content
stringlengths
0
1.88M
url
stringlengths
0
5.28k
Corva Lab is born from an idea. It develops from a necessity. It takes shape in an evolution. We are children of the strength of our fathers. We are veterans of their determination. We take responsibility for 40 years of history. But we are not afraid to change! We want to explore, to renew, to rethink carrying in the pocket the art of those who have held the trade in their hands. We give voice to the seemingly mute material, we work it up to transform it into a living form linked to design, fashion and the world of art. We make more than just a product. We shape the concepts that talk about us.
https://www.corvalab.it/en/about.html
As Professor Kong Jiangping mentions in his Preface, the present volume may be regarded as a successor to an earlier JCL monograph #8, entitled The Ancestry of the Chinese Language, based on a two-day symposium held at the City University of Hong Kong in July 1994. […] The present volume is JCL monograph #29, with a slightly different title, The Ancestry of the Languages and Peoples of China. With a separation of over two decades between the two monographs, there is quite a turn-over in the authors. While Paul Li graces these monographs again to discuss language families in Southeast Asia, monograph #29 is strengthened by many fresh faces, young linguists with various connections to Peking University. This is of course a good sign—that a new generation of scholars in China have come of age to take up the challenge of understanding where they and their languages come from. In addition, contributions from several more seasoned scholars—George van Driem, Randy LaPolla, and Jackson Sun—make the monograph all the more valuable. Since the monograph has “peoples” in its title, it is especially appropriate that van Driem should discuss “The ancestry of the Chinese people based on language and genes”. […] It is well-known that East and Southeast Asia is a ‘linguistic area’, in the sense of Emeneau, M. (1956) , where for millennia migrating peoples fuse and split, again and again, as rhythmically stated in the opening chapter of the Sānguó yănyì三国演义: Tiānxià dàshì, fēn jiŭ bì hé, hé jiŭ bì fēn 天下大勢, 分久必合, 合久必分. In studying language relationships in China, the two dominant legacies are from Indo-European linguistics, centered on the family tree as the primary model, and from Chinese philology, where a Sino-centric perspective has blurred the vital importance of the numerous minority languages over the millennia. To move forward now, we must no longer be constrained by these two legacies, even though they have both combined to give us an indispensable foundation to build upon for many decades. We must give adequate attention, long overdue, to language mixing over the millennia; and we must keep fully in mind numerous languages have mixed intensively with each other along many dimensions during this time, Sinitic being just one of them. Chinese Linguistics is gradually building up a substantive literature on this important challenge of “ancestry”. The two papers on Sino-Tibetan, and this monograph brought together by Professor Kong are the latest important contributions. However, the challenge of understanding clearly where we and our languages come from is an immense one. A remarkable scientific breakthrough like the discovery of Ancient DNA may be too much to hope for in linguistics. Nonetheless, we will need to build carefully upon past scholarship in our own field as well as coordinate closely with geneticists and archeologists if we are to ever succeed in this quest. Excerpt 节选 Professor William Shi Yuan Wang initiated a symposium named “The Ancestry of Chinese Language” at the City University of Hong Kong in July 1994. A monograph of Journal of Chinese Linguistics, whose number is 8 in the Monograph Series, included 9 papers and 6 comments and was published after the symposium. In 2016, Prof. Wang told me that he was willing to hold the second symposium of “The Ancestry of Chinese Language”, because the study on the ancestry of Chinese language had undergone a lot of progress after more than 20 years’ development in this research field. Since I was a visiting lecture professor of the College of Chinese Language and Culture (CCLC) of Jinan University, I talked to Prof. Shao Yi, the Dean of CCLC and with Prof. Wang’s consent, after which we finally decided to hold the second symposium named “The Ancestry of Chinese Language and People”, sponsored by the CCLC of Jinan University in July 2017, Guangzhou. Jinan University is one of the top 100 universities under the Key Construction Project of the 21st Century of China. CCLC has four departments: the departments of Chinese, Applied Linguistics, Chinese International Education and Pre-university Education, and two academic institutes: the Overseas Chinese Education Research Institute including 6 research centers which are the Chinese Testing Center, Chinese Textbook Research Center, Chinese Teacher Certificate Center, Overseas Chinese Research Center, Chinese Education Service Center and the Editorial Office of TCSOL Studies, and the Institute of Applied Linguistics consisting of three centers which are Center for Ecology of Languages and Cultures, Center for Language Competence Development and Center for Corpus Development. The second symposium of “Ancestry of Chinese Language and People” was held on May 30-31, 2017. From the name we can see that the symposium topic, in which the study on the people is added, is a little different with the first one, because the study on the relationship between genetics of different ethnos and languages had developed significantly over the last ten years. More than 20 international scholars attended the symposium and finally eleven papers were contributed to the Monograph of JCL by fourteen international scholars. The papers in this monograph can be divided into three categories: the study on the ancestry of Chinese language in historical linguistics, the study on the ancestry of Chinese language and people by new methods, and the study on the distributions of languages and peoples immigrating from the central to the south of China at different times in the Chinese history. […] Article 文章 建构东南亚几个语系之间坚实可靠的亲属关系 Paul Jen-kuei Li 李壬癸 Abstract 摘要 This is an evaluation of the various hypotheses regarding the possible genetic relationships between different language families in Southeast Asia, including Sino-Tai, Austro-Tai, Austro-Kra-Dai, Austric, Sino-Austronesian, and Sino-Miao-Yao. In order to establish reliable genetic relations between different language families, we need more solid linguistic evidence to distinguish between true cognates and loanwords. Vocabulary gets borrowed easily, whereas morphology is the most resistant to change. The genetic relationship between Chinese and Tibetan-Burman languages is well established, and perhaps so are Austric and Austro-Tai or Austro-Kra-Dai. However, there is not much chance for the genetic relationships of Sino-Tai, Sino-Austronesian or Sino-Miao-Yao. 本文在评估有关东南亚几个语系之间亲属关系的各种学说,包括汉语与傣语、南岛语与侗傣语、南岛语与南亚语、汉语与南岛语、汉语与苗瑶语等。要建立语系之间的亲属关系,必须要有坚实可靠的语言学证据才能够区分真正的同源词与借词。成系统的同源词都会有构词方面的证据,极不易移借,而一般词汇却容易移借。汉语跟藏缅语的亲属关系已经确立无疑,南岛语与南亚语以及南岛语与侗傣语几乎也已经可以确立,然而汉语与傣语、汉语与南岛语、汉语与苗瑶语的关系证据都很薄弱。 Subject Keywords 主题词 Genetic relations 亲属关系 Language family 语系 Southeast Asia 东南亚 True cognates 同源词 Loans 借词 Abstract 摘要 Horpa is an understudied, internally diverse Rgyalrongic cluster (Qiangic branch, Sino-Tibetan family) spoken across six counties in two prefectures of northwestern Sichuan. As this author demonstrated in an earlier article using individual-identifying morphological evidence, Northern Horpa (Stodsde) clearly belongs under Rgyalrongic (J. Sun 2000b). The phylogenetic affinity of less conservative Horpa languages (e.g., Rta’u) is however far less obvious. This paper, drawing on extensive recent fieldwork, offers a fuller range of cross-dialect evidence in important areas of Horpa verbal morphology to vindicate the ancestry of Horpa as a Rgyalrongic subgroup. It is shown that quite banal phonological and grammatical evolutions have caused the innovating Horpa languages to cast off much of their characteristic morphology, masking their true Rgyalrongic origins. 霍尔语群属于汉藏语系羌语支嘉戎语组,内部分歧明显,不同的方言星罗棋布于四川西北部两州六个县。作者先前曾提出北部霍尔语属于嘉戎语组的确凿形态证据,然而霍尔语群创新性强的语言(如道孚话)的谱系关系仍待厘清。本文根据近年搜集更全面的方言材料,提供数项动词形态的证据,重新确认整体霍尔语群在嘉戎语组的谱系归属。创新的霍尔语事实上是经历了数种普通的音韵及语法演变,导致原始形态特征的大量失落,它们的嘉戎根源因而隐盖不彰。 Subject Keywords 主题词 Sino-Tibetan family 汉藏语系 Qiangic branch 羌语支 Rgyalrongic subgroup 嘉戎语组 Linguistic ancestry 语言祖源 Phonological and grammatical innovation 音韵与语法创新 Contact-induced language change 接触引发的演变 Abstract 摘要 The Bai language, as a sister language of Chinese, has ever been an enigma of Sino-Tibetan family. To solve this enigma, the tree structure of Sino-Tibetan family as the background should be checked first. As the Bai language has a long-term contact with Chinese, the reconstruction of Proto-Bai becomes necessary in order to exclude late borrowings from Chinese. Studies along this way not only shed light on the formation of Proto-Bai, but also on the formation of Chinese. It has been noticed that lexical items may reflect the partial connection between languages. Looking into more basic functional items like negators in Bai dialects, it is suggested that some surrounding Yi languages may have played a role in the evolution of the Bai language. The multi-language ecology of the Bai language is similar to Chinese, especially at the stage of initial China. 白语是汉语的姐妹语,曾一直是汉藏语系属研究的一个谜。解决这个疑团先要检讨汉藏语系的谱系结构。白语和汉语有长期的接触史,有必要重构原始白语以排除后期汉语借词。这方面的研究不仅可以揭示原始白语的形成,也可以启发我们对于汉语形成的理解。词汇可以部分展示语言之间的关联。如果细究白语方言中的一些基本的功能性成分,譬如,否定形式,可以看出周边的彝语也曾在白语演变中起了重要作用。白语发展中的多语共存的生态环境或许跟汉语起始阶段的情形类似。 Keywords 关键词 Proto-Bai 原始白语 Sino-Tibetan 汉藏语 Trans-Himalayan 泛喜马拉雅 Chinese 汉语 Ecology 生态 Abstract 摘要 This study makes use of data from eight Yao dialects to reconstruct the initial system of Proto-Yao. Compared with previous studies, the strict sound correspondences (pervasive and complete sound correspondence) are established in this paper to exclude chance resemblance. Then, the initial system of Proto-Yao is reconstructed based on the principle of the comparative method. It is worth noting that the hierarchy of proto-forms is distinguished according to the stringency of sound correspondence, which is necessary for us to examine the proto-form’s time depth and how strongly it is supported by sound correspondence. Based on the reconstruction, some tantalizing issues are discussed including the development of prenasalized initials of Proto-Miao-Yao, three-way distinction of sonorants, six sets of obstruents between Proto-Yao and Proto-Min, and the genetic relationship between Yao and Chinese. 本项研究基于八个瑶语方言点的材料构拟了原始瑶语的声母系统。与前人研究相比,本文首先通过建立方言间的严格语音对应(普遍语音对应和完全语音对应)来排除偶然相似造成的对应,进而采用历史比较法的原则构拟了原始瑶语的声母系统。值得注意的是,本文根据语音对应的严格性区分了原始形式的层级,这一点对于检验原始形式的时间深度以及语音对应对原始形式的支持力度来说是十分必要的。基于这一构拟系统,文章讨论了一些引人注目的话题,例如,原始苗瑶语鼻冠音声母的发展,响音的三分,原始瑶语和原始闽语中的六套塞音声母,以及瑶语与汉语的语缘关系。 Keywords 关键词 Yao language 瑶语 Sound correspondence 语音对应 Initial system 声母系统 Reconstruction 构拟 Chinese 汉语 Abstract 摘要 Mandarin Chinese and the other Sinitic languages together comprise one out of many branches of the Trans-Himalayan language family. China is also home to languages of the Austroasiatic, Austro-Tai, Altaic and Hmong-Mien families. Twenty years ago, the father tongue correlation was recognised as a principle in the founding dispersals of linguistic phyla based on the ubiquity of the correlation of Y chromosomal markers with the geographical distribution of language families. The geographical distribution and the relative chronology of branching and spread of the Austroasiatic, Austro-Tai, Trans-Himalayan and Hmong-Mien language families correlate with four distinct paternal lineages that are subclades of the Y chromosomal haplogroup O. 官话及其他汉语方言共同组成“跨喜马拉雅语系”下众多语支中的“汉语支”。中国同时也是南亚、澳台、阿尔泰及苗瑶语系语言的家乡。南亚、澳台、跨喜马拉雅及苗瑶语言的地理分布及分支与扩散的相对年代与四条不同的父方世系有关联,这些都是人类Y染色体单倍群O 的下位群体。 Keywords 关键词 Trans-Himalayan language family 跨喜马拉雅语系 Population genetics 群体遗传学 Prehistory 史前史 Historical linguistics 历史语言学 Source of language 语言祖源 试探原始汉藏语的子句结构及其演变 Randy J. LaPolla 罗仁地 Abstract 摘要 In Sino-Tibetan historical linguistics, much has been done in reconstructing the sound system of Proto-Sino-Tibetan and in reconstructing a large number of cognate lexical items assumed to have been part of Proto-Sino-Tibetan, and there has been considerable work in terms of what morphology can or cannot be reconstructed to Proto-Sino-Tibetan, but it is much harder to say that two syntactic patterns are cognate than to say that two morphological paradigms or particular words are cognate. Within the family we find that modern Sinitic varieties vary from most of the Tibeto-Burman languages in terms of basic clause structure. In this paper we look at information structure in Old Chinese to attempt to find a directionality to the changes found in the long period we think of as Old Chinese, and to look back to the starting point of those changes to see what the clause structure of the precursor of Old Chinese might have been. As it turns out to be more similar to the dominant patterns of Tibeto-Burman languages, it allows us to hypothesize what the patterns were in Proto-Sino-Tibetan. 众所周知,汉语族语言与藏缅语族语言有亲属关系,即都来自原始汉藏语。已有不少研究试探构拟原始汉藏语的语音系统、形态和词汇,但句法的性质与词汇、形态的性质不一样,难以构拟,尤其是因为汉语族的语言和大部分的藏缅语族的语言的句子结构不一样。本文试探用信息结构来了解古汉语词序变化的方向,追溯变化的起点,认为在史前时代后来演变为古汉语的语言的词序比较接近大部分藏缅语族语言的词序,因此我们可以推测原始汉藏语的句子结构。 Keywords 关键词 Sino-Tibetan languages 汉藏语 Historical linguistics 历史语言学 Information structure 信息结构 Syntactic reconstruction 句法构拟 汉藏语系的基本谱系结构——基于文化词和核心词的有阶分析 Baoya Chen 陈保亚; Dejiang Yu 余德江 Abstract 摘要 In this paper, we discuss the genetic relationship of Sino-Tibetan languages, especially that between Sino-Tibetan and Kam-Tai languages. We first review the methodology of correlated and complete sound correspondence and that of rank analysis. By adopting the latter methodology, we then demonstrate rank analyses of domestic animals, tool materials, numerals, and core words, all of which serve as case studies on the relationships between Old Chinese and such languages as Kam-Tai, Written Tibetan, and Written Burmese. Based on the distributional differences of sound correspondences across ranked lexical items in the aforementioned semantic domains, we propose a genetic tree of Sino-Tibetan languages whereby Kam-Tai is not related to Sino-Tibetan. 本文主要讨论了汉藏语的基本谱系结构,尤其是汉藏和侗台的关系问题。在讨论之前,我们首先回顾了关联对应、完全对应等语音对应方法,以及有阶分析等语源分析方法。在有阶分析方法基础上,我们讨论了古汉语、侗台语、藏文、缅文之间在六畜词、工具质料词、数词、核心词的有阶分布,并据此提出了汉藏语的一个基本谱系结构,在这个结构中,我们认为目前还没有充分的证据显示汉藏语和侗台语有同源关系。 Keywords 关键词 Sino-Tibetan 汉藏语 Kam-Tai 侗台语 Strict sound correspondence 严格语音对应 Rank analysis 有阶分析 Genetic relationship 语源关系 Abstract 摘要 The emergence of tone has always been a key and difficult point in the study of historical linguistics. Based on people’s language cognitive abilities and the basic laws of phonemes, this paper has developed a method to calculate the phoneme structure load. Using this method, the phoneme loads of thir-ty-two tonal languages and five non-tonal dialects of Chinese, Tibetan and Tibeto-Burman were calculated. Based on this, the information standard of tone emergence in living spoken language has been proposed. At the same time, the phoneme loads of reconstructive languages by Li (1980), Wang (1956, 2010), Guo (2010), Zhengzhang (2003), Baxter and Sagart (2014), and the phoneme load of Chen and Qiu (1008) were calculated. According to the result of phoneme loads, we found that the tone emergence in the recon-structed languages and Guangyun do not accord with people’s cognitive abilities of spoken language. 声调的涌现一直是历史语言学研究的一个重点和难点。本文基于人的语言认知能力和音位的基本规律,发展出了一种计算音位结构负担量的方法。利用这种方法,计算了汉语、藏语和藏缅语32种有声调语言和5种藏语无声调方言的音位负担量,以此为基础,提出了在活的口语中声调涌现的信息量标准。同时还计算李方桂(Li 1980)、王力(Wang 1956, 2010)和郭锡良(Guo 2010)、郑张尚芳(Zhengzhang 2003)、白一平和萨加尔(Baxter and Sagart 2014) 等6种构拟语言和《广韵》(Chen and Qiu 1008)的音位负担量,根据音位负担量的计算结果,我们发现构拟语言和《广韵》中的声调都不符合人们口语的认知能力,它包含了太多的冗余信息,不是古代一个活的语言的音位系统。 Keywords 关键词 Phoneme load 音位负担量 Tones in Sino-Tibetan languages 汉藏语声调 Tone emergence 声调涌现 Tone reconstruction 声调构拟 Abstract 摘要 Recently, some genetic studies have directly related specific languages with specific genes and ethnos. At least so far, these ideas or speculations are too optimistic and confident. After all, ethnos is only a kind of distinguishing relationship between the different ethnic groups, language is a kind of culture that could be shared by different ethnos, and genes are a kind of biological fact of race. We cannot yet now make sure if there is one-to-one correspondence between the language, genes, and the ethnos. The field experiences from Yunnan showed that an ethnic group may speak two or more languages, and two ethnic groups may not identify with each other, although they are from the same ancestor and speak the same language. Based on these facts, this paper researches some literature and some archaeological studies on the early history of Yunnan, and speculates that Chinese spread to Yunnan in the Shang dynasty, and Bai language subsequently developed from it. 一些遗传学研究直接把特定的语言与特定的基因和特定的民族对应起来,至少到目前为止,他们的理论或猜测过于乐观和自信。毕竟,民族只是有着不同认同的人群之间的一种区别关系,而语言是可以由不同民族共享的一种文化,基因则是关于种族的一种生物学事实,语言、基因和民族之间未必有一一对应的关系。云南的田野经验表明,一个民族可能会说两种或更多种语言,而两个民族即使来自同一个祖先并且说同一种语言,他们也可能并不相互认同。基于这些事实,本文重新梳理了一些关于云南早期历史的文献记载和考古研究,推测汉语在商代就已经传播到云南,而白语就从它发展而来。 Keywords 关键词 Language 语言 Gene 基因 Ethnos 民族 Chinese 汉语 Bai language 白语 Shang dynasty 商代 中国南岭地区语言概况 Xingquan Hou 侯兴泉; Yinghao Li 李英浩; Yi Shao 邵宜; Jiangping Kong 孔江平 Abstract 摘要 The Nanling area in China boasts a rich resource of languages, including not only Chinese dialects such as the group of Southwest Mandarin, Hakka, Xiang, Yue and Min, but also minority languages such as the Yao group of Miao-Yao and the Tai group of Kam-Tai. In addition, there is Tuhua whose language affiliation has yet to be established. The development of the Nanling Tuhua has been contingent on the complex land topography in this area, and on the area being the critical traffic route for people migrating from north to south in China. Through comparison of the Tuhua and the neighboring Chinese dialects or minority languages, it is found that the Nanling Tuhua is best described as a creole or mixed language with its associated features. 南岭地区是中国语言资源的富矿区之一,该地区不仅有西南官话、客家话、湘语、粤语、闽语等汉语方言和瑶语、壮语等少数民族语言,更有众多语言系属未明的土话。南岭地区土话的形成跟复杂的地形有关,也跟该地区是历代南北人口迁徙的必经之路有关。通过将南岭土话跟周边的汉语方言和少数民族语言之间的比较,发现南岭土话整体上具有明显的混合语特征。 Keywords 关键词 Nanling area 南岭 Chinese dialects 汉语方言 Minority Languages 少数民族语言 Tuhua 土话 南岭古道与移民 Feng Yang 杨锋; Xingquan Hou 侯兴泉; Yi Shao 邵宜; Jiangping Kong 孔江平 Abstract 摘要 There have been five important traffic routes in the Nanling throughout history. These routes are the Yuchengling Route, Mengzhuling Route, Dupangling Route, Qitianling Route, and Dayuling Route, from east to west. Immigrants in different periods of history principally traveled on these five routes to emigrate from the Lingbei area to the Lingnan area. Their cultures were merged into the cultures of the local people, which gave birth to the splendid multicultural society in the Lingnan area.
http://test.jclhk.com.hk/test/jclms-2011-2020/jclm2019/
What is Product Cost Planning? Product Cost Planning is an area within Product Cost Controlling where you can plan costs for materials without reference to orders, and set prices for materials and other cost accounting objects. You can use Product Cost Planning to analyze your product costs, such as for Manufactured materials and Services. You use Product Cost Planning to: calculate the non-order-related cost of goods manufactured (COGM) and cost of goods sold (COGS) for each product unit, establish how the costs are broken down for each product, and to calculate the value added for each step of the production process (cost rollup). In addition you can optimize the cost of goods manufactured through comparison costing with the Product Cost Controlling Information System, support make-or-buy decisions and provide information for other SAP applications, such as: Standards with which to assess production efficiency in Cost Object Controlling (CO-PC-OBJ), Price Update and Profitability Analysis (CO-PA) and Sales Pricing (SD). What is this WIKI page good for? This Wiki page was created to help you to find quick and adequate answers to your questions. Here you can find help on this page Useful Links You can visit our Support Portal for other contents, solutions and news SAP SCN Weibo CTS Docu ............
https://wiki.scn.sap.com/wiki/display/ERPFI/Product+Cost+Planning+CO-PC-PCP
Question: Factors influencing seedling establishment are known to vary between open sites and those protected by plant cover. In many desert regions, protected microhabitats below shrubs are essential for establishment of many cactus species. Very little is known about these factors for Andean cacti and how the importance of vegetation cover varies with cactus species. Are Andean cacti associated more frequently to vegetation cover than to open ground? Are they associated to certain shrub species? Is the distributional pattern in relation to cover similar for different cactus species? In what microhabitat (below or away from shrubs) are cactus seeds more abundant? These questions are addressed for the case of an Andean semi-desert. Location: Semi-arid tropical Andes, La Paz department, Bolivia. Methods: We examined 132 isolated shrubs ≥ 50 cm along a line across two microhabitats: areas below and away from shrubs/trees. Shrub crown size was measured. The among-shrub samples were taken from open spaces contiguous to each of the sampled shrubs. In both microhabitats, all cactus species were recorded. The cardinal direction of the cacti was also registered. Correlation between canopy diameter and number of beneficiaries was evaluated for Prosopis flexuosa. The cactus seed bank in each microhabitat was also studied. Results and Conclusions: The four cactus species found behaved differently in relation to shrub canopies. These distributional differences could be due to differences in growth form. Columnar cacti apparently need the shade of shrubs. Only the columnar species is able to grow near the base of the tallest nurse species. The opuntioid cacti studied seem more facultative: although apparently preferring shrub under-canopies, they are able to establish in open ground. The globose cactus is the most indifferent to the presence of plant cover. These patterns parallel others found in North America. The capacity of different cacti to appear in open spaces could be related to vegetative propagation, and not necessarily to seedling tolerance of heat. Nomenclature: Anderson (2001) for cacti; Beck & Valenzuela (1991) for the other families.
https://bioone.org/journals/Journal-of-Vegetation-Science/volume-18/issue-2/1100-9233(2007)18%5B263:TIOSCF%5D2.0.CO;2/The-importance-of-shrub-cover-for-four-cactus-species-differing/10.1658/1100-9233(2007)18%5B263:TIOSCF%5D2.0.CO;2.short
Editor’s note: What breathing human could pass up a good railroad story? We are certain that at some time or another, wind power will pulse through these heavy transformers. The Port of Duluth says it’s about to break another record – this time for a transformer project lining up to set a record for the highest count of independent, over-dimensional trains used for a single, heavy haul project.A total of 16 huge electrical transformers – each weighing upwards of 300 tons – were shipped from Antwerp and discharged in the Port of Duluth during the 2013 shipping season. Those transformers are headed to Alberta, Canada for a major power transmission line that will run from north of Edmonton to south of Calgary. The German-built transformers arrived in Duluth in succession aboard Hansa Heavy Lift vessels and were discharged, along with nearly 500 crates of smaller components, at the Clure Public Marine Terminal in Duluth by crews from Lake Superior Warehousing. The first shipment arrived aboard the HHL Mississippi on July 16; she returned with four more transformers and dozens of crates on Sept. 3. The last two shipments arrived aboard a sister ship, the HHL Amur, on Oct. 14 and Dec. 1. The first two transformers loaded out on rail in September. The remaining units will move from now through the end of the year on a series of trains scheduled with Canadian Pacific, utilizing specialized 16-axle railcars. There are just four such specialized railcars in all of North America able to handle cargo of this size along this route and two of them are owned by Fracht USA, project logistics providers handling the turnkey logistics for the entire transmission line project. Those two KRL16800 series cars, the latest generation in rail engineering, are being coupled with CP locomotives and flatcars to move the large converter transformers safely to their final destination.
https://www.windpowerengineering.com/port-duluth-sets-record-specialized-rail-haul-canada/
This article follows on from my previous article Stop leading like an Ape… where I discuss the impact of our evolution on our capacity to lead effectively. In summary, I discussed how the brain and nervous system have evolved to keep us safe and this can sometimes limit our effectiveness as leaders. At the end of the article I said I would write about how to leverage our evolutionary gifts rather than be limited by them. It’s taken me a year to get to writing this because there are so many different approaches that have value. Rather than allow my primitive instincts to continue my procrastination, I’ve bitten the bullet and highlighted here some areas from my studies, personal and professional experience that I believe are of most benefit in getting beyond our in-built Ape-ness… enjoy! Our hero in this story is the prefrontal cortex – referred to as the PFC from now on. This is the area of our brain that can, among other things, evaluate many variables to make conscious choices. It procured to me when writing this that a high performing PFC would be doing many of the things we would expect of a high performing leader or team. For example, an effective leader leverages the full capacity of the resources available to them to deliver an intended result. This requires them to respect and consider inputs from their teams and the external environment. They must recognise that they do not have all the answers. Clarity of purpose, open communication lines, listening, consultation, enquiry, followed by decisive action and objective analysis of outcomes are essential. In an effective team, leadership changes hands seamlessly depending on what is needed. Conversations are robust, respectful and outcome focussed. Team members acknowledge the value each person brings and leverages diverse strengths, helping each other to develop over time as they take action. Trust is critical for high performing teams – each person must trust that the others are acting for the benefit of the team. Similarly, to be high performing in a leadership context, the PFC must leverage the full capacity of the whole brain and nervous system. To do so, it must have clarity of purpose, open communication lines with other areas of the brain, it must ‘consult’, ‘listen’ and ‘enquire’ into the messages being sent up the line. It must be able to objectively assess the value and limitations of these messages and decide accordingly, sometimes prioritising feelings and others prioritising logic as appropriate to the overarching, clear purpose. It must have trust that whatever internal information received through emotional experience and automatic thoughts is intended to be of benefit to the whole – not to sabotage or disrupt. Negative emotions and thoughts can be limiting, but they’re there for a reason, usually to avoid perceived danger, so they should be heard and understood even if they’re not acted upon. In order for our PFC to perform in this way and lead us out of reactive ways of behaving into purposeful, conscious ways of behaving the following areas are important to consider: Developing a compass for our life and leadership by reflecting on our Purpose, Values and principles creates clarity in our PFC and sets up sign-posts to direct attention in the brain and to take actions that keeps us on track. Over many years I have defined a purpose for myself – to enrich as many lives as possible in my lifetime and have fun doing it. When I’m on my game (see below) this can transform my approach to a conversation or issue I’m facing. It gives my PFC a distant point of reference it can use to navigate through all the internal noise and fog generated by other parts of my brain. Paying attention to Purpose allows us to make a choice and take purposeful rather than reactive action. A leader can only consider the input of all team members if they elicit their input. If we take this metaphor and apply it to the brain, this means our PFC needs to develop the capacity to proactively communicate with other parts of the brain and nervous system – it needs to seek input. Developing this capacity takes time and practice in the following areas: For example, I received some feedback many years ago from a one of my direct reports – “Lee is often combative in meetings”. Up until then, having a strong opinion and pushing it had been a successful strategy for me – I didn’t even realise I was doing it never mind the negative impact it was having. On reflection, I had a lot of evidence in my life that this strategy worked. Growing up in Liverpool in the North West of England I needed to stand up for myself, have strength in my conviction and hide weakness. Leaders I admired early in my career had this trait too – I saw nothing wrong with it… until the negative impact of this approach was pointed out to me. I was damaging important stakeholder relationships and creating fear in my team – not a very enriching brand of leadership. I still get these messages from my brain and nervous system – ‘Lee… fight, defend, be strong’, but with lots of practice, coaching, reflection and commitment around the areas mentioned above I can now (often but not always) see these messages clearly before they drive my behaviour. Over many years I have cultivated an open line of communication between my PFC and the parts of me that are trying to keep me safe from some real or imagined harm. These messages should be respected, they can be very useful – but our PFC needs to be able to see them clearly as just one of many inputs to a decision that it needs to make. Our perception of other people’s behaviour and intentions has a significant impact on our emotional state and behavioural reaction. Developing a greater capacity to understand the behaviour of others is therefore very useful to our brain leader. Some key capabilities of social awareness are: The best example of the power of social awareness that I can think of was with my own father. We are both head-strong and many years ago we were in a heated discussion about managers. He was complaining about his management, I was trying to help him to see their perspective. We were getting nowhere except more and more frustrated. At one point I sat back and asked myself, why am I so frustrated in this conversation? The answer was clear… he is not listening to me… not once has he validated my perspective. Then, I shifted from self to social awareness and looked at him. The frustration on his face and in his voice was obvious and I asked myself… why is he so frustrated? The answer was clear… not once have I validated his perspective. We both had the same problem – neither of us felt validated. So, I spent the next few minutes acknowledging his perspective and seeking to understand more about his position. I didn’t have to agree with him, I only had to demonstrate that I understood him and suspend my need to feel validated. We both calmed down and left it there. The next day we’re on a bush-walk and he says to me “How do you think I could improve my relationship with your brother?” I nearly fell over! I can’t remember him ever asking for my advice until that moment – especially not about my brother. We had one of the most productive, connected conversations on that walk that I had ever had, and I firmly believe it was sparked by the few minutes of validation I had given him the day before. No matter how self and socially aware we are, some of our ancient brain structures will escape the notice of our PFC. Therefore, our PFC leader needs some external structure in place to mitigate the risks of flawed thinking and behaviour. For example, let’s look at Unconscious Bias – a hot topic over the last decade or so. Being aware of your unconscious biases – has little to no impact… they’re unconscious and, by definition, they happen automatically without any involvement of our PFC leader – in fact, they will be influencing our PFC leader in ways we will never observe in ourselves. The only one way to mitigate the risk of unconscious bias is to set up helpful external structures. For example, deliberate exposure to conditions that contradict the bias – e.g. immersing yourself in diverse cultural/social environments. There are many ways in which our brains work illogically or imperfectly that require external structure to overcome. For more on this area I highly recommend reading Thinking Fast and Slow by Daniel Kanneman. Regular investments in renewal of the PFC is critical. Sleep, diet, exercise, mindful practices, creative activities and so on need to be part of a regular routine of investment to ensure our brain leader has the resources to handle the load. For me, exercise is critical. If I’m not exercising, I’m off my game. Whatever it is for you, it needs to be prioritised in the diary. In summary, if we want to overcome the limitations of our evolution while and harnessing its gifts our prefrontal cortex needs to be the leader of our brain. Clarity of purpose, self-awareness, emotional regulation, social awareness, external structures and regular re-fuelling are critical factors in building the leadership capacity of our PFC. And, as with any effective leader, its status as leader should be held with humility and recognition that its role is not to control everything, but to mobilise the full capacity of all available resources in service of a clear higher intent.
https://www.infinityleadership.com.au/2018/02/15/start-leading-like-a-human/
Thanks to the National Recreation and Park Association (NRPA) and the Scotts Miracle-Gro Foundation, the City of Newport Parks and Recreation Department will be hosting a BioBlitz during the month of September, in support of the Parks for Pollinators campaign. What is a BioBlitz? The Parks for Pollinators BioBlitz is an event where community members observe and identify pollinators and pollinator plants in and around Newport. It doesn’t have to be in a Newport park, but if you want conduct your observations in one of Newport’s parks, you can find a list at – https://newportoregon.gov/dept/par/parks.asp, or find maps at https://newportoregon.gov/dept/par/parks-map.asp. Just what is a pollinator or pollinator plant? It’s not just bees! Many different animals can be pollinators. In our area – ants, beetles, butterflies, moths, flies, bats, bees, hummingbirds, and even slugs can be pollinators. For pollinator plants, any plant that has flowers or fruits is a pollinator plant. Conifers and evergreen trees spread pollen on the wind, and do not need pollinators. How is a BioBlitz accomplished? The event uses an app called iNaturalist to take pictures of plants, insects, and animals to see what wildlife and plants are present in the area. After downloading the app on your cellphone, participants can search projects for “Parks4PollinatorsNewport2022” to join the local project. The event runs throughout the month of September to provide plenty of time to get out and make observations. After making an observation, be sure to add it the Parks4PollinatorsNewport2022 project. The data will be used to provide information about pollinators, which are essential to our ecosystem, our food crop production, and will help us understand how to better protect pollinators and other important wildlife in Lincoln County. There will be a family friendly event at the Clubhouse at Frank Wade Park on Saturday September 10, from1 P.M. until 4 P.M. We will have information about the project and answer questions about the plants and animals you may find when making your observations. We will lead a hike on the Ocean to Bay Trail, starting at Big Creek Park at 3 P.M. to identify pollinators and make observations Questions about how to participate should be directed to Anita Albrecht at [email protected] Keep an eye on the City of Newport Parks and Recreation Facebook page for more information.
https://www.newslincolncounty.com/archives/289285
The dynamics of the employer-employee relationship have profoundly changed in what we all hope are the waning days of the COVID-19 pandemic. Until March 2020, employers commonly set the work rules that determine the parameters of when employees worked, how they worked, and where they worked. While employers will continue to define how to best operate their businesses and will always exercise their rights of approval over the nature of the workday experience, the attitudes and opinions of their employees about working at the office may now play a greater role in operational decision-making. At a minimum, in the days to come, the employee’s voice may exert greater influence on what percentage of the workplace population employers can reasonably expect to be at the office on any given day, or how many times each week. Human resources consulting firm OperationsInc noted in a recent blog post that “reopening offices is not the time to take an authoritarian approach with your employees. Communication is vital and should be transparent.” The company strongly recommends soliciting input and opinions from employees to gauge their acceptance and concerns about returning to the office. The time to canvas the tenant-employee workforce is now. A June 2021 study by the Partnership for New York City, which noted that only 12% of workers had returned to the office as of May, revealed that employers in the Big Apple expected a sharp acceleration of return in the coming months. More than double, 29%, will bring employees back to the physical workplace by the end of July, and 62% by the end of September. While it is likely that some portion of the remaining 38% will work remotely into 2022, influencing these workers to seek to return to the office is a major opportunity for the commercial real estate industry in both the long- and short-term. Understanding the tenant-employees’ wants and needs, their concerns, attitudes and motivations, and their perceptions of the workday journey – both while in the building, and while commuting to and from, is critical to making informed decisions on how to re-energize interest and enthusiasm for returning. In the survey sent to their own employees, OperationsInc. collected data responding to questions that included: - “If you are not comfortable returning to the workplace, what factors are impacting your decision?” - “Do you feel safe and supported coming back to work?” - “Are you satisfied with our announced efforts to maintain a safe work environment?” Understanding the answers to these questions, among others, has enabled the company to develop return-to-work strategies and adopt policies that are responsive to the perceptions and opinions of their employees. The pendulum, of course, has not and will not swing entirely toward the dictates of employees. The firm’s survey instrument clearly stated that while employee responses were important to the company’s decision-making process, there would be no guarantee that every employee’s preference for work accommodations would be accommodated. The company’s survey was also revealing because it asked qualitative questions about the employee’s journey: - “Would your mode of transportation to the office pose significant risk for Covid exposure?” - “Have you relocated? Temporarily or permanently? To where?” - “Are you comfortable traveling to clients’ offices?” - “What has been the most positive part of working remotely for you?” - “What has been the most challenging part of working remotely for you?” By asking these questions, the company may better address whether root causes behind employee reticence toward returning to the office are related to the quality of the experience inside the building, the journey to and from the facility, or factors related to work-life balance. The more our buildings and employer-tenants can increase employee confidence in the safety and security of the workplace and reduce the tenant-employee’s level of anxiety at every point along their driveway-to-driveway workday experience, the more comfortable tenants will be when they return. Recognizing that worker attitudes will continue to play at least some role in shaping corporate policies, CRE owners may focus their energies on transforming acceptance of returning to the office into demand to return and work in our buildings more often. Redefining the new tenant journey while they are in the building with services, conveniences, and content, delivered physically and digitally, that enhance the quality of the workday can help to drive this demand. Offering relevant and valued programming and promotions that can help to rebuild our community of tenant-employees can also establish a “fear of missing out” among remote workers on the great life- and work-enhancing experiences accessible to those who are working in the building. Collectively, the services, conveniences, and programming can also serve to mitigate the pain points of the parts of the tenant journey that we cannot control, like commuting, by making the experience of working in the office more worth the inconvenience. Understanding the attitudes of our tenant-employees can pay enormous dividends to our tenant employers, as well as a re-energized focus on the quality of the in-office experience may well serve as a competitive advantage in employee retention to a much greater degree than ever before. Next time, we’ll explore how asking the right questions, in the right ways, can improve the quality of the data we receive from tenant-employees. Frank Supovitz, an award-winning experience designer, producer, event organizer, and author, has played a leading role in the success of such world-class properties as the Super Bowl, the Indy 500, and the South Street Seaport in New York City. A respected global thought-leader in sports, entertainment, and facilities management, he brings more than three decades of expertise to the HqO Team as a senior consultant for Tenant Experience. Contact HqO to put our Tenant Experience team to work for you.
https://www.hqo.com/resources/blog/the-new-tenant-journey/
Meeting: Hospital Medicine 2018; April 8-11; Orlando, Fla. Abstract number: 790 Categories: Adult, Clinical Vignettes, Hospital Medicine 2018 Keywords: cervical lymphadenopathy, Igg4-Related Disease Case Presentation: A 44 year-old African-American man presented to his primary care physician with a five day history of neck swelling and pain associated with chills, night sweats and weight loss. Three days prior to presentation, he was evaluated at a nearby emergency department and prescribed amoxicillin-clavulanic acid without improvement. Physical and laboratory examinations were normal except for four round, tender, right-sided cervical mobile masses. Computed tomography(CT) of the neck with intravenous contrast revealed bilateral, right greater than left cervical adenopathy consistent with possible lymphoma. Flexible fiberoptic laryngoscopy was normal and a fine needle aspiration was inconclusive. He completed a second course of antibiotics with trimethroprim-sulfamethoxazole, again without improvement. Given concern for malignancy, a positron emission tomography(PET) scan was performed and revealed fluorodeoxyglucose uptake in bilateral cervical, axillary and external iliac nodes. As a result, he underwent excisional lymph node biopsy and pathology was consistent with reactive lymphadenopathy without evidence of malignancy. He subsequently underwent an infectious workup which was negative. During his extensive workup, patient developed symptomatic anemia, acute kidney injury and a decrease in his serum albumin. Given his negative malignancy and infectious workup, autoimmune disease was considered. Further staining of the biopsy samples was performed, specifically for IgG4 and HHV-8. HHV-8 staining was negative, however there were greater than 50% IgG4 cells in the sample. Laboratory examination was also notable for an elevated serum IgG4 level. A diagnosis of IgG4-related disease was made and he was initiated on steroids, a mainstay in the treatment of this condition. On a subsequent visit, his symptoms had improved, but unfortunately, patient was lost to follow up. Discussion: This case illustrates the importance of including IgG4-related disease in the differential diagnosis of tender cervical lymphadenopathy. This is most commonly caused by local head and neck pathology such as infections, or systemic pathology such as tuberculosis or malignancy. With prompt diagnosis, end organ dysfunction and morbidity would have been avoided. This case also illustrates a physician’s duty to constantly re-evaluate a case, particularly when a patient is not responding to what is presumed to be appropriate therapy. This patient was initially treated with antibiotics for presumed local infection, however, after minimal response to therapy, workup was continued, the correct diagnosis was made, and appropriate therapy was initiated. Conclusions: IgG4-related disease is a rare immune-mediated condition with a multitude of presentations, including pancreatitis, kidney dysfunction, pneumonitis and generalized lymphadenopathy. It is very important to consider this entity in the differential diagnosis of tender cervical lymphadenopathy to hopefully avoid unnecessary morbidity and inappropriate therapies. To cite this abstract:Pena, I. PAIN IN THE NECK: A CASE OF IGG4-RELATED DISEASE. Abstract published at Hospital Medicine 2018; April 8-11; Orlando, Fla. Abstract 790. https://www.shmabstracts.com/abstract/pain-in-the-neck-a-case-of-igg4-related-disease/. Accessed February 17, 2020.
https://www.shmabstracts.com/abstract/pain-in-the-neck-a-case-of-igg4-related-disease/
If you're worried about mold in Houston, Texas you're not alone. Unfortunately, clear answers to things like how high humidity and water damage affect mold growth are sometimes hard to come by. This is potentially due to a few factors, such as: Presence of different mold types Various housing materials Treatment and removal options Here are a few popular questions about mold to help inform your remediation decisions. How Does Mold Start? Mold is completely natural. In fact, scientists think it's one of the oldest forms of life on Earth. However, just because something grows naturally doesn't mean you necessarily want a bumper crop of it to show up in your basement. The problem is mold is basically everywhere in microscopic quantities. It travels around on dust and dirt or as particles in the air. In fact, it's not often clear where mold growth in a home comes from originally. Why Do Flood Damage and Mold Infestation Often Happen at the Same Time? Mold is essentially everywhere, but it rarely gets a chance to grow into the unsightly infestations homeowners dread. The rules change when water enters the equation. Existing mold populations use water to turn the dry desert of your drywall or wood into a suitable habitat. That's why mold seems to come out of nowhere. How Dry Should a House Be? Many people worry about mold growth in areas like kitchens, basements and bathrooms because these areas are typically more humid than the rest of the house. Here are a few things you can do to minimize the risk of a mold infestation in these danger zones: Maintain good ventilation. Use a dehumidifier. Avoid spills and fix leaks. Is Mold Always Obvious? High humidity associated with the growth of mold is usually extreme enough to make a room feel uncomfortable, and water damage is often visually apparent. However, keep in mind that both these conditions might just as easily occur in a hidden area of your home, such as your attic or the space between your walls. Visit http://www.SERVPROtowncountry.com for more information on mold.
http://www.servprotowncountry.com/blog/post/67499/mold-removal-remediation/some-of-the-biggest-faqs-on-mold
Intellectual property considerations for molecular diagnostic development with emphasis on companion diagnostics The development of molecular diagnostics is a complex endeavor, with multiple regulatory pathways to consider and numerous approaches to development and commercialization. Companion diagnostics, devices which are “essential for the safe and effective use of a corresponding drug or diagnostic product” (see U.S. Food & Drug Administration, In Vitro Diagnostics – Companion Diagnostics, U.S. Dept. of Health & Human Services(2016), available at https://www.fda.gov/medicaldevices/productsandmedicalprocedures/invitrodiagnostics/ucm407297.htm) and complementary diagnostics, which are more broadly associated with a class of drug, are becoming increasingly important as integral components of the implementation of precision medicine. For all molecular diagnostics, intellectual property (IP) concerns are of paramount concern, whether the device will be marketed only in the United States or abroad. Taking steps to protect IP at each stage of product development is critical to optimize profitability of a diagnostic product. Also the legal framework around IP protection of diagnostic technologies has been changing over the previous few years and can be expected to continue to change in the foreseeable near future, thus, a comprehensive IP strategy should take into account the fact that changes in the law can be expected. Article highlights - This article summarizes intellectual property (‘IP’) considerations pertinent to molecular diagnostics development with special emphasis on companion diagnostics. - The article discusses IP considerations and suggestions based on the specific stages of technology and product development for diagnostics. This box summarizes key points contained in the article. Declaration of interest The authors have no relevant affiliations or financial involvement with any organization or entity with a financial interest in or financial conflict with the subject matter or materials discussed in the manuscript. This includes employment, consultancies, honoraria, stock ownership or options, expert testimony, grants or patents received or pending, or royalties.
https://glorikian.com/intellectual-property-considerations-for-molecular-diagnostics-development-with-emphasis-on-companion-diagnostics/
Olivine rich rocks outcrop in Kharazeh area (KHO) and Jurf Eldaraweesh (JDO) Basaltic rocks southern Jordan. KHO and JDO have been characterized for their mineralogical and geochemical properties investigated for their potential use in CO2 capture by mineralization process. The effects of particle size, temperature, and contamination time were examined in the mineralization process. Two grain sizes of olivine for each type were used in capture experiments. The first grain size is the separated size fraction between 1 to 0.7 mm (KHO1 and JDO1), while the second grain size is the separated size fraction between 0.7 to 0.3 mm (KHO2 and JDO2). For the mineralization purpose, a chemical reactor was used to determine the olivine CO2 capture capacity. Thin section studies aided by XRD identification for KHO indicated the presence of olivine crystals as the main mineral with percentage reaches 48% plagioclase, augite, and magnetite. While the mineral content for JDO is (35%) olivine, plagioclase, clinopyroxene, and opaque minerals. Olivine chemical composition results show the high MgO percentage for KHO ranges between 47.5 and 50.13%, while the percentage of MgO varies from 43.6% and 44.6% for JDO. The CO2 mineralization process results were interpreted using percentage removal curves. CO2 capture percentage reaches the highest percentage (48%) using KHO2 and 100o C temperature. In summary, it can be concluded that CO2 can be removed from atmosphere using Jordanian olivine rich rocks. Keywords References Barberi, F, capaldi, g, Casperini, F, Marinelli, G., Santacroce, R., Scandone, R., treuil, M., and varet, J., 1979. Recent basaltic volcanism of Jordan and itsimplications on the geodynamic evolution of the Afro-arabian Rift system. Atti Conv. Lincce, 47, 667-683 Dabirian, R., Beiranvand, M., and Aghahoseini, S., 2012. Mineral carbonation in peridotite rock for CO2 sequestration and a method of leakage reduction of CO2 in the rock. NAFTA 63 (1-2) p.44-48. Doucet, F., 2011. Scoping Study on CO2 Mineralization Technologies. Report No CGS-2011-007 South African Centre for Carbon Capture and Storage, 88pp. Dunsmore, H. E., 1992. A Geological Perspective on Global Warming and the Possibility of Carbon Dioxide Removal as Calcium Carbonate Mineral. Energy Convers. Mgmgt., 33, 5-8,565-72. DOI:10.1016/0196-8904(92)90057-4 EPA, 2008. Inventory of U.S. Greenhouse Gas Emissions and sinks: 1990-2006. ESRL, 2014. Earth System Research Laboratory. ESRL http://www.esrl.noaa.gov/gmd/ccgg/ trends/ Haug, T.A., Johansen, H., and Brandvoll, O., 2010. The way forward for mineral carbonation - importance of collaboration, experiments and modelling. 3rd International Conference on Accelerated Carbonation for Environmental and Materials Engineering, Turku, Finland, p.113-119. Huijgen, W.J.J. and Comans, R.N.J., 2003. Carbon dioxide sequestration by mineral carbonation: Literature review. ECN report ECN-C-03-016, Energy Research Centre of the Netherlands, 52pp. Huijgen, W.J.J. and Comans, R.N.J., 2005a. Carbondioxide sequestration by mineral carbonation: Literature review updates 2003-2004. ECN report ECN-C-05-022, Energy Research Centre of the Netherlands, 70pp. Huijgen, W.J.J., Comans, R.N.J., 2005b. Mineral CO2 sequestration by carbonation of industrial residues: Literature review and selection of residue. ECN report ECN-C-05-074, Energy Research Centre of the Netherlands, 32pp. IPCC, 2014. Working Group III Fifth Assessment Report ‘Mitigation of Climate Change. https://www.ipcc.ch/report/ar5/wg3/. Kelemen, P.B. and Matter, J., 2008. In situ carbonation of peridotite for CO2 storage. PNAS, 105 (45), p.17295-17300. DOI:10.1073/pnas.0805794105 King, R.J., 2009. Minerals, Blackwell Publishing Ltd, the Geologists’ Association & The Geological Society of London. Geology Today, 25 (5), p.193-197 Kwon, S., M. Fan, H.F.M. DaCosta, A.G. Russell, 2011. Factors affecting the direct mineralization of CO2 with olivine, Journal of Environmental Sciences, 23 1233-1239. DOI:10.1016/s1001-0742(10)60555-4 Lackner K.S., Wendt C.H., Butt D.P., Edward L., Joyce J., Sharp D.H., 1995. Carbon dioxide disposal in carbonate minerals. Energy 20, 1153-1170. DOI:10.1016/0360-5442(95)00071-n Lackner K.S., 2002. Carbonate chemistry for sequestering fossil carbon. Annual Review of Energy and TheEnvironment 27, 193-232. Olivier, J.G.J., Janssens-Maenhout, G., Muntean, M., and Peters, J.A.H.W., 2016. Trends in global CO2 and total greenhouse gas emissions. Report, PBL Netherlands Environmental Assessment Agency, The Hague. PBL publication number: 2315. European Commission, Joint Research Centre (EC-JRC), Ispra. JRC Science for Policy Report: 1034. http://www.pbl.nl/en/publications/trends-inglobal-co2-emissions-2016-report. Olivier, J.G.J., Schure, K.M., and Peters, J.A.H.W., 2017. Trends in global CO2 and to tal greenhouse gas emissions. Summary of the 2017 Report, PBL Netherlands Environmental Assessment Agency, The Hague. PBL report no. 2983. http://www. pbl.nl/en/ publications/trends-in-global-co2-and-total-greenhousegas-emissions. DOI:10.1787/260645760246 Qianyi, W., 2010. CO2 Sequestration via Olivine Dissolution and Carbonation by Using (HPEC) and (HPIC). B.S., China University of Geoscience, Institute of Geology and Geophysics, Chinese Academy of Sciences. Schuiling, R.D., 2006b. Mineral sequestration of CO2 and recovery of the heat of reaction.Eds. V.Badescu, R.B.Cathcart and R.D.Schuiling. Springer. Seifritz, W. 1990. CO2 disposal by means of silicates; Nature 345: 486. DOI:10.1038/345486b0 Sipilä J., Teir S., Zevenhoven R. 2008. Carbon dioxide sequestration by mineral carbonation –Literature review update 2005-2007. Report No 2008-1, Heat Engineering Laboratory, Faculty of Technology, Ǻbo Akademi University, 52pp. White, C. M., Strazisar, B. R., Granite, E. J., Hoffman, J. S., & Pennline, H. W., 2003. Separation and capture of CO2 from large stationary sources and sequestration in geological formations—coalbeds and deep saline aquifers. Journal of the Air & Waste Management Association, 53(6), 645-715. DOI:10.1080/10473289.2003.10466206 Willson, M.J., 2004. Weathering of the primary rock-forming minerals: processes, products and rates. The Macaulay Institute, UK. Refbacks - There are currently no refbacks. Indonesian Journal on Geoscience by https://ijog.geologi.esdm.go.id/index.php/IJOG/index is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. Indexing Site : Follow us on:
http://ijog.bgl.esdm.go.id/index.php/IJOG/article/view/505
Rediscovering Ruins: 19th Century Latin American Archaeologists During the 19th century, interest in archaeology shifted from a personal endeavor to a national undertaking as countries began to create national museums and invest in the discipline of archaeology as a tool for historical and anthropological research. European scientists and explorers became interested in the abandoned Maya and Inca ruins of Central America and Peru. Many of these sites had not been explored documented since the initial encounter hundreds of years before and, with the development of new technology in the 19th century, it was an ideal time for explorers to return to the ruins and record more detailed documentation and imagery. This case specifically focuses on the work of Stephens, Catherwood, Maudslay, Waldeck and Tschudi and their explorations in Central America and Peru. In the middle of his career, John Lloyd Stephens grew tired of the legal profession and in 1834, he left the United States for Europe and the Mediterranean where he became famous for his travelogues and earned the nickname “the American Traveler”. In 1839, President Van Buren selected Stephens for a secret diplomatic mission to Central America, during which he extensively explored the Maya ruins, such as Copan, Palenque, Quiriguá and Uxmal, and subsequently published this two-volume travelogue of the area. After his archaeological travels, Stephens continued to have a strong influence in Central America as the vice president of the Panama Railroad Company. After meticulously studying ancient ruins and sculptures throughout Europe, British artist and explorer Fredrick Catherwood stumbled upon an account of the Maya ruins with his new friend John L. Stephens in London. With the goal of capturing these structures in detail, Catherwood accompanied Stephens on his trip to Central America. There, he created a collection of 25 watercolor lithographs from the various ruins he encountered. Of these beautifully drawn and famous prints, two of the most notable are images of the stelae of Copan and the principal temple at Tulum. Catherwood created the most detailed drawings and paintings of the Maya ruins in existence during the late 1830s. About 50 years after Stephens and Catherwood made their descriptive and visual accounts of Central America and the Yucatan, a copy of their world famous travelogue fell into the lap of young British medical student, Alfred Percival Maudslay. Maudslay immediately became engrossed in the world Stephen’s words had created and decided to set sail for the Americas, intending on becoming an archaeologist of the ruins throughout Central America. Since Maudslay could not improve upon the drawings of Catherwood, he discovered a new calling: photography. Maudslay spent over 13 years working as one of the most prominent recorders of the Maya ruins and captured the first photographs of the same iconic ruins that Stephens and Catherwood described and depicted. Count Waldeck was a 19th century French archaeologist of many talents and mysteries. Although it is generally accepted that he was of French origin, records show that Waldeck was born in four different cities, had several different birthdates, and lived for over 109 years. He was said to have been an antiquarian, cartographer, artist, engineer, explorer, and pornography publisher, and to have traveled across South Africa, Egypt, and the Americas. Despite the rumors about his life, Waldeck was most known for his artwork and drawings made of the Maya ruins in Mexico. Waldeck spent most of his time in the ruins of Palenque and Uxmal. In accordance with the mysteries surrounding Count Waldeck’s life history, many of his drawings also include elements of fantasy. A well-known example of Waldeck’s creativity is the recurrence of elephant heads in his plates reproducing the carvings on temples in Palenque. Elephants also appear in the accurately depicted Maya hieroglyphs. It is thought he added the elephants as a nod to his donors who believed the Maya civilization would not have developed independent of the Old World. Antonio de Herrera y Tordesillas, chronicler of one of the most comprehensive histories of the Americas, narrates the great travels of the Spanish conquistador Francisco Pizarro and his interactions with the native Incas of Peru. During his travels between Lima and Cuzco, Pizarro attended the funeral of Almagro, the Incan rulers. The funerals of Inca grandees of Peru were ceremonies of great splendor attended by large numbers. Participants would decorate the body with gold and silver jewelry and bury it in large graves surrounded by golden vessels, food, feathered garments, and other sentimental objects. In 1838, Peruvian scientist and archaeologist Mariano Eduardo de Rivero and Swiss naturalist and explorer Johann Jakob von Tschudi traveled from Europe to study mineralogy in excavations of the Incan ruins. They co-authored a pictorial work of drawings that discussed Incan history, origins, government, religion, customs, and monuments. This atlas of drawings was found in Tennessee in an old barn; it originally was a gift from the Austrian government to President Fillmore during his presidency (1850-1853). It is unknown how this historical atlas made its way from the White House to a barn in Tennessee. During the excavation of these Incan sites, Eduardo de Rivero and Tschudi came across an Incan burial site in the cave of "Huichay" that contained encased bodies, skulls, and other antiquities from the Incan period. The small skeletons were placed in the fetal position and mummified with a form of alcohol, wrapped in textiles, and bounded with ropes. Tschudi was fascinated with these skulls and studied them, using their different facial angles to support the Angle of Camper theory that claimed that the intellectual superiority of a race could be determined by skull shape. Tschudi kept a mummified fetus of a female infant in order to prove his findings. Among the Peruvian Incan burial sites, Eduardo de Rivero and von Tscudi excavated many of these Chimu or Early Incan Double Bodied Whistling Vessels. Water was poured into these pots and the bars attaching the vessels allowed water to flow through them, creating loud whistling or breathing noises that mimicked the sound of someone dying. Music was a very important aspect of Incan religious rituals, such as funerals. These Double Bodied Whistling Vessels would be used during funerals and were found amongst tombs with other antiquities. This gold pendant is a typical artifact 19th-century archeologists discovered while excavating Central American sites. These bird-form pendants were worn around the neck and made in many different sizes. Although each pendant was made differently, they commonly featured extended wings, splayed tails, and heads that projected forward to mimic a bird of prey. They may have been worn as a form of protection.
https://gallery.library.vanderbilt.edu/exhibits/show/tracing-movement/archaeologists
A market place between public sector infrastructure and technology suppliers continues to grow and evolve. This market place is one of opportunities and challenges. These technologies are being applied in different ways with varied success. The opportunity exists to increase demand and support public sector procurers realise the value of infrastructure technologies sooner through:- • Raising awareness of technologies • Unlocking investment in new technologies and defining the value. • Overcoming complex implementation • Enabling better insight and utilisation of information through technology • Support upskilling and developing new expertise. The presentation will explore this market place and shares with the audience the new Infrastructure Technology Navigator developed by Scottish Futures Trust. The Infrastructure Technology Navigator seeks to maximise these opportunities and unlock the value of existing and new technology to improve infrastructure performance. The navigator quickly links public sector users to a list of performance improvements that can be enabled through infrastructure technology. The navigator then provides guidance, benefits and templates to assist the user implement these technologies. It has been developed for the public sector and is due to be launched in late summer 2019.
https://www.digitalconstructionweek.com/dcw-2019-seminar-programme/infrastructure-technology--navigated-
Objective: This brief examines the evidence that is currently available to inform the provision of psychological services within aged care services, considering both residential care and home care settings. Method: A narrative literature review of the literature evaluating psychological approaches for common conditions in aged care settings was conducted, focusing on the assessment and treatment of common mental health disorders and dementia. Information on the current employment and training of Australian psychologists in geropsychology was also summarised. Results: While further research is required, existing literature provides a clear rationale for the benefit of psychological approaches to address a range of conditions, including the management of dementia. There is only limited research focusing specifically on the home care setting, despite the increasing number of older adults who receive aged care services in their own homes. The current provision of psychological services in Australia is critically low, driven in part by funding limitations. Meanwhile, substantial gaps remain in the training provided to provisional psychologists. Conclusion: A number of key recommendations are made to address the growing need for age-specific psychological assessments and interventions to be included as part of the delivery of aged care services in this country. Given the continued high prevalence of mental health disorders and dementia within aged care settings, as well as even higher rates of subthreshold conditions, improved access to psychological services for older Australians must become a priority.
https://research.monash.edu/en/publications/brief-on-the-role-of-psychologists-in-residential-and-home-care-s
This invention relates to improvements in making gelled confections which utilize the setting properties of starches. Various gelled confections take advantage of the ability of starch to form a gel in a system containing sucrose and corn syrup in addition to the starch. Exemplary of such confections are gum-centered candies, gum slices, gumdrops, jelly beans and the like. In making such gum confections it has been conventional practice to use an acid- modified, thin-boiling starch generally derived from corn or wheat. The earlier prior art batch type procedures were very time-consuming and required a rather long boiling time in order to evaporate sufficient water so that the mixture could be poured into the forms in the molding tray where, after holding for a period of one to several days, the confection was ready for panning or sanding. More recently, the proper amounts of water, sugar, syrup and starch have been cooked under pressure by steam injection or with a heat exchanger to reduce the cooking time and to enable the process to operate on a continuous basis. Regardless of the cooking method, the subsequent molding procedures usually still involve holding the cooked syrup mix in the molds for more than a day to obtain proper drying and gel formation. U.S. Pat. No. 3,446, 628 discloses known procedures for making gel confections in which starch is used as a congealing agent. The patent suggests that the molding time can be decreased by the use of thin- boiling cereal starches which have been solvent extracted to reduce the content of fat below about 0.3% on a dry starch basis. The patent teaches that both potato and tapioca starches, both of which are root starches, cannot be used in the production of quick-setting gum confections, even though they are low in fat and contain the proper amount of amylose. In accord with this teaching, it has been found that indeed tapioca starch, whether or not it has been acid modified, cannot be used in the production of quick-setting gum confections. However, contrary to the same teachings, it has now been found that potato starch can be used advantageously to produce gum confections that require use of a quick gelling starch as the congealing agent provided that it has been modified to give a Buel fluidity of about 20 to 70. Buel fluidity is defined by the method and scale as described by H. Buel, Intern. Congr. Applied Chem. 9th Congr., Washington and New York, Original Communication, 13, 63 (1912) and by Kerr, R. W., "Chemistry and Industry of Starch", Academic Press, New York, 133 (1950). The paste viscosity of potato starch can be reduced to the desired fluidity level by treating with acid as is well known in the art. The potato starches having a fluidity as specified herein can be used in lieu of other starches and in similar known manner for the preparation of gelled or gummed confections which develop a satisfactory firm gel structure in a period of not substantially more than two hours. As well known in the art, a satisfactory firm gel structure has been attained when the gum confection can be unmolded and sugared or sanded without deformation due to excessive plastic flow. The quick setting property exhibited by the potato starch permits the gum confections to be produced in continuous manner as discussed, for example, in U.S. Pat. No. 3,446, 628. EXAMPLES Potato starches having a fat content less than 0.1% based on dry weight were subjected to acid modification by conventional acid- modification procedures to achieve starches having various Buel fluidities. After treatment with acid, the starches were neutralized, filtered, washed and dried. The acid-modified potato starches together with the unmodified potato starch control were used in the following gum confection formulation: ##TBL1## The gum confection formulations were preheated to a temperature of about 222° F. and pumped through a steam injection cooker under internal temperatures ranging from about 250° F. to about 290. degree. F. with the cooking times in the cooker ranging from 25 seconds to 70 seconds. Immediately after cooking, the hot mixtures were formed into gumdrops by spooning into starch molds and held at room temperature. The candies were observed and periodically removed from the molds and the quick-set value of each was judged on the basis of the gum's ability to achieve sufficient firmness after two hours to permit sanding, i.e., coating with crystalline sugar. The results are summarized below: ##TBL2## The invention makes possible for the preparation of gum confections the use of a starch source heretofore believed not usable for the purpose. The potato starches need not be subjected to solvent defatting procedures as suggested in United States patent No. 3,446,628. Those modifications and equivalents which fall within the spirit of the invention are to be considered a part thereof.
Choosing low cost and effective irrigation delivery systems and irrigation application technologies are the ways to improve agricultural productivity and farm incomes. The purpose of this project (August, 2016 to July, 2020) of the International Center for Biosaline Agriculture is to expand low cost and water efficient irrigation technologies and addressing related constraints and limitations for large scale adoption by smallholder farmers in the Sub-Saharan Africa covering mainly four countries; Burkina Faso, Niger, Mali, and Senegal. The partners of the project are ICBA, NARIs, Universities, Farmer Associations, Media agencies, Private Sector Burkina Faso, Niger, Mali, and Senegal. have the largest potential for small scale irrigation investments. The major objective of this project is to scale up appropriate and tested small-scale irrigation technologies and introduce on-farm water management practices to smallholder farmers in SSA to increase agricultural productivity and food security. The project also focuses on employing solar systems as a sustainable source of energy for operating irrigation pumps. ICBA is an international, non-profit agricultural research center established in 1999 through the visionary leadership of the Islamic Development Bank (IDB), the Organization of the Petroleum Exporting Countries (OPEC) Fund, the Arab Fund for Economic and Social Development (AFESD), and the Government of the United Arab Emirates (UAE).
https://give-food.net/choosing-low-cost-and-effective-irrigation-delivery-systems/
Rate this recipe! Your rating Overall rating 0 0 ratings 0 1 Ingredients 270 g smooth peanut butter 100 g caster sugar 1/2 teaspoon baking powder 1 egg 80 g dairy free chocolate chips or chopped peanuts Instructions 1. Preheat the oven to 180 oC 2. Beat together the peanut butter, caster sugar, baking powder and egg 3. Stir in the chocolate chips or peanut nuts 4. Divide into 9 balls and then flatten into thick discs with a fork 5. Bake for 12 minutes 6. Allow to cool before enjoying Advertisement Comments Log in or Register to write a comment.
https://www.mytasteng.com/r/gluten-and-dairy-free-flourless-pb-cookies-2359490.html
In our previous post, we wrote about a broad overview of what blockchain is and its technicality guide. You can read more by referring to this post. Today, I will list and explain the underlying technology of blockchain. There may be few other more which we may not cover in this post. But our focus is on the main technology found in blockchain. The blockchain is a distributed ledger that uses various forms of cryptography to digitally sign blocks of data to ensure the integrity of the data. We will focus on the two main technologies in a typical blockchain implementation; distributed ledger and cryptography. The different implementation might add to this but this is the basic technology stack for blockchain. Distributed Ledger A distributed ledger database is really the core value of a blockchain technology implementation. It is basically storing a series of transactions in a way where the hash or cryptographical signature or the previous transaction is used to encrypt the next transaction. At the core level, blockchains act like ledgers. For ledgers to function they need to be able to reference people. A blockchain needs to be able to say 'Kate's Account sends 1 Bitcoin to Jamal's Account.' This is to say, users need some kind of account. Every user has an account with two parts: a Public Key (often called a Public Address ) and a Private Key (the two variations of the distributed ledger). Think of it as your email account. People send emails to your email address; people send cryptocurrency to your blockchain address. To send an email, you have to use your password to log in; to send cryptocurrency, you have to use your private key to log in. (This is a bit of an oversimplification, just for the purposes of getting the idea down.) Email address, email account password is the same as saying Public Address, Private Key. These are analogous. Your email password should never be given to anyone because your password grants complete control over your account. In the same way, your private key should never be given to anyone else. Don't worry, no names are involved. Instead, your Public Address and Private Key will both be long, random strings of numbers and letters. This is what protects your identity. All of the behind the scenes technical legwork is handled by a piece of software called a wallet - you don't actually have to know any code. Every transaction that occurred in a blockchain is reviewed by each computer on the network, and each computer has its own copy of the public ledger. The computers check to see that your digital signature is valid and that your address has the necessary funds to complete the transaction. This is referred to as 'transaction verification'. Once your transaction is verified, individuals called miners come in to do the heavy lifting with fancy, number-crunching computers. There are variations to distributed ledger technology such as if it is private or public, what type of hash is used, is there a 'work' mechanism and what type of peer to peer networking is implemented, but this series of blocks that have a hash-based integrity mechanism is the core of distributed ledger technology. Cryptography Cryptography is a process of constructing and analyzing protocols that prevent third parties or the public from decoding private messages. cryptography is used in various aspects of information security like authentication, data confidentiality and data integrity. There are many types of cryptography. Typically, for the majority of popular blockchain implementations, hashes and public key cryptography are used to ensure distributed ledger integrity. For example, Bitcoin uses SHA-256 to determine the hashcash cost in blocks before they are created. Hashcash cost is a method of slowing down the cryptographical discovery which in Bitcoin provides the award or the actual Bitcoin. There are often other technologies used in blockchain implementations such as Proof Of Work protocol but this is typically only in public systems. Proof of Stake systems is found in private implementations. The data and the type of hashing vary as well but if you understand the distributed ledger and the cryptography of hashing then you will understand how these variations only go to serve the above-mentioned technologies used in the blockchain. Do you have any suggestion? comment and upvote below.
https://www.coinratecap.com/en/blogDetail/blockchain-technology-explained-the-2-underlying-technology
Shirley Ayorkor Botchwey Minister of Foreign Affairs and Regional Integration, Shirley Ayorkor Botchwey, has called on African countries to build their domestic production capacities in order to fully benefit from the African Continental Free Trade Area (AfCFTA). She made the call at the third AfCFTA Council of ministers meeting held in on Friday November 20, 2020. According to her, “For African countries to benefit fully from the AFCFTA, efforts must be deployed by policy makers to build domestic production capacity through initiatives, which will empower the private sector to be competitive and export oriented.” “Let me point out that without a strategy to increase the volume of trade, the benefits of the AFCFTA will not be guaranteed,” she said. The meeting presented the State Parties of the AFCFTA an opportunity to address issues concerning the operationalization of the customs provisions in the AfCFTA Agreement; the Protocol on Trade in Goods and related annexes on Tariff Reduction Schedules, Rules of Origin, Trade Facilitation, Transit and other matters related to border clearance. “Progress on these pertinent matters will be crucial to the start of trading and the creation of the single African market for trade, investment and the socio-economic transformation of the Continent as well as the realization of the Agenda 2063: The Africa We Want,” the Minister said. She said “the inadequacies of our respective economies have prevented our effective participation in global trade. While many reasons account for this state of affairs, it is largely because we have not instituted the proper frameworks, which promote trade among ourselves. Inspite of well-intentioned programmes adopted to boost intra-African trade, trading among African countries is still low and stands at about 16 % compared to 51% in Asia and 54% in Europe.” Agenda 2063, she stated, recognised that for a prosperous Africa anchored on inclusive growth and sustainable development to become a reality, there was the need for African governments to garner the necessary political will to integrate the AfCFTA objectives into national and regional development plans and programmes. “I am confident that your deliberations during this meeting will contribute to the development of strategies to accelerate economic integration at the continental level. This is an opportune time for us to undertake reforms of our customs regulations and enhance our trade facilitation in order to derive the maximum benefit from the AFCFTA,” she said. To support integration on the Continent, she stated that Ghana has introduced visa-on–arrival for AU nationals in furtherance of her commitment to the AU Protocol on Free Movement of Persons, Right of Residence and Right of Establishment. “We hope that this bold step will facilitate the implementation of the Treaty establishing the African Economic Community and encourage other African countries to honour their commitment to the Protocol.” The meeting was chaired by Ghana’s Trade and Industry Minister, Alan Kyeremanten.
https://ghananewsflash.com/build-domestic-production-capacities-to-benefit-fully-from-afcfta-minister/
BMW AG — Mini JCW Children's Pedal Go-Kart What are the defects? The gaps between certain movable parts may present a risk of entrapment. These areas are in the steering assembly and adjacent axle bar, between the diagonal stopper rod of the brake rod and the adjacent part of the chassis near rear the right wheel, and between the pedal arm and adjacent drive mechanism shield. What are the hazards? The gaps may cause an entrapment hazard and children's body parts may become trapped or jammed, causing an injury. What should consumers do? Consumers should immediately stop using the Mini JCW Go-Kart. Known owners will be contacted by BMW Group Australia Ltd or a BMW dealer. Consumers may contact any authorised BMW or Mini Dealership, to arrange a full refund. For further information, contact the BMW Group Customer Interaction Centre on Freecall 1800 813 299 (Monday to Friday, 9am - 5pm), email [email protected] or visit https://www.bmw.com.au All authorised BMW motor vehicle dealers - 1 June 2018 - 31 December 2018 Recall advertisements and supporting documentation Responsible regulator Australian Competition and Consumer Commission is the responsible regulator for this recall.
https://www.productsafety.gov.au/recall/bmw-ag-mini-jcw-childrens-pedal-go-kart
understand and have developed Basis of Issue Plan Feeder Data (BOIPFD), Qualitative and Quantitative Personnel Requirements Information (QQPRI), Data Interchange, New Equipment Training Plans (NETPs), Materiel Fielding Plans (MFP), and the relationship between the materiel developer, tester, trainer, supporter and user. ADC personnel have coordinated and managed the successful completion of NET and TPF on a worldwide basis (CONUS/OCONUS). ADC has accomplished NET and Material Fielding for SBCCOM, TACOM, CECOM, PMMEP and USMC New Equipment Training (NET), Total Package Fielding (TPF), Deprocessing, Training Material Development/Updating and Modification application on electronic controlled/assisted computer operated/maintained systems, equipment, assemblies, components, subassemblies and all associated support equipment. ADC has developed computer-aided training material, conducted the initial review at the manufacture’s site, developed the operator and maintainer critical task list, developed training material consisting of POI, Lesson Plan, Trainee Guide, Visual Aids Manual, Critical Task List, CD-ROM, and test Instruments. ADC has successfully accomplished AMT, NET, TPF, Deprocessing, Inventory, Handoff and Modification on the following equipment: To date ADC has accomplished 557 courses on Operation and Maintenance, trained 7439 students, deprocessed 4510 systems and completed 19,002 equipment modifications in 982 different locations CONUS and 61 different locations OCONUS. Once equipment has arrived at a fielding site, ADC deploys the systems, conducts an inventory to ensure the system is complete, and initiates operation. Once the systems are operational and complete, the receiving unit can inspect the equipment, confirm full operational capability, and the receiving property book officer subsequently signs for the equipment properly achieving hand-off. As part of deprocessing, ADC provides all personnel, skills, test equipment, tools, and material necessary to repair and provide Initial Operating Capability. ADC conducts a joint inventory with MACOM and receiving units to ensure that all required assemblies, sub-assemblies and support equipment are available or noted as shortage for requisition. ADC is extremely experienced in fielding equipment, and providing the necessary transfer of knowledge/skills from the manufacture to both operations and maintenance personnel. ADC provides these services when and where the soldier needs it; we have experienced rain, snow, mud, heat, combat and garrison environments. ADC's expert trainers have conducted Instructor and Key Personnel Training (IKPT) for TRADOC, Manufacturer Interface Training, New Equipment Training (NET), and Sustainment Training, in both CONUS and OCONUS locations. All ADC instructors are qualified and certified by MACOM, and continuously undergo review on a mission by mission basis to ensure all training support packages are provided and tasks are completed. ADC provides a reduction in risk to soldiers by utilizing a staff of trainers who have a vast knowledge base and experience on new technology and system capabilities, along with proven instructional experience providing for the effective transfer of knowledge to soldiers. We have trained Synchronized Pre-Deployment and Operational Tracker (SPOT) personnel on staff, which allows ADC to deploy trainers to any location world-wide; much of ADC’s experience has been in Iraq and Afghanistan deployments. ADC trainers have proven effectiveness in assisting both operators and maintainers in the performance of equipment operation, maintenance, and sustainment of operations. ADC training programs support initial and refresher training for all Power Generation, Water Purification, Combat Field Feeding Commodity, Field Service Commodity, and Water/Fuel Distribution systems. ADC training methods provide all operation and maintenance procedures along with fault isolation and repair at the levels identified in the TRADOC approved training support packages (TSP), within the training materials, and in line with the MAC. ADC continually updates its training materials to ensure every end item modification/change or field lessons learned are transferred to the soldier during NET and TRADOC for training. ADC’s proven approach provides: ADC also develops computer based training which is based on IKPT materials and utilized for NET or Sustainment Training. ADC ensures that every soldier we train is equipped with a complete set of training materials to help reinforce and sustain what they learn. ADC also develops Interactive Multimedia Instructional (IMI) training materials, which allows the instructor and students to interact with the training material being utilized. These materials are accepted and approved by the MACOM, TRADOC and CASCOM prior to usage.
http://www.advdesign.com/services/training/
momentarily stunned, with frozen gaze. The splendor of the moment so dazzles us, our compulsively chattering minds give pause, so as not to mentally whisk us away to a place other than the here-and-now. Bathed in luminescence, a door seems to open to another reality, always present, yet rarely witnessed. Abraham Maslow called these "peak experiences," since they represent the high moments of life where we joyfully find ourselves catapulted beyond the confines of the mundane and ordinary. He might just as well have called them "peek' experiences. During these expansive occasions, we sneak a glimpse of the eternal realm of Being itself. If only for a brief moment in time, we come home to our True Self. 'Ah," one might sigh, "so grand ... if only I could stay here. But how do I take up permanent residence?" During the past ten years, I have committed myself to finding out. During my search, I have been honored to engage in dialogue with some of the most daring, inspiring and insightful "paradigm pioneers" of our time: in medicine, science, psychology, business, religion / spirituality, and human potential. This diverse group of individuals is joined by their commonly voiced insight that humanity is now taking a quantum leap forward in its evolutionary development. This change is accompanied by a shift in world view – the basic picture we carry with us of "the way things are." A world view seeks to answer two fundamental questions, "Who are we?" and "What is the nature of the Universe in which we live?" Our answers to these questions dictate the quality and characteristics of our personal relationships with family, friends and employers /employees. When considered on a larger scale, they define societies. It should be of little surprise that the world view which is emerging calls into question many of the things Western society holds to be true: MYTH #1 Humanity has reached the pinnacle of its development. Esalen co-founder Michael Murphy, drawing upon comparative religious studies, medical science, anthropology, and sports, has made a provocative case that there are more advanced stages of human development. As a person reaches these advanced levels of spiritual maturity, extraordinary capacities begin to blossom - of love, vitality, personhood, bodily awareness, intuition, perception, communication, and volition. First step: to recognize they exist. Most people do not. Then, methods can be employed with conscious intention. MYTH #2 We are completely separate from each other, nature, and the Kosmos. This myth of "other-than-me" has been responsible for wars, the rape of the planet, and all forms and expressions of human injustice. After all, who in their right mind would harm another if they experienced that person as part of themselves? Stan Grof, in his research of nonordinary states of consciousness, summarizes by saying "the psyche and consciousness of each of us is, in the last analysis, commensurate with "All-That-Is" because there are no absolute boundaries between the body/ego and the totality of existence." Dr. Larry Dossey's Era-3 medicine, where the thoughts, attitudes, and healing intentions of one individual can influence the physiology of another person (in contrast to Era-2, prevailing mind-body medicine) is very well supported by scientific studies into the healing power of prayer. Now this can't happen according to the known principles of physics and world view of traditional science. Yet the preponderance of evidence suggests that indeed it does. MYTH #3 The physical world is all there is. Materialistically bound, traditional science assumes that anything that cannot be measured, tested in a laboratory, or probed by the five senses or their technological extensions simply doesn't exist. it's "not real." The consequence: all of reality has been collapsed into physical reality. Spiritual, or what I would call nonphysical, dimensions of reality have been run out of town. This clashes with the "perennial philosophy," that philosophical consensus spanning ages, religions, traditions, and cultures, which describes different but continuous dimensions of reality. These run from the most dense and least conscious - what we'd call "matter" - to the least dense and most conscious, which we'd call spiritual. Interestingly enough, this extended, multidimensional model of reality is suggested by quantum theorists such as Jack Scarfetti who describes superluminal travel. Other dimensions of reality are used to explain travel that occurs faster than the speed of light - the ultimate of speed limits. Or consider the work of the legendary physicist, David Bohm, with his explicate (physical) and implicate (non-physical) multidimensional model of reality. This is no mere theory - the 1982 Aspect Experiment in France demonstrated, that two once-connected quantum particles separated by vast distances remained somehow connected. If one particle was changed, the other changed - instantly. Scientists don't know the mechanics of how this faster-than-the-speed-of-light travel can happen, though some theorists suggest that this connection takes place via doorways into higher dimensions. So contrary to what those who pledge their allegiance to the traditional paradigm might think, the influential, pioneering individuals I spoke with felt that we have not reached the pinnacle of human development, we are connected, rather than separate, from all of life, and that the full spectrum of consciousness encompasses both physical and a multitude of non physical dimensions of reality. At core, this new world view involves seeing yourself, others, and all of life, not through the eyes of our small, earthly self that lives in time and is born in time. But rather through the eyes of the soul, our Being, the True Self. One by one, people are jumping to this higher orbit. With his book, The Power of Now, Eckhart Tolle rightfully takes his place among this special group of world-class teachers. Eckhart's message: the problem of humanity is deeply rooted in the mind itself. Or rather, our misidentification with mind. Our drifting awareness, our tendency to take the path of least resistance by being less than fully awake to the present moment, creates a void. And the time-bound mind, which has been designed to be a useful servant, compensates by proclaiming itself master. Like a butterfly flittering from one flower to another, the mind engages past experiences or, projecting its own made-for-television movie, anticipates what is to come. Seldom do we find ourselves resting in the oceanic depth of the here and now. For it is here - in the Now - where we find our True Self, which lies behind our physical body, shifting emotions, and chattering mind. The crowning glory of human development rests not in our ability to reason and think, though this is what distinguishes us from animals. Intellect, like instinct, is merely a point along the way. Our ultimate destiny is to re-connect with our essential Being and express from our extraordinary, divine reality in the ordinary physical world, moment by moment. Easy to say, yet rare are those who have attained the further reaches of human development. Fortunately, there are guides and teachers to help us along the way. As a teacher and guide, Eckhart's formidable power lies not in his adept ability to delight us with entertaining stories, make the abstract concrete, or provide useful technique. Rather, his magic is seated in his personal experience, as one who knows. As a result, there is a power behind his words found only in the most celebrated of spiritual teachers. By living from the depths of this Greater Reality, Eckhart clears an energetic pathway for others to join him. And what if others do? Surely the world as we know it would change for the better. Values would shift in the flotsam of vanishing fears that have been funneled away through the whirlpool of Being itself. A new civilization would be born. "Where's the proof of this Greater Reality?" you ask. I offer only an analogy: A battery of scientists can get together and tell you about all the scientific proof for the fact that bananas are bitter. But all you have to do is taste one, once, to realize that there is this whole other aspect to bananas. Ultimately, proof lies not in intellectual arguments, but in being touched in some way by the sacred within and without. Eckhart Tolle masterfully opens us to that possibility.
http://18mind.com/mind/Power_Of_Now_Foreword
This shows a typical cascade control scheme of a heat exchanger. The aim is to keep T2 as close to the setpoint as possible. - Measured variables - flow of material inside tubes - temperature of material in shell - Manipulated variable - flow of material in tube - Disturbances - flow through shell - flow through tubes - temperature through tubes - change in temperature T1 Operation An increase in T2 can be caused by - Increase in T1 - Decrease in F - Increase in temp through tubes - Decrease in flow through tubes - assume that it is cooling water in tubes To compensate the flow through the tubes should be increased. However, there is a second loop which compensates for changes in the flowrate. The TC (Primary Loop) detects changes in the temperature brought about by changes in T1 , F or the temperature in the tubes. The FC (Secondary Loop) detects changes in the cooling water flow and hence eliminates anticipated effects on the temperature T2 .
https://instrumentationforum.com/t/control-of-a-heat-exchanger/6462
Music Mood Weather I tend to listen to music obsessively—latching onto a favourite song and listening to it until I can sing it backwards in my sleep. For seven weeks I tracked my music listening, noting which songs were most popular. I then cross referenced my playcounts with several other pieces of information; the temperature and my mood at the time of listening, how I discovered the piece of music, how happy or sad the song was, and the average amount of playcounts for the song on last.fm. The resulting piece allows viewers to quickly see which songs I favoured and how they related to my mood and the weather at the time. Click the image to download a full resolution PDF.
http://marierayma.com/project/music-mood-weather/
Picture the scene: it's late in the evening. You're in a taxi on the way home, or perhaps on a train. You're at the stage of your day, or week, or month, or year, where nothing seems to be falling in your favour. Everything that can go wrong has done just that, and it feels as if the whole world is against you. You lean your head against the window pane (rain outside is optional, unless you're reading this from the UK in which case the rain is obligatory) and put your earphones in, searching for solace in the lyrics of a song. But which song? Next time you're in that sort of a mood, or indeed any mood of the melancholic variety, try 'Sitting In The Dark', the lead single from singer-songwriter Jay Dunn's first EP 'Circle of Five'. Aside from contemplative lyrics that one might need to hear on such an occasion, it also has a gorgeous melody; lilting and sombre, but offset by just the right amount of delicate vocal delivery and harmonica to lift it out of the depths of complete despair. As the track progresses, warm guitar tones obviously influenced by the likes of REM, Tom Petty and Springsteen (Dunn is a self-professed American music-lover, though he himself hails from Manchester) continue to shine through, and though the track remains on a relatively similar level throughout it does not feel like it drags or becomes monotonous. According to Dunn's website, he has been working with producer Tony Long to 'bring his songs to life'- and if this sparkling first single is anything to go by then that is something that has certainly been achieved. It will be interesting to listen to the rest of the EP and hear what other musical roads Dunn and Long have ventured down- that of more songs for late night train journeys, perhaps? - - - - - Jay's first solo project, the 'Circle of Five' EP will be released on 19th October 2019. To support the EP's release he will also be playing at HMV Bury as part of their 'Live and Local Series' on the same date- definitely one for the gig diary! All photos from the official Jay Dunn Facebook page.
https://thesoundofthecrowd.wixsite.com/thesoundofthecrowd/single-post/2019/10/06/SINGLE-REVIEW-Sitting-In-The-Dark-by-Jay-Dunn
Long term disability insurance is provided to all eligible employees on a contributory or non-contributory basis. After 180 days of continued disability, employees under age 60 are eligible to receive 60 percent of his/her base monthly salary to a maximum benefit currently of $4,000 per month if the University is paying (or $15,000 per month if the employee is paying and is eligible) until age 65. Employees age 65 and over are eligible for this benefit through age 70 on a prorated basis. Offsets such as social security disability and/or worker compensation are factored into the monthly calculation. If the University pays the premium, any benefit is taxable to the employee. If the employee is paying, the benefit is non-taxable. If a disabled employee, under age 60, is an active participant in the 403(b) defined contribution retirement plan and is receiving a University matching contribution, the LTD carrier will contribute 12% of the employee’s base annual salary into the annuity plan while the employee is receiving LTD benefits, up to age 65. At age 65, when the LTD ceases, the employee may begin to receive annuity payments if he/she elects to do so.
http://hr.adelphi.edu/benefits/long-term-disability/
How to Know When Repairs and Maintenance Are Tax Deductible Expenses If you like to put money in your pocket now rather than wait for years to get it, then you’ll want to become familiar with the Internal Revenue Service’s regulations on repair and maintenance. In a nutshell, if you classify an item as an expense, you will get to write the entire amount off in the current year. If you capitalize the item, it could take you between three and 39 years to write it all off. Here’s a simple example: suppose you are required to capitalize a $10,000 outlay and write it off over 20 years rather than expense it. Instead of gaining $4,000 in tax savings this year (assuming 40% tax rate), you’ll get a $500 write off each year for 20 years or $200 in tax savings per year. You’ll eventually realize the $4,000 savings (assuming there are no other changes in tax law), but wouldn’t you rather take the $4,000 now? We used to be able to set “reasonable” thresholds when determining which items could be expensed in the current tax year versus capitalized and depreciated over time. In 2014, however, the IRS set a very specific bar, and the onus is on business owners to conform. It is important to have a working knowledge of these regulations to prepare for a productive dialog with your accountant. Below are key actions you should take to ensure compliance and avoid unpleasant consequences. To Deduct, or Not To Deduct… As a general rule, amounts paid to improve a unit of property must be capitalized. An improvement is defined as an expenditure that betters a unit of property, restores it, or adapts it to a new and different use. For example, the cost to replace a roof would be capitalized and written off over the economic life of that investment. On the other hand, the regulations allow for a current deduction for repairs and maintenance to property. These recurring expenses keep the property in good working order – e.g., inspections, cleaning, testing, and replacement of damaged or worn parts. For a building structure or system, you must reasonably expect to perform these repair and maintenance activities more than once during the 10-year period that begins when the structure or system is placed in service. For property other than buildings, you must reasonably expect to perform said activities more than once during the property’s tax depreciation life. Deductions are also allowed for amounts paid for materials and supplies you reasonably expect to consume during a 12-month period. You’ll need to take inventory and record usage of higher value materials and supplies, and deduct expenses in the year in which they are consumed. You’ll deduct expenses for other (incidental) materials and supplies in the year that they’re purchased. There are special rules that apply to removable, temporary, and emergency standby spare parts. Your accountant can help you determine appropriate treatment for your individual circumstances. Allowable Deductions for Small Amounts A strict interpretation of the regulations could require the capitalization of a $300 windowpane replacement that has a useful life in excess of ten years and requires no intervening repair or maintenance. Fortunately, the rules set parameters under which selected expenses may be deducted in the current year. For the typical dental office, the threshold is $2,500 per invoice or for each item if listed separately on a single invoice. If you are tempted to work with your vendors to limit all invoices to $2,500 or less, you are headed down the wrong road. The IRS will not reward your creativity! Rather, all reported expenses must relate to a “Unit of Property” (UOP) that is being improved, repaired, or maintained. For property other than buildings, a single UOP consists of all components that are functionally interdependent, such that one component can’t be placed in service without the other components. A dental chair falls into this category as its seat, backrest, headrest, armrests, hydraulic lift system, footswitch (or touchpad), and baseplate could not be placed in service independently. So, for example, if you refurbish an existing dental chair by replacing the hydraulic solenoid, brakes, foot switch, and headrest, you could not deduct all of the expenses related to the project by treating each of the component parts as separate items. Since the parts work interdependently, the total cost of the upgrade would be subject to the $2,500 threshold. Special Treatment for Your Dental Building The regulations look kindly upon small taxpayers whose average annual gross receipts were less than $10 million in the three preceding tax years. These taxpayers may deduct improvements made to building properties that have an unadjusted basis of $1 million or less. This provision applies only if the total amount paid during the tax year for repairs, maintenance, and improvements falls short of $10,000 or 2% of a building’s unadjusted basis. Eligible Taxpayers Are Allowed to Make This Election Annually on a Building-By-Building Basis If you lease your office space, you’ll treat repairs like you do for your dental chair. In this case, the regulations generally treat each building and its structural components (walls, windows, doors, floor, roof, etc.) as one UOP. The regulations also list specific building systems that are treated as independent UOPs—e.g., HVAC, plumbing, electrical, elevators, the fire suppression system, and the building alarm system. Again, if you upgrade the building alarm system by replacing the controller, keypad, and motion sensors, you could not deduct all of the expenses related to the project by treating each of the component parts as separate items. As the parts work interdependently in service of a UOP called the “alarm system,” the total cost of the upgrade would be subject to the upper limit of $5000. What You Need To Do First And Foremost: It is recommended you have a written capitalization policy that has been signed and dated on or before December 31, 2013. You may be asked to produce this document should your return be audited. Using this sample, you should be able to check this crucial item off the list quickly. Second: Establish a filing and recordkeeping system to distinguish clearly the various categories of expense subject to these new regulations. If you create a one or two-page “Quick Reference Guide” for commonly purchased items, you’ll increase the odds of consistent treatment throughout the year. This simple process will save time, effort, and expense when it’s time to prepare your annual tax returns. Third: Make sure that your accountant has a clear understanding of these new regulations and how they apply to your dental practice. Your accountant can look out for your best interests and help you avoid the trouble and expense of re-filing tax returns and paying penalties and interest. With compliance well in hand, you can focus your attention on patient care and the overall health of your practice. This article originally appeared in Catalyst Magazine, and this post was originally published on April 2, 2014. It was updated on May 1, 2017 to provide you the most current information.
https://aldrichadvisors.com/dental/repair-and-maintenance-tax-deductible-expenses/
ISO 22367-2020 pdf free download.Medical laboratories – Application of risk management to medical laboratories. This document specifies a process for a medical laboratory to identify and manage the risks to patients, laboratory workers and service providers that are associated with medical laboratory examinations. The process includes identifying, estimating, evaluating, controlling and monitoring the risks. The requirements of this document are applicable to all aspects of the examinations and services of a medical laboratory, including the pre-examination and post-examination aspects, examinations, accurate transmission of test results into the electronic medical record and other technical and management processes described in Iso 15189. This document does not specify acceptable levels of risk. This document does not apply to risks from post-examination clinical decisions made by healthcare providers. This document does not apply to the management of risks affecting medical laboratory enterprises that are addressed by ISO 31000, such as business, economic, legal, and regulatory risks. 2 Normative references There are no normative references in this document. 3 Terms and definitions For the purposes of this document, the following terms and definitions apply. ISO and IEC maintain terminological databases for use in standardization at the following addresses: — ISO Online browsing platform: available at https://www,iso.org/ohp — IEC Electropedia: available at http://www.electropedia.org/ 3.1 benefit impact or desirable outcome of a process (3.19), procedure (3117) or the use of a medical device on the health of an individual or a positive impact on patient management or public health Note I to entry: Benefits include prolongation of life, reduction of pain, (relief of symptoms), improvement in function, or an increased sense of well-being. 3.2 event occurrence or change of a particular set of circumstances Note 1 to entry: An event can be one or more occurrences, and can have several causes. Note 2 to entry: An event can consist of something not happening. Note 3 to entry: An event can sometimes be referred to as an “incident” or “accident’. Note 4 to entry: An event without consequences can also be referred to as a “near miss”, “incident”, “near hitN or “close call”.[SOURCE: ISO Guide 73:2009, 3.5.1.3].ISO 22367 pdf download. ISO 22367-2020 pdf free download.Medical laboratories – Application of risk management to medical laboratories. - Download here - - - Attention: - It is recommended to use winrar v3.10 or above to extract the information of this website. - If this file cannot be downloaded, please contact the webmaster. - In order to achieve the fastest download speed, please do not download multiple files at the same time. If you can't download for the moment, please try again later. - The standards shared by this website are for learning only. If they are used for commercial purposes, please go to the official website to buy the authentic standards.
https://www.52voa.cn/iso-22367-2020-pdf-free-download.html
Graceful lines, intricate woodwork, and rich fabrics are characteristic of classic French design. Fused with country details, country French style creates a space that is elegant yet homey, and rustic yet refined. Explore these design ideas to combine French and country styles in your kitchen. Incorporating furniture-style cabinetry makes the kitchen feel more like a gathering space and can make a space feel more intimate, too. Intricate armoire-style panels on the built-in refrigerator’s doors add a custom touch. See how antique country French furniture—whether reproductions or true vintage—can make a statement in a kitchen.
https://homespecially.com/70-incredible-french-country-kitchen-design-ideas/
Technavio has been monitoring the semiconductor wafer inspection equipment market and it is poised to grow by USD 1.71 billion during 2020-2024, progressing at a CAGR of over 8% during the forecast period. The report offers an up-to-date analysis regarding the current market scenario, latest trends and drivers, and the overall market environment. This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20200901005137/en/ Although the COVID-19 pandemic continues to transform the growth of various industries, the immediate impact of the outbreak is varied. While a few industries will register a drop in demand, numerous others will continue to remain unscathed and show promising growth opportunities. Technavio's in-depth research has all your needs covered as our research reports include all foreseeable market scenarios, including pre- post-COVID-19 analysis. Download a Free Sample Report on COVID-19 Impacts Frequently Asked Questions- Based on segmentation by end-user, which is the leading segment in the market? The foundries segment is expected to be the leading segment in the global market during the forecast period. What are the major trends in the market? Increasing focus on large diameter wafer size is one of the major trends in the market. At what rate is the market projected to grow? Growing at a CAGR of over 8%, the incremental growth of the market is anticipated to be USD 1.71 billion. Growing demand for IoT devices is one of the major factors driving the market. However, the cyclic nature of the semiconductor industry restraints the market growth. How big is the APAC market? The APAC region will contribute 78% of market growth. The market is fragmented, and the degree of fragmentation will accelerate during the forecast period. Applied Materials Inc., ASML Holding NV, Camtek Ltd., Carl Zeiss AG, Hitachi High-Technologies Corp., JEOL Ltd., KLA Corp., Nikon Corp., Onto Innovation Inc., and Toray Industries Inc. are some of the major market participants. The growing demand for IoT devices will offer immense growth opportunities. To make most of the opportunities, market vendors should focus more on the growth prospects in the fast-growing segments, while maintaining their positions in the slow-growing segments. Buy 1 Technavio report and get the second for 50% off. Buy 2 Technavio reports and get the third for free. View market snapshot before purchasing Technavio's custom research reports offer detailed insights on the impact of COVID-19 at an industry level, a regional level, and subsequent supply chain operations. This customized report will also help clients keep up with new product launches in direct indirect COVID-19 related markets, upcoming vaccines and pipeline analysis, and significant developments in vendor operations and government regulations. To learn more about the global trends impacting the future of market research, download a free sample: https://www.technavio.com/talk-to-us?report=IRTNTR41488 Semiconductor Wafer Inspection Equipment Market 2020-2024: Scope Technavio presents a detailed picture of the market by the way of study, synthesis, and summation of data from multiple sources. The semiconductor wafer inspection equipment market report covers the following areas: Semiconductor Wafer Inspection Equipment Market Size Semiconductor Wafer Inspection Equipment Market Trends Semiconductor Wafer Inspection Equipment Market Analysis This study identifies an increasing focus on large diameter wafer size as one of the prime reasons driving the semiconductor wafer inspection equipment market growth during the next few years. Technavio suggests three forecast scenarios (optimistic, probable, and pessimistic) considering the impact of COVID-19. Technavio's in-depth research has direct and indirect COVID-19 impacted market research reports. Detailed information on factors that will assist semiconductor wafer inspection equipment market growth during the next five years Estimation of the semiconductor wafer inspection equipment market size and its contribution to the parent market Predictions on upcoming trends and changes in consumer behavior The growth of the semiconductor wafer inspection equipment market Analysis of the market's competitive landscape and detailed information on vendors Comprehensive details of factors that will challenge the growth of semiconductor wafer inspection equipment market vendors Table of Contents: Executive Summary Market Overview Market Landscape Market ecosystem Value chain analysis Market Sizing Market definition Market segment analysis Market size 2019 Market outlook: Forecast for 2019 2024 Five Forces Analysis Bargaining power of buyers Bargaining power of suppliers Threat of new entrants Threat of substitutes Threat of rivalry Market condition Market Segmentation by Technology Market segments Comparison by Technology placement Optical wafer inspection Market size and forecast 2019-2024 E-beam wafer inspection Market size and forecast 2019-2024 Market opportunity by Technology Market Segmentation by End-user Market segments Comparison by End user placement Foundries Market size and forecast 2019-2024 IDMs Market size and forecast 2019-2024 Market opportunity by End user Customer landscape Overview Geographic Landscape Geographic segmentation Geographic comparison APAC Market size and forecast 2019-2024 North America Market size and forecast 2019-2024 Europe Market size and forecast 2019-2024 South America Market size and forecast 2019-2024 MEA Market size and forecast 2019-2024 Key leading countries Market opportunity by geography Drivers, Challenges, and Trends Market drivers Volume driver Demand led growth Volume driver Supply led growth Volume driver External factors Volume driver Demand shift in adjacent markets Price driver Inflation Price driver Shift from lower to higher-priced units Market challenges Market trends Vendor Landscape Overview Landscape disruption Vendor Analysis Vendors covered Market positioning of vendors Applied Materials, Inc. ASML Holding NV Camtek Ltd. Carl Zeiss AG Hitachi High-Technologies Corp. JEOL Ltd. KLA Corp. Nikon Corp. Onto Innovation Inc. Toray Industries Inc. Appendix Scope of the report Currency conversion rates for US$ Research methodology List of abbreviations About Us Technavio is a leading global technology research and advisory company. Their research and analysis focuses on emerging market trends and provides actionable insights to help businesses identify market opportunities and develop effective strategies to optimize their market positions. With over 500 specialized analysts, Technavio's report library consists of more than 17,000 reports and counting, covering 800 technologies, spanning across 50 countries. Their client base consists of enterprises of all sizes, including more than 100 Fortune 500 companies. This growing client base relies on Technavio's comprehensive coverage, extensive research, and actionable market insights to identify opportunities in existing and potential markets and assess their competitive positions within changing market scenarios. View source version on businesswire.com: https://www.businesswire.com/news/home/20200901005137/en/
Welcome to the West Valley School application submission page. We are a K-8 school district located 8 miles outside of Kalispell, MT. Our enrollment has increased by 49% over the last 12 years to 785 students with 85 staff members. We look forward to viewing your application. Please complete all requested information in its entirety. If you are interested in our negotiated agreement, which includes our salary schedule, click here. It is the policy and intent of West Valley School District #1 to provide equal opportunity in employment of all persons. This policy prohibits discrimination on the basis of race, color, religion, national origin, political affiliation, disability, marital status, sex, sexual orientation, or age. This policy applies to all phases of employment. No question on this application is intended to secure information to be used for such discrimination. Click on the "Submit" button of the position that you are interested in to begin the application process. Thank you for your time. West Valley School District #1, located in Kalispell, is accepting applications for 1 full-time Special Education Teachers for the 2021-2022 school year. This position will join a team of 3 other SPED teachers. Minimum Qualifications Valid Montana State Teaching Certificate with Special Education Endorsement Knowledge of: Subject areas appropriate to assignment; effective behavior management techniques; effective instructional techniques; rules and procedures for student safety; rules and regulations governing special education. Skill in: Proficiency in written and oral communications; effective communication with parents or guardians in a rural community; Math and ELA instruction; designing and implementing lesson plans for students having a wide range of achievement; adapting curricula and programs to meet the intellectual, social, physical and emotional needs of special education students. Developing, monitoring, and facilitating all areas of students’ IEPs. Ability to: Interact with middle school students in a positive and confident manner; be fair and consistent; adapt to change and remain flexible; organize activities; manage student behavior; use good judgment to maintain a safe learning environment; provide instruction and demonstrate techniques; direct paraprofessionals; deal with specific physical or emotional disabilities and associated conditions; establish and maintain effective, positive working relationships with students, parents or guardians, specialists, staff and administrators. Full time general paraprofessional position, salary DOE, and must have a clean driving record.
https://westvalleyschool.submittable.com/submit
We have an immediate need for a Senior UX Researcher to join our Research and Development team. Working in a cross functional team, you will be responsible for the user research of a section of our product line. You’ll work closely with your UX Design, Product and Engineering colleagues to understand the needs of our users and deliver actionable insights that help solve their business problems. What you’ll be doing... Planning your own research studies which will deliver meaningful and actionable insights to the designers & engineers in good time. Organizing, managing and moderating of user testing and also the recruitment of users. Deliver finished, well-documented research findings. Participate and facilitate workshops to involve your cross functional team in the design process. Be the voice of the user on your team, ensuring that the products we deliver solve the right problems for our users in the right way. We are looking for an experienced User Researcher who can make a strong contribution to the user experience of our product line. You have a track record of delivering excellent product design in a dynamic, cross functional team and have the portfolio to prove it. You’ll need to have: 3-5 years of experience as a UX Researcher. A portfolio that showcases your capabilities in the UX Research. Experience delivering research findings in good shape to the engineering team. Experience in the Design Thinking methodology and/or Design Sprints. Experience of Lean UX a distinct advantage. Even better if you have: Ability to generate wireframes collaboratively, particularly with UX Designers and engineering. An ability to support less experienced researchers and designers who are planning or conducting research activities. An ability to understand and incorporate complex technical and business requirements into your work, where necessary. An ability to build relationships within the cross functional team that will ensure you get the support you need for your research and the insights you deliver. Understanding of data analytics and quantitative aspects of UX research. Strong written and verbal communication skills and presentation skills. Sarah Horgan, Technical Recruiter - Your e-Frontiers consultant for this job Sarah happily joined e-Frontiers as a Technical Recruiter, focusing on Product Management, UI/UX Design, Mobile Development and RPA. She completed a Commerce (Hons) degree in University College Cork, specializing in Marketing and Politics. As a friendly and outgoing person, Sarah enjoys her job striving to bring a personable, helpful approach to her candidates.
https://www.e-frontiers.ie/find-a-job/senior-ux-researcher-5069/
Robert Greenleaf (1977) coined the term servant leadership, which emphasises that leaders be attentive to the concerns of their followers and nurture them. Servant leaders put followers first, empower them, and help them develop their full personal capacities and place the good of followers over their own self-interests and emphasize follower development. In addition, a servant leader has a social responsibility to be concerned about the “have-nots” and those less privileged and if inequalities and social injustices exist, he or she tries to remove them. The leader in this case uses less institutional power, shifting authority to those who are being led and values community contribution to his leadership. During the time of the liberation struggle right into independence, Namibian political leaders have been appealing to the electorate to give them their votes and in turn become their servants. This clarion call and submission has been the hallmark of political indoctrination in Africa and beyond. The poor masses of the electorate for all these years have believed the politicians only to feel betrayed in the process. In contrast to these noble ideas of this leadership, the Namibian electorate has witnessed something different from the promises of their leaders. Election in and election out, the promises of constructing good roads, building schools, improving the standard of living of many ordinary people, are made, but little is delivered. In the process, economies deteriorate and the masses despair and lose hope in the political system. Why do politicians miss and fail to fulfill their promises to their electorate? The following characteristics could be looked at and perhaps shed light: Unexpected-position-occupancy syndrome Most Namibian political leaders suffer from this syndrome. In Silozi, we have a saying, “komu yamwabuhulu, waikayela kwamuhata) meaning a grown-up person who is given a cow for the first time may end up tying it by the tail instead of the legs when trying to milk it. Most leaders who end up climbing these political ladders never expected or imagined to occupy them. The positions and their responsibilities they inherit are beyond their comprehension and in the process, the leaders falter. Like in Chinua Achebe’s “A Man of the People”, these leaders fail to engage their local people who can assist in advisory services. In some cases, these leaders fail to sleep for days as they are overwhelmed by happiness and all of a sudden forget the people who entrusted them with responsibilities of leading them. Their commitment to the growth of the electorate fade and they fail to provide followers with opportunities for career development, helping them develop new work skills, taking a personal interest in the their ideas, and involving them in decision-making. These leaders end up becoming demigods and acquire unquestionable and supernatural powers. Failing to listen to the electorate Communication between political leaders and their followers is cardinal and an interactive process that includes sending and receiving messages. Good servant leaders should possess the quality of communication and listening to their followers and their concerns but many times, the political masters adopt a know-all strategy and their followers become cogs in the wheel. After elections, the politicians disappear only to reappear after five years to ask for another five-year term of deceiving the electorate. Lack of empathy Empathy is “standing in the shoes” of another person and attempting to see the world from that person’s point of view. This is totally absent from many leaders as a result always see the world from their personal perspective in all angles. If our political leaders had empathy, Namibia would be the best place to live in. It is lack of empathy which has bred corruption, leading many leaders to amass ill-gotten wealth at the expense of the electorate. Overlooking the process of healing In this process, both the followers and leaders should find means of making themselves whole. Good servant leaders care about the personal well-being of their followers and at the end of it, make the latter fully satisfied because the people they lead are also comfortable. Many political leaders fail to help their followers even in basic issues and straightforward matters. The call for help in terms of providing sanitary water and better health services always falls on deaf ears. The quality of awareness This is the most neglected component of leadership in Namibia. Most leaders are not aware of what is happening among the people they lead. Many national leaders lack basic information about their people. Some of them have never travelled to other regions of the country. How can a leader claim to be nationalistic when he or she cannot understand the national ingredients and what makes nationalism? Many Namibian politicians cannot comprehend the cultures of their followers. One Namibia One Nation is just on paper and as a result politicians have failed to unite the country. In some cases, our political leaders are not sensitive to the plight of some communities. Namibia has become a country of connections and knowing the people. The question is, “what happens to those who are not connected and who do not know those in power?” Use of coercion instead of persuasion Most leaders tend to use force and intimidation when dealing with their electorate. Threats like denying the communities the right of access to clean water, schools, hospitals and other services which are rightful theirs are the hallmarks of their political campaigns. Such leaders do not even understand that all Namibians are taxpayers and hence entitled to all services in the country. Use of conceptualization This means equipping servant leaders with skills to respond to complex organizational problems in creative ways. Our political leaders have been failing the test of solving both simple and complicated problems within their parties. Imagine if leaders cannot solve problems at such level, how will they manage to handle issues at national and international levels? All political leaders in this country are grappling with problems of their own making by failing to manage their parties because they lack consistency and keep on contradicting themselves by implementing policies that are not feasible. How can one explain a situation where the leadership of the party fail to seek legal advice and skip the Electoral Commission of Namibia directives in picking members of parliament? This points to the ignorance and inefficiency of the highest order among the political leaders. The dearth of foresight Foresight encompasses a servant leader’s ability to know the future. It is an ability to predict what is coming based on what is occurring in the present and what has happened in the past. This is also so prevalent among our leaders that they as a result fail to assess their political gains which can lead them to losing votes. In the current preliminaries, in regional elections some councillors refused to see themselves being abandoned despite the clear signs. Since independence 30 years ago, many Namibian political leaders have failed to enhance the concept of community building and development. In many circles, these leaders have torn some communities apart, leaving frustration and tension in their wake. The task of building and constructing these communities will take long. In the aftermath, the new generation will only reap confusion and hatred after the current generation is no more.
https://neweralive.na/posts/opinion-servant-leadership-among-politicians-and-the-electorate
How To Make Accessible Life Cycle Hotspot Analysis Life cycle hotspot analysis can help confirm your intuition or lead you to new insights towards determining a robust sustainability strategy. This article gives a view on how to make detailed and complex hotspot analysis in life cycle assessment (LCA) clear to everyone involved. Expertise And Methodology One of the most important skills of any sustainability expert is translating their findings into a language that corporate social responsibility (CSR) managers understand. As a result, the quality of a hotspot analysis depends on the skills, knowledge and experience of the expert and the tools that he or she uses. Advocating for a consistent footprinting methodology carries the risk that people using the method will spend a lot of effort to produce the required tables and graphs and will not have as much time left to interpret the results and translate them into understandable conclusions. This article gives a view on how to make detailed and complex hotspot analysis in life cycle assessment (LCA) clear to everyone involved. From Single Score To Individual Emissions LCA results can be shown in many different levels of detail, which are useful in communication with different groups. The most aggregated version is the single score. The most detailed results show individual emissions and resource uses per process in the life cycle of the product. A spectrum of options exists between these extremes, to aggregate or disaggregate the different environmental themes, to group processes into life cycle stages, to show the individual emissions and resource uses or to add them up into a single metric. Depending on your goals, it may be a good idea to start at a more aggregated level and then dive into the more interesting details. Several software tools are available to manage this complexity, with different levels of transparency, detail and flexibility. SimaPro is an excellent tool: it gives all the options that may be needed, while it is relatively easy to learn. Top-down Approach If you work from the top down, you can first check if all of the three aggregated damage category scores (human health, ecosystems and resources) are relevant for the product you’re looking at. Then you can evaluate which of the individual environmental categories are relevant within each damage category. In most cases, the most important impact categories will be climate change, particulates, human toxicity, land use and fossil resources. Then you need to group the processes in the product’s life cycle network into about five to eight stages to get a rough idea where the most important contributions to the selected impact categories come from. It is essential that everyone involved in the project agrees on this grouping and that everyone understands the group labels. Grasping The Details This level of detail may be sufficient for CSR managers. Technical experts will want to know more: which emissions and resource uses contribute most to the impact categories? Which life cycle phases or individual processes? This information may be difficult to show in graphs, but it is still important to be able to explain it to a manager when needed. For most categories, the number of emissions and resource uses is manageable; the usual suspects are carbon dioxide, methane, nitrous oxide, sulphur dioxide, nitrogen oxides, particulates, natural gas, and hard coal. For the land use and human toxicity categories, the lists are longer and more variable. The impact sources are more likely to come from background processes far from the control of the product’s makers and to involve large uncertainties. This is why it is important to distinguish impacts occurring in the processes owned by the company, in processes owned by the direct suppliers and in the background processes. Understanding And Prioritising The Main Findings Hotspot analysis in LCA is not just about showing the relative contributions of life cycle stages to the different environmental indicators. It is also about understanding the individual emissions and resource uses behind the scores, their level of uncertainty, and the level of control the company has over those emissions and resource uses. Of course, all environmental impacts are relevant in principle, but we need to prioritise and start reducing large impacts where we can. At PRé, we are convinced that sustainability decisions should be based on scientifically sound analysis. We help experts and CSR managers work together on the best sustainability strategy through sharing our knowledge and developing specialised software tools. Please drop me an e-mail or contact me if you want to exchange ideas or questions.
https://www.pre-sustainability.com/news/how-to-make-accesible-life-cycle-hotspot-analysis/
The RSS Feed keeps you informed about our latest publications: What is the importance of groundwater for Europe? When rain or snow falls on land, some of the water runs into rivers or lakes and some is released back into the atmosphere through evaporation and transpiration (or alternatively combine as ‘evapotranspiration‘). Much of it, however, collects in the ground where it is taken up by cracks and pores in rocks and soils. The distinct underground areas where groundwater collects are known as aquifers; in the terminology of the Water Framework Directive (WFD), these are also known as groundwater bodies. Groundwater, drawn up from aquifers in wells or boreholes, is an important resource and is widely used in Europe for agricultural irrigation and for domestic purposes, including drinking. There is an important distinction to be made between ‘blue water‘, stored in surface waters and groundwater bodies, fl owing through rivers and aquifers, and ‘green water‘, which is stored in the pores of the soil, taken up in plants and released back to the atmosphere through evapotranspiration.
https://www.leopoldina.org/en/publications/detailview/publication/groundwater-in-the-southern-member-states-of-the-european-union-2010/
Questions tagged [lift] The force acting on an aircraft in opposition to gravity which keeps the aircraft in the air. 274 questions 90 votes 14answers 16k views Are wings any more efficient at creating lift, versus orienting the engine's thrust downwards? As I understood from this article, wings on an airplane basically create lift by pushing air down. Maintaining the lift force expends energy because air needs to be continually accelerated downwards. ... 56 votes 11answers 36k views How do wings generate lift? Just the basic question that every aviation enthusiast must be curious about: exactly how does a wing generate lift? 45 votes 8answers 11k views How complete is our understanding of lift? I'm currently studying for my PPL and one of the accepted textbooks contains the following disclaimer at the end of the Principles of Flight section on lift: It is important to note that the ... 44 votes 3answers 8k views Was the Space Shuttle aerodynamically neutral while piggybacking, or did the combination act like a giant biplane? Trying to investigate this question, I see that 'Ask the Captain' says: The weight of the shuttle is calculated like any payload. The 747 produces enough lift to fly and to carry the weight of ... 38 votes 4answers 12k views How do conventional missiles fly? With the exception of cruise missiles, most missiles don't have any obvious lifting device. If you watch a missile being fired, prior to its rocket firing it does exactly what you'd expect: ... 36 votes 2answers 4k views Why do helicopters not roll over when flying forwards? Related to this answer: with velocities so different at forward going and rearward going blade, why does the helicopter not roll over? The higher airspeed at the forward going blade should cause more ... 31 votes 8answers 7k views Is excess lift or excess power needed for a climb? As answered in this question, aircraft need excess power - not excess lift - to climb. This is plausible when the aircraft's thrust vector has a vertical component (its nose and engine points upwards),... 30 votes 4answers 7k views Principle of aerodynamic lift: are misconceptions also taught in flight schools? Describing lift as the result of "equal transit time" on both sides of an airfoil is a fallacious theory widely found in technical books and articles for general public (see below for details about ... 28 votes 8answers 4k views Does a sudden drop of the velocity of the headwind affect the airspeed by lowering it? I had a discussion about air speeds with one of my instructors recently. He is claiming that there is a sudden drop in the wind velocity as you get closer to the ground (which is absolutely true, due ... 28 votes 2answers 16k views What is vortex lift? In a recent question I asked, I was given an answer by Peter Kämpf and he described something about lift being created by a vortex used on delta wings and the Bird of Prey wing. How exactly does ... 27 votes 2answers 4k views How exactly can an airship lose lift? On this wiki page (under 'Comparison with heavier-than-air aircraft'), the altitude record of the L-55 Airship states: The ultimate altitude record for a rigid airship was set in 1917 by the L-55 ... 26 votes 4answers 5k views Can lift occur if air is flowing over an object, but not under it? Can lift occur if air is flowing over a fixed-shape object, but no air is flowing under any part of the object? Maybe the object is the top half of a wing that's glued to the ground, or the object is ... 25 votes 5answers 13k views Is there a maximum lift to drag ratio? If I recall correctly, the best competition gliders have a L/D ratio as high as 60:1. What imposes this limit? Is there a maximum theoretical L/D ratio, or could sufficiently advanced materials allow ... 23 votes 4answers 3k views Would an aircraft with contra-rotating propellers longer than the plane's wingspan be able to fly? I enjoy taking the time to try and visualize how fictional aircraft might actually work in reality. Unfortunately there are some that seem highly impractical from an engineering student's point of ... 19 votes 7answers 18k views Does lift equal weight in a climb? This subject keeps coming up in the discussions and questions such as this one, which asks if lift equals weight in level flight. Good answers there, pointing out that upwards force has many sources. ... 18 votes 2answers 3k views Why did the Solar Impulse flight take so long? The Solar Impulse just made big news for flying from Japan to Hawaii on a solar-powered plane in five days. But five days seems really long. Let's do the math on that. The distance from Japan to ... 18 votes 5answers 5k views Why is lift larger than thrust? [duplicate] It's been a while since I tried to read a little about flight mechanics and aerodynamics, but I remember one question I had back then: Is the thrust of a common passenger aircraft (A320, B737) ... 17 votes 4answers 2k views Why do planes not fly “backwards” (up from the planes POV) when in a vertical climb? As suggested by a user in this question, I'd like to ask this question: One of the most basic aerobatic maneuvers is a vertical climb. This can be achieved by just pitching up to what appears to be ... 17 votes 1answer 2k views How do disks generate lift? Disks and disk-like objects (frisbees, pie pans, round cardboard piece, hats of all sorts, and many other things) can fly well when thrown along with a spinning force which creates a gyroscopic effect ... 15 votes 6answers 3k views Is lift in fact a kind of drag? Given the similarities between Lift and drag and their very similar relationships to the density, surface area, and airflow velocity, could one, in theory, describe aerodynamic lift as a kind of drag ... 15 votes 2answers 2k views What phenomenon causes the increase of drag with rain? I know that rain generally worsens the aerodynamic propeties of an aircraft. I'm wondering what processes cause the increase in drag. I'm mostly interested in General Aviation, thus relatively low ... 14 votes 7answers 8k views Why does a stall decrease lift, rather than increasing it? A stall occurs when the angle of attack of a wing or other airfoil becomes so high that the airflow over the upper surface of the wing separates from the wing, rather than remaining attached to it; ... 14 votes 3answers 15k views How much thrust is needed by an aircraft to have vertical takeoff? In some airshows, I have seen some big aircraft (like 737) takeoff almost vertical. Generally, fully-loaded passenger/cargo planes don't do that, I guess due to safety issues but I think there needs ... 14 votes 1answer 625 views What amount of lift would be created in the fallacious “lift from equal transit time” theory? Context A wrong --but simple to understand-- theory for lift states: Air molecules that were close before being separated at the leading edge must be close again after they join back at the trailing ... 13 votes 5answers 7k views Why are wings load tested upside down? Why are wings load tested by putting weights on the underside of the wing (placed upside down)? A wing is being pulled into the air from its upper surface in flight, so shouldn't it be load tested in ... 13 votes 4answers 4k views What is the aerodynamic motivation behind vortex generators? An airplane's wing creates lift efficiently when the airflow is parallel to the chord of the wing. Vortex generators twist the airstream on the wing surface. Doesn't this kind of twisted airflow ... 13 votes 2answers 30k views What is the method to calculate a finite wing's lift from its sectional airfoil shape? I am struggling to get my head around a concept that I believe should be fairly simple to understand. Lift versus drag and AoA data of many airfoils are freely available, for instance the NACA 4-... 13 votes 2answers 6k views What is the actual air speed over and under a wing due to Bernoulli's Principle? Bernoulli's Principle states that as a fluid speed increases, its pressure decreases, and vice versa. Air flowing over the wing of an aircraft flows faster than its neighboring air flowing under the ... 12 votes 5answers 5k views Could propeller wash provide sufficient lift to take off - even in theory? I know this seems a crazy thing to ask but it is not the same as lifting oneself by the bootstraps. If you try to lift yourself that way, there are two equal and opposite forces, yet there are ... 12 votes 2answers 2k views Why do the outer parts of wings generate less lift? In this Wikipedia page it says: Constant chord: parallel leading & trailing edges. Simplest to make, and common where low cost is important, e.g. in the Piper J-3 Cub but inefficient as the ... 11 votes 3answers 2k views What are the physical laws for upscaling an RC model to 1:1? What are the laws of physics for upscaling an RC model from a smaller to larger scale or even to a full sized 1:1 aircraft? I guess the basic thing may be lift/weight ratio which was nicely described ... 11 votes 3answers 3k views How is lift provided by a wing affected by propeller wake? Does the lift of that section of the wing which is in the wake of the propeller increase (because the airspeed in that section is higher)? If yes, is this fact used actively to improve the lift ... 11 votes 1answer 18k views How to calculate the Lift Coefficient for the A320? I'm trying to figure out the lift coefficient of an A320. What I'm doing is the following: during cruise, the lift is equal to the weight of the aircraft ($mg$) so that I used the cruise table taken ... 10 votes 4answers 9k views Do any aircraft out there use negative lift? I think negative lift is where high pressure forms on the top of the wing instead of the bottom. I know that Indy cars use negative lift and some sports cars do, but do any aircraft exist that use ... 10 votes 3answers 12k views What is the lift force per unit span? I got Aircraft Design: A conceptual approach for Christmas, and I'm having a hard time with lift coefficients because I honestly have no idea what "lift force per unit span" means, so can someone ... 10 votes 3answers 663 views Why don't smaller powered airplanes have better lift-to-drag ratios? Many airliners have LDRs near 20, and it sounds like the electric Eviation Alice may have an LDR of 24 at 240 kts, but many small planes typically have LDRs of only 8-10. It seems like they could ... 10 votes 3answers 4k views What is the physical meaning of circulation found in Kutta condition? The Kutta–Joukowski theorem is applicable for 2D lift calculation as soon as the Kutta condition is verified. When this is the case, there is a circulation $\small \Gamma$ around the airfoil. My ... 10 votes 1answer 9k views Does lift coefficient vary with the wind velocity for a given angle of attack? I have this question in my mind. I have been trying to look for this in different books about aerodynamics and I couldn't find the answer. I know I could check the answer experimentally, if I had a ... 10 votes 2answers 1k views Why do delta wings generate less lift at a particular angle of attack compared to straight wings? I simulated a delta wing and a straight wing in xflr5 with the same profile, wing area and airspeed (very low airspeed. around 10 m/s. it's for a model aircraft). The straight wing was operating at ... 9 votes 4answers 2k views If an elliptically-shaped aerofoil gives the optimum lift distribution, why aren't propeller blades designed around this ideal? So given an elliptical lift distribution is the most efficient, why are propellers not designed around this? Props aren't affected by the adverse stall characteristics that concern a "main", ... 9 votes 4answers 17k views What are the differences between air brakes, spoilers and lift dumpers? So many people use these words interchangeably, but after a little searching on Google, I found they are not quite the same thing. All the links I read explain things in a misleading way which pushed ... 9 votes 3answers 1k views How did the F28 have such a good L/D ratio? The second link given on a Google search for "Breguet Equation" is to a PDF document from MIT. On page 7 of this document is a chart showing L/D ratios for various commercial aircraft (turboprop, ... 9 votes 1answer 811 views Which books should I study to understand more about Supercritical airfoils? I want to understand the theory behind supercritical airfoils and all the details about them. It would be nice if I could get a standard supercritical airfoil, its experimental Cl, Cd data in the ... 9 votes 5answers 912 views Do most commercial jets have a negative lifting body? I took a look at some example airfoils and noticed they all seem to have a downward hook at the end. I believe this draws the air downwards, creating a reaction force upwards: lift. Now here is a ... 9 votes 2answers 907 views How do helicopters handle P-Factor? Propeller-powered aircraft have a "problem" called P-Factor, where the descending blade of the prop is generating more lift (a.k.a. thrust) then the ascending blade due to a higher angle of attack ... 9 votes 1answer 670 views What is the best combination of airfoil shape for flight in ground effect over water? What is the best airfoil shape for flight in ground effect over water? 8 votes 4answers 3k views How does speed affect lift? I understand the lift coefficient shown above. But does lift increase with speed, and how? I understand I can't apply this to the graph as it is a coefficient, but if I had an angle of attack of 10 ... 8 votes 5answers 11k views Where can I find data tables for lift and drag coefficients of airliners? I'm teaching an introductory course in fluid dynamics and I'd like to show some "real" data regarding drag and lift forces on an airfoil. It is easy to find data on the geometry of typical airfoils, ... 8 votes 1answer 3k views What is the aerodynamic centre and how does it relate to the pitching moment? Okay so I have been trying to get my head around the Aerodynamic centre and the Pitching moment. Wikipedia really isn't helping much but from what I can gather the Pitching moment is a force caused by ... 8 votes 3answers 4k views Is the low air pressure on top of the wing the major contributor to lift? I am kind of old time flyer. Started to fly with those primitive hang-glides with titanium frame and the yoke control, around 1966 and then after a few close calls and getting older I switched to ...
https://aviation.stackexchange.com/questions/tagged/lift?tab=Votes
Fall is in the air, and it’s time to plan an excursion to enjoy the best leaf viewing hotspots. Plan to get outside when the forests reach their pinnacle of colour, usually around the beginning of October. Not sure where to go to take in nature’s splendour? There is no shortage of nature destinations, scenic drives, hiking trails and wonderful walks in Hamilton Halton Brant. - 1 Royal Botanical Gardens, Burlington Experience Carolinian forest in its colourful fall cloak along Royal Botanical Gardens 27 kilometres of walking trails that include over 20 lookouts, 7 boardwalks and 21 stream crossings. You’ll want to hike both in the Arboretum and along the nature trails. Although leaf viewing choices here are almost endless, don’t miss the Rock Garden in autumn. This unique spot for uncommon perennials, flowering conifers, Japanese maples, ornamental flowering trees and water features displays remarkable fall colours and fantastic textures in the form of berries, seed heads and the colourful foliage of trees and shrubs. A different type of colour adorns the garden beds at Laking Garden, where irises pop up on the Lower Terrace and autumn crocus and lily-of-the-field make their way out of the ground, marking the borders of the garden in pink and yellow. Vines, trees and perennials also provide fabulous interest in Hendrie Park. RBG posts fall colour reports and provides a blooms calendar on its website to help you time your visit. - 2 Fall Waterfall Wonder Explore some of the hiking trails along the Niagara Escarpment to discover fall waterfall wonders surrounded by beautiful changing foliage. Through November, Spencer Gorge Conservation Area, which is home to Tew Falls and Webster Falls and the stunning Dundas Peak, will offer reservations for two-hour hiking windows. Reservations must be made online in advance. Not too far away, you can find Hilton Falls Conservation Area in Burlington, which is home to another spectacular waterfall. Online reservations are also required here for fall visits. - 3 The Rural Roads of Waterdown and Dundas These picturesque towns boast quiet, tree-lined streets that merge into driver-pleasing countryside, with cafés, gourmet shops and farms beckoning along the way. Take Snake Road, a winding, tree-canopied dream for drivers and cyclists that starts in Burlington and leads you to Waterdown. Consider a stop at Dyments, a pumpkin patch and farm market in Dundas that sits just past the crest of Sydenham Hill with epic views from the top of the Niagara Escarpment. If you need a warm-up from the autumn chill, Detour Café offers great brunches and the city’s best coffee, located in the heart of Dundas’s quaint retail strip. Read our Fall For Dundas and Ancaster article for more stop suggestions. - 4 The Niagara Escarpment and Bruce Trail, Halton Fall-coloured trees make a walk on the Bruce Trail and Niagara Escarpment extra enjoyable. The conservation areas of Halton and the Credit Valley are perfect spots to access these famous natural wonders. Experience the Niagara Escarpment’s cultural heritage at Limehouse Conservation Area in Halton Hills. Seeing the vibrant red, yellow and orange leaves in one of the last old-growth forests in Ontario is a “natural.” The Bruce Trail and its side trails here take visitors through a variety of Escarpment landscapes. Head to its geological heart at an area known as the “Hole in the Wall,” where ladders cut through fissures in the Escarpment rock. Terra Cotta Conservation Area is a trail lover’s paradise with a variety of trails that run through the forests, fields, lakes and ponds of the Niagara Escarpment’s surroundings and let you experience natural settings close to urban and rural developments. Spanning roughly one hundred square kilometres across and near the Niagara Escarpment, Rattlesnake Point has bold-faced cliffs, 13 kilometres of trails, and lots of scenic views and lookout points to populate your Instagram account with fall foliage photos. - 5 Eramosa Karst, Stoney Creek If you’re looking for an exciting natural adventure on your hunt for fall foliage, head to Eramosa Karst Conservation Area. Filled with underground caves and streams, meadows and forest, it is also home to what is believed to be the largest number of unique karst features in any protected area in the province. Trails, boardwalks and bridges encourage exploration of unique geological formations, including a natural dolomitic limestone bridge and Ontario’s tenth-largest cave. On the outskirts of Stoney Creek, this special watershed area has four kilometres of trails to explore this autumn. - 6 The Grand River, Brant Canoe, kayak, or raft the Grand River and enjoy the fall-painted leaves of the surrounding Carolinian forest. Grand Experiences and Grand River Rafting are all great local outfitters that will provide your group with the expert guidance and gear you need for a memorable trip. The 2-kilometre Six Nations of the Grand River Nature Trail in Ohsweken takes hikers on a journey through Carolinian forests and is an excellent option for young hikers. Interpretative signs along the route help create an appreciation for the largest single block of Carolinian woodland in Canada. Find new ways to stay and play in Hamilton Halton Brant this fall. Explore available experiences, grab some Stay & Play PERKS, take advantage of special offers and discover the amazing events that will be taking place while you’re in town. Stretch your fall fun out a little longer with our StayTripping hotel offers and receive a $50 or $100 VISA gift card!* *Please note – VISA gift cards are a limited offer – while quantities last.
https://theheartofontario.com/article/top-6-places-for-fall-foliage/
Last week, I mused over themes of darkness and light in Tolkien’s works, linking them to the prevailing theme of light overcoming darkness that we recognize during Advent. This week, I move to the two themes represented by weeks one and two of the traditional Advent wreath: hope and faith. Hope and faith are underlying in discussion of the conquering of darkness and evil; when faced with the harsh realities of the world and the evil in it, any anticipation for good seems fanciful, almost foolish. Yet, we keep going, wishing for more, greater, and better things to come. “Gandalf put his hand on Pippin’s head. “There never was much hope,” he answered. “Just a fool’s hope, as I have been told.”The Return of the King Themes of hope and faith run rampant throughout The Lord of the Rings trilogy. Darkness has been building since the days of The Hobbit, with the ever-watchful Gandalf almost solely reading the signs that evil was coming again. He bides his time for many decades, trusting in the knowledge of those greater than himself (Saruman), before beginning to take action: seeking out the lore of Gondor, enlisting the aid of Aragorn and the Rangers of the North to protect the Shire, traveling far and wide to learn all he could that might help them in this trial. Still, it is left almost too late. By the time Frodo sets out for Rivendell, Sauron has already made his move, sending the Black Riders searching for the place called The Shire and the man named Baggins. What might have been an easy journey a few months earlier has became an errand of urgency and danger. Still, hope remains. Frodo and his companions meet Aragorn and so come in time to Rivendell for the beginning of what will become a great quest. ‘”Strider!” I cried, shouting for joy. ‘”Yes, sir, I am afraid so, sir,” said Butterbur, mistaking me. “He got at them, in spite of all that I could do, and they took up with him. They behaved very queer all the time they were here: wilful, you might say.” ‘”Ass! Fool! Thrice worthy and beloved Barliman!” said I. “It’s the best news I have had since midsummer: it’s worth a gold piece at the least. May your beer be laid under an enchantment of surpassing excellence for seven years!” said I. “Now I can take a night’s rest, the first since I have forgotten when.”The Fellowship of the Ring From its very beginnings, the tale of Frodo and the Ring bounces back and forth between despair and hope; fear and faith. Moments of fear and despair seem never to end: from the trappings of the Barrow Downs to the Sacking of the Prancing Pony to the stabbing at Weathertop – and all before Frodo reaches Rivendell. But faith and hope always follow. Frodo’s faith that Tom Bombadil will come when called; the Hobbits’ faith that Aragorn was true and would protect them from harm if only they abided his advice; Glorifindel’s faith that his horse and the magic of the Elves would safely guide Frodo away from the Nine. Faith and hope seem always to be rewarded. As the story continues, the circumstances grow ever darker; consequently, faith becomes harder and hope’s provision feels sweeter. “The world is indeed full of peril, and in it there are many dark places; but still there is much that is fair, and though in all lands love is now mingled with grief, it grows perhaps the greater.”The Fellowship of the Ring The company meets its first big challenge when passage across the mountains becomes hindered by spies and a cruel Caradhras and Moria becomes the only option. A sense of foreboding accompanies their travels, ultimately culminating in two dreaded events: the injury of Frodo (unto death, it is assumed) and the defeat of Gandalf against the Balrog. In both of these instances, hope is crushed. Both the Ringbearer and their leader are assumed to be lost to them. But it returns. Frodo lives, much to the surprise of all the company. His hope, it is found, lies beneath his clothes. Gently he stripped off Frodo’s old jacket and worn tunic, and gave a gasp of wonder…. The silver corslet shimmered before his eyes…. Carefully he took it off and held it up, and… the sound of the shaken rings was like the tinkle of rain in a pool…. ‘Here’s a pretty hobbit-skin to wrap an elven-princeling in! If it were known that hobbits had such hides, all the hunters of Middle-earth would be riding to the Shire.’ ‘And all the arrows of all the hunters in the world would be in vain,’ said Gimli…. ‘It is a mithril-coat. Mithril! I have never seen or heard tell of one so fair. Is this the coat that Gandalf spoke of? Then he undervalued it. But it was well given!’ ‘I have often wondered what you and Bilbo were doing, so close in his little room,’ said Merry. ‘Bless the old hobbit!’….The Fellowship of the Ring The company sets off for Lothlorien, hoping for shelter and protection amidst the Elves. Though they bear many burdens and share terrible news, their time in Lorien heals some of their hurts and prepares them for the next stage of their journey. Though hope in the quest’s success is not fully restored, the words and gifts of Galadriel and Celeborn grant them the courage to move forward. And, as it turns out, their time there plays a role in yet a bigger hope to be restored. Galadriel and Celeborn are greatly distressed to hear of Gandalf’s fall to the Balrog. Galadriel, however, does not let it end there. When Gandalf returns in The Two Towers, he shares his story, ending with Gwahir’s arrival at the top of the mountain, where he lay naked and exhausted. “Do not let me fall!” I gasped, for I felt life in me again. “Bear me to Lothlórien!” ‘”That indeed is the command of the Lady Galadriel who sent me to look for you,” he answered. ‘Thus it was that I came to Caras Galadhon and found you but lately gone. I tarried there in the ageless time of that land where days bring healing not decay. Healing I found, and I was clothed in white. Counsel I gave and counsel took.’The Two Towers The hope of Galadriel and Gandalf lead to the return of Gandalf as a Maiar even stronger than he had been before: Saruman as he should have been. The fellowship is rightfully thrilled to have their leader back and Gandalf is able to continue work in his great task; indeed, that is the sole reason for his return – to defeat the darkness threatening Middle Earth. Upon finding Aragorn, Legolas, and Gimli, he turns his attention to Rohan, which is floundering under a poisoned King Theoden. Gandalf the White brings light into the darkness of Rohan, returning Eomer to his rightful place, bringing counsel, and giving the Rohirrim hope that they can indeed stand against the forces striving against them. Their defeat of Saruman’s orcs (aided in part by the rousing of the Ents brought about by the hope of Merry and Pippin) spurs the people of Rohan into further action against Sauron, encouraging them to march to the aid of Gondor. ‘Now Théoden son of Thengel, will you hearken to me?’ said Gandalf. ‘Do you ask for help?’ He lifted his staff and pointed to a high window. There the darkness seemed to clear, and through the opening could be seen, high and far, a patch of shining sky. ‘Not all is dark. Take courage, Lord of the Mark; for better help you will not find. No counsel have I to give to those that despair. Yet counsel I could give, and words I could speak to you. Will you hear them?… I bid you come out before your doors and look abroad. Too long have you sat in shadows and trusted to twisted tales and crooked promptings.’…. ‘It is not so dark here,’ said Théoden.The Two Towers But let us back up a bit. Prior to learning of Gandalf’s return, hope fades further in the death of Boromir, the capture of Merry and Pippin, and the severing of the fellowship as Sam and Frodo leave the others for Mordor. The hunters pursue the pack of orcs relentlessly, expecting little, but carrying on nonetheless. News from the Rohirrim that the orcs had been slaughtered nearly dashes that hope completely, but refusal to give up entirely leads them into Fangorn, where they meet Gandalf. Meanwhile, Merry and Pippin endure torture at the hands of the orcs, hoping for some salvation from their friends, leaving trails in hopes that they are being tracked, but, in the end, finding it in the weapons of the Rohirrim, and then, the arms of an Ent. Treebeard takes them in, providing them with shelter and sustenance. The nigh unwavering hope of the Hobbits is rewarded. And also they bring hope. Treebeard, having lived many, many ages, seems almost resigned to a fading Fangorn Forest and a fading race of Ents. But, with the news that Merry and Pippin bring, alongside their ever present faith in good, Treebeard is roused and the Ents march to war against Saruman, throwing down the walls of Orthanc, filling its pits with water, and wreaking destruction on his machinery and combatants. The downfall of Orthanc, as well as the recapture of the Seeing Stone Saruman has been using to communicate with Sauron, casts glimmers of hope that this war can be won. Sauron’s eye is drawn away for a time, giving Frodo and Sam the opportunities they need to sneak closer and closer to Mount Doom. Frodo and Sam, meanwhile, are enduring harsh, unhopeful circumstances of their own, attempting to find a way to Mordor. The weight of the ring bears mightily on Frodo, who has just enough faith to possibly finish the job; but very little for what should come after. Samwise, however, his hardy, unwavering gardener, approaches the situation as any good gardener would: he knows that darkness is needed before light. He knows that what you can’t seen in the darkness can grow to bounty. He knows that it takes a bit of faith. “‘I’m afraid our journey is drawing to an end.’ ‘Maybe,’ said Sam; ‘but where there’s life there’s hope, as my gaffer used to say; and need of vittles, as he mostways used to add.'”The Two Towers The reward for that hope is varied. Firstly, in the appearance and capture of Gollum/Smeagol who, due to his long possession of the Ring, can be bound as their guide by it: the one creature in Middle Earth who would rue its destruction to the level of Sauron, bound to aid in its undoing. Frodo, remembering the words of Gandalf, understands Gollum to some degree and never quite gives up the hope that he could change. Amidst Sam’s suspicions , Frodo shows kindness to Smeagol whenever possible, strengthening the bond between them as Master and Servant and, in some ways, ensuring that Smeagol will be faithful to his promise for as long as possible. Despite all suspicions, and even treachery, it is only with Smeagol’s aid that Sam and Frodo reach Mordor, first at the Black Gate and then via Cirith Ungol. Their second reward is found in the men of Gondor and specifically in Faramir, Boromir’s brother. Remembering Boromir’s treatment of Frodo and his pursuit of the Ring for his own, there is suspicion of Faramir also. The Hobbits know not what will happen to them when they are found by him in Ithilien, searching for Cirith Ungol. Still, sensing an air of knowledge, “like a wizard,” in Faramir, they put their faith in him and are rewarded with shelter for the night, a hearty meal, provisions, and, perhaps most importantly, the good will and friendship of good men. The meeting of Faramir marks Frodo and Sam’s last encounter of friendship and last sense of comfort before the final stretch into Mordor begins. Through this meeting, some faith is restored and they are able to begin their final journey into darkness, not knowing what was to follow. “‘It was said to me by Elrond Halfelven that I should find friendship upon the way, secret and unlooked for. Certainly I looked for no such friendship as you have shown. To have found it turns evil to great good.'”The Two Towers Tolkien’s story is one where hope often comes unlooked for, yet is never quite lost. As Samwise muses, in his steadfast Hobbit way, hope is not turning away, despite how dark it may seem. It is represented in each and every race: in the Hobbits, who can turn from despair to joy in moments; in the Elves, who endure ages of waning while awaiting Aman; in the Dwarves, who delve for beauty in the darkness; in Men, who continue to protect and build kingdoms for good. It is not represented as an idle emotion, as we so often think of it today, when “hopes and prayers” are criticized for their inactivity and insincerity. Rather, it is fuel for action that shakes loose the bonds of darkness and decay and leads, in the end, to light.
http://christinsanders.com/2019/12/14/advent-and-jrr-tolkien-hope-and-faith/
Award-Winning Student Papers The SOCAN Foundation/ MusCan Awards for Writings on Canadian Music are two $2500 prizes intended to encourage students’ research and writing on Canadian music topics and music professors’ mentorship of students in these endeavors. One prize is for the best English-language paper and one for the best French-language paper. Topics in Canadian music will be understood as potentially deriving from a wide range of genres, including, but not limited to, such areas as concert, folk, jazz, and popular music. All of the winning papers may be found by following the links below. A summary of all previous winners may be found by following this link. The Canadian University Music Society gratefully acknowledges the generous financial support of the SOCAN Foundation in the awarding of these prizes. - Details - Written by Troy Ducharme - Category: Award-Winning Student Papers - - Hits: 86 Carolyne Sumner, "Musical Networks and Cultural Expression in Canada: The Postcentennial Years" This paper investigates the development and outcomes of musical networks during the postcentennial period (1968-1982). While scholars acknowledge the celebration of Canada’s Centennial as a time of significant musical growth (Dixon 2004; Keillor, 2008), few have investigated how these circumstances changed drastically in the postcentennial period. Through a cultural-historical analysis of relevant archival materials located at Library and Archives Canada, this paper surveys the various socio-political and technological transformations which informed concepts of cultural value and policy in the period leading to and following Centennial. It considers the ramification these changes had upon the networks forged by art music composers at this time. At stake was the audibility, integration, and success of Canadian composers, and their ability to foster thriving professional networks. By illuminating the complex musical webs which informed Canada’s musical landscape at this time, this paper sheds light on a crucial, yet overlooked, period of Canadian music history.
https://muscan.org/en/publications/award-winning-student-papers
Hypertension, also known as high blood pressure. It is a serious, chronic health problem related to the pressure or the force exerted by the blood against the walls of the blood vessels. It is quite common in today’s lifestyle and affects nearly one billion people worldwide.There are two main types of Hypertension: - Primary Hypertension - Secondary Hypertension. The main factors responsible for the Hypertension includes obesity, family history and other lifestyle factors. It is a risk factor for cardiovascular disorders. Controlled blood pressure reduces the risk of strokes, heart attacks, heart failures, etc. It can be managed by a number of ways such as physical exercise, reduction of stress, medications, etc. Hypertension Causes Hypertension can be caused due to: - Diabetes - Kidney problems - Cushing syndrome - Hyperthyroidism - Pregnancy - Obesity - Adrenal hyperplasia Symptoms of hypertension The common symptoms of hypertension include: - Dizziness. - Chest Pain. - Heart attack. - Headaches. - Bleeding Nose. - Visual Changes. - Shortness of Breath. - Flushing or Blushing. - Narrowing of blood vessels. - Formation of plagues in the blood vessels. These were a few common symptoms of Hypertension. There are few treatments and medications available to cure, control and reduce the level of blood pressure. Combinations of healthy diet, regular physical activities, and maintaining a healthy weight are few Healthy lifestyle changes, which can help an individual to control the factors that cause hypertension. There are major complications of hypertension if it is left untreated and they include heart diseases, loss of visions, fluid buildup in the lungs, damage to the kidney and other organs failure. Hypertension Prevention Hypertension or high blood pressure can be prevented by following a heart healthy diet. This includes: - Reduce salt intake - Avoid consuming alcohol - Consume more fruits and vegetables - Avoid calories rich food Stay tuned with BYJU’S to know more about the Hypertension, its symptoms and risk factors.
https://byjus.com/biology/hypertension-symptoms/
JOB DESCRIPTION: Duties: Prospect, develop and maintain station accounts, pursue and develop new business; follow through on production for new business clients; establish and maintain customer relationships; other duties as assigned by manager. RESPONSIBILITIES: REQUIREMENTS: Education: College degree in related field or equivalent work experience is required. Skills: Excellent written and verbal communication skills required; proven sales success preferred; strong problem solving and organization skills; high work ethic, integrity and standards; ability to meet deadlines and detail orientation; must be motivated to build customer loyalty and have a propensity for prompt follow-through to customers; self-starter with sense of urgency; creative and customer focused; ability to interact and influence others in a positive manner while learning and working in a fast-paced, successful team environment; computer proficiency. Experience: Prior sales and marketing experience required; emphasis in broadcast media preferred. HOW TO APPLY: Send resume and cover letter to:
https://broadcastersvirtualjobfair.com/g_job.php?id=16257
You can use it for many word games: to create or to solve crosswords, arrowords crosswords with arrows , word puzzles, to play Scrabble, Words With Friends, hangman, the longest word, and for creative writing: rhymes search for poetry, and words that satisfy constraints from the Ouvroir de Littérature Potentielle OuLiPo: workshop of potential litterature such as lipograms, pangrams, anagrams, univocalics, uniconsonantics etc. Hooks significantly slow down computer systems because they increase the amount of processing that the system must perform for each message; therefore, they should be installed only when necessary. I got the hook-up on that cell phone you wanted. Phrasal Verbs: hook up To assemble or wire a mechanism. When you met him on Tinder were you initially thinking of this as a hook-up or a relationship? A free trial is a good way to hook customers. In the morning we hooked up the team and went down to the lake. He had gotten hooked on cigarettes in his youth.
http://airkhruang.com/hook/definition-of-the-word-hook-up.html
Travelling on French roads has never been safer with government figures released on Monday showing a record drop in the number of fatalities last year. In 2013 the number of deaths on roads in France fell by 11 percent, Interior Minister Manuel Valls announced on Monday, meaning the number of fatalities is at its lowest level since 1948, when data was first recorded. The 11 percent drop represented the equivalent of 400 lives saved when compared to the data for 2012. In total there were 3250 fatalities on French roads last year. The rate of fatalities has been falling gradually since 1972, a black year on France's roads when 18,000 people were killed. 2013 saw a drop in deaths for most forms of transport, with the biggest fall seen for car passengers (14 percent); motorcyclists (3 percent); cyclists (8 percent) and deaths among pedestrians on roads also fell by 7 percent. Valls had vowed to improve France's checkered road safety record, when the Socialist government came to power in 2012. He has taken various measures to improve road safety including rolling out new mobile speed cameras and cutting speed limits on roads including the notorious périphérique. Valls has said a nationwide lowering of the speed limit was "unavoidable". The minister envisages cutting the limit on French motorways from 130km/h to 120 km/h and on other national roads from 90 km/h to 80 km/h. Last year he also called for the introduction of airplane style black boxes to be installed in cars. At the annual Road Safety Council meeting in Paris, Valls announced he would ask experts to consider a plan to install “black box” recorders in French vehicles, with the aim of reducing deaths on French roads. The term 'black box' is used to refer to the Flight Data Recorders installed on all aircraft which record information that can help investigators determine the cause of a crash. Valls sees no reason why the same technology cannot be made available to the automobile industry. “Obviously these instruments wouldn’t be called on to make a record of a driver’s movements, but simply so we could know the technical events that take place in the seconds leading up to an accident,” said Valls. In a further measure to improve safefty police in Paris announced that they would be doubling the number of speed cameras on the ring road. According to authorities, one in every two accidents on the périphérique is caused by speeding drivers.
https://www.thelocal.fr/20140120/driving-france-sees-record-drop-in-road-deaths
Traditional quantitative risk assessment techniques based on empirical data are usually not suitable for estimating or managing risks during critical, isolated operations. In many cases, the application of Barrier Management principles, e.g. by using bowtie diagrams, will provide improved and more relevant decision support for managing major accident risk. The traditional way of describing risk in an analytic context is probability times consequences. This approach to defining risk is narrow and may not be optimal to manage activities and enterprises. As an alternative, risk can be defined as the possible consequences of activity including the associated uncertainty. A critical isolated operation in this context is typically recognized by the following three characteristics: There are significant uncertainty and limited relevant empirical data associated with the operation; It is regarded outside normal/standard operation(s); There is one or more major accident hazard(s) associated with the operation. An example of a critical isolated operation is heavy lifting operations close to critical assets or position-sensitive vessel operations. A major accident is typically a complex chain of events involving a breach/impairment of multiple safeguards (safety barriers). Norwegian Petroleum Safety Authority (PSA / PTIL) defines a major accident as: An acute incident, such as a major discharge/emission or a fire/explosion, which immediately or subsequently causes several serious injuries and/or loss of human life, serious harm to the environment and/or loss of substantial material assets. Qualitative or semi-quantitative approaches such as Hazard Identification (HAZID), Hazard and Operability (HAZOP), Simultaneous Operations (SIMOPS), etc. are used as the main risk assessment methods for managing risk for operations. Such approaches are suitable for identifying and controlling large sets of specific hazard scenarios. However, these assessments are typically focusing on direct cause-consequence relationships, and do not assess the role of specific safeguards in a chain-of-event scenario. In many cases, the application of Barrier Management principles, e.g. by using bowtie diagrams, will provide better and more relevant decision support concerning the management of major accident hazards for operations. Barrier Management in this context is founded on PSA’s regulations and supporting documents, e.g. the Barrier Memorandum from 2017. PSA defines Barrier Management as: “Coordinated activities for establishing and maintaining barriers so that they fulfill their functions at all times.” Figure 1 Key point in barrier management, Ref: PSA Barrier Memorandum from 2017 The Barrier Management approach intends to strengthen the knowledge of the barriers and reduce uncertainty in barrier performance. This is achieved by establishing frameworks and initiating activities to ensure that the barriers function as intended, i.e. establishing barrier strategies for the operation. Such barrier management principles are widely used as a tool for managing major accident hazards for the asset operational phase, but less commonly used as a tool for managing such hazards associated with critical isolated operations. Application of Barrier Management involves hazard identification and barrier analysis. The purpose is to identify the required barriers and to reduce the uncertainty by defining a framework to verify barrier performance. Typically, a workshop is arranged to both identify major accident hazards and define barriers. Further, cross-functional team collaboration is recommended to determine the required barrier functional requirements as part of the barrier strategy. Figure 2 Example of a bowtie diagram, Ref Bow-Tie XP from CGE Risk The Barrier Management approach is intended to improve the risk decision support by reducing uncertainty. Risk acceptance has to be evaluated based on the potential consequences of the activity and the uncertainty involved. This can be challenging and needs to be considered on a case-by-case basis. ALARP (As Low As Reasonably Practicable) principles should always apply. Risk matrices or similar can be used as support, but ultimately, the decisions should be founded on the strength of knowledge associated with the barrier performance. ORS Consulting is supporting stakeholders in multiple sectors with barrier management using appropriate barrier management tools. Do you think your company could benefit from a barrier management approach to increase the knowledge of barriers and reduce the risk of uncertainty during critical isolated operations? For more insight about barrier management, visit Barrier management for subsea tie-back projects, How to get bow tie assessments right, and Lessons Learned: Barrier Management for Aquaculture in Exposed Areas or contact us.
https://www.ors-consulting.com/how-to-use-riskbased-decision-support-for-critical-isolated-operations
Some animals are not content to stick to a single phenotype; these species, known as polymorphs, contain in their molecular blueprint the tendency to express two or more forms across a population, an ability largely unconstrained by epigenetic variables but still subject to selective forces that determine their relative frequency of occurence. Such variations, which affect one or both sexes to a random degree, may simply involve a markedly different colour pattern, longer appendages or sturdier proportions. They can also encompass subtler properties that affect one's ability to digest particular foods, resist certain parasites or mimic sympatric hosts and models. But even simple contrasts, between light and dark, or plain and peppered, can tilt the scales of survival towards individuals that find themselves born into an environment skewed in their favour. How the die is loaded may shift with the seasons or swing to the tune of industrial forces, with the victims serving as trade-offs of a predilection for genetic hedging that preserves the resilience of a species or accelerates its division at the cost of otherwise fit representatives who grow up in the wrong time or place. Without the benefit of a full series of specimens from different localities, members of a single polychromatic taxon can at times be mistaken for distinct species. This was the case of a small dragonfly that lives in waterlogged portions of Southeast Asian jungles. In 1878, a Viennese entomologist named Friedrich Moritz Brauer described Orchithemis pulcherrima, a libellulid with a bright orange-red abdomen, from specimens collected from the southern tip of the Malay peninsula. In the same year, by chance or competition, Baron Michel Edmond de Sélys-Longchamps, a Belgian odonatologist, christened an insect of like build but with a largely black abdomen Calothemis exsudans, based on types from Singapore and Java. Subsequent comparisons yielded no discernible structural differences between the two and the junior binomial was duly expunged. The variable sentinel thus challenges collectors of virtual specimens with a quintet of adults: males in red or blueish black plus females in dark hues as well as andochromatic colours. What determines the donning of one suit over another is unknown, but for some reason, swarthy males and scarlet females are scarce compared to their counterparts. Confined to protected clearings and dense margins in shaded woods, these dragonflies are easily distinguished from other erythraeus libellulids by their broad, flattened abdomens and slim wings, which are nearly in equal in width. Settling on low vegetation by cool waters, the males defend their territories with chlorocyphid-like face-offs and fluttery swoops before returning to their posts. Little else, save passing appetites, relieves these sentinels from their turf, for their hunting grounds, soft, sick and stable only to feet of unbearable lightness, resist intrusion and ring their guardian spirits with stockades of thorns and the sinking tread of a fey swamp thing.
https://budak.blogs.com/the_annotated_budak/2012/09/index.html
Western philosophy has provided two main metaphors for the nature of the world: the world as organism and the world as machine. The idea of the world as organism was presented boldly by Plato in his Timaeus, suggested by Spinoza and the Pragmatists, and boldly put forth in a new form by Alfred North Whitehead in his Process Philosophy. The world as machine is suggested by the Greek atomists and taken up boldly by Western science, where it underlies much of the reductionist methodology. The Judeo-Christian tradition, which considers the world to be God’s handiwork, is considerably closer to the idea of the world as machine than as organism. If we travel eastward, the Tao of Taoism is much closer to the metaphor of organism. In the mechanistic view, the world is comprised of matter that is “self-sustaining, externally related, valueless, and without an intrinsic principle of motion.” Organisms, on the other hand, are “interdependent, internally and externally related, value-laden, and intrinsically active.” (1) We know for sure that organisms exists, for we are organisms. So if the mechanistic view of matter is correct, how do we get from the set of modifiers used in the mechanistic view to that of organism? For many, the answer that first comes to mind is Darwinian evolution. But this cannot be the full answer. Darwinian evolution begins with the beginnings of life and life in any sense we know it requires rather special conditions. If we accept the Big Bang as the starting point, a considerable amount of organization already has to occur before life and its evolution can begin. At a minimum, a dependable, long-lasting energy source is required – in other words a star. Also, a variety of elements are needed, which means that we need more than one generation of stars – a first generation of stars is needed in which hydrogen is molded into heavier elements. After this another generation of stars is needed that include this collection of heavier elements. For all this to happen, galaxies have to be something more than a random collection of stars, they have to be a system or even an ecology. (2) Clearly, Darwinian evolution is not responsible for the organization of galaxies and solar systems. Yet we have to account for such organization to understand how we can get from the modifiers of the mechanistic view to that of organism. Here I would like to suggest an answer, one compatible with both the mechanistic metaphor and the organism metaphor. To say that matter is valueless would seem to be about the least controversial statement we could make about matter. But it is precisely this statement that needs to be questioned if we are to form a bridge between the modifiers of mechanism and organism. All matter is attracted to other matter. This is called universal gravitation. Gravity is, of course, a purely mechanistic force, but for the sake of argument, let’s call this attraction that matter has for other matter its “preference” for other matter. This doesn’t imply that this “preference” is anything like the preferences of organisms, such as the way I have a preference for ice cream. But I would like to suggest the possibility that such a “preference” might be the first pier of the bridge that connects valueless matter to valuing organism. That matter “prefers” to be with other matter is absolutely essential to their being stars and galaxies. If all matter were completely neutral in regard to such preferences, matter would simply have drifted randomly apart into the great reaches of space. There would be no light in the world, and the only warmth would be a tiny amount left from the Big Bang, which would be unnoticed and unmeasured. Matter’s preference for other matter means that matter moves toward other matter, and this leads to the formation of the large masses of matter we call stars. So if stars are an essential step to take us from the modifiers of the mechanism metaphor to those of organism, the gravitational “preference” is a primary requirement. Gravity is one of the four fundamental forces of the standard model. Electromagnetic energy, another one of the forces, has a more complicated set of “preferences.” Using our terminology, electrons have a “preference” for protons, but a “distaste” for other electrons, and vice-versa for protons. Electromagnetic energy is the energy of life – it provides the chemical bonds that give our body shape, the heat of our metabolism, the strength of our muscle, and even the coordination of signals in the nervous system that we experience as awareness and thought. So if the preference we call gravity is the first pier that sets up the conditions where life can arise, the “preferences” of electromagnetic energy are the second pier that sets life in motion. From this second pier, we can now call upon Darwinian evolution to add its span to the bridge that connects our two sets of modifiers. There is a great deal more detail to all this, but hopefully this brief sketch makes the point that matter’s non-neutrality, which I have called its preferences, is essential to getting us from valueless matter to valuing organism. But now I would like to start from the other side, with valuing organism, and project back toward valueless matter. Imagine a situation where a large group of strangers from all over the world have been stranded together in some large arena. When we first encounter this group, we see only individuals wandering alone, with little connection to others. But as time goes by, these individuals will start to find other individuals that they want to be with. Clusters of people who speak the same language or who are from the same country or community are likely to form first. Once the people have clustered into groups, occasionally people will wander from one group to another. The recurrence of original situation with just lone individuals wandering around, however, is highly unlikely. In general, people have a preference to be with other people, just like all matter has a preference to be with other matter. Here I would like to suggest that the process whereby this group of people formed into clusters has something in common with the process by which matter forms into stars. This is a process of self-organization, and what all self organizing processes have in common is that the elements that comprise the entity that is self-organizing have “preferences.” It is the types and strengths of these preferences that determine the characteristics of the resulting organization. Types of Organization The notion of self-organization is a relatively new idea in the Western world. The first clear-cut example of it that I can find is Adam Smith’s idea of the hidden hand of the markets. In Smith’s view, markets form wherever people with a surplus of some product meet up with people who have a surplus of other products, and where these people would “prefer” to have some of the other’s people’s surplus more than they want to retain their own surplus. In other words, markets self-organize out of people’s preference to have a variety of goods. In self-organization, there is no preexisting plan; the organization arises spontaneously out of the preferences of the elements organized. The ecology of our earth, as it has evolved through natural selection, is a particularly extensive and profound form of self-organization. Although certain religious minds remain convinced that this elaborate organization must have been planned by a god, there is no good reason to believe this. Darwinian evolution demonstrates that the simple “preference” for survival, to eat but not be eaten, has propelled the biosphere into its complex ecology. When we talk about organizing in ordinary language, we often refer to a situation where we first have a plan and than we arrange a set of elements based on this plan. The arrangement of books in a library, based on the Library of Congress classification system, is one example. So is the organizing of stone, wood, glass and other materials into a building based on an architect’s blueprints. In such things as buildings, machines, and transportation networks a plan precedes the actualized product. An acorn has within its genetic material the plans for an oak tree. This genetic “information” is analogous to the architect’s blueprints, but with significant differences. The plan is internal to the organism, not external to it; the plan is not the product of thought, but of Darwinian evolution; and the plan does not reside centrally, but resides in every cell of the tree. Finally, we have the kind of organization that leads to galaxies, Smith’s markets, and Darwin’s ecosystems. In this kind of organization, which we’ve called self-organization, no plan pre-exists the organization. The organization arises based just on the preferences of the elements that comprise the organization. As we explore the world, then, we find three types of organization. If we call organization without a plan “self-organization,” perhaps we might call organization with a plan “algorithmic organization” (at least that is the term that I have coined for it). We can then divide algorithmic organization into two types, based on whether the plan is intrinsic to the set of elements being organized, as it is in an organism, or extrinsic, as it is in a machine or other human artifact. Each of these three types of organization, to an extent, define the subject matter of one of the sciences; respectively the physical sciences, the biological sciences, and the social sciences. Forms of extrinsic organization are also frequently the subject matter of the arts and humanities. And, we can find various mixtures of the types: ecosystems are comprised of organisms, but the relationships among the various organisms and the organisms and their physical environment, is a form of self-organization. Art works are often partially planned, but also partially self-organizing. Extrinsic algorithmic organization is a form that exists nearly exclusively with human beings. During the last couple hundred years, the landscape of the earth has been transformed by this type of organization, much as starting about four hundred million years ago, the landscape was transformed by the proliferation of new life forms evolving on land. To complete the bridge metaphor, if self-organization provides the piers leading up to Darwinian evolution, than the presence of extrinsic algorithmic organization forms a pier on the other side of that evolution. The Mysteriously Creative World In this piece, I have suggested a way in which we can get from the uncreative mechanism of classical physics, to the very creative world in which we live. It is based on two notions: 1) that we can think of the fundamental forces of nature as something like preferences, and 2) that, as Adam Smith had suggested long ago, complex organization can arise just through the preferences of the elements that comprise the organization. In the theistic view of the world, the Creator has a plan for the world and has created the world according to that plan. God is the architect of the Universe. In a pantheistic view of the world, there is a kind of plan immanent in the world and the world is the unfolding of that plan through time. These are the two major metaphors that I introduced at the beginning of this article. Perhaps Naturalism could be conceived as the view that there is no preexisting plan – its metaphor, the metaphor of self-organization. But how is it that this world has this set of “preferences”? In his book, The Life of the Cosmos, physicist Lee Smolin addresses this question. Based on attempts to model the self organization of the world, he shows that the actual parameters of this world are an incredibly improbable set. Why the world that emerged from the Big Bang had such specialized parameters is a very interesting question. Smolin attempts an answer, called cosmological natural selection, but it has not received general acceptance. In fact, as things stand, there is no good answer to this question, it is just a mystery. In my personal understanding of Spiritual Naturalism, nature, creativity and mystery are central concepts. Nature is the Creative Mystery. It is the source and ultimate context of all that exists. If others want to use words like God, Allah, Tao, or the Absolute, that is fine with me. But if they pretend that these words mean anything more than Creative Mystery, I can only smile and walk on. My life is but a scintilla of Nature’s mystery and my meager attempts at creativity, such as this article, but an infinitesimal flourish of Nature’s creativity. As small as it is, I offer it in gratitude. Learn about Membership in the Spiritual Naturalist Society __________ The Spiritual Naturalist Society works to spread awareness of spiritual naturalism as a way of life, develop its thought and practice, and help bring together like-minded practitioners in fellowship. Notes: - From the article “Process Philosophy” on the Internet Encyclopedia or Philosophy: https://www.iep.utm.edu/processp/ - The idea that galaxies have an ecology is discussed in Lee Smolin’s, The Life of the Cosmos. I consider this the best book on cosmology for the general reader that I have encountered.
https://www.snsociety.org/natures-creativity/
What is Contact Dermatitis? Contact dermatitis is a skin condition that one develops when the skin interacts with any irritant or something it is sensitive to. It can cause a blistery and itchy rash. It is a very common condition, and almost all people develop contact dermatitis at least once in their lives. In normal cases, it goes away on its own without any medical treatment. Although it is not contagious, the rash is quite painful and uncomfortable. However, if it persists for more than a few weeks, the medical attention of a dermatologist may be needed (x). Ninety-five percent of skin diseases are known to result of contact dermatitis. People who are at high risk of developing this disease are usually nurses, people who work in beauty salons dealing with hair and skin products, landscapers, bartenders and people who work in laboratories or industrial plants (x). Contact dermatitis can be categorized into two types. First is dermatitis caused by an irritant, which can result in rapid inflammation of the skin. Second is dermatitis due to an allergen, where the skin may take a few days to respond and react to it. However, the signs and symptoms of both types of dermatitis are similar (x). Contact Dermatitis Symptoms Some common symptoms include (x): - Blisters - Lesions that have a very prominent border - Redness of the skin - Scale on the skin - Lesion in different shapes - Cracks - Peeling of skin - Darkened skin - Skin gets sensitive to the sun - Swollen eyelids - Burning of the skin - Bumps or raised skin that oozes fluid Contact Dermatitis Causes Contact dermatitis is triggered by the exposure of the skin to any substance that irritates the skin or causes an allergic reaction. This external substance could be any of the thousands of allergens and skin irritants (x). Irritant Contact Dermatitis Contact dermatitis caused by an irritant is the most common type. This occurs when the outer layer of the skin gets damaged. The reaction of the skin with the irritant depends on the individual. Some may develop signs after being exposed to the irritant for a few times, and even mild irritants can cause this (x). Some common irritants that can cause a reaction are: - Detergents - Bleach - Rubbing alcohol - Shampoos - Perfumes - Fertilizers - Pesticides - Solvents Allergen Contact Dermatitis This type occurs when your skin is sensitive to an allergen and the exposure to it causes the onset of dermatitis in the exposed area. It can also be triggered by eating foods that your body is allergic to like medicine, flavorings, dental procedures, etc. Once your body gets sensitive to an allergen, then even a small amount of it can easily cause the skin to react (x). Common types of allergens are: - Medications like oral anti-allergic pills and antibiotics - Nickel used commonly in buckles and jewelry (x) - Formaldehyde, added in clothing, disinfectants and preservatives - Hygiene products like body washes, cosmetics, deodorants, hair color and nail polish - Mango and poison ivy both contain an allergic substance called urushiol (x) - Airborne substances like sawdust, pollen and spray insecticides - Rubber and latex (x) When to Consult a Doctor? In most cases, the symptoms go away on their own. Still it is best to see a doctor if the rash gets very painful, severe and spreads rapidly, or if the rash doesn’t get better within a month. Also see your doctor if the rash affects sensitive areas like the genitals and face, or if it gets unbearably painful, affecting your routine and sleep. Common Risk Factors of Contact Dermatitis - Frequent washing of hands - Increased exposure to water - Dry climate - Wearing diapers - Exposure to chemicals, acids and alkalis - Working as a nurse, cosmetologist, mechanic, chef, metal worker, musician or hairdresser (x) Treatment of Contact Dermatitis First of all, doctors will typically make a proper diagnosis, which includes studying the patient’s medical history, along with doing a physical examination of the patient. Patch tests and allergy tests are done to find the cause of the allergy. Then, the doctor will prescribe the proper medication. The common and conventional ways to treat contact dermatitis are taking antihistamines for allergens, taking oral steroids for more severe cases, taking antibiotics to treat painful blisters and lesions and applying hydrocortisone creams to reduce redness and itchiness (x). Of course, natural home remedies can tone down the symptoms of contact dermatitis and help ease the burning, itching and discomfort. Here are some natural and simple home remedies to help treat contact dermatitis: Cut Down Exposure to Food Allergens If the diagnosis confirms that you are allergic to a specific food item, avoid it. This means avoiding it completely — do not consume it, handle it or prepare it for others. Some common food allergens include soy, dairy products, wheat, gluten, seafood, tomatoes, corn, eggs, citrus fruits, mangoes and peanuts. Avoid Exposure to Known Chemical Irritants If you happen to develop sensitivity to any specific hair product, cosmetics, latex, rubber, metal, household cleaner or shampoo, then avoid all contact with any of them. This is to keep you from an attack of contact dermatitis and allow the body to heal naturally. The symptoms and rashes can then tone down. Omega-3 Fatty Acids Increase your intake of omega-3 fatty acids by consuming more salmon, mackerel, cod liver oil, chia seeds, walnuts and flax seeds. Omega 3 fatty acids are highly beneficial for skin health, maintaining blood sugar levels, improving the functioning of the immune system, heart health and for improving the mood and toning down depression (x). Vitamin C Vitamin C is beneficial for skin health. Because of its antihistamine properties, it helps reduce the symptoms of contact dermatitis. Some common foods that help provide vitamin C are strawberries, oranges, black currants, bell peppers, broccoli and pineapples. But if you are allergic to citrus, then you can take supplements. Moisturize the Rash Soothing the rash to reduce the symptoms and the pain is important. To do this, you can use moisturizing creams, especially those made from shea butter, coconut oil, lavender oil and tea tree oil. These are very beneficial for fighting skin-related issues and are commonly used to treat acne as well. Coconut oil is particularly famous for having good antifungal and antibacterial properties. Apply a nice and mild — preferably homemade — cream twice a day on the rash to keep it moisturized and hydrated. In fact, keeping the affected area soft and soothed will help promote its healing to a great extent. Keep applying creams daily until the lesions heal properly. Avoid Scratching the Rash Always keep your nails trimmed and avoid scratching the rash at all costs. This is because scratching can worsen the rash and infect it. Apple Cider Vinegar Benefits of apple cider vinegar are countless. Research has shown that it has great soothing properties that can help fight bacteria and reduce inflammation. Apply a cream that has apple cider vinegar, especially on the affected area to help prevent it from getting attacked by bacteria and fungus. Protect Your Hands Wash your hands frequently to keep them clean. But always dry them afterward. Use gloves to keep them protected. Plastic gloves may be a good investment. It is essential not to infect your hands with the germs or fluid coming out of the rash. Supplements for Contact Dermatitis Hyaluronic Acid Powder Hyaluronic Acid (Sodium Hyaluronate) possesses antioxidant properties. Applied topically, it could help reduce wrinkles, sagginess, discoloration and dryness, assisting in the improvement of the overall appearance of skin. It is often present in many beauty products because of its anti-aging and hydrating properties. Consult your doctor about how you prefer to make the topical cream. L-Histidine HCL Powder L-Histidine HCL is an amino acid that is a safe, non-steroidal way of managing atopical dermatitis and other similar skin conditions. Consult your doctor if you want to use this supplement. Collagen Collagen helps promote healthy skin and possibly manage symptoms of contact dermatitis. The recommended dosage depends on which collagen supplement you want to use. Talk to your doctor to help you choose which one to take as well as how much. The Bottom Line Contact dermatitis is a skin disease that nearly a million people in the U.S. experience annually. It is a non-contagious skin condition that goes away on its own but can turn out to be quite painful and severe if not treated properly. It could be caused by the use of various cosmetics, beauty products and chemicals present in household cleaners that a person’s skin is exposed to. Various environmental factors and chemical compounds present in creams, antibiotics and pollen present in the environment may also cause the condition. Contact dermatitis is commonly treated by the use of antihistamines, antibiotics and steroids. However, the treatment mainly depends on the diagnosis and finding out the cause behind dermatitis. To avoid getting this condition, avoid various allergens like dairy, gluten and various cosmetics that can contain allergic components if you feel you have adverse reactions to any of these. Home remedies can treat the disease and reduce the symptoms to prevent it from getting worse.
https://community.bulksupplements.com/contact-dermatitis/
For two performances only, the Annapolis Chorale and a stage full of talented soloists graced Maryland Hall presenting Rogers and Hammerstein’s 1945 production of Carousel. The leads are costumed in festive garb, lightly checkered sundresses and hats on stage brightened the austere set. The 1945 work was adapted from 1909 from Ferenc Molnár’s play Liliom and was only Rogers and Hammerstein’s second collaboration after the amazing success of Oklahoma. Directed by Courtnet Kalbacker, I am constantly reminded by local productions that Annapolis has some of the greatest talent right here. Directing a show with no set design and minimal room for movement, takes artistic and cunning to the next level. I must apologize to my reading audience, but although I knew most of the songs of Carousel, I never had actually seen the show until last Friday night. Which brings me to my thought du jour, and the reason I adore theater, is that once you have put a song into the context of a show, whenever you hear it in the future, you can rerun the stage performance in your memory. While I may have heard, “If I Loved You,” “June is Busting Out All Over,” “My Man Bill” and “You Never Walk Alone,” I never understood it to be part of something bigger than itself. They were simply lovely songs, sung by amazing singers. Directed by Courtnet Kalbacker, I am constantly reminded by local productions that Annapolis has some of the greatest talent right here. This is also the first production I have seen at Maryland Hall since its major renovation. While there are still a few panels out of place, the acoustics were notably enhanced. We are so fortunate in our city to have a conductor like our very own J. Ernest Green. Maestro Green is indeed a National sensation and has played to New York and Washington, Europe, and South America, but he delights in bringing audiences everything from classical, opera and theater to our small, but culturally demanding community. And oh my can he bring talent together. The orchestra was flawless. Having little time to rehearse, and few hours to work, I am constantly in awe of our Annapolis Orchestra. I have delighted in watching Maestro Green over the last 30 years, and he continues to bring in the pinnacle of talent together to Annapolis. This delightful semi staged production brings musical joy to patrons, while creating a full-scale show using few props and no scenery changes whatsoever. He is well-known for “pushing the boundaries of the concert hall.” And although he, in 2012, received Anne Arundel County’s Lifetime Achievement award, I would say he is still young enough to fit another lifetime of achievement into his future. Carousel is based around the not so prolific life of an under achieving, unambitious Carousel barker named Billy Bigelow, played by the handsome and talented Jason Buckwalter, whose romance threatens both his and his love interest and later his wife, Julie Jordan, jobs. Mrs. Mullen, played by one of Annapolis’ finest actresses and vocalists, Alicia Sweeney, is the owner of the Carousel and seems to have a romantic interest in young Mr. Bigelow and is becoming increasingly jealous of his flirtation with Julie Jordan, played by the tall, graceful and lovely Jessica Satava. Ms. Satava has both the stature and strong vocals to properly portray this independent, yet doomed by love, young woman. Set in the post World War II era, both the lyrics and formality of language and reputation, charm the modern audience. While it briefly touches on domestic abuse, it does so in a way that the audience still remains somewhat sympathetic to Billy Bigelow. Partly because the community condemns the abuse, the love felt by Julie Jordan is so pure and selfless, and that she and she alone, understands that he is doing the best he can. It is just that it isn’t going so well. In looking at the Billy Bigelow character, and understanding that this show was written post World War II, in essence Billy may well represent the war hero returning and the traumatic young man of the times. It is clear that love can’t conquer all, however the clear dulcet voices of our lovers, and the fresh and memorable lyrics and tunes they sing, make us forget their short comings and understand they too are just human. And while Ms. Jordan represented the angelic figure in Billy Bigelow’s life, there is often a power that represents the devil. Erik Alexis plays Jigger Craigin, a ne’er-do-well of a scoundrel getting our Billy Bigelow in trouble with the law, ultimately causing him to do the unthinkable. Mr. Alexis plays the unkempt swarthy character so convincingly, that you know that he could easily have a long incredibly successful career of being typecast as some sort of evil incarnate. Also in the town, the wise Dr. Selden played by the rich baritone, Ray Landrum, helps the community heal and is a kind of narrator to our plot. Petite Carrie Pipperidge, played by soprano Kimberly Christie, to me was reminiscent of a young Kristin Chenoweth. Although the staging was simple, her crisp smooth voice exemplified youth and exuberance. The love interest to our Ms. Pipperidge, was the suave older man Enoch Snow, played by J. Austin Bitner. A full baritone voice Mr. Bitner, represented the sophisticated and powerful wealthy man, caring about social standing and reputation above all else. Nettie Fowler, played by Molly Moore Green, had some of the best musical numbers of the show. Starting with “June is Busting Out All Over,” it is our first moments which we can see how a chorus of this size and talent will be utilized along with the leads. Ms. Greens voice and diction was rich, mature and voluptuous and the chorus made the energy that much more impactful and gregarious. When towards the show’s conclusion, Ms. Green sings “You’ll Never Walk Alone,” she brings a connection to the situation that is both memorable and timeless in its message. For this show is not a slap happy Oklahoma feeling show. It has a sad haunting ending, which needs help to be lifted for the audience’s acceptance of the truth. That as long as there are people that we influence in a positive way, that you never are alone. She tries to teach this to Louise Bigelow, daughter of the town bum, embarrassed at her parentage, Gracie Albus dances beautifully on stage, her youthful carefree demeanor threatened by being constantly tormented by her peers. “You’ll Never Walk Alone” speaks to the next generation, the sins of the father do not dictate the outcome of the future. Two days later, I still haven’t been able to get that song out of my head, I blame Ms. Green! Running Time: Two hours and 30 minutes, with one 15-minute intermission. Rodgers & Hammerstein’s Carousel, presented by Live Arts Maryland, had two shows only, October 9 and 10, 2015 at Maryland Hall for the Creative Arts – 801 Chase Street, in Annapolis, MD. For more information about other shows with the Annapolis Chorale click here.
https://mdtheatreguide.com/2015/10/theatre-review-carousel-at-maryland-hall-for-the-performing-arts/
oneAPI Threading Building Blocks (oneTBB; formerly Threading Building Blocks or TBB), is a C++ template library developed by Intel for parallel programming on multi-core processors. Using TBB, a computation is broken down into tasks that can run in parallel. The library manages and schedules threads to execute these tasks. A oneTBB program creates, synchronizes, and destroys graphs of dependent tasks according to algorithms, i.e. high-level parallel programming paradigms (a.k.a. Algorithmic Skeletons). Tasks are then executed respecting graph dependencies. This approach groups TBB in a family of techniques for parallel programming aiming to decouple the programming from the particulars of the underlying machine. oneTBB implements work stealing to balance a parallel workload across available processing cores in order to increase core utilization and therefore scaling. Initially, the workload is evenly divided among the available processor cores. If one core completes its work while other cores still have a significant amount of work in their queue, oneTBB reassigns some of the work from one of the busy cores to the idle core. This dynamic capability decouples the programmer from the machine, allowing applications written using the library to scale to utilize the available processing cores with no changes to the source code or the executable program file. In a 2008 assessment of the work stealing implementation in TBB, researchers from Princeton University found that it was suboptimal for large numbers of processors cores, causing up to 47% of computing time spent in scheduling overhead when running certain benchmarks on a 32-core system. oneTBB, like the STL (and the part of the C++ standard library based on it), uses templates extensively. This has the advantage of low-overhead polymorphism, since templates are a compile-time construct which modern C++ compilers can largely optimize away. oneTBB is available commercially as a binary distribution with support, and as open-source software in both source and binary forms. oneTBB does not provide guarantees of determinism or freedom from data races. oneTBB is a collection of components for parallel programming: parallel_for, parallel_reduce, parallel_scan parallel_pipeline, parallel_sort concurrent_queue, concurrent_priority_queue, concurrent_vector, concurrent_hash_map scalable_malloc, scalable_free, scalable_realloc, scalable_calloc, scalable_allocator, cache_aligned_allocator mutex, spin_mutex, queuing_mutex, spin_rw_mutex, queuing_rw_mutex, recursive_mutex The hardware, operating system, and software prerequisites for oneTBB. Systems with Microsoft Windows operating systems: Systems with Linux* operating systems: Systems with macOS operating systems: Systems with Android operating systems:
https://db0nus869y26v.cloudfront.net/en/Threading_Building_Blocks
BACKGROUND OF THE INVENTION SUMMARY OF THE INVENTION DETAILED DESCRIPTION OF THE PREFERRED AND ALTERNATIVE EMBODIMENTS EXAMPLE I Generation of the Load Code EXAMPLE II Life Cycle of a Trip EXAMPLE III In-Transit Events EXAMPLE IV Advanced Functionality Scenarios EXAMPLE V Usage of Smart Container Lock/Strongbox Technology APPENDIX 1. Field of the Invention The current invention relates to Homeland Security, and, more specifically, to expediting release procedure of cargo containers at border crossing or at customs entry point by tracking and reporting threats while cargo containers are in transit. 2. Discussion of the Prior Art Here are some facts that were disclosed in the written testimony before a hearing of the Subcommittee on Oversight and Investigations, Committee on Energy and Commerce, at the United States House of Representatives, during discussions on “The Limitations of the Current Cargo Container Targeting”, on “A Review to Assess Progress with the Bureau of Customs and Border”, and on “Protection's Targeting Program for Sea Cargo” by Stephen E. Flynn, Ph.D. Commander, U.S. Coast Guard (ret.), Jeane J. Kirkpatrick, Senior Fellow in National Security Studies, on Mar. 31, 2004. The USA is spending more on conventional military power than the next thirty nations combined. By 2008, the USA will be spending more than the rest of the world combined. America's military supremacy means that the only way the current and future adversaries can attack the U.S. is to use an asymmetrical approach, like the 9/11 attack on American soil. This is because such asymmetrical attacks could generate a widespread economic and societal disruption which weakens the foundation upon America's military supremacy ultimately rests. There are many possible scenarios of how the United States could be targeted by terrorist groups. The intermodal transportation system that is the backbone of the global supply chains that support the U.S. manufacturing and retailing sectors could be a primary target. The current intermodal transportation system makes it possible to move up to 65,000 pounds of goods in one box from anywhere on the planet to the United States for a few thousand dollars. It has proven to be a boon for organized crime. Based on arrest and seizure records, it is known that criminals have been smuggling human beings, small-arms, multi-ton cargo shipments of narcotics, knock-off products, and every other form of contraband in containers. For example, cargo thieves stole an estimated $15 billion of goods in 2000—up from about $1 billion of cargo theft a decade before. The same system that has proven to be so vulnerable to criminal activity, is clearly susceptible to being targeted by terrorists. For example, according to the Jerusalem Post, the Palestinian terrorists responsible for the suicide bombings at the Port of Ashdod which killed ten Israelis may have been smuggled from Gaza in a container outfitted with a secret compartment and an arms cache. If this turns out to be the case, the risk that containers can be used as a weapons delivery device is no longer a hypothetical threat. However, the terrorist risk associated with containers goes beyond their being a conduit for suicide bombers. A much more disturbing possibility is that a container could be used to transmit a weapon of mass destruction. There is no doubt that should a nuclear weapon be smuggled into the United States and activated, it would have devastating consequences in terms of loss of life and destruction of property within the blast zone. But unlike a weapon delivered by a missile, an attack carried out with a container would likely lead to the shutdown of all U.S. ports. Should the U.S. ports be locked down for a period of three weeks—which is not inconceivable should a terrorist group like al Qaeda carry out a simultaneous attack using containers arriving in different ports—the entire global trade system would go into gridlock. Since the transportation system has become the warehouses for just-in-time retailers and manufactures, the U.S. store shelves would quickly go bare and the U.S. factories would be idled. If the current transportation system is not significantly improved, the probability of detection of a weapon from an untrusted shipper being 9.75 percent rises to only a maximum of 24 percent if the cargo shipment comes from a certified shipper. However, if the weapon is placed in a 20-foot container which are commonly used to move heavy machinery, the probability of detection drops to nearly zero because the radiography cannot penetrate cargo that would likely be between the wall of the container and the weapon. The present invention addresses these problems by providing an expediting release procedure of a cargo container at border crossing or at customs entry point by tracking and reporting threats while the cargo container is in transit. One aspect of the present net invention is directed to a method of expediting a release procedure of at least one cargo container at least one border crossing or at least one customs entry point by detecting each statistically significant threat (SST) signal associated with at least one cargo container while in transit, and by tracking and reporting to each appropriate party the position coordinates and a security status of each cargo container that generated at least one SST signal. In one embodiment of the present invention, the appropriate party is selected from the group consisting of: {Homeland Security agency; and a cargo security agency}. In this embodiment of the present invention, the cargo security agency is further selected from the group consisting of: {a consignee; a steamship line; a customs broker; a freight forwarder; and a terminal operator}. In one embodiment, the method of the present invention comprises the following steps: (A) detecting at least one SST signal associated with at least one cargo container while in transit; wherein each SST signal generates a threat signal having a threat probability higher than a predetermined threshold; (B) if at least one SST signal associated with at least one cargo container while in transit was detected, identifying each cargo container that generated at least one SST signal and classifying the security status of each cargo container as a Potential Threat (PT) cargo container; wherein each cargo container that was not classified as the PT cargo container is classified as having a security status of an Expedited Release Procedure (ERP) cargo container; (C) tracking and reporting position coordinates and the security status of each PT cargo container to each appropriate party; (D) tracking and reporting position coordinates and the security status of each ERP cargo container to each appropriate party; and (E) expediting the release procedure at least one border crossing or at least one customs entry point of each ERP cargo container. In one embodiment of the present invention, the step (A) detecting at least one SST signal associated with at least one cargo container while in transit further comprises the following steps: (A1) using at least one threat detector to detect at least one SST signal associated with at least one cargo container while in transit; and (A2) using at least one detected SST signal to activate at least one RFID tag attached to at least one cargo container associated with at least one detected SST signal. In one embodiment of the present invention, each RFID tag is selected from the group consisting of: {an active RFID tag; and a passive RFID tag}. In one embodiment of the present invention, each threat detector is selected from the group consisting of: {an active threat detector; and a passive threat detector}. In one embodiment of the present invention, the step (B) of identifying each cargo container that generated at least one SST signal and classifying the security status of each cargo container as the Potential Threat (PT) cargo container further comprises the step (B1) of using at least one activated RFID tag to locate at least one PT container. In one embodiment of the present invention, the step (C) of tracking and reporting position coordinates and security status of each PT cargo container to the appropriate party further comprises the step (C1) of using a radio navigational equipment to substantially continuously determine and track position coordinates of each PT container. In one embodiment of the present invention, the radio navigational equipment is selected from the group consisting of: {a GPS navigational processor; a GLONASS navigational processor; a combined GPS/GLONASS navigational processor; a GALILEO navigational processor; a Global Navigational Satellite System (GNSS) navigational processor; and a pseudolite navigational processor}. In one embodiment of the present invention, the step (C) of tracking and reporting position coordinates and security status of each PT cargo container to each appropriate party further comprises the step (C2) of generating an alarm signal when at least one container was identified as a PT container while in transit. In one embodiment of the present invention, the step (C) of tracking and reporting position coordinates and security status of each PT cargo container to each appropriate party further comprises the following steps: (C3) checking at least one generated SST signal to verify the security status of at least one PT container while in transit; and (C4) if at least one SST signal is confirmed to be a false positive SST signal, changing the security status of at least one PT container associated with the false positive SST signal to an indefinite security status (ISS) cargo container. In one embodiment of the present invention, the step (C) of tracking and reporting position coordinates and security status of each PT cargo container to each appropriate party further comprises the step (C5) of substantially continuously updating and reporting an electronic identity of each PT container. In one embodiment of the present invention, the electronic identity of a PT container comprises a plurality of parameters selected from the group consisting of: {a security status of the PT container; an alarm event associated with the PT container; an electronic transmission to each appropriate party of an alarm event associated with the PT container; and a change in security status of the PT container due to a false positive SST signal to an indefinite security status (ISS)}. In one embodiment of the present invention, the step (C) of tracking and reporting position coordinates and security status of a PT cargo container to each appropriate party further comprises the step (C6) of reporting the position coordinates of the PT container by using a reporting means selected from the group consisting of: {a cellular phone; a radio; a TV transmitter; a satellite phone; a cable; and a website/portal}. In one embodiment of the present invention, the step (D) of tracking and reporting position coordinates and the security status of an ERP cargo container to each appropriate party further comprises the step (D1) of using a radio navigational equipment to substantially continuously determine and track position coordinates of each ERP container. In one embodiment of the present invention, the radio navigational equipment is selected from the group consisting of: {a GPS navigational processor; a GLONASS navigational processor; a combined GPS/GLONASS navigational processor; a GALILEO navigational processor; a Global Navigational Satellite System (GNSS) navigational processor; and a pseudolite navigational processor}. In one embodiment of the present invention, the step (D) of tracking and reporting position coordinates and security status of an ERP cargo container to each appropriate party further comprises the following steps: (D2) of substantially continuously checking the security status of each ERP container while in transit by using at least one threat detector to detect a previously undetected (PU) SST signal; and (D3) if at least one ERP container generates the previously undetected (PU) SST signal, changing the security status of at least one ERP container associated with the PUSST signal to an indefinite security status (ISS) cargo container. In one embodiment of the present invention, the step (D3) of changing the security status of at least one ERP container associated with the previously undetected SST signal to a PT cargo container further comprises the following steps: (D3, 1) activating at least one RFID tag associated with the PUSST signal to indicate the change in the classification of at least one cargo container from the ERP security status to the ISS security status; and (D3, 2) generating an alarm signal when at least one ERP container changes its security status from the ERP security status to the ISS security status. In one embodiment of the present invention, the step (D) of tracking and reporting position coordinates and security status of an ERP cargo container to each appropriate party further comprises the step (D4) of substantially continuously updating and reporting an electronic identity of the ERP container. In one embodiment of the present invention, the electronic identity of an ERP container comprises a plurality of parameters selected from the group consisting of: {a security status of the ERP container; a change in security status of the ERP container due to a PUSST signal; an alarm event associated with the PUSST signal; and an electronic transmission to each appropriate party of the alarm event associated with the PUSST signal}. In one embodiment of the present invention, the step (D) of tracking and reporting position coordinates and security status of an ERP cargo container to each appropriate party further comprises the step (D5) of reporting the position coordinates of each ERP container by using a reporting means selected from the group consisting of: {a cellular phone; a radio; a TV transmitter; a satellite phone; a cable; and a website/portal}. In one embodiment of the present invention, the step (E) of expediting the release procedure at least one border crossing or at least one customs entry point of an ERP cargo container further comprises the following step: (E1) making a determination of whether a cargo shipment including a plurality N of cargo containers should be immediately released into commerce, or if the cargo shipment including the plurality N of cargo containers should be inspected before the cargo shipment is released into commerce, wherein N is an integer. In one embodiment of the present invention, the step (E1) of making the determination of whether a cargo shipment including the plurality N of cargo containers should be immediately released into commerce, or if the cargo shipment including the plurality N of cargo containers should be inspected before the cargo shipment is released into commerce, further comprises the following steps: (E1, 1) compiling a set of security data including a security status for each container while in transit; (E1, 2) analyzing the set of security data compiled in the step (E1, 1); (E1, 3) if the set of security data indicates an ERP status for each container in the cargo shipment, making a determination of whether the cargo shipment including the plurality N of the ERP cargo containers should be immediately released into commerce; and (E1, 4) if the set of security data indicates a change from ERP status to PT status for an integer K number of the ERP containers, making a determination of whether the cargo shipment including a plurality (N-K) of the ERP cargo containers and a plurality K of containers with indefinite security status (ISS) should be inspected before the cargo shipment is released into commerce. inspected In one embodiment of the present invention, the step (E1, 4) of making the determination of whether the cargo shipment including the plurality (N-K) of ERP cargo containers and the plurality K of ISS containers should be inspected before the cargo shipment is released into commerce, further comprises the following steps: (E1, 4, 1) setting a set of threshold numbers; and (E1, 4, 2) determining a number of containers Nto be inspected depending on the relationship between K number of ISS containers and each threshold number. threshold1 threshold2 threshold3 threshold(L−1) thresholdL inspected In one embodiment of the present invention, the step (E1, 4) of making the determination of whether the cargo shipment including the plurality (N-K) of the ERP cargo containers and the plurality K of ISS containers should be inspected before the cargo shipment is released into commerce, further comprises the following steps: (E1, 4, 3) setting a set of threshold numbers {N; N; N; . . . N; N}; L being an integer; and (E1, 4, 4) determining a number of containers Nto be inspected depending on the relationship between K number of ISS containers and each threshold number. inspected threshold1 inspected threshold1 threshold2 inspected threshold2 threshold3 inspected threshold(L−1) thresholdL In one embodiment of the present invention, Nis equal to zero if K number is less than or equal to the first threshold number N; Nis equal to the first threshold number Nif K number is less than or equal to the second threshold number N; Nis equal to the second threshold number Nif K number is less than or equal to the third threshold number N; and Nis equal to the (L−1) threshold number Nif K number is less than or equal to the last threshold number N. In one embodiment of the present invention, the step (E) of expediting the release procedure at least one border crossing or at least one customs entry point of each ERP cargo container further comprises the step (E2) of using a secure ERP website-base system to expedite the release procedure at least one border crossing or at least one customs entry point of each ERP cargo container. In one embodiment of the present invention, the secure ERP website-based system is configured to collect and to process a set of combined data selected from the group consisting of: {a set of normal commercial transaction data; a set of transport data; a set of RFID data; a set of satellite navigational tracking data; a set of threat signal data; and a set of security status data}; wherein the set of combined data is a collection of inputs from a supply chain selected from the group consisting of: {each such container entering at least one border crossing or at least one customs entry point; the customs at least one destination country; a network of shippers; a network of consignees; a network of forwarders; a plurality of terminals; and a network of carriers}. In one embodiment of the present invention, the step (E2) of using the secure ERP web-site based system to expedite the release procedure at least one border crossing or at least one customs entry point of each ERP cargo container further comprises the following steps: (E2, 1) utilizing the set of data selected from the group consisting of: {the RFID data; the set of satellite navigational tracking data; and the set of threat signal data} to indicate a physical location of at least one ISS cargo container that will be submitted for customs clearance within a predetermined distance and time of arrival from a port of discharge and/or port of entry; and (E2, 2) using the secure ERP website-based system configured to enable the preparation and population of a set of ERP data documentation for the expedite release procedure for each ERP cargo container including a set of data selected from the group consisting of: {a set of commercial invoices; a set of packing lists; a set of manifests; a set of Bills of Lading; a set of commercial documents including a certificate of origin, manufacturer safety data sheets, pre-shipment cargo inspection reports, documentary collections, quota certificates, solid wood packing declarations; and a set of customs entry data}. In this embodiment of the present invention, on one hand, the current location of each ISS cargo container that generated at least one previously undetected SST (PUSST) signal is posted on the secure ERP website. In this embodiment of the present invention, a predetermined number of the ISS cargo containers in the cargo shipment should be physically inspected at least one border crossing or at least one customs entry point or at port of customs entry. On the other hand, in this embodiment of the present invention, each ERP cargo container is immediately released into the stream of commerce without being physically inspected at the border crossing or at least one customs entry point. In one embodiment of the present invention, the step (E2, 2) of using the secure ERP website-based system configured to enable the preparation and population of the set of ERP data documentation for the expedite release procedure for each ERP cargo container further comprises the following steps: (E2, 2, 1) securing a set of ERP-enabling data collected on a website/portal of the secure ERP website-based system; (E2, 2, 2) disseminating the set of ERP-enabling data to each appropriate party; and (E2, 2, 3) establishing a shipper verification system that provides a positive assurance that a new cargo shipment is secure throughout the entire supply chain. In this embodiment of the present invention, the ERP-enabling data is selected from the group consisting of: {a consignee data including a customs broker data; a shipper data; a carrier data including a port/terminal data from the port of departure; and a customs/Automated Brokerage Interface (ABI)/Other Governmental Agency (OGA) data}, whereas the ERP-enabling data comes from each appropriate party located anywhere in the world. In this embodiment of the present invention, an appropriate party is selected from the group consisting of: {the consignee; a customs broker; the shipper; the carrier; the port and terminal operator; the customs; a designated agent of the consignee; a designated agent of the customs broker; a designated agent of the shipper; a designated agent of the carrier; a designated agent of the port and terminal operator; and a designated agent of the customs}. In one embodiment of the present invention, the step (E2, 2, 3) of establishing the shipper verification system further comprises the following steps: (E2, 2, 3, 1) establishing a global network of authorized unprejudiced agents that could complete an initial verification on each particular shipper to make sure that the shipper has established a safety procedure that conforms to the USA government, or to a set of international standards yet to be determined; (E2, 2, 3, 2) nominating an employee of the company to be named a security officer, or an ‘empowered person’ that is responsible for supervising loading of each new cargo shipment and declaring each cargo container safe before it is sealed; wherein the security officer confirms that the documentation is correct and no smuggling is intended; and wherein the security officer confirms that each cargo container is sealed; (E2, 2, 3, 3) entering the verification data linked to a unique shipper ID code into a verification database by the authorized unprejudiced agent; wherein the unique shipper ID code is similar to or is directly tied to the customs concept of a Manufacturer ID code; and wherein the shipper is enrolled into a database of “known” shippers once the shipper ID code has been entered into the verification database; and wherein the verification database and the known “shippers” database are accessible via the secure ERP website-based system by a user having a proper registered username and a proper registered password; and (E2, 2, 3, 4) declaring the cargo safe from the SST signals to Homeland Security, conforming the cargo with the set of issued commercial documentation, and initiating the physical movement of the cargo after the shipper is verified. In one embodiment of the present invention, the step (E2, 2) of using the secure ERP website-based system configured to enable the preparation and population of the set of ERP data documentation for customs entry transmission for each ERP cargo container further comprises the following steps: (E2, 2, 4) obtaining an account by a party who is responsible for payment and coordination of the cargo shipment with a website/portal provider of the secure ERP website-based system and or/obtaining an account by the party who is responsible for payment and coordination of the cargo shipment directly with customs at the country of destination, wherein the party who is responsible for payment and coordination of the cargo shipment is selected from the group consisting of: {a consignee; a shipper; or a third party that is responsible for the payment and coordination of the cargo shipment}; (E2, 2, 5) logging in into the obtained account by the party who is responsible for payment and coordination of the cargo shipment to generate a new cargo shipment that is identified by a unique cargo shipment number; (E2, 2, 6) generating a purchase order by the party who is responsible for payment and coordination of the cargo shipment; (E2, 2, 7) generating a commercial invoice by the shipper; (E2, 2, 8) generating a manifest transmission & Bill of Lading (B/L) info by the carrier and/or a freight forwarder; (E2, 2, 9) performing review of Entry Data by the customs broker and/or an importer of record and the party who is responsible for payment and coordination of the cargo shipment to correct any possible errors or to make clarifications before transmission; (E2, 2, 10) generating a signal to trigger transmission of customs entry by the website/portal when a cargo container is within a predetermined length of time away from arrival at a physical border; (E2, 2, 11) disseminating the customs release data to appropriate parties by customs via the website/portal; (E2, 2, 12) disseminating the cargo release data by the carrier and or the freight forwarders to appropriate parties via the website/portal; and (E2, 2, 13) reverting to the standard methods of submission of customs entry and documents (via traditional ABI transmission or by submitting hard copies of actual documents) to customs in the event that any such data is missing, or rejected, or if customs or other governmental agency is to more closely review the shipping and commercial documents; wherein the standard methods of submission of customs entry and documents include using a standard customs rejection procedure and filing of a correction procedure if any such data is missing or rejected. In one embodiment of the present invention, the step (E2, 2, 5) further comprises the step (E2, 2, 5, 1) of linking an account of the party who is responsible for payment and coordination of the cargo shipment to a set of data selected from the group consisting of: {a predetermined PIN # and/or password; a Federal Tax ID# of the party who is responsible for payment and coordination of the cargo shipment; a Bond type; a surety code; a primary delivery warehouse; a set of delivery locations; a list or database of the Harmonized Tariff numbers for all imported goods for the party who is responsible for payment and coordination of the cargo shipment; and a set of relevant customs binding rulings}. In one embodiment of the present invention, the step (E2, 2, 6) further comprises the following steps: (E2, 2, 6, 1) using the PIN# to generate the purchase order based on a set of data selected from the group consisting of: {a supplier contact info; a consignee contact info; a number of pieces being purchased; a purchase price per item; a currency of transaction; customs harmonized Codes for each item being purchased and/or shipped; Commercial Bill of Lading (B/L) Description of goods; Purchaser's sku #s of the goods; date of purchase order; INCO Terms; a desired mode of transport; a desired carrier; related parties (yes/no); an Importer's account number including Federal Tax ID#; binding ruling number; an ach payment type; OGA filing codes; and final delivery address and contact info}; (E2, 2, 6, 2) using the PIN# to control access to the new cargo shipment and to grant access to the new cargo shipment to a set of appropriate parties selected from the group consisting of: {at least one shipper; at least one custom broker; at least one forwarder; and at least one carrier}; (E2, 2, 6, 3) using the PIN# to update a set of account data selected from the group consisting of: {an update to delivery address; an update to customs entry; an update in value; and other relevant updates that may occur while the cargo shipment is enroute}; and (E2, 2, 6, 4) establishing an audit trail with each update of the account data to specifically identify a party which is responsible for the relevant updates, or to specifically identify a party which authorized the relevant updates. In one embodiment of the present invention, the step (E2, 2, 7) further comprises the step (E2, 2, 7, 1) of confirming a set of data selected from the group consisting of: {a supplier contact info; a consignee contact info; a number of pieces being shipped; a sales price per item and a total price; a currency of transaction; a commercial Bill of Lading (B/L) description of goods; seller's sku #s of the goods; a date of invoice; INCO Terms; a mode of transport; a type of packaging units of measure; a SWP declaration; a net weight/gross weight/volume; a number of containers; a type of equipment; a seal number; a vessel; a voyage #; a SCAT code; BL#s; and a country of origin per item}. In one embodiment of the present invention, the step (E2, 2, 8) further comprises the following steps: (E2, 2, 8, 1) sending a manifest to Customs and Border Protection (CBP) and initiating data for Bill of Lading (B/L) and Arrival Notice by specifying a set of data selected from the group consisting of: {a port of Lading: a port of Unlading; a place of delivery; IT #s and dates; and bonded carrier details}; and (E2, 2, 8, 2) confirming arrival of said cargo shipment at loading pier by a Smart Container lock/Strongbox device. In one embodiment of the present invention, the step (E2, 2, 10) further comprises the following steps: (E2, 2, 10, 1) confirming that the cargo shipment of containers is nearing a physical border crossing or is nearing customs entry point by using the navigational and the container ID technology; (E2, 2, 10, 2) checking a plurality of alarm events associated with the container cargo shipment; and (E2, 2, 10, 3) compiling a set of customs entry relevant data selected from the group consisting of: {a customs location code at port of entry; a central exam site; values and weight calculations per Customs requirements; freight charges; statistical quantities; manufactures ID Code; units of measure; Duty; MPF; HMF; CVD; a Bond #; and an ACH Payment type}. In one embodiment of the present invention, the step (E2, 2, 10, 2) of checking the plurality of alarm events associated with the container cargo shipment further comprises the step of increasing the frequency of periodically checking alarm events associated with the SST signals when the cargo ship approaches an arrival port. In another embodiment of the present invention, the step (E2, 2, 10, 2) of checking the plurality of alarm events associated with the container cargo shipment further comprises the step of programming the frequency of periodically checking alarm events associated with the SST signals to take into account nearing approach to a harbor. In one more embodiment of the present invention, the step (E2, 2, 10, 2) of checking the plurality of alarm events associated with the container cargo shipment further comprises the step of unloading of additional testing to be performed as the ship is within the 12 mile international water boundary limit of any country, whether a destination country or not. In one embodiment of the present invention, the step (E2, 2, 11) further comprises the following steps: (E2, 2, 11, 1) checking whether customs has indicated that the cargo shipment is cleared and able to be released into commerce; (E2, 2, 11, 2) checking Customs 7501 form; wherein the Customs 7501 form known as the ‘Entry Summary’ details a set of substantially significant data that is required to be submitted to customs prior to release; (E2, 2, 11, 3) checking Customs 3461 form; wherein the Customs 3461 form is signed by customs or a responsible broker upon release of goods from customs; and (E2, 2, 11, 4) initiating any other liquidation data or administrative messages. In one embodiment of the present invention, the step (E2, 2, 12) further comprises the step (E2, 2, 12, 1) of disseminating the cargo released data in a method similar to the current Automated Manifest System (AMS). Another aspect of the present invention is directed to a system for expediting a release procedure of at least one cargo container at least one border crossing or at least one customs entry point by detecting each statistically significant threat (SST) signal associated with at least one cargo container while in transit, and by tracking and reporting to each appropriate party the position coordinates and a security status of each cargo container that generated at least one SST signal. The appropriate party is selected from the group consisting of: {Homeland Security agency; and a cargo security agency}; wherein the cargo security agency is further selected from the group consisting of: {a consignee; a steamship line; a customs broker; a freight forwarder; and a terminal operator}. In one embodiment of the present invention, the system comprises: (A) a means for detecting at least one SST signal associated with at least one cargo container while in transit; wherein each SST signal generates a threat signal having a threat probability higher than a predetermined threshold; (B) a means for identifying each cargo container that generated at least one SST signal; a means for classifying the security status of a cargo container as a Potential Threat (PT) cargo container; and a means for classifying the security status of a cargo container as an Expedited Release Procedure (ERP) cargo container; C) a means for tracking and a means for reporting position coordinates and the security status of each PT cargo container to each appropriate party; (D) a means for tracking and a means for reporting position coordinates and the security status of each ERP cargo container to each appropriate party; and (E) a means for expediting the release procedure at least one border crossing or at at least one customs entry point of each ERP cargo container. Reference will now be made in detail to the preferred embodiments of the invention, examples of which are illustrated in the accompanying drawings. While the invention will be described in conjunction with the preferred embodiments, it will be understood that they are not intended to limit the invention to these embodiments. On the contrary, the invention is intended to cover alternatives, modifications and equivalents that may be included within the spirit and scope of the invention as defined by the appended claims. Furthermore, in the following detailed description of the present invention, numerous specific details are set forth in order to provide a thorough understanding of the present invention. However, it will be obvious to one of ordinary skill in the art that the present invention may be practiced without these specific details. In other instances, well known methods, procedures, components, and circuits have not been described in detail as not to unnecessarily obscure aspects of the present invention. The present invention addresses the issue of how to expedite a release procedure of cargo containers at border crossings, and/or at customs entry points, and at the same time, to guarantee a high level of Homeland Security from any threat originated from any cargo container that arrives to the USA by sea. The disclosed in the present invention Web-Based system and method that enables an expedient release procedure of cargo containers at border crossings, and/or at customs entry points, and at the same time, guarantees a high level of Homeland Security from any threat originated from any cargo container that arrives to the USA by sea, is based on the early detection of each statistically significant threat (SST) signal associated with at least one cargo container while in transit, and by tracking and reporting to each appropriate party the position coordinates and a security status of each cargo container that generated at least one SST signal. The SST signal is defined as a threat signal with a substantially high probability of being, indeed, a signal that indicates a real threat to the Homeland security originated from at least one cargo container while in transit. The U.S. application entitled “DETECTION AND IDENTIFICATION OF THREATS HIDDEN INSIDE CARGO SHIPMENTS” by the inventors Paul Willms and Jim Stanley, Ser. No. 10/931,730, filed on Aug. 31, 2004, and assigned to the assignee of the present patent application, and incorporated herein in its entirety, is hereafter referred to as the patent application #1. Each such threat considered in the patent application # 1 is assumed to be either hidden inside at least one cargo container before transit, or is assumed to be placed inside at least one cargo container while in transit. Each threat considered in the patent application # 1, while interacting with its surrounding, generates a unique threat signature. The patent application # 1 discloses how to select an array of statistically significant detected threat signatures by measuring array — threshold a background threat signature distribution in a threat-free environment, by comparing each detected threat signature signal with the background threat signature distribution, and if deviation of the detected threat signature signal from the background threat signature distribution is statistically significant, how to select the array of the statistically significant detected threat signatures for further processing. To determine the likelihood of identifying each threat as a threat to the Homeland Security, the patent application # 1 suggests the following steps: generating a statistically significant threat (SST) signal corresponding to each detected threat signature having the statistically significant deviation from the background threat signature distribution, consulting a database of predetermined thresholds associated with a plurality of known threat signatures, comparing each statistically significant threat (SST) signal with at least one predetermined threshold associated with the plurality of known threats, and selecting each statistically significant threat (SST) signal that exceeds at least one predetermined threshold associated with the plurality of known threats into an N-array of threats, wherein the N-array includes an integer number N of statistically significant threat (SST) signals exceeding at least one predetermined threshold. If the integer number N of statistically significant threat (SST) signals exceeding at least one predetermined threshold and selected into the N-array exceeds a predetermined number N, one can determine the likelihood of each threat to generate at least one statistically significant threat (SST) signal. If the likelihood of at least one threat exceeds a predetermined threshold, each threat is identified as a real threat to the Homeland Security. The U.S. application entitled “ACTIVE THREAT DETECTION AND ELIMINATION WHILE IN TRANSIT” by the inventors Paul Willms and Jim Stanley, Ser. No. 11/025,447, filed on Dec. 27, 2004, and assigned to the assignee of the present patent application, and incorporated herein in its entirety, is hereafter referred to as the patent application #2. The patent application #2 discloses a method of active detection of at least one threat to the homeland security, each threat is assumed to be either hidden inside at least one cargo container before transit, or is assumed to be placed inside at least one cargo container while in transit, each threat while interacting with its surrounding generates a unique threat signature. The method of the patent application #2 comprises the steps of substantially continuously probing each cargo container to detect at least one threat signature, processing each detected threat signature to identify the statistically significant threat (SST) signals, identifying at least one container that generates such SST signals; and eliminating such threat to the homeland security, if feasible. Based on the disclosure given in the patent application #1 and in the patent application #2, each statistically significant threat (SST) signal that is discussed in the current patent application, is generated by either using the active probing method of the patent application #2, or by using the passive threat detection devices of the patent application #1. FIG. 1 10 10 14 16 10 In one embodiment, illustrates the flow chart of the method of the present invention of expediting the release procedure of cargo containers at a border crossing or at a customs entry point by tracking and reporting (SST) signals while cargo containers are in transit. The flow chart includes the of detecting at least one SST signal associated with at least one cargo container while in transit (step ). The test condition bifurcates the flow chart . 16 10 18 20 22 Indeed, if the test condition is satisfied, that is if at least one SST signal associated with at least one cargo container while in transit was detected, the flow chart has the following steps: (step ) identifying each cargo container that generated at least one SST signal and classifying the security status of each cargo container as a Potential Threat (PT) cargo container; (step ) tracking and reporting position coordinates and the security status of each PT cargo container to each appropriate party; and (step ) performing a physical inspection of each PT cargo container, or some of the indefinite security status (ISS) containers at a border crossing or at a customs entry point. Please, see discussion below. The appropriate party is selected from the group consisting of: {Homeland Security agency; and a cargo security agency}; wherein the cargo security agency is further selected from the group consisting of: {a consignee; a steamship line; a customs broker; a freight forwarder; and a terminal operator}. Customs has a variety of inspections on its “menu of options”: (I) Intensive exam: Container is unloaded (partially or fully) and cargo is physically inspected. (II) Tailgate exam: (usually done by Special Enforcement Teams or by U.S. Dept of Agriculture). The container is opened and government agency ‘looks’ inside (sometimes uses a canine) for evidence of drugs, stowaways, harmful plants or insects, obvious manifest mis-declarations (ie manifest calls for toys and the container is filled with computers). (III) VACIS Exam (Vehicle and Cargo Inspection System): customs runs the entire sealed container through an X-ray machine. (IV) Documents Required exam: Customs and Border Protection (CBP) reviews and inspects the commercial and shipping documents, but generally does not want to do an physical inspection of the cargo. FIG. 1 16 10 24 26 28 Referring still to , if, on the other hand, the test condition is not satisfied, that is none of the SST signals associated with at least one cargo container while in transit was detected, the flow chart has the following steps: (step ) classifying each cargo container that was not classified as a PT cargo container as a cargo container having a security status of an Expedited Release Procedure (ERP) cargo container; (step ) tracking and reporting position coordinates and the security status of each ERP cargo container to each appropriate party; and (step ) expediting the release procedure at least one border crossing or at least one customs entry point of each ERP cargo container. In general, each container is assumed to be equipped with a Smart Container Lock/Strongbox device comprising at least one active threat detector as disclosed in the patent application #2, at least one passive threat detector as disclosed in the patent application #1, a tracking/navigation/device, a reporting means, a programmable locking device, and a communication means having an access to the Internet (not shown). 14 10 18 FIG. 1 FIG. 1 In one embodiment of the present invention, the step ( of flow chart of ) of detecting at least one SST signal associated with at least one cargo container while in transit further comprises the following steps (not shown): using at least one threat detector to detect at least one SST signal associated with at least one cargo container while in transit; and using at least one detected SST signal to activate at least one RFID tag attached to at least one cargo container associated with at least one detected SST signal. An activated RFID tag is used to identify and locate a cargo (step of ) container that generated the detected SST signal and to classify the security status of each such cargo container as the Potential Threat (PT) cargo container. 20 26 FIG. 1 FIG. 1 In one embodiment of the present invention, the step of tracking and reporting position coordinates and security status of each PT cargo container to the appropriate party (step of ) further comprises the step of using a radio navigational equipment (not shown) to substantially continuously determine and track position coordinates of each PT container. Similarly, in one embodiment of the present invention, the step of tracking and reporting position coordinates and the security status of an ERP cargo container to each appropriate party (step of ) further comprises the step (not shown) of using a radio navigational equipment to substantially continuously determine and track position coordinates of each ERP container. In one embodiment of the present invention, the radio navigational equipment is selected from the group consisting of: {a GPS navigational processor; a GLONASS navigational processor; a combined GPS/GLONASS navigational processor; a GALILEO navigational processor; a Global Navigational Satellite System (GNSS) navigational processor; and a pseudolite navigational processor}. The Global Positioning System (GPS) is a system of satellite signal transmitters that transmits information from which an observer's present location and/or the time of observation can be determined. Another satellite-based navigation system is called the Global Orbiting Navigational System (GLONASS), which can operate as an alternative or supplemental system. The GPS was developed by the United States Department of Defense (DOD) under its NAVSTAR satellite program. A fully operational GPS includes more than 24 Earth orbiting satellites approximately uniformly dispersed around six circular orbits with four satellites each, the orbits being inclined at an angle of 55° relative to the equator and being separated from each other by multiples of 60° longitude. The orbits have radii of 26,560 kilometers and are approximately circular. The orbits are non-geosynchronous, with 0.5 sidereal day (11.967 hours) orbital time intervals, so that the satellites move with time relative to the Earth below. Generally, four or more GPS satellites will be visible from most points on the Earth's surface, which can be used to determine an observer's position anywhere on the Earth's surface. Each satellite carries a cesium or rubidium atomic clock to provide timing information for the signals transmitted by the satellites. An internal clock correction is provided for each satellite clock. 1 2 1 0 2 0 0 Each GPS satellite continuously transmits two spread spectrum, L-band carrier signals: an L1 signal having a frequency f=1575.42 MHz (approximately nineteen centimeter carrier wavelength) and an L2 signal having a frequency f=1227.6 MHz (approximately twenty-four centimeter carrier wavelength). These two frequencies are integral multiplies f=1,540 f and f=1,200 f of a base frequency f=1.023 MHz. The L1 signal from each satellite is binary phase shift key (BPSK) modulated by two pseudo-random noise (PRN) codes in phase quadrature, designated as the C/A-code and P-code. The L2 signal from each satellite is BPSK modulated by only the P-code. The nature of these PRN codes and accepted methods for generating the C/A-code and P-code are set forth in the document ICD-GPS-200: GPS Interface Control Document, ARINC Research, 1997, GPS Joint Program Office, which is incorporated by reference herein. The GPS satellite bit stream includes navigational information on the ephemeris of the transmitting GPS satellite (which includes orbital information about the transmitting satellite within next several hours of transmission) and an almanac for all GPS satellites (which includes a less detailed orbital information about all satellites). The transmitted satellite information also includes parameters providing corrections for ionospheric signal propagation delays (suitable for single frequency receivers) and for an offset time between satellite clock time and true GPS time. The navigational information is transmitted at a rate of 50 Baud. 1 2 1 2 A second satellite-based navigation system is the Global Orbiting Navigation Satellite System (GLONASS), placed in orbit by the former Soviet Union and now maintained by the Russian Republic. GLONASS uses 24 satellites, distributed approximately uniformly in three orbital planes of eight satellites each. Each orbital plane has a nominal inclination of 64.8° relative to the equator, and the three orbital planes are separated from each other by multiples of 120° longitude. The GLONASS satellites have circular orbits with a radii of about 25,510 kilometers and a satellite period of revolution of 8/17 of a sidereal day (11.26 hours). A GLONASS satellite and a GPS satellite will thus complete 17 and 16 revolutions, respectively, around the Earth every 8 days. The GLONASS system uses two carrier signals L and L with frequencies of f=(1.602+9 k/16) GHz and f=(1.246+7 k/16) GHz, where k=(1,2, . . . 24) is the channel or satellite number. These frequencies lie in two bands at 1.597-1.617 GHz (L1) and 1,240-1,260 GHz (L2). The L1 signal is modulated by a C/A-code (chip rate=0.511 MHz) and by a P-code (chip rate=5.11 MHz). The L2 signal is presently modulated only by the P-code. The GLONASS satellites also transmit navigational data at a rate of 50 Baud. Because the channel frequencies are distinguishable from each other, the P-code is the same, and the C/A-code is the same, for each satellite. The methods for receiving and demodulating the GLONASS signals are similar to the methods used for the GPS signals. As disclosed in the European Commission “White Paper on European transport policy for 2010”, the European Union will develop an independent satellite navigation system Galileo as a part of a global navigation satellite infrastructure (GNSS). The GALILEO system is based on a constellation of 30 satellites and ground stations providing information concerning the positioning of users in many sectors such as transport (vehicle location, route searching, speed control, guidance systems, etc.), social services (e.g. aid for the disabled or elderly), the justice system and customs services (location of suspects, border controls), public works (geographical information systems), search and rescue systems, or leisure (direction-finding at sea or in the mountains, etc.). GALILEO will offer several service levels, from open access to restricted access of various levels: (A) An open, free basic service, mainly involving applications for the general public and services of general interest. This service is comparable to that provided by civil GPS, which is free of cost for these applications, but with improved quality and reliability. (B) A commercial service facilitating the development of professional applications and offering enhanced performance compared with the basic service, particularly in terms of service guarantee. (C) A “vital” service (Safety of Life Service) of a very high quality and integrity for safety-critical applications, such as aviation and shipping. A search and rescue service that will greatly improve existing relief and rescue services. (D) A public regulated service (PRS), encrypted and resistant to jamming and interference, reserved principally for the public authorities responsible for civil protection, national security and law enforcement which demand a high level of continuity. It will enable secured applications to be developed in the European Union, and could prove in particular to be an important tool in improving the instruments used by the European Union to combat illegal exports and illegal immigration. The real needs of future GALILEO users need to be identified before the characteristics of the package of services can be decided. Studies have already been carried out in various standardization institutes and international bodies, such as the International Civil Aviation Organization, the International Maritime Organization, etc. The range of GALILEO services is designed to meet practical objectives and expectations, from improving the coverage of open-access services in urban environments (to cover 95% of urban districts compared with the 50% currently covered by GPS alone) which will benefit the 160 million private vehicles in Europe, or enabling the use of satellite navigation applications “indoors”, in buildings and even in tunnels, or indeed mobile telephone services based on identifying the caller's position. A pseudolite comprises a ground based radio positioning system working in any radio frequency including but not limited to the GPS frequencies and the ISM (industrial scientific medical) unlicensed operation band, including 900 MHZ, 2.4 GHz, or 5.8 GHz bands ISM bands, or in a radio location band such as the (9.5-10) GHz band. Pseudolites can be used for enhancing the GPS by providing increased accuracy, integrity, and availability. The complete description of the pseudolite transmitters in GPS band can be found in “Global Positioning System: Theory and Applications; Volume II”, edited by Bradford W. Parkinson and James J. Spilker Jr., and published in Volume 164 in “PROGRESS IN ASTRONAUTICS AND AERONAUTICS”, by American Institute of Aeronautic and Astronautics, Inc., in 1966. In ISM band, including 900 MHZ, 2.4 GHz, or 5.8 GHz bands, the user can own both ends of the ISM communication system. The ISM technologies are manufactured by Trimble Navigation Limited, Sunnyvale, Calif. Metricom, Los Gatos, Calif. and by Utilicom, Santa Barbara, Calif. Pseudolites as radio positioning systems can be configured to operate in ISM band. FIG. 1 FIG. 1 20 Referring still to , in one embodiment of the present invention, the step of tracking and reporting position coordinates and security status of each PT cargo container to an appropriate party (step of ) further comprises the step of generating an alarm signal (not shown) when at least one container was identified as a PT container while in transit. This step provides some early warning signal to a crew of the cargo ship while in transit. 20 FIG. 1 In one embodiment of the present invention, the step of tracking and reporting position coordinates and security status of each PT cargo container to an appropriate party (step of ) further comprises the following steps (not shown): checking at least one generated SST signal to verify the security status of at least one PT container while in transit; and if at least one SST signal is confirmed to be a false positive SST signal, changing the security status of at least one PT container associated with the false positive SST signal to an indefinite security status (ISS) cargo container. This step provides an extra assurances that the security status of a PT container will be either confirmed, or changed to an ERP status. 26 FIG. 1 Similarly, in one embodiment of the present invention, the step ( of ) of tracking and reporting position coordinates and security status of an ERP cargo container to an appropriate party further comprises the steps (not shown) of substantially continuously checking the security status of each ERP container while in transit by using at least one threat detector to detect a previously undetected (PU) SST signal; and if at least one ERP container generates a previously undetected (PU) SST signal, changing the security status of at least one ERP container associated with the PUSST signal to an indefinite security status (ISS) cargo container. In one embodiment of the present invention, more specifically, the step of changing the security status of at least one ERP container associated with the previously undetected (PU) SST signal to an indefinite security status (ISS) cargo container further comprises the following steps (not shown): activating at least one RFID tag associated with the PUSST signal to indicate the change in the classification of at least one cargo container from the ERP security status to the ISS security status; and generating an alarm signal when at least one ERP container changes its security status from the ERP security status to the ISS security status. 20 FIG. 1 Based on the disclosed above specific steps, more broadly, in one embodiment of the present invention, the step of tracking and reporting position coordinates and security status of each PT cargo container to an appropriate party (step of ) further comprises the step (not shown) of substantially continuously updating and reporting an electronic identity of each PT container. In one embodiment of the present invention, the electronic identity of a PT container comprises a plurality of parameters selected from the group consisting of: {a security status of the PT container; an alarm event associated with the PT container; an electronic transmission to each appropriate party of an alarm event associated with the PT container; and a change in security status of the PT container due to a false positive SST signal to an ISS status}. 26 Similarly, in one embodiment of the present invention, the step () of tracking and reporting position coordinates and security status of an ERP cargo container to each appropriate party further comprises the step (not shown) of substantially continuously updating and reporting an electronic identity of the ERP container. In one embodiment of the present invention, the electronic identity of an ERP container comprises a plurality of parameters selected from the group consisting of: {a security status of the ERP container; a change in security status of the ERP container due to a PUSST signal; an alarm event associated with the PUSST signal; and an electronic transmission to each appropriate party of the alarm event associated with the PUSST signal}. 20 26 FIG. 1 FIG. 1 In one embodiment of the present invention, the step of tracking and reporting position coordinates and security status of a PT cargo container to each appropriate party (step of ) further comprises the step (not shown) of reporting the position coordinates of the PT container by using a reporting means. Similarly, in one embodiment of the present invention, the step ( of ) of tracking and reporting position coordinates and security status of an ERP cargo container to an appropriate party further comprises the step (not shown) of reporting the position coordinates of each ERP container by using a reporting means. The reporting means is selected from the group consisting of: {a cellular phone; a radio; a TV transmitter; a satellite phone; a cable; and a website/portal of the ERP website-based system}. Homeland Security with the Coast Guard is currently using ORBCOMM's satellites for ocean vessel tracking in some way. The same ORBCOMM's satellites technology can be used in the present invention for reporting purposes. ORBCOMM, located at 21700 Atlantic Boulevard, Dulles, Va. 20166 USA, is a satellite data communications company that provides innovative satellite communication services at down to earth prices. The satellite-based network provides customers around the world with reliable global coverage and the added value of tailored application service and support. The ORBCOMM System uses low-Earth orbit (LEO) satellites to provide cost-effective tracking, monitoring and messaging capabilities to and from anywhere in the world. Similar to two-way paging or e-mail, the ORBCOMM's system is capable of sending and receiving two-way alphanumeric packets of data. These short, economical messages increase the efficiency of remote operations by making critical information readily available, often from areas beyond the geographic and economic reach of traditional systems. FIG. 2 FIG. 1 40 28 In one embodiment of the present invention, is a flow chart that details the step ( of ) of expediting the release procedure at least one border crossing or at least one customs entry point of an ERP cargo container. 28 42 44 42 46 50 FIG. 1 In one embodiment of the present invention, more specifically, the step ( of ) further comprises the following steps: (step ) compiling a set of security data including a security status for each container while in transit; (step ) analyzing the set of security data compiled in the step (); and if the test condition is satisfied, that is, if the set of security data indicates an ERP status for each container in the cargo shipment, making a determination of whether the cargo shipment including the plurality N of the ERP cargo containers should be immediately released into commerce (step ). 48 40 52 FIG. 2 If, on the other hand, the test condition is satisfied, that is the set of security data indicates a change from ERP status to PT status for an integer K number of the ERP containers, the flow chart of includes the step of making a determination of whether the cargo shipment including a plurality (N-K) of the ERP cargo containers and a plurality K of containers with indefinite security status (ISS) should be inspected before the cargo shipment is released into commerce (step ). FIG. 3 60 In one embodiment of the present invention, illustrates a flow chart that illustrates the step of making the determination of whether the cargo shipment including the plurality (N-K) of ERP cargo containers and the plurality K of ISS containers should be inspected before the cargo shipment is released into commerce in more details. 60 62 64 FIG. 3 inspected More specifically, the flow chart of includes the following steps: (step ) setting a set of threshold numbers; and (step ) determining a number of containers Nto be inspected depending on the relationship between K number of ISS containers and each threshold number. 60 62 64 threshold1 threshold2 threshold3 threshold(L−1) thresholdL} inspected In one embodiment of the present invention, more specifically, the flow chart includes the following steps: (step ) setting a set of threshold numbers {N; N; N; . . . N; N}; L is an integer; and (step ) determining a number of containers Nto be inspected depending on the relationship between K number of ISS containers and each threshold number. inspected threshold1 inspected threshold1 threshold2 inspected threshold2 threshold3 inspected threshold(L−1) thresholdL 66 68 70 1 72 In one embodiment of the present invention, Nis equal to zero if K number is less than or equal to the first threshold number N(box ); Nis equal to the first threshold number Nif K number is less than or equal to the second threshold number N(box ); Nis equal to the second threshold number Nif K number is less than or equal to the third threshold number N(box ); and Nis equal to the (L−) threshold number Nif K number is less than or equal to the last threshold number N(box ). FIG. 1 28 Referring still to , in one embodiment of the present invention, the step () of expediting the release procedure at least one border crossing or at at least one customs entry point of each ERP cargo container further comprises the step (not shown) of using a secure ERP website-base system to expedite the release procedure at least one border crossing or at least one customs entry point of each ERP cargo container. In one embodiment of the present invention, the secure ERP website-based system is configured to collect and to process a set of combined data selected from the group consisting of: {a set of normal commercial transaction data; a set of transport data; a set of RFID data; a set of satellite navigational tracking data; a set of threat signal data; and a set of security status data}. In one embodiment of the present invention, the set of combined data is a collection of inputs from a supply chain selected from the group consisting of: {each container entering at least one border crossing or at least one customs entry point; the customs at least one destination country; a network of shippers; a network of consignees; a network of forwarders; a plurality of terminals; and a network of carriers}. In one embodiment of the present invention, the step (not shown) of using the secure ERP web-site based system to expedite the release procedure at least one border crossing or at least one customs entry point of each ERP cargo container further comprises the following steps: utilizing the set of data selected from the group consisting of: {the RFID data; the set of satellite navigational tracking data; and the set of threat signal data} to indicate a physical location of at least one ISS cargo container that will be submitted for customs clearance within a predetermined distance and time of arrival from a port of discharge and/or port of entry; and using the secure ERP website-based system configured to enable the preparation and population of a set of ERP data documentation for the expedite release procedure for each ERP cargo container including a set of data selected from the group consisting of: {a set of commercial invoices; a set of packing lists; a set of manifests; a set of Bills of Lading; a set of commercial documents including a certificate of origin, manufacturer safety data sheets, pre-shipment cargo inspection reports, documentary collections, quota certificates, solid wood packing declarations; and a set of customs entry data}. In one embodiment of the present invention, the current location of each ISS cargo container that generated at least one previously undetected SST (PUSST) signal is posted on the secure ERP website. In this embodiment of the present invention, a predetermined number of the ISS cargo containers in the cargo shipment should be physically inspected at least one border crossing or at least one customs entry point or at port of customs entry. On the other hand, in this embodiment of the present invention, each ERP cargo container is immediately released into the stream of commerce without being physically inspected at the border crossing or at least one customs entry point. FIG. 4 80 In one embodiment of the present invention, is a flow chart that illustrates the usage of the secure ERP website-based system configured to enable the preparation and population of the set of ERP data documentation for the expedite release procedure for each ERP cargo container in more details. 80 82 84 86 More specifically, the flow chart includes the step of securing a set of ERP-enabling data collected on a website/portal of the secure ERP website-based system (step ); the step of disseminating the set of ERP-enabling data to an appropriate party (step ); and the step of establishing a shipper verification system that provides a positive assurance that a new cargo shipment is secure throughout the entire supply chain (step ). In this embodiment of the present invention, the ERP-enabling data is selected from the group consisting of: {a consignee data including a customs broker data; a shipper data; a carrier data including a port/terminal data from the port of departure; and a customs/Automated Brokerage Interface (ABI)/Other Governmental Agency (OGA) data}. In this embodiment of the present invention, the ERP-enabling data comes from each appropriate party located anywhere in the world. In this embodiment of the present invention, an appropriate party is selected from the group consisting of: {the consignee; a customs broker; the shipper; the carrier; the port and terminal operator; the customs; a designated agent of the consignee; a designated agent of the customs broker; a designated agent of the shipper; a designated agent of the carrier; a designated agent of the port and terminal operator; and a designated agent of the customs}. FIG. 5 90 In one embodiment of the present invention, illustrates a flow chart of establishing the shipper verification system in more details. 94 96 FIG. 5 FIG. 5 In order to provide positive assurance that the cargo is secure throughout the entire supply chain, it should be verified as being ‘safe’ before the container is sealed. The present invention establishes a procedure that would be endorsed or mandated by the Customs and Border Protection (CBP), and that would establish a global network of authorized agents that would complete an initial verification visit on a shipper. This initial verification procedure would positively verify that the would-be shipper has established safety procedures that conform to government standards such as C-TPAT (Customs and Trade Partnership Against Terrorism) (step of ), and would nominate an employee of the company to be the named security officer or empowered person that is responsible for supervising loading and declaring containers safe before they are sealed (step of ). 98 FIG. 5 The agent would enter the verification data into a database (step of ). This data could be linked to a unique shipper id code such as the Manufacturer ID Code. The shipper would keep records of the verification process. Once the shipper is verified and established in the database, he will be a “known” shipper to U.S. Government. The appointed network of agents will be entitled and mandated to make periodical surprise visits at the shipper to ensure ongoing compliance with the program. 100 FIG. 5 Assuming the shipper is verified, he will load the cargo and declare if it is safe (step of ). He will then immediately seal the container with a smart container seal. Containers that arrive at the border with seal intact and no alarm events that occurred in transit could be fast tracked through the clearance process. FIG. 5 90 94 96 Referring still to , more broadly, the flow chart includes the following step: (step ) establishing a global network of authorized unprejudiced agents that could complete an initial verification on each particular shipper to make sure that the shipper has established a safety procedure that conforms top the USA government, or to a set of international standards yet to be determined. At the next step , an employee of the company is nominated to be named a security officer, or an ‘empowered person’ that is responsible for supervising loading of each new cargo shipment and declaring each cargo container safe before it is sealed. The security officer confirms that the documentation is correct and no smuggling is intended. The security officer also confirms that each cargo container is sealed. 90 98 FIG. 5 The flow chart (of ) further includes the step of entering the verification data linked to a unique shipper ID code into a verification database by the authorized unprejudiced agent (step ). The unique shipper ID code is similar to or is directly tied to the customs concept of a Manufacturer ID code. The shipper is enrolled into a database of “known” shippers once the shipper ID code has been entered into the verification database. The verification database and the known “shippers” database are accessible via the secure ERP website-based system by a user having a proper registered username and a proper registered password. 90 100 FIG. 5 Finally, the flow chart (of ) includes the steps of declaring the cargo safe from the SST signals to Homeland Security, conforming the cargo with the set of issued commercial documentation, and initiating the physical movement of the cargo after the shipper is verified (step ). FIG. 6 110 In one embodiment of the present invention, depicts a flow chart that details the usage of the secure ERP website-based system configured to enable the preparation and population of the set of ERP data documentation for customs entry transmission for each ERP cargo container. 110 114 The flow chart comprises the step of obtaining an account by a party who is responsible for payment and coordination of the cargo shipment with a website/portal provider of the secure ERP website-based system and or/obtaining an account by the party who is responsible for payment and coordination of the cargo shipment directly with customs at the country of destination (step ). The party who is responsible for payment and coordination of the cargo shipment is selected from the group consisting of: {a consignee; a shipper; or a third party that is responsible for the payment and coordination of the cargo shipment}. 116 110 118 120 122 124 126 128 130 At the next step , the flow chart comprises the step of logging in into the obtained account by the party who is responsible for payment and coordination of the cargo shipment to generate a new cargo shipment that is identified by a unique cargo shipment number. At the step , a purchase order is generated by the party who is responsible for payment and coordination of the cargo shipment. At the step , commercial invoice is generated by the shipper. The step is a step of generating a manifest transmission & Bill of Lading (B/L) info by the carrier and/or a freight forwarder. At the step , the review of Entry Data is performed by the customs broker and/or an importer of record and by the party who is responsible for payment and coordination of the cargo shipment to correct any possible errors or to make clarifications before transmission. The step is the step of generating a signal to trigger transmission of customs entry by the website/portal of the ERP website-based system when a cargo container is within a predetermined length of time away from arrival at a physical border. At the step , the customs release data is disseminated to appropriate parties by customs via the website/portal of the ERP website-based system, whereas at the step , the cargo release data is disseminated by the carrier and or by the freight forwarders to each appropriate parties via the website/portal of the ERP website-based system. 132 Finally, at the step , the system reverts to the standard methods of submission of customs entry and documents (via traditional ABI transmission or by submitting hard copies of actual documents) to customs in the event that any such data is missing, or rejected, or if customs or other governmental agency is to more closely review the shipping and commercial documents. The standard methods of submission of customs entry and documents include using a standard customs rejection procedure and filing of a correction procedure if any such data is missing or rejected. In one embodiment of the present invention, an account of the party who is responsible for payment and coordination of the cargo shipment is linked to a set of data selected from the group consisting of: {a predetermined PIN # and/or password; a Federal Tax ID# of the party who is responsible for payment and coordination of the cargo shipment; a Bond type; a surety code; a primary delivery warehouse; a set of delivery locations; a list or database of the Harmonized Tariff numbers for all imported goods for the party who is responsible for payment and coordination of the cargo shipment; and a set of relevant customs binding rulings}. Certain information is not needed or used by the shipper and is typed in Italics. For Example: SKU numbers; Importer's account number including Federal Tax ID, the consignees federal tax number, delivery address, binding ruling number. Consignee or importer might not want the shipper to know where the goods are going or who they will ultimately be sold to. FIG. 7 140 In one embodiment of the present invention, is a flow chart that illustrates the step of generating a purchase order by the party who is responsible for payment and coordination of the cargo shipment in more details. 144 At the step , the PIN# is used to generate the purchase order based on a set of data selected from the group consisting of: {a supplier contact info; a consignee contact info; a number of pieces being purchased; a purchase price per item; a currency of transaction; customs harmonized Codes for each item being purchased and/or shipped; Commercial Bill of Lading (B/L) Description of goods; Purchaser's sku #s of the goods; date of purchase order; INCO Terms; a desired mode of transport; a desired carrier; related parties (yes/no); an Importer's account number including Federal Tax ID#; binding ruling number; an ach payment type; OGA filing codes; and final delivery address and contact info}. FIG. 7 146 148 150 Referring still to , at the next step, the PIN# is used to control access to the new cargo shipment and to grant access to the new cargo shipment to a set of appropriate parties selected from the group consisting of: {at least one shipper; at least one custom broker; at least one forwarder; and at least one carrier} (step ). The PIN# is also used to update a set of account data selected from the group consisting of: {an update to delivery address; an update to customs entry; an update in value; and other relevant updates that may occur while the cargo shipment is enroute} (step ). Finally, an audit trail is established with each update of the account data to specifically identify a party which is responsible for the relevant updates, or to specifically identify a party which authorized the relevant updates (step ). In one embodiment of the present invention, the step of generating a commercial invoice by the shipper further comprises the step (not shown) of confirming a set of data selected from the group consisting of: {a supplier contact info; a consignee contact info; a number of pieces being shipped; a sales price per item and a total price; a currency of transaction; a commercial Bill of Lading (B/L) description of goods; seller's sku #s of the goods; a date of invoice; INCO Terms; a mode of transport; a type of packaging units of measure; a SWP declaration; a net weight/gross weight/volume; a number of containers; a type of equipment; a seal number; a vessel; a voyage #; a SCAT code; BL#s; and a country of origin per item}. In one embodiment of the present invention, the step of generating a manifest transmission & Bill of Lading (B/L) info by said carrier and/or a freight forwarder further comprises the following steps (not shown): sending a manifest to Customs and Border Protection (CBP) and initiating data for Bill of Lading (B/L) and Arrival Notice by specifying a set of data selected from the group consisting of: {a port of Lading: a port of Unlading; a place of delivery; IT #s and dates; and bonded carrier details}; and confirming arrival of said cargo shipment at loading pier by using a Smart Container lock/Strongbox device. FIG. 8 160 In one embodiment of the present invention, illustrates a flow chart that shows the step of generating a signal to trigger transmission of customs entry by the website/portal of the ERP website-based system when a cargo container is within a predetermined length of time away from arrival at a physical border. 160 162 164 166 FIG. 8 In one embodiment of the present invention, the flow chart of comprises the following steps: (step ) confirming that the cargo shipment of containers is nearing a physical border crossing or is nearing customs entry point by using the navigational and the container ID technology; (step ) checking a plurality of alarm events associated with the container cargo shipment; and (step ) compiling a set of customs entry relevant data selected from the group consisting of: {a customs location code at port of entry; a central exam site; values and weight calculations per Customs requirements; freight charges; statistical quantities; manufactures ID Code; units of measure; Duty; MPF; HMF; CVD; a Bond #; and an ACH Payment type}. In one embodiment of the present invention, the step of checking the plurality of alarm events associated with the container cargo shipment further comprises the step (not shown) of increasing the frequency of periodically checking alarm events associated with the SST signals when the cargo ship approaches an arrival port. For example, the user gets to define how often a data sample is taken. The sample rate can be taken from a variety of options, starting with once per day, but leaving open the options to tailor the testing based on proximity to harbor, port, or land. In another embodiment of the present invention, the step of checking the plurality of alarm events associated with the container cargo shipment further comprises the step (not shown) of programming the frequency of periodically checking alarm events associated with the SST signals to take into account nearing approach to a harbor. For example, one would like to include the programmable capability of altering the test sample rate, or period, to take account of a nearing approach to a harbor where further unloading and possibly additional testing might be performed. The tests could be done on a more regular basis as one gets to prescribed distances from the harbor: 10 miles, 5 miles, 2 miles 1 mile, 0.5 mile, 0.3 mile, 0.1 mile. So, while at sea, the test are done at the rate of “one test per week,” the rate of testing would increase to “one test per day” as the ship gets to within 100 miles of a destination port. In one more embodiment of the present invention, the step of checking the plurality of alarm events associated with the container cargo shipment further comprises the step (not shown) of unloading of additional testing to be performed as the ship is within the 12 mile international water boundary limit of any country, whether a destination country or not. Indeed, additionally, tests should be performed more often as the ship gets to within the 12 mile international water boundary limit; i.e., gets to within territorial waters of any country, whether a destination country or not. FIG. 9 170 In one embodiment of the present invention, depicts a flow chart that details the step of disseminating the customs release data to appropriate parties by customs via the website/portal of the ERP website-based system. 170 174 176 178 180 In one embodiment of the present invention, the flow chart further comprises the following steps: (step ) checking whether customs has indicated that the cargo shipment is cleared and able to be released into commerce; (step ) checking Customs 7501 form; wherein the Customs 7501 form known as the ‘Entry Summary’ details a set of substantially significant data that is required to be submitted to customs prior to release; (step ) checking Customs 3461 form; wherein the Customs 3461 form is signed by customs or a responsible broker upon release of goods from customs; and (step ) initiating any other liquidation data or administrative messages. In one embodiment of the present invention, the step of disseminating the cargo release data by the carrier and or by the freight forwarders to an appropriate party via the website/portal further comprises the step (not shown) of disseminating the cargo released data in a method similar to the current Automated Manifest System (AMS). A container is loaded at a factory in Hong Kong. The warehouse manager or responsible party goes to the website and fills out an online form. The form requires the following data points: (1) The shipper's (loading company) company name, address, postal code, telephone, fax, email, general contact name. (2) Full name of the person taking responsibility to enter in “Load Code”. (3) Commodity of cargo being shipped (ideally it would use the first 8 or 10 digits of the Harmonized Tariff Customs Code, but in the beginning it could just be a written description such as “automotive engine parts”). (4) Intended loading port (i.e. Hong Kong). The port would be selected from a pull down menu that lists all the world's ports. The idea of using the pull down menu for the ports is to standardize the data. One doesn't want some warehouse guy in Hong Kong getting Portland, Oreg. and Portland, Me. confused. There is an additional benefit of this particular implementation in that U.S. Customs already recognizes every port in the world as either 5 digits (for a foreign port code) or 4 digits (for a domestic USA port code). This information can eventually be used to drive the manifesting process. Currently, ocean carriers are required to report their entire manifests to U.S. Custom 48 hours before they depart the foreign port of lading. (5) Intended discharge port (i.e. Los Angeles). The port would be selected from a pull down menu that lists all the world's ports. (6) The consignee's (receiving company) company name, address, telephone, fax, email, contact name. (7) Container number. (8) Seal number. (9) Loading date and local time that container is sealed. Once this information is keyed in to the website, the website will provide a valid container description LOAD CODE. This load code is sent to the Automated Export System (AES) (via key pad, palm pilot, blackberry, cellular, etc) and activates the Smart Container Lock/Strongbox that locks the container. It is important to note that the shipper will usually have all the details of these data points already on hand when they are loading a container. They need the info anyway to generate their commercial invoices and other documents. Destination interface records UNLOAD CODE, local time and GPS coordinates, at time of deactivation. The standardization of data points will serve two purposes: 1. It will help sell the product to the carriers as an efficiency point. 2. This will eventually simplify the entire shipping process and will ultimately bring the biggest change to international commerce since the advent of containers. The Smart Container Lock/Strongbox technology should be used to ultimately store and transmit all data points required to drives the entire documentation process of international shipping, including generating commercial documents, manifesting, customs declarations, customs clearances, and Bills of Lading generation. 1. Dispatcher logs onto ERP website and creates a new trip log. 2. Dispatcher enters all required trip information, including destination GPS coordinates 3. Dispatcher retrieves Smart Container lock/Strongbox device from inventory of available units and ensures it is fully charged—either new AA batteries or fully recharged in the re-charger unit. 4. Dispatcher enters unique security code identifier into the system to synchronize Smart Container lock/Strongbox devices. 5. Dispatcher sends access code to Smart Container lock/Strongbox device and identification code for cargo shipment to destination via secure e-mail—receiver can now track cargo shipment progress on the web and set notification parameters ( . . . e.g. notify when load is 100 km away . . . ). 6. Warehouseman attaches Smart Container lock/Strongbox device to load and locks it—locking event is transmitted by the Smart Container lock/Strongbox device to the ERP website via cellular message. 7. Driver is given entry code/smart card and 800 number to call in the event of a need to get authorization for entry. 8. Uneventful trip: Smart Container lock/Strongbox device transmits regular location signals throughout trip and transmits positive notification of delivery event when it reaches the GPS coordinates indicated for the destination; Smart Container lock/Strongbox device is opened using access code and Smart Container lock/Strongbox device transmits event that it has been opened. 9. Opening event relieves shipper of product liability and triggers invoice generation. 10. Smart Container lock/Strongbox device is recharged by either inserting new batteries (AA scenario) or by placing in recharging unit, and is available for either return load, redeployment by the receiver, or return to the shipper via courier. 11. Trip summary report is made available on the web for the shipper and is combined into monthly summary reports for all shipping activity by the shipper, enabling statistics such as average length of haul, average transit time, average speed, average # stops/events/openings etc. 1. Customs inspection: Driver enters access code, Smart Container lock/Strongbox device opens and transmits opening event time and location. Driver closes Smart Container lock/Strongbox device after inspection and Smart Container lock/Strongbox device transmits closing event time and location. 2. Unauthorized tampering event: Smart Container lock/Strongbox device transmits alarm event, time and location. Change of trip plan (requires signal reception capability on Smart Container lock/Strongbox device): Dispatcher enters new destination information and GPS coordinates into ERP website. Command center transmits signal to Smart Container lock/Strongbox device that changes GPS coordinates for destination. Smart Container lock/Strongbox device sends confirmation of receipt of message and time and location of change message being received. 3. Low power: Smart Container lock/Strongbox device sends low power alarm message at the predetermined level of battery depletion with location and time. A. Customs Fast-Tracking. 1. Shipper is pre-certified and pre-cleared for having ISO9000 quality standards and security standards. 2. Customs is notified by the ERP website that the cargo shipment has begun and the expected border crossing point. 3. The Smart Container lock/Strongbox device sends a signal to the web that alerts customs when it is 25 km from the border. 4. Customs gives fast-track green light to the cargo shipment to proceed through the pre-clearance lane if it has clear evidence that the load has not been opened since leaving the shipper's dock. B. Terminal processing. 1. Smart Container lock/Strongbox device is attached to a container at the shipper's loading dock. 2. Truck approaches a rail intermodal terminal. 3. Smart Container lock/Strongbox device signals arrival to ERP website, which transmits load information directly to the terminal gate. 4. Terminal gate directs truck to location for drop-off. A) External Lock/Strongbox Screen should display: 1. Unit working and communicating with Automated Export System (AES)—(yes/no). 2. Battery OK/Not OK. 3. Container number. 4. Seal number. 5. Seal integrity (still intact yes/no). 5. Alerts have been raised (yes/no). 6. Active alert status light on the external unit. i.e. a strobe or blinking light if the unit is in Alert Mode. 7. Monitoring unit displaying: Container number/Seal Number. 8. Seal integrity (still intact yes/no);—Alerts have been raised (yes/no). 9. Load Code accepted/not accepted (load code should be encrypted so that unit only shows asterisks). The external unit should have a keypad (10 digits plus enter) to enter in LOAD CODE and UNLOAD CODE. Benefits: It does not require the loading warehouse or unloading warehouse to have any special equipment like a palm pilot or blackberry. 11. User interface:—Accessable via website. B) Registration Users should register and get a pin. Different levels of security access are granted at time of registration. For example, (a) carriers will need some level of access for all containers in their fleet; (B) shippers will need access to LOAD CODE; (c) consignees will need access to UNLOAD CODE; (d) customs will need access to ‘see’ every container and to override code. Every time a particular container is queried, the system records the pin of the person doing the query. One can only query containers that pass some sort of cross reference test. For instance, when one registers for a pin, one has to key in one's company name. One's pin can only query containers that are being shipped to/from one's company. Carrier pins can only query containers in their fleet. Customs can query any container. The website will allow GPS/RFID real time tracking of unit. This information can eventually be linked to a carrier's website or port terminal website in order to see planned movements. C) Customs Override.Customs and other governmental agencies should have a general override code that changes daily and is pulled down from the website. each customs officer is assigned their own personal pin. To get their personal override code for the day, they have log into the website and enter their pin. They are then provided with a code that can allow the external lock unit on all containers to be accessed for that particular 24 hour period. The unit would of course record the access and the pin and code that was used to access. Alerts can be sent if a customs override code was being used in New York but the inspector logged in that day in Los Angeles. Another aspect of the present invention is directed to a system for expediting a release procedure of at least one cargo container at least one border crossing or at least one customs entry point by detecting each statistically significant threat (SST) signal associated with at least one cargo container while in transit, and by tracking and reporting to each appropriate party the position coordinates and a security status of each cargo container that generated at least one SST signal. The appropriate party is selected from the group consisting of: {Homeland Security agency; and a cargo security agency}; wherein the cargo security agency is further selected from the group consisting of: {a consignee; a steamship line; a customs broker; a freight forwarder; and a terminal operator}. In one embodiment of the present invention, the system comprises (not shown): (A) a means for detecting at least one SST signal associated with at least one cargo container while in transit; wherein each SST signal generates a threat signal having a threat probability higher than a predetermined threshold; (B) a means for identifying each cargo container that generated at least one SST signal; a means for classifying the security status of a cargo container as a Potential Threat (PT) cargo container; and a means for classifying the security status of a cargo container as an Expedited Release Procedure (ERP) cargo container; C) a means for tracking and a means for reporting position coordinates and the security status of each PT cargo container to each appropriate party; (D) a means for tracking and a means for reporting position coordinates and the security status of each ERP cargo container to each appropriate party; and (E) a means for expediting the release procedure at least one border crossing or at least one customs entry point of each ERP cargo container. The disclosed above, secure ERP website-based system achieves the following goals: (A) To create a single source for data collection, transmission, review. (B) To expand and improve the C-TPAT, Automated Commercial Environment (ACE), Container Security Initiative (CSI), Operation Safe Commerce (OSC), and other U.S. Customs programs. (C) To advance the realization and utilization of “Smart Container” Technology. (D) To allow governments to conclusively pre-determine if a container needs to be physically inspected and fast track release of cargo into commerce. (E) To streamline, standardize, and automate the documentation processes and prevent errors. (F) To keep the balance between gathering of intelligence and flow of commerce. (G) To expedite customs and OGA (Other governmental agency) entry processing. (H) To reduce re-keying of data and create efficiencies. (I) To create an audit trail of documentation. (K) To allow consignee to ‘drive’ data on customs entry (Informed Compliance), Bills of lading, Arrival notices. (J) To allow customs and OGAs to verify redundancy in data and to better identify at-risk cargo shipments. (L) To eventually allow electronic nesting of information from supply chain and produce “Census Data” for customs analysis. (M) To eventually tie in RFID technology with container manifesting and clearance processes. (N) To allow Customs to “Fast Track” C-TPAT clients and their cargo shipments. (S) To interface with logistics and enterprise resource systems to provide greater visibility into supply chains and inventories. (T) To give importers and exporters greater planning and control of costs. The implementation of the disclosed above, secure ERP website-based system (1) First target will be repetitive ocean cargo shipments and NAFTA truck border crossings for Pre-Arrival Processing System (PAPS) and for the Free And Secure Trade (FAST) programs. (2) The first step-generation of the commercial documentation. (3) The next step-Manifest generation. (4) The following step-generation of the Bill of Lading (B/L) and generation of the Arrival notices. (5) The next step-obtaining the Customs clearance. (6) The following step-obtaining clearance from Other Governmental Agencies. (7) The next step-to guarantee the trade financing. (8) The system of the present invention could be used as a model for other collaborative documentation process applications. The foregoing description of specific embodiments of the present invention has been presented for purposes of illustration and description. They are not intended to be exhaustive or to limit the invention to the precise forms disclosed, and obviously many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the invention and its practical application, to thereby enable others skilled in the art to best utilize the invention and various embodiments with various modifications as are suited to the particular use contemplated. It is intended that the scope of the invention be defined by the claims appended hereto and their equivalents. Glossary ABI (automated Brokerage Interface): The standard interface that most customs brokers use to electronically transmit and receive data with Customs and Border Protection. ACH (Automated Clearing House): The customs sponsored program used by customs brokers and importers for electronic payment (draft) of duties.ACH Payment type: each customs entry should stipulate how duties will be paid to Customs. (via broker ACH account, via an importers ACH account, direct check, etc. ADD (Anti Dumping Duties): A punitive duty amount that is levied by customs on particular items from particular countries of origin (or even particular suppliers) that are determined by U.S. Government to be ‘dumping’ their products in the U.S. market at levels below costs of production. Bill of Lading: A legal transport document that specifies what is being shipped, from where, to where, by whom, and for whom. Specific limits of liability can be detailed on the Bill of Lading. Binding Rulings: A determination from CBP headquarters that specifies the correct Harmonized Tariff number (and therefore duty level) for an item. Without a binding ruling, the classifications are subject to the interpretation of local customs officials and duty levels can theoretically change from port to port. Bonded Carrier: A carrier that is legally allowed and insured to carry goods that have not yet cleared customs. Border: There is a physical border that we are all familiar with. But there is also the concept of goods traveling to interior points in the country and clearing customs upon arrival at destination. (ie goods can clear customs in Chicago, Memphis, Boise, Atlanta, etc. . . . ) Carrier: An ocean line, airline, rail line, barge, trucker, or freight forwarder that issues a Bill of Lading. Central Exam Site: each customs port has designated central exam sites to which goods are transported for intensive customs inspections. Consignee: The party to which goods are consigned on a Bill of Lading. (Usually the Importer) Country of origin: The country where goods are manufactured. (This is sometimes different from the country from which they are exported.) Duties are calculated based on the country of origin. (occasionally goods may be assembled from components of various countries. In these cases, the importer, broker, or customs will follow set procedures to determine what is the legal country of origin for the customs declaration. C-TPAT: Customs and Trade Partnership Against Terrorism. A CBP sponsored outreach such program that is designed to help importers secure their entire supply chain (including suppliers, transport vendors, warehouses, carriers, etc.) The Customs Service has developed a validation process to ensure that C-TPAT participants have implemented the security measures outlined in their Security Profile and in any supplemental information provided to Customs. The validation process will be conducted jointly by U.S. Customs personnel and a representative of the industry participant. The validation will focus on the material in the participant's C-TPAT security profile and any related materials provided by the participant and will be conducted under the guiding partnership principles of C-TPAT. CBP: Customs and Border Protection. Customs 3461 form: A customs form that is signed by customs or the broker upon release of goods from customs. Customs 7501 form: Also known as the ‘Entry Summary’. The 7501 details most (sometimes all) of the data that is required to be submitted to customs prior to release. Customs Bond or Surety: Every formal customs entry should be accompanied by a bond. The bond provides insurance to customs that duties will be paid even if the importer defaults. Customs bonds can be a ‘Continuous Bond’ which is applicable for 365 days, or a ‘Single Entry Bond’ which is good only for one particular cargo shipment. Customs broker: A person or a company that is licensed by CBP to handle customs related activities. Customs release: The status when imported goods are released by customs in order to enter commerce. The release can be transmitted electronically (via ABI), or hard copies may be provided by customs. In some cases, both electronic and hard copies are provided CVD (Countervailing Duty: a punitive level of customs duties that is designed to discourage imports of specific items. Usually a result of trade war. Duty: Government tax on imported goods. Entry port: The port at which customs entry is declared. Not necessarily the port at which a cargo shipment crosses the physical border into a country. Freight Forwarder or Forwarder: A transport broker that coordinates transport. A forwarder will often issue their own Bills of Lading and will therefore become a ‘carrier’ even if they do not operate the assets on which the goods are transported. Freight (carrier) Release: The status when goods are customs cleared and the carriers and forwarders have removed any holds or restrictions on the cargo. Freight release typically comes when the fees of all transport and warehouse providers have been satisfied. Harmonized code (Harmonized Tariff Code, HTSUS, Customs classification code: The Customs code that is used to provide a specific description (and therefore duty level) for every imported item. HMF (Harbor Maintenance Fee): A customs fee that is charged on inbound ocean cargo shipments. The fee is approx 0.125% of the commercial value of the goods and is used to keep up the maintenance of the ports. Importer Identification number: A unique number that is assigned to each importer. For commercial importers the number is usually the company's federal tax ID. For personal imports, it is usually a social security number. INCO Terms: Incoterms are standard trade definitions most commonly used in international sales contracts to signify where and when goods transfer in ownership and risk from seller to buyer. They are devised and published by the International Chamber of Commerce. ISO 900—Informed Compliance: A customs program where the importer is expected and legally required to understand and comply with customs regulations. The initial Quality Assurance Program of LSS was based on the quality management principles of ISO9000. The ISO system started after the conclusion of World War II, as European nations sought to reestablish sound economic relations with one another. Realizing they needed to develop standard ways of conducting business, they used military procurement procedures as their model. Soon, the International Organization for Standardization (ISO) was formed, comprised of approximately 100 industrialized nations. The ISO, headquartered in Geneva, Switzerland, is responsible for establishing a large number of standards. IT (Immediate Transport) document: A document that allows goods to move within the United States before it is customs cleared. (Example would be an imported container that discharges a vessel in Los Angeles and moves in-bond under an I.T. to Memphis. It clears customs in Memphis. Liquidation: The status of customs entry when customs basically agrees not to change the duties (There are important exceptions to this term.) Location Code: A unique alpha numeric code that CBP designates for each customs bonded facility. The code is included on customs entry to specify the physical location of goods while they are pending customs release. Manifest: A declaration of all goods that are being transported. Under current customs regulations, the manifest should be transmitted to CBP prior to loading of the goods at the port or airport of departure. The manifest generally details: (shipper, consignee, port of loading, port of discharge, port of destination, number of units shipped, type of packaging, weight, cubic measurement, description of the goods). Manufacturer ID Code (MFID): A unique alpha numeric code that is assigned to the foreign manufacturer. It is generally ‘built’ from the company's name, address, city, country. Customs monitors the MFID's of certain manufactures that are have raised flags in the past. MPF (Merchandise Processing Fee): A customs fee that is charged on inbound ocean cargo shipments. The fee is approx 0.21% of the commercial value of the goods and is used to support Customs. OGA (Other governmental agency): Such as Food and Drug Administration, U.S. Fish and Wildlife, Dept of Agriculture, Dept of Commerce, Environmental Protection Agency, etc. Certain harmonized codes are flagged to direct the filer of customs entry to submit additional data to the OGA. NAFTA: North American Free Trade Agreement. OGA (Other governmental agency): Such as Food and Drug Administration, U.S. Fish and Wildlife, Dept of Agriculture, Dept of Commerce, Environmental Protection Agency, etc. Certain harmonized codes are flagged to direct the filer of customs entry to submit additional data to the OGA. OGA Filing Codes: Most OGAs have their own codes (similar to Harmonized Tariff codes). Place of delivery: The named physical location on a Bill of Lading (B/L) to which carriage is contracted. Port of lading: The named port or airport at which a cargo shipment is loaded onboard the international carrier. Port of unlading: The named port or airport at which a cargo shipment discharges or is unloaded from the international carrier. RFID: Radio Frequency Identification. SCAT code: A 4 letter code that is assigned to each bonded carrier by CBP. The SCAT code allows customs to determine which carrier is legally responsible for the in-bond status of the goods before they are customs released. Shipper: The party on a Bill of Lading (B/L) that is stated to have shipped the goods. SKU (Stock Keeping Unit): A unique number used by a company to designate a specific item, color, size, etc. Statistical Quantity: each Harmonized Tariff code specifies how quantities of that item are to be reported. For example, fabrics may be reported in statistical quantities of square meters, Sugar may be reported in Kilos, Wire in Feet, Liquids in liters, shoes in pairs, etc. SWP (Solid Wood Packing) Declaration: The U.S. and other governments have specific regulations that limit the types of wood that can be used in packing of cargo. The goal is to prevent wood that is infested with pests from entering into the country. A SWP declaration will specify if solid wood packing has been used and if it is heat treated, fumigated, hardwood, coniferous wood, etc. . . . Terminal: Usually a pier at the port, or a rail yard, or a trucker's bonded facility. For the purposes of this invention, the terminal is a bonded facility where cargo is held until it is customs cleared. Unit(s) of measure: A data point on customs entry that specifies how cargo is quantified. Ie, 5 pallets, 5 bundles, 5 pieces, 5 boxes, 5 cartons, 5 drums, etc. Vessel: An ocean going cargo ship. Voyage number: each vessel assigns a specific voyage number to each voyage. This voyage number is reported to CBP. Weight Calculations (per customs requirements): Customs has specific requirements on how values and weights may be estimated (and declared) on cargo shipments that are comprised of multiple commodities. BRIEF DESCRIPTION OF DRAWINGS The aforementioned advantages of the present invention as well as additional advantages thereof will be more clearly understood hereinafter as a result of a detailed description of a preferred embodiment of the invention when taken in conjunction with the following drawings. FIG. 1 illustrates the flow chart of the method of the present invention of expediting the release procedure of cargo containers at a border crossing or at a customs entry point by tracking and reporting (SST) signals while cargo containers are in transit. FIG. 2 is a flow chart that details the step of expediting the release procedure at at least one border crossing or at least one customs entry point of an ERP cargo container. FIG. 3 illustrates a flow chart of the step of making the determination of whether the cargo shipment including the plurality (N-K) of ERP cargo containers and the plurality K of ISS containers should be inspected before the cargo shipment is released into commerce in more details. FIG. 4 is a flow chart that illustrates the usage of the secure ERP website-based system configured to enable the preparation and population of the set of ERP data documentation for the expedite release procedure for each ERP cargo container in more details. FIG. 5 illustrates a flow chart of establishing the shipper verification system in more details. FIG. 6 depicts a flow chart that details the usage of the secure ERP website-based system configured to enable the preparation and population of the set of ERP data documentation for customs entry transmission for each ERP cargo container. FIG. 7 is a flow chart that illustrates the step of generating a purchase order by the party who is responsible for payment and coordination of the cargo shipment in more details. FIG. 8 illustrates a flow chart that shows the step of generating a signal to trigger transmission of customs entry by the website/portal of the ERP website—based system when a cargo container is within a predetermined length of time away from arrival at a physical border. FIG. 9 depicts a flow chart that details the step of disseminating the customs release data to appropriate parties by customs via the website/portal of the ERP website-based system.
Vacancy title: Safety & training Superintendent Jobs at:North Mara Gold Mine Limited Deadline of this Job: 07 April 2022 Within Tanzania , Dar es Salaam , East Africa Summary Date Posted: Thursday, March 24, 2022 , Base Salary: Not Disclosed JOB DETAILS: North Mara Gold Mine Limited is seeking to recruit an Underground Safety & training Superintendent to join, our team. The successful candidate for this position is expected to align to the Barrick DNA and drive a change within his team and on a practical note will require to demonstrate self-directed application of theoretical , technical and practical knowledge to safely and efficiently an underground mine. Tasks performed involve a broad of complex and non-routine activities along with coordination of resources to achieve goals. Responsibilities: • Develop competency and capability to ensure a skilled workforce is developed for underground roles. Identify training requirements, develop and schedule training needs, monitor and maintain training records for the underground workforce. • Development and implementation of safety systems, procedures, standards and initiatives in order to establish high operating and performance standards in the UG Mine. • Identify improvement opportunities in work processes to reduce risk exposures to personnel. Implement value adding initiatives through structured change management processes. • Ensure all site incidents, investments, workplace injuries and related documentation are managed and completed in line with existing standards and procedures. • Ensure site compliance to company and site standards, relevant local and national legislation. • Develop and implement site induction processes for Underground personnel and visitors. • Implement and manage underground work area inspection and task observation programs • Develop the knowledge, skills and abilities of employees and associated personnel in accordance with organizational policies and procedures. • Provide support and assistance to the site for the resolution of safety and environmental issues and champion the consistent promotion of organizational policies, procedures and objectives and comply with organization safety reporting standards. • Ensure compliance to leading indicators and execution of required leadership interaction with departments. • Continuously improve the safety and training culture of the site. • Ensure site associated personnel receive training and assessments that meet the competency requirements of North Mara systems. • Deliver compliance to training plan / schedules in collaboration with line management. • Deliver Underground Mining and Technical Training System • Co-ordinate and Deliver Mobile Equipment, Drilling and Blasting and any other skills training sessions in line with the North Mara underground training needs analysis for specific roles. • Facilitate the awareness of mining safe working procedure to all team in the Underground Mining Operation. • Complete on the job follow up and field assessments as per the Safety, Environmental, Quality and Training Management Plan. Qualification Requirements: • Certificate IV or similar Qualification in Workplace Training & Assessment • Sound knowledge of technical area operations in Underground Mining. • Qualified to operate all equipment for which training is conducted • Formal Mines rescue Training • Experience Requirements: • Minimum of five (5) years supervisory experience in a mining operation • Minimum of five (5) years’ experience in UG safety and training • 2 years’ experience in technical area of mining operations • Experience working in multi-cultural orientations • Skills/knowledge requirements:
https://www.tanzania-jobs.com/jobs/medical-healthcare/safety-training-superintendent-job-at-north-mara-gold-mine-limited-44910/
1. Field of the Invention This invention relates to a process wherein a film containing at least one dye is contacted with a textile material in the presence of sufficient heat to cause the dye (or dyes) to sublime or vaporize and transfer some of it from the film to the textile material, and thereby provide textile material level dyed in a solid shade. 2. Description of the Prior Art In recent years, it has become a common commercial practice to print textile material by subliming or vaporizing and transferring dyes from paper carriers printed or coated with disperse dyestuffs in the form of an ink or paste; i.e. dyestuff plus binder. The textile material is contacted with the printed paper carrier in the presence of heat. In some processes, heating is accompanied by pressure. In others, vacuum is applied during or after the heating step. While superficially, it may seem possible to achieve level dyeings of textile materials by the abovedescribed techniques, due to economic and/or technological limitations, none has been reported in commerce. Possible reasons for the state of the commercial art reside in the nature of the dye carrier and the means available for coating it. In order to achieve level dyeing of the textile material, the coating on the carrier must be very uniform. The gravure technique, wherein coated paper (e.g. by clay) is used, might seem to be capable of achieving uniform coating of the carrier with a dye (in the form of an ink). However, one cannot meter ink exactly across the entire length and width of the carrier paper so as to achieve level solid shade dyeing therefrom by heat transfer. Moreover, it is expensive, both in terms of capital investment and in operating costs. The lithographic printing technique does not provide a continuous surface from which ink or print paste can be transferred. Ink can be metered less exactly with the flexographic process than the gravure technique. The rotary screen printing technique requires the use of a water-based ink, but clay-coated paper may not be used, because the water would cause the paper to pucker. If other paper is used with water-based inks, the dye thereof penetrates into the microstructure of the paper, and on heating would diffuse further into the paper, making it impractical, if not impossible, to effect level dyeing from the paper to a textile material. Markert et al., in U.S. Pat. No. 3,707,346, disclose heat transfer printing of textiles wherein one or more anthraquinone disperse dyestuff is applied to one or both sides of a carrier for which the disperse dyestuff do not possess affinity. Preferably, the carrier is paper, but a metal substrate is disclosed as well. Bossard et al., in U.S. Pat. No. 3,915,628, also disclose the use of a carrier having no affinity for the compound (including dyestuffs) which is to be transfer-printed on textile material by vaporization in the presence of heat. Their carrier is a continuous, endless structure to which the varporizable material is applied by spraying, coating or printing. The endless inert carrier may be metal, such as aluminum or steel, plastic, water- and optionally solvent-resistant paper, or textile fabrics, which are optionally coated with a film of vinyl resin, ethyl cellulose, polyurethane resin or a polytetrafluoroethylene resin. Mayer, in U.S. Pat. No. 4,056,352, discloses the continuous dry transfer of organic compounds (including disperse dyestuffs) to webs of air-permeable organic materials (including textile webs) by passing the webs and the organic compound carriers over at least one heating means and subsequently over at least one suction means. As a rule, the carrier possesses no affinity for the preparation that contains the compound to be transferred (e.g. the dyestuff preparation). The preparations are applied to the inert carrier continuously by spraying, coating or preferably by printing over part or all of the surface of the carrier. If the carrier is air-permeable, and depending on the sublimation behavior of the compounds to be transferred, the untreated or treated side of the carrier may be brought into contact with the surface of the web to be treated. If, as is preferred, the carrier is impermeable to air, only the treated side of the carrier is brought into contact with the surface of the web material to be treated. Sublistatic Holding S.A., in U.K. Patent Specification No. 1,392,390, disclose dry heating a textile material in contact with a flexible support which is coated or impregnated with a layer of a dyestuff or an optical brightening agent so as to cause the dyestuff or brightening agent to sublime or vaporize, and thereby transfer the same to the textile web. Paper or aluminum, preferably a paper sheet or web coated with a varnish to make it impermeable to air, is disclosed for use as the flexible support.
Ceflex launches open consultation for Circular Economy Guidelines The Circular Economy for Flexible Packaging initiative (Ceflex) has launched an open consultation to refine the designing of its Circular Economy Guidelines before publication in the first quarter 2020. The decision for the open consultation came after initial input and feedback from Ceflex stakeholders, the platform announced 10 Dec. All non-Ceflex stakeholders and interested parties from the wider flexible packaging industry, are invited to provide their feedback between 6 Dec and 17 Jan 2020 at CEFLEX.eu. The first edition of the guidelines focuses on the largest proportion of the post-consumer flexible packaging waste stream, polyolefin-based flexible packaging structures. The guidelines aim to make packaging suitable for collection, sorting and recycling after use – giving clarity to brand owners, retailers, converters and others in the value chain and a clear roadmap for recycling infrastructure. The Circular Economy for Flexible Packaging (Ceflex) initiative is a collaboration of over 140 European companies, associations and organisations representing the entire value chain of flexible packaging. It works across Europe to design and advance better system solutions, enhancing the performance of flexible packaging in a circular economy. By 2020, the project aims to deliver design guidelines for both flexible packaging and the “end of cycle” infrastructure to collect, sort and recycle them. Ultimately, by 2025, the aim is to develop a collection, sorting and reprocessing infrastructure for post-consumer flexible packaging across Europe, facilitated by the project.
https://www.sustainableplastics.com/news/eu-project-launches-open-consultation-packaging-recycling-guidelines
ISO 13485 Medical devices -- Quality management systems -- Requirements for regulatory purposes is a voluntary standard, published by International Organization for Standardization (ISO) for the first time in 1996, and contains a comprehensive quality management system for the design and manufacture of medical devices. The latest version of this standard supersedes earlier documents such as EN 46001 (1993 and 1996) and EN 46002 (1996), the previously published ISO 13485 (1996 and 2003), and ISO 13488 (also 1996). The current ISO 13485 edition was published on 1 March 2016. Background Though it is tailored to the industry's quality system expectations and regulatory requirements, an organization does not need to be actively manufacturing medical devices or their components to seek certification to this standard, in contrast to the automotive sector's ISO/TS 16949, where only firms with an active request for quotation, or on the bid list, of an International Automotive Task Force supply chain manufacturer can seek registration. Reason for use While it remains a stand-alone document, ISO 13485 is generally harmonized with ISO 9001. A principal difference, however, is that ISO 9001 requires the organization to demonstrate continual improvement, whereas ISO 13485 requires only that the certified organization demonstrate the quality system is effectively implemented and maintained. Additionally, the ISO 9001 requirements regarding customer satisfaction are absent from the medical device standard. Other specific differences include: - the promotion and awareness of regulatory requirements as a management responsibility. Examples of market-specific regulatory requirements include 21 CFR 820, the Quality System Regulation for medical devices sold in the United States, enforced by the U.S. Food and Drug Administration (FDA), or the Medical Devices Directive 93/42/EEC, required for doing business in the European Union - controls in the work environment to ensure product safety - focus on risk management activities and design control activities during product development - specific requirements for inspection and traceability for implantable devices - specific requirements for documentation and validation of processes for sterile medical devices - specific requirements for verification of the effectiveness of corrective and preventive actions - specific requirements for cleanliness of products Compliance with ISO 13485 is often seen as the first step in achieving compliance with European regulatory requirements. The conformity of Medical Devices and In-vitro Diagnostic Medical Device according to European Union Directives 93/42/EEC, 90/385/EEC and 98/79/EEC must be assessed before sale is permitted. One of the major requirements to prove conformity is the implementation of the Quality Management System according ISO 9001 and/or ISO 13485 and ISO 14971. Although the European Union Directives do not mandate certification to ISO 9001 and/or ISO 13485 the preferred method to prove compliance to such standards is to seek its official certification which is issued by certifying organizations known as "Registrars". Several registrars also act as Notified Body. For those medical devices requiring the pre-market involvement of a Notified Body, the result of a positive assessment from the Notified Body is the certificate of conformity allowing the CE mark and the permission to sell the medical device in the European Union. A very careful assessment of the company Quality Management System by the Notified Body, together with the review of the required Technical Documentation, is a major element which the Notified Body takes into account to issue the certificate of conformity to the company product(s). This standard adopted by CEN as EN ISO 13485:2003/AC:2007 is harmonized with respect to the European medical device directives 93/42/EEC, 90/385/EEC and 98/79/EC. ISO 13485 is now considered to be inline standard and requirement for medical devices even with "Global Harmonization Task Force Guidelines" (GHTF). The GHTF guidelines are slowly becoming universal standards for design, manufacture, export and sales of various medical devices. The GHTF has been replaced in the last few years by the International Medical Device Regulators Forum (IMDRF) and is structured differently from the GHTF as only the regulators, that are primary members of the group, get to make many of the decisions. The IMDRF main membership (the regulators) do want to have non-regulators involved without voting rights and in this way they are hoping to get the process and documents completed quicker than under the GHTF system (regulators & non-regulators were equal in voting rights) that worked reasonably well, but somewhat slow. This standard adopted by CEN as EN ISO 13485:2012 is harmonized with respect to the European Medical Devices Directive 93/42/EEC. Mexico published on October 11, 2012, a national standard as a Norma Oficial Mexicana (NOM) to control manufacture of medical devices inside the country. NOM-241-SSA1-2012, Buenas Practicas de Fabricación para Establecimientos dedicados a la Fabricación de Dispositivos Médicos. The scope of application is mandatory in the national territory, for all establishments dedicated to the process of medical devices marketed in the country. The Cofepris is the body assigned to its control, verification and to grant the records of compliance to the companies that implement this Standard of Good Manufacturing Practices. This standard is partially in line with ISO 13485: 2003 and ISO 9001: 2008. In 2017, The Farmacopea de los Estados Unidos Mexicanos (United Mexican States Pharmacopoeia), medical industrial sectors and Cofepris are working together for updating NOM-241 Standard, putting special attention on managing risks during manufacture and regulating by manufacturing lines some of the most important medical devices manufacturing processes. This standard will be published in August 2018, and 180 days after publication it will become mandatory for the industry. In Spain, medical devices are named in ISO-13485 as "Sanitary Products" as Castellano-language translation of ISO-13485, but in Mexico they are known as "Medical Devices" and correspond to those used in medical practice and that meet the definition established by NOM-241 as: Medical device, to the substance, mixture of substances, material, apparatus or instrument (including the computer program necessary for its proper use or application), used alone or in combination in the diagnosis, monitoring or prevention of human or auxiliary diseases in the treatment of the same and of the disability, as well as the employees in the replacement, correction, restoration or modification of the anatomy or human physiological processes. Medical devices include products of the following categories: medical equipment, prostheses, orthotics, functional aids, diagnostic agents, supplies for dental use, surgical, healing and hygiene products. ISO 13485:2016 Certificates meets the requirement of IEC 60601-2-25 : 1993 + A1: 1999 safety of Electrocardiograms. Chronology |Year||Description| |1993||EN 46001 Quality systems – Medical devices – Particular requirements for the application of EN ISO 9001 is published by the European Committee for Standardization (CEN), forming the basis for developing ISO 13485.| |1996||ISO 13485 (1st Edition).| |2000||EN ISO 13485 is published by CEN, creating a European Norm version of the international standard, and the previous European standard (EN 46001) is withdrawn.| |2003||ISO 13485 (2nd Edition).| |2012||EN ISO 13485 is revised so that it harmonizes with the three European directives associated with the medical sector: 93/42/EEC (medical devices), 98/79/EC (in vitro diagnostic medical devices), and 90/385/EEC (active implantable medical devices).| |2016||ISO 13485 (3rd Edition).| See also - ISO 14971 - Good manufacturing practice - List of International Organization for Standardization standards References - ^ "FOREWORD - SUPPLEMENTARY INFORMATION". www.iso.org/foreword-supplementary-information.html. - ^ "ISO 13485:2016 - Medical devices -- Quality management systems -- Requirements for regulatory purposes". www.iso.org. Retrieved 2016-03-24. - ^ "IATF 16949:2016 Automotive Quality Management System - BSI America - BSI America". www.bsiamerica.com. - ^ "Understanding ISO 13485". - ^ "Summary list of titles and references of harmonised standards related to medical devices - DG Enterprise & Industry. European Commission". Archived from the original on 2009-02-01. - ^ "GHTF is no longer in operation". www.ghtf.org. - ^ "International Medical Device Regulators Forum". www.imdrf.org. - ^ "CENELEC - Standards Development - List of Technical Bodies -". www.cenelec.eu. - ^ "NORMA Oficial Mexicana NOM-241-SSA1-2012, Buenas prácticas de fabricación para establecimientos dedicados a la fabricación de dispositivos médicos". www.dof.gob.mx. Retrieved 19 October 2017. External links - Guide to ISO 13485 - ISO 13485 Standard: Medical devices — Quality management systems: ISO Website - Overview, guidance and regulatory compliance for EU medical device manufacturers - CFR - Code of Federal Regulations Title 21, Part 821, Food and Drug Administration's Quality System Regulation Notes This article is a direct transclusion of the Wikipedia article and therefore may not meet the same editing standards as LIMSwiki.
https://www.limswiki.org/index.php/ISO_13485
The biggest risk to learning and development (L&D) has been, and will likely remain, the underfunding of our initiatives in lean times. Most senior leaders who don’t see the value in developing their employees tend to use a hatchet at the training budget. (We’d prefer a scalpel and a bit of precision if it must happen, right?) As L&D professionals, we realize that employee development impacts business efficiency and employee engagement and can help you forecast some pretty gnarly trends if you’re savvy enough to notice them. So, how do we help leaders see the importance of learning and development in lean times? How do we ask for the scalpel in exchange for the hatchet? Aligning your development efforts to the future of the business is a surefire way to shroud your budget in a cloak of safety. To do so, you’ll need to look to the future and dig into some useful data. One way is to examine the people who are leaving your company. Employees leave companies for a variety of reasons but rarely because working there is too engaging or because they feel too prepared for the next level. If you want to catch them before they walk out the door and leave your company in a succession planning nightmare, try these five strategies: 1. Align Your Leadership Development Plan With a Succession Plan Work with the human resources team to identify which leaders are eligible for retirement or likely to leave in the next five years. To ensure that there is a pipeline of qualified internal employees ready for the next level, it’s time to identify high-potentials and start the knowledge-sharing process. 2. Analyze the Retention Data If employees are leaving to work elsewhere, it’s because they’re finding something at a new company that they failed to receive at yours. Are they leaving within the first year or three years at your organization? Why? If you’re losing more managers than non-supervisory employees, you might need to bolster your leadership development initiatives in this direction. 3. Prepare for Change Identify the learning initiatives you’ll need in the future by analyzing where your business is today. Determine any environmental, political and organizational changes that may occur in the near future; then, develop training programs to prepare your stakeholders for those changes. 4. Play Tic-tac-toe Cross-train at least two levels down and one level laterally. To be efficient in building a succession pipeline, you want to be strategic in your planning. By cross-training two levels below, you can create a vested interest in the career ladder (and you won’t put all your eggs in one basket). What does this particular form of tic-tac-toe look like? If your chief financial officer (CFO) will be retiring in five years, start having regular training sessions with the deputy chief and senior manager of finance. You’ll also want to offer the opportunity for lateral interest. It’s surprising how many senior leaders have interest in running other departments (and the skills to do so effectively). Now, you have, at minimum, three internal options for the role in five years. If one leaves before the five years are up, you still have backup for a successor. 5. Be Transparent It sounds simple. In the age of social media, modern workers are used to seeing, hearing and knowing everything about their surroundings, especially the things they care about, at a moment’s notice. If you want them to care about the future of their work, you’ll need to develop a communication plan to tell them about the vast opportunities to grow at your company. You won’t need a kitschy gimmick or a red carpet. A simple email, webpage, wiki or similar tactic sharing how to participate in career development programs will suffice. In a 2013 TINYpulse engagement survey of over 300 companies around the world, transparency was the No. 1 factor contributing to employee happiness. Keep your employees happy by telling them how you’re going to save them from the scary world outside the exit sign. These strategies may seem simple, but there is a great amount of time and effort your L&D team will need to put into building relationships with other departments to find the information you need. (It might be a good idea to have chocolate as a peace offering in the process.) The key to remember is that employee development should always align to your business’ current and future needs. Showing how L&D supports these needs will keep your budgets intact and your teams working with purpose.
https://trainingindustry.com/articles/leadership/watch-the-exit-5-ways-to-support-your-company-when-employees-leave-cptm/
From the dictionnary, synesthesia is a phenomenon of two senses being combined, where one stimulus awakes two senses instead of the unique one it should target. For example, as is the case for Alexandra Graff in Concerto in Chroma Major, sounds turn into colors and shapes, which is a form of Synesthesia referred to as Chromesthesia. Darren Criss has a very bubbly, purple singing voice, don’t you think? And if you’re not a synesthet, that sentence may make little to no sense at all. The way I see it, since Alexandra’s Synesthesia is a part of my own personal experience #ownvoice, Synesthets don’t always realize that something is different about the way they apprehend the world around them. Seeing colors when listening to sounds is as natural as any other sensation. It takes expressing that sensation to someone “unaffected” for the truth of Synesthesia to come to light. Usually followed by, “what is wrong with me”, since the reaction from non-synesthets is often one of shock and doubt. This does explain why so little research has been done around Synesthesia, and there is a whole world beyond the five senses still in need to be explore!
https://naomi-tajedler.com/2018/04/10/synesthesia-chromesthesia-wtfsthesia/
Officials Confirm Yellowstone Hiker Killed By Grizzly On Friday morning, two hikers found the body of 59-year-old Michigan man, John Wallace, on the 21-mile Mary Mountain Trail. Officials suspect that Wallace went hiking either Wednesday or Thursday based on evidence that he had set up camp near the trail. Park Spokesman Al Nash says officials have combed the scene of the incident for forensic information, and an autopsy was performed yesterday afternoon. "Between the information that we were able to gather on site, coupled with the medical examiners results, we confirmed, indeed that Mr. Wallace was attacked by a bear and that he died as a result of injuries from a bear attack," says Nash. Nash says the area where this week's incident occurred is known for wildlife viewing, including grizzlies, and he says at this point it's not possible to determine which bear was involved - or whether the killing was of a predatory or defensive nature. In July, Brian Matayoshi from California was killed by a grizzly after he and his wife encountered the mother bear and her cubs. 2011 is the first year bear fatalities have occurred in the park since 1986.
John Locke ( /ˈlɒk/; 29 August 1632 – 28 October 1704), widely known as the Father of Liberalism, was an English philosopher and physician regarded as one of the most influential of Enlightenment thinkers. Considered one of the first of the British empiricists, following the tradition of Francis Bacon, he is equally important to social contract theory. His work had a great impact upon the development of epistemology and political philosophy. His writings influenced Voltaire and Rousseau, many Scottish Enlightenment thinkers, as well as the American revolutionaries. His contributions to classical republicanism and liberal theory are reflected in the American Declaration of Independence. Locke's theory of mind is often cited as the origin of modern conceptions of identity and the self, figuring prominently in the work of later philosophers such as Hume, Rousseau and Kant. Locke was the first to define the self through a continuity of consciousness. He postulated that the mind was a blank slate or tabula rasa. Contrary to pre-existing Cartesian philosophy, he maintained that we are born without innate ideas, and that knowledge is instead determined only by experience derived from sense perception. Locke's father, who was also named John Locke, was a country lawyer and clerk to the Justices of the Peace in Chew Magna, who had served as a captain of cavalry for the Parliamentarian forces during the early part of the English Civil War. His mother, Agnes Keene, was a tanner's daughter and reputed to be very beautiful. Both parents were Puritans. Locke was born on 29 August 1632, in a small thatched cottage by the church in Wrington, Somerset, about twelve miles from Bristol. He was baptised the same day. Soon after Locke's birth, the family moved to the market town of Pensford, about seven miles south of Bristol, where Locke grew up in a rural Tudor house in Belluton.
https://www.upi.com/topic/John_Locke/'+url+'
heroes spreading the retro gaming glory of Antstream Arcade via streaming platforms. This week, answering questions on his gaming history, favourite games, Antstream Arcade and more, is Vaughan Jackson, AKA Hitch On Twitch. You can catch Hitch on Twitch (funnily enough) at https://www.twitch.tv/hi7ch and on Twitter @HitchOnTwitch. On with the retro inquisition! Antstream Arcade: Hello Hitch! What are your earliest memories of gaming? Hitch: Hello! That’s going back some! One of the Grandstand Pong consoles around 1976 is the earliest – I got it for Christmas and absolutely loved it. It was literally four different types of Pong with two paddles, and I played it to death, mostly solo against the wall, but also against myself using two paddles. It sounds a bit sad now, but it was a lot of fun back then. AA: It sounds awesome! But apart from the Grandstand, what were your other early gaming consoles and computers? Hitch: I vividly recall the first handheld I got in 1981: the Entex Space Invaders! Its red LEDs made it look as if the invaders were actually moving but in reality it was just the LEDs turning on and off. At this point I was also into home computers and the first one I owned was a Sinclair ZX80. It came in kit form and I built it myself with no parental help at the age of 12! That led me to the ZX81, and of course, the legendary ZX Spectrum, which led me to programming and becoming a true gamer. AA: What game first really captured your imagination? Hitch: Manic Miner by Matthew Smith. Such a simple game that in my opinion has some of the most enjoyable gameplay I have experienced. It was incredibly hard, and you had to be pixel perfect with the timing of a god, but I finished it back in the day and still play it today. I also have to credit the likes of Berzerk and I, Robot from the arcades. AA: On the spot time part 1: what has been your favourite era for gaming? Hitch: Once upon a time I’d have said 1982-1984 with the Spectrum, but now looking back it is without doubt 1993-1998, and that’s because of two consoles. My all-time favourite retro systems are the Sega Saturn and Panasonic FZ-1 3DO. The 32-bit era paved the way for all we see today, genres were defined and limits were pushed – not always for the best, but man, looking back I am so happy I experienced them as an adult, able to play whatever I wanted. AA: On the spot time part 2: favourite game of all time? Hitch: Unfair question! This is one I ask my viewers when they first find me, so I guess this is payback! It changes depending on my mood, but if I had to tie it down to one game it would now be Shadow Of The Colossus on the PlayStation 2. I love it because of the simple gameplay entwined with mystery and puzzles. Finding the giants, killing them and moving on is pretty easy, but the gameplay is perfect and when combined, what’s not to love? AA: How and when did you start streaming? Hitch: Remember Justin.tv? Before Twitch, there was Justin and it was pretty awful. It got somewhat better of late but for me it started small. I gave up on Justin.tv after a while but then came back when it became Twitch. The ‘how’ is half ego and half the need to entertain. I used to be a broadcaster on radio and then internet radio prior to streaming, so I already had the basics down. And as radio became automated, I was lucky that I had a new way to let myself be ‘out there’. AA: How do you choose which games to stream? Hitch: I drink too much vodka and play what I fall over first, ha-ha! Ok, that’s not it but it would be so much easier than the occasional anxiety I feel when trying to choose. I enjoy playing real original hardware and I get to choose between the 26 plus systems I own, but it’s normally what I feel I will enjoy right there and then. Sometimes it’s awful and I have regrets, but more often than not it’s hilarious and entertaining for both myself and my viewers. AA: As an original hardware fan, what do you think of Antstream Arcade? Hitch: I love it. I always regarded emulation as the lesser option due to my preference for real hardware but Antstream changed my mind and lets me enjoy things in a new more convenient way. Before Antstream came along, we used to talk in my community about how Stadia would be actually useful if they went full retro and then, boom, along comes Antstream Arcade, doing exactly what we’d been talking about for a long time. I like the idea of the challenges and high scores most, but rarely do better than mid-scores in the tournaments because I have less time than some seem to have to perfect that score. I do like the idea of special tournaments with old champions like Becky Heineman or the developers themselves – still waiting for Jim Bagley to get his own game on one! AA: Maybe one day Baggers will achieve that glory! Do you get a good response streaming Antstream Arcade? Hitch: From day one the response has been excellent from all corners, whether they be real hardware fans, emulation fans or other. I think the ease of use, huge choice of games and systems helped, but my biggest positive feedback comes from the social aspects of the service. We all just love pushing each other off the top of the following tables! AA: Any requests? Hitch: I would like to see more Speccy games on there: Deathchase, Jet Set Willy, Odd Job Eddie (that’s for a viewer) and Jet Pac. I also see the possible upcoming PlayStation games as being the killer apps for Antstream. AA: Finally, Hitch on Twitch, on a scale of 1 to 10, how geeky are you? Hitch: Turn it to 11 please. I stream console and computer repairs as well as gaming, and can talk for hours about games and retro in general. I love hearing stories about anything nerdy, from movies, sci-fi, music and more. I stream retro on Twitch: I have to be a nerd, otherwise they would call me out as a faker!
https://www.antstream.com/post/antstream-arcade-twitch-superstar-hitch-on-twitch
The global fiber optic test equipment (FOTE) market is estimated to record a compound annual growth rate (CAGR) of about 7.7% from 2018 to 2025. The objective of this study is to identify the key market trends as of 2018, the base year, and highlight the factors that boost and restrain market growth. In particular, it discusses the product areas that are expected to bolster growth during the forecast period (2019 to 2025). With 2018 as the base year, the research provides market size estimates and sheds light on future growth prospects up to 2025. For this purpose, a specific methodology is followed. This is based on discussions with the senior management of FOTE manufacturers, which is supported by secondary research. North America is the biggest revenue generator for the global FOTE market and is expected to retain its position during the forecast period. Slight increase in the revenue share of indirect channels is expected as vendors look to provide better support, cater to a fragmented customer base, and increase their international market reach. A broad product portfolio with one-shop-stop solutions is the key for success for vendors. Cost, ease of use, features, and portability are the key factors driving growth. The study offers a holistic picture of the opportunities, challenges, and threats for vendors globally. Among the different types of fiber optic test equipment, optical time domain reflectometers (OTDR) are witnessing the strongest growth; there is also strong growth in fiber inspection probes. Although not in its final form yet, 5G, the fifth generation of cellular technology, is already impacting the demand for optical test equipment with 5G Fixed Wireless Access (FWA) trials. It is expected to generate massive implementation of fiber, boosting the demand for test equipment. Research Scope Discussion highlights: - In-depth analysis with market sizing of product segments: - Optical Time Domain Reflectometers (OTDR) - Optical Light Sources (OLS) - Optical Power Meters (OPM) - Optical Loss Test Sets (OLTS) - Optical Spectrum Analyzers (OSA) - Remote Fiber Test Systems (RFTS) - Tunable Lasers - Chromatic Dispersion (CD) - Polarization Mode Dispersion (PMD) - Dense Wave Division Multiplexing (DWDM) - Fiber inspection probes (FIP) - Regional perspectives on the demand pattern in various advanced and emerging markets: - North America, Europe, Middle East and Africa, Asia-Pacific, and Latin America - End-user analysis of the following industries:
https://www.researchandmarkets.com/reports/4772379/global-fiber-optic-test-equipment-market
The influence of meteorological variables on CO2 and CH4 trends recorded at a semi-natural station. CO2 and CH4 evolution is usually linked with sources, sinks and their changes. However, this study highlights the role of meteorological variables. It aims to quantify their contribution to the trend of these greenhouse gases and to determine which contribute most. Six years of measurements at a semi-natural site in northern Spain were considered. Three sections are established: the first focuses on monthly deciles, the second explores the relationship between pairs of meteorological variables, and the third investigates the relationship between meteorological variables and changes in CO2 and CH4. In the first section, monthly outliers were more marked for CO2 than for CH4. The evolution of monthly deciles was fitted to three simple expressions, linear, quadratic and exponential. The linear and exponential are similar, whereas the quadratic evolution is the most flexible since it provided a variable rate of concentration change and a better fit. With this last evolution, a decrease in the change rate was observed for low CO2 deciles, whereas an increasing change rate prevailed for the rest and was more accentuated for CH4. In the second section, meteorological variables were provided by a trajectory model. Backward trajectories from 1-day prior to reaching the measurement site were used to calculate distance and direction averages as well as the recirculation factor. Terciles of these variables were determined in order to establish three intervals with low, medium and high values. These intervals were used to classify the variables following their interval widths and skewnesses. The best correlation between pairs of meteorological variables was observed for the average distance, in particular with horizontal wind speed. Sinusoidal relationships with the average direction were obtained for average distance and for vertical wind speed. Finally, in the third section, the quadratic evolution was considered in each interval of all the meteorological variables. As regards the main result, the greatest increases were obtained for high potential temperature for both gases followed by low and medium boundary layer height for CO2 and CH4, respectively. Combining both meteorological variables provided increases of 22 ± 9 and 0.070 ± 0.019 ppm for CO2 and CH4, respectively, although the number of observations affected is small, around 7%.
Critically acclaimed authors Anna-Karin Palm and Elisabeth Åsbrink join Swedish Book Review to discuss their latest projects, the role of memory and cultural memory in their work, and the intersections of fiction and narrative non-fiction. The talk, chaired by SBR editor Alex Fleming, will be held in English and followed by a Q&A. Translated excerpts from the writers' latest books are now live on the Swedish Book Review website. The event will be held as a Zoom webinar. All attendees will receive a link to access the event via email. Anna-Karin Palm debuted as an author in 1991, with the novel The Faun. The Painter’s Daughters, her international breakthrough, was translated into eight languages. Her authorship spans fiction, short fiction, essays and non-fiction, including Selma Lagerlöf: I Want to Set the World in Motion, a celebrated biography that was nominated for the August Prize. Her latest work, Writing Over Your Face, charts her mother’s gradual disappearance into Alzheimer’s Disease, while exploring memory, writing, and how the narratives of our lives are shaped. Elisabeth Åsbrink is a multi-award-winning writer and journalist based in Stockholm and Copenhagen. In her essays and reviews of books, published in both the Swedish and Danish press, she focuses on the aftermath of WW2 and deals with memory and oblivion. Her books, including And in the Vienna Woods the Trees Remain, 1947: Where Now Begins, and Made in Sweden, have been translated and published in more than 20 countries. Her recently published first novel, Abandonment, is an autobiographical novel about a family, tracing how secrets and lies pass from one generation to the next. Image credits: © Johan Bergmark/ © Moa Karlberg We are grateful to the Swedish Arts Council for their support for this event.
https://www.eventbrite.co.uk/e/swedish-book-review-author-panel-with-anna-karin-palm-and-elisabeth-asbrink-registration-154687144413
by Jamie Kiley If you’re in the market for a new website, one of the first things you’ll need to do is hire a web designer. As in any field, there are good web designer and bad web designers, and it’s important to know how to determine which is which. Here are 5 tips to get you started: 1. Don’t judge a designer’s skill solely on graphic design skills. Just like you can’t judge a book by its cover, you can’t judge a web designer based on his or her graphic design skills alone. While graphic design is important, attractive images are not the most significant determinant of good design. In fact, they are a comparatively small part of what makes a good website. Instead of focusing completely on visual image, concentrate on evaluating a designer’s other skills. Evaluate the designer’s portfolio by asking these sample questions: - Does this designer design with usability in mind? In other words, is the site designed for form or for function? - Does the designer have good organizational abilities? Look for organization of the entire site as a whole, as well as the organization of individual page layouts. - Does the designer employ good navigation techniques? Try out some of the sites in his or her portfolio and carefully examine how easy it is for you to navigate around the site and find specific pieces of information. - Instead of using graphics just for the sake of pizzazz, does the designer use graphics purposefully to organize the page and to direct a visitor’s attention to important points? - All sites should motivate a visitor to do something, whether it is buying a product, filling out a quote request form, signing up for a newsletter, etc. - Does the designer do a good job of visually showing visitors how to take action? - Does the designer design sites that are easy to use? - Instead of asking, “Does this site look good?” ask, “Would this site make me want to buy a product if I was in that site’s target market?” 2. Talk with references. Don’t just peruse the sites in a designer’s portfolio. Get in contact with some of the designer’s past clients and question them on the specifics of their experience. Ask how long it took to complete their website, as well as how easy it was to work with the designer. Also, be sure to ask how effective the client’s website has been. How many visitors do they get? By how much have their sales increased? How well has the site accomplished the client’s intended goals? 3. Have a basic knowledge of good web design techniques. It helps significantly in evaluating a prospective web designer if you know at least the basics of good web design. This way, you’ll be in a better position to judge good techniques from the not-so-good. Before you get ready to hire a designer, spend some time browsing the web and the shelves of your local bookstore. If possible, try to get a feel for the basics of usability and online marketing. Also, glean information from a variety of different sources. The experts often disagree, and it’s helpful to hear from a variety of perspectives and understand why they hold particular positions. 4. Don’t necessarily go for the lowest bidder. Remember, it’s not just about getting a website; you’ll need a website that will actually perform. Price and quality usually have a direct relationship, so you’ll get what you pay for. Designers who are overly inexpensive ordinarily lack experience, are difficult to work with, don’t understand much about online marketing, or don’t truly have a grasp of good web design techniques. A website from such a designer won’t be beneficial. 5. Look for a designer who asks good questions. Astute designers should probe you for specific answers to such questions as: - What is your primary goal? - By what standard will you measure the success of your site? - Who is your target audience? - What are the primary benefits of your product or service? Look for a designer who obviously understands marketing, not just graphic design. Jamie Kiley is a web designer in Atlanta, GA.
https://marketingideas101.com/guides/5-tips-for-choosing-a-web-designer/
Q 3. Pragya tested the solubility of three different substances at different temperatures and collected the data as given below (results are given in the following table, as grams of a substance dissolved in 100 grams of water to form a saturated solution). (a) What mass of potassium nitrate would be needed to produce a saturated solution of potassium nitrate in 50 grams of water at 313 K? We have, Mass of potassium nitrate = 62g in 100 g of water Therefore, according to question,
https://learn.careers360.com/ncert/question-pragya-tested-the-solubility-of-three-different-substances-at-different-temperatures-and-collected-the-data-as-given-below-results-are-given-in-the-following-table-as-grams-of-substance-dissolved-in-100-grams-of-water-to-form-a-saturated-solution-a/
Two main schools of classical music – Hindustani and Carnatic – continue to survive through oral tradition being passed on by teachers to disciples. This has led to the existence of family traditions called gharanas and sampradayas. Hindustani Music • Hindustani Sangeet is usually considered to be a mixture of traditional Hindu musical concepts and Persian performance practice. • Hindustani music is based on the raga system. • A raga is a melodic scale, consisting of notes from the basic seven nodes known as sa, re, ga, ma pa, dha, and ni. • Khyal and Dhrupad are 2 major types of compositions within the Hindustani genre. • There are many musical instruments that are associated with Hindustani sangeet. The most famous are the tabla, sitar, sarangi, santur, and the sarod. Types of Hindustani Music and its meaning Dhrupad – Effort from vocal chords and lungs. Dhamar – Play of Krishna during holy. Khayal – Delicate, romantic and based on imagination. Thumri – Romantic religious literature. Tappa – Quick turn of phase. Bhajan – Religious devotional songs. Tarana – Syllables sung together to set a rhythm. Sabadas – Sikh religious songs. Qawali – Indo-Muslim repertories of songs in groups. Ghazal – Independent couplets on love and devotion Carnatic Music • Carnatic Sangeet is found in the South Indian states of Kerala, Tamil Nadu, Karnataka, and Andhra Pradesh. • Purandardas is considered as the father of Carnatic Music. • Carnatic music acquired its present form in the 18th century under the “trinity” of Carnatic music; Thyagaraja, Shamashastri, and Muthuswami composed their famous songs. • It is also based upon a system of ragam (rag) and thalam (tal). • Musical instruments veena, violin, mridangam, nadaswaram, and the tavil. • Kriti is a dominant element. Types of Carnatic Music and its meaning Ragam Tanam-Pallavi – Elaborate rhythmic and melodic variation in unmeasured sense. Kriti-Kirthanai – Most popular type which refers to devotional music laced with poetic beauty. Varnam – Performed at the beginning of a concert; a completely composed piece. Padam – Slower tempoed love songs referring to the human yearning for the adored god head. Javalis – Faster tempoed love songs with direct description of human love. Tillana – Meaningful phrases are interspersed with variety of meaningless syllables. Folk Music - Folk Music like Lavani, Dandiya, Bhagavathi etc. - Fusion of Classical and Folk music such as Sugama Sangeetha – Thevaram, Keertan etc., - Bhajan, Qawwali, Shabad Gana Sangeeth, Haveli Sangeeth etc., - Revival of folk music in the wake of globalization. Modern Music Different types of music like Rock, Pop etc. its influence on classical and folk music. Note: - Compare and contrast between Hindustani and Carnatic music, classical and suguama sangeeta, folk and classical music etc. - Personalities and their contribution to music traditions. - Institution, chief characteristics of music and influence of classic music on contemporary music and vice versa. Musical Instruments - Percussion instruments/ Awanad Vadya like Tabala, Mrudangam etc. - Wind Instruments/ Sushira Vadya like flute, shehanayi. - String Instruments/ Tata vadya like Sarangi, violin, sitar and veena. - Solid Instruments/ Gana vadya like manjira, jal tarang etc. Modern Development in Music Gandarva Mahavidyala, Sangeet Nataka Academy etc.
https://www.upscsuccess.com/indian-heritage-culture-music/
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to a method for identifying nucleic acid sequences using hybridization probes. More specifically, the present invention relates to a method for identifying and quantifying nucleic acid sequence aberrations using hybridization probes. 2. Description of Related Art Hybridization probes are widely used to detect and/or quantify the presence of a particular nucleic acid sequence within a sample of nucleic acid sequences. Hybridization probes detect the presence of a particular nucleic acid sequence, referred to herein as a target sequence, through the use of a complimentary nucleic acid sequence which selectively hybridizes to the target nucleic acid sequence. In order for a hybridization probe to hybridize to a target sequence, the hybridization probe must contain a nucleic acid sequence that is at least partially complementary to the target sequence. The complementary sequence must also be sufficiently long so that the probe exhibits selectivity for the target sequence over non-target sequences. In order to design a hybridization probe that selectively hybridizes to a target sequence, one must first determine a nucleic acid sequence that is at least partially complementary to the target sequence. In applications where the target sequence is already known, for example, where one seeks to detect the insertion of a gene or promoter sequence into a vector or plasmid, a variety of methods are known for preparing highly selective hybridization probes. However, one limitation of hybridization assays is that one does not also know the target sequence in sufficient detail to prepare a selective hybridization probe. Hybridization assays are most commonly designed to detect the presence or absence of a particular nucleic acid sequence, for example the insertion of a gene into a vector or plasmid. However, hybridization assays are generally not designed to detect the movement of a nucleic acid sequence relative to another nucleic acid sequences in a sample. The detection of nucleic acid sequence aberrations using a hybridization assay is limited by both the ability to design sequence specific probes and the ability to detect the movement of a nucleic acid sequence relative to other nucleic acid sequences in a sample. The detection of nucleic acid sequence aberrations is further limited by the infrequency of nucleic acid sequence aberrations. For example, chromosome translocations, a type of nucleic acid sequence aberration, is estimated to occur at a frequency on the order of 1 per 1,000,000 cells in a particular gene. Currently available hybridization assays are not able to accurately detect and quantify such infrequent genetic events. Although translocations are more frequent in the whole genome (approximately 1 per 200 cells), currently available assays are not able to quantify the large number of individuals that must be evaluated in population studies. As used herein, nucleic acid sequence aberrations refer to rearrangements between and within nucleic acids, particularly chromosomal rearrangements. Nucleic acid sequence aberrations also refer to the deletion of a nucleic acid sequence, particularly chromosome deletions. As used herein, the term "nucleic acids" refers to both DNA and RNA. A chromosome translocation is an example of a nucleic acid sequence aberration. A chromosome translocation refers to the movement of a portion of one chromosome to another chromosome (inter- chromosome rearrangement) as well as the movement of a portion of a chromosome to a different location on that chromosome (intra-chromosome rearrangement). In general, chromosome translocations are characterized by the presence of a DNA sequence on a particular chromosome that is known to be native to a different chromosome or different portion of the same chromosome. Chromosome translocations are frequently random genetic events which can occur at virtually any portion of any chromosome. Because the particular nucleic acid sequences involved in a chromosome translocation is not always known, it is generally not possible to design a hybridization probe that will uniquely identify a translocated sequence without first determining the translocated sequence. In addition, because chromosome translocations involve the movement of a nucleic acid sequence within a sample as opposed to the appearance or disappearance of the nucleic acid sequence, it generally is not possible to detect a chromosome translocation merely by assaying for the presence or absence of a particular nucleic acid sequence. Chromosome translocations are known to be involved in carcinogenesis and inherited genetic disorders and have been shown to increase in frequency upon exposure to radiation and certain chemicals. Measurement of the frequency of chromosome translocations after exposure to radiation or a particular agent is therefore useful for evaluating the tendency of particular agents or forms of radiation to cause or increase the frequency of chromosome translocations. Chromosome translocations are also known to be associated with specific diseases, including, for example lymphomas and leukemias, such as Burkitt's lymphoma, chronic myelocytic leukemia, chronic lymphocytic leukemia and granulocytic leukemia, as well as solid tumors such as malignant melanoma, prostate cancer and cervical cancer. A method for rapidly detecting a translocation associated with a disease is needed as a method for diagnosing disease. Fluorescence in situ hybridization (FISH) using chromosome- specific composite hybridization probes ("chromosome painting") was developed as an assay for detecting chromosome translocations. FISH is described in Pinkel, et al., Proc. Natl. Acad. Sci. (USA) 83:2934- 2938 (1986); Lucas, et al., International Journal of Radiation Biology 56:35- 44 (1989), 62: 53-63 (1992); Pinkel, et al., Proc. Natl. Acad. Sci. (USA) 85:9138-9142 (1988), each of which is incorporated herein by reference. The fluorescent hybridization probes used in FISH-based chromosome painting are chromosome-specific but not unique, i.e., they hybridize primarily to a particular chromosome type. Chromosome translocations are identified in the FISH assay by visually scanning individual cells for the presence of two different fluorescent signals on a single chromosome, the two fluorescent signals originating from two different FISH probes, each probe having homology to a different chromosome type. Because each FISH probe hybridizes to a specific chromosome type and not to the chromosome translocation itself, it is not possible to determine the frequency of chromosome translocations directly from the fluorescence signal emanating from a FISH probe. Rather, the frequency of random chromosome translocations in a cell sample must be determined according to FISH assays by visually scanning individual cells. The need to visually scan individual cells effectively limits the number of cells that can be assayed, thereby reducing the sensitivity of the FISH assay and introducing the possibility of human error. A faster, more accurate method for quantifying chromosome translocations and other nucleic acid sequence aberrations is needed. SUMMARY OF THE INVENTION The present invention relates to a method for detecting nucleic acid sequence aberrations. As used herein, nucleic acid sequence aberrations refer to rearrangements between and within nucleic acid sequences, particularly chromosomes. Nucleic acid sequence aberrations also refer to the deletion of a nucleic acid sequence, particularly chromosome deletions. As used herein, the term "nucleic acids" refers to both DNA and RNA of any origin. According to the method of the present invention, a nucleic acid sequence aberration is detected by detecting nucleic acid sequences having both a first nucleic acid sequence type (e.g., from a first chromosome) and a second nucleic acid sequence type (e.g., from a second chromosome), the presence of the first and the second nucleic acid sequence type on the same nucleic acid sequence indicating the presence of a nucleic acid sequence aberration. More specifically, a solution containing a sample of nucleic acids is contacted with a first and a second hybridization probe under conditions favorable for hybridization. The first hybridization probe includes a nucleic acid sequence that is at least partially complementary to a first nucleic acid sequence type. The first hybridization probe also includes a first complexing agent capable of attaching to a second complexing agent. The second hybridization probe contains a nucleic acid sequence that is at least partially complementary to a second nucleic acid sequence type and that selectively hybridizes to the second nucleic acid sequence type over the first nucleic acid sequence type. The second hybridization probe also contains a detectable marker which enables the second hybridization probe to be detected. The sample of nucleic acids is contacted with the second hybridization probe under conditions favorable for hybridization either before, after or during the hybridization of the first hybridization probe with the sample of nucleic acids. The first complexing agent on the first hybridization probe is contacted with the second complexing agent bound to a solid support either before or after the first and/or second hybridization probe is hybridized to the sample of nucleic acids. By contacting the first and second complexing agents, the first hybridization probe becomes immobilized on the solid support. This enables the immobilization of any nucleic acid sequence hybridized to the first hybridization probe, i.e., a nucleic acid sequence that includes a nucleic acid sequence of the first type. The solid support also enables nucleic acid sequences hybridized to the first hybridization probe to be separated from nucleic acid sequences that do not hybridize to the first hybridization probe. Once the sample of nucleic acid sequences are hybridized to the first and second hybridization probes and immobilized on to the solid support by the second complexing agent, the immobilized hybridized nucleic acid sequences are separated from any non-hybridized nucleic acid sequences and any non-hybridized second hybridization probes. Only nucleic acid sequences containing the first nucleic acid sequence type, i.e. nucleic acid sequences which hybridize to the first hybridization probe, will be immobilized. Of these sequences, only nucleic acid sequences containing the second nucleic acid sequence type will hybridize to the second hybridization probe. Thus, after the separation step, the amount of immobilized second hybridization probe, measurable using the detectable marker, is directly proportional to the number of nucleic acid aberrations present in the sample of nucleic acids analyzed. The detectable marker may be detected without separating the detectable marker from the solid support, for example by using .sup. 14 C as the detectable marker and using accelerator mass spectroscopy to detect the .sup.14 C marker. Alternatively, the detectable marker may be separated from the solid support prior to detection. This may be accomplished by digestion of the immobilized nucleic acids, by dehybridizing the first and/or second hybridization probe or by detaching the first and second complexing agents. Alternatively, a detachable linker may be incorporated between the solid support and second complexing agent, the first hybridization probe and first complexing agent or the second hybridization probe and the detectable marker to enable the detectable marker to be detached from the solid support. The method of the present invention increases by several fold the sensitivity, precision and speed of detecting randomly occurring nucleic acid sequence aberrations such as chromosome translocations over current detection methods including FISH assays. Thus, the method of the present invention is useful for evaluating clastogentic agents, such as radiation and certain chemicals, for their tendency to increase the frequency of nucleic acid sequence aberrations. The method of the present invention may also be readily adapted for the diagnosis of disease, the occurrence of which is associated with and/or identifiable by the presence of a particular nucleic acid sequence aberration. According to this embodiment of the method, the first and second hybridization probes are designed to selectively hybridize to a first and a second nucleic acid sequence type, the nucleic acid sequence aberration of which is associated with and/or characteristic of a disease. Only nucleic acid sequences containing both the first and second nucleic acid sequence types, the aberration of which is associated with and/or characteristic of a disease, will hybridize to both the first and second hybridization probes. As a result, the detection of the second hybridization probe immobilized on the solid support may be used to diagnose a disease associated with the particular nucleic acid aberration being detected. The present invention also relates to a kit for detecting nucleic acid aberrations and diagnosing disease according to the methods of the present invention. In general, the kits of the present invention include a first hybridization probe, and a second hybridization probe as described herein. The kits may also include a second complexing agent bound to a solid support as described herein as well as instructions for using the kit. BRIEF DESCRIPTION OF THE DRAWINGS FIGS. 1, 2 and 3 A-G depict an exemplary method of the present invention for detecting a chromosome translocation. FIG. 1 depicts the hybridization of the first and second hybridization probes to a sample of chromosomal DNA, a fragment of which contains a translocation. FIG. 2 depicts the immobilization of the hybridized chromosomal DNA to a solid support and the separation of the immobilized DNA from non- immobilized DNA. FIGS. 3A-G depict several approaches to isolating and/or detecting the detectable marker on the immobilized second hybridization probe. FIG. 3A illustrates the detectable marker being detected by first digesting the nucleic acids immobilized on the solid support using DNase. FIG. 3B illustrates the detectable marker being separated from the solid support prior to detection of the detectable marker by the dehybridization of the first hybridization probe. FIG. 3C illustrates the detectable marker being separated from the solid support prior to detection of the detectable marker by the dehybridization of the second hybridization probe. FIG. 3D illustrates the detectable marker being separated from the solid support prior to detection of the detectable marker by detaching the second complexing agent from the solid support. FIG. 3E illustrates the detectable marker being separated from the solid support prior to detection of the detectable marker by detaching the first and second complexing agents. FIG. 3F illustrates the detectable marker being separated from the solid support prior to detection of the detectable marker by detaching the first complexing agent from the first hybridization probe. FIG. 3G illustrates the detectable marker being separated from the solid support prior to detection of the detectable marker by detaching the detectable marker from the second hybridization probe. FIGS. 4A and 4B illustrate the detection of the Philadelphia chromosome wherein FIG. 4A illustrates the use of a second hybridization probe specific for the abl gene and FIG. 4B illustrates the use of a composite second hybridization probe for chromosome 9. DETAILED DESCRIPTION OF THE INVENTION The present invention relates to a rapid and efficient method for detecting nucleic acid sequence aberrations using hybridization probes. Unlike the FISH assay which requires visually scanning individual cells, the method of the present invention is designed to enable the use of a detectable marker to analytically quantify the frequency of nucleic acid sequence aberrations such as chromosome translocations. Because an analytically detectable marker is used to measure nucleic acid sequence aberrations rather than visually scanning individual cells, one is able to analyze over a thousand times as many cells for aberrations than was previously possible using the FISH assay. This large increase in the number of cells that may be analyzed at a time significantly enhances the speed, sensitivity and accuracy of nucleic acid sequence aberration detection. For example, it would permit the measurement of nucleic acid sequence aberrations in large populations evaluated epidemiologically. This is not possible using the current FISH technology. The present invention also relates to the diagnosis of diseases, such as cancer and genetic disorders, which are associated with and/or identifiable by the presence of a particular nucleic acid sequence aberration. For example, the translocation of oncogene c-myc, which is normally located on chromosome 8q to chromosome 14, referred to as a t(8; 14) translocation, is characteristic of Burkitt's lymphoma. Using the method of the present invention for detecting aberrations, diseases such as Burkitt's lymphoma may be readily diagnosed. Further, given the large number of cells that can be evaluated using the present method, very low translocation frequencies can be measured. Thus, the method of the present invention represents a valuable tool for the early detection of disease. Examples of diseases that may be detected according to the method of the present invention include, but are not limited to lymphomas and leukemias, such as Burkitt's lymphoma which is identifiable by a unique translocation between chromosomes 8 and 14, chronic myelogenous leukemia which is identifiable by a unique translocation between chromosomes 9 and 22, chronic lymphocytic leukemia which is identifiable by a unique translocation between chromosomes 11 and 14 and granulocytic leukemia which involves granulocytes which cannot be cultured, t(8;21). Detection of such specific translocations may also be helpful in evaluation the progression of AIDS. Unique translocations may also be identified in solid tumors, such as, malignant melanoma, t(1: 19)(q12: q13), prostate cancer t(8:12) and cervical cancer, t(1,8)(q22:p23.1) and t(1:5)(q25:p32). Further, as new diseases are linked to the occurrence of a nucleic acid sequence aberration, these new diseases will also be rapidly detectable using the method of the present invention. Using the method of the present invention, diseased cells, such as cancer cells can be rapidly detected. Further, because a relatively large number of cells can be assayed at a time with a high level of sensitivity, the method of the present invention provides an effective tool for detecting these diseases at an early stage when treatment of these diseases is most likely to be effective. The present invention also relates to a kit for detecting nucleic acid aberrations and diagnosing disease according to the methods of the present invention. In general, the kits of the present invention include a first hybridization probe and a second hybridization probe as described herein. The kits may also include a second complexing agent bound to a solid support as described herein. Optionally, the kits may also include instructions describing how to use the kit to detect nucleic acid sequence aberrations and the diagnosis of disease associated with or identifiable by the presence of a particular nucleic acid sequence aberration. Specific examples of disease diagnosis kits that may be prepared according to the present invention include kits for diagnosing malignancies such as Burkitt's lymphoma, chronic myelocytic leukemia, chronic lymphocytic leukemia, granulocytic leukemia, malignant melanoma, prostate cancer, and cervical cancer. According to the method of the present invention, a sample of nucleic acids is first obtained. As illustrated in FIG. 1, in applications where the nucleic acid sample consists of chromosomal DNA, the chromosomal DNA is first isolated from a sample of cells. Chromosomal DNA may be isolated by any of the variety of methods known in the art. For example, the chromosomal DNA may be isolated by the method taught in Vooijs, et al. Am. J. Hum. Genet. 52:586-597 (1993) or by using the GIBCO BRL TRIzol™ Reagent (Life Technologies, Gaithersburg, MD), each of which is incorporated herein by reference. Chromosomal DNA may be analyzed as whole chromosomes, chromosome fragments or chromosomal DNA fragments, all of which are hereinafter referred to as chromosomal DNA. When analyzing chromosomal DNA for the presence of nucleic acid sequence aberrations, the chromosomal DNA may be organized as an extended double strand, as extended nucleosomes, as chromatin fiber, as folded fiber, and as interphase, prophase or metaphase DNA. Sandberg,"The chromosomes in human cancer and leukemia", Elsevier; New York (1980), pp. 69-73. The preferred chromosome organization for assaying chromosomal DNA for the presence of a nucleic acid sequence aberration depends on the number of nucleic acid bases separating the first and second nucleic acid sequence types being recognized by the first and second hybridization probes to identify the aberration. The preferred size of the solid support, if a particulate solid support such as beads are employed, is a function of the size of the piece of target DNA or RNA to be evaluated. For example, target pieces of DNA can range from less than a micron to several millimeters in length depending on the level of organization used and the degree to which the chromosomes are fractionated. For example, detection of the Philadelphia chromosome would require target pieces on the order of a few hundred kilobases (less than 1 mm) if the DNA molecules are fully extended and only a few microns if the chromosomes are in the interphase level of organization. As illustrated in FIG. 1, once the sample of nucleic acids is obtained, the nucleic acid sample is contacted with a first hybridization probe under conditions favorable for hybridization. The first hybridization probe is specific for a first nucleic acid sequence type, i. e., it is at least partially complementary to the first nucleic acid sequence type and therefore selectivity hybridizes to that nucleic acid sequence type. In the case of detecting chromosomal translocations, the first hybridization probe is preferably a chromosome-specific probe such that it selectivity hybridizes to a particular chromosome type. In the case of detecting inter-chromosomal rearrangements,"chromosome type" refers to individual chromosomes. In the case of detecting intrachromosomal rearrangements,"chromosome type" refers to different portions of an individual chromosome since intra-chromosomal rearrangements involve the movement of a sequence to a different portion of the same chromosome. Any hybridization probe which preferentially hybridizes to a particular nucleic acid sequence may be used as the first hybridization probe and is intended to fall within the scope of the present invention. In the case of detecting chromosome translocations, an exemplary method for preparing PCR libraries of individual chromosomes and the use of those libraries to prepare chromosome-specific hybridization probes is taught in Vooijs, et al. Am. J. Hum. Genet. 52:586-597 (1993) which is incorporated herein by reference. Because the first hybridization probe is selective for a first nucleic acid sequence type as opposed to the nucleic acid sequence aberration itself, the first hybridization probe hybridizes to all nucleic acid sequences containing the first nucleic acid sequence type. For example, with regard to detecting chromosome translocations, the first hybridization probe may be a chromosome specific probe. Thus, the first hybridization probe does not by itself detect the nucleic acid sequence aberration. Rather, the method of the present invention relies upon the second hybridization probe to identify those nucleic acid sequences isolated by the first hybridization probe which also has a nucleic acid sequence of a second type. By contrast, in most prior art hybridization assays using two hybridization probes, the first hybridization probe selectively isolates the nucleic acid being detected while the second hybridization probe serves to enable detection of the nucleic acid sequence isolated by the first hybridization probe. The first hybridization probe also includes a first complexing agent that is capable of forming a binding pair with a second complexing agent. The second complexing agent is attached to a solid support, thereby enabling the immobilization of the first hybridization probe on the solid support. The first and second complexing agents used to attach the first hybridization probe to the solid support may be any pair of complexing agents which form a strong binding pair. Since elevated temperatures are generally required for hybridization, the binding pair should preferably be stable at temperatures at least up to about 37° C. Examples of suitable binding pairs of complexing agents include antibody-antigen pairs, biotin-avidin and digoxigenin-anti- digoxigenin. Avidin-biotin and analogues and derivatives thereof are particularly preferred as binding pairs due to their enhanced thermal stability. Examples of avidin derivatives include, but are not limited to, streptavidin, succinyl avidin, ferritin avidin, enzyme avidin and cross- linked avidin. Examples of biotin derivatives include, but are not limited to caproylamidobiotin and biocytin. Examples of biotin analogues include, but are not limited to desthiobiotin and biotin sulfone. Biotin- antibiotin antibody is an example of a suitable antibody-antigen pair. Any solid support to which a complexing agent may be attached may be used in the present invention. Examples of suitable solid support materials include, but are not limited to, silicates such as glass and silica gel, cellulose and nitrocellulose papers, nylon, polystyrene, polymethacrylate, latex, rubber, and fluorocarbon resins such as TEFLON. TM.. The solid support material may be used in a wide variety of shapes including, but not limited to slides and beads. Slides provide several functional advantages and thus are a preferred form of solid support. Slides can be readily used with any chromosome organization. Due to their flat surface, probe and hybridization reagents can be minimized using glass slides. Slides also enable the targeted application of reagents, are easy to keep at a constant temperature, are easy to wash and facilitate the direct visualization of DNA immobilized on the solid support. Removal of DNA immobilized on the solid support is also facilitated using slides. It is estimated that a standard microscope glass slide can contain 50,000 to 100,000 cells worth of DNA. Beads, such as BioMag® Strepavidin magnetic beads are another preferred form of solid support containing a second complexing agent. It is preferred that avidin or an avidin derivative be used as the second complexing agent. Avidin may be chemically attached to glass using the N-hydroxysuccinamide active ester of avidin as taught by Manning, et al. Biochemistry 16:1364-1370 (1977) and may be attached to nylon by a carbodiimide coupling as taught by Jasiewicz, et al. Exp. Cell Res. 100:213-217 (1976). Magnetic microbeads labelled with avidin and strepavidin labelled bead may be obtained from Advanced Magnetics, Inc., Cambridge, MA and from Spherotech, Inc., Libertyville, IL. The first hybridization probe may be immobilized on to the solid support either before or after the first hybridization probe is hybridized to the sample of nucleic acids. The first hybridization probe is preferably attached to the solid support after the probe is hybridized to the sample of nucleic acids since it is believed that hybridization is impeded when the probe is attached to the solid support. Once nucleic acids of a first nucleic acid sequence type have been hybridized to the first hybridization probe and immobilized on the solid support, the hybridized nucleic acids may be separated from any non- hybridized nucleic acids. Separation of the hybridized nucleic acids from non-hybridized nucleic acids may be accomplished by a variety of methods known in the art including, but not limited to, centrifugation, filtration and washing. Once any non-hybridized nucleic acids have been removed, the immobilized hybridized nucleic acids are then contacted with a second hybridization probe under conditions favorable for hybridization. Optionally, the second hybridization probe may be contacted with the nucleic acid sample before or simultaneously with the hybridization of the first hybridization probe to the nucleic acid sample. FIGS. 1 and 2 illustrate the second hybridization probe being hybridized to the chromosomal DNA prior to immobilizing the hybridized chromosomal DNA on the solid support. It is preferred that the second hybridization probe be used after the first hybridization and immobilization in order to enable nucleic acids of the second type that do not contain a nucleic acid sequence of the first type to be eliminated through a separation step. By eliminating nucleic acid sequences of the second chromosome type that do not also contain a nucleic acid sequence of the first type prior to introducing the second hybridization probe, less nucleic acids sequences are present which can nonspecifically bind to the second hybridization probe. In addition, less second hybridization probe is needed. Both of these factors aid in minimizing the amount of second hybridization probe that becomes immobilized that is not bound to a nucleic acid sequence aberration. This serves to minimize the amount of background noise present in the assay, thereby enabling greater assay accuracy and lower detection limits. The second hybridization probe includes a nucleic acid sequence that does not hybridize to nucleic acids of the same type as the first hybridization probe. Any nucleic acid sequence which does not hybridize to the first nucleic acid sequence type may be used in the second hybridization probe and is intended to fall within the scope of the present invention. The second hybridization probe further includes an analytically detectable marker which is used to quantify the frequency of the nucleic acid sequence aberration being detected. When detecting random nucleic acid sequence aberrations, such as random chromosomal translocations, the second hybridization probe preferably is a composite chromosome hybridization probe capable of hybridizing along the entire length of a chromosome other than the chromosome to which the first hybridization probe hybridizes. By using a composite hybridization probe, multiple second hybridization probes may be used to complete the identification of the nucleic acid sequence aberration. By having multiple second hybridization probes bind to the target sequence, the signal generated by the detectable marker can be amplified thereby increasing the sensitivity of the method. The use of a composite hybridization probe as the second hybridization probe is described in Example 1 and illustrated in FIGS. 4A and 4B. Optionally, the second hybridization probe may hybridize to more than one chromosome type other than the chromosome type to which the first hybridization probe hybridizes. In this embodiment, the second hybridization probe enables the rapid identification of all nucleic acid sequence aberrations involving the chromosome identified by the first hybridization probe. Where possible, the second hybridization probe preferably includes a nucleic acid sequence that is uniquely specific to the nucleic acid sequence aberration being detected. The use of uniquely specific hybridization sequences is preferred since it minimizes the occurrence of background noise due to non-specific binding. For example, when detecting particular nucleic acid sequence aberrations, the second hybridization probe is preferably specific for a particular nucleic acid sequence. For example, some diseases, such as cancer and genetic disorders appear to arise from a specific chromosome translocation. By using a second probe that is specific for a nucleic acid sequence, the translocation of which is associated with a particular disease, it is possible to rapidly identify the presence of chromosome translocations associated with the disease to be diagnosed. It is also preferred to employ a composite second hybridization probe which includes a series of sequences that are all either unique or chromosome specific for the aberration being detected. According to the method of the present invention, the first hybridization step and the immobilization step enables the separation of nucleic acid sequences of a first nucleic acid sequence type. Since the second hybridization probe is designed so that it does not hybridize to nucleic acid sequences of the first nucleic acid type, the second hybridization probe does not bind to nucleic acids immobilized by the first hybridization probe that do not contain a nucleic acid sequence aberration. As a result, the amount of detectable marker detected due to the hybridization of the second hybridization probe to the immobilized nucleic acids is directly proportional to the frequency of nucleic acid sequence aberration in the sample of nucleic acids being analyzed. Non-specific binding by the non-unique first and second hybridization probes to the nucleic acid sample may be minimized through the use of suppression techniques such as is disclosed by Pinkel, et al. Proc. Natl. Acad. Sci. USA (1988) 85:9138-9142 which is incorporated herein by reference. As taught in Pinkel, et al. unlabelled nucleic acid probes, for example, unlabelled genomic DNA, may be used to competitively inhibit non-specific hybridization. The first and second hybridization probes may include RNA or DNA sequences such that the complementary nucleic acid sequences formed between the hybridization probes and the target sequence may be two DNA sequences or a RNA and a DNA sequence. Any analytically detectable marker that can be attached to or incorporated into a hybridization probe may be used in the present invention. An analytically detectable marker refers to any molecule, moiety or atom which can be analytically detected and quantified. Methods for detecting analytically detectable markers include, but are not limited to, radioactivity, fluorescence, absorbance, mass spectroscopy, EPR, NMR, XRF, luminescence and phosphorescence. For example, any radiolabel which provides an adequate signal and a sufficient half-life may be used as a detectable marker. Commonly used radioisotopes include . sup.3 H, .sup.14 C, .sup.32 P and .sup.251 l. In a preferred embodiment, . sup.14 C is used as the detectable marker and is detected by accelerator mass spectroscopy (AMS). .sup.14 C is preferred because of its exceptionally long half-life and because of the very high sensitivity of AMS for detecting .sup.14 C isotopes. Other isotopes that may be detected using AMS include, but are not limited to, .sup.3 H, .sup.125 l, .sup.41 Ca, .sup.63 Ni and .sup.36 Cl. Fluorescent molecules, such as fluorescein and its derivatives, rhodamine and its derivatives, dansyl, umbeliferone and acridimium, and chemiluminescent molecules such as luciferin and 2,3- dihydrophthalazinediones may also be used as detectable markers. Molecules which bind to an analytically detectable marker may also be covalently attached to or incorporated into hybridization probe, for example, as taught by Ward, European Patent Application No. 63,879 which is incorporated herein by reference. In such instances, the hybridization probe is detected by adding an analytically detectable marker which specifically binds to the probe, thereby enabling detection of the probe. Examples of such molecules and their analytically detectable counterparts include biotin and either fluorescent or chemiluminescent avidin. Antibodies that bind to an analytically detectable antigen may also be used as a detectable marker. The detectable marker may also be a molecule which, when subjected to chemical or enzymatic modification, becomes analytically detectable such as those disclosed in Leary, et al., Proc. Natl. Acad. Sci. (U.S.A. ), 80:4045-4049 (1983) which is incorporated herein by reference. Other examples of suitable detectable markers include protein binding sequences which can be detected by binding proteins, such as those disclosed in U.S. Pat. No. 4,556,643 which is incorporated herein by reference. As discussed herein, the nucleic acid sequence employed in the second hybridization probe may itself function as a detectable marker where the bases forming the nucleic acid sequence are quantified using techniques known in the art. Once the nucleic acid sequences containing the first nucleic acid sequence type are hybridized to the first and second hybridization probes and immobilized on to the solid support by the second complexing agent, the immobilized hybridized nucleic acid sequences are separated from any non-hybridized nucleic acid sequences and any non- hybridized second hybridization probes. Since nucleic acid sequence aberrations are detected and quantified based on the presence or absence of the detectable marker attached to a second hybridization probe, it is critical that any second hybridization probe containing the detectable marker that is not hybridized to the nucleic acid sample be removed. Removal of nucleic acids that are not hybridized to the solid support may be readily performed by a variety of separation techniques known in the art including centrifugation, filtration and washing. Once any nucleic acids and hybridization probes that are not immobilized to the solid support have been removed, the presence or absence of the detectable marker attached to the second hybridization probe is detected in order to detect the presence or absence of a nucleic acid aberration. As discussed above, the second hybridization probe will only be immobilized onto the solid support if the nucleic acid to which the second hybridization probe is hybridized contains a detectable marker. The detection and quantification of the detectable marker can be performed using a variety of methods, depending upon the particular hybridization probes and detectable markers employed. In one embodiment, illustrated in FIG. 3A, the detectable marker is detected by treating the immobilized nucleic acid sequences with DNase to digest any DNA immobilized on the solid support. The digested DNA is then collected after enzymatic digestion and analyzed for the presence of the detectable marker. Alternatively, the nucleic acids attached to the solid support may be removed from the solid support by a variety of chemical and physical methods available, including, for example, treatment with a basic solution (e.g., concentrated NaOH), treatment with an acidic solution and denaturalization of DNA using standard methods such as elevated temperatures or reagents. For example, when the detectable marker used is .sup.14 C, the entire solid support containing the immobilized nucleic acids and hybridization probes may be graphitized and analyzed using accelerator mass spectroscopy (AMS). The use of AMS and a . sup.14 C detectable marker to quantify nucleic acid aberrations is described in greater detail in Example 1. In another embodiment, illustrated in FIGS. 3B and 3C, the detectable marker is separated from the solid support prior to detection of the detectable marker by dehybridizing the first and/or the second hybridization probe to the target nucleic acid sequence. This may be done by heating the solid support and immobilized sequences to at least 70. degree. C. By controlling the length of the nucleic acid sequences forming the first and/or second hybridization probes it is possible to selectively dehybridize the first and second hybridization probes in a particular order. It is also possible to selectively dehybridize the first and second hybridization probes in a particular order by biotinylating one of the hybridization probes and incorporating digoxigenin onto the other hybridization probe. It has been observed that biotinylated probes dehybridize at a lower temperature than hybridization probes containing digoxigenin. Chromosomal DNA immobilized on the solid support tends to become entangled with one or more strands of chromosomal DNA as well as the solid support. In addition, chromosomal DNA is generally immobilized on the solid support at multiple sites. It is therefore generally preferred to dehybridize the second hybridization probe selectively over the first hybridization probe. When the second hybridization probe is selectively dehybridized over the first hybridization probe, the nucleic acids forming the second hybridization probe may be quantified and thus used as the detectable marker. Quantification of the nucleic acids may be performed by a variety of methods known in the art, preferably by measuring the absorbance of the nucleic acids using UV spectroscopy, or by quantitative commercial calorimetric methods (e.g. the "DNA DIPSTICK" sold by Invitrogen, San Diego, CA). Selectively dehybridizing the first hybridization probe over the second hybridization probe is desirable in instances where it is sought to isolate nucleic acid containing the nucleic acid sequence aberration. Selectively dehybridizing the second hybridization probe over the first hybridization probe is desirable in instances where it is sought to isolate only the second hybridization probe, for example, in order to use the nucleic acids of the second hybridization probe as a detectable marker. Selectively dehybridizing the second hybridization probe is also desirable where it is sought to maintain the target sequence immobilized onto the solid support in order employ a different second hybridization probe on the same sample of nucleic acids. For example, one might wish to assay for a chromosome translocation between chromosome 1 and chromosomes 2-5. Thus, by being able to selectively dehybridize the second hybridization probe, it is possible to immobilize chromosome 1 using a first hybridization probe and then sequentially assay for translocations between chromosome 1 and chromosomes 2-5 using a series of different second hybridization probes. In another embodiment, illustrated in FIG. 3D, the detectable marker is separated from the solid support prior to detection of the detectable marker by breaking the bond between the second complexing agent and the solid support. This may be accomplished through the use of a detachable linker positioned between the second complexing agent and the solid support. Examples of suitable detachable linkages include, but are not limited to the detachable linkers described in Lin, et al., J. Org. Chem. 56:6850-6856 (1991); Ph.D. Thesis of W.-C. Lin, U.C. Riverside, (1990); Hobart, et al., J. Immunological Methods 153: 93- 98 (1992); Jayabaskaran, et al., Preparative Biochemistry 17(2): 121- 141 (1987); Mouton, et al., Archives of Biochemistry and Biophysics 218: 101- 108 (1982); Funkakoshi, et al., J. of Chromatography 638:21-27 (1993); Gildea, et al., Tetrahedron Letters 31: 7095-7098 (1990); and WO 85/04674, each of which are incorporated herein by reference. In another embodiment, illustrated in FIG. 3E, the detectable marker is separated from the solid support prior to detection of the detectable marker by breaking the bond between the first and second complexing agents. For example, using antidigoxigenin and digoxigenin as the first and second binding agents, the bond between the first and second complexing agents may be broken. In another embodiment, illustrated in FIG. 3F, the detectable marker is separated from the solid support prior to detection of the detectable marker by breaking the bond between the first complexing agent and the nucleic acid sequence forming the first hybridization probe. This may be accomplished through the use of a detachable linker positioned between the first complexing agent and the nucleic acid sequence forming the first hybridization probe. Examples of suitable detachable linkages include, but are not limited to the detachable linkers described in the references cited above. In yet another embodiment, illustrated in FIG. 3G, the detectable marker is separated from the solid support prior to detection by detaching the detectable marker from the second hybridization probe. This may be accomplished through the use of a detachable linker between the detectable marker and the second hybridization probe. Examples of suitable detachable linkages include, but are not limited to, the detachable linkers described in the references cited above. The detectable marker may be detected by a variety of methods known in the art, depending on the particular detectable marker employed. For example, AMS may be used when the detectable marker is a radioisotope such as .sup.14 C, liquid scintillation may be used when the detectable marker is tritiated thymidine and standard fluorescence or spectroscopic methods may be used when the detectable marker is a fluorescent molecule or the DNA itself. A nucleic acid sequence aberration frequency rate may be determined based on the signal generated from the detectable marker using a calibration curve. The calibration curve may be formed by analyzing a sample of cells having a known nucleic acid sequence aberration frequency rate. For example, a calibration curve for the nucleic acid sequence aberration may be generated by analyzing a series of known amounts of cells from a cell line in which the aberration rate of the cell line is known. Alternatively, samples of cells may be analyzed according to the method of the present invention and according to a method known in the art for quantifying a nucleic acid sequence aberration. For example, the FISH method for detecting chromosome translocations may be used to determine the nucleic acid sequence aberration frequency rate of a sample of cells. Then, by serially diluting the sample of cells and assaying the cells according to the method of the present invention, a calibration curve may be generated. Alternative methods for generating a calibration curve are within the level of skill in the art and may be used in conjunction with the method of the present invention. When quantifying the frequency of chromosome translocations in a sample, it is preferred to correct the translocation frequency measured to account for the presence of dicentric chromosomes which can provide a false positive reading. Dicentric chromosomes include the chromosomal DNA from the two chromosomes making up the dicentric chromosome. As a result, depending on the particular hybridization probes used, dicentric chromosomes can be incorrectly measured as translocations. Dicentric chromosomes are characterized by having two centromeres where each centromere is of a different chromosome type. Dicentric chromosomes may be identified according to the method of the present invention by employing first and second hybridization probes which each hybridize to the centromere of different chromosome. The dicentric chromosome frequency determined may be subtracted from the measured translocation frequency to provide the translocation frequency. The following example sets forth a method for detecting a chromosome translocation associated with chronic myelogenous leukemia according to the method of the present invention. Further objectives and advantages of the present invention other than those set forth above will become apparent from the example which is not intended to limit the scope of the present invention. EXAMPLE 1. Detection of a Chromosome Translocation Chronic myelogenous leukemia (CML) is genetically characterized by the fusion of the bcr and abl genes on chromosomes 22 and 9 respectively to produce a cytogenetically distinct Philadelphia chromosome. In most cases, the fusion also involves a reciprocal translocation between chromosomes 9 and 22. This example provides a method for detecting cells having the distinctive Philadelphia chromosome indicating the presence of chronic myelogenous leukemia. According to the method of the present invention, the first hybridization probe is formed using the 18-kb phage PEM12 probe (bcr probe) described in Tkachuk, et al., Science 250: 559-562 (1990) which is incorporated herein by reference. Copies of the first hybridization probe may be generated using pcr as described in Vooijs, et al., Am. J. Hum. Genet. 52: 586-597 (1993) and chemically modified to incorporate biotinylated uridine as the first complexing agent according to the method of Pinkel, et al., Proc. Nati. Acad. Sci. (USA) 83:2934-2938 (1986) , each of which is incorporated herein by reference. The second hybridization probe is formed using the 28-kb cosmid c- H- abl probe (abl probe) described in Tkachuk, et al. Copies of the second hybridization probe are generated using pcr as is described in Vooijs, et al., Am. J. Hum. Genet. 52: 586-597 (1993). A .sup.14 C detectable marker is incorporated into the second hybridization probe by the introduction of .sup.14 C labelled nucleotides using pcr. Blood and bone marrow cells from a patient to be tested are isolated according to the procedure described in Tkachuk, et al. DNA from the cell sample is then isolated from the cells using standard methods such as those associated with using the GIBCO BRL TRIzOI™ Reagent (Life Technologies, Gaithersburg, MD), which is incorporated herein by reference. DNA from the cell sample may also be isolated by procedure described in Tkachuk, et al. The isolated DNA is fractionated into small pieces using restriction enzymes or other appropriate methods as described in Pinkel, et al., Proc. Natl. Acad. Sci. (USA) 83:2934- 2938 (1986). The first and second hybridization probes are hybridized to the fractionated DNA sample using the hybridization conditions described in Tkachuk, et al. Alternatively, the first and second hybridization probes may be hybridized to the fractionated DNA sample in separate steps. Once the first and second hybridization probes have been hybridized to the sample of nucleic acids, solid support labelled with avidin is added to immobilize the first hybridization probe by an avidinbiotin linkage. Any nucleic acids hybridized to the first hybridization probe also become immobilized to the solid support. The avidin labelled solid support may be prepared by the methods described in Manning, et al. Biochemistry 16:1364-1370 (1977) and Jasiewicz, et al. Exp. Cell Res. 100:213-217 (1976), each of which are incorporated herein by reference. The solid support is then washed with cold, pH 7 buffered saline to remove any first and second hybridization probes and DNA segments which are not immobilized on the solid support. Once any non-hybridized second hybridization probe has been removed by the saline wash, the nucleic acids immobilized on the solid support are analyzed for the presence of .sup.14 C. DNase or concentrated NaOH is employed to separate any immobilized nucleic acids from the solid support. The nucleic acids isolated are then grafitized and analyzed using AMS for the presence of .sup.14 C according to the method of Vogel et. al., Anal. Chem. 11: 142-149 (1991) which is incorporated herein by reference. A nucleic acid sequence aberration frequency rate may be determined from the .sup.14 C signal obtained from the accelerator mass spectrometer using a calibration curve. The calibration curve may be formed by analyzing a sample of cells having a known nucleic acid sequence aberration frequency rate. For example, a calibration curve for the nucleic acid sequence aberration associated with chronic myelogenous leukemia may be obtained by analyzing a series of known amounts of cells from the K-562 cell line which contain a reciprocal translocation between chromosome 9 and chromosome 22. Alternatively, samples of cells may be analyzed according to the method of the present invention and according to a method known in the art for quantifying nucleic acid sequence aberrations. For example the FISH assay method described in Tkachuk, et al. may be used to determine the nucleic acid sequence aberration frequency rate of a sample of cells. Then, by serially diluting the sample of cells and assaying the cells according to the method described in the present example, a calibration curve may be generated. Alternative methods for generating a calibration curve are within the level of skill in the art and may be used in conjunction with the method of the present invention. In an alternative embodiment of this example, the second hybridization probe may be formed of a composite of nucleic acid sequences specific for chromosome 9. As illustrated in FIG. 4A, when the second hybridization probe is specific for the abl gene, the second hybridization probe only hybridizes to a small portion of the translocated portion of chromosome 9. However, as illustrated in FIG. 4B, by using a composite second hybridization probe for chromosome 9, multiple second hybridization probes can hybridize to the immobilized DNA containing the Philadelphia chromosome. By multiplying the number of second hybridization probes hybridized to the immobilized Philadelphia chromosome, the amount of detectable marker immobilized is also increased. This serves to greatly increase the sensitivity of the assay. While the present invention is disclosed by reference to the preferred embodiments and example detailed above, it is to be understood that these examples are intended in an illustrative rather than limiting sense, as it is contemplated that modifications will readily occur to those skilled in the art, which modifications will be within the spirit of the invention and the scope of the appended claims. The United States government has rights in this invention pursuant to Contract Number W-7405-ENG-48 between the United States Department of Energy and the University of California for the operation of Lawrence Livermore National Laboratory.
Hi, I'm Warwick the classroom music teacher at Pender's Grove in 2014. Already this year we have seen lots of individual and collective musical talent on display in our classes and students have enthusiastically embraced a variety of experiments in rhythm and melody. Together with our extensive instrumental program, 2014 is shaping up as a very rich year indeed for music at Pender's Grove. As an integral part of this, our Grade 56's have begun using Acid and Garageband programs to create digital 'looping' works. This allows students to further explore advanced musical concepts of form, dynamics and tone colour. These will be periodically uploaded to the school website so that these works can be shared with the whole school community. The results so far have been fabulous - have a listen! Dayle 16/3/2014 03:14:21 pm Can feel my feet just wanting to dance. Great work ! Amy 17/3/2014 12:49:48 am Wow! These are really interesting and creative, great job girls and Warwick! Comments are closed. | | Welcome to our Blog Page Here is a glimpse into the daily life of our school community and all of our news. It is an invitation to join us and a celebration of learning and community.
http://www.pendersgroveps.vic.edu.au/about-our-school/inspirational-musicians
In a surprise launch, China delivered its next Yaogan satellite to orbit on Friday. Yaogan 23 was launched atop a Long March 2C rocket blasting off from the Taiyuan Satellite Launch Center at 18:53 UTC. Official Chinese Media declared the launch a success and tracking information provided by U.S. space surveillance shows the newly launched objects in an orbit typical for Yaogan satellites. Previous Yaogan spacecraft carried electro-optical imaging instruments, Synthetic-Aperture Radar payloads or electronic intelligence systems. Satellites with optical payloads are built by the Shanghai Academy of Space Flight Technology while the SAR spacecraft were developed by the China Academy of Space Technology. The first Yaogan satellite was launched back in April 2006 with details of its payload being kept under wraps by the Chinese until it later became known that the spacecraft carried a radar payload in its first generation. Three first generation Radar Satellites were launched between 2006 and 2010 (Yaogan 1, 3, 10) while the same period also saw the launch of four first-generation optical satellites (2, 4, 7, 11). These first generation satellites operated in sun synchronous orbits at an altitude over 630 Kilometers inclined 97.9 degrees. The second generation of Yaogan satellites was introduced in 2008 characterized by a lower operational orbit around 500 Kilometers in altitude. Three second generation optical satellites were launched (5, 12, 21). The second generation of SAR satellites followed in 2009 with the launch of Yaogan 6 continued by the Yaogan 13 satellite in 2011 and Yaogan 18 two years later. Yaogan 9 offered a big surprise in 2010 when instead of a single spacecraft three satellites were launched at once, entering a triangular formation in an orbit of 1,080 by 1,100 Kilometers at an inclination of 63.4 degrees. This arrangement closely resembles the U.S. NOSS triplets that were used for electronic intelligence purposes until being replaced by duos of NOSS (Naval Ocean Surveillance System) starting to be launched in 2001. A total of four Yaogan triplet launches have taken place to date (9, 16, 17, 20). Launching in 2012, the Yaogan 14 satellite has entered a unique position in the constellation, reaching an initial working orbit below 475 Kilometers in altitude. The satellite, carrying an optical reconnaissance payload, currently operates from an orbit of 468 by 478 Kilometers, still lower than any other Yaogan satellite. Yaogan 23 was launched on Friday without any prior warning. Using a Long March 2C rocket, the spacecraft successfully reached orbit, according to Chinese officials. Orbital data shows one object of the launch in an orbit of 493 by 512 Kilometers, inclined 97.33 degrees (most likely the satellite), another in an orbit of 470 by 497 Kilometers at an inclination of 97.14 degrees and a third in an orbit of 348 by 522 Kilometers inclined 97.1 degrees. The type of launch vehicle and the achieved orbit strongly suggests that the satellite belongs to the second generation of SAR satellites, joining Yaogan 6, 13 and 18 – possibly to replace the oldest of the group. Images of previous second generation radar satellites show the spacecraft consisting of a central platform with two deployable solar arrays, each with three panels, and a large SAR antenna, launching with its two outer segments stowed against the satellite body to unfold shortly after launch to point to Earth. The optional SMA Upper Stage is 2.7 meters in diameter and 1.5 meters long. It burns 150 Kilograms of HTPB propellant to provide a thrust of 10.78 Kilonewtons. Friday’s launch was China’s 210th orbital launch and the tenth in 2014.
http://www.spaceflight101.net/long-march-2c---yaogan-23-launch.html
An eruption of Bezymianny volcano happened in Kamchatka for the first time since 2017. It began approximate at 7 pm (Moscow time) on Sunday, January 20. Volcano was marked with the "red" code of aviation hazard. Bezymianny volcano is located near Klyuchevskaya Sopka. The nearest settlements are Kozyrevsk and Klyuchi villages of the Ust-Kamchatka region located 40 kilometers away. The distance to Petropavlovsk-Kamchatsky is about 500 kilometers. The height of the volcano is 2882 meters above sea level. The volcano was considered to be extinct until 1955, when its eruption began on October 22. It was of a moderate nature until March 30, 1956. However, a strong explosion occurred on the volcano, the height of ash emissions was up to 40 kilometers on this day. The eruption of 1956 was one of the largest on a global scale. This was the first catastrophic eruption studied in detail by experts. The Day of the volcanologist is celebrated on March 30 in memory of this event. The height of ash emissions was up to 10 kilometers above sea level according to satellite data from the Kamchatkan Volcanic Eruption Response Team (KVERT). A cloud of ash spread northwestward from the volcano at a distance of about 600 kilometers. The volcano is currently moderately active, but ash emissions to an altitude of up to 10 kilometers can occur at any time. No ash has been noted in the settlements according to the regional emergency department. Bezymianny volcano erupted in December 2017 last time. Then an ash emission was noted at a height of 15 kilometers. Let us recall that there are more than three hundred volcanoes on the Kamchatka Peninsula, about thirty of them are active. There is Klyuchevskaya Sopka - the highest active volcano on the Eurasian continent. Many famous giants are located on the territory of the Kronotsky reserve on the peninsula. These are Kronotsky, Kizimen, Kikhpinych, Gamchen, Vysokiy, Townshits and Krasheninnikov. Ilyinsky, Kosheleva, Kambalny and Wild Crest volcanoes are active in the South Kamchatka reserve. Scientists are constantly monitoring the volcanoes taking into account the restless nature of these famous giants. If you would like to see the volcanoes of Kamchatka, here is our photo collection. Извержение вулкана Толбачик в 1975 году. Фото: Вадим Гиппенрейтер.
https://www.rgo.ru/en/article/eruption-bezymianny-volcano-began-kamchatka
Browsing by Author "The Biochar Grower Group of Lannercost" Now showing items 1-1 of 1 - Assessing the impact of biochar in the Herbert cane industry. Morley, G (2015)Biochar is the charred by-product of biomass pyrolysis, the heating of plant-derived material in the absence of oxygen in order to capture combustible gases. It is generally accepted that biochar is a highly stable form ...
https://elibrary.sugarresearch.com.au/browse?type=author&value=The+Biochar+Grower+Group+of+Lannercost
Starting Work • Identify the task • Set goals together • Prioritize goals • Work on the task • Keep the client focused on the work! During the Session • It Isn’t All About Us! • Focus on the student • Validate whatever response the student makes • Allow silence after questions • Give the student your full attention • Become involved with and curious about the student’s work • ACTIVELY LISTEN! Responding to the Student • Affirm, Do Not Evaluate • DO: Use specifics to compliment, reinforce, question and explain. • DO NOT: Criticize, be judgmental, look for perfection. • Don’t worry about sending the student off with imperfect work! • Emphasize progress by restating discoveries. Closing the Session • Remember to: • Summarize in a sentence or two what YOU think was accomplished… • The student must feel like he/she has progressed! • Ask the student if he/she has any questions • Ask the student his/her plan for further work • Leave the student with a lesson gleaned from the session… • Assign something for him/her to do • Remind him/her of the good practices learned in the session!
https://fr.slideserve.com/shaina/working-for-the-bear-claw
We are a newly established learned society, bringing together researchers, teachers, practitioners and students from different fields who are interested in contributing to the development of this exciting inter/trans-disciplinary field of study. We organise regular conferences, seminars and workshops that explore a wide range of psychosocial phenomena and perspectives. We seek to promote the field of Psychosocial Studies and to challenge the often rigid disciplinary distinctions that characterise the social sciences and the humanities in contemporary university settings and beyond. Get involved Upcoming Events - APS Annual Conference 2020July 2 - July 3 Latest Tweets Latest news The APS acknowledges with gratitude the following Institutional Founding Sponsors: Birkbeck, University of London; London School of Economics & Political Science; The Open University; University of East London; University of Sussex; University of Brighton; British Psychological Society Social Psychology Section, University of Central Lancashire.
http://www.psychosocial-studies-association.org/
The Day Habilitation program for adults with developmental disabilities aims at improving the quality of their lives, as well as their overall level of functioning and independence in the community. We are located in a beautiful setting by the ocean and Webb State Park, so our individuals take advantage of the many walking paths surrounding us. We customize our day habilitation service plan based on an individual's learning ability, interests and therapeutic needs. We offer an array of services such as physical therapy, occupational therapy, speech therapy and nursing supervision. Our program supports individuals with a fitness program, multi-sensory room, adaptive therapeutic equipment. We also offer a skill development program focusing skills such as on gross and fine motor, communication, social, community participation and other activities of daily living. Measurable goals and objectives are developed that sets forth an integrated program of activities and therapies aimed at achieving those stated goals. The individuals who attend The Arc’s Day Habilitation are supported by a director, program manager, case manager, healthcare supervisor, rehab therapy assistant and developmental specialists. We also staff physical, occupational and speech therapists.
https://arcsouthshore.org/what-we-do/day-habilitation-services.html
An operational guide has been created to stimulate initiatives that promote conservation and restoration of biodiversity in water cycle facilities and the surrounding environment. Actions are mainly defined for drinking water treatment plants, wastewater treatment plants and water tanks. The main objectives of the guide are to help decision-making, provide a methodology for self-assessment of facilities, offer technical and concise information on specific actions to promote biodiversity around the facilities, and give information and resources so that actions can carried out effectively. The guide’s factsheets include the following topics: processes and methodologies for developing action plans for biodiversity, naturalization of facilities, ecological restoration, and good management practices. For example, practical details are provided for the creation of shelters for pollinators, the restoration of ponds for amphibians or the control of invasive species.
https://minuartia.com/en/portfolio-posts/development-of-an-operational-guide-for-the-conservation-of-biodiversity-in-the-integral-water-cycle/
This post will go on to compare the rulings in the recent landmark decision by the DB of the Delhi HC in the case of Amazon v. Amway (covered herein on the blog), with the decision rendered by the learned single judge earlier in the case of Christian Louboutin v. Nakul Bajaj. The sole purpose is to identify the impact of the recent judgment on the jurisprudence and to identify the prevailing state of law for legal practitioners and the industry stakeholders to be informed. The specific focus of this comparative analysis is upon the definition of an “intermediary” and the scope of “safe harbour provisions” applicable for intermediaries. The looming question which this post seeks to address is that- whether the 26 factors recognised by the learned single judge in Christian Louboutin are yet applicable or have been effectively overruled? The learned single judge, in a landmark opinion in the case of Christian Louboutin v. Nakul Bajaj, rendered an important and acclaimed decision wherein the definition of an intermediary and the safe harbour under section 79 of the IT Act, were diluted and narrowed. The court specifically in para 56 of the decision, went on to provide 26 factors, to judge as to whether an intermediary was an active or a passive one. Upon adjudication of the same only, could the court proceed to determine whether the safe harbour under section 79 would apply. The court in effect limited the application of the safe harbour provisions to passive intermediaries, who wouldn’t perform the tasks mentioned within paragraph 56 of the decision. The single judge in paragraph 63 went on to state (referring to the conditions laid in para 55): “……The elements summarised above would be key to determining whether an online marketplace or an e-commerce website is conspiring, abetting, aiding or inducing and is thereby contributing to the sale of counterfeit products on its platform. When an e-commerce website is involved in or conducts its business in such a manner, which would see the presence of a large number of elements enumerated above, it could be said to cross the line from being an intermediary to an active participant. In such a case, the platform or online marketplace could be liable for infringement in view of its active participation.” Coming to the case at hand, the decision in the Amway case specifically in reference to the division bench judgment in M/S Clues v. M/S L’Oréal, has explicitly overruled the application of this narrow approach. The court has gone on to state that there is prima facie merit in the claim that value added services like a few of those listed in the judgment of Christian Louboutin does not dilute the safe harbour provisions for intermediaries. It further quoted section 2(1)(w) stating that value added “services” may be provided by intermediaries and it is statutorily permitted. Upon analysis of this comparison and the legal position, it is clear that the division bench has adopted a moderate approach by not restricting the definition of intermediaries in itself, to allow for evidence to be raised and the safe harbour provision to be applicable to all kinds of intermediaries as an affirmative defence, rather than an enforceable provision. However, this decision in Amway has not emphasized upon the question of whether all the 26 factors need not be considered to determine safe harbour. Although, the interpretation of “intermediary” has been rightly expanded, as against the Christian Louboutin decision; but the scope of safe harbour has not been clarified in this decision. The question dealt with by Justice Pratibha Singh in Christian Louboutin (para 56) was would section 2(1)(w) extend to those entities which perform the tasks mentioned within the same paragraph. This has effectively been answered in the division bench judgment of Amway and affirmed, however most importantly, the applicability of the factors mentioned in Christian Louboutin, while determining the scope of safe harbour, and its effect on the same has been overlooked. In simpler terms, an intermediary which, for instance, provides authenticity guarantee (factor v), or advertises the product (factor x), or gives specific discounts to members for purchasing a product (factor xi), which is a counterfeit product or alleged to be one, ought to dilute its safe harbour to some extent. It still may be an intermediary under section 2 (i)(w), however may not be completely exempted from liability due to its active participation and failure in due-diligence by specifically promoting products which are infringing. What I intend to convey through this discussion is that, although the 26 factors in Christian Louboutin may have been overruled for the purposes of determining whether an online service provider comes within the definition of an intermediary, yet the consideration of these factors while extending the safe harbour provision is an essential function for the courts, to purposively interpret this provision rather than providing for a blanket exemption to all intermediaries. The intention of this provision is to prohibit infringement as well as to safeguard intermediaries from facing liability, however this needs to purposively be balanced in order to effectively interpret and apply this intention in practice. Hence the 26 factors enunciated in Christian Louboutin (or at least a few of them) hold high amount of relevance in determining as to what extent would safe harbour extend to the particular intermediary, in context of the actual role played by it in furthering an infringing action.
https://iprmentlaw.com/2020/03/01/comparing-the-decision-in-amazon-v-amway-with-the-landmark-judgment-in-christian-louboutin-v-nakul-bajaj/
First, let me say that I love the idea of a 3 action system. I think, if done well, it will influence both the tactical game play and the class design far into the future. I do think that it would be better if characters got more actions with higher levels, say 4 actions at 10th, 5 at 20th. This would effectively describe how higher level characters can do more things in combat. Spells like haste or action surge type class features surely offer additional actions, if temporarily. I think really big spells or martial maneuvers need to take 3 actions. Those 3 action options open up a lot of possibilities. I'm assuming movement is restricted to 2 move actions per round to stay in line with the double move of pretty much all d20 systems. I say skip the stacking attack penalty. It's not needed. If the maneuvers are better then making individual attacks then it would work. For example, making a single attack just deals weapon damage. Using a 2 action maneuver to attack adds Str bonus damage or allows you to gain some AC. Just don't go 4e on us. That was too much.
https://paizo.com/people/Skullkeeper/threads
By Megan Lambert, Senior Consultant at BTS In our previous blog post, we talked about how a “flipped pyramid” creates more agile organizations through the redistribution of power. Distributing power and decision-making to the front-line people of a company – those who often know the customers best – gives the organization the ability to adapt quickly to the changing environment and better meet the needs of the customer. You may be thinking, “This is great in theory, but how would it work in practice?” Many skeptics adhere to the myth that if power is more evenly distributed, the organization will dissolve into chaos. They ask, “How will we make decisions? How will we get things done?” These apprehensive questioners think of power distribution and imagine an ineffective and inefficient workplace – filled with committees, cross-functional initiatives, and consensus-driven decisions, all painful exercises in persuasion, corporate politics, and ego. There is no doubt that sharing power has its challenges; however, with the right structure and culture to support it (and if the leader has the courage to try it), power sharing can unlock tremendous potential and creative energy in an organization. There seems to be three basic requirements to succeeding with a “flipped pyramid” approach: - Stable purpose and culture - Distributed decision-making structures - Self-aware leaders who model new behaviors 1. Stable purpose and culture Organizational agility in big companies requires as much stability as it does responsiveness. The stability comes from a central set of shared values, principles, culture, and purpose. These provide the guiding light when people are weighing trade-offs and making decisions for the company. For example, one of my clients has an explicit policy that prioritizes employees first, followed by customers, and then shareholders. The CEO states, “Employees are like air (you can live only a few minutes without them), customers are like water (a few days without), shareholders are like food (almost a month).” This metaphor for the organization’s hierarchy of needs provides clear prioritization and guidance for decision-making on choices that could compromise one stakeholder for another. Likewise, leaders can support organizational agility by creating clarity around the organization’s purpose and culture; then, by giving employees space to own their work and guide the company’s direction, they can create a more agile, powerful work force. Another example is Southwest Airlines. Their purpose is to: “Connect people to what’s important in their lives through friendly, reliable, and low-cost air travel.” Employees can use this statement to check their decisions– e.g. “will this new pricing structure help us connect people to what’s important in their lives?” or “Does this new ad demonstrate that we are friendly, reliable, and low-cost?” A purpose statement can become the guiding light for making difficult decisions. 2. Distributed decision-making structures Decision-making structure adds guardrails to the potential chaos of distributed power. There are very sophisticated processes of self-management laid out in systems such as Agile, a working methodology pioneered for software development, and Holacracy, which describes itself as “a self-management practice for purpose-driven companies.” I’ll highlight just one example of a self-managing process even more traditional companies can employ. It’s called the Advice Process, which means that any person at any level of the company can make a decision, provided that they solicit input from every person who will be affected by that decision. For example, I notice that our expense reimbursement system is slow, painful, and time-consuming – I can decide to prototype a mobile app for reimbursements, provided I get input first from Mark in finance, Ross in IT, etc. The decision still resides with me – it is still not consensus driven – but I carefully listen to and consider insights from others in order to make the best possible decision for my organization overall. The Advice Process makes everyone equally responsible for the success of the organization by giving them the power to make impactful business decisions. The challenge is that it requires executives to relinquish control over decisions they would typically make, and allow people “more junior” to them to own critical business decisions. 3. Self-aware leadership who model new behaviors Allowing people across the organization to make key decisions requires an enormous amount of trust and the relinquishment of control on the part of executives. Embracing uncertainty and sharing power can be remarkably uncomfortable for an executive that has made his career on knowing the answers and having the solutions. Brian Robert, partner at HolacracyOne comments in the book Re-inventing Organizations, “When I first became a CEO, I realized how addictive that role was. You get to be a hero every day. There is nothing that feels quite so good as to come in and save the day and have that ‘everything rests on you and your shoulders’ feeling. One of the challenges and opportunities of Holacracy is: now I get to be a hero just like I did before, but now everybody else gets to be a hero too.” The way executives are used to getting the feeling of being a hero – by making the calls and holding the power over the company’s direction – must shift in order to create space for more distributed decision-making. This requires an enormous amount of self-awareness from the leader and a whole new set of behaviors based more on mentoring and coaching than being directive and decisive. It also means leaders need to embrace failure and welcome decisions that are different than ones they themselves might make. Ultimately, it is a process of letting go of control at the top and embracing uncertainty in order to create more momentum and agility across the whole organization. Summary Changing deep-rooted internal structures and culture is difficult – it takes time and immense willingness on the part of your people. However, with the growing complexity of the world, the pace of change, and the rate of disruption, large companies may have no choice but to distribute power and decision-making across the organization or they may risk becoming obsolete. Power distribution is essential to organizational agility, and organization agility is key to success in the market. Trust your people: provide them with the right purpose, culture, decision-making structures, and leadership to achieve organizational agility. If you do that, they will meet the customer’s needs quickly, effectively, and with excellence.
https://bts.com/2017/09/01/organizational-agility-part-2-cracking-the-code-on-the-flipped-pyramid/
Amyloid light-chain (AL) amyloidosis is a relatively rare disease characterized by abnormal protein deposits. While there are several forms of amyloidosis, AL amyloidosis (also known as primary amyloidosis) is the most common type of this disease. The number of cases of AL amyloidosis appears to be on the rise in the United States. Understanding this disease is more important now than ever. Awareness of AL amyloidosis is essential to decrease the time to diagnosis and proper treatment. By shortening the time to treatment, the quality of life of people with AL amyloidosis can be improved. To understand a diagnosis of AL amyloidosis, it is helpful to understand what causes this disease. Antibodies (or immunoglobulins) are proteins produced by the immune system to identify and neutralize infections. Antibodies are manufactured by plasma cells, a specific type of white blood cell. Two kinds of protein make up antibodies: light chains and heavy chains. A light-chain protein is simply the smaller of the two proteins produced by blood plasma cells. In cases of AL amyloidosis, something goes wrong with the deposition of the light chains. The light-chain proteins become misfolded, and the abnormal proteins begin to accumulate in the organs, causing damage and dysfunction. These accumulations of misfolded proteins are called amyloid fibrils. Amyloidosis is not technically a form of cancer or leukemia, but it is still a serious disease. Toxic amyloid deposits and their associated fibrils can damage essential organs — including the heart. When amyloid proteins build up in the heart, this is called cardiac amyloidosis. First, it is helpful to understand the difference between prevalence and incidence. Prevalence refers to the proportion of people who have AL amyloidosis at a given time, whereas incidence refers to the proportion of people who will be newly diagnosed with the condition during that same period. One epidemiological study conducted in France found the yearly incidence of new diagnoses of AL amyloidosis was about 12.5 cases per million inhabitants. The prevalence of AL amyloidosis was 58 cases per million inhabitants. A similar study in the United States indicated a yearly incidence rate of up to 14 cases of AL amyloidosis per million inhabitants, with a prevalence of 40.5 cases per million inhabitants. Although the prevalence (as well as incidence) of AL amyloidosis is relatively low compared to some diseases, it is a very serious condition when it does occur. The risk factors for developing AL amyloidosis include age, gender, family medical history, and the presence of certain health conditions, such as myeloma and diabetes. The risk of developing AL amyloidosis increases with age. Most of the people diagnosed with AL amyloidosis are over age 40. AL amyloidosis is more common in men than in women. Amyloidosis is sometimes linked to other diseases, particularly diseases involving organ failure. Research also shows that people with multiple myeloma, diabetes, and hypothyroidism are more likely to develop AL amyloidosis. Genes also play a role, and hereditary amyloidosis can be passed along in families. This may be due to changes, or mutations, in DNA. For instance, one DNA change is associated with both AL amyloidosis and myeloma. What does the diagnosis of AL amyloidosis look like? Diagnosing AL amyloidosis can be a long and complex journey. A diagnosis generally includes blood and urine tests to detect monoclonal proteins. Other tests performed to assess a potential case of amyloidosis may include: The symptoms of AL amyloidosis occur as a result of the amyloid protein deposits in the kidneys, heart, digestive system, and nervous system. Symptoms of AL amyloidosis can include the following: Read more about symptoms of AL amyloidosis. Treatment for AL amyloidosis will depend on a person’s age, overall wellness, and any other health conditions they may have. In brief, treatments for AL amyloidosis include: Read more about treatments for AL amyloidosis. The disease progression of AL amyloidosis varies depending on the location of symptoms in the body, and it can progress rapidly. In one study of 868 individuals with AL amyloidosis, the median survival period was 3.8 years after diagnosis. Twenty-seven percent of study participants died within one year from diagnosis, often due to symptoms in the heart. Current treatment options for AL amyloidosis attempt to reduce the production of abnormal plasma cells. Early diagnosis and treatment is key because there are currently no approved therapies to remove existing amyloid deposits that cause organ dysfunction. MyAmyloidosisTeam is the social network for people with amyloidosis and their loved ones. On MyAmyloidosisTeam, members come together to ask questions, give advice, and share their stories with others who understand life with amyloidosis. Are you living with AL amyloidosis? Share your experience in the comments below, or start a conversation by posting on your Activities page.
https://www.myamyloidosisteam.com/resources/what-is-al-amyloidosis
Category: Clinical Sciences/Health Conditions Case Diagnosis: Gluteus Medius Tendinopathy 74-year-old female with post-polio syndrome presented with generalized left-leg weakness and new right lateral hip pain. The patient endorsed favoring her right leg for several years, and as a consequence was at increased risk of incurring an overuse injury to the right gluteal abductor muscles. Examination revealed tenderness over the right lateral hip, weak hip abductors (4/5) and positive Trendelenburg sign. Right hip MRI showed a small labral tear, gluteus medius tendinopathy and mild osteoarthritis. Electrodiagnostic studies did not reveal lumbar radiculopathy. The patient’s pain was refractory to prolonged treatment with oral medications, PT, HEP, and corticosteroid injections. The patient was then seen at a tertiary PM&R clinic and received prolotherapy to the right gluteus medius tendon, after which she reported significant decrease of at least 50% of her pain after several months. Gluteal tendinopathy presents as lateral hip pain. There is increased prevalence among women aged above forty years compared to men, about 23.5% and 8.5%, respectively. Its effects are significant, considering that it interferes with basic weight-bearing tasks. Mechanical factors are responsible for the pathophysiology. The combination of high tensile loads and excessive compression within tendons lead to the most damage. From evidence-based studies, gluteal tendinopathy can be managed with shock wave therapy, exercise, corticosteroid injections, and surgery. Considering that there are limited treatment options, the best way to assess and manage gluteal tendinopathy is through the management of the patient’s tendons loads, which can be achieved through exercise, possibly tendon regenerative treatments, and patient education on underlying pathomechanics. Gluteal tendinopathy is a result of stress and compression of the musculotendinous fibers. The existing treatment is aimed at relieving pain through physical and pharmacological methods. Development of more effective management strategies of gluteal tendinopathy may be achieved through prolotherapy, as was demonstrated in this case.
https://www.eventscribe.com/2020/ISPRM/fsPopup.asp?efp=RUpFWlBSWEI5NTY0&PosterID=259290&rnd=0.8238332&mode=posterinfo
The normal heart is a strong, muscular pump a little larger than a fist. It pumps blood continuously through the circulatory system. Each day the average heart "beats" (or expands and contracts) 100,000 times and pumps about 2,000 gallons of blood. In a 70-year lifetime, an average human heart beats more than 2.5 billion times. The circulatory system is the network of elastic tubes that allows blood to flow throughout the body. It includes the heart, lungs, arteries, arterioles (small arteries), and capillaries (minute blood vessels). These blood vessels carry oxygen and nutrient rich blood to all parts of the body. The circulatory system also includes venules (small veins) and veins, the blood vessels that carry oxygen and nutrient depleted blood back to the heart and lungs. If all these vessels were laid end-to-end, they'd extend for about 60,000 miles - far enough to encircle the earth more than twice. The circulating blood brings oxygen and nutrients to all the organs and tissues of the body, including the heart itself. It also picks up waste products from the body's cells. These waste products are removed as they're filtered through the kidneys, liver and lungs. The heart has four chambers through which blood is pumped. The upper two are the right and left atria; the lower two, the right and left ventricles. Four valves open and close to let blood flow in only one direction when the heart contracts (beats). The four heart valves are. Each valve has a set of flaps (also called leaflets or cusps). The mitral valve has two flaps; the others have three. Under normal conditions, the valves permit blood to flow in just one direction. Blood flow occurs only when there's a difference in pressure across the valves that cause them to open. The heart pumps blood to the lungs and to all the body's tissues by a highly organized sequence of contractions of its four chambers. For the heart to work properly, the four chambers must beat in an organized manner. This is governed by an electrical impulse. A chamber of the heart contracts when an electrical impulse moves across it. Such a signal starts in a small bundle of highly specialized cells located in the right atrium - the sinoatrial node (SA node), also called the sinus node. A discharge from this natural "pacemaker" causes the heart to beat. This pacemaker generates electrical impulses at a given rate, but exercise, emotional reactions and hormonal factors can affect its rate of discharge. This lets the heart rate respond to varying demands. Arrhythmias or dysrhythmias are abnormal heart rhythms. They can cause the heart to pump less effectively. Normally the heartbeat starts in the right atrium when a special group of cells sends an electrical signal. (These cells are called the sinoatrial or SA node, the sinus node or "pacemaker" of the heart.) This signal spreads throughout the atria and reaches the ventricles (lower chambers) via the atrioventricular (A-V) node. The A-V node connects to a group of fibers in the ventricles that conduct the electric signal. In the ventricles, the impulse travels down the specialized fibers (the His-Purkinje system) and then to all parts of the ventricles. This exact route must be followed for the heart to pump properly. The heart contracts (beats) as the electrical impulse moves through it. This normally occurs 60 to 100 times a minute. The atria contract a split-second before the ventricles. This lets them empty their blood into the ventricles before the ventricles contract. Under some conditions almost all heart tissue can start a heartbeat. In other words, another part of the heart can become the pacemaker. An arrhythmia occurs These problems can produce a heartbeat that's either too slow or too fast. A heart rhythm that's too slow (bradycardia) can cause fatigue, dizziness, lightheadedness, fainting or near-fainting spells. These symptoms can be easily corrected by implanting an electronic pacemaker under the skin to speed up the heart rhythm Rapid heart beating, called tachycardia or tachyarrhythmia, can produce symptoms of palpitations, rapid heart action, dizziness, lightheadedness, fainting or near fainting if the heart beats too fast to circulate blood effectively. Heartbeats may be either regular or irregular in rhythm. Paroxysmal supraventricular tachycardia or PSVT or SVT is a type of tachycardia which starts and stops suddenly. The heart beats rapidly to about 150-250 beats per minute. It occurs with people of all ages; however is most common in the young and middle age groups. Often it occurs in people with no heart disease. The attacks of palpitation can last from few minutes to hours and may stop on its own or with vigorous cough or mimicking to strain while passing stools; many require hospitalization and intravenous medications. The PSVT is because of an abnormal, extra electrical connection within the heart and this cannot be cured with medicines. When rapid heart beating arises in the ventricles - called ventricular tachycardia - a life-threatening situation can arise. The most serious cardiac rhythm disturbance is ventricular fibrillation, where the lower chambers quiver and the heart can't pump any blood. Collapse and sudden death follows unless medical help is provided immediately. If treated in time, ventricular tachycardia and ventricular fibrillation can be converted into normal rhythm with electrical shock. Rapid heart beating can be controlled with medications by identifying or destroying the focus of rhythm disturbances. Today one effective way of correcting these life-threatening rhythms is by using an electronic device called an implantable cardioverter defibrillator. Blood clots can form during atrial fibrillation. In atrial fibrillation the two small upper chambers of the heart, the atria, quiver instead of beating effectively. Blood isn't pumped completely out of them when the heart beats, allowing the blood to pool and clot. If a piece of the blood clot in the atria becomes lodged in an artery in the brain, a stroke results. About 15 percent of strokes occur in people with atrial fibrillation. This is a study of the electrical properties of the heart. It is performed in patients suspected to have problems with their heart rhythm. These are patients complaining of intermittent episodes of sudden palpitations (rapid heart beating), or giddiness and brief fainting spells. It is performed in a cardiac catheterization laboratory with special computer based equipment, which records the ECG from within the heart. The groin and chest area will be shaved and cleaned with antiseptic solution. In most patients EPS is performed using local anesthesia. Mild sedation can be used. Only in small children the procedure is performed under general anesthesia. The local anesthesia is instilled in the groin and then small electrode catheters (1.5 – 2 mm diameter, long flexible wires) are advanced through the veins into the heart chambers. The X-ray equipment is used to position the catheters in the chambers of the heart. The heart rhythm is monitored on a special screen to show the electrical pathway of each beat. Recording of ECG from within the heart and artificial pacing helps to identify or confirm the cause of palpitations or giddiness in the patient. Tachycardia (palpitations) can be started with the help of these catheters and during such rapid heart rhythms, ECG from within the heart help to identify the mechanism of tachycardia. The doctor can start and stop the rapid heart beating at will using these electrode catheters. The patient needs to be admitted to the hospital the day before, or the morning of the EPS & Radiofrequency Ablation (RFA). The patient has to stay overnight in the hospital and by next morning is ready to be discharged. Blood tests, X-rays, ECGs and echocardiogram may be required when the patient is admitted. Fasting for 6 hours is required before the EPS. All anti-arrhythmic medications may be stopped for 48 to 72 hours before the procedure. An informed consent is then taken. When the procedure is finished, the catheters are removed and hemostasis achieved and a small dressing applied. The patient is then taken to the recovery room. Bed rest is advised for 4 to 6 hours. Pulse, blood pressure and dressing will be checked by the nurse. Inform her right away if there is any bleeding or discomfort. The next day the dressing is removed and patient discharged. Strenuous physical exercise and lifting heavy weights is to be avoided for 15 days to allow healing at the puncture sites in the groin. However the person can resume duty or job within next couple of days of the procedure. After successful ablation half a tablet of aspirin is prescribed for three months to allow healing within the heart where RFA is performed. This non-surgical procedure is used to treat some types of rapid heart beating, especially Wolff-Parkinson-White syndrome. It's most often used to treat supraventricular tachyarrhythmias. These are rapid, uncoordinated heartbeats starting in the heart's upper chambers (atria) or middle region (AV node or the very beginning portion of the heart's electrical system). During EPS the mechanism of arrhythmia is identified. Once the abnormal circuit is determined, a special catheter is used to deliver radiofrequency current at that spot which would eliminate the accessory pathway or extra connection and prevent tachycardia. Then a mild, painless radiofrequency energy (similar to microwave heat) is transmitted to the site of the pathway. Heart muscle cells in a very small area (about 1/5 of an inch) die and stop conducting the extra impulses that caused the rapid heartbeats. The procedure takes anywhere from 90 minutes to 3 hours. Radiofrequency ablation has a success rate of over 95-99 percent, a low risk of complications and the patient can resume normal activities in a few days. It causes little or no discomfort and is done under mild sedation with local anesthesia. It is not a surgery, there are no incisions/cuts, no stitches, and no blood is required. For these reasons, it's now widely used and is the preferred treatment for many types of rapid heartbeats. An EPS & RFA does involve a very small risk. However, the doctor recommending this test believes these risks too small compared to the benefit for patient. The doctor will discuss this with patient and answer any questions patient have.
https://glenmarkcardiaccentre.com/arrhythmia-electrophysiology-study-radiofrequency-ablation/
Usually, when we think of other species and how they communicate, we think about animals. That is one of the reasons why we consider animals extremely intelligent. For example, we know dogs communicate through their barking. Science has even found how dolphins communicate in the deep sea. But plants should also be considered intelligent. They also have a way of communicating between each other. This nature documentary explores that. Plants have a way of attracting insects, and their mechanisms to do that are just astonishing. Think about this for a second, Amazonian Indians believe that plants talk to us. Funghi, for example, are the architects of all life, as they are dictating the environment. With that in mind, take a look at all of the ways plants communicate between each other, with insects, and with us. When it comes to creation of the world, there are 2 generally unified theories. One is the Big Bang, and the other is that God created the universe.The first one is closely r... With length of 4,160 miles (almost 7,000 kilometers), the Nile is the longest river in the world. Some cite the Amazon river as the longest, but it is very close.In Ancient E... The Himalayas are the highest mountains in the world. As such, almost anyone has heard something about the mountains at least once in their life.The Himalayas form a mountain... We recognize our word primarily through the sense of vision. But light is what we use to see by. The light we use to see by is only a tiny fraction of the electro-magnetic sp...
http://www.documentarytube.com/videos/bbc-how-plants-communicate-think-amazing-nature-documentary
The current research on healthy and unhealthy self-views and behaviors in athletes is extremely limited, with little insight into factors that represent important individual differences and correlate to behavioral choices – including dietary choices and supplement use. Thus, the purpose of this study was to extend our understanding by examining the differential associations between the fear of fat (FF; an avoidance motivation) and drive for thinness (DT; an approach motivation) with self-views of body dissatisfaction, dietary intake, and supplement- and physique-related behaviors, in a sample of competitive athletes. Seventy-six active women (n = 59) and men (n = 17), aged 18-61 years of age (26.97 ± 9.74) completed an online survey. Participants were required to associate themselves as a recreational, collegiate, or professional athlete to participate in the survey. A five-point scale from 1 (extremely satisfied) to 5 (extremely dissatisfied) was used to assess body dissatisfaction. The Goldfarb FF scale and the DT subscale from the Eating Disorder Inventory were used to determine FF and DT, respectively. Dietary intake was measured using the U.S. National Cancer Institute food frequency questionnaire. A previously established measure assessed various dietary supplement behaviors and physique concern behaviors, indicating use from 0 to 7 days per week. Results indicated a strong correlation (r = .76) between FF and DT, suggesting that they could be similar constructs and commonly pursued (or not) at the same time by athletes. Moderate correlations were found between DT and FF with body dissatisfaction, with DT showing the strongest significant (p ≤ .01) relationships with dissatisfaction with body weight (.52), body shape (.56), body fat (.59), muscle tone (.40), and muscle size (.44). Interestingly, DT correlated negatively with dietary intake of animal-based foods (-.30, p ≤ 0.01) and processed food consumption (-.28, p ≤ 0.05), and a trend with plant-based foods (-.22, p = .06). DT or FF did not correlate with general supplement behaviors, such as taking dietary supplements, drinking protein shakes, or using steroids. However, both DT and FF did significantly relate (p ≤ .01) with physique concern behaviors of body symmetry (.35 vs. .39, respectively) and wearing baggy clothes (.56 vs. .54, respectively). In conclusion, DT does appear to be more indicative of body dissatisfaction in athletes than FF. The negative relationship of DT with dietary intake might indicate risk of an overall decline in food quantity and caloric intake, the greater an athlete’s drive to be thin. General supplement use behaviors were not related with either DT or FF, but were likely due to a total sample average of only 1.88 supplements used per week within groups. Nonetheless, with little disparity, certain physique control behaviors were related to both DT and FF scores. Thus, assessing FF and DT in athletes can be a novel and useful correlate and possible predictor of self-views, dietary intake, and physique control behaviors for the practitioner and future research. Future research should also reexamine the ability of FF and DT scales to fully differentiate as theoretically separate constructs to aid in distinguishing individual differences in motivation. Recommended Citation Papanos, Lauren A. BS and Faries, Mark D. PhD (2016) "Differential Relationships of Fear of Fat and Drive for Thinness with Body Dissatisfaction, Dietary Intake, and Supplement Behaviors in Athletes," International Journal of Exercise Science: Conference Proceedings: Vol. 2 : Iss. 8 , Article 67.
https://digitalcommons.wku.edu/ijesab/vol2/iss8/67/
Writing commentary is undoubtedly essentially the most difficult part of writing any essay. If you’re taking a literature course , you clearly count on some extent of academic writing to be involved. You may be reading books, and you will be discussing them in class. Nonetheless, you’ll additionally analyze these books in written. The thesis might deal with an analysis of one of the elements of fiction, drama, poetry or nonfiction as expressed in the work: character, plot, structure, concept, theme, symbol, fashion, imagery, tone, and many others. Themes are huge ideas that authors comment on all through a piece utilizing instruments comparable to context, setting, and characters. Widespread themes are good vs. evil, human nature, religion, social construction, authority, coming-of-age, human rights, feminism, racism, warfare, education, sex, friendship, love, compassion, and death. Most books take care of a number the blithedale romance analysis of themes, some more obvious than others. Figuring out an writer’s themes provides you a beginning place in your thesis. It provides you a common subject. Nevertheless, a theme is normal. It’s a must to dig a little bit deeper to determine the creator’s statement or perspective about that topic. A Spotlight On Easy Programs Of essay sample A small pattern of the books that informed this article. A few of these were written for art historical past students learning the best way to write an art analysis; others provide details about composition. For extra details, please consult with the bibliography beneath. Consider it this fashion: you’re placing your self in the sneakers of a literary critic. If you’ve ever read the critiques in standard magazines, you may notice they are objective; not private. Your essay can have a specific format, however it’ll maintain that important method you have seen from real critics. In different phrases, when reviewing the literature, not only do it’s essential to interact with a body of literature, you additionally need to have the ability to examine, distinction, synthesize, and make arguments with that literature in ways that indicate a readiness to contribute to the literature itself” (‘Leary, 2010, p.81). An overview helps to put your arguments in order. Creating a superb overview will show you how to write a important analysis essay quick and be consistent with your message. Most instructors will provide a sample of a critical evaluation essay define that can assist you write a nicely-organized analysis paper. Earlier than writing a critical analysis essay, be sure to have a top level view which organizes your ideas into a coherent vital essay structure. While the This Reveals That” Methodology for writing commentary is an excellent instrument for avoiding plot abstract, it still depends upon students knowing how one can clarify the evidence. On this method, the This Reveals That” Methodology is limited, so I have developed a secondary method called the LET” Technique for writing commentary. This methodology helps information students by giving them options for what to put in writing about of their commentary sentences. Primarily, LET” stands for Literary Components and Strategies,” and the mini-lesson takes students step-by-step by writing commentary based mostly upon literary devices. When students are in a position to recognize that each single citation accommodates hidden messages about theme and that those messages come via literary units, they are able to find the pathway to writing efficient commentary. Many college students, at the preparation stage, are likely to get caught on the evaluation itself, as they have no idea what this work should look like in the end. That is why literary essay examples are so essential for rookies. Thus, if you are unsure learn how to write a literary essay, try asking your instructor for a sample or feel free to look one up in our samples part. Details Of essay samples – An Update Writing in the first person is usually a helpful solution to situate a direct argument (I argue”), or indicate future arguments (in this essay, I will…”). But bear in mind to avoid worth judgements and unsupported statements (I believe…” or I imagine…”) in your writing. Yes, the whole point of the literature overview is to supply a crucial analysis and summary of the viewpoints out there, however a critical evaluation does embrace the truth that you want to make your opinion recognized in the context of the literature. Word how skilfully, within the earlier sample paragraph by Reed (2008), he weaves his opinions with references. Learn back over the pattern and try to good this ability. As with all analysis paper, you need to summarize your conclusion in clear, easy language; emphasize how the findings from your case study differs from or supports prior research and why. Do not merely reiterate the dialogue part. Provide a synthesis of key findings introduced in the paper to show how these converge to deal with the research problem. If you haven’t already accomplished so in the dialogue part, be sure you doc the restrictions of your case research and any need for further research.
https://gosukulu.com/easy-methods-in-literary-analysis-examples-an-a-z/
If you've read the last few chapters and seen the examples in the tutorial in Chapter 2, A First Applet, then you've probably picked up the basics of how graphical operations are performed in Java. Up to this point, we have done some simple drawing and even displayed an image or two. In this chapter, we will finally give graphics programming its due and go into depth about drawing techniques and the tools for working with images in Java. In the next chapter, we'll explore image processing tools in more detail and we'll look at the classes that let you generate images pixel by pixel on the fly. The classes you'll use for drawing come from the java.awt package, as shown in Figure 13.1.. The current set of drawing tools has many limitations. In the near future, JavaSoft will be releasing packages for advanced 2D graphics, which will have much greater capabilities. A 3D package is also planned. See Chapter 1, Yet Another Language? for information about likely future Java enhancements. An instance of the java.awt.Graphics class is called a graphics context. It represents a drawable surface such as a component's display area or an off-screen image buffer. A graphics context provides methods for performing all basic drawing operations on its area, including the painting of image data. We call the Graphics object a graphics context because it also holds contextual information about the drawing area. This information includes parameters like the drawing area's clipping region, painting color, transfer mode, and text font. If you consider the drawing area to be a painter's canvas, you might think of a graphics context as an easel that holds a set of tools and marks off the work area. From AWT, as the result of a painting request. In this case, AWT acquires a new graphics context for the appropriate area and passes it to your component's paint() or update() method. Directly from an off-screen image buffer. In this case, we ask the image buffer for a graphics context directly. We'll use this when we discuss techniques like double buffering. By copying an existing Graphics object. Duplicating a graphics object can be useful for more elaborate drawing operations; different copies of a Graphics object draw into the same area on the screen, but can have different attributes and clipping regions. Directly from an on-screen component. It's possible to ask a component to give you a Graphics object for its display area. However, this is almost always a mistake; if you feel tempted to do this, think about why you're trying to circumvent the normal paint()/repaint() mechanism. Each time a component's update() or paint() method is called, AWT provides the component with a new Graphics object for drawing in the display area. This means that attributes we set during one painting session, such as drawing color or clipping region, are reset the next time paint() or update() is called. (Each call to paint() starts with a tidy new easel.) For the most common attributes, like foreground color, background color, and font, we can set defaults in the component itself. Thereafter, the graphics contexts for painting in that component come with those properties initialized appropriately. If we are working in a component's update() method, we can assume our on-screen artwork is still intact, and we need only to make whatever changes are needed to bring the display up to date. One way to optimize drawing operations in this case is by setting a clipping region, as we'll see shortly. If our paint() method is called, however, we have to assume the worst and redraw the entire display. Methods of the Graphics class operate in a standard coordinate system. The origin of a newly created graphics context is the top left pixel of the component's drawing area, as shown in Figure 13.2. The diagram above illustrates the default coordinate system. The point (0,0) is at the top left corner of the drawing area; the point (width, height) is just outside the drawing area at the bottom right corner. The point at the bottom right corner within the drawing area has coordinates (width-1, height-1). This gives you a drawing area that is width pixels wide and height pixels high. The coordinate system can be translated (shifted) with the translate() method to specify a new point as the origin. The drawable area of the graphics context can be limited to a region with the setClip() method. The basic drawing and painting methods should seem familiar to you if you've done any graphics programming. The following applet, TestPattern, exercises most of the simple shape drawing commands; it's shown in Figure 13.3. TestPattern draws a number of simple shapes and responds to mouse clicks by rotating the filled arc and repainting. Compile it and give it a try. If you click repeatedly on the applet, you may notice that everything flashes when it repaints. TestPattern is not very intelligent about redrawing; we'll examine some better techniques in the upcoming section on drawing techniques. With the exception of fillArc() and fillPolygon(), each method takes a simple x, y coordinate for the top left corner of the shape and a width and height for its size. We have picked values that draw the shapes centered, at half the width and height of the applet. The most interesting shape we've have drawn is the Polygon, a yellow diamond. A Polygon object is specified by two arrays that contain the x and y coordinates of each vertex. In our example, the coordinates of the points in the polygon are (polyx, polyy), (polyx, polyy), and so on. There are simple drawing methods in the Graphics class that take two arrays and draw or fill the polygon, but we chose to create a Polygon object and draw it instead. The reason is that the Polygon object has some useful utility methods that we might want to use later. A Polygon can, for instance, give you its bounding box and tell you if a given point lies within its area. AWT also provides a Shape interface, which is implemented by different kinds of two dimensional objects. Currently, it is only implemented by the Rectangle and Polygon classes, but it may be a sign of things to come, particularly when JavaSoft releases the extended 2D drawing package. The setClip() method of the Graphics class takes a Shape as an argument, but for the time being, it only works if that Shape is a Rectangle. See the Dial example in Chapter 11, Using and Creating GUI Components (widgets?) for an example of some trigonometric gymnastics with arcs(). Table 13.1 shows the shape-drawing methods of the Graphics class. As you can see, for each of the fill() methods in the example, there is a corresponding draw() method that renders the shape as an unfilled line drawing. draw3Drect() automatically chooses colors by "darkening" the current color. So you should set the color to something other than black, which is the default (maybe gray or white); if you don't, you'll just get black on both sides. For an example, see the PictureButton in Chapter 11, Using and Creating GUI Components. There are a few important drawing methods missing from Table 13.1. For example, the drawString() method, which draws text, and the drawImage() method, which draws an image. We'll discuss these methods in detail in later sections.
https://docstore.mik.ua/orelly/java/exp/ch13_01.htm
Morphic is the name given to Pharo's graphical interface. Morphic is written in Pharo, so it is fully portable between operating systems. As a consequence, Pharo looks exactly the same on Unix, MacOS and Windows. What distinguishes Morphic from most other user interface toolkits is that it does not have separate modes for composing and running the interface: all the graphical elements can be assembled and disassembled by the user, at any time. (We thank Hilaire Fernandes for permission to base this chapter on his original article in French.) Morphic was developed by John Maloney and Randy Smith for the Self programming language, starting around 1993. Maloney later wrote a new version of Morphic for Squeak, but the basic ideas behind the Self version are still alive and well in Pharo Morphic: directness and liveness. Directness means that the shapes on the screen are objects that can be examined or changed directly, that is, by clicking on them using a mouse. Liveness means that the user interface is always able to respond to user actions: information on the screen is continuously updated as the world that it describes changes. A simple example of this is that you can detach a menu item and keep it as a button. Bring up the World Menu and meta-click once on it to bring up its morphic halo, then meta-click again on a menu item you want to detach, to bring up that item's halo. (Recall that you should set halosEnabled in the Preferences browser.) Now drag that item elsewhere on the screen by grabbing the black handle (see Figure 0.107), as shown in Figure 0.108. All of the objects that you see on the screen when you run Pharo are Morphs, that is, they are instances of subclasses of class Morph. Morph itself is a large class with many methods; this makes it possible for subclasses to implement interesting behaviour with little code. You can create a morph to represent any object, although how good a representation you get depends on the object! To create a morph to represent a string object, execute the following code in a Playground. This creates a Morph to represent the string 'Morph', and then opens it (that is, displays it) in the world, which is the name that Pharo gives to the screen. You should obtain a graphical element (a Morph), which you can manipulate by meta-clicking. Of course, it is possible to define morphs that are more interesting graphical representations than the one that you have just seen. The method asMorph has a default implementation in class Object class that just creates a StringMorph. So, for example, Color tan asMorph returns a StringMorph labeled with the result of Color tan printString. Let's change this so that we get a coloured rectangle instead. Open a browser on the Color class and add the following method to it: Now execute Color orange asMorph openInWorld in a Playground. Instead of the string-like morph, you get an orange rectangle (see Figure 0.109)! Morphs are objects, so we can manipulate them like any other object in Pharo: by sending messages, we can change their properties, create new subclasses of Morph, and so on. Every morph, even if it is not currently open on the screen, has a position and a size. For convenience, all morphs are considered to occupy a rectangular region of the screen; if they are irregularly shaped, their position and size are those of the smallest rectangular box that surrounds them, which is known as the morph's bounding box, or just its bounds. The position method returns a Point that describes the location of the morph's upper left corner (or the upper left corner of its bounding box). The origin of the coordinate system is the screen's upper left corner, with y coordinates increasing down the screen and x coordinates increasing to the right. The extent method also returns a point, but this point specifies the width and height of the morph rather than a location. Type the following code into a playground and Do it: Then type joe position and then Print it. To move joe, execute joe position: (joe position + (10@3)) repeatedly (see Figure 0.110). It is possible to do a similar thing with size. joe extent answers joe's size; to have joe grow, execute joe extent: (joe extent * 1.1). To change the color of a morph, send it the color: message with the desired Color object as argument, for instance, joe color: Color orange. To add transparency, try joe color: (Color orange alpha: 0.5). To make bill follow joe, you can repeatedly execute this code: If you move joe using the mouse and then execute this code, bill will move so that it is 100 pixels to the right of joe. You can see the result on Figure 0.111 One way of creating new graphical representations is by placing one morph inside another. This is called composition; morphs can be composed to any depth. You can place a morph inside another by sending the message addMorph: to the container morph. Try adding a morph to another one: The last line positions the balloon at the same coordinates as joe. Notice that the coordinates of the contained morph are still relative to the screen, not to the containing morph. There are many methods available to position a morph; browse the geometry protocol of class Morph to see for yourself. For example, to center the balloon inside joe, execute balloon center: joe center. If you now try to grab the balloon with the mouse, you will find that you actually grab joe, and the two morphs move together: the balloon is embedded inside joe. It is possible to embed more morphs inside joe. In addition to doing this programmatically, you can also embed morphs by direct manipulation. While it is possible to make many interesting and useful graphical representations by composing morphs, sometimes you will need to create something completely different. To do this you define a subclass of Morph and override the drawOn: method to change its appearance. The morphic framework sends the message drawOn: to a morph when it needs to redisplay the morph on the screen. The parameter to drawOn: is a kind of Canvas; the expected behaviour is that the morph will draw itself on that canvas, inside its bounds. Let's use this knowledge to create a cross-shaped morph. Using the browser, define a new class CrossMorph inheriting from Morph: We can define the drawOn: method like this: Sending the bounds message to a morph answers its bounding box, which is an instance of Rectangle. Rectangles understand many messages that create other rectangles of related geometry. Here, we use the insetBy: message with a point as its argument to create first a rectangle with reduced height, and then another rectangle with reduced width. To test your new morph, execute CrossMorph new openInWorld. The result should look something like Figure 0.113. However, you will notice that the sensitive zone — where you can click to grab the morph — is still the whole bounding box. Let's fix this. When the Morphic framework needs to find out which Morphs lie under the cursor, it sends the message containsPoint: to all the morphs whose bounding boxes lie under the mouse pointer. So, to limit the sensitive zone of the morph to the cross shape, we need to override the containsPoint: method. Define the following method in class CrossMorph: This method uses the same logic as drawOn:, so we can be confident that the points for which containsPoint: answers true are the same ones that will be colored in by drawOn. Notice how we leverage the containsPoint: method in class Rectangle to do the hard work. There are two problems with the code in the two methods above. The most obvious is that we have duplicated code. This is a cardinal error: if we find that we need to change the way that horizontalBar or verticalBar are calculated, we are quite likely to forget to change one of the two occurrences. The solution is to factor out these calculations into two new methods, which we put in the private protocol: We can then define both drawOn: and containsPoint: using these methods: This code is much simpler to understand, largely because we have given meaningful names to the private methods. In fact, it is so simple that you may have noticed the second problem: the area in the center of the cross, which is under both the horizontal and the vertical bars, is drawn twice. This doesn't matter when we fill the cross with an opaque colour, but the bug becomes apparent immediately if we draw a semi-transparent cross, as shown in Figure 0.114. Execute the following code in a playground, line by line: The fix is to divide the vertical bar into three pieces, and to fill only the top and bottom. Once again we find a method in class Rectangle that does the hard work for us: r1 areasOutside: r2 answers an array of rectangles comprising the parts of r1 outside r2. Here is the revised code: This code seems to work, but if you try it on some crosses and resize them, you may notice that at some sizes, a one-pixel wide line separates the bottom of the cross from the remainder, as shown in Figure 0.115. This is due to rounding: when the size of the rectangle to be filled is not an integer, fillRectangle: color: seems to round inconsistently, leaving one row of pixels unfilled. We can work around this by rounding explicitly when we calculate the sizes of the bars. To build live user interfaces using morphs, we need to be able to interact with them using the mouse and keyboard. Moreover, the morphs need to be able respond to user input by changing their appearance and position — that is, by animating themselves. When a mouse button is pressed, Morphic sends each morph under the mouse pointer the message handlesMouseDown:. If a morph answers true, then Morphic immediately sends it the mouseDown: message; it also sends the mouseUp: message when the user releases the mouse button. If all morphs answer false, then Morphic initiates a drag-and-drop operation. As we will discuss below, the mouseDown: and mouseUp: messages are sent with an argument — a MouseEvent object — that encodes the details of the mouse action. Let's extend CrossMorph to handle mouse events. We start by ensuring that all crossMorphs answer true to the handlesMouseDown: message. Add this method to CrossMorph: Suppose that when we click on the cross, we want to change the color of the cross to red, and when we action-click on it, we want to change the color to yellow. This can be accomplished by the mouseDown: method as follows: Notice that in addition to changing the color of the morph, this method also sends self changed. This makes sure that morphic sends drawOn: in a timely fashion. Note also that once the morph handles mouse events, you can no longer grab it with the mouse and move it. Instead you have to use the halo: meta-click on the morph to make the halo appear and grab either the brown move handle (see Figure 0.116) or the black pickup handle (see Figure 0.117) at the top of the morph. The anEvent argument of mouseDown: is an instance of MouseEvent, which is a subclass of MorphicEvent. MouseEvent defines the redButtonPressed and yellowButtonPressed methods. Browse this class to see what other methods it provides to interrogate the mouse event. To catch keyboard events, we need to take three steps. handleKeystroke:method. This message is sent to the morph that has keyboard focus when the user presses a key. Let's extend CrossMorph so that it reacts to keystrokes. First, we need to arrange to be notified when the mouse is over the morph. This will happen if our morph answers true to the handlesMouseOver: message Declare that CrossMorph will react when it is under the mouse pointer. This message is the equivalent of handlesMouseDown: for the mouse position. When the mouse pointer enters or leaves the morph, the mouseEnter: and mouseLeave: messages are sent to it. Define two methods so that CrossMorph catches and releases the keyboard focus, and a third method to actually handle the keystrokes. We have written this method so that you can move the morph using the arrow keys. Note that when the mouse is no longer over the morph, the handleKeystroke: message is not sent, so the morph stops responding to keyboard commands. To discover the key values, you can open a Transcript window and add Transcript show: anEvent keyValue to the handleKeystroke: method. The anEvent argument of handleKeystroke: is an instance of KeyboardEvent, another subclass of MorphicEvent. Browse this class to learn more about keyboard events. Morphic provides a simple animation system with two main methods: step is sent to a morph at regular intervals of time, while stepTime specifies the time in milliseconds between steps. stepTime is actually the minimum time between steps. If you ask for a stepTime of 1 ms, don't be surprised if Pharo is too busy to step your morph that often. In addition, startStepping turns on the stepping mechanism, while stopStepping turns it off again. isStepping can be used to find out whether a morph is currently being stepped. Make CrossMorph blink by defining these methods as follows: To start things off, you can open an inspector on a CrossMorph using the debug handle (see Figure 0.118) in the morphic halo, type self startStepping in the small playground pane at the bottom, and Do it. Alternatively, you can modify the handleKeystroke: method so that you can use the + and - keys to start and stop stepping. Add the following code to the handleKeystroke: method: To prompt the user for input, the UIManager class provides a large number of ready to use dialog boxes. For instance, the request:initialAnswer: method returns the string entered by the user (Figure 0.119). To display a popup menu, use one of the various chooseFrom: methods (Figure 0.120): Browse the UIManager class and try out some of the interaction methods offered. Morphic also supports drag-and-drop. Let's examine a simple example with two morphs, a receiver morph and a dropped morph. The receiver will accept a morph only if the dropped morph matches a given condition: in our example, the morph should be blue. If it is rejected, the dropped morph decides what to do. Let's first define the receiver morph: Now define the initialization method in the usual way: How do we decide if the receiver morph will accept or reject the dropped morph? In general, both of the morphs will have to agree to the interaction. The receiver does this by responding to wantsDroppedMorph:event:. Its first argument is the dropped morph, and the second the mouse event, so that the receiver can, for example, see if any modifier keys were held down at the time of the drop. The dropped morph is also given the opportunity to check and see if it likes the morph onto which it is being dropped, by responding to the message wantsToBeDroppedInto:. The default implementation of this method (in class Morph) answers true. What happens to the dropped morph if the receiving morph doesn't want it? The default behaviour is for it to do nothing, that is, to sit on top of the receiving morph, but without interacting with it. A more intuitive behavior is for the dropped morph to go back to its original position. This can be achieved by the receiver answering true to the message repelsMorph:event: when it doesn't want the dropped morph: That's all we need as far as the receiver is concerned. Create instances of ReceiverMorph and EllipseMorph in a playground: Try to drag and drop the yellow EllipseMorph onto the receiver. It will be rejected and sent back to its initial position. To change this behaviour, change the color of the ellipse morph to the color blue (by sending it the message color: Color blue; right after new). Blue morphs should be accepted by the ReceiverMorph. Let's create a specific subclass of Morph, named DroppedMorph, so we can experiment a bit more: Now we can specify what the dropped morph should do when it is rejected by the receiver; here it will stay attached to the mouse pointer: Sending the hand message to an event answers the hand, an instance of HandMorph that represents the mouse pointer and whatever it holds. Here we tell the World that the hand should grab self, the rejected morph. Create two instances of DroppedMorph, and then drag and drop them onto the receiver. The green morph is rejected and therefore stays attached to the mouse pointer. Let's design a morph to roll a die. Clicking on it will display the values of all sides of the die in a quick loop, and another click will stop the animation. Define the die as a subclass of BorderedMorph instead of Morph, because we will make use of the border. The instance variable faces records the number of faces on the die; we allow dice with up to 9 faces! dieValue records the value of the face that is currently displayed, and isStopped is true if the die animation has stopped running. To create a die instance, we define the faces: n method on the class side of DieMorph to create a new die with n faces. The initialize method is defined on the instance side in the usual way; remember that new automatically sends initialize to the newly-created instance. We use a few methods of BorderedMorph to give a nice appearance to the die: a thick border with a raised effect, rounded corners, and a color gradient on the visible face. We define the instance method faces: to check for a valid parameter as follows: It may be good to review the order in which the messages are sent when a die is created. For instance, if we start by evaluating DieMorph faces: 9: DieMorph class >> faces:sends newto DieMorph class. new(inherited by DieMorph classfrom Behavior) creates the new instance and sends it the initializemessage. initializemethod in DieMorphsets facesto an initial value of 6. DieMorph class >> newreturns to the class method DieMorph class >> faces:, which then sends the message faces: 9to the new instance. DieMorph >> faces:now executes, setting the facesinstance variable to 9. Before defining drawOn:, we need a few methods to place the dots on the displayed face: These methods define collections of the coordinates of dots for each face. The coordinates are in a square of size 1x1; we will simply need to scale them to place the actual dots. The drawOn: method does two things: it draws the die background with the super-send, and then draws the dots. The second part of this method uses the reflective capacities of Pharo. Drawing the dots of a face is a simple matter of iterating over the collection given by the faceX method for that face, sending the drawDotOn:at: message for each coordinate. To call the correct faceX method, we use the perform: method which sends a message built from a string, ('face', dieValue asString) asSymbol. You will encounter this use of perform: quite regularly. Since the coordinates are normalized to the [0:1] interval, we scale them to the dimensions of our die: self extent * aPoint. We can already create a die instance from a playground (see result on Figure 0.124): To change the displayed face, we create an accessor that we can use as myDie dieValue: 5: Now we will use the animation system to show quickly all the faces: Now the die is rolling! To start or stop the animation by clicking, we will use what we learned previously about mouse events. First, activate the reception of mouse events: Now the die will roll or stop rolling when we click on it. The drawOn: method has an instance of Canvas as its sole argument; the canvas is the area on which the morph draws itself. By using the graphics methods of the canvas you are free to give the appearance you want to a morph. If you browse the inheritance hierarchy of the Canvas class, you will see that it has several variants. The default variant of Canvas is FormCanvas, and you will find the key graphics methods in Canvas and FormCanvas. These methods can draw points, lines, polygons, rectangles, ellipses, text, and images with rotation and scaling. It is also possible to use other kinds of canvas, for example to obtain transparent morphs, more graphics methods, antialiasing, and so on. To use these features you will need an AlphaBlendingCanvas or a BalloonCanvas. But how can you obtain such a canvas in a drawOn: method, when drawOn: receives an instance of FormCanvas as its argument? Fortunately, you can transform one kind of canvas into another. To use a canvas with a 0.5 alpha-transparency in DieMorph, redefine drawOn: like this: That's all you need to do! Morphic is a graphical framework in which graphical interface elements can be dynamically composed. asMorph openInWorld. addMorph:. initializeand drawOn:. handlesMouseDown:, handlesMouseOver:, etc. step(what to do) and stepTime(the number of milliseconds between steps).
https://ci.inria.fr/pharo-contribution/job/UpdatedPharoByExample/lastSuccessfulBuild/artifact/book-result/Morphic/Morphic.html
Job Description: Job Details Job Location Harlingen Nursing and Rehabilitation Center - Harlingen, TX Description The primary purpose of your job position is to perform the day-to-day activities of the Laundry Department in accordance with current federal, state, and local standards, guidelines, and regulations governing our facility, and as may be directed by the Administrator and/or the Housekeeping Supervisor, to assure that our facility is maintained in a clean, safe, and sanitary manner, and that an adequate supply of linen is on hand at all times to meet the needs of the residents. Ensure that work/cleaning schedules are followed as closely as practical. Report all accidents/incidents to your supervisor. Coordinate daily laundry services with nursing services when performing routine assignments in resident living areas. Follow established fire safety policies and procedures. Wear and/or use safety equipment and supplies (e.g., back brace, mechanical lifts, etc.) when lifting or moving heavy objects. Ensure that assigned work areas are maintained in a clean, safe, and sanitary manner. (e.g., dryer lint traps) Follow proper techniques when mixing chemicals, disinfectants, and solutions used in the work area. Refer to material safety data sheets (MSDSs) when necessary. Use appropriate personal protective equipment and supplies when handling infectious materials. Keep supervisor informed of supply needs. Keep work area(s) free of hazardous conditions, i.e., spills, excess laundry carts, baskets, supplies, equipment, etc. Clean work/supply carts, equipment, etc., as necessary/directed. Ensure that equipment is cleaned and properly stored at the end of the shift. Perform assigned tasks in accordance with established laundry procedures. During emergency conditions, assure that clean laundry, linen, garments, etc., are distributed to designated areas as instructed. Maintain the confidentiality of all resident care information including protected health information. Report known or suspected incidents of unauthorized disclosure of such information. Qualifications Must maintain the care and use of supplies, equipment, etc., and maintain the appearance of laundry areas, for sanitation, order, and safety. Must be able to follow written and oral instructions concerning the mixture of cleaning compounds, liquids, cleaning instructions, etc. Should be able to push, pull, move, and/or lift a minimum of 25 pounds to a minimum height of 5 feet and be able to push, pull, move, and/or carry such weight a minimum distance of 50 feet Job Details Keywords: Regency Integrated Health Services, Harlingen , Laundry Aide, Other , Harlingen, Texas | Click here to apply!
https://www.harlingenrecruiter.com/other-jobs/2977310339/laundry-aide
Growing up I saw the passion and dedication my parents Osmin Sr. and Reina Sariles had in succeeding in the restaurant industry. They open their first restaurant, Rincon Latino, in Irving on September 1987. Rincon Latino was the first authentic Salvadorian Cuisine in the DFW metroplex where they owned and operated for over twenty-five years. Since then Osmin Sr. has retired and Rincon Latino is enjoying different management. But the Sariles story doesn’t end there. After their success, Osmin Jr. helped expand the flagship restaurant into two additional sister restaurants. The success story continues today with the opening of Casa Mia Latin Cuisine. We are dedicated to delivering authentic Latin flavors a fusion of authentic Salvadorian and Mexican cuisines to create dishes in outstanding quality, a comfortable family atmosphere, the best food prepared using the freshest ingredients and most importantly outstanding service done by Casa Mia’s way!
https://www.casamialatincuisine.com/
But when leaders that seek and aspire change the people will follow and create an unforgettable movement. Racial equality has been an issue in society for centuries, but a change in mind set has put us in the correct direction. Although there are still displays of injustice and inequality, they are certainly less prevalent then before. Our connection with others around us plays a large part in helping us achieve equality and justice, and with large movements around the world, we have begun to change the world for the Although slavery was declared over after the passing of the thirteenth amendment, African Americans were not being treated with the respect or equality they deserved. Socially, politically and economically, African American people were not being given equal opportunities as white people. They had certain laws directed at them, which held them back from being equal to their white peers. They also had certain requirements, making it difficult for many African Americans to participate in the opportunity to vote for government leaders. Although they were freed from slavery, there was still a long way to go for equality through America’s reconstruction plan. Literally it was a barrier where African Americans felt they could never truly be comfortable and express themselves. Additionally, white Americans also had a veil where they found difficulty in seeing blacks as whole Americans. They believed themselves to be superior in all facets of society such as predominance in belief systems and history. They viewed other races as inferior and dehumanised them. Within social mobility, many people fail to have a sense of the realization of the American Dream because of the fewer advantages and more problems minorities have to struggle through. Therefore, our social class affects our ability to realize the American Dream because we face challenges to make ends meet, intersectionality and education because of high status. Also, they were not allowed safety and protection like Americans. Any white person could get away with cruel treatment or degrading an African. As word spread around the country that Africans were inequal, many Americans believed and portrayed that they didn 't deserve rights. They used this as a way to treat slaves unfairly. Taking away rights from Africans was an inequitable act in the Populism in the 1890’s derived of racial controversies that damaged the movement from progressing into mainstream politics. Populist activists envisioned a system where there would be economic and political reform, but they failed to embrace minorities in this system. The issue of racial politics caused racial divisions within the Populist party, made African Americans loose trust in the Populists efforts to promote initiatives that mattered to them, and failed to racially be progressive in combating discriminatory laws in the 1890’s. To understand how racial politics impeded the opportunity of Populist progression, we need to evaluate the Populists viewpoints on racial integration, the desires of reform that African Americans strived for, and the role African American voters played in politics. ` From the 1890’s, historian C.Vann Woodward and Lawrence Goodwyn analyzed the racial politics behind the populist movement and stated, “white populists had challenging racial taboo’s, only to have their courageous efforts of unity between white and blacks They taught the white population that, it didn 't matter if a black person is free. Or the fact they might be educated or hardworking. They wanted to dehumanize the black image to a greater extent. So there won 't be any escape for any black person because their pride and spirits were The change that is initiated by the unique individual, however, may not be the change that people want to have. Because of this, the people that do not want change may try to resist the change or actively work to stop the change from happening. Bob Ewell’s treatment of Atticus provides a good example of this resistance to change: “Atticus was leaving the post office when Mr. Ewell approached him, cursed him, spat on him, and threatened to kill him” (Lee 217). Mr. Ewell did not like the fact that Atticus was defending a black person in court, which was not something that was considered acceptable by society during the time period of the story. However, the change that is created may be the change that is needed to create progress in a society. They impacted American people and black minorities. The KKK did not allow blacks to vote or get any kind of education. The black people would avoid groups of white people and crowded areas. They struggled with racial discrimination till they had fair and equal treatment. Successful black business were attacked but when protection groups were created they were quickly dealt with. Slavery was a manner in which the which population were supervised and controlled; kept illiterate and unskilled as education meant that the black population could identify themselves as more than just cheap labour. White southerners were afraid that the black population would disrupt their social status and economy as the black population would be able to compete with poor whites for jobs and be on an equal base with them. The abolishment of slavery aroused a sense of fear amongst the white southerners as they were scared the black slaves would massacre their families, insurrection as seen in Richmond in the 1800 and eventually start a war . Another reason for the secession was not only motivated the belief that blacks wear inferior to the white race, the economy of the Deep South was also a huge But what made them want to leave so badly? African Americans were not treated the same; the white Americans believed that they were superior to everyone else and they made sure African Americans knew that. Harsh segregation laws began, known as the Jim Crow Laws. Some examples of these laws are, “It shall be unlawful for a negro and white person to lay together..’ and, ‘Separate free schools shall be established for the education of children of African American descent...” " However this decision did not suppress the racist ideals of Americans but in fact worsened them. In deep southern states, massive resistance against the new law erupted in protests, riots, and racial violence against the strive for equality. Some public schools even closed their doors rather than integrate and even reacted with Undocumented immigrants migrate only for a better social economic status that their country cannot provide. As humans we should be able to give these opportunities to immigrants because once you get to know them on a personal level you end up learning something new about their culture or that individual, it is fascinating. We are all different and carry different traditions and different opinions. Some people are more opened to undocumented immigrants in this country while others are completely shut on accepting them in this The north wanted to to abolish slavery they felt like it was wrong although the argument the south had was the north didn’t need to worry about slaves due to the profit they were making off factories and manufacturing. Slavery was the backbone of the South’s economy. Although, money wasn’t the only reason whites restricted blacks for equal opportunities. Enforcing Jim Crow laws and Black codes simply was a result of hate and animosity most whites in the south had towards blacks.
https://www.ipl.org/essay/Irish-And-African-American-Immigrants-PKE57H4AJPR
Employees Don't Understand Their New Roles True change in an organization often means that job positions and titles also change, which means that roles and responsibilities may shift as well. Without doing so, it is clear that it is hard to provide any conviction. So why do people resist change? If the problem is a not a personal thing of employees, they will not see the real need why they must change themselves. In fact, the idea that it is a good thing to get employee participation in making changes has become almost axiomatic in management circles. Time is necessary even though there may be no resistance to the change itself. Read: There may be reasons for resistance to change for analytical purpose, lets us categories the causes into the following. If change feels like walking off a cliff blindfolded, then people will reject it. Exhibit I Two contrasting patterns of human behavior It is apparent from these two patterns that the variable which determines the result is the social aspect of the change. The overall direction, in these cases, who have solicited feedback from their reporting staff. The social aspect of the change refers to the way those affected by it think it will alter their established relationships in the organization. If your change effort threatens these workplace social bonds, some of your team members may resist your change effort. Because organizational systems are open and they are interactive with their environment, the need of change often comes from outside. One side will win and the other side will lose. There were 17 % quits in the first 40 days. We change all of the time. Digital adoption that neglects to will produce poor results. The experience of the operating people frequently equips them to be of real help to staff specialists on at least two counts: 1 The operating people are often able to spot practical production difficulties in the ideas of the specialists—and iron out those difficulties before it is too late; 2 the operating people are often able to take advantage of their intimate acquaintance with the existing social arrangements for getting work done. Subsequent research has not altered the general conclusion that participation, to be of value, must be based on a search for ideas that are seen as truly relevant to the change under consideration. Habits : All human beings are creatures of habit. By this process staff people will be treating the operating people in such a way that their behavior will not be perceived as a threat to customary work relationships. You have them in body, but you do not have their hearts. Managements that have tried have made much progress during the past 15 years. Huge numbers of perfectly workable solutions have been proposed. To the fearful it is threatening because it means that things may get worse. Some employees will publicly challenge the change, why it was needed or how it is unfolding. Popular approaches to solving the sustainability problem see only what's obvious: the black arrows. Those attachments presently cause lawmakers to usually say no. Forcing a change on others has its place. If given a chance, they can use this kind of knowledge to help detect those parts of the change that will have undesirable social consequences. A normal problem in every organization is to have limited resources. The paper explains how solutions like these are being rejected by the human system due to high systemic change resistance. For example, multiplying 222 times 222 in your head is for most of us impossible. But in case of major changes like reshuffling of staff will lead to major visible resistance. And the more support you have, the less resistance there is. It may just be normal behaviour. You hit the bullseye every time. You obviously cannot buy it as you would buy a typewriter. Organizational changes require shifts of those habits and because of that dissatisfaction from these proposals. And there is increasing understanding of and respect for the necessity for differences between groups. Some also do not understand how difficult it is to lead and implement change effectively. It also requires a process that fits the problem, which was not mentioned in the paper. Talking about the unknowns can be just as reassuring to employees because it gives an impression that management is looking at the situation from every angle. They make a transfer from the comfort of the status quo to the discomfort of the new situation. You say to yourself that this can't be what you think it is. Today I am less sanguine about this. Resistance does not mean that the change is bad, or that the change process has failed. Others may resist because they will lose some power in the organizational. What's the Truth About Resistance to Change? We noticed that she did not handle the part with her usual care. In fact, as my friend found when he tried to reduce burnout, the resistance is a response by the system, trying to maintain an implicit system goal. People also fear uncertainty and the unknown. Know-how of operators overlooked: Another blind spot of many staff specialists is to the strengths as well as to the weaknesses of firsthand production experience. In such a way the performing time is dictated from the outside of an organization. It is difficult to find any managers today who do not at times feel greatly distressed because of changes, with their own resistance level running fairly high. These larger gaps have turn created ever more difficult problems of securing effective communication and problem solving between groups. How could they construe this experience except as a threatening change in their usual working relationship? When employees feel that the security of the job is threatened by change, they resist it. If the staff person leaves the operating people with a sense of confusion, they will also be left unhappy and less productive.
http://spitfirephoto.com/find-the-causes-for-resistance-to-change.html
Austria’s creative professionals have continually kept pace with the rapid technical developments taking place in recent years, and in some areas were even a step ahead of the rest of the world. Achievements such as Moviecam, the railcam and camera tracking system CAMCAT® or the innovative Cine Reflect Lighting System of the multiple award-winning Austrian cameraman and filmmaker Christian Berger best demonstrate Austria’s highly developed technical infrastructure. As of the most important cities for theater and culture in the world, Vienna offers enormous resources for film sets and facilities, costumes and props. Every style and every epoch is covered thanks to the offering of large and small costume and prop rental companies as well as the set and production designers, costume designers, indoor and outdoor set dressers. All internationally used brands and special products for special effects are available when it comes to masks and make-up. The international theater and film landscape also enables access to a pool of internationally experienced and multilingual actors and extras, especially competent in speaking English and French.
https://locationaustria.at/en/austria/facilities.php
The Global Opportunity Youth Network continues to engage a growing global community, supporting collaboration across local ecosystems, and lifting the voice of opportunity youth. This December we invited our network to come together for a two-day summit focused on a series of conversations about what it would take to create more structurally just and equitable livelihood and opportunity ecosystems. GOYN young leaders, community, and global partners, facilitated conversations that: - Shared how they are working to engage the most underserved youth across GOYN communities. - Identified livelihood pathways and opportunities that are centered on Equity and addressed structural barriers to employment and economic opportunity. - Explored the critical role of trauma-sensitive approaches when working towards Equity and Structural Justice. - Explored how we can support local ecosystem partners to apply a structural justice and equity lens to the collaborative creation of livelihood and opportunity pathways. Watch the archives below Day 1 – December 8th, 2021 Opening Session WATCH THE VIDEO Follow the Young Leaders Description: Young leaders from diverse global communities will share how they are leveraging their lived experience, and talent, to lead innovative work to address the needs of highly marginalized groups of OY like trans youth, differently-abled youth, and young people involved in the Criminal Justice system. Moderator: Jamiel Alexander, Aspen Institute Panelists: Sazi Jali, TransHope Durban, South Africa Emily Achieng Juma, Amazing Persons With Disabilities, Mombasa, Kenya Tavon Parker, The Advantage Program, York, Pennsylvania, US WATCH THE VIDEO How are GOYN community partners creating livelihood opportunities centered on Equity? GOYN community partners share how they are working with global and regional employers, and local institutions to create access to livelihood pathways that are intentionally focused on inclusion of highly marginalized Opportunity Youth. Moderator: Annu Mehta, Global Development Incubator Panelists: Swati Minz, Transforming Rural India – Ramgarh, India Maria Paula Macias, Fundación Corona – Bogota, Colombia Mandiphiwe Levani, Harambee Youth Employment Accelerator – Durban, South Africa WATCH THE VIDEO How are GOYN Global partners and allies promoting or working towards Equity? During this session, we will discuss some of the work that GOYN Global Partners are doing to support equity within their own organizations, beyond GOYN. Our panelists will highlight the different ways this engagement on equity issues can look like, from an individual level to larger organizational and systemic dynamics. Moderator: Cyrielle Auffray, Global Development Incubator Panelists: John Valverde, President and CEO – YouthBuild Dorrett Byrd, Regional Director for Southern Africa – Catholic Relief Services Mallika Kirti, Senior Associate – Global Development Incubator WATCH THE VIDEO Youth Vision for Equity through Youth Innovations Closing presentation and music video Presenters: Lucas Gregorio, United Way, GOYN Sao Paulo, Brazil Samuel Ravih, Youth Innovator, Sao Paulo, Brazil WATCH THE VIDEO Day 2 – December 9th, 2021 Welcome with GOYN Mexico Youth Manifesto WATCH THE VIDEO Trauma sensitive practices as building blocks of Equity The global youth unemployment crisis has been further exacerbated by the COVID19 pandemic, compounding the trauma experienced by global Opportunity Youth. During this session GOYN Global and Anchor Partners will share effective frameworks and practices when supporting and engaging Opportunity Youth. Moderator: Petula Nash. Catholic Relief Services Panelists: Lucy Steinitz, Catholic Relief Services Bobby Zacharia, Lighthouse Communities Foundation WATCH THE VIDEO Aspen Forum for Community Solutions: 10 years of learning and impact In 2022, the Aspen Forum for Community Solutions will celebrate 10 years of leading and supporting work with OY and institutions across communities in the US, centered on equity, justice, and healing. This session will focus on progress over the last 10 years and its influence on perceptions of, and the narrative about, OY and the communities they come from. Moderator: Joel Miranda, YouthBuild International Featured Speaker Monique Miles, Vice President, Aspen Institute WATCH THE VIDEO Shifting the Narrative: Telling the stories of OY and Communities through an Equity lens GOYN Youth Leaders, Anchor Partners, and Global Partners will discuss how we can shift local and global perceptions and narratives about Opportunity Youth by telling their stories through an Equity lens. Moderator: Gichobi Stanley, Global Development Incubator Panelists:
https://goyn.org/goyn-youth-equity-summit-2021/
Tuesday, 19 September 2006 Where are we now? Protesters proud of actions opposing draft: Today, he’s convinced it was the right thing to do. New Call for a draft to end war: Selective Service, chief, peace advocates have various reasons for forced enlistment by Peter Urban, Connecticut Post, Sunday, 3 September 2006 More: Protesters proud of actions opposing draft: Today, he’s convinced it was the right thing to do. by Peter Urban, Connecticut Post, Sunday, September 3, 2006 In an act of civil disobedience that landed him in federal prison for a month, Russell F. Ford refused to register for a potential military draft when he turned 18 on the Fourth of July in 1981. Today, he’s convinced it was the right thing to do. “Imagine what Bush would have done with the ability to raise an Army three times the size now. We would be in Iran and Syria and in a mess worse than we already are in,” said Ford, now 43. In 1980, in response to the Soviet Union’s invasion of Afghanistan, President Jimmy Carter resumed the Selective Service registration program, which had been suspended since 1975. Within two years, 8.6 million young men had registered, but an estimated 570,000 did not. Selective Service forwarded the names of 160 vocal opponents to the Justice Department for prosecution — 20 were eventually indicted. Edward Hasbrouck, who was convicted in 1982 in Boston for failing to register, said the brief wave of “show trials” was intended to silence vocal critics. The prosecutions, however, served only to publicize and encourage resistance, and were soon abandoned. During that period, 20 men were indicted for failing to register — 10 were convicted, five pled guilty and five cases were dropped. Eight of the men received jail time. Ford, at the time a history student at Wesleyan University in Middletown, was the only person in Connecticut who faced prosecution. He represented himself at his trial in Hartford. “If Harriet Tubman, a black abolitionist, could risk death guiding fellow humans through the Underground Railroad to freedom in the North and Canada, violating as she did the Fugitive Slave Act, then certainly I can risk a few years’ imprisonment for violating another federal law,” he said during his trial. “If enough of us act today, then perhaps our children will no longer see their children conscripted for war, as today we no longer sell children into slavery.” Ford was convicted and faced a maximum sentence of five years in prison. U.S. District Judge M. Joseph Blumenfeld, however, sentenced him in June 1983 to time served — 35 days in the Danbury federal prison. The judge refused to “saddle” officials with the task of supervising Ford’s activities, according to published reports. “I assume you will continue your search for martyrdom. You are not a fit subject for rehabilitation,” Blumenfeld said. Now 43 and living in northern Vermont, Ford remains convinced he did the right thing in defying what he claims is a “stupid and unjust” law. Ford said that his and other anti-registration protests made it clear in the mid-1980s that a draft would not be tolerated. It is a sentiment shared by others who were prosecuted back then. “Carter started registration when the Russians were in Afghanistan — at a time when Osama bin Laden was a freedom fighter armed by the United States. So, I feel a little vindicated by history,” said Daniel Rutt of Toledo, Ohio. “The cycle of violence is exactly that. Violence begets violence.” Rutt received a one-year sentence, with all but 120 days of it suspended, following his conviction in 1986. At the time, he lived in Michigan. “I’ve never been one to tell young people what they should do. I encourage them to make thoughtful decisions,” said Andy Mager, of Syracuse, N.Y., who spent six months in federal prison following his conviction. Mager, 45, works for the Syracuse Peace Council and remains opposed to a draft. “I think that a draft has so many negative consequences,” he said, explaining that it reinforces the cultural view that participating in war is a civic responsibility and a right of passage. Hasbrouck, who now lives in San Francisco, has set up a Web site that counsels young men against registering with the Selective Service. “Everything that has happened since reinforces my decision not to register,” Hasbrouck said. “Registration was reinstated to send a message to the Soviet Union that the United States would intervene on the side of the people in Afghanistan that we were training — the Taliban. “I need make no apology for my actions. It is the government that would have to answer to me and to people today to fight the next round of wars.” Hasbrouck served five months in prison. Ford, an organic farmer who is studying environmental science at the University of Vermont, said there is value in service and sacrifice but not to make war. National service could be put to better use. “The United States is facing a very uncertain future in terms of energy policy and climate change,” Ford said. “It is going to take a major restructuring of our economy, housing, transportation and agricultural systems to address these problems. As a nation we can do that.” New Call for a draft to end war: Selective Service, chief, peace advocates have various reasons for forced enlistment by Peter Urban, Connecticut Post, Sunday, September 3, 2006 Link | Posted by Edward on Tuesday, 19 September 2006, 05:02 ( 5:02 AM) The head of Connecticut’s Selective Service program, believes the nation needs a military draft, but he does not expect Congress will institute it anytime soon. “I think it is going to be almost unavoidable if we continue heading down the path we are going on,” said retired Brig. Gen. Nathan Agostinelli. “A lot of those in Congress know it is needed, but they also know they wouldn’t get elected if they said so.”If a draft were started, Agostinelli suspects the Iraq war would quickly end. “Parents wouldn’t stand for it. They wouldn’t accept this standstill,” he says. Some peace activists agree. “Absolutely, there should be a draft,” says Larry Aasen of Westport. “If kids were being drafted parents would stop the Iraq war really quick.” Aasen, who served in the Army in France during World War II, has written to Sen. Chris Dodd, Sen. Joe Lieberman, both D-Conn., and Rep. Christopher Shays, R-4, urging them to support a draft but has no expectations that they will listen. “A draft is unpopular. Parents don’t want their kids drafted,” he says. Rumors of an impending military draft have percolated across the country since the Iraq war began in March 2003, typically fueled by Internet warnings and election-year politicking. The most recent concerns were voiced after the Marine Corps announced it was preparing to activate as many as 2,500 ready reserves to fill specific needs. Congress went on record in 2004 opposing a draft to squash rumors that swirled on the Internet after Army officials announced that thousands of active-duty and reserve soldiers could face extended terms in the military after their formal contracts expire if their units are called up for deployment. The House rejected a bill that would have instituted the draft, 402-2. The entire Connecticut delegation opposed it. “The reason we are doing this is to expose this hoax of the year, which has been needlessly scaring millions of young people, driven by a bill that not a single Republican has signed onto,” said Rep. Duncan Hunter, R-Ca. Rumors of a draft have continued to surface, in part, because Selective Service registration remains. During the 2004 debate on the draft, Rep. Major R. Owens, D-N.Y., urged his colleagues to approve legislation he had authored to end the program and lift any sanctions against those who previously failed to register. “This bill takes away the draft option and guarantees that future policy makers must confine their adventures to actions, which can be launched and maintained with only a volunteer military force,” he said. The offer to send a stronger anti-draft message as well as save $26 million a year was flatly ignored. Owens and Rep. Ron Paul, R-Texas, have submitted similar proposals in the 109th Congress. Like previous bills, these have also been ignored. Paul, who favors small government, argues that “coercing all young men to register with the federal government so they may be conscripted into military service at the will of politicians is fundamentally inconsistent with the American philosophy of limited government and personal freedom.” The Selective Service System’s main mission is to provide manpower to the military in the event of a national emergency. Although no mobilization has been ordered, virtually all men in the United States are required to register within 30 days of reaching age 18. Women were not included in the original legislation requiring registration and Congress and the president would have to approve a bill to add them. More than 15.1 million draft eligible men, including 150,560 from Connecticut, had registered with the Selective Service as of Sept. 20, 2005. The agency, which has an annual budget of $26 million, estimates that 91 percent of draft eligible men register, although only 89 percent are registered in Connecticut. Overall, registration rates have not improved since the 1980s, despite efforts to make registration easier and failure to register more painful. Congress has raised the maximum fine to $250,000 for failure to register and has passed laws prohibiting non-registrants from receiving federal student financial aid or from being hired at most federal jobs. Similar laws have been put on the books in all but a handful of states. Registration can also be done now over the Internet and 34 states have adopted laws that automatically register draft-aged men when they get a driver’s license. Connecticut is one of a handful of states that has not passed any laws to encourage registration. There are no plans currently to do so. Dan Amon, a public affairs specialist with the Selective Service, said there have been no prosecutions in the past two decades but names of suspected non-registrants are still sent to the Justice Department — including more than 550,000 during the 2003, 2004 and 2005 fiscal years. The Selective Service has found that many of those who fail to register live in the inner cities or are immigrants who do not realize they are required to register. Andy Mager, now-45, of Syracuse, N.Y., who spent six months in federal prison for refusing to register for Selective Service, said the fact that hundreds of thousands of names of suspected violators have been sent to the Justice Department in recent years without any prosecutions demonstrates that the program is a joke. “It raises questions of why they are keeping it on the books,” he said. Edward Hasbrouck, who was convicted in 1982 for failing to register, said the registration system is not credible and claims there is rampant non-compliance because so many people oppose a draft. “The vast majority effectively unregister by moving without notifying Selective Service,” he said. “If a draft were called, most induction notices would reach the dead letter office.” Hasbrouck said the level of concern about registration and a draft has increased sharply since the Iraq war began. “The interest comes as much, or more, from parents of draft-age sons and daughters,” he said. Hasbrouck believes it would be a good thing for Congress to repeal Selective Service and finally put an end to speculation of a draft. “The sooner the government recognizes that a draft is not a possibility, the sooner it will change our foreign policy against war,” he said.
https://hasbrouck.org/blog/archives/001124.html
Technical Assistance, support and training to improve capacity of SENAMHI to provide climatological, meteorological and air quality services for its stakeholders and the whole Peruvian society. This doctoral research investigates different aspects of "favela media activism". How do young people who live in the Brazilian kinds of slums use different forms of media to enact citizenship? What are their motivations and objectives to do what they do? The research explores the multidimensional and complex process of civic engagement in and through media among young favela dwellers in Rio de Janeiro. In Latin America indigenous peoples have turned into significant political actors. This project examines how the new forms of indigenous leaderships connect to the questions of power, and consider how they are interpreted from a native point of view. The studied groups are two Arawak-speaking groups living in Western Amazonia, Brazil. In looking at the way these two groups view their spokespeople and create new political, cultural, and economic partnerships, the aim is to explore the Amerindian way of producing different bodies, authority, and agency. The research also addresses historical changes of leadership as part of other social and political processes in the past and present. The main research questions are the following: 1) What are the new forms of leadership in Amazonian native communities? 2) How can acting in new interethnic networks be understood as a new type of human-to-human relation in Amazonian sociocosmology? 3) How have social roles hold by the young indigenous people changed their communities? 4) What are the differences between young female and male native leaders? 5) How have Amazonian leaderships changed taking into account environmental changes, economic, political, social, and legal processes?
https://www.unipid.fi/infobank/search/?year=2009&q=&bd=1&bm=1&by=2009&ed=31&em=12&ey=2009&people=&theme=0&region=2&country=0&lmt=10&tags=35;906;164;905&tags=
In his report "Consumer Digital Payments – US", Sohn and his team also highlighted several "technologies enabled". the entrants "who revolutionize the electronic payment market in the United States. Part of the report reads: " Suppliers considering adopting Blockchain technology , which was originally created for Bitcoin cryptocurrency, may pose a potential threat to all current payment items. Blockchain is a string of encrypted information blocks that form a database or "ledger", which may eventually make less necessary the intermediate platforms that currently approve, offset and pay for payments. Blockchain At the same time, Sean Jones, deputy general manager of Moody's, and his team also published a separate report in April claiming that Blockchain had several applications and potential benefits to Beyond Bitcoin Digital Currency They said that technology can revolutionize the clearing and settlement industry and that it can also "drive transaction transparency, improve data security and reduce the risk of a single point of failure. " several hurdles that should be addressed before the economics of technology investments can be realized. technical issues related to interoperability and scalability, as well as disagreements on industry standards and conditions for collaboration. The Report also highlights the generally favorable position of financial services regulators on Blockchain. lack of definitive vision on how the technology will eventually be treated.
https://businessdigit.com/the-threat-of-blockchain-and-cryptocurrencies-far-but-inescapable-moody-says/
- 5 How to decorate the kitchen in a modern way? The kitchen is the heart of the house. In it, we begin our day; here the most important conversations, everyday rituals and the best parties take place. How to arrange so that this room is not boring and the kitchen does not go out of fashion? We present 5 trends in kitchen design that linger for a long time. The modern kitchen and its new role in the house The former kitchen, designed as a separate closed room, slowly goes into oblivion. Today, she is increasingly entering the living room and becoming the centerpiece of the house. This is due to several factors. The first of these are rising housing prices, the savings of developers, small houses and small apartments. With the development of urbanization, this trend will grow. Another thing is to change your lifestyle. Thanks to the ubiquitous Internet and the devices that make us online available around the clock, the boundaries between private and professional life, work and leisure are blurred. We are more and more willing to work remotely from home, saving time spent on traffic jams. The kitchen becomes a multi-purpose room, serving not only for cooking, but also for work and entertainment. Another equally important factor is a return to community building. With the advent of pressure on individualism and personal development with threats from the outside world, a tendency arises to take care of family and friendships. We want to spend more and more valuable time together with our loved ones, cook together and have lunch, without interrupting the rest of the family. In the kitchen, not only combined objects and household appliances built into other rooms become invisible, they merge together. Heating stoves merge into one surface from above, built-in refrigerators and folding batteries near the sink disappear from view. Sometimes some kitchen utensils begin to play the role of decorations, giving the character and style of the interior of the whole house. This is the function of carved taps, designer teapots, toasters and coffee makers. This, in turn, is the result of another important trend – the kitchen is becoming a symbol of social status, a place of representation, which is developed and organized with great care. Fashionable and timeless kitchen is a focus on value Designers of kitchen furniture and home accessories are increasingly improving their equipment in accordance with the values of the modern world. We attach more and more importance to the environment, eat quality food, spend time on small pleasures and develop experience, not tedious duties. It’s easier to keep the kitchen clean and keep food fresh. Sinks and hot plates integrated in the countertop reduce cleaning to a simple wipe with a cloth. Kitchen cabinets are designed to facilitate garbage segregation, smart food management, and fast and smart cooking. Adjustable LED lighting helps save energy. Modern hoods purify the air and eliminate odors. Coffee machines with a removable milk island mean that not a single drop of milk is wasted. Quality is the most important in this trend. This applies both to branded devices that work better and longer, and to what they can offer us – for example, perfect coffee every day. Intelligent kitchen. Digital innovations, real benefits The kitchen of the future is a kitchen with intelligent user support systems. Contrary to the appearance, such systems do not think about us, but they inspire, show new directions, act as experts, provide advice and help. We can learn from them and get advice. We are becoming a society that uses modern technology in a rational and practical way. We want to spend money that meets our personal needs and adapts to them. That’s why personalization is so important – also in the area of everyday pleasure, that we allow ourselves in the kitchen, for example, coffee. What is the kitchen of the future? Industrial style, hi-tech and minimalism Technology affects not only the functionality of household appliances. It also shapes the design and trends in interior design. The modern, minimalist style has not gone out of fashion for many years, and there is no sign that it will disappear. It works great in the kitchen because it helps to keep it clean and control the chaos that often accompanies cooking. This trend is characterized by characteristic colors – fashionable white for some time, but also black, gray, steel and silver. The leaders are especially gray in different shades: darker anthracite, light, with a blue tint, as well as a shade of gray with a drop of beige. These classic and timeless colors appear glossy or matte. Materials from the high-tech trend include steel, stone, copper, concrete, and composite. When decorating kitchen glass, it is becoming increasingly popular, especially those made by float technology, which is completely flat, without distortion and optical defects. At the top there will be “cosmic” peaks with spots of brilliant quartz resembling a starry sky. How to decorate the kitchen in a modern way? In the world of business and marketing, the influence of the so-called happiness economy, which is an economy of happiness, which focuses on quality of life and satisfaction in various fields. It covers a wide range of industries, including interior design. This can also be seen among kitchen trends. Kitchens look as if they are more focused on pleasure, where they have a good time, and do not suffer from cooking or washing dishes. We decorate them with motivating quotes, photographs and paintings that evoke positive associations and make every moment happy. In the central place we place accessories for drinking coffee and tea, fresh fruits, small snacks. We show that we are happy to be in the kitchen, as it is done by culinary masters – Italians, whose slice-vita manifests itself in a love of good food and design. What is the phenomenon of the Italian style? Functionality and quality are combined in it with the beauty and joy of life. That is why the trends in the kitchen, as in fashion, are dictated by Milan. It is here that every two years the most prestigious European kitchen fair EuroCucina is held – a celebration of world interior design. The next exhibition, which can be expected in the spring of 2018, should lead to the development and refinement of all these trends. Do you want latest Trends straight to your inbox? Thank you for subscribing. Something went wrong.
https://edecortrends.com/stylish-kitchen-5-future-trends/
“I’m timeless like a broken watch” relates the passage of time to the individual self in an ironic and negative manner. Objective Create an animated and print poster of a 6-word short story. When something is described as timeless, it is usually considered to be authentic, classic, and ageless. In this case, this ironic line compares the individual as a “broken watch”, which is essentially a useless tool. The individual is seen as part of the wrong era and is unphased by the passing of trends in society, thus never going out of style. Process Final Deliverables Motion graphics poster animated on After Effects. I wanted to embody this concept by breaking up the anatomical elements of the letter T while mimicking the stuttered dynamics of a broken watch in the animation, creating kinetic energy within the space. The letter T is a variant of a blackletter typeface derived from The New York Times magazine logo. I was inspired by Wolfgang Weingart’s compositional movement against the utilization of the grid in order to create a minimalist yet chaotic effect.
https://marissabalbuena.com/Timeless-like-a-Broken-Watch
KATHMANDU, Sept 28: Prime Minister KP Oli has held important bilateral meetings including with British Prime Minister Theresa May and Swiss President Alain Berset on the sidelines of the UN General Assembly in New York on Wednesday. During the meeting with the British prime minister, the two leaders recalled the centuries-old friendship and excellent bilateral relations and talked about strengthening the cooperation in multiple areas including in trade, investment and tourism, said a statement issued by the Ministry of Foreign Affairs (MoFA). Similarly, Prime Minister Oli and Swiss President Berset discussed the matters of mutual interests, including Swiss cooperation in Nepal, as well as other important bilateral and multilateral concerns, said MoFA. Like Britain, Switzerland has been one of the important donor countries of Nepal in various development endeavors. On Wednesday evening, Indian External Affairs Minister Sushma Swaraj paid courtesy call on Prime Minister Oli. The meeting between Prime Minister Oli and External Affairs Minister Swaraj came at a time when there are speculations that the relations between Nepal and India have witnessed hiccup especially after Nepal chose not to take part in the BIMSTEC military drill. Prime Minister Oli is scheduled to address the UNGA on Thursday. Separately on Wednesday, Foreign Minister Pradeep Gyawali attended a ministerial meeting of the Non-Aligned Movement. In his statement, he mentioned that the “principles of the movement must inspire member states toward building a culture of peace”. He encouraged all NAM members “to act with solidarity and unite our strength to contribute to the world of peace, while leaving no one behind”, according to MoFA statement. Similarly, Foreign Minister Gyawali attended the Ministerial Meeting of the Least Developed Countries, highlighting structural constraints of poverty, inequality and unemployment, diverse effects of climate change, natural disasters and internal conflicts as an impediment to the progress of LDCs. Nepal establishes diplomatic relations with Madagascar Nepal and Madagascar have established formal diplomatic relations on Wednesday. Foreign Minister Gyawali and his Madagascaran counterpart Eloi Alphonse Maxime Dovo signed an MoU to that effect. With this, the number of countries Nepal has established diplomatic relations has now reached 162.
https://myrepublica.nagariknetwork.com/news/pm-oli-meets-british-pm-swiss-prez/
- Consider what you want to achieve, avoid, sustain or improve. Focus on results you want to achieve. Don’t focus on actions. Create goals accordingly. In short a goal is the gap between the vision and current reality. - Generate many options to achieve the goal. Don’t stick to a few options. - Decisions are based on published, measurable criteria and never on an ad hoc basis. - Criteria can usually be classified into “Must” and “Want”. The Must criteria must be satisfied for the option/recommended solution to be viable. Author: Author of #PowerofSee Rules of Thumb — Engineering Communication One of the most important tasks of engineers, managers, facilitators, guides, mentors, consultants and trainers is to communicate. Without right and effective communication, nothing seems to get done. One may be working very hard but he/she would fail to see results on the ground. That is indeed very frustrating. The secret is — unless people are involved, nothing worthwhile gets done. The goal of communication is to involve people. In this article, I would like to focus on the Communication Process Hence some basic rules of thumb on the Process of Engineering Communication: - Audience Based: Use an audience based and not a writer based approach. The content of the communication (whether written or verbal) must only address questions the audience wants answered. There is little or no point of dumping any information the writer seems knows on the subject. In such cases, a knowledgeable writer or communicator is internally motivated to share whatever he/she knows about a subject. Hence the length of such presentations or written communication is directly proportional to the length of time a communicator has spent researching on a subject. This becomes quite boring to an audience. Worthwhile to remember that there is no need for a communicator to be perceived as a highly knowledgeable person. The audience would decide that anyway. Just in case, one is forced to communicate in a structured fashion the structure should be hierarchial — i.e. — arranged in order of importance to an audience starting from what the audience “must know” about a question to going what is “good to know” type of information, which in most cases can be avoided. In any case, the communication structure must not be historical or chronological, unless the audience is interested in the history of a subject. In my workshops, I start off by asking what the audience wants to know and then address their questions one by one. Once you adopt this approach you would see how time flies and how stressfree the environment becomes. The golden rule is — there is no universally accepted template that fits all communications; each communication must answer the questions of the audience. - Be Effective: Effective communication is linked to two important things — a) Problem Solving Skills b) Clear Thinking skills. However, if I were to choose between the two skills I would go for Problem Solving skill alone. This is because good and effective problem solvers develop clear thinking skills, without which it becomes difficult to solve any problem worth its salt. But why is effective communication linked to problem solving skills? This is because any type of audience loves to hear stories. And real life stories keep an audience glued to the communicator. When a communicator tells a story the tension and suspense created are palpable. This moves the audience to be attentive. Moreover, as I have seen, audience learns most from stories. Needless to mention that helping others to learn through their self awareness and then seeing them act upon it is the fundamental effect of any good communication. - Welcome Confusion: Confusion is always welcome since it forces the communicator to check back and rethink his/her thinking. A good way to bring out ‘confusion’ in the open is to trigger a feedback loop. Simply stated, it means asking the audience — which parts of the communication wasn’t well understood or appreciated by the audience. This not only helps the audience stick to the flow of communication but also generates life in the communication. - Let ideas flow: Ideas must coherently flow from one idea to the next. In short, the ideas must be well knitted together and expressed cogently. This helps an audience see the whole picture and appreciate the depth of a topic. It simply generates interest on an on-going basis that propels the audience to think and act on the their understanding. There is no need to stick to one idea throughout a presentation. One may ofcourse, dwell on an idea for sometime before logically connecting the idea to the next idea. Connecting ideas makes a presentation triggers the thinking process of the audience, which is worth its weight in gold. - Revise: Be willing to rethink, revise and rework the whole structure if the structure of the communication doesn’t meet the needs of an audience. Though grammar and style are important there is no great need to endlessly polishing those. And be more than willing to delete or discard entire sections already written instead of incorrectly hoping to deliver everything that is written. - Coherent Written Plan: Develop a coherent written plan — especially when one is supposed to speak on a topic or present verbally. A simple cue card (5 x 7 inches card) with a few bullet point maybe sufficient to keep one pegged to the overall picture. This also helps to keep the mind of a presentator poised and calm. Any tension in the mind of a presentator would soon show up and get communicated. Audience would notice the internal tension of a presentator and they wouldn’t like it much. - Rehearse: Don’t forget to rehearse. Communication like all performance arts needs deep rehearsing. There are many ways of rehearsing, some of which are — a) read aloud (it helps to uncover flaws very quickly) b) present it to your children or spouse or friends c) rehearse in front of a mirror d) mentally rehearse the topic including the possible gestures, pauses etc one is likely to incorporate in the presentation (this can be done even while taking a shower). By Dibyendu De Why Systems Fail to Achieve RAM requirements? Folowing is a summary of the reasons as to why manufacturing plants fail to achieve the desired level of RAM (Reliability, Availability and Maintainability) requirement: • Poorly defined or unrealistically high RAM requirements. * Lack of priority on achieving Reliability & Maintainability * Too little engineering for RAM - Failure to design-in reliability early in the development process - Inadequate lower level testing at component or subcomponent level - Reliance on prediction instead of conducting engineering design analysis. - Failure to perform engineering analysis of commercial off the shelf equipment - Lack of reliability improvement incentives - Inadequate planning for reliability - Ineffective implementation of Reliability Tasks in improving reliability - Failure to give adequate priority to the importance of integrated Diagnositics (ID) design — influence on overall maintainability atributes, mission readiness, maintenance concept design and associated LCC support concepts. - Unanticipated complex software integration issues affecting all aspects of RAM - Lack of adequate Integrated Diagnostic (ID) maturation efforts during system integration. - Failure to anticipate deisgn integration problems where incremental design approaches influence RAM performance. Strange case of Semi-elliptical cracks Assembly: Mill having a power input of more than 1000 KW Sub-assembly: Gear box Part: Casing Location: Around the area of the torsion shaft on the output side Failure Mode: Casing crack in semi-elliptical pattern (a probabilistic failure mode) Description: semi-eliptical crack — the pink area on the photo Analysis: Phenomenon: Thermal Fatigue (such semi-elliptical cracks are distinguishing patterns for thermal fatigue; but not necessarily the only pattern of failure due to thermal fatigue). Such a crack is a combination of many interactions taking place simultaneously. However, the initiator of such a problem with casing is the likelihood of blowholes or casting defects in the casing. On examination this was confirmed. Accelerators: 1. Thermal fatigue then accelerates the development of such a crack and especially so, if the casing thickness is not much. 2. Induced by rotating bending of the torsion shaft. Hence the crack appeared around the middle of the casing around the torsion shaft area. 3. Temperature of the gearbox was higher on the output side. Around 70 degrees C. Nature of Crack growth and development: When the depth of the crack is around 0.025 to 0.25 mm the shape of the crack becomes semi elliptical (check depth of crack). The threshold limit is around 0.16 mm, when initial crack starts to propagate. When such a crack starts to develop and propagate a cyclic noise is audible. Other areas where Thermal Fatigue can cause failures: 1. Rolls of rolling mills — can be experienced anytime during operation 2. Gear Boxes — usually experienced in winters or relatively cold ambient temperature 3. Motor Windings — usually experienced in topical summers 4. Anti-friction bearings — can be experienced anytime during operation Method of Montoring: (Varied): But some of the methods might be as follows: 1. Infra-red thermal imaging — especially for motors 2. Visual — powerful technique — both sight and sound 3. Vibration analysis — especially for rolls and anti-friction bearings 4. Temperature monitoring (differential or temperature distribution) — for gearbox casings and motor casings. Precaution during purchase: (Design Review) 1. Casing thickness 2. Allowable temperature rise 3. Lubricant 4. Cooling system Reliability Improvement of Physical Assets What does reliability improvement of physical assets mean? To answer this question we must first understand what we mean by reliability? The word reliability conjures up different meanings for different people. To some it might mean quality. For others it might mean safety. While for some it might mean integrity. And for some it might mean a long and useful life of a machine. That might seem very confusing. Hence, in short, the word reliability means — “Whatever a user wants of his/her physical assets.” If that is so, then reliability improvement would simply steer us towards problem solving activities that would help an user of physical assets achieve his/her desired intention. However, solving problems to improve reliability or MTBF can be quite daunting. This is because the upper limit of reliability of machines is practically set during the design and manufacturing stage. So, to improve reliability during the operation stage is quite difficult though not impossible. But solving problems to improve reliability during operation can be complex. Hence the entire process of problem solving has to broken up into manageable chunks and executed in a step-by-step manner. However, the end results of improving reliability of a machine would be: - Relax — to continue in an operational mode as long as possible. This is achieved by ensuring that a machine loses minimum energy during running. - Resilent — to make a machine work with minimum stress under varying conditions, interactions and contexts. This is done by modifying interactions and initial conditions to extend the MTBF to a level — dictated by business goals. - Rejuvenate — to make and keep a machine in a healthy state of performance without disturbing production and production cycles. Behind all these activities the most important factor that is essential is the application of human awareness. Without it, success of a reliability improvement project is simply not possible, whatever the tools, techniques, process or methods might be. How do we recognize, develop and apply human awareness is a million dollar question? Plant Reliability Improvement — RAPID A) The Background Engineers have tried to address the issue of Reliability of equipment and systems in various ways. Therefore, many methods and techniques are in existence. The usual approach pivots around the concept of “failure modes” and how best to guard against those so as to prevent the consequences of failures. However, the existing methods do not take into account, flow of energy as an important factor that determines reliability of plant and machinery. Taking this into consideration, I am putting together some rules and principles that hopefully point to a path that might enable engineers to improve plant reliability with minimum effort, resources and time. But before I do that I would like to put forward an easy understanding of the term — reliability. B) Reliability of a Machine: The period of time a machine would run (fulfils its function) without a problem or trouble. Longer the period of trouble free running better is the reliability of the plant. It therefore addresses the heart of reliability improvement — i.e. enhancement of useful operating life of a machine or a system of machines. C) What does that mean in terms of energy flow? We may say that a machine that can continue with the smooth flow of energy, with the minimum wastage of energy for a long period of time is more reliable than a machine where energy flow is disrupted frequently in some manner or the energy wastage is high or the energy is pushed out of equilibrium condition, which invariably stops the machine from functioning effectively. D) So what might be the job of engineers? It is evident that the fundamental job of engineers (both operation and maintenance) is to run and maintain a machine or system in such a way so that the energy wastage is minimized and smooth flow is ensured for a long or desired period of time. E) How can this be done? This may be done in three fundamental ways, which are as follows: - Observe the dynamics of a machine or system to ascertain energy flow patterns and the degree of energy wastage and the reasons for such wastage. Also determine the degree of stability or instability of the system and what affects a system’s stability. - Adjust or maintain the conditions within its operating context to ensure smoother flow of energy with minimum wastage. In the process, learn what changes in a machine/system would disrupt energy flow or push it out of equilibrium conditions and prevent such disruptions. - Change, monitor, modify the system (made up of physical asset and components, process, information flow, analysis and decision making, teams) as necessary, for smoother flow of energy to continue over longer period of time with minimum energy wastage. F) How to apply it in a real plant? I have found the following method useful in various plants where I implemented Reliability Improvement Programs. - Make a list of critical machines. - Select a critical machine along with its sub-systems (machines that support its functioning) - Apply the three steps as outlined in Section E (above) — within the operating context. - Improve and stabilize performance; record the learning. - Create a custom made monitoring system to spot changes in time along with custom made expert system to guide engineers to quickly decide the course of actions to be undertaken. - Record the decisions, actions and changes in the form of equipment history. - Move to the next critical machine and its sub-systems. - As we go along, first check whether the all consequences of failures have been taken care of. Next check whether overall plant/area/section MTBF (Mean Time Between Failures) is going up and whether MTTR (Mean Time to Repair) is going down along with consequential lowering of maintenance and operation costs. Lastly check the accuracy of the custom made expert system (usually made up of multivariate parameters) in is ability to forewarn and guide maintenance decisions. G) General Rules: Keeping the above in mind I formulated the following four rules that might help engineers managers stay on the path of plant reliability improvement: - For any machine, energy tries to move in sync through all elements of a machine through various interfaces against many contradictions and constraints but always choosing the path of least resistance. - Changes in contradictions, constraints and interfaces change the quality of energy flow forcing energy flow to go out of equilibrium (instability) to either cause degradation of performance or cause failures that lead to unwarranted plant stoppages, affecting costs and productivity. - Changes and the causes of such changes are reflected in the dynamics of a machine in terms of interdependent parameters like vibrations, heat, flow, wear, humidity, temperature, pressure etc. - Reliability of any machine or system can be improved by either maintaining the contradictions, interfaces and constraints to “just right conditions” or changing those to enable smoother flow of energy for a longer period of time with minimum wastage. H) Applications: Having applied these basic rules some industrial plants were able to gain on-going benefits for years. Here are some examples of — Plant Wide Reliability Improvement Fixing Organizational Problems Every day, managers in different organizations face an array of problems. Usually, such problems keep repeating — either randomly or at regular intervals. After a while, it then becomes clear to the managers that such problems resist current ways of thinking and actions as practiced within the organization. The réponse to such problems is — “How this problem can be fixed permanently?” A manager would then try to apply known theories, methods, and tools to solve the problem. And in this process, the managers can also increase their skills. But the problem is that the problems simply don’t vanish. They have a bad habit of sneaking back through the backdoor. Why is that? The short answer is — “No problem can be fixed, at least permanently.” This is because the nature of the problems keeps changing with time or the same problem comes back with different intensity or frequency. However, one can find and install new guiding ideas. And one can intently engage in redesigning an organization’s infrastructure, policies, rules, methods, and the tools presently used to find new ways of dealing with work and problems. The key is to closely observe what is going on in the present and then discover the organizational subconsciousness (mindset) that allows such events to happen with alarming regularity or randomly. Once that mindset is found, a manager can then find new ways of thinking and practices to replace the old governing mindset. If one keeps going in this way one can gradually evolve a new type of organizations that is responsive, agile and observant about the numerous interactions that go within an organizational environment to become a better and a fitter organization. It would then be able to deal with the problems and opportunities of today and invest in its capacity with the right resources and efforts to embrace a better future. This happens because its members are focused on enhancing and expanding their collective consciousness — where individual members are able to observe, learn and change together. In other words, they collectively create, support and sustain a organization that continually learns from their present situation. Respect the minds of people by going to where the action is – a fundamental rule of change management All through my professional life, I have been connected to improving something on the shop floor — be it a machine, process or a quality problem. And I have seen that it is very difficult to improve anything on the shop floor by just passing down verbal instructions or by commanding someone to do something or by conducting a training program in a classroom or handing over a well-documented piece of paper complete with all instructions and a to-do list. In most cases, people don’t get the idea. As a result, workers on the shop floor soon lose interest in the improvement process and don’t like engineers and managers who just pass down orders sitting at their desks. Respect for engineers and engineering is soon lost. And improvements don’t take place. The company suffers as a result. Respect for engineers and engineering comes from respecting the minds of workers and supervisors. This is best done by engineers going down to the area of the shop floor where the improvement is to be made and then explain what they want the workers and supervisors to do and what exactly is to be done. It can be explained verbally by physically touching the parts or equipment where the improvements are to be made or through rough sketches quickly drawn on scraps of paper to instantly clarify the points. This is an important point in making a change, which is often forgotten by engineers. I call this rule — ‘Respect the minds of people by going to where the action is.” 88.273715 Attention — the Essential Energy to Achieve & Improve Anything. Information enters our consciousness either because we intend to focus attention on it or as a result of attentional habits based on biological or social instructions. For example, driving down the extremely busy and often chaotic streets of Kolkata, we pass by hundreds of cars without actually being aware of them. Their shape, size and colours might register for a fraction of a second, and then they are immediately forgotten the next moment. But our primary objective is to reach from one place to another without an accident or suffering a scratch. But how do we achieve that goal? So while driving, we occasionally notice a particular vehicle, perhaps because it is moving unsteadily between lanes or because it is moving too slowly or because it looks strange in some way. The image of the unusual vehicle enters our focus of consciousness and we become intensely aware of it unusual behaviour. In our minds, such visual information about the car (the abnormal behaviour) gets related to information about other errant cars stored in our memory, which helps us determine into which category the present instance fits. Is this an inexperienced driver, a rash driver, a drunken driver, a momentarily distracted (talking on a mobile phone) but competent driver? As soon as the event is matched to an already known class of events, it is identified. Now it has to be evaluated: Is this something to worry about? If the answer is yes, then we must immediately decide on an appropriate course of action: Should we speed up, overtake, slow down, change lanes, stop? All these complex mental operations must be completed quickly and in real time. But it doesn’t happen automatically. There seems to be a distinct process that makes such reactions possible. This process is called attention. It is attention that selects the relevant bits of information from a potential of thousands of bits available. It takes attention to retrieve the appropriate references from memory, to evaluate the real-life event and then choose the right thing to do. Despite its great powers, attention can’t step beyond the limits as already described. It can’t notice or hold in focus more information that can be processed simultaneously. Retrieving information from memory and bringing it into the focus of awareness, comparing information, evaluating, deciding — all make demands on the mind’s limited processing capacity. For instance, the driver who notices an errant car will have to stop talking on his cell phone if he wants to avoid an accident, which is, in fact, his goal. Some people learn to use this priceless resource very efficiently while others simply waste it. The mark of a person who is in control of his/her consciousness is the ability to focus attention at will, to stay away from distractions, to concentrate as long as it takes to achieve a goal and not longer. The person who can do this effortlessly usually enjoys the normal course of everyday life and can effectively meet the challenges of everyday life. Improving reliability of industrial equipment needs such keen attentional energy which Reliability Centred Maintenance helps one to achieve. It, of course, depends on how well a Reliability Centred Maintenance System is designed, developed and implemented. But what is essential is the development of memory bank, which can be only developed through comprehensively designed training and education system run over a long period of time. Computerised Maintenance systems, Condition Based Maintenance technology, rigorously developed Maintenance Planning, Internet of Things, Artificial Intelligence can all help but without a broad-based deep memory bank of different types of failures, failure modes, interactions and mechanisms that create failures, methods to detect failures, interpretation and evaluation of relevant information and deciding the right course of action –improving reliability of industrial systems would remain as a desire only, Attention is the key to achieving desired outcomes and improving any system. It can’t be ignored.
https://rgbwaves.com/author/rgbwaves/
Trip to Asinou, the Riverboat in Asia Minor is a unique archeological site. As you travel along the shores of the Mediterranean Sea and the Black Sea, you will be able to discover an unspoiled and historical region, rich in both classical and modern monuments. As in all of the provinces of Turkey, the archaeological site of Asinou is unspoiled. It was in the 7th century that the first attempts were made to map and examine the site of Asinou. The first excavations took place in the nineteenth century when the works of Sirangelo appeared at the site, and they revealed the remains of a city, dating back to the ancient Cypriot period. A visit to Asinou will allow you to explore the most important archeological site of Asia Minor. You will be able to see the tomb of the great Emperor Trajan, the sanctuary of St. Photini, and numerous temples and churches, including the Asinou Church, the home of theodoros Hissas and his wife, Sofia; the ruins of the old city of Ephesus; the birthplace of Aristotle; and several museums. The journey takes approximately three hours and includes a meeting with the well-dressed gentleman, Mr. knobbs, who provides light drinks and takes you through the interesting locations. It is advisable to arrive early in order to take advantage of the free guided tour of Asinou. Mr. knobbs takes you on a fascinating journey through the ancient lands of Asia Minor. During your first stop, you will visit the Aspolion Hill where you will be treated to the spectacular view of Mount Hymettus. The view from the hill is impressive and magnificent, and you are treated to the sight of Mount Hymettus towering above the plain below. The trail continues to visit several other important landmarks including the Aspolion Temple, the Royal Tombs, and the Temple of Artemis Agrotera. The journey concludes by travelling up to the village of Aspolion. The next stop on your Trip to Asinou is the town of Aspolion. This is the main settlement on the riverbank, which was a major hub for trade during ancient times. Its location makes it an ideal place for archeological digs, as many artifacts have been discovered here. A unique feature of this town is the Aspolion Museum, which is home to some fine examples of Greek and Roman antiquities. The museum also houses some of the finest examples of Greek vases, pottery and other works made during the Classical period. The Ancient Hymettus excavations site near Aspolion is another example of how successful archeology is today. After leaving Aspolion, your next stop should be Nikitari, which is home to the Asinou Church. The church itself dates back to the fourth century, and it is believed to be one of the oldest monasteries in all of Greece. This small town is located on the foothills of the Kerkyra Mountains, which gave rise to the land of Aspalia. The most prominent characteristic of this area is the mountainous landscape that dominates the landscape of the entire region. The only open settlements are Parnassus and Stavros tis Soupataki, with both being situated around Mount Kasaide. Nikitari is home to some great attractions such as the Ancient Hymettus excavations site, which is located just above the town. The Temple of Artemis Agrotera and the Aspolion Temple are also located in this city, as well as the Archontiko Argyrou, the National Archaeological Museum, the Aristotle University, and a number of museums dedicated to archaeology, anthropology, ethology and history. The country itself is home to some fine examples of cultural heritage, and the aforementioned Asinou Church, along with the ancient Aristotle University, Parnassus, and the tomb of Hippocrates at Delphi are just a few examples.
https://billiondollarpresident.org/2021/05/02/a-guide-to-asinou-and-nikitari/