater sense of urgency in dealing with dissidence in the other states where it is in power, especially Himachal Pradesh and Manipur. In two months, the number of states ruled by the Congress has come down from nine to seven [including Karnataka, Mizoram, Meghalaya, Assam and Kerala], and the threat of losing more to the BJP's formula of toppling Congress governments by joining hands with rebels looms large. This has drawn Sonia out of her semi-retirement mode, and there is a newfound eagerness in the party leadership not to let dissent against its chief ministers turn into full-blown rebellions that can then be happily exploited by the BJP. In Arunachal, rebel leader Kalikho Pul has since formed government with the support of BJP MLAs. And, the BJP forming a government in Uttarakhand along with the rebel MLAs is pretty much in the realm of possibility. Vijay Bahuguna | PTI A similar situation threatened to unfold in Himachal Pradesh. The beleaguered Virbhadra, who could be arrested on corruption charges being investigated by the Enforcement Directorate, is facing unprecedented dissidence. He was known to wield a strong control over the party in the state, but with his position weakened, other leaders are fancying their chances. Several CM contenders have sprung up in the state unit, foremost among them being Kaul Singh Thakur and Congress secretary Asha Kumari, who is an MLA from Dalhousie. Last October, four MLAs skipped the meeting Virbhadra had with Sonia, which was intended to be a show of strength after the Central Bureau of Investigation raided his home. At a dinner hosted by him recently, several MLAs did not turn up. He is reportedly not on the best terms with the party high command. In the 68-member assembly, the Congress has 36 members, and is supported by four independent MLAs, who are being wooed by the BJP. At least 15 MLAs are against the chief minister. Virbhadra informed Sonia that the dissident MLAs were in touch with the BJP. Dissidents complain that Virbhadra, like former Uttarakhand chief minister Harish Rawat, runs the government in a dictatorial manner and has been unfairly accruing benefits for his family. A dissident MLA said Virbhadra got a Lok Sabha ticket for his wife and made his son in charge of the state unit of the Youth Congress, but the other leaders did not get such benefits. Sonia has instructed Ambika Soni, the general secretary in charge of the state, to talk to both the factions and iron out the differences. Soni then called a luncheon meeting of the extended coordination committee of the party. Among the attendees were Himachal Congress chief Sukhwinder Singh Sukhu and leaders like Viplove Thakur, Rangila Ram Rao, Kaul Singh Thakur and Kuldip Kumar. Meanwhile in Manipur, Sonia met 25 dissident MLAs and agreed to their demand for a reshuffle of the Okram Ibobi Singh cabinet. Around ten of them hope to become ministers before the assembly elections, which are due in ten months. The Congress had won 47 of 60 seats in the last assembly elections. There were more seekers for ministership than the ministries on offer. As a way out, the chief minister had promised a mid-term cabinet reshuffle. But that did not happen. The dissidents had threatened to join the BJP or even form their own party if their demands were not met. Sonia is learnt to have called the chief minister to Delhi for discussions. Another major demand of the dissidents was that Deputy Chief Minister Gaikhangam Gangmei be either sacked from the cabinet or removed from the post of PCC chief so that the 'one-man, one-post' policy is followed. T.N. Haokip has now been made the PCC chief. The Congress is also wary of the disturbing developments in Karnataka, the one major state it is in power. With the Siddaramaiah government completing half of its term, unrest among party legislators is becoming more pronounced. In March, half the party legislators had skipped a meeting called by the chief minister. A cabinet reshuffle appears inevitable if Siddaramaiah has to quell the dissent in the party, which is already divided into 'original' Congressmen and the 'outsiders' led by Siddaramaiah and his Janata Parivar brethren. The latest demand for a cabinet revamp is coming from a handful of MLAs who are rumoured to have met BJP leaders, seeking to cross over to the saffron party before the 2018 Assembly polls. Siddaramaiah is likely to visit Delhi soon to decide on the reshuffle. Home minister and Congress state president Dr G. Parameshwara, when asked about a cabinet reshuffle, said: “It is the prerogative of the chief minister.” Kaul Singh Thakur is a CM contender in Himachal | PTI Sidddaramaiah is also being cornered by veteran Congress leaders like S.M. Krishna, Janardhana Poojary, Mallikarjun Kharge and M.V. Rajasekharan over what they say is his dictatorial style of functioning. Krishna met Sonia recently to complain about the same. The chief minister, said dissenters, is surrounded by his own coterie of ministers and advisers. The leaders joined the opposition in openly criticising Siddaramaiah over his expensive watch and the hasty formation of the Anti Corruption Bureau, which allegedly weakened the Lokayukta. The BJP plan, said Congress leaders, is to get dissidents on its side, especially in smaller states where it is easier to manipulate numbers, destabilise the Congress government, establish president’s rule, and because it will not be possible for the Centre to get it through Parliament as it is in a minority in the Rajya Sabha, try and form the government with the help of the rebels. “There are a lot of people who dissent against the leadership—be it at the Centre or at the state. Even at the Centre, where there is a full majority government, isn’t there a lot of dissent within the BJP [on] how this government is being run? But that does not mean that we use money power and muscle power to bring down the government,” said Congress leader R.P.N. Singh. Congress general secretary V. Narayanasamy, who is in charge of the northeast, said the BJP’s modus operandi was to appoint a friendly governor first, stoke rebellion and then dislodge constitutionally elected governments. BJP leaders, however, said that being politicians, they could not be expected to sit back and let political opportunities go by. “It is not in Amit Shah’s temperament to sit back and watch,” said a senior BJP leader. BJP spokesperson Shrikant Sharma said: “The Congress should introspect. Sonia Gandhi should introspect. The Harish Rawat government fell because of its own sins. The Congress legislators are on their own breaking away and coming to us.” However, there is a view that the Congress leadership could have thwarted the dissidents from joining hands with the BJP. Dissidents from Uttarakhand said the party high command did not pay heed to their grievances. A dissident MLA said that the party general secretary would put her hands up, saying she could not do anything. In Arunachal, too, the rebels said they had been trying to get the attention of the Congress leadership for months. They even camped in Delhi for four months, waiting to meet either Sonia or Congress vice president Rahul Gandhi. The dissidents in both Arunachal Pradesh and Uttarakhand complained that Rahul did not give them time. The Arunachal rebels finally got a chance to meet Rahul on February 6, but president’s rule had already been imposed in the state by then. Former Uttarakhand chief minister Vijay Bahuguna, who is now leading the rebel group against Rawat, waited for two years to get an appointment with Rahul. Himanta Biswa Sarma, former minister of Assam, quit the party and joined the BJP last August. He said in a letter to Sonia: “There is dearth of inner party democracy in the Congress today. When I had humbly told Rahul Gandhi that... 52 out of 79 MLAs categorically and emphatically sought ouster of Tarun Gogoi [in Assam], he answered so arrogantly that it is his prerogative to change the chief minister.” A party rebel from Uttarakhand, Harak Singh Rawat ,said, “There were so many serious issues with the Harish Rawat government. There were problems with the liquor policy, the mining policy and illegal sand mining. Who do we complain to? Rahul Gandhi does not give time to anyone. We have raised these issues several times with Soniaji and with Ambika Soniji, but to no avail.” Graphics: N.V. Jose S.M. Krishna is also learnt to have told Sonia that Rahul should take out more time to meet party leaders and workers. Party leaders feel that while Rahul has been effective in raising issues at a national level against the Modi regime, he should focus more on party affairs, more so because the BJP is out to discredit the Congress governments. However, Narayanasamy said Rahul had met both groups of Arunachal MLAs and told them clearly that their concerns would be looked into. “He asked me and Kamal Nath to talk to them and discuss their issues. But the MLAs had already decided what they had to do,” he said. “How can you meet the MLAs when you know that they are hobnobbing with the BJP?” Congress sources said had party strategist Ahmed Patel been active, rebellion would not have happened, especially in Uttarakhand where Bahuguna is considered to be close to him. Ambika Soni said there were no easy solutions to the problem of dissidence. “There are differences, no doubt,” she said. “But we are not talking about ideological differences. We know why they are angry. One person wants to be Rajya Sabha member. There are others who want more resources for their areas. There are others who want to be made ministers or parliamentary secretaries. Either the Congress will resolve these differences or they will go their way.” A senior leader said Bahuguna wanted nomination to the Rajya Sabha and was demanding a ticket for his son, who has always lost. First-time MLAs Pradip Batra and Umesh Kau wanted to be made ministers. They were made chairmen of boards, but were not satisfied. With the party's poll prospects looking rather grim in Kerala and Assam, the Congress cannot afford to lose its hold in the remaining states. It plans to hold protests at all district headquarters against the alleged misuse of power by the Modi government in imposing president’s rule in states ruled by it.
A group of Libyan Muslim scholars have formed the nation’s first legal Islamist party with a view to rebuilding Libya based on Islamic sharia law, a statement from the new political entity said Monday. The Party of Reform and Development (PRD) was formed on Saturday in the eastern city of Benghazi and is chaired by former Muslim Brotherhood member Khaled al-Wershefani. Members of Muslim Brotherhood attended the party’s inauguration, but the statement said it “did not depend on any particular party”, referring to the Brotherhood. The PRD is an “Islamist party committed to the principles of Islamic sharia” and aims to work for establishing a state based on institutions, the statement said. “We aim to focus on national unity and build a Libyan state which is modern, civilised and developed and which does not exclude or marginalize anyone,” Wershefani told AFP. But he added that the party would refuse to deal with any group which “contradicts sharia,” referring to the secular and liberal factions in Libya. The creation of the new party comes just days after Libya’s new rulers scrapped a law under the regime of Moamer Kadhafi that banned forming political parties. Since Kadhafi’s ouster several parties have been established in Libya, with others created during the rebellion itself in Benghazi, the city which first rose against his rule. Libya’s Islamists, who say they want to promote moderate Islam, are a rising political force in post-Kadhafi Libya. The Muslim Brotherhood held their first public convention on Libyan territory in November. It has said it does not intend to form a party for now, but has invited its members to participate in political activities.
https://www.moroccoworldnews.com/2012/01/22282/libyan-muslim-scholars-form-first-islamist-party/
Traveling Death's Door With over 275 shipwrecks, the waters of Door County offer amazing historical sites and stories. Known for taking lives and many vessels, it’s a wonder why the waters dubbed “Death’s Door” remain such a popular maritime passageway. While traveling through this area does present its own challenges for boaters, the tragic stories of shipwrecks are now more the stuff of legends than reality. Located between the northern tip of the peninsula and Washington, Pilot, Plum and Detroit Islands, is the passage known as Death’s Door. On any given occasion, boaters and sailors can run into challenging conditions like strong currents, unpredictable winds, hidden shoals, sandbars, and rocky shores, all elements that make navigating the waters even more difficult. And all reasons why many boats have lost their way. The origin of the name traces back to the Native Americans inhabitants who referred to the passage as the Door of Death after losing many men and canoes in a battle against the Winnebago tribe. The French adopted the name and began to label their maps Port des Morts, which roughly translates to Death’s Door in English. The name stuck and inspired the title for the entire county. Native inhabitants and early settlers crossed the treacherous waters on canoes, while larger boats followed, but the rough waters made it difficult to maneuver, sinking schooners and sail boats during storms. Some ships sank, some were run aground and others have seemingly disappeared altogether. While tragic, these rough waters have led to a rich maritime history in Door County. Baileys Harbor was discovered by Captain Justice Bailey in 1848 after having to pull into a harbor for safety. Lighthouses were erected as early as 1848 throughout the area to mark land and guide ships safely. But despite the addition of lighthouses, the number of shipwrecks continued to escalate due to the increasing amount of shipping lumber through the lake. In the fall of 1872, over 100 large vessels were stranded or damaged in Death’s Door. Due to the high number of wrecks, the government, U.S. Coast Guard, and more organizations were created to help protect ships on the Great Lakes. With today’s modern boats, weather forecasting, and mapping systems, boaters can safely travel the waters of Death’s Door. The Washington Island Ferry does so numerous times a day. Test the waters on a boat tour and see some of the fascinating shipwrecks from the 1800s. Sign up today! Visit Door County virtually with monthly newsletter updates. Each issue is jam-packed with vacation ideas, special offers, recipes, festivals, events, and more.
https://www.doorcounty.com/newsletter/july-2016/traveling-deaths-door
Hi everyone, I recently saw a post that asked the infamous “How do I create a ‘game’?” question that clutters this forum not infrequently. Something caught me, before I replied with the go-to answer that essentially demands the user to clarify their goals and start smaller. There is a reason that people ask this question so often, and perhaps we can give better advice. There are different categories of beginner’s post that we see, some of which are outlined below: - I would like to copy an existing game. But better. - I would like to produce a (massive) multiplayer game, with a single man team. - Are there any tutorials on how to make a game? - I have an idea (four lines later) I need team members, please join. Some of these examples are a little overstated, but they demonstrate some different attitudes that we see from new (and existing) forum members. A few points need to be clarified to give context to the stance of the members of this forum; - We are all here for mutual benefit. Otherwise, there is no reason, no necessity to be a member. - We are here on a voluntary basis. We are not obligated to help anyone, but we will nearly always, because of the aforementioned clause. (And because it benefits us in the long run). - The older members of this forum, whether they have shipped a game, finished a game, or even started a game, have quite a lot of authority in the realm of the anticipated success of a project. “They’ve seen it all”. I am by no measure the best developer here, but I believe that I have been here for a substantial period of time, during which I have experienced many failures and successes, of myself and other teams. So, this thread will be split into three different categories: - Where to start. - How to encourage people to work with you. - Points to consider Where to start? If you’ve never created a game before, then it helps to think about what a game is. Most people’s definition of a game is an interactive experience. This necessitates a few areas of game design and development already: - Facilitating an interaction - Communicating the result of an interaction. These two aspects of development are intentionally vague. Games can be conceived with entirely different storylines, interactive interfaces and purposes. But these traits are still ever present. It is important to remember that the above points are dependant upon the concept of the game. For most developers, that is the place to start. Some starting points for game concepts are: - What is the purpose of playing the game? What experience will the game bring to the player’s life that doesn’t already exist in one form or another. For FPS games, it is often the feeling of immense importance and dominance. This aspect of the game will help infer a genre. - In what way will the player interact with the game? Usually the interaction mechanics stem from the concept, but some games (such as Portal) are shaped around the interaction mechanics more so that the reverse. When people start creating interactive experiences, it is not uncommon for them to become so ensnared by the interesting experience of creating a game, that they forget the most important person of all; the player. Underlying programming and technology is interesting for the developer, but only the consequences of its implementation will interest the player. So, where do you start? Well, it is conventional to develop a storyline, with a subset of experiences you wish for the player to play through. As I have said, this is only convention. The most important aspect of designing a game is to have a single unique concept that you can build a base upon. If you start with a unique storyline, then writing a detailed series of scenes, chapters or experiences will be important when you come to write the GDD. If you design an interesting weapon, or tool then defining a subset of possible interactions and results will be useful. It is important to remember that this first step should be evident throughout the entirety of the game’s development cycle. If you decide for centralise the game around a tool’s mechanics, then the majority of the experiences should necessitate the use of such mechanics implicitly, rather than by blind obligation. At least, it should be the case that the player wants to use the interaction method that they have been given, rather than being forced into it. Recreating an existing game concept is a challenge, technically, but it doesn’t offer much stimulation for the player, who will inevitably compare it to the original experience. It is very difficult to better a previous experience because you will either fail to meet the original design, or you will add a new experience which detracts from the original concept. How to encourage people to work for you Before we answer this question, there are a number of criteria you should meet, and ask yourself if you do! - Do you have a game design document? - Do you have a drive for quality? - Are you able to organise and commit time and resources? - Do you have realistic goals? Writing a game design document is important, but not as great a challenge as one might expect. Here are a number of useful links: - http://bbrathwaite.wordpress.com/2008/11/30/creating-a-game-design-document/ - http://www.gamasutra.com/view/feature/3224/creating_a_great_design_document.php The purpose of a GDD is to denote everything that drives the game’s mechanics. It must outline the mechanics, the benefits and possible negatives of each mechanic. As well as this, taking the philosophy “If it’s not in the GDD, it’s not in the game” is a good way of setting the mood for writing. You don’t need to reference all the details in geometry for example, but enough that one could imagine the level is a good sign. The GDD isn’t solely there to educate new team members. It provides you with a features set that you would like to realise by the end of the process, and it helps keep you on track when distractions, confusion and scale can get in the way of the process. It’s a reference for all development questions like “How tall should this doorway be?”, which really is a question of “Who built this doorway” and “Who uses this doorway?”. Some additional comments Asking the big question can be a challenge. Especially with no prior evidence. We all start there some day. I was lucky, and found good team members, but I wasn’t ready for the challenge of a First Person Shooter. No one actively challenged me on that basis for a long while. This was a mixed blessing. I learned from my own failures, and no time could be considered a waste. But equally, If I had known the scope, I could have perhaps produced my own smaller game or two along the way. You need to tell us what you are looking for in your game. You need to tell us why you need others to help. You need to explain what they would be asked to do, what they will / will not receive in exchange for participation. You need to outline how long you expect the game to take, how you will organise meetings, how you will involve the perspectives of the team members. So many people will write “Maybe, if I make money you guys can have some too”. That’s not a promise. You should start with “I intend to sell this game on N platforms” or “This will be a free download”, and mention the purpose of creating this game; “To realise a dream of mine” is very different from “To make many $$$”. A good blog to follow is Extra Credits. They demonstrate a strong insight into the entire process, from concept to distribution. Some say that a common issue with new developers is that they aim too high. I disagree with this. We all aim high, and it’s a good thing to do. I think instead we should say that they rush to the end, too quickly. Never loose sight of your goal, and play the long game. It’s important to realise that these things require lots of different skills, and the road is long. But at the end of it all, it is worth it.
https://blenderartists.org/t/creating-your-first-game/597462
In my most recent book, Finding Hope In The Darkness Of Grief, I wrote a statement in the foreword section of the book that I will be elaborating on. Following is what I wrote. This three dimensional plane offers much for us to learn: happiness, wisdom, understanding, pain, loss, heartbreak, wonder and enlightenment. It is a Pandora's box of emotions, situations, opportunities, and failures, all wrapped into a package we call life. Nobody is immune. Why did I write Finding Hope In The Darkness Of Grief? I decided to write Finding Hope In The Darkness Of Grief to help my readers come to terms with hardships they've faced in life. Life has a way of creating a roller coaster effect for us. Some days we're high on life, laughing, content, fulfilled. Then come the days when we're angry, hurt and bitter. The hard days will always come because that's how we learn. We each have a purpose. Each of us was created to leave a footprint on this planet that will remain long after we're gone. The only way we can leave that footprint is by finding out who we are and what we do best in the most positive sense possible. Our experiences in life are the ways in which we learn. When we realize what our talents are, we can lean on Spirit to help us make our destinies come to pass. Living your purpose is a beautiful thing. Have you ever felt the amazing beauty of beholding something only you could do? Whether it be a child you've had, something you've created, a way in which you've helped someone else or a tribute or talent you've shared with the world, something you-and only you-could do? The feeling is monumental. Awesome. Fulfilling. A reason why you have been set upon this planet for such a time as this! We are so diverse as a species. The human race is so talented and abundant that the possibilities of destiny cover a huge range of ideas, circumstances and situations. Some of us are born to help the environment, others to bake, still others to sing and dance and create beautiful things. The sky is the limit where human potential is concerned. And what you've been set here to do is what you love. What you gravitate to. Life has a way of honing your skills until they're ready to be unleashed upon society and the planet. We each have been called to learn. Without the valleys of heartbreak and the mountains of happiness those talents aren't defined. We all need the wisdom, understanding, compassion, gratitude, forgiveness and awareness that refines our capabilities so that we contribute our absolute best. That means experiencing the good, and bad, in life. Spiritual insights are valuable ways in which to grow. I share spiritual insights in my book that I've learned through living. Things that have spurred me on to bigger and better aspects of life. Sharing the bliss of your best is a momentous occasion in which to prosper. Spiritual truths guide and heal. Spirit's love improves and expounds upon that which you have been born to complete. With the help and vision of clarity from these insights, I have found that I am able to contribute on a larger and larger scale. It is my hope that you will be too. We need you! We are all important parts of the whole!
https://www.diamantelavendar.com/blog/life-is-a-pandoras-box-excerpt-from-finding-hope-in-the-darkness-of-grief
The New Zealand flora comprises proportionately more alien species than anywhere else on Earth. Many of these species are ‘sleeper’ species, currently not invasive but with the potential to become so. Understanding what traits lead to sleepers becoming invasive is a key question in invasion biology. One hypothesis is local adaptation — that is, selection pressures in an alien habitat select for certain genetic traits favouring species spread. In New Zealand, the semi-aquatic herb Mimulus gutattus, ‘monkey flower’, is already showing signs of becoming invasive and is widespread across the South Island, blocking waterways and ditches. A common garden experiment was used to test for local adaptation in 37 populations of monkey flower from 8 regions across the North and South Islands of New Zealand. Possible adaptations in plant physiology (including, fresh vs dry weight, flower size, and photosynthetic rate) were examined. Observable differences include significant differences in biomass and leaf morphology. Results to date indicate significant genetic differences among New Zealand monkey flower populations. This is indicative of invasive potential.
https://journal.nzpps.org/index.php/nzpp/article/view/217
Fatal feline feces: Scientists discover cause for recent monk seal deaths HAWAII (HawaiiNewsNow) - State officials are now blaming toxoplasmosis, a parasite carried in cat feces, for the deaths of three critically endangered Hawaiian monk seals on Oahu. The diagnosis means that the recent monk seal deaths were completely preventable, according to officials from the state health and natural resources departments. In addition to being potentially fatal for sea creatures, the parasite is also known to cause serious symptoms in humans with weak immune systems. Cats are the only known reproductive host of the toxoplasmosis parasite, and officials say a single cat can excrete 145 billion parasitic eggs into its feces a year. Once released into the environment, toxoplasmosis parasites create cysts in muscle and organ tissues and can cause inflammation of the heart, liver, and brain. "Feeding cats near water obviously increases the risk of transmission but, given the nature of the watersheds in Hawaii, cats almost anywhere are probably contributing to the problem," said DLNR Chair Suzanne Case, in a news release. "The cysts can live for months in soil and can wash into streams and runoff and be carried into the ocean from almost anywhere. Feeding cats at state parks, boat harbors and other coastal areas increases the risk of transmission because the cysts don't need to travel very far to get into the ocean," Case said. "Frankly, feeding cats anywhere where their feces can ultimately wash into the ocean is a problem," Case said. One of the seals that was killed by toxoplasmosis, identified as RK60, gave birth to a pup on Moku Iki off shore from Lanikai in spring of last year, according to officials. NOAA says there have been at least 11 documented deaths of the endangered Hawaiian monk seals since 2001. There are currently only 1,400 Hawaiian monk seals on the planet. "We simply cannot afford to lose even one of these critically endangered mammals to a disease that is preventable," Case said. "We hope people will provide as much love to our few very special seals as they do to the hundreds of thousands of feral cats around our islands." Copyright 2018 Hawaii News Now. All rights reserved.
https://www.hawaiinewsnow.com/story/38453130/fatal-feline-feces-scientists-discover-cause-for-recent-monk-seal-deaths/
Meg Stevenson, Head of Solutions, Knowledgepool When we talk about ‘digital’ as a general term, we’re covering a lot of ground. With the relentless pace in the advancement of technology, just about every aspect of our daily lives today looks markedly different to how it did even five years ago. And while we may already take for granted the instant communication and universal connectedness that the relationship with our smart devices affords us, the inception of this technology has undeniably revolutionised even the most minute details of our day-to-day interactions. With always-on access to the internet in our homes (think Echo) and our pockets (think iPhone), we’ve come to expect everything at the touch of a button – from finding the answers to questions of any and every variety to slick, seamless and instantaneous e-commerce experiences. The ready availability of knowledge The implication for learning in all of this is huge. It’s referenced all the time in talks advocating ‘just-in-time learning’ – think about the use of YouTube to assist in changing a car tyre or fixing a washing machine. But the ready availability of knowledge is a phenomenon that has implications that stretch beyond furnishing us with the answer to our banal queries at the point of need – it calls into question the whole skills landscape, and forces us to ask tough questions about the future purpose of organisational L&D. Learning has evolved through the enablement of technology to be far more than a prescriptive mandate from an organisation to its workforce. What is a true learning culture? It’s no longer effective (and arguably it never has been) to dogmatically ‘push’ chunks of information to individuals at a given point and miraculously expect behavioural or cultural shift. We’re becoming increasingly aware that a true learning culture is fostered in the fibre of a truly tech-enabled environment – where curiosity is allowed to flourish, and knowledge is served in an easy-to-access, always-on format. Asking people to learn by rote is no longer a viable approach. Instead, the most useful – and indeed ‘future-proofed’ – version of learning is the organic evolution of skills that takes place. Where it’s as much about encouraging people to ask the right questions as it is about how they process and then apply the answers they receive. If our approach to skills and learning factors an inquisitive approach as one of its core attributes, we’re also better placed to think about nurturing a far more collaborative view of the entire learning process. Social and collaborative learning In a question-based learning model, where there is not one ‘right’ answer but many, individuals’ unique responses or approaches to problems start to become deeply valuable. We do see some organisations creating spaces for user-generated learning content, but there’s always the ‘elephant in the room’ – who curates this, and how does this fit into the wider landscape of learning programmes? Whilst peer-to-peer curation has its merits, there are lingering questions around the structure and purpose of such practices and whether this is a viable strategy to be actioned within the L&D space. As a sector, we see L&D embracing ‘social and collaborative’ learning but, without a better understanding of what this means practically (and crucially what it looks like when it works), its success has been relatively limited, and measurement of that success remains difficult. Collaborative learning is not a new phenomenon. If we take a step outside of our usual discursive frame and consider the IT sector, we have a perfect example of how this culture has really taken hold. In the world of programming, it’s impossible for even the most talented developers to learn everything they need to know at a given time: for a start, it’s a vast and complex area and, perhaps more importantly, it’s forever changing. Innovation explosion Yet we see an explosion of innovation from the sector on an ongoing basis: solutions that build on established technology by layering new thinking over established foundations – or combining existing pieces of disparate technology to craft something entirely new. In a community that has been a hotbed of knowledge-sharing for many years, forums and digital spaces such as GitHub and Stack Overflow have rapidly become the places where learning happens. And these spaces have resulted not only in further innovations, but also in the upskilling of talented individuals who now have the tools to take ownership and to develop their knowledge further – crucially within the flow of their work. The dynamics of learning have shifted due to the open nature of information, and there’s something profound that sits at the confluence of that open behaviour and the tech-enabled infrastructure it sits within. The way in which people learn has evolved through digital innovation as there is now open access to a plethora of information at people’s fingertips, through both Artificial Intelligence and human collaboration. How people perceive learning is no different to how people perceive their interaction with consumer brands: they expect a fast, seamless and personalised experience, accessing the information they want, no matter what the time or location. This expectation of learning needs to permeate into L&D too. Learning on the go The notion of snackable learning, receiving the information you require as and when you need it, is the new norm and what people expect whether at work or home. Developing learning-on-the-go through mobile apps and chatbots allows employees to develop further and combining this with forums and communities of learning where people can communicate, collaborate and knowledge-share is the direction in which we’re heading. Through the enablement of technology this is a viable solution, incorporating both machine learning and knowledge with human contact and trust, which the peer-to-peer interaction produces. The human element cannot be removed from L&D. Digitisation is the tool to enhance it, not usurp it. L&D’s transition into a function that is based upon social and collaborative learning through digital platforms and innovations will support the hybrid workforce that is on the horizon. A workforce that the world of L&D needs to satisfy and support for a business’ future sustainability within the post-digital era. Download your copy of our white paper on the future of learning at work, The digital opportunity: Striking the digital balance for better learning experiences.
https://content.knowledgepool.com/blogs/the-push-and-pull-of-new-technology
The purpose of this paper is to describe the creation and exploitation of a historical corpus in an attempt to contribute to the preservation and availability of cultural heritage documents. Design/methodology/approach – At first, the digitization process and attempts to the availability and awareness of the books and manuscripts in a historical library in Greece are presented. Then, processing and exploitation, taking into account natural language processing techniques of the digitized corpus, are discussed. Findings – In the course of the project, methods that take into account the state of the documents and the particularities of the Greek language were developed. Practical implications – In its present state, the use of the corpus facilitates the work of theologians, historians, philologists, paleographers, etc. and in the same time, prevents the original documents from further damage. Originality/value – The results of this undertaking can give useful insights as for the creation of corpora of cultural heritage documents and as for the methods for the processing and exploitation of the digitized documents which take into account the language in which the documents are written.
https://lekythos.library.ucy.ac.cy/handle/10797/14224
The mandate of the Radio Starmaker Fund is to make a substantial and discernable difference to the careers of Canadian musical recording artists through artist driven marketing assistance, and to support the Canadian independent music infrastructure. Created by the Canadian Radio-television and Telecommunications Commission’s Radio Policy Review of 1998, the Radio Starmaker Fund has completed its fourteenth full year of operation. French language artists are supported by Fonds RadioStar, although Radio Starmaker Fund supports non-French language and instrumental projects originating from Quebec. For the period from September 1, 2014 to August 31, 2015, the Radio Starmaker Fund Board of Directors was comprised of:
https://www.starmaker.ca/annualreports/2015/board
Al-Qaida and Islamic State continue to captivate the world with their extreme violence. While much attention has been given to the operations and doctrines of jihadi groups, this is the first book to explore their culture. Using a wealth of primary sources, the authors examine what goes on inside these organizations and what daily life is like for the foot-soldiers. They show that Islamist militants have a rich aesthetic culture and do much more than fight and train. Life in a jihadi group is in fact filled with poetry and music, and fighters spend time on surprising things like dream interpretation and weeping. Readers will discover an entirely new perspective on radical Islamists: that despite their reputation as macho men, they value humility, artistic sensitivity, and displays of emotion. Cultural practices are essential for understanding the jihadi worldview and may shed important new light on decision-making and recruitment processes in extremist groups. This original book will interest anyone in academia, government, or the general public who is intrigued by the appeal and resilience of the jihadi movement.
https://www.writersblockbookstore.com/book/9781107614567
May 4, 2021 -- Exposure to secondhand tobacco smoke may increase a person's risk of developing lip, mouth, and throat cancers by more than 50%, according to a systematic review published on April 26 in Tobacco Control. Those who breathe in secondhand smoke for more than 10 to 15 years may be twice as likely to develop oral cancer as people not exposed to passive smoke, the authors wrote. "Our systematic review and meta-analysis support a consistent and statistically significant association between [secondhand smoke] exposure and the risk of oral cancer," wrote the group, led by Kurt Straif, PhD, a visiting professor at the Schiller Institute for Integrated Science and Society at Boston College in Chestnut Hill, MA. Health goes up in smoke Smoking is linked to numerous diseases and negatively affects oral health, causing more dental plaque and worsening existing gum disease. Evidence has shown that exposure to secondhand smoke may cause inflammation in the oral cavity and impair salivary gland function, and it may directly affect teeth and microorganisms found in the mouth. Smoking tobacco, using smokeless tobacco, drinking alcohol, and chewing betel quid are also known to increase the risk of developing oral cancers. Oral cancers account for approximately 448,000 new cases of cancer and about 228,000 deaths annually worldwide, according to the cancer statistics platform Global Cancer Observatory. Despite these statistics, researchers believe the relationship between secondhand smoke and oral cancers has not been thoroughly examined. In 2009, the International Agency for Research on Cancer confirmed there was sufficient evidence to conclude that secondhand tobacco smoke is carcinogenic to humans and that exposure to the smoke causes lung cancer. Additionally, a positive link was reported between secondhand smoke exposure and cancers of the larynx and the pharynx, but not for any other cancer sites. Since the agency's evaluation, several studies have been published that further examine the risks of passive smoking and oral cancer. However, they have not been included in a systematic review and meta-analysis until now, the authors wrote. To analyze potential links between secondhand smoke exposure and oral cancer risk, the researchers conducted a systematic review of studies published through May 10, 2020. They analyzed five studies that included a total of 6,977 people. Of those, 3,452 individuals were exposed to secondhand smoke and the remaining 3,525 were not exposed to smoke. These studies were conducted in North America, Asia, Europe, and Latin America. Risk revealed People who were exposed to smoke from burning cigarettes but who were not smokers themselves saw their risk of oral cancer increase by 50%, with an overall odds ratio of 1.51 (p = 0.0004), the authors wrote. Those exposed to more than 10 or 15 years of secondhand smoke were more likely to develop oral cancer, with an odds ratio of 2.07 (p = 0.00001), than those who were not exposed to tobacco smoke. The study did have several limitations, including the small number of studies included in the analysis. However, the overall number of cases and controls in the meta-analysis was high because several of the original studies pooled many individual studies. Future studies should be conducted to strengthen the evidence and address the limitations, they noted. The review shows a consistent, significant association between secondhand smoke exposure and the risk of oral cancer, and the duration of exposure supports causal inference; therefore, the results should be used to adopt appropriate preventive measures within the World Health Organization's Framework Convention on Tobacco Control, the authors wrote. "The identification of the harmful effects of [secondhand smoke] exposure provides guidance to public health professionals, researchers, and policymakers as they develop and deliver effective [secondhand smoke] exposure prevention programs," they concluded.
https://www.drbicuspid.com/index.aspx?sec=ser&sub=def&pag=dis&ItemID=328478
September 17, 2009 Closing the educational gaps among racial/ethnic groups and by gender is essential for raising the education level of the overall U.S. population. However, the 2009 supplement finds that gaps among these groups remain substantial, and for some races/ethnicities the younger generation is less likely to attain college degrees than its predecessors. Other highlights include: the high school completion rate for young people has been at a standstill, while college enrollment gaps have widened among racial/ethnic groups during the past two decades. /news-room/Documents/Minorities-in-Higher-Education-2009-Supplement-23rd.pdf Minorities in Higher Education: 2009 Supplement (PDF) 1 MB May 16, 2016 Tribal College and University Funding: Tribal Sovereignty at the Intersection of Federal, State, and Local Funding is the second in a three-part series on Minority-Serving Institutions from ACE's Center for Policy Research and Strategy. March 15, 2016 In an exclusive Q&A with The Presidency, National Association of Diversity Officers in Higher Education President Benjamin D. Reese Jr. draws insights and early lessons from a season of campus activism and offers recommendations for institutions looking to maximize their ability to support their students. March 10, 2016 Campus racial climate has become a larger priority for college and university presidents and their institutions, finds a new national online survey by ACE's Center for Policy Research and Strategy. March 09, 2016 A new brief in CPRS's Viewpoints series aims to help educators and policymakers better understand the challenges young male students of color face and give them tools to address those challenges. January 11, 2016 Graduation rates among underrepresented minority students at the University of Maryland, College Park are among the highest in the nation, but it didn’t happen overnight.
http://www.acenet.edu/news-room/Pages/Minorities-in-Higher-Education--2009-Supplement.aspx
Bipartisan Group of Senators Urges EPAs Pruitt to Protect Biodiesel in the RFS EPA’s Proposed Changes Are Inconsistent with Pruitt’s Assurance to Uphold the Law NEWSFOR IMMEDIATE RELEASE Contact: Rosemarie Calabro Tully 202-641-6209 WASHINGTON, D.C. – Today a bipartisan group of 34 senators sent a letter to EPA Administrator Scott Pruitt on the recently proposed changes to America’s Renewable Fuel Standard (RFS), urging them to increase the volumes of biomass-based diesel and advanced biofuel in the final rule. “Reducing volumes—and especially those [Renewable Volume Obligations] RVOs that were previously finalized—is disruptive, unprecedented and very troubling,” the senators write. “These volumes do not meet actual biodiesel production capacity in the United States, and could have a negative impact on jobs and economies in rural communities across the nation.” The U.S. Environmental Protection Agency (EPA) released a request for additional comments on reducing previously finalized volumes required by the RFS program and on using waiver authorities to further reduce biodiesel volumes. The National Biodiesel Board (NBB) has serious concerns with EPA’s recent actions and made their concerns known with these biodiesel champions in the Senate. The latest proposed cuts to the RFS volumes threaten jobs in rural America, negatively affect the companies who have invested to comply with the law, and undermine the energy security goals of the RFS program. “EPA should seek comment on factors that warrant HIGHER advanced biofuel and biomass-based diesel volumes in order to achieve Congress’s goals of diversifying our fuel supply, supporting rural jobs and enhancing U.S. energy security. Instead, the recent request for comment from EPA flaunts these objectives—with the potential to eradicate jobs and bankrupt farmers,” said Doug Whitehead, chief operating officer at the National Biodiesel Board. In the letter, the senators called on EPA Administrator Pruitt to support the job creation and agricultural benefits that higher volumes of biofuels provide: “the proposed volumes … could cause near-term job losses and discourage investment in capacity and new fuel development.” Made from an increasingly diverse mix of resources such as recycled cooking oil, soybean oil and animal fats, biodiesel is a renewable, clean-burning diesel replacement that can be used in existing diesel engines without modification. It is the nation’s first domestically produced, commercially available advanced biofuel. Biodiesel supports roughly 64,000 jobs across the United States. The National Biodiesel Board is the U.S. trade association representing the biodiesel and renewable diesel industries, including producers, feedstock suppliers and fuel distributors. The full text of the letter is available below. ### October 16, 2017 The Honorable Scott Pruitt Administrator Environmental Protection Agency 1200 Pennsylvania Avenue, N.W. Washington, D.C. 20460 Dear Administrator Pruitt: We write in response to the Environmental Protection Agency’s (EPA) proposed Renewable Volume Obligations (RVOs) for advanced biofuel for calendar year 2018 and biomass-based diesel for calendar year 2019, as well as the recent Notice of Data Availability (NODA). The NODA requests comments on reducing previously finalized RVOs, threatening business plans and investments already made based upon a final rule issued in December 2016. These proposed volumes do not meet actual biodiesel production capacity in the United States, and could have a negative impact on jobs and economies in rural communities across the nation. Therefore, we urge you to increase these volumes in the final rule. Biodiesel is the first EPA-designated advanced biofuel under the Renewable Fuel Standard (RFS) to reach commercial scale production nationwide. The biodiesel industry has met RFS criteria for growth each year, exceeding the goals that Congress envisioned when it created the RFS with bipartisan support. In addition, biodiesel has consistently made up the majority of the advanced biofuel volumes. This ability to meet or exceed RVOs coupled with the substantial investment made by the biodiesel industry indicate that these fuels offer the best opportunity for continued growth in the near future. EPA’s proposal would hold the biomass-based diesel volume for 2019 stagnant at 2.1 billion gallons and decrease the advanced biofuel volume for 2018 to 4.24 billion gallons. These proposed volumes do not reflect the existing potential for the biodiesel and renewable diesel industries in our states and could cause near-term job losses and discourage investment in capacity and new fuel development. It is estimated that every 500 million gallons of increased biodiesel production supports roughly 16,000 jobs. Further, EPA’s NODA solicits comments on whether it could further reduce the total, advanced, and biomass-based diesel volumes through several different waiver mechanisms. However, there is ample available feedstock, refining capacity, and room for growth in the domestic biodiesel industry. The industry is poised for growth, in accordance with the intent of the law, if EPA sends the market signals with increased volumes. Reducing volumes and especially those RVOs that were previously finalized is disruptive, unprecedented, and very troubling. We have made great progress through the RFS in diversifying our nation’s fuel supply while creating and sustaining jobs, strengthening local economies, generating tax revenues, and improving energy security. We urge you to support higher RVOs for biomass-based diesel and advanced biofuels in the final rule to encourage additional development and use of this fuel.
In pictures: Apollo missions and the Museum Forty-seven years after it was collected from the surface of the Moon during the last Apollo mission, the Museum still treasures the fragment of lunar rock gifted to the UK. But our history is further entwined with NASA's Apollo missions. We took a trip into the Museum archives to see how. Although it's a consistent feature of the night sky, the Moon holds many mysteries. In early 1969, at the peak of the space race, the USA set about trying to find some of the answers with their crewed missions to the lunar surface. 'The Eagle has landed' On 20 July 1969, the historic Apollo 11 space mission landed on the Moon. Around six hours later, Commander Neil Armstrong became the first person to ever set foot on the lunar surface, watched by an estimated 650 million people worldwide. As well as leaving us in awe of such a momentous endeavour, inspiring new generations of space scientists, and entering phrases such as 'The Eagle has landed' into our common vocabulary, the mission fulfilled a number of key scientific goals. One such objective was to gather samples of lunar-surface material for return to Earth, which astronauts Neil Armstrong and Buzz Aldrin successfully did. Moon dust at the Museum Just two months after the Apollo 11 Moon landing, the Geological Museum (now the Museum's Red Zone) held a special weekend event which exhibited a small dish of Moon dust. This dish represented the UK's share of lunar material for study by scientific facilities. The British public were overcome with Moon-fever and a reported 35,000 people visited over two days to view this heavily guarded dish. Just four months after the first Moon walk, Apollo 12 successfully touched down for a second crewed lunar landing. During two lunar explorations, Commander Charles Conrad Jr and Alan L Bean collected further rock and dirt samples as well as a 41-centimetre-deep core sample. They landed back on Earth on 24 November 1969. Between 27 December and 3 January 1970, the Geological Museum - which only merged with the adjacent Natural History Museum in 1986 - displayed a walnut-sized Moon sample, attracting 52,000 people. The Moon rock was accompanied by a free exhibition about the ongoing Apollo missions and the work being carried out on returned lunar material. An opportunity missed In 1970, a year after the Apollo 11 crew collected the first lunar samples, US President Richard Nixon presented the UK with a gift of four lunar dust grains, about the size of rice grains. The Museum Director at the time, Dr GF Claringbull, learned of Nixon's plan in advance and tried to secure a piece of the Moon for our collection. Less than a week after Apollo 11 returned to Earth, he wrote to Buckingham Palace asking the Queen to consider us as recipients of any gift: 'I note from press reports that President Nixon intends to give samples of the moon to Heads of State and no doubt the Queen will be among the first to receive one. I venture to suggest that should Her Majesty consider putting the specimen on public display this Museum would be the most appropriate place. As you will know, we have the national collections of minerals, meteorites and rocks. Our mineral collection is thought by many, including the Americans, still to be the best in the world, and we have undisputably [sic] the most representative collection of extra-terrestrial matter in the form of meteorites in any Museum.' - GF Claringbull, 30 July 1969 The response from the Palace, a day later, was: 'Nothing official has yet reached here about Moon samples. If such samples are received I know the Queen will bear the Natural History Museum in mind.' As it happened, the UK sample was presented not to the Queen but to Prime Minister Harold Wilson. It reportedly remains somewhere in 10 Downing Street today. However, a few years later, the Museum received an equally special gift. The Goodwill Moon rock The Apollo missions ran until December 1972. Six missions landed on the Moon and returned lunar material to Earth. In 1973, larger samples from the last crewed mission - Apollo 17 - were distributed as further goodwill gifts to 135 countries around the world. The UK gift consisted of a thumbnail-sized piece of the Moon mounted on a plaque with a Union Jack flag that had accompanied the Apollo 17 astronauts into space. Having reached out to the UK government about acquiring the sample for the Museum's collection, Director Claringbull was this time successful. Today, this piece of the Moon resides alongside other extraordinary specimens in the Museum's Treasures gallery. It is the only piece of Moon rock in the UK from NASA's last Apollo mission. Geologist Harrison Schmitt - the only professional scientist to reach the lunar surface - collected it from the Taurus-Littrow Valley of the Moon. He trained all the other astronauts on how to collect samples. Museum space scientist Prof Sara Russell considers herself very fortunate to be able to study fragments of the Moon. She says of the Apollo 17 rock, 'This is special. It is one of very few rocks from the Moon that we have in the UK, or even on Earth. 'It's a crystalline rock and you can see the individual crystals glinting in the light, but overall it's very dark in colour. It's almost black. 'When you look up to the Moon you can see that it's mostly light grey, but it has big circles of dark material, made up of a rock called basalt. This is likely to be a piece of the basaltic Moon.' From the near-side of the Moon In total the Apollo missions collected 2,200 lunar samples weighing 382 kilogrammes from six different lunar sites on the side of the Moon nearest Earth. Other than the small samples presented as gifts, all Apollo rocks belong to the US and are maintained by the Astromaterials Research and Exploration Science team at the Johnson Space Center. However, the Museum is lucky to also have a piece from Apollo 16 on long-term loan. Lunar meteorites The Apollo 17 Goodwill Moon rock isn't the only lunar material in the Museum collection. We also have lunar meteorites. These were created when impacts to the lunar surface sent rock fragments out into space that eventually landed on Earth. Sara says, 'Before we went to the Moon, we didn't really have a very clear idea of what it was. So much so, that although bits of the Moon do come to the Earth as meteorites, at that time they just weren't recognised, because we really didn't know what a piece of the Moon would look like.' Some of the Museum's lunar meteorites may come from areas unexplored by NASA's Apollo or Russia's Luna collection-retrieval missions - such as the far side of the Moon. Research continues on these samples to learn more about the origin and early evolution of the Moon and its twin, Earth. Come face to face with a piece of the Moon You can see the piece of Apollo 16 Moon rock in Earth Hall, near the Stegosaurus skeleton. Visit Treasures to see the UK's Goodwill Moon rock collected on the final Apollo mission.
https://www.nhm.ac.uk/discover/apollo-missions-moon-samples-museum-history.html
The AIDAperla was built in 2017 and is among AIDA’s 14 ships in its fleet. The null is included in the cruise line’s null Class. In the cruise ship stats below, you’ll find the AIDAperla vs all of the other AIDA ships. How big is the AIDAperla? Below, you’ll find all of the relevant cruise ship stats, specs and dimensions for the AIDAperla. Included in these statistics are passenger capacity, length, year built, year renovated, cost to build, gross tonnage, engine info, number of rooms, deck counts and more! Passenger Capacity refers to the total number of people that the AIDAperla can accommodate. Of course, there are also crew members on board. Below, find the total onboard capacity, including staff and cruise guests. AIDA Avg: 2,415 guests AIDAperla Passenger Capacity: The passenger capacity for the AIDAperla is 3,400 guests. The average capacity for the 14 active ships in AIDA’s fleet is 2,415 passengers. The passenger capacity range for all AIDA ships has a minimum of 1,180 guests and a maximum of 6,654 passengers. AIDA Avg: 1,646 staff AIDAperla Crew Members: Staff on the AIDAperla include 0 crew members. That’s a guest to staff ratio of NA. The average AIDA ship includes 1,646 employees and has a passenger to staff ratio of 6.8:1. vs AIDA Fleet How long is the null? From end to end, the AIDAperla length equals null feet (0 meters). Compare that to the average ship length of all 14 active vessels in AIDA’s fleet, measuring 1106 feet (338 meters). AIDA Avg: 1,106 feet The smallest AIDA ship (in terms of length) measures 1106 feet (338 meters) from end to end. The longest vessel spans 1106 feet (338 meters). Our chart below shows the length of the AIDAperla vs all other active AIDA ships. vs all AIDA Ships When was the AIDAperla Built? The AIDAperla was built in 2017 and joined the cruise line’s null Class. AIDA includes 14 active ships. The oldest in the fleet was built in 1996. The average AIDA ship is 14 years old and the median build date for all active ships is 2010 AIDA Avg: 2007 When was the last AIDAperla Dry Dock? The AIDAperla has not experienced dry dock improvements yet. The ship belongs to the AIDA class of ships known as the null class. We're often asked how many passengers are on the AIDAperla. The ship's capacity is 3,400. When comparing the occupancy to the average AIDA passenger capacity, you'll find that the average ship in the fleet holds 2,415 guests. Feel free to look at our graph above to see where this ship falls in line with all other live AIDA ships. Each of AIDA's ships offers a unique layout with features and activities catered to all. Whether the AIDAperla is right for you will depend on your individual preferences. Do you prefer a larger or smaller ship with many or fewer guests? Are you hoping for many family activities or entertainment options for an older clientele. Our deck maps layout and activities list provide a helpful guide to what you'll find on board. Feel free to explore the see if this ship is suited towards your preferences. From end to end, the Spectrum of the Seas length equals NA feet (NA meters). Compare that to the average ship length of all , active vessels in AIDA fleet, measuring 1,106 feet (338 meters). Please see our size comparison chart above to see how this ship falls in line with all other active ships in the fleet. Gangwaze is your one-stop destination for shore tours, pre-cruise hotels, transfers, vacation insurance & more. We’ve partnered with industry leaders to bring you the best deals and the most convenience.
https://gangwaze.com/cruise-lines/aida/aidaperla
30 Euro = 33.8408 U.S. Dollar. Saturday, 20 November 2021, 15:12 Brussels time, Saturday, 20 November 2021, 09:12 New York time. Following are currency exchange calculator and the details of exchange rates between Euro (EUR) and U.S. Dollar (USD). Enter the amount of money to be converted from Euro (EUR) to U.S. Dollar (USD), it is converted as you type. Also, you can convert in the reverse The currency converter shows the conversion of 30 Euros to 34.1 US Dollars as of today price. Current tool convert EUR in USD using live average market currency rates. Please scroll down the page to view the 10 days history table of EUR/USD conversion. Check how much is thirty EU Euro in United States Dollar and similar values of EUR-USD currencies. You can also look at the chart where is 25 rows 30 EUR to USD Chart Graph. This graph show how much is 30 Euros in US Dollars - 34.66922 USD, according to actual pair rate equal 1 EUR = 1.1556 USD. Yesterday this currency exchange rate was on 0.00047 USD higher than today. On the last week currencies rate was on $0.00832 USD higher. Last month EUR:USD rate was on $0.00175 USD higher. The cost of 30 Euros in United States Dollars today is $34.32 according to the “Open Exchange Rates”, compared to yesterday, the exchange rate decreased by -0.09% (by -$0.0010). The exchange rate of the Euro in relation to the United States Dollar on the chart, the table of the dynamics of the cost as a percentage for the day, week, month and year.
https://nation-scooter.fr/360887/76263.html
Last time Bill Belichick addressed the Patriots’ quarterback situation, it was following the first round of the NFL Draft and the team’s selection of Alabama quarterback Mac Jones. “Cam [Newton]’s our quarterback,” Belichick said at the time. “Whatever position, whatever time Jarrett [Stidham] or Mac [Jones] are ready to challenge and compete [Brian Hoyer was still a free agent], then we’ll see how that goes. But right now, Mac, he’s just got a lot of learning in front of him.” It appears Jones has learned quickly. On Tuesday, Belichick was asked if there will be an ‘open competition’ for the Patriots’ starting quarterback job in training camp, and the head coach didn’t dismiss the notion. “Every one of us has to go out and establish our level of performance and whatever our role or capacity is,” Belichick replied. “We’ve done some things in the spring, but this is really the start of the football season in terms of the team building part in training camp. We all have a lot of work to do. Until we go out and do anything, it’s pretty much a clean slate.” Asked as a follow up if that sentiment includes the quarterbacks, Belichick replied it is “including the players and all the coaches.” While that’s not a ‘yes,’ it’s also not the definitive ‘no’ Belichick had been giving last season when asked about Newton’s standing as the team’s starting quarterback. The competition – open or not – will begin on Wednesday when the team has their first training camp practice. MORE: Non-QB position battles at Patriots training camp Alex Barth is a writer and digital producer for 985TheSportsHub.com. Any opinions expressed do not necessarily reflect those of 98.5 The Sports Hub, Beasley Media Group, or any subsidiaries. Thoughts? Comments? Questions? Looking for a podcast guest? Let him know on Twitter @RealAlexBarth or via email at [email protected].
https://985thesportshub.com/2021/07/27/will-there-be-an-open-competition-for-the-patriots-starting-quarterback-job-in-training-camp/
Sixteen-year-old Pauline Jarvis of Lakeland has a tattoo, but getting one wasn't black and white. Under current Florida law, anyone can have a tattoo, but those younger than age 18 require a notarized consent form signed by a parent or legal guardian. Sixteen-year-old Pauline Jarvis of Lakeland has a tattoo, but getting one wasn't black and white. Under current Florida law, anyone can have a tattoo, but those younger than age 18 require a notarized consent form signed by a parent or legal guardian. Nicole and Ronnie Jarvis granted permission for Pauline to have a tattoo. They didn't make this decision lightly, but agreed eventually due to the nature of the tattoo, which was designed to memorialize Pauline's grandfather. "My grandpa passed away and I wanted something to remember him by. A tattoo was something I could have permanently, symbolic of our friendship and my love for him," Pauline said. Tattoos as a form of self-expression are gaining popularity among teens and young adults. Fueled in part by younger celebrities sporting body ink, tattoos are seen as less controversial than in the past. "I thought if she wants this so bad she's going to go and get one," Pauline's mother said. "I didn't want her to go somewhere dirty or risk getting a disease. I wanted some control. "I knew the relationship she had with her grandpa and losing him affected her deeply. I knew this wasn't something she would regret. Her emotions were so tied to him we thought this would help with some closure." Pauline's parents were involved in selecting the tattoo and where on her body it would be located. Once they were satisfied it would be tasteful and on an area easily covered, they completed the consent paperwork and had it notarized. Jarvis and her husband were present when Nicole's tattoo was done at Wildside Tattoos in Lakeland. While she approved her daughter's first tattoo, Jarvis said she would not have given permission for a tattoo for any other reason and said she will not give Pauline permission for additional tattoos while she is younger than 18. Other local parents' opinions differ on whether or not it is appropriate for teenagers to mark themselves so permanently. Brenda Peterson of Lakeland denied permission to her son and daughter when they asked for tattoos as teens. At 28 and 24 now, they went on to get tattoos once they reached adulthood but their mother doesn't regret making them wait. "I figured it was an adult thing. I don't have a problem with tattoos in general, just not while underage," Peterson said. A single mom, Peterson describes herself as having been quite strict, but her teens accepted her decision. "I'm very happy I made them wait. Parents try too hard to be hip and cool and be their teens' friend. My concern was to be a parent first," she said. Pauline, a student at George Jenkins High School in Lakeland, said she's seeing more and more kids at her school with tattoos. Kody Heavenridge, a tattoo artist at Lou's Tattoos in Mulberry, has seen an increase in the number of teens coming to the studio for tattoos. "Within the last five years, it has picked up. We attribute this to the popularity of the TV shows like 'L.A. Ink' and ' Miami Ink' - these have made tattoos more popular, they are not so taboo anymore," Heavenridge said. Heavenridge said his shop insists parents come and pick up a consent form, that it be notarized and the teen be accompanied by a parent or legal guardian when the tattoo artist begins their work. This enables them to check IDs thoroughly per the legal requirements and ensure that the parent is 100 percent aware of the process, the tattoo design and location. "If it's not something they're likely to regret, we'll do it. Sometimes if artwork or wording is questionable, we will try to steer the kids away from this and get them to think about their future, because it's the right thing to do. "At Lou's Tattoos we don't do anything on a kid that can't be hidden by a normal T-shirt at school," Heavenridge said. Kristen English, 26, formerly of Lakeland and now of Lewisville, Texas, had her first tattoo at 15 and a second at 17. Both required written parental consent, and English's father was present when she had her first tattoo, a butterfly on her ankle, done. "I'm not sure exactly why I wanted one. I wasn't into piercings like other girls. I just got on a kick that I wanted a tattoo," English said. English talked to her parents about the decision and had to do some convincing before her parents finally agreed. English's mother, Janice English of Lakeland, insisted that Kristen's tattoo be discreet and easily hidden. "I was a little shocked at first because (Kristen) was not one to want to get something because everyone else had it. "It's almost like a rite of passage . . . personally I would approve of a tattoo before a piercing. Some piercings are pretty ugly whereas a tattoo can be an art form," Janice English said. Janice English adds that any parent dealing with a teen seeking permission for a tattoo should discuss it openly with them. "This can affect job opportunities, future relationships. Removal is expensive. Look at all aspects," she said. Kristen English is a college graduate and works for American Airlines. None of her tattoos are visible while she's at work and have not affected her career to date. Florida laws on tattoos for minors will tighten in January 2012 when it will no longer be legal for a minor younger than age 16 to be tattooed except for medical or dental purposes. Any minor between 16 and 18 will have to have a notarized consent form signed by the parent or legal guardian. The parent or guardian also will have to accompany their teen while the procedure is done.
https://www.theledger.com/news/20101003/teens-and-tattoos-some-parents-grant-permission-others-make-kids-wait
The 2nd edition of Intercultural Communication Updates key theories of intercultural communicationExplores the ways in which people communicate within and across social groups around three themes.These includeidentity, Othering, and representationContains new examples from business, healthcare, law and education.Presents an updated and expanded set of influential readings including James Paul Gee, James Lantolf, Les Back, Richard Dyer, Jacques Derrida and B Kumaravadivelu, with new critical perspectives from outside Europe and North AmericaWritten by experienced teachers and researchers in the field, Intercultural Communication is an essential resource for students and researchers of English Language and Applied Linguistics.... |Title||:||Intercultural Communication (Routledge Applied Linguistics)| |Author||:| |Rating||:| |ISBN||:||0415489423| |ISBN13||:||978-0415489423| |Format Type||:||E-Book| |Language||:||Englisch| |Publisher||:||Routledge Auflage 2 11 Juni 2010| |Number of Pages||:||360 Seiten| |File Size||:||670 KB| |Status||:||Available For Download| |Last checked||:||21 Minutes ago!| Intercultural Communication (Routledge Applied Linguistics) Reviews - Das Buch ist über Interaktion, Kommunikation, Identifikation mit anderen, fremden oder sogar gleichgesinnten Kulturen und Menschen.Ich finde es sehr Textlastig und die Beispiele sehr lang. Oft wird etwas wiederholt. Doch dies scheint nötig zu sein um Kleinigkeiten zu erklären. Vom Textverständnis her ist es auch schon eher anspruchsvoll. - Other than being a fantastic introduction on some critical themes in intercultural communication, this book contains excerpts from many different sources to provide different perspectives on similar ideas. The result is a comprehensive book that is great for both educators and students alike. I highly recommend it. - At first glance, this book appears kind of dry, but it was actually very interesting, and did a great job of addressing different issues and viewpoints in intercultural communication. The anecdotes and examples balanced out the theory, making it easy to draw correlations to real world events. - This is one of the worst text books I've had to use so far in my graduate studies. The way in which the authors organized the book makes little sense. They give you a bit of information on the topic and then an activity that really doesn't help you understand the material. As far as the material goes the authors included some interesting resources but decided to just use small extracts from different articles to make their point. This made class discussion very superficial since we only had a superficial understanding of the topic at hand. I usually keep my books after a class is over however, this book will not be one of them. I'm definitely selling this back even if I don't get much back for it.
http://bridalwearlancashire.co.uk/0415489423/intercultural-communication-routledge-applied-linguistics.html
Data Adequacy Reports The Data Adequacy Report (DAR) provides a view of the monitoring effort in the Arctic sea basin, with the aim to show how well the available marine data meets the needs of users. The monitoring effort is elaborated from three different viewpoints, which are clearly distinguished in three parts: - the needs of users (e.g. fisheries managers, coastal protection authorities, ports); - separate parameters (e.g. temperature, bathymetry, sea level rise); - the purposes for which data is used (e.g. marine spatial planning, assessment of (potential) MPAs, assessment of navigational risks). As part of the Arctic SBC project, a structure for collecting information on data adequacy was developed: the Content Management System (CMS). The structure of the CMS allows for the presentation and analysis of the quality and adequacy of the assessed data sets, from many different angles and perspectives, of which the main are presented in this DAR. The literature review and the challenges as registered in the CMS were used as input. In general we have found that the datasets that are available and have been evaluated in the present study usually have a quality that has a limited match with the requirements for the purpose for which it is used. For the spatial and temporal aspects, in most cases there was an association between the quality (i.e., resolution and coverage) and data requirements (match of quality for a specific purpose). As (for at least most challenges in the present project) the focus is on the entire Arctic region, a partial mismatch can be expected for many European data sources (such as EMODnet) which only focus on the European part of the Arctic. Only a small fraction of datasets were classified as unsuitable for specific purposes. Within the scope of this study we identified some data sources and data sets that are particularly ‘popular’ for Arctic based studies, which indicates that those datasets are reused. It was also found that the original purpose for which data was generated is often not reported or not known. In case the purpose is known, data sources and data sets are often (re)used for the same purpose. For some original purposes, the datasets are reused for multiple additional purposes and some additional purposes use data generated with multiple original purposes. This first DAR will be reviewed by the Commission and the Panel and their input will be addressed in a second DAR.
http://www.emodnet-arctic.eu/data-adequacy-reports
A heart filled with love The last few verses from Scripture told us that we are involved in a war. The ages old war between good and evil. The devil tries his utmost to steal us away from God. He tries to entice and tempt us all the time. He comes to us with camouflaged temptations and tries to deceive us. When I look back at my life, I see many places where he offered that shiny red apple to me. How beautiful and tasty did that apple and the worldly pleasures look! I wish I could say that I stood firm at every occasion, but there were times when I failed and lost the battle. I suspect this may have happened to you too. We must be prepared for these attacks. Soldiers not only undergo good training, but also put on the correct amour for battle. You cannot wear your church clothes to the battle field. It won’t work. I see the neighbourhood watch guys all wear bullet-proof jackets. The purpose indeed is to protect the most vital organs. When you go out into life, you need the right clothing for the spiritual battle. The clothes must protect your most important parts. That is why the breastplate is so important – it must protect your heart. Like two hands, faith and love must hold your heart to protect it against the enemy’s sword. We must ensure that our faith is strong enough. We must know exactly what we believe in, because if you don’t know what you believe in on the battlefield, the enemy will deceive you and you will lose the fight. You must believe with everything in you and know for sure that God is your Father who loves you so much. He even sent his Son to bear the punishment for your sin so that the gates of heaven can open for you. The other part of the breastplate consists of love. 8… dressed up in faith, love, and the hope of salvation. Where there is love, the enemy has no chance. As we shy away from a light blinding our eyes, evil shy away from love. He cannot take it. Love is the exact opposite of the hate he spreads. When love flows from our hearts, when we care, when we sacrifice a piece of ourselves for someone else, the war has been won and the enemy has lost. Is your heart filled with stone? Do you focus only on yourself and do not see the need of others? Do your deeds not tell a story of caring and reaching out and loving? Then you need to watch out. Your most vital organ is exposed and could easily be plucked out by the enemy. To love is actually such an easy instruction, but so many of us struggle with it. It’s as if the own self keeps on coming in-between. We need reinforcements. We need God’s Spirit to come and help us. Let’s pray and sing with St Francis of Assisi and make these words part of our being: Lord, make me an instrument of your peace, Where there is hatred, let me sow love; Where there is injury, pardon; Where there is doubt, faith; Where there is dispair, hope; Where there is darkness, light; Where there is sadness, joy; O Divine Master, Grant that I may not so much seek To be consoled as to console; To be understood as to understand; To be loved as to love. For it is in giving that we receive; It is in pardoning that we are pardoned; And it is in dying that we are born to eternal life. How beautiful is this. The challenge is to make this prayer part of my heart, hands and feet … Scripture Reflection How much peace flows through you? How much love do you bring to the table? Is your heart protected? Prayer Father, I realise that I leave my heart wide open to the enemy. Dear Lord, please help me have and live more love. Amen.
https://crossroad.247.org.za/a-heart-filled-with-love/
BEIJING, Dec. 16 (Xinhua) -- China's innovation-driven development has yielded fruitful results during the 13th Five-Year Plan period (2016-2020), and science and technology (sci-tech) has become a key driver for the country's economic and social development. In the Global Innovation Index (GII) reports released by the World Intellectual Property Organization (WIPO), China's ranking has risen from 25th in 2016 to 12th in 2021. Over the past five years, 2.13 million sci-tech achievements nationwide realized technology transactions, 1.52 times the number during the 12th Five-Year Plan period (2011-2015). Besides, China's research and development (R&D) spending has increased from 1.42 trillion yuan in 2015 to 2.44 trillion yuan in 2020, with the turnover of technology contracts nationwide growing from 983.6 billion yuan to 2,825.2 billion yuan. The country's sci-tech strength has reached a new level. During the 14th Five-Year Plan period (2021-2025), China will continue to vigorously promote sic-tech innovation to create new advantages for development, and meanwhile to expand sci-tech cooperation globally with the aim to build a community of a shared sci-tech future. -- Policy support opens innovative development path This year marks the first year of the 14th Five-Year Plan period. The Outline of the 14th Five-Year Plan for National Economic and Social Development and the Long-Range Objectives Through the Year 2035 proposes to uphold the central role of innovation in China's overall modernization drive and make self-reliance in sci-tech a strategic support for national development. The Outline puts forward to build China into a powerhouse in intellectual property rights (IPR), implement a more open, inclusive and mutually-beneficial international sci-tech cooperation strategy, develop strategic emerging industries, build new pillars for the industrial system by focusing on industries like new-generation information technology, biotechnology, new energy, new materials, high-end equipment, new energy vehicles, environmental protection, aerospace and marine equipment, and plan the layouts of future industries like brain-like intelligence, quantum information, genetic technology, future networks, deep sea, air and space development, hydrogen energy and energy storage, etc. It also puts forward to support Beijing, Shanghai, and the Guangdong-Hong Kong-Macao Greater Bay Area in developing into international sci-tech innovation centers, build comprehensive national science centers in these areas and Hefei of Anhui Province, and support local governments where conditions permit in constructing regional sci-tech innovation centers. So far, Beijing, Shanghai, Chongqing municipalities and Guangdong, Hubei, Jiangsu, Zhejiang, Hebei, Guizhou and Jiangxi provinces have already unveiled sic-tech innovation plans which clarify related development priorities of theses places in 2021-2025. Jiangsu, Zhejiang and Hubei provinces will expedite the construction of regional sci-tech innovation centers, while Hebei, Sichuan and Shandong provinces, Chongqing Municipality and the Yangtze River Delta region will promote high-quality development with innovation communities and clusters of emerging industries as the focus. At present, China has basically formed a number of innovation agglomeration areas, including the Beijing-Tianjin-Hebei innovation cluster with Beijing as the center, the Yangtze River Delta innovation cluster with Shanghai as the center, the Pearl River Delta innovation cluster with Guangdong as the center, and the regional innovation clusters with Chengdu, Chongqing, Wuhan and Xi'an as the respective centers. To further promote sic-tech innovation, the Committee for Deepening Overall Reform of the CPC Central Committee on November 24 approved a 2021-2023 sci-tech system reform plan proposing improving the sci-tech structure, giving play to the principal role of enterprises in sci-tech innovation, promoting a virtuous circle of sci-tech, industry, and finance, and accelerating the commercialization and application of sci-tech achievements. During the 14th Five-Year Plan period, efforts will be made to strengthen basic research and original innovation, support the development of emerging, unpopular and weak disciplines, push forward interdisciplinary integration and research, deploy the innovation chain around the industrial chain, the industrial chain around the innovation chain, and leverage new science and new technologies to help foster new industries and new economies, said an official with the Ministry of Science and Technology. -- Sci-tech innovation booms in 2021 In the first year of the 14th Five-Year Plan period, China has continued to advance basic research and breakthroughs in key and core technologies, with a great number of innovation results achieved. According to the GII report, in 2021, China's innovation output is better than innovation input, and it ranks 25th in innovation input, higher than the rankings in 2020 and 2019, and seventh in innovation output. This year has witnessed the rapid development of strategic emerging industries in China. The first homemade large aircraft production and test flight center was completed; consumer drones account for more than half of the global market; the production and sales of new energy vehicles hit a new record high; China's voice in the global LCD panel industry is increasing; more than 70 percent of the world's 5G base stations have been completed ... A series of new inventions, new technologies and new products are speeding up the formation of new engines for high-quality development and pushing the medium-high end transformation of industries. As of the end of June this year, the number of enterprises with valid invention patents in China reached 270,000, increasing by 24,000 from the end of last year. Among them, 126,000 are high-tech enterprises which hold 62.3 percent of the total valid invention patents of domestic enterprises. Since the beginning of this year, China's intellectual property protection system has been further improved, with knowledge-based incentive policies deeply implemented, and the commercialization of sci-tech achievements continuing to flourish. From January to October, 583,000 invention patents were granted, and the investment in services for commercialization of sci-tech achievements increased by 13.6 percent. From January to August this year, the national high-tech zones, driven by innovation, showed strong resilience in economic development, recording an operating revenue of 29.5 trillion yuan, up 21.9 percent year on year. Since the beginning of this year, China has introduced a series of preferential policies for additional deductions on taxable R&D expenses, and continuously released tax dividends. According to data from the State Taxation Administration (STA), by the end of October, enterprises across China had enjoyed 1.3 trillion yuan of additional deductions in advance or 333.3 billion yuan of tax cuts or exemptions. "Greater policy support will help stimulate innovation," said Liu Baozhu, an inspector from STA. According to Liu, 82.1 percent of enterprises enjoying such preferential policies have each received an additional deduction of over 1 million yuan of R&D expenses, and enterprises enjoying such preferential policies have each invested 4.565 million yuan in R&D on average, up 13.3 percent year on year on a comparable basis. -- Innovation-driven development generates strong spillover effects China's innovative development also has a strong spillover effect, injecting new impetus into the innovative development of many countries and the world economic recovery. Currently, China has established sci-tech cooperation relations with more than 160 countries and regions, signed more than 110 sci-tech cooperation agreements, and participated in 200-odd related international organizations and multilateral mechanisms. China's contribution to global sci-tech innovation has significantly increased. The COVID-19 nucleic acid test kit manufacturing plant in Ethiopia is a microcosm of BGI Genomics Co., Ltd.'s contribution to the global fight against COVID-19. BGI Genomics Co., Ltd. (300676.SZ), a company based in Shenzhen, Guangdong, has built 10 Huoyan, or Fire Eye laboratories in Gabon, Togo, Ethiopia, Angola, Botswana and Guinea as of the first three quarters of this year. "We not only export testing technology and equipment, but also provide services such as training and technical support to local laboratory staff. Chinese and foreign technicians work together to identify COVID-19 variants and test nucleic acid samples using advanced technologies," said Cao Wei, director of international public affairs at BGI Genomics Co., Ltd., adding that the company operates over 90 Fire Eye laboratories in more than 30 countries and regions around the globe. As of October 17, China had provided more than 1.5 billion doses of COVID-19 vaccines to 100-odd countries and international organizations. It will continue to provide more safe and effective vaccines to the world, especially to developing countries. China's Five-hundred-meter Aperture Spherical Radio Telescope (FAST) is the world's largest and most sensitive single-aperture radio telescope, capable of receiving electromagnetic signals from more than 10 billion light years away. From March 31 this year, the FAST began soliciting observation applications from astronomers around the world, and as of mid-November, more than 30 applications have been received, which has become a model of international sci-tech cooperation and exchange. Li Yingbo, an associate professor at the School of Public Policy and Management of Tsinghua University, said that China's innovative development has had a great spillover effect. For example, Li added, vaccines developed in China have not only helped prevent and control the epidemic at home, but also helped protect the health of people around the world, and China's pioneering efforts in quantum technology and space exploration will paint a better picture for the sci-tech progress of mankind. "In the eyes of some Western politicians, innovation means a zero-sum game. However, the Chinese government is guided by the vision of a community with a shared future for mankind in promoting innovative development. This is of great significance for promoting global economic development and improving the well-being of people around the world," said Li. With the continuous growing sci-tech strength and the further construction of large-scale scientific research infrastructure, China will actively foster and launch new major international scientific programs centering onspace science, brain science, environmental science, etc., and attract outstanding scientists from all over the world to conduct joint research, with the aim to make greater contribution in promoting scientific cognition and technology innovation of mankind.
https://en.imsilkroad.com/p/325390.html
Nobody goes to work expecting to be involved in an accident; but unfortunately, slips, trips and unforeseen incidents are quite common in workplaces, it’s what you do afterwards that really counts. Personal injury is one of our specialist areas; so if you believe you are the victim in a work-based incident, we’d be happy to offer a little advice, especially if your employer is guilty of any of the following: - Badly maintained equipment: One of the biggest culprits of workplace accidents is poorly maintained equipment. Receive an injury because of faulty machinery, for example, and you have a strong case for a claim. Your employer has a duty of care to ensure that any equipment you use is fit for purpose and in good mechanical condition. Did you get a shock off electrical equipment, were dangerous parts of the machine exposed and was the machinery the main cause of your injury? If so, seek legal advice. - Poor training: Having the right tools for the job is one thing. Receiving proper training in the use of workplace equipment is a totally different matter. Before you use any equipment within the workplace you should have received proper training for the task, if the accident was due to poor workplace training, this isn’t your fault. - Lack of protective clothing: Do you need safety shoes, gloves, ear defenders or hard hats to perform your duties safely? Were you provided with these items? Your employer is responsible for providing you with all the protective clothing you need, get injured and make a claim if adequate safety gear wasn’t provided. - Poor working conditions: What are the standards of your working conditions like? Is there adequate lighting and ventilation, was the accident caused by uneven or dangerous flooring, would proper site maintenance have removed this danger? - Lack of manpower: Risk assessments should have been provided by your employer to ascertain how many people are required per task. If you are asked to lift something for example, or carry out a task that requires extra manpower, was the right level of cover provided?
http://www.attwoodandco.co.uk/workplace-accidents-the-common-culprits/
December Weather in Hawaii – Dis and Dat! The month of December is characterized by gradually falling daily high temperatures, with daily highs around 81°Fthroughout the month, exceeding 85°F or dropping below 77°F only one day in ten. Daily low temperatures are around 69°F, falling below 62°For exceeding 74°F only one day in ten. You should note that you MAY need more than a shortie nightgown during December in Hawaii, as temperatures are quite “chilly” at night during December. Also, note that December is during our rainy season, and rain will cool-down the air quite quickly. Over the course of December, the length of the day is essentially constant. The shortest day of the month is December 20 with 10:50 hours of daylight; the longest day is December 1 with 10:55 hours of daylight. The latest sunrise is around 7:10am on December 31; the earliest sunset is around 5:49pm on December 1. Most days in December still feature a fair amount of sunshine, but be prepared for lots of clouds, too. The median cloud cover is 51% (partly cloudy) and does not vary substantially over the course of the month. On December 16, a representative day, the sky is clear or mostly clear 31% of the time, partly cloudy 34% of the time, and mostly cloudy or overcast 35% of the time. The average probability that some form of precipitation will be observed in a given day is 41%>, with little variation over the course of the month. Throughout December, the most common forms of precipitation are light rain and moderate rain. Light rain is the most severe precipitation observed during 62% of those days with precipitation. It is most likely around December 3, when it is observed during 27% of all days. Moderate rain is the most severe precipitation observed during 26% of those days with precipitation. It is most likely around December 31, when it is observed during 11% of all days. The relative humidity typically ranges from 56% (mildly humid) to 88%(very humid) over the course of a typical December, rarely dropping below 47% (comfortable) and reaching as high as 97%(very humid). It is most humid around December 31, rising above 84% (humid) three days out of four. Over the course of a typical December, the dew point typically varies from 61°F(comfortable) to 68°F(muggy) and is rarely below 56°F (comfortable) or above 72°F(very muggy). Winter days in the islands are typically a mixed bag of sun and mauka showers. Over the course of December typical wind speeds vary from 0 mph to 17 mph (calm to moderate breeze), rarely exceeding 23 mph (fresh breeze). The highest average wind speed of 10 mph(gentle breeze) occurs around December 3, at which time the average daily maximum wind speed is 17 mph (moderate breeze). The lowest average wind speed of 9 mph(gentle breeze) occurs around December 31, at which time the average daily maximum wind speed is 15 mph(moderate breeze). The wind is most often out of the north east 43% of the time and east 26% of the time. The wind is least often out of the west 2% of the time, south east 3% of the time, south west 3% of the time, and south 4% of the time. Of course, these conditions are just AVERAGES, meaning the weather during December in Hawaii could be substantially different, depending on the current microclimate. And, make sure you book your Hawaii activities with a reputable company, such as Hawaii Aloha Travel. The tour professionals there will make sure they inform you of any cancellations/delays in your activity due to inclement weather.
https://www.hawaii-aloha.com/blog/2016/12/19/december-weather-in-hawaii-dis-and-dat/
Specific Challenge: Further major S&T progress and R&I investments are required for sustaining Europe's industrial competitiveness and leadership in photonic market sectors where Europe is strong. Europe needs also to strengthen its manufacturing base in photonics to safeguard the further potential for innovation and value creation and to maintain jobs. Finally, Europe needs to better exploit the innovation capacity of the more than 5000 existing photonics SMEs and the innovation leverage potential of the more than 40 existing innovation clusters and national platforms. Scope: a. Research & Innovation Actions Application driven core photonic technology developmentsfor a new generation of photonic devices (including components, modules and sub-systems). Focus is on the following topics: Optical communication for data centres: Low-cost, energy-efficient photonic devices supporting radically new system and network architectures driven by the emergence of exa-scale cloud datacentres. Actions should focus on optical inter- and intra-data centre transmission, switching and interconnects facilitating Tb/s interface speeds and Pb/s network throughput. High-throughput laser-based manufacturing: High-power, high-efficiency laser sources (both continuous wave and pulsed); novel technologies and devices for beam delivery and for processing of multiple beams from laser source arrays; high-performance optical devices and systems; fast synchronisation of laser source and high-speed scanning devices. PIC technology: Device, circuit and fabrication technology for PICs (Photonics Integrated Circuits), suited for cost-effective volume manufacturing on semiconductor or dielectrics based photonic integration platforms. Actions may cover also electronic-photonic integration, as well as heterogeneous and hybrid integration technologies for PIC-based high-performance or high-density modules. All RTD actions should address also the related materials, manufacturability, validation of results for the target applications, and standardisation activities, as appropriate. They should demonstrate strong industrial commitment, be driven by user needs and concrete business cases supported by strong exploitation strategies, and cover the value/supply chainas appropriate. b. Innovation support through public procurement actions Pilot deployment of software-defined optics in backbone networks: Equip the networks of Public network operators (e.g. NRENs) with novel Software Defined Optical Networking technologies (from component level to system and network level) using first commercial hardware and software to transport high traffic volumes to demanding customers in a dynamic way. c. Coordination and Support actions Actions driven by the key stakeholders in photonics and targeting: Open access of Researchers and SMEs to advanced design, fabrication and characterization facilities fostering the development of novel photonics solutions through the use of new materials, unconventional approaches and light-matter interaction. Cooperation of photonic clusters and national technology platforms to stimulate the innovation potential of SMEs, based on business cases demonstrating a clear potential for sales and deployment growth. Actions should link with on-going support actions providing access to advanced R&I services and capabilities with the aim to make them also accessible to researchers or to establish a network of innovation multipliers providing a broader technological, application, innovation, and regional coverage of such services and capabilities in order to address the needs of SMEs. d. ERA-NET Cofund action A joint call for proposals on a photonics topic of strategic interest, to be funded through an ERA-NET Cofund action between national and regional grant programmes. Expected impact: a. Research & Innovation Actions Improved business opportunities and value creation in Europe by reinforced cooperation along the value chain. Secured and reinforced industrial technology leadership and substantially increased market presence in high-bitrate optical communications for data centres and in laser-based manufacturing of high-quality products. At least 10-factor reduction of power consumption and cost in communication technologies for (exa-scale) data centres. Significant productivity increase and substantial leverage effects to many industries using laser-based manufacturing. Measurable productivity increase in the manufacturing of complex PICs and sustained break-through innovations in new photonic products fabricated in Europe. b. Innovation support through public procurement actions Faster and wider roll-out and deployment of software defined optical networking technologies and deployment of value-added services and applications in Europe. c. Coordination and Support actions Demonstrable value generation of novel photonics approaches by researchers and SMEs through enhanced access to advanced fabrication and characterisation facilities. Reinforced innovation effectiveness of cluster networks in particular towards SMEs with measurable value creation for SMEs in terms of number of business collaborations stimulated, penetration of new markets and/or new application areas close to the market, etc. d. ERA-NET Cofund action Closer cooperation and greater pooling of resources between regional, national and EU-wide research programmes in strategic photonics R&I areas. Types of action: a. Research & Innovation Actions – Proposals requesting a Small contribution are expected b. Public Procurement of Innovation (PPI) Cofund actions; any remaining funds will be transferred to action type a. above. c. Coordination and Support Actions d. ERA-NET Cofund Action, any remaining funds will be transferred to action type a. above. Wherever appropriate, actions could seek synergies and co-financing from relevant national / regional research and innovation programmes, e.g. structural funds addressing smart specialisation. Actions combining different sources of financing should include a concrete financial plan detailing the use of these funding sources for the different parts of their activities.
https://cordis.europa.eu/programme/id/H2020_ICT-27-2015
This thread inspired me to look at this sequence from the post-Ha preview again: SPOILER: Show Namely, the whole matter of "just what is written beneath that whiteout?" For the purposes of this exercise, I've assumed that something was typed out normally to start with, and the whiteout was added as an effect on top of it. Thus, the spacing between "&" and the name/descriptor of the four Reis should be the same as the spacing everywhere else in the caption cards' font. While not 100% uniform, it is pretty darn close. Having accounted for this initial space, we can test for what that initial letter might be. For testing purposes, I prepared a set of letters taken from the caption cards; "J" and "X" are approximated since they are never used in the preview. Whatever the initial letter is, most possibilities are ruled out right off the bat by virtue of the negative space on the left side, left exposed by the whiteout. Here, I've tested the most obvious options. T and J pass the test; X is ambiguous; the others fail. An initial "T" is by far more common than "J" (this holds for both English and Japanese), and "X" is a nonstarter, so "T" is far and away the most likely of the three. What word(s) or name(s) starting with "T", referring to Rei clones, could possibly fit in that space? Well... ...how about "Tentative"? And sure enough...! (NOTE: First and last letters of "TENTATIVE" are transparent to show their ability to "clear" the whiteout.) So there you have it! Mystery solved, I think. EDIT: Added letter reference sheet and tests.
https://forum.evageeks.org/thread/20054/Private-Conference-Between-Mari-and-WHOM-Solved/
How we write white papers has changed. In the past, they were longer, more academic, and less visual. Today, white papers are used as a type of marketing tool, a form of lead generation. Because of this business writers need to adjust the tone, voice, style, and format of white papers, especially those which will be published on the web, shared with friends, and read on small mobile devices. Let’s look at how to get started with white paper writing. People often get confused what’s meant by a theme, especially when writing a business document, such as a white paper. Here’s one way to understand it. If you listen to classical music, you’ll be familiar with the concept of keys. A symphony is usually written in a specific key, for example, C major. Even though the melodies and chords change throughout the symphony, it always comes back to the underlying key. In other words, the key serves as a type of cornerstone for the music. Themes work like keys. The difference is that you usually have more than one theme in your document. Instead you may have one over-arching theme and several minor themes which dove-tailing into the major theme. Another way of looking at it is this. if you read novels, such as Great Expectations, even without being told there are themes in the book, you sense injustice, ambition, and discrimination. These are themes of the novel. It’s the same in your white paper. Make a list of the most important features in your product that you want to highlight. Identify the benefits they offer your potential customers. Identify the problems these solve. Look for real world examples of where these could be applied to the person’s life, either in the office or at home. Imagine the person talking about your product to a friend. What’s the one thing they’d recommend about it? What’s the one difference it’s made? What words would they use to describe it? Add a column for priority. Enter High, Low, and Medium as the values. Enter as much information as possible. Filter the matrix so you see the high themes first. This will help you identify the specific themes which you can apply to the main features. The point of doing this is to break down the document into parts so you can see how different themes needs to be woven into the narrative. The more you break out the document, the easier it becomes to zero in on specific sections and fine tune the text. Who’s going to read this? What are they going to do after reading it? Our target reader is… an IT executive, with an inbox full of white papers, case studies etc, under pressure to find very specific information, make a decision, find a solution – right now! When they go searching on the web, they enter in very specific keywords related to their issue/problem/decision. The white paper should address that very specific issue. In other words, be as specific as possible, written for people in a hurry, scanning through PDFs. Use active voice to drive the narrative. Use bullet points, tables, and diagrams to highlight info and balance text/image ratio. Identify the problem – How can you maintain a help desk big enough for a world full of customers? Scenarios – put yourself in the reader’s shoes. Make it real with scenarios and use cases. Benefits, Opportunities, Risks – to demonstrate our authority and expertise we need to help the reader see things they may not have already thought of. Statistics – highlight memorable stats and facts in ‘pullouts’. Call to Action – in the final paragraph encourage the reader to take some action, either email you, read more, or subscribe to your newsletter. One tactic to understand how the reader think and feels about your product is to use the following format. Use the following format to identify their needs, problem, and objections. This type of reader is interested in this feature because their problem is this issue, so our solution is to do this, but the objection may be the following. But their objection may be – identify why they are likely to dismiss or exclude this, for example, concerns with price, implementation, track record. Once we understand their objection, we can develop responses that reduce their concerns. Because their problem is – getting employees to complete their timesheets when in the field, abroad, outside the network. Our solution is to – offer a secure timekeeping application that can be installed and bound to devices. But the objection may be – concerns if the device is lost, security breaches, and if reports can be exported into their HR system. Avoid small fonts and difficult to read text. Next week we look at how to promote your white paper and how to start a career as a white paper writer.
http://klariti.com/white-papers/writing-guidelines-format/
The Harlin Museum of West Plains is set to open its 2021 season of events with its annual Fiber & Textile Arts Competition Show, which will be on display in the museum’s Hathcock Gallery from Feb. 5 to 28. The museum has issued a call for submissions to all regional fiber arts and textile arts artists. Submissions meeting stated guidelines will be accepted, with payment, between noon and 4 p.m. Jan. 29 and 30 in the main gallery the museum, 405 Worcester St. Fees to enter are $20 for one submission, $30 for two, $35 for three and $40 for four. Artists entering four pieces may submit a fifth one free. There is a limit of five entries per artist, and payment must be made by cash or check. Any item created using fibers or textiles may be eligible for submission, including quilts/quilt art, afghans, crocheted and knitted articles, embroidery, hand-woven or machine-woven articles, felted wool projects, lacework, tatting, appliqué, handmade apparel from pattern or personal design, beaded items, woven rope, canvas work such as needlepoint or petit pointe and macramé. COMPETITION GUIDELINES Any type of art or craft item that uses fiber or textile components as part of the piece is eligible to enter. All pieces must be the work of the artist entering the competition and must not have been previously entered in a Harlin Museum Competition Show. All competition entries will be evaluated with 25% weight given for general appearance, 50% for construction and 25% for artistic design. All entries that need special support to display item must have support provided by the artist. Designer clothing must have the proper hangers to assist in displaying the items. All hangers and display supports will be returned to their owners at the conclusion of the show. Any questions regarding eligibility or other inquiries can be emailed to the museum at [email protected] or called into the museum directly at 256-7801. The Harlin Museum is a cultural arts center that has been telling the story of the Ozarks through art and history since 1972. The facility is the exclusive owner of the L.L. Broadfoot art collection and offers historical artifact and art preservation, instructional workshops in fine art and folk-art subjects, competition art shows and historical exhibits, and educational programming for youth and adults. Learn more at harlinmuseum.com. Watch this discussion.Stop watching this discussion. (0) comments Welcome to the discussion. Keep it Clean. Please avoid obscene, vulgar, lewd, racist or sexually-oriented language. PLEASE TURN OFF YOUR CAPS LOCK. Don't Threaten. Threats of harming another person will not be tolerated. Be Truthful. Don't knowingly lie about anyone or anything. Be Nice. No racism, sexism or any sort of -ism that is degrading to another person. Be Proactive. Use the 'Report' link on each comment to let us know of abusive posts. Share with Us. We'd love to hear eyewitness accounts, the history behind an article.
CST Studio Suite® is a high-performance 3D EM analysis software package for designing, analyzing and optimizing electromagnetic (EM) components and systems. Electromagnetic field solvers for applications across the EM spectrum are contained within a single user interface in CST Studio Suite. The solvers can be coupled to perform hybrid simulations, giving engineers the flexibility to analyze whole systems made up of multiple components in an efficient and straightforward way. Co-design with other SIMULIA products allows EM simulation to be integrated into the design flow and drives the development process from the earliest stages. Common subjects of EM analysis include the performance and efficiency of antennas and filters, electromagnetic compatibility and interference (EMC/EMI), exposure of the human body to EM fields, electro-mechanical effects in motors and generators, and thermal effects in high-power devices.
https://www.3ds.com/products-services/simulia/products/cst-studio-suite/
Beading has been a symbol of Kenyan national pride and various traditions for generations. Intricately beaded necklaces and collars are worn by women offer clues to their marital status, health, and even number of children. Join CultureALL Ambassador Josie Shaw on an expedition to explore various vibrant colors that are used and the meaning behind the color choice and the beauty of Kenyan traditions. Region/Culture Kenya Subject(s) Social Studies, Visual Art Participants 25 max Standard Length 45 min Room Setup Tables/desks and chairs for beading Supplies/Equipment Needed:
https://www.cultureall.org/workshops/beading-a-kenyan-tradition
Q: Axis for 1 day with a step of 10 mins in cubism I am trying to make an axis of 24 hours with a separation of 1 hour in cubism. var context = cubism.context() .serverDelay(30*1000) .step(10 * 60 * 1000) //The step size is 10 mins .size(window_width - 200); d3.select("#viz").selectAll(".axis") .data(["top", "bottom"]) .enter().append("div") .attr("class", function(d) { return d + " axis"; }) .each(function(d) { d3.select(this).call(context.axis().ticks(d3.time.hours, 1).orient(d)); }); This line context.axis().ticks(d3.time.hours, 1).orient(d) is somehow wrong. Since the axis text gets overlapped and nothing is visible. I tried many combinations like 60 mins, 1 Day but nothing seems to work. Can anyone please help me. A: You're misunderstanding what size does. size does not indicate the number pixels you have available on the screen. It indicates to the number of data points you have, which in turn is the number of pixels you need to show your data. The number of data points determines size, not the other way around. You mentioned that you have data over an interval of 24 hours with a value every 10 minutes. This makes your graph 144 px wide, not window_width - 200 as you're specifying in the size. This also explains why despite your best efforts you can't get more labels on the axes. Cubism does not want to clutter your tiny graph so it's only allowing you a maximum of 3 or 4 labels. The best way to solve this problem would be to increase the number of data points. You can do this in 2 ways: Reduce your step to 1 or 2 minutes to get a wider graph (1 minute gives a 1440px wide image, and 2 minutes a 720px wide image). In case that's not possible, increase your time window to a week (1008 px).
Web Design Predictions and Lessons from the Past Revisited Since 2006 I have attended many conferences on the subject of web design and development (of course I’ve also learned a lot on the job). I thought it’d be a good idea to revisit some of the predictions, tips, tricks, and best practices of the past to see how they have panned out. From my perception – your mileage may have varied – 2005, 2006 were the years that the idea took off that websites, like desktop software, needed a serious kick in the usability pants. Indeed, the idea, taken further, really argued that websites, and/or web applications, should actually be more like desktop software. I got into this industry, officially, in 1999, but it wasn’t until the mid-2000s that I began to see websites as something more than an online brochure. A conference I’d attended the summer of 2006 in San Francisco was all about usability and user testing. This is when the notion of “Well if the users can’t use it very well it must be their fault somehow” underwent a serious siege, the battering ram of User Experience (UX) knocking it to pieces. Ushered in was the era of user-friendly websites. Technology still had some serious catching up to do, though, for all of those ideas discussed at the time to truly come to fruition. After all, the current version of Internet Explorer at the time was 6. But at least the conversation got started and some of the basic ideas were possible. Of course this all definitely panned out. The user testing craze has mostly died down, though. And I think this is because there’s a lot of data and knowledge out there from past user testing; a lot of ground work has been laid and practices have become standard that were born from rigorous user testing. But User Experience now has its own acronym: some have even had it incorporated into their job title: “UX Designer” or “User Experience Specialist” and the like. In December of 2007, I went to a WebBuilder conference in Las Vegas. Many more ideas were discussed, building on the premise of UX. “Web 2.0” was new and still, um, trending, so to speak. Among those ideas discussed was the notion of a “rich web experience.” Things like reduction in page loads (server requests) by using Ajax modals, right-click menus, drag & drop, and deep interaction with information were discussed. All this was largely adopted of course, but caveats. Lots of what was discussed was only possible with JavaScript and/or Ajax at the time. Now, however, much of that can be done with HTML5 and CSS3. Web no-nos discussed at the time were pop-up windows, tiny targets, “pogo stick nav,” and too many links. Those indeed have thankfully been purged, for the most part, but partly because of the mobile revolution. Those “anti-patterns” were bad enough for a desktop experience, but they would have been unbearable in a mobile environment. Interestingly, some of the good ideas discussed I think have gone away, partly because of the mobile revolution, too, like slide-outs and in-place zooms. Of course, on a mobile phone, most of the time you can zoom in and zoom out the entire page. Social media and social design got more than a few nods at the time. There was a perception that those things would become extremely important in the future but few realized exactly what direction it’d go in. There was a particular focus on blogs then. Of course blogs are still saturating the web; there was a notion of companies having sites that were blog-like, or leveraging blogs as part of their overall web strategy, because of the traffic that could bring to their website and/or product. Maybe even more importantly was the idea of customer interaction. But what’s happened is that the concept has been moved to Facebook walls and the Twitter dimension. Facebook at the time was barely a blip on the social media radar and Twitter existed then but few knew about it. Along with the new-fangled Facebook, Amazon, YouTube and – yes – MySpace, was in this discussion. We were told to design for the users’ personal value first and then build the online community around it. But what I’m seeing now, especially with Facebook, and literally with Google+, is a lot more emphasis on the personal value, as real-name accounts are entirely about you and your circle or circles around you. There isn’t a lot of interaction with strangers any more, except on Twitter. Facebook, as has been said, is where you go to lose friends, and Twitter is where you make new ones. At any rate, the social media model, generally speaking, has panned out, but it’s more about fan pages, tweets and advertising rather than comments and links on blogs. User testing garnered a mention or two at the 2007 conference, but not much more than that. But as the discussion of user testing was coming to an end, the discussion of web fonts was just beginning. Perhaps the biggest focus then was content. Content, content, content! “Content is King!” Dynamic content, interactive content, user content, you need CONTENT, people! Websites aren’t online brochures anymore! Now, of course, that was all well and good. Content is still important but we’re realizing that the word is about as useful as the word “sports.” Ultimate fighting is considered a sport. But… so is professional poker. It wasn’t until 2009, at a conference in New York City – actually called Future of Web Design – where I first heard a talk on actual content strategy. This was by the witty Kristina Halvorson from Brain Traffic. It was time to stop relegating a website’s content to an afterthought; it needed to be an integral part of the overall design process. “Greeking” the copy needed to come to an end, as that was a mistake that had often led to broken designs once real content was inserted later. Prioritizing, what content needed to go where, and what content got the most attention and what didn’t and how to leverage that knowledge was all discussed in a way I hadn’t seen before. The industry has now taken this to heart and I think Halvorson deserves a lot of credit for that. Also in NYC I observed HTML5 and CSS3 get a lot of discussion. It wasn’t until then that one could actually start using them in a practical sense. Terms like “progressive enhancement” came to popular use in that era: the idea that we can still make sites look nice and usable in older browsers but it was time to move forward with new features that only the newest browsers would display. “Today’s 10% will be tomorrow’s 40%.” It was time to start designing websites for the future, not the past. We were encouraged to start using fade effects, enriching form elements, utilizing drop shadows, CSS gradients, and RGBA for color. We were encouraged to stop using images for navigation, or other elements that could be developed with pure CSS, something I’ve personally taken to heart. But the whole web development community has definitely moved forward with all of these notions. And now with Internet Explorer finally doing auto-updates, along with Chrome (and, somewhat, FireFox), the doors are opening to these things more than ever. But 2009 was the first time I started using or attended a talk on JQuery, which offered an easy-to-program form of JavaScript that is a nice way to achieve cross-browser effects without a need to get into something as heavy as AJAX, or take the risky plunge into full support for the “progressive enhancement” philosophy, or… use Flash. I think it’s fitting that the 2007 conference had a talk on Flash that went horribly wrong (imagine the websites you’re intending to discuss not actually loading up), because in the next one the rumblings of the death of Flash began. There was talk of using the HTML5 <video> tag for presentation of video content instead of Flash for more compatibility across devices (which is ironic because one of the advantages of Flash had been presenting web media and apps in a cross-browser compatible way). To replace the need of Flash for animation, CSS3 animation was mentioned. It wasn’t until 2010 that I actually saw CSS3 animation demonstrated, though. Its cross-browser compatibility was limited then, and unfortunately it still is. But the high potential of it was recognized. The coding skill needed to create them was and is intense so, like Flash, an application would still be a useful tool for any developer who is not a coding savant. In 2010 and 2011 concern for designing and developing for the mobile environment kicked into high gear with two conferences I’d attended (both An Event Apart). This coincided with an exponential growth in the mobile web which shows no sign of stopping today. Other things were discussed but mobile was the hot topic. The iPhone was well-established by then and Android phones were taking a big bite out of the Big Apple. As I have discussed in my recent blog posts, things are fast-moving and uncertain in addressing this problem. This area of web design and development is still very much in flux. (Mobile versions of sites? Designing for mobile first? “There IS no mobile web?” Responsive design? Nix the layout?) If you consider that, in the period of less than a year, at the same conference (AEA), you learn how to make a mobile version of the site, then later learn that mobile versions are maybe a bad idea, you get an idea of the chaos. Even the leading idea, Responsive Design, has weathered some pretty serious criticism, notably the idea that sometimes mobile users, myself included, like to be able to zoom in, or zoom out, of a webpage at their own discretion, depending on the content. It’s almost like thunderous applause suddenly stopping and everybody mumbling "Uhh, wait a minute..." So now where were we, web designers and developers, in 2012? Where we usually are: uncharted territory. I suppose we’re used to that by now, aren’t we?
The history of Japanese cha-no-yu (tea ceremony) dates back to the Nara period, although the original form of wabi-cha was developed during the Muromachi period. Murata Juko, who appeared in the middle of Muromachi period, developed the original form of wabi-cha (Soan-no-cha), which sought tranquility of the soul in aesthetic surroundings, as opposed to the gorgeous cha-no-yu tea ceremony that had conventionally carried out in shoin drawing rooms. After passing through further evolution by Takeno Jōō, Sen no Rikyu refined the simple interaction of “the host pouring tea for the guest to drink” into the ultimate auspicious setting during the Azuchi-Momoyama period. In the wabi-cha tea ceremony, the concept that every single encounter is never repeated in a lifetime is wholeheartedly embodied by the host and guest. Honed over many years, the concepts of omotenashi (hospitality), furumai (deportment), and shitsurai (arrangements) conceal human physical sensations and inner psychology. In order to recapture the intrinsic nature of wabi-cha with a modern feel, KAI examined what needed to be preserved in the chashitsu, what parts of the tea gathering should be deconstructed, and what should be deviated from in the tea ceremony. As a result, it developed KAI-RO as an expression of the ultimate auspicious setting. 茶室という特殊な建物に繊細かつ大胆に向き合うため、かつての茶室の構造を基本に置きながらも、現代の限られたスペースの中で提案できることは何かを徹底的に考え抜いた。 新しい茶室のカタチづくりは、俗塵を払う露地、心頭をすすぐ蹲、ワビに入る躙口、心を交える小間、あたたかみを添える炉、趣向を凝らす床の間など、それらがもたらす役割を見極め、変えないものと変えるものを丁寧に選り分ける作業から始めた。そのうえで、四畳半の広さで茶室の魅力を堪能できるような工夫を検討した。 「KAI-RO」では、寄付と待合、待合と茶室など、それぞれの場が干渉し合わないように「二階建て」という手法をとり、庭を介さずに空間の境界を設けるため「螺旋階段」を据えた。1階に半畳の囲炉裏、2階に炉と床の間をつくった。また、上下階の空間にしたことで、本来の茶室のような一方向の流れだけではなく、両方の空間を行ったり来たりして楽しめるという新しい使い方を見出した。 To delicately and boldly confront the special building that is a tea house, we thoroughly considered what can be proposed within the spatial limitations of the modern age while retaining the basic structure of the traditional chashitsu. Creating the shape of a new chashitsu began from the work of discerning the roles of the various elements, such as the roji for dusting off earthly affairs, the tsukubai stone washbasin for cleansing one’s soul, the nijiriguchi for entering the austere atmosphere, the koma for seeking conviviality, the irori for providing warmth, and the tokonoma alcove for elaborating the setting, and carefully selecting which items should be changed and which shouldn’t. Then, we examined ways to ensure that guests can fully appreciate the appeal of the chashitsu in a room measuring four and a half tatami mats. KAI-RO has adopted a two-story structure to ensure that the yoritsuki (entrance room), machiai (waiting room), and chashitsu (tea-ceremony room) do not interfere with each other. Moreover, it has installed a spiral staircase to establish a boundary between spaces without using a garden. There is a hearth of half-mat size on the first floor, while the second floor comprises a fireplace and a tokonoma. By arranging these spaces on different floors, we have devised a new way to enjoy not only the conventional one-direction flow of the chashitsu, but the fun of moving between the spaces. 「KAI-RO」のもう一つの特徴は、動かないことが前提だったこれまでの茶室に対して、どこへでも自由に動く茶室であることだ。動くというのは車輪がついているという意味ではない。組み立てて終わりではなく、解体して部材の持ち運びができ、好きな場所で再び組み立てられるということである。 基本的な構造には、螺旋階段を含めて組み立て式の技術を用いた。KAI-KIやKAI-SOUでも展開したように、亭主の趣向によっては、柱をアクリルと木などの異素材の取り合わせでつくってもよいし、アルミ製の意匠棚を持ち込むこともできる。また、室内につくった茶室なので、壁は内装として独立しており、簡単に取り変えることができる。 部材は、あえて手に入りやすい直径10センチの足場丸太と幅24センチの足場板を採用した。庭師さんが高い木の剪定で利用するもので、いずれも手頃な値段の材だ。ただ、茶室というあるレベルの品格を保つための「KAI-RO」ではその素材感の出し方にこだわった。 会期中は、さまざまな人が寄りつどい、遊び楽しむ場となる。茶・花・書・連歌から、ポップでパンクなイベントまで、いろいろに混ざった出来事をおこしたい。 One more characteristic of KAI-RO is that, whereas conventional tea houses were predicated on being immovable, this tea house can freely move anywhere. This doesn’t mean that tea house is equipped with wheels; however, rather than simply being assembled and completed, it can be disassembled so that the parts can be carried to another place and put back together again. The basic structure including the spiral staircase utilizes assembly technology. As is also deployed in KAI-KI and KAI-SOU, depending on the owner’s taste, pillars can be a combination of different materials such as acryl and wood, while aluminum artistic shelves can also be introduced. Moreover, since this tea house is constructed indoors, the walls are independent interior furnishings that can be easily replaced. As for the parts, easily obtainable scaffold poles of 10 centimeters in diameter and scaffold boards measuring 24 centimeters across have been adopted. Such parts, which are used by gardeners for pruning tall trees, are reasonably priced. However, effort was made to evoke a sense of texture in KAI-RO worthy of the dignified nature of a tea house. During the campaign period, this will be a place where various people can gather and enjoy themselves. Whether it be the tea ceremony, flower arranging, writing or linking renga poetry, we hope to stage a variety of events ranging from pop to punk.
https://kai36.jp/story3/
Amedeo Modigliani (1884-1920), after. ‘Nu couché ou nu rouge’ - Chromolithography - Numbered - Signed - Embossed stamp. Size: 50 x 70 cm. Image size: 40 x 61 cm. Numbered in pencil: 29/50. Very limited edition. The original work dates from 1917. Signed in the plate in facsimile. Embossed stamp: Georges Israel. Ink stamp of the De Jong gallery, New York, on the back. This artwork was obviously printed post mortem. In good condition. Some little defects on the edges and in the corners. Please take a close look at the many pictures. International shipment with track & trace. Title: Red Nude or Reclining Nude, is an oil on canvas of 1917 painted by the Italian artist Amedeo Modigliani. The painting was sold $170,405,000 at Christie's in New York on November 9th, 2015, a record for a Modigliani painting, which places it among the most expensive paintings ever sold. It was purchased by Chinese businessman Liu. The painting is part of a famous series of nudes that Modigliani painted in 1917 on behalf of the Polish art dealer Leopold Zborowski. It is believed that it was included in the first and only art exhibition of Modigliani in 1917, at Berthe Weill Gallery, closed by the police. On the other hand, Christie's notes related to the sale of this lot indicate that this series of nudes by Modigliani has served to reaffirm and revive the nude as a subject of modern art Birth: July 12th, 1884. Livourne (: Tuscany) Kingdom of Italy. Death: January 24th, 1920 (at the age of 35) Paris (France). Birth name: Amedeo Clemente Modigliani. Nationality: Italian. Occupation: painter, sculptor. Training: Academy of drawing of Florence (1838-1840). Masters: Henri de Toulouse-Lautrec, Paul Cézanne, Pablo Picasso, Constantin Brâncuşi. Place of work: Paris. Movement: Figurative Art, Modern Art, School of Paris. Influenced by: Henri de Toulouse-Lautrec, Paul Cézanne, Constantin Brâncuși, Auguste Renoir,Pablo Picasso. Child: Jeanne Modigliani. Amedeo Clemente Modigliani, born July 12th, 1884 in Livorno (Italy) and died on January 24th, 1920 in Paris (France), is an Italian figurative painter and sculptor of the School of Paris. Initially considering himself as a sculptor, it was only from 1914 on, that he devoted himself exclusively to the drawing and the painting of portraits and nudes. His works, with stretched forms and faces without looking like masks, remain emblematic of the modern art of this era. He died prematurely, sick and alcoholic; the next day, his companion, Jeanne Hébuterne, nine months pregnant, commits suicide. His brief career left a work with unique aesthetics which was not understood by his contemporaries, but which received a success after his death, strengthened by the myth of the young cursed artist. The number of transactions of Modigliani's works is relatively small. Paintings and sculptures represent about 15% of these lots. The watercolours and pencils of this prolific draughtsman make up 60% of the auctions. These are regularly auctioned between €10,000.- and €100,000.- We only list about thirty sculptures and four hundred oils. The most sought-after works are those from 1906 to 1920, during which time he almost exclusively devoted himself to the portrait. Modigliani had the intuition that he had found his ‘identity’ with these works. The works from 1910 to 1913 are the rarest. Today, his most expensive canvas is still an oil from 1917, ‘Nu assis sur un divan’.
https://www.catawiki.de/l/34275869-amedeo-modigliani-d-apres-nu-couche
Boosting Decision Tree is a type of Model Ensemble where we learn iteratively better Decision Tree classifiers based on errors from prior Tree. Data are first given the same weights. During training, wrongly classified data gain bigger weights, allowing the next Decision Tree to focus specifically on them. Each Decision Tree also has a score indicating its classification accuracy. These scores will then be used to weight each Tree in the final aggregated model. The main goal of Boosting Decision Tree is to reduce bias, whereas the goal of Bagging is to reduce variance. Algorithm Advantages Allow to use different Loss Function Caveats Prone to overfitting. Should stop early to regularize.
https://sites.duke.edu/computervision/2018/07/08/boosting-decision-tree/
Drug addiction develops due to brain-wide plasticity within neuronal ensembles, mediated by dynamic gene expression. Though the most common approach to identify such ensembles relies on immediate early gene expression, little is known of how the activity of these genes is linked to modified behavior observed following repeated drug exposure. To address this gap, we present a broad-to-specific approach, beginning with a comprehensive investigation of brain-wide cocaine-driven gene expression, through the description of dynamic spatial patterns of gene induction in subregions of the striatum, and finally address functionality of region-specific gene induction in the development of cocaine preference. Our findings reveal differential cell-type specific dynamic transcriptional recruitment patterns within two subdomains of the dorsal striatum following repeated cocaine exposure. Furthermore, we demonstrate that induction of the IEG Egr2 in the ventrolateral striatum, as well as the cells within which it is expressed, are required for the development of cocaine seeking. Data availability Source data file for RNA-seq and smFISH experiments are available at NCBI GEO: GSE158588, and http://dx.doi.org/10.17632/p5tsv2wpmg.1. - RNA-seq of five brain structures after repeated exposure to cocaineNCBI Gene Expression Omnibus, GSE158588. Article and author information Author details Funding Israel Science Foundation (1062/18) - Ami Citri Brain and Behavior Research Foundation (18795) - Ami Citri German-Israeli Foundation for Scientific Research and Development (2299-2291.1/2011) - Ami Citri US-Isral Binational Science Foundation (2011266) - Ami Citri The Milton Rosenbaum Endowment Fund for Research in Psychiatry - Ami Citri Prusiner-Abramsky Research Award in Clinical and Basic Neuroscience - Ami Citri European Research Council (ERC 770951) - Ami Citri Israel Science Foundation (393/12) - Ami Citri Israel Science Foundation (1796/12) - Ami Citri Israel Science Foundation (2341/15) - Ami Citri The Israel Anti-Drug Administration - Ami Citri EU Marie Curie (PCIG13-GA-2013-618201) - Ami Citri National Institute for Psychobiology in Israel, Hebrew University of Jerusalem (109-15-16) - Ami Citri Adelis Award for Advances in Neuroscience - Ami Citri The funders had no role in study design, data collection and interpretation, or the decision to submit the work for publication. Ethics Animal experimentation: All animal protocols (# NS-13-13660-3; NS-13-13895-3; NS-15-14326-3; NS-16-14644-2; NS-14667-3; NS-16-14856-3; NS-19-15753-3) were approved by the Institutional Animal Care and Use Committees at the Hebrew University of Jerusalem and were in accordance with the National Institutes of Health Guide for the Care and Use of Laboratory Animals. Reviewing Editor - Jeremy J Day, University of Alabama at Birmingham, United States Publication history - Received: November 26, 2020 - Accepted: March 15, 2021 - Accepted Manuscript published: March 16, 2021 (version 1) - Version of Record published: April 20, 2021 (version 2) Copyright © 2021, Mukherjee et al. This article is distributed under the terms of the Creative Commons Attribution License permitting unrestricted use and redistribution provided that the original author and source are credited. Metrics - - 1,059 - Page views - - 132 - Downloads - - 3 - Citations Article citation count generated by polling the highest count across the following sources: Crossref, PubMed Central, Scopus. Download links Downloads (link to download the article as PDF) Open citations (links to open the citations from this article in various online reference manager services) Cite this article (links to download the citations from this article in formats compatible with various reference manager tools) Further reading - - Neuroscience The automatic initiation of actions can be highly functional. But occasionally these actions cannot be withheld and are released at inappropriate times, impulsively. Striatal activity has been shown to participate in the timing of action sequence initiation and it has been linked to impulsivity. Using a self-initiated task, we trained adult male rats to withhold a rewarded action sequence until a waiting time interval has elapsed. By analyzing neuronal activity we show that the striatal response preceding the initiation of the learned sequence is strongly modulated by the time subjects wait before eliciting the sequence. Interestingly, the modulation is steeper in adolescent rats, which show a strong prevalence of impulsive responses compared to adults. We hypothesize this anticipatory striatal activity reflects the animals’ subjective reward expectation, based on the elapsed waiting time, while the steeper waiting modulation in adolescence reflects age-related differences in temporal discounting, internal urgency states, or explore–exploit balance. - - Computational and Systems Biology - Neuroscience How dynamic interactions between nervous system regions in mammals performs online motor control remains an unsolved problem. In this paper, we show that feedback control is a simple, yet powerful way to understand the neural dynamics of sensorimotor control. We make our case using a minimal model comprising spinal cord, sensory and motor cortex, coupled by long connections that are plastic. It succeeds in learning how to perform reaching movements of a planar arm with 6 muscles in several directions from scratch. The model satisfies biological plausibility constraints, like neural implementation, transmission delays, local synaptic learning and continuous online learning. Using differential Hebbian plasticity the model can go from motor babbling to reaching arbitrary targets in less than 10 min of in silico time. Moreover, independently of the learning mechanism, properly configured feedback control has many emergent properties: neural populations in motor cortex show directional tuning and oscillatory dynamics, the spinal cord creates convergent force fields that add linearly, and movements are ataxic (as in a motor system without a cerebellum).
https://elifesciences.org/articles/65228v1
The government has made two important announcements this week, which impact on the employment tribunal system and which (potentially) heralds good news for employers. Unfair dismissal – Two year’s service for bringing a claim One of the major changes the Government announced on Monday 3rd October 2011 was the change to the qualification period for the right to claim unfair dismissal, which will move from one to two years, with effect from April 2012. The purpose of this the Government says is to allow companies to resolve workplace disputes and overall reduce the number of tribunal claims. This should in theory give employers greater flexibility when dismissing an employee, however there is still some concern regarding the changes, as previously when the qualifying period was set at two years, there was a legal challenge of indirect discrimination to women. Leading on from that now, there could potentially be further challenges on the basis of age (as younger people are less likely to have long employment). Even if these these challenges stand up to legal scrutiny it is still advisable for employers to ensure they exercise caution and follow the correct guidelines when dismissing an employee. A cost to claimants for bringing claims The Government has also announced that as from April 2013, it intends to put in place a system where claimants will have to pay a fee for bringing a claim at the employment tribunal. The fee will be refundable if the claimant wins, however very little is known about the precise terms of the fees at the moment. This is the first time such a system has been introduced and the Government reportedly proposes to consult on the level and structure of fees later this year. Watch this space…..
https://www.independentpersonnel.co.uk/news/changes-to-the-employment-tribunal-system
Player Name: Password: Forgot your password? Click Here Language: English 简体中文 繁體中文 Español Français Русский 日本語 한국어 Home About MT News Game Info Tournaments Affiliates Contact Us View OHMC Winners Registered Players View Seats View Results by Players Tournament’s Rules By reading this agreement you confirm that you are familiar with the rules and the modalities of the Open Hungarian Mahjong Championship Online (OHMC-Online): Starting Dates: OHMC-Online is held on March 1 - 2, 2008 Click here to view the rules and scoring Tournament Weight: 1 MORSE points Tournament Rounds: Tournaments rounds are held on March 1 and 2, 2008 . Three rounds on March 1 and three rounds on March 2. Time Frame for Playing: Each round consists of 16 hands or one hour and a half of play, whichever comes first. Each participant will play six 16-hand rounds with each lasting no more than one hour and a half. The Playing time for all six rounds will be up to but not greater than 9 hours. Please note that the next round does not start until all the tables in the first round are completed .You will receive an online notification shortly before the next round starts. Please respond promptly when you receive the notification. If you do not respond in timely manner, you are automatically disqualified for the round and an auto player that can’t win will play for you. Each player has a maximum of 15 sec. per move. Each player is responsible for a good Internet connection since the clocks WILL NOT stop in case of disconnection or offline. In the unlikely event of internal technical problems of the server, MahjongTime reserves the right to restart the game at the specific position before such an incident might occur or ask the players to replay the unfinished hand. The player with the highest score wins the tournament. Registration & Check-in: The registration closes 24 hours before the starting time. The registered players are required to check-in(login to the game) 15 minutes before the tournament starts. Scoring: At the end of each round, each player will receive a “table point” according to the score. The table point assignment is as follows: -> highest score: 4 pts -> 2nd highest score: 2 pts -> 3rd highest score: 1 pts -> Lowest score: 0 pt If two (or more) players tie for a position, they share equally the added points. For example: 0.5 points each (half of 1 + 0) for two players sharing the last position. Tournament rankings are determined through table points. Players with more table points in a game earn higher placement in the tournament. If a tie in table points occurs between players, the player with the highest overall score will be ranked higher. In the unlikely event that two players are tied in both table points AND overall score, the player that won more hands in the game will be ranked higher. Prizes: Prizes for the 3 highest ranked, plus a prize for the highest ranked Hungarian Player. First Highest ranked player recives a collectable gold platted tile. View image: Fees: Full price is $25 Early Bird Special- Receive $5 off the full registration fee if register before February 1, 2008 MahjongTime League Members receive 50% off the registration fee: $10 if register before February 1 and $12.5 if register after. All players MUST be the legal age of majority in their jurisdiction or at least 21 years (whichever is greater). Nobody under this age limit is permitted to the tournament. The Tournament is played by Mahjong Competition Rules (Chinese Official). See the game info section of this web site for a detailed description of the rules: http://www.mahjongtime.com/Mahjong-Game-Info.html . Computer programs are not to be used to gain advantage. We will analyze every played game on our server and the detailed results will pass some sophisticated algorithms. Once you’ve registered for a qualifier tournament and the necessary number of players is reached, the Tournament will automatically start and unregistering is not possible anymore. MahjongTime reserves the right to publish the name, the nationality, the match of the winners and the runner up of the qualifier games or tournaments. The winner of the tournament grants MahjongTime the right to use his/her name and likeness for promotional purposes without further compensation. In case of any disputes regarding any terms or conditions of the OHMC-Online 2008 the decision of the MahjongTime management is final. The Terms and Conditions of the MahjongTime account agreement apply can be found here:
http://mahjongtime.com/MahjongTime-OHMC-Online.html
The Breaks Collective was a project born in 2005 when a group of North Devon musicians collaborated in a series of ‘jam’ style gigs. This group quickly formed into a band who have since released a number of singles and EPs, as well as their debut album, “Audio Art” (2013) which features collaborations with artists, Last Child Dancing, Jax, and Shire Roots. In a genre which is all too often full of urban clichés, The Breaks Collective bring a refreshing take on Hip Hop to the table, taking inspiration from many styles of music including jazz, rap, hip-hop, funk, soul, rock and R&B. Despite this wide range of influences, the six members knit melodies, beats and lyrics together to create a unique musical and poetic flavour. In addition to their live performances of new and back-catalogue tunes, The Breaks’ also keep audiences entertained with spontaneous sets and freestyles.
https://www.minglemusic.co.uk/the-breaks-collective/
Students with low-income parents are discovering that it is more difficult to find funds to pay for a college education now compared to students of similar economic backgrounds in the 1980s, said Alexander Monge-Naranjo, assistant professor of economics, Penn State. "The consensus was that in the 1980s, credit constraints didn't seem to matter for those who went to college," said Monge-Naranjo. "But according to the latest data, we see family income and parental wealth are making a big difference in who is attending college." Monge-Naranjo said there were several reasons for the move away from affordability. Over the last two decades, more higher-paying jobs required a college degree. The higher demand for a college education led universities to increase tuition, according to Monge-Narajo. At the same time, money available through government loan programs remained flat or, when adjusting for in inflation, declined. During the 1990s, the percentage of undergraduates who borrowed from government lending programs increased significantly. Of those students, the ones at the top limit of their borrowing capacity tripled to 52 percent. Many more students are relying on private lenders for loans, Monge-Narajo said. In the 1980s, credit constraints -- factors that limit financial access to college funding, such as caps on financial assistance and family income -- did not significantly stop students from attending college, once the researchers controlled for other factors, such as SAT score, age and race. Even poor students who had little financial resources to pay for college, but who were smart, could access credit to pursue an education, Monge-Naranjo said. The researchers, who reported their findings in the current issue of the American Economic Review, said a shift occurred in the 1990s as more low-income students began to struggle to access credit to pay for a college. During the 1990s, youths from high-income families were 16 percent more likely to attend college than youths from low-income families. Monge-Naranjo, who worked with Lance Lochner, associate professor, Western economics and director, CIBC Centre for Human Capital and Productivity, University of Western Ontario, used the most recent data from the National Longitudinal Surveys of Youth and the Armed Forces Qualifying Test to examine the relationships between intelligence, family income and college attendance. According to Monge-Naranjo, constraints on financial aid could have far-reaching economic impacts. When poor but intelligent workers are unable to earn a college degree, their career choices are restricted, Monge-Naranjo said. That could mean less qualified and less productive workers will attain those positions. "It's a matter of economic efficiency," said Monge-Naranjo. "Are we choosing the best individuals for the job, or just the individual whose parents are wealthy? In the long-term that may have an effect on the economy, although it may take a couple of generations to find out and, even then, perhaps be hard to quantify." The National Science Foundation supported this work. Matt Swayne | EurekAlert! Further information: http://www.psu.edu Further reports about: > North American economists > college education > economic impact > family income > financial assistance > low-income parents > productive workforce Frugal Innovations: when less is more 19.04.2017 | Fraunhofer-Institut für Arbeitswirtschaft und Organisation IAO Europe's microtechnology industry is attuned to growth 10.03.2017 | IVAM Fachverband für Mikrotechnik The nearby, giant radio galaxy M87 hosts a supermassive black hole (BH) and is well-known for its bright jet dominating the spectrum over ten orders of magnitude in frequency. Due to its proximity, jet prominence, and the large black hole mass, M87 is the best laboratory for investigating the formation, acceleration, and collimation of relativistic jets. A research team led by Silke Britzen from the Max Planck Institute for Radio Astronomy in Bonn, Germany, has found strong indication for turbulent processes connecting the accretion disk and the jet of that galaxy providing insights into the longstanding problem of the origin of astrophysical jets. Supermassive black holes form some of the most enigmatic phenomena in astrophysics. Their enormous energy output is supposed to be generated by the... The probability to find a certain number of photons inside a laser pulse usually corresponds to a classical distribution of independent events, the so-called... Microprocessors based on atomically thin materials hold the promise of the evolution of traditional processors as well as new applications in the field of flexible electronics. Now, a TU Wien research team led by Thomas Müller has made a breakthrough in this field as part of an ongoing research project. Two-dimensional materials, or 2D materials for short, are extremely versatile, although – or often more precisely because – they are made up of just one or a... Two researchers at Heidelberg University have developed a model system that enables a better understanding of the processes in a quantum-physical experiment... Glaciers might seem rather inhospitable environments. However, they are home to a diverse and vibrant microbial community. It’s becoming increasingly clear that they play a bigger role in the carbon cycle than previously thought. A new study, now published in the journal Nature Geoscience, shows how microbial communities in melting glaciers contribute to the Earth’s carbon cycle, a...
http://www.innovations-report.com/html/reports/economy-finances/society-stuck-bill-expensive-higher-education-187677.html
Energy efficient building materials are these days being used to improve the thermal insulation and efficiency of modern buildings. However, such energy efficient building materials have been shown to block not only the unwanted heat radiation but also the outdoor radio signals penetrating into the buildings. Consequently, providing adequate coverage inside these modern buildings by using legacy outdoor deployment solutions, e.g. macrocells, is proving to be quite challenging. One solution to this problem is to deploy a dedicated indoor network, building on, e.g., indoor distributed antenna systems (DAS). However, a key problem in indoor DAS systems, supporting multiple operators, is the passive intermodulation (PIM), which has typically been considered to originate from loose connectors and damaged cables. However, it has been recently found out that the antenna environment can also play a significant role in generating PIM in multi-operator DAS systems. This paper examines the effects of antenna location in real apartment buildings through real PIM RF measurements. In particular, the aim is to find suitable guidelines for antenna placement/installation in cases where the DAS antenna has to located in a corridor, in the center of a building. We also evaluate the impact of measured PIM levels on the indoor network coverage and capacity in a realistic building setting through detailed ray tracing based analysis. Overall, the findings in this paper show that the coverage and capacity of DAS based indoor radio networks are very sensitive to the associated PIM mechanisms, and thus specific emphasis should be put on the location planning and optimization of the antenna units inside the buildings.
https://tutcris.tut.fi/portal/fi/publications/passive-intermodulation-and-network-planning-challenges-in-future-indoor-networks-and-energy-efficient-buildings(b7631a50-45ac-44ff-8fd3-afb6576c04b8).html
Our Mission is to work for equal rights and opportunity for Arkansans with disabilities through public policy change, cross-disability collaboration, and the empowerment of people with disabilities and their families. Arkansas Support Network Phone: (479) 273-0338 Arkansas Support Network, Inc. is an organization dedicated to providing the highest quality services and supports possible for individuals who have disabilities. Arkansas's Parent Training & Information Centers Parent Training & Information Centers provide education and training for parents of children with disabilities, and for professionals who work with those children. Camp Aldersgate Phone: (501) 225-1444 Camp Aldersgate offers summer medical camps, respite camps and camps for children with disabilities. Disability Rights Center Phone: (800) 482-1174 Phone: (501) 296-1775 DRC operates federally-funded programs to advocate for and protect the rights of Arkansans with disabilities. Midwest Special Needs Trust Phone: (888) 671-1069 Midwest Special Needs Trust (MSNT) provides trust services for persons with disabilities. Special needs trusts are a type of trust specifically designed for individuals with disabilities. If properly structured and administered, special needs trusts do not affect an individual's eligibility for benefits such as SSI or Medicaid. In addition, MSNT administers the Charitable Trust. Funds of the Charitable Trust are used to provide assistance to individuals with disabilities who meet eligibility and income criteria. Rebuilding Together of Northwest Arkansas Phone: (479) 725-2488 Rebuilding Together of Northwest Arkansas is a locally funded, non-profit organization serving Benton and Washington Counties. Through Ramp and accessibility modification program (R.A.M.P.) we build wheelchair ramps to help our neighbors with disabilities to access their homes. We complete additional accessibility projects, including the widening of doorways and the installation of grab bars to assist neighbors in need.
https://askus.unitedspinal.org/index.php?pg=kb.page&id=813
Research has shown that speech articulation tends to be asymmetrical in the transverse plane of the vocal tract. A recent meta-study of previously published electropalatograms revealed that 83% of these images show asymmetrical tongue-palate contact . The present study investigated articulation asymmetry on the basis of a large number of electropalatograms acquired in a sentence-reading task at the Centre for Speech Technology Research, Edinburgh University (Mocha: Multichannel Articulatory Database). The vast majority (97.5%) of these palatograms showed some degree of left-right asymmetry, with greater contact on the left-hand side being the more common finding. Asymmetry was not strongly determined by voice or place of articulation. However, it was highly dependent on manner, with fricatives and the lateral approximant showing the greatest degree of asymmetry. Characterisation of articulation asymmetry could improve our understanding of the speech-production process and its relationship with both neural organisation and the anatomy of the organs of speech.
https://openaccess.city.ac.uk/id/eprint/22691/
REVIEW — “Wild” Based on a true story, “Wild” is a wonderful movie that will be appreciated most by those who are personally familiar with the healing powers of the wilderness. In the mid 90s, Cheryl Strayed hiked the Pacific Crest Trail, a 1,100 journey from the Mohave Desert in lower California to the Washington/Oregon border. A number of personal hardships her life motivated her to take this solo trip in an effort to find herself. Cheryl documented the experience in her memoirs “Wild: From Lost to Found on the Pacific Crest Trail “ which makes up the basis for this film. Some people may be turned off by the steady pace of the film, but it’s accurate in the way that a walk through a place unscathed by civilization can affect a person. Your mind speaks to you, first it tries to talk you out of the journey, threatening you with pain. Then it wanders, meandering through memories, many times triggered by a song, phrase or smell. Your mind takes you back to the highs and lows of your life. This meandering format is exactly how “Wild” tells the story of Cheryl’s life, portrayed in an Oscar worthy performance by Reese Witherspoon. We learn of her youth growing up with her carefree mother Bobbi (Laura Dern) and the events that sent her on a spiraling path of self destruction. The choice to hike the PCT appears to be an impulsive one and she starts off completely inexperienced. But as her journey progresses she becomes both more experienced and more self confident. This trip is in effect her paying penance to the sins of her past and coming to terms with her future. While there are a number of serious issues addressed in the film, it’s not without a sense of fun. There’s an overlying dark humor that relieves the tension.
http://critticks.com/movies/review-wild/
Tips for effective self reflection As we wrap up 2020, I believe it is prudent that we take the time to fully introspect and reflect on the year. There may have been many difficult experiences as well as those moments that brought joy to your heart. There may have been moments where time was terribly wasted and those moments when we seized all the opportunities to grow as much as possible. Whatever 2020, may have presented to each of us, I was to suggest that we make it our priority before the year ends, to look at the plans made, look at the highs and lows and recalibrate in preparation for the New Year. Failing to do so, we will run the risk of walking the same pathway as we did in 2020, and this may undoubtedly lead us to have many regrets. 12 Ways to Practice Self-Reflection 1. Identify the Important Questions Think of some questions that you want to ask yourself routinely (daily, weekly, monthly) to use as an assessment for your self-reflection. Example: What habits did I achieve this week? What could I better improve on? How did I feel overall today? 2. Meditate You don’t have to be perfect with this; as a matter of fact, if you are new to it, it will be uncomfortable at first. But just sit in silence for as long as you can and see how your mind wanders. What are you thinking about? Take note of that and try to focus on your breathing at the same time. Take deep breaths and remain calm. 3. Journal Writing in a journal like a diary is a great way to get your thoughts and feelings out. It is also a great tool to look back on to see any patterns in your habits and thoughts. Label your entries and add the dates; it will be easier to look at the patterns over a period of time. 4. Do a Writing Exercise Does your mind feel jumbled with thoughts and decisions? Simply set a timer for 5-10 minutes and write everything that comes to mind. Notice any patterns? What thoughts are important and which are fleeting? Writing exercises are great to get your thoughts out on paper (or computer) to organize them better. For this pick a topic and let the thoughts pour out. For example, work, school. Friendships… 5. Take a Walk in Nature Being out in nature is shown to improve mood. Get some fresh air and clear your head. 6. Talk to Yourself Out Loud You may have heard it is ok to speak to yourself just don’t answer yourself (smile), but truth be told, sometimes hearing yourself talk out loud can be a great way to have realizations. Having a conversation with yourself allows you to get your thoughts out and self-reflect. 7. Perform Breathing Exercises From simple to complex, breathing exercises allow you to steady your heart rate and calm down. This brings your mind to a calmer place to think more clearly. 8. Read You don’t have to read self-improvement books alone. Some of my best self-actualizations have come from reading the bible. Reading keeps your mind alert and it fosters openness. Reading is an excellent form of meditation. 9. Analyze a Past Event Pick an event that you have certain feelings about. Take a few moments to analyze that particular event. Why do you feel the way you do about that event? What did you do well in this particular event? What could you improve upon in the future? 10. Assess What You Are Grateful For Taking the time at the end of the day to think about what you are grateful for can improve your mood and way of thinking. Try to think of just three things that you are grateful for at the end of each day. 11. Track Your Feelings Grab a journal or an app and track your feelings each day. Do you notice any trends in your moods? Often seeing why you react to certain stigma brings a sense of peace a realization for why you do what you do. 12. Perform a Self-Check Up You don’t have to visit the doctor’s office for this one! Simply sit down with yourself and assess different areas of your life. For instance, career, Love-Life, Education, Hobbies, Family, Fitness, etc. Spending time reflecting enhances your sense of self which will significantly help you like better relationships and improved decision-making in your everyday life.
https://searchlight.vc/searchlight/dr-jozelle-miller/2020/12/15/tips-for-effective-self-reflection/
A Tonasket sixth grade boys’ basketball team (three were fifth-graders) took first place at the state middle school tournament last weekend in Spokane. The team included Trey Landdeck, Reese Vassar, Tyson Schertenleib, Tyler Duchow and Jade Ramon from Tonasket; Eamon Monohan and Sawyer Crandall of the Methow Valley and Brady Wulf of Brewster. Coaches were Kory Schertenleib and Dan Vassar Photo on Page B8. ★★★★★ The Bridgeport Middle School girls’ eighth grade basketball team wrapped up its second-straight 10-0 season earlier this winter. “We are pretty proud of these girls on their on-court accomplishments,” Bridgeport athletic director Scott Darwood said. “Coach (Scott) Sattler and his assistants are pretty proud of the fact that they’re all pretty good students in the classroom as well.” Many of the girls have been playing together in AAU since the third grade. “We’re pretty proud of this fact as winning at Bridgeport hasn’t always been as plentiful as desired here over the last few years in some sports and we’d love to be able to honor these girls for their accomplish-ments,” Darwood said. Weather permitting, the Loup Loup Ski Bowl’s final scheduled days of operation will be this weekend, 9 a.m. to 3:45 p.m., March 25-26. ★★★★★ Roy Wadkins hit for a 49 (out of 50) at the Tonasket Gun Club shoot Sunday.
The Texas Public Policy Foundation is seeking a talented writer to enhance the Foundation’s donor communications and support the efforts of the development team. The ideal candidate will be someone with superior writing and editing ability and a passion for conservative philosophy, who enjoys a large volume of diverse writing projects. Candidate must be able to manage multiple stakeholders to meet numerous deadlines concurrently. This position offers a unique opportunity to create original content rapidly in a variety of styles for many different purposes. The Development Writer crafts Foundation messaging for grant applications and reports, letters, newsletter articles, and much more, to communicate to donors and the public how the values of liberty, opportunity, and personal responsibility ultimately result in greater opportunity, well-being, and prosperity for all Americans. Responsibilities - Rapidly produce high-quality written content that effectively communicates TPPF efforts and values, including grant reports, grant proposals, donor thank you letters, newsletters, solicitation letters, event invitations, emails, etc., meeting all deadlines for submission. - Cultivate relationships with donating foundations through personal meetings, updates, and phone calls. - Seek funding from new foundations through research, submission of letters of interest, phone calls, and other strategies. - Copy-edit written communications for the fundraising program. Qualifications - Excellent command of the English language, including ability to write in different voices and superior editing ability. - Ability to manage multiple projects and deadlines. - Good organization skills and a strong attention to detail. - Cheerful and professional demeanor and high level of customer service. - High energy level and an entrepreneurial spirit. - Ability to focus on priorities, demonstrating flexibility when needed. - Self-starter mentality and the ability to work effectively both independently and in a team. - Trustworthiness, discretion, and confidentiality. - A personal commitment to the principles of limited government, personal responsibility, and free enterprise. - Experience using basic Microsoft programs (Word, Excel, and Outlook). - Bachelor’s Degree. Preferred Qualifications: - Experience crafting messaging for fundraising communications. - A knowledge of Texas History and American Civics. - A knowledge of the foundational philosophy of conservative thought, including the works of Locke, the Founding Fathers, Hayek, Friedman, etc. The ideal candidate would be based out of the TPPF headquarters in Austin, Texas, but candidates who would be based in TPPF’s Washington, DC office will also be considered. This job can be virtual. How to apply While we thank all applicants in advance for their interest in this position, we are only able to contact those to whom we can offer an interview. No phone calls, please. The position’s salary will be commensurate with the experience, expertise, and skills of the candidate who takes the position. The Texas Public Policy Foundation is a nonprofit, non-partisan research institute offering competitive salaries and benefits to qualified candidates.
https://spn.org/job_posting/development-creative-writer/
Dr. Heath Lorzel received his PhD in Aerospace Engineering from Arizona State University. His background includes extensive work in machine learning, computational analysis, and prototype development in the fields of spacecraft propulsion, hypersonic re-entry vehicles, spin-spray chemical reactors, magnetic materials, metal-air batteries, gas-turbine compressors, hydraulic fracturing, solar power, hydropanels, multi-player games, quantitative investing, and medical imaging. Dr. Lorzel first came to Cognitive FX as a patient in 2017, seeking treatment for lingering cognitive and physical deficits after contracting a viral encephalitis. After recovering, he joined the team in 2019 as the Director of Artificial Intelligence. His work includes the development of several machine learning algorithms that automate patient scheduling, brain MRI parcellation, fMRI processing, and analysis of new fMRI protocols. He has also developed prototypes of rehabilitation equipment based on his own experience recovering from a brain injury. Dr. Lorzel's contributions to the clinic have dramatically increased our ability to help patients. While often unseen, his efforts have propelled our progress both in researching brain injury as well as patient outcomes.
https://www.cognitivefxusa.com/heath-lorzel
Katherine Price is an experienced admissions counselor and former student affairs professional. She draws from the knowledge she gained through her years of working in higher education to assist students and their families with making informed decisions about college choices and the application process. Firsthand Knowledge of College Life As a Coordinator of Student Development at Cal Poly San Luis Obispo, Katherine lived with college students in the residence halls and obtained firsthand knowledge of college life. Through student affairs positions at Cal Poly and Babson College, Katherine also worked with faculty on curriculum development and assisted students with academic and career planning through academic advising. Most importantly, she helped students navigate the challenges that come with adjusting to college life. Her professional experience as a student affairs administrator has given her a unique prospective on the resources students need to order to be successful in college. Experience in College Admissions Katherine gained knowledge of a selective college admissions process through her work in the Office of Undergraduate Admissions at Babson College. There she counseled prospective students, coordinated admissions events, managed the international and transfer application processes, and supervised the student interns. She read thousands of college applications and participated in admissions committees. As a graduate intern in the Lynch School of Education at Boston College, Katherine worked with faculty to coordinate the admissions processes for several graduate education programs. She draws on her years of college admissions experience to assist students with making informed decisions about their college application process. Continued Professional Development Katherine continues to develop her knowledge of college life and the college application process by visiting colleges and consulting with admissions officers. She has been working as an independent college counselor since 2009. Katherine is also a member of the National Association for College Admissions Counseling (NACAC) and the Higher Education Consultants Association (HECA). She earned the designation of Certified Educational Planner (CEP) in January 2016. Student-Centered Philosophy Working directly with students is the most important aspect of Katherine’s job- and her favorite. She recognizes that the student is the center of this process. Katherine is a guide and mentor, but she also wants students to obtain the knowledge they need to make thoughtful decisions for themselves. She often reminds students that this is their process, and while they need to consider the opinions of others, they also need to take responsibility for their process by collecting information, asking the right questions, and completing all of the requirements. Katherine provides students with the right amount of challenge and support to assist in them completing the college process and ultimately reaching their goals. Education and Personal Information Katherine has a B.A. in English from the University of San Diego. During her time at USD, Katherine studied abroad at the Fundación Ortega y Gasset in Toledo, Spain. After her graduation from USD, she attended Boston College, where she obtained an M.A. in higher education administration. She currently lives in Littleton, CO. with her husband, two daughters, and lovable Labradoodle, Dodger.
https://www.collegemindset.com/about/
Free Machiavelli's the Prince Essay Sample The prince by Machiavelli is one of the plays that were acted in the long past during the time of Machiavelli himself. It depicts the works of the Italian reconnaissance. Machiavelli is the author of the play. He is very shocking in the ideas that he exemplifies in the play. In his categories of explanations, he views a different kind of leadership and statesmanship that should actually exist in the world of today. Machiavelli says that it was quite observable that the ancient modes of statesmanship were very efficient and effective in the governance of the nations. He set out some of the radical rules that he aspired to use when he gets to power. There are many other controversial situations that Machiavelli highlights in the play. He had sterling beliefs and intentions that he desired for them to come to pass. He believed heavily in the use of force in many activities that he got involved in. In this play, what is actually common is the desire Machiavelli had over particular kind of leadership in the world. He said that "virtue against fury shall advance the fight" (Machiavelli, 2008). Machiavelli had a vision of uniting the nation of Italy. In most of the works that he did, he emphasized on particular kinds of leadership styles that have to be embraced for the nation to be united. This involved the use of force in every endeavor that men are involved in. The book is a major explanation of the kinds of directions that should be taken by leaders in their leadership. It deals with the methodologies that a leader can use to conquer and have a firm control of every competitor that comes his or her way. Here, Machiavelli sounds tyrannical. He advocates for the use of force to let things happen in order. In some of the messages that he issues, there is a sign of the use of force when things don't seem to happen in the right direction. There is the theme of practice in the book. Here, we see the prince highlighting several instances that he says one should not avoid in life. In this book, there is no time that we are told who the leader is. We don't see the real prince and any principality that is portrayed in the entire play. We are only told of the qualities that have enabled the ruler to ascend to the level that he has got to. It is at this time that we are told of the vision that Machiavelli had for his country for a period of 350 years to come. Machiavelli is very practical at every circumstance and scenario he gets himself in. even in his thoughts, we are able to see the nature of leadership that he would have been administering if he were a ruler now (Machiavelli, 1969). Our features 300 words per page instead of 280 Free revisions (on demand) Discount system Affiliate program VIP services Free plagiarims report (on demand) There are instances in the work which discuses on the ways of acquiring land that Machiavelli has proposed to be practical in nature. These are an individual's arms and virtue collaborated with inequality, fortunes, among others. Here, we are able to realize of the kind of leadership that Machiavelli advocates for. He epitomizes that a leader has to be manly enough in order to be able to rule any given city of government. He says that you have to be in possession of two common things; one is virtue and the other is arms. The arms will help you to conquer and maintain the best kinds of leadership that you want in life. On the other hand, the virtue will instill a sense of wisdom in the governance of any principality. Moreover, the use of fortune does not actually keep a firm state for a good and long time. Machiavelli advocates for the use of evil to acquire any principality that an individual may be in need of. Here, he gives an example of the leadership of Agatholes of Syracuse. Here, we are able to see the leader ruling the nation simply by subjecting fear among the citizens so that they are not able to rise up and demand of their needs. He says that this is one of the most peaceful leadership styles in the entire world (Machiavelli, 2008). There are other styles of leadership that Machiavelli exemplifies in the story. He explains the role the church plays in offering leadership to the people. It is at this instance that he explores into ways of determining the strengths and weaknesses of other principalities. He uses one of his works called mercenaries. He appears against the use of this particular kind of leadership. Moreover, Machiavelli advances into the biblical ideas that have become of assistance to the kind of leadership that he advocates for. He gives us an example of the fight that took place between David and goliath. Furthermore, he takes us to the situations that happened to the Roman and the contemporary generals who did or did not involve in mercenaries upon their own countrymen. All these are to draw the kinds of qualities which are expected of any leader who is governing any group of people (Machiavelli, 1938). Custom essay writing service bestwritingservice.com 100% satisfaction guaranteeOrder now Use of money is another theme that is profound in this play. Machiavelli has demonstrated various perspectives in which a leader is supposed to use money. He says that it is better for a leader to use the money to control the nation. This is because of the fact that you will likely come to fall one day. So it is advisable that a leader uses money in a way to win the interest of the people. In this similar case, he says that for you to be generous, you will be forced to tax the people so that you can be able to get the money that you will be giving to the development of the nation (Machiavelli, 1969). Machiavelli also explore into the need to be loved or not loved by the people one is governing. To him, he says that it is better to be in possession of both of them. Love is a sense that will drive the people to work out of a self will in the development of the nation. On the other hand, fear is very effective in the governance of nations with struggles and quarrels. In conclusion, Machiavelli is one of the influential leaders that the world would have in possession. In his proposals in the works: the prince, we are able to note and understand various qualities that leaders have to be in possession for them to manage and administer governance among the nations. Machiavelli advocated for the use of force in most of the leadership styles in the world. He dwells on the fact that virtue that is against fury shall advance the war.
https://bestwritingservice.com/essays/book-review/machiavelli-s-the-prince.html
Democracy Fund staff — alongside grantees, researchers, and other field experts — regularly develops resources and shares lessons on strengthening democracy. Here you will find guides, reports, and insights from our team and network. Monday was the start of Absentee Voting week, a voting emphasis week for the Federal Voting Assistance Program, the Department of Defense entity helping uniformed… In 2014, the Presidential Commission on Election Administration (PCEA) highlighted best practices in election administration to improve the voting experience for all Americans. The bipartisan… At this time of year, Americans remember what it means to be a free country, turning our thoughts to the approximately 2.1 million men and… One of the many strengths of our military is that our service members come from all across the country, from rural counties to densely packed… This post is co-authored by Stacey Van Zuiden and Adam Ambrogi. For the thousands of American voters who live abroad or who are in the… Take a Deeper Dive Local News Lab, electionline, and Voter Study Group are Democracy Fund initiatives that provide original, curated information on sustainable local journalism, election administration, and the changing views of the American electorate.
https://democracyfund.org/ideas/?fwp_idea_authors=3545
Writing over thirty years after the fact, Henry “Light Horse Harry” Lee summed up the events of February 14, 1780 with the line, “Thus ended, on the night of the 14th of February, this long, arduous, and eventful retreat” (190). Upon hearing of General Nathanael Greene’s exploits in this movement, General George Washington wrote, “You may be assured that your Retreat before Lord Cornwallis is highly applauded by all Ranks and reflects much honor on your military Abilities.” (198). What Lee would remember as “eventful” and Washington and fellow military ranks “highly applauded” is remembered today as the “Race to the Dan.” This retrograde movement, undertaken by Greene’s forces from South Carolina to the Dan River in southern Virginia, is sandwiched between the engagements at the Battle of Cowpens in January 1781 and the British pyrrhic victory at Guilford Court House in March 1781. Yet, this retreat may be on the turning points in the southern theater that led the British, under Lord Charles Cornwallis to his eventual demise at Yorktown in October 1781. Great historians, such as John Buchanan is his monumental work The Road to Guilford Court House have covered with broad strokes this period of time but a dedicated study was much needed in the historiography of the American Revolution. Insert Andrew Waters, writer, editor, and conservationist, whose name may be familiar from previous works such as The Quaker and the Gamecock: Nathanael Greene, Thomas Sumter, and the War for the Soul of the South. His latest book, To The End of the World, Nathanael Greene, Charles Cornwallis, and the Race to the Dan, captures this important military movement while providing an expose on the leadership of Greene woven in. The title of the book is pulled from a quote by Brigadier General Charles O’Hara, Cornwallis’s second-in-command during this campaign. With a background in land conservation with a focus on river corridors and watersheds, Waters found a connection with Greene, who studied the various waterways—or ordered subordinates—to study the various rivers, to better understand the topography for military campaigns. After a stint in Salisbury, North Carolina, Waters became fascinated with the Race to the Dan story and decided to plunge in to understanding this period of the American Revolution. He found that “the Race to the Dan is a remarkable tale, fit for cinema or an epic novel, and not only for its accounts of four narrow escapes across its four rivers” (xv). He was drawn “to its story” (xx) and any reader of the book is the beneficiary of that discovery. Along with weaving in the innate leadership qualities of Greene, Waters brings to light the importance of military leaders not as well-known such as William Lee Davidson, William R. Davie, and Edward Carrington with more household names of Lee, Daniel Morgan, and Otho Holland Williams. Throw in the names of Cornwallis, O’Hara, and Banastre Tarleton, and the pantheon of American Revolutionary personas is complete. In this approximate month-long retreat, Greene saved the American Revolution in the southern theater and set in motion the events that led to the climactic victory at Yorktown. Waters, with his 2020 publication, has now helped save the story of the Race to the Dan from its unintended lapse into obscurity. Information:
https://emergingrevolutionarywar.org/2021/06/05/review-to-the-end-of-the-world-nathaniel-greene-charles-cornwallis-and-the-race-to-the-dan-by-andrew-waters/
Complexity of genome sequencing and reporting: Next generation sequencing (NGS) technologies and implementation of precision medicine in real life. The finalization of the Human Genome Project in 2003 paved the way for a deeper understanding of cancer, favouring a faster progression towards "personalized" medicine. Research in oncology has progressively focused on the sequencing of cancer genomes, to better understand the genetic basis of tumorigenesis and identify actionable alterations to guide cancer therapy. Thanks to the development of next-generation-sequencing (NGS) techniques, sequencing of tumoral DNA is today technically easier, faster and cheaper. Commercially available NGS panels enable the detection of single or global genomic alterations, namely gene mutation and mutagenic burden, both on germline and somatic DNA, potentially predicting the response or resistance to cancer treatments. Profiling of tumor DNA is nowadays a standard in cancer research and treatment. In this review we discuss the history, techniques and applications of NGS in cancer care, under a "personalized tailored therapy" perspective.
Authorisation (AU) is responsible for the processing of applications of entities proposing to carry out activities in the areas of banking, securities, insurance and pensions, trusts and Company Service Providers. These activities are regulated and supervised by the MFSA in its role as single regulator of financial services in Malta. The Authorisation, with a staff complement of 35, is the entry point for a regulated entity to operate in Malta. AU is a multidisciplinary team consisting of professionals from different academic backgrounds. The Role The Deputy Head (Insurance) will report to and deputise for the Head of Authorisation and will: - Be thoroughly familiar in the application of the Regulatory Framework in the areas of Insurance and Pensions; - Handle meetings with potential applicants; - Be expected to take over the duty of co-ordinating the work-load of the Unit in the areas of Insurance and Pensions; - Direct and carry out second reviews of applications for the issue of licences as necessary; - Provide guidance and leadership to managerial staff within the Office during the process; - Cross train staff; - Assist the Head of Authorisation in the general management of the Office. About You - We are looking for candidates with solid academic background in Accountancy or Banking and Finance or in another related finance background. - The role calls for an academic qualification in a relevant field of study at National Qualification Framework Level 6 or better, duly certified by the Malta Qualifications Recognition Information Centre (MQRIC) or a widely recognised professional qualification at a comparable level. - You will also possess a minimum of six (6) years working in a similar senior role. Candidates with longer working experience relevant to the role will be preferred. - Candidates will also be required to demonstrate in depth knowledge of regulatory requirements applicable to the financial sector, particularly in the area of banking and proven level of managerial skills and the personality required to supervise and manage staff, as well as proven ability to delegate tasks. - If you do not have the necessary academic or professional qualifications but you have at least ten (10) years of relevant experience, we would still be interested in speaking with you. *Dear Candidate, kindly note that this role is not managed by Castille. MFSA, in this case, is responsible to manage the application process. In case of any difficulties, feel free to contact [email protected], and we will direct your query to the relevant contact at MFSA.
https://www.castilleresources.com/jobs/deputy-head-insurance-within-authorisation-grade-4
Please note that FBPDA does not endorse or recommend any particular health care providers. This is a beginning list of treatment providers who are known to have comprehensive DBT programs based on their reports of their training and services. We are also interested in hearing about your successes with providers who work with BPD throughout the state who you have felt were helpful so we can contact them to see if they want to be listed on this site. We will continue to update this list on a regular basis. • How long has the professional been practicing? • What experience do they have in treating borderline personality disorder? • Have they undergone any specific training in treating individuals with BPD? • To what extent do they believe individuals diagnosed with BPD can recover? • Does the professional focus on any particular type of therapy? • If the clinician utilizes Dialectical Behavior Therapy (DBT), have they participated in trainings through Behavioral Tech? • Do they prescribe any medications? • Are any specific diagnostic tests recommended? • What are the responsibilities of the patient or client? What is the mental health professional responsible for? • Will a treatment plan be created? • How and when will treatment success be determined? • Do they accept insurance or offer their services on a sliding pay scale? • Are they board certified? What professional organizations do they belong? • Where did they attend school? What educational activities have they been involved with over the past several years? • How will any after-hours emergencies be handled? • Does the mental health professional collaborate with others in the practice? • Will the professional visit the patient during a Baker Act commitment or other hospitalization? Remember: You can verify the license of any practicing mental health professional by going to the Florida Medical License Search page.
https://fbpda.org/professional-referrals/
With escalating energy requirements mounting across the world which has lead to a demand driven boom for Oil and Gas Exploration and Production services, there has never been a better time to develop more international partnerships. The Oil & Gas Technology Forum (OGTF) will provide such a link. OGTF 2010 will present the industry with the most effective platform for building continuous partnerships at a technical and strategic level. This is an ideal opportunity to reach all those buyers and suppliers from across EMEAA markets to share experiences, either in roundtable discussions, the panel discussions and workshops or during the numerous social and networking events that will run throughout the Oil and Gas Technology Forum 2010. The event will help the senior level executives take advantage of current trends and future growth opportunities to provide actionable advice on maximising the business value of investments in Oil & Gas Exploration and Production market. OGTF is an invitation-only event attracting an exclusive line-up of C level executives across the E&P and Oil & Gas sector, including VPs & Directors of Exploration, Drilling, Well Operations, Production and Subsea, Regional Sales and Business Development Directors.
http://infopetro.com/Exhibition/ViewExhibition.asp?id=236
The institutional support provided by the government are as follows: - National Bank for Agriculture and Rural Development (NABARD): (i) This bank was established in the year 1982 with the main aim to promote rural development. It has designed and implemented many strategies and schemes for the development of rural business. (ii) Besides agriculture, it supports cottage and rural industries and rural artisians by offering counselling and consultancy services and easy credit facilities. (iii) It also organises training and development programmes for rural entrepreneurs. 2.The Rural Small Business Development Centre :(i) This centre was established by the World As-sociation for Small and Medium Enterprises. (WASME) NABARD sponsors this centre. (ii) The main objective of this centre is to provide management and technical support to current and prospective entrepreneurs in rural areas. (iii) Several programmes on rural entrepreneur ship, mobile clinics and trainings, awareness and counselling camps, etc. have been organ-ised by RSBDC in various villages. - The National Commission for Enterprises in the Unorganised Sector (NCEUS) : It was set up in September 2004. Following are its main objectives: (i) To create more employment opportunities par-ticularly in the rural areas. (ii) To increase the competitiveness of the small units in the emerging global environment. (iii) To recommend measures for improving the productivity of small enterprises in the informal sector. Rural and Women Entrepreneurship Development (RWED): (i) The main objective of this development programme is to promote a conducive business environment and to build institutional and human capacities that will encourage the entrepreneurial initiatives of rural people and women. (ii) To create a business environment in order to encourage initiatives from rural and women entrepreneurs. (iii) To enhance human and institutional capacities needed to develop entrepreneurship ability and hence increase productivity.
https://ask.learncbse.in/t/discuss-the-institutional-support-provided-by-the-government-to-small-business/3243
i+D will highlight some of the materials that can be found at the ASID location. The design community is welcome to explore the ASID library to see, touch, and learn about these inventive materials. Plan your visit today at www.asid.org/request-office-tour. For more on MCX and the importance of material decisions, see story page 20. 1. (POLYMERS 0044-16) Recycled polyester fabric derived from post-consumer polyethylene terephthalate (PET) bottles and recycled textiles. Applications include furniture, upholstery, interiors, and accessories. 2. (PROCESS 6968-01) Bicomposite form made from organic materials and natural fiber with the addition of a natural binder. Applications include interior design, industrial design, and architecture. 3. (METALS 7745-01) Decorative tiles made from old copper pennies that are precisely spaced and adhered to a backing. Applications include floor tiles. 4. (NATURALS 74850-04) Decorative wall tiles made with recycled rubber and renewable cork that allow the background color of a wall to show through. Applications include interior walls, ceilings, displays, and decoration.
http://digitaledition.iplusdmag.com/iplusdmagazine/november_december_2017?pg=18
The Classic Othello board game. Players take turns placing disks on the board with their assigned color facing up. During a play, any disks of the opponent's color that are in a straight line and bounded by the disk just placed and another disk of the current player's color are turned over to the current player's color. The object of the game is to have the majority of disks turned to display your color when the last playable empty square is filled. Play this game against a human opponent here: http://www.yourturnmyturn.com . Favorite Favorite Click to add this game to your favorites. Share Rate Current rating: 4.3 out of 6 votes. Popularity 24.602 This game has been played 24.602 times.
https://www.classicgame.com/game/Reversi
Questions: How is emptiness understood in the Mahayana? What is the emptiness of emptiness? How can we practice nonduality? Keywords: emptiness, nonduality, beyond extremes, peace Also available: audio/video recordings and transcript/translations for Week 6. Pre-Reading (Recommended) Dzongsar Khyentse Rinpoche (2004) Introduction to the Middle Way In Week 6 we will be refuting all views, including the view of emptiness, and arriving at the view of the Middle Way: the emptiness of emptiness. In the Madhyamakavatara (Introduction to the Middle Way) the corresponding verses are Chapter 6, Verses 179 to 226, pages 296 to 340 in the PDF version. Pre-Reading (Optional) [Note: pre-readings are arranged alphabetically by author. This is not intended to suggest an order of reading] Brunnhölzl, Karl (2012) ➜”The Heart Sutra Will Change You Forever”, Lion’s Roar (originally published in 2012; republished 25 April 2017) An introductory article about the Heart Sutra, taken from Karl Brunnhölzl’s book The Heart Attack Sutra, which gives an overview of the meaning and history of the Heart Sutra, and also locates it in the ‘crazy wisdom’ tradition of Buddhist teachings: One thing we can safely say about the Heart Sutra is that it is completely crazy. If we read it, it does not make any sense. Well, maybe the beginning and end make sense, but everything in the middle sounds like a sophisticated form of nonsense, which can be said to be the basic feature of the Prajñaparamita Sutras in general. If we like the word “no,” we might like the sutra because that is the main word it uses—no this, no that, no everything. We could also say that it is a sutra about wisdom, but it is a sutra about crazy wisdom. When we read it, it sounds nuts, but that is actually where the wisdom part comes in. What the Heart Sutra (like all Prajñaparamita Sutras) does is to cut through, deconstruct, and demolish all our usual conceptual frameworks, all our rigid ideas, all our belief systems, all our reference points, including any with regard to our spiritual path. It does so on a very fundamental level, not just in terms of thinking and concepts, but also in terms of our perception, how we see the world, how we hear, how we smell, taste, touch, how we regard and emotionally react to ourselves and others, and so on. This sutra pulls the rug out from underneath our feet and does not leave anything intact that we can think of, nor even a lot of things that we cannot think of. This is called “crazy wisdom.” Garfield, Jay (2014) “The Metaphysical Perspective II: Emptiness”, Chapter 3 in ➜Engaging Buddhism [PDF, whole book], 78-115. A lovely reflection on the emptiness of emptiness, noting in particular that the paradox of the Middle Way isn’t the same thing as incoherence: This doctrine of the emptiness of emptiness is one of Nagarjuna’s most profound innovations. It is what ensures that emptiness does not amount to an absolute reality beyond a veil of illusion, but simply the fact that everything, itself included, exists interdependently, conventionally, impermanently. Madhyamaka thus constitutes an effort to escape both the horns of realism and of nihilism in forging its middle path. On the other hand, this does involve real paradox, and this paradox was evident from the very earliest strata of the Prajñaparamita sutras, articulated clearly both in the Astahashrika-prajñaparamita sutra (The Perfection of Wisdom Discourse in 8,000 Verses) and in the Vajrachedika (Diamond Cutter). As Garfield and Priest (2003) have argued, emptiness is both the absence of intrinsic nature, and the intrinsic nature of all things, since anything, in virtue of existing at all, is empty of intrinsic nature. As the Astahashrika puts it, “all things have one nature—that is, no nature.” Paradox, however, does not entail incoherence, and Nagarjuna, like many Buddhist philosophers in subsequent generations, notes that reality is in fact profoundly paradoxical. Consider the following remarks from Mulamadhyamakakarika XIII: [MMK 13.8] The victorious ones have said That emptiness is the elimination of all views. Anyone for whom emptiness is a view Is incorrigible. Garfield, Jay (1990) ➜”Epoche and Shunyata: Skepticism East and West”, Philosophy East and West, Vol. 40 No. 3, 285-307 Garfield offers a perspective on why western philosophers are prone to misunderstand Buddhist emptiness as nihilism. In particular they may misunderstand non-self as being opposed to self, and renunciation as being opposed to worldly life. Likewise the Madhyamaka perspective on scientific explanation and causality is also all too easily misunderstood: The reificationist with regard to causation argues that the regularities we observe in nature are to be explained by a fundamental causal power that causes have to bring about their effects — a necessary connection. The nihilist argues that because we can have no clear idea of such a causal power or natural necessity, causal explanation is impossible. The skeptical solution to the problem thus posed regarding the possibility of scientific explanation — as Hume, Wittgenstein, Nagarjuna, and Chandrakirti argue — is, rather than to understand regularity as vouchsafed by causation, to understand causal explanation as grounded in regularities. And in a wonderful point about the essential conventional nature of all linguistic, descriptive (and one might add cognitive) boundaries in relative truth, he very much prefigures contemporary theories of complex adaptive systems and theoretical ecology: Though Hume and Sextus are less explicit on this point, Nagarjuna, Chandrakirti, and Tsongkhapa emphasize — and Hume and Sextus would undoubtedly agree — social convention is also hard at work in skeptical reconstructions of discourse about the existence of physical objects and causation. For the boundaries of physical objects are not given by nature, nor are the classes of events that count as “of the same type” that underlie the generalizations that vouchsafe the attributions of explanatory significance involving words like “because.” The canonizations of sortals and of object-boundaries drawn in space, time, and composition require social and linguistic conventions. He situates Madhyamaka alongside the skeptical tradition in western philosophy, and ends up concluding, along with Nagarjuna, that the right view is to have no view: The ills that skepticism aims to cure are philosophical ills — specifically metaphysical and epistemological ills characterized by the obsessive search for epistemologically or ontologically primitive foundations for knowledge, meaning, explanation, or morality that undergird our collective epistemic, linguistic, scientific, and moral practices […] when the poison is purged, the inquiry is no longer necessary. The inquiry does not involve adopting one or the other of the disputing dogmatic positions, but rather involves making peace by rejecting both — and not in favour of a third dogmatism, but rather in favour of not seeking the chimerical foundations that get the dispute going in the first place. Sharf, Robert (2014) ➜Is Nirvana the Same as Insentience? Chinese Struggles with an Indian Buddhist Ideal [Published as Chapter 8 in Kieschnick, John and Shahar, Meir (eds.) India in the Chinese imagination, pp. 141-170] We know that in the ultimate truth all phenomena are beyond the extremes of existence, non-existence, both or neither. But is there a “real” difference between sentient beings and insentient phenomena such as trees or rocks? Does the distinction we make between “animate” and “inanimate” correspond to an objective fact—something “out there” in the natural world? Or is it merely epiphenomenal, a somewhat accidental by-product of our cognitive evolution? The tendency, I believe, is to assume that our agency-detection circuit affords us a selective advantage precisely because it attunes us to a natural state of affairs. But the relationship between our percepts and what exists in the noumenal world is, as philosophers since the “axial age” have pointed out, a complex one, and there is reason to suspect that our perception of agency may be epiphenomenal in the same sense that our perception of colour or taste or sound is epiphenomenal. That is to say, the relationship between the experience of “red” or “bitter” or “euphonious” on the one hand, and the physical and biological conditions that occasion such experiences on the other, is not mimetic in any simple sense; qualia such as “red” and “bitter” and “euphonious” do not inhere in the physical, mind-independent world. In the same way, our visceral apprehension of things as animate or inanimate may have survival value for our species, and it may remain essential to our interactions as social animals, but this does not in itself warrant the distinction as an inherent property of the world.
https://madhyamaka.com/2017-07-12-madhyamakavatara-week-6-pre-reading/
Chinese Academy of Sciences, Kunming Division, Kunming, China Abstract It is well documented that some non-native invasive species can release allelochemicals into soils at levels that may be phytotoxic. However, it is still not known whether allelochemicals, that remain in the soil after an invasive species has been removed, have long-term allelopathic effects on other plants. To answer this question, 2 native forbs (Sida szechuensis and Artemisia myriantha) and 2 introduced forage grasses (Brachiaria decumbens and Setaria anceps) were grown separately for 2 years in a field that had been infested with Ageratina adenophora (a noxious invasive species worldwide) for more than 10 years. All plants, including both underground and aerial parts, were removed at the beginning of the field experiment. In a separate experiment, allelopathic effects of the field soil on seed germination were determined in the laboratory. Activated carbon (AC) was used in an attempt to eliminate allelopathic effects of A. adenophora. The effects of AC treatments were significant in all variables except crown area. Overall, relative growth rate, above-ground biomass, plant height, branch number, total leaf area, crown area, photosynthesis, seed germination rate, shoot length and shoot dry weight were increased by AC treatment in all species, except for photosynthesis in B. decumbens. These results suggest that allelochemicals of A. adenophora remained in the soil and suppressed other plant species for 2 years after removal of the plants. These findings have significant implications for restoration programs as allelochemicals of A. adenophora can not only facilitate its invasion but also influence the efforts of ecological restoration of invaded habitats. Feasible measures, such as cutting and burning invasive plants or using species insensitive to allelochemicals, should be adopted to achieve desired ecological restoration in practice.
http://tropicalgrasslands.asn.au/Tropical%20Grasslands%20Journal%20archive/Abstracts/Vol_41_2007/Abs_41_04_2007_pp285-291.htm
For years, cyclist have known that unequal leg lengths mean less efficient pedaling, sore lower back, knees and hips. They have tried various methods to bring themselves into balance. Blocking up the short leg or using different length cranks are the most common solutions. Unfortunately, as you may have learned through experience, these methods not only do not solve the problem, but in fact often make thing worse! To understand how the chainring works, think of a rider making a normal pedal stroke, where the power zone is between 2 and 5 o'clock. We'll assume that the riders right leg is shorter than the left and that this problem has been compensated for with a block under the right foot. Take a look at Figure 1.The solid line shows the pedal circle made by the left bottom of shoe and the dotted line traces the blocked right shoe. Leverage increases as the distance from the bottom of the shoe to the bottom bracket spindle increases. That's not really new -- it's just another way of saying that longer cranks give more leverage, which decreases the pedal load. As you con see from the diagram, the right foot at 12 o'clock is turning a crank that is effectively longer than the left at the same 12 o'clock position. The length difference is equal to the thickness of the block. Since the load is constant, the right leg has more leverage than the left leg does at the same position, creating an imbalance. In Figure 2, the cranks have turned 180 degrees. In this position the left leg has less leverage and is therefore pushing more load. With proper pedaling technique (where the left foot is pushing over the top as the right foot is pulling back), you see the right aside also has less leverage. So in figure 1 you have the right and left with more leverage while pushing less load and Figure 2 you have the left and right leg with less leverage and pushing more load. This imbalance is what causes the problem for riders who are using a block only. Since blocks are the easiest and most economical way of compensating for leg length difference, the problem isn't what to use instead of a block, but rather how to equalize the leverage. Because the block forces the leverage to change at various points on the pedal circle. The solution is to compensate for this leverage variance by varying the loads. This is accomplished by using round chainrings which are placed off center on the crank a precise amount depending on the size of the block. The Equalizer Chainring increases the load as leverage increases and decreases the load as leverage decreases, so that effective gearing and power output are constant throughout the pedal stroke. Figure 3 show the blocked foot at 12 o'clock. Because there is more leverage at this point, the offset chainring (indicated by lines and arrows boardering the words more load): increases the leverage, keeping the load constant. Figure 4 show the left foot at 12 o'clock of the stroke. Here the leverage is decreased and the chainring decreases the load to compensate for the deceased leverage. The result is that the loads are equal and in balance. Load is constant and steady throughout the stroke: as the block increases leverage, the chainring automatically increases the load and as leverage drop off, the load decreases right along with it. Both legs are now working with equal loads. You're probably wondering how our system can work for you. Please feel free to call us at 1-800-438-4399 with any questions you may have.
http://www.hscycle.com/Pages/equalizerchainringstory.html
London, June, 2010: Norman Broadbent, the leading Executive Search, HR Consultancy and Leadership Consultancy firm has become a member of ECTA, the European Competitive Telecommunications Association. Joining as an ‘Associate’ member, Norman Broadbent wishes to demonstrate its commitment to and expertise in the communications sector and aims to help ECTA members better understand and address the challenges of executive talent acquisition, management and development. Norman Broadbent will pursue three main activities, working closely with ECTA, namely: 2010 New Report links competition & economic recovery New Report finds competitive telecoms market drives EU economic recoveryEffective regulation and open telecoms market earn the Netherlands top place in telecoms scorecard. Dutch consumers benefit from better services, lower prices and high broadband usage Brussels, 27 May 2010: Countries with the most effective telecoms regulation have open and competitive markets that foster higher broadband penetration, which generates more jobs and boosts economic growth. National Regulators need to be better equipped to take consistent action, finds the 2010 Regulatory Scorecard published by pro-competition body ECTA. 2010 ECTA welcomes the European Digital Agenda ECTA welcomes the Commission´s commitment to reinforce the single market and to encourage investment in open and competitive fibre access networks The pro-competitive body calls for the vigorous application of competition rules to fibre access networks - consumers and businesses will pay a high price if competition rules are relaxed and wholesale pricing flexibility is permitted to dominant telcos Brussels, 19 May 2010; ECTA strongly supports the Commission’s renewed commitment to reinforce the single market for telecommunications services as outlined in the new European Digital Agenda presented by Commissioner Kroes today. “A fully functioning single market would benefit consumers and businesses by bringing wider choice, lower prices and higher broadband speeds” said ECTA Chairman Hubertus von Roenne. 2010 Europe’s €25bln digital deficit Europe’s €25bln digital deficit Internet speeds four times higher in better regulated markets, study finds Governments must tackle telecoms monopolies for Europe’s recovery, says ECTA Brussels, 3 March 2010: Consumers and businesses are losing €25bn per year and broadband speeds are being restricted due to uncompetitive telecoms markets, reveals a study on Europe’s Digital Deficit released today. 2010 ECTA elects Board officers Hubertus von Roenne elected Chairman of ECTA Calls for firm measures from President Barroso to secure open pan-EU telecoms market Brussels, 25 January 2010: The European Competitive Telecoms Association (ECTA) has announced the election of Hubertus von Roenne as chairman of the board of directors for 2010. 2009 New Commission must reinvigorate the single market New Commission must reinvigorate the single market and strengthen its commitment to competition ECTA conference debates priorities for the Digital Economy Brussels, 8 December 2009; Key policy-makers from European Parliament and EU Council Presidency will debate the priorities for the incoming European Commission alongside industry leaders at the 10th annual ECTA conference being held in Brussels today. The opening session, which features speeches from the Swedish and Spanish Communications Ministers and Pilar del Castillo, the MEP in charge of the Parliament’s report on Europe’s digital agenda, will focus debate on how to ensure a renewed impetus behind liberalized telecoms under the new administration. 2009 The debate is over: now we expect action The debate is over: now we expect action ECTA looks to new Commission to reinvigorate the single market and strengthen its commitment to competition during the next five years Brussels, 24 November 2009 – As the Telecoms package is approved today in Strasbourg the European Competitive Telecoms Association (ECTA) looks to the newly appointed Commission to reinvigorate the single market for competition and promote a level playing field across the EU27. The Telecoms Package contains important proposals that confirm Europe’s commitment to open and competitive telecoms markets including the power for regulators to separate dominant firms if they fail to abide by competition rules and a clear signal that fibre networks should be opened for competition. 2009 ECTA Welcomes Commissions’ Digital Dividend... ECTA Welcomes Commissions’ Digital Dividend proposals and calls for pro-competitive measures Congratulates Mrs Reding on taking one, European approach instead of 27 national ones Brussels, 29 October 2009 – The European Competitive Telecoms Association, ECTA, welcomes the Commission’s Digital Dividend proposals due at the end of this month, which make recommendations to allocate the airwaves (spectrum) that will be freed up and made available for mobile broadband in a number of Member States in the coming years as analogue TV is switched off. It particularly congratulates the Commissioner for fostering one, European approach rather than 27 national ones However ECTA highlights that the competitive consequences of Digital Dividend spectrum allocation need to be specifically addressed. If competition is allowed to flourish, ECTA believes that the harmonizing and coordination measures the Commission has put forward for allocating the 800 MHz band have the potential to usher in a whole new era of high speed digital services for European consumers. 2009 ECTA welcomes Commission state aid rules on... ECTA welcomes Commission state aid rules on high speed broadband Sees enhanced role for Governments to promote open and future Brussels, 17 September 2009 – ECTA welcomes the Commission’s new rules on state aid for fibre networks. As old copper lines are being replaced with fibre networks allowing unlimited speeds and a plethora of new, yet unimaginable services clarification of state aid rules is vital. 2009 ECTA condemns Commission u-turn on telecoms... ECTA CONDEMNS COMMISSION U-TURN ON TELECOMS COMPETITION Brussels, 12 June 2009 – New proposals from the European Commission on ‘fibre access networks’ could allow dominant firms to escape regulation, limiting choice in TV and broadband services, ECTA warns. The Commission’s proposed “Recommendation on Next Generation Access” suggests that if incumbents make a deal with just one operator, they could avoid requirements to offer cost-based access allowing their rivals to offer alternative services.
https://www.ectaportal.com/news/ecta-press-releases?start=90
The following statement from Ultimate Customs Group LTD relates to the ongoing public pandemic "COVID-19" (more commonly known as Coronavirus). Following the government's advice regarding COVID-19, we have taken extra precautions for our day-to-day operations. These measures are in place to protect the safety of our staff and also our customers. We have decided to delay all orders, the opening of our new facility and booked appointments for our range of services. We apologise for the inconvenience this may cause. What does this mean for my order? Our dispatch team are still working to dispatch all orders as stock arrives to our warehouse. We are aiming to dispatch all outstanding orders as soon as possible, however in some instances your order may take longer than 16 working days to be dispatched. When my order is dispatched, how long will delivery take? We use a mix of couriers to ship our items. These couriers include (but are not limited to) Parcelforce, Royal Mail and DPD. They are facing large delays due to declining staff numbers as a result of COVID-19. These couriers are working on 1-2 day delivery timeframes. In extreme cases delivery can take a maximum of 3-4 days after dispatch. Sadly, this is out of our control. What are my options? If you're unhappy with the above information, we can provide you: - with a partial refund of 10% of your total order value (provided your order has not been dispatched within our usual 16 working day timeframe and you paid the full price for the order) - with a partial refund of 5% of your total order value if you have used a discount when ordering (provided your order has not been dispatched within our usual 16 working day timeframe and you paid a discounted price for the order). - with a full refund for your total order value (provided your order has not already been dispatched and is delayed due to the courier) Please contact our support team via email ONLY at [email protected]. Please include your order reference and preferred option from above. We are only accepting email support regarding orders to ensure requests are triaged to the appropriate team members so that your enquiry is dealt with as swiftly as possible. What happens to my appointment? If you have an appointment for vinyl wrapping, vehicle detailing, window tinting or product fitting, we will be in-touch to discuss your options. All appointments will be delayed to limit the spread of Coronavirus. Why does it take so long to dispatch my order? We are a growing business, which means that as we grow our stock level grows too. In recent months, we've increased our stock holding which means many products are available for immediate dispatch. However, due to high demand we sometimes run out of stock quicker than expected which means our production facility have a backlog of stock to produce and ship to our warehouse. Production can take longer than expected in some cases (especially with the restrictions across the globe due to COVID-19). Can I pay for faster delivery? No. We use the fastest methods available when shipping your item and are unable to offer a faster delivery, in the current climate many couriers are not promising to meet the advertised delivery guidelines so this would be of no use even if there was a faster method available. Can I collect my order? No. We are not offering a collection service. This is to help protect our team and customers. When we launch our new premises, we will allow a click & collect style service for all products on our website. We apologise for these ongoing issues, however, we hope you understand and can be patient while waiting for your order to arrive. By not cancelling your order for a full refund, you are supporting us through these tough times. Stay safe and stay home. Thank you.
https://www.ultimatecustomsuk.com/pages/coronavirus
If you’re looking for work, there’s a well-defined process you expect to follow. Apply, get screened, interview, receive an offer or a pass, and make a decision. But how long should this take? In Liz Ryan’s HR column for Forbes, a candidate says she’s worried because her interview process is moving fast. This is what she writes: I had my first interview with the company recruiter less than two weeks ago. Since then I’ve had a second interview with Beth, a third interview with the VP of Operations and two other managers, and a telephone interview with ABC Inc.’s Director of HR. Now Beth says they are preparing a job offer for me. Everything has happened in under ten days. Should I be wary? That is a very fast hiring process. The response from the columnist is fairly standard. She advises the jobseeker to ask questions to determine if the company is stable and has good leadership, or if they are disorganized and might change their minds after a month. Unfortunately, the candidate may not be able to ask those questions. And the deeper issues still remain: should I be wary? and is this a very fast hiring process? You Should Always Be Prudent The jobseeker asks if they “should be wary.” That word implies suspicion of problems ahead. Step one in evaluating any business opportunity is the same as step one in approaching any situation in life: try to identify and suspend your biases. Instead of “wary,” be “prudent.” Instead of “suspicious,” be “conscientious.” Instead “concerning”, say “atypical.” That leads us to the second question. Fast and Slow Are Relative Terms One of the curiosities of life is that the process by which we make decisions is often artificially inflated by our need to please others. We usually know if we want a second date five minutes into the first date, but we’ll stick around for the entirety of dinner “just to be polite.” We will test drive a car that’s out of our price range because that seems like the right thing to do. And we’ll interview for jobs that don’t really interest us “to get practice” interviewing. The amount of time it takes to move from meeting a new candidate to offering them a job should be measured using two important yardsticks: duration and timeframe. The duration is the total amount of time that is spent in the process. Perhaps that’s an hour posting the job, two hours sorting through applicants, an hour setting up interviews, four hours face-to-face with candidates, and an hour to decide to offer you a job. In that example, we’re talking about nine hours. The timeframe is the difference between the start and end times of the process. The job might have been posted on the first of the month at noon and the offer made on the 21st of the month. That’s a total timeframe of about three weeks. The reason the timeframe and the duration are different is mostly because people have other things to do besides filling the position. The question you should ask yourself is not “is 10 days really fast” but “how long is the duration within that 10 day timeframe?” Hiring Is Done Poorly Anyway Liz Ryan does make one excellent suggestion in her response: If you are still feeling nervous after you’ve talked with Beth, you can suggest that you start the job as a consultant instead of an employee. In a consulting role you’ll have a written contract that governs your relationship with ABC Industries. As a consultant you can check out the company and they can check you out, too. This idea is exceptionally wise. We have to wonder why it’s not done for every new hire engagement. Perhaps in the future everyone will start out as a contractor. Or perhaps, everyone will work that way, always. We will see!
http://www.accelawork.com/interview-speed-limit/
The focus of this display is a recently completed portrait of the inventor and engineer Sir James Dyson by the artist Julian Opie, commissioned by the Gallery. Dyson is the inventor of innovative products including the bagless vacuum cleaner, and the James Dyson Foundation encourages young people to pursue a career in engineering. This portrait, titled ‘James, Inventor’ is shown alongside other works by Opie, one of Britain’s leading artists, from the Gallery’s collection, including his iconic four-part portrait of the members of the band ‘Blur’, and his digital self-portrait, where he appears to blink and breathe.
https://www.npg.org.uk/whatson/display/2011/sir-james-dyson-by-julian-opie-new-commission.php