content
stringlengths 0
1.88M
| url
stringlengths 0
5.28k
|
---|---|
SEOUL, June 22 (Korea Bizwire) – Severe depression can sometimes drive a person to make one of the most extreme decisions: committing suicide. And until now, medical science was not able to provide a clear reason for such behavior despite high interest in the relationship between depression and suicide.
On Tuesday, a team of scientists and researchers from Korea and overseas revealed that it had discovered the part of the human brain that is responsible for pushing major depressive disorder (MDD) to result in suicide.
Dr. Jeon Hong-jin from Seoul Samsung Hospital, with research teams from Korea University and Harvard University, analyzed the ‘Brain Image and Brain-derived Neurotrophic Factor’ of two groups of patients with MDD – one with thoughts of suicide and another without.
According to the team, MDD decreases the overall function of the brain, negatively influencing the frontal lobe and the limbic system in particular. The frontal lobe is mainly responsible for thinking, decision-making, planning, and suppressing, whereas the limbic system, located in the deeper interior part of the brain, is in charge of some of the more basic human instincts, including impulses, sleeping, eating, and memories.
Hence, deteriorated functions of the frontal lobe lead to depression and reduced liveliness and concentration, while decreased functions of the limbic system trigger insomnia, loss of appetite, and increased mood swings.
The team discovered, through MRI, that the limbic system becomes excited when a patient thinks about suicide.
“The limbic system becomes excited when a patient experiences negative emotions like anger and anxiety,” said Dr. Jeon. “The same thing happens when a patient is reminded of past trauma.”
The problem is that frontal lobe in patients with MDDs cannot function at its full capacity, and control the excited limbic system, which can ultimately lead to extreme decisions including suicide.
The team also discovered that deteriorated connective function between the frontal lobe and the limbic system increases the frequency of suicidal thoughts.
“Youth trauma, alcohol and drug abuse, and extreme mental distress can all lead to depression and further to thoughts of suicide,” said Dr. Jeon. “We need a more systematic approach, which can provide early detection and management of these patients, to reduce the suicide rate in MDD patients.”
The full research findings were published in the latest edition of Translational Psychiatry. | http://koreabizwire.com/scientists-discover-relationship-between-depression-and-suicide/58767 |
A significant proportion of the total primary production in the Celtic Sea (50°30′N; 07°00′W) has been found to be due to picoplankton and small nanoplankton. In July, August and October, 1982, 20 to 25% of the 14C fixed in primary production was in organisms >5 μm, 35 to 40% was in organisms <5–1 μm and 20 to 30% was in organisms<1 μm. Bacterial production was estimated by the incorporation of 3H and would account for less than 10% of the production in the <1–>0.2 μm fraction; therefore, production in the <1–>0.2 μm fraction was the result of photosynthesis per se by picoplankton and could not have been due to heterotrophic bacteria utilizing exudates from larger phytoplankton. Time-course experiments demonstrated some transfer of label from the <1–>0.2μm fraction to the >5 μm fraction, presumably by grazing, but again most of the production in this fraction was the result of photosynthesis by organisms larger than 5 μm and was not due to grazing by heterotrophic microflagellates on smaller phytoplankton. | https://link.springer.com/article/10.1007%2FBF00393206 |
Millions of students and young people are participating in demonstrations today in 800 cities throughout the United States, along with many other cities internationally.
According to a USA TODAY/Ipsos Poll, more than one in five people between 13 and 17 said they would participate in the demonstrations, which would make the protests the largest student-led demonstrations in the history of the United States. Another 25 percent of youth say they plan on participating on social media.
The “March For Our Lives” protests were initially called and organized by survivors of the February 14 Parkland, Florida school shooting, which left 14 students and three teachers and coaches dead and another 17 injured. School shootings have affected an entire generation. According to an analysis by the Washington Post, since the Columbine High School massacre in 1999, 193 primary or secondary schools have experienced a shooting on campus during school hours, directly impacting 187,000 students.
School shootings, however, have become the focus of a much broader set of grievances. There is a general sense among youth that the regularity with which they are massacred in their schools reflects the indifference and contempt with which the ruling class views their lives.
The New York Times nervously pointed to the political radicalization of young people reflected in today’s protests in an article posted on Friday. “As a group,” the Times noted, “they combine liberal social beliefs with an intensely wary view of the existing political and economic order, opinion polls have found.”
The Times’ oblique remark about hostility to the “economic order” is a reference to polls that show more young Americans would prefer to live in a socialist or communist society than in a capitalist one. Surveys of Americans between the age of 18 and 29 show that only 14 percent think that the country is headed in the right direction, a figure that, if anything, is even lower among high school youth.
Working-class youth today face conditions far worse than their parents, who are themselves confronting a historic reversal in their conditions of life. The median earnings of young people are 43 percent lower than in 1995. Average student debt has increased to $37,712, from $24,000 in 2008. Nearly one in five children in the US under the age of 18 live in poverty, while more than 40 percent live in low-income households that make less than twice the official federal poverty level.
The growth of a political movement of young people is coming amidst an expanding wave of working-class struggle throughout the United States and internationally. The strike by West Virginia teachers in February-March has been followed by a one-day strike by New Jersey teachers and calls and plans for walkouts in Oklahoma, Arizona, Kentucky, Tennessee and other states. Internationally, protests of teachers and educators have erupted in Kenya, Nigeria, Argentina, Jamaica, the Netherlands, the UK, Slovenia, Canada and other countries.
The opposition among teachers is an expression of a broader anger in the entire working class over record social inequality. On Thursday, tens of thousands of train drivers, teachers, nurses, air traffic controllers and other public-sector workers in France went on strike against President Emmanuel Macron’s right-wing labor reforms.
The simultaneous development of a movement among workers and student youth portends a major eruption of social and class conflict.
The Democratic Party and the media are seeking to restrain the anger of young people to calls for gun control—which, if implemented, would inevitably be connected to efforts to increase state power and the monitoring of the population. Moreover, as the bombing spree in Austin, Texas has demonstrated, such measures would not halt the epidemic of mass violence in the United States, which would find different forms.
The main concern of the ruling class is to prevent a movement that addresses the underlying cause of violence in American society, which would inevitably connect the protests of youth with the struggles of workers. The Democrats hope that they can direct student anger to the “ballot box”—that is, to electing Democrats in elections this year and in 2020.
Any serious examination of the causes of gun violence, however, points to the catastrophe produced by the capitalist system.
It is impossible to separate the series of homicidal acts by alienated and brutalized individuals from a broader mood of despair and hopelessness produced by disastrous social conditions and the suppression of any progressive opposition to the capitalist system. According to one recent study, the suicide rate for white children and teens soared by 70 percent between 2006 and 2016, while the suicide rate for black children and teens increased by 77 percent.
Nor can violence at home be separated from violence abroad. Those involved in the protests today have lived their entire lives under the “war on terror”: the invasion of Afghanistan nearly 17 years ago, in 2001; the invasion of Iraq in 2003; the bombing of Libya in 2011; the ongoing US-backed civil war in Syria. More wars are on the agenda.
Trillions of dollars are spent on armaments, while resources for public education, health care (including mental health) and other social services are slashed. The Trump administration signed a budget yesterday, backed by Democrats and Republicans, that allocates a record $700 billion to the Pentagon, even as the ruling elites insist that there is no money to ensure that teachers are paid a decent wage and young people who graduate college are not burdened by tens of thousands of dollars in debt.
The fact is that the greatest purveyor of violence is the American state, abroad and within the country. While 122 people have been killed in school shootings since the Columbine High School massacre in 1999, police have killed some 1,000 people a year over the same period, many of them youth and students.
The bloody violence of American imperialism—and the cheering of this violence by the media—has the most noxious consequences within the United States. It infects the political culture of the entire country, of which the presidency of Donald Trump is only one expression.
Since the mass protests that erupted following the inauguration of Trump just over a year ago, the Democratic Party has devoted all its efforts to directing mass opposition to his right-wing and fascistic policies behind a campaign for aggression in the Middle East and against Russia. They have hailed CIA torturers and military commanders guilty of war crimes as the champions of democratic rights. If their agenda was to be realized, it would mean that many of those participating in protests would be sent off to war.
The emergence of protests and demonstrations among workers and student youth resembles the conditions that developed in France in 1968. The ability of the ruling class to contain social unrest, however, has been severely undermined. The parties of the political establishment, in the US and internationally, are deeply discredited. The Stalinist and Social Democratic organizations that fifty years ago worked to contain working-class struggles no longer exist or have moved sharply to the right. The right-wing, anti-working-class trade unions are seeking desperately to suppress a movement that is developing outside of and in opposition to them.
For young people seeking a way forward, the turn must be to the working class. The struggles of working-class youth must be linked to the fight of all workers for decent jobs, wages, health care, and a secure retirement. The fight against the conditions that produce violence in America must be consciously developed as a movement against war, inequality, and the capitalist system. This requires a complete break with the Democratic and Republican Parties and the state apparatus of the ruling class.
The Socialist Equality Party and its youth movement, the International Youth and Students for Social Equality, are building a socialist political leadership in the working class. We call on young people participating in the protests today, and all students and workers throughout the world, to join the IYSSE and the SEP and take up the fight for socialism.
Joseph Kishore
Contribute to the fight for socialism in 2020
2019 has been a year of mass social upheaval. We need you to help the WSWS and ICFI make 2020 the year of international socialist revival. We must expand our work and our influence in the international working class. If you agree, donate today. Thank you. | https://www8.wsws.org/en/articles/2018/03/24/pers-m24.html |
On Saturday, the Yale Percussion Group will perform “Dressur” in Sprague Memorial Hall. The concert’s program will also include “Village Burial with Fire” by James Wood, “Rebonds” by Iannis Xenakis and a marimba arrangement of “Köln Concert” by Keith Jarrett.
YPG consists of the six students in the Yale School of Music’s percussion studio, led by director of percussion studies Robert van Sice. According to Kevin Zetina MUS ’20, a member of YPG, other music schools have much larger percussion studios comprising both undergraduate students and graduate students. Zetina said that the small size of YPG makes it a unique ensemble.
Fisher also credited van Sice with making YPG such a remarkable ensemble.
Kagel composed “Dressur” in 1977. According to Fisher, Kagel believed that audio recordings detract from the experience of musical performance by conveying only auditory information — he thought that music should be a full sensory experience.
“Kagel really challenges preconceptions of music making,” Zetina said.
Another piece in YPG’s concert, James Wood’s “Village Burial with Fire,” was released in 1996 and follows the narrative of a Hindu burial ritual.
Arlo Shultis MUS ’20, another member of YPG, described Wood’s piece as “an otherworldly musical experience that highlights percussion instruments made specifically for this piece” including microtonal wooden dowels, bamboo chimes and tone gongs.
This weekend’s performance marks YPG’s only concert of the year. The members have spent months rehearsing their pieces, focusing on fine details and working to create a unified sound.
Zetina emphasized the importance of learning how to perform as a group, rather than as individuals.
“That idea of knowing your role in the piece at any given moment really helps to transform what would be four people playing together into four people playing as one unit,” Zetina said.
This careful work provides YPG with what Fisher considers one of the group’s most engaging aspects for its audiences.
Saturday’s concert will begin at 7:30 p.m., and admission is free. | https://yaledailynews.com/blog/2018/12/06/yale-percussion-group-to-perform-in-sprague/ |
One of the vital elements of GDPR compliance is having proper policies and procedures in place. But have you ever asked yourself what these policies and procedures should contain?
Why does an organisation need Data protection policies and procedures in place? First of all, there is a legal obligation to do so. Second of all, since every company incorporates measures regarding the protection of the personal data of its clients/customs, it is a matter of good reputation. Unfortunately the alternative means more than just reputational damages. It could result in hefty fines of up to 4% of the annual company’s turnover, or up to €20 million.
The Contents of the Data Protection Policy and Procedure
Each company’s data protection policy and procedure should be created to suit its specific business. For example, if the organisation doesn’t collect customer personal data, there is no point in having all the relevant sections into the data policy and procedure. In this case, it will be only relevant to have the sections explaining how the organisation processes and stores the employee’s personal data.
For this reason the only thing in common between the data protection policies and procedures of each companies is the data protection principles of the GDPR, that should be implemented into the policies and procedures.
Data held by a company must:
- Be obtained and processed fairly and lawfully.
- Be obtained for a specified and lawful purpose and shall not be processed in any manner incompatible with that purpose.
- Be adequate, relevant and not excessive for those purposes.
- Be accurate and kept up to date.
- Not be kept longer than is necessary for that purpose.
- Be processed in accordance with the data subject rights.
- Be kept safe from unauthorised access, accidental loss or destruction.
- Not be transferred to a country outside the European Economic area, unless that country has equivalent levels of protection for personal data.
It is vital that the policy addresses each of these points, and explains how the organisation will guarantee each is respected. Among these are chapters/titles regarding how the company will ensure the data is lawfully obtained, how it’s kept up-to-date if any changes are made, how the company plans on keeping the data safe from unauthorised access, how the data will be removed when it’s no longer needed and how it will guarantee the data is removed from all systems.
The GDPR also adds a new principle in – the principle of accountability. According to it the organisation should highlight whose responsibility it is to enforce the data protection policies upon the organisation. The policy and procedure should further outline how the organisation’s staff complies with these policies, and any procedures the business has in place if staff fails to do so.
Article 24 of the GDPR states that data controllers must implement “appropriate technical and organisational measures to ensure and be able to demonstrate that processing is performed in accordance with this Regulation”. These measures “shall include the implementation of appropriate data protection policies by the controller”.
Policies are high-level internal documents that set principles, rather than details of how, what and when things should be done – which are covered by procedures.
Policies must:
- Be capable of implementation and enforceable;
- Be concise and easy to understand; and
- Balance protection with productivity.
Further, the policy must cover why the policy is needed, the contacts and responsibilities of the responsible professionals, the objectives and special topic covering how it handle the violations.
We know that creating your own data protection policy could be tricky. Luckily, there are well-educated and experience experts ready to help you. Contact us for more information!
Disclaimer: The content of this article is intended to provide a general guide to the subject matter, it is not legal advice and should not be treated as one. Specialist advice should be sought about your specific circumstances. | https://gdprtoolkit.eu/data-protection-policies-and-procedures/ |
Japan on Tuesday successfully launched a replacement for its aging first-ever quasi-zenith satellite into orbit, which has been working to provide accurate global positioning data for services such as autonomous driving cars and drones.
The new satellite produced by Mitsubishi Heavy Industries Ltd. will replace the Michibiki No. 1 satellite, which was launched in 2010 and has reached the end of its design life.
The new satellite will work with three previously launched Michibiki satellites and complement the existing U.S. satellite network.
An H-2A rocket carrying the satellite lifted off at 11:19 a.m. from the Tanegashima Space Center in Kagoshima Prefecture. The satellite entered into planned orbit about 30 minutes after the launch.
The satellite was previously scheduled to be launched Monday, but it was postponed due to bad weather.
It marks the 38th consecutive time Japan successfully launched an H-2A rocket since the first in 2005.
The government plans to increase the number of satellites in orbit to seven in fiscal 2023 to enhance Japanese GPS with more precise global positioning system services.
The H-2A rocket carrying the satellite is 53 meters long and weighed around 290 tons at the time of launch.
Japan launched its fourth quasi-zenith satellite in 2017, creating a system to provide precise global positioning system services starting in fiscal 2018.
In a time of both misinformation and too much information, quality journalism is more crucial than ever. By subscribing, you can help us get the story right. | |
On Thursday, China unveiled a five-year plan for its space exploration program that includes putting laboratories in space, building space stations and collecting samples from the moon.
As for that last goal, they'll start collecting samples with probes, but, as previously announced, they eventually want to put a person on the moon -- though that will not happen in the next five years.
China's bid to become a global player in the space race comes just as the U.S. program is being scaled back in scope and funding.
However, so far, China's accomplishments in space put it where the U.S. was in the 1960s. Its major breakthroughs include becoming the third country after Russia and the U.S. to send a human into space and completing a spacewalk.
Still, the plan signals that the country, which has consistently stuck to its space program development timeline, will continue on a slow and steady course to accomplish its aims.
“I think it is a comprehensive, moderately paced program,” John M. Logsdon, former director of the Space Policy Institute at George Washington University, told the New York Times. “It’s not a crash program.”
The Times article continues:
By contrast, NASA’s direction tends to shift with every change of presidency. President George W. Bush called on NASA to return to the moon by 2020. President Obama canceled that program and now wants the agency to send astronauts to an asteroid. NASA shut down its 30-yearprogram after a final flight in July.
Details of China's five-year space plan
China's space program is run by its military, and so some of its plans have both civilian and military uses.
Global positioning system
Among the many goals released in the government white paper is an ambitious plan to further develop its global positioning system, called the Beidou Navigation Satellite System, which began this week to log data on navigation, positioning and timing in China and the surrounding region.
The country's goal by 2020 is to have 35 satellites in orbit that collect data from around the world. Such a system would be comparable to an existing Russia system and close, though not as advanced as the U.S. system. While it would help the Chinese military, it would also be used for civilian purposes such as helping drivers navigate.
Sending more spacecraft into orbit and more people into spaceflight
The country also laid plans to achieve two larger goals: developing new launch vehicles that could send heavier spacecraft into orbit, and advancing conditions for human spaceflight.
To those ends, they plan to launch space laboratories, manned spaceships and space freighters. Additionally, they will work on space station technologies used in medium-term stay of astronauts, regenerative life support and propellant refueling.
Deep-space exploration and upgrades of satellites
China fleshed out its lunar exploration goals, with a plan to launch orbiters that would make soft lunar landings, do roving and surveying, and collect moon samples. Meanwhile, the country will also develop technology to monitor space debris and study black holes.
Lastly, China plans to further work on small satellites that can monitor the environment and forecast disasters.
Related on SmartPlanet:
- Incredible photos of Earth from space
- New space telescope is biggest yet, with "dish" 30 times Earth's diameter
- Video: An astronaut's view of Earth in real time
- Scientists say astronauts' drink of choice should be red wine
- Two iPhones to travel into space
- China’s Area 51? Mysterious site spotted from space
- China's space station: A new era of space exploration? | https://www.zdnet.com/article/china-ramps-up-space-exploration-as-us-program-shrinks/ |
India sees logistics industry to bounce back first
The Coronavirus pandemic shook India at its core with a lockdown that ended the movement of more than 1.3 billion people, the largest in the world.
Covid-19 cases are rising amid more tests being done. The lockdown may have averted a tragic pandemic crisis but it has also caused massive exodus of migrant workers from India’s major cities, unprecedented job losses and never before seen hunger among the poorest of the poor.
Whatever measures governments may take to contain the virus, there is no doubt whatsoever that it is going to take months and months for the economy to get going. Almost all sectors have collapsed but there’s one sector that experts say is likely to bounce back ahead of the other industries—logistics.
The logistics sector in India is tottering and there is going to be a lot of operational re-jigs when life gets back to normalcy and no one can forecast when that is likely to happen. However, the logistics sector will bounce back earlier than most other sectors. Transportation (air, land and sea), storage, warehousing and allied sectors will swing into intensified operations once the lockdown is lifted.
There is an urgent need for the movement of goods, particularly essentials and medical supplies. The movement of people, however, is likely not to be a priority with social distancing now the new normal.
Over 29 million jobs lost
The International Air Transport Association (IATA) said its latest estimates indicate a worsening impact from the COVID-19 crisis in the Asia-Pacific region.
About India, IATA said the pandemic is expected to potentially impact 29,32,900 jobs in the country’s aviation and its dependent industries. Passenger traffic has declined 47 per cent, while cargo operations are happening for medical and other essential supplies. However, there seems to be a huge gap.
The airline industry in India used to clock over 3,000 flights per day, has seen only 490 flights operate since the lockdown came into place. The 490 flights as of May 8 is thanks to the government’s initiative called ‘Lifeline Udan’ which allows air carriers to fly to deliver medical and other essential supplies within the country and overseas too.
Lifeline Udan
Lifeline Udan, an initiative of the Government of India, to make available healthcare and other essential supplies to battle Covid-19, has been doing a great job and that is likely to continue with increased intensity. Under Lifeline Udan, airlines such as Air India, Alliance Air, Indian Air Force and private carriers, have been operating flights carrying medical and other goods. As of May 8, as many as 490 flights have been deployed by the carriers (289 of these by Air India and Alliance Air).
Cargo transported on May 8 was 6.32 tons taking the total amount of cargo transported to around 848.42 tons. Aerial distance covered by Lifeline Udan flights till date is over 4,73,609 km.
Helicopter services including Pawan Hans Ltd have been operating in Jammu &Kashmir, Ladakh, Islands and North East region transporting critical medical cargo and patients. Pawan Hans till 8th May2020 have carried 2.32 tons of
cargo covering a distance of 8,001kms.
Domestic cargo operators SpiceJet, Blue Dart, Indigo and Vistara are operating cargo flights on a commercial basis. SpiceJet operated 916 cargo flights during March 24 to May 8 carrying 6,587 tons of cargo. Out of these, 337 were international cargo flights.
Blue Dart operated 311 cargo flights carrying 5,231 tons of cargo. Out of these, 16 were international cargo flights.
Indigo has operated 121 cargo flights during April 3 to May 8 carrying around 585 tons of cargo and including 46 international flights. This also includes medical supplies carried free of cost for the government. Vistara has operated 23 cargo flights since April 19, carrying around 150 tons of cargo.
Air bridge established
Under the initiative, a cargo air-bridge was established with East Asia for transportation of pharmaceuticals, medical equipment and Covid-19 relief material.
The total quantity of medical cargo brought in by Air India is 1,075 tons. Blue Dart has uplifted medical supplies of around 131 tons from Guangzhou and Shanghai and 24 tons from Hong Kong.
SpiceJet has also uplifted 205 tons of medical supplies from Shanghai and Guangzhou and 21 tons medical supplies from Hong Kong and Singapore.
The Centre for Asia Pacific Aviation (CAPA) said that the combination of Covid-19 related travel restrictions and an economic downturn would result in a virtual washout for Indian aviation in the first quarter of FY21. “With FY2021 set to be an exceptionally challenging year, all segments of the aviation value chain will need to immediately start planning for much smaller scale operations, supported by serious enterprise-wide restructuring,” CAPA said in its report.
Despite these efforts, the economic fall-out of an economy hit by the virus has been inconceivable as the sector is
both organised and unorganised, leaving millions of people unemployed.
According to India Brand Equity Foundation (IBEF), the sector employs over 40 million people and contributes $200 billion plus to the national economy.
The government did not have a foolproof plan (no government would have had any plan for the virus has been unprecedented in both magnitude and its deadly spread) to keep the essential supplies going, even while containing the spread of the virus. E-commerce players such as Amazon and Flipkart had to suspend their logistics services for sellers on its platform.
Logistics depends on manufacturing
As people were not allowed to move (till guidelines started evolving on who can and who cannot), the supply chain of about 25,000 to 30,000 supermarkets were adversely affected, according to the Retailers Association of India.
When supplies started moving with hurdles (permits, non-availability of vehicles or drivers, blockades etc), there have been delays in deliveries, shipments lying in the warehouses etc. And we are talking of essential supplies and not even talking about other goods which may be in different stages of transit.
As manufacturing came to a halt, the requirement for transport has come down drastically, creating an unimaginable scenario to deal with. As manufacturing and logistics sectors go hand in glove, their coming back on track, first depends on manufacturing to commence and that is not going to happen in full flow for quite some months.
Going forward, one of the things that nations are learning is how to evolve in such a crisis and one of the answers is by using of technology.
Harpreet Singh, Partner at KPMG states that the Indian logistics sector is largely unorganised and most of the players do not have a backup, recovery plan or intermitted operation plan. India is majorly driven by a traditional approach of trucking, loading and unloading and material handling.
Lack of modernised tool and equipment to disinfecting the goods/supplies before delivery are going to be additional investments that they have to put in place and it is not going to be an easy proposition. But this will happen and become the new norm.
$234 billion losses during lockdown
A Barclays research estimates India’s loss of economic activity could be as high as $234 billion in the lockdown period, resulting in zero per cent GDP growth this fiscal.
In a media interaction, R.S. Subramanian, Senior Vice President and Managing Director, DHL Express has said
“Ensuring nationwide access to essential commodities and medical supplies can only happen with a strong logistics and supply chain backbone. It is imperative that regulators and law enforcement authorities recognize logistics industry as essential services to keep critical supply chains up and running.”
In almost all countries where there is a lockdown, in the USA, Europe, New Zealand, Australia, South Africa, Middle East and Far East, express and logistics companies like are given the status of an essential services sector, and are able to manage and sustain the supply chain of manufacturers,. healthcare and pharmaceuticals sectors. This is the need of the hour. “Deployment of additional customs personnel, faster clearances at airport courier and cargo terminals to move out the on-hold shipments will help clean up the channel for critical shipments to flow faster.”
The Indian government says it’s doing its bit, but the situation is such that no amount of effort is enough as this pandemic is not just unprecedented but also a great lesson for all sectors, to be prepared for the worst and this appears to be the worst. | https://aircargoupdate.com/india-sees-logistics-industry-to-bounce-back-first/ |
The following skills are necessary for student success in virtual coursework:
Student has demonstrated time-management skills that indicate the student is capable of submitting assignments and completing course requirements without reminders
Student has demonstrated persistence in overcoming obstacles and willingness to seek assistance when needed.
Student has demonstrated verbal or written communication skills that would allow the student to succeed in an environment where the instructor may not provide nonverbal cues to support the student’s understanding.
Student has the necessary computer or technical skills to succeed in a virtual course.
Student has access to technology resources to participate in a virtual course.
Consideration of the student’s previous success (or struggle) in virtual coursework.
More information about which students might be best served by virtual learning can be found here: | https://www.fox.k12.mo.us/programs/m_o_c_a_p_virtual_education/considerations_for_success_with_virtual_education |
Modeling rainfall drop by drop
A high-frequency model developed using data from new high-precision rain gauges gives fresh insight into the dynamics of rain and runoff events.
Using a network of a newly introduced type of rain gauge that can measure rainfall with drop-by-drop precision, KAUST researchers have developed a high-frequency rainfall model to improve understanding of rainfall/runoff dynamics, such as flash flooding and hydrodynamics in small watersheds.
Rainfall modeling is one of the core aspects of weather forecasting and is often used to predict other weather parameters, such as wind and solar irradiance. Yet the power and insight of such models are limited by the data used to construct them. When it comes to precipitation, this means that modelers have to rely on sparse recordings of rainfall at 6-15-minute intervals at best, but more often hourly intervals. This leads to a "smoothing" of rainfall over time and a loss of information about how much rain falls during each rainfall event, which is a problem, according to Ph.D. student Yuxiao Li.
“This assumption is not appropriate for modeling precipitation at high frequency because large quantities of rainfall in the past can result in an unrealistically high probability of rainfall occurrence in such models,” explains Li. “In this study, we used the high-frequency rainfall data collected by new instruments called Pluvimate rain gauges to better reproduce the statistical properties of precipitation occurrence, intensity and dry-spell duration.”
The new acoustic rain gauges, which record each drop of rain caught in a receptacle, can provide precise high-frequency rainfall data, which are impossible to acquire using classical measurement devices such as tipping-bucket rain gauges and radar. These new datasets provide unprecedented insight into the minute-to-minute dynamics of rainfall, which requires a change in the statistical modeling approach.
“High-frequency precipitation data include more zeros and have longer ‘tails’ to high rainfall intensities than common precipitation data,” says Li. “We developed a model that can capture this 'skewness' and the heavy tail of the high-frequency precipitation data, allowing us to generate synthetic precipitation data that provides valuable information for water management, especially at unobserved times and locations.”
The model developed by Li and his supervisor Ying Sun also includes meteorological representations of ground and atmospheric layers, which allows direct physical interpretation of the statistical characteristics. | https://discovery.kaust.edu.sa/en/article/1062/modeling-rainfall-drop-by-drop |
This page is a stub, please expand it if you have more information.
|The Journey Home|
|Information|
|VR/AR||VR|
|Developer||Michael Chou|
|Publisher||Michael Chou VR Lab|
|Platform||SteamVR|
|Device||HTC Vive|
|Operating System||Windows|
|Type||Full Game|
|Genre||Adventure, Free to Play, RPG, Free to Play, VR|
|Input Device||Tracked motion controllers|
|Play Area||Room-Scale|
|Game Mode||Single Player|
|Language||English|
|Review||Mixed|
|Release Date||Aug 19, 2016|
|Price||Free|
|App Store||Steam|
|Infobox Updated||09/15/2016|
Contents
Description
A VR interactive story about family, dreams, and the meaning of life. You will be an astronaut who failed the mission, gets stuck in space and haunted by past memories.
Features
System Requirements
Windows
Minimum
- OS: | https://xinreality.com/wiki/The_Journey_Home |
The following are questions commonly asked about real estate assessments in the City of Alexandria and other Northern Virginia jurisdictions. You may reach us via email, by phone at 703.746.4646, and by mail or in person at the Department of Real Estate Assessments, 301 King Street, City hall, Room 2600, Alexandria, VA. Office hours are Monday through Friday 8 a.m. to 5 p.m.
- What is my assessed value intended to reflect?
- How is my residential assessment determined?
- How is my commercial assessment determined?
- What is a “Study Group”? How do I find out my property’s study group?
- How do I find the sales analyzed to determine my January 1 assessment?
- I received my notice and believe that the assessment is too high (or too low), how do I have an appraiser take a second look at the assessed value?
- Can I use current year sales or listings as a basis for my Review or Appeal of my property’s assessed value?
- Why does the assessment notice include prior year’s tax levies, and why is the percentage change shown on the assessment notice different from the percentage change in assessed value?
- How can I change my mailing address for assessment notices and tax bills?
- How does the percentage change in my assessment compare to other properties?
- How does Alexandria compare to other parts of the state or to other Northern Virginia jurisdictions?
- Is there a state law that prevents assessments from changing more than a certain amount each year?
- Should my assessment change be the same as what has been published in the newspaper for my zip code?
- How much are my taxes going to be in 2021?
- What were the tax rates for the last several years?
- If I find incorrect data on the website for my property, how do I ensure that these data are corrected?
- My property is under construction and only partially complete. Why aren’t you waiting until it is complete to assess it?
1. WHAT IS MY ASSESSED VALUE INTENDED TO REFLECT?
Your total assessed value is the Office of Real Estate Assessments’ estimate of the 100% fair market value of your property as of January 1. Fair market value is defined as:
The most probably price, as of a specified date, for which the specified property rights should sell after reasonable exposure in a competitive market under all conditions requisite to a fair sale, with the buyer and seller each acting prudently, knowledgeably, and for self-interest, assuming that neither is under undue duress.A simple question to ask yourself is: “Would I be able to sell my property for this assessed value as of January 1?
2. How is my residential assessment determined?
Alexandria utilizes mass appraisal methods in determining the fair market value of your property. Your assessment notice allocates a land value (as if vacant), and an improvement value. The total value as it appears on your notice is intended to be your property's fair market value.
Your 2021 assessment is based on sales that occurred during 2020. Appraisers start by grouping properties into study groups. Then the appraisers analyze the sales of properties that occurred in the subject property’s study group. Since these properties are the group of properties that are determined to be most similar, they are the best sales to analyze and determine whether to increase, decrease, or not change an assessment.
If no sales occur in a given study group, appraisers must find a comparable study group to analyze and determine what action to take regarding the assessed values.
Think about it in terms of house hunting – if you really wanted to live in X neighborhood, but for whatever reason couldn’t buy there (nothing on market, too expensive), where else would you look?
3. HOW IS MY COMMERCIAL ASSESSMENT DETERMINED?
Commercial properties are more complex in nature than residential property. Commercial properties are analyzed by their property class (office building, apartment, hotel, etc.) and are valued based on the income, sales, and/or cost approaches.
4. What is a “study group”? How do I find out my property’s study group?
A study group is a four digit number that identifies a group of properties that we analyze to determine the market value of a subject property.
Your study group can be found on the property information page of our website ( alexandriava.gov/RealEstate). The study group is also on your assessment notice.
5. How do I find the sales analyzed to
determine my January 1 assessment?
All valid sales used to determine the assessments are listed on the website. Start by clicking on the “ Search Property & Sales Data” link on the Office’s webpage. Then enter in the subject property’s address or databank number. At the top of the screen, click the tab titled “Sales Used for Assessment”. The list that appears shows all of the valid sales that were analyzed to determine the 2021 assessment. The column headings (in blue) are all sortable, which should help in determining the most comparable properties. Once you have located the sales you believe to be most comparable, compare the sales price and the assessed value of those properties to your own. The more similar the comparable property, the more likely the assessed values will be closely related.
6. I received my notice and believe that the assessment is too high (or too low), how do I have an appraiser take a second look at the assessed value?
If you have researched the sales and feel your assessment it incorrect, you should file for a “Request for Review” of your assessment. The request can be submitted online, via email, or regular mail. It is important to note that the deadline to file this is March 15, 2021. Please be as specific as possible when stating your reasons for the disputed value. Do not hesitate to call the Office and talk to an appraiser before submitting a Review. The appraiser can guide you through every step and answer questions regarding the assessment.
7. CAN I USE CURRENT YEAR SALES OR LISTINGS AS A BASIS FOR MY REVIEW OR APPEAL OF MY PROPERTY’S ASSESSED VALUE?
Real property assessments in the City of Alexandria are conducted annually and under state law are required to have a January 1 effective date of each calendar year. Therefore, the valuation of real property is conducted using closed and recorded property transfers that occurred during the previous calendar year. This methodology was affirmed by a recent advisory opinion issued by the Virginia Attorney General which concluded that, "the sale of real property after January 1 does not impact real property assessments for the current tax year." Therefore, it would be erroneous to use information subsequent to the effective date of valuation because it would reflect future market conditions that could not have been foreseen at the time of valuation. However, subsequent sales information may be used as evidence of the fair market value of the property during the annual assessment cycle that occurs after the date of the sale.
8. WHY DOES THE ASSESSMENT NOTICE INCLUDE PRIOR YEAR'S TAX LEVIES, AND WHY IS THE PERCENTAGE CHANGE SHOWN ON THE ASSESSMENT NOTICE DIFFERENT FROM THE PERCENTAGE CHANGE IN ASSESSED VALUE?
A 2014 amendment to §58.1-3330(B) of the Code of Virginia requires the disclosure of tax rate, tax levy, and percent change from the previous year. Since the tax rate is set by City Council after assessment notices are mailed, it is not possible to show the tax rate or levy for the current year's assessment. The percentage change shown reflects the change in the tax levy, and not the change in assessed value. This information is not intended to replace the tax bills which are mailed separately.
9. HOW CAN I CHANGE MY MAILING ADDRESS FOR ASSESSMENT NOTICES AND TAX BILLS?
Any property owner who wishes to update the address to which real estate tax bills and any real estate tax-related correspondence are mailed must update the mailing address on file with the Real Estate Assessment Division .
Requests for address changes for assessment notices and tax bills must be made in writing by the property owner(s) or an authorized agent. These requests may be submitted by e-mail, mail, or in person. The mailing/billing address cannot be updated over the phone. All requests should include the property address and the new mailing address.
Requests may be emailed to: [email protected]
Address change forms may also be mailed or delivered in person during regular office hours to:
Real Estate Assessment Division
301 King Street, Room 2600
Alexandria VA 22314
If you are an authorized agent, please review the requirements for valid Letters of Authorization prior to submitting a change of address request.
The mailing/billing address cannot be updated over the phone or by any other office. The Finance Department is required by law to mail the biannual real estate tax bills and related correspondence to either the owner's mailing address on file with the Real Estate Division or to the owner's mortgage company (whichever is applicable).
10. HOW DOES THE PERCENTAGE CHANGE IN MY ASSESSMENT COMPARE TO OTHER PROPERTIES?
The percentage change of your assessment will generally be close to the assessment change of other properties located in your study group. However, in many of the City's residential areas, especially where there are a variety of building sizes, styles and quality, assessment changes may fall within a range of percentages. Reasons for this include cases where properties have received improvements over the past year that would cause the assessment to change at a different percentage rate. Also, staff appraisers physically inspect a number of neighborhoods each year and occasionally make adjustments to property data based on what they observe during the course of their inspections.
11. HOW DOES ALEXANDRIA COMPARE TO OTHER
PARTS OF THE STATE OR TO OTHER NORTHERN VIRGINIA JURISDICTIONS?
Each jurisdiction is unique, but surprisingly enough, assessment changes in Alexandria as of January 1, 2021 are comparable to those in the neighboring jurisdictions of Northern Virginia. Assessments in these jurisdictions are also based on the sales that occurred during calendar year 2020.
Assessment information for the following nearby jurisdictions can be found on their assessment office websites:
12. IS THERE A STATE LAW THAT PREVENTS
ASSESSMENTS FROM CHANGING MORE THAN A CERTAIN AMOUNT EACH YEAR?
There is no provision to limit the amount of change from year to year. The Constitution of Virginia requires that real estate assessments represent 100% of fair market value.
13. SHOULD MY ASSESSMENT CHANGE BE THE SAME
AS WHAT HAS BEEN published in the newspaper for my zip code?
Newspapers often publish sales data in a summary format for large areas, such as by zip code, by city or by county. This information can show general trends in the market. However, these trends should not be compared to the percentage change in your January 1 assessed value. One reason for this is that the time period can fluctuate for the reporting of the data. The assessment office primarily relies on sales during the past calendar year within precise areas and of properties that are more similar in nature to your property. In addition, data reported by the sources noted above are typically averages, which imply a range of percentage change.
14. HOW MUCH ARE MY TAXES GOING TO BE IN 2021?
City Council will set the tax rate in May 2021.
To calculate your taxes use the following formula:
(Assessed value ÷ 100) (tax rate).
For example, in tax year 2020, the real estate tax on a residence assessed at $200,000 is $2,260 ($200,000 x 2020 tax rate of $1.13 per $100).
15. WHAT WERE THE TAX RATES FOR THE LAST SEVERAL YEARS?
|YEAR||TAX RATE
|
(per $100 of assessed value)
|2020||$1.13|
|2019||$1.13|
|2018||$1.13|
|2017||$1.13|
|2016||$1.073|
|2015||$1.043|
|2014||$1.043|
|2013||$1.038|
|2012||$.0998|
|2011||$.0978|
16. IF I FIND INCORRECT DATA ON THE WEBSITE FOR MY PROPERTY, HOW DO I ENSURE THAT THESE DATA ARE CORRECTED?
The Office of Real Estate Assessments prides itself on maintaining accurate real estate data for the basis of the assessments for all property owners and for use by the public. Please notify us immediately if you note an error in your property information by sending an e-mail to [email protected], or by calling 703.746.4646.
17. MY HOUSE IS UNDER CONSTRUCTION AND ONLY PARTIALLY COMPLETE. WHY AREN'T YOU WAITING UNTIL IT IS COMPLETE TO ASSESS ME?
The City assesses all real estate as it is on January 1st of each year. New construction that is not fit for occupancy is assessed at a value reflecting the percentage of completion as of January 1 (e.g. 50%, 75%, etc.). Upon completion, it is assessed at its full value at the end of the month of completion. | https://www.alexandriava.gov/realestate/info/default.aspx?id=784 |
2018 is set to be an important year for aviation as the Royal Air Force celebrates its centenary. To mark this occasion, Cranwell Aviation Heritage Museum will open their next exhibition on Sunday 1 April 2018 entitled ‘Gallantry in the Air’ honouring Royal Air Force aircrew who were decorated for their bravery during World War II.
Gallantry is defined as bravery shown by someone who is in danger. This exhibition will feature RAF personnel who were awarded UK gallantry medals including Guy Gibson who was awarded the Victoria Cross (VC), Distinguished Service Order & Bar (DSO) and Distinguished Flying Cross & Bar (DFC). Gibson was most famous for leading No. 617 Squadron during the Dam Busters raid in 1943 and was awarded the VC, the highest award of the UK’s honours system. Two of the others that will feature are Leonard Cheshire who was awarded the VC, DSO & 2 Bars, DFC; and ‘Ginger ‘Lacey, one of the RAF’s highest scoring fighter pilots during World War II, who was awarded the Distinguished Flying Medal & Bar.
To hopefully make ‘Gallantry in the Air’ particularly relevant to Lincolnshire, many of the aircrew that will be featured were based in the County at some point during their Service careers. Regardless of origin or background, these heroic individuals were determined to serve their country in a time of war and some had to apply to do so on more than one occasion before they succeeded in becoming aircrew.
“We’re very proud that North Kesteven is right at the heart of ‘Bomber County’ and it is important that exhibitions like this allow everyone the opportunity to learn about the bravery of the RAF airmen who have fought in World War II. Their heroism needs to be remembered and respected for generations to come. The RAF 100 anniversary makes this even more poignant."
“It shouldn’t be forgotten, in this year that we celebrate the anniversary of women’s suffrage and the fight for equal voting rights that 168 women flew all types of military aircraft for the Air Transport Auxillary, during WWII, delivering them to forward bases and sadly 15 of them didn’t make it through the war.
Many of the airmen, featured in the exhibition, gained the highest award for their valour with some of them paying the ultimate price. Regardless of their individual circumstances, they all shared at least one thing in common - their incredible acts of ‘Gallantry in the Air’.
This exhibition is open to the public from Sunday 1 April until Sunday 30 September, 10am to 4.30pm. Admission is free.
For more information about this exhibition please contact Cranwell Aviation Heritage Museum on 01529 488490 or email [email protected]. For more information about Cranwell Aviation Heritage Museum please visit www.cranwellaviation.co.uk. | https://discovermorenk.weebly.com/home/cranwell-aviation-heritage-museum-commemorates-raf-100-with-its-exhibition-honouring-the-heroism-of-raf-aircrew-during-world-war-ii |
Relationship Between LeBron James and Ohio State Athletics Could Grow Even Stronger
Adam Prescott
an hour ago
Malaki Branham, top Ohio basketball recruit in the 2021 class, recently committed to remain within state lines and play for the Buckeyes.
The 6-foot-4 shooting guard, currently playing for St. Vincent-St. Mary High School in Akron, is the No. 27 ranked player in his class nationally and top-five at his position according to the 247Sports in-house composite rankings. Branham is considered the best player to come from SVSM, a very strong program, in the last 15 years and is now the highest-ranked commit in Chris Holtmann’s tenure.
We say the last 15 years, obviously, because a certain SVSM alum named LeBron James was the highest-touted prospect ever. Now arguably the greatest basketball player of all time, James also would have likely enrolled at Ohio State back in 2003 if he wasn’t allowed to enter the NBA Draft out of high school.
LeBron has not been shy about his admiration for, and relationship with, Ohio State throughout the years. When asked about California’s recent Fair Play to Play Act, he casually slipped a few Buckeye references into his response.
“For sure, I would have been one of those kids that went off to Ohio State (or any one of these big-time schools) and that 23 jersey would have been sold all over the place,” James said during a Lakers media session in September. “The Schottenstein Center would have been sold out every single night if I were there.”
James attending a football game with teammates J.R. Smith, Tristan Thompson, Richard Jefferson and Chris Andersen.
A little casual toss before the game.
James rocking OSU-colored shoes during an exhibition game at the Schottenstein Center.
LeBron attended “Skull Session” for Ohio State Football inside a jam-packed St. John Arena back in 2013, speaking to the crowd while accompanied by both of his sons wearing Buckeye hats.
“If I would have had one year of college, I would have ended up down here in Columbus at Ohio State,” James said energetically. “No matter where I go in the world, I will always rock Ohio State colors.”
His support of OSU Athletics has continued in a variety of ways. He helped facilitate “Beats by Dre” headphones to the entire football team prior to its 2015 College Football Playoff national championship contest with Oregon. It was part of a $400-limit gift that players are allowed to receive for bowl games. James did the same thing last December, sending each player headphones leading up to the Fiesta Bowl showdown with Clemson.
Since Ohio State’s 2007 run to the NCAA national championship game in basketball, the apparel worn by the Buckeyes has been from the Nike LeBron James line. OSU was selected as the first college to wear his apparel and, this past holiday season, Nike was selling a LeBron Ohio State “alumni jersey” for $120.
His personal/emotional investment on the basketball side will certainly be enhanced through this recent recruiting class. He extended congrats to Branham on his commitment and refers to fellow 2021 commit Meechie Johnson (Garfield Heights) as his nephew. LeBron grew up around Johnson’s father and uncle.
St. Vincent-St. Mary High School won three OHSAA state titles in four years with James and company, culminating with a national championship in 2003. He narrowly missed the NBA’s Collective Bargaining Agreement in 2005, which bumped the league’s age limit to 19 and forces players to spend at least one year elsewhere.
Had the “King” attended college, odds are that he would have traveled down 71 South to rock Scarlet and Gray for one year in Columbus. Regardless, it’s likely that we will continue seeing him visit campus in the future. | |
Shopping For Summer Fashions – Summer tips and trends from area pros. By Natasha Bourlin. Each summer, wardrobes bloom like the colorful flowers outside. Since summertime shopping can seem overwhelming, this fashionable guide will share current trends and help you hunt down everything from haute couture to affordable attire this season. | https://www.planmygetaway.com/tag/hello-yoga/ |
Investments in adult learning and education (ALE) have steadily decreased in the last decade. Nearly a fifth of the UNESCO member countries reported spending less than 5% of education budget on ALE and a further 14% reported spending less than 1%, says a UNESCO report published by Institute for Lifelong Learning, based on data submitted by 159 countries, including India.
Adults with disabilities, older adults, refugees and migrants, minority groups and other disadvantaged segments of society are particularly under-represented in adult education programmes and find themselves deprived of crucial access to lifelong learning opportunities, says the study.
The UNESCO Global Report on Adult Learning and Education (GRALE) calls for increased investments in ALE from governments, employers and individuals to ensure that everyone has the opportunity to access and benefit from adult learning opportunities. It reminds member countries that investments in ALE have social, civic and economic benefits.
The publication also stresses the need to increase national investment in ALE, reduce participation costs, raise awareness of benefits, and improve data collection and monitoring, particularly for disadvantaged groups.
“We urge governments and the international community to join our efforts and take action to ensure that no one — no matter who they are, where they live or what challenges they face — is left behind where the universal right to education is concerned,’’ says UNESCO Director-General Audrey Azoulay.
The report, which calls for major changes in adult education participation to achieve the United Nations’ Sustainable Development Goals by 2030, recommends increased participation of women in the programme. Women’s unequal participation in ALE comes with economic and social costs, it cautions. It is estimated, for example, that when women in the United Arab Emirates and Egypt participate in the labour force to the same extent as men, the countries’ GDPs would rise by an estimated 12% and 34%, respectively.
While the global report shows that women’s participation in ALE has increased in 59% of the reporting countries since 2015, in some parts of the world, girls and women still do not have sufficient access to education, notably to vocational training, leaving them with few skills and poor chances of finding employment and contributing to the societies they live in, which also represents an economic loss for their countries.
“By ensuring that donor countries respect their aid obligations to developing countries, we can make adult learning and education a key lever in empowering and enabling adults, as learners, workers, parents, and active citizens,’’ adds Ms. Azoulay.
The UNESCO GRALE monitors whether Member States are putting their international commitments on adult learning and education into practice. The report, published once every three years, combines survey data, policy analysis and case studies to provide policymakers and practitioners with recommendations and examples of good practice. It presents evidence on how ALE helps countries address current challenges and contributes to achieving the Sustainable Development Goals. | https://www.thehindu.com/news/national/less-than-5-of-people-benefit-from-adult-learning-opportunities-in-many-countries-unesco/article30171395.ece |
Union Station, Toronto's main rail station, is a block away from the Convention Centre, connected by the weather-protected Skywalk. The Bus Terminal is just five minutes away by cab, ten minutes by public transit.
By Public Transit
Streetcars, buses, subways and GO trains provide the city with one of North America's safest and most efficient public transit systems. It connects all parts of Toronto and outlying areas to Union Station, the city's transportation hub. Union Station is accessible from the Centre via the Skywalk, a weather-protected walkway. | http://hobbystar.com/upcomingevents/torontocomiccon2011.html |
The key to getting better at deep learning (or most fields in life) is practice. Each of these problem has it's own unique nuance and approach. But where can you get this data? A lot of research papers you see these days use proprietary datasets that are usually not released to the general public. This becomes a problem, if you want to learn and apply your newly acquired skills.
Roy, Deboleena, Panda, Priyadarshini, Roy, Kaushik
Spiking neural networks (SNNs) offer a promising alternative to current artificial neural networks to enable low-power event-driven neuromorphic hardware. Spike-based neuromorphic applications require processing and extracting meaningful information from spatio-temporal data, represented as series of spike trains over time. In this paper, we propose a method to synthesize images from multiple modalities in a spike-based environment. We use spiking auto-encoders to convert image and audio inputs into compact spatio-temporal representations that is then decoded for image synthesis. For this, we use a direct training algorithm that computes loss on the membrane potential of the output layer and back-propagates it by using a sigmoid approximation of the neuron's activation function to enable differentiability. The spiking autoencoders are benchmarked on MNIST and Fashion-MNIST and achieve very low reconstruction loss, comparable to ANNs. Then, spiking autoencoders are trained to learn meaningful spatio-temporal representations of the data, across the two modalities - audio and visual. We synthesize images from audio in a spike-based environment by first generating, and then utilizing such shared multi-modal spatio-temporal representations. Our audio to image synthesis model is tested on the task of converting TI-46 digits audio samples to MNIST images. We are able to synthesize images with high fidelity and the model achieves competitive performance against ANNs.
Deep Learning is a type of Neural Network Algorithm that takes metadata as an input and process the data through a number of layers of the non-linear transformation of the input data to compute the output. This algorithm has a unique feature i.e. automatic feature extraction. This means that this algorithm automatically grasps the relevant features required for the solution of the problem. This reduces the burden on the programmer to select the features explicitly. This can be used to solve supervised, unsupervised or semi-supervised type of problems. In Deep Learning Neural Network, each hidden layer is responsible for training the unique set of features based on the output of the previous layer. As the number of hidden layers increases, the complexity and abstraction of data also increase.
Tripathi, Suraj, Kumar, Abhay, Singh, Chirag
We propose a novel visual context-aware filter generation module which incorporates contextual information present in images into Convolutional Neural Networks (CNNs). In contrast to traditional CNNs, we do not employ the same set of learned convolution filters for all input image instances. Our proposed input-conditioned convolution filters when combined with techniques inspired by Multi-instance learning and max-pooling, results in a transformation-invariant neural network. We investigated the performance of our proposed framework on three MNIST variations, which covers both rotation and scaling variance, and achieved 1.13% error on MNIST-rot-12k, 1.12% error on Half-rotated MNIST and 0.68% error on Scaling MNIST, which is significantly better than the state-of-the-art results. We make use of visualization to further prove the effectiveness of our visual context-aware convolution filters. Our proposed visual context-aware convolution filter generation framework can also serve as a plugin for any CNN based architecture and enhance its modeling capacity.
Becker, Sören, Ackermann, Marcel, Lapuschkin, Sebastian, Müller, Klaus-Robert, Samek, Wojciech
Interpretability of deep neural networks is a recently emerging area of machine learning research targeting a better understanding of how models perform feature selection and derive their classification decisions. In this paper, two neural network architectures are trained on spectrogram and raw waveform data for audio classification tasks on a newly created audio dataset and layer-wise relevance propagation (LRP), a previously proposed interpretability method, is applied to investigate the models' feature selection and decision making. It is demonstrated that the networks are highly reliant on feature marked as relevant by LRP through systematic manipulation of the input data. Our results show that by making deep audio classifiers interpretable, one can analyze and compare the properties and strategies of different models beyond classification accuracy, which potentially opens up new ways for model improvements. | https://aitopics.org/mlt?cdid=news%3A22ABB812&dimension=pagetext |
The main crux of this thesis was to produce a model that was capable of simulating the theoretical performance of different configurations for a spatial measurement system using radio frequency technology. It has been important to study new modalities of spatial measurement since spatial measurement systems are an enabling technology that have allowed for the creation of better medical procedures and techniques, provided valuable data for motion capture in animation and biomechanics, and have improved the quality of manufacturing processes in many industries. However, there has been room for improvement in the functional design and accuracy of spatial measurement systems that will enhance current applications and further develop new applications in medicine, research and industry. <br /><br /> In this thesis, a modelling framework for the investigation of spatial measurement based on radio frequency signals was developed. The simulation framework was designed for the purpose of investigating different position determination algorithms and sensor geomatries. A finite element model using the FEMLAB partial differential equation modelling tool was created for a time-domain model of electromagnetic wave propagation in order to simulate the radio frequency signals travelling from a transmitting source antenna to a set of receiving antenna sensors. Electronic line signals were obtained using a simple receiving infinitesimal dipole model and input into a time difference of arrival localization algorithm. The finite element model results were validated against a set of analytical solutions for the free space case. The accuracy of the localization algorithm was measured against a set of possible applications for a potential radio frequency spatial measurement system design. <br /><br /> It was concluded that the simulation framework was successful should one significant deficiency be corrected in future research endeavours. A phase error was observed in the signals extracted at the receiving antenna locations. This phase error, which can be up to 40°, was attributed to the zeroth order finite elements implemented in the finite element model. This phase error can be corrected in the future if higher order vector elements are introduced into future versions of FEMLAB or via the development of custom finite element analysis software but were not implemented in this thesis due to time constraints. Other improvements were also suggested for future work. | https://uwspace.uwaterloo.ca/handle/10012/771 |
Envy is the painful or resentful awareness of another’s advantage combined with a desire to possess that same advantage. Recent neuroscientific research has begun to shed light on the brain regions that process the experience of envy, including regions of the prefrontal cortex involved in emotional processing and social cognition. It is still unclear, however, which regions of the brain are functionally connected during the experience of envy. We recorded functional neuroimaging data while inducing simulated envy in participants, experienced through a perspective-taking hypothetical scenario task. In this task, participants took the perspective of a protagonist portrayed in a written description and compared themselves to either i) a self-similar/superior individual, ii) a self-dissimilar/superior individual, or iii) a self-dissimilar/average individual. During each comparison, participants also reported how much envy they experienced while taking the protagonists perspective. We demonstrate an inverse relationship in the connectivity of the left superior frontal gyrus to both the right supramarginal gyrus and the precuneus with respect to self-reported envy ratings across participants. In other words, we show that the greater the functional connectivity that the left superior frontal gyrus shares with the right supramarginal gyrus and precuneus, the less reported envy a participant experiences. Overall, our results are in line with previous research implicating the superior frontal gyrus in the reappraisal of negative emotions and extend these findings by showing this region is also involved in modulating the simulated experience of the social comparative, negative emotion of envy. | https://www.polsoz.fu-berlin.de/soziologie/arbeitsbereiche/emotionen/News/20200623_pub_envy.html |
Hair was washed and dried using a pH Balanced shampoo and no conditioner, then starting at the back of the head, about a centimeter from the hairline, hair was sectioned into a horizontal row and extensions applied.
Working across the row, tiny strands of hair were attached to each extension using Cinderella Protein Bonds and its applicator
Extensions were applied in alternating shades of mid and dark brown, ensuring the probe only touched the bond.
Another section was taken a centimeter above the first, working in a horseshoe pattern up the head.
Step 4
Step 5
Step 6
Once the crown was completed the hair was blow-dried straight.
Meanwhile, to prevent a build-up of product, the applicator was cleaned using a dark cloth and washing-up liquid.
Starting on the right-hand side, hair was sectioned a centimetre above the hairline and extensions were applied, still alternating mid and dark brown. This was continued up the head taking 1cm sections at a time.
Working in the same way and ensuring there were no loose hairs in each section, this was continued on the other side to the temple area, using a shield to protect the scalp.
Step 7
Step 8
At the temple area extensions were applied in a more rounded pattern , pivoting towards the centre of the head and working in the direction of the hairline.
| |
A smart city is understood as an urban area with modern infrastructure and the application of IT that serves the management of the area.
In October 2015, the International Telecommunication Union (ITU) defined a smart city: A smart sustainable city is an innovative city that uses information and communication technologies (ICTs) and other means to improve quality of life, efficiency of urban operation and services, and competitiveness when using Amazon Echo vs Tap tools, while ensuring that it meets the needs of present and future generations with respect to economic, social, environmental as well as cultural aspects.
According to experts, smart cities are divided into four layers – sensor, network, platform and application layers. With the structure, core technologies are concentrated in the application layer, considered the most important central technology infrastructure. Information technology is considered a tool to connect technology infrastructure of smart cities.
Smart citites can also be understood as an organic connection between technology, people and institutional components.
In late 2015, the PM approved the national program on applying IT in the operations of state agencies with an aim to deploy smart cities in at least three localities in accordance with the criteria set by the Ministry of Information & Communication.
The Communist Party Congress’s Resolution also emphasized that Vietnam prioritizes the development of smart cities.
Many cities and provinces including Hue, Da Nang, Quang Ninh, HCMC, Phu Quoc Island, Lam Dong and Binh Duong have kicked off projects on smart city development.
A research work by Nguyen Van Khoi, Pham Le Cuong and Ha Minh Hiep from STAMEQ shows that there is a growing tendency of developing core technologies to serve as the fundamental for smart urban area’s infrastructure.
This means that every smart urban area focuses on developing certain groups of core technologies such as transport, environment, high technology and IT.
Intelligent traffic technology, for example, enhances the efficiency and quality of urban traffic through surveillance cameras, remote sensing and data analysis technologies to manage the traffic output and cargo circulation in real time.
Another trend in smart city deployment is the development of new IT services to increase government connections and the connections between government and people and businesses, and enhance accountability and government transparency. | https://dailybouncer.com/vietnam-arise-enhance-smart-cities/ |
mixture and cooked. You can also combine beans with other vegetables for preparing the stir fry dish. Jot out the healthy green dish in your menu chart for healthy tomorrows. You can explore a well detained Thoran recipe here that can be easily prepared at home.
Print Recipe
Pin Recipe
Prep Time
20
mins
Total Time
20
mins
Cuisine
Kerala
Servings
4
people
Ingredients
1x
2x
3x
1/2
kg
Beans
3
nos
Onions
small
1
cup
Coconut
grated
3
nos
Green chillies
2
nos
Garlic
pods
1
tbsp
Oil
1
tsp
Mustard seeds
Turmeric powder
A pinch
Curry leaves
A few
Salt
As reqd
Instructions
For preparing the tasty nutritious vegetarian dish, first cut beans into very small pieces.
Grind together
coconut
,
turmeric
,
onion
and
green chillies
into a coarse mixture. Do not grind to a paste.
Heat 1 tbsp of
oil
in a pan.
Add
mustard seeds
and when they splutter, add chopped beans,
garlic
and mix well.
Add the ground
coconut
masala. Do not mix, but the masala should cover the beans.
Add
curry leaves
and
salt
.
Keep the pan covered and cook on a low flame for 5 minutes. Keep note that the dish should not be overcooked which will change the flavor of beans.
Stir well.
:- Serve the dish hot. Beans is a very nutritious dish and this dish should be prepared at least once a week. This is one of the easiest of dishes that can be easily prepared at your home.
:- For easy cooking, one can add
coconut
,
onion
, chilly directly to the beans without grinding.
Notes
You can visit this link for a vegetarian side dish
Cherupayar Thoran
. You can also visit this link
Kerala Cheera Thoran
.
[wprm-recipe-yvideo]
Tried this recipe?
Let us know
how it was!
Dinner
Easy
Lunch
Onam
Sadhya
Sidedish
Vishu
S
written by
SilpaSurendran
continue reading
Follow
Leave a comment
Cancel reply
Your email address will not be published. Required fields are marked *
Recipe Rating
Recipe Rating
Post Comments
Related Posts
A
Adeela Shamnas
0
0
Easy Apple Salad
January 31, 2023
Save
Easy Apple Salad
A
Adeela Shamnas
0
0
Bun Dosa
December 29, 2022
Save
Bun Dosa
A
Adeela Shamnas
0
0
Sweet Banana Pakodas | Ripe Banana Fritters
December 22, 2022
Save
Sweet Banana Pakodas | Ripe Banana Fritters
A
Adeela Shamnas
0
0
Yamani Roti
December 21, 2022
Save
Yamani Roti
More Posts By Author
S
SilpaSurendran
0
1
Prawn Coconut Soup
October 19, 2002
Save
Prawn Coconut Soup
S
SilpaSurendran
0
2
Tomato Soup In Coconut Milk
October 19, 2002
Save
Tomato Soup In Coconut Milk
S
SilpaSurendran
0
1
Potato Kuttu
October 19, 2002
Save
Potato Kuttu
S
SilpaSurendran
0
0
Beans Thoran
October 19, 2002
Save
Beans Thoran
Search
Search for: | https://www.pachakam.com/recipes/beans-thoran |
If you’re considering cooking a meal for a vegetarian friend or relative there are some important things you should try to find out first. It is a common mistake to assume a vegetarian is just somebody who doesn’t eat meat, but this is not necessarily true, as there are different types of vegetarian, from vegans who eat no animal products, even honey, milk and yeast, to so called pseudo-vegetarians who will eat some meats in a prepared meal.
So before you even think about the meal you need to find what ingredients will be acceptable to your vegie friend. So here are some questions you can ask to make sure your friend will not be offended by the meal you prepare for them because it contains ingredients which they have decided not to eat.
Lacto-ovo vegetarians will eat milk and eggs, but other sub-categories of vegetarian will not. Some wont do it for health reasons; others wont for ethical reasons. Whatever the case, you can get around this problem by either creating more dishes that do not contain milk and eggs or by using egg replacer, which you can find at most supermarkets, and milk replacements, such as soy milk.
Find out what kind of vegetarian your friend is, and follow up by asking exactly what that means in terms of their food requirements. They shouldn’t mind that you are taking the trouble to find out these details as it’s for their pleasure you will be preparing the meal. It’s better to find out beforehand than to have a possible awkward scene at the dinner table.
Try to find out to what extent they abstain from animal products. Some vegetarians will simply not eat meat, some as we have said will also not eat any animal products, and some will even go so far as not eating from plates or utensils which have come in contact with meat products. In the latter case it is best to have a set of utensils set aside for your vegetarian diner(s) and kept seperate from the rest.
Cooking for a vegetarian doesn’t have to be particularly difficult, but a little advance preparation and knowledge will make it simpler. Follow this advice, and you will have no trouble including vegetarian friends in your next dinner invitation. | http://xn--80aawhfnbxw1k.xn--p1ai/?p=1894 |
The first permanent photograph of a camera image … sliding wooden box camera made by Charles and Vincent Chevalier in Paris. … for a couple of years to commercialize it.
History of photography – Wikipe
Source: Was this really the first camera ever built? | Modern Legends
The history of photography began in remote antiquity with the discovery of two critical … Around 1800, Thomas Wedgwood made the first reliably documented, although … The daguerreotype required only minutes of exposure in the camera, and … in 1839, a date generally accepted as the birth year of practical photography.
When Was the First Movie Camera Invented? – No Film Sch
Source: History of film technology – WikipediaThomas Edison received a patent for his movie camera, the Kinetograph, in 1892 . Edison and his team had developed the camera and its viewer …
Fascinating History Of Cameras Since The First Camera – PhotoB
Source: History of Camera | shaelynmitchler
The First Camera (Obscura) – 4th Century BC. · So, what is Obscura? · Who invented the first camera Obscura?
Who Invented Camera? – Linke
Source: Fascinating History Of Cameras Since The First CameraSmallInformation Johann Zahn designed the first camera in 1685. But the first photograph was clicked by Joseph Nicephore Niepce in the year …
The History of Photography: Pinholes to Digital Images – Though
Source: A History of Photography – Katie’s PhotographyThe first “cameras” were used not to create images but to study optics. … a separate storage unit made by Kodak, appeared the following year. | https://www.beatcameraa.com/what-year-was-the-first-camera-made.html |
Cameras are perfect for recording wonderful moments. Plenty of memories cross our mind just by viewing a photograph.
It may not occur to you every time, but by taking a picture, you actually convert the three-dimensional surroundings into a two-dimensional image.
In the last few years, there has been an evolution to digital cameras. But do you still remember the first camera, the camera obscura? Let's have a look at what happens there.
The camera obscura (in English, 'dark chamber') is a dark box with a hole on one side. As the sun (or any other source of light) shines on an object, each visible point of the scene reflects a ray of light that passes through the hole and forms a unique image point on the film placed on the inner side opposite the hole.
The image displayed in the box is coming from one point, the aperture in the opposite side of the box. This point is called the perspective center. In a later phase of photography, a lens is added at this point to get a sharper image.
Making a photograph from an airplane or even from space...
The principles of perspective projection can also be applied in aerial photography and remote sensing, where there are two possibilities:
- projection on a negative plane, as in the camera obscura, where the lens of the camera (which acts as the perspective center) is located between the surface and the image plane.
- projection on a positive plane where the image plane is located between the lens and the surface that has to be imaged.
The counterpart of perspective projection is orthographic projection. | https://seos-project.eu/3d-models/3d-models-c02-p01.html |
Specialty: Ceramic analysis, archeometry, geoarchaeology, environmental archaeology, Latin America, East Asia Educational background: Ph.D. in Anthropology (Archaeology) with a minor in Materials Science from the University of Arizona Current work affiliation: Department of Anthropology and Heritage Studies, University of California, Merced; Faculty of Social Sciences and Humanities, Tokyo Metropolitan University I have worked extensively in Latin America and East Asia investigating the pre-ceramic to ceramic period transitions. Recently, I have been studying this by covering the late Pleistocene to Holocene. I reconstruct human behaviors examining ceramic production processes with archaeometric techniques, geochronology, depositional and archaeological context, and environmental variability and change. I collaborate with archaeologists and scientists with distinct expertise in fields and at labs. | https://archaeo.peercommunityin.org/public/user_public_page?userId=340 |
Is your Google Pixel 3 XL losing battery power fast? This post will give tips and solutions on how to solve this common problem.
Before we proceed, we want to remind you that if you are looking for solutions to your own #Android issue, you can contact us by using the link provided at the bottom of this page. When describing your issue, please be as detailed as possible so we can easily pinpoint a relevant solution. If you can, kindly include the exact error messages you are getting to give us an idea where to start. If you have already tried some troubleshooting steps before emailing us, make sure to mention them so we can skip them in our answers.
What causes Google Pixel 3 XL to lose battery fast
One of the most common issues that Android users encounter is battery drain problem. Poor battery performance can be due to a lot of things so there’s no definitive way to fix it. Some of the common reasons why your Google Pixel 3 XL may be losing battery fast include the following items:
screen brightness
minor OS bug
apps
inefficient coding
customizations or settings
Widgets
hardware malfunction
Extending battery performance on your Google Pixel 3 XL requires patience and time. Be sure you have both in order if you want to seriously improve battery performance.
How to improve battery life on Google Pixel 3 XL
In most cases, poor battery performance is due to improper usage habits. Our suggestions below are meant to guide you on how to address poor usage habits as much as solutions. They are not meant to “fix” the problem right away so be patient in doing them. It may take one or a combination of some suggestions to fully improve the battery performance of your Google Pixel 3 XL.
Suggestion 1: Force reboot
Before you do any software changes, it’s good idea if you can refresh the system first. If you are unable to use your Pixel 3 XL normally nor restart it the traditional way, try to do a forced reboot. Simply press and hold the Power button for about 10 seconds. Afterwards, wait for your phone to complete the reboot sequence and see what happens and more importantly, to see if there’s improvement in battery performance.
Suggestion 2: Check apps
In majority of cases similar to yours, the main problem is apps. Like Android Operating System, apps are just codes designed to work with an operating system and your Pixel 3 XL hardware’s mini OS (called firmware). Interaction between apps and other software in a device is a pretty complex process and there are millions of possible points of failure. Although developers have done a pretty decent job of making apps and Android stable, problems can sometimes show up unannounced.
If your Google Pixel 3 XL’s battery started to lose power fast after installing an app, the most likely reason must be that new app. Try to uninstall that app to see if there’s an improvement on battery performance.
Alternatively, you can use the built-in feature in Android to see if a particular app is to consuming power abnormally. You can head to Settings > Battery and check if a certain app stands out particularly. Tap on the Battery symbol to see a breakdown of your apps. This will help you tell how much your apps use the battery since the last full charge of the device. If you think an app shows up high on the list when you don’t use it that often, you can then try to force stop or disable it. If force stopping or disabling an app won’t make a difference, try uninstalling the ones you think may be causing the problem. Otherwise, you can continue with the rest of the troubleshooting below.
Suggestion 3: Restart in safe mode
Another way to check if a third party app is consuming your Pixel 3 XL battery is by restarting to Safe Mode. On safe mode, third party applications will be disabled so if your device’s battery improves significantly after allowing the device to run for some time, you may be able to narrow down the possible causes afterwards.
In order to boot your Pixel 3 XL to safe mode:
Press and hold your device’s power button.
On your screen, touch and hold Power off. If needed, tap OK.
Your device starts in safe mode. You’ll see “Safe mode” at the bottom of your screen.
Let your Pixel 3 XL run in this mode for at least 48 hours so you’ll notice any difference.
To exit safe mode, simply restart the device.
Remember, booting to safe mode won’t automatically tell you which of your apps is troublesome. You’ll need to observe the phone and check for improvements in order to identify if a third party app is causing the problem. To identify which of your apps is causing the trouble, you should boot the phone back to safe mode and follow these steps:
Boot to safe mode.
Check for the problem.
Once you’ve confirmed that a third party app is to blame, you can start uninstalling apps individually. We suggest that you begin with the most recent ones you added.
After you uninstall an app, restart the phone to normal mode and check for the problem.
If your Pixel 3 XL is still problematic, repeat steps 1-4.
To identify which of your apps is causing the trouble, you should boot the phone back to safe mode and follow these steps:
If your Google Pixel 3 XL is still problematic, repeat steps 1-4.
Suggestion 4: Install app and system updates
Sometimes, poor battery performance or excessive battery drain can occur due to inefficient coding. This can occur if there’s a coding issue in an app or in the operating system. If a developer notices issues that may be caused by poor coding, they will try to improve the situation by patching them. It is for this reason that we encourage you to always install app and system updates as they come.
Suggestion 5: Use Battery optimization
Google devices such as the Pixel models have a useful feature called Battery optimization designed to minimize the impact of battery drain. We suggest that you use it to improve your situation. Below are the general steps to use it:
From the Home screen, swipe up the Arrow icon (located at the bottom) to view the Apps List.
Suggestion 6: Lower screen brightness
Another most common reason why expensive and powerful smartphones like the Google Pixel 3 XL loses battery fast is the screen. To give you straight fact: the brighter the screen, the more power the system needs to maintain it. So, if you are the type who wants to make everything bright, don’t be surprised if your battery won’t last long. Try to decrease screen brightness to the lowest comfortable level for you to extend battery life every day.
Suggestion 7: Turn off services you’re not using
Some background services left enabled can slowly but surely drain the battery as well. Try going under Settings menu and disable any service or feature that can potentially add to the problem. You can start by disabling such things as Bluetooth, wifi, GPS among others if you’re not using them. If you are in an area with intermittent or poor cellular services, enable Airplane mode. If cellular signals come and go, it can cause the system to constantly search for them. Try using wifi instead to minimize battery loss over the day.
Suggestion 8: Remove widgets
App shortcuts or widgets in your Home screen may be the reason why your Pixel 3 XL is experiencing battery drain. Like apps, widgets may regularly contact remote servers to update its contents. Try to remove them if you still can’t figure out the cause of the problem at this stage.
Suggestion 9: Factory reset
If all the troubleshooting steps above won’t solve the freezing issue on your Pixel 3 XL, the final software troubleshooting step that you can do is to wipe it. This way, you can return all software settings back to their defaults in one stroke. If the reason for the problem is software related, factory reset will most likely help.
To factory reset your Pixel 3 XL:
Create a backup of your personal data.
Make sure to know the username and password for Google account in the phone.
Suggestion 10: Downgrade OS
Sometimes, battery drain issue can become more pronounced right after installing the latest Android version. If doing all the suggestions above has not helped so far, consider downgrading your Pixel’s OS to its previous version. Downgrading to previous Android is not officially supported by Google because it can cause problems if not done properly. Do it at your own risk.
Suggestion 11: Contact Google support
Should nothing change after a factory reset or downgrading the OS, the most likely reason must be hardware malfunction. Contact Google so they can advise on what to do.
Engage with us
If you are one of the users who encounters a problem with your device, let us know. We offer solutions for Android-related problems for free so if you have an issue with your Android device, simply fill in the short questionnaire in this link and we will try to publish our answers in the next posts. We cannot guarantee a quick response so if your issue is time sensitive, please find another way to resolve your problem.
If you find this post helpful, please help us by spreading the word to your friends. TheDroidGuy has social network presence as well so you may want to interact with our community in our Facebook and Google+ pages.
DISCLAIMER
(i) TheDroidGuy.com is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to Amazon.com.The links and images of the products we review contain links to Amazon.com, TheDroidGuy.com will receive sales commission if you purchase items that we refer on Amazon.com.Thank you for your support.(ii) Prices and product availability shown for products we review are for references only. Although we do update our data regularly, the pricing and availability of the products we review are constantly changing, please check on the merchant site for the actual price and availability.(iii) We are not affiliated with the device manufacturers or phone carriers we mention in any way, all suggestions are based on our own experience and research, you may use our advice at your own discretion.(iv)see additional privacy policy here
| |
There is something about being in nature with a horse that offers us a chance to slow down, breathe deeply, become present and connect with our whole Self. Horses allow us to turn our attention inward to restore connection with ourselves and our innate wisdom.
Come take a break from our hectic world and calm your mind, destress and cultivate peace within. We will gather together in community for meditation and interaction with the horses through energy and community in nature among our wise horses.
This unique experience offers you meditation, nature and the healing effects of horses all at once!
So join us Sunday to get quiet, unwind and be in the healing presence of our horses in the Gathering of the Horses.
Join our sacred meditation circle to sit in nature and reflect, listen, be in community, grounded, at one with all of life in the presence of a highly intuitive herd of horses. This experience is deeply restorative and helps us recharge our senses, wisdom and inner guidance. (no experience with horses is necessary) Please bring a lawn chair and a bottle of water. I will send details after registering.
Equus Rescue and Therapy
8743 Le Pere School Rd.
Millstadt, IL 62260
Registration is required so we can notify you in the event of cancellation. If you have questions please call Pam Weiss 314-401-9163. We are limited to 12 participants so save your spot today! | https://www.pamweisscoaching.com/copy-of-events |
A new Cambridge research institute which aims to tackle the most common causes of premature death in the world has moved a step closer to completion with the building officially ‘handed over’ by the constructors, SDC.
Based on the Cambridge Biomedical Campus on the south of the city, the Heart and Lung Research Institute (HLRI) is a joint initiative between the University of Cambridge and Royal Papworth Hospital NHS Foundation Trust. It will create the largest centre for heart and lung research, education, academic-industrial collaboration, and clinical care in Europe.
The HLRI will focus on conditions such as the causes of heart attacks, acute lung injury and repair, cystic fibrosis, vascular dementia, atrial fibrillation and pulmonary hypertension.
Work on the site began in October 2019 and has continued safely throughout the coronavirus (COVID-19) pandemic due to SDC’s exemplary health and safety measures and commitment to the project.
Features of the building include a 10-bed clinical research facility, laboratory space and an underground tunnel linking HLRI to Royal Papworth Hospital.
“This is an incredible opportunity to bring together the University’s expertise in cardiovascular and respiratory science and Royal Papworth Hospital’s expertise in treating heart and lung disease,” said Professor Nick Morrell, HLRI Director.
“Heart and lung diseases affect many millions of people worldwide and the numbers are growing. Institutes such as ours, focused on these big health challenges, are urgently needed. The discoveries made by our researchers will deliver major benefits to the public through improvements in public health, new approaches to diagnosing and treating disease, and new medicines.”
HLRI houses a 10-bed clinical research facility.
In the UK, one in every four deaths is caused by cardiovascular disease and one in five by respiratory disease. Despite a growing awareness of risk factors, such as smoking and poor diet, the prevalence of such diseases is increasing.
According to the World Health Organization, cardiovascular disease causes nearly 18 million deaths per year, mostly due to heart attacks and stroke, with respiratory disease just behind. The combined worldwide cost of this is more than £840billion each year.
Professor John Wallwork, Chairman of Royal Papworth Hospital, added: “This will be a huge step forward and demonstrates one of the reasons we moved to the Cambridge Biomedical Campus – to collaborate with the best researchers in the world to help to save lives.
“HLRI will mean new treatments will be created, tested and delivered all on one site to tackle the biggest causes of premature death in the world. It will also allow us to provide further education and training to clinicians tackling heart and lung disease worldwide.
“By bringing together the best researchers, scientists and clinicians in the world to collaborate will help save lives, and allow us to make even quicker progress in bringing tomorrow’s treatments to today’s patients.”
(From L-R front row) Francis Shiner, Managing Director SDC; Professor John Wallwork, Royal Papworth Hospital Chairman; and Professor Nick Morrell, HLRI Director, and colleagues at the handover event. | https://royalpapworth.nhs.uk/our-hospital/latest-news/heart-lung-research-institute-building-handover |
Please Note: This event has expired.
Majestic Mozart - Fall Concert
We begin Season 32 with selected works of Mozart. The emotionally stirring Requiem in D minor is often described as being shrouded in mystery because Mozart died before he could complete it.
The Requiem will be performed with orchestra and soloists and highlights an evening that will include performances of additional, smaller works by Mozart. Join us as we welcome to the podium Dr. Michael Hanawalt, our new Artistic Director/Conductor, who will give a pre-concert lecture about the works to be performed.
ADMISSION INFO
Single Concert Ticket Prices (purchased online in advance. Ticket prices are $2 more when purchased at the door):
$22 General
$18 Senior (62+)
$ 6 Student (with ID)
All Ticket Sales Final, No Refunds. | https://www.tallahasseearts.org/event/majestic-mozart-fall-concert/ |
Jiuquan Xinyu Friction Products Co., Ltd. is a company specializing in the production and processing of friction plates, friction blocks, clutch plates, oil rig accessories and other products, with a complete and scientific quality management system. China's one belt, one road economic belt, is located in Jiuquan, Gansu province. It is located in the "cradle" Yumen Oilfield and the Jiuquan Dongfeng space base, with more than thirty years of history. Over the years, we have been committed to the development, manufacturing and sales of new friction materials, from asbestos materials to semi-metallic materials, non asbestos materials, composite materials developed drilling rigs, workover drum, disc brake blocks, clutch assemblies and accessories, which are applicable to various types of drilling rigs, workover rigs and workover rigs currently used in China. With advanced domestic equipment and production process, more than 150 professional production equipment, more than 30 various testing equipment. It has high and intermediate professional and technical talents, and has established long-term cooperative relations with many universities and scientific research institutes, aiming to produce advanced friction material products. The company insists on taking science and technology as the guide, adopting ISO quality management system to manufacture products, relying on strong technical force and perfect testing means to ensure the high quality of products. | http://www.jqxy.cn/en/h-default.html?m354pageno=2 |
South Africans are urged to report any illegal Rhino activities that they are aware of to 0800 205 005.
Help fight the war against rhino poaching!!
MEDIA STATEMENT 15 JANUARY 2012
MINISTER OF WATER AND ENVIRONMENTAL AFFAIRS, MINISTER EDNA MOLEWA ADDRESSES THE NATIONAL PRESS CLUB ON THE ONGOING SCOURGE OF RHINO POACHING AND INTERVENTIONS AIMED AT ADDRESSING THIS PROBLEM!
I would like to express my dismay and strong condemnation of the ongoing scourge of rhino poaching in our country, which has seen the staggering number of 448 rhinos illegally killed in South Africa in 2011.
This ongoing poaching of our rhino population is a source for great concern to government and the various stakeholders. It requires of us all as a collective to take drastic measures to help combat it.
I would like to assure you that the government of South Africa views the illegal killing of this national treasure in a very serious light and will continue to prioritise our fight against this crime jointly with our law enforcement agencies. We will continue to implement the various initiatives highlighted last year, while putting in place added measures to address this matter.
150 Additional Rangers for Kruger National Park
Pretoria – 15/01/2012 SAPA report
An additional 150 rangers will be deployed to the Kruger National Park this year in a bid to combat rhino poaching, Environmental Affairs Minister Edna Molewa said on Sunday.
Molewa, addressing a National Press Club briefing in Pretoria, said that would add to the existing 500 rangers currently employed in the park. Molewa's announcement follows the killing of 11 rhino in the country this year so far.
Two poachers have been killed and another two have been arrested in connection with the rhinos poaching in the Kruger National Park this year. In 2011, 448 rhino were killed in South Africa.
"This on going poaching of our rhino population is a great source of concern to the government."
About 232 people had been arrested for rhino poaching, Molewa said.
Read more: NEWSFLASH!! 150 Additional Field rangers for Kruger Park
We could all do with some GOOD NEWS !!! The pledged funds for the Unite against Poaching Trust fund have been given another boost!
Despite it being December and holiday time, with vehicle sales exected to be lower than normal, the Unitrans VW & Audi Group have once again pledged a phenomenal amount of money to the trust fund. An impressive R 397 000 is being added to the trust fund reflecting December contributions, which brings the total since 1st September 2011 to R 1.865 MILLION!!!
In the light of the carnage against our rhino population in 2011 and the horrific start to 2012, we cant wait to hand these funds over so that the funds may be used exctly where it is needed the most.
Read more: Unite Against Poaching Trust fund swell the coffers in December
SUSPECTED RHINO POACHER ARRESTED
During the afternoon of 11 December 2011, a joint operational team consisting of South African National Parks (SANParks) Rangers and the South African National Defence Force (SANDF) arrested a suspected rhino poacher in the Nwa’netsi Ranger Section of the Kruger National Park (KNP).
The team came in contact with a group of three armed suspected rhino poachers wherein a shoot-out ensued which led to one suspect being wounded and arrested. The other two suspects managed to escape back into Mozambique.
During the operation, a hunting rifle and four fresh rhino horns were recovered. Follow-up investigations located one rhino carcass, a second carcass is still being sought. Investigations continue in this regard. | https://uniteagainstpoaching.co.za/news?start=415 |
In Reply Refer To:
1734 (WO-200), (NOC-100) P
EMS TRANSMISSION 05/16/2012
Information Bulletin No. 2012-080
To: All WO and Field Officials
From: Assistant Director, Renewable Resources and Planning
Subject: Assessment, Inventory, and Monitoring (AIM) Strategy Update
This Information Bulletin transmits the completed AIM Strategy with an associated Technical Note, and introduces the National AIM Implementation Team and State-level Monitoring Points-of-Contact.
In 2005, the Office of Management and Budget directed the Bureau of Land Management (BLM) to develop a strategy to enhance the effectiveness of its resource monitoring activities. In response, the BLM established a Core Team, an Oversight Team, and local, regional, and national work groups to scope the issue and identify potential solutions. A detailed field survey and review of data collection activities documented current field practices and identified a number of opportunities to increase effectiveness in data collection and data management activities. The working groups identified critical management needs for information at multiple scales about resource occurrence, extent and condition, and initiated a number of pilot projects to identify best practices for data collection. For example, projects were funded to determine how the BLM could leverage field collected site data in conjunction with remote imagery to improve West-wide vegetation mapping; detect broad-scale vegetation changes and surface disturbances; develop conceptual ecological models to predict the interaction of key ecological processes and stressors; and to select core indicators and consistent collection methods. Results from these pilot projects served as the basis for the development of the attached AIM Strategy (Attachment 1).
The AIM Strategy is a high-level document developed by the BLM with input from academia, the Agricultural Research Service, and the United States Geological Survey. An internal review confirmed the strategy addresses the BLM’s multiple-use and sustainable yield mission and an external peer review verified the AIM Strategy is built on sound science. The rigor within the document is intentional and will ensure the generation of defensible data to inform BLM managers and the public about key ecological processes for maintaining sustainable ecosystems. The AIM Strategy outlines a cross-program vision for data collection, analysis, use and reporting in the BLM. Moving forward, collection of monitoring data will follow a structured framework and include: (1) use of core quantitative indicators and consistent methods (BLM Technical Note 440, Attachment 2); (2) implementation of a statistically-valid, scalable sampling framework; (3) application and integration of remote sensing technologies, e.g. vegetation/ landcover maps; (4) implementation of electronic field-data collectors and enterprise data management; and (5) capture of legacy data in a digital format.
Benefits: The AIM Strategy benefits all levels of the BLM by establishing a framework for collection of monitoring data that is consistent and compatible across scales, programs, and administrative boundaries. Implementation of the AIM Strategy will provide defensible, quantitative data to inform decisions and allows data to be collected once and used many times for many purposes.
Next Steps: To integrate the AIM Strategy into day-to-day management activities , the BLM must develop an implementation plan. The AIM Implementation Plan will establish work products, timelines, capacity needs, a communication plan, cross-program guidance, performance measures, training requirements, and guidance for budget allocations. This plan will be vetted through the Deputy State Directors, the Field Committee and the Executive Leadership Team.
A National AIM Implementation Team (Attachment 3) has been established to support development of the implementation plan and includes representatives from field , state , centers, and the Washington Office. Additionally, each state has provided an AIM point of contact (Attachment 4) to facilitate communication and coordination of AIM activities.
An AIM SharePoint has been established where all BLM employees can access AIM-related documents, presentations, and meeting notes.
Contact: For further information or clarification, please contact Gordon Toevs (National Monitoring Lead, WO200 at 202-912-7202), Jason Taylor (Landscape Ecologist/AIM Coordinator, NOC at 303-236-1159), or Carol Spurrier (Range Ecologist, WO220 at 202-912-7272).
Signed by: Authenticated by: | https://www.blm.gov/policy/ib-2012-080 |
Citation: Chanbang, Y., Arthur, F.H., Wilde, G.E., Throne, J.E., Subramanyam, B. 2008. Susceptibility of eggs and adult fecundity of the lesser grain borer, Rhyzopertha dominica, exposed to methoprene. Journal of Insect Science 8:48. 6 pgs.
Interpretive Summary: One of the insecticides used to control the lesser grain borer on stored rice is the insect growth regulator methoprene. While this insecticide limits development of immature insects, we have limited information regarding direct toxicity to eggs of the lesser grain borer. We exposed their eggs on filter paper and on rice treated with methoprene, and also exposed adults on treated rice. Mortality of eggs increased as the concentration of methoprene on filter paper increased, and eggs exposed directly on rice either failed to hatch or larvae died before they could penetrate the hull, or the immature insect died inside the kernel and did not reach the adult stage. When adult females were exposed on rice treated with methoprene, egg-laying was reduced. Results show that eggs of the lesser grain borer are extremely sensitive to methoprene, and it could be used effectively in management programs that are targeted toward this insect.
Technical Abstract: A series of tests was conducted to determine the susceptibility of eggs of Rhyzopertha dominica (F.), the lesser grain borer, exposed to the insect growth regulator (IGR) methoprene on filter paper and on rough rice. In the first test, the hatch rate of eggs exposed on filter paper treated with methoprene at the rate of 0.0003 mg [AI] /cm2 was 50.0 ± 7.3% compared to 93.0± 3.3% on untreated controls. In the second test, eggs were exposed to a dose-response series of 0.00003 to 0.03 mg[AI]/cm2. Neonate emergence was directly proportional to concentration and ranged from 85 ±2.0% on untreated controls to 26.7 ± 8.3% at the highest concentration tested. In the third test, 1 ppm of methoprene was sprayed on long grain rough rice (Cocodrie variety), and then individual kernels were cracked and paired with an egg. About 70% of untreated eggs hatched and larvae were able to bore inside and eventually emerge as adults, while only 40% of the eggs exposed to treated rough rice were able to develop to the larval stage. Eggs either failed to hatch on the treated rice or the larvae died before they could penetrate the rice hull. In the final test, newly-emerged adults were exposed on rough rice treated with 1 ppm methoprene. Number of eggs per female from adults on clean grain was 27.7 ± 4.3 eggs per female, and on treated grain was 4.8 ± 1.1 eggs per female during 24 days after emergence. Methoprene as either a protectant or residual spray severely affects development of egg and neonate R. dominica, and also reduces fecundity of exposed parent adults. | https://www.ars.usda.gov/research/publications/publication/?seqNo115=196800 |
Definition of Process Failure Modes Effects Analysis (PFMEA):
Is a systemized group of activities intended to: (a) recognize and evaluate the potential failure of a product/process and its effect, (b) identify actions which could eliminate or reduce the occurance, (c) document the process.(d)Track changes to process-incorporated to avoid potential failures.
Is a living document. Is better to take actions addressed to eliminate or reduce the potential causes than implement controls in process. Is a process which before hand tells you the potential failure modes and their effects.
In safety terminology in chemical industry, PFMEA can directly be related to HAZOP Analysis. HAZOP is an acronym for Hazard and Operability. It is a process to find out the potential failures of equipment, piping, pumps and utilities and their effects on plant and human safety. This study helps in introducing extra safety features beforehand on equipment and piping to avoid the potential failures and consequent disasters. | https://www.isixsigma.com/dictionary/process-failure-modes-effects-analysis-pfmea/ |
Papua New Guinea is one of the last unspoiled lands for the adventurous traveler. Meet fascinating tribes, enjoy some of the world’s best bird-watching, and journey through a varied and inspiring countryside, where no two provinces are alike. Papua New Guinea offers visitors a glimpse of mountainous highlands, fertile valleys, the might Sepik River, coral atolls and some of the best diving locations in the world. Papua New Guinea is a country of wild beauty, breathtaking landscapes, and fascinating flora and fauna.
Explore the mystical Sepik Region – one of the world’s largest waterways! Observe the intact tribal culture, customs, animistic beliefs, art, and sorcery of the flamboyant tribes here, who are skilled carvers and weavers.
Attend the Goroka Show. Nicknamed “the most colorful show on earth,” Goroka showcases singsings (traditional songs, dances and ritual performances) from over a hundred tribes.
In the mid-Sepik region visit the Spirit House of a regional clan to meet the local chief and his initiated men. See men playing large, wooden Garamut drums made of hollowed-out logs, and witness a deeply intimate ritual ceremony.
Enjoy nature walks amidst a landscape of lush high valleys wedged between towering limestone peaks, endless tropical forests and fertile plains, as you listen to the ever-present sounds of the forest birds. | http://asianpacificadventures.com/papua-new-guinea/ |
Pages
Tuesday, January 25, 2011
ALENEX: Experiments with Johnson-Lindenstrauss
I'm three days behind on my postings, so I have the luxury of looking back and attempting a larger perspective.
As Dana Randall put it at the business meeting, this is the Johnson-Lindenstrauss SODA. And it seems apropos to start with our paper at ALENEX. This was work done by my student Qiushi Wang, who's applying for grad schools (Admit him ! or email me for more info!)
The Johnson-Lindenstraus Lemma is one of the most powerful tools in the theory of metric embeddings and dimensionality reduction. Simply put, it says that given any set of $n$ points in a Euclidean space, there exists a linear mapping into roughly $O(log n)$ dimensional Euclidean space that preserves all distances approximately.
There's a long series of proofs of this lemma: all of them yield essentially the same bound on the number of dimensions and the same dependence on the error term, and so the main efforts have focused on improving the running time of the mapping itself. If we're mapping from d dimensions to k, a linear mapping can take time $O(kd)$ per point, and this is the time to beat.
There are two strands of research along these lines: the first family of methods tries to speed things up by sparsifying the projection matrix to speed up the transformation. You can make the matrix quite sparse this way, but there's a limit on what you can do, because if the input vector being projected is itself quite sparse, then the resulting vector has mostly zeros in it, destroying its norm (and any hope of preserving distances)
The trick, which leads to the second strand of research, is to "precondition" the input. The idea is quite elegant: if you apply what is essentially a random rotation to the vector, it becomes dense w.h.p, where density intuitively means that no one coordinate is very large (we assume unit norm vectors w.l.o.g). Once you do this, the resulting projection matrix can be made quite sparse.
There's a catch though: you're now using two matrices instead of one, so you end up spending d^2 time on the first part, which dominates the original $kd$ time. The second trick you need then is a special random rotation that can be applied very quickly. Essentially, you need the walsh-hadamard transform. This is the core idea behind the 2006 paper by Ailon and Chazelle, and there's been much work since on improving the bounds and the preconditioner construction. A third line of work combines the two strands is to sparsify (by subsampling) a special code matrix that has a "preconditioning" effect.
But in all of this, no one has really looked at the actual behavior of these algorithms in practice. There are a number of reasons to do this: first of all $O(\log n)$ dimensions isn't so hot if the constant is large. Secondly the algorithm is randomized, which tends to give practitioners the heebie-jeebies. And finally, the dizzying array of algorithm options available is just plain confusing.
The constant in the dimension of the embedding is small. It's essentially 1 * log P/epsilon^2, where P is the number of "norm probes" you require (P = n^2 for distances and n for norms). This is good, because it means that there are no hidden large constants.
The quality of all algorithms is basically the same, and is very consistent. In other words, the fact that JL is randomized (which often causes a lot of concern in practice), is not a problem for its use (unless you working in a distributed environment and need to share randomness - pointed out to me by TS Jayram).
The distortion error itself is very nicely concentrated (normally) around 1. Unless you have highly clustered data, in which case the distortion distribution looks like a superposition of shifted Gaussians, one for each cluster center.
Since all algorithms behave essentially the same on quality, speed is the main differentiator. Here, the 'best in class' depends heavily on what you know about the data. For dense data, you can be pretty sparse (as predicted by some of the papers) and the embedding is fast. For sparse data, it turns out that at least in MATLAB, and for small dimensions, the dense method work better (a little ironic considering that much of recent work was designed to deal with the sparse case). This is because of MATLAB's heavy optimization for dense matrix multiplication.
Of course, your dimensionality might be too high to store a dense matrix, or you might not even know what the data profile is like. In that case, preconditioning methods like the original Ailon/Chazelle method work great. and there are only small differences between the methods as d increases.
We're not even close to being done with our explorations: there are at least four or five new questions to explore based on feedback we got at SODA. But it's been an illuminating experience, and I've been heartened by all the interest the community has shown in this research, based on the feedback I got.
| |
Conclusion Though it may seem formulaic — and, well, it is - the idea behind this structure is to make it easier for the reader to navigate the ideas put forth in an essay. You see, if your essay has the same structure as every other one, any reader should be able to quickly and easily find the information most relevant to them. The Introduction Want to see sample essays? Check out our Sample Essay section where you can see scholarship essays, admissions essays, and more!
Format Typically, a job essay is actually a letter sent to introduce yourself when submitting a resume or an application. Business letters should include your return address, the date, and the address to which the letter is being sent at the beginning, with a 2-inch top margin.
Appropriate Language Again, this is a business document, so it should not read like a letter to your best friend. Write more formally, rather than being overly familiar or casual.
Avoid all slang terms or idioms, as well as most industry jargon. Phrase sentences to avoid the use of second-person pronouns.
Conciseness and Efficiency Human resources personnel are often inundated with applications, along with many other responsibilities. Respect their time restraints by getting to the point quickly and concisely. Cut vague phrases, replacing them with tight, specific words. Combine sentences whenever possible.
I provided information about the XYZ event. Attention Command With the flood of applicants for many positions, your letter needs to set you above the crowd. Start with a common issue or concern for someone in the position, and continue to explain how your skills or experience make you uniquely qualified to address that issue.
Describe examples of your creativity, reliability or team spirit, rather than regurgitating your resume. Keep the points directly related to the position, though. Grammar and Syntax Errors in spelling, word choice or other grammar or syntax rules tells a potential employer about more than just your education and writing skills.
Read your letter aloud, preferably to someone else, to be sure that it flows smoothly and makes good sense.
Finally, make sure that the essay is visually appealing, with an easy-to-read font and size, in clear, black ink on clean, white paper.How to write good essay on job opportunities, complete tutorial on regardbouddhiste.com This article, therefore, seeks to offer a guideline on how to write a perfect essay about job opportunities.
How to start an essay about job opportunities.
Find freelance Essay Writing work on Upwork. 31 Essay Writing online jobs are available. I'm not a very good writer, and I'm looking for someone to help me write my case studies.
I'm looking for a consultant to coach me via video-chat, and assist me in writing UX Design Case studies. Attention to detail This job was posted from a mobile.
Pride Essay A good job is a big accomplishment nowadays because a lot of forces are put into it. Having a good job is the result of having a good education, which is always an honest dedication to the profession, sleepless nights and dreams about a better future.
I was going to do one of those year in review things where I wrote about all the good things of And then I remembered: I already wrote that * * * ”How does a bastard, orphan, son of a whore And a Scotsman, dropped in the middle of a Forgotten spot in. A good introduction in an argumentative essay acts like a good opening statement in a trial.
Just like a lawyer, a writer must present the issue at hand, give background, and put forth the main argument -- all in a logical, intellectual and persuasive way. Good leaders develop through a never ending process of self-study, education, training, and experience.
Definition Leadership is a process by which a person influences others to accomplish an objective and directs the organization in a way that makes it more cohesive and coherent. | https://defumekyxiloli.regardbouddhiste.com/essay-good-job-which-61988wj.html |
A dark plume leapt into the sky over southern Mexico. Below, waves of hot gas and rock screamed down volcanic slopes, stripping the mountain and surrounding area of vegetation, killing any living thing in their path. It mixed with rivers to create torrents of water, mud and other material as thick as wet concrete. For days afterward the air was choked with ash—microscopic shards of glass—that sickened survivors who inhaled it. It fell like snow onto the surrounding landscape, jamming rivers to create massive floods that wreaked havoc on agriculture. It was A.D. 540, and El Chichón—a small and previously unremarkable volcano—had plunged Maya civilization into darkness and chaos.
The Maya, who thrived from A.D. 250 to 900, are widely considered the most advanced civilization in the pre-Columbian Americas. They developed a writing system, precise calendars, new mathematics and magnificent cities with pyramids that still cast their shadows today. But a major mystery remains. In 1938 an archaeologist noticed a strange gap in dated Maya monuments. For more than 100 years the Maya inexplicably halted construction projects, seemingly deserted some areas and engaged in warfare. And in the 75 years since the discovery archaeologists have failed to find an explanation—although they have come up with a lot of hypotheses. Some have speculated an earthquake or hurricane struck the area. Others think trade routes might have collapsed.
An early hint that an ancient volcanic eruption might be the culprit came far from the Maya lowlands, in Greenland and Antarctica. A volcano can send a large amount of sulfur particles rocketing into the stratosphere, where they can easily spread across the globe. Once they reach the area over the poles they fasten to snow crystals and eventually become trapped in the ice sheets below, leaving a precise record for scientists to uncover centuries later. That is how Michael Sigl, a chemist from the Paul Scherrer Institute in Switzerland, deduced that a massive eruption must have happened somewhere in the world in A.D. 540—right at the start of the mysterious Maya “dark age.” Tree ring records indicate that sunlight-reflecting sulfur particles high in the atmosphere caused the global temperature to plummet by 1.5 to 2 degrees Celsius at the same time. A volcanic eruption had clearly rocked the world. But could scientists pinpoint its location? | https://mexika.org/2017/02/13/volcanic-eruption-may-have-plunged-the-maya-into-a-dark-age-scientific-american/ |
1 - 20 of 36 Results
Date:
The guideline provides detailed instructions for companies to publicly report on progress of promoting gender equality and women’s empowerment within the most widely used reporting frameworks including corporate social responsibility (CSR) reports, sustainability reports, and environmental, social and governance (ESG) reports, in line with the women’s empowerment principles (WEPs).
Access of ethnic minority women to public administration services: Situation analysis of women from Dao and Muong ethnicities in Da Bac, Hoa Binh
Date:
The report has been written by the Institute for Social Development Studies (ISDS) and the United Nations Entity for Gender Equality and the Empowerment of Women in Viet Nam (UN Women) while Viet Nam is rushing to complete the ‘Master Plan on Socio-economic Development of Ethnic Minorities and Mountainous Areas 2021-2030’. This study also confirms that positive changes in public administration reform, such as the one-stop-shop mechanism, digital public services, and infrastructure improvements are necessary
Date:
The toolkit provides a grounding in risk control and business continuity, with particular reference to the COVID-19 pandemic response. With its step-by-step guidance, checklist, and various tools, the toolkit becomes a self-learning tool for SME leaders across the world, so that they can better address risks and build their own gender- responsive business continuity management system.
Date:
The finance maps work much like a dating site for women entrepreneurs and finance providers. First, you open the finance map for your country. Second, simply fill out your profile, filter on what you are looking for and the map will list the finance providers that best match your business.
Date:
The WE Rise Toolkit for Accelerators consists of three tools that provide actionable steps to unlock the power of gender inclusivity for your organisation and acceleration programme. This will enable entrepreneurs from all genders to benefit equally from the support you have to offer. To implement a more inclusive and innovative acceleration programme that yields business benefits for entrepreneurs and ecosystem partners, it’s advised to applying all of the three tools.
Date:
The WE Rise Toolkit for Entrepreneurs consists of four tools that provide actionable steps to unlock the power of gender inclusivity for your business. The WE Rise Toolkit is unique in the fact that it shows how gender equality means good business. You can use our four tools in an iterative manner. Once you’ve completed all four tools you can start over as to further sharpen your gender inclusive business.
Gender responsive budgeting with an aim at developing safe cities for women and girls: Ho Chi Minh City’s Initiatives In Public Passenger Transport Services Delivery
Date:
The report aims at specifically outlining the operation of gender equality principles in the State Budget Law 2015 in a specific area of public transport. It records initial results, challenges and difficulties in implementing gender responsive budgeting initiatives in public passenger transport management in Ho Chi Minh City for the period 2017 – 2020 to promote gender equality and safe cities for women and girls Ho Chi Minh City.
Review of gender-responsiveness and disability-inclusion in disaster risk reduction in Asia and the Pacific
Date:
This report includes an assessment of the extent to which progress towards the targets of the Sendai Framework has been gender-responsive and disability-inclusive.
Gender Alert on COVID-19 in Afghanistan | Issue XIII: The impact of COVID-19 on Girls, Adolescent Girls and Young Women
Date:
UN Women, UNICEF and UNFPA jointly issue this thirteenth alert to continue to highlight the gender specific impacts of COVID-19 in Afghanistan. This alert focuses on the impact of the COVID-19 pandemic on Afghanistan’s youth: girls, adolescent girls and young women.
Independent report: 25 year-implementation of the Beijing Declaration and Platform for Action in Viet Nam from perspective of the youth in Viet Nam
Date:
The independent report was developed by a group of 20 Vietnamese young people with technical and financial support from the UN Women Viet Nam Country Office.
Date:
Following years of advocacy from the women’s movement on the problem of sexual harassment and violence against women in public spaces, UN Women conducted a safe cities scoping study with diverse partners in the capital Dili, with exploratory discussions for conducting a safety audit in 3 Dili sites and the Baucau central marketplace. The Study was conducted and validated between November 2017 and July 2018. The Scoping Study report provides an overview of key findings and recommendations,...
Date:
Safety Audit seeks to identify key concerns of women’ safety and sexual violence against women and girls. The audit assessed the situation on the safety of women at selected areas in Jakarta through information gathering and data collection using different tools and methods. The research aims to help key stakeholders design program and interventions to make cities safer for women and girls.
Date:
A Regional Study of Interventions to Enhance Women and Girls’ Safety and Mobility in Public Spaces, Asia and the Pacific Region In public and private spaces, women and girls experience and fear various types of violence, ranging from harassment, to rape and femicide. Momentum is growing around the issue of women and girls’ safety in urban, public spaces. However, given that this is a relatively new field of work, published evidence of the impacts of such interventions remain.
Date:
Global comparative effort to develop and evaluate tools, policies and model approaches on prevention of and response to violence against women & girls across different settings. Forms part of comprehensive programming to achieve gender equality and women's empowerment (GEWE) through transformative change.
Date:
The Philippines Project Office (PPO) was set up in 2004 as part of the CEDAW Southeast Asia Programme, a regional programme funded by the Government of Canada covering seven countries in Southeast Asia, including the Philippines.
Date:
Women and girls fear and experience various types of sexual violence in public spaces, from unwanted sexual remarks and touching to rape and femicide. It is a universal issue.
Date:
Sexual harassment and other forms of sexual violence in public spaces are an everyday occurrence for women and girls around the world—in urban and rural areas, in developed and developing countries.
Date:
The report presents overall findings, draws comparative conclusions across the four case studies and discusses practical recommendations for integrating gender equality programming in future humanitarian interventions in ways that strengthen effectiveness and inclusiveness.
Date:
UN Women Pacific Newsletter Issue# 3
Date: | https://asiapacific.unwomen.org/en/digital-library/publications?Topic=c40de8eb9cad4058bc45bff0e148cbe6&f%5B0%5D=subject_area_publications%3A1312&f%5B1%5D=subject_area_publications%3A1807&f%5B2%5D=subject_area_publications%3A1830 |
Battleground balance in Heroes of the Storm
Over the last year I’ve been playing a lot of Blizzard’s Heroes of the Storm. Like other MOBA-style games (such as League of Legends and Dota 2), Heroes is a game with a relatively simple concept (two teams of five players, controlling single characters, attempt to destroy the opposing team’s base) disguising a surprising depth of strategy.
One of the obvious sources of strategic depth (as in other MOBA titles) is in which heroes each player selects to make up their team, each with different strengths, weaknesses, and synergies. More unique to Heroes, however, is how each battleground has a fundamentally different, and powerful, objective of its own (such as recruiting a pirate to bombard the enemy’s structures, or allowing an allied hero to transform into a gigantic plant-monster).
In my next series of posts, I’ll be diving into some of the differences in these battlegrounds, and particularly different ways of assessing how balanced they are. This is an especially interesting time to look into the game’s balance, as Blizzard has been adding new content at a rapid pace. In just over a month, they’ve added two new battlegrounds, a new game mode, and new heroes added to the roster every couple of weeks.
Just as an appetizer before my longer posts in the coming weeks (pending my completion of some data mining of Heroes replay files), I wanted to look into a complaint that a friend had about one of the new battlegrounds: Braxis Holdout. He felt that in the Quick Match game mode (where every player selects their hero before knowing who the opponent heroes are, what battleground will be played, or even which heroes their teammates selected), it was possible to be much more outmatched based on teammate/enemy hero selections than on other battlegrounds. If true, this imbalance would be especially frustrating since the factors creating it cannot be foreseen and countered.
To analyze this complaint, I obtained hero win rate statistics for each battleground from HOTS Logs with the following features:
- Games were played in the Quick Match game mode
- Games were played in the previous 7 days of Heroes of the Storm build 20.6.47133
I looked at games involving players of all skill levels, as well as only players at the Gold skill level (approximately the skill level of my friend, so games similar to what he’d experienced). For more information on how skill levels are calculated on HOTS Logs, click here. These data sets represented thousands of games.
I wanted to look at the distribution of hero win rates across each of the battlegrounds. In perfectly ideal circumstances (a perfectly balanced game), all heroes would have a win rate of right around 50%. So, when we look at how the hero win rates are actually distributed, what does it look like? First, I looked at the data from players of all skill levels, and created box plots for each battleground, with strip plots layered on top (with a bit of jitter added along the x-axis for easier visualization).
At first glance, these box plots do seem to have a fairly high level of agreement with one another. The inter-quartile ranges are all quite similar, stretching from win rates of a little over 45% to a little under 55%. There are some differences in the variability of these battlegrounds, but they don’t appear to be too drastic.
What happens if we only look at players at the Gold skill level?
Now we can see a bit more of a difference in the battlegrounds! Braxis Holdout and Towers of Doom have nearly an identical mean win rate, but the Braxis Holdout box itself is quite a bit larger, indicating that the win rates have less agreement with one another. Overall, Towers of Doom and Cursed Hollow appear to have a little bit less variability than the others, with the other four having a little more variability.
(Interestingly, the mean win rate for BoE is lower than the other battlegrounds. Presumably, this is due to Gold players on BoE performing differently against players of other skill levels, compared to the other battlegrounds. While Blizzard tries to match players of a similar skill level, players of differing skill levels do still get matched together at times.)
If we look at a density plot of this same data, we get another look at what’s happening.
Again, Towers of Doom and Cursed Hollow appear to be quite nicely distributed, with most win rates around 50% and dropping off fairly quickly on either side of that mark. We can see that Braxis Holdout has relatively less agreement around the 50% win rate, with a wider distribution of win rates overall.
So, does Braxis Holdout appear to be more unbalanced than the other battlegrounds? Looking at the Gold skill level, there does seem to be a greater portion of heroes performing poorly, especially compared to Towers of Doom and Cursed Hollow. However, part of this could be an artifact of Braxis Holdout being a new battleground, and the metagame not having quite settled yet.
I’ll be adding more posts on battleground and game balancing in Heroes of the Storm over the coming weeks. | https://tommyhall.ca/battleground-balance-in-heroes-of-the-storm/ |
Know, prevent, detect, respond, recover. This aspirational model of cyber security is as ubiquitous in our industry as the colorful wheels used to depict the concept. Like similar mnemonic aphorisms from other disciplines – stop, drop, roll, or work quickly, change speeds, throw strikes – this familiar view of the top-level goal of cyber security remains basically unchallenged. It is a given.
The problem is that the model represents a terrible aspiration view of cyber security. Obviously, it is an accurate observational view of cyber security. We all seem to do these steps to some degree, and the security advice you get from consultants nowadays involves which direction to slosh your emphasis. (By the way, the current fad is to emphasize the latter steps, which just seems nuts to me. But, whatever.)
My view is that the thinking behind this model helped lead to attacks on Target, Home Depot, Sony, Yahoo, OPM, Equifax, Deloitte, and on and on. Think about it: Aspiring to any model where three fourths of the steps presume that an attack has already occurred, is like deciding in advance to punt on third down. To that end, I would propose a much different aspirational model – one targeting a more successful outcome. Here it is:
Explode, offload, reload.
These three terms, even with no explanation, are much more likely to produce some pause to your malicious adversary than that dumb wheel on your PowerPoint deck. When you do read the explanation of the steps below, I hope you will agree that they comprise a more viable cyber defense than the sleep-inducing alternative they replace. The challenge is that they require a change of perspective – and that may not be easy.
First, the process of exploding your perimeter-defined infrastructure into smaller distributed workloads will produce predictable views: Excitement for cyber security engineers, and horror for C-suite executives. (Sadly, most compliance initiatives today generate exactly the opposite range of emotions.) The reality, however, is that perimeters do not work, so you must get rid of them. Explode your network. Period.
Here is a harsh, but accurate analogy: If a terrorist bomber targets a building with a truck-full of explosives, then so long as a drive path exists to the facility, a bad outcome will occur. But if the security team has already “exploded” the building by dismantling it into its composite bricks (workloads), then the image comes to mind of a confused truck bomber parked outside an empty lot, wondering where the target went.
Second, the process of offloading smaller distributed workloads into virtualized cloud infrastructure produces similarly disparate emotions: Eagerness for security engineers, and hesitancy for the C-suite. Such executive hesitancy is more prominent when the offloading involves the use of public cloud, but this may be the only viable economic option for companies not rich enough to build their own software defined data centers.
Off-loading distributed workloads to virtual infrastructure reduces cost (hardware replaced with software) and maximizes flexibility. Adjustment of virtual computing and networking to support these offloaded workloads makes this step economically feasible in modern infrastructure. The instincts of traditional IT managers involve deploying hardware and then leaving it alone. This will not stop capable hackers.
Finally, the process of reloading cyber security involves the careful selection and deployment of modern protection technology into your newly virtualized, distributed architecture. By shifting workloads to an alternate environment, you create a new greenfield target for virtualized security technology solutions. Such once-in-a-lifetime opportunities are not to be missed, so this must be attended to properly.
Anyone reading this note knows that no shortage exists of commercial cyber security technologies. Adaptive authentication, machine learning detection, cloud visibility tools, on-demand SDN security, and on and on, represent amazing new software defenses that will reduce cyber risk. Reloading these new capabilities into your new distributed architecture will make things more challenging for your adversary.
Look, I acknowledge that many of the readers of my column have PowerPoint decks with that colorful wheel on the first chart they use with customers every day. I’m also aware that NIST bases much of its work on the know, prevent, detect, respond, recover model. (I’m even aware that Gartner has replaced know with predict, dropped recover, and charges $195 for the report that explains the change. Ugh.)
But my advice is offered here nevertheless. We are losing the cyber war to nation-state and criminal groups, so perpetuating existing approaches based on familiar models is crazy. Why not rethink whether your organization (or product) (or service) would benefit significantly by losing the colorful wheel, and replacing it with this new approach: Explode, offload, reload. | https://www.tag-cyber.com/advisory/articles/lose-the-security-wheel |
At Rush Common, we view History as the process of enquiry, involving the search, examining and recording of evidence and the interpreting and weighing of varied evidence. The children develop skills of critical thinking and imaginative reconstruction; we look at how to fill the gaps. Across the whole school, our History curriculum adheres to clear objectives which can often be linked in terms of subject knowledge, to English and other areas of learning. Topics include investigating the effect of World War II on Britain and its people; Roman invasion and its legacy; Ancient Egypt; and the great impact of the Victorian era. Children develop a deep knowledge and empathy of these different time periods. We use Oxfordshire Museum Boxes to handle and explore artefacts, and we use educational visits to enrich our understanding such as the Steam Museum and Hooke Court.
The aim of our Geography curriculum at Rush Common is to give our pupils knowledge and understanding of their local environment and the world around them. Children learn that Geography is all about the Earth, its land, its people and how we interact with these. It is to show our pupils the importance of being a valuable and thoughtful citizen and to consider the greater scope of our impact on our world. By the end of Key Stage 2, pupils will have in-depth learning and experience of locational knowledge, place knowledge, human and physical geography and geographical skills and fieldwork.
We value the development of historical and geographical skills as children progress. By developing children’s learning as critical thinkers, effective communicators and empathetic learners, children progress through our school gradually building on higher order thinking skills while also building their general knowledge in these subjects. | https://rushcommonschool.org/information/curriculum-information/curriculum-areas/history-geography/ |
I summarize and evaluate the aims of the collection From Individual to Collective Intentionality: New Essays edited by Sara Rachel Chant, Frank Hindriks and Gerhard Preyer in the context of the on-going debate about collective intentionality and group agency. I then consider the individual essays contained therein, both from the perspective of how they advance the collection’s goals and the coherence of their individual arguments.
This volume presents a systematic philosophical theory related to the collectivism-versus-individualism debate in the social sciences. A weak version of collectivism (the "we-mode" approach) that depends on group-based collective intentionality is developed in the book. The we-mode approach is used to account for collective intention and action, cooperation, group attitudes, social practices and institutions as well as group solidarity.
This book develops a novel approach to distributed cognition and collective intentionality. It is argued that collective mentality should be only be posited where specialized subroutines are integrated in a way that yields skillful, goal-directed behavior that is sensitive to concerns that are relevant to a group as such.
This paper offers a critical discussion of Searle's account of collective intentionality. It argues Bratman's alternative account avoids some of the shortcomings of Searle's account, over-intellectualizes collective intentionality and imposes an excessive cognitive burden on participating agents.Tthe capacities needed to sustain collective intentionality are examined in an attempt to show that we can preserve the gist of Bratman's account in a cognitively more parsimonious way.
In this paper we discuss the problem of the neural conditions of shared attitudes and intentions: which neural mechanisms underlie “we-mode” processes or serve as precursors to such processes? Neurophysiological and neuropsychological evidence suggests that in different areas of the brain neural representations are shared by several individuals. This situation, on the one hand, creates a potential problem for correct attribution. On the other hand, it may provide the conditions for shared attitudes and intentions. | https://philpapers.org/s/Collective%20intentionality |
Academic Writing Tips: How To Edit A Research Paper
After all of the stress of researching and writing a paper, students still have to worry about the editing process. Even the best ideas will be obscured by tangled prose. To get the best grade on a paper, students must learn how to adequately edit and proofread what they have written.
Get Distance From the Project
If students have time, the best thing that they can do is get some distance from their writing. Over the course of days and weeks, they have become familiar with the topic. This familiarity may cause the student to skip over errors that they would have normally seen. To truly edit the document, students should put it aside for a few hours or days. Instead of editing straight away, they should go for a run and let their mind focus on something else.
Change How the Document Looks
To see the paper with fresh eyes, students need to make it appear unfamiliar. Short of having their memory erased, the best way to do this is to change the font. By switching the color, size or style of font, students make the document look completely different. This will allows them to see their writing anew and proofread it better.
Print It Out
While some people like editing on a computer, this technique does not work for everyone. If the computer is the issue, students should print out their paper and grab a red pen. Each person works best in a certain environment, so students should go somewhere that they can focus at. Once there, they can turn on some noise canceling headphones or music and start editing.
Structure and Content
The first thing students should consider is how well the argument is structured. This document should have a clear introduction and conclusion. The thesis of the paper should be supported by every paragraph. If a section of the file is irrelevant to the thesis, it should be erased. Students should edit their argument carefully to make sure that it has a logical sequence. In addition, they should make sure that the paper is written according to the requirements of the writing prompt.
Proofreading the Document
Once the general order and content of the paper is corrected, students are ready to proofread. They should start by reading the paper out loud. This will help them to spot grammar or phrasing issues. It will also force their mind to focus entirely on each word. By doing this, they can spot spelling errors and typos that they would have normally missed. | https://www.acornteaching.com/helpful-hints-on-editing-a-term-paper-for-beginners |
Exosomes are nanoscale membrane-bound extracellular vesicles secreted by most eukaryotic cells in the body that facilitates intercellular communication. Exosomes carry several signaling biomolecules, including miRNA, proteins, enzymes, cell surface receptors, growth factors, cytokines and lipids that can modulate target cell biology and function. Due to these capabilities, exosomes have emerged as novel intercellular signaling mediators in both homeostasis and pathophysiological conditions. Recent studies document that exosomes (both circulating or released from heart tissue) have been actively involved in cardiac remodeling in response to stressors. Also, exosomes released from progenitor/stem cells have protective effects in heart diseases and shown to have regenerative potential in the heart. In this review we discuss- the critical role played by circulating exosomes released from various tissues and from cells within the heart in cardiac health; the gap in knowledge that needs to be addressed to promote future research; and exploitation of recent advances in exosome engineering to develop novel therapy. | http://dgivan.dental.uab.edu/display/pub2304735 |
In this course we will explore acrylics and watercolors. Students will learn how to use their paints, practicing various techniques. They will also look at different works of art by different artists and we will discuss their subject and style. Throughout the course students students will be exposed to relavent vocabulary, encouraged to have fun, and make their work unique.
Course Overview
This “Painting for Beginners” video course covers what students need to feel confident and successful as an artist.
The course has an emphasis on specific painting skills while allowing students the ability to make creative choices.
Course Includes:
• 2 SECTIONS
• 42 SUPPORTING DOCUMENTS
• 40 VIDEO-LESSONS
• 4 ONLINE QUIZZES
Course Goals:
Upon course completion, students will be able to create their paintings using acrylics and watercolor effectively.
Target Audience
This video-course is primarily intended for students in 4th grade to 8th. It could be appropriate from some older students who have little to no experience painting.
Course breakdown
Section 1: Acrylic Painting
Section 2: Watercolor Painting
Course Objectives
Students will explore techniques for acrylic paints and watercolor paints to get different desired effects.
Students will be introduced to and practice multiple subjects for art making.
While creating students will gain knowledge of vocabulary, different artists, and styles of art.
Students will create finished works of art they can be proud of. | https://www.lernsys.com/en/painting-for-beginners-grades-4-8 |
insulating.
This ensures that all customers know they are being treated equally and fairly.
The price per square foot varies depending on the type of work I am doing.
Attics, Walls, Floors or New Construction
each have their own price per square foot.
Based upon the square footage and answers to a few other questions, I can usually tell you exactly how much your job will cost right over the phone. If you measure the length and multiply that by the width of the area you want insulated, this will give you the square footage of the area. | https://www.eagleinsulation.com/pricing |
The Handbook of Understanding and Measuring Intelligence provides an overview of recent studies on intelligence to help readers develop a sound understanding of results and perspectives in intelligence research. In this volume, editors Oliver Wilhelm and Randall W. Engle bring together a group of respected experts from two fields of intelligence research, cognition and methods, to summarize, review, and evaluate research in their areas of expertise. The chapters in this book present state-of-the-art examinations of a particular domain of intelligence research and highlight important methodological considerations, theoretical claims, and pervasive problems in the field.
Chapter 14: Modeling Structures of Intelligence
Modeling Structures of Intelligence
Measuring intelligence requires at least partial prior knowledge and understanding of the subject matter. If there is no reasonably clear concept of the attribute to be measured and how it relates to observable outcomes, measurement instruments cannot sensibly be designed, evaluated, and selected. The application of a measurement instrument to a sample of participants and analyzing the results is, however, informative for theorizing about intelligence, insofar as the analyses can serve to evaluate certain theoretical propositions. If some propositions turn out not to be tenable in light of empirical evidence, we might be inclined to revise our understanding of intelligence. Such mutual influence processes of theory and measurement can easily be observed in the history of intelligence research ...
- Loading... | https://sk.sagepub.com/reference/handbook-of-understanding-and-measuring-intelligence/n14.xml |
The Xylophone is a percussion instrument consisting of a series of wooden bars graduated in length to produce the musical scale, supported on belts of straw or felt, and played by striking with two small wooden hammers. Many music educators use xylophones as a classroom resource to assist children’s musical development.
The modern Xylophone was invented in the year 1886 by Albert Roth and originate from southeast Asia.
Rocked with Star!
Let’s enjoy the sound of this instrument through this wonderful performance by Lionel Hampton.
Learn more about Jean-Lionel Hampton
Lionel Hampton was born in 1908 in Louisville, Kentucky. During the 1920s, while still a teenager, Hampton took xylophone lessons from Jimmy Bertrand and began to play the drums. Hampton worked with jazz musicians from Teddy Wilson, Benny Goodman, and Buddy Rich, to Charlie Parker, Charles Mingus, and Quincy Jones. In 1992, he was inducted into the Alabama Jazz Hall of Fame, and he was awarded the National Medal of Arts in 1996. | https://artsphere.org/xylophone/ |
Mediation is about choice: Choosing to do the hard work necessary to forge a compromise, choosing to reject a settlement offer and face the risks and costs of trial or choosing to buy peace even though the price is higher than expected. In all cases, Patty strives to help parties find solutions to the problems that complex commercial litigation and sensitive employment matters present.
A mediation may not be successful during the formal session, so Patty continues to work with the parties so long as there is a possibility of a settlement. At minimum, she tries to narrow the scope of the issues in dispute.
Full- and half-day mediations are offered, but half-day mediations are discouraged except in the simplest of disputes. For scheduling, please contact Patty directly at [email protected]. If she is unable to respond quickly, please contact her assistant, Linda Snavely, at 214 377-7879. | https://nolanfirm.com/expertise/mediation/ |
This here campaign I'm about to unfold is going to feature 2-3 players, 2 of which definitely want to get spellcasting characters and the third is very likely to go down the same path.
Q: How do I negate the obvious complications caused by lack of mechanical balance within the party? For example, the party might find it difficult to engage numerous melee-oriented enemies. Stealth/melee/etc bases are, IMHO, tackled by their respective classes more efficiently.
Here are some suggestions I have:
- I could add non-spellcasting NPCs to the party. This will probably happen anyway, since it's a great story-driving element and many encounters are just not easily suited for such small parties.
- I could enhance the player characters' abilities by using custom spells, scrolls and various equipment. Occasionally, someone would be able to execute an action usually avoided by wizards and sorcerers, like using their stealth or fighting their fight in a gory melee. That would change the basic idea behind classes and shift my characters towards the all-around competent adventurers capable of using magic. My players aren't experienced with roleplaying games at all, so it shouldn't pose any extra difficulties due to re-learning.
- I could try and adjust the encounters in a way that would enable more fun and efficient hell-raising. For example, various objects like magic levers could be interacted with, leading to curious and rather destructive results; some monsters could be more vulnerable to a particular kind of magic (are goblins afraid of fire?) and be easier to deal with.
- I could encourage my players to be creative about their play and seek more unexpected but practical ways of doing things. After all, running around casting spells alone doesn't make a wizard - you'd better have something else stored in your head. | https://rpg.stackexchange.com/questions/76799/how-do-i-balance-an-all-spellcaster-party/76843#76843 |
The ESG reporting of EU public companies. Does the companys capitalization matter?
Introduction
Sustainable finance is not the same as green finance understood as financing a low-carbon economy. It is a broader concept that includes elements related to the functioning of financial markets as such and their role in sustainable development. The determinants of the activities of investors and enterprises are part of sustainable finance on the financial market and, more specifically, the consequences of long-term investment horizons for the functioning of a sustainable economy. Thus, sustainable finance focuses on the importance of long-term investments that include environmental, social, and governance factors (ESG).
The European Union requires large companies to disclose information on the way they operate and manage social and environmental challenges. Currently, large public-interest companies (with more than 500 employees) have to publish information related to environmental, social, and governance matters (ESG). In April 2021 the EU adopted a proposal for a Corporate Sustainability Reporting Directive, which introduces more detailed reporting requirements for all large companies and all companies listed on regulated markets.
Keywords
sustainable finance, ESG, ESG reporting, market capitalization, EU public companies
Research question
The aim of the study is to examine the ESG disclosure by public companies domiciled in EU member states. The authors want to answer whether the ESG reporting by public companies that focus mainly on achieving sustainable finance goals is connected with their market capitalization. One can assume that the largest stock companies are subject to many formal and legal requirements, as well as the information policy of ESG components. The research hypothesis assumes that the quality of ESG reports depends on the company’s market capitalization and the ESG scores have a positive and strong effect on the market value of companies measured by their capitalization.
Main method
The research includes over 15,000 companies listed on 27 European stock exchanges, broken down into so-called “old” EU member states (EU-14) and “new” states (EU-13). The data are obtained from the Refinitiv Eikon database and the period covers years from 2002 to 2019. The aim of the research is to determine: (i) the share of public companies reporting ESG in the total number of public companies; (ii) completeness of their ESG index; (iii) the relationship between the ESG disclosure by public companies and their market capitalization.
According to Ohlson’s (1995) model, which is a strong theoretical framework for evaluating market value based on accounting basic variables (book value and profit), and other types of information that may be relevant in assessing company value, we estimate the following regression model:
where: MC is the market capitalization (the natural logarithm), ESG – the ESG index, BV – the book value of equity (the natural logarithm), ROA – return on assets, LEV – the financial leverage (the ratio of the book value of total debt to the book value of equity), and COUNTRY – the dummy variable that takes a value of 1 for German and 0 for other countries.
All variables are measured at the end of the fiscal year. To mitigate the potential effects of outliers, we winsorize the data at the 1ts and 99th percentile levels. Additionally, following an existing approach, we exclude the cases of negative book values of equity. Our final sample consists of an unbalanced panel of 50,173 firm-year observations representing 4,521 public companies listed on 13 European markets. We use ordinary least squares (OLS) specifications.
Table 1- ESG-index reporting versus financial reporting and market capitalization by companies on the EU markets.
Main results
A thorough analysis of the ESG disclosures indicates that currently there is no proper practice in this area on the European markets. Among the analysed companies, financial reporting did not go hand in hand with reporting on ESG score and its components. Although there is a diverse approach to disclosing ESG information on the EU-14 markets, generally, three important conclusions can be drawn from the study.
- Firstly, only 50% of companies listed on EU-14 markets and scarcely 5% of companies from EU-13 markets reported ESG scores in any of the analysed years, 32% and 3% for at least ten years, respectively.
- Secondly, the market penetration of the ESG-index (the share of companies in total market capitalization) in EU-14 markets was 87%. Importantly, it turned out that in EU-13 markets, this share was about 12%.
- Thirdly, there is a positive relationship between the quality of ESG reports and the company’s market capitalization, and ESG scores have a positive and statistically significant effect on the market value of companies.
Table 2- Pearson correlation coefficients between the variables.
Table 3- The impact of ESG on market capitalization (MC).
***, ** Denote significance at the 1%, and 5%, respectively
Main conclusion
Our research was inspired by the changes taking place in the global economy today related to the widespread implementation of the principles of sustainable development. We found that the company’s ESG performance positively affects its market capitalization. Therefore, it can be assumed that in the European Union ESG reporting by public companies is of significant importance for investors.
We are aware of the limitations that may have influenced the results of our research. ESG reporting by public companies has a relatively short history and after conducting our preliminary analysis, we had to limit the research period to 2002–2019. Considering the share of capitalisation of companies that prepare ESG reports in the total capitalisation of the individual exchanges, there is a clear dominance of large, listed companies, confirming the hypothesis that ESG reports are prepared mainly by large entities. The obtained results allow us to formulate conclusion that investors expect companies to present ESG reports and ESG reporting companies tend to be valued higher by the market. Our research may be a starting point for further studies carried out in the coming years, as the number of companies reporting ESG is constantly growing.
References
- Ali, W., J. G. Frynas, and Z. Mahmood. 2017. “Determinants of corporate social responsibility (CSR) disclosure in developed and developing countries: A literature review.” Corporate Social Responsibility and Environmental Management 24 (4): 273–294. doi: https://doi.org/10.1002/csr.1410.
- Amariei, C. 2019. “Sustainability in practice: ratings, research and proprietary models.” ECMI Policy Brief No. 26. European Capital Markets Institute, Brussels. Accessed 11 June 2021. https://www.ecmi.eu/sites/default/files/ecmi_pb_no_26_cosmina_amariei.pdf.
- Bannier, Ch. E., Y. Bofinger, and B. Rock. 2019. “Doing safe by doing good: ESG investing and corporate social responsibility in the U.S. and Europe.” CFS Working Paper Series No. 621, Goethe University Frankfurt, Center for Financial Studies (CFS), Frankfurt a. M. Accessed 11 June 2021. http://publikationen.ub.uni-frankfurt.de/files/48058/SSRN-id3387073.pdf.
- Boffo, R., and R. Patalano. 2020. “ESG investing: Practices, Progress and Challenges.” OECD Paris. Accessed 11 June 2021. www.oecd.org/finance/ESG-Investing-Practices-Progress-and-Challenges.pdf.
- ESMA. 2020. Report on Trends, Risks and Vulnerabilities No. 1, European Securities and Markets Authority, Risk Analysis and Economics Department. Accessed 11 June 2021. https://www.esma.europa.eu/sites/default/files/library/esma_50-165-1040_trv_no.1_2020.pdf.
- Giese, G., L-E. Lee, D. Melas, Z. Nagy, and L. Nishikawa. 2019. “Foundations of ESG Investing: How ESG Affects Equity Valuation, Risk, and Performance.” The Journal of Portfolio Management 45 (5): 69–83. doi: https://doi.org/10.3905/jpm.2019.45.5.069.
- Janicka, M., A. Pieloch-Babiarz, and A. Sajnóg. 2020. “Does Short-Termism Influence the Market Value of Companies? Evidence from EU Countries.” Journal of Risk and Financial Management 13 (11): 1–22. doi: https://doi.org/10.3390/jrfm13110272.
- Ting, I. W. K., N. A. Azizan, R. K. Bhaskaran, and S. K. Sukumaran. 2020. “Corporate Social Performance and Firm Performance: Comparative Study among Developed and Emerging Market Firms.” Sustainability 12 (1): 26. doi: https://doi.org/10.3390/su12010026. | https://balticuniv.uu.se/activities/bup-symposium-2021/poster-session/janicka/ |
Warning:
more...
Fetching bibliography...
Generate a file for use with external citation management software.
This study investigates the oxidation of pharmaceuticals during conventional ozonation and advanced oxidation processes (AOPs) applied in drinking water treatment. In a first step, second-order rate constants for the reactions of selected pharmaceuticals with ozone (k(O3)) and OH radicals (k(OH)) were determined in bench-scale experiments (in brackets apparent k(O3) at pH 7 and T = 20 degrees C): bezafibrate (590 +/- 50 M(-1) s(-1)), carbamazepine (approximately 3 x 10(5) M(-1) s(-1)), diazepam (0.75 +/- 0.15 M(-1) s(-1)), diclofenac (approximately 1 x 10(6) M(-1) s(-1)), 17alpha-ethinylestradiol (approximately 3 x 10(6) M(-1) s(-1)), ibuprofen (9.6 +/- 1.0 M(-1) s(-1)), iopromide (<0.8 M(-1) s(-1)), sulfamethoxazole (approximately 2.5 x 10(6) M(-1) s(-1)), and roxithromycin (approximately 7 x 10(4) M(-1) s(-1)). For five of the pharmaceuticals the apparent k(O3) at pH 7 was >5 x 10(4) M(-1) s(-1), indicating that these compounds are completely transformed during ozonation processes. Values for k(OH) ranged from 3.3 to 9.8 x 10(9) M(-1) s(-1). Compared to other important micropollutants such as MTBE and atrazine, the selected pharmaceuticals reacted about two to three times faster with OH radicals. In the second part of the study, oxidation kinetics of the selected pharmaceuticals were investigated in ozonation experiments performed in different natural waters. It could be shown that the second-order rate constants determined in pure aqueous solution could be applied to predict the behavior of pharmaceuticals dissolved in natural waters. Overall it can be concluded that ozonation and AOPs are promising processes for an efficient removal of pharmaceuticals in drinking waters.
National Center for
Biotechnology Information, | https://www.ncbi.nlm.nih.gov/pubmed/12666935 |
Surface enhanced Raman scattering of p-aminothiophenol self-assembled monolayers in sandwich structure fabricated on glass.
A sandwich structure consisting of Ag nanoparticles (NPs), p-aminothiophenol (p-ATP) self-assembled monolayers (SAMs), and Ag NPs was fabricated on glass and characterized by surface enhanced Raman scattering (SERS). The SERS spectrum of a p-ATP SAM in such sandwich structure shows that the electromagnetic enhancement is greater than that on Ag NPs assembled on glass. The obtained enhancement factors (EF) on solely one sandwich structure were as large as 6.0 +/- 0.62 x 10(4) and 1.2 +/- 0.62 x 10(7) for the 7a and 3b(b(2)) vibration modes, respectively. The large enhancement effect of p-ATP SAMs is likely a result of plasmon coupling between the two layers of Ag NP (localized surface plasmon) resonance, creating a large localized electromagnetic field at their interface, where p-ATP resides. Moreover, the fact that large EF values (approximately 1.9 +/- 0.7 x 10(4) and 9.4 +/- 0.7 x 10(6) for the 7a- and b(2)-type vibration modes, respectively) were also obtained on a single sandwich structure of Au NPsp-ATP SAMsAg NPs in the visible demonstrates that the electromagnetic coupling does not exist only between Ag NPs but also between Au and Ag NPs. The lower EF values on Au-to-Ag NPs compared to those on Ag-to-Ag NPs demonstrate that the Au-to-Ag coupling must be less effective than the Ag-to-Ag coupling for the induction of SERS in the visible.
| |
I've heard two different philosophies about building a successful company. One school of thought glorifies the idea of "disruption." These are the Ubers of the world who set out to redefine or create entire industries.
Then there are the founders who believe you should watch what works for others and simply recreate it in order to achieve similar success. This approach can work when taking a model from niche market to niche market or from city to city.
Both models have their champions. And both sets of champions have plenty of bad things to say about the other approach. Personally, I like what I call the "Paul Singh approach."
In a recent podcast, Paul talked about the early days of 500 Startups, taking on giant investing firm Andreessen Horowitz. (Click here to hear more.) While Andreessen Horowitz had access to deal flow and didn't have to work hard at finding investments, 500 Startups was young, unproven, and relatively smaller.
So, Paul and Dave McClure didn't play the game the same way their larger competitors did. They chose to travel the world, spending most of the year in other cities, speaking and meeting startups. They built their portfolio by going to the companies--the exact opposite strategy most investment firms were using.
This is where "disruption" can play a big role. 500 Startups didn't invent an industry; but they did re-imagine what an industry could look like and how to get business done. And, as we all know, they were successful with it. If they had chosen to play the same game as larger, more established firms, they probably would've lost.
We often hear stories of founders who built successful companies in industries they weren't familiar with. They attribute their success to "not knowing any better."
But, that's not as common as we like to think it is. In the case off 500 Startups, if David and Paul didn't know much about investing before they started, they learned quickly. After all, it's vital to understand your industry. More common in real life is the entrepreneur who spent much of her career in a certain industry, saw a problem there, and figured out a way to solve it. Profitably.
If you don't know the rules of the game you're playing, you'll never be able to judge which ones to break and which ones to keep. 99% these are the most important decisions you'll make as you start up. | https://www.devdigital.com/blog/detail/business-101-dont-tackle-an-elephant-head-on |
Three Ways to Express Gratitude and Appreciation
At this time of year our thoughts drift to Thanksgiving and the people and the things in our lives that we're thankful for.
At least that's how it is supposed to go, but sometimes, when times are tough or extra busy it can be hard to remember that even if there are challenges, we have many things to be grateful for. Expressing gratitude one of the surest ways to not only feel more encouraged, but it also helps in attracting more positive things and people into our lives.
On a personal note, I must admit that I have a bit of a perfectionist streak and when I combine that with my critical thinking skill it can be easy for me to first focus on what's not right and how to fix or improve something. Although my problem solving skills can be a powerful ally and tremendously helpful in my coaching business, it's easy for me to dismiss or simply overlook what is good or right as I dig into fixing mode. I've found it helpful to stop and really consider all I have to be thankful for and appreciate.
I'm not sure who said this first but I've heard it enough to believe it... "if we want more in our life - we need to first appreciate what we have."
So here are a few simple ways to express gratitude and appreciation:
1. Tell the people in your life that you appreciate them
This the easiest one for most people, so let's start here. Look around and tell the people in your life, whether friends, family, or people you come in contact with on a regular or not so regular basis that you appreciate what they do.
Whether it's the friendly check-out clerk at the grocery store, waitress or the newspaper carrier, thank them for doing such a great job.
How about your spouse, partner, parent, child or friends? Stop and express appreciation to your loved ones just for being in your life!
2. Be grateful in your business life
Extend that sense of gratitude to your business life. Whether it's your employees, your boss, your coworkers, or your clients, let them know how much you appreciate them.
As well, be sure to express appreciation to the people who provide services for you like accounting, web or graphic design etc. Most people feel underappreciated, and if you tell them how much you value them, they'll appreciate you right back.
And don't forget about former clients. Thanksgiving is a perfect time to send them a thank you note for having been your client and how much you appreciated their business.
Resist the urge to include a call for action or offer. If they have need for your services, they'll know where to find you. And they may well think of you when they could next use your help, but don't make that the reason you contacted them.
3. Create a gratitude list or journal
Once you have expressed gratitude for people in your life, it's time for the next step: The gratitude list or journal.
Create a list of things in your life that you are thankful for. Don't feel that they have to be big things. The fact that you can open your eyes in the morning, get out of bed, have a hot shower and look at yourself in the bathroom mirror is probably something you take for granted. Why not realize that this is not a given, and express your gratitude.
The coffee you have for breakfast is another item that could go on your list. Imagine what it took to get that coffee to you, perfectly roasted, and ready to wake up your taste buds.
One of my favorites to be thankful for is hitting a green traffic light or finding a parking spot at the door, especially when I'm late and rushing to a networking meeting.
Go ahead and continue this line of reasoning with everything you touch, consume, or enjoy in other ways. You could be busy for days. And you should be.
But don't get carried away. Keep it simple, start small. Find 10 things today, then another 10 things tomorrow, and repeat until you get into the habit to see things that make you feel grateful every day.
As I work on my "Make Meaningful Connections" challenge throughout October, I find that expressing gratitude is a powerful way to connect and keep in touch with people.
And as you give thanks to the people in your personal as well as your professional life, and nurture that habit of keeping a gratitude journal, you'll find that you'll have more and more things to feel grateful for.
Don't be surprised if you start having nice things show up, like an unexpected new client, a referral, people attracted to you and wanting to help or connect. That's one of the most rewarding things about expressing gratitude and appreciation - it comes back to you with dividends.
Happy Canadian Thanksgiving everyone! Eat Turkey....
- Categories: | http://sueclement.com/blog/gratitude |
One might say that every dictatorship is unique. After all, the reasons that give birth to one are different in each country. However, and as paradoxical as it sounds, most of the time the opposite is also true. Every dictatorship is practically the same as all the others. Taking control of the state apparatus is usually done under the pretense of preventing an undesired social consequence.
The Chilean case is both unique and at the same time just another dictatorship. Like many other cases in Latin America, the Chilean dictatorship’s history is filled with repression, reactionary politics, and abuses of power. What many people don’t know is that it is unique in a particular way: it was the world’s first neoliberal experiment.
Machuca is a one-of-a-kind film that portrays this. In my opinion, this movie is a masterpiece. Rather than focusing exclusively on the detailed political aspects that took Augusto Pinochet to power, Machuca focuses on the lives of citizens, in particular, the lives of two kids from very different social backgrounds.
Inequality
It is hard to define Latin America. It is a very diverse region with many different cultures that coexist with one another. Matters get even more complicated when it comes to social and economic aspects. The region is filled with some of the worse differences in terms of class.
In the region, the rich are very rich, and the poor are, well, very poor. No wonder Latin American countries have seen some of the most violent political movements in name of social justice. And just like there are many who claim equality, there are others who want everything to stay the same.
It might be an oversimplification, but the region has constantly been moving from one conflict to another for the sake of social equality, or the lack of it. Usually, these movements have occurred in the form of a leftist group that wants to overthrow the incumbent powers, and at the same time the status quo holders who want to prevent the socialist revolution from occurring. It is the Hegelian dialectic of the master and the slave happening over and over again.
A Socialist Revolution That Never Was
This back and forth movement seems nowhere near to stopping. The region, even after decades of conflict, still seems to be stuck in an eternal conflict of left versus right, socialism versus conservatism. However, during the 70s a major shift occurred.
During the years of Chilean president Salvador Allende, Chile experienced a major shift. President Allende brought some of the world’s most important experts to make his vision of a socialist economy a reality. Many people don’t know that cybernetics and operations research expert Stafford Beer was involved in Allende’s experiment. This sounds like a minor thing, but it was, in a way, a major event.
The team assembled by Allende planned to centralize the economy under the hands of the Chilean state using the best available technology at the time. This, however, proved to be a major challenge for various reasons. It was a very ambitious project, and the circumstances were not favorable.
In short, the country underwent a socialist experiment that wanted to bring major aspects of the economy under the State’s control but failed to do so. The experiment consisted of a socialist control system that wanted to strengthen the welfare state but met many obstacles along the way. Even to this day, the results are a subject of debate.
To some, the country was heading to a disaster; that is why Allende’s socialist experiment came to an abrupt end the day that General Augusto Pinochet took control through a military coup. To others, the difficulties encountered by Allende and his team were the result of conservatives and the traditional political class messing up with the government’s plan.
Whatever the truth is, the result was a violent takeover on behalf of the traditional ruling class. For almost two decades, the country was controlled by the military, suppressing personal freedoms to many, exalting the role of private capital, benefiting what would become an experiment to counter the one started by Allende: neoliberalism.
The World’s First Neoliberal Experiment
Today the word neoliberalism is everywhere. Yet, it is known to few that the term was popularized during the years of Pinochet. What exactly is neoliberalism is a subject of debate. It is an economic system, but at the same time, it is more than that. It is a political organization, but it doesn’t stop there.
At the risk of defining it poorly, neoliberalism is a socio-economic and political system that prioritizes the elimination of economic barriers and the strengthening of individual liberties over everything else. This model implicitly acknowledges the importance of financial capital, as well as an individual's personal choice, and a reduced presence of the state. Nonetheless, it is filled with contradictions, although this last seems to be a matter of debate between contradictors and supporters of neoliberalism.
Machuca: The Days Before Neoliberalism
So, what does neoliberalism have to do with Machuca? The movie doesn’t even mention it, but there’s a thing or two that Machuca can tell us about neoliberalism.
Machuca takes place in a period of time before the military coup. The majority of the events portrayed in the movie are not even related directly to the coup, but they help grasp the look and feel of what the country was like before it took place. In other words, the movie is a sort of exercise that helps imagine the mood that led to this decisive event that not only shaped Chile’s recent history but also that of the entire world.
Pinochet made history, and so did the neoliberal model that he helped promote. The Chicago Boys and the neoliberal school of economics supported by Milton Fridman and other economists from the University of Chicago have touched the lives of everyone in the world, even if they are not aware of it.
Today the world operates under neoliberal principles, and it seems almost impossible to think of a different alternative. As Margaret Thatcher stated, there is no alternative, or so it seems. Yet, for a brief period of time, there were other possibilities on the horizon.
Whether Allende’s alternative was a better one is not for me to say. After all, it is impossible to think in terms of counterfactuals. Machuca does not help us understand what could have been, but it does give a glimpse as to why we came to where we are.
Search for previous posts
Subscribe to our newsletter
Get FilmScout delivered straight to your inbox. One email per week. All the latest posts. No spam, ever. | https://filmscout.app/blog/machuca |
According to the Bureau of Labor Statistics, clinical psychologists in the United States earn as much as $67,650 annually, based on the 2014 – 2015 BLS Occupational Outlook Handbook. However, actual salaries tend to vary depending on several factors such as place of work, years of experience, and specialization.
Clinical Psychologist Salary
The BLS also reported that the upper 10 percent received an annual income of $110,880, and the salaries of clinical psychologists increase constantly each year because of the high demands for this job. As a result, this profession proves to be a profitable career that can help individuals gain financial rewards and opportunities to work closely with people who encounter issues affecting their health and performance.
Pay Scale in Different Parts of the United States
Clinical psychologists may find in employment in clinics, schools, government and various industries. They may also choose to work part-time or full-time, particularly those in private practice. As for psychologists employed in healthcare facilities such as nursing homes and hospitals, they often have weekend or evening shifts to cater to their clients’ demands.
The BLS have indicated several top-paying states in the US including the following:
Rhode Island – $92,580
Hawaii – $90, 420
Pennsylvania – $89, 640
Wyoming – $89, 370
Nebraska – $86,900
Idaho – $86, 050
New York – $84, 850
New Jersey – $83, 870
Alabama – $80, 430
As of the national average salary of clinical psychologists per hour, it was reported that these professionals earn as much as $18.49 to $52.57, depending on their location and years of experience and type of industry where they work.
Job Description of Clinical Psychologists
Clinical psychologists are responsible for the analysis of an individual’s emotional, social and cognitive processes. They gather data as they observe, interview and prepare written reports about their clients and how they deal with their environment.
These professionals are skilled in assessing and diagnosing any existing behavioral, emotional and mental disorders in individuals. With their extensive knowledge and skill in the field, they are competent in treating any disorders affecting a person’s emotional and mental health whether these are acute or chronic issues.
Generally, clinical psychologists have undergone specialized training that equip them with relevant skills to support their clients. They implement a range of strategies and approaches to resolve any issues that their patients encounter. For instance, they provide individual counseling, group or family psychotherapy, and they may establish behavior modification programs to further improve their patients’ condition.
Clinical psychologists may specialize on specific populations such as teens, younger children, adults, or the elderly. When it comes to recommending a suitable treatment option for patients, they may consult relevant medical experts such as physicians and psychiatrists in case they need to prescribe medication.
Primarily, psychiatrists and GP are allowed to prescribe medication in treating mental or behavioral disorders among patients. However, New Mexico and Louisiana have authorized clinical psychologists to give medical prescriptions to their patients for their fast recovery.
How to Become a Clinical Psychologist
The Chicago School is a not-for-profit, regionally accredited institution with more than 4,285 students at campuses across the country and online. TCSPP has been an innovator in the field of psychology and related behavioral science for more than 30 years. TCSPP offers more than 20 degree programs and a wealth of opportunities for international experiences.
Programs:
- Psy.D. Clinical Psychology
- M.S. Applied Behavior Analysis
100% Online & No Standardized Testing
We are committed to helping you achieve your goals and complete your degree as quickly as possible.
Programs:
- AA in Psychology
- Bachelor of Science: Psychology: Criminal Psychology
- Bachelor of Science: Psychology: Life Coaching
- And more...
Since 1977, Keiser University has maintained a practical, hands-on approach to career-focused education to help our students achieve their personal and professional goals. Our student-centered approach remains at the foundation of the Keiser University mission and continues to attract students who prefer a more personal learning experience.
Programs:
- Bachelor of Arts in Psychology
- Master of Science in Psychology
- Master of Science in Clinical Mental Health Counseling
Those who aspire to become a clinical psychologist should obtain a doctoral degree or Ph.D in psychology that involves a completion of a dissertation and a comprehensive exam. As for individuals who wish to work in a health service or school setting, they are required to complete an internship program for about a year, which is a part of the requirements for a doctoral degree.
Psychologists who intend to find employment in schools must obtain a license and an advanced degree before they can find work in this setting. A specialist degree or Ed.S degree involves at least 60 semester hours, as well as a supervised internship for 1200 hours. They should also undergo professional training that focus on psychology and education since they are expected to deal with every aspect of a student’s total development such as their mental, emotional and social health.
As for individuals who opt to find employment in the corporate world, they must complete a master’s degree that includes training under the direct supervision of an experienced doctoral psychologist. The typical coursework for this degree include research design, statistics and industrial-organizational psychology. Upon completion of their further studies and training, they may already be capable of working in clinical, research or counseling settings in any industries.
Certification
Before psychologists can practice their profession, they must obtain a license or certification. In most instances clinical psychologists should hold a doctorate degree, a minimum of 1 year of experience, and completion of an internship program. They should also take and pass the Professional Practice in Psychology examination provided in the state where they wish to find employment. The Association of State and Provincial Licensing Boards provide specific information about licensing requirements in each state in the country.
It is not a major requirement for psychologists to possess a board certification before they can find work in their preferred industry. However, a certification by the American Board of Professional Psychology can give psychologists an edge among other professionals in this field. This can also add to their credentials and boost their chances of promotion to the job for a more lucrative income.
Clinical Psychologist Salary in Canada, Australia and UK
In Canada, clinical psychologists earn a national median wage of C$68,746 every year. Canadian cities that offer the highest salary to these professionals include Vancouver and Toronto.
On the other hand, psychologists employed in Australia earn between AU$42,313 – AU$98,898 per year, with an average annual income of AU$69,080. Top-paying cities are Perth and Newcastle while Melbourne, Sydney and Brisbane offer lower salaries to these professionals.
In the United Kingdom, clinical psychologists receive between ₤24,306 and ₤44,500 annually. Moreover, those who are employed in London earn the highest, according to the March 2014 report by various HR departments in the country.
Conclusion on Clinical Psychologist Salary
The demand for more clinical psychologists in the country will continue to increase as individuals turn to these professionals for the best strategies to manage and address their issues. They can also equip patients with excellent techniques to help them deal with any physical or mental changes that they may experience as they age. Thus, getting a job as a clinical psychologist proves to be a rewarding choice because of the lucrative pay, opportunities for professional growth and better chances to assist individuals in any difficulties affecting every aspect of their life. | http://www.healthcareworkersalary.com/physicians/clinical-psychologist-salary/ |
Scientists: Hurricanes now much worse
(CNS): A group of scientists have found that hurricanes are getting much more intense and destructive, largely as a result of climate change, after they worked out how to separate the changes in economics of an area from the actual physical damage. In the past, measuring damage from storms has been controversial because increased damage might be due to an increase in people and wealth where they strike. But a new model allowed them to look at the land itself rather than what was on it to determine storm impacts.
The biggest and most damaging hurricanes are now three times more frequent than they were 100 years ago, the scientists found. Publishing in a US-based academic journal this week, the researchers explained how they measured historic damage, as researchers in the field agree that atmospheric models predict that major hurricanes will get more intense as Earth warms.
“Our data reveal an emergent positive trend in damage which we attribute to a detectable change in extreme storms due to global warming,” the authors stated, adding that the model they have used is a more reliable measure for climate-related changes in extreme weather and can be used for better risk assessments on hurricane disasters.
Using this new method of calculating the destruction, the scientists said the increase in intensity and frequency of the worst of storms is “unequivocal”. And global warming is fuelling the increase.
In the past measuring damage has concluded that the increase was related to wealth, but instead of looking just at the economics, these scientists looked at the land itself that was destroyed from more than 240 storms between 1900 and 2018. | https://caymannewsservice.com/2019/11/hurricanes-now-much-worse/?replytocom=279161 |
Bathroom graffiti puts Eastern Kentucky University on alert
LOUISVILLE, Ky. (WDRB) -- A Kentucky university is on alert after a threat was written in a bathroom stall.
Eastern Kentucky University Police say the writing implies harm may come to members of the University community next Wednesday. Authorities are monitoring the threat.
Anyone with information including who may have written it should call EKU Police.
The Eastern Kentucky University Police Department released a statement Tuesday afternoon:
The Eastern Kentucky University Police Department is currently investigating this incident and will be working with local, state and federal agencies regarding the specifics of this case. EKU Police is also working with the EKU Student Assistance and Intervention Team and University Administration to investigate any possible connections to this incident. Anyone who may have information regarding this case is asked to call EKU Police at (859) 622-1111.
If you become the victim of a crime, do not try to physically detain or apprehend the criminal. Report the incident immediately to the EKU Police Department at 911 or (859) 622-1111.
On or off campus, walk/jog/bike in groups of three or more in well-lit and well-traveled areas. After dark on campus, call the campus shuttle or for a walking escort. You can contact the campus shuttle at (859)
622-8726.
Scan the area before you exit or approach your vehicle/building and while you proceed between sites.
Have your key ready in hand to quickly access the door of your vehicle/building.
If strangers approach, maintain a distance and be observant. If they are in a vehicle, get the license plate number, if possible.
Lock doors and windows of your room/building. Do not prop open doors or let strangers in.
For more information regarding important safety precautions as they relate to actual or potential violence, visit EKU Emergency Management.
| |
Analysis of memory studies is usually focusing on processes of remembrance, looking at the actors, sites, processes, institutions of remembering. This article however looks at non-remembering as a conscious strategy of not participating in commemorations of the 70th Anniversary of the Holocaust in Hungary. It claims that lack of common language, the imprisonment of a “true” versus “false” dichotomy is contributing to the further pillarisation of the Hungarian memory culture.
|
|
RESUMEN
“Hungría 70”: La ausencia de memorialización del Holocausto en Hungría. - Los estudios de memoria privilegian habitualmente el análisis de los procesos de rememoración y recuerdo, tomando como base el estudio de los actores sociales, los lugares, los procesos y las instituciones del recuerdo. Este artículo, sin embargo, se enfoca en el proceso contrario, el de la ausencia de recuerdo como una estrategia consciente, en relación a la no participación en el 70 aniversario del Holocausto en Hungría. Argumenta que la carencia de un lenguaje común y la rigidez de la dicotomía “verdadero” o “falso” está contribuyendo a la polarización de la cultura memorialista húngara.
|
|
Submitted: 24 October 2014. Accepted: 31 October 2014
Citation / Cómo citar este artículo: Andrea Pető (2014). “‛Hungary 70’: Non-remembering the Holocaust in Hungary”. Culture & History Digital Journal, 3(2): e016. doi: http://dx.doi.org/10.3989/chdj.2014.016
KEYWORDS: Holocaust memorialisation; memory politics; Hungary; non-remembering.
PALABRAS CLAVE: Memorialización del Holocausto; políticas de la memoria; Hungría; falta de conmemoración.
Copyright: © 2014 CSIC. This is an open-access article distributed under the terms of the Creative Commons Attribution-Non Commercial (by-nc) Spain 3.0 License.
|
|
CONTENT
What does Dick Higgins and fluxus have to do with 70th anniversary of Holocaust commemorations in Hungary? Hungary as an ally of Nazi Germany introduced anti Jewish legislation from 1938, but managed to avoid the deportation of its Jewish citizens from the post 1920 territory of the country till the German occupation of the whole country on March 19th, 1944. The deportation of 430000 Jews from Hungary was the quickest deportation in the history of Holocaust, as it took less than two months with the active participation of the Hungarian civil servants. Admiral Horthy, who governed the country with iron fist from 1919, again initiated discussion with the Allied forces to sign a separate armistice, but that did not remain unnoticed by the occupying German forces who installed the Arrow Cross Party as a Vichy government in Hungary on October 15th, 1944. The final days of Hungary following the pattern of the Republic of Salo had started (for more on this see Braham, 1994). Some parts of Hungary were liberated by the Soviet Army, and the Provisional government also held its first meeting in December 1944 in Debrecen, starting to build up the new Hungary.
There is a lot to remember in 2014 about different events of 1944, but why does fluxus offer the most appropriate format? On the 4th of October 2014 the young performance artist Victoria Mohos placed a chair in the newly renovated central square in Budapest, called Liberty square, in the middle of a fountain. As a part of the reconstruction of the Liberty Square, the architect installed a new fountain which stops “fountain-ing” if somebody is approaching it and which has a relatively spacious dry space in the middle. The fountain, which is the joy of young children stuck in the city during the very hot summer days, became the site of this performance protesting against what is behind this playful and innovative fountain: the monument of the German occupation.
The Hungarian Christian-conservative government has prepared the way for making the 70th Anniversary a PR Blitz for repairing its taunted international reputation due to its “unorthodox policy” in freedom of media, role and funding of civil organisations. It allocated an orbital amount of state funding for the purpose of commemoration of the Holocaust and announced an open bid to spend it for civil organisations. So what went wrong? Why did a young performance artist spend 15 (according to other newspaper reports 18) minutes screaming continuously at the Liberty square in Budapest in front of the newly erected monument of the German occupation?
To understand this unarticulated emotional response without language, I would like to analyse the processes of non-remembering. I am using the concept of non-remembering as a conscious process of forgetting and also a process of substituting painful, “hot memories” with cold, less painful memories. I am arguing that in the Hungarian “Holocaust70” commemorations, the “non-remembering” happened in a way that it did not lead to the construction of “dialogic remembering” to use Assmann’s term, but promoted further pillarisation of different memory cultures present in Hungary (Assmann, 2006: 261-273).
This failure of the Hungarian government intervention into memory politics should be understood in a broader context, as the monument of the German occupation is not the only problematic point. The monument, which was erected to remember “the victims of the German occupation”, inflates the category of victim including Hungary as such. Hungary was collaborating with Nazi Germany till the last moments of WWII. Therefore, applying the category of “victim” in an undifferentiated way aims to revise the victim status of those who were victims of Hungarian and later the German policies (Fig. 1). This monument of the German occupation became a flashpoint of the Hungarian government’s failure to create national consensus in remembering. The official approval process of erecting the monument by the municipality of the 5th district happened exceptionally quickly and very swiftly. The monument was erected (and later unveiled) during the night in total secrecy and without an official ceremony. The protest movement against the monument, which immediately started when the plan for erecting this monument was revealed, used several forms of public protest (Fig. 2): the continuous demonstration on the square together with exhibiting alternative forms of memory (family photos, photocopied excerpts from books, personal objects) and launching a Facebook page called “The Holocaust and my family” (Fig. 3). Demonstrators are arguing that the monument is revisionist as it revises the past, meaning the previously consensual anti-fascist canon where the Hungarian state had a responsibility in murdering its own citizens. As a reaction, the demonstrators started collecting their own stories on the Facebook page and also on the public readings they are organising on the square, creating a counter narrative to the government supported narrative of not acknowledging different victim groups.
|
|
Figure 1. Text of the Monument to German Occupation in Budapest.
|
|
Figure 2. Protests and alternative forms of memorialisation in front of the Monument of the German occupation (photo by Andrea Pető).
|
|
Figure 3. Facebook group: “The Holocaust and my family”.
In this article, I am arguing that the two strategies of non-remembering –substituting historical narrative with another and resisting remembering of the murdered Hungarian citizens in 1944– are intertwined. They are both connected to the language problem of the Holocaust remembrance. I am bringing three examples to prove my point: a Polish film, a Hungarian teaching exercise and a local research project.
THE AFTERMATHTop
The Polish film Aftermath (2012), directed by Vladyslav Pasikowski, discusses –with pictures and references from the Old Testament– the guilt of Polish peasants for the murder of the Jewish inhabitants of their village in 1939 (see more on this Pető, 2014: 4-9). In the film, two brothers from the village seek to discover the secret, despite being warned against such a course of action. They end up suffering the consequences of their stand. For a long time, the secret does not even have a name, because the Jews who once lived in the village have been erased from the collective memory and from history. In revealing the hidden secret, one of the brothers pays the ultimate price: he is bound to a cross by other villagers as punishment for having opened the door of silence –for having revealed the formerly hidden tombstones and thereby the crimes perpetrated by the villagers. By means of his sacrifice, the outside world is brought into the local conflict, as those who constitute a minority within the community are unable to tell the story, for they too have become “Others”. The murders, we discover, were motivated by the selfish desire of villagers to acquire Jewish property, a desire they legitimised by claiming that the Jews had murdered Jesus.
Holocaust historians have forgotten about this tiny Polish village, and a subtle reference to this fact is made in the film, for local history works do not even mention the Jews who had been living in the village and who were murdered there in 1939. The only record of the Jewish community is a number of tombstones, which have been removed from their original location and used to construct a pavement, a fence, and –symbolically– the well of the Catholic parish church. One of the brothers has never left Poland and runs a small farm, while the other, having emigrated in 1981, returns to the village when he hears about his brother’s “odd” behaviour. The conflict in the village arises when the first brother begins to move the tombstones from the places where they have lain for long decades. In doing so, he disturbs the web of concealment and denial. Poland’s wartime past begins to be processed and explored on the basis of religious pictures, which assist people in understanding and interpreting the past.
Remarkably, the film accomplishes this without any hint of dulling pathos, excessive romanticising or superficiality. The film demonstrates, in an exemplary manner, how one can –on religious and moral grounds and risking everything– represent and support an issue that has no confirmed or recognised name in the minds of others. Those who have lived at some time in the past must be remembered; their tombstones must be visible and their memory must be upheld. This is the goal of the first brother, an uneducated Polish peasant. Assisted by the local parish priest, he brings attention to the tombstones in the graveyard, an action he considers a religious and moral imperative. Can a moral matter be helped, if it has no name? We may well ask this question, for the characters in the film, though they have all been to school, have never spoken of the WWII history of their local area. For various reasons, modernity (including teaching on the Holocaust) has not yet reached the village. Just one language has been spoken about the past and in connection with the “Other”: the vulgar language of medieval anti-Semitism. Symbolically, the Star of David is tied to the gate of the brothers’ house, thus branding them “Other” too.
Using the language of pre-modernity and basing their actions on morality, the brothers then proceed to seek out the mass grave of the Jews. They do not use the language of academic study or of human rights; rather, they seek to formulate an answer to medieval anti-Semitism at the same conceptual level. In the film, the unspoken, non-verbal and unnamed event is the murder of the local Jews. By speaking in a visual and moral language that lies outside modernity and secularism, the film is able –from the inside– to give a name to the event and then to determine the responsibility of the villagers. It is this interiorised religious and moral sense of responsibility that the film speaks of, using post-secular language. The notion of “post-secular society” was first used by Habermas to describe how the separation of church and state is being questioned within the framework of non-institutional and spiritual religiosity (2008).
In contemporary Eastern Europe, after the forcible forgetting of memory policy under communism, a memory bomb exploded in 1989. Society was said to have broken out from under the red carpet, under which everything had been hidden. Suddenly, everything was rendered visible. In the village described in Aftermath,even the red carpet was not really needed: the crimes committed had already been covered up, and in the absence of any real contact with the outside world the villagers had been able to use communist laws to bury their secret even deeper. The release of the film Aftermath gave rise to a heated debate in Poland. There were accusations of anti-Polish slander, and yet the film contained a qualitatively new element: those who have indirectly benefited from the murders are the ones who tell the story in the film, through the excavation of the Jewish tombstones. The perpetrators (or victimisers) and their families are living in houses that once belonged to the murdered Jews. Yet here it is the murderers rather than the victims who are now required to narrate the murders. The two brothers in Aftermath search for a language in which to express something that they did not witness themselves but which is, nevertheless, a part of them. This is Marianne Hirsch’s notion of post-memory, but here remembrance does not mean inclusion in an existing community of remembrance, and so it differs from the manner in which Holocaust survivors gradually established their own community (Hirsh, 2002). Rather, here it means being cast out of a community that is founded on a web of silence and complicity and in which there is no possibility of acceptance. The act of being casting out, even to the point of physical destruction (as in the case of one of the brothers), goes beyond language and beyond telling. Even so, it is interpreted in a post-secular frame that still manages to be spiritual, for this alone renders it bearable.
Evidently, the situation in Hungary, home to Central Europe’s largest Jewish survivor community, is even more complicated. While silence and forgetting meant, for many, abandoning one’s Jewish identity, among some families and groups of friends the discussion of past events was a means of establishing identity. In informal salon-style gatherings, people told family stories, and this became an important means and condition for group cohesion. Personal narration gave credibility to the historical events: by telling the stories, people made them true. Linked with this were efforts to improve the emotional and intellectual well-being of the surviving mourners, thereby combining the command for nichum aveilim with memory policy. This command connects the story of the brothers in Aftermath with the two case studies as battles over politics of memory in Hungary. It is about this language, or lack of language, that I would like to write, having reflected on the film Aftermath, in my analysis of two similar contexts. I argue that “post-secular development” has resulted in a qualitative change in storytelling and in the politics of memory, and that this change poses a challenge to the Jewish community of survivors as they seek to determine how they should make public their memories and tell their stories to a wider audience. In the other case, an elite Budapest intellectual forcing the local community is doomed to fail.
IN THE GLASS CABINETTop
This second context is the “Vitrin” [glass cabinet] project of the Anthropolis Egyesület, a Hungarian cultural association. The project uses visual anthropology in primary and secondary school teaching, whereby the point of departure is that history should be linked with an object or a specific person, as through them emotions can be evoked and experienced. A private initiative, the project began with the processing of the history of a single survivor family, its glass cabinet. Initially, the project received support from the Lindenfeld Company and, subsequently, from the European Union. In the course of the project, volunteer primary and secondary school teachers (teachers of Media Studies, History, and French) were instructed how to tell personal stories using digital storytelling. Participating students themselves select the stories to be told, do the necessary research and then make the film. The role of the teacher is to provide the students with professional assistance throughout this process. The rationale of the project is the reverse of that used for the Shoah Visual History Archive, where events were documented on the basis of interviews following an interview guide and resulting in personalised stories of the Shoah that could then be taught to students (Pető, 2013: 205-211). The films of the “Vitrin” project are related only tangentially to the customary historical narratives, for the choice of topic is up to the students and is their responsibility. Thanks to students’ familiarity with digital technology, the use of such technology in the project caused far fewer difficulties than the organisers had anticipated.
At a meeting held in Budapest to evaluate the project’s findings in March, 2014, a bone of contention among teachers was that ever since it became compulsory in Hungarian schools to hold a Holocaust Memorial Day on April 16th, students had exhibited increasing resistance to instruction on the Holocaust. They expressed the view that Holocaust Memorial Day was just one more formalised and institutionalised expectation in politics of memory. Some students publicly protested against compulsory viewing of films about the Holocaust. These developments mirrored changes in the Hungarian political discourse that were accompanied by a growing acceptance of verbal antisemitism and a sharper distinction between “Us” and “Them”. The secondary school teachers reported that their students were demanding to know why school time was being used to address things of little importance to them and to Hungarians in general. In this way the Hungarian/Jewish difference (or dichotomy) was actually being recreated in connection with an aspect of politics of memory that aimed to end this difference. An enormous challenge for teachers was somehow to smuggle in the little word “also”: that is, to gain acceptance among Hungarian schoolchildren that the Holocaust was “also” of importance to them. This is a far cry from the story-telling in Aftermath where the perpetrators feel they must speak out and remember, and where they do so beyond and outside institutions. This type of discourse is particularly difficult in impoverished regions beset by ethnic conflicts: for instance, in north-eastern Hungary, where the “Them” and “Us” dichotomy is manifest in the hostility exhibited towards Roma people. One of the teachers involved in the “Vitrin” project, a history teacher at a school with students mainly from a Roma ghetto, received an odd opportunity. A far-right paramilitary force from a neighbouring village –a force with links to the far right Jobbik party– hounded the local teacher, a village native, out of the area, because she was considered to be Jewish. In World War II, the teacher’s father had hidden six Jews at his home, thereby saving them. Instead of receiving recognition from the local community, his daughter was now forced to move away from the village. The Hungarian reality differs from the story presented in Aftermath to the extent that the daughter of the man who had saved Jews in 1944 was forced to flee habitual harassment in her village in 2014, but she did not lose her life. The kind of life also has a price. The defining memory cultures survive in eastern Hungary in a similar isolation to what we see in Poland. A colleague of this teacher sought to process her experiences in the “Vitrin” project with the involvement of her Roma students but the first woman did not want to feature in a film. Even though she was even offered anonymity, she declined to take part – out of fear. The vocabulary used by the director of Aftermath to express the story in Poland was not available at this point in the Vitrin project. The teacher rejected sacrificing her life – although her life would not have been in immediate danger. But other films are being created within the framework of the project, some of them seeking to give purpose and meaning to our memory of the Holocaust. It is not the experiences of others that are transposed into their own situation. Rather, utilising the possibilities of digital technology, the filmmakers try to put their own experiences and emotions into film.
LOCAL HISTORIES THAT MATTERTop
The third context is Cserépfalu, which is a small village in the Northern Eastern Part of Hungary with around a thousand inhabitants. Before 1944, nine Jews were living there, who were arrested by the Hungarian gendarme and taken to the nearby ghetto and never returned. Their property, which was not much, was acquired by the villagers. A young librarian from Budapest, Péter Tóth moved to this village in the 1990s, started local historical research and posted his findings on a blog. This activity was greeted by the locals as it attracted touristic attention to the picturesque village, but when Peter Tóth started to inquire about the Jewish citizens before the deportation of 1944, he met ignorance and even hostility. In the official webpage of the village there is not a word about the traumatic history of the village. The line on the page that in 2001 there were only Hungarians living in the village is a clear coded message for those who are considering buying holiday homes there that no romani are living there.
Due to criticism and warnings in his blog, Peter Toth changed the name of Cserépfalu to Cserepflau, but it did not help much. He organised a memory walk for the deportations of the nine Jewish citizens. Two citizens of the village decided to be present: himself, the organiser and another person, who had also moved in the village lately. The memory event for two participants was guarded by three local policemen. Later, a family of five members joined them. They had been threatened to be stoned if they participated at the event. The mayor, who in private discussions supported his work, opted not to participate. Peter Tóth started to put together the pieces of the Jewish inhabitants of the village; some of them were victims of a pogrom already in 1920 and moved out. He found material about the Jews of his village in Yad Vashem but not in the local archive. Peter Tóth said in the interview: “We cannot hide what has happened to them. We cannot live in ignorance, when we know what has happened”. Namely that on May18th, 1944 nine Jews were living in the village and by June 16th none. The plural first person, “we” however is a problematic one here, as the community of remembrance is questioned. Who can demand a community to remember if they are not willing to do so and it is against their interests?
THE DEMAND TO REMEMBERTop
The tikkun olam, the basic prayer of Judaism, includes the command to repair the world. Much has been written about how this command is to be interpreted in the various schools of Judaism, but here I choose to write about the common roots of Christianity and Judaism and about the shared normative expectation that one should seek to make the world a better place. In Hungary, which is home to one of Europe’s largest Jewish communities, the local Jewish organisations bear significant responsibility for their silence on memory policy in the pre-1989 period and for creating the post-1989 framework in this field. In 2014, the commemorative year “Hungarian Holocaust 70” is an important opportunity for the telling of stories. Especially since the government offered so much financial support to it. Instead of a story with a happy ending, a memory war has started. The monument of German occupation at the Liberty square aimed to create an alternative narrative to the previous antifascist discourse. A new Holocaust Museum called the House of Fates is being planned without any relevant information about the content. Why is 15 (or 18) minutes long screaming a response to all these government actions?
Surprisingly, the framework for story-telling has been determined by the paradigm of the Veritas (Truth) Historical Research Institute, which was recently established by the Christian-conservative government. For this institute, the task is to research the “truth”. Paradoxically, the civil organisations, historians, and Jewish organisations that have rallied against the Veritas Institute have defined their primary task as formulating and sustaining a “counter-truth” – rather than analysing the factors that go beyond the true/false binary.
The Facebook group “The Holocaust and my family”, membership of which is by invitation only, posts the stories, memories and reflections of its members. Each one of the stories is heartbreaking and movingly true. Many people have written the stories of their families and then scanned in or posted photos of their murdered or surviving relatives. A great number have never spoken of these experiences before. Each story is full of the pain of people whose voices have never been heard before. One person noted on the group’s page that the establishment of the group was the single positive result of the government’s intrusive politics of memory. Members of the group –isolated as they are from the outside world, from hostile commentators and, indeed, from 90 percent of Hungarian society– have continued the politics of memory practices that were developed in the house parties and salon-style gatherings of the 1980s. Now, however, they are doing it in the digital space. Here there are no stories that do not fit in the traditional Holocaust narrative: there are no Roma, poor people or LGBTs. In line with the established narrative, women are mothers and protectors. Why should we remember in any other way when the accepted framework of remembrance has been created into what it is over such a long period? While confirmation of one’s identity by a reference group is a basic human need, in order to move forward we need also to think about the extent to which the survivors bear a responsibility. Which command should take precedence: nichum aveilim or tikkun olam? In this difficult situation, reversing the logic of victimiser and victim –at first sight a seemingly unacceptable tactic– may lead to a meaningful result. The brothers in Aftermath did not have Jewish neighbours, and the village-dwellers had never seen a non-white or non-Catholic Pole. In the Aftermath’s concluding scene, young people who have arrived from Israel recite the kaddish by resurrected tombstones. In Hungary, it is as though the inevitable introspection of Jewish memory policy has excluded any possibility of looking outwards, and yet the two practices are not necessarily incompatible.
At its extraordinary meeting on February 9th, 2014, the Federation of Hungarian Jewish Communities (MAZSIHISZ) declared that it would not take part in the events of the Holocaust commemorative year established by the democratically elected government, because it disagreed with the decisions of the government in the field of politics of memory. The MAZSIHISZ then made it known that it would celebrate the commemorative year separately. Through its decision, the Federation effectively renounced the opportunity to participate in the development of a memory culture where many do not understand –and do not even want to understand– what they are supposed to be commemorating in connection with 1944. “Chosen trauma” (Vamik Volkan’s term) is placed in opposition to experienced trauma. This dilemma, however, is significantly more complicated than that of the Polish brothers in Aftermath, who merely knew about the existence of a secret. The teacher in the northern Hungarian village who shuts herself in her rented room and dares not speak of her father’s actions to the second teacher, who wishes to discuss those actions in the presence of her students, will find her position is far more difficult. The mayor of Cserepfalu posts the advertisement for the memory walk for the nine murdered Jewish citizen of his village but he himself does not participate as he knows nobody else from the village will do.
The crimes –the murders– are still present; they have not passed away and will not pass away. The only change concerns the framework of remembering. But if we are to make the world a better place by speaking about such issues, then we also need to recognise that the world has changed: digital technology has not only modified our access to the past; it has also altered what we regard as authentic. A further change revolves around our emotional political expectations in a post-secular world. What remains, however, is tikkun olam as a practical everyday command. By recognising emotions and identity, we are able to reach out to others. If we fail to understand Others –Roma people or LGBTs– we too will be left vulnerable. And unless we can define ourselves in conjunction with someone else, we will have failed to truly understand the deeply immoral and corrupt logic that gives rise to the notion of the “Other”. We all bear a responsibility for the rise in antisemitism, for Holocaust denial and for the relativising of crimes. Sulky disdain for those who think differently from “Us” and a belief that “We” are the only ones who know objectively what happened, will lead only to a further polarisation of society and of memory cultures. When the librarian from Budapest demands that “we” should remember and one more person shows up demonstrates the failure of this strategy.
In the recent past, in Hungary there has been a failure to develop an internalised narrative among those who do not regard –or do not experience– the Holocaust as their own personal story of suffering and who, within the framework of post-memory, do not consider themselves in any manner responsible. Yet the parents and grandparents of these people worked very diligently in the Hungarian state administration to make inventories of the assets of the Jews, even moving into the apartments and houses allocated to them after the Jews’ departure and always considering it best not to inquire about their previous owners. In the impoverished village in northern Hungary, the Roma children asked the teacher in vain about her father’s stories; they received no answer. The intellectuals who moved from Budapest to a small village in the northern part of Hungary are asking questions but the villagers are not ready to answer and he meets the silence of the Aftermath.
CONCLUSIONSTop
The history of the Holocaust is the history of Europe; as Europeans we all continue to live it. It is not wise to appropriate to ourselves the story of suffering, because even in the short term such a course will lead to isolation, pillarisation and a rise in antisemitism. The brothers in Aftermath, by going beyond themselves and the traditions of their family and community, could reach out for a different post-secular memory policy frame. That was put in into practice by the “Matzeva Project” in 2014 collecting more than 1000 tombstones (matzevas) previously built in the Prague district of Warsaw in roads, walls, even toilets or used as knife sharpeners to return the fragments to the cemetery. The two brothers in the film rendered themselves vulnerable as a result, but, if we are honest, we know this to be the task faced by us all. By following the traditional command of tikkun olam, we can accomplish the task – doing so hopefully with less shed blood than in the film, although we should not be under any illusions.
The main argument of the protesters against the memory politics of the Hungarian government is that with this monument of German occupation it revised the history of the Holocaust in Hungary. Tucker’s typology (Tucker, 2008: 1-15) of historical revisionism presents three types of historical revisionisms. The first one is the significance-driven revisionism: that is, when there is a change in what historians find significant in history. The second is evidence-driven revisions: when new evidence is discovered. And the third is the value-driven revisionism: when historical events and processes are reevaluated due to a new system of values becoming hegemonic (Tucker, 2008: 3). In the case of the two villages in the northern part of Hungary the significance driven to revisionism is going in parallel with the value driven revisionism: what happened in those villages in 1944 is not considered to be important by the local villagers. The government supported memorialisation projects are constructing the monuments for the murdered Jews as this has happened in a social and cultural vacuum. If this tendencies of revisionism are supported by these two strategies of non-remembering, then there is nothing remaining but to scream.
NOTESTop
|
|
Coverage of the performance http://cink.hu/viktoria-15-percig-uvoltott-a-nemet-megszallasi-emlekmu-1642618837 [accessed 24/October/2014]
|
|
Government webpage http://holokausztemlekev2014.kormany.hu/civil-alap-2014 [accessed 24/October/2014]
|
|
See the project webpage at http://vitrinmesek.hu/a-projektrol/ [accessed 24/October/2014]
|
|
Interview with Peter Toth: http://magyarnarancs.hu/kismagyarorszag/egyertelmu-a-haritas-holokauszt-ugyben-toth-peter-a-cserepfalui-zsidodeportalasokrol-92268 [accessed 24/October/2014]
|
|
Web page of the village http://www.cserepfalu.hu/ [accessed 24/October/2014]
|
|
Blog by Peter Toth http://cserepflau.tumblr.com/ [accessed 24/October/2014]
|
|
See the webpage http://www.veritasintezet.hu/en/ [accessed 24/October/2014]
REFERENCESTop
|○||Assmann, Aleida (2006) “History, Memory and the Genre of Testimony”. Poetics Today, 27(2): 261-273.|
|○||Braham, Randolph L. (1994) The Politics of Genocide: The Holocaust in Hungary. Columbia University Press, New York.|
|○||Habermas, Jürgen (2008) “Notes on post-secular society”. New Perspectives Quarterly, 25(4): 17-29.|
|○||Hirsch, Marianne (2002) Family Frames. Photography, Narrative and Postmemory. Harvard University Press, Cambridge.|
|○||Pető, Andrea (2013) “How to Use the Shoah Foundation’s Visual History Archive for Teaching at the Graduate Level: a Methodological and Theoretical Reflection”. In Jewish Studies at the CEU VII. 2009-2011, edited by Kovacs, András and Miller, Michael. CEU Press, Budapest: 205-211.|
|○||Pető, Andrea (2014) “Memorialisation of the Holocaust”. Baltic Worlds 2-3: 4-7.|
|○||Tucker, Avizier (2008) “Historiographic Revision and Revisionism”. In Past in Making. Historical Revisionism in Central Europe, edited by Kopecek, Michal. CEU Press, Budapest: 1-15.|
Copyright (c) 2014 Consejo Superior de Investigaciones Científicas (CSIC)
This work is licensed under a Creative Commons Attribution 4.0 International License. | http://cultureandhistory.revistas.csic.es/index.php/cultureandhistory/article/view/55/210 |
Everyday a large number of biodiversity data are uploaded to the free and open Biodiversity Literature Repository (BLR), a joint venture of Plazi and Pensoft, hosted on Zenodo/CERN.
The automated workflow, successfully digitizing scientific literature from start to finish, assures that articles and their sub-article elements, from illustrations to taxonomic treatments, metadata, images, figures, and supplementary files are given a persistent digital object identifier (e.g. DOIs) of their own, cross-referenced, and then uploaded to the repository. The BLR makes these data discoverable, accessible, reusable and citable by any scientist from anywhere in the world.
The organizations behind this project are Plazi, a non-profit dedicated to supporting and promoting persistent and openly accessible digital taxonomic literature, and Pensoft, a scholarly publisher and publishing technology provider.
The start of 2018 marked a new milestone for BLR as the number of the deposits crossed 200,000, with an average of six links to related entities, including the link to the source publication, added to each deposit. The deposits in the BLR represent 63% of the total deposits in Zenodo.
To make sure that the extracted data remain open and accessible to all, Plazi, Pensoft and Zenodo stand firmly for the distribution of research data under unrestricted access by using waivers, such as CC0 or PDDL.
"The Plazi workflow allows, for the first time, access to, citing and reusing the hidden data in scientific publications, and thus opening up scientific literature in an unprecedented way," says Donat Agosti, president of Plazi.
Last year, a paper focusing on unrestricted access to images comprising biodiversity data within research articles and its advantages was published by a team from Plazi in Pensoft's open science RIO Journal.
Zenodo is an OpenAIRE project, in the vanguard of the open access and open data movements in Europe. It was commissioned by the EC to support their nascent Open Data policy by providing a catch-all repository for EC funded research. CERN, an OpenAIRE partner and pioneer in open source, open access and open data, provided this capability and Zenodo was launched in May 2013.
In support of its research programme CERN has developed tools for Big Data management and extended Digital Library capabilities for Open Data. Through Zenodo these Big Science tools can be effectively shared with the long-tail of research.
Plazi is an association supporting and promoting the development of persistent and openly accessible digital taxonomic literature. To this end, Plazi maintains TreatmentBank, a digital taxonomic literature repository to enable archiving of taxonomic treatments; develops and maintains TaxPub, an extension of the National Library of Medicine / National Center for Biotechnology Informatics Journal Article Tag Suite for taxonomic treatments; participates in the development of new models for publishing taxonomic treatments in order to maximize interoperability with other relevant cyberinfrastructure components such as name servers and biodiversity resources; and advocates and educates about the vital importance of maintaining free and open access to scientific discourse and data. | https://www.eurekalert.org/pub_releases/2018-03/pp-tbl030518.php |
Read in our apps:
iOS
·
Android
Brian King
Undiscovered Dundee
Read
Read in private
Impression
Add to shelf
Already read
Report an error in the book
Share
Facebook
Twitter
Vkontakte
About
Readers
2
Welcome to Dundee. A modern city at first glance, but with an illustrious past that's not always easy to see. Decades of regeneration, and sometimes dubious progress, have seen to that. But if you look a little closer, dig a little deeper, you will find a hidden city alive with history. Undiscovered Dundee uncovers the city's lost inheritance, its forgotten disasters and forsaken landmarks, the heroes and villains that time has erased, the citizens who stayed and made a difference to their city and those who left and made an impact on the world beyond. Sometimes the story ventures far from Dundee and sometimes it tells what happened when everyone from writers to royalty, from presidents to pop stars, came to visit. Dundee and its people, past and present, bind the tales together and reveal a city still waiting to be discovered.
350 printed pages
Original publication
2011
Publisher
Black & White Publishing
Impressions
How did you like the book?
Sign in or Register
Don’t give a book. Give a library. | https://bookmate.com/books/otok5ouF |
High Performance Computing: converging or diverging?
Will there still be generic High Performance Computing (HPC) experts in the near future or will each HPC platform require its own expertise? That is the fascinating question that is raised in Robert Roe’s (twitter @ESRobertRoe) article “Next-generation software: who will write it?“, in the October/November-issue of Scientific Computing World magazine.
There has always been a tension between portability and performance in the world of High Performance Computing. A new hardware paradigm would always pop up even before you had optimized your software for a specific platform. So the best you could do was to use some generic platform that would work on basically any hardware, accepting the fact that it would never use the hardware to the max.
Nowadays, there is a broad spectrum of hardware architectures existing side-by-side. There are the shared memory (multi-core) architectures that are usually programmed using OpenMP or multi-threading. Then we have the distributed memory architectures for which MPI is the logical choice. Besides, there are the accelerators like GPUs, that are usually addressed in CUDA or OpenCL. Most present-day computers employ a combination of these architectures. And then we’re not even considering hybrid FPGA or ARM platforms…
All this time, there was hope that someday we would have a dominant programming model again that would let us develop portable software. The only question was which programming model that would be and when it would become the dominant one.
The article in Scientific Computing World now suggests that High Performance Computing technology may not converge any time soon. That we will be stuck with different technologies existing side-by-side, each with a different programming model, development tools and dedicated experts. That each technology will be necessary to address the various forms of parallelism that may exist in an application.
Those who want to build portable software in this new world, will either have to make different versions for different architectures, or will have to create software that exploits various paradigms within one code. That may be a bit too much to ask from a single expert, so you may be needing different experts for different parts of the code.
Perhaps the escape is in libraries that offer an extra layer of abstraction (like Paralution). Or maybe we can leave more to the compiler, that might generate an optimized version of a program from a high-level specification. But this is a dream that has failed to come true for more than 20 years. In reality, the scientific software developers of VORtech still have to rub the optimizations in the face of the compiler before it will understand what it is supposed to do.
So, developing high performance software may not get easier in the years to come, but will instead become more complex as hard- and software architectures further diverge. | https://www.vortech.nl/en/high-performance-computing-converging-or-diverging/ |
50 artists/groups of artists selected by the Expert Panel from more than 2000 applications were shortlisted. Full list you can see on the Prize website . The artworks of the shortlisted artists will be displayed at the exhibition of the nominees in September.
We are grateful to all the participants! And congratulate the nominees!
By metro
We recommend travelling to Mayakovskaya metro station. The walk to the AZ Museum will take around five minutes. After leaving the station, turn first to the right into the alley, then moving forward, at the first intersection, turn left to 2nd Tverskaya-Yamskaya street. Walk a few meters. AZ Museum will be on your right.
By car
There are paid parking spaces on either side of 2nd Tverskaya-Yamskaya street or in the nearest alleys. Parking is limited, and on weekends and public holidays, the parking lots may be full. | https://museum-az.com/en/news/obyavleny-nominanty-zverev-art-prize/ |
Researcher(s):
Project Sponsor(s)
- Substance Abuse and Mental Health Services Administration (SAMHSA)
- Texas Department of State Health Services (DSHS)
- U.S. Department of Health & Human Services (HHS)
Project Categories
SBIRT is a 5-year $17.5 million dollar Targeted Capacity Expansion Grant funded by the U.S. Center for Substance Abuse Treatment to expand treatment capacity. Seven grant recipients across the nation are testing models in the health care setting. The objective of InSight, the Texas-based SBIRT project, is to transfer research-based methods for screening and brief intervention of alcohol and drug problems among patients who present for health care in general hospital settings. This project is located in eight Harris County Hospital District locations, including Ben Taub General Hospital (emergency department and other units), four community clinics, and three school-based clinics. The project utilizes general healthcare staff and a specially-trained multidisciplinary SBIRT team to screen and serve over 44,000 patients. The aim is to encourage primary care generalists to screen for substance abuse when presented with early symptoms, to provide interventions with problem drinkers by providing brief advice and intervention sessions with InSight Specialists addressing drinking problems, and to refer substance abusers to treatment.
As Principal Investigator of InSight’s training component, Dr. Velasquez and her Health Behavior Research and Training (HBRT) team have developed a comprehensive standardized instruction and certification program on the use of Motivational Interviewing by healthcare practitioners as a substance abuse intervention strategy. Components include: 1) a comprehensive training and continuing education curriculum for InSight Specialists; 2) Specialist’s training manual to facilitate the training of therapists; 3) comprehensive training and “certification” plan for all InSight Specialists; and 4) “Training for Trainers” component to train proficient InSight Specialists to serve as on-site role models for other Specialists. | https://socialwork.utexas.edu/projects/r0264/ |
The Government has admitted going too far and causing “unintended consequences” with its proposed R&D tax concession changes.
In a public statement made by the Treasury, the Government received more than 131 submissions on the issue and promised all will be made public.
“With the benefit of this feedback, we understand that in some areas the proposed rules could have unintended consequences,” the Treasury said. “In others the draft legislation needs to be made clearer and less complex.
The Treasury identified five main areas of concern such as the definition of core R&D activities, the definition of support R&D activities, R&D activities involving software, the registration of core and supporting activities, and the augmented feedstock rules.
Shadow Minister for Innovation, Industry, Science and Research, Sophie Mirabella, claimed the proposed legislation had gone too far due to a lack of intervention from the office of Innovation Minister for Innovation, Industry, Science and Research, Senator Kim Carr.
“This is a sign the Government had no regard for the actual impact on R&D,” she said. “Minister Carr has allowed Treasury to run the agenda on R&D out of his portfolio.
“The Government is extremely sensitive on any negative criticism on this issue and the fact there’s been widespread business and industry condemnation has forced them to make these comments.”
But a spokesperson for Senator Carr said the proposed legislation would have never damaged the Australian economy and appeared to contradict The Treasury's admission.
“About 80 percent of funding goes to 100 companies,” the spokesperson said. “Instead of receiving 7.5 cents for every dollar, eligible SMEs will receive 15 cents – the significance of this increase should not be underestimated.
“Our aim is to encourage business to see R&D as a core activity."
The government would like to implement the proposed R&D tax changes in July. But Mirabella said the process could not be fixed in time and called for a re-draft of the legislation.
“This whole thing is so fundamentally flawed they need to scrap it and start again. Not with token consultation with the industry that gets ignored, but with genuine consultation to find ways to improve it,” she said. “That can’t be done overnight.”
Companies opposed to the proposed legislation, from Google to small Australian ISVs, launched a “firestorm of criticism” and financial advisory firms such as Deloitte, KPMG, PricewaterhouseCoopers (PwC) and Ernst and Young, condemned it as a cost-cutting measure.
“The draft legislation is a kick in the guts for business,” PwC national R&D leader, Sandra Mason, said. “If you read what [the Government’s] aims are – revenue neutrality, increasing and expanding business investment on R&D, and bringing global innovation dollars to Australia – none of those have been achieved.”
Australian Information Industry Association CEO, Ian Birks, welcomed the Government’s admission and said he looked forward to seeing the amendments.
“I think it’s good. They're engaging in conversations with industry on how to improve the scheme,” he said. “[The Government’s] public recognition that there were issues is a good thing for clearing the air."
The program will be worth about $1.4 billion. | https://www.arnnet.com.au/article/337706/government_admits_going_too_far_r_d_tax_concessions/ |
Honorable Minister for Foreign Affairs of the Republic of Indonesia Mr. Retno L.P. Marsudi,
Honorable Foreign Ministers,
Excellencies, Friends,
Ladies and Gentlemen:
Let me begin by expressing my deep appreciation to the Government of Indonesia for hosting the 14th Bali Democracy Forum despite the difficulties posed by the Covid-19 pandemic.
Nepal attaches high importance to the role played by the Forum in promoting the cause of democracy.
I hope that this year’s Forum will make valuable contributions in advancing the cause of economic and social justice for humanity even as the Covid-19 pandemic continues to impede economic growth and development across the world.
Excellencies:
Democracy is about delivering good governance, economic justice, and human rights and freedoms.
A successful democracy is the result of deep economic and social transformations, strong national unity, and inclusive institutions.
In recent times, though, democracy has been facing mounting challenges on various fronts.
Fragile social welfare systems, environmental degradation, corruption, and diseases and epidemics have weakened even robust democracies and hindered their ability to deliver.
None of these challenges is as corrosive and ominous as existing pervasive socio-economic inequality.
Democracies should be capable of taking on the long-term challenges of modernizing societies, resolving social and economic conflicts, and above all, enhancing equality and social justice.
The alternative to democracy, as Nepal’s first democratically elected Prime Minister BP Koirala emphasized, can only be an even better democracy – a political system that blends political freedoms with equity and social justice for all.
Ladies and Gentlemen:
Nepal’s travails with democracy provide useful insights on institutionalizing democratic governance in a country facing complex socio-economic challenges.
The several spurts of democracy in Nepal were short-lived and were undone by one major factor – the absence of social and economic transformation and inclusive representation that meet people’s aspirations for peace, prosperity, and justice.
The Constitution of Nepal 2015, which came at the culmination of Nepal’s many democratic struggles spanning seven decades, envisions a society where equity leads to equality.
It is guided by the philosophy that political rights and freedoms go hand in hand with economic and social justice, and inclusion.
The lessons we learn from Nepal’s democratic journey are equally relevant in ensuring peace, equality, fairness, and justice in the world.
Excellencies,
Three major challenges are hitting democracies hard the world over, all at once: the peril of growing inequality, the specter of climate change, and the scourge of global pandemics like Covid-19.
These three interlocked challenges cannot be addressed without nations acting in concert.
We must fight climate change and pandemics together.
We must also join hands together in the fight against global inequality.
Investing in people’s education and health, unleashing the creative and entrepreneurial energies of the youth, and keeping the workforce ready to adapt to technological changes are key elements in reducing inequality across and within countries.
Reducing inequalities requires placing international cooperation and multilateralism at the front and center of inter-state relations, and prioritizing work over wealth, planet over profits and people over power.
The Covid-19 pandemic has uncovered the urgency – and our latent capacity – for leveraging global co-operation in implementing that global vision.
The fallout of the Covid-19 pandemic could have been much worse but for the success in forging cooperation among nations in exchanging scientific expertise, procuring medical supplies, and developing and distributing vaccines.
The need for international co-operation in tackling global challenges has never been as compelling as now, and its prospects never as huge.
I hope that the discussions in this Forum will make valuable contributions in advancing the cause of international co-operation for a more prosperous and a more equal world.
Thank you, Excellencies. | https://mofa.gov.np/statement-by-hon-foreign-minister-at-14th-bali-democracy-forum/ |
The optional external battery pack can be connected to a Night Vision Devices BNVD equipped with an external power port in order to extend the operating life of the system.
To ensure compatibility, when purchasing a BNVD be sure to choose the external power port add-on.
The battery pack is powered by either 3 AA 1.5 Vdc Alkaline batteries or 3 AA 1.8 Vdc Lithium batteries, providing an additional 50+ or 100+ operating hours respectively.
The battery pack is 2.7 x 0.9 x 2.5 inches (L x W x H) with a cord length of approximately 24 inches and weighs approximately 72 grams without batteries. | https://ownthenight.com/component/hikashop/product/15300-bnvd-external-battery-pack-p-n-450175/category_pathway-71/related_product-15264?Itemid=114 |
There is an age-old adage in all sports which states “a team who makes the fewest mistakes in a game will likely win.” However, for all the advanced statistics available in sports management, there exists a surprisingly large void in this area. This appears to be especially true in professional hockey. We think this is due to either a flawed philosophy of how the construction of teams results in the winning and/or losing of games or a perceived difficulty in the meaningful quantification of the impact of errors on outcomes. The multiplicative effects of two negatives has a positive outcome in mathematics; we have also found this to be true in hockey.
As a result, we devised two metrics; we have termed the first one the Bracton Score “Bracton”, and the second the “Advanced Bracton Score.” The “Bracton” numerically calculates the positive or negative contribution of a player to his team vis a vismistakes taken or generated via the penalty assessment process. The Bracton, can also be used when aggregating the ability of an entire team to generate more mistakes form its opponent than it commits. In formulating the “Bracton,” we used the following assumptions about hockey in general to deduce a numerical conclusion.
- If the only differentiator in a game pitting world class athletes against one another is the combination of skill, intelligence, and the desire to win, can these intangibles be measured?
- We believe that through an analysis of the process of taking and drawing penalties, we can partially arbiter these intangibles. How?
- We assume that players are most often only desperate enough to gain some extra-rule advantage when opposing players are either working for the puck, are demonstrating superior skill, or making intelligent decisions on or off the puck. Conversely, the players that consistently take minor penalties are the ones who are either slower, are being outplayed, are out of position, consistently playing outside the system of the coaching staff, or worse yet….playing injured. These situations only arise due to an asymmetry of skill, intelligence, desire, injury or a combination of all four.
- When a team either takes or draws a penalty, the difference between goals produced and goals allowed is far higher in both directions. Therefore, players who possess a positive “Bracton” allow for an additive contribution to the success or failure of a team.
- Players that generate penalties, even if they are normally not on the power play unit, maximize ice time for the assumedly most skilled star players who are on the power play unit. Conversely, and most significantly, players who take more penalties than they draw maximize ice time for opposing premier players. This is because 5×4/60 minutes is much higher than 5×5/60 minutes and of coursesaves goals by NOT taking penalties 4×5/60 minutes.
- The gap, in the aggregate, for a team over the course of a season is somewhat correlated and predictive to rank in the overall standings.
- We are working on uncovering whether players that tend to possess high Bracton scores also remain on NHL rosters for longer than those that do not.
We recognize that this seems obvious. However, if that were so apparent, we ask why has not a metric such as the “Bracton” been either advanced, widely reported, or become a mainstay in hockey for decades, not just in the dawning era of Moneyball in hockey?
While the “Bracton” is a powerful metric, if not somewhat a priori, we understand that it only provides a springboard to its more highly correlated predictive brethren; the Advanced Bracton (AB) Score. In this statistic, we have culled various data points related to retrospectively positive or negative outcomes within the play of hockey games, aggregated for a season (in this case 2014-2015). We have added these to the Bracton score to uncover an even more meaningful quantification of whether a hockey player impacts his team positively or negatively. Unlike the Bracton, these results are in no way obvious even though for season hockey enthusiasts and managements they may be intuitive. For example, for someone to say “I knew Pavel Datsyuk was a good player, but I didn’t really know how good relative to the rest of the league” the AB successfully measures ostensible intangibles that appear to relate to what we term “unscored goals at the margin (UGM).”
By mathematically deducing the contribution of a player toward UGM, we can assign an actual value (or in many cases a negative value) players have toward the overall team performance. With respect to Datsyuk, he scores among the league best AB at 6.93. To us, we believe that in addition to the goals and assists produced by Datsuyk, he was responsible for another 6.93 goals UGM for Detroit that neither he nor DET scored directly, but avoided by either limiting mistakes or being “in the right place at the right time with the right mindset,” to borrow a tenet of eastern religious thought. In this regard, to earn a 6.93, Datsyuk undoubtedly had his head in the game, played hard the majority of his shifts, and played within the system employed by Detroit. As such he is what the sports community terms a “character player.” A character player is not only someone who plays with heart, guts, pugnacity and truculence (to borrow another hockey idiom), but if he is someone who provides UGM, he is actually worth paying to play hockey.
In contrast to success stories like Datsyuk, we were QUITE surprised at just how many players in the NHL not only produced negative UGM but should not even be playing in the NHL at all. By virtue of their presence, negative Advanced Bracton players take away UGM and actually cost goals, wins, points in the standings and above all, strike the salary cap with detrimental returns on investment. Without naming names (yet), we found there to be about 170 athletes who should not be professional hockey players and about 50 who are perceived as stars, are paid as such, but actually do not help their respective teams win games! THIS IS THE VALUE OF THE ADVANCED BRACTON SCORE.
It is plain that there are some teams in the NHL that use a metric similar to the AB in constructing their teams. Chicago, the New York Rangers, the New York Islanders, Tampa Bay and possibly Minnesota and Washington are the most notable examples. Of the teams in the middle of the pack, we noted that even if they had several high UGM players, their success was muted if they had several in the lowest quintile (e.g., Detroit, Ottawa, Anaheim, Boston and LA). Finally, the worst teams in the league are literally LOADED with negative UGM Advanced Bracton players with few or no players to counteract them at the top (i.e., Toronto, Buffalo, Phoenix, New Jersey, San Jose and Philadelphia). How could general managements in these cities have so many guys with such low ABs? Do they not value character or have they not known how to measure it (until now)?
From a general management philosophical standpoint, we believe that teams who have adopted / will adopt the Advanced Bracton method of team construction will enjoy more playoff success and longevity than teams who do not as demonstrated in the 2014-2015 season.
We will be writing a plethora of articles based on the data we have compiled. Given the high correlation between the Advanced Bracton and winning hockey games, the offseason moves can be analyzed within this framework to determine which teams have or will improve for 2015-2016.
IF YOU LIKE THIS AND WANT TO DONATE TO OUR EFFORTS WE TAKE PAYPAL. THANK YOU! | https://hockeyfreeforall.com/advanced-bracto/ |
Dear God,
Please grant my prayers and wishes hoping for you miracle upon us. May one day i could conceive a twins as a special gift for my family.
I believe that You will grant what is best for us.
For this reason, when i pray and ask for something, i believe that i will receive it and it will be given. But nevertheless oh Lord, let this prayer not according to my will but Yours oh Lord.
Lord, pls grant our prayers according to what is best for us and as Your will. Amen. | https://www.praywithme.com/prayer-to-have-twins.html |
Unwanted, disfigured or poorly executed body artwork is but one of the more common tattoo issues people are faced with and attempt to hide. Unfortunately, most skin care products on the market are not only ineffective but also cause skin problems. Cosmetic dermatologists in San Francisco offer a variety of treatment options that are long-lasting and effective, including laser removal, dermabrasion, chemical peel and more. To discuss treatment options, contact a reputable dermatologist in our directory. | https://www.tattoohealth.org/local/california/san-francisco?radius=25 |
While we may not be climbing any literal mountains in religious school, many of us are not strangers to tasks that may seem overwhelming or insurmountable.
At the ISJL, we originally implemented our vision for the ed program based on a secular school model. However, while the concept for our curriculum may be based on secular schooling, many religious school models differ sharply from a typical secular school setup: meeting once a week for a relatively short time, more relaxed attendance policies, less thoroughly trained teachers (if at all), and, of course, lack of student discipline. Simply put, students tend not to take religious school as seriously.
Because of this trend, many teachers come to us asking about ways to get their students more involved in the classroom. One of the most common suggestions we offer, and we see implemented with success, is the introduction of group projects in the classroom. Group projects allow students to take ownership of the subject matter in a way that typical instruction cannot. Working towards a common goal can be a great way to keep students engaged. During a group project, students may even forget that they are supposed to be learning!
Group projects within the classroom have a myriad of benefits beyond merely keeping students engaged, however. Collaboration within a group allows students to teach each other material, reinforcing concepts beyond basic instruction. Students enjoy learning from other students; it gives both students and teachers a break from typical classroom instruction that can feel refreshing and effective. Other benefits of group work in your classroom include teaching time management, communication, collaboration, and leadership skills. Skills like these are often difficult to teach in a traditional setting, so there is no better way to teach such skills than giving students real-life exposure to challenges that require collaboration and communication. Skills that are indirectly taught through group work are effective and relevant, even beyond the classroom.
Often, the results of group work are greater than the sum of its parts. There is nothing quite like seeing your class come together and work on some great project that can be shown off in your community!
Nearly any classroom lesson can be adapted to include more group work or projects. If you’d like some ideas on how to implement group projects into your lessons, feel free and contact your Fellow! | https://www.isjl.org/dec17-en-groupwork.html |
Medical Examiner
It is the mission of the Sheboygan County Medical Examiner’s Office to provide professional death investigation into the deaths reportable to the Sheboygan County Medical Examiner’s Office as it is applicable to the Wisconsin State Statutes and make a determination into the cause and manner of death.
Obtaining information by speaking with family members, nursing staff, physicians, neighbors, witnesses, and law enforcement
In deaths where law enforcement is involved, it is a collaborative effort of sharing investigation findings and knowledge. In some death investigations, more information is needed before a cause and manner of death can be made. An autopsy may be done and toxicology studies may be required to determine what kind and how much of certain medication is present in a person’s system. X-rays may be taken to determine if there are broken bones or if any foreign objects are present and the location. There are other tests available for specific inquiries.
Free viewers are required for some of the attached documents.They can be downloaded by clicking on the icons below.
| |
As the pandemic has accelerated digital initiatives for companies, many have made the shift to adaptable technology infrastructures and services, such as multi-cloud and SaaS. These types of offerings allow more flexibility to IT departments during times of change, enabling them to scale costs up and down easily.
About the author
Mallory Beaudreau is Customer Portfolio Director at Apptio.
This isn’t something that’s set to change any time soon. For example, findings from a Gartner report show that 80% of enterprises would categorize their business strategy as multi-cloud, while SaaS adoption is continuing at scale.
However, while the flexibility of these services has been championed by many IT leaders, a full understanding of the associated costs has not naturally followed. For example, using multiple cloud service providers (CSPs) can complicate cost visibility and allocation, while it is challenging for IT teams to keep up with monitoring usage levels for newly-adopted SaaS products.
This flexibility hinders leaders’ ability to establish a holistic view of the investments made as they struggle to understand whether they’re getting value for money, and how to optimize costs to suit the requirements of the business.
Accurate tracking of tech investments in cloud and SaaS seems to many to be a near-impossible task due to the constant reporting and manpower needed to deliver timely insights. However, a better understanding can be brought about through implementing disciplines such as FinOps and Technology Business Management (TBM). Through these frameworks, leaders can obtain full insights into where investments are being made, whether they are worthwhile, and initiate changes if not.
SaaS
As digital initiatives have become essential to everyday business, software-based services have sharply increased in popularity. SaaS technology introduces flexibility to an organization, which helps with situations like adapting quickly to working from home. Flexibility in the business has proven to be critical in times of uncertainty. Because of its effectiveness over the last year, SaaS is now used across entire businesses – meaning the scale of total usage and cost is broader than ever before.
This poses a few challenges for IT executives, as business units that are not overseen by the IT department are calling for more SaaS, and sometimes even taking matters into their own hands, purchasing services without IT’s knowledge. This creates more IT financial data spread throughout the business, hindering the ability of IT leaders to make informed technology investment decisions on SaaS, and leading to wasted spend.
There are two clear ways IT leaders can tackle this. Firstly, by introducing commonly-agreed procedures for the procurement and governance of SaaS across the business. Whether this is in the form of chargeback within the business, shared licenses across business units or something else, it’s key that IT leaders have knowledge of where SaaS is being purchased and how to find contract and usage data.
Secondly, IT leaders need tools that can automatically process SaaS-related data and provide insights on how to manage SaaS investment. For example, there may be cases where multiple versions of the same SaaS product are being used within a single business. Disciplines like TBM help leaders to have the right processes and tools in place so that they can readily understand why two licenses are needed (eg is one due to a compatibility issue for a certain team), and automatically assess usage against the contract. Without TBM practices in place, its all too easy for IT leaders to make investment decisions which don’t best serve the overall business needs of the organization.
Cloud
Cloud presents similar challenges due to its data complexity. For example, multi-cloud infrastructure allows IT organizations to use a mix of different services based on what suits a particular workload best. However, billing constructs differ between the CSPs, making it tough for IT leaders to make important direct comparisons that enable them to optimize their cloud investments.
At the same time, most public cloud costs are based on variable usage contracts rather than via fixed costs. In theory, this is beneficial as it allows costs to be reduced when cloud instances aren’t in use, but in practice this requires governance and a culture shift. Otherwise, money is spent on cloud services which aren’t actually in use. All of these leaves IT leaders with incredibly complex cost reports which traditional finance tools aren’t viable for. Manual reports take a huge amount of manpower to collate, analyze and distil actionable insights in order to gain any cost-benefit from the flexibility of cloud.
Frameworks such as FinOps can help businesses simplify the gathering and sorting of this data. This discipline can encourage leaders to treat cloud spend as a driver of business value, applying financial management processes which are specifically adapted to cloud. In practice, this means adopting practices such as tagging and grouping cloud cost information in a consistent way across CSPs. These in turn allow the organization to understand where the cloud spend is going, whilst ensuring less error when it comes to possible blind spots, particularly with the elaborate billing associated with a multi-cloud environment.
From these insights, businesses can ensure that investments in the cloud are appropriate to the benefit their flexibility brings. Utilizing FinOps best practices in this way decreases inefficient cloud spend and gives leaders more control over the associated costs. Furthermore, by understanding where investment in multiple CSPs is potentially being used inefficiently, leaders can choose to reinvest these costs in something that may be valuable for business development.
Taking the first step
Given that multi-cloud approaches are the way forward, leaders must understand the importance of technology cost transparency more than ever. With IT investments not only stretching across huge numbers of services, but also across multiple departments, it is now essential for businesses to evolve the way they are managing costs.
Traditional financing methods like spreadsheets cannot feasibly keep up with flexible IT systems, which is why adopting disciplines such as FinOps and TBM should become a priority for IT leaders. Through this practice, IT executives can ensure that their business reaps the benefits of flexible services in a sustainable and efficient manner without obstructing the information needed to make key decisions.
At TechRadar, we’ve featured the best business cloud storage. | https://erodtech.com/how-it-leaders-can-optimize-cloud-and-saas-spending/ |
IUCN and EFI have joined forces to present an open, high-level webinar and exchange on the New EU Forest Strategy for 2030. The webinar on 22nd September, organised via the SINCERE project and Integrate Network, will bring together key stakeholders interested in and contributing to the implementation of the Forest Strategy, to reflect on the...
Author: Gesche Schifferdecker (Gesche Schifferdecker)
Combining silviculture and ecology to benefit our forests – the Irish way
Ireland is one of the few countries in Europe that experienced almost complete deforestation in recent history with just over 1% forest cover remaining at the beginning of the 1900s. Since then, an impressive effort has been made by the State of Ireland and other stakeholders to increase forest cover – but the Irish plan...
Forest and nature conservation management in riparian forests – new handbook
It sounds like a paradise: Being the largest protected river basin in Europe, the transboundary Mura-Drava-Danube is about to become the first five-country (Austria, Slovenia, Hungary, Croatia and Serbia) biosphere reserve in the world under the auspices of UNESCO. The reserve covers an area of about 8,300 km2, which is comparable to more than one million soccer fields. Being extremely rich in biodiversity, it harbours high ecological and...
Protecting old-growth forests in Europe – new study out now
If you ask stakeholders all over Europe “What should we do with our old-growth forests?”, you can expect eyebrows to be raised. Discussions start with questions continuing to circle at policy level and in academia on how old-growth forest should be defined. Similarly, we face unresolved issues on how to implement the targets of the...
First Integrate Communication Workshop successfully organized
How should we best manage our forests? This is the guiding question behind the virtual communication workshop series the secretariat of the European Integrate Network is initiating. Being aware that there is no single answer to this question, in our first training on “Building a Narrative”, we engaged with 19 stakeholders from forest policy, management,...
Study on forest use in Bonn – featured by German television
Researchers at the European Forest Institute have been investigating the Kottenforst in Bonn, an urban forest, for some time. This allowed them to compare how visitor numbers have changed in the Corona lockdown compared to before. Result: There are definitely more people on the road. Why is that? And what does this mean for the...
Summary of Webinar “Policy challenges of integrating biodiversity conservation in forest management”
On March 30, the European Network Integrate hosted the webinar “Policy challenges of integrating biodiversity conservation in forest management – the way forward”, gathering over 100 attendees. The webinar brought together forest policy experts from the French, German, Italian and Swiss governments to compare country perspectives and lessons learned on how to advance forest biodiversity conservation...
Check out our new Integrate flyer
The European Integrate Network promotes cross-sectoral learning and cooperation across country borders on successful approaches for enhancing biodiversity conservation as an integral part of forest management practices. It is also our aim to to act as an open, pro-active interface between research, policy, administrations and practice implementation. Finally, we provide stakeholders a platform for on-site...
First National Meeting of Integrate Network in Spain
On the 22nd of February 2021, the first meeting of the Spanish partners in the Integrate Network was held. It was a great success in terms of participation, with the attendance of 16 people from different organizations such as the national and regional public administration, private companies, universities and research centres. As a first get-together,...
What’s on the policy horizon for forest ecosystem services?
In the webinar on 7 December, jointly organized by the SINCERE project and the Integrate Network, a diverse expert panel discussed implications for the provision of forest ecosystem services (FES) in the light of new EU Policies: the Green Deal and the Biodiversity Strategy to 2030 as well as the eagerly anticipated EU Forest Strategy.... | https://integratenetwork.org/author/gesche-schifferdeckerefi-int/page/2/ |
“The world is changing so fast these days, from technology to climate to energy to politics; we don’t really know what challenges the next generation will face and what tools will exist to help solve them,” said SFPUC Civil Engineer, Madelyn C. Rubin. “A STEM education focuses on how to learn, a skill that is relevant no matter what that future looks like.”
For Rubin, an education in STEM is critical to making a difference and offers the tools to improve the world. As a Civil Engineer at Hetch Hetchy Water and Power, her typical day varies. Some weeks she is mostly at her desk working on a design or researching a project. Other times, she is out in the field for inspections or construction. To Rubin, this balance allows for productive work and a breath of fresh air.
In addition to her daytime work responsibilities, Rubin enjoys participating in the annual Dinner with a Scientist event. “This event, and others like it, directly supports local young people in their education and demonstrates how fun STEM related fields can be,” shared Rubin. “Kids are so impressionable and it’s refreshing to see their level of curiosity and excitement. I am personally passionate about inspiring those qualities and finding ways to encourage exploring them.”
As one of several female engineers in the Hetch Hetchy Water and Power department based in Moccasin, Rubin advises middle and high school students to be open to a career in the utilities industry. For her, the utility industry is the foundation of a healthy and thriving society.
“They serve the community by providing essential infrastructure such as water and power while focusing on public health and environmental impacts,” she said. “We need more innovative and creative thinkers to provide sustainable solutions in order to continue the growth and resilience of our communities. It’s a great option for anyone interested in solving problems that have a direct impact on a local or global level.”
Rubin believes the annual Dinner with a Scientist event is important because it is organized around supporting students and their teachers. One of her first observations as an event volunteer was experiencing that student and teacher relationship.
“Teachers join at the tables and engage in the conversation along with the kids, encouraging their questions and reassuring their confidence. I had an eighth grade math teacher who provided that kind of indirect mentorship, so I can first-hand respect how influential that role can be in a young person’s life. This event is an opportunity to support local educators in how they can impact their students,” shared Rubin.
Rubin shared that she continues to participate in this event because it exposes students to career opportunities within their own community and offers a perspective of what can be possible, even in a small town. | https://sfpucnewsroom.com/community/spotlight-madelyn-rubin/ |
We are well acquainted with some optical phenomena such as reflection an refraction; simply take a look at an object half-submerged in a glass of water. But light has other (many other) trick under its sleeve. One very useful trick is total internal reflection. As the name suggests, this phenomenon happens when a ray of light incides in a medium boundary at a very particular angle (known as the critical angle) with respect to the normal to the surface. If the refractive index is lower on the other side of the boundary the light cannot pass through and instead it is all reflected, as if it had hit a perfect mirror.
Total internal reflection is widely used I the operation of optical fibres and devices such as endoscopes and in telecommunications, rain sensors in cars and some multi-touch displays. | https://jrogel.com/total-internal-reflection-sci-advent-day-18/ |
Hi yall!
Got started on this kinda late and submitted at just the last minute, but here's my submission for the 2019 compo. It's a top-down 8-way scrolling action game based on the concept of "a projectile that let's you play Snake". The engine is a bit rough but works overall pretty well, I think I want to polish it up a bit now that the contest is over, just to fix some of the attribute bugs.
A bunch of content also had to get dropped to meet the deadline, like sound effects, enemies shooting fireballs, the projectile being unable to run into own trail. But even still I hope people enjoy it!
Alien Vegetables have kidnapped your dog! But they left something behind, a technological frisbee that's key to the rescue. Veggie Invaders in a top-down scrolling adventure featuring cute graphics, fun music, and fast-paced action.
Controls: D-pad to move. A or B button to throw your frisbee or turn it while in motion.
Credits:
art by Chris Hernandez
music by Anthony Swinnich
programming by Dustin Long
Veggie Invaders
Moderator: Moderators
Post Reply
4 posts • Page 1 of 1
Veggie Invaders
- Attachments
-
- veggie-invaders.nes
- (64.02 KiB) Downloaded 250 times
Re: Veggie Invaders
I love the visuals. And the 4-way scroller is impressive. I'll try to find some time to try how it plays soon.
Good job,
Good job,
- ShiningBZH
- Posts: 3
- Joined: Sun Mar 01, 2020 11:56 am
Re: Veggie Invaders
Hello , i like your game but seems that the DB-15 Controller port isn't working on it !
Re: Veggie Invaders
I love the idea, very original! I'll try it ASAP on my NES ! | http://forums.nesdev.com/viewtopic.php?f=35&t=19799 |
Ultimate Frisbee forum.
January 28, 2020, 02:56:40 PM
Welcome,
Guest
. Please
login
or
register
.
1 Hour
1 Day
1 Week
1 Month
Forever
Login with username, password and session length
The ultimate forum for talking about Ultimate Frisbee. Aimed at bringing new life to the world of Ultimate Frisbee discussions, UltiTalk.Com (UT) combines both regional and international topics in one friendly place. So say hello to UT: The International Ultimate Frisbee forum.
Register
your
FREE
UltiTalk.Com account to reveal the
members-only
Shout Box, Chatroom, and more!
Suggestions or comments?
Post them on the
Feedback
board.
Brazilian
Chinese-Simplified
Danish
Dutch
English
Finnish
French
German
Greek
Hebrew
Hungarian
Indonesian
Italian
Japanese
Norwegian
Polish
Portuguese
Romanian
Russian
Spanish
Swedish
Thai
Turkish
Ukrainian
Vietnamese
Home
Help
Search
Calendar
Members
Links
Gallery
Login
Register
UltiTalk.Com
>
General
>
Ulti Strategy
>
"Goal Line Stand"
Pages: [
1
]
Go Down
« previous
next »
Bookmark
|
Print
Author
Topic: "Goal Line Stand" (Read 3676 times)
0 Members and 1 Guest are viewing this topic.
Candleman
Newbie
Karma: +0/-0
Offline
United States
Posts: 4
"Goal Line Stand"
«
on:
July 07, 2009, 11:30:53 AM »
We've all seen situations where the opposing team has the disc essentially on our goal line (within say one meter). Be it a huck that was slightly too short or a horrible turnover, we're stuck in a pretty dire defensive situation. Essentially any forward throw will be a point, so it seems like this should be a gimme for the O.
I've only been involved in one situation where the D pulled it off (no time out called). A super intense mark (mine, w00t!) on a very un-chilly handler resulted in a hand block.
Now the D has one main advantage that they don't have to worry about a deep throw and they can get at least two D bodies on anything high over the top.
There are a few questions:
1. What are the organized ways of setting up a D in this situation?
2. How do you get your line motivated to expend the immense effort with only a small chance of being successful? (Assuming this is not tournament finals or something similar)
3. Is it even worth the effort? Especially if you're up or the score is low.
Logged
"Let's recruit some emo kids."
"Yeah, they would make great cutters."
rrudnic
Full Member
Karma: +13/-3
Offline
United States
Posts: 223
Re: "Goal Line Stand"
«
Reply #1 on:
July 07, 2009, 02:26:57 PM »
For 1 I would say hard force to one side, hopefully they are near one of the sides so you can trap, as the mark you have to prevent the break and trust your D to be in position. Assuming a vert the front guy will be reading the cutters and helping cover the in cuts one of the last but not very last players in the stack will be break side looking for over the top throws.
For 2 they should be playing that hard all the time, you don't just turn it up because they got close to the endzone or its an important point you play that hard all the time.
For 3 I would argue if its early in the game like the first third maybe even first half particularly if its close then its probably not worth the effort. Theres a lot of game left that 1 point probably isn't the game breaker. However if you D it and then score it back it is a pretty huge momentum thing.
I would add though that if the O fails to score from that close than it was probably not hard D so much as bad O. I would consider that almost automatic since the O has the advantage to begin with they probably have several set plays, they can Iso anyone, the D might need to recover if it was a huck. If my team is that close and doesn't score than you better believe there will be some yelling and cussing going on.
Logged
Pages: [
1
]
Go Up
Bookmark
|
Print
« previous
next »
Facebook Comments
Jump to:
Please select a destination:
-----------------------------
Regional
-----------------------------
=> Australasia
=> North America
=> South America
=> Europe
=> Asia
=> Africa
-----------------------------
General
-----------------------------
=> Ulti Talk
=> Ulti Media
=> Ulti Strategy
=> Ulti Development
=> Ulti Events
=> Not Ulti
-----------------------------
UltiTalk.Com
-----------------------------
=> Features
=> Feedback
-----------------------------
Original
-----------------------------
=> The AUDL
=> The Huddle
Advertise on UT!
Register
your
FREE
UltiTalk.Com account to remove these ads!
Powered by SMF 1.1.19
|
SMF © 2006-2011, Simple Machines
|
Sitemap
UltiTalk.Com is the #1 forum and bulletin board for talking about, chatting about and discussing Ultimate Frisbee.
Please help spread the word to promote an international community of Ultimate Frisbee players, coaches and teachers.
Site Design By
MWM Consulting, Inc.
Google last visited this page January 18, 2020, 11:51:08 PM
Loading... | http://www.ultitalk.com/index.php?topic=877.0 |
The sociological perspective is defined by three philosophical traditions (or "paradigms"): structure-functionalism, Marxism, and symbolic interactionism. Structure-functionalism focuses on how society is organized and how social institutions meet the needs of people living within a collectivity. The Marxian paradigm guides inquiries into the use and misuse of power within and across social systems. Symbolic interactionism focuses on how individuals influence and are influenced by society. It guides investigations into how the rules of society are re-created everyday through our interactions with one another.
The following introduction to these paradigms relies in part upon materials found in
The Structure of Sociological Theory,
written by Jonathan H. Turner. To help us learn about these paradigms, we will apply them to an example of gender inequality after they are described in this introduction.
Structure-Functionalism
Structure-functionalism relies upon an "organic" analogy of human society as being "like an organism," a system of interdependent parts that function for the benefit of the whole. Thus, just as a human body consists of parts that function as an interdependent system for the survival of the organism, society consists of a system of interdependent institutions and organizations that function for the survival of the society.
Relying upon the successes of biologists in understanding the human body, functionalists took a similar approach to understanding human social systems. Social systems were dissected into their "parts," or institutions (family, education, economy, polity, and religion), and these parts were examined to find out how they worked and their importance for the larger social system. The rationale was that if scientists could understand how institutions worked, then their performance could be optimized to create an efficient and productive society. This approach as proved to be very successful and is the predominant philosophy guiding macro-level sociology today.
Structure-functionalism arose in part as a reaction to the limitations of utilitarian philosophy, where people were viewed as strictly rational, calculating entrepreneurs in a free, open, unregulated, and competitive marketplace. The tenet of functionalism, and the fundamental building block of all sociology, is that people behave differently in groups than they do as individuals. Groups have "lives of their own," so to speak. Or, as you might hear from a sociologist, "the whole is greater than the sum of its parts." Anyway, the point is, that just as the "invisible hand of order" can guide economic relations, "social forces" can guide social relations, and thus yield for society very positive outcomes (volunteerism, democracy, laws, moral and ethical standards for behavior, family and educational systems, communities) and very negative outcomes (discrimination, organized crime, moral decay, warfare, poverty).
The idea of the functionalists was to create a science of society that could examine the parts of human social systems and make them work for the betterment of all. And it is the task of sociologists to use scientific principles to help create the best form of society possible.
Listed below are the central tenets of the functionalist approach to understanding human social systems. We will use these tenets throughout this course to gain a functionalist perspective on social issues facing rural America today.
Society as a system of interrelated parts functioning for the good of the whole.
Keep in mind that functionalism is always oriented toward what is good for the whole. As we examine different philosophical foundations of sociology, we will note the advantages and disadvantages of this perspective.
All social systems have four key functions: Adaptation, Goal-Attainment, Integration, Latency.
These functional imperatives roughly correspond to the five institutions of human societies (economics, politics, family/education, and religion). By understanding which functional imperative is most closely related to current issues of rural America, we can understand the importance of the issue and its likely impact on the well-being of rural America.
Social action takes place within a social system of cultural norms and institutional structures.
In Sociology 130, we will use structure-functionalism primarily as a guide for understanding macro-level (societal) issues. And, although structure-functionalism is well equipped to analyze and understand societal conflict, we will use it mainly for understanding how social order is possible.
Marxism
Although Karl Marx's idea of a communist utopian society failed due to an inadequate understanding of human motivation and organization, his identification of potential problems with human social systems still is a crucial element of all the social sciences. His hypotheses that human societies can experience sufficient organized and intentional exploitation by powerful elites to lead to their collapse have received enough support that citizens should be aware of these potential problems and maintain a constant vigil against their becoming too severe.
Listed below are the central tenets of the Marxian approach to understanding human social systems. We will use these tenets throughout this course to gain a Marxian perspective on social issues facing rural America today.
Society as a system of competing parts in conflict for scarce resources.
From the perspective of Marxism, the fundamental processes of society are competition and conflict, rather than cooperation for the good of the whole, which we noted (with qualifications) was the emphasis in structure-functionalism.
All social systems have a small minority of powerful elites.
For Marx, these persons/organizations were those most closely linked with the means of production: the owners of large industries.
Social action takes place within an arena of conflict and exploitation between dominant and secondary segments of society.
With the Marxian approach, it is instructive to identify the dominant and secondary segments that affect and will be affected by the outcome of social action regarding current issues. Using Marxism, we anticipate that dominant segments will use their power to exploit resources from secondary segments of society.
Marx's Dialectical Materialism
To understand Marxian social philosophy, it is instructive to review its underlying principle, which is dialectical materialism. The dialectic consists of three parts: the thesis (the status quo, or our current understanding of "reality"), the antithesis (a contradiction to the status quo, or a recognized flaw in our current understanding of "reality"), and the synthesis (a suggested alternative to the status quo, or an improved understanding of "reality"). In one sense, the dialectic refers to inherent, inevitable conflict. Thus, citizens must inevitably wrestle with society as it is, the recognized flaws in society, and suggested alternatives for an improved society. In another sense, the dialectic is a method for achieving progress. Thus, citizens can use the dialectical way of thinking to constantly improve society by recognizing and attempting to overcome its flaws.
Marx focused on material conditions (e.g., food, clothing, housing, access to health care and education). For Marx, the dialectic represented inherent conflict between the means and relations of production. Owners were forced to exploit labor to achieve the competitive edge over their rivals in the capitalist economy, but in the process, destroyed the very source of their profit: labor.
Thus, Marx used dialectical materialism to understand capitalist society and its flaws for the purpose of suggesting an alternative that would create a better society.
Thesis: Means of production. The status quo was capitalist society, which required the lowest possible labor costs.
Antithesis: Relations of production. Marx witnessed first-hand the horrific conditions of manual labor in industrialized England in the mid-19th century.
Synthesis: Communism. To eliminate poverty and the misuse of power in capitalist society, Marx proposed a society that would end the holding of private property--people would work for the common good and share in the fruits of their labor.
Marx's understanding of societies, the people that live in them, and capitalist economy was sufficiently flawed that his suggested solution to capitalism was itself inherently flawed. Marxian social philosophy is valuable today, however, because it reminds us of the potential exploitation of the less powerful by the more powerful and of the need for the less powerful to be mindful of this potential. "We are so trusting in our ignorance," says Mrs. LaVon Griffieon in her essay,
Food for Thought.
She has learned first-hand, as a "farm wife living in Iowa," that the forces of multinational agribusiness organizations might create a structure of agriculture that will be detrimental, rather than beneficial, to the well-being of rural society.
Symbolic Interactionism
Where did society come from, anyway? Well, from us! From the perspective of symbolic interactionism, society is in a constant state of re-creation through interaction and negotiation of meanings. We created the rules we live by, and, importantly, we re-create these rules everyday through our interactions with one another. Mostly, societies are conservative with respect to social change. But, our redefining of: 1) the symbolic meanings we attach to things and events, 2) our sense of morality and ethics, and 3) what we choose to value have important implications for the rules we create and the ways we choose to live with one another.
Listed below is a very abbreviated outline of the central tenets of the symbolic interactionist approach to understanding human social systems. We will use these tenets throughout this course to gain a symbolic perspective on social issues facing rural America today.
Key concepts: definition of the situation, perception, social construction of reality, morality.
From the symbolic interactionist perspective, morality, ethics, values, even reality are not "given," we create them, through our interactions with one another. Reality is a marketplace of ideas, where not everyone has an equal say-so.
Social action is influenced by person's beliefs, attitudes, perceptions, and negotiations of meanings.
The rules are open for grabs. If you do not like your society: work hard to change it!
Example: Gender Role Inequalities
For the same job, job experience, and education, women typically earn significantly less income than their male counterparts. This gap in income earnings is one example of gender role inequalities. The question is, "So What?" Are these inequalities bad for society as a whole. If so, how do we change them? To provide some experience in applying sociological theory to issues facing contemporary society, the following example interprets gender role inequalities from the perspectives of structure-functionalism, Marxism, and symbolic interactionism.
Some important definitions and concepts:
SOCIAL STRATIFICATION: Positions in a social system are organized into layers with resultant inequalities.
SOCIALIZATION: Learning of cultural norms through language and behavior.
Language takes on a realist quality such that it influences individual behavior.
Behavior toward persons is based in part on their gender
Structure Functionalism
Structure functionalism focuses on what is good for the whole of society. The SF perspective argues that social stratification can be good for society if it motivates persons in lower SES positions to better themselves so they can experience upward social mobility.
Gender role inequalities have functions and dysfunctions.
Society both benefits and suffers from gender role relationships.
The "balance" of functions and dysfunctions determines social action.
If gender role inequalities, on the whole, are deemed dysfunctional, then macro-level changes in norms are introduced.
Affirmative action and gender role inequalities?
Marxism
Conflict theory focuses on the exploitation of power and the means to achieve power in society.
Gender role inequalities reflect exploitation of dominant (male) segments of society over secondary (female) segments of society.
Females may be alienated from society due to gender role inequalities.
Social change requires a move from false consciousness to class consciousness.
Formal and informal organizations aimed at raising consciousness of gender role inequalities.
Symbolic Interactionism
Symbolic interactionism focuses on the effect of language and behavior and how it affects and is affected by groups, organizations, and society.
Gender role inequalities are learned through language.
Behavior toward persons is based in part on their gender.
Society, and therefore language, is dynamic--in a constant state of creation and negotiation of rules.
Individual impacts on gender role inequalities? | http://www.soc.iastate.edu/sapp/SocPhil130.html |
Emergencies: Disaster Risk Reduction
Emergency and DRR are also an integral components of the FRDP development agenda. Our approach to disaster resilience is built on promotion, capacity development, and institutional support to community organizations which enables them in coping with natural disasters. FRDP has responded to COVID-19, floods (2011, 2012, 2014, and 2020), droughts (2014 to present), and other emergencies to the poorest of the poor individuals in Pakistan.
In persuasion of developing skills and capacities, the organization has worked with the government, civil society organizations, and academia to train the youth for the future. FRDP also contributes at large during emergencies through its sustainable philanthropic donations. We also helped in developing preparedness and disaster plans. Since 2019, FRDP has been responding to COVID-19 operations in Sindh, Pakistan. Currently, our organization steers one of the largest local networks on disaster named disaster resilience forum since 2016. At the policy level, FRDP maintains its role in provincial, national and global platforms and networks such as the Start network, National Humanitarian network, and Disaster Resilience Forum, etc.
Pakistan is a country that is prone to a variety of natural disasters, including earthquakes, floods, and cyclones. These disasters can have devastating effects on communities, causing loss of life, damage to infrastructure, and displacement of people. It is crucial that the country is prepared to handle these emergencies and mitigate their impacts as much as possible.
One key aspect of emergency disaster risk reduction in Pakistan is building resilience in communities. This can involve measures such as constructing buildings that are resistant to earthquakes, creating early warning systems for floods, and developing evacuation plans for cyclones. By investing in these kinds of measures, communities can be better prepared to withstand the effects of disasters and recover more quickly when they do occur.
Another important aspect of emergency disaster risk reduction in Pakistan is ensuring that the necessary resources are in place to respond to emergencies. This includes having trained personnel, such as paramedics and rescue workers, as well as equipment and supplies like ambulances, medical supplies, and search and rescue tools. It is also important to have effective communication systems in place to coordinate response efforts and provide information to the public.
In addition to these practical measures, it is also important to raise awareness about emergency disaster risk reduction in Pakistan. This can involve educating people about the types of disasters that are common in their region, as well as what to do before, during, and after a disaster. It can also involve working with local communities to identify their specific needs and develop customized preparedness plans.
There are a number of organizations in Pakistan that are working to promote emergency disaster risk reduction and provide support in the event of an emergency. These include the National Disaster Management Authority (NDMA) and the Pakistan Red Crescent Society (PRCS). The NDMA is responsible for coordinating the country’s disaster management efforts, while the PRCS provides humanitarian assistance and disaster response services.
If you would like to get involved in supporting emergency disaster risk reduction in Pakistan, there are a number of ways you can do so. One option is to donate to organizations that are working on the ground to support communities affected by disasters. You can also consider volunteering your time or skills to assist with response efforts. Finally, you can raise awareness about the importance of disaster preparedness in your own community, and encourage others to get involved as well.
By working together, we can help Pakistan become more resilient to the impacts of natural disasters and better equipped to handle emergencies when they do occur. | https://www.frdp.org.pk/emergencies-disaster-risk-reduction-in-pakistan/ |
In Resampling Methods, we discussed the concept of Cross-Validation in detail. Let’s recall that Cross-validation is a resampling technique for model evaluation where multiple models are fit on a subset of data, and the model is evaluated on the complementary subset of the data. We also discussed the various types of cross-validation. We concluded that despite having some limitations, K-fold cross-validation is the most popular cross-validation technique in the data science community.
In this post, we will explore the applications of cross-validation. The applications of cross-validation fall majorly into three contexts.
- Performance Estimation
- Model Selection
- Hyperparameter Tuning
In this post, we will look into these contexts in detail and will look at their implementation in python as well.
Performance Estimation
Cross-Validation can be used to estimate the performance of a learning algorithm.
In case of a regression problem, estimates of Mean Square Error(MSE), Root Mean Square Error(RMSE), Mean Absolute Error(MAE), etc. is used as a performance indicator of an algorithm. On the other hand, in a classification setting, one may be interested in the estimates of accuracy, precision, recall, or an F-score to evaluate model performance.
One can use K-fold cross-validation to train a model on k-1 fold, and validate the model on the remaining one fold of data to evaluate the estimate of test error. The cross-validation process is then repeated k times, with each of the k subsamples used exactly once as the validation data. The estimates of test errors so evaluated can then be averaged to produce a single estimation of test error.
The consensus in the data science community is to take the value of k as 10. Using 10-fold cross-validation, one repeatedly uses 90% of the data to build a model and test its accuracy on the remaining 10%. The resulting average test error is likely somewhat of an underestimate for the true test error when the model is trained on all data and tested on unseen data. Still, in most cases, this estimate is reliable, mainly if the amount of training data is sufficiently large, and if the unseen data follows the same distribution as the training data.
Let’s take an example. In the classic Auto-MPG dataset, our goal is to find miles per gallon for a new vehicle based on the power of the vehicle, in horsepower. Let’s create two simple regression models. A linear model where the mpg depends on the horsepower linearly and a polynomial regression model where mpg depends on the “horsepower” as well as “horsepower^2”. We applied ten-fold cross-validation and evaluated the average MSE on both the model to be 27.43 and 21.23, respectively. Clearly, in this simplistic example, it is evident that the polynomial regression model with degree 2 performs better.
Model Selection
When trying to solve a machine learning problem, we explore different algorithms that can solve the given problem. The goal here is to find the best algorithm that solves our problem well.
Model selection is a process of selecting the best model out of various candidate models that will be used in the production setting.
There may be various criteria(accuracy, complexity, running time, etc.) for selecting a model, but one of the most important criteria is the model performance.
Using cross-validation, one can easily determine the model performance of each of the candidate models for a given problem. After the model performance for each model is available, we can make judgments keeping other constraints( model complexity, flexibility, interpretability, etc.) in mind.
In the classic Auto-MPG dataset, our goal is to find miles per gallon for a new vehicle based on the power of the vehicle, in horsepower. Let’s create three simple regression models.
1. A linear regression model, where y= f(x) +c
2. A polynomial regression model of degree 2, where y = f(x,x^2) + c
3. A polynomial regression model of degree 3, where y = f(x,x^2,x^3) + c
Where x is the horsepower and y is mpg.
We applied ten-fold cross-validation and evaluated the average MSE on all the three models to be 27.43, 21.23, and 21.33, respectively. Let’s assume that these three models are the candidates for our problem. Then by keeping model performance, model complexity, interpretability in mind, we can make model number 2( polynomial regression with degree 2) as a rational choice for our problem.
Model Tuning
In machine learning models, there are some parameters, that are external to the model. The value of these parameters has to be provided before the learning process begins. These parameters are called hyperparameters. Typical examples include C, kernel, and gamma for Support Vector Classifier, alpha for Lasso, etc.
There are many possible candidates for hyperparameters, and we want to select hyperparameters that result in the best model performance. Using Cross-Validation, we can search the collection of hyperparameters and look for the best cross-validation score. Figure 1 illustrates the hyperparameter tuning process.
In Scikit-learn, two generic approaches to sampling search candidates are provided: for given values, GridSearchCV exhaustively considers all parameter combinations, while RandomizedSearchCV can sample a given number of candidates from a parameter space with a specified distribution.
In this example, which is taken from scikit-learn documentation, hyperparameter tuning is explained using GridSearchCV. It fits all the possible combinations of parameter values on the dataset and retains the best combination.
Summary
In this article, we have shown the various applications of Cross-Validation and then explained them through examples. You may explore the following resources to deep dive into Cross-Validation. | https://ravedata.in/machine-learning/the-applications-of-cross-validation/ |
Download Wealth Poverty And Politics Book PDF
Download full Wealth Poverty And Politics books PDF, EPUB, Tuebl, Textbook, Mobi or read online Wealth Poverty And Politics anytime and anywhere on any device. Get free access to the library by create an account, fast download and ads free. We cannot guarantee that every book is in the library.
Wealth, Poverty and Politics
- Author : Thomas Sowell
- Publisher :Unknown
- Release Date :2016-09-06
- Total pages :576
- ISBN : 9780465096770
Summary : In Wealth, Poverty, and Politics, Thomas Sowell, one of the foremost conservative public intellectuals in this country, argues that political and ideological struggles have led to dangerous confusion about income inequality in America. Pundits and politically motivated economists trumpet ambiguous statistics and sensational theories while ignoring the true determinant of income inequality: the production of wealth. We cannot properly understand inequality if we focus exclusively on the distribution of wealth and ignore wealth production factors such as geography, demography, and culture. Sowell contends that liberals have a particular interest in misreading the data and chastises them for using income inequality as an argument for the welfare state. Refuting Thomas Piketty, Paul Krugman, and others on the left, Sowell draws on accurate empirical data to show that the inequality is not nearly as extreme or sensational as we have been led to believe. Transcending partisanship through a careful examination of data, Wealth, Poverty, and Politics reveals the truth about the most explosive political issue of our time.
Oil Wealth and the Poverty of Politics
- Author : Miriam R. Lowi
- Publisher :Unknown
- Release Date :2009-11-12
- Total pages :228
- ISBN : 9780521113182
Summary : How can we make sense of Algeria's post-colonial experience - the tragedy of unfulfilled expectations, the descent into violence, the resurgence of the state? Oil Wealth and the Poverty of Politics explains why Algeria's domestic political economy unravelled from the mid-1980s, and how the regime eventually managed to regain power and hegemony. Miriam Lowi argues the importance of leadership decisions for political outcomes, and extends the argument to explain the variation in stability in oil-exporting states following economic shocks. Comparing Algeria with Iran, Iraq, Indonesia and Saudi Arabia, she asks why some states break down and undergo regime change, while others remain stable, or manage to re-stabilise after a period of instability. In contrast with exclusively structuralist accounts of the rentier state, this book demonstrates, in a unique and accessible study, that political stability is a function of the way in which structure and agency combine.
Savage Economics
- Author : David L. Blaney,Naeem Inayatullah
- Publisher :Unknown
- Release Date :2010-01-04
- Total pages :248
- ISBN : 9781135265045
Summary : This innovative book challenges the most powerful and pervasive ideas concerning political economy, international relations, and ethics in the modern world. Rereading classical authors including Adam Smith, James Steuart, Adam Ferguson, Hegel, and Marx, it provides a systematic and fundamental cultural critique of political economy and critically describes the nature of the mainstream understanding of economics.
Behind the Development Banks
- Author : Sarah Babb
- Publisher :Unknown
- Release Date :2009-08-01
- Total pages :336
- ISBN : 9780226033679
Summary : The World Bank and other multilateral development banks (MDBs) carry out their mission to alleviate poverty and promote economic growth based on the advice of professional economists. But as Sarah Babb argues in Behind the Development Banks, these organizations have also been indelibly shaped by Washington politics—particularly by the legislative branch and its power of the purse. Tracing American influence on MDBs over three decades, this volume assesses increased congressional activism and the perpetual “selling” of banks to Congress by the executive branch. Babb contends that congressional reluctance to fund the MDBs has enhanced the influence of the United States on them by making credible America’s threat to abandon the banks if its policy preferences are not followed. At a time when the United States’ role in world affairs is being closely scrutinized, Behind the Development Banks will be necessary reading for anyone interested in how American politics helps determine the fate of developing countries.
Poverty as Ideology
- Author : Andrew Martin Fischer
- Publisher :Unknown
- Release Date :2018-12-15
- Total pages :336
- ISBN : 9781786990471
Summary : Winner of the International Studies in Poverty Prize awarded by the Comparative Research Programme on Poverty (CROP) and Zed Books Poverty has become the central focus of global development efforts, with a vast body of research and funding dedicated to its alleviation. And yet, the field of poverty studies remains deeply ideological and has been used to justify wealth and power within the prevailing world order. Andrew Martin Fischer clarifies this deeply political character, from conceptions and measures of poverty through to their application as policies. Poverty as Ideology shows how our dominant approaches to poverty studies have, in fact, served to reinforce the prevailing neoliberal ideology while neglecting the wider interests of social justice that are fundamental to creating more equitable societies. Instead, our development policies have created a ‘poverty industry’ that obscures the dynamic reproductions of poverty within contemporary capitalist development and promotes segregation in the name of science and charity. Fischer argues that an effective and lasting solution to global poverty requires us to reorient our efforts away from current fixations on productivity and towards more equitable distributions of wealth and resources. This provocative work offers a radical new approach to understanding poverty based on a comprehensive and accessible critique of key concepts and research methods. It upends much of the received wisdom to provide an invaluable resource for students, teachers and researchers across the social sciences.
Wealth, Poverty, and Human Destiny
- Author : Doug Bandow,David Schindler
- Publisher :Unknown
- Release Date :2014-05-06
- Total pages :350
- ISBN : 9781497646803
Summary : The rapid spread of the liberal market order across the globe poses a host of new and complex questions for religious believers—indeed, for anyone concerned with the intersection of ethics and economics. Is the market economy, particularly as it affects the poor, fundamentally compatible with Christian moral and social teaching? Or is it in substantial tension with that tradition? In Wealth, Poverty, and Human Destiny, editors Doug Bandow and David L. Schindler bring together some of today’s leading economists, theologians, and social critics to consider whether the triumph of capitalism is a cause for celebration or concern. Michael Novak, Richard John Neuhaus, Max Stackhouse, and other defenders of democratic capitalism marshal a number of arguments in an attempt to show that, among other things, capitalism is more Christian in its foundation and consequences than is conceded by its critics—that, as Stackhouse and Lawrence Stratton write, “the roots of the modern corporation lie in the religious institutions of the West,” and that, as Novak contends, “globalization is the natural ecology” of Christianity. The critics of liberal economics argue, on the other hand, that it is historically and theologically shortsighted to consider the global capitalist order and the liberalism that sustains it as the only available option. Any system which has as its implicit logic that “stable and preserving relationships among people, places, and things do not matter and are of no worth,” in the words of Wendell Berry, should be regarded with grave suspicion by religious believers and all men and women of goodwill. Bandow and Schindler take up these arguments and many others in their responses, which carefully consider the claims of the essayists and thus pave the way for a renewed dialogue on the moral status of capitalism, a dialogue only now re-emerging from under the Cold War rubble. The contributors’ fresh, insightful examinations of the intersection between religion and economics should provoke a healthy debate about the intertwined issues of the market, globalization, human freedom, the family, technology, and democracy.
Why Nations Fail
- Author : Daron Acemoğlu,James A. Robinson
- Publisher :Unknown
- Release Date :2012
- Total pages :529
- ISBN : 9780307719218
Summary : An award-winning professor of economics at MIT and a Harvard University political scientist and economist evaluate the reasons that some nations are poor while others succeed, outlining provocative perspectives that support theories about the importance of institutions.
The Wealth and Poverty of Cities
- Author : Mario Polèse
- Publisher :Unknown
- Release Date :2019-09-02
- Total pages :229
- ISBN : 9780190053734
Summary : That some cities are vibrant while others are in decline is starkly apparent. In The Wealth and Poverty of Cities, Mario Polèse argues that focusing on city attributes is too narrow. Cities do not control the basic conditions that determine their success or failure as sources of economic growth and well-being. Nations matter because successful metropolitan economies do not spring forth spontaneously. The values, norms, and institutions that shape social relationships are national attributes. The preconditions for the creation of wealth-the rule of law, public education, and sound macroeconomic management among the most fundamental-are the responsibility of the state. By considering national fiscal and monetary policies and state policies governing the organization of cities, this book disentangles two processes: the mechanics of creating wealth and the mechanics of agglomeration or capturing wealth. Polèse explains the two-stage process in which the proper conditions must first be in place for the benefits of agglomeration to fully flower. Polèse interweaves evocative descriptions of various cities, contrasting cities that have been helped or hurt by local and national policies wise or ill-advised. From New York to Vienna, Buenos Aires to Port au Prince, the cities come to life. Throughout the book Polèse highlights four factors that help explain strengths and weaknesses of cities as foci of economic opportunity and social cohesion: institutions, people, centrality, and chance. The result is a nuanced and accessible introduction to the economy of cities and an original perspective on what needs to improve. Cities that have managed to produce livable urban environments for the majority of their citizens mirror the societies that spawned them. Similarly, cities that have failed are almost always signs of more deep-rooted failures. If the nation does not work, neither will its cities.
The Economics of Poverty, Inequality and Wealth Accumulation in Mexico
- Author : M. Székely
- Publisher :Unknown
- Release Date :1998-09-21
- Total pages :282
- ISBN : 9780230372610
Summary : The aim of this book is to understand why despite a considerable increase in average income in Mexico during the 1984-1992 period of economic liberalization, the conditions of the poorest of the poor deteriorated and income inequality increased. To explain why some individuals were able to take advantage of the opportunities which the economy was generating, while others were prevented from doing so, the author suggests some methodology to extract additional information from poverty and inequality measures, and test the main theories of household saving behaviour.
The Quest for Cosmic Justice
- Author : Thomas Sowell
- Publisher :Unknown
- Release Date :2001-06-30
- Total pages :224
- ISBN : 9780743215077
Summary : This book is about the great moral issues underlying many of the headline-making political controversies of our times. It is not a comforting book but a book about disturbing and dangerous trends. The Quest for Cosmic Justice shows how confused conceptions of justice end up promoting injustice, how confused conceptions of equality end up promoting inequality, and how the tyranny of social visions prevents many people from confronting the actual consequences of their own beliefs and policies. Those consequences include the steady and dangerous erosion of fundamental principles of freedom -- amounting to a quiet repeal of the American revolution. The Quest for Cosmic Justice is the summation of a lifetime of study and thought about where we as a society are headed -- and why we need to change course before we do irretrievable damage.
Seeking the City
- Author : Chad Brand,Tom Pratt
- Publisher :Unknown
- Release Date :2013
- Total pages :905
- ISBN : 0825443040
Summary :
Black Rednecks and White Liberals
- Author : Thomas Sowell
- Publisher :Unknown
- Release Date :2010-09-17
- Total pages :580
- ISBN : 9781459602212
Summary : This explosive new book challenges many of the long-prevailing assumptions about blacks, about Jews, about Germans, about slavery, and about education. Plainly written, powerfully reasoned, and backed with a startling array of documented facts, Black Rednecks and White Liberals takes on not only the trendy intellectuals of our times but also such historic interpreters of American life as Alexis de Tocqueville and Frederick Law Olmsted. In a series of long essays, this book presents an in-depth look at key beliefs behind many mistaken and dangerous actions, policies, and trends. It presents eye-opening insights into the historical development of the ghetto culture that is today wrongly seen as a unique black identity - a culture cheered on toward self-destruction by white liberals who consider themselves ''friends'' of blacks. An essay titled ''the Real History of Slavery'' presents a jolting re-examination of that tragic institution and the narrow and distorted way it is too often seen today. The reasons for the venomous hatred of Jews, and of other groups like them in countries around the world, are explored in an essay that asks, ''Are Jews Generic?'' Misconceptions of German history in general, and of the Nazi era in particular, are also re-examined. So too are the inspiring achievements and painful tragedies of black education in the United States. Black Rednecks and White Liberals is the capstone of decades of outstanding research and writing on racial and cultural issues by Thomas Sowell.
The Politics of Poverty
- Author : Felicitas Becker
- Publisher :Unknown
- Release Date :2019-06-20
- Total pages :378
- ISBN : 9781108496933
Summary : An examination of poverty dynamics and developmental failure, shifting emphasis from development as control to development as coping strategy.
The Vision of the Anointed
- Author : Thomas Sowell
- Publisher :Unknown
- Release Date :2019-07-23
- Total pages :320
- ISBN : 9781541646261
Summary : DIVSowell presents a devastating critique of the mind-set behind the failed social policies of the past thirty years. Sowell sees what has happened during that time not as a series of isolated mistakes but as a logical consequence of a tainted vision whose defects have led to crises in education, crime, and family dynamics, and to other social pathologies. In this book, he describes how elites—the anointed—have replaced facts and rational thinking with rhetorical assertions, thereby altering the course of our social policy./Div
The Political Economy of Microfinance
- Author : Philip Mader
- Publisher :Unknown
- Release Date :2016-01-12
- Total pages :284
- ISBN : 9781137364210
Summary : According to the author, rather than alleviating poverty, microfinance financialises poverty. By indebting poor people in the Global South, it drives financial expansion and opens new lands of opportunity for the crisis-ridden global capital markets. This book raises fundamental concerns about this widely-celebrated tool for social development.
Poverty From The Wealth of Nations
- Author : M. Alam
- Publisher :Unknown
- Release Date :2016-02-05
- Total pages :215
- ISBN : 9780333985649
Summary : In Poverty from the Wealth of Nations , the author presents an analysis of the evolution of global disparities that goes beyond the earlier neo-Marxist critiques of global capitalism. He moves beyond their narrative by inserting two additional asymmetries into the global economy - those created by 'unequal races' and unequal states. The author analyzes not only the power of markets, but the powers that shaped these markets. More importantly, he marshals cross-country evidence to show that loss of sovereignty retarded industrialization, human capital formation and economic growth.
Wealth And Poverty Of Nations
- Author : David S. Landes
- Publisher :Unknown
- Release Date :2015-04-20
- Total pages :672
- ISBN : 9780349141442
Summary : The history of nations is a history of haves and have-nots, and as we approach the millennium, the gap between rich and poor countries is widening. In this engrossing and important new work, eminent historian David Landes explores the complex, fascinating and often startling causes of the wealth and poverty of nations. The answers are found not only in the large forces at work in economies: geography, religion, the broad swings of politics, but also in the small surprising details. In Europe, the invention of spectacles doubled the working life of skilled craftsmen, and played a prominent role in the creation of articulated machines, and in China, the failure to adopt the clock fundamentally hindered economic development. The relief of poverty is vital to the survival of us all. As David Landes brilliantly shows, the key to future success lies in understanding the lessons the past has to teach us - lessons uniquely imparted in this groundbreaking and vital book which exemplifies narrative history at its best.
Advice and Dissent
- Author : Alan S. Blinder
- Publisher :Unknown
- Release Date :2018-03-27
- Total pages :368
- ISBN : 9780465094189
Summary : A bestselling economist tells us what both politicians and economists must learn to fix America's failing economic policies American economic policy ranks as something between bad and disgraceful. As leading economist Alan S. Blinder argues, a crucial cultural divide separates economic and political civilizations. Economists and politicians often talk--and act--at cross purposes: politicians typically seek economists' "advice" only to support preconceived notions, not to learn what economists actually know or believe. Politicians naturally worry about keeping constituents happy and winning elections. Some are devoted to an ideology. Economists sometimes overlook the real human costs of what may seem to be the obviously best policy--to a calculating machine. In Advice and Dissent, Blinder shows how both sides can shrink the yawning gap between good politics and good economics and encourage the hardheaded but softhearted policies our country so desperately needs.
The Wealth and Poverty of Regions
- Author : Mario Polèse
- Publisher :Unknown
- Release Date :2010-01-15
- Total pages :288
- ISBN : 0226673170
Summary : As the world becomes more interconnected through travel and electronic communication, many believe that physical places will become less important. But as Mario Polèse argues in The Wealth and Poverty of Regions, geography will matter more than ever before in a world where distance is allegedly dead. This provocative book surveys the globe, from London and Cape Town to New York and Beijing, contending that regions rise—or fall—due to their location, not only within nations but also on the world map. Polèse reveals how concentrations of industries and populations in specific locales often result in minor advantages that accumulate over time, resulting in reduced prices, improved transportation networks, increased diversity, and not least of all, “buzz”—the excitement and vitality that attracts ambitious people. The Wealth and Poverty of Regions maps out how a heady mix of size, infrastructure, proximity, and cost will determine which urban centers become the thriving metropolises of the future, and which become the deserted cities of the past. Engagingly written, the book provides insight to the past, present, and future of regions.
Economic Facts and Fallacies
- Author : Thomas Sowell
- Publisher :Unknown
- Release Date :2011-03-22
- Total pages :304
- ISBN : 9780465026302
Summary : Economic Facts and Fallacies exposes some of the most popular fallacies about economic issues-and does so in a lively manner and without requiring any prior knowledge of economics by the reader. These include many beliefs widely disseminated in the media and by politicians, such as mistaken ideas about urban problems, income differences, male-female economic differences, as well as economics fallacies about academia, about race, and about Third World countries. One of the themes of Economic Facts and Fallacies is that fallacies are not simply crazy ideas but in fact have a certain plausibility that gives them their staying power-and makes careful examination of their flaws both necessary and important, as well as sometimes humorous. Written in the easy-to-follow style of the author's Basic Economics, this latest book is able to go into greater depth, with real world examples, on specific issues.
Poverty and Power
- Author : Edward Royce
- Publisher :Unknown
- Release Date :2018-06-07
- Total pages :378
- ISBN : 9781538110461
Summary : Poverty and Power argues that American poverty is not due to individual failings but rather to broader structural forces. The third edition features new material on the current political climate, the shortage of quality job opportunities, the implications of the Trump presidency, and more. | https://www.saintlukebc.org/book/wealth-poverty-and-politics/ |
It is believed that comparative cognition has thus much to gain by embracing advances from neuroscience and human cognitive psychology and discussing the consequences of these findings to comparative cognition.
On the “Demystification” of Insight: A Critique of Neuroimaging Studies of Insight
- Psychology
- 2013
Psychologists studying problem solving have, for over 100 years, been interested in the question of whether there are two different modes of solving problems. One mode—problem solving based on…
Deconstructing Insight: EEG Correlates of Insightful Problem Solving
- PsychologyPloS one
- 2008
The results provide a first account of cognitive insight by dissociating its constituent components and potential neural correlates and indicate that sudden insightful solutions, where restructuring is a key feature, involve automatic, subconscious recombination of information.
Do animals have insight, and what is insight anyway?
- PsychologyCanadian journal of experimental psychology = Revue canadienne de psychologie experimentale
- 2012
New research suggests insightful behaviour can be captured in common laboratory tasks while brain activity is monitored, opening the way to better integration of research on animals with the cognitive neuroscience of human insight.
The Aha! Moment: The Science Behind Creative Insights
- PsychologyToward Super-Creativity - Improving Creativity in Humans, Machines, and Human - Machine Collaborations
- 2020
Insight, often referred to as an “aha moment,” has been defined as a sudden, conscious change in a person’s representation of a stimulus, situation, event, or problem. Recent advances in neuroimaging…
Neural correlates of insight phenomena
- Psychology
- 2009
Difficult problems are sometimes solved in a sudden flash of illumination, a phenomenon referred to as “insight.” Recent neuroimaging studies have begun to reveal the neural correlates of the…
On the temporality of creative insight: a psychological and phenomenological perspective
- Psychology, PhilosophyFront. Psychol.
- 2014
It is argued that because of its spontaneous but recurrent nature, creative insight could represent a relevant target for the phenomenological investigation of the flow of experience itself and could complement and help bring together biological and psychological perspectives.
Is Insight Always the Same? A Protocol Analysis of Insight in Compound Remote Associate Problems
- PsychologyJ. Probl. Solving
- 2012
Compound Remote Associate problem-solving characteristics were examined in a study in which participants solved CRA problems while providing concurrent verbal protocols, and show that solutions subjectively judged as insight by participants do exhibit some characteristics of insight.
Insight in sight : studying insight and the effects of giving hints on insight
- Psychology, Education
- 2010
There are many ways to solve a problem. A unique way is insightful problem solving when the solution promptly comes into your mind. It is interesting to take a look inside one's brain to understand…
TDCS to the right anterior temporal lobe facilitates insight problem-solving
- Psychology, BiologyScientific Reports
- 2020
Results confirm the crucial role played by the rATL in insight problem-solving, by applying High Definition Transcranial Direct Current Stimulation to the r ATL or the left frontopolar region while participants attempted to solve Compound Remote Associates problems before, during and after stimulation.
References
SHOWING 1-10 OF 55 REFERENCES
Unconscious Insights
- Psychology
- 2000
From early in the history of psychology, theorists have argued about whether insights are initially unconscious or whether they are conscious from the start. Empirically identifying unconscious…
An eye movement study of insight problem solving
- Psychology, BusinessMemory & cognition
- 2001
The present study suggests that eye movement recordings provide an important new window into processes of insight problem solving, providing converging evidence with prior findings using solution rates and solution times.
Function of hippocampus in “insight” of problem solving
- Psychology, BiologyHippocampus
- 2003
This work is the first neuroimaging study to have investigated the neural correlates of “insight” in problem solving using Japanese riddles, by imaging the answer presentation and comprehension events, just after participants failed to resolve them.
Multiple causes of difficulty in insight: the case of the nine-dot problem.
- PsychologyJournal of experimental psychology. Learning, memory, and cognition
- 2004
This work argues that the quantitatively small effects of many studies arise because the difficulty of many insight problems is determined by multiple factors, so the removal of 1 factor has limited effect on the solution rate.
Intuition in insight and noninsight problem solving
- PsychologyMemory & cognition
- 1987
The difference in phenomenology accompanying insight and noninsight problem solving is proposed to be used to define insight, and the data indicated that noninsights problems were open to accurate predictions of performance, whereas insight problems were opaque to such predictions.
The Oxford handbook of memory
- Psychology
- 2006
Due to the advent of neuropsychology, it has become clear that there is a multiplicity of memory systems or, at the very least, of dissociably different modes of processing memory in the brain. As…
Individual differences in problem solving via insight
- Psychology
- 2000
The purpose of the present work was to identify general problem solving skills that underlie the production of insight. One hundred and eighteen participants completed insight problems, analogies,…
The nature of insight
- PhilosophyMinds and Machines
- 2004
Some of the key conceptual developments which paved the way for Newell and Simon's theory of GPS are looked at: the fundamental changes in the notion of the unconscious — the emergence of the ‘cognitive unconscious’ — which took place in the nineteenth- and early twentieth-century.
The creative cognition approach.
- Psychology
- 1995
Mental processes are the essence of creative endeavor. The Creative Cognition Approach extends this particular view of creativity, first proposed and developed by the editors in their earlier book…
The use of verbal protocols as data: An analysis of insight in the candle problem
- PsychologyMemory & cognition
- 2004
It is suggested that verbalization can be used to examine how individuals solve insight problems and to evaluate existing theories of insight. | https://www.semanticscholar.org/paper/New-approaches-to-demystifying-insight-Bowden-Jung-Beeman/4410b0f05dfa410c28018942fc54d9eb5478b11d |
The Venezuelan Bolivar has lost 99 percent of its value in three years and bank notes are practically useless. Buying even small staples in cash requires individuals to carry obscene amounts of bank notes. In ways reminiscent of historical cases of hyperinflation, Venezuelans have found alternative uses for their paper currency–from toilet paper (because there’s a shortage) to making purses. As a result, many people have turned to alternative currencies. According to Maduro, nearly 20 percent of all commercial transactions in Venezuela take place in U.S. dollars. Some 77 percent of transactions occur with Bolivars via debit cards. Just 3 percent of transactions take place with bank notes.
Maduro places blame for the country’s problems on the United States. “They [the U.S. government] have a war against our physical currency. We are moving this year to a more profound digital economy, in expansion. I’ve set the goal of an economy that’s 100 percent digital.”
While Maduro is correct that the U.S. government isn’t particularly fond of his administration, Venezuela’s problems are the direct result of his own economic policies and those of his predecessor, Hugo Chavez. As Nobel laureate Milton Friedman famously said, “Inflation is always and everywhere a monetary phenomenon.” The Venezuelan government has printed money hand over fist, thus causing their inflation.
The problems created by Venezuela’s currency problems are further exacerbated by a cornucopia of other patently backward economic policies. From frequent minimum wage increases to price ceilings on all sorts of staple goods, it’s no wonder that many Venezuelans have chosen to leave by whatever means they can. | https://blog.independent.org/2021/01/15/venezuela-goes-digital-it-wont-fix-the-problem/ |
WASHINGTON, D.C. — The National Council on Disability (NCD) – an independent, nonpartisan federal agency that advises the President, Congress and other federal agencies on disability policy – today released a study, U.S. Foreign Policy and Disability: Progress and Promise 2017, that reveals that the development programs of the Department of State (DOS), the Peace Corps, the United States Agency for International Development (USAID), and Millennium Challenge Corporation often leave people with disabilities behind – despite their great potential for mainstreaming inclusion of disability and increasing the quality of life for people with disabilities in developing countries.
Approximately 800 million people with disabilities living in developing countries stand to benefit tremendously from U.S. foreign aid funded projects and programs that increase access to education, promote justice, and improve social and economic outcomes. Many of these individuals are aware of the U.S.’s longstanding commitment to inclusion of people with disabilities in its own country. Despite some progress observed, NCD’s analysis of several agencies’ policies and practices showed that efforts to date often suffer from a “silo effect” and lack sustained and coordinated engagement as well as accountability and evaluation.
“The United States invests billions of dollars each year into foreign assistance programs that foster international diplomacy and development directed toward improving the quality of life for people around the world,” said Joan Durocher, NCD’s General Counsel and Director of Policy. “The United States cannot effectively accomplish the goals of foreign assistance programs unless it undertakes measures to ensure that the programs are accessible to and inclusive of people with disabilities.”
NCD’s study follows up on its previous studies by providing a detailed and current assessment of the application of federal disability laws (both statutory and case law) to U.S. foreign aid programs. It reviewed the policies and practices of DOS, USAID, and the Peace Corps, and details the extent to which these agencies have (1) developed policies and/or or programs to ensure the inclusion of individuals with disabilities as recipients of U.S. foreign assistance, and (2) removed the specific barriers to access by individuals with disabilities identified in NCD’s prior foreign policy reports. The study also examined the policies and practices of the Millennium Challenge Corporation to determine whether it applies U.S. disability laws and policies to its programs overseas.
NCD’s report concludes with recommendations for each agency regarding future actions for improvement where weaknesses are identified.
The full U.S. Foreign Policy and Disability: Progress and Promise 2017 report is available for download at: https://ncd.gov/publications/2018/us-foreign-policy-and-disability-progress-2017.
About the National Council on Disability (NCD):
First established as an advisory Council within the Department of Education in 1978, NCD became an independent federal agency in 1984. In 1986, NCD recommended enactment of an Americans with Disabilities Act (ADA), and drafted the first version of the bill which was introduced in the House and Senate in 1988. Since enactment of the ADA in 1990, NCD has continued to play a leading role in crafting disability policy, and advising the President, Congress and other federal agencies on disability policies, programs, and practices. | http://www.global-partners-united.com/news/ncd-reports-on-us-foreign-assistance-and-disability-allocations |
Q:
How to toggle between two Autohotkey configurations
I need to toggle between two AutoHotkey key mapping configurations. I'd like to toggle the two through F3. From my research online and on StackOverflow, I think the below should do what I want:
#ifwinactive
next_make_mac = %1%
msgbox next_make_mac: %next_make_mac%
#If next_make_mac
msgbox Setting Mac settings.
RAlt::Control
Escape::Delete
RWin::Escape
LWin::LAlt
LAlt::LWin
next_make_mac := false
msgbox Mac settings set.
#If
#If !next_make_mac
msgbox Setting PC settings.
Ralt::Escape
msgbox PC settings set.
next_make_mac := true
#If
msgbox %next_make_mac%
F3::
Run %A_AhkPath% %A_ScriptName% %next_make_mac%
return
However, the #If next_make_mac directive always evaluates as true. I'm not sure why this is. In fact, even if I slip in a next_make_mac := false it still evaluates to true. Is there a better way to do what I'm doing?
I'm running AutoHotkey 1.1.21.03
A:
First of all, the message-boxes you have inside the #If statements will not behave as expected. The first one, on line 7 will always go off, telling you it's Setting Mac settings. Your hotkeys however, will be setup properly.
I think this is due to the auto-exec section reaching all the way to the first hotkey it finds.
Only put hotkeys inside #If statements.
Next, in your first #If statement, you're checking if next_make_mac contains anything other than false or 0. Meaning the string "false", will evaluate to true.
Note, false in AHK is the same as 0.
In your second #If statement, you're checking if next_make_mac contains either false or 0.
As for the toggling, since you can't change the values of variables directly inside #If statements, you'll have to add that to your F3 hotkey.
Like this:
F3::
next_make_mac := !next_make_mac ; Flip the value
msgBox % next_make_mac
Run %A_AhkPath% %A_ScriptName% %next_make_mac%
return
That line will toggle next_make_mac, assuming it contains either true, false, 1 or 0.
So, make sure you only have hotkeys inside the #If statements, and pass 1 or 0 as params instead of true or false so you don't accidentally use a string, and your script should work as expected.
Here's a full example of the changes:
#SingleInstance, force
#ifwinactive
next_make_mac = %1%
; Check which settings we'll be using
if (next_make_mac)
msgBox, Using Mac Settings
else
msgBox, Using PC Settings
; Only hotkeys inside here
#If next_make_mac
#If
; Only hotkeys inside here
#If !next_make_mac
Ralt::Escape
#If
F3::
next_make_mac := !next_make_mac ; Flip the value
Run %A_AhkPath% %A_ScriptName% %next_make_mac%
return
Edit: While outside the scope of the question, you can also add #SingleInstance, force at the top of your script to get rid of that dialog that asks you if you want to restart the script every time you press F3.
| |
22 December 2005
Why Were Animals Once So Big?
High oxygen environments produce giant animals from bird sized dragonflies to fifteeen foot high rhinos. Low oxygen environments produce runts. And, high oxygen levels are also crucial for warm blooded animals that require about three times more oxygen to maintain their metabolisms than reptiles, for example. High oxygen levels also allow life to thrive at higher elevations, while low oxygen levels are associated with extinctions and with the concentration of life in low lying areas. At its low point in geologic time, oxygen concentrations in the air at sea level were comparable to what they are now at the top of a fourteener.
One of the facinating aspects of this hypothesis, is that it is quite easy to test rigorously in laboratory environments. If you want to see how big insects or crocodiles get in a high or low oxygen environment, all you have to do is create an air tight habitat and see what happens in a few generations. Shifts in oxygen concentrations that took tens of millions of years to take place historically, can be reproduced relatively inexpensively in minutes. The tests so far, show that the hypothesis works. One key limiting factor in larger animals is the ability to get oxygen everywhere in the body that needs to carry on the animals metabolism. Getting blood (in vetrabrates) or simply pure diffusing oxygen (in insects) to the right place fast enough to maintain the chemical reactions of life gets harder and harder as animals get bigger and bigger. As with armies, the survivial of large animals is largely a matter of logistics and supply lines. The more concentrated oxygen is in the air, the easier it is to get it to where it needs to go.
There are two interesting applications of this knowledge.
First, oxygen concentrations should be a key parameter of any world contemplated in a science fiction context. An intensely oxygen rich environment might be perfect for huge fire breathing dragons. An oxygen poor environment (or oxygen poor micro-environments, like underground cave systems) might foster smaller creatures. And, in an oxygen poor environment, there might be more isolated ecosystems, because even fairly low mountains might be impassible due to the impossibility of breathing at those altitudes.
Second, in controlled environments, for example, space stations or space ships or undersea habitations, one might deliberately choose to have an environment with an oxygen concentration other than the Earth sea level norm. Maybe you'd want it low, to force people to build strong lungs that would make them competitive in sea level oxygen events (just as marathoners sometimes train in the mountains). Maybe you'd want it high -- something that appears to be good for neonatal health and can help people heal wounds, among other things. Similarly, could something as simple as an oxygen bar actually have positive health effects? We already have large populations of older people, especially in high elevation areas like Denver, who rely on extra oxygen to survive. Why shouldn't it benefit healthy people too?
I just think it's cool. Giant insects and monsterous animals have their own appeal.
| |
Bouchra Jarrar Opens Up About Lanvin’s Past, Present and Future
On the day she presents her Fall 2017 collection for one of Paris’ oldest houses, artistic director Bouchra Jarrar talks about the founder’s legacy, her upcoming redecorated boutique, and her myriad references, from Bowie to Prince.
“I’m easily amazed by simplicity,” says Bouchra Jarrar, who became Lanvin’s artistic director of women’s wear last March. For those already familiar with the elegant, often-understated clothes that the 46-year-old designer sold under her own name for six years, both as ready-to-wear and haute couture, this statement will come as no surprise.
Jarrar continues to walk her talk: Upon settling into the Lanvin offices, located across from the French house’s 128-year-old flagship boutique on Paris’s rue du Faubourg Saint-Honoré, she stripped down the voluptuous interiors of her predecessor, Alber Elbaz, painting the walls white and installing minimalist midcentury furniture upholstered in subtle gray tweeds. A revamp of the boutique is in the works.
“The interiors won’t feel clinical,” Jarrar promises. “But everything will have its place.” Mood boards are too much visual clutter for a woman who wakes up every morning designing in her head. “I leave my house to come to work, and by the time I get there I’ve already processed everything I’ve seen on the way. My discipline is to keep my brain clear.”
Growing up in Cannes, the second-to-last of seven children in a family of Moroccan origin, Jarrar made skirts for her siblings and friends and went on to study fashion at the Ecole Duperré, in Paris. “With each collection, I tell only one story,” she says. Her first for Lanvin was about a harmony of opposites: masculine and feminine, black and white, tailoring and flou.
So far, Jarrar has tiptoed around Lanvin’s illustrious past and impressive archives. She prefers to “go delicately into the history” because “I’m here, now, in this time.” She could not resist, however, redoing Jeanne Lanvin’s androgynous pearl, mirror, and fabric necktie necklaces from nearly a century ago (“Seeing those for the first time was just: Wow”) and admits to being impressed by Lanvin’s way with scissors. “She put dresses together with incredible intelligence and knowledge of how things would look best on a woman’s body,” says Jarrar, who directed Nicolas Ghesquière’s studio at Balenciaga for 10 years and then held the same position at Christian Lacroix.
Jarrar loves nature—she refers to the multitude of succulents in her office as “girlfriends” and spends many of her vacations at the wild seashore in Brittany—but her fashion choices are decidedly cerebral. “I stopped shopping when I opened my own house,” she recalls. “But before that, I dropped a lot of money at Prada; Maison Margiela, when Martin was still there; and Comme des Garçons.”
She’s not a fashion obsessive herself, but she does follow the work of peers including Dries Van Noten, Phoebe Philo, Azzedine Alaïa, and Karl Lagerfeld. “Véronique Nichanian, at Hermès, too,” Jarrar adds. “Though I’m not impartial there, because she’s one of my close friends.”
There are several parallels one can draw between Lanvin’s current designer and its founder. They are both women, both entrepreneurs—Jarrar self-funded her own label, which she closed when she got the Lanvin job—and both believers that even the most elegant evening clothes need to be comfortable. That is why Jarrar is keenly aware of the important legacy she has inherited.
After apprenticing for a milliner at the age of 13, Jeanne Lanvin hung out her shingle in 1889 as a hatmaker, but the dresses she made by hand for her daughter, Marguerite, were so eye-catching that clients began to ask for adult-size versions. Lanvin also had a knack for marketing, adopting signature colors for her labels (all variations of blue) and, in 1923, creating one of the first fashion logos. The iconic image, based on a photograph of her and Marguerite in twin party costumes, defined the brand’s identity as both familial and deeply feminine. Lanvin broke additional ground by putting women in pantsuits, sports clothes, and the stripped-down cloche hats she invented; she was the first to offer men’s wear alongside women’s; and she ventured into luxury home design—something other fashion houses wouldn’t do for another 60 years.
“What a force she was,” says Jarrar admiringly. “In just 40 years, the things she brought to fashion were enormous. I’ve got a lot of work to do.”
Bouchra Jarrar’s Inspirations, from Jeanne Lanvin to Prince
Bouchra Jarrar, wearing a Lanvin coat, in Daniel Buren’s installation Les Deux Plateaux, at the Palais Royal, in Paris.
Inspirational photographs in her office.
A crystal chandelier and exposed ducts point to the yin and yang of Jarrar’s workspace.
The designer’s runway lineup for her debut Lanvin collection.
Her music corner.
The stripped-down decor at the rue du Faubourg Saint-Honoré studio.
Brittany, France, a favorite vacation spot.
Jarrar (right), with the model Karlie Kloss, at the finale of her spring show.
A Lanvin sketch by Jarrar.
One of Jarrar’s inspirations, David Bowie, 1973.
A white satin suit from the Lanvin spring 2017 collection.
Prince is another of Jarrar’s inspirations.
A floral print for spring.
Jeanne Lanvin, at a fitting in her Paris atelier in the 1930s.
Her salon, in 1921, designed by the architect and decorator Armand-Albert Rateau. Lanvin Décoration services could be engaged through the boutique.
The Lanvin logo was created by Paul Iribe in 1923, inspired by a photo of Lanvin and her daughter.
Experience Fashion Week Street Style a New Way: | https://www.wmagazine.com/story/bouchra-jarrar-lanvin-fall-2017-paris-fashion-week |
In the blog post, we will answer the question,”Can you adopt a 2 year old?”. In doing so, we will look into the details of adopting a child from foster care, the pros and cons of adopting a 2 year old, how the adoption looks like for the child, and delve into the adoption of 2 year olds in India. Lastly, we will answer the possible FAQ’s you would have relating to the requirement process for adoption.
Can you adopt a 2 year old?
Yes, you can adopt a 2 year old. Albeit the process of adoption has various mixed feelings from adoptive parents, we have compiled a list of information for you to refere to.
Some adoptive parents believe that adopting an infant or younger child from foster parents is similar to adopting an infant through a home adoption. However, regardless of age, all children adopted through foster care experience loss and trauma. Even if it is a baby.
Children may have a difficult start, but with a little time, love, and perseverance, all children can share an equally strong bond in a lasting family.
While you may have missed some “firsts” by choosing to adopt an infant from foster care, you still have many amazing milestones and moments of love ahead of you.
Can I adopt a baby from Foster Care?
If you meet the requirements and pass the screening process of the state foster agency, you can adopt an infant into your family. For children and new parents, it is a difficult but wonderful and life-changing experience.
It is worth noting that it is simpler to However because most foster children want to be reunited with their biological families, not all families are prepared for the emotional toll of the foster-to-adoption process. Consult your nurse to determine which path is best for you.
It’s important to note that it’s often easier to foster-to-adopt toddlers because a child’s existing foster parents are usually given priority when it comes time to choose a permanent placement.
However, because reunification with biological family is the goal for the majority of children in foster care, not all families are prepared for the emotional toll that the foster-to-adopt process can have. Inquire with your foster care professional about which path is best for you.
You should also keep in mind that the average age of children in foster care is around 8 years old, so there may not be many toddlers available for adoption.
Adopting a slightly older child is not for everyone, but with the proper education and preparation, it may be an option to consider.
What are the benefits and drawbacks of adopting a child from foster care?
Adopting a young child into foster care is extremely rewarding, but you and your child may face numerous challenges. Remember that these children, regardless of age, have experienced loss and trauma.
Understand that, in contrast to private adoption, in which a child is voluntarily placed with a permanently chosen family by biological parents, foster adoption involves the involuntary removal of a child due to neglect or abuse.
It’s easy to believe that toddlers and young children are too young to understand what’s going on or to recall their biological families, but they frequently do.
Even if their memories are hazy or they are too young to verbally articulate their emotions and experiences, being placed in foster care is a traumatic event for a child, on top of any previous struggles.
As a result, some children will experience physical, mental, or emotional difficulties. However, there are numerous potential benefits for both a child and his or her new parents.
What does it look like for the child?
- Children benefit from stability and consistency during a critical developmental period.
- They are going through a period of rapid growth and learning, and they have constant parental support.
- Patience and time that they can use to build strong and powerful attachments with their new family.
- Building healthy bonds with their new family members necessitate stability and guidance from their older siblings as they adjust to their new home and family from an early age..
- For the rest of their lives, they will have a new family to love and be loved by.
The path to parenthood, like any other type of adoption, should be thoroughly researched first.
Open your eyes to the reality of adopting a young child from foster care to get closer to it. Some possible questions could be: what the process is like, what it’s like to be a parent, and so on.
Other adoptive parents, in addition to foster parents, can be extremely helpful contacts for you.
The adoption process is never easy, regardless of the age of the child or the type of adoption, but if you decide to proceed, there are people you can turn to for support and parenting resources.
Adoption of 2 year old babies in India
Over 80% of children adopted in the country in 2017-18 were under the age of two, and there were not many children in this age group who could be legally adopted, according to official data.
According to the Central Adoption Resources Agency, the country’s premier adoption agency, 2,537 children under the age of two were adopted in 2017-18, while the number of children over the age of two declined.
228 children were adopted between the ages of 2 and 4. The 4- to 6-year-old age group adopted 143 children, while the 6-year-old and older age group adopted 226.
Things to expect when dopting from foster care
You must be prepared if you believe your foster parents are ready to learn how to adopt a toddler. Regardless of the age of the child being adopted, the adoption process from foster parents is similar. Each trip will differ depending on the state and specific circumstances, but the general steps are as follows.
Step 1: Learn more about this type of adoption and how to meet the special needs of younger children who are adopted through foster care in order to assist you and your family in adopting an infant from foster parents and their families. is correct.
Step 2: The Selection Procedure of your respective state should be something you look into in order to learn the screening process etc
Step 3: As needed, discuss potential new family members with older children and other family members.
Step 4: Create homes to meet the needs of infants and toddlers.
Step 5: Finish Homework and Training Step 6: Assess, Follow Up, and Finish Homework
Possible requirements to adopt a child
Adoption requirements vary by location, but there are some basic requirements that most adoptions rely on. Following these guidelines will lay the groundwork for the rest of your adoption process.
That is why it is critical that you carefully follow all of the rules and meet any requirements imposed by your agency (or any other adoption agency you use).
What medical health conditions must be met?
To adopt a child, prospective adoptive parents must be in good health.
If one or both parents have a chronic illness or are currently undergoing treatment for a serious illness, a letter from a doctor stating that they are physically stable and capable of caring for the child until the child is at least 16 years old is required.
Other concerns include: a history of substance abuse may necessitate treatment. All members of the household must also certify that they are physically stable.
What are the requirements for mental health?
Prospective adoptive parents must maintain good emotional health. A professional statement demonstrating emotional stability is required if one or both parents have or have had a history of current mental illness.
You will also need a certificate of stability and parenting ability if you are or have been on medication.
All other family members must be emotionally stable as well in order for the home to be considered safe for the adopted child.
What is the financial requirement for adopting a child?
There is usually no income requirement, but you must pass a test to demonstrate your ability to support a child. We will check your income, assets, health insurance card, and so on during the examination.
You should also ensure that you have funds set aside for your adoption journey, which should include adoption counselor fees, travel expenses, and biological mother expenses.
What type of home does a child require?
Home learning determines whether or not your child feels safe at home. Requirements may differ depending on the security requirements of each state, and some countries may require proof of home ownership.
References regarding interpersonal relationships and interactions with the child may be required of the prospective adoptive parent.
Single or couple references are acceptable. Some adoption agencies accept family member referrals.
You will be asked to discuss your adoption and parenting plans during your adoption research and agency application.
You must live in a safe, well-kept home in a family-friendly neighborhood. Some states require children to have separate bedrooms.
Why Is the Adoption Procedure So Difficult?
Adoptive parents face challenges during the adoption process because adoption agencies, professionals, states, and countries want to ensure that their children are placed in a safe environment.
Your child’s safety and well-being are paramount, and additional requirements are essential. Failure to meet one or more of these requirements may result in refusal to adopt in the state or elsewhere.
Do you have to be married to adopt?
Some adoption professionals in the United States may have marital obligations when it comes to private newborn adoptions. There is no marriage requirement in the United States to adopt into foster care.
Marriage conditions differ from country to country for international adoptions. If the adoptive parents fail to meet this responsibility, single parents are asked to appoint guardians to act as parents.
Some adoption agencies also require the name of a guardian to be included in the will.
Are there any requirements for emotional health of adoptive parents?
Prospective adoptive parents must maintain good mental health. A professional statement demonstrating emotional stability is required if one or both parents have or have had a history of current mental illness.
You will also need a certificate of stability and parenting ability if you are or have been on medication.
All other family members must be emotionally stable as well in order for the home to be considered safe for the adopted child.
How to discipline the adopted child?
Adopted toddlers, like any other child, require discipline. According to Morin, this discipline should be gentle but firm. It should also be consistent, and your toddler should understand the implications of her actions.
Make sure your child understands why she is being disciplined and how she can avoid future problems. If you have other children, do not discipline them any differently than you do the adopted child.
How to get your other children ready?
It is difficult to integrate an adopted toddler into a family with other children. Talk to your current children about the possibility of a new arrival well in advance to ensure a smooth transition.
As the adoption process concludes, Morin suggests having your children assist in the preparation of a gift for the new child. “Talk with them about potential changes and reassure them that they will still receive individual attention after the child arrives,” she advises. | https://adoptionigloo.com/can-you-adopt-a-2-year-old/ |
CROSS-REFERENCE TO RELATED APPLICATIONS/INCORPORATION BY REFERENCE
FEDERALLY SPONSORED RESEARCH OR DEVELOPMENT
SEQUENCE LISTING
MICROFICHE/COPYRIGHT REFERENCE
BACKGROUND
SUMMARY
DETAILED DESCRIPTION OF VARIOUS ASPECTS OF THE DISCLOSURE
[Not Applicable]
[Not Applicable]
[Not Applicable]
[Not Applicable]
Conventional electrical circuitry, for example digital logic circuitry, may generally have inadequate protection against errors. Further limitations and disadvantages of conventional and traditional approaches will become apparent to one of skill in the art, through comparison of such approaches with the disclosure as set forth in the remainder of the present application with reference to the drawings.
A system and method for adding error detection capability to a digital logic circuit, substantially as shown in and/or described in connection with at least one of the figures, as set forth more completely in the claims.
The following discussion will present various aspects of the present disclosure by providing various examples thereof. Such examples are non-limiting, and thus the scope of various aspects of the present disclosure should not necessarily be limited by any particular characteristics of the provided examples. In the following discussion, the phrases “for example” and “e.g.” are non-limiting and are generally synonymous with “by way of example and not limitation,” “for example and without limitation,” and the like.
The following discussion will at times utilize the phrase “A and/or B.” Such phrase should be understood to mean A, or B, or both A and B.
The following discussion will at times utilize the phrase “operates to” in discussing functionality performed by particular hardware, including hardware operating in accordance with software instructions. The phrase “operates to” includes “operates when enabled to”. For example, a module that operates to perform a particular operation, but only after receiving a signal to enable such operation, is included by the phrase “operates to.”
Modern electrical circuitry, for example digital logic circuitry, is increasingly susceptible to errors. Such errors, for example, may comprise hard errors due to circuit failure and/or soft errors caused for example by background radiation. A soft error, for example, might cause a storage element, for example a synchronous logic device (SLD), to errantly change state. A soft error, for example, might also cause a combination logic device to errantly change state.
Parity checking is an example method for detecting such errors in digital logic. Standard methods of adding parity checking to digital logic (e.g., random digital logic) are, however, inadequate. Other example methods for handling errors in digital logic design include duplicating (e.g., in-whole or in-part) the circuitry being protected, which results in substantial increases in circuit size and power consumption. Further example methods for handling errors in digital logic design include using components that are hardened against errors (e.g., soft errors), but such hardened components is expensive and involves using larger and slower components. Various aspects of the present disclosure overcome the above-mentioned deficiencies. For example, while using hardened components and duplicate circuitry is still possible if desired, such designs are not necessary.
Another issue with present error detection (e.g., parity error detection) is that the circuitry performing the error detection adversely affects the performance of the circuitry being tested, for example including the addition of signal delay. Various aspects of the present disclosure avoid or minimize the adverse effects of signal delay by, for example, focusing error detection on components that are less susceptible to the adverse effects of signal delay.
In general, various aspects of this disclosure provide a system and method that, for example, allows for providing error detection in random (or irregular) logic, instead of for example only on buses and RAM devices with regular repeatable circuit structures.
The present disclosure will now provide non-limiting examples of systems and methods for providing error protection in an electrical circuit. As mentioned above and emphasized again, the characteristics of such examples are non-limiting. Accordingly, various aspects of this disclosure should not be limited by any particular characteristics of any particular example unless such limiting is explicitly stated.
For example, the following discussion will present various aspects of the disclosure by providing a variety of examples including sequential logic devices (SLDs). Such presentation is merely for illustrative clarity and not for limitation. For example, the scope of various aspects of the disclosure presented in terms of SLDs (e.g., devices under test and/or devices performing the testing and/or ancillary devices) applies to storage elements in general. For example, such a storage element may comprise characteristics of a D-flipflop with a clock input, a D-flipflop with clock and synchronous clear inputs, a D-flipflop with clock and asynchronous clear inputs, a D-flipflop with clock and synchronous preset inputs, a D-flipflop with clock and asynchronous preset inputs, a D-flipflop with clock and synchronous clear and preset inputs, a D-flipflop with clock and asynchronous clear and preset inputs, a latch with latch enable input, a latch with latch enable and asynchronous clear input, a latch with latch enable and asynchronous preset input, a scan type of storage element, a non-scan type of storage element, etc. Thus, the scope of the various aspects of the present disclosure should not be limited by characteristics of SLDs unless explicitly claimed.
FIG. 1
100
Turing first to , such figure is a schematic diagram of an electrical circuit comprising error protection, in accordance with various aspects of the present disclosure.
100
100
The electrical circuit is only shown in-part for illustrative clarity. The illustrated electrical circuit may, for example, comprise a portion of any of a large variety of electrical circuits. Such electrical circuits may, for example, comprise network interface circuitry (e.g., optical and/or electrical network interface chips), processing circuitry, register circuitry, multi-media processing circuitry, wired and/or wireless and/or optical communication circuitry, application-specific integrated circuits, baseband processors, etc.
100
105
1
1
1
2
1
3
105
The electrical circuit may, for example, comprise an upstream signal source that provides digital logic signals (e.g., D, D, and D) to downstream components. The signal source may, for example, comprise one or more immediately preceding logic devices (e.g., storage elements, for example sequential logic devices, combinational logic devices, etc.), analog-to-digital converters, communication buses, etc.
100
1
111
2
112
3
113
111
1
1
105
112
1
2
105
113
1
3
105
111
112
113
The electrical circuit may, for example, comprise a first sequential logic device (SLD ) , a second sequential logic device (SLD ) , and a third sequential logic device (SLD ) . The first SLD may, for example, receive a digital signal D from the signal source . Also the second SLD may, for example, receive a digital signal D from the signal source . Additionally the third SLD may, for example, receive a digital signal D from the signal source . The SLDs , , and are illustrated as D flip-flops, but may comprise characteristics of any of a large variety of sequential logic devices (e.g., any type of flip flop, any type of other data storage element, etc.).
111
112
113
1
1
1
1
1
1
1
2
1
3
111
112
113
111
112
113
111
112
113
1
The first SLD , second SLD , and third SLD are each coupled to a same clock signal (Clock_). The clock signal (Clock_) may comprise characteristics of any of a variety of clock signals. For example, Clock_ may be an unmodified system clock (e.g., a sole system clock or one of a plurality of systems clocks). Also for example, Clock_ may be a gated version of the system clock signals. Operationally, the respective inputs (D, D, and D) of the SLDs (, , and ) are stored in the SLDs (, , and ) when the SLDs (, , and ) are clocked (e.g., positive-edge clocked, negative-edge clocked, level clocked, etc.) by Clock_.
111
112
113
The first SLD , second SLD , and third SLD provide an example of a group of SLDs that will be tested as a group for a parity error within the group. Thus, they provide an example of what at times will be referred to herein as a “parity protect group.” A parity protect group may comprise any number of circuit elements (e.g., SLDs) under test. For example, a parity protect group may comprise an even number of SLDs (e.g., 16 SLDs, 32 SLDs, 64 SLDs, 128 SLDs, an even number that is not a power of 2, etc.). Also for example a parity protect group may comprise an odd number of SLDs (e.g., 15 SLDs, 17, SLDs, 31 SLDs, 33 SLDs, 63 SLDs, 65 SLDs, 127 SLDs, 129 SLDs, an odd number that is not 1 greater or less than a power of 2, etc.). As will be discussed later, in various example implementations, it may be advantageous to have an odd number of circuit elements under test instead of an even number.
111
112
113
1
1
1
100
111
112
113
1
The first SLD , second SLD , and third SLD are each coupled to a same clear signal (Clear_). The clear signal (Clear_) may comprise characteristics of any of a variety of clear signals. For example, Clear_ may be generated by various components of the electrical circuit during normal operation of the electrical circuit, generated by test and/or troubleshooting circuitry, etc. Operationally, the respective outputs of the SLDs (, , and ) are cleared in response to the Clear_ signal.
111
112
113
1
1
1
100
111
112
113
1
The first SLD , second SLD , and third SLD are each coupled to a same set signal (Set_). The set signal (Set_) may comprise characteristics of any of a variety of set signals. For example, the Set_ signal may be generated by various components of the electrical circuit during normal operation of the electrical circuit, generated by test and/or troubleshooting circuitry, etc. Operationally, the respective outputs of the SLDs (, , and ) are set in response to the Set_ signal.
100
130
120
140
150
160
The electrical circuit may also, for example, comprise various circuit elements that operate together to monitor the parity of the circuit elements (e.g., SLDs) under test. Such circuit elements may, for example, comprise the first exclusive OR (XOR) gate , first parity SLD , second XOR gate , report point OR gate , and report point SLD . Each of such circuit elements will now be discussed.
130
130
100
130
1
1
1
2
1
3
111
112
113
130
120
130
1
1
1
2
1
3
111
112
113
The first XOR gate may, for example, comprise a single XOR gate or an XOR tree or any logic structure that performs the XOR function. Only one first XOR gate is shown at this location in the electrical circuit for illustrative clarity. The first XOR gate may receive the respective input signals (D, D, and D) that are input to each of the SLDs (, , and ), and output a signal indicative of the XOR function applied to such input signals. The output of the first XOR gate is provided to the input of the first parity SLD . Operationally, the first XOR gate may asynchronously calculate the parity of the signals (D, D, and D) that are input to the SLDs (, , and ) under test.
120
130
120
120
1
111
112
113
120
1
1
1
2
1
3
111
112
113
The first parity SLD (also referred to herein as a parity test SLD) is illustrated as a D flip-flop that receives the output signal from the first XOR gate at its D input, but the first parity SLD may be any of a variety of different types of sequential logic device and/or other data storage element. The first parity SLD may, for example, receive the same clock input signal (e.g., Clock_) that is received by the SLDs (, , and ) under test. Operationally, the first parity SLD captures the parity of the input signals (D, D, and D) as they are clocked into the SLDs (, , and ) under test.
140
111
112
113
120
140
111
112
113
120
140
141
111
112
113
141
120
141
130
140
The second XOR gate receives as input the respective output signals from the SLDs (, , and ) under test and the output signal from the first parity SLD . The second XOR gate thus asynchronously calculates the parity of the output signals from the SLDs (, , and ) under test and compares the calculated parity to the parity stored in the first parity SLD . The results of the test are output from the second XOR gate as signal , which is also called the “Protect Group 1 Parity Error.” For example, operationally, if an output of one of the SLDs (, , and ) under test errantly changes, for example as a result of a soft error induced state change, such an errant change will be reflected in the Protect Group 1 Parity Error signal . Similarly, an errant change in the first parity SLD will also be reflected in the Protect Group 1 Parity Error signal . As discussed above with regard to the first XOR gate , the second XOR gate may comprise a single XOR gate, an XOR tree, or any type of circuit that performs an XOR function.
150
141
150
150
130
150
150
160
150
FIGS. 2 and 3
The report point OR gate receives as input the Protect Group 1 Parity Error signal . The first OR gate may also receive as input respective Protect Group Parity Error signals from other parity protect groups. Example input signals A and B, for example, correspond to parity protect group circuitry shown in respectively (and discussed below). The first OR gate may thus aggregate Protect Group Parity Error signals from a plurality of parity protect groups. As discussed above with regard to the first XOR gate , the report point OR gate may comprise a single OR gate, an OR tree, or any type of circuit that performs an OR function. The output of the report point OR gate is provided to the input of the report point SLD . Operationally, the report point OR gate may asynchronously determine the existence of a parity error detected in any of the parity protect groups to which it is coupled.
160
150
160
160
1
1
1
160
1
160
150
160
170
The report point SLD is illustrated as a D flip-flop that receives the output signal from the report point OR gate at its D input, but the report point SLD may be any of a variety of different types of sequential logic device and/or other data storage element. The report point SLD receives a clock signal (Clock). The Clock signal may, for example, be the same as the Clock_ signal or may be different. For example, the Clock signal may be a non-gated system clock and the Clock_ signal may be a gated system clock, or vice versa. Also for example, the Clock signal and the Clock_ signal may be different gated versions of a same system clock. The report point SLD may also receive a Clear signal (Clear). The Clear signal may, for example, be the same as the Clear_ signal or may be different. The report point SLD may output a Parity Error signal that, for example, represents the parity error state of each of a plurality of parity protect groups that provide respective parity error signals to the report point OR gate . For example, a parity error detected in any of such parity protect groups may get clocked into the report point SLD and be output as the Parity Error signal .
170
170
170
160
The Parity Error signal may then, for example, be provided to processing circuitry that performs any of a variety of error reporting and/or handling operations. For example, the Parity Error signal may be provided to system surveillance circuitry, system recovery circuitry, system restore circuitry, etc. For example, in an example scenario in which the Parity Error signal indicates that there has been a parity error in one of the parity protect groups corresponding to the report point SLD , corresponding hardware and/or software can be reset and/or restored, the parity protect groups can be reset and/or re-clocked, etc., before further damage is done.
150
160
160
The report point OR gate and report point SLD may, for example, generally receive and/or aggregate parity error signals from parity protect groups that are part of a same general clock domain (for example, corresponding to a same system clock). For example, the report point OR gate and report point SLD may receive and/or aggregate parity error signals from a first parity protect group that is clocked by the non-gated system clock, a second parity protect group that is also clocked by the non-gated system clock, a third parity protect group that is clocked by a first gated system clock, a fourth parity protect group that is clocked by a second gated system clock, a fifth parity protect group that is clocked by the second gated system clock, etc.
FIG. 1
FIGS. 2 and 3
FIG. 1
1
1
1
The parity protect group shown in may, for example, be characterized by a respective set of control signal inputs. For example, the respective set of control signal inputs may comprise a clock net (e.g., clocked by the Clock_ signal), a clear (or reset) net (e.g., cleared by the Clear_ signal), and a set (or preset or load) net (e.g., set by the Set_ signal). Such an example set of control signal inputs, for example based on three control signal nets, may also be referred to herein as a triplet. As will be seen in the following discussion of , other parity protect groups may be characterized by different respective sets of control signal inputs. Other parity protect groups may also be characterized by a same set of control signal inputs as the parity protect group shown in .
FIG. 2
FIG. 1
200
200
100
Turning to , such figure is a schematic diagram of an electrical circuit comprising error protection, in accordance with various aspects of the present disclosure. The electrical circuit may, for example, share any or all characteristics with the example electrical circuit illustrated in and discussed previously.
200
200
The electrical circuit is only shown in-part for illustrative clarity. The illustrated electrical circuit may, for example, comprise a portion of any of a large variety of electrical circuits. Such electrical circuits may, for example, comprise network interface circuitry (e.g., optical and/or electrical network interface chips), processing circuitry, register circuitry, multi-media processing circuitry, wired and/or wireless and/or optical communication circuitry, application-specific integrated circuits, baseband processors, etc.
200
205
2
1
2
2
2
3
205
205
105
2
1
2
2
2
3
1
1
1
2
1
3
FIG. 1
FIG. 1
The electrical circuit may, for example, comprise an upstream signal source that provides digital logic signals (e.g., D, D, and D) to downstream components. The signal source may, for example, comprise one or more immediately preceding logic devices (e.g., sequential and/or combination logic devices), analog-to-digital converters, communication buses, etc. The signal source may, for example, comprise the same signal source as illustrated in or may be different. The digital logic signals (e.g., D, D, and D) may similarly be the same as the digital logic signals (e.g., D, D, and D) shown in or may be different.
200
1
211
2
212
3
213
211
2
1
205
212
2
2
205
213
2
3
205
211
212
213
The electrical circuit may, for example, comprise a first sequential logic device (SLD ) , a second sequential logic device (SLD ) , and a third sequential logic device (SLD ) . The first SLD may, for example, receive a digital signal D from the signal source . Also the second SLD may, for example, receive a digital signal D from the signal source . Additionally the third SLD may, for example, receive a digital signal D from the signal source . The SLDs , , and are illustrated as D flip-flops, but may comprise characteristics of any of a large variety of sequential logic devices (e.g., any type of flip flop, any type of other data storage element, etc.).
211
212
213
2
2
1
2
2
2
2
1
2
2
2
3
211
212
213
211
212
213
211
212
213
2
FIG. 1
The first SLD , second SLD , and third SLD are each coupled to a same clock signal (Clock_). The clock signal Clock_ may, for example, be the same as the clock signal Clock_ shown in or may be different. The clock signal (Clock_) may comprise characteristics of any of a variety of clock signals. For example, Clock_ may be an unmodified system clock (e.g., a sole system clock or one of a plurality of systems clocks). Also for example, Clock_ may be a gated version of the system clock signals. Operationally, the respective inputs (D, D, and D) of the SLDs (, , and ) are stored in the SLDs (, , and ) when the SLDs (, , and ) are clocked (e.g., positive-edge clocked, negative-edge clocked, level clocked, etc.) by Clock_.
211
212
213
FIG. 1
The first SLD , second SLD , and third SLD provide an example of a group of SLDs that will be tested as a group for a parity error within the group. Thus, they provide an example (e.g., another example in addition to the example shown in ) of what at times will be referred to herein as a “parity protect group.” A parity protect group may comprise any number of circuit elements (e.g., SLDs) under test. For example, a parity protect group may comprise an even number of SLDs (e.g., 16 SLDs, 32 SLDs, 64 SLDs, 128 SLDs, an even number that is not a power of 2, etc.). Also for example a parity protect group may comprise an odd number of SLDs (e.g., 15 SLDs, 17, SLDs, 31 SLDs, 33 SLDs, 63 SLDs, 65 SLDs, 127 SLDs, 128 SLDs, an odd number that is not 1 greater or less than a power of 2, etc.). As will be discussed later, in various example implementations, it may be advantageous to have an odd number of circuit elements under test instead of an even number.
211
212
213
2
2
2
1
2
200
211
212
213
FIG. 1
—
The first SLD , second SLD , and third SLD are each coupled to a same clear signal (Clear_). The clear signal (Clear_) may comprise characteristics of any of a variety of clear signals. The clear signal Clear_ may, for example, be the same as the clear signal Clear_ shown in or may be different. For example, Clear_ may be generated by various components of the electrical circuit during normal operation of the electrical circuit, generated by test and/or troubleshooting circuitry, etc. Operationally, the respective outputs of the SLDs (, , and ) are cleared in response to the Clear2 signal.
FIG. 1
FIG. 1
211
212
213
1
Different from the example shown in , the first SLD , second SLD , and third SLD are not coupled to a set signal (e.g., like the set signal Set_ of ).
200
230
220
240
240
150
FIG. 1
The electrical circuit may also, for example, comprise various circuit elements that operate together to monitor the parity of the circuit elements (e.g., SLDs) under test. Such circuit elements may, for example comprise the first exclusive OR (XOR) gate , first parity SLD , and second XOR gate . As will be discussed below, the output of the second XOR gate , labeled output A, may be input to the report point OR gate of . Each of such circuit elements will now be discussed.
230
230
200
230
2
1
2
2
2
3
211
212
213
230
220
230
2
1
2
2
2
3
211
212
213
The first XOR gate may, for example, comprise a single XOR gate or an XOR tree or any logic structure that performs the XOR function. Only one first XOR gate is shown at this location in the electrical circuit for illustrative clarity. The first XOR gate may receive the respective input signals (D, D, and D) that are input to each of the SLDs (, , and ), and output a signal indicative of the XOR function applied to such input signals. The output of the first XOR gate is provided to the input of the first parity SLD . Operationally, the first XOR gate may asynchronously calculate the parity of the signals (D, D, and D) that are input to the SLDs (, , and ) under test.
220
230
220
220
2
211
212
213
220
2
1
2
2
2
3
211
212
213
The first parity SLD (also referred to herein as a parity test SLD) is illustrated as a D flip-flop that receives the output signal from the first XOR gate at its D input, but the first parity SLD may be any of a variety of different types of sequential logic device and/or other data storage element. The first parity SLD may, for example, receive the same clock input signal (i.e., Clock_) that is received by the SLDs (, , and ) under test. Operationally, the first parity SLD captures the parity of the input signals (D, D, and D) as they are clocked into the SLDs (, , and ) under test.
240
211
212
213
220
240
212
212
213
220
240
241
211
212
213
241
230
240
FIG. 1
The second XOR gate receives as input the respective output signals from the SLDs (, , and ) under test and the output signal from the first parity SLD . The second XOR gate thus asynchronously calculates the parity of the output signals from the SLDs (, , and ) under test and compares the calculated parity to the parity stored in the first parity SLD . The results of the test are output from the second XOR gate as signal , which is also called the “Protect Group 2 Parity Error.” For example, operationally, if an output of one of the SLDs (, , and ) under test errantly changes, for example as a result of a soft error induced state change, such an errant change will be reflected in the Protect Group 2 Parity Error signal . As discussed above with regard to the first XOR gate , the second XOR gate may comprise a single XOR gate, an XOR tree, or any type of circuit that performs an XOR function. As illustrated by the output bubble labeled “A,” the Parity Group 2 Parity Error signal is output to the corresponding input bubble labeled “A” in .
FIG. 1
FIG. 3
FIG. 1
150
241
150
150
160
Referring briefly back to , the report point OR gate receives as input the Protect Group 2 Parity Error signal . As mentioned previously, the first OR gate may also receive as input respective Protect Group Parity Error signals from other parity protect groups. Example input signal B, for example, corresponds to parity protect group circuitry shown in (discussed below). Please refer to the previous discussion of for the discussion of the operation of the report point OR gate and the report point SLD .
FIG. 2
FIG. 2
FIG. 1
FIG. 3
FIG. 2
—
—
211
212
213
200
The parity protect group shown in may, for example, be characterized by a respective set of control signal inputs. For example, the respective set of control signal inputs may comprise a clock net (e.g., clocked by the Clock2 signal), a clear (or reset) net (e.g., cleared by the Clear2 signal), and a set (or preset) net (e.g., a null net, since the SLDs , , and of the electrical circuit of are not coupled to a set signal). Such an example set of control signal inputs, for example based on three control signal input nets, may also be referred to herein as a triplet. As was seen in the previous discussion of and as will be seen in the following discussion of , other parity protect groups may be characterized by different respective sets of control signal inputs. Other parity protect groups may also be characterized by a same set of control signal inputs as the parity protect group shown in .
FIG. 3
FIG. 1
FIG. 2
300
300
100
200
Turning to , such figure is a schematic diagram of an electrical circuit comprising error protection, in accordance with various aspects of the present disclosure. The electrical circuit may, for example, share any or all characteristics with the example electrical circuit illustrated in and discussed previously and with the example electrical circuit illustrated in and discussed previously.
300
300
The electrical circuit is only shown in-part for illustrative clarity. The illustrated electrical circuit may, for example, comprise a portion of any of a large variety of electrical circuits. Such electrical circuits may, for example, comprise network interface circuitry (e.g., optical and/or electrical network interface chips), processing circuitry, register circuitry, multi-media processing circuitry, wired and/or wireless and/or optical communication circuitry, application-specific integrated circuits, baseband processors, etc.
300
305
3
1
3
2
3
3
305
305
105
205
3
1
3
2
3
3
1
1
1
2
1
3
2
1
2
2
2
3
FIG. 1
FIG. 2
FIG. 1
FIG. 2
The electrical circuit may, for example, comprise an upstream signal source that provides digital logic signals (e.g., D, D, and D) to downstream components. The signal source may, for example, comprise one or more immediately preceding logic devices (e.g., sequential and/or combination logic devices), analog-to-digital converters, communication buses, etc. The signal source may, for example, comprise the same signal source as illustrated in and/or the same signal source as illustrated in , or may be different. The digital logic signals (e.g., D, D, and D) may similarly be the same as the digital logic signals (e.g., D, D, and D) shown in and/or the digital logic signals (e.g., D, D, and D) shown in , or may be different.
300
1
311
2
312
3
313
311
3
1
305
212
3
2
305
313
3
3
305
311
312
313
The electrical circuit may, for example, comprise a first sequential logic device (SLD ) , a second sequential logic device (SLD ) , and a third sequential logic device (SLD ) . The first SLD may, for example, receive a digital signal D from the signal source . Also the second SLD may, for example, receive a digital signal D from the signal source . Additionally the third SLD may, for example, receive a digital signal D from the signal source . The SLDs , , and are illustrated as D flip-flops, but may comprise characteristics of any of a large variety of sequential logic devices (e.g., any type of flip flop, any type of other data storage element, etc.).
311
312
313
3
3
1
2
3
3
3
3
1
3
2
3
3
311
312
313
311
312
313
311
312
313
3
FIG. 1
FIG. 2
The first SLD , second SLD , and third SLD are each coupled to a same clock signal (Clock_). The clock signal Clock_ may, for example, be the same as the clock signal Clock_ shown in and/or the clock signal Clock_ shown in , or may be different. The clock signal Clock_ may comprise characteristics of any of a variety of clock signals. For example, the Clock_ clock signal may be an unmodified system clock (e.g., a sole system clock or one of a plurality of systems clocks). Also for example, the Clock_ clock signal may be a gated version of the system clock signals. Operationally, the respective inputs (D, D, and D) of the SLDs (, , and ) are stored in the SLDs (, , and ) when the SLDs (, , and ) are clocked (e.g., positive-edge clocked, negative-edge clocked, level clocked, etc.) by the Clock_ clock signal.
311
312
313
FIG. 1
FIG. 2
The first SLD , second SLD , and third SLD provide an example of a group of SLDs that will be tested as a group for a parity error within the group. Thus, they provide an example (e.g., another example in addition to the examples shown in and ) of what at times will be referred to herein as a “parity protect group.” A parity protect group may comprise any number of circuit elements (e.g., SLDs) under test. For example, a parity protect group may comprise an even number of SLDs (e.g., 16 SLDs, 32 SLDs, 64 SLDs, 128 SLDs, and/or an even number that is not a power of 2, etc.). Also for example a parity protect group may comprise an odd number of SLDs (e.g., 15 SLDs, 17, SLDs, 31 SLDs, 33 SLDs, 63 SLDs, 65 SLDs, 127 SLDs, 129 SLDs, an odd number that is not 1 greater or less than a power of 2, etc.). As will be discussed later, in various example implementations, it may be advantageous to have an odd number of circuit elements under test instead of an even number.
FIGS. 1 and 2
FIG. 3
FIG. 1
FIG. 2
FIG. 1
FIG. 3
FIG. 1
311
312
313
1
2
311
312
313
1
Different from the examples shown in , the first SLD , second SLD , and third SLD of are not coupled to a clear signal (e.g., like the clear signal Clear_ of and/or the clear signal Clear_ of ). Additionally, different from the example shown in , the first SLD , second SLD , and third SLD of are not coupled to a set signal (e.g., like the set signal Set_ of ).
300
330
320
340
340
150
FIG. 3
FIG. 1
The electrical circuit of may also, for example, comprise various circuit elements that operate together to monitor the parity of the circuit elements (e.g., SLDs) under test. Such circuit elements may, for example comprise the first exclusive OR (XOR) gate , first parity SLD , and second XOR gate . As will be discussed below, the output of the second XOR gate , labeled output B, may be input to the report point OR gate of . Each of such circuit elements will now be discussed.
330
330
300
330
3
1
3
2
3
3
311
312
313
330
320
330
3
1
3
2
3
3
311
312
313
The first XOR gate may, for example, comprise a single XOR gate or an XOR tree or any logic structure that performs the XOR function. Only one first XOR gate is shown at this location in the electrical circuit for illustrative clarity. The first XOR gate may receive the respective input signals (D, D, and D) that are input to each of the SLDs (, , and ), and output a signal indicative of the XOR function applied to such input signals. The output of the first XOR gate is provided to the input of the first parity SLD . Operationally, the first XOR gate may asynchronously calculate the parity of the signals (D, D, and D) that are input to the SLDs (, , and ) under test.
320
330
320
320
3
311
312
313
320
3
1
3
2
3
3
311
312
313
The first parity SLD (also referred to herein as a parity test SLD) is illustrated as a D flip-flop that receives the output signal from the first XOR gate at its D input, but the first parity SLD may be any of a variety of different types of sequential logic device and/or other data storage element. The first parity SLD may, for example, receive the same clock input signal (e.g., Clock_) that is received by the SLDs (, , and ) under test. Operationally, the first parity SLD captures the parity of the input signals (D, D, and D) as they are clocked into the SLDs (, , and ) under test.
340
311
312
313
320
340
311
312
313
320
340
341
311
312
313
341
330
340
341
FIG. 1
The second XOR gate receives as input the respective output signals from the SLDs (, , and ) under test and the output signal from the first parity SLD . The second XOR gate thus asynchronously calculates the parity of the output signals from the SLDs (, , and ) under test and compares the calculated parity to the parity stored in the first parity SLD . The results of the test are output from the second XOR gate as “Protect Group 3 Parity Error signal .” For example, operationally, if an output of one of the SLDs (, , and ) under test errantly changes, for example as a result of a soft error induced state change, such an errant change is reflected in the Protect Group 3 Parity Error signal . As discussed above with regard to the first XOR gate , the second XOR gate may comprise a single XOR gate, an XOR tree, or any type of circuit that performs an XOR function. As illustrated by the output bubble labeled “B,” the Parity Group 3 Parity Error signal is output to the corresponding input bubble labeled “B” in .
FIG. 1
FIG. 1
150
341
150
150
160
Referring briefly back to , the report point OR gate receives as input the Protect Group 3 Parity Error signal . As mentioned previously, the first OR gate may also receive as input respective Protect Group Parity Error signals from other parity protect groups. Please refer to the previous discussion of for the discussion of the operation of the report point OR gate and the report point SLD .
FIG. 3
FIG. 3
FIG. 3
FIG. 1
FIG. 2
FIG. 3
2
311
312
313
300
311
312
313
300
The parity protect group shown in may, for example, be characterized by a respective set of control signal inputs. For example, the respective set of control signal inputs may comprise a clock net (e.g., clocked by the Clock_ signal), a clear (or reset) net (e.g., a null net, since the SLDs , , and of the electrical circuit of are not coupled to a clear signal), and a set (or preset) net (e.g., a null net, since the SLDs , , and of the electrical circuit of are not coupled to a set signal). Such an example set of control signal inputs, for example based on three control signal nets, may also be referred to herein as a triplet. As was seen in the previous discussions of and , other parity protect groups may be characterized by different respective sets of control signal inputs. Other parity protect groups may also be characterized by a same set of control signal inputs as the parity protect group shown in .
Note that the example parity protect groups, and their respective corresponding sets of control signal inputs, are merely examples. Other parity protect groups corresponding to other respective sets of control signal inputs are also within the scope of the present disclosure.
FIGS. 1-3
FIGS. 4-6
FIGS. 1-3
The previous discussion of provides examples of various circuit protection structures in accordance with various aspects of the present disclosure. The following discussion of provides example methods and systems for forming various circuit protection structures, for example those shown in and discussed previously.
FIG. 4
400
400
Turning to , such figure shows a flow diagram of an example method for protecting an electrical circuit, in accordance with various aspects of the present disclosure. The method may, for example, comprise a method of producing an electronic device with on-board error detection.
400
405
400
400
400
400
400
400
The example method begins executing at step , the method may begin executing in response to any of a variety of causes or conditions. For example, the method may begin executing in response to a user command to incorporate error protection circuitry in a design, for example as generated organically, received from a third party designer, etc. Also, for example, the method may begin executing in response to a circuit design file being copied into a particular directory. Additionally, for example, the method may begin executing in response to a customer request for the addition of error protection circuitry to a design. Further for example, the method may begin executing in response to a simulation result indicating that more or less error protection is needed in a design, for example to meet particular error criteria (e.g., mean time before failure (MTBF) criteria). In general, the method may begin executing in response to any of a variety of causes or conditions. Accordingly, the scope of various aspects of the present disclosure should not be limited by characteristics of any particular cause or condition, unless explicitly stated.
400
410
410
The example method may, at step , comprise performing preliminary processing. Such preliminary processing may, for example, be performed on a circuit design prior to being parsed into parity protect groups. Step may comprise performing any of a variety of types of preliminary processing, non-limiting examples of which will now be provided
410
410
400
410
400
Step may, for example, comprise downloading and/or otherwise receiving circuit design information for a circuit design to which error protection is to be added. Such circuit design may, for example, be received in an RTL (register transfer level) design description file, or any of a variety of types of circuit design files. Step may, for example, comprise receiving circuit design information from a design group of the enterprise implementing the method . Also for example step may comprise downloading circuit design information from a third party enterprise (e.g., outside the control of the implementer of the method ) that sells, licenses, or otherwise commercializes circuit designs that may be used by others.
410
410
Step may further, for example, comprise converting a received circuit design file into a desired format for further processing. For example, in an example scenario in which an RTL design description file is received, step may comprise converting such an RTL design description file into a gate level circuit representation (e.g., a gate level net list) for further processing.
410
400
Step may also, for example, comprise receiving user input information, for example information that may govern execution of the method . For example, such user input may comprise receiving input directly from a user and/or from a configuration file. Such user input may, for example, comprise information regarding maximum size that a parity protect group may have, timing constraint information regarding allowable or preferred timing constraints for a circuit element (e.g., an SLD) included in a parity protect group, information regarding a minimum setup margin and/or clock-to-out margin allowable for an SLD included in a parity protect group, information regarding a target or MTBF for an electric circuit being protected, information regarding a percentage of circuit elements (e.g., SLDs) that need to be protected, etc.
410
410
400
410
In various example scenarios, there may be a maximum size allowed for a parity protect group. In an example implementation, a maximum number of SLDs under test is allowed for a particular parity protect group. In such an example scenario, step may comprise determining such a maximum number. For example, step may comprise receiving the maximum number via user input and/or reading the maximum number from a configuration file. Also for example, such a maximum number may be hard coded into software implementing the method . Additionally for example, step may comprise determining the maximum number based on timing constraints (e.g., setup time or clock-to-out margin for parity test SLDs and/or SLDs under test). Such a maximum number may for example, be 64, 32, 128, etc. (or 63, 31, 127, etc., if an odd number maximum is desired).
410
410
410
Step may also, for example, comprise identifying circuit elements (e.g., SLDs) that are eligible for inclusion in parity groups. For example, step may comprise first generating a protect list comprising all SLDs of the electrical circuit (or device), and then removing from the protect list a set of SLDs for which inclusion in a parity protect group is not desired. For example, step may comprise removing from the protect list all non-critical SLDs for which error detection is not needed, removing from the protect list SLDs that receive data from a clock domain other than a clock domain presently of interest (e.g., for which a report point is going to be generated) or that are otherwise associated with a different clock domain, and/or removing from the protect list SLDs that are already error protected in some other manner (e.g., by other parity protection, error detection circuitry, error correction circuitry, ECC or CRC or other codes, etc.).
410
As mentioned previously, various aspects of the disclosure may comprise forming a plurality of parity protect groups that are generally associated with a same clock domain (e.g., each parity protect group optionally includes or does not include various gated clock nets in such clock domain). Additionally, as discussed previously, parity protect groups may be formed in accordance with corresponding sets of control signal inputs (e.g., triplets, as discussed previously). In such an example scenario, step may comprise, for example for each SLD in the protect list, identifying the respective set of control signal inputs. Information of the respective set of control signal inputs for each SLD may then, for example, be utilized in a subsequent step for parsing (or dividing or segregating) the SLDs into parity protect groups with other SLDs having same respective sets of control signal inputs. As mentioned previously, a set of control signal inputs may, for example, comprise any one or more of: a clock net, a clear (or reset) net, a set (or preset or load) net, etc.
410
420
Step may further, for example, comprise generating a super parity protect group comprising all SLDs that have a same set of control signal inputs. In such an example scenario, a subsequent step (e.g., step ) may comprise parsing (or dividing or segregating) the super parity protect group of SLDs into a plurality of parity protect groups, each of which comprising no more than the determined maximum number of SLDs under test (discussed above).
410
410
410
420
FIG. 4
In general, step may comprise performing preliminary processing, for example prior to assigning circuit elements (e.g., SLDs) to parity protect groups. Accordingly, the scope of various aspects of the present disclosure should not be limited by any particular manner of performing preliminary processing unless explicitly stated. It should also be noted that the discussion of various functionality with regard to step does not necessarily mean that such functionality must be performed before subsequent steps as illustrated in . For example, any or all of the functionality discussed above with regard to step may be performed at step below or another step.
400
420
410
FIGS. 1-3
The example method may, at step , comprise generating parity protect groups for an electrical circuit (e.g., of an electronic device) that are advantageously protected. Many example characteristics of parity protect groups have been discussed previously (e.g., with regard to and step ).
FIGS. 1-3
FIG. 1
FIG. 2
FIG. 3
1
1
1
2
2
3
For example, a parity protect group may comprise a plurality of SLDs under test, where each of the plurality of SLDs under test is coupled to a same set of one or more control signal inputs. The same set of control signal inputs may, for example, comprise: a same clock net, a same clear (or reset) net, a same set (or preset) net, etc. For example, a set of control signal inputs may comprise a triplet (clock, clear, set) of control signal input nets, where any one or more of the triplet of control signal input nets may be null (or not used). provide three respective examples of sets of control signal inputs. For example, in , the set of control signal inputs comprise a triplet of Clock_ net, Clear_ net, and Set_ net. Also for example, in , the set of control signal inputs comprise a triplet of Clock_ net, Clear_ net, and null net. Additionally for example, in , the set of control signal inputs comprises a triplet of Clock_ net, null net, and null net.
FIGS. 1-3
120
220
320
A parity protect group may also, for example, comprise a parity SLD. Example parity SLDs were illustrated in (e.g., at parity SLD , parity SLD , and parity SLD ). The parity SLD may, for example, be coupled to the same set of control signal inputs to which the SLDs under test are coupled.
FIGS. 1-3
141
241
341
A parity protect group may additionally, for example, comprise a parity test output. Examples of a parity test output are provided in (e.g., at Protect Group 1 Parity Error , Protect Group 2 Parity Error , and Protect Group 3 Parity Error ).
420
As discussed previously, a plurality of parity groups may be formed for a same set of control signal inputs. For example, step may comprise generating a plurality of parity protect groups that all have the same set of control signal inputs. Also for example, as also discussed previously, any one or more of the plurality of parity groups may have different respective sets of control signal inputs (e.g., even within a same overall clock domain).
Further, as discussed previously, the parity protect groups may have different respective numbers of electrical elements (e.g., SLDs) under test. The number of SLDs under test, for example, might be generally odd. In various implementations, for example implementations utilizing the preset signal, it may be advantageous to subdivide the group of SLDs into smaller groups, each containing an odd number of SLDs. For example, in such a scenario, an always odd number of SLDs produces a known parity result in response to a set signal without having to know the number of SLDs under test.
420
420
420
In an example scenario, at least 75% of all parity protect groups, or at least 75% of all parity protect groups that correspond to a respective non-null preset net, generated at step might have respective odd numbers of SLDs under test. In another example scenario, at least 90% of all parity protect groups, or at least 90% of all parity protect groups that correspond to a respective non-null preset net, generated at step has respective odd numbers of SLDs under test. In still another example, 100% of all parity protect groups, or 100% of all parity protect groups that correspond to a respective non-null preset net, generated at step might have respective odd numbers of SLDs under test.
As an alternative, in a scenario in which a protect group corresponds to a set of control signal inputs that includes a non-null preset net, the number of SLDs under test is set to an even number, and additional logic may be incorporated into the parity test circuitry. As an alternative, for example in a scenario in which a protect group corresponds to a set of control signal inputs that includes a non-null preset net and in which the protect group has an even number of SLDs under test, the logical OR of the clear and preset signals may be provided to the clear input of the parity SLD, and a logical 0 may be provided to the preset input of the parity SLD.
410
420
As mentioned above in the discussion of step , a maximum number of circuit elements (e.g., SLDs) under test allowed in a parity protect group may be determined (e.g., based on user input, etc.). In such a scenario, step may comprise generating a plurality of parity protect groups, where none of the plurality of protect groups has more than the maximum number of circuit elements allowed. Many examples of such maximum numbers were provided previously.
FIGS. 1-3
140
240
340
As also mentioned above, a parity protect group may comprise a parity test output signal. As illustrated in , such a parity test output signal may be output from an XOR gate (, , and/or ) or XOR tree that receives as inputs an output from the parity test SLD of the parity protect group and respective outputs from each of the SLDs under test of the parity protect group.
420
420
130
230
330
420
FIGS. 1-3
Step may, for example, comprise selecting circuit elements (e.g., SLDs) for the protect groups based, at least in part, on a timing constraint (e.g., an SLD timing constraint). An example of such a timing constraint may comprise setup margin and/or a clock-to-out margin for an SLD. In an example scenario, in which a portion of the SLDs need to be protected, but not all of the SLDs need to be protected, step can select the SLDs that are incorporated in parity protect groups. Since the addition of testing devices (e.g., the first XOR gates , , and illustrated in ) may slow down signal transitions (e.g., of the SLDs under test), for example by adding additional capacitance and/or leakage to an input and/or output signal line, step may comprise incorporating SLDs with the loosest timing constraints (e.g., having the largest setup margins and/or clock-to-out margins, or path slack) into the parity protect groups. In such a scenario, a portion of the SLDs with the tightest timing constraints (e.g., having the smallest setup margin and/or clock-to-out margin, or path slack) might not be included in a parity protect group.
FIG. 5
FIG. 4
FIG. 5
500
500
420
500
550
Portions of the following discussion refer to , which shows a diagram illustrating circuit component selection, in accordance with various aspects of the present disclosure. The diagram generally shows a histogram chart of path slack (or setup margin) for various signal paths (and their respective components) for a particular example circuit. For example, as discussed above, step of may comprise incorporating SLDs with the loosest timing constraints (e.g., having the largest set up margins or path slack) into the parity protect groups. Referring to , such SLDs may correspond to the right portion of the diagram (e.g., those SLDs corresponding to the paths enclosed in box ).
420
420
550
420
FIG. 5
Step may comprise selecting circuit elements (e.g., SLDs) for the protect groups based, at least in part, on a timing constraint (e.g., an SLD timing constraint) in any of a variety of manners, non-limiting examples of which are now provided. For example, step may comprise excluding from the plurality of parity protect groups, those SLDs having respective timing constraints that are less than a threshold timing constraint (e.g., those SLDs corresponding to the paths in to the left of the left side of box ). For example, step may comprise excluding those SLDs that have a setup margin of less than N microseconds, instead including those SLDs having a setup margin of N microseconds or greater, and/or excluding those SLDs that have a clock-to-out margin of less than M microseconds, instead including those SLDs having a setup margin of M microseconds or greater, etc.
420
550
550
FIG. 5
FIG. 5
Also for example, step may comprise including in the plurality of parity protect groups a first set of SLDs having respective timing constraints (e.g., those SLDs corresponding to the paths in that are in box ), and excluding from the plurality of parity protect groups a second set of SLDs having respective timing constraints that are tighter than the respective timing constraints for the first set of SLDs (e.g., those SLDs corresponding to the paths in that are to the left of box ).
420
550
550
FIG. 5
FIG. 5
Additionally for example, step may comprise selecting circuit elements (e.g., SLDs) for the plurality of parity protect groups by, at least in part, including in the plurality of parity protect groups a first set of SLDs having acceptably large (or otherwise sized) respective timing constraints (e.g., those SLDs corresponding to the paths in that are inside box ), and excluding from the plurality of protect groups a second set of SLDs having unacceptably small (or otherwise sized) respective timing constraints (e.g., those SLDs corresponding to the paths in that are outside of box ).
420
420
420
As mentioned previously, in various scenarios it is not necessary to protect all circuit elements (e.g., SLDs) to achieve a desired reliability goal (e.g., to meet an MTBF target, for example input by a user, required by a customer, etc.). In such a scenario, step may comprise determining a target percentage of SLDs of the electrical circuit (or device) to parity check to reach the desired level of reliability. Such determining may, for example, comprise receiving the target percentage as user input, determining the target percentage based on simulation results, determining the target percentage based on field failure results, etc. In such a scenario in which a target percentage (e.g., N %) has been identified, step may comprise selecting N % of the SLDs having the loosest relative timing constraints for inclusion in the parity protect groups. For example, in a scenario in which it has been determined that 75% or 95% or 99% of the SLDs of a circuit must be protected to achieve a minimum acceptable MTBF, step may comprise identifying the 75% or 95% or 99% of the SLDs of the circuit that have the highest clock-to-out margin and/or highest setup margin (or path slack), etc.
420
Step may comprise generating parity protect groups based, at least in part, on any of a variety of criteria, non-limiting examples of which are presented above. Other example criteria may, for example, comprise physical location in a circuit, type of component, etc.
420
In general, step may comprise generating parity protect groups for an electrical circuit (e.g., of an electronic device) that is advantageously protected. Accordingly, the scope of various aspects of the present disclosure should not be limited by characteristics of any particular manner of generating the parity protect groups unless explicitly stated.
400
430
160
260
360
FIGS. 1-3
FIGS. 1-3
The example method may, at step , comprise generating a report point. Such a report point may, for example comprise a report point SLD that outputs parity test results for the parity protect group. Examples of such a report point SLD are provided at (e.g., at report point SLD , report point SLD , and report point SLD ). As discussed previously, for example with regard to , a single report point might be used as a sole reporting point for a particular clock domain. Alternatively, a plurality of report points may be used for a particular clock domain.
FIGS. 1-3
FIGS. 1-3
As illustrated in , a report point may be utilized to report a parity error that has occurred in any of a plurality of parity protect groups. Note that such parity protect groups might all be associated with a same set of control signal inputs (e.g., a same triplet), or may be associated with one or more different respective sets of control signal inputs (e.g., as shown by example in ).
400
440
150
141
241
341
160
150
FIGS. 1-3
The example method may, at step , comprise logically combining each of the respective parity test outputs of the plurality of parity protect groups at an input of the report point SLD(s). For example, as illustrated in , a report point OR gate may be utilized to logically combine the Protect Group 1 Parity Error , Protect Group 2 Parity Error , and Protect Group3 Parity Error outputs and provide the logically combined (e.g., the OR'd) output to the input of the protect point SLD . As discussed previously, the priority protect OR gate may, for example, be a single logic gate, an OR tree, any circuit performing an OR function, etc.
400
450
450
450
The example method may, at step , comprise generating a circuit (or device) design file, or other form of design information. Step may, for example, comprise generating a gate level design description (e.g., a gate level net list) and/or any of a variety of other types of design descriptions. For example, step may comprise generating a file comprising a description (or source code) that when processed by one or more processors of an integrated circuit (IC) fabrication system, causes the described electrical circuit to be fabricated. Note that such fabrication may comprise many intermediate steps between design file and completed circuit.
450
450
450
Step may comprise storing the circuit design file (or other information) on a storage medium (e.g., a non-volatile storage medium). For example, step may comprise storing the circuit design file on a hard drive, solid state drive, flash drive, CD ROM, DVD ROM, memory stick or thumb drive, etc. Step may also, for example, comprise communicating the circuit design file (or other information) to another computing system (or computer system site) via any of a variety of types of communication networks.
400
460
440
460
450
The example method may, at step , comprise fabricating the electronic circuit (or device) comprising said plurality of parity protect groups and said report point(s). The electronic device may, for example, also comprise the logical coupling circuitry discussed previously at step . Step , for example, may comprise fabricating the electronic circuit utilizing any of a variety of techniques, for example based on a circuit design file generated at step .
400
495
495
400
The example method may, at step , comprise performing continued operations. Such continued operations may comprise characteristics of any of a variety of continued operations. For example, step may comprise looping execution flow of the example method to any previous step or sub-step discussed herein.
400
400
FIG. 6
In general, any or all aspects of the example method may be performed in an automated environment (e.g., free of user interaction during execution of the method ). An example of such an automated environment is shown at and described in relation to .
FIG. 6
FIG. 4
600
600
400
Turning to , such figure is a diagram illustrating a system for protecting an electrical circuit, in accordance with various aspects of the present disclosure. The system (e.g., any or all components thereof) may operate to perform any or all aspects of the example method illustrated in and discussed previously and/or any other functionality discussed herein.
600
610
610
410
600
640
640
600
650
650
FIG. 4
The system , for example, comprises a user I/O module . The user I/O module may, for example, operate to perform any or all user interface functionality discussed herein (e.g., with regard to at least step and/or any of the steps of ). The system may also, for example, comprise a Network Communication Interface module . The Network Communication Interface module may, for example, operate to perform any or all communication network interface functionality discussed herein. The system may further, for example, comprise an External Device Interface module . The External Device Interface module may, for example, operate to perform any or all functionality discussed herein regarding communication with external (or peripheral devices), for example disk drives and/or electronic device fabrication equipment.
600
620
630
620
634
630
620
634
632
630
636
630
620
636
400
640
620
636
FIG. 4
The system also, for example, comprises one or more processors and one or more memory devices. For example, a processor may operate to perform any or all functionality discussed herein by, at least in part, executing software instructions stored as design software in the memory . Also for example, the processor may execute the design software to process one or more input circuit design files stored in the memory and generate one or more output design files stored in the memory . The processor may, for example, communicate the output design files (for example output from the method of ) to another system (e.g., via the Network Communication Interface module ). The processor may also, for example, store the output design files on a non-volatile computer readable medium (e.g., using the External Device Interface).
620
634
400
600
FIG. 4
As mentioned above, the processor may operate in accordance with the design software to implement any or all aspects of the method of . The design software may, for example, reside in non-volatile memory of the system (e.g., a magnetic and/or optical disk drive, a flash drive, a CD ROM drive, a DVD ROM drive, etc.).
600
The system may, for example, be a system contained in a single chassis or may, for example, be a distributed system comprising components that are dispersed throughout a building, campus, metropolitan area, nation, world, etc. Components of a distributed system may, for example, be communicatively coupled via any of a variety of intervening communication networks (e.g., the Internet, a metropolitan area network, a local area network, a wired and/or wireless network, terrestrial or satellite communication network, etc.).
600
600
620
FIG. 6
The system is shown in parsed into separate functionality modules for illustrative clarity only. The various aspects of the system , however, need not be segregated. For example, the modules may comprise shared hardware and/or software. Also for example, the processor may operate to perform the functionality of any of the other illustrated modules. Accordingly, the scope of various aspects of this disclosure should not be limited by arbitrary boundaries between hardware and/or software components, unless explicitly stated.
In summary, various aspects of the present disclosure provide a system and method for providing error protection in an electrical circuit. While the foregoing has been described with reference to certain aspects and embodiments, it will be understood by those skilled in the art that various changes may be made and equivalents may be substituted without departing from the scope of the invention. For example, within this document, the flops are illustrated as D-flops with set and clear input signals. However, the scope of various aspects of this disclosure should not be limited by characteristics of such flops. For example, the various aspects of this disclosure readily apply to any of a variety of different types of flops (e.g., SR flops, JK flops, T flops, etc.) having any of a variety of respective types of inputs (e.g., clear or reset inputs, set or preset or load inputs, etc.). For example, some systems may use reset and clear signals that are interchangeable. In another example, some systems may use reset and clear signals that are not interchangeable. In a further example, some systems may use set, preset, and/or load signals that are interchangeable. In an additional example, some systems may use set, preset, and/or load signals that are not interchangeable. In such instances, one of skill in the art will readily appreciate that the various aspects of this disclosure apply to all types of flops and/or all types of respective inputs for such flops. Many modifications may be made to adapt a particular situation or material to the teachings of the disclosure without departing from its scope. Therefore, it is intended that the invention not be limited to the particular embodiment(s) disclosed, but that the invention will include all embodiments falling within the scope of the appended claims.
BRIEF DESCRIPTION OF SEVERAL VIEWS OF THE DRAWINGS
FIG. 1
is a schematic diagram of an electrical circuit comprising error protection, in accordance with various aspects of the present disclosure.
FIG. 2
is a schematic diagram of an electrical circuit comprising error protection, in accordance with various aspects of the present disclosure.
FIG. 3
is a schematic diagram of an electrical circuit comprising error protection, in accordance with various aspects of the present disclosure.
FIG. 4
shows a flow diagram of an example method for protecting an electrical circuit, in accordance with various aspects of the present disclosure.
FIG. 5
is a diagram illustrating circuit component selection, in accordance with various aspects of the present disclosure.
FIG. 6
is a diagram illustrating a system for protecting an electrical circuit, in accordance with various aspects of the present disclosure. | |
The Liberal Party (自由黨, sbjih-ljiw-dang′) is the primary right-of-centre party in Themiclesia. It has governed since 2016 and survived the recent 2019 general election. The party is led by [name] and currently supports the maintenance of the welfare state but also co-operation between the public and private sectors to stimulate growth. While it represents the political right in Themiclesia, internationally it is considered a centrist party, or even slightly left of centre.
Contents
History
Origins
The deepest roots of the Liberal Party, though academically controversial, may be traced to the imperial lobby at the Themiclesian court in the 15th century. As a coherent body of opinion, it did not rise to prominence until mid-century, consisting of domestic and foreign merchants and interest groups in Themiclesia's possessions abroad. All these forces decried the peace treaty that prohibited Themiclesia from seeking maritime domination in the Meridian Ocean, when the Yi cavalry crossed the Dzhungestani desert in 1385. In response, the court began to concentrate resources in Columbia, organizing a standing army to fend off encroachment by Casaterrans there, now that Meridia was beyond reach. Since then, commercial and other interests in Columbia have been active at court to ensure that sufficient resources are devoted to maintenance of military dominance in Columbia.
19th century
While the imperial lobby at court always enjoyed some degree of influence up to the end of the 18th century, the need to fund a standing army in Columbia and Norfeld and a large navy led to excessive taxation domestically, which foremost injured the financial position of the civil service aristocracy. Upon serious defeats in 1791 and 1796 and years of overtaxation and aristocratic resentment, the Lord of Gar-lang (河陽侯) assembled a wide coalition of civil servants and aristocrats to rout the lobby's supporters. When a peace treaty was proposed, barring tariffs on Hallian imports and exports, and initially rejected by the throne, the stability of Gar-lang's support base forced the the emperor to accept the treaty. This treaty meant a great influx of Hallian goods into Themiclesian markets, which the merchant class decried, though the land-based aristocracy saw no major issue with it. Gar-lang's confederacy became the Conservative Party, which dominated Themiclesian politics for the next 40 years, imposing minimal taxation (especially on land) as its primary directive. While the imperial lobby was weakened at court, the domestic economic recovery and integration caused the values of the imperial lobby to become popular with classes that formerly had nothing to do with it. Despite Conservative political dominance, it gradually rose to prominence again over the 1820s and 30s. Economically, it represented domestic merchants and industrial magnates that wished to see regulations adverse to their interests lifted, and politically it was influenced by the Enlightenment, desiring to see political reforms to a more accountable and less aristocratic system of government. | https://iiwiki.us/mediawiki/index.php?title=Liberal_Party_(Themiclesia)&oldid=251920 |
Does BCI give the potential of creating an unethical use by outside third parties? Does BCI have the potential to replace the standard methods of Human Computer Interaction? Does BCI effect the human psyche in a negative way?
Keywords
BCI (Brain-Computer Interface)
Bibliography
Research Notes
Potential Topics
- The effect of implanted interfaces (anything that is connected directly to our nervous system) i.e. Brain-Computer Interfaces.
- How will BCIs effect the psyche of humans? | https://wiki.cdot.senecacollege.ca/w/index.php?title=Team_Awesome&oldid=73186 |
The fundamentals of market research are covered in this course, as are several advanced methods for gaining real and in-depth insight that can assist in making better business decisions.
It goes on to explain how to write a good brief and select the best agency; it assists you with perceiving how perceptions from research get created into bits of knowledge and how this can then be estimated essentially through NPS along a client experience map. The course is very hands-on and full of real-world case studies and examples that should motivate you to return to your day job with new skills, reference templates, and motivational stories to help your business grow. | https://vertexlearning.org/market-research-evaluation-analysis/ |
Rhymes and poems open the door to creativity, build vocabulary and boost early language development.
Verse-a-tile, an English poetry recitation competition was held for the students of KG on 24 August 2020.The participants recited with great zeal and enthusiasm. They used voice-modulation and enhanced their presentation with colourful props and actions. It was delightful to watch their bright and expressive performances.
|‘Verse-a-tile’- Recitation Competition for the Students of Class Nursery- August 2020|
|
|
Poetry is the heart and soul of literature. To spread the fragrance of poetry an Intra Class poem recitation competition was organised for the little ones. Our young poets expressed the beauty of thoughts and feelings through poems.
The main purpose behind conducting this competition was to build self-confidence, develop the oratory skills and self-expression of the students.
The efforts of the participants were praised by the judges. Each participant presented the poem with voice modulation and confidence. | https://tagoreint.com/vv/V2.0/world-of-tiny-tots |
hello Internet oscar veliz again with another
video this time showing you how to find
the interval of convergence as well as
how widen that interval when it comes to
finding roots only bisection and false
position method actually have a
guarantee of convergence that's because
the interval that they use a and B force
the function to cross the x axis somewhere in between Newton type methods don't have this
same guaranteed convergence unless you
find the interval of convergence Newton
type methods are root finding
approaches with this form that have a
Newton step and a Newton update so
Newton's method is a Newton type method
but so are Secan Method a finite
difference method all of these you are
just in finding the interval of
convergence for let's look at an example
of a function both converging and
diverging when we try to find the root
this function will use the arctangent
and the approach will be used to find
the root is Newton's method which means
we also need the derivative in this case
it's 1 over x squared plus 1 we'll start
from 3 points the value point 5 the value of
1 and the value of 1.5 here's what the
arctangent looks like and the root is
clearly 0 but that's not really what
we're looking for we want to find the
interval the convergence so if we use
Newton's method starting at the point at
0.5 it takes about three iterations to
start converging on the root and if you
start the value 1 it also clearly starts
to converge but if we start the value 1
point 5 this causes our root finding
method to start to diverge here I
plotted out all of the points that we
used in our tests and we'll show green
squares for when they converged and red
x's for when they diverged
I also plotted out the negative starting
points to see if they also converge or
diverged and it's pretty clear that
anywhere between negative 1 and 1 will
converge at any point outside of
negative 1.5 and 1.5 diverges but when
does it go from converging to diverging
that's what we want to find we want to
find the interval of convergence so how
do we find that
interval given some function and an error
threshold we'll use a few test points to
see when they start to converge and
diverge well then take a new test point
midway between those two important
points and replace it depending on the
behavior of the function this is
essentially bisection using our example
from earlier we know that everything up
to one converged and everything after
1.5 diverged so we'll take the midpoint
and test it using Newton's method a few
times and it looks like this one is
converging so we'll add this to our
interval of convergence now we would
repeat the process using the new value
for C and D take the midpoint and start
using Newton's method and looks like
this one's also converging so we'll add
it to our new rule of convergence
again we take the midpoint between C and
D and test it using Newton's method
although this time it looks like it is
diverging so we'll exclude it from our
interval of convergence and we keep
repeating this process until C and D
come together here are our actual numbers
for C and D as we iterate through them
but this is only one half of the story
what we need are both sides of the
interval so if you look at this our
actual interval if your distance between
negative one point three nine and one
point three nine this is that same
interval graphically but what we would
like is for a way to expand that
interval recall this form for a Newton
type method we'll do one small change by
adding a variable gamma this is a
damping factor it's a number between
zero and one
not including zero when gamma is one
it's like normal we take the full Newton
step but when gamma is less than that
you take only a partial Newton step
let's look at an example where gamma is
equal to 0.9 and we start at the
divergent point of 1.5 with the gamma of
0.9 the point that usually led to
divergence 1.5 now leads to convergence
this is because we don't take the entire
Newton step so we don't use a normal
value for x2 we only take it part of it
now our interval of convergence is
actually between negative one point five
seven and positive one point five seven
but this is actually with the very large
value for gamma with a very small
gamma we can actually start much further
away in this case the starting point of
four and still lead to convergence with
our value for gamma being point one
our interval of convergence is actually
now between negative 13 and positive 13
some things to keep in mind the interval
of convergence depends a lot on the
function you're using the value for
gamma and the root finding method there can
also be outlier points outside of your
interval that lead to convergence
normally if your function isn't behaved
well and there also can be multiple
intervals of convergence usually if you
have multiple roots and they're spaced
far away from each other
also these intervals usually don't have
to be symmetric in our case they were
for the arctangent in practice usually
start with a small value for gamma
and then increase it as you iterate
through your function and even if you're
not interested in finding the interval
to converges you can still use gamma to
avoid divergence the example code that I
use to generate these graphs will be
hosted on github thank you for watching
if you have any questions comments
concerns or other suggestions or videos
please be sure to leave them in the
comments
| |
After the One Anchorage Campaign loss in April, Pride Foundation and local partners from the ACLU of Alaska, Identity, Alaskans Together, and other interested community volunteers worked to bring together a diverse group of stakeholders from throughout the state to outline a forward-thinking vision for the LGBTQ movement in Alaska and identify preliminary next steps for moving us toward that vision. The hope was to build on the lessons learned, the coalition formed, and the momentum gained as a result of the campaign.
On Saturday November 17, we spent our day and evening with 30 people ranging in ages from early 20s to 70s from Bethel, Juneau, Fairbanks, and Anchorage who honestly (and sometimes uncomfortably) shared their histories, hopes, worries, and challenges with one another. As a result of the thoughtful planning, gifted facilitation by an outside consultant, and open engagement by the participants, the group left “hopeful”, “inspired”, and “grateful” for the opportunity to be a part of this process.
After spending some time sharing past lessons and analyzing the current social and political landscape, the convening group identified the following potential priorities for strengthening the movement for LGBTQ equality in Alaska:
Priority #1: Building the Base
While this convening was a good first step, the group recognized that it was only a first step toward building a strong base and coalition of allies to help advance the movement for equality. The people who define, advance, and communicate the goals of our movement should be as reflective of the diversity of our community as possible in terms of race, geography, and gender identity. It’s also important to engage and involve non-political LGBTQ groups rather than assuming their disinterest in conversations about advocacy. Furthermore, the group discussed the importance of identifying and cultivating relationships with allies in business, labor, healthcare, media, government, schools, and faith communities. Such partnerships help us create safe spaces and LGBTQ-inclusive policies. These groups are also part of efforts to which we might lend our time, energy, and skills that affect the entire community.
Priority #2: Document and Share the LGBTQ Experience—Past & Present
While there are a lot of anecdotal stories about the LGBTQ experience in Alaska, very little concrete research has been conducted regarding our population, our families, our professions, our voting and buying power, or what other Alaskans think about the LGBTQ community. This information could be used to make more informed decisions about how to advance the movement for LGBTQ equality in our state and how to share that vision with others. Furthermore, there are a lot of lessons to be learned from the history of pioneers, leaders, and activists throughout the state who have contributed to the movement thus far—their stories need to be documented, preserved, and shared.
Priority #3: Support and Engage LGBTQ Youth
There was a strong contingent of participants who were particularly interested in identifying and engaging community leaders from education, non-profit, church, and business sectors to support, engage, and champion LGBTQ youth and to provide youth with the skills to advocate and organize on their own behalf.
Priority #4: Explore Possibilities for a Statewide Organization or Coalition
Currently, Alaska lacks a single-state-based LGBTQ organization that has the ability to mobilize individuals throughout the state to advance the movement for equality whether it is focused on engaging the base, building partnerships, educating the public, or advocating for political change. Convening participants decided to create a working group to gauge whether a statewide entity was the best way to organize the LGBTQ community. This process of evaluation will include organizing town halls in multiple communities to test some of the ideas surfaced at the convening, and explore workable alternatives for building a statewide organization by either creating one from scratch, reviving, or merging existing organizations.
Priority #5: Healing the Base
The group acknowledged that the LGBTQ community is in deep need of healing from experiences of discrimination, political losses, internalized oppression, and interpersonal conflicts—all of which create barriers to accomplishing our goals and dilute the integrity of our message of equality. Participants discussed the need to create a system of mediation to address and prevent crises and to model for the rest of the community our vision of equality and inclusivity. This would be accomplished by establishing healthy group norms that include respect, transparency, assuming positive intent despite our differences, and speaking for and owning our individual perspectives while letting others speak from theirs.
While there might be a good bit of work to do in Alaska, there is a rich history of LGBTQ leadership and activism to build on—not to mention the “can-do” attitude it takes to thrive in Alaska. We look forward to continuing to work with the convening participants and all members of the community toward a vision of full equality for LGBTQ people in Alaska.
If you are interested in a particular priority/interest identified at the convening and would like to lend your time, skills, expertise, or feedback to this new phase of statewide movement-building, please contact Pride Foundation’s Regional Development Organizer in Alaska, Tiffany McClain: [email protected] or 907-903-1280. | https://pridefoundation.org/2012/12/frontier-frontier/ |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.