content
stringlengths
0
1.88M
url
stringlengths
0
5.28k
Over the past 80 years, the International Rescue Committee (IRC) has developed unparalleled expertise in responding to emergencies and helping uprooted communities to rebuild. Founded in 1933 at the request of Albert Einstein, the IRC’s mission is to help people whose lives and livelihoods are shattered by conflict and disaster to survive, recover, and gain control of their future. The IRC is on the ground in more than 40 countries, providing emergency relief and rebuilding lives in the wake of disaster. In addition, through 28 regional offices in cities across the United States, the IRC also helps refugees resettle in the US and become self-sufficient. The IRC is committed to a culture of bold leadership, innovation in all aspects of our work, creative partnerships and, most crucially, accountability to those we serve. The IRC is a tireless advocate for the most vulnerable. The Purpose of the Role The Program Development Advisor (PDA) will lead and/or support new programme/business development efforts, in line with IRC’s Business Development strategy, in particular looking to increase our share of humanitarian funding in the near term while diversifying our donors and targeting development opportunities. Support will range from opportunity tracking and capture planning to proposal development, and submission. The ideal candidate will have a successful track record of working on new business efforts in humanitarian and international development with a range of multilateral and bilateral donors, in particular USAID, US Department of State, FCDO, EU and ECHO, GFFO, BMZ, Sida, SDC, World Bank and others. The PDA – Middle East and North Africa (MENA) will support business development in Syria, Jordan, Lebanon, Iraq, and Libya. KEY ACCOUNTABLITIES AND RESPONSIBILITIES RESPONSIBILITIES - Drive business development in MENA by providing effective proposal support, ranging from proposal management to in-depth support and quality assurance. - Build IRC’s profile by building visibility with donors, peers and partners. - Coordinate proposal development, including sharing initial assessment of new opportunities, preparing timelines, ensuring the proposal team adheres to deadlines, supporting recruitment, assisting in budget development, ensuring document completion, organizing meetings and compiling notes, and drafting and proofreading proposal sections. - Work with technical units, country offices, and other staff to support conceptualization of winning program and bid designs for new project activities and/or amendments to current projects. - Manage coordination, communication and inputs from subs or to our primes. Compile inputs from proposal team members, including consultants and partners. Identify partners, consultants, and other proposal development support as needed. - Provide quality assurance and quality compliance support on proposals. Ensure responsiveness to and compliance with solicitation documents. - Work with MENA countries to successfully position for opportunities in their pipeline or other strategic opportunities identified throughout the year. Lead and assist in the identification, tracking and updating of new business opportunities across a variety of technical sectors and donors. - Lead or support capture planning for specific opportunities, including facilitating technical brainstorming, competitive landscape analysis and win theme sessions with technical and country staff. - Facilitates internal post-submission debrief sessions to glean lessons learned. - Maintain complete and accurate electronic files, including final submission packages. Skills, Knowledge and Qualifications: - Experience developing and managing humanitarian and development proposals for international NGOs - Experience with strategies and proposal processes of key government/statutory donors – US, UK, EU, German, Scandinavian, etc.
https://www.charityjob.co.uk/jobs/international-rescue-committee-uk/program-development-advisor-middle-east-north-africa/751390?tsId=2
22 April 2016 A number of NGOs in the UK, including ECRE members, the British Refugee Council, the Scottish Refugee Council and Refugee Action, have published a joint briefing criticising the UK and European governments’ policies towards those seeking international protection. While commending the UK government for its aid to countries surrounding Syria for hosting large numbers of refugees, they consider that this does not absolve the UK of its moral responsibility to offer a safe haven to those in need of international protection. It calls for a coordinated response that is humane and rights-based, conducted in the spirit of solidarity with a commitment to shared responsibility, enables a dignified future for displaced persons and one that is focused on preventing and resolving the crises that drive displacement. Such a response should include the expansion of safe and legal routes to the UK through resettlement, making family reunification easier, developing a humanitarian visa scheme, suspending Dublin transfers to other European countries and using the existing legal mechanism within the Dublin Regulation to transfer people to the UK based on family unity. The report considers that it is an EU-wide responsibility to ensure humane reception conditions in countries such as Greece. It calls on the UK to support search and rescue operations that prioritise saving lives at sea and to raise breaches of EU asylum laws with the Commission, in particular in the hotspots. In addition, it calls on the UK, together with other European governments to improve the humanitarian response in Europe for people on the move, prevent border closures and assist in identifying and protecting vulnerable people. Furthermore, the UK should advocate and support the implementation of access to a fair, effective and humane asylum system wherever protection is sought, in accordance with EU and international refugee and human rights law; and improve conditions in host countries by development assistance focused on poverty eradication. For further information: - Joint Report, A Safe Haven? Britain’s role in protecting people on the move, 4 April 2016 - Oxfam International, Rich countries have resettled just 1.39% of Syrian refugees, need to step up efforts, 29 March 2016 This article appeared in the ECRE Weekly Bulletin of 22 April 2016. You can subscribe to the Weekly Bulletin here.
https://ecre.org/uk-is-falling-short-of-its-moral-responsibility-to-provide-safe-routes-for-people-seeking-refuge/
Significant improvement of all functional criteria (1)Significant improvement of: safety profile Extremely low rate of adverse events (< 1% adverse events observed)*** Suplasyn® can be efficient from the 1st injection2 AND UP TO 6 MONTHS IN THE MAJORITY OF PATIENTS Primary efficacy outcome: - SUPLASYN® can be efficient from the 1st INJECTION and up to 6 MONTHS in the majority of patients *** (2) - Up to 6 MONTH clinical effect on pain and functionality *** (2) - OPTIMUM MOLECULAR Weight: optimum stimulation of endogenous Hyaluronic Acid synthesis & increased access to diseased tissue (3) - EASY for doctors to inject (low viscosity) - Very good SAFETY ** (1,2) * 4519 patients suffering from osteoarthritis of the knee were included in this study (2011). Subjective sensation of improvement of doctors (n=4,499) and patients (n=4,505) was evaluated. ** Post-marketing surveillance report *** This depends on patient's individual response 1. Gydek A et al. ¨Efficacy and safety of intra-articular use of Hyaluronic acid (Suplasyn) in the treatment of knee osteoarthritis¨ Przegl Lek. 2011;68(6) 307-10. 2. Petrella R J: Hyaluronic acid for the treatment of knee osteoarthritis: Long-term outcomes from a naturalistic primary care experience. Am J Phys Med Rehabil 2OO5;84:287- 283. 3. Vitanzo C et al. Hyaluronans: Is clinical effectiveness dependent on molecular weight? The American Journal of Orthopedics. 2006; 421-28.
https://www.suplasyn.com/suplasyn-2ml.php
Please use this identifier to cite or link to this item: http://ir.unikl.edu.my/jspui/handle/123456789/2130 |metadata.conference.dc.title:||k- Nearest Neighbor Algorithm For Improving Accuracy In Clutter Based Location Estimation Of Wireless Nodes| |metadata.conference.dc.contributor.*:||Muhammad Mansoor Alam| Mazliham Mohd Su'ud Patrice Boursier Shahrulniza Musa |metadata.conference.dc.subject:||k-NN| Available Signal Strength, Receive Signal Strength, Location Estimation Triangulation Clutters/terrains CERT |metadata.conference.dc.date.issued:||2011| |metadata.conference.dc.publisher:||University Malaya| |metadata.conference.dc.identifier.citation:||Vol.24,No.3,p146-159| |metadata.conference.dc.relation.ispartofseries:||Malaysian Journal of Computer Science;| |metadata.conference.dc.description.abstract:||This research is focusing on the precise location estimation of mobile node by using k - nearest neighbor algorithm (k-NN). It is based on our previous research findings in which we divided the geographical area into thirteen clutters/terrains based on the behavior of radio waves. We calculated the point-to-point distance from the antennas to mobile node by using receive signal strength and available signal strength information. A C# prototype was developed by using WiFi (IEEE 802.11 b/g standard) to record data points in different clutters at every 2 meter distance. We derived Clutter based Enhanced Error Rate Table (CERT) for precision. Although CERT minimizes errors due to the atmospheric considerations but in highly attenuated clutters the error rate was still high. The k-NN algorithm is used to minimize the error ranging from 1-3 meters to 0.4- 1.2 meter only, depending on the clutter we are dealing with. Current research is divided into three steps. First we calculate the P2P distance in all different clutters by using available signal strength and receive signal strength at five different time intervals (t0 – t4). In step 2 we construct three triangles at random by using the data gathered in step 1 and calculate mean value of predicted locations. Finally based on locations calculated in step 2 we apply the k-NN algorithm to minimize error in the estimated location. Results show that the k-NN can produce from 217% - 289% better results compare to the famous triangulation method. The purpose of this research is to reduce errors in order to achieve estimated position near to accurate.| |metadata.conference.dc.identifier.uri:||http://mjcs.fsktm.um.edu.my/document.aspx?FileName=1086.pdf| http://ir.unikl.edu.my/jspui/handle/123456789/2130 |Appears in Collections:||Journal Articles| Files in This Item: |File||Description||Size||Format| |k-Nearest.pdf||395.02 kB||Adobe PDF||View/Open| Items in UniKL IR are protected by copyright, with all rights reserved, unless otherwise indicated.
https://ir.unikl.edu.my/jspui/handle/123456789/2130
Lightweight and fast-drying, these Turkish towels can be used in a variety of ways. Much easier to transport than their terry towelling counterparts, we've seen them being used as a beach towel, sarong, scarf, throw, table cloth, picnic blanket or even gym towel. Traditionally they were used in the super-hot hamams (Turkish baths) and therefore needed to be hard-wearing and good at drying in humid conditions - you'll find they're still made in the traditional way to this day. Crafted from Turkish cotton, they are flat-woven so, although they don't have a deep pile, they are still extremely absorbent and you can expect them to get softer and suppler wash after wash. 100% cotton Hamam towels are available in a range of vibrant colours. Lightweight, compact, multi-user and quick to dry, so perfect for holidays or those on the move - think backpacking, gap-year, festivals, camping, sailing......
http://www.herringboneandplaid.co.uk/towels-and-accessories/hamam-towels
Monday, August 4, 2014 Wolves May Come To Payson Plan would add region to reintroduction area By Pete Aleshire As of Friday, August 1, 2014 The U.S. Fish and Wildlife Service has released a revised proposal to save the endangered Mexican gray wolf by including all of Rim Country in a sprawling, two-state area where it could introduce new wolf packs. The proposal would essentially allow the wolves to wander outside that core reintroduction area into all of Arizona and New Mexico south of Interstate 40, in an attempt to connect the recovering wolf population in the United States with reintroduced populations in Mexico. The proposal did respond to pleas to loosen restrictions on killing or harassing wolves to protect pets and cattle. However, the USFWS proposal largely rejected a plan by Arizona Game and Fish and a coalition of other concerned parties to limit the reintroduction efforts to a much smaller area. That plan would have put the western limit to the reintroduction area along the boundary of the Hellsgate Wilderness area east of Payson. The USFWS proposal would instead include the Payson and Young Ranger Districts of the Tonto National Forest in the core area for introductions, which would stretch through the White Mountains to the current reintroduction area and on into New Mexico. The new proposal would also designate all of the state east of Highway 93 and south of Interstate 40 as an area the wolves could disburse into and where the USFWS could move already introduced wolves around to avoid conflicts with people or with each other. The USFWS will hold hearings on the proposal on Monday, Aug. 11 in Pinetop. Biologists will explain the proposal at an informational session from 2 p.m. to 4 p.m. and then hold a public hearing to get testimony from 6 p.m. to 9 p.m. It will also accept comments on the plan which offer specific changes or information to help refine the proposal. For the past decade, USFWS has tried to build up a population of at least 100 wolves as part of an “experimental, non-essential” population, which allows much greater latitude in management than a simple endangered species designation. The population around Alpine, the Blue Ridge Primitive area and on into New Mexico this year reached 83, a new record. However, biologists say they’ve run out of suitable territory in the existing recovery area to introduce any more wolf packs. USFWS regional director Ben Tuggle said, “Over the last 16 years, we have learned much about managing a wild population of Mexican wolves and it is clear that the current rule does not provide the clarity or the flexibility needed to effectively manage the experimental population in a working landscape. We need to remedy that so we can continue wolf reintroductions while being responsive to the diverse needs of local communities.” The USFWS is still working on a detailed environmental impact statement on the proposal, which will be based on the proposed, expanded boundaries. Previous proposals for an expansion of the recovery area have drawn sharply contrasting reactions. Many conservationist groups have urged as large a recovery area as possible, given the small size of the wolf population and the large territories wolf packs defend from other wolves. However, many ranchers, hunters and others have fought to limit the recovery area for fear the expanding wolf packs would kill so many cattle they’ll drive struggling ranchers out of business or reduce the deer and elk herds. Arizona’s 135,000 hunters contribute about $127 million annually to the state’s economy, according to a Game and Fish study. The proposed change in the rules would allow people to drive off or kill wolves in the act of attacking pets, cattle or other domesticated animals in the extended recovery area. However, they would have to prove the wolf was attacking a pet or domestic animal. Ranchers and other landowners could also get permits to harass or kill wolves who posed a threat to people, animals or property. The analysis that came with the proposed revisions predicted the big expansion in the area for reintroductions would not have a major impact on either elk and deer populations or ranchers, based on the experience of the last 16 years in the existing recovery area. The preliminary analysis concluded Arizona and New Mexico together contribute about 2.5 percent to the nation’s beef supply. About 90 percent of the 12,000 ranches in Arizona and New Mexico have fewer than 100 cattle. These ranches produce about 10 percent of the beef in the region, with a handful of ranches with more than 2,500 head responsible for more than half of the state’s beef production. Between 1998 and 2013 in the current recovery area, the wolves killed about 56 cows and calves annually — which includes both the confirmed and the unconfirmed livestock kills for a significantly smaller population than now exists. That worked out to a rate of about 118 kills for every 100 wolves each year. The wolves reduced herds by .01 percent for both confirmed and unconfirmed kills, the study concluded. Using 2012 prices, each 100 wolves would kill about $98,000 worth of cattle annually. Expanding the range would increase the number of wolves to about 285 by 2026, which could increase the annual livestock kills. The USFWS operates a program that will pay full compensation for confirmed kills and 50 percent compensation for suspected kills, although many ranchers say the program doesn’t fully reimburse them or take into account their true losses. The analysis also suggested the presence of wolves would make the cattle more alert and skittish and probably prevent them for loitering in riparian areas. All of that would reduce average cattle weights by about 6 percent in areas claimed by a wolf pack. That could also eat into a ranch’s profit. However, while the wolves could have a significant impact on a specific small ranch operation, the impact would be negligible on the larger operations that provide most of the cattle, the analysis concluded. The report also concluded the expansion of the wolf territory would have a negligible impact on deer and elk populations, treasured by hunters and many tourists as well. The wolves tend to prey on calves and fawns and older, often weaker deer and elk. By contrast, hunters go for the largest elk. As a result, the kills of the wolves probably won’t have much effect on the hunters. Moreover, the Arizona Game and Fish Department did a game survey of deer and elk in the current wolf recovery and reintroduction area. The study found no noticeable impact on the number of deer and elk in the areas claimed by the wolf packs. That contrasts with studies in Yellowstone after the reintroduction of the gray wolf, which found a roughly 50 percent decline in elk populations. However, the sharp decrease in elk populations there resulted in a big recovery of the heavily grazed riparian areas, which benefited a host of other species. The analysis also included reactions to the rule changes by four undisclosed scientists, who critiqued the scientific basis for the recommendations. One review pointed out that the proposal put too much emphasis on reducing wolf mortality which has been low and not enough on figuring out why the wolves have had so few pups that survived. For instance, in 2012 the 75 wolves in the existing reintroduction area had only four breeding pairs. The 16 percent annual mortality for the existing population “is surprising low for almost all wolf populations,” the reviewer concluded. “It appears from the data there’s a huge recruitment problem, there is not a wolf mortality problem.” He said the program lacks scientific evidence for many key assumptions, like how many wolves in the wild it takes to establish a stable, self-sustaining population. The overall plan set the goal at 100, but the reviewer said it’s likely the real number is closer to 300. He also noted that the USFWS seems to have spent a lot more time and resources on “endless federal bureaucratic issues, litigation response and settlements, rather than on scientific inquiry, analysis, publication and subsequent modification of field management.” That scientific reviewer concluded the plan should not make an open-ended promise to remove wolves whenever private landowners complain without demonstrating the wolves have caused some damage or danger. “The rule should be crystal clear and then it is easy to implement and for the public to understand and trust the Forest Service. For example, if a loner is on private land 10 percent of the time, will the Service try to remove it? What if nine out of 10 landowners are OK, but one wants the wolves removed? What if nine landowners want it removed, but the one with 90 percent of the pack territory wants them left alone? How much time do they have to spend on private land before the Service tries to search them out and remove them?” The reviewer also suggested the plan should give Arizona and New Mexico a more prominent role in management of the expanding wolf populations. All the scientific reviewers offered detailed critiques. However, they all agreed with the proposal’s suggestion that the success of the reintroduction effort depends on the huge expansion of the recovery areas. The film offers an abbreviated history of the relationship between wolves and people—told from the wolf’s perspective—from a time when they coexisted to an era in which people began to fear and exterminate the wolves. The return of wolves to the northern Rocky Mountains has been called one of America’s greatest conservation stories. But wolves are facing new attacks by members of Congress who are gunning to remove Endangered Species Act protections before the species has recovered. . . Inescapably, the realization was being borne in upon my preconditioned mind that the centuries-old and universally accepted human concept of wolf character was a palpable lie... From this hour onward, I would go open-minded into the lupine world and learn to see and know the wolves, not for what they were supposed to be, but for what they actually were. -Farley Mowat, Never Cry Wolf . “If you look into the eyes of a wild wolf, there is something there more powerful than many humans can accept.” – Suzanne Stone
90 years ago, a collection of 40 animals—ranging from exotic monkeys to not-so-exotic raccoons—were brought together to form the William Land Park Zoo. When it first opened in 1927, the zoo only occupied 4.2 acres. Early on, the zoo’s small size necessitated that most of the exhibited species were of a similarly small scale. However, public demand for more impressive fare soon led to the procuring of two elephants, a grizzly bear, and orangutans, necessitating an expansion to its present size of 14.2 acres. This in turn led to new exhibits featuring even more large species. But in recent years, the zoo’s staff, motivated by a change in perspective in the larger zoological community, has led a push towards larger number of exhibits for smaller species. This has meant that exhibited animals benefit from improved enclosures, and larger animals are no longer confined in enclosures that simply cannot meet their needs. While the zoo is changing, the role it has played in our local community hasn’t. John Ingoglia’s father, Donald Ingoglia, fondly recalled how his childhood classrooms were interrupted by the roars of the zoo’s lions. And we want tomorrow’s children to have the opportunity to get the same enjoyment from Sacramento’s little zoo. This is why we are proud to have assisted in the raising of more than $1 million for the Sacramento Zoo over the last 4 years, and look forward to finding other ways to support to help the zoo grow and improve as it nears its 100th birthday.
https://socotracapital.com/the-sacramento-zoo-aims-to-become-the-best-little-zoo-in-the-country/
Renewal through culture? The role of museums in the renewal of industrial regions in Europe. EUROPEAN PLANNING STUDIES, (ahead-of-print), 1-15. ABSTRACT: Bilbao has become a role model for the regeneration of declining urban and industrial regions. The debate on the so-called Bilbao effect showed that rundown industrial cities and regions might profit from culture-based development strategies, even if successful urban regeneration cannot be induced by only one flagship project without an appropriate local and regional context. Based on the comparative analysis of six, in general recently founded, museums in five countries ..(...)..
http://scholars-on-bilbao.info/scci.php?var=sx2xnx8
Riverside and Colton working to make Santa Ana River ‘destination point’ IECN Photo/Anthony Victoria: A homeless man sitting near the Drive-Thru of the Starbucks on Valley Boulevard trying to stay warm. Colton and Riverside announced during a joint Council meeting at the Riverside Convention Center on Nov. 29 that they will work together to address the issue of homeless in both jurisdictions. Colton and Riverside announced during a joint Council meeting at the Riverside Convention Center on Nov. 29 that they will work together to make the Santa Ana River a destination point for residents. Among the first hurdles to improving river conditions is addressing the issue of homelessness. Directly working with the homeless population and conservation efforts will improve river safety, officials say. “Arguably this is one the biggest public policy issues of our time,” Riverside Mayor Rusty Bailey said about homelessness. “No matter the city we represent, residents and business owners want and deserve to see solutions to this issue.” Currently Riverside follows a policy that focuses on a “housing first” approach to put displaced residents in affordable housing, while providing them social services. Nonetheless, the city continues to struggle with transients who reside near the river, explained Assistant City Manager Alex Nguyen. Fifty eight percent of the 321 Riverside residents that answered a Santa Ana River survey in 2012 said safety was their biggest concern. Colton does not have available data indicating resident concerns with the river. This slideshow requires JavaScript. Riverside’s Office of Homeless Solutions will prioritize moving homeless individuals from the river bottom, city parks, and businesses into affordable dwellings. Providing sustainable long term housing is a viable tool to provide employment and social stability to help displaced residents, believes the office’s Director Emilio Ramirez. “We can more faithfully help and serve the homeless population,” Rivera said. “And remove the impact from the neighborhood because we’ll be able to provide service from within the shelter of a housing unit.” Colton currently only provides basic services to its homeless population, such as access to showers and food bags. They don’t have a dedicated city staff member that oversees homeless concerns, explained Community Services Director Deb Farrar. However, they do refer people to other services. Both City Councils directed staff to collaborate on next year’s point in time counts and coordinate on outreach efforts at river bottom encampments. “We’re looking forward to this partnership,” said Farrar. “We know we’ll be reaping a lot of benefits.” Colton and Riverside officials believe the Santa Ana River trail is the Inland region’s most underutilized natural resource and hope to maximize the river’s potential for ecotourism and recreational and business development. Riverside Land Conservancy President Patricia Lock Dawson presented examples to both councils about river improvements made in other jurisdictions and in the city. They include holding community cycling events, organizing community clean ups, paving bike paths, and planting trees and plants. According to Dawson, the cost to complete the 155 river projects in Orange, Riverside, and San Bernardino Counties is about $600 million. Turning the Santa Ana River into a public “beach” or park will help restore community pride, thus helping eliminate blight, Dawson argued. “I leave it up to you,” Dawson told both Councils. “Do we want a generation addicted to their electronics? Or do we want to have folks out there enjoying nature and the amenities we could provide to them.”
The article explores the use of textile arts to counter dominant narratives associated with stigmatising memory loss and dementia. The article asks how textile arts can generate social transformation and elicit social dialogue to be a vehicle for mitigating societal challenges. Joseph Beuys’s (1979, c.f. Harlan, 2004) concept of social sculpture will be used to understand how textile arts can be used to counter harmful narratives that stigmatise memory loss and dementia. The role of arts-based approaches in improving the quality of life (QoL) and creative engagement with people who experience memory loss, and the role of arts-based methods (ABMs) in recollective practices and memory work will be addressed through an arts-based research strategy that was supported by narrative approaches and documentation via the digital WhatsApp tool that enables text messaging, voice notes and photos to be shared.
https://research.ulapland.fi/en/publications/memory-box-a-three-dimensional-quilt-as-an-arts-based-method-for-
Why do we care about power? Power is the measurement of energy transfer over time, and energy costs money. Circuits. Working with Wire. Introduction When someone mentions the word wire, they are more than likely referring to a flexible, cylindrical piece of metal that can vary in size from just a few millimeters in diameter to several centimeters. Wire can refer to either a mechanical or electrical application. Electronic_connectors.pdf. How to Power a Project. Overview This tutorial will cover the various ways you can power your electronic projects. Voltage, Current, Resistance, and Ohm's Law. Favorited Favorite 5 Electricity Basics When beginning to explore the world of electricity and electronics, it is vital to start by understanding the basics of voltage, current, and resistance. These are the three basic building blocks required to manipulate and utilize electricity. Battery Technologies. Favorited Favorite 2 Battery Options There are a multitude of different battery technologies available. There are some really great resources available for the nitty gritty details behind battery chemistries. Wikipedia is especially good and all encompassing. This tutorial focuses on the most often used batteries for embedded systems and DIY electronics. Suggested Reading. Connector Basics. Favorited Favorite 3 Introduction Connectors are used to join subsections of circuits together. Usually, a connector is used where it may be desirable to disconnect the subsections at some future time: power inputs, peripheral connections, or boards which may need to be replaced. Resistors. Favorited Favorite 4 Take a Stance, The Resist Stance Resistors - the most ubiquitous of electronic components. They are a critical piece in just about every circuit. And they play a major role in our favorite equation, Ohm’s Law. In this, our pièce de résistance, we’ll cover: Diodes. Favorited Favorite 9 Introduction Once you graduate from the simple, passive components that are resistors, capacitors, and inductors, it’s time to step on up to the wonderful world of semiconductors. One of the most widely used semiconductor components is the diode. In this tutorial we’ll cover: Polarity. Favorited Favorite 3 What is Polarity? In the realm of electronics, polarity indicates whether a circuit component is symmetric or not. A non-polarized component – a part without polarity – can be connected in any direction and still function the way it’s supposed to function. A symmetric component rarely has more than two terminals, and every terminal on the component is equivalent. You can connect a non-polarized component in any direction, and it’ll function just the same. Capacitors. Teach Kids the Basics of Capacitors with This Video. Sylvia_how_2_solder. How to Solder. Soldering is the process of using a filler material (solder) to join pieces of metal together. Soldering occurs at relatively low temperatures (around 400 degrees Fahrenheit) as compared to brazing and welding, which actually melt and fuse the materials themselves at higher temperatures. In soldering the filler material becomes liquid, coats the pieces it is brought into contact with, and is then allowed to cool. As the solder cools it hardens, and the two materials are joined. Soldering is a quick way to join many types of materials, from copper pipe to stained glass. It creates an electrically conductive strong bond between components that can be re-heated (desoldered) if you should ever want to disconnect two items joined together. For further information and some more technical specs on soldering check out the wikipedia article. As with many skills, having the right tools for the job effects the quality of the work being done. 1. 2. 3. 4. 5. How to Solder - Through-hole Soldering. Introduction Soldering is one of the most fundamental skills needed to dabble in the world of electronics. The two go together like peas and carrots. And, although it is possible to learn about and build electronics without needing to pick up a soldering iron, you’ll soon discover that a whole new world is opened with this one simple skill. We here at SparkFun believe that soldering should be a skill in everyone’s arsenal. In a world of increasing technological surroundings, we believe it is important that people everywhere be able to not only understand the technologies they use everyday but also be able to build, alter, and fix them as well. In this tutorial we will go over the basics of through-hole soldering – also known as plated through-hole soldering (PTH), discuss the tools needed, go over techniques for proper soldering, and show you where you can go from there. Suggested Reading. How to Use a Breadboard. Favorited Favorite 13 Introduction Breadboards are one of the most fundamental pieces when learning how to build circuits. What is an Arduino? Favorited Favorite 14 Introduction Arduino is an open-source platform used for building electronics projects. Arduino consists of both a physical programmable circuit board (often referred to as a microcontroller) and a piece of software, or IDE (Integrated Development Environment) that runs on your computer, used to write and upload computer code to the physical board. The Arduino platform has become quite popular with people just starting out with electronics, and for good reason. Unlike most previous programmable circuit boards, the Arduino does not need a separate piece of hardware (called a programmer) in order to load new code onto the board – you can simply use a USB cable. This is an Arduino Uno The Uno is one of the more popular boards in the Arduino family and a great choice for beginners. TheSewingDictionary.com - Your Sewing Dictionary and Glossary On the Web. Sewing with Conductive Thread. Conductive Thread Basics. Sparkfun Tutorials. New! Getting Started with LTspice. Adafruit Learning System. Electronic Components — Connect Joe Public. A Glossary of Robot Related Terms - Razor Robotics. The Language Of The Maker Movement: 38 Terms For Teachers. The Language Of The Maker Movement: 38 Terms For Teachers. A - Dictionary of Electronics Terms - Glossary of Science Terms - Electronic Circuits & Tutorials - Hobby Projects. Art Medium and Art Supplies: What They Are and How to Use Them — Art is Fun.
http://www.pearltrees.com/crolin/vocabulary-tutorials/id12092976
A new Halifax-based organization has developed a cost-effective water purification system and will be launching a pilot project in the Gambia and Kenya. Founded by 20-year-old Rachel Brouwer, The Purification Project will bring water purification systems to vulnerable Kenyan and Gambian communities living without access to safe water. When Brouwer was 11 years old, she realized not everyone in the world had access to clean drinking water after reading a sign on a hiking trip that read, “Caution, do not drink. The water source is contaminated.” “I started thinking maybe there’s a solution to this,” she says. Over the next six years, she researched ways to purify water and eventually designed and developed a fully operational water purification tool that now has the potential to change millions of lives. In 2016, Brouwer was the recipient of a prize at the Intel International Science and Engineering Fair in Phoenix for her invention. Brouwer says the project has “re-sparked out of the blue.” While studying political science at Dalhousie University, she joined a program that connected youth from the Maritimes to youth in Africa to discuss community issues in relation to sustainable development goals. Brouwer said the connections she made in the program have allowed her to take her invention to the next level. “Repeatedly members from Kenya and the Gambia brought up issues of water and food accessibility and I went into this program not even thinking about my project but after everyone kept showing photos of their wells and talking about the impact water accessibility has on their communities.” After hearing these stories, Brouwer thought that this could be an opportunity to go beyond discussing community issues and start solving them instead. “I had the privilege of presenting my work on water sanitation and purification to the group participants from Africa, and with their support, we decided to form The Purification Project.” All of the volunteers from the Gambia, Kenya and Nova Scotia are working collectively to launch the pilot project. They are all under the age of 25. “Our youngest member is 17. He is located in the Gambia. He is a very passionate individual. I’m very lucky to work with these folks.” The two-part system uses a filter and a colour indicator that are both manufactured by a 3D printer, as well as a two-litre plastic bottle, which is easily accessible in developing countries. The device enables a process called solar pasteurization. The heat from the sun kills the bacteria in the water. The small compact funnel filter improves the turbidity of the water and once the water is taken from the source and run through the filter, it goes into two-litre bottles, at which point the colour indicator is placed inside the bottle. “Once the water reaches that desired temperature, the colour in the indicator moves locations and they know that it’s safe to drink.” Hassan Hydara, one of the volunteers in the Gambia, says accessing clean drinking water is a huge issue in his home country. He believes the water purification systems will help alleviate the issues some of the rural communities are encountering. “Students will not have to miss their class because they have to struggle with a stomach-ache, diarrhea, which is mostly caused from the unclean safe water that they drink,” says Hydara. The pilot project is pending and reliant on funding. Brouwer has set up a GoFundMe campaign to raise money to manufacture and ship the product.
https://globalnews.ca/news/8934412/bedford-n-s-womans-water-purification-system-to-launch-pilot-project-in-africa/
Review reports that many pharma companies have eliminated their natural product research programs in the past decade, while from 2001 to 2008 there was a 30 percent drop in the number of natural product-based drugs undergoing clinical studies. Although the majority of drugs available today have been derived from natural products, research into nature-based pharmaceuticals has declined in recent years due to high development costs and the drug approvals process. However this trend is likely to reverse due to new approaches and technologies, according researchers from the University of Alberta. “Untapped biological resources, ‘smart screening’ methods, robotic separation with structural analysis, metabolic engineering, and synthetic biology offer exciting technologies for new natural product drug discovery,” write Jesse Li and John Vederas in Friday’s issue of the journal Science. “Advances in rapid genetic sequencing, coupled with manipulation of biosynthetic pathways, may provide a vast resource for the future discovery of pharmaceutical agents.” | | Rosy periwinkle in Madagascar. Two drugs derived from rosy periwinkle are used for treating Hodgkin’s lymphoma and childhood leukemia. Photo by Julie Larsen Maher. The authors note that a return to nature-based pharmaceuticals holds much promise: in 1990 about 80 percent of drugs were either natural products or inspired by them. “Antibiotics (e.g., penicillin, tetracycline, erythromycin), antiparasitics (e.g., avermectin), antimalarials (e.g., quinine, artemisinin), lipid control agents (e.g., lovastatin and analogs), immunosuppressants for organ transplants (e.g., cyclosporine, rapamycins) and anticancer drugs (e.g., taxol, doxorubicin) revolutionized medicine,” they write. “Although the expansion of synthetic medicinal chemistry in the 1990s caused the proportion of new drugs based on natural products to drop to ~50% (Fig. 1), 13 natural product–derived drugs were approved in the United States between 2005 and 2007, with five of them being the first members of new classes.” Related articles Tropical forest tree is source of new mosquito repellent as effective as DEET (02/05/2009) Isolongifolenone, a natural compound found in the Tauroniro tree (Humiria balsamifera) of South America, has been identified as an effective deterrent of mosquitoes and ticks, report researchers writing in the latest issue of Journal of Medical Entomology. An interview a shaman in the Amazon rainforest (07/28/2008) Deep in the Suriname rainforest, an innovative conservation group is working with indigenous tribes to protect their forest home and culture using traditional knowledge combined with cutting-edge technology. The Amazon Conservation Team (ACT) is partnering with the Trio, an Amerindian group that lives in the remote Suriname-Brazil border area of South America, to develop programs to protect their forest home from illegal gold miners and encroachment, improve village health, and strengthen cultural ties between indigenous youths and elders at a time when such cultures are disappearing even faster than rainforests. In June 2008 mongabay.com visited the community of Kwamalasamutu in Suriname to see ACT’s programs in action. During the visit, Amasina, a Trio shaman who works with ACT, answered some questions about his role as a traditional healer in the village.
https://news.mongabay.com/2009/07/research-into-drugs-derived-from-natural-products-declining/
Virginia must pass the redistricting amendment now Virginia House Speaker Eileen Filler-Corn (D-Fairfax) at the Capitol, on Feb. 26. Democrats made nonpartisan redistricting a key campaign plank. Now in power, they may not pass any reform measures because of internal party divisions. (Steve Helber/Associated Press) (Steve Helber/AP) Emmett Hanger Jr., a Republican, represents Aurora in the Virginia Senate. Suhas Subramanyam, a Democrat, represents Loudoun in the Virginia House of Delegates. John Avoli, a Republican, represents Staunton in the Virginia House of Delegates. John Bell, a Democrat, represents Loudoun in the Virginia Senate. Robert Bloxom, a Republican, represents Accomack in the Virginia House of Delegates. Carrie Coyner, a Republican, represents Chesterfield in the Virginia House of Delegates. Glenn Davis, a Republican, represents Virginia Beach in the Virginia House of Delegates. James Edmunds, a Republican, represents Halifax in the Virginia House of Delegates. Dan Helmer, a Democrat, represents Fairfax in the Virginia House of Delegates. Jennifer Kiggans, a Republican, represents Virginia Beach in the Virginia Senate. Martha Mugler, a Democrat, represents Hampton in the Virginia House of Delegates. Sam Rasoul, a Democrat, represents Roanoke in the Virginia House of Delegates. Jill Vogel, a Republican, represents Fauquier in the Virginia Senate. We are members of the Virginia Commonwealth Caucus, a bipartisan group of Virginia senators and delegates who are looking to find common ground on important issues and foster a service-focused culture in Virginia’s General Assembly. We are a diverse group of legislators from many ethnic, economic, religious and racial backgrounds who share the belief that our communities and commonwealth deserve better politics, focused on solutions, and that Virginia should rise above and set an example in a time of deep national political strife. We all believe that our current political climate is at odds with the wishes of most Virginians — and most Americans — who themselves don’t believe that any party or individual has a monopoly on good ideas. It would seem odd that the political climate of our commonwealth would fail to reflect the will of our citizens. That is until one realizes that politicians themselves have been gerrymandering political districts focused far more on reelection than providing a voice to all Virginians. AD AD That’s why we all support an independent redistricting process in which elected officials like us don’t play a role. In our communities, which span nearly the entire commonwealth, we have heard time and again that this is what most Virginians want as well. As the General Assembly comes to a close, Virginia has a historic opportunity to fundamentally move away from the partisan gerrymandering of the past. We have a chance to pass a constitutional amendment that provides strong protections for both the majority and minority parties. That amendment could then be reviewed and, we hope, approved by Virginia voters this November. Critically, the amendment would be accompanied by legislation that ensures the redistricting commission that the amendment creates has strong protections for communities of color and of different backgrounds. The commission would be required to hold its meetings in public so all citizens can have a voice in redistricting. We understand that, as with most legislation, the constitutional amendment and redistricting commission legislation are the result of many compromises, and, individually, we all have thoughts on how to make it better. But any shortcomings are significantly outweighed by the positives of the amendment and redistricting commission legislation. This legislation would ensure a diverse group of commissioners. It would establish good anti-gerrymandering criteria for drawing districts that would include preserving “communities of interest” and would ensure that members of racial and linguistic minorities are represented. It would ensure that on a statewide basis legislative districts don’t favor one party over another. AD AD While there are other proposals before the General Assembly that might address redistricting, all face the challenge that they don’t enjoy broad, bipartisan support, nor do they provide voters with the constitutional protection against legislators rolling back this reform in the future. As a result, they would be looked at skeptically by the public. The constitutional amendment and redistricting commission would establish the clearest, fairest and least political mechanism for drawing fair districts in Virginia’s 400-year legislative history. We are urging our colleagues of both parties to support it and for members of the public to let all of us know that after 400 years of Virginia politicians drawing districts to serve their own political interests, all Virginians are ready for a new way of doing business.
Ballet Iowa. Ballet Iowa unveiled one answer to that question in its season opener: Nayada and the Fisherman, a boy-meets-mermaid tale Perrot created in 1843 as Ondine, ou La Naiade. Although seldom seen today in the U.S., this ballet has been around: premiering in London with Fanny Cerrito as its star; revised in St. Petersburg with Carlotta Grisi; revived there later by Marius Petipa; reconstructed for the Bolshoi Ballet in 1985 by Piotr Gusev, who also condensed it from three acts to one; and finally restaged "after Gusev" for Ballet Iowa by artistic director Konstantin Uralsky and his wife, Irina Vassileni-Uralsky, both of whom are Bolshoi alumni. Despite all that mileage, Uralsky estimates that about 80 percent of the remaining choreography is original Perrot. How good is it? Well, it isn't Giselle--but it is a rather charming snippet of nineteenth-century style. Not much remains of the original plot. A naiad, or water nymph (Mary Ann Raub) takes a fancy to a fisherman (Peter Lisanti) and decides to sample land-bound life. She discovers her shadow (the "Pas de l'Ombre," a famous Pavlova solo) and eventually joins the dancers at a village festival. Gripping drama? Hardly--but it frames pleasantly varied choreography. The exotic Nayada is defined by a liquidly classical style, with gracefully flowing arms; her opposite number, the fisherman's village girlfriend (Elizabeth Harano), conveys down-to-earth appeal through sparkling beats and dazzling demi-caractere footwork. Another nine nineteenth-century touch is the careful scaling of supporting roles to various experience levels. Everyone--from soloists to junior corps members--gets a chance to shine, and the dancers respond exuberantly. Ballet Iowa deserves kudos for dusting off this pretty little ballet antique. However, there were signs that the ambitious program--which also included Uralsky's new Adagio and Vassileni's staging of Swan Lake Act II--was a major stretch for the company's resources. Occasional technical slip-ups were noticable (although most could be attributed to an unfamiliar, brand-new stage floor). Swan Lake was mounted very handsomely, while Nayada had no scenery at all, giving it a somewhat lost-in-space look. On the other hand, Nayada seemed more finely tuned; the Swan Lake cast, headed by Bettina Sarmiento and Andrew Parker, looked stylistically well schooled but comparatively expressionless. Adagio, a darkly abstract study of the creative process, had the opposite problem: It was ably danced by David Thompson and company new comer Nicole Choules, but its Bolshoi-sized emotionalism seemed out of scale. Still, Ballet Iowa has come a long way in its third Uralsky season. Its challenge is to extend and polish its two major assets: the Uralskys' seemingly endless supply of Soviet-derived repertoire, and its dancers' energetic willingness to tackle nearly anything.
https://www.thefreelibrary.com/Ballet+Iowa-a014657118
After working for five months as an account executive, Thomas Green was directly promoted as the Senior Market Specialist by the vice president of the company, Shannon McDonald, because of immense potential exhibited by him. However, Frank Davis, Green’s boss, did not intend to choose Green as the new senior market specialist. Green and Davis disagreed on work styles and market projections. Green believed that the sales goals set by Davis are based on “creative accounting” and he grossly overstated the existing market environment. A mood of silent conflict developed quickly between them. Davis was very unhappy about Green’s performance and working attitude even after three months of his promotion. Green was concerned that Davis was building a case to fire him. Green, after learning that Davis had sent a mail to McDonald regarding his performance, was very worried about the situation and did not know how he should explain his perspective to McDonald. In order to salvage his professional carrier, Green could either compromise by changing his work style and working in conformity with Davis’ requirements or escalate to McDonald the problems and concerns faced by him and prove his point with credible data. We recommend that Green should choose to compromise as he was appointed as senior market specialist despite being less experienced. He was also under heavy financial burden. In order to become a successful manager, he should learn to deal with this kind of situations in his professional life. Contents 1. SITUATION ANALYSIS Thomas Green, a 28 year old account executive at Dynamic Displays, was promoted to the position of Senior Market Specialist by Vice President Shannon McDonald. Green was proactive, dynamic, enthusiastic and hardworking but was inexperienced in managerial skills. His immediate boss, 45 year old Frank Davis was promoted as Marketing Director and wanted to bring in a person of his choice to the position vacated by him. However, McDonald, due to the instant bonding that she had with him and also because of the immense potential exhibited by him, promoted Green. Green and Davis had fundamentally different working styles. Green had a directorial approach whereas Davis was an analyser. Within two weeks of Green’s promotion, Davis complimented Green on his ideas, but did advise him to concentrate more on preparing for client meetings, developing significant support details for market analysis, which Green ignored. In a Budget plan meeting, Green openly challenged sales projections presented by Davis, making him visibly upset. In the monthly performance review, to Green’s surprise, Davis listed out a number of problems he had encountered with Green’s work. Davis also mentioned his perception of Green having a conservative and negative outlook to McDonald. After the performance review, Green started working independently on developing a new up selling and cross selling software to airline passengers, which won him accolades from other marketing specialists and various clients. During the course of time, Green avoided meetings with Davis and also continued allegations on Davis for deliberately holding the firm with his upbeat projections. In the next performance review, Davis alleged Green of continued deficiencies in his work and attitude. Later, Davis complained the same to McDonald in response to which she sent a short mail to Green asking for justification. Green is now under the impression that he is about to be fired by Davis. 2. PROBLEM STATEMENT What Steps should Green take in order to salvage his professional career? 3. OPTIONS 1) Compromise: Change his working style as per Davis’ requirements 2) Escalate to Shannon McDonald: Explain his perspective to McDonald 4. Criteria for Evaluation 1) Job Security 2) Job Performance 3) Work-Life balance 4) Self Esteem 5) Professional relationships 5. Evaluation of Options Compromise: Green could let go his current working style and start working in conformity with Davis’ requirements. He can try to build relations with Davis instead of challenging him. He also should not voice his concerns to his colleagues. Later on, these actions might even convince Davis to provide a little more flexibility to Green in terms of his working style. Escalate to McDonald: Green could directly raise his problems and concerns regarding Davis to McDonald. With credible data, Green could try convincing McDonald that Davis is projecting inflated figures. He should also establish that it is necessary for him to have flexibility and freedom for his way of working to succeed. But this might put Green in a very negative light and further spoil his relations with his seniors, thus, threatening his job. The following table represents evaluation of options and criteria on which they have been evaluated. Options Job Security Job performance Work-Life balance Self Esteem Professional Relationship Compromise Yes May Be Yes No Yes Escalate to McDonald May Be May Be No May Be No 6. Recommendation In view of the below mentioned reasons, we recommend the option of Compromise allowing Green to salvage his professional career. At 28, despite of having no managerial experience, Green was appointed as Senior Market specialist with a lucrative salary of $125K. He is not likely to find such an opportunity elsewhere. He is crippled by mortgage and other major expenses, hence he cannot afford to forego his position and salary which is already much higher than the industry standards. Further on, Green currently has no substantial data to prove his performance since his promotion. But he has a good rapport with McDonald, which on effort can be further improved thus aiding his future career. 7. ACTION PLAN 1. Green’s response to McDonald’s mail should be brief and should mention that Green was working hard to achieve and was experimenting with what he considered to be correct. He understands the current situation and is ready to work hard and learn. 2. In the formal meeting with McDonald and Davis, he should state his willingness to change his working style and learn from his superiors. 3. Green should patch up with Davis. 4. Green should stop raising concerns against Davis to his colleagues. 8. Contingency plan Green could get in touch with head hunters. There is a high probability that Davis has personal issues with Green. In that case, Green’s job would still be under a threat even if he changes his working style to match Davis’ requirements. He must have a job ready for him because his financial baggage is massive. As much as possible, Green should not change his job unless and until necessary.
https://blablawriting.com/thomas-green-essay
Shoes are to be a brown, navy, or black oxford or loafer with a non-skid sole. Students are not permitted to wear boots of any style, clogs, sandals, backless shoes, jellies, flip flops, or anything else that is not deemed appropriate. Sneakers may only be worn on gym days. Girls are to wear white, navy, or maroon knee-high socks or tights. Boys are to wear white, navy, brown, or black dress socks. No sport socks. Socks are to be at least two inches above the shoe/sneaker. All students may wear a navy or maroon sweater (cardigan, vest, pull-over) Girls and boys must wear belts (brown, navy, or black) with their slacks/pants or shorts. All slacks/pants/shorts must be worn at the waist. The students will wear their gym uniform to school on gym days. All jumpers/skirts may not be more than two inches above the knee Shirts must be tucked in at all times. School uniform slacks/pants are to be plain. Clothing with emblems, pictures or writing incompatible with Catholic teaching is not allowed. Regular uniform for all students must be worn from October 1st to April 30th. Summer uniform for all students may be worn from the 1st day of school to September 30th, and May 1st to the end of the year. If a student decides not to wear the summer uniform she/he must wear the regular uniform during that time. There is a uniform exchange closet. All clothing is free for the taking. Order online, in the store or by phone. Open an account for easy ordering on the Flynn O’Hara website.
https://rcspa.org/uniforms
The Midnight Library by Matt Haig brings us a story of a woman’s desperation for a life she has never had and most probably will never get, a life without regrets. After years of despair and regret concerning her current life and past decisions, she finds herself in the one place that may give her the opportunity to live the life she has always wanted: The Midnight Library. This is a place that provides the basis of the story; it is where Nora, the protagonist of the story, ends up reflecting on her life decisions. It is a mysterious place between life and death where Nora can dive into all the possibilities she could have pursued had her life not gotten so complicated. It is here that she finally has her chance to discover how her life could have gone had she made a few different choices. Throughout reading The Midnight Library, we see Nora grow and develop as a character. Once a depressed and lonely woman with not much to live for, we see her rise-up and face her inner demons. She represents a want that most people have in common to some degree which is to live without regrets. It is a universal experience that prompts us to question how our lives would have gone had we not made certain decisions that looking back, probably weren’t the best. Readers follow Nora as she lives out the fantasies and nightmares, of how her life might have gone, which makes her very relatable as many people would jump at the idea of visiting the places where their ‘what if’s’ live. Another interesting and significant aspect of Nora was that through her journey, not only did she discover different lives, but she also discovered different aspects of herself she didn’t know she had. Like what happens to the best of us at some point or another, Nora had simply lost her way and felt something in her life was missing. The story brings forward the notion that no matter how many lives you lead or how many different passions or potentials you pursue if one does not feel full and whole by themselves then no number of do-overs or different choices are going to be enough. What can be a complex message to portray was done in a very human and emotional way and that holds the reader’s full attention. A fascinating concept in the book is that life is not only made up of what we can see but is also heavily shaped and transformed by our perspective. A phrase Haig uses numerous times toward the end of the book is “it’s not what you look at that matters, it’s what you see”. This is a message that is waiting to be delivered throughout the whole book. This message comes after much struggle, but it is Nora’s struggle that makes the message even more valuable and meaningful when you do reach the make-or-break moment of the story. One of the best ways to share these messages is through storytelling, by connecting to another’s experience, whether by means of a fictional or true story, it is easier to understand these concepts. Matt Haig has often spoken publicly about his own mental health struggles and when it came to creating Nora’s character the raw and honest depiction of mental and emotional struggles was palpable. He impressively intertwines the mystical story of a purgatory library with Nora’s relatable struggles. He used the story as an uplifting way of showing how one might navigate the waters of regret and this subtly reminds us to make the best of what we have while we can. While the plot of The Midnight Library is fiction, the emotions and experiences of the characters are truthful and relatable. The life lessons imparted by Matt Haig through Nora are hard to ignore and, when implemented into our own lives, very liberating. He wonderfully tells a story of a person who is struggling to stay afloat in today’s world, a story many of us know all too well. Throughout the book, the author asks the key question: if you had a chance to undo all your regrets and live a different life with alternative outcomes, would you do it or would you accept where you are now and keep going with the life you already have? Whether you dream of being a rock star, an entrepreneur, an accountant, a teacher, a parent, or a chef, why wait until the next life to make it happen?
https://www.anfocal.ie/index.php/the-midnight-library-review-a-fiction-that-candidly-portrays-the-real-struggles-of-mental-health/
The worst has happened. You've experienced a cyberattack and have come out the other side. The incident has been contained and addressed, but it's taken a toll on your resources and revenue. And as much as you want to move on, there's plenty of work still to do. One of the most important aspects of the incident response (IR) lifecycle is post-incident activity. From root cause analysis and in-depth retrospection to charting a roadmap for remediation, post-incident activity, done right, helps to ensure not only organizational resilience but also that the experience of the incident will lead to improvements in the state of your cyber security program. The root of the problem First up is root cause analysis, which is meant to develop a full understanding of how and why an incident took place. For example, how did a phishing email reach an employee's inbox? Why wasn't it caught by the email filter? Why did the employee click on it? Was there not enough training or awareness? This analysis should include a review of what cyber security technologies worked, what failed, and what was nonexistent, ideally tracing the attacker's footprints through the organization to what we call "patient zero." It's important to determine whether and how the attackers gained enhanced privileges, such as administrative access. Also, how they moved throughout your network, and if they were able to install software and then find, and exfiltrate, data. Often, when we conduct these analyses, we map the movement using a MITRE ATT&CK framework, "a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations." When applied to existing cyber controls and technologies, this helps to determine gaps and inform the eventual remediation roadmap. Next, it's critical that you conduct an in-depth retrospection of the incident and ask specific questions: - Were the stakeholders not engaged in time? - Was there a breakdown in communication or a misalignment on next steps as discussed versus how they were actually taken? - Were any of the steps not followed? If not, why not? - Were any instances of the IR plan or procedure not working? There's also one very important question that's often overlooked: What went well? It's critical that you highlight this both for the sake of comprehensive reporting and to preserve organizational morale. An incident log can be very impactful for an effective retrospective and is also often overlooked. Ideally, there would've been a dedicated scribe tracking and logging activity during the incident. Having the information readily available for analysis helps provide a clear path forward, including to revisions of your incident response plan where appropriate, such as practicing for potential future incidents. On the road again A remediation roadmap is a comprehensive representation of the steps needed to strengthen your cyber security posture. It can vary depending on the type of attack or controls already in place. You'll want to categorize the items into buckets for people, process and technology, and each item would have a more detailed project description including priority level and budget assigned. Items should also be loosely grouped into short-term preventive measures, medium-term monitoring and low-level response, and large-scale projects that remediate normally longstanding issues, such as network and segmentation, active directory and identity issues, incomplete asset inventories, inadequate endpoint monitoring and protection and data management. Specific areas that are probably the most important to review and remediate both before and after a breach include: - Patch management and continuous vulnerability assessment. This requires an organization to have a complete asset management program and prioritize what assets and information are important to protect, which I know can be a challenge for some. - Privileged-user Access Management (PAM). Should a hacker or adversary breach your environment, gaining advanced privileges such as admin access is usually key to carrying out their attack. Having a robust PAM solution and program prevents hackers from escalating those privileges and can in some cases assist with compliance. - Network segmentation. Many companies have flat networks that have grown up over time and allow an attacker to easily move from one repository or application to another. Segmenting this kind of network into security zones with groups or assets or data in each can slow down the speed of an attack, increase overall data security and allow for easier monitoring and alerting of nefarious behavior. Segmentation can also often reduce the damage from a successful attack—or prevent it from getting through at all. - Data loss program. Data is one of your key assets, and its theft, unavailability, or integrity can be catastrophic. A full program includes not only cataloging and classifying your data for security and retention but also securing all endpoints, such as laptop and desktop computers, mobile phones and data repositories. If possible, also be sure to turn on full auditing and logging, using user behavior analytics that look for anomalies, such as huge data dumps or wholesale unauthorized encryption. Ultimately, if there's one thing no organization today can afford following a cyber incident, it's failure to complete post-incident activities. Leave no stone unturned, and no facet uncut. After all, you've already paid for the incident. Why not get the greatest possible value of it?
https://home.kpmg/ca/en/blogs/home/posts/2022/06/navigating-by-the-rearview.html
This story is about angels. Not the winged, spiritual angels that are depicted with chubby, rosy cheeks. Or the ones whose presence we may feel even when no-one is around. Or the ones we see as a formation in the clouds in the sky. For angels come in different forms. It is about those angels who walk this earth and live amongst us: the human angels. They are the strangers who enter our lives for a brief moment, gently offering a kind word, a smile of encouragement, a brief touch, or a big hug, brightening difficult days, and lessening our despair. They lift humanity and spread love. Lyndsay Bowes and Kristie Elgersma, both from Canada, met in October 2011. Part of the Anonymous movement, they were brought together in an unlikely place – on a phone line that was offering empathetic support for Occupiers around the world. They realized that they held the same beliefs and concerns about humanity, the environment, politics, and inequality and injustice in the world. With a strong belief in the goodness of people, they wanted to find a way to reconnect the human family, to build the empathy, compassion and trust that so often seems to have deserted us. ‘We decided to try to connect to people by showing compassion and love to random strangers, in the hopes of causing a “compassion tsunami”.’ Bowes explains. So they came up with a unique way to do this, and in January 2013, Op Human Angels was born. With a few friends by their side, they donned their imaginary wings and transformed themselves into human angels. ‘Once a month, we go into the streets and give free hugs. We leave inspirational messages of hope in random places like libraries, grocery stores and gas stations. And we write on roads, sidewalks and stairs with chalk,’ says Elgersma. ‘When they know that we do not represent any organization or charity, and the hugs are free – that we are just trying to put more love in the world – I see a change in their eyes,’ Bowes explains. ‘It’s an incredible feeling to constantly shock people by not wanting anything from them. Sometimes people unexpectedly join them. Bowes recalls being on a train platform when a young man in the army, after knowing what they were doing, grabbed a sign and went on the rest of the journey with them. The downtrodden, the lonely, the sick, the financially wealthy whose souls feel empty, and the poverty-stricken whose souls emit happiness – is there a person who does not need love? Just imagine a world where all of us are angels.
https://newint.org/blog/2013/12/19/human-angels-hugs
From its humble inception in 1969, the Booker Prize has slowly but surely established itself as one of the top literary prizes in the world. An author who wins the coveted prize is guaranteed fame and success. It doesn't matter how obscure you are as an author prior to your win. Win the thing and you know you've made it. In an instant, you will be the darling of the book trade. Today, the much-awaited longlist for the award this year has been announced. Looking at the list, I haven't read any of the titles. I don't even know most of the authors. I'm only familiar with the works of Margaret Atwood and Salman Rushdie. These two giants of the literary world also seem to be among the favorites to snag the award. The longlist: . The Testaments by Margaret Atwood . Night Boat to Tangier by Kevin Barry . My Sister, the Serial Killer by Oyinkan Braithwaite . Ducks, Newburyport by Lucy Ellmann . Girl, Woman, Other by Bernardine Evaristo . The Wall by John Lanchester . The Man Who Saw Everything by Deborah Levy . Lost Children Archive by Valeria Luiselli . An Orchestra of Minorities by Chigozie Obioma . Lanny by Max Porter . Quichotte by Salman Rushdie . 10 Minutes 38 Seconds in This Strange World by Elif Shafak . Frankisstein by Jeanette Winterson Interested in reading the titles in the list? I highly suggest you read first this reader's guide put together by the good folks over at The Guardian. Not familiar with the Booker Prize? In their own words, they "reward the finest in fiction, highlighting great books to readers and transforming authors’ careers". Visit their website here. | | Write your comments below:
http://www.cordilleransun.com/2019/07/the-longlist-for-2019-booker-prize.html
Collective Routes is an enquiry-driven collective committed to researching existing approaches, experimenting with new practices, and producing grounded knowledge in social change. As a collective, we bring together socially engaged practitioners in participatory research and collaborative learning across the fields of Youth Development, Social Entrepreneurship, Organizational Culture, Culture for development, and Social Policies. What We Do Research We produce knowledge and evidence, mainly through using participatory research methods with people and communities to profoundly understand their social realities. Learning We design and provide participatory learning experiences to strengthen the capacities of both individuals, organizations and communities to advance their impact towards social change. Facilitation We design and facilitate collaborative experiences to engage people in meaningful conversations to allow them to reflect and learn from their previous practices and enlighten their future ones.
https://www.collectiveroutes.org/
Homeland Security Institute Law and Legal Definition The Homeland Security Institute (“Institute”) established by the Secretary of the Homeland Security. It works with and supports other federal, state, local, tribal, public and private sector organizations that make up the homeland security enterprise. The Institute is administered as a separate entity by the Secretary of the Homeland Security. The duties of the Institute are determined by the Secretary, and may include the following: 1.To determine the vulnerabilities of the nation's critical infrastructures and the effectiveness of the systems deployed to reduce those vulnerabilities; 2.To make economic and policy analysis by assessing the distributed costs and benefits of alternative approaches to enhancing security; 3.To evaluate the effectiveness of measures deployed to enhance the security of institutions, facilities, and infrastructure that may be terrorist targets; 4.To identify common standards and protocols that could improve the interoperability and effective utilization of tools developed for field operators and first responders; 5.To assist federal agencies and departments in establishing test beds to evaluate the effectiveness of technologies under development ;and 6. To assess the appropriateness of such technologies for deployment. The Secretary of the Homeland Security effectively carries out the duties by consulting widely with representatives from private industry, institutions of higher education, nonprofit institutions, other government agencies, and federally funded research and development centers.[ 6 USCS § 192].
https://definitions.uslegal.com/h/homeland-security-institute/
The author of this wisdom is one of my favourite artists, the French painter Paul Gauguin. I have yet to discover a more brilliant one. Art has been part of life since prehistoric times and, with me, since my early childhood. I discovered the beauty and power of art, especially fine art, from a very early age. When I was at high school, I fell in love with art history, which I decided to combine with studying tourism. Thanks to work and having a family, art soon turned into an occasional hobby. Now art is firmly back in my life as a means to express myself and relax. I am constantly trying to develop a relationship with visual art and the whole field of visual culture, so I can perceive the beauty of nature and the aesthetic values in what is happening around us. As I believe that a creative outlook enriches our lives immensely, my aim is to promote creativity not only in the field of fine arts but also in my entire way of thinking. Painting is my joy, pleasure, relaxation and helps me express my feelings. I like to try new techniques, but mostly I work with acrylic paints on canvas. I don't have a favourite style, because I find “my thing" in the precision of realistic drawing and the simplicity and effectiveness of modern contemporary art. I like to be inspired by nature and symbols.
https://www.madsgallery.art/item/bcda77a0-9f6c-46e1-b708-23c474b78baf/artist/veronika-sekotov%C3%A1
A native born Texan, who has lived in El Paso most of her life. Yvonne Postelle has been a painter for most if not the entirety of her adult life. Growing up She was always one for the creative and interesting indifferent art forms. She played the Clarinet in the school band, while also being a consistent doodler. She was always drawing. As an adult, she found that painting was a way to express herself and relax. The love she has found in a paint brush is a big indescribable one. On a life changing trip to France, Yvonne had the incredible opportunity to roam around the city where Claude Monet once walked, Giverny, France. This truly blessed trip motivated and renewed a deep interest in Monet's technique and impressionism. While visiting museums, She was always drawn to the old master exhibità, especially Claude Monet. The exquisite colors and the mastery techniques made a huge impression on her. Inspiration comes from her travels abroad and through out the United States. When she sees a landscapes, and in the process of planning to paint it, there is always a sensational feeling, a moment in time. Something captivates her and stirs this feeling inside, one that tells her, she must create. Our Approach I have and always will be inspired by the world I live in. I believe that beauty is in the eye of the beholder. I see and find beauty in everything around me. I think that variety is the spice of life. In my travels I have found variety in beautiful landscapes. I document my travels and experiences by painting the sensational scenery around me. I work primarily in oil as a landscape painter. The love of art has been a constant passion as long as I can remember. Through my paintings I love to show how God and nature inspire me with vibrant and dancing colors, bringing life to the most common objects. Meet the Team Yvonne Postelle Artist Painting the world around her for 29+ years. She is exhibited regularly in both group and juried shows, served as Chairperson for El Paso Art Association, Spring show, Arts International, Providence Memorial Hospital Founder’s Hall, Providence Hospital Women’s Department, sec- ond place in Las Cruces Arts & Crafts Exhibition, Guaranteed Purchase Award, Second Place in Nat- ional League of American Pen Women, Second Place, KCOS Public TV Collection 13, Honorable Mention, First Place in Landscape category, KCOS Public TV, Sun Bowl International Art Exhibit, Past President, Secretary, Treasures of Border Branch, Nat- ional League of American Pen Women, Inc., Past Chairperson, 4 years running of State Exhibitions, Past Membership Director for El Paso Art Association. Currently being represented by Mesilla Valley Fine Arts, Inc., Mesilla, NM, Xanadu Gallery, Scottsdale, AZ, continuing to improve her skills by workshops. Next Steps... If you are interested in the art, feel free to contact us or visit our services page.
http://ypostelle.com/about/
After the first half of Season 5 spent most of its time focusing on Kevin and Kate's new babies' impending arrival, This Is Us swung the camera around to Uncle Nicky. Since the series revealed his existence in Season 3, the story has viewed him chiefly as a foil for Jack and Kevin: How did Nicky end up driving Jack to enlist in the military? Why did Jack cut him off? How will Kevin help rehabilitate him? But this week, the series gave Nicky a love story of his own. So, who is Sally on This Is Us? Warning: Spoilers for This is Us Season 5, Episode 11 follow. Nicky first mentioned Sally to Kevin and Cassidy back in Season 4, Episode 4, in "Flip A Coin." It was a typical Nicky story, in which one minor setback convinced him he was a complete failure. Kicky and Sally had been together through the war. When he returned, he'd bought an RV thinking he and Sally could hit the road together. But when he got to her house, she was gone. He took it as a sign they were not meant to be and never went back to look for her. That might seem odd, but this week's introduction to Sally helps explain his thinking. A flashback revealed a young Nicky met Sally before he was drafted; they worked together at the local animal shelter. Sally was a photographer, artist, and flower-child hippie who loved the open road and believed in signs and spirits. Her "house" was a van named Pearl, which she drove across the country until she found her way to Pittsburgh. But Nicky wasn't a free spirit like Sally. He liked the safety of the familiar. (As Jack noted, Nicky wasn't even motivated to move out of their parents' house.) When Sally suggested they drive north to an upcoming concert called Woodstock and then hit the road to California, he was unsure. He'd love to go, but it's too risky, too uncertain, too unknown. Jack pushed him to go; he even bought Nicky a suitcase. (In a nice bit of foreshadowing, Jack declared if a girl like that asked him to drive to California, he'd go without a second thought.) But in the end, Nicky failed to show, and Sally drove off alone. But if Nicky and Sally's relationship ended here, then how does his Season 4 RV story make sense? Is this a continuity error? This Is Us might make a mistake every so often, but in this case, it seems not. In a 2019 interview with Entertainment Weekly post-"Flip A Coin," executive producers Isaac Aptaker and Elizabeth Berger hinted at this episode introducing Sally. It seems like there's more story to come too, including how Nicky and Sally got back together after he was a no-show before Woodstock. (At least his impulse buy of the RV to impress her makes a lot more sense now.) Also, fans aren't about to forget that Nicky eventually gets married. Is he going to track down Sally now that he's finally made it to California? This Is Us continues Tuesdays at 9 p.m. ET on NBC.
https://www.elitedaily.com/p/who-is-sally-on-this-is-us-season-5-episode-11-explored-nickys-past-67358655
When the Second Amendment states that the right to keep and bear arms shall not be infringed, it is not speaking about firearms per se, but about the right to own and carry arms (tools) for personal protection, a natural right that exists wherever we are at any given moment in time. The Founders understood that without such a right, no other right of the people could withstand the assault of organized governmental or religious tyranny, nor the actions of individual criminals and maniacs. Firearms were available in Italy as early as the year 1515, yet, when Galileo and others were confronted by the tyranny of the Inquisition in the 1600s, the right to defend their freedoms by engaging in armed resistance against those in authority was not considered. Protecting a city from attack was accepted by the likes of Leonardo DaVinci. He often became a sniper with a telescopic rifle of his own design, shooting invaders at 300 yards as they tried to invade the City of Florence, but that was not personal defense. When humans faced the natural dangers of the African plains, or other wilderness environs, the need for weapons to protect against predator threat, be it beast or human, was understood viscerally, that is, it was felt and accepted as reality. When humans became city-dwellers, many lost touch with their natural instincts and grew complacent, expecting their protection to come from outside of themselves. Let us now venture to Africa, and the true story of a native father and son out on a hunt. The father was mauled and killed by a lion. When the lion turned its attention to the son, the 12-year-old lad, trained in proper self-defense against lion attack, did not run from the lion, he faced it. At the right moment, the lad knelt down and placed his spear into the ground at a 45-degree angle, spear-point toward the lion. When the lion leapt, it was impaled and died. Twelve-year-old children in our society would rarely have such presence of mind in such a life-and-death situation, not because they are incapable, but because we do not train our children in the art of self-defense. Most urban children are trained on how to best be prey. I must clarify here that if a child is trained in a martial art, they are rarely getting self-defense training. So-called martial arts as they exist today are more about the choreography of a dance. Self-defense is very different. In self-defense there are no rules, only what works to survive an attack by a predator, human or beast. The predator will not admire or praise your child's dancing ability; it will not care about your feelings as a loving parent. The brain of the predator is not wired for creative thought or artistic expression. The predator does not dance or empathize. The predator kills! Teaching children to fear guns and other defensive weapons instead of training them in their proper use is counter-productive to self-defense. Herding those untrained children into locked rooms will not provide them protection against human predators focused upon their demise. Door locks will not bar a criminal or a maniac. Defenseless children in locked rooms only afford predators a place to choose corralled victims. Predators must be faced with weapons at our immediate disposal, kept at bay or, if necessary, as in the case of that properly-trained African lad with a spear, predators must be destroyed. Personal safety comes from the diligent application of comprehensive self-defense, not from imagining peace. Every parent has a responsibility to provide comprehensive self-defense for themselves and their children. Comprehensive self-defense begins with personal health that first involves nutrition and proceeds to everything else. It understands that 195,000 people die each year (534 daily) through hospital and doctor error, and that 36,000 die each year (98 daily) in traffic accidents, and that those homicide rates are all related to poor training in the practical art of comprehensive self-defense. Banning hospitals, automobiles, swimming pools, weapons or anything else that can cause damage to the body will not solve the problem that ultimately resides within the arena of education and the acceptance of personal responsibility. As a parent-proxy, teachers have a responsibility to defend themselves and those within their charge; if they refuse that responsibility they are unfit to mentor children. In the face of corporate, governmental or social intransigence concerning self-defense and proper training in the responsible use of self-defense weapons, there are two important words that the responsible parent must consider: home schooling! Fox Grimaldi of Ashland teaches self-defense, nutrition, health and fitness.
http://www.dailytidings.com/apps/pbcs.dll/article?AID=/20130215/OPINION03/302150301/-1/VARSITY0204
My kids are pretty amazing. I know all parents say that about their children, but to me, my kids are my world. They get along well, but, like in all relationships, there are bound to be disagreements. It’s important to me that they learn that it’s okay to disagree with one another, but that doesn’t always mean they are right. There’s a big difference between disagreeing and still respecting someone else’s right to an opinion versus being adamant that the other person is wrong. I want them to learn that everyone has a right to an opinion, so here’s how we model it for them. Teaching Kids How to Disagree Favorite Questions With three very different and very strong-willed children, there are usually three different opinions from them about things. We play a game called “What’s Your Favorite?” The girls see it as a simple car ride question game, but it’s actually a way to demonstrate that they can have different opinions without being wrong. So, when I ask them what their favorite ice cream or vacation spot is, there are usually three different answers. There may be some advocating for a certain flavor or beach instead of mountains, but no one is usually swayed. They like what they like and they’re not afraid to tell their siblings. The simple question and answer game teaches them that they can disagree about their favorite ice cream flavors, but each opinion is valid. (And some ice cream is better than no ice cream!) Compromise Disagreements over things don’t have to lead to a sibling battle, they can lead to compromise. Teaching this is, of course, not always easy. So, we start with small things – like pizza. The conversation usually starts by asking what everyone would like on the pizza and, inevitably, there are disagreements. Since ordering one pizza for each person is out of the question, we talk about what we had on it last time and how this time we should have something different to accommodate everyone’s tastes. There’s usually one person who dislikes every other topping except her own choice, so we get half of one of the pizzas plain. It’s a good compromise and teaches the girls that it’s okay to disagree, but that just because they have a different opinion doesn’t mean they’re going to get their way. Work It Out There have been many times when the kids were arguing over a television show or what game to play outside that I’ve been tempted to step in and referee. That’s family life, right? Instead of stepping in and resolving the conflict for them though, when they come to me to have me solve their problem, I tell them to work it out. I explain that they should listen to each other with open minds, be respectful, and then come to a conclusion that they can both agree to. This obviously takes longer sometimes than others, but they always work it out – or get bored of arguing and move on to something else – despite their differences. It is Okay to Disagree Learning how to disagree and still be respectful isn’t just a skill that the girls need to learn now, it’s a skill that they’ll need to navigate the world around them for the rest of their lives. It is part of raising a positive child. I always stress that it’s absolutely okay to disagree or have a different opinion, even from an adult, but that they should express their dissent respectfully and look at the other person’s point of view with an open mind. It’s taught them a lot about conflict resolution, and it’s taught me how to be a better parent. How do you teach your kids that it’s okay to disagree? I’d love to hear your suggestions!
https://www.mynourishedhome.com/teaching-kids-disagree/
Also found in: Dictionary, Thesaurus, Wikipedia. Kwakiutl(kwä`kēo͞o'təl), group of closely related Native North Americans who inhabit N Vancouver Island and the adjacent mainland of British Columbia, Canada. They, together with the Nootka, their southern neighbors, make up the Wakashan branch of the Algonquian-Wakashan linguistic stock (see Native American languagesNative American languages, languages of the native peoples of the Western Hemisphere and their descendants. A number of the Native American languages that were spoken at the time of the European arrival in the New World in the late 15th cent. ..... Click the link for more information. ). Kwakiutl culture was typical of the Northwest Coast area (including the custom of potlatchpotlatch , ceremonial feast of the natives of the NW coast of North America, entailing the public distribution of property. The host and his relatives lavishly distributed gifts to invited guests, who were expected to accept any gifts offered with the understanding that at a ..... Click the link for more information. ). The ethnographer Franz BoasBoas, Franz , 1858–1942, German-American anthropologist, b. Minden, Germany, Ph.D. Univ. of Kiel, 1881. He joined an expedition to Baffin Island in 1883 and initiated his fieldwork with observations of the Central Eskimos. ..... Click the link for more information. produced a significant number of ethnographic studies on the Kwakiutl. Numbering c.15,000 before European contact, they are now reduced to around 4,000 and are mainly engaged in fishing and farming. Bibliography See F. Boas, Kwakiutl Ethnography, ed. by H. F. Codere (1966); R. P. Rohner and E. C. Rohner, The Kwakiutl (1970). Kwakiutl an Indian tribe in the province of British Columbia in Canada. Population, approximately 4, 500 (1967, estimate). The Kwakiutl are bilingual; they speak their own language, which belongs to the Wakashan language group, and English. At the time of the arrival of the Europeans in the 18th century, there were approximately 25, 000 Kwakiutl. They engaged primarily in fishing; private property relations were beginning to develop, and hereditary patriarchal slavery existed among them. The Kwakiutl created a distinctive culture and art. At the present time, the Kwakiutl live on reservations; most of them work in the fishing and timber industries. They are Protestants, although some of their ancient beliefs and cults have also been preserved. REFERENCESNarody Ameriki, vol. 1. Moscow, 1959. Linguistic and Cultural Affiliations of Canadian Indian Bands. Ottawa, 1967.
https://encyclopedia2.thefreedictionary.com/Kwakiutl
Gina Rodríguez-Drix Awarded American Express Emerging Leader Award for Community Impact Americans for the Arts announced today that Gina Rodríguez-Drix, Cultural Affairs Manager for the City of Providence Department of Art, Culture + Tourism, multi-genre writer, and practicing birth doula has been awarded the 2020 American Express Emerging Leader Award at Americans for the Arts’ Annual Convention and Public Art & Civic Design Conference. The award recognizes an exceptional new and/or young arts professional for their exemplary leadership, deep engagement with community, and strong commitment to advancing the arts. At the City of Providence Department of Art, Culture + Tourism Rodríguez-Drix manages the ACT Public Art program, develops cultural policy, and facilitates creative placemaking projects. Most recently she managed the planning process for the Art in City Life Plan, the City’s first master plan for public art, and currently stewards the planning process for Creative Providence 2020, the City’s second cultural plan for the creative sector. Rodríguez-Drix’s professional and creative practices are rooted in her passion for social, environmental, and reproductive justice, and a commitment to her hometown. Her work in creative placemaking has centered artists in conversations around community safety (Illuminated Trinity, funded by ArtPlace America) and has integrated artists with gardeners and food-based organizations to support a strong, vibrant, inclusive, and diverse local cultural economy and a more resilient local food system (Sowing Place, funded by Kresge FreshLo). A multi-genre writer, Rodríguez-Drix writes performance pieces to include poems, plays, prose, and fiction meant for any place where there is a community. Her first play, Ariel, was produced at Rites and Reason Theater and won a 2008 Potpourri Women of Color Playwright Award, which resulted in a production as a staged reading at the Drama Bookshop in New York City. Her play Free at Last (?) was produced at the University of Massachusetts-Dartmouth in 2013. Rodríguez-Drix’s personal narrative, Birth as Battle Cry: A Doula’s Journey from Home to Hospital was published in Black Women Birthing Justice: Black Women, Pregnancy, and Childbirth. Her creative nonfiction piece, Burial and Diaspora, was published in Out of Many: Multiplicity and Divisions in America Today in 2018. Rodríguez-Drix serves on the board of the International Charter School in Pawtucket, Rhode Island. She holds a bachelor’s degree in Africana Studies from Brown University and raises her young family in Providence. “I am pleased to recognize Gina Rodríguez-Drix for her dedicated commitment to ensuring the arts and culture in Providence continue to thrive,” said Robert L. Lynch, president and CEO of Americans for the Arts. “I applaud the entrepreneurial spirit and commitment to excellence that Gina brings to her work – she is an effective leader who understands the importance of community vision in partnership with the arts.” “Arts and culture are essential for community building and contributing to economic opportunity,” said Timothy J. McClimon, President of the American Express Foundation. I applaud Gina for her vital work to empower and support her community through the arts. We are committed to developing the next generation of social purpose leaders who continue to move the world forward.” Through its Emerging Leaders Network, Americans for the Arts works to identify and cultivate the next generation of leaders in the arts and arts education. Currently, Americans for the Arts serves a network of approximately 6,000 members in all 50 states, as well as the District of Columbia and Puerto Rico. ### Americans for the Arts is the leading nonprofit organization for advancing the arts and arts education in America. With offices in Washington, D.C. and New York City, it has a record of 60 years of service. Americans for the Arts is dedicated to representing and serving local communities and creating opportunities for every American to participate in and appreciate all forms of the arts. Additional information is available at www.AmericansForTheArts.org. About American Express’ Leadership Initiatives One of American Express’ three philanthropic platforms is Developing New Leaders for Tomorrow. Under this giving initiative, which recognizes the significance of strong leadership in the nonprofit and social purpose sectors, American Express makes grants focused on training high potential emerging leaders to tackle important issues in the 21st century. More than 125,000 emerging nonprofit and social sector leaders worldwide have benefitted from American Express leadership programs, including the American Express Leadership Academy among others. For leadership journey stories and additional resources, visit LeaderStories.org.
https://zinanewsmagazine.com/gina-rodriguez-drix-awarded-american-express-emerging-leader-award-for-community-impact/
Dirty Rice | Time to Cook! My mother-in-law Patsy is from New Orleans and she is a great cook. She can do all of the New Orleans specialties – homemade beignets, crawfish etouffee, shrimp creole, turkey and sausage gumbo, etc. She serves dirty rice as a side dish at Thanksgiving or Christmas dinner in place of stuffing or mashed potatoes. This dish is so incredibly flavorful. I sometimes serve it as our main course for dinner with a side salad. Every Mardi Gras (this year it’s on Tues., March 4th), I cook something traditional for dinner (complete with colorful bead necklaces and silly hats) so the boys will be aware of their heritage. Note: if the organ meat in the recipe grosses you out, try it without and I bet it would still be good. The original recipe calls for all organ meat, but instead, I use mostly ground beef and add just a bit of organ meat, which gives the dish a complex and rich flavor. Chicken livers and gizzards, although high in cholesterol, do offer a ton of vitamins and minerals (iron and zinc) and protein and are fine in moderation. You can ask for chicken livers and gizzards at the meat counter at Whole Foods. Recipe adapted from The New Orleans Cookbook. Add chicken gizzards and chicken livers to a small pot of boiling water and simmer for 15-20 minutes. Remove with slotted spoon and purée in blender (I use a Mini Prep Processor). Set aside only 1 tablespoon of this puréed organ meat for the recipe; discard the rest. Heat the oil in a large heavy skillet or Le Creuset and cook the ground meat until it begins to brown. Add the flour, garlic, onion, celery, and green pepper and mix well. Cook until the vegetables begin to turn soft and slightly brown. Add 1 tablespoon of puréed organ meat to the skillet along with the salt, pepper, cayenne pepper, most of the parsley, and 2 tablespoons of water. Cook over low heat for a few more minutes, adding a bit more water during cooking if necessary. Remove skillet from heat. Toss in the cooked rice and stir; serve hot. Garnish with a bit of parsley. Combine all the ingredients in a heavy 3-quart saucepan with a tight-fitting cover and bring to a boil over high heat. Stir once with a fork, then cover tightly and reduce the heat to very low. Cook covered for exactly 15 minutes. Do not lift the cover during cooking. Remove the pan from the heat, uncover, and fluff the rice gently with a fork. Note: the rice will keep warm enough for serving second helpings if you use a heavy saucepan and keep it covered after serving. Another way to keep the extra rice warm is to put the covered saucepan in a pre-heated 175 degree oven. Do not keep it warm for more than 25 minutes.
https://timetocookblog.com/2014/02/23/dirty-rice/
The following Q & A is an excerpt from an interview with Jeff Lineberger, P. E., Principal Engineer, Lineberger Consulting Engineers, Inc. Mr. Lineberger has 30 years engineering experience both domestically and internationally. Mr. Lineberger practices civil/structural engineering throughout Texas, and testifies as an expert in both the Federal and Texas court systems. Q. Is there a standard in Texas for evaluating residential foundations? A. Technically, no. However, in May 2009, the American Society of Civil Engineers (ASCE) adopted the “Guidelines for the Evaluation and Repair of Residential Foundations” version 2”. It is widely accepted by most practicing professionals as the “de facto” standard for evaluating residential foundation systems. Q. What do mean by “de facto”? A. To date, a method for evaluating residential foundations that combines the various civil, geotechnical, and structural evaluation aspects of residential foundation systems into one concise document geared for Texas soils has not been authored. With its wide acceptance and ongoing use by most professionals, the “Guidelines for the Evaluation and Repair of Residential Foundations” version 2” thus becomes an accepted structural inspection standard in Texas. Q. Why was there a need to establish a standard for inspecting residential foundation systems? A. The need grew out of the response of many Section members to the Policy Advisory issued by the Texas Board of Professional Engineers (TBPE) in 1998. Q. What did the Policy Advisory address? A. Residential foundation engineering. Many ASCE practitioners expressed the opinion that technical guidelines should more rightly be created by a technical society such as ASCE rather than by the TBPE. One goal of the guidelines has been to provide the TBPE with guidance in their evaluation of complaints brought against engineers practicing residential foundation engineering. Q. Who wrote the guidelines? A. Experienced engineers. Civil, structural, forensic, and other types of engineers. Several of theses engineers testified as experts in the Texas courts. Q. How were the guidelines put together? A. One committee and two subcommittees were formed to address the raised concerns. One subcommittee addressed “Recommended Practice for the Design of Residential Foundations”, and the other worked to develop “The Guidelines for the Evaluation and Repair of Residential Foundations”. The Residential Foundation Oversight (“Oversight”) Committee provided review guidance to the two previously mentioned subcommittees. Q. Were the committee members licensed engineers? A. Yes. The Oversight Committee and both subcommittees were composed entirely of ASCE members who were licensed engineers. Subcommittee membership was open to any Texas Section member who wished to participate. The dollar value of the professional services donated to the effort is conservatively estimated to exceed $1,000,000. Q. Are the Guidelines mandatory or optional ? A. The Guidelines are not intended to be Standards, but are guidelines only, reflecting the engineering opinions and practices of the committee members. They in no way replace the basic need for good engineering judgment based on appropriate education, experience, wisdom, and ethics in any particular engineering application. Thus, they are primarily suited as an aid for and use by engineers. Q. What type of engineer can perform a residential foundation evaluation?
https://austintxstructural.com/structural-inspection-continuing-education-series-does-a-standard-exist-in-texas-for-residential-foundation-structural-inspections/
TECHNICAL FIELD BACKGROUND SUMMARY OF EXAMPLE EMBODIMENTS DETAILED DESCRIPTION This invention relates generally to financial services and more specifically to providing a customer profile view of consolidated customer attributes. Banks, financial institutions, and other businesses use customer data for monitoring, marketing, or other similar purposes. Currently, the customer data is stored in various formats across multiple systems. Storing the customer data in multiple systems often results in data redundancies and inconsistencies. In addition, accessing the customer data from multiple sources may require using a combination of custom and ad-hoc lookup mechanisms that may be inconsistent from one source to the next. In accordance with the present invention, disadvantages and problems associated with accessing customer data from multiple sources may be reduced or eliminated. According to one embodiment of the present invention, a system receives a request to generate a customer profile comprising a plurality of customer attributes for a customer. The system determines a first record comprising a plurality of first record attributes associated with the customer by correlating at least one first record attribute to a customer identifier indicated by the request. A new customer profile is created in response to the request if no matched customer profile is found. The system communicates one or more of the consolidated customer attributes in response to the request. Certain embodiments of the invention may provide one or more technical advantages. A technical advantage of one embodiment is reconciling a large number of customer records from multiple sources into a centralized customer repository for customers by consolidating record attributes of customer records as consolidated customer attributes of a customer profile. Providing a consolidated view of customer data in a standard presentation layer removes data inconsistencies and redundancies. Another technical advantage of an embodiment includes enriching and consolidating additional customer data into the customer profile, such as the customer's risk rating, account information, transaction data and history, and/or networks, for monitoring, marketing, or other similar purposes. Yet another technical advantage of an embodiment is communicating, as one of the consolidated customer attributes of the customer profile, a jurisdiction in which an account associated with the customer is domiciled. Providing the relevant jurisdiction of the account benefits investigative teams and/or systems if the customer is flagged for suspicious transactions. Certain embodiments of the invention may include none, some, or all of the above technical advantages. One or more other technical advantages may be readily apparent to one skilled in the art from the figures, descriptions, and claims included herein. FIGS. 1 through 4 Embodiments of the present invention and its advantages are best understood by referring to of the drawings, like numerals being used for like and corresponding parts of the various drawings. FIGS. 1 through 4 Banks, financial institutions, and other businesses use customer data for monitoring, marketing, or other similar purposes. Currently, the customer data is stored in various formats across multiple systems. Storing the customer data in multiple systems often results in data redundancies and inconsistencies. In addition, accessing the customer data from multiple sources may require using a combination of custom and ad-hoc look up mechanisms that may be inconsistent from one source to the next. The teachings of this disclosure recognize that it would be desirable to consolidate customer data from multiple sources into a centralized customer repository for customers. below illustrate a system and method of providing a consolidated view of customer data in a standard presentation layer. FIG. 1 100 100 110 115 125 135 140 110 115 125 120 110 195 illustrates a system according to certain embodiments. System may include an enterprise , one or more clients , a network storage device , one or more users , and one or more servers . Enterprise , clients , and network storage device may be communicatively coupled by a network . Enterprise is generally operable to provide one or more consolidated customer attributes , as described below. 140 195 135 135 190 166 166 166 164 164 110 166 164 166 164 164 a b In general, one or more servers may provide consolidated customer attributes to users . User may first provide a request to generate a customer profile for a customer associated with a customer identifier. Customer profile may comprise any information associated with the customer that may be stored in one or more related files in one or more databases. For example, customer information may include data for the customer's personal accounts, business accounts, or both. In some embodiments, customer information may include data associated with members of the customer's household, such as the customer's spouse, children, and/or parents. Customer information in customer profile may be determined from one or more customer records . In some embodiments, customer record may refer to customer information that a particular department, line of business, or other group within enterprise associates with the customer. Customer profile may include customer information consolidated from multiple customer records . For example, a bank may maintain a customer profile that includes checking account information consolidated from a first record that a checking department associates with the customer and mortgage information consolidated from a second record that a home loan department associates with the customer. 166 195 195 166 164 164 195 166 195 166 Thus, customer profile may refer to a centralized view of a spectrum of consolidated customer attributes . A consolidated customer attribute is a customer attribute that has been added to or updated in customer profile based on a record attribute of a customer record . For example, a record attribute of customer record may be added as a new or updated consolidated customer attribute of customer profile . Examples of consolidated customer attributes in customer profile may include customer identifiers (e.g., a name, social security number, account number, driver's license number, date of birth, address, or party identifier), customer demographics (e.g., age, customer type (e.g., individual, large business, or small business), and/or one or more phone numbers, e-mail addresses, or street addresses), customer account information (e.g., account status, open date, close date, jurisdiction in which the account is domiciled, or account classifications), customer finances (e.g., personal income, fund sources, or assets), customer transactional behavior (e.g., monthly cash deposits, withdrawals, etc.), risk rating (based on financial crimes, corruption, and economic sanctions compliance information), customer networks (e.g., customer relationships, related party identifiers, household members, company affiliations, etc.), and/or instructions for party consolidation configuration (e.g., instructions for how to consolidate the customer in downstream systems). 140 166 164 140 164 195 166 190 140 190 140 166 164 In general, server correlates customer profile with customer record using one or more record attributes. In some embodiments, server then consolidates other record attributes of customer record as one or more consolidated customer attributes of customer profile . For example, in response to receiving request , server may determine that request indicates a customer identifier associated with the customer. Server may use the customer identifier to correlate customer profile with customer record . Examples of the customer identifier include a name, social security number, account number (e.g., a credit card account, home loan account, or checking account), driver's license number, date of birth, address, or unique party identifier (e.g., global ID across multiple accounts, like checking, savings, and loan). In some embodiments, customer identifiers may include a related party identifier associated with members of the customer's household, such as the customer's spouse, children, and/or parents. 140 166 164 164 In some embodiments, server generates customer profile for the customer associated with the customer identifier and determines one or more customer records that one or more sources associate with the customer. Examples of sources include financial institutions, data bureaus, and/or third party vendors. Customer record may comprise one or more record attributes associated with the customer. Record attributes may include customer identifiers (e.g., a name, social security number, account number, driver's license number, date of birth, address, or party identifier), customer demographics (e.g., age, customer type (e.g., individual, large business, or small business), and/or one or more phone numbers, e-mail addresses, or street addresses), customer account information (e.g., account status, open date, close date, jurisdiction in which the account is domiciled, or account classifications), customer finances (e.g., personal income, fund sources, or assets), customer transactional behavior (e.g., monthly cash deposits, withdrawals, etc.), risk rating (based on financial crimes, corruption, and economic sanctions compliance information), and/or networks (e.g., customer relationships, related party identifiers, household members, company affiliations, etc.). For example, a record attribute may be an identifier associated with members of the customer's household, such as a name or account number of the customer's spouse, children, and/or parents. 140 164 195 166 166 166 166 In some embodiments, server may consolidate one or more record attributes of customer record as one or more consolidated customer attributes of customer profile . Consolidating record attributes can include adding attributes to customer profile , updating attributes and removing duplicate attributes included in customer profile , and/or reconciling inconsistencies in customer profile (e.g., if different sources list different home addresses, consolidate the record attribute that was updated most recently). 140 164 195 195 135 115 115 135 140 115 100 115 185 135 100 115 135 135 115 140 195 135 164 In general, server consolidates record attributes of customer record as one or more consolidated customer attributes and communicates one or more consolidated customer attributes to user utilizing client . Client may refer to any device that enables user to interact with server . In some embodiments, client may include a computer, workstation, telephone, Internet browser, electronic notebook, Personal Digital Assistant (PDA), pager, or any other suitable device (wireless, wireline, or otherwise), component, or element capable of receiving, processing, storing, and/or communicating information with other components of system . Client may also comprise any suitable user interface such as a display , microphone, keyboard, or any other appropriate terminal equipment usable by user . It will be understood that system may comprise any number and combination of clients or users . User may utilize client to interact with server to receive consolidated customer attributes . In some embodiments, user may be an employee of a financial institution analyzing customer information associated with one or more customer records . 115 180 180 135 180 135 190 195 180 185 135 180 180 180 185 180 In some embodiments, client may include a graphical user interface (GUI) . GUI is generally operable to tailor and filter data presented to user . GUI may provide user with an efficient and user-friendly presentation of request and/or consolidated customer attributes . GUI may comprise a plurality of displays having interactive fields, pull-down lists, and buttons operated by user . GUI may include multiple levels of abstraction including groupings and boundaries. It should be understood that the term GUI may be used in the singular or in the plural to describe one or more GUIs and each of the displays of a particular GUI . 125 164 166 125 120 125 125 140 In the illustrated embodiment, network storage device stores customer records and customer profiles . Network storage device may refer to any suitable device communicatively coupled to network and capable of storing and facilitating retrieval of data and/or instructions. Examples of network storage device include computer memory (for example, Random Access Memory (RAM) or Read Only Memory (ROM)), removable storage media (for example, a Compact Disk (CD) or a Digital Video Disk (DVD)), database and/or network storage (for example, a server), and/or any other volatile or non-volatile, non-transitory computer-readable memory devices that store one or more files, lists, tables, or other arrangements of information. Network storage device may store any data and/or instructions utilized by server . 115 140 100 120 120 120 Clients , servers , and other components of system may be communicatively coupled by network . In certain embodiments, network may refer to any interconnecting system capable of transmitting audio, video, signals, data, messages or any combination of the preceding. Network may include all or a portion of a public switched telephone network (PSTN), a public or private data network, a local area network (LAN), a metropolitan area network (MAN), a wide area network (WAN), a local, regional, or global communication or computer network such as the Internet, a wireline or wireless network, an enterprise intranet, or any other suitable communication link, including combinations thereof. 110 140 145 150 140 140 140 140 In some embodiments, enterprise may refer to a financial institution such as a bank and may include one or more servers , an administrator workstation , and an administrator . In some embodiments, server may refer to any suitable combination of hardware and/or software implemented in one or more modules to process data and provide the described functions and operations. In some embodiments, the functions and operations described herein may be performed by a pool of servers . In some embodiments, server may include, for example, a mainframe, server, host computer, workstation, web server, file server, a personal computer such as a laptop, or any other suitable device operable to process data. In some embodiments, server may execute any suitable operating system such as IBM's zSeries/Operating System (z/OS), MS-DOS, PC-DOS, MAC-OS, WINDOWS, UNIX, OpenVMS, or any other appropriate operating systems, including future operating systems. 140 164 195 166 195 135 140 155 160 165 170 175 160 160 160 140 160 140 160 100 FIG. 1 In general, server correlates one or more record attributes associated with customer record , consolidates the one or more attributes as one or more consolidated customer attributes of customer profile , and then communicates one or more consolidated customer attributes to users . In some embodiments, server may include a processor , server memory , an interface , an input , and an output . Server memory may refer to any suitable device capable of storing and facilitating retrieval of data and/or instructions. Examples of server memory include computer memory (for example, RAM or ROM), mass storage media (for example, a hard disk), removable storage media (for example, a CD or a DVD), database and/or network storage (for example, a server), and/or any other volatile or non-volatile, non-transitory computer-readable memory devices that store one or more files, lists, tables, or other arrangements of information. Although illustrates server memory as internal to server , it should be understood that server memory may be internal or external to server , depending on particular implementations. Also, server memory may be separate from or integral to other memory devices to achieve any suitable arrangement of memory devices for use in system . 160 162 164 166 162 162 195 195 166 195 135 Server memory is generally operable to store an application , customer records , and customer profiles . Application generally refers to logic, rules, algorithms, code, tables, and/or other suitable instructions for performing the described functions and operations. In some embodiments, application facilitates correlating one or more record attributes to the customer identifier and/or to one or more consolidated customer attributes , consolidating the one or more attributes as one or more consolidated customer attributes of customer profile , and communicating consolidated customer attributes to users . 160 155 155 162 160 195 155 140 155 Server memory communicatively couples to processor . Processor is generally operable to execute application stored in server memory to generate and communicate consolidated customer attributes according to the disclosure. Processor may comprise any suitable combination of hardware and software implemented in one or more modules to execute instructions and manipulate data to perform the described functions for servers . In some embodiments, processor may include, for example, one or more computers, one or more central processing units (CPUs), one or more microprocessors, one or more applications, and/or other logic. 165 155 140 140 165 120 140 165 115 125 165 115 125 165 165 190 135 195 115 In some embodiments, communication interface (I/F) is communicatively coupled to processor and may refer to any suitable device operable to receive input for server , send output from server , perform suitable processing of the input or output or both, communicate to other devices, or any combination of the preceding. Communication interface may include appropriate hardware (e.g., modem, network interface card, etc.) and software, including protocol conversion and data processing capabilities, to communicate through network or another communication system, which allows server to communicate to other devices. Communication interface may include any suitable software operable to access data from various devices such as clients and/or network storage device . Communication interface may also include any suitable software operable to transmit data to various devices such as clients and/or network storage device . Communication interface may include one or more ports, conversion software, or both. In general, communication interface receives request from user and transmits consolidated customer attributes to client . 170 170 175 175 In some embodiments, input device may refer to any suitable device operable to input, select, and/or manipulate various data and information. Input device may include, for example, a keyboard, mouse, graphics tablet, joystick, light pen, microphone, scanner, or other suitable input device. Output device may refer to any suitable device operable for displaying information to a user. Output device may include, for example, a video display, a printer, a plotter, or other suitable output device. 150 140 145 145 140 150 145 140 160 125 150 164 195 166 In general, administrator may interact with server using administrator workstation . In some embodiments, administrator workstation may be communicatively coupled to server and may refer to any suitable computing system, workstation, personal computer such as a laptop, or any other device operable to process data. In certain embodiments, administrator may utilize administrator workstation to manage server and any of the data stored in server memory and/or network storage device . For example, administrator may manually force consolidating customer record as one or more consolidated customer attributes of customer profile . 162 155 164 195 166 195 135 195 162 190 135 190 195 In operation, application , upon execution by processor , facilitates associating one or more record attributes of customer record with the customer, consolidating the one or more attributes as one or more consolidated customer attributes of customer profile , and communicating consolidated customer attributes to users . To provide consolidated customer attributes , application may first receive request from user . Request may indicate one or more customer identifiers indicating the customer for whom consolidated customer attributes are being requested. Examples of customer identifiers include customer name, social security number, date of birth, unique party identifier (e.g., a unique identifier assigned by the enterprise to identify all the accounts associated with the customer), account number, and so on. 162 166 190 166 166 164 162 166 166 In some embodiments, application may generate customer profile for the customer associated with the customer identifier in response to request . Generating customer profile can refer to creating a new customer profile (e.g., if no existing customer profile associated with the customer is found) or updating an existing customer profile. Customer profile may comprise any information associated with the customer that may be stored in one or more customer records in one or more databases. For example, customer information may include data for the customer's personal accounts, business accounts, or both. Customer information may also include data associated with members of the customer's household, such as the customer's spouse, children, and/or parents. In some embodiments, application may generate a unique party identifier and associate the party identifier with customer profile . The party identifier may refer to a unique identifier assigned by the financial institution to identify the customer information and accounts that are to be included in customer profile . For example, the party identifier may be used to identify all of the accounts associated with the customer. 162 190 162 164 164 190 190 a a Once application receives request , application may determine a first customer record that a first source associates with the customer, first customer record comprising a first set of record attributes, by correlating at least one of the first record attributes to the customer identifier indicated in request . For example, if the customer identifier in request is a checking account number and the first source is a checking department of a financial institution associated with the checking account, the checking account number may be used to determine that the checking department's record is associated with the customer. 162 195 166 162 166 In some embodiments, application may consolidate one or more first record attributes as one or more consolidated customer attributes of customer profile . For example, if a checking account record determined to be associated with the customer based on a checking account number comprises additional record attributes (e.g., a party identifier, credit card account information, and/or contact information), application may consolidate the checking account information, party identifier, credit card account information, and/or contact information into customer profile . 195 162 164 164 195 190 190 190 195 166 166 162 164 195 166 b b b In response to consolidating one or more of the first record attributes as one or more consolidated customer attributes , application may determine a second customer record that a second source associates with the customer, second customer record comprising a second set of record attributes, by correlating at least one of the second record attributes to one of the consolidated customer attributes that is different from the customer identifier indicated by request . For example, the customer identifier in request may be a checking account number, the second source may be a mortgage department of a financial institution, and the mortgage department's record associated with the customer may not include the checking account number as a record attribute. While the mortgage department's record cannot be associated with the customer using the original customer identifier (checking account number from request ), the mortgage department's record can be associated with the customer if an attribute included in the mortgage department's record identifying the customer is also a consolidated customer attribute of customer profile . Referring to the above example, if the mortgage department's record includes the party identifier, credit card account information, and/or contact information now included in customer profile , the mortgage department's record can be associated with the customer by using the party identifier, credit card account information, and/or contact information. Application may then consolidate one or more second record attributes of customer record as one or more consolidated customer attributes of customer profile . 162 195 162 195 162 195 190 In some embodiments, application may use one or more consolidated customer attributes to associate a related party with the customer. The related party can be the customer itself, a member of the customer's household, or another related party. In certain embodiments, application may consolidate the related party as one or more consolidated customer attributes . Application may then communicate consolidated customer attributes in response to request . 162 195 195 195 166 162 166 166 195 162 195 140 195 135 115 Application communicates consolidated customer attributes in any suitable format. In some embodiments, consolidated customer attributes can have a standardized format comprising standardized fields. For example, if a customer is an individual, the standardized fields may include a household ID. But if the customer is a business, the standardized fields would not include a household ID. Consolidated customer attributes may also be communicated according to one or more categories associated with customer profile . For example, application may determine one or more categories associated with customer profile , the one or more categories comprising a customer identifier category (e.g., identifiers that identify the customer associated with customer profile ), demographic category (e.g. customer contact information, age, or type), account information category (e.g., customer to account relationships, account level information, or methods for classifying an account), network category (customer relationships such as related party identifiers, household members, or company affiliations), financial category (e.g., personal income, source of funds, or assets), risk category (associated with financial crimes, corruption, and economic sanctions compliance information), party consolidation configuration category (instructions for how to consolidate customer data in downstream systems) and/or customer transaction data category (e.g., customer transaction behavior or history). For each consolidated customer attribute , application may consolidate the attribute in the relevant category. Moreover, consolidated customer attributes may be communicated to a display or other user interface, or it can be communicated to downstream systems. For example, one or more servers may provide consolidated customer attributes to user by utilizing client . 162 166 135 195 162 195 162 195 135 166 195 166 162 166 In some embodiments, application may communicate a risk indicator associated with customer profile to user if consolidated customer attributes present a potential risk. For example, application may process consolidated customer attributes according to a risk-determination rule to determine a risk level. If the risk level exceeds a pre-determined threshold, the risk indicator may be communicated. An example of a risk-determination rule may be to determine whether the customer has accrued a certain number of potentially suspicious transactions or irregular activities, such as cash structuring transactions or large cash deposits, or any combination thereof. Any suitable risk indicator may be used. For example, the data that caused the risk to be generated may be highlighted or a text description of the risk may be provided. In some embodiments, application may communicate a risk score, such as a score based on a formula that includes consolidated customer attributes as inputs, that may be used by user to evaluate the risk. The score may be calculated at a line of business level, an enterprise level, and/or other suitable level. Further, the risk indicator may be associated with customer profile and/or consolidated as a consolidated customer attribute of customer profile . Application may also associate the risk indicator with the risk category of customer profile . 162 195 166 135 In some embodiments, application may communicate, as one of the consolidated customer attributes of customer profile , a jurisdiction in which an account associated with the customer is domiciled. An advantage of this embodiment would be providing user with the relevant jurisdiction for investigative teams and/or systems if the customer is flagged for suspicious transactions. FIG. 2 166 160 166 160 166 166 166 125 166 164 160 164 164 125 160 a n a n illustrates an example of customer profile stored in a database of server memory . Customer profiles stored in server memory may include multiple customer profiles , such as one or more of customer profiles to of network storage device . Customer profile may also include any information associated with a customer that may be stored in one or more customer records in one or more databases of server memory and/or one or more of customer record to of network storage device . For example, customer information may include data for the customer's personal accounts, business accounts, or both. Customer information may also include data associated with members of the customer's household, such as the customer's spouse, children, and/or parents. Server memory may store the data in any suitable format. 166 195 195 164 164 164 125 195 200 200 200 200 200 200 200 200 200 200 210 210 210 210 220 220 220 230 230 230 230 240 240 240 250 260 260 260 a n a b c d e f g h i a b c a n a b c a b a b Customer profile may refer to a centralized view of a spectrum of consolidated customer attributes . The one or more consolidated customer attributes may include multiple record attributes of customer records , such as one or more record attributes of customer records to of network storage device . Examples of consolidated customer attributes include one or more customer identifiers (e.g., a name , social security number , driver's license number , date of birth , party identifier , credit card account number , home loan account number , checking account number , or address ), customer demographics (e.g., age , customer type (e.g., individual, large business, or small business), or contact information ), customer account information (e.g., information associated with accounts to indicating account status, open date, close date, jurisdiction in which the account is domiciled, account classifications, etc.), customer finances (e.g., personal income , fund sources , assets , etc.), customer transaction data (e.g., monthly cash deposits , withdrawals , etc.), risk rating (based on financial crimes, corruption, and economic sanctions compliance information), and/or networks (e.g., related party identifiers such as spouse first and last name , child social security number , etc.). 166 240 195 Although certain examples have been used to illustrate customer profile , any suitable customer information may be used. For example, customer transaction data may also include one or more transaction dates (the date a transaction occurred), transaction types (e.g., deposit, withdrawal, transfer, etc.), detailed descriptions of transactions, and/or flags for suspicious transactions (warnings for transactions such as cash structuring, high-amount cash deposits inconsistent with the customer's transaction history or income, foreign wire transactions, etc.). In some embodiments, consolidated customer attributes may also include instructions for party consolidation configuration (e.g., instructions for how to consolidate the customer in downstream systems). 195 166 166 200 166 210 220 230 240 250 260 166 FIG. 2 In some embodiments, the database stores the data in a format that allows consolidated customer attributes to be presented according to one or more categories associated with customer profile . As an example, illustrates a customer profile comprising a customer identifier category (e.g., identifiers that identify the customer associated with customer profile ), demographic category (general information about the customer such as contact information, age, or type), account information category (e.g., relationship category indicating customer to account relationships, account level information, methods for classifying an account, etc.), financial category (e.g., personal income, source of funds, or assets), transaction data category (e.g., customer transaction behavior or history), risk category (associated with financial crimes, corruption, and economic sanctions compliance information), and/or network category (e.g., customer relationships, related party identifiers, household members, company affiliations, etc.). In some embodiments, customer profile may comprise a party consolidation configuration category (e.g., instructions for how to consolidate customer data downstream). Moreover, the database may present a high-level view with hyperlinks to allow for drilling down into the details of a particular category. FIG. 3 195 135 302 190 166 135 190 illustrates a flowchart for communicating consolidated customer attributes to users . The method begins at step by receiving request to generate customer profile from user . In some embodiments, request may be initiated by a user via a website, such as a password-protected or other secure website. The website prompts the user to lookup a customer using any suitable search criteria. Examples of search criteria may include name, contact information, account number, social security number, or party identifier. 304 190 195 190 190 At step , the method determines one or more customer identifiers indicated in request , the one or more customer identifiers identifying the customer for whom consolidated customer attributes are being requested. As an example, the method may select the name, social security number, account number, driver's license number, date of birth, address, party identifier, or another criterion from request as the customer identifier. Alternatively, the method may map one or more criterion from request to a customer identifier, such as a unique party identifier assigned by the enterprise. 306 166 166 166 164 The method proceeds to step to generate customer profile for the customer associated with the customer identifier. Generating customer profile can refer to creating a new customer profile (e.g., if no existing customer profile associated with the customer is found) or updating an existing customer profile. Customer profile may comprise any information associated with the customer that may be stored in one or more customer records . For example, customer information may include data for the customer's personal accounts, business accounts, or both. In some embodiments, customer information may include data associated with members of the customer's household, such as the customer's spouse, children, and/or parents. 166 195 195 166 164 164 195 166 195 166 Customer information in customer profile may refer to consolidated customer attributes . Consolidated customer attribute is a customer attribute that has been added to or updated in customer profile based on a record attribute of customer record . For example, a record attribute of customer record may be added as a new or updated consolidated customer attribute of customer profile . Examples of consolidated customer attributes in customer profile may include customer identifiers (e.g., a name, social security number, account number, driver's license number, date of birth, address, or party identifier), customer demographics (e.g., age, customer type (e.g., individual, large business, or small business), and/or one or more phone numbers, e-mail addresses, or street addresses), customer account information (e.g., account status, open date, close date, jurisdiction in which the account is domiciled, or account classifications), customer finances (e.g., personal income, fund sources, or assets), customer transactional behavior (e.g., monthly cash deposits, withdrawals, etc.), risk rating (based on financial crimes, corruption, and economic sanctions compliance information), customer networks (e.g., customer relationships, related party identifiers, household members, company affiliations, etc.), and/or instructions for party consolidation configuration (e.g., instructions for how to consolidate the customer in downstream systems). 308 166 166 310 In some embodiments, the method may generate a unique party identifier at step . The party identifier may refer to a unique identifier assigned by the financial institution to identify the customer data and accounts that are to be included in customer profile . For example, the party identifier may be used to identify all of the accounts associated with the customer. The method may then associate the party identifier with customer profile at step . 312 164 190 164 190 a a At step , the method determines a first customer record that a first source associates with the customer by correlating the customer identifier indicated in request to a record attribute of first customer record . For example, if the customer identifier in request is a checking account number and the first source is a checking department of a financial institution associated with the checking account, the checking account number may be used to determine that the checking department's record is associated with the customer. 164 195 166 314 166 166 166 166 One or more record attributes of customer record may be consolidated as one or more consolidated customer attributes of customer profile at step . Consolidating record attributes can include adding attributes to customer profile , updating attributes and removing duplicate attributes included in customer profile , and/or reconciling inconsistencies in customer profile (e.g., if different sources list different home addresses, consolidate the record attribute that was updated most recently). As an example, if a checking account record determined to be associated with the customer based on a checking account number comprises additional record attributes (e.g., a party identifier, credit card account information, and/or contact information), the method may consolidate the checking account information, party identifier, credit card account information, and/or contact information in customer profile . 316 164 195 164 164 190 190 190 195 166 166 b b b In the illustrated embodiment, the method proceeds to step to determine a second customer record that a second source associates with the customer by correlating one of the consolidated customer attributes to a record attribute of second record . The record attribute that is used to correlate second record is different from the customer identifier indicated by request . For example, the customer identifier in request may be a checking account number, the second source may be a mortgage department of a financial institution, and the mortgage department's record associated with the customer may not include the checking account number as a record attribute. While the mortgage department's record cannot be associated with the customer using the original customer identifier (checking account number from request ), the mortgage department's record can be associated with the customer if an attribute included in the mortgage department's record identifying the customer is also a consolidated customer attribute of customer profile . Referring to the above example, if the mortgage department's record included the party identifier, credit card account information, and/or contact information now included in customer profile , the mortgage department's record can be associated with the customer by using the party identifier, credit card account information, and/or contact information. 318 164 195 166 195 b At step , the method may consolidate one or more second record attributes of customer record as one or more consolidated customer attributes of customer profile . For example, in addition to the above attributes of the mortgage department's record, the mortgage department's record may also comprise a mortgage account number, mortgage account information, the customer's assets and fund sources, customer type, and so on. The method may consolidate one or more of the mortgage department's additional record attributes (e.g., the mortgage account number, mortgage account information, the customer's assets and fund sources, customer type, etc.) as one or more consolidated customer attributes . 195 195 In some embodiments, the method may use one or more of the consolidated customer attributes to associate a related party and/or related party record with the customer. The related party can be the customer itself, a member of the customer's household, or another related party. In certain embodiments, the method may consolidate the related party and/or related party record as one or more consolidated customer attributes . 320 195 195 135 At step , the method may process consolidated customer attributes according to a risk-determination rule. An example of a risk-determination rule may be to determine whether the customer has accrued a certain number of potentially suspicious transactions or irregular activities, such as cash structuring transactions or large cash deposits, or any combination thereof. In some embodiments, the method may determine a risk score, such as a score based on a formula that includes consolidated customer attributes as inputs, that may be used by user to evaluate the risk. The score may be calculated at a line of business level, an enterprise level, and/or other suitable level. 322 326 166 324 195 195 166 At step , the method compares the calculated risk level to a pre-determined risk level. The pre-determined risk level indicates whether the risk is considered to be potentially problematic. Accordingly, if the calculated risk level is less than the pre-determined risk level, the method proceeds directly to step . Alternatively, if the calculated risk level is greater than or equal to the pre-determined risk level, the method associates a risk indicator with customer profile and communicates the risk indicator indicating the risk level at step . Any suitable risk indicator may be used. For example, consolidated customer attributes associated with the risk may be highlighted. As another example, a description of the risk may be generated, such as a text description or a numeric risk score. In some embodiments, the risk indicator may be consolidated as a consolidated customer attribute of customer profile . 195 190 326 195 195 195 190 FIG. 2 The method communicates one or more consolidated customer attributes in response to request at step . Consolidated customer attributes may be communicated in any suitable format, including the standardized format comprised of standardized fields and/or categories described with reference to . For example, if a customer is an individual, the standardized fields may include a household identifier. But if the customer is a business, the standardized fields would not include a household identifier. Moreover, consolidated customer attributes may be communicated to a display or other user interface, or it can be communicated to downstream systems. For example, the method may display consolidated customer attributes and any risk indicators via the website that the user utilized to enter request . 195 326 Once the method communicates one or more consolidated customer attributes at step , the method ends. FIG. 4 400 400 401 402 403 404 405 406 407 408 400 illustrates a block diagram of an example system according to certain embodiments. System may include a user interface module , dependency matrix , scheduler module , collection module , storage module , aggregation module , profile view module , and control module . System is generally operable to consolidate and communicate customer data. 401 190 135 150 401 135 150 195 166 195 401 190 401 135 150 In general, user interface module receives a request for customer information from a user and/or administrator . Thus, user interface module enables user and/or administrator to request and receive one or more consolidated customer attributes of a customer profile . Consolidated customer attributes may include any information associated with the customer that may be stored in one or more related files in one or more databases. In some embodiments, user interface module can store and facilitate retrieval of customer data and/or instructions in response to receiving request . In some embodiments, configuration module may receive logic, rules, algorithms, code, tables, and/or other suitable instructions for performing the described functions and operations from user and/or administrator . 408 403 404 405 406 407 408 408 164 166 164 195 166 408 Control module may be communicatively coupled to scheduler module , collection module , storage module , aggregation module , and/or profile view module . Control module is generally operable to receive information, transmit information, perform processing of information, communicate to other devices, control the operation and administration of consolidating and communicating customer data, or any combination of the preceding. For example, control module may facilitate executing a job (such as instructions to retrieve, consolidate, and/or update certain attributes) and manipulating data for correlating a customer with a customer record , generating a customer profile , and consolidating one or more record attributes of customer record as one or more consolidated customer attributes of customer profile . Control module may be a programmable logic device, a microcontroller, a microprocessor, any processing device, or any combination of the preceding. 402 402 403 402 401 135 150 402 In some embodiments, dependency matrix refers to any suitable set of instructions, logic, or code embodied in a computer readable storage medium for consolidating and communicating customer data according to this disclosure. Dependency matrix may be operable to communicate with scheduler module . In certain embodiments, dependency matrix receives data and/or instructions from configuration module , user , and/or administrator . Dependency matrix may perform validation to ensure that data is ready for processing and, if a determination is made that the data is not ready, may wait to run the job until the data is ready. 403 404 406 401 402 403 404 164 404 164 403 406 164 195 166 404 164 406 195 166 164 Scheduler module controls the operation and administration of collection module and aggregation module by processing information received from configuration module and dependency matrix . For example, scheduler module may control when collection module retrieves and processes customer records associated with a customer (e.g., instruct collection module to retrieve any new customer records associated with a specific customer on a weekly basis). As another example, scheduler module may control when aggregation module consolidates record attributes of customer records as consolidated customer attributes of customer profile (e.g., if collection module retrieves new customer records , instruct aggregation module to add or update consolidated customer attributes of customer profile based on any new record attributes of new customer records ). 404 164 404 404 404 190 195 404 190 Collection module facilitates retrieval of customer data associated with customer records from one or more sources, such as data that a particular department, line of business, or other group associates with the customer. Collection module may process/transform the customer data to make the customer data useable by collection module and/or downstream processes. In some embodiments, collection module determines one or more customer identifiers (e.g., name, social security number, account number, driver's license number, and so on) indicated in request that identifies the customer for whom consolidated customer attributes are being requested. Alternatively, collection module may map one or more criterion from request to a customer identifier, such as a unique party identifier assigned by an enterprise. 404 164 190 164 190 a a In some embodiments, collection module determines a first customer record that a first source associates with the customer by correlating the customer identifier indicated in request to a record attribute of first customer record . For example, if the customer identifier in request is a checking account number and the first source is a checking department of a financial institution associated with the checking account, the checking account number may be used to determine that the checking department's record is associated with the customer. 405 164 405 164 166 In general, storage module stores customer data associated with customer records from multiple sources. In some embodiments, storage module may generate a unique party identifier for data associated with a particular customer. The party identifier may refer to a unique identifier assigned by the financial institution to identify the customer data and accounts that are associated with the particular customer. The party identifier may be associated with one or more customer records associated with the particular customer and/or a customer profile associated with the particular customer as described below. 406 166 164 195 166 166 166 164 Aggregation module generates customer profile and consolidates record attributes of customer record as one or more consolidated customer attributes of customer profile . Generating customer profile may refer to creating a new customer profile or updating an existing customer profile. Customer profile may include any information associated with the customer that may be stored in one or more customer records that one or more sources associate with the customer. Examples of sources include financial institutions, data bureaus, and/or third party vendors. Examples of customer information include data for the customer's personal accounts, business accounts, or both. In some embodiments, customer information may also include data associated with members of the customer's household, such as the customer's spouse, children, and/or parents. 166 195 164 195 166 164 164 195 166 195 166 Customer profile may refer to a centralized view of a spectrum of consolidated customer attributes from multiple customer records . Consolidated customer attribute is a customer attribute that has been added to or updated in customer profile based on a record attribute of customer record . For example, a record attribute of customer record may be added as a new or updated consolidated customer attribute of customer profile . Examples of consolidated customer attributes in customer profile may include customer identifiers (e.g., a name, social security number, account number, driver's license number, date of birth, address, or party identifier), customer demographics (e.g., age, customer type (e.g., individual, large business, or small business), and/or one or more phone numbers, e-mail addresses, or street addresses), customer account information (e.g., account status, open date, close date, jurisdiction in which the account is domiciled, or account classifications), customer finances (e.g., personal income, fund sources, or assets), customer transactional behavior (e.g., monthly cash deposits, iv withdrawals, etc.), risk rating (based on financial crimes, corruption, and economic sanctions compliance information), customer networks (e.g., customer relationships, related party identifiers, household members, company affiliations, etc.), and/or instructions for party consolidation configuration (e.g., instructions for how to consolidate the customer in downstream systems). 406 164 195 166 166 166 166 406 166 403 406 166 164 406 195 166 In some embodiments, aggregation module consolidates the one or more record attributes of customer record as one or more consolidated customer attributes of customer profile . Consolidating record attributes can include adding attributes to customer profile , updating attributes and removing duplicate attributes included in customer profile , and/or reconciling inconsistencies in customer profile (e.g., if different sources list different home addresses, consolidate the record attribute that was updated most recently). As an example, if a checking account record determined to be associated with the customer based on a checking account number comprises additional record attributes (e.g., a party identifier, credit card account information, and/or contact information), aggregation module may consolidate the checking account information, party identifier, credit card account information, and/or contact information in customer profile . In certain embodiments, scheduler module may control when aggregation module generates customer profile and/or consolidates record attributes of customer record , or which record attributes aggregation module consolidates as consolidated customer attributes of customer profile . 407 195 190 195 407 195 166 407 1 407 1 407 1 407 1 195 407 195 190 FIG. 2 a a b b c c In some embodiments, profile view module communicates one or more consolidated customer attributes in response to request . Consolidated customer attributes may be communicated in any suitable format, including the standardized format comprised of standardized fields and/or categories described with reference to . For example, profile view module may communicate consolidated customer attributes according to one or more categories associated with customer profile . In the illustrated embodiment, profile view module communicates multiple customer profiles (e.g., for Customer through Customer N) according to demographic category views ()-(n) (e.g., general information about the customers such as contact information), relationship category views ()-(n) (e.g., indicating customer to account relationships, account level information, methods for classifying an account, etc.), and network category views ()-(n) (e.g., customer relationships, related party identifiers, household members, company affiliations, etc.). Additionally, consolidated customer attributes may be communicated to a display or other user interface, or may be communicated to downstream systems. For example, profile view module can display consolidated customer attributes and any risk indicators via a website that the user utilized to enter request . Modifications, additions, or omissions may be made to the systems described herein without departing from the scope of the invention. The components may be integrated or separated. Moreover, the operations may be performed by more, fewer, or other components. Additionally, the operations may be performed using any suitable logic comprising software, hardware, and/or other logic. As used in this document, “each” refers to each member of a set or each member of a subset of a set. Modifications, additions, or omissions may be made to the methods described herein without departing from the scope of the invention. For example, the steps may be combined, modified, or deleted where appropriate, and additional steps may be added. Additionally, the steps may be performed in any suitable order without departing from the scope of the present disclosure. Although the present invention has been described with several embodiments, a myriad of changes, variations, alterations, transformations, and modifications may be suggested to one skilled in the art, and it is intended that the present invention encompass such changes, variations, alterations, transformations, and modifications as fall within the scope of the appended claims. BRIEF DESCRIPTION OF THE DRAWINGS For a more complete understanding of the present invention and for further features and advantages thereof, reference is now made to the following description taken in conjunction with the accompanying drawings, in which: FIG. 1 illustrates an example of a system that consolidates customer data from multiple sources into a centralized customer repository for customers; FIG. 2 illustrates an example of a customer profile stored in a database of server memory; FIG. 3 illustrates a flowchart for communicating consolidated customer attributes to users; and FIG. 4 illustrates a block diagram of an example system that consolidates and communicates customer data.
IES is the developer of the world’s leading integrated building performance modelling software system, the or VE. As such, IES has unsurpassed experience in the application of these advanced design tools to enhance building performance and create more sustainable buildings. Founded in 1994, employing approximately 150 staff, and headquartered in Glasgow, Scotland, IES also has offices in London, England; Dublin, Ireland; Cambridge MA, USA; Atlanta GA, USA; Melbourne, Australia; Pune, India and Penang, Malaysia. In this time IES has provided leading edge support to the design, construction and operation of some of the largest and most challenging buildings in the world. The IESVE is a suite of building performance modelling tools based around a single integrated data model. The purpose of the system is to provide the high quality information required to design, build and operate better performing, more sustainable communities. It can be applied from the earliest stages of the design and through operational stages. The VE is used today by many of the world’s leading architectural and engineering practices and in recent years has been proliferating at a very rapid rate due to the unique ability to improve decision making and workflow.
https://www.energyintime.eu/partners/integrated-environmental-solutions/
Developed with support from a TeachAccess Curriculum Development Grant, this lesson includes several components: lecture slides, three options for one-hour activities, a 5-10 hour homework assignment and some standalone homework questions. Feel free to mix and match to suit your class size, lecture style, and teaching preferences. If you have feedback or suggestions, feel free to reach out to me at [email protected]. All materials are (c) 2021 Elaine Schaertl Short, but you may feel free to use, modify, or share these materials as long as you attribute them to Elaine Short and include a link to https://aabl.cs.tufts.edu/. You can download a .zip of all of the files here or the individual components of the lesson below. Classes Social Assistive Robotics (Socially Intelligent Assistive Robotics) This is a heavily research-focused class, for graduate students and senior undergrads potentially interested in pursuing a PhD or other research position. There are three main goals for students for this course: - To become familiar with a wide variety of research at the intersection of human-robot interaction and assistive robotics. - To learn about software tools, computational techniques, and ethical considerations that enable this work. - To build a strong foundation in research methods and prepare to be a successful robotics researcher in the future. This class is currently being offered in Fall 2019. Assistive Algorithms This class will be more practice-focused, for graduate students and senior undergrads interested in developing intelligent assistive technologies. In this class, students will learn about the range of algorithmic approaches to sensing goal-directed human behavior, determining appropriate assistance, and providing that assistance. Through hands-on projects and assignments, students will become familiar with these techniques, in applications such as cognitive orthotics and reminder systems, socially assistive robotics, prosthetics, assistive manipulators and smart wheelchairs. This class will be offered in Spring 2020.
https://aabl.cs.tufts.edu/outreach.html
Andy Elkins: Andy came to me at age 15, when he was preparing to enter his freshman year at BB&N. Andy was very enthusiastic about playing football and made it clear that he wanted big things for himself in the sport of football. He also recognized that he wasn’t a superior athlete and would need to work really hard to achieve his goals of playing college football and perhaps playing in the NFL. We worked 3-4x per week from April of 2015 until September and he made incredible progress athletically and with his route running during that time. He played JV to start his freshman year, but was on the sidelines for varsity games as well and even caught a TD in varsity game that year. The next year, we got to work in the spring again and he trained hard until the season began. He started as a freshman, caught over 30 passes and had 5 TD’s that season. The next 2 years, he would train with me in the winters and took that next step in his athletic development. Andy runs elite combine times, including a 4.56 forty-yard dash time (down from 5.5 as a freshman). This past summer, he dominated the competition in his 2 major camps (Wake Forest and Stanford). As a result, he got the offer to come play for Wake and he ACCEPTED! Andy has big goals and with his natural ability to catch the ball mixed with his passion and work ethic, the sky’s the limit. Playing in the NFL is his dream and BAT believes we can get him there! https://photos.app.goo.gl/Gib9wBhZxB5YcQYc9 JJ Bussgang: JJ’s family reached out to me via CoachUp in the summer of 2012, just as I started training athletes. JJ was a 12 year-old at that time and new to the game of football. They figured that a few sessions would be great to help JJ along. He was not a very good athlete when we started training, but had an amazing attitude and an unbelievable work ethic. He had a background in martial arts, was naturally strong and liked being physical, so I figured we could use his mental toughness and likeness to physicality and turn him into a solid football player. He had some success that season and even started on defense in the last few games of his 7th grade year. The following year he grew quite a bit, trained a lot with me and had a dominant season on his 8th grade AYF Team. After that, he transferred to Milton Academy for high school. He began lifting seriously as a freshman, was one of the best JV players that year and continued training for agility and line technique with me in spring and summers. He started on the offensive line as a sophomore and then was all-league as a junior and senior. Following his junior year, Bowdoin offered him to come play football and he committed! This fall, he earned a starting spot on the offensive line as a true freshman. JJ is a great example of how work ethic and passion can lead to amazing things. Most 5”2, 12 year-old’s who aren’t great athletes don’t become college football players, but our guy JJ has made it and he continues to impress. https://photos.app.goo.gl/c7Nqa8AGxky7KLvb8 Connor Strickland: Connor started with me as an 10 year-old in 2014. He came to me as a 2 sport athlete (football and basketball) with the initial goal of preparing for his upcoming football season. We identified that Connor was a good athlete with some natural abilities. Like most young athletes though, he wasn’t fundamentally sound, so we initially focused on improving his ball carrier skills (cuts, running low etc.) and ball skills (routes and catching the ball) and tackling as well. Connor and I had a connection right away and I could tell how much he loved the 2 sports he was playing. I knew immediately that Connor would be with me for years to come. The next 2 years, Connor had a lot of success both on the football field scoring 10+ TD’s a season and on the basketball court dishing out assists and impressing coaches with his defense. Fast forward to today and Connor is a freshman at BC High. He is still playing both sports and is currently starting at Wide Receiver on the freshman football team. He will play basketball, as well, and it looks like that will be the sport he excels at the most in high school career. His fundamentals are impressive, he can hit floaters with relative ease and has shown a lot of growth his his jump shot. The future looks bright for Connor and We can’t wait to see the big things he will do over the next 4+ years. https://photos.app.goo.gl/5sa71euTLtYmS3Ez6 Brendan Mannion: Brendan came to me in the spring of 2017 with the motivation to make the St. Amselm Football team. The school gave him an offer to come tryout for the team based on his size and performance as a high school lineman. Brendan came in with an awesome personality, but was very out of shape, not quick enough and certainly not strong enough to play on the line for a college program. He was frustrated by his testing numbers, but was hungry to work out with me. For the next 4 months, we trained 2 or 3 times every week with an emphasis on agility, balance, conditioning and technique. We also put him on a regular lifting program to follow with some guidance from an experienced lifter at his gym. Brendan made tremendous improvement across the board and earned a spot with the team as a freshman. In fact, he beat out a senior for the 2nd string left tackle position and even earned some playing time that year. Fast forward to the spring of 2018 and Brendan started at left tackle in the teams spring game and had the best game of his career, following all of his assignments and moving defenders with ease. At this point, Brendan was more than 40% stronger than the previous year! He came back to me in the early part of summer in 2018 ready to train and prepare for his sophomore year. While he came back to me strong and confident in his game, he was very out of shape and struggled to make it through our first 5 sessions. But, Brendan never gave up and knew what he needed to do to get back into football shape. We emphasized conditioning and strengthening the hips to maximize his power on blocks all summer. Nearing August, he passed all of the conditioning tests with ease and came to his teams camp ready to go. He was absolutely dominating the first 2 weeks of practice until he unfortunately blew out his knee. Brendan got surgery 2 days after that and is now on the path to recovery. Brendan and I have been speaking a lot and his mindset is to get back by the spring and then train like a madman to be even better than before. Brendan is an amazing person and a great football player and the future looks bright! https://photos.app.goo.gl/XtLC1sfBmFuakwGG8 – there are 3 athletes in this picture (he’s the big one!) Chris M: Chris started with in June of 2018 as a 16 year-old entering his junior year at Newton South. The family relayed to me that he had been playing ball for several years, but had only played Junior Varsity. He told me he wanted to take his game to the next level and compete on his schools Varsity team in 2019. After the evaluation session, we went over strengths and weaknesses. His strengths were his dribbling, court vision and his height (6”2). The weaknesses were plentiful though and included his lack of agility, vertical jump, jump shot and general physicality. My assistant, Andy, was able to block many of his shots and push him around on the court with ease. We spoke about him training consistently through the summer with a strong emphasis on his agility and vertical. Over the first 6 weeks of his program, Chris trained intensely and followed by “at home” workouts. He improved on his vertical by 4 inches, made significant gains with his footwork and was much more aggressive on his takes to the rim. He noted that he was playing better in his tournaments and did extremely well in the big tourney he had in Orlando. With all of the vertical and agility gains, we noticed that he was hitting his jump shot more consistently. The primary reason for this was not related as much to our shooting work in sessions, but rather the lift he was getting off the ground. This was especially noticeable on his three point shots. Fast forward to the fall of 2018 and Chris is like a new person from when we started just months ago. He has a weekly session with Daylon, another very talented athlete and coach of BAT, and is the best player on his AAU team. He’s able to dunk now, grab more rebounds and generally able to play with a high level of competition. Can;t wait to see how he plays this year for his school team. https://photos.app.goo.gl/SWSSCv3m4M8Xtei79 Alvin, Xzavier and Ben (Mini BAT-letes): Here are 3 awesome kids who started with me early in 2018. All 3 of these kids (ages 9-11) asked their parents about signing up to train for football. For starters, that told me a lot. I rarely get kids younger than 14 who are hungry for training and ask their parents to sign them up. These three kids began their journey with private training, so they would work me 1:1 on everything from agility to QB and WR techniques. They all made significant progress on both the fundamentals of the game and with their agility. In July of 2018, I had them all train together a number of times to help them prepare for their upcoming seasons by focusing primarily on their positions and overall conditioning. Needless to say these kids are all having tremendous seasons. Xzavier, age 9, is playing with mostly 10 year-olds and is a mini-Marshawn Lynch scoring multiple TD’s every game! Alvin (age 10) has been one of the best players on his squad despite his lack of size and has played all over the field for his team and even has thrown a few TD’s despite not playing QB before. Lastly, Ben who plays on the Newton 6th grade team took over the starting QB position from a kid who has been starting at QB for 3 years and has been on fire all season, throwing 2 TD’s a game and being a great leader. BAT is very lucky to have 3 stars in the program and look forward to working with them throughout their careers! https://photos.app.goo.gl/jnG9rMpWTAH4Sckr9 Daylon Trotman: Daylon came to train with me at the end of his freshman year. His mom explained where Daylon was at with his basketball career. He was a very athletic guard who had a lot of success in his early years playing basketball, but was currently struggling with his game for a variety of reasons. He had no confidence in his shooting, was struggling with his off hand and generally not finishing near the rim on his attacks to the hole. We focused primarily on shooting, dribbling and finishing that whole summer to correct those issues. A few months into our training, Daylon was consistently knocking down mid range jumpers and using his off hand in his summer league games. After a few months, we shifted to combo sessions where we would do skills and athletic development to increase his explosiveness and vertical jump. By the end of the summer in that first year, Daylon had added 4 inches to his vertical and decreased all of his speed times by 10% or greater. His first step became so quick, I could no longer guard him in sessions. In his sophomore year he made the jump to Varsity and by the middle of the year, Daylon was a starter for the team and having a lot of success on the court. Daylon has stuck with the program and works out nearly every day to continue increasing his vertical and overall explosiveness. We train weekly and those sessions are with another rising Junior. These 2 battle it out at each session to make each other better and it’s working! Daylon is poised to have a breakout Junior year and start to garner some serious college looks. We can’t wait for this upcoming season!
https://bostonathletictraining.com/about/athlete-success-stories/
Human Intelligence: How it’s Done and the Types of People Who Do It. HUMINT Collection: What You Need to Know About It. Human source intelligence, or HUMINT, is a critical part of the Intelligence Community’s mission. It involves the collection of information from human sources – people who know or have access to sensitive information. In this blog post, we will discuss what HUMINT is, how it is collected, and who collects it. We will also look at what makes a good HUMINT collector and some of the challenges they face. Sign up for Prepper Daves Free Newsletter HERE What is HUMINT Collection? The purpose of HUMINT collection is to acquire information about foreign governments, organizations, and persons, to support national security objectives. This can include obtaining photographs, documents, and other material; gathering information from people who travel abroad; and having official contacts with foreign entities. HUMINT collection is carried out by a variety of means, including clandestine operations, overt collection by personnel in diplomatic and consular posts, and debriefing of foreign nationals and US citizens. What is the role of a HUMINT collector? A HUMINT collector’s job is to gather information from human sources. They do this by talking to people, developing relationships with them, and extracting information from them. This can be done in a variety of ways, including face-to-face conversations, telephone calls, emails, or meetings. What are the challenges of being a HUMINT collector? Being a HUMINT collector can be challenging for a number of reasons. One of the biggest challenges is developing relationships with sources who may be reluctant to share information. Additionally, collectors must be able to extract information from sources in a way that does not compromise their relationship or jeopardize the source’s safety. They must also be able to effectively communicate with sources in a variety of languages. Who collects HUMINT? The FBI has field offices and resident agencies all over the United States, staffed with agents who are specifically tasked with HUMINT collection within the United States. The Central Intelligence Agency and the Defense HUMINT Service, an element of the Defense Intelligence Agency, are the primary collectors of HUMINT outside of the United States. This type of intelligence is collected by a variety of people within the Intelligence Community, including intelligence officers, case officers, and special agents. These professionals are responsible for acquiring sensitive information from human sources. They may collect this information from individuals who are known to have access to sensitive or classified information, as well as people who may have ties to terrorist organizations. HUMINT collection is a vital part of the Intelligence Community’s efforts to protect our nation and its citizens. Alphabet agencies collecting HUMINT The FBI The FBI’s Domestic HUMINT Collectors Course is a six-week certification course designed to teach special agents how to collect human intelligence. The first iteration of the course began in 2007 and included 26 participants from five field offices. Since then, the FBI has worked to build relationships with other agencies within the intelligence community, including the CIA and various military entities. This increased cooperation is aimed at creating a program that leverages individual strengths and supports the goals of the intelligence community. With due regard for the appropriate role of other agencies, the FBI is committed to working with the CIA and Department of Defense to further this goal. The CIA The CIA is responsible for providing overall direction for the collection of human source intelligence by elements of the Intelligence Community. This includes coordinating both overt and clandestine HUMINT collection across the IC. The Deputy Director of Operations at the CIA oversees HUMINT operations. Operations officers are responsible for identifying and recruiting individuals to be used for the collection of foreign intelligence related to national security issues. They must be experts in foreign languages and cultures and have specific subject matter expertise and knowledge of foreign areas. Assignments in this career track may include human intelligence collection, counterintelligence, and covert action in areas related to U.S. national security, such as: International terrorism, International crime, International trafficking, Weapons proliferation, Capabilities and intentions of rogue nations. HUMINT in the military The three branches of the U.S. military (Army, Navy, and Air Force) all have different roles in HUMINT collection. The Army is responsible for on-the-ground human intelligence collection, while the Navy collects signals intelligence, and the Air Force coordinates human intelligence within the intelligence community. All three branches require personnel who are skilled in foreign language and culture, as well as interrogation and debriefing techniques. These specialists play a critical role in keeping the military informed of potential threats around the world. The US Army The US Army oversees HUMINT collection. This responsibility is exercised through the US Army Intelligence and Security Command, which oversees HUMINT collectors. As a HUMINT collector, you’ll collect intelligence about an adversary’s intentions, strengths, vulnerabilities and capabilities. You’ll also share this critical information to help Army leaders better understand the enemy. You’ll debrief and interrogate human intelligence sources, analyze and prepare intelligence reports, and screen human intelligence sources and documents. U.S. Air-Force The U.S. Air Force is responsible for collecting and reporting intelligence information obtained from human sources. This is done in response to requirements, which are generated by the intelligence community. The Air Force Intelligence Agency oversees this process and employs personnel who are skilled in English-language screening, assessment, debriefing, and interrogation techniques. These individuals work with developed sources to satisfy requirements and obtain the desired information. The collected data is then published in knowledge level briefs, notices of intelligence potential, and requests for requirements. This allows other agencies within the intelligence community to be aware of potential source leads. Air Force Intelligence personnel also keep up to date on validated requirements so that they can target against them efficiently. In short, Air Force Intelligence is responsible for human-source intelligence collection and coordination within the intelligence community. U.S. Marines The Marine Corps Intelligence Director is the Commandant’s principal staff officer and functional manager for intelligence matters. As a Human Intelligence Specialist, you may be tasked to engage in counterintelligence to identify and de-escalate the threat of hostile combatants and intelligence organizations. CI/HUMINT specialists must learn to be adept in both CI / HUMINT and must grow to have a working knowledge of the organizations, operations, and techniques employed by foreign intelligence services and terrorist organizations. HUMINT is gathered by interrogation, debriefing, and screening. Many 0211s will specialize in a foreign language or use interpreters in deployed to areas that do not speak the language of the Marines. With this skill set of language, they may, in turn, exploit foreign language documents and recordings. MOS 0211’s when deployed must become familiar with the area, the customs and traditions of its people, and the infrastructure of a foreign force. CI/HUMINT specialists share and obtain information by special automated databases, interview/interrogation techniques, liaison, specialized CI techniques, technical support measures, investigative photography, and reporting-writing techniques. The information the 0211 obtains is vital to the planning and mission of air, ground, and special operations troops military wide. U.S. Navy The U.S. Navy’s intelligence branch is headed by the Director of Naval Intelligence, who oversees the Office of Naval Intelligence – the principal operating arm. The Naval Security Group collects signals intelligence for the fleet and national consumers as part of the national signals intelligence system. As an Intelligence Specialist (IS), you will play a critical role in the operational decision-making process, analyzing intelligence information and preparing briefings and reports for Navy officials. Your deep understanding of global culture and battlespaces will help keep the Navy ready for anything. One of your main responsibilities will be to gather information for pre-strike threat analysis and post-strike battle damage assessment. You’ll also ensure that reporting meets organizational standards and solicits feedback from consumers of reporting. By doing all this, you’ll help the Navy make informed decisions that could save lives. So, if you’re looking for an exciting and challenging career in intelligence, the U.S. Navy is the place for you. In conclusion, HUMINT is a vital part of the intelligence community and plays a crucial role in gathering information from human sources. It is important to understand how it is collected and who collects it to appreciate its importance. The challenges faced by HUMINT collectors are significant, but their work is essential to our national security. Thank you for reading, and be sure to check out our other blog posts for more information on subject such as – Military Intelligence: What You Need to Know, HUMINT side of Military Intelligence (MI), and Emerging biometric surveillance networks may aim to keep track of country’s citizens or foreign operatives.
https://prepperdavesonline.com/2022/01/27/human-intelligence-how-its-done-and-the-types-of-people-who-do-it/
Currently we work mainly on countries in the former Soviet Union. Central Asia South Caucasus Russia Ukraine KazakhstanReports & Briefing PapersJuly 2018 Kazakhstan: Closure of independent media and peaceful protests hampered This update covers developments on the freedoms of association, peaceful assembly and expression in Kazakhstan from March to June 2018. International Partnership for Human... RussiaUkraineCampaigns, Open Letters and News AlertsJuly 2018 Sign the petition: Demand Donald Trump hold Vladimir Putin to international standards of free... President Donald J. Trump The White House 1600 Pennsylvania Ave NW Washington, D.C. 20500 Dear President Trump, We, the undersigned organizations and individuals, join PEN America in urging you... ArmeniaAzerbaijanGeorgiaKazakhstanKyrgyzstanMoldovaTajikistanTurkmenistanUkraineUzbekistanStatements & Press ReleasesJuly 2018 Rights Reframed: Media advocacy mentorship program. Call for applications 2018 New Media Advocacy Project (NMAP) and the International Partnership for Human Rights (IPHR) invite applications for a 10-month mentorship program "Rights Reframed" designed to... UzbekistanStatements & Press ReleasesJuly 2018 Uzbekistan: Man’s 13-Year Detention Revealed Reports of Ill-Treatment Show Need for Transparency, Monitoring (Paris, July 6, 2018) – Uzbek authorities should immediately and unconditionally release an Afghan citizen whose 13-year... RussiaStatements & Press ReleasesJune 2018 UN Statement on Telegram and restriction to internet freedoms in Russia In a joint statement to the UN Human Rights Council of 27 June 2018, 52 (XX) civil society organizations raise their concerns about the trend...
http://iphronline.org/about/where-we-work
A cheese-making facility was set up on the border between the Czech Republic, Poland and Slovakia to increase the attractiveness of the area, market local products and create new jobs for the local population. Projects & Practice The project saw an unused calves’ shed converted into a farm shop selling organic products. A cooperative focused on quality cheese production, used Rural Development Programme support to expand its facilities and thus ensure the continuous growth of its business. In an area where the agricultural sector is under pressure due the expansion of a nearby urban centre, the diversification of farming activities e.g. ice-cream production and marketing, can ensure the farm’s sustainability. A family farm specialised on wine production used RDP support to acquire a new tractor and in this way improve its productivity and competitiveness. A successful pilot project to improve animal welfare conditions and slurry management in a pig and poultry farm in north-east Bohemia. Investing in new machinery and equipment to allow increase the productivity of a pig farm. EAFRD funding helped renovate a dairy farm boosting animal welfare and making farm work more efficient. A cooperation project brought together local farmers, inhabitants and public services managers to jointly define and promote soil preservation technics adapted to the local environment.
https://enrd.ec.europa.eu/projects-practice/_en?project_keywords_filter=19753&amp%3Bamp%3Bproject_country=All&amp%3Bamp%3Bfield_enrd_prj_measure_tid=All&amp%3Bamp%3Bfield_enrd_prj_focus_area_tid=All&amp%3Bamp%3Bf%5B0%5D=im_field_enrd_prj_focus_area%3A17123&amp%3Bf%5B0%5D=im_field_enrd_prj_keywords%3A19763&f%5B0%5D=im_field_enrd_prj_keywords%3A19750&f%5B1%5D=im_field_enrd_prj_keywords%3A20467&f%5B2%5D=im_field_enrd_prj_keywords%3A20472&f%5B3%5D=im_field_enrd_prj_keywords%3A19758&f%5B4%5D=im_field_enrd_prj_focus_area%3A17121&f%5B5%5D=im_field_enrd_prj_measure%3A17111&f%5B6%5D=sm_enrd_eu_countries%3AFrance&f%5B7%5D=im_field_enrd_prj_keywords%3A20509&f%5B8%5D=im_field_enrd_prj_measure%3A17107&f%5B9%5D=im_field_enrd_prj_keywords%3A19721&f%5B10%5D=im_field_enrd_prj_measure%3A17095&f%5B11%5D=im_field_enrd_prj_focus_area%3A17115&f%5B12%5D=sm_enrd_eu_countries%3ACzech%20Republic&f%5B13%5D=im_field_enrd_prj_focus_area%3A17117&f%5B14%5D=sm_enrd_eu_countries%3ACroatia
Electrodermal Activity (EDA) – a measure of sympathetic nervous system arousal – is one of the primary methods used in psychophysiology and has been used to investigate a variety of physiological topics. EDA signals can be separated into two distinct parts, skin conductance level (SCL) and skin conductance response (SCR). The SCL is a slowly fluctuating response that reflects general trends in activity and level of activation. In contrast SCRs are quick responses which can be seen as peaks in the signal and typically reflect responses to a specific stimulus from the nervous system. While many existing studies collected EDA data in short, laboratory-based experiments, recent developments in wireless biosensing have allowed for out-of-lab studies to become more common. The transition to ambulatory data has introduced challenges in SCR and artifact identification and may hinder analysis of ambulatory data. Therefore, the interest in developing automated systems that can facilitate the analysis of EDA signals has increased in the recent years. Ledalab, a current gold standard, is one such system which can be used to identify SCRs. However, Ledalab is computationally inefficient when applied to long, ambulatory data and does not have the ability to distinguish between SCRs and artifacts. This thesis presents a novel technique that can be used to accurately and efficiently identify SCRs using curve fitting and sparse recovery methods, namely orthogonal matching pursuit. Sparse recovery can also be easily extended to include identification of both SCRs and artifacts given seperability between the two. In this work we apply discriminant analysis to determine if seperability exists between SCRs and artifacts. We have shown that our novel approach was able to detect 69% of the SCRs in an EDA signal compared to the 45% detection of Ledalab. Our method also exponentially decreased the computational complexity compared to the Ledalab. Finally, our system begins addressing the issue of artifact detection by determining that the difference between artifacts and SCR shapes could be distinguished with an accuracy of 74%.
http://d-scholarship.pitt.edu/30291/
12 July 2022 World Wellbeing Week arrived and we wanted to use the opportunity in our ways to extend awareness about how the work we do at Enrych aims to promote good health and wellbeing. In current times with so much uncertain, looking after our wellbeing has never been more important. We are a specialist in our own unique ways. The number of people we support whose wellbeing has increased is massive. This is hugely down to the work of our excellent PAs who are helping our clients and service users to gain new skills and hone existing talents. Our activity program is also as inclusive as it gets- we actively listen to the thoughts and opinions of those we serve to provide ample opportunity to make new friends and be independent in further fostering those friendships away from our events. I personally see Enrych as one big family. Just recently, the pride I experience with 25 of us singing along to songs at our Boccia and Multisports sessions made me feel at peak wellbeing level. I also know that our newly formed choir had an amazing time recently recording a song with the very talented Loughborough Singers. It is so good to see our existing groups grow in numbers and the way everyone welcomes new faces also showcases how important the wellbeing of everyone is at Enrych. One thing I love to do is turn someone from feeling sad or fed up into feeling happy and to feel they can focus their energy into the day. I recently enjoyed helping one of our staff who was going through a challenging time to put together a plan of how to get to a better place wellbeing wise. By the end of the day, this goal was achieved, and both of us ended up better for it. It makes me feel sad to see someone struggling or not feeling truly connected to the day in any form. The feeling is something a lot of people may have experienced, in particular the feeling of isolation that appears because of it. Due to the uptake of courses linked to mental health and wellbeing within the office team, I feel very much in a safe environment and that anyone would make the effort to help me get to a good place mentally. I always look to return that favour. During our Boccia and Multisports sessions recently, I have helped new members of the group to integrate and to develop skills such as coordination, particularly with the Curling activity. This helped the new members to feel like they were in the best place to participate and get the most fun out of it. This is exactly what we want!
https://www.enrych.org.uk/blog/2022/07/12/national-wellbeing-week/
•Walmart uses Blockchain technology to collaborate with their suppliers to establish a sturdy supply chain. Artificial Intelligence •Walmart has adopted artificial intelligence to assist both personal shoppers and customers in identifying the best substitutes for a product that has run out of stock. IoT •Walmart also incorporates IoT in its operations to assist it in maintaining food on freezers and coolers at the right temperature. •IoT works to ensure that food retains good quality by monitoring the refrigeration unit systems while at the same time ensuring that the food is according to good safety standards.
https://eliteessayhelp.com/develop-ideas-the-answers-need-to-be-very-detailed-remember/
MARTIN THE MONKEY Coughs and colds are easy to talk about. Try talking about mental health. And with kids. My partner and I wrote a storybook and accompanying activity to introduce the subject of mental health to students in grades 1 - 3. The form of a storybook using animals and a simple activity makes the introduction of a foreign subject a comfortable and familiar experience for students. Goal: Introduce the subject of mental health conditions and create discussion among young students and family. Role and Skills: I was the UX/UI designer and researcher. I interviewed teachers from different grade levels and used systems thinking to write a relevant story and activity. Partner: Grace Dai, Designer and Illustrator Deliverable: Martin the Monkey is a children's storybook with an accompanying activity designed to introduce the subject of mental health to students, prompting discussion and thought. BRAINSTORMING We brainstormed through ecosystem maps, concept models, stock and flow diagrams, and experience maps. INTERVIEWS I recruited educators, teaching at different grade levels, as well as a college student who has lived with ADHD and dyslexia since she was a child. We gained insight about how both parties, individuals with and without mental conditions, interact with one another concerning mental conditions and mental health general. INTERVIEW QUESTIONS for TEACHERS - Have you been trained to detect and deal with mental health conditions for your students? - What type/how long/how frequently? - How do you feel about your training? Are you satisfied? - Can you give us an example of when you applied your knowledge? What happened? Were they able to receive the help they needed? - - How do the students diagnosed with mental health conditions… - Interact with others? - Perform in class? - - How would ADHD/dyslexia affect students? - If someone were being bullied for mental health condition, what would you suggest to prevent it in a foundational way? INTERVIEWEES Kacey B. Professor, California College of the Arts “Over the last 25 years of teaching, I had a total of 6 - 8 hours of formal [mental health] instruction.” Laurie W. High School Teacher, Silver Creek High School “There is no periodic training - usually it’s CPR training every 2 years.” Mary P. Elementary School Teacher, Silver Oak Elementary School “I felt like I was going to be viewed as stupid, I felt really embarrassed.” Victoria B. College Student, California College of the Arts INSIGHTS AND ISSUES - minimal training/review for teachers - lack of personnel and staff to help students - stigmatization of mental health issues FINALIZED MAPS AND DIAGRAMS After finalizing maps and diagrams of the system, we brainstormed a story and activity to introduce mental health to young students. PLANNING AND PROTOTYPING I discussed the story with my design partner and sketched a draft. I designed the layout of the take-home activity and accompanying information for parents. FINAL PRODUCT The final storybook uses colorful images, drawn by Grace, and easy to understand language to create an engaging lesson in the classroom. The students have a short take-home activity drawing and writing about what they learned. Parents are supplied with a summary of the story and information about the mental health condition on the back of the activity sheet. We also created a quick info review card about the mental health condition for teachers to refer to. FINAL TAKEAWAYS AND NEXT STEPS After completing this project, I learned that there is much work to be done as far as education and discussion of mental health are concerned. I want to learn how else mental health education can be communicated. I reached out to several schools for their opinions as well as the prospect to use the book in their classrooms. The book received positive feedback and interest from teachers. There is realistic possibility it will be implemented in lower grade classrooms.
https://www.kendrawong.com/martin-the-monkey
High Energy Physics The Division for High Energy Physics (HEP) at Uppsala University carries out research in fundamental physics, making experimental and phenomenological endeavours into uncharted regions of Physics beyond the explored smallest and largest scales. Calendar Publications - Performance of the ATLAS Level-1 topological trigger in Run 2 2022 - Search for exotic decays of the Higgs boson into b(b)over-bar and missing transverse momentum in pp collisions at root s=13 TeV with the ATLAS detector 2022 - Search for Higgs boson decays into a pair of pseudoscalar particles in the bb mu mu final state with the ATLAS detector in pp collisions at root s=13 TeV 2022 - Search for heavy particles in the b-tagged dijet mass distribution with additional b-tagged jets in proton-proton collisions at p root s=13 TeV with the ATLAS experiment 2022 - First all-flavor search for transient neutrino emission using 3-years of IceCube DeepCore data 2022 Current news Outreach coordinator of the ATLAS experiment Rebeca Gonzalez Suarez has been elected for a two-year term as outreach coordinator of the ATLAS experiment. Read more. Research within the field of High Energy Physics We study the smallest building blocks of nature and their interactions using sophisticated experiments such as the ATLAS detector at CERN’s Large Hadron Collider in Geneva or the IceCube Neutrino Observatory, a massive neutrino telescope built deep into the ice cap of the South Pole. To test and interpret experimental and observational results we also develop new theoretical models both within and beyond the Standard Model.
https://www.physics.uu.se/research/high-energy-physics/
The website lists programs and services for foster parents as well as for children aging out of the foster care system. Among the information and referral sources available at ventura.networkofcare.org are those for children with learning disabilities, weight issues and diabetes. The website’s library features articles on child care, behavioral health, parenting and school readiness and other topics said Bruce Bronzan of Trilogy Integrated Resources, a Northern Californiabased consulting firm that created the website under contract with the county. Links to low-cost insurance programs for uninsured children are also included. An online tool allows parents to track pending legislation that affects foster children. It also provides an easy way to email state and federal lawmakers, Bronzan said. The website complements the Ventura County Foster Health Link, a program that debuted in June 2014, said Jennie Pittman, human services agency spokesperson. Foster Health Link is a secure website that provides medical records of children and makes the information available to physicians, parents and foster care officials. Access to the site is controlled by the county. Children in foster care typically have more complex healthcare needs than their non-foster peers; they often change homes and caregivers frequently, county health officials said. Ventura County Foster Health Link makes it easier to share important information among caregivers, caseworkers and health providers within Ventura County, said Barry Zimmerman, director of Ventura County Human Services Agency. There were about 940 foster children living in Ventura County as of Jan. 1 of this year, according to the most recent statistics from the county.
https://networkofcare4elearning.networkofcare4elearning.org/Trilogy/PressReleaseDetails.aspx?id=382&type=n
A major provider of home care and help for the elderly and disabled is looking to transfer or sell its current contracts after concerns were raised over its finances. Allied Healthcare said that warnings from the Care Quality Commission (CQC) earlier this month had "negatively impacted" its operation. The company provide home care services such as helping with cleaning, shopping, dressing and preparing meals, as well as managing medication. One Welsh council has already said that plans are in place to ensure continuity of care. English care regulation CQC raised concerns at the start of the month that Allied Healthcare may not be able to continue to operate after November 30. The regulator said the company had not given adequate assurance of funding past this date, and warned of a risk to the disruption to services. Allied Healthcare operates from locations in Haverfordwest, Carmarthen, Swansea, Pyle, Barry, Cardiff, Ebbw Vale, Newtown, Wrexham and Rhyl. Carmarthenshire Council has actioned contingency plans to continue the care and employment of those affected by Friday's announcement. The council has met with the company on Monday and are keen to reassure people that their care will continue. Councillor Jane Tremlett, Executive Board Member for Health and Social Care at Carmarthenshire Council, said: “We are meeting with the company today (Monday) with a view to identifying around 80 members of staff who are providing domiciliary care on behalf of Allied to people in Carmarthenshire, and transferring them into the employment of Carmarthenshire County Council. “We will be writing to staff and service users to provide the necessary reassurance.” Jake Morgan, Director for Communities at Carmarthenshire Council, also moved to reassure those who rely on the services currently being provided through the firm, and the company's staff, that plans were in place. He said: "We have robust contingency plans in place which means we are in an immediate position to offer transfer of employment to our existing in-house provision for any Carmarthenshire staff affected. "These are highly valued and experienced members of staff who deliver important services to vulnerable people in our communities and I’d like to offer reassurance that their employment is safe. “We are also working closely with colleagues in Pembrokeshire to ensure continuity of services across the county border.” Over the weekend Allied Healthcare said that the CQC statement had intensified the "challenging" Christmas period, and that is was exploring a range of options whilst re-evaluating their long-term business plan. These includes the sale or transition of services to alternative providers, including the transfer of staff. Carmarthenshire Council said that letters to those affected are likely to be issued later on Monday, and that a series of rop-in sessions are also being arranged.
https://www.walesonline.co.uk/news/wales-news/struggling-home-care-provider-looks-15431373
Appa Takkar is a Tamil movie which is still under production and will be released in 2015. This movie is based on action comedy genre. The main actors in the lead are Jayam Ravi, Anjali and Trisha. The Director of the film is Suraj, who started his career as a director in 1998 with the movie Moovendar. This will be the tenth movie directed by him. The music is composed by S.S.Thaman. Watch Appatakkar Tamil Movie Trailer (Theatrical) AppaTakkar Movie Producation The Producers of this film are K.Muralitharan, V.Swaminathan and G.Venugopalan. The story is written by the Mr.Suraj and cinematography is done by U. K. Senthil Kumar. The editor of the film is R.K Selva.Laxmi. Recently, the Satellite rights of the film are sold to the Sun TV network. The traditional Pooja of the film, to mark the beginning of the project, happened recently in Chennai. Jayam ravi is a good actor in the Tamil industry who can blend action sequences and comedy sequences in his own style. Jayam ravi has completed his latest movie Romeo and Juliet which is now running in theatres with a good talk. This will be the third time Jayam ravi and Trisha are coming together in a film after something something, Unakkum Enakkum and Boologam which is yet to be released. This is going to be Trisha’s 50th movie. Regarding the heroine characters of the film, Trisha will be playing the role of an urban girl while Anjali will be playing the role of a village girl. Anjali is making a comeback to Tamil films after a break period in the industy.The actress Poorna will be doing an item song for this movie which will be a special attraction. The Veteran Tamil actor Mr.Prabhu will be doing supporting actor for this film.Famous Comedian Vivek will be entertaining audience with his fresh comedy in this movie.He has also shaved his for the role of the character purpose. Ashwin raja and Rajendran also will be doing supporting roles in this film.Vidiyal Vinayagamurthy will be playing a Police Officer in this movie. The team of the movie started shooting in July 2015 in Chennai and later on will be moving to Pondicherry for its further shoot.The team is planning to shoot songs in different location abroad.
http://ronpaulflix.com/entertainment/appatakkar-tamil-movie-trailer-teaser/
Ryan F. Burns was named the National Winner of The American Prize in Vocal Performance — The Friedrich and Virginia Schorr Memorial Award, in the professional opera division for 2017-18. He performs regularly with opera companies, orchestras, and ensembles in the Northeast. He has received training from the CoOPERAtive Program at Westminster, the VOICExperience program, and the Total Interpretation Project as part of the Capobianco Opera Studio. Burns has performed with the former Opera Boston, Salt Marsh Opera, Connecticut Lyric Opera, Opera Theater of Connecticut, Opera Providence, Hartford Opera Theater, UConn Opera Theater, Greater Worcester Opera, Opera del West, and the Jessica Lang Dance Company. Additionally, he has been a soloist with the New Haven Symphony, Greater Middletown Chorale, South Hadley Chorale and Orchestra, Pioneer Valley Symphony Orchestra, and the Sounds of Stow Festival Chorus and Orchestra. His operatic credits include Count Almaviva in Le nozze di Figaro, Figaro in Il barbiere di Siviglia, Dr. Falke/Frank in Die Fledermaus, Valentin in Faust, Father in Hänsel und Gretel, Schaunard in La bohème, Sid in Albert Herring, Masetto in Don Giovanni, Papageno in Die Zauberflöte, John Proctor in The Crucible, General Boum in The Grand Duchess, King Melchior in Amahl and the Night Visitors, and Maximilian in Candide. In 2017, Burns graduated with a doctorate of musical arts from the University of Connecticut under the direction of Dr. Constance Rock, where he was a former Concerto Competition winner. While there, he also served as an adjunct instructor of Opera Studio, directing the voice area’s opera outreach program. Currently, he serves as Program Coordinator for the JOY! Conservatory Scholarship Program (UConn), and Director of Music at The Pomfret School in Pomfret, Connecticut.
https://www.odysseyopera.org/artists/ryan-burns/
Supporting Brand delivery performance. Responsibilities: Senior responsibilities - -Thorough planning and preparation with the account director, senior account manager and the executive producer for -campaigns through foresight of upcoming work - -Working with the agency on master assets and campaign handovers with the account teams and executive producer - -Preparation of cost estimates / set up costs - -Overseeing QC and ingest – signing off QC - -Producing creative post work, simple shoots - -Overview of account they are working on - -Client facing, liaising with both agencies and clients for the global and local markets - -Advising on post requirements ahead of a shoot where necessary - -Briefing ops with campaign set-ups to facilitate localisation - -Providing masters and localised edits to the asset manager for upload to DAM systems if required on account - -Pitching on the post for new campaign briefs - -Organising the weekly internal meeting with the team if necessary - -Ensure team are engaged and motivated Producing - -Day-to-day responsibility for managing projects - -Involved in new campaign briefing as required - -Interpreting and consolidation of client briefs - -Managing project timelines - -Identify and advise the client of any issues concerning their Creative Agency and delivery of master files, and how these could be resolved for the benefit of the client - -Briefing projects in to the various internal teams, transcreation, VO, business affairs where necessary - -Facilitate multi-channel briefs - -Responsible for the end to end management of all local briefs - -Provide clients directly with cost and timeframe estimates for briefs, alongside any additional information you may require to execute the brief - -Manage, book and record VO sessions and manage the usage - -Maintain an up to date internal status sheet of all live briefs and work in production - -Ensure any broadcast related tasks are in progress and will meet timelines such as clearance, broadcast codes and usage negotiation - -Where required, ensure on behalf of the client via BA that usage rights are secured as per brief, advise clients when UR are due to expire - -Be the client’s subject matter expert, assisting with any queries, and advising how best to ensure briefs are delivered to the highest quality in the shortest timeframe - -Based on experience view overall project and decide best route for work, 3D/AE/Flame - -Book & brief 2D and 3D operators. - -Book and direct sound mixes - -Communicate with clients regarding briefs, cost estimates, revisions, timings etc - -Creating bespoke post production solution where required - -Accurate estimating and billing in CMD - -Scheduling all elements of the production including editors and sound mixing - -Ensuring all output meets client requirements, has been through QC and is approved before release to the client. - -Answering client technical queries or liaising with operators or technical staff to obtain and provide requested information - -Estimating from agreed ratecards and where necessary estimating VFX/project work off ratecard - -Billing and reconciling jobs, requesting PO’s and creating 3rd party PO’s - -Where opportunities arise, seek to cross sell WLT capability across channels, and into the post production of the TVC master asset - -There may be a requirement to attend f2f briefings with clients offsite, as well as assisting with hosting clients who attend our offices in person to oversee the execution of any briefs - -Attend campaign ‘wash-up’ meetings with clients to identify future learnings to be applied to the following campaigns and build further relationships with clients Client Development - -Develop, maintain and extend client relationships - -Manage client expectations in relation to project objectives, timelines and budgets - -Work to gain a strong understanding of the clients business - -Build strong working relationships with clients on a daily basis Technology - To use CMD to manage all elements of the client processes as agreed. To keep the system updated with specifications, status and costs as required.
https://lbbonline.com/careers/jobs/1274/
What is Non-Academic Misconduct? As a Queen's student, you are expected to adhere to and promote the University's core values of honesty, trust, fairness, respect, and personal responsibility in all aspects of University life. These core values are intended to inform and guide student behaviour with the goal of fostering mutual respect for the dignity, rights, and well-being of others and their property. Trust Honesty Fairness Respect Personal Responsibility Non-Academic Misconduct refers to the behaviours that contradict these core values and that violate the behavioural expectations outlined in the Student Code of Conduct and supporting policies. Learn more about: How can you report Non-Academic Misconduct? Non-Academic Misconduct can be reported to multiple offices at Queen’s. Where to report often depends on the nature of the incident. Learn more about: How is Non-Academic Misconduct handled on campus? The Non-Academic Misconduct (NAM) Units on campus respond to reports of misconduct that fall within their areas of responsibility. Who decides what counts at Non-Academic Misconduct? The Non-Academic Misconduct Intake Office (NAMIO) receives reports of student non-academic misconduct and refers these cases to the appropriate NAM Unit. The Student Code of Conduct divides non-academic misconduct into two categories. Category 2 incidents are generally more serious than Category 1 incidents. The NAMIO uses various factors to determine the category of the incident and the appropriate NAM Unit for referral: - What was the nature of the incident? - How serious were the impacts of the incident? - Has this happened before with the same student? - How complex is the situation? Which offices investigate Non-Academic Misconduct cases? For reports deemed Category 1, the NAMIO will assign the case to one of the following NAM Units: - AMS Judicial Affairs Office – if the responding party is an Undergraduate student - Athletics & Recreation Conduct Office – if the responding party is a student-athlete, or the incident occurred in a sport-related context - Residence Conduct Office – if the responding party lives in Residence - Student Conduct Office – if the responding party is a Graduate student For reports deemed Category 2, the NAMIO will assign the case to the Student Conduct Office. Some case are complex and involve students that belong to multiple communities on campus (i.e. student-athlete, resident, graduate student). The NAM Unit that first contacts you is the one assigned to manage the case and that is who you should follow up with if you have questions. How long does the Non-Academic Process take? While the NAM Units strive to resolve matters efficiently, the length of the Non-Academic Misconduct process depends on the complexity of the case and the people involved. Learn more about:
https://www.queensu.ca/nonacademicmisconduct/
Thirty six members of staff have been chosen to receive the 2015 President's Awards for Excellence. This year, as well as celebrating the twentieth year of the awards for excellence in education, the awards featured a new stream to recognise excellence in research. The winners include members of our community who have gone above and beyond to help our students fulfill their potential and gain valuable experience. – Professor Alice P. Gast President Awards in the Education stream recognise staff who have made outstanding contributions in teaching, pastoral care, research supervision and supporting the student experience. The Research awards recognise excellence in innovation and entrepreneurship, engagement and partnerships, and research support, as well as awards for an outstanding research team and early career researcher. Nominations were made by staff and students from across the College with the winners of each award decided by selection panels overseen by the Vice-Provost (Education) and Vice-Provost (Research). Award recipients from both streams will receive their awards from Imperial’s President, Professor Alice P. Gast, at a joint award ceremony in December. Professor Gast said: “Congratulations and thank you to this year’s President’s Awards winners for their outstanding contributions to the College. It is very gratifying to be able to recognise them all for their truly remarkable work. “The winners include members of our community who have gone above and beyond to help our students fulfil their potential and gain valuable experience. This year we also recognise staff who are pushing the boundaries in their research and developing creative and innovative new fields. “I look forward to celebrating with them at our awards ceremony later this year.” Within each category those awardees judged to have made particularly exceptional contributions have also been selected to receive the President’s Medal. Dr Laura Barter, from the Department of Chemistry, received awards in both streams, with a President’s Medal for Excellence in Pastoral Care and a President’s Award for Excellence in External Engagement and Partnerships. She said: “I couldn’t believe it when I won; I was really surprised and delighted. “Pastoral care is vital, as the students we are training are the next generation of scientists who will be tackling some of society’s greatest challenges, so it’s important that we support their development. “What we’ve tried to do is recognise that our students are often working in multi-disciplinary environments and so it is important to offer bespoke support and training to enable them to reach their full potential in all disciplines.” The Excellence in External Engagement and Partnerships recognised Laura’s work developing AGRI-net. She said: “What we’ve done with AGRI-net is to create a network that brings together academics, industry and policy makers in both the agri-science and chemical biology fields. Through this we’ve developed partnerships with organisations such as Syngenta, which has resulted in research programmes such as the £3.2M NexGenAgrichem Marie Curie innovative doctoral programme.” Professor John Seddon leads the Membrane Biophysics Platform (MBP) Group, which was awarded the President’s Award for Outstanding Research Team for their work developing biology-inspired novel lipid membrane technologies. He said: “I knew we’d been nominated for the award and hoped we were in with a chance but we knew that there were other strong groups in the mix so we certainly weren’t expecting it. “We’ve tried to think differently about structure and collaboration by building a multi-university and multi-disciplinary team that spans experimental, theoretical and computational fields to try and tackle key problems in membrane biophysics. “The whole team is really happy – the only challenge now is finding a time we can all get together to celebrate.” Dr Joshua Edel, Department of Chemistry was awarded the President’s Award for Excellence in Teaching for his contributions to chemistry education, particularly in developing a new project in which students build a UV-Vis spectrometer, using LEGO. He said: “The LEGO spectrometer lab was the first time we’d done that type of project. We wanted students’ first introduction into measurement sciences to have a fun problem solving element and making them build their own UV-Vis spectrometers from LEGO seemed an ideal way to do that. “I’m really happy to have won the award. I think excellent teaching is vital in capturing the interest and imagination of students in a subject. To be recognised for trying to do that is really gratifying.” See a full list of winners for the President’s Awards for Excellence in Education and the President’s Awards for Excellence in Research. Article text (excluding photos or graphics) available under an Attribution-NonCommercial-ShareAlike Creative Commons license. Photos and graphics subject to third party copyright used with permission or © Imperial College London. Reporter Jon Narcross Communications and Public Affairs Contact details Email: [email protected] Show all stories by this author Comments Comments are loading... Leave a comment Your comment may be published, displaying your name as you provide it, unless you request otherwise. Your contact details will never be published.
https://www.imperial.ac.uk/news/165767/presidents-awards-excellence-recognise-staff-achievement/
TEXAS COURT OF APPEALS, THIRD DISTRICT, AT AUSTIN NO. 03-05-00716-CR Wendy Winborn, Appellant v. The State of Texas, Appellee FROM THE COUNTY COURT AT LAW #2 OF HAYS COUNTY NO. 75862, HONORABLE LINDA ANN RODRIGUEZ, JUDGE PRESIDING M E M O R A N D U M O P I N I O N This case concerns whether a phoned-in tip from an identified motorist was sufficiently reliable to justify an investigative stop of appellant Wendy Winborn for driving while intoxicated. The investigative stop resulted in Winborn's arrest and ultimately, her conviction for driving while intoxicated. We affirm the conviction. The facts are undisputed. On October 9, 2004, Corporal Kathy Anderson of the San Marcos Police Department was on patrol in the San Marcos area. She received a call from dispatch relaying a phoned-in tip from Jerry Hoffman, a truck driver who was driving south on I-35. The information relayed from Hoffman to Corporal Anderson via dispatch was that Hoffman had been following a vehicle since Austin and that he was concerned that the driver of the vehicle was "possibl[y] intoxicated" because the driver was "failing to maintain a single lane." Hoffman reported the vehicle's license plate number and left his name, telephone number, and address with dispatch. After Anderson received this call, she got on I-35 going south and, within a few minutes, identified Winborn's vehicle as the vehicle reported by Hoffman because "it was the same license plate." Corporal Anderson followed Winborn's vehicle for approximately two miles without activating the overhead lights on her patrol car. She testified that, other than observing Winborn's car "going back and forth within its lane of traffic," she did not observe "any traffic infraction" during this time. Once Corporal Anderson activated her overhead lights, Winborn's vehicle "went over into the left lane with two tires on the left side." According to Anderson, Winborn then made a lane change to the right lane using her blinker but "then again [Winborn] went over into the center lane with two tires." After driving approximately one mile further, Winborn stopped her vehicle and was arrested by Corporal Anderson for driving while intoxicated. Winborn was charged by information with driving while intoxicated. In a pretrial motion to suppress, Winborn argued that the evidence supporting the DWI charge was discovered during an improper investigative stop. After conducting a hearing on the motion, during which Corporal Anderson testified, the trial court overruled the motion to suppress. At trial, Winborn entered a plea of nolo contendere to the offense of driving while intoxicated, and the trial court assessed punishment at 180 days in prison, probated for 18 months with conditions of community supervision, and a $600 fine. In one issue on appeal, Winborn contends that the trial court erred in overruling her motion to suppress because Hoffman's tip was not sufficiently reliable to provide Corporal Anderson with reasonable suspicion to justify an investigative stop of her vehicle. A police officer may stop and briefly detain a person for investigative purposes if the officer, in light of his or her experience, has a reasonable suspicion supported by articulable facts that criminal activity may be afoot. Stewart v. State, 22 S.W.3d 646, 648 (Tex. App.--Austin 2000, pet. ref'd) (citing Terry v. Ohio, 392 U.S. 1, 30 (1968)). To justify the investigative detention, the individual officer must have a reasonable suspicion that "some activity out of the ordinary is occurring or had occurred, some suggestion to connect the detained person with the unusual activity, and some indication that the activity is related to a crime." State v. Fudge, 42 S.W.3d 226, 229 (Tex. App.--Austin 2001, no pet.) (quoting Terry, 392 U.S. at 21-22). Questions of reasonable suspicion and probable cause are reviewed de novo. See Guzman v. State, 955 S.W.2d 85, 87-88 (Tex. Crim. App. 1997); State v. Garcia, 25 S.W.3d 908, 911 (Tex. App.--Houston [14th Dist.] 2000, no pet.). When hearing a motion to suppress, the trial court is the sole trier of fact, and, accordingly, the judge may choose to believe or disbelieve all or any part of a witness's testimony. State v. Ross, 32 S.W.3d 853, 855 (Tex. Crim. App. 2000). When, as here, no findings of fact are filed, we must view the evidence in the light most favorable to the ruling and sustain the decision if it is correct on any applicable theory of law. Id. at 855-56. The reasonableness of an investigative detention turns on the totality of circumstances in each case. See Woods v. State, 956 S.W.2d 33, 38 (Tex. Crim. App. 1997). When the police receive information from an informant, the totality of the circumstances includes the veracity and reliability of the informant and the informant's information, as well as the basis for the informant's knowledge. See Illinois v. Gates, 462 U.S. 213, 230-31 (1983). An anonymous tip alone will rarely establish the level of reasonable suspicion required to justify a detention. Florida v. J.L., 529 U.S. 266, 270 (2000); Alabama v. White, 496 U.S. 325, 329 (1990). There must be some further indicia of reliability, some additional facts from which a police officer may reasonably conclude that the tip is reliable and a detention is justified. Pipkin v. State, 114 S.W.3d 649, 654 (Tex. App.--Fort Worth 2003, no pet.). Several Texas courts of appeals have held that a tip from an informant exhibits sufficient indicia of reliability to justify a detention when the informant has placed himself in a position to be easily identified and held responsible for the information provided. See, e.g., Hawes v. State, 125 S.W.3d 535, 540 (Tex. App.--Houston [1st Dist.] 2002, no pet.) (upholding detention based on tow truck driver's call to dispatch reporting erratic driving because tow truck driver was in traceable vehicle and was following defendant); Fudge, 42 S.W.3d at 232 (upholding detention based solely on cab driver's unsolicited in-person report to officer about erratic driving); Garcia, 25 S.W.3d at 913-14 (holding that reasonable suspicion existed after individual "flagged down" officer in parking lot and personally reported incident, even though informant later left scene without identifying himself); State v. Stolte, 991 S.W.2d 336, 342-43 (Tex. App.--Fort Worth 1999, no pet.) (upholding investigative detention based on information from unidentified person relayed to investigating officer by police dispatcher because informant followed vehicle and waited at scene when stop was made); State v. Sailo, 910 S.W.2d 184, 189 (Tex. App.--Fort Worth 1995, pet. ref'd) (upholding stop based on report personally given to officer even though informant drove away before being identified). The State contends that Hoffman's unsolicited, phoned-in tip to the police was sufficiently reliable to justify the investigative detention in this case because he left his name, phone number, and address with dispatch. Winborn, on the other hand, argues that the tip was not sufficiently reliable because it was given to the police over the phone rather than in a face-to-face, in-person manner. Several cases, including Fudge, Garcia, and Sailo, have held that an informant's unsolicited tip was reliable because the informant gave the information to the police in a "face-to-face manner" that also revealed information about the informant, including identity. See Fudge, 42 S.W.3d at 232; Garcia, 25 S.W.3d at 913; Sailo, 910 S.W.2d at 188. In each of these cases, the informant transmitted the information in-person. However, the in-person aspect of the delivery of the tip is not the key to results in these cases. The central point is the credibility and reliability to be given the information delivered by the informant. See Gates, 462 U.S. at 230-31 (1983). This credibility and reliability can be enhanced when something about the informant is known, such as the informant's identity or basis for having the information conveyed. While such information can be effectively conveyed in-person, such face-to-face contact is not the only method by which police can receive credible and reliable tips. The general rule is that "[w]hen the police receive information from a private citizen whose only contact with the police is a result of having witnessed a criminal act committed by another, the credibility and reliability of the information is inherent." Cornejo v. State, 917 S.W.2d 480, 483 (Tex. App.--Houston [14th Dist.] 1996, pet. ref'd). An informant's detailed description of wrongdoing, along with a statement that the informant actually saw the reported event, entitles the informant's tip to greater weight than otherwise might be the case. Hime v. State, 998 S.W.2d 893, 895 (Tex. App.--Houston [14th Dist.] 1999, pet. ref'd) (citing Gates, 462 U.S. at 234-35). Moreover, an officer may rely upon information received through an informant, rather than on his or her direct observation, so long as the officer confirms enough facts so that he or she may reasonably conclude that the information provided is reliable and a detention is justified. See White, 496 U.S. at 330-31. At the suppression hearing, Corporal Anderson showed that she confirmed sufficient facts corroborating Hoffman's tip to justify the investigatory stop of Winborn's vehicle. She testified that Hoffman told dispatch that he had been following a suspicious vehicle south on I-35 since Austin, and he gave dispatch the vehicle's license plate. Several minutes after this report reached Corporal Anderson, she identified a vehicle in the same location and with the same license plate number described by Hoffman. She also stated that while she observed no traffic violations, she observed Winborn's vehicle "going back and forth within its lane of traffic." This observation is consistent with Hoffman's tip that the driver of that vehicle was "possibl[y] intoxicated." An identified informant's phoned-in tip to the police may be sufficiently reliable to justify an investigative detention. For example, in Hime, an informant, Amanda Skelton, called the police to report her observation of an individual's reckless driving. See 998 S.W.2d at 895. Skelton described the suspect's vehicle, erratic driving, and location, and gave her name to dispatch. Id. After the police identified the vehicle matching Skelton's description in the location described by Skelton, they stopped the vehicle and arrested the driver for driving while intoxicated. Id. Although Skelton did not contact the police in a face-to-face manner, "[b]ecause Skelton identified herself by name to the police dispatch operator, she was not an anonymous informant." Id. As a result, the court held that Skelton's tip to the police, plus corroboration by the police of the information relayed by Skelton, justified the investigatory stop. See id. at 896. Winborn contends that her case is similar to Davis v. State, 989 S.W.2d 859, 861 (Tex. App.--Austin 1999, pet. ref'd), in which this Court held that an anonymous tip that served as the sole basis for a detention was not sufficient to create reasonable suspicion. In that case, an officer received a report of reckless driving from dispatch, including the vehicle's description and location, and a statement that three white males inside the vehicle were "possibly smoking marijuana." Id. The informant did not leave a name or address with the dispatcher, and no one stopped at the scene claiming to be the informant. Id. We conclude that the facts of this case are distinguishable from the situation in Davis and are, instead, more closely analogous to the facts presented in Hime. While the informant in Davis did not volunteer identifying information and was never identified, the informant in this case identified himself and put himself in a position to be held responsible for the information provided. Corporal Anderson testified at the suppression hearing that Hoffman left his name and address with dispatch "in case [the police] needed to make contact with him." As a result, Hoffman was not an anonymous informer as in Davis. See Hime, 998 S.W.2d at 895. His phoned-in tip contained indicia of reliability similar to those bolstering reliability of a tip delivered by an informant who flags down the police and delivers the information in person. These indicia of reliability, when combined with Corporal Anderson's observation of Winborn's vehicle consistent with Hoffman's description, and viewed in the totality of the circumstances, provided sufficient reasonable suspicion to justify the investigative stop of Winborn's vehicle. See id. at 896. Having overruled Winborn's sole issue on appeal, we affirm. __________________________________________ G. Alan Waldrop, Justice Before Justices Patterson, Puryear and Waldrop Affirmed Filed: October 12, 2006 Do Not Publish
Earthquake Review and Forecast for January 2016 The last four months has been a story in contrasts as is shown in the table below. Worldwide significant earthquake activity (of magnitude 6.8 and above) for October and December has been no better than average, while in September and November, such seismic events surged to near record levels. In November's forecast, an exceptional window period was pointed out before the three significant earthquakes occurred that fell within its parameters. That happened to occur even while the windows in that month occupied just one third of the time during that month. No similar exceptional period was pointed out for December and, although the windows comprised 56-57 percent of that month, only one of three significant events occurred inside one of the designated window areas. What made the difference in how astrology performed between the months of November and December was the difference in the over-all significant seismic activity. The best way to gauge the activity from month to month would seem to be by counting the number of earthquakes that registered from 6.4 to 6.7 in magnitude. In November, it was twice as active as the average and in December it was one third of the average. What threw things off and made them seem a bit more like average in December, was the two events that occurred in the 7.1 magnitude or above range (or twice the average rate of occurrence). In general, my research has uncovered a period of time when significant seismic events are more prone to be aligned with astrological factors. Such times are when activity is obviously above average. But, also in general, although the larger the earthquake, the more likely they are to be related to astrological factors, if they lie outside an astrologically defined window area they are more likely to be random (even if they are above 7 in magnitude). An average month, in the 6.8 magnitude or above category, would be two such earthquakes per month. However, this can vary from one to three a month and still be average. In December there were three such quakes. The usual breakdown has one of two such quakes in a given month as being related to astrological factors and the other one would be random. When there are three such quakes, the majority can go either way. In December, random behavior came up on top. Again, the lack of overall activity was key. January's activity may not be any more than December's, but there are still peaks within two window periods that stand out. The first peak occurs at 0145UT on January 13th and the second peak happens at 1445UT on the 17th. It is estimated that, for 8 hours before to 16 hours after these peaks, there is at least a 2.5 times greater chance of a significant seismic event occurring than is normal. Both periods of time have potential epicenter zones in Papua New Guinea or the Solomon Islands region, Kamchatka or the Aleutian Islands region, along with Chile or Mexico. Other potential epicenter locations for the first peak relate to the Pakistan/Afghanistan/Turkmenistan areas as well as to the Peru/Colombia/Dominican Republic areas. The second peak also relates to Iran and New Zealand. Although December 2015 did not stand out as noteworthy when it came to the amount of significant seismic activity, it did produce some results that may have raised eyebrows. For example, the event of magnitude 7.1 which happened on December 4 in the Southeast Indian Ridge zone, would seem to have been a fairly rare event (in regards to the magnitude size of the occurrence for that location; the ones that came before it in the 20th & 21st centuries have been in the 6.4-6.6 range). A less rare, but curious quake occurred two hours into the month of January 2016 (Universal Time). At that time, a magnitude 6.3 seismic event occurred in the Western Indian-Arctic Ridge, between 5 and 6 thousand kilometers east of where the earlier event happened. The largest earthquake to occur there since 1900 was a 6.9 magnitude event nine years ago and the most recent comparable event was a 6.4 magnitude shock 4.5 years ago. Another series of interesting events took place in the 4.1 to 4.9 magnitude range in North America as shown above. Out of the ten earthquakes with that magnitude range that occurred there, 80% happened during the week of 23 December to 30 December, with the most striking series occurring during a 20 hour period on the 29th and 30th of December. Looking at similar flare ups in the past, this could be a sign of a 7.5 magnitude or greater earthquake occurring, somewhere in the world, 3 months later or in late March 2016. Interestingly, there were two similar sized shocks in the Edmond, Oklahoma area, a 4.3 magnitude shock on 29 December followed by a 4.2 quake almost exactly 3 days later. That last earthquake occurred during the first day of January 2016. The astrologically defined window areas for the month of January 2016, occupy 66.9% of the month. Usually, when there is such a high percentage, that is usually due to the peaks in Astro-aspect values being lower than average. As a result, it is not expected that the month will be very active (probably no more than three significant earthquakes of magnitude 6.8 or above). Below are the window areas and peaks within them for the month of January 2016, representing the most likely periods for worldwide earthquakes of at least 6.8 magnitude to occur. Potential epicenter locations are also given for each window. 2016-01/02.0 to 01/03.0 (24 hrs); 10% chance (normal=6.5%); peaks at 0800UT on 01/02 (value of roughly 7): Sumatra, Turkey, Nepal, India, Pakistan, Afghanistan, Turkmenistan, Iran, Iraq, Papua New Guinea, Solomon Islands. 2016-01/05.5 to 01/07.5 (48 hrs); 25% chance (normal=13%); peaks at 2000UT on 01/06 (value of roughly 9): Papua New Guinea, Solomon Islands, Iran, Kamchatka, Sumatra, Nepal, India, Iran, Iraq, Turkey. 2016-01/10.125 to 01/14.25 (4days3hrs); 70% chance (normal=27%); peaks at 0145UT on 01/13 (value=14.48): Papua New Guinea, Solomon Islands, Kamchatka, Aleutians, Pakistan, Afghanistan, Turkmenistan, Chile, Peru, Colombia, Dominican Republic, Mexico. 2016-01/15.5 to 01/16.625 (27 hrs); 10% chance (normal=7%); peaks at 0000UT on 01/16 (value=roughly 8.75): Kamchatka, Aleutians, New Zealand, southern Chile, Mexico, Papua New Guinea, Solomon Islands, Nepal. 2016-01/17.125 to 01/19.25 (2d3h); 50% chance (normal=13%); peaks at 1445UT on 01/17 (value=roughly 13.4): Papua New Guinea, Solomon Islands, Kamchatka, Aleutians, Iran, New Zealand, Chile, Mexico. 2016-01/19.875 to 01/25.25 (5d6h); 50% chance (normal=35%): Papua New Guinea, Solomon Islands, Sumatra, Nepal, India, Iran, Iraq, Pakistan, Afghanistan, Turkmenistan, Turkey. 2016-01/27.0 to end of month (5 days); 65% chance (normal=32%); peaks at 2100UT on 01/28 (value=10.5): Papua New Guinea, Solomon Islands, Iran, Iraq, Turkey, India, Nepal, Pakistan, Afghanistan, Turkmenistan. © 2016 Joseph Ritrovato Comments No comments yet.
https://hubpages.com/education/Earthquake-Review-and-Forecast-for-January
What is a psilocybin experience like? After seeing the popularity of my recent post: What is an LSD experience like? I decided to do a follow up about psilocybin. Psilocybin is the psychedelic compound found in magic mushrooms and truffles, and although very similar to the LSD experience, it does have one or two differences. As with the LSD post these were taken from a study which looked at aspects similar amongst people‘s psilocybin experiences. All of these findings were presented in a talk by Katrin Preller which you can view online: How Psychedelics Can Help Us Understand Social Cognition and Self-Experience. I think the list provides an excellent summary of common psilocybin experiences. Subjective Effects of Psilocybin - Elementary visual alterations - Vivid imagery - Audio-visual synesthaesia - Changed meaning of percepts - Experience of unity - Blissful state - Disembodiment - Impaired control and cognition - Insightfulness - Religious experience - Anxiety The diagram below shows us which of the subjective effects were felt most strongly under the influence of psilocybin. I have ordered the list above in order. As you can see, elementary visual alterations scores highest, and anxiety lowest. Course of Subjective Effects of Psilocybin This chart shows the course of a psilocybin journey including the intensity of the effects over a timeline. As you can see the peak is around 1 hour in with ‘transient peaks of self transcendence’.
https://mapsofthemind.com/tag/magic-mushrooms/
El dugongo o dugón (Dugong dugon) es el sirenio actual de tamaño más pequeño, único representante de su género y el único miembro sobreviviente de la ... - Dugong - Wikipedia, the free encyclopediaen.wikipedia.org The dugong (Dugong dugon) is a large marine mammal which, together with the manatees, is one of four living species of the order Sirenia. It is the only living ... - ADW: Dugong dugon: PICTURESanimaldiversity.ummz.umich.edu dugong. Dugong dugon. To cite this page: Myers, P., R. Espinosa, C. S. Parr, T. Jones, G. S. Hammond, and T. A. Dewey. 2012. The Animal Diversity Web ... - Dugong dugon (Dugong, Sea Cow)www.iucnredlist.org Dugong dugon. Status_ne_off Status_dd_off Status_lc_off Status_nt_off Status_vu_on Status_en_off Status_cr_off Status_ew_off Status_ex_off. Summary ... - Dugong dugon - EDGE :: Mammal Species Informationwww.edgeofexistence.org Factsheet from EDGE, a conservation organization that focuses specifically on threatened species that represent a significant amount of unique evolutionary ... - Dugong dugon — Dugongwww.environment.gov.au The current conservation status of the Dugong, Dugong dugon, under Australian and State/Territory Government legislation, and international conventions, is as ... - ARKive - Dugong videos, photos and facts - Dugong dugonwww.arkive.org Learn more about the Dugong - with amazing Dugong videos, photos and facts on ARKive. - Dugongs, Dugong dugon at MarineBio.orgmarinebio.org Dugongs, Dugong dugon, Mammalia, Sirenia, Dugongidae, Descriptions and Fascinating Facts, World Ranges and Habitats, Feeding Behaviors, Life History, ... - Dugongs, Dugong Pictures, Dugong Facts - National Geographicanimals.nationalgeographic.com Learn all you wanted to know about dugongs with pictures, videos, photos, facts, and news from National Geographic. - Dugong dugon - YouTubewww.youtube.com 29 Feb 2008 ... Loading comment... Loading... Baby Dugong 2:01. Watch Later Baby Dugongby oasishdchannel17,548 views · Elefante Marino Enfadado 1:15 ... - Dugong: Dugong dugon - Queensland Museum - Queensland ...www.qm.qld.gov.au Information from the Queensland Museum on conservation efforts in the Great Barrier Reef Marine Park area. - Dugong (Dugong Dugon) - Animals - A-Z Animals - Animal Facts ...a-z-animals.com The dugong is a large marine mammal found in the warm waters surrounding Indonesia and Australia. Although the dugong can be found widely throughout the ... - Dugong (Dugong dugon) - Animals Wildlife - About.comanimals.about.com Dugongs (Dugong dugon) are marine mammals that grow to lengths of up to three meters and weigh as much as 400 kilograms. - Dugong - Marine Life Profile Of the Dugong - Dugong dugonmarinelife.about.com Dugongs join manatees in the Order Sirenia, the group of animals that inspired tales of mermaids. With their grayish-brown skin and whiskered face, dugongs ... - Dugong Status Report and Action Plans for Countries - UNEPwww.unep.org Cover Photograph: Dugong (Dugong dugon). © Doug Perrine/seapics.com. DISCLAIMER. Information for maps was sourced from the Macquarie Illustrated ... - Society for Marine Mammalogy - Dugong (D. dugon)www.marinemammalscience.org Dugongs have been known to traditional peoples for thousands of years. Pre- historic exploitation of dugongs has been confirmed by archaeological evidence at ... - Significado de la palabra en el diccionario (Dugong dugon-Español ...www.almaany.com Significado de Dugong dugon no dicionário Almaany, na Categoria de Dugong dugon , no dicionário Español. Un diccionario que contiene los significados de ... - Dugong dugon (Müller, 1776) - World Register of Marine Specieswww.marinespecies.org Status, accepted. Record status, Checked by Taxonomic Editor. Rank, Species. Parent, Dugong Lacépède, 1799. Sources, basis of record: Domning, Daryl P. - Species Profile for dugong (Dugong dugon)ecos.fws.gov Listing Status: Quick links: Federal Register Recovery Critical Habitat Conservation Plans Petitions Life History Other Resources ... - Observations of the Dugong Dugong dugon in Con Dao National Parkwww.sirenian.org Observations of the Dugong Dugong dugon in Con Dao National Park, Vietnam, and recommendations for further research. Nick Cox, February 2002 ...
http://www.encontrar-todos.com/w/dugong+dugon
Jackson Roloff is known to be a bit of a daredevil. He loves to explore the family farm with his grandpa Matt. Tori Roloff took the tyke on his first roller coaster ride ever. Did Jackson Roloff enjoy the amusement park staple or was it a bit too adventurous for him? Keep reading to see Jackson’s reaction. Tori Roloff Keeps Jackson Busy During Summer Break Little People, Big World fans have watched Jackson Roloff grow up before their very eyes. The bold offspring of Zach and Tori Roloff has the same daredevil personality of his dad. Jackson enjoys tinkering around Roloff Farms with his grandfather, Matt, or his uncle Jacob. Earlier this summer, Tori Roloff took Jackson for an outing at Disneyland in California. After returning to Oregon, the whole family took a day trip to a local lake. Lilah Roloff had so much fun in the sun that she couldn’t keep her eyes open. As mentioned on the current season of LPBW, Jackson started school this year. Tori wanted to make the most of their summer break before he heads back. Jackson Roloff’s First Roller Coaster Ride – Part One Video A few days ago, Tori Roloff took to her Instagram Stories to share her latest adventure with Jackson. They visited the Enchanted Forest amusement park in Salem, Oregon. Tori only shared videos of Jackson, so it’s unclear if Lilah and Zach were there, too. Jackson is a pretty fearless kid. So, Tori thought she would take him on his very first roller coaster ride. Of course, mom filmed the experience. Tori shared three videos of Jackson’s reaction. In the first video, Jackson looked on with wonder as the roller coaster ride starts. See his cute reaction: Part Two Video – Not Too Sure About This, Mom Tori’s caption on the first video gives away that Jackson’s initial enjoyment quickly took a wrong turn. In the first video, she wrote that Jackson complained when the roller coaster ride got rough. In the second video Tori shared, you can see Jackson’s look of wonder turn to one of unease. He’s clearly no longer a fan of the roller coaster ride. Did Jackson Roloff Like His First Roller Coaster Ride? – Final Video Kids are a fickle beast. Something fun can quickly turn into a scary experience. Was that the case with Jackson Roloff? As the ride comes to an end, Tori asks Jackson if he liked it. In the final video, Jackson Roloff gives his assessment of his first roller coaster ride. Overall, did he like it? He answered with a resounding “no!” Do you think Jackson Roloff is too young for his first roller coaster ride? Share your thoughts on the videos in the comments below. Don’t miss the season finale of Little People, Big World on Tuesday, August 10. Watch it on TLC or stream it on discovery plus.
https://www.tvshowsace.com/2021/08/08/lpbw-jackson-roloff-first-roller-coaster-ride-video/
In the first quarter of 2021, the Sheldrick Wildlife Trust (SWT), in partnership with the Kenya Wildlife Service (KWS) and their five dedicated field veterinary officers, attended to 115 wildlife cases. Of the 115 cases, 25 cases were related to poaching and 23 to human-wildlife conflict. Of the poaching cases, 11 involved elephants which included 5 snared, 4 speared, 1 arrowed and 1 post-mortem with evident human involvement and missing tusks. There were 7 human-elephant conflict cases most of which were related to crop raiding and fence breaking, which is usually to access farms outside the Conservation Areas. One notorious crop raiding bull had to be relocated far away from human settlements. Other elephant cases included 5 treatments for natural causes, 8 post-mortems, assumed to be natural deaths and 1 rescue. The majority of the non-elephant cases was for plains game, namely 16 zebras, 1 eland, 19 bongos, 2 oryx, 1 generuk and 1 kudu. 10 of the zebras were treated for poaching wounds; 9 snares and 1 arrow. 3 giraffes were also snared and another treated for an arrow wound. Sadly 1 of the snared giraffes succumbed to its injuries. 7 giraffes were trapped within a fenced area meant for crops. The owners successfully drove out 3 of them but unfortunately, the remaining 4 died before the Vet Unit could get there. 12 predators were involved in human-wildlife conflict in 10 separate cases. 2 lions and 3 hyenas were all poisoned as retaliation for livestock predation. 4 lions and 1 spotted hyena were relocated back into protected areas after the communities reported they were preying on livestock, another lion accidentally became trapped in a boma and had to be relocated back into the park and a 3rd was speared to death as revealed by a post-mortem.
https://www.sheldrickwildlifetrust.org/news/vet/quarterly-vet-report-january-to-march-2021
CUDA Application Design and Development Description: As the computer industry retools to leverage massively parallel graphics processing units (GPUs), this book is designed to meet the needs of working software developers who need to understand GPU programming with CUDA and increase efficiency in their projects. CUDA Application Design and Development starts with an introduction to parallel computing concepts for readers with no previous parallel experience, and focuses on issues of immediate importance to working software developers: achieving high performance, maintaining competitiveness, analyzing CUDA benefits versus costs, and determining application lifespan Written by Rob Farber, author of the popular "Super Computing for the Masses" series in Dr Dobbs Journal. Book Cover: As the computer industry retools to leverage massively parallel graphics processing units (GPUs), this book is designed to meet the needs of working software developers who need to understand GPU programming with CUDA and increase efficiency in their projects. CUDA Application Design and Development starts with an introduction to parallel computing concepts for readers with no previous parallel experience, and focuses on issues of immediate importance to working software developers: achieving high performance, maintaining competitiveness, analyzing CUDA benefits versus costs, and determining application lifespan. The book then details the thought behind CUDA and teaches how to create, analyze, and debug CUDA applications. Throughout, the focus is on software engineering issues: how to use CUDA in the context of existing application code, with existing compilers, languages, software tools, and industry-standard API libraries. Using an approach refined in a series of well-received articles at Dr Dobb's Journal, author Rob Farber takes the reader step-by-step from fundamentals to implementation, moving from language theory to practical coding. Includes multiple examples building from simple to more complex applications in four key areas: machine learning, visualization, vision recognition, and mobile computing Addresses the foundational issues for CUDA development: multi-threaded programming and the different memory hierarchy Includes teaching chapters designed to give a full understanding of CUDA tools, techniques and structure. Presents CUDA techniques in the context of the hardware they are implemented on as well as other styles of programming that will help readers bridge into the new material
Camera perspective distortion in model-based visual localisation. (2019-02-22)This thesis starts with a proposal for a collaborative global visual localization system. Then, it centres in a specific visual localisation problem: perspective distortion in template matching.The thesis enriches 3D point ... - Application of machine learning techniques to weather forecasting (2019-02-11)El pronóstico del tiempo es, incluso hoy en día, una actividad realizada principalmente por humanos. Si bien las simulaciones por computadora desempeñan un papel importante en el modelado del estado y la evolución de la ... - Cloud point labelling in optical motion capture systems (2019-02-15)This Thesis deals with the task of point labeling involved in the overall workflow of Optical Motion Capture Systems. Human motion capture by optical sensors produces at each frame snapshots of the motion as a cloud of ... - Contributions to virtual reality (2019-01-18)The thesis contributes in three Virtual Reality areas: ¿ Visual perception: a calibration algorithm is proposed to estimate stereo projection parameters in head-mounted displays, so that correct shapes and distances can ...
https://addi.ehu.es/handle/10810/12144
Who Pays for Maintenance in my NSW Strata Apartment? If you’re living in a strata building, it’s important to know who’s responsible for the maintenance costs in and around your apartment or lot. Here’s a quick rundown of which costs are paid by the owners corporation and which costs are paid by the owner. Keep in mind, though, that strata schemes can vary from building to building – so it’s always best to check with your strata manager if you’re unsure of who should be paying for maintenance. General rules of responsibility for maintenance in a NSW strata scheme Whether it’s maintenance work or repairs that need to be done, here’s a breakdown of common areas and who’s responsible for paying: Ceilings/roof The owners corporation must pay for maintenance inside the ceiling or on external areas such as ceiling cornices, TV aerials, plastering, or exhaust fans. The owner is responsible for paintwork done on ceilings inside the apartment, as well as certain interior ceiling features (this varies depending on the strata scheme). Walls Owners corporation must maintain or repair anything in the boundary walls. The owner holds responsibility for maintaining and repairing walls inside the apartment. Balconies External features like columns and railings are strictly the responsibility of the owners corporation. Other features like doors, tiles, and awnings may need to be paid for by the owner or the owners corporation depending on the scheme and the location of the feature. Light fittings If the light fittings are recessed in the ceiling, they are the owners corporation’s responsibility. If they hang into the apartment, they are the owner’s responsibility. Carpets The owner must pay for cleaning and maintenance of interior carpeting. The owners corporation repairs and maintains common property carpets, such as carpets in hallways. Plumbing According to Strata Community Australia NSW, the owners corporation is responsible for fixing the following plumbing problems: - Blocked floor drains - Blocked sewers - Guttering on townhouses - Main stopcock to apartment Other issues that are more of a grey area include: - Damage to apartment from water leak - Dampness in an apartment - Water seeping into garage - Water leaking from shower - Water leaking through tiles Generally speaking, if the area affected (such as a leak or a blockage in a pipe) is in an external area of the building, it’s the responsibility of the owners corporation. If it’s within the interior of an apartment, the owner is responsible for paying. The same goes for general maintenance. For more information, see our guide to strata plumbing. Outdoor areas Your strata plan should outline the boundaries of common garden areas and courtyards. Maintenance of these common areas typically falls with the owners corporation. However, if you have a private courtyard or trees growing within your lot, you are responsible for maintenance such as pruning or mowing. Windows Maintenance of windows and security doors should generally be paid for by the owners corporation, but there are some exceptions. Remember the above is general in nature and can vary from building to building so it’s always important to check with your strata manager first about who is responsible for repairs that come up in your strata building. To find out more about maintenance and repairs costs in NSW strata apartments, see Strata Community Australia NSW’s guide to common property.
https://jamesons.com.au/blog/pays-maintenance-nsw-strata-apartment/
MovementTouch z.s. is a registered nonprofit organisation supporting creative approaches in the arts and use of new technologies; encouraging the creation of new performances, installations and other art events; providing art education for children and adults; and fostering collaborations at interdisciplinary and international level. Jana Bitterová is a dance artist – choreographer, performer, improviser and creative movement facilitator. Jana is a founder and chairwoman of MovementTouch. The newest project A unique multimedia performance which connects the events in two different towns into a unified audience experience. A fusion of contemporary dance, music and the newest technologies creates the specific genre of Networked Performance, presented for the first time between Czech theatres. In the world inhabited by physically present, remote and virtual actors, who is The Real One?
http://movementtouch.com/
The advancements in the field of analytical chemistry, and especially mass spectrometry, have been redefining the field of contaminant detection. While more traditional analysis was sufficient to screen for a small number of well-known compounds, new techniques such as high-resolution mass spectrometry, have enabled a fairly comprehensive screening for previously unknown contaminants. This is enormously beneficial with respect to the analysis of water, air, or soil quality in a society that continuously introduces novel anthropogenic compounds into the environment. This dissertation, thus, focused on the analysis of the uncharacterized portion of compounds in two types of complex environmental matrices (i.e., crude oil and wastewater). First, targeted and non-targeted analyses were used in order to characterize a crude oil weathering series. Traditional techniques were used for the analysis of well-known oil components and led to the confirmation of biodegradation and photo-degradation trends. An ultrahigh-resolution mass spectrometric analysis was carried out in conjunction with several visualization plots in order to search for unknown compounds. While the study successfully detected a drastic increase in oxygenated components (likely ketones, quinones, and carboxylic acids), it also revealed severe limitations in the state of the art non-targeted crude oil analysis. Some of these limitations were explored in an in-depth atmospheric pressure ionization study of model petroleum compounds, and the dependence of ionization efficiency on numerous factors (e.g., size, heteroatom content, and methylation level) was shown. Since disregarding these intrinsic limitations leads to severely biased conclusions, these results provide crucial information for future crude oil characterization studies. Lastly, suspected and non-targeted analyses were used to evaluate contamination levels in wastewater-impacted interrelated water samples. A significant number of persistent compounds were tentatively identified, which represents an area of environmental concern that needs to be addressed further. Overall, this dissertation successfully applied non-targeted (in addition to targeted) analysis in order to screen for non-characterized compounds in crude oil and wastewater affected water samples. By doing so, the great potential of the growing field of non-targeted screening in order to expand the range of contaminants to include previously unknown and emerging compounds was highlighted. Huba, Anna Katarina, "Going Beyond the Analysis of Common Contaminants: Target, Suspect, and Non-Target Analysis of Complex Environmental Matrices by High-Resolution Mass Spectrometry" (2016). FIU Electronic Theses and Dissertations. 3048.
https://digitalcommons.fiu.edu/etd/3048/
Using elements of a variety of different music education approaches, my aim is to assist my students of all ages to become well rounded musicians, proficient in performing solo and chamber works, improvising and composing, and developing a well grounded theoretical understanding of music. For each student I carefully plan a learning pathway using traditional cello techniques combined with the philosophies of the Dalcroze approach, which encourages physical musical experiences before theoretical explanations, and plenty of improvisation and aural training. I am currently working towards my Intermediate certification in the Dalcroze approach. I firmly believe that any student is capable of becoming a musician, and I hope to facilitate their development in a warm, supportive, and engaging learning environment. All ages welcome – contact me for available lesson times.
https://www.austa.asn.au/teacher/isabella-ambrose/
Global warming is a progressive gradual rise in the earth's area temperature regarded as caused by the enhanced greenhouse effect and accountable for changes in global climate patterns. The green house effect is a term used to describe the functions of drinking water vapor, carbon dioxide, and other search for gases in keeping the Earth's surface warmer than it might be otherwise. These types of "radiatively active" gases happen to be relatively translucent to inbound shortwave rays, but are fairly opaque to outgoing longwave radiation. These radiation, which will would or else escape to space, is trapped by these fumes within the lower levels of the ambiance. The subsequent reradiation of a number of the energy back to the surface maintains surface conditions higher than they would be in case the gases had been absent. There is concern that increasing concentrations of green house gases, including carbon dioxide, (the carbon dioxide exhausts are generally caused by the utilization of fossil fuels intended for energy) methane, and manmade chlorofluorocarbons, might enhance the greenhouse effect (this is called the improved greenhouse effect) and trigger global warming. There are many important factors that contain caused the increase in greenhouse gases over the past 200 years. Fossil fuels - coal, olive oil and natural gas - consist of carbon. If they are burnt as a source of energy, they will release co2. The global demand for energy, primarily from non-renewable fuels, has grown for an average twelve-monthly rate of around two percent for almost two centuries - although the demand for energy varies considerably as time passes and amongst different parts. The burning of non-renewable fuels on a global scale makes around 20 billion soucis of carbon each year. About half of these exhausts are assimilated by oceans and crops. The rest stays in the ambiance. Deforestation likewise contributes to increases in co2, although over a much smaller scale, through the using and decaying of vegetation. The lowering of vegetation does mean that there are fewer plants to soak up the gas. Methane has various sources including vegetarian animals just like sheep and cattle that release this as a byproduct of digestion, rice paddies, land floods and forest fires. It can also enter the ambiance from natural gas fields and coal puits. There are various options for nitrous oxide such as the use of fertili...<!- pref -> ... We all as a community community need to seriously make a move drastic to slow down the procedure for global warming, otherwise we may find ourselves in a situation where all of us can't turn back the hands of time and we're battling because of Around the world. We need to be sure that future ages can live a happy and uncomplicated existence; they should not have to experience the influences of Global heating that we (the current generation) have mainly caused. BIBLIOGRAPHY: - Macmillan Senior Geography 1 book. "Bush Administration Launches Ancient Federal Weather Change Initiatives". US Local climate Change Technology Program. (Accessed 23 Nov 2006). "Executive Summary Climate Change". The White House. (Accessed 23 Nov 2006) http://www.whitehouse.gov/news/releases/2002/02/climatechange.html>. "The Kyoto Protocol". Matthews, J. EGEE 101 Lessons 10 On the net Course Articles. (Accessed twenty three Nov 2006).. "Overview: The advantages of the Best Obtainable Science to Address Global Climate Change Issues". 24 Come july 1st 2003. http://www.climatescience.gov/Library/stratplan2003/vision/overview.htm>.
https://studybay.com/blog/global-warming-dissertation-environmental-climate/
Anne Curtis starts her special day with "a morning of fitness." Today, February 17, 2017, the Kapamilya actress turns 32. Earlier, the birthday girl had "hill sprints" with her fiance Erwan Heussaff, friends Kim Atienza, Nico Bolzico, Isabelle Daza, Carla Humphries, and non-showbiz friends. It was followed by Anne's birthday breakfast. Of course, her "mon amour," who's a foodie and a chef, prepared something special: "a proper fry up" or Full English Breakfast for the group. What's a birthday party without a beautifully-designed cake? When she was launched as the new celebrity endorser of Jollibee on February 15, 2017, the It's Showtime host told the press that she only has one wish for her birthday. And that's to have a "smooth-sailing wedding planning" with her soon-to-be husband Erwan. Although she has not divulged any detail, the Kapamilya star assured that she would like to "share" that big moment in her life with the public. The couple got engaged in November 2016, at the Steep Rock Preserve, a 974-acre preservation known for its hiking trails, in Washington, Connecticut.
https://www.pep.ph/lifestyle/celebrations/34808/anne-curtis-has-only-one-wish-for-her-birthday?ref=article_tag
ACFOA CONTACT: Ph: 02 6281 9200 [email protected] Note: This is a summary from agencies active in Iraq and the region - it does not include all response activities by ACFOA members. The following Australia agencies that are collecting donations to assist the people of Iraq are signatories to the ACFOA Code of Conduct which requires high standards of public accountability: AngliCORD Contact: Greg Thompson Tel. (03) 9882 6517 or Mob. 0438 826 511 Supporting Action by Churches Together (ACT) network in Iraq and region and will consider an appeal based on need. Tax deductible donations call 1800 249 880. AUSTCARE (Australians' Caring for Refugees) Contact: Mike Smith Tel. (02) 9565 9111 or Mob. 0439 490 297 Monitoring the situation closely in Iraq, and has provision to partner with an international medical NGO. Should a public appeal be necessary, funds will be raised to help provide essential medical supplies and medical teams to treat Iraqis suffering the horrors of war, and for the critical post-conflict reconstruction. Australian Red Cross Contact: Ian Woolverton Tel. (03) 9345 1868 or Mob. 0418 526 850 There are currently three Australian Red Cross delegates in the Iraq region. No additional Australian delegates will be sent for the moment, however there are several more people on standby should the need arise. Australian Red Cross is working within the extensive operations of the Red Cross / Red Crescent Movement, primarily in the health and water and sanitation areas, along with the logistics pipelines necessary for implementation. www.redcross.org.au Australia for UNHCR Contact: Naomi Steer, Tel: 02 9262 5377 Mobile: 0403 325 377 UNHCR, The UN Refugee Agency, is working to protect and assist refugees in the region. UNHCR has been prepositioning emergency stocks - tents, blankets, plastic tarpaulins, mattresses, stoves, kitchen sets etc - for a possible 600,000 Iraqi refugees in Turkey, Iran, Syria and Jordan. UNHCR has appealed for $US60m to purchase necessary supplies and to operate the camps for one month, with $US22m received to date. In the event of refugee flows, UNHCR will focus on its mandated international protection role, including monitoring in support of keeping the borders open and ensuring that the rights of refugees are respected. Additionally, UNHCR will register refugees and will seek the continued protection of some 100,000 refugees already living in Iraq. UNHCR will also work with governments to provide essential services, including food, basic shelter, water, sanitation facilities, health care and clothing. Tax deductible donations call 1300 361 288. Baptist World Aid Contact: Les Fussell Tel. (02) 9451 1199 Are currently accepting donations and will work through a local partner for relief work in Iraq. A small amount has already been sent to the Northern border to help with medical relief for Kurdish refugees arriving there. Donations: 1300 789 991. CARE Australia Contact: Kerry Taylor Tel. (02) 6279 0250 or Mob. 0419 567 777 CARE Australia has worked continuously in central and southern Iraq since 1991 and has expertise in water and sanitation as well as health. Efforts now will concentrate relief efforts on water, health and food distribution in Iraq. Have established a Regional Co-ordination unit in Amman, Jordan to prepare emergency relief response and help refugees in the region. Australians on the ground in Amman at forefront of emergency response. Available spokespeople are CEO Paul Mitchell and Robert Yallop (who started CARE's work in Iraq in 1991) as well as workers on the ground. Tax deductible donation call 1800 249 880. Caritas Contact: Katie Ritchie Tel. (02) 9956 5799 or Mob. 0417 284 831 The Caritas Internationalis network is working in Iraq, Northern Iraq, Iran, Lebanon, Jordan, Syria and Turkey to prepare for the expected flows of displaced persons and to provide medical, food and shelter relief for Iraqi civilians in the event of a conflict. In Iraq, Caritas Australia is supporting local partner, Caritas Iraq, to cope with an emergency situation should there be a strike on Iraq. Caritas Iraq is working with the Iraqi Red Crescent and Red Cross and has equipped 40 medical centres with medical equipment. It has also trained 42 doctors and 220 volunteers for emergency and field medical responses. Caritas Iraq has taken measures to ensure water supplies by digging surface wells in Caritas Centres and Churches. Further water and sanitation preparation is under way. Caritas Iraq also has a support base in Jordan preparing for emergency responses after a possible conflict. Caritas Australia will consider an appeal based on need. Tax deductible donations call 1800 024 413. Christian Blind Mission International (CBMI) Contact: Eric van Cuylenburg Tel. (03) 9816 1586 Mob. 0417 129 575 CBMI has developed special aid programs to cope with the influx of refugees expected to flee Iraq to neighbouring countries. In close cooperation with other aid organisations, CBMI will care for refugees with war related injuries such as severe eye and ear damage, or urgent need for orthopaedic intervention and care. Patients with severe injuries will be sent immediately to the CBMI-supported Hospital in near by Amman, capital of Jordan. CBMI will also send a team of medical staff into the field hospitals at the Iraq-Jordan border, providing medical intervention at the border camps to optimise the care of those injured, and thus minimise the possibility of them developing permanent disabilities. Muslim Aid Australia ph. 02 9740 4143 Has launched an Iraqi Emergency Appeal for the provision of Medical Aid, Infant Formula, Water Purification, Food Parcels, Clothing, and Blankets. Donations 1800 100 786 National Council of Churches (NCCA) Contact: Caesar D'Mello Tel. (02) 9299 2215 Working with Middle East Council of Churches as the regional coordinating body based in Amman. NCCA will contribute funds through the ACT Network. MECC is working in collaboration with Iraq Red Crescent, Lutheran World Service & Norwegian Church Aid. Support will be for stockpiling food, medicine, water and shelter. Tax deductible donations call 1800 025 101. Oxfam Community Aid Abroad Contact: Carly Hammond Tel. (03) 9289 9413 or Mob. 0409 181 454 OCAA working with Oxfam International (OI) will provide water facilities & environment health support to refugees in Iran, Syria, Turkey & Jordan as required. OCAA has contributed to a public health training program for UNICEF staff in Syria, Jordan and Iran in preparation for the outbreak of war. OI has established offices in Amman, Teheran, Turkey and Syria in order to respond if refugee movement occurs. OCAA staff will be deployed as regional environmental health advisors to the OI program. Spokesperson for OCAA is CEO Andrew Hewett. OCAA are taking donations for people affected by the war in Iraq. Tax deductible donations call 1800 034 034. Overseas Pharmaceutical Aid for Life (OPAL) Contact: Geoff Lockyer/Dara Lockyer Tel. 08 8359 6055 Mob. 0419 825 305 OPAL will commence to prepare emergency medical kits for the field. OPAL currently working with another group Co-Aid. OPAL requested by Medicines Australia to coordinate donations of products from the pharmaceutical manufacturers. Will work with other aid organisations on the ground regarding the supply and distribution of these emergency medical kits if required. Tax deductible donations call (08) 8359 6055. Samaritan's Purse Contact: Ian Lucas Tel. (02) 9676 4055 or Mob. O417 067 097 Samaritan's Purse International Relief (SPIR) will focus its initial efforts to address the most basic, immediate needs of the Iraqi people. A forward base of operation established in Amman. SPIR equipped to rapidly respond in the following four areas: Health: respond to the basic health needs of 100,000 people for 3 months, Water: An emergency water treatment, storage and distribution system will be stocked to respond to the water needs of 20,000 people, NFI (Non-Food Items) and Hygiene Kits: preparing kits for internally displaced people for immediate distribution to 5,000 families and Shelter: Enough UV treated, reinforced plastic sheeting will be on hand to provide 4,200 families with at least a 6m x 6m sheet of plastic. SPIR has personnel located in Amman, Jordan and will work through national partners where practical. Tax deductible donations call (02) 9676 4055. Save the Children Contact: Ann Wigglesworth Will support Save the Children UK response. Donations can be made on line at or by post to SCA, PO Box 767, Hawthorn 3122.International Save the Children Alliance Summary of Emergency Appeal TEAR Australia Contact: Lyn Jackson Tel. (03) 9877 7444 Will support Tearfund UK response. Tearfund UK is mobilizing staff in Jordan and Iran, in preparation for the humanitarian crisis that will result from military intervention. TEAR Aust is preparing to provide support to existing agencies in the region, through Tearfund UK. UNICEF Contact: Pam Garcia Tel. (02) 9261 2811 or Mob. 0413 736 447 UNICEF Australia is supporting UNICEF's rapid emergency response for children & women in Iraq & the surrounding region of Iran, Turkey, Syria & Jordan. UNICEF has conducted a preventive campaign to bolster children's health and nutrition during the conflict by immunising children against measles and providing high energy biscuits and therapeutic milk to malnourished children. UNICEF has shipped thousands of tonnes of relief supplies to the region, including emergency health kits, vaccines, nutritional supplements such as high protein biscuits and therapeutic milk, educational supplies, water storage units, water purification tablets, hygiene items, blankets and shelter material. Supplies will be distributed through UNICEF offices in Iraq, Iran, Turkey, Syria and Jordan. UNICEF is the lead agency for the provision of clean water and sanitation in Iraq and the surrounding region and is responsible for the provision of non-food items within and outside of Iraq. UNICEF will provide ongoing water and sanitation services support to Baghdad, & will provide water purification tablets, rehabilitate water treatment plants, & restore sewerage services across Iraq. UNICEF will play a major role in children's health, nutrition, education and protection. Tax deductible donations call 1300 132 370 Union Aid Abroad/APHEDA Contact: Peter Jennings Tel. (02) 9264 9343 or Mob. 0409 047 353 Established alliance with European labour network. Launching an appeal for funds to support relief efforts with refugees in Suleimaniya in northern Iraq in cooperation with Norwegian People's Aid and Swiss Workers' Aid. Tax deductible donations call 1800 888 674. World Vision Australia Contact: Stacy Hume Tel. (03) 9827 2356 or Mob 0403 989 186; Martin Thomas Tel. (03) 9287 2766 or Mob 0401 712 644 Operating in Jordan, Syria, Iran, and possibly Turkey & Iraq in partnership with other organisations. Assisting with all aspects of relief work, including funding, provision and distribution of supplies, health services and transport. Spokespeople are CEO Lynn Arnold & relief workers on the ground. Tax deductible donations call 13 32 40.
https://reliefweb.int/report/iraq/acfoa-members-providing-humanitarian-relief-iraq-and-surrounding-region-1-apr-2003
Families who have been able to flee Mosul and surrounding towns are starting to reach camps that have been established in beyond the reach of the fighting. Many arrive with only the clothes they are wearing, receiving much needed food and relief supplies from the Iraqi Red Crescent Society and other humanitarian agencies working in the camps. Those who have made it to Khazer camp east of Mosul tell of walking through the night to reach safety. “We were so worried the children would cry out during the night and we would be discovered,” said a mother. One man explains how he waved his white singlet when he saw Kurdish military forces approaching. There is a clear sense of relief among the latest arrivals as they collect basic supplies from Iraqi Red Crescent Society volunteers before making their way to one of the camp’s 6,000 tents. “We are so lucky to be finally in a safe place,” says Zenaba, as she settles into a tent with her husband and three small children. Other families from her small village near Mosul are nearby, having made the journey together. Thousands more people are expected to arrive in the coming days and weeks as fighting around Mosul intensifies. Humanitarian agencies estimate that the fighting could displace more than one million people. This is on top of the 3.2 million already displaced by the conflict. Throughout the country, some 10 million Iraqis are in need of aid. Gyula Kadar, operations manager for the IFRC in nearby Erbil, explains that provide shelter and emergency relief for those displaced over the past two years was already a challenge. “Local communities across the country are sharing the responsibility, taking in millions of displaced people. But even with the greatest will in the world they cannot accommodate a million more,” explains Gyula. To meet this imminent need, the International Red Cross and Red Crescent Movement has been working alongside other humanitarian agencies to prepare camps in strategic location around Mosul. Essential services including health care, water supplies and sanitation facilities are integrated into these tent cities. Iraqi Red Crescent Society is an integral part of this operation, with more than 2,500 volunteers ready to provide food and relief supplies. Stocks of food and other essential items such as blankets, cooking sets, stoves and jerry cans that the Movement has positioned at key centres around the Mosul. You can see this passion and understanding in Rashawan as he walks through the camp meeting those who have arrived over the past few days. He already knows them well, addressing many by name, asking how they are, and if they need anything. “Sometimes it is not enough, but we are giving everything we can,” he explains, before heading off to meet some Red Crescent trucks arriving with supplies of food.
https://media.ifrc.org/ifrc/2016/11/02/red-crescent-provides-relief-to-families-fleeing-mosul/
This workshop blends two of Denises' most popular in-studio courses, 'Macro Photography for iDevices' & 'Mindfulness Drawing'. Observe nature from a unique perspective. Use images you capture to spark new creative outcomes. From unpacking your new lens, image capture and building a reference library, to creating artwork and everything in-between. About Denise Lamby Denise is passionately influenced by the environment and stopping the growing trend of usable materials ending up in landfill.Macro photography, fine detail and patterns in nature inspire her unique line drawings and bespoke screen art. She has an innate belief that everyone has the ability to put pen to paper and create amazing art, they simply need gentle guidance in the right direction. What to Bring: - Bring your own smart device (requires built-in camera), with memory space and a fully charged battery - Charging cable - Refillable water bottle, sunscreen, and a hat - All other materials supplied. The lens is yours to keep.
https://openstudiossunshinecoast.com.au/macro-photography-and-guided-mark-making/
Updated January 6, 2021 As you know, there is a possibility we may need to start surveillance testing for COVID-19 at school in order to remain open for in-person instruction. It is unclear when testing would need to begin, but we are following local developments closely and working with the Greene County Department of Health and Questar III BOCES to secure test kits and train our school nurses so we can be prepared. Please take a moment to review these frequently asked questions and watch a short demonstration video. After you read the FAQ, please consider giving parent consent for your child(ren) to receive a free COVID-19 test at school using this consent form by Friday, January 8, 2021 (families of students who are learning 100% virtually do not need to fill out this form). If you have additional questions, please contact your child's principal or school nurse. What test is being used and how will it work? The state is providing school districts with the COVID-19 rapid test (Binax antigen test) at no cost. The testing process is outlined below followed by a demonstration video. The testing process will involve inserting a small swab, similar to a Q-Tip, into the lowermost portion of the nostril. There is a quick nasal swab test of both nostrils. This is NOT the deep swab test that is performed at medical facilities. The swab will be inserted just far enough to swipe the inside of each nostril. Swabs will then be placed into a testing card, along with a reagent. Results will be available within 15 minutes. Who is administering the tests? The tests will be administered by school nurses to students for whom we have received parental consent. If you have not already notified the district as to whether or not you give consent for in-school testing, please complete this consent form as soon as possible (families of students who are participating in the fully remote instructional model do not need to fill out this form). How do I consent to have my kid(s) tested at school? Please complete the parent consent form for your child(ren). Families of students who are participating in the fully remote instructional model do not need to fill out the consent form. Why is the rapid test being used? The rationale of using the rapid test instead of the PCR test is that these tests will be done on students and staff who are asymptomatic. Rapid tests are non-invasive and detect protein fragments specific to the Coronavirus. PCR tests detect RNA that is specific to the virus and are the “deep sinus” variety. These have a longer turnaround time than the rapid test. How many people need to be tested each week to keep schools open? Schools will be required to test 20% of in-person learners and school staff over a two-week period. If we do not meet the testing percentage requirements, it is our understanding that we must switch to full remote instruction. How will you determine who gets tested? Twenty percent of in-person students and staff (with consent) will be randomly selected to receive a test at school every two weeks. It is possible that an individual who is randomly selected for one round of testing will be randomly selected again for the next round of testing. Can I be present when my child is tested? Parents/guardians may not be present for testing during the school day as we must limit the number of people within our school buildings. However if your child is randomly selected to receive a test at school, you will be notified of the test and the result. What happens if a student tests positive? If your child tests positive, you will be notified, asked to quarantine, and will need to follow up with your healthcare provider for a PCR test. This information will be reviewed with you in the event your child tests positive. In addition, we will share the test results with the Greene County Department of Health. What if I prefer to get my child tested offsite? You can get your child tested by your healthcare provider or at any testing site. In order for those tests to count toward the 20% threshold, results need to be provided to your school nurse within one (1) week. If it is your intention to test offsite, please notify the school and indicate when your child will be tested. If I do not consent to testing, will my child be forced to switch to remote instruction? No, your child can continue to be part of the in-person or hybrid learning model as long as we have enough volunteers for testing. If we do not reach the 20% benchmark, all students may be forced to full remote instruction. If I don’t consent now, will I have an opportunity to reconsider? Yes. Depending on the number of parents/guardians who consent, we could have to solicit more volunteers to test in future weeks. If that happens, we will send another email asking new families to consent. Can parents or family members get tested too? No, schools only get enough tests to accommodate 20% of our school population.
https://www.cairodurham.org/news/covid-19-testing-school-faq
Survival among COPD patients using fluticasone/salmeterol in combination versus other inhaled steroids and bronchodilators alone. Recent retrospective studies have suggested that use of inhaled corticosteroids (ICS) may improve survival in chronic obstructive pulmonary disease (COPD), particularly when combined with a long-acting beta-agonist (LABA). However, the study methodologies have been questioned, and no study has examined the survival effect of the newer combination ICS/LABA inhalers. The goal of this project was to further examine the relationship between ICS treatment, with or without LABA, and survival in COPD. COPD patients were identified from the administrative databases of four different integrated health care delivery systems. All patients who were diagnosed with COPD between September 1, 2000 and August 31, 2001 and who had at least 3 months treatment with either a combined fluticasone/salmeterol inhaler (FSI, N=866), any ICS used with a LABA (ICS/LABA, N=525), ICS alone (N=742), LABA alone (N=531), or a short-acting bronchodilator alone (SABD, N=1832), were included. Analyses were conducted using three different analysis approaches that adjust for various biases that may affect the results. In the basic Cox proportional hazards models, use of FSI, ICS/LABA, ICS alone, and LABA alone had significant survival benefits as compared to SABD, after adjustment for differences in age, gender, comorbidities, asthma status, and disease severity (HRs 0.61 [0.45-0.83], 0.59 [0.46-0.77], 0.76 [0.61-0.95], 0.75 [0.57-0.98], respectively). Propensity score matching to reduce the clinical differences between the treatment groups versus the SABD reference group found very similar results. Nested case-control analyses, which are based on survival status instead of treatment, continued to show a significant survival benefit for FSI, ICS/LABA, and ICS alone. Treatment with FSI or another ICS with or without LABA is associated with improved survival in COPD. The treatment benefit is reproducible and is robust to application of a number of different analysis techniques designed to adjust for differences in confounding variables and for bias by indication.
What is Manual Handling and How Can We Do it Safely? 09/11/2017 Manual handling is a hazard in all businesses. It involves the use of bodily force to move an object. This includes pushing, pulling, lifting, lowering and carrying. The HSE reports that manual handling causes over a third of all workplace injuries. The most common of injuries being musculoskeletal disorders (MSD's), which are pain and injuries to arms, legs and joints, and repetitive strain injuries of various sorts. The Labour Force Survey identified manual handling, lifting and carrying were the prime causative factors in the development of work-related musculoskeletal disorders in the period 2009/10 - 2011/12. In that same period, 113,000 back disorder cases were classified as occurring from manual handling. This made up 53% of all back disorder cases for that period. Given the number of workplace injuries manual handling causes, it doesn't just make sense to manage these risks due to the legal requirements, but also due to the financial costs it can cause from loss of man-hours, civil claims and hiring and training of replacement staff. So how do we address managing the risk of manual handling in the workplace? Firstly, wherever possible, manual handling should be avoided in the workplace. Where manual handling cannot be avoided, all manual handling activities should be identified in your business risk assessment, and mitigation measures put in place to avoid injury. Mitigation measures can include the use of equipment to aid manual handling. These include the use of manually operated equipment such as pallet jacks, trolleys and sack barrows, and mechanical handling and lifting equipment such as conveyors, elevators and forklift trucks. Next, we should develop procedures for manual handling within the workplace. The procedure should cover the duties of employers and employees, risk assessment requirements, manual handling tasks including any equipment to aid manual handling, training requirements, and designing and planning manual handling tasks. These procedures should be communicated to the workforce and need to be implemented by the business to be effective. Finally, all personnel identified as conducting manual handling activities should undergo manual handling training. As well as general manual handling techniques, training should include the use of specific manual handling equipment if required as per the risk assessment and manual handling procedures. It is important that employers never request employees to conduct manual handling without training, and that employees never conduct manual handling if they have not been trained. By ensuring employees only conducting manual handling where necessary, have access to manual handling aids and are suitably trained, employers can reduce the risk of manual handling injuries, and financial loss. If you need help with managing the risks of manual handling in the workplace, or with any part of your health and safety management system, contact us to find out how we can help you: [email protected] or 01843 6399711.
https://www.sandfordhodges.com/blog/what-is-manual-handling-and-how-can-we-do-it-safely
10 reasons we still love J.R.R. Tolkien's 'The Hobbit' Deirdre Donahue, USA TODAY | USATODAY Show Caption Hide Caption Trailer: 'The Hobbit: An Unexpected Journey' Peace-loving hobbit Bilbo Baggins (Martin Freeman) joins a group of dwarves and a wizard (Ian McKellen) on a trek to reclaim treasure from a deadly dragon. America can be divided into two groups nowadays. Forget donkey vs. elephant. For untold millions, Dec. 14 marks a day of pop culture rapture. In breathless anticipation, devotees are counting down the hours and scanning the Web for signs. No, we're not talking about the Dec. 21 Mayan prophecy. We're talking about the opening of The Hobbit: An Unexpected Journey, Peter Jackson's film adaptation (Part 1) of J.R.R. Tolkien's classic novel. One of most popular and beloved trilogies in film history, Jackson's Lord of the Rings movies – based on the three Tolkien titles that came after The Hobbit - have inspired a quasi-religious fervor in fans. But perhaps you don't keep a cardboard Legolas in your bedroom. Maybe you read The Hobbit as a child and recall a little dude with furry feet and some fat dwarves. To help you navigate the coming Middle-earth mania, here are 10 reasons we're still hooked on The Hobbit as it celebrates its 75th anniversary. Written by an Oxford professor for his children, it was published on Sept. 21, 1937, with a first printing of 1,500 copies. An immediate success, it has gone on to sell 100 million copies worldwide -- and burrow deep into the hearts of countless generations. 1. Action a-go-go. Dragons, trolls, danger, a child-sized sword call "Sting" -- The Hobbit is stuffed with precisely the kind of literary red meat that turns kids into book carnivores. (Just ask C.S. "Chronicles of Narnia" Lewis or J.K. "Harry Potter" Rowling.) In fact, The Hobbit got its start with a thumb's up from a kid: a rave review from 10-year-old Rayner Unwin. In 1936, Rayner's father -- a British book publisher -- asked his son to read the manuscript. (He was paid a shilling.) Here's the plot: Bilbo Baggins is a respectable hobbit -- think a half-sized human with a penchant for pipes and colorful waistcoats -- who hits the road with 13 dwarves and a wizard named Gandalf. The goal: retrieving treasure stolen by a dragon called Smaug. Bilbo encounters goblins, Wargs and a host of other creatures, including Gollum and his precious ring. The Hobbit sets up the story line for Tolkien's more complex Lord of the Rings, which stars Frodo Baggins, Bilbo's nephew. 2. Home sweet hobbit-hole. Fans just don't read The Hobbit, they yearn to be hobbits, or at least live like them. No creatures in fiction are such cozy comfort seekers with their snug hobbit-hole homes and obsessively tended gardens. They are also the original foodies long before the term was even invented, insisting that "Second breakfast is the best breakfast." In his new book, The Wisdom of the Shire: A Short Guide to a Long and Happy Life (St. Martin's), author Noble Smith notes that "Tolkien crafted Middle-earth in his mind, but the Hobbits sprang from his heart." Smith urges hobbit-wannabes to embrace the original small-is-beautiful lifestyle -- grow your own food, walk everywhere. And sing. ​Even to love Tolkien-style! The British writer met his wife of 54 years when he was 16 and she was 19. 3. The original show-me, don't tell me moralist. Bookstores groan with tedious and usually unsold tomes aimed at children written by earnest adults eager to instill moral virtue: Cruelty is wrong, courage and hope are crucial, riches won't make you happy. Without a whiff of finger wagging, The Hobbit has effortlessly imparted those messages for 75 years. Just listen to the dwarf Thorin's dying words to Bilbo: "If more of us valued food and cheer and song above hoarded gold, it would be a merrier world." 4. Little folk, big themes. "It is not just a simple story," says Corey Olsen, AKA "The Tolkien Professor" and author of Exploring J.R.R. Tolkien's The Hobbit (Houghton Mifflin Harcourt). Growing numbers of academics and theologians agree. In addition to hilarious scenes involving bickering dwarves stuffed into barrels and scary encounters with dragons, The Hobbit also illuminates how the journey transforms Bilbo, making him more compassionate and generous. According to the new The Hobbit and Philosophy: For When You've Lost Your Dwarves, Your Wizard, and Your Way (Wiley) edited by William Irwin, Gregory Bassham and Eric Bronson, there are parallels with Plato's "The Allegory of the Cave" as well as the writings of St.Thomas Aquinas, Ralph Waldo Emerson and Chinese Taoists. 5. Gateway drug for geeks. Did Tolkien linger in obscurity until Peter Jackson's movies? Not exactly. The Oxford Beowulf expert was inspiring obsessive adoration back when Jackson was a New Zealand schoolboy. Hippies in the 1960s embraced Tolkien while in 1971 Led Zeppelin released the song Misty Mountain Hop (referring to the gloomy mountain range Bilbo and company must cross). The Complete Tolkien Companion by J.E.A. Tyler (St. Martin's) offers a 712-page A-to-Z guide to Middle-earth minutiae. First published in 1976, it has, no doubt, been saddening countless parents ever since who wish their teenagers pored over their SAT study guides with the same demented fervor. For many readers, Tolkien is the first author to introduce them to the joy of living in a magical alternative world (for which Tolkien, a self-taught artist, created the visuals). Once hooked on fantasy fiction, they devour writers like Robert "Wheel of Time" Jordan and George R.R. "Game of Thrones" Martin. 6. Friends with no benefits. Well, other than affection, companionship and plenty of belly laughs. For modern readers living in a sex-saturated society, The Hobbit is the asexual pause that refreshes. Friendship -- and only friendship -- is the name of the game in The Hobbit. Wizard with hobbit. Hobbit with dwarves. Even the bearish man Beorn and his beloved animal companions. Unmet sexual needs? Secret erotic tension? Not at this address! Friends were enormously important to the orphaned Tolkien. (His father died of rheumatic fever when Tolkien was 6 and his mother died of diabetes when he was 12.) Two of his closest school friends were killed in World War I. Later he became part of "The Inklings," a famed group of literary pals that included C.S. Lewis. 7. Rebel on a bike. If you don't believe the modern mantra of change is good, technology is great and we must all embrace the future or get left behind, you've got company with a certain nature-loving, progress-hating British contrarian. In 1944, Tolkien wrote to his son Christopher, "How I wish the 'infernal combustion' engine had never been invented!" The contrast between Bilbo's verdant Shire and the desolation of Smaug's mountain has hatched countless ecological warriors. 8. Ultimate mentor. Bilbo might be the hero, but the real love object in The Hobbit is the old man with the staff and pointy blue hat, Gandalf the wizard. It's not just his magical powers that make him a star, it's his humor, psychological insight. and, yes, occasional bouts of grumpiness. Like Merlin and Star Wars' Obi-Wan Kenobi, Gandalf is the wise sage we all wish stood at our side, guiding us through life. 9. "No Girls Allowed"? Not at this hobbit-hole. Seeing The Lord of the Rings: The Fellowship of the Ring had a major impact on Arwen Kester -- yes, Arwen as in LOTR (the character played by Liv Tyler). She went out and read all of Tolkien's books and later founded Middle-earth News, which tracks all things Tolkien. "Most of my staff are women," says the Raleigh, N.C., mother of two. "They love the lore." Kester, 31, doesn't need female characters to adore The Hobbit (although Jackson is adding some to the movie). "There's so much history! The language, the passion. It draws you in!" 10. The Anti-Arnie. A fussy 50-year-old bachelor who considers adventures to be "Nasty disturbing uncomfortable things! Make you late for dinner!" -- that's Bilbo Baggins, who lacks the usual alpha male DNA. Throughout The Hobbit, Bilbo is cold, hungry, terrified and painfully homesick. Yet by the end, Bilbo accesses his inner warrior and proves himself brave, loyal, wise and ingenious. Which is perhaps the novel's deepest appeal, since all of us - no matter what our age - secretly hope we too could be heroes, if called upon.
By ENS Peter Siegenthaler Following the scheduled winter repair period, Fairweather is kicking off the 2017 field season in Tlevak Strait; the waterway between Dall Island and Prince of Wales Island in Southeast Alaska. This area was last surveyed between 1900 and 1939, and the lead-lines used at the time to determine depths were susceptible to omission of rocks and other features in an area. Using the latest innovations in hydrographic technology, Fairweather will be resurveying these areas with complete coverage multibeam echo sounder bathymetry. This allows Fairweather to identify any rocks or shoal features missed in prior surveys, increasing the safety for local communities, whose economies and livelihoods are dependent on maritime transportation of goods. One of the new developments Fairweather’s survey department in particular is excited about is a new software program affectionately named “Charlene.” Charlene was developed by PS Eric Younkin at Coast Survey’s Hydrographic Systems and Technologies Branch (HSTB) to automate the night processing workflow. This simplifies hours spent each night converting and correcting raw sonar data into an automated script which takes in raw data at one end and generates products at the other. Initial results are promising, and the ship is looking forward to fully integrating Charlene into the processing workflow. Another new development for the 2017 field season is new multibeam sonars for the ship’s survey launches, which were installed during the winter repair period. The preliminary data acquired by these sonars has shown vast improvement over their predecessors’ data, which will go a long way towards reducing data processing timelines. The new sonars do this by automating most of the acquisition parameters in real-time, far faster and more effectively than could be achieved manually. They also take advantage of a multitude of hardware and software advances that have taken place over the past several years, resulting in systems that are quieter, smaller, and easier to operate. Fairweather is continuing to use and develop the launch-mounted lidar systems (lasers) for the acquisition of shoreline data. This was another HSTB-developed process that was validated during the 2016 field season. This year, Fairweather is using those lessons learned in order to further improve our acquisition workflow. These systems create accurate real-time point clouds of features above the waterline and have revolutionized the way hazards to navigation are documented. Before the use of lasers, shoreline verification frequently required physically touching rocks and obstructions above the water surface for accurate measurement and placement. This process involved increased risk, took more time, and produced less accurate data. The new laser workflow addresses all these limitations. By scanning the shoreline at a distance with calibrated equipment, efficiency, accuracy, and safety are all greatly improved. Overall, Fairweather is enthusiastic about being back at work in Alaska. With her new software, sonar systems, and dedicated crew, the stage is set for and productive field season!
https://nauticalcharts.noaa.gov/updates/noaa-ship-fairweather-uses-new-technology-to-improve-survey-efficiency/
We are a leading recruitment, temporary staffing, and workforce management solutions firm headquartered in New York City with 9 additional offices in New York, New Jersey, Connecticut, Massachusetts, and Florida. Since opening our doors in 1985, our company mission has remained the same: to provide leading employers with the highest caliber talent while maintaining our commitment to integrity, honesty and responsiveness. At The Execu|Search Group, we believe that relationships built on trust are the foundation of any company’s success; therefore, we hold ourselves to the highest ethical standards in the industry and treat our clients’ and candidates’ needs with the appropriate level of discretion. Today, The Execu|Search Group offers our services across all 11 of our practice areas.
http://www.natho.org/members.php?id=195
Sanya A. Springfield, Ph.D. Director Center to Reduce Cancer Health Disparities (CRCHD) Q. Would you give an overview of CRCHD and your role as Director? Established in March 2001, the CRCHD (http://crchd.cancer.gov/) is central to NCI's efforts to reduce the unequal burden of cancer in underserved populations. These populations include racial and ethnic minorities, the socioeconomically disadvantaged, and the medically underserved from communities across the country. As the Director of CRCHD, I oversee CRCHD's mission by coordinating and strengthening the work of the Center. This work involves collaborating with other NCI divisions and NIH Institutes and Centers to fund research and training initiatives that focus on identifying, understanding, preventing, diagnosing, and treating cancer in our target disparities communities. Specifically, CRCHD supports grants to fund investigators and institutions that work with our target populations, as well as offering funding to increase the number of competitive researchers in cancer and cancer health disparities research, with particular focus on training researchers from under-represented backgrounds. In addition, CRCHD fosters the development of state-of-the-art regional networks and centers dedicated to cancer health disparities research and care through geographic program management. Q. Do you have any current or upcoming CAM projects within your office? A number of the current projects that CRCHD supports provide funding for CAM-related research. In one recent study, investigators from New Mexico State University at Las Cruces and the Fred Hutchinson Cancer Research Center—part of CRCHD's Comprehensive Partnership to Reduce Cancer Health Disparities (http://crchd.cancer.gov/research/cprchd-overview.html) program—isolated a new compound from Datura inoxia, also known as thorn apple (http://plants.usda.gov/java/profile?symbol=DAIN2), a native plant of the Southwest, which has long been used by Native Americans as a topical anesthetic and to treat asthma. Initial in vitro testing of this compound suggests that it works by inhibiting the division of breast cancer cell lines. Further testing in other cancer cells is also being conducted. In addition, many of our community-outreach programs work to decrease the time between cancer diagnosis and the receipt of quality cancer care for underserved cancer patients, helping them navigate the logistics of modern biomedical treatment. At Boston University, Drs. Karen Freund and Tracy Battaglia have been developing a cadre of patient navigators who can work with members of local minority and immigrant communities. In order to be effective in this role, these navigators—called promotoras within Latino communities—work within the cultural environment of their patients and remain aware of the local treatments common within a particular population and how such treatments can interact with and/or complement the biomedical care the patients receive in the hospital. The navigators work within the CAM universe, both acknowledging and incorporating CAMs in their patients' treatment plans, in order to improve their patients' care. Q. How do you feel CAM fits in with your mission to reduce the unequal burden of cancer in our society? CAM is part of the culture of many of the underserved populations with whom we work, including Hispanics, Pacific Islanders, Native Americans, Alaska Natives, Asian Americans, and recently immigrated Africans. The potential for CAM to promote healing and soothe suffering in cancer patients from these populations is strong and since they are locally acceptable and effective treatments for members of our target communities, CRCHD has a strong interest in supporting CAM research. Indeed, CRCHD promotes partnerships and programs that draw upon the cultural roots of the populations with whom we work—including using traditional medicine in combination with conventional treatments. Documenting, explaining, promoting, and promulgating such natural, community-based preventions are part of the mission of CRCHD. Q. Can you speak a bit about the research of traditional practices that is supported by the Center? Several of our grantees integrate traditional treatments with modern medicine. Within our Community Networks Programs (http://crchd.cancer.gov/cnp/overview.html), Dr. Jeffrey Henderson—a Lakota, enrolled in the Cheyenne River Sioux Tribe—is working through the Black Hills Center for American Indian Health in Rapid City, South Dakota to increase cancer education and training within the Lakota Sioux. As part of the Regional Native American Community Network Program, Dr. Henderson has long been interested in the role of traditional medicines for healing and prevention within his native tribe—most particularly the Lakota’s holistic view of health. Some of his current research involves studying lifestyle and behavioral risk factors associated with cancer—particularly lung cancer—among American Indians and Alaska Natives as well as investigating Lakota Sioux attitudes toward biomedical research. Both of these research programs examine how Native Americans integrate modern and traditional practices and medicines, both successfully and unsuccessfully, and use those findings to decrease cancer susceptibility. Ultimately, the work of the Center is interconnected: it moves from the bench to the community and from the community back to the bench. This interconnection is seen in the Center's fundamental mission to foster research into mitigating health disparities in underserved communities and in training the next generation of competitive cancer researchers from diverse backgrounds. Research conducted by and with diverse scientists and community members can effectively appeal to and mobilize a community’s local knowledge and practices—including those that are CAM-related—towards achieving better health. Acknowledging and supporting these local CAM practices is an important component to substantively and sustainably reducing disparities—and it is in recognizing this importance that the visions of OCCAM and CRCHD most clearly align.
https://cam.cancer.gov/news_and_events/newsletter/2011-spring/a_conversation_with.htm
By definition, experimental biology is usually a branch of science that investigates the lead to and effect relationship between genetic expression, molecular and cellular structure, and developmental context. Experimental biology can be a big field of study within genetics, with applications for the whole spectrum of human biology. With this definition, you’re now well aware of what it can be that experimental biology is, but, did you also know that you’ll find 4 levels of experimental strategies? buy an essay Two of those levels consist of the proliferation, mutation, choice, and hybridization of cells within the germ line. The remaining two levels would be the differentiation, transduction, and expression of genes in living organisms. Gene expression is a term used to describe the potential of a cell to permit thesis statement help genetic info to be transmitted between cells. In scientific literature, gene expression is typically known as protein synthesis or translation. The conversion of mRNA into messenger RNA (mRNA) is usually a vital step in experimental applications. Developmentally, experimenters to study the effects of interaction among the atmosphere along with the DNA sequence. Molecular and cellular structure play a crucial function within this aspect of your field. Interactions in between environmental signals and genetic elements are recorded, monitored, and interpreted by biologists. These experiments test the relevance of theories regarding the inheritance of quantitative traits and developmental expression. The richness definition defines experimental biology as follows: “the science that deals with genotype and phenotype in the amount of cellular, molecular, and physiological systems. narrative essay At the degree of experimental design, the significance of realizing the origin of genotypes and phenotypes should be incorporated.” Geneology will be the field of study and application that studies the relationships amongst genetics as well as the genes that take place inside living organisms. The study in the molecular components of gene expression patterns within living organisms includes the sequencing of genomes of cells and organisms. Genome sequencing enables researchers to determine and decide the genetic basis of, gene expression patterns, which can then be further classified by specificity, specificity diversity, and haploid or diploid genotypes. Gene mapping may be the study of the genetic structures that define the connection among genes and tissues or organs. It is also referred to as microarray analysis. Gene mapping makes use of arrays of fluorescently labeled probes that permit to get a direct reading with editing service the transcriptomes, where gene expression patterns are read. By comparing the pattern of transcriptomes with reference sequences from other organisms, researchers can uncover what tends to make up the genomes of other organisms. Transduction is definitely the term used to describe the transfer of genes from a single cell form to one more. It can be a approach of gene expression that could be defined as “expressing” with no the use of the word “transcript”gene.” It could be performed in living organisms by introducing DNA sequences that should not be read by the host cell’s machinery. Transcription would be the approach of converting the mRNA from the mRNA processing center with the cell into a type that could be translated by the host cell’s machinery. Host cellular machinery will translate the mRNA into proteins, inside the exact same manner that cells inside the physique express proteins. Transcription could be the mechanism that facilitates the exchange of mRNA in between cells and organs. Knockdown of your transducer makes it possible for it to not transduce transcription. Transducer expression is employed to examine the transcription of genes in adult mammalian brains. Knockdown from the transducer can then be tested in genetically engineered mice. If you should realize the richer definition of experimental biology, read on. Once you understand the importance of lab personnel and laboratories, at the same time as their equipment, they’ll allow you to comprehend the richer definition of experimental biology. There are several approaches out there that make it much easier to consider experimental biology.
https://davoge.nl/what-is-experimental-biology/
In this paper we give the definition of a solution concept in multicriteria combinatorial optimization. We show how Pareto, max-ordering and lexicographically optimal solutions can be incorporated in this framework. Furthermore we state some properties of lexicographic max-ordering solutions, which combine features of these three kinds of optimal solutions. Two of these properties, which are desirable from a decision maker" s point of view, are satisfied if and only of the solution concept is that of lexicographic max-ordering. Facility Location Problems are concerned with the optimal location of one or several new facilities, with respect to a set of existing ones. The objectives involve the distance between new and existing facilities, usually a weighted sum or weighted maximum. Since the various stakeholders (decision makers) will have different opinions of the importance of the existing facilities, a multicriteria problem with several sets of weights, and thus several objectives, arises. In our approach, we assume the decision makers to make only fuzzy comparisons of the different existing facilities. A geometric mean method is used to obtain the fuzzy weights for each facility and each decision maker. The resulting multicriteria facility location problem is solved using fuzzy techniques again. We prove that the final compromise solution is weakly Pareto optimal and Pareto optimal, if it is unique, or under certain assumptions on the estimates of the Nadir point. A numerical example is considered to illustrate the methodology. A Level Set Method for Multiobjective Combinatorial Optimization: Application to the Quadratic Assignment Problem (2002) Multiobjective combinatorial optimization problems have received increasing attention in recent years. Nevertheless, many algorithms are still restricted to the bicriteria case. In this paper we propose a new algorithm for computing all Pareto optimal solutions. Our algorithm is based on the notion of level sets and level curves and contains as a subproblem the determination of K best solutions for a single objective combinatorial optimization problem. We apply the method to the Multiobjective Quadratic Assignment Problem (MOQAP). We present two algorithms for ranking QAP solutions and nally give computational results comparing the methods. This paper provides an annotated bibliography of multiple objective combinatorial optimization, MOCO. We present a general formulation of MOCO problems, describe the main characteristics of MOCO problems, and review the main properties and theoretical results for these problems. One section is devoted to a brief description of the available solution methodology, both exact and heuristic. The main part of the paper is devoted to an annotation of the existing literature in the field organized problem by problem. We conclude the paper by stating open questions and areas of future research. The list of references comprises more than 350 entries. The computational complexity of combinatorial multiple objective programming problems is investigated. NP-completeness and #P-completeness results are presented. Using two definitions of approximability, general results are presented, which outline limits for approximation algorithms. The performance of the well known tree and Christofides' heuristics for the TSP is investigated in the multicriteria case with respect to the two definitions of approximability. In order to improve the distribution system for the Nordic countries the BASF AG considered 13 alternative scenarios to the existing system. These involved the construction of warehouses at various locations. For every scenario the transportation, storage, and handling cost incurred was to be as low as possible, where restrictions on the delivery time were given. The scenarios were evaluated according to (minimal) total cost and weighted average delivery time. The results led to a restriction to only three cases, involving only one new warehouse each. For these a more accurate model for the cost was developped and evaluated, yielding results similar to a simple linear model. Since there were no clear preferences between cost and delivery time, the final decision was chosen to represent a compromise between the two criteria. In multiple criteria optimization an important research topic is the topological structure of the set \( X_e \) of efficient solutions. Of major interest is the connectedness of \( X_e \), since it would allow the determination of \( X_e \) without considering non-efficient solutions in the process. We review general results on the subject,including the connectedness result for efficient solutions in multiple criteria linear programming. This result can be used to derive a definition of connectedness for discrete optimization problems. We present a counterexample to a previously stated result in this area, namely that the set of efficient solutions of the shortest path problem is connected. We will also show that connectedness does not hold for another important problem in discrete multiple criteria optimization: the spanning tree problem. Convex Operators in Vector Optimization: Directional Derivatives and the Cone of Decrease Directions (1999) The paper is devoted to the investigation of directional derivatives and the cone of decrease directions for convex operators on Banach spaces. We prove a condition for the existence of directional derivatives which does not assume regularity of the ordering cone K. This result is then used to prove that for continuous convex operators the cone of decrease directions can be represented in terms of the directional derivatices . Decrease directions are those for which the directional derivative lies in the negative interior of the ordering cone K. Finally, we show that the continuity of the convex operator can be replaced by its K-boundedness.
https://kluedo.ub.uni-kl.de/solrsearch/index/search/searchtype/all/rows/10/sortfield/title/sortorder/asc/facetNumber_author_facet/all/author_facetfq/Ehrgott%2C+Matthias
Sir, Becker’s Nevus (BN) is a cutaneous hamartoma which is characterized by an unilateral, hyperpigmented patch with varying degrees of hypertrichosis . We present a case of giant BN which is an extremely rare type of BN. A 16-year-old Turkish female patient was admitted to our clinic with the complaint of a brown lesion located unilaterally on the right side of the body. The lesion had appeared when she was between 3-4 years old. Dermatological examination showed a wide brownish patch with well defined and irregular borders that spreaded from right ankle to ipsilateral middle trunk (Figure 1). Total involvement surface area was estimated to be around 3700cm2. There was hypertrichosis on the lesion on the lumbar area, and acneiform papules on the thigh (Figure 2). Histopathologic examination of the lesion revealed moderate acanthosis, hyperpigmentation of the basal layer and hyperplasia of the arrector pili muscle (Figure 3). Based on the history, physical examination and histopathological findings of the lesion, the patient was diagnosed as BN. The results of routine laboratory tests such as complete blood count, liver function tests and renal function tests were within normal limits. No pathologic finding was detected in X-ray examination of the legs and abdominal ultrasonography. Figure 1: Wide hyperpigmented patch on the right lower extremity. Figure 2: Hypertrichosis over the hyperpigmented patch on the right lumbar area. Figure 3: Moderate acanthosis, hyperpigmentation of the basal layer, moderate flattening on rete ridges (H&E 200). Prevalence of BN is nearly 0.52% . BN usually has juvenile onset but, rarely, the cases with early onset or congenital cases have been reported . In our case the lesion had started when the patient was 3 years old. The abnormal androgen receptor activity may play a role in the pathogenesis of BN. Increased androgen receptor density has been shown via immunohistochemical staining, reverse transcriptase polymerase chain reaction of androgen receptor messenger RNA and ligand-binding assays in BN. Hypertrichosis and acneiform lesions on the BN may support the role of abnormal androgen receptor activity . The most frequent localizations of the disease are trunk and legs. Also BN can be associated with BN syndrome. BN syndrome is characterized by BN with ipsilateral breast hypoplasia or other skin, skeletal and/or muscular disorders . In our case there were no other pathological findings except BN. An average size of BN is 125 cm2 . There are few reports of giant BN in the literature. Any threshold size for giant BN has not been defined previously in literature. Reported cases of giant BN were patients who had usually bilateral torso involvement or a half of trunk [5-7]. BN has covered whole right lower extremity and ipsilateral middle trunk in our case. Khatami et al., reported a giant bilateral Becker's nevus in a 14 year old boy. The age of onset of the disease was when he was 8 years old . Baeta et al., reported a case of giant BN syndrome with breast hypoplasia which had started at the age of 7 . Our case is the 3rd case of giant BN and the age of onset of the lesion is earlier than the other reported cases. Histologic evidences of BN are acanthosis, hyperkeratosis and hyperpigmentation of the basal layer. The number of melanocytes is generally normal or slightly increased and there are no nevus cells. In some BN cases, hamartomatous smooth muscle fibers may be seen on histopathology but we did not detect it on the histopatological examination of the lesion . BN is only treated for cosmetic reasons. There are limited data about the use of laser for hypertrichosis and hyperpigmentation. Intense pulsed light laser and Erbium:YAG laser may be used for treatment . Laser treatment was recommended to our patient. We present this case because giant BN is a very rare type of Becker nevus and we want to emphasize that the diagnosis of BN should be kept in mind in patients with giant pigmented patches. Copyright: © 2015 Müzeyyen Gönül, et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
https://www.heraldopenaccess.us/openaccess/a-case-of-giant-becker-s-nevus
The World Chambers Congress brings together economic actors, business leaders and policymakers from around the world to spur change through dialogue and cooperation. Organized by the International Chamber of Commerce, it’s World Chambers Federation and the Geneva Chamber of Commerce, Industry and Services, the 13th edition of the Congress will take place in Geneva from 21-23 June 2023. With a unique and innovative programme, 80+ speakers and 40+ sessions, the 13th World Chambers Congress will tackle the current and future global trends and challenges that define both chamber and business activities. The World Chambers Competition started in 2003 and is an integral part of the World Chambers Congress. Organized by the ICC World Chambers Federation, it is the only global award that recognizes the most innovative projects undertaken by chambers of commerce and industry. In highlighting the success of local initiatives, the Competition serves to inspire the creation of pioneering and beneficial chamber solutions for business communities worldwide. Registration and more information:
http://www.icc-iran.com/En/7788/ICCIran-NewsDetail
Welcome to the C2CMI! We are an interdisciplinary research, innovation and education initiative made possible by a $24 Million grant from the New Frontiers Research Fund-Transformation Program. Our institute is developing coating materials to enhance the stability of metals used for transportation, construction and green energy infrastructure (macro). We are developing new ways of manufacturing microelectronics (micro) and improving precision therapeutics for cancer treatment (nano). Our innovations will reduce construction and maintenance costs, contribute to next-generation manufacturing processes in the microelectronics industry, and result in safer, more effective precision therapeutics for cancer treatment. Our research makes meaningful contributions to UN Sustainability Development Goals (SDG 9 & SDG11). Specifically, our metal coating solutions will increase the longevity of construction, transportation and green energy infrastructure. This will support Canada’s move towards green energy and reduce demand for metal extraction processes, ultimately leading to lower greenhouse gas emissions. Further, more resilient metal infrastructure will reduce leaching of contaminates into the environment from corroding metals. Our network partners include global academic research leaders from the disciplines of Chemistry, Physics, Engineering, and Medicine. Our consortium of industry partners support scale up, advanced testing and knowledge mobilization. Our collaborators allow us to expand the already advanced training opportunities for undergraduate, graduate and postgraduate researchers. Team members will have the opportunity to directly collaborate with global academic experts and leading industry partners, enabling advanced research and business skills. Most importantly, our institute is committed to equity, diversity, and inclusion (EDI). In addition to embedding EDI principles in everything we do, we offer specific EDI fellowships to attract and promote equity deserving researchers. As the Scientific Director, I am pleased to invite interested researchers and trainees to contact us and find out more about opportunities at C2MCI.
https://www.carbon-2-metal-institute.queensu.ca/directors-message
Mention a "belief in the unseen, or unknown," and many intellectuals and simpletons, alike, will chide you for your naivete. However, as stated above, it is clear that the same component (otherwise known as faith) is just as present in non-religious belief systems (including all philosophies of the nature of mind and self) as the most blatantly religion-based concept of self. Given this fact, that all theories are "flawed" or tainted by the presence of faith, as well as by necessary doubt, it only makes sense to take the most promising course with regard to potential outcome. This is particularly true in consideration of the self as infinite or temporal. Most humans believe that the avoidance of pain, fear, and suffering are meritorious, even if those humans supposedly believe in the possibility of the existence of "false input" from the senses. For instance, in contrast to an individual who believes one's existence or self is confined to the experiences related by the senses, another more "mid-Meditation" Descartist may reject sensory input as reliable at all. They may say, for example, that something harmful can feel good (a narcotic reaction, for example), and that something good can feel harmful (vomiting after eating tainted food). However, if one were to observe this same theorist in "real life," he would in all likelihood, be seen avoiding physical or emotional pain in all instances. After all, faith has its limits -- what if the senses prove horribly accurate? Why take chances? Few would. If then, this is the case, and one chooses to take the "safest" route with regard to faith and "best case scenarios" (i.e. human torch vs. happy stroller), does it not make sense to seek out the faith-based identity with the best possible outcome? Clearly, this idea is hardly new. In fact, it was Augustine who used logic (and faith) to assert that it only makes sense to choose faith in God and the afterlife rather than unbelief, in that to choose God would only help you should God's promise prove to be true, and certainly place you no worse off should it be false. Although this argument was more theological in nature than the musings of Identity theorists, one cannot fail to see the connection between the flawed thinking of the atheist (in Augustine's view), and the flawed reasoning of body, mind, and sense identity adherents. Much as Augustine reasoned, hey, you're alive anyway. You're gonna die for sure. Why not cover all of your bases just in case? Clearly the best way to do this is by choosing, out of the options you know, that which will harm you least. In the same vein, we know that all of the theories of self contain the component of faith (another expression of which may be the "hopeful unknown." Given that this component is the constant of all (much the same as death, itself, is the constant in Augustine's statement), it only makes sense to choose the theory of self that is the most promising -- that being one that includes infinite existence, specifically some form of "life after death," if only in mind. Clearly, the human experience of thought and all the "trappings" of musing on self and identity (including philosophy) leave much to be desired. As humans, most of us (we assume, anyway) have some inkling of the limits of our knowledge of the nature of self. We wonder, "If I am thinking, does this mean that I really am? Or is this thinking an illusion, perhaps conjured by the electrical impulses in my brain?" We may worry over how it will be to simply no longer exist, even if we fail to consider the considerable period we "didn't exist" before birth. We may wonder if everyone is just as we are in the same way that we are -- if they see and experience the world as we do. We may even feel that primary sensory pleasure seeking is "all there is," and that we are simply biological beings, straight out of seventh-grade biology text-books. Despite all of the different tracks that conjecture on the nature of self and existence can take, the mere commonality of the need to "answer the question" points at a certain truth. Further, that doubt, and more importantly, faith is a necessary component of all of them indicates that mere philosophical, logical, or sensory musings are simply not the sources of ultimate wisdom that we yearn for. Given this fact, and given that humans are sufficiently imbibed with the need to understand just how one continues or does not continue to exist after death, it seems only logical that one would choose the best possible option with regard to potential outcome -- that which provides for the greatest assurance of infinite existence of the self. This is particularly true given the existence of faith in all other theories anyway (and this is most often the cause most non-religious people cite for their failure to consider a spiritual model). Indeed, if faith is a common component in all theories, then one cannot use it as a "flaw" by which to judge one theory over another. The mere "lack of evidence" often attributed to religion as a basis for identity is just as present in mind, sense, and biological models. Given this, what can be lost by switching between them at will, other than choosing a false option at the expense of truth if that truth carries with it real benefits? Given this truth, my personal concept of self and identity seems to be a wise one. Consider, for example that I believe that I am destined, though my belief in God, and my accomplishment of good deeds, as well as the avoidance of bad, to die and live infinitely in some form with the same "mind" I think with right now. My sensory experience may be different after death, certainly my physical being will no longer be the same, yet the same mind with which I compose these words will continue. For me, this is a matter of faith -- and faith by definition is a struggle with doubt. However, in choosing belief, in this self-theory, I necessarily reject non-religious models. Unlike the other identity models, however, I cannot embrace aspects of any other self model. I must reject them all. For example, I may not, according to my concept of identity, believe in the importance of sensory input at the expense of all else (hedonism is out), I can also not cite the benevolent nature of God as a basis for proving a Descartes-like theory based on the utility of my senses. After all, do I not see many whom God has chosen to be deficient in hearing, sight, taste, smell, or touch? Does that mean that God favors some over others, and he has designated them to "be" more, or "exist" more saliently? So, too, should I believe that "I think, and I am," yet the plainly insane man next to me on the bus does not exist? Is this explanation sufficient, or do you see other factors (e.g., global, economic, relational, etc.) at work in the way we understand identity? "Mind-Based Identity: A Problem Impossible." 1 May 2005. Web. 25 April 2019. <https://www.essaytown.com/subjects/paper/mind-based-identity-problem-impossible/3567982>. "Mind-Based Identity: A Problem Impossible." Essaytown.com. May 1, 2005. Accessed April 25, 2019.
https://www.essaytown.com/subjects/paper/mind-based-identity-problem-impossible/3567982
examples here). They are also common in systems created by humans. One example is microphone feedback. We all have heard a loud squeal from a PA speaker when the microphone gets too close to the speaker or the amplifier gain is too high. The positive feedback occurs because the initial sound picked up by the microphone is amplified, sent out through the speaker and returns to the microphone louder than the original sound. A few cycles of this feedback loop generates a loud squeal. Once you understand the mechanism, it seems unremarkable and controllable. To kill the squeal, simply move the microphone farther from the speaker or turn down the amplifier gain, thereby reducing the intensity of the amplified sound that reaches the microphone. As a thought experiment, consider a large open space, say a football field, on which a hundred speakers, amplifiers and microphones are placed randomly. Add connections (wires), one at a time, between a randomly chosen microphone and amplifier or randomly chosen amplifier and speaker . Sooner or later, the next added element will cause a squeal to arise because a speaker happens to be close enough to the microphone that feeds it. Let us call that microphone-amplifier-speaker trio an autocatalytic set, i.e., a self-reinforcing set of elements that produce an emergent property of the system (the squeal). Adding more wires will create a second squeal, and a third, and so on. There tends to be a threshold beyond which new feedback loops are created very rapidly and shortly thereafter nearly all the speakers will be emitting squeals. Since the output of any given speaker reaches more than one microphone, some of the autocatalytic sets (i.e., feedback loops) may involve multiple microphones, amplifiers, or-speakers. Likewise, a given speaker or microphone may be participating in more than one autocatalytic set, i.e., emitting multiple squeals at more than one pitch (because the pitch depends upon the distance between the participating speaker and microphone). In 1965, Stuart Kauffman did computer simulation experiments analogous to the speakers on the football field using random Boolean nets. The simulations showed, to his surprise, that autocatalytic sets (called state cycles in these Boolean nets) inevitably emerge quickly. The number of autocatalytic sets that emerge is roughly the square root of the number of elements in the Boolean network . Mutually reinforcing feedback loops form in all sorts of complex systems. The probability that at least one autocatalytic set will emerge increases as more elements are added to the system, more interconnections are added, or the elements themselves become more complex and therefore can interact with others in more complex ways. Any change to the system that increases the number of possible positive feedback loops increases the probability that an autocatalytic set will emerge. How big does a system have to be before feedback loops become nearly inevitable? It tuns out that it depends upon how complex their interactions are and how many other elements each interacts with. In general, the simpler the elements and their interactions, the more of them are needed to give a high probability of emergence. Consider two familiar examples of emergent systems in human affairs: Money -- Cattle, wheat, chunks of metal or cowrie shells were used as tokens of trade at least as early as 3000 BC and perhaps as early as 9000 BC. But the coins that replaced those tokens became far more useful because they were visibly distinct, had agreed upon values, and were under the imprimatur of an authority. Coins of different values -- due to different metal composition, e.g., gold and silver, emerged between 650BC and 550BC in Lydia. As the benefits of money were recognized by more people, more coins were minted which, in turn, allowed those benefits to be experienced by more and more traders. More coins begat more trading which increased the demand for coins. Within two hundred years, the idea of using coins with specific values had been adopted throughout the Mediterranean region. China had developed coins as well. Coins changed commerce forever. Counterfeiting and debasement of the metals in the coins soon emerged. Increases in the rate at which coins were minted (or counterfeited) created early cases of inflation. When there are more coins than needed to purchase goods in a given economy, the price of the goods rises. Thus there emerges a metalevel dynamic relationship between the total money supply and the total demand for goods. In hindsight, however, the bigger effect of coinage was to generate the notion of price. A price is a numeric quantity -- a number -- that can be printed on paper currency, added and subtracted, and entered in accounting books. Eventually, when accounting became computerized, prices became just the bits that describe the number. Bits can move at electronic speeds in world-wide financial markets that change in milliseconds due to the positive feedback of greed or fear generated by the price moves themselves. Many financial instruments have become no more than abstract "baskets" of abstract "bets" such as "futures" and other more arcane "derivatives" that can bankrupt organizations and markets in a flash: witness the "Flash Crash" that occurred at 2:45pm, May 6, 2010. By the growth of emergent metalevel upon emergent metalevel, human commerce grew from cowrie shells to Synthetic Collateralized Debt Obligations and "Swaps". My oh my! The Internet -- In computing, TCP/IP and HTTP protocols create new sorts of interactions between computers. The Internet emerged from TCP/IP protocols and the Web emerged from HTTP protocols. The communication infrastructure of these sorts of systems grows because of positive feedback known as the “network effect.” That is, as the network grows it becomes more attractive for others to join the network. Telephones and fax machines are the usual example of prototypical positive feedback network effects. On top of the base communication networks, content and usage models proliferate easily because when bits are "free" both in the sense of "free beer" and "free speech," innovative startups have very low costs of entry. Google and Facebook could start in dorm rooms. Blogs and Twitter communities appear out of nowhere. Less welcome but just as much emergent phenomena are the myriads of viruses, worms and other malware that exploit email, blogs, and Web content to support all sorts of scams and cyber-crime. It is important to note that complex dynamic feedback gives rise to emergent entities that are qualitatively different from those of the underlying elements. A marketplace based upon money is qualitatively different from one based upon barter because easily communicable prices create relationships between all goods and services, and a price can be attached to anything. More specialized goods and services can participate on an equal footing with everyday commodities. So too, the emergent behavior called the Web is dramatically different from communities that swap files by FTP even though the low-level technical differences between FTP and HTTP are relatively minor. Note: since this is an abstract thought experiment, we allow multiple microphones to feed the same amplifier, a microphone to feed multiple amplifiers, and an amplifier to feed multiple speakers. We also ignore the likelihood that, in real life, amplifiers may blow fuses and speakers may shred themselves. See Chapter two of Complexity: Life at the edge of chaos, by Roger Lewin, 1992l, Macmillan Publishing Co. For an informal discussion. Stephen Kauffman has developed the formal theory, known as NK Systems. See S. A. Kauffman. The Origins of Order: Self-Organization and Selection in Evolution, Oxford University Press, New York, 1993.
https://www.evolutionofcomputing.org/Multicellular/DynamicComplexity.html
What is the story of the founding of your NRI? What were its inspiration, its objectives? The country was part of the two phases (2003 and 2005) of the World Summit on the Information Society that paved the way to the Internet Governance Forum. Cameroon firstly organised in 2012 the sub-regional Central Africa IGF in Douala with the aim to have a view on the state of internet processes within the six countries in Central Africa. Cameroon started its first national IGF in August 2013 with the objective of a view on internet processes with respect to laws, rules, infrastructures, operators, intermediaries and users. How did it develop and what difficulties did you experience along the way? The governmental ICT Agency (ANTIC) took the lead, inviting other partners to join the organising committee, but took hand over the calendar and each articulation of it. On the other hand civil society organisations were not well organised to play a key role. How do you imagine your NRI and its activities in the future? Involving more civil society organisations and other partners in the organising committee. Setting up a real national secretariat in charge of the whole organisation. NRI internal governance and initiatives Who are the people involved in your NRI and how do they contribute to it? - The National ICT Agency (ANTIC), a government institution, as the main organiser - The Ministry of Telecommunication sharing laws, rules and government strategic plans - Civil society organisations involved in panel discussions or/and proposed topics - The technical community (ISOC) sharing the ongoing technical processes - The private sectors like operators, mostly as funders. Have you experienced difficulties in ensuring all stakeholder groups participate fully and more or less equally? As the main organiser is the government, the multistakeholder approach is not yet a reality. Other stakeholders are not taking part fully when the government institution keeps control over the calendar, the agenda, the budget, the date and the venue. Do you measure gender balance in your NRI? Did you undertake measures to encourage gender balance? As the multistakeholder approach is not taken under account in the setting up of the organising committee, gender balance, measured in terms of the number of women taking part on the committee, is not achieved. We as civil society organisation take care during the selection of presentations that gender balance be observed. How was your last forum organised, what were the topics chosen and the outcomes of discussion? How was it financed? The last forum took place on 17-30 June 2017 in Kribi, a seaside area city here in Cameroon. The topics chosen concerned: - A brief history of the IGF - Environment of legislation in term of laws and rules - Internet rights and duties - Rights in regard to the "African Declaration on Internet Rights and Freedoms" - Internet and education - Internet and critical resources - The challenge of the IPV6 process - Cloud computing and its challenges for Cameroon - Internet and security - Internet and cyber crime - Cameroon’s national strategy plan 2020. The outcomes were: - Process of knowing legislation - Awareness on what to do and what is forbidden - Familiarisation with African Declaration in terms of rights and freedoms - The benefits for enterprises to set up IPV6 in term of opportunity space - Advice on how to be secure online and work - Awareness on the digital strategic national plan. Are there controversial topics that have been difficult in your NRI and if so, why? We suppose that for what concerns national actuality, there is the talk about the internet shutdown, but strategically the government removed it from the agenda, saying or proclaiming that it is for security reasons. As is known, the internet was shut down in two regions (Anglophone) for three months due to political disapprobation or contestation. Perspectives on the role of NRIs in internet governance What is your take about the role of your NRI in internet governance processes, at the level of your country, region and globally? At the level of my country: Public awareness on internet issues and challenges to overcome in terms of protecting rights and taking over internet in the development of my country. Regionally: Working hand in hand with other African countries to advocate for common views and involving the African Union on internet matters in the continent. Globally: To care about the recommendations provided as outcomes during global IGF, and seeing that these recommendations can be followed at national and regional level. How do you perceive your role and position towards other NRIs, the IGF and the IGF Secretariat? Towards other national IGFs in Africa especially: - Looking at what is done at different levels of governance - Ensuring that recommendations are implemented - Sharing the challenges to overcome. Towards the IGF: - Ensuring relevant issues are raised at national level - Implementing recommendations according to national contexts - Raising recommendations at global level. Toward the IGF Secretariat: - Asking help for Cameroon to set up its own IGF Secretariat - Having a look over the IGF calendar at different levels, in order to harmonise them at national, regional and global level.
https://giswatch.org/en/country-report/internet-governance/cameroon-igf
Citing a quote. All direct quotes (and paraphrased ideas) must include a citation of the original source. If you do not cite the quotes used, you risk committing plagiarism. Be aware that the consequences of plagiarism can be serious. The way you cite a source depends on the citation style for your essay. It is important to be aware of the ... Get To Know How to Quote a Play and Reference It Correctly If you visit our website, you can learn how to cite lines from a play MLA using our database of comprehensive templates and samples that can be used to correctly quote plays by formatting the citations and works cited entries. Guide on How to Quote A Play in an Essay Example Online How to cite a quote from a website in an essay? | Yahoo Answers How to cite a quote from a website in an essay? ... And as for using it within the essay, you should always introduce citations properly. ex. The feelings between two ... Use the following template to cite a artwork using the APA citation style. For help with other source types, like books, PDFs, or websites, check out our other guides.To have your reference list or bibliography automatically made for you, try our free citation generator. MLA In-Text Citations (Step-by-Step Guide) - YouTube If you're confused on how to cite sources in research papers, you're not alone! Check out this video for a step-by-step guide on using MLA source citation within your paper. How to Cite a Website (with Sample Citations) - wikiHow May 29, 2019 ... Place a parenthetical citation after referencing the website in your text. ... Use sentence case, capitalizing only the first word and any proper ... How to cite an essay: An essay is an analytic writing piece that is generally short in length (compared to books and journal articles) and focuses on a specific topic or subject. Citing an essay is similar to citing a chapter in a book or a story in an anthology. Check the EssayPro guide on how to format research paper in each research paper format. Learn APA, MLA, Chicago and ASA paper citation styles. How to Cite a Website in APA Format - Citeyouressay.com How to Cite Research in an Essay Using APA Format | Pen I know how to cite a website in the works cited page. YES. The professor went over that, what he DID NOT go over is HOW TO CITE WITHIN THE ESSAY.For example, I want to put a quote from a website in my essay. How do I properly do this with mla style? Citing a website properly will help you prove the claims you're making … in the text, then include a works citedTry our Website Evaluation Tool in the Essay Tools Menu! Did you know you can format …Researchers addHow to Cite a Website in MLA Format Without an Author or …Apr 17, 2017 … APA Citation Guide: How to cite anything in APA format APA (American Psychological Association) style is most frequently used within the social sciences, in order to cite various sources. This APA Citation Guide, revised according to the 6th edition of the APA manual, provides the general format for in-text citations and the reference page. Essay Writing Essentials - English Program - CSU Channel Islands (Titles of stories, essays and poems are in "quotation marks.") Refer to the text specifically as a novel, story, essay, memoir, or poem, depending on what it is. In subsequent references to the author, use his or her last name. If the title is very long and you are making numerous references to it, you can refer to it by a shortened version. i.e., APA Essay Help with Style and APA College Essay Format How to Incorporate sources into your paper « Humanities ...
https://coursesfkaqls.netlify.app/stefford14020cek/how-to-properly-cite-a-website-in-an-essay-bar.html
Or at least, there are climate scientists happily overthinking this fantasy world. Most Game of Thrones fans are willing to suspend their disbelief when it comes to Westeros’s wonky weather. The continent’s seasons defy physics, lasting for years and changing without predictability—but, whatever, it’s a fantasy story. Fans who are also climate scientists, though, can’t stop hypothesizing. “As a scientist, I’m intrigued to come up with a biogeochemical climate explanation for what’s happening in Westeros,” Peter Griffith, who works in the field of carbon cycle and climate, says with delightful sincerity. Thomas Douglas, an environmental chemist working on snow, ice, and permafrost characterization under the Department of Defense’s U.S. Army Cold Regions Research and Engineering Lab in Alaska, agrees. Fortunately, their training has led them to develop several fascinating theories about how Westeros’s climate may have evolved. This is how climate scientists have fun—by advancing high-concept and ultimately meaningless thought experiments. And as evidenced by our last piece on the intersection of climate science and Game of Thrones, we think it’s fun, too. Spoiler alert: the following is pretty nerdy. “In Game of Thrones, volcanic eruptions caused the end of the Valyrian civilization. So we know the planet has undergone massive volcanic eruptions,” Griffith explains. On Earth, he continues, “volcanic eruptions can cause mini-winters or years without spring.” Volcanoes eject sulphuric acid into the troposphere and stratosphere, which creates cloud layers that reflect sunshine before it can reach the planet. “It’s like putting a mirror into the high atmosphere,” Griffith says. Once it’s up there, the acid easily spreads. Within two weeks of the Krakatoa eruption in Indonesia in 1883, for example, its volcanic spewings had already circled the globe—affecting temperatures in places as far away as England. The Doom of Valyria bears some resemblance to the Krakatoa event. According to the Song of Ice and Fire books, the Fourteen Fires—the string of volcanoes that comprised the bulk of the Valyrian Peninsula—erupted with enough force to cause earthquakes and tidal waves. Similarly, the Krakatoa eruptions led to multiple devastating tsunamis, which compounded a death toll that ultimately climbed to more than 36,000. In both scenarios, groups of islands disappeared, save for a few remaining volcanoes that continue to erupt today. In “present-day” Essos, travelers close to Valyria still report clouds of ash and glowing red skies. The continually shifting landscape at Krakatoa also keeps burping, with the most recent major eruption coming in 2008. According to Douglas, some believe that the aftermath of the Deccan Trap explosions is what actually killed the dinosaurs here on Earth. But the prevailing theory attributes this extinction to fallout from an asteroid impact. “Asteroids can send a lot of dust up into the sky, which will cool the Earth for what could be multiple years,” Douglas explains. Asteroid impacts are rare, though, and the seasons on Game of Thrones do have some degree of predictability; they come and go, even if they don’t do so regularly. But what if the planet’s orbit around its sun cut through an asteroid belt? “If the planet got whacked by a giant meteorite every 10 years, it would then have winter for several years,” he says. And the length of the winters would depend on the size of the meteorites. We know of at least one non-planetary mass traveling relatively close to Westeros’s planet: the Red Comet. As an omen, it has a variety of interpretations. In Melisandre’s vision, “Darkness will fall heavy on the world. The stars will bleed. The cold breath of winter will freeze the seas. And the dead will rise in the north.” Sounds like there could be some ancient belief in a connection between meteors and deep winters. According to Westerosi lore, the Long Night was a winter that lasted a generation, with a darkness so complete that people never saw daylight. This would certainly be strange for a world that otherwise experiences regular years—which we know is true for Westeros’s planet, because the people there celebrate naming days, or birthdays—and therefore regularly orbits a sun. It is highly unlikely that any part of the planet would face away from the sun for an entire generation—though this is not impossible. (See below.) Therefore, this complete darkness may instead have resulted from a sky full of dust. Scientific explanations for how any living thing could survive a generation of darkness would require enough mental gymnastics to warrant another article (and would probably lead even the most dedicated scientist to throw up her hands and say, “Whatever, it’s magic”). Then again, if most people perished during the Long Night—especially those living in particularly extreme conditions north of the Wall—this could partly explain why the Night King’s army is so large. The shape of a planet’s orbital path is called its “eccentricity.” Ours is slightly elliptical; over the course of about 100,000 years, it grows slightly more elliptical and then shrinks again. When the Earth’s orbit is at its most elliptical, our seasons are more extreme than when the orbit is at its most circular. Obliquity, or axial tilt, is why we have seasons to begin with. If you inserted a rod from the North Pole to the South Pole, you’d have to grab it and tilt it before you sent the Earth around the sun. That’s why the Northern Hemisphere is closer to the sun than the Southern Hemisphere during half of the year, and vice versa; it’s also why it’s hot in Australia during Christmas. The tilt fluctuates, however, between 22.1 degrees and 24.5 degrees, and it takes about 40,000 years to shift from one extreme to the other. The shifts in a planet’s axial tilt will most affect the climates around the poles, since those areas receive different amounts of sunlight depending on obliquity. Notably, it’s the climate of Westeros—as opposed to Essos, a more southerly continent—that shifts so extremely during winter, particularly in the north. Further, the four known continents of Westeros’s planet all seem to be in the same hemisphere. The southernmost land masses are the hottest and most inhospitable, suggesting proximity to an equator. Therefore, it is possible that during the Long Night, unknown people in a Southern Hemisphere spent a generation in Margaritaville. Finally: remember that tilted rod through the poles? It’s also swiveling, ever so slightly, in a circular fashion. This tilt precession, as it’s called, completes its cycle about every 25,000 years. What does this all have to do with Game of Thrones? Well, in the early 20th century, Serbian mathematician Milutin Milankovitch calculated when, in the past, each of these cycles—eccentricity, obliquity, and precession—was at its most extreme point. He also determined, crucially, when all three extremes occurred at the same time. Then he correlated those points of confluence to Earth’s major Ice Ages. His work was largely ignored until 1976, when deep-sea sediment samples confirmed that all of the major climate shifts in the last 450,000 years do in fact correspond to the cycles mapped out by Milankovitch. Therefore, as Douglas postulates: “You can imagine that if Westeros were on a planet for which these cycles were way faster or way stronger, then the continent could go in and out of extreme winter or summer on a decade-long scale. And you would have extreme seasonalities.” Moreover, the seasons wouldn’t be completely predictable to an untrained citizen of that planet, provided the length of each Milankovitch cycle varied—as Earth’s do. And in any case, isn’t science just fantasy explained? In medieval Europe, doctors believed illnesses were caused by demons and fairies. As late as 1895, a man in Ireland killed his wife because he believed she was a changeling—and that was during Milankovitch’s lifetime. In other words, perhaps even a magical explanation will ultimately have some science behind it, too. Give Samwell Tarly a chance to dive into those Citadel books and figure it out, won’t you, George?
https://www.vanityfair.com/hollywood/2017/07/game-of-thrones-westeros-winter-climate-science
Climate activists gathered on Feb. 21 to call on Gov. Jay Inslee to stop fracked gas. As communities push for a transition to clean, renewable energy, the fossil fuel industry loves to claim that gas has a place in that clean energy future. But most “natural” gas comes from fracking, a dirty and dangerous process that pollutes drinking water and increases the risk of earthquakes. The true climate impacts of fracked gas are becoming clearer as we learn more about the methane that leaks during the process and pipeline transport of gas. Methane is a greenhouse gas 87 times more potent than carbon dioxide while it remains in the atmosphere. When we take that pollution into account, we see that gas is just as bad for the climate, if not worse, than other fossil fuels like oil or coal. Inslee has made Washington a leader in the transition to clean energy. But we can’t build a clean energy economy while relying on fossil fuels, and real climate leadership means stopping the expansion of these dirty fuels, including fracked gas. I urge him to take a stand against proposed fracked gas projects in Tacoma and Kalama.
https://www.thenewstribune.com/opinion/letters-to-the-editor/article227275509.html
We continue the series dedicated to the history of football Prahov, where readers had the opportunity to discover some of the most interesting details about the history of football in our province. After consecutive years, enjoying exceptional material signed by Konstantin Dumitru-Blobini, we present to you some of the episodes collected from another source, the three-volume work entitled “History of Country Football”, published in 2020, signed by journalist Octavian Kojocaro. In this episode, we go back in time, 86 years ago, to 1936, because then the strangest game in the history of country football and Beloitte happened. The match counted for the so-called “Provincial Cup”, a competition with an official in those years, which pitted the representatives of the cities against each other. The best football players of the city clubs played in the “Mukhtar” of the city. Campina and Ploesti met several times in this competition. Sometimes the peasants were victorious, sometimes the Ploiešte people were victorious. The strangest match took place in 1936 between the representative teams of Campina and Ploechte. This is a story you’ve never heard of before! “History of Country Football”, Volume 1, Chapter 2. 12, Page 84 At the “Provincial Cup”, the Campina representative again caused a sensation. The city’s best players enjoyed the first three rounds: 3-0 with Mislea, 2-0 with Azoga and 3-0 with Buzau. In the quarter-finals, a duel with the national team Ploiești followed. It was an atypical duel from all points of view. The first 45 minutes were played on June 28, 1936 in Ploiesti. The score was 2-2. But the second half did not go into it because of a horse encounter! The match was decided to continue the next day on June 29. The second half was held in Campina! The hosts won it 2-0. The “official” match ends here. But since the rural audience paid tickets to watch a 90-minute football match, it was decided to play another “friendly” half: Campina also won this match with a score of 1-0. This was the story of a match that started one day, in one city, and continued the next day, in another, and had two halves of “official” and one “friendly.” In the semi-finals, Câmpina was supposed to receive a visit from Galai, but the opponents did not show up. In the final, Câmpina now had to play away from home, at Turnu Măgurele. They have traveled, but it was better to stay at home: Torno Mogorelli – Campina 10-1! “History of Country Football”, Volume 1, Chapter 2. 10, pp. 69-70 We take another leap in time, until August 1934, to see the date of another match at Câmpina – Ploiesti, surprisingly won by the peasants. The press at the time gave the victory of the Ploist people as a sure thing in the records of that duel, but the result contradicted expectations. Today, in Campina and Constanta, the Provincial Cup matches (…) Plostini will move to Campina. The Republicans have a much better team than their competitors. They have more experienced players, better individually, who will be able to achieve an easy victory for their city. Câmpina will try to use the environment feature (na-private) to limit the score. So it is expected to be a tough match. (Daily Sport, August 13, 34) Câmpina eliminates Ploeşti 3-1 (0-1) beautiful performance by peasants Field 12 (by phone). – The county cup match that was held today in our city in front of 600 spectators between the representative teams of Ployi and Campini, returned after a beautiful match against the people. Guests with a team made up of the best elements couldn’t resist the simple team that gave a game worthy of recognition. Isbânda Câmpinei was well deserved. The success of Colors of Our City is largely due to the work done by Mr. Nicu Rădulescu, President of the Sportul Muncitoresc Group. The first half was in favor of Beloist, who scored through Vasilescu. In the second part of the game, the locals come back with a force and crush the opponent’s defense. Paulini (Bucharest) led the following formations: area: Georgescu. Geller I, Caramelio, Badior, Cuproyo, Teodosio; Geller II, Ultiano, Creo, Karason, Marinaro. rain: Zaharsko. Dragomirescu I, Dragomirescu II, Popescu, Danché, Mueller, Obretcovici, Reingrueber, Spirea, Vasilescu, Atanasiu. You are (Sports newspaper, August 14, 1934). Campina then had his first stunning run in the Provincial Cup, reaching the semi-finals. After the liquidation, one by one, representatives of Buzău (score 4-1), Târgovişta (2-1), Alexandria (3-1), Ploieşti (3-1) and Galaţi (by no-show), followed by the finalist Bazargic (na – Today Dobrici or Dobrich, located on the territory of Bulgaria. In 1936, the Quartet was the property of Romania). Before this duel, there was a lot of talk in the media at the time, for some incredible reason. Campina and Pazargykol refuse to organize the semi-finals of the Provincial Cup Campina and Pazargykol, who qualify for the semi-finals of the Provincial Cup, will meet at one of the stadiums of the respective cities. Neither Câmpina nor Bazargicul wants to organize this semi-final. In FRFA, the opinion was made that the match should take place in a neutral city, namely in Ploești. The Republicans’ answer has not yet been obtained, because members of the Ploetty District are far away. (Sports Gazette, August 19, 1934). The semi-finals of the Provincial Cup takes place on Sunday, Kampina meets Pazardzic The semi-finals of the Provincial Cup, for which the teams of the cities of Campina and Pazardzic qualified, will be held on Sunday. Since the two cities were not initially willing to receive the organization, it was said that the semi-finals would be held in a neutral city. In the end, Pazargikul decided to organize the semi-final match that will be held on Sunday. (Sports newspaper, August 24, 1934). Pazargikul Province Cup He qualified for the final by defeating Campina 7-2 (5-0). Pazardzhik (26, by phone). Today, the semi-final match of the County Cup was held in the city, between the representatives of Pazardzic and Kampina. Victory returned to the general surprise of the locals with a score of 7-2. Pazardzic played an excellent game. After a half in which they clearly controlled, the Campignans regained their composure at the start of the second, only to concede again towards the end. After this victory, Pazargikul qualified for the final of the Provincial Cup, to go into the final against the representative of the capital. The game began to notice Pazargic’s superiority. They scored: in the 10th minute, Kopylchino (no – not Abolchinov, as he appeared in Sportol Zelnik). In the 15th minute, the same Kobelciano increased the score. In the 25th minute, Kosticho, in the 29th minute, Kopelchino and in the 42nd minute, the result of the first half with a score of 5-0 in favor of Pazardzic. At the second half, Câmpina regains his composure and puts pressure on the locals for a while and scores two goals through Gheorghiu in the 13th and 19th minutes. Towards the end, Pazargikul recovers and punches Georgescu’s goal twice through Sibi and Kopelchino. Pazargic, Kopelchino, Firdaus and Lubin stood out, and Giorgio played well from Campina. In front of more than 2,000 spectators, Mr. Guţescu (Bucharest) commanded the following formations excellently: Pazarzhik: Vahan – Cristo, Lubin – Kobelchino, Achim, Vardo – Pasco, Kostic, Miko, Robcic, Sebi area: Georgescu-Geller II, Caramalo-Stenscu, Burdur, Teodosio-Ionescu, Giorgio, Geller I, Ultiano, Caraccio. (Gazzetta Sportorilor, August 28, 34) If they had qualified for the final, Campina would have faced the Bucharest representative team, who officially qualified in the final chapter, under consideration.Here is the best representative from the Southern League.
https://goldaryagayrimenkul.com/2022/09/21/unforgettable-pages-of-brahian-football-history-match-that-was-played-on-two-different-days-in-two-different-cities-and-it-was-three-halves-fourthly/
For something that emits no light that we can detect, black holes love to blanket themselves in radiation. In fact, some of the brightest light in the Universe comes from supermassive black holes. Well, not really black holes themselves; it is the material that surrounds them as they actively suck up large amounts of matter from their immediate surroundings. Among the brightest of these maelstroms of swirling hot matter are galaxies known as blazars. Not only do they glow with the heat of a swirling mantle, but they also channel matter into “blazing” beams that shoot through the cosmos, emitting electromagnetic radiation at energies that are difficult to comprehend. Scientists have finally discovered the mechanism producing the incredible high-energy light that has been beaming at us for billions of years: shocks in the black hole’s jets that increase the speed of particles to breathtaking speeds. “It’s a 40-year-old mystery that we have solved,” says astronomer Yannis Liodakis of the Finnish Center for Astronomy with ESO (FINCA). “We finally had all the pieces of the puzzle, and the picture they made was clear.” Most galaxies in the Universe are built around a supermassive black hole. These mind-bogglingly large objects sit at the center of the galaxy, sometimes doing very little (like Sagittarius A*, the black hole at the heart of the Milky Way) and sometimes doing a lot. This activity consists of accrete matter. A vast cloud gathers into an equatorial disk around the black hole, encircling it like water around a drain. The frictional and gravitational interactions at play in the outer space surrounding a black hole cause this material to heat up and glow over a range of wavelengths. It is one of the light sources of a black hole. The other – the one at play in the blazars – are twin jets of matter launched from the polar regions outside the black hole, perpendicular to the disk. These jets are believed to be materials from the inner edge of the disk which, rather than falling towards the black hole, are accelerated along the outer magnetic field lines towards the poles, where they are launched at very high speeds, close of the speed of light. . For a galaxy to be classified as a blazar, these jets must be aimed almost directly at the viewer. It’s us on Earth. Thanks to the particles’ extreme acceleration, they radiate light across the entire electromagnetic spectrum, including high-energy gamma and X-rays. Exactly how this jet accelerates particles to such high speeds has been a giant cosmic question mark for decades. But now a powerful new X-ray telescope called the Imaging X-ray Polarimetry Explorer (IXPE), launched in December 2021, has given scientists the key to solving the mystery. It is the first space telescope to reveal the orientation, or polarization, of X-rays. “The first measurements of X-ray polarization of this class of sources allowed, for the first time, a direct comparison with models developed from the observation of other frequencies of light, from radio to gamma rays at very high energy,” says astronomer Immacolata Donnarumma of the Italian Space Agency. IXPE was shot at the brightest high-energy object in our sky, a blazar called Markarian 501, located 460 million light-years away in the constellation of Hercules. For a total of six days in March 2022, the telescope collected data on the X-ray light emitted by the blazar jet. At the same time, other observatories were measuring light from other wavelength ranges, from radio to optical, which were previously the only data available for Markarian 501. The team quickly noticed a curious difference in the X-ray light. Its orientation was significantly more twisted, or polarized, than low-energy wavelengths. And optical light was more polarized than radio frequencies. However, the direction of the polarization was the same for all wavelengths and aligned with the direction of the jet. The team found this to be consistent with models in which shocks in the jets produce shock waves that provide additional acceleration along the length of the jet. Closest to the shock, this acceleration is at its maximum, producing X-ray radiation. Further along the jet, the particles lose energy, producing an optical then radio emission of lower energy, with a weaker polarization. “As the shock wave passes through the region, the magnetic field becomes stronger and the energy of the particles increases,” says astronomer Alan Marscher of Boston University. “The energy comes from the motion energy of the material that produces the shock wave.” It’s unclear what creates the shocks, but one possible mechanism is faster material in the jet catching up with slower clumps, leading to collisions. Future research could help confirm this hypothesis. Given that blazars are among the most powerful particle accelerators in the Universe and one of the best laboratories for understanding extreme physics, this research marks a pretty important piece of the puzzle. Future research will continue to observe Markarian 501 and turn the IXPE to other blazars to see if a similar bias can be detected. The research has been published in natural astronomy.
https://tryshaklee.com/2022/11/25/cbmibwh0dhbzoi8vd3d3lnnjawvuy2vhbgvydc5jb20vd2utzmluywxses1rbm93lwhvdy1ibgfjay1ob2xlcy1wcm9kdwnllxrozs1tb3n0lwjyawxsawfudc1sawdodc1pbi10agutdw5pdmvyc2xsaqaoc5/
Copyright: © 2012 Cosgrove, Krimsky. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Funding: No specific funding was received for writing this article. Competing interests: The authors have declared that no competing interests exist. Abbreviations: APA, American Psychiatric Association; DSM , Diagnostic and Statistical Manual of Mental Disorders ; FCOI, financial conflict of interest; KOL, key opinion leader Provenance: Not commissioned; externally peer reviewed. Summary Points - The American Psychiatric Association (APA) instituted a financial conflict of interest disclosure policy for the 5th edition of the Diagnostic and Statistical Manual of Mental Disorders (DSM). - The new disclosure policy has not been accompanied by a reduction in the financial conflicts of interest of DSM panel members. - Transparency alone cannot mitigate the potential for bias and is an insufficient solution for protecting the integrity of the revision process. - Gaps in APA’s disclosure policy are identified and recommendations for more stringent safeguards are offered. Introduction All medical subspecialties have been subject to increased scrutiny about the ways by which their financial associations with industry, such as pharmaceutical companies, may influence, or give the appearance of influencing, recommendations in review articles and clinical practice guidelines . Psychiatry has been at the epicenter of these concerns, in part because of high-profile cases involving ghostwriting , and failure to report industry-related income , and studies highlighting conflicts of interest in promoting psychotropic drugs ,. The revised Diagnostic and Statistical Manual of Mental Disorders (DSM), scheduled for publication in May 2013 by the American Psychiatric Association (APA), has created a firestorm of controversy because of questions about undue industry influence. Some have questioned whether the inclusion of new disorders (e.g., Attenuated Psychotic Risk Syndrome) and widening of the boundaries of current disorders (e.g., Adjustment Disorder Related to Bereavement) reflects corporate interests ,. These concerns have been raised because the nomenclature, criteria, and standardization of psychiatric disorders codified in the DSM have a large public impact in a diverse set of areas ranging from insurance claims to jurisprudence. Moreover, through its relationship to the International Classification of Diseases , the system used for classification by many countries around the world, the DSM has a global reach. After receiving criticism that DSM-IV had no financial disclosure of panel members, to its credit the APA instituted a mandatory disclosure policy . The DSM-5 panel members are required to file financial disclosure statements, which are expected to be listed in the publication, and the APA has made a commitment to improve its management of financial conflicts of interest (FCOIs). This new APA requirement makes the DSM‘s disclosure policy more congruent with most leading medical journals and federal policies on FCOI. FCOIs are widely recognized as problematic because of the data showing a clear connection between funding source and study outcome whereby results are favorably biased toward the interests of the funder –—what has been referred to as the “funding effect” . Some have argued that greater transparency of financial interests may facilitate a decline in FCOIs and a decrease in the potential bias that accompanies them, and that it may encourage professionals and consumers to more critically evaluate medical information . Others are not sure that disclosure will reduce FCOIs and the potential for bias, because transparency alone just “shifts the problem from one of ‘secrecy of bias’ to ‘openness of bias’” . Additionally, there is the concern that disclosure may open the door for subterfuge . That is, when researchers or panel members list every affiliation that they have ever had, including funding from federal agencies, it can create a “signal-to-noise problem,” thereby obscuring the truth about deeply problematic financial relationships with industry. We have reported elsewhere on industry relationships with DSM-5 task force members . Although the composition of the task force has changed slightly since its formation in 2007 (e.g., Pilecki et al. found 72% of the members had ties in early 2011) industry relationships persist despite increased transparency. Currently, 69% of the DSM-5 task force members report having ties to the pharmaceutical industry. This represents a relative increase of 21% over the proportion of DSM-IV task force members with such ties (57% of DSM-IV task force members had ties). This finding is congruent with emerging data from fields outside of psychiatry suggesting that transparency of funding source alone is an insufficient solution for eliminating bias –. In 2006 we analyzed all DSM-IV panel members’ financial associations with industry . We have undertaken a similar analysis for DSM-5 panels, which allowed us to compare the proportions of DSM-IV and -5 panel members who have industry ties. There are 141 panel members on the 13 DSM-5 panels and 29 task force members. The members of these 13 panels are responsible for revisions to diagnostic categories and for inclusion of new disorders within a diagnostic category. Three-fourths of the work groups (Figure 1; ,–,,–) continue to have a majority of their members with financial ties to the pharmaceutical industry. It is also noteworthy that, as with the DSM-IV, the most conflicted panels are those for which pharmacological treatment is the first-line intervention. For example, 67% (N = 12) of the panel for Mood Disorders, 83% (N = 12) of the panel for Psychotic Disorders, and 100% (N = 7) of the Sleep/Wake Disorders (which now includes “Restless Leg Syndrome”) have ties to the pharmaceutical companies that manufacture the medications used to treat these disorders or to companies that service the pharmaceutical industry. Download: Figure 1. Comparison of financial conflicts of interest among DSM-IV and DSM-5 task force and work group members. https://doi.org/10.1371/journal.pmed.1001190.g001 Gaps in APA’s Disclosure Policy Although the APA has made the disclosure of FCOIs of DSM panel members more transparent, there are important gaps in the current policy that need to be addressed: - The current APA disclosure policy does not require panel members to specifically identify speakers’ bureau membership but rather cloaks it under “honoraria.” (A speakers’ bureau usually refers to an arrangement between a commercial entity or its agent whereby an individual is hired to give a presentation about the company’s product. The company typically has the contractual right to create and/or control the content of the presentation.) Therefore, despite increased transparency, it remains unclear how many individuals participate on speakers bureaus, because panel members may simply list “honoraria.” None of the DSM panel members identified participation on a speakers bureau. When we did an internet search of the 141 panel members, we found that 15% had disclosed elsewhere that they were members of drug companies’ speakers bureaus or advisory boards. These internet searches were conducted for sources published in the years 2006 (1 year before the task force was appointed) to 2011, a time period congruent with published research on financial conflicts of interest. Searches included peer-reviewed articles, conferences, participation in continuing medical education events (i.e., courses and/or seminars for health professionals) and self-reporting of any industry ties following interviews with the media. Speakers bureau and advisory board participation were included in our analysis only when there was unambiguous information (e.g., “Dr. Smith discloses that he serves on the speakers bureau for Eli Lilly and Pfizer”) and both authors (LC, SK) were in agreement. The nature of these relationships needs to be spelled out more precisely; speakers bureau participation is usually prohibited elsewhere (e.g., for faculty in medical schools), as it is widely recognized to constitute a significant FCOI. Pharmaceutical companies refer to individuals who serve on speakers bureaus as “key opinion leaders” (KOLs) because they are seen as essential to the marketing of diseases as well as drugs. - Exclusions to the APA DSM-5 disclosure policy include unrestricted research grants ; that is, panel members are not required to disclose unrestricted research grants from industry. However, we would argue that this exclusion allows for commercial interests to be reflected in the revision process: there is no evidence to suggest that simply because money comes in the form of a large “unrestricted” research grant it does not create an obligation to reciprocate or invoke an implicit bias. - The current policy places high and arbitrary threshold limits on monies allowed from industry: DSM panel members are allowed to receive US$10,000 per year from industry (e.g., for consultancies), and panel members are allowed to have up to US$50,000 in stock holdings in pharmaceutical companies. - In contrast to other disclosure policies (e.g., the Physician Payments Sunshine Act of 2007 and the 2011 US National Institutes of Health policy on conflicts of interest), APA’s policy does not require disclosure of the amount of money received from industry. However, transparency alone cannot mitigate bias. Because industry relationships can create a “pro-industry habit of thought” , having financial ties to industry such as honoraria, consultation, or grant funding is as pernicious a problem as speaker’s bureau participation. Over four decades of research from social psychology clearly demonstrates that gifts—even small ones—create obligations to reciprocate –. Also, because of the enormous influences of diagnostic and treatment guidelines, the standards for participation on a guideline development panel should be higher than those set for an average faculty member ,. Conclusion The DSM-5 will be published in about 14 months, enough time for the APA to institute important changes that would allow the organization to achieve its stated goal of a “… transparent process of development for the DSM, and …an unbiased, evidence-based DSM, free from any conflicts of interest” [emphasis added] . Toward that goal we believe it is essential that: - As an eventual gold standard and because of their actual and perceived influence, all DSM task force members should be free of FCOIs. - Individuals who have participated on pharmaceutical companies’ Speakers Bureaus should be prohibited from DSM panel membership. - There should be a rebuttable presumption of prohibiting FCOIs among the DSM work groups. When no independent individuals with the requisite expertise are available, individuals with associations to industry could consult to the DSM panels, but they would not have decision-making authority on revisions or inclusion of new disorders. These changes would accommodate the participation of needed experts as well as provide more stringent safeguards to protect the revision process from either the reality of or the perception of undue industry influence. Author Contributions Analyzed the data: LC SK. Wrote the first draft of the manuscript: LC. Contributed to the writing of the manuscript: LC SK. ICMJE criteria for authorship read and met: LC SK. Agree with manuscript results and conclusions: LC SK. References - 1.Tsai AC, Rosenlicht NZ, Jureidini JN, Parry PI, Spielmans GI, et al. (2011) Aripiprazole in the maintenance treatment of bipolar disorder: a critical review of the evidence and its dissemination into the scientific literature. PLoS Med 8: e1000434. - 2.Cosgrove L, Bursztajn HJ, Krimsky S, Anaya M, Walker J (2009) Conflicts of interest and disclosure in the American Psychiatric Association’s Clinical Practice Guidelines. Psychother Psychosom 78: 228–232. - 3.Lacasse JR, Leo J (2010) Ghostwriting at elite academic medical centers in the United States. PLoS Med 7: e1000230. - 4.Roehr B (2011) Professor files complaint of scientific misconduct over allegation of ghostwriting. BMJ 343: d4458. - 5.Harris G, Carey B (2008, June 8) Researchers fail to reveal full drug pay. New York Times. Available: http://www.nytimes.com/2008/06/08/us/08conflict.html?pagewanted=all. Accessed 11 January 2012. - 6.Heres S, Davis J, Maino K, Jetzinger E, Kissling W, et al. (2006) Why olanzapine beats risperidone, risperidone beats quetiapine, and quetiapine beats olanzapine: An exploratory analysis of head-to-head comparison studies of second-generation antipsychotics. Am J Psychiatry 163: 185–194. - 7.Perlis R, Perlis C, Wu Y, Hwang C, Joseph M, et al. (2005) Industry sponsorship and financial conflict of interest in the reporting of clinical trials in psychiatry. Am J Psychiatry 162: 1957–1960. - 8.Angell M (2010) The illusions of psychiatry. New York Rev Books 58: 20–22. - 9.Frances A (2010) Opening Pandora’s box: The 19 worst suggestions for DSM5. Psychiatric Times 27: 9. - 10.World Health Organization (1992) International statistical classification of disease and related health problems, Tenth Revision (ICD-10). Geneva: World Health Organization. - 11.American Psychiatric Association (2007, July 23) APA names DSM-V task force members: leading experts to revise handbook for diagnosing mental disorders [Press release #07-57]. Available: http://www.dsm5.org/Newsroom/Documents/07-57%20APA%20Announces%20DSM%20Task%20Force%20Members.pdf. Accessed 16 November 2011. - 12.Bekelman J, Li Y, Gross C (2003) Scope and impact of financial conflicts of interest in biomedical research: A systematic review. JAMA 289: 454–465. - 13.Stelfox H, Chua G, O’Rourke K, Detsky A (1998) Conflict of interest in the debate over calcium-channel antagonists. N Engl J Med 338: 101–106. - 14.Kjaergard L, Als-Nielsen B (2002) Association between competing interests and authors’ conclusions: Epidemiological study of randomised clinical trials published in the BMJ. BMJ 325: 249. - 15.Krimsky S (2010) Combating the funding effect in science: What’s beyond transparency? Stanford Law Policy Rev XXI: 101–123. - 16.National Research Council (2009) Conflict of interest in medical research, education, and practice [consensus report]. In: Lo B, Field MJ, editors. Washington, DC: National Academies Press. Available: http://www.iom.edu/Reports/2009/Conflict-of-Interest-in-Medical-Research-Education-and-Practice.aspx. Accessed 11 January 2012. - 17.Matheson A (2008) Corporate science and the husbandry of scientific and medical knowledge by the pharmaceutical industry. Bio Societies 3: 355–382. - 18.Cosgrove L, Bursztajn HJ, Krimsky S (2009) Developing unbiased diagnostic and treatment guidelines in psychiatry. N Eng J Med 360: 2035–2036. - 19.Pilecki BC, Clegg JW, McKay D (2011) The influence of corporate and political interests on models of illness in the evolution of the DSM. Eur Psychiatry 26: 194–200. - 20.Jørgensen AW, Hilden J, Gøtzsche PC (2006) Cochrane reviews compared with industry supported meta-analyses and other meta-analyses of the same drugs: systematic review. BMJ 331: 782–785. - 21.Bhandari M, Busse JW, Jackowski D, Montori VM, Schünemann H, et al. (2004) Association between industry funding and statistically significant pro-industry findings in medical and surgical randomized trials. Can Med Assoc J 170: 477–480. - 22.Lesser LI, Ebbeling CB, Goozner M, Wypij D, Ludwig DS (2007) Relationship between funding source and conclusion among nutrition-related scientific articles. PLoS Med 4: e5. - 23.Cain DM, Lowenstein G, Moore DA (2005) The dirt on coming clean: Perverse effects of disclosing conflicts of interest. J Legal Stud 31: 1–25. - 24.Cosgrove L, Krimsky S, Vijayaraghavan M, Schneider L (2006) Financial ties between DSM-IV panel members and the pharmaceutical industry. Psychother Psychosom 75: 154–160. - 25.Lexchin J, O’Donovan O (2010) Prohibiting or ‘managing’ conflict of interest?: A review of policies and procedures in three European drug regulation agencies. Soc Sci Med 70: 643–647. - 26.Katz D, Caplan AL, Merz JF (2003) All gifts large and small: Toward an understanding of the ethics of pharmaceutical industry gift-giving. Am J Bioeth 3: 39–46. - 27.Mather C (2005) The pipeline and the porcupine: Alternate metaphors of the physician-industry relationship. Soc Sci Med 60: 1323–1334. - 28.Mauss M (1967) The gift: Forms and functions of exchange in archaic societies (I. Cunnison, Trans.). New York: W.W. Norton Co. 130 p. - 29.Mendelson TB, Meltzer M, Campbell EG, Caplan AL, Kirkpatrick JN (2011) Conflicts of interest in cardiovascular clinical practice guidelines. Arch Intern Med 171: 577–584. - 30.Institute of Medicine (2011) Clinical practice guidelines we can trust: Report brief. Washington (DC): National Academies Press. Available: http://www.iom.edu/~/media/Files/Report%20Files/2011/Clinical-Practice-Guidelines-We-Can-Trust/Clinical%20Practice%20Guidelines%202011%20Report%20Brief.pdf. Accessed 30 March 2011. - 31.American Psychiatric Association (2010) DSM-5 Development: Frequently asked questions. Available: http://www.dsm5.org/about/pages/faq.aspx. Accessed 30 September 2011.
https://journalofpsychiatryreform.com/2019/11/26/a-comparison-of-dsm-iv-and-dsm-5-panel-members-financial-associations-with-industry-a-pernicious-problem-persists/
It’s our mission to share our knowledge and insights to help improve clinical trials using wearable sensors and digital biomarkers. The future of clinical trials involves large amounts of real-world data collected continuously for days to weeks at a time. These data provide the opportunity to identify and study novel endpoints that directly and comprehensively reflect disease manifestation and progression. Real-world data, however, can be prone to artifact which must be appropriately rectified before accurate and clinically meaningful results can be achieved. In the webinar, you’ll get details on how a combination of human augmented AI and robust algorithms helped the clinical research team improve patient outcomes through better science. Escalating costs and plummeting success rates has the pharmaceutical industry reevaluating how clinical drug trials are conducted. During this webinar presentation, you’ll hear from an expert panel about bringing digital endpoints online as quickly as practically possible. Watch Now uring this presentation, our lead scientist, Kate Lyden, Ph.D, shares an example of one of the first regulated clinical trials that used a wearable sensor to monitor or measure a digital biomarker in a patient’s home setting. Watch Now Click on a topic below to view the related publications.
https://www.vivosense.com/learning-center
Is August 19th your birthday? If so, you’re a person who’s loyal, enthusiastic, and proud. You’re also someone who’s warm-hearted and has a great appreciation for the finer things in life. Furthermore, you’re not afraid to take risks or pursue your dreams – and you’re always up for a worthy challenge. But what else can your birthday reveal about you? Let’s take a closer look. August 19 Zodiac Chart What an August 19 Birthday Says About You The zodiac sign for people born on August 19th is Leo. Lion-hearted and independent, Leos are the natural leaders of the zodiac. They’re confident, charismatic, and always striving to do their best. What’s more, they’re generous and have a big heart, which is why they’re always surrounded by friends and family. Leos are also known for being ambitious and passionate, so it’s no surprise that many of them go on to achieve great things in their lives. Yet one of their greatest strengths is also their greatest weakness. Leos can be quite stubborn, and they’re often unwilling to compromise. This can make them inflexible and difficult at times, but it also drives them to achieve their goals. But overall, Leos are confident, charming, and loyal people who will always stand by your side when you need them. August 19 Birthday Personality Traits If you were born on August 19th, your numerology Birth Day number is 1. People with a Birth Day number 1 are adventurous, ambitious, and energetic. In addition, they have strong convictions and they’re not afraid to stand up for what they believe in when something truly matters to them. Interestingly, people with a birthday number 1 often have a creative streak (which aligns well with the Leo traits) and they have no problem sharing their ideas with others. They’re also very honest and direct, which can sometimes make them seem blunt or insensitive. But this is simply because they communicate their thoughts and feelings honestly and openly. These people also love a challenge; so they’re always looking for new opportunities to test their skills and abilities. And they’re never content with just sitting still; they always want to be on the go, exploring new things and places whenever possible. August 19 Birthday Challenges One of the challenges for people born on August 19th is how they can be quite opinionated. They’re not afraid to speak their mind, even if it means upsetting or offending others. Furthermore, they can be quite stubborn, and they’re often unwilling to compromise, which can make them inflexible and difficult at times. Another challenge for people born on this day is they can be quite impulsive, and they may act without thinking things through properly at times. This can sometimes lead to them making rash decisions that they later regret. But ultimately, the challenges faced by people born on August 19th are no match for their determination, courage, and strength of character. So whatever life throws at them, they’ll always find a way to overcome it. August 19 Birthday Best Careers People born on August 19th make great leaders, so they’re often drawn to careers in management or executive positions. They’re also good at multitasking and handling multiple projects at once, so they excel in fast-paced careers such as sales, marketing, or project management. Furthermore, their natural creativity and charisma make them well-suited for careers in the arts, media, or entertainment. And finally, their independent nature means they’re often drawn to careers that allow them to work independently, such as entrepreneurship, writing, or freelancing. August 19 Zodiac Compatibility Guide Leo signs are most compatible with Aries, Gemini, Libra, and Sagittarius. Let’s take a closer look at each of these signs. Aries Leo and Aries are a great match because they share many of the same qualities, including being confident, dynamic, and passionate. Both Leo and Aries thrive on excitement and adventure. Additionally, Aries is always willing to try new things, which makes them a perfect partner for Leo. Gemini Gemini and Leo are a compatible match because they both have a strong need for independence and freedom, which they can respect about each other. Gemini also has a great sense of humor, which Leo will appreciate. While there may be some competition between them, overall, they’re able to understand and respect each other. This understanding creates a strong foundation for a lasting relationship. Libra Leo is attracted to Libra’s charm and social graces, and Libra is drawn to Leo’s warmth and generosity. Both signs are very visual, so they’re likely to be physically attracted to each other as well. Leo is a natural leader, while Libra is a peacemaker. This complementary dynamic can create an interesting balance in the relationship. Leo may feel more inspired by Libra’s balanced perspective, while Libra may appreciate Leo’s willingness to take charge and make things happen. Sagittarius Leo and Sagittarius have a great deal in common. They both enjoy being in the company of others, they’re both optimistic, and they’re both very honest. Leo is attracted to Sagittarius’ upbeat attitude and zest for life, while Sagittarius is drawn to Leo’s warmth and generosity. Both signs are also active and independent, so there’s never a dull moment when they’re together. They love to explore new things and travel, and they always have a good time when they’re together. August 19 Lucky Colors People born on August 19th have the lucky colors of orange and gold. Orange is the color of vitality, creativity, and enthusiasm. It’s a warm and exciting color that inspires confidence and optimism. Gold is the color of success, achievement, and prosperity. It’s a luxurious color that represents abundance and wealth. August 19 Lucky Numbers The lucky numbers for people born on August 19th are 1, 4, 10, 13, and 19. - 1 represents new beginnings, leadership, and self-reliance. - 4 is associated with hard work, determination, and practicality. - 10 symbolizes success, status, and honor. - 13 represents change, transformation, and new beginnings. - 19 is associated with determination, strength of character, and personal power. August 19 Birthday Gift Ideas The perfect gift for someone born on August 19th is something that’s unique, creative, and exciting. They’ll also appreciate a gift that is luxurious and indulgent. Some potential gift ideas include: - Tickets to a concert or show - A piece of art or jewelry - A gift certificate to a spa or salon - An exotic vacation - A designer handbag or shoes - A gourmet dinner at a fancy restaurant Ultimately, the best gift for someone born on August 19th is something that speaks to their sense of style and their love of the finer things in life. However, the most important thing is to make sure the gift is heartfelt and comes from the heart, too. August 19 Birthstone The birthstones for those born on August 19th are Peridot and Spinel. Peridot is a beautiful green gemstone that symbolizes hope, renewal, and new beginnings. It’s also said to promote healing and protect against negative energy. Spinel is a versatile gemstone that comes in a variety of colors, including red, pink, and purple. It’s associated with strength, vitality, and determination, as well as protection against negative energy. Final Thoughts If you were born on August 19th, you’re a creative, stylish individual with a strong sense of self. And you’re a confident and optimistic individual, who’s always generous and loyal to the other people in your life. Furthermore, you’re independent and hardworking, and you’re always up for a new challenge. With these key traits in mind, here are a few tips that’ll help you make the most of your special birthday personality: 1. Stay true to yourself. You’re a unique individual with a lot to offer, so don’t be afraid to be yourself and stand out from the crowd. When you’re being true to yourself, you’ll be happier and more successful in the long run. 2. Stay positive. You’re an optimistic person by nature, so stay positive and focus on the good in every situation. When you look on the bright side, you’ll be able to achieve your goals and reach your full potential with grace and good humor. 3. Don’t be afraid to take risks. You’re an adventurous person who loves to try new things, so don’t be afraid to take risks. Stepping out of your comfort zone will lead to new opportunities and experiences, even if it’s a little scary at times. 4. Work hard. You’re a hardworking person, so don’t be afraid to put in the effort to achieve your goals. When you work hard, you’ll be rewarded with success and growth in the areas that matter most to you. 5. Be generous. You’re a generous person, so don’t hesitate to give your time, energy, and resources to help others. When you’re kind and giving, you’ll make a positive impact on the world as well as the people you’re closest to. What’s more, you’ll be rewarded with happiness and satisfaction even when the going gets tough. Overall, you’re an amazing individual with a lot to offer the world. Use your special gifts and talents to make a difference in the world, and you’ll be truly happy and fulfilled!
https://destinyawakens.com/august-19-zodiac/
This topic describes how Microsoft SharePoint Foundation 2010 and Microsoft SharePoint Server 2010 applications use the Microsoft.SharePoint.Upgrade object model to upgrade deployments. The information provided in this topic is descriptive and is not meant for general public use. SharePoint Foundation 2010 and SharePoint Server 2010 use the object model of the Microsoft.SharePoint.Upgrade namespace to define upgrade actions for server applications that are built on the SharePoint Foundation 2010 platform when upgrading to the next version or build of SharePoint Foundation. The object model is used to define a sequence of actions to perform various specific tasks in a consistent manner, as required by a server application to upgrade to a new version or build of SharePoint Foundation. Warning If you attempt to include custom code as part of the SharePoint Foundation upgrade pipeline, you may cause various problems. For example, because namespace naming must be unique and not overlap with default product names, schema versioning may become confused and lead to a corrupt environment whenever SharePoint Foundation service packs are released. Also, using this object model in a custom upgrade application can have serious effects on performance. The only contexts in which you might use this object model are in build-to-build upgrades of the current version of SharePoint Foundation, or in version-to-version upgrade between the current version and the next version, such as for service packs or a build-to-build upgrade for a custom application. Instead of using this object model to define upgrade logic, use other means provided in SharePoint Foundation to upgrade a deployment. For example, Feature deployment event handlers allow you to implement custom code for upgrading Features. Whenever possible, use a declarative action in SharePoint Foundation to accomplish a task, rather than writing code. Modify Web Parts individually so that they work in Microsoft SharePoint Foundation 2010. And to upgrade a site definition, use an upgrade definition file (UDF) to define upgrade actions. Upgrade Classes The SPAction class is the base class from which other classes are derived for specific needs in an upgrade. For example, the SPDatabaseAction class inherits from SPAction for the specific purpose of defining actions for upgrading databases. An upgrade application may require, for example, that SharePoint Foundation perform actions for upgrading a server farm, as well as actions that upgrade Internet Information Services (IIS) Web sites, databases, SharePoint site collections, Web applications, and servers. The SPSequence class is the ultimate base class for the other sequence classes in the Microsoft.SharePoint.Upgrade namespace, which includes SPActionSequence, from which derives SPDatabaseSequence, SPIisWebSiteSequence, SPPersistedObjectSequence, and SPSiteSequence. The object model also implements resources such as the SPManager and SPMigrator classes to access upgrade properties and migrate installations. The SPUpgradeException class is used to trap exceptions specific to SharePoint Foundation. An upgrade sequence class has attribution that specifies the base type of upgrade action to load and run. Each upgrade action has a version attribute tag that specifies whether a particular upgrade action needs to run or not, by comparing the current version of the resource being upgraded with the target version of the upgrade action. The version attribute tag is also used in sorting the individual upgrade actions. [TargetSchemaVersion("14.0.1.0")] [ActionBaseType(typeof(MyWebAppAction))] [TargetUpgradableObject(typeof(SPWebApplication))] The TargetSchemaVersion attribute of the sequence matches the TargetSchemaVersion attribute of the latest update action in the action module. Upgrade Sequences The SharePoint Foundation upgrade infrastructure defines an interface to upgrade a specific resource or service instance of an application. Each action module is paired with a similarly named action sequence module in a separate directory that defines the appropriate sequence for the action. An upgrade sequence defines a class that inherits from one of the sequence classes provided through the SharePoint Foundation object model and implements or overrides its members. The infrastructure calls upgrade code in a consistent and deterministic manner, in other words, as an upgrade sequence, which means a logical chunk of upgrade code for a single resource. Warning SharePoint Foundation does not support overwriting or attempting to append to one of its default upgrade sequences. Upgrading proceeds sequentially, beginning with items that are positioned higher in the logical hierarchy (closer to the root), but the process actually upgrades items at lower levels first (for example, the database before other objects) until an entire server farm has been upgraded. The upgrade process starts by upgrading the configuration database and SharePoint Central Administration, as well as data specific to each server in the farm, and then runs on each Web application to upgrade each site collection until all Web sites in all the site collections of each Web application are upgraded. Each Web application of the previous version is thereby upgraded one-by-one to a Web application in the current version, as are the content databases that support their site collections. An upgrade sequence consists of one or more upgrade actions discovered at run time that need to be taken to upgrade a specific feature. SharePoint Foundation accepts a resource instance or a set of resource instances, determines which upgrade sequences need to operate on the resources based on loaded assemblies that are specified in configuration files, and runs the sequences on the selected resources. The sequences are ordered according to the information specified in the configuration files. SharePoint Foundation upgrade is data-driven, which means that resources registered as upgradeable in the configuration database are upgraded in a specific order. Objects such as site collections may have several upgrade sequences. There may be upgrade sequences for Web applications (virtual servers), content databases, or shared services, and so on. An upgradeable object has built-in schema versioning, allows for provisioning of upgrade dependencies, and has properties that determine whether the current object needs to be upgraded and whether to upgrade it. The upgrade infrastructure includes an interface definition for upgradeable objects that upgrades a specific resource. Based on resources that need to be upgraded, upgrade sequences (or plug-ins) implement this interface so that upgrade code can be called. Upgrade sequences can be run any number of times on a given server. An upgrade sequence determines whether any action needs to be taken at any given time, and it also, in case of errors, provides adequate check-pointing to allow resumption of upgrade from a certain point the next time the upgrade code is run. Upgrade sequences create logs and report errors and progress back to the user interface. Configuration Files A configuration file is an XML file that indicates the DLL and class names for all plug-ins. These files are used at run-time to instantiate the correct classes and execute them by using reflection. SharePoint Foundation includes default configuration files in the %ProgramFiles%\Common Files\Microsoft Shared\web server extensions\14\Config\Upgrade folder that it uses to define the range of product versions and schema versions to which an upgrade applies, to register the assembly that defines classes for upgrade, to map old files to specified locations in the SharePoint Foundation 2010 setup directory, and to deprecate features that are included in the old version.
https://learn.microsoft.com/en-us/previous-versions/office/developer/sharepoint-2010/ms441632(v=office.14)
We don’t, and can’t, know how much it will cost to tackle climate change How much will it cost humanity to avoid dangerous climate change? Debates over this contentious topic inevitably focus on a set of economic models that seek to estimate those costs over the course of the next century. The latest such analysis is the 5th IPCC Assessment on Mitigation of Climate Change, which has people confidently asserting that properly addressing climate change will trim 0.06 percent a year off global GDP growth. Not 0.05 a year. Not 0.07. But 0.06. The much-ballyhooed New Climate Economy report, out earlier this year, draws many of the same conclusions. Can we really know the costs of mitigation out through the year 2100 with that level of precision? I’ve long had my own opinion on this, but I’m just a dirty hippie blogger. So I’ve been patiently waiting for somebody with credentials to express it for me, in a fancy peer-reviewed paper. Well, lucky me. I found the paper. (Thanks to the tweeter who flagged it for me — sorry I can’t remember who you are.) And it confirms my considered opinion on the matter, which is: No, we can’t know with that level of precision. In fact, we can’t know at all. This arguing back and forth over over models is so much posturing, a way of hiding our values and priors behind a sheen of econometrics. We should just drop the facade and debate our values directly. Let’s dig in, shall we? — The models that inform climate economics are called integrated assessment models (IAMs), which integrate models of energy markets and land use with greenhouse gas projections. They have come under plenty of criticism in the past; see, for instance, this paper from economist Frank Ackerman and colleagues, which picks apart many of the assumptions that cause IAMs to overstate costs of climate mitigation and understate the need for action. The paper I’m talking about — “The economics of mitigating climate change: What can we know?“, written by Richard Rosen of the Tellus Institute and Edeltraud Guenther of the Technische Universitaet Dresden — goes beyond that. It questions whether IAMs are up to the job at all. What IAMs are good for is determining the effects of marginal changes in one or a small set of economic variables. So you run your model of the economy without a $1 increase in the price of bacon, run it again with the $1 increase, compare the two, and voilà, you have a pretty good idea what the effect of raising bacon prices will be. Crucially, the proposed changes are modeled ceteris paribus (all else being equal). So in our example, only the price of bacon changes. Other parameters remain the same. This works great to model the effects of modest tweaks to the economy over modest time spans. But restraining global temperature increase to 2 degrees C or less — right now the generally agreed-upon international goal — will require much more than tweaks. It will take a long time. And all else will not remain equal. [M]itigation scenarios are not small perturbations on easily forecastable baseline scenarios, where linear ‘first order’ differences would dominate. Rather, mitigation scenarios represent major transformations of the economy relative to baseline scenarios and, thus, represent large and highly non-linear changes that will strongly impact the development of new energy technologies on both the supply and demand sides, as well as other relevant technologies that offset greenhouse gas emissions worldwide. “Large and highly non-linear changes” are not IAMs’ strong suit. Nor is this level of complexity. Climate IAMs have “hundreds of input parameters, each of which is highly uncertain in the long run.” Rosen and Guenther’s paper was published before the latest (5th) IPCC report, so it mostly focuses on the IPCC’s Fourth Assessment and the Stern Report (which in turn drew from a few common sources). But the issues it identifies apply regardless. The conclusion — spoiler! — is that the 50-to-100-year costs of mitigation are unknowable. We’ll take a quick look at why, and then we’ll ask what follows from it. — There are several critiques of IAMs in the paper but, recognizing your limited patience for modeling talk, I’ll just hit a few. First, there’s the question, compared to what? To calculate the net costs or benefits of climate mitigation policies, one must compare the carbon they reduce to a world in which the policies weren’t passed — a “baseline scenario” for CO2 emissions. What should that baseline scenario look like? Well, what will the global economy look like over the next 50 to 100 years without more climate mitigation? Uh … I don’t know. No one knows. How could anyone know? It’s ridiculous. Unchecked climate change may cause economic dislocations that substantially alter the course of GDP. “But integrated assessment modelers never model feedback between the amount of climate change and economic growth,” write the authors, “and would have an extremely difficult time doing so if they tried,” given the uncertainty of climate impacts. Or what if there’s an oil crisis, or financial crisis? Who the hell knows what’s going to happen over a century? Sure enough, IAMs have widely varying baseline scenarios, reflecting different assumptions about the pace and nature of growth. The chart below is from a meta-analysis of IAMs done by Barker et al., commissioned by the Stern Report and relied upon by the IPCC as well. It shows the range of baseline scenarios in the models it considered: What’s a 30 gigaton difference among friends? Since the cost differences between baseline and mitigation scenarios within a particular model tend to be fairly small, differences in baseline can substantially complicate any effort to do inter-model comparisons. Just averaging different baselines — throwing a bunch of contestable assumptions into a pot and stirring — seems unlikely to produce accurate results. “Because forecasting the future of the energy economy for the next 50–100 years is impossible (not just difficult),” they conclude, “there is no valid baseline emissions scenario to which the costs of a mitigation scenario can be compared.” — Second, and related, to calculate the net costs and benefits of climate mitigation, one needs a grasp of the climate damages that will be avoided by such mitigation. Yet most IAMs “do not include any estimates of the likely future damage due to climate change at all.” Because no reasonable damage estimates have been incorporated into most IAM results, and because there is tremendous uncertainty inherent in even trying to make monetized estimates of damages that have yet to happen on a global scale, it is very hard to estimate, even roughly, the net benefits of mitigating climate change in the long run. The IPCC’s Fourth Assessment, chapter three, says, “Due to considerable uncertainties and difficulties in quantifying non-market damages, it is difficult to estimate SCCwith confidence. Results depend on a large number of normative and empirical assumptions that are not known with any certainty.” Yet quantifying the social cost of carbon is the only way to know the monetary value of avoiding climate change! Chapter three also says, “the risk of climate feedbacks is generally not included in the … analysis.” But climate feedbacks, the vicious cycles whereby the effects of warming in turn accelerate warming, are the greatest danger of climate change, precisely the changes that have the potential to substantially affect GDP. Cumulatively, “these differential impacts [of climate change] on metrics such as GDP could be very substantial and could even be larger than the impacts on GDP of attempting to simply mitigate climate change.” Catch that? The damages avoided by climate mitigation could be larger than the cost of mitigation, yet they are invisible in most IAMs. It’s crazy. — Third and finally, there’s the question of technology costs. To calculate the total net costs and benefits of climate mitigation, one needs some estimate of the cost of investment in various mitigation technologies. Add up those investments and you get the gross cost of mitigation. Then subtract the value of the displaced carbon energy to get the net cost of mitigation. So, what is the cost of an increment of solar power in, say, 2060? Ha ha. Who the frack knows that? How about biomass, or CSS, or electric, self-driving cars, or so-called smart cities? How will advances in some of these technologies affect the cost of others? How will changes in consumption patterns or land use affect their costs? No one knows. Not surprisingly, IAM models have different assumptions about technology costs. So even for IAM runs with similar CO2 baselines, cumulative CO2 reductions can vary widely. The technical criticism here is that the Barker meta-analysis did not factor these differing cost assumptions in as independent variables when doing its regression analysis on IAM results. (Yeah, yeah, I know, zzzzz.) But the larger criticism, again, is of the sheer presumption: Can we, and should we, pretend to be able to forecast the future economic costs of each technology, in each scenario, with any reasonable accuracy? Or, even more challenging, can we accurately forecast small cost differences between two very different possible future scenarios involving very different mixes of technologies? If we cannot, can we get a reasonable approximation of the likely net costs or benefits of mitigating climate change, or not? Um, not. And yet IPCC’s Fourth Assessment conclusion, duly delivered to policymakers, is that climate mitigation will cost, on average, “0.12 percentage points [of global GDP] per year for 50 years.” The authors raise an eyebrow. [G]iven all the uncertainties and variability in the economic results of the IAMs … the claimed high degree of accuracy in GDP loss projections is highly implausible. After all, economists cannot usually forecast the GDP of a single country for one year into the future with such a high accuracy, never mind for the entire world for 50 years, or more. So you’re saying it might be 0.13 percent a year? It’s a little silly. Given the “huge uncertainties that exist for each input parameter” of IAMs, and the uncertainties they omit entirely, the overall costs of mitigation are “quite unknowable to any reasonable degree of accuracy.” (There’s a lot more in the paper to support this, including a whole big thing about how IAMs unduly constrain energy-efficiency investments, but I sense patience exhausted.) — Interestingly, the aforementioned Barker has coauthored a more recent paper with the aforementioned Ackerman — “Pushing the boundaries of climate economics: critical issues to consider in climate policy analysis” — rounding up many of these critiques of IAMs. They write that … … baseline assumptions employed in modeling studies are often arbitrary and inconsistent with each other, particularly when projections are taken off the shelf from different sources. A complete model of climate policy costs and impacts should, in theory, make some of these data endogenous; climate damages can affect the rate of (business as usual) growth of per capita incomes; climate policies can change the price of oil. Unfortunately, making these feedback effects endogenous (internal to the model) quickly makes a model complex, far more complex than most IAMs and possibly intractably complex. They write bluntly, “Economies are highly complex non-linear systems and it is impossible to accurately predict their future evolution.” Impossible indeed. And thus the costs of climate mitigation over the 50-to-100-year horizon are unknowable. Rosen and Guenther write in their conclusion: For the reasons cited [in the paper], not only do we not know the approximate magnitude of the net benefits or costs of mitigating climate change to any specific level of future global temperature increase over the next 50–100 years, but we also cannot even claim to know the sign of the mitigation impacts on GWP, or national GDPs, or any other economic metric commonly computed. Given that ignorance, “the IPCC and other scientific bodies should no longer report attempts at calculating the net economic impacts of mitigating climate change to the public in their reports.” Basically, in terms of sound policymaking, no numbers are better than wild-ass guess numbers misleadingly presented as reliable. So economists should just stop pretending those long-term costs are knowable. What do we do, then, without credible estimates of how much it might cost to tackle climate change over the course of this century? Does it matter that we don’t have credible estimates? Here Rosen and Guenther are quite bold: Our answer is “no,” because humanity would be wise to mitigate climate change as quickly as possible without being constrained by existing economic systems and institutions, or risk making the world uninhabitable. This conclusion is clear from a strictly physical and ecological perspective, independent of previously projected economic trade-offs over the long run, and it is well-documented in the climate change literature. As climate scientists constantly remind us, even if the world successfully implemented a substantial mitigation program today, a much warmer world is already built into the physical climate system. And since we can never know what the cost of a hypothetical reference case would be, and since we must proceed with a robust mitigation scenario, we will never be able to determine the net economic benefits of mitigating climate change, even in hindsight. In short, the physical sciences have given us reason to act. Rather than twiddle knobs to produce largely fantastical long-term cost-benefit analyses, we should simply act. We should imagine the end state we want to achieve and then use modeling to determine the most cost-effective way to proceed toward it in the short-term. That is what models are good for: tools, not masters. Climate change thrusts upon us the question of what kind of world we want, what we care about, what kind of ancestors we want to be. Long-term modeling attempts to give those decisions a scientific sheen, but it’s an illusion. Economics cannot make those decisions for us. They are up to us, and no matter what decisions we make, we are leaping into the unknown.
https://grist.org/climate-energy/we-dont-and-cant-know-how-much-it-will-cost-to-tackle-climate-change/
(1) to determine whether the ratio of glycated albumin and total albumin in saliva is equivalent to blood and (2) to investigate whether the non-invasive SmartAlbu portable salivary sensor is as accurate as standard tests that measure glycosylated hemoglobin (HbA1c). SmartAlbu Not yet recruiting University of Maryland Published on BioPortfolio: 2017-08-02T13:53:21-0400 Cohort of Mexican Children With Diabetes Mellitus (CMC-DM) The aim of this study is the identification of complications in diabetes mellitus pediatric patients and to compare the clinical, anthropometric, and biochemical characteristics between ch... ECG Changes Including QT Dispersion and Corrected QT Prolongation in Children and Adolescents With Type 1 Diabetes Diabetes Mellitus type 1 is characterized by an absolute insulin deficiency caused by T-cell-mediated autoimmune destruction of pancreatic β-cells . It is the predominant form of diabetes... Evolution of Effectiveness of Diabetes Medical Care in Russia The main aim of the present study is to evaluate the prevalence of individual microvascular and macrovascular complications among diabetes mellitus patients and to determine the percentage... The Progress of Diabetes Mellitus After HMS5552 Treatment in Type 2 Diabetes Mellitus At present, there are few studies on the clinical remission rate of diabetes after one year discontinuation of oral hypoglycemic drugs after intensive treatment. HMS5552 is a kind of GKA h... Shanghai Children and Adolescent Diabetes Eye Study To compare the prevalence of eye disease between children and adolescents with diabetes mellitus and healthy people, and to analyze the related factors of eye diseases in diabetic patients... Efficacy and safety of Cinnamon in Type 2 Diabetes Mellitus and Pre-diabetes patients: A Meta-analysis and Meta-regression. Cinnamon has been used as a dietary component and in the management of diabetes mellitus. This study systematically reviewed and synthesized evidence on the efficacy of cinnamon for the treatment of t... Risk of Mortality and Hospitalization After Post-Pancreatitis Diabetes Mellitus vs Type 2 Diabetes Mellitus: A Population-Based Matched Cohort Study. To investigate the risk of mortality and hospitalization in individuals with post-pancreatitis diabetes mellitus (PPDM) compared with those with type 2 diabetes mellitus (T2DM). Effects of pre-gestational diabetes mellitus and gestational diabetes mellitus on macrosomia and birth defects in Upstate New York. To evaluate the effects of pre-gestational diabetes mellitus (PGDM) and gestational diabetes mellitus (GDM) on macrosomia and birth defects. Clinical Impact of the TCF7L2 Gene rs7903146 Type 2 Diabetes Mellitus Risk Polymorphism in Women with Gestational Diabetes Mellitus: Impaired Glycemic Control and Increased Need of Insulin Therapy. The single nucleotide polymorphism in TCF7L2 rs7903146 is associated with an increased risk of type 2 diabetes mellitus and gestational diabetes mellitus. Mechanisms by which this mutation acts, and i... Markers for undiagnosed type 2 diabetes mellitus during pregnancy - population-based retrospective cohort study. To examine possible markers for undiagnosed type 2 diabetes in early-onset gestational diabetes mellitus (GDM). Diabetes Mellitus, Type 2 A subclass of DIABETES MELLITUS that is not INSULIN-responsive or dependent (NIDDM). It is characterized initially by INSULIN RESISTANCE and HYPERINSULINEMIA; and eventually by GLUCOSE INTOLERANCE; HYPERGLYCEMIA; and overt diabetes. Type II diabetes mellitus is no longer considered a disease exclusively found in adults. Patients seldom develop KETOSIS but often exhibit OBESITY. Diabetes Mellitus, Experimental Diabetes mellitus induced experimentally by administration of various diabetogenic agents or by PANCREATECTOMY. Polyuria Urination of a large volume of urine with an increase in urinary frequency, commonly seen in diabetes (DIABETES MELLITUS; DIABETES INSIPIDUS). Diabetes Mellitus, Type 1 A subtype of DIABETES MELLITUS that is characterized by INSULIN deficiency. It is manifested by the sudden onset of severe HYPERGLYCEMIA, rapid progression to DIABETIC KETOACIDOSIS, and DEATH unless treated with insulin. The disease may occur at any age, but is most common in childhood or adolescence. Rats, Inbred Bb A strain of Rattus norvegicus which is a model for spontaneous insulin-dependent diabetes mellitus (DIABETES MELLITUS, INSULIN-DEPENDENT). Quick Links Advanced Search | Login | Subscribe | RSS Blood Blood is a specialized bodily fluid that delivers necessary substances to the body's cells (in animals) – such as nutrients and oxygen – and transports waste products away from those same cells. In vertebrates, it is composed of blo... Diabetes Diabetes is a lifelong condition that causes a person's blood sugar level to become too high. The two main types of diabetes are: type 1 diabetes type 2 diabetes In the UK, diabetes affects approximately 2.9 million people. There are a...
https://www.bioportfolio.com/resources/trial/185575/Salivary-Glycated-Albumin.html
Combining a 250-year old tradition with a modern outlook Bedford Modern School is an unpretentious, tolerant community where all students can flourish as individuals. It is an outstanding school but in an era of rapid change all schools are faced with the challenge of ensuring that the education is relevant. It is important that we are not complacent and that we continually evolve while protecting and enhancing our strengths. We asked current students, parents, governors and staff about what makes BMS unique and also to highlight areas of school life we should improve. This research informed our five-year strategy for development. Our plans for the future are ambitious. Our four aims; to inspire, engage, encourage and cultivate will drive all that we do to ensure that BMS provides a truly modern and relevant education delivering excellence in all aspects of school life. We will inspire our students to develop a sense of curiosity and a love of learning by providing a breadth of stimulating academic opportunities and an extensive co-curricular programme with the focus on participation, enjoyment and achievement. I talk with pride of the strength of the BMS community which is inclusive and down to earth. We aim to develop this further by engaging with potential, existing and former students, staff and parents in new ways inviting them to contribute fully to life at BMS. We will also develop more partnerships and closer relationships with local clubs, organisations and the wider local community, widening access wherever we can. The wellbeing of our students is of prime importance and through encouragement and support we will nurture them to become self-aware and resilient, able to face the challenges of today’s rapidly changing world with confidence. Finally, by investing in the school estate, facilities and, crucially, the development of our staff, we will cultivate an excellent learning environment in which our students can flourish. Achieving our ambitious plans means thinking creatively but it does not mean losing our values or traditions because they are what make our school so special. We want students to leave Bedford Modern School with high academic attainment but also the emotional intelligence and self-awareness that allows them to adapt and flourish in the fast-paced world in which we live. Inspiring Excellence, our five-year development strategy, will allow us to do just that.
https://www.bedmod.co.uk/the-school/headmasters-welcome/
Why Can a Snail Sleep for Three Years at a Time Why Can a Snail Sleep for Three Years at a Time: Consider yourself a deep sleeper. Then you should check out these guys. Snails have always been dull, haven’t they? They’re slow, sticky, and appear lost, but you don’t realise these little snails have bizarre sleeping habits. It’s weird to imagine that snails must sleep; after all, they don’t appear to do it frequently. The world at large was mistaken, though; the University of Toronto conducted research that proved it. Snails sleep for fifteen hours (falling asleep and waking up seven times) before going about their work for thirty hours. In contrast to humans, who sleep and exercise for twenty-four hours a day, snails sleep and exercise for forty-eight to seventy-two hours. Snails are most active at night since it is damp, unlike during the day when the sun shines. Snails require moisture to make the slime that helps them to move from one location to another. But what happens if there is no moisture? Snails may stay in their shells for extended periods in severely hot or cold temperatures. Snails can remain dormant for three years in extreme circumstances of prolonged extreme weather, though this is uncommon. In comparison, a snail could spend one-third of its life sleeping. It is vital to understand that a snail does not simply hibernate; it hibernates. Hibernation is a period of extended rest in which an animal avoids needing to seek food or migrate to a warmer place. Hibernation, on the other hand, is an extended period of relaxation during hot, dry weather. What exactly is hibernation, how does it operate, and what species do it? Which species use hibernation, torpor, and winter quarters, and what are the differences between these three? Many believe that hibernating creatures sleep in the fall and awaken in the spring when the weather warms up. However, hibernation is more than that. Hibernation occurs in warm and cold habitats, with various purposes, durations, and risks for each animal. Our professional guide examines hibernation, aestivation, torpor, and gobble in-depth, including if they are dangerous and which animals engage in them. What exactly is hibernation? Hibernation allows many animals, including butterflies and bats, to endure harsh, dark winters without seeking food or migrating to warmer areas. To save energy, they instead turn off their metabolism. Warm-climate animals practise a form of hibernation called aestivation. This works similarly, allowing them to tolerate high heat, drought, or food scarcity. Instead of just sleeping, hibernating is a much deeper process. It can range from long periods of deep slumber to brief periods of inactivity, and it varies greatly between different species. Hibernation, on the other hand, poses risks because the sleeping animal is vulnerable to predators and unpredictable weather. Chipmunks, dormice, hamsters, hedgehogs, and bats are examples of small mammals. There are also numerous insects, amphibians, and reptiles. Do all mammals in the United Kingdom hibernate? Only three species of animals in the UK genuinely hibernate dormice, hedgehogs, and bats. The list is short, and several omissions may surprise some – mice and voles, for example, remain active and alert all winter, while squirrels stay awake and reproduce in January. Shrews should be ideal candidates because they are small and agile, have a fast-evaporating body, a rapid metabolism, and feed on insects. They sleep longer in the winter, hunt underground, and seldom (if ever, depending on the species) become torpid and do not hibernate. All breeding adults die in the fall, leaving the year’s progeny to carry on the generations. But the badger is in a state of winter lethargy. During the winter months of November through February, it spends most of its time underground, where it can gain weight and perhaps cool off. Nonetheless, this is not hibernation. Do butterflies and other insects go into hibernation? Some insects, such as butterflies, ladybugs, and some bees, hibernate in the adult stage. 9 of our butterflies, including the Lemon Butterfly, Red Admiral, Small Turtle Butterfly, Comma, and Peacock Butterfly, overwinter as eggs, 32 as caterpillars, 11 as chrysalises, and six as adults (as well as the very rare Camberwell Beauty). Overwintering in butterflies varies between simple torpor and diapause; although the butterfly seems to be an adult, it may not yet be capable of reproducing. Atypical sunny days may awaken all of these adult insects. Every year, for example, day peacock eyes are noticed in gardens around Christmas and New Year’s, prompting publications to anticipate the world’s end. It is also possible that butterflies are out and about in residences where the warm central heating has awakened them from their slumber. Once again, this is neither rare nor fatal. The subsequent dip in temperature may force them back into hiding, where they will continue to sleep. Winter’s sunny days, on the other hand, can have drawbacks. The energy expense of flying about and hunting for a new hibernating place can induce stress later on. It could deplete its fat reserves and expire before spring. Do reptiles and amphibians sleep? Frogs, toads, and newts in the United Kingdom change their behaviour as soon as frost arrives in October. They hide where they are not immediately exposed to the elements, such as under logs or stone piles, a hole in the earth, or a compost heap. Slow worms often dwell in groups prefer the latter, whereas other lizards hibernate alone in little caves. Natterjack toads bury in sand, but all British snakes prefer communal roosts known as hibernacula, such as abandoned rabbit tunnels. Former adversaries create a latent truce with toads, newts, lizards, and even snakes when they are drawn to the same burrow. Warm winter can rouse all these exothermic creatures, allowing frogs to forage and snakes to lounge in the faint sun. The grass frog, whose mature males frequently hibernate in the muck at the bottom of ponds, is the most significant exception among herptiles. They can only breathe by gas exchange through the skin rather than the lungs, and they consume relatively little energy because they are passive. This design is ideal in most winters but dangerous if the pond freezes solid. Do birds go into hibernation? A profound slumber and true hibernation are not the same things. Swift parents have difficulty capturing enough insects in the air in cold or wet weather, so their babies freeze in the nest and lower their metabolic rate to the point where they can go without meals for 48 hours or long enough to ride out the front. Only one bird is known to hibernate completely: the North American armadillo. This brilliantly camouflaged night bird is related to the British nightjar and frequently hibernates amid rocks. It can lower oxygen consumption by 90% while its body temperature dips to a barely acceptable 5°C. How do animals prepare for winter? Mammals consume heavily in the summer and fall, storing fat for the winter. Is hibernation harmful? Animals can die during hibernation due to a lack of fat, poor weather, or early awakening. They may also be preyed upon by predators. Interested? So there’s more. Indian scientists Jayaseelan B. Franklin and R. P. Rajes claim to have identified sleep-inducing chemicals in the venom of Conus Araneosus, also known as the “spider web cone.” They identified fourteen peptides and then divided them into distinct types; they discovered that five of these peptides might be employed for therapeutic purposes. Sleepless people, rejoice! So the next time you see a snail, don’t just think about how slow or dull it is; think about how it has an enormously sophisticated sleep function and how it could help you get a good night’s sleep. You’ve heard the expression: The thing you can do if you wake up feeling sluggish is to go back to sleep!
https://manzanazeta.com/why-can-a-snail-sleep-for-three-years-at-a-time/
Ilya’s post below addresses an important issue in commerce clause litigation: Whether commerce clause challenges should be treated as facial or as-applied challenges and, if the former, how such challenges should be addressed. I largely agree with Ilya’s post. Indeed, if anything, Ilya understates the point, particularly with regard to United States v. Lopez. Further, whatever the other merits of Judge Sutton’s opinion — which is quite strong, even if I disagree with its conclusion — it mishandles this issue. In his post below, Ilya writes: By Judge Sutton’s reasoning, the Supreme Court should have rejected the facial challenges brought inUnited States v. Lopez and United States v. Morrison. In Lopez, the Court struck down a federal law banning possession of guns in a school zone as going beyond Congress’ authority under the Commerce Clause. But surely some of the people whom that law could have been applied to were using guns that were purchased in interstate commerce or had brought the guns into a school zone in order to facilitate an interstate economic transaction (e.g. — bringing in a gun in order to protect their sale of illegal drugs imported from abroad). This is not merely a hypothetical. It is, in fact, what happened in Lopez. Alfonso Lopez was not just some kid who happened to bring a gun to school. Rather, as the Fifth Circuit’s opinion explains, he was a courier who had been paid to deliver the gun to a gang member. He was a delivery boy engaged in a commercial transaction. As a consequence, his possession was within the scope of the Commerce Clause power. Had Congress passed legislation prohibiting this sort of economic transaction, his Commerce Clause argument would have failed. The reason his Commerce Clause challenge prevailed was not because his conduct was beyond the scope of the Commerce Power. Rather, it prevailed because the statute at issue (the Gun-Free School Zones Act) was not itself a proper exercise of that power. What the statute prohibited — possession, as such, in a school zone — was beyond the scope of the power, even though the statute reached conduct that could be reached constitutionally. What the Court’s handling of Lopez reveals is that the key question in a Commerce Clause challenge is the nature of the exercise of federal power, not whether, in a given case, the plaintiff’s conduct could be regulated or prohibited constitutionally. This is why the GFSZA was invalidated when challenged by someone who was engaged in reachable conduct. It is also why the Lopez Court noted the lack of a jurisdictional element (e.g., a provision limiting the prohibition to gun possession “substantially related” to interstate commerce). The purpose of a jurisdictional element is to preserve a statute’s constitutionally by confining its exercise to those activities within the scope of the Commerce Clause power. (See, e.g., the Supreme Court’s unanimous opinion United States v. Jones.) Thus, a statute prohibiting the commercial possession of guns in or near a school is constitutional, but a statute imposing a blanket prohibition on gun possession in or near a school is not. In the former instance Congress is engaged in a constitutional exercise of its power, in the latter it is not, even though the statutes overlap. Yet under Judge Sutton’s approach, the GFSZA should have been upheld because it would be constitutional to prohibit participation in commercial gun transactions like the one in which Lopez was engaged. The traditional test for a facial challenge is whether there is any set of circumstances in which the statute’s application would be constitutional. As Lopez shows, the proper way to apply this test is not to ask whether the statute reaches otherwise reachable conduct — commercial gun possession, the purchase of insurance, etc. Rather, the question is whether the class of activities expressly subject to regulation — that is, the conduct which brings an individual within the scope of the statute at issue — is itself within the scope of the Commerce power. As the Supreme Court has reiterated time and again (albeit mostly in cases upholding statutes against Commerce Clause challenge), what matters is what Congress did, not the specific conduct of the individual challenging the statute’s constitutionality. This is why Lopez prevailed. Incidentally, it is also why Angel Raich lost. For in Gonzales v. Raich there was no question that Congress could regulate interstate commerce in drugs. Once the Court concluded that the class of activities subject to the statute — the sale, production, distribution and possession of a controlled substance — was within the scope of the Commerce power [supplemented by the Necessary & Proper clause], Raich had to lose. Indeed, there is no Commerce Clause precedent in which the Supreme Court has upheld the broader statute but invalidated its application to a specific individual. If the relevant statutory provision is a permissible exercise of the Commerce power, the challenge fails. The above illustrates why the key issue is defining the class of activities subject to federal control. Listen to the oral arguments in the various Circuit Courts and notice how acting-Solicitor General Neil Katyal takes pains to define the class of activities subject to regulation in economic terms — as “financial decisions about how and when health care is paid for”. Judge Martin’s decision does much the same, characterizing the class of activities as “the practice of self-insuring for the cost f health care delivery.” The problem, in my view, is that these characterizations are not consistent with the statutory provision, as neither accurately characterizes the class as a whole Congress has sought to regulate. It may be the case that most of those subject to the individual mandate are making “financial decisions” about how and when to pay for their health care or are engaged in self-insurance, but the statute does not limit its application to such people, nor can all those subject to the mandate be characterized in such terms. Not only are there those who would otherwise never purchase health insurance. There are also those who, for whatever reason religious or otherwise, will never purchase health care. [See, e.g., Mead v. Holder at p. 6.] (Indeed, under Cruzan, they have a fundamental right to refuse even potentially life-saving care.) That Congress can reach most of those without insurance through other means is immaterial, just as it was immaterial that Congress could have prohibited what Alfonso Lopez actually did had it only passed a different statute. What matters is the statute that Congress actually passed, and whether the class of activities over which Congress asserted its authority is, as a class, subject to federal jurisdiction. So, contrary to Katyal’s protestations at the various oral arguments and the opinions of Judges Martin and Sutton, the class of activities at issue is the mere presence in the country without qualifying health insurance, and the question really is whether Congress may mandate the purchase of a given good or service. In other words, the question is whether such a mandate itself is facially constitutional as an exercise of federal power, not whether we can identify a range of situations in which such a mandate could be constitutionally applied. [As-applied challenges should be reserved to claims that the mandate violates some other constitutional provision, such as the First or Fifth Amendment, in its application to specific individuals, e.g. someone with religious objections to medical care.] [For those interested in more this question, I recommend the work of a former student: Nathaniel Stewart, Turning The Commerce Clause Challenge “On Its Face”: Why Federal Commerce Clause Statutes Demand Facial Challenges, 55 Case Western Reserve Law Review 161 (2004).] POST-SCRIPT: Just in case it was not clear, the argument above is not sufficient to establish the unconstitutionality of the individual mandate. The point is rather to identify some of the problems with the way some of defended its constitutionality. Although I believe the mandate should be held unconstitutional, I have long conceded that this is a difficult case, particularly in light of Gonzales v. Raich, and one that implicates first principles about the nature of federal power and the Constitution. SECOND POST-SCRIPT: I should also have noted that what this argument does is shift the focus from the Commerce Clause to the Necessary & Proper Clause. If a class of activities extends beyond the scope of the Commerce Clause itself (as I believe the class subject to the mandate does), the question becomes whether the broader class can be justified as Necessary & Proper to the overall scheme. Under Gonzales v. Raich, there is a strong argument in defense of the mandate on these grounds. Short of overturning Raich (which I would love to see the Court do), the strongest counter-arguments are that mandating the purchase of a good or service is not “proper” to the execution of an enumerated power and that the argument for the mandate rests on an effectively unlimited conception of federal power that contravenes one of the motivating principles of Lopez and Morrison. THIRD POST-SCRIPT: Some of the commenters below suggest my view requires a somewhat-radical “all-or-nothing” approach to Commerce Clause challenges. Yes and no. It is perhaps radical and “all-or-nothing” in that I believe that a given prohibition is either within the scope of enumerated powers or it is not. But what is “all-or-nothing” is a given statutory provision, not a statute in its entirety. This remains strong medicine, but makes my position slightly less radical in its implications. What would this have meant for Gonzales v. Raich? This is a good question, and one I engaged in this article (see pages 770-776). My first preference would have been for the Court to invalidate the prohibition on possession, thereby requiring Congress to add a jurisdictional element. Two alternatives that are less doctrinally satisfying, but perhaps easier to swallow, would have been either to hold that the CSA did not reach non-commercial possession (effectively reading a jurisdictional requirement into the statute), or to have recognized a separate class of activities authorized by state law that could be analyzed independently. Either of these alternatives would have required a bit of work (particularly the latter), as there’s little basis for either in the relevant case law. NOTE: I’ve cleaned up the original post in a few places to make it a bit more clear.
https://volokh.com/2011/06/30/re-facial-vs-as-applied-challenges-to-the-individual-mandate/
Evolutionary developmental biology has become a prominent field for investigating how developmental processes operate and change over time. An integrative approach encompassing morphological and genetic data is fundamental to evo devo; such integration has proven key to understanding how changes in gene expression and function can create novel phenotypes. While this approach has been successfully applied to well known model organisms, it has become apparent that truly understanding the breadth and evolution of developmental processes requires comparisons between many different organisms. Comparative studies thus require research to continually expand beyond traditional model organisms, especially in regard to species that feature novel traits. This has been particularly true for understanding the unique development of body plans in arthropoda, which are based primarily upon repeating segments that form phenotypically distinct units called tagmata. Tagmata often bear unique appendages, and generally define each of the major arthropod classes. However, while the body plan and developmental genetics of arthropods like the fruit fly Drosophila melanogaster have been extensively studied, much remains unknown about how developmental genes changed over time to produce aspects of the insect body plan that are unique, such as wings, or that notably diverge from the typical body plan of most insects. In this regard, mayflies (Ephemeroptera) are particularly appealing candidates for evo devo research. Mayflies are one of the earliest diverging group of winged insects, placing them at a phylogenetically important position amongst the pterygotes. The body plan of their nymphal stages is also different from most insects, as it bears functionally diverse abdominal appendages called gills. These gills are a key part of environmental adaptation in mayflies, and may share structural homology with the appendicular appendages seen throughout arthropoda. While mayflies have been studied extensively in regard to their ecological importance and phylogenetic position, little is known about their developmental genetics, especially in regard to appendage development. Thus, the purpose of this work is to bring an evo devo framework to mayflies by 1) describing their embryonic and nymphal ontogeny, especially in regard to their thoracic and abdominal appendages, 2) describing the expression of the Hox genes Antennapedia (Antp), Ultrabithorax (Ubx) and Abdominal-A (AbdA) during embryogenesis, and 3) identifying sequences for a suite of key developmental and cell signaling genes in a first instar nymphal transcriptome. In order to do accomplish these objectives, we have focused upon the widely dispersed and large bodied mayfly, Hexagenia limbata (Ephemeridae). Morphological descriptions of H. limbata ontogeny revealed that embryogenesis proceeds in a manner consistent with that seen in other studied mayfly species, with posterior body segments gradually appearing from the extending germ band. Likewise, nymphal appendage development in the first three instars was consistent with published literature on Hexagenia mayflies, namely in regard to the simultaneous development of five gill pairs on the abdomen and the similar size and shape of all three thoracic legs. We found that appendage development from post-third instars follows two main themes: the thoracic legs remain similar in size and shape, while the gills gradually increase in complexity by adding gill branches in a distal to proximal manner, as seen in other burrowing mayflies. While we were unable to assess Hox expression in nymphs, Antp and Ubx/AbdA expression during embryogenesis was highly conserved with that seen in non-holometabolous insects, especially Thermobia domestica (Zygentoma) and Gryllus bimaculatus (Orthoptera). Antp was strongly expressed in the posterior labial segment through the thorax, with a narrow stripe of expression down the central abdomen that is commonly associated with nervous system development. The combined expression profile for Ubx/AbdA ranged from the posterior T2 to the tenth abdominal segment, with strong staining seen at the T3/A1 border. These findings suggest that if Antp and Ubx/AbdA expression play a role in gill development, it is likely due to changes in gene function, expression during the first instar when gills develop, or changes to downstream appendage patterning gene regulation. Transcriptomic sequencing was done using whole body, first instar mRNA, from which 70,507,832 reads were generated. De novo assembly resulted in a 93,561 contig database, with 60,861 of these having ≥ 10X average coverage. Two workflows were designed in order to assess and identify developmental and cell signaling genes of interest from this database. Our gene-specific workflow confirmed homologous sequence identity for 78 putative sequences belonging to 53 developmental and cell signaling genes of interest, with most top BLASTx hits matching insect homologs. Our second, Gene Ontology (GO) workflow filtered our contig database via a > 99 reads per contig criteria and provided a high quality contig database of 37,023 contigs, from which 9,813 contigs were successfully mapped and annotated with GO terms. Most top BLASTx hits for these contigs were also from insect taxa, and the level two GO term profile for these contigs largely resembles those reported for other insect transcriptomes. This suggests that our transcriptome successfully represents a broad sampling of mRNA transcripts commonly found in whole body insect transcriptomes. Furthermore, GO term annotation tagged 841 and 996 of these contigs as relevant to developmental processes and signaling, respectively, indicating that additional candidate developmental genes or possible orthologs could be identified. Future evo devo research on mayfly body patterning would greatly benefit from two distinct initiatives. First, sequences identified in the transcriptomic dataset can be used to synthesize riboprobes for in situ hybridization, enabling expression studies for many of the putative developmental genes identified. Such sequences can also be used to synthesize either dsRNA for RNAi or specific DNA sequences for CRISPR/cas9, which would allow functional experiments during mayfly development and potentially reveal both the genetics of gill development and how it compares to limb development in other insects. Second, developing molecular techniques in first instar nymphs would directly address how the mayfly body plan changes, since the sudden development of abdominal gills occurs in the second nymphal instar. With these initiatives, there remain abundant opportunities to investigate the development and evolution of mayflies’ novel body plan. Gonzalez, Christopher J., "Evolutionary Developmental Biology in the Mayfly Hexagenia limbata, with a focus on Hox Genes" (2018). Theses & Dissertations. 155.
https://digitalcommons.plymouth.edu/etd/155/
Subject: Science Grade: 2 By – Gareth Wicker Subject – Science Grade Level – 2nd Grade Content Overview: The students will take knowledge from the previous lessons of what magnets will attract and how to make a magnet and utilize that knowledge for this lesson. Magnetic attraction and direction are related, and finding direction and locations using a homemade compass will be used. Materials and preparation: needles, magnets, string, black electrical tape, bar magnet (with labeled poles), chalkboard paper, pencil – ST provided labeled bar magnet should be hung from the ceiling or other visible point prior to the lesson, label the north and south poles with construction paper letters Time: 1hr. 5min. Learning Outcomes: TSWBAT – understand the directional usage of magnets by explaining that the earth is a large magnet, and that smaller magnets can be used in conjunction with it. – demonstrate knowledge of the north-seeking properties of a magnet by utilizing a compass – demonstrate understanding of direction by drawing a map or giving accurate directions that use collected data – work in groups by completing all group exercises successfully – realize that magnets can be utilized for practical uses by completing directional activities and by listing other uses for magnets NCSS Standards Physical Science – properties of objects and materials (north-seeking magnets – direction) – position and motion of objects – (direction by magnetic guidance) – magnetism Science as Inquiry – abilities necessary to do inquiry (predict and test) – understanding about scientific inquiry (predict and test) Personal and Social Perspectives – science and technology in social challenges (items magnets are used in) History and Nature of Science Standards – science as a human endeavor (directional capability) Intro: Give ST situation: You’ve been camping, but now you’re lost in a forest. How would you find your way out? [take answers] Do you know how you could use a magnet to find your direction? [show compass] Does anyone know what this is? Do you know what it does? (shows direction) Do you know how it works? (needle is a magnet attracted to magnetic north pole) What would this mean for a person who is lost in the woods? (N points north, could use that to find out what direction you needed to go) [Show suspended bar magnet labeled N and S] Does anyone know what the N and S stand for? (north and south) Do you know why they are labeled that way? – North is the north-seeking pole – South is the south-seeking pole Do you know what those terms mean? The largest magnet on the earth is the earth – What would that mean for other magnets? (they are all attracted to the earth) The N-seeking pole of a magnet always points north (unless another magnet interferes). If a magnet is allowed to swing freely like this one [suspended bar magnet] the N-seeking pole of the magnet will point toward magnetic north (close to the north pole but not quite) [on chalkboard] If a magnet points north [draw an arrow up] where would south be? What about east and west? [draw appropriate directions and label on board] We’re going to pretend that this classroom is a forest and we’re lost. You are going to help us get out. Explain direction completely first – ST split into 4 groups – roles – compass maker, compass holder, compass reader, travel recorder, forest leader, map maker [can combine compass holder and reader if not enough ST] – groups are given a needle and magnet – [review magnetizing] compass maker strokes the needle 50 times with the magnet – magnet is returned and the needle is tested with the hanging bar magnet. N is labeled by placing black tape on one end of the needle – groups will determine N, S, E, and W (each starting in a different direction) will list 1 item for each group member that is in the classroom at that direction – groups rotate until all four directions have been covered, end up in original direction they began with – groups will draw map or write directions using the landmarks they have recorded to find their way from one point in the room to another, must use at least 4 landmarks and include directions (N, S, E, W) Close: groups will rotate maps/directions, groups will follow new plan to destination – use compass to find directions poem Compass Guide How do we know Which way to go? Look at the magnet and it will show. North, south, east or west, For finding directions it is the best. How does it work? It’s as simple as can be. The planet’s biggest magnet is itself, you see. The biggest, and strongest magnet of all Compared to it, all others are quite small. Because of its size, it’s pull is so strong that all other magnets are pulled along. Try as they might, for all that they’re worth, Magnets can’t help but point toward north. So the next time you’re lost without a clue, Let a magnet find your way to rescue you. E-Mail Gareth !
http://lessonplanspage.com/sciencemagnetismunit3makeusecompass2.htm/
PRIORITY BACKGROUND SUMMARY DESCRIPTION The present application is a continuation of U.S. patent application Ser. No. 15/708,677, filed Sep. 19, 2017, which is hereby incorporated by reference in its entirety. When a diesel engine is below a certain threshold temperature, it can be difficult or impossible to start the engine until the engine is heated. When a vehicle is being used, the natural action of the engine generally maintains the engine at a sufficiently high temperature to operate; however, in typical daily use, vehicles are not utilized continuously for an entire 24-hour period. If a vehicle is left outside or otherwise exposed to sufficiently cold temperatures, the vehicle will not be usable after a certain period of time because the engine will be too cold to start. Therefore, many diesel engines are installed with an electrical block heater that is configured to pre-heat the cylinder block of the engine when activated. Many commercial trucking businesses, public transit bus systems, and other entities that own vehicles with diesel engines (especially those located in colder climates) activate the block heaters of their vehicles either every night or on nights that are expected to be especially cold so that the engines of their vehicles are pre-heated and ready to start the following morning. Having the block heaters running continuously all night generally wastes fuel or electricity though because the length of time required for a block heater to fully pre-heat an engine is less than the length of time that the block heaters are generally left on, even in exceptionally cold climates. The wasted fuel or electrical energy results in substantial excess costs, which only increases with the number of vehicles in the fleet that require pre-heating. Furthermore, in situations where employees are expected to activate the block heaters of the vehicles themselves when especially cold temperatures are imminent, unexpectedly cold temperatures or human error can result in substantial productivity losses when the vehicles' engines are too cold to start for the subsequent use. While several devices have been made and used, it is believed that no one prior to the inventors has made or used the device described in the appended claims. In one general aspect, the present invention is directed to a system for use with a block heater connected to an engine for pre-start heating of the engine. The system comprises a power source; a relay assembly coupled to the power source; a temperature sensor; and a controller. The relay assembly, when closed, electrically connects the power source to the block heater, to thereby energize the block heater to heat the engine. The temperature sensor senses an ambient temperature indicative of a temperature of the engine. The controller is operably connected to each of the temperature sensor and the relay assembly. Further, the controller is programmed to: (1) determine a power of the block heater by applying a voltage to the block heater and detecting a current draw thereof resulting from the voltage; (2) determine the ambient temperature based on inputs from the temperature sensor; (3) determine a heating duration for the block heater, where the heating duration corresponds to a length of time required by the block heater to heat the engine from the ambient temperature to a target engine temperature, determined based on, in part, the power of the block heater; and (4) control the relay assembly to electrically connect the power source to the block heater to activate the block heater according to the heating duration and a target time, such that the engine reaches the target engine temperature at approximately the target time (e.g., +/&#x2212;5 minutes or +/&#x2212;2 minutes of the start time). In another general aspect, the controller is programmed to: (1) detect when the block heater is connected to the relay assembly by transmitting a current through an electrical connection of the relay assembly and detecting when the electrical connection reads neutral; (2) determine the ambient temperature based on inputs from the temperature sensor; (3) determine a heating duration for the block heater, the heating duration corresponding to a length of time required by the block heater to heat the engine from the ambient temperature to a target temperature; and (4) control the relay assembly to electrically connect the power source to the block heater to activate the block heater according to the heating duration and a target time, such that the engine reaches the target temperature at approximately the target time. In another general aspect, the present invention is directed to a method for controlling a block heater connected to an engine for pre-start heating of the engine. The method comprises the steps of: (1) determining a power of the block heater by applying a voltage to the block heater and detecting a current draw thereof resulting from the voltage; (2) determining an ambient temperature indicative of a temperature of the engine based on input from a temperature sensor; (3) determining a heating duration for the block heater, the heating duration corresponding to a length of time required by the block heater to heat the engine from the ambient temperature to a target temperature, determined based on, in part, the power of the block heater; and (4) controlling a relay assembly to electrically connect a power source to the block heater to activate the block heater according to the heating duration and a target time, such that the engine reaches the target temperature at approximately the target time. Before explaining various aspects in detail, it should be noted that such aspects are not limited in their application or use to the details of construction and arrangement of parts illustrated in the accompanying drawings and description. The illustrative aspects may be implemented or incorporated in other aspects, variations and modifications, and may be practiced or carried out in various ways. For example, the systems and methods for controlling block heaters disclosed below are illustrative only and not meant to limit the scope or application thereof. Furthermore, unless otherwise indicated, the terms and expressions employed herein have been chosen for the purpose of describing the illustrative aspects for the convenience of the reader and are not to limit the scope thereof. Certain aspects will now be described to provide an overall understanding of the principles of the structure, function, manufacture, and use of the devices and methods disclosed herein. One or more examples of these aspects are illustrated in the accompanying drawings. Those of ordinary skill in the art will understand that the devices and methods specifically described herein and illustrated in the accompanying drawings are non-limiting examples aspects and that the scope of the various aspects is defined solely by the claims. The features illustrated or described in connection with one aspect may be combined with the features of other aspects. Such modifications and variations are intended to be included within the scope of the claims. FIG. 1A 100 110 100 104 108 102 104 104 108 102 104 104 108 110 110 112 112 102 118 104 104 122 108 104 104 110 112 112 114 100 102 108 110 104 110 110 100 112 114 110 114 is a block diagram of the system for controlling one or more block heaters , according to one or more aspects of this disclosure. The system includes a relay assembly communicatively coupled to a power source and a controller coupled to the relay assembly for controlling the operation of the relay assembly with respect to the power source . The controller can be programmed to control the activation of the relay assembly to cause the relay assembly to electrically connect the power source to the block heater , such that the block heater is energized to heat the engine so that the engine is heated to a target temperature at a target time. In one aspect, the controller includes a processor operably connected to a memory for executing instructions stored thereon. The relay assembly is configured such that one or more electrical devices can be removably coupled to the relay assembly via, e.g., an electrical connection , for receiving power from the power source when the relay assembly is activated (e.g., closed). In one aspect, the devices that are connectable to the relay assembly include heaters, e.g., block heaters , which in turn can be utilized to heat engines , motors, transmissions, and other mechanical or electromechanical devices that require pre-heating to function in cold climates. Although the following disclosure is discussed in terms of heating the engines of vehicles , this is merely for illustrative purposes and the system described herein is not limited to any particular application. In operation, the controller is configured to control the electrical connection between the power source and the block heater through the relay assembly to selectively activate the block heater . Selective activation of the block heater allows the system to, e.g., pre-heat the engine of the vehicle during cold weather, without requiring that the block heater be activated continuously during the period of time that the vehicle is not in use, as will be described in further detail below. 104 108 104 104 108 104 The relay assembly includes one or more relays or switches that are configured to selectively couple a device to the power source . The number of relays or switches (or outputs thereof, for individual relays or switches having multiple outputs) included in the relay assembly can correspond to the maximum number of devices that are connectable to the relay assembly , as dictated by the electrical characteristics of the power source . The relay assembly can include electromechanical relays (e.g., reed relays), solid state relays, or any other type of relay and combinations thereof. 100 106 102 106 112 112 106 106 102 112 102 106 106 124 102 104 124 102 104 102 106 112 106 The system further includes a temperature sensor that is communicatively coupled to the controller . In one aspect, the temperature sensor is positioned to detect the ambient temperature in the environment surrounding the engine or in the environment in which the engine otherwise resides. The temperature sensor includes, e.g., a circuit comprising a thermistor, thermocouple, or resistance temperature detector, wherein the output of the circuit is temperature-dependent. The state or output of the temperature sensor corresponding to a temperature is continuously or periodically received by the controller in order to track the temperature of the environment around the engine over time. In one aspect, the rate at which the controller determines the temperature via the temperature sensor can be programmed by a user. In various aspects, the temperature sensor can be integral to a housing unit enclosing the controller and/or relay assembly , separable from the housing unit enclosing the controller and/or relay assembly , or otherwise positionable remotely from the controller . In any case, the temperature sensor is preferably located close enough to the engine so that the temperature readings from the temperature sensor are indicative of the engine's temperature. 100 116 102 116 116 116 116 102 102 118 The system further includes a timer that is communicatively coupled to the controller . The timer is configured to output a time or a signal indicative thereof. In one aspect, the timer includes, e.g., a clock generator. In another aspect, the timer includes, e.g., a transceiver configured to poll a server generating a time signal. The state or output of the timer corresponding to a time is continuously or periodically received by the controller in order to, among other functions, allow the controller to retrieve the current time, retrieve the day of the week, retrieve a system time or counter, and/or calculate a difference between the current time and a scheduled or target time. In one aspect, the target time may be, e.g., retrieved from the memory . 100 120 120 102 120 112 110 100 110 112 112 100 120 In various aspects, the system can further include a user interface for displaying information to a user and/or receiving input or commands from a user. In one aspect, the user interface includes a GUI displayed on a display to which the controller is communicatively coupled. The user interface can allow a user to set a target time at which the user desires the engine to be heated to a target temperature by the block heater , a schedule (e.g., particular days that the user wants the system to control the activation of the block heater ), a size of the engine , the target temperature to which the engine is to be heated, and a variety of other options or variables associated with the operation of the system . The user interface can be implemented with a touchscreen, a keypad or keyboard, a voice recognition system, or any other suitable user interface modality. 100 124 110 104 102 118 108 124 120 124 120 102 124 118 104 124 102 102 124 124 124 124 100 The various components of the system can be contained within a single housing unit to which a block heater is connectable. Alternatively, the various components can be combined together and/or contained within separate housing units that are communicatively coupled together. For example, the relay assembly , controller , memory , and power source can be contained within a housing unit and the other components, such as the user interface , can be communicatively, operably, or electrically coupled to the housing unit as a partially distributed system. For example, the user interface could be web-based application running on a user's remote computer, which is in communication, via the Internet, with a network server that hosts the web application. As another example, the controller for executing the various calculations described herein can be located remotely from the housing unit containing the memory and the relay assembly, but communicatively coupled thereto via, e.g., the Internet, in order to offload the communications from the housing unit . The network server can be in communication with the controller , via wired or wireless links, so that user inputs via the web interface can be downloaded to the controller . As such, the unit may include a WiFi circuit that communicatively connects the unit to a network access point (not shown) to connect the unit to the Internet; or the unit could have a wired Internet connection. As yet another alternative, the system can be completely distributed such that the components are positioned remotely from each other and are communicatively, operably, or electrically coupled, as appropriate. FIG. 1B FIG. 1A FIG. 1B 100 110 110 110 104 110 110 110 110 110 110 114 114 114 112 112 112 104 122 122 122 110 110 110 110 110 110 104 110 110 110 108 110 110 110 104 102 114 114 114 110 110 110 110 110 110 102 114 114 114 110 110 110 104 110 110 110 102 104 110 110 110 is a block diagram of the system of with multiple block heaters A, B, C connected thereto, according to one or more aspects of this disclosure. The relay assembly can be configured to have a plurality of block heaters A, B, C connected to it simultaneously. Each of the block heaters A, B, C corresponds to a separate vehicle A, B, C and each heats a corresponding engine A, B, C thereof. In such aspects, the relay assembly includes a number of output ports or stations that are each able to receive an electrical connection A, B, C from each of the block heaters A, B, C. Although depicts three block heaters A, B, C, the relay assembly may be configured to receive any number of block heaters A, B, C, as limited by the structural or electrical characteristics of the power source . When multiple block heaters A, B, C are connected to the relay assembly , the controller independently monitors the start time associated with each of the vehicles A, B, C and selectively controls each of the block heaters A, B, C accordingly. In other words, although the functions and processes below are discussed in terms of a single block heater A, B, C, the controller can nonetheless be executing the processes with respect to each of the vehicles A, B, C and/or block heaters A, B, C simultaneously or in parallel. In some aspects, the relay assembly includes a plurality of relays or switches that are each individually connectable to one of the block heaters A, B, C. In these aspects, the controller selectively controls each of the individual relays or switches making up the relay assembly in order to selectively energize the block heaters A, B, C. FIG. 2A FIG. 1A 200 110 102 200 118 102 200 200 102 202 110 110 200 202 110 110 104 114 104 114 110 118 100 200 110 108 104 110 110 110 is a logic flow diagram of a process of controlling a block heater as executed by the controller , according to one or more aspects of this disclosure. Code for implementing the process can be stored as software instructions in the memory that are executed by the controller . In the following description of the process , reference should also be made to . The process executed by the controller includes determining, at step , the power of the block heater . The power (e.g., wattage) output of the block heater corresponds to its heat output. In one aspect, the process determines, at step , the power output of the block heater by retrieving a stored value associated with the particular block heater that is either input by a user (e.g., via the user interface) or automatically detected by the system when the vehicle is connected to the relay assembly . In one aspect, the identity of the vehicle corresponds to the port of the relay assembly to which the vehicle is connected. The power output of the block heater can be stored as a value in, e.g., a look-up table in the memory of the system . In another aspect, the process can be configured to detect the power required by the block heater by generating an electrical pulse or ping that is transmitted from the power source through the relay assembly to the block heater electrically connected thereto. The resulting current from the ping can be sensed by, e.g., a current sensing circuit, and then used to calculate the power drawn by the block heater . As power is related to voltage and current in a known manner, the power drawn by the block heater can be calculated because the ping is generated at a known voltage (e.g., 120 V) and the resulting current can be sensed or determined. 200 102 204 106 106 114 104 106 114 112 114 112 106 112 114 200 112 114 The process executed by the controller further determines, at step , the ambient temperature of the engine's environment. In one aspect, the ambient temperature is determined based on data from the temperature sensor , as described above. The temperature sensor can be positioned in close proximity to the vehicle that is connected to the relay assembly such that the temperature determined by the temperature sensor is substantially equal to the temperature of the environment in which the vehicle (and its engine ) resides. As long as the vehicle has not been used recently, the ambient or environmental temperature will be equal or substantially equal to the temperature of the engine , thereby allowing the ambient temperature detected by the temperature sensor to serve as a proxy for the temperature of the engine of the vehicle . The process thus obviates the need to directly detect the temperature of the engine , reducing the number of components required to be physically associated with or otherwise communicatively coupled to the vehicle . 200 102 206 114 200 112 118 114 118 102 116 114 114 100 114 100 100 110 100 110 114 104 114 100 114 114 120 114 110 104 114 120 The process executed by the controller further determines, at step , the time duration until the desired start time of the vehicle (i.e., time duration to start). In one aspect, the process determines the time duration based on the time difference between the current time and the desired start time for the engine . In various embodiments, there is a global or system-wide scheduled desired start time that is stored in, e.g., the memory . In another aspect, there can be individual desired start times for each particular vehicle that are stored in, e.g., the memory . Such aspects of the system can be useful in order to, e.g., set a unique start time for each vehicle. In yet another aspect, the desired start times (whether global or on an individual vehicle basis) can be based on and vary by the day of the week. In such an embodiment, the controller can determine the day of the week via the timer or a separate system clock (e.g., a clock generator), retrieve the scheduled start time corresponding to both the vehicle and the determined day of the week, and then calculate the difference between the scheduled start time of the particular vehicle for the particular day and the current time. In this aspect, the system can be configured to store unique start times for each day of the week for each vehicle . Such aspects of the system can be useful in order to, e.g., have the system not activate a connected block heater on certain days (e.g., weekends) or have the system activate a connected block heater at different times on different days. In some aspects, the identity of the vehicle utilized to retrieve the appropriate start time corresponds to the particular port of the relay assembly to which the vehicle is connected. In other words, the system can be configured to store certain parameters (e.g., a scheduled start time or engine size) in association with a specific port, rather than a particular detectable identity of the vehicle itself. In still other aspects, the identity of the vehicle utilized to retrieve the appropriate start time is input by a user via, e.g., the user interface . In such aspects, a user can input particular parameters to be stored in association with a vehicle (or block heater or other device) connected to a particular port of the relay assembly or retrieve previously input stored parameters associated with a vehicle via the user interface . 200 102 208 110 112 110 112 204 112 112 110 100 110 110 120 118 102 300 302 304 306 308 300 312 314 FIG. 3 The process executed by the controller further determines, at step , the duration of time required by the block heater to heat the engine to a desired engine starting temperature. The amount of time required by the block heater to heat the engine to the desired starting temperature is a function of the engine's initial temperature (detected at step ), the thermal properties of the engine (which are dictated generally by the size of the engine , often expressed in terms of, e.g., liters), the power or size of the block heater (in terms of, e.g., wattage), and of course the desired engine starting temperature. In some aspects, the system is configured to automatically detect the power or size of the block heater , as described above. In other aspects, the power or size of the block heater is input by the user (e.g., via the user interface ) and stored in the memory for subsequent retrieval by the controller . The relationship between the variables to calculate the heating duration can be stored as algorithms executed by the processor performing run-time calculations, a series of discrete values in a look-up table, a linear or nonlinear best curve fit formula based on the characterization data, or any other such format. , for example, is a diagram plotting engine temperature (y axis) as a function of time (x axis), according to one or more aspects of this disclosure. In this aspect, the curves , depicted in the diagram can be outputs from algorithms representing best-fit curves calculated from characterization or experimental data relating the change in engine temperature over time for various initial temperatures , , engines sizes, and block heater power levels. 306 302 304 312 308 302 304 314 112 110 306 308 112 110 306 308 316 306 318 306 A first curve represents the change in engine temperature over time given a first initial temperature , an engine size (e.g., 15 L), and a block heater power level (e.g., 1500 W). A second curve represents the change in engine temperature over time given a second initial temperature , an engine size (e.g., 15 L), and a block heater power level (e.g., 1500 W). The sizes of the engines and the powers of the block heaters can be the same or different for each of the curves , . Engines of different sizes and block heaters with different powers will have different thermal properties and will thus affect the shapes of the curves , . For example, a third curve represents the first curve wherein all of the variables are held constant except the engine size, which is lower (e.g., 10 L). Lowering the engine size generally increases the rate of temperature increase because, in part, smaller engines have smaller surface areas and thus lose less heat to convection. As another example, a fourth curve represents the first curve wherein all of the variables are held constant except the block heater power, which is lower (e.g., 1200 W). Lowering the power of the engine generally decrease the rate of temperature increase because it lowers the amount of energy being transferred to the engine block. 200 112 110 306 102 100 306 306 112 110 308 102 100 308 308 102 112 106 204 312 314 204 306 308 316 318 100 112 110 HD1 T1 HD2 T2 FIG. 3 In one aspect, the process can calculate a heating duration required to reach a particular target temperature by retrieving the particular curve corresponding to the given initial temperature, engine size, and block heater power. For example, if the ambient temperature and properties of the engine and the block heater correspond to the first curve , the controller causes the system to retrieve the first curve (or the algorithm representing the first curve ) and then calculates a heating duration Timerequired to reach the given target temperature Temp. Alternatively, if the ambient temperature and properties of the engine and the block heater correspond to the second curve , the controller causes the system to retrieve the second curve (or the algorithm representing the second curve ) and then calculates a heating duration Timerequired to reach the given target temperature Temp. Note that the controller can assume that the initial temperature of the engine is equal to the ambient temperature detected via the temperature sensor at step . As such, the initial temperature , utilized by the algorithm or algorithms can be the ambient temperatures determined at step . The curves , , , depicted in are merely illustrative of the principles discussed herein and the system can include any number of curves and/or algorithms representing the thermal properties of any combination of types of engines and block heaters from any initial temperature. 200 200 112 200 110 200 In another aspect, the process calculates the heating duration utilizing an iterative calculation, rather than retrieving an algorithm corresponding to a best-fit curve. In this aspect, the process performs a heat transfer calculation given the block heater power, the size of the engine (which corresponds to the surface area), and the known specific heat of the engine block. The time component of the heat transfer calculation is a set value (e.g., ten minutes). The process then iteratively calculates the temperature change with the starting temperature as the initial input and each output temperature as the input for the corresponding iteration until the target temperature is reached. Each iteration calculates the bulk heat transfer by the block heater to the engine block, less the convective heat loss to the surrounding environment. Because the time component of the heat transfer equations is a known, set value, the number of iterations that the process had to execute to reach the target temperature corresponds to the heating duration. For example, if the time component is ten minutes and the calculation requires thirty iterations to reach the target temperature, then the heating duration is estimates by the calculations to be three hundred minutes. In addition to the two described aspects, various other processes for calculating the heating duration can be utilized. 208 112 110 102 200 200 In another aspect, the calculations to determine the heating duration at step can incorporate the altitude at which the engine and block heater are located as an additional variable. The altitude can be either input by the user or detected by an altitude sensor communicatively coupled to the controller . In these aspects, the process would retrieve a best fit line corresponding to the detected or input altitude, in addition to the starting temperature, block heater power, and engine size. For aspects of the process utilizing an iterative calculation, the altitude can affect the convective heat loss term in the equations and can therefore be incorporated into the calculations. FIG. 2A 200 102 210 208 206 110 112 200 204 210 110 112 200 204 200 204 100 200 102 212 110 104 108 110 110 108 104 110 112 Referring again to , the process executed by the controller further compares, at step , the calculated heating duration (determined at step ) to the time duration to start (determined at step ). If the heating duration is less than the time duration to start (i.e., if activated at the current time, the block heater would heat up the engine to the target temperature prior to the scheduled start time), then the process loops back to re-determine, at step , the ambient temperature and continues as described above. In some aspects, step modifies the heating duration or the time duration to start by a margin threshold. In such aspects, if the heating duration is less than the time duration to start by a margin threshold (e.g., two minutes), such that the block heater would heat up the engine to the target temperature prior to the scheduled start time by more than the margin threshold, then the process loops back to step . In some aspects, the process incorporates a time delay prior to looping back to step . The time delay can be on the order of, e.g., seconds or minutes. In one specific aspect, the time delay is 30 seconds. The time delay can be implemented to conserve the processing power of the system because environmental temperature generally rises relatively slowly and thus does not require continuous monitoring at the processing speeds at which computers are strictly capable of running. If the heating duration is greater than or otherwise within the margin threshold of the time duration to start, then the process as executed by the controller activates, at step , the block heater by controlling (e.g., closing) the relay assembly to operably connect the power source to the block heater . Once the block heater receives power from the power source through the relay assembly , the block heater begins heating the engine . FIG. 2B FIG. 2A FIG. 2A 200 110 102 200 110 202 110 204 200 216 116 200 218 110 112 110 108 is an logic flow diagram of an alternative aspect of the process of controlling a block heater as executed by the controller , according to one or more aspects of this disclosure. This aspect of the process of controlling a block heater determines, at step , a power of the block heater and determines, at step , the ambient temperature, as described above with respect to . However, in this aspect the process then determines, at step , the current time by, e.g., retrieving a state or output from the timer . The process further determines, at step , the block heater start time corresponding to the time at which the block heater must start in order to heat the engine to the target temperature by the target time. The block heater start time can be determined by calculating the heating duration (as described above with respect to ) of the block heater and then subtracting the heating duration from the target time (which can be retrieved from, e.g., the memory ). 200 220 216 218 200 110 200 204 200 FIG. 2A The process then compares, at step , the current time (determined at step ) to the block heater start time (determined at step ). If the current time is on or after the block heater start time, then the process activates the block heater . If the current time is not on or after the block heater start time, then the process loops back to re-determine, at step , the ambient temperature and continues as described above. In some aspects, the process incorporates a time delay prior to returning to determining the ambient temperature, as described above with respect to . 308 200 200 112 102 120 102 120 FIG. 3 In some cases, it can be impossible to reach a target temperature given a certain starting temperature, block heater power, engine size, and other such conditions. For example, the second curve depicted in indicates that it would either take a long period of time or be impossible to ever reach a target temperature of 70° F. given a starting temperature of &#x2212;40° F. for these particular conditions. To address this, the process can be configured to put the heating duration to a set value (e.g., 12 hours) if the process calculates that the heating duration would exceed a threshold value or the temperature of the engine would never reach the target temperature. In some aspects, the threshold value can be equal to the set value (e.g., 12 hours). In some aspects, the controller can be configured to calculate the max temperature that could be reached given an input starting temperature, block heater power, and engine size and then refuse to allow a target temperature exceeding a certain threshold relative to the max temperature to be accepted as input via the user interface . For example, the controller could cause the user interface to return an error if the user attempted to enter a target temperature exceeding a certain percentage (e.g., 80%) of the calculated maximum temperature given the other input conditions. FIGS. 2A and 2B FIGS. 2A and 2B FIG. 2A FIG. 2B 104 108 110 110 112 110 104 108 110 110 112 In summary, the aspects depicted in both represent processes for controlling the relay assembly to electrically connect the power source to the block heater to activate the block heater according to the heating duration and a target time, such that the engine reaches the target temperature at approximately the target time, without activating the block heater overly early and thereby wasting energy. The processes depicted in essentially differ in that one compares time durations () and the other compares times themselves (). Various other methods of controlling the relay assembly to electrically connect the power source to the block heater , such that the block heater is energized to heat the engine according to the calculated heating duration and a target time, can be utilized. FIG. 4 FIG. 1A 400 100 400 120 400 400 402 114 404 112 406 110 408 112 110 110 100 400 400 410 100 110 400 100 110 400 402 410 is a graphical user interface (GUI) for the system , according to one or more aspects of this disclosure. In the following description of the GUI , reference should also be made to . In some aspects, the user interface of the system can include a GUI . In various aspects, the GUI can include a target time selection for setting a time at which the user wants the vehicle to be scheduled to be ready (i.e., the target time), an engine size selection for setting the size of the engine (in, e.g., liters), a block heater size selection for setting the size or power output of the block heater (in, e.g., watts), and a target temperature selection for setting a temperature to which the engine is to be heated by the block heater (in, e.g., degrees Fahrenheit). In some aspects, the power output of the block heater is determined automatically by the system , rather than being manually input by a user through the GUI . In some aspects, the GUI further includes a calendar or day selection for selecting the particular day or days of the week that the system is configured to activate the particular block heater . In other aspects, the GUI further includes a month selection for selecting the particular months of the year that the system is configured to activate the block heater . In still other aspects, the GUI further includes a target time selection for each of the days and/or months provided by the day selection . 400 412 104 114 100 104 400 114 114 412 100 400 114 100 100 200 110 400 118 102 FIGS. 2A, 2B In some aspects, the GUI further includes a station selection for selecting the particular station or port of the relay assembly that the various selections are to be stored in relation to. In these aspects, identifying the port or station functionally serves the purpose of identifying the particular vehicle . Such aspects of the system can be utilized in arrangements where, e.g., the same vehicles are consistently connected to the same port of the relay assembly each day. In other aspects, the GUI further includes a vehicle ID selection for inputting a particular unique ID associated with each vehicle. In these aspects, when the user first connects the particular vehicle to the system, the user inputs the particular station where the vehicle is connected via the station selection and the vehicle ID. The system then stores the various selections made via the GUI in association with the vehicle ID. When the vehicle is subsequently connected to the system , the user can input the particular vehicle ID and the system will automatically retrieve the stored variables associated with the vehicle ID (e.g., engine size, target time, schedule, target temperature, and/or heater power) and begin executing the process () for controlling the block heater according to these stored variables. All of the various selections through the GUI can be stored in the memory for subsequent retrieval by the logic, process, or instructions executed by the controller . FIG. 5 FIG. 1A 500 110 102 500 500 502 122 110 104 500 504 122 110 104 122 500 506 110 104 110 104 500 502 110 104 is a logic flow diagram of the process of detecting the connection of a block heater as executed by the controller , according to one or more aspects of this disclosure. In the following description of the process , reference should also be made to . The process transmits, at step , an electrical current through the electrical connection that is configured to couple a block heater to the relay assembly . The transmitted current can be a relatively small current, e.g., 2 mA. The process then determines, at step , whether the electrical connection reads as line voltage or as neutral via a circuit. If a block heater is connected to the relay assembly via the electrical connection , then the line will read neutral and the process determines, at step , that a block heater is connected to the relay assembly at the particular port. If a block heater is not connected to the relay assembly , then the line will read line voltage and the process can loop to re-transmit, at step , an electrical current in order to continuously monitor whether a block heater is connected to the relay assembly . 506 110 104 100 200 110 100 110 104 100 200 110 506 110 104 100 120 400 200 110 114 200 110 FIGS. 2A, 2B FIG. 4 When it is determined, at step , that a block heater is connected at a port of the relay assembly , the system can take a variety of actions, such as automatically initiating the process () of controlling the block heater . In such embodiments, the variables such as engine size, target temperature, and activation schedule can be assigned to a particular port so that when the system detects that a block heater has been connected to the relay assembly at the particular port, the system can automatically execute the process of controlling the block heater according to the target time (as determined in some cases by an activation schedule), engine size, and other variables stored in association with the particular port. In other aspects, when it is determined, at step , that a block heater is connected at a port of the relay assembly , the system causes the user interface to automatically display a GUI (e.g., ) in order to prompt the user to enter the information necessary to execute the process of controlling the block heater for pre-heating the vehicle , such as a vehicle ID or the variables required for the computations of the process of controlling the block heater . 500 122 500 102 102 120 110 The process can further include a step of detecting whether the current transmitted through the electrical connection is above a threshold or minimum level. If the current is below the threshold, then the process can flag the occurrence of the low current. When the flag is detected by the controller , the controller can cause the user interface to display an alert indicating that there is a potential error in the detection of the connection of a block heater so that a user can take corrective action. FIG. 6 FIG. 1A FIG. 4 500 110 102 500 600 602 110 600 604 600 606 110 110 110 100 is a logic flow diagram of the process of detecting the connection of a block heater as executed by the controller , according to one or more aspects of this disclosure. In the following description of the process , reference should also be made to . The process transmits, at step , a current through the electrical connection to a block heater . The process next, at step , senses the resulting current from the transmission by, e.g., a current sensing circuit. The process next, at step , calculates the power drawn by the block heater according to the known voltage at which the transmission was generated and the sensed resulting current from the block heater . By automatically detecting the power of the block heater , the system can obviate the need for the user to manually enter this value through, e.g., the GUI (). When a component is described as being “communicatively coupled” to one or more other components, the components are coupled such that they are able to send and/or receive signals therebetween, the signals being capable of transmitting information for processing by any of the connected components or a separate component. Unless stated otherwise, components can be communicatively coupled via either wired or wireless connections. Furthermore, such connections can be configured to transmit analog signals, digital signals, or any type of signal electrically, electronically, or via any other such means. When a component is described as being “operably coupled” to one or more other components, the components are coupled such that there is a functional relationship between the components, i.e., the components are connected in a manner such that they perform the designated function. Parts of this disclosure may be presented in terms of instructions that operate on data stored in a computer memory. An algorithm or process refers to a self-consistent sequence of steps leading to a desired result, where a “step” refers to a manipulation of physical quantities which may take the form of electrical or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated. These signals may be referred to as bits, values, elements, symbols, characters, terms, numbers. These and similar terms may be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities. The foregoing description has set forth aspects of devices and/or processes via the use of block diagrams, flowcharts, and/or examples, which may contain one or more functions and/or operations. Each function and/or operation within such block diagrams, flowcharts, or examples can be implemented, individually and/or collectively, by a wide range of hardware, software, firmware, or virtually any combination thereof. In one aspect, several portions of the subject matter described herein, such as the controller, may be implemented via Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs), digital signal processors (DSPs), Programmable Logic Devices (PLDs), circuits, registers, software components (e.g., programs, subroutines, or logic), and/or combinations of hardware and software components, logic gates, or other integrated formats. Some aspects disclosed herein, in whole or in part, can be equivalently implemented in integrated circuits, as one or more computer programs running on one or more computers (e.g., as one or more programs running on one or more computer systems), as one or more programs being executed by one or more processors (e.g., as one or more programs running on one or more microprocessors), as firmware, or as virtually any combination thereof. Designing the circuitry and/or writing the code for the software and or firmware would be well within the skill of one of skill in the art in light of this disclosure. Although various aspects have been described herein, many modifications and variations to those aspects may be implemented. Also, where materials are disclosed for certain components, other materials may be used. The foregoing description and following claims are intended to cover all such modification and variations. FIGURES Various embodiments of the present invention are described herein by way of example in conjunction with the following figures, wherein: FIG. 1A is a block diagram of a system for controlling one or more block heaters, according to one or more aspects of this disclosure. FIG. 1B FIG. 1A is a block diagram of the system of with multiple block heaters connected thereto, according to one or more aspects of this disclosure. FIG. 2A is a logic flow diagram of the process of controlling a block heater as executed by the controller, according to one or more aspects of this disclosure. FIG. 2B is a logic flow diagram of the process of controlling a block heater as executed by the controller, according to one or more aspects of this disclosure. FIG. 3 is a diagram plotting engine temperature as a function of time, according to one or more aspects of this disclosure. FIG. 4 is a graphical user interface for the system, according to one or more aspects of this disclosure. FIG. 5 is a logic flow diagram of the process of detecting the connection of a block heater as executed by the controller, according to one or more aspects of this disclosure. FIG. 6 is a logic flow diagram of the process of detecting the power of a block heater as executed by the controller, according to one or more aspects of this disclosure.