content
stringlengths
0
1.88M
url
stringlengths
0
5.28k
For decades, many dietary recommendations have revolved around consuming a low percentage of your daily calories from fat. It has been widely thought that doing so would reduce your chance of having coronary heart disease. Most of the evidence for that recommendation has come from epidemiologic studies, which can be flawed. But last week, the government started to address that problem, proposing new guidelines that in some cases are more in line with evidence from randomized controlled trials, a more rigorous form of scientific research. Just recently, a study was published in the journal Open Heart in which researchers performed a systematic review and meta-analysis of the randomized controlled trials that were available when those guidelines were announced. They wanted to explore what evidence those creating the guidelines might have been able to consider at the time. The study did show that cholesterol levels went down more in the groups that ate low-fat diets. Some have used this as justification for a low-fat diet. But the difference between them was small. And these groups didn’t have different clinical outcomes, and that’s what we really care about. Small changes in cholesterol levels from dietary changes also aren’t surprising to those who follow the research. About 70 percent of people are thought to be “hyporesponders” to dietary cholesterol. This means that after consuming three eggs a day for 30 days, they would see no increase in their plasma cholesterol ratios. Their cholesterol levels have almost no relationship to what they eat. In 2013, researchers published a systematic review of all studies from 2003 or after. In most studies, all people didn’t respond. In the rest, only a minority of patients responded to changes in dietary cholesterol. A government committee urged repeal of the guideline that Americans limit their cholesterol intake to 300 milligrams a day, saying, “Cholesterol is not a nutrient of concern for overconsumption. Then there is the issue of salt. A systematic review of randomized controlled trials of salt intake was published last year. Eight trials involving more than 7,200 participants looked at whether advising patients to cut down on salt, or reducing sodium intake, affected outcomes. None of the trials, including ones involving people with both normal and high blood pressure, showed a reduction in all-cause mortality. Since pretty much all calories come from fat, protein or carbohydrates, reducing your consumption of one means that you have to increase your consumption of another. So, as the guidelines have recommended cutting down on meat, especially red meat, this meant that many people began to increase their consumption of carbohydrates. Many now believe that excessive carbohydrate consumption may be contributing to the obesity and diabetes epidemics. A Cochrane Review of all randomized controlled trials of reduced or modified dietary fat interventions found that replacing fat with carbohydrates does not protect even against cardiovascular problems, let alone death. Read about this in the New York Times on February 23, 2015 in an article written by Dr. Aaron Carroll. Aaron E. Carroll is a professor of pediatrics at Indiana University School of Medicine. He blogs on health research and policy at The Incidental Economist, and you can follow him on Twitter at @aaronecarroll. William Wombacher, your Central Illinois Certified Elder Law Attorney (CELA) and Social Security Disability Specialist. I’ll help you! http://www.wombacherlaw.com Serving Peoria, East Peoria, Peoria Heights, Pekin, Dunlap, Chillicothe, Morton, Washington, Metamora, Canton, Galesburg, Lacon, Henry, Bloomington, Normal and surrounding cites and counties of Peoria, Tazewell, Woodford, Fulton and Knox Counties in Central Illinois.
https://www.wombacherlaw.com/blog/2015/03/new-dietary-guidelines-better-science-low-fat-low-salt-diets-dont-prove-up/
BACKGROUND SUMMARY DETAILED DESCRIPTION CONCLUSION Unless otherwise indicated herein, the materials described in this section are not prior art to the claims in this application and are not admitted to be prior art by inclusion in this section. Software applications such as word processing applications can be used to create, edit, and/or view information containing text. For example, word processing software, such as Microsoft Word, can be used to create, edit, and/or view documents that include text. Text can be used in other applications as well, such as web pages and messaging services. Additional software and/or hardware applications can be used to convert various inputs, such as speech, video, and paper documents, to computer-usable text. These applications can recognize words in input and generate corresponding text as output. In some cases, the output text includes errors. In a first aspect of the disclosure of the application, a method is provided. Inputs having a plurality of input types are received at a wearable computing device. A text string corresponding to the inputs is generated using the wearable computing device. The text string includes a plurality of segments. Each segment is associated with an input type of the plurality of input types. The text string is displayed using the wearable computing device. For a given segment of the text string, one or more corrected segments are generated by applying an error-correction filter to the given segment using the wearable computing device, wherein the error-correction filter is configured to correct errors based on an input type associated with the given segment and on a location-sensitive context. At least one of the one or more corrected segments is displayed using the wearable computing device. A selected corrected segment of the one or more corrected segments is selected using the wearable computing device. A corrected text string including the selected corrected segment is displayed using the wearable computing device. In a second aspect of the disclosure of the application, a wearable computing device is provided. The wearable computing device includes a display; a plurality of input devices, wherein each input device is associated with an input type; a processor; and memory. The memory has one or more instructions that, in response to execution by the processor, causes the wearable computing device to perform functions. The functions include: (i) receiving inputs from at least some of the plurality of input devices, (ii) generating a text string corresponding to the inputs, wherein the text string includes a plurality of segments and each segment is associated with an input type of the plurality of input types, (iii) displaying the text string using the display, (iv) for a given segment of the text string, generating one or more corrected segments by applying an error-correction filter to the given segment using the wearable computing device, where the error-correction filter is configured to correct errors based on an input type associated with the given segment and on a location-sensitive context, (v) displaying at least the one or more corrected segments using the display, (vi) selecting a selected corrected segment of the one or more corrected segments; and (vii) displaying a corrected text string comprising the selected corrected segment using the display. In a third aspect of the disclosure of the application, an article of manufacture is provided. The article of manufacture includes a computer-readable storage medium having instructions stored thereon that, in response to execution by a processor, cause the processor to perform operations. The instructions include: (i) instructions for receiving inputs having a plurality of input types, (ii) instructions for generating a text string corresponding to the inputs, wherein the text string includes a plurality of segments and each segment is associated with an input type of the plurality of input types, (iii) instructions for displaying the text string, (iv) instructions for generating, for a given segment of the text string, one or more corrected segments by applying an error-correction filter to the given segment, wherein the error-correction filter is configured to correct errors based on an input type associated with the given segment and on a location-sensitive context, (v) instructions for displaying at least the one or more corrected segments, (vi) instructions for selecting a selected corrected segment of the one or more corrected segments, and (vii) instructions for displaying a corrected text string comprising the selected corrected segment. Overview Techniques are described herein for correcting errors in text using a computing device, such as a wearable computing device. Such computing devices, including wearable computing devices, commonly receive inputs from a number of sources, such as, but not limited to, keyboards, touch screens, paper documents, writing surfaces for hand-written input, microphones, and network interfaces. Computer-readable text, or “text” for short, can be generated from these input sources, and it is not unusual that this text includes errors. To correct these errors, it is well known to perform text correction; for example, an e-mail interface receiving text input can provide suggestions for completing and/or correcting text as entered. Text received by a computing device can include errors of at least three different types: input type errors, input source errors, and input context errors. Input type errors are errors that can be associated with an input source for the text. For example, text from a keyboard often has the word “the” misspelled as “teh”. As another example, a speech-to-text converter could convert the spoken word “virus” erroneously into the text “wire us.” Similar examples for errors in text conversion can be found for text based on optical character recognition (OCR), handwritten input, and other input sources. Additionally, some errors in text can be linked to specific input sources. For example, suppose two users, User A and User B, are providing spoken input via a microphone to a speech-to-text program. When both users speak the word “virus”, the speech-to-text program may erroneously generate the text “wire us” for User A, while correctly generating the text “virus” for User B. However, when both users speak the words “you all”, the speech-to-text program may erroneously generate the text “yawl” for User B, while correctly generating the text “you all” for User A. Further, some errors can be more readily corrected by knowing the input context. When correcting errors in the text of a book on zoology, the input of “Mon Key” should more likely be corrected to “monkey” than “Monday key.” Additional context information, such as other documents, location, contact information, etc. can be part of the input context as well. The context can be “location sensitive” or depend on location. For example, a context can include associations to people, buildings, activities, speech, video, and/or other inputs that are proximate to the wearable computing device. In some scenarios, the context can be based on a time of the year; for example, the context can include information that phrases associated with Christmas such as “Santa Claus”, “Yuletide”, “Jingle Bells”, etc. are more common in December than in July. Location-sensitive context can include documents, location, contact information, etc., just as with any other type of context. To address at least these limitations, devices and methods can involve an auto-correction technique that corrects errors based on, e.g., the input type, input source or context. Upon receiving the text, the device can determine the input types(s), input source(s) and context(s) and scan for the text for errors using one or more different types of error-correction filters: input-type, input-device, and input-context. These devices and methods can perform error correction using at least two different techniques: an automatic technique, where the text is corrected without external input, and a manual technique, where the text is corrected by providing a number of correction options, and then corrected based on a selection of one of the correction options. System and Device Architecture FIG. 1 FIG. 1 100 100 102 illustrates an example system for receiving, transmitting, and displaying data. The system is shown in the form of a wearable computing device. While illustrates eyeglasses as an example of a wearable computing device, other types of wearable computing devices could additionally or alternatively be used. FIG. 1 102 104 106 108 110 112 114 116 108 114 116 102 104 106 108 114 116 102 110 112 110 112 As illustrated in , the eyeglasses comprise frame elements including lens-frames and and a center frame support , lens elements and , and extending side-arms and . The center frame support and the extending side-arms and are configured to secure the eyeglasses to a user's face via a user's nose and ears, respectively. Each of the frame elements , , and and the extending side-arms and may be formed of a solid structure of plastic or metal, or may be formed of a hollow structure of similar material so as to allow wiring and component interconnects to be internally routed through the eyeglasses . Each of the lens elements and may include a material on which an image or graphic can be displayed. Each of the lens elements and may also be sufficiently transparent to allow a user to see through the lens element. These two features of the lens elements could be combined; for example, to provide an augmented reality or heads-up display where the projected image or graphic can be superimposed over or provided in conjunction with a real-world view as perceived by the user through the lens elements. 114 116 104 106 102 114 116 102 100 The extending side-arms and are each projections that extend away from the frame elements and , respectively, and can be positioned behind a user's ears to secure the eyeglasses to the user. The extending side-arms and may further secure the eyeglasses to the user by extending around a rear portion of the user's head. Additionally or alternatively, the system may be connected to or be integral to a head-mounted helmet structure. Other possibilities exist as well. 100 118 120 122 124 126 118 114 102 118 102 118 118 118 120 124 126 110 112 124 126 The system may also include an on-board computing system , a video camera , a sensor , and finger-operable touch pads , . The on-board computing system is shown to be positioned on the extending side-arm of the eyeglasses ; however, the on-board computing system may be provided on other parts of the eyeglasses . The on-board computing system may include a processor and memory, for example. The on-board computing system may be configured to receive and analyze data from sensor , video camera and finger-operable touch pads , (and possibly from other sensory devices, user interfaces, or both) and generate images for output to the lens elements and . In some embodiments, touch pads and/or can be configured to process handwriting inputs. 120 114 102 120 102 120 100 120 120 120 FIG. 1 The video camera is shown to be positioned on the extending side-arm of the eyeglasses ; however, the video camera may be provided on other parts of the eyeglasses . The video camera may be configured to capture images at various resolutions or at different frame rates. Many video cameras with a small form-factor, such as those used in cell phones or webcams, for example, may be incorporated into an example of the system . Although illustrates one video camera , more video cameras may be used, and each may be configured to capture the same view, or to capture different views. For example, the video camera may be forward facing to capture at least a portion of the real-world view perceived by the user. This forward facing image captured by the video camera may then be used to generate an augmented reality where computer generated images appear to interact with the real-world view perceived by the user. 122 116 102 122 102 122 122 122 The sensor is shown mounted on the extending side-arm of the eyeglasses ; however, the sensor may be provided on other parts of the eyeglasses . The sensor may include one or more motion sensors, such as a gyroscope and/or an accelerometer. Other sensing devices may be included within the sensor and other sensing functions may be performed by the sensor . 124 126 114 116 102 124 126 124 126 124 126 124 126 124 126 124 126 124 126 The finger-operable touch pads , are shown mounted on the extending side-arms , of the eyeglasses . Each of finger-operable touch pads , may be used by a user to input commands. The finger-operable touch pads , may sense at least one of a position and a movement of a finger via capacitive sensing, resistance sensing, or a surface acoustic wave process, among other possibilities. The finger-operable touch pads , may be capable of sensing finger movement in a direction parallel to the pad surface, in a direction normal to the pad surface, or both, and may also be capable of sensing a level of pressure applied. The finger-operable touch pads , may be formed of one or more translucent or transparent insulating layers and one or more translucent or transparent conducting layers. Edges of the finger-operable touch pads , may be formed to have a raised, indented, or roughened surface, so as to provide tactile feedback to a user when the user's finger reaches the edge of the finger-operable touch pads , . Each of the finger-operable touch pads , may be operated independently, and may provide a different function. FIG. 2 FIG. 1 FIG. 2 100 110 112 102 128 116 130 112 132 114 134 110 illustrates another view of the system of . As shown in , the lens elements and may act as display elements. The eyeglasses may include a first projector coupled to an inside surface of the extending side-arm and configured to project a display onto an inside surface of the lens element . Additionally or alternatively, a second projector may be coupled to an inside surface of the extending side-arm and configured to project a display onto an inside surface of the lens element . 110 112 128 132 128 132 The lens elements and may act as a combiner in a light projection system and may include a coating that reflects the light projected onto them from the projectors and . In some embodiments, a special coating may not be used (e.g., when the projectors and are scanning laser devices). 110 112 104 106 In alternative embodiments, other types of display elements may also be used. For example, the lens elements , themselves may include: a transparent or semi-transparent matrix display, such as an electroluminescent display or a liquid crystal display; one or more waveguides for delivering an image to the user's eyes; and/or other optical elements capable of delivering an in focus near-to-eye image to the user. A corresponding display driver may be disposed within the frame elements and for driving such a matrix display. Alternatively or additionally, a scanning laser device, such as low-power laser or LED source and accompanying scanning system, can draw a raster display directly onto the retina of one or more of the user's eyes. The user can then perceive the raster display based on the light reaching the retina. FIGS. 1 and 2 100 100 In other embodiments (not shown in ), system can be configured for audio output. For example, system can be equipped with speaker(s), earphone(s), and/or earphone jack(s). In these embodiments, audio output can be provided via the speaker(s), earphone(s), and/or earphone jack(s). Other possibilities exist as well. FIG. 3 FIGS. 1 and 2 136 136 138 140 142 138 138 102 is a schematic drawing of a system illustrating an example computer network infrastructure. In system , a device communicates using a communication link (e.g., a wired or wireless connection) to a remote device . The device may be any type of device that can receive data and display information corresponding to or associated with the data. For example, the device may be a heads-up display system, such as the eyeglasses described with reference to . 138 144 146 148 148 146 142 148 146 Thus, the device may include a display system comprising a processor and a display . The display may be, for example, an optical see-through display, an optical see-around display, or a video see-through display. The processor may receive data from the remote device , and configure the data for display on the display . The processor may be any type of processor, such as a micro-processor or a digital signal processor, for example. 138 150 146 150 146 FIG. 3 The device may further include on-board data storage, such as memory shown coupled to the processor in . The memory may store software and/or data that can be accessed and executed by the processor , for example. 142 138 142 138 140 The remote device may be any type of computing device or transmitter including a laptop computer, a mobile telephone, etc., that is configured to transmit data to the device . The remote device and the device may contain hardware to enable the communication link , such as processors, transmitters, receivers, antennas, etc. FIG. 3 140 140 142 In , the communication link is illustrated as a wireless connection. The wireless connection could use, e.g., Bluetooth® radio technology, communication protocols described in IEEE 802.11 (including any IEEE 802.11 revisions), Cellular technology (such as GSM, CDMA, UMTS, EV-DO, WiMAX, or LTE), or Zigbee® technology, among other possibilities. Alternatively or additionally, wired connections may be used. For example, the communication link may be a wired link via a serial bus such as a universal serial bus or a parallel bus. A wired connection may be a proprietary connection as well. The remote device may be accessible via the Internet and may comprise a computing cluster associated with a particular web service (e.g., social-networking, photo sharing, address book, etc.). Example Wearable Computing System FIG. 4 400 400 404 401 400 408 426 400 is a functional block diagram for a wearable computing system in accordance with an example embodiment. System is configured to monitor incoming data from a number of input devices and display information related to the incoming data on Head Mounted Display (HMD) . For example, system can monitor speech received via microphone and, may convert the speech to text using speech-to-text module . The input speech can include instructions that specify actions and objects for the actions. Accordingly, system can be configured to detect instructions, and to responsively initiate the actions specified in the instructions. Example Input Devices FIG. 4 400 402 404 401 404 406 408 410 412 414 434 402 408 402 406 414 As shown in , system includes one or more input-device interfaces for receiving data from input devices and one or more output devices, such as HMD , for presenting information related to the data from input devices. In the illustrated embodiment, the input devices include, for example, an application , a microphone , a keyboard , a camera , a touchpad , and a location sensor . A given input-device interface may be configured to interface with and receive data from a single input device, such as microphone . Alternatively, a given input-device interface may be configured to simultaneously interface with multiple input devices, such as some or all of input devices -. 400 404 400 408 410 412 414 System can receive a number of different types of input data from input devices . In the illustrated embodiment, system may receive, for example, audio data from microphone , text data from keypad , video data and/or image data from camera(s) , and/or gesture data from touchpad . In some scenarios, multiple inputs can be received simultaneously. A system may be configured to receive other modalities of data, in addition or in the alternative to those described, without departing from the scope of the invention. 410 414 426 406 406 FIG. 4 In some embodiments, some or all types of input data can be converted to text. For some types of input data, such as input data from keyboard and touchpad , no conversion may be needed. For other types of input, conversion modules, such as speech-to-text module and/or a video-to-text module (not shown in ), can be used to convert input data to text. Applications, such as application , may generate text, audio input, video input, and/or other types of input (e.g., encrypted input, compressed input, other types of binary input, etc.). Thus, application-specific techniques can be used generate input text from inputs derived from application . 434 400 434 400 Location sensor can utilize one or more technologies and sensors to determine and provide a location of system . Example technologies include, but are not limited to, Global Positioning System (GPS) technologies and sensors, other satellite-based technologies and sensors, inertial navigation technologies, timing circuitry, accelerometers, compasses, velocity sensors, and gyroscopes. In some embodiments, location sensor can determine and provide related information to system , such as velocity including both speed and direction(s) of travel, acceleration, distance(s) traveled, and timing information. Many other types of related information are possible as well. FIG. 4 400 400 Other input devices not shown in can be utilized as well. For example, sensors, scanners, pads configured for touch and/or handwriting input, optical character recognition (OCR) related devices such as scanners, and various other devices can be used as input sources to system . In some embodiments, system can be configured with one or more input and/or output ports or jacks configured for communicating with input and/or output devices. Selection Criteria for Input Content 400 416 404 416 404 402 In the illustrated embodiment, system includes an input selection module , which generally functions to evaluate the input data from the various input devices . In particular, input selection module may be configured to receive input data from the input devices via input device interfaces and detect one or more data patterns in the input data. 416 416 418 In some cases, input selection module may detect multiple concurrent data patterns in the input data. For example, input selection module may detect a first data pattern in data from a first source and, simultaneously, detect a second data pattern in data from a second source. As such, selection criteria may provide input-selection rules that prioritize certain data patterns and/or certain input devices. 418 408 412 416 410 418 For instance, selection criteria may prioritize detection of speech in audio data from microphone over other data patterns detected in video data from camera . Accordingly, some embodiments may be configured to display a text conversion of speech whenever speech matching a data pattern is detected in incoming audio data, regardless of whether there is also a matching data pattern in incoming video data. Similarly, if input selection module detects that a user is entering text via a keyboard , this text may be displayed, even when there is a matching data pattern in incoming audio data and/or in incoming video data; for example, where keyboard data is given priority over audio data and video data by selection criteria . 418 404 418 408 412 412 In a further aspect, selection criteria may provide input-selection rules that prioritize certain data patterns when multiple matching data patterns are detected from a common input device. For instance, when explicit commands are received in audio data, the explicit commands may be given priority over implicit information in the audio data from input devices . As one specific example, input-selection criteria may specify that when a user says “show video” (e.g., when “show video” is detected in audio data from microphone ), then this should be interpreted as an explicit command to select camera as the input device and display video from camera . 418 418 It should be understood selection criteria may specify other hierarchies and/or other prioritizations of input devices and/or data patterns, without departing from the scope of the invention. Thus, selection criteria may be based on one or more objectives in a specific implementation. 418 404 410 408 426 412 410 426 408 434 406 414 In a further aspect, there may be scenarios where the selection criteria indicate that multiple input devices should be selected. For example, a scenario may exist where text is detected in input data from keyboard and speech is detected in audio data from microphone . In this scenario, speech-to-text module may convert the speech from the audio data to text, and this text may be merged with the text from the keyboard for display. As another example, scenarios may exist where video or an image from camera is displayed, and text is overlaid on top of the video or image. In such a scenario, the text may be obtained from the keyboard and/or obtained via speech-to-text module converting speech in audio data from microphone . In another example, a location input from location sensor can be combined with text and/or video derived from one or more of input devices -. Many other examples of combinations of multiple input devices, which combine a variable number of input devices, are also possible. 418 430 430 404 In another aspect, the selection criteria can indicate that inputs are to be corrected by error correction module . Error correction module can be configured to receive one or more segments of text related to any of the input devices , evaluate the segments of text, and responsively generate one or more corrected segments of text. 430 432 424 418 432 432 432 432 432 432 432 432 a c a b c a c FIG. 4 FIG. 4 FIG. 4 FIG. 4 Error correction module can utilize error correction data , historical context , and/or selection criteria to correct received text. Error correction data can include one or more filters -for correcting errors. The one or more filters can include: (a) one or more filters to correct errors based on input type , shown in as “F(type)”, (b) one or more filters to correct errors based on input source , shown in as “F(src)”, and/or (c) one or more filters to correct errors based on input context , shown in as “F(con).” In some embodiments not shown in , some or all of filters -can be combined; for example, a source-context filter can combine filter(s) based on input source and filter(s) based on input context. Other filters are possible as well. 432 430 a The received text can be evaluated for applying type-based corrections using input type filters . This filter can include a list, table, tree, trie, dictionary, database, and/or other data structure(s) configured to store at least one input word and corresponding correction(s) for the input word. Then, error correction module can find possible corrections for each word in the input text by looking up the each word in the input text in the data structure(s) storing the known corrections, and replacing the input word with any correction(s). 408 426 426 430 408 430 432 426 408 a For example, speech of “Get dog picture” can be received at microphone and converted to text by speech-to-text module . Consider the example where the text generated by text-to-speech module is “Get dog pitcher.” Upon receiving the “Get dog pitcher” text, error correction module can evaluate the received text and provide corrected text in response. In this example, the input type is speech received via microphone . Based on this input type, error correction module can then determine that the appropriate input type filter is a microphone-related filter and then provide each input word to the microphone-related filter. For instance, suppose that speech-to-text module frequently generated the word “pitcher” instead of the word “picture” for input coming from microphone . Then, in response to input text with the word “pitcher,” the microphone-related filter can provide a possible correction of “picture.” 432 432 424 432 420 424 b c c Additional or other filters can be applied to the input text. Input source filter(s) include filters that take an input source, such as a particular speaker, typist, or touch-pad user, into account. Input context filter(s) can evaluate the input text in view of historical context to provide possible corrections to the text. Contexts are discussed in more detail in at least the “Selection of Content Based on Context Information” section below. In some embodiments, input context filters can be utilized by context evaluation module to correct documents and/or other components of historical context . The possible correction(s) can be applied automatically or manually. Automatic correction techniques involve text correction without external input. For example, suppose the only correction to the “Get dog pitcher” input was to change the word “pitcher” to “picture.” An example automatic correction technique can replace the word “pitcher” with “picture” without prompting a user or otherwise receiving external input. Upon applying the automatic correction technique, the corresponding text segment of “Get dog picture” can be output as corrected text. 400 404 Manual correction techniques involve providing a number of correction options, and then correcting text based on a selection of one of the correction options. For example, suppose the only correction to the “Get dog pitcher” input was to change the word “pitcher” to “picture.” An example manual technique can generate a prompt with the input text of “Get dog pitcher” and a request for input such as “Do you want to replace ‘pitcher’ with ‘picture’?” In response to displaying the prompt, system can receive input, via one or more of input devices , related to whether or not to replace the word “pitcher” with “picture” and generate the corresponding output text segment based on the decision. In some embodiments, the prompt may not include the input text; rather the prompt may provide option(s) for correction only. 416 420 426 430 418 424 430 420 In some embodiments, part or all of the functionality of one or more of the herein-described modules , , , , selection criteria , and historical context can be combined with one or more other modules. For example, the part or all of the functionality of error correction module can be combined with context evaluation module (or vice versa). 401 401 140 400 FIG. 4 FIG. 4 Prompts, corrections, and/or text segments can be displayed using HMD and/or on another display device (not shown in ). In embodiments not depicted in , output can be provided to other devices than HMD ; for example, output can be communicated via communication link . As another example, if system is equipped with speaker(s), earphone(s), and/or earphone jack(s), audio output can be provided via the speaker(s), earphone(s), and/or earphone jack(s). Many other examples and/or outputs are possible as well. Selection of Input Content Based on Implicit Information 400 System can select an input based on implicit information extracted from input data from the various possible input devices. This implicit information may correspond to certain data patterns in the input data. 400 416 When system includes a microphone or other audio sensor as an input device, input selection module may monitor incoming audio data for various data patterns, according to the input-selection criteria. The input-selection criteria may specify numerous types of data patterns, which may vary in complexity and/or form. 416 For example, input selection module may monitor audio data for: (i) patterns that are indicative of human speech in general, (ii) patterns that are indicative of human speech by a particular person (e.g., the owner of the device, or a friend or spouse of the owner), (iii) patterns that are indicative of a certain type of human speech (e.g., a question or a command), (iv) patterns that are indicative of human speech inflected with a certain emotion (e.g., angry speech, happy speech, sad speech, and so on), (v) patterns that are indicative of human speech associated with a certain context (e.g., a pre-recorded announcement on a subway car or a statement typically given by a flight attendant on an airplane), (vi) patterns that are indicative of a certain type of human speech (e.g., speech that is not in a speaker's native language), (vii) patterns indicative of certain types of non-speech audio (e.g., music) and/or of non-speech audio with certain characteristics (e.g., a particular genre of music), and/or (viii) other types of audio-data patterns. 426 As a specific example, a system may be configured to monitor audio data for data patterns that include or are indicative of speech by a particular user associated with the system (e.g., the owner of a wearable computer). Accordingly, the speech-to-text module may convert the speech to corresponding text, which may then be displayed. In some embodiments, the audio data in which speech is detected may be analyzed in order to verify that the speech is actually that of the user associated with the system. For example, the audio data can be compared to previously-received samples of audio data known to be utterances of the user associated with the system to verify that a speaker is (or is not) the user associated with the system. In particular embodiments, a “voiceprint” or template of the voice of the user associated with the system can be generated, and compared to a voiceprint generated from input audio data. Other techniques for verifying speaker(s) are possible as well. 430 430 Further, when speech is detected, and possibly in other scenarios as well, the detected speech may be analyzed for information that may imply certain content might be desirable. For instance, when a speaker says a person's name, error correction module can generate command(s) to search various sources for the named person's contact information or other information related to the named person. Error correction module may perform one or more implicit searches, for example, when the person's name is stated in the midst of a conversation, and the user does not explicitly request the information about the person. Implicit searches can be performed for other types of content, such as other proper nouns, repeated words, unusual words, and/or other words. 430 401 FIG. 4 FIG. 4 If contact information for the named person is located, error correction module can indicate that the contact information may be displayed. For example, the contact information can include phone number(s), email address(es), mailing address(es), images/video related to the contact, and/or social networking information. Furthermore, the contact information may be displayed in various forms—the contact information can be displayed visually (e.g., using HMD ) and/or audibly (e.g., using a text-to-speech module, not shown in , in combination with an audio output, such as a speaker or earphone not shown in ). Many other types of contact information are possible as well. In the event that analysis of the speech does not provide implicit information that can be used to select an input device, text corresponding to the detected speech can be displayed. Alternatively, the default action may be not to display anything related to the detected speech. Other default actions are also possible. Selection of Content Based on Context Information 416 416 420 422 420 416 416 430 In a further aspect, input selection module may be configured to select an input device and/or to select input content based on context. In order to use context information in the selection process, input selection module may coordinate with context evaluation module , which is configured to evaluate context signals from one or more context information sources . For example, context evaluation module may determine a context, and then relay the determined context to input selection module . In some cases, input selection module can provide the context to another module; e.g., speech evaluation module . In some cases, the context can be a location-sensitive context. 420 422 In an example embodiment, context evaluation module may determine contexts, including location-sensitive contexts, using various “context signals,” which may be any signals or information pertaining to the state or the environment surrounding the system or a user associated with the system. As such, a wearable computer may be configured to receive one or more context signals, such as location signals, time signals, environmental signals, and so on. These context signals may be received from, or derived from information received from, context information sources and/or other sources. Many types of information, from many different sources, may serve as context signals or provide information from which context signals may be derived. For example, context signals may include: (a) the current time, (b) the current date, (c) the current day of the week, (d) the current month, (e) the current season, (f) a time of a future event, (g) a date of a future event or future user-context, (h) a day of the week of a future event or future user-context, (i) a month of a future event or future user-context, (j) a season of a future event or future user-context, (k) a time of a past event or past user-context, (l) a date of a past event or past user-context, (m) a day of the week of a past event or past user-context, (n) a month of a past event or past user-context, (o) a season of a past event or past user-context, ambient temperature near the user (or near a monitoring device associated with a user), (p) a current, future, and/or past weather forecast at or near a user's current location, (q) a current, future, and/or past weather forecast at or near a location of a planned event in which a user and/or a user's friends plan to participate, (r) a current, future, and/or past weather forecast at or near a location of a previous event in which a user and/or a user's friends participated, (s) information on user's calendar, such as information regarding events or statuses of a user or a user's friends, (t) information accessible via a user's social networking account, such as information relating a user's status, statuses of a user's friends in a social network group, and/or communications between the user and the users friends, (u) noise level or any recognizable sounds detected by a monitoring device, (v) items that are currently detected by a monitoring device, (w) items that have been detected in the past by the monitoring device, (x) items that other devices associated with a monitoring device (e.g., a “trusted” monitoring device) are currently monitoring or have monitored in the past, (y) information derived from cross-referencing any two or more of: information on user's calendar, information available via a user's social networking account, and/or other context signals or sources of context information, (z) health statistics or characterizations of a user's current health (e.g., whether a user has a fever or whether a user just woke up from being asleep), (aa) items a user has indicated a need for in the past or has gone back to get in the recent past, (bb) items a user currently has (e.g., having a beach towel makes it more likely that a user should also have sunscreen), and (cc) a user's recent context as determined from sensors on or near the user and/or other sources of context information. Those skilled in the art will understand that the above list of possible context signals and sources of context information is not intended to be limiting, and that other context signals and/or sources of context information are possible in addition, or in the alternative, to those listed above. 420 420 In some embodiments, context evaluation module may identify the context as a quantitative or qualitative value of one context signal (e.g., the time of the day, a current location, a user status). The context may also be determined based on a plurality of context signals (e.g., the time of day, the day of the week, and the location of the user). In other embodiments, the context evaluation module may extrapolate from the information provided by context signals. For example, a determined user-context may be determined, in part, based on context signals that are provided by a user (e.g., a label for a location such as “work” or “home”, or user-provided status information such as “on vacation”). 422 400 In a further aspect, context information sources may include various sensors that provide context information. These sensors may be included as part of or communicatively coupled to system . Examples of such sensors include, but are not limited to, a temperature sensor, an accelerometer, a gyroscope, a compass, a barometer, a moisture sensor, one or more electrodes, a shock sensor, one or more chemical sample and/or analysis systems, one or more biological sensors, an ambient light sensor, a microphone, and/or a digital camera, among others. 400 420 434 System may also be configured to acquire context signals from various data sources. For example, context evaluation module can be configured to derive information from network-based weather-report feeds, news feeds and/or financial-market feeds, and/or a system clock providing a reference for time-based context signals. As another example, a location-sensitive context can determine a location for the context using a location-determining system (e.g., location sensor ), among others. 400 418 424 420 424 418 In another aspect, system may also be configured to learn over time about a user's preferences in certain contexts, and to update selection criteria accordingly. For example, whenever an explicit input-content instruction is received, a corresponding entry may be created in historical context database . This entry may include the input device and/or input content indicated by the input-content instruction, as well as context information that is available at or near the receipt of the input-content instruction. Context evaluation module may periodically evaluate historical context database and determine a correlation exists between explicit instructions to select a certain input device and/or certain input content, and a certain context. When such a correlation exists, selection criteria may be updated to specify that the input device should be automatically selected, and/or that the input content should be automatically displayed, upon detection of the corresponding context. 400 420 424 420 Additionally or alternatively, system may be configured for an “on-the-fly” determination of whether a current context has historically been associated with certain input devices and/or certain input content. In particular, context evaluation module may compare a current context to historical context data in historical context database , and determine whether certain content historically has been correlated with the current context. If a correlation is found, then context evaluation module may automatically display the associated input content. 400 420 400 420 404 For example, suppose a user of system typically orders lunch from one of seven restaurants between 12:00 and 12:30 while at work. Then, context evaluation module can determine that the context include (a) a location of system is related to “work” (b) a time just before or at 12:00, (c) a history of ordering lunch from the aforementioned seven restaurants, and (c) that six of the seven restaurants are open at this time, based on online listings. Then, the context evaluation module can generate a command to display a reminder to “Order Lunch” with a list of the six open restaurants for order selection, and perhaps including information indicating that the seventh restaurant is closed. In response, the user can select a restaurant from the list using input devices , choose another restaurant, dismiss/postpone the order, or perhaps, perform some other action. 430 430 430 As another example, when error correction module detects an “open” speech action followed by a file name, error correction module may select the particular application that is appropriate to open the file as the input device, launch the selected application in the multimode input field, and then open the named file using the application. As an additional example, the user may say “search” and then state or type the terms to be searched, or identify other content to be searched, such as an image, for example. When error correction module detects such a “search” action, it may responsively form a query to a search engine, provide the query with subsequently stated terms or identified content, and receive search results in response to the query. Implicit searches also can be performed by this technique of forming a query based on identified content; e.g., the word(s) that provoked the implicit search, providing the query with identified content to a search engine, and receiving search results in response to the query. 420 430 400 101 430 In some scenarios, context evaluation module and/or error correction module can be provide predictive corrections based on context. For example, suppose system is traveling northbound on Highway in San Mateo, Calif., and receives text input of “Franciso airport.” Then, error correction module can predict that, based on the location and direction of travel, that possible text corrections can include “San Francisco airport” or “SFO.” 400 400 400 As another example of predictive correction, suppose that, typically, the user of system buys groceries on the way home from work between 5:15 PM and 6:30 PM. Then, by knowing this context of work followed by grocery store, system can weight grocery-related corrections higher between 5 PM and 6:30 PM. For example, in this scenario, suppose system receives text input of “stak” at 3 PM and again receives text input of “stak” at 5:10 PM. At 3 PM, the input of “stak” may lead to a text correction of “stake” being more highly weighted than a text correction of “steak”, while at 5:10 PM, the input of “stak” may have a text correction of “steak” being more highly weighted than a text correction of “stake.” Many other examples of predictive correction are possible as well. 424 424 Historical context database can also, or instead, include information about one or more documents for inclusion in a context. A document can be a bounded physical or digital representation of a body of information, or content. Content of the document can include text, images, video, audio, multi-media content, and/or other types of content. Document-property information can be associated with a document, such as, but not limited to, document names, sizes, locations, references, partial or complete content of documents, criteria for selecting documents to form a context and/or to locate a document. Other types of content and document-property information are possible as well. In some embodiments, documents, including content and/or document-property information, can be stored in historical context database for at least use in context generation. A context may involve information derived from collection(s) of documents, such as, but not limited to, related collections of documents and past documents that have been created by the user and/or by other users. For example, based on the fact that a user has created a number of purchase order documents in the past, a background process may interpret the document in the context of a purchase order agreement, perhaps searching for supplier names and/or supplier part numbers as data for search request(s). In some cases, a document can be accessed via one or more document references such as, but not limited to, a Uniform Resource Locator (URL), a Uniform Resource Identifier (URI), a volume name/number, a title, a page number, an address, a storage address, such as a memory address or disk sector, a library index number, an International Standard Book Number (ISBN), a bar code, and/or other identifying information. One or more document references can be included with the document-property information about the document. Other document references are possible as well. Example Scenarios for Error Correction FIG. 5A FIG. 5A FIG. 4 FIG. 5 FIG. 5A 500 500 500 510 512 512 520 500 500 520 400 512 530 516 500 500 516 514 depicts a scenario of error correction in accordance with an example embodiment. Scenario begins at A where keyboard is used to generate text input of “Teh grape wsa.” Text input is received at device (shown in at C and E). An example wearable computing device that could be utilized as device is system , described in detail above with reference to . Text input is processed by error correction module to generate corrected text segment , shown at B of . Also at B, corrected text segment of “The grape was” is shown as being added to open document , shown in as entitled as “Grape Story 1.” FIG. 5A FIG. 5A FIG. 1 514 516 518 518 520 520 518 514 520 128 132 shows document with corrected text segment displayed on display . Display can be controlled by device ; for example, using a wireless display controller on device configured to send commands to drive display equipped with a compatible wireless receiver. In embodiments not shown in , document can be displayed using a projector of device , such as projector and/or discussed above in the context of . 500 530 520 532 520 532 532 426 500 426 534 532 534 532 530 534 514 FIG. 5A a a a At C of , speaker wearing device speaks utterance of “purple.” A microphone or other sound sensor associated with device can receive utterance and convert received utterance into text; e.g., using speech-to-text module . In scenario , speech-to-text module generates text of “purble” corresponding to utterance . Upon receiving text input related to utterance , error correction module can generate a corrected text segment corresponding to text input , and add the corrected text segment to document . FIG. 5A 534 534 530 516 516 512 b b shows corrected text segment as a list of three possible corrected text segments: 1. purple, 2. burping, and 3. other . . . . That is, list is part of an example of a manual correction technique, where speaker is asked to choose between a number of different possible error corrections. In contrast, corrected text segment is shown as being generated using an automated correction technique, as no additional input was required to generate corrected text segment from input text . 500 FIG. 5A At D and throughout , text related to keyboard input is shown using a bold font, while text related to speech input, both as input and as corrected, is shown using underlining. Generally, text of various input types and/or input sources can be distinguished from each other using different fonts, color, font sizes, and/or spacing. For example, text of one input type can be displayed using a first color (e.g., blue) and text of a second input type can be displayed using a second color (e.g., red). In particular embodiments, distinguishing text from different input types and/or input sources can be temporary; for example, as inputs are received they can be displayed using their distinguishing characteristics of font, color, size, etc. for a pre-determined amount of time; e.g., 5 or 10 seconds, before the text is shown as non-distinguished text. Other techniques for distinguishing text are possible as well. 500 530 540 540 426 430 430 534 430 534 514 514 542 FIG. 5A FIG. 5C a b At E of , speaker speaks utterance of “one.” Utterance can be converted to text via speech-to-text-module and text input of “one” can be provided to error correction module . Upon receiving text input of “one,” error correction module , performing a manual correction technique, can associate the text input with the first displayed item in the list , which is the word “purple.” Then, error correction module can request the word “purple” be added to segment of document . shows the result of the manual correction technique with document including phrase of “The grape was purple.” FIGS. 5B FIG. 5B 5 5 430 500 550 430 552 404 406 408 , C, and D depict processing by error correction module for inputs received in scenario in accordance with an example embodiment. Turning to , at block , error correction module determines an input type for input text of “Teh grape wsa”. At block , the input type is determined as a “keyboard.” The input type can be determined by adding a input-type tag and/or other data to input data received at input sources —e.g., for input received by application , the input-type tag can be “application,” for input received by microphone , the input-type tag can be “microphone,” and so on. Many other techniques for determining an input type associated with an input are possible as well. FIG. 5B FIG. 5B 554 430 shows, at block , that error correction module applies a correction based on the keyboard input type. The correction can involve utilizing a filter for the keyboard input type on each of the three input words: “Teh”, “grape”, and “wsa.” After applying the filter, shows an output of “The grape was”. 556 430 500 558 430 At block , error correction module can determine an input source for the input of “Teh grape wsa”. The input source can be determined using an input-source tag similar to the input-type tag described above. For example, if a user logs in or is otherwise identified, an input-type tag can be populated with the identified user information. As another example, if speech or video is used as input, an input source can be determined by data associated with the input, metadata associated with the input, speech and/or facial recognition techniques applied to the input audio and/or video. In scenario , the input source for the “Teh grape wsa” input is unknown, as indicated in block . As the input source is unknown, error correction module may not apply any corrections to this input based on input source. 560 500 562 FIG. 4 At block , an input context is determined. As discussed above in the context of , the input context can include context signals, context information derived from sensors, user preferences, documents, document-property information, and/or historical context database. In scenario , the input context is merely that of a current document “Grape Story 1”, as indicated at block . As this input context is an empty document, no corrections are performed based on the input context. 564 500 FIG. 5A At block , a determination is made as to whether or not to apply an automatic correction technique. In some embodiments, the determination to apply an automatic correction technique can be based on input type, input source, input context, user preferences, and/or other information. For example, a number of possible corrections for the input text can be determined, and automatic techniques can be used when there is only one or fewer possible corrections per word to be applied, while manual techniques can be used when there are multiple possible corrections to be applied to at least one word, such as shown at D of . FIG. 5B 566 554 430 568 shows that an automatic correction technique is to be used at block . As such, a corrected text segment of “The grape was”, which is the output of block , is the output of error correction module at block . The corrected text segment can replace the input text of “Teh grape wsa” in the “Grape Story 1” document. FIG. 5C FIG. 5A 430 532 570 430 572 Now turning to , which shows an input to error correction module of “purble” that was generated from utterance of . At block , error correction module determines an input type for the “purble” input text. At block , the input type is determined to be “speech.” 574 430 FIG. 5B At block , error correction module applies a correction based on the speech input type. The correction can involve utilizing a filter for the speech input type for the input word of “purble.” After applying the input-type filter, shows an output of “purple.” 576 430 500 1 578 1 580 1 FIG. 5C At block , error correction module can determine an input source for the input of “purble.” In scenario , the input source for the “purble” input is a user with username of “GG” as shown in block of . An input-source filter based on the GG input source can be applied to the input at block . In some embodiments, the input-source filter can take both the input source (e.g., GG) and the input type (e.g., speech) into account—that is, the input-source filter can account for errors based on both source and type. 1 1 574 580 In some embodiments, the filter act as a reverse filter; that is, taking output text, such as output from a speech-to-text or video-to-text module, as an input and then determining the corresponding input that could lead to the “output” text. For example, suppose that user GG typically types the word “purple” as “pruple” and that speech-to-text conversion typically converts the word “burping” spoken by GG to “purple.” Then, after applying the input-source filter with the output text of “purble” as an input and an input type of speech, an output list of corrections can have at least two words: “purple” as generated at block , and “burping” as generated at block . 582 584 FIG. 5B At block , an input context is determined. shows that an input context of a current document “Grape Story 1” is formed at block . As this input context now only includes the words “The grape was”, no corrections are performed based on the input context. FIG. 5C FIG. 5C 586 588 590 shows that at block , a determination is made as to whether or not to apply an automatic correction technique. At block , the determination is not to use the automatic correction technique; therefore, a manual correction technique is used. Then, as a manual correction technique is used, at block an output list is presented. shows that the output list includes three options: “purple,” “burping,” and “other.” In some manual correction technique scenarios, the “other” option can be omitted. 500 430 In scenarios other than scenario , the “other” option is selected. When the “other” option is selected, additional input can be requested to correct the text; e.g., a prompt such as “Replace purble with what word(s)?” Then, upon receiving additional text related to the additional input, error correction module can correct the input text using the additional text. FIG. 5D 430 592 594 500 Turning to , an input of “one” is received. As an input is expected for the manual correction technique, error correction module can apply the input as part of the manual correction technique. At block , the input type is determined, which is shown at block to be “speech.” In scenario , consider that the input of “one” is correctly converted to input text of “one.” 596 596 590 596 598 a b FIG. 5D At block , the manual correction technique is applied using input text of “one.” At block , the list generated at block is retrieved. At block , the input text applied to the list to determine the correction; that is, the word in the list associated with the input text, which is “purple,” is determined to be the correction word. shows that, at block , the word “purple” is output as the output of the manual correction technique. FIGS. 5A-D 430 In some scenarios not shown in , multiple output words can be generated for one input word. For example, for a keyboard input of “canyoudigit”, error correction module can generate corrections with multiple output words, such as “can you dig it” and “can you digit”, as possible replacements for the “canyoudigit” input. FIG. 6 600 600 600 520 530 610 depicts a scenario of error correction in accordance with an example embodiment. Scenario begins at A with speaker instructing device using utterance of “Order 400 vires.” 610 430 520 610 600 5 5 500 600 430 600 520 612 614 520 FIGS. 5B FIG. 6 Upon receiving utterance , error correction module of device can receive input text corresponding to utterance . In scenario , the input text is “Order 400 vires.” Error correction module can apply input-type and/or input-source filters to the input text, as discussed above with reference to , C, and D. As similarly indicated in scenario , the input context of scenario appears to be empty, so error correction module may determine that input-context filters are not to be applied. After applying the input-type and/or input-source filters, the input text can be corrected, and the corresponding text of “Order 400 wires” can be output. At B, shows that device shows corrected text of “Order 400 wires” displayed on lens/display of device . 600 520 618 618 620 622 618 618 618 FIG. 6 a b a b a At C, shows device with camera and microphone observing speaker speaking utterance of “Orduh three hunnert resistahs, too.” Input text can be generated from inputs from both camera and microphone . For example, input text can be generated from video input generated by camera using automated lip-reading and/or facial motion techniques. Other techniques can be used as well. 618 618 430 430 430 5 5 a b FIGS. 5B Input texts from camera and microphone can be compared to find similarities and differences. Where the two input texts are similar, error correction module can determine that the corrected output is likely to involve similar words; while error correction module can determine that errors are more likely where the two input texts are different. Error correction module can apply input-type and/or input-source filters to the input text, as discussed above with reference to , C, and D. 622 430 622 430 622 However, as there is an input context of an “order”, an input-context filter can be used to correct utterance . For example, based on the input context, error correction module can determine the word “orduh” of utterance is more likely to be the word “order.” Further, in the context of an already-begun order, error correction module can indicate that the final word of utterance is the word “too” as opposed to “to” or “two.” Figure 600D 624 616 520 shows that, after applying input-type, input-source filters, and/or input-context filters, text of “300 resistors” is generated and displayed on lens/display of device . FIG. 7 700 700 700 710 712 710 720 400 716 722 710 720 430 720 712 700 depicts a scenario of error correction in accordance with an example embodiment. Scenario begins at A with speaker composing a document via utterance of “Wiruses can be deadly.” Utterance can be received by wearable computing device , which can be an embodiment of system configured with an output port configured to connect to and drive device via connection . For example, utterance can be received by a microphone of device and converted to text by a speech-to-text module. Error correction module of device can receive the text corresponding to utterance , which in scenario is “Wiruses can be deadly.” Figure 700B 714 700 714 710 710 shows that the document being composed is entitled “Influenza Paper23.” In scenario , the input context can include document as well as other papers on influenza (e.g., Influenza Papers 1 through 22) edited by speaker , papers not edited by speaker , additional documents on influenza, web pages on viruses (including the influenza viruses), and other types of information about influenza and viruses. 430 5 5 714 716 FIGS. 5B Error correction module can apply input-type, input-source, and/or input-context filters to the input text of “Wiruses can be deadly,” as discussed above with reference to , C, and D. In particular, input-source and/or input-context filters can correct the word “Wiruses” to be “Viruses.” After applying the input-type, input-source, and/or input-context filters, the input text can be corrected, and the corresponding text of “Viruses can be deadly” can be output to document displayed on display . 700 718 714 718 718 FIG. 7 FIG. 5A At B of , corrected text is shown as being distinguished in document via use of bold and underlined font. Other techniques for distinguishing corrected text are possible as well; for example as discussed above in the context of for distinguishing text of different input sources and/or types. In particular embodiments, distinguishing corrected text can be temporary; for example, the corrected text of “Viruses” can appear with bold and underlined font for a predetermined period of time; e.g., 5 or 10 seconds, before the corrected text is shown as not-distinguished text. 700 710 730 720 430 430 5 5 430 730 700 734 714 FIG. 7 FIGS. 5B FIG. 7 At C of , speaker speaks utterance of “Some Orthomyxowirids” which is received at a microphone of device and converted to text and provided to error correction module as “Some Orthomyxowirids.” Error correction module can apply input-type, input-source, and/or input-context filters to the input text of “Some Orthomyxowirids”, as discussed above with reference to , C, and D. In particular, error correction module can determine based on input context that the word “Orthomyxowirids” corresponds to the plural of the influenza virus, or Orthomyxoviridae, and correspondingly correct utterance to be “Some Orthomyxoviridae.” At D of , corrected text of “Orthomyxoviridae” is shown inserted into document and distinguished via use of bold and underlined font. FIGS. 8A FIG. 8A 8 8 800 , B, and C each depict scenarios for corrections utilizing contexts. In particular, depicts a scenario of error correction in accordance with an example embodiment. 800 810 812 802 800 816 802 812 816 FIG. 8A Scenario begins with wearer of wearable computing device at movie theater . At A, utterance is spoken at movie theater and captured by wearable computing device . As shown in , utterance is “YogeeBear says funny things!” 812 816 812 812 434 812 802 802 Wearable computing device can utilize a location-sensitive context to correct utterance . For example, wearable-computing device can determine a location of wearable computing device utilizing location sensor , and further determine that the location of wearable computing device is within university . In some embodiments, the location-sensitive context can include time-sensitive information, such as schedules of movies being played at movie theater . 812 802 812 802 800 812 816 816 FIG. 8A Upon determining a building or buildings associated with the location of wearable computing device , such as movie theater , wearable computing device can determine one or more activities associated with the building(s) as part of the location-sensitive context. For example, activities associated with movie theater can include watching and discussing movies, listening to and discussing movie-related music, talking about activities of other patrons, and enjoying popcorn and other confections. At A of , wearable computing device can determine that utterance is likely associated with a movie. In some embodiments, wearable computing device can determine that the movie “Yogi Bear” and/or cartoons with the Yogi Bear character are playing at the time utterance is captured. 812 816 Therefore, wearable computing device can determine one or more speech patterns related to academic exercises, classes, etc., that can indicate the word “YogeeBear” that is part of utterance is likely related to “Yogi Bear”. 800 814 812 818 816 816 816 FIG. 8 FIG. 8A At B of , lens/display of wearable computing device is shown displaying corrected text for utterance . shows that corrected text has corrected “YogeeBear” to be “Yogi Bear”, so that corrected text reads “Yogi Bear says funny things!” 800 810 812 822 800 826 812 826 FIG. 8A FIG. 8A Scenario continues with wearer of wearable computing device traveling to sports bar . At C of , utterance is received at wearable computing device . As shown in , utterance is “YogeeBeara says funny things.” 826 812 812 434 812 822 812 822 In correcting utterance , wearable computing device can determine a location of wearable computing device utilizing location sensor , as discussed above. Then, wearable computing device can determine the location is a location of a sports bar building; e.g., sports bar , and determine activities associated with the building. For example, wearable computing device can determine that sports, such as football, baseball, basketball, soccer, hockey, and drinking are activities associated with a sports bar such as sports bar . 812 826 822 812 816 Then, wearable computing device can determine corrections to utterance using a location-sensitive context that are based on both the location (e.g., sports bar ) and activities associated with the location (e.g., various sports, drinking, etc.). For example, in the context of a sports bar and the activity of “baseball”, wearable computing device can determine one or more baseball-related speech patterns. For example, a baseball-related speech pattern can indicate the word “YogeeBeara” that is part of utterance are likely related to “Yogi Berra,” who is a Hall of Frame baseball player known for colorful sayings. 800 812 828 826 828 FIG. 8A FIG. 8A At D of , wearable computing device can generate corrected text of utterance using the location-sensitive context and baseball-related speech patterns. shows corrected text as “Yogi Berra says funny things!” FIG. 8A 812 812 812 802 812 th In another example not shown in , wearable computing device can be at a university and capture an utterance of “LBJ wuz a pivotal figure of the 60s.” Upon determining that a university is associated with the location of wearable computing device , wearable computing device can determine one or more activities with the university as part of the location-sensitive context. For example, one activity associated with university could be United States history, among others. Wearable computing device can determine one or more speech patterns related to United States history can indicate the initials “LBJ” are likely related to “Lyndon B. Johnson”, who was the 36President of the United States. Indeed, this utterance provides context in by saying LBJ was “a pivotal figure of the 60s”, as Lyndon B. Johnson was U.S. President from 1963 to 1969. Examples of corrected text based on this utterance include: “LBJ was a pivotal figure of the 60s,” with spelling corrections only, “Lyndon B. Johnson was a pivotal figure of the 60s” with the expansion of the initials “LBJ”, and “Lyndon B. Johnson was a pivotal figure of the 1960s” with the expansion of the term “60s.” In some embodiments, this corrected text can be added to notes and/or other information about the activity at the university; e.g., a U.S. History lecture. 812 In other embodiments, user controls can be provided to instruct wearable computing device whether or not verbatim text capture is to be performed, initials and/or other terms are to be expanded, spelling and/or grammar corrections are to be applied, slang/jargon is to be converted to slang/jargon-free language, and other controls as well. FIG. 8A 822 822 812 812 822 As another example not shown in , at sports bar , an utterance of “LBJ just posterized #38 fer an and one” is captured. Upon determining that sports bar associated with the location of wearable computing device , wearable computing device can determine that basketball is associated with sports bar , and perhaps determine time-sensitive information such as a basketball game is being played. A basketball-related speech pattern can indicate the initials “LBJ” that are part of the utterance are likely related to “LeBron James”, the slang word “posterize” is likely related to dunking a basketball over another player, and the slang phrase “and one” relates to getting fouled as part of a successful shot and getting a free throw for the foul. As such, examples of corrected text of this utterance include “LBJ just posterized #38 for an and one,” “LeBron James just posterized #38 for an and one”, and “LeBron James just scored over #38 and was fouled during the score.” As yet another example, in some industries, industry-specific jargon is commonly used in the work place. As such, a wearable computing device can access information, such as industry-specific dictionaries and/or databases, to suggest corrections based on industry-specific jargon when located at a work place and/or when proximate to one or more identified co-workers. Such access to industry-specific information can be useful to employees learning work-related jargon while breaking into a new industry and/or to ensure jargon is used correctly. Many other examples are possible as well. FIG. 8B FIG. 8B FIG. 8B 830 830 832 834 838 830 842 844 shows an example scenario for error correction in accordance with an example embodiment. At A of , speaker associated with wearable computing device makes utterance of “Wazzup, Dawg?” At B of , speaker makes utterance of “Chillin' man.” 838 834 838 832 832 838 834 832 832 834 Upon reception of utterance , wearable computing device can identify a speaker associated with utterance (e.g., speaker ) using the techniques for verifying speech discussed above. Upon determining that speaker is associated with utterance , wearable computing device can generate a context that includes information about speaker , including speech patterns for speaker , related documents, information about location(s) associated with wearable computing device , and additional information. 844 834 842 834 832 842 832 842 834 Then, upon reception of utterance , wearable computing device can determine that another speaker (e.g., speaker ) is within range of wearable computing device . In some cases, a location-sensitive context can be used to account for both speakers and . For example, a location-sensitive context can indicate that speakers and are within a threshold distance, or proximity, of wearable computing device . 838 844 834 Upon receiving utterances and , wearable computing device can generate respective corrected text segments for each utterance. The corrected text segments can capture the text verbatim (modulo some spelling and perhaps grammatical corrections) or can apply corrections on a per-speaker basis. 830 1 846 840 834 846 846 1 2 1 2 846 834 1 842 2 846 a a a a a FIG. 8B At block C, corrected text segments are shown on lens/display of wearable computing device . Corrected text segments show text as captured verbatim without specific speaker identification. As shown in , corrected text segments include a first segment “S: Wazzup, Dawg?” and a second segment “S: Chillin', man.” The labels S and S in corrected text segments indicate speaker as unidentified speaker and speaker as unidentified speaker , respectively. That is, corrected text segments show that the speaker of the first segment differs from the speaker of the second text segment, but neither speaker is specifically identified. 830 2 846 840 834 846 846 1 2 846 834 842 b b b a FIG. 8B FIG. 8A At block C, corrected text segments are shown on lens/display of wearable computing device . Corrected text segments show text with speaker identification and taking into account speaker-specific speech patterns. As shown in , corrected text segments include a first segment “Bill: How are you doing, Joe?” and a second segment “Joe: Not bad, Bill.” The labels S and S in corrected text segments have been replaced by identification information for each speaker; e.g., identifying speaker as “Bill” and speaker as “Joe.” In some embodiments, replacement of identification information during text correction can be controlled as part of the user controls mentioned above in the context of . 834 834 842 834 844 Based on this identification of speakers, wearable computing device can correct text based on speaker-specific speech patterns. For example, suppose that Bill (speaker ) always says “How you doin', Dawg?” when he greets Joe (speaker ) and that Joe always makes a brief statement of condition (e.g., OK, Not Bad, Not my best, Chillin') in response. Thus, wearable computing device can infer or otherwise determine, such as by performing searches of data related to speech patterns, that “How you doin', Dawg” can be corrected to be “How are you doing?” or “How are you doing, Joe” once utterance has been identified to be associated with Joe. 834 846 846 FIG. 8B b b Similarly, wearable computing device can infer or otherwise determine that “Chillin' man” can be corrected to be “Not bad, Bill.” shows that second segment of corrected text segments with an underline font to clearly indicate that corrected text segment includes text from two separate speakers. As described above, other information, such as color, other fonts, font sizes, spacing, etc. can be used instead or as well as an underlined font to show indicate text from multiple speakers. 400 Speaker-specific speech patterns can be based on personal conversation histories. For example, suppose that wearer Ace of a wearable computing device, such as system , regularly converses with Bull, Cam, Dominic, and Eve and that Ace's conversations with Bull commonly involve the U.S. Civil War, Ace's conversations with Cam commonly involve photography, Ace's conversations with Dominic involve comparative religion, and Ace's conversations with Eve involve music. 400 400 During these conversations, system can maintain a history of terminology used as part of a personal conversation history between Ace and each of Ace's conversational partners. Then, upon hearing the utterance “cannon”, system can generate the appropriate corrected text. In these examples, for a conversation about the U.S. Civil War with Bull, the corrected text is likely to be “cannon” (a type of artillery piece used during the U.S. Civil War), for a conversation about photography with Cam, the corrected text is likely to be “Canon” (a manufacturer of cameras), for a conversation about comparative religion with Dominic, the corrected text is likely to be “canon” (the laws for the Roman Catholic Church) or “Kannon” (one name for a Buddhist bodhisattva), and for a conversation about music with Eve, the corrected text is likely to be “canon” (a composition with imitations of a melody each played after a given duration). Other examples of personal conversational histories are possible as well. 830 832 800 830 834 834 850 FIG. 8B FIG. 8B At D of , speaker is accompanied by a dog, Rover, as shown in . Scenario shows speaker composing a message using a speech interface to wearable computing device . During the composition of the message, speaker emits utterance of “Howz the dawg doin'?” 850 834 830 1 852 850 FIG. 8B a Upon receiving utterance , wearable computing device can generate respective corrected text segments for each utterance. As indicated at E of , corrected text segment for utterance is “How is the dog doing?” which includes spelling corrections for the words “Howz” and “dawg”. 834 832 832 834 832 In some embodiments, wearable-computing device can use determine that another entity, a dog named Rover, is proximate to speaker . For example, Rover may have an identifying chip, or speaker may have indicated that Rover is proximate by a previous utterance (e.g., “Come here, Rover.”) As such, wearable-computing device can maintain a location-sensitive context that includes the information that one dog, Rover, is proximate to speaker . 834 834 832 834 832 In some embodiments, wearable computing device can utilize social-networking and/or other network-available information (e.g., general and/or specialized search engines) to identify proximate entities. For example, wearable computing device can identify an image of Rover as an image of a dog and perform searches of social-networking and/or other network-available information about speaker and dogs. In this example, wearable computing device can determine that speaker is associated with a dog named Rover. 834 852 832 830 2 840 834 852 b b FIG. 8B Wearable computing device can generate corrected text segment based on this location-sensitive context and speech patterns of speaker . As shown at E of , display/lens of wearable computing device displays corrected text segment of “How is Rover doing?” FIG. 8C FIG. 8C 860 860 832 834 832 862 shows an example scenario for error correction in accordance with an example embodiment. At A of , the date is identified as December 21, and speaker , associated with wearable computing device , is proximate to a dog, Rover and a nephew, Alex. In this context, speaker emits utterance of “My dawg and nefew here should get toys from Sanda Claws.” 834 862 860 834 834 Wearable computing device can generate a corrected text segment based on utterance that take timing information, such as the day of the year, into account. For example, as the day of the year at A is December 21 which is four days before Christmas, wearable computing device can determine that text has a higher probability of Christmas-related words than at other times of the year. Then, as part of a context, wearable computing device can include a dictionary of seasonal or holiday-related words, such as “Christmas”, “Santa Claus”, “gifts”, etc. 860 834 834 860 1 834 864 FIG. 8A In scenario , wearable computing device can determine the input that the text of “Sanda Claws” on December 21 is likely to be “Santa Claus.” Also, wearable computing device can correct misspellings like “dawg” and “nefew.” Accordingly, at B of , wearable computing device is shown as having generated corrected text segment of “My dog and nephew here should get toys from Santa Claus.” 834 860 2 834 866 FIG. 8A In some embodiments, as discussed above, wearable computing device can take proximate entities into account as well, such as Rover the dog and Alex the nephew. After taking proximate entities into account at B of , wearable computing device is shown as having generated corrected text segment of “Rover and Alex should get toys from Santa Claus.” 860 832 834 832 872 FIG. 8C At A of , the date is identified as July 21, and speaker , associated with wearable computing device , is proximate to a dog, Rover. In this context, speaker emits utterance of “Rover gets sanda claws at the beach.” 860 834 834 860 834 834 Scenario has a date of July 21, which is during summer in the Northern Hemisphere. As such, wearable computing device can determine that a location of wearable computing device is within the Northern Hemisphere and that the season is summer. Taking the day of the year at C of July 21 into account, wearable computing device can determine that text has a higher probability of summer-related words than at other times of the year. Then, as part of a context, wearable computing device can include a dictionary of seasonal words, such as “sun,” “hiking,” “swimming,” “sand,” “beach,” “sun tan,” “boating,” etc. 860 834 874 860 840 834 874 FIG. 8C In scenario , wearable computing device can determine the input that the text of “sanda claws” on July 21 is likely to be “sandy claws” (or perhaps “sand in his claws”) and accordingly generate corrected text segment . At D of , display/lens of wearable computing device displays corrected text segment of “Rover gets sandy claws at the beach.” In other scenarios, information about current topics, news, or trends can be used in a context to correct text segments. For example, suppose a popular new singer, Singer YourA, was recently involved in an accident. Then, a wearable computing device can use public search information, such as trending searches from popular web sites, public electronic communications (e.g., tweets, blog entries, comments), news searches, and additional information to correct input text of “Did you know singer your A was in an accident?” to be “Did you know Singer YourA was in an accident?” Many other examples of correcting speech based on speech-patterns and contexts, including location-sensitive contexts are possible as well. Example Operation FIG. 9 FIGS. 4-8C 900 910 is a flow chart of an example method in accordance with an example embodiment. At block , inputs having a plurality of input types can be received at a wearable computing device. In some embodiments, the plurality of input types include speech, text entry, handwriting, and optical character recognition (OCR). Receiving inputs from a plurality of input types at wearable computing devices is described above with reference to at least . 920 FIGS. 4-8C At block , a text string corresponding to the inputs can be generated using the wearable computing device. The text string can include a plurality of segments, where each segment is associated with an input type of the plurality of input types. Generating text strings related to inputs is described above with reference to at least . 930 2 4 8 At block , the text string can be displayed using the wearable computing device. Displaying text strings is described above with reference to at least FIGS. and -C. FIG. 5A In some embodiments, displaying the text string includes: (a) associating a first color with a first input type of the plurality of input types, (b) associating a second color with a second input type of the plurality of input types, where the first and second input types differ, and where the first and second colors differ, (c) displaying each segment of the text string associated with the first input type using the first color; and (d) displaying each segment of the text string associated with the second input type using the second color. Displaying text strings distinguished by input type and/or source is described above with reference to at least . 940 FIGS. 4-8C At block , for a given segment of the text string, one or more corrected segments can be generated by applying an error-correction filter to the given segment using the wearable computing device. The error-correction filter can be configured to correct errors based on an input type associated with the given segment. Correcting errors using error-correction filters is described above with reference to at least . FIGS. 4-7 In some embodiments, the error-correction filter can be further configured to correct errors based on a given input source. In particular embodiments, the input type associated with the segment is speech, and the given input source is a speaker of the speech. Correcting errors based on given input types and sources is described above with reference to at least . FIGS. 8A-8C In other embodiments, the error-correction filter can be further configured to correct errors based on a location-sensitive context associated with the given segment. Correcting errors based on a location-sensitive context is described above with reference to at least . FIGS. 8B and 8C In particular embodiments, the location-sensitive context can include information about one or more entities proximate to a location of the wearable computing device, such as discussed above in more detail with respect to at least . FIG. 8B FIGS. 8B and 8C In some scenarios, at least some of the one or more entities are people. In particular of these scenarios the information about the one or more entities comprises information about one or more speech patterns of the people, such as discussed above in more detail with respect to at least . In other scenarios, the information about the one or more entities includes identification information about the one or more entities, such as discussed above in more detail with respect to at least . FIG. 8A FIG. 8A In other embodiments, the location-sensitive context can include information about one or more speech patterns associated with a location of the wearable computing device, such as discussed above in the context of . In some of these other embodiments, the location of the wearable computing device can be associated with a building, and the one or more speech patterns associated with the location can include one or more speech patterns associated with an activity associated with the building, such as discussed above in the context of . FIGS. 5A-7 In even other embodiments, the location-sensitive context can be associated with one or more documents. In these embodiments, displaying the least the one or more corrected segments can include: identifying a document of the one or more documents associated with a corrected segment of the one or more corrected segments, and updating the corrected segment based on information in the identified document. Contexts that include documents are discussed above in the context of at least . FIG. 8C In still other embodiments, the location-sensitive context can include information about current topics, news, and trends, such as discussed above in more detail with respect to at least . 950 FIGS. 5A-8C At block , at least the one or more corrected segments can be displayed using the wearable computing device. Displaying corrected segments is described above with reference to at least . FIGS. 5A and 7 In some embodiments, displaying the corrected segments includes displaying corrected segments associated with a first input type using the first color. Displaying distinguished corrected segments is described above with reference to at least . FIG. 8B In other embodiments, displaying the corrected segments includes: identifying a person of the one or more entities associated with a corrected segment of the one or more corrected segments and updating the corrected segment based on the speech pattern of the identified person, such as discussed above in more detail in the context of at least . FIG. 8B FIG. 8B In still other embodiments, displaying the corrected segments includes: identifying an entity of the one or more entities associated with a corrected segment of the one or more corrected segments; and updating the corrected segment based on the identification information about the entity, such as discussed above in more detail in the context of at least . In particular of the still other embodiments, updating the corrected segment based on the identification information about the entity includes inserting at least part of the identification information into the corrected segment, such as discussed above in more detail in the context of at least . In even other embodiments, displaying the corrected segments includes: identifying a location associated with a corrected segment of the one or more corrected segment and updating the corrected segment based on a speech pattern of the one or more speech patterns associated with the location. FIGS. 5A and 7 Displaying distinguished corrected segments is described above with reference to at least . In further embodiments, the location-sensitive context comprises a phrase associated with the time of the year. In these further embodiments, displaying the least the one or more corrected segments can include: (a) determining that the time of the year is associated with a corrected segment of the one or more corrected segments, (b) determining that the phrase associated with the time of the year is also associated with the corrected segment, and (c) updating the corrected segment based on the phrase associated with the time of the year. 960 FIGS. 4-5C At block , a corrected segment of the one or more corrected segments can be selected using the wearable computing device. For example, a manual correction technique can be used for selecting a corrected segment. Selecting corrected segments is discussed above with reference to at least . 970 FIGS. 4-8C At block , a corrected text string comprising the selected corrected segment can be displayed using the wearable computing device. Displaying corrected text strings is discussed above with reference to at least . The above detailed description describes various features and functions of the disclosed systems, devices, and methods with reference to the accompanying figures. In the figures, similar symbols typically identify similar components, unless context dictates otherwise. The illustrative embodiments described in the detailed description, figures, and claims are not meant to be limiting. Other embodiments can be utilized, and other changes can be made, without departing from the spirit or scope of the subject matter presented herein. It will be readily understood that the aspects of the present disclosure, as generally described herein, and illustrated in the figures, can be arranged, substituted, combined, separated, and designed in a wide variety of different configurations, all of which are explicitly contemplated herein. With respect to any or all of the ladder diagrams, scenarios, and flow charts in the figures and as discussed herein, each block and/or communication may represent a processing of information and/or a transmission of information in accordance with example embodiments. Alternative embodiments are included within the scope of these example embodiments. In these alternative embodiments, for example, functions described as blocks, transmissions, communications, requests, responses, and/or messages may be executed out of order from that shown or discussed, including substantially concurrent or in reverse order, depending on the functionality involved. Further, more or fewer blocks and/or functions may be used with any of the ladder diagrams, scenarios, and flow charts discussed herein, and these ladder diagrams, scenarios, and flow charts may be combined with one another, in part or in whole. A block that represents a processing of information may correspond to circuitry that can be configured to perform the specific logical functions of a herein-described method or technique. Alternatively or additionally, a block that represents a processing of information may correspond to a module, a segment, or a portion of program code (including related data). The program code may include one or more instructions executable by a processor for implementing specific logical functions or actions in the method or technique. The program code and/or related data may be stored on any type of computer readable medium such as a storage device including a disk or hard drive or other storage medium. The computer readable medium may also include non-transitory computer readable media such as computer-readable media that stores data for short periods of time like register memory, processor cache, and random access memory (RAM). The computer readable media may also include non-transitory computer readable media that stores program code and/or data for longer periods of time, such as secondary or persistent long term storage, like read only memory (ROM), optical or magnetic disks, compact-disc read only memory (CD-ROM), for example. The computer readable media may also be any other volatile or non-volatile storage systems. A computer readable medium may be considered a computer readable storage medium, for example, or a tangible storage device. Moreover, a block that represents one or more information transmissions may correspond to information transmissions between software and/or hardware modules in the same physical device. However, other information transmissions may be between software modules and/or hardware modules in different physical devices. While various aspects and embodiments have been disclosed herein, other aspects and embodiments will be apparent to those skilled in the art. The various aspects and embodiments disclosed herein are for purposes of illustration and are not intended to be limiting, with the true scope and spirit being indicated by the following claims. BRIEF DESCRIPTION OF THE FIGURES FIG. 1 is a first view of an example system for receiving, transmitting and displaying data, in accordance with example embodiments. FIG. 2 FIG. 1 is a second view of the example system of , in accordance with example embodiments. FIG. 3 is an example schematic drawing of computer network infrastructure, in accordance with an example embodiment. FIG. 4 is a functional block diagram for a wearable computing system, in accordance with an example embodiment. FIG. 5A depicts a first scenario of error correction in accordance with an example embodiment. FIGS. 5B 5 5 , C, and D depict processing by an error correction module for the inputs received in the first scenario in accordance with an example embodiment. FIG. 6 depicts a second scenario of error correction in accordance with an example embodiment. FIG. 7 depicts a third scenario of error correction in accordance with an example embodiment. FIG. 8A depicts a fourth scenario of error correction in accordance with an example embodiment. FIG. 8B depicts a firth scenario of error correction in accordance with an example embodiment. FIG. 8C depicts a sixth scenario of error correction in accordance with an example embodiment. FIG. 9 is a flow chart of a method in accordance with an example embodiment.
Join us for this special Insight into Industry: Networking with BAME professionals Careers Panel. This event aims to inspire minority ethnic students to consider careers in various sectors. Our panel includes speakers from different career backgrounds, who will chat to us about opportunities and challenges, plus their experiences breaking into their chosen professional fields. Join us and our industry experts will: - Discuss different career pathways - Talk about experiences in different industries - Live Q&A About the speakers: Bayo developed his own Business Coaching & Mentoring Practice. He focuses on helping people attain their professional goals through a carefully structured, two-way dialogue, which encourages self-awareness and self-empowerment—enabling people to uncover their own solutions to whatever obstacles are holding them back. Maria – Programme leader for BA (Hons) Early Years education. Her experience and area of specialism is children and families with a keen interest and passion in understanding behaviour – the psychology – ‘why we do what we do’. She is passionate about helping others to be the best they can be; supporting them with understanding their Self and their actions through reflexive practice. Helping students to become more self-aware; developing their confidence in a democratic and facilitative learning environment where voices are heard, respected and acted upon to allow for all learning styles to be fostered. A humanist approach to understanding and embracing neurodiversity. With more panelists to be announced!
https://www.accesshe.ac.uk/events/insightintoindustry/
From the COVID vaccine to pulsars to computer programming, women are at the source of many scientific discoveries, inventions and innovations that shape our lives. But in the stories we’ve come to accept about those breakthroughs, women are too often left out. Each season at Lost Women of Science, we’ll look at one woman and her scientific accomplishment: who she was, how she lived and what she found out. Katie Hafner, a longtime reporter for the New York Times, explains the science behind each woman’s work and explores the historical context in which she lived. Our first season, “The Pathologist in the Basement,” is all about Dorothy Andersen, a physician and pathologist who solved a medical mystery when she identified and defined cystic fibrosis in 1938. A passionate outdoorswoman, a “rugged individualist” and a bit of an enigma, Andersen changed the way we understand acute lung and gastrointestinal problems in young children. This podcast is distributed by PRX and published in partnership with Scientific American. LISTEN TO THE PODCAST EPISODE TRANSCRIPT SOPHIE MCNULTY: Okay. Are you ready? I’m recording. Just started. Okay. So can you just tell me where we’re going? MICHELLE ORES: We’re going down to the basement where my mother kept her medical files. SOPHIE MCNULTY: Did you guys move them here once she retired? MICHELLE ORES: Yes, we did. Here are the files. They’re alphabetized by patient last name. [Rustling noises] I’m just gonna take out the whole box, make it easier. Okay. This will be a good one. This patient here. KATIE HAFNER: I’m Katie Hafner. Welcome to Lost Women of Science, a podcast where we unearth stories of extraordinary female scientists who haven’t received the recognition they deserved. This is season one, about the life and work of Dr. Dorothy Andersen. She was a physician and pathologist at Columbia University. And she was the first to identify cystic fibrosis in the 1930s. Dorothy Andersen had a lot of firsts to her name. She was the first physician to diagnose a living patient with Cystic Fibrosis–essentially a death sentence at the time. She was the first to come up with a simple diagnostic test for CF. She was the first to come up with treatments to extend the life of CF patients, and she was the first to recognize that CF was a genetic disorder. Despite all that, she’s not a household name. Though some people are familiar with the broad strokes of her medical accomplishments, some of the most fundamental aspects of Dorothy Andersen’s life remain a mystery. And something about that just didn’t sit right with me. Our reporting team—which consists pretty much of me and our associate producer, Sophie McNulty—looked all over the place for any relics of Dorothy Andersen’s life. We looked for letters she might have written. We looked for her manuscript drafts. And we hit a lot of dead ends. But then… [Phone rings] SOPHIE MCNULTY: Hello? KATIE HAFNER: Hi. Are you still in the basement? SOPHIE MCNULTY: Yes, I am. KATIE HAFNER: That’s Sophie. She’s in a basement in Northern Connecticut. SOPHIE MCNULTY: And I just came across, in a box that was unmarked and off to the side, two folders labeled “Dorothy Andersen.” KATIE HAFNER: Sophie’s in a house that belongs to Michelle Ores, the daughter of Dr. Celia Ores who worked with Dr. Andersen in the 1960s. And, lucky for us, Michelle kept all the medical files from her mother’s decades-long career. SOPHIE MCNULTY: The first is full of notes it looks like from the 1960s that Celia took when she was working for Dr. Andersen, and the other one is definitely clearly related to Dorothy Andersen. As soon as I open it, I see a photo of Dorothy. And then there’s this note followed by chapters, and it says, “Dear Dr. Ores, here’s the first section of my book about Dorothy Andersen. I’d very much appreciate it if you could find the time to read it, and then let me have your criticisms, corrections, additions, et cetera. Just give me a ring when you’re ready.” It’s by Libby Machol. And it’s a biography of Dorothy Andersen, MD. She must never have published it. KATIE HAFNER: Yeah, she must never have published it. KATIE HAFNER: So were the answers to all of our questions about Dorothy’s life just sitting in a basement the whole time? And what about Libby Machol’s hard work? Why was this biography just left to sit in a damp basement with sports equipment and lawn chairs? Claire Tomalin, a prominent biographer once wrote, “Biographers search for traces, for evidence of activity, for signs of movement, for letters, for diaries, for photographs.” And what she was saying was this: That to put together the puzzle of someone’s life, you have to excavate—to bring to light what was long buried. In this episode, we’re going to home in on people we’ve found who did just that—they went out digging and then carefully strung together the pieces of Dorothy Andersen’s life. Libby Machol is one of these excavators. Her manuscript is titled AHEAD OF HER TIME, which is totally true, and it paints a colorful portrait of Dorothy Andersen’s life—especially her college days at Mount Holyoke. Libby Machol wrote the manuscript in the 1970’s when a lot of Dr. Andersen’s friends and colleagues were still alive. Machol died about 25 years ago. And we couldn’t find any record of the full biography, but we did find one person who knew Libby Machol. KATE DOMINUS: My name is Kate Dominus, and I am Libby Machol’s granddaughter. KATIE HAFNER: So, um, you did not know that she was writing this biography. You had no clue. KATE DOMINUS: I had no clue, but I’m not surprised. Uh, my grandmother would often take on projects that interested her and write a few spec chapters and a table of contents, and then try to shop it around and see if anybody was interested. KATIE HAFNER: Do you know how many of these she did? KATE DOMINUS: I probably would guess about a half dozen. KATIE HAFNER: That’s pretty amazing. I mean, to get that far into a non-fiction book and just sort of throw it at the wall and see if it sticks. KATIE HAFNER: I’d love you to read these two paragraphs. On page 48… “on her return to college, a short time later…” KATE DOMINUS: Okay: “Throughout her college years, Dorothy was a self-appointed saleswoman for outdoor exercise and the wonders of the natural world, forever trying to involve the intellectuals around her in her strenuous pursuits. One winter morning, she persuaded Edith to join her for an early breakfast of bacon and eggs. IN THE SNOW.” All the while she was building the fire and cooking the meal, she talked about the joys of fresh morning air. In the spring, she organized expeditions to collect frogs and skunk cabbages for the lab.” KATIE HAFNER: I can’t get over this idea of dragging your friends out of bed to have breakfast in the snow. It’s clear Dorothy Andersen was not, by any stretch of the imagination, conventional—and evidence of that is all over the Machol biography. KATE DOMINUS: “Dorothy Andersen had always liked using her ingenuity to create what she couldn’t afford to buy. A few years earlier, she had yearned briefly over some high-priced camping equipment at Abercrombie and Fitch, concluding that it was much too expensive, and set about copying it. She concocted a custom-made sleeping bag—filled with down and neatly sewn by hand, its knots securely tied with the one-handed technique she had learned as a surgical intern. KATIE HAFNER: I mean imagine having your eye on something in an outdoor equipment catalog all year long and finally just deciding, nah, it’s too expensive. I’ll just make it! With all of these anecdotes, I’m seeing this pattern of a person who truly does take matters into her own hands, whether you’re talking about her life or her work. She was ingenious in the lab too, building things like a constant-temperature water bath, years before such a thing was a standard piece of lab equipment. KATE DOMINUS: “Dorothy Andersen’s colleagues were divided in their reactions. Her admirers praised her originality and daring. Her detractors were outraged. They considered her undignified. They believed she did a disservice to her profession and particularly to women doctors by lowering herself to work with her hands ‘like a common laborer.’” KATIE HAFNER: Ok, can I just stop and say this has made me just love Dorothy Andersen…I mean the “common laborer” who lowered herself to work with her hands. But there’s one thing Kate Dominus has no answer for—and maybe no one who’s still alive knows the answer to this—and that’s why her grandmother decided to write an entire book about Dorothy Andersen’s life. Did Andersen’s unusual and extraordinary life just spark some interest in Machol? While reading the biography, I was also struck by something that might seem simple or obvious: so many people from Andersen’s life were still alive in the early 1970s, and Libby Machol interviewed a bunch of those people. I was in high school in the 1970s. I’d been imagining Andersen’s life as ancient history, but reading that manuscript made Dorothy Andersen seem almost like a contemporary. There’s just one problem with Libby Machol’s biography, and it’s a pretty big one: It stops on page 67. Maybe she shopped those pages around and no one wanted to publish it. We really have no idea. But we do know that all we could find was 67 pages. The unfinished manuscript suddenly cuts off in 1927, the year Dr. Andersen had a prolonged attack of infectious hepatitis. The last scene of the manuscript is special—it’s a perfect example of Dorothy Andersen’s lemonade-out-of-lemons style. She writes that getting sick turned out to have been quote, “a most fortunate circumstance” since it quote “resulted in orders to cease work for a year.” And she wrote, “since loafing in Europe was much more interesting and no more expensive at that time than convalescence in the USA, I spent the following year in France and Italy, learning the languages, looking at pictures, pursuing my hobby of sketching, and being laid up in friendly but not always comfortable little hotels at odd places by recurrences of jaundice.” And that’s it, ending on page 67, in the middle of the page. What a tease from Libby Machol. Coming up, we’ll dig still deeper in the search for threads to a life. I’m Katie Hafner and this is Lost Women of Science. [AD BREAK] After reading Libby Machol’s vexingly unfinished manuscript and talking to her granddaughter Kate, I turned, once again, to archives—this time, at Columbia, where Dorothy Andersen worked for more than 30 years. And completely by accident, once again, I stumbled upon another excavator—someone else determined to stitch together Dr. Andersen’s life. SCOTT BAIRD: I’m in the archives, which is the basement of the library, the Hammer Health Sciences Library at Columbia University Medical Center, right near where the George Washington Bridge comes into Manhattan. We are right across the street from Babies Hospital. KATIE HAFNER: Okay, so here’s how this happened. For months, I’d been pestering the main archivist at Columbia to let us into the archives to see what there was on Dorothy Andersen. At one point during this pester-fest, he mentioned that there was someone at Columbia who was writing a biography of Dorothy Andersen. And he’d been doing it for a few years. That person is Scott Baird. SCOTT BAIRD: So this box is a box about, oh, four inches deep with file folders. And that’s the extent of, essentially of the information about Dorothy Andersen in the archives. KATIE HAFNER: Scott Baird is not someone who would strike you as a biographer. He has a really demanding full time job doing something completely different. He’s a critical care physician at Columbia University and he spends his time working in the pediatric intensive care unit there. But working on Dorothy Andersen’s biography has become Scott’s grand obsession. Most of Dr. Andersen’s friends and colleagues have died, so there are really very few crumbs for Scott to follow. And so his hunt for clues into Andersen’s life, it’s taken him all over the place. SCOTT BAIRD: It was a day in February, a couple of years ago. I went to this warehouse in the Bronx where many of the records from the early part of the century were kept. I just sort of wandered around like Raiders from the Lost Ark [sic], looking for books or boxes or labels or anything. I came across some autopsy reports from the late 1920s. And I said, well, maybe I’ll get lucky. And indeed I did. KATIE HAFNER: One of those autopsy reports that Scott Baird found was from 1929 and it was done by a 28-year-old, newly arrived assistant pathologist named Dorothy Andersen, who had graduated from medical school a couple of years earlier. So the report she wrote in 1929 described a 34-year-old man who had died of pneumonia, but here’s the interesting part: everything about that autopsy pointed to cystic fibrosis. SCOTT BAIRD: She had actually seen somebody who had CF, an adult, and described it pretty vividly. And I suspect that that somehow colored her responses later on, five years later, when she saw the first case of a child, I think it, it affected the way she saw that severe degree of lung disease, pancreatic involvement, and, and put it together. KATIE HAFNER: With so little material to work with, Scott Baird turned to Dr. Andersen’s published papers. And there are a lot of them. In fact, over the course of her career, which was not terribly long, she published more than 80 papers starting in 1926 when she was still a medical student at Johns Hopkins, all the way up until shortly before she died in 1963. A few more papers were even published posthumously, finished by the team she’d been working with. Although she’d dip in and out of other pediatric subspecialties over the years, she always came back to her first passion, cystic fibrosis. In fact, in late 1938, the same year she identified the disease, Dr. Andersen created the first cystic fibrosis diagnostic test—and it was very involved. She had to insert a tube down the throats of children to check for pancreatic enzymes in their intestines. Pancreatic enzymes by the way, those are the ones that break down food. But in CF patients those enzymes don’t reach the intestines. And this brand new test required brand new tools. So Dr. Andersen again tapped into that same DIY ingenuity that inspired her to make sleeping bags, according to Libby Machol, and she designed and built a piece of equipment to give the test to toddlers and even to newborns. Here’s Kate Dominus again reading her grandmother’s work. KATE DOMINUS: “After a certain amount of trial and error, Dr. Andersen constructed a tube, which she described as ‘highly satisfactory,’ of No.12 French catheter tubing, to which a dumbbell-shaped metal tip was attached by means of silk thread. Now at last she was ready to begin.” KATIE HAFNER: I spoke with Scott for hours about all this, picking his brain on the research he’d compiled on Dorothy Andersen’s career. And then, a few hours into one of our conversations, he said something about the work she and her colleagues did in the 1940’s and 50’s that caught me completely off-guard. SCOTT BAIRD: It took me a while, because I’m kind of a slow learner, but I finally figured out, wait a second, there’s an alternative story here. KATIE HAFNER: Okay, this alternative story took me down a rabbit hole. To understand what happened, there are two important things you need to know. Number one: in 1944, Dorothy Andersen hired a young doctor from Italy named Paul di Sant’Agnese. SCOTT BAIRD: He was hired principally to help take care of, I think, Dorothy Andersen’s outpatient clinic of CF patients. But she then proceeded to mentor him, I think over the next six or seven years. KATIE HAFNER: He was talented, he was young and he was ambitious. And I’ll get to why he’s important in this story in a minute. But first: the second thing I want to describe is a heat wave that hit New York in 1948. NEWSCASTER: As the record breaking heat wave blanketed most of the nation, temperatures crowded the hundred mark for days… KATIE HAFNER: In late August of that year, long before most people had air conditioning, a heat wave swept through the country from Minnesota to the Gulf of Mexico. New York City was hit especially hard with record breaking temperatures of 101. Infant mortality doubled. And in the space of a week, several children came to Babies Hospital with heat exhaustion. Their stories were all the same. After exposure to heat, these children suddenly began vomiting and perspiring.They were listless, irritable, and dehydrated. Mothers complained of their “sunken eyes.” And even though they were receiving fluids, their bodies were not reabsorbing electrolytes And it turned out, that of the dozen or so patients that came in… SCOTT BAIRD: …at least five of them had cystic fibrosis. And that suggested to Dorothy Andersen, that there was something in this. She had a sixth sense about this disease that enabled her to sort of pick out, I think, important clues. And so she suggested that it was possible since it appeared to be a disease involved in a variety of glands, that it also involved sweat glands. And she’s suggested that these patients were becoming depleted of a specific electrolyte or several electrolytes, either through vomiting or through sweat or through both. KATIE HAFNER: We now know that cystic fibrosis is caused by a mutation in a gene. This specific gene codes for something called a chloride channel. Chloride channels are gatekeepers that sit in the cell membrane and usher chloride, an electrolyte, in and out of cells. This allows your body to control the flow of water. Because cystic fibrosis patients have faulty or absent chloride channels, water doesn’t move in and out of cells the way it’s supposed to, and electrolytes are not reabsorbed to the same extent that they are in healthy people. This problem leads to things like thick sticky mucus and extra salty sweat. In fact, centuries ago, there was a saying: “Woe is the child who tastes salty from a kiss on the brow for he is cursed and soon must die.” Which is to say that the connection between salt and fatal illness was known, but it wasn’t understood. And all the way into the 1980’s, a salty kiss could still speak volumes to a discerning physician. In 1987, Ginny Hughes brought her two-year-old daughter, Mallory, to Dr. Celia Ores, who’d been a mentee of Dorothy Andersen’s. GINNY HUGHES: All she did was kiss my baby and she knew. She could taste it on her lips. KATIE HAFNER: Here’s CF patient Sara Kominsky. SARA KOMINSKY: And you could actually visualize the white salt crystals on my skin. Yeah, you could actually draw little pictures in the, the salt and electrolytes. KATIE HAFNER: And eventually the link that was made between CF and sweat led to a new diagnostic tool. Here’s Brian O’Sullivan, a pediatric pulmonologist from Dartmouth. BRIAN O’SULLIVAN: This heat wave that children were having excess of salt losses in their sweat and getting dehydrated and having low sodium and chloride values in their blood. And that led to development of what’s called the sweat test, which really took the place of that putting the tube down the throat and getting samples of the secretions and the duodenum for making the diagnosis. KATIE HAFNER: Instead of that incredibly invasive and uncomfortable procedure, the sweat test simply required collecting sweat from somewhere on a patient’s body. And the sweat test remains one of the most important developments in the history of cystic fibrosis. And the doctor credited with the development of the sweat test as well as the discovery of the link between cystic fibrosis and sweat is none other than Paul di Sant’Agnese, Dorothy Andersen’s mentee. That’s the doctor we told you to keep in mind. Now back to this alternative story. Here’s Scott Baird again: SCOTT BAIRD : And when I, when I would go to the Internet and look up, for instance, the sweat tests, the series of papers on CF sweat testing, which came out in 1953, they all talked about di Sant’Agnese, and di Sant’Agnese mentions that it was his paper in November of 1953, which was the beginning of a new paradigm in the care for CF. And then I finally went back to the paper itself in ‘51 about the heat prostration. And then I went to the three papers about CF sweat. And I, it took me a while because I’m kind of a slow learner, but I finally figured out, wait a second, there’s an alternative story here. KATIE HAFNER: In order to understand who should really get credit for the discovery of the CF sweat abnormality, let’s look at the written record. Here we go. In 1951, three years after the 1948 heat wave, Dorothy Andersen and Walter Kessler, a pediatric resident at Babies Hospital, published a paper on heat exhaustion in CF patients. SCOTT BAIRD: She, along with Walter Kessler, wrote up this series, and really provided, I think, a new paradigm for cystic fibrosis. This is really Dorothy speaking. Walter Kessler was a resident at the time, a physician in training. She suggested in the text that the sweat glands, as well as the glands of the pancreas and other organs, are inadequate in function in cystic fibrosis. KATIE HAFNER: Andersen and Kessler were the ones who suggested that cystic fibrosis affected not just the pancreas and not just the lungs, but maybe the sweat glands, too. This was a pivotal moment in the history of the disease–Andersen and Kessler had made the initial connection between CF and sweat. And this is important, because it led to the radical change in diagnostic testing, and also because it led to a better understanding of how this disease actually works. But, when it came to learning about sweat, this 1951 heat exhaustion paper was just the start. Two years later, in 1953, three additional studies came out examining what makes CF sweat so unique. So we have these 3 papers. They were all written in 1953. Their methods and results were very similar. And they all conclude that CF patients have considerably more chloride in their sweat. What’s different is that only one of the papers lists Dorothy Andersen as an author. Paul di Sant’Agnese is an author on all three. Here’s Scott Baird again: SCOTT BAIRD: What’s the difference between those two papers in the first one? There’s more CF patients. But the key here is, I think, the November, 1953 study, according to several CF researchers who put together histories of CF the November, 1953 study by di Sant Agnese was the main paper quoted as describing the sweat electrolyte abnormality. That study was also described in a history of CF research, undoubtedly, the most important advance in the understanding of CF up to that time. KATIE HAFNER: It makes sense that this later 1953 sweat study is the paper cited—it was a more in-depth study and it was published later. But because of this academic norm, Paul di Sant’Agnese gets all the credit. And in articles and books that summarize this time period in cystic fibrosis, Dorothy is almost entirely left out. SCOTT BAIRD: She’s rarely recognized as the person who was really behind that whole approach towards CF. And I think she deserves credit. KATIE HAFNER: So to summarize: Dorothy Andersen was part of this research from the get-go—she was pivotal to the 1951 heat exhaustion paper and the first 1953 sweat study. These two papers introduced the idea that CF patients had a sweat abnormality. But at the end of the day, it’s Paul di Sant’Agnese’s name that’s remembered. For Scott Baird, this realization was startling. SCOTT BAIRD: And then I was thinking about that for a while and serendipitously read something somewhere about the Matilda effect. KATIE HAFNER: The Matilda Effect is a term coined by historian of science Margaret Rossiter in 1993. Rossiter named this effect after Matilda Joslyn Gage, who was a suffragist and abolitionist, and she wrote a pamphlet in 1870 called “Woman As Inventor.” In that pamphlet, Gage wrote: “Although woman’s scientific education has been grossly neglected[…]some of the most important inventions of the world are due to her.” The Matilda Effect basically describes just that: how women in science have been overlooked because many of their discoveries and breakthroughs were instead attributed to men. SCOTT BAIRD: And a bell rang in the back of my mind. And I said, wait a second, that’s what happened to Dorothy Andersen. And that was the beginning of a different take on the whole story. I started to realize that that was probably the case. In later years, di Sant’Agnese was prone to minimize Dorothy’s contributions. And as I added up all this data in my head, it gradually became clear that her place had been ignored. KATIE HAFNER : This matters. And it matters because it’s how historical details become embedded in textbooks, in Internet searches, and eventually those details come to create a general understanding of the origins of a discovery, say, or an invention. And the Matilda Effect means someone else gets credit and that someone else is a man. This in turn often gives way to what’s known as the Great Man Theory of History, where one person, most often a white man, is given credit for a historical breakthrough. And this view—this Great Man theory of history—it lacks nuance. It doesn’t acknowledge the way science really works, with teams of people pushing forward new ideas. Paul di Sant’Agnese was Dorothy Andersen’s teammate. But over history, it’s his name alone that’s attached to the link between CF and sweat . The mechanisms of the Matilda Effect, how it chips away at women’s contributions—they can be hard to see. Does one man seize the credit, or is it more insidious than that— are we all more prone to give credit to a man? SCOTT BAIRD: But it certainly suggests to me that something wasn’t quite right. KATIE HAFNER: Paul di Sant’Agnese died in 2005, but his son, Anthony, also a physician, is still alive, retired from the University of Rochester. I tracked down Anthony di Sant’Agnese’s email address and sent him several emails. But never heard back. SCOTT BAIRD:Remember, she was his mentor and there was a heritage there—Dorothy’s own mentor to Dorothy and then presumably di Sant’Agnese. And that heritage was, how do we do research? How do we think about medical problems? How are we honest in this profession that we’ve taken? KATIE HAFNER: In reality, there are no soloists in science. Science is a community effort, and insights are passed down from one generation to the next. Dorothy Andersen was no exception. She came from a long line of scientists. Her mentor was a doctor named Florence Sabin, who among other things was the first woman to work as a full professor at Johns Hopkins. That was in 1917. Florence Sabin’s mentor was William Osler. Osler was one of the founders of John Hopkins Hospital and one of the most important figures in the history of modern medicine. A single scientist just can’t claim sole credit for a discovery because their predecessors have contributed years of insights, paving the way for a breakthrough. But this goes both ways: it also means scientists can claim a role in all the work they inspire in turn. SCOTT BAIRD: And Andersen, I think, felt the responsibility of continuing to pass down that heritage to the next generation. And she attempted to do that for several of her physicians in training. KATIE HAFNER: We’re beginning to get the idea that there was very little that was more important to Dorothy Andersen than passing on what she knew. Here’s Kate Dominus again, reading her grandmother’s unfinished biography. KATE DOMINUS: “She confided to the leader of the Student Volunteers, ‘Doctors aren’t as important as teachers. The most they can do is keep people alive. Teachers train character: the heart and the mind. Years later, when young doctors from all over the world came to study in her laboratory, she would urge them to teach what they had learned to their colleagues when they went home, saying that doctors touched the lives of only a few patients directly unless they did teaching in addition to treating patients. ” KATIE HAFNER : I think it’s important here that Dorothy Andersen was not greedy with her discoveries, and in fact, spreading the word about cystic fibrosis became part of her mission. She taught not only her fellow doctors how to treat cystic fibrosis patients, but also parents. And these families remained in touch with Dr. Andersen for years. MONTAGE: Dear Dr. Andersen…it’s high time you had a report of P…He has had very few attacks of the tonsilitis kind, I’m glad to say…He now has three formed stools per day… His usual trouble is a rise in temperature to 101, 102… You are an extra parent to these children… At checkup a few weeks ago, she weighed…with my deep affection and true appreciation… Always. KATIE HAFNER: : For someone without any immediate family, for someone who wrote a question mark when she was asked to think of an emergency contact, Andersen really wasn’t alone. She had plenty of human connections, but they were with patients, with colleagues, with mentors and mentees—all of the people her work brought into her life. Something about Dorothy Andersen drew people in. She lived a solitary life, but she was beloved by patients, by many of her colleagues, and by friends. And all of that combined has piqued the interest of people who never met her. People like Libby Machol and Scott Baird. They became obsessed, turning over every stone to get to the heart of who she was. I’ve also fallen prey to this consuming passion. I started this whole podcast series because I wanted to tell her story. Her tenacity, her creativity, her quirky Scandinavian stoicism—remember those breakfasts in the snow—all of that is undeniable. But, her story…it’s still filled with so much mystery. And that’s made me just go down this rabbit hole…the same kind of rabbit hole that Scott Baird and Libby Machol went down. It’s a pull to understand this incredible woman. And the pull has just grown stronger. Here’s Scott Baird again: SCOTT BAIRD: Much of the reason why I am trying to pursue this biography is because of the events surrounding the ‘51 heat prostration paper and the ‘53 sweat study. And it just seems to me that credit has not gotten through to Andersen’s memory. One of the interesting things about Dorothy is, it’s clear from reading these letters, at least to me, that she was an effective, caring, practical, and extraordinary clinician. It’s not easy to advance medical knowledge and to be providing care for patients at the same time. That’s a pretty amazing thing in my estimation. KATIE HAFNER: Dorothy Andersen was recognized and respected in her lifetime, but the Matilda Effect took control of her legacy. The best illustration of this might be her portrait, which was commissioned either late in her life or shortly after she died in early 1963. It was unveiled two months after she died, and a newspaper clipping from that time shows that it was to be hung in Babies Hospital. And we know that it did hang there, at least for a time. But now, the portrait isn’t there. In fact, it’s nowhere to be found. In our next episode, Scott Baird goes looking for it. [Street sounds] SCOTT BAIRD: I’ve come to Columbia Hospital, Columbia University Medical Center’s Morgan Stanley Children’s Hospital. And I’m looking to see if I can track down the portrait of Dorothy Andersen… KATIE HAFNER: Next time on Lost Women of Science: The Case of the Missing Portrait. Credits This has been Lost Women of Science. Thanks to everyone who made this initiative happen, including my co-executive producer Amy Scharf, senior producer Tracy Wahl, associate producer Sophie McNulty, composer Elizabeth Younan, and technical director Abdullah Rufus. We’re grateful to Jane Grogan, Mike Fung, Susan Kare, Scott Baird, Brian McTear, Alison Gwinn, Bob Wachter, Nora Mathison, Robin Linn, Matt Engel, Cathie Bennett Warner, Maria Klawe, Jeannie Stivers, Nikaline McCarley, Bijal Trivedi, and our interns, Kylie Tangonan, Baiz Hoen, and Ella Zaslow. Thanks also to the Mount Holyoke archives for helping with our search, to Paula Goodwin, Nicole Schilling and the rest of the legal team at Perkins Coie, and to Harvey Mudd College, a leader in exemplary STEM education. We’re also grateful to Barnard College, a leader in empowering young women to pursue passion in STEM as well as the arts, for support during the Barnard Year of Science. Thanks to Emily Quirk and Jim Schachter at New Hampshire Public Radio, where this podcast was recorded. Lost Women of Science is funded in part by the Gordon and Betty Moore Foundation, Schmidt Futures and the John Templeton Foundation, which catalyzes conversations about living purposeful and meaningful lives. This podcast is distributed by PRX and published in partnership with Scientific American. Thank you so much for listening. I’m Katie Hafner.
https://www.talnetsystems.com/lost-women-of-science-episode-2-the-matilda-effect.html
The Cambodian government’s decision to reject plans for a resort complex next to Angkor Wat stands in stark contrast to another project threatening one of Southeast Asia’s UNESCO World Heritage sites. The Luang Prabang dam in Laos poses huge risks to the ancient capital, and the case of Cambodia’s “Angkor Lake of Wonder” may offer advocates a way forward. Editorial The Cambodian Ministry of Culture and Fine Arts announced on March 23 that it has rejected a proposal to build a theme park and resort less than a kilometer from the Angkor Wat temple complex, a UNESCO World Heritage site. Last November, casino operator NagaCorp had announced plans for the “Angkor Lake of Wonder”, a US$350 million 75-hectare development that the company had compared to Disneyland. The company said the resort would not include any gambling facilities. “It impacts [the] environment and the heritage, so we do not allow [it],” Sum Map, secretary of state for the Ministry of Culture and Fine Arts, told the independent news network CamboJA. “The government’s stance is to protect the value of Angkor, so any project that impacts Angkor or the environment will not be allowed.” NagaCorp owns Cambodia’s largest gambling resort, NagaWorld, and holds exclusive rights to operate casinos in Phnom Penh. Gambling is illegal for all Cambodian citizens but permitted for foreigners in select contexts. The river Mekong at Luang Prabang. Photo: Skylar Lindsay The government’s decision is notable in part because of the contrast to a controversial plan that threatens another of Southeast Asia’s prominent UNESCO World Heritage sites, the ancient Lao capital of Luang Prabang. The government of Laos is pushing ahead with the construction of a large hydropower dam just upriver from Luang Prabang on the mainstream of the Mekong river. In February, UNESCO requested that Laos carry out a new assessment of the dam’s impacts, including a risk analysis and a Heritage Impact Assessment, and the Lao government has so far said it will comply. The Luang Prabang dam poses major threats to the country’s most famous World Heritage site as it’s located less than 10 kilometers from a major fault line. Geologists have said the dam is high-risk and critics of the project say its environmental and social impacts would transform—or destroy—the World Heritage site. “I fail to understand how the government can even think for a second of promoting such a dam project that would turn the World Heritage site into a lake or water reservoir,” Minja Yang, the former deputy director of UNESCO’s World Heritage Center, toldThe Diplomat in December. “The impact would be devastating.” It appears the Cambodian government is willing to do what’s necessary to protect one of its icons of national heritage, even if it means causing friction with the country’s most powerful business interests. The Lao government seems unable to do the same. This likely isn’t a question of valuing national history or identity but of political will. The Lao government has doubled-down on hydropower as its vehicle for economic development to the point that it no longer matters what’s at stake. The Luang Prabang dam is a joint venture between the Lao government, Thailand’s CH. Karnchang and Vietnam’s Petrovietnam but the Lao leadership has so far expressed no reservations about letting foreign interests drive a devastating project that may wipe out a portion of the country’s national heritage. UNESCO and national identity play a unique role The Cambodian government reportedly made its decision based on advice from the International Coordinating Committee for Angkor, a body established to help support and protect the archaeological park. In February, UNESCO issued a statement citing criticism of NagaCorp’s plans and concluding that “the proximity of the project to the protected buffer zones of the site, as well as the scale, scope and concept of the planned activities” could impact Angkor Wat. UNESCO said a number of “third parties” had voiced concern about the resort. “The proposed project by Naga has been rejected. Future proposed development activities from Naga or other public or private companies need to be in compliance with World Heritage [values],” Sum Map toldNikkei Asia in an interview. Whatever internal discussions and political processes took place, Cambodian authorities placed weight in UNESCO’s assessment, or at least realized the bad optics involved in going against the UN body. UNESCO also specifically referenced the potential impact on the environment around the temples. It effectively said the Cambodian government would be held to account if it pushes destructive development in the area, writing “UNESCO is certain that the Cambodian authorities remain fully committed to the implementation of the World Heritage Convention and will ensure that the protection…. of Angkor remains at the heart of the decision-making processes relating to the property and its surroundings.” UNESCO also acknowledged the government’s commitment to “the Operational Guidelines of the World Heritage Convention, when it comes to dealing with large-scale infrastructure projects, keeping in mind the balance between sustainable development and cultural conservation.” The question of environmental and social impacts may normally be a matter of costs in benefits, but as Cambodia had already made a commitment to its national heritage, these arguments carried a weight that other criticisms couldn’t. The Lao government has these same commitments to Luang Prabang, a historical center of Buddhism for all of Southeast Asia and the seat of one of its major empires. Mechtild Rossler, director of the UNESCO World Heritage Center, toldRadio Free Asia that Laos must now carry out a new social impact assessment for the dam because UNESCO has found that the first study done by the dam developers was inadequate. “For us, the question is if there is any impact on the outstanding universal value of the World Heritage Site. So for example, there could be a major disaster such as a dam break and, you know, security and safety issues for the population,” Rossler said, citing statements by the intergovernmental Mekong River Commission. The Lao government has said that UNESCO may revoke Luang Prabang’s World Heritage status if the project doesn’t meet certain rules and regulations. UNESCO’s action on the Lao dam comes after a long campaign by civil society groups, scientists, environmental advocates and human rights activists. It’s unclear whether the Lao government will respect its own national heritage, but a similar pattern of public outcry, followed by UN action led to Cambodia’s decision to block the “Angkor Lake of Wonder.” The proposed resort at Angkor Wat drew criticism last year from many observers who feared it would damage the World Heritage site and expressed skepticism that NagaCorp would build the project in a responsible, transparent way. NagaCorp is headquartered in the Cayman Islands and listed on the Hong Kong exchange. The firm saw US$869 million in gambling revenues and $102 million in profit in 2020. It is reportedly building a new US$4 billion development in Phnom Penh known as “Naga 3”. The Angkor resort was to be designed by US architectural firms Steelman Partners and Gensler and Associates International. The argument that casinos would detract from the ancient temple complex didn’t appear to pull much weight. Cambodia’s Ministry of Economy and Finance had said that any worries about a possible casino were misguided as this would be illegal. “It is nothing related to gaming. There is no regulation to allow a casino to open in the Angkor Wat zone,” ministry representative Ros Phearun toldCamboJA. But public scrutiny also honed in on the government’s seeming hypocrisy. San Chey, executive director of the Affiliated Network for Social Accountability-Cambodia, toldCamboJA that the proposal did not make sense in part because local residents in the area have been prevented from improving or expanding their homes. He said that the Apsara Authority, which protects the Angkor Archaeological Park, “often bans people who build houses or cages for chickens, ducks or pigs, based on the criteria of the World Heritage Zone.” Though Laos may not respect UNESCO’s wishes, the argument that the dam goes against the government’s own promises regarding the country’s national identity is compelling. Though Laos may not see the enormous risks involved in the Luang Prabang dam, it may be able to recognize its own commitments.
Measuring impact helps to clarify whether the objectives are being met, what is working, and what isn't. Funders or stakeholders may require updates and reports on the project's progress, including progress towards the impact goals. Grant funding and academic promotion applications require evidence to back up impact claims. Impact is measured in two main ways: Significance - the degree to which the impact has enabled, enriched, influenced, informed or changed the performance of policies, practices, products, services, culture, understanding, awareness or well-being of the beneficiaries. Reach - is the extent, spread, breadth, and/or diversity of the beneficiaries of the impact, relative to the type of impact. (Definitions from NHMRC Investigator Grants 2021 Guidelines, via GrantConnect) Of these two aspects, significance is arguably the most important, the premise being research that reaches millions but has no notable benefit is not significant nor impactful. Alongside determining significance and reach, it is important to provide evidence of the causal links between the research and the impacts. While impact from research is seldom linear (your research may be one of many factors that contribute to change in society), wherever possible think about how to measure the 'before' and 'after', to demonstrate any differences that has been achieved and how the changes are attributed to the research. Capturing evidence of impact Indicators of influence While impact can take a long time to occur, indicators of future impact can accrue along the way. The following table outlines the 'impact continuum' pathway; each step along the way builds momentum towards the ultimate goal of effecting change or creating impact. |Influence| |Adoption| |Change| Adapted from content developed by Tim Haydon, The Write Media Network. Examples of evidence The following table outlines some of the many different ways evidence of impact can occur. Evidence does not have to be scholarly: personal feedback, appreciation or testimonials from end-users or industry partners is evidence that demonstrates how the research is creating change. Capture a record of these activities, testimonials, events and opportunities as they arise, so that you remember these instances down the track. |Stakeholder Information||Testimonials||Online Traffic||Positions of Responsibility| Sources of evidence Potential resources for gathering evidence of research impact claims include: Surveys and Testimonials - Qualtrics is a simple to use web-survey tool to conduct surveys and evaluations. Anyone with a WSU email address can register for a WSU Qualtrics account. Check the Research Calendar for upcoming Qualtrics training. - Testimonials can be an excellent way to evidence direct causation between research and impact. Encourage end-users to provide you with feedback, both good and constructive, in the form of written testimonials. 'Mentions' outside of academia - Factiva and Australia & New Zealand Newsstream: Search across keywords, title and abstract, author and subject fields for mentions in Australian and international newspapers. - Analysis & Policy Observatory (APO): search open access policy and practice research for mentions by name or publication. - Search Hansard for mentions by name in the Parliament of Australia (Commonwealth), includes records of invited speeches in Parliament. - Australian Clinical Practice Guidelines: search for clinical guidelines developed for use in Australian Healthcare settings. - Australia & NZ Clinical Trials Register: search for Australian clinical trials underway or completed. - WHO International Clinical Trials Registry Platform: search international trials by topic, country or region. - The Lens: search for mentions by name across patents for over 100 jurisdictions; create alerts for future updates. Lens help resources. - United Nations iLibrary: search digital content created by the UN, for mentions by name or title. UN iLibrary User Guide. - Organisation for Economic Co-operation and Development (OECD): search for mentions by name or publication across economic, environmental and social policy. OECD iLibrary User Guide. Recording evidence - Identify areas of your research where data collection is possible and capture data as you go. - Collate statistical and narrative information on the research activities, outcomes and any resulting impacts, as they occur during the project. - Having baseline data to compare along the way will help monitor the performance of your work. - It is much easier to keep track of this information as it occurs, rather than gather it retrospectively. Email folder Set up an email folder to email yourself reminders of things that have occurred, or to file any relevant correspondence, feedback, or any of the examples mentioned in the previous tab. Google Alert If your project has a specific name, or is likely to be capturing media attention with distinctive keywords (or your name is likely to be mentioned), set up a Google alert to capture mentions of your name or the research project. Spreadsheet/log Create an activities/outcomes/impact log, using a spreadsheet with relevant tabs to capture the data; or use a template such as this one from Fast Track Impact: editable word version or PDF. Shared notebook Enable team members and collaborators from any institution to collate impacts in a shared online notebook, such as Evernote. Social media and online statistics Record downloads/viewing statistics and social media comments. Explore Altmetrics to discover who is engaging with the research online. Altmetric Explorer includes mentions of policy documents and patents.
https://library.westernsydney.edu.au/researchers/evaluating-success/impact/measuring_impact
Deserts set to expand World's poorest must change lifestyles as Earth dries up. Many of the world's dry regions, currently home to some 2.1 billion people, are in danger of becoming useless for growing food, according to the latest in a series of reports on the world's ecosystems. It blames climate change and human activities. The report's authors estimate that 10-20% of these 'drylands' have already lost some plant life or economic use, and they say the situation is getting worse. Hundreds of thousands of people will be in need of new homes and lifestyles over the next 30 years, they estimate. The report, titled Ecosystems and Human Well-Being: Desertification Synthesis1, is the third in a series of seven detailing the findings of the Millennium Ecosystem Assessment, a four-year, US$22-million stocktake of the world's biological resources. United Nations University International Network on Water, Environment and Health "There are serious gaps in our understanding of how big deserts are, and how they are growing," says Zafar Adeel, assistant director of the United Nations University International Network on Water, Environment and Health in Hamilton, Canada, and one of the report's main authors. What is clear, however, is that deserts are getting bigger. "Desertification has emerged as an immense global problem that affects a lot of people," Adeel says. Dust storms from the Gobi Desert in Asia and the African Sahara are responsible for respiratory problems as far afield as North America, the report says. Fields of dreams Perhaps the biggest problem, however, is that as land dries up it becomes unsuitable for farming. The problem is worsened by the fact that many of the areas at greatest risk, such as central Asia and regions to the north and south of the Sahara, are home to the world's poorest people. "Without strong efforts to reverse desertification, some of the gains we've seen in development in these regions may be reversed," Adeel says. The report's release comes ahead of the World Day to Combat Desertification on 17 June. This day marks the 11th birthday of a United Nations agreement, signed by 191 countries, to tackle the expansion of deserts. But, says Adeel, previous efforts have been hampered by ignorance of the scale of the problem. Solutions should be tailored to individual countries' situations, the authors recommend. They hope that governments of countries at risk of drying up will promote 'alternative livelihoods' that protect dry regions. This could involve investment in ecotourism rather than farming, Adeel suggests. Other possibilities involve embracing solar power, or farming fish rather than irrigating crops, which turns out to be a more efficient way of wringing food and money from a limited amount of water. Walter Reid, director of the Millennium Ecosystem Assessment, estimates it might take US$100 billion to invest properly in dryland areas. "That's substantial. But relative to other areas where public money is spent it's not such a big deal," says Reid. References - Millennium Ecosystem Assessment. Ecosystems and Human Well-Being: Desertification Synthesis, Available at http://www.inweh.unu.edu/inweh/MA/Desertification-Synthesis.pdf (2005). News Need Assistance? If you need help or have a question please use the links below to help resolve your problem.
https://www.bioedonline.org/news/nature-news-archive/deserts-set-expand/
The aim of this study is to evaluate the long-term persistence of hepatitis A and B antibodies at Years 11, 12, 13, 14 and 15 after subjects received their first dose of a 3 dose primary vaccination schedule of combined hepatitis A/hepatitis B vaccine. The Protocol Posting has been updated in order to comply with the FDA Amendment Act, Sep 2007. This protocol posting deals with objectives & outcome measures of the extension phase at Year 11-15. This is a long-term follow-up study at Years 11, 12, 13, 14 and 15 after primary vaccination with GSK Biologicals' hepatitis A/hepatitis B vaccine (three-dose schedule with 3 different lots). To evaluate the long-term antibody persistence, volunteers will be bled at Years 11, 12, 13, 14 and 15 after the first vaccine dose of the primary vaccination course to determine their anti-HAV and anti-HBs antibody concentrations. No additional subjects will be recruited in the course of this extension study. If a subject has become seronegative for anti-HAV antibodies or lost anti-HBs seroprotection concentrations at the long-term blood sampling time point (i.e. Years 11, 12, 13, 14 or 15), he/ she will be offered an additional vaccine dose. Allocation: Randomized, Endpoint Classification: Safety/Efficacy Study, Intervention Model: Parallel Assignment, Masking: Open Label, Primary Purpose: Prevention Hepatitis A Twinrix™ GSK Investigational Site Wilrijk Belgium 2610 Completed GlaxoSmithKline Published on BioPortfolio: 2014-08-27T03:46:11-0400 Efficacy Study of Combined Hepatitis A and Hepatitis B Vaccine to Protect Against Hepatitis B in Hemodialysis Patients Does vaccinating hemodialysis patients with Twinrix® (combination vaccine against hepatitis A and hepatitis B) result in a difference in hepatitis B antibody response in comparison to the... Long Term Follow-up Study at Years 2, 3, 4 and 5 Where 2 Dosing Schedules of the Combined Hepatitis A and B Vaccine Were Compared To evaluate the persistence of anti-hepatitis A virus (HAV) and anti-hepatitis B surface antigen (HBs) antibodies up to 2, 3, 4 and 5 years after administration of the first dose of the st... Long-Term Follow-Up Studies at Year 6, 7, 8, 9, 10: 2 Formulations of Combined Hepatitis A/B Vaccine Compared in Subjects Aged 12-15 Years To evaluate the persistence of anti-hepatitis A virus (anti-HAV) and anti-hepatitis B surface antigen (anti-HBs) antibodies up to 6, 7, 8, 9 and 10 years after administration of the first ... Twinrix Alternative Schedule Study To compare the efficiency of protection against hepatitis-B virus by administration of the combined vaccine against hepatitis A and B using the schedule 0-1-12 months against the schedule ... Immunologic Memory (Supp. of ATN 024) This is an exploratory, laboratory-based evaluation of cellular immune response to immunization with hepatitis B surface antigen in HIV-infected and HIV-uninfected adolescents. This is a s... Hepatitis B And Hepatitis C Virus In Women With First Pregnancy. Hepatitis B and Hepatitis C are amongst the leading causes of morbidity and mortality in pregnant women throughout the globe. This study is aimed at determining the frequency of these infections among... Time trend of reported cases and publications: hepatitis E in comparison to hepatitis A - D in Germany from 2001 to 2016. The frequency of autochthonous hepatitis E virus (HEV) infections in Western countries has increased since the millennium, probably due to a higher awareness for HEV. The aim of this study was to a... Serum hepatitis B surface antigen correlates with fibrosis and necroinflammation: a multicentre perspective in China. The kinetics of serum hepatitis B surface antigen (HBsAg) during the natural history of hepatitis B virus (HBV) infection has been studied, but the factors affecting them remain unclear. Seroprevalence of hepatitis E virus in chronic hepatitis C in Brazil. Hepatitis E virus infection in patients with underlying chronic liver disease is associated with liver decompensation and increased lethality. The seroprevalence of hepatitis E virus in patients with ... Osteosclerosis associated with hepatitis C. We describe the first Finnish case of hepatitis C associated osteosclerosis. In which the patient's bone symptoms and bone density were resolved with hepatitis C treatment. Suspecting the possibility ... Hepatitis, Viral, Human INFLAMMATION of the LIVER in humans due to infection by VIRUSES. There are several significant types of human viral hepatitis with infection caused by enteric-transmission (HEPATITIS A; HEPATITIS E) or blood transfusion (HEPATITIS B; HEPATITIS C; and HEPATITIS D). Hepadnaviridae A family of hepatotropic DNA viruses which contains double-stranded DNA genomes and causes hepatitis in humans and animals. There are two genera: AVIHEPADNAVIRUS and ORTHOHEPADNAVIRUS. Hepadnaviruses include HEPATITIS B VIRUS, duck hepatitis B virus (HEPATITIS B VIRUS, DUCK), heron hepatitis B virus, ground squirrel hepatitis virus, and woodchuck hepatitis B virus (HEPATITIS B VIRUS, WOODCHUCK). Hepatitis A Virus A species in the genus HEPATOVIRUS containing one serotype and two strains: HUMAN HEPATITIS A VIRUS and Simian hepatitis A virus causing hepatitis in humans (HEPATITIS A) and primates, respectively. Hepatitis D INFLAMMATION of the LIVER in humans caused by HEPATITIS DELTA VIRUS, a defective RNA virus that can only infect HEPATITIS B patients. For its viral coating, hepatitis delta virus requires the HEPATITIS B SURFACE ANTIGENS produced by these patients. Hepatitis D can occur either concomitantly with (coinfection) or subsequent to (superinfection) hepatitis B infection. Similar to hepatitis B, it is primarily transmitted by parenteral exposure, such as transfusion of contaminated blood or blood products, but can also be transmitted via sexual or intimate personal contact. Hepatitis C INFLAMMATION of the LIVER in humans caused by HEPATITIS C VIRUS, a single-stranded RNA virus. Its incubation period is 30-90 days. Hepatitis C is transmitted primarily by contaminated blood parenterally, and is often associated with transfusion and intravenous drug abuse. However, in a significant number of cases, the source of hepatitis C infection is unknown. Quick Links Advanced Search | Login | Subscribe | RSS Hepatitis Hepatitis (plural hepatitides) is a medical condition defined by the inflammation of the liver and characterized by the presence of inflammatory cells in the tissue of the organ. The condition can be self-limiting (healing on its own) or can progress to ... Public Health Alternative Medicine Cleft Palate Complementary & Alternative Medicine Congenital Diseases Dentistry Ear Nose & Throat Food Safety Geriatrics Healthcare Hearing Medical Devices MRSA Muscular Dyst...
https://www.bioportfolio.com/resources/trial/109505/Long-term-Immune-Persistence-of-GSK-Biologicals-Combined-Hepatitis-A-B-Vaccine.html
The town of Flower Mound issued the following release regarding use of parks and trails during this time of social distancing: The town believes many parks, trails and open spaces can continue to be used in a safe manner that allows people to enjoy the mental and physical health benefits these spaces provide. In all instances, we recommend people follow local, state, and national ordinances and guidelines regarding the use of these spaces. The town encourages all park and trail users to follow these recommendations: Refrain from using parks or trails if they are feeling ill. Follow CDC’s guidance on personal hygiene prior to and during use of parks or trails. Be prepared for no access to public restrooms or water fountains. Refrain from using park playground equipment. While on trails, warn other users of their presence and, as they pass, and step aside to let others pass. Follow the town of Flower Mound’s guidance on the recommended size of social gatherings including outdoor picnicking, pick-up sports, and other group hangouts. Observe the town of Flower Mound’s minimum recommended social distancing of 6 feet from other individuals at all times. If this is not possible, users should find an alternate location or depart that space. Consult the town of Flower Mound’s ordinances and guidelines for the current recommendations on park and trail use. The town of Flower Mound will keep parks, trails and open spaces accessible as long as it is safe to do so. The town’s parks, trails and open spaces have always served as places where people can find respite and seek peace and restoration. During this time of uncertainty, these places are needed now more than ever. The town’s park and recreation professionals are working hard to maintain these spaces and keep them safe, accessible, and benefiting our community during these challenging times. Please do your part to use them in a way that respects others and public health guidance.
https://starlocalmedia.com/theleader/news/how-to-use-parks-trails-while-maintaining-social-distancing/article_aa100d2e-736e-11ea-9e09-57e01f994f2d.html
One of the key shifts in contemporary politics is the trend towards greater personalization. Collective actors such as political parties are losing relevance. Citizens are slowly dealigning from these actors, and individual politicians are therefore growing in importance in elections, in government, within parties, and in media reporting of politics. A crucial question concerns how this new pattern could be restructuring politics over the long run - notably, whether the personalization of politics is changing the institutional architecture of contemporary democracies. The authors show that the trend towards personalization is indeed changing core democratic institutions. Studying the evolution of electoral systems in thirty-one European democracies since 1945, they demonstrate that, since the 1990s, there has been a shift towards more personalized electoral systems. Electoral systems in most European countries now allow voters to express preferences for candidates, not just for political parties. And the weight of these voters' preferences in the allocation of seats has been increased in numerous countries. They examine the factors that appear to be driving this evolution, finding that the personalization of electoral systems is associated with the growing gap between citizens and politics. Politicians and legislators appear to perceive the personalization of electoral systems as a way to address the democratic malaise and to restore trust in politics by reducing the role of political parties in elections. The book also shows, however, that whether these reforms have had any success in achieving their aims is far less clear. Comparative Politics is a series for students, teachers, and researchers of political science that deals with contemporary government and politics. Global in scope, books in the series are characterised by a stress on comparative analysis and strong methodological rigour. The series is published in association with the European Consortium for Political Research. For more information visit: www.ecprnet.eu. The Comparative Politics series is edited by Emilie van Haute, Professor of Political Science, Universite libre de Bruxelles; Ferdinand Muller-Rommel, Director of the Center for the Study of Democracy, Leuphana University; and Susan Scarrow, Chair of the Department of Political Science, University of Houston.
https://www.ecampus.com/faces-ballot-personalization-electoral/bk/9780199685042
1. Definition of organic farming Products labelled as "organic" are those certified as having been produced through clearly defined organic production methods. In other words, "organic" is a claim on the production process rather than a claim on the product itself. Organic agriculture is best known as a farming method where no synthetic fertilizers and pesticides are used. However, this description does not mention the essence of this form of agriculture, which is the holistic management of the farming system. According to the definition of the Codex Alimentarius, "organic agriculture is a holistic production management system which promotes and enhances agro-ecosystem health, including biodiversity, biological cycles and soil biological activity. It emphasizes the use of management practices in preference to the use of off-farm inputs, taking into account that regional conditions require locally adapted systems. This is accomplished by using, where possible, agronomic, biological and mechanical methods, as opposed to using synthetic materials, to fulfil any specific function within the system." Several national governments and a multitude of private certification and farmer organizations have defined organic agriculture. In the past, differences in these definitions were significant, but the demand for consistency by the trade has led to greater uniformity. 2. Basic criteria for the production, storage and transport of organic fruit and vegetables One of the essential elements distinguishing organic farming from other forms of sustainable agriculture is the existence of production standards and certification procedures. There are no universal standards for production and handling of organic fruit and vegetables. Initially, organic standards were developed by private associations, entitling members to use the respective associations organic brands and labels when marketing their products. The International Federation of Organic Agriculture Movements (IFOAM), a non-governmental organization promoting organic agriculture internationally, has established guidelines that have been widely adopted for organic production and processing. These guidelines are commonly considered as "minimum standards", leaving room for more detailed requirements, depending on regional or local situations. As organic agriculture has become more widespread, many developed countries have defined their own organic standards. Since the early 1990s, EC countries have endorsed a common organic standard which is spelled out in Regulation EEC 2092/91. More recently, Canada, the United States and Japan have adopted organic standards and regulations. The Committee on Food Labelling of the FAO/WHO Codex Alimentarius Commission adopted "Guidelines for the Production, Processing, Labelling and Marketing of Organically Produced Foods" in 1999. Organic standards are usually similar as they derive from IFOAMs guidelines for organic production. In general, the use of methods that contribute to maintaining or enhancing soil fertility is mandatory. Another common feature is that generally natural inputs are approved and synthetic inputs are prohibited. Nevertheless, there are exceptions in both cases. Certain natural inputs which various certification programmes determine to be harmful to human health or the environment are prohibited. In addition, certain synthetic inputs are allowed. For example, EEC Regulation 2092/91 allows, when required, the use of specific fertilizers and plant preservatives. All certification programmes maintain lists of specific approved synthetic inputs and prohibited natural inputs. Many certification programmes require additional environmental protection measures beyond the above prerequisites. For example, specific measures are generally applied in the areas of soil and water conservation, pollution control or the use of biological control agents. While many farmers in the developing world do not use synthetic inputs, this alone is not sufficient to classify their products as organic. Farmers who produce organic crops for export and at the same time grow basic foodstuffs on other areas of the farm using conventional methods with fertilizers and pesticides, inadmissible to the organic system, are at high risk of violating the standards, unless effective measures are taken to prevent prohibited substances from passing to the organic plots. 3. Certification: a necessary step for exporting fruit and vegetables as organic 3.1 Basic definition Producers and exporters of organic fruit and vegetables seeking to sell their products in developed countries which have adopted organic standards and regulations will have to meet the rules established by the importing country concerned. In the United States, Japan and the EC countries, the largest markets for organic products, the standards applying to domestic organic production also apply to imported organic products. There are detailed regulations governing the production, importing, marketing and labelling of organic products. Producers and exporters wishing to export fruit and vegetables with the organic label will have to obtain organic certification. Organic certification is a procedure for verifying that the production process conforms to certain standards. In other words, certification is primarily an acknowledgement that these products have been produced according to organic production standards. The basic role of a certification body is to confirm that these adhere to a specific organic standard (usually the one established by the importing country or by the certification body itself). Once certified, organic products are marketed, usually carrying a certification label, indicating that the products are certified as organic. The certification label attests to conformity with certain standards and is itself not a trade mark. However, in most countries the certification label is also registered as a trade mark. Producers wishing to enter a specific market for organic products may find it useful to be certified by a certification body with a certification label that is well known in that market. The cost of certification can be high, although it varies in relation to farm size, volume of production and which certification body is chosen. Relatively few developing countries have certification bodies within their borders (although the situation is changing), and even when sufficient resources are available to pay for certification, farmers often lack the information to find credible inspectors. To date, government regulations essentially deal with references to the organic production method on labels. They do not define standards for the use of private trade marks or certification marks. This implies that government regulations may be supplemented by private quality seals based on private organic standards. 3.2 Import requirements of the major markets United States Effective October 2002, any fruit and vegetable labelled or shipped as organic will require certification by an approved certifier based on the US National Organic Standards (NOS). Until then, there is no Government regulation or oversight on organic declarations of fruits and vegetables, which means that imports of organic products are usually undertaken by a United States importer in cooperation with a United States certification body. For United States organic fresh producers and for exporters targeting the United States market, there are several key factors in the implementation of these standards. All certifiers who apply for USDA certification within the first six months (by August 2001) will have their application reviewed and on compliance, approved by the April 2002 effective date. Beginning in October 2002, the USDA Organic Seal will be allowed on organic products marketed in the United States. For certification of organic products to be exported to the United States, the exporter has three certification options: 1) US certification bodies operating in foreign countries may apply for USDA accreditation. Foreign applicants will be evaluated based on the same criteria as domestic certification bodies. In lieu of USDA accreditation, a foreign certification body may:In practical terms, any group considering exporting organic products to the United States should identify a certification body that has or will receive United States certification approval. The United States based organizations with overseas offices will be able to certify all locations when they are approved by the USDA for organic certification. 2) Receive recognition when USDA has determined, upon request of a foreign government, that the foreign certification body's government authority is able to assess and accredit certification bodies as meeting the requirements of the National Organic Standard; or 3) Receive recognition as meeting requirements equivalent to the requirements of the NOS under an equivalency agreement negotiated between the United States and the foreign government. For more information on these standards and regulations, please see the chapter on the United States in this publication. Japan The new Japan Agriculture Standard (JAS) regulations for product labelling formulated by the Ministry of Agriculture Fisheries and Forests (MAFF) have been operational since 1 April 2001. The established JAS law is based on the CODEX guidelines for organic agriculture. Under the new law all products labeled as organic must be certified by a Registered Certification Organization (RCO) and must display the JAS logo, as well as the RCO's name. Under the new regulation, RCOs are required to be accredited by MAFF. Since the start of the implementation of the new legislation, 38 organizations have been registered as RCO. Although it is possible for foreign certifiers to register, at the time of writing, all RCOs are currently Japanese. For more information on the standards and regulations and on how exporters of organic products can obtain permission for using the JAS logo, please see the chapter on Japan in this publication. Standards and regulations governing imports of organic fruit and vegetables into Switzerland are described in the chapter dealing with this country. European Community (EC) In the EC, Regulation EEC 2092/91 determines the minimum requirements for organic farming in all the member states and is a directly applicable law. It contains standards for production, processing, imports, inspection and certification, marketing and labelling of organic products. Organic food products originating from non-EC countries may be imported and marketed in the EC with an organic label if it is accepted that the products are produced and certified according to procedures equivalent to those of the EC. Under Regulation EEC 2092/91, there are, in practice, two options to gain authorization to export organic products to the EC: 1) When a third country has established and implemented organic standards, it may apply to the European Commission for inclusion into the EC List of Article 11. Known as the Article 11 list, countries on this list can export products certified by an approved domestic certification body to the EC without the need for additional certification or accreditation. Note that this is valid only if the domestic certification body is specifically registred in the Article 11 list. Each consignment should be accompanied by a document certifying that standards and certification measures are equivalent to those applicable in the EC.To obtain the detailed organic standards applied in major importing countries visit the following Web site: http://www.organic-research.com/Laws&Regs/legislation.htm. In order to be included in the list, countries will have to provide sufficient evidence that a reliable system of standards and certification procedures exists, and that it is equivalent to the EC system. The European Commission will evaluate the countrys organic standards and its certification measures. These standards should correspond to the standards described in Article 6 of Regulation 2092/91, and certification measures should correspond to the measures described in Articles 8 and 9. Experience shows that it is a difficult and long process for a country to be included into the list. As of June 2001, only 6 countries were on this list (Argentina, Australia, the Czech Republic, Hungary, Israel and Switzerland). For more detailed explanations on how a non-EC country can apply for inclusion in the Article 11 list or how to obtain import permits, readers can refer to the following publication: Organic Food and Beverages, World Supply and Major European Markets, International Trade Centre, Geneva, 1999. For detailed and up-to-date information on the regulations governing imports and labelling of organic food products into the EC, please see the Web site of the European Commission (http://europa.eu.int/eur-lex/en/lif/dat/1991/en_391R2092.html). This Web site provides the basic regulation EEC 2092/91 and all its amendments. 2) If the exporting country is not on the Article 11 list, the exporter should ask its importer in the EC country to apply for an individual permit for import. An individual EC member state may authorize an importer to import products from a country not on the Article 11 list. Under this provision, the importer should apply to the designated authorities in the EC member country for an import permission and the application should be accompanied by documentation on the equivalence of standards and control measures. The producer and the exporter will have to be certified in accordance with EC procedures, which has to be done in co-operation with an accredited certification body. Import permits are issued for a certain amount of specific products from specified countries. They are valid for defined periods. They are granted to specific importers and valid only for those importers for import entry into those importers country. Once imported into an EC member country, the products may be marketed freely within the EC. In practice, the duration of the process to obtain an import permit can vary considerably. Some importers reported that it is a matter of weeks in some countries (e.g. the Netherlands), while it can take up to several months in other member states. In France, for example, some trade sources said that in the past it used to take up to six months to obtain an import permit. However, they said that there has been considerable progress recently, leading to a more reasonable time frame (generally not exceeding two months). To obtain an import permit, the importer must provide evidence that the product is produced in accordance with production requirements equivalent to those laid down in article 6, that control measures are as effective as those set out in articles 8 and 9, and that these control measures are effectively and permanently implemented. Equivalency between production methods in the EC and the export country is documented through the use of certification bodies having standards at least equivalent to those of the EC or a certification programme that ensures certification against standards equivalent to those of the EC. In general, the criteria for granting the import permit are shifting away from evaluation at the production level towards approval of the certification arrangements, including the certification bodies. In order to ensure equivalence in the effectiveness of inspection and certification measures, third-country certification bodies must satisfy the requirements of standards EN 45011 or ISO/IEC Guide 65:1996. 3.3 How to obtain certification of organic fruit and vegetables in developing countries As explained above, producers and exporters of organic fruit and vegetables seeking to sell their products under the organic label in developed countries have to obtain organic certification. This can be done by the certification bodies of the countries targeted for export, or by other foreign certification bodies, or under a partnership agreement between these two types of certification bodies. To date, relatively few developing countries have certification bodies within their borders, although the situation is changing. Currently, certification for export in developing countries is often carried out by the certification bodies of the importing countries, even though there are some notable exceptions (e.g. Argentina). The advantage for the exporter is that the logos of these bodies are well known and trusted by consumers in their countries, thus giving the product a better visibility and commercial advantage. The major drawback is that this type of certification can be very expensive, especially when inspectors need to come from the country of the certification body. In order to reduce costs to producers and exporters, international certification bodies tend to use local organic inspectors. Many international certification bodies, such as Ecocert, OCIA or BCS-Öko, have established local branches in developing countries. These branches tend to recruit local staff, which reduces costs. When no local branch exists in a given country, there might be a regional branch in a nearby country that may send a team to carry out inspections and even certification. Organic certification can also be carried out by local certification bodies in developing countries where these exist, provided that they are accredited by the authorities of the importing country. Experience to date shows that this can be a difficult and long process. To be accredited, a certification body must demonstrate that it complies with basic criteria of transparency and independence (freedom from the influence of vested interests). Certification bodies may be evaluated according to their ability to meet such criteria, and this requires an analysis of their certification systems, including an assessment of their personnel, standards and their inspection and certification procedures. An increasing number of importing countries require that certification bodies comply with the ISO 65 standard or equivalent norms which set out the details of such procedures. Specific advice on how to establish local certification bodies is provided in the following publication by IFOAM (1997): Building trust in organics: A guide to setting up organic certification programmes, by Gunnar Rundgren. Because accreditation of certification bodies in developing countries is difficult and therefore rare in practice, local bodies tend to develop partnerships with international certification agencies. In general, the local body carries out the bulk of the activities leading to certification, while the international body periodically evaluates the implementation of certification procedures and sometimes issues the certificates. This may reduce costs for the producers and exporters, while providing access to an international certification mark. It can also strengthen local inspection and certification capacity in the developing country. 4. Other requirements for exporting organic fruit and vegetables In addition to the above requirements, which are specific to organic products, organic fruit and vegetables destined for export should meet the usual requirements concerning all fresh fruit and vegetables, whether organic or conventional. It is beyond the scope of this study to deal with these requirements, as several publications explain them and provide much detailed and practical information. The following is just a brief summary of the most frequent categories of requirements. This list is not comprehensive; for more detailed information contact importers and customs services in the importing country. Phytosanitary certification Import requirements depend on both the product and the country of origin. In general, a phytosanitary certificate issued by an official of the exporting country must accompany all fruit and vegetable shipments. This official will be able to determine if the particular fruit or vegetable can be exported to the country of destination and what phytosanitary requirements must be met. Grade and quality standards Fruits and vegetables exported to the EC, Japan or the United States must meet import requirements relating to size, grade, quality and maturity. A certificate based on an inspection must be issued by the countrys relevant authority to indicate compliance with standards. Pesticide and other contaminants Most developed countries have established standards for tolerances for pesticides, herbicide and fungicides used in the production and treatment (e.g. fumigation) of agricultural products. These countries have established Maximum Residues Levels, often referred to as MRLs. As organic agriculture prohibits the use of most synthetic pesticides, producers of fresh organic fruit and vegetables are very unlikely to exceed these MRLs. However, those producers who use some of the few synthetic inputs permitted by organic standards should be aware of these requirements (for more information on this topic see: www.coleacp.org). Import clearance In general, the customs services of the importing country are responsible for the final approval and authorization for the importing of all products. Customs services review all documentation for the shipment against requirements and will not release goods from the port of entry until all requirements are met. They are also responsible for the collection of any import duties. Annex I - Basic Concepts of Organic Agriculture Accreditation. A procedure by which an authoritative body evaluates and gives a formal recognition that a certification programme is in accordance with the standards of the authoritative body. Certification. A procedure by which a third party gives written assurance that a product, process or service is in conformity with certain standards. Certified organic food products are food products that have been verified to have been produced in accordance with specified standards for organic production and processing. Certification body. An organization performing certification. Sometimes referred to as the certifier or the certification agency. Certification label. A label or symbol indicating that compliance with standards has been verified. Certification programme. A system of rules, procedures and management for carrying out certification. One certification body may execute several different certification programmes. Sometimes referred to as a certification system. Competent authority. The official government agency having jurisdiction. Control, control body. Terms commonly used by the trade when referring to inspection and an inspection body. Inspection. An on-site visit to verify that the performance of an operation is in accordance with specific standards of a certification programme. The inspector is the person appointed to undertake the inspection. Inspection body. The body performing the inspection part of certification. Where a certification body performs its own inspections, the inspection body is identical to the certification body. Sometimes referred to as the inspection agency or the control body. License. A document issued under the rules of a certification programme, by which a certification body grants a person or body the right to use certificates or certification labels for its products, processes or services in accordance with the rules of the relevant certification programme. Operator. Anyone carrying out activities covered by a certification programme, for instance farmers, processors, handlers. Organic. see section 1 of Chapter 1. Standards. Documented agreements containing technical specifications or other precise criteria to be used consistently as rules, guidelines or definitions, to ensure that materials, products, processes and services are fit for their purpose. Standards relating to organic food products are production and/or processing standards describing, prescribing, allowing or prohibiting procedures and materials, as well as standards for certification and labelling. Subcontractor. Anyone carrying out activities covered by a certification programme, for instance farmers, processors, handlers, on behalf of an operator. EN 45010.1* A European standard for accreditation developed by CEN and CENELEC. EN 45011.* A European standard for certification developed by CEN and CENELEC. ISO/IEC Guide 61.* An international guide to accreditation developed by the international standardization organizations ISO and IEC. ISO/IEC Guide 65.* An international guide to certification developed by ISO and IEC. 1 The EN 45000 series of standards and their corresponding ISO/IEC Guides lay down general criteria for the operation of testing and calibration laboratories, certification bodies for products, quality systems and personnel, inspection bodies, and accreditation bodies with the aim of ensuring confidence and reliability in the activities of these bodies. The EN 45000 standards are also referred to as harmonized standards.
http://www.fao.org/3/Y1669E/y1669e04.htm
4 edition of X-ray instrumentation in astronomy II found in the catalog. Published 1988 by The Society in Bellingham, Wash., USA . Written in English Edition Notes |Statement||Leon Golub, chair/editor ; sponsored by SPIE--the International Society for Optical Engineering ; cooperating organizations, Applied Optics Laboratory/New Mexico State University ... [et al.].| |Series||Proceedings / SPIE--the International Society for Optical Engineering ;, v. 982, Proceedings of SPIE--the International Society for Optical Engineering ;, v. 982.| |Contributions||Golub, L., Society of Photo-optical Instrumentation Engineers., New Mexico State University. Applied Optics Laboratory., International Technical Symposium on Optical & Optoelectronic Applied Science & Engineering (32nd : 1988 : San Diego, Calif.)| |Classifications| |LC Classifications||QB472.A1 X235 1988| |The Physical Object| |Pagination||viii, 424 p. :| |Number of Pages||424| |ID Numbers| |Open Library||OL2065516M| |ISBN 10||0819400173| |LC Control Number||88062307| Welcome to the World of X-ray Astronomy How X-rays Were Discovered X-rays were first observed and documented in by Wilhelm Conrad Röntgen, a German scientist who found them quite by accident when experimenting with vacuum tubes. Buy X-Ray Astronomy on FREE SHIPPING on qualified orders X-Ray Astronomy: Culhane, J. Leonard: : Books Skip to main content3/5(1). X‑ray shadowgraph of a hand wearing a ring taken at the conclusion of Röntgen's first public lecture on x‑rays (). X-rays were discovered in by the German physicist Wilhelm Röntgen (also spelled Roentgen). He received the first Nobel Prize in physics in "in recognition of the extraordinary services he has rendered by the. The first X-ray telescope was the Apollo Telescope Mount, which studied the Sun from on board the American space station Skylab. It was followed during the late s by two High-Energy Astronomy Observatories (HEAOs), which explored cosmic X-ray sources. HEAO-1 mapped the X-ray sources with high sensitivity and high resolution. II / Extragalactic X-Ray Astronomy.- Section V: Active Galactic Nuclei.- X-Ray Timing and Spectral Observations of Active Galactic Nuclei (Invited Paper).- The Soft X-Ray Spectrum of NGC Simultaneous EXOSAT-IUE Observations of NGC EXOSAT Observations of the BL Lac Object MKN X-Ray Variability of the Bright BL Lac Object PKS Author: A. Peacock. The X-ray detection system used to calibrate the Advanced X-ray Astrophysics Facility (AXAF) mirrors will include gas flow and sealed proportional counters. To meet the ultimate 1 percent goal of the calibration project, the transmission and uniformity of the windows must be well known for the soft X-ray wavelengths involved. DTI QA Register freshman scout at college Submission to the Finance and Economic Affairs Committee with respect to the 1995 provincial budget Witness Guide for Deposition or Court If I tell Cloud Over Calderwd Emily Carr A study of the influence, upon locomotive valve travel, of the deformations producted in the Stephenson gear by acceleration true life Research and other activities of private foundations, 1960. On the Front Line The Rolling Stones chronicle Pages in category "X-ray instrumentation" The following 28 pages are in this category, out of 28 total. This list may not reflect recent changes (). Get this from a library. EUV, x-ray, and gamma-ray instrumentation for astronomy II: JulySan Diego, California. [Oswald H W Siegmund; Richard E Rothschild; Society of Photo-optical Instrumentation Engineers.;]. Get this from a library. X-ray instrumentation in astronomy II: AugustSan Diego, California. [L Golub; Society of Photo-optical Instrumentation Engineers.; New Mexico State University. Applied Optics Laboratory.;]. EUV, X-ray, and gamma-ray instrumentation for astronomy II: JulySan Diego, California / Oswald H. Siegmund, Richard E. Rothschild, chairs: sponsored and published by SPIE--the International Society for Optical Engineering. PROCEEDINGS VOLUME EUV, X-Ray, and Gamma-Ray Instrumentation for Astronomy VII. Cargèse, 5 April instrumentation 9 coded mask imaging measured parameters: x,y:int. location on the detector Eγ:energy deposited t: arrival time astronomy: encoding of a two dimensional source distribution (i,j) into a 2-D dataspace (k,l) for sources at finite distance (nuclear medicine, tomography of X. The Handbook of X-ray Astronomy is currently available for sale in the UK and the US either through CUP (UK, US) or Amazon.A discounted price is available for a limited time through CUP. Modern x-ray data, available through online archives, are important for many astronomical topics. High time-resolution astrophysics (HTRA) involves measuring and studying astronomical phenomena on timescales of seconds to milliseconds. Although many areas of astronomy, such as X-ray astronomy and pulsar observations, have traditionally required high X-ray instrumentation in astronomy II book studies, HTRA techniques are now being applied to optical, infrared and gamma-ray wavelength regimes, due to the development. The next revolution in X-ray astronomy was wrought by the Einstein Observatory, launched in and named in honour of the centenary of his birth. X-ray focusing optics had been flown on Copernicus and as part of the Solar astronomy experiment on Skylab but the Einstein Observatory provided the first X-ray images of many classes of astro-File Size: KB. The handbook begins with x-ray optics, basic detector physics and CCDs, before focussing on data analysis. It introduces the reduction and calibration of x-ray data, scientific analysis, archives, statistical issues and the particular problems of highly extended sources. The book describes the main hardware used in x-ray astronomy, emphasizing. Various papers on X-ray instrumentation in astronomy are presented. Individual topics addressed include: concentrating hard X-ray collector, advanced X-ray Astrophysics Facility high resolution camera, Fano-noise-limited CCDs, linear CCD with enhanced X-ray quantum efficiency, advances in microchannel plate detectors, X-ray imaging spectroscopy with EEV CCDs, large aperture imaging gas. The ASTRO-E X-ray Imaging Spectrometers (XISs) consists of four sets of X-ray CCD camera for the ASTRO-E mission. The XISs have been calibrated at Osaka University, Kyoto University, ISAS and MIT. The calibration experiment at Osaka focuses on the soft x-ray response of the by: 2. X-ray crystallography is a tool used for determining the atomic and molecular structure of a crystal. The underlying principle is that the crystalline atoms cause a beam of X-rays to diffract into many specific directions (Fig. ).By measuring the angles and intensities of these diffracted beams, a crystallographer can produce a 3D picture of the density of electrons within the crystal. Aliaga Kelly, W. Boyes, in Instrumentation Reference Book (Fourth Edition), Inorganic Scintillators. NaI (Tl) is still after many years the best gamma- and X-ray detector actually available, yet it is very hygroscopic and must be completely sealed from moisture. X-ray astronomy is a physical subfield of radiation astronomy, that uses a variety of X-ray detectors fashioned into X-ray telescopes to observe natural sources that emit, reflect, transmit, or fluoresce X-rays. X-rays can only penetrate so far into a planetary atmosphere such as that surrounding the crustal and oceanic surface of the limitation requires that these detectors and. X-ray astronomy 1. Introduction The last fifty years have seen a rapid develop-ment of observational x-ray astronomy from the discovery of the first extra solar x-ray source Sco X-1, to the detection of celestial objects 10 billion times fainter. This remark-able improvement has allowed detection and study of the x-ray emission from all knownFile Size: 1MB. X-ray source, in astronomy, any of a class of cosmic objects that emit radiation at X-ray e the Earth’s atmosphere absorbs X rays very efficiently, X-ray telescopes and detectors must be carried high above it by spacecraft to observe objects that produce such electromagnetic radiation. A brief treatment of astronomical X-ray sources follows. X-ray astronomy detectors are instruments that detect X-rays for use in the study of X-ray astronomy. X-ray astronomy is an observational branch of astronomy which deals with the study of X-ray emission from celestial objects. X-radiation is absorbed by the Earth's atmosphere, so instruments to detect X-rays must be taken to high altitude by balloons, sounding rockets, and satellites. Proc. SPIEInstrumentation in Astronomy II, pg (1 September ); doi: / Read Abstract + Various types of designs were stu-died by the author at the Jet Propulsion Laboratory (JPL) for the optics of the high-resolution television camera for the Mariner '69 and '71 missions to Mars. Buy X-Ray and Gamma-Ray Instrumentation for Astronomy (Proceedings of Spie) on FREE SHIPPING on qualified orders X-Ray and Gamma-Ray Instrumentation for Astronomy (Proceedings of Spie): Kathryn A. Flanagan, Oswald H. Siegmund: : Books. Instrumental Technique in X-Ray Astronomy. Annual Review of Astronomy and Astrophysics Vol. (Volume publication date September ) Robert C. Kennicutt, Jr., Neal J. Evans II Vol. 50,pp. – Full Text HTML Download PDF. Abstract - Figures Preview. by: The X ray Astronomy Calibration and Testing facility (XACT) set-up at the Osservatorio Astronomico di Palermo "G.S. Vaiana" for the development and calibration of instrumentation for Extreme. KEYWORDS: Roentgenium, Data modeling, Cameras, Sensors, Calibration, Satellites, X-rays, Charge-coupled devices, X-ray telescopes, Absorption Read Abstract + Various X-ray satellites have used the Crab as a standard candle to perform their calibrations in the past.
https://cujenifovize.awordathought.com/x-ray-instrumentation-in-astronomy-ii-book-26191tg.php
Your wEEkly Update is here! wEEkly update June 01, 2020 Archive | Subscribe | CAISO Daily Outlook Climate-Smart Ways to Save and Thrive in Tough Times Climate-Smart Ways to Save and Thrive in Tough Times - Interview with Howard Choy BPC - Statewide Energy Efficiency Best Practices Coordinator, Angie Hacker, recently invited local energy experts, Howard Choy for a remote interview on " Climate-Smart Ways to Save and Thrive in Tough Times. " We had a chance to discuss parallels between challenges local governments are facing due to the economic fallout from COVID-19 and our experiences building lasting local energy programs during the last economic downturn in 2009 with help from stimulus dollars. As we look ahead to future budget uncertainties and potential silver linings, Howard shares advice and cost-neutral strategies for local energy sustainability professionals to provide value both through operating savings and through external funding opportunities. . Taking Stock: Links between local policy and building energy use across the United States ACEEE - Local governments in the United States are increasingly making commitments to reduce their greenhouse gas emissions, often through initiatives designed to reduce building energy use. This report analyzes the relationship between per capita building electricity and natural gas consumption and multiple local factors, several of which are within the control of local governments. We conclude that per capita electricity and natural gas consumption declined in US municipalities between 2013 and 2016, and factors influenced by local government policies and programs were related to these shifts. Urban heat waves imperil L.A.’s most vulnerable communities USC News - New USC research highlights the outsized risk for low-income communities as global warming raises temperatures and our cities become even more crowded. Geothermal, lithium recovery projects Get boost from California Energy Commission CEC - The CEC awarded nearly $10 million in grants for three geothermal-related projects that will help California meet its 100 percent clean electricity goal and expand the state’s emerging lithium recovery industry. SEEC Announcements SEEC Sunsetting Participant Survey As the SEEC program sunsets, this survey is designed to capture the perspective and experiences of local government practitioners that have participated in SEEC programs and resources, as well as to gain insight into ongoing local energy and climate needs. While there will not be dedicated funding to support ongoing activities of SEEC after 2020, the organizations that have administered SEEC continue to remain committed to pursuing resources to provide the most valuable ongoing or new services in energy efficiency, climate action planning, and sustainable solutions. Take the survey. 11th Annual SEEC Virtual Forum: Submit a Proposal - Deadline EXTENDED to June 5th! There are two priority deadlines to submit proposals: submit by June 5th for the second block (Aug-Sep) or by July 31st for the third block (Oct-Nov). Session tracks this year include: Leading with Equity & Community Engagement; Energy Resilience; Integrated Planning to Action; and Decarbonization Pathways. Check the forum website for the proposal guidance and the submission form ! Register for upcoming June events: June 2 - SEEC Webinar 1: State Panel on Promising Solutions for a Clean Energy Future June 10 - Webinar 2: Community Energy Resilience for Local Governments June 18 - Webinar 3: Maintaining Local Momentum towards Climate Goals: Reach Code Collaboration June 23 - Networking Activity 1: Speed Networking June 30 - SEEC Webinar 4: Community & Climate Engagement During COVID-19: What to do when in person isn’t possible Opportunities Funding: The State Environmental Justice Cooperative Agreement Program EPA - EPA is working to improve the environment and public health conditions of low-income and minority communities through our daily efforts to ensure all Americans have clean air, safe water, and access to information to make decisions to protect personal and public health. EPA anticipates making five awards in amounts of up to $200,000 per award for a two-year project period. The opportunity closes on June 30, 2020, at 11:59 PM (ET). Beacon Program Request for Award Consideration 2020 ILG - The Beacon Program recognizes the measurable achievements of cities and counties working to address climate change. These awards, called Beacon Spotlight Awards, are given in five distinct award categories. Within each award area, a participant can earn silver, gold or platinum – based on the level of achievement. To win the highest honor, a full Beacon Award, participating agencies are required to demonstrate achievements in all five areas. If you would like to apply for award consideration in any of the five categories or for the full Beacon Award, please complete this form by July 1, 2020 . Survey: New Residential Construction Low Carbon Homes - Beyond 2019 Code: Informing New Construction Programs and Future Code Cycles CPUC - The California Public Utilities Commission (CPUC) is continuing to work with the Investor Owned Utilities on future New Residential Construction Programs that will pilot and explore deeper energy efficiency opportunities to help meet California's aggressive greenhouse gas reduction goals. Over the coming year, the CPUC will be engaging stakeholders to discuss and define potential opportunities. This survey will help to inform and guide that effort. CivicSpark Project Partner Applications for 2020-21 Still Being Accepted and Able to Support COVID Recovery Projects CivicSpark - Apply today to receive project support to address emerging environmental and community resilience challenges. In response to the scale and urgency of COVID-19, CivicSpark is prepared to focus Fellow support on recovery activities such as: supporting development of responsive programs or connecting community members with resources. Hosting a Fellow is a cost-effective way to bolster response efforts. Explore potential recovery activities by contacting Kif Scheuer ( [email protected] ), or visit our website below to learn more about the application. https://civicspark.lgc.org/join-civicspark/project/ Now Accepting Applications - Permanent Local Housing Allocation Program for Entitlement & Non-Entitlement Local Governments: Formula Funding Component Funding Resource - The California Department of Housing & Community Development (HCD) released the first of two Notice of Funding Availability (NOFA) announcements for the Permanent Local Housing Allocation Program. The first NOFA is for formula funding - formula amounts by jurisdiction can be found in Appendix A in the NOFA, here. Don't wait to apply - the deadline for formula funding is July 27, 2020 ! *Keep a lookout for the NOFA for the Permanent Local Housing Allocation Competitive Program, which is anticipated to be released August 2020.* Learn more about the Permanent Local Housing Allocation Program by visiting our website at: https://www.fundingresource.org/affordable-housing/ Top Resources Issue Brief: Local Natural Gas Emission Reduction Options (BPC) Best Practices for Virtual Engagement (LGC) State and Local Planning for Energy (SLOPE) Tool (DOE) 2019 Energy Transition Survey (ICMA) Weatherization and Home Improvements: A Promising Path for Improving Health and Reducing Medical Costs for Older Adults (ACEEE) SEEC 2019 Legislative Update (SEEC) Energy Efficiency Funding Opportunities (SEEC) Job Announcements Eureka: Regulatory & Legislative Policy Manager - Redwood Coast Energy Authority Folsom: Multiple Positions - CAISO Irvine: Senior Energy and Sustainability Programs Analyst - City of Irvine Los Angeles/Oakland/San Diego: Multiple Positions - Center for Sustainable Energy Oakland/San Diego: Multiple Positions - DNV GL Sacramento: Senior Portfolio Analyst - California Energy Commission Multiple Locations: Equity Diversity Inclusion Fellowship - USDN Upcoming Events June 2 (Webinar): State Panel on Promising Solutions for a Clean Energy Future June 2 (Webinar): Community Resilience in the Context of Climate Change and COVID-19 June 3 (Webinar): The Challenge of Retail Gas in California’s Low-Carbon Future June 3 (Webinar): SoCalREN: Our Energy Champions: Stories from the Field June 5 (Virtual Event): SDED: Decarbonize & Take Control of Your Community’s Energy Needs June 9 (Webinar): Fund-it Fast Chat: WaterSMART Grants June 11 (Webinar): Your Home is Your Health: Measures and Data June 11 (Webinar): 100% Clean Energy States and the 100% Clean Energy Collaborative June 15 (Webinar): Decarbonizing Electricity: June 17 (Webinar): SoCalREN: It's a Virtual World: Remote Audit Services June 18 (Webinar): Codes and Policies to Advance Zero Goals: Policies for Retrofits and New Construction June 19 (Webinar): Workshop for Next Wave of PG&E EPIC III Projects June 21 (Webinar): Climate Emergency Online Dialogue – How we build and renovate June 24 (Webinar): SoCalREN: Improving Schools During Closure: Upgrades for our Students, Teachers, and Communities June 24 (Webinar): Summer 2020- Microgrids: Backup Power for Business June 25 (Virtual Event): Sustain SoCal 11th Annual Energy Conference- Resiliency in the Balance Aug. 26-27 (Washington DC): 9th Annual American Climate Leadership Summit (ACLS 2020) Nov.4-7 (San Diego): Greenbuild 2020 On-Going (Various): Building Operator Certification (BOC) Training Series Thank you for subscribing to the wEEkly update! Feel free to forward this email to any peers or colleagues to share the EE news. Archive | Subscribe Please email [email protected] to share any resources, opportunities, or events on the next edition of the wEEkly update. Copyright © *2020* Statewide Local Government Energy Efficiency Best Practices Coordinator , All rights reserved. Want to change how you receive these emails? You can update your preferences or unsubscribe from this list .
https://us15.campaign-archive.com/?u=e1a6a586a3e96f07c6cce66dc&id=873ecd9f11
Tusshar Sasi November 23, 2018 1 Comment on “Free Solo”… A breathtaking spectacle that is vertigo-inducing and also great fun! As Free Solo unfolded slowly through its gripping and vertigo-inducing frames, I could constantly think of how it held material for a full-length dramatic feature film. If we excuse the area of its subject conquering the majestic El Capitan in Yosemite National Park, here is one story with unending possibilities – complete with family and romantic angles as well as multiple instances that could have contributed to the completion of a magical hero’s journey. The film also takes us through its subject’s (Alex) background – a seemingly fragmented family and self-esteem issues developed in the childhood. I must add that these aren’t portions that look very exciting given the format of the film. However, it is appreciable that the makers attempt to align Alex’s mind space comprehensively rather than simply using him as a bait to generate unearthly thrills. The same can be said about Alex’s interactions with his doctor post an MRI scan where they discuss in detail about the peculiarities of his brain (the amygdala, to be precise) – providing us more dope on how the man’s unconventional identity got designed. As someone who is almost in a relationship with his van, it is a little baffling when the 33-year-old Alex is shown to fall in love with Sanni McCandless – who is a rather animated and interesting person as opposed to his detached ways. Their interactions in Free Solo do not fully look organic – possibly because Alex might have been uncomfortable with someone filming the same. McCandless, on her part, plays it out like a pro which is (at times) a con in comparison to his awkward disposition. What adds value via their dynamic in the film is the intrigue that it generates on how the relationship will impact Alex’s ambition. It is particularly impressive to see him clear it out to her about what matters the most to him. Brutal, yet somewhere so gorgeously realistic. Free Solo does defy death but not without taking the viewers through a cartwheel of adrenaline. It, predictably, isn’t the film that exhilarates you throughout. The intense final climb is one that deliberates you to marvel – not only at Alex but also the camera crew who manages to capture some mind-boggling visuals. The climb, in itself, has its share of surprises and manoeuvres attempting to keep the audience alive despite what leads to a predictable ending. Free Solo’s daring techniques and the novel shot-taking style overpowers instances where the narrative slows down for reasons that cannot be undone – for the protagonist, is a little boring (if one must admit) and his personal liaisons which cannot be ignored while adding layers to the plot. Another aspect is that we seldom see films that are so physically exerting even to a viewer. Therefore, this amazing story of passion and grit filmed for the celluloid by an impeccable crew is worthy of several plaudits. Ah I’ll have to check this out, if only to marvel at people who are infinitely better climbers than I am! Previous Post“What They Had”… An affectionately made family drama that keeps pathos at bay!
http://filmysasi.com/free-solo-india-review/
Among solid-liquid separation devices using a cycle of state change of a substance A capable of dissolving water and oil, a solid-liquid separation device that decreases maintenance frequency and facilitates control of a filling amount of a substance A in the cycle is provided. The present invention is a solid-liquid separation device that performs dehydration or deoiling from an object to be treated that is a mixture of water and a solid, a mixture of oil and a solid, or a mixture of water, oil, and a solid, as the object to be treated, using the substance A that is a gas at normal temperature and pressure and is capable of dissolving water and oil when liquefied, the solid-liquid separation device including a substance B that is circulated while generating phase change in a closed system, a compressor that compresses the substance B, a first heat exchanger A that exchanges heat of condensation of the substance B and heat of evaporation of the substance A, an expansion valve that decompresses the condensed substance B, a second heat exchanger B that exchanges heat of evaporation of the substance B and heat of condensation of the substance A, and a treatment tank in which the substance A is mixed with the object to be treated, the substance A having been evaporated while separated from the water or the oil in the first heat exchanger A, and condensed in the second heat exchanger B, wherein the center of gravity of the first heat exchanger A is installed in a lower portion than the center of gravity of the second heat exchanger B in a vertical direction.
In a dynamic world, US leadership in AI is paramount. Balancing this with the needs of the workforce and creating the right opportunities should be a collective responsibility. The president took aim at balancing the economy by driving the current agenda that will improve job security for the American people. This coincided with geostrategic aims at a time where national security has a closer link to technological innovation than ever before. This is somewhat of a complex task since rebalancing a workforce to keep up with innovation is something every administration needs to do around the world, on an ongoing basis. The process is dynamic simply because innovation is continuous and will never stop. Right now, as The US, Israel, UK and some countries with whom we have shared values, face record employment levels and thriving economies, the macro view is in fact one of concern over talent shortages. One view is that anyone who rebalances their career and align it with technological changes, has a bright future. There are other views too, which I will discuss below. Fears about AI disruption: Notwithstanding this bright future where people can easily transition towards new careers, there are thousands of call center workers, customer service agents, TECH support specialists, taxi and truck drivers who fear their jobs will be lost when AI comes to full swing. It is truly understandable – but what about the opportunities? There are genuine opportunities to change the world: changing career is just one of them. It just happens, by co-incidence that most of our countries which I mentioned before, also have incredible support systems to facilitate career changes. Will we be able to balance the need for job security, versus the opportunities to change and evolve in a way that results in a win-win outcome? That should be our focus. Will an AI related tax solve concerns? Bill Gates proposed an AI related tax, which I am not sure will represent an optimal solution. Indeed this is something that will be heavily debated at the AI summit in San Francisco this year. There has to be caution about the idea of raising a concern in order to raise a tax. We have seen this too many times around the world, where for example, carbon tax and other environmental taxes were raised but did not really solve anything. This explains the view of the president when he pulled out of the Paris climate accord – albeit that this is a topic of a more complex nature. Another view on the tax issue can also be taken into consideration. Some analysts feel that in any balanced economy, it is reasonable to expect that tax losses resulting from lesser employee tax will be offset against higher corporate profits and more savings passed onto the end user. The challenge comes in cases where economies are not balanced, relying too heavily on outsourcing as an income. But it raises the question: Should we forfeit the incredible benefits of technology simply to protect those who did not evolve? In the US, there is the perception that this will not happen and that innovation at the right pace is always a priority. My own analysis after being involved with France, Belgium, the UK and Israel – is that most business leaders support this status quo. Turning to the opportunities: We have seen examples of how every possible industry benefits from AI. I am yet to encounter one sector where we could not see an improvement. Here you can see just how many industries are participating already – and how many new job opportunities there was for new bot developers. Included in our list of success stories are also governments and militaries who adopted AI to serve the public better and provide better defence capabilities. At a citizen level, we are proud to say that AI can certainly be good for the environment, reduce our carbon footprint – and hugely improve the issues we face with cybersecurity, cyberextortion and fraud. We’re also seeing in the US, how hotels are fighting back against the gig economy, by using chatbots and AI to streamline their booking procedures and reduce cost in order to become competitive again. Then, there are also numerous ways in which the healthcare sector is improved and I would argue that by virtue of both military and healthcare improvements, we are managing to steer this boat in a direction that can benefit humanity far more than the downsides associated with fears people may have. Conclusion: Change is inevitable and it is better to change as a matter of timely evolution, as opposed to waiting for everyone else to change and be the last country on board. The leadership that the US and Israel demonstrated in the field of technology is also key to their leadership in the world. It is therefore one of the most important cross-party and multi-national efforts of our time. The end result has to be artificial intelligence that is deployed for the better of humanity, where conflicts of interest are resolved early on for our common good.
https://www.conservativedailynews.com/2019/05/the-american-workforce-ai-and-chatbots-in-focus/
1 box cornbread mix, optional if you do not want to do Tia's cornbread, prepared according to box instructions, and cut into cubes. First, make Tia’s Cornbread at least one day before serving the stuffing. Preheat the oven to 400°F (200°C). Generously grease a 9-inch (23 cm) baking pan with 1 tablespoon of butter. In a small bowl, mix the cornmeal, flour, baking powder, sugar and salt. In another bowl, whisk together the melted butter, buttermilk, corn, honey and eggs. Using a rubber spatula, add the wet ingredients to the dry and mix just until combined. Do not overmix. Pour the batter into the prepared pan. Bake until a toothpick inserted in the center comes out clean, 20 to 22 minutes. Let cool for at least 1 hour, then cut into 1-inch cubes for the stuffing. For the stuffing, start by cutting the cornbread into cubes. Spread 4 cups of white bread cubes and 4 cups of the cornbread cubes in a single layer on a baking sheet and leave out overnight to dry out. Preheat oven to 400°F (200°C). Grease a 13x9x2-inch (33x23x2 cm) baking dish with butter and set aside. Transfer the bread cubes to a large bowl. In a large sauté pan set over medium-high heat, melt 2 tablespoons butter. Add the onion, garlic, celery, fennel and sprinkle with the salt and cook until the vegetables are translucent, about 5 minutes. Add the mixture to the bowl of bread and mix. In the same sauté pan, add the remaining 2 tablespoons butter and let brown for 30 seconds. Add the apples and nutmeg and sauté until the apples are tender, 3 to 4 minutes. Add the apples to the bread bowl and mix. Add the sausage to the pan and cook, breaking it up as it browns, 8 to 10 minutes. Transfer the sausage to the bread bowl and mix. Mix in the parsley and sage. Transfer the bread mixture to the buttered baking dish. Pour the chicken stock around the edges of the baking dish. Put the baking dish on the middle oven rack and bake at 400°F (200°C), uncovered for 40 minutes, until golden brown. I added dried cranberries to this and it was amazing! Wow! Tia & Cory, please add more recipes if this is how you cook. I made it just as directed and it was delicious. I had the leftovers for lunch...just the stuffing. I’ve been making this stuffing for my families Thanksgiving feast for three years now and they love it.
https://tasty.co/recipe/cornbread-stuffing
Pronunciation model: East African English View the key for East African English here. There is little clarity in the distinction between North, Central, North-East, Southern, and East African regions. However, following Schmied (2008) and in-keeping with Oxford Dictionaries’ definition of East Africa, the focus here is on the Eastern nations of Kenya, Uganda, and Tanzania, which share a common linguistic background. However, there is widespread variation and the patterns below are tendencies rather than rules. There are also important differences between national and subnational standards, particularly in Kenya and Uganda where subnational variation is prominent; few of the subnational standards are actively followed in a systematic way, others being widely tolerated and only a few rejected as ‘substandard’. Useful summaries of the history of East African English (EAfE) are given by Schmied (1991, 2008, 2015) and interested readers are directed to his work, reflecting on the impacts of colonial administration, Christian missionaries, and railway construction. The colonial language policy was quite complex, an essentially trilingual setup valuing local languages (for local communication and basic education), the African lingua franca (usually Kiswahili, for cross-culture interactions), and English (for administrative, legal, and more advanced educational purposes). The forms of English spoken in modern East Africa are also complex to describe, heavily influenced by a speaker’s formal education and their occupation (impacting the necessity they have for speaking English). Some speakers will be native English speakers, though fewer than in Southern or West Africa, while most will speak it as a second language. Sociolinguistically, the East African nations differ as to the status of Kiswahili and the changes in the official status of English since independence in the 1960s. It is also difficult to establish knowledge and use of English across the region in the absence of reliable data. Attitudinally, it is only in pronunciation that there is widespread acceptance of deviation from British English, with acceptance of Standard English syntax and grammar spoken with African accents. Yet African forms differ from the British ‘standard’ for a variety of reasons, including interference from the local native language, general language learning strategies, and written English exposure (since the written form has authority over the spoken form, leading to articulations such as word-initial /h/ in heir). Pronunciations in EAfE include many ‘nonstandard’ features, the main ones being listed below. The OED EAfE model is shaped by the pronunciations of our consultant speakers as well as key literature. EAfE is discussed as claiming only five distinct vowel qualities in contrast to seven-vowel West African varieties. The table below is an adaption of Schmied’s tables from his 2008 and 2015 descriptions, with a key systemic alteration. East African vowels EAfE does not have a consistent long-short vowel distinction. The equivalents of the British English ‘short’ vowels are also closer to the edges of the vowel space, and for this reason kit seems better reflected as /i/ rather than /ɪ/, although Schmied uses the latter in his 2015 discussion. Similarly, although Schmied transcribes the pride vowel as /aɪ/, the second element does not seem to be significantly different from the kit vowel and Bobda (2001) transcribes tribal as /traibo/ or /traibol/. Indeed, some traditionally diphthong vowels are either pronounced with a barely-perceptible second element (as in face) or tend towards being produced as two consecutive monophthong vowels (as in voice). For simplicity this latter phenomenon is only reflected in the audio in OED and for stress marking purposes usually treated as a single syllable. Many British vowel distinctions are not held in EAfE, for example, strut-palm-nurse (though nurse is particularly variable according to spelling and/or region). Schmied notes that a consequence of this is that vowels in full syllables are therefore underdifferentiated. In contrast, unstressed syllables may be overdifferentiated (policeman and policemen not being homophonous). The EAfE phonemic vowel spaces are perceptually larger than for many other varieties of English. In the OED audio recordings, /e/ is sometimes a crisp close [e], elsewhere a more open [ɛ]. /i/ similarly spans qualities from [i] to [ɪ], /a/ can sound more open-central than open-front, and /o/ spans a range of rounded back vowel heights (though maintaining distinction with /u/). /r/ before vowels may be trilled or flapped. EAfE as a rule is non-rhotic, but evidence from OED’s speakers suggests that post-vocalic /r/ may be pronounced if the root language would potentially indicate it, as in Turkana. There several consonant conflations observed within different groups across the region but few consistently. For example, the stigmatized /l/-/r/ merger is widespread, but may resolve differently depending on the ethnic group of the speaker. For this reason the merger is not reflected here. British English /θ/ and /ð/ are sometimes EAfE /t/ and /d/ depending on ethnic group and education, although this is stigmatized and other realizations are found. For many speakers, there is a form of ‘partially voiced’ /ð/ instead of distinct /θ/ and /ð/. For consistency, OED gives only the /ð/ EAfE pronunciations, though the audio may reflect more variable voicing levels. The influence of African languages may result in inserted or hypercorrection-deleted nasal consonants before stop consonants, but these are evaluated case-by-case. The presence of syllabic consonants is not discussed by much EAfE literature, yet they are a salient feature of the OED EAfE audio and pronunciation system. Syllabic /m/, /n/, and /ŋ/ are observed, and potentially /l/ or even /r/, though distributions may differ from those of other English varieties. Syllabic nasals are regularly found in borrowed but frequent words where a nasal is immediately followed by an obstruent (plosive, fricative, or affricate). In some cases where a syllabic consonant could be found in British English (e.g. Bible), there is a clear vowel in EAfE pronunciations, most commonly of [o] or [ɔ] quality and reflected in OED as /o/. Some instances in EAfE will be more /u/ as in the OED West African English model and there is not a clear distinction between the two varieties in this regard, but for the purpose of offering consistent and practical pronunciation models, OED retains the vowel qualities most commonly used in the literature on each (see also Wolf 2010). Also note that some word-final /l/ qualities may be entirely vocalized, transcribed in OED as e.g. tribal /ˈtraibo(l)/. Root-language voiced palatal plosives and nasals may be borrowed into a code-mixed realisation by many speakers, but are reflected in EAfE as /dʒ/ and /nj/ respectively. The voiceless velar fricative /x/ may be found in some words borrowed from Swahili transliterated with kh. Given the preference of many African languages towards a consonant-vowel syllable structure, consonant clusters are sometimes dispreferred, resulting in epenthesis (adding a vowel to make another syllable) or reduction (losing one of the sounds). Although highly variable between speakers, final consonant clusters may have the final consonant dropped (/neks/ for next, /han/ for hand). Some word-final vowel epenthesis is also noted by Bobda, and this is assessed on a case-by-case basis.The general preference for epenthesis over elision extends to phrase-level, e.g. ‘and go’ more likely to have epenthetic schwa between /d/ and /ɡ/ than the West African English tendency towards elision of the /d/ (Wolf 2010). OED’s editors consider a more technical description of common patterns based on Schmied (2008) as to how entries are most likely to be realized, though transcriptions should be simply regarded as reflecting one possible realization rather than necessarily the most frequent. Following existing OED pronunciation models, stress placement within each entry reflects how it would be perceived by knowledgeable British and American speakers, rather than necessarily the instinctive self-perceived placement of EAfE speakers. This approach therefore does not always agree with e.g. documented Kiswahili prosodic patterns or syllable divisions, but enables OED to highlight the core differences and similarities as to how different varieties of English compare at a perceptual level amongst English speakers (though the way ‘pitch’ is used in different varieties of English is the primary complicating factor). Schmied describes the EAfE tendency towards syllable-timed rhythm. In some of the OED models (e.g. Singapore & Malaysian English), this is shown in the OED by a ‘flattened’ stress structure, with nearly all syllables transcribed as having at least secondary stress marks. However, the OED EAfE speakers maintain a clear distinction in each word between the primary-stressed syllable and other syllables, and unstressed syllables are readily perceived as such even though the vowel qualities are not significantly reduced. EAfE is therefore treated more similarly to West African English in this regard. Stress patterns themselves tend to be more regularized than in British or American Englishes, though there are occasions where multiple stress patterns are found. Although highly variable, there is a tendency towards putting final word stress on suffixes such as –ize and -ate except for where the frequency and familiarity are such that the British pattern is more commonly adopted. The use of stress to make noun-verb distinctions is shown, although listeners may frequently encounter speakers who do not maintain this. Key sources for East African English - Bobda, A.S. 2001. East and Southern African English accents. World Englishes, 20(3), pp.269-284. - Schmied, J. 1991. English in Africa: an introduction. New York: Longman. - Schmied, J. 2008. East African English (Kenya, Uganda, Tanzania). In: R. Mesthrie, ed. Varieties of English 4: Africa, South and Southeast Asia. Berlin: Mouton de Gruyter, pp.150-163. - Schmied, J. 2015. East African English. In: M. Filppula, J. Klemola & D. Sharma, eds. The Oxford Handbook of World Englishes [Online]. Available at http://www.oxfordhandbooks.com/view/10.1093/oxfordhb/9780199777716.001.0001/oxfordhb-9780199777716 (accessed 12th August 2016). - Wolf, H-G. 2010. East and West African Englishes. In: A. Kirkpatrick, ed. The Routledge Handbook of World Englishes. Abingdon: Routledge, pp.197-211.
https://public.oed.com/how-to-use-the-oed/key-to-pronunciation/pronunciations-for-world-englishes/pronunciation-model-east-african-english/
Potassium Chloride is an odorless white colored powder which is readily soluble in water giving alkaline solution. It is utilized in formulation of potash fertilizer to provide optimum amount of potassium for healthy plant growth. In pharmaceuticals, this compound is used for treating low blood potassium levels. It is known to have chemical formula KCl and molar mass of 74.5513 g/mol. Potassium Chloride is also used as an alternative to NaCl in domestic water softener units. Features: Soluble in water, glycerol, & alkalies Odorless in nature Has face centered cubic crystalline structure Properties : • Molecular Formula : KCl • Molar Mass : 74.551 g/mol • Appearance : White crystalline solid • Density : 1.987 g/cm3 • Melting Point : 776 °C • Solubility in water : 28.1 g/100 cm³ (0°C); 34.0 g/100 cm³ (20°C); 56.7 g/100 cm³ (100°C) Specifications : • HS Code : 310420 • Moisture % by weight max 0.5% • Potash content as K2O% By weight min-58.0% • Sodium (as NaCl) % by weight (on dry basis) max 3.5% • Packing : 50 kg HDPE bag with inner liner | | Developed and Managed by Infocom Network Ltd.
http://www.pentabioscienceproducts.com/pure-potassium-chloride-3919026.html
Do you like it? 90 Read more February 29, 2016 What to Wear | Family Portraits Preparing the family for your portrait photography session One of the most time consuming tasks in preparing for a family portrait session is getting the families […] Do you like it? 84 Read more April 27, 2015 Kids Photos Adelaide School holidays have been and gone – its been quite a while since I’ve taken time out to photograph my own kids. I fixed that last […] Do you like it? 83 Read more January 9, 2015 Botanic Garden Portraits Welcome to 2015! Its been a busy start to the year with lots of family portraits in and around Adelaide – and plenty more to follow […] Do you like it? 27 Read more November 1, 2014 Child Photography My first family portrait session today was bright and early. I love photographing early in the day – the light is fantastic for portraits and always […] Do you like it? 21 Read more October 25, 2014 Kids Photo Session Its hard to call what I do a job when you get to have fun and create so much laughter with kids on a daily basis. […] Do you like it? 27 Read more August 24, 2014 Family Portraits Saturday afternoon I got tot spend time with this beautiful family. I’m normally crawling around on the ground chasing the odd toddler, but for this session […] Do you like it? 52 Read more August 4, 2014 Adelaide Family Portraits After a week of wet wintery weather the sun made a welcome appearance yesterday for a portrait session in the gardens. To view all the images […] Do you like it? 64 Read more July 12, 2014 Adelaide Family Photographer It may have been cold (ok, really cold and icy) and a bit wet in Adelaide today but come 4pm the sun broke through giving us […] Do you like it? 75 Read more June 8, 2014 Family Portraits in Adelaide Another beautiful Saturday morning spent in Adelaide’s park lands creating portraits – I can’t really call it a job, its too much fun! I have families […] Do you like it? 64 Read more May 27, 2014 Adelaide Family Photography I had a whole heap of fun on Sunday with this gorgeous family! It took a bit of warming up but who doesn’t love throwing leaves […] Do you like it? 47 Read more May 17, 2014 Child Portrait Photographers The Botanic Gardens in Adelaide are changing colours by the day at the moment. It was an early start today for some photos, but well worth […] Do you like it? 76 Read more May 4, 2014 Kids Portrait Photographer What an amazing family portrait session! I had a great time this morning with this wonderful family in Adelaide Botanic Gardens. Smiles all round from the […] Do you like it? 40 Read more April 28, 2014 Kids Studio Portraits Having kids in the studio is loads of fun, BUT you have to be quick! Its a little different from photographing outdoors as you have lots […] Do you like it? 83 Read more April 21, 2014 Family Portrait Photography Saturday the weather was perfect for my family portrait sessions in Adelaide. Thanks for all your smiles and giggles Charlie! The full image gallery can be […] Do you like it? 42 Read more April 21, 2014 Family Portraits Adelaide This was one of the lovely families I got to meet on the Easter weekend for a family portrait session. It was a great opportunity to […] Do you like it? 22 Read more April 15, 2014 Family Photography in Adelaide The weather this school holidays has been amazing (so far!!). Sure the mornings have been a tad chilly but it’s warming up quickly and you can […] Do you like it? 18 Read more March 28, 2014 Portrait Photographers Adelaide A very happy first birthday today to Miss Scarlett! One year old photo session, Adelaide Family Photographer, Botanic Park, South Australia. Do you like it?
https://www.photoplaystudios.com.au/category/portraits/
Call for proposals - Supporting Public Procurement of Innovative Solutions - PPI Pilots 65/G/ENT/CIP/13/N02C021 Closed! Objectives The European Commission calls on public procurement bodies to submit high-quality proposals for collaborative, cross-border projects, on the format of "buyers' groups" of innovative solutions – PPI PILOTS -, that improve the economic framework conditions for innovation and thereby contribute to smart, sustainable and inclusive growth. In more concrete terms, the European Commission calls for project proposals that clearly demonstrate how public procurement bodies will act, during the project, as launch customers for innovative goods or services which are not yet available on a large-scale commercial basis. Actions The establishment of cross-border "buyers' groups" with EU co-financing should remove obstacles that public procurers often face concerning the "joint" or "co-ordinated" procurement of innovative solutions: - Lack of knowledge and expertise in contracting authorities on the use of practices that favour innovation, on risk management in procurement, and on market and technological developments. - Lack of (or wrong) incentives for contracting authorities, which give priority to short term costs and provide no incentives for the additional risks (and initial costs) of purchasing innovative solutions, even if in the long and medium term cost savings and efficiency gains can be obtained. - Mismatch with public policies objectives and strategies, with procurement treated as a purely administrative, legal or financial task and not linked to public policy objectives such as energy and resource efficiency, green economy, etc. - Lack of innovative capability in public organisations, with little or no dedicated resources (financial or personnel) to identify, experiment, develop or evaluate innovations nor even to identify if innovative solutions could better help overcome problems in the public services than standardised solutions. - Fragmentation of demand / lack of critical mass due to the fragmentation of procurement actions across borders and administrative boundaries, which leads to individual procurements being too small for companies to make the effort of coming forward with innovative solutions. This lack of pooling the procurements also entails that the human resources for managing complex procurement processes and the risks involved in being a first customer are not shared. - Difficulties for innovative SMEs to be involved in public procurement as direct beneficiary/ client of a purchasing authority. This hampers the access of public authorities to the innovative potential of SMEs, in particular high-tech SMEs who play a key role in creating innovative solutions. European community funding The Community provisional funding available for the call for proposals is: - 6,35 Million EUR (Global Budget) All the important deadlines - 28 May 2013 - 8 years ago (Deadline for the presentation of proposals) Further information about the call Official webpage of the call Useful documents Organisations eligible to participate Opened to the following bodies or institutes with legal status established in the covered areas: - Any legal organisation Covered areas Bodies or institutes must have their registered legal seat in one of the countries taking part in the Programme which are:
https://euroalert.net/call/2694/call-for-proposals-supporting-public-procurement-of-innovative-solutions-ppi-pilots
The Benefits of a Formal Qualification in the Accounting Industry There are lots of different ways to start your career in the field of accounting. Most people go through continuing education (whether VET or higher ed) and find a graduate or entry level position. But others start by working in a related role, such as payroll or accounts payable. Some even start by working in a clerical role before pursuing on-the-job training. The point is, there are lots of pathways to working in an accountancy practice or in the accounts department of a larger organisation. If you’re weighing up whether study is worthwhile, here are a few benefits you should consider. Stronger knowledge When you’re learning on the job, you tend to only learn exactly what you need to do the job in front of you and no more. You get to know how to fill out a specific form, return, spreadsheet etc. In other words, you might become very good at routine work, but end up struggling with anything even a bit out of the ordinary. Stronger, more well-rounded knowledge is necessary for you to make well-informed critical decisions. For example, if you want to provide management accounting advice, you’ll also need background knowledge in business management and economics. Or if you want to be able to help clients with unique circumstances, you’ll need to be confident in your research abilities. Courses that lead to formal qualifications are designed to give you a strong, well-rounded knowledge base that you can use to confidently take on new tasks. When studying towards a qualification, you’ll learn how to do certain tasks, but you’ll also learn why things work the way they work. An accounting education also gives you the planning and study skills you need for future professional development – essential for staying ahead of the curve. To work as an accountant, the minimum qualification is a diploma. However, most practicing accountants undertake a Bachelor of Accounting, or a different bachelor degree (like Business) with a major in accounting. Bookkeepers may establish a career through extensive work experience, but a minimum Certificate IV qualification is the most common route. Payroll officers and accounts clerks can work without formal qualifications, but most who stay in the field do some form of VET as a minimum. For these other roles, a formal qualification leads to another important benefit… Higher employability In today’s job market, there’s a big difference between the minimum standard, and what you need to stand out of the crowd. When it comes to accounting-related roles, many employers either require a formal qualification, or indicate that a qualification is ‘preferred’ or ‘desired’. To test this, try searching for entry-level accounts roles on any job search engine. There are a few reasons for this. First, employers recognise that formal qualifications are more or less a guarantee that you’ve proven your knowledge and understanding in key areas. Taking the time to study is also a good way to show that you’re dedicated to the job, and that it’s really what you want to do. More career opportunities Accounting and accounting-related services exist in a kind of regulatory grey area. It’s not that the laws that exist on accounting related jobs are unclear; the regulators do a great job of making everything as simple as possible. It’s more that not every accounting-related job is regulated or requires professional regulation. For example, you may be able to work as an accounts clerk or a bookkeeper in a small business without formal qualifications. Contrast that with, say, medicine and healthcare, where most roles require a minimum formal qualification by law (except for some clerical and housekeeping positions). Working around the world Have you ever considered travelling and working overseas? In most countries, a formal qualification in accounting is the most straightforward way to show potential employers that your skills are compatible with their needs and the work you will be doing. In some situations, it’s simply easier for an employer to verify your education than to contact previous employers and enquire as to the responsibilities you had in your role/s. A qualification is also critical (in most jurisdictions) to getting a skilled worker visa or an employer-sponsored visa. In Australia, most skilled worker visa subclasses require a qualification, either as a core condition, as part of the ‘points system’, or as part of the skills assessment carried out by the relevant assessing authority. Other countries have similar requirements. For example, in the United States, three of the five employment based immigrant visa categories require an educational qualification. In the United Kingdom, the work visa sponsorship rules say that most jobs in the accounting field require at least the equivalent of a diploma-level qualification in Australia. NB: it’s critical to check the official government website of your preferred destination, or with a registered professional migration agent from that country, before making any important decisions about working overseas. Professional networking opportunities Joining a professional association (like the IPA) is a great way to further your career through professional networking events, continuing education and professional development, professional certifications, and more. If you aim to manage a practice or work as a sole practitioner, membership of a professional association can help improve potential clients’ level of trust and confidence in your expertise and abilities. Most professional associations and peak bodies require members to have at least a Certificate IV level qualification, or to be studying towards an accounting qualification. This gets the applicant some way towards an associate membership or student membership. Full membership, or higher levels of membership, may then require a postgraduate qualification as well. Take a look at the IPA membership pathways as an example. Still not sure if studying is for you? There are tons of pathways to an accounting qualification; it’s not all about on-campus study, or years of poring through textbooks. In fact, online study at VET level is a great way to balance your career advancement goals with your current work and personal commitments, whilst keeping your options for uni study open in the future. Check out the Certificate IV, Diploma and Advanced Diploma education options available through our education provider of choice, Monarch Institute. You can enrol anytime, study online and work through the course at your own pace.
https://www.publicaccountants.org.au/resources/education-blog/the-benefits-of-a-formal-qualification-in-the-accounting-industry
West African nations on Thursday recognized Umaro Sissoco Embalo as president of Guinea-Bissau, after four months of dispute over whether his election was fraudulent. Embalo won a run-off presidential vote in the chronically unstable country in December, according to the country's electoral authority. But losing candidate Domingos Simoes Pereira, from the long-ruling PAIGC party, called the election fraudulent and took the case to the Supreme Court, which has not yet ruled. Embalo, a former prime minister, declared himself president in February without waiting for the court, creating a political impasse. The heads of state of Economic Community of West African States (ECOWAS) said in a statement that they recognized Embalo as president but also called for constitutional reform to be put to a referendum within six months. Experts have argued that the country's semi-presidential system contributes to its instability, with frequent clashes between the president and the prime minister. Guinea-Bissau has known little but coups and instability since its independence from Portugal in 1974. The country has also long struggled with poverty and corruption and it has also become a transit route for South American cocaine heading to Europe.
When you consider that the ankle joint bears pretty much all of your bodies weight, and absorbs the force from changes in momentum and change of direction at the same time, its no wonder that ankles are a likely candidate for injury. Sprains and ankle roll injuries are also notorious for being severe and taking a long time to heel. Are your current training methods setting you up for ankle injuries? One common exercise you’re probably already doing, and may be doing incorrectly could Actually be contributing to an increased chance of turning or rolling your ankle. The exercise is the calf raise, and the potential problem is a muscle imbalance from improper alignment during the exercise. When doing a calf raise the tendency while raising up onto the balls of your feet is to allow your heels to flair outward. This will result in a strengthening of the outer stabilizing muscles of the lower leg but will allow the inner lower leg stabilizing muscles to stay week. This resulting imbalance can lead to a greater chance of rolling your ankle to the outside when enough force is placed on the ankle joint during cuts and changes in direction on the basketball court or any where else. The solution: Correct calf raise form. This will strengthen both the inner and outer lower leg stabilizer muscles equally. The next time you do calf raises, pay attention to the spacing of your heels. If you start out with your heels 2 inches apart, make sure they stay 2 inches apart all the way up and back down through the full range of motion. You will immediately feel the inner lower leg stabilizer muscles working. To feel the difference, try a few allowing your heels to flair outward and you will feel the outer stabilizers of the lower leg working but not the inner. That’s the muscle imbalance on its way to putting your ankles at risk. If done properly you will feel both the inner and outer areas of the lower leg working equally. Other Ankle exercises you can do for better flexibility, range of motion and stronger Ankles are Foot rolls (move each foot in circles both clockwise and counter clockwise) and ABC’s (using your big toe as a pointer with your foot in the air, spell out the shape of each letter in the alphabet. Work Hard: Train Hard:
http://freeverticaljumptraining.com/increase-your-vertical-jump/do-this-exercise-for-fewer-ankle-sprains/
Scientists unravel the world’s oldest family tree!3 min readReading Time: 3 minutes Have you wondered about where you come from? Who were your ancestors and what were they like? Where did they live and what did they do for a living? People who are curious about their origins tend to draw out a family tree that gives them a sense of where they come from. This ‘tree’ represents generations of a family, and can date back generations and generations. Now, scientists have put together the world’s oldest family tree using archaeological techniques and genetic analysis. They did an analysis of the remains of 35 people who lived about 5,700 years ago! The remains were found in a place where farming was first introduced in Britain about a century ago. Their study, which was published in the Nature journal earlier this week, claims to be the first of its kind to reveal in detail how prehistoric (the period before written records existed) families were structured. The authors say that the study provides new insights into burial and kinship practices prevalent in the Neolithic times. The Neolithic period is the final division of the Stone Age, with a wide-ranging set of developments that appear to have arisen independently in several parts of the world. The main events of this period were: 1. Domestication of animals. 2. Agriculture practice. 3. Modification of stone tools. 4. Pottery. Archaeologist Peter Bogucki wrote in the Encyclopaedia of Archaeology that during the Neolithic period, prehistoric societies of Europe started to appear familiar to the modern observer and that during this time, people ceased to be hunter-gatherers. The team of scientists analysed DNA extracted from the bones and teeth of 35 individuals who were in a tomb in the Cotswolds-Severn region of Britain. The researchers were able to detect that 27 of these individuals were close biological relatives. The presence of the remaining eight, who could not be determined to be close relatives, suggests that biological relatedness was perhaps not the only criterion for inclusion into the tomb. What this tells us…. Most significantly, the study says that most of the people buried in the tomb were descended from four women who had children with the same man. When these people died, they were buried inside two chambered areas (north and south) of the cairn (a kind of a memorial). The research suggests that while men were buried with their father or brothers, there were no adult daughters present. Their absence suggests that they were buried elsewhere, possibly with their male partners who they had children with.
https://www.owliverspost.com/scientists-unravel-the-worlds-oldest-family-tree/
Displaying 1 - 2 of total 2 results: Gamow's involvement with nuclear physics. His later work in astrophysics and his interest in biology. Personal anecdotes about Gamow's childhood in Odessa, student life with Lev Landau and Dmitriy Ivanenko at the University of Leningrad, his fellowship at Göttingen, work in Copenhagen with Niels Bohr, and at University of Cambridge with Ernest Rutherford. Emigration to America in 1934, subsequent work in the United States. Work on penetration barriers, saturation, the beta decay rule, and the nuclear droplet model. Also prominently mentioned are: Hans Albrecht Bethe, Hermann Bondi, Walter Bothe, Maurice de Broglie, James Chadwick, John Cockcroft, Edward Uhler Condon, Francis Crick, Critchfield, Marie Sklodowska Curie, Max Delbrück, Paul Adrien Maurice Dirac, Paul Ehrenfest, Enrico Fermi, James Franck, Alexander Friedman, Barbara Gamow, Thomas Gold, Ronald Gurney, Fred Hoyle, Petr Kapitsa, Krutkow, Ernest Orlando Lawrence, Nikolaivitch Luchnik, Chester Nimitz, J. Robert Oppenheimer, Wolfgang Pauli, Léon Rosenfeld, Dimitri Rozhdestwenski, Martin Schwarzschild, Edward Teller, Merle Antony Tuve, James Watson, John Archibald Wheeler, A. M. Wood; Associacion Venezueliana para Promocion de la Sciencia, University of Cambridge Press, Carlsbergfondet Fellowship, George Washington University, Institut de Physique Solvay, Leningradskii gosudarstvennyi universitet imeni A. A. Zhdanova, Moscow M. V. Lomonosov State University, National Academy of Sciences (U.S.), and Odessa I. I. Mechnikov State University. Session two is a joint interview with Robert Herman. Family background and early education, work at Carnegie Institution's Department of Terrestrial Magnetism, studies at George Washington University, wartime employment and studies, work with Navy on detection of mines; graduate studies with George Gamow while working at Johns Hopkins Applied Physics Laboratory, early universe theory, first encounter and later work with Robert Herman, interaction with physics community. Subrahmanyan Chandrasekhar and L. R. Henrich, neglect of Alpher and Herman work by astronomical community; General Electric projects: supersonic flow, re-entry physics, the Talaria project; the Penzias/Wilson observations; honors, marriage. Miscellaneous recollections about youth in Washington, D.C., service on scientific committees, public education efforts, work at General Electric. Meeting of Alpher and Herman, their collaboration, cosmological theory, work with George Gamow, Edward Teller, Hans Bethe, Edward Condon, cosmic background radiation, controversy with steady-state adherents and others; systematic neglect of their work, nucleosynthesis in stars, reactions to awards, discussions with Arno A. Penzias at the time of Nobel Prize award (with Robert W. Wilson), correspondence with S. Pasternack about P. James Peeble's cosmology papers, Alpher paper on neutrino and photon background calculation, James Follin, C. Hayashi, Steven Weinberg's presentation in his book The First Three Minutes; current cosmological efforts, A. Zee's papers on cosmology, views on the National Academy of Sciences and the National Academy of Engineering, Fred Hoyle's recent writings. Also prominently mentioned are: Niels Henrik David Bohr, Albert Einstein, Richard Phillips Feynman, Lawrence Randolph Hafstad, Robert Hofstadter, Huntington, and H. P. Robertson.
https://www.aip.org/history-programs/oral-histories/search?f%5B0%5D=has_audio_excerpt%3A1&f%5B1%5D=institutions%3A2006&amp%3Bf%5B1%5D=field_institutions%3A1581&amp%3Bamp%3Bf%5B1%5D=field_subjects%3A4016
Search For "autoimmunity" Updated : 1 week, 3 days ago IST Washington [US], September 25 (ANI): Type 1 diabetes (T1D) is an autoimmune disease in which the pancreas makes little or no insulin. The details of the events that occur during autoimmune destruction of the pancreatic beta-cells have been studied extensively yet the mystery of what causes a Updated : 3 months, 1 week ago IST Washington [US], June 28 (ANI): A recent research by a group of scientists discovered that the causes of type 1 diabetes focus more on the autoimmune response, where the immune system destroys pancreatic islet beta cells which help to produce insulin in the body. Updated : 2 years, 5 months ago IST California [USA], April 26 (ANI): A research report finds that signs of autoimmunity can appear in Parkinson's disease patients years before their official diagnosis. California [USA], April 21 (ANI): A new study has found evidence that Parkinson's disease is partly an autoimmune disease and the autoimmune system of a body plays an important role in the disease's functioning.
https://www.aninews.in/topic/autoimmunity/
Forty years hence since very obvious doping had been taking place, at least in the sport of athletics, with East German and Russian and other Eastern Bloc athletes clearly doping under a systematic program, as well as Chinese middle-distance runners during the 1990s and American and Jamaican sprinters over the past 25 years – Suddenly IOC President Thomas Bach announced that stiffer measures must be in place to stop doping. Olympic watchers since at least 1976 have mocked the condition of athletes, while clean athletes over time through the media and or biographies have reported and detailed obvious doping. Measures should have started 40 years ago. Better late than never, except in this case, where a once glorious spectacle has become a shameful embarrassment; a joke. International Olympic Committee (IOC) President Thomas Bach believes clear criteria clarifying who is responsible for compliance issues must be introduced amid changes to the global anti-doping landscape. Bach, speaking here today at the General Assembly of the Olympic Council of Asia (OCA), claimed there is a need for specific procedures regarding testing, compliance and sanctioning issues in order to add transparency to the anti-doping process. More harmonised conditions must be found between testing procedures in different countries, he added. Bach also reiterated his view that testing and sanctioning should be made independent from sports organisations ahead of an Olympic Summit in Lausanne on October 8 where this is expected to be discussed in more detail. He did, however, insist that a revamped World Anti-Doping Agency (WADA) must remain at the forefront of discussions. The German had not initially mentioned doping challenges in his opening remarks here before being asked for an update on integrity issues by National Olympic Committee of Sri Lanka secretary general, Maxwell de Silva. “You’re all aware of the challenges we had with regard to the protection of clean athletes before the Summer Games in Rio de Janeiro,” Bach replied. “The IOC, on very short notice, had to take some preliminary decisions and actions in order to protect clean athletes. “In these discussions, It has become more obvious that we have to look at the WADA system. “We have to make new efforts to strenghen the fight against doping. “In the IOC Session [in Rio de Janeiro last month], we decided that the IOC will ask for a full review of the WADA anti-doping system in order to make it more robust, more efficient, more transparent and more harmonious. “In this respect, we also said that this has to happen together with WADA.
http://athleticsillustrated.com/editorial/bach-calls-for-stricter-criteria-on-deeming-organisations-non-compliant-with-anti-doping-rules/
27 July 2021 With the first competitions that started two days prior to the Opening Ceremony on 21 July, the ITA set in motion its in-competition anti-doping program for Tokyo 2020. Together with the still ongoing out-of-competition activities in the Olympic Village and all over the world, these are two core stages of the independent and comprehensive anti-doping program that the ITA is leading at the Games. Targeted doping controls are implemented daily and across all venues and disciplines to ensure a robust and well-balanced testing distribution. Of the around 5’000 samples that the ITA plans on collecting overall during the Games, approximately 3’500 will be the result of in-competition doping controls. Over 50 doping control stations have been set up at the various Olympic Venues. The ITA team is present with 24 anti-doping specialists in Tokyo. The ITA’s clean sport activities for the Games, carried out in close cooperation with the Tokyo 2020 Organising Committee and the Japan Anti-Doping Agency (JADA), are supported by 250 Doping Control Officers (DCOs) and 700 Chaperones. More than half of the DCOs come from JADA, the rest from National and Regional Anti-Doping Organisations from all over the world. All Doping Control Station Managers as well as a considerable number of DCOs have received advanced training through the ITA’s IDCO Training & Certification Program ahead of the Games. These Games-time activities are part of a global anti-doping program that started one year ago and that the ITA led to recommend testing across all participating countries and International Summer Olympic federations to promote adequate testing on athletes who take part in the Olympic Games Tokyo 2020. These Pre-Games efforts were complemented by a large-scale long-term storage project enabling any interested anti-doping organisation to store samples collected during this pre-Games period at no cost in a facility set up by the ITA through a dedicated IOC-fund. To date, over 40 organisations are already participating in this program. ITA Foundation Board meets in Tokyo The ITA Foundation Board chaired by Dr. Valérie Fourneyron took the opportunity to conduct a meeting in Tokyo to review the organisation’s activities and to have a look ahead at the ITA’s future. The Board Members were pleased with the development of the organisation since its operational start three years ago in July 2018, the credibility it has been able to establish within the anti-doping community and the solid know-how and project delivery of the ITA team. Next to the many partnerships for clean sport that the ITA has entered in a short amount of time with different actors from within the sports and anti-doping system, the Board also commended the organisation on more recent actions such as the pertinent report the ITA published on its investigation into a decade of rule violations in weightlifting, the integration of the cycling anti-doping program into its structure, the development of its international training and education programs or the establishment of its own whistleblowing platform REVEAL. For the ITA to consolidate and manage its rapid growth and achieve the goal of becoming an independent global centre of anti-doping expertise, the Board supported the development by ITA’s leadership of an updated strategic roadmap for the cycle 2022-25. This strategy will guide ITA’s development in a way that is at once fortifying its leading role in the advancement of clean sport and at the same time complementary to the existing structures of the anti-doping system, especially regarding the World Anti-Doping Agency (WADA) and Regional/National Anti-Doping Organisations worldwide. The Board also received an operational update on the anti-doping program that is currently being implemented for Tokyo 2020 and noted the unique and complex circumstances that the ITA team faces regarding its implementation due to the Covid-19 pandemic. The many preventive sanitary measures and restrictions in place, such as a shortened period of the athletes’ stay in the Olympic Village, cause significant challenges for the execution of the testing program. The Foundation Board was also honoured to host the World Anti-Doping Agency (WADA)’s President Witold Banka, WADA Vice-President Yang Yang and WADA Director General Olivier Niggli who gave an update on WADA’s activities and underlined the fruitful and important cooperation that exists between the two organisations. WADA has composed an 8-member Independent Observer team to oversee doping control activities on-site throughout the duration of the Olympic Games and to share any improvement actions with the ITA. More information on ITA’s activities can be found in the activity report that the organisation presented at the 138th IOC Session in Tokyo on 20 July 2021.
https://ita.sport/news/itas-anti-doping-program-for-tokyo-2020-well-underway-board-updated-on-past-years-activities/
Looking for life on other planets is not straightforward. It usually relies on chemical detection, which might be limited or even completely irrelevant to alien biology. On the other hand, motion is a trait of all life, and can be used to identify microorganisms without any need of chemical foreknowledge. EPFL scientists have now developed an extremely sensitive yet simple motion detector that can be built easily by adapting already-existent technology. The system has proven accurate with detecting bacteria, yeast, and even cancer cells, and is considered for the rapid testing of drugs and even the detection of extraterrestrial life. The work is published in the Proceedings of the National Academy of Sciences (PNAS). Giovanni Dietler, Sandor Kasas and Giovanni Longo at EPFL have developed a motion detector that uses a nano-sized cantilever to detect motion. A cantilever is essentially a beam that is anchored only at one end, with the other end bearing a load. The cantilever design is often used with bridges and buildings, but here it is implemented on the micrometer scale, and about 500 bacteria can be deposited on it. The idea comes from the technology behind an existing microscope, the atomic force microscope. This powerful microscope uses a cantilever to produce pictures of the very atoms on a surface. The cantilever scans the surface like the needle of a record player and its up-and-down movement is read by a laser to produce an image. The motion sensor the Dietler and Kasas developed works the same way, but here the sample is attached on the cantilever itself. For example, a bacterium attaches to the cantilever. If the bacterium is alive, it will inevitably move in some way, e.g. move its flagellum or simply carry out normal biological functions. That motion also moves the much smaller and sensitive cantilever and it is captured by the readout laser as series of vibrations. The signal is taken as a sign of life. The EPFL scientists successfully tested their novel system with isolated bacteria, yeast, mouse and human cells. They even tested soil from the fields around the EPFL campus and water from the nearby Sorge river. In each case, they were able to accurately detect and isolate vibration signatures from living cells. When they used drugs to kill anything alive, the motion signals stopped. “The system has the benefit of being completely chemistry-free,” says Dietler. “That means that it can be used anywhere – in drug testing or even in the search for extraterrestrial life.” The scientists envision a large array of cantilever sensors used in future space exploration probes like the Mars rover. As it relies on motion rather than chemistry, the cantilever sensor would be able to detect life forms in mediums that are native to other planets, such as the methane in the lakes of Titan. Read more: Detecting extraterrestrial life through motion The Latest on: Nanoscale motion detector via Google News The Latest on: Nanoscale motion detector - DNA-assembled nanoarchitectures with multiple components in regulated and coordinated motionon November 29, 2019 at 11:20 am However, hierarchical assembly methods that allow for organizing nanoscale objects with precise compositions ... Samples added to drive the synchronous motion for in situ fluorescence detection. Table ... - Ultrafast quantum motion in a nanoscale trap detectedon November 5, 2019 at 7:22 am The detection was made in collaboration with Nippon Telegraph and Telephone Corp ... The Korea Advanced Institute of Science and Technology (KAIST). "Ultrafast quantum motion in a nanoscale trap ... - Ultrafast quantum motion in a nanoscale trap detectedon November 5, 2019 at 6:27 am KAIST researchers have reported the detection of a picosecond electron motion in a silicon transistor ... When an electron is captured in a nanoscale trap in solids, its quantum mechanical wave ... - Picosecond detection of electron motionon November 4, 2019 at 8:21 am The motion of a single electron can now be sampled with picosecond resolution, which helps to characterize and understand non-equilibrium electron dynamics in nanoscale conductors. - ‘Motion detector’ shrinks to microscaleon October 21, 2019 at 5:00 pm Accelerometers work by using a sensitive displacement detector to measure the motion of a flexibly mounted mass ... of a large-scale optical interferometer all the way down to the nanoscale,” Painter ... - Quantum Squeezing Lets Researchers Measure Sub-Nanoscale Motionon June 24, 2019 at 11:34 am Researchers at the National Institute of Standards and Technology (NIST) have harnessed the phenomenon of “quantum squeezing” to amplify and measure the motion of a magnesium ... method could improve ... - Nano zipper cavity, responsive to single photons, promises sensitive force detection, light-tunable communication circuitson June 7, 2019 at 5:00 pm June 8, 2009--A new nanoscale photonics device exploits the mechanical properties of light to create an optomechanical cavity in which interactions between light and motion are greatly ... development ... - Multimodal interference-based imaging of nanoscale structure and macromolecular motion uncovers UV induced cellular paroxysmon April 10, 2019 at 2:06 am Integrating measurements of nanoscale structure and macromolecular motion has provided an enhanced understand ... and during treatments, and detection of alterations in sub-cell populations. This ... - Squeezing light at the nanoscaleon June 17, 2018 at 12:19 pm “These light-induced forces serve also as one our detection mechanisms,” said Antonio Ambrosio, a principal scientist at Harvard’s Center for Nanoscale Systems. “We observed this ultra-confined light ... - Magnetic System Transforms Heat into Motion for Next-Gen Storage, Sensor Deviceson December 28, 2017 at 12:59 am Researchers have created a new system that transforms ambient heat into motion in nanoscale devices, with applications for next-generation storage, sensor, and medical systems. (Source: University of ...
https://www.innovationtoronto.com/2014/12/detecting-extraterrestrial-life-through-motion/
It might not be uncommon to encounter a variety of essential topics to address when preparing to dissolve a marriage. With so much at stake, individuals in Alabama might have concerns about making mistakes during the process and about the possible ramifications involved with similar issues. Mistakes could affect the outcome of a divorce and knowing how to create a strategy to mitigate risks may prove vital to preparing to protect one’s future. Limiting mistakes According to studies, there may be numerous types of mistakes a person can make during the end of a marriage. One common mistake could involve being too focused on current feelings and wishes, as this could influence one’s ability to make decisions based on what is best for the future. The family home is an example of an asset that can hold sentimental value, but pursuing ownership of the home might not always be favorable and knowing one’s options and topics to address regarding this asset could be vital to making informed decisions. Experts indicate that another common mistake could involve refusing to cooperate during negotiations or budge on requests. Those who are eager to move on from the process may also be more susceptible to making rash decisions that might not align with their needs. Experts also suggest that making changes to spending habits prior to legal proceedings could prove detrimental and may influence the outcome of the situation. Safeguarding one’s future It is no secret that divorce can be an emotional process and the idea of making mistakes may only add stress to an already challenging experience. Individuals in Alabama who wish to avoid mistakes and create a strategy that best aligns with their preferences could benefit from retaining the services of a family law attorney for guidance. An attorney can address all a client’s questions and wishes and work toward developing a plan with which to seek the most favorable outcome achievable during subsequent divorce proceedings.
https://www.snodsmithlaw.com/blog/2022/03/taking-steps-to-avoid-mistakes-during-a-divorce/
This brief lesson is a continuation on the last lesson about your protagonist’s choices. As important as it is for your protagonist to make choices that decides her own fate, it’s just as important to make those choices hard. Which choice creates more drama: Option One: Thirteen dwarves visit a hobbit named Bilbo to invite him on a quest to defeat a dragon and take its treasure. He readily agrees and they skip off. Option Two: Thirteen mangy dwarves unexpectedly visit a fat, comfortable hobbit named Bilbo. They eat him out of house and hobbit hole, while he watches on frustrated. Then they invite him on a quest to kill a dragon who once destroyed an entire city and steal its treasure, a quest that will likely involve his death and will certainly involve discomfort and constant fear. He immediately chooses not to go on the quest. Why leave the comfort of his cozy hobbit hole? Even when the dwarves tell him he will receive more treasure than he could possibly imagine, and Gandalf makes a heartfelt plea, showing him how the adventure will improve his live, he says no. However, at the last possible moment, he decides as cozy as his hobbit hole is, the adventure offers something his life is missing (namely excitement and companionship), and he decides to join the quest. How to Create Dramatic Choices This isn’t a hard choice, right? The best stories rarely involve the protagonist making instant decisions. Instead, protagonists must debate over their choices, waffling from one option to another, sometimes for quite a long time, before finally choosing to pursue their goal. This process of debate creates the drama your story desperately needs. It creates drama in two important ways: - Inspires Doubt in Your Readers. The process of debate makes your reader ask, “Is she going to choose the adventure or stay stuck in the status quo?” - Raises the Stakes. The process of debate involves considering the consequences of the choice. It reveals how difficult achieving the goal will be. No one wants a story to be easy, and increasing the stakes will increase the reader’s interest. If you’re writing a romantic comedy, don’t have your characters fall in love easily. If you’re writing a detective novel, don’t let your protagonist readily take on the case. If you’re writing fantasy, don’t let your protagonist begin the adventure without waffling over the dangers. Instead, make it hard. Story Audit Audit the story you chose in the first lesson with the following questions: - Does your protagonist go through the process of debate, waffling over her choice? - What are the consequences of your character’s choice? Are they severe enough? How can you raise the stakes? Let us know how your audit went in the comments section below. Ready for the next lesson? Click here.
http://my.storycartel.com/choices-matter/
Imbalance of peripheral follicular helper T lymphocyte subsets in active vitiligo. Vitiligo is an autoimmune disease characterized by the presence of several autoantibodies, some of which are directed against melanocyte components and have been shown to be associated with the progression of the disease. However, the mechanism involved in the production of autoantibodies remains unclear. Follicular helper CD4+ T cells (TFH) are specialized in B-cell activation and antibody production, especially the TFH cell subsets type 2 and type 17. To date, TFH cell subsets have not been studied in human vitiligo. This study in 44 vitiligo patients and 19 healthy controls showed an increase in circulating TFH cells associated with disease clinical progression. A more precise analysis of TFH cell phenotype demonstrated that vitiligo is characterized by populations of peripheral TFH cells responsible for helping B-cell function, such as TFH type 2 and type 17 which produce Th2- and TH17-related cytokines, respectively. These findings suggest a new mechanism involving TFH cell subsets in the pathogenesis of human vitiligo and leading to the production of autoantibodies and disease.
- * * *1. The morphologic structure of an organism. 2. The science of the morphology or structure of organisms. 3. SYN: dissection. 4. A work describing the form and structure of an organism and its various parts. [G. anatome, dissection, from ana, apart, + tome, a cutting]- applied a. SYN: clinical a..- artificial a. the manufacture of models of anatomic structures, or the study of a. from such models.- artistic a. the study of a. for artistic purposes, as applied to painting, drawing, or sculpture.- clastic a. the construction or study of models in layers which can be removed one after the other to show the structure of the organism and/or organ. SYN: plastic a..- clinical a. the practical application of anatomical knowledge to diagnosis and treatment. SYN: applied a..- comparative a. the comparative study of animal structure with regard to homologous organs or parts.- dental a. that branch of gross a. concerned with the morphology of teeth, their location, position, and relationships.- descriptive a. a description of, especially a treatise describing, physical structure, more particularly that of man. SYN: systematic a..- developmental a. a. of the structural changes of an individual from fertilization to adulthood; includes embryology, fetology, and postnatal development.- functional a. a. studied in its relation to function. SYN: morphophysiology, physiologic a..- general a. the study of gross and microscopic structures as well as of the composition of the body, its tissues and fluids.- gross a. general a., so far as it can be studied without the use of the microscope; commonly used to denote the study of a. by dissection of a cadaver. See practical a.. SYN: macroscopic a..- living a. the study of a. in the living individual by inspection.- macroscopic a. SYN: gross a..- microscopic a. the branch of a. in which the structure of cells, tissues, and organs is studied with the light microscope. See histology.- pathological a. SYN: anatomic pathology.- physiologic a. SYN: functional a..- practical a. a. studied by means of dissection. See gross a..- regional a. an approach to anatomic study based on regions, parts, or divisions of the body ( e.g., the foot or the inguinal region), emphasizing the relationships of various systemic structures ( e.g., muscles, nerves, and arteries) within that area; distinguished from systemic a.. SYN: topographic a., topology (1).- special a. the a. of certain definite organs or groups of organs involved in the performance of special functions; descriptive a. dealing with the separate systems.- surface a. the study of the configuration of the surface of the body, especially in its relation to deeper parts.- surgical a. applied a. in reference to surgical diagnosis, dissection, or treatment.- systematic a. SYN: descriptive a..- systemic a. a. of the systems of the body; an approach to anatomical study organized by organ systems, e.g., the cardiovascular system, emphasizing an overview of the system throughout the body; distinguished from regional a..- topographic a. SYN: regional a..- transcendental a. the theories and deductions based upon the morphology of the organs and individual parts of the body.- ultrastructural a. the ultramicroscopic study of structures too small to be seen with a light microscope. * * *1) a branch of morphology that deals with the structure of organisms compare PHYSIOLOGY (1)2) a treatise on anatomic science or art3) the art of separating the parts of an organism in order to ascertain their position, relations, structure, and function: DISSECTION4) structural makeup esp. of an organism or any of its parts * * *n.the study of the structure of living organisms. In medicine it refers to the study of the form and gross structure of the various parts of the human body. The term morphology is sometimes used synonymously with anatomy but it is usually used for comparative anatomy: the study of differences in form between species. See also cytology, histology, physiology.• anatomical adj.• anatomist n. * * *anat·o·my (ə-natґə-me) [ana- + -tomy] 1. the science of the structure of the body and the relation of its parts; it is largely based on dissection, from which it obtains its name. 2. dissection of an organized body. Medical dictionary. 2011. Look at other dictionaries:
https://medicine.enacademic.com/392
For many people who are new to the idea of using moisture meters to monitor the moisture content of different building materials, the terms “moisture content” and “reading scale” might need some explanation. What do these terms mean, and why are they important when using a moisture meter? What is Moisture Content? Moisture content (MC) is a reference to the amount of moisture present in a material. This value is often represented as a percentage of the material’s mass (such as X% MC). The amount of moisture in an object can be measured in several different ways, such as with oven-dry tests or moisture meters. Oven-Dry Testing Oven-dry tests measure moisture content by weight—a piece of material is weighed and then placed in an oven at a set temperature for as long as it takes for the material to stop changing weight. Once dry, the material is weighed again, and the difference in pre-drying weight and post-drying weight is used to determine how much moisture was in the material being tested. However, there are a few issues with these tests. First, they can take a while to finish and require an oven of some kind—making them impractical for on-the-go testing moisture. Second, such tests are frequently destructive to the materials being tested—rendering them unusable in many cases (such as when testing wood or some plants). Finally, concerns have been raised about the accuracy of such testing—as one CSC Scientific article asks, “Are we certain that other volatiles did not leave with the water or decompose with the heat?” Despite this concern, oven-dry testing is generally accepted to be the most accurate means of measuring moisture content in a wide variety of materials. Moisture Meter Testing The other method for testing the moisture content of different materials is the use of moisture meters. The way that this works will vary slightly depending on the type of moisture meter being used. Moisture meters can be divided into two broad categories: - Pinless Moisture Meters. These meters rely on electromagnetic waves to “scan” a material sample. The contact plate on the meter needs materials with a flat surface and sufficient thickness to operate properly. If the contact plate can’t make solid contact, then the radio wave might become distorted. If the material is too thin, then the pinless meter might scan the material behind the sample being scanned. - Pin Type Moisture Meters. These meters use the principle of electrical resistance to measure moisture in various building materials. A set of pins are inserted into the material being tested, and an electric current is passed from one pin, and through the material to the other pin. Since water conducts electricity, more resistance means less water, and less resistance means more water. Reading Scales and Moisture Meters It is in moisture meter testing that the term “reading scale” becomes important. Why? Because, with moisture meters, each device is usually calibrated to get accurate (or “quantitative”) readings in one kind of material. For example, there are some moisture meters that are optimized for getting accurate readings in wood. These would be called wood moisture meters and have a “wood reading scale.” On the other hand, there are moisture meters optimized for hay—these meters would be called hay moisture meters and have a hay reading scale. However, there are other meters, such as soil moisture meters, that are designed to measure the available moisture in soil, but don’t have a “soil reading scale.” The reason for this is that although the meter measures the available moisture in soil, there are too many variables in soil composition in different parts of the world to allow a consistent standard of measurement for the actual moisture content of soil. Some meters use a “reference scale” mode that isn’t calibrated for any single material. Instead, reference meters provide a qualitative estimate of moisture in a given material. Some professionals use this setting to get a quick pass/fail moisture assessment in materials that don’t have an associated reading scale (or, if the user doesn’t have the right meter for the job). With reference scale meters, the user typically tests a sample of material they know is dry, and then uses that reading as a comparison (or “reference”) point. If the reading is close to or the same as the “dry” sample, then the material is probably dry, if the reading is significantly higher, then it is most likely wet. Of course, even within a single reading scale, there is room for variation in the physical properties of the material being tested. For example, there are hundreds of species of wood, each with its own specific gravity and electrical conductivity (the two factors that affect pinless and pin-type moisture meters, respectively). To account for this, some high-quality wood moisture meters have a built-in species correction feature—which is kind of like having a reading scale specialized for a specific type of wood. There is a similar feature used in some grain moisture meters to account for the hundreds of grain crop types farmers commonly grow. To recap in brief: - Moisture Content is an assessment of how much moisture is in a material. This information may mean different things depending on the material being tested. - Reading Scales are an expression of what material (or materials) the moisture meter is calibrated to provide accurate readings in. Need to know more about how moisture meters work and how to use them? Download our free Moisture Meters 101 guide at the link below. Or contact us to talk about your moisture meter options.
https://www.delmhorst.com/blog/explanation-of-moisture-content-and-moisture-reading-scales
Prof. Dr. Dr. Felix Ekardt, LL.M., M.A. Recent Publications and Speeches Newsletter The production of animal food products is (besides fossil fuels) one of the most important noxae with regard to many of the environmental problems, such as climate change, biodiversity loss or globally disrupted nutrient cycles. This paper provides a qualitative governance analysis of which regulatory options there are to align livestock farming with the legally binding environmental objectives, in particular the Paris Agreement and the Convention on Biological Diversity: here. Felix Ekardt serves as guest editor for an upcoming Special Issue of Sustainability on "Climate Change and Human Reaction: Transformation, Governance, Ethics, Law". The Call for Papers is now open: here. From spring 2019 Felix Ekardt is the editor of Springer Nature's new book series "Environmental Humanities: Transformation, Governance, Ethics, Law". It is open to the entire social sciences, i.e. economics, philosophy, sociology, political science, ethnology, etc. Volume 1 "Sustainability: Transformation, Governance, Ethics, Law" by Felix Ekardt has been published now and provides an overview of the work of the FNK with completely new perspectives in sustainability research - and can be read with Springer Link: here. Missing German and EU climate targets is not embarrassing - it is contrary to international and human rights. Even the unambitious targets themselves are illegal; all the more so their misconduct. More on this in our new legal opinion on the Paris Agreement here. The scarcity of phosphorus (P) is a global concern that is not restricted to western industrialized nations. Based on several third-party funded projects, the industrialized nation of Germany, the EU, the emerging economy of Costa Rica, and the developing country of Nicaragua are examined in various contributions with regard to their legislation in the field of environmental protection and agriculture, in particular with regard to soil protection and fertilizer law. It becomes clear that soil protection has not yet been adequately standardised in law and at the same time the efficient use of organic or recycled P fertilizers instead of (finite) mineral P fertilizers is inadequately regulated: see here and here. Fundamental Research of the Research Unit Sustainability and Climate Policy consists mainly of national and international publications in journals and books (and in extensive presentations, policy consulting and media activities). Additionally, it works on a large number of research projects for public and non-profit clients. The following list includes current projects. Then, all past and present projects of people associated with the Research Unit in are listed. Each first mentioned project indicates the main research area and for PhD students the working title of their thesis. Projects of former associates of the Research Unit are separately listed at the end. Click on a member's name to see their vita, publications, and given talks. The Final Reports of the projects are usually in German, but many of our articles in journals on these subjects are published in English. Moreover, there exist concluded PhD projects on public procurement law, building law, terrorism and security, and on principles of international public law (second opinions) as well as finished BUND-projects on global justice (Nina Neumann), rationing in health care systems and the adaption to climate change (Verena Lessmann), and a university financed project on the every day culture of law students with a migration background in liberal states (Cornelia Richter).
http://sustainability-justice-climate.eu/en/projekte.html
Answers to questions about parenting * information about programs and services that are available for young children * an opportunity to talk to early years professionals, as well as network with other parents and caregivers in the community * view calendar for full schedule Services include: Early learning and literacy programs for parents and their children Programs to support parents and caregivers in all aspects of early child development Programs on pregnancy and parenting Links to other early years programs in the community Outreach activities to ensure all parents can become involved with their local Ontario Early Years Centre About UsOntario Early Years Centres are places where parents and caregivers can: take part with their children in a range of programs and activities get answers to questions get information about programs and services that are available for young children and their families talk to early years professionals, as well as other parents and caregivers in the community.
How did Britain and France react to the rise of dictatorships in Europe? Britain and France met with Germany in Munich to deal with Hitler's aggression; without the League of Nations to help them, they appeased Hitler but warned him not to seize more land; didn't want to get involved in another world war, so attempted to avoid war How did the League of Nations react to the dictators and acts of aggression? League of Nations lacked the military to back it up, so they warned Hitler to stop, but he did not How did the position of the United States on the war change during the 1930s and early 1940s? We went from a position of neutrality, to helping an aiding nations through lend/lease, to joining the war on the side of the Allies. Why was Hitler able to rise to power so easily? Germany was in bad shape after World War I; because they were forced to pay reparations and give up land, Germany was in a depression and nearly bankrupt What events led to and followed the bombing of Pearl Harbor? Due to Japanese aggression in the Pacific, the US is going to cut its trade with Japan (oil, airplane fuel and scrap metal) and freeze Japanese assets in the US; US and Japan meet in Washington in November of 1941, yet nothing is really worked out and Pearl Harbor is attacked days later How did Americans at home help the war? Americans grew victory gardens, rationed, bought war bonds, women went to work in the factories, people volunteered to join the military, etc. Why did Harry S. Truman decide to drop the atomic bombs on Nagasaki and Hiroshima? Truman wanted to end the war quickly and avoid as many Americans lives as possible What were the results of World War II? Soviet Union becomes a dominant power, Germany is divided, Japan is occupied by the US, Communism spreads in Europe, imperialism is ended throughout Asia and Africa, nuclear age begins, officers are accused and found guilty of crimes against humanity, US realizes it cannot be isolated from world affairs, United Nations is established, Italy, Germany and Japan stripped of the land that they seized, etc. Recommended textbook explanations Impact California Social Studies World History, Culture, & Geography The Modern World Jackson J. Spielvogel 1,440 explanations Modern World History Patterns of Interaction Dahia Ibo Shabaka, Larry S. Krieger, Linda Black, Phillip C. Naylor, Roger B. Beck 1,293 explanations World History: The Human Journey Akira Iriye, Laurel Carrington, Mattie P. Collins, Peter Stearns, Rudy J. Martinez 1,627 explanations World History Patterns of Interaction Dahia Ibo Shabaka, Larry S. Krieger, Linda Black, Phillip C. Naylor, Roger B. Beck 2,261 explanations Sets found in the same folder Reasons For The Civil War~Social Studies Mr.Lizza 20 terms tinkgrace19 Social Studies~Mr.Lizza~Civil War 27 terms tinkgrace19 Great Depression Test SS Grade 8H 36 terms tinkgrace19 Social Studies 8th Grade A Changing Society 50 terms tinkgrace19 Sets with similar terms World War II Review Sheet 34 terms Creamynacho WWII Review 37 terms Ashley0xx WWII Review 37 terms sabbourjj WWII Unit Review 51 terms Jolie_Heller Other sets by this creator Latin Chapter 6 - Sum and Possum; Complimentary In… 55 terms tinkgrace19 Acids/Bases and Soluble Things 16 terms tinkgrace19 Polyatomic Ions 29 terms tinkgrace19 CHM 111 CH 1-3 98 terms tinkgrace19 Verified questions WORLD HISTORY How was Hitler able to shift political thought in Germany in order to establish and maintain a totalitarian state? Verified answer WORLD HISTORY How is the humanism of the Renaissance reflected in its art? Explain with examples. Verified answer WORLD HISTORY Which event do you think was most beneficial to Latin America from 1823 to 1914? Why? Verified answer WORLD HISTORY Write a short paragraph describing the major events in China related to imperialism during the nineteenth and early twentieth centuries.
https://quizlet.com/197447752/social-studies-8h-ww2-test-flash-cards/
The CNC Operator is responsible for set up and operation of two CNC mills. Check quality of finished parts. Fully understands technical drawings, revisions and note codes, uses QC info. Operate machines, and any other calibration equipment such as calipers, wrench, and air gun or any other equipment necessary to perform job functions. * You will perform minor set-ups and tool changes to execute a sequence of operations such as turn, drill, and bore a variety of metal components. * You will interpret technical drawings in accordance with standard shop practices. * You will make offset adjustments and performing minor program edits. * You will be responsible for finished parts conformity to print or specification.
http://corporategray.com/jobs/20053988/public_profile
FROM THE TEACHER: We have had a very busy first week here at Pitner. We have been working hard to learn a new routine and to learn the rules of our classroom. We have started on our Zoophonics lessons this week and have learned the sounds of the letters a, and b. Ask your child to show you the movement and make the letter sound. We will continue learning a letter a day until we reach z. When we complete our Zoophonics unit we will start at the beginning of the alphabet and spend more time on each letter. We have also been learning about classroom manners this week. We will continue working on this next week. NEWSLETTERS: To save paper this year I will post my newsletter on my blog every Friday and not send home a paper copy. If you do not have access to technology please let me know and I will send it to on paper. The address to my blog is http://www.cobblearning.net/cassidymw/. You can also go to it by going to our Pitner website and going to the school links, faculty and staff and clicking on my blog beside me name. OPEN HOUSE: Open House will be held on Thursday August 9, 2018 so please mark your calendar. PAPERWORK: Thank you to all of you who have turned in the paperwork from Cobb County and from our classroom. It is so important for us to have the information we ask for to best meet the needs of your child. BEHAVIOR: I believe that every child needs lots of praise for good behavior. Each morning your child will be given a happy face on the calendar that is in their folder. If your child is having a difficult day and is unable to follow directions, or disrupts our class they will be warned twice and then they will be given a straight face. We always give the students lots of opportunities to change their color back to green. If a student hits or strikes another student they will be given an unhappy face and the opportunity to change their color back to green is taken away. When a child is able to keep all of their happy faces they will be rewarded on Friday with a trip to the reward box. TRANSPORTATION CHANGES: Please let us know of any transportation changes in writing. You are welcome to write the information on the calendar in their folder. If you have a last minute change you can call or fax the change to the office at 678-594-8319. If your child will be a car rider on a regular basis you will need a car tag. If you would like one to keep for special occasion pickups or need more for other family members please let us know. If you do not have a car tag you will need to come into the school and sign your child out prior to 1:45. ORANGE FOLDERS: Your child will bring home an orange folder almost every night this year. Inside you will find valuable communications, newsletters, and your child’s class work. Please look in the folder each evening and take out the class work that is in it, check for communications and return the folder to your child’s book bag so that it comes back to school each morning. SNACK: We have lunch at 10:24 every day so it is a very long time until the end of our day. Please make sure that your child has a snack. We only have 10 minutes allotted for snack so please only send a small snack. I do keep a small amount of snack in the classroom for children who occasionally forget to bring a snack but I do not have enough to provide snack every day. ARRIVAL TIME & BREAKFAST: Children need to be in the classroom and ready to start working when the bell rings at 7:45. (I do know that on rare mornings it just isn’t meant to be!) Students can buy breakfast here each morning from 7:15 – 7:40. They stop serving breakfast right at 7:40 so please make sure that they arrive a few minutes early if they will be eating breakfast here as they must come by the classroom first to drop off their book bag and to get their breakfast card. Have a great weekend!
http://www.cobblearning.net/cassidymw/category/august-2018/
Protection against human rights violations caused by private enterprises is increasingly challenged under conditions of economic globalization. Private forms of regulation increasingly complement and replace state regulation and lead to legitimacy concerns. At the same time, protection against violations by private companies so far has been insufficient and dissatisfactory. UN special representative for business and human rights, John G. Ruggie, has taken up these new conditions and forms of governance and suggests a policy framework that aims at effectively protecting against human rights violations by private enterprises while being realizable. Ruggie includes state, civil society and economic actors and builds on the idea of complementarity between public and private forms of regulation. The article discusses this pragmatic approach with regard to its potential for effective human rights protection. This article evidences the need for strong accountability mechanisms to be created to hold corporations accountable for human rights violations. It builds upon the concerns raised by human rights organizations, consumers, investor groups and national legislators that led to the creation of the mandate of the Special Representative of the Secretary-General on the issue of human rights and transnational corporations and other business enterprises at the urging of the UN Commission on Human Rights in 2005. By discussing examples of human rights abuses in the contexts of the private military and security industry, the private detention industry, and from corporate involvement in the illicit dumping of toxic wastes, this article showcases the lacking international standards over corporate actors that have resulted in a proliferation of human rights and environmental abuses. Further, the report considers the strong conceptual and policy framework entitled "Protect, Respect and Remedy: a Framework for Business and Human Rights" created by the Special Representative, noting the persisting concerns that the Special Representative should consider including the need for consensus around the issue of accountability of corporations which should include a set of binding guiding principles and an enforcement mechanism. In June 2008, John Ruggie, Special Representative of the UN Secretary-General for business and human rights, presented his "Protect, Respect and Remedy: a Framework for Business and Human Rights" report to the UN Human Rights Council. The report marks an important step in the debate on the responsibility and accountability of transnational corporations. It identifies grave deficits in the current human rights regime that undermine the protection of individuals and communities against corporate-related human rights violations. However, his proposed policy framework of "protect, respect and remedy" does not respond adequately to the identified global governance gaps and categorically rejects any legally binding global instrument. With his "principled pragmatism" approach, the Special Representative formulates what he deems politically feasible given the forces that be in society but does not state what would be desirable and necessary to protect human rights. Nevertheless, the report refers to important reform areas at national and international level, which, if developed consistently, could bring about some progress. As the Human Rights Council has extended the mandate of the Special Representative, Ruggie has now another three years to provide "practical recommendations" and "concrete guidance". The article gives an overview about the practise of the German export credit agency (ECA). It argues that the current practice does not take into account human rights adequately. This is due to three main reasons: a coherent human rights risk assessment is not carried out, there is a lack of transparency and finally, there is a lack of accountability. In order to improve the situation, the German ECA should publish projects that are under consideration as early as possible. Furthermore, it should require that companies carry out compulsory and meaningful human rights risk assessments. Thirdly, the parliamentarian control should be increased. And finally, there should be a complaint mechanism which those people can address who feel infringed in their rights. The paper analyzes how the International Labor Organization (ILO) as the most important actor on the global level charged with the elaboration and implementation of international labor standards reconciles the permanent tension between a globalizing economy based on free trade and the protection of workers’ human rights. It gives a short overview of the different functions of international labor standards, the legislative procedure within the ILO and the human rights ensured in the different ILO instruments. Special emphasis is placed on the implementation of international labor standards. It shall be shown that the implementation of the ILO standards increasingly relies on transnational enterprises and civil society actors such as human rights organizations etc. Institutional implementation by the ILO and private mechanisms of implementation are becoming increasingly interdependent. The success of international labor standards in the future will essentially depend on the functioning of this interdependency. Private corporations are violating human rights on a large scale and destroying the economic and social basis for living in dignity, especially in countries in Latin America, Southeast Asia and Africa. Although the negative human rights impact of businesses cannot be limited to certain industries or situations, this article aims at showing the complexity of corporate involvement in human rights violations by giving an overview over typical constellations in which transnational corporations pose a risk to human rights. In addition to this factual complexity a number of legal questions arise in any effort of holding corporations legally accountable for their misconduct. After giving an overview over existing legal and quasi legal accountability mechanisms on the national as well as the international level, this article comes to the conclusion that the existing (quasi-) legal framework for holding corporations accountable for human rights violations is all but adequate and sufficient. Despite those problems the importance of human rights litigation against corporations should be understood and used as a strategic instrument for the protection of human rights. Litigation has a unique importance as it emphasizes that human rights violations committed by or with the help of corporations are not only political and moral scandals. Litigation provides an opportunity to demonstrate that a corporation has crossed the line between negotiable social commitment and legal obligation. Furthermore, the consequences of litigation transcend a specific case, potentially initiating political and social discourse and reform. Legal proceedings are forums for social and political dialogue, and can trigger widespread learning and mobilization. Is it morally permissible to impose strong patent protections where doing so prices important new medicines out of the reach of many poor people? We argue that doing so is not permissible and in fact a human rights violation. To become human rights compliant, the global patent regime must be complemented by an enduring institutional mechanism that effectively incentivises the development and distribution of high-impact medicines that meet the health needs of poor people and are accessible to them. The Health Impact Fund is designed to be such as complement. At the end of the chapter, we discuss and refute three popular arguments claiming that no such complement is needed because high prices for vital patented medicines, backed by the legal suppression of cheaper generic substitutes, does no injustice to poor people. Firms relocating production to countries with lower social standards are regarded as driving force behind a regulatory "race to the bottom". However, there are numerous instances in which the behavior of firms reveals just the opposite: They adhere to corporate social responsibility (CSR) standards and even pressure governments to issue stricter public regulations. This paper explores the role associations play thereby and analyzes to what extent the strength of associational structures shapes the preferences of companies for self- and state regulation. Empirically we compare the behavior of the textile and automotive industries in South Africa and their contribution to the fight against HIV/AIDS. The acceptance of a right to water and sanitation is an important step towards the protection of water as a resource and the enforcement of a human right to water. This is because this acceptance provides a framework that allows holding national governments and the international community responsible for safeguarding water supply and sanitation. The UN Human Rights Council has strengthened these human rights via Legal Commentary No. 15 and the appointment of an Independent Expert on human rights obligations related to access to safe drinking water and sanitation. The Council hereby takes a stance in a controversial debate on the question whether water is a "Common Good" or may be privatized. Public Goods have come under pressure since the 1980s because of a worldwide paradigm shift towards privatization: Ever since, it has been debated whether water as an increasingly scarce resource needs to have a price that reflects its economical and ecological costs. Also, it has been questioned if the decision on where and how drinking water is supplied, in which quantity and quality and to which price should be left to democratically legitimated institutions or private shareholders. Wo beginnt und endet die menschenrechtliche Verantwortung von Unternehmen? ist Inhaberin des Lehrstuhles für Europäische Integration an der Freien Universität Berlin und Leiterin der Arbeitsstelle Europäische Integration. Dr. sc. pol., ist wissenschaftliche Mitarbeiterin am Institut für Entwicklung und Frieden (INEF) und Leiterin des Leuchtturmprojekts des BMZ "Menschenrechte, Unternehmensverantwortung und nachhaltige Entwicklung". ist Dipl.-Volkswirt und Geschäftsführer des Global Policy Forum Europe in Bonn. ist Forschungsassistentin am Europäischen Hochschulinstitut (EUI) in Fiesole und schreibt ihre Dissertation im Rahmen des Sonderforschungsbereichs "Governance in Räumen begrenzter Staatlichkeit" an der Freien Universität Berlin. ist Leitner Professor of Philosophy and International Affairs an der Yale University, Professorial Fellow am Centre for Applied Philosophy and Public Ethics (CAPPE), Research Director am Centre for the Study of Mind in Nature (CSMN) der University of Oslo und Adjunct Professor an der Faculty of Health and Social Care der University of Central Lancashire. Dr. jur., ist Programmdirektorin des Bereichs "Business and Human Rights" am ECCHR - European Center for Constitutional and Human Rights in Berlin. ist geschäftsführender Gesellschafter der Freiherr Knigge oHG mit Sitz in Düsseldorf. ist wissenschaftlicher Mitarbeiter im Leuchtturmprojekt des BMZ "Menschenrechte, Unternehmensverantwortung und nachhaltige Entwicklung" und Doktorand am Institut für Entwicklung und Frieden der Universität Duisburg-Essen. ist Professor für europäisches und internationales Arbeitsrecht an der Faculté de droit, d’économie et de finance der Université du Luxembourg. Dr. jur., ist Referentin für Wirtschaft und Menschenrechte bei Amnesty International Deutschland. ist Leiterin des Regionalbüros Mexiko, Zentralamerika und Karibik der Heinrich Böll Stiftung mit Sitz in Mexiko. ist wissenschaftlicher Mitarbeiter im Teilprojekt D2 "Fostering Regulation through Corporate Social Responsibility" am Sonderforschungsbereich "Governance in Räumen begrenzter Staatlichkeit". ist Professor an der U.S.F. School of Law in San Francisco.
https://www.wochenschau-verlag.de/menschenrechte-und-wirtschaft.html
5.2 MULTI-OBJECTIVE FUZZY PATTERNRECOGNITION MODEL (MOFPR)Ifone assumes that a decision making problem is to identify an optimum value fromn alternatives in which each one has m objectives, the values of mobjectives in n alternatives can form an objective value matrix asfollows: where denotes the value ofobjective i in the alternative j (i = 1,2, …, m; j = 1,2,… ,n).There existdifferences between values and units of m objectives in matrix X.Furthermore, there are positive and negative correlations between the optimumvalue and its evaluation objectives. Hence it is necessary to normalize theelements of a matrix X. We Will Write a Custom Essay Specifically For You For Only $13.90/page! order now Ifthe optimum value and a particular factor are positively correlated, i.e. thebigger the factor value, the larger the membership degree to the optimum, thenormalizing formula is defined as:Alternatively,the normalizing formula for the negatively correlated factor is defined as: In formulae (3)and (4), denotes the absolute ora relative optimum value for objective i; and denotes thecorresponding minimum value. After normalizing, the matrix X becomes anormalized matrix R in which thevalues are within the interval 0,1.Inmatrix R, if = 1, the alternative j is the optimum and if = 0, the alternative j is the worst, according to theobjective i only. Supposing that there is an ideal optimum alternative in which all objective membership degreesto the optimum are equal to 1, denoted by , the worst alternativeis expressed as Inthis case, the decision-making problem becomes a fuzzy pattern recognitionproblem, i.e. evaluating to what membership degree each alternative in matrix R belongs to the ideal optimum. Becausedifferent objectives have different contributions in the process of evaluatingan alternative, different weights should be given to m objectives. Theweighting vector is denoted by subject to arestriction,In matrix R, alternative j can be expressed as The distance ofalternative j to the w worst alternative can be described asThe distance ofalternative j to the worst alternative can be described asIn equations(5.7) and (5.8), p is a distanceparameter. When p = 1 and p = 2, the distances are calledHamming and Euclidean distances respectively, which are commonly used . It can be seen from equations (5.7) and (5.8)that if djg = 0, then alternative j is the optimum and if djb= 0, then alternative j is the worst.Ifthe membership degree to the optimum is denoted by for alternative j ,(1-) is its membership degree to the worst. In the view of fuzzy sets, the membership degree may be regarded as a weight.Thus, the equation (5.9) or (5.10) will better describe the difference betweenalternative j and the optimum or the worst. The weighted distance to theoptimum of alternative,j can bedescribed asSimilarly, theweighted distance of alternative j to the worst can be described asInorder to solve optimal membership degree uj, an objectivefunction is established as follows:= + (5. 11)Using the condition, Amulti-objective fuzzy pattern recognition model can be obtained:According tothis model the bigger the uj, the better the alternative j.5.3 MOFPR MODEL TO EVALUATE THEGROUND WATER VULNERABILITY USING THEDRASTIC SYSTEMAquifervulnerability and its evaluation have an intrinsic property, i.e. fuzziness. Bythe DRASTIC system, this fuzziness is taken into account by dividing the valuesof each affecting factor into ranges, and then assigning a rating to eachrange. However, it should be noted that if a factor value can be measurednumerically, the fuzziness should be described continuously rather than in themanner of ranges that are also difficult to be determined. The membershipdegree of ‘”vulnerability” can just describe the fuzzinesscontinuously and efficiently. For example, factor D is divided into seven rangeswhich, in the DRASTIC system, are assigned seven ratings respectively, butusing the MOFPR model, the membership degree decreases continuously from 1 to 0calculated by equation (5.
https://tbf-sa.co.za/5-2-the-values-of-m-objectives-in/
Nikes womens marathon 2016 What happened to the Nike Women’s Marathon? Update: IN 2016 Nike cancelled all races and is now instead doing their “ Women’s Victory Tour” fitness event. Luckily in Washington D.C. someone else stepped up to fill the void and there is now the National Women’s Half Marathon for 2018. What is the average female marathon time? In terms of average marathon times, the median marathon finishing time in 2019 for men in U.S. marathons was 4:30:46 (10:19 minutes per mile pace), according to RunRepeat. The median finishing time for women was 4:56:39 (11:18 minutes per mile pace). Has a woman ever won a marathon? It was a nasty day to run 26.2 miles through Boston. But American Desiree Linden pushed her way through a powerful headwind and cold rain and up Heartbreak Hill to triumph at the Boston Marathon — the first time a U.S. woman has won in 33 years. What Marathon gives you a Tiffany necklace? San Francisco Nike Women’s Marathon How long does it take to train for half marathon? Most C25K programs take you from zero to 3 miles in eight weeks . After you reach 3 miles, give yourself at least 12 additional weeks to train for 13.1 miles. In total, this is 20 week of half marathon training. And yes, if you’re a beginner, you can start from nothing and work up to a half marathon in under six months. What is a good marathon time for a beginner? On average we estimate, beginner males, finish half marathons between 2:05 to 2:15. On the other hand on average, beginner females clock in between 2:20 and 2:30. Average male race winners come in typically between 1:10 and 1:30, with the current world record being 58:01. Is 5 hours good for a marathon? Average time If you finish a marathon in under 5 hours , you’ve done well. Most men finish a marathon in under 4.5 hours . Most women finish in just under 5 hours . If your time is around this mark, be satisfied with your results. Can you run a marathon without training? So is it possible to run one on a whim? For most runners, a marathon is not just 26.2 miles of physical endurance – it means months and months of arduous, painstaking preparation. Jedward are not the only figures said to have completed a marathon without preparation. Why do Kenyans run so fast? Several factors have been proposed to explain the extraordinary success of the Kenyan and Ethiopian distance runners, including (1) genetic predisposition, (2) development of a high maximal oxygen uptake as a result of extensive walking and running at an early age, (3) relatively high hemoglobin and hematocrit, (4) Who is the fastest man to run a marathon? Updated at 2:15 p.m. ET on October 13, 2019. Early yesterday morning, in a misty park in Vienna, Eliud Kipchoge ran a marathon in less than two hours. His time, 1:59:40, is the fastest any runner has ever covered 26.2 miles. Can a woman outrun a man? A new study that tracked ultramarathon running times worldwide over two decades found that women tend to outrun men , after 195 miles. On average, women are 0.6% faster than men during super-long races that stretch towards (and beyond) the 200 mile mark. Do 5k races give medals? To be fair, most shorter distance endurance races like sprint triathlons, 5Ks and 10Ks don’t hand out finisher awards; most finisher medals are usually for completing a longer distance endurance event: half marathon, marathon, half Ironman, Ironman and endurance team relay, or an ultra marathon. Do you get a medal for a half marathon? It depends on the event, of course, but yes, it’s pretty standard at half marathons (at least in North America) to give a finishers medal to everyone who completes the race. A lot of recreational runners enjoy collecting finishers medals as mementos of the races that they’ve run. What is a finisher medal? What is a finisher medal ? Finisher medals are a medal that is distributed to participants who completed a race.
https://www.traildegalilee.com/marathon-info/nikes-womens-marathon-2016.html
Given names are proper nouns and they follow the same gender grammatical rules as common nouns. Can proper noun be masculine or feminine? Proper nouns are nouns, and as such they have a gender – they are either masculine or feminine. When the referred object is an animate being, the gender of the proper noun is its natural gender : Marc est grand. Do nouns have a gender? Gender of nouns – Easy Learning Grammar. In some languages, nouns have gender. This means that a noun causes other words such as adjectives to change their spelling according to certain rules. … English does not have grammatical gender for nouns. Do proper nouns have gender in German? All German nouns are included in one of three grammatical genders: masculine, feminine or neuter. However, the gender is not relevant to the plural forms of nouns. In German, it is useful to memorize nouns with their accompanying definite article in order to remember their gender. Are proper nouns masculine or feminine in Spanish? Spanish nouns have gender. Nouns listed as such in dictionaries are either masculine or feminine. The designation is often arbitrary — some words associated with males are feminine, and a word such as persona (person) is feminine whether it refers to males or females. Is boyfriend a proper noun? Gender classifies nouns into masculine and feminine, for example, king, queen, boyfriend, and girlfriend. … Many common nouns, such as engineer or teacher, can refer to men or women. Is girlfriend a proper noun? “Mary always enjoyed hanging out with her girlfriend Jessica.” … Why is gender grammar? Grammatical gender is a way of categorising nouns; it doesn’t necessarily match up with the “natural gender” of the person or object being described. … Other languages assign gender based on the ending of the word. For example, Spanish words that end in -a are usually feminine. Why is there no gender in English? The loss of gender classes was part of a general decay of inflectional endings and declensional classes by the end of the 14th century. … Late 14th-century London English had almost completed the shift away from grammatical gender, and Modern English retains no morphological agreement of words with grammatical gender. What languages have no gender? There are some languages that have no gender! Hungarian, Estonian, Finnish, and many other languages don’t categorize any nouns as feminine or masculine and use the same word for he or she in regards to humans. Does Dutch have gender? Almost all Dutch speakers maintain the neuter gender, which has distinct adjective inflection, definite article and some pronouns. … In Belgium and southern dialects of the Netherlands, the distinction between the three genders is usually, but not always, maintained. What are 5 Spanish nouns? Examples include: girl, hat, coat, weather, picture, coffee, hotel. Just as in English, Spanish nouns can either be singular, such as “cat” or gato, or plural (i.e., more than one), like “cats” or gatos. Is Uncle a common noun? The word ”uncle” is a common noun, but when it is paired with a specific uncle’s name, then it transforms to a proper noun.
https://plug-magazine.com/about-gender/frequent-question-does-proper-noun-have-gender.html
On the Pacific Coast of North America, sea otters play, dive, and hunt for sea urchins, crabs, abalone, and fish in the lush kelp forests beneath the waves. But there was a time when people hunted the otters almost to extinction. Without sea otters to eat them, an army of hungry sea urchins grew and destroyed entire kelp forests. Fish and other animals that depended on the kelp were lost, too. But when people protected the sea otters with new laws, their numbers began to recover, and so did the kelp forests. DETAILS - Written by Susannah Buhrman-Deever and Illustrated by Matthew Trueman. - Published by Candlewick Press, May 26, 2020.
https://www.ninthandpine.com/products/if-you-take-away-the-otter
A still from Kaneto Shindô’s The Naked Island n the '60s-'70s, Japan was a nation just recovering from the shock of nuclear bombings, it was struggling through a political turmoil and its economy was beginning to stabilise again after the ravages of the Second World War. With such large-scale changes sweeping through the Pacific island country, art too began to alter itself to honestly reflect a shift in cultures. It was cinema more than any other form that showed the deepest symptoms of change. 13BCD, the new film gallery in Hauz Khas Village, in collaboration with the Japan Foundation, is hosting an exhibition in tribute to Japanese New Wave, a revolutionary moment on the time-space axis of a long cinematic tradition. Greats like Nagisa Oshima, Masahiro Shinoda, Shohei Imamura, Seijun Suzuki, Susumu Hani and Toshio Matsumoto, among others, have come to be branded under this category for their daredevilry in direction. Using the unexplored themes of sex and violence in a seemingly conservative society, these directors transformed cinema by bringing in an element of hyperbole into a previously tame narrative technique. "This cadre of directors, associated with studios and with the art and theatre group, were on a mission to make Japanese cinema contemporary. It's not as if this was happening in isolation – it was a global movement," says curator Kaushik Bhowmik, VP of the Osian Film Festival. Rejecting the notion that this was just a bunch filmmakers trying to imitate the European New Wave directors like Godard and Fellini, he says that this parallel movement in the East was certainly inspired by the West. Their technique, too, varied drastically from what was used before – some of these movies were the first instances of on-site sound, jump cuts and shooting at real-life, urban locations. So while Oshima portrays the deeply disturbed psychosis of a merchant family heir who wants desperately to escape the cruel patriarchal rituals of family tradition in Geshiki (Ceremony), Hani depicts a 'modern' love story between a sexual delinquent and a prostitute in Nanami: The Inferno of First Love, incorporating the darker side of adult sex and psychological violence (where the male protagonist is sodomised by his step-father) into the narrative. Other films such as Masamura's Blind Beast, Imamura's The Pornographers, Masao Adachi's Serial Killer, Shinoda's Pale Flower, all revisit these tropes of the in-between, exploring, not escaping, the grey matter of reality. "These were auteurs who came from a background of criticism; and who rejected the cinema of Ozu and Kurosawa, their predecessors. Instead, they focussed on the cultures and sub-cultures emerging out of a time when Japan was relocating itself on the map," says Nitesh Rohit, co-founder of 13BCD. At the small basement gallery, five screens depict montages of scenes from these movies, categorised under women, violence, pop-art and sex. "We're not screening entire movies – instead, we've built these screenplays that are supposed to inform a different dialectic of cinema. Our attempt has been to contextualise Japanese New Wave cinema through imagery to give the viewer a more comprehensive idea of what the whole movement was all about," explains Rohit. Contrasting images, in black and white, technicolour and Manga art, flicker across the screens, some showing the S&M bondage that was sexually fashionable at the time, others depicting women sitting in front of vanity boxes and mirrors, painting their faces frantically, obsessively. "The cinema of the time was also informed by the cult of 'kawaii' – where women re-interpreted self-fashioning and spent hours trying to look 'cute' – and the Expo 1970, an architectural idea of metabolism, brought out by Kenzo Tange, among other things," points out Bhowmik. The exhibition comes at a time when Indian cinema is itself opening up to a world beyond the commercial and the mainstream. "Today, we have directors like Anurag Kashyap and Amit Dutta who are willing to explore themes outside of the polite and the acceptable. In the next 3-5 years, a whole new generation of filmmakers is going to emerge that will be more informed in cinematic backgrounds and will thus bring about our new wave, perhaps," says Rohit. Japanese New Wave is on at 13BCD, Hauz Khas Village till 16 April.
http://www.sunday-guardian.com/masala-art/japan-through-the-extreme-lens-of-its-new-wave-masters
We are looking forward to welcoming scholars from across the UK, and the globe, representing a broad range of backgrounds and sub-disciplines within Islamic Studies. The two-day program will feature a total of 17 stimulating panellists on various themes. The workshop seeks to explore fiqhī or juristic justifications and challenges to the regulations of Violence in Sharīʿa and its Contemporary Implications. As in previous gatherings such fiqhī debate will be situated alongside contributions dealing with broader theological, legal, historical, anthropological and sociological approaches that can enrich a multidisciplinary understanding of contemporary visions for Violence in Sharīʿa and its Contemporary Implications. Admissions for all guests is by ticket only. The Al-Mahdi Institute was established in 1993 with the objective of contributing to Muslim religious scholarship and learning, with particular emphasis on the Twelver Imāmī (Ithnāʿasharī) tradition, through engagement with both historical and contemporary discourses. The Institute’s activities are marked by its non-dogmatic, open philosophy, coupled with an attention to scholarly rigor. This facilitates the pursuit of excellence across a range of perspectives that are not necessarily confined to the theological and religious heritage of any particular tradition. The Al-Mahdi Institute seeks to explore the relationship of religious ideas to all dimensions of contemporary thought and culture in a spirit whereby the human face of Islam, epitomized in the teachings of the Prophet Muḥammad and his impeccable progeny, can inform the holistic development of all individuals and societies.
http://www.iric.org/tabid/99/articleType/ArticleView/articleId/1056/categoryId/70/The-5th-Annual-Contemporary-Fiqhi-Issues-Workshop.aspx
This thesis contains three essays on entrepreneurship and close-held firms. The first essay examines the feedback role of crowdfunding, a new financing method that allows entrepreneurs to raise finance online directly from the public. Using a novel dataset from Kickstarter, I show that crowdfunding outcome signals to entrepreneurs the product market potential of their projects and guides entrepreneurs’ subsequent commercialization decisions. Exploiting weather-induced variation in pledged funds within unfunded projects (which receive no financing), I find that entrepreneurs who received more pledging are more likely to complete and commercialize their projects. Consistent with the real option value of crowdfunding feedback, entrepreneurs on Kickstarter launch riskier projects when crowdfunding becomes more costly relative to alternative financing. These results highlight the role of crowdfunding in improving the information environment faced by early-stage entrepreneurs. The second essay, co-authored with Jan Bena, studies how product market competition affects firms’ ownership structures. Using a large sample of closely held firms in eighteen European countries, we show that firms operating in more competitive environments have lower inside ownership and that the stakes of their outside shareholders are more dispersed. These results are explained by competition increasing the need to raise external equity and reducing private control benefits. Our findings suggest that, by changing corporate ownership structure, competition mitigates incentive misalignment among shareholders, leading to better firm performance and gains in economic efficiency. The third essay studies the effect of shareholder excess control rights on creditors. I show that excess control rights can benefit creditors despite its negative effect previously documented on minority shareholders. Using a sample of U.S. dual-class firms, I find that dual-class firms take less business and financial risk than similar single-class firms, consistent with controlling insiders’ emphasis on long-term survival to access ongoing private benefits of control. Such risk avoidance translates into lower borrowing costs for dual-class firms. Further, lenders seem to be able to use specific covenants to prevent potential expropriations by controlling insiders. These results suggest that the overall effect of excess control rights on firm value may not be as negative as we previously thought. View record This dissertation explores the differences in informational asymmetries between private and public firms in the U.S. to study the role of collateral in firms’ financial policies. The first essay examines public and private firms’ leverage choices. I find that private firms’ leverage is about 3.8 times higher than that of public firms and that asset tangibility has a much larger impact on the leverage decisions of private firms than it does on those of public firms. Moreover, during the recent financial crisis, private firms increased both their leverage and their net leverage compared to public firms. The second essay studies the use of trade credit in public and private firms. Here I examine how tangible assets affect the use of trade credit. I also analyze how their holdings of trade credit and bank debt change during a credit supply shock. I find that private firms’ with higher levels of tangible assets rely less on trade credit and that they more likely to substitute trade credit for bank debt. The third essay compares and characterizes debt maturity and debt structure choices in public and private firms. I show that tangible assets help private firms to increase the maturity of their liabilities and help private firms to specialize in the type of debt they employ. I also analyze how their debt maturity structure and debt composition change during a credit supply shock. I find that the maturity of their liabilities shortened during the crisis. Moreover, private firms experienced an increase in the long-term debt due after one year compared to public firms. Overall, the evidence suggests that under asymmetric information, asset tangibility is the key determinant of private firms’ ability to access debt markets, to rely less on trade credit, and to extend the maturity of their liabilities, especially during bad times. View record This dissertation contains three studies.Chapter 2 investigates interactions between antitakeover provisions and managerial ownership, two corporate governance mechanisms. Antitakeover provisions weaken the incentive effect of managerial ownership and magnify its entrenchment effect, and thus will decrease the effect of managerial ownership on firm value. I show that thevalue effect of managerial ownership crucially depends on the strength of antitakeover provisions. For firms with weak antitakeover provisions, managerial ownership enhances firm value, unless managers have very high ownership. For firms with strong antitakeover provisions, however, increasing managerial ownership always destroys firm value. Also, managerial ownership significantly decreases with the strength of antitakeover provisions. These findings support the hypotheses that antitakeover provisions decrease the value effect of managerial ownership and affect managers' compensation contract.Chapter 3 proposes a model to investigate the role of informationprecision in IPO pricing. The model shows that more precise information will exert more influence on the offer price. In strong support of the model, I find that the proportion of the industry return during the waiting period that is incorporated into the offer price increases with a proxy for precision of the industry return as a measure of the change in the IPO firm's value during the waiting period. This study enhances our understanding of the partial adjustment phenomenon: noisy information will be partially incorporated into the offer price.Chapter 4 shows that young male CEOs appear to be combative: they arefour percent more likely to be acquisitive and, having initiated an acquisition, they are over 20 percent more likely to withdraw an offer. Furthermore, a young target male CEO istwo percent more likely to force a bidder to resort to a tender offer. We argue that this combative nature is a result of testosterone levels that are higher in young males. Testosterone is a hormone associated with male dominance seeking. The acts of attempting or resisting an acquisition can be viewed as striving to achieve dominance. We argue that the evidence reported in this paper is consistent with the presence of a significanthormone effect in M&As. View record In this thesis, I examine a few corporate finance topics, including mergers and acquisitions, CEO compensations, and corporate governance. The first paper studies the effect of managerial horizon on acquisition activities. Managers with a long horizon emphasize firms’ long-term value, whereas short-horizon executives are concerned about firms’ value in the short run. The paper’s main predication is that acquiring firms managed by short-horizon executives have higher abnormal returns at acquisition announcements, less likelihood of using equity to pay for the transactions, and worse post-merger stock performance in the long run. I construct two proxies for managerial horizon based on the CEO’s career concern and compensation scheme, and provide empirical evidence supporting the above prediction. The second paper examines optimal compensation contracts when executives can hedge their personal portfolios. In a simple principal-agent framework, I predict that the CEO’s pay-performance sensitivity decreases with the executive hedging cost. Empirically, I find evidence supporting the model’s prediction. Providing further support for the theory, I show that shareholders also impose high sensitivity of CEO wealth to stock volatility and increase financial leverage to resolve the executive hedging problem. Moreover, executives with lower hedging costs hold more exercisable in-the-money options, have weaker incentives to cut dividends, and pursue fewer corporate diversification initiatives. Overall, the ability to hedge firm risk undermines executive incentive and enables managers to bear more risk, thus affecting governance mechanisms and managerial actions. The third paper investigates the causes and consequences of sharp CEO pay cuts. We find that a large CEO pay cut is not uncommon and is typically triggered by poor stock performance. Good corporate governance structures strengthen the link between poor performance and CEO pay cut. On average, CEOs respond to their pay cut by curtailing capital expenditures, reducing R&D expenses, and allocating funds to reduce leverage. For most firms, performance improves and the CEO’s pay is restored. Together, our results show that the possibility of these compensation cuts provides ex ante incentives for CEOs to exert effort to avoid poor performance and ex post incentives to improve poor performance once pay is cut. View record In this thesis, I investigate the role of investor attention in financial markets by examining themedia’s coverage of corporate earnings news. The first paper studies the potential impact ofinformation in the financial press by identifying systematic differences between aggregatecorporate earnings news coverage in the Financial Times, Wall Street Journal, and the NewYork Times, and measures of expected coverage based on contemporaneous earningsinformation flows as reported in JJBIEIS. I find that publication-specific estimates of “excess”aggregate positive or negative coverage exhibit strong serial correlation, consistent with mediabias. Furthermore, unexplained negative (positive) weekly coverage predicts positive (negative)returns for small-stock indices and the equal-weighted NYSE, suggesting that the effects ofpredictability in financial news coverage are economically significant and may be related toinformational inefficiency with respect to smaller firms.The second paper examines media coverage decisions to identify the determinants ofinvestor attention with respect to events and firms. Using ex ante predicted probability of mediacoverage (PMC) with respect to earnings news as a measure of attention in this context, I studythe returns experienced by low-attention stocks from 1984 and 2005. As in prior studies, I findhigh risk-adjusted returns for “neglected” stocks, which appears to be highly consistent with,e.g., Merton’ s (1987) investor recognition hypothesis, or an information risk setting (Easley etal. (2002)). However, in examining the event-specific determinants of media coverage, I findevidence of a significant “negativity bias” in attention: holding other factors constant, bad newsis more likely to attract coverage than is good news regarding an otherwise-identical firm.Given recent evidence in the literature regarding stock-price underreaction to low-attentionevents, this suggests asymmetric investor attention as a potential explanation for an apparentneglected firm premium in the cross-section of stock returns. Consistent with this hypothesis, Ifind that the excess returns to low-PMC portfolios are attributable to drift in the stock prices oflow-attention “good news” firms, while low-attention “bad news” firms appear to be efficientlypriced. View record News Releases Program Affiliations Department(s) If this is your researcher profile you can log in to the Faculty & Staff portal to update your details and provide recruitment preferences.
https://www.grad.ubc.ca/researcher/14726-li
The severe acute respiratory syndrome corona virus 2 (SARS-CoV-2) is a highly contagious virus that causes a severe respiratory disease known as Corona virus disease 2019 (COVID19). Indeed, COVID19 increases the risk of cardiovascular occlusive/thrombotic events and is linked to poor outcomes. The pathophysiological processes underlying COVID19-induced thrombosis are complex, and remain poorly understood. To this end, platelets play important roles in regulating our cardiovascular system, including via contributions to coagulation and inflammation. There is an ample of evidence that circulating platelets are activated in COVID19 patients, which is a primary driver of the thrombotic outcome observed in these patients. However, the comprehensive molecular basis of platelet activation in COVID19 disease remains elusive, which warrants more investigation. Hence, we employed gene co-expression network analysis combined with pathways enrichment analysis to further investigate the aforementioned issues. Our study revealed three important gene clusters/modules that were closely related to COVID19. Furthermore, enrichment analysis showed that these three modules were mostly related to platelet metabolism, protein translation, mitochondrial activity, and oxidative phosphorylation, as well as regulation of megakaryocyte differentiation, and apoptosis, suggesting a hyperactivation status of platelets in COVID19. We identified the three hub genes from each of three key modules according to their intramodular connectivity value ranking, namely: COPE, CDC37, CAPNS1, AURKAIP1, LAMTOR2, GABARAP MT-ND1, MT-ND5, and MTRNR2L12. Collectively, our results offer a new and interesting insight into platelet involvement in COVID19 disease at the molecular level, which might aid in defining new targets for treatment of COVID19–induced thrombosis. key points Co-expression analysis of platelet RNAseq from COVID19 patients show distinct clusters of genes (modules) that are highly correlated to COVID19 disease. Identifying these modules might help in understanding the mechanism of thrombosis in COVID19 patients Introduction The coronavirus SARS-CoV-2 is a highly contagious infection that causes a severe respiratory disease known as COVID19. This disease that has reached a pandemic level, is impacting tens of millions of people worldwide. In the United States, there are around 34 million reported cases, over two million hospital admissions, and half a million deaths as of July 20211. It is now known that COVID19-induced thrombosis increases the incidence of cardiovascular occlusive events in infected patients, a fact that has been reported in several studies2–4, Indeed, abnormal hemostasis responses were observed in COVID19 hospitalized patients, which was linked to poor prognosis2,5,6 In addition, studies have shown that COVID19 leads to increase in platelet activation through alterations of platelet transcriptome and proteome7,8. In this connection, it is now well established that platelets play roles beyond vascular hemostasis, including innate immunity and tumor metastasis9. Moreover, platelets were shown to be activated in the septic state, and antiplatelet therapy has been used as a strategy to prevent organ damage in sepsis10 To this end, evidence have indicated that viral infections are associated with coagulation disorders, and thrombotic cardiovascular events11,12, which is consistent with the thrombotic phenotype seen in COVID19 patients/SARS-CoV-2 viral infection. While there has been some progress, our understanding of the pathways that govern platelet participation in COVID19–induced thrombosis remains limited, but clearly warrants investigation. To obtain a comprehensive insight into the pathogenesis of specific disease states, several computational and research methods have been developed13. Some of these approaches were employed to examine the potential gene networks, which are very instrumental to guide understanding of diseases and their mechanistic pathways. Notably, co-expression analysis is one such approach, which clusters genes into coexpressed groups known as modules. These genes that belong to the same module are thought to share functional properties 14. This approach relies on using graph theory concepts that allow researchers to understand in a systematic way the relations between the genes of a module and the phenotype based on the module eigingene14. In fact, co-expression using weighted correlation network analysis (WGCNA) has been used for analyzing a number of biological processes, including cancer15,16 and cognitive and mental disorders17,18. In short, gene networks provide the utility to move beyond individual-gene comparisons and comprehensively identify biologically meaningful relationships between gene products and phenotypes. Previous studies on the mechanisms of thrombosis in COVID19 disease have primarily concentrated on specific patho-physiological functions, with relatively fewer studies identifying comprehensive regulatory networks. Therefore, in the present study, WGCNA was used to determine gene networks associated with COVID19 disease in platelets. PRJNA634489 dataset-which contained a total of 15 samples from COVID19 patients and health controls 7 was used in the present study. Three modules with the highest level of significance in correlation with COVID19 disease were identified, and the three genes with the highest intramodular connectivity were selected as the hub genes in the respective modules for COVID19. Gene enrichment analysis was also conducted to determine enrichments in the key modules. The results of this study may provide novel information/insight into the underlying mechanisms of COVID19 disease and may assist in the identification of potential biomarkers for diagnosis and targets for treatment. Methods Data Preprocessing and Differentially Expressed Genes Screening RNAseq data were downloaded from BioProject accession #PRJNA6344897. Data comprised of ten COVID19 patients in addition to age- and sex-matched five healthy controls. The Kallisto program was employed for pseudoalignment of reads and quantification to obtain the counts and the transcript per million (TPM)19. Log2CPM (log transformed counts per million) was used for the differential expression analysis by employing Voom normalization20 and Limma R package21 TPM normalized and filtered to exclude low variance transcripts (≤ 0.001)22 was used for the weighted gene co-expression network analysis. Weighted Gene Coexpression Network Analysis The weighted co-expression network was produced using R package “WCGNA” 14. To weight highly correlated genes, the soft thresholding power (β) was set at 12, and the minimal module size was set at 30. To define clusters of genes in the dataset, the adjacency matrix was used to calculate the topological overlap matrix (TOM), which shows the degree of overlap in shared neighbors between pairs of genes in the network. The resulting gene network was visualized as a heatmap. Screening for key modules and hub genes Correlation between module eigengenes and the COVID19 status was calculated to identify key modules that have significant correlation. The correlation values were displayed within a heatmap. The modules that correlated with COVID19 most significantly were considered as the key modules. Gene significance (GS) was defined as the correlation between gene expression and the COVID19 status. Module membership (MM) was defined as the correlation between gene expression and each module’s eigengene, and intramodular connectivity (K.in), which measures how connected a given gene with respect to the genes of a particular module, was also calculated using WGCNA. Subsequently, the correlation between GS and MM as well as GS and k.in were examined to verify module-COVID19 status associations. The correlation analyses in this study were performed using the Pearson correlation as described in the “WGCNA” package14. All module genes were ranked according to their intramodular connectivity, and only the top three genes were selected as hub genes. Functional enrichment analysis of key modules The genes in each key modules were extracted from the network and enrichment analysis was performed to further explore the functions of the respective modules. Targetmine23 which is a web-based integrative data analysis platform for target prioritisation and broad-based biological knowledge discovery-was used to perform Gene Ontology (GO) and Reactome pathway enrichment analysis. In this analysis, a benjamini hochberg adjusted P-value of 0.05 was set as the significance threshold to identify the most significant functional pathways/GO terms. Only top results of enriched terms are reported. Statistical and visualization tools We used R statistical programming language24 version 4.1.0, with the following packages: “WGCNA”14 for coexpression analysis; “circlize”25 for chord diagram building; “ggplot2” for visualization 26; “Igraph” for network analysis27 and “ggraph”28 for network visualization. Results Construction of Co-expression Network The transcript per million (TPM) gene expression dataset were filtered based on variance, and 7119 genes in the 15 samples of ten COVID19 patients and five healthy controls were used to construct the co-expression network. The results of cluster analysis of the samples are demonstrated in (Fig. 1A). To construct the network, a soft-threshold of 12 was used to obtain the approximate scale-free topology (Supplementary Fig. 1). Genes across the 15 samples were hierarchically clustered based on topological overlap (Fig. 1C & 1D). We identified 16 modules in which genes are coexpressed, random colors were assigned to the modules to distinguish between them. The size (number of genes/module) of each module is presented in (Fig 1B). To demonstrate how these modules were relatively distinctive, we plotted the network heatmap of 400 randomly selected genes based on topological overlap matrix dissimilarity and their cluster dendrogram (Fig. 2A) indicating relative independence among these clusters. Correlation between modules and COVID19 disease status To examine the relation of COVID19 status with the emerged modules, we built the eigengene adjacency matrix by calculating the correlation of the eigengenes matrix after inserting COVID19 status to the matrix. The heatmap (Fig. 2B) showed the modules’ relationship and the correlation between the modules namely black, cyan, yellow, blue, and magenta and COVID19 status. Identification of key modules in relationship to COVID19 disease status To further determine the closest modules to COVID19 status, we re-clustered the eigengenes using single linkage method with absolute correlation as a distance function; the single linkage clustering algorithm looks for closest modules to form a cluster, then cluster them with the next nearest module progressively until one cluster is formed29. As demonstrated in Fig. 2C, the closest three modules to COVID19 status are magenta, yellow and black. Three essential measurements can help confirm the importance of the module to a specific trait, 1) Module membership (MM), which increases for a particular gene, when the module eigengene accurately represents this gene, 2) gene significance (GS) is measured by calculating the correlation of gene expression with the specific trait and 3) intramodular connectivity (K.in) for a gene within the module, reflecting the centrality of the gene to the module expression network. Based on WGCNA, if a gene is higher with GS, MM, and K.in, it is more meaningful to the clinical trait of interest 30,31. Explicitly, the higher the correlation between gene significance of genes in a module and their module membership, the higher its importance. Similarly, when the gene centrality in the network increases in parallel with gene significance, that also is strong evidence that key modules are essential in that trait. The correlations between gene significance and module membership as well as between gene significance and intramodular connectivity show that yellow, black, and magenta modules have the highest correlation values with a substantial difference to the next nearest module (Blue R=0.61) (Supplementary Fig. 2). For those reasons, we selected yellow, black, and magenta modules for further investigation and will refer to them using the term key modules. Key modules show high correlation to COVID19 disease status The module-trait relationship was determined by correlating module eigengenes with COVID19 disease status to identify significant correlation. The yellow and the black modules exhibited the highest positive correlation (R=0.91; p-value=3 × 10−6, and R=0.86; p-value= 3 × 10−5, respectively; Fig. 2D). On the other hand, the magenta module (R=-0.96; p-value=1 × 10−8) exhibited the highest negative correlation (Fig. 2D). Therefore, these three modules were identified as key modules for COVID19 disease and its impact on platelets. The significant correlations between the different GS, MM, and K.in for COVID19 are illustrated in (Fig. 3A & 3B). We also showed the GS, MM, and K.in of the green module that showed the low correlation to COVID19 disease status (Fig. 3A & 3B). Gene hub detection and visualization of module networks Genes in the selected key modules were ranked according to the intramodular connectivity and the top 20 genes of each key modules was used to visualize the network of each specific module (Fig. 4). Subsequently, the top three genes of the yellow, black, and magenta modules were labeled as the hub genes in their modules that are important for COVID19 disease. Thus, the protein coding genes COPE, CDC37 and CAPNS1 were selected as the hub genes in the yellow module, whereas AURKAIP1, LAMTOR2, and GABARAP protein coding genes were selected as the hub genes in the black module. Regarding the magenta module, MT-ND1, MT-ND5, and MTRNR2L12 are selected as hub genes. All of these hub genes exhibited a high intramodular connectivity, which established their network centrality and potentially vital roles in the COVID19 disease. We also observed that not all of hub genes have shown differential gene expression (Table 1). Enrichment Analysis of key modules Gene ontology (GO) pathway enrichment analyses were performed on the yellow, black, and magenta modules using Target-mine platform, and the top relevant terms of each category are presented in (Fig. 5A). The pathway enrichment results demon-strated that the genes in both yellow and black modules were primarily enriched in pathways associated with metabolic process, protein translation, energy substance metabolism, mitochondrial activity, and oxidative phosphorylation. Genes in the magenta module were enriched in several pathways that are primarily associated with regulation of megakaryocyte differentiation and apoptosis, including the regulation of the execution phase of apoptosis. Reactome showed enriched pathways of metabolism, platelet degranulation, and response to elevated platelet cytosolic Ca2+ in the yellow module. The black module shows enrichment of respiratory electron transport, ATP synthesis by chemiosmotic coupling, heat production by uncoupling proteins, citric acid (TCA) cycle, and respiratory electron transport just to name a few (Fig. 5B) (More detailed results are shown in supplementary Fig. 3). Discussion The underlying pathophysiological mechanisms of thrombosis in COVID19 are extremely complicated32, and hence clearly require more examination. Inspecting gene co-expression patterns is proven to be an effective method to analyze and uncover complicated genetic networks. To address the aforementioned issues, in the present study, gene co-expression analysis was performed on COVID19 platelet RNAseq dataset containing gene expression data from ten COVID19 patients and five healthy controls. There were three modules that were identified as the key modules in COVID19, with the highest level of significant association. The top three genes of each key module with the highest intramodular connectivity were identified as hub genes for COVID19 in platelets. The results of the enrichment analysis suggest that the key modules and the pathological processes underlying the disease are associated with energy metabolism, mitochondrial process, and apoptosis. Furthermore, we also saw enrichment of platelet secretion and activation pathways. These results provide-at least in partan illustration of the comprehensive platelet regulatory network in COVID19, which should improve the current understanding of the mechanisms underlying immunothrombosis in COVID19 patients. Ultimately, these findings might help in finding appropriate therapeutic targets. The present study used the data in BioProject accession #PRJNA6344897 to perform the co-expression analysis using WGCNA. The data used in this study, which was generated by Manne et al 7, revealed that COVID19 disease leads to changes in platelet transcriptional profiles in comparison to control. Manne et al showed that platelet differential gene expression in COVID19 is associated with enrichment of protein ubiquitination, antigen presentation, and mitochondrial dysfunction. The major differences in the genes or modules obtained in the present study, compared with the results from other studies including the one by Manne et. al.7 is that the present study used a more comprehensive method by employing WGCNA. Using this method, we were able to identify/pull-out co-expression modules of genes, namely the yellow and black modules, which represent an important regulatory modules of platelet function in COVID19. In addition, we were able to identify the magenta module, which represents genes that are negatively correlated with COVID19 disease state and show enrichment in megakaryocyte differentiation and apoptotic pathways. This systematic and in-depth analysis performed should complement results obtained from conventional DEGs analysis, and therefore allow for a better understanding of the pathophysiological mechanisms of COVID19 disease. Notably, the co-expression analysis revealed a total cluster of 16 modules, with the yellow and black modules exhibiting the strongest positive correlation with COVID19 disease. Enrichment analysis indicated that the genes in the yellow and black modules were primarily associated with platelet metabolism, energy, and oxidative phosphorylation. Furthermore, the analysis of the yellow module showed enrichment of a host of platelet functional responses/activities, such as platelet degranulation/secretion and increased platelet response to Ca2+. Indeed, other studies showed the COVID19 disease to be associated with platelet activation and to increase platelet alpha granule secretion, which are critical in the development of thrombosis seen in those patients7,8. It is noteworthy that the platelet alpha granule secretion response is not only important for thrombus formation, but also in inflammation by releasing receptors that facilitate adhesion of platelets with other vascular cells as well as releasing a wide range of inflammatory chemokines33. The yellow and black modules show strong enrichment in platelet metabolic processes, which is in agreement with the increase in platelet activation. For instance, previous data have shown that platelet transition from inactive to active state requires alteration in ATP availability34, furthermore, substrate metabolism (e.g. glucose) was shown to be essential for platelet activation35, and thrombosis36 This seems to suggest that altered platelet metabolism may play a critical role in the pathophysiology of thrombosis in COVID19 patients. It is important to note that reports have suggested that a state of hypermetabolic demand is one of COVID19 disease features, especially when sepsis develops 37. Like other viruses that can impact cellular metabolism in human cells and utilize them to their advantage, SARS-CoV-2 virus appears to have the ability to localize proteins to mitochondria and hijack the host’s mitochondrial function 38. This mechanism might explain the enrichment of platelet mitochondrial processes we observed in the yellow and black modules. This finding is in fact supported by a recent study that reported that SARS-CoV-2 impacts mitochondria in platelets, which affects their involvement in the pathophysiology of thrombosis in COVID19 patients39. The enrichment of protein translation in the yellow and black modules suggests an alteration in protein synthesis and possible hijacking of the translation machinery of platelet by the virus. In line with this observation, one study suggested that the cells infected with SARS-CoV-2 might exhibit a faster protein synthesis rate, which implies a high translation rate 40. This notion requires further investigation to determine the exact mechanism underlying enhancement of translation in platelets of COVID19 patient. One particular characteristic of platelet apoptotic process is the phosphatidylserine (PS) exposure, which is essential for the generation of thrombin41. PS exposure is found to be downregulated in activated platelets from COVID19 patients due to mitochondrial dysfunction39. This observation is supported by the negative regulation of apoptotic processes in platelets enrichment in the negatively correlated magenta module. On the contrary, another report showed that COVID19 increases PS externalization, which is linked to thrombosis42. The impact of platelets mitochondrial damage on hemostasis depends on its severity. Thus, it leads to bleeding by progressing toward apoptosis if it is severe; or toward platelet activation pathways and development of thrombosis risk in case of mild damage43. Based on this reasoning, COVID19 disease-caused mitochondrial damage in platelets is probably mild; and hence the thrombotic phenotype still prevails in these patients. Based on these considerations, more investigation is needed to confirm these observations and to understand the underlying mechanisms. We identified hub genes in each of the key modules. For example, in the yellow module the COPE, CDC37, and CAPNS1, which are protein coding genes involved in vesicle-mediated transport, positive regulation of cellular processes, and regulation of interferons. Furthermore, some of these protein coding genes have also been investigated in platelets and shown to regulate important aspects of their function44–47, Interestingly, although our co-expression analysis showed that CAPNS1 is an important hub gene in the yellow module, this gene was not differentially expressed in our differential gene expression analysis. Furthermore, CAPNS1 has shown to play a significant role in regulating platelet activity and thrombosis under hypoxia 46, a condition commonly seen in severe COVID19 patients48. This observation might indicate that some of the important genes in establishing thrombotic phenotype in COVID19 may not necessarily be differentially expressed. The hub genes of the black module, AURKAIP1, LAMTOR2, and GABARAP are linked to regulation of mitochondrial activity, regulation of signaling processes, and protein targeting. Data on the role of these genes in platelets is limited, however, further investigation is warranted based on our findings. It is noteworthy that LAMTOR2 is a known regulator of the MAPK/Erk and mTor signaling pathways49,50, both of which are shown to be important in regulating platelet function 51,52. Moreover, the p14/LAMTOR2 deficiency-which is associated with one of the primary immunodeficiency diseases that also include “Hermansky–Pudlak syndrome type 2”-has been linked to platelet defects53. However, more needs to be done to examine the exact role of LAMTOR2 in platelets of COVID19 patients. In the magenta module, MT-ND1, MT-ND5, and MTRNR2L12 protein coding genes are related to NADH dehydrogenase activity and apoptotic processes. According to our analysis, all hub genes in the magenta module have differentially expressed and are downregulated in COVID19 patients in comparison to healthy controls. Down regulation of MT-ND1, MT-ND5 protein coding gene might at least in part explain the mitochondrial dysfunction seen in platelets of COVID19 patients. With respect to MTRNR2L12, it was observed that it is one of the differentially expressed genes in bronchoalveolar lavage fluid samples from patients with severe COVID19 in comparison to control 54. MTRNR2L12 is a paralog of the protein coding gene MTRNR2L8, and both are expressed in platelets 55. It is of note that MTRNR2L12 was shown to be among the top 10 RNA with differential splice junctions in platelets of patients of multiple sclerosis 56. In addition to the identified hub genes, a number of other canonical platelet genes in the yellow and black modules were also associated with platelet function. For example, SLEB and ITGA2B protein coding genes were present in the yellow module with high intramodular connectivity (ranked in the top 50) and both proteins are critical for platelet function57. Moreover, another canonical platelet gene that was also identified in the yellow module, namely ITGB3 was ranked 132 with regard to its intramodular connectivity, which is considered high in the yellow module of 681 genes. Furthermore, we also noticed that the protein coding gene IFITM3 shows high module membership (black module). The protein encoded by this gene is an interferon-induced membrane protein that was shown to be helpful in immunity against influenza A H1N1 virus, West Nile virus, and dengue virus58–60. Most recently, IFITM3 has also been shown to be upregulated protein in COVID19 disease7,61. The present study has certain limitations that should be noted. Firstly, the analysis focused on only one dataset, due to limited access to platelet gene expression data that were collected from COVID19 patients. Therefore, additional datasets should be analyzed, if available, to validate our findings and/or obtain more representative results. Also, the number of samples was 15, which may be associated with some noise, albeit it is the minimum number of samples recommended for co-expression analysis by WGCNA. Finally, any limitations in the original study, from which the data was obtained will also be reflected in the results of this study. In conclusion, our co-expression analysis of a platelet RNAseq dataset from COVID19 patients and healthy controls revealed 16 modules, amongst which the yellow, black, and magenta were identified as the most critical in COVID19 disease. Additionally, 9 hub genes were determined to potentially serve key roles in pathophysiological mechanisms of COVID19 in the context of platelet biology. The positively associated yellow and black modules were identified to be involved in platelet degranulation, energy metabolism, and mitochondria. The negatively associated magenta module was associated with interactive pathways of apoptosis. These data should help expand our understanding of the underlying mechanisms of thrombosis in COVID19 disease and help promote and guide future experimental studies to investigate the roles of the protein coding genes in the pathophysiology of this disease. Additionally, these genes may serve as novel therapeutic targets for treating patients. Authorship Contribution AA, AM: conceptualization; AA, AM: analyzed results and made the figures; AA: drafted the manuscript; AA, AM, KM, FA, FK: edited the manuscript and approved the submission; Conflict of interest disclosure Authors declare no conflict of interest related to this work. Supplementary Material Acknowledgements The authors acknowledge Matthew T. Rondina and Robert A. Campbell from the department of internal medicine, University of Utah, Salt Lake City, Utah, USA, for their contribution and suggestions that improved the work substantially. The statements made here are solely the responsibility of the authors. No external funding was utilized in this study. References - .↵ - .↵ - . - .↵ - .↵ - .↵ - .↵ - .↵ - .↵ - .↵ - .↵ - .↵ - .↵ - .↵ - .↵ - .↵ - .↵ - .↵ - .↵ - .↵ - .↵ - .↵ - .↵ - .↵ - .↵ - .↵ - .↵ - .↵ - .↵ - .↵ - .↵ - .↵ - .↵ - .↵ - .↵ - .↵ - .↵ - .↵ - .↵ - .↵ - .↵ - .↵ - .↵ - .↵ - . - .↵ - .↵ - .↵ - .↵ - .↵ - .↵ - .↵ - .↵ - .↵ - .↵ - .↵ - .↵ - .↵ - .
https://www.biorxiv.org/content/10.1101/2021.09.01.458644v1.full
Brussels, 18 February 2016 – EPRUMA partners welcome the European Parliament Environment and Public Health Committee’s efforts to ensure an increased availability of veterinary medicines and support innovation in animal health. The availability and responsible use of medicines are inter-twined, and EPRUMA partners continue to work together to disseminate and encourage the implementation of best practice in the use of all veterinary medicines including antibiotics. According to EPRUMA, the responsible use of veterinary medicines is based on a holistic approach of minimising disease. This includes a wide choice of tools such as biosecurity, good housing and ventilation, good hygiene, appropriate nutrition and robust animals, regular monitoring of animal health and welfare, animal health planning, use of diagnostics, vaccination and using and maintaining the pharmacovigilance system when necessary, as well as the use of veterinary medicines, as required by law. Since 2005 EPRUMA works collectively to ensure that all veterinary medicines including antibiotics are used responsibly, i.e. under veterinary care, according to licensing conditions, and with diagnostics guiding the antibiotic choice as much as possible.
http://epruma.eu/news/news/news/89-veterinary-medicines-regulation-medicines-availability-and-responsible-use-go-hand-in-hand-.html
RLUK (Research Libraries UK) have introduced a Service Standards benchmark initiative. One of the standards is for Digital and Information Literacy, and RLUK require the evaluation forms which we use for our information literacy teaching to include the following question: “As a result of today’s session, do you have greater confidence in using library and information resources? (Answer: Yes/No)” Feedback can be requested in a variety of ways. The above question can be solicited as a standalone exercise or incorporated into other feedback mechanisms, provided the data can be mapped over. The question should be addressed to each student at the end of an IL session or the final session of a series. Responses may be collected via a number of means: - If you are using clickers you could set-up a vote and record the results. - If you are using a feedback form, include the question at a prominent point – example. - Display the question and response options on a PowerPoint slide. Issue post-it notes for responses, and get the students to attach them to a wall as they leave the room. - Set up a quick online response survey using a free online voting tool such as Doodle. - Set up a survey using Bristol Online Surveys (BOS). To obtain an account contact the IT Service Desk at [email protected]. Benchmarking your own teaching may be useful for a variety of reasons, for example to gauge year on year whether your teaching is having the desired impact. If you have made substantial changes to your teaching methods or materials, it can be used to assess the relative success of these adjustments. Benchmarking isn’t the only way to gain feedback and evaluate your teaching. You may find the above approach lacks nuance and doesn’t address individual aspects of your information literacy teaching. The next section looks at other ways of getting feedback from your students.
http://sites.cardiff.ac.uk/ilrb/handbook/evaluating/rluk-benchmarking/
The workshop informed on the BIOPAMA intervention strategy and involved conservation stakeholders in its implementation in order to enhance the management of data on protected areas and biodiversity to improve regional strategies, public policies and practices in the sites. The very active and constructive participation of over sixty representatives of administrations in charge of thirteen countries of the region (Benin, Burkina Faso, Gambia, Guinea, Guinea Bissau, Ivory Coast, Liberia, Mauritania, Niger, Nigeria, Senegal and Togo), plus technical-financial partners (based in five European countries) has ensured the achievement of the expected results. During two days of group work, roundtable discussions and exchange of experiences, participants were informed about the objectives of BIOPAMA programme, and through constructive dialogue, they shared their suggestions and identified priority joint actions for the countries and the region. The participants expressed their achievements and motivation to the creation of the regional observatory and the promotion of the information system proposed by BIOPAMA as well as to share data and to participate in the capacity building process to support the use of information management systems and tools in order to enhance protected areas management and governance. BIOPAMA offers the following workshop outputs: - a roadmap for the establishment of the Observatory as well as indications of partnerships to enhance data and information available in the region; - a list of opportunities of national investment based on key reference documents at national and regional levels; - an inventory of themes and potential authors to consider in the preparation of the report “Status of the marine protected areas”. The main follow-up steps for BIOPAMA implementation were presented during the workshop final communication, including: - the designation of a technical host of the Observatory of West Africa; - the definition of regional indicators connected to biodiversity and protected areas effective management in partnership with the countries and institutions concerned; - continuous capacity building of regional organizations, platforms and conservation professionals; - organization of a workshop on IMET for Central and Western Africa (IMET 1.0 – 2.0) and facilitation of access to data analysis collected during the first phase of BIOPAMA. These efforts will be effective in influencing public policies and in decision-making processes at different levels for biodiversity conservation and better governance of protected areas in Western Africa.
https://biopama.org/western-africa-region-engages-in-creating-an-observatory-for-effective-protected-area-management/
Biomechanics, motion analysis, strength training technique, injury mechanisms and risk factors for ACL injuries, ankle injuries, head injuries in ball/team sports and alpine sports. Strength/endurance/flexibility training, biomechanics, motion analysis and functional anatomy Tron Krosshaug, PhD is an associate professor at the Oslo Sports Trauma Research Center and the Department of Sports Medicine at the Norwegian School of Sport Sciences. His main research area is sports injury prevention, with a primary focus on biomechanical analysis of serious knee injuries in various sports. He defended his PhD thesis on the topic "Video analysis of the mechanisms for ACL injuries" in August 2006. In the PhD work he developed a new method for extracting detailed joint motion from videos of real injury situations. The method is used by researchers world-wide to investigate e.g. ankle sprains and head impacts in various sports.
https://www.nih.no/en/studies/aktiv/praktisk-informasjon2/forelesere/krosshaug-tron/
The present invention provides high temperature fabricable nickel aluminide alloys containing nickel, aluminum, boron and zirconium, and in some species, titanium or carbon. Intermetallic alloys based on tri-nickel aluminide (Ni₃Al) have unique properties that make them attractive for structural applications at elevated temperatures. The alloys exhibit the unusual mechanical characteristic of increasing yield stress with increasing temperature whereas in conventional alloys yield stress decreases with temperature. It is known from our U.S. Patent US-A-4,711,761, entitled "Ductile Aluminide Alloys for High Temperature Applications" that this intermetallic composition exhibits increased yield strength upon the addition of iron, increased ductility upon the addition of boron, and improved cold fabricability upon the addition of titanium, manganese and niobium. Another improvement has been made in the base nickel aluminide by adding, in addition to iron and boron, hafnium and zirconium for increased strength at higher temperatures as disclosed in our U.S. Patent US-A-4,612,165 entitled "Ductile Aluminide Alloys for High Temperature Applications." One of the primary problems encountered in utilizing the improved alloys was that they exhibited low ductility at high temperatures. Since the strength of the alloys increased with increasing temperature, and since industrial processing normally involves working the alloys at high temperatures, problems arose in fabricating the alloys to desired shapes using customary foundry practices. This problem was overcome, to a degree, by holding the iron content high (in the neighborhood of 16 wt.%) and making minor changes in other constituents as disclosed in our U.S. Patent US-A-4,722,828 entitled "High-Temperature Fabricable Nickel-Iron Aluminides." However, the high-iron content alloys as well as the alloys containing no iron were found to be subject to embrittlement when worked at elevated temperatures in an oxygen bearing environment. In our U.S. Patent US-A-4,731,221 entitled "Nickel Aluminides and Nickel-Iron Aluminides for Use in Oxidizing Environments", it is disclosed that the addition of up to about 8 at. % chromium would minimize the oxidation embrittlement problem. Despite the above and other improvements in the properties of aluminide alloys, there still remain problems in preparing and using the alloys at temperatures above 1100°C. For example, the prior art high temperature fabricable alloys have contained iron, the element which lowers strength at high temperatures. It is, therefore, desirable to fabricate iron-free aluminide compositions which exhibit good fabricability properties at elevated temperatures. Furthermore, it has been found that when heating the prior art alloys containing zirconium (a known constituent for improving strength at high temperatures) an eutectic of zirconium-rich composition is produced at the grain interfaces if the rate of heating between 1150°C and 1200°C is too rapid, substantially reducing the high temperature strength and ductility of the alloy. Nickel aluminide alloy compositions were therefore sought which are suitable for fabrication at high temperatures in the range of from about 1100 to about 1200°C. An additional aim of the inventors was to provide a nickel aluminide alloy exhibiting improved fabricability, ductility, and strength at elevated temperatures in the area of 1200°C. Still another aim of the inventors was the provision of high temperature fabricable nickel aluminide alloys which are not subject to significant corrosion by oxidation when exposed to an air environment at high temperatures in the range of 1100 to 1200°C. The present invention provides a nickel aluminide alloy composition suitable for fabrication at high temperature in the range of 1050 to 1200°C consisting of, in atomic percent, from 15.5 to 18.5% aluminum, from 6 to 10% chromium, from 0.05 to 0.35% zirconium, from 0.08 to 0.30% boron; and optionally: up to 0.5% carbon, and from 0.2 to 0.5% titanium; the balance being nickel plus incidental impurities. The resulting alloys wherein zirconium is maintained within the range of from 0.05 to 0.35 atomic percent exhibit improved strength, ductility and fabricability at elevated temperatures in the range of from 1100 to 1200°C which are the temperatures typically encountered in hot working processes such as hot forging, hot extruding and hot rolling. The addition of titanium in the range of from 0.2 to 0.5 at. % further improves the mechanical properties of the alloys. Also, the addition of up to 0.5 at. % (particularly 0.01 to 0.5 at. %) carbon improves the hot fabricability off the alloys. A particularly preferred aluminide composition falling within the ranges set forth for the alloy of the present invention contains, in atomic percent, 17.1% aluminum, 8% chromium, 0.25% zirconium, 0.25% titanium, 0.1% boron and a balance of nickel. FIGURES 1(a) and 1(b) are photographic enlargements (800 X and 400 X, respectively) illustrating the microstructure of a prior art high zirconium content alloy (1 at. % zirconium) showing the effect of the heating rate above 1000°C on the formation of undesirable zirconium-rich compositions at the grain interfaces; FIGURE 2 is a plot of compression versus temperature for nickel aluminide alloys containing zirconium in the range of the invention; and FIGURE 3 is a plot of compression versus temperature for nickel aluminide alloys comparing hot compression results for alloys having a zirconium concentration within the range of the invention (represented by the curve) and alloys containing zirconium above the range of the invention (represented by the filled circles). The foregoing and other features and advantages of the invention will be further described with reference to the following detailed description considered in conjunction with the accompanying drawings in which: The compositions of the invention include nickel and aluminum to form a polycrystalline intermetallic Ni₃Al, chromium, zirconium, boron and in preferred forms titanium and carbon, wherein the zirconium concentration is maintained in the range of from 0.05 to 0.35 at. % in order to provide compositions exhibiting improved mechanical properties and improved fabricability at high temperatures in the neighborhood of 1200°C without the occurrence of a significant degree of oxidation. The invention stems from the discovery that prior art alloys containing relatively high amounts of zirconium in excess of about 0.4 at. % showed an indication of incipient melting within the microstructure during relatively rapid heating about 1150°C. This effect is illustrated in the photographic enlargements of FIGURES 1(a) and 1(b) comparing the microstructures of nickel aluminide alloys containing 1 at. % zirconium, with FIGURE 1(a) showing the occurrence of incipient melting in the microstructure at a rapid heating rate of approximately 100°C per 10 min. above 1000°C and FIGURE 1(b) showing a slow heating rate of about 100°C per hour over 1000°C where there is little if any incipient melting. The low-melting phase contains a high level of zirconium, probably a Ni₅Zr-type phase, and is believed to be responsible for the poor hot fabricability and low ductility of the alloy at high temperatures in the neighborhood of 1200°C. While the low-melting phase is metastable in nature and can be suppressed by slow heating of the alloys above 1000°C, such a heating process is relatively inefficient and the degree of suppression is difficult to control. In accordance with the invention it is found that the formation of a low-melting metastable zirconium-rich phase may be suppressed by maintaining the zirconium concentration in the range of from 0.05 to 0.35 at. % to thereby avoid the need for a slow heating process. Preferably, the zirconium is maintained within the range of from 0.2 to 0.3 at. % and the optimum zirconium concentration is believed to be about 0.25 at. percent. The aluminum and chromium in the compositions of the invention are provided in the range of from 15.5 to 18.5 and from 6 to 10 at. %, respectively. The concentration of chromium affects the ductility of the alloys at room temperature and elevated temperatures as taught in our U.S. Patent US-A-4,731,221 entitled "Nickel Aluminicles and Nickel-Iron Aluminicles, For Use In Oxidizing Environments". A high chromium concentration of 10% causes a decrease in room temperature ductility, while a low concentration of about 6% results in a low ductility at 760°C. The optimum concentration of chromium is about 8 at. percent. The aluminum concentration affects the amount of ordered phase in the nickel aluminide alloys, and the optimum level is about 17.1 at. percent. The boron is included to improve the ductility of the alloy as disclosed in our U.S. Patent US-A-4,711,761, mentioned above, and in an amount ranging from 0.08 to 0.30 at. percent. The preferred concentration of boron is from 0.08 to 0.25 at. % and the optimum boron concentration is about 0.1 at. percent. TABLE 1 Effect of Zirconium Additions on Tensile Properties of Chromium-Modified Nickel Aluminides Alloy Number Alloy Additions (at %) Strength, MPa (ksi) Elongation (%) Yield Ultimate Room Temperature IC-283 0.5 Zr 493 (71.5) 1722 (250) 36.1 IC-324 0.3 Zr 506 (73.4) 1461 (212) 33.1 IC-323 0.2 Zr 493 (71.5) 1447 (210) 24.1 IC-288 0 Zr 409 (59.3) 1371 (199) 35.5 TABLE 1 760°C IC-283 723 (105) 896 (130) 26.1 IC-324 687 (99.7) 841 (122) 27.1 IC-323 677 (98.3) 800 (116) 29.4 IC-288 493 (71.5) 616 (89.4) 21.4 TABLE 1 850°C IC-283 723 (105) 785 (114) 17.8 IC-324 644 (93.6) 723 (105) 15.1 IC-323 642 (93.2) 744 (108) 16.4 IC-288 451 (65.4) 522 (75.7) 13.2 TABLE 1 1000°C IC-283 388 (49.1) 408 (59.2) 16.1 IC-324 353 (51.2) 400 (58.0) 12.1 IC-323 336 (48.7) 395 (57.4) 14.6 IC-288 226 (32.8) 260 (37.7) 19.7 TABLE 1 1200°C IC-283 11.7 (1.7) 12.4 (1.8) 0.5 IC-324 66.8 (9.7) 68.2 (9.9) 31.2 IC-323 67.5 (9.8) 68.9 (10.0) 33.0 IC-288 45.5 (6.6) 53.7 (7.8) 55.8 The compositions may be prepared by standard procedures to produce castings that exhibit good strength and ductility at 1200°C, and which are more readily fabricated into desired shapes by conventional high temperature processing techniques. Table 1 shows the tensile properties of the low zirconium alloys of the invention at temperatures up to 1200°C relative to nickel aluminide compositions incorporating no zirconium and zirconium in excess of the range discovered to be useful herein for providing nickel aluminide alloys exhibiting improved properties. In Table 1, the base alloy IC-283 contains 17.1 at. % aluminum, 8 at. % chromium, 0.5 at. % zirconium, 0.1 at. % boron, and a balance of nickel. In the other alloys IC-324, IC-323, and IC-288 in which the zirconium concentration is decreased, the reduction in zirconium is made up by increasing the aluminum concentration a corresponding amount. The alloys are prepared and the tensile tests are conducted according to the procedures described in our above-mentioned U.S. Patent US-A-4,612,165. For the test results disclosed herein, all alloys are heated at a rate of 100°C per 10 min. above 1000°C. From Table 1 it is seen that the compositions IC-324 and IC-323 including 0.2 and 0.3 at. % zirconium, respectively, exhibit yield strengths in excess of 60 MPa and a ductility above 30% at 1200°C. At the same high temperature, the alloy IC-283 containing 0.5 at. % zirconium has a much lower yield strength in the neighborhood of 12 MPa and a considerably lower ductility of 0.5 percent. These results indicate that the incipient melting found to occur in the prior art alloys at room temperatures about 1100°C may be avoided by holding the zirconium concentration in the range of from about 0.05 to about 0.35 at. percent, with a range of from about 0.2 to about 0.3 at. % being preferred. The hot fabricability of the low zirconium alloys of the invention was determined on 4 inch (10.16 cm) diameter ingots which were electroslag melted. One inch (2.54 cm) diameter cylindrical compression samples having a length of 1.5 inches (3.81 cm) were electrodischarge machined from the ingots. Each cylinder was heated for 1 hour at the desired temperature and compressed in steps of 25% in a 500 ton forging press. After each step, the specimens were examined for surface defects. If the surface showed no defect, the specimens were reheated for an additional hour and an additional 25% reduction was taken. The results are shown in FIGURES 2 and 3 which compare the hot forging response of a low zirconium alloy of the invention with the hot forging response of a high zirconium alloy of the prior art. The particular low zirconium alloy of FIGURE 2 includes 16.9 at. % aluminum, 0.2 at. % zirconium, 8 at. % chromium and a balance of nickel. FIGURE 2 shows the curve above which safe forging is possible for the alloy containing 0.2 at. % zirconium. It is seen from FIGURE 2 that billets of the low zirconium alloy should be forgeable over a range of 1150 to 1200°C. However, for large reductions greater than about 50%, the temperature should be maintained close to 1200°C. The high zirconium alloy of FIGURE 3 includes 16.7 at. % aluminum, 0.4 at. % zirconium, 8 at. % chromium, and the balance nickel. The results of compression tests on this alloy are also given for a range of temperatures to simulate forging response and the safe forging curve of FIGURE 2 is reproduced in FIGURE 3 for comparison. From FIGURE 3, it is seen that compared to an alloy containing 0.2 at. % zirconium, there is no safe forging region possible for the high zirconium alloy containing 0.4 at % zirconium. Another common commercial process is hot extrusion. For comparison, the alloys of FIGURES 2 and 3 are extruded using stainless steel cans which are used to hold the extrusion temperature and to deform the alloy ingots under a hydrostatic compression. Both alloys are hot extrudable at 1100°C. However, through further experimentation it was determined that the low zirconium alloy may be extruded without the expensive stainless steel can. An improved surface finish for the low zirconium alloy during extrusion may also be obtained by wrapping a 20-mil-thick mild steel sheet around the billets and extruding at 1200°C. The low zirconium alloys of the invention are also more amenable to hot rolling processes required for preparing the flat product from cast, forged or extruded material. For example, the low zirconium alloy of FIGURE 2 containing 0.2 at. % zirconium was hot rollable in the cast condition with a stainless steel cover in the temperature range of 1100 to 1200°C and was also easily hot rollable in the extruded condition in the same temperature range. However, the high zirconium alloy of FIGURE 3 containing 0.4 at. % zirconium was not easily hot rollable in the as-cast condition, even with a cover. The extruded high zirconium alloy was hot rollable, but only over a narrow temperature range of 1125 to 1175°C. TABLE 2 Creep Properties of Chromium-Modified Aluminides Tested at 760°C and 413 MPa (60 ksi) in Air Alloy Number Alloy Additions (at. %) Rupture Life (h) Rupture Ductility (%) IC-283 0.5 Zr 284 16.1 IC-324 0.3 Zr 87 24.5 IC-323 0.2 Zr 51 30.0 IC-288 0 Zr 2 16.2 The creep properties of the alloys of Table 1 were determined at 760°C and 413 MPa (60 ksi) in air. The results are shown in Table 2. It is seen from Table 2 that the rupture life of the alloys decreases with decreasing zirconium content, and that decreasing the zirconium content moderately increases the rupture ductility of the alloys (except at 0.0 at. % Zr). In order to improve the mechanical properties of the low zirconium alloys of the invention and particularly the creep resistance, a series of alloys was prepared based on IC-324 (containing 0.3% zirconium) in which additions of up to 0.7 at. % titanium, niobium, rhenium, and silicon were made. Table 3 shows the tensile results of this series of alloys. Comparing the results shown in Table 3 with those of Table 1 it is seen that among the alloy additions, rhenium is the most effective strengthener followed by titanium and niobium. Also, the tensile properties at 1000 and 1200°C are not particularly sensitive to alloy additions. Moreover, the ductility of the alloys is basically unaffected by alloy additions except that alloying with 0.4% silicon and rhenium moderately lowers the room-temperature ductility and alloying with 0.7 at. % titanium lowers the ductilities at 1000 and 1200°C. TABLE 4 Creep Properties of Chromium-Modified Aluminides Tested at 760°C and 413 MPa (60 ksi) in Air Alloy Number Alloy Additions (at. %) Rupture Life (h) Rupture Ductility (%) IC-324 0.3 Zr 87 24.5 IC-326 0.3 Zr+0.2 Ti 130 21.4 IC-328 0.2 Zr+0.3 Ti 70 25.0 IC-343 0.3 Zr+0.7 Ti 79 20.6 IC-358 0.3 Zr+0.2 Nb 52 -- IC-359 0.3 Zr+0.4 Nb 84 29.2 IC-360 0.3 Zr+0.2 Re 53 31.7 IC-361 0.3 Zr+0.4 Re 70 25.1 IC-362 0.3 Zr+0.2 Si 64 28.5 IC-363 0.3 Zr+0.4 Si 101 30.4 The creep properties of the aluminides with the alloying additions are shown in Table 4. The creep properties of the base alloy IC-324 from Table 2 are reproduced in Table 4 for ease of comparison. Table 4 shows that alloying with 0.2 at. % titanium (IC-326) significantly increases the creep resistance of the base alloy IC-324 containing 0.3 at. % zirconium. The addition of about 0.4 at. % silicon also increases the creep resistance. Alloying with 0.2 at. % niobium and rhenium lowers the creep resistance. Also, it is to be noted from Table 4 that alloying with 0.7 at. % titanium does not improve the creep properties of the base alloy. TABLE 5 Effect of Alloy Addition on Creep Properties of IC-326 (0.3 at.% Zr) Alloy Number Alloy Additions (at. %) Rupture Life (h) Rupture Ductility (%) IC-326 None 130 21.4 IC-343 0.5 Ti 79 20.6 IC-345 0.5 Mo 85 16.4 IC-346 0.5 Nb 112 16.2 As shown in Table 5 below, further additions of 0.5 at. % titanium, molybdenum and niobium moderately increases the strength of the alloy IC-326 (containing 0.3 at. % zirconium and 0.2 at. % titanium) at temperatures up to about 1000°C. The alloying additions reduce the strength of the alloy at 1200°C. The creep resistance of IC-326 is not further improved by adding 0.5 at. % titanium, molybdenum or niobium. From the results disclosed herein the alloy IC-326 appears to exhibit the best combination of creep and tensile properties. The alloy has good cold fabricability and its hot fabricability can be further improved by cold forging followed by recrystallisation annealing at 1000 to 1100°C to break down the cast structure and refine the grain structure of the alloy. The hot fabricability of IC-326 is not sensitive to alloying additions of titanium, niobium, rhenium, silicon or molybdenum. The addition of up to about 0.5 at. % (0.1 wt. %) carbon further improves the hot fabricability of IC-326. The beneficial affect of carbon comes from refinement of cast grain structure through precipitation of carbides during solidification. TABLE 6 Tensile Properties of Nickel Aluminides Added with 0.1 wt. % C Alloy Number Alloy Additions (at %) Strength, MPa (ksi) Elongation (%) Yield Ultimate Room Temperature IC-326* 0.3 Zr+0.2 Ti 531 (77.0) 1481 (215) 32.4 IC-373** 0.3 Zr+0.2 Ti 454 (65.9) 1543 (224) 41.3 IC-374** 0.3 Zr+0.5 Ti 519 (75.3) 1378 (200) 28.3 TABLE 6 760°C IC-326 730 (106) 868 (126) 28.6 IC-373 619 (88.8) 813 (118) 16.0 IC-374 683 (99.2) 827 (120) 16.4 TABLE 6 850°C IC-326 717 (104) 799 (116) 17.9 IC-373 588 (85.4) 702 (102) 26.5 IC-374 613 (88.9) 723 (105) 22.6 TABLE 6 1000°C IC-326 529 (47.7) 400 (58.0) 20.5 IC-373 336 (48.8) 369 (53.6) 19.0 IC-374 276 (40.0) 305 (44.3) 22.7 TABLE 6 1200°C IC-326 71.7 (10.4) 85.4 (12.4) 29.6 IC-373 51.7 (7.5) 135 (19.6) 54.2 IC-374 32.4 (4.7) 43.4 (6.3) 11.4 TABLE 6 *Base composition. **0.1 wt. % C. Table 6 shows the tensile properties of alloys containing 0.3 at. % zirconium together with an amount of from about 0.2 to about 0.5 at. % titanium, and 0.1 wt. % carbon. Table 6 also includes the tensile properties of the base alloy IC-326 from Table 3. The results of Table 6 show that the addition of 0.1 at. % carbon moderately reduces the strengths at all testing temperatures. However, the carbon addition substantially increases the ductility at 1200°C to thereby improve the hot fabricability of the alloy. It is thus seen that the low zirconium nickel aluminides of the present invention exhibit improved mechanical properties at high temperatures in the neighborhood of 1200°C and are more readily fabricated into desired shapes using conventional hot processing techniques when compared with previous compositions. The addition of small amounts of other elements such as titanium and carbon further improve the mechanical properties and fabricability of the alloys of the invention at high temperatures.
Clin Cardiol. 1999 Jul;22(7 Suppl):III1-5. Nonpharmacologic therapies that reduce blood pressure: a fresh perspective. Welch Center for Prevention, Epidemiology and Clinical Research, Johns Hopkins University, Baltimore, Maryland 21205-2223, USA. Traditional approaches to control the epidemic of blood pressure-related atherosclerotic cardiovascular disease (ASCVD) have largely focused on drug therapy in persons with hypertension. Still, nonpharmacologic therapy, also termed lifestyle modification, has an important and expanding role that complements drug therapy. Specifically, nonpharmacologic therapies can serve as initial therapy in Stage 1 hypertensive patients, facilitate medication step down or withdrawal in patients with well-controlled hypertension, prevent hypertension in high-risk populations, and reduce blood pressure in normotensive individuals and thereby lower their risk of ASCVD. Traditional lifestyle modifications that reduce blood pressure include sodium reduction, weight loss, moderation of alcohol intake, and increased physical activity. Such strategies have been prominently advocated in the Fifth Report of the Joint National Committee on Prevention, Detection, Evaluation, and Treatment of High Blood Pressure. Recommendations to increase potassium, magnesium, and calcium intake were based primarily on general health considerations, not for control of high blood pressure. In its sixth and most recent report (JNC VI) published in 1997, the Joint National Committee has extended its recommendations. In addition to the traditional lifestyle recommendations, the JNC VI advocates increased potassium intake for control of high blood pressure. Furthermore, this policy-making body now recommends a healthy dietary pattern, that is, one that is rich in fruits, vegetables, and low-fat dairy products, and reduced in saturated fat, total fat, and cholesterol. This diet, which was rigorously evaluated in the Dietary Approaches to Stop Hypertension (DASH) clinical trial, substantially lowered blood pressure in normotensive and hypertensive individuals. These recent developments reinforce the hypothesis that multiple dietary factors influence blood pressure. Nonpharmacologic approaches have enormous potential as a means to reduce blood pressure and control hypertension, thereby preventing the occurrence of ASCVD. The current challenge to health care providers, government officials, and the general public is to develop and implement effective clinical and public health strategies that lead to desirable lifestyle modifications.
https://www.ncbi.nlm.nih.gov/pubmed/10410298
The lesson begins with a challenging Launch task (Launch Exploration). This means that the productive struggle will begin early in the lesson. Because of this, as I walk around I motivate everyone to try and come up with solutions independently, without relying on help from another student or from me. When I see a student reaches a correct answers, I will also ask that he/she be discreet, so others can arrive at answers on their own (See my Reflection Allowing others to work independently). As students work, I walk through giving careful guidance, especially helping those who seem not to have a clue of where to start. But I motivate them to persevere and those who do, will soon find that the answers can be figured out substituting values for the variables and solving for x. Students may not know how to deal with parameters a, b, c, and d because algebra is still relatively new to them, they may be uncomfortable with sentences that relate variables or expressions. If I see that struggling isn't leading anywhere, only then I resort to peer collaboration asking those students who are making progress to help out those that are not. By trial and error, students should eventually come up with example equations that satisfy all three scenarios: I end the Launch section by asking volunteers to demonstrate and explain their work on the board for each case. A common belief among students is the idea that every math problem has one answer. The Launch task should raise questions about whether or not this is true. Algebra can be used to model real situations where there is no possible solution, one solution, or an infinite number of solutions. The New Info 2 Situations slides present problems involving real world situations. My plan is to show one slide at a time asking the class to read the task and then work in groups to solve it. I allow students to use any method to find the solution and walk around giving guidance. Some will try graphing while others will use algebraic methods or trial and error. I encourage students to try solving algebraically hinting that the variable be the number of years worked. In this problem, students should find that the two salaries will never be equal. Job 1 will always pay higher. After I see that most students discover that there is no solution, I ask students that have solved algebraically to write their work on the board. Setting the equations equal to each other, students will find that the variable is eliminated when solving, and the quest for the solution is frustrated. At this point I ask if any other students tried to solve it differently and explain their results. I expect students to say the two jobs will never earn the same salary and that job 1 will always pay more. I then show slide 2 and ask students again to read carefully, study the diagram and work together to solve the problem. In this case students will almost certainly write two equations equal to each other and solve algebraically. Once done, I call on a student to write their work on the board beside the work of the problem 1. Again, the variable will be eliminated, but this time ending with a true equation, 7 = 7. I then ask that students try and substitute different values for x in the task. They all should find that the perimeters are the same no matter what value substituted. To finalize this section, I ask that students observe both problems written on the board and compare these, especially looking at the final sentence in both problems. They should be able to see when an equation has no solution and when there is an infinite amount of solutions. Next, I hand out a copy of the Application worksheet to each student. The students will continue to work in pairs. On this worksheet, I ask that they show all work. In Question 1, students could refer to the Launch section of the lesson to answer each part. Question 2 reinforces the idea of no solution when an equation ends with a false statement and variable is eliminated. Question 3 is a similar problem to the first slide in the "New Info" section where there is no solution to the situation. Students should set up an equation a Question 4: The equation has one solution. Problem 5, part b asks that students change the problem such that its solution is not feasible for the problem. Students should understand that equations may have one solutions, but in real world situations, this solutions may not be possible. If students have difficulty with this question, I may ask to think about what numbers are not possible if we are dealing with number of people. Students will probably recognize that negative numbers are not feasible for the problem and change the values around to get a negative solution for x. As we try to generalize what we have explored during this lesson, I want my students to do most of the talking (or writing). For this lesson, and after the application problems are reviewed, I ask students to write a paragraph in the back of their Application Worksheet. The paragraph should cover two things: 1) What did we learn today? 2) If you had to make a very brief "cheat slip" for a quiz on today's lesson, what would you write? Like all closure activities, the students' responses will tell me if how to proceed following this lesson. This Homework assignment is good practice. Students will soon know before solving, the nature of the solutions to an equation. Common error to be expected: In an equation like 3x + 5 = -3x - 6, students may "jump the gun" and state that the equation has no solution when in fact it does. The see the opposite sign of the coefficients 3 and -3 and think that the variable will be eliminated when in fact you end up with 6x or -6x on one of the sides. I always warn students of this common error.
https://betterlesson.com/lesson/resource/3120943/new-info-2-situations-ppt
The competitive effects of investing in the force of digital technologies are staggering. In ‘The Digital Matrix: New rules for business transformation through technology’ (2017), author Venkat Venkatraman states that by 2025, there will be no difference between digital and non-digital when it comes to functions, processes, business models. By this token, disruption is, in fact, existential. And its furious pace is forcing executives to make decisions and commit much faster than anticipated. Every other day, the amount of information created online is equivalent to all the information created up to 2003 - since the dawn of civilization. The Information Age was hotly debated in the early 2010s, when Eric Schmidt, former Google CEO, first rattled off this stat at a tech conference. It was a time when AI evangelists still debated what the future of data processing technology and its inevitable ubiquity would mean for us. In the eight years since Schmidt’s statement, engineers have successfully equipped machines with the ability to identify patterns from large swaths of data (deep learning) and, in 2018, effectively applied the technology to challenging tasks such as accurately identifying specific cancers in real-time. In their 2017 book ‘Machine, Platform, Crowd: Harnessing our digital future’ MIT's Andrew McAfee and Erik Brynjolfsson suggest that we have moved from the Information Age into the Machine Learning age. Google and Amazon are, inarguably, some of the best consumer examples of this - as of May 2018, it became possible for us to carry on “uninterrupted human conversations” with Google’s virtual home assistants, powered by AI. But, to what extent have organizations adopted these rapidly evolving technologies? AI is, at its core, powered by humans. So perhaps the more reasonable question would be: how ready and willing are we to let technology handle our information for us?
https://www.wolterskluwer.com/en/expert-insights/lessons-in-leading-digital-disruption
Culture and sport The Republic of Srpska is known for its natural beauty, cheerful spirit of its inhabitants, a wide range of sports facilities and a large number of social events, all crowned by the diversity of cultural heritage. You will get to know the beauties of Srpska best by vacation and adventure in a natural environment, visiting cities, museums, galleries, theaters, numerous festivals and sports competitions, as well as enjoying the specialties of traditional and modern cuisine. Culture The cultural heritage of the Republic of Srpska is the heritage of material artifacts and intangible attributes that make up the legacy of past generations. Significant cultural heritage is represented by old towns, fortresses, bridges, monasteries, churches, mosques, archeological sites, old buildings, memorial centers, museum material, ethnological heritage, etc. Some of the immovable and movable cultural assets are included on the UNESCO World Heritage List, such as: Mehmed-pasha Sokolović Bridge, Stećci-medieval tombstones, Zmijanjski vez (embroidery) and Teucrium montanum herb picking. Numerous music festivals are held in the Republic of Srpska: OK Fest, International Folklore Festival Dukat Fest, International Choir Festival Zlatna vila, International Accordion Festival Akordeon Art and others. The most popular music festival is Demofest, the largest festival of unsigned bands in Southeast Europe, in which world famous music stars participate in the non-competitive part of the program. In addition to music, you can visit some of the theater and film festivals: Teatar Fest, International Actor's Festival Zaplet, International Festival of Professional Puppet Theaters for Children Lut Fest, International Children's Theater Festival, International Animated Film Festival, Mediterranean and European Film Festival, International Film Festival Prvi kadar, International Festival of Documentary Film, Tourism and Ecology Jahorina Film Festival. The Republic of Srpska has extremely interesting and potential locations for film stories from the past and present, so shots of films by directors Emir Kusturica, Goran Marković and other famous directors were taken in Srpska. In addition, you can visit events dedicated to fine arts, poetry and traditional customs, such as: European Museum Night (Evropska noć muzeja), Visegrad Trail, Visnjic's Days of Culture (Višnjićevi dani kulture), Ducic's Poetry Evenings (Dučićeve večeri poezije), Literary Meetings on Kozara (Književni susreti na Kozari), Ćopić's paths of childhood (Ćopićeve staze djetinjstva), art-ecological colony Bardača-Srbac, art colony Ars Kozara, Kozarski etno and others. If you come to the Republic of Srpska during the summer or winter, it is an opportunity to visit the famous tourist events: Summer on the Vrbas (Ljeto na Vrbasu), Zvornik Summer (Zvorničko ljeto) and Days of Winter on Kozara (Dani zime na Kozari). Sport In the Republic of Srpska, you will find untouched nature and river canyons that provide an unforgettable adventure experience and enjoyment in rafting, canyoning, kayaking, canoeing, paragliding, free climbing, hiking, cycling, parachuting, fishing and other sports. Also, you can visit some of the important sports events, such as: Banja Luka Half Marathon, International Handball Tournament of Champions, ATP Tournament Srpska Open, International Swimming Rally Banja Luka Open, International Alpine Skiing Competition FIS Cup Jahorina, International Judo Cup Trebinje, International football tournament for children Pixie Cup Jahorina, international rafting competitions on the rivers Vrbas and Tara, international competitions in fly-fishing, chess tournaments, and in the basketball camp Dejan Bodiroga in Trebinje, whose promoters are basketball legends Svetislav Pešić, Saša Obradović, Predrag Saša Danilović, Željko Rebrača, Milan Gurović and others, domestic and foreign young basketball talents gather. For more detailed information and recommendation of interesting places and events, visit the portal Tourist Organisation of Republic of Srpska and see the film Republic of Srpska – Nothing much but much more.
https://investsrpska.vladars.net/useful-information/culture-and-sport/
The Tajik Pamir mountains are one of the most fascinating, remote and isolated areas of Asia. The region of Badakhshan—split between Afghanistan and Tajikistan—is inhabited by Tajiks, Pamiris and Kyrgyz. Of all, the Kyrgyz inhabit the most marginal and high-altitude lands, unsuitable to all but pastoralist economy. I decided to travel here in winter. The Pamir in winter are cold and miserable to the unaccustomed traveller, ever harsh for the Kyrgyz nomadic pastoralists. The Kyrgyz pastoralists are scattered throughout Central Asia: they inhabit modern-day Kyrgyzstan, Tajikistan, Afghanistan and China. All Kyrgyz claim common ancestry and identity, but ever since borders kept them isolated from their brethren, each group has developed in a unique way. They dress differently, wear different hats, use different scripts for writing (Arabic, Latin or Cyrillic-Russian); their history is different depending on who, if any, colonised them. Liberalisation in China and political and economic collapse in the Soviet Union, however, has meant the Kyrgyz no longer take part in an alien cultural and ideological project; they are free to establish their own identity. The challenge is where to look for it. Colonial and imperial closed borders in the early 20th century denied these Kyrgyz access to traditional low-altitude abodes and trade centres; they forcefully adapted to a harsh altitude where horses and chicken, for instance, cannot reproduce. Soviet collectivisation and forcible expropriation of all livestock in the 1930s brought another tragedy to the Kyrgyz people. Stalin’s rule caused years of hunger and famine, violence and deportations. A third tragedy came with the collapse of the Soviet Union in 1991. The entire system of welfare, education, food supplies and healthcare collapsed overnight. There was no money or work; there was no food. Famine was avoided only by international donors and the support people lent to each other. Yet life regenerates once more; one can feel hope in the air. Families have freedom to make choices, the size of individual herds increases steadily. The number of tourists also increases. Most come during summer, but a few brave souls—like me—do come in winter to fight the extreme cold. Arriving in winter one can meet the Kyrgyz in their winter dwellings, at about 3500-4000m altitude. In summer, all scatter further up the mountain where only goat paths lead. Mountainous Kyrgyz are hospitable and friendly. At this extreme altitude people can survive only by helping one another. Hospitality is in fact deeply ingrained into nomadic Asian culture: from the endless steppes and plains of Mongolia, to the remote valleys of the Hindu Kush, Pamir, Alai and Tian Shan mountains of Central Asia. Being stranded without shelter or fuel can mean starvation or even death. Wealthy people support the poor; a system that the Marxist Soviet Union and China described as feudal stratification and exploitation, but in fact it keeps society, culture and traditions intact. I, a stranger, felt welcomed at every door. The Kyrgyz invited me to stay, drink tea or just chat with them. In places without phone or Internet connection, this is how news about the world spreads.
http://underscoremagazine.com/the-kyrgyz-tajik-pamir/
Multiply the amount of stones by the conversion factor to get the result in pounds: 2398 st × 14 = 33572 lbs How to convert 2398 stones to pounds? The conversion factor from stones to pounds is 14, which means that 1 stones is equal to 14 pounds: 1 st = 14 lbs To convert 2398 stones into pounds we have to multiply 2398 by the conversion factor in order to get the amount from stones to pounds. We can also form a proportion to calculate the result: 1 st → 14 lbs 2398 st → m(lbs) Solve the above proportion to obtain the mass m in pounds: m(lbs) = 2398 st × 14 lbs m(lbs) = 33572 lbs The final result is: 2398 st → 33572 lbs We conclude that 2398 stones is equivalent to 33572 pounds: 2398 stones = 33572 pounds Result approximation For practical purposes we can round our final result to an approximate numerical value. In this case two thousand three hundred ninety-eight stones is approximately thirty-three thousand five hundred seventy-two pounds: 2398 stones ≅ 33572 pounds Conversion table For quick reference purposes, below is the stones to pounds conversion table: |stones (st)||pounds (lbs)| |2399 stones||33586 pounds| |2400 stones||33600 pounds| |2401 stones||33614 pounds| |2402 stones||33628 pounds| |2403 stones||33642 pounds| |2404 stones||33656 pounds| |2405 stones||33670 pounds| |2406 stones||33684 pounds| |2407 stones||33698 pounds| |2408 stones||33712 pounds| Units definitions The units involved in this conversion are stones and pounds. This is how they are defined: Stones The stone or stone weight (abbreviation: st.) is an English and imperial unit of mass now equal to 14 pounds (6.35029318 kg). England and other Germanic-speaking countries of northern Europe formerly used various standardised "stones" for trade, with their values ranging from about 5 to 40 local pounds (roughly 3 to 15 kg) depending on the location and objects weighed. The United Kingdom's imperial system adopted the wool stone of 14 pounds in 1835. With the advent of metrication, Europe's various "stones" were superseded by or adapted to the kilogram from the mid-19th century on. The stone continues in customary use in Britain and Ireland used for measuring body weight, but was prohibited for commercial use in the UK by the Weights and Measures Act of 1985. Pounds The pound or pound-mass is a unit of mass used in the imperial, United States customary and other systems of measurement. A number of different definitions have been used; the most common today is the international avoirdupois pound, which is legally defined as exactly 0.45359237 kilograms, and which is divided into 16 avoirdupois ounces. The international standard symbol for the avoirdupois pound is lb; an alternative symbol is lbm (for most pound definitions), # (chiefly in the U.S.), and ℔ or ″̶ (specifically for the apothecaries' pound). The unit is descended from the Roman libra (hence the abbreviation "lb"). The English word pound is cognate with, among others, German Pfund, Dutch pond, and Swedish pund. All ultimately derive from a borrowing into Proto-Germanic of the Latin expression lībra pondō ("a pound by weight"), in which the word pondō is the ablative case of the Latin noun pondus ("weight"). Usage of the unqualified term pound reflects the historical conflation of mass and weight.
https://stonespounds.com/2398-stones-to-pounds
Lily Cornell Silver, daughter of Soundgarden singer Chris Cornell and the group’s former manager Susan Silver, launches her IGTV series “Mind Wide Open” today (July 20) in honor of her late father’s 56th birthday. According to the announcement, the mission of “Mind Wide Open” is to help destigmatize the conversations around mental health. For the premiere episode, Lily talks with Laura van Dernoot Lipsky, a trauma expert/ author and founder and director of the Trauma Stewardship Institute. “I am launching Mind Wide Open in honor of my late father on his birthday,” Lily tells Variety. “He was a gifted artist who taught me a lot about passion and drive. My mom, Susan Silver, instilled me with confidence and taught me to use whatever gifts and voice I have to help others. I hope that this series encourages people to both look inward and reach outward for resources; I believe that destigmatizing and equalizing mental health will help us to understand each other with more compassion.” Guests in the series will include experts in mental health, emotional intelligence, psychology and wellness, public figures from music, pop culture, and entertainment as well as Lily’s peers who are willing to share their own stories. The second episode, airing on July 27, 2020, will feature Dr. Marc Brackett of the Yale Center for Emotional Intelligence and the author of the bestselling book on Social/Emotional Intelligence, Permission to Feel. More guests will be announced in the coming weeks. Lily, a 20-year-old junior in college studying media studies, sociology and psychology, is creator and host of the series. She also manages and promotes Seattle musicians and is an activist and avid supporter of social justice initiatives including organizations such as Black Lives Matter, NAACP, Equal Justice Initiative, Everytown for Gun Safety, and Planned Parenthood among many others. Watch the show here:
https://variety.com/2020/digital/news/chris-cornell-daughter-lily-instagram-show-mental-health-1234711168/
Tags: Essay You Can BuyScientific Research Paper TemplateNon Dissertation PhdEssay Human Leibniz New UnderstandingWorking Mother Vs Stay At Home Mother EssayThesis Atatement His method of questioning is now known as "Socratic questioning" and is the best known critical thinking teaching strategy.In his mode of questioning, Socrates highlighted the need for thinking for clarity and logical consistency. rationality, rational thinking, reasoning, knowledge, intelligence and also a moral component such as reflective thinking. Critical thinkers therefore need to have reached a level of maturity in their development, possess a certain attitude as well as a set of taught skills. Glaser proposed that the ability to think critically involves three elements: Educational programs aimed at developing critical thinking in children and adult learners, individually or in group problem solving and decision making contexts, continue to address these same three central elements. Critical thinking employs not only logic but broad intellectual criteria such as clarity, credibility, accuracy, precision, relevance, depth, breadth, significance, and fairness. The habits of mind that characterize a person strongly disposed toward critical thinking include a desire to follow reason and evidence wherever they may lead, a systematic approach to problem solving, inquisitiveness, even-handedness, and confidence in reasoning. "A logistic approach to critical thinking conveys the message to students that thinking is legitimate only when it conforms to the procedures of informal (and, to a lesser extent, formal) logic and that the good thinker necessarily aims for styles of examination and appraisal that are analytical, abstract, universal, and objective." As the ‘second wave’ took hold, scholars began to take a more inclusive view of what constituted as critical thinking. Rationality and logic are still widely accepted in many circles as the primary examples of critical thinking. Walters (Re-thinking Reason, 1994) argues that rationality demands more than just logical or traditional methods of problem solving and analysis or what he calls the "calculus of justification" but also considers "cognitive acts such as imagination, conceptual creativity, intuition and insight" (p. These "functions" are focused on discovery, on more abstract processes instead of linear, rules-based approaches to problem-solving. Aristotle and subsequent Greek skeptics refined Socrates' teachings, using systematic thinking and asking questions to ascertain the true nature of reality beyond the way things appear from a glance. The "first wave" of critical thinking is often referred to as a 'critical analysis' that is clear, rational thinking involving critique. During the process of critical thinking, ideas should be reasoned, well thought out, and judged. Socrates set the agenda for the tradition of critical thinking, namely, to reflectively question common beliefs and explanations, carefully distinguishing beliefs that are reasonable and logical from those that—however appealing to our native egocentrism, however much they serve our vested interests, however comfortable or comforting they may be—lack adequate evidence or rational foundation to warrant belief. defines critical thinking as the "intellectually disciplined process of actively and skillfully conceptualizing, applying, analyzing, synthesizing, or evaluating information gathered from, or generated by, observation, experience, reflection, reasoning, or communication, as a guide to belief and action." In the term critical thinking, the word critical, (Grk. He established the method of questioning beliefs, closely inspecting assumptions and relying on evidence and sound rationale. Plato recorded Socrates' teachings and carried on the tradition of critical thinking. Beyer (1995), critical thinking means making clear, reasoned judgments.
https://new-history.ru/creative-critical-thinking-3501.html
NEW MOON IN CANCER 2020 Today, July 19, 2020, the Cancer sun meets the Cancer moon. Today is this year’s second new moon in Cancer. The new moon is a time for resting, rejuvenating and conjuring up our deepest desires. The new moon is the highlighted time of the lunar cycle for us to journal about our wishes hopes and dreams. Along with the waxing (getting bigger) of the moon, our intentions grow. By taking time today to write our intentions, we can solidify them and send their words into the universe. This new moon is the second of this year in the sign of Cancer. If we look back to last month’s new moon, we will be reminded of its difficulty due to its solar eclipse. Though eclipses are certainly magnificent, they bring along with them many in-depth focuses inward, much self examination and spiritual unrest. Thankfully, this new moon in Cancer is in absence of an eclipse and is free to be as usually light-hearted as she wants. With both the sun and moon in the watery sign of cancer, we have an opportunity to delve into our emotional bodies and seek out what may be out of alignment with our new moon intentions. As in astrology, dream work and traditional Chinese medicine and many other philosophies, water represents emotion. As the law of attraction goes, in order for us to see our intentions and manifestations come to fruition, we must engage in actions, thoughts, beliefs and feelings that support them. This means that if we wish for our hopes and dreams to come true, we must ensure that our emotional and mental focuses are in alignment with them. This means going deep into our emotional bodies and uncovering where we can eradicate any extra and unnecessary emotion. The emotional imprints of our past experiences that still linger within us may not be serving our highest purpose, for example. Any emotions to which we are still attached from our childhood memories, adolescent and teenage years that continue to bring us into an emotional tailspin can be released easily at this time. This is not to say that the process by which they are released is easy, however it is such that we will be more easily able to recognize these unhealthy and limiting patterns that hold us back. Cancer, the water sign, is all about nurturing. Ideally, the nurturing element of the sign would be distributed evenly between us and those we love. However, true to form, most Cancer people are far more intent on nurturing others than nurturing themselves. They will often do this to fault. During this lunar period, we will tend to want to nurture everyone but ourselves. However we may find this task to be particularly difficult. We may find at this time that these tasks can become quite physically exhausting; So much so that we may want to sleep the days away. That said, our desire for sleep is actually only a beckoning from deep within our souls to nurture ourselves. We will find that should we pay attention to our soul’s message of self-nurturing, that our desire to sleep will dissipate and that we will be full of life once again. To the contrary of the warm and soothing nature of the sun and moon in Cancer, our moon is in opposition of the planet Saturn which stands for structure and function. Saturn can feel quite oppressive to those with a free spirited nature. For free spirits, remaining grounded can be complicated. However, there is a message here; when Saturn is prominent in the planetary alignment, there must be focus placed on building life’s next chapter from the ground up. As Saturn stands for structure, we may be uncomfortable working within certain frameworks, such as travel restrictions or other current oppressive-feeling structures. Our task is to accept that these “rules” are out of our hands. Our task is to find peace within these limited conditions, believing in our hearts that they will soon pass. Because the moon is in opposition to Saturn (as opposed to the sun), we can expect to be thwarted by our shadow sides when it comes to structure and function. The moon, representing our subconscious, will illuminate the hidden aspects of our consciousnesses that take issue with authority. As stated above, Saturn stands for structure and function. And because it is opposed to the moon, we will begin to take note of how our subconscious reacts to authority. As we take note of our reaction to this element of our consciousness, we will be able to allow this energy to awaken within us fully in order for it to be released. This experience will almost assuredly require patience and discipline on our end as releasing any old energy that has been latent within us for years can be quite challenging and exhausting. As challenging as these astrological alignments may be to our spiritual growth process, we can be sure that we will likely have a restful sleep. With all of the eclipses and retrogrades of the past few months, many of us have had issue with falling asleep and staying asleep. Rest assured. This lunar influence is a time to sigh relief, if even for a few days. TO SCHEDULE YOUR MEDIUMSHIP, ANIMAL COMMUNICATION OR REIKI SESSION, EMAIL: [email protected].
https://soulsticespirit.com/2020/07/19/todays-powerful-new-moon-a-hard-days-night/
What a joy to be eating fresh local produce well into December! Check out the offerings from our featured vendor, PIONEER VALLEY FROZEN VEGETABLES, below. They can fill the gap for items like Broccoli and Peppers this winter until they appear in our fields again next summer. This past summer and fall, the Franklin County CDC has been taking in produce from local farms, then lightly processing and freezing it in our Greenfield, MA facility. We have amassed a supply of frozen chopped broccoli, chopped green bell peppers, coined carrots and diced parsnips, all of which are available for purchase. Essentially, our aim is to extend the season during which locally grown produce is available for consumption. Our frozen produce is vacuum-packed in 5 pound bags, with 4 bags to a case. (See attached photos) We put labels on each 20 pound box that indicate the name and location of the farm that grew the vegetables as well as the processing date, which is usually within 24 hours of harvest. We also provide photographs and information about the farmers—materials for school dining services to showcase the local food system and the origin of the food they are serving.
https://harvesttomarket.com/farmers-market/newsletter/view_newsletter.php?market_link=Food-Connects&newsletter_id=572
In the town of Newburgh, New York, which lies along the Hudson River about 60 miles north of Manhattan, there is a cooperative community of youth involved in an organization called Our Core. Our Core has varied educational opportunities for the local youth, including everything from agricultural to scholarship opportunities, but they are all focused on addressing the systems of injustice in Newburgh by helping students. Our Core has a rich history that starts in 2004 with a teacher named Christine Hutchinson and her idea for a program called Girls to Ladies—“a character and life-skill development group for teen girls in which members learn and grow through collaborative problem solving and community service,” according to Our Core’s website. I was able to speak with Christine, now Executive Director of Our Core, in November after The Farmlink Project began an extended partnership with the organization in October. According to Claudia Sandell, one of the leaders of The Farmlink Project’s Farms Team, “[Our Core] set up contracts with local farmers for weekly produce deliveries until December 15th and we're going to help them cover the cost of the produce and transportation...spanning over about eight weeks.” The deliveries consist of roughly 10,340 pounds of mixed fresh produce including squash, carrots, potatoes, sweet potatoes, radish, onions, greens, and apples. Though these deliveries seem similar to other deliveries we do on a weekly basis, Our Core is a distinct nonprofit in that unlike many other food access organizations we partner with, its primary goal does not revolve around solving food insecurity. I enjoyed learning about Our Core’s initiatives and programs while talking to Christine, as well as their transition to putting an emphasis on helping feed families in their community during the pandemic. Our Core officially became a nonprofit organization in 2017, according to Christine. Three main programs comprise Our Core: Girls to Ladies, AgriCultural Education, and Funding Academics. Christine noted that AgriCultural Education is the “fastest growing, most visible program.” This program includes an opportunity to complete a paid summer internship—an opportunity established three years ago. The home base for this internship program is the Downing Park Urban Farm (DPUF) in Newburgh. Though Our Core had to reduce the number of interns this past season to maintain social distancing, they worked for a longer time period—from May until late-October/early-November—making them instrumental in growing 4,500 pounds of produce under the direction of the DPUF farmer, Molly Foley. There are three different “tracks” that make up this internship program, according to Christine and Our Core’s website: Marketing, Growing, and Education. The marketing and education interns complete much of their internship running a farmers market, and the education interns work with Land to Learn, taking what they learn at the farm to teach elementary-aged children. Our Core also has also worked with the local high school to establish an urban agriculture course, and Christine said that they are working to “create a college-level course for the spring.” These programs all existed before COVID-19, but a new one has emerged this year to address the new hunger challenges the community is currently facing. According to Christine, this new push is called Our Core’s “COVID response food access initiative.” She described how there was a USDA program paying farmers to provide food boxes for communities in need, but that “nobody was sending boxes to Newburgh.” Being the action-oriented educator that she is, Christine wanted to help solve this problem and made it possible for Our Core to be funded to distribute food. Specifically, this funding came from Glynfood’s Food Sovereignty Fund, which Christine described as “money given to organizations like Our Core…so they can connect farms to feeding programs”—just like The Farmlink Project, except more local and community-based! This is an ongoing initiative, and she has been able to include students in multiple steps of the process, including “sorting and packaging produce, and choosing appropriate produce for their communities,” according to Christine. Our Core has been partnering with five “feeding programs,” including a local group called M’Vore Cares, and has helped serve homeless residents in Newburgh. They have also been partnering with multiple farms in the area: Farm Fresh Caribbean Growers in New Paltz, Second Wind CSA in Gardiner, Farm Tournant in Montgomery, Grandpa Farm at the Chester Agriculture Center, and Trinity Farms in Milton. By working with Our Core, The Farmlink Project is also directly supporting these farms and food access groups. Christine described the extensive challenges that Newburgh has faced during the pandemic. There was a reduction in volunteers, more produce had to be donated rather than sold, and Christine said that “a lot more of the food went directly into the kids’ neighborhoods.” She also explained that the AgriCultural Education program shifted to focus on “production” with the “goal of feeding the community,” and said that students were “at the farm all the time.” Still, she wanted to make sure that it was an educational experience for the students involved and that they were paid for their hard work. I cannot believe how dedicated and determined Christine is to make a positive impact on student’s lives and the community around her. Her description of the impact the Girls to Ladies program has had stood out to me. Christine told me that since 2004, around 200 girls have participated in this program. She told me how there has been a “longevity in successes” and that the program has “come full circle” as a woman who participated in the program recently joined the board and will take over the Girls to Ladies program. Christine also emphasized why agricultural education is central to Our Core’s mission: “[The students] are disconnected from the food. [This program enables them to] grow from seed to harvest. They want to come into the growing space and have a strong desire to be there.” She recounted how one of the student interns had just recently texted her to ask if she could go over to the farm where she had been working. I could tell how passionate Christine is about making Our Core such a positive force in the community. She told me how her dream is to “have their own growing space, office space, and greenhouse space.” I was also amazed by how many different tasks Christine is able to accomplish: “I’m on the ground with students with my hands in the dirt for the agriculture program....I’m also working with leadership and directors...[and] with a garden educator...I like to have my hands in everything.” Christine, as an inventive leader of a unique and important nonprofit organization, serves as a role model for The Farmlink Project. She pushes the boundaries of what one organized group can accomplish and do to help those around them. To learn more about Our Core, please visit their website.
https://www.farmlinkproject.org/christine-hutchinson
When giving a LEL expression, it is important to keep an eye on performance issues. LEL itself will do some optimization: - As said in the introduction a LEL expression is evaluated in chunks. However, a scalar subexpression is executed only once when getting the first chunk. E.g. in lat1 + mean(lat2)the subexpression mean(lat2) is executed only once and not over and over again when the user gets chunks. - Often the exponent 2 is used in the pow function (or operator ^). This is optimized by using multiplication instead of using the system pow function. - When LEL finds a masked-off scalar in a subexpression, it does not evaluate the other operand. Instead it sets the result immediately to a masked-off scalar. Exceptions are the operators AND and OR and function iif, because their masks depend on the operand values. The user can optimize by specifying the expression carefully. - It is strongly recommended to combine scalars into a subexpression to avoid unnecessary scalar-lattice operations. E.g. 2 * lat1 * pi()should be written as lat1 * (2 * pi()) #or 2 * pi() * lat1because in that way the scalars form a scalar subexpression which is calculated only once. Note that the subexpression parentheses are needed in the first case, because multiplications are done from left to right. In the future LEL will be optimized to shuffle the operands when possible and needed. - It is important to be careful with the automatic data type promotion of single precision lattices. Several scalar functions (e.g. pi) produce a double precision value, so using pi with a single precision lattice causes the lattice to be promoted to double precision. If accuracy allows it, it is much better to convert pi to single precision. E.g. assume lat1 and lat2 are single precision lattices. atan2(lat1,lat2) + pi()/2The result of atan2 is single precision, because both operands are single precision. However, pi is double precision, so the result of atan2 is promoted to double precision to make the addition possible. Specifying the expression as: atan2(lat1,lat2) + float(pi())/2avoids that (expensive) data type promotion. - POW(LAT,2) or LAT ^2 is faster than LAT*LAT, because it accesses lattice LAT only once. - SQRT(LAT) is faster than LAT ^0.5 or POW(LAT,0.5) - POW(U,2) + POW(V,2) < 1000 ^2 is considerably faster than SQRT(SQUARE(U) + SQUARE(V)) < 1000, because it avoids the SQRT function. - LEL can be used with disk-based lattices and/or memory-based lattices. When used with memory-based lattices it is better to make subexpressions the first operand in another subexpression or a function. E.g. lat1*lat2 + lat3 is better than lat3 + lat1*lat2 The reason is that in the first case no copy needs to be made of the lattice data which already reside in memory. All LEL operators and functions try to reference the data of their latter operands instead of making a copy. In general this optimization does not apply to LEL expression. However, when using the true C++ interface to classes like LatticeExprNode, one can easily use memory-based lattices. In that case it can be advantageous to pay attention to this optimization.
https://casa.nrao.edu/casadocs/casa-5.4.0/image-analysis/lel-optimization
This is a simple audio-frequency (AF) amplifier using the popular audio amplifier IC TDA2003. The IC comes in a 5-pin TO-220B package. Audio amplifier circuit and working Fig. 1 shows the circuit diagram of the 3W/6W AF amplifier built around IC TDA2003 (IC1), an 8-ohm, 6-watt speaker (LS1) and a few other components. The amplifier IC delivers 3W output power using a 6V, 500mA power supply, and 6W output power using a 12V, 500mA power supply, with an 8-ohm, 6-watt speaker. Pin 1 of TDA2003 is the input terminal, which is connected to ground through a 100-kilo-ohm resistor. The audio frequency (or audio signal) is fed to pin 1 of IC1 through the combination of a 10-kilo-ohm potmeter (VR1) and capacitors C1 and C2. Potmeter VR1 is used as volume control. Pin 3 of IC1 is connected to ground. Pin 4 is the output terminal, which is connected to one terminal of the speaker through a 470µF, 16V capacitor (C5). It is also connected to ground through a 0.1µF capacitor (C4) and a 1-ohm resistor (R4). Pin 5 of IC1 is connected to +6V power supply via switch S1. Power supply can be provided through a 6V battery or a 6V DC adaptor. Use of a suitable heatsink is recommended for IC1. Construction and testing An actual-size, single-side PCB for 3W/6W audio amplifier using TDA2003 is shown in Fig. 2 and its components layout in Fig. 3. After assembling the circuit on the PCB, enclose it in a suitable box. Solder TDA2003 and other components using a 25W soldering iron. Use a 2-pin connector for input and output connectors, to make your prototype safe and clean. For testing the circuit, connect a 6V battery to the circuit. Also, connect an 8-ohm, 6-watt speaker to LS1. Download PCB and Component Layout PDFs: click here If a 12V DC supply is used, voltage ratings of C1, C3 and C5 should be 25V or above. Take a metal screwdriver and gently touch at input pin 1 of IC1. If your circuit is wired properly, you will hear a humming sound from the speaker. Else, vary potmeter VR1 to increase the volume until humming sound is heard from the speaker. Now your circuit is ready to use.
https://www.electronicsforu.com/electronics-projects/3w6w-audio-amplifier-using-tda2003
Though Pinochle is a trick-taking game, melds – specific combinations of cards – play a role here. In this lesson, we take a close look at the way this element fits into the game and which melds there are in Pinochle. As this lesson is a bit longer, you can jump to the individual topics here: - What Purpose do Melds Serve in Pinochle? - Influence on Bidding - When Melding is Worthwhile - When You Can Skip it - Which Melds Apply in Pinochle? - When are You Melding? - How to Meld You might have noticed that melding is only the fourth step of the game, according to our first Pinochle Lesson. We dedicate the second lesson to it anyway. You already need to keep it in mind and plan it during bidding – step no. 2 of the game: You need to assess which melds are available to you since melds yield potential points that you have to consider while bidding. 1. What Purpose do Melds Serve in Pinochle? Melds are specific combinations of cards. Before presenting you with a detailed list of all melds, we clarify the Why of it: At the base, melds simply enrich your score. To receive the points for the combinations in your hand, you need to meld them. That means showing your fellow players the cards you want to meld. After that, you put the cards back in your hand. However, your meld points will only count at the end if at least one trick makes it to you or your team in that round. 2. Consider Melding During Bidding As long as your hand cards are not unbelievably bad, you should trust yourself to take at least one trick. That means you can include the points you would reach by melding while you are bidding. Depending on the melds in your hand, you might even be able to bid quite high. We will get to the exact scores of each meld further below in this lesson. And bidding is the topic of our next Pinochle Lesson. Short and sweet: The player winning the bidding determines the game mode. That means determining the trump suit, which can raise the points for a few melds again. If you were in the position to determine the trump suit, you would choose the game mode with the greatest chance for success with your hand cards. 3. When Melding is Worthwhile So, if you have powerful cards or many cards of one suit, it can be worth taking control of the game. The points for melds are your key to avoid overbidding. You also need to consider that you are disclosing part of your hand cards to your fellow players. It is up to you to do that or not. But cards you do not meld do not yield points. 4. When You Can Skip it If the prospects of winning any tricks with your cards are meager, you can skip melding. Otherwise, your fellow players gain knowledge of your hand cards without you gaining any points. That is why you should assess during bidding which melds you could bring to the table, even though melding follows only after bidding. And to do so, you need to know your way around melds. 5. Which Melds Apply in Pinochle? Pinochle knows seven types of melds that are split into three groups. You can use the same card for multiple melds, as long as the melds belong to different groups. In American Pinochle, three more meld types enter the game. But here, we take a look at the melds featured in the basic games at the Pinochle Palace. Group 1: Sets Sets feature the same rank in multiple suits. Here is a little reminder: Traditionally, the ranks in descending order in Pinochle are Ace, Ten, King, Queen, and Jack. The suits are Clubs, Spades, Hearts, and Diamonds. If you select a German-suited deck at the Pinochle Palace, you will find the fitting explanations in the game help. Four of a Kind Four cards of the same rank in each suit must come together here. The Tens – and, if applicable, the Nines or Sevens – are exempt. The different ranks yield different scores from 40 to 100. Eight of a Kind All cards of the same rank, so, two in each suit, must come together here. Eight of a Kind always score 1,000 points. Group 2: Sequences Sequences feature subsequent ranks of the same suit. Marriage The Marriage consists of King and Queen of the same suit. It scores 20 points in any suit, but 40 points in the trump suit. Run The Run consists of five subsequent cards from Jack to Ace of the same suit. It scores 100 points in any suit, but 150 points in the trump suit. Double Run The Double Run consists of five subsequent cards from Jack to Ace of the same suit times two and always scores 1,500 points. Group 3: Special Melds These melds are neither sets nor sequences and, thus, they are something special. Diss The Diss only appears when you are playing with a bigger deck. In some play groups, the Sevens are replaced with Nines. In both cases, you can meld the lowest trump card for ten points. Pinochle The Pinochle always features the Queen of Spades and Jack of Diamonds. This combination scores 40 points. Double Pinochle The Double Pinochle always features both Queens of Spades and both Jacks of Diamonds. This combination scores 300 points. Melds in American Pinochle Pinochle likely traveled from Europe to the USA with emigrants. There, it developed separately, as you can read in our Pinochle history. That is why German Pinochle – usually referred to as Binokel – and American Pinochle have multiple differences. Among others, there are additional Melds in Group 2: Sequences. They only count in the trump suit and extend Runs with one additional Queen, King, or Marriage. Our custom rule American covers these additional melds and other characteristics. We are already planning a lesson explaining all differences between the German and American Pinochle games. 6. When are You Melding? As we discussed in the previous lesson, you are first of all dealing the cards to the players and the kitty. Bidding is next, and the player winning the bidding declares the game and picks up the kitty. Now, everybody knows exactly what their own hand cards are worth and how promising they are. Thus, melding can start now Usually, melding is worthwhile unless you have a completely forlorn hand. After all, any meld deals additional points as long as you manage to gain one trick for yourself or your team, respectively. Melding Instead of Overbidding After winning the bidding and becoming declarer, you might even be pressed to meld in order to reach your bid value. You can gain at most 240 points by trick-taking and turn them into 250 points: The player taking the last trick gets ten bonus points, after all. To fulfill a bid value above 250, you will need points from melds. Otherwise, you are losing the game, getting penalty points equal to your double bid value. If you realize that you cannot win the game, even with the meld points, you still have the chance to forfeit your hand. That will still yield negative points, but fewer than losing the game would. You have to announce forfeiting before declaring the trump suit, though. After all players, starting with the declarer, melded counter-clockwise, the actual gameplay – the trick-taking begins. 7. How to Meld At the game table at home or elsewhere, all players reveal the card combinations they each want to meld in front of themselves on the table. The declarer begins, meaning the person that won the bidding. And then it goes around counter-clockwise. During melding, all melded cards remain on the table until all players melded. An appointed writer notes the meld points per player or team. After that, everybody picks their cards back up, and trick-taking ensues. At our Pinochle Palace, the same process applies, but the melding is solved via displays. Everybody sees their own hand cards, of course. During melding, you will all see a display of potential melds, one by one. This ensures nobody misses any opportunities or forgets to abide by the meld rules on accident. After a player’s selection, all fellow players see a display of the selected melds. When it is your turn, you can choose if and which potential melds you want to meld. After all players selected their melds, trick-taking begins. Congratulations! You made it to the end of this very thorough lesson! Now you can take on the next round of Pinochle well-informed. If you would like to learn more before doing so, you can take a look at our summarizing Pinochle manual or browse the list of lessons.
https://www.pinochle-palace.com/lesson-2-melds-in-pinochle/
Category: Taishan. World Heritage Site #437 :: Mount Taishan |WHS#437 | Taishan | Tourist Map | Travel Guide | Photo & Video | News Update| The sacred Mount Tai (‘shan’ means ‘mountain’) was the object of an imperial cult for nearly 2,000 years, and the artistic masterpieces found there are in perfect harmony with the natural landscape. It has always been a source of inspiration for Chinese artists and scholars and symbolizes ancient Chinese civilizations and beliefs. State property: China Location: Spanning the cities of Tai’an and Jinan in central Shandong Province with the main peak in the city of Tai’an GPS: N36 16 0.012, E117 5 60 Date of Inscription: 1987 Criteria: (i)(ii)(iii)(iv)(v)(vi)(vii) Property : 25,000 ha Local Weather Mount Taishan was listed in the world heritage list based on these below justifications. Criterion (i): The landscape of Mount Taishan as one of the five sacred mountains in traditional China is a unique artistic achievement. The eleven gates, the fourteen archways, the fourteen kiosks and the four pavilions, which are scattered along the flight of 6,660 steps that rise between heaven and earth are not just simple architectural achievements, but are the final touches by human hands to the elements of a splendid natural site. Its very size places this scenic landscape, which has evolved over a period of 2,000 years, among the most grandiose human achievements of all time. Criterion (ii): Mount Taishan, the most venerated of mountains in China, exerted for 2,000 years multiple and wide-ranging influence on the development of art. The Temple to the God of Taishan and the Azure Cloud Temple, dedicated to his daughter, the Goddess Laomu, were prototypes built on Mount Taishan and subsequently used as models during the imperial period, throughout all of China. The conceptual model of a mountain bearing the traces of man, where graceful structures – bridges, gateways or pavilions – contrast with sombre pine forests or frightening rocky cliffs, could only have originated by referring to Mount Taishan. Criterion (iii): Mount Taishan bears unique testimony to the lost civilizations of imperial China, most particularly in relation to their religions, arts and letters. For 2,000 years it was one of the principal places of worship where the emperor paid homage to Heaven and Earth in the Fengshan sacrifices, conducted by the Son of Heaven himself. Since the time of the Han Dynasty, it has been one of the five mountains symbolizing the Celestial Kingdom, in accordance with the Doctrine of the Five Elements, a fundamental premise in Chinese thought. Criterion (iv): Mount Taishan is an outstanding example of a sacred mountain. The Palace of Heavenly Blessings (1,008 CE), located inside the Temple to the God of Taishan, is one of the three oldest palaces in China. The Azure Cloud Temple, also constructed under the Song Dynasty, is typical of a mountain architectural complex in the arrangement of its courtyards and buildings, and the Divine Rock Temple with its Thousand Buddhas Hall are outstanding and complete examples of great temples. Together they illustrate the cultural and religious aspects of the Tang and Song periods. Criterion (v): The natural and cultural ensemble of Mount Taishan comprises a traditional human settlement in the form of a cult centre dating from the Neolithic (Dawenkou) period, which has become an outstanding example of traditional culture under the impact of irreversible change wrought by increasing visitation and tourism. Criterion (vi): Mount Taishan is directly and tangibly associated with events whose importance in universal history cannot be minimized. These include the emergence of Confucianism, the unification of China, and the appearance of writing and literature in China. Criterion (vii): With nearly 3 billion years of natural evolution, Mount Taishan was formed through complicated geological and biological processes, which resulted in a gigantic rock mass covered with dense vegetation towering over the surrounding plateau. This dramatic and majestic mountain is an outstanding combination of a beautiful natural landscape dominated by the cultural impacts of thousands of years of human use.
http://www.world-heritage-site.com/unesco-world-heritage/world-heritage-site-437-mount-taishan/
Whisk whole-wheat flour, all-purpose flour, baking powder, cinnamon, baking soda, nutmeg and salt in a large bowl. Whisk eggs, buttermilk, brown sugar, butter, oil and vanilla in another large bowl until well combined. - Make a well in the dry ingredients and stir in the wet ingredients until just combined. Add bananas, walnuts and chocolate chips. Stir just to combine; do not overmix. Transfer the batter to the prepared pan(s). Top with additional walnuts, if desired. - Bake until golden brown and a skewer inserted in the center comes out clean, 22 to 25 minutes for muffins or mini Bundts, 35 minutes for mini loaves, 1 hour 10 minutes for a large loaf. Let cool in the pan(s) for 10 minutes, then turn out onto a wire rack. Let muffins and mini Bundts cool for 5 minutes more, mini loaves for 30 minutes, large loaves for 40 minutes. - Pan options: - 1 large loaf (9-by-5-inch pan) - 3 mini loaves (6-by-3-inch pan, 2-cup capacity) - 6 mini Bundt cakes (6-cup mini Bundt pan, scant 1-cup capacity per cake) - 12 muffins (standard 12-cup, 2 1/2-inch muffin pan) Tips Make Ahead Tip: Store, individually wrapped, at room temperature for up to 2 days or in the freezer for up to 1 month. Ingredient note: Whole-wheat pastry flour, lower in protein than regular whole-wheat flour, has less gluten-forming potential, making it a better choice for tender baked goods. You can find it in the natural-foods section of large supermarkets and natural-foods stores. Store in the freezer. Tips: No buttermilk? You can use buttermilk powder prepared according to package directions. Or make “sour milk”: mix 1 tablespoon lemon juice or vinegar to 1 cup milk. To toast chopped walnuts, place in a small dry skillet and cook over medium-low heat, stirring constantly, until fragrant and lightly browned, 2 to 4 minutes.
http://www.eatingwell.com/recipe/252119/banana-nut-chocolate-chip-quick-bread/
When we think of Indian food, we normally think of sweet-smelling dishes of herbs and flavorings sprinkled, and that thinking is usually right. The Indian methods of cooking and techniques can be traced back to about 5,000 years ago. It was shaped by the land and the products from a specific region; well, there are different best Indian food dishes. Image Source: Google The normal diet consists of meat and they also make use of vegetables and fruits. The use of spices has long been used in Indian cooking. When religions like Hinduism and Buddhism have grown up in India, vegetarianism has become widespread and flourished. In fact, the prohibition of eating beef has become the hallmark of long Hinduism, and this practice will still go on, even to this day. Come to the Middle Ages, spices and tea were introduced in India by traders and travelers. Much later, Indian food was again influenced by the invaders and conquerors from Central Asia and the Afghan region. It was also at this time that the dressings have become a part of Indian cuisine, especially the use of saffron. In the 18th century, when the British came to India to govern the country, a marriage between the two kitchens and two cultures arrived, and it was named the 'Anglo-Indian cuisine'. It was not shocking then to see popular British cuisines like roast beef having an Indian character by making use of local Indian spices like curry and red chili. If there is one point that can be spoken about Indian cuisine is that although many international cuisines have greatly influenced the traditional recipes and methods of Indian cuisine, it has still retained its originality. and authenticity.
https://www.cityofelcenizo.com/indian-cuisine-an-interesting-mix-of-herbs-spices-culture-and-religion/
How should reasonable, but unfavorable, time estimates be handled by a manager? - Reducing the task’s scope to keep a deadline. - Changing the project schedule to allow more time. - Delegating work / increasing team size. - Schedule the task for another time. How can I improve my time estimation? 6 Tips to Estimate Your Time More Effectively. - Use similar past experiences and activities as a guide. … - Appropriately identify time-dependent activities and actions. … - Track your time. … - Make a detailed list of tasks to complete. … - Add in a buffer of time. … - Know how long it takes you to complete a task. Why is time estimation important in project management? Time estimation plays a particularly important role in the process of project planning. It protects against delays that may lead to cost overruns and negative stakeholder perceptions, threatening the very ability to complete a project in the long run. How can you improve the accuracy and reliability of your project schedule? 12 Tips for Increasing Estimating Accuracy - Maintain an ongoing “actual hours” database of the recorded time spent on each aspect of your projects. … - Create and use planning documents, such as specifications and project plans. - Perform a detailed task analysis of the work to be performed. How do I stop underestimating my time? The following six estimation techniques are all designed to help you avoid underestimating when you’re trying to determine how much time a task will take. - Use Historical Data. - Have Someone Else Estimate for You. - Estimate in Ranges, or Build in Time for Delays. - Use Three-Point Estimations. - Calculate Your Fudge Ratio. Why do people underestimate time? We have a habit of underestimating time because it is natural for us to do so. Psychologists labelled this phenomenon “Planning Fallacy” and while it is important to understand how the underlying psychology works, we are not going to discuss that in details here because there is a lot of content out there already. What is the need to estimate time accurately? Why Estimate Time Accurately? Accurate time estimation is a crucial skill in project management. Without it, you won’t know how long your project will take, and you won’t be able to get commitment from the people who need to sign it off. How do you determine what amount of time is reasonable for a task? Tips on better estimating time for tasks - Time your tasks. Spend a week or longer tracking how long it takes to complete everything you do. … - Use a fudge ratio. … - Overestimate your time requirements. … - Check your schedule. … - Use a three-point estimation. … - Get feedback. … - Use time tracking apps. … - Estimate someone else’s time. Why is estimating time and cost so important? Cost estimation helps you achieve what you say you’re going to achieve within the financial constraints you’re given by executives and stakeholders. As one of the defining features of successful progress, accurate project cost estimation must take a front seat when it comes to setting up a project’s parameters. What is time estimation method? Time estimation is the art of accurately ‘guessing’ how long a piece of work will take to be completed – using time estimation techniques can allow you to reduce the guesswork involved in your estimates and let you have more confidence surrounding your time management and the time frame your work can be completed in. How do you overcome planning fallacies? Planning Fallacy — 9 Ways to Overcome it - Take an Outside View. … - Be a Pessimist. … - Resist the Autocracy of the Urgent. … - Make Use of the Pomodoro Technique. … - Declutter of “Time Bullies” … - Break Big Tasks Into Smaller Ones. … - Let Yourself Detach From the Original Plan. … - Consider the Effect of Social Pressure. What is the estimate time? Estimated time to complete is a value that is expressed in hours of work required to complete a task or project. During the initial stages of project planning one of the main objectives is to get a realistic estimation of time to complete. Estimating the time to complete is one component of the project plan.
https://antennamediatorino.eu/en/how-should-reasonable-but-unfavorable-time-estimates-be-handled-by-a-manager/
Do you want to ensure that your child reaches all of their developmental milestones? According to new UBC research, living in places with a high concentration of greenspace can help prepare children for success. Researchers from the University of British Columbia’s faculty of forestry and faculty of medicine assessed the developmental scores of 27,372 children who attended kindergarten in Metro Vancouver between 2005 and 2011. They calculated the amount of greenspace surrounding each child’s residence between the ages of birth and five. Additionally, they analyzed traffic-related air pollution and neighborhood noise levels. The findings emphasize the critical necessity of natural green areas such as street trees, parks, and community gardens, according to the authors. “The majority of youngsters were developing normally in terms of linguistic abilities, cognitive capacity, socialization, and other outcomes,” says research author Ingrid Jarvis (she/her), a PhD candidate in the department of forest and conservation sciences at the University of British Columbia. “However, what’s fascinating is that children who live in residential areas with more vegetation and natural environs demonstrated greater overall development than their classmates who live in areas with less greenspace.” According to the researchers, this is partly due to greenspaces’ ability to mitigate the harmful effects of air pollution and noise – environmental challenges that have been shown to have a negative impact on children’s health and development via increased stress, sleep disturbances, and central nervous system damage. “Few research have examined this link between greenspace and infant development outcomes, and we believe this is the first Canadian study to do so,” Jarvis says. The researchers evaluated early childhood development using the Early Development Instrument (EDI), a questionnaire administered to each child by kindergarten instructors. The instrument assesses a child’s capacity to reach developmental milestones at an acceptable age. “While additional research is needed, our findings imply that increasing greenspace in residential neighborhoods and surrounding schools helps early childhood development and may have long-term health advantages,” says senior author and UBC research associate Matilda van den Bosch (she/her). “While time spent in nature benefits everyone, if we want to give our children the best possible start, it is critical to establish an enriched atmosphere through natural interaction. Access to greenspace at an early age can aid in children’s social, emotional, and mental development.” Story Source:
https://newbodyyou.com/children-who-spend-more-time-in-nature-experience-better-overall-development
The latest Halifax house price index came out on Friday, the day after the election and it appears that the UK property market wasn't overly troubled by pre-election jitters. The key points from the Halifax HPI for April 2015 - House prices increased by 1.6% between March and April. - The average property is now £196,412 - The latest quarterly rate for February-April saw a 2.2% rise on the preceding three months, November - January. Commenting, Martin Ellis, housing economist, said: "House prices in the three months to April were 2.2% higher than in the preceding three months. This measure of the underlying rate of house price growth fell for the first time in 2015 following three successive rises. In contrast, annual house price growth increased slightly, from 8.1% in March to 8.5%. Nonetheless, the annual rate remains in the narrow range of 8-9% where it has been since the start of 2015 and is below last July’s peak of 10.2%. “Housing demand is being supported by a number of factors including economic improvement, rising employment and low mortgage rates. At the same time, supply remains very tight with a general shortage of properties available for sale. This combination has kept house price inflation steady in recent months with prices increasing by 2.2-2.6% on a quarterly basis and at an annual rate of 8-9%.
https://blog.propertyhawk.co.uk/2015/05/halifax-house-price-index-for-april-2015.html
“So now I see that the head covering does apply to us today. But shouldn’t a woman wear the head covering once she is married, and then only during times of prayer and prophecy, as Paul mentions?” The words “man” and “woman” in 1 Corinthians 11 have been translated “husband” and “wife” in many modern translations. The reliable King James Version takes no such liberties to change the words to what they want them to say. And one quick look at context will show which words are the ones intended. That means that if limiting the words to husband and wife is a legitimate understanding of the passage, plugging those terms in would make sense. Let’s try that in verse 12: “For as the [wife] is of the [husband], even so is the [husband] also by the [wife]; but all things of God.” (1 Corinthians 11:12) “By” here is refering to being “born of.” That doesn’t make sense at all – the husband was not born of his wife, or she would be his mother! Clearly Paul is not talking in terms of marriage here. He is talking about general headship of men over women. From what history can tell us, the Corinthians understood Paul to be referring to unmarried women as well as married. This would make sense because the virgin Daughter of Babylon mentioned in Isaiah 47 was unmarried, yet she wore a head covering. It would be more consistent with the rest of Scripture for them to do so. “So to did the Corinthians understand him [Paul] that unmarried girls as well as married women should be veiled. In fact, at this day [the time of this writing] the Corinthians do veil their virgins…I will show in Latin also that it behoves our virgins to be veiled from the time that they have passed the turning point of their age…” The only manuscript we have of the early Church that really takes the time to talk much on the head covering is the work of Tertullian, which I quoted earlier, called “On the Veiling of Virgins.” In it, Tertullian makes the case for veiling unmarried women as well as married. There was a debate surrounding this question in his time, and he strongly argued for the head covering of the unmarried women as well as the married women. “I pray you, be you mother, or sister, or virgin-daughter — let me address you according to the names proper to your years — veil your head: if a mother, for your sons’ sakes; if a sister, for your brethren’s sakes; if a daughter for your fathers’ sakes. All ages are perilled in your person. Put on the panoply of modesty; surround yourself with the stockade of bashfulness; rear a rampart for your sex, which must neither allow your own eyes egress nor ingress to other people’s. Wear the full garb of woman, to preserve the standing of virgin…Walk in accordance with the will of your Espoused. Christ is He who bids the espoused and wives of others veil themselves; (and,) of course, much more His own.” “So unmarried women should cover too. But should younger girls cover their heads even if they have not passed the turning point of their age, as Tertullian says?” There are two main reasons why I believe that younger girls should wear the head covering as well as older girls. The first is that we learned how the head covering is a matter of authority. Now, are daughters only under the authority of their fathers once they are mature in their womanhood? I don’t think so. From the minute a girl is born into her family, she is now subject to the decisions, influence and instructions of her father. He is the one who is in authority over her, and she is under that authority even as a small child. She is obligated to obedience and submission as his daughter under his head, regardless of her age until she is married and the headship has been transferred. The second reason is chiefly for proper training. Implementing practices of proper dress while children are still young makes later transitions unnecessary. As parents, want to do that with other matters that we want to ingrain as important into the lives of our children. That is why we do not dress our younger daughters in miniskirts and shirts with plunging necklines (at least, I hope we don’t!). Though their bodies are not developed, it still sends out the wrong message. We do not want them to get comfortable in such clothing and then have to explain to them why it is wrong later on. We, as women, should prepare to start having our girls practice principles of modesty in their dress as soon as we can in congruence with principles of authority, in my opinion. Quintus Tertullian, “Truth Rather to be Appealed to Rather Than Custom, and Truth Progressive in Its Developments” in On the Veiling of Virgins, trans. Rev. S. Thelwall Ibid.
http://herhighcalling.com/modesty-series/veiling-our-virgins/
TECHNICAL FIELD BACKGROUND BRIEF SUMMARY OF EXEMPLARY EMBODIMENTS OF THE INVENTION DETAILED DESCRIPTION OF EXEMPLARY EMBODIMENTS OF THE INVENTION LIST OF REFERENCE SYMBOLS The invention concerns a method for the connection of a diaphragm to a housing of a pressure or force sensor, wherein a measurement element is mounted in the housing, which element, when the finished sensor is deployed, can register an external load acting on the diaphragm, and wherein a housing ring surface of the housing is located opposite to a diaphragm ring surface of the diaphragm so as to manufacture a connection between these surfaces. Pressure and force sensors are offered in a wide variety of variants. Depending upon the intended fields of deployment for the sensors the latter must be adapted to the respective conditions. Many sensors have a diaphragm that is mounted on the sensor housing and the sensor is tightly sealed by means of this connection. In deployment such diaphragms are, for example, exposed to a pressure chamber. The load generated by the pressure acts on the diaphragm, and as a result of deflection of the latter ultimately causes a signal on a measurement element, which is arranged in the housing behind the diaphragm as viewed in the direction of the pressure. However, as soon as the diaphragm experiences a deflection that cannot be attributed to an external load acting on the latter, but is, for example, generated by thermal stress or by stresses introduced during mounting, an error signal is generated on the measurement element. In particular this can be the case for front-sealing sensors. These are located with the outer part of the front surface on the component and the seal is thereby generated. In order to exclude stresses on the front face diaphragm caused by mounting, shoulder-sealing sensors are specified. In these sensors the whole of the front face of the sensor is exposed to the load, that is to say, to the pressure chamber or the influence of a force. One example of such a sensor is specified in CH 702257. On a common surface with the housing the diaphragm is welded onto the latter. In deployment the load in both cases acts on the central region of the diaphragm, which is deflected by the load, and also, depending upon the design, to a greater or lesser extent on the lateral region of the diaphragm, the outer edge. Behind this lateral edge region of the diaphragm, as viewed in the direction of the pressure or force, the connection between diaphragm and housing is located in such sensor designs. In order to subject the measurement element to a certain preload, this connection is often loaded in tension in the course of its manufacture. In deployment the external load applied to the diaphragm acts counter to this tension and generates, from a certain magnitude of the load, a pressure onto this connection. In CH 394637 a sensor with a preloaded measurement element is described, In U.S. Pat. No. 4,597,151 a pressure sensor is described whose curved diaphragm is welded onto both the central pressure pad and also a lateral supporting wall. In order to avoid asymmetric effects a second weld is applied on the inner edge of the diaphragm support, near to the start of the curvature. When deployed certain sensors are subjected to severe short-term temperature fluctuations, for example, if their front face diaphragms are exposed to the pressure chamber in internal combustion engines. In these circumstances the diaphragm heats up quickly, the heat then flows via the connection from the diaphragm to the housing and ultimately distributes itself via further connections to other members of surrounding components until a temperature equilibrium is produced, or until a next combustion event causes the temperature of the diaphragm to rise once again. The temperature differences between diaphragm and housing lead to errors in the measurements on the measurement element, which can only be monitored with difficulty. The heat flow from the diaphragm into the housing depends significantly on the connection between these components. The better the connection, the more heat that flows. It is problematic, however, if the thermal characteristics and/or the sensitivity of the sensors of the same build are subject to a large scatter. Then it is not possible to estimate, or thus to monitor, the behaviour of a sensor of a build series in the presence of strong temperature fluctuations. In the prior art the connection between diaphragm and housing is achieved by means of welding, in that as a rule a laser weld seam is applied to the common outer edge between housing and diaphragm. The connection depth depends on the respective parameters of the laser equipment; however, this is subject to rapid ageing. This requires these parameters to be constantly checked and readjusted. If the connection depth is too deep and reaches the interior of the housing then the sensor is destroyed as a result of the heat penetration during the welding process. With too low a connection depth the connection is not defined, as a result of which the heat conduction from the diaphragm into the housing is insufficiently well ensured. The object of the present invention is now set as that of specifying a method for the creation of a connection between the diaphragm of the housing of a force or pressure sensor mentioned in the introduction, which leads to a defined characteristic of the sensor in the event of short-term temperature fluctuations. The object is achieved by means of the features of the method described below. Further advantageous methods also are described below. The concept underlying the invention is based on the premise that the connection should have a defined connection depth. Here the connection depth is defined as the whole region from the innermost end of the innermost connection to the outermost end of the outermost connection, independently of whether the connection is continuous or interrupted. This connection depth should be accurately prescribed for all sensors of a build and should be reproducibly maintained. Studies have shown that thermal stresses in the diaphragm and the deflection of the diaphragm significantly affect the sensor characteristics. The thermal stresses and the deflection of the diaphragm ultimately depend upon the connection depth of this connection. Sensors of the same build with the same connection depth for the connection between diaphragm and housing show the same behaviour in the event of exposure of a pressure chamber that is subject to large temperature fluctuations, such as for example the combustion chamber of an internal combustion engine. However if the connection depth alters from sensor to sensor, then the variance of its measured data can massively increase under the same conditions. The inventive method ensures that the connection depth is defined. In accordance with this method a first connection is manufactured in the first instance in an inner region between the housing ring surface and the diaphragm ring surface, until these surfaces abut against one another radially outside of this first connection. Subsequently a second connection is manufactured between the housing ring surface and the diaphragm ring surface; this connects the housing and the diaphragm with one another radially outside of the first connection as far as the common outer edge. In this manner a defined connection depth is maintained for the whole double connection. It has been shown that the reproducibility of the sensors is only ensured if the housing ring surface and the diaphragm ring surface abut against one another without any gaps radially outside of the first connection, before the second connection is manufactured between these surfaces. FIG. 1 1 2 18 1 1 The same reference symbols always denote the same components and circumstances in all figures. shows a section of an inventive sensor mounted in a mounting structure , which is exposed to a pressure chamber P, which for example can be the combustion chamber of an internal combustion engine. The whole end face of the sensor , preferably a pressure sensor , is exposed to an external load, for example to the pressure chamber P, or to a force. FIG. 4 18 7 8 9 8 7 9 10 a Such a sensor is represented schematically in . Here the end face is formed by the diaphragm . It comprises a central pressure pad , a flexible annular region externally adjoining the pressure pad , and also a diaphragm ring externally adjoining this region , which on the side facing away from the pressure has a diaphragm ring surface . 7 4 1 7 5 7 5 5 1 7 4 1 1 Behind this diaphragm is arranged the housing of the sensor , which is securely connected with the diaphragm . In the housing is located a measurement element , which by virtue of the diaphragm deflection records a signal or a measured value, which allows conclusions to be drawn concerning the external load acting on the diaphragm , that is to say, for example, concerning the pressure in the pressure chamber P. The measurement element is preferably a piezoelectric, piezoresistive, or optical measurement element . When the inventive sensor is deployed the connection between diaphragm and housing is also always exposed to the load that is acting from the external side on the diaphragm. The inventive sensor can be configured as a shoulder-sealing or as a front-sealing sensor . 2 3 3 4 1 2 4 The mounting structure can in particular be fitted with cooling passages , such as is, for example, usually the case for the engine blocks of internal combustion engines. These cooling passages are heat sinks, because there the heat can be quickly led away. With a good connection between the housing of the sensor and the mounting structure the temperature of the housing is thus likewise cooled. FIG. 2 7 4 5 7 8 9 10 6 4 1 represents a section of sensor components before their inventive connection; they comprise a diaphragm and a housing , with a measurement element contained within the latter. The diaphragm comprises the centrally arranged pressure pad , which is bounded by the flexible zone . On the side facing away from the direction of the pressure are located in the radially outer region the diaphragm ring, and the diaphragm ring surface , which is located opposite a housing ring surface on the housing . Here the sensor is represented in a very simplified manner in terms of its components, and is limited here to the features that are of significance for the embodiment of the invention. 7 4 1 4 5 7 6 10 13 6 10 6 10 1 FIG. 2 FIG. 3 FIG. 6 The inventive method for connecting a diaphragm to a housing of a pressure or force sensor is described in what follows. A housing with a measurement element and a diaphragm , as represented in , are brought together such that the housing ring surface and the diaphragm ring surface are located opposite one another. A first connection is then manufactured in a radially inner region between the housing ring surface and the diaphragm ring surface , until the said surfaces , abut against one another radially outside of this first connection. shows the half-finished sensor after this first procedure. In the region of this connection is once again represented in the same intermediate state, but magnified. 6 10 11 12 13 7 4 11 13 12 1 1 FIG. 6 The two surfaces, the housing ring surface and the diaphragm ring surface now lie one upon another and form a common outer edge and a common inner edge . On their separation line is located a first connection site , which extends both into the diaphragm and also into the housing , and which is spaced apart from the common outer edge . As shown in , the first connection site is also preferably arranged spaced apart from the common inner edge by a distance “a”. This ensures that the interior of the sensor does not experience excess heat during production of the sensor , if the first connection is a weld. 13 10 6 7 4 After the application of the first connection the diaphragm ring surface and the housing ring surface must abut flat against one another and as free of gaps as possible, because only in this way can it be ensured that the diaphragm is not obliquely attached to the housing , which would lead to incorrect behaviour in later measurements. 13 14 6 10 4 7 11 Following on from the first connection a second connection is manufactured radially outside of the first connection between the housing ring surface and the diaphragm ring surface ; this connects the housing and the diaphragm with one another as far as the common outer edge . FIG. 4 FIGS. 7 FIGS. 4 FIG. 7 FIG. 7 1 14 7 13 14 7 13 14 13 14 13 14 13 14 14 13 a b a b shows the sensor in this finished state after the application of the second weld . and represent two scrap sections of this finished sensor in the region of the connections , , in two different embodiments. In these , the connection depth “d” is specified as the region that includes the two connection regions , . Here it should be noted that the two connection regions , can overlap, as represented in , but that they can also be applied spaced apart from one another with a separation distance “c,” as represented in . In both cases the connection depth “d” is the same since it includes the whole region of the connection sites , , inclusive of any possible separation distance “c” in between. In accordance with the invention a defined connection depth “d” is maintained for the whole double connection , . However it is to be noted that the second connection may not penetrate more deeply inwards than the first connection , since in this case the whole connection depth “d” would alter. 13 13 In accordance with the invention the first connection can be a soldered joint, a brazed joint, a welded joint, a resistance welded joint, a bonded joint, or a thermal compression bonded joint. This method allows a connection to be manufactured without having direct access to the connection. 15 6 10 13 15 16 15 16 15 13 6 10 15 16 4 7 FIG. 2 FIG. 5 FIG. 5 FIG. 2 a a A protrusion is preferably arranged on the housing ring surface , or on the diaphragm ring surface , on which the first connection is executed by resistance welding as an annular protrusion weld. Near such a protrusion at least one depression can preferably be provided in which welded material of the protrusion can collect in the course of the welding process. This is represented in and in , wherein in the depression is arranged opposite the protrusion , whereas in it is arranged alongside in the same component. In this manner it is ensured that after the first connection no superfluous material from the first connection prevents the housing ring surface and the diaphragm ring surface from abutting against each other. The protrusion and depression here described in each case can be configured in any form, in particular they can be round or cornered, and can be introduced into either the housing or the diaphragm . What is represented in each case is only one possible variant, but this should not have any limiting effect on the invention. FIG. 5 b 13 17 16 16 Alternatively, as represented in , the first connection can be executed by resistance welding by means of an insert that is inserted into a depression . Here the depression can be adapted in size such that after the welding process no superfluous material protrudes. 14 The second connection can in particular be a laser welded joint, an electron beam welded joint, a joint welded in accordance with the argon arc method, a tungsten inert gas welded joint (TIG), a protective gas welded joint, or a bonded joint. 11 This connection site is accessible from the exterior and it is therefore non-critical as long as the penetration depth does not go beyond the first connection and thus does not exceed the prescribed value determined for the penetration depth “d.” By this method a series of sensors of the same type can be manufactured, which deliver measured values with a small amount of scatter, if in deployment they are exposed to severely fluctuating temperatures. 1 Sensor, pressure sensor 2 Mounting structure 3 Cooling passage 4 Housing 5 Measurement element 6 Housing ring surface 7 Diaphragm 8 Pressure pad 9 Flexible region 10 Diaphragm ring surface 11 Common outer edge 12 Common inner edge 13 First connection site 14 Second connection site 15 Protrusion 16 Depression 17 Insert 18 End face P Pressure, pressure chamber with specification of the direction of the pressure or force (arrows) “a” Distance from the connection site to the inner common edge “c” Distance between the two connections “d” Connection depth of the connection from the outer edge BRIEF DESCRIPTION OF THE FIGURES The invention is explained in more detail in what follows with reference to the figures. Here: FIG. 1 shows a section of a sensor mounted in a structure, which sensor is exposed to a pressure chamber; FIG. 2 shows a section of sensor components before their connection; FIG. 3 shows a section of a sensor that is in course of preparation after the first connection; FIG. 4 shows a section of a sensor with both connections; FIG. 5 a shows a section of sensor components before their connection in the region of the connection site in an alternative device; FIG. 5 b shows a section of sensor components before their connection in the region of the connection site in another alternative device; FIG. 6 shows a section of a sensor that is in course of preparation after the first connection in the region of the connection site; FIG. 7 a shows a section of a sensor with both connections in the region of the connection site; FIG. 7 b shows a section of a sensor with both connections in the region of the connection site in an alternative embodiment.
The Olympic Games has both a modern and an ancient history. It has also expanded to be separate Winter and Summer Olympics with a Paralympics for disabled people. Events have changed over the era of the modern Olympics and continue to change. The Ancient Olympics ran for over a millenium, finishing in 393 BCE. The modern Olympics began in 1896. Separate Winter and Summer Olympics in different years commenced in 1994. They were previously held in the same year. Australia and Greece are the only countries to have attended all summer games. This page looks at The Ancient Olympics, Winter Olympics, Paralympics, Mascots & Symbols, media and other information including education materials. The First Page looks at The Olympic Movement internationally and in Australia, The Modern Olympics, athletes, drug problems, major incidents, more. This information is left available for use as required and will be fully updated as each Olympic Games approaches. Ancient Olympics This section has information about the original Olympics, on which the modern format has been based. - Ancient Olympic Events ‘You can compare ancient and modern Olympic sports, tour the site of Olympia as it looks today, learn about the context of the Games and the Olympic spirit, or read about the Olympic athletes who were famous in ancient times’. - Ancient Olympic Games Covers origins, legends, history, events, famous athletes and a range of references and links. Wikipedia. - How did The Olympic Games Begin ? From the BBC. Find information, answer selected questions and follow links to related material. - Olympics Through Time ‘The spirit of the Olympic Games. Learn their long history, explore their unknown aspects and discover the society that created them, through a variety of activities’ Also includes a section on the modern Olympics. - New ! The Ancient Olympic Games Virtual Museum ‘Welcome to the Ancient Olympic Games Virtual Museum. Here you will find a plethora of information about the contests that are the forefathers of our modern Olympic Games. In order to use this site, we ask that you register with us and accept our copyright agreement. There is no charge for using this site; however, you have to agree not to redistribute all or part of this site’. - The Origin of the Olympics A text based research article that explains some of the mythology and calendar information related to the games. - New ! The True Story of the Ancient Olympic Games ‘Politics, nationalism, commercialism and athletics are often associated with the Modern Olympic Games, but these themes are as old as the games themselves. Explore the climate and circumstances surrounding the ancient Olympic Games’. - The Real Story of … [The Ancient Olympic Games] ‘It’s easy to assume that the ancient Olympic Games were different, that ancient Greek athletes were pure in mind and body, that they trained and competed for no other reason than the love of physical exercise, fair competition and to honour their gods. But is this really true ? Well, no. In fact, politics, nationalism, commercialism and athletics were intimately related in the ancient Olympic Games’. Paralympics & Paralympians The Olympics for those with disabilities. For scandals, see the previous page. Some paralympians are included in the list of Athletes on the previous page. - Paris 2024 Paralympic Games 28 August - 8 September 2024. This site already has a diverse range of information about the Games. Monitor the link to keep up to date with all the decisions, events and people who will be involved. Other links will be added as these become active. - A Brief History of the Paralympic Games ‘From post-WWII rehabilitation to mega sport event’. - Australian Centre for Paralympic Studies Oral History Project National Library of Australia. ‘In 2010 the APC, signed an agreement with the National Library of Australia to record the oral histories of a number of the people who were responsible for the growth and success of Paralympic sport in Australia. This oral history project will underpin a broader Australian Centre for Paralympic Studies project to capture and preserve the history of Paralympic sport’. - Australian Paralympic Committee Information about the games, Australian Paralympic athletes, sports, news, programs, supporting their efforts and more. - Anti-Doping Policy The Paralympic Anti-Doping stance. Covers WADA and Sport Integrity Australia Anti-Doping Codes and their own policy. - Community Sections covering News, Programs and AUS Adapts. - Events Listing of future events. Information about the Paris Games and also information about the Tokyo [2020/1] and Beijing games. - Latest News News items about multiple aspects from organisational matters to individual athletes. - Meet our Athletes ‘Extraordinary stories from inspiring individuals. Everyone has a story to tell. This is your chance to meet your paralympians and find out what drives them to keep on achieving their dreams’. - Updated ! Paralympics Education Program ‘The Australian Paralympic Education Program is providing free curriculum-linked resources for Australian school students along with ideas to support the Australian Paralympic Team at the Summer and Winter Paralympic Games’. - Sport ‘Paralympic Sports; Get Involved; Classification; Para-sport Equipment Fund; Para-sport Coaching; Sports Medicine’. - List of Australian Paralympic Medallists ‘This list includes Summer and Winter Australian Paralympic Medallists’. List only goes till 2014 Games. Wikipedia. - International Paralympic Committee Information on the games, sports, athletes, rules, classification, education, development, Hall of Fame and more. - Blogs Read blogs from paralympians from around the world. Includes some videos. - Classification How athletes are classified and information about their groupings. - Hall of Fame ‘The Paralympic Hall of Fame will ensure that a permanent record and institutional memory is kept of top Paralympic athletes and coaches of all time’. - Paralympic Games Information on Beijing, Vancouver, London and Sochi Games, past games, applicant cities for 2016 and principles behind the games. - Paralympic Games Education Programs - Paralympic School Day PG Education, other programs and resources. - Sports Covers sports, organisers, rules, regulations, rankings, records, results and competitions. - Lists of Paralympic Medallists ‘This article includes lists of all Paralympic medallists since 1960 through to 2022, organised by each Paralympic sport or discipline, and also by Paralympiad’. Wikipedia. Previous Paralympic Games - New ! Beijing 2022 - Paralympic Winter Games Information includes ‘Schedule, Medals, Athletes, Videos and Results’. - Tokyo 2020 A page for the last Summer Paralympic Games. Games were held from 24 August to 5 September 2021. - New ! PyeongChang 2018 - Paralympic Winter Games ‘Results, News, Highlights, Sports, Countries, Athletes and Venues’. - New ! Rio 2016 - Paralympic Games ‘About Rio 2016, Photos, Videos, News, Results, Mascot and Medals’. - New ! Sochi 2014 - Paralympic Winter Games ‘About Sochi 2014, Photos, Videos, News, Results, Mascot and Medals’. Winter Olympics The Winter Olympics started about 30 years after the summer Olympics and were originally held in the same year. In 1994 they moved to the midpoint between summer Olympic Games. - Milano Cortina 2026 6 - 22 February 2026. ‘Top athletes from around the world will participate in 16 Olympic disciplines at the Milano Cortina 2026 Games. Other top athletes from around the world will participate in 6 Paralympic disciplines at the Milano Cortina 2026 Games’. Details of the various disciplines are found on the above page, as well as links to a wide range of other information. Previous Winter Olympic Games - Beijing 2022 [Australian Olympic Committee] ‘Overview; Winter Sports; Featured Winter Olympians; News and Posts’. - PyeongChang 2018 Winter Olympics ‘Athletes, Medals / Results’. - Sochi 2014 ‘Highlights and Replays, Results, Athletes, Stories, Medal Design, Mascot and more’. Other Winter Olympic Games Information - Australia at the Winter Olympics History; Infrastructure and training; Public Participation and support winter sports; Results; Overview by sport; Australians at the Winter Paralympics; References; Links. Wikipedia - Olympic Winter Institute of Australia ‘The Australian Olympic Committee formed the Australian Institute of Winter Sports after the Nagano Winter Olympics in 1998, to enable the development of elite performances in winter sports by Australian athletes, through the provision of adequate funding, world-class sports programming and technical coaching’. It took the current name in 2001. - The Origin of the Winter Olympics Britannica. Basic coverage with links to further information. - Winter Olympic Games The history of the games and predictions into the future, looks at various sports, including discontinued sports, lists all Winter Games, links to further information. Wikipedia. - Winter Olympic Sports ‘List of Winter Olympic Sports and Events’. - Winter Olympics Through The Years Information on sports, medal winners, standings as well as general information on summer Olympics, all-time medal winners in various groupings and all-time Medal Standings. Winter Olympics - Educational Material - Olympics - Winter Lessons, Worksheets and Activities ‘Teacher Planet offers lesson plans that discuss various aspects of the Winter Olympics. They also provide worksheets, hands on activities and classroom resources like clip art’. - Updated ! Search Winter Olympics Hands-on Activities [Education.com] ‘Winter Olympics activities, such as creating a flags of the world banner, can get your child interested in watching and learning from the Winter Olympic Games’. - Winter Olympics Resources [Education.com] ‘37 filtered results’. - Winter and Summer Olympics Resources ‘Activities, Worksheets, Printables and Lesson Plans’. - Winter Olympics Colouring Pages Colouring pages that cover the major Winter Olympics disciplines. Links to other resources. Other Information Education Materials - 60+ Key Stats About the Olympic and Paralympic Games ‘From History to Human Rights – Major Olympics and Paralympics statistics we think you should know’. - New ! Education ‘Olympic Education is imparted through the Olympic Values Education Program, the Olympic Studies Centre, the Olympic World Library, the teaching resources of The Olympic Museum and the YOG Education Program at Youth Sporting Events’. - Educator Resources We have provided ‘a suite of educator resources designed for the Lower Primary, Upper Primary and Secondary Schools in Australia. To start your planning, review the relevant Educator Guide for Lower Primary, Upper Primary and Secondary. These Guides provide an overview of the lessons, time allocation, student learning and the resources required’. - New ! Let’s learn about the science of the Winter Olympics ‘From scientific innovations to climate change, there’s plenty of science among the sport’. - New ! Years 3 and 4 - Olympic Games ‘Take a look through this fantastic collection of Olympics resources for Years 3 - 4 children. There is plenty here to help you in your lessons during the week of the Olympic Games to help entertain and inspire your children during this special sporting event’. There are also resources for New ! Winter Olympics for the same year levels. - Research Starters for the Olympic Games From Scholastic - covering all aspects of both Modern and Ancient Olympics. - Summer Olympics Games Science ‘During the summer Olympics, people all over the world become enthralled by the feats of strength, stamina and skill of the athletes competing in the games. Try these simple experiments to understand a little more of the science behind the sports’. Do so with supervision by a responsible person. - New ! Teaching Resources - The Olympic Museum ‘A wide range of teaching tools are available from The Museum according to theme. These materials were created with the help of teachers and education experts in the fields and are available to any teacher who wishes to address these Olympic themes’. - Thematic Units - The Summer Olympics ‘Find various Web Sites on the top portion of this page. Find Lesson Plans further down. At the bottom, you will find books you can order’. - The Olympics, Education Links Annotated links to sites useful in the education area for the Olympics. - The Science of the Winter Olympics [Science Friday] ‘Exploring the science and tech behind the world’s greatest winter sports competition’. General Sites - 10 Of The Greatest Olympic Moments Ever ‘Enjoy our compilation of 10 of the greatest Olympic Moments ever !’ [5.7min.] - International Olympic Truce Centre ‘The International Olympic Truce Centre’s mission is to promote the Olympic Ideals, to serve peace and friendship, and to cultivate international understanding. The Centre’s wider and long-term objective is the creation and continuous promotion of the adoption of a Culture of Peace, which respects human rights’. - Interesting Olympic Facts Covers information from symbols to diplomats, women’s involvement, counting Olympiads and more. Newsfeed, videos, articles, more. - Marcolympics One man’s collection, not only of information about each modern games, but also a significant range of images of tickets, programs, posters and other materials. Includes the Youth Olympics and Paralympics. - Olympic Channel ‘Olympic Channel TV is giving you access to the greatest movement in sport up close, 24/7 non-stop. From every angle. Through all in, all out coverage, original programming, unseen footage and interviews that get you closer than ever before’. - Olympic Games Information on both Ancient and Modern games, their revival, problems, ceremonies, champions, host cities, medals, symbols, amateurism/professionalism and more. Wikipedia. - Olympic Games Museum ‘On more than 350 pages featuring about 1 400 pictures, you can have a look at memorable moments of the Olympic Summer Games. The museums’s web page is not fully completed yet and is continually being worked on and extended’. - Olympic History Quizzes Try these fun quizzes. They may be harder than you think. They cover Summer and Winter Games and Olympic History. - Olympic Opening Ceremonies - A journey through time ‘We take a look back at some of the greatest moments from previous Olympic Games Opening Ceremonies’. - Olympics Timeline [From ancient Greece to 1948] Brief notes, with links to further information. - The Olympic Games - HISTORY.com ‘The Olympics in Ancient Greece; Decline and Revival of the Olympic Tradition; The Olympics Through the Years’. - The Olympic Games story for Kids ‘Want to know the origins of the Olympic Games? Where it all started? Check out our quick and colourful guide for kids and let our movie tell you how it all began’. [7.5min.] - New ! The Olympics [Teaching Times] UK. ‘A themed project plan embracing the Olympics from its every angle for use at Key Stages 2 and 3, presenting an ongoing opportunity to celebrate the event with a series of thinking skills activities and resources’. Mascots & Olympic Symbols Symbols include the Olympic Rings and other logos, the Oath, the Torch Relay, the Flag and various ceremonies. Mascots have only existed since the Winter Olympics in 1968 and the Summer Olympics of 1972. Mascots - Fatso the Fat-Arsed Wombat ‘An “unofficial” mascot of the Sydney 2000 Summer Olympics. A truly Australian version of a mascot. Links to other mascot collections, including Olympic mascots, Australian Mascots and Australian sporting mascots. Wikipedia. - List of Paralympic Mascots Covers both summer and winter Paralympics from 2008 to 2022. Wikipedia. - Olympic Mascot Images and text about the Olympics mascots among a range of other Olympic trivia. Mascots from 1972 to 2020. - Updated ! Olympic Mascot Miraitowa Tokyo Olympic Games Mascot. - Updated ! Olympics Part 6 : Meet mascots Miraitowa and Someity ‘Tokyo 2021 Olympic Mascot : Miraitowa and Tokyo 2021 Paralympic Mascot : Someity’. - Updated ! Olympic Mascots ‘Olympic mascots are the ambassadors of the Olympic and Paralympic Games. They embody the spirit of the Olympics and play a vital role in welcoming athletes and visitors to the Games’. All mascots snce Grenoble in 1968. Other Symbols - A look back at the emblems of the Olympic Games ‘To mark the unveiling of the Paris 2024 Games emblem, olympics.com takes a look back at some of the most well-known emblems from Olympic Games editions in the modern era, stretching back over a century’. - Olympic Oath What it is, history and a listing of those who have taken it on behalf of both athletes and judges. Wikipedia. - Olympic Summer Games Emblems Lists all since their inception in 1932, with a graphic and information and goes on to London 2012. There is a link to the Olympic Winter Games Emblems, from 1932 to 2010. - Olympic Symbols ‘The Olympic symbols are icons, flags and symbols used by the International Olympic Committee to elevate the Olympic Games’. Motto and Creed; Rings; Different types of flags; Flame and torch relay; Medals and diplomas; Anthems; Kotinos; Olympic salute; Mascots, Intellectual property; links. Wikipedia. - The Olympic Rings A page from the Olympic Organisation which covers specific information on the rings, the motto and the flame, as well as their role in the culture of The Olympics. - What do the Olympic Rings represent ? Brief, clear description with links to related material. - What is the story behind the Olympic rings ? Article providing easy to understand information about these. - Why Were the Five Colours of the Olympic Rings Chosen ? Reference.com. Several pieces of information plus links to further detail. Media A surprising number of movies and television programs have been made about the Olympics. Only the title and a brief description are provided for individual items in this collection. - Internet Movie Database Enter “The Games” in the search box to find a list of possibilities, some irrelevant, others on specific games of different Olympiads. Some are television series. Check items for 1970 and 1998. - Olympic Television Archive Bureau ‘Delivering unique clips and defining moments from the Summer and Winter games and the most emotive visual content available. All from one exceptional library.’. Fee-based. - Chariots of Fire ‘Chariots of Fire is a 1981 British historical drama film. It tells the fact-based story of two athletes in the 1924 Olympics’. Links to sources of the film. Wikipedia. - Cool Runnings ‘Inspired by the true story of the first Jamaican Olympic Bobsled Team’. - Downhill Racer A skier at the Winter Olympics. Trailer available. - Fists of Freedom ‘Documentary leading up to, during and after the 1968 Summer Olympic Games in Mexico City’. - Miracle on Ice ‘How the U.S. Olympic hockey team beat the Soviets at the 1980 Lake Placid Games’. Made for television. - Munich Traces the follow up to the Munich Olympic Games massacre. - Olympia 1 Teil - Fest der Völker ‘The document of the 1936 Olympics at Berlin, orchestrated as Nazi propaganda’. Leni Riefenstahl. Also check this Wikipedia site. - New ! Olympia and the Olympic Games Documentary.‘Learn how games were played in the 8th century BC and what rules the athletes of the time had to follow’. [51min. 26sec.] - Olympics ‘Welcome to the Olympics YouTube channel, where the Games never end ! From the best musical moments at the Olympic Games in our Music Monday series to weekly compilation videos with highlights from the Olympics on Fridays, plus exclusive documentaries about the stories behind the glory, this is where you can find everything about the biggest sporting event in the world’. - New ! The Ancient Greek Olympics [776 BC-393 AD] ‘The Olympic Games began in ancient Greece in July 776 BC at Olympia. However, it is thought the games began many years before. As a festival with athletic events staged to honour the god, Zeus, the Olympics also united individual Greek city-states and colonies in competition’. [8min. 24sec.] - The Cutting Edge It is suggested The Taming of the Shrew on ice could be another name. Skating movie. - The Games ‘Four marathon runners [one from England, one from the U.S., a Czech and an Australian Aborigine] prepare to run in the Olympic games’. - The Games [ABC] ‘This is a mischievous Australian, deadpan comedy, which takes a satirical look at the bureaucrats as they orchestrate the extravaganza that will be the 2000 Olympic Games’. Trailer available. Made for television by the ABC. Highly Recommended ! - New ! The Olympics for Kids ‘Learn about the Olympics in this video for kids ! You will learn about the modern Olympic Games and will also learn the history of this amazing, worldwide sports event’. [7min. 7sec.] - The Sydney 2000 Olympics - The Complete Film ‘Enjoy the full length cut of our retrospective of the Sydney 2000 Olympic Games in this in-depth documentary film’. [1hr. 56min. 40sec.] Other short media pieces on a wide range of events and activities at the Sydney Olympics can be found in the Sydney Olympics 2000 Collection.
https://aussieeducator.org.au/specialpages/olympics=2.html
Cold Coffee with Chocolate Syrup For all coffee lovers out there, here is a cool recipe of Cold Coffee to beat the summer heat. You need only 4 ingredients and chocolate syrup for glass decoration. It is very easy and quick recipe. During summer, it’s too hot to sip hot coffee so why not have cold coffee. Ingredients (for 2 large glass): - 3 cup chilled Milk - 3 tbsp. powdered Sugar - 1 & 1/2 tbsp. Coffee powder - Ice cubes - Chocolate syrup for decoration Instructions: - In a blender/mixer jar, add 3 cup Milk, 3 tbsp. Powder Sugar, 1 & ½ tbsp., Coffee Powder and 4 – 5 Ice Cubes. - Blend for a minute till everything is mixed well and the coffee solution becomes frothy. - Take 2 large size Glasses and decorate with Chocolate Syrup. - Pour the coffee into the Glass and serve Cold Coffee.
https://www.cookingwithsmita.net/cold-coffee-recipe/
Assistant Photographer Job Description: How To Be A Photography Assistant To date, the work of the photographer is considered one of the most prestigious. If you also want to try yourself in this role, but do not have enough experience and skills, then you can start your professional career as an assistant (or assistant) photographer. You should be aware of the assistant photographer job description, as well as How To Be A Photography Assistant at the desired place. Assistant Photographer Job Description A photographer’s assistant is a person who carries out the tasks of the photographer, and also carries out various preparatory activities. In general, all people in this position can be divided into several categories. - First of all, it is necessary to distinguish such assistants who are independent professionals in their own right , however, for a specific project or a separate shooting, they were invited as assistants. Due to the fact that such a specialist possesses a sufficient amount of experience and professional skills, he can express his professional opinion. In addition, he does not need to be taught the basics of professional activity. - The second category of assistants is those people who strive to become independent photographers and are temporarily in the position of assistant . Their main goal is to gain experience, learn professional skills and abilities, as well as create the necessary theoretical knowledge base and get useful contacts. - In addition to other categories, one can distinguish such assistants who are particularly pleased with the auxiliary work. They do not seek to become independent specialists. Often, such assistants are valued more than others, as they are set up for continuous work with one photographer. Accordingly, they understand his style and are well acquainted with his requirements. In order for a person to be able to effectively fulfill his assistant functions, he must first of all have a certain set of personality characteristics. Among them are usually distinguished: - punctuality; - responsibility; - attentiveness; - diligence; - creativity; - sociability. You May Also Like: Travel Agent Job Description: Requirement, Skills Scope How To Be A Photography Assistant So in our topic Assistant Photographer Job Description, the most asked question is How To Be A Photographer assistant? Almost any person with the corresponding aspiration can become a photographer’s assistant. If we talk about the requirements, they depend on each particular photographer, his desires and preferences. First of all, only a person who has reached the age of 18 can apply for the position of an assistant photographer (specialists consider younger applicants much less often). In addition, it is important that the applicant possesses at least a minimum level of education, has a school certificate. It is important that the applicant for the position of assistant photographer is psychologically and emotionally stable. The thing is that the work of a specialist is associated with communication with people, which is accompanied by various stresses. The assistant photographer must be able to smooth out the conflict and not respond to provocations. photographer job requirements The duties of an assistant photographer can be very different. It all depends on what supporting functions a particular specialist needs. Consider several possible tasks that may be included in the job description of the assistant photographer: - assistance in the installation and operation of such additional equipment as reflectors, flashes; - assistance in the transportation of equipment (due to the fact that professional photographers possess a large amount of equipment, an assistant may need personal transportation); - monitoring the operation of the equipment (you need to ensure that all cameras are turned on if necessary, that all settings are in order, that the battery is charged); - work with a light meter; - installation and adjustment of light; - work with various lenses; - help in taking test shots (for example, the assistant often takes the place of the model so that the photographer can take a test shot); - communication with customers and customers; - work with documents (for example, maintaining accounting books, drawing up reports, assistance in maintaining accounting records); - assistance in the process of filming (for example, providing additional accessories, adjusting the model’s posture); - setting scenery. In addition, many photographers require assistance from their assistants not only in the process of direct shooting, but also before and after. You May Take interset in: Social Media Marketing Job Description: How To Become SMM Marketer So, for example, you can be instructed to find an appropriate site, agree with the leadership of a particular location, negotiate with customers, keep a photographer’s calendar . Most of the work can be assisted in the processing of photographs. Thus, the assistant photographer is an important figure on the set. In the process of implementing large-scale projects, a professional photographer cannot do without an assistant. In addition, if desired, the assistant can develop and improve in order to eventually become an independent specialist. Before you officially get a job as an assistant photographer, it is very important to discuss in detail and in detail all the tasks that will be part of your functional duties. In addition, talk about the fact that if additional tasks arise, your pay will be increased. Thus, you can protect yourself from all sorts of negative situations and from conflicts with the employer. How to become an assistant without experience? If you want to become an assistant photographer, but do not have the relevant work experience, then you should convince the potential employer that you have a great desire to master the profession, as well as an active and proactive person. First of all, you need to create your own personal portfolio. This means that you need to provide a potential employer with examples of your copyright photographs. It is desirable that the photos were taken on the camera, but in its absence, high-quality photos taken on the phone are suitable. Print your best shots or take a photo book. At the same time, at your request, you can create a universal portfolio with photographs of various types (for example, wedding photos, portrait photos, nature), grouped into separate categories. In addition, you can make a highly specialized set of photos (for example, only food photos). Thus, a professional photographer will be able to assess your current level, as well as possible potential. In addition to the portfolio, a professional resume should also be compiled. This document should notify the photographer not only about your professional skills, but also about personal characteristics. In addition, the resume should contain personal information (age, marital status). If you wish, you can also write a cover letter. Must Read: Tour Guide Job Description: Salary, Responsibilities, Education If you have finally decided to connect your life with the position of the assistant photographer, then you should find several people with whom you would like to work. You should be close to the author’s style of the photographer, and also like the area in which he works. At the same time, you do not need to immediately apply for the position of his assistant – for starters, you can just make a business acquaintance with him. In the process of finding work, in no case can you do universal mailing. Business letters and communication with each individual photographer should be as personalized as possible. This approach will distinguish you from other candidates. Akcnlowdge assistant photographer job description and how to become a photographer.
https://typowrite.com/assistant-photographer-job-description/
Published on 03.10.19 in Vol 21, No 10 (2019): October Preprints (earlier versions) of this paper are available at http://preprints.jmir.org/preprint/14112, first published Mar 29, 2019. Original Paper Promoting Social Connection and Deepening Relations Among Older Adults: Design and Qualitative Evaluation of Media Parcels ABSTRACT Background: Being socially connected is related to well-being, and one way of avoiding social isolation is to deepen existing relationships. Even though existing relationships can be reinforced by regular and meaningful communication, state-of-the-art communication technologies alone do not increase the quality of social connections. Thus, there is a need for the involvement of a trained human facilitator in a network of older adults, preferably for a short period, to promote the deepening of their relationships. Objective: This study aimed to evaluate the hypothesis that a human-facilitated, media-sharing social networking system can improve social connection in a small group of older people, who are more vulnerable to social isolation than most, and deepen their relationships over a period of a few weeks. Methods: We conducted the design and evaluation of Media Parcels, a novel human-facilitated social networking system. Media Parcels is based on the metaphor of a facilitator collecting and delivering parcels in the physical mail. Extending the metaphor, the system supports a facilitator in designing time-based dialogue requesting parcels from participants that bring out their memories and feelings, in collecting the parcels, wrapping them in annotations that communicate the corresponding requests, and delivering the wrapped parcel to a target person. Qualitative evaluation was carried out in two trials with a group of three people each, one with family members (children and father; aged 55, 56, and 82 years old) and the other with a group of friends (aged 72, 72, and 74 years old), over two weeks. In each trial, data were collected in three interviews (pre-, mid-, and posttrial) and via system logging. Results: Collected data indicate positive social effects for deepening and developing relationships. The parcel metaphor was easily understood and the computational system was readily adopted. Preferences with regard to media production or consumption varied among participants. In the family group, children preferred receiving media parcels (because of their sentimental value) to producing them, whereas the father enjoyed both. In the friendship group, preferences varied: one friend enjoyed both producing and receiving, while the other two preferred one over the other. In general, participants reported a preference for the production of items of a certain type depending on the associated content. Apart from having a strong engagement with the system, participants reported feeling closer to each other than usual. Conclusions: For both groups, Media Parcels was effective in promoting media sharing and social connections, resulting in the deepening of existing relationships. Its design informs researchers who are attempting to promote social connection in older adults. J Med Internet Res 2019;21(10):e14112 doi:10.2196/14112 KEYWORDS Introduction Background The concept of connectedness is multidimensional and there are multiple definitions and types of connectedness, including social connectedness, that focus on interpersonal relationships. Social connectedness, as defined by Lee and Robbins [, ], includes feelings of being in a close relationship with the social world, which is critical to one’s sense of belonging and is based on proximal and distal relationships. As social interactions may be transient, feelings of being connected to others may change. Thus, social connectedness may also correspond to short-term experiences of belonging [ ]. Having regular and meaningful contact with others usually increases social connectedness, but this type of contact may be hindering for older people because of mobility and geographic constraints. The global population aged 60 years old or above is growing at a rate of about 3% per year, which is faster than all younger age groups. At present, in Europe 25% of the population is already aged above 60 years old, and in Latin America they account for 12% of the population . This shift in the world’s demographics has led to a need for action across multiple sectors to enable older people to age well and remain a resource to their families, communities, and economies. Thus, successful ageing and healthy ageing have been topics of interest in some of the most recent studies conducted among the older population. The World Health Organization [ ] defines successful ageing as the process of developing and maintaining the functional ability that enables well-being in older age. By including well-being in this definition, it goes beyond physical health as it includes domains such as happiness, satisfaction, fulfillment, and feelings of belongingness. Older people often emphasize the role of social integration and well-being associated with successful ageing . As they age, they wish to maintain their identities and social roles, have relationships, remain autonomous, feel safe, feel like they still have the potential for personal growth, and be able to enjoy life [ - ]. Older adults are more vulnerable to social isolation than the rest of the population. Typically, their social networks shrink with age because of bereavement, relocation, and reduced mobility . Moreover, older adults who are socially isolated have been shown to be more depressed and disabled, be in poorer health, and report lower levels of well-being than those who are socially connected [ ]. Thus, it is important that they are able to maintain and deepen social connections with their remaining family and friends and to establish new ones. Maintaining regular social connections can be challenging for older people living alone, who may struggle to travel to meet distant contacts in person or attend in-person social events. Web-based contact seems to be an obvious solution, particularly given the rise in internet access via mobile devices for adults aged 65 years or older in the United Kingdom , Brazil [ ], and the United States [ ], among others. Such technology can support older adults [ ] who prefer traditional one-to-one channels of communication [ , ]. Social connectedness can be stimulated by experiences that remind people of their social relationships. For example, looking at a photograph or listening to a song may remind them of a loved one and their relationship with them. Thus, feelings of social connectedness do not necessarily require physical proximity. Based on these insights, our hypothesis is that a human-facilitated, media-sharing social networking system can improve social connection in older people and deepen their relationships upon deployment over a few weeks. To evaluate our hypothesis, we designed a new type of social networking system called Media Parcels to address social connection in older people and deepen their relationships over a few weeks with the mediation of a human facilitator. Media collection and sharing, orchestrated by the facilitator, lies at the heart of the system, as this activity is meant to stimulate user reflection about current relationships, both strong and weak. In the Media Parcels system, parcels of media are solicited by the facilitator for later consumption by specific recipients, with the types of media requested designed to encourage reciprocal intimacy and self-disclosure between an older person and selected social contacts. Both the intervention duration and the group size are important in the proposed design. One of the main reasons is that a large group size would imply developing a large number of relationships, which is difficult to achieve in a short period and challenging for a facilitator to coordinate. Second, a duration of a few weeks allows the involvement of the facilitator to be short term, and finally, this would allow the study to take advantage of the temporary novelty effect observed with new technology adoption. In the current design of the system, media collection and distribution are done by a human facilitator among 3 users. In future designs, the facilitator might be supported or eventually replaced by an algorithm designed to allow larger networks. Social Networking and Older People Much research exists on the value of sharing digital media and other physical memorabilia for maintaining relationships but not the honesty and intent [- ]. Here, we will concentrate on more recent broad social media services and studies of media sharing through social networking systems, especially those targeted at the older population. Facebook use is now part of daily life for many people around the globe, and a huge number of posts made by friends are delivered continuously to users. An early study on self-disclosure on Facebook by Park et al with 317 student participants showed that the number of and positivity of posts is associated with the intimacy of the relationship, but not the honesty and intent. In a later study with 243 participants, Orben and Dunbar [ ] investigated how passive consumption of personal disclosures affects the development of relationships. Passive consumption occurs when a person reads the posts of others without directly interacting with them. Their results suggest that reading high intimacy, self-disclosures increases relationship closeness, triggering similar relationship formation in real-life interactions. When focused especially on the elderly population, the use of social media is slightly different to other groups. Rebelo conducted an exploratory study in Portugal with 4 older adults to understand the motivations and interests of the elderly population when using social networks (in particular Facebook). The researcher found that, for this particular group, motivation was mainly related to solitude, belonging, reunions, and willingness to improve intergenerational relationships. Regarding shared content, the elderly stated that they like discussing memories but were concerned about privacy, and they thought that most of the published content on the social network site was inadequate or uninteresting. Chakraborty et al [ ] studied the privacy-preserving behaviors of older Facebook users in direct contrast to their self-disclosure. They analyzed the profile information and privacy settings of 134 Facebook users aged above 55 years, together with 50 of their friends, and they observed that older adults hide or share information on their profiles depending on what information their contacts share. They tend to be more conservative about information sharing, in line with the findings of Lindley et al [ ] and Pedell et al [ ]. Sinclair and Grieve , in turn, investigated whether older adults could derive social connectedness from Facebook and whether the levels of social connectedness were similar to those seen in younger samples. The analysis revealed that Facebook social connectedness emerged as a separate factor to offline social connectedness, with correlations between the factors indicating that they were distinct constructs. The participants reported levels of Facebook-derived social connectedness similar to those seen in younger samples. About the social effects and benefits caused by the networks, Quinn [ ] examined the engagement among novice social media users, aged 65 years and older, in 4 cognitive domains: attention, processing speed, working memory, and inhibitory control. Results reported include the improvement of intervention participants in inhibitory control. Quinn argued that the findings demonstrated that the benefits of social media use at older ages extended beyond mere social engagement and into other domains of everyday well-being. Chen and Schlz conducted a systematic review to verify the effect of information communication technology on elderly social isolation. Their findings suggested that although the technology lessened social isolation, the technology alone does not guarantee quality of communication among older adults. Furthermore, when communication is not reciprocal, technology use may increase social isolation [ ]. Several novel media sharing systems have been designed for the older population, with differing levels of effects on relationships. A number of these systems use situated displays in the home to share materials at a distance, such as photographs, text messages and broadcast media [- ]. For instance, Garattini et al [ ] designed a system to promote opportunistic social interaction among elderly people. Using a tablet, the system broadcast news of different topics and presents functionalities to enable group conversations through voice and text. The researchers conducted a 10-week study with 19 elders and some of their friends and family members. The results suggested that although the broadcasts encouraged social interactions, the quality of the engagement was limited by the absence of an approach to share personal information to help users become familiar with one another. Waycott et al developed a tool to facilitate message and media sharing and conducted a study in which caregivers used the tool to communicate with their elderly clients. Their results showed that photographs with captions were able to increase and enhance communication, and were well-suited to promote psychosocial care. Similarly, Abrahão et al [ ] conducted a mobile digital storytelling study in a care home for older people. The creation of the stories was facilitated by either a formal or informal carer and focused mainly on the resident, capturing aspects of everyday life such as visits, social events, therapy sessions, and health reports. The results showed that the technology stimulated expressivity and creativity in the resident, as well as richer conversations between the resident and other people. Cornejo et al developed a system geared toward enhancing older people’s offline interactions with their family. The results emphasized how information shared on social media could provide conversational context for the elderly, prevent isolation, and increase offline conversations. Most studies report positive benefits for maintaining or making new relationships through lightweight multimedia messages. Given the established relationship between the level of self-disclosure and relationship closeness both online and offline, there is an opportunity to explicitly encourage media exchange related to the existing relationship. By encouraging self-disclosure, we mean to encourage participants to talk about feelings and emotions, to talk about topics they do not regularly talk about (eg, intimate things), and to talk about themselves and their relationship toward each other so that using an app might be easier than saying it face-to-face. Methods Media Parcels Design Media Parcels is a novel social networking system designed to promote facilitated media exchange between users. The interaction underlying Media Parcels is based on the metaphor of parcel delivery in the physical mail. First, a facilitator, upon specific requests to participants, collects media and wraps them in text commentary, bringing out their memories and meaning. Next, the facilitator passes the wrapped media parcel to a target person, who in turn unwraps them. In the general case, Media Parcels supports facilitators in orchestrating interactions among any number of users by intervening in 2 steps: in phase 1 by requesting media parcels from a user and, in phase 2 by sending the parcels to any number of (other) users. The particular case of deploying Media Parcels for the balanced interaction among 3 users (P1, P2, and P3) orchestrated by a facilitator is illustrated in. For the same scenario, details the request of parcels of media (from-to). As currently designed, Media Parcels relies on a facilitator in charge of managing the interaction for the duration of the intervention. In a nonfacilitated approach, Media Parcels could, in principle, pass parcels of media between multiple providers and recipients of media, at various times, ad infinitum. In contrast to most current social media systems that rely on the spontaneous posting of media for feedback, the Media Parcels approach is based on directed requests for media items which are then shared within a group. For the deployment of Media Parcels, we used the Experience Sampling and Programmed Intervention Method (ESPIM) and an associated platform that support specialists (eg, health professionals) in communicating with their users at particular times of the day via a mobile app [, ]. ESPIM is inspired by the experience sampling method for collecting self-reports in psychology proposed by Csikszentmihalyi et al [ ], combined with the concept of programmed instruction [ ]. The ESPIM software platform was designed to support health care and learning interventions in their natural environments throughout the day [ ]. Such interventions can comprise open-ended and multiple choice questions, media requests, and deliveries. While creating the interventions, the professional defines the time-based moments in which they should be prompted on the user’s device [ ]. Approach Toward Social Connection and Deepening Relations Aiming at supporting a facilitator who promotes social connection and deepening of relationships in a small network, comprising older persons and their social contacts, content exchanged via Media Parcels should encourage self-disclosure in the scope of the social relations involved while ensuring both intimacy and privacy. Facilitator The role of the facilitator includes: (1) designing media requests associated with feelings that encourage self-disclosure and reflection over a specific social contact; (2) wrapping together the media elements received and the associated feelings, without editing them; and (3) mediating the interaction between a pair of users by sharing the content produced between both ends of the targeted relationship. For the purposes of this study, such a role demands professional skills, so in the case of the two trials described here the facilitator had a background in clinical psychology. Media Requests Requests for media were deliberately designed to be thought provoking and vehicles for self-reflection and disclosure. For example, the following requests and questions were used, among others, to elicit responses across a variety of media forms, personalized by name: - Take a picture of an object that is special to you and explain why (image and text). - Record a short audio clip of yourself singing a snippet of a song you like and explain why you like it (audio and text). - Record a short audio to X, saying what he or she means to you (audio). - What do you like to do with X? Why? (text). - Send me a picture of a present X has sent you in the past. What was the occasion? How did you feel about it? (image and text). - Record a short video of you saying something X often says (video). Media requests were inspired by methods used in design and behavioral psychotherapy. We used two strategies for the design of media requests, one concerning the type of media, and the other, the media content. Different types of media may produce different emotional responses , so we designed media requests to be balanced across image, audio, text, and video to provide participants with all types of media once, and regarding media content, the media requests were designed to probe participants’ relationships and themselves. Behavioral psychological interventions make use of asking questions, making requests, and giving instructions or suggestions for clients to carry out specific or generic actions outside the therapeutic setting . Asking questions about happenings or feelings serves to gather information and also promotes self-observation, self-reflection, and self-knowledge. In our study, the media requests and questions about participants’ feelings were designed to encourage all participants to reflect on their relationships and express their feelings toward one another by producing media with emotional content. Furthermore, specifically for the older participants, the questions and requests also encouraged reminiscence of precious moments and self-disclosure. The questions and requests might also be referred to as relationship probes, as they have the character of cultural probe questions for self-report except they are focused on personal traits and relationships rather than culture . Cultural probes is a technique used to inspire ideas in a design process. Typically, the probes are small packages that can include any sort of artifact along with evocative tasks that allow participants to keep record of specific events, feelings, or interactions. It serves as a means of gathering inspirational data about people’s lives, values, and thoughts. Media Wrapping and Sharing For each media item collected, before sending the item to the target person the facilitator included a text comment to expose the request that created it. An example is given in, with the facilitator requesting for one person to record a piece of audio for another person saying what she means to you. When sharing that media, the facilitator includes “Your dad recorded this message to you”. As indicated by this example, no editing relative to the media collected took place. Older Person’s Social Contacts Social contacts of an older person may be inter- or intragenerational, such as younger family members (their children or grandchildren) for intergenerational contacts, and the same generation friends or family members for intragenerational contacts. According to Lindley et al , the dynamics of family and friend relationships are very different, especially in terms of expected social support. Considering the two different types of social contacts, we designed two trials devoted to each type of relationship: one older person with two younger family members, and three same-generation older individuals that were friends. For practical reasons related to our international collaboration, we conducted the first trial with family participants in the United Kingdom and the second trial with friendship participants in Brazil. The system and methods for both trials were largely the same and are reported in study 1 for the UK context, with variations outlined in study 2 for the Brazilian context. The studies reported in this paper were designed so that phases 1 and 2 lasted around one week each. This amounted to a fixed period intervention aimed at increasing social connection between these partners. We designed a media collection phase (phase 1) and a media sharing phase (phase 2), so that participants could clearly discriminate between producing and receiving personal media content. In both studies, participants were aware of the two distinct phases and that the produced media in phase 1 would not be immediately shared with the other participants. They were also informed that the human facilitator, who was a clinical psychologist, would be in charge of sharing the produced media and its associated feelings from phase 1 with the other participants on phase 2, without editing the content. Participants were also aware that, once the facilitator mediated the media sharing, this person would have access to the content of the media and its associated feelings. In addition, the participants were informed that, after phase 2, the facilitator would not mediate their interaction anymore; thus, if they wished to talk about the media content received, they should use their conventional communication channels. Study 1: Family Trial This study focused on supporting an older person through media exchanges with two younger family members. The exchange of media parcels was asymmetric because they were not collected and delivered between the younger participants. shows the network configuration for study 1. An older adult who lives alone exchanged media (text, audio, image, and video) with 2 other social contacts. The facilitator (the first author) orchestrated the exchange in 2 phases. In phase 1, lasting a week, media relating to each pairwise relationship with the older person was collected by the facilitator at regular intervals. In phase 2, also lasting a week, that media was distributed to the reciprocal partner in each pair at regular intervals. As the older person is linked with 2 people, while those people are only linked to one and not each other, we collected and distributed twice as much content from the older person as from the reciprocal partners, as shown by the arrows in . Media A typical media collection and sharing screen is shown in, as previously presented. Requests for media were deliberately designed to be thought provoking and vehicles for self-reflection and disclosure. For example, the following requests and questions were used, among others, to elicit responses across a variety of media forms, personalized by name: - Take a picture of an object that is special to you and explain why (image and text). - Record a short audio clip of yourself singing a snippet of a song you like and explain why you like it (audio and text). - Record a short audio to X, saying what he or she means to you (audio). - What do you like to do with X? Why? (text). - Send me a picture of a present X has sent you in the past. What was the occasion? How did you feel about it? (image and text). - Record a short video of you saying something X often says (video). Participants Recruitment requirements for the older person were as follows: (1) aged 60 years or older; (2) lives alone; (3) is based in the Guildford area, United Kingdom; and (4) is able to nominate at least two other social contacts who are able to participate. All names were changed to preserve participants’ identities. We formally broadcasted the search for participants for 6 weeks through the University of Surrey academic email to the existing network of research groups and personal contacts, on the research group website, and by partnering with Age UK Surrey and the University of the Third Age, Guildford. The participants recruited were resultant of personal contact. Participants were 1 older adult, Paul (aged 82 years), and 2 of his children: Karen (aged 55 years) and Charles (aged 56 years). Paul chose them because he considered them relevant people for social support in his life. Paul is an electrical and electronic engineer and still works part-time, mentoring engineers at a company. He did not have any cognitive impairment according to the Mini-Mental State Examination to measure cognitive health . He was also living alone for the past 6 months and feeling more isolated since his wife passed away. Charles, his son, lives close to him. His daughter, Karen, lives in Kenya, Africa, but was visiting her father for the first week of the trial. The field data collection was done from late April 2018 to late May 2018. Pretrial Interview A pretrial semistructured interview was conducted face-to-face with each participant. With the older person, we enquired about his relationship with his two children. To access feelings of a specific social connection at the individual level between Paul and his children, we designed a Relationship Semantic Differential Scale (RSDS,) with 16 pairs of contrasting attributes related to social relationships. Participants were instructed to express their agreement with the attributes on a 7-point scale. As typical of semantic differential scales, the closer the participant responds to one of the attributes the more they agree with it [ ]. Paul was asked to rate his relationship with each child separately. Finally, the Media Parcels mobile app was downloaded and installed on a dedicated tablet. Paul was given this tablet and trained in how to use it. This took a total of about 1 hour and 30 min. Each of Paul’s children also answered a similar semistructured interview enquiring about his or her relationship with their father and responded to the RSDS. The Media Parcels mobile app was downloaded to their existing smartphones and they were trained in how to use it. This took about 30 min per person. Trial Period Following the pretrial interview, the system was activated on all 3 devices and proceeded to collect media parcels from participants over 7 consecutive days in the first week of the trial. These were analyzed and selected by the facilitator for redistribution over the following 8 consecutive days of the second week for the social contacts and 9 consecutive days for the older person. The amount of media parcels received in the second week was based on the amount of relevant media parcels produced by participants in the first week; therefore, it varied among participants. The older person, Paul, received 3 collection messages or 1 delivery message from the system each day, whereas his children Karen and Charles received only 1 collection or 1 delivery message a day. Notifications of each message sounded and appeared on the receiving devices, but users were able to defer answering or reading them until later. Users could also choose to decline answering any request. Once a media delivery had been seen, users could not directly respond with feedback to the person who sent the media, as is usual on most social media platforms. It was a design decision not to support interactional closure to encourage participants to contact each other offline or using their existing preferred communication channels. This decision was based on the fact that new technology solutions on communication mostly force users to abandon their usual channels to adopt new ones. This can be aversive to those people who take more time learning to use a novel technology, which is the case for most of the older population . Midtrial Interview At the end of the first week (phase 1) of the trial, we conducted a midtrial interview. Participants once again each responded to the RSDS and were interviewed about the feelings generated by producing materials about their relationship. Participants were also briefed about the delivery of phase 2 of the study. Posttrial Interview After phase 2, we conducted final semistructured interviews with all participants, separately, about their relationships, connectedness toward one another, and experience using the system. They then responded to the RSDS. The meetings lasted an average of 30 min for each social contact and 1 hour for the older person. In this last interview, they also evaluated their experience with the ESPIM mobile app by answering a User Experience Questionnaire (UEQ) and a System Usability Scale (SUS) [ ]. All interviews were conducted in the participants’ native language, English. Study 2: Friendship Trial To test out the value of the system for deepening relationships with same generation friends, we recruited 3 older people with different levels of acquaintance, as described below. We decided to treat all these participants equally in the trial by using symmetrical media sharing between all three, where P1, P2, and P3 are three elderly ladies. This means the scripted dialogue between participants and the facilitator implies that media were collected in phase 1 from each participant about their other 2 partners and distributed to those partners in phase 2. Participants Recruitment requirements were as follows: (1) aged 60 years or older; (2) lives alone; (3) is based in São Carlos, Brazil; and (4) is able to nominate at least two other same-generation social contacts to also participate. The research was broadcast in a digital literacy course for older adults. In total, three elderly ladies volunteered. They described themselves as friends or acquaintances. Ronda is a 72-year-old retired teacher who was divorced and had a son. Linda is also aged 72 years and is a retired administrative assistant) who was never married and has had a boyfriend for the past 8 years. Finally, Irene is 74 and a retired laboratory assistant. All participants were Brazilian. They had some experience dealing with smartphones and tablets. None of them had any cognitive impairments. The network configuration and media flow in study 2 is presented in. Both Ronda and Linda were more connected to Irene, who acted as a friendship mediator between the two others. Ronda and Linda were friends for about 10 years and they both described being close to each other. Linda and Irene have been friends for over 30 years. They worked together, and before their retirement they were very close. Irene said their relationship started to go cold after a while, especially after Linda started dating. Ronda and Linda consider themselves to be friends, they have known each other for 10 years, though they do not call or arrange to meet in person as this is always mediated by Irene. In addition, most of the time Irene is the one who initiates social contact with both friends. None of them described themselves as socially isolated, but Ronda expressed interest in deepening her relationship with both her friends, Linda and Irene would like to revive their friendship that had become distant over the years, and Linda would also like to become closer to Ronda. Procedure The procedure was identical to study 1: (1) pretrial interview; (2) media collection; (3) midtrial interview; (4) media sharing; and (5) posttrial interview. In this case, the interviews were conducted in Portuguese. The total length of the data collection, from pre- to posttrial, was 20 days. Media were shared symmetrically as described above. The media requests were specially tailored to suit the particularities of the three participants and to deepen their relations. As before, requests were to share information about themselves (personal requests) and about their relationships with each other (relationship requests). In phase 1, a total of 14 requests were designed for each participant: 7 personal and 7 about the relationships. The requests involved the same media types as in study 1 (text, audio, video, and image) as well as text commenting about their feelings toward what they had produced. Among the images requested, there were photos of people (friends participating in the study), objects (presents they received from each other, special objects, and objects that reminded them of each other), and places (favorite spot in the house). The audio requests were to share a memory from childhood, talk about a miracle in their lives, and record a song snippet. The video requests were to record an ongoing activity, talk about a good day they spent with the friends, and record a video message to the other friends. The text requests were to write about what they would like to do more with the friends and to write about their favorite singers, television shows, and activities. A total of two requests were sent out each day, one in the morning and another in the afternoon for 7 consecutive days. As in study 1, participants could respond to the requests immediately after they received the sound reminder or any other time during the day. In phase 2, we shared the most compelling media via the system, which, in the case of this study, were the media and associated feelings with more emotional and personal content. All participants received 1 media parcel per day for 9 consecutive days. Results Study 1: Family Trial User Experience, Engagement, and Patterns of Interaction The results of the user experience and usability rating scales were very positive, with the SUS results indicating an average score of 77.5 points. This is about 10 points higher than average, and a B+ on a scale ranging from A to F. The UEQ scores were at excellent or above average across all dimensions. Overall, participants were able to use the app without any issue other than difficulty in identifying the status of video recording when the Android video app is used, an issue not under the control of the designers. Such positive results, which relate to the attention given to guidelines during the design of the mobile app , contrast with the poor accessibility of many apps when used by older people [ , ]. Looking ahead, the experience and usability scores were very similar for study 2 (average SUS=79.17 and slightly higher UEQ scores). Therefore, the rest of the paper concentrates on the process of using the system and its value for relationships. In phase 1, the media collection phase, all participants responded to more than half the media requests. Paul responded to 76% (16/21) of media requests on a daily basis. He interacted with the app immediately after the sound reminder in about 38% (8/21) of cases, and preferred to use the app when he had time to engage in the requests: I heard the alarm, but if I was busy at that moment, I just ignored it (...). I knew I had to do the tasks, so I tried to come back to it when I had time. [Paul] On average, he spent 5 min per interaction, although he spent more time on the requests that required him to retrieve materials, such as pictures, written material, and objects. Karen responded to 100% (7/7) of media requests. She interacted with the app on two separate days and preferred to respond to most of the requests in a row. It took her an average of 3 min per interaction. She never responded to the requests immediately after the sound reminder: I preferred to do it all at once, in a day I had time. [Karen] Charles presented the lowest rate of engagement, 55% (5/9). In the intermediate interview, he said he did not interact with the app as much because he had a busy week. He spent 10 min on average in each request and also preferred to interact with the system when he had time, despite the sound reminders. In phase 2, the media sharing phase, the engagement with the app was higher. Paul and Karen interacted with all of the media shared and Charles did not view only one of the parcels of media, interacting with 87% of them (7/8). The pattern of interaction with the app also changed in phase 2. This time, Karen and Charles interacted with the app almost daily and usually before the sound alert was triggered as a reminder. This suggests an expectation to receive the media produced by the father, which was confirmed in the posttrial interviews in which they reported being curious about what they would receive that day. Type of Media and Media Content The requests were effective in leading to self-disclosures revealing user’s personalities, memories, and relationships. For example, a response to a request for a picture and explanation of a special object by the older person is shown in. The story of this object is touching and something Paul may not have posted spontaneously on a social media site. On the basis of their experiences producing and receiving media, we asked participants about their favorite types of media and media content in each phase of the study. For Paul, the most important feature was the content of the media and not the type itself. Thus, when producing media, his least favorite was typing (text) “It was boring, I am slow (...) but not impossible.” Regarding the type of media received, he said that one of his favorites was a song snippet from his daughter singing (“You are my sunshine”). He said that this media inspired him to get back to learning the Ukulele, so that he could play that song for her in the future. Charles enjoyed more producing videos because he thought it was an opportunity for him to show something he was proud of. He also reported that he would have enjoyed recording longer videos. He enjoyed receiving the photos and videos best because they were visual. As for Karen, she enjoyed producing all types of media and was pleased that she had the opportunity to do a little bit of everything. She thought that the different types of media made the tasks more enjoyable and less predictable. When she received the media, she enjoyed text, audio, and video more than photos: The photos were not surprising, they were not new to me (...) the others were an expression of dad in that moment. [Karen] Producing Media Versus Receiving Media Both Karen and Charles preferred receiving media rather than producing them. They felt good being told good things about themselves by their father and because it was a surprise to see what their father had to say to them. Also, they considered this phase more effortless. Paul also reported that the second week was easier, but he enjoyed both producing and receiving the media: I enjoyed them (...) it was a good surprise (...) and I was proud of them [Karen and Charles] for participating (...). It was like aconversation. [Paul] Feelings of Specific Social Connectedness All participants reported feeling closer to each other and contacting each other more than usual during the Media Parcels trial. This is reflected in the relationship (RSDS) scores taken at the beginning, middle, and end of the trial shown in. Scores generally rose in the trial for Paul and Karen. Interestingly, their rise in scores was greatest in the middle of the trial, after media collection but before delivery. This suggests an effect of feeling closer to someone when encouraged to think about them through a media collection task. Charles’ scores remained about the same, perhaps because he found the exercise harder than the other two in terms of expressing his feelings (see ). Paul reported that he felt that his contact and relationship with his kids changed during the study: We ended up being more thoughtful, because of the questions asked. We have become closer and honest to each other. [Paul] He reported that producing and receiving the media and talking about the feelings associated with them made him think about being more effective and also about how to get things done in general: I realized I was letting things slide. You stimulated my attitude (...) because I had to do the activities it also encouraged me to do other things I needed to do. [Paul] He also thought that doing the activities made him think about his kids much more than usual, and he contacted them more than usual: It made me think more about emotions and feelings (...) we usually let it go and don’t make time for ourselves. I was happy to do that (...) I was relieved to have a reason to do that. [Paul] Charles reported that, for him, talking about feelings was not easy and as the activities required that he felt as though they were not simple. However, he considered that he thought and contacted his father more than usual during the study (“I did think of him more when I was doing the tasks”) and reported that he felt closer to his father when doing the tasks and when receiving the materials from him. He also pointed out that this type of intervention would have been even more relevant if they were living further apart. Karen considered that the activities made her think about her father in a different way and remember good moments from the past: It made me think about my dad in a different way. [Karen] About receiving the media, she reported: It was nice to see how much I was meaning to Dad (...) he was appreciating things. I felt loved and valued. You got a more intense relationship snapshot from us. It was interesting to see how we were interacting (...). I really enjoyed the way everything was handled. It made me feel closer to dad. It was something that brought me, my dad, and my brother together. [Karen] Study 2: Friendship Trial Engagement and Patterns of Interaction In phase 1, there was a high level of engagement with the media requests for all participants. Ronda and Irene responded to 100% (14/14) of the media requests, and Linda to 71% (10/14). Linda did not respond to any of the video requests because of difficulties using the video recording tool in the tablet, despite being trained to do so twice by the researchers. All participants interacted with the system on a daily basis, except for 1 request that Linda completed on the following day. All participants preferred to interact with the system when they had time, rather than immediately after a request or parcel had arrived. Irene and Linda only responded to the requests immediately after the sound notification in 7% (1/14) of the times, and Ronda in 28% (4/14) of the times. On average, Ronda spent 4 min 23 seconds per interaction, Irene spent 3 min 51 seconds, and Linda spent 5 min 42 seconds. The replies that took the longest were those involving existing materials, such as pictures and objects. In phase 2, the media sharing phase, the engagement of interaction with the app was 100% (9/9) for all participants. They interacted with the received media parcels on a daily basis. Regarding the sound reminder, Ronda and Irene interacted with the app in the same proportion before, after, or immediately after the reminder 33% (3/9) of the time. Linda interacted with the media parcels immediately after the sound alert 55% (5/9) of the time and before or after it 22% (2/9) of the time. This again reflects increased interest and anticipation in receiving media. Type of Media and Media Content As in study 1, the media parcels elicited from users were often more intimate than social media posts or even than things they might have said to each other face-to-face. In fact, some had the character of greeting cards that allowed people to express deeper feelings than what they are comfortable saying in person. For example, a request to record a message about her friendship with Ronda caused Irene to say the following: She is a very kind friend, very caring, very dedicated. I think that regarding my friends I am privileged. Ronda is someone that I like very much. [Irene] When we asked Ronda to say how she felt about this to us, she wrote: I appreciate the message very much and it made me emotional. I am what I am! I prioritize my friends because they are the shoulders that I lean on. Listening to the audio from Irene I feel safe and cared for. I know I can count on her friendship forever. Thank you, my friend. [Ronda] Regarding their favorite types of media, participants varied. While producing the media, Ronda liked pictures, writing, videos, and audios in that order. Her favorite tasks involved pictures because she retrieved them from old materials that reminded her of stories from the past that she had forgotten. One of her favorite tasks in the media collection phase was to talk about her favorites (singer, television show, and hobbies): Because of that I started to listen to music that I loved but had forgotten. [Ronda] About the received media parcels, she reported that she did not have a favorite type and that the most important aspect was the content. She appreciated the messages she received from the friends: I was moved and thought how true friendships are important in our lives. Who has friends has everything! [Ronda] She picked out 2 favorite media parcels: (1) the friends’ childhood stories (“They reminded me of my own childhood. We usually do not share old stories like that”); and (2) their personal profiles. This was a composite parcel made by the researchers. The format was a magazine cover with each participant’s photo and information that they had provided about themselves, in addition to the information provided from the friends to each other. She said that she really related to her own profile and was moved by it. She also thought that the profiles were a good snapshot of each of the friends. Similar to Ronda, Irene also enjoyed producing the photos: It was cool. I looked for old, forgotten photos from my friends but also family. It was good to revisit these materials. [Irene] Then her order of preference was audio, video, and text: I do not like so much to show in pictures, so I did not like very much to show my face in the videos. But the audio was fine. I also don’t like writing (...) I have never been good with the written word. [Irene] Her favorite activity was to record an audio about her childhood: It made me remember my childhood, the people from my childhood (...) it was a good time of my life. [Irene] While receiving media, she said that she enjoyed everything and that the content was more important than the format. She noted that she especially enjoyed receiving the videos and pictures and that her favorite media parcel was an audio she received from Ronda: I felt truly touched and even cried (...). I never expect compliments from other people and I don't even know if I am all that (...) I immediately picked up the phone and called her to say how much she means to me [Irene] For Linda, she enjoyed producing the types of media in the following order: text, photos, audio, and video. Although she likes to watch videos, she had difficulties using the device’s camera to record videos by herself, which was frustrating for her. The media she most enjoyed producing was to find a snippet of a song to record: I did not want to sing, but I enjoyed looking for a song that I liked to record a bit of it. [Linda] About receiving the media, she said that she appreciated all of them, irrespective of type. Producing Media Versus Receiving Media Feelings about preferring the producing or the receiving of the media parcels were different across participants. Irene preferred to receive the media: It is more fun (...) you get to know more about the other person and their feelings (...) I felt emotional and even cried over some materials [messages from the friends]. [Irene] Receiving the personal histories about the friends also made her realize that they had similar life experiences. Although she also enjoyed going through old photos because they reminded her of good times. Ronda reported that she enjoyed them both: I loved them both (...) one phase completes the other (...). If you produce something and do not get anything back, you do not get closure. Producing the materials made me rethink my life, good times and difficult ones (...) and how I have overcome the difficulties (...). I visualized myself back in time, it was as if I was reliving it. I really enjoyed it. It is an interesting approach to carry out with my other friends as well. [Ronda] About the media sharing phase, she reported: I always expected the messages as a surprise (...) the photos and audios moved me. [Ronda] As for Linda, she enjoyed producing the media parcels because she had the opportunity to revisit bits of her life and moments with the friends: It touched me (...) I got in touch with my emotions, with personal stuff. It was a bit of work having to look for old materials, but it felt good to revive the friendship (...) it was getting cold [Linda] As in study 1, receiving the media in general produced more spontaneous and emotional responses about their feelings. Feelings of Specific Social Connectedness During the study, all participants reported feeling closer to each other, thinking about each other, and getting in touch more than usual. All participants commented that during the study, they were encouraged to talk about personal things and talk about how they felt about their friendship in a way that they would not naturally do. Irene said: Sometimes it is hard for me to express certain feelings (...) this helped me to do that. [Irene] Ronda reported: These talking points do not come to our conversations by chance. The sequence of questions brought memories (...) and the opportunity to express ourselves in a different way (...) the questions helped me to express my feelings. [Ronda] Although she had a stronger bond with Irene, she reported that she got more involved with Linda as well. Irene reported that she felt closer to the friends in the media collection phase but even more in the media sharing phase. Irene was moved by the messages she received from both friends, and she decided to call them both: I called Linda and I said, “I do not say it enough but I love you (...).” I also called Ronda to say that she is really important in my life and that I don’t know what I would do without her. [Irene] After this call, Linda also called Irene once, and Irene called both friends to schedule a night out including 3 other friends. In this occasion, Linda spoke about a misunderstanding she had with Irene 10 years earlier that she still felt hurt about. Irene could not go to Linda’s birthday, so she sent a gift through a friend. Linda did not appreciate it because she would rather have Irene come over in person to bring the present. Thus, she returned the gift and never talked about it again until this moment. They said that this was a good opportunity to set things straight and get closer to each other again, and it ended in a group hug. However, Irene felt a little hurt that Linda was still mad after such a long time. Ronda also commented that she and Irene will try to include Linda more in their social gatherings: Because she has a boyfriend, we do not invite her a lot to go out with us (...) but she really enjoys our company and we will try to include her more. [Ronda] These reported feelings of closeness are reflected in a systematic rise in their RSDS scores, as shown in, at the pretrial, midtrial, and posttrial periods. The only drop was between the mid- and posttrial periods for Irene’s feelings of closeness with Linda. These went down because of the conflict over the birthday present reported above. This shows that developing relationships is a complex business. It may result in relationship work that raises contradictory feelings of closeness and distance within the same relationship pair. Discussion Principal Findings We designed a novel communication system called Media Parcels that makes time-based requests for media and distributes them within a minimal network of just a few social contacts. The social networking system we designed aimed to support older people in deepening their social connections and relationships while still respecting their privacy concerns. Broadly, our results indicated positive social effects for both deepening and developing of relationships. The elderly participants perceived personal and more intimate social connection as important to their lives, corroborating with other studies that present social integration with family, friends, or community as crucial to well-being in older age [- ]. Our participants also appreciated the computer-mediated system as a means to encourage self-disclosure and initiate conversations about feelings toward one another, with more deep and meaningful content. This result supports the findings of Lindley et al [ ] that explored the attitudes of older adults to keeping in touch with people who are important to them. The authors found that the older adults wanted to be in touch, and that staying connected was worthy of dedication. Moreover, the participants most valued the communication that is personally expressed, which requires a level of intensity that contrasts with the lightweight interaction that is increasingly afforded by new technologies. This was precisely fostered in our study by the Media Parcels system, in which social interaction topics were designed to encourage meaningful reflections and expressions of feelings. The importance of fostering relevant, meaningful social interactions is highlighted in studies by Carstensen et al [ , ], which suggest that older people are more motivated to derive emotional meaning from life and establish intimacy with other people, presenting a preference to invest in relationships that are emotionally rewarding and significant to them. Testing the Media Parcels system on a trio of family members and in a separate trio of friends exposed values common to both networks as well as values exclusive to each social group. It also revealed new opportunities for computer-mediated communication. Family Connections The different family members showed differing levels of engagement with the system across media collection and delivery phases. The older person Paul was most enthusiastic overall, and his daughter Karen was a close second. However, his son Charles started out as a skeptic who found it difficult at first to respond to media requests about his father. All three became more enthusiastic in the second phase of the study when they received media parcels relating to Paul. Karen summed up their experience about the system by saying that it brought them all together in a way that would not have happened spontaneously. This is an important observation from the daughter, as the system was configured to focus on her father and his relationship with family following the death of his wife 6 months earlier. It shows that even bilateral media sharing of this kind stimulated reflections on family as a whole and discussion outside the system that affected all relationships. Thus, the system fostered a shift in the content of the communication between the older participant and his children, from basically discussing family affairs and obligations to talking about feelings toward one another and interests. This is particularly relevant as the complex nature of family ties, that includes feelings of both togetherness and responsibilities, may produce negative feelings with greater degrees of obligation and formality associated with familial relationships when compared with friendship . Interestingly, participants told us they rarely discussed the media parcels themselves, in case they ruined the surprise of pending deliveries during the trial. The parcels were also about feelings that participants found hard to express or discuss in person. Friendship Relations Media sharing was made trilateral in the friendship trial, with three older people of differing closeness to each other. Again, we found various levels of engagement and different effects of the system across participants, but a positive endorsement from all of them in the end. In fact, Ronda wrote to us after the trial saying how much she missed the rhythm of the parcel requests and deliveries and its new kind of connection to her friends. There was greater interest in media collection between friends than in the family trial, and all the participants perceived their friendship relations as precious and important to their well-being. In the specific case of the friendship between Ronda and Irene, they even spent time with each other more frequently than with family members and often offered emotional and health-related support to each other, because of either physical distance from close relatives or not desiring to be a source of concern to them. This points out the importance of having friendships later in life and is aligned to other studies that discuss the benefits of having peer relationships on the well-being of older people [, ]. However, some points of contention were raised by the deliveries. This was most dramatically illustrated in the story of the rejected present between Irene and Linda, which raised a forgotten issue for Irene but resolved it for Linda. This example shows not only the power of the system and particular media requests to access facets of a relationship but also the dangers of doing that sometimes for relationship closeness. Facilitation A total of 2 types of facilitation seemed to be going on in the trials: (1) the media parcels themselves, as designed, were facilitating reflection and communication between parties and triggering further conversation outside the system; and (2) the human facilitator in the loop, with a background in clinical psychology, authored requests and selected responses to maximize positive effects on relationships. Concerning the media parcels themselves, we found that participants could express feelings to each other that were hard to communicate face-to-face, as in the use of greetings cards. In this respect, media requests were effective relationship probes, revealing aspects of a relationship to other partners as well as to us. Finding and selecting media to share was also motivating, especially for Ronda and Linda in the friendship trial. This caused them to retrieve forgotten images and other materials and remember the good times in the light of intervening events (see also Frohlich et al ). These findings are similar to those in a recent study of media sharing to facilitate young people’s conversations with relatives having dementia. The young people were encouraged to find media relating to the person with dementia through a system called Ticket to Talk and use these media as a kind of conversational playlist to stimulate conversation [ ]. As for the human facilitator in the loop, human facilitation amplified the effect of media exchanges by personalizing them to the participants. It also continued outside the system, as the facilitator also conducted the interviews and became a sounding board for the participants’ reflections on their relationships. In fact, the facilitator, the first author who is a trained clinical psychologist, realized that it could be a powerful tool for counseling. This raises issues for the future of the approach in terms of the levels of facilitation involved. If the intervention lasts longer than a few weeks, how personal should the media be to deepen relationships between particular people? And how important is it to have a professional facilitator designing and monitoring media? Regarding the first issue, if a system such as Media Parcels should be used for longer periods, then the content of the media requests should be balanced with deep personal content and lightweight content, so that the media exchange does not become burdensome. With respect to the second issue, in our study, the facilitator had a key role in designing the media requests and collecting and distributing the media produced by the participants. It is not uncommon to have human facilitators mediating technology or Web-based social interaction for vulnerable populations. For example, in Abrahão et al , the facilitators had a central role in helping the creation of digital storytelling by a care home elderly resident with dementia. Another example is the Scrapbook Circles network that is designed to allow disabled users to post content to friends and family through facilitators, if they wish. Similarly, the Media Parcels system could be easily scaled up to dozens of users by expanding the number of facilitators. However, personalized interventions such as the ones reported in this paper have a limit on scaling; a human facilitator dedicated to the task may be able to monitor and mediate from 3 to 4 dozens of groups weekly. In contrast, if personalization is not a requirement, the system could be scaled up to hundreds and thousands of users using predetermined templates and algorithms, such as those used in recommender systems toward suggesting books and songs. Also, by indicating users’ relationships in the system, it is feasible to create algorithms that automatize content distribution, so received media can be redirected without the need of facilitators. The ESPIM system used to deploy Media Parcels already allows the use of predefined templates and automatic media distribution. The figure of the human facilitator could also be removed by adding in the system functionality of direct communication between participants over a predefined set of conversational topics and media sharing requests. Future research could explore both options to reveal more about the role of media in deepening relationships at a distance, especially for the older population. Communication The communication dynamics of the Media Parcels system was unusual: (1) it was facilitated by a human who administered a time-based dialogue; (2) the pace of the facilitator-participant dialogue was slow, ranging from 1-3 times a day; (3) the explicit separation of the collection and delivery phases allowed us to assess the effects of each phase; (4) the distinct phases introduced delay into the communication, resulting in media exchange that was neither wholly asynchronous nor wholly synchronous; and (5) the introduction of a delay into the communication resulted in anticipation of media deliveries in which participants met the parcels as they arrived in real time. Such communication dynamics could be adapted within the current system design. For example, the time-based dialogs could make use of different media requests between different configurations of people within a wider network, interleaved more closely in time with their delivery. Our findings from study 1 support the evolution of an intervention approach that could be offered professionally to individuals as a kind of relationship therapy. Moreover, the findings from study 2 support a self-paced long-term approach of unfacilitated media sharing within small groups. To make this sustainable, message requests might come from friends themselves. In this case, the figure of the human facilitator could be removed by adding to the system features that include direct communication between participants, supported by algorithms processing an ever-growing context-based (eg, time and location) list of conversational topics and media sharing requests. Conclusions The Media Parcels system was an effective approach to promote media sharing of emotional content for the elderly population that participated in this research. Although the system was tested in only 2 trios of users, it was suitable to promote communication and deepen social relations between participants from different generations (as in study 1) or from the same generation (as in study 2). It can be expected that similar results could be generalizable to the elderly population with characteristics comparable with our sample. In addition, the participants reported to feel motivated to produce and receive personal media content throughout the study. It is possible, though, that the interest in the use of the system could diminish over time because the system is not novel anymore or producing the media is too burdensome. Nevertheless, the social and personal nature of the media exchange could be motivating to keep users engaged in communication, especially if they feel socially isolated. Moreover, it could be easier for users to keep using the system for longer periods of time if the media requests for deep personal content are balanced with lightweight content and if the users are able to create their own threads of conversation. In fact, the use of a system such as Media Parcels is not necessarily intended to be of long-term. The length of use can be determined, for example, by a health care professional facilitator, focusing on shorter interactions between users according to therapeutic goals. The Media Parcels design presents a novel solution for including older adults in social media sharing by introducing the concept of intimate directed continuous slow media sharing, which is different from the existing online communities. Our trial showed that the parcel metaphor applied to media content was easily understood by the older population, and the supporting computational system was easy enough to be quickly adopted. As far as future study is concerned, the authors plan to conduct research expanding the number of participants in a group, targeting specifically older people that are classified as lonely or socially disconnected. Acknowledgments IZ was supported by São Paulo Research Foundation FAPESP (Grant Numbers 2017/09549-6 and 2015/18117-7). This study was also supported by funding from FAPESP (Grant Numbers 2016/00351-6 and 2016/50489-4), Conselho Nacional de Desenvolvimento Científico e Tecnológico (Grant Number 312058/2015-2), and Coordenação de Aperfeiçoamento de Pessoal de Nível Superior, Brazil—Finance Code001. Conflicts of Interest None declared. Relationship semantic differential scale.PDF File (Adobe PDF File), 39 KB Participants’ evaluation of their relationship toward one another according to RSDS scores.PNG File , 8 KB Participants’ evaluation of their relationship toward one another according to RSDS scores.PNG File , 20 KB References - Lee RM, Robbins SB. The relationship between social connectedness and anxiety, self-esteem, and social identity. J Couns Psychol 1998;45(3):338-345 [FREE Full text] [CrossRef] - Lee R, Steven B, Robbins SB. Understanding social connectedness in college women and men. J Couns Dev 2000;78(4):484-491. [CrossRef] - van Bel DT, Smolders KC, IJsselsteijn WA, de Kort Y. Social connectedness: concept and measurement. Intel Environ 2009;2:67-74. [CrossRef] - Population Division - United Nations Population Division. 2017. World Population Prospects: Key Findings and Advance Tables URL: https://population.un.org/wpp/Publications/Files/WPP2017_KeyFindings.pdf [accessed 2019-08-15] [WebCite Cache] - World Health Organization. 2015. World Report on Ageing and Health URL: https://apps.who.int/iris/bitstream/handle/10665/186463/9789240694811_eng.pdf [accessed 2019-08-15] [WebCite Cache] - Bowling A, Dieppe P. What is successful ageing and who should define it? Br Med J 2005 Dec 24;331(7531):1548-1551 [FREE Full text] [CrossRef] [Medline] - Ward E, Barnes M, Gahagan B. The University of Brighton. 2012. Well-Being in Old Age: Findings From Participatory Research URL: https://research.brighton.ac.uk/en/publications/well-being-in-old-age-findings-from-participatory-research [accessed 2019-08-15] [WebCite Cache] - Grewal I, Lewis J, Flynn T, Brown J, Bond J, Coast J. Developing attributes for a generic quality of life measure for older people: preferences or capabilities? Soc Sci Med 2006 Apr;62(8):1891-1901. [CrossRef] [Medline] - McLaughlin SJ, Jette AM, Connell CM. An examination of healthy aging across a conceptual continuum: prevalence estimates, demographic patterns, and validity. J Gerontol A Biol Sci Med Sci 2012 Jun;67(7):783-789 [FREE Full text] [CrossRef] [Medline] - Cornwell B, Laumann EO, Schumm LP. The social connectedness of older adults: a national profile*. Am Sociol Rev 2008;73(2):185-203 [FREE Full text] [CrossRef] [Medline] - World Health Organization. 2002. Active Ageing: A Policy Framework URL: https://apps.who.int/iris/bitstream/handle/10665/67215/WHO_NMH_NPH_02.8.pdf [accessed 2019-08-15] [WebCite Cache] - Office for National Statistics. 2018. Internet Access – Households and Individuals, Great Britain: 2018 URL: https://www.ons.gov.uk/peoplepopulationandcommunity/householdcharacteristics/homeinternetandsocialmediausage/bulletins/internetaccesshouseholdsandindividuals/2018 [accessed 2019-08-15] - IBGE | Agência de Notícias. 2017. Continuous PNAD - ICT 2017: Internet Reaches Three of Every Four Households in the Country URL: https://agenciadenoticias.ibge.gov.br/en/agencia-press-room/2185-news-agency/releases-en/23453-continuous-pnad-ict-2017-internet-reaches-three-in-every-four-households-in-the-country [accessed 2019-08-15] - Pew Research Center. 2019. Mobile Fact Sheet URL: https://www.pewinternet.org/fact-sheet/mobile/ [accessed 2019-08-15] - Pimentel MG, Cunha BC, Antonelli HL, Rodrigues SS, Neto OJ, Rocha AC, et al. Enhancing Older Adults Connectivity by Introducing Mobile Devices Communication Tools. In: Proceedings of the 7th International Conference on Software Development and Technologies for Enhancing Accessibility and Fighting Info-Exclusion. 2016 Presented at: DSAI'16; December 1-3, 2016; Vila Real, Portugal p. 353-361 URL: https://dl.acm.org/citation.cfm?id=3019994 [CrossRef] - Lindley SE, Harper R, Sellen A. Designing for Elders: Exploring the Complexity of Relationships in Later Life. In: Proceedings of the 22nd British HCI Group Annual Conference on People and Computers: Culture, Creativity, Interaction. 2008 Presented at: BCS-HCI'08; September 1-5, 2008; Liverpool, United Kingdom p. 77-86. [CrossRef] - Pedell S, Vetere F, Kulik L, Ozanne E, Gruner A. Social Isolation of Older People: The Role of Domestic Technologies. In: Proceedings of the 22nd Conference of the Computer-Human Interaction Special Interest Group of Australia on Computer-Human Interaction. 2010 Presented at: OZCHI'10; November 22-26, 2010; Brisbane, Australia p. 164-167. [CrossRef] - van Dijck J. Mediated Memories in the Digital Age. First Edition. Palo Alto, California: Stanford University Press; 2007. - Sarvas R, Frohlich DM. From Snapshots to Social Media - The Changing Picture of Domestic Photography. First Edition. London: Springer; 2011. - Dib L, Petrelli D, Whittaker S. Sonic Souvenirs: Exploring the Paradoxes of Recorded Sound for Family Remembering. In: Proceedings of the 2010 ACM Conference on Computer Supported Cooperative Work. 2010 Presented at: CSCW'10; February 6-10, 2010; Savannah, Georgia, USA p. 391-400. [CrossRef] - Kirk DS, Sellen A. On human remains: values and practice in the home archiving of cherished objects. ACM Trans Comput-Hum Interact 2010 Jul 1;17(3):10-53. [CrossRef] - Park N, Jin B, Jin SA. Effects of self-disclosure on relational intimacy in Facebook. Comput Human Behav 2011 Sep;27(5):1974-1983. [CrossRef] - Orben AC, Dunbar RI. Social media and relationship development: the effect of valence and intimacy of posts. Comput Human Behav 2017 Aug;73:489-498. [CrossRef] - Rebelo C. The use of the internet and Facebook by the elders in Portugal: an exploratory study. Observatorio 2015;9(3):129-153 [FREE Full text] - Chakraborty R, Vishik C, Rao HR. Privacy preserving actions of older adults on social media: exploring the behavior of opting out of information sharing. Decis Support Syst 2013 Nov;55(4):948-956. [CrossRef] - Sinclair TJ, Grieve R. Facebook as a source of social connectedness in older adults. Comput Human Behav 2017 Jan;66(5):363-369. [CrossRef] - Quinn K. Cognitive effects of social media use: a case of older adults. Soc Media Soc 2018 Jul 19;4(3):205630511878720. [CrossRef] - Chen YR, Schulz PJ. The effect of information communication technology interventions on reducing social isolation in the elderly: a systematic review. J Med Internet Res 2016 Jan 28;18(1):e18 [FREE Full text] [CrossRef] [Medline] - Karimi A, Neustaedter C. From High Connectivity to Social Isolation: Communication Practices of Older Adults in the Digital Age. In: Proceedings of the ACM 2012 Conference on Computer Supported Cooperative Work Companion. 2012 Presented at: CSCW'12; February 11-15, 2012; Seattle, Washington, USA p. 127-130 URL: http://doi.acm.org/10.1145/2141512.2141559 [CrossRef] - Taipale S, Farinosi M. The Big Meaning of Small Messages: The Use of WhatsApp in Intergenerational Family Communication. In: Proceedings of the International Conference on Human Aspects of IT for the Aged Population. 2018 Presented at: ITAP'18; July 15–20, 2018; Las Vegas, NV, USA p. 532-546 URL: https://link.springer.com/chapter/10.1007/978-3-319-92034-4_40 [CrossRef] - Waycott J, Davis H, Vetere F, Morgans A, Gruner A, Ozanne E, et al. Captioned Photographs in Psychosocial Aged Care: Relationship Building and Boundary Work. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 2014 Presented at: CHI'14; April 26-May 1, 2014; Toronto, Ontario, Canada p. 4167-4176 URL: https://dl.acm.org/citation.cfm?id=2557290 [CrossRef] - Cornejo R, Tentori M, Favela J. Enriching in-person encounters through social media: a study on family connectedness for the elderly. Int J Hum-Comput St 2013 Sep;71(9):889-899. [CrossRef] - Zargham S, Ćalić J, Frohlich DM. 4streams: An Ambient Photo Sharing Application for Extended Families. In: Proceedings of the 2015 British HCI Conference. 2015 Presented at: British HCI'15; July 13-17, 2015; Lincoln, Lincolnshire, United Kingdom p. 165-174 URL: https://dl.acm.org/citation.cfm?id=2783589 [CrossRef] - Garattini C, Wherton J, Prendergast D. Linking the lonely: an exploration of a communication technology designed to support social interaction among older adults. Universal Access Inf Soc 2011 Jun 7;11(2):211-222. [CrossRef] - Abrahão AR, da Silva PF, Frohlich DM, Chrysanthaki T, Gratão A, Castro P. Mobile Digital Storytelling in a Brazilian Care Home. In: Proceedings of the International Conference on Human Aspects of IT for the Aged Population. 2018 Presented at: ITAP'18; July 15-20, 2018; Las Vegas, NV, USA p. 403-421. [CrossRef] - Zaine I, Rodrigues KR, Cunha BC, Viel CC, Orlando AF, Neto OJ, et al. ESPIM: An Ubiquitous Data Collection and Programmed Intervention System using ESM and Mobile Devices. In: Proceedings of the 22nd Brazilian Symposium on Multimedia and the Web. 2016 Presented at: Webmedia'16; November 8-11, 2016; Teresina, Piauí State, Brazil p. 13-14 URL: https://dl.acm.org/citation.cfm?id=2988222 [CrossRef] - Viel CC, Rodrigues KR, Zaine I, Cunha BC, Scalco LF, Pimentel MG. Personalized Ubiquitous Data Collection and Intervention as Interactive Multimedia Documents. In: Proceedings of the 2017 ACM Symposium on Document Engineering. 2017 Presented at: DocEng'17; September 4-7, 2017; Valletta, Malta p. 223-226 URL: https://dl.acm.org/citation.cfm?id=3121046 [CrossRef] - Csikszentmihalyi M, Larson R. Validity and reliability of the experience-sampling method. J Nerv Ment Dis 1987 Sep;175(9):526-536. [CrossRef] [Medline] - Skinner BF. Programmed instruction revisited. Phi Delta Kappan 1986;68(2):103-110 [FREE Full text] - Cunha BC, Rodrigues KH, Zaine I, Scalco LF, Viel CC, Pimentel MG. Web-Based Authoring of Multimedia Intervention Programs for Mobile Devices: A Case Study on Elderly Digital Literacy. In: Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing. 2019 Presented at: SAC'19; April 8-12, 2019; Limassol, Cyprus p. 484-491. [CrossRef] - Schlochtermeier LH, Pehrs C, Kappelhoff H, Kuchinke L, Jacobs AM. Emotion processing in different media types: realism, complexity, and immersion. J Syst Integr Neurosci 2015;1(2):41-47. [CrossRef] - Dougher MJ, Hayes SC. Clinical Behavior Analysis. Oakland, California: Context Press; 2000. - Gaver WW, Dunne A, Pacenti E. Design: cultural probes. Interactions 1999;6(1):21-29. [CrossRef] - Folstein MF, Folstein SE, McHugh PR. 'Mini-mental state'. A practical method for grading the cognitive state of patients for the clinician. J Psychiatr Res 1975 Nov;12(3):189-198. [CrossRef] [Medline] - Osgood CE, Suci GJ, Tannenbaum P. The Measurement of Meaning. First Edition. Champaign, USA: University of Illinois Press; 1957. - Neves BB, Amaro F. Too old for technology? How the elderly of Lisbon use and perceive ICT. J Community Inform 2012;8(1):189-194 [FREE Full text] - Laugwitz B, Held T, Schrepp M. Construction and Evaluation of a User Experience Questionnaire. In: Proceedings of the Symposium of the Austrian HCI and Usability Engineering Group. 2008 Presented at: USAB'08; November 20-21, 2008; Graz, Austria p. 63-76. [CrossRef] - Brooke J. SUS: a quick and dirty usability scale. In: Jordan PW, Thomas B, Weerdmeester BA, McClelland IL, editors. Usability Evaluation In Industry. London: Taylor & Francis; 1996:189-194. - Díaz-Bossini JM, Moreno L. Accessibility to mobile interfaces for older people. Procedia Comput Sci 2014;27:57-66 [FREE Full text] [CrossRef] - Petrovčič A, Taipale S, Rogelj A, Dolničar V. Design of mobile phones for older adults: an empirical analysis of design guidelines and checklists for feature phones and smartphones. Int J Hum-Comput Int 2017 Sep 5;34(3):251-264. [CrossRef] - Lindley SE, Harper R, Sellen A. Desiring to Be in Touch in a Changing Communications Landscape: Attitudes of Older Adults. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 2009 Presented at: CHI'09; April 4-9, 2009; Boston, MA, USA p. 1493-1702. [CrossRef] - Carstensen LL, Fung HH, Charles ST. Socioemotional selectivity theory and the regulation of emotion in the second half of life. Motiv Emot 2003;27(2):103-123 [FREE Full text] [CrossRef] - Carstensen LL, Gross JJ, Fung HH. The social context of emotional experience. Annu Rev Gerontol Geriatr 1998;17(1):325-352 [FREE Full text] [CrossRef] - Rook KS. Reciprocity of social exchange and social satisfaction among older women. J Pers Soc Psychol 1987;52(1):145-154 [FREE Full text] [CrossRef] - Adams RG, Blieszner R. Aging well with friends and family. Am Behav Sci 2016 Jul 27;39(2):209-224 [FREE Full text] [CrossRef] - Fiori KL, Antonucci TC, Cortina KS. Social network typologies and mental health among older adults. J Gerontol B Psychol Sci Soc Sci 2006 Jan 1;61(1):P25-P32. [CrossRef] - Frohlich DM, Wall S, Kiddle G. Rediscovery of forgotten images in domestic photo collections. Pers Ubiquitous Comput 2012 Nov 8;17(4):729-740 [FREE Full text] [CrossRef] - Welsh D, Morrissey K, Foley S, McNaney R, Salis C, McCarthy J, et al. Ticket to Talk: Supporting Conversation Between Young People and People with Dementia Through Digital Media. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. 2018 Presented at: CHI'18; April 21-26, 2018; Montreal QC, Canada. [CrossRef] Abbreviations |ESPIM: Experience Sampling and Programmed Intervention Method| |RSDS: Relationship Semantic Differential Scale| |SUS: System Usability Scale| |UEQ: User Experience Questionnaire| Edited by G Eysenbach; submitted 29.03.19; peer-reviewed by J Favela, W Zhang, M Khazaee-Pool; comments to author 18.05.19; revised version received 12.07.19; accepted 21.07.19; published 03.10.19 Copyright ©Isabela Zaine, David Mark Frohlich, Kamila Rios Da Hora Rodrigues, Bruna Carolina Rodrigues Cunha, Alex Fernando Orlando, Leonardo Fernandes Scalco, Maria Da Graça Campos Pimentel. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 03.10.2019 This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in the Journal of Medical Internet Research, is properly cited. The complete bibliographic information, a link to the original publication on http://www.jmir.org/, as well as this copyright and license information must be included.
https://www.jmir.org/2019/10/e14112
From psychotherapy to education, Virtual Reality has became a tool applied in many fields. In fact, this technology provides the opportunity to embody, live, and understand existent realities and possible futures. This is particularly interesting to encourage behavioral change for sustainability. By bringing psychologically distant events (both in time and space, as social inequalities or climate change) to people’s immediate reality, the relationship between human behavior and its impact can be made less abstract. VR has therefore the potential to foster social impact by showing the possible futures the individual can contribute to. NGOs are already making use of this technology to display their projects and their impact in the communities, which allows to present different perspectives and open dialogue between stakeholders. Even though VR experiences are currently human-assisted, the technology is on the way to becoming a mass consumer product, that can be used without any external support. Apart from the technical improvements to make it more affordable and convenient for user adoption, we need to be, as with all new technologies, aware of any ethical concerns that could emerge. As part of a cooperation between swissnex Brazil and oikos International, the webinar on “VR for Sustainability” will present how VR can be employed in the education and sensitization to sustainability issues. With Pedro Kayatt, Founder of VRMonkey, Bruno Weis, Communication Coordinator at Instituto Socioambiental – ISA , Philippe Bertrand, Co-Founder of BeAnotherLab and Maximilian Stoller, Founder of respecTomorrow, we invite NGOs, educational institutions and sustainability-oriented organizations to explore with us the state of the art of VR in Brazil, some ethical concerns about this technology and examples of its application in sustainably-related projects.
https://oikos-international.org/news/vr4sustainability-how-virtual-reality-can-change-our-behaviors-oikos-swissnex-brazil-webinar/
RESTRICTIONS: NONE _____________________________________________________ The Computer Incident Advisory Capability ___ __ __ _ ___ / | / \ / \___ __|__ /___\ \___ _____________________________________________________ Information Bulletin Revised Hewlett-Packard NIS ypbind Vulnerability January 22, 1993, 1400 PST Number D-05 _________________________________________________________________________ PROBLEM: Allows unauthorized access to NIS data. PLATFORM: HP/UX Operating System for series 300, 700, and 800 computers. DAMAGE: Remote and local users can obtain unauthorized privileges. SOLUTION: Install revised patches. _________________________________________________________________________ Critical Information about Hewlett-Packard NIS ypbind The inclosed advisory was issued by the Computer Emergency Response Team Coordination Center (CERT/CC) and is an update to a previous advisory CA-92:17. ============================================================================= CA-93:01 CERT Advisory January 13, 1993 Revised Hewlett-Packard NIS ypbind Vulnerability ----------------------------------------------------------------------------- *** THIS IS A REVISED CERT ADVISORY *** *** IT CONTAINS NEW INFORMATION REGARDING AVAILABILITY OF IMAGE KITS *** *** SUPERSEDES CERT ADVISORY CA-92:17 *** The CERT Coordination Center has received information concerning a vulnerability in the NIS ypbind module for the Hewlett-Packard (HP) HP/UX Operating System for series 300, 700, and 800 computers. HP has provided revised patches for all of the HP/UX level 8 releases (8.0, 8.02, 8.06, and 8.07). This problem is fixed in HP/UX 9.0. The following patches have been superseded: Patch ID Replaced by Patch ID PHNE_1359 PHNE_1706 PHNE_1360 PHNE_1707 PHNE_1361 PHNE_1708 All HP NIS clients and servers running ypbind should obtain and install the patch appropriate for their machine's architecture as described below. ----------------------------------------------------------------------------- I. Description A vulnerability in HP NIS allows unauthorized access to NIS data. II. Impact Root on a remote host running any vendor's implementation of NIS can gain root access on any local host running HP's NIS ypbind. Local users of a host running HP's NIS ypbind can also gain root access. III. Solution 1) All HP NIS clients and servers running ypbind should obtain and install the patch appropriate for their machine's architecture. These patches contain a version of ypbind that accepts ypset requests only from a superuser port on the local host. This prevents a non-superuser program from sending rogue ypset requests to ypbind. The patches also include the mod from the superseded patches that prevents a superuser on a remote system from issuing a ypset -h command to the local system and binding the system to a rogue ypserver. These patches may be obtained from HP via FTP (this is NOT anonymous FTP) or the HP SupportLine. To obtain HP security patches, you must first register with the HP SupportLine. The registration instructions are available via anonymous FTP at cert.org (192.88.209.5) in the file "pub/vendors/hp/supportline_and_patch_retrieval". The new patch files are: Architecture Patch ID Filename Checksum ------------ -------- -------- -------- Series 300 PHNE_1706 /hp-ux_patches/s300_400/8.X/PHNE_1706 38955 212 Series 700 PHNE_1707 /hp-ux_patches/s700/8.X/PHNE_1707 815 311 Series 800 PHNE_1708 /hp-ux_patches/s800/8.X/PHNE_1708 56971 299 2) The instructions for installing the patch are provided in the PHNE_xxxx.text file (this file is created after the patch has been unpacked). The checksums listed above are for the patch archive files from HP. Once unpacked, each shell archive contains additional checksum information in the file "patchfilename.text". This checksum is applicable to the binary patch file "patchfilename.updt". If you have any questions about obtaining or installing the patches, contact the USA HP SupportLine at 415-691-3888, or your local HP SupportLine number. Please note that the telephone numbers in this advisory are appropriate for the USA and Canada. ----------------------------------------------------------------------------- The CERT Coordination Center wishes to thank Brian Kelley of Ford Motor Company for bringing this vulnerability to our attention. We would also like to thank Hewlett-Packard for their response to this problem. ----------------------------------------------------------------------------- =========================================================================== CIAC would like to acknowledge the contributions of: CERT/CC. For additional information or assistance, please contact CIAC at (510)422-8193/FTS or send E-mail to [email protected]. FAX messages to (510)423-8002/FTS. The CIAC Bulletin Board, Felicia, can be accessed at 1200 or 2400 baud at (510) 423-4753 and 9600 baud at (510) 423-3331. Previous CIAC bulletins and other information is available via anonymous ftp from irbis.llnl.gov (ip address 128.115.19.60). PLEASE NOTE: Many users outside of the DOE and ESnet computing communities receive CIAC bulletins. If you are not part of these communities, please contact your agency's response team to report incidents. Some of the other teams include the NASA NSI response team, DARPA's CERT/CC, NAVCIRT, and the Air Force response team. Your agency's team will coordinate with CIAC. The Forum of Incident Response and Security Teams (FIRST) is a world-wide organization. A list of FIRST member organizations and their constituencies can be obtained by sending email to [email protected] with a null subject line, and the first line of the message reading: send first-contacts. This document was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor the University of California nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation or favoring by the United States Government or the University of California. The views and opinions of authors expressed herein do not necessarily state or reflect those of the United States Government or the University of California, and shall not be used for advertising or product endorsement purposes.
Standardizing & Evaluating Communications is Helping Hospitals with Top Initiatives Recently, Vyne Medical partnered with NAHAM to sponsor a webinar on standardizing patient financial communications. In the session “Talking Costs with Patients—An Organizational Effort” 650+ Directors, Managers, and Supervisors from national hospitals and health systems shared their top initiative is increasing up-front collections followed by denials management. As shared by Sandra Clay-Hillyard, Director of Patient Access at Lowell General Hospital, they are increasing up-front collections by standardizing patient financial communications. They are able to monitor communication with patients by using tools that track what is being said to each patient. Below are the survey results from the webinar: QUESTION 1: WHICH OF THE FOLLOWING IS A TOP INITIATIVE IN YOUR HOSPITAL OR HEALTH SYSTEM OVER THE NEXT 6-12 MONTHS? Increasing up-front collections is the biggest priority of patient access directors, managers and supervisors. QUESTION 2: DOES YOUR HOSPITAL RECORD PATIENT FINANCIAL PHONE ENCOUNTERS? Of the 650+ webinar attendees surveyed, 45% answered they are recording calls with patients to review for quality, along with 17% who are not but planning to in the future. QUESTIONS 3: DOES YOUR HOSPITAL USE A QUALITY ASSURANCE TOOL TO MONITOR VERBAL CONVERSATIONS? 49% of those surveyed are using a quality assurance tool to monitor verbal conversations, while 25% are not but planning to do so. QUESTION 4: DOES YOUR HOSPITAL RECORD FACE TO FACE VERBAL ENCOUNTERS IN EITHER REGISTRATION, FINANCIAL COUNSELING, OR UPFRONT COLLECTIONS? Two-thirds of attendees surveyed answered they do not record face-to-face conversations. Trace offers hospitals the resources to record all conversations for quality reviews, including those that occur in person, to ensure all communication is being evaluated for improvement. QUESTION 5: DO YOU HAVE A VARIETY OF OPTIONS FOR PATIENTS TO MAKE PAYMENTS? About the webinar In its journey to put patients first, Lowell General discovered a gap in its efforts to standardize patient financial communications. Lack of consistency, training and buy-in among staff led to issues with both patient experience and upfront collections. Leaders created a plan to hardwire patient financial conversations, helping staff understand what to say to patients and why. This session shared how Lowell General built a culture where all areas of the organization understand that patient financial matters are part of the overall health of the patient. Learn about strategies and tools that will help your organization talk about cost with patients. WATCH THE FULL WEBINAR TO LEARN MORE. To learn more about call recording and Trace Quality Assurance, email us at [email protected].
https://vynemedical.com/blog/standardizing-evaluating-communications-is-helping-hospitals-with-top-initiatives/
Doornbos was leaving a Chicago train station when a plainclothes police officer confronted him, grabbed him, and with the help of other plainclothes officers, forced him to the ground. Doornbos was acquitted of resisting arrest. He sued the officers and the city for excessive force and malicious prosecution, claiming that Officer Williamson failed to identify himself as an officer and then used excessive force. Williamson claims that he properly identified himself and that Doornbos fled when Williamson attempted to stop and frisk him. The Seventh Circuit vacated a verdict in favor of the defendants. The court properly admitted evidence that Dornbos had marijuana in his pocket. Although the marijuana was unknown to the officers at the time, it arguably tended to corroborate their account of Doornbos’s behavior. The jury instructions on Terry stops, however, were inadequate. Over Doornbos’s objection, the court instructed the jury only on investigatory stops but not frisks. Williamson’s testimony indicated that he was starting a frisk when he first approached Doornbos and that he did not have reasonable suspicion that Doornbos was armed and dangerous. Doornbos was entitled to have the jury know that the attempted frisk, which produced the use of force, was unjustified. In addition, the jury asked whether plainclothes officers must identify themselves when conducting a stop. The judge said no. In all but the most unusual circumstances, where identification would itself make the situation more dangerous, plainclothes officers must identify themselves when initiating a stop. These errors were not harmless. In the United States Court of Appeals For the Seventh Circuit ____________________ No. 16-1770 JOSEPH DOORNBOS, Plaintiff-Appellant, v. CITY OF CHICAGO, et al., Defendants-Appellees. ____________________ Appeal from the United States District Court for the Northern District of Illinois, Eastern Division. No. 13–cv–06021 — John J. Tharp, Jr, Judge. ____________________ ARGUED APRIL 19, 2017 — DECIDED AUGUST 18, 2017 ____________________ Before BAUER, POSNER, and HAMILTON, Circuit Judges. HAMILTON, Circuit Judge. Plaintiff Joseph Doornbos was leaving a Chicago train station when a plainclothes police officer confronted him, grabbed him, and with the help of two other plainclothes officers, forced him to the ground. Doornbos was acquitted in a criminal trial for resisting arrest. He then filed this suit against the three officers and the City of Chicago for excessive use of force and malicious prosecution. Doornbos contends that Officer Williamson failed to identify 2 No. 16-1770 himself as an officer and then used excessive force to tackle and subdue him. Officer Williamson claims that he properly identified himself as a police officer and that Doornbos fled when Williamson attempted to stop and frisk him. The case went to trial, and the jury returned a verdict in favor of the officer-defendants. On appeal, Doornbos argues that the district court erred in two ways: by admitting evidence that he had marijuana in his pocket at the time of the incident, and by improperly instructing the jury about investigatory Terry stops. We find that the district court did not abuse its discretion by admitting the marijuana evidence. Although the marijuana was unknown to the officers at the time they used force against Doornbos, it was evidence that arguably tended to corroborate their account of Doornbos’s behavior. The jury instructions on Terry stops, however, were inadequate. Over Doornbos’s objection, the court instructed the jury only on investigatory stops but not frisks. Yet Officer Williamson’s own testimony indicates that he was starting a frisk when he first approached Doornbos. His own testimony also makes clear that he did not have reasonable suspicion that Doornbos was armed and dangerous. Doornbos was entitled to have the jury know that the attempted frisk, which even the defense says produced the use of force, was unjustified. The court erred further during deliberations. The jury asked the judge whether plainclothes officers are required to identify themselves when they conduct a stop. The judge said no. We conclude that the answer is yes. In all but the most unusual circumstances, where identification would itself make the situation more dangerous, plainclothes officers must identify themselves when they initiate a stop. Because these errors No. 16-1770 3 were not harmless, we vacate the judgment for defendants and remand for a new trial. I. Factual and Procedural Background A. Confrontation at the Wilson Avenue Station On February 15, 2013, Doornbos took a local Chicago train to visit a friend’s home. At approximately 7:30 p.m., he got off the train at the Wilson Avenue stop in the Uptown neighborhood of Chicago. As Doornbos left the station he was approached by Officer Williamson. The officer was dressed in jeans, a black hooded sweatshirt, a jacket, and a baseball cap. Here the accounts diverge. According to Officer Williamson’s trial testimony, he saw Doornbos holding a large can of beer that was partially covered by a brown bag. He did not see Doornbos drink the beer, nor could he tell if the can of beer was even open. Nonetheless, he decided to investigate further. (A Chicago Transit Authority ordinance prohibits possessing an open container of alcohol while using the transportation system. See Chicago Transit Auth. Ordinance No. 016-110, Sec. 1(4) (2016), available at http://www.transitchicago.com/assets/1/ordinances/01 6-_110.pdf.) Williamson testified that as Doornbos left through the turnstiles, he approached Doornbos, said “Chicago police officer,” and lifted his shirt to display his belt, on which were clipped a badge, gun, and handcuff case. As Officer Williamson drew near to Doornbos, he reached out with one hand to grab Doornbos’s arm. Williamson testified that he reached out to frisk Doornbos for weapons. When asked in the trial why he thought Doornbos might be armed, Williamson said that it was a high-crime area, it was dark, Doornbos may have been breaking the law by drinking beer, 4 No. 16-1770 and Doornbos was wearing a jacket with “deep pockets” in which he “could have hidden anything.” Officer Williamson testified that as he reached out to grab Doornbos, Doornbos pushed him away, dropped the beer, and tried to run. He grabbed Doornbos’s jacket, and Doornbos dragged him approximately twenty feet. Williamson testified that Doornbos was screaming loudly for help and yelling that he was being robbed, but that Williamson was saying “stop, police.” After Doornbos started to stumble, Williamson testified that they “basically fell to the ground together,” or as he described it later, he “forcibly guide[d] him to the ground.” Doornbos was still screaming for help, and two other officers came to help Officer Williamson, not Doornbos. The officers found in Doornbos’s pocket a small amount of marijuana worth around five dollars. After Doornbos was restrained, Officer Williamson said he went back and inspected the beer can. He testified that it was unopened, and he did not collect it as evidence. Doornbos provided a very different account. He testified that he was not carrying a beer can at all. After he walked through the turnstile, he said, a man suddenly grabbed him: “I thought I was being robbed. So I started screaming for help, hoping someone would call the police.” In fact, four people who saw or heard the incident called 911 and reported that a man was being attacked or robbed outside the station. Doornbos’s testimony regarding whether and when Officer Williamson said “stop” or “police” was not entirely consistent. During trial Doornbos emphasized that he “wasn’t sure of the timing. It happened really fast.” Doornbos initially testified at trial that he did not hear Williamson identify himself as an officer before being tackled. He later said that he No. 16-1770 5 heard “police” before being thrown to the ground, and then said that he did not hear “police.” Doornbos also testified at trial that he might have heard “stop” after testifying that he actually did hear “stop.” Doornbos testified that he was “not 100 percent sure” because the confrontation “happened very quickly.” Doornbos testified that he twisted his arm to get away from a man he thought was attacking him, but as he was turning he was “tackled and thrown to the ground.” He said that he was able to move only three to four steps before the three men in civilian clothes threw him down. After the men handcuffed him, Doornbos realized they were police officers and stopped resisting. He sustained minor injuries from the confrontation. He also testified that he was disoriented and upset after the sudden tackle, that one officer mocked him for crying, and that another officer made fun of his “fag” clothing. B. Criminal Prosecution and Trial Doornbos was charged with resisting arrest and possession of cannabis. The cannabis charge was dismissed, and in June 2013 Doornbos went to trial on the charge for resisting arrest. Doornbos, Officer Williamson, and another officer at the scene testified at the trial. The court acquitted Doornbos, emphasizing that the officers provided inconsistent and “very unusual” accounts of the alleged beer can, which was never taken into evidence. The court also noted that the officers never told Doornbos he was under arrest or even asked to see the beer can: The defendant is charged with resisting arrest. There’s no testimony to indicate the defendant was ever told he was under arrest by any police 6 No. 16-1770 officer. If the beer can was closed and sealed as the officers suggest, there would be absolutely no reason to arrest the defendant at all. And there is no testimony of the officer approaching the defendant saying let’s see the beer can, or is that beer can open or closed. So there’s not even a question posed to the defendant regarding the status of the beer if that’s the reason why the defendant is being stopped and detained at all. Finally, the court emphasized that the officers were in plain clothes rather than in uniform, and Doornbos did not appear to know they were police officers: “it absolutely makes sense that anybody at the [train station] at that particular location grabbed by somebody could well think that he is being manhandled or potentially robbed which is consistent with what the defendant is alleged to have said, I’m being robbed.” The court noted that if there were “any doubt” about whether Doornbos knew the men were police officers, it was dispelled by Doornbos’s shouts for help and the officer’s response: “the officer puts the badge in [Doornbos’s] face because it was abundantly clear to the officer that he wasn’t aware that they were police officers.” C. Civil Lawsuit and Jury Trial After Doornbos was acquitted on the criminal charge, he filed this civil suit under 42 U.S.C. § 1983 against the City of Chicago and the three officers: Michael Williamson, Alan Yakes, and Robert Capiak. The complaint alleged excessive use of force and failure to intervene in violation of the Fourth Amendment and malicious prosecution under Illinois common law. The case was tried to a jury. No. 16-1770 7 During the pretrial proceedings, Doornbos filed a motion in limine to bar evidence that he possessed marijuana at the time of the arrest. He argued that it was not relevant under Federal Rule of Evidence 402 and that it was unfairly prejudicial under Rule 403. The district court denied his motion. It concluded that Doornbos’s possession of marijuana was relevant because it was evidence that could corroborate either side’s version of events. Evidence of the marijuana in Doornbos’s pocket could help explain why he might have reacted in the way the officers alleged, i.e., attempting to flee and resisting arrest. The court concluded that whatever prejudice might result was minimal because it was such a small quantity of marijuana. The court gave a limiting instruction, telling the jury to consider the marijuana “only in assessing whether the plaintiff knew that any of the defendants were police officers.” The parties also disputed the jury instructions. Defendants proposed the following instruction on investigatory stops: “A police officer is allowed to conduct a brief investigatory stop of a citizen, not rising to the level of an arrest, if the officer performing the stop has a reasonable suspicion that criminal activity is afoot.” Doornbos objected, arguing that he had not alleged false arrest and that the instruction would cause confusion. The court gave the defendants’ requested instruction. Doornbos in turn asked for an instruction on frisks to explain that an officer must have reasonable suspicion that a civilian is armed and dangerous to justify a frisk. Doornbos argued this was relevant because it addressed the overall reasonableness of the use of force, and it was necessary to supplement the instruction on investigatory stops. The court denied Doornbos’s request: “taking your view of the facts that [the officers] did not have a basis to do a pat-down … [t]hat says 8 No. 16-1770 nothing about whether the force they used … was excessive or not.” The court concluded: “I don’t know why we need any debate about the lawfulness of the pat-down or not. It’s just not relevant to the question of whether the force ultimately was excessive… .” During deliberations, the jury sent a note to the judge asking whether plainclothes police officers must identify themselves as officers when conducting investigatory stops. The judge sent the following response: 1. “Whether or not an officer must effectively identify themselves before conducting ‘a brief investigatory stop of a citizen, not rising to the level of an arrest, if the officer performing the stop has a reasonable suspicion that criminal activity is afoot.’” RESPONSE: An officer is not required to identify himself in order to conduct a “brief investigatory stop of a citizen, not rising to the level of an arrest, if the officer performing the stop has a reasonable suspicion that criminal activity is afoot.” 2. “We would like to know how effectively an officer must identify himself.” RESPONSE: The effectiveness of an officer’s identification of himself as a police officer is relevant to the issue of whether the plaintiff knew that the officer was, in fact, a police officer. (Quotation marks and emphasis in original.) No. 16-1770 9 Shortly after receiving the judge’s answer, the jury returned a verdict in favor of defendants on all claims. Doornbos has appealed. II. Admission of the Marijuana Evidence Doornbos argues that the district court erred by admitting evidence of his possession of marijuana. He relies primarily on our decision in Sherrod v. Berry, 856 F.2d 802, 804 (7th Cir. 1988) (en banc), where we wrote that in excessive force cases we consider “only … those circumstances known and information available to the officer at the time of his action.” Because the officers did not know that Doornbos had marijuana at the time of the confrontation, Doornbos argues that the marijuana is not relevant to determine whether they used excessive force. In addition, Doornbos argues that despite any minimal relevance the marijuana might have had, it was outweighed by the potential for unfair prejudice. We review for abuse of discretion evidentiary rulings that admit disputed evidence. United States v. Bogan, 267 F.3d 614, 620 (7th Cir. 2001). “A determination made by a trial judge regarding the admissibility of evidence ‘is treated with great deference because of the trial judge’s first-hand exposure to the witnesses and the evidence as a whole, and because of his familiarity with the case and ability to gauge the likely impact of the evidence in the context to the entire proceeding.’” United States v. Wash, 231 F.3d 366, 371 (7th Cir. 2000), quoted in Bogan, 267 F.3d at 619. “A new trial is warranted only if the error has a substantial and injurious effect or influence on the determination of a jury, and the result is inconsistent with substantial justice.” Whitehead v. Bond, 680 F.3d 919, 930 (7th Cir. 2012), quoting Cerabio LLC v. Wright Medical Technology, Inc., 410 F.3d 981, 994 (7th Cir. 2005). 10 No. 16-1770 Under Federal Rule of Evidence 401, evidence is relevant if: “(a) it has any tendency to make a fact more or less probable than it would be without the evidence; and (b) the fact is of consequence in determining the action.” Relevant evidence may nonetheless be excluded when “its probative value is substantially outweighed by a danger of … unfair prejudice.” Fed. R. Evid. 403. The district court did not abuse its discretion by admitting evidence that Doornbos possessed marijuana. In deciding excessive force claims, the issue is whether an officer’s use of force was objectively reasonable given the information he or she knew at the time. See Sherrod, 856 F.2d at 804. The Supreme Court has recently reinforced this analysis. Our case law sets forth a settled and exclusive framework for analyzing whether the force used in making a seizure complies with the Fourth Amendment. … The operative question in excessive force cases is whether the totality of the circumstances justifies a particular sort of search or seizure. … Excessive force claims … are evaluated for objective reasonableness based upon the information the officers had when the conduct occurred. County of Los Angeles v. Mendez, 581 U.S. —, —, 137 S. Ct. 1539, 1546–47 (2017) (citations and quotations omitted). Although this framework governs excessive force claims, we have recognized that information unknown to the officer at the time of the conduct may be admitted for another purpose: if it tends to make one side’s story more or less believable. For instance, in Common v. City of Chicago, 661 F.3d 940, No. 16-1770 11 943 (7th Cir. 2011), the trial court admitted evidence that the deceased had swallowed bags of cocaine before his fatal confrontation with a police officer, even though the officer was unaware of the drugs at the time. We affirmed, noting that “where the facts are controverted in a reasonable force case, impeachment by contradiction is allowed.” Id. at 946, citing Sherrod, 856 F.2d at 806. In that case, “evidence of the drugs secreted in Smith’s airway made it more likely that Smith acted as Officer Nelson testified, as opposed to the manner in which plaintiffs’ witnesses testified.” Id. A number of our cases allowing admission of facts unknown to officers have allowed them where they tended to support officers’ versions of events. See, e.g., Wilson v. City of Chicago, 758 F.3d 875, 884–85 (7th Cir. 2014) (affirming admission of evidence that decedent had throwing knife strapped to his thigh even though information was unknown to officer at time of shooting); Estate of Escobedo v. Martin, 702 F.3d 388, 399–401 (7th Cir. 2012) (affirming admission of evidence of decedent’s psychological profile, upcoming court date, and potential prison sentence even though information was unknown to officer at time of shooting); Common, 661 F.3d at 946 (affirming admission of evidence of drugs hidden in decedent’s airway despite officer’s lack of knowledge). We must note, however, that the logic and application of this rule applies with equal force to officers and civilians alike. If there is a factual dispute in a case alleging excessive force, information unknown to the officer at the time of the incident could be admitted if it tended to make the plaintiff’s version of events more believable than the officer’s account. For instance, suppose an officer mistakenly thought he saw a civilian with illegal drugs, and there is a factual dispute over 12 No. 16-1770 whether the civilian fled when the officer approached. This logic implies the civilian-plaintiff should be able to show he did not have any drugs (and thus had no motive to flee the police). That information may have been unknown to the police, but it would support the plaintiff’s testimony that he did not flee when the officer approached him. In light of these precedents, evidence of Doornbos’s marijuana was relevant because it could, at least arguably, support the officers’ version of events by giving Doornbos a motive to try to flee and then to resist a stop, frisk, and/or arrest. This relevance was not overborne in this case by the potential for unfair prejudice. It was a very small amount of marijuana (a user quantity worth approximately five dollars), and our past cases have permitted more prejudicial evidence in similar contexts. See, e.g., Wilson, 758 F.3d at 884–85 (throwing knife); Common, 661 F.3d at 946–47 (bags of cocaine). Moreover, the district court properly included a limiting instruction to assure the jury considered the evidence only for its narrow permissible purpose. The district court’s decision was not an abuse of its discretion. III. Jury Instructions on Stops and Frisks Doornbos argues that the district court erred in two ways in its jury instructions on investigatory stops. He contends the court should have included an instruction on the legal standard for frisks, i.e., that an officer must have a reasonable suspicion that a person is armed and dangerous before initiating a frisk. Doornbos also argues that the court erred by telling the jury that a plainclothes officer need not identify himself as an officer when conducting a Terry stop (and implicitly when conducting a frisk). No. 16-1770 13 “We consider a district court’s jury instructions with deference, analyzing them as a whole to determine if they accurately state the law and do not confuse the jury.” Cruz v. Safford, 579 F.3d 840, 843 (7th Cir. 2009), quoting Aliotta v. Nat’l Railroad Passenger Corp., 315 F.3d 756, 764 (7th Cir. 2003). We review for abuse of discretion a district court’s decision whether to give a particular jury instruction. United States v. Villegas, 655 F.3d 662, 669 (7th Cir. 2011), citing United States v. Tavarez, 626 F.3d 902, 904 (7th Cir. 2010). If an instruction is legally deficient, a new trial is required only if the flawed instruction could have confused or misled the jury causing prejudice to the complaining party. Cruz, 579 F.3d at 843. The risk that an incorrect jury instruction prejudiced a party the jury depends at least in part on how closely balanced the evidence was at trial. Village of Bellwood v. Dwivedi, 895 F.2d 1521, 1531 (7th Cir. 1990). A. Refusal to Include Instruction on Frisks The Fourth Amendment protects individuals from “unreasonable searches and seizures.” For a search or a seizure to be reasonable, probable cause is generally required. See, e.g., Ybarra v. Illinois, 444 U.S. 85, 95–96 (1979); Dunaway v. New York, 442 U.S. 200, 213 (1979). The Supreme Court established an important exception to this general rule in Terry v. Ohio, 392 U.S. 1 (1968), where it “considered whether an investigatory stop (temporary detention) and frisk (patdown for weapons) may be conducted without violating the Fourth Amendment’s ban on unreasonable searches and seizures.” Arizona v. Johnson, 555 U.S. 323, 326 (2009). The Court determined that a stop and a frisk are reasonable when two separate conditions are satisfied: “First, the investigatory stop must be lawful. That requirement is met … 14 No. 16-1770 when the police officer reasonably suspects that the person apprehended is committing or has committed a criminal offense. Second, to proceed from a stop to a frisk, the police officer must reasonably suspect that the person stopped is armed and dangerous.” Id. at 326–27 (emphases added); see also Huff v. Reichert, 744 F.3d 999, 1009 (7th Cir. 2014); United States v. McKoy, 428 F.3d 38, 39 (1st Cir. 2005) (“It is insufficient that the stop itself is valid; there must be a separate analysis of whether the standard for pat-frisks has been met.”). To determine if the “reasonable suspicion” standard is satisfied, courts conduct “a fact-specific inquiry that looks at the totality of the circumstances in light of common sense and practicality.” United States v. Tinnie, 629 F.3d 749, 751 (7th Cir. 2011) (quotation marks omitted). As with “seizures,” an officer can initiate a frisk before physically touching a person. See, e.g., Michigan v. Chesternut, 486 U.S. 567, 573–74 (1988) (“the test is flexible enough to be applied to the whole range of police conduct in an equally broad range of settings.”), also citing United States v. Mendenhall, 446 U.S. 544, 554 (1980) (Stewart & Rehnquist, JJ.) (person is seized when, given all the circumstances, “a reasonable person would have believed that he was not free to leave”). A seizure can occur without any physical contact, such as when an officer makes certain displays of force like pointing a weapon or using language or a tone of voice that indicates compliance is mandatory. See Kernats v. O’Sullivan, 35 F.3d 1171, 1177-78 (7th Cir. 1994), quoting Mendenhall, 446 U.S. at 554 (Stewart & Rehnquist, JJ.). Taking the same approach with frisks, we ask when a reasonable person would have believed that the search was being initiated. This No. 16-1770 15 approach seeks to “assess the coercive effect of police conduct, taken as a whole, rather than to focus on particular details of that conduct in isolation.” Chesternut, 486 U.S. at 573. We conclude that the district court erred when it instructed the jury on the extent of a police officer’s power to carry out investigatory stops but refused to include an instruction on frisks. Based on Officer Williamson’s own version of events, he grabbed Doornbos to frisk him. Williamson testified that he announced himself as a police officer, and displayed his badge, handcuffs, and gun. He testified that he next went “to reach him, to reach with … my left hand to his right side” to conduct a frisk “to make sure [Doornbos] did not have a weapon.” Doornbos “pushed [Williamson’s] hand away” and attempted to flee. Based on the totality of the circumstances, at least as told by Officer Williamson, a reasonable person could have believed he was being searched when Officer Williamson stretched his arm out. So too could Doornbos when Williamson reached out to grab him. By instructing the jury on stops but not frisks, the court “insufficiently state[d] the law.” Cruz, 579 F.3d at 843, citing Aliotta, 315 F.3d at 764. The court’s refusal to include the frisk instruction was a problem here because Officer Williamson’s testimony suggests that the frisk was unjustified and thus unconstitutional. To “proceed from a stop to a frisk,” Officer Williamson was required to have reasonable suspicion that Doornbos was “armed and dangerous.” Johnson, 555 U.S. at 326–27. When asked why he suspected Doornbos was armed and dangerous, Williamson provided four reasons: it was a high-crime area, it was dark, Doornbos may have been breaking the law 16 No. 16-1770 by drinking beer, and Doornbos was wearing a jacket with “deep pockets” in which he “could have hidden anything.” These were not sufficient “articulable facts that would establish the separate and specific condition that the detainee has a weapon or poses some danger.” United States v. Williams, 731 F.3d 678, 686 (7th Cir. 2013), citing Terry, 392 U.S. at 27; see also United States v. Carlisle, 614 F.3d 750, 755 (7th Cir. 2010) (“During the stop, the officer may conduct a pat-down search to determine whether the person is carrying a weapon if the officer has an articulable suspicion that the subject is armed and dangerous.”). As a reminder, Officer Williamson approached Doornbos at 7:30 p.m. in February right outside the train station. Three of Officer Williamson’s factors are so general they would have applied to everyone at the station. It was dark in a high-crime neighborhood, and people were wearing big coats with deep pockets because it was February in Chicago. Without more, such justifications are too general because they could be applied to practically any person that had been around the area when the officers showed up that night. Indeed, similar facts could support a search of practically anyone who happens to be near a high-crime area at night when police are called. That is the very evil that the Terry court was concerned with unleashing, and the reason that the Terry court restrained the ability to frisk. Williams, 731 F.3d at 688, citing Terry, 392 U.S. at 17–18. Although the danger of a neighborhood is relevant, more is required to justify a frisk: “Even in high crime areas, where the No. 16-1770 17 possibility that any given individual is armed is significant, Terry requires reasonable, individualized suspicion before a frisk for weapons can be conducted.” Maryland v. Buie, 494 U.S. 325, 334 n.2 (1990) (applying Terry principles to protective sweep of home). Nor does suspicion that Doornbos might have been drinking a beer on Chicago Transit Authority property transform these general factors into reasonable suspicion that he was “armed and dangerous.” Officer Williamson testified that he did not even see Doornbos drink the beer. Nor did he testify that Doornbos appeared intoxicated or otherwise acted erratically in a way that might indicate dangerousness. There was no indication that Doornbos might be armed. Our precedent requires stronger facts to justify a frisk even in an otherwise justified Terry stop. See, e.g., Williams, 731 F.3d at 686–89 (no reasonable suspicion to justify frisk when officers responded to 911 call reporting weapons in high-crime neighborhood, defendant’s group avoided eye contact with officers and moved away from them, defendant had hands in his pocket or near waistband); see also Sibron v. New York, 392 U.S. 40, 45, 63–64 (1968) (no reasonable suspicion to justify frisk when officer observed defendant talking late at night with persons known to be addicted to drugs, and defendant reached his hand into his pocket when questioned by officer). In sum, Officer Williamson’s own testimony suggests that he initiated an unlawful frisk while policing in plain clothes, and that conduct proximately caused the violent confrontation. This information was relevant for the jury in assessing whether Williamson’s use of force was reasonable under the “totality of the circumstances.” Mendez, 581 U.S. at —, 137 S. 18 No. 16-1770 Ct. at 1546 (quotation omitted). The court’s decision not to include an instruction on frisks deprived the jury of the law it needed to reach a sound verdict. 1 To be clear, we do not suggest that an unlawful frisk somehow trumps the excessive force analysis outlined in Mendez and Graham v. Connor, 490 U.S. 386 (1989). The Supreme Court has barred that order of operations: “once a use of force is deemed reasonable under Graham, it may not be found unreasonable by reference to some separate constitutional violation.” Mendez, 581 U.S. at —n*, 137 S. Ct. at 1547 n* (emphasis in original). However, when assessing the “totality of the circumstances” under Graham, the Mendez Court expressly left open the possibility of “taking into account unreasonable police conduct prior to the use of force that foreseeably created the need to use it.” Id. And that is our approach here. When an officer’s unreasonable (and unconstitutional) conduct proximately causes the disputed use of force, that conduct is part of the “totality of the circumstances” that should be considered to determine if the use of force was reasonable, especially since the officers here were not in uniform. 1 Imagine a more exaggerated Fourth Amendment example, where the factual dispute is whether an officer stopped a person on the sidewalk or instead followed him into his home without a warrant and conducted the stop there. Under these circumstances, it would be misleading to instruct the jury only on investigatory stops but to refuse to include an instruction on warrantless entries into the home. That is analogous to what occurred here. The jury was instructed on stops, but not on the legal standard that would have enabled it to recognize whether the frisk was lawful. No. 16-1770 19 B. Officers’ Duty to Identify Themselves as Police The absence of an instruction on frisks was aggravated by the district court’s response to the jury’s note during deliberations. The jury asked if a police officer must identify himself as an officer during a stop. The court responded with a categorical “no,” saying that an “officer is not required to identify himself” to conduct a stop. This answer sweeps too far. The “ultimate touchstone of the Fourth Amendment is ‘reasonableness.’” Brigham City v. Stuart, 547 U.S. 398, 403 (2006. Although some unusual circumstances may justify an officer’s failure to identify himself in rare cases, it is generally not reasonable for a plainclothes officer to fail to identify himself when conducting a stop. We addressed this issue in Catlin v. City of Wheaton, 574 F.3d 361 (7th Cir. 2009), where we expressed our concern about plainclothes officers failing to identify themselves, but we held that it can be a reasonable tactic where the act of identifying themselves could itself reasonably be thought to have made the situation more dangerous. In Catlin, the police were searching for a dangerous drug kingpin. They were told his arrest warrant was for the highest class of felony, that he was “armed and dangerous, that he had resisted arrest on several prior occasions and that he had threatened violent resistance if the police attempted to re-arrest him.” Id. at 363. The officers were dressed in plain clothes. They mistakenly thought they saw the suspect on a motorcycle at a stop light. The officers rushed the motorcycle rider and tackled him, all without identifying themselves (or so we assumed for purposes of the appeal). The motorcycle rider, plaintiff Catlin, resisted. The struggle continued after the initial tackle, and the officers still did not identify themselves. After Catlin was restrained, the 20 No. 16-1770 officers checked his identification and realized they had arrested the wrong person. Id. at 364. In Catlin, we noted the dangers of this tactic by plainclothes officers, which creates a serious risk that a civilian would “think that he was being attacked by common criminals and … this would make him more likely to resist.” Id. at 368 (emphasis added). We concluded, however, that because of the unusually dangerous character of the suspect, the officers reasonably thought that identifying themselves before tackling the motorcyclist would have made the arrest more dangerous. The suspect was armed, had a history of violence, and had professed his intent to resist arrest. See id. at 365–66, 368. Given these factors, the officers “could have reasonably concluded that they needed to use the element of surprise to their advantage.” Id. at 368. We also found that the mistaken identity was reasonable under the circumstances. We considered it more “problematic,” however, that the officers still did not identify themselves after tackling Catlin, and we noted that police officers “who unreasonably create a physically threatening situation in the midst of a Fourth Amendment seizure cannot be immunized for the use of deadly force.” Id. at 368 n.7, quoting Estate of Starks v. Enyart, 5 F.3d 230, 234 (7th Cir. 1993). Nonetheless we concluded the unlawfulness of that behavior had not been clearly established, so the officers were protected by qualified immunity. See Catlin, 574 F.3d at 369. Catlin shows that certain dangerous circumstances may permit plainclothes officers to initiate stops without identifying themselves, but that is and must remain a rare exception, not the rule. Failure to identify during a stop can be a tactic. As with all police tactics, its reasonableness depends on the No. 16-1770 21 circumstances. See, e.g., United States v. Bullock, 632 F.3d 1004, 1016 (7th Cir. 2011) (“We have previously found that using handcuffs, placing suspects in police cars, drawing weapons, and other measures of force more traditionally associated with arrests may be proper during an investigatory detention, depending on the circumstances.”), citing United States v. Tilmon, 19 F.3d 1221, 1224–25, 1228 (7th Cir. 1994); see also Wilson v. Arkansas, 514 U.S. 927, 936 (1995) (compliance with common-law rule requiring officers to “knock and announce” before executing search warrant is relevant to reasonableness of search, but rule yields in face of threat of physical violence or destruction of evidence); Leaf v. Shelnutt, 400 F.3d 1070, 1086 (7th Cir. 2005) (protective sweep of home is “a search tactic [that] may be ‘reasonable when weighed against the need for law enforcement officers to protect themselves and other prospective victims of violence’”), quoting Buie, 494 U.S. at 332. Absent reasonable grounds to think that identification would present an unusual danger, it is generally not a reasonable tactic for plainclothes officers to fail to identify themselves when conducting a stop. The tactic provokes panic and hostility from confused civilians who have no way of knowing that the stranger who seeks to detain them is an officer. This creates needless risks. Suppose you are walking along a street and are grabbed by a stranger (or three strangers). A fight-or-flight reaction is both understandable and foreseeable. Cf. Hudson v. Michigan, 547 U.S. 586, 594 (2006) (knockand-announce rule is reasonable, in part, because it protects “human life and limb, because an unannounced entry may provoke violence in supposed self-defense by the surprised resident”). “Self-defense is a basic right,” McDonald v. City of Chicago, 561 U.S. 742, 767 (2010), and many civilians who 22 No. 16-1770 would peaceably comply with a police officer’s order will understandably be ready to resist or flee when accosted—let alone grabbed—by an unidentified person who is not in a police officer’s uniform. Absent unusual and dangerous circumstances, this tactic is unlikely to be reasonable when conducting a stop or a frisk. This result is further supported by analogy to tort law. Unless the officer was lawfully exercising his authority as a police officer, he was committing the torts of assault and then battery. Officer Williamson initiated the search by reaching out with his hand and putting Doornbos in “imminent apprehension” of an “offensive contact.” Restatement (Second) of Torts § 21 (Am. Law Inst. 1965); see also William Baude & James Y. Stern, The Positive Law Model of the Fourth Amendment, 129 Harv. L. Rev. 1821 (2016) (analyzing reasonableness of Fourth Amendment searches and seizures through private law concepts, such as tort law). If the officer does not identify himself as an officer, what can a civilian think when the person grabbing him is in civilian clothes? 2 Other courts have resolved this issue similarly. In Atkinson v. City of Mountain View, 709 F.3d 1201 (8th Cir. 2013), the Eighth Circuit reversed summary judgment that had been granted in favor of a plainclothes officer who had tackled and injured plaintiff Atkinson without first identifying himself as an officer. Atkinson had intervened to stop a fight at his 2 Here we address stops. Of course, consensual encounters with law enforcement do not implicate the Fourth Amendment’s restrictions on stops. See, e.g., United States v. Serna-Barreto, 842 F.2d 965, 967 (7th Cir. 1988) (“[I]f an encounter with the police is not coercive, the Fourth Amendment is not in play in even an attenuated form and the officer is not required to demonstrate that he had even an articulable suspicion.”). No. 16-1770 23 nephew’s high school football game. The plainclothes officer became angry when Atkinson physically separated him from one of the fighters. Id. at 1205. Without identifying himself, the plainclothes officer said “I’ll take care of you,” and took out his cell phone. Atkinson thought he was calling for “reinforcements,” so he took the man’s phone without touching him and said, “Why can’t you just talk to us?” Id. At that point, the plainclothes officer charged at Atkinson and seriously injured him. The Eighth Circuit held that a “reasonable officer … would not have thought it appropriate to charge Atkinson without first identifying himself as a law enforcement official and giving Atkinson a chance to return the cell phone peacefully. By remaining anonymous, [the officer] never gave Atkinson the opportunity to comply with a legitimate request by a law enforcement official.” Id. at 1210. (Emphasis in original.) Several other courts have ruled likewise in comparable cases. 3 3 See, e.g., Yates v. City of Cleveland, 941 F.2d 444, 447 (6th Cir. 1991) (“It was not ‘objectively reasonable’ for [Officer] Currie to enter the dark hallway at 2:45 a.m. without identifying himself as a police officer, without shining a flashlight, and without wearing his hat. Thus, because the right Officer Currie is alleged to have violated was clearly established, and because Officer Currie’s actions preceding the shooting were not those of an objectively reasonable police officer, we conclude that qualified immunity is not appropriate.”); Newell v. City of Salina, 276 F. Supp. 2d 1148, 1154 (D. Kan. 2003) (holding that officers’ alleged use of force on an intoxicated pedestrian “without having identified themselves as law enforcement officers, may not be objectively reasonable” for qualified immunity purposes); Johnson v. Grob, 928 F. Supp. 889, 905 (W.D. Mo. 1996) (“[A] seizure outside the home may be unreasonable because the officers involved were not identified or identifiable as such, and the seized person suffers injuries because of the officers’ lack of identification.”); see also St. Hilaire 24 No. 16-1770 Because it is usually unreasonable for a plainclothes officer to fail to identify himself when conducting a stop or frisk, the district court’s categorical answer to the jury’s note did not “accurately state the law.” See Cruz, 579 F.3d at 843, quoting Aliotta, 315 F.3d at 764. Moreover, the exceptional facts of Catlin—the dangerous drug kingpin who had threatened to resist any arrest—could not apply to Doornbos, who was suspected of drinking a beer on Transit Authority property. The officer did not have reasonable suspicion that Doornbos was armed and dangerous. In this situation it would not have been reasonable for a plainclothes officer to initiate a stop and frisk without first identifying himself as a police officer. There was no apparent need to use the element of surprise, and that tactic would needlessly increase the danger of the stop for everyone present. Whether officers reasonably identify themselves in initiating stops is particularly important for the Chicago Police Department because of its widespread use of plainclothes policing. A recent investigation by the United States Department of Justice found that Chicago Police engage in aggressive plainclothes policing practices that result in needless injuries. See U.S. Dep’t of Justice, Civil Rights Div. & U.S. Attorney’s v. City of Laconia, 71 F.3d 20, 25, 28 (1st Cir. 1995) (plainclothes officers executed search warrant with weapons drawn, failed to identify themselves, then shot plaintiff in the neck when he reached for his gun because he thought he was being attacked; court noted the claim “raises difficult issues” but concluded it was not “clearly established” for qualified immunity purposes that plainclothes officers with a warrant had to identify themselves). No. 16-1770 25 Office N.D. Ill., Investigation of the Chicago Police Department (Jan. 13, 2017), available at https://www.justice.gov/opa/file/925846/download. 4 4 Chicago is not alone in this regard. See, e.g., U.S. Dep’t of Justice, Civil Rights Div., Investigation of the Baltimore City Police Department, at 45 (Aug. 10, 2016), available at https://www.justice.gov/crt/file/883296/download (“During the course of our investigation, we received a large number of anecdotes specifically identifying plainclothes officers enforcing violent crime and vice offenses … as particularly aggressive and unrestrained in their practice of stopping individuals without cause and performing public, humiliating searches. A disproportionate share of complaints likewise accuse plainclothes officers of misconduct.”); U.S. Dep’t of Justice, Civil Rights Div., Findings Letter on Albuquerque Police Department, at 14 (April 10, 2014), available at https://www.justice.gov/sites/default/files/crt/legacy/2014/04/10/apd_findings_4-10-14.pdf (plainclothes officer failed to identify himself, then officer shot and killed unarmed man who “did not pose a threat of death or serious physical injury to the officer or anyone else”); U.S. Dep’t of Justice, Civil Rights Div. & U.S. Attorney’s Office D. N.J., Investigation of the Newark Police Department, at 14, 25 (July 22, 2014), available at https://www.justice.gov/sites/default/files/crt/legacy/2014/07/22/newark_findings_7-22-14.pdf (civilian complaint that plainclothes officer stopped two individuals, one of whom did not know that the plainclothes officer was police; struggle ensued); id. at 24 (plainclothes officer “startled [a] man with his sudden presence behind him” and man swung at plainclothes officer; officer then struck man multiple times in the face with closed fist leaving man with concussion, loss of consciousness, and bruises); U.S. Dep’t of Justice, Civil Rights Div. & U.S. Attorney’s Office N.D. Oh., Investigation of the Cleveland Division of Police, at 18 (Dec. 4, 2014), available at https://www.justice.gov/sites/default/files/opa/press-releases/attachments/2014/12/04/cleveland_division_of_police_findings_letter.pdf (officer dressed in civilian clothes drew weapon and identified himself as police officer, but did not show badge even after civilian “asked repeatedly for the officer to show his badge and expressed disbelief that he was an officer”; civilian in the car “thought they were being robbed”; struggle ensued and civilian was injured); U.S. 26 No. 16-1770 In Part II.A.4 of the Department of Justice Report, titled “CPD Officers Make Tactical Decisions that Unnecessarily Increase the Risk of Deadly Encounters,” investigators “observed a trend in shootings resulting from CPD officers unnecessarily escalating confrontations or using reckless, untrained tactics, putting themselves in a position of jeopardy and limiting their force options to just deadly force.” Id. at 28. Dep’t of Justice, Civil Rights Div., Investigation of the Puerto Rico Police Department, at 24 (Sept. 5, 2011), available at https://www.justice.gov/sites/default/files/crt/legacy/2011/09/08/prpd_letter.pdf (plainclothes officers wielding firearms surrounded civilian, causing him to flee and sustain injury when captured; federal civil rights trial found officers liable for violating Fourth Amendment and plaintiff was awarded $100,000 in damages); id. at A-4 (plainclothes officer failed to identify himself, resulting in shooting of civilian who thought he was being attacked); see also Justin Fenton & Tim Prudente, Commissioner Davis Says Plainclothes Policing in Baltimore Is Over, Baltimore Sun (Mar. 8, 2017), http://www.baltimoresun.com/news/maryland/crime/bs-md-ci-plainclothes-policing-ends-20170308-story.html (Police Commissioner dismantled plainclothes policing unit; noted that plainclothes officers are “officers most likely to be the subject of complaints”); Aubrey Whelan, Shooting of Deliveryman Results in Largest Police Settlement in City History, Philly.com (Jan. 7, 2017), http://www.philly.com/philly/news/20170107_breaking_local.html (city agreed to reform plainclothes policing practices after two plainclothes officers failed to identify themselves and shot a student who panicked when he thought he was being attacked by armed assailants); Clarence Williams & Peter Hermann, Lanier Eliminates Many Plainclothes Drug Units to Focus on Top Dealers, Wash. Post (June 12, 2015), https://www.washingtonpost.com/local/crime/lanier-eliminates-manyplainclothes-drug-units-to-focus-on-top-dealers/2015/06/12/633706fe10ff-11e5-a0dc-2b6f404ff5cf_story.html (noting that “critics have complained that in the District [of Columbia], plainclothes officers jump from unmarked cars to roust suspected people, innocent and not, on street corners” and Police Chief noting she wants “police to be identifiable when making arrests”). No. 16-1770 27 One of the tactics in question is called a “jump out,” which “involves groups of officers, frequently in plain clothes and riding in unmarked vehicles driving rapidly toward a street corner or group of individuals and then jumping out and rapidly advancing, often with guns drawn.” Id. at 31. The officers then “zero-in on the fleeing person,” and give chase. Id. The Report explains: Such techniques can be particularly problematic when deployed by CPD tactical or other specialized units using unmarked vehicles and plainclothes officers. It can be difficult, especially at night, to discern that individuals springing out of an unmarked car are police officers. In highcrime areas, residents may be particularly unwilling to stick around to find out. For example, in one case, a tactical officer in plain clothes jumped out of an unmarked car, chased a man who ran from him, and ultimately shot the man from behind. Officers claimed the man pointed a gun, but no weapon was recovered. The shooting victim explained to investigators that he ran because a sedan he did not recognize had raced through a stop sign and headed toward him. Similarly, in another case, two plainclothes officers dressed in black and in unmarked vehicles approached a man and his female passenger as they were getting into their car. According to the woman, the couple did not know they were officers and fled, and an officer shot at the side and rear of the vehicle, killing the man. 28 No. 16-1770 Id. at 31; see also id. at 35 (plainclothes officer detained twelveyear-old boy without identifying himself as police officer; “boy reported he did not understand the man was a police officer or why he was being detained and told the officer he was only 12”). The Department of Justice Report also documents how these tactics foster resentment in the community and erode trust in law enforcement. See id. at 142. The Supreme Court warned of that danger in Terry itself. Far from a “petty indignity,” Chief Justice Warren wrote for the Court, a stop and frisk is “a serious intrusion upon the sanctity of the person, which may inflict great indignity and arouse strong resentment, and it is not to be undertaken lightly.” 392 U.S. at 17. The Court explained that “the degree of community resentment aroused by particular practices is clearly relevant to an assessment of the quality of the intrusion upon reasonable expectations of personal security caused by those practices.” Id. at 17 n.14, citing id. at 14–15 n.11, citing in turn President’s Comm’n on Law Enforcement and Administration of Justice, Task Force Report: The Police 183–84 (1967). This threat to police-community relations reinforces our conclusion that, absent unusual reasons to think the act of identification will itself be dangerous, as in Catlin, it is not reasonable for plainclothes officers to fail to identify themselves when conducting a Terry stop, with or without a frisk. C. Prejudice Though we find errors in instructing the jury, we should not order a new trial unless the errors prejudiced Doornbos. Aliotta, 315 F.3d at 764. Defendants argue that Doornbos was not prejudiced because his account at trial was impeached based on his earlier deposition testimony and a comment he No. 16-1770 29 wrote on his Facebook account. This argument is not persuasive for three reasons. First, both sides’ accounts suggest that Officer Williamson’s initial contact with Doornbos was unreasonable and unlawful. Doornbos’s account describes clearly unlawful conduct. And as explained above, even Officer Williamson’s account—he reached out to initiate a frisk—was likely unlawful because the evidence does not support a reasonable suspicion that Doornbos was armed and dangerous. If the jury had known that, based on either account, the disputed use of force followed directly from Officer Williamson’s unlawful conduct, there is a reasonable possibility that the jury would have viewed the reasonableness of the force differently. Second, while it is true that Doornbos had credibility problems, so did Officer Williamson. As noted by the state court in the criminal case, the officers’ versions of events were not entirely consistent, and the allegations surrounding the beer can were “very unusual.” The can was never taken into evidence, and neither the records from the four 911 calls (from bystanders who thought Doornbos was being robbed) nor the trial testimony of two of those callers say anything about a beer can that Officer Williamson said “ruptured” and “was spraying all over the place.” In addition, Officer Williamson initially testified at trial that he intended only to stop Doornbos when he approached him to investigate the beer can. After Doornbos’s counsel impeached Williamson with his earlier deposition testimony, however, Williamson acknowledged that he had already decided to conduct a frisk when he approached Doornbos. Additionally, his testimony at trial was not fully consistent with his testimony at Doornbos’s criminal trial regarding whether 30 No. 16-1770 he tackled Doornbos alone or with the help of the other two officers. These chinks in the armor matter because the trial was ultimately a credibility contest. We do not attempt to resolve these issues, but they help to show that the evidence was not so lopsided that we could find no prejudice from the instruction errors. See Village of Bellwood, 895 F.2d at 1531. Third, the jury’s note signals that, contrary to the defense argument, the impeachment of Doornbos did not decide the credibility contest. If the jurors all thought Doornbos had been thoroughly discredited, there would have been no need for the note. By sending the note, the jury showed that it was carefully considering both accounts, and in particular, how the confrontation began. The district court erred in its jury instructions and its response to the jury’s note, and these errors prejudiced Doornbos. Accordingly, we VACATE the judgment in favor of defendants and REMAND for a new trial. Trial court erred in instructing the jury about investigatory stops but not about frisks and in instructing the jury that a plainclothes officer need not identify himself in making a stop.
https://law.justia.com/cases/federal/appellate-courts/ca7/16-1770/16-1770-2017-08-18.html
Gene discovery may hold key to better therapies for OCD In the first analysis of its kind, researchers at Columbia University Vagelos College of Physicians and Surgeons and several other institutions have linked distinct patterns of genetic mutations with obsessive-compulsive disorder (OCD) in humans. The work, published online June 28 in Nature Neuroscience, confirms the validity of targeting specific genes to develop new OCD treatments and points toward novel avenues for studying this often debilitating condition. OCD, which affects 1% to 2% of the population, often runs in families and genes are known to play a large role in determining who develops the disease. However, the identity of many OCD genes remains unknown. “Many neurological diseases are influenced by strongly acting mutations which can cause disease by themselves,” says David Goldstein, Ph.D., director of the Institute for Genomic Medicine at Columbia and a senior author on the new paper. “These mutations are individually very rare but important to find because they can provide a starting point for the development of therapeutics that target precise underlying causes of disease.” Although strongly acting mutations have been hypothesized to exist in OCD, statistically reliable evidence has been difficult to obtain. Most previous studies on the genetics of OCD have used a “candidate gene” approach, in which researchers focus on plausible genes that might be involved in pathogenesis and look for genetic signatures of risk. Although that approach has had some successes, it can lead to challenges in statistical interpretation and can miss unexpected genes. As a result, both funding agencies and the pharmaceutical industry increasingly focus on genome-wide analyses that can securely implicate genes in disease risk. Read the full article here. See also 20 Sep 2021gMendel is giving an interactive presentation about transforming the diagnosis of genetic disorders at the SKEL | The AI Lab, Athens 23 Jul 2021Scientists report first clinical data showing that CRISPR gene editing can be done safely inside the body. 23 Jul 2021How CRISPR gene editing will treat diseases in future: Interview by Nobel-winner Intellia Jennifer Doudna. 08 Jul 2021Scientists in Australia have adapted AI technology for the early detection of prostate cancer within seconds.
https://www.g-mendel.com/news-post-template-2/
HOW TO CALCULATE the TOTAL SURFACE AREA of a ROOF So you can FIGURE the CORRECT AMOUNT of ROOF COATING MATERIAL NEEDED One must know the exact total surface area (in square feet) of a roof in order to be able to figure the correct amount of roof coating material needed to properly coat (paint or waterproof) a roof. The following factors affect significantly the correct calculation of surface area, and thus the correct amount of coating materials needed. The inside dimensions of the building do NOT include the overhang of the roof beyond the exterior walls or the thickness of the exterior walls. For example, if the interior dimensions are 50 ft. x 60 ft. for an interior area of 3,000 sq. ft., and there is a 2 ft. overhang all around the building, and the exterior walls are 10 inches thick, then the flat surface area of the roof must be calculated not by the formula, 50 ft. x 60 ft., but on 55.67 ft. x 65.67 ft., which equals 3,657 sq. ft., which is actually 21.9% more than the interior area of the building! (B) Roof Slope (see Col. 2 on chart below) The slope of the roof will increase the square foot surface area to be coated, compared with the flat square foot surface under the roof. For example, if the slope of the roof is “4 in 1″, i.e. a 4-inch rise for 1 foot (12 inches) of flat surface, the sloped roof surface area will be 5.21% greater than the flat surface area it covers. Thus, in the example above, the 3,657 sq. ft. under roof equates to 3,848 sq. ft. of sloped roof surface. The “butt” end of the tile, if the tile is one (1) inch thick, and the length of the top surface of the tile to be covered is twelve (12) inches, will increase the total surface to be coated by 8.33%. Thus, in the example above, the 3,848 sq. ft. of sloped roof surface actually amounts to 4,169 sq. ft. of surface area that must be covered by the Roof coating. (D) If Barrel Tile Roof – You MUST add for the Curvature of the Tile, plus the “butt” ends of the Tile (see Col. 4 on chart below) To find the total surface area that must be coated, assuming the radius of the barrel tile is 3″, (= 6″ diameter) and the tiles are laid so that the top of one inverted tile to the top of the next inverted tile is 9″, then one must add 33.33% to determine the actual surface area to be coated. Note: One must also add for the “butt” ends of the barrel tiles, just as explained in “C” above. Thus, in the example shown, if the roof is covered with barrel tile, the actual square footage of surface area to be covered is not 4,169 sq. ft., but rather it is 5,559 sq. ft. To find the total surface area that must be coated, if the corrugation is 2 1/2 inches from the top of one corrugation to the top of the next corrugation, and the depth of each corrugation is 5/8 inch, then one must multiply the width of the sheet by a factor of 1.08 (before multiplying by the length) to determine the actual surface area to be coated. (F) Wastage (not shown on chart) Never does 100% of the coating in a container end up on the surface being coated. There is always a certain amount of wastage, such as the coating material one cannot easily get out of the container, or the coating material that is left in the applicator, either brush, roller, or sprayer. Professional painters, based on years of experience, know that they must add an extra percentage for wastage, normally an extra 10% for brush or roller application, and an extra 25% for spray application. Be sure you calculate this factor when determining how much Roof Coating you will need. If you know the interior area (sq.ft.) of your residence, start with the Interior Area in Sq. Ft. in the first Column, and the approx. surface area of your roof will be as shown in the following table. If you know, or can measure, the dimension of your roof from the drip edge of your roof on one side to the drip edge of your roof on the other side, then start with the area in Sq. Ft. in Column 1 to estimate the approx. total surface area of your roof. Then use Column 2 to estimate the approx. total surface area in Sq. Ft. of your roof if your roof is Fiberglass Shingles, Asphalt Shingles, Roll Roofing, Tar Paper, etc. Use Column 3 to estimate the approx. total surface area in Sq. Ft. of roof surface if your roof is Flat Concrete Tiles. Use Column 4 to estimate the approx. total surface area in Sq. Ft. of your roof surface if your roof is Barrel Tiles.
EPA Announces Significant Air Quality Improvement in Jefferson County, Kentucky Area now meets the 2010 1-Hour Federal Air Quality Standard for Sulfur Dioxide LOUISVILLE, Ky. (August 10, 2020) – Today, the U.S. Environmental Protection Agency (EPA) and the Kentucky Department of Environmental Protection announced the formal redesignation of the Jefferson County area from non-attainment to attainment of the most recent federal air quality standard for sulfur dioxide. Air monitoring data from 2016-2019 and dispersion modeling show the area now meets the National Ambient Air Quality Standard (NAAQS) for sulfur dioxide set to protect public health. Attaining the standard means cleaner air, improved health outcomes and greater economic opportunities for cities and communities. “Reduced sulfur dioxide in the atmosphere means cleaner, healthier air for the citizens of Jefferson County, especially children, the elderly and other sensitive groups,” said EPA Region 4 Administrator Mary S. Walker. “The air quality improvements and resulting redesignation of the Jefferson County area was realized through the combined efforts of federal, state and local agencies working with local industry.” “This is welcome news, especially as Gov. Beshear has put an emphasis on a healthier Kentucky,” said Kentucky Energy and Environment Cabinet Secretary Rebecca Goodman. “That this area now meets national clean air standards for sulfur dioxide is good for the public’s health, good for the environment, and good for economic development.” “As a city powered by coal in a coal-mining state, getting air quality well below the NAAQS for sulfur dioxide is a great benefit and achievement for our community,” said Louisville Metro Air Pollution Control District Director Keith Talley. “This is a significant milestone and a testament to the power of the Clean Air Act and a credit to the people in this community who never stopped demanding cleaner air.” Under President Trump, combined emissions of criteria and precursor pollutants in the U.S. have dropped 7%, and the amount of sulfur dioxide in our air decreased 10%. Nationally, since the beginning of the Trump Administration, EPA has redesignated 53 areas from non-attainment (or “unclassifiable”) to attainment for the criteria air pollutants that make up the NAAQS. These four proposed redesignations, when finalized, will continue that progress. The largest sources of sulfur dioxide emissions are from fossil fuel combustion at power plants and other industrial facilities. The Louisville Gas & Electric Mill Creek Generating Station (Mill Creek) is the only point source of sulfur dioxide emissions within the non-attainment area. Reduction of sulfur dioxide emissions at Mill Creek has helped bring the Jefferson County area into attainment. Short-term exposures to sulfur dioxide can harm the human respiratory system and make breathing difficult. People with asthma, particularly children, are sensitive to these effects of sulfur dioxide. Control measures that reduce sulfur dioxide emissions can also help reduce the formation of small particles that can contribute to fine particulate matter pollution. Fine particulates may penetrate deeply into the lungs and lead to health problems. For 50 years, the EPA has maintained its commitment to maintaining public health by improving air quality and reducing air pollution. Since 1990, the national average concentration of SO2 has dropped by 90%. Reduced levels of sulfur dioxide and other sulfur oxides are also good for the environment. A decrease in these compounds means less chances of haze and acid rain, which can harm sensitive ecosystems. All other air pollutants regulated under the NAAQS – ozone, carbon monoxide, lead, nitrogen dioxide, and particulate matter – have also significantly decreased thanks to the various air quality management and control strategies developed and implemented at the local, state, regional and national level. For more information about the Jefferson County area final 2010 1-Hour sulfur dioxide redesignation, visit docket number EPA-R04-OAR-2020-0003 at www.regulations.gov.
Regional air quality could improve significantly by this time next month, when utility Rocky Mountain Power is set to close its aging Carbon coal-fired power plant near Helper. State regulators are predicting that the looming closure of the 172-megawatt facility could go a long way in enhancing year-round visibility at places like Canyonlands National Park’s Island in the Sky district. They’re factoring the anticipated reductions into an updated plan to reduce regional haze at national parks and high-quality airsheds in eastern Utah, western Colorado and northern Arizona. “We have a lot of confidence that we’re going to see results over the long term,” Utah Division of Air Quality environmental scientist Colleen Delaney said March 9. Rocky Mountain Power spokesman Dave Eskelsen said his company believes the state’s proposal falls in line with the outcome that the U.S. Environmental Protection Agency (EPA) is seeking. “You actually get better results with the state’s plan than you would with greater nitrogen oxide controls,” Eskelsen said. But environmental groups and clean air advocates say the state’s plan doesn’t go far enough to reduce emissions that contribute to degraded visibility at national parks. They argue that the Utah Air Quality Board should adopt stricter controls on emissions from Rocky Mountain Power’s much larger Hunter and Huntington coal-fired plants in Emery County, which are directly upwind of Moab. Local resident Wayne Hoskisson, who serves with the Sierra Club’s Glen Canyon Group, said that regional air quality problems are complex, and can’t be solved with a single action. “There are a whole lot of issues around air quality and regional haze here that are not going to be satisfied by closing one smaller plant,” he said. On the other hand, Hoskisson believes the state can tackle those problems by ordering Rocky Mountain Power to upgrade its 1,300-megawatt Hunter Plant near Castle Dale and its 895-megawatt Huntington Plant near the town of the same name. “We do think those two are the primary pieces for solving air quality problems at Canyonlands,” he said. Grand County Council vice chair Chris Baird encourages the plants’ operator to follow the steps that coal-fired power plants in neighboring states have taken – or are taking – to cut their emissions. “If we have the capacity to eliminate our emissions, then we ought to do it,” he said. Delaney counters that both Emery County plants have already made extensive upgrades to their emission-control technologies. “Back in 2008, pretty substantial improvements were made at all of the units we’re looking at,” she said. In recent years, she said, those upgrades have led to “very substantial” reductions in emissions of sulfur dioxide and nitrogen oxides – including a 50 percent drop in nitrogen oxide emissions. Delaney said that criticism of the state’s plan to reduce regional haze overlooks the accomplishments that Utah regulators have made over the last 15-plus years. “A lot has been done, and it was done early,” she said. “You need to look at the bigger picture of what’s been achieved.” However, Baird thinks that the state’s plan falls short in one emerging area of concern. When nitrogen oxides react with volatile organic compounds on sunny days, they form another pollutant: ground-level ozone. As it is, Baird said, ground-level ozone concentrations at Island in the Sky sometimes teeter on the edge of acceptable levels, as defined by a group of EPA advisers. “We’re right on the threshold of the upper level of what’s considered healthy by the Clean Air Scientific Advisory Committee,” he said. In the near future, the EPA is expected to reduce the current ground-level ozone standard from 75 parts per billion to 70 parts per billion. Baird noted that the agency could adopt an even lower standard, and he believes the state needs to be prepared for the changes. Ground-level ozone not only impacts visibility; it also threatens the health of visitors who come to Canyonlands and Arches national parks to play outdoors, Baird said. According to the EPA, both ground-level ozone and nitrogen oxides are linked to a number of adverse effects on the human respiratory system, such as asthma. “I don’t know if they take into consideration the fact that there are millions of tourists outside,” Baird said. Eskelsen maintains that the improvements Baird and others are seeking would come at a high cost to the company and its customers. “You’re talking about several hundred million dollars in investments,” Eskelsen said. Even then, he said, there are no guarantees that the upgrades would achieve the same results that the state expects to see from the Carbon Plant closure. “You wouldn’t get much of a benefit,” he said. Delaney places those potential costs even higher, at an estimated $650 million. “It’s a much cheaper reduction to be controlling – or, in this case, shutting down – the Carbon Plant, than it would be to install much more expensive technologies at the Hunter and Huntington plants,” she said. On average, the Carbon Plant burns 657,000 tons of coal annually, compared to 4.5 million tons that the Hunter Plant burns through in an average year. Despite that wide discrepancy, researchers found that the Carbon Plant released more than 8,000 tons of sulfur dioxide and 3,342 tons of nitrogen oxides per year, according to the Utah Division of Air Quality. “Even though its electrical generating capacity is much less, its emissions are actually much higher,” Delaney said. Eskelsen said the plant is showing signs of its age. It was first commissioned in 1954 – years before former President Richard Nixon signed the Clean Air Act into law, and decades before former President George H.W. Bush updated the landmark federal regulation. Utah’s air quality division first came up with its own plan to control regional haze in 2008. Four years later, the EPA approved a majority of that plan. However, it rejected portions that dealt with nitrogen oxide and particulate matter pollution from the Hunter and Huntington units, forcing the state to go back to the drawing board. The air quality division ultimately simplified its proposed changes by invoking a provision that allows it to move forward with an alternative strategy to cut emissions – in this case, that strategy involves the closure of the Carbon Plant. Delaney said the agency could have finalized the proposed changes on its own. But officials wanted to give the public a chance to review the plan beforehand, she said. A 30-day written public comment period on the proposed changes is expected to begin on April 1. The state’s air quality board could vote on the updated plan at its meeting in June. For more information about the state’s proposed revisions, go to airquality.utah.gov; scroll down to “Public Notices,” and click on “Regional Haze State Implementation Plan.
https://moabsunnews.com/2015/03/12/state-unveils-new-plan-to-cut-regional-haze/
FIELD OF THE INVENTION BACKGROUND OF THE INVENTION SUMMARY OF THE INVENTION The present invention relates generally to catheters for performing medical procedures. More particularly, the present invention relates to methods and devices for managing a portion of the catheter which extends from the body of a patient under operating room conditions (e.g., while the physician is wearing surgical gloves). Intravascular catheters are currently utilized in a wide variety of minimally invasive medical procedures. Generally, an intravascular catheter enables a physician to remotely perform a medical procedure by inserting the catheter into the vascular system of the patient at an easily accessible location and navigating the tip of the catheter to a desirable target site. By this method, virtually any target site in the patient&apos;s vascular system may be remotely accessed, including the coronary, cerebral, and peripheral vasculature. Intravascular catheters are often used in conjunction with a guidewire. When this is the case, the guidewire may be advanced through the patient&apos;s vasculature until its distal tip has reached a desired target location. In many cases, the guidewires path through the vascular system will be tortuous, requiring the guidewire to change direction many times. By pushing and rotating the proximal end of the guidewire outside of the patient, the physician is able to direct the distal end of the guidewire to the desired target site. Once the distal portion of the guidewire is proximate the desired location, the catheter may be threaded onto the guidewire and urged distally until the distal end of the catheter is proximate the target location. The catheter often has been unpackaged and prepared for use prior to this point. After being prepared, but prior to actual use, the catheter must be laid out and kept sterile without being put back in the original package. It is often useful to be able to coil the catheter in order to facilitate handling and save space either laying out or hanging up the catheter, because of the length of the catheter (typically over 1 meter long). Typically, the catheter enters the patient&apos;s vasculature at a convenient location such as a blood vessel in the neck or near the groin. Once the distal portion of the catheter has entered the patient&apos;s vascular system, the physician may urge the distal tip forward by applying longitudinal forces to the proximal portion of the catheter. In order for the catheter to effectively communicate these longitudinal forces and resist kinking, the proximal portion of many intravascular catheters is made relatively stiff. The path taken by a catheter through the vascular system is often tortuous, requiring the catheter to change direction frequently. In some cases, it may even be necessary for the catheter to double back on itself. In order for the catheter to conform to a patient&apos;s tortuous vascular system, the distal portion of many intravascular catheters is very flexible or floppy. The distance between the access site and the target site is often in excess of 100 cm. In order to assure that the physician will have access to the proximal end of the catheter when the distal end of the catheter is disposed near the target site, many intravascular catheters are relatively long. For example, a catheter shaft may have a length from about 70 cm to about 150 cm. While the distal end of an intravascular catheter is being advanced into the body of a patient, a proximal portion of the catheter extends outside the body of the patient. During this procedure, care must be taken to assure that the proximal portion of the catheter remains inside the sterile field. If the proximal portion of the catheter were allowed to touch a non-sterile surface (e.g., the floor), the contaminated intravascular catheter would need to be discarded and replaced. The discarding of a contaminated intravascular catheter and replacing it with a new, sterile one adds expense to the surgical procedure. More critically, the replacement procedure adds time to the procedure. In some cases, the duration of the procedure may be substantially extended. For example, a dilation catheter may need to be &ldquo;prepped&rdquo; before it is used. This preparation procedure may include the time consuming steps of evacuating air from the device and back filling the device with a fluid. A longer procedure is inherently more expensive; but more importantly, a longer procedure may present a greater risk to the patient. Intravascular catheters may be utilized for various diagnostic and/or therapeutic purposes. One example of a therapeutic use for an intravascular catheter is percutaneous transluminal angioplasty (PTA). An angioplasty procedure typically involves the use of a dilation catheter. The dilation catheter is typically advanced through the vasculature of a patient until a balloon portion of the dilation catheter is positioned proximate the restriction in the diseased vessel. The balloon is then inflated, and the restriction in the vessel is opened. In some cases, multiple restrictions may be opened utilizing a single dilation catheter. When this is the case, the dilation catheter may be partially or completely withdrawn from the body of the patient. When the catheter is withdrawn, care must be taken to assure that the catheter remains inside the sterile field. As described above, the proximal portion of many intravascular catheters is quite stiff. Because the distal portion of these catheters is typically stiff, intravascular catheters are biased to assume a straight shape and will not readily remain in a coiled configuration. In some cases, it is necessary for an assistant to hold the proximal portion of the catheter while it is being introduced or withdrawn from a patient. The assistant may manually coil the proximal portion of the intravascular catheter and hold it in a coiled configuration. The addition of an assistant to the surgical environment to hold the catheter proximal portion is quite costly. The physicians and other personnel involved in a surgical procedure also must wear surgical gloves for the duration of the procedure. In many cases, a &ldquo;double-gloving&rdquo; procedure is used. The wearing of surgical gloves inhibits the surgeon&apos;s ability to manipulate small objects. The present invention relates generally to catheters for performing medical procedures. More particularly, the present invention relates to methods and devices for managing a portion of the catheter which is extending from the body of the patient under operating room conditions (e.g., a sterile field while the physician is wearing surgical gloves). Methods and devices in accordance with the present invention may also be utilized to manage a shaft of the catheter after the catheter is unpacked, but prior to use in a surgical procedure. A catheter in accordance with one embodiment of the present invention includes a catheter shaft having a proximal end and a distal end, and a keeper fixed to the catheter proximate the proximal end thereof. The keeper includes one or more inside surfaces defining a channel which is adapted to entrap a straight portion of the catheter shaft. The keeper also includes a passageway which is adapted to allow a portion of the catheter shaft which has been urged into a curved shape to pass into the channel of the keeper. In one method in accordance with the present invention, the catheter shaft may be urged into a curved shape by exerting one or more pushing forces on the catheter shaft. For example, a physician may push on the catheter shaft with a gloved thumb. In another method in accordance with the present invention, a loop may be formed with the catheter shaft. In this method, a portion of the loop may be passed through the passageway and into the channel of the keeper. This embodiment of the present invention enables the physician to capture a portion of the shaft within the keeper without manipulating or deforming the keeper. An advantage of this method is that a physician is able to perform the required steps easily, even while wearing two pairs of surgical gloves. A catheter in accordance with an additional embodiment of the present invention includes a catheter shaft having a proximal end and a distal end, and a keeper fixed to the catheter proximate a proximal end thereof. The keeper includes a first arm and a second arm defining an aperture. In one method in accordance with the present invention, the catheter shaft is placed in a first position between the first arm and the second arm. The catheter shaft may be twisted and moved to a second position within the aperture defined by the first arm and the second arm. Preferably, the first arm and the second arm releasably trap the catheter shaft when it is disposed within the aperture of the keeper. It should be noted that a physician may position the catheter shaft in the first position and the second position without manipulating the keeper directly. For example, a physician may grasp a hub of the catheter in one hand and a portion of the catheter shaft in a second hand. The catheter shaft has sufficient length that it may be grasped between the palm and fingers of a hand. The keeper of this embodiment allows a physician to capture a portion of the catheter shaft easily, even when wearing two pairs of surgical gloves. A catheter in accordance with yet another embodiment of the present invention includes a catheter shaft having a proximal end and a distal end. The catheter also includes a hub and a keeper which is fixed to the hub. In a preferred embodiment, the keeper is adapted to clip onto the hub. An advantage of this embodiment is that the keeper can be used in conjunction with existing catheters with no modification to the hub. Embodiments of the catheter have also been envisioned in which the keeper and the hub are formed from the same material, for example, by injection molding. The keeper includes one or more tabs. A portion of the catheter shaft may be urged between the tab and the hub. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a plan view of a proximal portion of a catheter having a keeper in accordance with the present invention; FIG. 2 FIG. 1 is a cross-sectional view of the catheter of ; FIG. 3 FIG. 2 1 is a plan view of the catheter of FIG. and ; FIG. 4 is a plan view of an additional embodiment of a catheter having a keeper in accordance with the present invention; FIG. 5 is a perspective view of an additional embodiment of a catheter having a keeper in accordance with the present invention; FIG. 6 is a plan view of a proximal portion of a catheter having a keeper in accordance with the present invention; FIG. 7 FIG. 6 is a cross-sectional view of the catheter of ; FIG. 8 FIG. 7 6 is a plan view of the catheter of FIG. and , in which a shaft of the catheter has been urged into a curved shape; FIG. 9 is a plan view of a proximal portion of a catheter having a keeper in accordance with the present invention; FIG. 10 FIG. 9 is a cross-sectional view of the catheter of ; FIG. 11 is a plan view of a proximal portion of a catheter having a keeper in accordance with the present invention; FIG. 12 FIG. 11 is an additional plan view of the catheter of ; FIG. 13 FIG. 12 1 is an additional plan view of the catheter of FIG. and , in which a portion of the catheter is cut away to illustrate that a loop formed from the catheter shaft may readily pass through an entrance portion of the keeper; FIG. 14 FIG. 11 FIG. 12 FIG. 13 is an additional plan view of the catheter of , , and , in which a plurality of turns formed by the catheter shaft are trapped by the keeper; FIG. 15 is a perspective view of an additional embodiment of a catheter having a keeper in accordance with the present invention; FIG. 16 is a perspective view of an additional embodiment of a catheter having a keeper in accordance with the present invention; FIG. 17 is a perspective view of an additional embodiment of a catheter having a keeper in accordance with the present invention; FIG. 18 is a perspective view of an additional embodiment of a catheter having a keeper in accordance with the present invention; FIG. 19 is a perspective view of an additional embodiment of a catheter having a keeper in accordance with the present invention; FIG. 20 is a perspective view of an additional embodiment of a catheter having keeper in accordance with the present invention; FIG. 21 is a perspective view of an additional embodiment of a catheter having a keeper in accordance with the present invention; FIG. 22 FIG. 21 is a cross-sectional view of the catheter of ; FIG. 23 FIG. 22 21 is a cross-sectional view of the catheter of FIG. and ; FIG. 24 is a perspective view of an additional embodiment of a catheter having a keeper in accordance with the present invention; FIG. 25 is a plan view of an additional embodiment of a catheter having a keeper in accordance with the present invention; FIG. 26 FIG. 25 is a cross-sectional view of the catheter of ; FIG. 27 is a perspective view of an additional embodiment of a keeper in accordance with the present invention; FIG. 28 FIG. 27 is a perspective view of the keeper of ; FIG. 29 is a plan view of an additional embodiment of a catheter in accordance with the present invention; FIG. 30 is a plan view of an additional embodiment of a catheter in accordance with the present invention; FIG. 31 is a plan view of a catheter and a keeper in accordance with the present invention; FIG. 32 FIG. 31 is a plan view of the keeper of ; FIG. 33 FIG. 32 31 is a plan view of the keeper of FIG. and ; FIG. 34 is a plan view of an additional embodiment of a keeper in accordance with the present invention; and FIG. 35 34 is a plan view of the keeper of FIG. . DETAILED DESCRIPTION OF THE INVENTION The following detailed description should be read with reference to the drawings, in which like elements in different drawings are numbered in like fashion. The drawings, which are not necessarily to scale, depict selected embodiments and are not intended to limit the scope of the invention. In some cases, the drawings may be highly diagrammatic in nature. Examples of constructions, materials, dimensions, and manufacturing processes are provided for various elements. Those skilled in the art will recognize that many of the examples provided have suitable alternatives which may be utilized. FIG. 1 100 100 102 104 102 100 102 102 102 102 100 106 102 is a plan view of a proximal portion of a catheter . Catheter includes a catheter shaft . A hub is disposed about a proximal end of catheter shaft . In order to facilitate the handling of catheter , catheter shaft may be wound into a coiled configuration. In a preferred embodiment, catheter shaft is resilient. When catheter shaft is wound into a coiled configuration, catheter shaft is biased to return to a substantially straight shape. Catheter includes a keeper which is adapted to secure catheter shaft in a coiled configuration. 106 120 122 106 124 126 130 124 126 130 102 124 132 126 134 Keeper includes an entrance portion and a capturing portion . Keeper includes a first wall , a second wall , and an opening disposed between first wall and second wall . In a preferred embodiment, opening is adapted to accept a portion of catheter shaft which has been urged into a curved shape. First wall defines a first surface ,and second wall defines a second surface . 106 128 128 136 130 106 106 142 136 128 142 130 FIG. 1 Keeper also includes a third wall . Third wall defines a third surface facing opening of keeper . Keeper also includes a projection extending beyond third surface defined by third wall . In the embodiment of , projection extends in the general direction of opening . FIG. 2 FIG. 2 FIG. 2 FIG. 2 FIG. 2 100 1 142 130 106 142 138 144 102 132 124 136 128 106 140 136 132 124 140 146 104 is a cross-sectional view of catheter of FIG. . In , it may be seen that projection extends into opening of keeper and that projection defines a fourth surface . In the embodiment of , a captured portion of catheter shaft is disposed between first surface defined by first wall and third surface defined by third wall . In , it may be appreciated that keeper includes a fifth surface extending between third surface and first surface defined by first wall . In the embodiment of , fifth surface comprises a portion of an outer surface of hub . FIG. 2 FIG. 2 144 102 138 140 1 132 134 136 138 140 150 150 106 102 120 122 106 2 In the embodiment of , captured portion of catheter shaft is disposed between fourth surface and fifth surface . In the embodiment of FIG. and , first surface , second surface , third surface , fourth surface , and fifth surface define a channel . In a preferred embodiment, channel of keeper is adapted to accept catheter shaft . Entrance portion and capturing portion of keeper are also shown in FIG. . FIG. 3 FIG. 2 FIG. 3 FIG. 3 100 1 2 144 102 150 106 102 148 148 3 102 102 144 102 150 106 is a plan view of catheter of FIG. and FIG. . As in the embodiment of , a captured portion of catheter shaft is disposed within channel of keeper . In the embodiment of , catheter shaft is disposed in a coiled configuration including a loop . In the embodiment of , a plane defined by loop is generally orthogonal to the plane of FIG. . As mentioned previously, in a preferred embodiment, catheter shaft is resilient and biased to assume a substantially straight configuration. Catheter shaft may be urged into a curved configuration to aid in positioning captured portion of catheter shaft within channel of keeper . FIG. 4 FIG. 4 100 100 106 124 126 130 106 128 142 128 130 152 154 142 124 126 152 102 100 100 102 152 is a plan view of an additional embodiment of catheter . As in the previous embodiment, catheter includes a keeper comprising a first wall , a second wall , and an opening therebetween. Keeper also includes a third wall and a projection extending from third wall towards opening . In the embodiment of , there is a gap between an end of projection and a plane extending between first wall and second wall . Gap has a width of G. Catheter shaft of catheter has a diameter of D. In a preferred embodiment of catheter , the diameter of catheter shaft is greater than the width of gap . FIG. 5 FIG. 5 200 200 202 204 254 202 256 202 204 206 204 200 is a perspective view of an additional embodiment of a catheter in accordance with the present invention. Catheter includes a catheter shaft and a hub disposed about a proximal end of catheter shaft . A strain relief is disposed about catheter shaft proximate hub . In the embodiment of , a keeper is fixed to hub of catheter . 206 224 226 230 224 226 224 226 272 206 228 274 242 228 230 242 276 254 242 272 FIG. 5 Keeper includes a first wall , a second wall , and an opening disposed between first wall and second wall . First wall and second wall define a first plane . Keeper also includes a third wall defining a second plane . A projection extends beyond third wall in the general direction of opening . Projection defines a third plane . In the embodiment of , an end of projection is generally aligned with first plane . 206 240 272 274 240 278 272 274 276 278 250 250 206 202 250 FIG. 5 Keeper includes a fifth surface extending between first plane and second plane . Fifth surface defines a forth plane . First plane , second plane , third plane , and forth plane define a channel . In a preferred embodiment, channel of keeper is adapted to accept a portion of catheter shaft . In the embodiment of , channel has a generally polyhedral shape. FIG. 6 FIG. 6 300 300 306 302 300 306 324 326 330 324 326 324 332 326 334 306 328 342 336 328 342 330 342 338 358 340 328 324 300 332 334 336 338 340 350 302 is a plan view of an additional embodiment of a catheter in accordance with the present invention. Catheter includes a keeper which is adapted to entrap a portion of a catheter shaft of catheter . Keeper includes a first wall , a second wall , and an opening disposed between first wall and second wall . First wall defines a first surface and second wall defines a second surface . Keeper also includes a third wall and a projection extending beyond a third surface defined by third wall . In the embodiment of , projection extends in the general direction of opening . Projection defines a fourth surface and an end surface . A fifth surface extends between third wall and first wall . In a preferred embodiment of catheter , first surface , second surface , third surface , fourth surface , and fifth surface define a channel which is adapted to entrap a portion of catheter shaft . FIG. 6 FIG. 6 306 320 360 360 332 324 334 326 358 342 360 302 302 360 350 In the embodiment of , keeper includes an entrance portion including a passageway . As shown in , passageway is defined by first surface of first wall , second surface of second wall , and end surface of projection . In a preferred embodiment, passageway is adapted to accept a portion of catheter shaft which has been urged into a curved shape. Also in a preferred embodiment, a portion of catheter shaft may pass through passageway into channel . FIG. 7 FIG. 7 FIG. 7 300 6 344 302 350 306 306 320 360 322 350 is a cross-sectional view of catheter of FIG. . In the embodiment of , a captured portion of catheter shaft is disposed within channel of keeper . In , it may be appreciated that keeper includes an entrance portion including a passageway , and a capturing portion including channel . FIG. 8 FIG. 8 300 6 7 302 360 306 302 362 302 302 302 362 302 360 320 350 322 is a plan view of an additional embodiment of catheter of FIG. and FIG. . In the embodiment of , a portion of catheter shaft has been positioned proximate passageway of keeper . A force F has been applied to catheter shaft forming a curved portion of catheter shaft . Force F may be applied to catheter shaft , for example, by pushing on catheter shaft with a gloved thumb. In a method in accordance with the present invention, curved portion of catheter shaft may pass through passageway of entrance portion into channel of capturing portion . FIG. 9 FIG. 9 400 402 400 406 460 460 464 is a plan view.of an additional embodiment of a catheter having a catheter shaft . Catheter includes a keeper having a passageway . In the embodiment of , passageway comprises an arcuate slot . FIG. 10 FIG. 10 FIG. 10 FIG. 10 FIG. 10 400 9 406 424 466 466 424 450 9 450 464 460 424 460 402 460 402 450 is a cross-sectional view of catheter of FIG. . In , it may be appreciated that keeper comprises a first wall having an inside surface . Inside surface of first wall defines a channel . In the embodiment of FIG. and , channel is generally cylindrical in shape. In , it a may also be appreciated that arcuate slot of passageway is defined by first wall . In a preferred embodiment of , passageway is adapted to allow a portion of catheter shaft to pass through passageway while it is urged into a curved shape. Once catheter shaft is disposed within channel , it may be allowed to return to a straight shape. FIG. 11 FIG. 11 500 500 502 504 506 506 504 506 506 568 530 is a plan view of an additional embodiment of a catheter in accordance with an additional embodiment of the present invention. Catheter includes a catheter shaft , a hub , and a keeper . In the embodiment of , keeper is fixed to hub . Embodiments of the present invention have been envisioned in which keeper is fixed to other portions of a catheter. Examples of portions of a catheter include the catheter shaft and a catheter strain relief. Keeper comprises a keeper member defining an opening . FIG. 12 FIG. 12 500 11 568 506 520 522 506 is an additional plan view of catheter of FIG. . In , it may be appreciated that keeper member of keeper forms an entrance portion and a capturing portion of keeper . FIG. 13 FIG. 13 FIG. 13 500 11 12 500 548 502 548 562 548 520 506 522 506 502 522 506 506 500 548 548 522 506 14 is a plan view of an additional embodiment of catheter of FIG. and FIG. . In the embodiment of , catheter includes a first loop formed from catheter shaft . First loop may be held in a general coiled shape by the double-gloved hand of a physician (not shown). In , it may be appreciated that a curved portion of first loop may pass through entrance portion of keeper into capturing portion of keeper . It should be noted that a physician may position catheter shaft within capturing portion of keeper without manipulating or deflecting keeper . For example, a physician may-grasp a proximal portion of catheter in one hand and first loop in a second hand. Once first loop is disposed within capturing portion of keeper it may be rotated to the position shown in FIG. . FIG. 14 FIG. 11 FIG. 12 FIG. 14 FIG. 14 500 13 13 548 570 502 522 506 is a plan view of an additional embodiment of catheter of , , and FIG. . The plane of is generally orthogonal to the plane of FIG. . In the embodiment of , a first loop and a second loop formed from catheter shaft are disposed within capturing portion of keeper . FIG. 15 602 602 604 606 606 608 602 610 612 608 606 610 614 616 610 618 614 616 is a perspective view of an additional embodiment of a catheter in accordance with the present invention. Catheter includes a hub and a strain relief . Strain relief defines a groove . Catheter also includes a keeper having a groove engaging portion Which is adapted to be disposed in groove of strain relief . Keeper includes a first arm and a second arm . Keeper also includes an aperture defined by first arm and second arm . 600 602 620 614 616 600 622 15 600 622 618 610 614 616 600 618 In one method in accordance with the present invention, a catheter shaft (shown with phantom lines) of catheter is placed in a first position between first arm and second arm . Catheter shaft may be twisted and moved to a second position shown in FIG. . When catheter shaft is in second position , it is disposed within aperture of keeper . In a preferred embodiment, first arm and second arm releasably trap catheter shaft when it is disposed within aperture . 600 620 622 610 604 600 600 610 600 It should be noted that a physician may position catheter shaft in first position and second position without manipulating keeper directly. For example, a physician may grasp hub in one hand and catheter shaft in a second hand. Catheter shaft has sufficient length that it may be grasped between the palm and fingers of a hand. Keeper allows a physician to capture a portion of catheter shaft easily, even when wearing two pairs of surgical gloves. FIG. 16 624 624 626 628 626 628 626 628 624 628 626 is a perspective view of an additional embodiment of a catheter in accordance with the present invention. Catheter includes a hub and keeper which is fixed to hub . In a preferred embodiment, keeper is adapted to clip onto hub . An advantage of this embodiment is that keeper can be used in conjunction with existing catheters with no modification to the hub. Embodiments of catheter have also been envisioned in which keeper and hub are formed from the same material, for example, by injection molding. 628 630 630 632 600 624 630 626 600 630 626 628 626 600 600 628 600 626 628 634 600 624 634 624 628 634 626 624 626 634 628 FIG. 16 FIG. 16 Keeper includes a plurality of tabs . In the embodiment of , each tab includes a ramp surface . A catheter shaft (shown with phantom lines) of catheter may be urged between a tab and hub . It should be noted that a physician may position catheter shaft between tab and hub without manipulating keeper directly. For example, a physician may grasp hub in one hand and catheter shaft in a second hand. Catheter shaft has sufficient length that it may be grasped between the palm and fingers of a hand. Keeper allows a physician to capture a portion of catheter shaft easily even when wearing two pairs of surgical gloves. In , it may be appreciated that hub and keeper each define a plurality of grooves . Catheter shaft (shown with phantom lines) of catheter may be urged into grooves . Embodiments of the catheter have been envisioned in which keeper includes grooves , and hub does not. Likewise, embodiments of catheter have been envisioned in which hub includes grooves , and keeper does not. FIG. 16 FIG. 16 630 626 630 626 600 626 626 16 In the embodiment of , each tab is generally parallel to a central axis of hub . Embodiments of the present invention have been envisioned in which tab are generally orthoginal to a longitudinal axis of hub . In this envisioned embodiment the portion of catheter shaft , shown in , would run generally parallel to the longitudinal axis of hub rather than crossing over hub as shown in FIG. . FIG. 17 636 636 638 640 638 640 638 640 640 642 644 is a perspective view of an additional embodiment of a catheter in accordance with the present invention. Catheter includes a hub and keeper which is fixed to hub . In a preferred embodiment, keeper is adapted to clip onto hub . An advantage of this embodiment is that keeper can be used in conjunction with existing catheters with no modification to the hub. Keeper includes a jaw and an ear . 600 636 642 638 644 638 17 646 642 638 646 600 642 638 600 642 600 A catheter shaft (shown with phantom lines) of catheter may be trapped between jaw and hub . In one method in accordance with the present invention, a physician may apply pinching forces P and P&prime; to ear and hub , respectively, as shown in FIG. . In this exemplary method, the application of forces P and P&prime; will enlarge a gap between jaw and hub . When gap is enlarged, catheter shaft may be positioned between jaw and hub with substantially zero insertion force. Once catheter shaft is in the desired position, forces P and P&prime; may be removed, allowing jaw to close onto catheter shaft . FIG. 16 642 638 640 642 638 600 600 638 638 17 In the embodiment of , jaw is disposed generally parallel to a longitudinal axis of hub . Embodiments of keeper have been envisioned in which jaw is disposed in an orthogonal arrangement relative to a longitudinal axis of hub . In this envisioned embodiment, catheter shaft coils of catheter shaft would be disposed generally parallel to the longitudinal axis of hub rather than crossing over hub as shown in FIG. . FIG. 18 FIG. 18 648 648 650 652 654 654 656 658 652 656 660 662 is a perspective view of an additional embodiment of a catheter in accordance with the present invention. Catheter includes a hub , a strain relief , and a keeper . Keeper comprises a ribbon having a fixed end which is fixed to strain relief , for example, by over-molding. In the embodiment of , ribbon comprises a web and a plurality of wires . 664 600 648 664 652 656 654 600 600 600 In one method in accordance with the present invention, a coil may be formed from a catheter shaft of catheter . In this method, coil may be positioned proximate strain relief and ribbon of keeper may be wrapped around a portion catheter shaft . This method may be utilized by a physician to aid in managing catheter shaft by keeping a portion of catheter shaft in a coiled configuration. FIG. 18 FIG. 18 650 656 656 654 656 650 652 600 656 600 In the embodiment of , a plurality of turns have been formed around hub by ribbon . In the embodiment of , the turns of ribbon generally overly one another. Embodiments of keeper have also been envisioned in which the multiple turns of ribbon are longitudinally disposed along the length of hub , strain relief , and catheter shaft . In this envisioned embodiment, multiple wraps of ribbon may serve to hold multiple coils of catheter shaft in a relatively tight bundle. FIG. 19 668 668 670 672 600 668 674 668 670 672 674 676 678 680 682 680 676 674 674 684 682 676 676 is a perspective view of an additional embodiment of a catheter in accordance with the present invention. Catheter includes a hub , a strain relief , and a catheter shaft . Catheter also includes a keeper which is fixed to catheter between hub and strain relief . Keeper comprises a filament having a fixed end and a free end . A radial enlargement or bulbous end is disposed about free end of filament to lock the keeper in a closed position. To allow this to function, keeper also includes a bifurcation which is adapted to receive a portion of bulbous end and filament . In a preferred embodiment, filament is comprised of an elastomeric material. Examples of materials which may be suitable in some applications include silicone rubber and thermoplastic elastomer (TPE). 600 672 676 600 600 672 676 682 684 676 682 686 684 In one method in accordance with the present invention, a portion of catheter shaft may be positioned proximate strain relief and filament may be looped over catheter shaft , trapping catheter shaft against strain relief . In a preferred method, filament may be stretched and bulbous end may be positioned proximate bifurcation . In this preferred method, tension from filament will urge bulbous end into a recess in bifurcation . 674 676 672 670 600 676 672 670 600 676 600 Embodiments of keeper have been envisioned in which filament makes multiple wraps around strain relief , and/or hub , and catheter shaft . The multiple wraps of filament may be disposed longitudinally along the length of strain relief , hub , and catheter shaft . Disposing multiple wraps of filament longitudinally may serve to retain multiple coils of catheter shaft in a tight bundle. FIG. 20 688 688 690 692 600 690 688 694 690 696 698 696 690 is a perspective view of an additional embodiment of a catheter in accordance with the present invention. Catheter includes a hub , a strain relief , and a catheter shaft . Hub of catheter defines a plurality of slots . Hub also forms a slide . A gate is disposed in sliding engagement with slide of hub . FIG. 20 694 700 702 698 700 694 20 698 706 696 704 706 706 704 698 700 694 In the embodiment of , each slot includes an entry portion and a capturing portion . Gate is adapted to obstruct entry portion of each slot when it is slid in the direction indicated by the arrows in FIG. . Gate defines a groove . Slide includes a rib which is adapted to be received within groove . In a preferred embodiment, groove and rib cooperate to lock gate in a position which obstructs entry portion of each slot . FIG. 21 FIG. 21 708 710 710 712 714 716 712 716 718 600 708 718 714 716 600 is a perspective view of an additional embodiment of a catheter having a keeper . Keeper includes a flange , a ring , and a washer . As shown in , flange and washer define a slot . A portion of a catheter shaft of catheter is disposed within slot . In a preferred embodiment, ring is adapted to be urged distally, creating a friction fit between washer and catheter shaft . FIG. 22 FIG. 22 710 21 714 719 719 714 720 724 714 718 712 716 714 600 712 716 is a cross-sectional view of keeper of FIG. . In , it may be appreciated that ring includes a female thread . Female thread of ring engages a male thread defined by hub . Ring may be rotated to adjust the width of slot defined by flange and washer . Ring may also be utilized to pinch catheter shaft between flange and washer . FIG. 23 FIG. 23 710 21 22 724 726 720 716 722 720 726 724 726 724 722 716 716 is a cross-sectional view of keeper of FIG. and FIG. . In , it may be appreciated that hub includes a flat disposed proximate male thread . Washer includes a generally D-shaped hole which is adapted to accept male thread and flat of hub . In a preferred embodiment, flat of hub and D-shaped hole of washer cooperate to preclude washer from rotating. FIG. 24 FIG. 24 728 728 730 600 728 730 728 732 738 730 738 734 736 600 730 734 732 730 736 is a perspective view of an additional embodiment of a catheter in accordance with the present invention. Catheter includes a hub disposed about a proximal portion of a catheter shaft of catheter . Hub of catheter defines a plurality of slots . A locking member is disposed in pivotal engagement with hub . Locking member includes a plurality of wings . A plurality of tangs project from each wing. In a method in accordance with the present invention, a portion of catheter shaft may be trapped between hub and a wing . In the embodiment of , each slot defined by hub is adapted to accept a tang . FIG. 25 FIG. 25 FIG. 25 740 740 600 742 746 742 740 742 744 746 744 746 756 748 600 748 is a perspective view of an additional embodiment of a catheter in accordance with the present invention. Catheter includes a catheter shaft and a port . In the embodiment of , a keeper is releasably coupled to port of catheter . In a preferred embodiment, port comprises a male luer fitting and keeper includes a female luer fitting . Keeper also includes a keeper body defining a lumen . In the embodiment of , a portion of catheter shaft is disposed within lumen . FIG. 26 FIG. 26 740 25 746 750 750 752 754 754 758 756 768 760 762 760 752 600 748 746 760 754 752 600 600 760 is a cross-sectional view of catheter of FIG. . In , it may be appreciated that keeper includes a catheter fixing mechanism . Catheter fixing mechanism includes a jam and a jam motion control . Jam motion control includes a male thread defined by keeper body and a female thread defined by a knob . A shaft extends between knob and jam . Catheter shaft may be fixed within lumen of keeper by rotating knob of jam motion control in a first direction until jam contacts catheter shaft . Catheter shaft may be release by rotating knob in a second direction. FIG. 27 FIG. 27 FIG. 27 770 770 600 772 774 770 772 776 778 780 776 778 772 782 600 782 790 776 784 790 786 776 788 600 790 782 776 790 is a perspective view of an additional embodiment of a catheter in accordance with the present invention. Catheter includes a catheter shaft . A keeper is fixed to a portion of catheter . Keeper includes a first leg , a second leg , and a crotch extending between first leg and second leg . Keeper also includes a latch which is adapted to trap a portion of catheter shaft . Latch includes a door which is coupled to first leg by a hinge . In the embodiment of , door includes a groove and first leg includes a groove . A portion of catheter shaft is trapped between door of latch and first leg . The position of door in may be generally referred to as a closed position. 772 790 786 776 788 772 600 Embodiments of keeper have been envisioned in which door includes a plurality of grooves and first legs includes a plurality of grooves . In these envisioned embodiments, keeper may retain a plurality of turns of catheter shaft . FIG. 28 FIG. 28 FIG. 28 FIG. 28 772 27 790 782 792 776 794 792 794 790 772 774 770 772 772 is a perspective view of an additional embodiment of keeper of FIG. . In the embodiment of , door has been moved to an open position. In , it may be appreciated that latch includes a clasp member . First leg includes a clasp member receiver . In a preferred embodiment, clasp member and clasp member receiver cooperate to releasably hold door in the closed position. In the embodiment of , keeper has been removed from portion of catheter . Embodiments of keeper have been envisioned in which keeper is adapted to be fixed to various objects, for example, a table. FIG. 29 FIG. 29 948 948 950 952 954 954 956 950 964 900 948 964 902 904 956 900 950 904 956 950 is a plan view of an additional embodiment of a catheter in accordance with the present invention. Catheter includes a hub , a strain relief , and a keeper . Keeper comprises a ribbon having a fixed end which is fixed to hub . A coil is formed from a catheter shaft of catheter . In the embodiment of , a portion of coil is disposed between a plurality of projections . A plurality of turns of ribbon are disposed about a portion of catheter shaft and a portion of hub . Turns of ribbon are longitudinally disposed along the length of hub . FIG. 30 FIG. 30 FIG. 30 1168 1168 1100 1170 1102 1100 1102 1168 1174 1176 1178 1180 1178 1176 1106 1170 1182 1180 1176 1174 1170 1122 1182 1176 1176 1108 1176 1100 1170 1108 1176 1170 is a plan view of an additional embodiment of a catheter in accordance with the present invention. Catheter includes a catheter shaft and a hub having a plurality of projections . In the embodiment of , a portion of catheter shaft is disposed between a plurality of projections . Catheter also includes a keeper comprising a filament having a fixed end and a free end . Fixed end of filament is fixed to a ring which is disposed about a portion of hub . A radial enlargement or bulbous end is disposed about free end of filament to lock the keeper in a closed position. Hub defines an aperture which is adapted to receive a portion of bulbous end and filament . In a preferred embodiment, filament is comprised of an elastomeric material. Examples of materials which may be suitable in some applications include silicone rubber and thermoplastic elastomer (TPE). A plurality of wraps of filament are disposed about a portion of catheter shaft and a portion of hub . It may be noted in that wraps of filament are longitudinally disposed along the length of hub . FIG. 31 1348 1348 1350 1300 1364 1300 1348 1374 is a plan view of an additional embodiment of a catheter in accordance with the present invention. Catheter includes a hub and a shaft forming a plurality of coils . In a preferred embodiment, shaft of catheter is held in a coiled configuration by a keeper . 32 1374 31 1374 1310 1312 1312 1310 1314 1374 FIG. 33 FIG. 32 FIG. and are plan views of keeper of FIG. . Keeper includes a body member and a plurality of tangs . As shown in , tangs and body member define a plurality of cavities . In a preferred embodiment, keeper comprises an injection molded thermoplastic material. 33 1574 1574 1510 1516 1518 1518 1510 1520 1574 1520 FIG. 34 FIG. 34 FIG. and are plan views of an additional embodiment of a keeper in accordance with the present invention. Keeper includes a body member and a plurality of slots defining a plurality of tabs . As best seen in , tabs and body member define a plurality of interstitial spaces . In a preferred embodiment, keeper is adapted to accept a catheter shaft within interstitial spaces and retain the catheter shaft therein. Having thus described the preferred embodiments of the present invention, those of skill in the art will readily appreciate that yet other embodiments may be made and used within the scope of the claims hereto attached. Numerous advantages of the invention covered by this document have been set forth in the foregoing description. It will be understood, however, that this disclosure is, in many respects, only illustrative. Changes may be made in details, particularly in matters of shape, size, and arrangement of parts without exceeding the scope of the invention. The invention&apos;s scope is, of course, defined in the language in which the appended claims are expressed.
Blue crabs are named for their brilliant sapphire-tinted claws; their carapace (shell) is actually mottled brownish in color. The blue crab's scientific name, Callinectes sapidus, means "savory beautiful swimmer." Prized for their sweet and tender meat, these crustaceans are among the most heavily harvested in the world. Video of the Day Habitat Blue crabs are found in brackish coastal lagoons and estuaries from Nova Scotia to the Gulf of Mexico, and as far south as Uruguay. Blue crabs are extremely sensitive to changes in their habitat and environment. Constant overharvesting has caused wide-ranging negative effects on the ecosystems they inhabit. Blue crabs are opportunistic feeders, and they are important in managing the populations of their prey. They will consume mussels, snails, fish, plants, carrion and even smaller, soft-shelled blue crabs. Female Blue Crab The female blue crab is easy to distinguish from the male, as she has red-tipped claws. Females stop molting when they reach sexual maturity; this occurs after 21 to 22 molts. During the last molt, mating occurs. A female blue crab will mate only once in her life. The male deposits sperm in sacks inside the female, which she uses in the future. The female's ovaries begin to develop after mating. Females carry their young in a large sack under their abdomen. Because this sack resembles a sponge, females carrying it are called sponge crabs. Male Blue Crab Male blue crabs can reach 9 inches in shell width. Males will grow and molt throughout their lives. The male's abdomen is long and slender, and resembles an inverted T. Molting In early stages of molting, the crab is forming a new, soft shell under the existing hard shell. Molting hormones are released, and the layer of cells beneath the shell (the hypodermis) detaches from the existing shell. The hypodermis produces enzymes that dissolve the existing shell. During all this, the new soft shell is forming. This first stage of molting is called precdysis, or the peeler stage. During the second stage, called ecdysis, or the busting stage, the crab stops feeding and seeks shelter to avoid predators. The crab absorbs water at a high rate, which splits the old shell along the back and at the claws. At this point the crab backs out of its old shell. The crab then pumps water into its new shell, inflating it to its new, larger size. The new shell will be fully hardened in two to four days. Fun Facts Blue crabs are closely related to shrimp and lobster. The blue crab has specially adapted hind legs shaped like paddles; these appendages make them excellent swimmers. Blue crabs are true "crabs." They are quick to use their sharp front pincers when threatened. The average life span of blue crab is one to four years. They weigh from one to two pounds.
https://www.ehow.com/about_6580733_interesting-blue-crabs.html
Astronomical discovery involves more than detecting something previously unseen. The reclassification of Pluto as a dwarf planet in 2006, and the controversy it generated, shows that discovery is a complex and ongoing process – one comprising various stages of research, interpretation and understanding. Ranging from Galileo's observation of Jupiter's satellites, Saturn's rings and star clusters, to Herschel's nebulae and the modern discovery of quasars and pulsars, Steven J. Dick's comprehensive history, Discovery and Classification in Astronomy, identifies the concept of 'extended discovery' as the engine of progress in astronomy. Discovery and Classification in Astronomy traces more than 400 years of telescopic observation, exploring how the signal discoveries of new astronomical objects relate to and inform one another, and why controversies such as Pluto's reclassification are commonplace in the field. Discovery and Classification in Astronomy is complete with a detailed classification system for known classes of astronomical objects, offering students, researchers and amateur observers a valuable reference and guide. Preface Abbreviations Introduction: the natural history of the heavens and the natural history of discovery Part I. Entree 1. The Pluto affair Part II. Narratives of Discovery 2. Moons, rings, and asteroids: discovery in the realm of the planets 3. In Herschel's gardens: nebulous discoveries in the realm of the stars 4. Dwarfs, giants, and planets (again!): the discovery of the stars themselves 5. Galaxies, quasars, and clusters: discovery in the realm of the galaxies Part III. Patterns of Discovery 6. The structure of discovery 7. The varieties of discovery 8. Discovery and classification Part IV. Drivers of Discovery 9. Technology and theory as drivers of discovery Part V. The Synthesis of Discovery 10. Luxuriant gardens and the master narrative 11. The meaning of discovery Appendix I Appendix II Steven J. Dick served as the NASA Chief Historian from 2003 to 2009 and was the Charles A. Lindbergh Chair in Aerospace at the National Air and Space Museum from 2011 to 2012. He has worked as both an astronomer and historian of science. Minor planet 6544 Stevendick is named in his honor. "A highly accessible collection of narrative case studies that explore how the discipline of astronomy has gone about detecting new classes of phenomena .and then has decided if, indeed, these new classes are in fact new, or whether they are actually variations or extremes of previously known classes. The bold ambition of the book, to craft a systematic hierarchical classification of all astronomical phenomena, to aid in forming and reforming taxonomies for future discoveries of new astronomical phenomena is, indeed, a goal that should be of great interest to scientists, historians, sociologists and philosophers." – David H. DeVorkin, National Air and Space Museum "In challenging widely accepted ideas about the nature of scientific discovery Steven J. Dick has written a bold and compelling book that will surely prove to be one of the most important works in the history of astronomy published in recent years. It is both an account of observational astronomy since the early seventeenth century as well as a deeply thought out and highly original investigation of the notions of discovery and classification in astronomy." – Robert Smith, University of Alberta "Astronomy is an observational science so astronomers don't do experiments. They only observe, gather data, classify, interpret, define, and perhaps understand. Building on the foundation established by Martin Harwit more than thirty years ago, Steven J. Dick articulates an fascinating tale of discoveries, missed discoveries, and rediscoveries, explaining the unappreciated but nevertheless often significant role of luck, culture, sociology, and the importance of a firm and unambiguous recognized statement or claim of discovery. Discovery and Classification in Astronomy weaves the tortuous path between discovery and classification including the impact of recognizing or even merely defining or renaming celestial bodies or phenomena so vividly illustrated by the unexpected emotional public as well as professional controversy over the 2006 IAU re-classification which downgraded Pluto to a seemingly lowly 'dwarf planet' status."
https://www.nhbs.com/discovery-and-classification-in-astronomy-book
International Criminal Court (ICC) judges have issued guiding questions that will help determine the nature of the reparations in the Bosco Ntaganda case. They have also provided a timetable for parties and participants in the case to submit their observations. As part of the reparations proceedings, the court’s Registry has issued a call for experts to assist the court in determining the nature of the reparations in the case. The call follows a December 5, 2019 order issued by Trial Chamber VI, in which it set the timelines for filing observations on the reparations and ordered the Registry to identify three or more experts. Seeking Experts In the Registry’s call for experts, it notes that the trial chamber may appoint competent experts to be included on the list of experts that the Registry maintains pursuant to Regulation 44 of the Regulations of the Court. The chamber may do so if the individuals’ expertise is deemed necessary to assist it in determining the extent of any damage, loss, and injury to or in respect of victims and to suggest options concerning the appropriate types and modalities of reparations. Individuals to be included on the list of experts would need to have proven expertise and wide experience in a variety of matters relating to reparations. Familiarity with the context of the ICC’s operations, including an understanding of the affected communities, local and regional dynamics, stakeholders, and local programs or initiatives, will be considered an asset. The experts sought need to have expertise in the matters below, with a focus on the specific circumstances of the Ntaganda case: i. the scope of liability of the convicted person; ii. the scope, extent, and evolution of the harm suffered by both direct and indirect victims, including the long-term consequences of the crimes on the affected communities and the potential cost of repair; iii. appropriate modalities of reparations; and iv. sexual violence, in particular sexual slavery, and its consequences on direct and indirect victims. The Registry will receive expressions of interest until January 19, 2020, and the experts will be engaged from February 14 to August 28, 2020, when their report will be due to be filed before the trial chamber. Ntaganda was convicted last July of five counts of crimes against humanity and 13 counts of war crimes. He is appealing the conviction and the 30-year prison term. However, these appeals do not stop the reparations proceedings from moving forward. Issues Guiding the Reparations The Single Judge of Trial Chamber VI, Judge Chang-ho Chung, has given the Registry, the Trust Fund for Victims, and parties to the proceedings, up to February 28, 2020, to make submissions on the following issues: i. whether the principles on reparations established by the Appeals Chamber in the Lubanga case need to be amended or supplemented in light of the circumstances of the Ntaganda case; ii. the criteria and the methodology to be applied in the determination and the assessment of: (i) the eligibility of victims; (ii) the relevant types and scope of harm; and (iii) the scope of liability of Mr Ntaganda, including the determination of the precise extent of the (monetary) obligations to be imposed on him; and iii. the types and modalities of reparations appropriate to address the types of harm relevant in the circumstances of the Ntaganda case, including factors relating to the appropriateness of awarding reparations on an individual basis, a collective basis, or both. The prosecution and the government of the Democratic Republic of Congo will also have up to February 28, 2020 to make submissions on these issues. Additionally, any organization interested in making submissions on the issues, once authorized by the trial chamber, would file their observations by the same date. Parties to the proceedings will subsequently have up to October 30, 2020 to file final submissions, including responses to arguments of other participants.
https://www.ijmonitor.org/2020/01/icc-seeks-experts-to-advise-on-ntaganda-reparations/
Populist politics and authoritarian resurgence will be growing risks over the next year, according to a new report. The risks posed by populist and nativist agendas will grow in 2020, say 75.7% of respondents to the the World Economic Forum’s Global Risks Perception Survey (GRPS). Some 62.9% believe ‘authoritarian leadership’ will also be a growing threat while 60.5% fear more foreign interference in domestic politics. While the open cyberspace has allowed the democratization of certain processes and increased access to information and data, growing opportunities for promoting falsehoods (accidentally and deliberately) have resulted in a gradual erosion of trust in media, social networks and even governments, says the World Economic Forum’s Global Risks Report 2020. The Global Risks Perception Survey (GRPS), the World Economic Forum’s source of risks data, draws on the expertise of an extensive network of business, government, civil society and thought leaders. Both the GRPS and the Global Risks Report adopt the following definition: A “global risk” is an uncertain event or condition that, if it occurs, can cause significant negative impact for several countries or industries within the next 10 years. In the survey, “protectionism regarding trade and investment” and “populist and nativist agendas”—two major obstacles to the free flow of foreign direct investment (FDI)—were rated as the fifth and sixth risks most likely to increase through 2020. Rising populism Is one of the trends that have led observers to question Francis Fukuyama’s much-criticized thesis that liberal democracy is the endpoint of history, notes Yascha Mounk. The ongoing democratic recession and growing disaffection among citizens also pose new challenges to this view. Yet testing requires us to consider not only liberal democracy’s internal contradictions, but also those of its authoritarian rivals, he writes in the latest issue of the NED’s Journal of Democracy: Perhaps a growing share of citizens say that they do not care about individual liberty and collective self-determination—and are willing to vote for populist parties and candidates—because liberal democracy is far less able to fulfill the most pressing human desires than its partisans have long believed. Even after they lose their freedoms, the former citizens of liberal democracies might not bemoan their loss. But it seems just as plausible that the rise of authoritarian populists will eventually bring about a counter-reaction. Populist politics – space for democratic renewal? Is the demos distinct from the populus? Is populism a necessary element of democratic politics? Is it a response to the failure of ‘liberal democratic’ capitalism or merely its perverse shadow? Is populism of necessity exclusionary and racist? Is the demos equivalent to the people? Do populist forms of politics open a space for democratic renewal? These are some of the questions to be addressed at a forthcoming UK conference – September 7, 2020 to September 9, 2020 – on the relationship between Democracy and Populism.
https://www.demdigest.org/populism-growing-threat-or-space-for-democratic-renewal/
As the Director of Product Management, you provide strategy and leadership to HealthEdge’s product portfolio related to Provider Data Management offerings for the payer market. Working directly with customers, agile engineering teams, and other internal functions, you will lead the process of identifying, prioritizing, and delivering strategy, roadmap, and features for new Provider data quality offerings. Your goals are provider offerings that are both innovative and drive business value to new and existing customers. You will also be responsible for successfully launching the solutions into market and enabling the organization. This is an opportunity to make a significant difference across HealthEdge’s growing product portfolio. What you will do: - Provide leadership and direction for HealthEdge provider data offerings with clear understanding of the markets we serve to both anticipate and lead - Develop and maintain the roadmap for the Provider Data team, balancing short- and long-term investment decisions - Work with customers to understand their business needs and provide guidance and consulting, both internally and externally, for potential solutions - Provide the product vision, features, and overall priorities specific to Provider Data solutions - Partner closely with engineers and product managers in developing cutting edge technology that delivers the required customer and market value - Lead the commercialization and enablement efforts of the Provider Data offerings, coordinating the go-to-market activities with key stakeholders including Customers, Account Executives, Sales, Professional Services, and Cloud Operations, to create and deliver a great customer experience - Work with the compliance team to anticipate regulatory changes that affect the solution - Develop high level business requirements for epics and user stories describing the business value and user stories - Lead internal training and knowledge transfer for key product features - Inspire and motivate teams toward a common direction What you bring: - 5+ years’ experience in some combination of Provider Data Quality, Credentialing, and Licensing spaces with a clear understand of markets, competitors, workflows, and operations - 3+ years’ experience in an innovation, business or product management leadership role either directly leading teams and/or influencing organization to accomplish a common goal - 3+ years’ experience in product management and/or software products experience in a SaaS-based, Agile/Scrum technology company including all related processes (e.g. story mapping, requirements writing, prioritized backlogs, product ownership within a scrum team) - Proven track record of successfully leading and working with product management or other business functions to analyze, define, and document software requirements for commercial software product development - Clear thinking and the ability to translate ideas, concepts, context, and business or technical rationale into written and/or presentation format for a variety of internal (management) or external (customers) audiences - Strong interpersonal skills … people like working with and following you - The ability to work across teams and the organization - High Do:Say ratio - Bachelor’s degree in engineering, science, or healthcare Bonus points: - Advanced degree in engineering, business, or healthcare - Demonstrated business acumen and in-depth business domain knowledge related to provider data, credentialing, and/or licensing in the payer/claims space - Provider Data operational experience at a health plan - Strong written and verbal communication skills HealthEdge commits to building an environment and culture that supports the diverse representation of our teams. We aspire to have an inclusive workplace. We aspire to be a place where all employees have the opportunity to belong, make an impact and deliver excellent software and services to our customers.
https://venturefizz.com/jobs/boston/director-product-management-provider-at-healthedge-burlington-ma
Agra is a city on the banks of the river Yamuna in the northern state of Uttar Pradesh, India. It is 363 kilometres west of the state capital, Lucknow, 200 kilometers south of the national capital New Delhi and 125 kilometers (78 mi) north of Gwalior. It is one of the most populous cities in Uttar Pradesh and the 19th most populous in India. Agra can also refer to the administrative district that has its headquarters in Agra city. It is a major tourist destination because of its many splendid Mughal-era buildings, most notably the Taj Mahal, Agra Fort and Fatehpūr Sikri, all three of which are UNESCO World Heritage Sites. Agra is included on the Golden Triangle tourist circuit, along with Delhi and Jaipur. Same day trip Itinerary: Agra is approx 220 kms. From New Delhi, Time Taken 3 hrs. 30 min. approx. by Yamuna Express way to Agra, Taj Mahal. Old Way Its takes 4 to 5 hours 06:00 am to 07:00 am from Delhi-Agra by ac taxi We will pick you from the hotel, home, railway station, airport, by our representative in Delhi and will be driven to Agra through Yamuna Express way (Fastest way to reach Agra by World class road condition). On the stop over at 2nd toll gate of Yamuna express way for Tea/Coffee (Enjoy the Tea Break). Reach Agra With in 3 hrs 30 min. 09:00 am – 10:00 am – Go to Visit Taj Mahal On arrival at Agra, our executive will welcomed you at Agra & introduce you with our tour guide, who will take you to the Taj Mahal. You can explore the Beauty of Taj Mahal & history. 12:00 noon to 01:00 pm – Go for Lunch at Agra. After Visit the Seven Wonders of the World Taj Mahal, Enjoy Lunch in local Recommend Restaurant or Hotel in Agra. After completing your lunch go to Visit Agra Fort 02:00 pm to 3:00 pm – Go to Visit Red Fort After Having your Lunch, Go to visit Agra Fort, the Magnificent Beauty of Red Sandstone Positioned on the Banks of River Yamuna. 03:30 pm to 04:30 pm go to Explore the Local Market of Agra After Visit Red Fort you can explore the colorful markets of Taj City Agra which is famous for Marble, leather goods and handicraft Items. 05:00 pm to 06:00 pm – After Visiting Beauty of Agra, Taj Mahal & Drive to Delhi With Sweet memories of Agra Same day tour and driver to Delhi From Agra, Via Yamuna Express way and we’ll drop you at your Hotel, Home, Airport, Railway Station in Delhi for your onward destination. We hope you keep Sweet Memories of Same Day Agra Tour by Car with our company. Delhi – Agra Taxi fare as per Itinerary ( Book Online Delhi – Agra Taxi ) Places of Interest in Agra: Taj Mahal The Taj Mahal is one of the most famous buildings in the world, the mausoleum of Shah Jahan’s favourite wife, Mumtaz Mahal. It is one of the New Seven Wonders of the world, and one of the three World Heritage Sites in Agra. Tombs of Shah Jahan and his beloved wife, Mumtaz Mahal. Completed in 1653, the Taj Mahal was built by the Mughal king Shah Jahan as the final resting place for his beloved wife, Mumtaz Mahal. Finished in marble, it is perhaps India’s most beautiful monument. This perfectly symmetrical monument took 22 years (1630–1652) of labour and 20,000 workers, The Taj Mahal is on the south bank of the Yamuna River. Agra Fort Agra Fort (also called the Red Fort), was commissioned by the great Mughal Emperor Akbar in 1565, and is another of Agra’s World Heritage Sites. A stone tablet at the gate of the Fort states that it had been built before 1000 but was later renovated by Akbar. The red sandstone fort was converted into a palace during Shah Jahan’s time, and reworked extensively with marble and pietra dura inlay. Fatehpur Sikri The Mughal Emperor Akbar built Fatehpūr Sikrī about 35 km (22 mi) from Agra, and moved his capital there. Later abandoned, the site displays a number of buildings of significant historical importance. Itimad-Ud-Daulah The Empress Nur Jahan built I’timad-Ud-Daulah’s Tomb, sometimes called the “Baby Tāj”, for her father, Mirza Ghiyas Beg, the Chief Minister of the Emperor Jahangīr. Located on the left bank of the Yamuna river, the mausoleum is set in a large cruciform garden, criss-crossed by water courses and walkways. Akbar’s Tomb, Sikandra Sikandra, the last resting place of the Mughal Emperor Akbar the Great, is on the Delhi-Agra Highway, only 13 kilometres from the Agra Fort. Akbar’s tomb reflects the completeness of his personality. Mankameshwar Temple Mehtab Bagh The Mehtab Bagh, or ‘Moonlight Garden’, is on the opposite bank of the River Yamuna from the Taj Mahal. Keetham Lake Also known as Sur Sarovar, Keetham Lake is situated about 7 kilometres from akbar tomb Agra, within the Surdas Reserved Forest. The lake has an impressive variety of aquatic life and water birds. Mughal Heritage Walk The Mughal Heritage Walk is a part of community development programme being implemented with support of Agra Municipal corporation, USAID and an NGO; Center for Urban and Regional Excellence. It seeks to build sustainable livelihoods for youth and women from low resource communities and improve their living environments through infrastructure services and integration within the city. Paliwal Park (Hewitt Park) Paliwal Park, during the British Raj was known as Hewitt Park, is now renamed in memory of Shri Krishna Datta Paliwal, Who was the first finance minister of Uttar Pradesh, when Shri Govind Ballabh Pant was the Chief Minister of U.P State. Paliwal Park is located in the heart of Agra, India. It is spread over an area of around 70 acres (280,000 m2). It also has a small lake and has vast variety of trees. Looking for car hire from Delhi to Agra? Your requirement for a Delhi to Agra taxi can be fulfilled at IndiaTaxiOnline.co.in. Book a taxi for your next journey between Delhi and Agra at Indiataxionline.co.in for a comfortable journey. At IndiaTaxiOnline.co.in we provide with the best maintained cars for your convenience for trips between Delhi & Agra. Booking a cab is very easy at India Taxi Online with pickups scheduled as per your convenient timing and place. If you wish to explore Agra and nearby places while based in Delhi, there are plenty of attractions over there. You can visit places like Taj Mahal, Fatehpur Sikri, Agra Fort, Sikandra, Itmadud Daula, Soor Sarovar, Jama Masjid, Diwan-i-Am & Buland Darwaza while at Agra. We offer Delhi-NCR to Agra car rental at attractive prices. Agra is most famous for its monumental structure, the Taj Mahal, built by Emperor Shah Jahan during his time in 1653 in the memory of his wife Mumtaz Mahal. This is one of the best attractions around in a place where approximately 10 million visit every year. Apart from the Taj Mahal there are other attractions as well like the Agra Fort, Fatehpur Sikri etc among many others. India taxi online offers you the best taxi ride to Agra and to these places for visit. Book your Delhi to Agra taxi with us in easy steps and ensure a great journey to some beautiful places around Agra and Delhi.
http://www.indiataxionline.co.in/delhi-to-agra-taxi/
Transnational corporations increasingly seek to present a vision of social responsibility alongside the business vision. This reflects greater awareness of ‘the world as one single place’, of global risk scenarios, and the politics of doing business. There are also demands for greater transparency and accountability in corporate actions by state representatives, grassroots movements and organized consumers. Transnational corporations now aim to be socially responsible and to engage in ‘corporate citizenship’ by adhering to voluntary codes of conduct, social accountability standards, etc. This discourse of corporate accountability is part of a discourse of globality, or ‘globe talk’, a vital component of contemporary world culture, largely produced, diffused, and sustained by organizations with expansive ambitions of regulating global business; transnational corporations, business associations, international organizations, NGOs and INGOs. Awareness of the global nature of trade and capitalism, the associated risk scenarios, and the attempts at approaching something like a humane globalization by the setting up of ethics standards and codes of conduct, may be understood as a particular case of ‘worldism’. This ‘worldism’ is foundational, with universalizing and homogenizing claims. ‘Corporate citizenship’ and ‘accountability’ are therefore treated as a form of organizational culture that involves a particular kind of moral cosmopolitanism. Think tanks, or policy institutes, are becoming significant ‘sites of normativity’ on the global political scene. While their primary concern often is to provide knowledge, based on which decision makers can make informed choices, they also play a part in setting organizational agendas and priorities, and in mobilizing for political action. Based on ethnographic fieldwork in think tanks in Washington DC, the paper engages with the modes representation used by policy experts as they strive to get traction and establish credibility for their ideas. The work of policy experts can be understood as a form of ‘bricolage,’ in which information and normative perspectives are tinkered with and are thus afforded truth-value. The use of distanciation and proximation techniques facilitates the continuous scale-making processes in which policy experts are involved. In the face of widespread organizational change which some claim heralds the demise of bureaucracy, and in the context of the cultural and intellectual uncertainties of postmodernism, how do people in organizations respond? In this paper, we explore the role of `How To' books for managers in the elaboration of these responses. How To books may be read as part of a long-standing tradition of self-help which represents a form of the secularized Protestant ethic. However, in contemporary conditions it is also congruent with emerging forms of reflexivity and projects of the self. The How To books we discuss promise to yield control of the world around them to managers who learn to know and control their `inner-worlds'. They also offer techniques of self-presentation and self-appraisal which, we argue, are particularly congruent with the likely control problems within post-bureaucratic organizations. This paper is a contribution to the analysis of intra-organizational trust. From a discussion of concepts of trust, we suggest that trust is something which is constructed for and by people in organizations, thereby producing some degree of predictability. Trust is a precarious social accomplishment enacted through the interplay of social or discursive structures, including those of work organizations, and individuated subjects. We argue that bureaucratic organizations effected this construction in such an efficient manner that it `disappeared' as an issue for organizational theorists, but that shifting organizational forms have re-opened it. We suggest that the advent of corporate culturism in the 1980s offered one kind of reconfiguration of trust in organizations. However, subsequent extensions of organizational reform have undermined corporate culture as a way of constructing trust. These extensions, which, with some caveats, may be called post-bureaucratic, have brought with them new potential bases for trust, and hence control, in organizations. We explore these in two ways. First, we discuss how various types of managerial languages and techniques have the capacity to provide a global `script' through which particular local contexts can be made sense of, and which allow possible subject positions and identities to be secured. Second, we develop this discussion with reference to two different kinds of employees whose work is in some senses post-bureaucratic: accountants and consultants in Big Five firms, and temporary workers (temps) working through agencies to provide clerical and other services. In a conclusion, we comment on the durability of post-bureaucratic modes of trust The debate on global governance points to shifts in the type and nature of regulation as well as in the set of actors involved. The article introduces a novel way of conceptualizing the changes, namely a move towards post-political forms of regulation (see also Garsten and Jacobsson, 2007). Drawing on Chantal Mouffe’s notion of ‘the post-political vision’, the article argues that many contemporary forms of regulation are premised on consensual relationships as the basis for regulatory activity. These regulatory practices tend to narrow down the conflictual space, thereby exerting a form of soft power. Moreover, in the post-political forms of regulation, unequal power relations tend to be rendered invisible. The empirical cases discussed are voluntary regulatory arrangements, more specifically the Open Method of Coordination of the EU (OMC) and CSR (Corporate Social Responsibility) initiatives. The ‘employable individual’ is today a powerful normative category, saturated with assumptions about what it takes to be attractive in the labour market. What happens to people who cannot meet those expectations? For some, the way to employability and employment goes through a process of detecting and coding of disability at the Public Employment Service (PES). Based on interviews with staff at a rehabilitation unit in the Swedish Public Employment Service, the article analyses processes of evaluating work capacity for marginally employable people as part of the Employability Rehabilitation Programme. By studying the classification procedures, the article analyses how administrative categories work as ‘technologies of government’ that ‘make legible’ desirable traits in the individual. The analysis shows that employability is mediated, or enabled, by classificatory procedures that spring out of a template for what is considered acceptable and desirable individual characteristics, hence reinforcing standards of normalcy. Moreover, the categories through which the individual moves are plastic and pliable in relation to political predicates and labour market fluctuations. In this process, to be non-employable becomes a disability and conversely, to be disabled can make one employable. The article examines the organisational production and distribution of normatively charged ideas for governing transnational business. Based on the United Nations Global Compact Initiative, it is argued that the UN version of ‘corporate social responsibility’ (CSR) builds on a metanarrative of rationality, involving ideals of transparency and legibility combined with an emphasis on consensus and harmony. The strong accent on partnership, agreement and dialogue leaves little space for the involved parties to articulate and defend diverging interests. By transforming what are basically political conflicts of interest into win–win terms, CSR standards and the technologies of transparency, legibility, and accountability foreclose conflictual space, and emerge as an instance of ‘post-political global ethics’. In the aftermath of the global financial crisis, people who had never before had cause to worry about losing their jobs entered the ranks of the unemployed for the first time. In Sweden, the welfare state has been radically challenged and mass unemployment has become a reality in what used to be viewed as a model case for a full employment society. With an emphasis on Sweden in the context of transnational regulatory change, Makeshift Workin a Changing Labour Market discusses how the market mediates employment and moves on to explore the ways in which employees adjust to a new labour market. Focusing on the legibility,measurability and responsibility of jobseekers, the expert contributors of this book bring together an analysis of activation policy andnew ways of organizing the mediation of work, with implications for the individual jobseeker. Students and researchers of labour market policy, the organization of markets and work and society both in Sweden and abroad will find this book to be of interest. Policy-makers will find the empirical examples of policy processes among employees an extremely useful and insightful tool. Organisational Anthropology is a pioneering analysis of doing ethnographic fieldwork in different types of complex organizations. The book focuses on the process of initiating contact, establishing rapport and gaining the trust of the organization's members.The contributors work from the premise that doing fieldwork in an organization shares essential characteristics with fieldwork in more "classical" anthropological environments, but that it also poses some particular challenges to the ethnographer. These include the ideological or financial interests of the organizations, protection of resources and competition between organizations. Organisational Anthropology brings together and highlights crucial aspects of doing anthropology in contemporary complex settings, and will have wide appeal to students, researchers and academics in anthropology and organization studies. This paper describes and answers the question how the WEF creates a strong position for itself in the global arena, without a formal and institutional mandate. Theoretically the paper builds and adds to emerging body of literature regarding partial organization, as framed by Ahrne and Brunsson (2011). In order to understand the political form of action that WEF has developed for itself we employ the concept of partial organization, arguing that “membership” is the main organizational element through which they organize their environment. By way of making participants into various forms of members the WEF is able to create an organized environment around it self, which it can draw upon in its interest of setting global political agendas, in spite of a lacking nation state based mandate. The paper explains how funders and participants are made into members, and how a partial organization around the WEF is established and maintained. As a consequence, based on the relations between them and their many affiliated members the WEF achieves creating an order around them selves, transcending the actual full organization of the WEF. Participants at WEF activities, as well as WEF staff, would call this order a “network”. We acknowledge the network aspects of this order, but argue that it is foremost based on organization; it is a decided order, based on the decisions taken within the WEF. Empirically, the paper builds on interview data within Geneva staff and participants at WEF activities. Power, Policy and Profit: Corporate Engagement in Politics and Governance investigates the manifold ways in which corporate actors attempt to influence political activities in the broad sense. Historically, the scope of corporate influence in politics as well as the ways in which corporations have attempted to influence political structures have varied greatly. With intensified globalization of markets, the restructuring of provisions of welfare services, and the accumulation of private capital, opportunities for corporate influence in politics affairs have multiplied. Influencing policy is for instance undertaking by the funding of analyses and research, by creating or adopting standards for social responsibility, and by shaping transparency guidelines. Power, Policy and Profit: Corporate Engagement in Politics and Governance brings together scholars from different fields in the study of global governance, to address the rising influence and power of corporate actors on the political scene, at national and transnational levels. LAEMOS 2014 Subtheme 8 The Corporatization of Politics and the Politicization of Corporations The Politicization of Corporations: The Case of the World Economic Forum Christina Garsten and Adrienne Sörbom Abstract This paper departs from an interest in the involvement of business leaders in the sphere of politics, in the broad sense. At a general level, we are seeing a proliferation of usages of non-market corporate strategies, such as testimony, lobbying, interlocking of positions and other means to influence policymakers at all levels of government and international institutions as an adjunct to the firm’s market strategies. This paper brings to the fore the role of corporations in the World Economic Forum (WEF), and how firms act through the WEF to advance their interests, financial as well as political. What is the role of business in the WEF, and how do business corporations advance their interests through the WEF? Inspired by Stephen Barley's (2010) work on how corporations have systematically built an institutional field to exert greater influence on the US Federal government, we aim to enhance knowledge on how the WEF and the 1,000 corporations that are active within it influence the larger socio-cultural context in which they are embedded. Empirically we depart from ethnographic field studies of the World Economic Forum, drawing on observations from WEF-events and interviews with participants and organizers. Theoretically we will employ an organizational perspective, using the concept of "partial organization" as introduced by Göran Ahrne and Nils Brunsson (2011). The results show that corporations find a strategically positioned amplifier for their non-market interests in the WEF. The WEF functions to enhance and gain leverage for their ideas and priorities in a highly selective and resourceful environment. In the long run, both the market priorities and the political interests of business may be served by engagement in the WEF. However, the WEF cannot only be conceived as the extended voice of corporations. The WEF also makes strategic use of the corporations to organize and expand their own agency, which not necessarily coincides with the interests of multinational corporations. By way of corporate financial resources, the tapping of knowledge and expertise, and access to vast networks of business relations, the WEF is also able to amplify its own voice. The organized network, in the format of partial organization, which is the preferred form of organization of the WEF, comes with weakened power in the form of oversight and sanctions for the member corporations, but may allow for a concentration of resources at the center. The periphery has little sanctioned insight into the core of the organization, and a weak voice in influencing the operations of the organization. Actors in the partially organized environment thus have to rely on the goodwill of the leadership.
http://su.diva-portal.org/smash/resultList.jsf?p=201&fs=false&language=en&searchType=SIMPLE&query=&af=%5B%5D&aq=%5B%5B%7B%22organisationId%22%3A%22527%22%7D%5D%5D&aq2=%5B%5B%5D%5D&aqe=%5B%5D&noOfRows=50&sortOrder=author_sort_asc&sortOrder2=title_sort_asc&onlyFullText=false&sf=all
Through a membership with the National Association of Women in Construction, female construction workers gain access to more than just a support system from peers. Members also receive information on the latest advances in the industry, the ability to apply for unique scholarships, educational resources, and networking connections with industry leaders. As the leading association for women in construction and women in the trades, NAWIC gives its members the opportunity to grow. And with more women joining the association every year, NAWIC continues to amplify the success of women in the construction industry. NAWIC has been serving women in the construction industry since 1953. Seeing a need for support within the industry,16 women in the Fort Worth, Texas area created the group, which gained its national charter in 1955, and became a voice for women in a male dominated field. Now, with over 115 chapters across the country, NAWIC has been an integral part of helping women in construction achieve their professional goals. Building leaders: Providing professional development for women in construction Career advancement is a top priority for the association. It is our hope that as more women in construction who become leaders, even more young women will be inspired to pursue a career within the industry as well. To help make this a reality, NAWIC offers dozens of educational resources to promote industry learning and strengthen leadership skills. NAWIC also provides scholarship programs for women in construction to grow in their trade. All members have the opportunity to take part in the educational resources we offer, which can include in-person trainings, webinars and e-training, and mentorship programs. We also provide information on resources available for purchase so that our members can have the flexibility to continue growing their skills on their own time. Our development opportunities are geared towards women in all sectors of the construction industry, including trades, government positions, project management and administration. Networking with influential leaders In addition to providing educational resources and courses, NAWIC also works to give members a chance to connect with other women in construction, both locally and nationally. We believe that listening to and learning from others is just as valuable as skills learned on-the-job. NAWIC holds an annual conference to bring members together for several days of training and activities, social connections, and seminars with industry leaders. Because we have chapters all over the country, our conference provides a unique opportunity to hear a range of experiences from members working in different environments, both culturally and geographically. This year's annual conference, held virtually, was another successful celebration of our work, our members, and a look into our future projects. Making a difference in the industry and the community NAWIC has been fortunate to have the support of many partners within the industry. From mentorship partners like the Mentor Program of America to safety leaders like OSHA, we're able to give our members direct insights to resources that keep their skills sharp and their ambitions supported. Many of our partners work with us to directly promote women in construction so that representation within the industry is more widespread and career advancement opportunities are provided. We also work with several outreach programs to bring awareness to underemployed and unemployed groups of women in construction. It is our belief that in strengthening the careers of our members and providing opportunities for those interested in management or trades that we can see the number of women in construction grow from every year. Membership information for women in construction There are several types of membership options with NAWIC. From being a student pursuing an industry-related degree to those actively working in construction, our membership tiers allow flexibility for all women in construction. And though many of our members have been with us since early on in their career, we accept members at any stage in their career.
https://www.nawic.org/blog_home.asp?Display=35
July’s Colorado sky sees Jupiter and Saturn, the two largest planets in the solar system, enter the pre-midnight evening sky side by side for the first time in 20 years. As these planets plod along in their respective orbits around the sun, every 20 years or so the faster moving planet Jupiter gradually catches up to and passes the slower moving planet Saturn in the night sky. Over the next several months, the two planets will appear side by side on the Sagittarius-Capricornus border. The brighter yellowish-white Jupiter reaches opposition to the sun on the evening of July 14 and the fainter golden-hued Saturn follows a week later with its own solar opposition on July 20. On its respective opposition night, the given planet will rise at sunset, set at sunrise, and be visible all night long The brighter object of this planetary duo is the mighty planet Jupiter. To the naked eye Jupiter reigns as the fourth brightest object in the sky behind only the sun, moon, and the brilliant planet Venus. On occasion the planet Mars can outshine Jupiter when the earth swings close to the Red Planet, but even then, only for a few weeks at a time. Jupiter is consistently the most interesting planetary object for observers with binoculars or a small telescope. A pair of binoculars readily reveals four companion “stars” to Jupiter that were first discovered by Galileo early in the 17th century. Galileo named these objects the Medici Stars in honor of his patrons in the city of Florence. Happily, this designation has been dropped over the centuries and these objects are now appropriately referred to as the Galilean satellites. Galileo observed that over several days these objects could be seen swinging back and forth from one side of Jupiter to the other. From these observations Galileo concluded that these four companion “stars,” Io, Europa, Ganymede and Callisto, were orbiting Jupiter, just as Jupiter, the earth, and the other planets were orbiting the sun. Just as Galileo did 400 years ago, one can easily follow these satellite motions about Jupiter on a night to night basis. Observations made of Jupiter with a small telescope reveal a disk that is decidedly oblate in shape. This oblate shape of Jupiter is the result of the planet’s fluid-like density, only 1.3 times that of water, and its rapid rotation rate in which a world 11 times larger than the earth rotates once every 10 hours. The overall effect of these factors is to impart a distinctly flattened shape to Jupiter’s disk. When viewed through a small telescope, Jupiter’s disk also exhibits a set of parallel lines that are known to be atmospheric features similar to the jet streams in our own atmosphere. If the evening air is particularly steady, a small telescope might even reveal the famed Great Red Spot in Jupiter’s atmosphere. The Great Red Spot is an oval-shaped cyclonic storm of gargantuan proportions, two earth diameters long and one earth diameter wide. Space missions to Jupiter indicate that the Jovian hurricane has wind velocities of over 300 miles per hour. So it has raged for the three centuries we have had telescopes powerful enough to detect it, and so probably it will rage for centuries more. In short, unlike the other naked eye planets, the wonders of the Planet King can be savored on several levels of perception and instrumentation during these warm summer nights. Elsewhere in the sky: The ruddy planet Mars continues to brighten as it races across the constellation of Pisces during July. The Red Planet currently rises due east around midnight and is visible throughout the second half of the night. The planet Venus has become a splendid object in the morning sky, rising to the northeast nearly three hours ahead of the sun. The planet Mercury is visible in the predawn twilight down and to the left of Venus during the last two weeks of July for about 45 minutes before sunrise.
https://www.reporterherald.com/2020/06/27/colorado-skies-look-for-saturn-and-jupiter-in-july/
This dissertation examines the pervasiveness of storytelling in theme parks and establishes the theme park as a distinct narrative medium. It traces the characteristics of theme park storytelling, how it has changed over time, and what makes the medium unique. This was accomplished using a mixed methods approach drawing data from interviews with creative professionals, archival research, fieldwork, and an analysis of more than eight hundred narrative attractions. The survey of narrative attractions revealed the most common narrative expressions to be dark rides and stage shows. Source material tends to be cultural tales (legends, fairy tales) or intellectual properties (generally films). Throughout major periods and world regions, setting, scenes, and visual storytelling are the most ubiquitous narrative devices. Three dozen techniques and technologies are detailed in this project. Significant impetuses for narrative change over time are the advent of technologies, formalization of the industry, explicit discourse on storytelling, formation of design philosophies, and general convergence of media. There are at least a half dozen key distinctions in theme park narratives compared with other mediums: dimensionality, scale, communality, brevity, a combinatory aspect, and a reiterative nature. Also significant is that creative professionals view themselves as storytellers, purposefully design with narrative systems, embed them in spaces, and participate in public dialogue surrounding narrative and design principles. This study was initiated to expand the literature on emerging media and narratives within the Texts and Technology approach and to fill a gap in the scholarship, as designer standpoint is rarely considered in analysis. This is the first large-scale study of storytelling in the global theme park industry. It uses underrepresented creative voices as participants and recognizes their contributions as storytellers. Finally, the project lays the groundwork for future inquiries into theme parks as storytellers and spatial narrative mediums. Baker, Carissa, "Exploring a Three-Dimensional Narrative Medium: The Theme Park as "De Sprookjessprokkelaar," The Gatherer and Teller of Stories" (2018). Electronic Theses and Dissertations. 5795.
https://stars.library.ucf.edu/etd/5795/
What are the steps in fatty acid synthesis? Saturated straight-chain fatty acids |Step||Enzyme||Description| |(c)||3-ketoacyl-ACP synthase||Reacts ACP-bound acyl chain with chain-extending malonyl-ACP| |(d)||3-ketoacyl-ACP reductase||Reduces the carbon 3 ketone to a hydroxyl group| |(e)||3-Hydroxyacyl ACP dehydrase||Eliminates water| |(f)||Enoyl-ACP reductase||Reduces the C2-C3 double bond.| What are the steps of fatty acid oxidation? 1) Dehydrogenation catalyzed by acyl-CoA dehydrogenase, which removes two hydrogens between carbons 2 and 3. 2) Hydration catalyzed by enoyl-CoA hydratase, which adds water across the double bond. 3) Dehydrogenation catalyzed by 3-hydroxyacyl-CoA dehydrogenase, which generates NADH. What are the major sites of fatty acid synthesis? Synthesis of fatty acids occurs in the cytoplasm and endoplasmic reticulum of the cell and is chemically similar to the beta-oxidation process, but with a couple of key differences. The first of these occur in preparing substrates for the reactions that grow the fatty acid. How is fatty acyl CoA synthesis? Synthesis of fatty acids is generally performed by fatty acid synthase (FAS). Though the syntheses of fatty acids are very similar across all organisms, the enzymes and subsequent enzymatic mechanisms involved in fatty acid synthesis vary between eukaryotes and prokaryotes. How many steps are in beta oxidation? 4 steps General mechanism. Once the fatty acid is inside the mitochondrial matrix, beta-oxidation occurs by cleaving two carbons every cycle to form acetyl-CoA. The process consists of 4 steps. A long-chain fatty acid is dehydrogenated to create a trans double bond between C2 and C3. What regulates fatty acid synthesis? Conversion of acetyl-CoA to malonyl-CoA by the action of acetyl-CoA carboxylase is the first step in fatty acid synthesis. Acetyl-CoA carboxylase is the key enzyme in regulating fatty acid synthesis because it provides the necessary building blocks for elongation of the fatty acid carbon chain. What are the three systems of fatty acid synthesis? The systems are: 1. Mitochondrial System 2. Microsomal System for Chain Elongation 3. Extra Mitochondrial System for De NOVO Synthesis. Where are fatty acids metabolized? Oxidation of fatty acids occurs in multiple regions of the cell within the human body; the mitochondria, in which only Beta-oxidation occurs; the peroxisome, where alpha- and beta-oxidation occur; and omega-oxidation, which occurs in the endoplasmic reticulum. How do fatty acids enter the citric acid cycle? In beta-oxidation, the fatty acid tails are broken down into a series of two-carbon units that combine with coenzyme A, forming acetyl CoA. This acetyl CoA feeds smoothly into the citric acid cycle. What process is used to convert fatty acids to acetyl CoA? Fatty acids are oxidized to acetyl CoA in the mitochondria using the fatty acid spiral. The acetyl CoA is then ultimately converted into ATP, CO2, and H2O using the citric acid cycle and the electron transport chain. Which fatty acid is unsaturated? Monounsaturated fats – a fatty acid that contains only one carbon-carbon double bond What synthesizes fatty acids and steroids? bile salt How is fat converted into fatty acid and glycerol? Triglycerides are the type of fat that goes into your bloodstream, which makes it available for the rest of your body to use. Once it’s in your bloodstream, your body can turn the triglycerides into fatty acid and glycerol. Fatty acids are then turned into acetyl CoA, which enters the Krebs cycle in the same way that glucose did.
https://durrell2012.com/what-are-the-steps-in-fatty-acid-synthesis/