content
stringlengths
0
1.88M
url
stringlengths
0
5.28k
Mar 9 2017 - Low wages, precarious employment, and lots of overtime. A recent report from the EU project ”Change Your Shoes” show that Indonesian subcontractors for several European footwear companies, including Ecco and Deichmann, are not in compliance with the law. Employees within the Indonesian footwear industry have difficulties in organizing themselves in trade unions in order to demand their rights concerning wage levels and work hours. This is due to the precarious nature of employment with temporary hiring and contracts without standard protections. In 2015 Indonesia was the fourth largest producer of shoes in the world after China, India and Vietnam. Around one billion pairs of shoes are produced annually in Indonesia, which is 5% of the total global production. The Change your Shoes campaign is a partnership between 18 European and Asian NGOs. Their recent report No Excuses for Homework is based on interviews with 117 laborers at four factories, and 37 homeworkers. – These two companies state that they have good supervision of their supply chain. But when you dig below the surface into these chains, that supervision fails, says Charlie Aronsson, project manager and assistant head of administation at Fairaction, one of the networked partners of the Change your Shoes campaign. In the interviews with factory workers, employment conditions were described. At Ecco’s subcontractor it was expected that each laborer works three to four hours overtime every day. Søren Kragh Pedersen, Head of External Communication at Ecco, says the company is surprised to see what is stated in the report about the working conditions at the factory PT Prima Dinamika Sentosa. ”The conditions described at this factory does not correspond with what Ecco auditors found when checking the conditions at the factory in 2015 for the about 50 persons, who work with the production of some minor shoe components”, Mr Pedersen writes in an email to Arbetet Global. Ecco emphasize it runs its production and business in general in accordance with its Code of Conduct. ”In relation to PT Prima Dinamika Sentosa, Ecco has only had access to the part of the factory where a small group of workers were producing components for Ecco, and is thus not familiar with the details in relation to the employment facts related to the rest of the about 2000 persons working in this factory.” Mr Pedersen also adds: ”Ecco has for some time phased out the cooperation with PT Prima Dinamika Sentosa and from the end of this month the cooperation ends, so Ecco is no longer fully up to date on facts related to this factory.” At one of Deichmann’s subcontractors, labor contracts were limited to six months of employment at which time the laborer would have to re-apply for the job, despite the fact that temporary contracts are only permitted for short time periods according to Indonesian law. Employees at three factories also claim that the wages they earn do not even cover their costs for basic needs. – There is a continuing problem with these companies’ sustainability work as they still do not seek out where the risks are greatest but rather choose to only look at the nearest link in the supply chain. It is an outdated method. You need to make a proper analysis of risks to see where the problems are most prevalent, says Charlie Aronsson at Fairaction. In a statement to Arbetet Global, Deichmann, who have over 20 stores in Sweden, state that they have responded to allegations by reviewing all terms of contract for the laborers at subcontractor PT Mekar Abadi Sentosa. ”It’s fixed-term contracts are now in line with the pertinent statutes. And it has also much reduced it’s staff’s overtime.” Deichmann add that they have made their own visits at the factory on several occasions, sometimes unannounced. ”We always seek continuous improvement in cooperation with our suppliers. As far as we can tell, this benefits the entire industry’s standards in the respective country of origin. Our work is based upon our Code of Conduct, which, in turn, is based upon the ILO’s conditions of work and employment.” Charlie Aronsson points to the much lower degree of transparency in the global footwear industry compared to that of other sections of the fashion industry, and also that it is difficult to place all ethical responsibilities on consumer behavior He does though suggest shoppers to ask ‘stupid’ questions to employees in the footwear industry as well as shoe store staff. – Without consumer pressure, unfortunately, nothing will happen. There are though companies that are more transparent, and can show where their shoes are made. For example, Eurosko are the only Scandinavian chain that have made their list of suppliers available on their homepage. This is something we are encouraging more chains to do. This story was originally published by Arbetet Global IPS is an international communication institution with a global news agency at its core, raising the voices of the South and civil society on issues of development, globalisation, human rights and the environment Copyright © 2019 IPS-Inter Press Service. All rights reserved. - Terms & Conditions | | You have the Power to Make a Difference Would you consider a $20.00 contribution today that will help to keep the IPS news wire active? Your contribution will make a huge difference.
http://www.ipsnews.net/2017/03/ecco-subcontractor-in-breach-of-the-law/
Politicians, financial experts, economists and everyday workers all talk about it – the tax bracket. A tax bracket includes a rate that is used to calculate the tax on your income, but this information can be a bit misleading. The bracket assigned to your income is not the rate that’s applied to all your earnings. Some of your income will be taxed at lower rates, too. To satisfy your inquiring mind, the IRS publishes tax rate schedules to give you a general idea of your tax bracket. Convert your salary to an annual figure. In most cases, your gross salary should be the same every pay period. Subtract any pre-tax deductions from your gross salary, such as health insurance premiums or 401(k) contributions you elect your employer to withhold. The result is your net taxable income. Multiply this amount by the number of paychecks you receive during the year. The result is your annual taxable salary. Calculate your monthly commission. This step may be a tricky, because you’ll have to average your commission payments. Gather your commission payment information from several recent months and add the figures together. Divide the result by the number of months in your calculation to determine your average monthly commission. Multiply the result by 12. This is your average annual commission. Combine your annual salary and annual commission amounts. The result is your estimated adjusted gross income. Determine your filing status for the tax year. This is the status you’ll claim on your tax return, which might not be the same status you claim for the tax withheld from your pay. Look at the deduction rate for your filing status. Go to the irs.gov website and download the current Form 1040. Filing status deductions are shown in the left margin of page 2. These amounts may change on the next Form 1040, but you’ll have a good idea of what to expect. Look at the personal exemption rate on page 2 of the Form 1040. This rate is shown near the filing status deductions. Multiply the rate by the number of people you’ll claim on the tax return. You and a spouse are each allowed one exemption. If you’re eligible to claim any dependents, you’ll also receive personal exemption for each dependent. Subtract your filing status and personal exemption amounts from your adjusted gross income. The result is your taxable income. Look up the current tax table rates on the irs.gov website. Type “Tax Rates” in the website search field to quickly access the table. Scroll down to the “Tax Rate Schedules.” These show you the actual tax rate percentage that applies to your income. Locate the schedule for your filing status and find your income range. The percentage is shown is your tax bracket rate. Depending on your income, you may have more than one tax rate assigned. A portion of your income is taxed at the rate below your income range, and the rest is taxed in the regular bracket for your income. Tip - If you're married and file a joint return, include your spouse's salary in your calculations. This will give you a better idea of the tax bracket that applies to your household earnings, which is the bracket that will be used when you file your return.
https://budgeting.thenest.com/determine-tax-bracket-salary-plus-monthly-commission-23173.html
The pre-engineering study project for a high-efficiency power plant with a live steam temperature of 700 °C (Power Plant 700) represents the first stage for the construction of a low-emission power plant, which is to be erected once its technical and economic feasibility has been confirmed. Vattenfall Europe Mining & Generation AG & Co. KG, Germany. In the context of the study, the European energy utilities involved will determine viable technical and economic decision-making principles for power plants with a live steam condition of 700 °C. The project is thus directly linked to the COMTES700 test facility realized with financial aid from the European Commission (Research Fund for Coal and Steel, Contract-No. RFC-CP-04003). COMTES700 is the world’s first test facility for the production of live steam at a temperature of 700 °C. The test facility has been operating successfully in Scholven/Gelsenkirchen (Germany) since July 2005. To determine in good time whether the 700 °C technology offers an economical option for power plants to be built in the future, it is necessary to examine in detail the technical and economic possibilities for realizing this high-efficiency power plant technology in the pre-engineering study that forms the basis for this project. The technological further development of fossil-fired power plants, with a marked increase in efficiency levels to around 50 %, is at the forefront of this initiative. In the phase of power plant renewal in the medium term, i. e. in the years from around 2015 to 2020, it could thus be ensured if the project is concluded successfully that the European CO2 reduction targets can be achieved by means of efficient, economically viable power plant solutions. A reduction in specific CO2 emissions per MWh generated of around 25 % compared to power plants currently in operation (mean efficiency 38 %) is associated with 700 °C technology. The proportional reduction in the fuel mass flow used can also partly offset rising fuel prices. The competitiveness of the European energy industry and also of the capital goods industry that is to be supplied with electricity and process heat can thus be stabilized. In the long term, i. e. in the new construction period after 2020, the realization and safe operation of a power plant using 700 °C technology represents together with other technologies like Oxyfuel and IGCC an essential prerequisite for flushing CO2 economically out of the flue gases and transferring it to suitable deposits. Currently existing fossil-fired power plants, with a mean efficiency level of around 38 %, are entirely unsuitable for operation incorporating CO2 flue gas scrubbing if considered from the point of view of handling fossil primary energy carriers responsibly. The reduction in efficiency level of around 12 percentage points caused by CO2 flue gas scrubbing would result in the fuel mass flow supplied to the power plant having to be increased by approx. 46 % to generate the same power. As well as increasing the consumption of fossil fuels, flue gas scrubbing would mean that substantially more CO2 would have to be separated and stored. European power plant operators and plant manufacturers will produce the pre-engineering study jointly. VGB in conjunction with its European project partners will specify the technical and economic determinants. To this end, the integration of the PP700 joint project into the European EMAX project is envisaged. The EMAX power plant initiative aims to foster coal as a more reliable, economic and environmentally friendly process of power generation in the European Union. The conventional plant engineering and the overall power plant concept are planned in this case primarily by specialist departments of the power plant operators. The innovative features such as steam generators, steam turbines and other critical plant components subject to high temperature are to be handled by specialist companies that have the relevant know-how in the field of high-temperature engineering. The relevant European plant manufacturers and component suppliers are being integrated into the project as subcontractors for this purpose. An in-depth exchange of information between all parties involved is guaranteed by the creation of various specialist groups, to which the EMAX partners can delegate their experts as required. This procedure is intended to ensure that the power generators, as potential investors in 700 °C power plants, are provided with sufficient information by the manufacturers, in particular about the innovative components that carry high risks, to be able to make further decisions on the construction of a 700 °C installation. In the first project stage, the basic feasibility of a demonstration plant with a live steam condition of 700 °C is to be examined. To limit the financial risk for a subsequent investor or group of investors, the size of the facility should be roughly 500 MW. Cost savings that normally result for larger facilities of this kind due to degression of the specific plant costs (euros/kW) are to be dispensed for reasons of the risk for the demonstration plant concept. It is expected that the electricity producing costs of this facility will lie above the market value. In the second project stage, it is to be examined whether the 700 °C technology can also be realized for a commercially operated hard coal plant. The results of these studies are of great importance for the first project stage too (construction of a demonstration plant). If a large plant to be operated under commercial conditions cannot be realized, then the construction of a smaller demonstration facility does not make any sense either. The reverse procedure, consisting of pre-engineering for a large facility and subsequent “downscaling” to a smaller plant, was deliberately rejected, as this method would mean that no detailed findings regarding the demonstration plant size would be available at the end of 2007. Due to the detailed studies that would then still be required for a 500 MW demonstration plant, no realization of the demonstration plant in the course of the 7th Framework Programme for Research of the European Union would be able to be implemented in time. In the third project stage, it is to be examined whether the 700 °C technology can also be realized for a commercially operated brown coal plant. It is of particular significance here whether the lower combustion temperatures in steam generators fired by brown coal and the lower temperature gradients between flue gas and bundle heating surfaces associated with this result in dimensions for the steam generator that are still economical. The project is funded by the German federal state North Rhine-Westphalia in the scope of the State Initiative Future Energies NRW (Landesinitiative Zukunftsenergien NRW) from the programme Efficient Use of Energies and Use of Unexhaustible Energy Sources (Rationelle Energieverwendung und Nutzung unerschöpflicher Energiequellen). The European Union is co-financing the project from the European Regional Development Fund.
https://www.vgb.org/en/research_project297.html
“If the land mechanism as a whole is good then every part is good, whether we understand it or not…To keep every cog and wheel is the first precaution of intelligent tinkering.” Aldo Leopold, Round River. If you think about nature and how it works, you will likely conclude that everything in your sphere connects in some way. Almost everyone has planted a seed, watched it germinate, grow, mature, maybe fruit, and die. That simple act demonstrates how a system works. The linkages are deep and interconnected from beginning to end. All life depends on connections. That seed requires environmental inputs - light, water, nutrients. Take away any input and it stretches or challenges the system and may result in failure. With increasing complexity, nature depends on living and non-living inputs. Living soil supports plants, plants support insects, insects support birds - on and on. Some parts of nature are specific, lose one connection and the system fails. Fortunately, most natural systems have redundancies, but as we lose pieces, how it works becomes more fragile. The Leopold quote portrays nature as a very complex system of which we are a part - we depend on it all. Evidence is building that climate change is affecting how natural systems will or will not continue to function. These changes involve rising temperatures, shifting rainfall amounts, intensity, or seasonality, earlier springs, and any number of observed or measured measures. There is a tendency to confuse weather and climate. Weather is what we experience day to day, week to week, and season to season. Overtime, weather patterns sum to provide data that represents the climate. While linked, weather and climate are similar, but tell represent very different things. As climate shifts, natural cycles and processes respond. Because weather is not consistent from year to year, the living parts of natural systems, have the capacity to deal with variation. How nature deals with these shifts is pretty amazing. Nearly all systems have the capacity to flex and absorb change. Individual diversity within species and across species ensures that natural systems tolerate variation and can, over time, recover from individual events; however, if to function requires too much flexing, natural linkages fatigue and break. Ecological systems have built in synchronization, which suggests there is a natural flow and order. Examples of this are plant germination and leaf color change in the fall. The climate goes through cycles and plants adapt to change and vary their life pattern. The same thing happens with insects, fungi, and amphibians. Probably some of the most obvious and expected examples are specific bird species from overwintering in Central and South American that return to Pennsylvania to breed. If they show up too early, plants and insects may not be ready to support them. About 100 years ago, C.S. Elton (1924) published a paper that described a now well-known study of ecological synchrony based on the prey and predator relationship between snowshoe hare and lynx. He proposed that this relationship depended on some environmental event that affected hare populations over large geographic regions. That is, something happens that encourages changes in forest conditions which improves conditions that increase hare populations that subsequently over time increase lynx numbers. Later P.A.P. Moran (1953) evaluated this same data to build a simple mathematical model that basically described how the hare and lynx population changes correlated with weather or other environmental conditions synchronized across separated populations. His model suggested that two widely separated populations should experience synchronized relationships as long as the environmental influence was directionally similar - up or down. This idea has in the past few years come under increased examination as climate change has emerged as a challenge. Unfortunately, only recently have ecologists begun to study how environment is affecting migration and the answers are not simple as there are many variables to understand and consider. Nonetheless, what happens as climate changes? In the case of species fixed in place, for example trees, they can respond to climate changes; however, there are obviously limits to their ability to adapt, especially if the rate of climate change is faster than their ability to adjust genetically. Ecologists have already started to study and publish papers on tree species migration and some have encouraged human assisted migration - introducing species from warmer areas to places where climate is warming. Temperature is only one variable, what about rainfall, seasonal light levels, soils - some parts of the system may limit adaptability. Migrating species often have relatively high fidelity to places as they return to the same place year after year. As conditions change locally and across larger regions, local extinctions will occur, especially as preferred plant species, insects, or other needs are no longer available. Sometimes the loss is the result of compounding interactions exacerbated by climate and other human-caused changes such as farming, forest fragmentation, chemicals, non-native plant introduction, loss of insects. In the end, a species change may not be just one thing, it might well be the result of cascading events. Recently the National Audubon Society released an article about hummingbird migration. Almost anyone who has seen a ruby-throated hummingbird has soft spot for them as they amazingly return across the Gulf of Mexico to breed in the Northeast. Early migrants arrive on our Gulf Coast in early March and start to move north over the next two months. "Climate change is affecting the migration of Ruby-throats, though. As conditions warm on the wintering grounds, data indicate that they leave their winter homes earlier on their way to the Gulf Coast." If these birds leave too early for their trip north, how resilient can they be? If you have concerns relating to nature and changing climate, what can you do? Of course, you can make individual decisions about life choices. You can become involved in citizen science efforts collecting local data focusing on phenology - the study of cyclic and seasonal natural phenomena. Finding opportunities to help in this regard is as simple as Googling "Citizen Science and Climate Change." Keep your own phenological records of the seasonal change around you. Make comparisons year after year. Track when species are showing up, buds breaking, flowers appearing. It's a useful tool to understand change on your own property.
https://ecosystems.psu.edu/research/centers/private-forests/news/ecological-synchrony-keeping-all-the-pieces-in-place
A community development corporation (CDC) is equally a part of the community development process. Its usage is as common as CBOs and they do have a similar role. Their involvement with community development warrants a further look into CDCs in order to provide information to those who need it. This article will discuss CDCs and their relation to community development. Topics will include their legal standing, their similarities and differences with CBOs, and what purpose(s) a community may have for them. Information on active CDCs in the U.S. and abroad will also be available. What Are CDCs? Community development corporations, or CDCs, are institutionalized non-profits designed to assist communities in any kind of improvement efforts.1 As a corporation, they tend to have a wider range of services that they can offer to a wider audience. To some degree, CDCs act more like a regular business than a typical non-profit due to the scope of the services they offer and how those services are managed. Many CDCs are associated with government agencies and will work in tandem with them, but they themselves are not government-operated. The prevalence of individual CDCs has decreased in recent years. It was estimated that there were 4,600 CDCs operating nationally as of 2006, with no clear numbers as to how many were active solely on the state level.2 Each CDC can have multiple businesses and services under their control, so their reach may be more than what one may expect from only 4,600 operations. Experts state that CDC services are still in high demand due to the economic difficulties in the last decade or so, despite a more accurate count not being conducted since 2006. CDCs were the byproduct of the Civil Rights movement and Special Impact Program amendment to the Economic Opportunity Act of 1964.3 The act itself was one of the first federal community development movements since Franklin D. Roosevelt's New Deal of the 1930s, and was specifically designed as an attempt to curb poverty and the issues associated with it. Many CDCs in the early days doubled as activism groups in addition to focusing on community development; the activism interest is still a part of some CDCs to some degree, but it has largely died out. Operationally, many CDCs have a demographic focus rather than a location-specified base. This means that a single CDC is most likely going to operate in multiple communities that are similar to one another in particular aspects. They will still work to generate improvements in a community or communities, but their efforts will be more directed towards their particular area of interest(s). An example would be a CDC focusing on poverty-stricken families with young children in urban environments. Improvements in those demographics will still use the facets of community development as they are applicable to their efforts.4 Their Legal Standing CDCs are legally classified as 501(c)(3) non-profit organizations and are licensed as such by the federal government.6 That status also identifies them by another name, economic development organizations-which is much more applicable as they tend to not be isolated to a particular community.7 Like any other non-profit organization, this means that they have tax-exempt status and will not have to pay federal taxes in accordance with the law. The formation of a CDC will follow the same steps that a standard non-profit would, as it doesn't have any specialized classifications that make it a separate operation type.8 The only legal variations that there would be in the creation process would be if there are any extra state requirements or regulations. As a non-profit, CDCs have all the protections and regulations afforded to them that any other non-profit organization would have. This means that they have to meet all of the requirements for their creation and the must adhere to any and all state and federal laws applicable to non-profits.9 Failure to do so can cost a CDC it's non-profit status and cause it to face repercussions for its actions. Since most CDCs operate in multiple states at once, there may be rules that apply to one branch but not another based on where they are located. Before a CDC registers to operate or fundraise in a state, they should thoroughly research what requirements there are before officially setting up operations. Do Communities Need A CDC For Community Development? Like with CBOs, CDCs are not a requirement for community development, but rather an option available should the community need it. Communities that want to use a CDC have the option to enlist the services of one that is already formed or create their own if they are so inclined. As many who use the services offered by CDCs, deciding to use one depends on what services are available and what the community needs. Finding a CDC, if a community chooses to do so, depends on what is in the area and what area of focus the CDC has. Remember: CDCs often focus their efforts on specific demographics rather than the whole of the community. Just because there is one operating in the area does not mean its services are going to be applicable to what the community wants or needs. Communities that are actively going through the community development process may be approached by organizations like CDCs that offer assistance. They operate independently so there is a possibility of unsolicited assistance depending on the circumstances. In some cases where a community is not actively engaging in the community development process-whether by their choice not to or their inability to do for whatever reason-a CDC can still offer its services to community members. Most of them are going to be on the look-out for areas where their services are needed the most, even if the community itself is not doing anything to address problems. There is also the possibility that community members may seek out services that are associated with a particular CDC but not be aware of it. Many CDCs have other organizations and businesses that they offer their services through, whether it's through a partnership with that particular organization or because they own the business. In that regard, communities should do some research on what is available to them in their area before they seek out the assistance of a CDC. National And International CDCs There are quite a few options available when it comes to CDCs. In addition to the 4,600 nationally operating CDCs in the U.S., there are also international ones that also act domestically in addition to their efforts abroad. In the years since the last count was made of active CDCs, there may be hundreds, if not thousands more currently operating in the country. There is also the possibility of state and local level CDCs that may be available to communities in their operational jurisdictions; a simple internet search of local community development groups will usually turn up some results. There is also the possibility of membership with many of these CDCs, which provides access to certain resources and information that isn't necessarily available publically. Membership requirements are going to vary from group to group, so it's best to check out the rules before submitting an application. Some of the more well-known and established CDCs, both national and international, include:
https://www.universalclass.com/articles/business/community-development-relationships-to-corporations-cdcs.htm
By Norman Cohn During this engrossing booklet, the writer of the vintage paintings The Pursuit of the Millennium investigates the origins of apocalyptic religion - the assumption in an ideal destiny, whilst the forces of excellent are positive over the forces of evil. Norman Cohn takes us again thousand years to the realm perspectives of historic Egypt, Mesopotamia, and India, the suggestions of Iranian and Jewish prophets and sages, and the earliest Christian imaginings of heaven in the world, and he illuminates a massive turning aspect within the background of human recognition. For this moment, corrected variation, the ultimate bankruptcy, on Zoroastrians, Jews and Christians, has been absolutely rewritten and prolonged. Read or Download Cosmos, Chaos, and the World to Come: The Ancient Roots of Apocalyptic Faith PDF Best comparative religion books Ancient Pagan and Modern Christian Symbolism with an Essay on Baal Worship, on the Assyrian Sacred Grove and other Allied Symbols 1915. Christians consider that they have got a divine monopoly on fact. they don't. This booklet irrefutably indicates how a lot of Christianity's symbols are from a ways previous ''pagan'' resources. This ebook doesn't disparage Christianity yet presents a connecting hyperlink for what has been a continual resource of symbolic wisdom passed all the way down to us from the ancients. Passing on the Faith: Transforming Traditions for the Next Generation of Jews, Christians, and Muslims (Abrahamic Dialogues) From the start, the Abrahamic faiths-Judaism, Christianity, and Islam-have under pressure the significance of transmitting non secular id from one iteration to the subsequent. at the present time, that maintaining project hasn't ever been extra challenged. Will teenagers have a religion to lead them? How can religion traditions anchor spiritual attachments during this secular, skeptical tradition? Abraham, the Nations, and the Hagarites: Jewish, Christian, and Islamic Perspectives on Kinship With Abraham (Themes in Biblical Narrative) Jews, Christians and Muslims describe their origins with shut connection with the narrative of Abraham, together with the complicated tale of Abraham's relation to Hagar. This quantity sketches the heritage of interpretation of a few of the foremost passages during this narrative, no longer least the verses which country that during Abraham all of the international locations of the earth might be blessed. From Temple to Meeting House: The Phenomenology and Theology of Places of Worship Publication via Turner, Harold W. - Meditations of a Buddhist Skeptic: A Manifesto for the Mind Sciences and Contemplative Practice - The World's Parliament of Religions: The East West Encounter, Chicago, 1893 (Religion in North America) - The State: Past, Present, Future - Atheism Remix: A Christian Confronts the New Atheists - The Universe Next Door - Fundamentalism: Prophecy and Protest in an Age of Globalization Extra resources for Cosmos, Chaos, and the World to Come: The Ancient Roots of Apocalyptic Faith Sample text Temples and temple cult were there to ensure that collaboration was sustained, that cosmos was ceaselessly defended against the forces of chaos. A Near Eastern temple was in no way comparable with a Greek temple or a Christian church. It was not a place where believers congregated to worship, indeed the interior was not even accessible to ordinary folk. It was a place of mystery, where priests performed complicated rituals in the presence of the god alone. Moreover, an Egyptian temple was itself an embodiment of cosmos. Long before there were any human beings, they inhabited the world they had shaped. It was not human beings but gods who invented irrigation and agriculture, and they invented them to meet their own requirements. Moreover, in the beginning all the gods except the four highest worked at constructing and maintaining the canals and at sowing and harvesting. It was only because they grew tired of these exacting labours and downed tools that An created mankind at all. Everyone recognised that the one essential function of human beings was to relieve the gods of their chores. In every way the well-being of the kingdom depended on the king. The king was referred to as 'he who maintains the life of the country'. The presence of a devout king on the throne was felt to guarantee that the cycle of the seasons would proceed smoothly, that the crops would ripen on time and would be abundant, that the generations would succeed one another without interruption. But always it was the gods who prescribed the king's duties and granted him his powers. Thus Lipit-Eshtar (1934-24) had been chosen by the gods An, Enlil and Ninlil to ensure that there would be plenty of cereals, thus Enlil had appointed Iddin-Dagan (1974- 1954) to ensure that the people would have all the food and sweet water they needed.
http://www.mrchc.org.au/download/cosmos-chaos-and-the-world-to-come-the-ancient-roots-of-apocalyptic-faith
The mission of the Office of Communication, Events and Alumni is to mediate access to the university and to act as a conduit between the university and the public at large. We are interlocutors for both journalists and the university body alike. We serve the Office of the President. Target group oriented and media-specific We integrate strategic public and media relations measures into a dedicated concept that serves to support the stated goals of our university. We develop and implement these measures in a target group oriented and media specific manner. We offer a range of target group oriented and conventional media communication services. We also compile various publications and provide a wide range of services including public relations, event management, internet PR and corporate design. In real terms this means: we issue more than 300 press releases each year, thus providing the media with the most up-to-date information about our university. The Office of Communication, Events and Alumni assumes the core responsibility for crafting the university's extensive internet presence; this online service provides both university community and the general public with a broad range of information about our university. We purposely customize this information to meet the needs of various target groups, i.e. prospective students, the student body, university employees, industry, the media and alumni. Our office manages the university's National Alumni Program. We are also responsible for the conception and organization of two major events that are held regularly at the TU Berlin: Conventional press and media services - Press releases - Arranging press conferences/briefings - Responding to enquiries from journalists - Arranging meetings and interviews with experts - Maintaining database and mailing lists, as well as feeding scientific information services (idw) - Internal media consultancy services - Press review services and monitoring of media feed-back - Photo service Strategic Public Relations - Internal and external public relations consultancy - Implementation of PR workshops for scientists - Consultancy services in communicating science and research issues to target groups Target-group oriented publishing concept - University newspaper "TU intern" - Science magazine "Forschung Aktuell" (topical research) - Alumni magazine "parTU" - Image brochure and flyers - TU supplements in Berlin's daily newspaper "Der Tagesspiegel" - Event calendar - Various information flyers Internet PR - Online presentation of main publications - Online media services - Digital photo gallery - Supervision of CMS TYPO3 and Corporate Design National Alumni Program of the TU Berlin Since 1999, the TU Berlin's National Alumni Program has been helping to open doors for our graduates and former employees residing in Germany. This program maintains contacts between nearly 16,000 alumni and the university where they studied or worked. ContactAlumni Team Tel.: +49 (0)30 314-27650 Contact www.alumni.tu-berlin.de Event Management The Information Office is responsible for conceptualizing and organizing two major events that take place at the TU Berlin each year: - Long Night of Science Once every year, scientists at the TU Berlin transform the night into a thrilling demonstration of scientific experimentation. Till well past midnight they present fascinating aspects from more than 200 ongoing scientific projects. http://www.lndw.tu-berlin.de - First Semester Day Science Show Where else can you see sand fish skinks on stage, have a look into space or take a 3-D flight over Mars? At the beginning of each winter semester a science show is held to welcome incoming students to the TU Berlin. http://www.tu-berlin.de/index.php?id=7811 Zusatzinformationen / Extras Quick Access:
https://www.pressestelle.tu-berlin.de/menue/about_us/mission/parameter/en/font4/maxhilfe/
Madhubani painting is one of many famous Indian art forms. As practiced in the Mithila region of Bihar and Nepal, it is called Mithila or Madhubani art. Often characterized by complex geometric patterns, these paintings are known to represent ritual materials for special occasions including festivals, religious rituals. The colors used in Madhubani paintings are usually derived from trees – plants and other natural sources.These colors are often bright and are used to make black and brown colors such as lamblek and ocher respectively. Instead of contemporary brushes, twigs, matches and even fingers are used to make the painting. Madhubani painting originated in the Mithila region of Bihar. Some early references to Madhubani painting can be found in the Hindu epic Ramayana when King Janaka, Sita’s father, asks his painters to make Madhubani paintings for their daughter’s wedding. Knowledge was passed down from generation to generation and the houses of the area came to be painted. The women of the village used to practice these paintings on the walls of their homes. Her paintings often depicted her thoughts, hopes and dreams. Over time, Madhubani painting became part of special events such as festivals and weddings. Gradually, this art attracted art connoisseurs as many contemporary Indian artists took the art to the global stage. The traditional base of the plastered clay wall was soon replaced with handmade paper, cloth and canvas. Since the paintings are confined to a limited geographical range, this is more or less the theme as well as the style. Easy Madhubani Painting Before starting with any type of creative activity, the first thing we need is the materials to use. Even though authentically Madhubani painting is done on a wall or a particular type of fabric with thin bamboo sticks and brushes and colors made from natural resources like turmeric, sandalwood, contemporary times have brought some change. One can simply draw them on a regular cloth with handmade paper or paint brushes and markers or posters or acrylic colors. The first and foremost thing to do when starting with Madhubani is to choose a design. Despite the fact that Madhubani paintings are full of intricate patterns, it has been suggested for beginners to choose from the simplest of Madhubani designs. The next step would be to take a handmade paper or a thick wide sheet and trace the pattern of the chosen design using carbon paper. To begin with painting, it is always better to start with boundaries and then move towards the central character of the painting. After this is done, one can start filling in the blanks that remain. Madhubani is the description of all, so it becomes important to use different patterns to fill all the blanks. This may sound like a tedious task, but the fact that there are no rules for the patterns we have prepared makes the task enjoyable. When the detailing is done, it is time to fill it with colors. When choosing one of the styles, the choice of color changes. For example, bharni is about vivacity while in the kachni style, the use of colors is minimal. Bright colors are used a lot. Such as dark red, green, blue and black. Some lighter colors have also been enhanced in the photo, such as yellow, pink and lemon. It would be surprising to know that these colors are made from household things, such as turmeric, banana leaves, peel bark are used for red. And milk. Apart from murals, Alpaca is also popular in Bihar. It is made outside the meeting or door. Earlier it was made so that the yield of the crop in the fields is good, but nowadays it is made in the auspicious works of the house. Matchstick sticks and bamboo pens are used to make pictures. The gum of the acacia tree is mixed to create a color grip. Over time, the meaning behind making Madhubani paintings has also changed, but the art itself is so much that it is still a favorite choice among art lovers. Is one of Some important features of Madhubani paintings include religious themes, depictions of Hindu deities and motifs inspired by nature such as sun, moon, flowers, fish, bamboo etc. The above motifs form very important parts of Madhubani paintings. , And they have symbolic meanings, thus one, just a little creativity can use them to improve their painting. Madhubani Painting Images Madhubani Bihar Madhubani is a municipality and the headquarters of Madhubani district. Madhubani is located in the state of Bihar, India. It comes under Darbhanga Division. It is situated 26 km northeast of Darbhanga city and was part of the erstwhile ‘Betia Raj’. Madhuban Raj was built in Madhubani. Madhubani District This district was formed after the partition of Darbhanga district in 1972. Madhubani painting is a major painting of Mithilanchal region such as Darbhanga in Bihar, Madhubani and some areas of Nepal. Initially, after being in the form of Rangoli, this art gradually descended into modern forms on cloth, walls and paper. Madhubani Pin Code Pin Code: 847211, List of Post Offices, MADHUBANI, BIHAR Pincode Search, Post Office Details, All India Post Office Data. Madhubani Madhubani painting is one of the most famous arts in India and abroad. This painting style is still used in some parts of Bihar, especially Mithila. Since the style of this painting originated in the Mithila region, it is also known as Mithila paintings.In this way, Madhubani painting is special in the whole world.
https://shivatechnical.com/madhubani-painting/
Active volcanoes don't usually seem like valuable real estate. If the looming risk of eruption isn't scary enough, there's the intense heat, sloshing lava and acidic gases, all rising from a murky moonscape that offers few, if any, signs of life. Ecosystems can emerge in surprising places, though, if a few brave pioneers lay the foundation. And at one caldera in Nicaragua, scientists have discovered an amazing new example: hundreds of bees living on the lip of an active volcano, getting almost all their food from a single wildflower species adapted to volcanic acid rain. The bees are Anthophora squammulosa, a solitary, ground-nesting species native to North and Central America. Led by ecologist Hilary Erenler from the University of Northampton in the U.K., the study's authors found the bees nesting "within meters of an active volcanic crater," they write in the journal Pan-Pacific Entomologist. Female bees dig tunnels into volcanic ash to lay their eggs — a habitat so inhospitable the study describes the insects as extremophiles. "The nest location is exposed to continuous, strongly acidic gas emissions," according to Erenler and her co-authors, "and sporadic vent-clearing episodes that blanket the surrounding area with ash and tephra." The volcano is Masaya, a 635-meter (2,083-foot) shield volcano known for frequent eruptions. Researchers found the bees nesting in volcanic ash by a crater named Santiago, which is "one of the world's strongest sources of sulfur dioxide" (SO2), they note in their study about the discovery. These gas plumes are highly acidic, they add, "creating a clearly defined 'kill zone' under which vegetation is either entirely suppressed or partly damaged, depending on proximity to the source." Masaya volcano is highly active, with about 20 eruptions recorded over the past century. (Photo: Jorge Mejía Peralta/Flickr) SO2 is known to cause a variety of problems for bees, they add, such as reduced foraging activity, slower development of larvae, lower survival of pupae and less longevity in adults. Around the Masaya bee nests, SO2 levels were detected ranging from 0.79 to 2.73 parts per million (ppm), but previous studies have shown damage to bees from SO2 levels as low as 0.28 ppm. The researchers don't know how A. squammulosa can live in this environment, where SO2 levels peak at 10 times that level, noting more research will be needed to reveal the bees' survival secrets. What do they eat? Since the bees live in Masaya's "kill zone," the researchers wanted to find out where they get nectar. They searched for any flowers within 725 meters (2,378 feet) of the nest area, trying to mimic the distance traveled by a foraging bee. They also looked for bees returning to their nests, capturing 10 and swabbing pollen from their legs. The flower search turned up 14 plant species, although the captured bees told a different story: Of all the pollen in those 10 samples, more than 99 percent came from a single wildflower species, Melanthera nivea. This hardy member of the daisy family ranges from the Southeastern U.S. to South America, and past research has revealed adaptations that help it tolerate volcanic acid rain. The bees seem to rely almost entirely on Melanthera nivea, also known as snow squarestem. (Photo: Dick Culbert/Flickr) Why do they live there? A. squammulosa wasn't known to nest in volcanic ash until now, nor was any species in its genus. In fact, the behavior has only been reported in a few other bees, and there's a key difference, the authors say. Previous reports of ash-nesting bees came from exposed roadsides in Guatemala, about 6 kilometers (3.7 miles) from the nearest volcanic vent. This population of A. squammulosa, on the other hand, nests just meters away from a gas-spewing crater in a volcanic kill zone. Of course, this habitat poses "several distinct challenges," the researchers write. They cite high SO2 levels as the main danger, but also note insects can be hurt by volcanic ash itself. A 1975 study of ash eruptions in Costa Rica showed that abrasive ash wore down insects' exoskeletons, while ingesting ash-contaminated pollen and nectar caused physical and chemical damage. An eruption could also wipe out the Masaya bees, either directly or by killing the plants that seem to be their only food source. Acidic gases from Masaya could be dangerous for bees, but may also help limit predators. (Photo: Hilary Erenler) But living by an active volcano has perks, too. Ground-nesting bees avoid nesting near plants with fast-growing roots, which can break up their underground tunnels, and seem to like habitats with sparse vegetation. "The warm open area on a relatively gentle slope with a distinct lack of vegetation and a loose substrate may provide ideal nesting conditions," the authors suggest. And while a few predators do prey on the bees, "their density and activity may also be impaired by the high levels of gas." The Masaya bees still have a dangerous lifestyle, but protection from natural predators would be a big advantage. And if volcanic gases can do that, maybe they offer other benefits, too? Bees may not live on Masaya to escape humans, but given the growing dangers we pose to bees around the world — via habitat loss, insecticide use and invasive species — they're lucky to live anywhere that scares us.
Swiss Re is one of the world’s leading providers of reinsurance, insurance and other forms of insurance-based risk transfer, working to make the world more resilient. We anticipate and manage a wide variety of risks, from natural catastrophes and climate change to cybercrime. At Swiss Re we combine experience with creative thinking and cutting-edge expertise to create new opportunities and solutions for our clients. This is possible thanks to the collaboration of more than 13,000 employees across the world. We offer a flexible working environment where curious and adaptable people thrive. Are you interested in joining us? About The Role We are opening this role for data scientists with strong interpersonal and technical skills who are eager to learn and broaden their knowledge and expertise within the fast growing field of financial data science. For this position we invite people with a PhD or Master degree with 3-5 years of professional experience to apply. In Particular, The Role Will Involve: - Generating business and investment insights through advanced analytical (statistical, machine learning and text mining) methods to answer business problems in Asset Management and potentially in different (Re-) Insurance domains. - Working closely with key members in Asset Management in identifying, analyzing and interpreting trends or patterns in complex financial data sets including but not limited to alternative data. - Current work stream of exposure might include the following: - Applying statistical and machine-learning methods for market and portfolio risk evaluation - Natural language processing techniques in a financial context - Traditional and alternative data analysis for investment opportunities identification - Development of asset management data corpus in close collaboration with the rest of the Swiss Re group You are an ideal candidate if you have a solid background in computer science/engineering, mathematics, statistics, physics or any other computationally intense subject area and possess working experience in at least one of the following domains: statistical and machine learning, natural language processing, deep learning and information visualization. In addition, academic or industry experience in asset management, quantitative finance, fixed income analytics is desired. Key Tasks: - Initiate, lead and drive financial data science projects from inception to completion. - Apply analytical methods and algorithms to build data products that streamline the process from data collection to insight generation. - Build up trusted relationships with key business and IT stakeholders to become a valuable partner for the field of data analytics. - Foster new data-driven approaches to generate business insights in order to address unanswered business problems that support investment decision making in a proactive way. - Validate, interpret and present data findings to both an expert and non-expert audience. - Assess viability of analytics usecases by means of functional prototypes or pilot solutions. - Ensure further development of Swiss Re's analytics capabilities in interplay with data engineers, solution architects and internal business specialists. About The Team With more than USD 120 bn of assets under management, Swiss Re Asset Management manages the assets generated through the core insurance and reinsurance business. The Smart Analytics team has a mission to prototype and deliver advanced analytics solutions using techniques ranging from statistical modelling to machine learning serving stakeholders across the Asset Management value chain. We are looking for passionate and driven individuals who wish to explore and apply the latest techniques in a financial context to support our investment process. About You Essentials - You have Master's or Ph.D. in a quantitative field: e.g., computer science, statistics, applied mathematics, physics, operational research, engineering. - 3-5 years of experience (in the industry or academic) in analytics (machine learning, statistics, data and text mining), preferably in a financial context (investment management, capital markets / investment banking, insurance). - Proficiency in Python and/or R, including the relevant statistical and machine learning packages. Knowledge of deep learning or distributed computation frameworks is a plus (Tensorflow, Pytorch, Spark). - Experience with writing neat and well documented code, using versioning tools (Git), unittests. - You have great analytical & conceptual skills to understand key business needs and design tailored solutions to solve specific business problems. - The willingness, ingenuity and business understanding of navigating through ambiguities, especially in prototyping process. - You are able to communicate complex analysis results in a clear, precise and meaningful manner. - A track-record in implementing business solutions in the area of information retrieval, natural language processing, data analytics and information visualization. Proficiency in relational databases/SQL. - Eager to try out new technologies. - Excellent verbal and written English skills. - Project management experience. Nice to Have - Familiarity with extraction, transformation and loading of data from a variety of data sources using SQL and other 'big data' technologies e.g. Elastic Stack (Search, Logstash, Kibana), Apache (Kafka), Azure Cognitive Services. - Knowledge in optimization of information retrieval with a focus on Search and Indexing is a plus. - Experience in building scalable data pipelines/data engineering. - Abilities in DevOps and mindset towards micro-services (Docker, Kubernetes). - Behavioural Competences - Great teammate with a ‘can do’ attitude. - Willing to travel, also on short notice (maximum 10% per year). - Ability to work in an interdisciplinary and multi-cultural environment. - High degree of flexibility, independent and proactive working style. - Ability to work well under pressure and on multiple and conflicting priorities. - Strong dedication to quality and timely customer service. We're looking forward to your application! We are an equal opportunity employer and value diversity at our company. We do not discriminate on the basis of race, religion, colour, national origin, gender, including gender identity or expression, sexual orientation, age, marital status, veteran status, or disability status. Swiss Re offers modern work models and attractive work places that allow all employees to adapt to changing work preferences and life phases. Keywords:
https://careers.swissre.com/job/Zurich-Zuri/667855101/
Sobaz Nigeria Limited, a top Petroleum Marketing and distribution company is recruiting suitably qualified candidates to fill the position below: Job Title: Audit Officer Location: Port Harcourt, Rivers Employment Type: Full-time Job Purpose - Responsible for planning and guaranteeing independent and objective assurance on the management of risk throughout the organisation. Key Responsibilities Audit Planning and Design: - Develop an annual audit plan using input from the team and stakeholders to identify priorities and resource requirements for the year. - Schedule and assign audits to team members, ensuring effective use of people resources. - Report to the Board of Directors at the required intervals on internal audit assignments including planned reviews, investigations, risk advisory work and all other duties assigned. - Develop the team’s engagement with and support of major business change programmes thus ensuring that appropriate consideration of risk and control is given to all change initiatives. Audit Review: - Oversee and provide quality control for the departments audit, to ensure departmental mandate and business goals are met and that professional standards are maintained at all times. - Plan and coordinate financial, regulatory, compliance and operational reviews. - Conduct regular financial risk assessment and identify controls in place to mitigate identified risk. - Perform audit procedures to test the reliability of established controls within the organisation. - Identify control gaps and opportunities for improvement. - Ensure corporate assets are safeguarded and accounted for at all times. Risk: Develop a risk register and include level of risk and proposed mitigants. People and Process Management: - Consistently develop and review of internal control policies and procedures. - Build relationships with leaders across the organisation to understand issues and identify areas for improvement for the organisation as a whole. - Develop new methodologies to improve the audit process, making it “easier” for the organisation to request audits and implement recommendations. - Keep abreast of developments in Corporate Governance and Risk Management practices and advise the business accordingly. - Provide assistance to the business in meeting regulatory requirements. - Manage and oversee team performance through performance planning, coaching and performance appraisals. - Handle performance issues, discipline as necessary and address poor standards, ensuring department targets and customer satisfaction is not compromised. Academic Qualifications and Skills - Advanced Degree MSc., MBA / PhD in Finance, Economics, Accounting or any related business degree. - Professional Qualifications / Membership to professional bodies. - Full membership of relevant professional bodies such as the Institute of Chartered Accountants of Nigeria ICAN, ACCA. - Must have 3-8 years work experience. Functional Skills: - MS Office proficiency. - Behavioural Competencies / Attributes - Excellent customer service skills. - Excellent, negotiation, communication, business. - Presentation and people management skills Salary N60,000 – N70,000 / Month How to Apply Interested and qualified candidates should send their CV to: or with the Job Title as the subject of the mail. For enquiry, Please call: 08165253190.
https://dailyjobsnigeria.com/jobs/audit-officer-at-sobaz-nigeria-limited/
As an interdisciplinary field of science, bioinformatics combines biology , computer science , information engineering , mathematics and statistics to analyze and interpret the biological data. Bioinformatics has been used for in silico analyses of biological queries using mathematical and statistical techniques. Use of this Web site signifies your agreement to the terms and conditions. Special Issues. Contact Us. Change code. Computational Biology and Bioinformatics. Propose a Special Issue. Advances in Biochemistry. Cell Biology. International Journal of Genetics and Genomics. European Journal of Biophysics. American Journal of Life Sciences. Agriculture, Forestry and Fisheries. International Journal of Psychological and Brain Sciences. Animal and Veterinary Sciences. Journal of Plant Sciences. Advances in Bioscience and Bioengineering. American Journal of Bioscience and Bioengineering. American Journal of Agriculture and Forestry. American Journal of BioScience. International Journal of Biomedical Materials Research. Ecology and Evolutionary Biology. International Journal of Agricultural Economics. Chemical and Biomolecular Engineering. Biochemistry and Molecular Biology. International Journal of Biomedical Science and Engineering. Biomedical Statistics and Informatics. Journal of Chemical, Environmental and Biological Engineering. International Journal of Animal Science and Technology. Journal of Diseases and Medicinal Plants. Journal of Drug Design and Medicinal Chemistry. International Journal of Pharmacy and Chemistry. International Journal of Applied Agricultural Sciences. European Journal of Clinical and Biomedical Sciences. Biomedical Sciences. American Journal of Chemical and Biochemical Engineering. American Journal of Biological and Environmental Statistics. Frontiers in Environmental Microbiology. Advances in Applied Physiology. International Journal of Microbiology and Biotechnology. International Journal of Ecotoxicology and Ecobiology. International Journal of Systems Engineering. Bioprocess Engineering. Industrial Engineering. Journal of Biomaterials. World Journal of Food Science and Technology. American Journal of Entomology. International Journal of Bioorganic Chemistry. International Journal of Photochemistry and Photobiology. American Journal of Plant Biology. International Journal of Food Science and Biotechnology. American Journal of Biomedical and Life Sciences. ISSN Print: Frequency: Semiyearly. ISSN Online: Latest Articles. PDF KB. Alemayehu Bekele, Tewodros Kumssa. Evgeny Bryndin. Computational Biology and Bioinformatics CBB aims to publish high quality, original research articles, expository tutorial papers and review papers as well as short, critical comments on technical issues associated with the analysis of computational biology and bioinformatics. The research papers will be technical presentations of new assertions, discoveries and tools, intended for a narrower specialist community. The tutorials, reviews and critical commentary will be targeted at a broader readership of biologists who are interested in using computers but are not knowledgeable about scientific computing, and equally, computer scientists who have an interest in biology but are not familiar with current thrusts nor the language of biology. The topics related to this journal include but are not limited to:. Join as an Editor-in-Chief. Open Access. Download Certificates. Recommend to Library. Tel: Download PDFs. It covers various aspects from cell biology to basic statistics and methods for biological data analysis. Worked examples illustrate how to employ data processing and analysis techniques, e. This site is like a library, you could find million book here by using search box in the header. Bioinformatics - Free download as Powerpoint Presentation. It can serve as an excellent supplement to a textbook used in bioinformatics or computational biology courses. Click Download for free ebooks. It is primarily intended as a textbook for engineering and computer science students attending advanced undergraduate and graduate courses in bioinformatics and computational biology. The book develops bioinformatics concepts from the ground up, starting with an introductory chapter on molecular biology and genetics. This chapter will enable physical science students to fully understand and appreciate the ultimate goals of applying the principles of information technology to challenges in biological data management, sequence analysis, and systems biology. The second part of the book covers methodologies for retrieving biological information, including fundamental algorithms for sequence comparison, scoring, and determining evolutionary distance. The main focus of the third part is on modeling biological sequences and patterns as Markov chains. It presents key principles for analyzing and searching for sequences of significant motifs and biomarkers. Sequence analysis, molecular medicine, systems biology, clinical genotyping, computational biology and bioinformatics, Genome Biol 5(10), R80 (). Introduction to Bioinformatics Lecture. Bulletin of Mathematical Biology. About the book. Export citations. The 9 revised full papers and 3 short papers were carefully reviewed and selected from 22 submissions. Use of this Web site signifies your agreement to the terms and conditions. Special Issues. Contact Us. Change code. Computational Biology and Bioinformatics. Summary: The intracellular environment of a cell hosts a wide variety of enzymatic reactions, diffusion events, molecular binding, polymerization and metabolic channeling. To transform these biological events into a computational framework, distinct modeling strategies are required. While currently no tool is capable of capturing all these events, progress is being made to create an integrated environment for the modeling community. To address this niche requirement, Cellware has been developed to offer a multi-algorithmic environment for modeling and simulating both deterministic and stochastic events in the cell. Oxford University Press is a department of the University of Oxford. Search this site. Home People Pantelis Bagos. Georgia Braliou. Katerina Pantavou. Margarita Theodoropoulou. Phylogenetics and Systems Biology · Front Matter Pages PDF · Introduction to Phylogenetic Reconstruction Gautam B. Singh Pages · Distance. PDF | On Jan 1, , Achuthsankar S Nair published Computational Biology & Bioinformatics: A Gentle Overview | Find, read and cite all the research you need.Nelson S. 29.05.2021 at 17:25 Genome-wide discovery of gene regulatory networks in the midgestation mouse placenta , Rebekah Starks.Daila T. 30.05.2021 at 17:22 PDF | On Jan 1, , G Camps-Valls and others published Bioinformatics and Computational Biology | Find, read and cite all the research you need on.Tazincaman1969 01.06.2021 at 11:46 Looking for a computational biology textbook ideally pdf self.
https://elizabethsid.org/and-pdf/2589-computational-biology-and-bioinformatics-pdf-878-100.php
Patagonia’s values reflect those of a business started by a band of climbers and surfers, and the minimalist style they promoted. The approach taken towards product design demonstrates a bias for simplicity and utility. For Patagonia, a love of wild and beautiful places demands participation in the fight to save them, and to help reverse the steep decline in the overall environmental health of our planet. They donate time, services and at least 1% of sales to hundreds of grassroots environmental groups all over the world who work to help reverse the tide. Patagonia aims to build the best product, cause no unnecessary harm, use business to inspire and implement solutions to the environmental crisis.
https://bcorporation.uk/directory/patagonia-inc
Through the years, and in fact, it has been centuries, farmers across the world have always had to bear the brunt of changing weather patterns. And these days, they are having to contend with the (negative) effects of El Nino, global warming and climate change. Shifting weather patterns, as never experienced before, has, to a large extent, had a negative effect on their ability to produce sustainable crops from one season to the next. So, just imagine, if it is challenging for industrial sized farming businesses to stay afloat, just how challenging it must be for the small-scale farmer. And indeed, it has been. Both in the US and in certain parts of Europe, big farming enterprises have enjoyed the lion’s share of government subsidies, or as one entrepreneurial-minded government leader likes to put it, government handouts or bailouts. Well, the world has more than its fair share of economically-minded presidents and prime ministers these days. And that is not a bad thing. In order for countries to remain healthy, they need to thrive economically. Most of them are not there yet. And my, how the farmers are struggling. While government bailouts have become necessary as a last resort prior to foreclosure notices being sent out, far more progressive and sustainable alternatives have been developed and are now widely available for purchase by small-scale farmers and pastoralists in the form of organic and biodegradable agricultural supplies for the purposes of crop cultivation and fermentation. While farms have collapsed previously, there has never been a more exciting time for small business entrepreneurs to enter the challenging environment of organic farming. One more exciting addition to the agricultural sector is that of aqua-farming, a necessary practice given that the oceans’ stocks are now at all-time historic lows.
http://www.timesuptees.com/category/agricultural-supplies/
These days we get a lot of spam phone calls from unknown numbers. Oftentimes, it can become necessary for us to check who exactly is calling us, and to do this, we would have to check who the number is registered. But finding someone’s personal phone number can be pretty tricky. The reason is phone numbers are entirely private, and public directories do not store them. But, there are still a few ways by which you may be able to find someone’s personal or business phone numbers by name. There are several reasons why someone wants to find a person’s phone number by name. You might be trying to find out about an old friend or associate. You might be trying to contact a family member with whom you have been out of touch for a long time. You might also be getting spam scam calls from certain numbers, and you wish to check if the numbers belong to certain people you suspect. In addition, you might be trying to do an investigation that requires you to check on someone’s phone number. Thus, there can be various reasons. Here you can find a complete guide on how to find someone’s phone number using name for free. Sound’s good? Let’s get started. How to Find Someone’s Phone Number by Name 1. Look at Their Social Media Profiles On the internet, there is no specific and perfect way to find somebody’s personal phone number by name. If you are friends with someone on Facebook, Instagram, or other social media sites, you can check and see if they have mentioned their contact information in their profiles. You may also try to ask them about their phone numbers. In case you are not friends with the person on Facebook or other social media sites, you can try to ask someone who knows them and then ask them. You can also use your mutual friends feature to provide you with their numbers. This advice might appear quite obvious, but it is extremely easy and quite effective in helping you acquire people’s phone numbers. All you need to do is check the About section and look for the Contact and Basic Information. You can check if they have provided their number under the Contact Information section. When you do not see this information mentioned here, you will have no other way to find the number out other than directly sending the person a message and requesting it. Certain social media platforms allow you to reverse lookup phone numbers quickly, but other platforms can be complex in this respect. Thus, if you cannot locate somebody’s phone number on social media websites, you can try to check for the person in online directories. But these directories cover only the landline numbers. 2. Online Directories If you know that the person whose number you want is part of some organization, group, or committee, then you can try to go to that organization’s website and look up the name. You can also check online directories in specific regions. There are also many premium web applications that store people’s numbers and data for analytical and marketing purposes. You can subscribe to these services and try to find the necessary cell phone numbers and such personal details. In case you cannot find someone’s number either on social media websites or in the online directories, then you will have to try harder to get the number. Such information is mostly kept private and guarded, and people do not like sharing their contact details online. You can also try to Google their phone numbers, but it is certain that you will not get any useful results. Conclusion: There are several ways by which you can try and find people’s phone numbers by name. You may look up their names on different social media websites. You may contact them directly through social media and ask for their number. For more emergency purposes, you can ask your mutual friends for contact information. Business phone numbers are easier to find than personal numbers. Also Read:
https://www.istaunch.com/find-someones-phone-number-by-name/
Impact of relational coordination on staff and patient outcomes in outpatient surgical clinics. Pressures are increasing for clinicians to provide high-quality, efficient care, leading to increased concerns about staff burnout. This study asks whether staff well-being can be achieved in ways that are also beneficial for the patient's experience of care. It explores whether relational coordination can contribute to both staff well-being and patient satisfaction in outpatient surgical clinics where time constraints paired with high needs for information transfer increase both the need for and the challenge of achieving timely and accurate communication. We studied relational coordination among surgeons, nurses, residents, administrators, technicians, and secretaries in 11 outpatient surgical clinics. Data were combined from a staff and a patient survey to conduct a cross-sectional study. Data were analyzed using ordinary least squares and random effects regression models. Relational coordination among all workgroups was significantly associated with staff outcomes, including job satisfaction, work engagement, and burnout. Relational coordination was also significantly associated with patients' satisfaction with staff and their overall visit, though the association between relational coordination and patients' satisfaction with their providers did not reach statistical significance. Even when patient-staff interactions are relatively brief, as in outpatient settings, high levels of relational coordination among interdependent workgroups contribute to positive outcomes for both staff and patients, and low levels tend to have the opposite effect. Clinical leaders can increase the expectation of positive outcomes for both staff and their patients by implementing interventions to strengthen relational coordination.
March 19 - Enchilada Casserole, 5:30-8:30pm Mexican food has a big influence on the Californian scene, particularly for vegetarians. For a fun and instructive evening, join Happy Girl chef, Suzanne, for an evening inspired by the flavors of Mexico. For this fiesta filled evening we will be making all of the ingredients for an enchilada casserole – handmade corn tortillas, creamy refried beans, roasted vegetables and house-made enchilada sauce. We will also be making a fresh salsa and a side salad. While we work together in the kitchen, we will share various cooking and prepping techniques that will be handy for you to use at home. Freshly back from a trip to Oaxaca City, Suzanne will share cooking tips that she learned and also highlight some of the local ingredients that she discovered. As always, we will be using the freshest, local, seasonal ingredients available to create a simple, nourishing and delicious meal made from scratch that all participants will be invited to take home with them. All participants will receive a packet of recipes from the evening. Please indicate any dietary restrictions when you sign up and we will accommodate when possible. Please book early; this event is going to be fun and lively! We anticipate that this long-awaited workshop will fill quickly. So, sign up early and get your spot saved. The workshop will be held at Happy Girl Kitchen location from 5:30-8:30 pm at 173 Central Avenue, Pacific Grove 93950.
https://happygirlkitchen.com/collections/workshops/products/july-6-mexican-fiesta-from-5-8pm-95
FIREBALL establishes a coordination mechanism through which a network of Smart Cities across Europe engages in long term collaboration for adopting User Driven Open Innovation to explore the opportunities of the Future Internet. The coordination process will be grounded in exchange, dialogue and learning between Smart Cities, who are considered as key demand-side drivers of Future Internet innovation. It also will be grounded in bringing together the Future Internet, Living Labs and Smart Cities constituencies. Now that Future Internet driven network infrastructures and applications are in the pipeline, and which potentially might bring economic and social benefits not only to research communities but also to Cities, it becomes all the more urgent to strengthen the role of Cities to elicit their future needs and requirements from the perspective of user driven open innovation. Identifying these needs and requirements elicitation also informs ongoing research, experimentation and deployment activities related to Future Internet and testbeds, and helps to establish a dialogue between the different communities to help form partnerships, and to assess social and economic benefits and discovery of migration paths at early stages. BonFIRE will support experiments exploring the interactions between novel service and network infrastructures. Three initial scenarios have been defined to highlight the general classes of experiment that can be supported by the facility. The scenarios include Extended cloud scenario: the extension of current cloud offerings towards a federated facility with heterogeneous virtualized resources and best-effort Internet interconnectivity. Cloud with emulated network implications: a controlled network environment by providing an experimental network emulation platform to service developers, where topology configuration and resource usage is under full control of the experimental researcher. Extended cloud with complex physical network implications: investigates federation mechanisms for an experimental cloud system that interconnects individual BonFIRE sites with Federica, Open Cirrus and Panlab. TEFIS (TEstbed for Future Internet Services) is a large-scale integrating project addressing the FP7 work programme objective ICT-2009.1.6: Experimental Facilities. It started in June 2010 and will run for 30 month including 10 partners from 7 countries. TEFIS will support Future Internet of Services Research by offering a single access point to different testing and experimental facilities for communities of software and business developers to test, experiment, and collaboratively elaborate knowledge. The project will develop an open platform to access heterogeneous and complementary experimental facilities addressing the full development lifecycle of innovative services with the appropriate tools and testing methodologies. Through the TEFIS platform users will be supported throughout the whole experiment lifecycle by access to different testing tools covering most of the software development-cycle activities such as software build and packaging, compliance tests, system integration, SLA dimensioning, large-scale deployment, and user evaluation of run-time services. The platform will provide the necessary services that will allow the management of underlying testbeds resources. In particular, it will handle generic resource management, resource access scheduling, software deployment, matching and identification of resources that can be activated, and measurement services for a variety of testbeds. The aim of WISEBED project is to provide a multi-level infrastracture of interconnected testbeds of largescale wireless sensor networks for research purposes, pursuing an interdisciplinary approach that integrates the aspects of hardware, software, algorithms, and data. This will demonstrate how heterogeneous small-scale devices and testbeds can be brought together to form well-organized, large-scale structures, rather than just some large network; it will allow research not only at a much larger scale, but also in different quality, due to heterogeneous structure and the ability to deal with dynamic scenarios, both in membership and location. For the interdisciplinary area of wireless sensor networks, establishing the foundations of distributed, interconnected testbeds for an integrated approach to hardware, software, algorithms, and data will allow a new quality of practical and theoretical collaboration, possibly marking a turning point from individual, hand-tailored solutions to large-scale, integrated ones. For this end, we will engage in implementing recent theoretical results on algorithms, mechanisms and protocols and transform them into software. We will apply the resulting code to the scrutiny of large-scale simulations and experiments, from which we expect to obtain valuable feedback and derive further requirements, orientations and inputs for the long-term research. We intend to make these distributed laboratories available to the European scientific community, so that other research groups will take advantage of the federated infrastructure. Overall, this means pushing the new paradigm of distributed, self-organizing structures to a different level.
http://smartsantander.eu/index.php/related-projects
Hello, I am looking for a solution to encode 16 video channels in MJPEG Do you provide this type of solution ? Thanks Hello Zanzibar, Multiple instances of the JPEG encoder can be used in an application, but ADI does not provide a multi-channel example for a motion-JPEG encoder. MIPS/memory requirements will depend on the system's required video resolution, the video data format, video frame rate, and desired quality of encoded video. To illustrate processor requirements, let's assume that black and white video (8 bit monochrome) at a resolution of 352 x 288 (CIF) needs to be encoded for each of the 16 channels. Let's also assume that the JPEG images are only encoded in sequential mode (which reduces memory requirements), and that a low-ish quality factor is used, say 40 (which reduces MIPS requirements). In terms of memory, the JPEG encoder spec sheet KT-571 says that code size is ~12 KiB, data tables is ~4 KiB, and ~2KiB per instance from dynamic memory. For 16 instances, this adds up to a total of: 12 + 4 + 16 * 2 = 48 KiB In addition, input/output buffers are required - each 352x288 monochrome video frame uses ~101 KiB, while for the compressed bit stream, if we assume a compression ratio of 10, then 10 KiB is needed for each frame per channel. Buffering just one input/output frame for each channel uses a total of 1.8 MiB In terms of MIPS, the spec sheet quotes performance figures for encoding images in YUV420 format where each pixel is represented by 12 bits of information. For monochrome format, we only have 8 bits of information for each video pixel, so an estimate of MIPS for encoding monochrome frames is 67% of that for YUV420 frames. At a quality factor of 40, the peak cycles per pixel (YUV420) is 65 when all code/data is in cached external memory. So peak number of cycles per frame per channel is 65 * 352 * 288 * 67/100 = 4.4 Mcycles. If we assume a frame rate of 15 fps, then the total peak MIPS usage is: 16 * 4.4 * 15 = 1060 MIPS The estimated MIPS and memory usage indicate that a BF561 is suitable where half the channels could be handled by one core, and the remaining channels handled by the other core.
https://ez.analog.com/thread/2142-mjpeg-solution
A-Z of Botany: Juvenile This post should have been in H really because the proper name for it is Heteroblasty but many garden plants are known for their juvenile growth or foliage. Well I say many but two are obvious and frequently grown in gardens: ivy and eucalyptus. Ivy is the most frequent so I will start with this native plant. It has two very distinct growth patterns with very different leaves. In its juvenile form ivy (Hedera helix) is a rambling plant that creeps along the soil. It has leaves that are deep green and usually three-lobed. Ivy is a very variable plant and there are countless variations in leaf shape and lots of variegated forms. Ivy is searching for light. The flowers are pollinated by insects and there is no point flowering in the shade on the woodland floor. So ivy finds something to climb up and when it gets into the light, at the top of its support, the plant changes entirely. Instead of wiry stems the growth becomes more rigid and upright, the leaves become simpler in shape and the end of every shoot carries a cluster of flowers, arranged in spheres. Quite how the plant knows how to do this is a bit of a mystery. If you take cuttings of the juvenile form they remain so and the same goes for the adult, fertile growth too. These cuttings of the adult form make attractive, shade tolerant shrubs although, in my experience, they sometimes produce some juvenile shoots too. A more extreme example, though no more remarkable, is seen in the New Zealand native, Pseudopanax ferox, also in the ivy family (Araliaceae). In its early stage the single upright stem has long, linear leaves, tough and edged in spines almost like a saw and stiffly down-pointed so that nothing could climb it. Then, when it gets to about 2m high the growth changes as it branches and the leaves become digitate, like the related scheffleras. It is thought, and it makes sense, that this is to prevent being grazed by Moas, there being no other tall herbivore in New Zealand. Many acacias have a similar habit, producing pinnate leaves at first and then simple foliage. But back to gardens, there are eucalyptus. In their juvenile forms they have thin-textured, blue-grey leaves in pairs up the stems and the growth is distinctly upright. At this stage they never bloom. After a few years the growth changes and the leaves become sickle-shaped, hang on long petioles from the stems and are usually greener. If the plants are cut back into the juvenile growth, more juvenile growth is produced and that is what we tend to do with E. gunnii, to keep up production of attractive, grey juvenile growth. From personal observations I have seen the same thing in Pinus canariensis, a tree that grows on most of the Canary Islands. In the juvenile stage the leaves are short, singly arranged and greyish in colour. As the seedlings get older the leaves become much longer and in clusters of three. Once in the adult stage juvenile foliage is rarely produced unless the tree is damaged by fire but I have observed juvenile foliage growing from the bark of seemingly healthy trees. I am not sure why there is this difference but it could be that the grey foliage of the young plants resembles that of grey-leaved artemisias and other scrubby plants that may be unpalatable. As we approach Christmas, it reminds me that you often see small ‘Christmas trees’ in pots for sale, about 20cm high, covered in fake snow. I am sure these are Pinus canariensis seedlings though I believe that Pinus pinea, the stone pine does similar things and it could be seedlings of that instead.
https://thebikinggardener.com/2016/10/23/a-z-of-botany-juvenile/
The Blessing of Curses: A Rosh Hashanah Puzzle Here’s a puzzle for us to think about as we consider the spiritual work that we need to engage in over the remaining days until Yom Kippur: The Talmud tells us—in the name of Rabbi Shimon ben Elazar—that Ezra the Scribe decreed that, for all time, the Jewish people would read the blessings and curses in Leviticus (Parashat Behukkotai) prior to the holiday of Shavuot and those of Deuteronomy (Parashat Ki Tavo) before Rosh Hashanah (BT Megillah 31b). This decree is strange. Reading these graphic and threatening chapters, which detail the good that will come if we are faithful to God and the suffering that will be wrought if we forsake our relationship with God, is difficult at any time. Why insist that we read them publicly as we ready ourselves to celebrate these joyous holidays? In our present-day communities, where we finish the Torah every year, the section of Leviticus that includes the curses naturally falls before Shavuot. Parashat Ki Tavo in Deuteronomy—where Moshe again offers the blessings and curses to the Israelites before they enter into the Land—also naturally falls before Rosh Hashanah in the calendar. However, for the Jews of the Land of Israel, who in ancient times completed the Torah in three years, Ezra’s decree must have been quite jarring. Presumably, these communities would have had to take out a second Torah scroll and read the curses in addition to the parashah of the week on the Sabbaths before Rosh Hashanah and Shavuot. At any rate, Ezra’s mandate presents us with a question: Why did Ezra believe it was critical that the Jewish people read the blessings and curses before Rosh Hashanah? Asked differently, in what ways might hearing this section of the Torah be important for our spiritual work during this season? On the most visceral level, reading the blessings and curses at a time when we are focused on imagining new and nobler versions of ourselves and our communities highlights the stark consequences of our choices. If we make good choices, good things will happen. If we make poor choices—well, less good things await us. Our behavior and choices really do have consequences in the world. Using the liturgy to confront the darkness that is promised if we do not choose well may keep us on the right path. I think there is something to this, but I believe there is a richer and more meaningful connection between the blessings and curses and Rosh Hashanah. The Talmud—in the name of Abaye—suggests a more optimistic answer to our question: “So that the year may end along with its curses.” As we finish the year, we read all of the curses—putting them behind us, as if to say, so should our troubles be behind us. Then we can begin the new year with a clean slate, fresh for our new ways of being in the world, without any negative baggage. Indeed, this is a lovely framing for the end of one year and the beginning of another. But I still believe there is more behind Ezra’s insistence on reading the blessings and curses in public as our communities move into Rosh Hashanah. A curious geonic (7–10th century) tradition referenced by Maimonides provides deeper insight into Ezra’s decree. Most often, when we read the blessings and curses of Deuteronomy we experience them as promises of reward for loyalty to the Covenant and threats of violent consequences for rejecting God. However, Maimonides shares a tradition that conceptualizes the blessings and curses in a completely novel way. Maimonides suggests that hearing the blessings and curses in Parashat Ki Tavo, which come when the Israelites are about to enter into the Land of Israel before the original conquest, constituted the fulfillment of an actual mitzvah! (Kelal shelishi in Sefer Hamitzvot) This is a startling assertion, transforming the blessings and curses from a series of promises and threats to the level of commandment. But what was this mitzvah? In a very provocative remark, the Talmud suggests that prior to entering into the Land of Israel, the nation as a whole was held accountable only for the public misdeeds of individuals. If a person sinned in private, only the individual who misbehaved was held accountable. But as the nation prepared to cross the Jordan River, something changed. From that moment onward, the entire community of Israel became culpable for even the private misdeeds of other people (BT Sanhedrin 43b)! We are commanded to recognize our interconnectedness. Blessings would be earned and experienced by the group. Communal calamity would be the price for individual destructive decisions. Thus when the Israelites stood at Mount Gerizim and Mount Eval, they heard the blessings that await those who listen to God’s commandments and the punishments promised to those who disobey—but they also heard a message that transcended all of these specifics. The entire nation was asked to understand itself as radically interconnected and to appreciate the imperative that emerges from this realization. The mitzvah embedded in these verses of the promises and curses, then, is the mitzvah of arevut: seeing the profound interconnectedness of the Jewish people. Each Jew is the “guarantor” (arev) of every other Jew. That is, each Jew is fundamentally responsible for all other Jews. Through the blessings and curses of Parashat Ki Tavo, the Torah is saying, we are in this project of living together. Areveut—feeling and acting on a sense of responsibility for those around us—in Judaism does not fall under the category of altruism. Helping someone else is not an act of kindness. It is bound up in a fundamental responsibility that we must all feel toward others. Just as I am responsible for my own ethical life, I am responsible for that of others as well. If my neighbor falls and fails, it is my pain and my failure too. And if I receive blessing, it is not simply because I as an individual have earned it; the group also shares responsibility for my success. I like to think that these ideas stand behind the reasons for Ezra’s decree to read the blessings and curses before Rosh Hashanah. At a time when many of us are focused on our own individual growth and betterment, we are reminded of the profound interconnectedness of all our communities and lives. I can’t be a better person if I ignore the state of the individuals in my community. This is the mitzvah of arevut that I personally need to hear as I move into this holiday season. The publication and distribution of the JTS Commentary are made possible by a generous grant from Rita Dee (z”l) and Harold Hassenfeld (z”l).
https://www.jtsa.edu/torah/blessing-of-curses/
Zimbabwe’s monthly rate of inflation fell for the fourth consecutive month in October amid growing exchange rate stability while the annual rate recorded its second straight retreat as tight liquidity due to a coterie of policy interventions anchored the key fundamentals, official statistics show. The Zimbabwe National Statistics Agency (ZimStat) said month-on-month inflation in October 2022 was 3,2 percent, shedding 0,3 percentage points on the September 2022 rate of 3,5 percent. Inflation depicts the pace at which prices rise, as such a fall in the rate does not necessarily signify falling prices. This means that prices, as measured by the all-items Consumer Price Index (CPI), increased by an average rate of 3,2 percent between September 2022 and October 2022. The Treasury has projected the monthly rate to close the year even lower at 3 percent. “The month-on-month Food and Non-Alcoholic Beverages inflation rate stood at 3,1 percent in October 2022, gaining 1,4 percentage points on the September 2022 rate of 1,7 percent. “The month-on-month non-food inflation rate stood at 3,2 percent, shedding 2,0 percentage points on the September 2022 rate of 5,2 percent,” ZimStat said. According to ZimStat, on a year-to-year basis, annual inflation slowed to 268,8 percent in October from 280,4 percent in September and 285 percent in August 2022. Zimbabwe’s inflation trajectory reflects the positive impact of the series of interventions both fiscal and monetary authorities have instituted in the past few months. These included the bank policy hike by the Reserve Bank of Zimbabwe (RBZ), from 80-200 percent, to stymie speculative borrowing. A number of companies were borrowing at cheap interest rates to speculate in the currency and equities markets in a manner that hurt the domestic currency, which has depreciated from $2,5/US$1 in February 2019 to $632/US$1 on the formal market or $850/US$1 on the black market. The central bank also increased statutory reserves, which determine the funds available to banks for on-lending, to squeeze the flow of excess liquidity into the market, helping to entrench exchange rate and inflation stability. Authorities have indicated they will maintain a high-interest rate regime through 2022 and will only review them down if they notice a significant fall in inflation, which is not peculiar to Zimbabwe but a global phenomenon responding to dynamics caused by the war in Eastern Europe. Further, the RBZ introduced gold coins in September as an alternative investment instrument, which helped to divert some of the excess liquidity in the market to engender exchange rate stability, which was the biggest factor in driving an inflation resurgence. From August this year, Treasury demanded that all Government suppliers and contractors set prices (value for money audits) in line with market trends based on the willing buyer-willing seller exchange rate to avoid overpricing, which saw unscrupulous businesses pocket super profits they used to buy forex and drive Zimbabwe dollar depreciation. Finance and Economic Development Minister Professor Mthuli Ncube expects annual inflation to average 166,7 percent this year, and hopes to contain monthly inflation to 3 percent by year-end. Economist Tinevimbo Shava said, “The review and enhancement by the Government of its procurement processes and practices to ensure value for money have resulted in the stability of the exchange rate and a decline in inflationary pressures, so this is not a surprise.” Another economist, Namatai Maeresera said, “The country has been on a monetary policy tightening stance and these are the benefits of such activities, the gold coins, high-interest rates, and the Government (contracts) payment stance have led us to this point and all should be commended.” Bankers and industrial companies have been calling for interest rate cuts to enable companies to finance their operations, but quickly reversing this could spell a quick relapse into rampaging inflation. Last week Minister Ncube said, “I think once we see that downtrend in month-on-month inflation being sustained, maybe over a three- to four-month period, then we can begin to think about lowering interest rates. But for now, the tough monetary-regime stance and also the tough fiscal stance stand. “That’s what it takes to bring stability and bring things under control.” Economist Dr Prosper Chitambara said the interest rates were at the right level and the Treasury was right on the need to ensure a sustained period of stability until “we think of a policy rate cut”. He, however, acknowledged that high interests will come with consequences such as failure to meet growth targets. Dr Chitambara also noted that higher interest rates may push up non-performing loans (NPLs), but he insisted, “it is also imperative to strike a balance and determine an optimum interest rate policy that complements the policy measures that have been put in place.” Economist Prof Tony Hawkins argued that the interest rates were at optimal levels and the Treasury is holding the correct line. According to him lowering interest rates will see the parallel market running away again and more money-searching value “In the end, this will perpetuate financial disintermediation and probable market bubbles on the stock market, as customers will look for alternative, non-bank based, investment options,” Prof Hawkins said.
https://www.african-markets.com/en/news/southern-africa/zimbabwe/zimbabwe-monthly-inflation-rate-in-fourth-straight-fall
Q: 3d plot in R - Patch I have the following data in a data frame: **x** in (0,1) **y** in [0,1] **z** in [0,1] For example: X,Y,Z 0.1, 0.2, 0.56 0.1, 0.3, 0.57 ... I'd like to plot them on this type of chart: I tried on R, but all I could get was a not-so-fancy 3d scatterplot. I also read about the lattice 3d wireframe, but I couldn't get my head around it. What am I supposed to do to get a Matlab like wireframe in R? What data transforms are involved? This is the sample code from the documentation: x <- seq(-pi, pi, len = 20) y <- seq(-pi, pi, len = 20) g <- expand.grid(x = x, y = y) g$z <- sin(sqrt(g$x^2 + g$y^2)) wireframe(z ~ x * y, g, drape = TRUE, aspect = c(3,1), colorkey = TRUE) I don't find it particularly clear. EDIT: the persp3d function works fine, and I was able to generate a 3d plot with one colour. How can I set a colour scale relative to the z value? Thanks for any hints, Mulone A: Use outer to create the z values and then use persp to plot: z <- outer(x,y, function(x,y) sin(sqrt(x^2+y^2))) persp(x,y,z) There are options for colouring and setting the viewing angle, see ?persp. See the fourth example for Matlab style colouring. For an interactive plot, consider using persp3d in the rgl package: require(rgl) persp3d(x,y,z,col="blue") Edit To add colour, there is a slight difference from the method in persp, since the colour relates to the vertex rather than the centre of the facet, but it makes it easier. jet.colors <- colorRampPalette( c("blue", "green") ) pal <- jet.colors(100) col.ind <- cut(z,100) # colour indices of each point persp3d(x,y,z,col=pal[col.ind]) The help file recommends adding the parameter smooth=FALSE, but that's down to personal preference.
leading state for business and a global technology center. Recognizing that ongoing economic uncertainty will impact priorities during the 2019 legislative session, the agenda underscores the importance of continuing to advance policies and invest in programs and initiatives that will drive technology research, innovation, commercialization and high wage jobs in key areas where Virginia has existing strength and the most opportunity to compete globally. In the agenda, NVTC emphasizes opportunities for economic growth and competitiveness in sectors such as data analytics, data protection/cybersecurity, personalized medicine and health technologies, unmanned and autonomous systems, data transmission/wireless infrastructure and data storage and warehousing. Among its policy proposals, NVTC urges action in the following key areas: Competitiveness and Economic Growth: STEM Education and Workforce: Infrastructure: Click here for a full copy of NVTC's 2019 Legislative Agenda, or here to see NVTC’s legislative accomplishments during the 2018 General Assembly.
https://www.nvtc.org/NVTC/News/News_Articles/Northern_Virginia_Technology_Council_Announces_2019_Legislative_Agenda_for_Virginia.aspx
School-based mental health services: What can the partnership look like? Three years ago, I was asked to leave my position as a therapist and take a leadership role as a supervisor of school-based mental health services. At the time, I was seeing a small caseload of children at their school because of problem behaviors in their classroom environment. When I accepted the role, I had no idea how expansive and demanding school-based services would become. I quickly learned a new branch of treatment was developing: clinical intervention provided in an environment where children often struggle the most, and consultation and support for educators to increase awareness on the effects of childhood mental health in the schools. As funding dollars and financial resources diminish, an increased need exists for partnerships and collaborative efforts between mental health professionals and community resources. One such example is the partnership that has been cultivated between public school systems and community mental health agencies. New programming has developed in the form of school-based mental health service teams. These teams are formulated as an extension of outpatient services, provided to the child and family within the school environment through individual and family therapy, case management and access to psychiatric services. Providing mental health services in the community encourages systems to work in collaboration to address the complex issues and diagnoses that we see in child and adolescent mental health. The necessity for additional support, training, consultation and clinical intervention within the academic environment has grown as school funding shortfalls have reduced the number of school counselors, school social workers and school psychologists available to address the emotional and behavioral needs of school-age children. Economic difficulties, lack of transportation and the growing need for two-income households has increased the rate of noncompliance to appointments in the office setting. However, in my experience, it is relatively easy for many parents to walk to or secure a ride to their child’s school. To this end, mental health agencies are finding that meeting the client in the comfort of his or her environment — home or school — leads to greater success in maintaining consistent clinical contact and achieving greater outcomes. On average, children spend six to eight hours per day in an academic setting for at least nine months a year. Academic personnel, who are already faced with limited time and resources, experience the effects of routinely working with children who have externalizing and internalizing behaviors of varying frequency and intensity and who may have diagnoses such as oppositional defiant disorder, anxiety disorder, depression and posttraumatic stress. This could result in increased suspensions and expulsions for students and higher rates of burnout among educators. The school-based mental health model is a collaborative approach that brings clinical knowledge and services to the child and consultation, training and intervention support to educators. Several well-known school-based support models have been developed across the country through the advocacy efforts of local school systems and community mental health agencies. The Baltimore City Public Schools’ expanded school mental health program provides a framework for the most common design for school mental health programming. Baltimore city schools invited the inclusion of comprehensive mental health services such as individual, family and group therapy, and consultation and assessment services into their building through a partnership with community mental health providers. Similarly, the Charlotte-Mecklenburg public school system in Charlotte, N.C., partnered with Behavioral Health Centers, a division of the Carolinas HealthCare System. Through this cooperative process, mental health services were provided to 24 public elementary schools. The Salt Lake City public school system partnered with Valley Mental Health, a behavioral health care provider, to develop a treatment program that is similar to off-site day treatment programs. The program was designed to increase inclusion and support within the school environment for children with serious emotional disturbances. The integration of services within the public school setting reduces the risk of stigma for the child, while providing treatment and effective coping mechanisms in the least restrictive natural environment. What diagnoses are schools seeing? In 2011, Kathleen Ries Merikangas and colleagues published statistics on the utilization of services for adolescents with mental health disorders in the United States in the Journal of the American Academy of Child & Adolescent Psychiatry. They found the prevalence of childhood mental health issues in the United States estimated to be as high as 20 percent of all children. For a variety of reasons — financial, environmental, personal and cultural — underserved children were not receiving needed services an alarming 75-80 percent of the time. Considering the disparity between children identified for services and children who actually receive services, providing care in a natural environment such as a school could dramatically increase the number of children who receive therapeutic support. At the elementary and middle school levels (ages 5-12), Merikangas and colleagues found that among children who received mental health services, 60 percent were diagnosed with attention-deficit/hyperactivity disorder, while one in every eight children experienced some form of anxiety, with the median onset occurring at age 6. Anxiety in young children is often manifested in behaviors such as fidgeting, distraction, poor concentration and irritability. These symptoms mirror those of attention deficit and can be difficult for educators to tease out without further assessment and training. In 2010, the National Institutes of Health (NIH) reported that anxiety-related disorders are most common at the high school level (ages 13-18). The Centers for Disease Control and Prevention’s 2005 Youth Risk Behavior Survey reported that 6 percent of students missed school due to anxiety related to feeling unsafe either at or on the way to school. The NIH says incidents of depression are also highly prevalent at this age, with eight of every 100 adolescents experiencing symptoms such as a drop in grades, social isolation, diminished interest in activities of previous enjoyment and change in eating or sleeping patterns. According to the National Alliance on Mental Illness, mental health issues during adolescence contribute to more than half of all instances of students dropping out at the high school level. During their high school years, it is critical that adolescents are linked to additional therapeutic support, including external service providers and programs that can increase their sense of self. Teaching educators and administrators about early identification and increasing their knowledge of community resources can be critical to a student’s success in treatment. During the 2010-2011 school year, outcomes from the school-based program at my agency (N = 359) found the most common diagnoses for children enrolled were posttraumatic stress disorder, major depression (single episode), dysthymic disorder and attention deficit disorder. During the past two years, we have seen dramatic results in reducing anxiety and increasing resilience among children by teaching educators about early warning signs and the identification of hypervigilance versus hyperactivity, as well as providing educators with classroom management techniques. By working in collaboration with the schools, treatment providers can reach those children and families who may not otherwise feel they have a trusting adult to advocate for them. Parents often view teachers, school counselors or principals as advocates for the best interests of their children and will trust these professionals’ opinion if they say additional supports may be needed. Community clinicians can assist with bridging the gap between the schools and external resources through services such as case management, mentor programs, wraparound services and psychiatric consultation. A population to serve: The development of a successful program depends on a model that meets the needs of the clients it serves. The school-based mental health program I have been developing for the past three years is located in Butler County, Ohio. Butler County is a mix of urban and rural living outside of Cincinnati; school-age children and adolescents make up 24.7 percent of the population, and the median household income is $53,543. The population our agency serves is Medicaid eligible, and we receive reimbursement through a combination of Medicaid and subsidy dollars from the local mental health board. Since the development of this program, we have seen tremendous growth. In 2008, our agency supported the need for therapy in six schools. In 2012, our school-based program supported the need for services in almost 40 schools in Butler County. Currently, we serve 300 children in eight public school systems through a delicate marriage of collaboration, community, advocacy and education about mental health services in the school environment. The needs of the clients we serve support a model designed to include therapists, case managers, psychiatrists, trainers and consultants. I would argue that aligning with the community has increased the trust level for our agency’s services among the families we serve. I also believe our agency’s ability to educate and train educators on the importance of addressing mental health concerns has provided them with new insights concerning what they see in their classrooms each day. Each school we serve has an identified referral person such as the school counselor or school psychologist. This person has the necessary knowledge of the signs and symptoms needed to support an appropriate referral. Once the referral is made (with consent from the child’s parent or guardian), our centralized intake department meets the parent or guardian and child in the school to complete the diagnostic assessment. The school staff is supportive of our need for a confidential space to assess and treat the children they refer, oftentimes offering staff offices if needed. Therapist caseloads and placements are based on the number of referrals received from each school and can vary from one to five days per week. Once treatment begins, therapists work with individual children in a confidential office space and coordinate with teachers to pull children for therapy only during “specials” (for example, gym, music or art) or nonacademic time. Part of the process includes monthly family therapy sessions in an effort to provide continuity of care across environments. The therapist, case managers and school staff work to assist parents with transportation to the school. We have had principals and school psychologists pick parents up and bring them to appointments if needed. A collaborative effort: “Turf wars” between community therapists and school counselors have not been a reality in our county. Unfortunately, the need for individual and specialized treatment among our county’s students is greater than the time and resources our school counselors have available to them. Our school counselors are deeply invested in the success of the children referred and work with our therapists to provide a link between the child and the classroom, as well as additional support for the child and parent. When they are not on the school property, our therapists look to the school counselors for updates on behavior, grades and successful interventions. The counselors with whom we work often ask us for consultations when needed or to recommend behavioral goals for students’ individualized education plans. Collectively, our approach is that the more supportive services we can provide to children and their families, the greater the outcomes will be. Program development to meet the needs of the community: Unlike previously established programs, our program continuum provides training and consultation to educators and administrators on identified mental health topics. An annual summer institute designed for educators is geared toward continuing education on intervention strategies, classroom management and psychotropic medications. Additionally, clinicians meet with their school treatment teams monthly to debrief on progress, strengths of the child, changes in behavior and how to carry over successful interventions from the office to the classroom environment. My staff also attends weekly training sessions focused on trauma- and anxiety-related interventions in an effort to clinically address the needs of the students receiving the most frequently occurring diagnoses. The growth and success of our model is based on the clinical care we provide and the belief that it takes a systemic effort to create lasting change. Clinical progress would not be possible without building a trusting and lasting relationship with the clients and the community we serve, and this has been made easier by the successful collaboration between our schools and community mental health. Christina Baker, a professional clinical counselor supervisor, is the school-based services coordinator at St. Aloysius in Cincinnati and a doctoral student in counselor education at the University of Cincinnati. Contact her at [email protected]. Do you have any info on appropriate space in a school? I am an LMHC in MA working in a school and they are always moving me and giving me innapropriate space for therapy. I am trying to find some documentation on appropriate space. We suggest you contact the author of this article — her email is listed at the bottom. Also, see ACA’s School Counselor Connection page: https://www.counseling.org/knowledge-center/school-counselor-connection Thanks! We need to increase mental health services in our schools. I think this sheds light on the magnitude of the need in the schools for mental health services.
https://ct.counseling.org/2013/01/school-based-mental-health-services-what-can-the-partnership-look-like/
As members of the College community, we all have a role to play in maintaining workplace health and safety practices. During the COVID-19 pandemic, this includes strictly adhering to our Campus Re-Entry Guidelines and Protocols, completing the mandatory training course and administering a daily pre-screening assessment prior to re-entry. In addition to those outlined in the Occupational Health and Safety Policy, please also note the following roles and responsibilities: Employees: - Continue working remotely to the extent possible unless they are deemed essential workers/have roles and responsibilities to carry out on campus - Please review our process for identifying the employees necessary to support labs. - Report hazards and/or non-compliance with COVID-19 guidelines and protocols - If you are an employee supporting on-campus student learning, refer to the checklist Managers: - Ensure your teams have acknowledged the Campus Re-Entry Guidelines and Protocols (including the health and safety protocols identified therein) and have completed the associated mandatory training course - Discuss on campus work expectations with your teams - Support the health and safety of practices in your area(s) Joint Health and Safety Committee (JHSC):
https://www.centennialcollege.ca/campus-re-entry-guidelines-and-protocols/roles-and-responsibilities/
Everyone has those days when you feel overworked and overtired. Perhaps you woke up before your alarm and couldn’t fall back asleep, or maybe you went to bed late after a night out with friends. Though cases of occasional fatigue normally have an identifiable cause, chronic fatigue is a near-constant state of weariness that doesn’t seem to go away no matter how much rest you get. According to the Centers for Disease Control and Prevention, about 1 in 3 Americans reports that they do not get enough sleep. Sleep deprivation can cause daytime sleepiness and may affect your ability to concentrate in the short-term, but the fatigue that lasts for days on end can actually have a negative impact on your health, both mental and physical. In this article, we’ll explore the topic of fatigue in greater depth to determine exactly what it is and what causes it. We’ll also review the symptoms of fatigue and discuss how it can be diagnosed and treated. What is Fatigue? After getting a good night’s rest, most people wake up feeling refreshed and ready to conquer the day. For others, however, the morning always seems to come too soon, and you don’t feel rested no matter how long you slept. Each day becomes more difficult to face when you spend the entire day feeling weary, tired, and out of sorts. Fatigue is not a disease or a sleep condition, but it is a symptom of many sleep disorders. It is a lingering feeling of tiredness that is constant or near-constant and may have a negative impact on your ability to fulfill daily tasks. With fatigue, you may experience persistent, unexplained, and recurrent episodes of exhaustion – it is similar to the exhaustion you feel when you have missed a lot of sleep or when you are sick with the flu and simply can’t seem to muster the energy to get through the day. The difference between being tired and fatigue is that fatigue is not relieved by rest. It is a state of constant weariness that develops over time and drains your motivation, your energy, and your concentration. Chronic and severe fatigue can affect your performance at work, in school, and even in your home life. It can also have an impact on your emotional and psychological well-being. What Are the Symptoms of Fatigue? The National Heart, Lung, and Blood Institute (NHLBI) recommends 7 to 8 hours of sleep per night for adults over the age of 18. If you don’t get enough sleep for even one night, you could experience the effects of sleep deprivation. What many people do not realize is that fatigue can happen even when you’ve gotten the recommended amount of sleep. Here are some of the symptoms of fatigue: - A chronic feeling of tiredness or sleepiness - Headaches or migraines - Dizziness or lightheadedness - Sore or aching muscles - Slowed reflexes - Muscle weakness - Impaired judgment and decision-making - Changing moods, such as irritability - Loss of appetite - Impaired immune system function - Short-term memory problems - Poor concentration and focus - Hallucinations or psychosis - Difficulty paying attention to the task at hand - Low level of motivation Fatigue manifests in different ways in different people, often dependent on the underlying cause for the fatigue. To better understand the different causes of fatigue and their impact, let’s talk about the three different types of fatigue: - Physical Fatigue - Mental Fatigue - Metabolic Fatigue Now, let’s take a closer look at each of these three types of fatigue in greater detail. - Physical Fatigue This is the kind of fatigue in which your body feels too heavy to move. Your muscles feel weak, your movements slow, and you feel as if you’re moving in slow motion. With this type of fatigue, you may feel physically incapable of performing daily tasks. You might experience this type of fatigue if you pushed your body to its physical limits by working too hard, for too long, or at an unsustainable pace. You do not have an endless supply of energy, and if you don’t get restful sleep to recharge, you’ll end up feeling fatigued and tired, both physically and mentally. - Mental Fatigue With this type of fatigue, you may find it difficult to stay awake or to stay focused on the task at hand. This type of fatigue can have an emotional aspect to it as well. For example, if you’ve been under a great deal of mental or emotional stress for an extended period of time, you may feel as if you are emotionally drained – this can then lead to a feeling of physical fatigue. Mental fatigue can also be linked to mental health issues like depression, anxiety, and seasonal affective disorder. - Metabolic Fatigue This type of fatigue is linked to a number of medical conditions which can drain your body of energy and/or make it difficult to produce more. Adrenal fatigue falls into this category. Adrenal fatigue happens when the adrenal glands produce too much stress hormone in response to some kind of stressor (either real or perceived). If they continue to produce that hormone unnecessarily, it can lead to symptoms such as inexplicable tiredness, brain fog, trouble getting out of bed, poor memory, insomnia, and lack of energy. Other conditions that can contribute to fatigue are discussed in the next section. Not only are there different types of fatigue, but there are a wide variety of potential underlying causes. Keep reading to learn more about the medical conditions and lifestyle factors that can cause fatigue. What Causes Fatigue? Everyone experiences fatigue in their own way, and there may be more than one underlying cause for it. In most cases, however, fatigue can be traced back to a particular habit or set of habits. It can also be related to an underlying medical or mental health condition. The main categories into which the causes of fatigue can be divided are: - Lifestyle Factors - Medical Conditions - Mental Health Conditions - Sleep Disorders - Chemicals or Substances Now, let’s take a closer look at each of these causes for fatigue. - Lifestyle Factors You may not realize it, but your daily habits could be contributing to your fatigue. For example, if you don’t get any exercise on a regular basis, your level of physical fitness could be very low and even simple daily tasks may cause you to feel excessively tired. Using or abusing drugs, alcohol, and caffeine are lifestyle choices that can contribute to fatigue, as can lack of sleep, following an unhealthy diet, and engaging in other unhealthy activities. - Medical Conditions Fatigue is a symptom that many medical conditions share, and, in some cases, it may be that more than one medical problem is an underlying factor for chronic fatigue. Here is a list of some of the medical conditions that can cause fatigue: - Addison’s disease - Anemia - Arthritis - Cancer - Chronic fatigue syndrome - Congestive heart failure - Diabetes - Eating disorders - Emphysema - Fibromyalgia - Hypothyroidism - Hyperthyroidism - Kidney disease - Liver disease Several of the medical conditions on this list are linked to hormones. Addison’s disease, for example, affects the adrenal glands, limiting their ability to produce enough of certain hormones. Hypothyroidism is characterized by an underactive thyroid gland and reduced levels of thyroid hormone while hyperthyroidism is the opposite. Cardiovascular and blood issues like anemia and congestive heart failure can contribute to physical exhaustion and fatigue, as can metabolic disorders like diabetes. - Mental Health Conditions Chronic fatigue is a common symptom among mental health conditions like anxiety, depression, and seasonal affective disorder. Depression is caused by chemical imbalances in the brain which lead to problems with sleep and energy levels. Anxiety and stress are closely linked and can contribute to fatigue as well. When you are constantly worrying or feeling stressed, it can drain your energy and may make it more difficult for you to fall asleep at night which can lead to fatigue during the day. - Sleep Disorders When it comes to sleep disorders, it is important to differentiate between sleepiness and fatigue. Sleepiness is a common symptom of sleep disorders such as narcolepsy, obstructive sleep apnea, and insufficient sleep syndrome – it commonly occurs when the sleep disorder prevents regular or adequate sleep at night. Fatigue, on the other hand, often occurs even when the patient gets adequate sleep. So, while sleep disorders and fatigue may be concurrent, the sleep disorder is not always the primary cause. - Chemicals or Substances Everything you put into your body has the potential to affect your health, and certain substances are known for inhibiting sleep which can contribute to fatigue. For example, certain antidepressants, antihistamines, anti-anxiety drugs, and even sedatives can cause you to feel fatigued – they may also make it more difficult for you to sleep at night which might make matters worse. Vitamin and mineral deficiencies, overuse of alcohol or caffeine, and even certain supplements can also cause fatigue. In addition to these five categories, some of the other potential causes for fatigue include chronic pain that makes it difficult to sleep, being overweight or underweight, and lack of physical exercise. How is Fatigue Diagnosed? Diagnosing the underlying cause of your fatigue can be difficult since there is such a wide variety of symptoms. If you are concerned about the frequency or severity of your daytime exhaustion, talk to your doctor. To help diagnose your problem, he will perform a physical exam to rule out underlying medical problems and may also ask questions about your symptoms. Before you visit your doctor, it might help to think about your symptoms and to write down details relating to any patterns you notice as well as your sleep habits, because the two may be linked. In addition to performing a physical exam and medical history, your doctor may also use certain diagnostic tests to identify the underlying cause. Urine tests, blood tests, imaging scans, and mental health questionnaires can all be useful diagnostic tools. Once your doctor identifies the underlying problem, the two of you can work together to determine a course of treatment. What Are the Treatment Options for Fatigue? In most cases, treating the underlying cause for your fatigue will be effective in resolving your symptoms. For example, if your fatigue is related to anemia then increasing your iron intake could reverse both the condition itself and your fatigue. Sleep apnea can be treated with continuous positive airway pressure (CPAP) therapy, hypothyroidism with synthetic thyroid hormone supplements, and mental health issues with medication and/or therapy. Because there are so many potential underlying causes for fatigue, the treatment options are nearly endless. Your doctor will first need to make and confirm an accurate diagnosis to identify the condition and then start working on a treatment plan. If you have more than one medical or mental health problem, treatment could be a little trickier, so you’ll need to work closely with your doctor to find a treatment plan that really works for you. In addition to treating any underlying medical or mental health issues contributing to your fatigue, there are certain lifestyle factors you can change to reduce your symptoms. Here are some simple things you can do in your daily life to reduce fatigue: - Stay hydrated by drinking plenty of fluids - Do your best to follow a healthy and balanced diet - Get regular exercise, at least 30 minutes five times a week - Aim to get 7 to 8 hours of sleep every night - Avoid things you know will stress you out - Don’t take on more work than you can reasonably handle - Make time for relaxing activities like yoga or meditation - Limit your consumption of alcohol and tobacco The kind of fatigue that leaves you feeling mentally and physically drained on a daily basis takes time to develop, so you should not expect to cure it overnight. Correcting an underlying medical problem may have near-immediate results, but you should be prepared to take some time in treating your fatigue. With the help of your doctor and a personalized treatment plan, however, you can find relief. Disclaimer: The information on this website is not intended to be used as a substitute for professional medical advice, clinical diagnosis, or treatment. Always seek the advice of your personal physician or another qualified health provider with any questions you may have regarding a medical condition.
https://sleepingculture.com/fatigue
World Health Organization has led to several precautionary measures such as quarantines, social distancing or in some cases total lockdown in regions or countries around the world. New normal is making us adjust to new realities where the future is unpredictable. Studies show depression rates usually soar after epidemics. Although the effects of the coronavirus on mental health have not yet been systematically studied but based on current public reactions, it is anticipated that COVID-19 will have rippling effects. The pandemic is posing real and tangible threats. At Sleep Moksha, we are seeing increasing levels of psychosocial distress e.g., sleep-related issues, increased anxiety, mood problems, phobia-like behaviors, panic-like symptoms. A wide array of DSM 5 diagnoses (like panic disorder, Obsessive-Compulsive Disorder (OCD), Substance Use Disorder (SUD), adjustment disorder, Post Traumatic Stress Disorder) are also resurfacing. As healthcare workers, we are uniquely situated to help the community understand the potential impact of the virus and help patients, families, and society deal with this latest threat effectively. While on one hand, some are finding new strengths, showing resilience and are expected to bounce back. On the other hand, some groups of people are succumbing to the situation and reporting a significant dip in their mental health. The situation is especially going to have a long-term rippling effect on some groups of people like those with existing mental or long-term physical health conditions, people who get sick, health care workers, and could be especially at risk. Mental health crisis during COVID 19 Social isolation From weeks of lockdown turning into months, many people are experiencing a greater sense of isolation and loneliness. For that reason, we should prefer the term “physical distancing” rather than social distancing to describe physical distancing of two meters to stop the spread of virus and emphasizing the importance of staying socially connected. Physical distancing and Social isolation have deprived us of human touch and interaction that we are so used to. Addiction is known to be a disease of isolation. Another challenge that emerges as a mental health crisis because of self-isolation is that of addiction with excessive drug and alcohol use. A high level of post-traumatic stress disorder is also likely to be seen Among the people who contract COVID-19 and need to be hospitalized. Uncertainty about the future and threat to survival. Everybody is dealing with the uncertainty of when the pandemic will end, potential threats of getting infected, the financial and economic crisis that is costing millions their jobs, has led to a significant dip in their mental health. Fearing about severe shortages of resources to the imposition of lockdown infringing on their freedom is further adding to the emotional distress during this time. Anxiety, sleeplessness, and loneliness, are some of the mental health consequences that will persist long after the pandemic ends, while the increased feelings of depression and stress, especially during a time of uncertainty, may have serious impacts on public health, increasing people’s vulnerability to poor health, and weakening society as a whole. Health care workers who are on the front lines battling the virus, sometimes without the appropriate equipment to keep them safe, are also showing considerable rates of anxiety, insomnia, and depressive symptoms. A recent study of health care workers treating COVID-19 patients in China has already confirmed some of these concerns. The fear and threat may trigger an acute Adjustment Disorder (AD), precipitating or worsening the existing suicidality in them, i.e., thoughts and/or behavior. In a recent study, those diagnosed with AD had 12 times the rate of suicide as those without an AD diagnosis, even after controlling for a history of depression and other matched factors. Feeling Powerless For some people, watching suffering increase at every level and feeling powerless about doing something to stop it leads to vicarious trauma. This is especially seen in empaths, who tend to feel the suffering of others strongly. Although some of these reactions and feelings are completely normal during these unsettling times, they are unhealthy and unhelpful at the same time. Measures to combat people’s isolation, loneliness, anxiety, and panic; and improve people’s well-being, can contribute to the successful reconstruction of our society when the pandemic ends, and people can return to their previous normal. Social interaction is one of the most effective ways to cope with the current crisis. We work better in the company and with support. Humans are social creatures, and staying in touch with our loved ones and ventilating our fears, insecurities, and uncertainties is the best natural remedy. In times of crisis we need to communicate with those close to us more than ever. We all recognize that some people make us feel better and we cope naturally. Now is the time to be intentional and interactive and not to isolate. We are wired to be social and luckily, we can maintain emotional connection via technology. A low index of suspicion of mental distress can help in early detection and treatment and spare patients much suffering. Apart from this, here is what you can do to feel better and manage your psycho-social distress and stay functional - Calm yourself down and let not spread the virus of anxiety. Fear spreads faster than any virus. - Keep a regular routine intact. - Maintain a consistent sleep schedule. You must create and maintain a very consistent sleep practice and schedule. Set a regular bedtime and pair it with a set time to wake up. The more consistent is your wake up time, the more steady your body functions are. - Look at the silver lining. Hope is known as a protective factor against anxiety. - Don’t get sucked up in news –Consume only that much news that is going to personally impact you. 24/7 exposure to coronavirus related news will only magnify your stress and fear. - Be mindful, spend more time in the present than future forecasting. - Practice gratitude - Control the controllable - Cultivate a new hobby. Do things that bring joy and calm into your life - Exercise at least 20 minutes a day - Get professional help when it becomes overwhelming!
http://sleepmoksha.com/blog/blog/2020/04/19/mental-health-effects-of-covid-time-to-prepare-for-the-potential-of-a-second-wave-in-the-fall/
Dr. Maryrose Caulfield Here. I know I am getting older, but it gets harder and harder for me to sit in one place for long periods of time. When I am required to sit still for extended periods, I find my attention and thoughts wandering. Even when I am watching an amazing play on Broadway or an engrossing movie, I need to get up and move. Thank goodness for intermission! I simply cannot imagine how children, with all their energy, can possibly sit still for long periods of time. It is so important that environments for learning be designed to meet the needs of children. Merely adjusting a lesson is not enough. Knowing students in depth and having spaces which allow children to ready themselves to become involved in an important activity are two of the most significant things we can do for children. Providing choice for student involvement is also key, as the task will vary from one lesson to the next and from one activity to the next. Research on how the brain functions has informed areas such as classroom and seating design. These areas can positively affect emotions, engagement and learning. Adding to the research is the importance of student feedback. Gremmen, et al, includes the need for pre-service educators to receive specific training in this area prior to beginning any classroom experience. Teaching Tolerance, 2016, opines that when children have choice and ownership, they are more inclined to self-regulate and even assist with the positive behavior of other students in the class. Many of the research studies speak directly to significant gains in reading, language arts and math. These results included a diverse population of students and schools. “…a few insights surprised even the researchers. Flexible, welcoming spaces had a startlingly large effect on learning in math—73 percent of the students’ progress that was attributed to classroom design was traced back to flexibility and student ownership. The reasons are a mystery, but Barrett and his team hazarded a guess: Academic subjects that provoke anxiety—in math, that’s a known issue—are better addressed in classrooms that feel comfortable and familiar to students. Another way to look at it: Classroom flexibility, isolated from other measured factors, appears to be roughly as important as air quality, light, or temperature in boosting academic outcomes. We are now fully aware, thanks to Dr. Mary Helen Immordino-Yang, that emotions are integral to learning. Students who love their classroom, their space, and their choice of how to learn, will love learning. When we view the educational process from the lens of the child who is learning, it emphasizes the notion that where they learn contributes mightily to how they learn. So, how can you shape your classroom layout and seating to become more conducive to learning? Begin with the idea that less is more. Instead of looking at the classroom from the standpoint of “resources” for the year, think of the work as cumulative. Each day, each lesson, each project drives what the arrangement will be and how the lesson relates to the classroom spaces. Start small. Try simple changes at first. Clearly the amount of space in a classroom will factor in. However, as you go along, the more traditional look of desks will be replaced by flexible learning spaces. Flexible classrooms and seating go hand in hand with flexible learning. This type of seating is conducive to this type of learning which is more independent and individualized. The responsibility for learning becomes the student’s, not the teacher’s, which opens the space for the teacher to become a thinking guide and coach. Through this type of seating and learning, we mirror the world our students currently live in and prepare them for new worlds fast approaching. Working with different teams of students at different times, strategizing solutions, being willing to take chances and to learn from mistakes, thinking creatively, “failing forward” – these are all future skills we must cultivate in students and this is the classroom that will take them there. While there will be more noise and activity, it will be a function of student engagement. Students learn in styles most comfortable for them. Your work will be exciting and engaging as well as you begin to see your students have the “ah-ha!” moments that we always hope collaboration brings. For your reference, below you will find resources with a description and link to help guide you towards a more flexible classroom. Try something new and let me know how it works. Be brave. You are truly changing the future. And remember – whenever you can – have fun.
https://yoursinlearning.com/we-are-ready-to-seat-you-now/
Earthquake Measurement Earthquake Measurement Locating Earthquakes • Scientists (Seismologists) use seismographs that are located near the surface of the Earth to record the seismic waves. • Epicenter:Is the point on the Earth’s surface directly above an earthquakes starting point. Focus: is the point directly inside the Earth where the earthquake begins. Seismologists use the difference of the arrival times between the P-wave and S-wave to locate the epicenter. Seismologists use the readings from three separate seismograph stations. • 1 seismic station: Epicenter is anywhere on the distance circle. • 2 seismic stations: Epicenter is at one of two points. • 3 seismic stations: Epicenter is at one unique point.
https://fr.slideserve.com/zeheb/earthquake-measurement-powerpoint-ppt-presentation
TalentFleX Solutions, a leading Business & Technology consulting firm, is actively recruiting a Senior SQL Architect for a client in the Conshohocken, PA area. The Senior SQL Architect is a member of the Technology Operations team and will be responsible for development and maintenance of the database architecture necessary to run the client’s software. This individual will design, develop, and maintain new tables, data structures, and database objects (stored procedures, views, functions) to enhance the client’s application databases. You will be responsible for the performance and reliability of ETL processes across all products and cloud-based implementations. Responsibilities: - Responsible for influencing projects/initiatives and making decisions related to data including data quality, SQL Architecture and data management best practices - Create Claims system architecture and fully document all components. - Lead the physical database design and implementation process for large, complex projects. - Create a system flow diagram that includes all inputs/outputs into the process. - Identify technologies used in all system components, i.e., SSIS, SQL, VFP, etc. - Identify processing bottlenecks that can be targeted for improvement. - Create development plan that includes test data and unit test needs. - Define data retention policy and archiving strategy. - Present improvement area recommendations to leadership. - Participate in requirement gathering sessions with project team and clients. - Analyze performance of programming code to pinpoint frequently used, inefficient algorithms. - Serve as subject matter expert in systems design and development standards. - Recommend refactoring, reengineering, and architecture of legacy applications and systems. - Act as lead developer/architect for on and off shore project development teams. - Convert current SOAP frameworks to REST. - Implement 3rd party workflow management system and integrate with current applications. - Coordinates specific database performance monitoring and tuning tasks including the design of optimization and indexing schemas, as well as partitioning for complex projects - Perform peer reviews of project deliverables across project staff to ensure accuracy and quality of delivery. - Clear understanding of performance and automated testing best practices and principles. - Create system architecture diagrams. - Create and manage an array of data design deliverables including data models, data diagrams, data flows and corresponding data dictionary documentation - Assist in leading the development and implementation of various strategic SQL Architecture initiatives around master data management, data quality, data management policies/standards, data governance, and metadata management - Assist in determining the effectiveness of existing technologies and processes in relation to the SQL Architecture, create necessary implementation/migration plans, and recommend new solutions as required Qualifications:
https://jobs.talentflexsolutions.com/job/senior-sql-architect-conshohocken-pa/
Scientists at the Institute of Evolutionary Biology (IBE), a joint centre of Pompeu Fabra University (UPF) and the Spanish National Research Council (CSIC), have discovered a new type of now extinct hominid that lived in south-east Asia. This species, not described to date, is an ancestor of humans like the Neanderthals and the Denisovans and they crossed with modern humans tens of thousands of years ago. The results are published today in the journal Nature Genetics and confirm the potential of genomics to build the past. The first authors of the study are Mayukh Mondal and Ferran Casals, of the IBE and UPF respectively, who worked in collaboration with Partha Majumder of the National Institute of Biomedical Genomics in India. The genetic analysis of a group of individuals from the Andaman Islands in the Indian Ocean has revealed that their DNA contains fragments that do not correspond to modern humans who left Africa about 80,000 years ago. When comparing these sequences with those of Neanderthals and Denisovans, scientists have seen that they also are clearly different. The researchers of the IBE have concluded that this DNA belongs to an extinct hominid that shares a common ancestor with the other two but has a different history. This is new proof that the human genome contains small amounts of information from extinct ancestors. According to Jaume Bertranpetit, principal investigator of the IBE and UPF professor, “we have found fragments of DNA of the extinct hominid forming part of the genome of modern humans. In the near future we hope to obtain the complete genome from fossil remains”. In fact, different groups of scientists are now analysing bones that might correspond to this hominid, perhaps the so-called Homo erectus. More information: IBE news Reference: Mondal M, Casals F, Zheng H, Dall’Olio GM, Pybus M, Netea MG, Comas D, Laayouni H, Li Q, Majumder PP, Bertranpetit J (2016). Genomic analysis of the Andamanese provides new insights into the spread of humans in Asia and their local adaptations. Nature Genetics [Epub ahead of print].
http://www.prbb.org/arxiu/noticia/1555
The explosion of second-generation sequencing platforms and the emergence of third-generation sequencers have resulted in the extraordinary output of genomic data. Thus, the ability to analyze and interpret the data has rapidly become the rate limiting step. Cambridge Healthtech Institute’s Sequencing Data Analysis and Interpretation combines unique perspectives from biological researchers, biostatisticians, and software developers creating a common ground on which to explore how best to manage, analyze, and interpret datasets. This team of scientists will reference case studies as they provide a forum to discuss recent trends and issues in the arena of sequencing data, sequencing data analysis, and interpretation. Day 1 | Day 2 | Day 3 | Download Brochure Wednesday, March 16 7:30 am Conference Registration 8:00 Java and Jive Breakout Discussion Groups These focused groups are designed for conference attendees to discuss important and interesting topics related to sequencing and genomic tools. These are moderated discussions with brainstorming and interactive problem solving, allowing conference participants from diverse areas to exchange ideas, experiences, and develop future collaborations around a focused topic. Complimentary coffee is included. Please click here for a complete listing of Breakout Discussion Groups. 9:00 Close of Breakout Discussion Groups Plenary Keynote Session: The Personal Impact of Sequencing from Patient to Population 9:25 It Takes a Village Hugh Rienhoff, M.D., Director, MyDaughtersDNA.org - Biography Next-generation sequencing has made possible the study of rare genetic disease where traditional linkage analysis is not possible because of the rarity of the disorder. This description fits more than 2000 familial diseases. But the discovery of the genetic cause of rare disease remains a formidable challenge demanding the talents of many to generate the necessary data that rises to the level of proof of causality. 10:05 Data-Driven Personalized Medicine Atul Butte, M.D., Ph.D., Assistant Professor, Pediatrics, Medicine, Computer Science, Stanford University, Lucille Packard Children’s Hospital - Biography Dr. Butte builds and applies tools that convert more than 15 billion points of molecular, clinical, and epidemiological data measured by researchers and clinicians over the past decade into insights into diagnostic and therapeutic potential. Dr. Butte, a bioinformatician and pediatric endocrinologist, will highlight his recent work on the first clinical evaluation of a patient presenting with a personal genome. 10:45 Networking Coffee Break in Exhibit Hall with Poster Viewing 11:15 Human Genome Sequencing: Relevance of Defining the Outer Limits of Human Diversity for Global Health Vanessa Hayes, Ph.D., Professor, Human Genomics, J. Craig Venter Institute - Biography The African continent, birthplace of all modern man, home to a third of the world’s ethnic diversity, and epicenter for many globally significant diseases, has been poorly characterized in genetic terms. With a focus on recently diverged populations, non-migrant Africans have largely been excluded from the era of genomics and therefore disease association studies. Data will be presented from the first indigenous genome sequencing and how defining indigenous genome diversity will advance genotype-phenotype correlations of global significance. 11:55 Close of Session 12:15 pm Luncheon PresentationSponsored byUnderstanding Glaucoma through Genome-Wide Targeted Exome Re-Sequencing Terry Gaasterland, Ph.D., Professor, University of San Diego, CaliforniaPrimary open angle glaucoma is a complex disease with genetic foundations, but to date, with no clear causal gene variants. We are sequencing exomes from ~300 cases to compare with 500+ random controls. This talk will present results from Phase 1 in which we evaluated alternative methods for capture, library preparation, and analysis, and established standards for the full project. Sponsored by 12:50 Luncheon PresentationPartnering for Multi-omics ExcellenceJoyce Peng, Ph.D., Marketing Director, BGI AmericasWith the diverse analytical technologies now available, we can focus the full spectrum of multi-omics methods on the important research questions that impact agriculture and human health. BGI is deeply committed to supporting multi-omics research by providing our deep sequencing, analytical, and cloud computing resources to our collaborators and clients. Here we present projects that make use of leading-edge genomic, transcriptomic, epigenomic, proteomic, metagenomic, and single-cell sequencing methods, with special focus on research relevant to human disease and agriculture. ChIP-Seq 2:15 Chairperson’s Remarks Thomas Schwei, Vice President and General Manager, DNASTAR, Inc. 2:20 ChIP-PaM: An Algorithm for Identifying Transcription Factor Targets through ChIP-Seq Data Song Wu, Ph.D., Assistant Member, Biostatistics, St. Jude Children’s Research Hospital ChIP-PaM is an algorithm to detect transcription factor (TF) binding targets by capitalizing on three lines of evidences from a specific TF-DNA binding pattern: 1) The peak count of sequencing tags within a genomic region, 2) pattern matching of a specific tag count distribution, and 3) motif search along the genome. A novel data-based two-step eFDR procedure is proposed to integrate the three lines of evidences to determine significantly enriched regions. In a comparison with other existing methods, ChIP-PaM provides more accurate binding site discovery while maintaining comparable statistical power. 2:50 An Integrated Pipeline for Analyzing ChIP-Seq Transcription Factor Datasets Gordon Robertson, Ph.D., Staff Scientist, Canada’s Michael Smith Genome Sciences Centre, British Columbia Cancer Agency We have developed an R/Bioconductor analysis pipeline for ChIP-seq data for transcription factors. The pipeline addresses data import, probabilistic binding event identification, sequence motif analysis, visualization, and data export. Datasets with tens of thousands of enriched regions can be efficiently processed on a standard multicore computer. We are extending the probabilistic methods to address whole-genome, nucleosome-based short-read data types. 3:20 BiNGS!SL-Seq: Computational Analytical Pipeline to Analyze and Interpret Genome-Wide Synthetic Lethal Screen Aik Choon Tan, Ph.D., Assistant Professor, Bioinformatics, Medical Oncology, University of Colorado Denver School of Medicine We have developed a bioinformatics analysis pipeline (BiNGS!SL-seq) to analyze and interpret the massive sequencing data generated from the SL-seq. In this talk, I will describe the tools and methods implemented in this pipeline. I will also discuss lessons learned from developing this computational workflow. 3:50 Networking Refreshment Break in Exhibit Hall with Poster Viewing 4:30 RNA Binding Networks Determined by CLIP-SeqGene Yeo, Ph.D., Assistant Professor, Cellular and Molecular Medicine, Institute for Genomic Medicine, University of California, San DiegoPost-transcriptional regulation of gene expression is an area of increasing importance in our understanding of development and disease. RNA binding proteins (RBPs) are key determinants of the proper processing of RNA and ensure that the correct RNA species is generated at the right time and place. We have developed a powerful multipronged approach using computational modeling, biochemistry, molecular biology, and cell biology to identify the functional RNA elements recognized by RBPs in a genome-wide fashion. I will discuss how these methods are elucidating RNA regulatory networks in the nervous system and in human cells, pertinent to neurological diseases. 5:00 Analysis of High-Resolution and Genome-Scale DNA Methylation Data Elena Harris, Ph.D., Research Associate, Molecular and Computational Biology, University of Southern California Shotgun bisulfite sequencing has revolutionized the study of DNA methylation. We will discuss computational methods for extracting the most information from genome-wide single-CpG DNA methylation data, including identification of hypomethylated regions, regions showing partial methylation, differential methylation between two conditions, and regions of allelic methylation.
http://www.xgencongress.com/11/SequencingDataAnalysis/
Thailand is certainly one of the top holiday destinations for food lovers as it offers a wide variety of cuisines to choose from. Thai food is renowned for being spicy, sour, and sweet and containing complex flavors largely influenced by various other Asian cuisines from China, India, and Southeast Asia. A typical Thai dinner comprises various vegetables such as onions, garlic, ginger, and fresh fruits such as mangoes and papaya. It is also a country famous for its beer and one can easily find some delicious beers of Thailand as they are widely available from the local pubs and bars. Thai cuisine is highly popular and many international food lovers now go on vacation to try out this unique cuisine. There are many different types of dishes that are served during a typical meal in a restaurant. The dishes are normally served family-style and with either the main dish or any number of side dishes such as salads, soups, stir-fries, and noodles. What are the Most Popular Thai Dishes? The most popular meals include serving up spicy curries, chicken dishes, and salads. The Thai people have a strong love for seafood and they make use of fish, squid and octopus in their everyday meals. Apart from the popular dishes, Thai people also love making preparations with local ingredients. These ingredients are used in preparing their local cuisine which includes the preparation of curries, salads, soups, stir-fries, and noodles. In fact, local cuisine forms a very important part of the Thai culture and most dishes made using these ingredients can only be prepared in the presence of the locals. Thus, these are some of the popular holiday destinations where food lovers can enjoy their holidays. Thailand is considered to be one of the topmost holiday destinations for food lovers as the country offers a lot of options when it comes to cuisines and dishes. A typical Thai meal consists of either a curry or a salad with either a meat dish or vegetables. Sometimes, people prepare seafood too for their meals. There are many famous Thai restaurants that offer mouthwatering Thai dishes. Some of these restaurants offer round-trip flights to Thailand so that food lovers can experience the real taste of Thailand. What to Eat in Bangkok In Bangkok, Thailand the capital city, tourists can experience a variety of dishes prepared using Thai spices and herbs. There are also numerous street food stalls that serve spicy and authentic food. Some of these dishes include Char ka Meen, Char Kway Teow, Massaman Curry. Apart from these, there are many other mouth-watering dishes that can be tried including the red curry that is made using coconut milk and red pepper gravy, sticky tofu that is made using tofu and paste of red and green chilies, and many more. Eating out in Bangkok can also be a great experience as many restaurants offer a variety of international dishes. Some of these restaurants offer exotic French cuisine, Indian cuisine, and Chinese foods. Some of these restaurants also have outlets across Europe and other parts of the world. Is Street Food Popular in Thailand? Apart from eating out in restaurants, tourists can also enjoy street food that you can find while travelling. Some of these dishes include bulgogi, pad thai, and baht tyun which are cooked in an authentic style using traditional ingredients. Foreign tourists also love these street foods that they love eating chicken, beef, and even pork. Where is the Best Beach Destination in Thailand? Another popular tourist destination is Koh Samui island which is considered one of the most popular holiday destinations in Asia. This island is well known for its pristine sandy beaches and white sand. The tropical climate of Koh Samui makes it an ideal place to spend quality time with friends and family. Many of the beaches have white sand and this is one of the main reasons why many holidaymakers come here.
https://crockersfolly.com/why-thailand-is-best-holiday-destinations-for-food-lovers/
--- abstract: 'We prove the $p$-parity conjecture for elliptic curves over global fields of characteristic $p > 3$. We also present partial results on the $\ell$-parity conjecture for primes $\ell\neq p$.' author: - Fabien Trihan and Christian Wuthrich bibliography: - 'parity.bib' title: Parity conjectures for elliptic curves over global fields of positive characteristic --- Introduction ============ Let $K$ be a global field and let $E$ be an elliptic curve defined over $K$. The conjecture of Birch and Swinnerton-Dyer asserts that the rank of the Mordell-Weil group $E(K)$ is equal to the order of vanishing of the Hasse-Weil $L$-function $L(E/K,s)$ as $s=1$. A weaker question is to know whether these two integers have at least the same parity. This seems more approachable because the parity of the order of vanishing on the analytic side can by expressed in more algebraic terms through local root numbers – at least when the $L$-function is known to have an analytic continuation. Let $w(E/K)\in \{\pm 1\}$ be the global root number of $E$ over $K$ which is equal to the product of local root numbers $\prod_v w(E/K_v)$ as $v$ runs over all places in $K$. The local terms $w(E/K_v)$ were defined by Deligne without reference to the $L$-function, see [@rohrlich_wd] for the definition. So we can formulate the following conjecture. We have $(-1)^{\operatorname{rank}E(K)} = w(E/K)$. This conjecture is unproven except for specific cases. We will focus on the following easier question. Let $\Sha(E/K)$ be the Tate-Shafarevich group defined as the kernel of the localisation maps $H^1(K,E) \to \prod_{v} H^1(K_v,E)$ in Galois cohomology. For a prime $\ell$, the $\ell$-primary Selmer group $\operatorname{Sel}_{\ell^{\infty}}(E/K)$ fits into an exact sequence $$\label{mwselsha_eq} 0 \to E(K)\otimes {}^{{\mathbb{Q}}_{\ell}}\!/\!{}_{{\mathbb{Z}}_{\ell}} \to \operatorname{Sel}_{\ell^{\infty}}(E/K) \to \Sha(E/K)[\ell^{\infty}] \to 0.$$ If the characteristic of $K$ is prime to $\ell$, we may define it as the preimage of $\Sha(E/K)[\ell^{\infty}]$ under the map $H^1(K,E[\ell^\infty])\to H^1(K,E)[\ell^{\infty}]$. If the characteristic is equal to $\ell$, then one should use flat instead of Galois cohomology, see section \[selmer\_sec\] for definitions. The theorem of Mordell-Weil shows that the dual of $\operatorname{Sel}_{\ell^{\infty}}(E/K)$ is a finitely generated ${\mathbb{Z}}_{\ell}$-module, whose rank we will denote by $r_{\ell}$. In particular, is a short exact sequence of finite cotype ${\mathbb{Z}}_l$-modules for any prime $\ell$. Since it is conjectured that $\operatorname{rank}E(K) = r_{\ell}$, we can make the following conjecture, which seems more approachable as it links two algebraically defined terms. Let $\ell$ be a prime. We have $(-1)^{r_{\ell}} = w(E/K)$. These conjectures have attracted much attention in recent years and the $\ell$-parity conjecture is now known in many cases, in particular when the ground field is $K={\mathbb{Q}}$ by work of the Dokchitser brothers [@dok_isogeny; @dok_nonab; @dok_reg; @dok_modsquares; @dok_09], Kim [@kim], Mazur and Rubin [@mazur_rubin], Nekovář [@nekovar2; @nekovar3; @nekovar4], Coates, Fukaya, Kato, and Sujatha [@cfks] and others. In this article, we restrict our attention to the case of positive characteristic. So, we suppose from now on that $K$ is a global field of characteristic $p>3$ with constant field ${\mathbb{F}}_q$. The main result of this article is the following theorem. \[pparity\_thm\] The $p$-parity conjecture holds for any elliptic curve $E$ over a global field $K$ of characteristic $p>3$. The proof consists of two steps: first a local calculation linking the local root number to local data on the Frobenius isogeny on $E$, carried out in section \[local\_sec\]; followed by the use of global duality in section \[duality\_sec\]. Luckily, we do not have to treat all individual cases of bad reduction for the local considerations, since we are able to use a theorem of Ulmer [@ulmer_gnv] to reduce to the semistable case. This is done in section \[red\_ss\_sec\]. The proof follows closely the arguments in [@dok_isogeny] and Fisher’s appendix of [@dok_nonab]. We repeat it here in details, both for completeness and to make the reader aware of a few subtleties; for instance, it is to note that the Frobenius isogeny $F$ and its dual $V$ do not play an interchangeable role. The hardest part concerns the global duality. The relevant dualities that we need for our conclusion have never appeared in the literature and we are forced to prove them. We think that it is worthwhile to include in section \[pparity\_sec\] a general formula for the parity of the corank of the $p$-primary Selmer group and a local formula for the root number in section \[rootno\_sec\]. Originally, global dualities have appeared in Cassels’ work [@cassels] on the invariance under isogenies of the conjecture of Birch and Swinnerton-Dyer. It should be noted that one could use our duality statements to prove this in the case of characteristic $p>0$, but there is no need for this. In fact it is known by [@kato_trihan] that the conjecture of Birch and Swinnerton-Dyer is equivalent to the finiteness of the Tate-Shafarevich group – and it is clear that the latter question is invariant under isogeny. The second main result of this paper is a proof of the $\ell$-parity conjecture when $\ell\neq p$ in some cases. Write $\mu_\ell$ for the $\ell$-th roots of unity. \[ellparity\_thm\] Let $E/K$ be an elliptic curve and let $\ell> 2$ be a prime different from $p$. Furthermore assume that 1. $a=[K(\mu_{\ell}):K]$ is even, and 2. the analytic rank of $E$ does not grow by more than $1$ in the constant quadratic extension $K\cdot {\mathbb{F}}_{q^2}/K$. Then the $\ell$-parity conjecture holds for $E/K$. The proof will be presented in section \[ell\_sec\]. Its main ingredients are the non-vanishing results of Ulmer in [@ulmer_gnv] and the techniques for proving the parity conjectures from representation theoretic considerations as explained in [@dok_modsquares; @dok_sd]. Although the conditions will be fulfilled for many curves, the methods in this paper fail to give a complete proof of the $\ell$-parity conjecture. See the remarks at the beginning of section \[ell\_sec\] and the more detailed section \[fail\_sec\] for an explanation of why we are not able to extend the proof any further. Notations --------- The constant field of the global field $K$ of characteristic $p>3$ is the finite field ${\mathbb{F}}_q$ for some power $q$ of $p$. Let $C$ be a smooth, geometrically connected, projective curve over ${\mathbb{F}}_q$ with function field $K$. Let $E/K$ be an elliptic curve, which we will assume to be non-isotrivial (i.e. the $j$-invariant of $E$ is transcendental over ${\mathbb{F}}_q$). We fix a Weierstrass equation $$\label{w_eq} E \colon\quad y^2\, =\, x^3\, +\, A\,x\, +\, B$$ with $A$ and $B$ in $K$ and the corresponding invariant differential $\omega = \tfrac{dx}{2y}$. By $F\colon E \to E'$ we denote the Frobenius isogeny of degree $p$ whose dual $V\colon E'\to E$ is the Verschiebung. If $f\colon A\to B$ is a homomorphism of abelian groups, we write $$z(f) = \frac{\# \operatorname{coker}(f)}{\# \ker(f)}$$ provided that the kernel and the cokernel of $f$ are finite. For any abelian group (or group scheme) $A$ and integer $m$, we denote by $A[m]$ the $m$-torsion part of it; and, for any prime $\ell$, the $\ell$-primary part will be denoted by $A[\ell^{\infty}]$. The Pontryagin dual of an abelian group $A$ is written $A^{\vee}$. If the Pontryagin dual of $A$ is a finitely generated ${\mathbb{Z}}_{\ell}$-module for some prime $\ell$, then we write $\operatorname{div}(A)$ for its maximal divisible subgroup and let $A_{\operatorname{div}}$ denote the quotient of $A$ by $\operatorname{div}(A)$. Reduction to the semistable case {#red_ss_sec} ================================ Before, we start we should mention that the conjecture of Birch and Swinnerton-Dyer is known for isotrivial curve $E$ by the work of Milne [@milne_isotrivial]. So for the rest of the paper we will assume that $E$ is not isotrivial as otherwise the parity conjectures are known. In particular, it follows from this assumption that $E/K$ is ordinary. The parity conjecture is also known in the following cases: \[an\_rk0&1\] Let $A/K$ be an abelian variety over a function field of characteristic $p>0$ and let $\ell$ be a prime ($\ell=p$ is allowed). The analytic rank of $A/K$ is always greater or equal to the $\ell$-corank of the Selmer group. If the analytic rank of $A/K$ is zero, then the conjecture of Birch and Swinnerton-Dyer holds. If the analytic rank is $1$ then it coincides with the ${\mathbb{Z}}_\ell$-corank of the $\ell$-primary Selmer group. Note that if we restricted ourselves to elliptic curves and to the case $\ell \neq p$, then this result could already be deduced from the work of Artin and Tate [@tate]. By 3.2 in [@kato_trihan], the Hasse-Weil $L$-function of $A/K$ can be expressed as an alternating product of characteristic polynomials of some operators $\phi^i_\ell$ acting on a finite dimensional ${\mathbb{Q}}_\ell$-vector space $H^i_{{\mathbb{Q}}_\ell}$, with $i=0,1,2$. Then by 3.5.1 in [@kato_trihan], the order at $s=1$ of the Hasse-Weil $L$-function can be interpreted as the multiplicity of the eigenvalue 1 for the operator $\phi^1_\ell$ on $H^1_{{\mathbb{Q}}_\ell}$. Following the notations of 3.5 in [@kato_trihan], let $I_{3,\ell}$ denote the part of $H^1_{{\mathbb{Q}}_\ell}$ on which the operator $\operatorname{id}-\phi^1_\ell$ acts nilpotently and let $I_{2,\ell}$ denote the kernel of $\operatorname{id}-\phi^1_\ell$, such that we have the inclusions: $$I_{2,\ell}\subset I_{3,\ell}\subset H^1_{{\mathbb{Q}}_\ell}.$$ Since by 3.5.1 in [@kato_trihan], the operator $\operatorname{id}-\phi^i_\ell$ is an isomorphism for $i=0,2$, it follows that the analytic rank of $A/K$ is equal to the dimension of $I_{3,\ell}$. On the other hand, it follows from 3.5.5 and 3.5.6 in [@kato_trihan], that the $\ell$-corank of the Selmer group of $A/K$ is the dimension of $I_{2,\ell}$ so that we deduce that the analytic rank of $A/K$ is always greater or equal to the $\ell$-corank of the Selmer group of $A/K$. If the analytic rank of $A/K$ is trivial, so is the dimension of $I_{3,\ell}$. It implies that the dimension of $I_{2,\ell}$ is zero and by 3.5.6 in [@kato_trihan], we conclude that the Mordell-Weil group is also of rank zero. We then conclude the proof of the assertion thanks to the main result 1.8 of [@kato_trihan]. If the analytic rank of $A/K$ is one, then $\phi^1_\ell$ acts like the identity on $I_{3,\ell}$ and therefore $I_{2,\ell}=I_{3,\ell}$ and the second assertion immediately follows. The following proposition will be used at several places to reduce the conjecture to easier situations. \[red\_prop\] Let $E/K$ be a non-isotrivial curve and $L/K$ a separable extension. Let $\ell$ be a prime. Assume one of the following three conditions: 1. \[odd\_cond\] $\ell\neq p$ and the extension $L/K$ is a Galois extension of odd degree. 2. \[zero\_cond\] The analytic rank of $E$ does not grow in $L/K$. 3. \[one\_cond\] $\ell\neq p$ and the analytic rank of $E$ does not grow by more than $1$ in $L/K$. Then the $\ell$-parity conjecture for $E/K$ holds if and only if the $\ell$-parity conjecture for $E/L$ is known. If condition (\[odd\_cond\]) holds then the conclusion follows directly from Theorem 1.3 in [@dok_sd]. Note already here that the complete paper [@dok_sd] and its proofs hold in our situation as long as $\ell\neq p$. Suppose now as in condition (\[zero\_cond\]) that the analytic rank does not grow in $L/K$. Denote by $A/K$ the Weil restriction of $E$ under $L/K$ and by $B/K$ the quotient of $A$ by the natural image of $E$ in it. Since $$L(E/L,s) = L(A/K,s) = L(E/K,s)\cdot L(B/K,s)$$ we see that that the analytic rank of $B/K$ is zero and therefore by Proposition \[an\_rk0&1\], the full Birch and Swinnerton-Dyer conjecture holds. In particular, the Mordell-Weil rank of $B/K$ is zero and its Selmer group is a finite group. Moreover, we have an exact sequence $$\label{sels_ses} \operatorname{Sel}_{\ell^{\infty}}(E/K) \to \operatorname{Sel}_{\ell^{\infty}}(A/K) \to \operatorname{Sel}_{\ell^{\infty}}(B/K),$$ and the kernel of the first map lies in $B(K)[\ell^{\infty}]$, which is a finite group. Hence we conclude that $r_{\ell}$ is equal to the corank of $\operatorname{Sel}_{\ell^{\infty}}(A/K)$ and, by Proposition 3.1 in [@mazur_rubin], this is the same as the corank of $\operatorname{Sel}_{\ell^{\infty}}(E/L)$. So we are able to deduce the $\ell$-parity for $E/K$ from the $\ell$-parity for $E/L$. Finally, suppose that $\ell\neq p$ and that the analytic rank grows exactly by $1$; so we are under condition (\[one\_cond\]). Then we know by Proposition \[an\_rk0&1\] that the rank of $\operatorname{Sel}_{\ell^{\infty}}(B/K)$ is less or equal to $1$. We wish to exclude the possibility that it is $0$, so assume by now that $\operatorname{Sel}_{\ell^{\infty}}(B/K)$ is finite. But this means that $\Sha(B/K)[\ell^{\infty}]$ is finite and hence the full conjecture of Birch and Swinnerton-Dyer holds by [@kato_trihan] again. So we reach a contradiction since we would have $0 = \operatorname{rank}B(K) = \operatorname{ord}_{s=1} L(B/K,s) = 1$. Hence we have shown that the corank of $\operatorname{Sel}_{\ell^{\infty}}(B/K)$ is $1$. Note that the left-hand map in  still has finite kernel. We will show now that right-hand map has finite cokernel, too. Let $\Sigma$ be the finite set of places in $K$ of bad reduction for $E$. Write $G_{\Sigma}(K)$ for the Galois group of the maximal separable extension of $K$ which is unramified outside $\Sigma$. Note that from the definition of the Selmer group, we find the following diagram with exact rows and columns $$\xymatrix@C-8pt{ 0\ar[d] & 0\ar[d] & \\ \operatorname{Sel}_{\ell^{\infty}}(A/K)\ar[d]\ar[r] & \operatorname{Sel}_{\ell^{\infty}}(B/K) \ar[d]& \\ H^1\bigl(G_{\Sigma}(L),A[\ell^{\infty}]\bigr)\ar[d]\ar[r] & H^1\bigl(G_{\Sigma}(K),B[\ell^{\infty}]\bigr)\ar[d]\ar[r] & H^2\bigl(G_{\Sigma}(K),E[\ell^{\infty}]\bigr)\ar[r]^{r} & H^2\bigl(G_{\Sigma}(K),A[\ell^{\infty}]\bigr) \\ \bigoplus_{v\in \Sigma} H^1(K_v,A)[\ell^{\infty}] \ar[r] & \bigoplus_{v \in \Sigma} H^1(K_v,B)[\ell^{\infty}] }$$ We know that the bottom groups are finite as they are dual to $\varprojlim A(K_v)/\ell^k$ and $\varprojlim B(K_v)/\ell^k$ respectively. Hence we see from the snake lemma that we only have to prove that the kernel of $r$ is finite. Shapiro’s lemma shows that $H^2(G_{\Sigma}(K), A[\ell^\infty])$ is isomorphic to $H^2(G_{\Sigma}(L),E[\ell^\infty])$ and hence the map $r$ is simply the restriction map. As its kernel will only get larger when increasing $L$, we may assume that $L/K$ is Galois. Then the kernel of the restriction is contained in the part of $H^2(G_{\Sigma}(K),E[\ell^{\infty}])$ that is killed by $[L:K]$. Hence it is finite, because $H^2(G_{\Sigma}(K),E[\ell^{\infty}])$ is a discrete abelian group with finite ${\mathbb{Z}}_{\ell}$-corank. Therefore, we conclude again that the corank of the $\ell$-primary Selmer group increased by exactly $1$ in $L/K$. \[toss\_cor\] If the $\ell$-parity conjecture holds for all semistable elliptic curves, then it holds for all elliptic curves. Theorem 11.1 in [@ulmer_gnv] proves that there is a separable extension $L/K$ such that the reductions of $E$ becomes semistable and the analytic rank does not grow in $L/K$. The same argument also reduces the full parity conjecture to the semistable case. Local computations {#local_sec} ================== The following computations are purely local and we change the notations for this section. Let $K$ be a local field of characteristic $p>3$ with residue field ${\mathbb{F}}_q$. The ring of integers is written $\mathcal{O}$, the maximal ideal $\mathfrak{m}$ and the normalised valuation by $v$. The elliptic curve $E/K$ is given by the equation . By changing the equation, if necessary, we may suppose for this section that $A$ and $B$ are in $\mathcal{O}$. Define $L$ to be the minimal extension of $K$ such that $E'(L)[p] ={{}^{{\mathbb{Z}}}\!/\!{}_{p {\mathbb{Z}}}}$, or equivalently that $E[F]$ is isomorphic to $\mu[p]$ as a group scheme over $L$. There is a representation $$\rho\colon \operatorname{Gal}(L/K)\to \operatorname{Aut}(E'(L)[p]) \cong ({{}^{{\mathbb{Z}}}\!/\!{}_{p {\mathbb{Z}}}})^{\times}$$ which shows that $[L:K]$ divides $p-1$. Define $\bigl(\frac{-1}{L/K}\bigr)\in\{\pm 1\}$ to be the image of $-1$ under the composition of the reciprocity map and $\rho$ $$K^{\times} \to \operatorname{Gal}(L/K)\to ({{}^{{\mathbb{Z}}}\!/\!{}_{p {\mathbb{Z}}}})^{\times}.$$ So $\bigl(\frac{-1}{L/K}\bigr) = +1$ if and only if $-1$ is a norm from $L^{\times}$ to $K^{\times}$. We will also consider ${z_{{\scriptscriptstyle}V}}= z\bigl(V\colon E'(K) \to E(K)\bigr)$, which is a certain power of $p$. Put $$\sigma = \sigma(E/K) = \begin{cases} +1 \quad&\text{ if $z_V$ is a square and} \\ -1 &\text{ otherwise.} \end{cases}$$ It is important to note that we cannot define $z\bigl(F\colon E(K) \to E'(K)\bigr)$ since its cokernel will never be finite. Finally, as in the introduction, we let $w = w(E/K)$ be the local root number of $E$ over $K$, as defined by Deligne and well explained in [@rohrlich_wd]. The aim of this section is to show the following theorem. \[local\_thm\] Let $K$ be a local field of characteristic $p>3$. For any non-isotrivial elliptic curve $E/K$ whose reduction is not additive and potentially good, we have $w(E/K) = \bigl(\frac{-1}{L/K}\bigr) \cdot \sigma(E/K)$. We will prove this theorem by treating each type of reduction separately. In the last section of this paper, we will prove this local theorem without the assumption on the reduction using global methods. See Conjecture 5.3 in [@dok_09] for the analogue in characteristic zero. In particular, the following computations show that the analogy should take places above $p$ in characteristic zero to supersingular places in characteristic $p$. Recall the definition of the Hasse invariant $\alpha = A(E,\omega)$ associated to the given integral equation . Write $\mathcal{F}$ for the formal group of $E$ over $\mathcal{O}$, and similarly $\mathcal{F}'$ for the formal group for the isogenous curve $E'$ given by the integral equation $$E'\colon \quad y'^2 \, = \, x'^3\, + \,A^p\, x'\,+\,B^p.$$ Choose $t=-\frac{x'}{y'}$ as the parameter of the formal group $\mathcal{F}'$. Then the formal isogeny $V_1$ of the Verschiebung $V$ is of the form $$\xymatrix@R=3mm{ V_1 \colon \mathcal{F}'(\mathfrak{m})\ar@{-o>}[r] & \mathcal{F}(\mathfrak{m}) \\ t \ar@{|-o>}[r] & \alpha \cdot G(t) + H(t^p) }$$ for some $G(t) = t+\cdots \in \mathcal{O}[\![t]\!]$ and $H(t) = u\cdot t +\cdots \in \mathcal{O}[\![t]\!]$ with $u$ in $\mathcal{O}^{\times}$. See section 12.4 in [@katz_mazur] for other descriptions of the Hasse invariant $\alpha$. We begin now the proof of Theorem \[local\_thm\]. For the computation of the local root number $w$, we can simply refer to Proposition 19 in [@rohrlich_wd], where we find that $w=-1$ if the reduction is split multiplicative and $w=+1$ if it is good or non-split multiplicative. Good reduction -------------- \[good\_prop\] Suppose $E/K$ has good reduction. Then $w=+1$. The quantities $\sigma$ and $\bigl(\frac{-1}{L/K}\bigr)$ are $+1$ if and only if $q^{v(\alpha)}$ is a square. In particular, if the reduction is ordinary then $\sigma=\bigl(\frac{-1}{L/K}\bigr)=+1$. We may suppose that the equation  is minimal, i.e. that it has good reduction. We then have the diagram $$\xymatrix@C=10mm{ 0 \ar@{-o>}[r] & \mathcal{F}'(\mathfrak{m}) \ar@{-o>}[r] \ar[d]_{V_1} & E'(K) \ar@{-o>}[r] \ar[d]_{V} & \tilde{E'}({\mathbb{F}}_q) \ar@{-o>}[r]\ar[d] & 0 \\ 0 \ar@{-o>}[r] & \mathcal{F}(\mathfrak{m}) \ar@{-o>}[r] & E(K) \ar@{-o>}[r] & \tilde{E}({\mathbb{F}}_q) \ar@{-o>}[r] & 0 }$$ where $\tilde{E}$ denotes the reduction of $E$. The isogenous curves $\tilde{E}$ and $\tilde{E'}$ over ${\mathbb{F}}_q$ have the same number of points, so the kernel and cokernel of this map have the same size. Hence ${z_{{\scriptscriptstyle}V}}= z(V_1)$. For any $N\geqslant 1$, $$\frac{\mathcal{F}(\mathfrak{m}^N)}{\mathcal{F}(\mathfrak{m}^{N+1})} \cong \frac{\mathfrak{m}^N}{\mathfrak{m}^{N+1}} \cong \frac{\mathcal{F}'(\mathfrak{m}^N)}{\mathcal{F}'(\mathfrak{m}^{N+1})}$$ and so the same argument shows that ${z_{{\scriptscriptstyle}V}}= z(V_1) = z\bigl(V_N\colon \mathcal{F}'(\mathfrak{m}^{N}) \to \mathcal{F}(\mathfrak{m}^{N}) \bigr)$. We claim that if $N>\upsilon(\alpha)$ then $V_N$ maps $\mathcal{F}'(\mathfrak{m}^N)$ bijectively onto $\mathcal{F}(\mathfrak{m}^{N+\upsilon(\alpha)})$. If $t$ has valuation at least $N$, then the valuation of $\alpha\,t$ is smaller than the valuation of $u\cdot t^p$. Therefore $\upsilon(V_N(t)) = \upsilon(\alpha) + \upsilon(t)$. This shows that $V_N$ maps $\mathcal{F}'(\mathfrak{m}^N)$ injectively to $\mathcal{F}(\mathfrak{m}^{N+\upsilon(\alpha)})$. In particular, the kernel $\ker(V_N)$ is trivial. Let $s$ have valuation $\upsilon(s) \geqslant N+\upsilon(\alpha)$. Put $t_0 = s/\alpha$. Then $t_0$ is close to a zero of $g(t) = V_N(t) - s$. Namely $g(t_0) = \alpha \,a\, t_0^2 +\cdots +u\, t_0^p+\cdots$ has valuation at least $2\,\upsilon(s)-\upsilon(\alpha) \geqslant 2\,N+\upsilon(\alpha) > 2\,\upsilon(\alpha)$, if we write $G(t) = t+a\,t^2+\cdots$ for some $a\in\mathcal{O}$. Since $g'(t_0) = \alpha + 2\,\alpha\, a \, t_0 + \cdots$ has valuation $\upsilon(\alpha)$, Hensel’s lemma shows that there is a $t$ close to $t_0$ such that $g(t) = 0$, i.e. such that $V_N(t) = s$. We conclude that the cokernel of $V_N$ is equal to the index of $\mathcal{F}(\mathfrak{m}^{N+\upsilon(\alpha)})$ in $\mathcal{F}(\mathfrak{m}^N)$. Hence ${z_{{\scriptscriptstyle}V}}= z(V_N) = q^{\upsilon(\alpha)}$. In particular ${z_{{\scriptscriptstyle}V}}=1$ if the reduction is ordinary, i.e. when $\alpha$ is a unit in $\mathcal{O}$. Let ${e_{{\scriptscriptstyle}L/K}}$ be the ramification index of $L/K$. If the reduction is good ordinary, then the inertia group acts trivially on $T_p E'$, which is a ${\mathbb{Z}}_p$-module of rank 1. Hence $L/K$ is unramified and we have immediately that $\bigl(\frac{-1}{L/K}\bigr)=+1$. The parity of ${v(\alpha)}$ is equal to the parity of $\frac{p-1}{{e_{{\scriptscriptstyle}L/K}}}$. If $E$ has good ordinary reduction, then ${v(\alpha)}=0$, $e_{L/K}=1$ and $p-1$ is even so that the assertion is true. If $E$ has good supersingular reduction, then since $E'(L)[p]$ contains a non-trivial point $P=(x'_P,y'_P)$, but the reduction does not contain a point of order $p$, there exist a $t_P = -x'_P/y'_P$ in the maximal ideal $\mathfrak{m}_L$ of $L$ such that $V_1(t_P) = 0$. From $V_1 (t_P) = \alpha\,t_P +\cdots + u\, t_P^p +\cdots$, we see that the valuation of $\alpha t_P$ and $ut_P^p$ must cancel out. Hence $\upsilon_L(\alpha) = {e_{{\scriptscriptstyle}L/K}}\cdot\upsilon(\alpha) = (p-1)\cdot \upsilon_L(t_P)$, where $\upsilon_L$ denotes the normalised valuation in $L$. So if the valuation of $t_P$ is odd, we have proved the assertion. Assume that $\upsilon_L(t_P)$ is even. Then $\upsilon(\alpha)$ is also even and we have to show that $\frac{p-1}{{e_{{\scriptscriptstyle}L/K}}}$ is even. The extension $L/K(x'_P)$ is generated by $t_P$ whose square belongs to $K(x'_P)$; so this extension is either unramified quadratic or trivial. If $L=K(x'_P)$, then $\operatorname{Gal}(L/K)$ acts on the set of $\{x'_P\vert O\neq P\in E'(L)[p]\}$ and hence $[L:K]$ divides $\frac{p-1}{2}$, so $\frac{p-1}{[L:K]}$ is even. Otherwise, if $L$ is an unramified quadratic extension of $K(x'_P)$, then ${e_{{\scriptscriptstyle}L/K}}= e_{K(x'_p)/K}$ and $p-1$ is divisible by $[L:K] = 2 {e_{{\scriptscriptstyle}L/K}}f_{K(x'_p)/K}$. So $\frac{p-1}{{e_{{\scriptscriptstyle}L/K}}}$ is even. Now we can conclude the proof of Proposition \[good\_prop\]. Lemma 12 in [@dok_isogeny], whose proof is valid even if the characteristic of $K$ is not zero, says that $\bigl(\frac{-1}{L/K}\bigr)=+1$ if and only if $q$ is a square or if $\frac{p-1}{e_{L/K}}$ is even. The previous lemma suffices now to conclude. In the good supersingular case, $L/K$ may or may not be totally ramified. We illustrate this with two examples. We take $p=5$, $w>0$ any integer, and the curve $E$ given by the minimal Weierstrass equation $$y^2\ = \ x^3 \ + \ T^w \cdot x \ + \ 1$$ over $\mathcal{O}={\mathbb{F}}_5[\![T]\!]$. The Hasse invariant is $\alpha = 2\cdot T^w$. The reduction is good, but supersingular. The division polynomial $f_V$ associated to the isogeny $V$ can be computed to be equal to $$f_V(x) = 2\, T^w\,x^2+4\,T^{2w}\,x + (4+3\,T^{3w}+T^{6w})\,.$$ First we take the case $w=2\,m$ is even. Then we can make the substitution $X = T^m \cdot x$ to get $$f_V(x) = 2\, X^2+4\,T^{3m}\,X + (4+3\,T^{6m}+T^{12m})\,.$$ We see that $K(x_P)$ is a quadratic unramified extension of $K$. The quantity $\frac{p-1}{{e_{{\scriptscriptstyle}L/K}}}$ will certainly be even. Now, take $w=2\,m-1$ to be odd with $m>1$. This time the substitution $X=T^m\cdot x$ gets us to $$T\cdot f_V(x) = 2\, X^2+4\,T^{3m-2}\,X + T\cdot (4+3\,T^{6m-3}+T^{12m-6})\,.$$ Therefore $K(x_P)/K$ will be a ramified extension of degree $2$. The valuation of $x_P$ over $K(x_P)$ is odd, so we have to make a further extension $L/K(x_P)$, again ramified of degree $2$, to have a $p$-torsion point in $E'(L)$. So ${e_{{\scriptscriptstyle}L/K}}=4$ and $\frac{p-1}{{e_{{\scriptscriptstyle}L/K}}}$ is odd. Split multiplicative -------------------- \[split\_prop\] Suppose $E/K$ has split multiplicative reduction. Then $w(E/K) = -1$, $\bigl(\frac{-1}{L/K}\bigr) = +1$, and $\sigma(E/K) = -1$. Let ${q_{{\scriptscriptstyle}E}}\in K^{\times}$ be the parameter of the Tate curve which is isomorphic to $E$ over $K$. Then the isogenous curve $E'$ has parameter ${{q_{{\scriptscriptstyle}E}}}^p$ and the Frobenius map $$\xymatrix{V\colon \frac{ K^{\times} }{ ({{q_{{\scriptscriptstyle}E}}}^p)^{{\mathbb{Z}}} } \ar@{-o>}[r] & \frac{ K^{\times} }{ ({q_{{\scriptscriptstyle}E}})^{{\mathbb{Z}}} } }$$ is induced by the identity on $K^{\times}$. Hence $V$ has a kernel with $p$ elements and is surjective, so $z_V = \frac{1}{p}$ and $\sigma = -1$. Since $E'$ has already a $p$-torsion point over $K$, we have $L=K$ and $\bigl(\frac{-1}{L/K}\bigr)=+1$. Non-split multiplicative ------------------------ \[nonsplit\_prop\] Suppose $E/K$ has non-split multiplicative reduction. Then $$w(E/K) =\bigl(\frac{-1}{L/K}\bigr)=\sigma(E/K) = +1.$$ There is a quadratic extension $K'$ over which $E$ has split multiplicative reduction. So either $L=K$ or $L=K'$. Let $E^{\dagger}$ be the quadratic twist of $E$ over $K'$. Up to $2$-torsion groups, we have $E(L)= E(K)\oplus E^{\dagger}(K)$. Since $E^{\dagger}$ has split multiplicative reduction over $K$ there is a $p$-torsion point in $E^{\dagger}(K)$. So $L=K'$. From the previous section, we know that ${z_{{\scriptscriptstyle}V}}$ for $E/L$ and $E^{\dagger}/K$ both are equal to $\frac{1}{p}$. So by the above formula for $E(L)$ up to $2$-torsion, we get that ${z_{{\scriptscriptstyle}V}}$ for $E/K$ is $1$. So $\sigma = +1$. Since $L/K$ is unramified, $ \bigl(\frac{-1}{L/K}\bigr) = +1$. Additive potentially multiplicative ----------------------------------- Suppose $E/K$ has additive, potentially multiplicative reduction. Let $\chi\colon K^{\times} \to \{\pm 1\}$ be the character associated to the quadratic ramified extension over which $E$ has split multiplicative reduction. Then $w(E/K) =\bigl(\frac{-1}{L/K}\bigr)=\chi(-1)$ and $\sigma(E/K) = +1$. The root number is computed by Rohrlich [@rohrlich_wd 19.ii]. The proof that $\sigma = +1$ is the same as in the non-split multiplicative case. The formula $ \bigl(\frac{-1}{L/K}\bigr) = \chi(-1)$ is clear, too. Selmer groups {#selmer_sec} ============= We return to the global situation and we wish to define properly the Selmer groups involved in $p$-descent in characteristic $p$ using flat cohomology. From now on, $K$ is again a global field with field of constants ${\mathbb{F}}_q$ and $E/K$ is a semistable, non-isotrivial elliptic curve. We denote by $\mathcal{E}$ the Néron model of $E/K$ over $C$ and $\mathcal{E}^0$ its connected component containing the identity. Let $U$ be a dense open subset of $C$ such that $\mathcal{E}$ has good reduction on $U$. The group schemes $\mathcal{E}$ and $\mathcal{E}^0$ coincide over $U$ and we define for any $v\not\in U$ the group of connected components $\Phi_v$ in the fibre above $v$. So we have the following short exact sequence: $$0 \to \mathcal{E}^0 \to \mathcal{E} \to \bigoplus_{v\not \in U} \Phi_v \to 0.$$ Following 2.2 in [@kato_trihan], the discrete $p^{\infty}$-Selmer group of $E/K$ is defined as $$\operatorname{Sel}_{p^\infty}(E/K) := \ker \Bigl[ {H_{\operatorname{fl}}}^1 (K,E[p^\infty])\rightarrow \prod_{v} {H_{\operatorname{fl}}}^1 (K_v,E) \Bigl]$$ where $E[p^{\infty}]$ is the $p$-divisible group associated to $E$ and ${H_{\operatorname{fl}}}$ stands for flat cohomology. It is known that $\operatorname{Sel}_{p^{\infty}}(E/K)$ fits into the following exact sequence: $$\label{ses1_seq} 0 \to E(K)\otimes {}^{{\mathbb{Q}}_p}\! /\!{}_{{\mathbb{Z}}_p} \to \operatorname{Sel}_{p^\infty}(E/K) \to \Sha(E/K)[p^\infty] \to 0 .$$ This follows from the fact that the Tate-Shafarevich group can also be computed using flat cohomology as the kernel of ${H_{\operatorname{fl}}}^1 (K,E)\to \prod_v {H_{\operatorname{fl}}}^1 (K_v,E)$ since for the elliptic curve $E$ over $K$ or $K_v$, the étale and flat cohomology groups coincide (see Theorem 3.9 in [@Milne80]). Note also that the dual of $\operatorname{Sel}_{p^{\infty}}(E/K)$ is a finitely generated ${\mathbb{Z}}_p$-module by the theorem of Mordell-Weil and the finiteness of $\Sha(E/K)[p]$ (see e.g. [@ulmer_pdescent]). Let $\phi\colon E\to E'$ be an isogeny of elliptic curves. The map $\phi$ induces a short exact sequence of sheaves in the flat topology $$\label{ses2_seq} \xymatrix@1{ 0 \ar[r] & E[\phi] \ar[r] & E \ar[r]^{\phi} & E' \ar[r] & 0. }$$ The Selmer group $\operatorname{Sel}_\phi(E/K)$ is defined to be the set of elements in ${H_{\operatorname{fl}}}^1(K,E[\phi])$ whose restrictions to ${H_{\operatorname{fl}}}^1(K_v,E[\phi])$ lie in the image of the connecting homomorphism $E(K_v)\to {H_{\operatorname{fl}}}^1(K_v,E[\phi])$ for all $v$. If $U$ is any open subset of $C$ where $E$ has good reduction, we can also describe $\operatorname{Sel}_\phi(E/K)$ as the kernel of the composed map $$\xymatrix@1{ {H_{\operatorname{fl}}}^1(U,\mathcal{E}[\phi]) \ar[r] & \prod_{v\not\in U} {H_{\operatorname{fl}}}^1(K_v,E[\phi]) \ar[r] & \prod_{v\not\in U} {H_{\operatorname{fl}}}^1(K_v,E)[\phi]. }$$ Passing to cohomology, the short exact sequence  induces the short exact sequence of finite groups $$\label{selsha_seq} \xymatrix@1{ 0 \ar[r] & E'(K)/\phi(E(K)) \ar[r] & \operatorname{Sel}_\phi (E/K) \ar[r] & \Sha(E/K)[\phi] \ar[r] & 0, }$$ where $\Sha(E/K)[\phi]$ is the kernel of the induced map ${\phi_{\smallSha}}\colon \Sha(E/K) \to \Sha(E'/K)$. Global Euler characteristics {#duality_sec} ============================ We prove in the next three sections a few results on global dualities for the $p$-primary part of the Tate-Shafarevich group in characteristic $p$ using flat cohomology. The main reference will be [@milne], but we wish to point the reader to related results in [@GT] and [@Go]. Note that most results in these three sections do not need any condition on the reduction. Also, except where mentioned, the characteristic $p$ can be any prime. We give a short review of the Oort-Tate classification of finite flat group schemes of order $p$ (see [@oort_tate] for details). Let $X$ be a scheme of characteristic $p>0$. The data of a finite flat group scheme $N$ of order $p$ over $X$ is equivalent to the data of an invertible sheaf $\mathcal{L}$, a section $a\in H^0(C,\mathcal{L}^{\otimes(p-1)})$ and a section $b\in H^0(C,\mathcal{L}^{\otimes(1-p)})$ such that $a\otimes b=0$. We use the notation $N_{\mathcal{L},a,b}$. If $N$ is of height one, then $a=0$. The Cartier dual of $N_{\mathcal{L},a,b}$ is $N_{\mathcal{L}^{-1},b,a}$. For a scheme $S$ of characteristic $p>0$ and a finite flat group scheme $N/S$ we define the Euler characteristic of $N/S$ as $$\chi(S,N) := \prod_i\Bigl(\#{H_{\operatorname{fl}}}^i(S,N)\Bigr)^{(-1)^i}$$ whenever the groups ${H_{\operatorname{fl}}}^i(S,N)$ are finite. \[globalchi\_lem\] Assume that the prime $p$ is odd. Let $N$ be a finite flat group scheme of order $p$ over $C$. Assume that the Cartier dual $N^D$ of $N$ is of height 1. Then the groups ${H_{\operatorname{fl}}}^i(C,N)$ are finite and $\chi(C,N)$ is a square in ${\mathbb{Q}}^{\times}$. The cohomology is finite by Lemma III.8.9 in [@milne] since $N$ is finite flat. If $N^D$ has height $1$ then $N$ corresponds to a group scheme $N_{\mathcal{L},a,b}$ with $b=0$. Now we follow the explanation after problem III.8.10 in [@milne]. Since $N$ is the dual of a group scheme of height 1, we have that there is a sequence $$\xymatrix@R-4ex@C+1ex{0\ar[r]& N \ar[r] & \mathcal{L}\ar[r] & \mathcal{L}^{\otimes p}\ar[r] &0,\\ & & z \ar @{|->} [r] & z^{\otimes p}-a\otimes z & }$$ which is exact by the definition of $N_{\mathcal{L},a,b}$. See also Example III.5.4 in [@milne]. Hence we have that $\chi(C,N) = q^{\chi(\mathcal{L})-\chi(\mathcal{L}^{\otimes p})}$. Using Riemann-Roch, we get $$\begin{aligned} \chi(\mathcal{L}) &= \deg(\mathcal{L}) + 1 - g\\ \chi(\mathcal{L}^{\otimes p}) &= p\cdot \deg(\mathcal{L}) + 1 - g\end{aligned}$$ and therefore we find the formula $$\chi(C,N) = q^{(p-1)\deg \mathcal{L}}.$$ So the lemma follows from the fact that $p$ is odd. For any place $v$ in $K$, we denote by $\vert\cdot\vert_v$ the normalised absolute value of the completion $K_v$. In particular the absolute value of a uniformiser is $q_v^{-1}$ where $q_v$ denotes the number of elements in the residue field. \[localchi\_lem\] Let $N=N_{\mathcal{L},a,b}$ be a finite flat group scheme of order $p>2$ over the ring $O_v$ of integers in $K_v$. Assume that $N_{K_v}$ is étale. Then the Euler characteristic of $N$ is well-defined and we have $$\chi(O_v,N)\equiv\vert a\vert_v^{-1}$$ modulo squares in ${\mathbb{Q}}^{\times}$. The invertible sheaf $\mathcal{L}$ is $c^{-1}\cdot O_v$ for some $c\in K_v^{\times}$. Then by III.0.9.(c) in [@milne], we have $N_{\mathcal{L},a,b}\cong N_{O_v,ac^{p-1},bc^{1-p}}$. Using Remark III.7.6 and the Example after Theorem III.1.19 on page 244 of [@milne], we have $\chi(O_v,N)=\vert a\cdot c^{p-1}\vert_v^{-1}\equiv \vert a\vert_v^{-1}$ modulo squares in ${\mathbb{Q}}^{\times}$. For a scheme $S$ of characteristic $p>0$ and a scheme $X/S$, we denote by $X'$ the fibre product $X\times_S S$ where the map $S\to S$ in this product is the absolute Frobenius of $S$. By the universal property of the fibre product, we have a map $F\colon X\to X'$ called the relative Frobenius. If moreover $X/S$ is a flat group scheme, then there exists a map $V\colon X'\to X$ called the Verschiebung such that $V\circ F$ and $F\circ V$ induce $[p]$, the multiplication by $p$ (see [@SGA3], VII). In particular, $F\colon E\to E'$ is a $p$-isogeny of elliptic curves which extends to the Néron models of $E$ and $E'$ by its universal property. Since the Néron model of $E'$ is $\mathcal{E}'$, this map is just the relative Frobenius $F\colon \mathcal{E}\to \mathcal{E}'$. Over the field $K$, or more generally over any open subset $U$ in $C$ where $E$ has good reduction, Proposition 2.1 of [@ulmer_pdescent] shows that $E[F]=N_{{\underline{\omega}}^{-1},0,\alpha}$ and $E[V]=N_{{\underline{\omega}},\alpha,0}$, where $\alpha$ is the Hasse invariant of $E$ and where ${\underline{\omega}}$ is the invertible sheaf $\pi_{*} \Omega^1_{E/K}$ with $\pi\colon E \to \operatorname{Spec}(K)$ being the structure morphism. \[global\_chi\_prop\] Let $E/K$ be a non-isotrivial elliptic curve. There exists a dense open subset $U$ of $C$ such that $E$ has everywhere good ordinary reduction and $\chi(U,\mathcal{E}[F])$ is a well-defined square in ${\mathbb{Q}}^{\times}$. By the Oort-Tate classification, $E[F]/K$ is isomorphic to $N_{{\underline{\omega}}^{-1},0,\alpha}$. By Proposition B.4 in [@milne] and its proof, it extends to a finite flat group scheme ${\mathcal N}/C$ of order $p$ of the form $N_{\mathcal{O}_C(W),0,\alpha}$ for some Weil divisor $W\leqslant 0$ such that $(\alpha)\geqslant W$. Let $U_1$ be a dense open subset of $C$ over which $\mathcal{E}$ has good reduction. As in the proof of Theorem III.8.2 in [@milne] on page 291, we replace $U_1$ by a smaller open set $U_2$, over which $\mathcal{N}\vert_{U_2}\simeq\mathcal{E}[F]\vert_{U_2}$. Finally, we set $U$ equal to the open subset of $U_2$ where we have removed all places $v$ for which $E/K$ has good supersingular reduction. Write $\mathcal{N}^{D}$ for the Cartier dual of $\mathcal{N}$. By Proposition III.0.4.(c) and Remark III.0.6.(b) in [@milne], we have a long exact sequence $$\xymatrix@1{\cdots \ar[r]& {H_{\operatorname{fl},c}}^i\bigl(U,\mathcal{N}^{D} \bigr)\ar[r] & {H_{\operatorname{fl}}}^i\bigl(C, \mathcal{N}^D\bigr)\ar[r] & \prod_{v\not\in U} {H_{\operatorname{fl}}}^i\bigl(O_v, \mathcal{N}^D\bigr)\ar[r]& \cdots.}$$ Global duality (Theorem III.8.2 in [@milne]) shows that $${H_{\operatorname{fl},c}}^i\bigl(U,\mathcal{N}^{D} \bigr) = {H_{\operatorname{fl},c}}^i\bigl(U, \mathcal{E}'[V]\bigr) \quad\text{ is dual to}\quad {H_{\operatorname{fl}}}^i\bigl(U, \mathcal{E}[F]\bigr).$$ By the multiplicative property of the Euler characteristic, we get $$\chi(U,\mathcal{E}[F])=\frac{\chi(C,\mathcal{N}^D)}{\prod_{v\not\in U}\chi(O_v,\mathcal{N}^D)}.$$ Since $\mathcal{N}^{D} = N_{\mathcal{O}_C(-W), \alpha, 0}$ is finite flat of order $p$ over $C$, Lemma \[globalchi\_lem\] shows that $\chi(C,\mathcal{N}^D)$ is a square. Furthermore, Lemma \[localchi\_lem\] yields $$\chi(U,\mathcal{E}[F]) \equiv \prod_{v\not\in U}\chi(O_v,\mathcal{N}^D)^{-1} \equiv \prod_{v\not\in U}\vert\alpha\vert_v \pmod{\square}.$$ Since the places of $U$ are places of good ordinary reduction where $\vert\alpha\vert_v$ is a square by Proposition \[good\_prop\], we have, using the product formula, $$\chi(U,\mathcal{E}[F]) \equiv \prod_{v\not\in U}\vert\alpha\vert_v^{-1}\equiv\prod_{v}\vert\alpha\vert_v^{-1}=1\pmod{\square}. \qedhere$$ The Cassels-Tate pairing {#cassels-tate} ======================== Recall that there exist a pairing (proof of Theorem II.5.6 in [@milne]) called the Cassels-Tate pairing $$\langle\!\langle\cdot,\cdot\rangle\!\rangle \colon \Sha(E/K)\times \Sha(E/K)\to {}^{{\mathbb{Q}}}\!/\!{}_{{\mathbb{Z}}}.$$ As claimed in Proposition III.9.5 in [@milne] its left and right kernels are the divisible part $\operatorname{div}(\Sha(E/K))$ of the Tate-Shafarevich group. We are calling the attention of the reader to the fact that the initial proof in [@milne] is wrong as noticed by D. Harari and T. Szamuely in [@HS]. The first correct published proofs that the Cassels-Tate pairing of [@milne], Theorem II.5.6(a), annihilates only maximal divisible subgroups appear in [@HS] (for prime-to-$p$ primary components) and in [@Go] (for $p$-primary components) when the 1-motive considered in these references is taken to be ($0\to E$). This pairing is alternating and hence the order of $\Sha(E/K)_{\operatorname{div}}$ is a square. This last fact is not always true if we consider general abelian varieties. \[adjoint\_lem\] Let $\phi\colon E\to E'$ be an isogeny of elliptic curves and $\hat \phi$ the dual isogeny. Then the induced map ${\phi_{\smallSha}}\colon \Sha(E/K)\to\Sha(E'/K)$ and ${\hat{\phi}_{\smallSha}}\colon\Sha(E'/K)\to\Sha(E/K)$ are adjoints with respect to the Cassels-Tate pairings, i.e. $$\langle\!\langle{\phi_{\smallSha}}(\eta),\xi\rangle\!\rangle_{E'}=\langle\!\langle \eta,\hat{\phi_{\smallSha}}(\xi)\rangle\!\rangle_{E}$$ for every $\eta\in \Sha(E/K)$ and $\xi\in \Sha(E'/K)$. The proof is analogous to the proof in the number field case (see Remark I.6.10 in [@milne] or §2 of [@cassels]) and is deduced from the functoriality of the local pairings in flat cohomology. \[orthongal\_prop\] The orthogonal complement of $\Sha(E'/K)[V]$ in $\Sha(E'/K)[p^{\infty}]$ under the Cassels-Tate pairing $$\Sha(E'/K)[p^\infty]\times \Sha(E'/K)[p^\infty]\to {}^{{\mathbb{Q}}}\!/\!{}_{{\mathbb{Z}}}$$ is the image of $F\colon \Sha(E/K)[p^{\infty}]\to \Sha(E'/K)[p^{\infty}]$. Note that the proposition follows immediately from the previous lemma if the pairing is perfect. Else, by the previous Lemma \[adjoint\_lem\], it is immediate that $F\bigl(\Sha(E/K)[p^{\infty}]\bigr)$ is contained in the orthogonal of $\Sha(E'/K)[V]$. Let $\xi$ be an element in $\Sha(E'/K)[p^{\infty}]$ orthogonal to the kernel of $V$. Let $D'$ denote the maximal divisible subgroup of $\Sha(E'/K)[p^\infty]$ and $D$ the maximal divisible subgroup of $\Sha(E/K)[p^\infty]$. Then there is a perfect paring on the quotients $\Sha(E'/K)[p^{\infty}]/D'$ and $\Sha(E/K)[p^{\infty}]/D$. Since $V$ and $F$ map divisible elements to divisible elements, they induce maps between these quotients. $$\xymatrix{ 0 \ar[r] & D' \ar[r] \ar@<1ex>[d]^{V}& \Sha(E'/K)[p^{\infty}] \ar[r]\ar@<1ex>[d]^{V} & \Sha(E'/K)[p^{\infty}]/D' \ar[r]\ar@<1ex>[d]^{V} & 0 \\ 0 \ar[r] & D \ar[r] \ar@<1ex>[u]^{F}& \Sha(E/K)[p^{\infty}] \ar[r]\ar@<1ex>[u]^{F} & \Sha(E/K)[p^{\infty}]/D \ar[r]\ar@<1ex>[u]^{F} & 0 }$$ The element $\xi + D'$ in the quotient $\Sha(E'/K)[p^{\infty}]/D'$ is orthogonal to the kernel of $V$. Since the pairing is perfect there, we have an element $\eta$ in $\Sha(E/K)[p^{\infty}]$ such that $F$ maps $\eta+D$ to $\xi+D'$ in the quotients. Hence $F(\eta) = \xi + \delta$ for some $\delta \in D'$. But since the map $F\circ V = [p]$ is surjective on $D'$, the map $F$ maps $D$ onto $D'$. Hence $\delta$ is in the image of $F$ and so is $\xi$. The short exact sequence of finite flat group schemes $$\label{ses5_seq} 0 \to E[F]\to E[p] \to E'[V] \to 0,$$ induces, when passing to flat cohomology, the top row of the following exact commutative diagram. $$\xymatrix@R=4mm{ \dots\ar[r] & E'(K)[V]\ar[r] & {H_{\operatorname{fl}}}^1(K,E[F]) \ar[r]\ar[d] & {H_{\operatorname{fl}}}^1(K,E[p])\ar[r]^F \ar[d] & {H_{\operatorname{fl}}}^1(K,E'[V]) \ar[d] \\ & 0 \ar[r] & \prod_v {H_{\operatorname{fl}}}^1(K_v,E)[F] \ar[r] &\prod_v {H_{\operatorname{fl}}}^1(K_v,E)[p] \ar[r]^F &\prod_v {H_{\operatorname{fl}}}^1(K_v,E')[V] }$$ From the above diagram, we obtain an exact sequence $$\label{ses6_seq} \xymatrix@R=3mm{ 0 \ar[r] & E(K)[F] \ar[r] & E(K)[p] \ar[r]^{F} & E'(K)[V] \ar[r] & &\\ \ar[r] & \operatorname{Sel}_F(E/K)\ar[r] & \operatorname{Sel}_p(E/K) \ar[r]^{F} & \operatorname{Sel}_V(E'/K) \ar[r] & T \ar[r] & 0, }$$ where $T$ is the cokernel of the map induced by $F$ on the Selmer groups. Parallel to this, we have a long exact (kernel-cokerel) sequence $$\label{kcok_seq} \xymatrix@R=3mm{ 0 \ar[r] & E(K)[F] \ar[r] & E(K)[p] \ar[r]^{F} & E'(K)[V] \ar[r] &\\ \ar[r] & E'(K)/F(E(K)) \ar[r]^V & E(K)/p E(K) \ar[r] & E(K)/V(E'(K)) \ar[r] & 0, }$$ We may quotient the exact sequence  by the exact sequence , using Kummer maps in the short exact sequence . We get an alternative description of $T$ by an exact sequence. $$\label{ses7_seq} \xymatrix@1{ 0 \ar[r] & \Sha(E/K)[F]\ar[r] & \Sha(E/K)[p] \ar[r]^{F} & \Sha(E'/K)[V] \ar[r] & T\ar[r] & 0. }$$ \[T\_square\_cor\] Let $E/K$ be an elliptic curve. The order of $T$ is a square. In other words, $$\#\Sha(E/K)[F]\cdot \#\Sha(E'/K)[V] \equiv \Sha(E/K)[p] \pmod{\square}.$$ By restriction the Cassels-Tate pairing induces a pairing on $\Sha(E'/K)[V]$ with values in ${{}^{{\mathbb{Z}}}\!/\!{}_{p {\mathbb{Z}}}}$. By the previous proposition the right and left kernels of this pairing are equal to the intersection of $F\bigl(\Sha(E/K)[p^{\infty}]\bigr)$ and $\Sha(E'/K)[V]$, which is equal to $F\bigl(\Sha(E/K)[p]\bigr)$. So the pairing induces a non-degenerate alternating pairing on $T$; hence the order of $T$ is a square. \[rp\_lem\] We have $$p^{r_p} \equiv \frac{\#E(K)[F] \cdot \#\operatorname{Sel}_V(E'/K)}{\#E'(K)[V] \cdot \#\operatorname{Sel}_F(E/K)} \pmod{\square}.$$ Of course, we have $\# E(K)[F] = 1$, but we include it here so as to make the formula resemble the symmetric formula in the classical case, like in Fisher’s appendix to [@dok_nonab]. By the short exact sequence , $r_p=r+ \operatorname{corank}_{{\mathbb{Z}}_p}\Sha(E/K)[p^\infty]$, where $r=\operatorname{rank}_{{\mathbb{Z}}}(E(K))$ and $r_p$ is the ${\mathbb{Z}}_p$-rank of the dual of $\operatorname{Sel}_{p^\infty}(E/K)$. Now, since $\Sha(E/K)[p^\infty]$ is cofinitely generated as ${\mathbb{Z}}_p$-module, we have $$\dim_{{\mathbb{F}}_p} \Sha(E/K)[p] = \operatorname{corank}_{{\mathbb{Z}}_p} \bigl(\operatorname{div}\Sha(E/K) [p^\infty]\bigr) + \dim_{{\mathbb{F}}_p} \bigl( \Sha(E/K)_{\operatorname{div}} [p] \bigr)$$ As noticed at the beginning of section \[cassels-tate\], $\#\Sha(E/K)_{\operatorname{div}}$ (and therefore $\#\Sha(E/K)_{\operatorname{div}}[p]$) is a square. We deduce that $$r_p \equiv r+\dim_{{\mathbb{F}}_p} \Sha(E/K)[p] \pmod{2}.$$ On the other hand, the short exact sequence  applied to $[p]$ implies that $$\dim_{{\mathbb{F}}_p} \operatorname{Sel}_p(E/K) = r + \dim_{{\mathbb{F}}_p} E(K)[p] + \dim_{{\mathbb{F}}_p}\Sha(E/K)[p],$$ since $E(K)/pE(K) \simeq E(K)[p]\oplus ({{}^{{\mathbb{Z}}}\!/\!{}_{p {\mathbb{Z}}}})^r$. So we get the formula $$r_p\equiv \dim_{{\mathbb{F}}_p}E(K)[p] +\dim_{{\mathbb{F}}_p}\operatorname{Sel}_p(E/K) \pmod{2}.$$ The assertion results then from the exact sequence  and Corollary \[T\_square\_cor\]. Global duality ============== \[global\_duality\_prop\] Let $E/K$ be a non-isotrivial elliptic curve and let $U$ be an open subset of $C$ over which $E$ has good reduction. Then we have $$\frac{\#E(K)[F] \cdot \#\operatorname{Sel}_V(E'/K)}{\#E'(K)[V] \cdot \#\operatorname{Sel}_F(E/K)} = \frac{1}{\chi(U,\mathcal{E}[F])}\cdot \prod_{v\not \in U} z(V_{E'(K_v)}).$$ We insist once more that the roles of $F$ and $V$ here are not interchangeable, e.g. the terms $z(F_{E(K_v)})$ in the product would not be finite. The long exact sequence for flat cohomology deduced from the definition of ${H_{\operatorname{fl},c}}^i$ in Proposition III.0.4.(a) in [@milne] reads $$\xymatrix@1{\cdots \ar[r]& {H_{\operatorname{fl},c}}^i(U,\cdot)\ar[r]&{H_{\operatorname{fl}}}^i(U,\cdot)\ar[r]& \bigoplus_{v\not\in U} {H_{\operatorname{fl}}}^i(K_v,\cdot)\ar[r]& {H_{\operatorname{fl},c}}^{i+1}(U,\cdot)\ar[r]&\cdots}$$ The global duality in Theorem III.8.2 of [@milne] implies that the group ${H_{\operatorname{fl},c}}^i(U, \mathcal{E}[F])$ is dual to ${H_{\operatorname{fl}}}^{3-i}(U,\mathcal{E}'[V])$ since $\mathcal{E}[F]$ is finite and flat over $U$. We find the following long exact sequence $$\xymatrix@R-1ex{ & {H_{\operatorname{fl}}}^1\bigl(U,\mathcal{E}[F]\bigr) \ar[r]& \bigoplus_{v \not \in U} {H_{\operatorname{fl}}}^1\bigl(K_v, E[F]\bigr) \ar[r]& {H_{\operatorname{fl}}}^1\bigl(U,\mathcal{E}'[V]\bigr)^{\vee} \ar[r]& \\ \ar[r] & {H_{\operatorname{fl}}}^2\bigl(U,\mathcal{E}[F]\bigr) \ar[r]& \bigoplus_{v \not \in U} {H_{\operatorname{fl}}}^2\bigl(K_v, E[F]\bigr) \ar[r]& {H_{\operatorname{fl}}}^0\bigl(U,\mathcal{E}'[V]\bigr)^{\vee} \ar[r]& 0 }$$ Local duality as in Theorem III.6.10 in [@milne] shows that ${H_{\operatorname{fl}}}^2(K_v,E[F])$ is dual to $E'(K_v)[V]$. Our aim is to replace the local term ${H_{\operatorname{fl}}}^1(K_v,E[F])$ by the cokernel of the map from $E'(K_v)/F(E(K_v))$. By local duality (Theorem III.7.8 in [@milne] and the functoriality of biextensions), this term is dual to ${H_{\operatorname{fl}}}^1(K_v,E')[V]$. So we will quotient the term ${H_{\operatorname{fl}}}^1\bigl(U,\mathcal{E}'[V]\bigr)^{\vee}$ by the image of the map on the right hand side in the following commutative diagram. $$\label{useless_eq} \xymatrix@R=9mm{ & \bigoplus_{v \not\in U} {}^{E'(K_v)}\!/\!{}_{F(E(K_v))} \ar[r]^{\cong} \ar[d] & \bigoplus_{v \not \in U} \bigl({H_{\operatorname{fl}}}^1(K_v,E')[V]\bigr)^{\vee} \ar[d] & \\ {H_{\operatorname{fl}}}^1(U,\mathcal{E}[F]) \ar[r] & \bigoplus_{v \not \in U} {H_{\operatorname{fl}}}^1\bigl(K_v, E[F]\bigr) \ar[r]& {H_{\operatorname{fl}}}^1\bigl(U,\mathcal{E}'[V]\bigr)^{\vee} \ar[r] & \dots }$$ Because of the exact Kummer sequence $$\xymatrix@1{ 0\ar[r] & {}^{E'(K_v)}\!/\!{}_{F(E(K_v))} \ar[r] & {H_{\operatorname{fl}}}^1(K_v,E[F]) \ar[r] & {H_{\operatorname{fl}}}^1(K_v,E)[F] \ar[r] & 0. }$$ the cokernel of the map on the left in  is $\bigoplus_{v\not\in U}{H_{\operatorname{fl}}}^1(K_v,E)[F]$, which, again by local duality, is dual to $\bigoplus_{v \not \in U} E(K_v)/V(E'(K_v))$. By definition the cokernel of the map on the right in  is the dual of the Selmer group $\operatorname{Sel}_V(E'/K)$. Putting all these results together, we obtain the long exact sequence $$\xymatrix@R-2ex{ 0\ar[r] & \operatorname{Sel}_F(E/K) \ar[r] & {H_{\operatorname{fl}}}^1\bigl(U,\mathcal{E}[F]\bigr) \ar[r]& \bigoplus_{v \not \in U} \Bigl({}^{E(K_v)}\!/\!{}_{V(E'(K_v))}\Bigr)^{\vee} \ar[r] & \\ \ar[r] & \operatorname{Sel}_V(E'/K)^{\vee} \ar[r] & {H_{\operatorname{fl}}}^2\bigl(U,\mathcal{E}[F]\bigr) \ar[r]& \bigoplus_{v \not \in U} \Bigl(E'(K_v)[V]\Bigr)^{\vee} \ar[r] & \\ \ar[r] & \Bigl(E(K)[V]\Bigr)^{\vee} \ar[r]& 0 }$$ Since all other terms in the sequence are finite, the groups ${H_{\operatorname{fl}}}^i(U,\mathcal{E}[F])$ are finite, too. The alternating product of its orders gives the result. If $E/K_v$ is a non-isotrivial, semistable elliptic curve then one can show that the group scheme $\mathcal{E}[F]$ is finite and flat. So the result of Proposition \[global\_duality\_prop\] can be extended to any open subset $U$ such that $E$ has semistable reduction over all places in $U$. In particular $U$ can be taken to be equal to $C$, if $E/K$ is semistable. The proof of the $p$-parity {#pparity_sec} =========================== We now pass to the proof of Theorem \[pparity\_thm\]. We return now to our running assumptions. $K$ has characteristic $p>3$ and $E/K$ is not isotrivial. We present first the main results coming from global duality and the local computations and then we just have to put them together. But both these statements are interesting in their own right. \[parity\_corank\_thm\] Let $E/K$ be a non-isotrivial elliptic curve. We have $$p^{r_p} \equiv \prod_v z\Bigl( V_{E'(K_v)}\colon E'(K_v)\to E(K_v)\Bigr) \pmod{\square}$$ where the product runs over all places $v$ in $K$. Proposition \[global\_chi\_prop\] provides us with an open subset $U$ in $C$ such that $E$ has good ordinary reduction at all places in $U$. It follows from Lemma \[rp\_lem\], Proposition \[global\_duality\_prop\], and Proposition \[global\_chi\_prop\] that $$\begin{aligned} p^{r_p} &\equiv \frac{\#E(K)[F] \cdot \#\operatorname{Sel}_V(E'/K)}{\#E'(K)[V] \cdot \#\operatorname{Sel}_F(E/K)} \pmod{\square}\\ &= \frac{1}{\chi(U,\mathcal{E}[F])}\cdot \prod_{v\not \in U} z\Bigl( V_{E'(K_v)}\colon E'(K_v)\to E(K_v)\Bigr) \\ & \equiv \prod_{v\not \in U} z\Bigl( V_{E'(K_v)}\colon E'(K_v)\to E(K_v)\Bigr) \pmod{\square} \end{aligned}$$ Finally from Proposition \[good\_prop\], we know that $z(V_{E'(K_v)})$ is a square for all places $v \in U$ as $E$ has good ordinary reduction there. Next, we collect from section \[local\_sec\] the following result. \[rootno\_prop\] Let $E/K$ be a semistable elliptic curve. Then the root number is $w(E/K) = (-1)^s$ where $s$ is the number of split multiplicative primes for $E/K$. Furthermore $s$ has the same parity as the $p$-adic valuation of $$\prod_{v} \frac{ c_v(E/K) }{c_v(E'/K)}$$ where $c_v$ are Tamagawa numbers. From Theorem \[local\_thm\] we deduce that $$w(E/K) = \prod_v w(E/K_v) = \prod_v \sigma(E/K_v) \cdot \Bigl(\frac{-1}{L_w/K_v}\Bigr) = \prod_v \sigma(E/K_v)$$ by the product formula for the norm symbols $\prod_v \bigl(\frac{-1}{L_w/K_v}\bigr)$ with $L$ being the extension of $K$ over which $E[F]=\mu_p$ and $w$ is any place above $v$. Using the Propositions \[good\_prop\], \[split\_prop\], and \[nonsplit\_prop\], we see that $\sigma(E/K_v)$ is $-1$ if and only if $E$ has split multiplicative reduction at $v$. If the reduction at $v$ is split multiplicative, then we have $c_v(E'/K) = p\cdot c_v(E/K)$ since the parameters in the Tate parametrisation satisfy $q_{E'} = {q_E}^p$. If the reduction is non-split multiplicative then the Tamagawa numbers can only be 1 or 2. Note that we could have used the known modularity and the Atkin-Lehner operators to prove this statement without the computations in section \[local\_sec\], at least if $E$ has at least one place of split multiplicative reduction. First, we use Corollary \[toss\_cor\] which allows us to assume that $E/K$ is semistable. Then by the previous Proposition \[rootno\_prop\] we have $w(E/K) = \prod_v \sigma(E/K_v)$ and Theorem \[parity\_corank\_thm\] states that $(-1)^{r_p}= \prod_v \sigma(E/K_v)$. Local Root Number Formula {#rootno_sec} ========================= We now prove Theorem \[local\_thm\] without any hypothesis on the reduction. We use, without repeating the definitions, the notations from section \[local\_sec\]. \[local2\_thm\] Let $K$ be a local field of characteristic $p>3$. For any non-isotrivial elliptic curve $E/K$, we have $w(E/K) = \bigl(\frac{-1}{L/K}\bigr) \cdot \sigma(E/K)$. As mentioned in section \[local\_sec\] this answers positively a conjecture in [@dok_09] for the isogeny $V$. This theorem could certainly be shown by local computations only, but they would tend to be very tedious for additive potentially supersingular reduction. We can avoid this here by using a global argument. This is a similar idea as in the proof of Theorem 5.7 in [@dok_09]. By Theorem \[local\_thm\], we may assume that $E/K$ has additive, potentially good reduction. Let $n\geqslant 12$. We can find a minimal integral equation $y^2 = x^3 +A\,x + B$ for $E/K$. Choose a global field $\mathcal{K}$ of characteristic $p$ with a place $v_0$ such that $\mathcal{K}_{v_0} = K$. Choose another place $v_1 \neq v_0$ in $\mathcal{K}$ and choose a large even integer $N$ such that $(N-1)\cdot \deg(v_1) > 2g - 1 + n\deg(v_0)$, where $g$ is the genus of $\mathcal{K}$. For a divisor $D$ on the projective smooth curve $\mathcal{C}$ corresponding to $\mathcal{K}$, we write $L(D)$ for the Riemann-Roch space $H^0(\mathcal{C},\mathcal{O}_C(D))$. The inequality on $N$ guarantees that the dimensions of the Riemann-Roch spaces in the exact sequence $$\xymatrix@1{ 0 \ar[r]& L\bigl(N (v_1) - n (v_0) \bigr) \ar[r]& L\bigl(N (v_1) \bigr) \ar[r] & \mathcal{O}_{v_0}/\mathfrak{m}_{v_0}^n \ar[r]& 0 }$$ are positive – e.g. equal to $N\deg(v_1) -n\deg(v_0) + 1 -g> g+\deg(v_1)$ for the smaller space. Choose an element $a$ in $L(N (v_1))$ which maps to $A+\mathfrak{m}_{v_0}^n$ on the right. We can even impose that it does not lie in $L((N-1)(v_1))$, since this is a subspace of codimension $\deg(v_1)>0$ in $L(N(v_1))$. Then $a$ has a single pole of order $N$ at $v_1$ and it satisfies $v_0(A-a) \geq n$. Next, we use that $N$ is even and we choose an element $b$ in $\mathcal{K}$ such that $v_1(b) = -\tfrac{3}{2}N$, and $v_0(B-b)\geq n$. We can also impose that $v_1(4 a^3 + 27 b^2) > -3N$. Furthermore we impose that the zeroes of $b$ are distinct from the zeroes of $a$; this excludes at worst $N\deg(v_1)$ subspaces of codimension $1$ in $L\bigl(\tfrac{3N}{2}(v_1)\bigr)$. Let $\mathcal{E}/\mathcal{K}$ be the elliptic curve given by $y^2=x^3 +a\,x +b$. By the congruences on $a$ and $b$ at $v_0$ and the continuity of Tate’s algorithm, the reduction of $\mathcal{E}$ at $v_0$ is additive, potentially good. At the place $v_1$ the valuation of the $j$-invariant $j(\mathcal{E}) = 2^8\cdot 3^3\cdot a^3 /(4 \,a^3+27\, b^2)$ will be negative by our choices. Hence the reduction is either multiplicative or potentially multiplicative. For any other place $v$ with $v(a)>0$, we have $v(4 \,a^3+27\, b^2) = 0$ and hence the curve has good reduction at $v$, and for any other place $v$ with $v(a) = 0$, either the reduction is good or $v(j(\mathcal{E}))< 0$. Therefore we have constructed an elliptic curve $\mathcal{E}/\mathcal{K}$ with a single place $v_0$ of additive, potentially good reduction. So for all other places Theorem \[local\_thm\] applies. Let $\mathcal{L}$ be the extension of $\mathcal{K}$ such that $E[F]\cong\mu_p$ over $\mathcal{L}$. Now we use the results of Theorem \[parity\_corank\_thm\] and the proven $p$-parity in Theorem \[pparity\_thm\] to compute $$\begin{aligned} w(\mathcal{E}/K) &= \frac{w(\mathcal{E}/\mathcal{K})}{\prod_{v\neq v_0} w(\mathcal{E}/\mathcal{K}_{v})} = \frac{(-1)^{r_p}}{ \prod_{v\neq v_0}\bigl(\frac{-1}{\mathcal{L}_w/\mathcal{K}_v}\bigr) \sigma(\mathcal{E}/\mathcal{K}_{v})} \\ & = \frac{\bigl(\frac{-1}{\mathcal{L}_{w_0}/K}\bigr)}{ \prod_{\textnormal{all }v} \bigl(\frac{-1}{\mathcal{L}_w/\mathcal{K}_v}\bigr)} \cdot\frac{\prod_{\textnormal{all }v} \sigma(\mathcal{E}/\mathcal{K}_{v})}{ \prod_{v\neq v_0}\sigma(\mathcal{E}/\mathcal{K}_{v})} = \Bigl(\frac{-1}{\mathcal{L}_{w_0}/K}\Bigr)\cdot\sigma(\mathcal{E}/K). \end{aligned}$$ Once again we used the product formula for the norm symbol. Now we argue that the three terms are all continuous in the topology of $K$ as $a$ and $b$ varies: For the local root number this is exactly the statement of Proposition 4.2 in [@helfgott]. The field $\mathcal{L}_{w_0}$ and the order of the kernel $E'(K)[V]$ of Verschiebung are locally constant because they are defined by continuously varying separable polynomials. Finally, the order of the cokernel of $V\colon E'(K)\to E(K)$ is locally constant, because the group of connected components and the reduction and the induced map $V$ on them will not change and on the formal group the cokernel is determined by the valuation of the Hasse invariant (which again is a polynomial in $a$ and $b$) by the argument in the proof of Proposition \[good\_prop\]. Since all three terms take value $\pm 1$, they will eventually, for big enough $n$, be equal to the corresponding values for $E$. On the $\ell$-parity conjecture {#ell_sec} =============================== We switch now to investigating the $\ell$-parity conjecture when $\ell\neq p$. As mentioned in the introduction, we have only a partial result in this case. Recall that $p>3$ is a prime and that $K$ is a global field of characteristic $p$ with constant field ${\mathbb{F}}_q$. For any $n$ and any extension $L$ of $K$, we denote by $L_n$ the field $L\cdot {\mathbb{F}}_{q^n}$. The aim of this section is to show the following partial result (given as Theorem \[ellparity\_thm\] in the introduction). \[ell\_thm\] Let $E/K$ be an elliptic curve and let $\ell$ be an odd prime different from $p$. Furthermore assume that 1. \[a\_as\] $a=[K(\mu_{\ell}):K]$ is even and that 2. \[b\_as\] the analytic rank of $E$ does not grow by more than $1$ in the extension $K_2/K$. Then the $\ell$-parity conjecture holds for $E/K$. Note first that we believe that (\[a\_as\]) holds for roughly two thirds of the $\ell$ as $a$ is also the order of $q$ in the group $({{}^{{\mathbb{Z}}}\!/\!{}_{\ell {\mathbb{Z}}}})^{\times}$. The second condition should hold quite often as it says that the analytic rank of the twist of $E$ by the unramified quadratic character is less or equal to $1$. So for instance if $b$ as in Lemma 11.3.1 in [@ulmer_gnv] is odd, then (\[b\_as\]) holds. See the next section for a discussion about why we were not able to extend the proof here to any situation without these hypotheses. Corollary \[toss\_cor\] allows us to assume that $E$ is semistable and we may assume that $E$ is not isotrivial as for isotrivial curves even BSD is known. First we use a non-vanishing result, to produce from the analytic information a useful extension of $K$, which we want to link to the algebraic side later. We write $\mathfrak{n}$ for the conductor of $E/K$. The degree of $\mathfrak{n}$ is linked to the degree of the polynomial $L(E/K,T)$ in $T=q^{-s}$ by the formula of Grothendieck-Ogg-Shafarevich (as used in formula (5.1) of [@ulmer_analogies]): $$\deg (\mathfrak{n}) = \deg \bigl(L(E/K,T)\bigr) - 2(2g_{K} -2).$$ We can factor the polynomial to $$L(E/K,T) = (1-qT)^r \cdot (1+qT)^{r'}\cdot \prod_{i} (1-\alpha_i T)(1-\bar\alpha_i T)$$ where $\alpha_i$ are non-real, complex numbers of absolute value $q$. By definition $r$ is the analytic rank of $E/K$ and it is easy to see that $r+r'$ is the analytic rank of $E/K_2$ since the analytic rank of $E/K_2$ is the number of inverse zeroes $\alpha$ of $L(E/K,T)$ such that $\alpha^2 = q^2$. So we get $$\label{nran_eq} \sum_{v \text{ bad}} \deg(v) = \deg(\mathfrak{n})\equiv \deg \bigl(L(E/K,T)\bigr) \equiv r+r' = \operatorname{ord}_{s=1} L(E/K_2,s) \pmod{2}.$$ We are now going to use Theorem 5.2 in [@ulmer_gnv] to construct suitable extensions of $K$. The argument is very similar to the proof of Step 2 in 11.4.2 of [@ulmer_gnv]. The following is a very special case of this very general and powerful theorem. \[ulmer\_main\_thm\] Let $K$ be a global field of characteristic $p>3$, let $S$ be a finite non-empty set of places in $K$, let $\ell\neq p$ be an odd prime, and let $E/K$ be a semistable elliptic curve. Assume that $a=[K(\mu_{\ell}):K]$ is even and suppose that the sum of the degree of the bad places not belonging to $S$ is even. Then there exists an integer $n$ coprime to $a$ and a element $z\in K_n^{\times}$ such that the extension $K_n(\sqrt[\ell]{z})/K_n$ is totally ramified at all places above $S$ and unramified at all bad places not in $S$ and such that the analytic rank of $E$ does not grow in it. All notations and results in this proof refer to [@ulmer_gnv]. We use Theorem 5.2.(1) with $F=K$, $\alpha_n=q^n$, $d=\ell$, $S_r = S$ and $\rho$ the symplectically self-dual representation of weight $w=1$ attached to $E$ on the Tate module $V_{\ell}(E)$ as in section 11. We can choose the sets $S_s$ and $S_i$ arbitrarily as long as we make sure that $S$, $S_s$, and $S_i$ are disjoint. The conditions (especially from his section 3.1) are satisfied. Let $o$ be an orbit in $({{}^{{\mathbb{Z}}}\!/\!{}_{\ell {\mathbb{Z}}}})^{\times}$ for the multiplication by $q$. Then $d_{o}=\ell$ and $a_{o} = a$. So we can conclude the existence of $n$ and $z$ such that $L(\rho\otimes\sigma_{o,z},K_n,T)$ does not have $\alpha_n$ as an inverse root in 5.2.(1) unless we are in the exceptional cases (i) to (iv) in 5.1.1.1. Now, (iv) cannot hold because $\rho$ is not orthogonally self-dual and (i) and (ii) are impossible because $d=\ell$ is odd. However, all the condition in (iii) are satisfied apart from maybe the condition 4.2.3.1. (In particular, we know that $-o=o$ because $a$ is even.) We now have to show that the hypothesis on $S$ imposes that the condition 4.2.3.1 fails. Since $E$ is semistable, the local exponent of the conductor $\operatorname{cond}_v(\rho)$ is $1$. Let $v$ be a bad place in $S$ and $\chi_v$ be a totally ramified character of the decomposition group $D_v$ which has exact order $\ell$. Then the conductor $\operatorname{cond}_v(\rho\otimes\chi_v)=2$ again because $E$ has multiplicative reduction at $v$. So the first condition in 4.2.3.1 saying that this has constant parity as $\chi_v$ varies is always fulfilled. In order to make the condition 4.2.3.1 fail, we must have that $$\sum_{\text{bad }v \in S} \operatorname{cond}_v(\rho\otimes\chi_v)\deg(v) + \sum_{\text{bad } v \not\in S} \operatorname{cond}_v(\rho) \deg(v)$$ is even. That is exactly what the hypothesis in the theorem imposes. \[ellext\_lem\] To prove Theorem \[ell\_thm\], we may assume that there exists a non-constant Kummer extension $L/K$ of degree $\ell$ in which the analytic rank does not grow and such that - if the analytic rank of $E/K_2$ is even then no place of bad reduction ramifies in $L/K$, or - if the analytic rank of $E/K_2$ is odd then exactly one place of bad reduction ramifies. Moreover, in the latter case, the degree of this place is odd. If the analytic rank is even we choose the finite non-empty set of places $S$ to be disjoint from the set of bad places. If the analytic rank is odd, then the congruence  shows that there is at least one bad place $v$ of odd degree. So we choose $S$ to contain this as the only bad place. Then  shows that the hypothesis in Theorem \[ulmer\_main\_thm\] with the above choice for $S$ holds. So we have an integer $n$ and an element $z \in K_n^{\times}$. Now we use the first item in Proposition \[red\_prop\] to replace $K$ by its odd Galois extension $K_n$. So $L=K(\sqrt[\ell]{z})$ is the requested extension. We now come to the algebraic part of the argument. Using the previous two lemmata, we have now a Kummer extension $L/K$ of degree $\ell$ in which the analytic rank does not grow. The Galois closure of $L/K$ is $L_a$ containing $L_2$. We have the following picture of extensions $$\xymatrix@R-1ex@C+1.5ex{ && L_a \ar@{-}[dddll]_{\langle\sigma\rangle}^{\ell} \ar@{-}[rd]^{\langle\tau^2\rangle}_{a/2} \ar@{-}@/^3pc/[rrdd]_{a}^{\langle\tau\rangle}&& \\ &&& L_2 \ar@{.}[dddll]^{\ell} \ar@{-}[rd]_{2} & \\ &&&& L \ar@{.}[dddll]^{\ell} \\ K_a \ar@{-}[rd]_{a/2} &&&&\\ & K_2 \ar@{-}[rd]_{2}&&& \\ && K && }$$ The dotted lines are non-Galois extensions. We have written the degree under each inclusion. The Galois group $G=\operatorname{Gal}(L_a/K)$ is a meta-cyclic group generated by elements $\sigma$ and $\tau$ of order $\ell$ and $a$ respectively, with $L=(L_a)^{\tau}$. We have $$G = \bigl\langle \sigma,\tau\bigl\vert \tau^a=\sigma^{\ell} = 1, \tau\sigma\tau^{-1} = \sigma^q\bigr\rangle.$$ We list the irreducible ${\mathbb{Q}}_{\ell}[G]$-modules. By $\mathbbm{1}$ we denote the trivial representation. Fix a primitive character $\chi\colon\langle\tau\rangle \cong {{}^{{\mathbb{Z}}}\!/\!{}_{a {\mathbb{Z}}}}\cdot\tau\to {\mathbb{Q}}_{\ell}^{\times}$ that we can view as a character of $G$ by setting $\chi(\sigma)=1$. (Note that $a$ divides $\ell-1$, so $\chi$ is indeed realisable over ${\mathbb{Q}}_{\ell}$.) The non-trivial $1$-dimensional representations of $G$ are exactly the $\chi^i$ for $1\leqslant i \leqslant a-1$. There is only one non-trivial irreducible ${\mathbb{Q}}_{\ell}[\langle\sigma\rangle]$-module. It is of degree $\ell-1$. We can represent it as $\rho = {\mathbb{Q}}_{\ell}[\xi]$ where $\xi$ is a primitive $\ell$^th^ root of unity and $\sigma$ acts on $\rho$ by multiplication with $\xi$. (Over $\bar{\mathbb{Q}}_{\ell}$ is would split into the $\ell-1$ non-trivial characters of $\langle\sigma\rangle\cong{{}^{{\mathbb{Z}}}\!/\!{}_{\ell {\mathbb{Z}}}}$.) We make $\rho$ into a $G$-module by defining the ${\mathbb{Q}}_{\ell}$-linear action of $\tau$ by $\tau(\xi^j) = \xi^{qj}$ for all $0\leqslant j\leqslant \ell-2$. It is easy to see that $\rho$ is an irreducible ${\mathbb{Q}}_\ell[G]$-module of degree $\ell-1$ and in fact it is the only higher dimensional irreducible ${\mathbb{Q}}_\ell[G]$-module. (Note that $\rho\otimes\overline{\mathbb{Q}}_{\ell}$ decomposes into $\tfrac{\ell-1}{a}$ irreducibles of degree $a$ corresponding to the orbits of the multiplication by $q$ on $({{}^{{\mathbb{Z}}}\!/\!{}_{\ell {\mathbb{Z}}}})^{\times}$.) We have $${\mathbb{Q}}_{\ell}[G] = \mathbbm{1} \oplus\bigoplus_{i=1}^{a-1} \chi^i \oplus \rho^a.$$ For convenience we will denote $\chi^{a/2}$ by $\varepsilon$. The fixed field of the kernel of $\varepsilon$ is $K_2$. To announce the next lemma, we need to introduce the corrected product of Tamagawa numbers. Fix the invariant $1$-form $\omega$ on $E/K$ corresponding to the fixed Weierstrass equation. For each place $v$, write $c_v(E/K)$ for the Tamagawa number and define $$C_v(E/K,\omega) = c_v(E/K)\cdot \Biggl\vert \frac{\omega}{\omega^{o}_{v}}\Biggr\vert_v$$ where $\omega^o_v$ is a Néron differential for $E/K_v$. The global product over all places $v$ of $K$ $$C(E/K) = \prod_v C_v(E/K,\omega)$$ is no longer dependent on the choice of $\omega$ by the product formula. For any irreducible ${\mathbb{Q}}_\ell[G]$-module $\psi$, write $m_{\psi}$ for the multiplicity of the $\psi$-part of the $\ell$-primary Selmer group $\operatorname{Sel}_{\ell^{\infty}}(E/L_2)$. We have $$m_{\mathbbm{1}} + m_{\varepsilon} + m_{\rho} \equiv \operatorname{ord}_{\ell} \Biggl( \frac{C(E/L_2)}{C(E/K_2)} \Biggr) \pmod{2}.$$ We are interested in the following relation between permutations representations (in the terminology of Dokchitsers’ work, say 2.3 in [@dok_modsquares]) $$\Theta = 2 \cdot G + \langle \tau^2 \rangle - 2 \cdot \langle \tau\rangle - \langle \sigma,\tau^2\rangle$$ corresponding to the equality of $L$-functions $$L(E/K,s)^2 \cdot L(E/L_2,s) = L(E,\mathbbm{1},s)^3 \cdot L(E,\varepsilon,s)\cdot L(E,\rho,s)^2 = L(E/K_2,s) \cdot L(E/L,s)^2.$$ It can be seen that the regulator constants (as defined in 2.11 of [@dok_modsquares]) satisfy $$C_{\Theta}(\mathbbm{1})\equiv C_{\Theta}(\varepsilon)\equiv C_{\Theta}(\rho)\equiv\ell\pmod{\square}$$ in ${\mathbb{Q}}^{\times}$ modulo squares. For $\mathbbm{1}$ and $\varepsilon$ this is straightforward; for $\rho$ we best use Theorem 4.(4) of [@dok_reg] with $D=\langle\tau\rangle$, implying that $$C_{\Theta}(\rho)\cdot C_{\Theta}(\mathbbm{1}) = C_{\Theta}\Bigl({\mathbb{Q}}_\ell[G/\langle\tau\rangle]\Bigr) = 1.$$ So $S_{\Theta} = \{\mathbbm{1},\varepsilon,\rho\}$ in Dokchitsers’ notation in [@dok_sd]. In short everything looks just like if $L_2/K$ were a dihedral extension (which it is not unless $a=2$). For $a=2$ this is computed in Example 1 in [@dok_reg] and Example 4.5 in [@dok_modsquares] and Example 3.5 in [@dok_sd]. For $a=\ell-1$, this is Example 2.20 in [@dok_modsquares] and Example 3.6 in [@dok_sd]. Now, Theorem 1.6 in [@dok_sd] shows that $$m_{\mathbbm{1}} + m_{\varepsilon} + m_{\rho} \equiv \operatorname{ord}_{\ell} \Biggl( \frac{C(E/K)^2\cdot C(E/L_2)}{C(E/L)^2\cdot C(E/K_2)} \Biggr) \pmod{2}$$ which proves the lemma. \[fracc\_lem\] Suppose that no bad place ramifies in $L/K$, then the $\ell$-adic valuation of the integer $C(E/L_2)/C(E/K_2)$ is even. If there is only one bad place that ramifies in $L/K$ and this place is of odd degree, then the $\ell$-adic valuation of $C(E/L_2)/C(E/K_2)$ is odd. The more general statement for $a=2$ can be found in Remark 4.18 in [@dok_modsquares]. Let $v$ be a place of $K_2$. Write $y$ for $\omega/\omega^o_v$. Then $$\frac{\prod_{w\mid v} C_w(E/L_2,\omega)}{C_v(E/K_2,\omega)} = \frac{\prod_{w\mid v} c_w(E/L_2)}{c_v(E/K_2)}\cdot \frac{\prod_{w\mid v} \vert y \vert_w}{\vert y \vert_v} \equiv \frac{\prod_{w\mid v} c_w(E/L_2)}{c_v(E/K_2)} \pmod{\square}$$ because $\prod_{w\mid v} \vert y \vert_w / \vert y \vert_v = \vert y \vert_v^{\ell-1}$ is a square. If the place $v$ is unramified, then the type of reduction and the Tamagawa number do not change and we have $$\frac{\prod_{w\mid v} c_w(E/L_2)}{c_v(E/K_2)} = \begin{cases} c_v(E/K_2)^{\ell-1} \quad\ & \text{ if $v$ decomposes in $L_2/K_2$ and}\\ 1 & \text{ if $v$ is inert.} \end{cases}$$ In either case it is a square. If the reduction is good at $v$ then $c_w(E/L_2) = c_v(E/K_2) = 1$. This proves the first case. Suppose now $v$ is a place in $K_2$ which lies above a place of odd degree in $K$ and which ramifies in $L_2/K_2$. Then the place is inert in $K_2/K$ and hence the reduction of $E/K_2$ at $v$ is necessarily split multiplicative. Let $q$ be the Tate parameter of $E$ at $v$. Then $c_v(E/K_2) = v(q)$ and $c_w(E/L_2) = w(q) = \ell\cdot v(q)$ for the place $w$ above $v$. So the quotient is $\ell$ which has odd $\ell$-adic valuation. This proves the second statement. Finally we can finish the proof of Theorem \[ell\_thm\]. By construction, we have $\operatorname{ord}_{s=1} L(E,\rho,s) = 0$. As in the proof of Proposition \[red\_prop\], this implies that $m_{\rho} = 0$; in fact $L(E,\rho,s)$ is $L(B/K,s)$ for the extension $L/K$. So the last two lemmata show that $m_{\mathbbm{1}}+m_{\varepsilon}$, which is the corank of the $\ell$-primary Selmer group $\operatorname{Sel}_{\ell^{\infty}}(E/K_2)$, has the same parity as the analytic rank of $E/K_2$. This proves the $\ell$-parity conjecture for $E/K_2$. Assumption (\[b\_as\]) and Proposition \[red\_prop\] prove that the $\ell$-parity holds over $K$, too. Failure to extend {#fail_sec} ================= Although it is not usual to write in a mathematical article about unsuccessful attempts to prove a result, we wish to include in this last section a short explanation of why we were unable to extend the proof in the previous section. We hope this might be the starting point for a complete proof of the $\ell$-parity conjecture. We try to outline here the missing non-vanishing result for $L$-functions, which might be accessible using automorphic methods. The main ingredient for proving Theorem \[ell\_thm\] was the existence of a Kummer extension of degree $\ell$ in which the analytic rank does not grow. Moreover this extension was linked in a “non-commutative way” to an even abelian extension. The machinery using representation theory set up by Tim and Vladimir Dokchitser is then sufficient to prove the parity. First, if condition (\[b\_as\]) in Theorem \[ell\_thm\] does not hold but condition (\[a\_as\]) still holds, then there is no hope that a Kummer extension will do. In order to obtain a Galois extension of $K$ from a Kummer extension, we need to make the extension $K_2/K$. But without any control about the growth of the analytic rank in this quadratic extension, we do not know how to prove the $\ell$-parity over $K$. With some extra work, one can conclude that the $\ell$-parity conjecture holds for $E/K_2$. In this case, we would need a non-vanishing result for an extension of $K$ of degree dividing $\ell$ which is not a Kummer extension. Suppose now that the condition (\[a\_as\]) does not hold. Then we would need to find the “dihedral” extension somewhere else. The Proposition \[ell\_non\_prop\] below formulates this in a positive way. \[ell\_non\_prop\] Suppose $E/K$ is semi-stable and non-isotrivial. Let $F/K$ be a quadratic extension such that the analytic rank of $E$ grows at most by $1$ in $F/K$ and the analytic rank of $E/F$ is even. Assume 1. $a=[F(\mu_{\ell}):F]$ is odd and 2. there exists an odd $n\geqslant 1$ and a $z\in F_n^{\times}$ with the property that $L=F_n(\sqrt[\ell]{z})$ is an extension of degree $\ell$ of $F_n$ such that $L_a/K_{an}$ is a dihedral extension, no bad place of $E/F_n$ ramifies in $L/F_n$, and the analytic rank of $E$ does not grow in $L/F_n$. Then the $\ell$-parity conjecture holds for $E/K$. Remark that there is a large supply of quadratic extensions $F/K$ by Theorem 11.2 in [@ulmer_gnv]. The main problem here seems to find the extension $L_a/F_{an}$. Theorem 5.2 in [@ulmer_gnv] provides us with many extensions that satisfy all the properties except that we can not guarantee that $L_a/K_{an}$ is dihedral. We first had hopes that Ulmer’s proof could be adapted to enforce that $L/K_{n}$ is dihedral. In the notations of [@ulmer_gnv], we may sketch the problem. Let $D$ be a divisor of large degree as in section 6.2. Then the density (as $n$ grows) of elements in the Riemann-Roch space $H^1(\mathcal{C}\times {\mathbb{F}}_{q^n}, \mathcal{O}(D))$ which give rise to a dihedral extension of $F_n$ with respect to the fixed quadratic extension $F/K$ will be tending very fast to 0. So we would need to modify the parameter space $X$ and it is not clear how to find a nice variety parametrising such dihedral extensions. This is very similar to the proof of Theorem \[ell\_thm\]. By Proposition \[red\_prop\], we may assume that $a=1$ and $n=1$. So $L/K$ is a dihedral extension with group $G$. Let $\rho$ be the irreducible ${\mathbb{Q}}_{\ell}[G]$-module of degree $\ell-1$ and let $\varepsilon$ the character corresponding to the quadratic extension $F/K$. The usual relation of induced representation $\Theta$ for $G$, as in Example 3.5 in [@dok_sd], yields the congruence $$m_{\mathbbm{1}} + m_{\varepsilon} + m_{\rho} \equiv \operatorname{ord}_{\ell}\Bigl(\frac{C(E/L)}{C(E/F)}\Bigr) \pmod{2}.$$ We have $m_{\rho} = 0$ and from Lemma \[fracc\_lem\], we know that the assumption that no bad place ramifies in $L/K$ implies that $\frac{C(E/L)}{C(E/F)}$ has even $\ell$-adic valuation. This implies that $m_{\mathbbm{1}} + m_{\varepsilon}$ is even, i.e. the $\ell$-parity is valid for $E/F$. By Proposition \[red\_prop\] implies that the $\ell$-parity also holds for $E/K$. Acknowledgements {#acknowledgements .unnumbered} ================ We express our gratitude to Tim and Vladimir Dokchitser, Jean Gillibert, Christian Liedtke, James S. Milne, Takeshi Saito, Ki-Seng Tan, Douglas Ulmer, and the anonymous referee for useful comments on the preliminary versions of this paper.
Extraterrestrial Altruism examines a basic assumption of the Search for Extraterrestrial Intelligence (SETI): that extraterrestrials will be transmitting messages to us for our benefit. This question of whether extraterrestrials will be altruistic has become increasingly important in recent years as SETI scientists have begun contemplating transmissions from Earth to make contact. Technological civilizations that transmit signals for the benefit of others, but with no immediate gain for themselves, certainly seem to be altruistic. But does this make biological sense? Should we expect altruism to evolve throughout the cosmos, or is this only wishful thinking? Is it dangerous to send messages to other worlds, as Stephen Hawking has suggested, or might humankind benefit from an exchange with intelligence elsewhere in the galaxy? Would extraterrestrial societies be based on different ethical principles, or would we see commonalities with Earthly notions of morality? Extraterrestrial Altruism explores these and related questions about the motivations of civilizations beyond Earth, providing new insights that are critical for SETI. Chapters are authored by leading scholars from diverse disciplines—anthropology, astronomy, biology, chemistry, computer science, cosmology, engineering, history of science, law, philosophy, psychology, public policy, and sociology. The book is carefully edited by Douglas Vakoch, Director of Interstellar Message Composition at the SETI Institute and professor of clinical psychology at the California Institute of Integral Studies. The Foreword is by Frank Drake. This interdisciplinary book will benefit everybody trying to understand whether evolution and ethics are unique to Earth, or whether they are built into the fabric of the universe. - Über die Autor*innen - Douglas A. Vakoch, Ph.D., is Director of Interstellar Message Composition at the SETI Institute, as well as Professor of Clinical Psychology at the California Institute of Integral Studies. He serves as chair of both the International Academy of Astronautics (IAA) Study Group on Interstellar Message Construction and the IAA Study Group on Active SETI: Scientific, Technical, Societal, and Legal Dimensions. Through his membership in the International Institute of Space Law, Dr. Vakoch examines policy issues related to interstellar communication. His research spans the fields of psychology, anthropology, environmental studies, and space sciences, and his books include Psychology of Space Exploration: Contemporary Research in Historical Perspective (NASA, 2011); Communication with Extraterrestrial Intelligence (SUNY Press, 2011); Ecofeminism and Rhetoric: Critical Perspectives on Sex, Technology, and Discourse (Berghahn Books, 2011); Feminist Ecocriticism: Environment, Women, and Literature (Lexington Books, 2012); Altruism in Cross-Cultural Perspective (Springer, 2013); On Orbit and Beyond: Psychological Perspectives on Human Spaceflight (Springer, 2013); Archaeology, Anthropology, and Interstellar Communication (NASA, 2013); and Astrobiology, History, and Society: Life Beyond Earth and the Impact of Discovery (Springer, 2013). - Stimmen zum Buch - From the book reviews: “This volume, edited by Vakoch (SETI Institute; California Institute of Integral Studies) is an unusual collection of 19 articles by researchers in diverse fields such as anthropology, astrophysics, history of science, engineering, computer science, environmental science, psychology, philosophy, nuclear warfare, and dolphin research. … This book gives a broad perspective on the human condition and will be enjoyable to readers with a wide range of interests. Summing Up: Highly recommended. All academic, general, and professional readers.” (T. Barker, Choice, Vol. 52 (4), December, 2014) - Inhaltsverzeichnis (19 Kapitel) - - Cosmic Evolution, Reciprocity, and Interstellar Tit for Tat Seiten 3-22 - Extraterrestrial Intelligence: Friends, Foes, or Just Curious?
https://www.springer.com/de/book/9783642377495
In addition to choral polyphony, at the beginning of the 17th century there was the type of composition that had emerged in Italy around 1590 as solo singing with basso continuo (monody). The new composition technique formed the basis for the genres opera (recitative, aria), oratorio, passion and lied and already features the motets by H. L. Haßler. But the practice of figured bass soon penetrated instrumental music as well. H. Schütz had studied the new kind of music in Italy; he transplanted her to Germany and gave her in his vocal compositions (Madrigals, motets, “Christmas history”) such a high degree of language-related expressiveness that he was called the “father” of all German musicians. Schütz probably also composed the lost first German-language opera “Dafne” (1627) based on a libretto by M. Opitz. In the new style, J. H. Schein also created German madrigals and sacred concerts, J. Crüger, A. Krieger, H. Albert and others. their spiritual and worldly songs. German organ music also developed in the form of chorale arrangements and chorale preludes, carried out by S. Scheidt, a student of the Dutchman J. P. Sweelinck, J. J. Froberger, a student of the Italian G. Frescobaldi, in the following generation of D. Buxtehude, J. Pachelbel and G. Böhm, who no longer studied abroad. They include genres such as Toccata and Passacaglia as well as arrangements of Protestant hymns, the preliminary stages of Bach’s chorale preludes. The German opera, ambitious in numerous duo-elected principalities, but often cultivated with only temporary success, had its first heydayin Hamburg under R. Keizer and then under G. P. Telemann. The focus of the instrumental music was the (genuinely French) suite with its sequence of movements Allemande – Courante – Sarabande – Gigue; it was enriched by adding further stylized dance movements. The suite was often preceded by asonata, a prelude or an overture. From this tradition grew the work of J. S. Bach, which encompasses almost all forms and genres of piano and organ, orchestral and chamber music as well as cantatas and choral compositions (passions, “Christmas Oratorio”). Bach’s encounter with the orchestral music of A. Corellis and A. Vivaldis had an effect in the works of his years as Kapellmeister in Koethen (1717–23), for example in the six ” Brandenburg Concerts “. Bach’s instrumental art also influenced his vocal work, which has come to the fore since he took over the Thomaskantorat in Leipzig (1723): although his vocal compositions often have an instrumental structure. Bach’s speculative late work can be seen as a sum of baroque compositions. An example of Bach’s ability to take up typical compositional techniques from other countries is the second part of his “piano exercise”, which combines a “French” overture with an “Italian” concerto; A little later J. J. Quantz was to define the priority of “German” musical art over the cultures of other nations, which is evident in such compositional adaptation and exaggeration, as “mixed taste”. Less pronounced than Italian music, which is characterized by its melos, or the elegance of French, German music was supposed to assert its own right through manual effort, later expressed in the concept of compositional work. The problem of associating a German national style with the names of “great” composers is shown by the example of G. F. Handel, who came from Halle and worked in London from 1710 until his death (1759), where Italian opera flourished led. “German” is just as little in his operas as in his church music, and the attempt to capture him as an English national composer on the basis of his oratorios such as the Messiah, which he composed from 1737 onwards, succeeded only through acclamation, but not through proof of the musical text. On the basis of an intensive music-theoretical reflection, a wealth of basic, canonical textbooks emerged during this time, such as B. the figured bass school by J. D. Heinichen (1711), the contrapuntal textbook “Gradus ad Parnassum” by J. J. Fux(1725), the first German music lexicon by J. G. Walther (1732) and, as a comprehensive picture of the music practice at that time, “The perfect Kapellmeister” by J. Mattheson (1739).
https://www.thenailmythology.com/german-music-part-ii/
Program: Brahms: "Tragic" Overture Violin Concerto Symphony No. 1 By Fred Granlund After weeks of sonic spectaculars that seemed designed to show off the sensational sound of the orchestra--music by Stravinsky, Revueltas, Respighi and Richard Strauss--an evening devoted entirely to music by Johannes Brahms seemed like a bracing return to serious symphonic fare. But it certainly wasn't any less spectacular than the showy programs of recent months, as the orchestra under guest conductor Marin Alsop showed the same power and polish as before, along with the concentration and finesse to meet Brahms' "serious" demands. Marin Alsop is the first woman ever engaged as the Music Director of a major symphony orchestra in the US (or anywhere else, for that matter). She is now in her second season leading the Baltimore Symphony, after previous appointments with the Colorado Symphony and the Bournemouth Symphony in England. She continues to lead the Cabrillo Music Festival here in California and is a busy guest conductor with orchestras all over the world, where she was reputedly the first woman ever to conduct the La Scala Opera Orchestra in 230 years. For the past several years, she has been recording the music of Brahms with the London Philharmonic Orchestra for Naxos Records, a project clearly responsible for tonight's program. And it's good to report that unlike many of her respected older colleagues, she doesn't merely accept the standard reading of a deep and complex score like the First Symphony, but approaches it with imagination and willingness to let the music lead her on its own path. Which means that her interpretation is a work in progress, changing and refining with her relationship to the music, with unfamiliar details already emerging from the depths and others still to come. For example, she allows the tempo to relax for the mysterious development section of the first movement, but snaps back to the original tempo before the buildup to the real climax 22 bars later--a missed opportunity that will surely be corrected as her concept of the movement matures. Other moments of real insight, and occasional opportunities for further refinement, occur throughout the Symphony, and it will be fascinating to watch it all evolve. Her "Tragic Overture" is still in a more embryonic stage, its expression of raw emotions--far more immediate than anything in the Symphony--still rather muted and awaiting further unveiling. The Violin Concerto is, of course, less the conductor's piece than the soloist's, though a meeting of the minds (and hearts) is certainly a step toward a great performance. Nikolaj Znaider clearly has a firm view of the work, emotionally generous and warmly reflective. One suspects conductor Alsop might have preferred a more direct approach--at this stage in her work, at least--but she backed her soloist to the limit, and missed only a few opportunities to make even grander statements when on her own in the "tutti" sections. Not surprisingly, Ariana Ghez made the passionate oboe solo that opens the slow movement a whole musical experience in itself, to the obvious appreciation of both conductor and soloist. Also quite expectedly, the Disney Hall audience was wildly enthusiastic about it all. Even the serious stuff gets them excited. The Philharmonic subscription season is on "hold" for the holidays, with various seasonal programs filling in at Disney Hall. The regular concerts resume January 10th when Music Director Esa-Pekka Salonen returns to conduct an assortment of works from Mozart and Brahms to Stavinsky and Janacek (and the premieres of several new works commissioned by the Philharmonic). Tickets will be scarce for many concerts, but well worth tracking down. Maestro Salonen's final season with the Philharmonic is, indeed, turning out to be a real celebration.
http://www.dtodos.org/MarinAlsop.html
Accelerating poverty and inequality reduction will require a combination of policies that promote inclusive growth through boosting access to education and skilled jobs creation, according to a recently released report produced jointly by the World Bank, South Africa Department of Planning, Monitoring and Evaluation (DPME) and Statistics South Africa (Stats SA). The report, Overcoming Poverty and Inequality in South Africa: An assessment of Drivers, Constraints and Opportunities, documents the progress the country has made in dealing with poverty and inequality since the dawn of democracy in 1994. It provides an analysis of the different forms of poverty and inequality drivers and constraints, as well as opportunities presented particularly by the labor market. Where applicable, South Africa is compared to peers in terms of income levels. “Government has a huge interest in finding effective and sustainable solutions to the problems of poverty and inequality in our country,” Dr. Nkosazana Dlamini-Zuma, minister in the Presidency for Planning, Monitoring and Evaluation, said during the recent report launch. The report comes at a time where the country is facing the triple challenge of persistently high poverty, inequality and unemployment, despite much progress made by the government in tackling this challenge since 1994. In 2015, 55% of the population South Africans were poor, living below the national upper-bound poverty line of ZAR 992 per person/per month. In addition, with a per capita consumption Gini coefficient of 0.63 in 2015, South Africa is one of the most unequal countries in the world. Furthermore, unemployment reached 27.7% in the third quarter of 2017. The report finds that although poverty in South Africa has fallen since 1994, it remains high for an upper middle-income country at 18.8% in 2015, when using the international poverty line of $1.90 per day. In contrast, per capita consumption inequality is stubbornly high and has increased since 1994. Not only does South Africa lag its peers on levels of inequality and poverty, the report notes that it also lags peers on the inclusiveness of consumption growth. The consumption expenditure growth of the bottom 40% of the population between 2006 and 2015 was lower than that of the total population and below growth in other middle-income countries. Use of different dimensions of inequality shows that, by any measure, South Africa is one of the most unequal countries in the world. Wealth inequality is very high in South Africa, even higher than consumption inequality, and has been growing over time, the report shows. The richest top 10%account for 71% share of household wealth, while the bottom 60% account only for 7% of the net wealth, according to the report. Similar statistics for Organisation for Economic Co-operation and Development (OECD) countries suggest that, on average, the top 10% of the wealthiest households own 50% of total wealth, while the bottom 60% own only 13%. Ownership of financial assets features prominently among the factors that influence wealth inequality, the report says, and race and human capital (education) have very high returns for wealth generation, even higher than in the case of income or consumption inequality. The report also finds that wage inequality is also very high, compounded by heavy polarization between two extremes. South Africa’s obstinately high wage gaps are associated with the skills premiums and differences between unskilled, semi-skilled, and high-skilled workers. The report argues that South Africa has a skills mismatch and a structural unemployment problem with many workers who do not possess the skills employers demand. This has resulted in high demand for high-skilled workers and the subsequent increase in their wages while the wages for semi-skilled workers has stagnated, leading to a tremendous wage polarization and the emergence of a “missing middle” which has contributed to the increase in wage inequality. According to simulations done in this study, at the current economic growth trajectory of 0.3% in 2016/2017, South Africa will not create sufficient jobs to reach its target outlined in the National Development Plan to eliminate poverty and inequality by 2030. The report calls for interventions that simultaneously stimulate growth and reduce inequalities, arguing that they are likely to have much more impact than interventions that only stimulate growth or only reduce inequalities. The report also shows that the nature of drivers of poverty and inequality has changed over time with the role of skills and labor market factors growing in importance while the role of gender and race, though still important, having declined. Labor market incomes were an important source of poverty reduction between 2006 and 2015 with 58.3% of the poverty falling due to the labor income increase. Furthermore, the report notes an improvement in skills and education were instrumental for poverty reduction in South Africa, although returns to education, especially to the semi-skilled occupations, have been decreasing in recent years.
https://www.tralac.org/news/article/12929-access-to-education-skilled-jobs-creation-can-accelerate-poverty-reduction-and-inequality-in-south-africa.html
Alabama Academy of Science Symposium, 2006 "Southeastern Society for Environmental Toxicology and Chemistry" Annual Meeting, Troy University. The use of cryo-preserving embryos of Amphibians could be useful in toxic testing. This research focused on the evaluation of cryo-protection on Xenopus embryos. Five solutions (2 different kinds of ethylene glycol, Galactose, DMSO, and PVP) were used as cryo-protection. Twenty embryos were used for each treatment. For each treatment, embryos were placed in a Petri dish containing 8ml of the cryo-protection solution plus one control solution for 5 minutes. . Twenty embryos were placed into 8M of ethylene glycol than replaced into 2M of ethylene glycol. The same amount of embryos was placed into galactose, DMSO and PVP. Then the embryos were placed into plastic straws capped with parafin. Those straws were then placed in a -20[degrees]C freezer until thaw. After 3 days, the embryos were unfrozen by swirling them gently into a water bath for about one minute. They were then placed into a Petri dish containing control solution, and observed. Embryos in the DMSO, galactose, and ethylene glycol lysised. For the PVP, nineteen of those embryos were recognizable but had some deformation. Thirty minutes later, the eggs started to reshape. Some cells were alive but not the embryos. The PVP was seen to be the best cryo-protection but more tests including toxicity testing need to be done. This experiment was supported by the Alabama Academy of Science research award. ANALYSIS OF ALKYLPHENOLS IN WASTEWATER USING SOLID-PHASE EXTRACTION AND GAS CHROMATOGRAPHY/MASS SPECTROMETRY. Yassin A. Jeilani, Bianca M. Coley and Victor M. Ibeanusi, Spelman College, Environmental Science and Studies, Atlanta, GA 30314. Interest in the health effects associated with alkylphenols has made the analysis in environmental matrices a priority. Solid-Phase Extraction (SPE) method was developed for the extraction of selected alkylphenols in wastewater followed by derivatization and analysis by gas chromatography/mass spectrometry in single ion monitoring mode. The analytical method was used in the analysis of influent and effluent samples collected from a local wastewater treatment plant. The effect of sample pH, SPE sorbent and sample volume used in the extraction were compared in terms of recovery data. PHYTOTOXICITY OF MONOMERIC AND POLYMERIC ALUMINUM TO NATIVE WETLAND PLANT SPECIES. Ivan Stefanov and Marina Koether, Department of Chemistry and Biochemistry, Kennesaw State University, Kennesaw, GA 30144. Heather Sutton, Department of Biological and Physical Sciences, Kennesaw State University, Kennesaw, GA 30144. The most commonly used coagulant for the treatment of drinking water is aluminum sulfate (alum). The aluminum (Al) species in alum is the monomeric species A[l.sup.3+] (Al([H.sub.2]O[).sub.6.sup.3+]). However, polymeric Al coagulants such as polyaluminum chloride used to treat drinking water may contain up to 10% of the Al as the polymeric species, A[l.sub.13] [.sup.7+] ([Al[O.sub.4]A[l.sub.12](OH[).sub.24]([H.sub.2]O[).sub.12].sup.7+]). These Al species can enter the environment through the land farming of the aluminum hydroxide sludge produced during the sedimentation process in the treatment of drinking water. Aluminum in this sludge can then enter waterways and wetlands through leaching or runoff. The toxicity of Al [.sub.13.sup.7+] in the environment relative to Al [.sup.3+] is in question. The goal of this study was to investigate the relative toxicity to wetland plants of Al [.sub.13.sup.7+] as compared to Al [.sup.3]. Native wetland plant species tested were swamp milkweed (Asclepias incarnata) and saw-tooth sunflower (Helianthus grosseserratus). Additionally, radish (Raphanus sativus) was tested, as it is an agricultural species commonly used as a surrogate in place of native plants. Concentrations ranging from 0 to 500mg/L were evaluated. Endpoints measured were shoot and root length and mass, as well as internal plant concentrations of aluminum and various nutrients. Despite high variability in the data, a number of patterns emerged. Radish showed more differences in response between the two aluminum species than the native plant species did. With some of the internal plant aluminum or nutrient concentrations, the two aluminum species caused a different pattern of response. MOLECULAR ANALYSES OF THE EFFECTS OF PERCHLORATE CONTAMINATION TO ARABIDOPSIS, SORGHUM, AND TOBACCO PLANTS. Mijitaba Hamissou and Ray Dunkerley. Jacksonville State University, Jacksonville, AL 36265 Perchlorate is a highly water soluble anion that moves through ground and surface waters, accumulating rapidly in the environment. It is used as an oxidizer in solid propellants, ballistics, in rocket and missile fuels, fireworks, munitions. Lakes and underground waters near rocket-assembly plants and military bases were shown to have high level of perchlorate. When released into the environment, perchlorate becomes an environmental pollutant posing immunotoxic conditions in animals and possibly in plants. The toxic effects of most pollutants are believed to be exerted on key metabolic enzymes, on photosynthetic apparatus, on growth, yield and quality. The objectives of this research are to determine the effects of perchlorate contamination on the plants' photosynthetic abilities and to investigate the involvement of perchlorate in oxidative stress induction in Arabidopsis thaliana, sorghum bicolor, and Nicotiana tobaccum. Plants were grown and maintained in potted soil in a growth chamber and then screened for toxicological responses when challenged with perchlorate solutions. Chloroplasts were isolated by differential centrifugation and assayed for the light reactions of photosynthesis. Isolated cytoplasmic proteins and chloroplasts were assayed for SOD activities. Plant growth, biomass accumulation were also recorded. The data showed that sorghum and tobacco responded to perchlorate by shifting to underground growth. Higher SOD activities and reduced NADP[H.sub.2] were also recorded in perchlorate treatments. CONTAMINATED WATERSHEDS NEAR THE ANNISTON, AL. MONSANTO SITE EXAMINED BY USE OF THE FETAX ASSAY AND DEVELOPMENT OF ADDITIONAL DEVELOPMENTAL TOXICITY ASSAYS. Roger Sauterer, Dept. Of Biology, Jacksonville State University, Jacksonville, AL 36265 Waters and soils in Anniston, AL are contaminated by PCB-laden runoff from landfills at the local Monsanto plant. Despite clean-up efforts, soils, waters and the blood of local residents still have elevated levels of PCBs. In order to assess the effects of current PCB contamination on aquatic organisms, we are analyzing the development of the frog Xenopus laevis when exposed to control solutions, waters and aqueous sediment extracts from streams near the Monsanto site using both the standard Frog Embryo Teratogenesis Assay--Xenopus (FETAX) and extended incubations of frog embryos in control solutions and test samples. The standard FETAX assay shows subtle but significant growth inhibition in embryos exposed to contaminated waters and sediment extracts, though mortality and malformation rates are not affected. Because anuran embryos are relatively insensitive to the effects of PCBs and dioxins during the first five days of development and become more sensitive later, we are developing an extended modification of the FETAX assay where embryos are exposed to samples for two weeks or more. Preliminary results indicate embryos raised in contaminated Snow Creek water for 24 days show significant growth inhibition compared to the controls. We are continuing extended incubation assays over the first 2-4 weeks of development and are plan to develop a similar assay using zebrafish as a new model organism. GERONTOGENE EFFECTS ON THE RESISTANCE OF NEMATODES TO HYDROGEN PEROXIDE OR NICKEL TOXICITY. Jeffrey Zuiderveen, Joanne Brown, Dept. of Biology, Columbus State Univ., Columbus, GA 31804 and Aisha Kelly, Ga. Perimeter College, Conyers, GA 30012. Gerontogenes are genes that, when mutated, cause an increase in the lifespan of the organisms beyond that of the wild-type. Several of these genes have been identified in the nematode Caenorhabditis elegans. Among these are the clk-1 and the daf-2 mutations. Although they affect separate pathways, nematodes with either one of these mutations will live twice as long as the wild-type, and those with both mutations have double the longevity of the single mutations. To investigate the gerontogene effects on toxicity, nematodes were subjected to varying concentrations of toxicants (hydrogen peroxide, nickel chloride) that utilized different mechanisms of toxicity. Survival was observed for 1-2 weeks, depending on the toxicant. Results seemed to indicate that these mutations tended to make the nematodes slightly less susceptible to hydrogen peroxide, but quite a bit more sensitive to nickel. Therefore, while these gene mutations may possibly seem desirable to researchers who seek a "Fountain of Youth" for humans, the nickel tests should give pause if those striving for greater longevity don't wish to live in a closed environment. COMPARATIVE ACUTE TOXICITY OF HEAVY METALS TO DRAGONFLY LARVAE. Valerie Tollett and Timothy Rice, Dept. of Biology, Univ. of S. Ala., Mobile, AL 36688. Dragonflies (Insecta: Odonata) occupy an important position in aquatic ecosystems, serving as both predator and prey throughout their life cycle. These natural history features create the potential for long term exposure to toxicants from a variety of sources. Despite their importance in aquatic ecosystems, there is little field or laboratory data regarding the impact that environmental chemicals have no odonates. To determine the impact of heavy metals on dragonfly larvae, acute toxicity tests were conducted in the laboratory. Larvae measuring 5-10mm were collected from the field and held in a circulating, filtering system for one week. The species, Pachydiplax longipennis, was chosen for this study due to their abundance and wide distribution. Seven day acute toxicity tests were conducted to compare the effects of equimolar concentrations (0, 0.04, 0.35, 0.89, 2.2mM) of lead, copper and cadmium. Using immobility as the endpoint, the larvae exhibited a high tolerance to cadmium and lead, but high levels of mortality to copper. This species of odonate appears to be extremely resistant to metals compared in general to other common aquatic test species (e.g. Daphnia, Chironomus, Rana, Xenopus). High resistance to metal pollution could make odonate larvae a potential indicator of poor water quality in contaminated habitats. Their ability to withstand and potentially accumulate high levels of metals might also put their predators at risk from ingestion of contaminated larvae or adults. LEAD ASSESSMENT WITHIN THE SOIL, WATER, AND VEGETATION IN SHOOTING RANGES AT THE GRAND BAY NERR. Katherine E. VanDeven and Timothy Rice, Dept. of Biology, University of South Alabama, Mobile, AL 36688. The Grand Bay National Estuary Research Reserve was established in 1999 by NOAA and is maintained by the Mississippi Department of Marine Resources. The reserve is located in Jackson County, Mississippi between Pascagoula and the Alabama state line. The abandoned Live Oak Rifle and Pistol Range lie within the boundaries of the NERR and is the main study site. The Live Oak Rifle and Pistol Range ecosystem consists of forested areas, wetlands that are seasonal, and a permanent pond. This project addresses the amount of lead present in the Live Oak Rifle and Pistol Range. Four collection sites were chosen throughout the range, and included: a short-range target, a long-range target, a pond behind the range, and the shooting area. The ditch water along the road was also sampled to determine the difference between contaminated road water and the range water. The lead levels for the soil samples ranged from 19.57 [micro]g/g to 137,835.9 [micro]g/g. Lead levels for the vegetation samples ranged from 2.66 [micro]g/g to 2290.37 [micro]g/g. Lead levels in water samples ranged from 0.45 [micro]g/L to 557.4 [micro]g/L; some of these samples were above EPA acceptable limits. These values were comparable to levels reported from other shooting ranges. These initial results indicate possible lead contamination within this estuary reserve. ACUTE TOXICITY OF FIPRONIL AND ITS ENANTIOMERS TO MARINE AND FRESHWATER NON-TARGETS. Jay Overmyer, Univ. of GA, Dept. of Ent., Athens, GA 30602. A.W. Garrison, USEPA, NERL, Athens, GA 30605. J. Avants, USEPA, NERL, Athens, GA 30605. M. DeLorenzo, NOAA/NOS, Charleston, SC 29412. P. Key, NOAA/NOS, Charleston, SC 29412. K. Chung, NOAA/NOS, Charleston, SC 29412. B. Konwick, Univ. of GA, Dept. of Env. Health Sci., Athens, GA 30602. W. A. Wilson, Univ. of GA, Dept. of Env. Health Sci., Athens, GA 30602. M. Black, Univ. of GA, Dept. of Env. Health Sci., Athens, GA 30602 Fipronil is a phenylpyrazole insecticide used in agriculture and domestic settings for controlling various insect pests in crops, lawns and residential structures. Fipronil is chiral; however, it is released into the environment as a racemic mixture of two enantiomers. In this study, the acute toxicity of the (+) and (-) enantiomers and the racemic mixture of fipronil were assessed using Ceriodaphnia dubia (water flea), Simulium vittatum IS-7 (black fly), Xenopus laevis (African clawed frog), Palaemonetes pugio (grass shrimp), Mercenaria mercenaria (hardshell clam), and Dunaliella tertiolecta (phytoplankton). Results showed that S. vittatum IS-7 was the most sensitive freshwater species while P. pugio was the most sensitive marine species. Ceriodaphnia dubia and S. vittatum IS-7 were the only species that showed greater sensitivity to a specific isomer or the racemate of fipronil. Increased mortality and minimal recovery was observed in all species tested for recovery from fipronil exposure. DISTRIBUTION OF CRASPEDACUSTA SOWERBII IN CENTRAL ALABAMA OVER THE LAST 3 YEARS. Kaci Rodgers and James Rayburn, Biology Dept., Jacksonville State University 700 Pelham Road North, Jacksonville, AL 36265-1602. Craspedacusta sowerbii, which is better known as the freshwater jellyfish was first described in 1880. Researchers suggest the freshwater jellyfish may have been transported from pond to pond on the feet of waterbirds. These jellyfish have been found in lakes, farm ponds, rivers, and water-filled quarries. The freshwater jellyfish is an invasive species. It has been found in many different areas in the Southern United States. In Alabama, it has been found in a few areas around Jacksonville State University. The freshwater jellyfish has been reported to live in water with a ph ranging 6.5-8.5. This research is aimed to predict when the freshwater jellyfish might appear by analyzing data logs of when they have appeared. Different areas across Alabama, where these jellyfish have been spotted, will be evaluated to help pinpoint the areas and time of year this species shows up. The data analysis will determine the prime months when jellyfish collection might be significant. THE DEVELOPMENTAL TOXICITY OF RESMETHRIN TO EMBRYOS OF XENOPUS LAEVIS. James Rayburn, Biology Department, Jacksonville State University, Jacksonville, AL 36265. Natural pyrethrin insecticides are commonly used as mosquito-cides and are currently being used locally in Jacksonville AL. These insecticides are used during the spring when many amphibian species are breeding and larvae are developing. Because this could be sensitive time for frog species, frogs could be affected by these types of chemicals. Resmethrin was chosen as a representative pyrethrin. Pyrethroid insecticides are known to be neurotoxic to mammals. The developmental effects of pyrethrin on aquatic species (in particular amphibian species) is unclear. The Frog Embryo Teratogenesis Assay Xenopus (FETAX) was used to determine the toxicity of pyrethrin in accordance with the ASTM (1991) procedures. This procedure exposed early blastula embryos to a free living tadpole to the pyrethrin. Mortality, Malformation and embryo length were collected. Data was analyzed using Toxtools. Both pure Resmethrin and a water soluble fraction of a commercial resmethrin were tested. Results indicated that resmethrin does not cause significant mortalities at concentrations >50 ppm. Malformations were observed. Forty-eight hour old Xenopus embryos exhibited a higher startle response than controls, even at concentrations as low as 1 ppm. This study suggested behavioral studies on responses on embryos exposed to resmethrin should be performed. EFFECTS OF NANOPARTICLES ON GILL FUNCTION. Roxana Weil, Kelly Hyndman,Nancy Denslow and David Barber, UF Nanomaterials have very high surface areas and high percentages of their component atoms on the surface, which leads them to have unusual characteristics. Because of these characteristics, nanomaterials have many uses including sporting goods, cosmetics, paints, electronics, composites, and propellants. Due to their widespread applications, nanomaterials will inevitably be released into the aquatic environment, where they will interact with aquatic organisms. The unique physical and chemical properties of nanomaterials may also lead to unique biological properties. Unfortunately, toxicity testing of nanomaterials has been extremely limited, and factors that influence the biological properties of nanomaterials are poorly understood. The goal of this study was to determine if aluminum nanoparticles adversely affect fish and if the effects are different than soluble aluminum. Zebrafish (Danio rerio) were exposed to 0, 0.5, 2.5 and 12.5 mg aluminum/L as aluminum chloride or 51 nm spherical aluminum nanoparticles for up to 96 hours. Particles were characterized before and after exposure to determine changes in aggregation and dissolution. No mortality was induced by aluminum nanoparticle exposure, however, exposure to aluminum nanoparticles produced dose dependent reduction of gill Na/K-ATPase activity, indicating that gill function was compromised. To determine if observed effects were due to direct actions on the gill, primary cultures of gill filaments were exposed to soluble or nano-sized aluminum (0-12.5mg/L). Finally, to determine if uptake of intact particles occurs at the gill surface, zebrafish and gill filaments were exposed to insoluble CdSe/ZnS quantum dots for up to 48 hours and examined by fluorescence microscopy. This research was supported by a grant from the National Science Foundation (BES-0540920). REPRODUCTIVE SUCCESS OF PIMEPHALES PROMELAS EXPOSED TO p,p'-DDE. David S. Barber, Center for Environmental and Human Toxicology and Elizabeth J. Ray, School of Natural Resources and Environment, University of Florida, Gainesville, FL 32608. p, p'-DDE is the most persistent metabolite of the widely-used pesticide, DDT. Laboratory studies have shown DDE and other endocrine disrupting compounds (EDCs) alter hormone levels and gene expression patterns in the fathead minnow (Pimephales promelas), but have not linked those findings to population-level effects. The goal of this study was to examine the relationship between DDE body burden, expression of standard biomarkers, and reproductive output. The number of eggs laid, percent of eggs fertilized, and percent of eggs hatched as well as survival of offspring were measured in fathead minnows exposed to DDE. A control group (vehicle only) and three treatment groups (1.63 ppm, 11.48 ppm, and 104.25 ppm DDE in fish feed), each containing eight females and four males, was measured for 28 days. Survival rates and growth of offspring laid between 21-28d of the experiment were monitored until the onset of first reproduction. The number of eggs laid in the highest treatment group was reduced by 74% as compared to the control group. Average DDE body burden of fish in the highest treatment group was 110.57 ppm. This experiment suggests DDE exposure does not affect fertilization, hatchability, or fry survival rates, but can reduce the total number of eggs produced by females as well as growth and time to first reproduction of fish exposed in ovo. THE CONCENTRATION OF THREE METALS IN TISSUES OF SELECT MARINE SPECIES FROM MOBILE BAY Bernice Moser and James R. Rayburn. Dept. of Biology, Jacksonville State University, Jacksonville Al 36265. Mobile Bay, and estuary in the Gulf of Mexico, has more than 400-point source dischargers of pollutants and eight ancillary water bodies that have been labeled as impaired due to the high levels of toxic chemicals such as pesticides, priority organics, and metals by the Alabama Department of Environmental Management (Peachey, 2003). The ecosystem is important to the fishing industry in Mobile and many of these species are susceptible to metal contamination either by their association with the sediments or by bioaccumulation. To determine an estimate of metal contamination in Mobile Bay selected fish species were bottom collected using the research vessel Verril from Dauphin Island Sea Lab between channel markers 17 and 19. Sample collection began in February of 2005, and fish collected included: gulf menhaden (Brevortia patronus), hardhead catfish (Arius felis), hogchoker (Trinectes maculates), spot (Leiostomus xanthurus), and the least puffer (Sphoeroides parvus). The fish were dissected, liver and muscle tissue removed for metal analysis and frozen until processed. Samples were weighed and using trace-metal grade nitric and hydrochloric acid, digested for graphite furnace atomic absorption spectrometry. The metals examined included lead, copper, and zinc. The data was analyzed using ANOVA to compare between species.
https://www.thefreelibrary.com/Alabama+Academy+of+Science+Symposium%2C+2006+%22Southeastern+Society+for+...-a0151228967
Specialization: - Bio-Technology(BT) - Civil Engineering(CE) - Computer Science and Engineering(CSE) - Electronics and Communication Engineering(ECE) - Electrical and Electronics Engineering(EEE) - Mechanical Engineering(ME) Career Path for B.Tech Graduates With the diversity and balance in its curriculum, the students are prepared for careers in both academic and industrial settings. Students are provided with many opportunities to interact with scientists and professionals from both academia and the business world, through regular seminars, conferences and visiting speakers. Electronics & Communication Engineers have various focus areas like Design, Development, Inspection Quality Control, Maintenance & Service. The few industries where Electronics & Communication Engineers can find employment are Telecommunication, R&D units of public and private sector companies. The course covers a wide range of technologies for the future growth in the fields like Electronics Devices and Circuits, Transistors, Digital Electronics, Electromagnetic Field Theory, Signals and Systems, Antenna Wave Propagation, Microelectronics, Microwave, Digital Signal Processing, Microprocessor, etc. Emphasis is laid on some major thrust areas of the future like Digital Communication, Image Processing, Very Large Scale Integration and Microcontrollers. Electrical Engineers apply electronic and electromagnetic/optical design principles to design, build, and test analog or digital devices, circuits, and systems - for processing, communication, and storage of information; distribution, conversion, and storage of energy; and process automation or robotics. Application areas include communication, manufacturing, power and energy, health care, computing, security, entertainment, and many others. Industries like steel, cement construction, nuclear & thermal power plants; construction, manufacturing & operations also recruit mechanical engineers for numerous technical roles. In the recent years, demand for mechanical engineers has increased tremendously across various industry segments such as automobiles, air conditioning, refrigeration, space research, aeronautical industry, energy, bio-mechanical industry, manufacturing plants, turbine manufacturing plants, ship & aerospace building industries and oil & gas exploration. Civil Engineers are employed in all the major construction projects carried out by the state or central government, the public works departments, the railways, and military. Civil Engineers are mostly required in private construction and real estate companies as project engineers. Civil Engineers also employed in various industries to design the structures related to these industries. Biotechnology is perceived as a revolution throughout the world. If you have a strong inclination for unraveling the mysteries of nature, then the biotech sector is the one you should go for. With its large pool of scientific talent, world-class information technology industry, and vibrant pharmaceutical sector, India is well positioned to emerge as a significant player in the global biotech arena. There is a great scope for a career in Biotechnology in India as well as abroad. Career in Biotechnology offers various employment opportunities in research, marketing, and production in the fields like medicine and healthcare, animal husbandry, agriculture and environment industry. Biotechnology can be applied in developing various vaccines, medicines, and diagnostics, improving energy production and conservation and increasing productivity.
https://www.bachelorstudies.com/Bachelor-of-Technology-(Various-Specializations)/India/Sharda-University/
Remove "Correct" "Incorrect" bar at bottom of question results? I've created a self-assessment using statements in a multiple choice format that are assigned points 1 through 5. The points are not visible to users. Users receive a total rating on the Results screen and can go back and review their ratings with a Review Assessment button. When I tested this after publishing by clicking that button, I saw that each question screen now includes a green Correct or red Incorrect bar at the bottom. Since this is an assessment with no right or wrong answers, how can I get rid of this bar? Also, I put the instructions in a separate question group at the beginning of the assessment. When the user clicks the Review Assessment button on the Results screen, the review starts at the instructions screen. How can I get the quiz to skip this tart the review at the first question in Group 2 instead? Thanks so much. 12 Replies Hi Ann! If you check out the tutorial here, it sounds as if you need to turn off the review option from the Failure/Success Layers of the results slide. - Ann Yak - Author - Leslie McKerchie Hi, Leslie... I don't think that will work. Users need to see what option they marked for each statement so they can determine the low-scoring statements and figure out what areas to concentrate on learning. For both Success and Failure slides, I have checked only Show user's score and Allow user to review quiz. All my best, ...Ann Hi Ann! Would you be able to share the .quiz file for us to have a look at? If you cannot share in the forums, please share here. Also, please note that responding to the forums via e-mail attaches your signature, but you are welcome to pop in and edit if needed. Hi, Leslie! Here's the .quiz file. And thanks for the reminder about the email signature. I feel like we've gotten close, thanks to "inspired borrowing" from Jeanette Brooks' screenr on self-assessment scoring. If I could get this last piece to work, our users would be very happy. Hi Ann! You're wanting that first slide to not show in review, correct? Check out this screen shot below, you should be able to un-check that box: Hi, Leslie... Yes, this is just what I wanted for this slide. Now if there's any way to get rid of those Correct/Incorrect indications, it would be perfect! Thanks so much for your help. All my best, ...Ann Hi Ann! It's a part of the review process and there is not a way to turn this off within the player. Hi, Leslie... I noticed there was a solution with workarounds for Storyline but those don't seem to apply to Quizmaker Studio '13. When I try adding a custom shape to the slide master, the Review option displays the Correct/Incorrect shapes below my custom shape rather than hiding it. If anyone working with Studio '13 has a solution that works in Quizmaker, please let me know. Thanks for your help. Hi Ann! Yes, I edited my response because I realized that the link I shared was incorrect. Hopefully someone in the community will chime in if they have a workable solution to share. I have spent several hours trying to cover the correct and incorrect buttons on quiz review slides by adding a shape to the bottom of the slide master, but alas, it doesn't seem to work for Artculate Quizmaker. (I saw a post in the Storyline thread that indicated it would work for Storyline.) Realizing that sometimes the problem can be with the user, rather than the software, wanted to see if there were any "new" solutions to this issue. Like Ann, I've created a self- assessment with multiple response choices (mine are on a scale of "never" to "always", so no real right or wrong answers) and I would dearly love to get rid of the red "correct" and "incorrect" bars when learners go back to review their responses. My only other options at this point seem to be to put an "ignore the message at the bottom of the screen" text box on each slide, or simply NOT allow them to review their responses. Just re-read my post above, and I should correct the first line to read ...trying to cover the correct and incorrect BARS. They aren't buttons!
https://community.articulate.com/discussions/articulate-quizmaker/remove-correct-incorrect-bar-at-bottom-of-question-results
Are you aware there is an animal on Earth that is bigger than the largest dinosaur and longer than a full-size basketball court? This gigantic animal is the blue whale! In our oceans today, there are approximately 10,000 and 25,000 blue whales. Although this may seem like plenty, blue whales are endangered. Today, blue whales are listed as endangered under the Endangered Species Act and protected under the Marine Mammal Protection Act. This is because, since the late 1800s, many blue whales have perished because of human activities. Blue whales are among the biggest animals that have ever existed on our planet. Their population has fallen by 98% over the past century due to human overfishing, whaling, pollution, and other reasons. - Status: Endangered - Known as: Blue Whale. - Estimated numbers left in the wild: 10,000 to 25,000. Blue whales were first sighted by Europeans in 1758. But it wasn’t until 1904 that samples of whale organs were first recorded by marine biologists. They are currently listed as endangered by the International Union for Conservation of Nature (IUCN). Let us take a closer look and discover why blue whales are endangered. And how people can help save these animals from extinction. Table of Contents - Description - Blue Whale Population - Location - Blue Whale Distribution - Role in the Ecosystem - Blue Whale vs Other Whale Species - Blue Whale and Human Relationship - Blue Whale SubSpecies - Conservation Status - Threats - Conservation efforts - Organizations - FAQs - Why are blue whales endangered? - Is the blue whale friendly to humans? - How can I help blue whale conservation efforts? Description The Blue whale is the largest animal on Earth. It can grow as long as a Boeing 737-100 airplane (about 30 meters). They have grey and have a distinct mustache-like pattern. Blue whales filter seawater through massive, slatted plates in their mouths, known as baleen. Large amounts of water are taken in and then squeezed out forcefully through the gaps in the baleen by their tongue. It allows these massive creatures to harvest vast numbers of tiny animals called krill, similar to shrimp, which make up most of their diet. One adult whale has a feeding ability of around 3.6 tonnes of krill daily. A whale’s mouth can hold 90 tonnes of water, and its tongue weighs 2.7 tonnes. See Related: Three-Letter Animals You’ve Probably Never Heard Of Blue Whale Population The blue whale is not a common animal. Its population currently in the world is dangerously low and in grave danger due to various reasons. Some reasons are ocean pollution, habitat degradation, and being hunted by hungry humans. Whales have been going extinct for a long time, but it has been much worse recently. Since the 1970s, the global blue whale population has dropped from 20 million to only 500. Their population decreased by 98% during that period. Location Most blue whales are concentrated in most oceans, including the North Atlantic Ocean, the Eastern North Pacific, the Indian Ocean, and the Antarctic Ocean. Blue whales can only live in deep oceanic areas, preferring cold regions with abundant krill, except during breeding season, when they migrate closer to the equator. See Related: Reasons Why Biodiversity Important to Ecosystems Blue Whale Distribution Blue whales migrate to different areas at different times of the year. They usually live in colder waters, but their migration depends on their summer feeding grounds and winter breeding grounds. Role in the Ecosystem Blue whales play a crucial role in the ecosystem as they recycle nutrients and oxygen. These creatures are a significant part of the marine ecosystem. They help balance the ocean’s ecosystems by eating krill and plankton. They eat about four tons of krill and plankton a day to help keep the population in check. Blue whales are still part of the human food chain (and even the pet food chain) as they are hunted for meat and whale oil. Unfortunately, these events depopulated them because of commercial hunting before 1966. Other threats that endanger blue whales are vessel disturbance and fishing gear entanglements. Blue Whale vs Other Whale Species For starters, blue whales are much larger than other whales. They can range from 100 to 110 feet and weigh as much as 200 tons, while the next largest species are between 60 and 80 feet. Blue whales are often confused with humpback whales, but they are different species. Humpback whales have huge mouths, humps under their heads, and long tails full of large baleen plates at the bottom. See Related: Best Conservation Posters Blue Whale and Human Relationship Blue whales and humans have had a relationship for centuries. Blue whales are known to be gentle, but they were hunted by humans who used their meat for food, their oil for lamps, and their bones for fashion. With the outside possibility of these gentle giants tipping over small boats, these creatures don’t endanger humans. On the contrary, they are endangered because of humans. Human-whale conflict is a natural phenomenon in terms of humans’ tendency to corrupt nature. Blue whales are social animals that like to communicate with each other by making loud noises, known as whalesong, which is why they’ve earned the title “bringers of joy.” When blue whales try to feed near shore, humans often chase them away for both parties’ safety. Blue whales have also been hit by ships so often that whale-watching vessels must be accompanied by an escort boat to prevent these species from being injured. They face many threats, making them go extinct quicker than the average animal. Blue Whale SubSpecies There are five currently recognized subspecies of blue whales in the world’s oceans: the Pygmy, the Antarctic, the Northern, Northern Indian Ocean, and the Chilean subspecies. There are debates about the last one, but we will enlighten you more as we go on. 1. Pygmy Blue Whales (Balaenoptera musculus brevicauda) Pygmy subspecies are much smaller than normal blue whales, weighing only 1.5 tons. They dominate other blue whale species based on population. They can be found in all oceans except for the Arctic Ocean. The Memorandum of Understanding for the Conservation of Cetaceans and Their Habitats in the Pacific Islands Region covers the conservation of their species. 2. Antarctic Blue Whales (Balaenoptera musculus intermedia) The Antarctic blue whales are the largest subspecies of blue whales. They are also among the most endangered whales. The population of Antarctic whale species has decreased by 99%. It lives in the cold waters near Antarctica and eats small fish and krill. 3. Northern Blue Whales (Balaenoptera musculus Linnaeus) The northern blue whale can be found in the North Atlantic, the Eastern North Pacific, and the Central/Western Pacific Oceans. Some of them stay in their areas for a year. The Northern subspecies have a thick layer of blubber, which helps to keep it warm in the cold water. The Northern subspecies also have a dark gray color, which helps to camouflage it from predators. 4. Northern Indian Ocean Blue Whales (Balaenoptera musculus indica) The Northern Indian Ocean blue whale subspecies are smaller than other blue whales. They are found in the northern Indian Ocean and are also darker in color. 5. Chilean Blue Whales (Balaenoptera musculus un-named subsp) The Chilean blue whale subspecies is the smallest of the subspecies. They are found off the coast of Chile. It is not clear why this subspecies is smaller, but the smaller size may be an adaptation to the colder waters in Chile. Their genetics and geographic separation spark debates about their distinction. Conservation Status Blue whales are an endangered species because 98% of their population was wiped out in the last century, mainly because of hunting. Blue whale populations have been able to recover since their commercial hunting ended through an international agreement in 1966. Threats Whale Poaching Whale poaching is the illegal hunting of blue whales. It is a major contributor to the current decline in blue whale populations and ocean health. The blue whale was immune to human whalers for centuries, thanks to its size, strength, and speed. The introduction of the harpoon gun in the 19th Century started the harvesting of this giant creature. Over 300,000 killed blue whales were recorded before the 1966 ban, with the Soviet Union continuing illegal whaling into the 1970s and Japan continuing to hunt whales in the name of science. The main reason people poach whales is for their meat. Ship Accidents Blue whales are often struck accidentally in shipping lanes, which can easily injure or kill them. Whales often collide with ships in the California Current – one of the whales’ favorite feeding grounds. They can also get tangled and strangled in fishing gear. Water Pollution One of the main threats to Blue whales is water pollution. This pollution can come from several sources, including oil spills, agricultural runoff, and chemical pollutants. These pollutants can seriously harm Blue whales and some cases, even kill them. They may be endangered further by alterations in krill populations due to global warming, heating the oceans, making it hard for krill to breed and live. Ocean Noise Ships give off noise pollution, which makes it difficult for whales to communicate with each other underwater. This can cause blue whales to beach themselves. See Related: Dusky Shark Conservation efforts Conservation efforts to protect blue whales began in 1966 with the passage of the ban on commercial whaling. Attempts to conserve, restore, and study these gigantic marine mammals are ongoing. Both non-profit organizations and various governments are involved in efforts to foster their recovery. There is cooperation between countries to help conserve whales. The United States Fishery Management Plan is one of the most successful practices used for whale conservation, with 50% of blue whales located in the USA’s Exclusive Economic Zone (EEZ). Continued research into blue whales is also essential for blue whale conservation. Whale Sanctuaries Many conservation efforts to save whales are in progress. Some of these include creating whale sanctuaries, acoustic deterrents, and reducing ship collisions and noise pollution. Whale sanctuaries are areas where blue whales can live without being disturbed. Acoustic deterrents emit sounds that scare whales away from areas. Marine Mammal Science and Research Program This program is the most comprehensive study on blue whales. The goal is to get an accurate count of the populations of blue whales, assess their distribution and migratory habits, and learn how they communicate with each other. Educational Programs Educational programs for whale conservation are for everyone. You can start such activities by researching whales and the issues of blue whales in the ocean. Whale Watching Trips Whale-watching trips are a great way to help whale conservation. It allows people to see these beautiful animals up close and learn more about them. It will create awareness about the need to protect them and their habitat. Whale-watching trips also provide revenue for whale conservation efforts. Pollution control One of the main reasons why whales are endangered is because they are affected by pollution. There are many things that people can do to help reduce pollution and protect whales. Some include reducing plastic produced, driving less and using public transportation more, recycling, and composting. Online Campaigns Whale online campaigns are a great way to raise awareness about the endangered blue whale. Some of the things that you can do to help blue whales include: - Signing petitions to get these species protected - Sharing information about the whales on social media using hashtag #SavetheBWs - Donating money to organizations that are working to protect whales - Volunteering your time to help with whale conservation efforts Organizations The Hebridean Whale & Dolphin Trust The Hebridean Whale & Dolphin Trust monitors marine mammals and their habitats off the coast of Scotland. They protect various species through outreach and educational programs. The Hebridean Whale & Dolphin Trust is a non-profit organization established in 2008. It aims to study, conserve and protect whales and dolphins. They operate through their two research vessels, The Sea Watch Foundation, Blue Ventures, and various networks promoting sustainable fishing practices. World Wildlife Fund The World Wildlife Fund is a global organization that conserves animals and their habitats. One of the main focuses of WWF is the conservation of blue whales. They protect whales by developing partnerships with governments, businesses, and other organizations. One of their ways is by teaching whalers how to use new technologies. Whaling used to be a way for people to survive, but today it is not needed as the WWF introduced more sustainable fishing practices to whalers. FAQs Why are blue whales endangered? Blue whales are endangered because they’ve been hunted by humans for their oil, meat, and teeth. They are also at risk from commercial fishing and shipping, as well as pollution. Is the blue whale friendly to humans? Blue whales are not classified as aggressive species. They have been observed to follow fishing boats around. The whales can weigh as much as 200 tons and grow as long as 100 feet! They also emit a wide range of sounds from low-frequency moans to high-pitched whistles, where the frequency is modulated by their breathing patterns. How can I help blue whale conservation efforts? As whales face the threat of extinction due to modern technology, you can help whale conservation efforts by being more conscious about the environmental impact your technology usage has on whales. There are many ways to help whales directly affected by the noise in the ocean. Our oceans are becoming noisier with boat traffic, sonar, and other tech usages. It will compromise the blue whales’ ability to communicate effectively with each other.
https://www.ourendangeredworld.com/species/blue-whale/
Anthropology is a holistic analysis of the human condition encompassing many diverse areas of study. The field is broken down into four subfields – cultural, linguistic, archaeological and biological – which are further subdivided in practice. One subfield of biological anthropology is paleoanthropology, the study of human origins. This area focuses on the biological history of the human species including their evolution, emergence, and radiation. We will explore the scientific method and how theories like evolution have come about and expand over time. We will learn about our closest living relatives – nonhuman primates – and how an appreciation of their life history and behavior reflects our understanding of the modern human condition. Many of the principles and concepts that comprise how humans have evolved and adapted over time involve an appreciation of ecology, genetics, physiology, adaptation and cultural development that will also be explored. We will consider modern human diversity and discuss how we are continuing to evolve today. Forensic anthropology is another subfield of biological anthropology which applies methods in traditional skeletal biology to questions of modern medicolegal significance, from determining personal identity to assisting in the trauma analysis of recent human remains. We will touch upon the full range of issues associated with skeletal identification, from trauma analysis and biological profile determination to mass disasters and human rights violations worldwide. These problems will serve as a model for understanding the broader aspects of human evolution, modern variation and anthropology.
https://www.nualumnae.org/continuing_ed/2019/fall/forensic-anthropology-make-no-bones-about-it
Ministry of Tourism (Kementerian Pelancongan) Malaysia Ministry of Tourism (Kementerian Pelancongan) aims to develop Malaysia as a world class tourist destination. Ministry of Tourism works with all industry players to put the tourism industry as a facilitator for sustainable economic growth and valuable in contributing to national development. Objectives of Ministry of Tourism: - To increase the contribution of tourism to the country economy. - To empower rural communities through the rural tourism activities. - To facilitate 1Malaysia development through tourism. Functions of Ministry of Tourism: - To formulate a national tourism policy to achieve the vision, mission and objectives of the ministry. - To implement policies relating to growth and development of the tourism industry. - To coordinate, monitor and evaluate the effectiveness of tourism programs and projects. Ministry of Tourism is committed to the delivery of excellent tourism services to the customers based on MS ISO 9001:2000. Ministry of Tourism always makes improvement continuously on the Quality Management System to improve the effectiveness of the implemented system. Division/Unit of Ministry of Tourism - Administration & Finance Division - Policy, Planning and International Affairs Division - Infrastructure Development Division - Industry Development Division - Human Resource Management Division - Tourism Licensing Division - Information Management Division - Legal Unit - Internal Audit Unit - Corporate Communication Unit - Malaysia Tourism Center (MaTiC) Contact Details of Ministry of Tourism Malaysia Ministry of Tourism (Kementerian Pelancongan) Address: Peti Surat 5-7, Tingkat 6, 21, 34-36, Menara Dato’ Onn, Pusat Dagangan Dunia Putra, 45 Jalan Tun Ismail, 50480 Kuala Lumpur, Malaysia.
http://www.malaysiacentral.com/information-directory/ministry-of-tourism-kementerian-pelancongan-malaysia/
This insight article outlines two online engagement strategies for master-planned residential sites, based on a series of focused online engagement campaigns. Residential projects are often of great interest to the public as they provide the opportunity to shape new living spaces. It also helps to note that most prospective buyers tend to live close by. The effectiveness of community engagement can be significantly improved when approaching consultations early and at key decision stages. Digital and web-based tools that present interactive versions of proposals, such as PlaceChangers Engagement tool keep costs of engagement low while enabling design teams to reaching out to more people online and gather detailed feedback on site layout and architectural designs. If you plan a residential or mixed-use development, it pays to consider early on which aspects of a development are open to feedback from residents. You are well advised to approach the local community early and receive feedback in a timely manner as the cost of adapting a design increase significantly with the completion of each architectural design stage. If you want to find out about the engagement requirements for construction projects, go here: When is early community engagement required for developments? To be effective, community engagement is ideally built around key design parameters so that feedback aligns with the design process at a stage where changes may still be made. Taking the RIBA Plan of Work as guide for your community engagement strategy For projects in the UK, the Royal Institute of British Architects (RIBA)’s Plan of Work provide a useful framework to help the design team guide the timing and content of community engagement against key stages when parameters of a design are locked down. If you are an architect, you understand the Plan of Work model as a loose guide to the key work outputs delivered at each stage. Using the RIBA Plan of Work, engagement activities can built around influencing the outputs from each stage of the plan of work so to have a greater chance to influence the emerging design. Below is a simple summary of the key project outcomes per RIBA stage and potential focus for community engagement. Stage Key outcomes Possible community engagement focus RIBA 0: Strategic definition Business case RIBA 1: Design brief Site analysis and constraints understood Feedback on constraints or housing needs RIBA 2: Concept design Site layout principles defined Shaping emerging site layout RIBA 3: Detailed design Worked up designs prepared Feedback on detailed design aspects Here we give you two potential community engagement approaches with online campaigns mapped to key RIBA Plan of Work Stages. Online engagement for small-scale master plans On smaller-scale major development sites your design may emerge rapidly, especially on the lower end of the spectrum where sites are less complex. At other times, you may have less scope for community engagement earlier in the process due to time constraints. While advisable to fit in further feedback opportunities for earlier conceptual design stages (as outlined further below), by default you would ideally run a online community engagement campaign coinciding with, for instance, a public exhibition before the design is frozen and the planning application submitted. It is worth remembering that at that stage yourself or your agents should have established some level of rapport with key local groups and decision makers. This may require research into the local area prior to the conceptual design stage. It is important to reserve sufficient time between community engagement and submission of the planning application so that the implications of the feedback can be considered in a meaningful way. Give yourself some time by planning key project milestones into your engagement programme in advance. RIBA stage Focus question Set-up Key Result RIBA3 What do you think about the submission proposals? Present the master plan. Contraint to specific points of interest, or aspects of the design. Timed around any public exhibition(s) Feedback on final design Online engagement for large-scale master plans in complex settings If you are preparing a large-scale major development, the range of factors to consider in your master plan and architectural design will increase rapidly, and there will likely be great interest in your plans amongst well informed local stakeholders. In terms of the design, many key questions arise early, at design and access preparation, such as with regard to integration to any surrounding or adjacent built up land, but also on detailed level per development stage. Love Wolverton is a good example of early community engagement at conceptual and detailed design stages. Approach community engagement in phases matched to the design or, indeed, on specific themes (traffic, greenspace, etc). For instance, consider three key questions for feedback on key RIBA stages of your project, especially at the point of site analysis, conceptual design, and detailed design (outlined in the table below). At the conceptual design stage, multiple site layouts could be presented along with an invitation to feedback on specific elements of the outline. And lastly, what do local stakeholders think about the final design? The suggested outline of potential online campaigns is outlined below. It provides a series of interconnected campaigns that match the level of design detail at each stage. RIBA stage Focus Question Set-up Key Result RIBA2 What is special about your town? Send us photos and comments of aspects you like or don't like. Focus on the area adjacent to your site. Relevant response categories, and open response on the area around your site. WIth the option to send in photos of the issues raised Understanding of housing need RIBA2 What do you think about the indicative site layout? Present the draft layout. Open response on any aspect of the site. Timed around any public exhibition(s) Feedback on site layout option RIBA3 What do you think about the submission proposals? Present the master plan. Focus on specific points of interest, or aspects of the design. Timed around public exhibition(s) Feedback on final design Through a series of community engagement campaigns, you build up a picture of key concerns regarding specific elements of the architectural design; and your architect or master planning will be able to use that feedback to make suitable amendments while staying within the requirements of your business case. Noting contact preferences and interests, you will be in a position to communicate to groups of individuals with specific concerns. It is important to take local residents along with regards to significant development in their area and to build a positive line of communication. Feedback options on pragmatic and meaningful stages help deliver exactly that. Ask us in case you like to discuss the detailed outline for a development project. We are very happy to advise how best to layer online engagement onto your already existing plan. Add interactive online engagement to your next master planning project and work faster.
https://www.placechangers.co.uk/blog/planning-consultations/two-engagement-strategies-for-residential-projects/
Sweet grapes, bitter arugula, sour vinegar, and salty, umami bacon and pistachios--the basic tastes are all in. Use turkey bacon if you like, or none at all and rely on the nuts for savory richness. The microgreens add big flavor with their tiny leaves, but if you have trouble finding them, add fresh herbs or extra arugula instead. This vinaigrette is best after it sits for at least 30 minutes, so the sautéed shallots melt into the rest of the ingredients. Feel free to make it a day or two in advance and keep refrigerated until ready to serve. Render the bacon until crisp, 5 to 7 minutes, in a medium sauté pan over medium heat. Lift the bacon from the grease with a slotted spoon and set on a paper towel-lined plate. Add the shallots to the bacon grease in the pan and sauté 2 to 3 minutes to soften. Transfer the warm shallots to a small mixing bowl. Discard remaining grease. Whisk the shallots with the mustard, honey, vinegar, salt and pepper. Add the oil in a slow drizzle, whisking vigorously. Toss the crisp bacon pieces with the baby arugula, grapes and pistachios. Top with microgreens and then drizzle the vinaigrette over the salad.
https://www.seriouseats.com/recipes/2009/06/red-grapes-bacon-pistachios-salad-shallot-sherry-vinaigrette-recipe.html
Summary: The Clinical Affairs (CA) manager is responsible for all regulatory activities for the US, EU, and other markets where Palette Life Sciences medical devices are sold. The manager will implement overall regulatory strategies to ensure high quality submissions to FDA, Notified Bodies, TGA, and other regulatory bodies. Responsibilities: - Leads, coordinates, authors, and reviews regulatory filing documents - Prepares FDA submissions and CE Mark Technical Documentation, including PMA supplements and annual reports, 510(k) submissions, pre-submission meeting requests, design dossiers and technical files, and regulatory review of product changes to determine whether new submissions are required Communicates with FDA and Notified Bodies regarding regulatory requirements and strategies to legally place or maintain products in the market. - Coordinates, compiles, and prepares regulatory submissions/ documentation for OUS country notifications and registrations - Reviews promotional material to ensure compliance with approved/cleared indications for use - Assist with regulatory aspects of post market surveillance activities, including submission of post-approval study reports and communications with regulatory agencies about reportable adverse events - Collects documentation and coordinates with cross-functional teams to prepare regulatory submissions to regulatory agencies (or commercial partners) - Creates and maintains regulatory submission timelines and tracks deliverables to ensure company goals are met - Execute company’s regulatory strategy in the US and OUS - Conduct regulatory research and analysis - Keeps abreast of current regulatory landscape for medical device globally, e.g., FDA guidance documents, Medical Device Regulations (MDR), Medical Device Directive (MDD), EU guidance documents, etc. - Develops and communicates recommendations regarding new/emerging regulations to management and project teams - Identifies potential project issues proactively to allow implementation of appropriate regulatory strategies to mitigate risks - Interacts with regulatory authorities - Leads in the preparation of responses to questions from regulatory authorities - Facilitates the preparation of meetings with regulatory authorities (e.g., Q-Subs) to support regulatory filings - Provide in-house training in regulatory guidelines as applicable to team members - Assist with site audits by regulatory agencies - Other duties as needed - Evaluates, authors and reviews SOPs, Guidelines and Work Instructions to ensure regulatory documents, submissions, and systems are well-controlled and comply with applicable regulations Experience/Education: - Bachelor’s degree in Regulatory Sciences or other scientific disciplines - At least eight years of related work experience in Regulatory Affairs for medical devices - Prior working experience with FDA, Notified Bodies, TGA, other OUS regulatory bodies - Experience with Class III/ high risk classification devices - Demonstrate understanding of laws, regulations, standards, and guidance and processes that govern content, maintenance, and submission of documents required by regulatory authorities for all classes of devices, especially Class III (US and EU).
https://www.palettelifesciences.com/copy-of-product-marketing-manager
Introduction: This paper is going to summarize the Constructivism and Interpretive theory by identifying major issues, debates, overlaps, and critics. In this regard, I will analyze three examples of contemporary research and focus on how they applied constructivism as a scientific approach in conducting their research. Major Ideas: A constructivist view is that people are doing one thing instead of another because of certain ideas, beliefs, norms, and identities through which people observe the world. We live in a world where people explain and organize their identities, affiliations, and surroundings through their doings or actions. However, non-constructivist scholars disagree with this view and argue that we act in response to geography, resources, and relative power (Parsons, 2018, p. 75). Constructivists identify that international relations most significant element is social, not material. The study of social and the political world, including international relations, must focus on the beliefs and ideas, not on a physical entity or material thing. The international system does not exist on its own, it is established by ideas, thoughts and intellectual norms; it is a human creation, not a material entity which is being maintained by certain people at a specific time and place. If thoughts and ideas that existed in international relations change, then the system will also change (Jackson, 2006, p. 162). Major Arguments: Constructuctivists give importance to interpretation. They claim that actors always interpret things in terms of social constructs and that is why observers must also learn to explain social constructs to realize the reason of their actions (Parsons, 2018, p. 79). This theory also argues that international politics is primarily ideological rather than material. Some constructivists analyze international relations by looking at goals, threats, cultures, identities and other elements of social reality. They consider constructivism as an alternative to the two leading theories of international relations: realism and liberalism. Constructivism, like liberalism, runs on ideology. Ideologies take the form of more identified variables and explain not only how states interact with each other but also why states interact. Perceptions play an important role in their interaction. Every state has an identity that is essential to understand because identities make international policies and domestic societies more predictable and orderly (Hopf, 1998, p. 175). Realists view the balance of power as such that states will balance against any hegemony in the region. Constructivists view it as the balance of threat. According to them, states do not automatically balance against the hegemon, states balance against the threatening hegemon. For example, if the balance of power really worked, all Europe and the Soviet Union would have aligned against the United States in the Cold War. Instead, the United States and Western Europe aligned against the Soviet Union because they saw the Soviet Union as a belligerent power (Hopf, 1998, p. 186). However, constructivists also view that security dilemmas only exist in the presence of a clear threat because security dilemmas only happen in the presence of a threatening country. For example, if the UK increases armaments, the United States would not care about that, but what Iran is even thinking of doing matters a lot for the United States (Hopf, 1998, p. 188). Criticisms: There are some criticisms regarding Constructivism and Interpretive theory. Neorealists criticize constructivism by expressing disapproval about the significance of international norms (Jackson, 2006, p. 172). Though norms exist, it becomes less important in the interest of powerful states. They also argue that states cannot easily become friends only by their social interaction. It can be desirable in principle but normally cannot be possible in practice. The structure of the international system is such that states behave as egotists. Aggressive competencies and indefinite intentions force states to behave aggressively with each other (Jackson, 2006, p. 173). Another criticism is that constructivists have not analyzed anarchy sufficiently. The major problem related to anarchy is uncertainty. Uncertainty is not only about the present intentions of other states but also about the future intentions of states (Jackson, 2006, p. 173). However, constructivists view that states honestly try to express and comprehend one another’s motives. The problem is, there is an element of deception where it is difficult to understand whether states are acting genuinely or they are just pretending (Jackson, 2006, p. 174). Three Example of Contemporary Research Work: Example 1: The Emergence of Human Security: A Constructivist View Yu-tai Tsai Here, the author argues that the constructivist’s viewpoint provides conceptual elements in human consciousness and national identity issues. Different phenomena of human security can be better understood by applying the insights of constructivism. Human security can be defined in seven dimensions: personal, environmental, economic, political, community, health, and food security. Three pillars of human security are freedom from want, freedom from fear, and freedom to live in dignity. The author applied constructivism theory to explain that national interests form in the way of mutual interaction and this process specifies interests and identity. Throughout the process, when states focus their attention to common interests then the value of human security becomes established. Thus, this paper applied constructivism theory to explain human security in the area of international relations (Tsai, 2009, p. 19-25). Example 2: Theorizing the EU as a Global Actor: A Constructivist Approach Anastasia Chebakova Here, the author analyzed EU global actorness by applying constructivism theory. The author argues that constructivists work on structure and agency and explain how actors participate in social interaction in global politics. Through this process of social interaction, actors get influenced to change their perception of themselves and others (Chebakova, 2008, p. 4). In this article, this agent-structure relation is being examined to measure the EU’s capacity to shape events in internal and external context of its borders, either by own will or response to outside actor’s anticipation and demand. Constructivists view actorness as a function of external opportunities as well as internal abilities like resources, political will and legitimacy (Chebakova, 2008, p. 5). Constructivism is being applied here as a theoretical framework to examine the EU global actorness, its presence and capability, its structure and prospect to build multilateralism (Chebakova, 2008, p. 8). Example 3: A Holistic Constructivist Approach to Iran’s Foreign Policy Mahdi Mohammad Nia In this article, author applied constructivist approach to explain Iranian foreign policy. Constructivism view that state identity, which depends on historical, cultural, political and social backgrounds, works as the main source of interest formation of state. Identities first make interests then behavior (Nia, 2011, p. 281). In terms of what Iran priorities in foreign policy, the author emphasized more on domestic identity and the role of normative structures. In this way, the author tried to use Holistic constructivism to highlight the fundamental significance of domestic and international normative environment in structuring Iran foreign policy (Nia, 2011, p. 291). Conclusion: Constructivism function as a landscape of ideas, norms, identities, and practices. It not only gives us a practical view of how the political world shape but also answer why it remains associated with one another (Parsons, 2018, p. 90). It is a key way of thinking about politics. Constructivism is diverse and is supposed to play a vital role in political science in future (Parsons, 2018, p. 91).
https://campuscrosswalk.org/constructivism-and-interpretive-theory-introduction/
The Center Umanamente is a multidisciplinary team, made up of qualified professionals with different backgrounds and specialities, who help the family as a whole, for the promotion of health, the prevention and treatment of distress, being it psychological, physical or legal. The Center offers support to adults who feel the need to deal with personal issues, to parents who find difficulties in their parental role, to couples, to children and adolescents in their developmental phases. All interventions are of high quality and are focused on the person as a whole, with physical, psychological and relational strengths and needs. The Center Umanamente was born from the idea of offering families different professional competences and interventions, made common by the goal of supporting and sustaining the family system in the various phases and difficulties each of its members may encounter. The team is made up clinical psychologists, psychotherapists, art therapists, speech and language therapists, pediatricians, nutritionists, psychiatrists, a doula, and a lawyer. The team works in an integrated manner to provide families and individuals the possibility to receive, in one place, assessments, formulations and interventions, which are person centred and targeted in the most effective way. At the center a service of assessment and treatment for specific learning disabilities is available. We also offer training and psychoeducation to schools, for teachers and teaching assistants, and SENCOs. It is also possible to have psychological counseling or therapy in English. The Center Umanamente welcomes children and families who have different ethnic and cultural backgrounds, people who speak more than one language and have a history of travelling from a "home" to another. 1 - Adolescent 2 - Children 3 - Adult Clinical areas:
https://www.centroumanamente.it/en/
Men’s Journal: Do We Have to Accept Doping in Sports? In the same week that the 2016 Tour de France kicked off (an event perennially maligned by performance-enhancing drugs) and Russia appealed the ban that will prevent its track and field athletes from competing in the Rio Olympics (thanks to widespread, state-sponsored doping), veteran sports journalist Mark Johnson debuted his new book Spitting in the Soup: Inside the Dirty Game of Doping in Sport. Johnson’s book explores the history of doping in sports, going back 150 years to a time when pills meant progress, for both athletes and society. His reporting exposes the real focus of elite sports — not fair play, as long-standing myths would have us believe, but to push the boundaries of human performance. Spitting in the Soup takes a bitingly honest look at the role teams, coaches, governments, the media, scientists, sponsors, sports federations, and even spectators have played in doping in sports. We spoke with Johnson about the truth behind performance-enhancing drugs, and what it will take for elite athletes to come clean. CLICK HERE to read the Men’s Journal story Do We Have to Accept Doping in Sports?
https://www.velopress.com/mens-journal-accept-doping-sports/
Initially, many student services (SFS, ISSS, Helpdesk, etc.) will be provided primarily online or by phone, with rare exceptions. As public health conditions allow, a mix of online and in-person services will be provided. Safety and health measures will be in place to ensure safe interactions in compliance with state requirements in place at the time. Health Services The Health Services staff is prepared to provide students with both COVID-19–related health care as well as care for non-COVID-19–related illness and health maintenance in the spring semester. Services will include both virtual visits (telehealth) and on-site appointments for conditions that require a clinician to perform an exam. In-person visits will be by appointment only to avoid crowding and allow for physical distancing in the waiting area and other spaces. All students coming into Health Services for an appointment will be screened for symptoms related to COVID-19 via the student health portal, including a temperature check, with confirmation temperature checks if coming in for an on-site appointment. Face coverings will be worn at all times by both students and staff. Students with respiratory symptoms that could be related to COVID-19 will be seen in a specified Health Services area with environmental controls to minimize the risk of transmitting infection, including separating sick individuals from others who may be receiving care and following strict guidelines for cleaning and disinfecting. Students may be referred to Porter Medical Center if that is the more appropriate location for care. Students who are feeling sick or have been informed by the Vermont Department of Health that they may have been exposed must call Health Services. They may call the Registered Nurse Triage Line (802-443-3290) or the main business line (802-443-5135). Health Services staff will start with a telephone call to determine the best course of action. Health Services staff have received training on the proper use of personal protective equipment (PPE) and will provide support to students who are in isolation or quarantine. Additional information about COVID-19 care is available on this Health Services web page. Counseling Our Counseling staff provides counseling services to the Middlebury College student community through counseling, advocacy, consultation, and education. Counseling visits are free of charge and available to students actively enrolled in a Middlebury program. Please note that Middlebury College Counseling is utilizing teletherapy in order to maintain safe operations for its staff and students. Sessions are being conducted through encrypted video conferencing that adheres to appropriate standards defined by the American Psychological Association, American Counseling Association, and the Office of Professional Regulations through the Vermont Secretary of State’s Office. In addition to traditional one-on-one sessions, Counseling staff also offer ongoing workshops, skill-based series, and group counseling. Group sessions are also offered using videoconferencing software and are open to students studying in person and remotely. See Services Offered for more information, and learn how to Schedule an Appointment. Health and Wellness Education Health and Wellness Education staff offer health education programs led by peer educators and professional staff for students currently enrolled in Middlebury programs. Students can self-schedule health coaching, substance use, advocacy, and other appointments with health educators. Peer-led programs, particularly those focused on mental health promotion, will be prioritized for in-person programming whenever safe and possible. Health and Wellness Education staff also create and curate ongoing online courses to help students understand expectations, build and sharpen skills, and practice self-advocacy in seeking health-related services during the pandemic. International Students During these challenging times, please be aware that the staff of International Student and Scholar Services (ISSS) are here to assist students not only with navigating immigration and visa issues, but also with other questions and concerns about student well-being and adjustment.
https://www.middlebury.edu/office/spring2021/campus-guide/living-learning-on-campus/student-services
If we are to progress as a profession, we must hold each other accountable. If we are to provide our patients the best care, we must hold each other accountable clinically. Our world is flooded with information on best practice and it’s hard to skim through LinkedIn without seeing “evidence-based” within the first couple posts. Unfortunately, knowing the “best” and most updated treatment techniques is only half the equation. Our ability to think critically to assess the available information, identify and address judgements and biases, and accurately apply available information is necessary to truly Live Clinically and provide “evidence-based” treatment. Finding information on how to assess and treat patients is not difficult; the trick is knowing how to filter and apply the information. This blog will focus on critical thinking skills often neglected and misunderstood. Heuritsics and cognitive biases are rarely discussed in school and clinical education, yet they influence every bit of information we process and apply in daily life. Many of these biases go unnoticed and unchecked. Yet, if we learn to recognize them, and make the necessary adjustments to our thinking, we can effectively navigate world of “evidence-based” care. What are heuristics? As a physical therapist, I have often sought the most efficient way for delivering high quality care. I may achieve this efficiency through selective patient scheduling, timely completion of notes, clustering marketing and management duties, and applying treatments that provide the greatest outcome relative to the least amount of time requirement. I am not alone in this approach. By seeking more efficient means of patient care and completing my job duties I am allotted more time in my day. This time may be utilized to expand upon any of the previously mentioned tasks – seeing more patients, more marketing, managerial duties – or other areas of interest, such as reading, exercise, or spending time with my family. Regardless of the choice I make, the added time is a bonus and I am motivated to obtain it. One of the methods used to improve efficiency in daily tasks is to apply heuristics. Heuristics are mental shortcuts we subconsciously apply to improve efficiencies. These ‘rule of thumb’ strategies are mental biases which are often referred to as common sense. The problem with the commonsense approach is it typically requires a sacrifice of accuracy. A frequently employed strategy is substitution. Our mind often employs substitution to replace a challenging question, to which we lack the answer, with an easier one. For example, a clinician may substitute the question of “what is the most-evidence based treatment I could apply for this patient presentation?” with “what type of treatment have I successfully used in the past for this patient presentation?” The first requires significantly more work, as I will need to scour the evidence and face the uncertainty of applying an intervention I am less familiar and practiced with. The second is safer, easier, and more predictable. This blog will address the drivers behind treatment decision-making in the healthcare space. However, the drivers behind treatment decisions does not fall squarely on the shoulders of clinicians. Patients and researchers have a large role to play in the development, dissemination, and implementation of best practice. I have been fortunate to gather experiences as a patient, provider, healthcare manger, researcher, and educator. These experiences have allowed me to develop multiple perspectives and recognize those who handle cognitive biases well and those who do not. I have fallen on both sides of the aisle, as I will share with you in future posts. Side note: Why I started the blog This idea for this blog started with internal communications to colleagues in my practice, PT Solutions. In 2018, I started sending weekly emails to all the therapists in my practice, which contained research studies from a breadth of fields. The intent was to broaden the scope of education provided and reduce the barriers to seeking out and obtaining evidence. I would add a snippet or two on ‘the why’ behind the chosen articles. These emails expanded to include athletic trainers, clinic front desks, and the sales team in an effort to provide evidence for all our employees responsible for patient care and garnering new patients. While one barrier was removed, several more remained firmly in place. Chief among these was the act of implementing the evidence I provided into daily practice. I was finding that seeking out information was not the primary issue. This is not unique to clinicians at PT Solutions, or clinicians in general for that matter. The greater challenges lie in digesting and applying the information. Reading and understanding literature brings a set of challenges and overcoming our biases and cognitive fallacies brings even more. It was at this point I decided to expand the posts. As an avid reader, I wanted to develop more digestible information and entice the reader. Of course, expanding the emails to a deep dive into literature (they were 2500-3500-word posts, rather than a typical blog size of 300-500) and adding well-chosen and hilarious – at least to me – memes to increase engagement and remove the “scholarly journal vibe” takes time. Thus, the ‘Weekly Evidence’ emails became known as ‘Weekly(ish) Evidence’ emails. To my relief, more clinicians reached out to me about the value of the content and using them during ‘Evidence-Based Days’ (our version of clinical rounds where we discuss evidence and patient cases). As I delved into the assessment and treatment literature, the need for training and understanding of heuristics and biases become more apparent. There are two main ways of thinking As mentioned, a heuristic is a simple decision strategy that ignores part of the available information and focuses on the few relevant predictors. They are useful and often vital (developed as survival mechanism when there is insufficient time to critically appraise a situation) but sometimes lead to severe and systematic errors. Heuristics can be defined as “mental shortcuts commonly used in decision making that can lead to faulty reasoning or conclusions”, citing them as a source of many errors in clinical reasoning. I will cover many of these systematic errors and biases in future posts – sunk cost fallacy, confirmation bias, theory-induced blindness, availability heuristic, planning fallacy, and halo effect to name a few – and how they relate to our clinical practice. There is an overwhelming amount of literature available to all of us, however, if we don’t know how to critically appraise it, apply it, analyze its usage, and make revisions in our practice then we will be limited in the quality of care we provide and revert to old habits. In addition, without the ability to analyze our own thoughts and actions, we become subjected to the information relayed by others and our natural tendencies. Critical appraisal is difficult, as is challenging information we hear and see on a regular basis. Daniel Kahneman, winner of the 2002 Nobel prize in economics and author of Thinking, Fast and Slow (possibly the most influential book I have read) summarized this process well. He stated, “the essence of intuitive heuristics: when faced with a difficult question, we often answer an easier one instead, usually without noticing the substitution.” At the beginning of the book, Kahneman sets the foundation for our decision-making process with a concept known as the two systems of the mind, system 1 and system 2. Here is how he defines them: “System 1 operates automatically and quickly, with little or no effort and no sense of voluntary control” “System 2 allocated attention to the effortful mental activities that demand it, including complex computations. The operations of System 2 are often associated with the subjective experience of agency, choice, and concentration. Many of the concepts that I will cover and biases that clinicians and patients suffer from can be traced back to the system of thinking employed. System 1 is largely responsible for our heuristics and biases. Our brains crave coherence and will search for – or even create – associations that link events and create a story that makes sense. If we start approaching cognitive fallacies, our system one won’t alert us of a potential issue. When we acknowledge doubt and uncertainty, we enter the domain of system 2. However, if we do not train our system 2, laziness can result and we search for the path of least resistance, thereby still falling victim to our biases. Critical thinking takes effort It is far more effortful for us to mobilize system 2 than to simply revert to system 1 and “common sense”. Herein lies the primary issues with deciding on treatment approaches. Keeping up with literature is a challenge. Tens of thousands of journals publish new articles monthly. Not only do we need to remain up to date in our field but in related fields as well. For example, reading Physical Therapy Journal and Journal of Sports and Orthopedic Physical Therapy only scratches the surface for my clinical care. I still need to remain updated in exercise, nutrition, psychology, medical rehabilitation, medical orthopedics, pain science, biology and tissue healing, etc. Not to mention keeping tabs on popular journalism and current trends patients will bring to the session. It is far easier for me to find my niche, develop a set of skills that deliver a positive outcome, and continue to hone those skills throughout my career. Why mess with a good thing? “Admitting the role of heuristics confers no shame. Rather, the goal should be to formalize and understand heuristics so that their use can be effectively taught, which could lead to less practice variation and more efficient medical care.” Are we challenging our potential biases and intuitions? This is not to say act and speak with uncertainty in all we do. When making a decision, stick with it. However, when you have opportunity to reflect, be critical of the information available and the additional information needed. This is reflected in the concept “strong beliefs, weakly held.” Conviction is important, but a healthy dose of doubt and uncertainty allows us to grow as professionals. Doubt and uncertainty are vital “It is our capacity to doubt that will determine the future of civilization.” These words were spoken by Richard Feynman, a brilliant physicist who won the Nobel prize for physics in 1965 and is often referred to as the founding father of the field of nanotechnology. His secret to being one of the great minds of the 20th century is his ability to embrace doubt and uncertainty. “The question of doubt and uncertainty is what is necessary to begin; for if you already know the answer there is no need to gather any evidence about it.” Using doubt and uncertainty during the discovery process can be a difficult principle to live by, as it requires a lot of work. It means we never truly know, never have all the answers, never have it all figured out. Despite positive outcomes in the past or previous “best evidence,” we need to constantly assess the literature and constantly face the facts. Science is simply testing, observing, concluding – very objectively, minimizing bias – and repeat. Every day, we should strive to be a little better and learn something new. While I can attest to the power of doubt and uncertainty in the worlds of physical medicine and rehabilitation, education, and research, we see it written about in other fields as well. Engebresten et al. wrote a 2016 paper titled “Uncertainty and objectivity in clinical decision making: a clinical case in emergency medicine.” They tackle the problems of uncertainty in emergency situations. In emergency care, whether it be a paramedic responding to a 911 call or an ER physician triaging following a catastrophe, uncertainty is often viewed exclusively in the negative. We must train ourselves to overcome it and abolish it, potentially even ignore it. Here is how the authors sum up handling uncertainty in these situations: “It is not by getting rid of or even by reducing uncertainty, but by attending systematically to it and by relating to it in a self-conscious way, that objective knowledge can be obtained.” Doubt is a powerful tool for two primary reasons: 1) What we “know” often turns out to be wrong in the future and 2) We rarely have access to all the information. A healthy level of doubt leads us to better interpret information and reason through the answer. Take reading research as an example. The danger of simply reading the abstract – or the more enjoyable but heavily biased introduction and discussion sections – is we don’t have all the information. Reading the methods and results allows us to gain a better understanding of the objective data and draw conclusions. I will cover strategies for reading and understanding research in a future posts. Doubt forces us to discover and build knowledge. It forces us to ask more questions, seek greater understanding, and refine our thought processes. Knowing ‘the why’ behind a technique or a patient’s experience allows not only a more tailored treatment approach by clinicians, but an ability to navigate unexpected obstacles. The research is constantly evolving The “gold standard” or “best practice” is constantly evolving and at times performing an about-face. This does not mean clinicians should “shoot from the hip” and ignore evidence as it is bound to change eventually, but instead we should challenge our treatment approaches every day. This view can be simplified with the aforementioned concept of ‘strong beliefs, weakly held’. Having doubt does not mean you have weak convictions and are apprehensive to act, but instead that you are constantly open to new evidence and make decisions based on a strong foundation. Rather than simply taking something at face value, do a little research yourself to determine the validity and seek the necessary amount of information to make a sound decision. Uncertainty and doubt lead to a yearning for greater understanding and are vital to become an expert in any subject matter. They develop a habit of critical assessment and reflection of past actions. They help establish the mindset of never being satisfied with an answer and always lead individuals to perpetually adopting the role of a student. Becoming a Credible Hulk The amount of information available today is both exciting and terrifying. At any given moment, with a couple swipes and clicks you can access a wealth of information on nearly any topic imaginable. Access to information is a wonderful thing, unfortunately it has its drawbacks. A primary concern is the credibility of the information. There is an abundance of incomplete information, exaggeration, praying on people’s fears or misunderstandings, and incorrect “facts” provided on a daily basis from so-called “experts.” It can be difficult to truly know if the information provided is accurate and beneficial. This applies to both lay individuals and providers. Fortunately, all information is not poor. To determine which is worthwhile and which can be ignored, we must channel our inner ‘Credible Hulk.’ A ‘Credible Hulk’ is an individual who backs up their rage with facts and documented sources. By rage, I don’t mean we should flip tables and throw waiting room chairs while conveying our differing opinions with facts and documented sources. However, there are certainly moments where throwing a chair feels desirable. Instead, we should all be steadfast and anchor our beliefs and approaches to assessment and treatment strategies with high quality evidence. Often, we put most of our trust in expert opinion, but this leads us down a dangerous path. Many judgements and biases can lead well-meaning assessments to be incomplete and potentially flat out wrong. Research has the benefit of controlling variables, reducing biases (if the study is well constructed), and objectifying results. If you are recommended a course of action by a colleague, mentor, or physician, they should be respectfully challenged if the recommendation lacks adequate support in the research. Ultimately, I hope this blog can provide some resources and strategies to help with those discussion. At the very least, I hope I leads to more questions. By no means do I have it all figured out. Discovering I was wrong and changing my approach is a regular experience. Some level of discomfort in the moment will always remain, but as you embrace doubt and uncertainty, and challenge your assumptions daily, your curiosity develops and you find yourself enjoying the experience. “The way to block errors that originate in system 1 is simple in principle: recognize the signs that you are in a cognitive minefield, slow down, and ask for reinforcements from system 2” – Daniel Kahneman Reference - Elstein, A.S., Heuristics and biases: selected errors in clinical reasoning. Acad Med, 1999. 74(7): p. 791-4. - McDonald, C.J., Medical heuristics: the silent adjudicators of clinical practice. Ann Intern Med, 1996. 124(1 Pt 1): p. 56-62. - Engebretsen, E., et al., Uncertainty and objectivity in clinical decision making: a clinical case in emergency medicine. Med Health Care Philos, 2016. 19(4): p. 595-603. ABOUT THE AUTHOR Zach has numerous research publications in peer-reviewed rehabilitation and medical journals. He has developed and taught weekend continuing education courses in the areas of plan of care development, exercise prescription, pain science, and nutrition. He has presented full education sessions at APTA NEXT conference and ACRM, PTAG, and FOTO annual conferences multiple platforms sessions and posters at CSM. Zach is an active member of the Orthopedic and Research sections of the American Physical Therapy Association and the Physical Therapy Association of Georgia. He currently served on the APTA Science and Practice Affairs Committee and the PTAG Barney Poole Leadership Academy.
https://ptsolutions.com/blog/lazy-clinical-mind/
Improvement in medical and research technology in the past few years has brought genome mapping to the forefront in several crucial areas. The basis of this process is a “map” of the genetic structure of an individual organism. Essentially, the system of mapping involves deoxyribonucleic acid (DNA) and another of the basic pieces of identification – chromosomes. Commonly known as the most basic “stuff” of life for all organisms, DNA is the “instruction sheet” by which living things develop and become individuals. This is where the information about life and living are stored. The genetic code involving DNA is possible because DNA consists of segments or pieces called genes. These pieces hold the information that provides a unique identity for every individual organism. Deoxyribonucleic acid or DNA is made of two strands that, if viewed, appear almost as backbones. The tiny structures of life called molecules attach to these strands. Each living thing acquires its appearance and individual characteristics according to how the molecules are arranged along the strands (sequence). Development of organisms is determined by how DNA “replicates.” In individual cells, DNA is organized in specific ways. The resulting structure is a chromosome. When cells divide the DNA of the original cell is “passed on” to new cells. In genome mapping, the “fragments” of deoxyribonucleic acid (DNA) are assigned to chromosomes. Researchers find certain “tags” that help in identifying the source of the DNA sample. Fragments can by physically cut by a particular type of enzyme, producing a distinct pattern. This is used for individual identification and no two people are alike (similar to fingerprinting for identification). Medical research has resulted in this process being used for disease identification. Specific signs or evidence of a particular disease may be evident from genome mapping, a procedure that might determine if there is a link between disease in one generation of a family and possibility of disease in another. This is possible only with the minute pieces of evidence in genes and chromosomes. In common terms, medical researchers and other scientists use short “sequences” of DNA and places where genes are “on” to tell them where they are in the identification process. This is where the concept of mapping comes in. It’s difficult to describe genome mapping in physical terms because scientists agree that these maps have only one dimension. Human beings are used to maps that have length, width and in some cases, depth. Some research documents have compared the genome map to a straight line that has some identifiable landmarks or markers on it. However, these seldom occur at regular intervals. Scientific studies and academic texts note that a genome map has less detail than a genome sequence. The sequence indicates the order in which every molecule (base) occurs, while the map identifies only the “landmarks.” Things get a bit more complex sometimes, because mapping and sequencing can be completely separate or they can be somewhat of a “hybrid.” Genome mapping is well underway for humans, but scientists are beginning to employ the process for other large animals as well.
https://www.thegeminigeek.com/what-is-genome-mapping/
National institutes of culture are organizations that aim to promote culture, spread national cultural heritage, and to favor national development by allowing the participation of the community. Examples of these institutes in Europe include the Romanian Cultural Institute, Lithuanian Cultural Institute, Finnish Cultural and Academic Institutes, Hellenic Foundation for Culture, and the Danish Cultural Institute. The centers need to carry out various activities to ensure the preservation of the cultures of the respective countries (Paschalidis, 2009). Amongst other things, national institutes of culture have the responsibility of developing cross-cultural understanding that ensures that the community contributes and benefits from cultural programs and policies. They ensure youth participation and cultural development. Such cultural promotions clearly bring out values of the national community. The institutes promote effective integration of arts and culture as part of the school curriculum and encourage the use of the latest technology to make the media contribute to cultural development. Activities and Mission of National Cultural Centers Activities that each institution undertakes depend on its location. Besides the core mission of cultural centers being engaging the population in the transfer of their cultural heritage across generations, they must also ensure that they develop exciting and inclusive activities that will put people and especially the youth in mind of other cultures from different parts of the contemporary world. Institutions should embrace the wealth and talent of new communities and individuals and allow hybridization and innovation in artistic creation. For this purpose, they need to adopt new working methods, which will allow for experimentation and innovation, while still maintaining excellence and high cultural standards. If needed, cultural institutions may revise their operations to address the needs of a more culturally diverse society in the modern age. National cultural institutions bring various benefits to society. They promote social and economic development, attract tourists, deliver essential services, and develop innovations. In addition, through activities of such institutions, society recognizes cultural diversity (Vecco, 2010). For states, it promotes harmonious living and reduction of sources of conflict. Individuals benefit from such institutes too due to the provision of responsibilities and elimination of discrimination. The core mission of cultural institutes, namely, transferring cultural heritage across generations, has the power to facilitate and improve social interaction as well as enable society to pursue creative interests. Centers for cultural preservation have various economic impacts on nations. They create jobs, attract visitors, retain businesses and revitalize places. People who come to visit museums or attend cultural festivals spend money on their entrance fee or tickets, hotel bookings, meals in local restaurants and goods in local shops. As a result, there is the creation of revenue to the local economy and ‘profit’ to institutes. In addition, the engagement of the youth in cultural activities has a positive impact on their social and civic participation. Cultural resources have a strong effect on the lives of the youth. According to research, they enable young people to volunteer more and reduce social class differences among them. Therefore, it is important for cultural institutions to encourage the youth to participate in cultural activities (Prieur, Rosenlund, & Skjott-Larsen, 2008). Apart from cultural institutes benefiting the economy and the youth, they assist the whole community. When people participate in cultural activities, there is reduced social exclusion and isolation and contribution to social cohesion. As a result, the involved communities feel stronger (Brodie & Apostolidis, 2007). Perhaps, the major way in which participation in cultural activities contributes to social inclusion is strengthening relations and interaction among people, thereby bringing a broad range of positive effects to society at large. The Romanian Cultural Institute The aim of the Romanian Cultural Institute is to promote the Romanian culture around the world. The establishment of the institution was in 2003 (Paschalidis, 2009). Currently, it has eighteen branches in major cities that are outside Romania, namely, Berlin, Brussels, Istanbul, Chisinau, London, Lisbon, Budapest, Madrid, New York, Vienna, Prague, Stockholm, Warsaw, Tel-Aviv, Rome, and Paris. For the institution to raise awareness about the Romanian culture, it supports national cultural projects around the world. In addition, it disseminates information about the Romanian culture and provides courses and scholarships in the Romanian language. The national image that the institution aims to portray is that their culture encourages dynamic interactions between organizations and individuals. Additionally, the Institute presents a compelling and interesting Romanian culture to international audiences and in the process connects the Romanian culture with international values. The Institute preserves traditional Romanian cultural values and formulates action lines that enable the development of new ideas among various organizations and individuals (Paschalidis, 2009). The Lithuanian Cultural Institute The Lithuanian Cultural Institute in Paris aims to increase the competitiveness of the cultural heritage of Lithuania and implement cultural projects that form a conducive cultural climate. The institute follows events in European countries linked to programs implemented by it, provides suggestions, recommendations and decisions to the European Commission, and organizes Lithuanian cultural programs. In addition, the Institute has created a cultural platform that encourages the participation of the community and strong networks with other countries’ cultural institutions. Further, the center aims to enable people to view Lithuania as a country where innovative and quality cultural projects exist (Paschalidis, 2009). The core functions of the Institute include organizing and coordinating programs that represent the Lithuanian culture, preparing and spreading the Lithuanian literature abroad, implementing Lithuanian cultural projects abroad, and producing informational publications about the national art and culture. Finnish Cultural and Academic Institutes The Finnish Cultural and Academic Institutes are non-profit organizations all over the world. They contribute significantly to the promotion of the Finnish culture (Paschalidis, 2009). They also focus on researching and teaching their culture to people who may be interested. The functions of the Finnish Institute in Paris include the implementation of cultural exchange programs, organization and coordination of international cultural events, provision of courses on the Finnish culture, and the development of educational publications. There are sixteen Finland cultural and academic institutes abroad. Their core mission is to promote cultural exchanges. The branches are located in Paris, London, Copenhagen, Antwerp, Berlin, St Petersburg, Tallinn, Stockholm, Madrid, Oslo, and Budapest. In addition to these divisions, there is a Finnish-Swedish cultural center established in 1975 in Hanasaari, Espoo, Finland, the primary aim of which is to promote cultural interaction between the two countries. The Hellenic Cultural Center The institution aims to spread the Greek language as well as promote the Hellenic culture all over the world (Brodie & Apostolidis, 2007). Since the establishment of the institute in 1992, it has created branches in Berlin, Alexandria, and Paris. It closely works with individuals and organizations to support its core mission. The institute promotes culture through education, publications, and other programs. In addition, it ensures that there is a direct cultural exchange and contact with other countries. Some of the functions of the organization include the organization of exhibitions, concerts, seminars and lectures, participation in cultural events, promotion of the Greek language by offering courses, and the cooperation with local authorities to undertake educational initiatives in learning institutions. The Danish Cultural Institute House of Denmark in Paris aims to promote the exchange of information, opinions and ideas between Denmark and other countries, including France (Prieur, Rosenlund, & Skjott-Larsen, 2008). In addition, it is responsible for arranging events aimed at bringing Danish cultural experiences to people of other countries and regions. Further, the Danish Cultural Institute promotes mutual understanding, provides information on how the country organizes its cultural practice, as well as coordinates and supports international cultural projects. Each year, the center holds various events aimed at attracting more people to accept and embrace the Danish culture. The headquarters of the Institute is in Copenhagen, Denmark. Over the years, the location and number of branches have increased. Previously, there were divisions in the Netherlands, France, the United States, Austria, and Northern Italy. Currently, there are branches in the United Kingdom, Russia, Poland, Latvia, China, Brazil, and Belgium. Such structure and collaboration with other organizations globally enables the Institute to create dialogue, mutual inspiration, and exchange. The work of the cultural center embraces areas that unite people of different cultures, creating a platform for culture, art, and society. Consequently, it facilitates intercultural communication and improves international understanding. Conclusion For national cultural institutions to achieve their goals and missions, they should understand the requirements of communities where they operate, identify peculiarities of their audience with diverse social and cultural backgrounds, and maintain integrity in their work by promoting quality in every aspect. In addition, institutions should encourage real co-creation and participation, especially among the youth, and embrace new technology to preserve their culture. In the discussion above, focus was put mainly on institutions based in Europe. However, the core missions and goals seem to be related to such institutions all over the world. Such cultural centers have an aim of ensuring the preservation of cultures of their respective communities and transfer of cultural heritage from one generation to another. Moreover, institutions have to increase their international competitiveness. They can achieve this by opening branches in major cities.
https://prime-essay.com/samples/sociology/institutes-of-culture-essay.html
The COVID-19 pandemic has changed the relationship between science and politics and elevated the social standing of scientists and researchers in the Global North. Researchers in various disciplines are helping us grasp the complexities of the pandemic: How does the virus spread? How does a vaccine help? How does the pandemic exacerbate social inequalities? How does it affect climate change? The Goethe-Institut Brussels and its partners will be holding a series of events zeroing in on the urgent present-day and post-pandemic issues: society, social inequality and climate change. Findings in virology and epidemiology have hugely influenced policymaking in many regions of the world. While statistics and projections of the virus’s spread dominated the European discourse about the pandemic for a long time, Europeans are now increasingly listening to what social scientists, humanists and psychologists have to say about the COVID-19 crisis. As divergent as their approaches and views may be, they are all part of an ongoing and omnipresent assessment of the effects of the crisis on our society. In the module Science and Research, the Goethe-Institut Brussels and its partners ask scientists and researchers as well as artists and activists, how the pandemic and the attendant crisis have changed society(ies) and what positive and negative effects they’ve had on various social groups. Which also raises questions about the future: How do we want to live from now on? Is this crisis an opportunity for us to consider and create utopias? Science and its relation to art and cultureActors in the arts and culture scene are increasingly collaborating with scientists and researchers to provide discursive and aesthetic input for the debate about the present and future of society. This productive dialogue between the cultural sector and researchers from various disciplines will be nurtured and presented to the public by a series of events put together by the Goethe-Institut Brussels. Therewith it aims to go beyond individual expertise and draw collective lessons from the pandemic by identifying social challenges and developing visions of the future. With this in mind, the Goethe-Institut Brussels in association with the Literaturhaus Berlin invited to their event Market for Useful Knowledge and Non-Knowledge in the framework of the Festival of Cooperations in September 2021. Combatting social inequalitiesResearch findings and everyday experiences show that the pandemic has exacerbated pre-existing inequalities between genders, classes, ethnicities and occupations, and between the Global North and South. While industrialised countries argue over how to divvy up vaccines, many nations in the Global South are more or less excluded from the distribution. Moreover, women are generally hit much harder by the effects of the pandemic on everyday life, which raises the question of who will be in charge of the care duties at home in this period of school closures, lockdowns and working from home. How are various societies coping with this consequence of the COVID pandemic? How can they redress the gender imbalance? What solutions are proposed in the public debate? Experts and the audience discussed these questions in depth at the Market for Useful Knowledge and Non-Knowledge at the Literaturhaus Berlin. The questions raised will also be taken into the follow-up events to continuously reflect. Climate change and a changing relationship to the environmentDespite lockdowns and restricted global mobility, climate change is steadily and relentlessly progressing. Many countries are mobilising enormous sums to offset staggering economic losses, but only a small fraction of those amounts to avert the approaching climate catastrophe. So researchers, creatives and activists are constantly developing new strategies to heighten climate awareness and change behaviours sustainably. And yet, the Goethe-Institut Brussels is wondering whether its perspectives are too Eurocentric and whether the pandemic has caused the focus to narrow even further to individual Member-State solutions. Climate change is a global problem. In collaboration with the Goethe-Institut Glasgow and the Centre for Contemporary Arts in Glasgow, we show the online video series Transformations for the World Climate Conference in November 2021. In individual episodes, mainly non-European scientists, activists and artists will be heard and present their views and projects.
https://www.goethe.de/ins/gb/en/kul/news/ldl/wis.html
STATE OF MICHIGAN COURT OF APPEALS PEOPLE OF THE STATE OF MICHIGAN, FOR PUBLICATION December 11, 2018 Plaintiff-Appellee, 9:10 a.m. v No. 342424 Mecosta Circuit Court KEITH ERIC WOOD, LC No. 17-024073-AR Defendant-Appellant. Before: MURRAY, C.J., and MURPHY and CAMERON, JJ. MURRAY, C.J. Defendant was convicted of jury tampering, MCL 750.120a(1), a misdemeanor, for attempting to influence jurors when he stood in front of a courthouse and distributed pamphlets to those he knew to be potential jurors in a case set for trial that day. The circuit court affirmed his conviction, rejecting defendant’s statutory and First Amendment arguments. We granted leave to appeal,1 and now affirm. I. FACTS AND PROCEDURAL HISTORY This matter arose out of defendant’s interest in a criminal case involving Andrew Yoder, a member of the Amish community who had been charged with “a DEQ violation” for “illegally draining wetlands.” After hearing of the case, defendant decided to attend the pretrial hearing on November 4, 2015, because despite not actually knowing Yoder, the case “piqued [his] interest.” At the pretrial hearing, the court scheduled Yoder’s trial for November 24, 2015. Defendant returned to the courthouse on the day set for trial, and stood outside the front entrance to pass out pamphlets entitled “Your Jury Rights: True or False?” that he obtained from the Fully Informed Jury Association (FIJA) website. The pamphlet begins by explaining that jurors may vote according to their conscience. It further advises readers to be aware “when it’s your turn to serve” that “[y]ou may, and should, vote your conscience,” “[y]ou cannot be forced 1 People v Wood, unpublished order of the Court of Appeals, entered February 22, 2018 (Docket No. 342424). -1- to obey a juror’s oath,” and “[y]ou have the right to ‘hang’ the jury with your vote if you cannot agree with other jurors!” Although defendant handed or attempted to hand the pamphlet to a number of people that day, his charge for jury tampering resulted from his distribution of the pamphlet to Jennifer Johnson and Theresa DeVries, two people summoned to the court for jury selection. Johnson testified that she arrived at the courthouse unsure of where to go, and approached defendant thinking he was out front to “direct traffic.” Although she could not remember who broached the subject, it was established between them that she was there for jury duty. Defendant proceeded to hand her a pamphlet “and sort of pointed at the door.” DeVries, on the other hand, testified that as she approached the courthouse, defendant specifically asked if she was there for jury selection. When she confirmed that she was, he handed her a pamphlet and said, “ ‘Do you know what your rights are for being a jury [sic] on jury duty?’ ” Defendant was ultimately arrested and charged with obstruction of justice, MCL 750.505, and jury tampering. Yoder’s case, however, never went to trial because the parties reached a plea agreement. Before trial in his own case, defendant moved the district court to dismiss both charges. The district court granted the motion with respect to obstruction of justice, but declined to dismiss the jury tampering charge. In so doing, the Court rejected defendant’s argument that the charge should be dismissed because the term “juror,” as used in MCL 750.120a(1), does not encompass individuals like Thompson and DeVries who were summoned for jury duty, but who were never actually selected or sworn, and took defendant’s First Amendment argument under advisement. The circuit court affirmed the district court’s decision, and defendant was denied leave to appeal by this Court, People v Wood, unpublished order of the Court of Appeals, entered December 2, 2016 (Docket No. 334410), as well as the Michigan Supreme Court, People v Wood, 500 Mich 963 (2017). Defendant’s two-day jury trial was held in district court. When asked why he decided to distribute the pamphlets, defendant testified that he learned a really interesting fact that 95 percent of all criminal cases in the United States, they are pled out before they go to trial. And so there was a—there was a very high likelihood that the Yoder case was not going to go to trial, but then I also believed that there were going to be a lot of people around the courthouse and it was going to give me a really good opportunity to educate as many people to hand out the pamphlets and get this information to their hands. He further stated that he did not know “who was summoned as a potential juror” and that he just handed the pamphlet “[t]o anybody that would receive one.” After the prosecution rested, defendant renewed his motion to dismiss on First Amendment grounds, but the district court rejected the argument, reasoning that defendant “was targeting jurors that were coming in that day,” and that there was “a compelling interest in making sure for both the Prosecutor and the defense that there is a fair and impartial jury being chosen and that it is also very clear to me that [defendant] was very interested in that case and -2- knew that the case was set for trial that day.” Further, the court found it to be irrelevant that a trial never occurred in Yoder’s case. At the close of trial, the district court provided the following instructions to the jury regarding the elements of jury tampering: First, that Jennifer Johnson and/or Theresa DeVries was a juror/were jurors in the case of People v Yoder. Second, that the defendant willfully attempted to influence that juror by the use of argument or persuasion. Third, that the defendant’s conduct took place outside of proceedings in open court in the trial of the case. A person acts willfully when she or she acts knowingly and purposefully. The word “juror” includes a person who has been summoned to appear in court to decide the facts in a specific trial. An “argument or persuasion” can be oral or written. Defendant was ultimately convicted and then sentenced on July 21, 2017. On appeal to the circuit court, defendant argued that: (1) “the State” violated his First Amendment rights when he was “arrested and charged because of the content his pamphlet contained,” and such conduct would fail a strict scrutiny analysis, (2) he was denied his right to due process because MCL 750.120a(1) is unconstitutionally vague, (3) the district court erred in defining the term “juror” to include persons summoned for jury duty, and (4) even if the district court’s interpretation was correct, he should not have been convicted under MCL 750.120a(1) because Yoder’s case never proceeded to trial. The circuit court issued its opinion and order on February 2, 2018, affirming defendant’s conviction. In so doing, the court first rejected defendant’s First Amendment argument, reasoning that the content of the pamphlet was not at issue because “[t]he statute relates solely to when a person attempts to ‘influence’ a juror’s decision, not to ‘influence’ them as to any topic whatsoever,” and defendant willfully attempted to influence people he believed to be jurors. Secondly, the court concluded that because Black’s Law Dictionary (10th ed) defines “juror” to include those selected for jury duty, the juror tampering statute applied. And lastly, the court ruled that no evidence existed to support defendant’s argument that he was denied a fair trial. II. DID DEFENDANT TAMPER WITH A “JUROR?” Defendant first argues that both trial courts erroneously defined “juror,” as used in MCL 750.120a(1), to include those summoned for jury duty. Specifically, he asserts that he could not have tampered with “a juror in any case” under MCL 750.120a(1), because the term “juror” only encompasses those selected and sworn for jury duty, and no jurors were ever selected in Yoder’s case. -3- Statutory interpretation is a question of law reviewed de novo. PNC Nat’l Bank Ass’n v Dep’t of Treasury, 285 Mich App 504, 505; 778 NW2d 282 (2009). When interpreting statutory provisions, the overriding goal is to discern and give effect to the Legislature’s intent. People v Flick, 487 Mich 1, 10; 790 NW2d 295 (2010). The words in the statute are, of course, the best evidence of what was intended by the Legislature in passing the statute. People v Smith, 496 Mich 133, 138; 852 NW2d 127 (2014) (“The words of a statute are the most reliable indicator of the Legislature’s intent and should be interpreted according to their ordinary meaning and the context within which they are used in the statute.”). “If the statute is unambiguous on its face, the Legislature will be presumed to have intended the meaning expressed, and judicial construction is neither required nor permissible.” People v Likine, 492 Mich 367, 387; 823 NW2d 50 (2012). MCL 750.120a(1) provides: A person who willfully attempts to influence the decision of a juror in any case by argument or persuasion, other than as part of the proceedings in open court in the trial of the case, is guilty of a misdemeanor punishable by imprisonment for not more than 1 year or a fine of not more than $1,000.00, or both. The term “juror” is not defined in the statute itself or in the Michigan Penal Code (MPC), MCL 750.1 et seq. As a result, we may consult a lay dictionary to determine the plain and ordinary meaning of “juror” if it lacks “a unique legal meaning,” People v Thompson, 477 Mich 146, 151- 152; 730 NW2d 708 (2007), or a legal dictionary if the word is a legal term of art, People v Jones, 467 Mich 301, 304; 651 NW2d 906 (2002). See also MCL 8.3a. However, because the definitions of the term “juror” “are the same in both a lay dictionary and legal dictionary, it is unnecessary to determine whether the phrase is a term of art, and it does not matter to which type of dictionary this Court resorts.” Hecht v Nat’l Heritage Academies, Inc, 499 Mich 586, 621-622 n 62; 886 NW2d 135 (2016). Defendant maintains that the rules of statutory construction require a court to consult dictionaries in publication at the time a statute was enacted – 19552 in this case – to determine the meaning of an undefined term. The Michigan Supreme Court has recognized the importance of defining a statutory term according to its original meaning. Cain v Waste Mgt, Inc (After Remand), 472 Mich 236, 247; 697 NW2d 130 (2005) (reasoning that because the statute at issue did not define the term “loss,” the Court was required to “ascertain the original meaning the word ‘loss’ had when the statute was enacted in 1912”). See also Perrin v United States, 444 US 37, 42; 100 S Ct 311; 62 L Ed 2d 199 (1979) (“A fundamental canon of statutory construction is that, unless otherwise defined, words will be interpreted as taking their ordinary, contemporary, common meaning.”). The definition of “juror” found in both lay and legal dictionaries in publication at the time the statute was enacted supports the trial courts’ determination that the term, as used in MCL 750.120a(1), includes those summoned for jury duty, even if never selected nor sworn to serve on a jury. 2 See 1955 PA 88. -4- In deciding defendant’s pretrial motion to dismiss, the district court relied in part on Black’s Law Dictionary (Revised 4th ed), published in 1968, which defines “juror” as “[o]ne member of a jury,” and includes a usage note which states, “The term is not inflexible, and besides a person who has been accepted and sworn to try a cause ‘juror’ may also mean a person selected for jury service.” The same usage note appears in Black’s Law Dictionary (4th ed), published in 1951 and cited by defendant in support of his argument. Moreover, the usage note is consistent with the definition of “juror” in a lay dictionary from 1955. Webster’s New International Dictionary (1955), provides that a juror is [o]ne of a number of men sworn to deliver a verdict as a body; specif., Law, a member of a jury, or one designated and summoned to serve on a jury. “Juror” is uniformly used by the jurists most familiar with the subject as including persons designated or ordered to be summoned as jurors. For stronger reasons, it would include them after they are summoned and have appeared in court. Similar definitions for “juror” also appear in more current legal and lay dictionaries. Merriam-Webster’s Collegiate Dictionary (11th ed) defines “juror” as both “a member of a jury” and “a person summoned to serve on a jury.” And in Random House Webster’s College Dictionary (2001), “juror” is defined as “a member of a jury,” “a member of the panel from which a jury is selected,” or “a person who has taken an oath or sworn allegiance.” Similarly, Black’s Law Dictionary (10th ed) states that a “juror” is “[a] member of a jury; a person serving on a jury panel.” The definition of “jury panel” directs the reader to “VENIRE,” which is defined as “[a] panel of persons selected for jury duty and from among whom the jurors are to be chosen.” Id. Consequently, based on dictionary definitions from 1955 and today, a “juror” under MCL 750.120a(1) includes a person summoned for jury duty. Defendant’s assertions that MCL 750.120, M Crim JI 1.1, and MCR 6.412(B) support his argument regarding the definition of “juror” also fail. MCL 750.120,3 which punishes jurors who accept bribes, provides as follows: Any person summoned as a juror or chosen or appointed as an appraiser, receiver, trustee, administrator, executor, commissioner, auditor, arbitrator or referee who shall corruptly take anything to give his verdict, award, or report, or who shall corruptly receive any gift or gratuity whatever, from a party to any suit, cause, or proceeding, for the trial or decision of which such juror shall have been summoned, or for the hearing or determination of which such appraiser, receiver, trustee, administrator, executor, commissioner, auditor, arbitrator, or referee shall have been chosen or appointed, shall be guilty of a felony. Defendant highlights the language “[a]ny person summoned as a juror” to assert that “[i]f the legislature truly intended for jury tampering to include every person who has been summoned, it 3 MCL 750.120 was enacted in 1931. 1931 PA 328. -5- would have used the same language from the immediately preceding statute.” But “the specific rules of statutory construction are merely aids to interpretation.” People v Armstrong, 212 Mich App 121, 128; 536 NW2d 789 (1995). Looking at MCL 750.120 in its entirety, and considering the context in which the phrase is used, it is obvious to us that the Legislature simply used the phrase “[a]ny person summoned” to describe the act of being called for jury duty, just as it used a descriptive phrase for the rest of the positions listed in the statute, i.e., “[a]ny person . . . chosen or appointed as.” No comparable language was necessary or appropriate in MCL 750.120a(1), as it applies only to jurors. Further, statutory language should be read in harmony with the entire legislative scheme, Charter Twp of York v Miller, 322 Mich App 648, 662; 915 NW2d 373 (2018), and under the doctrine of in pari materia, “statutes that relate to the same subject or that share a common purpose should, if possible, be read together to create a harmonious body of law,” People v Mazur, 497 Mich 302, 313; 872 NW2d 201 (2015). Both MCL 750.120 and MCL 750.120a aim to preserve the integrity and impartiality of juries. It would be inconsistent with this shared purpose to read one as applicable to anyone summoned for jury duty, and the other as applicable only to those chosen from the pool of summoned jurors and sworn to serve on a jury. We likewise reject defendant’s position that MCR 6.412(B) and M Crim JI 1.1 support his argument because they each use the term “prospective jurors” with regard to preliminary instructions given before the jury selection process. Neither the court rules nor jury instructions are created by the Legislature, so their use of the term “prospective jurors” has no bearing on what the Legislature meant when it used the term “juror” in a statute.4 Additionally, neither People v Cain, 498 Mich 108; 869 NW2d 829 (2015), nor Jochen v Co of Saginaw, 363 Mich 648; 110 NW2d 780 (1961), support defendant’s argument. Neither case interpreted the term “juror,” as used in MCL 750.120a(1), and we fail to understand how opinions involving the proper juror’s oath, see Cain, 498 Mich at 112, or whether a person injured while reporting for jury duty should be considered a county employee under the workmen’s compensation act, see Jochen, 363 Mich at 648, are at all applicable to the separate statutory question before us. Defendant also argues that the district court misapplied the elements of jury tampering,5 citing the Michigan Criminal Nonstandard Jury Instructions which recommend the following 4 MCL 600.1334 and MCL 600.1344, which govern juror excusal from attendance in court and juror compensation, support our conclusion that the term “juror,” as used in MCL 750.120a(1), includes those summoned for jury duty, but never selected to actually serve on a jury. Both use the term broadly. For instance, MCL 600.1334(1) states, in part, “The chief judge may postpone the service of a juror to a later term of court if the juror has not been called for voir dire examination in any action.” And MCL 600.1344 provides that jurors must be compensated for each day of actual attendance at sessions of the court. Although “juror” is undefined, the statutes clearly apply to those persons summoned for jury duty, but not necessarily selected and sworn. 5 “This Court reviews jury instructions as a whole to determine whether there is error requiring reversal.” People v Bartlett, 231 Mich App 139, 143; 585 NW2d 341 (1998). -6- instruction for the first element of the crime: “That [name juror involved] was a juror in the case of [name case in which juror sat].” In so doing, he asserts that “[e]ven the proposed jury instruction acknowledged that the juror must have ‘sat’ in the case.” But this is simply a different way of arguing that the term “juror” does not include those summoned for jury duty, which we have rejected. As stated above, jury instructions are not created by the Legislature and, thus, have no bearing on the interpretation of statutory terms. Further, the district court did not err by refusing to allow defendant to argue that there were no jurors in Yoder’s case because no trial ever occurred. MCL 750.120a(1) only requires that someone attempt to influence “a juror in any case.” A trial is not required,6 and there is no indication that the Legislature sought to exclude from prosecution under MCL 750.120a(1) a person who attempts to influence a juror’s decision in a case that is ultimately disposed of before trial. III. DID DEFENDANT’S CONVICTION VIOLATE THE FIRST AMENDMENT? A. AS-APPLIED CHALLENGE Having concluded that Johnson and DeVries were “jurors” for purposes of the jury tampering statute, we now must address defendant’s alternative argument that MCL 750.120a(1), as applied to his circumstances, violated his First Amendment right to free speech. We review constitutional questions de novo. People v Pennington, 240 Mich App 188, 191; 610 NW2d 608 (2000). “A constitutional challenge to the validity of a statute can be brought in one of two ways: by either a facial challenge or an as-applied challenge.” In re Forfeiture of 2000 GMC Denali & Contents, 316 Mich App 562, 569; 892 NW2d 388 (2016). “When faced with a claim that application of a statute renders it unconstitutional, the Court must analyze the statute ‘as applied’ to the particular case.” Crego v Coleman, 463 Mich 248, 269; 615 NW2d 218 (2000). In other words, “[a]n as-applied challenge contends that the law is unconstitutional as applied to the litigant’s particular speech activity, even though the law may be capable of valid application to others.” Foti v City of Menlo Park, 146 F3d 629, 635 (CA 9, 1998). See also Bonner v Brighton, 495 Mich 209, 223 n 27; 848 NW2d 380 (2014) (“An as- applied challenge, to be distinguished from a facial challenge, alleges ‘a present infringement or denial of a specific right or of a particular injury in process of actual execution’ of government action.”) (citation omitted). The First Amendment to the United States Constitution provides, in pertinent part, that “Congress shall make no law . . . abridging the freedom of speech,” US Const, Am I, and is applicable to the states through the Fourteenth Amendment, McDonald v Grand Traverse Co Election Comm, 255 Mich App 674, 681; 662 NW2d 804 (2003). “Leafletting and commenting 6 Our dissenting colleague opines that MCL 750.120a(1) is only implicated “after the trial process has begun.” But the language referencing a trial is in the exception to the rule, allowing arguments and persuasion of jurors once trial has commenced. That language adds nothing to when a person becomes a juror under this statute. -7- on matters of public concern are classic forms of speech that lie at the heart of the First Amendment, and speech in public areas is at its most protected on public sidewalks, a prototypical example of a traditional public forum.” Schenck v Pro-Choice Network of Western New York, 519 US 357, 377; 117 S Ct 855; 137 L Ed 2d 1 (1997). Defendant’s as-applied challenge is based upon his assertion that his conduct involved pure speech, the restriction of which should be subject to strict scrutiny, and the state has no compelling interest in preventing a person from distributing educational pamphlets to potential jurors in a public space. In addressing this as-applied challenge our focus is exclusively on the specific facts at issue—namely, the jury’s finding that defendant distributed pamphlets at the courthouse to influence the decision of people he knew to be potential jurors appearing for a case he took an interest in.7 In fact, as discussed below, the conduct defendant engaged in is precisely the type of speech states have a compelling interest in regulating through validly-enacted statutes. “[I]t is well understood that the right of free speech is not absolute at all times and under all circumstances.” Chaplinsky v New Hampshire, 315 US 568, 571; 62 S Ct 766; 86 L Ed 1031 (1942). Although speech is given great protections by the First Amendment, the states nonetheless have the right to punish certain limited speech so long as there is a compelling reason to do so, and it is accomplished in the narrowest fashion. See Speet v Schuette, 726 F3d 867, 880 (CA 6, 2013). And, when it comes to the prevention of jury tampering, it has long been held that states may punish or regulate speech intended to interfere with court proceedings or with the right of an accused to have his case decided by an impartial jury. See Turney v State, 936 P2d 533, 541 (Alas, 1997) (holding that a narrowly drawn jury tampering statute did not implicate protected speech under the First Amendment); Dawkins v State, 208 So 2d 119, 122 (Fla App, 1968) (“Efforts to influence a grand jury in its deliberations respecting specific matters under investigation by it are not shielded by the constitutional right of free speech.”); Pennekamp v Florida, 328 US 331, 366; 66 S Ct 1029; 90 L Ed 1295 (1946) (FRANKFURTER, J., concurring) (“In securing freedom of speech, the Constitution hardly meant to create the right to influence judges or juries.”). See also Cox v Louisiana, 379 US 559, 562-564; 85 S Ct 476; 13 L Ed 2d 487 (1965) (upholding a statute that prohibited picketing near a courthouse on the basis that “[a] State may adopt safeguards necessary and appropriate to assure that the administration of justice at all stages is free from outside control and influence,” and that a statute like that at issue does not infringe the right of free speech because “[t]he conduct which is the subject of [the] statute . . . is subject to regulation even though intertwined with expression and association”). Thus, because defendant concedes that MCL 750.120a(1) is facially valid, and a jury found that he 7 Evidence at trial supported the jury’s findings. Defendant testified that he took an interest in Yoder’s case, and he attended the pretrial hearing where the trial date was announced. He then returned to the courthouse on the day set for trial, and distributed the FIJA pamphlets to several people, including Johnson and DeVries, who both testified that defendant knew they were at the courthouse because they had been summoned for jury duty. -8- willfully attempted to influence a juror’s decision in Yoder’s case, his as-applied constitutional challenge necessarily fails.8 The foregoing is a more direct way of stating that when applying strict scrutiny to the government’s actions as defendant urges us to do (and argues the trial courts erred by failing to do), his First Amendment challenge fails because the state has a compelling interest in protecting the sanctity of the jury.9 “The First Amendment requires heightened scrutiny whenever the government creates a regulation of speech because of disagreement with the message it conveys.” Sorrell v IMS Health Inc, 564 US 552, 566; 131 S Ct 2653; 180 L Ed 2d 544 (2011) (quotation marks and citation omitted). “Government regulation of speech is content based if a law applies to particular speech because of the topic discussed or the idea or message expressed.” Reed v Town of Gilbert, Arizona, ___ US ___, ___; 135 S Ct 2218, 2227; 192 L Ed 2d 236 (2015). “Content-based laws—those that target speech based on its communicative content—are presumptively unconstitutional and may be justified only if the government proves that they are narrowly tailored to serve compelling state interests.” Id. at 2226. Applying strict scrutiny, we hold that application of the statute to defendant’s conduct was a narrowly tailored means of furthering the state’s compelling interest in preserving the impartiality and integrity of jurors. Defendant concedes that the government has a compelling interest in preventing jury tampering, but states he “does not concede . . . that the State has a 8 The Ninth Circuit rejected a First Amendment challenge to a similar jury tampering statute in Turney v Pugh, 400 F3d 1197 (CA 9, 2005). There, the petitioner (who was the petitioner in Turney v State, 936 P2d 533 (Alas, 1997)) challenged the Alaska statute as overbroad, and as part of its decision, the court reasoned: [T]he First Amendment, while generally quite protective of speech concerning judicial proceedings, does not shield the narrow but significant category of communications to jurors made outside of the auspices of the official proceeding and aimed at improperly influencing the outcome of a particular case. What Alaska’s jury tampering statute covers in the main, then, is speech that is not protected by the First Amendment.” [Id. at 1203.] Defendant’s attempt to distinguish Turney on the basis that the Alaska statute expressly defined “juror” to include those summoned for jury duty is misguided, as the term “juror,” as used in MCL 750.120a(1), also includes those summoned for jury duty. 9 Defendant does not argue that MCL 750.120a(1) is on its face a content-based regulation. Rather, he maintains that the government regulated his “speech in a content-based way” given that “[i]t is clear that the government actors in this case arrested and charged [him] because of the content of his pamphlet.” We apply strict scrutiny here because although the statute is not a purely content-based restriction, to convict under the statute it must be proven that defendant intended to influence a juror, and that can only be done by reviewing the words communicated to the juror. For example, if defendant was passing out to jurors a newspaper circular with commercial advertisements, he would never have been prosecuted or convicted of jury tampering. -9- compelling interest to criminalize [his] distribution of a juror rights pamphlet on a public sidewalk.” Yet this argument is based on the premise, rejected outright by the jury, that defendant only intended to educate the general public with his pamphlet. The jury, in fact, determined the opposite, as it found that defendant distributed the pamphlets in an attempt to willfully influence the decision of jurors in a particular case. We cannot overemphasize the importance of the jury’s finding that defendant intended to influence two jurors summoned for Yoder’s case. It is that specific level of intent that takes defendant’s case out of the general pamphletting activities protected by the First Amendment. Further, we reject defendant’s argument that the government does not have a compelling interest in preventing tampering with “potential jurors.” First, as we have already concluded, Johnson and DeVries were “jurors,” not “potential jurors.” Second, there is no basis in the law that would allow us to recognize the government’s interest in protecting the impartiality of jurors only after they have been selected and sworn, as juries are chosen from the pool of people summoned for jury duty. Jurors summoned for duty that are tampered with do not lose that taint if they end up on the jury. See State v Tucker, 170 So 3d 394, 406 (La App, 2015) (“Because any threat or attempt to influence a person summoned for jury duty (i.e., a ‘prospective juror’) in a pending trial impairs the administration of justice in exactly the same way that justice is impaired by a threat or influence of an impaneled ‘juror,’ we conclude that the term ‘juror’ in the statute includes a ‘prospective juror’ within its reach.”). Defendant’s additional argument that “[e]ven if the government had a compelling interest in ensuring potential jurors are not informed of the powers they rightfully and lawfully possess . . . , the government failed to use the least restrictive means available to accomplish that interest,” fares no better. A content-based restriction on speech “must be the least restrictive means of achieving a compelling state interest.” McCullen v Coakley, ___ US ___, ___; 134 S Ct 2518, 2530; 189 L Ed 2d 502 (2014). Defendant asserts specifically that the government exercised the most extreme option available in response to his conduct by arresting and prosecuting him, and that the government could have instead employed valid time, place, and manner restrictions to regulate his distribution of pamphlets. We reject this argument for two reasons. First, the argument is based entirely on the rejected premise that defendant’s distribution of the pamphlet was an attempt to educate the public rather than a willful attempt to influence the decision of jurors in Yoder’s case. Second, although at the time defendant was arrested and charged it appears that certain government actors did not know of defendant’s interest in Yoder’s case and disapproved of the pamphlet’s contents, the jury ultimately found defendant guilty of MCL 750.120a(1), which requires a specific intent to influence jurors. And the evidence presented at trial supported these findings. The law defendant was convicted under does not address the random distribution of pamphlets to the general public outside a courthouse. Instead, the Legislature was concerned with an individual’s purposeful attempt to tamper with jurors, which is a compelling state interest. The statute also touches upon only a narrowly defined class of people and speech, i.e., those who purposefully communicate with specific jurors summoned to serve on a case with the intent to influence the decision of a juror. Defendant cannot rely on less restrictive means relating to an entirely -10- hypothetical governmental interest not present in this case, and the government clearly has no obligation, through statute, regulation, or rule, to designate places and times during which an individual may engage in criminal behavior, speech-related or not.10 B. OVERBROAD CHALLENGE Defendant also argues that MCL 750.120a(1) is unconstitutionally overbroad because “[w]hen the lower courts redefined the word ‘juror’ to mean more than a person actually selected, empaneled, and sworn in a case, it vastly expanded the range and scope of the jury tampering statute to reach a substantial amount of constitutionally protected speech.” Although defendant characterizes his argument as an as-applied challenge, it is more appropriately considered a facial challenge to the statute itself, as we have held that the lower courts accurately interpreted the term “juror” in MCL 750.120a(1). “An overbroad statute prohibits protected conduct, primarily conduct protected by the First Amendment.” People v Lueth, 253 Mich App 670, 676; 660 NW2d 322 (2002). “Under the doctrine of First Amendment overbreadth, a litigant may mount a facial attack on a statute that restricts protected speech even if the litigant’s own speech is unprotected.” Turney v Pugh, 400 F3d 1197, 1200 (CA 9, 2005), citing Broadrick v Oklahoma, 413 US 601, 612; 93 S Ct 2908; 37 L Ed 2d 830 (1973). “In a facial challenge to the overbreadth and vagueness of a law, a court’s first task is to determine whether the enactment reaches a substantial amount of constitutionally protected conduct.” Village of Hoffman Estates v Flipside, Hoffman Estates, Inc, 455 US 489, 494; 102 S Ct 1186; 71 L Ed 2d 362 (1982). “Criminal statutes must be scrutinized with particular care; those that make unlawful a substantial amount of constitutionally protected conduct may be held facially invalid even if they also have legitimate application.” City of Houston, Texas v Hill, 482 US 451, 459; 107 S Ct 2502; 96 L Ed 2d 398 (1987) (citation omitted). Defendant asserts that the statute is unconstitutionally overbroad because “a person could be criminally liable for merely speaking with, giving information to, or communicating in any way with a potential juror.” For example, he contends, if he “had started handing out pamphlets to the summoned potential jurors after the Court released them on the day in question, under the lower courts’ redefinition, he could still be charged with jury tampering because they were still summoned for that month.” However, defendant’s assertions ignore the requirement in MCL 750.120a(1) that to be convicted of jury tampering, a person must possess the willful intent to influence the decision of a juror in a particular case. That requirement serves as a constitutional safeguard. As the Ninth Circuit reasoned in Turney, 400 F3d at 1204, “innocent” conversations with jurors will rarely violate a jury tampering statute because such communications will usually 10 Defendant appears to misunderstand the concept of time, place, and manner restrictions. Time, place, and manner restrictions may be used to regulate speech otherwise protected under the First Amendment, if such restrictions are content-neutral and narrowly tailored to serve a significant governmental interest. Clark v Community for Creative Non-Violence, 468 US 288, 293-294; 104 S Ct 3065; 82 L Ed 2d 221 (1984). -11- lack “the requisite intent.” If a person is not attempting to influence a juror’s decision in a case, that person can freely communicate with the juror without violating MCL 750.120a(1). In its amicus brief, the American Civil Liberties Union contends that “[t]he state’s interpretation of the jury tampering statute criminalizes a great variety of First Amendment protected expression,” and provides the following hypotheticals: Consider whether a citizen committed to decriminalizing possession of controlled substances, passing out material regarding the issue outside a courthouse, would be charged with jury tampering if a prospective juror received the material. Would a group advocating for tort reform be prevented from posting outside the court on days when products liability cases were being tried? Can the court prevent a women’s rights organization from holding a rally when sex discrimination cases are on the docket? Similarly, in its amicus brief, the Cato Institute posed hypotheticals involving op-ed writers, radio personalities, protesters with signs urging conviction, and a wife reminding her husband who has been selected for jury duty that he should not assume government witnesses are more credible than other witnesses. Despite these concerns, the simple fact is that the conduct prosecuted in this case has no relationship to the eye-grabbing hypotheticals posed, which ignore the intent element of MCL 750.120a(1). For instance, an op-ed writer or radio personality expressing an opinion about a particular case or types of cases would likely not possess the intent necessary to be convicted of jury tampering under MCL 750.120a(1). There is a significant distinction between an individual targeting jurors for a particular case and providing them with information calculated to influence how they conduct their duties as jurors, and an op-ed writer or protester who opines about the general propriety of a prosecution or civil matter, with no intention to influence a particular juror. Moreover, [t]he overbreadth doctrine is not . . . ‘casually employed,’ even in a case involving a First Amendment challenge.” In re Chmura, 461 Mich 517, 531; 608 NW2d 31 (2000). “[T]here must be a realistic danger that the statute itself will significantly compromise recognized First Amendment protections of parties not before the Court for it to be facially challenged on overbreadth grounds.” Members of the City Council of Los Angeles v Taxpayers for Vincent, 466 US 789, 801; 104 S Ct 2118; 80 L Ed 2d 772 (1984). There is nothing to show that the statute would be applied to anyone or any set of facts that go beyond the intent required by the statute. With regard to the political demonstration examples, the United States Supreme Court’s decision in Cox, provides guidance. In that case, the defendant led a group of people outside a courthouse in protest against the arrest of students the day before, and was himself arrested and convicted of intending to influence a juror or to obstruct or impede the administration of justice. Cox, 379 US at 560, 564-565. The Court explained that “[t]he conduct which is the subject of this statute—picketing and parading—is subject to regulation even though intertwined with expression and association,” id. at 563, and ultimately concluded that the statute at issue was facially valid because “the fact that free speech is intermingled with such conduct does not bring with it constitutional protection,” id. at 564. Thus, to the extent that MCL 750.120a(1) may preclude certain limited courthouse demonstrations, the United States Supreme Court has -12- countenanced that result given the government’s strong interest in the impartial administration of justice. Defendant’s First Amendment argument fails. IV. DUE PROCESS A. VAGUENESS Defendant next argues that MCL 750.120a, as interpreted and applied by the trial courts, is void for vagueness because it: (1) fails to provide proper notice to citizens “that the distribution of a pamphlet of general information on a public sidewalk to a person who was merely summoned for potential jury duty is a criminal act,” (2) is susceptible to arbitrary and discriminatory enforcement, and (3) as erroneously interpreted and applied, impinged on his First Amendment rights. We review de novo “challenges to the constitutionality of a statute under the void-for- vagueness doctrine.” People v Lawhorn, 320 Mich App 194, 197 n 1; 907 NW2d 832 (2017). “The ‘void for vagueness’ doctrine is derived from the constitutional guarantee that the state may not deprive a person of life, liberty, or property, without due process of law.” State Treasurer on Behalf of Dep’t of Corrections v Wilson (On Remand), 150 Mich App 78, 80; 388 NW2d 312 (1986). “A penal statute may be unconstitutionally vague if it (1) fails to provide fair notice of the conduct proscribed, (2) permits arbitrary and discriminatory enforcement, or (3) is overbroad and impinges on First Amendment freedoms.” People v Sands, 261 Mich App 158, 161; 680 NW2d 500 (2004). “A vagueness challenge must be considered in light of the facts at issue.” Id. “When presented with a vagueness challenge, we examine the entire text of the statute and give the words of the statute their ordinary meanings.” People v Morey, 230 Mich App 152, 163; 583 NW2d 907 (1998), aff’d 461 Mich 325 (1999). “To afford proper notice of the conduct proscribed, a statute must give a person of ordinary intelligence a reasonable opportunity to know what is prohibited.” People v Roberts, 292 Mich App 492, 497; 808 NW2d 290 (2011). “A statute cannot use terms that require persons of ordinary intelligence to speculate regarding its meaning and differ about its application.” Sands, 261 Mich App at 161. “For a statute to be sufficiently definite, its meaning must be fairly ascertainable by reference to judicial interpretations, the common law, dictionaries, treatises, or the commonly accepted meanings of words.” Id. Defendant first asserts that if the trial courts’ interpretation of MCL 750.120a(1) is correct, then the law is unconstitutionally vague because “[n]o statute, case, or any other Michigan authority exists which would have given notice to the citizenry that the word ‘juror’ included anyone who had simply received a summons in the mail.” However, a person of ordinary intelligence does not have to speculate as to the word’s meaning. Rather, the definition of “juror” is readily ascertainable to anyone with access to a dictionary. Sands, 261 Mich App at 161. Further, defendant’s assertion that a person of ordinary intelligence comparing MCL 750.120 and MCL 750.120a(1) would look at the statutes and naturally conclude that one covers a person summoned for jury duty while the other does not, lacks merit for the reasons already stated. -13- Defendant also suggests that MCL 750.120a(1) is susceptible to arbitrary and discriminatory enforcement, asserting that his own arrest and prosecution were based on the government’s “animus towards the content of his pamphlet.” Even if the decision to arrest and charge defendant was primarily based on the content of the pamphlet, the pamphlet provided evidence of his intent to influence a juror and was relevant to his prosecution. Additionally, although a statute may be misapplied by officials, our primary focus is on whether the statute permits arbitrary and discriminatory enforcement, not whether an isolated official happens to arbitrarily enforce it. See Allison v Southfield, 172 Mich App 592, 596; 432 NW2d 369 (1988) (“Even if one of the evils sought to be prevented by the vagueness doctrine is the vesting of unstructured discretion and the resultant arbitrary and [discriminatory] enforcement of the law, the doctrine is not triggered unless the wording of the promulgation is itself vague.”) (citation omitted). Defendant has not shown that MCL 750.120a(1) is unconstitutionally vague. People Vandenberg, 307 Mich App 57, 62; 859 NW2d 229 (2014). B. FAIR TRIAL Lastly, defendant argues that he was denied his right to a fair trial because the district court precluded him from arguing the elements of MCL 750.120a(1), and because he was not permitted to cross-examine Magistrate Lyons regarding purported bias against him. We review de novo whether a defendant received a fair trial. People v Stevens, 498 Mich 162, 168; 869 NW2d 233 (2015). With regard to the elements of jury tampering, defendant asserts he should have been allowed to argue that the absence of an actual trial in Yoder’s case precluded his conviction under MCL 750.120a(1). However, the statute contains no requirement that a trial take place, and the argument is duplicative of his underlying position, rejected in this opinion, that only those selected and sworn for jury service may be considered jurors under the statute. With regard to Magistrate Lyons’s purported bias, “[a] primary interest secured by the Confrontation Clause[,US Const, Am VI,] is the right of cross-examination.” People v Gaines, 306 Mich App 289, 315; 856 NW2d 222 (2014). “Neither the Sixth Amendment’s Confrontation Clause nor due process confers on a defendant an unlimited right to cross-examine on any subject.” People v Canter, 197 Mich App 550, 554; 496 NW2d 336 (1992). “Rather, the Confrontation Clause protects the defendant’s right for a reasonable opportunity to test the truthfulness of a witness’ testimony.” People v Ho, 231 Mich App 178, 190; 585 NW2d 357 (1998). However, “[a] limitation on cross-examination that prevents a defendant from placing before the jury facts from which bias, prejudice, or lack of credibility of a prosecution witness might be inferred constitutes denial of the constitutional right of confrontation.” People v Kelly, 231 Mich App 627, 644; 588 NW2d 480 (1998). Defendant contends specifically that he wished to examine Magistrate Lyons regarding conduct at the arraignment, where Magistrate Lyons allegedly “set an unconstitutionally high bond of $150,000.00 (10%)” and “refused to appoint [him] an attorney,” and that the district court erred by denying him the opportunity to do so. Defendant identifies caselaw suggesting that a defendant has a constitutional right to examine a witness’s bias, Kelly, 231 Mich App at 644; Hayes v Coleman, 338 Mich 371, 380-381; 61 NW2d 634 (1953), and the matters identified -14- by defendant arguably show that Magistrate Lyons was biased against him. However, even if the district court erred by precluding cross-examination, the error would be harmless. [V]iolations of the right to adequate cross-examination are subject to a harmless- error analysis. Whether such an error is harmless in a particular case depends on a host of factors, including the importance of the witness’ testimony, whether the testimony was cumulative, the presence or absence of evidence corroborating or contradicting the testimony of the witness, the extent of cross-examination otherwise permitted, and the overall strength of the prosecution’s case. [Kelly, 231 Mich App at 644-645.] Magistrate Lyons’s testimony merely provided context for the events of the day. He testified about when he learned of the pamphlets, his interaction with defendant, and his subsequent conversation with Judge Jaklevic. Further, he testified that Yoder’s case was the only case scheduled for trial on the day in question. This testimony was cumulative to that of other witnesses, namely Judge Jaklevic, and had little bearing on whether defendant actually violated MCL 750.120a(1). Moreover, we see nothing to suggest that the jury would have reached a different result had it concluded that Magistrate Lyons was biased against defendant and not credible. As a result, we cannot hold that defendant was denied a fair trial on this basis. Affirmed. /s/ Christopher M. Murray /s/ Thomas C. Cameron -15-
Wound Care. Nursing Interventions and Rationales. 1. Assess site of impaired tissue integrity and determine etiology (e.g., acute or chronic wound, burn, dermatological lesion, pressure ulcer, leg ulcer). Prior assessment of wound etiology is critical for proper identification of nursing interventions (van Rijswijk, 2001). 2 . Every nurse knows that this is the phase where the appropriate actions are selected and carried out to provide care for the patient. For a layperson, this is when they see nurses sprang to action and respond to emergency situations, or when they give. Accurate wound assessment and effective wound management requires an understanding of the physiology of wound healing, combined with knowledge of the actions of the dressing products available. It is essential that an ongoing process of assessment, clinical decision making, intervention and documentation occurs to facilitate optimal wound healing Title: Nursing Intervention Statements Catalogue Type: Terminology Subset Publication Date: 2008, Updated 2011, 2013, 2015, 2017, 2019 Authors: Creation of this catalogue was a group endeavour. Note: This catalogue provides ICNP concepts pertaining to nursing interventions across the continuum of care. Background: The International Classification for Nursing Practice (ICNP®) is a unified nursing Wound care 87 . 4 . 5 Vital signs Definition Nursing intervention Goals to measure and follow vital signs in patient Procedure Measuring blood pressure: (in thin part) and on another part is scale graduated in Celsius of Fahrenheit In the 'Best practice statement: optimising wound care' 9, the authors propose the use of a care pathway for the patient with a wound. The pathway leads the clinician from assessment and diagnosis, to setting objectives and provision of care. A clinical pathway for wound care is also advocated by Barr and Cuzzell 43. In light of evidence. Classification. There are different classifications of nursing interventions that can involve care of the entire patient. This can be anything from promoting bowel functioning, educating the. Nursing classification systems are basically the articulation of nursing care, using a standardized language that can be easily understood by all nursing staff as well as by other providers. The University of Iowa's College of Nursing has been a leader in the development of standardized languages to describe the work that nurses do, for the past decade There are a number of interventions required for the management of a pressure ulcer patient like nutritional care, pressure reducing/ relieving surfaces and skin and wound care. [ 21 ] Positioning of patients who spend substantial periods of time in a chair or wheelchair should take into account, distribution of weight, postural alignment and. The more you look into nursing careers, the more you realize that a day in the life of a nurse is rarely boring. You recently came across the term nursing intervention, which sounds like even more drama than the TV shows Grey's Anatomy and Intervention combined!. Nurses can certainly experience their share of excitement during work, but nursing interventions aren't quite as. Nursing diagnosis guide and list. Know the concepts behind writing NANDA nursing diagnosis in this ultimate tutorial and nursing diagnosis list (now updated for 2021). Learn what is a nursing diagnosis, its history and evolution, the nursing process, the different types, its classifications, and how to write NANDA nursing diagnoses correctly Recordkeeping Practices of Nurses and Nursing Documentation. Information work is a critical part of the medical endeavor. Strauss and Corbin 3 note that trajectory work, as they view medical care, requires information flow before and after each task or task sequence to maintain continuity of care. Tasks are not isolated but are intertwined and build on one another to achieve patient goals NURSING PROCESS INFORMATION - PART II . Nursing Interventions: A nursing intervention is any treatment based upon clinical judgement and knowledge that a nurse performs to enhance client/patient outcomes (NIC, 1996, p. xvii) The Nursing Interventions Classification (NIC) differentiates between direct and indirect nursing interventions Includes 542 research-based nursing intervention labels with specific activities. Presents a definition, a list of activities, a publication facts line, and references for each intervention. Provides 34 brand-new interventions that address important topics such as defibrillator management, infant nutrition, toddler safety, and wound care: burns omitted. The nursing documentation entries are combined at different stages of the process as care needs, nursing interventions and nursing outcomes, as a result of which they will constitute a national Nursing Minimum Data Set and, furthermore, even an international Nursing Minimum Data Set Examples of direct care interventions are wound care, repositioning, and ambulation. Indirect care interventions are performed when the nurse provides assistance in a setting other than with the patient. Examples of indirect care interventions are attending care conferences, documenting, and communicating about patient care with other providers Part Six Nursing Diagnosis Components. The three main components of a nursing diagnosis are: Problem and its definition; Etiology or risk factors Defining characteristics or risk factors 1. The problem statement explains the patient's current health problem and the nursing interventions needed to care for the patient. 2 Embedding Nursing Interventions into the World Health Organization's Means (Box 1). ICHI is neutral as to the profession of the person delivering the intervention, and why and where the intervention is delivered. The classification is divided into three broad Pressure ulcer care Maceration care Surgical wound care Traumatic wound care. Leg ulcers can be defined as ulceration below the knee on any part of the leg , including the foot, and is classified as a chronic wound, that is, a wound that remains stuck in any of the phases of the healing process for a period of 6 weeks or more, or that requires a structured intervention of nursing care [5, 6] Introduction. The challenging nature of wound healing has led to calls for practitioners worldwide to adopt a holistic and systematic approach to wound care 1-3.This should involve initial and ongoing wound assessments 2, 4 and has several purposes. Specifically, it provides baseline information against which progress can be monitored 5, enables goal setting 2 and the correct selection of. Burns Nursing Management. Burns is a form of trauma or injury to body tissues, either localize in a certain body part or massive. It is caused by thermal, chemical, electrical, or radioactive substances. It is classified as partial-thickness or full-thickness. Partial-thickness burns involve the epidermis and upper portion of the dermis Nursing Interventions Classification (NIC) in the Era of the Electronic Health Care Record Howard K. Butcher, RN; PhD If nursing data is to be part of the data analyzed from electronic patient records, we, as nurses, Self-Care Facilitation Skin/Wound Management Psychological Comfort Promotion Patient Crisis Management Ris Refer to the Wound Care Nursing Clinical Guideline and consult the Stomal Therapy Nurse Consultant for clinical guidance on appropriate assessment and management of the wound if clinically indicated. The plan will be developed in collaboration with the child's parent or carer and will be specific to the patient's individual needs and risk. Nursing Interventions Classification: A Content Analysis of Nursing Activities in Public Schools Linda M. Sigsby, MS, RN, and Doris W. Campbell, PhD, RN University of Florida Nursing Interventions Classification (NIC) is an effort to describe nursing activities by using a standardized nomenclature of nursing treatments (McCloskey & Bulechek, 1992) Wound care: complicated or chronic, 657 Nursing Interventions Classification (NIC) labels are drawn from a third standardized nursing language and serve as a general header for the nurse in deciding about the relevance of a specific intervention for an individual client situation The prevention of pressure ulcers represents a marker of quality of care. Pressure ulcers are a major nurse-sensitive outcome. Hence, nursing care has a major effect on pressure ulcer development and prevention. Prevention of pressure ulcers often involves the use of low technology, but vigilant care is required to address the most consistently reported risk factors for development of pressure. PART ONE Construction and Use of the Classification. Chapter 1 An Overview of the Nursing Interventions Classification (NIC) Chapter 2 Development, Testing, and Implementation of NIC: 1987-2006. Chapter 3 Use of NIC. PART TWO Taxonomy of Nursing Interventions. PART THREE The Classification. PART FOUR Core Interventions for Nursing Specialty Area Compare the various burn wound care techniques and surgical options for partial-thickness versus full-thickness burn wounds. 8. Prioritize nursing interventions in the management of the burn patient's physiologic and psychosocial needs. 9. Examine the various physiologic and psychosocial aspects of burn rehabilitation. 10 Select nursing interventions with the book that standardizes nursing language!Nursing Interventions Classification (NIC),7th Editionprovides a research-based clinical tool to help you choose appropriate interventions.It standardizes and defines the knowledge base for nursing practice as it communicates the nature of nursing With respect to coding systems for nursing, Clark and Lang described criteria from the perspective of the development of the International Classification of Nursing Practice (ICNP). 2 McCloskey and Bulechek generated criteria specifically for the evaluation of the taxonomic structure of the Nursing Interventions Classification system that they developed; i.e., homogeneity of all interventions. Boomsma et al. (1999) demonstrated, based on the nursing interventions classification (NIC), the wide range of interventions nurses perform in both long-term and crisis-oriented psychiatric home care. In both types of psychiatric home care, medication management was the nursing intervention label to which most interventions related most closely Nurses' role in diabetic foot care involves foot examination, wound care and encourage patients and their families on the necessary care and follow-up visits. Screening is a critical part of care. It allows for early detection of diabetic foot problems, identification of those at risk and planning of care to reduce the risk of ulcers The CCC System of nursing diagnoses (version 2.5) consists of 176 nursing diagnoses (60 major and 116 subcategories). The major categories represent concrete patient problems and the subcategories represent more precise related concepts. Each depicts patient problems/diagnoses and/or healthcare conditions requiring clinical care by nurses and other healthcare providers. The nursing diagnoses. Planning for care begins on admission and is continually updated in response to condition changes. The nursing process is a systematic decision-making method focusing on identifying and treating responses of individuals or groups to actual or potential alterations in health it- is the essential core of nursing practice to deliver holistic, patient-focused care Weingarten et al. , in a meta-analysis on the management of disease in patients with chronic diseases, found that patient's education was an integral part of most intervention programs. In fact, many of the interventions in this study were classified as Case Management or Surveillance, but also included educational components Citation: Brown A (2014) Strategies to reduce or eliminate wound pain. Nursing Times; 110: 15, 12-15. Author: Annemarie Brown is nursing lecturer, BSc Adult Nursing, Department of Health and Human Sciences, University of Essex, Southend on Sea. This article has been double-blind peer reviewed The evidence on the prevalence and incidence of skin tears is limited and generally dated. A study conducted in a long-term care facility in Australia indicated that 42% of known wounds were found to be skin tears (Everett and Powell, 1994), while an incidence of 0.92 per patient per year was reported in a care facility for older people in the US (Malone et al, 1991) • Identify common nursing care for the preoperative, intraoperative and postoperative phases.. • Identify nursing interventions to prevent or treat postoperative complications. • Use the six rights of medication administration and administer medications • Explain the classification, action, purpose, side and adverse effects and norma Nursing Interventions 8 9 : Place the patient in the Trendelenburg's position to reduce pressure on the hernia site. Apply truss only after the hernia has been reduced. For best results, apply it in the morning before the patient gets out of bed. Assess the skin daily and apply powder to prevent irritation Patient undergoing surgery may be afraid and concerned about the diagnosis, the treatment, the procedure, the postoperative care, and the surgical recovery. Good communication between staff and patients can minimize or prevent this situation. This study aimed to evaluate the effectiveness of a Telecare nursing intervention, Telephone consultation, in reducing the Delayed surgical. 22. Noh HK, Lee EJ. Relationships among NANDA-I diagnoses, nursing outcomes classification, and nursing interventions classification by nursing students for patients in medical-surgical units in Korea. Int J Nurs Knowl. 2015; 26(1):43-51 Nursing care plan for Fever Images and PPT. Here are the Nursing Care Plan for fever Patient or Hyperthermia Patient. 01 Altered body temperature related to infection as evidence by raised in body temperature and pulse rate. Nursing Goal : Nursing Interventions. 02 Alteration in comfort related to uneasiness due to hyperthermia Differentiate between nursing orders and medical orders. Nursing orders are written by nurses and can be carried out independently of the physician. Nursing orders are based on nursing diagnoses. Nursing diagnoses focus on the problem the patient is experiencing as a result of a disease process that can be effectively acted on by nursing care. Nursing orders refer to interventions that are. Four (4) nursing interventions that includes at least one (1) nurse-initiated, one (1) dependent, one (1) interdependent intervention. Label your interventions as above. Provide a rationale for each intervention that is evidence-based. Lastly, your interventions must be able to move the patient toward the achievement of the outcome Nursing dx: +MRSA wound; pressure ulcer. I hope someone could help me on the wording on one of my nursing care plans. My patient is a renal patient whose AV access site in his arm was + for MRSA. He also has a stage I pressure ulcer on his buttocks. The diagnoses I am going to use is impaired tissue integrity and impaired skin integrity nursing intervention classification list. Geplaatst door aan 13 maart 2021, 3:41 am. Formulating a diagnosis based upon the assessment results is a principal part to determine appropriate interventions. Multiple experimental studies displayed the effectiveness of certain interventions consist of applying wound cleansing, advanced modern wound dressing, topical therapy, offloading, intensive diabetes education and advanced. Chapter 18 Planning Nursing Care Objectives • Explain the relationship of planning to assessment and nursing diagnosis. • Discuss criteria used in priority setting. • Describe goal setting. • Discuss the difference between a goal and an expected outcome. • List the seven guidelines for writing an outcome statement. • Develop a plan of care from a nursing assessment Which intervention is most important for the nurses to include in the client's plan of care? Observe for changes in level of consciousness. An older adult female admitted to the intensive care unit (ICU) with a possible stroke is intubated with ventilator setting of tidal volume 600, PlO2 40%, and respiratory rate of 12 breaths/minute Community_PublicHealthNursing_ Best Online Custom nursing writings. Essays Health Sciences Nursing Essays Psychology. Community_PublicHealthNursing for additional assessment and care . when needed . e. Documentation specific to . intervention including wound . description/ measurement, plan of care, and evaluation . f. Application of unna boots with annual documented competency of correct procedure filed with employer . g. Obtain wound cultures and perform . treatment of minor infections wit Achieve timely wound healing, be free of purulent drainage or erythema, and be afebrile. Nursing Interventions. Inspect the skin for preexisting irritation or breaks in continuity. Rationale: Pins or wires should not be inserted through skin infections, rashes, or abrasions (may lead to bone infection) Therapeutic nursing interventions help to a designated treatment to a deep wound. A therapeutic intervention would require Nancy to tailor or personalize treatments to what works well for that. A nurse is planning care for a patient with a nursing diagnosis of Impaired skin integrity. The patient needs many nursing interventions, including a dressing change, several intravenous antibiotics, and a walk. Which factors does the nurse consider when prioritizing interventions? (Select all that apply.) a The Nursing Interventions Classification (NIC) names and describes the interventions carried out by nurses, from the most basic treatments to the highly complex and specialized(16). Nursing intervention is defined as any treatment (preventive or curative), based on the clinical judgment and knowledge, carried out by a nurse to increase th Interventions and Treatments: The ABCs, ACLS protocols, the maintenance of the client's hemodynamics, the preservation and care of the amputated body part by keeping it dry and cool after it is cleaned with sterile saline and placed in a sealed plastic bag in the field and in the emergency department until surgical interventions are planned and. 1. Review the medical orders for wound care or the nursing plan of care related to wound/drain care. 2. Gather the necessary supplies and bring to the bedside stand or overbed table. 3. Perform hand hygiene and put on PPE, if indicated. 4. Identify the patient. 5 Counseling is an example of a direct care nursing intervention. The other options do not address the identified problem of role strain (activities of daily living and range-of-motion exercises). Consulting is an indirect care nursing intervention. DIF:Apply (application)REF:264- OBJ: Describe and compare direct and indirect nursing interventions From this perspective, use of the Nursing Intervention Classification (NIC) supports workforce planning and evaluation by identifying the nursing workload, expressed in interventions, classes and domains and it has been used in different contexts where nursing care occurs CHAPTER 22 / Nursing Care of Clients with Gallbladder,Liver,and Pancreatic Disorders 579 CHART 22-1 LINKAGES BETWEEN NANDA, NIC, AND NOC The Client with Gallbladder Disease NURSING DIAGNOSES NURSING INTERVENTIONS NURSING OUTCOMES •Pain •Pain Management • Pain Control Data from Nursing Outcomes Classification (NOC) by M.Johnson. 1. Review the set of all possible nursing interventions for the patient's problem. (pain-positioning, pharmacology, relaxation techniques) 2. Review all possible consequences associated with each possible nursing action. (each intervention may work, not work or cause adverse reactions) 3. Determine the probability of all possible consequences Figure 1: Framework for ICNP Prenatal Nursing Care Diagnoses, Interventions, and Outcomes PRENATAL NURSING CARE DIAGNOSTIC, OUTCOME AND INTERVENTION STATEMENTS This Catalogue fills a practical need by listing ICNP statements for diagnoses, outcomes and interventions for nursing care of pregnant women. The list provided below aims to b Perioperative nursing is the way by which nursing care is provided. Each phase is related to specific activities carried out and skills needed for different stages of nursing. assessment of wound The Graduate Diploma in Perioperative Nursing is available 1 year full-time or equivalent part-time and is developed to qualify the registered.
https://conosci-grovatersure.com/articles/10n16q6026r-2vi1.1186/s12912-020-00432-y
# Realms of Wizardry Realms of Wizardry: An Anthology of Adult Fantasy is an American anthology of fantasy stories, edited by American writer Lin Carter. It was first published in hardcover by Doubleday in December 1976 as the second of two such anthologies continuing a series of nine assembled by Carter for the Ballantine Adult Fantasy series. ## Summary The book collects sixteen tales and excerpts from novels by various fantasy authors, with an overall introduction and notes on the individual authors by Carter. The collection is a companion volume to Carter's earlier anthology Kingdoms of Sorcery (1976). ## Contents "Introduction: The Horns of Elfland" (Lin Carter) I. Fantasy as Legend II. Fantasy as Satire III. Fantasy as Romance IV. Fantasy as Adventure Story V. New Directions in Fantasy "Other Realms of Wizardry: Suggestions for Further Reading" (Lin Carter)
https://en.wikipedia.org/wiki/Realms_of_Wizardry
G-Tray™ thermal conductivity is typically 3x less than zinc alternatives G-Tray™ stainless steel A1 non-combustible cavity tray system has been independently assessed for its thermal conductivity performance by the Building Research Establishment (BRE). Established in 1921, the Building Research Institute (BRE) is a world-leading, multi-disciplinary, building science centre with a mission to improve buildings and infrastructure, through research and knowledge generation. Utilising the latest thermal modelling technology, during an assessment undertaken in compliance with BS EN ISO 10211 the BRE identified ACS Stainless Steel Fixing Ltd’s G-Tray – A1 Cavity Tray system as significantly less thermally conductive than a zinc alternative. During testing the BRE found that one-piece zinc roofing rolls being used as alternative cavity trays (0.6mm) were 286% more thermally conductive than the two-part 0.5mm G-Tray™. Thermal Conductivity of materials present in the tests | | MATERIAL | | THERMAL CONDUCTIVITY (W/MK) |Stainless Steel||17.00a| |Zinc||110.0a| |Brick||0.770a| |Rockwool Duo insulation slab||0.035b| |Rockwool SFS insulation||0.034b| |Weather defence board||0.250b| |Plasterboard/ fireboard||0.250b| |(a) = data from BE EN ISO 10456 (b) = data from client / manufacturers| Results of the linear Thermal Bridging assessment | | CALCULATED Ψ -VALUE, W/MK | | ADDITIONAL HEAT LOSS COMPARED TO ‘TYPICAL’ 0.5MM SS TRAY |0.5 mm stainless steel ‘G’ tray (2 part system)||0.009||0%| |0.7 mm stainless steel cavity tray||0.013||40%| |1.2 mm stainless steel cavity tray||0.021||130%| |0.6 mm zinc cavity tray||0.035||286%| Importance of minimising thermal conductivity Reducing thermal conductivity between the external facade and the building structure has been a long-standing issue in the design and construction of modern buildings. As the design and use of buildings have changed over the years, its been essential to ensure a good thermal insulation barrier is applied to a building, usually within the cavity. This insulation reduces thermal transfer between the inner and outer leaf of the building. Where heat can be lost from the inside, out, this is described as thermal bridging or cold bridging. If this takes place, a substantial loss of heat can occur and sometimes lead to condensation build-up or mould growth. That’s why it’s important to select the right products and materials, ensuring the thermal conductivity of these products is as low as possible and thermal breaks are in place to reduce thermal transfer. A thermal bridging guide produced by the NHBC can be downloaded here Architects Design – Thermal Conductivity For years, architects have worked to reduce heat loss from buildings – taking design, structure and aesthetics into consideration. The recent update to building regulation has had a detrimental effect on the potential ‘u value’ of some buildings, therefore it is essential to specify the right material and system to mitigate thermal transfer as much as possible. Non combustible Cavity Trays Following the ban on combustible cavity trays, numerous companies have brought forward speculative solutions. unfortunately, designing and manufacturing a non-combustible cavity tray, whilst taking into other considerations such as thermal bridging, bimetallic corrosion, expansion/contraction and the building variation has made it difficult to achieve such status. G-Tray™ takes all these factors into consideration, giving you a complete solution which is designed and manufactured to your exact requirements – Much like our industry-leading masonry support systems, precision-engineered for reliable installation. Related Articles 29th May 2020 G-Tray™ Named Finalist For The Innovative Product Of The Year Award ACS is pleased to announce our exciting new product: G-Tray™ Stainless Steel A1 Cavity Trays has bee... read more 12th December 2019 G-Tray™ – The UK’s 1st Stainless Cavity Tray ACS is proud to launch the UK’s 1st Stainless Cavity Tray. The A1 fire rated system fully comp...
https://acsstainless.co.uk/g-tray-vs-zinc-thermal-conductivity/
Adductor pollicis referred pain The opponens and adductor pollicis are the main troubleshooters in thumb pain. You can relieve these muscles as well as your pain with a simple, yet effective self massage. On this page I will give you all the information you need, to successfully relieve these muscles and the pain that is created by them. This information includes… If the adductor and/or opponens pollicis are too tight or contain trigger points, you are very likely to experience pain in the region of your thumb and wrist, as you can see in the pictures below. The deeper the red, the more common it is to feel pain in the respective area if the corresponding muscle is too tight or contains trigger points. With too much tension or trigger points in the pollicis muscles, you are prone to feel pain when using your thumb, or even at rest if the muscles are affected severely.
https://www.muscle-joint-pain.com/trigger-points/trigger-point-self-treatment/adductor-pollicis/
Godfather icon Francis Ford Coppola calls himself a ‘second-rate director’ | Culture & Leisure Francis Ford Coppola considers himself “just a second-rate director”. The 82-year-old filmmaker reflected on the legacy of ‘The Godfather’ – which celebrates its 50th anniversary this year – and suggested the classic film has elevated it in the public eye. Speaking candidly to Empire magazine, he said: “I’ve heard ‘The Godfather’ cited as one of the greatest films ever made. “When you compare the great artists of cinema, like GW Pabst and Fritz Lang, and the great Murnau, Hitchcock, and then the great Italian and Japanese directors – when you really look at the heroes of cinema, I have to say that I should be considered a second-rate director. “But I’m a first-rate, second-rate director.” Coppola explained that “The Godfather” changed his life and turned him into a celebrity, as he was eventually seen as equal to his peers. He added: “In my heart, all I really wanted was to be considered part of the band, which I am now because when they talk about all the great directors of the 70s, they say George Lucas and Francis Coppola and Marty Scorsese and Steven Spielberg and Brain De Palma and Paul Schrader. “So I have what I want – I’m part of the group.” While his stance on the film has “softened” over the years, he noted at the time that it was “a nightmare” as he constantly felt like he had no power and risked to be fired. He said: “It was the worst experience. ‘Apocalypse Now’ was quite a difficult experience for other kinds of reasons, but generally those movies, which I’m so famous for, were nightmares to work on. “The simple fact that I was young and tenacious and didn’t give up is the reason they ended.
https://www.referencement-net.org/godfather-icon-francis-ford-coppola-calls-himself-a-second-rate-director-culture-leisure/
ALBERT: A Lite BERT for Self-Supervised Learning of Language Representations Ever since the advent of BERT a year ago, natural language research has embraced a new paradigm, leveraging large amounts of existing text to pretrain a model’s parameters using self-supervision, with no data annotation required. So, rather than needing to train a machine-learning model for natural language processing (NLP) from scratch, one can start from a model primed with knowledge of a language. But, in order to improve upon this new approach to NLP, one must develop an understanding of what, exactly, is contributing to language-understanding performance — the network’s height (i.e., number of layers), its width (size of the hidden layer representations), the learning criteria for self-supervision, or something else entirely? In “ALBERT: A Lite BERT for Self-supervised Learning of Language Representations”, accepted at ICLR 2020, we present an upgrade to BERT that advances the state-of-the-art performance on 12 NLP tasks, including the competitive Stanford Question Answering Dataset (SQuAD v2.0) and the SAT-style reading comprehension RACE benchmark. ALBERT is being released as an open-source implementation on top of TensorFlow, and includes a number of ready-to-use ALBERT pre-trained language representation models. What Contributes to NLP Performance? Identifying the dominant driver of NLP performance is complex — some settings are more important than others, and, as our study reveals, a simple, one-at-a-time exploration of these settings would not yield the correct answers. The key to optimizing performance, captured in the design of ALBERT, is to allocate the model’s capacity more efficiently. Input-level embeddings (words, sub-tokens, etc.) need to learn context-independent representations, a representation for the word “bank”, for example. In contrast, hidden-layer embeddings need to refine that into context-dependent representations, e.g., a representation for “bank” in the context of financial transactions, and a different representation for “bank” in the context of river-flow management. This is achieved by factorization of the embedding parametrization — the embedding matrix is split between input-level embeddings with a relatively-low dimension (e.g., 128), while the hidden-layer embeddings use higher dimensionalities (768 as in the BERT case, or more). With this step alone, ALBERT achieves an 80% reduction in the parameters of the projection block, at the expense of only a minor drop in performance — 80.3 SQuAD2.0 score, down from 80.4; or 67.9 on RACE, down from 68.2 — with all other conditions the same as for BERT. Another critical design decision for ALBERT stems from a different observation that examines redundancy. Transformer-based neural network architectures (such as BERT, XLNet, and RoBERTa) rely on independent layers stacked on top of each other. However, we observed that the network often learned to perform similar operations at various layers, using different parameters of the network. This possible redundancy is eliminated in ALBERT by parameter-sharing across the layers, i.e., the same layer is applied on top of each other. This approach slightly diminishes the accuracy, but the more compact size is well worth the tradeoff. Parameter sharing achieves a 90% parameter reduction for the attention-feedforward block (a 70% reduction overall), which, when applied in addition to the factorization of the embedding parameterization, incur a slight performance drop of -0.3 on SQuAD2.0 to 80.0, and a larger drop of -3.9 on RACE score to 64.0. Implementing these two design changes together yields an ALBERT-base model that has only 12M parameters, an 89% parameter reduction compared to the BERT-base model, yet still achieves respectable performance across the benchmarks considered. But this parameter-size reduction provides the opportunity to scale up the model again. Assuming that memory size allows, one can scale up the size of the hidden-layer embeddings by 10-20x. With a hidden-size of 4096, the ALBERT-xxlarge configuration achieves both an overall 30% parameter reduction compared to the BERT-large model, and, more importantly, significant performance gains: +4.2 on SQuAD2.0 (88.1, up from 83.9), and +8.5 on RACE (82.3, up from 73.8). These results indicate that accurate language understanding depends on developing robust, high-capacity contextual representations. The context, modeled in the hidden-layer embeddings, captures the meaning of the words, which in turn drives the overall understanding, as directly measured by model performance on standard benchmarks. Optimized Model Performance with the RACE Dataset To evaluate the language understanding capability of a model, one can administer a reading comprehension test (e.g., similar to the SAT Reading Test). This can be done with the RACE dataset (2017), the largest publicly available resource for this purpose. Computer performance on this reading comprehension challenge mirrors well the language modeling advances of the last few years: a model pre-trained with only context-independent word representations scores poorly on this test (45.9; left-most bar), while BERT, with context-dependent language knowledge, scores relatively well with a 72.0. Refined BERT models, such as XLNet and RoBERTa, set the bar even higher, in the 82-83 score range. The ALBERT-xxlarge configuration mentioned above yields a RACE score in the same range (82.3), when trained on the base BERT dataset (Wikipedia and Books). However, when trained on the same larger dataset as XLNet and RoBERTa, it significantly outperforms all other approaches to date, and establishes a new state-of-the-art score at 89.4. |Machine performance on the RACE challenge (SAT-like reading comprehension). A random-guess baseline score is 25.0. The maximum possible score is 95.0.| The success of ALBERT demonstrates the importance of identifying the aspects of a model that give rise to powerful contextual representations. By focusing improvement efforts on these aspects of the model architecture, it is possible to greatly improve both the model efficiency and performance on a wide range of NLP tasks. To facilitate further advances in the field of NLP, we are open-sourcing ALBERT to the research community.
https://torontoai.org/category/global/google/
Similarly, What do you mean by educational technology? Educational technology is the study of how to enhance teaching and learning by studying, creating, developing, implementing, and evaluating the instructional environment, learning materials, learners, and the learning process. Also, it is asked, What is educational technology and example? The use of information and communication technologies (ICT) for educational purposes is known as education ICT. Cloud-based learning software, applications, blogs or discussion boards, digital whiteboards, and other interactive online tools for students and instructors are examples of education ICT. Secondly, What is the best definition of technology? Technology is the application of scientific knowledge to the practical goals of human existence, or, as it is often called, the manipulation and transformation of the human environment. Also, What is the first meaning of educational technology? “A systematic, iterative method for developing teaching or training used to enhance performance” is one definition of Educational Technology. (Educational Technology Encyclopedia) People also ask, What is importance of educational technology? Students benefit from quick access to knowledge, rapid learning, and entertaining chances to put what they’ve learned into practice. It allows students, especially in STEM, to study new disciplines and expand their comprehension of challenging ideas. Related Questions and Answers What are the forms of educational technology? Teaching technology, instructional technology, behavioral technology, and instructional design technology are all examples of educational technology. Which best defines educational technology Brainly? Educational technology refers to the use of all available resources in a system to improve the teaching-learning process or educational technology. What are the three perspective of educational technology? These theoretical viewpoints are divided into three philosophical frameworks or schools: behaviorism, cognitivism, and constructivism. Why is it difficult to define educational technology? The discipline of Educational Technology has battled to define itself during the last four decades. This is due in part to the field’s position as an applied social science and the difficulties in gaining credibility. How is educational technology defined by educational associations? Educational technology is the research and ethical practice of enhancing learning and increasing performance by inventing, implementing, and managing suitable technological processes and resources, according to the Association for Educational Communications and Technology (AECT). (1). What are the characteristics of educational technology? Educational technology has the following characteristics: It is based on technical and scientific developments. It is more of a practical than a theoretical subject. It is a contemporary discipline that is rapidly expanding. What is educational technology PDF? “Educational Technology” may be described as the systematic application of scientific knowledge to educational activities. It is a strategy of communication that has been adapted from the scientific method to the behavioral science of teaching and learning. What is the main difference between educational technology and technology in education? Educational technology focuses on a small set of technologies that are utilized for communication and information transmission. Educational technology instructs students in the usage of a relatively narrow collection of technology-developed tools. What are the principles of educational technology? The concepts are as follows: (a) linking technology learning to professional knowledge; (b) prioritizing subject matter and pedagogical content links; (c) utilizing technology learning to challenge professional knowledge; and (d) teaching multiple technologies. What are the terms and concepts related to technology for teaching and learning? E-learning, instructional technology, information and communication technology (ICT) in education, EdTech, learning technology, multimedia learning, technology-enhanced learning (TEL), computer-based instruction (CBI), computer managed instruction, computer-based training (CBT), and so on are all examples of educational technology. What is instructional technology Brainly? The discipline of education dealing with the scientific study of instructional design and development is known as instructional technology. Instructional designers’ major goal is to create compelling and effective learning experiences. There are several models available (e.g., ADDIE, Backward Design, ASSURE etc). I HOPE IT BENEFITS YOU. What does Digital Literacy imply Brainly? Explanation: Digital literacy refers to a person’s capacity to locate, assess, and generate understandable information on multiple digital platforms using writing and other media. What is the importance of technology in education essay? Technological in education offers students with technology literacy, information literacy, life-long learning ability, and other abilities required in the 21st century job. Students who are taught how to utilize computers to assist them in their careers today will be more productive in the future. How can we improve the use of technology in the school? How Can Technology Be Used in the Classroom? Games and Power Points Assignments on the Internet. System of online grading Tablets in the classroom Listserv. Maintaining student interest. Assists pupils with various learning methods. Students should be taught life skills. What are the 4 M’s in educational technology? Man, material, equipment, procedures, and metrics are all part of the equation. What are the 4 component of educational technology? Personalization, evidence-based learning, school efficiency, and constant innovation are the four components required to construct a data-driven education system. What is educational technology and its components? Educational technology is defined as technical instruments and media that aid in the communication, development, and sharing of knowledge. Learning management systems (LMS), such as tools for student and curriculum administration, and education management information systems, use educational technology. Which of the following is the role of educational technology in learning according to the traditionalist point of view? 22) According to traditionalists, which of the following is the function of educational technology in learning? a. It encourages active, constructive, purposeful, genuine, and cooperative learning among students. What are the advantages and disadvantages of educational technology? Technology’s Benefits and Drawbacks in Education Pro: Using technology to engage young students may be exciting. Cons: Using technology might cause students to get distracted. Pro: It helps students prepare for the future. Cons: Limits children’s socialization opportunities. Pro: Technology Promotes Accidental Learning. What is the importance of technology in online learning? Technology gives students access to a wealth of internet resources, enabling them to do study and so become more self-sufficient. It also makes learning easier by making topics more consumable, such as via the use of an instructional film. What is meant by educational technology define the scope of educational technology? Educational technology spans the whole spectrum of education. Educational technology refers to the systematic and integrated use of all educational resources — men, materials, methods and techniques, means, and media – for optimal learning. What are the roles of educational technology in the classroom? It enhances their teaching abilities, changes their teaching behavior and style, and instills a scientific mindset, attitude, and approach. They may also use educational technology to assist them convey information to students. It assists the instructor in determining the degree to which the instructional goals have been met. Conclusion The “definition of educational technology by different authors” is a list of definitions that have been compiled by different authors. This Video Should Help: Educational technology is an umbrella term that encompasses all the tools, techniques, and technologies used in schools. It includes software, hardware, media, and other tools. Reference: scope of educational technology.
https://abtuts.com/what-is-the-definition-of-educational-technology/
This is a resubmission application for a Competing Renewal of a currently funded grant (R01-DA13165-10). The overall aim of this project is to investigate the psychological and neural basis of human cognitive control in healthy adults. Since the last competing review of this project, we have published 19 refereed publications that have elucidated the mechanisms of cognitive control in attention shifting and task switching using functional magnetic resonance imaging (fMRI) and suitably designed behavioral paradigms. Successful cognitive control requires both stability (maintained states of attention and memory despite distraction) and flexibility (to rapidly reconfigure attention and cognition in light of ongoing events). The proposed project will further explore these issues using novel methods and with a focus on both cortical and subcortical brain mechanisms. Aim 1 investigates purely voluntary acts of control-that is, task switching that is not prompted by a cue, but instead results from a purely voluntary decision. We will use a novel multivariate pattern analysis method we have developed (Multivoxel Pattern Time Course or MVPtc) that dynamically tracks multivoxel patterns of brain activity-and the corresponding states of attention or task engagement they engender-as these states unfold over time. This method permits us to relate brain activity with patterns of behavioral performance, as well as to explore functional connectivity within brain circuits that are associated with these cognitive states. In Aim 2 we examine the role of the basal ganglia in cognitive flexibility and stability during task switching, using both BOLD fMRI and PET dopamine imaging. We will elaborate upon recent evidence for the role of the basal ganglia- and specifically the dopamine system-in nonmotoric acts of cognitive control. Finally, in Aim 3, we will examine failures of cognitive control when distracting stimuli impair perceptual performance, with a particular emphasis on the role of experienced value and reward history on the degree to which a stimulus may capture attention. Using MVPtc, we will track fluctuations in the susceptibility to distraction by salient perceptual events or by stimuli previously associated with reward, and we will measure the degree to which top-down control can modulate attentional capture. Finally, we will use parallel PET dopamine imaging and BOLD fMRI to measure changes in striatal dopamine release evoked by salient or high-value stimuli, and correlate this with behavioral measures of distraction. Together these experiments will provide new insights about the brain mechanisms of cognitive control, a core human mental faculty that is subject to debilitating impairment due to afflictions such as drug and alcohol addiction, schizophrenia, Parkinson's and Huntington's Disease, OCD, and attention deficit hyperactivity disorder. This project will contribute to the basic-research foundation for clinical research into the causes and treatment of executive function impairments.
Chemo-brain may last for several years, but it is improving slowly and constantly. You “get organized” slowly, don’t forget as much and, after about 5 years I could say I was back to “normal”. That is, the “new” normal, ie the state with all the changes that the cancer experience brings. Alzheimer’s on the other hand does not improve with time, it keeps getting worse slowly. Of course, memory goes down with age itself, but in Alzheimer’s the change is fast. Cognitive problems such as memory loss can persist in cancer survivors after they have finished chemotherapy treatment; luckily, there’s help for that, too. Chemotherapy was found to limit the production of new brain cells in regions responsible for memory function, which leads to a loss of memory. The combination of tumour growth and chemotherapy led to shrinkage in brain regions that are important for learning and memory. Scientists have discovered that physical exercise and an active lifestyle leads to the growth of new brain cells in the memory center of the brain. Studies have shown that exercise also delays the onset of dementia and slows brain health declines that naturally come with aging. Gordon Winocur is a professor of psychiatry and psychology, and senior scientist at Baycrest Health Sciences. Doctors’ Notes is a weekly column by members of the U of T Faculty of Medicine. Email [email protected].
http://bcakingston.ca/facts/chemo-brain/
Since the release of the earth-shattering ARD documentary two years ago, the athletics world has been in a permanent turmoil. The International Athletics Association Federation (IAAF) is faced with both a never-ending corruption scandal (playing out in front of the French police authorities) and the related systematic doping of Russian athletes. The situation escalated in different phases led by the revelations of Russian insiders. First, in December 2014 with the ARD documentary, which demonstrated how widespread (and organized) the recourse to doping was in Russian athletics. It triggered the Pound investigation financed by the World Anti-Doping Agency (WADA), which led to two damaging reports (available here and here) for the Russian anti-doping system and the IAAF itself. Thereafter, in November 2015, the IAAF had no other choice but to provisionally suspend the Russian athletics federation (ARAF then RusAF) and its members from IAAF competitions. Yet, this was only the beginning as shortly after the former head of Moscow’s anti-doping laboratory provided a detailed sketch to the New York Times of the operation of a general state-led doping scheme in Russia. The system was designed to avert any positive doping tests for top-level Russian sportspeople and was going way beyond athletics. These allegations were later largely confirmed and reinforced by the McLaren investigation initiated by WADA in May 2016, and which published its first report in July 2016 shortly before the Rio Olympics. In June 2016, the IAAF anticipated the conclusions of the report (it had received most of McLaren’s evidence beforehand) and decided to maintain the ineligibility of Russian athletes for IAAF competitions, and for the Rio Olympics. It did, however, foresee a narrow exception for Russian athletes able to show that they were properly tested outside of Russia. Nonetheless, the athletes using this exception were to compete under a neutral flag at the Olympics. Unsurprisingly, Russian athletes led by pole superstar (and now IOC member), Yelena Isinbayeva, and the Russian Olympic Committee decided to challenge this decision in front of the Court of Arbitration for Sport (CAS). Interestingly, while the decision was rendered on 21 July 2016, the full text of the award was publically released only on 10 October 2016. In September, I analysed the Rio CAS Ad Hoc Decisions involving Russian athletes aiming to participate to the Olympics. I will now turn to the IAAF decision, which is of great importance to the future of the anti-doping system. Indeed, it lays out the fundamental legal boundaries of the capacity of international federations to impose sanctions on their members (and their members) in order to support the world anti-doping fight. My blog will provide first a chronological narrative of the decisions taken by the IAAF to sanction the RusAF and its athletes. Thereafter, I will analyse the key aspects of the scope of the review of the IAAF’s ineligibility decision by the CAS. The IAAF started acting upon the suspicions of doping in Russian athletics only after the publication of the first part of the Pound report on 9 November 2015. In its first press release after the publication of the report, the president of the IAAF, Sebastian Coe, announced that he had “taken the urgent step of seeking approval from his fellow IAAF Council Members to consider sanctions against the Russian Athletics Federation (ARAF)”. He was considering “provisional and full suspension and the removal of future IAAF events”. This announcement was quickly followed on 13 November 2015 with the provisional suspension of the ARAF by the Council of the IAAF. Consequently, Russian athletes, and athlete support personnel were banned from competing in international competitions including World Athletics Series competitions and the Olympic Games. Furthermore, Russia lost the right to host the 2016 World Race Walking Team Championships (Cheboksary) and 2016 World Junior Championships (Kazan), while ARAF were to delegate the conduct of all outstanding doping cases to CAS. The provisory ban was based on IAAF Constitution Article 6.11(b) and Article 14.7. The ARAF could have challenged the decision of the Council but declined to do so (as is explained in a letter accessible here) and accepted the sanctions. Simultaneously, the decision also included a specific procedure for RusAF to regain IAAF membership. It foresaw that an inspection team led by an Independent Chair, Rune Andersen, would verify whether RusAF complies with a long list of precise criteria. The deep-seated culture of tolerance (or worse) for doping that led to RusAF being suspended in the first place appears not to have changed materially to date. A strong and effective anti-doping infrastructure capable of detecting and deterring doping has still not been created. There are detailed allegations, which are already partly substantiated, that the Russian authorities, far from supporting the anti-doping effort, have in fact orchestrated systematic doping and the covering up of adverse analytical findings. This meant “that Russian athletes remain[ed] ineligible under IAAF Rules to compete in International Competitions including the European Championships and the Rio 2016 Olympic Games”. The taskforce also recommended that RusAF remains suspended, i.e. that no “representatives of RusAF (i.e. officials, athlete support personnel, etc.) should take part in International Competition or in the affairs of the IAAF”. The IAAF Council unanimously endorsed the recommendations. At the same meeting, and also upon recommendation of the taskforce, the IAAF Council passed a rule amendment “to the effect that if there are any individual athletes who can clearly and convincingly show that they are not tainted by the Russian system because they have been outside the country, and subject to other, effective anti-doping systems, including effective drug-testing, then they should be able to apply for permission to compete in International Competitions, not for Russia but as a neutral athlete”. These changes were introduced in Rule 22.1A IAAF Competition Rules (Rule 22.1A). Finally, the IAAF also decided to let Yuliya Stepanova compete due to her “extraordinary contribution to the fight against doping in sport”. On 23 June, the IAAF published a set of guidelines on the basis of which Russian athletes could request a permission to compete in IAAF events (and the Olympics) if they could demonstrate not being tainted by the Russian state doping system as provided under the exception enshrined in Rule 22.1A. However, athletes using this exception would be allowed to compete only as neutral athlete. Stepanova was the first athlete authorized to compete at the Rio Games by the IAAF (ironically, she would later be blocked by the IOC) based on the rule 22.1A. She was joined only by Darya Klishina (the IAAF later rescinded this eligibility in light of her involvement in the McLaren Report, but the CAS decided against all odds to let her compete in Rio). The IAAF felt comforted in its decisions by the release of the McLaren Report on 18 July. Yet, the Russian athletes and the Russian Olympic Committee were obviously extremely dissatisfied with this outcome. Both sides agreed to submit the matter, through the ordinary arbitral procedure, to the CAS, which held a quick hearing on 19 July. Does the suspension of the RusAF extend to the eligibility of the Russian athletes? Is the new IAAF rule 22.1.A a sanction? Can the ROC nominate athletes to the Olympic Games without the assent of the IAAF? Will the Russian athletes falling under rule 22.1.A compete as neutral athletes in Rio? 1. Does the suspension of the RusAF under Rule 22.1(a) extend to the eligibility of the Russian athletes? The Russian athletes challenged first the application by IAAF of Rule 22.1(a) IAAF Competition rules. The Rule provides for the IAAF-wide ineligibility of “[a]ny athlete, athlete support personnel or other person whose National Federation is currently suspended by the IAAF”. In other words, the claimants “want an exception to the rule for doping cases, so that the ineligibility for the athletes affiliated to a suspended national federation, a member of the IAAF, would not apply if the suspension is imposed for the federation’s failure to ensure an effective doping control system”. The Panel rejects this challenge. First, it considers that it is not its duty to rewrite the IAAF’s rules. Instead, the “rule- making power, and the balance to be struck in its exercise between the competing interests involved, is conferred on the competent bodies of the sport entity, which shall exercise it taking into account also the overall legislative framework”. Second, it highlights “that the suspension of the Russian track and field federation is not disputed in this arbitration”. This is due to the fact that ARAF did not contest the original decision of IAAF in November 2015. Consequently, “the dispute heard by the Panel regards only the consequences for the athletes affiliated to the Russian federation of the suspension imposed on their federation and not the reasons for the suspension”. The Panel also rejects the argument that Rule 22.1(a) would be contrary to the World Anti-Doping Code (WADC). First, because it is not an additional doping sanction (and therefore is not covered by the Osaka rule jurisprudence of the CAS) and second because it is consistent with the WADC’s mandate to international federations to introduce sanctions in case their members do not comply with the Code. Furthermore, “it is a fundamental principle of the law of associations in all applicable jurisdictions that members of associations have an obligation to satisfy the requirements for membership in the association and if they fail to do so those members may have their association membership adversely affected”. The Panel refuses to “disturb these well-accepted principles” . The Panel further refused to find that the IAAF was estopped from considering the Russian athletes ineligible based on Rule 22.1(a). It is true that some IAAF employees/executives might have been involved in a corruption scheme to cover-up doping cases, however “[t]here is no suggestion that the IAAF officials were involved in the systemic doping of Russian athletes” . Moreover, “none of the Claimant Athletes has argued that they knew about the IAAF’s wrongdoing and relied on it to their detriment, or that they believed that RusAF would not be suspended in the event of misconduct” . The arbitrators also deny that the Rule 22.1(a) was too uncertain. In particular, the fact that the length of the ineligibility is indeterminate is deemed a “simple consequence of the fact that it is contingent on the National Federation (“NF”) being reinstated”. 2. Is IAAF Competition Rule 22.1A valid and enforceable in the circumstances of the present dispute? The Claimants were also challenging the validity of Rule 22.1A, as they were constructing the rule as an unforeseeable sanction against athletes who would not comply with the requirements enshrined in it. Yet, the Panel wondered from the outset “what interest the Claimants would have in seeing it set aside, given that it is a rule which allows athletes to be included, not excluded”. Indeed, if the Panel “struck down Rule 22.1A, the only consequence for the Claimants would be that any athlete who made him/herself eligible pursuant to Rule 22.1A would still be ineligible: the Claimant Athletes, on the other hand, would not regain the eligibility denied by Rule 22.1(a)”. The Claimants argued that both rules were intimately connected and amounted to one sanction: if one would be deemed invalid the other would fall too. However, the Panel noted in response to this argument “that (i) the legality of Rule 22.1(a) and its applicability in the present circumstances has already been confirmed, as per the considerations above, [and] (ii) the Claimants’ submissions as to the legality of Rule 22.1A have no merit […]”. Thus, the Panel finds Rule 22.1.A not to be inconsistent with the WADC as it does not constitute a sanction. Similarly, not being a sanction its proportionality is not into doubt, nor does it appear to be discriminatory. The Claimant Athletes could not rely on any legitimate expectations to be eligible if they met the Verification Criteria published on 11 December 2015, as “they would have also known that RusAF would have to be reinstated before they became eligible”. Indeed, “Rule 22.1A did not change the way in which the Claimant Athletes could make themselves eligible”, rather “it provided another route to eligibility, one which could be pursued even though RusAF had not been reinstated in accordance with the Reinstatement Conditions”. 3. Can the ROC nominate athletes to the Olympic Games without the assent of the IAAF? The third question raised by the Claimants was whether the Russian Olympic Committee could bypass the IAAF’s decision and nominate athletes without its approval to participate in the Rio Olympics. Here again the Panel from the outsets finds “that, under the Olympic Charter, the ROC is not entitled to nominate athletes who are not eligible under IAAF Competition Rules 22.1(a) and 22.1A”. To come to this conclusion the Panel focuses on the Olympic Charter, it notes that “Rule 40 of the Olympic Charter restricts participation in the Olympic Games to those who comply with the Olympic Charter and the WADC, including the conditions of participation established by the IOC, “as well as the rules of the relevant IF as approved by the IOC””. It interprets the latter sentence as implying “mandatory compliance with IF rules”. Furthermore, the Panel finds that “the Olympic Charter makes it clear that an NOC shall only enter competitors upon the recommendations for entries given by national federations (Rule 44.4), and that as a condition precedent to participation in the Olympic Games every competitor has to comply not only with the provisions of the Olympic Charter, but also with “the rules of the IF governing his sport” (Bye-law 4 to Rule 44)”. It concluded that “the NOCs can only exercise their right to send personnel to the Olympic Games if they comply with the rules of the relevant International Federation (“IF”) because otherwise they would be contravening Rule 40 of the Olympic Charter”. Consequently, “ROC cannot enter into the 2016 Olympic Games athletes who do not comply with the IAAF’s rules, including those athletes who are not eligible under Competition Rules 22.1(a) and 22.1A.” Even in the unlikely event RusAF is deemed not to exist anymore for the purpose of the application of the Olympic Charter, and Bye-law 5 to Rule 44 of the Olympic Charter is deemed applicable, “the ROC would need the IAAF’s, and IOC Executive Board’s, approval to send competitors”. Therefore, with or without RusAF, “the ROC cannot enter athletes who are ineligible pursuant to the IAAF’s rules”. 4. Will the Russian athletes enjoying the exception enshrined in Rule 22.1A compete as neutral athletes? Finally, the last interrogation posed by the claimants is whether Russian athletes regaining eligibility through Rule 22.1.A can compete as representatives of Russia. It is the only point on which the claimants are found by the Panel to prevail. Indeed, it finds “that, under the Olympic Charter, if there are any Russian track and field athletes who are eligible to compete at the 2016 Olympic Games under IAAF Competition Rule 22.1A, the ROC is entitled to enter them to compete as representatives of Russia”. In its view, “under the Olympic Charter it is not for an IF to determine whether an athlete, eligible for entry to the Olympic Games, has to compete as a “neutral” athlete, or as an athlete representing the NOC that entered him or her” . In other words, “athletes which are sent to the Olympic Games are not entered as neutrals, but are sent by an NOC” . Moreover, “an athlete does not represent his/her national federation; the federation’s suspension does not prevent an athlete from being entered into the Olympic Games as a representative of his/her NOC” . The Panel does recognize, however, that the fact “that the ROC is entitled, under the Olympic Charter, to enter into the Olympic Games as representatives of Russia any Russian track and field athletes who are eligible to compete under IAAF Competition Rule 22.1A does not mean that the IOC is bound to accept such designation as athletes representing Russia” . In sum, it was not IAAF’s job to declare the athletes neutral but the IOC’s and it declined to do so. The IAAF has faced a hurricane of negative news in the last two years. Its former president, Lamine Diack, is under investigation in France on corruption charges, its internal anti-doping activities have been shown to be at best inefficient and at worse corrupted, and Russia, one of its biggest suppliers of talents and legends, is exposed as engaged in a State sponsored doping programme. The least one can say is that cleaning these ‘Augean Stables’ was, and still is, an awful task. However, unlike the IOC, which has shown little willingness to seriously crack down on Russia after the scandal, the IAAF has adopted a tough line. It sidelined Russia’s athletics federation as soon as the suspicions voiced by whistle-blowers were substantiated. Furthermore, it refused to let Russian athletes participate in the Rio Olympics, thus reinforcing the anti-doping fight with a symbolically important sanction. Indeed, the world anti-doping system will remain a paper tiger if Russia’s systematic breach of anti-doping rules and spirit is not followed by truly deterrent sanctions. Surely, the system as a whole deserves a comprehensive reform addressing the massive deficiencies highlighted by the Russian scandal. First, the athlete’s eligibility to international sporting competitions cannot be severed from the status of his or her national federation. In other words, the athletes, as members of a national federation, bear part of the responsibility for a federation’s failure to comply with, for example, its duties under the WADC. This does not preclude the introduction of mechanisms that, as the one introduced by the IAAF, would enable athletes to discharge this responsibility in specific situations. Second, international federations can impose painful sanctions upon their affiliates in case of noncompliance with their duties under the WADC. The CAS recognized that in order to function properly the WADC needs to be supported at the local level, and to be supported at the local level noncompliance must be met with deterrent sanctions that will necessarily extend to the athletes affiliated with the noncompliant local body. Again, the athletes are not passive members of a national federation. They bear a share of the political (and in the end legal responsibility) attached to its governance. Third, and finally, the CAS has demonstrated that there was no fatality in taking a lenient road to deal with the Russian State doping scandal. The Panel even left open the possibility for the IOC to decide that Russian athletes would have to compete under a neutral flag. This is a good reminder that the IOC’s decisions to let the Russians compete at the Rio Olympics, and thus dilute the negative effects of being caught organizing a comprehensive State doping system (as was very recently evidenced by the second McLaren Report) was not a legally mandated decision but a political choice that deserves critical scrutiny. The precedent force of this award is even greater in the light of its endorsement by the Swiss Federal Tribunal, which rejected in early August the Claimants request for provisory measures against it. (c) that the athlete has made a truly exceptional contribution to the protection and promotion of clean athletes, fair play, and the integrity and authenticity of the sport. The more important the International Competition in question, the more corroborating evidence the athlete must provide in order to be granted special eligibility under this Rule 22.1A. Where such eligibility is granted, the athlete shall not represent the suspended National Federation in the International Competition(s) in question, but rather shall compete in an individual capacity, as a 'Neutral Athlete'. See CAS 2011/O/2422 United States Olympic Committee (USOC) v. International Olympic Committee (IOC), 4 October 2011.
https://www.asser.nl/SportsLaw/Blog/post/the-russian-state-doping-scandal-at-the-court-of-arbitration-for-sport-the-iaaf-s-rio-ban-of-russian-athletes
Introduction: This Chapter consists of Utility, Law of Diminishing Marginal Utility, Budget line, budget constraint, monotonic preferences, indifference curve, and consumer equilibrium in cardinal and ordinal approaches. Utility: Utility means human satisfaction. In other words the amount of satisfaction of a person gets from consumption of a good or service. Utility is categorized in to two types - Cardinal Utility approach: It is defined as a quantitative method to measure consumption satisfaction that means consuming goods and service can be measured in number. - Ordinal Utility approach: Ordinal Utility is not like cardinal utility. It’s measured in ranks. If customer has higher satisfaction, it will be assigned as higher ranks and lower level of satisfaction will be lower ranks. Total utility: Total utility is the total satisfaction derived from the consumption of a given units of a good. Average utility: It is utility per unit of the good and calculated by dividing the total utility to the number of units consumed. Marginal utility: It is the addition to the total utility derived from the consumption of an additional unit of the good. Law of Diminishing Marginal Utility: It states that as more units of goods are consumed continuously in standard units, the marginal utility derived from the consumption of every additional unit will keep diminishing. |Units consumed||Total Utility (in utils)||Marginal Utility(in utils)| 1 |10||10| 2 |18||8| 3 |22| 4 |4||22| 0 |5||20| (-) 2 The above graph is Relation between total utility and Marginal utility Consumer’s Equilibrium: If the situation of consumer gets maximum satisfaction out of his income and market price is referred as a consumer’s equilibrium. Consumer’s equilibrium through utility analysis can be ascertained with reference to - Single Commodity - Two or several commodities Single Commodity: When purchasing unit of a commodity the consumer compares its price with utility from it. Here utility is the benefit and price is the cost. So he will buy the unit of commodity only if the benefit is equal or more than cost. The equilibrium condition of single commodity is Marginal Utility of money= Price Two or several Commodities: According to this, a consumer gets maximum satisfaction , when ratios of marginal utility of two commodities and their respective prices are equal. Condition of two commodities is Marginal Utility of last rupee spent on each commodity is same.
https://edignite.com/consumer-equilibrium/
Abraham Lincoln said, “I don’t like that man. I must get to know him better.” That quote encapsulates how our lack of knowledge of others can alter our perceptions. In business, if you’re not as successful as you want to be, it could be time to take a fresh view of your organization as it relates to diversity of: thought, perspectives, styles, ethnicity, race, gender and culture. Most of us are familiar with the drawing that shows two faces or a vase. Initially, you will see just one or the other image. However, after hearing a different viewpoint, you can then see the opposing image. Business is no different. If you surround yourself with leaders who are just like you, with all the same ideas, there will be little room for innovation and ideas that challenge us and the status quo, which is necessary for a business to thrive. According to English cleric and author Charles Caleb Colton, “We owe almost all our knowledge not to those who have agreed, but to those who have differed.” As stated in the book FYI by Korn Ferry (2015), seeking to understand different perspectives and cultures is a skill that can be learned and results in a work environment that will help you learn and benefit from the wealth of knowledge and experience that diversity brings. It opens doors to new ways of thinking and new opportunities for building the success of your organization. Companies committed to diverse leadership and workforce are more successful. According to research conducted by McKinsey & Company (2015) of 366 public companies, those in the top quartile for racial and ethnic diversity are 35 percent more likely to have financial returns above national industry medians, and companies in the top quartile for gender diversity are 15 percent more likely to have financial returns above their national industry peers. Additionally, in the United States, there is a linear relationship between racial and ethnic diversity and better financial performance: for every 10 percent increase in racial and ethnic diversity on the senior-executive team, earnings before interest and taxes (EBIT) rise 0.8 percent. According to research from Bersin by Deloitte (2013), over a three-year period, diverse companies saw 2.3 times the cash flow per employee when compared to their less diverse peers. The book FYI also states that in the increasingly global marketplace, business success is partially dependent on those who can interact effectively and respectfully with all. Research shows that employee engagement, innovation, teamwork, and the bottom line can be improved by truly valuing each other. Essentially, diversity brings benefits that sameness can’t, substantiating the need for businesses to have a diverse leadership and workforce. The book says valuing differences will open doors to new ways of thinking and new opportunities for building the success of the organization. So how do you do this? (1) Seek to understand different perspectives and cultures. (2) Contribute to a work climate where differences are valued and supported. (3) Apply others’ diverse experiences, style, backgrounds, and perspectives to get results. (4) Be sensitive to cultural norms, expectations, and ways of communicating. “Whenever you see a successful business, someone once made a courageous decision,” said Peter F. Drucker. Be courageous! Be successful!
https://www.newspressnow.com/businessjournal/small-business-matters/article_cb262087-a5e4-56f2-b6cf-93e1a2f12ac4.html
Do tweets from users with similar Twitter characteristics have similar sentiments? What meta-data features of tweets and users correlate with tweet sentiment? In this paper, we address these two questions by analyzing six popular benchmark datasets where tweets are annotated with sentiment labels. We consider user-level as well as tweet-level meta-data features, and identify patterns and correlations of these feature with the log-odds for sentiment classes. We further strengthen our analysis by replicating this set of experiments on recent tweets from users present in our datasets; finding that most of the patterns are consistent across our analysis. Finally, we use our identified meta-data features as features for a sentiment classification algorithm, which results in around 2% increase in F1 score for sentiment classification, compared to text-only classifiers, along with a significant drop in KL-divergence. These results have potential to improve sentiment analysis applications on social media data.
https://experts.illinois.edu/en/publications/detecting-the-correlation-between-sentiment-and-user-level-as-wel
Dating patient ethics alex coulson succeed at dating siterip When conflicts arise between values, the standards must negotiate among the competing values.Ethical Standard 10.08 is an excellent illustration of how the code accomplishes this essential function.By setting forth clinically based criteria relevant to assessing whether harm is likely to occur, paragraph (b) confirms this balance of values, emphasizes the importance of avoiding harm in these relationships, and provides concrete direction in how to assess the likelihood of exploitation.Second, evidence available at the time standard 10.08 was written suggests that the significant majority of these involvements take place within two years of termination.In the alternative, the evidence may suggest that relaxing the prohibitive aspects of the standard is appropriate.In whichever direction the standard evolves, its evolution should rest upon solid clinical thinking and good research. Note how the code settles this conflict in the case of sexual involvements with current clients and patients; harm is so likely to occur, and autonomy so likely to be compromised in the therapy relationship, that the code establishes an absolute prohibition against sexual relationships. Analyzing this issue requires examining post-termination sexual involvements from at least two perspectives: that of our values and that of our knowledge and data about the dynamics and effects of such involvements--in short, the ethical and clinical/research perspectives. From the ethical perspective, a conflict arises between General Principle A, Beneficence and Nonmaleficence, and General Principle E, Respect for People's Rights and Dignity. It's totally exploitative and wrong." Also, "it is wrong to take advantage of another person. I learned that in first grade." Further, "it will always begin with unequal power." Less than 1% of respondents said that they had no objections to having such a relationship with a patient, whereas 4.5% said that "it depends" on the circumstances.
https://redline88.ru/dating-patient-ethics-6102.html
If you’re an entrepreneur who works out of a home office, you can now take advantage of a more simplified approach to claiming deductions. At tax time, one of the topics we discuss most frequently with clients is how a home office deduction can be taken on the return of an individual who owns a small business. The legislative history of this deduction has taken some twists and turns over the years, but in January, the IRS issued Rev. Proc. 2013-13, which details an optional safe-harbor method for individual taxpayers wishing to claim a home office deduction. The basic rules provide a means to deduct certain business expenses for a portion of your dwelling unit that is exclusively used on a regular basis as a principal place of business. The business-use allocation was traditionally found by calculating how large the business-use area was as a percentage of the entire dwelling unit. This business deduction has been fairly straightforward for the self-employed. However, if you are an employee working from home, the exclusive use of the home office must be for the employer’s convenience — a criterion that is typically met when the employer provides you no other office space. Taking a home office deduction can then have some far-reaching ramifications affecting the amount of gain that can be excluded if you sell your home in the future. In addition, in the past you had to keep track of expenses affecting the specific office space, the home, utilities, homeowner’s insurance, mortgage interest, taxes, etc. Once calculated and reported on Form 8829, these expenses have been split between business and personal use. This method continues, but effective in 2013, an alternative method can be used. Rev. Proc. 2013-13 offers taxpayers a more simplified approach to claiming the home office deduction. Please note that taxpayers claiming this deduction must still meet all requirements for claiming the deduction, but the method of calculation has been simplified. Beginning in 2013, taxpayers can elect to multiply the allowable square footage of the home office used for qualified business use by a prescribed rate. However, this rule limits the maximum allowable square footage to 300 square feet. The revenue procedure then states that the rate to be allowed for the deduction is $5 for each square foot, for a maximum deduction of $1,500. Once you elect to use this safe-harbor method for a particular year, it can’t be changed for that year, but you can change to the alternative actual expense method (discussed earlier) in a subsequent year without IRS consent.
https://www.ibmadison.com/Blogger/Small-Business-Big-Ideas/August-2013/Now-theres-an-easier-way-to-compute-home-office-deductions/
Media have always been contested spaces which express and shape people’s lives and realities. They contribute to forming structures of oppression and of resistance, can facilitate social change, create alternative realities, or provide a venue to imagine different forms of living together. Media, the spaces they create and the spaces we create through them, are part and parcel of power dynamics in societies shaped by competing interests. Today it is easier than ever to access media productions from a wide range of cultural contexts and tune into the digital lives of a vast part of humankind. What remains often hidden is that the media we prod-use and the voices we decide to listen to shape our horizon, our perception of the world, and of the people we encounter. Media, their uses and users, have played a major role in maintaining colonial power imbalances and they continue to be dominated by the west in postcolonial times. Whereas certain media forms and practices impose a western perspective (in terms of cultural and linguistic values, political domination, economic relationships etc.) on postcoloniality, other media forms, and different ways of using them, provide spaces for creating and expressing postcolonial subjectivity. In the past as in the present, perceptions of ‘religion’, what it is or does (symbols, practices, resources for participation etc.), have provided key resources for these dynamics. Thus in this issue of JRFM, we want to explore the reconfigurations of media, power and religion in postcolonial societies. We are interested in analyses of the implication of media (broadly understood) in social and political configurations, especially regarding the relationships of power, ‘religion’ and cultural dynamics in postcoloniality and/or drawing on indigenous resources (Africa, South America, South and South-East Asia, indigenous communities), in present or past contexts. We invite analyses of how individuals, communities, social institutions, or political actors use or have used media to support or subvert existing social structures and structures of power drawing on religious resources, motifs or concepts. Given this focus on postcoloniality, we encourage a broad understanding of ‘religion’ as emerging from the cultural context under investigation and appropriate for the questions asked. Questions may include, but are not limited to: - How are media used to foster resistance, but also structures of oppression? What role do religious dimensions play in such media discourses? - How do media producers draw on religious dimensions to promote socio-political agendas? Can continuities be observed between colonial and postcolonial times? - How can media be a space to imagine and realize socio-religious ideals such as a peaceful society? - How are traditional or indigenous resources of critique or resistance expressed in contemporary media engagement with socio-cultural issues? - How does the entanglement of media and religion create powerful structures of affect in collectives? - What theoretical or methodological questions emerge in the study of media and ‘religion’ in postcoloniality? In how far are concepts and theories developed in this field in a primarily western context applicable or change when focusing on diverse cultural contexts? We are interested in scholarly discussions or scholarly/practitioner co-produced case studies from diverse cultural contexts, and we ask that authors keep a diverse cultural audience in mind in their discussions. In addition to the traditional essay, we also encourage the submissions using alternative media formats (e.g. photo essay or articles that use video/audio recordings). The issue also includes an open section for articles on other topics linked to the profile of JRFM. The deadline for all submissions is 28 February 2021. Contributions of 6,000-8,000 words (including notes) should be submitted for double-blind peer review through the journal homepage www.jrfm.eu. We kindly ask authors to register and consider the instructions for submitting contributions, especially the stylesheet. Publication is scheduled for November 2021. For questions regarding this call for papers or the submission and publication process, please contact the editors of the issue, Philippe Bornet ([email protected]), Stefanie Knauss ([email protected]), and Alexander D. Ornella ([email protected]).
https://jrfm.eu/index.php/ojs_jrfm/announcement/view/33
Flow is the mental state that allows you to fully immersed in a feeling of energized focus, full involvement, and enjoyment while you perform an activity like a sport or fitness. In its truest form, flow is defined by complete and utter absorption in what one does. Here at Life OF Flow we believe that sports, fitness and outdoor activities are a great way to achieve a state of flow. So we have made it our mission to provide information, and review the best products on the market in these areas to help you live a life of flow. We hope you enjoy our articles, if you have any questions then please feel free to get in touch.
https://lifeofflow.com/about-us/
- Pain in the fingers, - Pain in the index and little finger pain most common - Pain in the finger joints - Stiffness in the finger joints - Pain and or stiffness while closing and opening the hand - Pinching using the thumb and fingers is painful - Gripping objects such as pens, pencils, needles for hand sewing or knitting between the thumb and fingers causes pain and discomfort Where are the Lumbrical Muscles of Hand located? The lumbrical muscles of the hand are four muscles found between the bones of the hand that connect to the bottom of the four fingers. What movements do the hand lumbrical muscles control? - Bends fingers at the first knuckle (the knuckle found on the hand at the base of the fingers) - Helps to straighten the fingers at the middle and top knuckles of the fingers Activities that cause hand lumbrical muscle pain and symptoms: - Activities that require constant use of the thumb and fingers in a pincher motion - Extended periods of knitting, crocheting, or hand sewing - Extended periods of writing with a pen or pencil - Artistic painting - Playing musical instruments such as the violin, cello and guitar - Pulling weeds You use the lumbrical muscles of the hand when you bend your fingers. Interesting facts about the lumbrical muscles of the hand: The lumbrical muscles are unusual because they do not connect to a bone. They connect four tendons extending from the flexor digitorum profundus into tendons connected to the extensor digitorum. Lumbrical Muscles Of The Hand Muscle Pain and Symptoms Can Be Similar To and Contribute To These Medical Diagnosis: - Carpal tunnel syndrome - Thoracic Outlet Syndrome - C6 radiculopathy - C8 or T1 radiculopathy - Ganglion cyst - Carpometacarpal dysfunction - De Quervain’s stenosing tenosynovitis - Dupuytren’s Contracture - Raynaud's Disease Satellite Trigger Points: - Flexor Pollicis Brevis - Abductor Pollicis Brevis - Opponens Pollicis - Adductor Pollicis - Long Extensor Muscles of the Fingers - Long Flexor Muscles of the Fingers - Latissimus Dorsi - Pectoralis Major - Scalenes - Triceps Brachii` Lumbrical Muscles of the Hand Pain Relief Recommendations Cold Therapy Treatment For Pain In The Back of the Hand and Fingers Biofreeze Pain Relieving Gel is a cold therapy gel that provides pain relieve for new injuries and is great as a maintenance treatment for over use injuries. Cold therapy should be used on new and recent injuries instead of heat as it cools the area much like ice and does not promote swelling. A recent study showed that Biofreeze decreased pain 2 times more than ice and the pain relief lasts 9 – 10 times longer. If you have recently injured the hand’s lumbrical muscles or have unexplained pain that has started in the back of the hand extending into the index and small fingers, use Biofreeze. Rub the gel into the back of the hand and fingers for pain relief. Warm Therapy for Post Injury, Chronic Hand and Finger Pain Sombra Warm Therapy Gel is a pain relieving gel that I use both personally and professionally in my massage therapy practice. It provides warmth without burning heat like other over the counter heating creams and gels. It works well for post injury pain and stiffness. It is great for chronic arthritis pain as it can be applied several times a day. Apply Sombra to the back of the hand and into the fingers to ease lumbrical muscle pain. Compression Gloves For Support, Warmth and Pain Relief Whether the pain in your hands is caused by a muscle injury or arthritis, compression has been shown to help with pain relief. The Imak Compression Arthritis Gloves are some of the best on the market. The gloves provide gentle compression which helps decrease both pain relief and inflammation. The seams of the gloves are sewn to the outside so you will not have irritation or discomfort. The fingers opening are reinforced so that they will not fray with wear or during washing. I like this particular brand because the gloves are easier to get on and off than most other compression gloves. Reasonably priced too! To determine your size measure straight across the widest part of your palm. Extra small: up to 2 3/4 inches wide. Small: up to 3 1/8 inches across. Medium: up to 3 1/2 inches across. Large: up to 4 inches across. Extra large: up to 4 1/2 inches across. Hand Exercise Kit To Reduce Pain and Restore Mobility The Gaiam Restore Hand Therapy Kit is a must have for anyone experiencing hand pain and stiffness. If your hands are stiff and painful gripping objects is painful making everyday tasks difficult. The kit comes with instructions and exercises that will help you reduce pain and regain mobility. The roller is very helpful and soothing for lumbrical muscles. I use this kit and the exercises nearly everyday to help keep my hands limber and pain free. Massage Therapist Owner: thewellnessdigest.com Twelve years of experience working with clients with chronic pain, post injury pain, and post surgery pain. Muscle dysfunction is often overlooked but can hold the key to many pain conditions.
https://thewellnessdigest.com/lumbrical-muscles-of-hand-hand-and-finger-pain/
The AWS A/NZ Public Sector team is hiring a Program Manager to take ownership of the initiatives, projects and programs necessary to ensure that the Solutions Architects at AWS A/NZ have all the enablement, support, tools and resources they need to help its customers successfully adopt AWS cloud-computing technologies. In this role, you will be responsible for the Solutions Architecture Program Management Office (‘PMO’) function , which oversees a variety of local initiatives to develop and support the Solutions Architecture team. As Program Manager, you will be tasked with developing new initiatives, planning and delivering projects and programs to ensure that its Solutions Architects are recognized as the best in the industry. You will also assist in goal and metrics reporting, operational support, provide communications mechanisms to the field and work with a diverse set of stakeholders. The successful candidate will have strong inter-personal skills and demonstrated success in the areas of enablement, skills development, program and project management within a technical sales/ business development organization. You will coordinate with technical and business development leaders to define, deliver and measure the effectiveness of technical sales initiatives. This role also requires analytical skills and intermediate knowledge of cloud computing concepts to understand project details and be able to develop meaningful initiatives and programs. Responsibilities - Work closely with the Head of Solutions Architecture and APJ PMO Lead to implement and optimise systems to track, manage and improve inputs into the sales cycle. - Assist in the operational aspects of running the Solutions Architecture function, such as employee on-boarding, training and on-going skills development, reporting and compliance. - Analyze business processes and collaborate with Solutions Architects, Consultants, and Technical Managers as well as the Operations and Marketing teams to identify opportunities to streamlines processes and measure results of activities - Develop and execute plans to drive each project and program to the next milestone and deliver results. - Report on the progress and results of initiatives; flag issues and provide recommendations to resolve issues. At times you may need to build some automation programming/scripts, in MS Office using VBA or command line tools that run on Windows or Mac/Linux. - Gather feedback from technical teams on a regular basis to continuously improve programs. - Minimum 5 years’ experience in technical business development (“BD”), BD enablement or BD operations role - Significant experience and demonstrated success in developing initiatives and programs around technical field BD training and enablement - Demonstrated experience taking strategic visions and concepts and developing into structured plans, actions and measureable metrics; experience executing plans to deliver results - Experience working with program, project, and performance management - Demonstrated analytical skills, by working with databases, reporting systems and SalesForce - Graduate or commensurate experience - Exceptional written and verbal communication skills - Strong interpersonal skills and adept at cross-functional collaboration - Ability to prioritize tasks effectively - Bachelor's degree; Business, Marketing and Computer Science majors preferred. - Familiarity with sales productivity tools such as Salesforce.com and Content Management Solutions.
https://www.jobsingovernment.com.au/job/15099658/program-manager-public-sector-solution-architecture
4 Types of Discrimination in The Workplace Discrimination in the workplace is a serious issue that can have a damaging effect on morale, productivity, and company culture. Discrimination is any form of unequal treatment based on traits related to a protected class such as gender, age, race, national origin, disability status, sexual orientation, religion, or marital status. There are many types of workplace discrimination, and we are going to learn about some of them here. So, let’s get started: Gender Identity Gender identity is an important issue when it comes to employee discrimination. Discrimination based on gender identity, or gender-based discrimination, involves treating someone less favorably because of their gender identity or expression. It can take many forms, including verbal abuse, exclusion from activities and conversations, unequal access to resources and opportunities, denial of benefits and job opportunities, and unequal pay. Gender identity discrimination can have a negative impact on an employee’s career and work environment. Employees may experience a lack of respect from their peers or supervisors, making it difficult to succeed in the workplace. In addition, they may be subjected to harassment or ridicule based on their gender identity or expression. If you think you are being discriminated against due to your identity, it will be in your best interest to look into the California workplace rights related to gender, if this is where you are located, and to contact a specialist attorney as soon as possible who can help. Disability There are different types of employee discrimination, and disability is one of them. Disability discrimination can happen when an employer treats a qualified employee or applicant differently because of a physical or mental impairment. This includes impairments that are not visible, such as epilepsy, cancer, and HIV/AIDS, as well as those that are visible, such as prosthetic limbs or wheelchairs. Employers should make reasonable accommodations for employees with disabilities to help them do their job more efficiently and safely. For example, providing a ramp for an employee who uses a wheelchair or allowing extra breaks for someone with epilepsy can help ensure they are able to work without facing discrimination. In addition, employers should provide the same opportunities to qualified employees or applicants with disabilities as they do to those without disabilities. Employers are not allowed to discriminate against disabled employees in any area of employment, including hiring, firing, job assignments and promotions. If an employee experiences disability discrimination at work, it is important for them to contact a professional as soon as possible. Religion Religion-based employee discrimination is defined as any form of workplace discrimination that is based on a person’s religious beliefs, practices, or affiliations. This can include denying someone a job based on their religion, refusing promotions or advancements to individuals of certain religious beliefs, and treating members of certain faiths as second-class citizens in the workplace. It is illegal in most countries worldwide, and employers who engage in it may face legal repercussions. To protect against this type of discrimination, it’s important for employers to ensure that all of their employees are treated fairly and with respect regardless of their religious beliefs or affiliations. This means providing reasonable accommodations for employees who practice a certain religion, such as allowing time off for religious holidays or special prayer times. Additionally, employers should provide anti-discrimination policies that specifically address religious discrimination in the workplace and ensure that all employees are aware of these policies. Race The unfair or unequal treatment of someone based on their race is discrimination. This type of discrimination occurs in hiring, firing, promotions, harassment, pay and other areas of employment. It has a long history in the United States and is illegal under both federal and state laws. Race discrimination can occur even if an employer has the best of intentions. For example, an employer might mistakenly assume that a certain job or position is best filled by someone of a particular race or ethnic background. This type of discrimination may also take place when an employer assigns tasks or promotions based on race instead of merit or favoritism. Racial slurs and other forms of harassment can create a hostile work environment and contribute to this type of discrimination. Employers should be aware of what constitutes racial discrimination in the workplace and take steps to ensure that all employees are treated fairly and without prejudice. Conclusion After reading this article, you should now have a good idea of the different types of employee discrimination that exist. Each type can be detrimental to employees and their work environment, so it is important to recognize them in order to prevent any kind of discrimination from occurring. Employers should also take action to create a workplace where everyone feels safe and respected no matter their background, beliefs, or identity. It is up to the employer to make sure that employees feel comfortable and safe in their workplace, so if any kind of discrimination is witnessed, it should be addressed and resolved immediately. With the right policies in place, companies can create a positive work environment for all types of employees.
https://gobeyondbounds.com/4-types-of-discrimination-in-the-workplace/
A diverse student population is a key element of the educational experience of students in The Graduate School (TGS). Diversity presents itself in many different forms such as: socioeconomic status, race or ethnicity, religion, gender, sexual orientation, nationality or place of origin, disability, unique work or life experience, etc. It is the goal of TGS to cultivate an environment that values diverse backgrounds, approaches, and perspectives—all essential ingredients for true academic excellence. Nondiscrimination Statement Northwestern University does not discriminate or permit discrimination by any member of its community against any individual on the basis of race, color, religion, national origin, sex, pregnancy, sexual orientation, gender identity, gender expression, parental status, marital status, age, disability, citizenship status, veteran status, genetic information, reproductive health decision making, or any other classification protected by law in matters of admissions, employment, housing, or services or in the educational programs or activities it operates. Harassment, whether verbal, physical, or visual, that is based on any of these characteristics is a form of discrimination. Further prohibited by law is discrimination against any employee and/or job applicant who chooses to inquire about, discuss, or disclose their own compensation or the compensation of another employee or applicant. Northwestern University complies with federal and state laws that prohibit discrimination based on the protected categories listed above, including Title IX of the Education Amendments of 1972. Title IX requires educational institutions, such as Northwestern, to prohibit discrimination based on sex (including sexual harassment) in the University’s educational programs and activities, including in matters of employment and admissions. In addition, Northwestern provides reasonable accommodations to qualified applicants, students, and employees with disabilities and to individuals who are pregnant. Any alleged violations of this policy or questions with respect to nondiscrimination or reasonable accommodations should be directed to: Northwestern’s Office of Equity 1800 Sherman Avenue, Suite 4-500 Evanston, Illinois 60208 847-467-6165 [email protected] Questions specific to sex discrimination (including sexual misconduct and sexual harassment) should be directed to: Northwestern’s Title IX Coordinator in the Office of Equity 1800 Sherman Avenue, Suite 4-500 Evanston, Illinois 60208 847-467-6165 [email protected] A person may also file a complaint with the Department of Education’s Office for Civil Rights regarding an alleged violation of Title IX by visiting www2.ed.gov/about/offices/list/ocr/complaintintro.html or calling 800-421-3481. Inquiries about the application of Title IX to Northwestern may be referred to Northwestern’s Title IX Coordinator, the United States Department of Education’s Assistant Secretary for Civil Rights, or both.
https://northwestern-preview.courseleaf.com/tgs/academic-policies-procedures/diversity-statement/
Day 1 Arrive at Kuala Lumpur International Airport (KLIA) OR Low Cost Carrier Terminal (LCCT). Please ensure you have provided us with the correct flight details and correct airport. Meet at airport for transfer to twin share accommodation in Kuala Lumpur. 18.00 – Welcome dinner and briefing. Please check with receptionist to confirm meeting time. Day 2 Orientation: Transfer to Zoo Negara. When you arrive at the zoo you will meet your programme facilitator who will show you to your accommodation and then take you on a short orientation. You will be given a thorough health and safety talk, a tour of the zoo and then you will go shopping for food etc. Day 3-16PROJECT DAYS Working hours at Zoo: 08.00 – 17.00 Weekends / Days off: Usually, weekends are given as days off. A total of 2 off days per week will be allocated throughout the programme which may be combined subject to discussion with your programme facilitator. You may choose to explore other parts of Malaysia at your own expense or stay at the volunteer accommodation. Day 17(B, L) DEPART KUALA LUMPUR, ARRIVE SANDAKAN Transfer from Zoo to airport for your flight out to Sandakan, Sabah. Please note: airfare not included. Upon arrival at Sandakan Airport (SDK), you will be met by a driver who will transfer you to the dormitory. After dinner and orientation, head to bed to fall asleep to the sounds of the Bornean jungle. Day 18-26(B) PROJECT DAYS After breakfast transfer to Project Site: Sukau. After showing you to your accommodation, you will be given a thorough Health & Safety briefing as well as an orientation around the village. The project at Sukau involves wildlife observation. Habitat restoration work involves tree-planting and maintenance activities at high priority areas. These are crucial in connecting fragmented forest in the area to encourage healthy orangutan and pygmy elephant populations. Community and Education programmes involve interaction with the villagers and the students of the village school. Day 27 Depart Sukau after breakfast for Sepilok. Walk through the Rainforest Discovery Centre to reinforce what you have learned about the rainforest the last few days. After lunch, visit the world-famous Sepilok Orangutan Rehabilitation Centre where you will learn about the challenges of orang-utan rehabilitation. After this learning session, you will head into Sandakan. Check into accommodation. Free at leisure. Try to catch the sunset from the Ba-Lin bar at the rooftop of Nak Hotel. Day 28 DEPARTURE Check out and transfer to Sandakan Airport. Optional: independent travel to Kota Kinabalu or Turtle Islands At the Zoo At the Zoo, your role is to assist the zookeepers in their daily jobs of cleaning cages, zoo compounds, feeding the animals and preparing enrichment activities for great apes, especially orang-utans and a variety of other zoo animals. Listed below are some of the activities you may be involved with whilst at the zoo: Husbandry This involves cleaning cages and feeding. You will rotate working with different animals depending on the needs of the zoo, the keepers, or the animals themselves within the primates or ape section as well as in other sections. Cleaning is vital to the zoo as better hygiene helps to prevent disease. Enrichment The idea of enrichment is to stimulate the animals and improve their living conditions as much as possible to mimic their natural habitat. Some sample activities are: - Provide leaves in cages for bedding and nesting purposes - Buy special fruit to give a variation on diet - Put branches from fig or fruit trees in their homes to observe behaviour - Rope work – make this fun and varied for the animal - Hiding food around cages to encourage foraging behaviour Construction You may be asked to design and work on small construction projects to improve the night dens or enclosures of selected animals. This may include assisting in building new exhibits and extensions to improve the zoo facilities, or improving existing exhibits by adding furniture or painting. Education There is an education centre and library at the zoo. Volunteers should learn as much as possible about the animals and you may be asked to guide and talk to school children about them. Sukau Sukau village will be your base for the habitat restoration and wildlife population observation work you will be involved with. Below is a list of possible activities you will be involved in whilst in Sukau: Wildlife Population Observation A lot of time is spent observing wildlife and their habitat, which is done from a boat cruising along the main river and its tributaries within the wildlife sanctuary. Habitat Restoration Take part in tree-planting, nursery care and seedling generation, sapling maintenance, mulching & composting, clearing invasive species and also tree growth data recording. This is the most crucial activity ensuring the survival of wildlife. Education Programme Spend half a day with school children of the community to work on conservation issues that the children deal with on a daily basis and emphasise their immediate and personal impact on conservation. You will be provided with a framework and the facilitator will guide you in the planning of this session. Community Development Interact with the community on various levels whilst continuing the development of a project within the community of the local village. Learn some local skills required for the villagers’ daily livelihood and maybe get the chance to assist them. This Project offers a unique opportunity to spend time working closely with animals in Negara Zoo, Kuala Lumpur before heading to Malaysian Borneo to help with habitat restoration in the rainforest. There is also the opportunity to spend some time with the local community in Malaysian Borneo learning local skills and eating lunch and dinner prepared by the villagers. Whilst at the zoo, stimulate and improve the conditions of various animals, specifically orangutans, in captivity through creating environment and food enrichment to mimic their natural habitat. Activities for enrichment could be: • Providing leaves in cages for bedding and nesting purposes • Hiding food around cages to encourage foraging behaviour • Buying special fruit to give a variation on diet In this project you will have the chance to learn about orangutans in the stage of rehabilitation and the process of releasing them back to the wild whilst at the zoo. Although there is a focus on orangutans, you may be working with other animals whilst at the zoo. By becoming involved with this project you not only get the chance to work with orang-utans up close, but you will directly contribute to the aims of the project, helping re-forest the habitat and rehabilitate orangutans who could potentially be released back into the wild. You will also contribute to the economy of the local community, motivating them to encourage decision makers to effect change that will conserve the forest and provide shelter for a wealth of wildlife. If you want to work with orangutans, learn about their behaviour, get involved in conservation and restoration efforts in place to save this endangered species, and see first-hand the difference these efforts can make – this is the project for you! Where will my donation go? Donations are spent on: 1. Enrichment - food (food parcels and a wide variety of different interesting foods) and physical enrichment (like hammocks and rope swings) 2. Construction - on materials and tools for getting orangutans out of cages and maintaining existing outdoor enclosures (everything from spades, to cement, to wheelbarrows, to nuts and bolts) 3. Reforestation - helping to create more species diverse forest by planting primary rainforest species under the pioneer tree canopy ( such as dipterocarpaceae, fabaceae and malvaceae) in certain areas. Also, we plant up species where we create destruction during the building process, such as recently when a digger dug out the island moats. Is a visa required? As a British or Irish passport holder, you will automatically receive a 3 month entry visa to Malaysia including Sabah. Is there an age limit Volunteers should be aged 18 or over though there are no upper age restrictions. The only proviso is that you are healthy, fit and compos mentis (that's Latin for sane). How much spending money will I need? For one month's travel it advisable to take on average £100-£200 as spending money but you can get away with less. This is used if you wish to do independent excursions on the weekends, shop for souvenirs for friends and family, and eat like an orangutan.
http://www.skytraktravel.com/services.php?id=114
Syndrome disintegration: Exome sequencing reveals that Fitzsimmons syndrome is a co-occurrence of multiple events. In 1987 Fitzsimmons and Guilbert described identical male twins with progressive spastic paraplegia, brachydactyly with cone shaped epiphyses, short stature, dysarthria, and "low-normal" intelligence. In subsequent years, four other patients, including one set of female identical twins, a single female child, and a single male individual were described with the same features, and the eponym Fitzsimmons syndrome was adopted (OMIM #270710). We performed exome analysis of the patient described in 2009, and one of the original twins from 1987, the only patients available from the literature. No single genetic etiology exists that explains Fitzsimmons syndrome; however, multiple different genetic causes were identified. Specifically, the twins described by Fitzsimmons had heterozygous mutations in the SACS gene, the gene responsible for autosomal recessive spastic ataxia of Charlevoix Saguenay (ARSACS), as well as a heterozygous mutation in the TRPS1, the gene responsible in Trichorhinophalangeal syndrome type 1 (TRPS1 type 1) which includes brachydactyly as a feature. A TBL1XR1 mutation was identified in the patient described in 2009 as contributing to his cognitive impairment and autistic features with no genetic cause identified for his spasticity or brachydactyly. The findings show that these individuals have multiple different etiologies giving rise to a similar phenotype, and that "Fitzsimmons syndrome" is in fact not one single syndrome. Over time, we anticipate that continued careful phenotyping with concomitant genome-wide analysis will continue to identify the causes of many rare syndromes, but it will also highlight that previously delineated clinical entities are, in fact, not syndromes at all. © 2016 Wiley Periodicals, Inc.
The problem: Let's say I want to create a java app (currently using java 8) that works like a dictionary. I want the app to give the user the capacity to add and search for words, every word must contain a name, a meaning and zero or more examples. In addition, I want the user to be able to add more examples to a word that is already stored in the dictionary and to add multiple meanings to the same word, for this, the dictionary must detect when a user tries to add a duplicated word and instead of creating a new entry, it should add the new information for the already existing word. Finally, I need the app to store all of this information so it don't forget it whenever the user exits the application. My approach: Obviously, I'm not asking you to implement this app, so here's my idea. I know java has a Dictionary class, so I could create a Hashmap<String, Word> to manage all the dictionary entries, where the key would be the 'name' of the word, and Word would be an object containing the meanings and the examples as two lists of strings. That way I could easily search for a word, and add or retrieve information from the Word object. Also, this way, if the user tries to add a word, if the Hashmap already contains the word, it will not create a new Word object, but add the info to an existing one (kind of what you would do with a Flyweight). Now, for storing the dictionary, given that my idea is to work with Word objects, I was thinking on using a JSON file to store the dictionary as an array of words. The question: Now, as I said, I'm not asking for an implementation of this app. What I want to know is if my approach is a good idea, and maybe discuss some alternative implementations. So, is a Hashmap a good structure to maintain a dictionary? Is it a good idea to use a Word object? Is using a JSON file a good way to store this kind of data? Bonus: What if I want to add the words in alphabetic order?
https://softwareengineering.stackexchange.com/questions/353237/what-would-be-a-proper-implementation-of-a-dictionary-in-java
A wildlife group says species which can be in danger of world extinction have seen their Canadian populations decline by a mean of 42 per cent within the last 50 years. Furthermore, Canadian species in danger nationally have declined by 59 per cent on common throughout that point interval. The World Wildlife Fund says Canada is not doing sufficient to guard its endangered species. The “Living Planet Report Canada 2020” used 300 sources of knowledge relationship again to 1970, and included 100 mammal species, 389 chicken species, 357 fish species and 37 species of amphibians and reptiles which can be on the International Union of Conservation of Nature’s Red List of species thought of to be of world conservation concern. Some of these species are additionally assessed as being in danger nationally by the Committee on the Status of Endangered Wildlife in Canada (COSEWIC). The leatherback sea turtle, as an example, listed as “vulnerable” by the IUCN and “endangered” by COSEWIC, loses greater than 20 per cent of its population in Canadian Atlantic waters as a result of of being entangled or unintentionally captured in fishing gear, the WWF report says. Multiple threats The report says Canadian populations of endangered animals face a number of, typically interacting, threats, together with air pollution, loss of biodiversity, over-exploitation of business species and habitat loss, all probably exacerbated by the “increasing and accelerating” menace of local weather change. The Vancouver Island marmot is a floor squirrel discovered solely on Vancouver Island; if it disappears from there, it disappears from the world. By distinction, Canada’s population of the Atlantic puffin has elevated whereas the worldwide population has decreased, that means that Canada has an vital function in guaranteeing its survival, based on the WWF. Out of the 139 native species within the research — these assessed by COSEWIC as being in danger — there are others whose populations have risen, like the ocean otter, which has elevated by “an average of well over 100 per cent,” the report says. Meanwhile, the little brown bat has declined by 99 per cent. Both stay in danger of extinction. James Snider, vp of science, data and innovation at WWF Canada, stated conservation approaches have typically solely tackled one menace at a time, however the dramatic discount in population reveals there must be a complete conservation technique that takes all threats into consideration. “We need to recognize that the actions that we take for climate change, for biodiversity, for recovery of species at risk are deeply integrated,” Snider, who co-authored the report, stated in an interview with The Canadian Press. “We can’t simply be taking an approach to protected areas that’s separate from how we’re tackling climate change, that’s separate from how we’re trying to recover our species at risk. They have to be deeply integrated.” ‘Global extinction disaster’ The plight of the North Atlantic Right Whale demonstrates how slim conservation efforts are inadequate. Once numbering within the 1000’s, there are solely round 400 of these whales left on the earth. Efforts went into defending their habitat and shifting transport lanes within the Bay of Fundy, however these protections did not lengthen to the Gulf of St. Lawrence, the place the whales started to shift. Since 2017 Transport Canada has put in place reduced-speed zones within the gulf, however the measure cannot sustain with the whales’ motion, and a number of other nonetheless die annually due largely to ship strikes and entanglements in fishing gear. The WWF report discovered that lands managed by Indigenous populations had been higher at supporting a various vary of at-risk species, and stated the Canadian authorities should elevate the significance and sovereignty of Indigenous conservation efforts. The WWF additionally known as on the federal government to revive degraded ecosystems and create well-sited protected areas to raised preserve wildlife populations. “In Canada, we are not exempt from the global extinction crisis,” stated Snider.
https://weekdaytimes.com/technology/2020/09/02/canadian-population-of-at-risk-species-declined-over-last-50-years-report-cbc-news
26 animal species humans are pushing to the brink The COP26 was touted as a turning point for our planet. But will the leaders at The 2021 United Nations Climate Change Conference take the urgent action needed to halt the drastic decline in the world’s animal species? A captive white bellied pangolin and her baby, photographed at Pangolin Conservation, Saint Augustine, Florida. All species of pangolin face threats from lucrative trafficking in huge numbers due to the supposed (but unproven) medicinal qualities of its scales. For some, the word ‘extinction’ belongs to an ancient era of ice ages and asteroids, and near-mythical beasts like the dinosaurs and dodos. But extinction is happening at an astonishing rate right now, often silently and beyond our glare. The past 540 million years of Earth’s history have seen five deadly periods of mass extinction. Scientists believe we are now in the midst of a sixth – the Anthropocene extinction – with human activity driving the loss rate of species from 1,000 to 10,000 times higher than it should naturally be. (Related: will humans survive the sixth great extinction?) Human super predators have reshaped the landscape since our ancestors first stood on two feet and strode out from Africa, annihilating fellow Earthlings on our journey, both directly through hunting and consumption, or inadvertently through over-population, habitat loss, agriculture, pollution, introduction of invasive species and climate change. The International Union for the Conservation of Nature's Red List of Threatened Species, the world’s most comprehensive information source on the global extinction risk status of animal, fungus and plant species, has assessed 138,300 species to date and, of these, 28% are estimated to be threatened with extinction. Global wildlife populations have fallen an average of 68% since 1970, while 51% of all native species are threatened, near threatened or already extinct in at least one of the countries of Great Britain. “The nature crisis is as every bit as pressing and important as the climate crisis,” the chair of Natural England, Tony Juniper, told National Geographic. “It is vital we step up efforts to halt and reverse the decline. Natural England stands ready to work across Government to help make it happen, including through the delivery of an ambitious Nature Recovery Network that will see not only the improvement of our vital protected areas, more green spaces and trees in towns and cities and the restoration of lost habitats, including woodland, wetland and heaths, but also the return of lost species.” The 2021 COP26 summit in Glasgow offers an opportunity to stop the human-driven decline in global biodiversity, reverse the destruction of nature, halt the climate catastrophe and save the planet’s imperilled species – including ourselves. Failure to rise to these challenges in the next 10 years, designated the Decade on Ecosystem Restoration by the United Nations, may see our world irreversibly changed. At this critical time in Earth’s history, we take a look at 26 animals destined for extinction on a global or local scale if urgent action isn’t taken today – and hear from the conservationists who are striving to rewrite the final chapter in their remarkable stories. Vaquita Endemic to the Sea of Cortez in the Upper Gulf of California in Mexico, it’s believed just six of these tiny porpoises remain. Their destiny is tragically entwined with their marine neighbour, the totoaba fish, known as ‘the cocaine of the sea’. Despite a permanent fishing ban since 1975, the totoaba is illegally targeted for its swim bladder, highly prized for its (non-proven) medicinal value in Asia. Entanglement in the poachers’ vast gillnets has rendered the vaquita the world’s most endangered marine mammal. International direct-action ocean conservation movement, Sea Shepherd, patrols the UNESCO Vaquita Refuge, confronting fishing vessels and removing nets. “Every net that is removed from the sea saves the lives of countless marine creatures and gives the vaquita a fighting chance,” says Peter Hammarstedt, Director of Campaigns at Sea Shepherd Global. Eastern lowland gorilla The world’s largest primates, and some of our closest living relatives, gorillas continue to face huge challenges, from habitat loss to disease, poaching for bush meat and trade, mining and extreme volatility in some of the regions where they roam. Over 200 wildlife rangers have been killed on duty in DRC’s Virunga National Park, defending mountain and eastern lowland gorillas, while the collapse of tourism due to the COVID-19 pandemic has seen a loss of revenue and increase in poaching. Now found in just 13% of its original range, and having experienced an estimated 60% population decline over the last few decades, the eastern lowland or Grauer’s gorilla is critically endangered, the last step before extinction. The Dian Fossey Gorilla Fund is working with local landowners to develop sustainable management practices in eastern lowland gorilla habitat. “The data shows that gorillas residing in community-owned forests can do very well,” says the Fund’s Tara Stoinski, President, CEO and Chief Scientific Officer. “The people of the Nkuba Conservation Area (NCA) show us it is possible to protect biodiverse wild spaces and the animals that live in them, while at the same time building strong, supportive human communities: this makes me hopeful for the future.” Scottish wild cat Extinct in England and Wales, the Scottish Highlands remain the last stronghold of Britain’s only remaining native cat species. Found in the forests bordering moorlands, habitat loss, hunting, interbreeding with domestic cats and disease have decimated the ‘Highland tiger’, and fewer than 400 individuals are now believed to exist in the wild, rendering the population no longer viable. (Related: Amidst hybridisation and habitat destruction, the Highland Tiger is clinging on by a claw.) The Saving Wildcats programme is a European partnership project supervised by the Royal Zoological Society Scotland (RZSS), which is breeding wildcats in captivity at the RZSS Highland Wildlife Park in the Cairngorms National Park and Alladale Wilderness Reserve, and aims to release 20 cats a year into the wild. Pangolin Once little known, recent years have seen the pangolin become famous for all the wrong reasons, as the gentle mammal has tragically become the poster species for wildlife trafficking. According to wildlife trade monitoring network, Traffic, up to one million pangolins have been traded in the last decade. “All eight pangolin species are now classified as threatened by the IUCN, and while they are protected by national and international laws, they remain in high demand in China and Vietnam for their meat and their scales, which are used in traditional Asian medicine,” says Michela Pacifici, a researcher for The Global Mammal Assessment (GMA) programme, which informs the the IUCN Red List of Threatened Species. “Effective law enforcement, reducing the demand for pangolin items, and working with local communities are all key for preserving the species.” North Atlantic right whale One of the world’s most endangered large whale species, the North Atlantic right whale has suffered from years of human exploitation, being hunted almost to extinction by commercial whalers by the 1890s (the 'right' of their name was a reference to whalers as them being the 'right' whale to kill). Despite being legally protected from hunting since the 1930s, fewer than 400 individuals remain, with entanglement in fishing nets, ship strikes and climate change impeding the species’ recovery. “Seasonal Management Areas should consider whale migration routes, along with their feeding and reproductive activities, to help mitigate collisions. Tighter restrictions on certain types of fishing gear are also urgently needed,” says Michela Pacifici from The Global Mammal Assessment (GMA) programme. (Related: 14 incredible images of whales.) Madame Berthe's mouse lemur The tiniest of the mouse lemurs, and the world’s smallest primate with with a body mass of just 30g, Madame Berthe’s is sadly also one of the lemurs most threatened with extinction. Found only in the fragmented forests of the Menabe region of Western Madagascar, with a total estimated range of only 35,000 hectares, this little lemur is at huge risk from logging, slash and burn agricultural practices and charcoal production. “The annual deforestation rate in Menabe exceeded 4,000 hectares in 2017 and 2018,” says Piero Visconti, Senior Research Scholar and Research Group Leader at the Biodiversity, Ecology and Conservation Group (BEC). “If deforestation continues at the same rate, the remaining habitat and species could tragically be lost within the next 10 years.” Red squirrel Once synonymous with the UK countryside, the population of red squirrels has dropped from a high of 3.5 million to under 140,000, compared to a current estimate of 2.5 million non-native grey squirrels, which were first introduced in 1876. “Greys extract more energy from seed, breed faster and outcompete, stress and displace red squirrels, “ explains Heinz Traut, Project Manager for conservation group Red Squirrels Northern England, which is supported by Natural England’s Species Recovery Programme (SRP). “Add to this the fatal squirrelpox virus, which greys carry asymptomatically, and the consequences for our reds are disastrous.” Grey squirrel fertility control, gene editing and control by pine marten predation are all potential remedies to rescue the reds from the danger zone. Sumatran rhino Rhinos have roamed the planet for 50 million years. With the northern white rhino now functionally extinct – the last two females of the species have been participating in an assisted reproduction programme at Kenya’s Ol Pejeta Conservancy – the Sumatran rhino could be the first of the remaining rhinoceros species to become extinct in the wild. “Their numbers have plummeted by 50% since the late 1990s, and they are increasingly threatened by habitat loss, as human population growth increases the pressure on the wild spaces the rhinos need to survive,” explains Simon Jones, Founder and CEO of international conservation charity, Helping Rhinos. The demand for rhino horn from China and Vietnam, where it is still used in traditional Asian medicine, could also drive this closest relative of the ancient wooly rhinoceros from the Pleistocene Epoch to extinction. Monarch butterfly If anything sums up human complacency with regards to wildlife, it’s the catastrophic decline of the monarch butterfly and the refusal of the U.S Fish and Wildlife Service to grant this iconic species immediate protection of the Endangered Species Act. Scenes of millions of monarch butterflies clustering on trees during their legendary thousands-of-miles migration from their summer breeding grounds to overwintering destinations are now a memory: the western monarch population has declined by a devastating 99% in just 40 years, while eastern monarchs have declined by more than 80% over the past two decades. (Related: Why are we losing monarch butterflies so fast?) Autumn 2020 saw just 20,000 of these critical pollinators arrive in California: the robust few who survived habitat loss, extreme climate events, and swerved the glyphosate-based herbicides, which destroy the essential milkweed plants eaten by monarch caterpillars (Iowa has lost 98 percent of its milkweed but is working to restore monarch habitat). Dan Hoare, Director of Conservation at UK wildlife charity Butterfly Conservation says: “Climate change, habitat loss, agricultural intensification and pesticide use is driving the monarch butterfly towards extinction. Recovering this species will require habitat restoration efforts at a continental scale: it fully warrants protection under the Endangered Species Act.” “Scientists believe we are now in the midst of the ‘Anthropocene extinction’ – with human activity driving the loss rate of species from 1,000 to 10,000 times higher than it should naturally be.” Grey long-eared bat The United Kingdom’s rarest mammal, this intelligent, social bat has almost vanished from the countryside, as the grasslands it depends on for food and safety have become fragmented. With fewer than 1,000 remaining, the grey long-eared bat joins the greater mouse-eared, Leisler’s, serotine and barbastelle bats, all listed as being in danger of extinction on the Mammal Society's first official Red List for British Mammals. Developed by Natural England and Rethink Nature – a partnership of seven conservation charities – the Back from the Brink project, led by the Bat Conservation Trust, is working with landowners to protect and restore precious habitats to help bat populations bounce back. (Related: these British bats are so rare, few photographs exist. This photographer aimed to change that.) Sehuencas water frog Like canaries in a coal mine, amphibians are indicator species for ecosystems – and their global decline should be a huge alarm call for us all. There are more than 7,650 known species of amphibian and more than 40% are now threatened with extinction. In addition to habitat loss and predation by non-native species, rising temperatures are creating the conditions for deadly diseases which are pushing amphibians to the edge. For 10 years, Romeo was the only known Sehuencas water frog, captured from the wild in a Bolivian rainforest. A fundraising campaign enabled a mate-finding mission to locate his Juliet, and now five more have joined Romeo at The K’ayra Center at the Alcide d’Orbigny Natural History Museum in Bolivia’s Cochabamba City. “The only known Sehuencas water frogs are in this breeding program, but the species has yet to breed in captivity,” says Barney Long, Senior Director of Conservation Strategies at biodiversity restoration NGO, Re:wild. “Unless we can figure out the right conditions for breeding, these animals will die of old age and the species will be lost forever.” Duck-billed platypus Once widespread across the eastern Australian mainland and Tasmania, these indigenous egg-laying mammals, or monotremes, have seen much of their habitat destroyed by the devastating Black Summer bushfires, which ravaged landscapes and killed an estimated three billion animals. Without trees to shade the platypuses’ preferred freshwater pools, temperatures soar, while water quality is severely impacted by bushfires, which can cause algal blooms and deoxygenation. Severe droughts and habitat fragmentation by dams have halved platypus numbers, with local populations now extinct across 40% of their range. (Related: the silent decline of Australia's beloved oddity.) “Many populations are likely to have been declining for more than 50 years due to land clearing, urbanisation, changes to river flows and more,” explains Josh Griffiths, Senior Wildlife Ecologist at research organisation Cesar in Victoria. “Without strong nature laws that protect the habitats of the animals we all love, it’s only a matter of time before we see them racing towards extinction.” Shrill carder bee One of the United Kingdom’s rarest and most threatened bumblebees, the shrill carder bee – named after its distinctive, high-pitched buzz – is found in just five areas, two in southern England and three in south Wales. Loss and fragmentation of habitat is the key threat, with their isolated populations leaving them vulnerable to inbreeding and loss of genetic diversity. The Bumblebee Conservation Trust, working with Buglife alongside Natural England and other partners, launched the Shrill Carder Bee Conservation Strategy in July 2020 as a continuation of the Back from the Brink Shrill Carder Bee project, to protect critical wild flower and nesting habitat for the bees. African forest elephant The elusive relative of the African savanna elephant, these smaller pachyderms are found in the forests of Gabon and the Democratic Republic of Congo, with populations in Central and West Africa: just one quarter of its historic range. In a 2021 review of the IUCN Red List, savanna and forest elephants were categorised as separate species for the first time, with the African forest elephant now listed as Critically Endangered. Latest estimates suggest that the population has declined by more than 80% over the last 90 years, and the trend is set to continue. "The species faces major challenges from poaching, both for ivory and the international bushmeat trade, as well as loss of habitat to agriculture and industry,” says Charlie Mayhew MBE, Chief Executive of African elephant charity, Tusk. “We welcome the re-listing of these keystone species in this critical year for conservation. As governments gather to set important new targets for tackling climate change and protecting the planet’s rapidly declining biodiversity, elephants can receive the priority they deserve.” Water vole The Wind in the Willows favourite, Ratty, is sadly in danger of disappearing from the British countryside. “Water voles are thought to have been lost from 94% of the sites they were once found, disappearing due to development, insensitive changes to their habitat, and predation by the non-native American mink,” says Ali Morse, Water Policy Manager at The Wildlife Trusts. The Trusts’ National Water Vole Database & Mapping Project is helping conservationists to plan strategically for their return. “Trusts work to enhance rivers and wetlands, advise landowners on habitat management, campaign against detrimental development, and remove damaging mink to give voles a chance to recover,” says Morse. Pondicherry shark This small, Critically Endangered shark was once widespread throughout the Into-Pacific, but is now so rare, some believe it could be extinct, although specimens appear from time to time in rivers and inshore waters. With fossil records dating back 400 million years, sharks are some of the oldest life forms on Earth, but but a staggering 70% of sharks and rays have disappeared from our oceans in just 50 years. Many species are now threatened with extinction due to overfishing, bycatch and demand for shark fins, considered a delicacy in Asia. Pollution, habitat degradation and climate change are also adding to the decline.“To protect these essential apex predators, governments must urgently establish vast Marine Protected Areas to cover at least 30% of the seas, and at least 10% of those should be Highly Protected no-take zones,” says Sandy Luk, Chief Executive of the Marine Conservation Society. Video: see more of National Geographic's Photo Ark project St Lucia racer The Caribbean island of St Lucia is home to 2,000 native species, with 200 found nowhere else on Earth, including 76% of its reptiles. The endangered St Lucia Amazon parrot was saved from extinction through a partnership with the St Lucia Forestry Department and Durrel Wildlife Conservation Trust. which saw their numbers increase from 100 to an estimated 1,750 - 2,250 individuals. Now it's hoped that efforts to protect the St Lucia racer, known as the world’s rarest snake, can replicate this success. Wiped out on mainland St Lucia by invasive species including rats, mongooses and opossums, just 18 of these small, harmless reptiles live on the protected nine-hectare island of Maria Major, with ambitious plans in place to expand its range. Amur leopard Probably the world’s rarest big cat, an estimated 100 Amur leopards remain in the wild, their incredible rare beauty sadly making them a target for trophy hunters. Found in the forests of Russia and China, with a few animals spotted in North Korea, these apex predators remain under pressure from habitat loss and poaching for their bones, used in Asian medicine. (Video: Watch the rare Amur leopard.) They are also vulnerable to disease including Canine Distemper Virus (CDV). With a population that plummeted to 35 individuals a few decades ago, the Amur leopard is the only big cat with international approval for a captive-bred reintroduction programme, with partners including WCS, ZSL and WWF, which offers some hope for the species. Northern hairy-nosed wombat One of the most biodiverse nations on Earth, with 86% of species found nowhere else on the planet, Australia also has the highest mammal extinction rate in the world, and over 500 native species are listed as threatened under the Environment Protection and Biodiversity Act 1999. The northern hairy-nosed wombat is one of the continent’s critically endangered mammals. Competition for food with introduced domestic species and predation by dingoes has seen numbers plummet to just 315 individuals living in Epping Forest National Park and Richard Underwood Nature Refuge in Queensland. The Wombat Foundation funds research and conservation projects, with the aim of seeing the wombats roam once more across their former range. Peacock tarantula Love them or loathe them, arachnids play a vital role in healthy ecosystems, keeping insect populations under control, and in turn, disease. There are an estimated 45,000 species of spider with perhaps as many yet still to be discovered but like insects, their numbers are in decline due to habitat loss, industrial farming, pesticides and the spread of monoculture crops. Found in just one small area of forest in India’s Andhra Pradesh, this brilliant blue tarantula lives in crevices in tall, old-growth trees, but logging and habitat degradation in its home range, along with trapping for the international pet trade, has led to the IUCN listing the spider as Critically Endangered. (Read: new species of tarantula found with weird 'horn' on its back.) Rondo dwarf galago Living in eight fragmented patches of forest in Tanzania, the Rondo dwarf galago is one of the world’s rarest primates. Weighing just 60g with a distinctive call and ‘bottle-brush’ tail, these insect-eating tree-dwellers are under threat from deforestation and habitat degradation. The ZSL (Zoological Society London) EDGE of Existence Programme is the only global conservation initiative to focus specifically on threatened species that have few close relatives on the tree of life. “EDGE prioritises unique species that are at high risk of extinction, and have had low conservation attention to date,” says EDGE Programme Manger, Olivia Couchman. “If we lose Critically Endangered species like the Rondo dwarf galago, Chinese pangolin, Seychelles palm frog and Attenborough’s long-beaked echidna, we stand to lose many millions of years of evolutionary history.” Flapper skate Once abundant in the seas surrounding the British Isles, the flapper skate – a large flat fish, growing up to three metres in length and related to sharks and rays – is now a critically endangered species. Historically overfished, the skate remains under pressure from bycatch, dredging and habitat destruction, so protecting its foraging and nursery grounds is crucial to the survival of the species. In 2019, National Geographic Explorer-in-Residence, marine biologist and founder of Mission Blue, Dr. Sylvia Earle, established the Argyll Coast and Islands Hope Spot – the first in mainland U.K. – to protect the little-known but largest of all the world’s skates, calling it “more endangered than the giant pandas”. “COP26 offers an opportunity to stop the human-driven decline in global biodiversity, reverse the destruction of nature, halt the climate catastrophe and save the planet’s imperilled species – including ourselves. ” Ploughshare tortoise “Known locally as Angonoky, the largest of Madagascar’s five endemic species of tortoise is in the unenviable position of being both extremely rare and highly threatened,” says WWF’s Africa Region Director, Alice Ruhweza. With numbers reduced to around 100 adults by locals hunting them for meat and capture for the exotic pet trade – they have been known to fetch $50,000 on the black market – Baly Bay National Park is their last stronghold. “But there is hope,” says Alice. “We must work together to broaden global awareness of the illegal trade in endangered species for pets, and encourage governments to strengthen laws to bring this beautiful tortoise back from the brink.” (Related: read this before you consider a tortoise as a pet.) Great Indian bustard Considered ‘living dinosaurs’, birds have inhabited the planet for around 100 million years, but today, over 1,480 of the 10,000 known bird species are considered globally threatened, and 223 are Critically Endangered. In Europe, one in five bird species are now threatened with extinction, while seabird populations are suffering due to longline fishing and marine pollution. But it is Asia’s bird species which have seen the sharpest decline because of rampant deforestation. Once widespread, fewer than 200 great Indian bustards remain, found mostly in the Thar Desert. “These birds face a multitude of threats including habitat loss and degradation, power line collisions, hunting, predation by dogs and foxes and direct disturbance,” explains Stuart Butchart, Chief Scientist at BirdLife International. An indicator species, when birds are in danger, we’re all in danger, too. Orinoco crocodile The largest predator in South America sadly hasn’t proven to be a match for the human hunters that have driven the species towards extinction. Of the 24 known species of crocodilians, the Orinoco crocodile is one of seven listed as Critically Endangered on the IUCN Red List, with four other species listed as vulnerable. (Related: behind the scenes of a close crocodile encounter.) Found in the Orinoco River and its tributaries in Venezuela and Colombia, the crocodile – which can measure over five metres in length – was hunted almost to extinction for its skin. Despite legal protections being introduced in the late 1960s, fewer than 250 remain in the wild today, but it’s hoped that captive breeding and reintroduction programmes will help the population recover. Vangunu giant rat Discovered in the Solomon Islands, a remote archipelago in the South Pacific Ocean to the northeast of Australia, this large arboreal rodent was first documented in 2015 by researchers from the Chicago Field Museum, but is already Critically Endangered. “The vika, as it’s known locally, is only found in one unlogged forest on the island of Vangunu,” Re:wild’s Senior Director of Conservation Strategies, Barney Long, told National Geographic. “And sadly that forest is slated to be logged, which could spell extinction.” Hope for the vika lies with the people of Zaira, a small community demanding protection for the forest and taking a stand against logging and mining. "The rivers, streams and seas are all polluted and the companies are operating for just one, three or five years, and then they leave," community leader, Hanz Jinohe, told ABC News. “We are so dependent on the natural resources in the sea and the forest for our continuous sustainment. The people are in so much trouble. We have seen it with our own eyes.” National Geographic is committed to encouraging positive action at an individual level to help curb climate change. To mark the COP26 Climate Conference, discover more ways we all can live lighter on the planet here.
https://www.nationalgeographic.co.uk/26animals
Supports are necessary for printing parts in a majority of cases, as overhanging features on your part won’t print successfully without them. Make sure you position and scale your part as intended before generating supports. Rotating the part or scaling your part will force the regeneration of supports. Note If no model is selected, all support settings will apply to the entire build. If specific parts are selected, those settings will only apply to the selected parts. Support Presets In the Support menu, you’ll find options to change the Strength and Density of your supports. - Strength entails the thickness of the beam and size of the touch points. The Default setting will vary depending on the type of material you’re printing with. - Low will make the beams thinner and decrease the size of the touch points relative to the Default settings. - Conversely, High will thicken the beams and increase the size of the touch points relative to the Default Settings. - - Density entails the amount of supports generated. As with Strength, the Default will vary depending on the type of material you’re printing with. You can adjust the Density to High, Medium, and Low to adjust the amount of supports generated. In most cases the Default presets will work fine for both strength and density. However, you may want to modify the strength or density in certain cases. Auto-Generate Supports (to All) Clicking this button will automatically generate the scaffolding for your part based off the presets defined above. Edit (All) When you click Edit All, the Edit Supports sub-menu will appear. This sub-menu allows you to add, replace or modify specific support points for your scaffold. You can either choose to add points manually without the need of auto-generated scaffolding or you can edit points created by the auto-generating feature after it has completed. The Contact Thickness slider allows you to define the size of your support touch points, as well as the thickness of the support beam. To manually edit the size and placement of the supports: - Click Edit All to enter editing mode - While in editing mode, click anywhere on the model to add a touch point with the thickness defined by the Contact Thickness slider. A white dot will appear to indicate where the support will be generated - The point will turn yellow when the cursor hovers over it. In order to change the size of an existing support point, adjust the Contact Thickness slider to the desired size, and click over the existing specific point to modify - To completely remove a support, right click the touch point while in editing mode Brush Remove Tool The Brush Remove Tool allows the user to drag the cursor over the part and delete all support points within a certain radius of the cursor. The radius of the brush can be modified with either the slider or text field under Brush Tool Radius. Clear (All) This button will delete any scaffolding and cone supports that have already been generated for the selected part. Settings This button will pull up an advanced scaffold support settings menu that will present different support parameters for your desired results. Click Apply to finalize the changes, but there are also options to Cancel and Reset the changes. Custom Support Profiles User can create custom supports and save them as profiles to use for future prints. To do so, open up the Support menu in the left hand toolbar of the NexaX window and choose the settings button in the bottom left hand corner of the menu. Choose the material being used from the drop down menu, and make the changes to the supports using the sliders or text boxes to change in the desired values for each property. Once the desired changes have been made, scroll all the way to the bottom of the menu and click the apply button to name and save the profile. When saving the changes users can click Yes to save, No to abort the changes (if saving the profile is not the goal), and Cancel to go back to the custom support menu to continue to make changes. The custom support profiles can also be managed from the profile library. To access the library, click on the gear icon next to the Setting drop down menu at the top of the Support Settings menu. This will bring up the profile library. The pencil icon that appears when hovering over each custom profile allows the user to change the name. Custom profiles can be removed in bulk by checking the boxes that appear next to the custom profile when hovering over the profile. A remove button appears in the top right hand corner of the library window when custom profiles are selected. Click the remove button to delete the selected profiles in bulk. Click the X in the top right hand corner of the library window to close and return to the Supports Menu. Be sure to click apply in order to save any changes.
https://support.nexa3d.com/hc/en-us/articles/4408826605851-Generating-Supports
The cultural theorist Stuart Hall is one of the main proponents of reception theory, having developed it for media and communication studies from the literary- and history-oriented approaches mentioned above. This approach, the Encoding/Decoding Model of Communication is a textual analysis that focuses on the scope for "negotiation" and "opposition" on the part of the audience. This means that a "text"—be it a book, movie, or other creative work—is not simply passively accepted by the audience, but that the reader / viewer interprets the meanings of the text based on their individual cultural background and life experiences. In essence, the meaning of a text is not inherent within the text itself, but is created within the relationship between the text and the reader. Stuart Hall also developed Hall's Theory of encoding and decoding, focusing on the communication processes at play in the televisual form. Reception theory has since been extended to the spectators of performative events, predominantly theatre. Susan Bennett is often credited with beginning this discourse within theatre. Reception theory has also been applied to the history and analysis of landscapes, through the work of the landscape historian John Dixon Hunt, motivated by recognition that the survival of gardens and landscapes is due to their public reception. Contents A basic acceptance of the meaning of a specific text tends to occur when a group of readers have a shared cultural background and interpret the text in similar ways. It is likely that the less shared heritage a reader has with the artist, the less he or she will be able to recognise the artist's intended meaning, and it follows that if two readers have vastly different cultural and personal experiences, their reading of a text will vary greatly. Umberto Eco coined the term aberrant decoding to describe the case when the reader's interpretation differs from what the artist intended.[1] In literature, the interaction between text and reader occurs within a framework that controls and limits the interaction, through genre, tone, structure, and the social conditions of the reader and author, whereas in landscapes the interaction occurs through movement and viewing, framed by typology instead of genre and tone. Instead of an “implied reader,” reception theory of landscapes assumes an “implied visitor,” who is an abstracted concatenation of responses of many visitors at different times. The theory recognizes that there is no single reading of a landscape that fulfills its entire potential, and that it is important to examine the motives of visitors and the factors influencing their visits (whether they read guidebooks about the place before visiting, or had strong feelings about the place or the designer, for instance). One key difference between reception theory in literature and reception theory in landscape architecture is that while literary works are accessible only to the imagination, physical landscapes are accessible to the senses as well as to the imagination. However, purely mythological gardens (such as the Garden of Eden and the gardens of the Hypnerotomachia Poliphili) are accessible only to the imagination, and extant historical gardens form a middle ground, with their reception influenced by sensory experience as well as readings of historical accounts of visits to those gardens. Reception theoretical analysis of landscapes differs from typical writing on the history and analysis of landscapes, which tends to focus on the intentions of the designers, the conditions leading to the creation of the design, and the building process. Reception theory also tends to de-emphasize commonly used terms of description like 'formal' and 'picturesque,' unless those terms were known to have meaning to landscape visitors themselves. According to Harold Marcuse,[2]reception history is "the history of the meanings that have been imputed to historical events. It traces the different ways in which participants, observers, historians and other retrospective interpreters have attempted to make sense of events both as they unfolded and over time since then, to make those events meaningful for the present in which they lived and live."
It’s a Wednesday night in downtown Alice Springs and the Red Hot Arts Centre is humming with the sound of boot-tapping, knee-slapping and yeehaw-ing. A group of women aged from their mid-twenties to their early eighties have gathered for a weekly ritual. They’re all here for the same reason: to get their blood pumping, boots scooting, endorphins rushing and hearts singing. What exercise could possibly do all of the above? Line dancing. Bev, 80, has been attending the local line dancing class since its inception two years ago. “It’s just so much fun,” she tells me in between songs. As I tried to keep up with Bev’s impeccable footwork, here are eight thoughts I had during my first line dancing class… REASON #1 WHY LINE DANCING IS THE VERY BEST WORKOUT It truly is a workout. At my introduction to the sport, each dance started with the instructor walking us through the routine and practicing it a few times in slow motion. Then the music started, and it was game on. The moves were quick, and it took a truckload of effort and concentration to keep up. After four minutes of non-stop Nutbush-ing and hip-popping, I’d worked up a decent sweat and was ready for a quick water break. REASON #2 The class was overflowing with an energy of encouragement. After each song – regardless of how successful the dancing was – everyone gave a round of applause. Mistakes were met with laughter and happened to everyone – even the instructor! In between routines, the more experienced boot-scooters offered up advice and words of praise to me, the beginner. Hot tip: take small steps when you’re starting out, so your transitions are quicker. REASON #3 The music! Even if you’re not a country fan, it’s been scientifically proven* that it’s physically impossible to stay still when a Troy Cassar-Daley banger comes on. (*Scientific study conducted by me at the pub’s jukebox). REASON #4 Line dancing is a sport for all. In my beginner’s class, there were women of all ages, physical abilities and fitness levels, and we all gave it a red-hot crack. The instructor laughed as she reminded everyone of the class she taught a year ago when she was heavily pregnant with her daughter, bouncing her belly to the beat. REASON #5 My absolute favourite part of the class was the impromptu yeehaws. When someone nailed a move, enjoyed a turn or felt the beat kick in, they would let out an almighty exclamation, much to the joy of everyone else. I was too focused on trying not to trip to give it a go myself, but you better believe I’ll be letting out a yeehaw next time. REASON #6 The health benefits of line dancing go beyond just getting your heart rate up. It’s also a great way to improve your balance and coordination. And the social aspect is so important for mental health. We all know that we need to stay active to keep healthy, but finding the motivation to do so can be easier said than done. With line dancing, exercising doesn’t feel like a chore or a punishment, it’s a delight. REASON #7 Confession: I may or may not have signed up for class purely to test out my new R.M. Williams boots. Regardless, you’ll be pleased to know my boots passed the test with flying colours and I’m looking in to getting one of the ‘Red Hot Line Dancers’ cowgirl shirts to complete the look. The line dancing dress code is simple and casual: wear enclosed shoes and bring a drink bottle. Akubra hats are optional. REASON #8 What Bev said. It’s so much fun! I left the class with a buzz of endorphins, a sore face from smiling all night and a promise to return next week. Giddy up.
https://womensagenda.com.au/latest/ive-discovered-the-very-best-workout-if-you-lack-all-motivation-like-me/
NOAA Outlook Warns Of Possible Major Spring Flooding In MinnesotaThe new spring flood outlook predicts a potentially unprecedented flood season, especially in the Midwest and along the Mississippi River. UPDATE: Problems With NOAA's GOES-17 SatelliteAs the satellite was first being powered up in orbit -- 22,000 miles above the Equator -- a problem with the ABI's cooling system was discovered. 'NOAA, We Have A Problem'Right now, GOES-17 is effectively blind at night and that detailed atmospheric temperature and wind data isn't available during the day either. NOAA Says La Nina Will Be Weak This YearLa Nina typically brings drier conditions to the U.S. South and wetter weather to the Pacific Northwest and western Canada. About That 'Colder, Wetter Winter' Prediction“If La Nina conditions develop, we predict it will be weak and potentially short-lived,” said NOAA’s Mike Halpert. GOES-16: The Next Generation Of Weather SatelliteCalled GOES-R at launch, and now named GOES-16, it has cutting-edge sensors that will eventually replace the 1970s technology we currently use. 2016 Was 2nd Hottest Year On Record In U.S., NOAA SaysClimate change could likely be a factor in it being the Twin Cities' wettest year on record, Dr. Kevin Trenberth said. What's The Outlook For Winter This Year? Ask 'La Niña'The National Oceanic and Atmospheric Administration (NOAA) Thursday put out its updated forecast through February, and they're hinting that the mild weather we've been enjoying is about to end. It’s Official: 2015 Was The Warmest Year On RecordOn Wednesday, scientists at NASA and NOAA announced a historic finding about global temperatures in 2015. NOAA: Christmas Might Be One Of The Warmest On RecordIf your number one holiday wish this year is to have a white Christmas in Minnesota, you may want to start thinking about a backup wish. According to the maps released Monday by the National Oceanic and Atmospheric Administration, the entire state stands a better than normal chance of experiencing above-normal temperatures between Dec. 22 and Dec. 28. NOAA Forecast Shows Mild Winter For MinnesotaFall is just starting, but we're already looking ahead to winter. Forecasters say it may not be as brutally cold as last year. But the NOAA outlook shows a 40 to 60 percent chance of warmer-than-average temperatures during December, January, and February. Report: This August Was Hottest On RecordThe National Oceanic and Atmospheric Administration (NOAA) says last month was the planet's hottest August on record. This was also the hottest summer for planet earth and the hottest first eight months of the year as well. NOAA: $9M For Projects To Mitigate Climate Change ThreatsThe National Oceanic and Atmospheric Administration is offering $9 million in grants to help coastal communities deal with extreme weather, changing ocean conditions and climate hazards. Rubio's Climate Change Views Could Hurt 2016 Presidential BidThe presidential hopeful has acknowledged that the climate is changing, but has expressed skepticism that it is being caused solely by humans. Most Of Great Lakes Surface Frozen For Second Straight YearFor the second consecutive winter, bitter weather threatens to turn the surface of the Great Lakes into a vast, frozen plain. Nearly 81 percent of the lakes' surface area was covered with ice, the NOAA Great Lakes Environmental Research Laboratory reported Friday.
https://minnesota.cbslocal.com/tag/noaa/
The emergence of the Internet was one of the most significant technological changes in recent history. The first applications of the Internet were emails and mailing lists, which were popular during their time. Later, e-commerce, frame switched services, and ATM technology emerged and the Internet was able to support a variety of functions. By the early 2000s, however, the Internet had become an indispensable tool for society, as it allowed users to share, collaborate, and update their information, which changed the face of communication forever. Today, the Internet has become an essential resource, connecting millions of networks and massive data centers, government departments, and companies of all sizes. The Internet is a vast network, and hardware is able to know which direction to route a packet based on its IP address. The allocation of IP addresses is done by internet service providers and is described by protocols. These protocols are available online and can be found on the IETF website. The RFC index includes more than 8700 documents detailing the protocols that govern the functioning of the network. The Internet was first commercialized in the 1980s. It was then implemented in commercial products and services. By the mid-80s, dozens of vendors began incorporating TCP/IP into their products. These early vendors had little information about the technology or what their customers wanted. They saw TCP/IP as a “”prank add-on.”” With its widespread use and potential for growth, technology became an essential tool in everyday life. In the 1990s, the research community developed advanced networks, including Internet2 in the United States and JANET in the United Kingdom. With these new networks, interest in networking grew. More people needed to share data and access to computing resources, so the concept of global connectivity became a necessity. By the mid-1980s, there were dozens of vendors integrating TCP/IP into their products. In general, these vendors did not have much information about the technology and customer requirements and saw it as an unnecessary “”add-on”” despite its many benefits. The Internet has become an essential tool for modern life. It is expected to influence every aspect of human life. By 2030, researchers predict that there will be over 7.5 billion internet users and over 500 billion devices connected to the net. It is a system of interconnected devices that allows the transmission of data and media. The operating system of the network is based on a set of protocols. In addition to the software and protocols, the hardware also includes a computer and smartphone used to access the web. The internet is a global resource that connects millions of networks. It is a system that connects government departments and companies of all sizes. Each machine communicates with the other based on an IP address. These protocols are defined by different hardware. The computer or smartphone you use to access the internet and the cables that carry information are called hardware. Other types of hardware include routers, satellites, cell phone towers, and radios. The Internet is a network of networks. The computers connected to it are called LANs. LANs connect buildings that are physically in the same building. Each computer is assigned a specific IP address and has a unique MAC address. The IP addresses are assigned by the internet service provider. The protocols are written in RFCs and are widely available on the web. You can find these documents at the IETF website. The early days of the Internet were full of innovation. Aside from massive data centers and massive websites, the internet-connected millions of networks around the world. By the end of the century, there were already more than a billion IP addresses and nearly 213 billion people on the planet. The future of the Internet will depend on these developments. The next decade will see the evolution of internet technologies and the way they are used. While many technologies are hyped, others are proven to be solid advances. The internet has enabled many innovations. It has made it possible to access the knowledge of thousands of people through the internet. The development of the Internet has increased the speed of communication. While it has made it possible for people to exchange information quickly and cheaply, it has also paved the way for the widespread adoption of a multitude of applications. A computer is now the most common tool for communicating with the rest of the world. This means that the advancement of the Internet has opened up a world of possibilities.
https://macosxfreeware.com/the-evolution-of-internet-technology/
African Wesleyseminary.edu Get All ›› approach to sickness, disease and stress are often rooted in their cultural beliefs and values. 2 African American refers to a person of African ancestral origins who self identifies or is identified by others as African American. 3 African Americans are concerned about their health and receiving culturally competent is important to them. Website: https://www.wesleyseminary.edu/wp-content/uploads/2019/11/FINAL-CULTURAL-AWARENESS-OF-AFRICAN-AMERICANS-AND-HEALTH-PAGE.pdf 47 People Used See more... Health Ncbi.nlm.nih.gov Get All ›› In addition to exploring the influence of individuals’ ethnic culture, the health practices of African Americans also need to be also considered in the context of their mainstream culture (i.e., the most popularized or typical beliefs, norms, and practices—including health related trends surrounding food intake and physical activity—common within American culture). Website: https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5618057/ 59 People Used See more... African Webcourses.ucf.edu Get All ›› Religious beliefs Spirituality plays a significant role in “providing a framework for meaning and hope” in African American communities (Hendricks, Bore, & Waller, 2012, p. 2). African Americans’ strong spirituality also increases “the sense of life satisfaction” and … Website: https://webcourses.ucf.edu/eportfolios/30333/entries/243351/files/iFdJ8LA5kD7TFkYX3EhkkbfBp71gDYGBd7UybTGr Health Insurance 53 People Used See more... Africans Ncbi.nlm.nih.gov Get All ›› Instead, many Africans practiced Western and traditional African religions concurrently and as such utilised the services of both the traditional and Western health care systems (Nigosian, 1994). Before the Westernisation process, Africans had always believed in God and the ancestors and had been profoundly spiritual. Website: https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4651463/ 41 People Used See more... African Suna.org Get All ›› d i rect many African Americans asthey cope with illness and the endof life. In a review of the literatureon spiritual beliefs and practicesof African Americans, Johnson,E l b e rt -Avila, and Tulsky (2005)noted that “spiritual beliefs andpractices are a source of comfort,coping, and support, and are themost effective way to influencehealing; God is responsible forphysical and spiritual health,and the … Website: https://www.suna.org/sites/default/files/download/members/unjarticles/2009/09feb/49.pdf 58 People Used See more... African-American Psychologydictionary.org Get All ›› Cultural Norms in the African-American Population. Shiraev & Levy (2013) defines culture as, “A set of attitudes, behaviors, and symbols shared by a large group of people and usually communicated from one generation to the next” (p.3). I consider myself to be a part of the African-American culture, although I am biracial. Website: https://psychologydictionary.org/article/culture/ 48 People Used See more... Health Mopaonline.org Get All ›› Many African Americans have either areligious orientation or a viewpointgrounded in African American social andcultural history, which may emphasize aholistic approach to health and healthcare.24Religion is a source of enormousemotional support for AfricanAmericans, and religious observance orreligiosity can, in many regards, correlatewith improved health outcomes.25 Website: http://www.mopaonline.org/uploads/9/4/5/9/9459095/cultural_competence_and_the_african_american_experience_with_health_care_-__the_case_for_specific_content_in_cross-cultural_education.pdf 56 People Used See more... Self-rated Baylorisr.org Get All ›› assessed health.26 In a study of Protestant Christians, race was not a source of variation in physical activi-ty, body mass index or self-rated health.27 This is pertinent here, as African-American Protestants exceeded their white counterparts in religious atten-dance and self-rated religiousness, variables associ-ated with health in other studies. Website: http://www.baylorisr.org/wp-content/uploads/levin_african.pdf Health Insurance 51 People Used See more... Americans Equityhealthj.biomedcentral.com Get All ›› Racial and cross-cultural health disparities in the United States are well documented [1,2,3].Reports have identified gaps across a number of health indicators between the general population and particular cultural groups including African Americans, Native Americans and Latino/a Americans [3, 4].For example, African Americans and Native Americans have lower life expectancies and higher … Website: https://equityhealthj.biomedcentral.com/articles/10.1186/s12939-018-0744-x Experience Health 57 People Used See more... American Roswellpark.org Get All ›› African American Christians One God, eternally existing in three persons, Father, Son and Holy Spirit, three in one, co-equal, which is the Trinity. Lord Jesus Christ died for our sins. There are no religious restrictions on diet. There is a rich tradition of herbal remedies in African/ American culture. Family structure may be nuclear or extended. Website: https://www.roswellpark.org/sites/default/files/node-files/page/nid940-21946-caring-across-cultures-web.pdf Health Insurance 52 People Used See more... Asians In.gov Get All ›› • Integrates cultural beliefs into health care practices – Hot and Cold theory in Hispanic and Asians – Ancestor Worship in Asians – Jehovah’s Witness and blood products – Bereavement and pregnancy loss in all cultures – Vaginal bleeding in Jewish culture. Website: https://www.in.gov/isdh/files/RELIGION_AND_MEDICINE_ISDH_Final.pdf Health Insurance 37 People Used See more... African Residency-ncal.kaiserpermanente.org Get All ›› In 2000, the African American population’s median age was 30.2 years, 7 years younger than that of the White population and 4.7 years older than the Latino. The median age of African American women was 31.7, for men, 28.5. Because of the youth of the African American population, some demographers feel that African Americans may grow to be Website: http://residency-ncal.kaiserpermanente.org/wp-content/uploads/2018/12/African-American-Handbook.pdf 49 People Used See more... Beliefs Bmcoralhealth.biomedcentral.com Get All ›› The purpose of this study was to assess information available in the dental literature on oral health-related cultural beliefs. In the US, as elsewhere, many racial/ethnic minority groups shoulder a disproportionate burden of oral disease. Cultural beliefs, values and practices are often implicated as causes of oral health disparities, yet little is known about the breadth or adequacy of Website: https://bmcoralhealth.biomedcentral.com/articles/10.1186/1472-6831-8-26 Oral HealthcareHealth Insurance 52 People Used See more... Ideas Hilarispublisher.com Get All ›› Keywords: Health; Wealth; Social; Pain Introduction Good health and wholeness of being are phenomena of universal and perennial human interest. However, people of different cultures view these concepts differently. Culture, which is a system of ideas, an integrated pattern of beliefs and behavior and a shared way of life of a Website: https://www.hilarispublisher.com/open-access/the-concept-of-health-and-wholeness-in-traditional-african-religion-and-social-medicine-2151-6200-1000388.pdf Health Insurance 59 People Used See more... Health Rwjf.org Get All ›› Typology reflects diversity of values and beliefs toward health. The American Health Values Survey explores how adults in the United States think about health on a personal, community and societal level. The survey measures the importance of personal health, how individuals define health and how it manifests in everyday behaviors. Website: https://www.rwjf.org/en/library/research/2016/06/american-health-values-survey-topline-report.html Health Insurance 57 People Used See more... Hewins-Maroney Aetcnmc.org Get All ›› Although the use of traditional or folk remedies appears to be less common among younger African Americans, cultural beliefs related to those practices continue to affect African-Americans’ perceptions of health and healthcare-seeking behaviors.[Barnett 2003, Hewins-Maroney 2005] One critical feature is distrust of the healthcare system Website: https://www.aetcnmc.org/curricula/ethnopharmacology/mod4_2.html 18 People Used See more... African Kb.osu.edu Get All ›› Attitudes and Beliefs of African American Women on Contraception as Pregnancy Prevention / Kristen Conover. Purpose: To understand the knowledge, attitudes, and beliefs of young African American women, ages 19-24 regarding contraception as pregnancy prevention. Background: Many studies have reported decreased disparities in adverse birth Website: https://kb.osu.edu/handle/1811/32153 Mens HealthWomens Health 51 People Used See more... Within Pubmed.ncbi.nlm.nih.gov Get All ›› Objectives: To investigate the beliefs of caregivers and traditional healers within the South African Indian Muslim community regarding the etiology and treatment of stroke and the persons likely to be consulted in this regard. Design: A descriptive case study design was employed which incorporated two groups and was located within a qualitative paradigm. Website: https://pubmed.ncbi.nlm.nih.gov/16259475/ 55 People Used See more... Health Nami.org Get All ›› Negative attitudes and beliefs towards people who live with mental health conditions is pervasive within the U.S. and can be particularly strong within the Black community. One study showed that 63% of Black people believe that a mental health condition is a sign of personal weakness. Website: https://nami.org/Your-Journey/Identity-and-Cultural-Dimensions/Black-African-American Mens Health 60 People Used See more... Mandatory Elitecme.com Get All ›› Mandatory education on cultural competence should be a requirement for healthcare providers. If providers have a clearer understanding of African-Americans’ culture and integrate the beliefs into the treatment plan, the needs of this population can be … Website: https://www.elitecme.com/resource-center/nursing/cultural-beliefs-and-medication-adherence Cats Health 57 People Used See more... Health Sites.google.com Get All ›› There are many practices that can be done to improve the individual health of a person in any ethnic group. However, some diseases are more prevalent in certain ethnic groups, perhaps from genetics, cultural practices, diet, environmental causes, lack of healthcare, inadaquate care, and ignorance of health information and services. Website: https://sites.google.com/site/africanamericanhealthhistory/traditional-healthcare-practices Health Insurance 58 People Used See more... African Generations.asaging.org Get All ›› African American Elders, Cultural Traditions, and the Family Reunion. Family reunions are important rituals that have long contributed to the survival, health, and endurance of African American families, helping to maintain cultural heritage even in uncertain and turbulent times. Although there is variation in how African Americans hold family Website: https://generations.asaging.org/african-american-elders-traditions-family-reunion 49 People Used See more... Possession Classroom.synonym.com Get All ›› Africans captured and brought to America were able to hold on to some of the religious practices common to their native land. The musical rhythms, drumming, dancing and call-and-response method of preaching come from Africa, as do the beliefs in spirit possession, healing and magic rituals, which are still practiced in some African-American churches. Website: https://classroom.synonym.com/african-american-religions-religious-beliefs-12086310.html 58 People Used See more... Effective mental health care for African Americans requires understanding, empathy, and fluency in what it specifically means to live as an African American in America, which is why many African Americans prefer seeking care from African American practitioners (or, at the very least, those specifically educated in cultural competency). The most common of these diseases include Seborrheic dermatitis, Atopic dermatitis and Tinea Capitis. Seborrheic dermatitis is common in both African American adults and infants while Tinea Capitis and Atopic Dermatitis is common mostly in small children. Persistent social, economic, and political issues for many African-Americans include inadequate health-care access and delivery; institutional racism and discrimination in housing, education, policing, criminal justice and employment; and crime, poverty and substance abuse. Religious Beliefs. African Americans practice the three main monotheistic religions, as well as Eastern and African religions. The predominant faith is Christian, the second largest group of believers accept the ancestral religions of Africa—Vodun, Santeria, Myal—and a third group of followers practice Islam.
https://healthy-care.net/african-american-cultural-health-beliefs/
Cyber Week is a large international cybersecurity event, hosted each year at Tel Aviv University in Israel. Over the past eight years, Cyber Week has become internationally acclaimed as one of the top cybersecurity events in the world. In this interview with Help Net Security, Major Gen. (Ret.) Prof. Isaac Ben-Israel, Director of the ICRC – Blavatnik Interdisciplinary Cyber Research Center, talks about this unique gathering of cybersecurity experts, industry leaders, startups, investors, academics, diplomats, and government officials. What makes Cyber Week a unique event? How would you introduce the event to someone that hasn’t attended before? With over 8,000 attendees from over 80 countries, Cyber Week is one of the top international cybersecurity conferences in the world. There are 50 events taking place over 5 days around all things cybersecurity, with topics including AI, fintech, blockchain, IoT, policy, military defense and more. Cyber Week offers a unique opportunity to meet, connect and learn from cybersecurity experts from around the globe. Located in the ‘startup nation,’ we benefit from the ecosystem of the cyber capital of the world, Tel Aviv, which is at the forefront of technological innovations with applications across many fields and industries. Cyber Week attracts a diverse audience due to the fact that the conference’s high-level content covers a wide range of topics, from policy and national defense, to cutting-edge developments in cybersecurity. Cyber Week offers an unparalleled forum for discussion and endless possibilities for future collaboration across industry, academia, and government. How has the fast-paced threat landscape influenced the program of Cyber Week 2019? We are fortunate to partner with the Israel National Cyber Directorate (INCD). Like many countries today, Israel faces serious cybersecurity threats, and as those threats evolve, Israel is staying one step ahead by constantly seeking new technological solutions. Cyber Week provides a forum for knowledge sharing to benefit like-minded nations, and its programming reflects the newest ideas and innovations in the field. What would you single out as the most important topics for this year’s event? What keeps cybersecurity leaders awake at night? This year, we have decided to specifically highlight the intersection between AI and Cyber, since AI is becoming more and more important with regards to cybersecurity. We will also be hosting an additional conference this fall called AI Week, which will have a similar structure to Cyber Week, but with AI as the main focus. One major topic that is keeping cybersecurity leaders awake at night is the idea of AI versus AI – the sinister use of artificial intelligence technologies to attack other artificial intelligence platforms. Cybersecurity will remain a vital topic as threats develop concurrently with AI technology, and innovations in security will be necessary to protect AI technologies against threats from other AI technologies. The advent of the modern computer has been the most important technological development of the last 50 years, and as computing technology evolves, it has come to affect all areas of life as we know it. Cyber Week will continue to cover this essential topic at some of our 50 events during the conference. What is the long-term strategy for Cyber Week? How do you see the conference evolving in the future? I believe that Cyber Week will continue to be an important platform for knowledge sharing and collaboration across all borders – across all countries, across all industries, and across both the public and private sectors. Cybersecurity remains critical for its role in protecting citizens, government and business from threats to their security. The Blavatnik Interdisciplinary Cyber Research Center (ICRC) at Tel Aviv University is Cyber Week’s home, and was the catalyst for the cyber revolution in Israel. I was given responsibility by the Prime Minister to develop Israel’s cybersecurity capabilities, and the ICRC developed out of that initiative. Cyber Week started as a small, niche conference, but as the need for cybersecurity solutions has grown both in Israel and the world, so has Cyber Week. Cyber Week has been successful in keeping up with the never-ending technical evolution, and will therefore remain an imperative conference for years to come.
https://www.helpnetsecurity.com/2019/04/17/cyber-week-2019/
Last reviewed 21 April 2020 Protecting the digital assets of a business and the customer information that is now collected, is critical. Dave Howell assess how small businesses can protect their systems and their customers from attack. As larger companies have improved their cybersecurity systems, cybercriminals are increasingly switching their focus to smaller firms who may have lower levels of security across their businesses. According to the National Cyber Security Centre, SMEs have a one in two chance of experiencing a cyber breach. Senseon in their report into the state of SME cybersecurity succinctly advised: “SMEs cannot adopt the mindset that they are too small to matter, as to cybercriminals, or for the purposes of indiscriminate attacks, it simply isn't true. With the increase of attacks, SMEs have never had to work so hard to defend themselves.” According to research commissioned by OGL Computer, 81% of SMEs confirmed that they are increasingly worried about cyberattacks and their frequency. The report also highlights newer technologies such as 5G, robotics, AI and automation that UK-wide SMEs plan to adopt. Nationally, 5G is a firm favourite with SMEs, with 59% of surveyed SMEs planning on adopting this emerging technology, followed by robotics (55%) and automation (39%). Colin Dennis, Head of Technical Operations, OGL Computer, says: "Cybersecurity has been front of mind for SME customers for some time now, as awareness of cyber-risks continues to rise. Proactive management of IT requirements is in many ways connected to this trend, as businesses of all sizes look to compliance requirements as well as asset protection and disaster recovery." Increasingly, SMEs are looking to automate as much of their cybersecurity. The expansion of AI and its capabilities are bringing new tools onto the marketplace, SMEs can deploy. However, all small enterprises should first look at their staff and increase education and awareness of the cyberthreats they face. Deloitte cyber risk partner, Peter Gooch, says: “2020 will see more deployment of security automation tools. Where this is done well, it will allow organisations to adapt rapidly to changing attack tactics. Where it is done poorly, it will be more complicated to unpick.” Good cybersecurity hygiene is often the most effective method of preventing damaging attacks from taking place. Simple steps such as using strong passwords and being aware of unexpected email attachments can have a significant influence on reducing the instances of cyberattacks your business could face. When it comes to the security approaches that will mitigate the risks which dominate in 2020, David Boda, Head of Information Security, Camelot Group, believes ‘back to basics’ is best. “A focus on robust and timely access control and patching will still give the biggest reduction in risk for the majority of organisations across all sectors. These are the two areas that vendors, consultants and end-user organisations should all be talking about." Threat perimeter The first step businesses should take to develop strong security is to understand the whole threat landscape your company could be exposed to. Your business could be hit by indiscriminate attacks such as the 2017 ransomware attack WannaCry. Other risks including phishing, malware, trojan horses and virus attacks and, the often-overlooked insider attackers perpetrated by employees. Performing a vulnerability assessment of your business's systems is critical. This will identify areas across your enterprise that require stronger security to be developed. Business in the Community has a handy tool [https://www.wouldyoubeready.org.uk/] you can use to assess your company’s readiness. Stephen Ridley, cyber underwriting manager at Hiscox, spoke with Croner-i: Small Business Essentials beginning with his response to a question about the general cybersecurity challenges SMEs are currently facing. “The biggest challenge is the risk is constantly shifting, and SMEs are less likely to have an individual with specific responsibility for monitoring and responding to this risk, nor the budget headspace to implement every mitigation measure possible,” Ridley said. “Knowing what steps to take to reduce the risk most cost-effectively is really difficult when there is so much noise in this space.” With limited resources how can small businesses protect themselves from cyberattacks? “Focus on the basics, and the things that are most relevant. Most mass-market cyberattacks are from criminal gangs who are looking for the low hanging fruit; some simple (and often inexpensive, or even free!) steps can deter the vast majority of these attacks. Look at measures such as: The Government’s Cyber Essentials accreditation. Training employees on cyber risk – human error plays a part in roughly two-thirds of incidents that we handle. Implementing multi-factor authentication for online accounts (especially Office365, GSuite or equivalent) – this will prevent most instances of Business Email Compromise that we see, which is our most frequent cause of claim. Regularly backing up key systems and having these backups disconnected from the main network. This significantly mitigates the impact of ransomware claims, which is our second most frequent cause of claim. Is it a mistake to think that having several cybersecurity tools in use will fully protect a business from attacks? “Absolutely. Much the same as any area of risk, there are things that you can do to reduce the chances of something going wrong, or minimise the impact if it does, but there is no such thing as being totally secure. If we think about it in the physical sense, you can put the strongest locks on a building's doors, install a burglar alarm and put shutters on the windows – all of which will act as a deterrent, reducing the risk of burglary and possibly shorten the response time if one does occur. Still, it doesn't completely remove the threat. “Exactly the same principles apply to cybersecurity – the steps above will reduce, but not eradicate the risk; that is where insurance fits in as a risk transfer mechanism to offer businesses balance sheet protection against those incidents that do still happen. “Cyber also has the added dynamic that the risk is constantly shifting, and systems and processes that are secure (or at least thought to be) one month may not be the next, as new vulnerabilities are discovered, or as criminals develop new attack techniques.” Why are people still often the weakest component of a security policy? “In a world where everything moves at such a fast pace, making mistakes is incredibly easy. Add to that the fact that criminals are getting increasingly sophisticated in how they target people, and it’s a really tough challenge for businesses. In the past, phishing emails were pretty easy to spot with a bit of reasonably basic knowledge. “We are now in a situation where these emails can be crafted to look near identical to the brands that they are trying to masquerade as. You often have to really interrogate the content of the emails to spot whether they are genuine or not.” What future cybersecurity challenges will small businesses have to defend against? “The main challenges will be the increasing number of network-connected devices that businesses have – particularly Internet of Things devices – as well as the continued proliferation of attacks as more and more of the criminal fraternity look to exploit the internet, and the added connectivity that 5G mobile networking brings.” Protecting assets What has become crystal clear over the last few years is that cybersecurity must be an integrated response to several threats. Too often, security systems will be installed that look for just one type of cyberattack – antivirus applications, for example. Today businesses have a wide threat perimeter to defend. Says Greg Day, VP & CSO, EMEA at Palo Alto Networks: “We are moving towards an ever more interconnected world. Today, many organisations have supply chains, and they are starting to get used to shared security models as they move to the cloud. With 5G and the growth of IoT, that mesh of interconnectivity will only grow as will the complexity of who's involved in a digital process. Shared security models will become shared security ecosystems.” With Senseon also advising: “SMEs should look towards solutions that go beyond pure anomaly detection to avoid being inundated with false-positive alerts that waste precious time and resource. Instead, seeking revolutionary approaches that can think like a human analyst by observing threats from multiple perspectives, pausing for thought and learning from experience to carry out automated investigations, will ensure that SMEs have the best chance of defending themselves from present and future cyberattacks. “Adopting AI solutions is a step in the right direction. Our research indicates 81% of SMEs believe that AI is fundamental to the future of cybersecurity. The question is not so much about the desire to implement AI, but rather how SMEs, both new and established, can create a comprehensive business case for taking advantage of the technology and getting the most from its benefits.” As cybersecurity threats evolve, so should your businesses defences. Automated systems will continue to develop and offer smaller enterprises, in particular, cost-effective services. Security, though, starts at home. Having a security-aware workforce is one of the most effective ways to prevent cybersecurity attacks occurring. And when incidents do take place, a detailed reaction policy will ensure any damage is kept to a minimum.
https://app.croneri.co.uk/feature-articles/cybersecurity?topic=4406
‘I am famous for doors that are difficult to open, light switches that make no sense, shower controls that are unfathomable’ (page vii). The author introduces his book with this statement, a reflection of his reputation in the field of equipment design. He says ‘far too many items in the world are designed, constructed, and foisted on us with no understanding -or even care- for how we will use them’. The book shows how design strongly influences function, and stresses the hazards of poorly designed equipment. The author employs his knowledge of cognitive science to demonstrate how badly conceived equipment result in misuse, errors and learned helplessness (page 42). The author says ‘…most accidents are attributed to human error, but in almost all cases the human error was the direct result of poor design’ (page viii). The book initially describes the components of good design. The basic element is what he calls natural design. The object itself should send out natural signals which are then naturally interpreted (page 4). A good equipment therefore ‘…requires no diagrams, no labels, and no instructions’ (page 78). A key feature of natural design is the equipment’s affordance; the appearance of a device should provide the ‘critical clues required for its proper operation’ (page x); in other words ‘the device must explain itself‘ (page xi). He says ‘when instructions have to be pasted on something…it is badly designed’ (page xii). Similarly, ‘…when simple things need pictures, labels, or instructions, the design has failed’ (page 9). Another core feature of good design the author explores is the constraint (page 62). This means the design should minimise how much knowledge is required to operate the equipment. The visibility of the equipment is another important characteristic of well-designed equipment; ‘…the correct parts must be visible, and they must convey the correct message’ (page 4). The book explores these features in detail in chapter 4. Why are some equipment poorly designed in the first place? The main reason suggested by the book is that designers often consider aesthetics over usability (page 151). The end-user is often not sufficiently considered, and is rarely involved in the design or purchase of the equipment (page 78). Designers also frequently fall into the trap of creeping featurism, the tendency to keep on adding features to a single equipment (page 172). How can the problem of poor design be redressed? The author devotes a substantial part of the book to this question. The primary solution he offers is to consider the end-user when designing any equipment. He says that ‘…the needs and requirements of people ought to be driving much of the work throughout the entire process’ (page xiv). This will result in user-friendly equipment. Another consideration, stressed throughout the book, is to design for safety. To do this, the author says designers should learn about the causes of error, and aim to minimise mistakes, or make them easily detectable and reversible (page 131). He discusses the different types of human error (slips and mistakes), and how to avert them. He also lists the seven action stages of design which should be considered (page 52). The last chapter gives a helpful guide to user-centered design. The author discussing good design OPINION There is nothing like an expert writing about his specialism and making it accessible to those not actively involved in the field. The author applies his knowledge of cognitive psychology to good effect, deftly explaining the principles of design and, importantly, linking these to safety. His conversational style makes this a very enjoyable read. The principles the book elaborates are universal and timeless. There are a few technical issues which the reader may skip without affecting their understanding of the book.Many of the examples the author uses are everyday things, but the lessons apply to all equipment. The cover is well-designed and thought out. OVERALL ASSESSMENT Doctors need to know the dangers of badly designed equipment, and the solutions to these risks. This book excellently addresses these issues and I strongly recommend it.
https://thedoctorsbookshelf.com/2015/08/14/the-design-of-everyday-things/
The NASA Glenn Research Center has developed a series of interactive computer programs that are aimed at educating students in the fields of mathematics, physics and aerospace. All of the programs are Java applets which run in a browser, on-line, over the World Wide Web. They can also be downloaded to your computer so that you can use them without being on-line. FoilSim II computes the theoretical lift of a variety of airfoil shapes. The user can control the shape, size, and inclination of the airfoil and the atmospheric conditions in which the airfoil is flying. The program includes a stall model for the airfoil, a model of the Martian atmosphere, and the ability to specify a variety of fluids for lift comparisons. The program has graphical and numerical output, including an interactive probe which you can use to investigate the details of flow around an airfoil. Using the CurveBall applet, students learn more about aerodynamics by controlling the conditions of a big league baseball pitch. You can vary the speed of the pitch, the spin on the ball, the release point, and the location of the stadium which affects the atmospheric conditions and the amount of curve on the ball. The program will compute balls and strikes and tells you how far your pitch passes the centre of the plate. For its part, EngineSim is a simulator that models the design and testing of jet engines. The program works in two modes: Design Mode or Tunnel Test Mode. In the Design Mode, you can change design variables including the flight conditions, the engine size, the inlet performance, the turbo machinery compressor and turbine performance, the combustors or burner performance, or the nozzle performance. For a turbofan engine design you can also vary the fan performance and the bypass ratio. When you have a design that you like, you can switch to the Tunnel Test Mode which simulates the testing of a jet engine on a test stand. You can then vary the test altitude, flight speed and throttle setting. Several existing engines are also modelled in EngineSim. Next up, there is the Rangegame program that presents a variety of multiple choice maths and physics problems involving aircraft performance. Students can choose from several different types of aircraft and must answer questions about the range, fuel usage, acceleration, velocity and location of the aircraft during take-off. RangeGames can record your answers for teacher evaluation, or you can just play for fun! For its part, the RocketModeler program lets you design and study the flight of a model rocket. You can vary the size of the rocket, the number of fins, and the materials used to construct the rocket. You can choose from a variety of available model rocket engines and test fly your rocket on the computer. The program computes the stability of your design and the flight trajectory. Output includes the maximum altitude which the rocket achieves. You can then compare the computed and actual performance of your model rocket. But if you would rather fly a kite, then why not try KiteModeler. You can select from five different types of kites and then vary the length, width and types of materials used to construct the kite. You then trim the kite by setting the length of the bridle and tail and the position of the knot attaching the control line to the bridle. Finally, you test fly your kite on the computer by setting the wind speed and the length of control line. The program computes the aerodynamic forces, weight, and stability of your design and the shape of the control line as it sags under its own weight. Output includes the maximum altitude which the kite achieves. You can then compare the computed and actual performance of your kite design. The Atmosphere Applet, on the other hand, lets you study how pressure, temperature, and density change through the atmosphere. You can study the atmosphere of the Earth or of Mars. Since speed of sound depends on the atmospheric gas and the temperature, you can also output the local speed of sound and the Mach number for a selected aircraft velocity. You can either input a selected altitude, or change altitude using an aircraft slider. While the GasLab Program is a group of computer animations which were designed to help high school chemistry students learn about the basics of the gas laws and the equation of state. The state of a gas is determined by the pressure, temperature, mass, and volume of the gas. The program lets you fix two of these variables and observe the relation of the other two variables by changing the value of one of them. The last group of Undergraduate Programs aim to help engineering students learn about the basics of high speed aerodynamics and engine operation. The programs solve for the flows across shock waves and expansion fans, the flow through crossed and reflected shocks, and the properties in regions of isentropic flow. There is also a special version of EngineSim for undergraduates.
https://www.theengineer.co.uk/free-software-makes-learning-fun/
Scientists have pointed radio telescopes towards ‘Oumuamua, and have failed to find any alien signals emitting from the mysterious object. However, experts warn that these results still do not rule out the interstellar object is an alien probe. Scientists working at the SETI Institute have tried answering the controversial claim made by Harvard researchers who suggest the object could be of an alien design, using the Allen Telescope Array (ATA). They wanted to observe ‘Oumuamua when it was about 170 million miles away, or slightly less than the diameter of Earth’s orbit. If artificial radio transmissions were picked up scientists would have found ‘strong evidence’ that the mysterious interstellar object is not simply an asteroid speeding across the solar system because of a random gravitational slingshot. Gerry Harp, lead author of a paper to be published in the February 2019 issue of Acta Astronautica explained that “We were looking for a signal that would prove that this object incorporates some technology – that it was of artificial origin.” However, nothing was picked up when experts pointed the radio telescopes towards ‘Oumuamua. “We didn’t find any such emissions, despite a quite sensitive search. While our observations don’t conclusively rule out a non-natural origin for ‘Oumuamua, they constitute important data in accessing its likely makeup.” Observations made between November 23 and December 5, 2017, with the helo of the wide-band correlator of the ATA at frequencies between 1 and 10 GHz and with a frequency resolution of 100 kHz discovered nothing out of the ordinary. As explained by Phys.org, “No signals were found at a level that would be produced by an omnidirectional transmitter on-board the object of power 30 – 300 milliwatts. In portions of the radio spectrum that are routinely cluttered by artificial satellite telemetry, the threshold for detection was as high as 10 watts.” “In all cases, these limits to the powers that could be detected are quite modest – comparable to that of cell phones or citizen band radios.” But that doesn’t mean we can rule out its artificial origin just yet, say experts. After the enigmatic object was discovered for the first time in 2017, it has been the subject of controversies as a number of scientists have proposed that the object–first thought to be a comet–is, in fact, an alien space probe, sent by a distant extraterrestrial civilization to study life in our solar system. There are a couple of things that make the asteroid stand out from anything else we’ve encountered so far. First of all, it’s extremely elongated. Secondly, it has no come, when observed, which according to some strengthened the theories that the object isn’t neither an asteroid nor a comet. While no signals were found coming from Oumuamua, the types of observations reported by SETI Institute scientists may have utility in constraining the nature of any interstellar objects detected in the future, or even the small, well-known objects in our own Solar System. It has been long-hypothesized that some of the latter could be interstellar probes, and radio observations offer a way to address this imaginative, but by no means impossible, idea.
https://curiosmos.com/radio-telescopes-study-oumuamua-fail-to-find-alien-signals/
Enter your mobile number or email address below and we'll send you a link to download the free Kindle Reading App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required. There is considerable debate amongst philosophers as to the basic philosophical problem Wittgenstein is attempting to solve in Philosophical Investigations. In this bold and original work, Meredith Williams argues that it is the problem of "normative similarity". In Blind Obedience Williams demonstrates how Wittgenstein criticizes traditional, representationalist theories of language by employing the ‘master/novice’ distinction of the learner, arguing that this distinction is often overlooked but fundamental to understanding philosophical problems about mind and language. The book not only provides revealing discussions of Wittgenstein’s corpus but also intricate analyses of the work of Brandom, Dummett, Frege, Sellars, Davidson, Cavell and others. These are usefully compared in a bid to better situate Wittgenstein’s non-intellectualist, non-theoretical approach and to highlight is unique features. "A Republic No More: Big Government and the Rise of American Political Corruption" Various interest groups encamped in the District of Columbia mean we now have a special interest democracy. Find out more
It’s not unusual for a family that is doing research on schools and school districts to request meetings or tours with building administrators. During these tours, a principal may mention that the school utilizes such educational philosophies as professional learning communities, differentiated instruction, response to intervention, or data-driven instruction. These terms sound impressive, but what do they really mean? Accountability and data analysis Accountability is as much a part of education as spring break and faculty meetings. It’s hard to imagine an educational environment that doesn’t have multiple layers of accountability intertwined into the school routine. - Educators have had to learn how to work with student data, which has led to greater use of classroom assessments, data team meetings, and other methods of dissecting all the information that teachers gather throughout the year. - Administrators have spent countless hours on professional development educating their staff on proper methods for analyzing data and using that information to influence regular lesson planning. - Reports are gathered for parent/teacher conferences in an effort to keep parents in the educational loop. The end result is a greater understanding of a child’s progress for teachers, principals, specialists, and parents. However, throughout this entire process of breaking down information and sharing it with others, the most important person is missing … the student. The assessment cycle Educators who have spent any time aligning curriculum and assessments to student learning understand that there is an assessment cycle involved with any new learning objective. It begins with developing goals, objectives, and outcomes. Richard DuFour, one of the creators of the Professional Learning Community process, recognizes this first step of the cycle when he has teacher teams asking the question “What do we want our students to learn?” Once the objectives have been identified, an assessment method needs to be determined and developed. This can be a time-consuming process initially. Creating an assessment that is thorough and can provide worthwhile information is crucial to student learning. Once a strong assessment has been created and administered, a teacher needs to review the results. The final step is to share this information with others. This final step is often ignored, skipped, or marginalized. Learning environments that truly embrace concepts such as professional learning communities understand the value of the assessment cycle. Educators work very hard to create valuable assessment tools based on carefully planned objectives and waste no time reviewing the data that is reaped from all the work they’ve sown. Why assessment results aren’t shared So why overlook sharing the information? Perhaps the issue is pride, a desire not to boast if the results are promising or a fear of looking like a lesser teacher if the results are disastrous. It could be a lack of understand regarding why sharing is even of importance in the process. However, in classrooms where there is too much curriculum to cram into one school year, the issue could simply be a lack of time. Teachers sense the urgency to move forward rather than waste time reflecting on what has taken place. Unfortunately, this mindset is not what’s best for students. Fortunately, progressive administrators are creating opportunities for educational teams to meet and share data in a non-threatening environment. This allows for teachers to gain the perspective and advice of colleagues. This type of collaboration can be an invaluable tool to the learning culture of any classroom. However, even with this type of sharing taking place, the student is still left out of the loop. Why student involvement matters Student involvement is the central shift needed in our traditional view of assessment’s role in teaching and learning, according to educational researchers at the Pearson Assessment Training Institute. Regardless of the quality of teacher or the level of parent involvement, students will decide whether they are capable or willing to learn the material. Students who are uninformed about their own progress will never gain ownership over their own achievement. Giving up power in exchange for learning This may require a paradigm shift for educators who enjoy exhibiting larger amounts of control when it comes to assessment and feedback. Taking a step back and looking at learning through a student’s perspective is the first step toward change. Educational author Thomas Guskey offers simple suggestions such as removing the mystery behind tests and quizzes. If the goal is for a student to be successful on an assessment and prove they know the material, why make the objectives a secret to them? Classroom assessments that serve as a meaningful source of information don’t surprise students, Guskey states. By making everyone aware of what will be assessed, students learn that this cycle is intended to benefit them rather than entrap them. A variety of options exists within the assessment cycle that can influence student motivation and learning. The old habit by teachers of grading a test and handing it back with no opportunity for feedback or intervention is extinct. This practice does not enhance learning, and it drives those students who are truly at risk further from the goal of achieving mastery. When a teacher involves a student in conversations related to his or her own achievement, that teacher is setting the student up to become an independent learner who is intrinsically motivated. In a world where career and college readiness is such an important part of the learning process, there can be no greater tool given to a student than the sense of ownership for their own accomplishments. It all begins by completing the assessment cycle and making students part of the process. Dr. Jason Perez is the head principal at Heritage Trails Elementary in Moore, Oklahoma, as well as a faculty member at Concordia University – Portland, where he teaches Master of Education in Curriculum and Instruction courses, and an adjunct faculty member at the University of Central Oklahoma, where he teaches Master of Education Administration courses.Learn More: Click to view related resources. - Richard DuFour, Rebecca Dufour, Robert Eaker, "Revisiting Professional Learning Communities at Work," Solution Tree Inc. - Jan Chappuis, Rick J. Stiggins, Steve Chappuis, and Judith A. Arter, "Classroom Assessment for Student Learning: Doing it Right – Using it Well," Pearson Assessment Training Institute - Thomas R. Guskey, "How Classroom Assessments Improve Learning," ASCD - Joe Levy, "Reporting and Sharing Assessment Results"
http://www.hotchalkeducationnetwork.com/student-feedback-missing-link/
you should melt the snow and drink it because the phase change from solid to liquid -- melting -- consumes a great deal of heat. By melting the water before drinking it, you are greatly reducing the heat loss your body will suffer. what is vaporizing the change from a liquid to a gas name two types of vaporization. evaporation and boiling how is evaporation and boiling similar in both, a liquid becomes a gas how is evaporation and boiling different Evaporation occurs on the SURFACE of liquid and it is a vaporization of liquid. It is a SLOW process; Boiling occurs on the ENTIRE MASS of liquid and it is the vaporization of liquid. It occurs RAPIDLY Why does the evaporation of sweat cools your body on a warm day As the molecules of water change into a gas, they can float away from the body. When sweat evaporates and becomes a gas it takes a small amount of heat with it when it floats away from your body taking small amount of heat with it. What process occurs as pieces of dry ice gradually get smaller Sublimation (solid to a gas without going through the liquid phase) What is the fog you see in the air around the dry ice in figure 13? Why does the fog form 1. Water vapor; 2. the water vapor in the air is cooled and condenses when dry ice sublimes what is the general characteristics of solid it has a definite shape and definite volume how do crystalline solids differ from amorphous solids crystalline solid particle form a regular repeating pattern and melt at a distance temperature a glass blower can bend and shape a piece of glass that has been heated. Is glass a crystalline or an amorphous solid? explain it would be a amorphous solid because the glass does not have a different melting point (When glass is heated to a certain point it becomes easy to shape. It can be bent and shaped into many ways) How may liquids be describe in terms of shape and volume liquids do not have a definite shape but do have a definite volume how do the positions and movements of a particles in a liquid help to explain the shape and volume of the liquid particles in a liquid move freely around one another Explain why a sewing needle can float on the surface of water in a glass SURFACE TENSION. The needle is so thin that the force holding the water surface in place exceed the gravitational force on the needle What determined the shape and volume of a gas inside a container The shape and volume of a gas are the same as the shape and volume of the container. (The shape of the gas is determined by the shape of the container; The volume of the gas is determined by the volume of the container ) use what you know about the particles in a gas to explain why a gas has no definite shape and no definite volume gas does not have a definite shape or volume YOU MIGHT ALSO LIKE... 5 Chemistry - TEAS Science | PreNursingSma… PrenursingSmarterPro $8.99 KIRK chapter 3 Physical science quiz (9-4-15) 46 terms ONLY4MYSTUDENTS TEACHER mohler chapter 3 study guide 43 terms lolitsval 2.1, 2.2, 2.3 States of Matter, Changes of State,… 55 terms eatonfamily OTHER SETS BY THIS CREATOR World history vocab 92 terms johnsonk7270 Chapter 6: The south and West Transformed 10 terms johnsonk7270 Vocab 2 10 terms johnsonk7270 science 1 vocab 18 terms johnsonk7270 THIS SET IS OFTEN IN FOLDERS WITH...
https://quizlet.com/59187732/science-flash-cards/
Ruchika was born in December 2019 with a cyst that occurs only in two or three cases in one lakh live births A paediatric surgical team in Pune has successfully performed a complex, life-saving surgery on a day-old baby who was detected with a rare cyst in her lungs while still in her mother’s womb. A team of paediatric surgeons at Motherhood Hospital in Kharadi operated upon baby Ruchika (name changed) in December last year after the child was born with a congenital defect wherein a fluid-filled cyst had been formed in her lung cavity. According to hospital authorities, this kind of cyst occurs only in two or three cases in 1,00,000 live births. “The baby girl, Ruchika, weighing 2.5 kg was successfully delivered on December 13, 2019. The child was immediately moved to the hospital’s neonatal intensive care unit as she was encountering difficulty in breathing and had to be given continuous positive airway pressure therapy to help her breathe,” said Dr. Tushar Parikh, chief neonatologist at Motherhood Hospital. Once the baby was stabilised, a lung lobectomy was performed on the second day of birth by paediatric surgeons Dr. Pranav Jadhav and Dr. Kalpesh Patil. “The baby was discharged earlier this month and was in good health,” said Dr. Parikh. Posing risk to heart “The cyst in the left side of the lung was hampering the baby’s heart function by compressing it, and may have caused heart failure. The doctors helped the baby breathe freely by initially removing fluid from the cyst that was present in her left lung by an aspiration process and later by performing a lung lobectomy [surgery to remove one of the lobes of the lung] immediately after the first day of her birth,” said Dr. Rajeshwari Pawar, gynaecologist-obstetrician, Motherhood Hospital. Dr. Pawar said the foetus was diagnosed to have a type 1 congenital cystic adenomatoid malformation (CCAM), which is a developmental defect involving a benign lung lesion that appears before birth as a cyst or mass in the chest. She said, “The cyst is also known as congenital pulmonary airway malformation. The macro cyst present on the left side of the baby’s lung affected the lung tissue, pressed the heart vessels and shifted the heart from its normal position, thereby occupying a lot of space in the chest. This type of CCAM occurs only in say two or three cases in 1,00,000 live births. If left untreated, it would have compromised on the growth of the child’s lung.” Explaining the complexity of the operation, she said a decision was taken to aspirate the fluid from the cyst using a fine needle by means of a sonographic guided procedure which involved anaesthetising the foetus. “It was a delicate procedure which posed high risk to the life of the baby. However, the procedure was successful and substantial fluid from the cyst was removed. But the cyst recurred and the mother had to be continuously monitored every week by doctors,” said Dr. Pawar. ‘Stayed strong’ Thanking the doctors at Motherhood Hospital for performing the delicate surgery, Shalini (name changed), the baby’s mother, said: “When we came to know about the cyst that was present in the foetus, we were stunned. But we didn’t panic, and stayed strong as it wasn’t advisable for me to be under stress during my pregnancy. After getting discharged, we also went for follow-ups, and the baby is fine now.” Comments that are abusive, personal, incendiary or irrelevant cannot be published. Please write complete sentences. Do not type comments in all capital letters, or in all lower case letters, or using abbreviated text. (example: u cannot substitute for you, d is not 'the', n is not 'and'). We may remove hyperlinks within comments. Please use a genuine email ID and provide your name, to avoid rejection.
Mise-en-scène [meez-awn-sen] (‘placing on stage’) is an expression used to describe the design aspects of a theater or film production, which essentially means ‘visual theme’ or ‘telling a story’—both in visually artful ways through storyboarding, cinematography, and stage design, and in poetically artful ways through direction. Mise-en-scène has been called film criticism’s ‘grand undefined term.’ When applied to the cinema, mise-en-scène refers to everything that appears before the camera and its arrangement—composition, sets, props, actors, costumes, and lighting. Mise-en-scène also includes the positioning and movement of actors on the set (‘blocking’). These are all the areas overseen by the director, and thus, in French film credits, the director’s title is ‘metteur en scène’ (‘placer on scene’). This narrow definition of mise-en-scène is not shared by all critics. For some, it refers to all elements of visual style—that is, both elements on the set and aspects of the camera. For others, such as film critic Andrew Sarris, it takes on mystical meanings related to the emotional tone of a film: ‘Dare I come out and say what I think it to be is an ‘elan of the soul’?… as it is all I can do is point at the specific beauties of interior meaning on the screen and later catalog the moments of recognition.’ The term is sometimes used to represent a style of conveying the information of a scene primarily through a single shot—often accompanied by camera movement. Two academic papers, Brian Henderson’s Essay on the ‘Long Take’ (1976) and Lutz Bacher’s MA thesis entitled ‘The Mobile Mise-en-Scène’ (1976), discuss the use of mise-en-scène in long shots and shots that encompass a whole scene. Neither conflates its meaning with how the term was originally applied to film in the ‘Cahiers de Cinéma’ (an influential French film magazine), which was expressed in 1960 by critic Fereydoun Hoveyda as follows: ‘What matters in a film is the desire for order, composition, harmony, the placing of actors and objects, the movements within the frame, the capturing of a moment or look… Mise en scene is nothing other than the technique invented by each director to express the idea and establish the specific quality of his work.’ This recent and limiting redefinition of the term makes it synonymous with a ‘oner’ or a single shot that encompasses an entire scene. This use of the term displays some ignorance of both the traditional use of the term in French theater and film and its actual translated meaning. In German filmmaking in the 1910s and 1920s, one can observe tone, meaning, and narrative information conveyed through mise-en-scène. Perhaps the most famous example of this is ‘The Cabinet of Dr. Caligari’ (1919) where a character’s internal state of mind is represented through set design and blocking. The similar-sounding, but unrelated term, ‘metteurs en scène’ (figuratively, ‘stagers’) was used by the auteur theory (the presumption that the director, not the writer, is most responsible for the finished product in filmmaking) as a disparaging label for directors who did not put their personal vision into their films. Because of its relationship to shot blocking, mise-en-scène is also a term sometimes used among professional screenwriters to indicate descriptive (action) paragraphs between the dialog. Only rarely is mise-en-scène critique used in other art forms, but it has been used effectively to analyze photography. An important element of ‘putting in the scene’ is set design—the setting of a scene and the objects (props) they’re in. Set design can be used to amplify character emotion or the dominant mood of a film, or to establish aspects of the character. The intensity, direction, and quality of lighting have a profound effect on the way an image is perceived. Light (and shade) can emphasize texture, shape, distance, mood, time of day or night, season, glamour it affects the way colors are rendered, both in terms of hue and depth, and can focus attention on particular elements of the composition. The representation of space affects the reading of a film. Depth, proximity, size and proportions of the places and objects in a film can be manipulated through camera placement and lenses, lighting, set design, effectively determining mood or relationships between elements in the story world. Using certain colors or designs, costumes in narrative cinema are used to signify characters or to make clear distinctions between characters. Makeup and hair styles establish time period, reveal character traits and signal changes in character. There is enormous historical and cultural variation in performance styles in the cinema. Early melodramatic styles, clearly indebted to the 19th century theater, gave way in Western cinema to a relatively naturalistic style. Directors also make filmstock choices such as black & white or color, fine-grain or grainy, and the aspect ratio. The relation of the width of the rectangular image to its height. Each aspect ratio yields a different way of looking at the world and is basic to the expressive meaning of the film.
https://thedailyomnivore.net/2012/11/19/mise-en-scene/
When a mom is diagnosed with cancer, is undergoing treatment, or is facing end of life, she is experiencing a roller coaster of emotions. These may include sadness, depression, fear, anger, confusion, anxiety, impatience and denial. She may have many physical symptoms related to her emotional state such as lack of appetite, fatigue or exhaustion. Her ability to focus or concentrate may be greatly affected. Cancer may affect her social relationships too. Some women withdrawal from their friends and some friends and family withdrawal based on their own ability to cope. This can be extremely isolating. Cancer can affect relationships with partners, especially when surgeries impact body image and self-confidence. Many relationships do not survive and this increases social isolation and depression. Cancer also impacts a mom’s ability to work, pay bills and maintain their lifestyle. They also cannot afford childcare, which affects their ability to attend medical appointments, rest and recover. Losing their income can exacerbate their feelings of sadness and self-worth.
https://nannytraining.com/topic/impact-of-cancer-on-the-mom/