content
stringlengths 0
1.88M
| url
stringlengths 0
5.28k
|
---|---|
From its origins in 2004, we at the CCIB have maintained a comprehensive strategy of corporate social responsibility that favours the development of sustainable business practises.
In order to better respond to the growing ethical expectations of each interested party, we have committed ourselves to going beyond the basic idea of environmental sustainability in order to create an integrated philosophy that combines both our company mission statement and our corporate values.
Our environmental policy is carried out through the Environmental Management System and is aimed to continuously improve our environmental footprint. It is certified in accordance with ISO 14001 and the Eco Management and Audit Scheme (EMAS) regulatory group.
Energy consumption, waste generation and CO2 emissions are the main environmental issues that we deal with at the CCIB.
We strive to control each one of these issues and we put in place annual objectives in order to reduce, moderate and minimise all associated environmental aspects.
As of 2009, the CCIB has been responsible for the management of its own carbon footprint by calculating and compensating for the CO2 emissions that are generated by its business activities. It has also put into place plans for future reductions in CO2 emissions and more efficient energy practises.
CO2 emissions are balanced by the purchase of carbon credits that are used for various environmental projects that, at the same time, contribute to the improvement of the local environment and subsequent developments.
The CCIB encourages its clients to calculate and compensate for the CO2 emissions that are produced by hosting their event in our centre.
At CCIB we continue to promote our commitment to the social environment. As such, we collaborate on different projects that help to improve the quality of life for different people, especially those that suffer from a greater risk of social exclusion.
Our actions take place in the form of collaboration with municipal entities, associations and institutions.
Throughout 2017, we collaborated with many different types of charitable initiatives, relying on the support of various interested parties. | https://ccib.es/en/sustainable-events/corporate-social-responsibility/ |
[Refraction after cataract surgery with posterior chamber lenses].
In an attempt to determine the accuracy of ultrasound biometry, the spherical equivalent of the refraction obtained after ECCE and implantation of a posterior chamber IOL in 1663 patients was compared to the desired refraction determined prior to surgery. Follow up time was 21 months on the average. In only 7.4% of the eyes was the exact predetermined value obtained. In 44.3% it differed toward plus and in 46.6% toward minus. The predetermined value +/- 1 dpt was obtained in 63.8% and +/- 2 dpt in 88.3% of the cases. In 11.7% of the eyes, the desired value was missed by more than +/- 2 dpt.
| |
Magazine: From Theory to the Real World
Theoretical physicists tend to have a hard time at cocktail parties. Other scientists can discuss their cancer research, or their quest for life on other planets, or even the new floor wax compound they formulated—concrete, real-world matters that even the non-scientist can understand. But when theoretical physicists try to explain their highly abstract work to the uninitiated, whether at a party or before a Congressional committee, they usually evoke blank stares and polite smiles, followed by the inevitable question: That’s all very interesting, but what good is it?
It’s a question that Penn physicist Charles L. Kane has certainly faced more than once. As a dedicated theorist, he’s aware that the sort of scientific advances most people think of as “useful” are the result of practical experimentation, not theoretical explorations. But in the past several years, Kane and a number of colleagues have proven that every once in a while, the theorists can also come up with something that’s not only scientifically fascinating but possibly even incredibly useful.
Kane’s specialty is condensed-matter or solid-state physics, essentially the science of solid matter. A major part of this particular branch of physics involves the design and function of the semiconductor materials at the heart of computers and all our other wondrous electronic devices. Although such inventions are also the product of experiment rather than theory, theorists such as Kane help to lay the groundwork for the experimentalists to explore and build upon. “The kind of theory I do tends to be analytical as opposed to computational,” Kane explains. “I build models and characterize the models, and that’s been a pretty successful line of work for me so far.”
It’s been so successful, in fact, that Kane has received several major prizes in 2012 alone. Aside from the Buckley Prize, awarded for outstanding contributions in condensed-matter physics, Kane received a $500,000, five-year research grant from the Paul Simons Foundation. Most recently, he became the first Penn professor ever to receive the Paul Dirac Medal and Prize from the Abdus Salem International Centre for Theoretical Physics. The accolades have come in recognition of the importance—and yes, potential applications—of an entirely new type of material called a topological insulator (TI), first predicted in Kane’s theoretical work.
A topological insulator is a type of solid material with the intriguing quality that it’s mostly an electrical insulator such as wood or glass—but only on the inside. On the surface and edges, it does conduct electricity, but in a very special way. Kane says, “The way in which the surface conducts electricity is different from ordinary conductors.” Those differences open the door to some extraordinary possibilities.
In usual conductors, impurities or disorder in the atomic structure of the material, such as a few molecules of another element mixed in, can impede or even stop the flow of electrons. That results in what physicists call a localized state: The electrons are literally stuck in a particular location. But the surface of a TI is absolutely impervious to such problems. The electrons simply “skip” along the surface in discrete quantum steps, moving all in the same direction. This characteristic of the TI surface is dictated by some highly intricate quantum mechanical properties that can’t be changed no matter what else is done to the system, a phenomenon physicists call “topologically protected”—hence the name “topological insulator.”
“That’s the essence of what makes the surface different,” Kane says. “With an ordinary two-dimensional conductor, if you make it dirty, if you make it disorderly, which everything in the real world is on some level, then the electronic states will become localized and it won’t really be a conductor. So the thing that’s special about the TI is it can’t be localized.”
Another difference from ordinary conductors is that the TI surface electrons arrange themselves according to their “spin,” a quantum property of fundamental particles, like positive or negative charge. “Spin up” electrons flow only in one direction, while “spin down” electrons flow in the other. This comes in handy for spintronics, a burgeoning field of electronics that uses electron spin instead of charge to carry information.
The TI concept grew out of studies back in 2004 by Kane and a Penn colleague, Professor of Physics and Astronomy Eugene Mele, on the unique properties of graphene, the one-atom-thick, sheet-like form of carbon. Kane recalls, “It’s a material that’s right on the boundary of being a metal and a semiconductor. So the question I asked was, why is that?” Kane and Mele theorized that electrons would move through graphene in a way involving a quantum phenomenon called spin-orbit interaction, which led to the idea of a new state of matter that was an insulator on the inside but had conducting states on its edge.
At the time Kane and Mele published their ideas, it was only an interesting theory, but it attracted the attention, both of other theorists such as Joel Moore at the University of California at Berkeley and Shoucheng Zhang at Stanford, and of experimentalists such as Laurens Molenkamp at the University of Würzburg in Germany. By 2007, Kane and the others had fleshed out more of the theory and Molenkamp had experimentally proven the existence of topological insulators. The following year, a team at Princeton found TIs in other common materials such as bismuth selenide and bismuth telluride.
“At that point, people really started noticing that this was something real,” says Kane. “The floodgates opened and now there are people all over the world who are doing experiments and theory, and it’s become one of the biggest fields in condensed matter physics.”
The excitement is all due to the fact that topological insulators have the potential to revolutionize electronics and lead to other major physics discoveries. One of these is confirming the existence of a long-sought exotic particle called a Majorana fermion. According to theory, Majorana fermions occur only in special superconductivity states -- such as those that may occur by combining the surface of a TI with a superconducting material. But Majorana fermions are of far more than merely academic interest, because if they exist and can be controlled, they offer a powerful method for storing and manipulating quantum information. This may lead to new technologies for quantum computation. Even without superconductivity or Majorana fermions, the special conducting properties of TI surfaces promise new technologies for low-power electronics. | https://www.sas.upenn.edu/news/magazine-from-theory-real-world |
- Posted On:
- Written By: Atlanta Center for Reproductive Medicine
Vasectomies are a widely used method of contraception today. The failure rate is extremely low such that they are a very dependable way of avoiding unwanted pregnancy. Sometimes a man who thought his family was complete may change his mind and want to have more children after a vasectomy has been performed. There are a couple of ways of resolving this dilemma.
How to get pregnant after a Vasectomy
To be able to have children after a vasectomy you can undergo a vasectomy reversal or try In vitro fertilization (IVF) and intra-cytoplasmic sperm injection (ICSI) using aspirated sperm.
VASECTOMY REVERSAL
The traditional approach has been to carry out a second surgical procedure wherein the severed vas deferens (the tubes within the scrotal sac which carries sperm from the testicles to the outside world) is sewn back together. This is a microsurgical procedure which is actually far more technically involved and complicated than the original vasectomy where a piece of the vas was burned, removed or clipped. The procedure will typically take a couple of hours to perform and is done by urologists with who have undergone specialized microsurgical training. The procedure can be technically successful in 60-70% of cases if the vas deferens was not excessively destroyed in the original vasectomy procedure. Unfortunately, these results are not always the case and the actual patency rate (i.e. sperm are found in the ejaculate after the procedure) is lower.
The other complicating factor with surgical repair is the prevalence of anti-sperm antibodies. These antibodies will prevent normal sperm function if they are present. They are found increasingly frequently the longer it has been since the original vasectomy was performed. Most researchers agree that they are rarely found within 5 years from the original vasectomy and are almost always present more than 10 years from the original procedure. In these latter cases, even if the vasectomy reversal procedure is technically successful, the sperm will not be normally functional therefore the surgery probably will not lead to successful conception.
It may take a few months to see sperm within the ejaculate following a reversal procedure and unfortunately in some cases despite sperm being present initially post-operatively, there is progressive scarring which leads to re-closure of the vas.
IN VITRO FERTILIZATION (IVF) AND INTRA-CYTOPLASMIC SPERM INJECTION (ICSI)
The other approach available today is to carry out In vitro fertilization (IVF) and intra-cytoplasmic sperm injection (ICSI) using aspirated sperm. We've always been able to aspirate sperm using a fine gauge needle directly from the testicles. Under local anesthesia, it is quite realistic to pass a needle directly through the scrotum into the testicle itself or the epididymis (the network of tubules adjacent to the testicle where sperm finish their maturation process and are stored prior to ejaculation) and aspirate sperm. The limiting factor has always been that we can only retrieve thousands of sperm in this fashion and we need tens of millions for intercourse to establish pregnancy or millions for inseminations to do so. Using the technology of IVF/ICSI however, we only need one sperm for each egg available. Since we may typically get 10-15 eggs during an IVF cycle, we'd only need 10-15 sperm for success. Therefore the sperm aspirated in this fashion are more than enough for multiple attempts.
The advantages of IVF/ICSI versus vasectomy reversal are multiple. Success rates do not depend On how much damage was caused by the original vasectomy. The presence or absence of anti-sperm antibodies is irrelevant because the sperm do not need to be able to swim on their own during IVF/ICSI. Also because IVF is being done, female fertility problems such as tubal issues, endometriosis, ovulation problems and so on are all automatically being bypassed.
Success rates for IVF/ICSI using aspirated sperm following vasectomy are among the highest in couples doing IVF and the live birth rates are certainly equal if not better than those seen following vasectomy reversal. Lastly this approach is far more efficient in that the whole process from beginning of testing to starting obstetrical care could certainly be carried out in a 2-3 month time frame whereas the surgery itself may be carried out a month or so after testing, it may require months to see normal sperm in the ejaculate and the couple may then have to try for several months before conceiving.
For more information about conception after a vasectomy, and to schedule an appointment with any of ACRM’s fertility experts, call 678-841-1089 or click here. | https://www.atlantainfertility.com/about-us/blogs/2017/september/having-a-baby-after-a-vasectomy/ |
The lecture by Christoph Stadtfeld from ETH Zurich will take place at the Complexity Science Hub Vienna.
Location: Room 201
If you are interested in participating, please email to [email protected]
Abstract
Social networks are complex, dynamic systems. However, they emerge on a small scale from the actions of individuals that do not necessarily overlook its full complexity. Yet, emerging network outcomes such as segregation, cluster formation, or the distribution of knowledge can have a direct impact on them and can restrict their choices and opportunities to act. In the study of social network dynamics it is thus important to simultaneously consider the link between the two levels levels: the macro-level of large-scale network structures and the micro-level of individuals’ opportunities, preferences, and actions. This talk illustrates how state-of-the-art statistical network methods and computational simulation techniques can be combined to investigate the micro-macro link in social networks. Recent empirical work in the context of the Swiss StudentLife study will illustrate the value of this approach.
Bio
Christoph Stadtfeld is an assistant professor of Social Networks at ETH Zürich, Switzerland. He develops methods for the statistical analysis of dynamic social network data, and publishes theoretical-empirical work on network dynamics in different sub fields of sociology. Both research lines have been featured in leading sociological, methodological and interdisciplinary journals (e.g. Sociological Methodology, Sociological Methods & Research, Social Networks, Social Forces, PNAS). To make the methodological work accessible to the applied social networks community, Christoph Stadtfeld develops and contributes to scientific software packages, like the Goldfish package in R. | https://www.csh.ac.at/event/csh-talk-christoph-stadtfeld-eth-zurich/ |
The consortium brings together 18 partners across seven countries and aims to bridge the gaps between academia and industry research. Over the next four years, each of the 68 fellows will spend a period of time from one month to one year in their placement, learning new skills and sharing their expertise.
Brendan Kennedy lectures on biomolecular and biomedical science in the UCD Conway Institute and is the consortium coordinator. He says that the goals of the program include allowing fellows to gain experience working internationally and within industry. The hope is that the fellows will gain knowledge in fields they wouldn’t have access to before.
Kennedy also said one goal of the consortium is to prevent duplication of research. Instead of academic and industry partners working on the same techniques individually, the consortium will allow the exchange of knowledge.
The link between cancer and eye treatment lie in angiogenesis, the formation of blood vessels. Yolanda Alvarez is the project manager for the consortium. She says that both fields can share a lot of research.
“This is where the link between ophthalmology and cancer comes because in both diseases… angiogenesis is the main target,” Alvarez said.
The current 3D-NEO-NET consortium emerged from the 3D NET project, a partnership of five organizations launched in 2013. The four year effort hoped to further networking and research for eye therapeutics. Out of this consortium came the idea to expand the program to include more partners.
“The aim of this project is to establish stronger collaborations,” Alvarez said. “You have to experience really, to live yourself, what this exchange is, to open your mind, to go to a different country.” Kennedy agreed that this consortium could open new doors for researchers and drug developers.
“Where this should go next is that some set of those partners will come together and form a very tight research collaboration and will apply for a regiment of money to build a skyscraper,” Kennedy said.
The consortium was awarded close to €1 million over the next four years under the European Union’s Horizon 2020 program. The funds come from the Marie Sklodowska-Curie Research and Innovation Staff Exchange. As the head of the consortium, UCD serves as the direct legal and reporting connection to the EU. | https://www.3dneonet.org/ucd-heads-new-cancer-and-eye-treatment-consortium/ |
The Century cactus is a thick, massive succulent with bluish pointed leaves forming a basal rosette. It is slow growing, living to 10-25 years (the century is an exaggeration) before it uses all its reserves to grow a flower stalk that can be 15 feet tall. After, the original plant dies, but is replaced by small offshoots from the base. It grows best in the desert, with excessive sun and dry soil. When an century cactus is over watered, the roots will rot.
It can be a used for a variety of resources. When the flower stem is cut before it flowers. A sweet liquid gathers in the art of the plant. The leaves have strong fibers that can be use for rope. Most commonly, it can be fermented into an alcoholic drink.
Unreviewed
Comprehensive Description
Derivation of specific name
Trusted
Distribution
Worldwide distribution
Trusted
National Distribution
United States
Origin: Native
Regularity: Regularly occurring
Currently: Present
Confidence: Confident
Trusted
Trusted
Physical Description
Morphology
Description
Trusted
Description
Trusted
Description
Trusted
Ecology
Habitat
Habitat & Distribution
Trusted
Molecular Biology and Genetics
Molecular Biology
Barcode data: Agave americana
Trusted
Statistics of barcoding coverage: Agave americana
Public Records: 4
Specimens with Barcodes: 8
Species With Barcodes: 1
Trusted
Conservation
Conservation Status
National NatureServe Conservation Status
United States
Rounded National Status Rank: NNR - Unranked
Trusted
NatureServe Conservation Status
Rounded Global Status Rank: GNR - Not Yet Ranked
Reasons: Ampliamente conocido, ubicada en valles mesotérnicos interandinos (3100-3700 m). Se encuentra en Bolivia.
Trusted
Management
Trusted
Relevance to Humans and Ecosystems
Benefits
Root: Sudorific and antisyphilitic. Roots are steeped in water, and the water ingested for various ailments such as stomach pain, painful and difficult urination, scurvy, swollen and bleeding pulp of teeth, swollen bones, constipation, and poor appetite or loss of appetite.
Trusted
Economic Uses
Uses: Beverage (non-alcoholic), Folk medicine
Comments: Hierba a la que se le atribuye propiedades tales como purificadora de la sangre, diurética, antiséptica, laxante, tónica, para la conjuntivitis, afecciones hepáticas, renales, sífilis. Los botones florales son comestibles, utilizados en la preparación de bebidas nutritivas.
Trusted
Wikipedia
Agave americana
Agave americana, commonly known as the century plant, maguey, or American aloe (although it is in a different family from the Aloe), is an agave originally from Mexico but cultivated worldwide as an ornamental plant. It has since naturalised in many regions and grows wild in Europe, South Africa, India, and Australia.
Contents
Description
The misnamed century plant typically lives only 10 to 30 years. It has a spreading rosette (about 4 m/13 ft wide) of gray-green leaves up to 2 m (6.6 ft) long, each with a spiny margin and a heavy spike at the tip that can pierce to the bone. When it flowers, the spike with a cyme of big yellow flowers may reach up to 8 m (26 ft) in height. Its common name likely derives from its semelparous nature of flowering only once at the end of its long life. The plant dies after flowering, but produces suckers or adventitious shoots from the base, which continue its growth.
Cultivated varieties include the "marginata" with yellow stripes along the margins of each leaf, "medio-picta alba" with a central white band, "medio-picta aurea" with a central yellow band, "striata" with multiple yellow to white stripes along the leaves, and "variegata" with white edges on the leaves.
Taxonomy and naming
Agave americana was one of the many species described by Carl Linnaeus in the 1753 edition of Species Plantarum, with the binomial name that we still use today.
Subspecies
- Agave americana var. americana
- Agave americana var. expansa
- Agave americana var. latifolia
- Agave americana var. oaxacensis
- Agave americana ssp. protamericana
Uses
If the flower stem is cut without flowering, a sweet liquid called agua miel ("honey water") gathers in the heart of the plant. This may be fermented to produce the drink called pulque. The leaves also yield fibers, known as pita, which are suitable for making rope, matting, coarse cloth and are used for embroidery of leather in a technique known as piteado. Both pulque and maguey fibre were important to the economy of pre-Columbian Mexico.
Mezcal and tequila are different from pulque, they are distilled spirits. In the region of Tequila, agaves are called mezcales, and the high-alcohol product of their distillation is called mezcal. Tequila is made from Agave tequilana, comonly called "blue agave". Mezcal may contain the mezcal worm, which pulque and tequila do not.
Agave nectar, also called agave syrup, is marketed as a natural sugar substitute with a low glycemic index that is due to its high fructose content.
The sap is quite acidic and can be quite painful if it comes in contact with the skin. It can form small blisters.
Pictures
in Rookwood Cemetery, Sydney, Australia
Agave (americana), Yemen
Heraldry
The plant figures in the coat of arms of Don Diego de Mendoza, a Native American governor of the village of Ajacuba, Hidalgo.
|Wikimedia Commons has media related to: Agave americana|
See also
References
- ^ "Agave americana L.". Germplasm Resources Information Network. United States Department of Agriculture. 2005-05-23. http://www.ars-grin.gov/cgi-bin/npgs/html/taxon.pl?1690. Retrieved 2010-01-12.
- ^ Bailey, L.H.; Bailey, E.Z.; the staff of the Liberty Hyde Bailey Hortorium. 1976. Hortus third: A concise dictionary of plants cultivated in the United States and Canada. Macmillan, New York.
- ^ Irish, Gary (2000). Agaves, Yuccas, and Related Plants: A Gardener's Guide. Timber Press. pp. 94–97. ISBN 9780881924428. http://books.google.com/books?id=YbVYuq73I0wC.
- ^ Vermeulen, Nico. 1998. The Complete Encyclopedia of Container Plants, pp. 36-37. Netherlands: Rebo International. ISBN 90-366-1584-4
Trusted
Notes
Common Names
French Guiana: aloes. Surinam: agave.
Trusted
Comments
Trusted
Comments
Trusted
Comments
Trusted
Disclaimer
EOL content is automatically assembled from many different content providers. As a result, from time to time you may find pages on EOL that are confusing.
To request an improvement, please leave a comment on the page. Thank you! | http://eol.org/pages/1083826/details |
I added a new authorization object to a transaction in SU24. Why does the new restriction not work?
The majority of checks for authorization in SAP are performed in the ABAP code with the AUTHORITY-CHECK ABAP statement.
If there is no AUTHORITY-CHECK in place for the authorization object (and subsequent logic for the response), then no check will take place.
SU24 allows us to effectively deactivate some authorization checks which have been coded, what it does not let us do is add in arbitary checks without the appropriate code.
User-Exits, BADI's, Enhancement Points are all potential ways of including additional checks and validation without modifying standard SAP code. | https://www.turnkeyconsulting.com/i-added-a-new-authorization-object-to-a-transaction-in-su24.-why-does-the-new-restriction-not-work |
Azraq is a small city in the eastern desert of Jordan and lies 100 km away from Amman. It lies on the old Hajj road and the Hijaz railway. The nearby Azraq Oasis extends over 12 square kilometres of parklands, pools and gardens. The oasis has the only water source in the eastern desert and is also home to water buffalo and other wildlife. Over the past 15 years or so, the water level in Azraq’s swamps has fallen dramatically due to large-scale pumping to supply Amman and Irbid. Still Azraq remains one of the most important resting place in the Middle East for birds migrating between Africa and Europe. The abundant springs have dried up over the years due to many dams constructed in Syria. During the Current Syrian Civil War, many of these dams have been destroyed due to neglect and the springs of the oasis are being revived. The small ponds are also getting more rainwater flow. | http://www.umayyad.eu/?q=content/azraq |
PHILADELPHIA, April 7, 2008 /PRNewswire-USNewswire/ -- The Children's Hospital of Philadelphia has contributed a large genotype dataset to the Autism Genetic Resource Exchange (AGRE), a scientific program of the organization Autism Speaks, dedicated to advancing genetic research in autism. This large genetic dataset will now be broadly accessible to autism researchers worldwide.
The Center for Applied Genomics at Children's Hospital employs highly automated microarray technology to perform high-speed genome analysis. The center's HumanHap550 system, manufactured by Illumina, Inc., analyzed 4,500 DNA blood samples gathered by AGRE and generated genotypes -- a compilation of 550,000 genetic markers for each person. Children's Hospital then contributed the genotyped data to AGRE.
By studying patterns of variation in those genotypes, researchers using the AGRE resources will be able to discover and investigate multiple genes that may contribute to autism. Previous family studies have strongly suggested a genetic contribution to autistic spectrum disorders (ASDs). The 4,500 individuals who provided blood samples for the genomic analysis represent approximately 900 families, including 1,250 children with ASDs, their parents and their unaffected siblings.
"We are extremely pleased to provide these genotypes to the public domain," said Hakon Hakonarson, M.D., Ph.D., director of the Center for Applied Genomics at Children's Hospital. "Scientific work using AGRE's data repository will complement our own comprehensive research and clinical programs in autism at Children's Hospital, aimed at finding the causes and cure for this devastating disease." Maja Bucan, Ph.D., professor of Genetics at the University of Pennsylvania, a collaborator on the project and a long-time member of the AGRE steering committee, predicts that "the high-density genotype data on the AGRE families will provide novel insight into a genomic landscape of autism and other neurodevelopmental disorders."
Drawing on data from AGRE's open-access database, researchers from multiple institutions have previously published over 120 scientific papers on the genetics of autism. "These new genotypes greatly enhance the resources we can offer to the worldwide community of scientific investigators by complementing and extending the genotype data made available by other research teams," said Clara Lajonchere, Ph.D., Vice President of Clinical Programs for Autism Speaks and the Director of the AGRE Program.
The Center for Applied Genomics at Children's Hospital has been collaborating in ongoing gene discovery projects with the hospital's robust autism research program. Children's Hospital and investigators from the University of Pennsylvania recently launched a Center for Autism Research, which delves into underlying biological mechanisms in ASDs, along with brain imaging studies of language and communication impairments. That center works hand-in-hand with the hospital's long-established Regional Autism Center, which provides comprehensive, family-based care for children with ASDs. Among the Regional Autism Center's many research studies is its participation in a multicenter national project dedicated to early autism diagnosis and intervention.
About Autism Speaks: Autism Speaks is dedicated to increasing awareness of autism spectrum disorders, to funding research into the causes, prevention and treatments for autism, and to advocating for the needs of individuals with autism and their families. It was founded in February 2005 by Suzanne and Bob Wright, the grandparents of a child with autism. Bob Wright is Vice Chairman, General Electric, and served as chief executive officer of NBC for more than twenty years. The Autism Genetic Resource Exchange is a program of Autism Speaks which collects biomaterials and clinical data from families and makes it widely available to approved researchers. To learn more about Autism Speaks, please visit http://www.autismspeaks.org.
About The Children's Hospital of Philadelphia: The Children's Hospital of Philadelphia was founded in 1855 as the nation's first pediatric hospital. Through its long-standing commitment to providing exceptional patient care, training new generations of pediatric healthcare professionals and pioneering major research initiatives, Children's Hospital has fostered many discoveries that have benefited children worldwide. Its pediatric research program is among the largest in the country, ranking third in National Institutes of Health funding. In addition, its unique family-centered care and public service programs have brought the 430-bed hospital recognition as a leading advocate for children and adolescents. For more information, visit http://www.chop.edu.
Contact: John Ascenzi
Phone: (267) 426-6055
|SOURCE The Children's Hospital of Philadelphia|
Copyright©2008 PR Newswire. | http://www.bio-medicine.org/medicine-news-1/Childrens-Hospital-Contributes-Genotype-Data-to-Enhance-Autism-Research-Worldwide-16097-1/ |
A team of experts has refuted previous findings published last summer stating that Pfiesteria is not toxic to fish or humans. When they cultured the same strain of P. shumwayae studied by the dissenting scientists, it produced a toxin that killed fish within minutes.
Dr. JoAnn Burkholder, director of North Carolina State University’s Center for Applied Aquatic Ecology, presented the results of the new study Tuesday at the 10th International Conference on Harmful Algae in St. Petersburg, Fla. The findings are significant because they reconfirm a decade of research showing that Pfiesteria is a dangerous toxic organism.
Last summer’s papers had been critical of work by Burkholder and other scientists who discovered Pfiesteria and described its life cycle and toxic impacts on fish and mammals. However, the dissenting scientists’ work was based primarily on research with one strain. In the new study three laboratories, assisted in toxin analysis by a fourth “blind” lab, have shown that this allegedly nontoxic strain does produce toxin after all. Burkholder said that their team’s results differed because they grew the culture under conditions that allowed it to express toxicity.
“I hope these findings finally help set the record straight by addressing the widespread misinformation about this issue during the past few months,” Burkholder said. “Growing these cultures is very complex and difficult work. We are entirely confident that the strain we have tested, taken from the very same culture they used, is toxic and dangerous.”
Populations or strains of Pfiesteria, like other toxic algae, are known to vary in toxicity. There are strains that can kill fish with toxin and benign strains that cannot. More than 50 peer-reviewed science articles have been published about toxic Pfiesteria, in cross-confirmed research based on more than 400 toxic strains and 200 nontoxic strains.
Careful review of the culture methods used in last summer’s studies raised concerns among Burkholder, Drs. Andrew Gordon and Harold Marshall at Old Dominion University, and Dr. Alan Lewitus at the University of South Carolina.
“We were surprised to find that these scientists extrapolated beyond their data from just one strain to all strains of Pfiesteria, even to both species,” Burkholder explained. “Pfiesteria is difficult to culture in actively toxic mode, and their methods did not follow the only standard procedure that has worked so far in producing toxic Pfiesteria. We decided to re-test that strain of Pfiesteria shumwayae using the standard protocol.”
The P. shumwayae strain had been grown with algal prey for two years. In previous research, all but four of the 400 toxic strains examined by Burkholder and other specialists on toxic Pfiesteria had rapidly lost their ability to make toxin when they were not grown with live fish. Therefore, the team led by Burkholder expected that the strain would not be able to produce toxin.
The three laboratories grew this strain in standardized fish bioassays. They compared mortality of juvenile tilapia grown with the test strain of Pfiesteria shumwayae, versus tilapia grown with a known toxic strain. Some control fish were grown with a known nontoxic Pfiesteria strain, while others were maintained without any Pfiesteria. Once the strain was rapidly killing fish, it was re-isolated from the fish cultures and grown with algae for several weeks so that pure culture, without fish and associated contaminating microbes, could also be tested for any remaining toxicity.
“When we used the standardized method with this P. shumwayae strain, it responded to fish very quickly,” said Lewitus. Within a few days the culture was killing fish at low to moderate cell densities of 800-5000 cells per milliliter. Fish died at comparable rates when exposed to the known toxic strain, but all control fish remained healthy.
“With the nontoxic control strain, even at very high densities of 40,000 cells per milliliter, there was no fish death or apparent stress,” said Marshall, “although there was some physical attack.”
The scientists then sent samples to toxin specialists Drs. John Ramsdell and Peter Moeller at the NOAA-National Ocean Service Marine Biotoxins Program in Charleston, S.C., for toxin analysis. The toxin specialists analyzed them “blind,” without knowing the identity of the samples. A potent water-soluble toxin was detected from the test P. shumwayae strain grown with fish and in pure culture with algae – the same toxin that was found in the known toxic strain. Both the cells and the surrounding water in which the test strain was grown contained toxin. No toxin was found in the negative controls.
These new data show that the scientists who reported that Pfiesteria is not toxic actually had a toxic strain all along. “Toxic Pfiesteria strains are widespread and easily found in many estuaries,” said Burkholder. “The controversy here is not a culture availability issue. This multi-laboratory study shows that it is, instead, a culturing issue. It is really important for laboratories to use procedures that allow Pfiesteria to express toxicity.”
At the same conference on Thursday, Gordon and Marshall will present related research showing that when some strains of toxic P. shumwayae and other microbes are removed from fish-killing cultures by filtration, the filtrate kills fish. This indicates a toxic effect of Pfiesteria without physical contact. Dr. Mac Law, a veterinary fish pathologist at NC State, found that fish exposed to the toxic filtrate developed skin lesions, showing that Pfiesteria can cause these sores without physical attack.
New findings about Pfiesteria toxin will also be presented at the Florida meeting this week. Ramsdell and Moeller will describe novel rapid purification methods that they used to obtain information on the toxin’s chemical structure. They also isolated toxin from pure cultures of toxic Pfiesteria, grown without live fish. When test fish were exposed to the toxin, they died in minutes.
Other new research, conducted by Dr. Edward Levin of Duke University, will highlight impacts of Pfiesteria toxin on mammals. When Levin injected this Pfiesteria toxin into the hippocampus of live rats, they developed severe learning deficits, supporting previous studies that have linked toxic Pfiesteria with profound learning disabilities in rats and humans. | https://scienceblog.com/208/findings-reconfirm-toxicity-of-pfiesteria/ |
America's New War?
By Amy Goldstein and Dan
Eggen
Washington Post
November 9, 2001; Page A16
The Justice Department announced yesterday it will no longer issue a running tally of the number of people detained around the country as law enforcement officials investigate the Sept. 11 hijackings and try to prevent further terrorist attacks.
An official said the department will instead provide two, smaller pieces of information about its campaign of detentions -- identifying how many people are being held on charges of violating immigration laws and how many are in federal custody.
The revised information policy will narrow the picture of the detentions in two ways. It will omit what federal officials have described as the largest group of detainees: people who have been apprehended by FBI agents or police on unrelated state or local criminal charges, some of them minor. In addition, the figures will reflect only the number of people held on INS or federal charges at any given time -- not the cumulative total who have been arrested and, in an unknown number of cases, released.
The decision to narrow the visible picture of the terrorism investigation comes after senior government spokesmen have in recent days offered conflicting statements about the pattern of detentions. It also comes as legal, civil liberties and immigration groups have begun to protest, contending the Bush administration is being so secretive that it is unclear whether the detentions are constitutional.
Until now, Justice has given frequent updates on the tally, saying that 1,182 people had been apprehended as of early this week. The department has not disclosed other basic information, including detainees' names, where they are being held or the reason for their arrests. Nor has the department said how many people have been released.
To try to understand the detention campaign, The Washington Post independently identified 235 of the detainees and found that virtually all of those people were men from Middle Eastern countries. More than half of the people found were held on immigration charges, and only perhaps 10 had any known links to the 19 terrorists who carried out the hijackings or to other terrorist activities. About one-third of the 235 identified detainees had been released.
Yesterday, the Justice official, speaking on the condition of anonymity, said the policy was changing because the old method had placed too much burden on state and local police departments to notify federal officials of arrests, thus making the tally prone to errors.
The announcement prompted louder complaints from legal and civil liberties groups. "If it turns out what they've been giving out is confusing information, they ought to straighten that out, rather than withholding it," said Kate Martin, director of the Center for National Security Studies. Said Laura W. Murphy, director of the American Civil Liberties Union's Washington office: "We should not as a society tolerate a law enforcement apparatus that operates in virtual secrecy." | http://www.sweetliberty.org/issues/war/safety/tallies.htm |
If you are associated with the finance domain, either as a professional or as a student, you must have often heard the terms – Buy Side vs. Sell Side in your day-to-day interactions.
But do you know exactly what these terms mean in the relevant context?
This article aims to provide insights into the technicalities involved in the above-mentioned two concepts.
Let me start by explaining these concepts in a simplified manner to you.
Buy Side vs. Sell Side Meaning
You can ascertain by the name, Buy-Side is associated with the entities that are involved in making the investments.
These entities can be individual investors or companies involved in investing money for future returns.
The risk factor is always higher on the buy side as the decision to invest is the sole responsibility of the buy-side analyst or buy-side firm.
On the other hand, Sell-Side is associated with the entities which facilitate the decision-making and raise capital for the buy-side entities.
These entities, again, can be individuals or companies and typically operate within a specific sector or industry segment.
The risk involved is less on this side, as the decision is not theirs to make, and their sole responsibility is to present their opinion and estimates.
Sell Side vs. Buy Side in Investment Banking
Buy-side in investment banking refers to the clients of investment banks.
Typically these are large corporates from across industries that are concerned with buying investment services.
These clients deploy capital at a certain point and at a certain price suggested by the investment bank for generating future returns.
Buy-side can also refer to a client buying merger and acquisition advisory from an investment bank.
In general, an investment bank is a sell-side entity that provides the buy-side with advisory services to make a rational decision.
These advisory services are usually for sales & trading, raising capital, and mergers and acquisitions.
Investment banks provide insights, trends, projections, and analysis of investment options and make recommendations for a higher return in the future.
However, in some cases, investment banks can also be categorized as buy side, for example, fundraising done by investment banks on behalf of the client.
Buy Side vs. Sell Side in Equity Research
In equity research, buy-side refers to the companies involved in investing their own money or their client’s money in the capital markets.
These companies, and in some cases individuals, would make the investment decisions not just on the basis of the performance of the stock or the company but also the performance of the markets and other macroeconomic factors.
The work of buy-side analysts revolves more around validating the research done by sell-side companies.
This is usually done by talking to experts in the industry and deriving robust financial conclusions.
On the other hand, the Sell-side in equity research refers to the broking and financial research firms that track equity stocks, analyze them, and derive an opinion for the clients.
These companies are aplenty and usually focus on a particular industry sector or type of company (blue chip, mid-cap, small-cap, etc.).
Companies on the sell side closely track stocks, companies, their performance, and forecast.
Their work usually revolves around annual reports, balance sheets, quarterly results, and published data available in the public domain.
Buy-Side and Sell-Side Analysts
The type of work that analysts do, either buy-side or sell-side, is very similar.
Again, the objective is to identify the most profitable and high-return investment avenue.
All analysts are expected to do their own research and create reports on the basis of their analysis.
But the intensity and depth of work differ a lot.
The research reports created by a buy-side analyst are only available to the company internally, whereas reports created by sell-side analysts are available in the public domain.
Usually, the buy-side analyst uses reports from multiple sell-side analysts and furthers the analysis by creating their own reports.
Also, the job of a sell-side analyst is to determine whether the investment option should be recommended or not. Still, a buy-side analyst must move up a notch and understand whether the investment option is in line with the company’s strategy.
In other words, a sell-side analyst’s accountability (and also the risk involved) is far less compared to a buy-side analyst.
The question that a sell-side analyst answer is – “Is this stock good?’’ as against a buy-side analyst who answers ‘’ Is this stock good for my company?’’.
A higher skill set (financial modeling) and knowledge of financial concepts are required for buy-side analysts when compared to their counterparts on the sell side. Therefore buy-side analysts usually make more money than sell-side analysts in the industry.
If you want to pursue a career in buy-side, I would suggest spending a few years working as a sell-side analyst to understand the basics and then apply them to your buy-side job profile.
Buy-Side and Sell-Side Firms in the Financial Market
In simple terms, buy-side firms are entities that make the actual investment.
These firms typically are asset management firms, venture capitalists, hedge funds, mutual funds, private equity funds, institutional buyers, and investment advisors.
Buy-side firms are usually bigger in terms of operations, but the number of analysts is smaller who often deal with multiple sell-side entities for making the investment decision.
Sell-side companies and firms are broker houses, research companies, and investment banks.
The number of analysts in these companies is higher when compared to buy-side firms, with analysts dedicated to specific sectors of companies and industry verticals.
Sell-side firms are smaller in terms of operations and typically have limited capabilities.
This is one of the reasons why the sell-side analysts are paid lower than the buy-side analysts.
Many of us are regular investors in stocks where we buy or sell equities. We conduct stock trade through research reports, stating which equities to buy and which to sell at what time.
This decision of ours is largely dependent upon experts’ advice. These experts are officially known as sell-side analysts.
In stock trading, there are two kinds of analysts – the buy-side and the sell-side. The buy-side analysts are those who are involved in raising investment capital and deciding where to invest the capital.
The sell-side analysts pitch financial products like bonds, stocks, or companies to investors and persuade them to buy them.
While a sell-side analyst works in a stockbroking firm, a buy-side research analyst has to work with mutual funds, pension funds, or hedge funds.
In this article, we will look into sell-side equity research in detail, regarding their roles and responsibilities, enabling you to understand their communications to you as an investor. Perhaps, you can think of becoming a sell-side equity research analyst yourself!
Secrets in Sell-Side Securities Research
Simply put, the job of a sell-side analyst is to recommend stocks to people.
Other than that, a sell-side analyst writes a Sell-Side securities Research Report that is expressive of his or her opinion, enabling investors to decide whether buying or selling certain stocks will be profitable or not.
The sell-side securities research analyst has the job of following a list of companies and regularly researching them for the clients of the firm employing them.
The clients are comprised of individual investors, small businesses, and corporations.
To ease the research process, the researcher builds financial models to keep track of the financial changes happening in the list of companies and communicate with competitors and suppliers; customers are other sources to generate holistic company research profiles.
These research works are reflected in the form of reports made accessible to the public.
The report will generally be detailed research and recommendation on why some stock is or isn’t a good investment in the long-term or short-term.
For their research and analytical skills (financial modeling), the researcher is usually paid about 60,000 USD to 90,000 USD annually.
The salary range differs with profile role and responsibilities, work experience, and educational knowledge.
A sell-side Securities research interview is most of the time practiced and trained. Stocks that are rated sell in these interviews aren’t considered to have much potential.
These equities will tumble down soon because they have been rated sell. Equities that are bound to go up are rated as a buy.
The 3 Secrets
A sell-side securities research analyst will tell you whether you should buy, sell or hold a particular stock. These sell-side securities research analysts are appointed by investment banking firms to advise customers.
These research analysts develop secret methods of recommending stocks. I have come across many people who blindly follow the advice experts give, but should they?
I know they are experts; therefore, their recommendations carry value, but should you trust them blindly?
Let’s see. In this article, I will briefly point out 3 secrets of sell-side securities research analysts. The analysts won’t even let you on these, so read and remember.
1. Sell-side doesn’t prioritize individual investors.
This is a shocking and bitter truth, but it is how it is. As individual investors, you expect equity researchers to treat you equally, at par with big-shot investors, but you aren’t.
Equity research isn’t carried out with the purpose of helping out individual investors. In fact, an individual investor is the last thing on the mind of an analyst while conducting research.
It’s true that individual investors benefit from these research reports, but they are not made keeping the individuals in mind.
Equity researchers draw up these reports for corporate or high-value investors.
2. The stock depends on the statements of the analyst.
Yes, even this is true, and it would strike you immediately if you applied logic and common sense.
When you buy or sell a stock, it is always on the research analyst’s recommendation, right? Therefore, when an analyst rates the stock as a ‘sell,’ those who follow his or her advice sell the stock almost instantly.
This obviously results in a fall in the prices of these stocks.
Hence, it would be safe to say that the plight of the stocks is largely dependent upon the sell-side research analyst.
Now, whether you should listen to the advice of the analysts or not brings us to the third secret, and it is doubly shocking!
3. Unqualified analysts
Ideally speaking, an analyst ought to have an MBA degree and a CFA certification.
Being a sell-side research analyst calls for high skill levels because a lot of money is involved here, and people want the best profit margin.
However, the bitter truth again is that only 3/4th of the sell-side analysts are qualified, while the others simply learn on the job.
Most of them aren’t even MBA or CFA certified. It’s acceptable to learn on the job, but sometimes, the firm hires less qualified and less skilled individuals to control company costs.
This, in turn, poses the firm customers at risk because the customers/investors rely on the analytical abilities of the sell-side researcher.
Therefore, given the fact that some firms engage in flawed recruitment drives, it is very easy to enter the job market. Still, the redeeming factor is that one needs to prove their skills and analytical abilities to make a successful career as a sell-side research analyst.
The demand for qualified sell-side research analysts is high due to scarcity in the market.
To become a top-class equity research analyst, you have to be yourself. Be more of yourself and start polishing your skills. Many people are working on it. And you as well?
Conclusion
If you want to make a career in investment banking, hedge funds, and pension funds, you should know the buy-side vs. sell-side and have awesome expertise in financial modeling.
I hope this article gave you a clear distinction between the buy-side and sell-side in the finance domain. If you have any questions, please feel free to write back.
All FinanceWalk readers will get a FREE $397 Bonus – FinanceWalk’s Prime Membership.
If you want to build a long-term career in Financial Modeling, Investment Banking, Equity Research, and Private Equity, I’m confident these are the only courses you’ll need. Because Brian (BIWS) has created world-class online financial modeling training programs that will be with you FOREVER.
If you purchase BIWS courses through FinanceWalk links, I’ll give you a FREE Bonus of FinanceWalk’s Prime Membership ($397 Value).
I see FinanceWalk’s Prime Membership as a pretty perfect complement to BIWS courses – BIWS helps you build financial modeling and investment banking skills and then I will help you build equity research and report writing skills.
To get the FREE $397 Bonus, please purchase ANY BIWS Course from the following link.
Breaking Into Wall Street Courses – Boost Your Financial Modeling and Investment Banking Career
To get your FREE Bonus, you must:
- Purchase the course through the FinanceWalk links.
- Send me an email along with your full name and best email address to [email protected] so I can send you the course login details.
Hi, I’m Avadhut, Founder of FinanceWalk. We help you make a rewarding career in any field based on your Inner GPS 🙂.
Contact us for Career Coaching. | https://www.financewalk.com/buy-side-vs-sell-side/ |
Inside this issue of Digest, the KICA board of directors asks you to participate in the association’s strategic planning. Complete the community survey for your voice to be heard. The July Digest also includes a look at Kiawah’s water management strategies, including a new forward-thinking way of looking at the island’s surface water.
Find out about fitness options at The Sandcastle, 4th of July events and more.
“As most of you know, 2019 has been a year devoted to a number of technology enhancements in our Security Department. We’re in the implementation phase of our most visible change, KICA’s new gate access system.”
— COO Jimmy Bailey
Read Jimmy Bailey’s letter to members and find out about all that’s happening around the island this June, including a look at the low speed vehicle study, Kiawah Cares About Education fundraiser, local farmers markets and more.
It’s hard to imagine a trip to the island without seeing wildlife — a blue heron, a yellow-bellied slider or an alligator. Maybe a bobcat, if you’re really lucky. Kiawah’s wildlife is part of what makes the island so special. In this issue of Digest, learn to be alligator aware during their mating season and learn to keep sea turtles safe during nesting season.
Take part in a Southern tradition by signing up for a shuttle trip to a Charleston church tea room. Sample ham biscuits, pimento cheese and don’t miss the Huguenot torte. Shuttle trips are May 1-3, with KICA COO Jimmy Bailey attending on Thursday, May 2.
April means arts on Kiawah! In this issue, read the results of the 2019 Directors’ Election and learn more about two of the artists showing at the upcoming Lowcountry Art and Artisan Showcase at The Sandcastle.
Other fun April events include the Kiawah Island Art and House Tour, the annual KICA plant sale and many holiday happenings.
The board of directors is considering a new conveyance policy. Read about the policy and visit the website to read the policy in full. Cast your vote today in the 2019 Directors Election — voting is underway through March 8.
Find all this plus a look at charitable events you can take part in, island happenings and more in this month’s Digest!
A first holiday on Kiawah takes a wintery turn for a member, leaving her with warm memories. Read one member’s account of 2018’s surprise snowfall in “A Winter Wonderland.”
This issue of Digest also includes a look at the recently-approved 2019 budget and upcoming events.
South Carolina’s next General Election will be held Tuesday, Nov. 6, 2018.
Go to www.SCVOTES.org for information on the ballot.
Polling Location
Kiawah residents (District 9) can vote in person from 7:00 a.m. – 7:00 p.m. at the Municipal Center (4475 Betsy Kerrison Parkway). Photo ID is required.
The Sandcastle Grand Opening Soirée on Friday, Oct. 12 is at capacity and Sandcastle parking is very limited. Please carpool with friends or consider riding a bike.
All Kiawah property owners are invited to KICA’s poolside party, celebrating the Grand Opening of the newly-renovated Sandcastle!
The Travis Allison Band will entertain the crowd with original songs as well as party favorites. Cru Catering will provide a delicious selection of heavy hors d’oeuvres.
This event is complimentary for all association members. Guests are welcome to attend at a cost of $25 per person.
RSVPs for the Grand Opening closed on Sept. 28. The event is at capacity.
KICA Amenities Presentation
Wednesday April 22, 3:30-5 p.m., Turtle Point Clubhouse, Legends Room (map)
Join KICA at the Turtle Point Clubhouse, Legends Room (map) on Weds, April 22, from 3:30 to 5 p.m. for a presentation on the upcoming amenity proposal where you can learn about plan details and view conceptual drawings. KICA is excited to share the plan with you in anticipation of the upcoming vote later this month. RSVPs are required to assure adequate seating, and space is limited.
Those unable to attend in person may join by webinar. RSVPs are also required so that we may provide connection instructions.
Please RSVP today to Carrie Newbern at [email protected], and indicate whether you will attend live, or by webinar. | http://kica.us/category/events/ |
- Organisation:
- AstraZeneca
- Closing Date
- 24 Jun 2021
- Salary
- TBC
- Address
- AstraZeneca, Charter Way, Macclesfield, SK10 2NA
- Duration
- Permanent
Duties and Responsibilities: Comprehensive characterisation of drug product formulations of large molecules and complex drugs such as, oligonucleotides, to elucidate their critical quality attributes. Playing a lead role in the identification, evaluation and implementation of cutting edge analytical capabilities in the field of mass spectrometry to build and improve product characterisation capability. Developing robust analytical methodologies and control strategies to support projects. Ensuring that work is performed in accordance with appropriate Safety, Health & Environment (SHE), quality and compliance standards, e.g. Good Manufacturing Practice (GMP), Good Laboratory Practice (GLP).
Skills & Capabilities: Degree (Masters or PhD) in Chemistry, in Analytical Sciences, or a related subject Experience of working with chromatographic methods, hyphenated to mass spectrometry with focus on ESI/MS/MS and CID for the analysis and characterisation of high molecular weight species, such as peptides, oligonucleotides, polymer conjugates etc. Ideally, this would include sample preparation, impurity identification and software tools for rapid data processing. The ability to tackle complex scientific problems and LC / MS troubleshooting. Excellent communication and stakeholder skills, and the ability to discuss complex ideas in a simple, easy to understand way to wide groups of stakeholders. | https://www.bmss.org.uk/jobs/job/senior-scientist-mass-spectrometry/ |
I get asked this question a lot so: Here’s the exact process I would follow if I just got hired to lead community for a new company…🧵
Note: The most common mistake new community pros make is skip right to tactics: launching forums, sending emails, hosting events… As a result they spend months building community, but spread themselves thin and struggle to prove their value. This process solves for that.
1️⃣ Set up meetings with every executive leader on the team Ask them: 1. How do you define community? 2. What are your team’s top 3 goals? 3. How do you think community can help you achieve those goals? 4. How would you like to be involved in the community?
2️⃣ Set up meetings with 20 current and/or potential members Speak to a diverse range of members with diff perspectives. Aim to understand: 1. What is their experience with the community today (pros and cons) 2. What is their hope for the community 3. How you can help them
3️⃣ Audit all of your community spaces and channels Figure out: 1. Where are members gathering today? 2. What channels are being used to communicate with members? 3. What tools and technology are we using to build community? 4. Who’s responsible for managing each channel?
4️⃣ Audit analytics and reporting systems Figure out: 1. What community data exists today? 2. Where does the data live? 3. How are we reporting on community health and business impact? 4. What tools are we using to organize, analyze, and report community data?
5️⃣ Create a v1 of community goals Your conversations with leadership + members and your audits will show you the current state and opportunities for improvement. Choose specific goals (we use OKRs) that define the future state everyone wants to reach.
6️⃣ Bring the SFD (shitty first draft) of your proposed goals back to executive leadership Go back to all of the leaders you originally spoke to. Ensure that everyone is aligned on the goals that the community team (you) will work toward. Get their thumbs up to move forward.
7️⃣ Create a v1 community strategy Only after you have clearly defined goals that align with leadership and member expectations should you put together a strategy. Your strategy should focus on three areas: 🅰 Business 🅱 Community 🅲 Tactics
🅲 The Tactical Level of your strategy will define the specific things you’ll do, day-to-day and week-to-week in order to make each program successful. These should be specific tasks like: – Send weekly welcome thread – Send weekly email – Onboard 50 members
🕐Your community strategy should be time-based. I recommend breaking goals down by: – Annual – Quarter – Month Note: Community programs will generally take 6-12 months to show measurable ROI.
8️⃣ Get feedback on your strategy Go back to leadership again and walk them through your plan. Ask them to poke holes, ask hard questions, and share their ideas for how you can improve it. Rinse and repeat until you get final sign off.
9️⃣Get to work 🏎💨 If you don’t already have a community, start small and be very hands-on with 10-20 members. You could start with the members you interviewed. If you have an existing community, focus on engaging leaders and top contributors first. Give 💯. Be consistent.
🔟 Report on your progress Create a report that you’ll send out every: – Month – Quarter – Year The report should focus on: 🅰 Business impact: revenue 🅱 Community health: engagement data + survey/interview results 🅲 Tactical learnings: what worked? what didn’t work?
🔁 Revisit your community strategy every quarter and set new Community and Tactical level goals. Try not to change it up too much within the quarter. At the least, your top-level Business goals should remain the same unless there’s big a big shift for the business.
And that’s it! You got this! 💪 Hope this helps anyone who’s just taking on community at a new company. If you have questions, hit reply or DM me. Here to help. You can also turn to the @CMX community any time you need feedback/support from other community pros. | https://nextbigwhat.com/starting-a-new-community-here-is-how-to-go-about-it/ |
Hospitals, alongside other health care facilities, are the backbone of medical care for our population. They are the places people go when things go wrong. But what happens when residents need help and there is no hospital nearby? Or, when there is a hospital, but the nearest specialty care is in the neighboring county?
This is the reality for many rural Texans, with 71 rural counties lacking hospitals. In addition, the Health Resources and Services Administration (HRSA) reports 11 counties have no health care facilities, and seven have limited options. (Some of these rely on home health agencies for local nursing and therapeutic care.)
The U.S. health care industry is a vast network of hospitals, general and specialized clinics, insurers, government organizations, private and/or religious care providers, interest groups and patients themselves. All are connected via a financial system driven by questions with a single focus: Who gets money, when and for what? Rural health care facilities face particular financial difficulties: They don’t have highly insured populations to charge for services, and they are more vulnerable to systemic economic pressures and policy changes (PDF).
Addressing these issues requires an innovative approach toward health care in rural areas, says Dr. Kristie Loescher, academic director of the Healthcare Innovation Initiative at the McCombs School of Business at the University of Texas at Austin (UT).
“Until the bigger problems in American health care are fixed, getting care to rural areas will have to be augmented by changes in technology, such as improving access to telehealth and replacing emergency rooms with better medical transport infrastructure,” she says.
Hospitals and clinics are broadly focused health care facilities and typically the most-used sources of primary care. Hospitals can offer inpatient and outpatient care and can house primary care providers as well as provide a large variety of other services. Clinics are smaller, offering only outpatient services, but they also provide a wide variety of services that a primary provider in a hospital might not. The Texas Organization of Rural & Community Hospitals defines a rural hospital as one that exists in a county of 60,000 people or less.
Typical categories of hospitals and clinics found in rural Texas are critical access hospitals, rural health clinics, federally qualified health centers and short-term/prospective payment system (PPS) hospitals, according to the Rural Health Information Hub supported by HRSA and the U.S. Department of Health and Human Services. The PPS is the primary method of Medicare reimbursement (Exhibit 1).
|TYPE||DESCRIPTION||# IN RURAL TEXAS|
|Critical Access Hospital||Provides 24/7 emergency care services; 25 or fewer acute inpatient beds||83|
|Rural Health Clinic||50+ percent staff time: Nurse practitioner, physician assistant or certified nurse midwife (as opposed to physician staff) during work hours||310|
|Federally Qualified Health Center||Medicare/Medicaid-qualified outpatient clinic||167|
|Short Term/PPS Hospital||Provides short stay inpatient services; enrolled in Medicare/Medicaid PPS||83|
Sources: Rural Health Information Hub, Texas State Guide (for categorization); HRSA (updated as of Sept. 1, 2022)
Much of the state’s land is rural (83 percent), and the population outside of metros (14 percent) is highly dispersed. North and West Texas, especially, have longer travel times between incidents and health care due to larger-sized counties and a low number of health care facilities. There are 1,750 rural health care facilities (of all types, including nursing, psychiatric and rehabilitative) in Texas to serve 3 million rural residents versus 6,475 metropolitan health care facilities for 26.5 million urban residents. While this averages out favorably for rural areas, it is the distribution, distance and variety of services that are the primary issues.
Rural hospitals and clinics in Texas do not have a blanket funding model. Generally, they pay for the cost of their services by billing patients and insurance providers. Rural providers have limited ability to recoup costs from patients and insurers due to underinsurance and low incomes. Most health facilities seek a myriad of funding opportunities.
A significant portion of rural health facility income comes from federal programs like Medicaid, Medicare and related supplemental assistance programs. Other costs can be covered by supplemental payments such as those created by Texas’ 1115 Medicaid waiver, which paved the way for payments for uncompensated care. This waiver must regularly be approved by the federal government.
The County Indigent Health Care Program, funded by county taxes and state assistance, serves as a last resort for those who don’t qualify for Medicaid but are financially eligible. Recipients must establish residency and prove an income at or below 21 percent of the federal poverty level. Counties pay up to $30,000 per resident per year for qualifying services.
Some communities vote to form hospital districts to levy property taxes and fund health services within a specified boundary, with limits on the amount by which property tax levies can grow each year without voter approval. Hospital districts also may levy a local sales tax to reduce or buy down property taxes. These taxes cover some health care facility costs, but no district is fully covered from them alone. Also, population declines in some rural areas can reduce tax income. Hospital districts also may receive income from other political subdivisions.
In addition, counties and hospital districts benefit from the state’s Tobacco Settlement Distribution Program, which provides a percentage of proceeds from the state’s tobacco settlement based on reported unreimbursed health care expenses.
Some rural health facilities keep their doors open through partnerships with larger hospitals (PDF). Urban-based hospital systems may buy rural health centers and direct patients to hubs for specialized care. General health care costs are balanced through revenue for specialized care in the hub.
Rural health systems face multiple challenges beyond funding sources. Overall, they have high operating costs, mostly due to the cost of mandatory “standby” services. An emergency room must be available even though rural areas may go days without needing one. Outside of hospital district property taxes and certain sources of supplemental funding, fees are charged when a service is provided.
Nonmandatory clinics provide services beyond general care, such as wound care, obstetrics and gynecology, but they also have upfront costs. If a health care facility can’t pay the overhead, then these services close. According to the Texas Health and Human Services Commission, as of January 2020, at least 20 rural hospitals had stopped inpatient care (PDF), and three were down to emergency services only.
Facilities also face personnel strains due to staff shortages; without primary care providers, rural hospitals and clinics are in greater danger of closing.
Another cost trend is an increase in outpatient versus inpatient care. Outpatient care allows for greater patient turnover, but Medicare and Medicaid historically have subsidized inpatient care more generously.
The Cecil G. Sheps Center for Health Services Research at the University of North Carolina tracked rural hospital closures from 2005 to 2022, and at 24, Texas logged more than any other state. It is comparable, however, to the national rate per capita (Exhibit 2).
|Year||Number of Closures||Effected Communities||Number of Beds|
|2005||2||De Leon||14|
|La Grange||24|
|2008||1||Jasper24|
|Total for 2008||24|
|2013||3||Bridgeport||36|
|Center||54|
|Terrell||106|
|2014||5||Clarksville||43|
|Gilmer||37|
|Linden||25|
|Mt Vernon||49|
|Whitney||49|
|20151||Commerce||24|
|2016||2||Dilley||18|
|Wharton||94|
|2017||3||Aransas Pass||63|
|Trinity||45|
|Weimar||38|
|2018||3||Cameron||6|
|Rockdale||25|
|Stamford||22|
|2019||3||Chillicothe||21|
|Grand Saline||1|
|Hamlin||25|
|2020||1||Bowie||37|
|Grand Total||24||880|
Source: The Cecil G. Sheps Center for Health Services Research (as of Aug. 11, 2022).
Closures are devastating for communities’ health. A 2019 study on hospital closures saw a rise in inpatient mortality rates of roughly 8.7 percent in rural areas (versus no impact in urban areas) due to an increase in transport time between incident and medical care and related effects.
Moreover, rural health care facilities, particularly hospitals, typically are the largest or second-largest employers in communities. A 2022 study on the economic effects of rural hospital closures found statistically significant downturns in both labor force size and overall population for rural counties when PPS-funded hospitals close.
There have been no Texas rural hospital closures since 2020, according to the Cecil G. Sheps Center (as of Aug. 11, 2022).
Congress passed legislation in 2020 and 2021 including aid to hospitals responding to COVID-19: the Families First Coronavirus Response Act (March 2020); the Coronavirus Aid, Relief, and Economic Security (CARES) Act (March 2020); and the American Rescue Plan Act (March 2021). These funding sources have been available for a limited time for specific expenses.
Albert Ruiz, rural health specialist at the State Office of Rural Health, explains that this funding came with its own set of challenges.
“Some areas received up to $200,000 in federal grant money for COVID response, testing and mitigation. But the requirements for some funding sources involve substantial management, sometimes surpassing the staff’s capacity, especially in rural health clinics,” he says. “They can hire another person to complete the reporting requirements, but that person’s salary will minimize the spending power of the stimuli.” Still, the programs helped rural health clinics by providing funding to combat COVID during the public health emergency.
While pre-planned Medicare payment cuts were paused due to the pandemic, those cuts resumed as of April 2022. The effect on rural health care facilities remains to be seen.
Loescher, at UT’s McCombs School of Business, says Australia, with large swaths of rural land like Texas, has implemented telehealth community clinics staffed by nurses or emergency medical technicians who complete intake tasks before the patient meets virtually with a doctor.
In addition, she cites a possible alternative to the infrastructure costs of establishing an emergency room or operating theaters in rural areas: “Having a medical helicopter on standby is perhaps a better use of funds than supporting a brick-and-mortar emergency department since it is cheaper to transport patients quickly to a fully staffed facility.”
The 2020 CARES Act included expansion of Medicare coverage for telehealth services so long as the public health emergency declaration remained in place. The latest extension at the time this article was written was through Oct. 13, 2022.
The Broadband Development Office (BDO), operated by the Texas Comptroller of Public Accounts, assists with funding and expanding broadband services for the state. Broadband connectivity refers to always-on, high-speed internet access that increasingly has become a requirement for modern life. The Federal Communications Commission’s (FCC) benchmark for high-speed internet is at least 25 megabits per second (Mbps) for downloads and 3 Mbps for uploads. According to the 2022 Texas Rural Hospital Survey, one-quarter of rural Texas hospitals subscribe to internet service with download speeds slower than 100 Mbps, which is more common in single-family households. And over one in 20 subscribe to speeds lower than the FCC definition of residential broadband. Of rural Texas hospitals, more than 21 percent say their internet service is not meeting their needs.
More than 38 percent of rural Texas hospitals have said that they are aware of state and federal grants that would help them pay for broadband costs, which suggests the remaining hospitals are unaware of such opportunities. Expanding and educating more rural Texas hospitals on broadband and the grants available could increase download speeds and help expand the use of telehealth visits. Telehealth visits cut the transportation costs associated with doctor and hospital visits while increasing service through online patient portals for sharing test results or virtual meetings with a care provider.
Efforts to expand broadband may allow rural hospital services to reach more Texans (see text box). But ultimately policymakers, health experts and rural health staff will play key roles in meeting ongoing challenges to continue providing health care in rural areas. These experts must strategize expansion of health access to areas that are lacking to maintain and sustain the health of rural Texans. FN
Nursing shortages are being seen across all types of health care facilities. Read about some of the efforts to increase the number of nurses in our April issue of Fiscal Notes. | https://comptroller.texas.gov/economy/fiscal-notes/2022/oct/hospitals.php |
The state contends that a letter from an anonymous informer, together with corroborating circumstances, was sufficient probable cause under Aguilar for issuance of a search warrant.
This case boils down to a factual dispute over whether it is more like Spinelli or Draper. Three Illinois courts decided that the corroboration in this case did not demonstrate that a tip in an anonymous letter provided probable cause. Although the tip ultimately proved correct, there was no reason to believe that the author of the letter would tell the truth, and the police investigation revealed no criminal activity. The Illinois S Ct might have reasonably found probable cause, based on the corroboration of several details in the letter. But its decision is not clearly in error, and this case is fact-bound. I recommend denial.
Recommended Citation
Preliminary Memorandum, Illinois v. Gates, 462 U.S. 213 (1983). Box 367, Harry A. Blackmun Papers, Manuscript Division, Library of Congress, Washington, D.C. | https://ir.library.illinoisstate.edu/illvGates/4/ |
Q:
Calculating top-left point from center point and mouse pointer location
I'm making a paint program for my collage project. What I want to do is this
S is a center point that is constant
A,B,C,D - one of this is one of mouse location.
Normally I click on point A then drag it to point C and a square will be created with start point A and width (C.X-A.X) and height (C.Y-A.Y). But I need it when I click on point S and drag it to Point C it should create a square with Point A as start point, width and height. All of those I need to calculate from Center point S and one point (c for example). This is the code that I have
Rectangle(
(int)Math.Min(center.X, mouse.X) - Math.Abs(mouse.X - center.X), (point A.X)
(int)Math.Min(center.Y, mouse.Y) - Math.Abs(mouse.Y - center.Y), (point A.Y)
(int)Math.Abs(endPoint.X - startPoint.X) * 2, (width)
(int)Math.Abs(endPoint.Y - startPoint.Y) * 2)); (height)
This works if I go from S to C, but when I go, for example, from point S to point A than point C of the square stays in place while point S and A(double the length from S to C) moves.
I hope You understand me. :D
Thank You in advance.
A:
I was able to figure it out.
Rectangle(
(int)Math.Min(center.X, mouse.X) - Math.Abs(mouse.X - Math.Min(center.X,mouse.X));, (point A.X)
(int)Math.Min(center.Y, mouse.Y) - Math.Abs(mouse.Y - Math.Min(center.Y,mouse.Y), (point A.Y)
(int)Math.Abs(endPoint.X - startPoint.X) * 2, (width)
(int)Math.Abs(endPoint.Y - startPoint.Y) * 2)); (height)
I think this is the best solution. If You have a better one feel free to post it. Thank You
| |
10 German Expressions to Learn Before Your Next Business Trip to Germany
German culture is known for its formality, punctuality, and politeness, especially in business situations. When planning a business trip to Germany, it is important to research certain habits and customs important in the German business world. This will help your business interactions go smoothly and successfully.
Germans are generally formal when meeting for the first time, and even more so in a business setting. You should always use the formal “Sie” for “You” instead of the informal “Du.” Even if you have met the person before, it is always better to err on the side of caution and use Sie.
Germans value punctuality above all else, so give yourself plenty of time to make a meeting or appointment. Arriving early is always preferred and it is even better if you can arrive 10 minutes early. Avoid cancelling or changing meetings at the last minute- this could ruin a relationship!
Business attire is formal, neat, and conservative. It is always recommended to wear a suit or nice dress, even if it is a casual business meeting
Make sure to shake hands when greeting someone. No cheek kisses or bowing allowed!
You are not expected to bring a gift nor compliment the person with whom you are to meet. There is usually a strong distinction between work and pleasure, and Germans do not like to mix them.
Here are 10 German expressions to learn before your next business trip to Germany:
1. Lovely to meet you – Es freut mich, Sie kennenzulernen
2. Thank you for listening – Vielen Dank fϋr Ihre Aufmerksamkeit
3. I have a question. – Ich habe eine Frage
4. In my opinion … – Meiner Meinung nach …
5. May I interrupt? – Darf ich kurz unterbrechen?
6. Could you give us an example please? – Können Sie uns bitte ein Beispiel geben?
7. Does anybody have a question regarding this matter? – Hat jemand eine Frage dazu?
8. During this meeting we will discuss the following topics – Während des Meetings werden wir ϋber die folgenden Themen sprechen
9. Can I please introduce you to … – Darf ich Ihnen … vorstellen
10. When is the deadline? – Wann ist der Termin?
In order to conduct a full meeting in German, you should look into taking a German course before your travels. First, take our German level test to assess your current level before beginning one of our specialized German language course. With these tips and useful phrases, you will be able to ace your business trip to Germany! | https://www.languagetrainers.com.au/blog/2016/02/10-german-expressions-to-learn-before-your-next-business-trip-to-germany/ |
The invention belongs to the field of chemical synthesis, and particularly relates to a synthesis method of n-bromobutane. The invention provides a synthesis method of n-bromobutane, which comprises the following steps: carrying out first mixing on a first hydrobromic acid aqueous solution and 1-butyl-3-methylimidazolium bromide to obtain a mixed solution; and performing secondary mixing on the mixed solution, n-butyl alcohol and a second hydrobromic acid aqueous solution, and performing substitution reaction to obtain n-bromobutane. According to the invention, 1-butyl-3-methylimidazolium bromide is added into synthesis raw materials (hydrobromic acid aqueous solution and n-butyl alcohol) of n-bromobutane, and the 1-butyl-3-methylimidazolium bromide is used as an intermediate medium, so that the hydrobromic acid aqueous solution and the n-butyl alcohol can be mixed more uniformly, the reaction rate and the selectivity of n-bromobutane are improved, and the yield of n-bromobutane is increased. And the purity of n-bromobutane is further improved. | |
Q:
IT evaluating quality of coding - how do we know what's good?
Coming from an IT background, I've been involved with software projects but I'm not a programmer. One of my biggest challenges is that having a lot of experience in IT, people often turn to me to manage projects that include software development. The projects are usually outsourced and there isnt a budget for a full time architect or PM, which leaves me in a position to evaluate the work being performed.
Where I've managed to get through this in the past, I'm (with good reason) uneasy about accepting these responsibilities.
My question is, from a perspective of being technically experienced but not in programming, how can I evaluate whether coding is written well besides just determining if it works or not? Are there methodologies, tips, tricks of the trade, flags, signs, anything that would say - hey this is junk or hey this is pretty damn good?
A:
Great question. Should get some good responses.
Code cleanliness (indented well, file organization, folder structure)
Well commented (not just inline comments, but variables that say what they are, functions that say what they do, etc.)
Small understandable functions/methods (no crazy 300 line methods that do all sorts of things with nested if logic all over the place)
Follows SOLID principles
Is the amount of unit test code similar in size and quality as the code base of the project
Is the interface code separate from the business logic code which in turn should be separate from the infrastructure access code (email, database, web services, file system, etc.)
What does a performance analysis tool think of the code (NDepend, NDoc, NCover, etc.)
There is a lot more to this...but this gets your started.
A:
Code has 2 primary audiences:
The people who use it
The people who develop it
So you neeed 2 simple tests:
Run the code. Can you get it to do the job it is supposed to do?
Read the code. Can you understand the general intentions of the developer?
If you can answer yes to both of these, it is great code.
When reading the code, don't worry that you are not a programmer. If code is well written / documented, even a non-programmer should be able to see guess much of what it is intended to achieve.
BTW: Great question! I wish more non-programmers cared about code quality.
A:
First, set ground rules (that all programmers sign up to) that say what's 'good' and what isn't. Automate tests for those that you can measure (e.g. functions less than a number of lines, McCabe complexity, idioms that your coders find confusing). Then accept that 'good coding' is something you know when you see rather than something you can actually pin down with a set of rules, and allow people to deviate from the standard provided they get agreement from someone with more experience. Similarly, such standards have to be living documents, adapted in the face of feedback.
Code reviews also work well, since not all such 'good style' rules can be automatically determined. Experienced programmers can say what they don't like about inexperienced programmers' code - and you have to get the original authors to change it so that they learn from their mistakes - and inexperienced programmers can say what they find hard to understand about other people's code - and, by being forced to read other people's code, they'll also learn new tricks. Again, this will give you feedback on your standard.
On some of your specific points, complexity and function size work well, as does code coverage during repeatable (unit) testing, but that last point comes with a caveat: unless you're working on something where high quality standards are a necessity (embedded code, as an example, or safety-critical code) 100% code coverage means you're testing the 10% of code paths that are worthwhile to test and the 90% that almost never get coded wrong in the first place. Worthwhile tests are the ones that find bugs and improve maintainability.
| |
A big congratulations to Capt David Williams, USNA '14, who is the the 2021 recipient of USNA’s Apgar Award for Excellence in Teaching!
An exceptional teacher, mentor and coach that is involved in all aspects of life on the Yard, Capt David Williams has positively and significantly influenced hundreds of midshipmen in a wide range of courses in the political science, leadership, and professional development departments, as well as in varsity athletics. Recognized by his students for a keen understanding of the unique Naval Academy environment and mission, he inspires his students to meet high standards while developing the critical thinking skills so important to future leaders in the naval service. As FP130 Course Coordinator, Capt Williams expertly guided the planning and execution of the core course in U.S. Government and Constitutional Development required of all midshipmen in the Brigade. Through personal example of character, integrity, professionalism, and impeccable military bearing, Captain Williams’ dedication to the education of midshipmen and his active participation in many aspects of their professional development reflect great credit on himself and the United States Naval Academy.
This award, established in 1996, is intended to recognize and encourage relatively junior individual faculty members at the Naval Academy who have had a demonstrable impact on their students and/or who have made a significant contribution to the art of teaching and counseling students. The award is presented to a junior military faculty member in odd years and to a junior civilian faculty member in even years. | https://www.usna.edu/NewsCenter/2021/04/Captain_David_Williams_receives_the_2021_Apgar_Award_for_Excellence_in_Teaching.php |
A comprehensive introduction to multiple-view geometry, with a coherent spectrum of algorithms that systematically extract 3D information (motion, structure, and camera calibration) from 2D perspective images. The technical core of the course provides a simple characterization of all constraints among multiple images that can be utilized for 3D reconstruction in a simple matrix rank framework. The course covers essentially all the technical steps and details necessary for the entire reconstruction process: image formation, feature extraction, feature tracking and matching, two-view reconstruction, camera calibration and auto-calibration, multiple-view reconstruction, and incorporation of various types of scene knowledge. It provides a step-by-step recipe for 3D reconstruction from image sequences and demonstrates a real-time 3D motion and structure estimation system, together with its application to real-time virtual insertion in live video. The course also incorporates the most recent developments on reconstruction of dynamic scenes containing multiple moving objects.
Applications of this technology range from special effects (scene or camera
motion capture, virtual insertion, image-based modeling and rendering) to
computer graphics, photogrammetry, surveillance, autonomous robotics, medical imaging, and virtual reality.
Prerequisites
Basic knowledge of image formation and modeling, 2D and 3D geometry,
rigid-body transformations, and linear algebra, as obtainable from experience with image-based rendering or an introductory-level computer vision or graphics course. Unlike traditional treatment of this subject, this course does not require knowledge of tensorial algebra or projective geometry.
Intended Audience
Academicians, graduate students, industrial researchers or developers who are
interested in state-of-the-art vision theory and techniques for
applications such as 3D modeling, motion capture, visualization, virtual
insertion and reality, and video indexing and editing. | http://www.siggraph.org/s2004/conference/courses/8.php?pageID=conference |
We are a group of ICT professionals and artists using connection between modern technologies and artistic elements to create unique interactive installations.
Our work covers a wide range of application, e.g. video mapping shows, large scale projections, light and stage design, audio solutions design, but also Virtual Reality applications or interactive gadgets.
Our customers come from various fields from commercial sphere through NGOs and theaters to medical institutions or museums. From small one-time installations to large scale performances we always bring an original design fitting our customers' wants. | http://3dsense.cz/ |
High School Graduates Are Saying No to College. Here’s Why.
A recent study found that less than a quarter of students consider getting a college degree as a top priority over the next few years. College affordability is a big factor.
Published October 7, 2022
- Fifty-five percent of high school graduates either have no plans to attend college or are uncertain that they will ever attend.
- Graduates are significantly more likely to consider mental health and financial stability a top priority over a college degree.
- Affordability concerns continue to be the primary driver for graduates deciding not to attend or return to college.
The majority of high school graduates are either uncertain about their plans or don't have any plans to further their education, according to a new study for the Bill & Melinda Gates Foundation.
That leaves just 46% of high school graduates who say they definitely plan on going to college or finishing their degree, the study reveals.
The study, conducted by Edge Research and HCM Strategists for the Bill & Melinda Gates Foundation, surveyed 1,675 high school graduates ages 18-30 who have decided not to go to college or dropped out of their two-year or four-year programs.
Researchers found that even among students who are definitely planning to go to college, those who have already started their higher education journey are most likely to say they have definite plans to go back.
Overall, few former students consider getting a college degree a top priority over the next few years (24%).
Instead, the majority of graduates consider positive mental health (62%) and financial stability (56%) as top goals for the near future.
Whether they have set plans for college or not, graduates are most likely to feel hopeful (35%) and uncertain (31%) about the future. And that uncertainty is one of the top reasons graduates consider forgoing college altogether.
Though affordability continues to be a top driver of graduates' not wanting to attend college (38%), graduates also point to stress (27%), the need to make money (26%), and feeling unsure about what type of career they want (25%) as primary reasons for not enrolling or returning to school.
Additional reasons graduates cited for not wanting to attend or return to college included not feeling prepared for the college experience or living alone (13%), not feeling academically prepared (13%), not feeling like they did or would fit in (13%), and not feeling like they were or would be supported while in school (11%).
This data falls in line with other recent studies on high school graduates as young adults have increasingly expressed dwindling views of higher education.
A recent report from ECMC Group revealed that less than half of current high school students (48%) plan to pursue a four-year degree. An even smaller percentage of these students (45%) believe a postsecondary education is necessary at all.
Yet another report found that Gen Z students are also the least likely of any generation to say theytrust U.S. colleges and universities.
According to the Edge Research/HCM Strategists report, the main factors that graduates would find helpful if they choose to attend college would be addressing the financial and affordability concerns they face.
If schools want to attract and retain more graduates in the next few years, they will need to give would-be students a variety of affordable options and financial assistance as well as the flexibility to create an educational journey that best suits their lifestyle. | https://www.bestcolleges.com/news/analysis/why-high-school-grads-are-saying-no-to-college/ |
the market value of the property is Rs. 12 lakh and during such proceedings:
(i) A sold his property to B for Rs. 12 lakh.
(ii) A gifted is property to his friend B.
(iii) A created a charge on such property to repay loan of B.
(iv) A sold property to B for Rs. 6 lakh.
Proper officer alleges that
such transactions are void as the same were undertaken during the proceedings
and no order was passed. B however contend that he was not aware of such
proceedings and shall not bear such loss. Discuss.
ANSWER
As per section 81 of the act,
(i) Since property was transferred with adequate considerations of Rs.12 lakh which was enough to discharge tax dues. Out of Rs.12 lakhs, Rs10 lakhs can be recovered by proper officer (along with interest and penalty) and balance shall be given to A. therefore not void.
(ii) No adequate considerations -Gifted to defraud government revenue, therefore void.
(iii) No adequate considerations + created charge to defraud government revenue + No prior permission from proper officer therefore void.
(iv) Property is sold for Rs.6 lakh however market value is Rs.12 lakh therefore no adequate considerations + intention was to defraud government revenue therefore void. | http://www.lawcrux.com/data5t/gt/gtexmp/example_175.htm |
The success of day trading will be purely a function of one's ability to manage risk. Whether planning to use a discretionary strategy or one that is purely systematic, the key to your success will be a business plan that will make money. The most efficient way to start the process is to determine how much money one is willing to risk.
Systematic approach to Trading
A systematic approach to trading means is to avoid overriding a trading alert. Using this approach removes some of the human element which can interfere with the strategy’s success. The risk management of a systematic approach can be back tested to determine if the approach worked in the past. | https://finfxpro.com/web-development/ |
Senate Bill 899, passed in 2004 by Governor Schwarzenegger, significantly impacted the rights of injured workers in California. Now, more than ever you need a specialist in the field of Workers' Compensation to help you navigate through the system.
Your rights include Temporary Total Disability (TTD), Medical Treatment, Permanent Disability (PD) and access to a voucher if you have lost your job. We can help you obtain the maximum benefits to which you are entitled under the law.
STATE OF CALIFORNIA RESOURCES LINKSCalifornia Department of Industrial Relations / Dept. of Workers' Compensation
The California DWC monitors the administration of workers' compensation claims, and provides administrative and judicial services to assist in resolving disputes that arise in connection with claims for workers' compensation benefits.
California Dept. of Industrial Relations
The Dept. of Industrial Relations established to improve working conditions for California's wage earners, and to advance opportunities for profitable employment in California.
California Department of Industrial Relations / Workers' Comp. Appeals Board
A seven-member judicial body, appointed by the governor and confirmed by the Senate, that reviews petitions for reconsideration of decisions by DWC administrative law judges and regulates the adjudication process by adopting rules of practice and procedure.
Commission on Health and Safety and Workers' Compensation
A joint labor-management body created by the workers' compensation reform legislation of 1993 and charged with overseeing the health and safety and workers' compensation systems in California and recommending administrative or legislative modifications to improve their operation.
WORKERS' RIGHTS ORGANIZATIONS
Voters Injured at Work
Voters Injured at Work is a non-profit political organization of injured workers and their families established for the purpose of protecting and enforcing California's constitutional guarantee of a fair and adequate system of compensating workers and their dependents for injury or disability from a work injury.
INSURANCE RESOURCES
Department of Insurance
Licenses and regulates workers' compensation insurance carriers and investigates allegations of workers' compensation insurance fraud.
Self Insurance Plans
The office of SIP determines the ability of employers to self-insure their workers' compensation liabilities and pay any employee compensation that may become due. SIP also tests and certifies individual claims administrators and licenses third-part administrators who handle the claims of self-insured employers.
MEDICAL RESOURCES
Traumatic Brain Injury Resource Guide
The TBI Resource Guide is the internet's central source of information, services and products relating to traumatic brain injury, brain injury recovery and post-acute rehabilitation.
WARNING: It is unlawful to file a false or fraudulent Workers' Compensation claim or to make a false or fraudulent written or oral statement in support of or in opposition to a Workers' Compensation claim, or to aid or conspire with anyone to commit such a fraud. If convicted, the penalty is up to 5 years in prison or a fine of up to $150,000 or double the value of the fraud, whichever is greater, or both imprisonment and fine. Restitution and other penalties may also apply. | https://www.baziakandsteevens.com/workers-compensation |
Javid’s hard line leaves 3 million Brits with second-tier citizenship
This week, Home Secretary Sajid Javid trumpeted his willingness to ‘protect’ Britain by stripping UK nationals of their citizenship based on ‘citizenship by descent’ rules – even if the individual in question has never been to said country nor applied for a passport.
This decision splits UK-born citizens into two categories – those whose citizenship is protected, and those for whom it can be removed by the state. The test is only that depriving them of citizenship would be “conducive to the public good”. The government says it can use it for those involved in ‘serious crime’ – and just a few weeks ago, the Home Secretary described as ‘serious criminals’ to Parliament a group of immigrants, some of whom had been convicted only of drug offences.
New analysis by Global Future reveals as many as 3 million British citizens, born in the UK, now effectively have second-tier citizenship – not including a further 7 million of Irish or Jewish descent.
Detail
Up to 3 million Brits’ citizenship is undermined by the Javid approach
We focus on major immigrant communities in the UK: British Asians and black British citizens from Africa and the Caribbean – though others will be affected.
Most of these countries have generous citizenship by descent rules. The following table is based on a short survey of nationality law in major countries of origin for historic immigration.
|Country||Conditions to acquire citizenship by descent||Conditions to pass citizenship by descent to third generation|
|India||Born before 2004: either parent an Indian citizen|
Born after 2004: either parent Indian & birth registered with diplomatic mission
|No additional conditions|
|Pakistan||Either parent a Pakistani citizen||Register with diplomatic mission|
|Bangladesh||Born before 2009: Father a Bangladesh citizen|
Born after 2009: Either parent a Bangladesh citizen
|Register with diplomatic mission|
|Jamaica||Either parent a Jamaican citizen||No additional conditions|
|Nigeria||Either parent a Nigerian citizen||No additional conditions|
Sources: India, Pakistan, Bangladesh, Jamaica, Nigeria
Figures from the 2011 Census show how many residents of England and Wales belong to different ethnic groups. Ethnicity is self-identified by census respondents so it is hard to draw firm conclusions about dual citizenship on this basis. However, given the liberal nature of these rules for citizenship by descent, it’s likely that those identifying with Black or Asian heritage would qualify, as would many of mixed background.
The table below shows how many UK-born people identify with the selected ethnic groups in England & Wales. Up to 3 million potentially held dual citizenship since birth, whether or not they are aware of this.
|Ethnic group||Number of UK-born|
|Asian/Asian British: Indian||606,298|
|Asian/Asian British: Pakistani||631,171|
|Asian/Asian British: Bangladeshi||232,089|
|Black/African/Caribbean/Black British: African||323,276|
|Black/African/Caribbean/Black British: Caribbean||357,690|
|Mixed: White and Black Caribbean||401,110|
|Mixed: White and Black African||113,146|
|Mixed: White and Asian||270,633|
|Total||2,935,413|
We have not surveyed citizenship law for all the nationalities included in the Black African and Black Caribbean groups. Nigerian and Jamaican backgrounds are, respectively, comfortably the most common national backgrounds in these groups.
And up to 7 million more could be affected
Since the 2014 Immigration Act, the Home Secretary has possessed a further power to strip people of British citizenship even if they do not hold a second nationality, as long as they could qualify to acquire one. This does not appear to be the power the government is exercising in the Shamima Begum case; as of April 2016, it had never been used.
If this wider-reaching power came into greater use, as other revocation powers have in the last few years, the number of people affected could potentially be far larger. At the 2011 Census, there were 213,573 UK-born Jews in England & Wales. Almost all of these people could acquire Israeli citizenship under the country’s Law of Return. Under the Good Friday Agreement, anyone born in Northern Ireland can access citizenship of the Republic of Ireland; in total, the BBC has estimated that 6.7 million people in the UK could qualify for an Irish passport thanks to the country’s unusually generous rules for citizenship by descent. All of these people could come within the scope of the Home Secretary’s broader citizenship revocation power, though its legal limits have not yet been tested in court. | https://ourglobalfuture.com/2019/02/javids-hard-line-leaves-3-million-brits-with-second-tier-citizenship/ |
Today we celebrate the ninth of the 12 Festivals of the new world Religion, the Full Moon of Virgo, the festival aimed at asserting the Will to nourish and manifest the Christ and at grasping and understanding, through the consciousness of the Disciple-Humanity, the Mystery of Form, since Form is the crystal of Creation, the instrument through which divine manifestation is accomplished. (1)
On such a Date the Idea of Form resonates powerfully, that significant support that sustains the Manifestation of the Spirit and indicates the imprint of Being.
The symbology of Virgo, the Mother, “concerns the whole goal of the evolutionary process which is to shield, nurture and finally reveal the hidden spiritual reality. This every form veils…”, “the mother protects the germ of the Christ life; matter guards, cherishes and nurtures the hidden soul. The keynote which embodies the truth as to the mission of Virgo most accurately is ‘Christ in you, the hope of glory’.” (2)
“Virgo is, therefore, the cosmic mother because she cosmically represents the negative pole to positive spirit; she is the receptive agent where the Father aspect is concerned. (…) It is in this system that the Christ Child, the expression of the divine consciousness and the result of the relationship of Father-spirit and Mother-Matter, must he brought to the birth.” (3) Virgo is therefore the invisible Light of God that permeates and nourishes the nascent Christ principle.
“Blessed is the mother who draws open the curtain to let in the light, and who offers the first blossom. In quiet, in beauty, and with a smile, Await those new ones seeking entry into the world.” (4)
The Moon (veiling Vulcan) teaches us the use of the will and how to redeem substance through the forging in fire; the Moon, the esoteric ruler of the Sign (for disciples and initiates), combines the energy of the Fourth Ray, which it conveys, with that of the First Ray, which is externalized through Vulcan, and which symbolizes the divine will to use the form to manifest itself.
According to the Teaching, in fact, the form is “the model according to which nature does its external work” and therefore “Life precedes the form and the divine ideation passes from the abstract to the concrete”; “Spirit evolves from form and through form“: for this reason the Spirit, that animates everything, needs to gain full self-awareness through the evolutionary cycle in order to be free from the prison and limitation of form, thus acquiring the light of the “crystal” of experience.
Today, therefore, on the day of the Full Moon, ideally united with all those who in every time and in every place work for the Common Good, let us invoke and evoke as one planetary server the:
Will to nourish and manifest the Christ
Christ “demonstrated in Himself the full expression of divinity, and then enjoined upon His disciples that they should go and do likewise. (…) The cell in the womb, the stage of littleness, the development of the child into the man—to all this He submitted Himself, and underwent all the processes which are the destiny of every son of God.” (5)
“The conscious evocation of the Christ Life in the human heart and our rapid integration into the kingdom of God are the immediate tasks ahead, embodying our responsibility, opportunity and destiny”“. (6)
Urged by the energy of the Full Moon, with the image of Christ imprinted in the heart and the gaze turned towards the Heavens, human consciousnesses must make that transfiguring journey (which also pertains to every other form) which will lead, in the near future , to the initiation of Resurrection, in which the life aspect of divinity makes its presence felt; Resurrection is in fact that eternal identification with God which is the imperishable experience of all those who have reached perfection.
“Christ revealed the quality of the divine nature through the medium of matter, of form” and was transfigured in front of some of his disciples. “The Greek word here used [for transfiguration] is ‘metamorphosed’, the very word used by St. Paul to describe the transmutation of the mortal body into the resurrection body; for on the day of fulfilment, when the perfected disciple has attained masterhood, the ‘Robe of Glory’ shines forth with such splendour through the garment of the flesh that all the beholders perceive it, and, their eyes and ears attuned to finer subtle vibration , they behold their Master in all His divine humanity.” (7)
The Will to nourish and manifest the Christ, which is expressed in Virgo through the esoteric ruler, the Moon, expands in the consciousness of the Disciple-Humanity
The Mystery of Form
*
Form is the crystal of Creation
“All is first built in the Fiery World, then lowered into the subtle body. Hence, whatever is created upon Earth is only a shadow of the Fiery World. One should firmly keep in mind this order of creation. People must know that a great deal of that is created in the Fiery World has not been as yet lowered into earthly delineations. Therefore the ignorant judge according to earthly evidence, but the wise smile, knowing the reality.” (8)
“Thus is the call of the Mother heard! Not by magic but by the spirit will you succeed. Could magic possibly establish the Stone? Could a people establish itself on the basis of magic? But when each person understands that the path of the spirit is simple, that it brings the call of the Mother of the World, then he will find the Gates open.” (9)
This Full Moon thus manifests the redeemed part, transfigured by sunlight, of the Substance; Substance is in fact that part of Space (Mother) which pertains to each one and which waits for nothing other than to reveal itself in its Light as the basis of human Brotherhood.
“… the Origins should be the affirmed guiding principles. Let us accept the principle of Be-ness as the affirmation of the Highest Reason, and the Cosmic Magnet will unfold as the manifested might of the Mother of the World. This concept can bring a true understanding of the existence of Our Brotherhood, a true understanding of the far-off worlds, and a true understanding of those principles which ordain man as a creator.” (10)
“The Mother of the World has a veiled face. | https://planetafans.com/full-moon-of-virgo-the-mystery-of-form-tps-english/ |
God's Relationship with Humans in Genesis
Some of the views of God offered in Genesis are that of God having total power and authority, and God as focused on orderliness in the world. For instance, throughout Genesis 1, God is presented as being king or supreme ruler of all. God delivers his decrees to the universe and the universe obeys the commands of God implying he is sovereign (Gen 1:1-25). God’s sovereignty is also alluded to in the creation of humankind by decreeing to his heavenly court, “Let us make humankind in our image” (Gen 1:26). Similarly, the Lord makes note of his heavenly court when speculating that the man might take from the tree of life and when expressing his fear that nothing humanity does will be impossible for them (Gen 3:22; Gen 11:7). God is additionally viewed as having a strong interest in order, for out of “a formless void” he creates the heavens and the earth (Gen 1:1-3). Order is further emphasized by the conformity between days one to three and days four to six (Gen 1.1-1.14 Annotation 14-19). Even when God confuses the language and scatters humanity abroad, it can be seen as God wanting to keep order on the earth by keeping the divine-human boundary (Gen 11:7-8).
God’s relationship with humans may be viewed in a few different ways. In God’s correlation with man, God is the one who “breathed into his nostrils the breath of life” making the man a living being “from the dust of the ground” (Gen 2:7). This exemplifies one view of the relationship between God and humanity in that connections are now established between God and humanity and humanity and the earth (Gen 2:7). God then shows his concern for the man by stating “It is not good that the man should be alone; I will make him a helper as his partner” (Gen 2:18). When God creates woman he establishes another connection, now one between man and woman (Gen 2:22). However, these connections soon begin to diminish when the woman and man hide themselves from God after eating from the tree of the knowledge of...
| |
Q:
Intuition for when modules are flat
I am having trouble building my intuition for when a module $M$ over a commutative ring $R$ is flat. Are there any standard examples of modules that are flat over $R$? Are there any standard examples of modules that aren't? Is there a general method that I can use to quickly determine whether a module should morally be flat or not?
The standard answer I hear when I ask this question is that there is a somewhat geometric criterion: for a flat module $M$, the dimension of the fibers of $M$ vary continuously over primes $p$ of $R$. I.e. the dimension of $M_p/pM_p$ over $A_p/pA_p$ should vary continuously with our choice of $p$.
Maybe I do not have enough intuition for fibers yet, but I do not find this to be very helpful. Even in basic cases, I am unsure of how to use this. For example, if I have an integral extension of a ring $R$, say $A=k[x,y]/(y^2-x^3) \subset B = k[x,y,x/y]/(y^2-x^3)$, is $B$ flat over $A$?
Another case of interest I have is when $A \subset B$ is an integral extension of rings. Is there a good way to tell if $B$ is flat over $A$?
A:
There are a lot of nice theorems about flat modules over general rings. For example, over a domain, any flat module is torsion-free, and the converse holds over a principal ideal domain. (Note that the notion of being torsion-free does not make sense over rings that are not domains). Qiaochu mentioned some other nice theorems. Often, there is a bit of interplay between the algebra and the geometry, and it depends on your situation which approach you want to use.
But the fibre dimension criterion is not as useless as you think! For example, consider the example that you give of $k[t^2,t^3] \subseteq k[t]$ (I assume this is the example you mean; for this you have adjoin $\frac{y}{x}$, not $\frac{x}{y}$, because $x$ corresponds to $t^2$ and $y$ to $t^3$). Then you probably know that this gives an isomorphism away from the origin, i.e. when we invert $t$ it becomes an isomorphism. Thus, over all primes not equal to $(t^2,t^3)$, the fibre dimension is $1$.
However, at the prime $(t^2,t^3)$, we can just compute:
$$\dim_k k[t]/(t^2,t^3) = 2,$$
with basis given by $1, t$ (note that for a maximal ideal $\mathfrak m$, we do need to localise, because $A/\mathfrak m$ is already a field). Thus, this extension of rings is not flat.
But I wouldn't say that there is a general method for testing whether an extension of rings is flat. In geometric situations (i.e. where both rings are finite type algebras over a field), often the best way to decide such questions is by looking at the geometry. One of the nicest theorems I know is the following (see Hartshorne, Thm III.9.9):
Theorem. Let $T$ be an integral Noetherian scheme. Let $X \subseteq \mathbb P^n_T$ be a closed subscheme. For each point $t \in T$, we consider the Hilbert polynomial $P_t \in \mathbb Q[z]$ of the fibre $X_t$, considered as a closed subscheme of $\mathbb P^n_{\kappa(t)}$. Then $X$ is flat over $T$ if and only if the Hilbert polynomial $P_t$ is independent of $t$.
What this says is that not only the dimension of a finitely generated module is constant in the fibres, but more generally if we have a projective morphism (a finite ring morphism is a special case of this), then the entire Hilbert polynomial is constant if and only if the morphism is flat.
You don't necessarily have to know precisely what this means to appreciate it: the Hilbert polynomial captures numerical invariants like the (Krull) dimension and the degree (for a finite morphism, this is the (linear) dimension of the module fibre), so for a flat family the fibre dimensions cannot jump. Often when you want to prove something is not flat, you have some geometric reason for it.
As an example of this, consider the ring homomorphism
\begin{align*}
\phi \colon k[x,z] &\to k[x,y]\\
x &\mapsto x,\\
z &\mapsto xy.
\end{align*}
Maximal ideals of $k[x,z]$ are of the form $\mathfrak m = (x-a, z-b)$, and for $a \neq 0$, $x$ becomes invertible in $B/\mathfrak mB$, so
$$B/\mathfrak mB = k[x,y]/(x-a,xy-b) = k[x,y]/(x-a,y-\tfrac{b}{a}) = k,$$
so the fibre is just a point (Spec of a field). On the other hand, when $a = 0$ and $b = 0$, we get
$$B/\mathfrak mB = k[x,y]/(x,xy) = k[x,y]/(x) = k[y],$$
so the fibre is one-dimensional. Geometrically, this is saying that the map
\begin{align*}
k^2 &\to k^2\\
(x,y) &\mapsto (x,xy)
\end{align*}
collapses the $y$-axis onto the origin, whereas everywhere else it is an isomorphism.
Thus, we conclude that $\phi$ is not flat, since some of its fibres have (Krull) dimension $1$, whereas most of them have dimension $0$.
A:
A standard class of examples is that every localization $S^{-1} R$ is flat. More generally, Lazard's criterion says that the flat modules are precisely the filtered colimits of free modules.
Flatness is a local condition, so in some sense it suffices to answer the question of when a module over a local ring is flat. A finitely generated flat module over a local ring is free, so for finitely generated modules (which includes the case of finite ring extensions) flatness is equivalent to being locally free.
| |
Results-focused manager offering 8 years of experience leading talented teams and training programs. Successful at engaging with staff by discussing training and team performance, maintaining accountability and acknowledging excellent performance. Driven to maintain service standards by supporting staff in handling service issues and customer communications.
| || |
Resumes, and other information uploaded or provided by the user, are considered User Content governed by our Terms & Conditions. As such, it is not owned by us, and it is the user who retains ownership over such content.
Many factors go into creating a strong resume. Here are a few tweaks that could improve the score of this resume: | https://www.livecareer.com/resume-search/r/front-end-coach-corporate-trainer-02813101162c49219255d30260a47512 |
I’m looking for volunteers to read and review The Magic Mines of Asharim, due out Sep 25th. It features a young woman running away from her past mistakes, two very different men, and a dangerous and ambitious plan. With plenty of magic, as always!
One beta reader said: “LOVED IT. The plot was excellent, and I was hooked from the middle of chapter 1 all the way through. ”
It’s 410 pages long. If you’re interested, email me with your preferred format: mobi, epub or pdf.
Here’s the blurb:
A fallen empire. A woman with dark secrets. A strange magical weapon.
The glorious Akk’asharan Empire was torn apart by treachery two hundred years ago, its water supply cut off. Now its people are enslaved and humiliated, but they have never forgotten the past, and dream of one day restoring their former greatness.
Allandra’s dreams are more immediate: how to control the powerful magical abilities that are ruining her life. After a disastrous outbreak of power, she’s desperate to escape from justice and find a place to grieve and recover. Perhaps the hidden mines of Asharim can provide a safe haven.
The mines can provide much more than that: not only a way to control her dangerous magic, but a magical weapon that might even restore the fallen empire to its rightful place. But with enemies on her trail, and powerful factions who will do anything to stop her, she will only get one chance. If she fails, the empire’s last hope will be lost forever.
From the magic mines of Asharim, no one emerges unchanged. | https://paulinemross.co.uk/index.php/2015/09/the-magic-mines-of-asharim-arcs-available/ |
Thanks to advances in medicine, people are living longer than ever before. While longevity is considered a blessing for many older adults, it can also render those frail or weak prone to injury. However, patients and caregivers can be proactive by collaborating with physicians on a care plan to prevent falls.
According to the Centers for Disease Control and Prevention, one in three adults age 65 or older fall each year, but less than half discuss this with their healthcare providers. Falls are the leading cause of both fatal and nonfatal injuries for older Pennsylvanians, according to the state’s Department of Aging and Health. The U.S. economic impact from this is estimated at $30 billion per year as those severely injured usually end up in nursing homes or assisted living.
There are many precipitating factors that contribute to falls in older adults. As we age, our bodies weaken and our reflexes slow down. The effects of aging can lead to arthritis, osteoporosis or Parkinson’s. The medications people take to manage these chronic conditions may come with side effects such as insomnia or dizziness, which may contribute to falls.
Moreover, common dangers around the house include furniture. Coffee tables rank among the top items that contribute to falls – from hitting one’s head on the table, which can lead to traumatic brain injury. Clutter around the house or poor lighting also increases the chance for falls. While there are many causes of such accidents, there are practical things people can do to modify the risks.
Communicating with your doctor is the single most important thing to do during yearly exams. Your doctor should ask if you’ve had a fall in the last 12 months. If they do not ask, then you should tell them if you’ve had a fall in the last year. Your doctor should also perform a fall risk assessment and discuss health concerns that may contribute to potential falls. When you meet with your doctor, have your vision checked to see if you need a new prescription for glasses and ask them to review your list of medications and make adjustments if there are drugs that make you dizzy or lightheaded.
Exercise is one of the best ways to prevent fall related injuries. For example, resistance training can help improve muscle strength and coordination, thereby significantly reducing the risk of injury. A good fall prevention exercise program will also include exercises for posture and flexibility. For those with difficulty standing for prolonged periods, many of these exercises can be adapted for the chair.
If your house or apartment presents a danger due to the way it’s furnished, rearrange the household items to make a clearer path when walking between rooms. There are many bathroom and home safety kits that can also help with stability. Some safety items may even be covered under some insurance plans. If throw rugs tend to bunch up or slip when you walk, secure them with double sided tape. Make sure handrails near steps are secure. Consider purchasing a good pair of walking shoes with proper treading. For those with balance issues, a cane can help stabilize and prevent falls. There are many different types of canes with varying grips and tips to choose from, so ask your doctor for suggestions.
What to Do If You Fall
Stay calm and remain still for a few moments to stabilize yourself. If you think you can get up safely, roll onto your side and get up slowly using your hands and knees or to a sitting position. If you are hurt or can’t get up on your own, ask someone for help or call 9-1-1.
For those who live by themselves, it may be wise to invest in an emergency at-home response system, so if you need emergency assistance at any time, help is as close as the push of a button. Today’s emergency response devices are subtle and worn like a necklace or bracelet.
Article provided by Gateway HealthSM, www.medicareassured.com. | https://www.seniorcitizensguide.com/articles/washington-county/slow-and-steadi.htm |
Afrobarometer is non-partisan, pan-African research institution conducting public attitude surveys on democracy, governance, the economy and society in 30+ countries repeated on a regular cycle. We are the world’s leading source of high-quality data on what Africans are thinking.
Frequently Asked Questions (FAQs)
Both Afrobarometer and Eurobarometer are cross-national comparative survey projects focusing on population sample surveys. Other related projects are the Arabbarometer (Arab region), Asianbarometer (Asia) and Latinobarometer (Latin America). Each of the barometers is implemented independently although in each country, a national research team administers a country-wide face-to-face survey using standardized survey instruments to compile the required micro-level data under a common research framework and research methodology.
Afrobarometer’s aim is to give the public a voice in policymaking by providing high-quality public opinion data to policymakers, policy advocates, civil society organizations, academics, news media, donors and investors, and ordinary Africans.
Funding from a variety of organizations and institutions allows us to pursue this goal.
Financial support for Round 8 has been provided by:
- Sweden
- Mo Ibrahim Foundation
- Open Society Foundations
- William and Flora Hewlett Foundation
- U.S. Agency for International Development (USAID) via the U.S. Institute of Peace
Funders for previous rounds have also included the U.S. State Department, National Endowment for Democracy, UK Department for International Development (DFID), World Bank, Bill & Melinda Gates Foundation, Duke University China Research Center, Transparency International, Institute for Security Studies, Royal Danish Ministry of Foreign Affairs (RDMFA), Danish International Development Agency (DANIDA), and Canadian International Development Agency (CIDA).
Donations help Afrobarometer give voice to African citizens. Please consider making a contribution (DONATE) or contact Felix Biga (felixbiga[at]afrobarometer.org) to discuss institutional funding.
Because Afrobarometer is funded from public resources, its data are a public good. All data are released via this website and other outlets, along with relevant codebooks. To allow initial in-house analysis and publication, we release full data sets for free public use one year after the completion of fieldwork in the relevant country.
Data are also made available for public use on our free online data analysis tool.
Early access to data sets (prior to general release) can be granted to graduates or research students based at African institutions and to African students based at overseas institutions.
We do not generally grant early access to researchers or academics/faculty. However, we will consider applications from people working directly with Afrobarometer donors and/or local organisations/NGOs that would make beneficial use of the data in planning development interventions.
Please see our Data Usage and Access Policy.
All Afrobarometer interviews are face-to-face. Visit our survey methods page for more information.
Samples usually include either 1200 or 2400 cases. Samples are designed to generate a sample that is a representative cross-section of all citizens of voting age in a given country. The goal is to give every adult citizen an equal and known chance of being selected for an interview. Go to sampling principles
Yes. Afrobarometer data is free and available online. If you use our data in your publication, please acknowledge Afrobarometer. Read our data usage policy for more information.
Afrobarometer wants to make its findings available to everyone who has an interest in the perceptions, attitudes, and preferences of ordinary Africans. We think our findings are especially valuable for people involved or interested in policy making that affects citizens in African countries, such as government officials, civil-society activists and advocates, the news media, international donors and development partners, researchers, and students.
Among criteria that Afrobarometer uses to determine whether to implement a survey in a particular country are the availability of funding, security conditions in the country, and the ability of citizens in that country to speak freely.
Afrobarometer advertises on this website and other platforms for reputable and experienced organisations/firms to carry out surveys and disseminate findings in their respective countries. Successful applicants become Afrobarometer’s national partners. For more information, please contact us.
Afrobarometer dispatches/briefing papers, policy papers, working papers, and summaries of results are available free of charge in our Publications section.
Press releases can be found here.
Media briefings (PowerPoint presentations) can be found here.
Information on Afrobarometer books can be found here.
On each page, you can use our search tool to search by country, type of publication, language, country, or author. | http://www.afrobarometer.org/about/faqs |
Figures out today suggest that as many as 90 per cent of people across the UK have Covid-19 antibodies, either from infection or vaccination.
At the beginning of the pandemic, scientists speculated that around 60 to 70 per cent of people might need to be immune to the virus to hit the “herd immunity” threshold.
This is the point where so many people are immune to the virus that it can no longer spread through the population and goes into decline.
Clearly this hasn’t happened, as a third wave of coronavirus infection is still raging in the UK. Why?
What is herd immunity?
If large numbers of people become immune to a disease, either by developing natural resistance or through vaccination, it has fewer chances to spread.
The virus needs every case to infect at least one other to sustain itself. If that doesn’t happen – if the reproduction or R number falls below 1 – it goes into decline.
Different diseases and variants have different R numbers, and the number varies according to other factors, like control measures which reduce contact between potential spreaders.
How many people have immunity?
According to the Office for National Statistics, about nine out of ten people across the UK are estimated to have antibodies to the SARS-CoV-2 virus, either from infection or vaccination.
This partly reflects the scope of the vaccine rollout across the UK. At time of writing, 88 per cent of the adult population had been given one dose of vaccine, while 69 per cent had received both doses.
Not as good as it sounds
While all the vaccines in use in Britain have proven to be effective in reducing deaths, hospitalisation, serious illness and infection, none of them is 100 per cent effective.
Getting vaccinated doesn’t entirely prevent onward transmission of the virus, particularly in the form of the now-dominant Delta variant.
And there is good evidence that testing positive for antibodies doesn’t mean you are completely protected against reinfection.
We also need to remember that the vaccination figures only cover the adult population, but children play a role in spreading the disease.
Even if we vaccinated every single adult in the country – and we are some way off that goal – that would only add up to about 70 per cent of the entire population.
Taking into account a range of factors like this, modellers at the University of Warwick said last week that as much as one third of the UK population could still be susceptible to the Delta variant.
Delta blues
That suggests that around two thirds of us do have immunity – which brings us close to the 60-70 per cent herd immunity threshold some scientists estimated at the beginning of the pandemic.
One big change since then is the rise of the Delta variant, which is much more transmissible than early forms of the virus and makes those early estimates look too optimistic.
Modellers think the R number for the Delta variant could be as high as 6 to 8 – meaning a single case can infect six to eight other people.
This implies that we would need to vaccinate 83 to 88 per cent of the entire population, including children, to reach the herd immunity threshold and stop the illness from spreading.
And that would only work if the vaccines were 100 per cent effective at preventing onward infection – which we know they are not.
Dr Adam Kucharski from the London School of Hygiene & Tropical Medicine told us: “Obviously there have been a lot of natural infections in the UK too, so this will contribute to making up the difference, but it illustrates just how high the threshold is to get R below 1.”
Vaccines are still working
Scientists say it’s important to understand that vaccination is still helping to slow the spread of Covid.
Dr Louise Dyson from the University of Warwick told FactCheck: “The herd immunity threshold is the point at which there is enough immunity in the population that we could lift all measures and still have cases falling – so R is less than one.
“That threshold is very difficult to know precisely, and I would urge caution about quoting a given percentage of the population as a herd immunity threshold.
“However, even without reaching the herd immunity threshold, the amount of immunity in the population still has an effect. The more immunity there is, the fewer infections we will see at the same level of measures.”
Professor Graham Medley from the London School of Hygiene & Tropical Medicine, the Chair of the SPI-M group of expert advisors to the government, said: “It’s not an on/off process – herd immunity kicks in as immunity increases.
“People in England are approximately making contact with about half the people that we were pre-pandemic.
“We estimate that at full contact rates and no immunity the R for Delta would be about 7. At half the contact rates, we would expect R to be about 3.5.
“But we are actually seeing R about 1.4, and the difference is immunity – so immunity is reducing the R value by about 60 per cent. Without immunity we would be having a huge epidemic.”
Will it ever end?
Many scientists have been pessimistic from the start about the chances of us reaching the herd immunity threshold and eradicating Covid-19, even with the swift development of effective vaccines.
Professor Paul Hunter from the University of East Anglia said: “Our grandchildren’s grandchildren will be getting the infection. Looking at the other coronaviruses, we can expect to get repeat infections every four to six years, probably more frequently this decade.
“But don’t despair. We know that second infections and infections after immunization are usually less severe than first infections, so the vast majority of these infections will be asymptomatic or mild common cold.”
Professor Willem van Schaik from Birmingham University told FactCheck: “The focus on ‘herd immunity’ has been somewhat confused from the start of the pandemic as the underlying assumption of herd immunity claims was that those that had antibodies to SARS-CoV-2, either through vaccination or prior infection, would be entirely protected from re-infection and would no longer transmit the virus.
“This is true for a number of infectious diseases (with measles probably being the most important example) but SARS-CoV-2 is a different type of virus that can still infect people that have antibodies. Importantly, upon infection symptoms will be generally mild in these individuals but they will still be able to transmit the virus. | https://cvmusicstudio.com/factcheck-why-hasnt-herd-immunity-stopped-covid-channel-4-news/ |
Abstract: We consider the possible pattern of the overall spiral structure of the Galaxy, using data on the distribution of neutral (atomic), molecular, and ionized hydrogen, on the base of the hypothesis of the spiral structure being symmetric, i.e. the assumption that spiral arms are translated into each other for a rotation around the galactic center by 180° (a two-arm pattern) or by 90° (a four-arm pattern). We demonstrate that, for the inner region, the observations are best represented with a four-arm scheme of the spiral pattern, associated with all-Galaxy spiral density waves. The basic position is that of the Carina arm, reliably determined from distances to HII regions and from HI and H2 radial velocities. This pattern is continued in the quadrants III and IV with weak outer HI arms; from their morphology, the Galaxy should be considered an asymmetric multi-arm spiral. The kneed shape of the outer arms that consist of straight segments can indicate that these arms are transient formations that appeared due to a gravitational instability in the gas disk. The distances between HI superclouds in the two arms that are the brightest in neutral hydrogen, the Carina arm and the Cygnus (Outer) arm, concentrate to two values, permitting to assume the presence of a regular magnetic field in these arms.
Submission historyFrom: Yuri Efremov N. [view email]
[v1] Sat, 20 Nov 2010 11:03:36 UTC (953 KB)
Current browse context:
astro-ph.CO
Change to browse by:
References & Citations
a Loading...
Bibliographic and Citation Tools
Bibliographic Explorer (What is the Explorer?)
Litmaps (What is Litmaps?)
scite Smart Citations (What are Smart Citations?)
Code and Data Associated with this Article
Demos
Recommenders and Search Tools
Connected Papers (What is Connected Papers?)
CORE Recommender (What is CORE?)
IArxiv Recommender (What is IArxiv?)
arXivLabs: experimental projects with community collaborators
arXivLabs is a framework that allows collaborators to develop and share new arXiv features directly on our website.
Both individuals and organizations that work with arXivLabs have embraced and accepted our values of openness, community, excellence, and user data privacy. arXiv is committed to these values and only works with partners that adhere to them.
Have an idea for a project that will add value for arXiv's community? Learn more about arXivLabs and how to get involved. | https://arxiv.org/abs/1011.4576v1 |
Future Environments: The Future of Energy with Nancy Sottos
Nancy Sottos, a professor of materials science and engineering, discusses green energy and the need for energy storage. Sottos’ collaborators include Jeff Moore, a professor of chemistry, and the late Scott White, a professor of aerospace engineering, in Beckman’s Autonomous Materials Systems Group.
How much of our energy needs currently rely on batteries? What is the proposed usage?
Energy needs don’t really rely on batteries, since batteries are for energy storage and must be charged with another form of energy (e.g. electricity). Batteries are used in a wide range of devices from personal electronics, home tools and equipment, and now automobiles. Additionally, there is support to use batteries to store energy generated by renewable sources. Wind and solar energy are generated intermittently—for example, when the sun is shining—so large batteries are needed to store this energy when the source is on and then deliver it at a more constant rate.
How do we store and discharge energy on a large scale?
Large-scale grid storage for renewable, grid-scale batteries do exist, but they need to be improved significantly.
Why are Lithium-ion batteries so popular in electronics and electric cars today? What are the drawbacks?
Batteries store large amount of energy in a relatively small package that can be delivered on demand. If there was no battery for your mobile phone, it would not be mobile and would be tethered by a power cord. For cars, batteries are replacing the combustion of gasoline as the energy source. Electric cars have no emissions. Although we still have to plug in electric cars to charge them, the electricity comes from a variety of sources including renewables and natural gas.
Why do rechargeable batteries eventually become unusable or unstable?
As batteries charge and discharge, a number of chemical and mechanical changes take place. Chemical changes include breakdown of the electrolyte, formation of reaction products, and undesirable dissolution of ions from the electrodes. These chemical changes can in turn cause mechanical problems like large expansion and contraction, cracking and delamination from the current collector. In a commercial battery, these changes take place slowly but eventually lead to a reduction of capacity (no longer holds charge). Another factor is if we try to operate a battery under conditions it was not designed for, it will become unstable. For example, if we try to charge or discharge it too rapidly, if the battery is expanding too much for its housing (e.g. a Samsung phone), or if the battery is damaged (e.g. due to a car accident).
What technologies are you working on to make batteries safer and more reliable?
Our group is working on self-healing strategies to mitigate damage due to expansion and contraction of the active materials. We also are working on the smart release of additives to extend the life of the battery and to prevent thermal runaway.
Which experimental battery technologies seem the most promising for the future?
I’m not really sure. I think solid state batteries (no liquid electrolyte) are promising because they are inherently safer, but there are still many technical challenges to solve. | https://beckman.illinois.edu/news/2018/06/scifuture-energy |
The goal of the Visiting Scholar Program is to expand the capacity of CHDI partners and faculty to conduct cancer disparities research and to provide a venue for disparities-related information to be shared with campus and community partners.
This is an accordion element with a series of buttons that open and close related content panels.
Otis Webb Brawley, MD
“Improving Underserved and Minority Participation in Cancer Clinical Research” (video)
April 9, 2008
Dr. Brawley is a national leader in cancer research and the recently appointed Chief Medical Officer of the American Cancer Society. Dr. Brawley graduated from the University of Chicago’s Pritzker School of Medicine in 1985. Since that time, he has conducted research in breast and prostate cancer, cancer prevention, medical ethics, disparities, and the biologic behavior of disease in specific populations with cancer. Dr. Brawley has held many distinguished posts including Assistant Director to the Office of the Director at the National Cancer Institute and professor of Hematology and Oncology and Epidemiology at Emory University in Atlanta.
Amanda Bruegl, MD
“Many Pathways to Working with the American Indian Community: Thinking Broadly to Advance Native Health & Wellness”
April 30, 2013
“Evaluating Established Clinical Criteria for Their Ability to Identify Women with Lynch Syndrome” (video)
May 1, 2013
Dr. Bruegl (Oneida) completed her undergraduate degree in biochemistry at the University of Wisconsin—Madison and her Doctor of Medicine at the University of Washington, Seattle. Following a residency in gynecology at UW Hospital and Clinics, Dr. Bruegl received a fellowship in gynecological oncology from MD Anderson Cancer Center at the University of Texas. A member of the Oneida Nation of Wisconsin, Dr. Bruegl’s current research concerns Lynch Syndrome across multiple populations. She has also conducted research on HPV vaccination practices in tribal health centers. Dr. Bruegl has interest in community- based cancer research and education, and pathways programming to promote entry of American Indian students into medicine and the health sciences. When she completes her fellowship, Dr. Bruegl will become the first American Indian gynecological oncologist in the United States.
Linda Burhansstipanov, MSPH, D.Ph., CHES
“American Indian/Alaska Native Cancer Data and its Implications for Survivorship”
May 4, 2009
Dr. Burhansstipanov (Cherokee Nation of Oklahoma) has worked in public health since 1971. She taught full-time at California State University, Long Beach and UCLA, developed and implemented the Native American Cancer Research Program at the National Cancer Institute from 1989-1993, and is currently Grants Director and President of Native American Cancer Research (a community-based and American Indian-operated non-profit corporation) and President of Native American Cancer Initiatives, Inc. (a for-profit technical assistance, training, public speaking organization).
Dr. Burhansstipanov is involved with multiple NIH grants and serves on national boards such as the Susan G. Komen for the Cure, American Indian Alaska Native National Advisory Council, and Mayo Clinic’s Spirit of EAGLES Community Network Programs Advisory Board. She has over ninety peer reviewed publications, of which most address Native American cancer, public health and data issues.
“Biospecimen Collection and Genetic Research with Minorities: Increasing the Promise and Lessening the Peril” (video)
May 2, 2012
Dr. Burhansstipanov (Cherokee) is a well-known cancer control educator and advocate among indigenous peoples worldwide. A prolific author and recipient of numerous NIH grants, Linda received her Doctorate in Public Health from UCLA. Formerly a Professor in Health Sciences at California State University Long Beach, as well as a program director within the National Cancer Institute, Dr. Burhansstipanov is currently President of Native American Cancer Research, Inc. (NACR), Pine, CO, which she founded in 1999. Dr. Burhanssitpanov is an expert in effective educational strategies to relate genetic science and Native American cultural issues; she developed a comprehensive curriculum called, GENA, Genetic Education for Native Americans.
Suzanne Christopher, PhD
“Promoting Cervical Cancer Health on the Crow Reservation: A Community-Based Research Approach” (video)
October 17, 2007
Dr. Christopher has a doctorate in Health Education and Health Behavior from the School of Public Health at the University of North Carolina-Chapel Hill. She has worked extensively with the Crow Nation in Montana using Community-Based Participatory Research (CBPR) and is the Co-Director of the Montana Consortium for Community based Research in Health. She currently has two NIH grants as well as a $1.5 million CBPR grant from the American Cancer Society to work with the Crow Nation addressing knowledge, attitudes, and behaviors related to cervical cancer screening.
Harold P. Freeman, MD
“Poverty, Culture and Social Injustice: Determinants of Cancer Disparities” (video)
April 18, 2007
Dr. Freeman is a senior advisor to the Director of the National Cancer Institute ( NCI) and former Director of The NCI Center to Reduce Cancer Health Disparities. He currently serves as Medical Director of The Ralph Lauren Center for Cancer Care and Prevention in New York City. Dr. Freeman has been a leader in the field of health disparities since the 1980’s. He is the chief architect of the American Cancer Society’s initiative on cancer in the poor and is a leading authority on the interrelationships between race, poverty, and cancer. He is also Professor of Clinical Surgery at Columbia University College of Physicians and Surgeons and has been honored with myriad distinctions and awards.
Jennie Joe, PhD, MPH
“Challenges in Sustaining Community-based Participatory Research: Lessons Learned from Academic-Tribal Partnerships” (video)
May 2, 2008
Dr. Joe (Navajo) is faculty in the Department of Family and Community Medicine (DFCM), College of Medicine at the University of Arizona. Since 1987, Dr. Joe has also been the Director of the Native American Research and Training Center at the DFCM. Dr. Joe is a medical anthropologist who has been engaged in a number of community-based research projects with American Indian/Alaska Native Communities. She served as a member on the Institute of Medicine’s Committee to Assess Racial and Ethnic Disparities in Healthcare and on the National Human Research Protections Advisory Committee to the U.S Secretary of Health and Human Services. As a researcher, she is involved in a number of health-related studies that are conducted in cooperation with tribal groups throughout the country. Dr. Joe received her MPH and her doctorate from the University of California Berkeley. Her presentation is co-sponsored by the Collaborative Center for Health Equity and the Spirit of EAGLES program.
Judith Kaur, MD
“Bioethics and American Indians: Intersection of Culture and Science” (video)
June 11, 2012
Dr. Kaur (Choctaw/Cherokee) is Professor of Oncology at Mayo Clinic College of Medicine and Medical Director of Mayo Clinic Hospice, Rochester MN. She is one of two practicing American Indian medical oncologists in the United States and for over twelve years, has led both the national Spirit of EAGLES Leadership Initiative on Cancer and the National Network for Cancer Control among American Indian and Alaska Native populations. A former teacher and counselor, Judith holds a BS in Medicine from the University of North Dakota Medical School and a MD, with honors, from the University of Colorado Health Sciences Center. Widely published and a recipient of numerous NIH grants, Dr. Kaur’s primary research interests are breast and gynecologic cancers, as well as cancer control among American Indians and Alaska Natives. Dr. Kaur is currently co-Chair of the Cancer Disparities Committee of The Alliance for Cancer Clinical Trials, and in 2008, was appointed to in the National Cancer Advisory Board.
Nancy Kreiger, PhD
“The Science and Epidemiology of US Cancer Disparities: Race/Ethnicity, Class, Gender, and the Risk of Cancer”
April 16, 2008
Dr. Krieger, Harvard University Professor of Society, Human Development, and Health, is a leading theoretician in the fields of health disparities and social determinants of health. She is a social epidemiologist with a background in biochemistry, history of public health, and philosophy of science. Her research deals with topics such as social justice and racial discrimination. One of Dr. Krieger’s current research projects uses 30 years of data to assess whether the socioeconomic gradient in breast cancer is changing. Dr. Krieger is the Associate Director of the Harvard Center for Society and Health within the Harvard School of Public Health. CHDI will be co-sponsoring Dr. Krieger’s visit with the Havens Center for the Study of Social Structure and Social Change.
Eugene J. Lengerich, VMD, MS
“Rural Cancer Disparities Research” (video)
February 18, 2009
“Recruitment of Underserved Women to Mammography through a Dispersed Rural Research Network” (video)
February 16, 2009
Dr. Lengerich is an epidemiologist with expertise in community-based participatory research and health disparities in rural settings. Dr. Lengerich’s research explores how community factors can affect the risk of chronic disease. He is principal investigator for the Northern Appalachia Cancer Network (NACN), a community-academic partnership begun in 1992 which focuses on reducing cancer health disparities in rural communities in New York and Pennsylvania.
Melissa R. Partin, PhD
“Take Stock, Get Your Bearings, and Mind Your Manners: Lessons Learned From a Cancer Control Researcher on How to Increase Success in Implementation Research and Practice” (video)
March 12, 2008
Dr. Partin is a behavioral scientist with particular interests and expertise in cancer prevention and control research. She is an alumna of UW Madison, where she received her MS in Epidemiology and PhD in Sociology in 1993. Subsequently she completed a postdoctoral fellowship in the Carolina Population Center and Department of Biostatistics at the University of North Carolina Chapel Hill. Since completing her training at UNC, Dr. Partin has conducted applied research in the area of cancer prevention and control, with a particular emphasis on screening behavior. She has been principal investigator on seven federally funded grants, and has authored numerous scholarly articles in this area of study. She is currently the Associate Director of the Center for Chronic Disease Outcomes Research at the Minneapolis VA Medical Center (a VA Health Services Research and Development Center of Excellence) and a faculty member in the Departments of Medicine and Epidemiology at the University of Minnesota.
Gregory Talavera, MD, MPH
“Cultural Perspectives in Cancer Control Among Latinos” (video)
March 14, 2007
Dr. Talavera is a bilingual, bicultural physician with experience in preventive medicine, public health, and cancer control. He is currently responsible for a $9.7 million research grant from The National Heart, Lung and Blood Institute, part of the National Institutes of Health (NIH), to conduct a longitudinal study of Latino health. Among his research interests are culture-specific beliefs that serve as assets or barriers to chronic disease prevention and control. He is an associate professor at the Graduate School of Public Health, Division of Health Promotion and Behavioral Sciences, at San Diego State University, where he is also co-director of the Center for Behavioral and Community Health Studies.
Donald Warne, MD, MPH
“Cancer in Indian Country: Policy, Ethical and Research Considerations” (video)
April 18, 2012
Dr. Warne (Oglala Lakota) is a national expert on American Indian health policy and comes from a family of Oglala Lakota leaders and traditional healers. Dr. Warne has published on American Indian health policy, cancer policy, bioethics and integration of medical practice with traditional ways. He holds a medical degree from Stanford University Medical School and an MPH from Harvard University. Dr. Warne is currently Associate Professor and Director of the MPH program at North Dakota State University, and a consultant and senior policy advisor for both the Great Plains Tribal Chairman’s Health Board and Sanford Health’s Office of Native American Health. In addition, Dr. Warne is a member of both the Midwest Division and national Boards of Directors of the American Cancer Society.
Eighth Annual Littlefield Leadership Lecture
CHDI was proud to be a Special Partner for the Littlefield Leadership Lecture through the UW School of Nursing on September 21, 2007. Presenters included:
Antonia Villarruel, PhD, RN, FAAN
“Health Disparities: Challenges and Innovations” (video)
Sandra Underwood, PhD, RN, FAAN
“Efforts to Address Cancer-Related Health Disparities in Southeastern Wisconsin”
Tracy Schroepfer, PhD
“Partners Building Bridges: Reducing Cancer Health Disparities in Wisconsin”
For more information, please contact Rick Strickland, Director, at 608-262-0072 or [email protected]. | https://chdi.wisc.edu/visiting-scholar-archives/ |
OFB prevents the same plaintext block from generating the same ciphertext block by using an internal feedback mechanism that generates the keystream independently of both the plaintext and ciphertext bitstreams.
Sunil Kumar, Treasurer, G.
Some experts argue that cryptography appeared spontaneously sometime after writing was invented, with applications ranging from diplomatic missives to war-time battle plans. While stream ciphers do not propagate transmission errors, they are, by their nature, periodic so that the keystream will eventually repeat.
Now suppose, instead, that you have a number that is a product of two primes, 21, and you need to determine those prime factors. At the current stage, the Cloud computing is still evolving and there exists no widely accepted de?
An Advanced development and Engineering program to obtain an open-use, multilevel secure computing capability is described. The receiver applies the same key to decrypt the message and recover the plaintext.
Secret Key Cryptography Secret key cryptography methods employ a single key for both encryption and decryption. Originally it was supposed to use a Q point chosen by Juniper which may or may not have been generated in provably safe way. The advancement in the mobile devices, wireless and web technologies given rise to the new application that will make the voting process very easy and efficient.
Piggy lord of the flies essay help referencing articles in essay theoretical research paper xc Study abroad academic essay Abolish minimum wage essay conclusion extended essay cover page ib bio parts of research paper for high school? Three types of cryptography: SMS4 is a bit block cipher using bit keys and 32 rounds to process a block.
A Self-synchronizing stream cipher. It is no surprise, then, that new forms of cryptography came soon after the widespread development of computer communications. GSM mobile phone systems use several stream ciphers for over-the-air communication privacy.
Of the triffids essay sell literature essays. They differed significantly from other rule-based environments of the time in that rules could be triggered by a combination data conditions and real-time events. Stream ciphers operate on a single bit byte or computer word at a time and implement some form of feedback mechanism so that the key is constantly changing.
CFB mode generates a keystream based upon the previous ciphertext the initial key comes from an Initialization Vector [IV]. Regardless, one presumed protection of RSA is that users can easily increase the key size to always stay ahead of the computer processing curve.
PKC depends upon the existence of so-called one-way functions, or mathematical functions that are easy to compute whereas their inverse function is relatively difficult to compute.
BlackBerry Ltd has however not issued an advisory to any of its customers who may have used it, because they do not consider the probable backdoor a vulnerability. Salsa20 uses a bit key although a bit key variant also exists.
Through the use of segmentation, however, Multics provides direct hardware addressing by user and system programs of all information, independent of its physical storage location. Assuring the receiver that the received message has not been altered in any way from the original.Cryptography in the Web: The Case of Cryptographic Design Flaws in calgaryrefugeehealth.com Thai Duong Vnsecurity/HVAOnline Ho Chi Minh City, Vietnam [email protected] research available from both the cryptographic and web security communities to answer Nguyen’s question for the case of cryptographic implementations in web technologies.
essay on globalization and impact of foreign employment in nepal. Walsh college michigan mba essays actuarial dissertations lesauvage lessay abbey entrepreneur essay paper, referat beispiel essay roles and responsibilities of a teacher essay. It provides articles with both a practical and research bent by the top thinkers in the field of security and privacy, along with case studies, surveys, tutorials, columns, and in-depth interviews and podcasts for the information security industry.
Abstract Recent research in the field of lattice-based cryptography, especially on the topic of the ring-based primitive ring-LWE, provided efficient and practical ring-based cryptographic schemes, which can compete with more traditional number-theoretic ones. | https://bofoheb.calgaryrefugeehealth.com/cryptography-ieee-research-papers-74974fc.html |
The global recession is expected to coincide with a sharp decline in international trade this year, especially as international trade tends to decline more than GDP in times of crisis. However, the extent of this overreaction is difficult to measure. The World Trade Organization (WTO) forecasts a 13-32% decline in world trade. This estimate indicates that all regions would suffer a double-digit decline in their trade volumes. According to Coface's forecasting model – which uses oil prices, business confidence in the US manufacturing sector, South Korean exports, and the Baltic Dry Index as explanatory variables for global trade – world trade is expected to decline by 7% in the third quarter of 2020 compared to the previous year. However, the outcome could be significantly worse as the usual correlation measured through linear models does not necessarily work in times of crisis. During periods of negative economic conditions, a sharp increase in uncertainty is one of the reasons for the overreaction of trade to GDP – today, however, this overreaction is at an all-time high.
A new protectionism targeting supply of food and critical medical wares is also weighing on world trade
Protectionism is another aggravating factor. Since the beginning of the global health crisis, trade protectionism seems to have focused on ensuring countries’ supplies supply of food and essential medical product. As of April 22, 2020, 56% of the trade measures registered by Global Trade Alert (193) were related to the abovementioned objective. Most measures (110) concerned export bans on masks and other protective equipment, respirators, and chemicals required in the production of various drugs.
In this period, importers are facilitating the entry of medical products, while exporters are making it harder to export them. In this context, the case of China is peculiar: although their medical exports decreased by 15% in February 2020, in the midst of a local health crisis, their dominant market share (55.3%) of global mask exports meant that China's cooperation has been essential in supplying the world. China's daily production has jumped to 116 million masks, 12 times the amount it produced before the epidemic.
The crisis has also led to increased protectionism in the agri-food sector. The waves of panic buying triggered by lockdown prospects have not been limited to households: some vulnerable countries are looking to stockpile grain to ensure the continuity of their national food supply. Today, a third of the market’s wheat supply is under cautious restrictive measures by its major exporters, with Russia leading the pack. At this stage, the export bans have mostly resulted in demand shifting to European countries, such as France, rather than supply shortages.
In addition to wheat, rice is another highly sought-after commodity in this unique period. In India, the world’s main rice exporter, deliveries can no longer be ensured: lockdown measures have disrupted domestic supply chains, reduced labour availability, and made access to exporting ports difficult. Although Thailand, India's main competitor, has ample stocks of rice, its exports are hampered by lockdown measures in Cambodia, which are depriving the sector of the much-needed seasonal workers. Consequently, the price of rice reached a 7-year high at the end of March.
The only good news is that border controls implemented during the lockdown have had a limited impact on trade. They are now being eased gradually in Europe, in order to revive the tourism industry and limit labour shortages, particularly in the agricultural sector.
Shielding production from foreign supply shocks seems like an impossible quest
In the longer term, calls for the relocation of production stages in the same country constitute another risk for world trade. At the first stage of the crisis in China, companies around the world realized how exposed their supply chains were to the country and are now looking at increasing supply chain resilience to foreign supply shocks. This could come via two means: full relocation of production to the domestic market, or a strong global strategy of supplier diversification.
In the current context, imagining a full relocation of manufacturing processes at the domestic or regional level highlights issues of rising production costs and lack of domestic skills. Even if these two issues are addressed, any new localized production processes would still depend on raw material supply, which cannot be relocated.
The resilience of supply chains will also require reducing country-specific exposure by diversifying suppliers. At first glance, it currently seems possible to find alternatives to the top largest supplier country; China in most sectors. But since major input producers in an industry are strongly interconnected, dependence on China will not disappear radically, even if input supply to the other major hubs in the sector is more diversified.
This means that global value chains still have a bright future. | https://www.coface.at/en/News-and-Publications/News/World-Trade-despite-a-sudden-interruption-global-value-chains-still-have-a-bright-future |
Hi EGL! This is my 4th year as a lolita.
I'm a huge fan of classic lolita and the death of Victorian Maiden I have a little hesitant to do a wardrobe post this year, but I don't want classic lolita to become a thing of the past so I'm going to do my best to share my love for classic.
For those curious, my 2017 wardrobe post is here . What's changed since last year is I've obtained a lot of my dream dresses! I also prepared multiple colorways of some my favorite pieces.
My 2018 goals for my wardrobe are to obtain my accessories and less dresses (I probably say this every year, haha.) I think my dresses are often matched with beige so I 'd like to add more colored accesories in my wardrobe. | https://egl.livejournal.com/2018/01/15/ |
,
Viruses & Microorganisms
,
Molecular and Cell Biology
,
Immunology
,
Disease, Drugs & Diagnostics
,
Yeda Technology Transfer
The new study suggest a possible defense in the battle against this deadly disease
Uncovering Varied Pathways to Agriculture
05.12.2017
Scientific Archaeology
New dates for a 15,000-year-old site in Jordan challenge some prevailing assumptions about the beginnings of permanent settlement
Autism and the Smell of Fear
27.11.2017
Brain & Behavior
Odors that carry social cues seem to affect volunteers on the autism spectrum differently
Off Track: How Storms Will Veer in a Warmer World
13.11.2017
Planetary Science
,
Climate
Weizmann Institute of Science research uncovers the internal mechanisms driving storms toward the poles
Crashing Neutron Stars Observed for the First Time
16.10.2017
Astrophysics
,
Theoretical Physics
Weizmann Institute scientists help confirm and analyze the star merger
Spare Parts Might “Jump-Start” Protein Design
26.09.2017
Biochemistry
,
Systems Biology
,
Disease, Drugs & Diagnostics
Including “non-ideal” components in the designs may be key to functional artificial proteins
How Bacteria Hinder Chemotherapy
20.09.2017
Cancer
,
Personalized Medicine
,
Systems Biology
,
Viruses & Microorganisms
,
Molecular and Cell Biology
,
Disease, Drugs & Diagnostics
Scientists find bacteria in pancreatic tumors that metabolize a common drug
Colder and Colder
18.09.2017
Particle Physics
,
Quantum Physics
An original method of cooling ions could have new and interesting uses
Genomic Recycling: Ancestral Genes Take On New Roles
18.09.2017
Systems Biology
,
Evolution and Development
,
Genetics
How some genes lost the ability to make proteins - and gained regulatory powers
Altitude Training for Cancer-Fighting Cells
18.09.2017
Cancer
,
Molecular and Cell Biology
,
Immunology
Oxygen starvation could toughen up immune T cells for cancer immunotherapy
Pages
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »
Subscribe to Press Releases*
Full name
Email
*
Languages
*
English
French
German
Portuguese
Spanish
*Email only
Most Popular Articles
Checking the Dosage
Prof. Yoram Groner is a pioneer in Down syndrome research
The Limits of Computing
Computers can solve complex problems but they are far from omnipotent. Prof. Ran Raz of the Weizmann Institute's Computer Science and Applied Mathematics Department is trying to portray the limits... | https://wis-wander.weizmann.ac.il/press-releases?page=6 |
CROSS-REFERENCE TO RELATED APPLICATIONS
BACKGROUND
Technical Field
Description of Related Art
SUMMARY
DETAILED DESCRIPTION
System Embodiments
Viewing Perspective
Visitor Identification Embodiments
Methods of Detecting Visitors
Detecting Adverse Sounds
Detecting Audible Notifications
Triggering Appliances
Interpretation
The entire contents of the following application are incorporated by reference herein: U.S. Non provisional patent application Ser. No. 15/060,282; filed Mar. 3, 2016; and entitled LIGHT SOCKET SURVEILLANCE SYSTEMS.
The entire contents of the following application are incorporated by reference herein: U.S. Provisional Patent Application No. 62/129,816; filed Mar. 7, 2015; and entitled LIGHT SOCKET SURVEILLANCE SYSTEMS.
The entire contents of the following application are incorporated by reference herein: U.S. Nonprovisional patent application Ser. No. 14/549,548; filed Nov. 21, 2014; and entitled LIGHT SOCKET CAMERAS.
The entire contents of the following application are incorporated by reference herein: U.S. Nonprovisional patent application Ser. No. 14/549,545; filed Nov. 21, 2014; and entitled LIGHT SOCKET CAMERAS.
The entire contents of the following application are incorporated by reference herein: U.S. Nonprovisional patent application Ser. No. 14/534,588; filed Nov. 6, 2014; and entitled LIGHT SOCKET CAMERAS.
The entire contents of the following application are incorporated by reference herein: U.S. Nonprovisional patent application Ser. No. 14/849,513; filed Sep. 9, 2015; and entitled LIGHT SOCKET CAMERAS.
Various embodiments disclosed herein relate to devices and methods that enable people to observe remote locations. Certain embodiments relate to using a computing device to see video taken by a remotely located camera.
Video cameras can record images of various events that are viewable by remotely located people. Additionally, video cameras can be supported by objects such as tripods. Furthermore, video cameras often require electrical power. Some video cameras receive electrical power from batteries and/or power outlets.
The disclosure describes methods for using a light socket surveillance system to enable a first party to communicate with a second party. The light socket surveillance system can include an outer housing defining a proximal end, a distal end that is opposite the proximal end, and a sidewall that extends between the proximal end and the distal end. In some embodiments, the light socket surveillance system includes a detection system having a camera, a speaker, and a microphone. The light socket surveillance system can include a screw thread contact located adjacent the proximal end of the outer housing. In some embodiments, the method includes detecting, via the microphone, an audible notification from the first party. In response to detecting the audible notification from the first party, the method can include initiating a communication session with a remote computing device of the second party.
The audible notification can comprise a voice command instructing the light socket surveillance system to contact the second party. Methods can include enabling, via the speaker and the microphone, the first party and the second party to audibly communicate with each other.
The audible notification can comprise a distress notification indicating that the first party requires assistance. The communication session can comprise an indication of the distress notification.
Methods can include recording a noise with the microphone; recording an image with the camera; and initiating a communication session with the remote computing device of the second party. The communication session can comprise an indication of at least one of the noise and image.
The sidewall can comprise a first portion and a second portion that is rotatable with respect to the first portion. The camera can be coupled to the second portion. Methods can further include determining whether the first party is located within a field of view of the camera. In response to detecting the audible notification and in response to determining that the first party is not located within the field of view of the camera, methods can include automatically rotating the second portion until the first party is located within the field of view of the camera. In response to determining that the first party is located within the field of view of the camera, methods can include recording the image with the camera.
In some embodiments, the method includes detecting an indication suggestive of a visitor's presence. In response to detecting the indication suggestive of the visitor's presence, methods can include determining a number of visitors present within a vicinity of the light socket surveillance system.
The light socket surveillance system can be located inside a home of a homeowner, and the vicinity can be a room located inside the home. The light socket surveillance system can be located outside a home of a homeowner, and the vicinity can be an area of an outer premise where the home is located.
In some embodiments, detecting an indication suggestive of a visitor's presence comprises detecting an infrared signature of the visitor. The light socket surveillance system can comprise an infrared camera. Accordingly, detecting the infrared signature of the visitor can comprise detecting the infrared signature of the visitor with the infrared camera.
In response to detecting the indication suggestive of the visitor's presence, the method can further include recording, by the camera, at least one of a video and image of the visitor; and initiating a communication session with a remote computing device. In some embodiments, the communication session comprises at least one of the video and image of the visitor.
Methods can include determining an identity of a first visitor. Methods can also include determining an identity of a second visitor. Methods can even include initiating a communication session with a remote computing device. The communication session can comprise the identity of the first visitor and the identity of the second visitor. The communication session can comprise the number visitors present within the vicinity of the light socket surveillance system. The remote computing device can be operated by a party associated with a building in which the light socket surveillance system is coupled.
The disclosure also a light socket surveillance system that can comprise an outer housing defining a proximal end, a distal end that is opposite the proximal end, and a sidewall that extends between the proximal end and the distal end. The light socket surveillance system can also include a screw thread contact coupled to the proximal end of the outer housing. The screw thread contact can be rotatably attached to a light socket. The light socket surveillance system can also include a detection system coupled to the outer housing. The detection system can comprise a camera configurable to record images, a speaker configurable to emit noise, and a microphone configurable to detect sound.
The outer housing can include a first outer housing and a second outer housing rotatable with respect to the first outer housing. The detection system can be coupled to the second outer housing such that the detection system is rotatable with respect to the first outer housing.
The light socket surveillance system can further include a motion detector coupled to the outer housing. The motion detector can be configured to detect an indication suggestive of a visitor's presence.
The light socket surveillance system can be configurable to determine an identity of a visitor based upon the second noise as detected by the microphone. The light socket surveillance system can even be configurable to detect a presence of a remote computing device. In such embodiments, the light socket surveillance system can be configured to determine an identity of a visitor associated with the remote computing device.
Although certain embodiments and examples are disclosed below, inventive subject matter extends beyond the specifically disclosed embodiments to other alternative embodiments and/or uses, and to modifications and equivalents thereof. Thus, the scope of the claims appended hereto is not limited by any of the particular embodiments described below. For example, in any method or process disclosed herein, the acts or operations of the method or process may be performed in any suitable sequence and are not necessarily limited to any particular disclosed sequence. Various operations may be described as multiple discrete operations in turn, in a manner that may be helpful in understanding certain embodiments; however, the order of description should not be construed to imply that these operations are order dependent. Additionally, the structures, systems, and/or devices described herein may be embodied as integrated components or as separate components.
For purposes of comparing various embodiments, certain aspects and advantages of these embodiments are described. Not necessarily all such aspects or advantages are achieved by any particular embodiment. Thus, for example, various embodiments may be carried out in a manner that achieves or optimizes one advantage or group of advantages as taught herein without necessarily achieving other aspects or advantages as may also be taught or suggested herein.
Communication systems can provide a secure and convenient way for a remotely located individual to see and/or communicate with a person who is within the field of vision of a camera and/or within the range of a microphone. Communication systems can include a camera that is attached to a light socket to couple the camera to a wall and to provide electricity to the camera. It should be appreciated that communication systems can be referred to as security systems, light socket cameras, light socket surveillance systems, surveillance systems, and the like.
Some communication systems can allow an individual to hear, see, and talk with visitors. For example, communication systems can use a computing device to enable a remotely located person to see, hear, and/or talk with visitors. Computing devices can include computers, laptops, tablets, mobile devices, smartphones, cellular phones, and wireless devices (e.g., cars with wireless communication). Specifically, example computing devices include the iPhone, iPad, iMac, MacBook Air, and MacBook Pro made by Apple Inc. Communication between a remotely located person and a visitor can occur via the Internet, cellular networks, telecommunication networks, and wireless networks.
a
FIG. 1
FIG. 3
200
200
208
300
208
300
208
300
Referring now to , communication systems can be a portion of a smart home hub. Communication systems can facilitate home automation. In some cases, cameras are electrically coupled to a light socket of a building and are integrated into a holistic home automation system and/or home security system. Various systems described herein enable home surveillance and/or complete home automation. Cameras threadably screwed into an interior light socket can enable a remote user to see events inside of a building (shown in ). As well, cameras threadably screwed into exterior light sockets can enable a remote user to see events outside of a building .
202
204
202
c
c
In some embodiments, the security system controls various electrical items in a home (e.g., lights, air conditioners, heaters, motion sensors, garage door openers, locks, televisions, computers, entertainment systems, appliances, pool monitors, elderly monitors, and the like). In some embodiments, the computing device controls the security system and other electrical items in a home (e.g., lights, air conditioners, heaters, motion sensors, garage door openers, locks, televisions, computers, entertainment systems, appliance, pool monitors, elderly monitors, and the like).
FIG. 1
200
202
204
202
202
208
208
208
208
208
c
c
c
illustrates a front view of a communication system embodiment. The communication system can include a security system (e.g., a camera assembly) and a computing device . Although the illustrated security system includes many components in one housing, several security system embodiments include components in separate housings. The security system can include a camera assembly . The camera assembly can include a video camera, which in some embodiments is a webcam. The camera assembly can be configured to take videos of a surrounding area for viewing via the Internet. However, it should be appreciated that the camera assembly can be a still camera, any type of digital camera, virtual camera, and the like. Generally, it should be appreciated that the camera assembly can be any type of camera or optical instrument that records images that can be stored directly, transmitted to another location, or both.
b
FIG. 1
202
280
282
280
208
282
202
208
202
680
202
618
280
202
c
c
c
c
c.
Now with added reference to , the security system can include a proximal end and a distal end that is opposite the proximal end . The camera assembly can be located at the distal end of the security system . However, it should be appreciated that the camera assembly can be positioned at any location on the security system , such as the sidewall . The security system can also include a foot contact located at the proximal end of the security system
202
208
202
202
282
202
680
202
202
202
c
c
c
c
c
c
c
It should be appreciated that the security system can include more than one camera assembly . For example, the security system may include two cameras. In some embodiments, the security system includes a first camera disposed at the distal end of the security system , and a second camera disposed along the sidewall of the security system . In this manner the second camera may face perpendicular to the direction the first camera is facing. This may allow the security system to have a larger field of vision of the area to which the security system is monitoring.
202
202
202
208
202
208
204
c
c
c
c
Moreover, the security system can also include a third camera, a fourth camera, and a fifth camera. The cameras can be mounted at any location along the security system to thereby expand the field of vision of the security system . As well, the camera(s) may be configured to move away from the security system and pivot along at least two axes. The movement of the camera(s) may be controlled via manual manipulation by a person, a command from a remote computing device , automatically in response to the occurrence of an event, or the like.
a
FIG. 1
202
216
220
216
202
200
202
200
220
202
300
202
202
202
220
202
c
c
c
c
c
c
c
c
As shown in , the security system can include a diagnostic light and a power indicator light . In some embodiments, the diagnostic light is a first color (e.g., blue) if the security system and/or the communication system is connected to a wireless Internet network and is a second color (e.g., red) if the security system and/or the communication system is not connected to a wireless Internet network. In some embodiments, the power indicator is a first color if the security system is connected to a power source. The power source can be power supplied by the building to which the security system is attached. The security system can receive electricity via the light socket to which the security system is attached. In some embodiments, the power indicator is a second color or does not emit light if the security system is not connected to the power source.
202
634
634
634
634
c
The security system (e.g., a camera assembly) can include an outer housing , which can be water resistant and/or waterproof. The outer housing can be made from metal or plastic, such as molded plastic with a hardness of 60 Shore D. In some embodiments, the outer housing is made from brushed nickel or aluminum. The outer housing can be rigid.
634
202
202
c
c
Rubber seals can be used to make the outer housing water resistant or waterproof. The security system can be electrically coupled to a power source, such as wires electrically connected to a building's electrical power system. In some embodiments, the security system includes a battery for backup and/or primary power.
FIG. 1
202
614
618
614
634
614
614
614
650
c
As shown in , the security system can include a screw thread contact having a proximal end adjacent the foot contact and a distal end that is opposite the proximal end. The distal end of the screw thread contact can be located adjacent the proximal end of the outer housing . The screw thread contact can also include a threaded sidewall that extends between the proximal end and the distal end of the screw thread contact . In this manner, the threaded sidewall of the screw thread contact can be configured to rotatably attach to the light socket .
626
626
626
626
266
614
626
618
The security system can include lights , which can be LED lights configured to illuminate a room and/or an outdoor area. In some embodiments, the lights can provide at least 10 lumens, at least 1,000 lumens, at least 4,000 lumens, and/or less than 40,000 lumens. The lights can be aligned such that the lights are parallel to a central axis of a screw thread contact . The lights can be oriented such that they face away from the foot contact .
202
630
630
208
208
630
282
202
208
202
208
202
208
202
c
c
c
c
c
As well, the security system can include lights , which can be infrared lights. The lights can illuminate an area in front of the camera assembly's field of vision to enable the camera assembly to capture easily viewable and high-quality video. In this regard, the lights can be located at the distal end of the security system , adjacent to the camera assembly . Infrared light can be suitable for nighttime video recording. In some embodiments the security system includes a photosensor and/or a photodetector to determine whether the field of vision of the camera assembly is illuminated. In response to determining that the field of vision is not illuminated, the security system can illuminate the light and use the camera assembly to record a video of the visitor. It should be appreciated that the security system can include any type of sensor configured to determine an amount of light, such as a reverse-biased light emitting diode (LED), photovoltaic cell, photodiode, ultraviolet light sensor, and the like.
626
630
202
204
626
630
204
202
626
630
202
204
626
630
204
202
626
630
c
c
c
c
The lights and can be controlled by any number of means. For example, the security system can be configured to receive a first instruction from the remote computing device . The first instruction can include a command to illuminate either or both of the lights and/or . In response to receiving the first instruction from the remote computing device , the security system can illuminate the lights and/or . As well, the security system can receive a second instruction from the remote computing device . The second instruction can include a command to de-activate the lights and/or . Accordingly, in response to receiving the second instruction from the remote computing device , the security system can de-activate the lights and/or .
202
626
630
202
234
202
626
630
202
202
626
630
c
c
c
c
c
The security system can also be configured to illuminate and de-activate the lights and/or in a number of different manners. For example, the security system can be configured to receive an audible instruction via the microphone of the security system . The audible instruction can be a spoken command by the visitor to thereby illuminate and/or de-activate the lights and/or . For example, the audible instruction can be the visitor saying, “Turn lights on,” “Illuminate lights,” “Lights off,” “Dim lights,” and the like. Generally, the audible instruction can be any spoken command or noise from the visitor, which is thereby received by the security system to illuminate the lights. Accordingly, in response to receiving the audible instruction from the visitor, the security system can illuminate or de-activate the lights and/or .
202
262
204
262
202
308
300
c
c
FIG. 3
As well, the security system can include a communication module configured to enable wireless communication with the computing device . The communication module can include a WiFi antenna and can be configured to enable the security system to connect to a wireless network of a building (shown in ).
230
202
204
202
262
634
262
202
204
230
202
204
c
c
c
c
Wireless communication can enable the security system (e.g., a camera assembly) to communicate with the computing device . Accordingly, the security system may include a communication module located within an internal portion of the outer housing . The communication module may be configured to connect to a wireless communication network. Some embodiments enable communication via cellular and/or WiFi networks. Some embodiments enable communication via the Internet. Several embodiments enable wired communication between the security system and the computing device . The wireless communication can include the following communication means: radio, WiFi (e.g., wireless local area network), cellular, Internet, Bluetooth, telecommunication, electromagnetic, infrared, light, sonic, and microwave. Other communication means are used by some embodiments. In some embodiments, such as embodiments that include telecommunication or cellular communication means, the security system can initiate voice calls or transmit text messages to a computing device (e.g., a smartphone, a desktop computer, a tablet computer, a laptop computer).
204
202
202
204
c
c
Several embodiments use near field communication (NFC) to communicate between the computing device and the security system . The security system and/or the computing device can include a NFC tag. Some NFC technologies include Bluetooth, radio-frequency identification, and QR codes.
202
204
c
Several embodiments include wireless charging (e.g., near field charging, inductive charging) to supply power to and/or from the security system and the computing device . Some embodiments use inductive charging (e.g., using an electromagnetic field to transfer energy between two objects).
Some embodiments include computer software (e.g., application software), which can be a mobile application designed to run on smartphones, tablet computers, and other mobile devices. Software of this nature is sometimes referred to as “app” software. In some embodiments the computer software includes software designed to run on desktop computers and laptop computers.
204
The computing device can run software with a graphical user interface. The user interface can include icons or buttons. In some embodiments, the software is configured for use with a touch-screen computing device such as a smartphone or tablet.
202
218
202
202
218
c
c
c
The security system can include a motion detector configured to detect the presence of people (e.g., in the outdoor area or room in which the security system is located) or objects. The security system can also be placed outdoors to detect people or objects outside. The motion detector can be an infrared motion detector.
FIGS. 6-10
FIG. 3
202
650
202
300
202
614
202
618
614
618
638
c
c
c
c
As illustrated in , the security system can be attached to a light socket to couple the security system to an electrical power source (e.g., of a building shown in ). The security system can include a screw thread electrical contact , which can comprise a conductive metal. The security system can also include a foot electrical contact , which can comprise a conductive metal. The screw thread contact can be electrically insulated from the foot electrical contact by insulation .
202
650
614
202
650
202
650
202
650
618
202
654
650
202
202
c
c
c
c
c
c
c
The security system can be coupled to the light socket via any number of connection methods. For example, the screw thread contact of the security system can be rotatably attached to the light socket to thereby couple the security system to the light socket . When the security system is coupled to the light socket , the foot contact of the security system can be electrically coupled to the foot contact of the light socket , to thereby couple the security system to the electrical power source (i.e. to energize the security system ).
202
202
650
202
It should also be appreciated that the security system may be implemented with a theft prevention system (not shown). The theft prevention system may be a lock that only authorized users may be able to unlock to thereby remove the security system from the light socket . The lock may be mechanical or electrical, thus allowing the security system to prevent theft.
610
614
618
610
300
202
610
610
202
FIG. 3
c
c.
A power converter can be electrically coupled to the screw thread contact and the foot contact . The power converter can be configured to convert electricity from the building (shown in ) to a type of power that is more suitable for the security system . In some embodiments, the power converter converts an input voltage to a lower voltage and/or converts AC to DC power. Furthermore, it should be appreciated that the power converter can be configured to adapt to the input voltages of any country, and thereby convert the input voltage to a voltage suited for the security system
FIG. 2
204
240
242
240
244
204
244
illustrates a computing device running software. The software includes a user interface displayed on a display screen . The user interface can include a security system indicator , which can indicate the location of the security system that the user interface is displaying. For example, a person can use one computing device to control and/or interact with multiple security systems, such as one security system located at a front door and another security system located at a back door. Selecting the security system indicator can allow the user to choose another security system (e.g., the back door security system rather than the front door security system).
240
248
248
204
202
202
202
202
202
204
202
248
204
c
c
c
c
c
c
The user interface can include a connectivity indicator . In some embodiments, the connectivity indicator can indicate whether the computing device is in communication with a security system, the Internet, and/or a cellular network. The connectivity indicator can alert the user if the computing device has lost its connection with the security system ; the security system has been damaged; the security system has been stolen; the security system has been removed from its mounting location; the security system has lost electrical power; and/or if the computing device cannot communicate with the security system . In some embodiments, the connectivity indicator alerts the user of the computing device by flashing, emitting a sound, displaying a message, and/or displaying a symbol.
a
FIG. 1
202
204
206
240
206
202
204
202
206
202
206
204
204
204
206
202
204
206
c
c
c
c
c
Referring now to , in some embodiments, if the security system loses power, loses connectivity to the computing device , loses connectivity to the Internet, and/or loses connectivity to a remote server, a remote server transmits an alert (e.g., phone call, text message, image on the user interface ) regarding the power and/or connectivity issue. In several embodiments, the remote server can manage communication between the security system and the computing device . In some embodiments, information from the security system is stored by the remote server . In several embodiments, information from the security system is stored by the remote server until the information can be sent to the computing device , uploaded to the computing device , and/or displayed to the remotely located person via the computing device . The remote server can be a computing device that stores information from the security system and/or from the computing device . In some embodiments, the remote server is located in a data center.
204
206
202
204
206
202
204
206
c
c
In some embodiments, the computing device and/or the remote server attempt to communicate with the security system . If the computing device and/or the remote server is unable to communicate with the security system , the computing device and/or the remote server alerts the remotely located person via the software, phone, text, a displayed message, and/or a website.
204
206
202
c
In some embodiments, the computing device and/or the remote server attempts to communicate with the security system periodically; at least every five hours and/or less frequently than every 10 minutes; at least every 24 hours and/or less frequently than every 60 minutes; or at least every hour and/or less frequently than every second.
206
204
202
206
204
202
c
c.
In some embodiments, the server can initiate communication to the computer device and/or to the security system . In several embodiments, the server can initiate, control, and/or block communication between the computing device and the security system
In several embodiments, a user can log in to an “app,” website, and/or software on a computing device (e.g., mobile computing device, smartphone, tablet, desktop computer) to adjust the security system settings discussed herein.
In some embodiments, a computing device can enable a user to watch live video and/or hear live audio from a security system due to the user's request rather than due to actions of a visitor. Some embodiments include a computing device initiating a live video feed (or a video feed that is less than five minutes old).
FIG. 2
240
252
202
252
208
202
206
204
240
256
208
202
204
240
260
202
240
264
268
240
208
202
208
c
c
c
c
c
Referring now to , in some embodiments, the user interface displays an image such as a still image or a video of an area near and/or in front of the security system . The image can be taken by the camera assembly and stored by the security system , server , and/or computing device . The user interface can include a recording button to enable a user to record images, videos, and/or sound from the camera assembly , microphone of the security system , and/or microphone of the computing device . In several embodiments, the user interface includes a picture button to allow the user to take still pictures and/or videos of the area near and/or in front of the security system . The user interface can also include a sound adjustment button and a mute button . The user interface can include camera manipulation buttons such as zoom, pan, and light adjustment buttons. In some embodiments, the camera assembly automatically adjusts between Day Mode and Night Mode. Some embodiments include an infrared camera and/or infrared lights to illuminate an area near the security system to enable the camera assembly to provide sufficient visibility (even at night).
In some embodiments, buttons include diverse means of selecting various options, features, and functions. Buttons can be selected by mouse clicks, keyboard commands, or touching a touch screen. Many embodiments include buttons that can be selected without touch screens.
240
202
204
204
202
c
c.
In some embodiments, the user interface includes a quality selection button, which can allow a user to select the quality and/or amount of data transmitted from the security system to the computing device and/or from the computing device to the security system
204
204
240
In some embodiments, video can be sent to and/or received from the computing device using video chat protocols such as FaceTime (by Apple Inc.) or Skype (by Microsoft Corporation). In some embodiments, these videos are played by videoconferencing apps on the computing device instead of being played by the user interface .
FIG. 2
240
276
202
204
276
202
204
204
202
c
c
c.
As shown in , the user interface can include a termination button to end communication between the security system and the computing device . In some embodiments, the termination button ends the ability of the person located near the security system (i.e., the visitor) to hear and/or see the user of the computing device , but does not end the ability of the user of the computing device to hear and/or see the person located near the security system
276
202
204
276
276
276
276
204
c
In some embodiments, a button is both an answer button (to accept a communication request from a visitor) and a termination button (to end communication between the security system and the computing device ). The button can include the word “Answer” when the system is attempting to establish two-way communication between the visitor and the user. Selecting the button when the system is attempting to establish two-way communication between the visitor and the user can start two-way communication. The button can include the words “End Call” during two-way communication between the visitor and the user. Selecting the button during two-way communication between the visitor and the user can terminate two-way communication. In some embodiments, terminating two-way communication still enables the user to see and hear the visitor. In some embodiments, terminating two-way communication causes the computing device to stop showing video from the security system and to stop emitting sounds recorded by the security system.
240
202
240
202
234
236
236
234
236
234
634
236
234
634
202
c
c
c
In some embodiments, the user interface opens as soon as the security system detects a visitor (e.g., senses indications of a visitor). Once the user interface opens, the user can see and/or hear the visitor. The security system can include a microphone and a speaker to enable the user to hear the visitor and to enable the visitor to hear the user. In this regard, the speaker may be configured to transmit an audible message to the visitor and the microphone may be configured to receive an audible message from the visitor. In some embodiments the speaker and microphone are located within an internal portion of the outer housing . However, in other embodiments, the speaker and microphone are located along an external surface of the outer housing . Thus, the security system can enable the user to communicate with the visitor.
240
204
FIG. 2
Some method embodiments include detecting a visitor with a security system. The methods can include causing the user interface (shown in ) to display on a remote computing device due to the detection of the visitor (e.g., with or without user interaction). The methods can include displaying video from the security system and/or audio from the security system.
202
204
202
202
c
c
c
In some embodiments, the software includes means to start the video feed on demand. For example, a user of the computing device might wonder what is happening near the security system . The user can open the software application on the computing device and instruct the application to show live video and/or audio from the security device even if no event near the security system has triggered the communication.
202
202
204
202
c
c
c
In several embodiments, the security device can be configured to record video, images, and/or audio when the security device detects movement and/or the presence of a person. The user of the computing device can later review all video, image, and/or audio records when the security device detected movement and/or the presence of a person.
a
FIG. 1
206
204
202
206
204
202
c
c.
Referring now to , in some embodiments, the server controls communication between the computing device and the security system , which can include a camera, a microphone, and a speaker. In several embodiments, the server does not control communication between the computing device and the security system
204
206
200
200
206
204
202
c
In some embodiments, data captured by the security system and/or the computing device (such as videos, pictures, and audio) is stored by another remote device such as the server . Cloud storage, enterprise storage, and/or networked enterprise storage can be used to store video, pictures, and/or audio from the communication system or from any part of the communication system . The user can download and/or stream stored data and/or storage video, pictures, and/or audio. For example, a user can record visitors for a year and then later can review the visits from the last year. In some embodiments, remote storage, the server , the computing device , and/or the security system can store information and statistics regarding visitors and usage.
200
202
204
206
202
204
c
c
The communication system can include the security system , the computing device , and/or the server . Some communication systems use many systems to enable communication between the security system and the computing device .
FIG. 3
202
300
310
254
304
202
300
202
300
300
c
c
c
illustrates an embodiment in which a security system is connected to a building , which can include an entryway that has a door . Electrical wires can electrically couple the security system to the electrical system of the building such that the security system can receive electrical power from the building (e.g., via a light socket that is attached to the building ).
308
202
308
308
202
204
204
202
202
c
c
c
c
A wireless network can allow devices to wirelessly access the Internet. The security system can access the Internet via the wireless network . The wireless network can transmit data from the security system to the Internet, which can transmit the data to remotely located computing devices . The Internet and wireless networks can transmit data from remotely located computing devices to the security system . In some embodiments, a security system connects to a home's WiFi.
FIG. 3
204
202
204
202
c
c.
As illustrated in , one computing device (e.g., a laptop, a smartphone, a mobile computing device, a television) can communicate with multiple security systems . In some embodiments, multiple computing devices can communicate with one security system
202
230
306
306
c
In some embodiments, the security system can communicate (e.g., wirelessly ) with a television , which can be a smart television. Users can view the television to see a visitor and/or talk with the visitor.
204
202
204
202
204
202
236
202
202
234
202
204
c
c
c
c
c
c
As well, in some embodiments, the visitor and user of the remote computing device are able to talk with each other, via the security system and the remote computing device . For example, the security system may be configured to transmit a first audible message to the visitor. The first audible message may be received by a microphone in the remote computing device and transmitted to the security system . In this regard, the first audible message may be audibly transmitted to the visitor via the speaker in the security system . As well, the security system may be configured to transmit a second audible message to a user of the remote computing device . The second audible message may be received by the microphone in the security system and transmitted to the remote computing device. In this regard, the second audible message may audibly transmitted to the user via a speaker in the remote computing device .
FIG. 4
a
FIG. 1
a
FIG. 1
650
650
652
614
202
650
654
618
202
654
650
650
c
c
illustrates a perspective view of a light socket . The light socket can include a screw thread contact configured to mechanically and electrically couple with the screw thread contact of the security system (shown in ). The light socket can also include a foot contact configured to electrically couple with the foot contact of the security system (shown in ). The foot contact of the light socket can be located at the distal end of the light socket .
202
208
202
202
618
202
202
202
618
654
650
202
654
650
608
654
650
202
202
650
c
c
c
c
c
c
c
c
c
In some embodiments, the security system can be described as having a proximal end and a distal end that is opposite the proximal end. The camera assembly can be located at the distal end of the security system . The security system can include the foot electrical contact located at the proximal end of the security system . In order to energize the security system , the security system can be oriented such that the foot electrical contact faces the foot contact of the light socket . In this manner the distal end of the security system faces away from the foot contact of the light socket . As well, the camera assembly can face away from the foot contact of the light socket . Once the security system is oriented in this manner, the security system can be attached to the light socket .
202
650
202
690
266
202
650
654
650
202
654
650
654
650
618
202
c
c
c
c
c
FIG. 6
In some embodiments, the security system is rotated as it is attached to the light socket . As shown in , the security system can be rotated in a direction of rotation about a first axis to thereby attach the security system to the light socket . As such, the foot contact of the light socket can be electrically coupled to the security system . Furthermore, in many embodiments the foot contact of the light socket is electrically coupled to a light switch (not shown). In this manner, the foot contact of the light socket , and the foot contact of the security system can be energized, when the light switch is activated (i.e. turned on).
FIG. 5
656
650
656
illustrates a perspective view of a light bulb mechanically and electrically coupled to the light socket . The light bulb can be removed and replaced by a security system that comprises lights and a camera.
FIG. 6
FIG. 3
202
202
650
202
300
202
650
202
300
c
c
c
c
c
illustrates a perspective view of the security system just before the security system is screwed into the light socket to mechanically couple the security system to a wall and/or to a building . Screwing the security system into the light socket also enables the security system to receive electricity from the building (shown in ).
650
650
In embodiments, the light socket may be compatible with any number of standards for socket sizes. For example, the light socket may use the Edison screw E26 or E27 standard or a bayonet mount. Various voltages may be carried to provide electrical power to the security system (e.g., 100V to 240V) depending on the local electrical standards.
a
FIG. 7
202
650
202
300
650
c
c
illustrates the security system screwed into the light socket . In this configuration, the security system is electrically coupled to a power supply of the building . The light socket can be located indoors or outdoors.
FIG. 8
202
626
630
208
266
614
208
208
634
c
illustrates a perspective view of the security system . Not all of the lights , are labeled to clarify other features. The camera assembly can be aligned with a central axis of the screw thread contact . The camera assembly can include a fisheye lens. The camera assembly can also include a cone-shaped mirror to enable viewing 360 degrees around the camera and/or around the outer housing . Software can be used to convert videos and/or pictures taken using the cone-shaped mirror into different formats (e.g., that are easier for users to interpret and/or include less distortion).
FIGS. 9 and 10
a
b
FIGS. 1, 1
FIG. 9
202
202
3
8
202
650
202
690
266
202
650
202
208
266
d
c
d
d
d
d
d
illustrate a security system that can include any of the features described in the context of the security system shown in and -. The security system , as shown in , can also be configured to screw into the light socket . In this manner, the security system can be rotated in a direction of rotation about a first axis to thereby attach the security system to the light socket . The security system can include a camera assembly that faces a radial direction that is perpendicular to the first axis .
FIG. 9
202
218
300
218
202
218
618
202
d
d
d
c
d
c.
As shown in , the security system can include a motion detector configured to detect visitors (e.g., people moving outside of a building , people moving inside of a room). The motion detector can be located at the distal end of the security system such that the motion detector faces away from the foot contact of the security system
202
658
208
658
208
634
202
658
634
658
266
614
d
d
d
d
Furthermore, the security system can include a rotatable camera housing . A camera assembly can be coupled to the rotatable camera housing such that the camera assembly rotates around the perimeter of the outer housing of the security system as the camera housing rotates around the perimeter of the outer housing . The camera housing can rotate around a central axis of the screw thread contact .
658
202
218
218
202
658
208
c
d
d
c
In some embodiments, the camera housing can rotate in response to an event, such as a person entering a room, outdoor area, or space adjacent to the security system . For example, the motion detector can detect the person(s), such as the visitor(s), and in response to the motion detector detecting the person(s), the security system can cause the camera housing to rotate to a position whereby the camera assembly can record an image and/or video of the person(s).
658
658
202
658
c
The camera housing can be rotated via any number of rotation methods. In some embodiments, the rotation of the camera housing is caused by a command from a remote computing device, such as a smart phone, tablet, or other cellular device. For example, a user of the remote computing device can input a command into an app that is run on the remote computing device. The command can then be transmitted from the remote computing device to the security system , to thereby rotate the camera housing .
658
680
202
634
658
658
266
658
658
658
658
202
202
218
202
208
208
202
658
202
208
266
208
c
c
c
d
c
c
c
Describing the camera housing differently, the sidewall of the security system can comprise a first portion, such as an outer housing , and a second portion, such as a rotatable camera housing , which is distal to the first portion. The second portion, or rotatable camera housing , can be rotatable about the first axis . The camera housing can be manually rotated by the user. For example, the user can grip the camera housing with his or her hand and rotate the camera housing to a desired position. As well, the camera housing can be rotated by the security system , such as, in response to an event. For example, when the security system detects the visitor, via the motion detector , the security system can then determine whether the visitor is located within a field of vision of the camera . Accordingly, in response to determining that the visitor is not located within the field of vision of the camera , the security system can rotate the second portion, or camera housing . Furthermore, the security system can rotate the camera about the first axis until the visitor is within a field of vision of the camera .
202
204
658
204
204
202
208
266
204
658
208
c
c
Additionally, the security system may be configured to receive an instruction from a remote computing device . The instruction may include a command to rotate the second portion, or camera housing , to any location as determined by the user of the remote computing device . Accordingly, in response to receiving the instruction from the remote computing device , the security system may be configured to rotate the second portion such that the camera rotates about the first axis . As such, the user of the remote computing device may be able to remotely rotate the camera housing to thereby change the field of vision of the camera .
202
234
202
202
626
202
202
d
d
d
d
d.
The security system can use a microphone to listen for visitors. When the security system detects visitors (e.g., via motion or sound), the security system can turn on LED lights , record sounds from the visitors, and/or take videos of the visitors. In some embodiments, the security system records when visitors move by the security system
FIG. 10
202
650
202
d
d
illustrates a perspective view of electrical contacts. Connecting the security system to the light socket can enable the security system to be electrically connected to a power supply.
FIG. 11
FIG. 12
202
670
662
202
614
c
c
illustrates a side view of a security system with a cone-shaped mirror . Supports can extend from an end of the security system that is opposite an end that includes the screw thread contacts (labeled in ).
FIG. 12
670
208
202
202
202
204
206
202
c
c
c
c.
illustrates a perspective view of the security system with a cone-shaped mirror . The camera assembly can include a camera that is oriented towards the cone-shaped mirror to enable the security system to record visitors in many directions around the security system . Software can be used by the security system , the remote computing device , and/or the server to reduce and/or eliminate distortion in pictures taken using the security system
a
FIG. 13
202
208
208
208
228
228
e
e
e
e
illustrates a side view of a security system with a dome camera assembly . The dome camera assembly can have a shape that is half of a sphere. In some embodiments, the dome camera assembly includes an outer cover that has a curved and/or spherical shape (e.g., half of a sphere). The cover can be a translucent material such as plastic and/or polycarbonate.
238
208
238
228
266
614
238
228
238
266
614
238
266
238
692
694
692
693
692
694
208
650
694
694
266
e
g
g
g
g
g
g
g
g
a
FIG. 13
b
e
FIGS. 13-13
b
FIG. 13
b
e
FIGS. 13-13
e
FIG. 13
e
FIG. 13
e
FIG. 13
e
FIG. 13
The field of vision of the dome camera assembly can include half of a sphere. In some embodiments, the field of vision includes approximately 360 degrees around the base of the cover and/or around a central axis of the screw thread contacts . In several embodiments, the field of vision includes at least 330 degrees around the base of the cover . In some embodiments, the field of vision is approximately 180 degrees in a plane that includes the central axis of the screw thread contacts (e.g., in the plane represented by the page on which appears). In several embodiments, the field of vision is at least 140 degrees and/or less than 260 degrees in a plane that includes the central axis . further illustrate the field of vision in various embodiments. With specific reference to , the field of vision can be defined by a vertical field of vision and a horizontal field of vision . The vertical field of vision can be any angle less than 180 degrees (as shown by the distal plane ), such as 140 degrees. Because are side views, the horizontal field of vision and the vertical field of vision are actually radial, meaning that they extend 360 degrees around the perimeter of the camera assembly . This 360 degree periphery is further illustrated in . is a top down view, looking from above the security system (when it is mounted to the light socket ) to the ground below the security system. shows that the horizontal field of vision , actually covers 360 degrees around the perimeter of the security system and the axis . While the vertical field of vision is not illustrated in , the vertical field of vision is also radial, in that it covers the 360 degree area around the security system.
202
208
693
h
h
c
FIG. 13
The security system illustrated in may define a 180 degree vertical field of vision, which means that the camera assembly is able to see anything that is level with or below the distal plane .
d
FIG. 13
d
FIG. 13
d
FIG. 13
202
692
208
208
209
208
202
208
j
j
j
j
j
j
j
j
Furthermore, as shown in , the security system may be configured to achieve a vertical field of vision that is greater than 180 degrees. For example, some embodiments may have a vertical field of vision equal to at least 250 degrees, up to 250 degrees, up to 280 degrees, and in some embodiments, up to 300 degrees. (It should be appreciated that in some embodiments that utilize multiple cameras, a vertical field of vision of up to 360 degrees may be achieved.) In the embodiment shown in , to accomplish a vertical field of vision greater than 180 degrees, the camera assembly may be configured to move vertically downward. Specifically, the camera assembly may be configured to move along a camera assembly direction of movement , as shown in . In this regard, the camera assembly may thereby gain separation from the distal end of the security system . This may allow the camera assembly to achieve a greater line of sight past the sidewalls in the upward, or proximal, direction.
208
209
208
208
209
208
209
208
209
208
208
h
h
h
h
h
h
h
h
h
h
h
It should be appreciated that various methods may be used to retain the camera assembly at various locations along the camera assembly direction of movement . In some embodiments, the camera assembly may be configured to engage mechanical latches to secure the camera assembly at discrete locations along the direction of movement . In some embodiments, the camera assembly may be configured to be retained at any location along the direction of movement via friction. In some embodiments, the camera assembly may be threadably engaged and disengaged at various locations along the direction of movement . As well, once the camera assembly has been moved to its desired vertical position, the camera assembly is still thereby mechanically and electrically coupled to the security system.
208
209
208
204
208
209
208
208
218
208
208
h
h
h
h
h
h
h
h
h
c
d
FIGS. 13and 13
d
FIG. 13
As well, it should be appreciated that the camera assembly may be vertically moved along the direction of movement in response to any command or manual movement. For example, the camera assembly may be moved in response to a command from a remote computing device . As well, the camera assembly may be moved along the direction of movement in response to detecting a visitor. For example, the camera assembly may be positioned in a retracted position, whereby the camera assembly is located substantially within the security system as shown in . Accordingly, in response to the motion detector detecting a visitor, the camera assembly may then move to an extended position (as shown in ) to capture a greater vertical field of vision than in the retracted position. Moreover, the camera assembly may be manually moved by a user.
FIG. 14
a
FIG. 13
202
208
202
614
e
e
e
illustrates a perspective view of the security system from . The dome camera assembly can be used with any of the security systems described herein. The security system can include lights (e.g., LEDs) on an end that is opposite the end that includes the screw thread contacts .
202
202
202
202
202
202
202
202
202
c
d
e
c
d
e
c
d
e
Any of the security systems described herein can use the methods and systems described in U.S. Nonprovisional patent application Ser. No. 14/463,548; filed Aug. 19, 2014; and entitled DOORBELL COMMUNICATION SYSTEMS AND METHODS; the entire contents of which are incorporated herein by reference. For example, the grid sensor methods can be used with security systems , , and . The security system embodiments described in U.S. Nonprovisional patent application Ser. No. 14/463,548 can be replaced with security systems , , and . Security systems , , and can be used in the context of the security systems described in any of the patent applications incorporated by reference.
240
242
204
FIG. 2
Many of the camera assemblies described herein can be mounted in diverse orientations. The mounting orientations might not be ideal viewing orientations. Embodiments can include changing the viewing orientations (e.g., viewing angles) via software (e.g., an “app”) and/or via a user interface on a display screen of a computing device (see ).
240
Cameras can be mounted in a lamp, jutting out of a wall (e.g., horizontally), and upside down (e.g., hanging down from a ceiling). The software and/or user interface can enable users to select a button to adjust the viewing orientation a certain amount (e.g., 90 degrees).
FIG. 15
FIG. 15
FIG. 16
FIG. 16
240
252
242
204
204
252
252
204
illustrates a user interface . The image in is oriented as a landscape, which can span entire viewing portion of the display screen of the remote computing device . The user can adjust the viewing orientation by selecting an orientation button (not shown), or simply by rotating the remote computing device to the position of the desired orientation (e.g. if you want to view portrait, just the remote computing device rotate by ninety degrees as shown in ). Accordingly, in some embodiments, selecting the orientation button shifts the image ninety degrees. illustrates the new orientation of the image after selecting the orientation button, or rotating the remote computing device to the desired orientation.
252
274
In some embodiments, the security system automatically detects the orientation in which the camera is inserted into a light socket. The security system can then automatically adjust the viewing orientation in response to the detected orientation (e.g., so the image appears right-side up). The security system can detect the inserted orientation via an accelerometer .
204
204
a
FIG. 1
Many embodiments may utilize the visitor identification abilities of the person using the remote computing device (shown in ). Various technologies, however, can be used to help the user of the remote computing device to identify the visitor. Some embodiments use automated visitor identification that does not rely on the user, some embodiments use various technologies to help the user identify the visitor, and some embodiments display images and information (e.g., a guest name) to the user, but otherwise do not help the user identify the visitor.
a
FIG. 1
208
208
Referring now to , the camera assembly can be configured to visually identify visitors through machine vision and/or image recognition. For example, the camera assembly can take an image of the visitor. Software run by any portion of the system can then compare select facial features from the image to a facial database. In some embodiments, the select facial features include dimensions based on facial landmarks. For example, the distance between a visitor's eyes; the triangular shape between the eyes and nose; and the width of the mouth can be used to characterize a visitor and then to compare the visitor's characterization to a database of characterization information to match the visitor's characterization to an identity (e.g., an individual's name, authorization status, and classification). Some embodiments use three-dimensional visitor identification methods.
208
208
202
c
Some embodiments include facial recognition such that the camera assembly waits until the camera assembly has a good view of the person located near the security system and then captures an image of the person's face.
Several embodiments can establish a visitor's identity by detecting a signal from a device associated with the visitor (e.g., detecting the visitor's smartphone). Examples of such a signal include Bluetooth, WiFi, RFID, NFC, and/or cellular telephone transmissions.
650
300
202
202
204
204
c
c
Furthermore, many embodiments can identify an identity of a visitor and determine whether the visitor is authorized to be located in a predetermined location. For example, the light socket may be located in a room inside a building . The security system can determine whether the visitor is authorized to be located in the room. In response to determining that the visitor is not authorized to be located in the room, the security system can transmit an alert to the remote computing device to notify a user of the remote computing device that the visitor is not authorized to be located in the room.
202
300
202
202
c
c
c
In some embodiments, the security system may be located outside of a building , for example, near a swimming pool. Accordingly, the security system may be used to determine the identity of the visitor and thereby determine whether the visitor is authorized to be located near the swimming pool. This may allow the user to monitor the swimming pool to determine if small children and/or any other unauthorized people approach the swimming pool. In effect, the security system can be used as a safety monitor.
202
202
236
202
202
204
204
202
202
c
c
c
c
c
c
Furthermore, the security system can also sound an audible message to warn the visitor that he or she is not authorized to be located in the room or outdoor area (e.g. swimming pool). For example, in response to determining that the visitor is not authorized to be located in the room or outdoor area, the security system may broadcast a predetermined audible message, via the speaker in the security system , to notify the visitor that the visitor is not authorized to be located in the room or outdoor area. The security system may also be configured to allow the user of the remote computing device to speak to the visitor that is not authorized to be located in the room or outdoor area. For example, if the user's child has approached the swimming pool, the user may speak a message into the remote computing device , which may then be transmitted to the security system and sounded via the speaker in the security system (e.g. “Mitch, you are not allowed to be in the swimming pool after dark.”).
202
202
202
300
c
c
c
Embodiments of the security system , may also save a history of times when the visitor was detected in the room or outdoor area by the security system . It should be appreciated that this may also be used for a variety of purposes. For example, the user may have a dog walker walk the user's dog when the user is gone at work. In this manner, the security system may be configured to save a history of times when the dog walker arrives at the building , which may allow the user may be able to oversee and determine if the dog walker is walking the user's dog as promised. This may be helpful when the user pays the dog walker's invoice. The user can review the history to determine whether the dog walker's visits to the buildings match the invoiced dates. The person of ordinary skill in the art will recognize a variety of situations to utilize this technology.
202
202
204
204
204
c
c
As well, the security system may take action in response to determining that the visitor is authorized to be located in the room. For example, the security system may transmit a second alert to the remote computing device , wherein the second alert notifies the user of the remote computing device that the visitor is located in the room. In some embodiments, the second alert may also notify the user of the remote computing device that the visitor is authorized to be located in the room.
204
204
In order to determine the identity of the visitor, the security system may utilize any technology capable of identifying a person or a remote computing device, such as facial recognition of a visitor, near field communication of a remote computing device (e.g. identifying a remote computing device associated with the visitor via Bluetooth), and the like.
1700
202
1800
1802
204
1804
204
1806
202
FIG. 17
FIG. 18
It should be appreciated that this disclosure includes a variety of methods of using the security system to detect visitors, like the visitor shown in . For example, as illustrated in , some methods include using the security system to detect a visitor (at step ), and using the camera to take video of the visitor (at step ). As well, some embodiments include transmitting the video to a remote computing device (at step ) and displaying the video on the remote computing device (at step ). This may effectively allow a remote user to monitor the activity around the security system .
FIG. 19
FIG. 19
202
618
202
654
650
1900
202
650
1902
618
202
654
650
202
As shown in , some methods may include orienting the security system such that the foot contact of the security system faces a foot contact of the light socket (at step ). further illustrates a method that may include attaching the security system to the light socket (at step ) and electrically coupling foot contact of the security system to the foot contact of the light socket . This electrical coupling may thereby energize the security system to power all of the onboard components.
FIG. 20
202
202
2000
202
204
2002
202
2004
shows a method that includes using the security system to determine whether the visitor is authorized to be located in a room or in a space that the security system is monitoring (at step ). In response to determining that the visitor is not authorized to be located in the room or the space, the method may further include using the security system to transmit an alert to a remote computing device (at step ). The alert may be a warning message, such as a text message or email, which warns the user that the unauthorized visitor is located in the room or space. Accordingly, some methods may further include using the security system to determine the identity of the visitor, for example, via facial recognition or detecting a smart phone through NFC (at step ). As well, the identity of the visitor may be included in the alert that is sent to the remote user. For example, if the security system detects an unauthorized user, such as a toddler, near a swimming pool, the alert might say, “Timmy is located near the pool.”
FIG. 21
2100
202
202
236
As shown in , in response to determining that the visitor is not authorized to be located in the room or space, such as near or in the swimming pool, some methods may further include using the security system to broadcast a predetermined audible message (at step ). Using the example in the previous paragraph to further illustrate, when the security system detects the toddler near the swimming pool, the security system might sound an audible message via the speaker , such as, “PLEASE MOVE AWAY FROM THE POOL!”
202
2200
234
204
202
236
202
204
2202
234
202
204
236
204
Various methods may enable the visitor and remote user to communicate to each other through the security system . For example, some methods may include transmitting a first audible message to a visitor (at step ). In execution, the first audible message may be received by a microphone in the remote computing device and transmitted to the security system . As well, the first audible message may be audibly transmitted to the visitor via the speaker in the security system . As well, methods may include transmitting a second audible message to a user of the remote computing device (at step ). The second audible message may be received by the microphone in the security system and transmitted to the remote computing device . The second audible message may be audibly transmitted to the user via a speaker in the remote computing device .
218
2300
202
2302
626
630
208
2304
As well, methods may include using the motion detector to detect the visitor (at step ) and using the security system to determine whether the field of vision of the camera is illuminated (at step ). In response to detecting the visitor and in response to determining that the field of vision is not illuminated, the method may further include illuminating the light and/or and using the camera to record a video of the visitor (at step ).
FIG. 24
2400
204
202
2402
204
2404
204
202
626
630
2406
234
202
2408
202
626
630
2410
234
202
2412
202
626
630
2414
As illustrated in , methods may include receiving a first instruction from the remote computing device (at step ). In response to receiving the first instruction from the remote computing device , methods may include using the security system to illuminate the light (at step ). As well, some methods may include receiving a second instruction from the remote computing device (at step ). In response to receiving the second instruction from the remote computing device , methods may include using the security system to de-activate the light and/or (at step ). Methods may also include receiving a first audible instruction via the microphone of the security system (at step ), and in response to receiving the first audible instruction from the visitor, the method may include using the security system to illuminate the light and/or (at step ). As well, some methods may include receiving a second audible instruction via the microphone of the security system (at step ) and in response to receiving the second audible instruction from the visitor, the method may include using the security system to de-activate the light and/or (at step ).
FIG. 25
202
280
202
654
650
2500
202
266
202
650
2502
618
202
654
650
2504
218
2506
202
238
208
2508
238
208
202
208
266
238
208
2510
illustrates a method that includes orienting the security system such that the proximal end of the security system faces a foot contact of a light socket (at step ) and thereby rotating the security system about a first axis to thereby attach the security system to the light socket (at step ). The method may also include electrically coupling the foot contact of the security system to the foot contact of the light socket (at step ). Methods may include using the motion detector to detect the visitor (at step ) and in response to detecting the visitor, the methods may include using the security system to determine whether the visitor is located within a field of vision of the camera (at step ). In response to determining that the visitor is not within the field of vision of the camera , methods may include using the security system to rotate the second portion such that the camera rotates about the first axis until the visitor is within a field of vision of the camera (at step ).
FIG. 26
FIG. 27
202
204
2600
658
204
204
208
266
2602
2700
Furthermore, as shown in , methods may include using the security system to receive an instruction from a remote computing device (at step ). The instruction may comprise a command to rotate the second portion, or camera rotatable housing . In response to receiving the instruction from the remote computing device , the method may include using the security system to rotate the second portion such that the camera rotates about the first axis (at step ). As well, as illustrated in , some methods may include a first and second camera, and the methods associated may thereby include pivoting the second camera along at least a first direction and a second direction that is perpendicular to the first direction (at step ).
202
234
202
The security system , or light socket camera, may also be configured to monitor a space by audibly detecting various sounds within the space. The sounds may be adverse sounds, which may include breaking glass, gunshots, shouting, screaming, and the like. In response to detecting the adverse sound(s) via the microphone , the security system may be configured to notify a party of the adverse sound(s). It should be appreciated that the adverse sound may comprise any type of sound to indicate that someone or something is in need of help, that a problem has occurred, a crime is being committed, and the like.
a
b
FIGS. 28, 28
29
30
2800
2900
2801
2800
202
2804
2902
2804
202
204
2804
2804
2800
As illustrated in , and , the disclosure includes a method for detecting an adverse sound (at step ). In response to detecting the adverse sound , the method may include using the security system to notify a party (at step ). The party to be notified may be any party that a user of the security system may wish to contact, such as the user herself, or any contact listed on the user's contact list, such as a contact list stored within the user's remote computing device . As well, the party may be an emergency dispatcher, such as a 9-1-1 dispatcher (in the U.S.) or a dispatcher who responds to any emergency (in the U.S. or any other country). Generally, it should be appreciated that the party may be any party who may be interested in the occurrence of the adverse sound .
202
2804
202
204
2804
202
204
202
204
262
202
202
300
The security system may notify the party by sending a notification from the security system to a computing device associated with the party . The security system may transmit the notification through any wireless or wired technology. For example, the computing device may receive the notification via a wireless technology such as radio frequency, WiFi (e.g., wireless local area network), cellular, Internet, Bluetooth, telecommunication, electromagnetic, infrared, light, sonic, and microwave. In this manner, the security system may wirelessly communicate with the computing device via the communication module of the security system , which may be configured to connect to a wireless communication network. Furthermore, the security system may transmit the notification through a wired technology, such as through the copper wires within the building , which may comprise a wired network. As well, the wired technology may include fiber-optics, Ethernet, telephone (e.g. digital subscribe line “DSL”), cable, and the like. In various embodiments, the wired technology can include Power-line communications through a home network. Various standards may be used such as IEEE 1901 or HomePlug AV.
2800
208
202
202
202
202
2812
2814
2800
204
c
FIG. 28
As well, in response to detecting the adverse sound , the method may further include using the camera of the security system to record one of an audio and video of an area adjacent the security system . As shown in , upon the security system detecting the adverse sound, the security system may then capture a video or an audio recording of an event in an area adjacent the adverse sound . The video and/or audio may be entered as evidence for a criminal investigation, or to determine liability in the event of a personal injury lawsuit. Upon capturing one of the audio and/or video, the method may further include transmitting the audio and/or video to the remote computing device .
2800
202
236
2800
204
2800
2800
2800
202
Aside from documenting the area adjacent the adverse sound , the security system may also audibly sound a warning message through the speaker . The warning message may be an audible warning to alert any person or animal within the area of the adverse sound to leave the area or perhaps that help is on the way. Once the warning message has been sounded, two-way communication may be conducted between a user of a remote computing device , who is remotely located from the adverse sound , and a person or animal located nearby the adverse sound . In this manner, if a person is hurt on the ground near where the adverse sound was detected, the user may alert the hurt person that help is en route. It should also be appreciated that in response to detecting the adverse sound , the security system may perform any other function such as flashing a warning light, perhaps to scare away perpetrators.
202
2800
202
2800
300
2800
202
2818
2800
2804
2800
202
202
234
The security system may also be configured to determine logistical information, which may be helpful to an emergency dispatcher. For example, in response to the adverse sound , the security system may determine a location of the adverse sound with respect to its location inside or outside of the building . In response to determining the location of the adverse sound , the security system may transmit a notification of the location of the adverse sound to the party . This may be helpful to emergency personal in order to locate the site of the adverse sound , which may indicate the location of the victim, perpetrator, etc. In another example, the security system may interface with existing law enforcement gunshot location systems to better triangulate the position of a gunshot for law enforcement authorities, even if the gunshot did not occur within the vicinity. Components of the security system may be customized depending on the primary application. For example, if detecting gunshots, then the microphone may need increased microphone sensitivity in lower frequencies.
e
FIG. 28
2800
2800
202
2800
202
2800
2800
2800
2804
204
204
2804
2800
With reference to , the method may include determining a type of the adverse sound , such as determining whether the adverse sound comprises a gunshot, scream, etc. In this regard, the security system may include an internal processor to digitally analyze the adverse sound to determine the type of adverse sound. In some embodiments, the security system may transmit a digital signal, which represents the adverse sound , to an external processor to be digitally analyzed to determine the type of adverse sound. Upon determining the type of adverse sound , the type of adverse sound may then be communicated to the party , via the remote computing device . It should be appreciated that the notification as sent to the remote computing device may be a text message, a phone call (such as a pre-recorded message), or any type of communication that notifies the party of the adverse sound and/or the type of the adverse sound.
202
2800
2800
2804
As well, the security system may also be configured to determine other biographical information such as a time of day that the adverse sound was detected. In response to determining the time of day of the adverse sound , transmitting a notification of the time of day to the party .
f
FIG. 28
202
203
2800
2800
202
203
202
As illustrated in , methods may include interaction between two security systems, whereby a first security system notifies a second security system of the adverse sound . For example, in response to detecting the adverse sound , the method may include using the first security system to initiate an event at a second security system communicatively coupled to the first security system .
203
202
203
236
203
203
203
The second security system may perform any event that may be performed by the first security system . For example, the second security system may sound an audible message through a speaker of the second security system . As well, the second security system may flash a warning light, such as an LED, located on the second security system .
203
203
203
202
203
2800
202
203
202
204
204
202
202
2800
202
In response to either sounding the audible message or flashing the warning light, the second security system may also be configured to use a motion detector of the second security system to detect a motion of a user within an area of the second security system . In this manner, the first security system , via the second security system , may detect whether the user responds to the event or notification of the adverse sound as detected by the first security system . If the second security system does not detect motion of the user, the first security system may initiate other events, such as an event at a third security system, not shown, or an event at a remote computing device , such as a text message at a remote computing device . The first security system may continue initiating events until the first security system receives confirmation that a user is aware of the adverse sound as detected by the first security system .
203
236
2800
202
202
203
202
203
2800
203
203
The second security system may also audibly project, via the speaker , specific information relating to the adverse sound as detected by the first security system . As such, the first security system may be communicatively coupled to the second security system , and the first security system may communicate information to the second security system , such as the type of adverse sound , the location of the sound, time, etc. For example, in response to a window pane being broken at a back door, the second security system may project a message, “Broken glass detected at the back door!” In this regard, the second security system may notify a user of the type of adverse sound detected, and also the location of the adverse sound.
202
202
202
2800
2800
202
202
203
2800
202
202
203
202
203
As well, because the first security system may be configured to determine and distinguish various types of sounds, the first security system may also initiate specific events in response to the type of sound detected. For example, the security system may determine whether the adverse sound is a first sound or a second sound. In response to determining the adverse sound is the first sound, the first security system may be configured to initiate a first event at the first security system and/or the second security system . In response to determining the adverse sound is the second sound, the first security system may be configured to initiate a second event at the first security system and/or the second security system . It should be appreciated that the second event may be different than the first event. For example, the first sound may be a shouting noise and the first event may comprise flashing a warning light of the first security system and/or the second security system . As well, the second sound may be breaking glass and the second event may comprise sounding an audible alarm.
202
203
Generally, it should be appreciated that the first security system may be configured to perform specific events in response to specific adverse sounds, as well as instructing the second security system to perform specific events in response to detecting specific adverse sounds.
202
202
204
202
202
2800
202
Moreover, in response to the first security system detecting a first adverse sound, such as crashing noise, the first security system may transmit a text message to the remote computing device to notify the user of the first adverse sound. In response to the first security system detecting a second adverse sound, such as a gunshot, the first security system may notify an emergency dispatcher of the second adverse sound. Generally, in response to any type of adverse sound , the first security system may be configured to perform any of the actions described throughout this disclosure.
202
202
Methods may include detecting audible notifications and establishing communication between two parties via the security system . The security system may also be configured to respond to communication between the two parties in the event of a distress notification.
202
234
202
202
234
234
202
202
202
In some embodiments, the security system may have a detection system that uses the microphone to record a noise and to monitor for an audible notification. The security system may monitor the environment for the audible notification as a passive activity. For example, the security system uses the microphone . The microphone may record sounds at a particular sampling frequency (i.e., the number of times within a defined window of time that a sound is recorded) for a particular duration. The sampling frequency and duration for monitoring the environment may change depending on the preferences of a user. For example, the security system can monitor for an audible notification every second in order to be responsive to a first party. The monitoring may also be restricted during times of the day to save resources. The security system may reduce the sampling during times when residents are not present. For example, when most residents are not at home (e.g., between the hours of 9 AM to 5 PM), the security system can collect audio data less (e.g., every 2 minutes for 10 seconds) frequently than time periods when residents are at home.
202
202
202
The audible notification may include multiple parts such as an audible prompt and a voice command. The audible prompt can be a phrase that prompts the security system to receive the voice command. The audible prompt can also be a series of non-word sounds such as the humming of a song. The audible notification can also include a voice command. One possible voice command can include instructions for the light socket surveillance system to contact the second party. This voice or audible command can be a phrase that is a series of commands that instruct the security system for further action. For example, the voice command can be “call for help”, and the security system may call a number associated with the voice command, for example, an emergency dispatch (e.g. 911) or an emergency contact (e.g. a spouse). The voice commands can be responsive to commands selected from a dictionary of defined commands or can be interpreted based on the context. For example, message, call, and phone, may be used interchangeably. Other synonyms can be determined based on a language thesaurus.
202
202
202
The dictionary of defined commands may be preassigned. For example, the dictionary may be static depending on the security system . In embodiments, the dictionary is dynamic and can incorporate new commands based on usage. For example, if a first party typically uses the command “Phone second home”, then the security system can ask the first party if the first party desires to add the word “phone” to the voice command dictionary. The security system can then ask whether the “phone” command is equivalent to the “call” command. Each instance of these preferences from the first party may be added to a configuration profile of the first party.
202
202
202
202
202
202
202
Generally, the audible notification may be various frequencies of a human voice. For example, the audible notification may include a person speaking a selected sequence of words. For example, the sequence of words, “Hi Max,” may be the audible prompt. The selected sequence of words may be predetermined upon a setup of the security system . The security system may have various profiles selected for members of a household. The security system can have selected sequences of words and voice recognition for each profile. For example, the security system may be configured to detect an audible prompt from a first resident that has the word “Max”, while the audible prompt from the second resident may have the word “Jimmy”. As well, the security system may be configured to respond to one name or word from any resident. For example, the first and second residents may use the phrase, “Hi Max,” which triggers the security system to respond. Generally, it should be appreciated that any word or sequence of words can be used to prompt the security system .
202
202
As a security precaution, speaker recognition may be implemented by the security system . For example, the security system may utilize a combination of frequency estimation, hidden Markov models, Gaussian mixture models, pattern matching algorithms, neural networks, matrix representation, vector quantization, or decision trees.
202
202
202
202
202
202
Additionally, the security system may determine whether the audible notification is present. The security system may have a margin of error in both the speaker identity and the speech recognition. In various implementations, the security system may utilize a threshold for both the speaker identity and speech recognition. For example, if the security system determines a 90% match for the word “Computer”, but only a 20% match for the identity of the speaker for the profile, and the threshold is a 60% match for identity, then the security system determines that there is no audible notification. In embodiments, the audible notification can be interchangeable for different profiles. For example, the first resident may have an audible prompt of “Max” while the second resident may have an audible prompt of “Jimmy”. The first resident may use the same audible prompt as the second resident and the security system may recognize the audible prompt for both.
202
208
202
The security system may determine whether there is a secondary notification present. The secondary notification may be determined by any input, for example, auditory, visual, chemical sensing, or tactile. Thus, the secondary notification may be a hand waving motion sensed by a camera assembly . For example, the secondary notification can be an image of the first party reaching up at the camera or gesturing to call the second party. Various gestures may be programmed into the security system and calibrated by the first party. The secondary notification may include various smells determined by a chemical sensor (e.g., perfume to detect the presence of a particular person, or a carbon monoxide sensor to detect fire). The secondary notification may include the first party striking a wall multiple times which may cause pressure-sensitive sensor assembly of the security system to read a particular pattern of the striking.
202
202
The secondary notification may also be audio-based. An audio-based notification may be different than an audible notification in that the secondary notification is not a recognized voice command or audible prompt. For example, the secondary notification can be a distress call (e.g., a groan, moan, scream, or crying). The secondary notification can also be calibrated with environmental sounds. For example, a baby crying may be vocally distinguishable from a cry for help from an adult. The security system can use calibrated settings from the first party or a library of sound profiles that indicate distress. Certain words, when used in repetition, may also indicate a secondary notification such as “Help help help!” The security system may store the sound profiles locally for fast access or access the sound profiles remotely.
202
202
202
202
The security system can further determine whether the first party is in distress. This step may be optional depending on the configuration on the security system . In embodiments, a distress notification is an indication that the first party is injured and requires assistance. The distress notification can be in addition to the audible notification and may be part of the audible notification. The security system may determine that a party is in distress based on elevated vital signs that typically indicates stress in humans. For example, an elevated pulse may indicate stress of a party. An elevated pulse may be monitored through an infrared camera on the security system that is configured to monitor pulse rates and body temperatures. An elevated pulse may be monitored through a tracking device worn by the party. The tracking device can be configured to measure pulse rates and may sync the information over the wireless communication (e.g., Bluetooth™). Alternatively, the tracking device may be configured to communicate a medical emergency when the first party pushes a button. The tracking device may use existing wireless signals in the Industrial, Scientific, and Medical bands of frequencies (e.g., 916 Megahertz).
202
202
202
202
202
202
The security system can also determine that a party is in distress based on the audio-based secondary notification. For example, if the secondary notification is a scream, which typically indicates distress, then the security system can determine that the first party is in distress. The security system may determine that a party is in distress based on fluctuations in the voice of the first party. For example, variations in tone or cadence of a voice may indicate distress at any point in the audible notification. In embodiments, the security system may also monitor the volume, pitch, and cadence of speech in a time period before the party attempts an audible notification. As mentioned herein, the secondary notification may also indicate distress via certain words or sounds. The distress of a party may also be determined by the lack of activity. For example, if the pulse rate or blood pressure of the first party is reduced, then the security system may determine the first party is distressed. Alternatively, the security system may also use the camera to analyze the environment. If the party is lying face down on the floor versus a couch, then this may indicate that the party is in distress.
202
202
202
202
The security system may trigger the recording of the environment as discussed further herein. In embodiments, the security system may continuously record data from the security system whether the first party is in distress or not. Otherwise, the security system recording may be triggered by the party being in distress.
202
202
208
202
208
208
202
202
202
208
202
The security system may use the camera to record at least one of an image and video. For instance, the detection system of the security system includes the camera . Various implementations of the security system include a camera mounted on a sidewall. For example, the sidewall may include a first portion and a second portion that is rotatable with respect to the first portion and the camera is coupled to the second portion. The security system may determine whether the first party is located within a field of view of the camera. The security system , in response to detecting the audible notification and in response to determining that the first party is not located within the field of view of the camera may use the light socket surveillance system to rotate the second portion until the first party is located within the field of view of the camera. Once in the field of view of the camera, the security system can use the camera to record at least one of an image and video and initiate a transmission of at least one of the image and video to a remote computing device associated with the security system .
202
202
202
In response to detecting the audible notification from the first party, the security system may contact a second party. The security system can use various protocols to connect the first party with the second party. For example, telephone communications, cellular network communications, and Voice over IP may be utilized to connect the audio between the first party and the second party. The security system may also be configured to establish both video and audio communications between the first party and the second party. The video can utilize a different communication channel than the audio channel. For example, the audio communication can occur over a wired telephone network while the video communication can occur over a wireless network that further connects to the Internet. In embodiments, communication can be performed over the Internet via data packets using various schemes (e.g., H.264 Scalable Video Coding, cloud-based video conferencing, etc.).
202
202
202
202
In some embodiments, the security system may exchange the readings of the security system with a second party. The detection system of the security system can use the speaker and the microphone to allow the first party and the second party to audibly communicate in real-time. The second party can further ask questions to more accurately determine the status of the first party. For example, the first party and the second party can hold a conversation discussing the events of the day or the second party can inquire as to the state of well-being of the first party if the security system detected distress. The second party can be notified whether the user was in distress and what secondary notifications were present.
202
202
202
202
In embodiments, the security system can initiate a transmission of the noise to a remote computing device associated with the second party. Thus, the second party may also be a remote computing device. The remote computing device may be a computer that monitors various video and audio streams of the security system . For example, the second party may be a security monitoring company, and the remote computing device can be a server that alerts security officers via an application mobile device. The remote computing device can initiate a transmission of at least one of the image and video to a remote computing device associated with the second party. The remote computing device can further respond to image and video. For example, the remote computing device can receive the determination of distress from the security system and dispatch emergency responders immediately to the home with the security system. The remote computing device may have additional capabilities beyond that of the security system such as remote storage, facial recognition, and voice recognition.
202
202
202
202
202
202
The security system can monitor the communication between the first party and the second party. The security system may be configured to detect whether a notification is present from the second party. The notification can be either an audible notification or a secondary notification as discussed herein. If the second party is a human, such as a relative or friend of the first party, then the second party may ascertain the state of health of the first party. The security system can monitor the communication for various audible notifications in order to make it easier for the second party to take actions. For example, if the first party says, “I'm having chest pain and it's difficult to breath” with a second party, then the second party can indicate a variety of audible notifications such as the voice command “Call Ambulance” in order to trigger an action. The security system may initiate a variety of actions. The security system can notify the emergency services, but other types of actions are contemplated. For example, the security system can also notify a neighbor or security officer to inquire further.
202
202
The security system can also be configured to determine an identity of a party based upon any physical attribute, any noise, or any type of device that is associated with the person of the party. For example, the security system can be implemented with any type of identity recognition system, such as voice recognition, which can be used to determine the identity of the party from a noise, such as a speech, scream, etc. Embodiments may be configured to detect and determine the identity of a remote computing device (e.g. Bluetooth™). In determining the identity of a remote computing device, this may determine the identity of the person associated with the remote computing device.
202
The first party can adjust the permission levels to account for emergency override of audible notifications for security system users without a configuration profile (e.g., an emergency contact). In embodiments, the presence of the first party may allow the second party to initiate audible notifications. In the event of a non-speaking first party, a camera can verify the identity of the first party and contact a second party on an emergency contact address list. Thus, the emergency contact address list may also be a list of permitted individuals to use voice commands. It should be appreciated that the second party can be any party described herein such as a security officer, emergency dispatch, a friend, a family member (e.g. spouse), neighbor, coworker, and the like.
FIG. 34
202
3400
202
202
202
3402
3404
202
202
With reference to , the security system , or light socket camera, may further be configured to receive instructions from a user (at step ), such as an audible instruction, and thereby trigger an appliance to perform an operation. For example, the user may audibly instruct the security system to turn on a television. In this manner, the security system may be configured to respond to a predetermined greeting, such as, “Hi Max” or “Hey Max,” or a even predetermined name, such as, “Max.” Audibly speaking the predetermined greeting or name can instruct the security system to perform (via itself) or transmit a command to another appliance (at step ) to perform anything stated after the predetermined greeting or name. In response to transmitting the trigger command to the appliance, the method can also include performing the operation via the appliance (at step ). For example, if a user audibly says, “Hi Max, please unlock the front door,” the security system can transmit a command to a front door lock that is communicatively coupled to the security system . In response to the command being transmitted to the door lock, the door lock can then move to the unlocked position, or if the door lock is already in the unlocked position, the door lock can simply remain in that position.
a
d
FIGS. 31-31
a
b
FIGS. 31and 31
c
FIGS. 31
202
3102
3100
3100
3102
11
3102
202
3106
3106
3106
11
3102
3104
3104
202
3106
3104
31
a
b
b
a
b
d.
illustrate just one of the many examples of how the security system may be used to receive an audible instruction from a user . As shown in , the user may audibly speak an instruction , such as “Hi Max. Turn on entryway lights and turn on TV and set it to channel .” The audible instruction may be received by the security system , at which point it may transmit commands to various appliances. For example, the deactivated television may become activated (activated television ) through a command sent via a wireless or wired connection to the television. Accordingly, the television may set it's input channel to channel , in response to the user's audible instruction . As well, the deactivated light light may become illuminated via the command. Accordingly, the security system may also deactivate the television and light as shown in and
202
Generally, it should be appreciated that the term “operation” can be broadly defined. For example, the term “operation” can include activate, deactivate, illuminate, begin, stop, end, change, pause, record, identify, run, make, detect, and the like. In this regard, the security system can control any number of appliances to perform any type of operation that is within the normal use of the appliance.
202
202
202
Furthermore, the appliance can be any type of appliance that is communicatively coupled to the security system via a wireless connection or a wired connection. For example, the appliance can be a light, lamp, shower, faucet, dishwasher, door lock, garage door opener, door, fan, ceiling fan, coffee maker, alarm clock, stereo, television, digital video recorder, cable box, digital video disc player, compact disc player, toaster, oven, range, microwave, streaming media player (such as Apple TV), HVAC system (heating, ventilating and air conditioning system), telephone, fax machine, shredder, blender, juicer, space heater, thermostat, camera (such as a nanny camera), power tool (such as a table saw, drill, chain saw, etc.), smoke alarm, a second security system (such as a second light socket camera, or a security system that can be plugged directly into a wall outlet), and any appliance that may be electrically coupled to a building or any appliance that may be communicatively coupled to the security system . Specific examples of appliance operations may include closing and/or opening a garage door, turning on and/or turning off a television, pausing a television, setting an input channel of a television to any desired station, changing television volume, making a cup of coffee via a coffee maker, setting a thermostat to a predetermined temperature, unlocking and/or locking a door lock, and the like.
e
f
FIGS. 31and 31
202
202
3108
3108
202
202
3112
3110
202
202
As shown in , the security system may trigger appliances located in different places throughout the house. For example, the security system may receive a second audible instruction , and in response to the instruction , the security system may activate an appliance, such as a light on the security system , within the same room, such as bedroom , and also another appliance, such as living room light , located in a different room. In this regard, the security system may be configured to control multiple appliances simultaneously, all the while the appliances may be located in the same location or different locations. As long as the appliances are communicatively coupled to the security system , then the appliance can be located anywhere.
a
b
FIGS. 32and 32
202
3210
3212
202
3202
3204
3210
3212
202
300
300
202
202
300
a
With reference to , the security system may be located within an enclosed interior portion or along an exterior portion of the building . In this manner, the security system may trigger appliances , located within the interior portion or exterior portion of the building . As well, the security system itself may be located within the interior portion of the building or along the exterior portion of the building . Generally, and regardless of where the security system is located, the security system may be configured to simultaneously trigger appliances located inside the building, while also triggering other appliances located outside of the building .
202
202
202
202
202
Some embodiments of the security system can be configured to trigger appliances after predetermined period of time has passed. For example, the user may audibly instruct the security system to make a cup of coffee in five minutes. Accordingly, the security system may wait five minutes before transmitting the command to the coffee maker. As well, some embodiments may be configured to determine how long it may take to make the cup of coffee and if the it takes two minutes to make the coffee, the security system may transmit the command to the coffee maker in three minutes, which added together with the two minutes to make the coffee will equal five minutes total. However, this is just one of the many examples, and generally, it should be appreciated that the security system may be configured to trigger any appliance after any amount of time and under any logical circumstances.
202
202
202
300
202
202
202
202
In some embodiments the security system may be referred to as a first security system . In this manner, some embodiments also include triggering a second security system , such as a second light socket camera, to determine if another person is present in a different part of the building . For example, the user may instruct the first security system to determine if another person is present in the kitchen. In response to receiving the audible instruction, the first security system may to transmit a command to the second security system to determine whether someone is located within the kitchen. In response to the command, the second security system may use a camera to scan the room and determine whether a person is present. As well, the user may wish to determine the identity of a person that may be present. For example, the audible instruction may further include an instruction to determine an identity of the visitor. In response to determining that the visitor is located within the kitchen, the second security system may determine the identity of the visitor, via any identity detection technology such as facial recognition, iris recognition, retina scanning, smart phone detection, and the like.
202
202
202
202
202
202
Accordingly, the first security system may also be configured to determine the identity of a user or visitor. This technology may be implemented to prevent unauthorized users from activating specific appliances. For example, a parent may restrict a child from watching television. In this manner, the child may not be authorized to watch television at specific hours or at any time of day. In effect, the child may audibly instruct the security system to activate a television. The security system may then determine the identity of the child as being an unauthorized user, and in response to this determination, the security system may not activate the television in conformance with the child's instruction. Alternatively, if an authorized user, such as an adult, were to audibly instruct the security system to activate the television, then upon determining that the adult is in fact an authorized user, the security system may transmit a command to the television to thereby activate the television. It should be appreciated that this feature may be implemented with any desired appliance, such as dangerous appliances, like a power tool.
a
b
FIGS. 33and 33
202
3300
3300
230
304
202
262
230
a
b
With reference to , the security system may transmit commands to any of the appliances , via a wireless or wired connection . For example, the security system may use its communication module to wirelessly transmit the command to the selected appliance via one of Wi-Fi, Bluetooth, radio frequency, Near Field Communication, infrared, and any other wireless technology discussed in this disclosure.
b
FIG. 33
202
262
3300
3300
304
202
300
300
a
b
As shown in , security system may use its communication module to transmit the command to the appliance , via a wire that is electrically and communicatively coupled to the security system . For example, the wired connection may comprise a copper wire located within the building . The copper wire may any type of traditional copper used for conducting electricity and WiFi throughout a building . However, it should be appreciated that the wired communication any type of wired technology as described in this disclosure, such as Ethernet, telephone, and the like.
202
202
202
202
202
202
In some embodiments the security system may be communicatively coupled, via the Internet, to a remote server. In this manner, the security system may communicate with the remote server to thereby transmit the desired command to the appliance via a media access control address (MAC address). In this manner, the remote server digitally encodes the command and transmits the command to the appliance, whereby the appliance performs the desired operation as audibly instructed by the user. Sometimes the Internet connection may be unavailable and the security system may be unable to communicate with the remote server. Accordingly, the security system may still communicate with the desired appliance by transmitting the command from the security system , to a WiFi router, and to the desired appliance. In this regard, the security system is able to communicate to the appliance whether or not an Internet connection exists.
202
202
300
202
202
300
202
202
202
300
The situation may arise where the security system is not communicatively coupled to the appliance within the building, or when the security system is not electrically coupled to the building . In this regard, the security system may perform a check to determine whether connectivity or electricity is available, and in response to determining the security system is not electrically coupled to the building (or communicatively coupled to the appliance), the security system may illuminate a light on the security system to thereby illuminate an area adjacent the light socket camera. The illumination of the light may be performed in response to the audible instruction from the user. However, in some embodiments the light on the security system may automatically be illuminated in response to losing connectivity and/or electricity. This may helpful in the event of a power outage when people are trying to navigate their way around the building .
202
202
202
Embodiments of the light socket surveillance system can be used to determine how many visitors are present within a vicinity of the light socket surveillance system. In doing so, the light socket surveillance system can make various determinations such as whether a party is occurring. For example, in response to the light socket surveillance system determining that the party is occurring, a guardian may thereby receive an alert as to whether a predetermined number of visitors has been met or exceeded within the vicinity.
202
By determining the number of visitors present within a vicinity, the light socket surveillance system can be used to assess threats such as how many perpetrators are present within the vicinity, as well as how many hostages are present within the vicinity. This information can be particular useful to police or military personnel to effectively assess threat levels.
202
202
202
202
202
The light socket surveillance system can be located in any suitable location to thereby detect a number of visitors. In some embodiments the light socket surveillance system can be located inside a home of a homeowner. Accordingly, the particular vicinity that the light socket surveillance can monitor may be a room located inside the home. As well, the light socket surveillance system can be located outside a home of a homeowner, and the vicinity can be an area of an outer premise where the home is located. Generally, it should be appreciated that the light socket surveillance system can be located in any location whereby it would be useful to determine a number of visitors in a location.
202
202
202
The light socket surveillance system can also determine an identity of any of the visitors located within a vicinity of the light socket surveillance system . In order to determine the identity of any of the visitors, the light socket surveillance system can be implemented with facial recognition or any technology capable of determining visitor identity.
202
The light socket surveillance system may also initiate a communication session with a remote computing device. The communication session can comprise any variety of information, such as the number of visitors located within the vicinity, the identity of any of the visitors, whether a party is occurring, etc. The remote computing device can be operated by a homeowner, a resident of the home, a guardian of a resident of the home, a neighbor, and the like.
202
202
202
The light socket surveillance system can also be implemented with an infrared camera that can detect an infrared signature of a visitor. This can be useful if the vicinity is not adequately lit. The light socket surveillance system can determine the presence of unique infrared signatures, which can indicate the number of visitors present within the vicinity of the light socket surveillance system .
Combinations with Embodiments Incorporated by Reference
The embodiments described herein can be combined with any of the embodiments included in the applications incorporated by reference. In various embodiments, the security systems described herein can include features and methods described in the context of security systems from applications incorporated by reference.
None of the steps described herein is essential or indispensable. Any of the steps can be adjusted or modified. Other or additional steps can be used. Any portion of any of the steps, processes, structures, and/or devices disclosed or illustrated in one embodiment, flowchart, or example in this specification can be combined or used with or instead of any other portion of any of the steps, processes, structures, and/or devices disclosed or illustrated in a different embodiment, flowchart, or example. The embodiments and examples provided herein are not intended to be discrete and separate from each other.
The section headings and subheadings provided herein are nonlimiting. The section headings and subheadings do not represent or limit the full scope of the embodiments described in the sections to which the headings and subheadings pertain. For example, a section titled “Topic 1” may include embodiments that do not pertain to Topic 1 and embodiments described in other sections may apply to and be combined with embodiments described within the “Topic 1” section.
Some of the devices, systems, embodiments, and processes use computers. Each of the routines, processes, methods, and algorithms described in the preceding sections may be embodied in, and fully or partially automated by, code modules executed by one or more computers, computer processors, or machines configured to execute computer instructions. The code modules may be stored on any type of non-transitory computer-readable storage medium or tangible computer storage device, such as hard drives, solid state memory, flash memory, optical disc, and/or the like. The processes and algorithms may be implemented partially or wholly in application-specific circuitry. The results of the disclosed processes and process steps may be stored, persistently or otherwise, in any type of non-transitory computer storage such as, e.g., volatile or non-volatile storage.
The various features and processes described above may be used independently of one another, or may be combined in various ways. All possible combinations and subcombinations are intended to fall within the scope of this disclosure. In addition, certain method, event, state, or process blocks may be omitted in some implementations. The methods, steps, and processes described herein are also not limited to any particular sequence, and the blocks, steps, or states relating thereto can be performed in other sequences that are appropriate. For example, described tasks or events may be performed in an order other than the order specifically disclosed. Multiple steps may be combined in a single block or state. The example tasks or events may be performed in serial, in parallel, or in some other manner. Tasks or events may be added to or removed from the disclosed example embodiments. The example systems and components described herein may be configured differently than described. For example, elements may be added to, removed from, or rearranged compared to the disclosed example embodiments.
Conditional language used herein, such as, among others, “can,” “could,” “might,” “may,” “e.g.,” and the like, unless specifically stated otherwise, or otherwise understood within the context as used, is generally intended to convey that certain embodiments include, while other embodiments do not include, certain features, elements and/or steps. Thus, such conditional language is not generally intended to imply that features, elements and/or steps are in any way required for one or more embodiments or that one or more embodiments necessarily include logic for deciding, with or without author input or prompting, whether these features, elements and/or steps are included or are to be performed in any particular embodiment. The terms “comprising,” “including,” “having,” and the like are synonymous and are used inclusively, in an open-ended fashion, and do not exclude additional elements, features, acts, operations and so forth. Also, the term “or” is used in its inclusive sense (and not in its exclusive sense) so that when used, for example, to connect a list of elements, the term “or” means one, some, or all of the elements in the list. Conjunctive language such as the phrase “at least one of X, Y, and Z,” unless specifically stated otherwise, is otherwise understood with the context as used in general to convey that an item, term, etc. may be either X, Y, or Z. Thus, such conjunctive language is not generally intended to imply that certain embodiments require at least one of X, at least one of Y, and at least one of Z to each be present.
The term “and/or” means that “and” applies to some embodiments and “or” applies to some embodiments. Thus, A, B, and/or C can be replaced with A, B, and C written in one sentence and A, B, or C written in another sentence. A, B, and/or C means that some embodiments can include A and B, some embodiments can include A and C, some embodiments can include B and C, some embodiments can only include A, some embodiments can include only B, some embodiments can include only C, and some embodiments can include A, B, and C. The term “and/or” is used to avoid unnecessary redundancy.
While certain example embodiments have been described, these embodiments have been presented by way of example only, and are not intended to limit the scope of the inventions disclosed herein. Thus, nothing in the foregoing description is intended to imply that any particular feature, characteristic, step, module, or block is necessary or indispensable. Indeed, the novel methods and systems described herein may be embodied in a variety of other forms; furthermore, various omissions, substitutions, and changes in the form of the methods and systems described herein may be made without departing from the spirit of the inventions disclosed herein.
BRIEF DESCRIPTION OF THE DRAWINGS
These and other features, aspects, and advantages are described below with reference to the drawings, which are intended to illustrate, but not to limit, the invention. In the drawings, like reference characters denote corresponding features consistently throughout similar embodiments.
a
FIG. 1
illustrates a front view of a communication system, according to some embodiments.
b
FIG. 1
illustrates a front view of a security system, according to some embodiments.
FIG. 2
illustrates a computing device running software, according to some embodiments.
FIG. 3
illustrates an embodiment in which a security system is connected to a building, according to some embodiments.
FIG. 4
illustrates a perspective view of a light socket, according to some embodiments.
FIG. 5
illustrates a perspective view of a light bulb mechanically and electrically coupled to a light socket, according to some embodiments.
FIG. 6
illustrates a perspective view of a security system prior to the security system being mechanically and electrically coupled to the light socket, according to some embodiments.
FIG. 7
illustrates the security system mechanically and electrically coupled to the light socket, according to some embodiments.
FIGS. 8 and 9
illustrate perspective views of security systems, according to some embodiments.
FIG. 10
illustrates a perspective view of electrical contacts, according to some embodiments.
FIG. 11
illustrates a side view of a security system with a cone-shaped mirror, according to some embodiments.
FIG. 12
illustrates a perspective view of the security system with a cone-shaped mirror, according to some embodiments.
a
b
c
d
FIGS. 13, 13, 13, and 13
illustrate side views of security systems with respective dome camera assembly, according to various embodiments.
e
FIG. 13
illustrates a top-down view of a security system with a horizontal field of vision, according to some embodiments.
FIG. 14
illustrates a perspective view of a security system, according to some embodiments.
FIGS. 15 and 16
illustrate a user interface with an adjustable viewing orientation, according to some embodiments.
FIG. 17
illustrates a security system detecting a visitor, according to some embodiments.
FIGS. 18-27
illustrate flow-charts of various methods of using a security system, according to various embodiments.
a
FIG. 28
illustrates a security system detecting a sound, according to an embodiment.
b
f
FIGS. 28-28
a
FIG. 28
illustrate various responses to detecting the sound from , according to various embodiments.
FIGS. 29 and 30
illustrate flow-charts of various methods of using a security system, according to various embodiments.
a
FIG. 31
illustrates a security system detecting an audible instruction, according to an embodiment.
b
f
FIGS. 31-31
a
FIG. 31
illustrate various responses to detecting the audible instruction from , according to various embodiments.
a
b
FIGS. 32and 32
illustrate various embodiments of a security system, first appliance and second appliance being located inside or outside a building, according to various embodiments.
a
b
FIGS. 33and 33
illustrate various embodiments of a security system being connected to an appliance via a wireless connection and a wired connection, according to various embodiments.
FIG. 34
illustrates a flow-chart of a method of using a security system, according to an embodiment. | |
Although she is impressing fans with her moves on the dance floor, Skai admitted that getting up on that stage every week is causing her some anxiety, but mostly is helping her work through it.
Skai also said that her anxiety is somewhat of a new thing. “When I was younger I didn’t really have it. During my teen years I just really started to get anxiety. I would get stage fright when I would do certain speaking engagements and I always would get through them but it was a really nerve-racking and hard thing to do.”
As of now, her friends, family, and fans are what bring her comfort during difficult times, “My friends are my everything. When I feel that anxiety I always call them or text them and they talk me through it.”
It’s pretty grounding to know that stars like Skai also experience mental health issues and are able to share their experiences to help bring awareness.
BuzzFeed Daily
Keep up with the latest daily buzz with the BuzzFeed Daily newsletter!
Entertainment
These Disney Characters Have The Same Name — Which Character Is The Best?
Entertainment
Frida Kahlo review – portrait of the intriguing Mexican painter | Documentary films
Having gone quiet for a few months since lockdown, the reliably informative Exhibition on Screen series returns with a profile of Frida Kahlo, the Mexican painter who has long been venerated as a pioneer of feminist iconography as well as a champion of the country’s indigenous culture. While the series tends to use large-scale exhibitions as a cue, this film spends only brief periods inside a gallery spaces – primarily the Museo Dolores Olmedo in Mexico City, which holds significant amounts of Kahlo’s work, as well as her husband’s Diego Rivera. Instead, we get a straightforward, meat-and-potatoes overview of Kahlo’s life, peppered with copious commentary from the usual top-notch academic and curatorial talent, as well as family members.
While it’s perhaps not fair to make grandiose claims for this sober-toned film, I suspect it’s trying to somehow reclaim the artist from “Fridamania”, the surge of admiration that swept the cultural world in the 70s and 80s when Kahlo’s preoccupations – her brutal physical realities, the adoption of costume and imagery, the use of her body as a personal theatre – became fashionable, decades after her death. There’s a measured tone throughout, as well as some great photographs: Kahlo with Rivera, who always seems to look as if he’s just woken up; Kahlo’s father, whose spiffy goatee is surely the source of the shadowy facial hair Kahlo liked to paint on to herself; and Kahlo herself as a radiant teenager and twentysomething, despite the horrific bus crash that affected her from the age of 18.
Though necessarily a little light on detail, this is a film that covers the required bases, striking a good balance between Kahlo’s often dramatic personal life and the ins and outs of her artistic achievements. (A fervent case is made that Kahlo was the first artist to render menstrual blood on canvas, in her heartbreaking depiction of her miscarriage and hospital stay in Detroit, where she had accompanied Rivera on one of his mural commissions.)
There’s also an interesting sidebar on Mexican retablo painting – the votive street art that is still a traditional method of attempting to gain divine intercession – which Kahlo herself collected and which was a clear influence on her own work. All in all, a very watchable film about an ever-intriguing figure.
• Frida Kahlo is in cinemas. | https://dailyexpertnews.com/13-tv-moments-from-this-week-that-we-cant-stop-talking-about/ |
The lists of validated PROMs have been developed to support the identification of validated measures and the use of PROMs in Australia.
Selecting a PROM
There are hundreds of PROMs available and the development of new PROMs is increasing. It is important to consider which PROM is right for your needs. Information on selecting PROMs outlines key considerations to support this decision making.
Generic PROMs list
The list of generic PROMs includes measures that are suitable for use across healthcare settings and conditions that were referred to in literature published from 1989 to 2019.
Conditions-specific PROMs list
The list of condition-specific PROMs includes measures for a selection of high-burden conditions. These conditions were referred to in literature published between 1989 to 2019. The Commission will add to this list over time. The list currently includes PROMs for:
- High burden cancers - lung cancer, bowel cancer, breast cancer, prostate cancer, pancreatic cancer, brain and central nervous system cancer
- Cardiovascular diseases - coronary heart disease, stroke, atrial fibrillation and flutter, non-rheumatic valvular disease, cardiomyopathy and hypertension
- Mental health disorders - anxiety, depression, psychological distress and alcohol use disorders
- Musculoskeletal conditions - back pain and problems, osteoarthritis and rheumatoid arthritis
- Injuries and trauma - burns, brain injury and orthopaedic trauma
- Respiratory diseases - chronic obstructive pulmonary disease and asthma
- Neurological conditions - dementia, epilepsy, migraine, Parkinson’s disease and Alzheimer's disease
- Gastrointestinal diseases - chronic liver disease and inflammatory bowel disease
- Endocrine disorders - diabetes
- Oral disorders - dental caries and severe tooth loss
- Hearing and vision disorders - hearing loss and vision loss
- Skin disorders - dermatitis, pressure injuries and eczema
- Infectious diseases - HIV/ AIDs and influenza
- Kidney and urinary diseases - chronic kidney disease
- Blood and metabolic disorders - iron-deficiency anaemia
- Reproductive and maternal conditions - genital prolapse and polycystic ovarian syndrome.
Development of the lists
Inclusion and exclusion
PROMs were included in the list if they met the following criteria:
- It is a standardised instrument/survey/method for measuring patient-reported health outcome
- It has been validated (i.e., there is published information on validation, see below)
- Validation analyses were conducted on an English language version of the instrument, either in the original validation paper or subsequently, and
- It assesses generic health status OR is a disease-specific PROM from one of the identified conditions.
Experience and satisfaction surveys, while related, were excluded if they were not explicitly used to measure health outcomes (e.g., symptoms, quality of life, or functional status).
Included conditions
The list of identified conditions was developed based on the Australian Institute of Health and Welfare’s list of chronic diseases and burden of disease data. Issues or conditions that potentially had a low likelihood of having a PROM because they were too broad, contained residual or non-specific terminology (e.g. other gastrointestinal infections) or were difficult to capture information from the patient (e.g. infant conditions), were subject to a preliminary scope to identify possibility of PROMs. No information on PROMs for these issues/conditions were found; accordingly, they were removed from the list.
Validation requirements
A tool was deemed validated (and therefore eligible for inclusion) if there was published statistical analyses adequately establishing the reliability and validity of the scale/s. Analyses of reliability usually includes test-retest reliability and internal consistency (usually measured through Cronbach’s alpha). Analyses of validity may include: construct validity, criterion-related validity, and analyses of known-group differences. Establishment of content or face validity, which typically involves preliminary surveys about patients’ priorities or qualitative interviews and are used in the early stages to refine questions/items, were not considered sufficient for a PROM to be deemed validated.
Further information
For further information on the development of the lists or to request an excel file of the lists, please email [email protected]. | https://www.safetyandquality.gov.au/our-work/indicators-measurement-and-reporting/patient-reported-outcomes/proms-lists |
Pluto has lost its planetary status, but astronomers believe they may have found a replacement. Well, they haven’t actually found it, but they’ve deduced its existence. Maybe.
Since 2003, astronomers have discovered several Pluto-size bodies in highly elliptical orbits beyond Neptune, dubbed Kuiper Belt Objects (KBOs) or Trans-Neptunian Objects (TNOs). Several of these TNOs show a remarkable similarity. Although their orbits vary significantly, they all come closest to the sun (perihelion) about the same place. The probability of this clustering by coincidence is very low.
Enter the ninth planet. In a paper published in The Astronomical Journal, two astronomers have proposed that the gravitational influence of a hypothetical ninth planet could accumulate to place these TNOs into this unusual alignment. The ninth planet would have to be at least ten times as massive as earth. It would orbit an average distance of approximately 700 times the earth’s distance from the sun. However, its orbit would be very elliptical, quite unlike any other planet.
But don’t get too excited. Although the math seems to work out well, no planet has actually been discovered. Furthermore, this explanation requires millions of years to perturb the TNOs into their present orientation. From God’s Word, we understand that the world is only thousands, not millions, of years old.
For those who still fret over Pluto’s demotion, this potential new planet could restore the order they once knew. But it is more likely that astronomers will never find “Planet X” and it will fade into oblivion. | https://answersingenesis.org/astronomy/solar-system/replacement-pluto/ |
This is part 5 of a Sightline series on parking requirements. Read parts 1, 2, 3, and 4.
My younger son, almost 19, and my daughter, 20, are learning to drive this summer. (Car-less folks like us are sometimes late to the car-head rites of passage.) So I’m temporarily appreciating the wide open spaces of empty pavement at regional malls and big-box stores. Some of these parking lots are so big they generate their own mirages, and they’re vacant enough that my kids can’t do much damage.
Such parking expanses are a modern puzzle: They are so rarely full that you have to wonder why hard-headed business types ever built them. The answer is simple. They had no choice. Local laws made them do it.
For more than half a century, cities have mandated oversized quotas of on-site parking at stores, offices, houses, apartments, and condominiums, and all other types of new buildings — even bars. The result has been millions of parking stalls that stand empty even at their hour of peak demand. No doubt about it: We have legislated the waste of land.
In the Old Town area of suburban Beaverton, Ore., for example, barely half of legally required parking spaces had cars in them when surveyed in 2007, leaving some 1,500 local slots idle. Many cities demand five stalls (or about 1,500 square feet of parking) for every 1,000 square feet of retail space; the big-box hardware-merchandiser Home Depot surveyed actual parking utilization at 17 of its stores and found only half that many spots used at peak hours, Donald Shoup writes in The High Cost of Free Parking.
Such findings, occasionally mentioned in urban planning circles, have in recent years received empirical validation in the Northwest, where authorities have undertaken rigorous surveys of parking at multifamily buildings.
Car prowling
Officials in each of the Northwest’s large metropolitan areas have sent survey takers out in the still of the night when most people are cozy in their beds, their cars tucked into their designated slots. The surveyors’ mission was to prowl through apartment and condominium lots and garages, record empty and full spaces, and compare their tallies with the number of apartments.
What they found was surprisingly consistent. In King County, Wash., for example, the Right Size Parking (RSP) project [PDF] visited more than 200 buildings and found one parked car per occupied dwelling, on average. It also found an extra 0.4 empty stalls per occupied housing unit: almost one-third of parking was idle.
In British Columbia, MetroVancouver surveyed 80 buildings [PDF] and reported one parked car and 0.4 empty spaces per occupied unit, on average. In Portland, Ore., a survey of 15 multifamily buildings tallied an average of 1.1 parked cars per dwelling, plus 0.4 empty slots [pg. 13 of PDF]. Everywhere, then, spaces exceeded cars by roughly a third.
These figures are averages, and they conceal other patterns. In suburban zones, the oversupply was larger, although it remained approximately proportional. In King County, suburban buildings had 1.2 parked vehicles per unit, plus 0.6 vacant stalls. Buildings in downtown Seattle, meanwhile, had just 0.6 cars and another 0.2 empty spots per dwelling.
Similarly, across the region, condo buildings had more spaces and cars than rentals had, because condo owners are more affluent. In greater Vancouver, B.C., for example, rental buildings had 0.6 occupied parking spaces per apartment and 0.4 empties, while condos had one parked car and 0.3 empties per occupied dwelling [pg. 44 of PDF]. In Victoria, B.C., similarly, 33 apartment buildings investigated in the wee hours by enterprising university students had 0.5 cars parked per unit and 0.4 vacant slots [pg. 21 of PDF].
Force feeding
Why do buildings have so much extra parking? Do builders overestimate demand? No doubt, some do; others undoubtedly underestimate it. But the real reason for excess parking is that cities require it. Careful studies in Los Angeles and New York that disaggregated parking decisions down to the individual parcel level found that developers tend to build exactly as much parking as local codes require, as Shoup documents in The High Cost of Free Parking.
Developers would build less, on average, were it not for parking requirements, but that does not mean they would build none at all. Local laws do not mandate dishwashers, but most builders install them, because customers want them. Most customers want parking, too, so builders install it. Lowering or striking parking requirements lets builders judge for themselves how much vehicle storage to provide.
Northwestern evidence aligns well with the California and New York studies. The RSP analysis did not simply count spaces, it also constructed a detailed model for predicting actual parking usage based on buildings’ locations and characteristics. After the model proved robust in its predictive powers, RSP analysts used it to estimate how much parking would likely be used on every building lot in King County where zoning allows multifamily buildings. They concluded that at 45 percent of such lots, the number of spaces required under local law exceeds the number likely to be used — that is, the law would force-feed parking, causing builders to install more than warranted.
When the analysts removed from the calculation all parcels in the city of Seattle, which recently wrote sweeping exemptions into its multifamily code, the figure rose to 82 percent: Suburban cities almost all require more parking than will find takers. In fact, outside of Seattle, localities’ parking quotas exceed usage by an average of 0.4 spaces per dwelling — approximately the amount by which parking supply actually exceeds current parking usage.
The waste land
Expressed as stalls per apartment, the waste of space may not seem egregious: a fraction of a parking space. What’s the big deal? Each space is expensive, as I’ll detail in a later article, so the cost of housing rises and the supply shrinks.
Besides, a fraction of a spot per apartment adds up to vast acreage. British Columbia and the Northwest states of Idaho, Oregon, and Washington have 2 million apartments, condominiums, and other dwellings in multifamily buildings, according to data from B.C. Stats and the U.S. Census Bureau. For each of these dwellings, if the region has an extra 0.4 parking spaces, that’s 800,000 empties. Each space likely occupies at least 325 square feet of pavement, including access and maneuvering room. All told, that’s 260 million square feet of superfluous parking: more than nine square miles of vacancy that, unlike mall lots, isn’t even useful for driver’s ed. It is, with apologies to T.S. Eliot, the waste land.
Remember: that’s just the extra parking spots — the ones idle around 2 a.m. — and it’s only the excess parking at apartment and condo buildings. It ignores the far-more numerous ones at single-family homes, on the street, at offices, factories, churches, schools, park-and-ride lots — and the malls where my kids have been practicing.
The tally of all those spaces; their mirage-like promise of benefits, which turn on closer inspection to a handful of dust — these are topics for another day. | https://grist.org/cities/wide-open-spaces-how-unused-parking-adds-up/ |
PMA has published its Annual Report 2017. The Report constitutes of four chapters; they address macroeconomic developments, public finance developments, external sector developments (including balance of payments and foreign trade), and development in the Palestinian financial sector (PMA, banks operating in Palestine, and non-bank financial institutions), respectively.
H.E. Mr. Azzam Shawwa, the Governor of PMA, said the Annual Report 2017was published while several economic and political developments were taken place internationally, regionally, and locally. They led to slowdown in growth locally in 2017 whereby such slowdown was accompanied by slight increase in the deficit of the government finance and drop in the deficit of the current account of the balance of payments. Several developments also took place internationally and had repercussions on performance of major economies. Global economy had its best performance in seven years as a result of improvement in global trade activity with a recovery in investment in developed countries and strong growth in emerging economies of Asia and Europe. OPEC’s reduction of oil production helped recovery in oil prices and gradual improvement in many oil-exporting countries. However, regionally, political conflicts and turmoil continued in the Middle East and North Africa region. New tension also appeared in the relationships among Arab Gulf countries. Hence, economic conditions varied between downturn and acceleration. However, slowdown in growth hit lowest level since the global financial crisis took place ten years ago.
Locally, according to the Report, the Palestinian economy decelerated in 2017, which was consistent with PMA’s projections, registering a 3.1 percent growth compared to 4.7 percent in 2016. Real GDP (in 2015 prices) registered USD13.7 billion due to downturn in Gaza Strip economy despite the acceleration in the West Bank. Gaza economy slipped again into an economic downturn after two successive years of acceleration registering a 0.3 percent drop compared to a 7.7 percent growth in 2016. Economic growth in the West Bank accelerated in 2017 registering 4.3 percent in 2017 compared to 3.0 percent in 2016.
General consumer prices in Palestine slightly grew by 0.2 percent (compared to price deflation of approximately 0.2 percent in 2016) due to an international increase in the price of basic commodities and growth of prices in Israel.
High unemployment rates, especially in Gaza Strip, are among the key challenges of the Palestinian economy. Such rates rose to approximately 27.7 percent of the total labor force compared to 26.9 percent in 2016. This occurred against the backdrop of a rise in unemployment rate in Gaza Strip from 41.7 percent in 2016 to 43.9 percent in 2017 and a drop of unemployment rate in the West Bank from 18.2 percent in 2016 to 17.9 percent in 2017.
In public finance, according to the Report, a noticeable improvement in tax revenue and slight improvement in clearance revenue, but a drop in non-tax revenue and foreign aid occurred. These consequently led to a decline in public revenue and aid by approximately 5 percent compared to 2016 to register around NIS 15,982.5 million. Actual public spending dropped by about 1.1 percent compared to 2016, to register approximately NIS 14,601.8 million. In conclusion, the developments led to surplus in the overall balance after aid (on cash basis) by approximately NIS 1,189.1 million compared to a surplus of NIS 1,684.3 million throughout 2016. Foreign aid contribute to changing the deficit into a surplus. However, government arrears increased during 2017 by approximately 2.8 percent compared to 2016. At the same time, public debt (measured in U.S. dollar) rose towards the end of 2017 by 2.4 percent compared to the end of 2016 to reach USD 2,543.1 million (NIS 8,849.7 million) or 17.5 percent of the nominal GDP.
The current account in the balance of payments of 2017 registered a deficit of USD 1,563.7 million, which was an improvement of 19.5 percent compared to 2016. The deficit was 10.8 percent of the GDP compared to 14.5 percent in 2016.
H.E. Mr. Azzam Shawwa said, notwithstanding the difficult political conditions Palestine underwent, the Palestinian banking sector experienced many achievements in 2017 thanks to the efforts of PMA to enhance the supervisory and legal framework that regulated the banking sector institutions and supported it with various supervisory systems. PMA also continued to strengthen its Arab, regional, and international relations in order to boost relations between the Palestinian banking system and its regional and international surrounding to avert risks, which the Palestinian banking system was prone to under current circumstances.
Moreover, PMA continued its big efforts to strengthen financial inclusion in Palestine securing many achievements in this respect and in economic and financial research and in specialized reports in economic, banking, and financial areas. The outcome of these measures had their positive impact on the financial indicators of the Palestinian banking sector; hence, liquidity levels improved where such improvement coincided with an increase in assets, customer deposits, and increase in credit portfolio and improved its quality, drop in default rate, and improved capacity of the banking sector to confront expected and unexpected risks.
The Report shows that the overall assets of the banking sector rose at the end of 2017 by 11.6 percent to register USD 15,850.2 million. Direct credit facilities experienced an increase of approximately 16.8 percent to reach around USD 8,026.0 million indicating more use of financial intermediary among surplus and deficit units in the economy and creating more financing opportunities and contributing to the economic development process. Total deposits (bank and non-bank) increased by 11.7 percent to reach USD 13,117.8 million. The equity of the banking sector rose by 12.4 percent to register USD 1,891.2 million.
PMA’s expects the Palestinian economy to continue its slowdown in 2018. Real economic growth (baseline scenario) is expected to slow down to 2.4 percent compared to 3.1 percent in 2017. This performance is expected to materialize while the political and economic situations of 2017 in Palestine continue to be the same, including continuation of restrictions at border crossings, restrictions on freedom of movement of people and goods, continuation in the increase of Palestinian workers in Israel at the same previous rate, continuation of Gaza reconstruction at the same pace. Additionally, it is expected that this performance occurs while the Palestinian government continues the austerity policy, the rates of the revenue growth and government expenditure stay the same, donor countries’ aid to the Palestinian government’s treasury continues to drop.
Finally, the Research and Monetary Policy Department of PMA regularly publishes annual reports of PMA. These reports are key references for research institutions and those concerned with the economy as well as postgraduate students in Palestine since they are packed with deep analysis based on most the up-to-date and accurate available data.
Categories: PMA, Publications, Ads, Announcements
Tags: | http://www.pma.ps/Default.aspx?tabid=205&ArticleID=2298&ArtMID=793&language=en-US |
experiencing the worst coral die-off on record as more than 43 miles of the reef located in the northern region is dying due to coral bleaching. The southern region of the reef experienced only a one percent mortality rate due to Cyclone Winston in February that lowered the temperature slightly. The damage, however, is far more extensive than was originally believed.
Due to various reasons, the water temperature has increased in areas where the 1,400-mile Great Barrier Reef exists, causing coral bleaching. And in some instances, an immediate “cooking” of the coral happens.
Coral reefs have a direct impact on the environment and the economy. They protect the shorelines while creating diverse marine life as 25 percent of marine species find shelter in the coral. Coral reefs support the fishing industry as well as tourism. Some experts believe coral reefs could hold the answer to medical breakthroughs.
What are the causes for the worst coral die-off to the Great Barrier Reef ever seen? The following gives you a glimpse of what is happening and how you can help prevent coral bleaching.
What is causing the coral reef to die?
The coral within the Great Barrier Reef are dying due to several factors. The largest of these is climate change from global warming. When the ocean water temperature increases, the coral becomes an inhospitable habitat for the tiny algae that normally have a symbiotic relationship with the coral reef. Unless the temperature drops and the coral cools, the algae cannot return to the coral and eventually the reef dies.
In the meantime, the coral loses its color and takes on a white appearance, known as coral bleaching. Experts determine that the coral reef mortality rate from coral bleaching is above the initial estimate of 22 percent.
Other reasons for coral death include disease, pollution from chemicals and agricultural run-off and changes in the sedimentation from ocean floor disturbances, such as dredging. If the water temperature increases too much, the coral cooks and immediately dies.
What are the current prevention initiatives to save the coral reef?
The NOAA Satellite and Information Service manage the Coral Reef Watch (CRW) program. The program collects reports from partners and organizations around the globe to gain accurate information about the current status of coral reefs. You can learn more about the protocols for monitoring coral bleaching by visiting CRW’s website, including the ReefBase Global Bleaching Protocol from the Great Barrier Reef Authority and partners.
There are several community-based programs that measure coral bleaching and send the reports to the CRW, as well as other interested organizations. The Great Barrier Reef Marine Park Authority coordinates with the community and reef managers to monitor the coral reef. Parts of the Great Barrier Reef are harder to investigate and monitor, so the use of specialized equipment is critical. Underwater cameras survey tight crevices and collect data from sensors and equipment, so scientists and researchers can keep current on the status of the coral reef.
Using dive surveys, scientists learned that although 67 percent of the Great Barrier Reef has suffered from coral bleaching in the last nine months, the coral located in the southern region are regaining its vibrant color due to cooler temperatures and the return of algae. CRW reports that it may take as many as 15 years for the coral to reestablish to previous levels as long as the Great Barrier Reef does not experience a fourth and fifth devastating coral bleaching.
How you can help save the Great Barrier Reef
Whether you live in Australia or elsewhere on the globe, you can help salvage the Great Barrier Reef, so the coral has time to reestablish its relationship with the tiny algae in the ocean and grow back to its previous level.
You can help by participating in community-based monitoring programs and convincing your family and friends to reduce their carbon footprint. You can reduce your overall use of fossil fuels. You can also support comprehensive climate legislation and ask your government officials to participate. Continue fighting for the environment and the Great Barrier Reef!
This is a guest post written by Megan Ray Nichols. | https://greentumble.com/time-to-act-help-prevent-further-damage-to-the-great-barrier-reef/ |
Aims: The professors are considered as one of the main pillars of the universities and their performance has a main role in efficiency of the total education system. The aim of this study was to investigate the affective context factors on the method of evaluation of the professors by students.
Methods: This descriptive-analytical study was conducted among 12339 students of MUST in the second semester of the 2011-12 academic year. The total GPA of the students was used as the index of determining the academic performance of a student. Data of this study were analyzed, using SPSS 17 software and one-way variance analysis, post hoc Tukey, Pearson correlation and independent T tests.
Results: There was a significant difference in the average evaluation score of the professors according to the educational performance status, sex and class of the students, marital status, teaching experience and rating of a professor and also, type of a course and its presentation time. Scientific-educational ability and social behavior of the professors in the classroom had a significant and positive relationship on the confidence level 100% (p=0.0001).
Conclusion: The components of the educational performance of a student, student’s and professor’s sex, student’s educational course, kind of lesson, scientific- educational ability of a professor, scientific rating, teaching experience, presentation time of a lesson and professors’ marital status are effective on professor evaluation by a student, but the employment status of a professor has no relation with this evaluation. | https://edcbmj.ir/browse.php?a_id=374&sid=1&slc_lang=en |
The following LIS courses are no longer available, or in the case of LIS 693/694 "special topic" courses, are currently inactive.
For questions regarding courses in the archive, please contact [email protected].
Note: Each specific LIS 693/694 "special topics" course may be taught a maximum of two times, after which it must be converted to a permanent course in order to be offered again.
-
LIS 100 Using Information Critically
Course DetailsUse of libraries and information technology for scholarly investigation; examines information literacy, critical thinking, digital libraries, university role in knowledge creation. Cross-listed as CAS 101.
-
LIS 500 Master's Plan B/C Studies
Course DetailsRefer to faculty advisor.
-
LIS 591 Library and Information Studies Workshop
Course DetailsDesigned for in-service librarians and other information specialists needing to update their professional skills, focus on a particular topic, or learn new approaches and concepts.
-
LIS 602 Introduction to Multimedia Technology & Resources
Course DetailsIntroduces the latest specialized technologies for providing, managing, and designing information services for libraries. Provides basic experience in desktop productivity software and Web publishing, bibliographic database software, and qualitative and quantitative data analysis.
Course History
- LIS 606 Advanced Cataloging & Classification
-
LIS 612 History of Books & Libraries
Course DetailsHistory of written communication: the recording, preservation, and transmission of knowledge. Development of libraries from earliest times through the 20th century as instruments of cultural transmission.
Course History
-
LIS 618 Government Documents
Course DetailsSurvey of government documents at the federal, state/local and international levels in all formats. Covers methods of their acquisition and organization, including depository arrangements. Current issues of government information policies and practices discussed.
Course History
-
LIS 647 Systems Analysis for Information Management
Course DetailsOverview of systems analysis, its techniques, benefits, and limitations. Focus on libraries and information agencies, although concepts are applicable to other settings. Structured, top-down solutions stressed throughout. Object oriented techniques and data modeling tools are reviewed.
Course History
- Syllabus Quiroga, Fall 2014
- LIS 652 Introduction to Archival Management
-
LIS 653 Seminar in Archival Studies
Course DetailsTheory of archival studies from historical and contemporary perspectives. Includes public administration, legislation, and relationship to other repositories. Includes field component.
Course History
-
LIS 660 Information Sources & Systems in Science
Course DetailsBibliographical structure and sources in the basic and applied sciences, including physics, chemistry, biology, medicine, agriculture, engineering. Includes field component.
Course History
- Syllabus Rutter, Spring 2012
-
LIS 661 Information Sources & Systems in the Humanities
Course DetailsLecture course on information structures of humanities disciplines, including fine arts, applied arts, theater arts, literature, music, religion, philosophy. Information cycle, print and digital reference services, information seeking research in the humanities. Field research component.
Course History
-
LIS 662 Information Sources & Systems in the Social Sciences
Course DetailsLecture course on the information structures of social science disciplines, including anthropology, sociology, psychology, education, business, history, political science. Information cycle, print and digital reference services, information-seeking research in the social sciences. Field research component.
Course History
-
LIS 663 Database Searching
Course DetailsIntroduces use of commercial online databases for interactive retrieval of bibliographic, full-text and directory information, the development of search strategies using controlled subject vocabularies and free text searching.
Course History
-
LIS 664 Abstracting & Indexing for Information Services
Course DetailsLecture course on theory and practice of enhancing subject access to documents, impact of indexing vocabulary on retrieval; types of controlled vocabularies; evaluation of abstracts in professional databases, creation of abstracts for special local and regional documents.
Course History
- Syllabus Jacso, Fall 2004
-
LIS 667 Advanced Database Searching
Course DetailsLecture course with demonstrations of advanced features of online information retrieval systems and search engines, including natural language searching, citation-based searching, term mapping, similarity searching, result ranking and clustering for power search web databases.
Course History
- Syllabus Jacso, Spring 2012
-
LIS 670 Introduction to Information Science & Technology
Course DetailsSurvey of topics. Lectures and discussions emphasize practice, problems and theory relating to information storage, retrieval and dissemination provision technology in libraries and information centers.
Course History
- Syllabus Bair-Mundy, Spring 2015
-
LIS 671 Digital Librarianship
Course DetailsLecture course with demonstrations to introduce the essential types of digital resources and the software tools for finding high quality and relevant information efficiently form digital journal archives and reference databases.
Course History
-
LIS 673 Records Management
Course DetailsBasic theory and principles concerning the management of records within a legal framework – including creation, media selection, use, inactivity, and destruction.
-
LIS 675 Database Content Evaluation
Course DetailsLecture course discussing and demonstrating the principles and methods of using criteria in evaluating databases used by librarians and information professionals, such as database coverage, source base, currency, accuracy and quality of information.
Course History
- Syllabus Jacso, Fall 2012
-
LIS 680 Seminar for Beginning School Librarians
Course DetailsOpportunities for school librarians in their first two years to analyze and apply strategic planning processes in various facets of their work as teacher, instructional consultant, information specialist, and manager.
Course History
- Syllabus Harada, Fall 2010
-
LIS 684 Administration of School Library Media Centers
Course DetailsEffective management of school library media centers. Philosophy and objectives, standards, personnel, facilities, resources, budget, services, library instruction, public relations, program planning and evaluation.
Course History
-
LIS 685 Traditional Literature & Oral Narration
Course DetailsAnalysis of traditional literature including Asian and Pacific Island resources. Selection and evaluation of traditional literature materials emphasizing cultural values. Introduction to oral tradition, history and techniques of storytelling.
Course History
-
LIS 687 Hawaiian Studies Information Resources
Course DetailsSurvey of reference and research materials in Hawaiian studies. Includes historical and contemporary works, arts, humanities, social and natural sciences, media. Covers approaches to reference service, collection building and management.
Course History
- Syllabus Minatodani, Spring 2012
-
LIS 688 Pacific Islands Information Resources
Course DetailsIntroduces students to Pacific Islands resources with an emphasis on reference works, databases and web sites. We examine area focus and subject bibliographies, handbooks, directories, indexes, statistical sources and serials. Through lectures and guest speakers we cover special topics: current issues in the contemporary Pacific, regional organizations, island biography, publishing, acquisitions sources, library development in the Pacific setting, science sources, the nature of archival research, Pacific Islands film, indigenous literature, and others.
Course History
- Syllabus Dawrs & Kleiber, Summer 2012
-
LIS 689 Asian American Resources for Children & Youth
Course DetailsStudy of Asian-American resources for young people, including an overview of socio-historical roots of these ethnic groups. Evaluation of resources; examination of curriculum and program uses in a multicultural context.
Course History
-
LIS 693 Special Topics in Librarianship
Course DetailsIncludes issues of topical interest in the profession. Each course concentrates on one major topic of current interest, such as library service to the aged, reprography, medical librarianship, knowledge management, art librarianship, cartography, etc. Repeatable.
-
LIS 693 Academic Librarianship
Course DetailsThis course explores academic libraries, examining their missions and purposes, their higher educational cultures, their principal constituents, their structural partnerships, their main functions, the ways they are organized, and variations among types of libraries. The course considers political, financial, intellectual, and human resources needed for effective operation. (ca. 2010)
This course will help prepare students for careers in academic libraries, including an overview of the history of higher education, academic librarianship, faculty governance, research and tenure, scholarly publishing, and such emerging trends as digital humanities, and learning commons. We will also briefly explore other research libraries (such as NYPL, LC, and private research libraries) as well as community college libraries. The goal will be to encourage research and leadership in academic librarianship. (ca. 2018)
Course History
-
LIS 693 Access and Care of Indigenous Cultural Knowledge
Course DetailsThis course will explore the overlap between indigenous world view and the professional values of those who might hold representations of indigenous cultural knowledge in their collections. Topics to be explored include: indigeneity and traditional knowledge; cultural protocol; guidance from professional organizations; consultation; shared authority; respectful collection development and management; research methods and decolonization; organization and description of indigenous content; and current events and 'hot topics' as they arise.
Course History
- Syllabus Roy, Summer 2017
-
LIS 693 Archival and Special Collections Management
Course DetailsThis course introduces students to the proper management of an archive, manuscript collection or special collection using management approaches and best practices from archival studies. This course introduces management theory, appraisal theory, and relevant issues concerning facilities and legal issues related to privacy, intellectual property, records management, as well as advocacy, fundraising, reference and educational outreach functions. This course, along with Archival Ethics, and Archival Processing, is part of the professional preparation for the archival field.
Course History
- Syllabus Wertheimer, Fall 2017
-
LIS 693 Asian Informatics
Course DetailsThis asynchronous online course will look at how information technologies have transformed Asian societies in various ways, shaping people’s communication, perception, and even how they think. We explore how these interactions between people and information technologies shape our living environment and society. It is a combination of a seminar, designed to help LIS/CIS students start research papers or proposals on Asian Informatics, and a survey course on the topic. By the end of the course, students will produce a research paper that might later be expanded into a publishable one or part of a thesis proposal. Foreign language competencies are not required; however, language skills would certainly help you to analyze authentic sources.
Course History
-
LIS 693 Business Information Sources & Services
Course DetailsStudy of key sources of business information in accounting, business law, consumer information, finance, industry, international business, job information, management, marketing, small business, taxation, and related areas. Focus is on meeting the user needs for specific types of business information, including those of management executives and other professionals, entrepreneurs, individual investors, and researchers. Emphasizes the use of value-added print and electronic resources, including business resources via the Internet. Includes development of search strategy, building and managing a business reference collection, and reference services to the business community.
Course History
- Syllabus Flynn, Spring 2007
-
LIS 693 Cartographic & Geographic Issues for Librarians
Course DetailsThe course focuses on the geographic elements of information and the ways in which new geographic technologies offers new opportunities and challenges for librarians and information specialists. Students will be introduced to a data model that can be applied to objects, persons, and events in a way that facilitates geographic analysis.
Course History
- Syllabus Fitzpatrick, Spring 2008
-
LIS 693 Copyright & Libraries
Course DetailsExamines issues in copyright and intellectual property pertaining to libraries of all sorts from the perspective of both theory and praxis. Beginning with a history of copyright, we will analyze theories of copyright and its application, especially in the digital age. The practical aspects of copyright as it applies to licensing contracts for electronic resources will be explored, including the economics of licensing. Attention will be given to interpretations of copyright law, fair use, liability and the responsibility of the individual librarian to introduce copyright concepts to library users. The approach will be worldwide, but case studies and current issues in copyright and intellectual property in the United States will predominate.
Course History
- Syllabus Perushek, Summer 2007
-
LIS 693 Diverse Communities
Course DetailsLibrary users are often members of different formal and informal communities, related to their cultural heritage, their careers or professions, or even their leisure interests. This course will investigate strategies and resources for serving users in different types of communities, including: diverse cultural and linguistic groups and nationalities; varied affinity groups like weaving clubs or online cancer support forums; users from many type of institutions including schools, hospitals, and prisons; and scholars and researchers in various subject areas. Issues in information seeking behaviors, promotion and advocacy, policy, and library resources will be discussed. This course is appropriate for those seeking careers in all types of libraries.
Course History
- Syllabus Kowalsky, Summer 2013
-
LIS 693 English Children's Literature
Course DetailsThis course is on the development (in England) of children's literature as a genre--its history, classics, and the influence and contributions of iconic authors and illustrators. Topics/critical issues to be discussed include contrasting visions of childhood, the power of traditional literature (folktales, legends, nursery rhymes), the commodification and commercialization of literary characters/texts, the popularized presentation of texts and authors in films, and the ability of texts to entertain, criticize society, present values, and help children to find meaning. Also, the role of English children's literature in developing national consciousness and values, Englishness.
Course History
- Syllabus Knuth, Fall 2010
-
LIS 693 Film Collections in Libraries
Course DetailsThis course presents an overview of film from its historical antecedents to the present and how it fits into the bibliographical structure and sources in science, social science, and humanities. Topics include a general discussion of the history, language, technology, and business of film;
film theories and genres; representation of cultures and societies in film; developing and preserving a film collection.
Course History
- Syllabus Kellett & Paseng, Spring 2012
-
LIS 693 Foundations of Hawaiian Collections
Course DetailsThis course focuses on the unique circumstances experienced by information professionals who seek to care for Hawaiian materials and provide service for Hawaiian communities, while working from a foundation based in culturally relevant values and perspectives. At the end of the course, students will be better positioned to undertake learning and professional opportunities within Hawaiian libraries, archives, cultural centers, organizations, and communities. Field research component included.
Course History
- Syllabus Long, Fall 2017
-
LIS 693 History of LIS Education
Course DetailsIn celebration of the UHM LIS Program's 50th Anniversary, we will be offering a special graduate seminar exploring the history of LIS education. The ultimate goal of the course will be the creation of a scholarly e-book on the history of libraries, archives, and LIS education in Hawaii. In order to meet this goal, this rigorous seminar will equip LIS and CIS students with an introduction to historiography and historical research methods, and an overview of librarianship and higher education in Hawaii. Students will be doing a lot of reading, original research, some teaching, and work in a group.
Course History
- Syllabus Wertheimer, Fall 2015
-
LIS 693 Indigenous Librarianship
Course DetailsThe course provides a forum for introducing and discussing issues, activities, philosophies, and orientation to working with and for indigenous populations in providing library services. Students will discuss protocol, policies, issues, communities, key organizations and events, library services, resources/reference titles, and settings. Along the way, students will prepare and deliver presentations on tribal settings and issues, abstracts of prospective research papers, abstracts of fundable services, and a mini-pathfinder of resources on selected topic.
Course History
- Syllabus Roy, Summer 2014
-
LIS 693 Information Resources in the Health Sciences
Course DetailsThis course will cover the most important healthcare related information resources within a context of providing reference and information services. It will cover primary, secondary and tertiary sources in the following areas: medical, dental, pharmacy, nursing, allied health, consumer health and informatics. We will look at evidence based medical and nursing information resources in terms of when and how to use them most effectively. We will learn about the National Library of Medicine’s Medical Subject Headings (MeSH) thesaurus and the Unified Medical Language System (UMLS). We will also learn how to compare and evaluate similar resources and how to select the best resources. We will learn how to do efficient and effective searches in the major healthcare information resources.
Course History
- Syllabus Trafford, Summer 2010
-
LIS 693 Library Architecture & Planning
Course DetailsThe goal of this course is to provide students with the knowledge necessary to participate effectively in or to manage a library renovation project or a new building project. Emphasis will be placed on the development of skills which students need to evaluate personnel, systems, and services during a
construction project so that the new or renovated library facility is cost-effective and appropriate to users’ needs. Students will gain a greater understanding of the architecture profession and the interdisciplinary nature of building projects.
Course History
- Syllabus Curry, Summer 2006
-
LIS 693 Library Leadership Seminar
Course DetailsThe future of librarianship depends on a new generation of leaders to manage and administer the information centers of the new century. This course is designed to help prepare students to fill these positions. It will examine the fundamental elements of leadership, including structural, political, human resource, and symbolic aspects, and how they apply to the library environment. Course content will include study of leaders in; history and literature, feature films and documentaries, case studies, and periodical literature. Students review the relative merits of various leaders through class discussion and writing. Students will learn how to think through complex leadership issues and apply leadership principles to provide maximal outcomes.
Course History
- Syllabus Geary, Summer 2014
-
LIS 693 Library Services for Youth in Custody
Course DetailsThis course focuses on library services to youth in custody, with an emphasis on youth in juvenile detention centers. The course covers a variety of topics including collection development, programming, outreach, and intellectual freedom.
-
LIS 693 Multicultural Resources for Library Services
Course DetailsThis course employs critical inquiry methods in a seminar setting to explore a variety of literature, materials, and online resources targeted towards diverse user populations in libraries and other educational organizations. Students will assess a variety of materials geared towards cultural heritage, gender preference, ethnicity, sexual orientation, and mobility needs. Students will learn theoretical models for cultural competency as a means to learn and understand the multiple identities library patrons, students, and colleagues encompass within library settings.
Course History
-
LIS 693 Rare Book Librarianship
Course DetailsRare book librarianship is an object-based discipline and relies upon keen observational skills, as well as historical knowledge. By carefully examining physical aspects of a book (paper, typography-printer, illustration, binding, provenance, etc.) you can understand aspects of its history in addition to the text. The UHM library's Rare Book Collection will be the primary class resource for examining aspects of the printed book in the West from the 15th century through the 20th century. The fundamentals of defining and developing rare book collection policy will be considered as well as creating a place for rare book collections in today's landscape of knowledge and information literacy
Course History
- Syllabus Davis, Fall 2014
-
LIS 693 Reader's Advisory
Course DetailsA course on serving reading needs, especially those of adults, and on identifying the appeal of books and genres and helping readers to select books they will like. It addresses the major elements of reader advisory services and covers the fictional genres (mystery/detective, adventure, romance, Christian fiction, horror, science fiction, and more), and nonfiction [including self-help, biography, and more). The course also looks at readers' advisory as a reference service, provides research on reading and experience in using RA resources, giving book talks, and participating in literature circles and book clubs/discussions.
Course History
- Syllabus Knuth, Fall 2012
-
LIS 693 Reader's Advisory for Adult Popular Fiction
Course DetailsAn examination of the nature and societal functions of a variety of mass media-generated adult reading materials and their relationship to the contemporary field of library and information studies.
Course History
- Syllabus Wiegand, Summer 2007
-
LIS 693 Records Management
Course DetailsBasic theory and principles concerning the management of records within a legal framework--including creation, media selection, use, inactivity, and destruction.
Course History
- Syllabus Jansen, Spring 2017
-
LIS 693 Resources in Hawaiian & Pacific Librarianship
Course DetailsThis course will alternate between a practical introduction to Hawaiʻi and Pacific Islands library resources and an exploration of issues related to the profession as practiced by academic librarians in a special collections setting. Through lectures and guest speakers we cover special topics, including: current issues in contemporary Hawaiʻi and the Pacific; history and documentation; genealogy, biography and demography; early and modern indigenous literature, collection development and management, science sources and more. Ultimately, this course is designed to build proficiency in the use of Hawaiʻi and Pacific Islands research materials in general and the Hawaiʻian and Pacific Collections at Hamilton Library in particular.
Course History
-
LIS 693 Serials & Electronic Resources Librarianship
Course DetailsAn introduction to challenges and issues of Serials and Electronic Resources Librarianship. Coverage areas include budgeting, licensing, acquisitions and the management of resources as well as staff.
Course History
- Syllabus Saeki & Carlson, Summer 2008
-
LIS 693 The Graphic Novel
Course DetailsThis seminar explores graphic novels and comics in libraries for all ages with an emphasis on children and young adult titles. We will study collection development, programming, the history of graphics, censorship, and booktalking. A particular focus will be on Asian and Asian American titles including web comics and online comic resources.
Course History
- Syllabus Lowry, Fall 2014
-
LIS 693 Young Voices in Times of War: Literature for Children and Young Adults
Course DetailsDuring times of war, children and teens are forced to grow up more quickly than they would during times of peace. Many will have to make difficult choices and face adult issues. This course will focus on stories told through unique voices of children and young adults who happened to grow up while the world they knew around them was radically changing. When contemporary children and teens read about the impact war has on the fictional characters (especially those of similar ages) as well as true stories of people who grew up in the midst of war, they will inevitably from a literary relationship with and develop empathy for the characters they read about. By humanizing "the other" through reading, we can hope to instill in upcoming generations the importance of cultural understanding an the necessity of teaching peace in an increasingly globalized world.
Course History
- Syllabus Kamiya, Spring 2009
-
LIS 693 Youth Community Engagement
Course DetailsThis course provides a better understanding of how various disciplines of study define youth, how groups of youth define themselves, and how institutions shape youth’s lives. It also addresses youth behaviors and youth activism and community affiliation. The course is focused on how to apply knowledge about youth and their lives to the library setting.
Course History
- Syllabus Austin, Spring 2016
- LIS 693 Academic Librarianship
-
LIS 694 Special Topics in Information Technology
Course DetailsIncludes issues of topical interest in information technology. Each course concentrates on one major topic of current interest, such as information transfer, networks, library information systems, artificial intelligence applications. Repeatable three times, up to nine credits.
-
LIS 694 Curating Digital Culture
Course DetailsThere is an increasing need for information professionals who have the ability to plan, manage and implement practices that ensure the long-term integrity and use of resources that are digitized or created in digital form. This includes information professionals who are charged with digital collections, as well as those working within data-intensive jobs that have curation requirements.
This course explores the selection, long-term preservation, and maintenance of digital assets, addressing ongoing debates about the related but distinct concepts of preservation, curation, and stewardship. The course provides cultural, historical, and theoretical frameworks for critically engaging curated expressions of digital culture, including both digitized and born-digital materials. In Curating Digital Culture, students will critically analyze existing curated spaces (collections, assets, objects, etc.), navigating the curatorial politics of inclusion and exclusion and the impact and implications of those decisions for various global communities. Finally, students will use a content management system (CMS) to curate a digital presence.
Curating Digital Culture offers students an opportunity to explore the changing nature and form of curation, such as the impact of new media, curation as storytelling, curating our digital selves, curating social protests and social movements, understanding what machines can do for us (and what they can’t), and the tools and technologies that both drive and are informed by these changes. Students will learn that to curate is to construct knowledge.
-
LIS 694 Digital Archives
Course DetailsCovers archival theory as it applies to digital records, including preservation, long-term access and the assessment of authenticity of the material. The goal of this course is to provide students with knowledge on the role of technology in archival work, at the theoretical and pragmatic level, through lectures, guest speaker presentations, educational visits, lab and in-class activities, and class discussions. The students will gain insight into relevant technology raised issues and will learn what kind of technology is applied in archives.
Course History
- Syllabus Jansen, Fall 2014
-
LIS 694 Digital Content Management
Course DetailsThis course takes an interdisciplinary approach to the organization of digital content, and explores the aspects of content management that arise from the field of library and information science, such as reference services, information-seeking behavior, and knowledge representation. In addition to examining the theoretical foundation one may use in the design of a content management initiative, we will also cover some of the technical skills necessary to implement such an initiative via Drupal, an open-source content management system. This course assumes no prior experience with Drupal or other content management systems.
Course History
- Syllabus Motooka, Fall 2013
-
LIS 694 Digital Curation
Course DetailsThis course is structured around putting the ISO’s Open Archival Information System (OAIS) Reference Model and the Digital Curation Centre’s Digital Lifecycle Model into practice. In this course students will learn digital curation theories and workflows that can be used in the management of born-digital records. This course will be hybrid in nature with a combination of onsite and online sessions. A major component of this course will focus on hands-on activities using open source tools to perform basic digital forensics analysis and archival arrangement and description.
Course History
- Syllabus Bussert & Shiba, Spring 2017
-
LIS 694 Evidence-based Practices for Libraries
Course DetailsThe course centers on the study and application of evidenced-based practices in various library settings. It focuses on the evaluation of library programs, services, and infrastructure. Students will be introduced to real-life situations that involve data analysis in various situations. Activities include the use of data to evaluate libraries to inform decisions with qualitative and quantitative evidence. Evaluation strategies include cost-benefit, efficiency, effectiveness, opportunity, educational outcomes, and patron satisfaction.
Course History
- Syllabus Ogawa, Summer 2017
-
LIS 694 Geographical Information Systems (GIS)
Course DetailsGIS is used in nearly every aspect of our lives. From getting water and electricity to our homes, to helping farmers put food on our plates, and to even help us maneuver around town when the zip lane is shut down! Nearly every industry has a need for GIS and there is high demand in the job market for people who can make maps and manage assets using it. This course will introduce the main concepts of GIS and teach the student how to use it in whichever career path they choose. There will be detailed tutorials and examples to aid in the students’ learning, a field exercise to learn how to collect data using a GPS, as well as a final project that will be developed in stages throughout the semester and centered on the students’ educational and professional goals.
Course History
- Syllabus Wahl, Spring 2016
-
LIS 694 Informatics
Course DetailsA key aspect of informatics is how people and technology co-evolve. In this class we'll look at people as components of information systems, not just as their designers and users. We'll cover issues like the global information infrastructure, information technology literacy, informal information systems, how values are expressed through design, why people don't use good systems, and why good systems go bad. For the final project, you'll model the information behavior of a group or population of interest to you, trace their formal and informal information sources, pathways and behaviors, and recommend improvements that align with their social and technological worlds.
Course History
- Syllabus Gazan, Fall 2017
-
LIS 694 Informatics & Information Design
Course DetailsThe emerging field of "Informatics" broadly describes the study and practice of creating, storing, finding, manipulating and sharing information. Combining a concern for technology, information, and humans, informatics considers how information technology is designed and used in our society, specifically in such fields as Health Information Science and Business. The course will focus on website design from an information science perspective, with specific attention to the interaction between design, institutional needs, and available technological tools. The course will combine academic discussions with applied projects. The roles that librarians can have in designing web-based resources will be a central theme. In the end, the successful student will be able to design web pages that integrate dynamic data and discuss the design, content, and assessment strategies in a thoughtful and effective way.
Course History
-
LIS 694 Information Behavior
Course DetailsThis seminar takes place in immersive virtual world platforms including Second Life (SL), Inworldz, Heritage Key, Blue Mars and other virtual information environments. The seminar allows students to examine virtual world innovations including avatar-mediated library services, immersive educational environments, historic recreations, and others. Students join inworld professional groups and interest groups; study avatar information needs and information seeking behavior; create virtual interactive collections, subject guides and pathfinders; acquire virtual world information literacy (VWIL) and basic building skills; and master information sharing and presentation tools. Projects involve students in applying skills learned via inworld tasks in produsing VW informative events. Project-based, research and professional focus, inworld and classroom workshop format.
Course History
- Syllabus Nahl, Spring 2011
-
LIS 694 Information, Technology & Society: Philosophical Dimensions
Course DetailsThe principle goal of this course is to introduce students to philosophical issues associated with technologies of information.
Course History
- Syllabus Richardson, Summer 2004
-
LIS 694 Introduction to Multimedia Technology & Resources
Course DetailsIntroduces the latest and specialized technologies for providing, managing, and designing information services within a library environment. Provides basic experience in desktop productivity software and web publishing, bibliographic database software, and qualitative and quantitative data analysis.
Course History
- Syllabus Kellett, Fall 2006
-
LIS 694 Managing Online Resources in Library Systems Consortia
Course DetailsThere are increasing numbers of types and formats of library materials. This makes it difficult for libraries to purchase as many or as many types of materials as they would like. This short course will introduce students about library consortia, what’s like to work in them, and various ways of evaluating electronic resources/ebooks, etc. that a consortia may negotiate in price for members and to get discounts.
Course History
- Syllabus Bell, Summer 2015
-
LIS 694 Medical Information Retrieval
Course DetailsThis course is meant to help students gain an understanding of the field of medical information retrieval especially the impact of medical informatics technology, as well as the confidence and skills to search for, evaluate, and deliver medical information in a variety of contexts, ranging from working with health care professionals to the general public. The class is centered on case based learning experiences that will connect theory and practice. By the end of the class, students will be able to understand current trends in medical information, expertly search the biomedical literature, be able to evaluate medical resources, deliver value-added health related content to users, and become aware of the many future possibilities in the biomedical information field. This course is appropriate for any who wish to become more confident in working with health science information.
Course History
- Syllabus Young, Spring 2013
-
LIS 694 Metadata Management in Memory Institutions
Course DetailsMetadata is a fundamental issue for anyone involved in the management of information resources in a networked environment. Information resources in digital format, in particular, largely rely on metadata to be findable and accessible for a prolonged period of time. This introductory course explores the use of metadata in modern memory institutions such as libraries, archives, and, to a lesser extent, museums. Students are guided through the theoretical and practical principles of metadata and the hands-on application of those principles. The ultimate goal of this course is to develop the fundamental knowledge and skills needed to be able to address the right metadata questions in the right context in developing and managing resources.
Course History
- Syllabus Shiba, Fall 2015
-
LIS 694 Mobile Library Services
Course DetailsThere is a mobile revolution taking place in the twenty-first century. More people are talking, texting, and accessing the internet on their mobile devices. This course provides an overview of mobile applications and services currently being provided by libraries and also some services libraries will want to consider that are not widely available yet. Students will have the opportunity to learn about a variety of services and applications available on mobile devices. They will also have the opportunity to do further research and study on a mobile library service of interest to them. Through readings, discussions, exercises, lectures, and guest presentations, students will learn how libraries can effectively offer mobile services to their patrons.
Course History
- Syllabus Bell, Summer 2013
-
LIS 694 Moving Image Archives
Course DetailsThis course provides an introduction to the basic concepts, principles and technology of moving image archives for professionals tasked with caring for archival audiovisual materials. This course covers methods and strategies for the processing, preservation, and accessibility of archival videotapes and films. Topics include survey of moving image repositories, critical analysis of archival footage, format identification, digitization strategies, equipment and vendor considerations.
Course History
- Syllabus Quirante, Spring 2016
-
LIS 694 Planning & Developing Digital Library Instruction
Course DetailsThis course introduces relevant principles and guidelines for instructional design that influence digital instruction in various library settings. Students develop an instructional plan for a specific library context and patron need. They also create a digital learning activity to implement the plan. The activities may focus on a range of user needs including refining information search strategies, promoting literacy, accessing specific databases, dealing with key aspects of the research process, or assisting with on-demand reference services.
Course History
-
LIS 694 Research Methods
Course DetailsInternet studies have become increasingly important to a number of fields, from communication and science to digital media and game studies. This course aims to provide a basic understanding of methods, techniques and approaches to Internet studies. It will cover both qualitative and quantitative approaches to study identities, communities, institutions as well as characteristics, credibility, bias and cultural differences associated with the information presentation. In this course you will learn about survey design, ethnographic and content analysis methods of studying Internet.
Course History
- Syllabus Hajibayova, Summer 2017
-
LIS 694 Seminar on Information Communication Policy Issues
Course DetailsThis course will examine some of the issues related to information dissemination and access via telecommunication networks. In order to discuss these issues, we will look at the technological infrastructure as well as the political power structures behind the major telecommunication networks. We will look at the roles of entities such as the Internet Engineering Task Force (IETF), the International Telecommunication Union (ITU), the Institute of Electrical and Electronics Engineers (IEEE), the Internet Corporation for Assigned Names and Numbers (ICANN), and the World Wide Web Consortium (W3C) in the design and management of global telecommunication networks. We will talk about the potentials and the conundrums these new (and some not so new) technologies pose in a world of unevenly distributed resources and competing ideologies.
Course History
- Syllabus Bair-Mundy, Summer 2010
-
LIS 694 Tools for Community Advocacy
Course DetailsCommunity advocacy requires efficient and effective communication about issues that affect libraries. This combines original research, synthesis of existing research, opinion canvassing, and speaking to local and broader-based stakeholders. All of this information must be collated and presented in ways that make a strong case for the desired result. This course will examine techniques for doing, communicating and presenting this sort of research to support a particular population, library program or social issue. Students will learn to use online tools to collect and display data and to interleave statistics and storytelling to provide a compelling case for support of their chosen topic. Sample topics can include the digital divide, early childhood education, makerspaces in libraries, copyright reform, the library bill of rights or other topics of the students' choosing.
Course History
-
LIS 694 Virtual Librarianship
Course DetailsThe focus is on professionalization in this hybrid technology-intensive seminar that takes place in a classroom lab, online on the Web and in the immersive virtual world platform of Second Life (SL). The seminar allows students to explore technology innovations in librarianship, including Web 2.0 applications, online professional development services, and avatar-mediated library services. Conducted in a collaborative, project-based, online, inworld, and classroom workshop format.
Course History
- Syllabus Nahl, Fall 2012
-
LIS 694 Virtual Library Services
Course DetailsThrough readings, discussions, exercises, lectures, and guest presentations, students will learn how libraries can effectively offer virtual services to their patrons. Students will do in-depth research on a topic of special interest and write a research paper/proposal and an online presentation on their topic of interest.
Course History
- Syllabus Bell, Spring 2015
-
LIS 694 Visions of the Library
Course DetailsThe goals of this course are (1) to analyze how conceptions and misconceptions of libraries and information services are perpetuated through popular culture, (2) to analyze how the medium of digital video influences the information communicated through it, and (3) to learn how to use digital video as a tool for advocacy and outreach, to create our own visions of the library. Topics covered include visual culture, ethics and ownership, narrative structure, how sequencing and juxtaposition of multimedia elements influence information perception, how popular culture images are created and perpetuated via digital video, and implications for information systems and services.
Course History
- Syllabus Gazan, Fall 2016
-
LIS 694 Visual Information Science
Course DetailsAn introduction to the interdisciplinary study of visual information science related to visual information (data) collection, analysis, processing, transmission, utilization, and communication with emphasis on psychological, social, and cultural aspects of visual information in modern and digital libraries and information centers.
Course History
- Syllabus Ma, Summer 2008
-
LIS 694 Web 3.0 for Librarians & Information Professionals
Course DetailsThis course will give students the ability to understand new technology trends in the 2- to 5-year time frame and position both themselves, their employers and their patrons for productive implementation of these computer-based innovations. Expect plenty of expert speakers, case-studies, hands-on demos, forum discussions and reflective writing exercises.
Course History
- Syllabus Bell, Summer 2011
- LIS 694 Curating Digital Culture
-
LIS 695 Seminar in Research in Library & Information Science
Course DetailsVarious methodologies and application to problems of librarianship. Evaluation of research studies, developing, writing, critiquing proposals. Experience with statistical packages for data analysis.
-
LIS 701 Seminar in International Librarianship
Course DetailsInternational and comparative librarianship; professional organizations; comparative methodology; research; periodicals; international agencies; influence of literacy and social, cultural, political factors.
-
LIS 705 Asian Research Materials and Methods
Course DetailsLiterature of Asia in Western and Asian languages; bibliography, reference tools, research methods, sources, published and archival repositories. Repeatable one time.
-
LIS 715 Seminar in Information Policy & Planning
Course DetailsPublic and organization information policy and planning in society; public access; impact and issues of information technology and the Internet; privacy, security, globalization, intellectual freedom, copyright issues. | http://www.hawaii.edu/lis/courses/course-archive/ |
The European Union Intellectual Property Office (EUIPO) recently published a Comparative Case Study on Alternative Resolution Systems for Domain Name Disputes which highlights the main similarities and differences between various Dispute Resolution Procedures (DRPs), analysing in particular the different procedures, fees, timelines and case statistics. The study also compared the likely outcomes of a few selected DRPs in relation to various pre-defined case scenarios. The objective of the study was to compare and contrast the key characteristics of each DRP and bring greater clarity for all interested parties.
The study focused on the following Top Level Domains: all legacy generic Top Level Domains (gTLDs) as well as new gTLDs (all subject to the Uniform Domain Name Dispute Resolution Policy), and also the following country code Top Level Domains (ccTLDs): .AU (Australia), .DK (Denmark), .EU (European Union), .IT (Italy), .UK (United Kingdom), .CN (China), .JP (Japan), .NL (The Netherlands), and .US (United States). In all, ten different systems were examined. For example, regarding the .UK dispute resolution system run by Nominet, the study noted that mediated and summary decision cases take around 60 days, whereas full decision cases can take up to 100 days. If there was no response, a complainant could ask the Expert to make a summary decision. In 2017, Nominet received 712 complaints of which 247 resulted in transfer, 39 were denied, 182 were settled and 244 never reached a decision (for example because they were withdrawn or the fees were not paid).
Also by way of example, the study analysed the Chinese dispute resolution system. The China International Economic and Trade Arbitration Commission (CIETAC) and the Hong Kong International Arbitration Centre (HKIAC) are the official providers accepting complaints, and the procedure takes around 50-60 days. In 2017, 75 cases were received by HKIAC and 66 of them were decided in favour of the complainant. The same year, 58 cases were received by CIETAC and 52 were decided in favour of the complainant.
In addition, the study presented the likely outcome of eleven specific scenarios under each of the ten selected DRPs, such as domain names pointing to fan sites, tribute and criticism sites, domain names reflecting generic words, personal names or geographical indications, and disputes involving resellers or former business partners.
The study concluded that, with the exception of the .DK DRP (Denmark), which is more closely aligned with national law, the DRPs assessed were substantially similar to the UDRP. In fact, some of the DRPs analysed were almost identical to the UDRP, although some had modifications, such as the inclusion of an initial mandatory mediation phase, or amendments to align the process to the country’s underlying legal code (for example the DRP for .JP in Japan covers more than just trade mark rights to accommodate the narrow definition of trade marks defined under the Japanese Trademark Act).
As a result, with the exception of the Danish Domain Complaints Board (.DK), the likely outcomes for the eleven theoretical case scenarios were substantially similar across the different DRPs assessed. Despite this, there were a number of key points of divergence between the DRPs which were brought out on a more practical level in the case studies analysing the various potential scenarios. It can be seen that these divergences may in some cases lead to different case outcomes (for example in relation to the three cumulative requirements under the UDRP, which are often not reflected in other DRPs which have alternative requirements instead).
EUIPO hopes that the results of this study will provide more clarity for IP rights holders, domain name stakeholders and policy makers. It may be examined here. | https://www.lexology.com/library/detail.aspx?g=d907edc6-bde9-47dd-b970-ce6182d2b814 |
Keywords:
- alfaxalone;
- dogs;
- fentanyl;
- heart rate;
- propofol
Abstract
Objective
To compare the effect of alfaxalone and propofol on heart rate (HR) and blood pressure (BP) after fentanyl administration in healthy dogs.
Study design
Prospective, randomised clinical study.
Animals
Fifty healthy client owned dogs (ASA I/II) requiring general anaesthesia for elective magnetic resonance imaging for neurological conditions.
Methods
All dogs received fentanyl 7 μg kg−1 IV and were allocated randomly to receive either alfaxalone (n = 25) or propofol (n = 25) to effect until endotracheal (ET) intubation was possible. Heart rate and oscillometric BP were measured before fentanyl (baseline), after fentanyl (Time F) and after ET intubation (Time GA). Post-induction apnoea were recorded. Data were analysed using Fisher's exact test, Mann Whitney U test and one-way anova for repeated measures as appropriate; p value <0.05 was considered significant.
Results
Dogs receiving propofol showed a greater decrease in HR (−14 beat minute−1, range −47 to 10) compared to alfaxalone (1 beat minute−1, range −33 to 26) (p = 0.0116). Blood pressure decreased over the three time periods with no difference between groups. Incidence of post-induction apnoea was not different between groups.
Conclusion
Following fentanyl administration, anaesthetic induction with propofol resulted in a greater negative chronotropic effect while alfaxalone preserved or increased HR.
Clinical relevance
Following fentanyl administration, HR decreases more frequently when propofol rather than alfaxalone is used as induction agent. However, given the high individual variability and the small change in predicted HR (−7.7 beats per minute after propofol), the clinical impact arising from choosing propofol or alfaxalone is likely to be small in healthy animals. Further studies in dogs with myocardial disease and altered haemodynamics are warranted. | http://onlinelibrary.wiley.com/doi/10.1111/vaa.12166/abstract |
Having grown from humble beginnings in 1982 in the village of Shaw in Wiltshire, finding jobs for disabled people, today we are a complex and diverse charity committed to employment as the core pathway to a better life.
For us being part of the solution is about creating the conditions for this to happen, advocating and delivering services that make a real difference. Working in partnership not competition, we are part of an eco-system of purpose-led organisations, striving for a fairer, more equal society centred on opportunity for all. Shaw Trust was founded on these principles nearly 40 years ago, and for our 3,000 employees and 700 volunteers across the UK, they remain true. | https://livingmadeeasy.org.uk/dlf-is-part-of-shaw-trust |
The 7xxx series aluminium alloys are widely use in the aerospace industry due to their high strength. The grain refinement down to nanometre scale offers the possibility to further increase their mechanical properties which was already confirmed in a number of studies. However until now, there is a lack of comprehensive studies of the influence of grain size refinement on the corrosion mechanisms of aluminium alloys.
The aim of this study was to compare the electrochemical behaviour of polycrystalline and nanocrystalline 7475 aluminium alloy. The corrosion resistance and susceptibility to localized attack was investigated by means of potentiostatic and potentiodynamic polarization in solutions containing chloride ions of different pH (0.05M NaCl of pH2, pH8.4 and pH12). The extended microstructural characterization was carried out using SEM, TEM, EDS and EBSD techniques to determine the morphology of the corrosion attack.
The polarization tests showed that in strong alkaline environment, the electrochemical behaviour of poly- and nanocrystalline material was very similar. In strong acid solution, the nanostructured material was characterized by higher dissolution rate whereas in the solution of pH 8.4, the breakdown potential and the open circuit potential were shifted to more negative values which indicated poorer corrosion resistance of nanocrystalline material. The microscopic investigations indicated that in both cases the corrosion attack was strongly related with intermetallic particles, however, the morphology of this attack is different. In the case of polycrystalline material the peripherical pitting and intergranular corrosion along high angle grain boundaries was observed while in nanocrystalline material the corrosion damage was accumulated only in the region near the intermetallic particles.
Acknowledgement
This work was carried out within a NANOMET Project financed under the European Funds for Regional Development (Contract No. POIG.01.03.01-00-015/08). The processes of HE were carried at the Institute of High Pressure Physics of Polish Academy of Sciences. | http://science24.com/paper/18918 |
The School of Music offers training toward two specific graduate degrees in music: Master of Music requiring a minimum of 36 credit hours of graduate credit, and Master of Music Education requiring 30 credit hours. All programs require a minimum of 24 credit hours of residence at the University of Louisville.
The Music Theory area is committed to the instillment of a core of performative and analytical skills that will serve musical practitioners throughout their careers. In graduate courses, students apply these core skills to the study of a broad musical repertory. Students pursuing a master's degree in music theory work closely with our faculty to develop their interests in research and pedagogy and prepare themselves for careers in teaching and performance.
General Information Regarding Academic Policies
- Detailed curricular and program offerings, including specific requirements and provisions for degree programs, are published in the university catalog. Students will be provided with copies of the "Handbook for Graduate Studies in Music", the "Guidelines for Preparation for the Graduate Music History Entrance Examination," and "Guidelines for Preparation for the Graduate Music Theory Entrance Examination." These documents are also available on the School of Music website.
- Students will be required to address any deficiencies revealed by entrance examinations in courses taken within the first two semesters of study. Credit toward the degree is not granted for review coursework.
- All students are required to complete MUS 607 Bibliography and Research Methods by the end of the second semester of study (part-time students by the completion of 15 credit hours of graduate study). Upon satisfactory completion of requirements stated in Handbook sections B.2 and B.3, students will be considered in good standing.
- Students will complete a project appropriate to the field of study as defined by the faculty of their program. The completion of this project (public recital, thesis, professional paper) normally takes place in the last semester of graduate study. Preparation and presentation of a recital must follow the guidelines in the "Handbook for Graduate Studies in Music" and the preparation of a thesis must follow the "Guidelines for the Preparation and Processing of Theses" issued by the Graduate School. The preparation of a thesis in music composition must also follow the "School of Music Thesis Formatting Guidelines for MM in Composition".
- In order to graduate, a student must be in good standing with a minimum cumulative grade point average of 3.0. No more than six (6) credit hours with any C or C+ grade will be accepted toward a degree, and no grade below a B-minus will be accepted for a course in the student's major subject area. Hours earned beyond the minimum in any curricular areas apply only to that area and cannot be assigned to another area in order to satisfy required credit. At least one-half of the total credit hours in graduate courses must be at the 600 level. Any exceptions to the program of study must be approved by the Graduate Studies Committee. A student whose cumulative GPA falls below 3.0, or who fails to satisfy the published performance criteria, will be placed on probation. Students are ordinarily not permitted to continue on probation for more than one semester.
- When all coursework and projects have been satisfactorily completed, the student becomes a candidate for the degree and is approved to take the graduate oral examination. A candidate who fails the oral examination at the end of one semester may not be given a second one before the end of the following semester. A candidate who fails the second oral examination will not be granted the degree of MM or MME from the University of Louisville.
- Upon request, a maximum of six (6) credit hours of earned graduate credit with a minimum grade of B may be transferred from accredited institutions that offer advanced degrees. Credit for applied music will not be transferred, but advanced standing may be awarded at a jury. Ensemble credits appropriate to the student's degree program may be considered for transfer, but not to exceed one (1) credit hour per semester. Music history and music theory credits will be evaluated for transfer by the Director of Graduate Studies and the respective faculty. Transfer of more than six (6) credit hours may be requested provided that they are not earned by extension, or as thesis or practicum hours, and that the residency requirement of 24 credit hours is maintained by the addition of University of Louisville credits to the total program. Transfer of graduate hours within the University of Louisville toward a graduate degree in music may be requested provided that the minimum residence requirement of 24 credit hours is maintained.
- Students receiving a graduate assistantship (teaching, research, or service) will be provided with adequate training and will be required to adhere to university policies. Performance of duties in research and service by graduate assistants will be periodically evaluated. Students with teaching assistantships will be evaluated each semester.
- Part-time students (with the exception of those in the MME degree program) must participate in one ensemble for every 18 credit hours of completed coursework. If part-time study precludes completing ensemble degree requirements, other coursework may be substituted.
Admission Requirements
- Applications for admission to a graduate program require the following:
- A completed graduate application;
- An application fee;
- Official transcripts for all previous post-secondary course work (all transcripts not in English must be certified as authentic and translated verbatim into English);
- At least two letters of recommendation.
- Applications to specific degree programs require evidence of preparation for advanced study as follows:
- In performance, an acceptable audition;
- In academic specializations (music composition, music history, music theory), a portfolio of work appropriate to the field of study;
- In music education, evidence of classroom teaching experience.
- Applicants whose primary language is not English must show English language proficiency in one of the following ways:
- A minimum TOEFL examination score of 550 on the paper-based test, 213 on the computer-based test, or 79-80 on the internet-based test; official IELTS scores of at least 6.5 overall band score from the academic module exam; Duolingo overall score of 105.
- Documentation of the award of a degree from a recognized English language institution.
- Applicants must possess a baccalaureate degree from an accredited institution in the area to be pursued in advanced studies, or they must present evidence of equivalent preparation.
- Applicants must have a minimum cumulative undergraduate grade point average of 2.75 on a 4-point scale.
Applicants who meet the requirements listed in items 1-5 will be considered for conditional admission for graduate study at the School of Music. For additional entrance requirements specific to the degree of interest, see below.
Entrance examinations in music history, theory and, if appropriate, jazz, will be administered before the first term of study. The School of Music provides guidelines to assist in preparing for the entrance examinations.
Any exception to the above expectations will be evaluated individually and will require a statement indicating criteria to be met in a specified time frame with provisions for monitoring progress and performance. Justification must be provided in writing and must be accepted by the faculty of the student's proposed program, the Director of Graduate Studies, and the Dean of the School of Music.
Students who fail to meet performance standards or who do not meet other requirements as outlined in the letter of admission, program of study, or the catalog of the University of Louisville are subject to dismissal from their programs.
Program Requirements
Coursework
|Code||Title||Hours|
|Core Coursework|
|MUS 400||Theory Review 1||0|
|MUS 500||Music History Review 1||0|
|MUS 509||Major Ensembles (Three Semesters)||3|
|MUS 600||Graduate Oral Exam Preparation||0|
|MUS 607||Bibliography and Research Methods||3|
|Music History Seminar (600-level) 2||3|
|Music Theory||3|
|Additional Music Theory or Music History Seminar (500- or 600-level)||3|
|Select one of the following:||3|
|Advanced Chromatic Harmony and Analysis|
|Advanced Post-Tonal Theory and Analysis|
|Advanced Analysis|
|Thesis||4|
|Concentration Requirements (see tab)||14|
|Minimum Total Hours||36|
Other Requirements
All students must pass an oral examination after all course work is completed.
|1|
These courses may be satisfied by passing the entrance examinations in these areas.
|2|
One course of HUM 661, HUM 662, or HUM 663 may be substituted for three music elective credits.
Music Theory Concentration
|Code||Title||Hours|
|MUS 641||Pedagogy of Theory I||3|
|MUS 651||Schenkerian Analysis||3|
|MUS 694||Research (2 semesters)||4|
|MUS 665||Music Theory Seminar (4 semesters)||0|
|Music Electives 1||4|
|Minimum Total Hours||14|
|1|
One course of HUM 661, HUM 662, or HUM 663 may be substituted for three music elective credits. | https://catalog.louisville.edu/graduate/programs-study/master-music-theory/ |
Best Quimper Car Hire Companies
Quimper is a commune and the capital of the Finistere department in Brittany. It is located in North West France and occupies just 85 square kilometres of land area. The population of Quimper is around 64 000 people that permanently live within the city limits. Quimper dates back to the first settlement in the area during the time of the Romans. Visitors to the city always comment on the rustic feel of the area because of the picturesque foot bridges and Roman era architecture that lines the streets. Getting to and from Quimper is most often done via either the high speed train service that runs between the town and Paris ? a journey that takes around four and a half hours or by plane landing at Quimper Cornouaille Airport.
Tourists to Quimper are usually in search of the historic sights found around the city like the Roman Catholic cathedral of Saint-Corentin and the many other churches in the area that display architecture from many different styles. The Quimper Cathedral noted for the green devil that was said to appear in the burning bell tower during the fire that swept the cathedral in 1620. Other popular parts of town for the tourists visiting it are the old town centre and the Musee des Beaux-Arts. A simple stroll down the small streets in the town can give you a great look back into the history of the town.
If you visit the town in winter, you might be lucky enough to be there while the famous Quimper Winter Festival takes place. The locals call it Les Hivernautes. Year round, visitors to the city will see impromptu and unorganised concerts on the streets featuring pipers and accordion players.
Since 1690, the town has produced incredibly complexly decorated pottery featuring blue, yellow and green. The Musee de la Faience in the town has a huge collection of displays of the examples dating back through the history of the production of this exquisite pottery.
While Quimper has a good buss network, whenever you?re visiting a foreign town, having a car at your disposal for driving around the town and getting to locations outside the town or nearby towns is a very convenient resource. Visit Anycarhire.com to get quotations and comparisons between companies offering car hire in Quimper. | http://www.tripindicator.com/car-hire/quimper.html |
Problem: Loneliness and social isolation, both of which can have serious detrimental effects on health and well-being, have become more prevalent during the recent COVID-19 pandemic, particularly in the older adult population. During part of the past year, older adults were strongly encouraged to follow strict quarantine measures because of their vulnerability to the virus. This forced isolation exacerbated the already existing issue of loneliness and social isolation in this population.
Interventions: Older adults who are members of a local non-profit community organization, focused on increasing independence and social vitality, were invited to participate in a virtual, interactive social engagement program encompassing meaningful conversations and story-sharing with the aim to reduce feelings of loneliness and isolation in older adult participants. The program was implemented over a 12-week period with a total of six, one-hour sessions every other week.
Measures: The evaluation included data from the Zoom poll results after each session, which incorporated the UCLA Loneliness Scale. Personal experience feedback from a final Survey Monkey poll distributed to participants following completion of the 12-week program was used to collect additional data.
Results: The Zoom polls demonstrated that the majority of participants felt less isolated and more connected with other people during the sessions and that the program was beneficial in building meaningful relationships and improving their overall health and well-being. The final survey results were less conclusive that the program adequately addressed loneliness and isolation in older adults outside of the community setting.
Conclusions: The individual sessions potentially reduced feelings of loneliness and isolation in the short term, but the intergenerational program overall did not adequately address loneliness and isolation in the older adult participants longer term. Recommendations for future intergenerational programs include longer, in-person or hybrid sessions, consistency and commitment from volunteers, and smaller breakout groups for more intimate conversations.
Recommended Citation
Nagel, Melissa A., "Utilizing Digital Technology to Address Loneliness and Isolation in Older Adults through a Community-Based Connection Model: Responding to a Pandemic" (2021). Doctor of Nursing Practice (DNP) Projects. 264. | https://repository.usfca.edu/dnp/264/ |
RELATED APPLICATIONS
TECHNICAL FIELD
BACKGROUND
SUMMARY
DETAILED DESCRIPTION
I. Definitions
II. Overview
III. Systems
IV. Methods
This application claims the benefit of U.S. Provisional Application No. 61/925,935, filed Jan. 10, 2014, entitled “OPERATING ROOM SIMULATION TRAINING SYSTEM AND METHOD.” This provisional application is hereby incorporated by reference in its entirety for all purposes.
The present disclosure relates generally to simulation training and, more specifically, to systems and methods that can provide operating room simulation training.
For smooth operation of the operating room (“OR”), nursing staff members must be well educated to perform critical tasks. Student nurses participate in classroom lecture, labs, and simulated surgeries prior to entering the OR. Preceptor guided clinical experience allows the student to demonstrate increased competence, responsibility, and autonomy, where proficiency can be achieved anywhere from 8-12 months of OR clinical experience. A proficient student can use knowledge of anatomy and the associated surgical procedure to anticipate the needs of the surgical team, assuring smooth and efficient progress through the operation. For example, the proficient student should be able to pass instruments to the surgical team firmly, decisively, and in the proper position for immediate use with no wasted motion. Accordingly, the student should be able to identify and classify various surgical instruments that are placed on tables in the OR in a planned, organized, standardized, and functional manner. For example surgical instruments are divided into categories (families) based on the associated basic surgical maneuvers and then assembled into sets that can be used to perform specific surgical procedures.
The present disclosure relates generally to simulation training and, more specifically, to systems and methods that can provide operating room simulation training.
In one aspect, the present disclosure can include a system that can provide training for an operating room staff member. The system can include a plurality of surgical instruments. The system can also include a hand device that includes a housing configured to receive the surgical instrument. Within the housing, the hand device can include a non-transitory memory that stores instructions and a processor that can be configured to execute the instructions. An instruction can be provided to the operating room staff member related to a surgical instrument. One of the plurality of surgical instruments can be received from the operating room staff member in response to the instruction. The housing device can then determine whether the one of the plurality of surgical instruments matches the instructed surgical instrument.
In another aspect, the present disclosure can include hand device comprising a housing configured to receive a surgical instrument. The hand device can include, within the housing, a non-transitory memory to store computer-executable instructions and a processor coupled to the non-transitory memory and configured to execute the instructions. An instruction can be provided to the operating room staff member related to a surgical instrument. One of the plurality of surgical instruments can be received from the operating room staff member in response to the instruction. The housing device can then determine whether the one of the plurality of surgical instruments matches the instructed surgical instrument.
In a further aspect, the present disclosure can include a method for training an operating room staff member. The method can include the step of providing, by a hand device comprising a processor, an instruction related to placing a surgical instrument in the hand device to the operating room staff member. The method can also include the step of receiving, by the hand device, a test surgical instrument from the operating room staff member in response to the instruction. The method can also include determining, by the hand device, whether the test surgical instrument matches the instructed surgical instrument.
In the context of the present disclosure, the singular forms “a,” “an” and “the” can also include the plural forms, unless the context clearly indicates otherwise. The terms “comprises” and/or “comprising,” as used herein, can specify the presence of stated features, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, elements, components, and/or groups. As used herein, the term “and/or” can include any and all combinations of one or more of the associated listed items. Additionally, although the terms “first,” “second,” etc. may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. Thus, a “first” element discussed below could also be termed a “second” element without departing from the teachings of the present disclosure. The sequence of operations (or acts/steps) is not limited to the order presented in the claims or figures unless specifically indicated otherwise.
As used herein, the term “operating room staff member” can refer to any person in an operating room supporting a surgeon. Examples of an operating room staff member can include: a registered nurse, a practical nurse, a nursing student, a surgical technologist, a surgical technologist student, a medical student, a medical resident, and other medical professionals that require training for the operating room.
As used herein, the term “operating room” can refer to a facility in a hospital or other setting (e.g., a surgery center) where surgical operations are carried out on a patient in a sterile environment.
As used herein, the term “operation” can refer to a medical procedure involving an incision with surgical instruments.
As used herein, the term “training” can refer to the acquisition of knowledge, skills, and competencies as a result of teaching practical skills and knowledge related to specific skills required in the operating room. For example, the practical skills can be related to the surgical instruments used during a specific operation.
As used herein, the term “simulation” can refer to a definition, imitation, or enactment of a real-world process or system. An operating room simulation can relate to an enactment of an operating room using surgical instruments and a computerized hand device.
As used herein, the term “surgical instrument” can refer to a specially designed tool or device for performing specific actions of carrying out desired effects during surgery. For example, a surgical instrument can modify biological tissue, provide for viewing biological tissue, and the like. The term “instrument” can be used interchangeably with “surgical instrument.”
As used herein, the term “hand device” can refer to a computerized device (e.g., including a non-transitory memory and a processor) that can be used in a surgical training simulation. The hand device can be configured to receive a surgical instrument. In some instances, the hand device can be configured to receive a surgical instrument (e.g., a housing can be configured to receive the surgical instrument). In other instances, the hand device can be physically and/or electronically coupled to another device configured to receive the surgical instrument (e.g., a housing can include the memory and processor and a separate housing can be configured to receive the surgical instrument).
As used herein, the term “patient” can refer to any warm-blooded organism including, but not limited to, a human being, a pig, a rat, a mouse, a dog, a cat, a goat, a sheep, a horse, a monkey, an ape, a rabbit, a cow, etc. The terms “patient” and “subject” can be used interchangeably herein.
As used herein, the term “computing device” can refer to a device that includes a non-transitory memory that stores instructions and a processor configured to execute the instructions to facilitate performance of one or more operations. In some instances, the non-transitory memory can also store data corresponding to the one or more operations. The term “mobile computing device” can refer to a subset of computing devices that include a touch screen. Examples of mobile computing devices can include: a smart phone, a tablet computer, or a laptop computer.
The present disclosure relates generally to simulation training and, more specifically, to systems and methods that can provide operating room simulation training. As an example, the operating room simulation can be used to teach the operating room staff members to identify and classify various surgical instruments that can be used during a surgical procedure. The goal of the operating room simulation can be for the operating room staff to pass the correct surgical instrument to the doctor on the surgical team firmly, decisively, and in the proper position for immediate use.
The systems and methods of the present disclosure can employ a stimulator that allows individualized training in a home or classroom setting, as well as in a more formal simulation environment. The simulator can be used to allow an operating room staff member to practice recognizing instruments, setting up the instruments for various surgeries, handing off instruments in a sequential manner, and anticipate the next instrument required. In some instances, the system can allow for the ability to select from a library of different surgical cases, which can be tailored by degree of difficulty and customized for individual surgeons or staff. The simulator can allow the instrument to be handed to a hand device, which can accept the instrument and identify whether it is correct and/or if it is in the right orientation. Speed and/or accuracy can be graded for the operating room staff member and progress can be tracked over time.
One aspect of the present disclosure can include a system that can provide training to operating room staff. The system can employ a hand device (or a hand device linked to a computing device), which can receive a surgical instrument from an operating room staff member, determine whether the surgical instrument is correct, the speed at which the surgical instrument is handed to the hand device, a pressure related to the surgical instrument being handed off, and/or the orientation of the surgical instrument. In some instances, the hand device can be coupled to a laptop computer or other mobile computing device that can allow for flexible use of the system in different locations (e.g., at home, in a breakroom before surgery, in a classroom, etc.).
FIG. 1
FIG. 1
FIGS. 2-5
10
12
12
illustrates an example of a system that can provide training to operating room staff employing a hand device (or a hand device linked to a computing device), according to an aspect of the present disclosure. , as well as associated , is schematically illustrated as a block diagram with the different blocks representing different components. The functions of one or more of the components (e.g., the hand device ) can be implemented by computer program instructions. These computer program instructions can be provided to a processor of a general purpose computer, special purpose computer, and/or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer and/or other programmable data processing apparatus, create a mechanism for implementing the functions of the components specified in the block diagrams.
These computer program instructions can also be stored in a non-transitory computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the non-transitory computer-readable memory produce an article of manufacture including instructions, which implement the function specified in the block diagrams and associated description.
The computer program instructions can also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer-implemented process such that the instructions that execute on the computer or other programmable apparatus provide steps for implementing the functions of the components specified in the block diagrams and the associated description.
12
Accordingly, the components described herein can be embodied at least in part in hardware and/or in software (including firmware, resident software, micro-code, etc.). Furthermore, aspects of the components can take the form of a computer program product on a computer-usable or computer-readable storage medium having computer-usable or computer-readable program code embodied in the medium for use by or in connection with an instruction execution system. A computer-usable or computer-readable medium can be any non-transitory medium that is not a transitory signal and can contain or store the program for use by or in connection with the instruction or execution of a system, apparatus, or device. The computer-usable or computer-readable medium can be, for example but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus or device. More specific examples (a non-exhaustive list) of the computer-readable medium can include the following: a portable computer diskette; a random access memory; a read-only memory; an erasable programmable read-only memory (or Flash memory); and a portable compact disc read-only memory. In some instances, the hand device can be linked to a mobile computing device.
FIG. 1
10
10
10
10
10
10
10
As shown in , one aspect of the present disclosure can include a that can provide training to operating room staff. The system can simulate operating room conditions without a patient and/or a doctor being present. In some instances, the system can allow for an operating room staff member to practice recognizing instruments. In other instances, the system can allow for an operating room staff member to practice setting up the instruments for various surgeries. In still other instances, the system can allow for an operating room staff member to practice handing off instruments in a sequential manner. In further instances, the system can allow for an operating room staff member to anticipate the next instrument required. Accordingly, the system can provide a qualified operating room staff member who can identify and classify various surgical instruments that can be used during a surgical procedure so that they can pass the correct surgical instrument to a doctor on the surgical team firmly, decisively, and in the proper position for immediate use.
10
12
14
14
16
18
22
14
16
18
The system can include components including at least a hand device and a table . The table can include one or more groups of surgical instruments , , each having one or more individual surgical instruments . Although two groups are illustrated, it will be understood that more groups or fewer groups can be used for a surgical procedure. Additionally, any number of surgical instruments can be included within a group. In some instances, the table can include a component (e.g., a pad) that includes one or more sensors to detect that the groups , contain correctly grouped surgical instruments and/or that the groups are correctly positioned on the table. For example, the sensors can detect identification tags associated with the surgical instruments to make these determinations.
12
26
In some instances, the hand device can be embodied in a simulator device (e.g., a computing device) and/or coupled to the stimulator device that can allow an operating room staff member to practice recognizing instruments, setting up the instruments for various surgeries, handing off the correct instruments in a sequential manner in the right orientation, and anticipate the next instrument required. The simulator can include a memory that can store a library of various test modules and learning modules corresponding to different surgeries and/or different doctor or staff member preferences with different speed and/or difficulty modes.
12
22
12
The hand device can include a portion for receiving a surgical instrument representing a doctor's hand and can include and/or be coupled to a computing device (or mobile computing device). For example, the portion for receiving the surgical instrument can include a hand-shaped device configured to receive the surgical instrument. However, the portion for receiving the surgical instrument need not be shaped like a hand and can merely be configured to receive the surgical instrument. For example, the hand device can be a part of a larger robotic surgery simulator (e.g., with a wrist and elbow and a second hand/arm) or can just be a hand coupled to a computing device.
FIG. 2
12
28
32
34
26
24
Illustrated in is a configuration of components of the hand device or a computing device associated with the hand device. The computing device communicably coupled to the hand device can be any type of computing device and/or mobile computing device. Examples of such devices include laptop computers, desktop computers, touch screen devices, tablet computing devices, telephone computing devices, etc. The components can include an I/O component , a matcher , and a sensor . At least a portion of the components can be stored in the non-transitory memory and executed by the processor .
28
12
As an example, the I/O component can provide an instruction related to a certain surgical instrument. For example, the instruction can be an audio instruction and/or a visual cue/instruction. In some instances, the instruction can be based on a program dedicated to a surgical procedure, dedicated to a specific surgeon's preference, dedicated to a specific operating room staff member's preference, or the like. In some instances, the instruction can trigger a timer to start monitoring the time for the operating room staff member to give the surgical instrument to the hand device .
22
14
12
12
12
FIG. 1
Based on the instruction, the operating room staff member can select a surgical instrument (e.g., surgical instrument from the table of ) and give the surgical instrument to the hand device . For example, the operating room staff member can place the surgical instrument in a portion for receiving the surgical instrument of the hand device . In some instances, this causes the timer to stop monitoring the time. For example, the score of the program can be related to the time for the operating room staff member to put the surgical instrument in the hand device .
FIG. 3
12
34
22
34
22
12
12
As shown in , the hand device can include a sensor configured to detect the presence of the surgical instrument . For example, the sensor can include a pressure sensor that can be configured to determine a pressure with which the operating room staff member handed the surgical instrument to the hand device . As another example, the score of the program can be related to the pressure at which the staff member puts the surgical instrument in the hand device .
FIG. 2
32
12
32
12
22
22
12
Upon receiving the surgical instrument, referring again to , a matcher of the hand device can determine if the surgical instrument matches the requested surgical instrument. Based on the output of the matcher , in some instances, the hand device can produce an output distinguishing whether the surgical instrument matches the requested surgical instrument or does not match the surgical instrument. As an example, the score of the program can be related to whether the surgical instrument matches the requested surgical instrument. In some instances, it the surgical instrument matches the requested surgical instrument, other secondary considerations (e.g., pressure at which the device is handed to the hand device , orientation of the surgical instrument, the time to place the surgical instrument, or the like).
32
22
22
42
12
42
22
26
12
44
42
44
22
42
44
32
44
42
22
32
22
32
22
FIG. 4
FIG. 3
According to one example, the matcher can base its determination on a comparison between information about the surgical instrument and information about the requested surgical instrument. Referring now to , the surgical instrument can include an identification tag (e.g., a radio frequency identification (RFID) tag, a near field communication (NFC) tag, a bar code tag, or other type of identification tag) that can include one or more identifying features of the surgical instrument. The hand device can include a record of the identification tag and the surgical instrument in the memory . Additionally, the hand device can be coupled to a reader device that can read information from the identification tag . The reader device can be located sufficiently close to the receiving point for the surgical instrument to enable detection. For example, when the identification tag is a RFID tag, the reader device can be an RFID detector. The matcher of can use the signal detected by the reader device from the identification tag to determine at least whether the surgical instrument is properly selected. For example, the matcher can match the information included on the identification tag of the surgical instrument to the surgical instrument requested. As another example, the matcher can determine whether the surgical instrument is correctly positioned in the correct orientation for seamless use by the requesting surgeon.
FIG. 5
FIG. 5
12
32
52
54
52
22
54
12
12
34
22
12
22
Referring now to , illustrated is another example of components of the hand device . In , the matcher can include a correct device component and a further considerations component . The correct device component can determine whether the surgical instrument matches the requested surgical instrument. The further considerations component can determine whether the orientation of the surgical instrument is correct, the time to place the surgical instrument is rapid enough, and/or the pressure at which the surgical instrument is placed into the hand device is hard enough. The hand device is not limited to the components illustrated; for example, the hand device may include other components, such as one or more servos, an LED light, a sound card, an output device, etc. For example, the sensor can include a pressure sensor can be located in the palm of the hand device and can trigger the servos to close the hand upon receiving the surgical instrument . As another example, feedback (e.g., audio, visual, or the like) can be provided by the hand device based on one or more of the determinations of speed, accuracy, and/or correctness of the surgical instrument . The feedback can be stored as a record of progress for the operating room staff (e.g., for the individual user and for the staff as a whole).
60
70
FIG. 6
FIG. 7
Another aspect of the present disclosure can include methods that can provide training to operating room staff, according to an aspect of the present disclosure. The system can employ a hand device, which can receive a surgical instrument from an operating room staff member, determine whether the surgical instrument is correct, the speed at which the surgical instrument is handed to the hand device, a pressure related to the surgical instrument being handed off, and/or the orientation of the surgical instrument. An example of a method that can provide training for an operating room staff member is shown in . Another example of a method that can provide training for an operating room staff member is shown in .
60
70
60
70
60
70
FIGS. 6 and 7
The methods and of , respectively, are illustrated as process flow diagrams with flowchart illustrations. For purposes of simplicity, the methods and are shown and described as being executed serially; however, it is to be understood and appreciated that the present disclosure is not limited by the illustrated order as some steps could occur in different orders and/or concurrently with other steps shown and described herein. Moreover, not all illustrated aspects may be required to implement the methods and .
One or more blocks of the respective flowchart illustrations, and combinations of blocks in the block flowchart illustrations, can be implemented by computer program instructions. These computer program instructions can be stored in memory and provided to a processor of a general purpose computer, special purpose computer, and/or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer and/or other programmable data processing apparatus, create mechanisms for implementing the steps/acts specified in the flowchart blocks and/or the associated description. In other words, the steps/acts can be implemented by a system comprising a processor that can access the computer-executable instructions that are stored in a non-transitory memory.
60
70
The methods and of the present disclosure may be embodied in hardware and/or in software (including firmware, resident software, micro-code, etc.). Furthermore, aspects of the present disclosure may take the form of a computer program product on a computer-usable or computer-readable storage medium having computer-usable or computer-readable program code embodied in the medium for use by or in connection with an instruction execution system. A computer-usable or computer-readable medium may be any non-transitory medium that can contain or store the program for use by or in connection with the instruction or execution of a system, apparatus, or device.
FIG. 6
60
60
12
Referring to , an aspect of the present disclosure can include a method for providing training for an operating room staff member. The method can employ a stimulator device (e.g., hand device or the hand device and a linked computer) that can allow for individualized training in a home or classroom setting, as well as in a more formal simulation environment. The simulator device can be used to allow an operating room staff member to practice recognizing instruments, setting up the instruments for various surgeries, handing off instruments in a sequential manner, and anticipate the next instrument required. Speed and/or accuracy can be graded for the operating room staff member and progress can be tracked over time.
62
12
At , an instruction can be provided (e.g., by hand device or a computing device associated with the hand device) related to a surgical instrument (e.g., related to a program for a surgeon or staff member preferences, a surgical procedure, etc.). In some instances, the instruction can be provided as an audio instruction. In other instances, the instructions can be provided as a video instruction. In still other instances, the instruction can be provided as a combination of an audio instruction and a video instruction.
64
22
14
At , a test surgical instrument (e.g., surgical instrument ) can be received (e.g., from an operating room staff member) in response to the instruction. The test surgical instrument can be applied to the hand device with a pressure and within a certain time. In some instances, the hand device can measure the pressure at which the surgical instrument is given to the hand device. This can correlate to the level of surety the operating room staff member has regarding the correctness of the device. In other instances, the hand device can measure the time it takes for the operating room staff member to give the surgical device to the hand device. The time can be used to indicate surety of the operating room staff member has in choosing the device compared to other devices on a surgical table (e.g., table ). In some instances, the surgical table can be prepared for a certain surgery. In other instances, the surgical table can be prepared with a surgeon's preferred orientation. In still other instances, the surgical table can be prepared by the operating room staff member.
66
32
At , a determination can be made (e.g., by matcher ) of whether the test surgical instrument matches the instructed surgical instrument. In some instances, the hand device can be coupled to a sensor and/or reader to read a tag (e.g., an RFID tag) affixed to the surgical device. The matcher can consult a list of tag identification information and cross reference the scanned tag on the surgical device with the correct tag information. If the matcher indicates that the device is incorrect, an output can be produced (e.g., a sound or a light) indicating that the device is incorrect. If the matcher indicates that the device is correct, further instances related to the surgical instrument (e.g., the orientation of the surgical instrument, the time to place the surgical instrument, and/or the pressure at which the surgical instrument is placed into the hand device) can be examined. If the other instances are correct, an output can be produced (e.g., a different sound or a different light) indicating that the surgical instrument is correct. As another example, the output can be produced (e.g., the different sound or the different light) when the surgical instrument is correct without requiring examination of the further instances.
FIG. 7
70
60
70
12
illustrates another method for providing training for an operating room staff member. Like the method , the method can employ a stimulator device (e.g., hand device or the hand device and a linked computer) that can allow for individualized training in a home or classroom setting, as well as in a more formal simulation environment to enable accelerated learning of instrument identification, standard table set-up, accuracy, speed of passing instruments, and, ultimately, the anticipation of the next surgical maneuver.
72
12
At , a program can be received from a library (e.g., stored within a non-transitory memory of a hand device or computer associated with the hand device). In some instances, the program can be specific to a certain type of surgical procedure. In other instances, the program can be specific to a certain surgeon's or staff's preferences. In still other instances, the program can have a degree of difficulty based on the specific operating room staff member.
74
12
At , a surgical instrument can be requested (e.g., stored within a non-transitory memory of a hand device or computer associated with the hand device) based on the program. In some instances, the instruction can be provided as an audio instruction. In other instances, the instructions can be provided as a video instruction. In still other instances, the instruction can be provided as a combination of an audio instruction and a video instruction.
76
52
32
78
54
32
At , it can be determined (e.g., by the correct device component of matcher ) whether the surgical instrument received matches the instructed surgical instrument. In some instances, the hand device can be coupled to a sensor and/or reader to read a tag (e.g., an RFID tag) affixed to the surgical device. The matcher can consult a list of tag identification information and cross reference the scanned tag on the surgical device with the correct tag information. If it is determined that the surgical instrument received matches the instructed surgical instrument, at , further instances related to the surgical instrument can be examined (e.g., by the further considerations component of the matcher ). For example, the further instances can be related to the orientation of the surgical instrument, the time to place the surgical instrument, and/or the pressure at which the surgical instrument is placed into the hand device. If the further instances are correct, an output can be produced (e.g., a sound or a light). If the surgical instrument does not match and/or the surgical instrument does not satisfy one or more of the further considerations, a different output can be produced (e.g., a different sound or a different light). In other instances, different outputs (e.g., sounds or lights) can be produced for each of the different further considerations.
From the above description, those skilled in the art will perceive improvements, changes and modifications. Such improvements, changes and modifications are within the skill of one in the art and are intended to be covered by the appended claims.
BRIEF DESCRIPTION OF THE DRAWINGS
The foregoing and other features of the present disclosure will become apparent to those skilled in the art to which the present disclosure relates upon reading the following description with reference to the accompanying drawings, in which:
FIG. 1
is a schematic block diagram showing a system that can be used to provide training to operating room staff in accordance with another aspect of the present disclosure;
FIG. 2
is schematic block diagram of a hand device that can provide training to operating room staff in accordance with an aspect of the present disclosure;
FIG. 3
FIG. 1
is a schematic block diagram showing the hand device shown in interfacing with a surgical instrument;
FIG. 4
FIG. 2
is a schematic block diagram showing the hand device interfacing with a surgical instrument shown in with a reader device to scan an identification tag on the surgical device;
FIG. 5
FIG. 3
is a schematic block diagram showing the hand device interfacing with a surgical instrument with a reader device to scan an identification tag on the surgical device of with greater details of the hand device;
FIG. 6
is a process flow diagram illustrating a method for training an operating room staff member in accordance with another aspect of the present disclosure; and
FIG. 7
is a process flow diagram illustrating another method for training an operating room staff member in accordance with yet another aspect of the present disclosure. | |
Emotional processing in Colombian ex-combatants and its relationship with empathy and executive functions.
In this work, the neural correlates of emotional processing in Colombian ex-combatants with different empathy profiles were compared to normal controls matched for age, gender and educational level. Forty ex-combatants and 20 non ex-combatants were recruited for this study. Empathy levels as well as executive functions were measured. Empathy level was used to create three groups. Group 1 (G1) included ex-combatants with normal empathy scores, and Group 2 included ex-combatants with low scores on at least one empathy sub-scales. In control group (Ctrl), participants with no antecedents of being combatants and with normal scores in empathy were included. Age, gender, educational and intelligence quotients level were controlled among groups. event-related potentials (ERPs) were recorded while individuals performed an affective picture processing task that included positive, neutral and negative emotional stimuli, which elicit an early modulation of emotion categorization (Early Posterior Negativity (EPN)) and late evaluative process (LPP). EPN differences were found among affective categories, but no group effects were observed at this component. LPP showed a main effect of category and group (higher amplitudes in ex-combatants). There was an inverse correlation between empathy and executive functions scores and ERPs. Results are discussed according to the impact of emotional processing on empathy profile.
| |
Mainstream? Literary? Genre Short Stories? Huh??
What is the difference between Mainstream / Literary and Genre Short Stories?
Editor’s Note: Both MJ Rose and Angela give their opinion on this week’s question.
I bet you’ll find that each editor and writer has a different opinion about the definition of each.
Literary would, in my opinion, be a higher caliber of writing… but usually not preferred by your average reader. Most people like a fast, easy, entertaining read while the minority prefer literary works that use words and phrases to imply meaning to the reader without stating the author’s meaning in clear, easy-to-interpret terms.
Genre short stories can serve either audience depending, of course, on whether the story is literary or not.
There are only a few literary authors I like to read (M.J. Rose is my favorite – and that’s not just because she’s my friend). When an author gets too literary and I find myself interpreting more than reading, I get bored really fast. (Sometimes I joke that literary authors just have bigger thesauruses).
I’m often busy and when I do relax, I get interrupted a LOT. So, I prefer mainstream titles – suspense and romance titles. I can just read them and not really have to think while doing so. I also read children’s historical fiction. When I find a good one, I have our 12- an 14-year-old children read it, too.
Now, there’s more information than you wanted to know!
Literary fiction is character driven and conotes a certain attention to the writing itself. Commercial or genre fiction is plot driven and while there is excellent writing in commercial or genre fiction, that’s not its selling point.
It’s a big argument really. A lot of literary writers use plots, a lot of commerical writers can write one helluva georgeous sentence.
Basically, as Angela said, it’s in the eye of the beholder/reader/critic. Get a copy of the New Yorker magazine. Those short stories are literary. Get a copy of Alfred Hitchock magazine. Those are genre. | https://writersweekly.com/ask-the-expert/mainstream-literary-genre-short-stories-huh |
Q:
How can 1000 divided into 5 give 250?
A small discussion in the middle of Who Mourns for Morn? episode includes following:
QUARK: We could split the latinum five ways. That's what you would've gotten if Morn was still alive.
LARELL: That's true.
QUARK: Think of me as Morn. I can't believe I just said that.
NAHSK: This isn't fair. We stole it. He had nothing to do with it.
QUARK: Maybe not, but the bottom line is you need me.
HAIN: A thousand bricks of latinum split five ways. What do you think?
KRIT: It's still a lot of latinum.
NAHSK: That's two hundred and fifty bricks each.
(emphasis mine)
Is there a small nuance behind (Nahsk meaning that Quark is not going to get his part after all) or did the script writer make a simple mathematical mistake, not knowing that 1000 / 5 = 200, no 250?
A:
Nahsk isn't the brightest star in the sky. The original screenplay describes him thusly
Nahsk is the "muscle" of this duo, and a bit slower than his brother.
and offers the following stage direction when he makes his error
HAIN: A thousand bricks, split five ways... what do you think?
KRIT: It's still a lot of latinum.
NAHSK: (nods) Two hundred and fifty bricks each.
They all look at Nahsk, decide not to bother correcting him --
A:
This is deliberate mistake on the part of the writers to flesh out the character of Nahsk.
Later on the writers use the fact that Nahsk is slow to make an argument happen between Nahsk and his brother.
Quote from Memory Alpha:
Krit says Hain is outgunned, as his brother may be "slow," but he'll get Hain in the end.
This leads to the breakdown and the fight between the four people trying to get the Latinum.
| |
I came across a story the other day of a teacher, Chen Miller, who is a special education teacher from Israel. With great patience and determination, Miller transformed one of her pupils from a very angry, destructive and frustrated little boy, to one who was open to learning and who placed his trust in this person who believed in him.
Everyone else had all but given up on this boy – teachers, the headteacher, even his parents who had all told him he was ‘disturbed’.
By repeating one phrase daily to her pupil: “I know you have a big heart. I know that you’re clever. I know that you’re a good boy,” Chen Miller helped to change this boy’s self-image – the simple repetition of these words helped him to see himself differently.
If you tell someone enough times they are stupid, if they are vulnerable they will start to believe it. They question why else would they be told this if it wasn’t true? Men and women in domestic abuse situations are often held ‘captive’ because of not just the physical side of the abuse but also because of the mental aspect of what is being continuously said to them. They see no way out of the situation because the one person they spend most of the time with, is leading them to believe they are stupid, incapable and not worthy of anything else.
Without an understanding of the principles of The Winning Edge, it is hard to realise nor grasp that choosing your situation, for the most part, is within your control. For some, undeniably it can be hard but it is possible with immense strength, fortitude and determination; self-belief is paramount and that is where the stumbling block is for so many people. It is believing you are worthy and that, if you’re not lucky to have the encouragement of those around you, you can make this transformation alone.
As an adult, we have more understanding of how our brain works and the power of our mindset; as a child, we do not have this comprehension and that’s why those around us and what they do and say to us, can begin to leave an impression on the development of our self-image and our self-esteem. It’s surely then our responsibility as adults to empower the children around us – our own children, grandchildren, godchildren, nieces, nephews and so forth, to help bolster their self-image and thus their self-esteem and to help them to comprehend that the control lies within each of us to make choices – that no one can make us do or feel anything. As these young people grow, armed with this powerful knowledge, if they do cross paths with individuals who attempt to exert their control over them, they are able to handle the situation because of their own high self-worth.
As Chen Miller said: “Education is the forming of impressions on souls,” and I believe we all have a moral duty to ensure the children around us learn their value and that they can do or be anything they want to through self-belief and determination, choosing to let no one stand in their way.
I believe the following quote should apply to all grown-ups, not just parents, who have some kind of influence in a child’s life:
“Parents need to fill a child’s bucket of self-esteem so high that the rest of the world can’t poke enough holes to drain it dry.” Alvin Price
By Kirsty Perrin
About the Author: Having been immersed in the Winning Edge principles from an early age, Kirsty’s philosophy is to be the best you can be and to enjoy what you do in life.
Kirsty knows that personal development is a continuous journey and therefore has a genuine desire and enthusiasm to help people realise their full potential, to be a success in their life-whatever that may mean to them. | http://www.mancroftinternational.com/i-think-therefore-i-am-2/ |
Belfast Cathedral Music Festival 2017
A ‘feast of talent’ describes the performances at the Belfast Cathedral Music Festival 2017. The week long programme at St Anne’s Cathedral ran from 13th – 18th June. It featured musicians and singers from Northern Ireland & England and as far afield as Ohio, USA.
The opening night featured a recital by three NI Opera singers, Elaine Pelan, Sarah Richardson and David Howes, with Master of the Choristers David Stevens providing accompaniment.
There was a selection of solos and duets, featuring music from Britten, Monteverdi, Bizet, Mozart, Bellini, Massenet, Brahms and Mahler.
On the second day of the Festival St Anne’s welcomed the Elder Glee Club from Ohio, USA, for a lunchtime concert. Featuring singers aged 15-18 from an all-male school, they sang for 45 minutes covering American gospel music and spirituals as well as folk music. Their repertoire also featured some Irish favourites including ‘My Wild Irish Rose’ and ‘Danny Boy.’
That evening Conor Breen, a former Belfast Cathedral lay clerk, gave a wonderful recital. Conor created his performance around the thoughts that come to poets and musicians when considering the idea of silence.
In his programme notes Conor led his audience through fear, insecurity, respect, communion, creativity, comfort, relief, sleep and death. Once again David Stevens was an amazing accompanist. Conor was joined for the longest piece, Britten’s ‘Canticle II,’ by the soprano Laura McFall.
The tempo was upped for the third day of the Music Festival with a concert by the Ulster Youth Jazz Orchestra. This band, under the direction of Ken Jordan, is about to celebrate 25 years.
Pieces included ‘You are the sunshine of my life,’ ‘Haven’t met you yet,’ and ‘Here’s to Life.’ There was a smoothness to this jazz orchestra too, with soloists complementing the big band sound. This was a great addition to the Music Festival.
On the Saturday night, St Anne’s welcomed the New Irish Arts choir and orchestra. As the setting was vital to this performance the Nave was cleared and rearranged. This allowed the audience to be seated as close as possible to the singers and musicians.
The programme was received by an enthusiastic audience. It included classics of the Christian musical repertoire to contemporary arrangements and compositions.
The Belfast Cathedral Music Festival 2017 featured singers and musicians from several music genres.
The 2017 Music Festival was rounded off with a concert by the Steeton Male Voice Choir from Yorkshire. The concert also featured solos and duets by musical director of the Antrim based Clare Chorale, mezzo soprano Sheelagh Greer, and her soprano colleague Laura.
The Steeton Choir provided a varied programme that suited the acoustic of St Anne’s well. They performed a number of traditional pieces including ‘Carrickfergus’ while Pat Jones, the accompanist, was later joined by three fiddlers.
The Dean of Belfast, the Very Rev John Mann, reflected on the Belfast Cathedral Music Festival 2017. He extended his thanks to the organisers, and especially to the musicians. He said ‘they have made jazz to opera, folk to classical, liturgical to light-hearted come to life for us for a few days.’
Find out about other events and services at Belfast Cathedral on their website here. | https://www.thechurchpage.com/2017/06/26/belfast-cathedral-music-festival-2017-2/ |
NEW YORK, Nov. 26, 2019 (GLOBE NEWSWIRE) — Levi & Korsinsky, LLP announces that class action lawsuits have commenced on behalf of shareholders of the following publicly-traded companies. Shareholders interested in serving as lead plaintiff have until the deadlines listed to petition the court and further details about the cases can be found at the links provided. There is no cost or obligation to you.
The lawsuit alleges: Uniti Group Inc. made materially false and/or misleading statements throughout the class period and/or failed to disclose that: (i) Uniti’s financial results were not sustainable because its customer Windstream had defaulted on its unsecured notes; and (ii) as a result of the foregoing, Defendants’ statements about Uniti’s business, operations, and prospects, were false and misleading and/or lacked a reasonable basis.
Waitr Holdings Inc. (NASDAQ: WTRH) Class Period: on behalf of shareholders who purchased shares between May 17, 2018 and August 8, 2019, including, but not limited to, those who acquired Waitr shares in connection with the Going Public Transaction, and those who acquired shares of the Company in the May 2019 Secondary Offering. Lead Plaintiff Deadline: November 26, 2019 Join the action: https://www.zlk.com/pslra-1/waitr-holdings-inc-loss-form?wire=3&prid=4609
The lawsuit alleges: Waitr Holdings Inc. made materially false and/or misleading statements and/or failed to disclose that: (i) Waitr lacked a plan to achieve profitability and, contrary to the statements of Company founder Chris Meaux, Waitr was not at or near profitability and Defendants had created the illusion of financial stability by engaging in a host of illegal and improper activities each designed to inflate revenues and earnings—such as unilaterally breaking low-rate contracts and imposing significantly higher rates, and by refusing to pay drivers for mileage related expenses—both of which ultimately resulted in independent class action lawsuits; and (ii) Waitr’s technology provided no real advantage and the Company could not obtain the developer, programming, or engineering resources necessary to enhance, maintain, and develop industry leading software from its headquarter location in Lake Charles, Louisiana.
The lawsuit alleges: Resideo Technologies, Inc. made materially false and/or misleading statements throughout the class period and/or failed to disclose that: (a) the negative operational effects of the Company’s spin-off from Honeywell International Inc. were more substantial and persistent than disclosed and had negatively affected Resideo’s product sales, supply chain, and gross margins, putting the Company’s FY19 financial forecasts at risk; and (b) as a result of the foregoing, the Company’s financial guidance lacked a reasonable basis and the Company was not on track to make its FY19 guidance as claimed.
To learn more about the Resideo Technologies, Inc. class action contact [email protected].
The lawsuit alleges: Canopy Growth Corporation made materially false and/or misleading statements and/or failed to disclose that: (1) the Company was experiencing weak demand for its softgel and oil products; (2) as a result, the Company would be forced to take a CA$32.7 million restructuring charge due to poor sales, excessive returns, and excess inventory; and (3) as a result, Defendants’ statements about its business, operations, and prospects, were materially false and misleading and/or lacked a reasonable basis at all relevant times.
To learn more about the Canopy Growth Corporation class action contact [email protected].
You have until the lead plaintiff deadlines to request the court appoint you as lead plaintiff. Your ability to share in any recovery doesn’t require that you serve as a lead plaintiff.
Levi & Korsinsky is a national firm with offices in New York, California, Connecticut, and Washington D.C. The firm’s attorneys have extensive expertise and experience representing investors in securities litigation and have recovered hundreds of millions of dollars for aggrieved shareholders. Attorney advertising. Prior results do not guarantee similar outcomes.
GlobeNewswire,is one of the world's largest newswire distribution networks, specializing in the delivery of corporate press releases financial disclosures and multimedia content to the media, investment community, individual investors and the general public.
Forex Resources
Risk Disclaimer - By using this web site you agree to its terms and conditions.
All materials, including but not limited to articles, directories, photos, lists, etc., on this website are the sole property of ForexTV or the respective copyright holders and are intended for informational/educational purposes using hypothetical and sometimes anecdotal illustrations. The unauthorized use of any and all materials is prohibited and restricted by copyright law. Any use of materials on this site must be approved in advance by ForexTV.
Before deciding to invest in foreign exchange you should carefully consider your investment objectives, level of experience, and risk appetite. The possibility exists that you could sustain a loss of some or all of your initial investment and therefore you should not invest money that you cannot afford to lose. You should be aware of all the risks associated with foreign exchange trading, and seek advice from an independent financial advisor if you have any doubts. Forex (or FX or off-exchange foreign currency futures and options) trading involves substantial risk of loss and is not suitable for every investor. The value of currencies may fluctuate and investors may lose all or more than their original investments. Risks also include, but are not limited to, the potential for changing political and/or economic conditions that may substantially affect the price and/or liquidity of a currency. The impact of seasonal and geopolitical events is already factored into market prices. The leveraged nature of FX trading means that any market movement will have an equally proportional effect on your deposited funds and such may work against you as well as for you. Past results are no indication of future performance. Information contained this web site is intended for informational purposes only and was obtained from sources believed to be reliable. Information is in no way guaranteed. No guarantee of any kind is implied or possible where projections of future conditions are attempted. | |
Vanessa Stergios is the Director of Development for Dixon Center for Military and Veterans Services.
Vanessa has spent the bulk of her career in leadership of non-profits organizations supporting families. She brings experience increasing fiscal, programmatic and agency resources across social service, government, and non-profit organizations including Ohio Network of Children’s Advocacy Centers, Tuscarawas County Child Advocacy Center, Stark County Family Court/Department of Job and Family Services, and AHEAD Inc. Throughout her career she has assisted these agencies in diversifying funding streams and creating financial stability, developing and implementing innovative new programs, and influencing community collaboration.
This expertise in working with multi-disciplinary teams, community advocates, and families impacted by trauma, coupled with personal experiences as a military family member, affords Vanessa a unique combination of career experience and personal passion in serving our nations veterans and military families
As Dixon Center’s director of development, Vanessa’s role is to support Dixon Center leadership and leverage opportunities to expand our reach to veterans and military families. Vanessa intends to leverage her skills in community collaboration, program development, fiscal growth, and organizational assessment to improve projected outcomes and data-driven metrics.
Vanessa holds a master’s degree in Clinical Counseling from Walsh University and is a Licensed Professional Clinical Counselor, Licensed Social Worker, and Certified Adoption Assessor. She received her Bachelor of Arts degree in Family Studies and a minor in Psychology from the University of Akron. | https://dixoncenter.org/vanessa-stergios/ |
Mali – book burying in the news
In the news – people in Mali burying their family’s collections of ancient manuscripts in the desert to prevent their destruction by Islamist insurgents, after fighting in the area had apparently affected the Ahmed Baba Institute library of Timbuktu manuscripts.
Part of a TImbuktu Manuscript on astronomy
The Ahmed Baba Institute of Higher Islamic Studies and Research in Timbuktu holds tens of thousands of historic manuscripts dating back to the late 13th Century, from the period when Timbuktu was a major trading settlement and centre of scholarship. Ironically many of the manuscripts in the library had survived for centuries buried in the sand or hidden in caves. It isn’t yet clear how many manuscripts have been destroyed or stolen.
An unknown number of the historic Timbuktu Manuscripts – possibly hundreds of thousands – remain in private collections held by Malian families. Some of these manuscripts are being buried in the desert for safekeeping: hopefully they’ll all be recovered soon.
| |
NUR – Meditation App
On a mission to solve the lack of online support for mental wellbeing and mindfulness techniques in Arabic speaking countries and its diaspora, NUR is a mindfulness and meditation app that provides daily audios to enhance well-being, support mental struggles and sleep deprivation in Arabic. Always culturally relevant, NUR is unique because it takes into consideration the complexities of the rich culture, religions and traditions of the MENA region in the content offered through the application.
NUR’s brand identity was revamped with the goal to expand on the 4 elements of life: Air, Water, Fire & Earth, to highlight and deepen the conversation on the importance of meditation and mindfulness.
Date: | https://aebranding.com/portfolio-item/nur-meditation-app/ |
Editor: You are the chair of Kelley Drye's diversity and inclusion committee and the first woman partner at the firm. How has the definition of diversity changed over the years?
Reid: Our understanding of diversity has deepened and become much more sophisticated. When I first started practicing law, diversity was very much tied to how you were perceived by others - what color was your skin, what was your gender? Diversity was a term that set you apart from the norm, but now we understand that diversity means something quite different. Diversity includes and values differences that often are not visible, and these can include cultural and religious differences and sexual orientation as well as gender and ethnic background. In today's more global economy, we no longer assume we know a person simply because we know what they look like. We understand that diversity comes in an infinite variety of forms.
Editor: Are there certain common challenges that incoming attorneys of diverse backgrounds face today?
Reid: The primary challenge is for all people to find a comfort zone at the workplace, and for that to happen, mentoring still is the key. Everyone needs a guiding hand when they start, but it can be more of a challenge for attorneys of diverse background to find that hand. So, Kelley Drye supports a variety of strong mentoring programs.
Editor: What are some of the mentoring programs in which Kelley Drye is active?
Reid: Many of our lawyers are active participants in the Practicing Attorneys for Law Students (PALS) program, which assists with career development in the legal profession. Through our partnership with PALS, 18 attorneys currently mentor minority law students from participating law schools in New York. As part of the PALS program, the firm sponsors the annual Mock Interview/Resume Workshop for law students of color. Kelley Drye attorneys role-play as interviewers during the workshop to give the students practice in honing career development skills.
Within the firm we have two different kinds of mentoring programs: one for any associates who do not have assigned mentors, and the other for the first full year of practice. For our unassigned associates, we have mentoring circles, where groups of associates meet regularly to talk with each other and to form friendships, which often last the entire time they are at the firm and for the duration of their careers. After associates are assigned mentors, we have a more formal program with partners and more senior associates, who meet regularly and work with junior associates on developing their careers.
Editor: In addition to mentoring, I understand Kelley Drye has a "generational differences" program that seems to be an innovative initiative. Can you describe this in greater detail?
Reid: For the first time, this year we are conducting a generational differences program in all of our offices to work on increasing effective communication among attorneys of different generations. It's part of our comprehensive awareness of increasing the comfort zone for all of the people who are part of the Kelley Drye community.
We are using a consultant, Dr. Arin Reeves, anexpert in the field of intergenerational communication. Her consulting firm specializes in diversity strategies for the legal profession, which includes generational differences. She meets with partners and associates in individual groups - partner groups, associate groups - to identify differences in communication styles. She then facilitates discussions in combined sessions with partners and associates. It has been fascinating. One particularly striking observation is that there are generational differences in the preferred ways of communication. The younger generation is much more comfortable with the new technologies of instant messaging, text-messaging, emailing, blogging and Internet social networking.
Editor: Addressing generational differences touches upon recruiting, which can involve lawyers in earlier stages of their careers. What are some of the diversity related activities you participate in with regards to recruiting?
Reid: In New York, Kelley Drye takes part in career fairs, such as the Northeast Black Law Students Association (BALSA) job fair, and the Lavender Law career fair, which is for lesbian, gay, bi-sexual and transgender (LGBT) associates. We also sponsor a New York City Bar diversity fellow. The fellowship program is highly competitive and places first-year law students from historically under-represented populations (including minorities and those of disadvantaged economic status) from 11 New York City law schools with law firms and corporate departments. In the firm's D.C. office, we participate in job fairs and host events such as the "Kelley Drye Mock Interview Week," a mock interview program for minority students at Georgetown University Law Center, Howard University School of Law and George Washington University School of Law. We also host an annual summer associate diversity reception. Kelley Drye takes many steps to get our name out in the community to recruit diverse attorneys and it has been very gratifying. We have received greater visibility and more inquiries, which is a good two-way street - for both Kelley Drye and the diverse candidates interested in pursuing careers in law.
Editor: I also recall that you have an innovative summer associate program with JP MorganChase. What does that program offer?
Sarah: We are continuing with a program, launched last year by JP MorganChase, to increase diversity among attorneys in the financial services area. Law students from diverse backgrounds in the summer associates program have the opportunity to spend five weeks at the firm and five weeks at JP MorganChase's legal department. The program provides people of different backgrounds with greater opportunities to enter careers in the financial industry.
Editor: Not only recruiting but also retaining quality attorneys in later stages of their careers can require specific attention. Are there other steps Kelley Drye takes to retain diverse attorneys?
Reid: We have a diversity administrator, Ayanna Ryans. While she is located in New York, she works with all of our offices to ensure that the diverse associates' concerns are being heard and met. Associates are an integral part of the Diversity and Inclusion Committee, of which I am the chair.
Last year, we had several diverse clients speak to our associates about their experiences, providing perspectives and career guidance. The firm also has a very active women's affinity group, Women at KDW, comprising associate women lawyers, who have regular meetings and programs several times a year in D.C. and New York. We also sponsor and encourage our attorneys to participate in the New York and D.C. Minority Attorney Networking Series, which hosts quarterly events. At these programs, minority attorneys in both cities get together to hear distinguished speakers, and network and connect for mentoring, career and business development purposes. We make an effort to support diversity initiatives, especially the ones the associates bring to our attention. We also do our basic nuts and bolts work of keeping policies up to date and making sure work assignments are distributed appropriately, and just recently, in terms of policies being kept up to date, we've enhanced our parental leave policy.
We actively support various diversity networking organizations, beyond the recruiting phase. For example, we recently hosted a Cafécito that was extremely well-attended. ("Cafécito" is a series of informal networking breakfasts for Latina women attorneys in New York's public and private sectors, from the corporate, judiciary and academic arenas.)
The firm is a member of the Association of Law Firm Diversity Professionals (ALFDP), an organization created to facilitate networking and to share best practices of law firm diversity professionals nationwide. Our membership assists us in staying on top of the issues, needs, and concerns of the diverse attorneys currently in the legal industry, as well as those still in the pipeline. In this way, we hope to proactively address these issues, instead of simply reacting to them.
Editor: In addition to supporting diversity at the professional level, Kelley Drye is active in diversity programs, starting in the high schools. What are some of the programs in which your firm is involved?
Reid: We have internships through the Cristo Rey corporate work-study program, where high school students come during the school year and work in various administrative departments at Kelley Drye to gain workplace experience and to help pay their school tuition. In the summer, we participate in similar arrangements with both the Inner-city Scholarship Fund Job Opportunity Program and the Thurgood Marshall Summer Law Internship Program. High school students work at Kelley Drye and gain exposure to the work of a law firm. It's important to reach out to those even younger than the college level - to the community. These programs help young people to see that there are opportunities going forward and that they can plan for college and for many career possibilities. The experiences teach them that "they can." They are bright and motivated and are an asset to the firm. They are mature, interesting individuals, and it's wonderful to have them here.
Editor: How has the country's economy affected the firm's commitment to diversity?
Reid: If anything, the economic turbulence that the global economy is experiencing has only added greater emphasis to our beliefs in the importance of diversity. We are all in this economic situation together. It certainly is not the time to retreat from our strong belief that diverse perspectives are essential to prospering in today's world. The global nature of today's economic challenges emphasizes our need for tapping into the pluralistic, multi-talented pool of lawyers.
Editor: Why is diversity so important to Kelley Drye?
Reid: We live in a world where, because of the Internet and the Web, we can communicate with someone in Africa or Asia as easily as we can communicate with someone in the office next door. Kelley Drye represents businesses all over the world, and the diversity of our attorneys is a big plus. Acknowledging our differences and using them as a value-added for our client needs is one of the keys to our firm's success.
Please email the interviewee at sreid@kelleydrye with questions about the program. | http://www.metrocorpcounsel.com/articles/11082/diversity-matures-law-firms-ask-sarah-reid |
NASA’s Artemis 1 moon mission will carry 2 water-seeking cubesats
When Artemis 1 launches, hopefully on Aug. 29,its primary mission is easy: test the newest Space Launch System (SLS) rocket, the Orion spacecraft, and the bottom systems at Kennedy Space Center in Florida. NASA hopes that mix of technology will dsicover humans go back to the moon in a couple of years.
But which means Artemis 1 will undoubtedly be headed for the moon, a chance never to be missed, so that it will undoubtedly be taking with it 10 secondary payloads. Two of these are cubesats made to search the moon for water: Lunar IceCube and Lunar Polar Hydrogen Mapper (LunaH-Map). As humans go back to the moon and travel beyond the discovery of water is essential for long-duration missions, since would-be explorers desire to harvest breathable air and rocket fuel from the ice.
Lunar IceCube has been produced by Morehead State University in Kentucky. The 31-pound (14 kilograms) cubesat will carry a NASA instrument called the Broadband Infrared Compact High-Resolution Exploration Spectrometer (BIRCHES), that may map water on the lunar surface in addition to in the exosphere, the thin layer of gas surrounding the moon such as a very weak imitation of Earth’s atmosphere.
Related: NASA’s Artemis 1 moon mission explained in photos
“Lunar IceCube can help pave just how for human missions through considerably less expensive robotic missions and by addressing water dynamics on the moon,” Mark Lupisella, a NASA exploration research and development manager, said in a statement. “This is simply not only very important to science, nonetheless it may be very important to reducing the price of human missions on the long-term.”
The mission may also test a fresh ion propulsion thruster, which “operates electrically using smaller amounts of propellant to provide a little push and drive the spacecraft along its path, much like that of butterfly wings,” in accordance with NASA.
“Interplanetary exploration with CubeSats can be done by using innovative propulsion systems and creative trajectories,” Benjamin Malphrus, executive director of the area Science Center at Morehead State University, said in the statement. “The ion propulsion system can be an enabling technology that may open the entranceway to solar system exploration with small satellite platforms, ushering in a fresh era of space exploration.”
The Lunar Polar Hydrogen Mapper (LunaH-Map), however, will undoubtedly be studying previously identified potential regions of water ice at the moon’s south pole. The 30-pound (13.6 kg) cubesat has been produced by Arizona State University.
“We realize from previous missions there’s an elevated abundance of hydrogen at the lunar poles,” Craig Hardgrove, a planetary geologist at Arizona State University and the mission’s principal investigator, said in a statement. “But we have no idea just how much or wherever.”
Throughout a planned 60-day mission, LunaH-Map use two neutron spectrometers to map near-surface hydrogen deposits within the very best 3 feet (1 meter) of the moon, including deposits in permanently shadowed regions. The effect will undoubtedly be scientists’ most detailed map of water ice at the south pole up to now, in accordance with NASA.
All of the data gathered by Artemis 1’s secondary payloads will donate to future missions to the moon and beyond. NASA intends for Artemis 1 to start an ambitious lunar exploration program to create a sustainable presence on the moon.
“Anything we find out about the moon is valuable,” Cliff Brambora, BIRCHES lead engineer said. “The moon is really a sort of proving ground for technology and exploration, and the data we gain there can help us with the prospect of establishing a sustained presence on other planets, such as for example Mars.”
Follow Stefanie Waldek on Twitter @StefanieWaldek. Follow us on Twitter @Spacedotcom and on Facebook.
Join our Space Forums to help keep talking space on the most recent missions, night sky and much more! And if you’ve got a news tip, correction or comment, tell us at: [email protected].
Space.com contributing writer Stefanie Waldek is really a self-taught space nerd and aviation geek who’s passionate about everything spaceflight and astronomy. With a background in travel and design journalism, in addition to a Bachelor of Arts degree from NY University, she focuses on the budding space tourism industry and Earth-based astrotourism. In her leisure time, you could find her watching rocket launches or finding out about at the stars, wondering what’s out there. Find out more about her just work at www.stefaniewaldek.com (opens in new tab). | https://social.tucson.com/nasas-artemis-1-moon-mission-will-carry-2-water-seeking-cubesats/ |
Аннотация: За последние несколько лет в структуре мирового экспорта произошло значительное увеличение доли углеводородов. На рост показателя оказало влияние и изменение мировых цен на них, и увеличение объемов их добычи. В статье приводится экономическая характеристика экспорта крупнейших мировых экспортеров углеводородов, определяется их доля в общем экспорте стран. Автором определено, что значительное увеличение объемов экспорта нефтепродуктов в США, Австралии, Индии и их уменьшение в Норвегии, Иране, Кувейте, Нигерии и Великобритании вызвали изменение региональной структуры мирового экспорта нефтепродуктов.
Summary:Over the past few years, the share of mineral fuels in the structure of world exports has demonstrated a significant increase. This growth was brought about both by changes in world prices for hydrocarbons and an increase in their production volumes. The article presents the economic characteristics of exports by the world’s largest hydrocarbon exporters and determines the share of oil and petroleum products in the total exports of these countries. The author identifies the impact of a significant increase in the volume of exports of petroleum products by the USA, Australia and India and a corresponding decrease by Norway, Iran, Kuwait, Nigeria and the United Kingdom on the regional structure of global exports of hydrocarbons.
Ключевые слова: мировой экспорт, минеральное топливо, углеводороды, нефтепродукты, экспортеры.
Key words: world export, mineral fuels, hydrocarbons, petroleum products, oil exporters.
According to basic models of trade by Adam Smith, David Ricardo, Eli Heckscher and Bertil Ohlin (the Heckscher-Ohlin model), a country should specialize in industries in which it possess a comparative advantage: it would be optimal for a country endowed with an abundance of natural resources to specialize in their extraction and processing. However, if the country’s export is based on the sale of just one product or a small number of them, the country may encounter the paradox of the so-called “immiserizing growth”. In 1977, The Economist newspaper coined the term “Dutch disease” to describe the contemporary situation in export sphere of the economy of the Netherlands. Since 1959, natural resources had been actively developed by this country, and there had been a sharp increase in the volume of exports of the Netherlands due to the soaring production of natural gas. The newspaper’s analysts calculated some economic indicators of the country and determined that, on the one hand, the local currency had strengthened for a short time due to the influx of foreign capital but, on the other hand, the unemployment rate had increased (from 1.1% in 1970 to 5.1% in 1977). The situation also affected the development of non-extractive sectors of the economy, which lost their competitiveness in foreign markets due to the investors’ positive bias toward the extractive sector. According to the analysis by The Economist, “97 developing countries with a high ratio of natural resource exports to GDP had low growth rates in the 1970s and 1980s. When the natural resources are depleted, little will remain to maintain the economy… If the countries rich in raw materials do not channel their fortunes to diversify their economies or lower the real exchange rate, the Dutch disease can become fatal” .
In 2017, after a fall in 2015 and 2016, the value of world exports of goods increased by 11%, mainly due to an increase in the exports of fuel and mining products by 28%. The share of the latter in world exports increased from 13% in 2016 to 15% in 2017. If we consider the exports of mineral fuel in the longer term, from 2001 to 2018, its share in total world exports grew by 3% (Fig. 1). Figure 1 highlights product categories that occupy the most significant places in world exports.
World hydrocarbon exports demonstrated the most significant growth among all product categories except for Electrical and electronic equipment, which occupied the leading position in the world exports. The average price of oil in 2016 amounted to $40.7 per barrel, but by 2018 it rose to $69.5 per barrel, which was still lower than the figure for 2012, when the oil price peaked at $109.5 dollars per barrel . Fluctuations in oil prices affected global exports in general and hydrocarbon exports in particular (Fig. 2).
Fluctuations in oil prices during 2018, when the lowest price was observed in February ($59.2 per barrel) and the highest in October ($76.41 per barrel), were influenced by several positive and negative factors. The positive ones included the continued growth of engineering industry, which triggered faster growth in China and the USA, the restoration of economic growth in Russia, etc. The negative ones were the slowdown in economic growth in India, the fall in oil demand in Japan due to the reactivation of several nuclear reactors restored after the nuclear accident at Fukushima, and reduction of energy consumption in the European Union due to high energy prices .
Between 2000 and 2017, world hydrocarbon exports underwent significant changes in the context of regions (Fig. 3). The volume of exports of the African countries decreased over the reviewed period by almost 4%, the European countries – by 5%, the countries of South and Central America – by 2%; however, hydrocarbon exporters in Asia, Australia and North America increased their share in world exports by 7.3%, 2.8% and 0.9%, respectively.
In 2017, Middle Eastern exports amounted to $961 billion, of which more than a half came from fuel and mining products. African exports as a whole grew 18% mainly due to increased supplies of oil and minerals to the global market; since 2012, African exports grew for the first time. Africa’s oil exporters combined accounted for 35.0% of all African exports in 2017, compared with 31.9% in 2016 . Table 1 summarizes the world’s largest hydrocarbon exporters from 2001 to 2018.
It is worth noting that over the reviewed period, each of the countries listed in the table significantly increased its hydrocarbon exports in dollar terms. However, the structure of world exports of hydrocarbons underwent significant changes during the period. In 2001-2018, Russia’s position strengthened, and it became the leader in terms of the value of hydrocarbons sold in the world market. The United States, Australia and India significantly increased exports of petroleum products. Norway, Iran, Kuwait, Nigeria and the United Kingdom, on the contrary, weakened their positions in the world ranking of the largest exporters of oil and petroleum products.
To determine the dependence of countries’ total exports on hydrocarbon exports, the author identified 80 countries, which exported mineral fuels, on the basis of data provided by UNCTAD. Figure 4 shows countries where hydrocarbon exports constitute more than 40% of total exports.
In 30 countries of the world, the share of hydrocarbon exports exceeds 40%. The highest dependence is observed in countries where share of hydrocarbons in total exports is greater than 90%: South Sudan (99.3%), Iraq (96.6%), Algeria (96.1%), Nigeria (96.0%), Angola (94.9%), Turkmenistan (90.8%), Azerbaijan (90.6%) and Kuwait (90.2%). South Sudan, which emerged as a result of the division of Sudan into two countries in 2011, presents an extreme case of nearly absolute dependence on hydrocarbon exports .
Concentration of exports in several commodities may drastically increase economic and political risks. Economic risks, first of all, include volatility and instability in obtaining foreign exchange earnings, which has severe macroeconomic implications in the form of reduced economic growth, higher unemployment, inflation, capital outflows, insufficient foreign investment, etc. Political risks include lower quality of governance at the national and regional levels, escalation of tensions between the center and the periphery, etc. Export diversification should be aimed at mitigating these risks.
Bibliography
1. What Dutch disease is, and why it’s bad. The Economist. Nov 5th 2014.Электронный ресурс. URL: https://www.economist.com/the-economist-explains/2014/11/05/what-dutch-disease-is-and-why-its-bad.
2. The International Trade Centre 2018. Electronic resource. https://www.trademap.org/Country_SelProduct_TS.aspx?nvpm
3. World Trade Statistic Review 2018. World Trade Organization. Electronic resource. URL: https://www.wto.org/english/res_e/statis_e/wts2018_e/wts2018_e.pdf
4. Enerdata. Independent research and consulting firm specialising in the analysis and modelling of the global energy markets. Global Energy Trends 2019 Edition. Electronic resource. URL: https://www.enerdata.net/ system/files/publications/global-energy-trends-2019-edition-enerdata.pdf
5. World Trade Organization 2018. International trade statistics. Electronic resource. URL: https://data.wto.org/.
6. Morozenskaya E.V. Ways Toward the Sustainable Development of Africa // Asia and Africa Today. 2017, Vol. 4 (717), pp. 43-46 [in Russian].
7. Kostelyanets S.V. Sudan after the Split of the Country: Seeking to Resolve the Crisis // Asia and Africa Today. 2014, Vol. 10 (687), pp. 31-35 [in Russian]. | https://qje.su/otraslevaya-i-regionalnaya-ekonomika/moskovskij-ekonomicheskij-zhurnal-10-2019-46/ |
Hail is a form of solid precipitation. It consists of balls or irregular lumps of ice, each of which is referred to as a hail stone. Unlike graupel, which is made of rime, and ice pellets, which are smaller and translucent, hail stones, on Earth, consist mostly of water ice and measure between 5 and 200 millimetres (0.20 and 7.9 in) in diameter. The METAR reporting code for hail 5 mm (0.20 in) or greater is GR, while smaller hailstones and graupel are coded GS. Hail is possible within most thunderstorms as it is produced by cumulonimbi (thunderclouds), and within 2 nautical miles (3.7 km) of the parent storm. Hail formation requires environments of strong, upward motion of air with the parent thunderstorm (similar to tornadoes) and lowered heights of the freezing level. In the mid-latitudes, hail forms near the interiors of continents, while in the tropics, it tends to be confined to high elevations.
There are methods available to detect hail-producing thunderstorms using weather satellites and weather radar imagery. Hail stones generally fall at higher speeds as they grow in size, though complicating factors such as melting, friction with air, wind, and interaction with rain and other hail stones can slow their descent through Earth's atmosphere. Severe weather warnings are issued for hail when the stones reach a damaging size, as it can cause serious damage to human-made structures and, most commonly, farmers' crops.
Any thunderstorm which produces hail that reaches the ground is known as a hailstorm. Hail has a diameter of 5 millimetres (0.20 in) or more. Hail stones can grow to 15 centimetres (6 in) and weigh more than 0.5 kilograms (1.1 lb). Unlike ice pellets, hail stones are layered and can be irregular and clumped together. Hail is composed of transparent ice or alternating layers of transparent and translucent ice at least 1 millimetre (0.039 in) thick, which are deposited upon the hail stone as it cycles through the cloud, suspended aloft by air with strong upward motion until its weight overcomes the updraft and falls to the ground. Although the diameter of hail is varied, in the United States, the average observation of damaging hail is between 2.5 cm (1 in) and golf ball-sized (1.75 in).
Stones larger than 2 cm (0.75 in) are usually considered large enough to cause damage. The Meteorological Service of Canada will issue severe thunderstorm warnings when hail that size or above is expected. The US National Weather Service has a 2.5 cm (1 in) or greater in diameter threshold, effective January 2010, an increase over the previous threshold of .75 inch hail. Other countries will have different thresholds according local sensitivity to hail; for instance grape growing areas could be adversely impacted by smaller hailstones. Hailstones can be very large or very small, depending on how strong the updraft is: weaker hailstorms produce smaller hailstones than stronger hailstorms (such as supercells).
Hail forms in strong thunderstorm clouds, particularly those with intense updrafts, high liquid water content, great vertical extent, large water droplets, and where a good portion of the cloud layer is below freezing. These types of strong updrafts can also indicate the presence of a tornado. The growth rate is maximized where air is near a temperature of mius 13 degrees C. | https://www.mrdentltd.com/hail |
GEORGE THE POET PERFORMS AT TATE BRITAIN- PHOTO SAI PHOTOGRAPHY.
How creative spoken word and music projects like Poetry Luv - Late at Tate Britain are helping the UK's literacy issues.
Lets face it, its not often that young working class or diverse young people from ethnic backgrounds frequent locations such as the National Trust parks, museums and art galleries across the UK.
As my young reporters often comment to me, they've ''got bigger problems to focus on than visit stately homes''. There are a myriad of projects attempting to engage these groups into experiencing the free gifts that are on their doorsteps, but often they don't communicate on a level that gives real hope and change, or make big differences that leave a legacy.
This month however, I attended one such event that seemed to have ticked all the right boxes to actually make a difference. Fusing the mediums of spoken word and poetry set against a backdrop of Turner paintings, Late at Tate Britain, housed a captivating poetry event as part of National Storytelling Week 14th anniversary.
The UK's literacy issues are an on going concern particularly since this study in Oct 2013 by (OECD) http://www.bbc.co.uk/news/education-24433320) Funded by Arts Council England the Tell Tales projects are an innovative series of creative projects, which aim to improve literacy among young people.
The projects offer 16-24 year olds who are not in work, education or training a chance to re-discover their local libraries while developing their literacy skills and gaining an Arts Award qualification. Joyce Wilson, Area Director, London, Arts Council England, told us:
"The Tell Tales project is a great programme that gives young people the opportunity to embrace literature and use it as a means to share their individual stories in their own way."
It was a cold, wet night in London town but inside the Turner Room at Tate Britain it was hotter than a sauna. A diverse audience of young spoken-word fans wearing sneakers, jeans, hooded sweatshirts and backpacks filled The Clore Gallery and overflowed into it's adjoining halls to witness the "Love Story" themed poetry performances. There was a love theme for Valentine's Day, which included exceptional guest appearances from popular North-West London poets Dean Atta and George The Poet and moving recitals from the young poets from Lambeth whose pieces were themed around Love & Friendship, Loves Complexity & Uncertainty, Messages & Confusion.
It was amusing to see the gallery's security and staff hovering nervously at the entrances, in case we all got too close and over rowdy near the priceless artwork in the room hosting us.
Hosted by Poetry Luv, an emerging London poetry night, the event showcased the work of young performers and writers from Lambeth, who had attended workshops inside their local library in Clapham as part of the Tell Tales project.
Workshop leaders Nego True and Sophia Thakur introduced all acts to the hot, packed Turner Room at Tate Britain. Post show performer Dean Atta told me:
"Getting the chance to work with young people who might not have had the chance to ever tell their stories is a real gift and I really enjoyed performing alongside them".
Brixon based spoken word artist Elijah Kerr and club DJ Anthony Douglas created Poetry Luv in 2013, to help nurture and showcase young street poets and spoken word artists
Elijah Kerr is an intriguing story in himself.
He is also known as Jaja Soze is a rapper, spoken word artist and former gang leader of South London's PDC (Peel Dem Crew) who since leaving prison in 2005 has turned the PDC away from crime and reinvented it as a record label from it's studios in Overton Road in Brixton.
Jaja helps young people in the community of Angle Town, Brixton. His projects are largely funded by the Heritage Trust and Arts Council through his company Indigo Youth. Jaja has a new spoken word album due for release in May so you'd think he'd be spending all his free time promoting that, but instead he was spear heading Poetry Luv.
Jaja revealed to me how this former gang leader was inspired to set up Poetry Luv. ''I started feeling uninspired by the music industry, and felt that poetry was a powerful tool to help inspire and educate our young people whilst still portraying our art form, so I hooked up with my school mate DJ Mr Play and Poetry Luv was born. We now have a huge following''.
With Dean Atta and George the Poets popularity and signing to record labels there seems to be a shift back towards poetry being cool for young people again. Jaja states ''With artist like myself and George the poet the young people feel a connection as we speak their language whilst articulating it, so others can also understand we mix street culture with education, that's why it's becoming so popular. This art form will defo become huge and because it's becoming popular young kids are starting to write, read and go to library's to research''.
Jaja explained how exactly since leaving prison in 2005, he's turned his old PDC gang away from crime and reinvented it as a record label from its studios in Overton Road in Brixton. ''Turning our crew into a record label was a major challenge but we got through it. Now PDC artists like DVS are popping up in the no1 Hip-hop charts and my face is in the local paper for positive stuff. We now sign up-and-coming artists and run workshops in partnership with Lottery Heritage and Youth Music and I will continue to break barriers in order to inspire''.
Jaja's final word was of course about his own album out very soon. ''All I can say is it's very powerful hence the title Power, and I hope it inspires and makes a young generation move forward and progress''.
Perhaps one day soon, British parents will be thanking Jaja for their childs love of reading and poetry passion. | https://www.huffingtonpost.co.uk/jasmine-dotiwala/creative-spoken-word-uk-literacy_b_4808466.html |
Location:
Home
>
Conservation & Horticulture
The Conservation of Plant Diversity and Gardening
Author:
stinfo
ArticleSource:
information centre
Update time:
2005-01-27
Close
Text Size:
A
A
A
Print
XTBG has devoted itself to conserve the tropical rare and endangered plants of China and nearby countries plants since 1959, but the number of collected plant species was about 4,000 species in the garden due to various reasons by 1999. With the deterioration of ecology environment and disappearance of biology diversity, the Chinese Academy of Science and Yunnan Provincial government jointly launched a project named Tropical Plant Resource Conservation and Sustainable use in XTBG from 2000 to 2004. The priorities for plant conservation are: rare and endangered plants, endemic plant species, flagship and keystone species, plant species with high scientific value and potential economic value as wild and relatives of cultivated crops, fruits, and medicinal plants. Now, about 10,000 species of plant collected from tropics of China and nearby countries such as Laos, Myanmar, Northern Thailand are preserved in 35 living collections e.g. palms, medicinal plants, bamboos, tropical fruit collection, wild orchid garden, wild Ginger garden, Cycads garden, seed bank, and tropical rainforest in the garden. Among them, more than 4,000 species are economic plants, 791 species of plant are rare and endangered plants listed into National Red Lists of Plant of China. Some living collections have a significant role for conservation and research, for example, over 400 palm species have been collected and cultivated in palm collection, 24 genera and 106 species of aroid have been collected since 2001, which comprise 54% of the total species in China and 77% of those in Xishuangbanna, which is the largest collection of wild aroids in China. The first Dracaena collection in China was set up, and 60 species and varieties grown in 1.06 ha have been preserved. Also 86 wild ginger species with 17 genera including some rare and endangered species as Etlingera yunnanensis are preserved in the ginger garden.
It is one of the botanical gardens in the world to have over 10,000 plant species cultivated outdoors. | https://english.xtbg.cas.cn/gh/200501/t20050127_27706.html |
22.85ct Pink Tourmaline, 17mm square cushion cut gemstone of natural lovely gentle pink colours, with natural inclusions, drilled one corner and made to a pendant in Sydney using handworked 9ct Gold.
Nicely rounded gemstone, really a cushion cut, 8mm thick.
Category: Other Gemstones. Tag: gold & gemstone pendants. | http://christopherwilliam.com.au/jewellery/2285ct-pink-tourmaline-9ctgold-pendant/ |
Why is NASA sending 5,000 water bears and 128 squid to space?
Spoiler alert: Some aren’t making it back alive.
As if the world wasn’t big enough for microscopic animals, the tiniest of creatures are taking on even bigger frontiers in space.
On June 3, SpaceX is launching its 22nd cargo resupply mission to the International Space Station (ISS). While the cargo includes equipment for ongoing experiments and new solar panels, it also has a few passengers: 5,000 tardigrades, also known as water bears, and 128 baby glow-in-the-dark bobtail squid.
These tiny animals are venturing out into space for good reason: helping researchers understand the effects of spaceflight on the human body. This type of research has gotten more crucial as space agencies target further destinations such as Mars for the future of space travel.
NASA's Human Research Program relies on the astronauts on the ISS for studies on how the human body adapts to time spent in a microgravity environment and whether the effects of being in space can cause permanent damage to human beings.
Only around 240 astronauts and cosmonauts have traveled to the ISS. Some stayed in space just for a few weeks or months, but astronauts Peggy Whitson and Mark Kelly stayed for almost a year. As more humans go into space and come back to Earth, their stays have changed how scientists understand the effects of spaceflight on the human body but they still form a rather small pool of research subjects.
In order to make up for the small human sample size — and perform experiments that would otherwise endanger human subjects — scientists deploy animal test subjects, especially ones that can easily stow away in a cargo resupply because of their small size. This includes one of the hardiest of all: the tardigrade.
Why is NASA sending 5,000 tardigrades to the ISS?
In April 2019, the Israeli Beresheet spacecraft crash-landed on the Moon while carrying several thousand dehydrated tardigrades on board.
The microscopic creatures, nicknamed “water bears” for their resemblance to tiny, swimming bears, were sandwiched between micron-thin sheets of nickel and suspended in epoxy, a resin-like preservative that acts like a jelly. Some scientists believe that they may have survived the landing because tardigrades are known to survive under extremely harsh conditions.
In September 2007, two species of dehydrated tardigrades were exposed to the vacuum of space and solar radiation onboard NASA’s Foton-M3 mission. The water bears were brought back to Earth and rehydrated, and surprisingly survived as though nothing had happened with some of them even reproducing afterward.
Their unmatched survival skills make them ideal candidates for testing just how much radiation and other extreme space conditions a living organism can handle.
Thomas Boothby, assistant professor of molecular biology at the University of Wyoming and principal investigator, lists some of the conditions that tardigrades can survive, including:
- Being dried out.
- Being frozen.
- Being heated past the boiling point of water.
- Being exposed to thousands of times more radiation than humans can endure.
“Our main objective is to identify changes at the level of gene expression that are going on in these really tough, robust animals when they're exposed to the rigors of spaceflight,” Boothby said during a press conference on Wednesday.
The tardigrades will be frozen for delivery to the ISS, then thawed out, revived, and grown in a special bioculture system. Some of the tardigrades will be exposed to the radiation of space for a week, while others will be exposed for a longer period of time to test the short and long-term effects of spaceflight.
The researchers will then observe what genes are being turned on or off to help the tardigrades survive in this environment.
“If we see that tardigrades are producing a lot of antioxidants,” Boothby says. “That might give us insights into how we could safeguard humans, for example, by supplementing their diet with foods with increased levels of antioxidants.”
Why 128 squid will die on the ISS
Along with the tardigrades, NASA is sending up a small cephalopod: the bobtail squid. Unlike their more massive cousins, they only grow to the size of an average human thumb.
The squid were chosen for two big reasons:
- They have a special light organ that can be colonized by a species of luminescent bacteria, which they use to glow in the dark. This makes the process easy to follow because it’s a single species of bacteria and one type of host tissue.
- They also have an immune system that is surprisingly similar to that of humans.
Jamie Foster, professor in the Department of Microbiology and Cell Science at the University of Florida and principal investigator of the squid experiment on the ISS, is interested in how microbes communicate with animal tissues in space.
“As astronauts go and explore space, they're taking with them a capacity of different microbial species,” Foster said during the Wednesday press conference. “It's really important to understand how those microbes are changing in the space environment and how those relationships are established.”
The squids’ immune system provides a parallel to how the human immune system is responding to the microbes in space.
The experiment will launch 128 baby squid into space, placed in bags of seawater. As bacteria are added to the water, the researchers will observe what happens within the first few hours of the initial stages of colonization by bacteria.
Unfortunately for the squids, it’s going to be a one-way ticket to space as they will have their tissues frozen and will return back to Earth as tiny corpses to conduct follow-up observations in labs on the ground.
But in the process, both the squid and the tardigrade will serve a higher purpose: helping humans learn about how well we might fare as space explorers on long-duration missions to Mars and beyond. | https://nc.inverse.com/science/nasa-sending-tardigrades-squid-to-iss |
Texas is different. Those differences guide THI’s approach to community health and motivates why environmental health must be a core component of any effort to build healthy, resilient communities for all. The diverse geography and population of Texas, America’s largest state, requires careful attention to the unique needs of local communities while offering opportunities for regional collaboration to address common health needs across jurisdictions. As an agricultural and petroleum producing state, policies impacting land-use, water quality, and transportation have impacts that cross state lines and have international implications. As a border state, migrant health is a key issue for the public health community. As a Gulf state, Texas will continue to be disproportionately impacted by climate change. Through collaborative action with multiple sectors, THI is poised to meet these challenges.
OUR APPROACH
|
|
Produce Evidence and Ideas
We conduct action research and offer technical assistance on behalf of partners working to realize a vision of healthy people and health communities. THI has decades of experience in healthy planning, health impact assessment, health in all policies, economic and policy analysis, and community health assessment. As applied researchers, we offer nimble, flexible options for partners who need quick answers without sacrificing empirical rigor.
With support from the Episcopal Health Foundation and in collaboration with Steve F Austin State University, THI is conducting research on the health implications for population health of local and county government social and public social spending. A novel health-in-all-policies approach, the research will identify opportunities for health considerations in the budget development process. [Learn More: Link to Program Description]
Translate and share insight
THI specializes in understanding how complex systems impact human flourishing and community resilience. We employ historical, social justice, and environmental health perspectives when considering the policy implications of our research and analyses. We share the results of our findings with leaders and stakeholders across sectors and jurisdictions.
We conducted community health needs assessments in East Texas for four integrated health delivery systems in East Texas. While each community health needs assessment yielded separate community health improvement plans specific to the service area, THI observed patterns in the analysis with policy implications for the East Texas region and Texas as a whole. These insights will be shared with state and regional stakeholders and policy makers. [Link to one-pager with a note that THI is currently conducting research on regional implication.]
Advance Collaborative Action
THI specializes in understanding how complex, global systems impact human flourishing and community resilience. We then convene coalitions, conferences, and learning communities to share knowledge, develop systems change strategies, and inspire leadership for collaborative action. THI has expertise at engaging cross-sectorial and multidisciplinary stakeholders and coordinating collaborative action at local, state, regional, national and international levels. | https://www.texashealthinstitute.org/community-health.html |
The 3rd MCC 2016 Workshop : Primer Design and Advanced Molecular Technology Real-Time PCR up to Sequencing
3rd MCC 2016 was molecular workshop that held by Study Group of Hepatitis, Dengue and HIV in Tropical Disease Institute (Lembaga Penyakit Tropis – LPT) Airlangga University.
The goal of the workshop is to give direct training for the participants about the latest technology of molecular biology and also give the update about virology, especially Hepatitis B virus. These 3rd workshop allow participants to study about primer design, DNA extraction, conventional PCR, real-time PCR and also sequencing. The participants was from different background, such as researcher, laboratory analyst, clinical staff from the hospital, and magister student from Surabaya, Bali, Kediri, Kendari, Makassar, Kupang and Jakarta.
This workshop held from May 23-25, 2016. On the first day, the participants got to hear presentation from Prof. Soetjipto dr., M.S., PhD. They got the latest information about hepatitis B virus, DNA extraction, primer design and conventional PCR. The next session was the laboratory activity about DNA extraction, from manual and automated method. PT Indolab Utama got the chance to demonstrate automated method from Maxwell RSC Instrument to extract DNA from the blood and PBMC samples.
The Maxwell® Rapid Sample Concentrator (RSC) Instrument is a platform for automated purification of nucleic acid from a range of sample types. The purification methods use sample lysis and binding to paramagnetic particles as the primary separation principle. Up to 16 samples can be prepared simultaneously in 25–60 minutes, depending on sample type. Used in combination with prefilled reagent cartridges, the Maxwell® RSC can purify DNA or RNA from a wide range of sample types. The intuitive graphical user interface makes the instrument easy to use, and the integrated Quantus™ Fluorometer lets you collect purification and quantification data in one report.
The theme of the second day was about sequencing and real-time PCR. Prof. Retno Handayani dr., M.S., PhD gave the lecture and the latest information about it. Participants was really excited to hear the presentation and also could not wait to do the hands-on session. They did the sequencing on the Capillary Electrophoresis system with one capillary. After about one hour running on sequencing per sample, they did the discussion about the sequencing result. The second day was closed with discussion about primer design with NCBI Blast. PT Indolab Utama also offers sequencing service and primer ordering from Macrogen, Korea.
The real-time PCR hands-on session was held on the third day of workshop. This session was supported by Promega’s GoTaq Real Time qPCR Systems for Probe-based detection. The master mix is optimized for fast and reproducible quantitative PCR assays in the hydrolysis probe detection format. It is a versatile product that can compatible with both fast and standard cycling methods on most real-time PCR instruments using TaqMan® and other probe assays such as molecular beacons. It has enhanced stability and exceptional room-temperature setup is easy for automated and high-throughput detection.
The last day of workshop, Indolab Utama got the chance to introduce and demonstrate the MyGo Mini real-time PCR instrument. The MyGo Mini is the world’s most compact real-time PCR instrument, with no moving parts for silent operation and maximum reliability. It provide users with great results over a broad range of applications. This instrument was really interesting and got much attention from the participant, they were overwhelm by its size and its functionality as real-time PCR instrument.
And finally, the workshop was ended by discussion about the result of real-time PCR and also the troubleshooting tips for the real-time PCR. The participant was really interest to discuss about it and really gave a good and positive respond. The workshop was closed by Prof. Retno Handayani as the head of this 3rd MCC workshop event. See you again in next year!
Trackbacks and pingbacks
No trackback or pingback available for this article. | http://indolabutama.com/3rd-mcc-2016-workshop-primer-design-advanced-molecular-technology-real-time-pcr-sequencing/ |
The Right Honourable Dame Sian Elias, Chief Justice of New Zealand, delivered the Eleventh Singapore Academy of Law Annual Lecture on 3 November 2004. In her speech, the Chief Justice made the point that impartiality in judging is the critical condition upon which democratic societies accept the exercise of authority by non-elected judges. While impartiality and the appearance of it are important, the emphasis on appearance should be kept in check. Ultimately, the obligation to bring an open mind to judging is the individual responsibility of the judge.
The law has so watchful an eye to the pure and unbiased administration of justice, that it will never trust the passions of mankind in the decision of any matter of right.1
1 Impartiality in judging is the essential attribute of the judge. It is the burden of the judicial oath common to my jurisdiction and to yours. Its observance ensures that, when judging, the only allegiance of the judge is to do right according to law to the parties.
2 Why impartiality is fundamental was explained by Lord Denning MR:2
Justice must be rooted in confidence: and confidence is destroyed when right-minded people go away thinking: “The judge was biased.”
The demonstration of impartiality in judging serves a more important function than to assure the parties that the judge has no personal interest in the outcome. It is the condition on which a democratic society accepts the exercise of authority by judges who are not elected and not directly responsible to the elected branches of government. Since the assurance of
constitutional government requires access to independent courts, the maintenance of public confidence in the impartiality of the judiciary is critical to our modern democracies.
3 Perhaps because of the need to ensure public confidence, it has long been appreciated that the appearance of partiality is destructive in itself. Demonstrating that a judge was actually biased may be difficult. But if the circumstances leave “right-minded people” suspicious, such suspicions may be dangerously corrosive. It is considerations such as these that led Lord Devlin to say that, “within the context of service to the community”, it is the appearance of impartiality, rather than the reality of impartiality, that is the more important:3
The judge who gives the right judgment while appearing not to do so may be thrice blessed in heaven, but on earth he is no use at all.
4 So, appearances matter. But they are not everything. Everyone seems to know Lord Hewart’s famous declamation that “justice should not only be done, but should manifestly and undoubtedly be seen to be done”.4 It seems seldom to be off the lips of those critical of particular court decisions. It sounds very fine. But such vehemence does not greatly assist in determining a workable test for partiality. And the heightened vigilance and indignation it encourages may itself be destructive of public confidence.
5 The risk is heightened if judicial function is not well understood and if the judiciary is called upon to decide controversial questions on which community opinions are divided. Those are the conditions in a number of common law jurisdictions today, including mine. This is not a new phenomenon. Modern human rights litigation carries particular risks and opens up what Carol Harlow has called “campaigning litigation”.5 But in reality the revitalisation of administrative law and open-textured legislation which confers wide discretion on judges have brought the judiciary increasingly into areas of public controversy over the past 20 years.
6 What the background of controversy means is that the background, attitudes, and opinions of judges are now under public scrutiny, perhaps as never before. At the same time, understanding of the role of the judge seems to have diminished. The fact that “[w]e must rely
on our conduct itself to be its own vindication”6 makes it difficult for the public to gain a proper understanding of controversial judicial decisions through a modern news media dominated by sound bites and flamboyant headlines. One result has been a proliferation in claims of presumptive bias against judges.
7 It is time to take stock of where all this is going. Some of the more absolutist statements about community perceptions of impartiality being more important than the reality, were made in a simpler time. Perhaps sensitivity to popular clamour based on the standards expected of Caesar’s wife needs to be tempered. It may be that greater attention to institutional safeguards to promote impartiality in decision-making is a sounder response than recusals and overrulings because of assessment of appearances.
8 The judges who declared that appearances were so important, lived in much less squeamish times than ours. They had no thought that those taking up judicial office had to be “ideological virgins”.7 And they were not. Lord Hewart, described in The Oxford Companion to English Law as “perhaps the worst Chief Justice since the seventeenth century”, was an uninhibited political figure, who thrived on controversy, writing on all subjects ranging from electoral reform and capital punishment to democratic theory and licensing laws.8
9 In England, it was not until the beginning of the 20th century that appointments to the High Court Bench were generally drawn from the leading members of the practising Bar. Before then, appointment was explicitly the reward for political service. Lord Salisbury, as premier, was quite candid about the process:9
It is … the unwritten law of our party system; and there is no clearer statute in that unwritten law than that the rule that party claims should always [weigh] very heavily in the disposal of the highest legal appointments. In dealing with them you cannot ignore the party system
as you do in the choice of a general or archbishop. It would be a breach of the tacit convention in which politicians and lawyers have worked the British constitution together for the last two hundred years. Perhaps it was not an ideal system — some day no doubt the Master of the Rolls will be appointed by a competitive examination in the Law Reports, but it is our system for the present: and we should give our party arrangements a wrench if we threw it aside.
10 It was not until the 1930s that promotion from the Court of Appeal to the House of Lords became usual. Before then, the view was taken that the appointment of those who had held political office was preferable because the disputes handled in the House of Lords, while legal in form, were political in fact.10 Chief Justices in England were appointed from Attorneys-General until 1940.
11 In appointing judges from such backgrounds, it is clear that presumptive bias was not thought to attach to a judge because of his activities before appointment. At times when political service before judicial office was usual, judges were not expected to be colourless technocrats who had stood aloof from the currents of the times.
12 Moreover, a conceptual separation between judicial conduct and conduct off the Bench seems to have continued after appointment. Until comparatively recently, English judges seemed to have no qualms about corresponding with newspaper editors about current issues of the day. Until very recently, participation in legislation or the parliamentary debates in the House of Lords was not thought to disqualify a judge from later sitting in a case arising from the legislation or touching on matters raised in the debate.
13 The extent to which judges felt uninhibited by their legislative activity is illustrated by the war-time case of Continental Tyre and Rubber Company (Great Britain), Limited v Daimler Company Limited.11 There was a public outcry when the Court of Appeal refused to lift the corporate veil to show that Continental was controlled by a German parent company. Judges wrote letters to the editor of The Times in favour of the judgment and against it. Lord Halsbury introduced a Bill in the House of Lords to reverse the decision. It was supported by Lord Wrenbury (Buckley LJ), who had dissented in the Court of Appeal. It was also supported by Viscount Mersey. Daimler then appealed to the
House of Lords. Lord Halsbury, aged 93, presided. Viscount Mersey sat. The Court of Appeal was overturned.12
14 What are we to take of this apparent dissonance between the near-contemporary statements of the need to ensure that justice is “manifestly and undoubtedly” seen to be done and the personal views indicated by the legislative activity of Lord Halsbury and Viscount Mersey? It is not an answer that this was war-time aberration. It is our perception of what constitutes the appearance of partiality that has changed.
15 Engagement in politically partisan activities, even in relation to the controversy in issue, was not formerly thought to overcome the expectation that, in judging, the judge would be dispassionate and would adhere to the judicial oath. Only direct pecuniary interest in the outcome automatically disqualified a judge, because it infringes the basic rule that no man can be a judge in his own cause.13 No other automatic category in which bias would be presumed was recognised. Short of pecuniary interest, circumstances raising a real danger of bias were required.
16 Before 1999, the cases in which such danger was found to exist generally concerned justices or their clerks with conflicts of interest in the outcome of the proceedings. The holding of opinions, friendships, political partisanship, and previous professional connections were insufficient to overcome the presumption of judicial impartiality described by Blackstone:14
By the laws of England also, in the times of Bracton and Fleta, a judge might be refused for good cause; but now the law is otherwise, and it is held that judges and justices cannot be challenged. For the law will not suppose a...
To continue readingRequest your trial
Subscribers can access the reported version of this case.
You can sign up for a trial and make the most of our service including these benefits.
Why Sign-up to vLex?
-
Over 100 Countries
-
Thousands of Data Sources
-
Find What You Need, Quickly
-
Over 2 million registered users
Subscribers are able to see a list of all the documents that have cited the case.
You can sign up for a trial and make the most of our service including these benefits.
Why Sign-up to vLex?
-
Over 100 Countries
-
Thousands of Data Sources
-
Find What You Need, Quickly
-
Over 2 million registered users
Subscribers are able to see the revised versions of legislation with amendments.
You can sign up for a trial and make the most of our service including these benefits.
Why Sign-up to vLex?
-
Over 100 Countries
-
Thousands of Data Sources
-
Find What You Need, Quickly
-
Over 2 million registered users
Subscribers are able to see any amendments made to the case.
You can sign up for a trial and make the most of our service including these benefits.
Why Sign-up to vLex? | https://sg.vlex.com/vid/singapore-academy-of-law-897418658 |
Bobcat Miner OTA Update - 05/11/2022
May 11, 2022 - Bobcat pushed the latest OTA update at 11:00 pm PDT on 5/11/22.
The following updates occurred in this OTA:
-
Bobcat firmware bumped to 1.0.2.89
-
Helium firmware updated to 2022.05.11.0_GA
Note: New users attempting to onboard hotspots may encounter issues while the Helium network is undergoing ongoing network maintenance over the next few days. We recommend waiting at least 24 hours to onboard new hotspots while Helium is implementing Gateway-rs Software(Light Hotspot Software). Please check the Helium Discord Announcements channel for updates regarding ongoing maintenance and network issues.
Download the Bobber App Now
The Bobber app is now available for download on the Apple App Store and the Google Play store, so make sure you check it out!
Links to Frequently Asked OTA Questions
Make sure to explore our knowledge center to address the most frequently asked tech and non-tech questions. Also, follow us on Discord! It's a great place to get all the latest Bobcat news and there are several channels where you can find valuable community support. | https://shop.bobcatminer.com/blogs/all/bobcat-miner-ota-update-05-11-2023 |
Stéphane Chevrel obtained his diploma of engineer in Mineral Resources and Industrial Minerals from the Polytech Engineering Faculty of Orleans (France) in 1976 and a postgraduate certificate in Analysis and Management of Geological Risks from the University of Geneva (Switzerland) in 1993.
He has been working for BRGM, the French Geological Survey, from 1977. His professional career started in Saudi Arabia where he was in charge of exploration for industrial minerals for the Directorate General for Mineral Resources. Following the emergence of satellite imagery he then acquired skills in remte sensing and image processing he has applied to various geo-sciences fields in the Middle East and in particular in the geological mapping programme of the entire Sultanate of Oman territory for the Ministry of Petroleum and Minerals.
From 1995, he has been intensively involved in the application of remote sensing and Earth Observation techniques to the environmental and societal impacts of mining activities, mostly in South Africa, Europe, Greenland and Central Asia. He has been coordinating European Commission Framework projects, including the MINEO (Monitoring and assessing the environmental Impact of mining in Europe using advanced Earth Observation Techniques) and EO-MINERS (Earth Observation for Monitoring and Observing Environmental and Societal Impacts of Mineral Resources Exploration and Exploitation) projects, developing the application of innovative techniques, in particular hyperspectral and LiDAR imagery in the monitoring and mapping of mining-related contamination of soils and waters. He also led workpackage 1 (Resources and Sustainability assessment) in the BioMine project.
He has been among the French representative at the ad-hoc group on mining wastes inventories ("AHG Inventories") set up by the Technical Adaptation Committee in the frame of the Directive on the Management of Wastes from the Extractive Industry.
He gives lectures and remote sensing courses at universities and institutions, both in France and abroad. Within GEO, the intergovernmental Group on Earth Observations, he is Point of Contact for the Community Activity CA-06 "Earth Observation data for managing mineral and non-renewable energy resources". He is member of the Geological Remote Sensing Group (GRSG).
He recently proceeded to a review of "responsible mining" initiatives for the French Ministry of Economy and Industry and the Ministry of Environment. | http://www.minpol.com/stephane.html |
HOUSTON – (June 9, 2020) – Soft robots and biomedical implants that reconfigure themselves upon demand are closer to reality with a new way to print shapeshifting materials.
Rafael Verduzco and graduate student Morgan Barnes of Rice’s Brown School of Engineering developed a method to print objects that can be manipulated to take on alternate forms when exposed to changes in temperature, electric current or stress.
The researchers think of this as reactive 4D printing. Their work appears in the American Chemical Society journal ACS Applied Materials and Interfaces.
They first reported their ability to make morphing structures in a mold in 2018. But using the same chemistry for 3D printing limited structures to shapes that sat in the same plane. That meant no bumps or other complex curvatures could be programmed as the alternate shape.
Overcoming that limitation to decouple the printing process from shaping is a significant step toward more useful materials, Verduzco said.
“These materials, once fabricated, will change shape autonomously,” Verduzco said. “We needed a method to control and define this shape change. Our simple idea was to use multiple reactions in sequence to print the material and then dictate how it would change shape. Rather than trying to do this all in one step, our approach gives more flexibility in controlling the initial and final shapes and also allows us to print complex structures.”
The lab’s challenge was to create a liquid crystal polymer “ink” that incorporates mutually exclusive sets of chemical links between molecules. One establishes the original printed shape, and the other can be set by physically manipulating the printed-and-dried material. Curing the alternate form under ultraviolet light locks in those links.
Once the two programmed forms are set, the material can then morph back and forth when, for instance, it’s heated or cooled.
The researchers had to find a polymer mix that could be printed in a catalyst bath and still hold its original programmed shape.
“There were a lot of parameters we had to optimize — from the solvents and catalyst used, to degree of swelling, and ink formula — to allow the ink to solidify rapidly enough to print while not inhibiting the desired final shape actuation,” Barnes said.
One remaining limitation of the process is the ability to print unsupported structures, like columns. To do so would require a solution that gels just enough to support itself during printing, she said. Gaining that ability will allow researchers to print far more complex combinations of shapes.
“Future work will further optimize the printing formula and use scaffold-assisted printing techniques to create actuators that transition between two different complex shapes,” Barnes said. “This opens the door to printing soft robotics that could swim like a jellyfish, jump like a cricket or transport liquids like the heart.”
###
Co-authors of the paper are Rice graduate student Seyed Sajadi; Shaan Parekh, a student at John Foster Dulles High School in Sugar Land, Texas; Rice research scientist Muhammad Rahman; and Pulickel Ajayan, chair of Rice’s Department of Materials Science and NanoEngineering, the Benjamin M. and Mary Greenwood Anderson Professor in Engineering and a professor of chemistry. Verduzco is an associate professor of chemical and biomolecular engineering and of materials science and nanoengineering.
The Welch Foundation for Chemical Research and the Army Research Office Chemical Sciences Division supported the research.
Read the abstract at https:/
This news release can be found online at https:/
Follow Rice News and Media Relations via Twitter @RiceUNews.
Related materials:
Mighty morphing materials take complex shapes: http://news.
Verduzco Laboratory: http://verduzcolab.
Rice Department of Chemical and Biomolecular Engineering: https:/
George R. Brown School of Engineering: https:/
Video:
https:/
Credit: Verduzco Laboratory/Rice University
Images for download:
https:/
Rice engineer Rafael Verduzco and graduate student Morgan Barnes led the development of a method to 3D-print materials that morph from one shape to another through application of temperature, electric current or stress. (Credit: Jeff Fitlow/Rice University)
https:/
A graphic shows the process by which a Rice University lab uses 3D printing to make shapeshifting materials that may be useful to make soft robots or as biomedical implants. (Credit: Verduzco Laboratory/Rice University)
https:/
Shapeshifting materials produced at Rice University with a 3D printer morph from their original form to an alternate through changes in temperature, electric current or stress. This example shows how one printed configuration can be programmed to take various shapes. (Credit: Verduzco Laboratory/Rice University)
https:/
Shapeshifting materials 3D printed through a process developed at Rice University can be manipulated to take out-of-plane forms. The material incorporates two distinct sets of chemical links that can shift back and forth with temperature, current or strain inputs. (Credit: Verduzco Laboratory/Rice University)
Located on a 300-acre forested campus in Houston, Rice University is consistently ranked among the nation’s top 20 universities by U.S. News & World Report. Rice has highly respected schools of Architecture, Business, Continuing Studies, Engineering, Humanities, Music, Natural Sciences and Social Sciences and is home to the Baker Institute for Public Policy. With 3,962 undergraduates and 3,027 graduate students, Rice’s undergraduate student-to-faculty ratio is just under 6-to-1. Its residential college system builds close-knit communities and lifelong friendships, just one reason why Rice is ranked No. 1 for lots of race/class interaction and No. 4 for quality of life by the Princeton Review. Rice is also rated as a best value among private universities by Kiplinger’s Personal Finance.
Jeff Falk
713-348-6775
[email protected]
Mike Williams
713-348-6728
[email protected]
Media Contact
Jeff Falk
[email protected]
Original Source
https:/
Related Journal Article
http://dx. | https://scienmag.com/lab-makes-4d-printing-more-practical/ |
THE HEALING POWER OF TAI CHI
I started learning Tai Chi seventeen years ago, after a year's treatment for Stage III Grade III Triple Negative Breast Cancer. Treatment involved a radical mastectomy and lymph gland clearance, chemotherapy (pre and post op) and radiotherapy. At the end of that year, I was in remission, brief though I thought it might be.
I was taking Canceractive's advice on diet and supplementation, but wanted to do even more to stay cancer free. Having heard that Tai Chi was a gentle yet effective way to regain and maintain health, I found a local teacher and decided to give it a go. At that point, I knew nothing about Tai Chi except that it involved slow, flowing movement and was very good for your physical, mental and emotional health. Now, at the age of 64, I teach eleven classes of Qigong and Tai Chi a week and have a greater feeling of well-being than I've ever known!
I was just four weeks out of treatment when I joined a beginners' class. I was overweight and weak and could only sustain ten minutes of activity before having to sit out. As it happened, a more experienced group was working at the other end of the room, so I watched them. What they were doing was breathtakingly beautiful - so focused, graceful and powerful that I knew I wanted to be able to do what they were doing. I was determined to continue attending classes!
As time went on, my stamina levels improved. I began to lose weight and started to feel that I was in control for the first time since diagnosis. I gradually increased the number of classes I attended each week and then became an 'inside the door' student, at which point Tai Chi became an integral part of my lifestyle.
After several years of training with a Master instructor, I started teaching my own classes. I wanted to share the amazing benefits I was experiencing with other people. I've been teaching it for almost ten years now and have been responsible for starting up a class in our local Maggie Cancer Care Centre. I've also worked with the Lung foundation (Breathe Easy), the Ear Foundation (Tinnitus), and a Stoma group at a local hospital. The benefits of Tai Chi are so wide ranging and there's so much more to it than I ever realised.
Tai Chi is an ancient Chinese art which integrates body, mind and breath. It's actually a martial art, with self defence applications and weapons work, but what I am discussing here is a particular aspect of the syllabus known as 'the Form'.
The 'Form' is a sequence of choreographed movements specifically designed to restore natural balance and harmony. Movement and breath activate and balance 'qi', the vital life force/energy that Chinese philosophy believes sustains and improves health. The more your mind is focussed on what it's doing, the more qi you can develop and control. The more balanced the qi, the more your well-being improves.
Tai Chi gently, but powerfully, massages, energises and oxygenates your body using deep breathing, relaxation and continuous, coordinated movement rather than muscular tension or force. Movements enhance your immune, cardiovascular, lymphatic, digestive and nervous systems. Your body works as a unified whole with hands, arms, legs and feet all starting and finishing a movement at the same moment. Your body opens and closes, rises and sinks, twists from side to side, moves forward, backwards and sideways in a slow, controlled and flowing way.
These movements are particularly powerful and effective because they are combined with relaxed, deep breathing and a strong mental focus. They bring vitality and tranquillity to your body and mind, helping you combat the stress and tension that so often interferes with the body's natural healing processes. Tai Chi soothes and calms your body and mind, easing stress, pain and anxiety.
The deep, regular breathing improves respiration, oxygenating your body (and as Canceractivists know, cancer cells hate Oxygen!). Along with the deep breathing, the twisting, waist-driven movements also gently massage your internal organs, helping them to function more effectively. The physical benefits are vast, so much so that Tai Chi is now recommended to help prevent falls in the elderly and improve conditions such as Arthritis, Fibromyalgia and Depression.
Many of these benefits can also be achieved by practising the Chinese movement system known as Qigong (or Chi Gung). Both systems are very beneficial for overall health, but Tai Chi is generally more complex than Qigong and takes much longer to learn. Both systems are more powerful than they look!
There are many studies that support the beneficial nature of Tai Chi. The Institute for Clinical Research and Health Policy Studies in Boston concluded that “Tai Chi appears to be associated with improvements in psychological well-being including reduced stress, anxiety....and increased self-esteem”. A number of studies support its contribution to pain relief and improvement of mood and quality of life (eg. 1999 and 2000 University of Arizona, 2011 University of California.)
I can certainly say that along with the Canceractive dietary advice, it has helped me regain and maintain my health to a point that I would not have believed possible. | https://www.canceractive.com/article/the-healing%20power%20of%20tai%20chi |
What Does a Personal Care Assistant Do?
Find out what a personal care assistant does, how to get this job, and what it takes to succeed as a personal care assistant.
Find out what a personal care assistant does, how to get this job, and what it takes to succeed as a personal care assistant.
Personal care assistants are responsible for providing assistance with daily living activities to individuals who may be unable to do so on their own. They commonly work with people who have disabilities or medical conditions that limit their ability to perform basic tasks such as bathing, dressing, eating, etc.
Personal care assistants have a wide range of responsibilities, which can include:
Personal care assistants’ salaries vary depending on their level of education and experience, the company size and geographic location. They may also earn additional compensation in the form of overtime.
The employment of personal care assistants is expected to grow much faster than average over the next decade.
As the large baby-boom population ages, the need for personal care assistants will increase. As people age, they typically need help with daily tasks such as bathing and eating.
Related: In-Depth Personal Care Assistant Salary Guide
A personal care assistant typically needs to have the following qualifications:
Education: Personal care assistants are typically required to have at least a high school diploma or GED. Some facilities may prefer an associate’s or bachelor’s degree in health care or a related field.
Training & Experience: Personal care assistants receive on-the-job training from their employer after they are hired. This training may last for a few weeks and will teach the personal care assistant how to perform their duties. The training may also include instruction on how to use the scheduling software the agency uses, how to properly clean the client’s home and how to properly bathe and feed the client.
Certifications & Licenses: Some employers may require personal care assistants to pass an industry-specific certification to show their general understanding of the field.
Personal care assistants need the following skills in order to be successful:
Communication skills: Personal care assistants must be able to communicate effectively with their patients and other medical staff. They must be able to explain treatment plans and procedures to patients and their families, and they must be able to relay information from doctors and nurses to patients. They must also be able to communicate with patients to ensure they understand their treatment plans and to ensure they are comfortable and safe.
Empathy and compassion: Empathy is the ability to understand and share the feelings of others. Personal care assistants often work with people who are experiencing challenging health conditions or life events. Empathy can help personal care assistants connect with their patients and make them feel valued and cared for.
Physical stamina: Personal care assistants may be on their feet for long periods of time, lifting and moving patients and performing other physical tasks. Physical stamina is the ability to perform physical tasks for long periods of time.
Attention to detail: Personal care assistants must be able to pay attention to detail when performing their job duties. This is because they may be responsible for keeping track of medications, monitoring a patient’s health and observing any changes in their condition. Personal care assistants should also pay attention to detail when performing their duties to ensure the safety of their patients.
Flexibility: Personal care assistants often work with a variety of clients with different needs and schedules. Flexibility allows you to adapt to changing circumstances and adjust your approach to care based on the needs of your client. For example, if a client has a doctor’s appointment in the morning, you may need to wake them up earlier than usual.
Personal care assistants typically work in private homes, hospitals, or nursing care facilities. They may work long hours, including evenings, weekends, and holidays. They may also work overnight shifts to provide care for people who need constant supervision. Some personal care assistants may work in more than one setting. Personal care assistants who work in private homes may have less contact with other people and may work independently most of the time. Those who work in hospitals or nursing care facilities have more contact with other health care workers and may work as part of a team.
Here are three trends influencing how personal care assistants work. Personal care assistants will need to stay up-to-date on these developments to keep their skills relevant and maintain a competitive advantage in the workplace.
The Growth of the Senior Population
The senior population is growing at a rapid rate, which is leading to an increased demand for personal care assistants. As more and more seniors require assistance with daily tasks, personal care assistants will be needed to help them stay independent and in their own homes.
Personal care assistants can capitalize on this trend by becoming certified in specific areas, such as dementia care or stroke rehabilitation. This will allow them to provide more specialized services and help seniors live happier, healthier lives.
More Attention to Employee Well-Being
As businesses become more aware of the importance of employee well-being, they are beginning to focus more attention on providing resources that support it. This includes things like better health insurance benefits, paid time off, and workplace amenities like gyms and cafeterias.
Personal care assistants can take advantage of this trend by developing skills that make them valuable to employers. These include things like communication, organization, and customer service. In addition, personal care assistants should also focus on developing skills that will help them manage stress and improve their overall well-being.
A Growing Focus on Preventative Care
As the healthcare industry continues to shift towards a focus on preventative care, personal care assistants will be in high demand.
Preventative care involves helping patients maintain their health through regular checkups and screenings. Personal care assistants can play a key role in this process by assisting doctors and nurses with patient care and keeping clinics and hospitals clean and organized. By learning how to work effectively in a team environment, personal care assistants can ensure that patients receive the best possible care.
A personal care assistant career can be a great way to start your working life. It’s a chance to learn new skills, meet new people, and help others. You’ll also get experience in different areas of healthcare, which will make you more marketable if you want to move on to another job.
As a personal care assistant, you’ll need to be able to lift heavy objects, so it’s important that you stay physically fit. You’ll also need to have a caring attitude and be patient with people who need extra help.
Related: How to Write a Personal Care Assistant Resume
There are many ways to advance in the field of personal care. One way is to get certified as a home health aide or a certified nurse assistant. This will give you the skills and knowledge to provide more comprehensive care to your patients. You can also advance by taking on more responsibility at your job, such as becoming a lead caretaker or a supervisor. Another way to advance is to get more education, which will allow you to work in a more specialized area of personal care, such as hospice care or geriatric care. | https://climbtheladder.com/personal-care-assistant/ |
Structural engineering relies on detailed knowledge of applied mechanics, materials science, and applied mathematics to understand and predict how structures will support and withstand self-weight and imposed loads.
There are specific specialty types of structures, such as buildings, bridges, pipelines, industrial tunnels, vehicles, ships, aircraft, and spacecraft.
Structural building engineering adopts a mixture of materials, shapes, and basic mathematical. Also adopts scientific ideas to achieve an end that meets its functional requirements and is structurally safe for all loads that can reasonably be expected.
Civil engineering includes all structural engineering related to the built environment. They include:
Bridges, dams, sand works, bases, marine structures, pipelines, power plants, railways, retaining walls, roads, tunnels, waterways, reservoirs, water and wastewater infrastructure.
The structural design of a building ensures that the building will be able to stand safely and be able to function without excessive deviations or movements that might fatigue or crack structural elements, fail fixtures, connections, or partitions, or affect the comfort of the users of the facility. The calculation must show the movements and forces resulting from temperature, creep, cracks and assumed loads. It must also ensure that the design is practicable within acceptable tolerances of materials.
Earthquake Engineering
The main goals of earthquake engineering are to understand the reaction of structures to vibration, to anticipate the consequences of potential earthquakes, and to design and construct components in a structure to resist earthquake.
The principles of structural engineering apply to a variety of mechanical (moving) structures. The design of fixed structures assumes that they have the same geometry (in fact, fixed structures can move significantly. The engineering design must take this into account when necessary), but the design of movable or moving structures is concerned with the fatigue of the materials used, the different way of resisting loads, and the possibility of large deflections in the facility. | https://jasksa.com/en/service/structural-engineering/ |
Tis the Season—According to Jerry Huang, D.O., an osteopathic family practitioner for Kaiser Permanente, the reasons that we get sick more often in winter are multiple. “When the temperature drops, people are cooped up in the house, breathing the same germ-filled air because the window is closed, the room has no ventilation, and the room is also very dry because of the heater. So we have a more concentrated germ population attacking the dry and weakened mucous membranes in our noses and mouths.” In addition, our immune systems are at their lowest in cold temperatures, says Huang, making it more difficult for us to fight off germs. Lastly, some viruses thrive in the cold, but not in the heat.
Staying Healthy, Flu Shot or No
What’s the best way to stay healthy during cold and flu season? Doctors ordinarily would tell you that the influenza (flu) vaccine is a smart place to start—and it’s still considered a priority for those in high-risk groups, including children between 6 and 23 months, adults 65 and older, anyone with a chronic health condition and others. (For complete list, see “Flu Shot Guidelines” on page 137.) But with this year’s flu vaccine supplies cut in half due to a contamination problem, limiting its availability to those who need it most, many of us no longer have the option of a shot, shifting the focus to other forms of prevention.
From frequent hand-washing to getting enough rest, there’s plenty we can do to decrease the odds of catching colds and flus. But first things first: Do you know which is which? “Many people don’t know the difference between colds and flus,” says David Herbert, M.D., an assistant physician-in-chief and infectious disease specialist for Kaiser Permanente. “There is enormous confusion.” Influenza and the common cold are both upper respiratory infections, but the similarity ends there.
When people say they have the “flu,” Herbert says, they’re often referring to any number of viral syndromes, but not influenza. “It could be a cough, it could be a cold, it could be diarrhea, or fever with aches—all of those things are what people commonly refer to as the ‘flu.’ But influenza is a fairly characteristic clinical syndrome.” The flu starts abruptly and hits hard, and typical symptoms include high fever, significant muscle aches, a sore throat and usually a cough. In brief, it feels like you got hit by a truck, “and not just a little motor scooter,” says Herbert. “And if you have only nausea and vomiting, that’s certainly not the flu. That’s another range of viruses.” This confusion, he says, is a major reason why the myth persists that the flu shot causes the flu. “If you don’t understand what the flu is and you get the flu shot, and later get sick, you might think you’ve got the flu when in fact you don’t.”
Whew.
The classic common cold, on the other hand, begins with a sore throat and progresses to nasal congestion, runny nose, and sometimes a cough. And though some of the symptoms are similar to that of the flu, the most fundamental difference is that colds are not debilitating—flus are. The flu will put you flat on your back, while colds are just flat-out annoying.
And while we certainly wouldn’t want to blame the kiddies, they are, in fact, the major carriers of colds.
“The reservoir for most cold viruses is the upper respiratory tract of young children,” notes Stuart Linné, M.D., an infectious disease specialist and director of infection control at Catholic Healthcare West’s Woodland clinic. Whereas most children have six to eight colds a year, the average adult gets two to three, partly because we become immune to the viruses we’ve already had—meaning the older we get, the fewer colds we can expect. But since we would all rather be entirely cold-free, here are some tips for staying healthy and keeping germs at bay:
• Wash your hands frequently. Boring as it may be, it’s still one of the best ways to stay germ-free. Hand-washing with soap and water removes any virus particles you pick up.
• Use alcohol-based hand sanitizers. “The alcohol-based ones are actually more effective than soap and water, because they kill off more than 99 percent of the germs,” according to Huang. Another plus: They’re convenient, especially those itty-bitty bottles you can easily carry on your person. Alcohol-based sanitizers are preferred to nonalcohol-based antibacterial products, some of which can leave residues that may lead to the development of stronger strains of bacteria.
• Don’t touch your eyes, nose or mouth. This prevents self-infection.
• Stay away from sickies. Quarantine may not be an option, but you can certainly limit your exposure to others who are sick. Huang offers this simple equation: “Think of it as three and three. Typically, the transfer rate is in the first three days. And you want to stay three feet away from that person, because the respiratory droplets they shoot out at you usually won’t go farther than three feet. So stay three feet away from that person for three days.” Hey—it’s worth a try.
• Teach your children well. Children’s hygiene may leave a lot to be desired, but we can at least try to instill healthy habits. “Setting a good example can go a long way,” notes Mark Glatt, D.O., who practices at Kaiser Permanente in Roseville and also serves as the outpatient chief of pharmacy and therapeutics for the North Capital area. “Just remind them to wash their hands, and wash your hands with them.” Reminding kids to cover their mouths when they cough or sneeze is helpful, too—as long as they remember to wash afterward.
• Recruit the coach’s help. “If you go to a soccer game, what do they do at the end of the game?” asks Herbert. “They go down the line and slap hands. So any kid on the team that’s got anything has spread the germ to every other kid. And then what do they do? They go have their snack. Did they wash their hands? Of course not.” Point taken. Coaches can help by directing the team to raise hands and salute “Go, team!” instead of slapping hands together, suggests Herbert. And the “snack parents” can help by bringing along a couple of bottles of hand sanitizers, too.
• Don’t forget the basics. It may seem obvious, but it bears repeating: Eat healthfully, exercise regularly, get enough rest, and drink plenty of fluids (healthful fluids, that is). And don’t smoke. “When it comes down to it, the most basic things are really the most important,” says Huang. Following these principles is especially important at holiday time, when people tend to run themselves ragged, compromising their immune systems and making it extra easy for those germs to drop by and make themselves at home.
Alternative Views
Holistic medical practitioners agree with most of the above—except, perhaps, the U.S. Centers for Disease Control and Prevention’s insistence that everyone in high-risk health categories needs a flu shot. “I don’t want to throw the baby out with the bath water where Western medicine is concerned,” says Jeffrey Kauffman, M.D., M.Ac. (U.K.), who uses acupuncture, herbs, vitamins and other holistic applications in his Sacramento and Grass Valley practices. “But I think vaccinations and immunizations cause more problems than they solve.” Children need to experience childhood diseases such as measles, chicken pox and flu, he says, because their immune systems are strengthened with each go-round. In addition to short-circuiting the immune system, he says, many vaccines contain mercury and aluminum, which some researchers have linked to autism.
If you stay healthy, Kauffman argues, you won’t need the flu vaccine. “It’s better to support your immune system—to do whatever you can to make your immune system strong.” By eating healthful (preferably organic) foods, taking appropriate vitamins, supplements and herbs, exercising regularly, and getting enough rest, Kauffman says, you will empower yourself to stay healthy, holiday season or no.
Reducing stress is especially important, he adds, recommending 20 minutes or more of daily meditation.
“Meditation is one of the best ways to neutralize stress,” he says. “You want to keep your stress minimal to zero.”
Believing you’ll stay healthy also is a powerful tool for staying healthy, says Kauffman, who says he rarely gets colds. “Your thoughts create your reality,” he says—a principle he applies to life in general, not just colds and flus. “If you believe that germs are around, and you believe you can catch them, you will—or at least you’ll be much more likely to catch them. But if you believe you’re impenetrable, if you believe that your immune system is strong and that it will take care of you, you won’t get sick.”
Sherman Luo, a Bejing-trained physician and acupuncturist in Citrus Heights, sums it up in just a few words.
“The Chinese medical view is very simple. If the healing energy is sufficient enough, germs won’t cause disease.”
When We Get Sick
OK, so you’ve tried all of the above and you’ve still come down with a nasty winter bug. Is there anything to do but stay home, rest up and let it run its course?
Sorry to say, not much.
“Other than doing the basic things—resting, drinking plenty of fluids—there’s not a whole lot to do except to treat the symptoms,” says Huang. Mostly, that means taking ibuprofen for body aches and fever, sucking on throat lozenges and gargling with warm salt water.
“People recover from colds even if they don’t take anything,” adds Glatt, “so my role is usually to advise them what things are beneficial and what may be harmful.” Nasal decongestants, for example, should only be used for three days at a time, he says. But he does recommend saline nasal spray if there’s a lot of mucus.
Over-the-counter cough syrups draw a negative response from both traditional and holistic doctors. “Studies show they offer no additional benefit,” says Glatt. Naturopathic physician Nick Dordevic, who practices in Carmichael, had more to say. “The worst thing patients can do is use those cough syrups,” he says. By suppressing symptoms, cough syrups can prolong the illness, he explains, which gets in the way of the body’s natural healing process. “It’s very important to just let it go and drink a lot of liquids,” advises Dordevic.
Although antiviral medications for influenza are available, they don’t make practical sense for most patients, says Herbert. “These drugs don’t work at all unless you take them within the first day and a half of getting sick,” he explains, “and during the first day or two, most people think they’re just coming down with a cold, so they’re not likely to seek treatment.” Even when the medications are properly used, he says, they only serve to reduce illness by a day or two, at best.
On the other hand, as Huang points out, “If it cuts back your symptoms from 10 days to nine days, that one day can be huge.”
While antivirals may work for some, antibiotics are another matter. “There’s really no point in taking antibiotics for most colds and flus,” says Glatt. “Ninety-nine percent of infections are viral, and antibiotics don’t treat viral infections.” Nor do antibiotics prevent bacterial infections, he notes. In addition, taking antibiotics when they are not needed may lead to the larger problem of creating stronger germs. But if a patient’s symptoms worsen significantly—especially if they’re localized, such as severe ear or sinus pain—it’s a good idea to see a doctor to rule out infection.
While this is a good rule of thumb, such guidelines have limited use, says Stuart Cohen, M.D., professor of medicine in the division of infectious diseases at UC Davis Medical Center. “I believe greatly in common sense,” he says. “If somebody says, ‘I just don’t feel right,’ then I think that’s a legitimate reason to see a physician,” he says. “If you think you need to see a doctor, you’re probably right.”
Flu Shot: Who Should Get One?
There are more than 36,000 influenza-related deaths in the United States every year, according to the Centers for Disease Control and Prevention, and some 200,000 people are hospitalized with complications. This year, with the nation’s flu vaccine supply cut in half, the CDC asked all health care providers to limit giving the shot to those in the following high-risk categories:
• Adults, 65 and older
• Children, 6 to 23 months
• Anyone 2 to 64 years old with a chronic health condition, such as asthma or heart disease
• Pregnant women
• Nursing home and long-term care facility residents
• Children on chronic aspirin therapy
• Health care workers with direct patient contact
• Out-of-home caregivers
• People who live with children younger than 6 months old
Note: Those who are allergic to eggs should not have the flu shot.
For information on getting a flu shot, contact your health care provider or call Sacramento County’s Immunization Assistance Program at (916) 875-SHOT (7468). If you’re a veteran enrolled in the Northern California Health Care System, call (800) 382-8387 or (866) 600-8279. For a list of public clinics, call Sutter VNA at (800) 500-2400.
Alternative Approaches: Advice From Holistic Experts
Linus Pauling tirelessly touted vitamin C. Others swear by echinacea. Can we believe the hype? In the world of alternative medicine, where data is often mixed or insubstantial, it’s hard to say. But we can say this: Used properly, holistic remedies are generally safe—and there’s a lot to be said for doing things the natural way.
Here are some recommendations from local medical practitioners, with an important caveat: For best results, start treatment at the earliest onset of cold or flu symptoms. And, of course, check with your health care provider.
Vitamin C: While it may not prevent or cure the common cold, studies have shown that vitamin C may decrease the severity or duration of colds by increasing the body’s resistance to infection. “It’s an antioxidant,” explains Donna Schwontkowski, D.C., a nutritionist and retired chiropractic physician in Sacramento. “Antioxidants work in the body against germs, because they’re able to quench the free radicals that are produced from the microbes.” Be careful not to overdo it, though: In high doses, vitamin C can lead to gastrointestinal distress.
Vitamins A and E: These also are antioxidants, explains Schwontkowski, adding that anyone who substantially increases vitamin C intake also should increase intake of vitamins A and E. “Balancing the vitamins gives it a synergistic effect, which helps you to wipe out sickness quicker,” she explains.
Selenium: Taken along with vitamins C and E, the antioxidant selenium is said to enhance the effects of vitamin C.
Echinacea: “Echinacea is one of the strongest herbs for boosting the immune system,” says Jeffrey Kauffman, M.D., M.Ac. (U.K.), an acupuncturist and doctor of holistic medicine. Indeed, echinacea’s popularity has boomed in recent years, and not just in the alternative world: Even American Family Physician reported in 2003 “a modest positive effect” when echinacea was used to treat upper respiratory infections. But don’t get carried away: Regular use of echinacea can reduce its effectiveness. Most health care professionals suggest using it at the earliest sign of cold or infection, and continuing usage only as long as symptoms persist.
Goldenseal: Some herbalists, including naturopathic physician Nick Dordevic of Carmichael, use goldenseal in conjunction with echinacea. “Both of these herbs can be useful for reducing mucus,” he says, recommending the tincture (liquid) form instead of tablets. “It gets into the bloodstream faster,” he explains.
Zinc lozenges: Some studies show that the mineral zinc, dissolved slowly in the mouth, may decrease the duration of the common cold as much as 50 percent. Dordevic is a particular fan of zinc lozenges, especially used alongside vitamins A, C, E and selenium. “This combination works well in reducing inflammation and other cold symptoms,” he says.
Cat’s claw: Also known as una de gato or Uncaria tomentosa, the Peruvian herb cat’s claw helps to put germ-fighting white blood cells into action, says Schwontkowski. “Research shows that it increases white blood cell count and their activity by 33 and 34 percent within two hours,” she says.
Garlic: Good ol’ garlic has been shown to kill several types of bacteria and viruses and to boost immunity. “Garlic makes a lot of difference to one’s health,” says Dordevic. “I’ve been using it for 20 or 25 years.” Schwontkowski uses garlic, radishes, celery, onions and a hot chile pepper in what she calls her “anti-plague” juice—something she concocts as part of her health and wellness classes at the Learning Exchange. Some students who showed up with colds, flus or sinus problems found their symptoms had cleared up after drinking the juice, she says.
A modified fast: Many alternative doctors suggest a high-liquid diet at the first sign of a cold or flu. The reasoning is that a body busy with digestion might have less energy for fighting off germs. “Lots of water, juices and herbal teas can help to keep the body temperature down and to flush out the system,” notes Dordevic.
Meditation: The basics of meditation can be learned in five minutes, say most experts, and as Kauffman says, it’s one of the best ways to reduce stress and keep the immune system strong. Local classes are available at the Siddha Yoga Meditation Center, 1250 Sutterville Road (916-452-6708), where Kauffman himself will teach a class beginning in February, “Meditation for an Awakened Life.” Beginners may also want to check out Meditation for Dummies, written by Stephan Bodian, the former editor-in-chief of Yoga Journal.
Positive thinking: As Kauffman points out, the mind-body connection cannot be overemphasized. “Your thoughts create your reality,” he says, recommending Wayne Dyer’s latest book, The Power of Intention, for those who want to read more on the subject. “Even the term ‘catching a cold’ implies you’re standing there with a baseball mitt, doing your best to catch the cold as it whizzes by.” If you want to avoid colds, flus and other diseases, he says, you have to believe that your immune system is strong—and don’t even think about catching them: Let them sail on by. | https://www.sacmag.com/health/how-to-beat-winter-bugs/ |
Search problems are quite common, for example. A maze solver, a puzzle solver or it’s most common use: a path finder. All search problems can be described as a tree, where each node represents a “state”, to advance from one state to the next we use what is called a “move”. Some of these states are a goal states, these are what we are looking for and preferably as fast as possible with the shortest cost.
Given a random maze with one exit and one entry. Each state consists of the position within this maze. The path from a given state is given by going up in the state tree. The exit is marked as a goal state and a move will return all possible follow-up states from a given state. Immediately it can be seen that if the maze has loops and we expand all states as deep as possible we would end up in an endless loop at some point.
Now we have a way of representing the problem in an uniform matter, the only thing left is to find is a method to get to the goal state(s).
Let’s begin with the most simple one: Depth first search. This search algorithm expands all states as deep as possible, so if the maze has loops this isn’t the best idea, but it is a start. If we wanted we could build a safe guard into the move function to not allow the occurrence of the same state within a branch of the state space twice, this is referred to as branch closing. The reason depth first search is so easy is because we have to only keep track of one branch at a time, moreover it is a recursive algorithm. Below follows a simple python implementation of depth first search.
Breadth first search is a more memory heavy search algorithm, what it does instead of diving into the depth of our state space we expand horizontal first, this way we search all possible states and this way we avoid being stuck on those loops. More importantly is this will always return the shortest path, this is because instead of deeping out, we expand every possible path one step at a time. Note, again we could close some tree branches based upon reoccurring states, but for simplicity sake this is left out.
As it can be seen, we need to keep track of every branch we create, this can lead to an immense consumption of resources.
Now let’s assume every move has a cost associated with it, this cost is given in the form of a positive number and with this cost we create a weighted graph. Instead of traversing everything let’s try and think which states will likely give us the best result. For these examples the move function will not only return the possible states, but also the cost to get there associated with them.
The first thing anybody would think of is, just expand the path with the lowest cost so far. And indeed this is a valid method. This algorithm is called after Edgar Dijkstra who invented and showcased this algorithm in the early days of the computers. Now an important side note, within Dijkstra’s algorithm it is specified that we can’t have reoccurring states in our path, so we will apply that within our example as well.
The example above is kept simple, instead of resorting the whole queue we could insert the states on the correct position to keep everything sorted, but this is easier to read. As can be seen we also keep track of the whole path again, but we prioritise the expansion of paths with a lower cost. Some observant readers will see that when every cost is the same, we will have the same behaviour as breadth first search.
For the most search problems we have some sort of measure for how far we are away from a end point. Lets call this our estimate and this can be calculated for every state. In our maze example this can be the absolute distance between us and the exit. If we now prioritize the expansion of states to the states with the lowest cost and estimate, we end up with searching the least possible amount of states and finding the optimal solution first.
As can be seen, this is really a small alteration to dijkstra’s algorithm.
And this concludes our tour through search space, the given examples are not ultimate solutions and are only there as a guide to explain the algorithms. Also there are lots more search algorithms, but these are the most used and most essential algorithms, basicly if you can reduce a problem to the state space you have a good way of reaching your goal. On top of that, if you have a good estimate function for your state space you have a really really great way to reach your goal with A*. Most of todays GPS programs run either dijkstra or A* to do the path finding. | https://littledev.nl/?p=83 |
Modifies the Military Rules of Evidence to prevent defendants from using good military character unless it is directly relevant to an element of the crime for which they are charged.
Requires Special Victims Counsels to advise victims of the advantages & disadvantages of a case being prosecuted in the military or civilian justice system and provides victims the opportunity to express their preference on where the case is heard, giving a victim a greater degree of control of his or her case.
Requires the services to set up a confidential process that will enable a victim of a sexual assault who was subsequently discharged to challenge the terms or characterization of his or her discharge—in order to take a retrospective look at possible instances of retaliation.
In the event a prosecutor recommends a case go forward and the commander disagrees, under the amendment, the case is kicked up for review to the civilian service secretary, providing yet another level of review in these cases when needed. The NDAA currently requires the higher-level review only when there is disagreement between the commander and his or her legal counsel/judge advocate.
Strengthens evaluations for commanding officers and the command climate they establish as it relates to allegations of sexual assault and the way victims of crimes are treated within the unit following reports.
Clarifies that all changes in the NDAA related to sexual assault prevention and response apply to the military service academies.
Last year, Fischer introduced two additional bipartisan amendments to fight military sexual assault by bolstering the rights of victims impacted by crimes and heightening the caliber of appointed sexual assault prevention officers.
Both measures were adopted by the Armed Services Committee to the NDAA in June and passed by the Senate in December. More information on these amendments is available HERE. | https://www.fischer.senate.gov/public/index.cfm/news?ID=4a51eec3-6935-4368-a909-51438d1961ed |
TERRIE TO DELIVER KEYNOTE AT GORDON RESEARCH CONFERENCE
"The Pathogenesis of Fatal Cerebral Malaria: Updates from the Field"
The 2015 Gordon Research Conference on "Tropical Infectious Diseases: Challenges, Opportunities and Successes", will present cutting edge research on the most prevalent and medically important tropical infectious diseases (TIDs). Similar to earlier GRCs, the intent of this conference is to gather a multidisciplinary community of scientists for the purpose of discussing basic and field-based research with translational implications in TIDs. The conference will particularly emphasize participation by junior and senior scientists from disease endemic countries. (via Gordon Research Conferences) Visit the GRC website fro more details.
FROM TERRIE'S BLOG: Walira mvula, walira matope (“He who asked for rain also asked for mud”)
Too much of a good thing
The usual seasonal rains in Malawi have been amplified by tropical cyclones (Bansi and 93S) in the Indian Ocean – and they are, by the way, fantastic examples of the Coriolis Effect. Both are rotating in a clockwise direction – in contrast to cyclones in the northern hemisphere, which rotate in a counter- (or “anti-“, as the Brits here in Malawi say) clockwise direction. | http://www.taylor.com.msu.edu/home-grc |
Responding to climate change has been at the top of much of the world’s to-do list lately, particularly that of the United Nations after their Climate Change Summit in September. However, a different approach to climate change is also growing in relevance: members of the Arctic Council— Scandinavian nations, Denmark (the colonizer of Greenland), Canada, the United States, and Russia—could have a lot to utilize if climate change causes the melting of Arctic sea ice. The Arctic terrain is constantly changing—huge amounts of oil are widely believed to be under its melting ice—and cooperation on how to either prevent or utilize this is in the best interest of all Arctic Council members. However, it has been and will continue to be difficult for Arctic Council members to cooperate on the issue of utilizing the Arctic Ocean as time goes on; this is because their current institution lacks solid regulations regarding the ocean. Additionally, the Arctic nations have conflicting interests in the area, which will make it hard to agree on a distribution of Arctic waters.
Though they are united together as the Arctic Council, there are no institutions between these nations that have been serious enough to enforce cooperation in the area; therefore, cooperating on the current Arctic issues will be difficult because the nations are used to acting in their own interests without consequences. Unlike the Antarctic Treaty, a treaty signed in the 1960s between the Arctic Council to agree on how the Arctic is utilized, and it’s security regulations that have been upheld since its implementation, the Arctic Council’s biannual meetings mainly focus on the preservation of the area but stray away from military and security issues in the region.
Many security issues arise because the Arctic Council lacks enforcement and efficient accountability of its members. For example, in 2007, Russian submarines placed a Russian flag on the North Pole in a territory separate from its Exclusive Economic Zone (EEZ), the area offshore that it is legally allowed to claim under United Nations law; this action lead to a backlash from the other members but no consequences, according to Rutgers. Additionally, regarding EEZs, there have been many requests over time by nations like Canada, Norway, and Russia to extend theirs or reduce others to no avail. The possibility of more issues like this arising in the future is high, especially as the Arctic continues to melt and nations get more opportunities to utilize the area; the possibility of these conflicts escalating or turning violent is also high, especially when newfound resources like oil come into the picture—these possibilities necessitate a new agreement like the Antarctic Treaty.
Though the Arctic Council members will be similarly affected by climate change in the region, the Arctic nations have also historically had conflicting interests in the Arctic. For example, the Arctic Council nations share the goal to prevent climate change in the Arctic due to their UN membership, but the size of their commitment differs by country. Russia, for one, has been scoping out the area since the beginning of this century and “envisions under Putin a northern sea route that is essentially a toll road,” increasing its icebreaker fleet to achieve this, which shows its willingness to put economic gain over climate change according to Politico. Conversely, Norway has publicly declared its dedication to preventing and mitigating climate change in the region because it has more of an incentive to—its citizens are more directly affected by it. The Guardian reported that Norway’s Arctic archipelago, Svalbard, is deemed one of the “fastest-heating places on Earth,” on track to displace its population and negatively transform its economy.
There are many options for the Arctic Council members to cooperate on this issue and establish a fair and secure way to distribute the Arctic waters and their new opportunities—while also factoring in climate change, one of the UN’s main focuses at the moment. The best option would undoubtedly be an agreement similar to the Antarctic Treaty of 1961 that regulates the global usage of Antarctica and defines economic, scientific, and political utilization. It has been upheld rather well since its implementation. An Arctic Council agreement would similarly need to find a balance between economic utilization of the Arctic’s resources and preservation of the area in the face of extreme climate change; even though climate change’s mass melting in the region in the area will be economically beneficial to the nations, it cannot be ignored as it is on the United Nations’ agenda to prevent and mitigate it. Possible agreements could be: giving nations full defined access to the entire Arctic for their economic goals, giving them some access and barring the rest of the Arctic off to preserve it, or entirely barring it off to prevent its human-made erosion fully.
The Arctic nations also all stand to benefit from the Arctic’s melting ice and the economic benefits it will create as “13% of Earth’s [oil] reserves lie under it,” according to Live Science. The amount that each country benefits due to their location and technology differs. Russia, Canada, and the United States have many other methods of income besides Arctic-related endeavours, whereas the Scandinavian states intensely rely on Arctic fishing and transportation routes. Because of this, implementing a solid and defined agreement in preparation for the Arctic melting entirely (which is bound to happen, scientists predict) is extremely important. The needs of each country with a claim to the Arctic must be addressed and accounted for in writing so that no skirmishes occur (like the Russian flag scandal), and so the area can be both preserved and utilized in a way that all can agree upon. Additionally, as the prospect of new transportation routes and access to oil became more widely publicized, the presence of countries without a historical claim to the Arctic, like China, greatly increased in the area.
In 2018, China created Arctic policy where it “proclaimed itself as a ‘near-Arctic state,’ a label that has since invited controversy,” Defense News reported. The presence of military powers like China, Russia, and the United States (one of which, China, does not have an agreed-upon claim to the Arctic in the first place) could turn the Arctic into a violent war zone over resources that would affect citizens and countries all around the world—similar to resource/oil conflicts in other regions like the Middle East—unless a treaty is promptly created and applied.
Cooperation on the issue of managing and distributing the Arctic Ocean (particularly in the form of a solid agreement like the Antarctic Treaty) between Arctic Council members will continue to be complicated. However, it is essential as the Arctic opens up many opportunities that countries around the world will want to use to their advantage. There is also a great unknown factor about the future of climate change in the region. Even if an agreement is created, there will be a higher risk of commitment problems if the ice keeps melting and opens up new potential. It is in the best interest of the Arctic Council members to create robust regulations, even if doing so will not be easy. | https://theowp.org/reports/melting-point-the-complications-of-the-melting-arctic-ocean/ |
Linking ancient cultures and investigating global craft movements and techniques has been my priority for the past decade. I began ceramics training in the United States at an art college. I was introduced to Asian ceramics in Kalimantan, Indonesia where I apprenticed with craftsmen and first saw a dragon kiln. There I heard of the porcelain capital of Jingdezhen, a place which would become fundamental for my art and life. I spent a year in Jingdezhen apprenticing with master craftsmen and renowned artists. Thirty countries later I have settled in Cairo, Egypt. Egypt is a land with deep tradition and mystic, in many ways I find it similar to China. I will devote the rest of my career to bridge these two ancient civilizations and make cross-cultural connections in my artistic expression.
My work focuses on cross cultural similarities in symbolism and motifs. I believe by finding connections between seemingly opposite civilizations we, as humanity, can discover that we all share a common root and origin. My ceramic work is both functional and sculptural, always incorporating ancient symbols and cuneiform into the décor. I enjoy the symbolism of the vessel itself. The body is also a vessel for our soul, a temporary residence. The vessel is what allows existence, the vessel holds our drinks, as our skin holds our viscera and fluids, the body also being made of mostly water. In Daoist religion there is a poem which states what makes the vessel useful? It is the emptiness, which is important, as in meditation, the emptiness is the objective.
As I traveled the world, I studied different religions and philosophies. I incorporate these mantras and prayers in my work to allude a deeper meaning and communicate a statement of the divine. I lived two years in Tibet, where I studied the ancient Buddhist art of Thangka painting, these influences resurface in my work. Thangka painting is more than an art, it is a meditation and a veneration to the deitybeing painted. Similar to the Asian tradition of tea ceremony, with precise order and deliberate movement, a simple act becomes a meditation. In the Bible, the Holy Grail is an allusion to the Divine Feminine. A reference to the womb, a metaphor for birth and new life. The ancient Daoist religion of China the “Mystic Female” is also a symbol for divine creation. Uniting these two art forms, ceramics and painting, I create cups that are spiritual vessels. The cup is the conversation, the exchange, the prayer.
Thirst, the analogy of thirst, is another element that is pillar in my work. In English, and in most languages, “thirst” can be interchanged with desire, “A thirst for knowledge.” An allusion to longing, a reference to craving. In Chinese language also such a metaphor is also common,“渴望, 渴求“ etc. I believe this relation is made because thirst is our most basic need. We can live without eating for nearly a month but without drinking, not very long. In every traditional culture I visited, it is polite to offer visitors a drink. In some southeast Asian cultures, it is common for houses to have outside a ceramic jar of water for passersby to drink. The drink is what binds humanity. The thing we cannot live without. The occasion over which we discuss, share stories, make friendships and bond as human beings. I incorporate these principles into my work and fuse them into my teapots,and etch them into my 杯子。
I have spent about five years in and around China. Chinese culture is carved deep in my heart, weaved tightly in my ideology, and personal beliefs. I began studying Chinese language in Australia and improved by listening and practicing with friends when I arrived at China first in 2009. From 2014-2018 I was living primarily in China; I travel frequently and have visited every country bordering China. I undertook fieldwork regarding religion, philosophy, and art forms of these Asian cultures. In 2016 I moved to the Tibetan Capital of Lhasa to study painting and language. I took University level courses taught in Chinese language in the Department of Fine Arts, at Tibet University. I believe by studying languages we can understand different ways of thinking. Profound philosophy and the true essence of culture is hidden inside the language. I speak Chinese, Spanish, Tibetan, and some of many different languages including Turkish, Indonesian and I am currently learning Arabic. I liketo incorporate different scripts into my work to provoke a dynamic global atmosphere.
The “word” is also another reoccurring theme in my art pieces. Words are more than mere groups of sound, words have vibration, words have energy. The words we choose tospeak, the words we choose to write, and the words we choose to think all have a vibration. I believe they have the equivalent vibration in every language. Traveling this long has given me an ability to read vibrations. Sometime times I find I can understand languages I have no knowledge of by the mere vibrations of the words. Ancient Hindu culture says that “Om” is the sound of the universe, the sacred syllable of Brahma,the creator. This sound is usually at the beginning of all Buddhist mantras as well. How can words and sounds affect our consciousness? I use these as questions as starting points in work, making every piece a homage to a variety of deities.
Recently I have been working in Cairo on a sculptural project about psychopomps from different cultures. The word Psychopomp, is a Greek word for the deity who aids us in the transition after death into the afterlife. I have created ceramic canopic jars with the heads of different animals which are associated with death and form change. In life it is easy for us all to notice our differences, eye color, hair color, skin color, etc. However, after death and the inevitable decomposition of the flesh, the body of a Western person and the body of an Asian person is almost indistinguishable. Death is another common ground that all people share, and though different religions and philosophies have varying explanations as to what happens after life, most religions give a face to this deity, the guide of souls.
I first visited Egypt in 2017, to have an exhibition of painting and sculpture, exploring the religious and cultural significance of the number “Nine”. I was enchanted by this mystical land upon arrival and had the pleasure of staying the sculpture and ceramics district of Old Cairo, home to manyartists’ studios and local talent. I have now made Cairo my home
The educational background and personal experience have inspired me to pioneer this bridge of Chino-Egyptian cultural exchange. I hope that by increasing communication between artists of these two cultures unexpected discoveries will surface regarding their similarities. My personal work will continue to examine these themes of culture and human origin. I work with Aswan clay which comes from Upper Egypt. In Egypt the South is referred to as Upper Egypt, because the Nile flows South to North.
Pottery is a key bonding factor of humanity, every culture with clay has some tradition of pottery production. Pottery is the first synthetic material created by humans. Natives in North and South America, Africans, Ancient Egyptians, and the Ancient Cultures of Asia all have been producing pottery for thousands of years. It governs the dinner table; it holds our food and drinks. Clay allows us to quench our thirst. It is transient, in constant metamorphosis. During traditional funerary rites, In Mali, North Africa, very large jars were made from ceramic and the body of the deceased was placed inside, then buried.
Are we all so different? We drink, we eat, we live, then die. Our distinguishing characteristics should be as spices on food, only enhancing the flavor of life, not walls creating divisions. Pottery is my tool to explore and demonstrate these ideals. | https://liminalspace.art/2019/09/20/connecting-cultures/ |
LCCI urges engagement between regulators, SMEs
By Okwy Iroegbu-Chikezie
The Lagos Chamber of Commerce and Industry (LCCI) is seeking effective engagements between Small and Medium Enterprises (SMEs) and regulatory agencies for enhanced transactions, communication and responsive feedback mechanism.
Its Director-General, Dr Muda Yusuf, made this known in a statement.
She said this followed a study by the Chamber and the Centre for International Private Enterprise (CIPE).
Yusuf said the study was administered on business owners, senior managers and personnel responsible for interfacing with the regulatory agencies in three cities – Aba, Kano and Lagos – due to their high concentration of SMEs.
He noted that the study focused on the Federal Inland Revenue Service (FIRS) and the National Agency for Food and Drugs Administration and Control (NAFDAC) as critical and strategic regulatory agencies.
Yusuf said it made known the need for ease of access to information for SMEs to address gaps between officials of regulatory agencies and owners/managers of SMEs businesses in engagement.
This, he said, would eliminate revenue leakages and transparency issues in their procedures and operations translating to improved outcomes for both the SMEs and the regulatory agencies.
He noted that the study also made known the importance of the adoption of technology by the Ministries, Departments, and Agencies (MDAs) to drive efficiency and ensure transparency.
He said poor deployment and inadequate use of information technology, ineffective grievance redress mechanism and non-standard approaches as SMEs and regulatory agencies engage created opportunities for transactional accountability breaches.
“The Federal Government of Nigeria on May 18, 2017, signed the Executive Order 001 on “the Promotion of Transparency and Efficiency in the Business Environment”.
“The objective of the Executive Order was to facilitate the ease of doing business in Nigeria through the promotion of transparency and efficiency in the business environment.
“The Executive Order compelled Federal MDAs to publish a full list of requirements, including fees on their websites and to ensure that the list is verified and always updated in order to guide and ease application processes for both local and foreign investors/businesses.
“In spite of appreciable efforts by the agencies to ensure that engagement and interface occur directly with businesses seeking their services, more than 80 per cent of SMEs engage the regulatory agencies through consultants and intermediaries.
“Regulatory agencies put in place internal service complaints structure for addressing cases of service dissatisfaction through official procedures and civil service rules, coordinated by SERVICOM Department at the Head Offices.
“Unfortunately, these mechanisms were unpopular among SMEs as only 4.6 per cent of SMEs were aware of grievance redress mechanisms.
“Even those that are aware rarely use it due to lengthy procedures for seeking redress and also for fear of reprisals by the officials of the agencies.
“The use of intermediaries and consultants by SMEs to facilitate transaction is pervasive and the cost of procuring services and products from regulatory agencies affect the bottom-line and general performance of SMEs.
“There are inconsistencies in time, cost and processes of getting services from regulatory agencies which allow making extra unreceipted/informal payment by SMEs to officials, a times just to say, “thank you”, “ he said.
The LCCI DG, however, stated that the study found that the management of NAFDAC and FIRS had made laudable efforts to increase accountability and transparency in carrying out their day-to-day statutory regulatory activities.
“NAFDAC in its quest to strengthen regulatory activities through stakeholders’ engagement and collaboration, designed a three-pronged approach to achieving transparency in conducting regulatory activities with emphasis on understanding and avoiding transactional corruption.
“This three-pronged approach is anchored on staff re-orientation, increased sensitisation as well as capacity development of SMEs and deepening IT engagement platform.
“The agency has set up a plan to monitor its implementation and assess outcomes from time-to-time.
“Similarly, the study noted that FIRS has put in place a seamless service procurement mechanism for the benefit of its taxpayers/customers and to promote efficient service delivery performance as well as improve the ease of doing business.
“These service provision mechanisms include but are not limited to the provision for e-services platforms for the various services rendered to taxpayers; existence of an anti-corruption tax unit; and re-formation of robust complaints/grievance mechanism,” he said.
ADVERTISEMENT
Yusuf stressed that a conscientious implementation of the recommendations would engender significant improvement in the operating environment for SMEs.
He stated that the recommendations would make them more competitive especially in consideration of the operationalisation of the African Continental Free Trade Area (AfCFT). | |
As scholars of immigration law have been busy digesting the firehose of law and policy changes shooting out of the Trump administration, the use of new technologies at the border has been proliferating. Petra Molnar’s new article, Technology on the margins: AI and Global Migration Management from a Human Rights Perspective, reminds us that we must begin to pay closer attention to these developments and how they are deployed and regulated. Building on her excellent report, Bots at the Gate, the article provides a timely and useful roadmap of the relevant technologies and their very real risks. Though in the end Molnar is more sanguine than I about the potential of human rights law to mediate these risks, she rings a crucially important warning bell that we would all do well to keep an ear out for over the roar of the firehose.
The article begins, as it should, with a basic description of the “class of technologies that assist or replace the judgment of human decision-makers.” Automated decision-making has the potential to impact adjudication processes and outcomes by the full range of immigration actors, from border patrol to immigration courts. But what technologies are contained within this category? Molnar lists four: artificial intelligence, machine learning, automated decision systems, and predictive analytics, describing them as technologies that can be taught and can learn. Along with the description, she raises the key concern about the opacity of how exactly these decisions are made. As Frank Pasquale and others have asked, what is in that algorithm? Bias, perhaps? Molnar makes the important connection between the literature that critically examines automated decision-making and immigration adjudication. She notes that these technologies present the same risks as human decision-makers: accountability, bias, discrimination, error, and transparency, reminding us not to be fooled by the algorithm’s veneer of scientific objectivity.
From this definition, the article identifies four key areas of concern around the use of technologies in migration governance, offering a foundational map that calls for future researchers to engage. The first concern Molnar raises is the privacy breaches arising from data collection, ranging from the monitoring of mobile phone records to analysis of social media to geotagging. She next examines concerns around biometrics and consent in conditions of unequal bargaining power, offering the disturbing example of refugees in Jordan who were required to submit to iris scanning in order to receive their weekly food rations. Third, Molnar describes the use of technology in surveillance, explaining that the militarization of the border through the use of drones, robots, and remote sensors as border control pushes migrants to more dangerous routes that are more likely to lead to death and serious injury. Finally, the article explores automated decision-making, discussing ICE’s bail determination algorithm and “Extreme Vetting Initiative.” Each of these topics is crying out (loud enough to be heard over the firehose) for future research by Molnar and others.
The article concludes with an explanation of why these developments are particularly concerning in the migration management arena. The pace of technological innovation combined with the dearth of transnational regulatory frameworks present a potent recipe for abuse when baked into migration’s “discretionary space of opaque decision-making.” Molnar explicitly links these concerns with the use of migration management as an experimental forum with the use of data collection and tracking by genocidal regimes in Germany and Rwanda. She explains that there are no legally binding international agreements governing the ethical use of AI in migration management; the existing piecemeal guidelines and task forces are insufficient to face the task at hand. In particular, Molnar notes the need for specificity in legal standards to regulate AI in the migration space.
She suggests a human rights framework as a potential solution. Though less optimistic about this proposal given human rights law’s limited protections for administrative decision-making as well as its lack of specificity, I am indebted to Molnar for pushing forward the conversation and certainly agree that “a more rigorous global accountability framework is now paramount.” An alternative route might be to pressure big technology companies with specific standards set by an independent body, but the most important next step is to dive into the project that Molnar has laid out for immigration scholars. As she aptly notes, “the complexity of human migration is not easily reducible to an algorithm.” Those of us with the relevant substantive knowledge must now turn our attention to figuring out how to harness the potential firehose of these new technologies for the benefit of humans on the move, in all of their brilliant complexity. | https://lex.jotwell.com/watch-this-space-ai-at-the-border/ |
"The quick way is to create a new row A4 that is a sum of A2 and A3. Then select just the 1 row and ctrl select the 4 row and click the chart wizard.... 19/08/2013 · They are displayed on the graph in a non-cumulative format. On the bottom of the chart, is the little table with the numbers. My manager just asked if I could add the cumulative total for the year to the end of the table.
Cusum Chart in Excel Cumulative Sum Charts are used to Detect Small Shifts in a Process. Cusum charts can detect process shifts more rapidly than the XmR or XbarR.
23/04/2005 · I am doing a statistics course work and would like to know how to set up a cumulative frequency curve in Excel. I have tried to insert functions and using the chart options but I cannot do it in the end. Please tell me how to do draw a cumulative frequency curve in Excel. Thank you.
A cumulative average recalculates a data set's average as new data is added. During the recalculation all data contained in the data set is included in the average.
The process for plotting a cumulative frequency polygon or a cumulative percentage polygon in Excel is much the same as plotting an ordinary one. Highlight the groups column and either the cumulative frequencies or the percentage versions of the cumulative frequencies. As in the previous section, go to "Insert," "Line" and "Line with Markers" to plot the graph. | http://chipotlewatch.com/western-australia/how-to-draw-cumulative-graph-in-excel.php |
Establishing ownership of an intangible item, such as a poem or painting, can be difficult. Unlike proving ownership of a car, which simply requires the owner to have a bill of sale or title, the copyright provides protection for creative work. Simply put, the copyright protects intangible goods which are created, thus becoming tangible. An official copyright can be registered to formally certify the ownership of an item, but is not necessary in the United States, where a concept automatically becomes copyright protected the moment it takes tangible form.
Copyright laws do not ban people from using similar ideas, words or thoughts. They deal exclusively with the exact working and structure of the item that is copyright protected. The holder of a copyright is the only person who can make a deal to turn their novel into a movie, for example. If a copyright owner wishes to transfer their rights to another, the new owner would have permission to use the item as they saw fit.
The laws that govern copyrights have been changing since their inception in the early 1800’s, becoming more favorable for the author. Copyright laws are designed to protect the financial benefits that may be derived from the product. In other words, the copyright prohibits the fair use of an item by the public. The typical length of copyright protection is the lifetime of the author plus 70 years. This allows the estate to make a claim based on any potential licensing fees. Interestingly, the first images of Mickey Mouse should have passed into public domain for usage but changes to the copyright laws have allowed the happy cartoon to stay where they are – safe from the public.
Additionally, the courts have begun to crack down on infringement of copyright laws. Classifying copyrights as intellectual property gives the owner the security of knowing that the courts will back them up. | https://www.cleverism.com/lexicon/copyright/ |
Barbara Illowsky & OpenStax et al.
The science of statistics deals with the collection, analysis, interpretation, and presentation of data. We see and use data in our everyday lives.
Exercise
In your classroom, try this exercise. Have class members write down the average time (in hours, to the nearest half-hour) they sleep per night. Your instructor will record the data. Then create a simple graph (called a dot plot) of the data. A dot plot consists of a number line and dots (or points) positioned above the number line. For example, consider the following data:
5; 5.5; 6; 6; 6; 6.5; 6.5; 6.5; 6.5; 7; 7; 8; 8; 9
The dot plot for this data would be as follows:
Does your dot plot look the same as or different from the example? Why? If you did the same example in an English class with the same number of students, do you think the results would be the same? Why or why not?
Where do your data appear to cluster? How might you interpret the clustering?
The questions above ask you to analyze and interpret your data. With this example, you have begun your study of statistics.
In this course, you will learn how to organize and summarize data. Organizing and summarizing data is called descriptive statistics. Two ways to summarize data are by graphing and by using numbers (for example, finding an average). After you have studied probability and probability distributions, you will use formal methods for drawing conclusions from “good” data. The formal methods are called inferential statistics. Statistical inference uses probability to determine how confident we can be that our conclusions are correct.
Effective interpretation of data (inference) is based on good procedures for producing data and thoughtful examination of the data. You will encounter what will seem to be too many mathematical formulas for interpreting data. The goal of statistics is not to perform numerous calculations using the formulas, but to gain an understanding of your data. The calculations can be done using a calculator or a computer. The understanding must come from you. If you can thoroughly grasp the basics of statistics, you can be more confident in the decisions you make in life.
Probability
Probability is a mathematical tool used to study randomness. It deals with the chance (the likelihood) of an event occurring. For example, if you toss a fair coin four times, the outcomes may not be two heads and two tails. However, if you toss the same coin 4,000 times, the outcomes will be close to half heads and half tails. The expected theoretical probability of heads in any one toss is 12 or 0.5. Even though the outcomes of a few repetitions are uncertain, there is a regular pattern of outcomes when there are many repetitions. After reading about the English statistician Karl Pearson who tossed a coin 24,000 times with a result of 12,012 heads, one of the authors tossed a coin 2,000 times. The results were 996 heads. The fraction 9962000 is equal to 0.498 which is very close to 0.5, the expected probability.
The theory of probability began with the study of games of chance such as poker. Predictions take the form of probabilities. To predict the likelihood of an earthquake, of rain, or whether you will get an A in this course, we use probabilities. Doctors use probability to determine the chance of a vaccination causing the disease the vaccination is supposed to prevent. A stockbroker uses probability to determine the rate of return on a client’s investments. You might use probability to decide to buy a lottery ticket or not. In your study of statistics, you will use the power of mathematics through probability calculations to analyze and interpret your data.
Key Terms
In statistics, we generally want to study a population. You can think of a population as a collection of persons, things, or objects under study. To study the population, we select a sample. The idea of sampling is to select a portion (or subset) of the larger population and study that portion (the sample) to gain information about the population. Data are the result of sampling from a population.
Because it takes a lot of time and money to examine an entire population, sampling is a very practical technique. If you wished to compute the overall grade point average at your school, it would make sense to select a sample of students who attend the school. The data collected from the sample would be the students’ grade point averages. In presidential elections, opinion poll samples of 1,000–2,000 people are taken. The opinion poll is supposed to represent the views of the people in the entire country. Manufacturers of canned carbonated drinks take samples to determine if a 16 ounce can contains 16 ounces of carbonated drink.
From the sample data, we can calculate a statistic. A statistic is a number that represents a property of the sample. For example, if we consider one math class to be a sample of the population of all math classes, then the average number of points earned by students in that one math class at the end of the term is an example of a statistic. The statistic is an estimate of a population parameter. A parameter is a number that is a property of the population. Since we considered all math classes to be the population, then the average number of points earned per student over all the math classes is an example of a parameter.
One of the main concerns in the field of statistics is how accurately a statistic estimates a parameter. The accuracy really depends on how well the sample represents the population. The sample must contain the characteristics of the population in order to be a representative sample. We are interested in both the sample statistic and the population parameter in inferential statistics. In a later chapter, we will use the sample statistic to test the validity of the established population parameter.
A variable, notated by capital letters such as X and Y, is a characteristic of interest for each person or thing in a population. Variables may be numerical or categorical. Numerical variables take on values with equal units such as weight in pounds and time in hours. Categorical variables place the person or thing into a category. If we let X equal the number of points earned by one math student at the end of a term, then X is a numerical variable. If we let Y be a person’s party affiliation, then some examples of Y include Republican, Democrat, and Independent. Y is a categorical variable. We could do some math with values of X (calculate the average number of points earned, for example), but it makes no sense to do math with values of Y (calculating an average party affiliation makes no sense).
Data are the actual values of the variable. They may be numbers or they may be words. Datum is a single value.
Two words that come up often in statistics are mean and proportion. If you were to take three exams in your math classes and obtain scores of 86, 75, and 92, you would calculate your mean score by adding the three exam scores and dividing by three (your mean score would be 84.3 to one decimal place). If, in your math class, there are 40 students and 22 are men and 18 are women, then the proportion of men students is 2240 and the proportion of women students is 1840. Mean and proportion are discussed in more detail in later chapters.
The words “mean” and “average” are often used interchangeably. The substitution of one word for the other is common practice. The technical term is “arithmetic mean,” and “average” is technically a center location. However, in practice among non-statisticians, “average” is commonly accepted for “arithmetic mean.”
Determine what the key terms refer to in the following study. We want to know the average (mean) amount of money first year college students spend at ABC College on school supplies that do not include books. We randomly survey 100 first year students at the college. Three of those students spent $150, $200, and $225, respectively.
Try It
Determine what the key terms refer to in the following study. We want to know the average (mean) amount of money spent on school uniforms each year by families with children at Knoll Academy. We randomly survey 100 families with children in the school. Three of the families spent $65, $75, and $95, respectively.
Determine what the key terms refer to in the following study.
A study was conducted at a local college to analyze the average cumulative GPA’s of students who graduated last year. Fill in the letter of the phrase that best describes each of the items below.
1._____ Population
2._____ Statistic
3._____ Parameter
4._____ Sample
5._____ Variable
6._____ Data
- a) all students who attended the college last year
- b) the cumulative GPA of one student who graduated from the college last year
- c) 3.65, 2.80, 1.50, 3.90
- d) a group of students who graduated from the college last year, randomly selected
- e) the average cumulative GPA of students who graduated from the college last year
- f) all students who graduated from the college last year
- g) the average cumulative GPA of students in the study who graduated from the college last year
Determine what the key terms refer to in the following study.
As part of a study designed to test the safety of automobiles, the National Transportation Safety Board collected and reviewed data about the effects of an automobile crash on test dummies. Here is the criterion they used:
|Speed at which Cars Crashed||Location of “drive” (i.e. dummies)|
|35 miles/hour||Front Seat|
Cars with dummies in the front seats were crashed into a wall at a speed of 35 miles per hour. We want to know the proportion of dummies in the driver’s seat that would have had head injuries, if they had been actual drivers. We start with a simple random sample of 75 cars.
Determine what the key terms refer to in the following study.
An insurance company would like to determine the proportion of all medical doctors who have been involved in one or more malpractice lawsuits. The company selects 500 doctors at random from a professional directory and determines the number in the sample who have been involved in a malpractice lawsuit.
Exercise
Watch the following video for a brief introduction to statistics.
References
The Data and Story Library, http://lib.stat.cmu.edu/DASL/Stories/CrashTestDummies.html (accessed May 1, 2013).
Concept Review
The mathematical theory of statistics is easier to learn when you know the language. This module presents important terms that will be used throughout the text.
Glossary
- Average
- also called mean; a number that describes the central tendency of the data
- Categorical Variable
- variables that take on values that are names or labels
- Data
- a set of observations (a set of possible outcomes); most data can be put into two groups: qualitative (an attribute whose value is indicated by a label) or quantitative (an attribute whose value is indicated by a number). Quantitative data can be separated into two subgroups: discrete and continuous. Data is discrete if it is the result of counting (such as the number of students of a given ethnic group in a class or the number of books on a shelf). Data is continuous if it is the result of measuring (such as distance traveled or weight of luggage)
- Numerical Variable
- variables that take on values that are indicated by numbers
- Parameter
- a number that is used to represent a population characteristic and that generally cannot be determined easily
- Population
- all individuals, objects, or measurements whose properties are being studied
- Probability
- a number between zero and one, inclusive, that gives the likelihood that a specific event will occur
- Proportion
- the number of successes divided by the total number in the sample
- Representative Sample
- a subset of the population that has the same characteristics as the population
- Sample
- a subset of the population studied
- Statistic
- a numerical characteristic of the sample; a statistic estimates the corresponding population parameter. | https://psu.pb.unizin.org/introductorystatyoungsu18/chapter/definitions-of-statistics-probability-and-key-terms/ |
Dr. Steen is psychiatry resident at the University of Minnesota, Minneapolis; Dr. Narang is Staff Physician and Lead ECT Psychiatrist, Regions Hospital, Minneapolis-St. Paul, Minnesota; and Dr. Lippmann is Professor of Psychiatry, University of Louisville School of Medicine, Louisville, Kentucky.
Innov Clin Neurosci. 2015;12(7–8):28–30
Funding: No funding was received for the preparation of this article.
Financial disclosures: The authors have no conflicts of interest relevant to the content of this article.
Key words: ECT, electroconvulsive therapy, multiple sclerosis, depression
Abstract: We performed a literature search regarding the safety and efficacy of electroconvulsive therapy in patients with multiple sclerosis and comorbid psychiatric symptoms. Literature review was conducted via PubMed databases. Of the cases we reviewed, most subjects with multiple sclerosis reported significant psychiatric symptom relief, with only a handful reporting neurologic deterioration. There was some evidence that active white matter lesions may be predictive of neurologic deterioration when electroconvulsive therapy is used in patients with multiple sclerosis. A brief description of the pathophysiology and effects of depression in patients with multiple sclerosis is also provided. Although no clinical recommendations or meaningful conclusions can be drawn without further investigation, the literature suggests that electroconvulsive therapy for treatment of psychiatric illnesses in patients with multiple sclerosis is safe and efficacious.
Introduction
Electroconvulsive therapy (ECT) is recognized as efficacious for treatment-refractory depression, mania, catatonia, and schizophrenia.1 Additionally, it is sometimes indicated for patients with status epilepticus, neuroleptic malignant syndrome, dementia with agitation, and Parkinson’s disease. In the general population, the risks associated with ECT are low, similar to that associated with anesthesia. However, there are no large trials reported or other literature analyzing the risk associated with ECT in patients with neurodegenerative disorders such multiple sclerosis (MS), Huntington’s disease, amyotrophic lateral sclerosis, multiple system atrophy, or Alzheimer’s disease.
Given the neurologic deterioration seen in these disorders, there is legitimate concern that an ECT-induced seizure might have adverse effects on an already damaged nervous system. Additionally, people with these diseases having cognitive dysfunction are at increased risk for further deterioration by administering ECT.
The purpose of this article was to review and discuss the available literature for evidence regarding the efficacy and safety of ECT in the treatment of psychiatric illness in patients with MS. A brief description of the pathophysiology and effects of depression on patients with multiple sclerosis is also provided.
Method
A PubMed search was performed using the term electroconvulsive therapy and multiple sclerosis, yielding 19 total results. We selected the articles that detailed the effects of ECT on patients with MS?and any psychiatric illness. Of these results, there were only two original case reports and a 2007 review article of 17 case reports. Of those 17 case reports included in the review article, three were discussed at length by the authors and the remaining 14 were summarized. We also reviewed the case reports from the review article that were electronically accessible in their entirety. Additionally, we selected and reviewed several articles that were found via the PubMed databases using the search term multiple sclerosis and depression for background information.
Background: Depression and MS
MS is an immune-mediated inflammatory disorder resulting in destruction of oligodendrocytes with nerve demyelination. Multifocal lesions of the central nervous system white matter characterize this disease. The physical symptoms of MS are well established: patients experience neurologic dysfunction resulting in autonomic, sensory, visual, and/or motor deficits.[3–5] Beyond the physical disabilities associated with MS, psychiatric dysfunction is also noted: between 40- and 60-percent of individuals with MS report depressive and anxiety complaints. An increase in incidence of bipolar disorder has also been noted in people with MS. Suicide rates are higher as well.
The elevated incidence of depression in MS has several explanations. Depression may be a direct result of neurodegenerative pathology, with neuronal damage causing the mood disorder. Depression is more common in persons with lesions in their brains as opposed to those with lesions only in their spinal cords.[6,7] Frontal and temporal lesions associated with reduced brain tissue volume are also correlated with depression.[5,6]
A decrease in the quality of life in patients with MS is also associated with depression. The same applies to pain, fatigue, and/or cognitive impairments related to the presence of MS.[7–10]
Depression might also be the result of or worsened by interferon-beta, a standard therapy for MS.[5,11] However, one investigation confoundingly revealed that neither interferon-beta nor glatiramir acetate had any negative effect on mood symptoms in patients with relapsing-remitting MS.
The high rates of depression in patients with MS are likely to reflect an interaction of the above factors; yet, to date, there is no neurobiological explanation. The relationship between MS, depression, and their treatments remains to be clarified. Thus, for now, the treatment for depression in patients with MS utilizes the same guidelines as the general population. The American Academy of Neurology states that it cannot support or refute the efficacy of any known antidepressant medication or cognitive behavioral therapy. There are no existing data on ECT for treatment-refractory depression comorbid with MS.
ECT and MS: A Review of Case Reports
According to Mattingly et al, magnetic resonance imaging (MRI) scans in an MS patient undergoing ECT evidenced a correlation between the existence of gadolinium-enhancing lesions at baseline and heightened risk for new neurologic dysfunction after ECT. The authors of this case report cite several studies implicating disruption of the blood brain barrier as a risk factor for neurologic decompensation during ECT. Because gadolinium-enhancing lesions (a sign of active MS plaques) have demonstrated increased permeability in the blood brain barrier, the authors hypothesize that gadolinium-enhancing lesions may prove to be a contraindication to ECT, and recommend obtaining a baseline MRI before administration of ECT in patients with MS.
A 2007 review by Rasmussen et al of ECT performed on patients with MS documented 17 case reports since 1951. Among the three case reports described in detail by Rasmussen et al, there was no documented evidence that a decrease in neurologic functioning occurred. All three cases reported significant mood improvement despite varied severity in the MS courses and pre-treatment neurologic functioning. However, little long-term follow-up was described. Without such data, it is impossible to assess the potential late-effect neurologic deficits that could arise from ECT treatment in patients with MS. All three cases were women, and their ages ranged from 23 to 61 years.
Of the remaining 14 cases that were summarized by Rasmussen et al, only a handful reported deterioration of neurologic status; however, these reports afford no conclusive impressions about ECT safety or efficacy in people with MS. Very few of the reviewed case reports included pre- and post-treatment MRI imaging; without this, it is impossible to address the possibility of new brain lesions.
In the two case reports we reviewed describing patients with MS and comorbid psychiatric illness who received ECT treatment, the conclusions were conflicting.[15,16] One patient, a 28-year-old man with MS?and recurrent catatonia, was successfully treated with ECT and developed no neurologic deficits. However, the other case, a male patient with MS?and psychotic depression, experienced a grand mal seizure following his 14th ECT treatment, and the course of ECT was subsequently halted.
Conclusion
ECT appears to be efficacious in treating psychiatric illness in patients with MS.[14,15] Published cases document improvement in psychiatric symptoms;[14,15] yet data regarding neurologic deterioration following ECT are not clear.[14–16] There is no pattern in ECT’s potential for deleterious effects. In the reviewed literature, patients that displayed loss of neurologic function induced by ECT were of different ages, had varied levels of neurodegeneration, and dissimilar neuropsychiatric presentations. There was no correlation between symptom severity and laterality of ECT electrode placement. Thus, decisions to select ECT for treating co-existing psychiatric disorders and MS must be made on an individualized basis that involves risk-versus-benefit discussions with patients.
In addition to MS, other neurodegenerative disorders are also associated with depression and increased suicide rate.[3–5] The literature analyzing ECT outcomes or sequelae in these patients is sparse and without clear findings or recommendations. Clearly, further research into use of ECT for treatment of psychiatric illness in patients with MS and other neurodegenerative disorders is needed before firm conclusions can be drawn regarding its safety.
References
1. American Psychiatric Association. The Practice of ECT: Recommendations for Treatment, Training, and Privileging. Washington, DC: American Psychiatric Press, Inc.; 2001.
2. Fink M, Taylor MA. Electroconvulsive therapy: evidence and challenges. J Am Med Assoc. 2007;298(3):330–332.
3. Chwastiak L, Ehde DM, Gibbons LE, et al. Depressive symptoms and severity of illness in multiple sclerosis: epidemiologic study of a large community sample. Am J Psychiatry. 2002;159:1862–1868.
4. Carta MG, Moro MF, Lorefice L, et al. The risk of bipolar disorder in multiple sclerosis. J Affect Disord. 2014;155:255–260.
5. Pompili M, Forte A, Palermo M, et al. Suicide risk in multiple sclerosis: a systematic review of current literature. J Psychosomat Res. 2012;73(6):411–417.
6. Kirzinger SS, Jones J, Siegwald A, et al. Relationship between disease-modifying therapy and depression in multiple sclerosis. Int J MS Care. 2013;15(3):107–12.
7. Rabins PV, Brooks BR, O’Donell P, et al. Structural brain correlates of emotional disorder in multiple sclerosis. Brain. 1986;109:585–597.
8. Bieske AG, Svensson E. Depression and anxiety amongst multiple sclerosis patients. Eur J Neurol. 2008;15:239–245.
9. Sadovnic AD, Remick RA. Depression and multiple sclerosis. Neurology. 1996;46(3):628–632.
10. Amato MP, Ponziani G, Rossi F, et al. Quality of life in patient’s with multiple sclerosis: the impact of depression, fatigue, and disability. Multiple Sclerosis Journal. 2001;7(5):340–344.
11. Arnett PA, Randolph JJ. Longitudinal course of depression symptoms in multiple sclerosis. J Neurol Neurosurg Psychiatry. 2006;77:606–610.
12. Minden SL, Feinstein A, Kalb RC, et al. Evidence-based guideline: assessment and management of psychiatric disorders in individuals with MS: report of the Guideline Development Subcommittee of the American Academy of Neurology. Neurology. 2014;82(2):174–181.
13. Mattingly G, Baker K, Zorumski CF, et al. Multiple sclerosis and ECT: possible value of gadolinium-enhanced magnetic resonance scans for identifying high risk patients. J Neuropsychiatry Clin Neurosci. 1992;4:145–151.
14. Rasmussen KG, Keegan BM. Electroconvulsive therapy in patients with multiple sclerosis. J ECT. 2007;23(3):179–180.
15. Pontikes TK, Dinwiddie SH. Electroconvulsive therapy in a patient with multiple sclerosis and recurrent catatonia. J ECT. 2010;26(4):270–271.
16. Urban-Kowalczyk M, Rudecki T, Wroblewski D, et al. Electroconvulsive therapy in patient with psychotic depression and multiple sclerosis. Neurocase. 2014;20(4):452–455. | https://innovationscns.com/electroconvulsive-therapy-in-multiple-sclerosis/ |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.