content
stringlengths
167
607k
score
float64
0.5
1
source
stringclasses
1 value
ABOUT THIS BOOK As species extinction, environmental protection, animal rights, and workplace safety issues come to the fore, zoos and aquariums need keepers who have the technical expertise and scientific knowledge to keep animals healthy, educate the public, and create regional, national, and global conservation and management communities. This textbook offers a comprehensive and practical overview of the profession geared toward new animal keepers and anyone who needs a foundational account of the topics most important to the day-to-day care of zoo and aquarium animals. The three editors, all experienced in zoo animal care and management, have put together a cohesive and broad-ranging book that tackles each of its subjects carefully and thoroughly. The contributions cover professional zookeeping, evolution of zoos, workplace safety, animal management, taxon-specific animal husbandry, animal behavior, veterinary care, public education and outreach, and conservation science. Using the newest techniques and research gathered from around the world, Zookeeping is a progressive textbook that seeks to promote consistency and the highest standards within global zoo and aquarium operations.
0.5964
FineWeb
Students are using the online editing program, Pixlr Express, to edit a play photo and reflect on their experience. The account is free. - Download a play image in Google Drive - Select 'Open With' and open the drop-down menu - Select 'connect more apps' - Search for Pixlr Express - Select '+connect' to add Pixlr Express - Now, the next time you open an image, you can 'Open with' Pixlr Express - Experiment with the Pixlr Express features - Have fun! - Remember!! When you save your Pixlr Expressed image, save a copy or you will save over your original
0.6017
FineWeb
- Massage The Feet, and Relax The Whole Body: Renpho foot massager machine, equipped with rotation ball, rolling stick, heating and offers a deep Shiatsu foot massage. Not for Foot Bath. No Remote Control. - Like a Professional Foot Massage: The ergonomic design provides a comprehensive and comfortable massage. 3 kneading and 3 squeeze intensities can be adjusted to personal preference. The soothing heat function can be controlled independently. - Simple, Hygienic, Healthy: The touch panel of this foot massager machine is easy to control using your foot. Removable, washable cloth in the foot chambers helps keep a clean and healthy environment. - Fits Most People: With its enlarged foot rooms, Renpho foot massager can accommodate most foot sizes, up to men’s size 12. - A Great Gift: Everybody needs a daily foot massage. Get it for yourself or your friend using the foot massager for 30 minutes daily improves the health of the body. - Brand: Renpho - Dimensions: 16.80 x 15.30 x 9.80 Inches - Weight: 10.41 lbs - Color: Black - Adapter Output: DC12V 2.5A - Adapter Input: 100V-240V 50/60Hz - Modes: 3 Kneading Intensity, 3 Squeeze Intensity, 2 Timers, Heat - Shiatsu Foot Massager - Wall Power Supply - User Manual
0.6234
FineWeb
If I have a rogue who fires a ranged weapon as a sneak attack, then passes his stealth-20 check to snipe, can he then make a second ranged sneak attack on the next round? If so (or if not), what is the justification? I haven't been able to find anything that makes this point clear, but the two opinions I have found seem to be 1) Yes, because the rogue is still hidden and 2) No, because the enemy is no longer surprised. Sadly, the RAW answer is no. You can snipe and remain hidden, but your next attack is not a sneak attack because "stealthed" isn't a condition that makes a target flat-footed or denies it its Dex bonus to AC. Similarly, if you simply stay hidden until the battle is raging and try to shoot someone, it's not RAW a sneak attack. (It's not because it doesn't say it is, the rules are clear in omission.) Of course this tends to defy reason, so I let people get in sneak attacks in other situations, as "it's the first round of a combat" is not a real in-game-world thing. The devs understand the stealth rules are a big hot mess; in fact they posted some playtest new stealth rules on paizo.com in an attempt to come up with something less wonky. Sniping on SRD Action: Usually none. Normally, you make a Stealth check as part of movement, so it doesn't take a separate action. However, using Stealth immediately after a ranged attack (see Sniping, above) is a move action. Since you spend a move action on the stealth check (and presumably a standard on the attack itself) you cannot full attack. so one attack per round Edit: In following rounds, assuming the enemy is still hasn't spotted you you can still land sneak attacks since the opponent can't see you, works like invisibility or similar situations
0.7342
FineWeb
Another of my papers (see About) has been published recently. Unfortunately, I cannot present it here in a full scope. Below I’m presenting an abstract from the paper and invite interested people in contacting me. This topic is really interesting and there is plenty to be done. On the Phase Coupling of Two Components Mixing in Empirical Mode Decomposition This paper investigates frequency mixing effect of Empirical Mode Decomposition (EMD) and explores whether it can be explained by simple phase coupling between components of the input signal. The input is assumed to be a linear combination of harmonic oscillators. The hypothesis was tested assuming that phases of input signals’ components would couple according to Kuramoto’s model. Using a Kuramoto’s model with as many oscillators as the number of intrinsic mode functions (result of EMD), the model’s parameters were adjusted by a particle swarm optimisation (PSO) method. The results show that our hypothesis is plausible, however, a different coupling mechanism than the simple sine-coupling Kuramoto’s model are likely to give better results. In a very, very brief, but figure-enhanced summary: we present that for certain range of frequencies ratio a mix in frequency appears which can be explained as a difference of original frequencies. Figure below presents Fourier transform F of correlation function between each pair of IMFs for different values of frequency f. All values were normalised, such that for given f the maximum is equal to one. Additionally, on the top projection of the figure two lines have been drawn – F1 = 13-f (dashed line) and F2 = 2(13 – f) (dash-dotted line). D. Laszuk, O. J. Cadenas, and S. J. Nasuto (July, 2016) On the Phase Coupling of Two Components Mixing in Empirical Mode Decomposition, Advances in Data Science and Adaptive Analysis, vol. 8, no. 1. [Link]
0.9737
FineWeb
From Wikipedia, the free encyclopedia |The Simple English Wiktionary has a definition for: germ.| Germ may refer to: - Microorganism, especially a pathogen - Germ cell, an ovum or sperm, or one of its progenitors |This disambiguation page lists articles with similar titles. If a link brought you here, you can go back and fix it so it goes straight to the right page.
0.9683
FineWeb
One of the defining characteristics of autism spectrum disorder (ASD) is difficulty with language and communication.1 Children with ASD's onset of speaking is usually delayed, and many children with ASD consistently produce language less frequently and of lower lexical and grammatical complexity than their typically developing (TD) peers.6,8,12,23 However, children with ASD also exhibit a significant social deficit, and researchers and clinicians continue to debate the extent to which the deficits in social interaction account for or contribute to the deficits in language production.5,14,19,25 Standardized assessments of language in children with ASD usually do include a comprehension component; however, many such comprehension tasks assess just one aspect of language (e.g., vocabulary),5 or include a significant motor component (e.g., pointing, act-out), and/or require children to deliberately choose between a number of alternatives. These last two behaviors are known to also be challenging to children with ASD.7,12,13,16 We present a method which can assess the language comprehension of young typically developing children (9-36 months) and children with autism.2,4,9,11,22 This method, Portable Intermodal Preferential Looking (P-IPL), projects side-by-side video images from a laptop onto a portable screen. The video images are paired first with a 'baseline' (nondirecting) audio, and then presented again paired with a 'test' linguistic audio that matches only one of the video images. Children's eye movements while watching the video are filmed and later coded. Children who understand the linguistic audio will look more quickly to, and longer at, the video that matches the linguistic audio.2,4,11,18,22,26 This paradigm includes a number of components that have recently been miniaturized (projector, camcorder, digitizer) to enable portability and easy setup in children's homes. This is a crucial point for assessing young children with ASD, who are frequently uncomfortable in new (e.g., laboratory) settings. Videos can be created to assess a wide range of specific components of linguistic knowledge, such as Subject-Verb-Object word order, wh-questions, and tense/aspect suffixes on verbs; videos can also assess principles of word learning such as a noun bias, a shape bias, and syntactic bootstrapping.10,14,17,21,24 Videos include characters and speech that are visually and acoustically salient and well tolerated by children with ASD. 19 Related JoVE Articles! Making Sense of Listening: The IMAP Test Battery Institutions: MRC Institute of Hearing Research, National Biomedical Research Unit in Hearing. The ability to hear is only the first step towards making sense of the range of information contained in an auditory signal. Of equal importance are the abilities to extract and use the information encoded in the auditory signal. We refer to these as listening skills (or auditory processing AP). Deficits in these skills are associated with delayed language and literacy development, though the nature of the relevant deficits and their causal connection with these delays is hotly debated. When a child is referred to a health professional with normal hearing and unexplained difficulties in listening, or associated delays in language or literacy development, they should ideally be assessed with a combination of psychoacoustic (AP) tests, suitable for children and for use in a clinic, together with cognitive tests to measure attention, working memory, IQ, and language skills. Such a detailed examination needs to be relatively short and within the technical capability of any suitably qualified professional. Current tests for the presence of AP deficits tend to be poorly constructed and inadequately validated within the normal population. They have little or no reference to the presenting symptoms of the child, and typically include a linguistic component. Poor performance may thus reflect problems with language rather than with AP. To assist in the assessment of children with listening difficulties, pediatric audiologists need a single, standardized child-appropriate test battery based on the use of language-free stimuli. We present the IMAP test battery which was developed at the MRC Institute of Hearing Research to supplement tests currently used to investigate cases of suspected AP deficits. IMAP assesses a range of relevant auditory and cognitive skills and takes about one hour to complete. It has been standardized in 1500 normally-hearing children from across the UK, aged 6-11 years. Since its development, it has been successfully used in a number of large scale studies both in the UK and the USA. IMAP provides measures for separating out sensory from cognitive contributions to hearing. It further limits confounds due to procedural effects by presenting tests in a child-friendly game-format. Stimulus-generation, management of test protocols and control of test presentation is mediated by the IHR-STAR software platform. This provides a standardized methodology for a range of applications and ensures replicable procedures across testers. IHR-STAR provides a flexible, user-programmable environment that currently has additional applications for hearing screening, mapping cochlear implant electrodes, and academic research or teaching. Neuroscience, Issue 44, Listening skills, auditory processing, auditory psychophysics, clinical assessment, child-friendly testing A Research Method For Detecting Transient Myocardial Ischemia In Patients With Suspected Acute Coronary Syndrome Using Continuous ST-segment Analysis Institutions: University of Nevada, Reno, St. Joseph's Medical Center, University of Rochester Medical Center . Each year, an estimated 785,000 Americans will have a new coronary attack, or acute coronary syndrome (ACS). The pathophysiology of ACS involves rupture of an atherosclerotic plaque; hence, treatment is aimed at plaque stabilization in order to prevent cellular death. However, there is considerable debate among clinicians, about which treatment pathway is best: early invasive using percutaneous coronary intervention (PCI/stent) when indicated or a conservative approach (i.e. , medication only with PCI/stent if recurrent symptoms occur). There are three types of ACS: ST elevation myocardial infarction (STEMI), non-ST elevation MI (NSTEMI), and unstable angina (UA). Among the three types, NSTEMI/UA is nearly four times as common as STEMI. Treatment decisions for NSTEMI/UA are based largely on symptoms and resting or exercise electrocardiograms (ECG). However, because of the dynamic and unpredictable nature of the atherosclerotic plaque, these methods often under detect myocardial ischemia because symptoms are unreliable, and/or continuous ECG monitoring was not utilized. Continuous 12-lead ECG monitoring, which is both inexpensive and non-invasive, can identify transient episodes of myocardial ischemia, a precursor to MI, even when asymptomatic. However, continuous 12-lead ECG monitoring is not usual hospital practice; rather, only two leads are typically monitored. Information obtained with 12-lead ECG monitoring might provide useful information for deciding the best ACS treatment. Therefore, using 12-lead ECG monitoring, the COMPARE Study (electroC n of ischeM sive to phaR atment) was designed to assess the frequency and clinical consequences of transient myocardial ischemia, in patients with NSTEMI/UA treated with either early invasive PCI/stent or those managed conservatively (medications or PCI/stent following recurrent symptoms). The purpose of this manuscript is to describe the methodology used in the COMPARE Study. Permission to proceed with this study was obtained from the Institutional Review Board of the hospital and the university. Research nurses identify hospitalized patients from the emergency department and telemetry unit with suspected ACS. Once consented, a 12-lead ECG Holter monitor is applied, and remains in place during the patient's entire hospital stay. Patients are also maintained on the routine bedside ECG monitoring system per hospital protocol. Off-line ECG analysis is done using sophisticated software and careful human oversight. Medicine, Issue 70, Anatomy, Physiology, Cardiology, Myocardial Ischemia, Cardiovascular Diseases, Health Occupations, Health Care, transient myocardial ischemia, Acute Coronary Syndrome, electrocardiogram, ST-segment monitoring, Holter monitoring, research methodology Eye Tracking Young Children with Autism Institutions: University of Texas at Dallas, University of North Carolina at Chapel Hill. The rise of accessible commercial eye-tracking systems has fueled a rapid increase in their use in psychological and psychiatric research. By providing a direct, detailed and objective measure of gaze behavior, eye-tracking has become a valuable tool for examining abnormal perceptual strategies in clinical populations and has been used to identify disorder-specific characteristics1 , promote early identification2 , and inform treatment3 . In particular, investigators of autism spectrum disorders (ASD) have benefited from integrating eye-tracking into their research paradigms4-7 . Eye-tracking has largely been used in these studies to reveal mechanisms underlying impaired task performance8 and abnormal brain functioning9 , particularly during the processing of social information1,10-11 . While older children and adults with ASD comprise the preponderance of research in this area, eye-tracking may be especially useful for studying young children with the disorder as it offers a non-invasive tool for assessing and quantifying early-emerging developmental abnormalities2,12-13 . Implementing eye-tracking with young children with ASD, however, is associated with a number of unique challenges, including issues with compliant behavior resulting from specific task demands and disorder-related psychosocial considerations. In this protocol, we detail methodological considerations for optimizing research design, data acquisition and psychometric analysis while eye-tracking young children with ASD. The provided recommendations are also designed to be more broadly applicable for eye-tracking children with other developmental disabilities. By offering guidelines for best practices in these areas based upon lessons derived from our own work, we hope to help other investigators make sound research design and analysis choices while avoiding common pitfalls that can compromise data acquisition while eye-tracking young children with ASD or other developmental difficulties. Medicine, Issue 61, eye tracking, autism, neurodevelopmental disorders, toddlers, perception, attention, social cognition A Novel Rescue Technique for Difficult Intubation and Difficult Ventilation Institutions: Children’s Hospital of Michigan, St. Jude Children’s Research Hospital. We describe a novel non surgical technique to maintain oxygenation and ventilation in a case of difficult intubation and difficult ventilation, which works especially well with poor mask fit. Can not intubate, can not ventilate" (CICV) is a potentially life threatening situation. In this video we present a simulation of the technique we used in a case of CICV where oxygenation and ventilation were maintained by inserting an endotracheal tube (ETT) nasally down to the level of the naso-pharynx while sealing the mouth and nares for successful positive pressure ventilation. A 13 year old patient was taken to the operating room for incision and drainage of a neck abcess and direct laryngobronchoscopy. After preoxygenation, anesthesia was induced intravenously. Mask ventilation was found to be extremely difficult because of the swelling of the soft tissue. The face mask could not fit properly on the face due to significant facial swelling as well. A direct laryngoscopy was attempted with no visualization of the larynx. Oxygen saturation was difficult to maintain, with saturations falling to 80%. In order to oxygenate and ventilate the patient, an endotracheal tube was then inserted nasally after nasal spray with nasal decongestant and lubricant. The tube was pushed gently and blindly into the hypopharynx. The mouth and nose of the patient were sealed by hand and positive pressure ventilation was possible with 100% O2 with good oxygen saturation during that period of time. Once the patient was stable and well sedated, a rigid bronchoscope was introduced by the otolaryngologist showing extensive subglottic and epiglottic edema, and a mass effect from the abscess, contributing to the airway compromise. The airway was secured with an ETT tube by the otolaryngologist.This video will show a simulation of the technique on a patient undergoing general anesthesia for dental restorations. Medicine, Issue 47, difficult ventilation, difficult intubation, nasal, saturation Assessment of Cerebral Lateralization in Children using Functional Transcranial Doppler Ultrasound (fTCD) Institutions: University of Oxford. There are many unanswered questions about cerebral lateralization. In particular, it remains unclear which aspects of language and nonverbal ability are lateralized, whether there are any disadvantages associated with atypical patterns of cerebral lateralization, and whether cerebral lateralization develops with age. In the past, researchers interested in these questions tended to use handedness as a proxy measure for cerebral lateralization, but this is unsatisfactory because handedness is only a weak and indirect indicator of laterality of cognitive functions1 . Other methods, such as fMRI, are expensive for large-scale studies, and not always feasible with children2 Here we will describe the use of functional transcranial Doppler ultrasound (fTCD) as a cost-effective, non-invasive and reliable method for assessing cerebral lateralization. The procedure involves measuring blood flow in the middle cerebral artery via an ultrasound probe placed just in front of the ear. Our work builds on work by Rune Aaslid, who co-introduced TCD in 1982, and Stefan Knecht, Michael Deppe and their colleagues at the University of Münster, who pioneered the use of simultaneous measurements of left- and right middle cerebral artery blood flow, and devised a method of correcting for heart beat activity. This made it possible to see a clear increase in left-sided blood flow during language generation, with lateralization agreeing well with that obtained using other methods3 The middle cerebral artery has a very wide vascular territory (see Figure 1) and the method does not provide useful information about localization within a hemisphere. Our experience suggests it is particularly sensitive to tasks that involve explicit or implicit speech production. The 'gold standard' task is a word generation task (e.g. think of as many words as you can that begin with the letter 'B') 4 , but this is not suitable for young children and others with limited literacy skills. Compared with other brain imaging methods, fTCD is relatively unaffected by movement artefacts from speaking, and so we are able to get a reliable result from tasks that involve describing pictures aloud5,6 . Accordingly, we have developed a child-friendly task that involves looking at video-clips that tell a story, and then describing what was seen. Neuroscience, Issue 43, functional transcranial Doppler ultrasound, cerebral lateralization, language, child Prehospital Thrombolysis: A Manual from Berlin Institutions: Charité - Universitätsmedizin Berlin, Charité - Universitätsmedizin Berlin, Universitätsklinikum Hamburg - Eppendorf, Berliner Feuerwehr, STEMO-Consortium. In acute ischemic stroke, time from symptom onset to intervention is a decisive prognostic factor. In order to reduce this time, prehospital thrombolysis at the emergency site would be preferable. However, apart from neurological expertise and laboratory investigations a computed tomography (CT) scan is necessary to exclude hemorrhagic stroke prior to thrombolysis. Therefore, a specialized ambulance equipped with a CT scanner and point-of-care laboratory was designed and constructed. Further, a new stroke identifying interview algorithm was developed and implemented in the Berlin emergency medical services. Since February 2011 the identification of suspected stroke in the dispatch center of the Berlin Fire Brigade prompts the deployment of this ambulance, a stroke emergency mobile (STEMO). On arrival, a neurologist, experienced in stroke care and with additional training in emergency medicine, takes a neurological examination. If stroke is suspected a CT scan excludes intracranial hemorrhage. The CT-scans are telemetrically transmitted to the neuroradiologist on-call. If coagulation status of the patient is normal and patient's medical history reveals no contraindication, prehospital thrombolysis is applied according to current guidelines (intravenous recombinant tissue plasminogen activator, iv rtPA, alteplase, Actilyse). Thereafter patients are transported to the nearest hospital with a certified stroke unit for further treatment and assessment of strokeaetiology. After a pilot-phase, weeks were randomized into blocks either with or without STEMO care. Primary end-point of this study is time from alarm to the initiation of thrombolysis. We hypothesized that alarm-to-treatment time can be reduced by at least 20 min compared to regular care. Medicine, Issue 81, Telemedicine, Emergency Medical Services, Stroke, Tomography, X-Ray Computed, Emergency Treatment,[stroke, thrombolysis, prehospital, emergency medical services, ambulance Measuring Attentional Biases for Threat in Children and Adults Institutions: Rutgers University. Investigators have long been interested in the human propensity for the rapid detection of threatening stimuli. However, until recently, research in this domain has focused almost exclusively on adult participants, completely ignoring the topic of threat detection over the course of development. One of the biggest reasons for the lack of developmental work in this area is likely the absence of a reliable paradigm that can measure perceptual biases for threat in children. To address this issue, we recently designed a modified visual search paradigm similar to the standard adult paradigm that is appropriate for studying threat detection in preschool-aged participants. Here we describe this new procedure. In the general paradigm, we present participants with matrices of color photographs, and ask them to find and touch a target on the screen. Latency to touch the target is recorded. Using a touch-screen monitor makes the procedure simple and easy, allowing us to collect data in participants ranging from 3 years of age to adults. Thus far, the paradigm has consistently shown that both adults and children detect threatening stimuli (e.g., snakes, spiders, angry/fearful faces) more quickly than neutral stimuli (e.g., flowers, mushrooms, happy/neutral faces). Altogether, this procedure provides an important new tool for researchers interested in studying the development of attentional biases for threat. Behavior, Issue 92, Detection, threat, attention, attentional bias, anxiety, visual search Assaying Locomotor Activity to Study Circadian Rhythms and Sleep Parameters in Drosophila Institutions: Rutgers University, University of California, Davis, Rutgers University. Most life forms exhibit daily rhythms in cellular, physiological and behavioral phenomena that are driven by endogenous circadian (≡24 hr) pacemakers or clocks. Malfunctions in the human circadian system are associated with numerous diseases or disorders. Much progress towards our understanding of the mechanisms underlying circadian rhythms has emerged from genetic screens whereby an easily measured behavioral rhythm is used as a read-out of clock function. Studies using Drosophila have made seminal contributions to our understanding of the cellular and biochemical bases underlying circadian rhythms. The standard circadian behavioral read-out measured in Drosophila is locomotor activity. In general, the monitoring system involves specially designed devices that can measure the locomotor movement of Drosophila . These devices are housed in environmentally controlled incubators located in a darkroom and are based on using the interruption of a beam of infrared light to record the locomotor activity of individual flies contained inside small tubes. When measured over many days, Drosophila exhibit daily cycles of activity and inactivity, a behavioral rhythm that is governed by the animal's endogenous circadian system. The overall procedure has been simplified with the advent of commercially available locomotor activity monitoring devices and the development of software programs for data analysis. We use the system from Trikinetics Inc., which is the procedure described here and is currently the most popular system used worldwide. More recently, the same monitoring devices have been used to study sleep behavior in Drosophila . Because the daily wake-sleep cycles of many flies can be measured simultaneously and only 1 to 2 weeks worth of continuous locomotor activity data is usually sufficient, this system is ideal for large-scale screens to identify Drosophila manifesting altered circadian or sleep properties. Neuroscience, Issue 43, circadian rhythm, locomotor activity, Drosophila, period, sleep, Trikinetics Surgical Management of Meatal Stenosis with Meatoplasty Institutions: Johns Hopkins School of Medicine. Meatal stenosis is a common urologic complication after circumcision. Children present to their primary care physicians with complaints of deviated urinary stream, difficult-to-aim, painful urination, and urinary frequency. Clinical exam reveals a pinpoint meatus and if the child is asked to urinate, he will usually have an upward, thin, occasionally forceful urinary stream with incomplete bladder emptying. The mainstay of management is meatoplasty (reconstruction of the distal urethra /meatus). This educational video will demonstrate how this is performed. Medicine, Issue 45, Urinary obstruction, pediatric urology, deviated urinary stream, meatal stenosis, operative repair, meatotomy, meatoplasty Aseptic Laboratory Techniques: Plating Methods Institutions: University of California, Los Angeles . Microorganisms are present on all inanimate surfaces creating ubiquitous sources of possible contamination in the laboratory. Experimental success relies on the ability of a scientist to sterilize work surfaces and equipment as well as prevent contact of sterile instruments and solutions with non-sterile surfaces. Here we present the steps for several plating methods routinely used in the laboratory to isolate, propagate, or enumerate microorganisms such as bacteria and phage. All five methods incorporate aseptic technique, or procedures that maintain the sterility of experimental materials. Procedures described include (1) streak-plating bacterial cultures to isolate single colonies, (2) pour-plating and (3) spread-plating to enumerate viable bacterial colonies, (4) soft agar overlays to isolate phage and enumerate plaques, and (5) replica-plating to transfer cells from one plate to another in an identical spatial pattern. These procedures can be performed at the laboratory bench, provided they involve non-pathogenic strains of microorganisms (Biosafety Level 1, BSL-1). If working with BSL-2 organisms, then these manipulations must take place in a biosafety cabinet. Consult the most current edition of the Biosafety in Microbiological and Biomedical Laboratories (BMBL) as well as Material Safety Data Sheets (MSDS) for Infectious Substances to determine the biohazard classification as well as the safety precautions and containment facilities required for the microorganism in question. Bacterial strains and phage stocks can be obtained from research investigators, companies, and collections maintained by particular organizations such as the American Type Culture Collection (ATCC). It is recommended that non-pathogenic strains be used when learning the various plating methods. By following the procedures described in this protocol, students should be able to: ● Perform plating procedures without contaminating media. ● Isolate single bacterial colonies by the streak-plating method. ● Use pour-plating and spread-plating methods to determine the concentration of bacteria. ● Perform soft agar overlays when working with phage. ● Transfer bacterial cells from one plate to another using the replica-plating procedure. ● Given an experimental task, select the appropriate plating method. Basic Protocols, Issue 63, Streak plates, pour plates, soft agar overlays, spread plates, replica plates, bacteria, colonies, phage, plaques, dilutions Membrane Potentials, Synaptic Responses, Neuronal Circuitry, Neuromodulation and Muscle Histology Using the Crayfish: Student Laboratory Exercises Institutions: University of Kentucky, University of Toronto. The purpose of this report is to help develop an understanding of the effects caused by ion gradients across a biological membrane. Two aspects that influence a cell's membrane potential and which we address in these experiments are: (1) Ion concentration of K+ on the outside of the membrane, and (2) the permeability of the membrane to specific ions. The crayfish abdominal extensor muscles are in groupings with some being tonic (slow) and others phasic (fast) in their biochemical and physiological phenotypes, as well as in their structure; the motor neurons that innervate these muscles are correspondingly different in functional characteristics. We use these muscles as well as the superficial, tonic abdominal flexor muscle to demonstrate properties in synaptic transmission. In addition, we introduce a sensory-CNS-motor neuron-muscle circuit to demonstrate the effect of cuticular sensory stimulation as well as the influence of neuromodulators on certain aspects of the circuit. With the techniques obtained in this exercise, one can begin to answer many questions remaining in other experimental preparations as well as in physiological applications related to medicine and health. We have demonstrated the usefulness of model invertebrate preparations to address fundamental questions pertinent to all animals. Neuroscience, Issue 47, Invertebrate, Crayfish, neurophysiology, muscle, anatomy, electrophysiology Assessment and Evaluation of the High Risk Neonate: The NICU Network Neurobehavioral Scale Institutions: Brown University, Women & Infants Hospital of Rhode Island, University of Massachusetts, Boston. There has been a long-standing interest in the assessment of the neurobehavioral integrity of the newborn infant. The NICU Network Neurobehavioral Scale (NNNS) was developed as an assessment for the at-risk infant. These are infants who are at increased risk for poor developmental outcome because of insults during prenatal development, such as substance exposure or prematurity or factors such as poverty, poor nutrition or lack of prenatal care that can have adverse effects on the intrauterine environment and affect the developing fetus. The NNNS assesses the full range of infant neurobehavioral performance including neurological integrity, behavioral functioning, and signs of stress/abstinence. The NNNS is a noninvasive neonatal assessment tool with demonstrated validity as a predictor, not only of medical outcomes such as cerebral palsy diagnosis, neurological abnormalities, and diseases with risks to the brain, but also of developmental outcomes such as mental and motor functioning, behavior problems, school readiness, and IQ. The NNNS can identify infants at high risk for abnormal developmental outcome and is an important clinical tool that enables medical researchers and health practitioners to identify these infants and develop intervention programs to optimize the development of these infants as early as possible. The video shows the NNNS procedures, shows examples of normal and abnormal performance and the various clinical populations in which the exam can be used. Behavior, Issue 90, NICU Network Neurobehavioral Scale, NNNS, High risk infant, Assessment, Evaluation, Prediction, Long term outcome An Affordable HIV-1 Drug Resistance Monitoring Method for Resource Limited Settings Institutions: University of KwaZulu-Natal, Durban, South Africa, Jembi Health Systems, University of Amsterdam, Stanford Medical School. HIV-1 drug resistance has the potential to seriously compromise the effectiveness and impact of antiretroviral therapy (ART). As ART programs in sub-Saharan Africa continue to expand, individuals on ART should be closely monitored for the emergence of drug resistance. Surveillance of transmitted drug resistance to track transmission of viral strains already resistant to ART is also critical. Unfortunately, drug resistance testing is still not readily accessible in resource limited settings, because genotyping is expensive and requires sophisticated laboratory and data management infrastructure. An open access genotypic drug resistance monitoring method to manage individuals and assess transmitted drug resistance is described. The method uses free open source software for the interpretation of drug resistance patterns and the generation of individual patient reports. The genotyping protocol has an amplification rate of greater than 95% for plasma samples with a viral load >1,000 HIV-1 RNA copies/ml. The sensitivity decreases significantly for viral loads <1,000 HIV-1 RNA copies/ml. The method described here was validated against a method of HIV-1 drug resistance testing approved by the United States Food and Drug Administration (FDA), the Viroseq genotyping method. Limitations of the method described here include the fact that it is not automated and that it also failed to amplify the circulating recombinant form CRF02_AG from a validation panel of samples, although it amplified subtypes A and B from the same panel. Medicine, Issue 85, Biomedical Technology, HIV-1, HIV Infections, Viremia, Nucleic Acids, genetics, antiretroviral therapy, drug resistance, genotyping, affordable Community-based Adapted Tango Dancing for Individuals with Parkinson's Disease and Older Adults Institutions: Emory University School of Medicine, Brigham and Woman‘s Hospital and Massachusetts General Hospital. Adapted tango dancing improves mobility and balance in older adults and additional populations with balance impairments. It is composed of very simple step elements. Adapted tango involves movement initiation and cessation, multi-directional perturbations, varied speeds and rhythms. Focus on foot placement, whole body coordination, and attention to partner, path of movement, and aesthetics likely underlie adapted tango’s demonstrated efficacy for improving mobility and balance. In this paper, we describe the methodology to disseminate the adapted tango teaching methods to dance instructor trainees and to implement the adapted tango by the trainees in the community for older adults and individuals with Parkinson’s Disease (PD). Efficacy in improving mobility (measured with the Timed Up and Go, Tandem stance, Berg Balance Scale, Gait Speed and 30 sec chair stand), safety and fidelity of the program is maximized through targeted instructor and volunteer training and a structured detailed syllabus outlining class practices and progression. Behavior, Issue 94, Dance, tango, balance, pedagogy, dissemination, exercise, older adults, Parkinson's Disease, mobility impairments, falls Measurement Of Neuromagnetic Brain Function In Pre-school Children With Custom Sized MEG Institutions: Macquarie University. Magnetoencephalography is a technique that detects magnetic fields associated with cortical activity . The electrophysiological activity of the brain generates electric fields - that can be recorded using electroencephalography (EEG)- and their concomitant magnetic fields - detected by MEG. MEG signals are detected by specialized sensors known as superconducting quantum interference devices (SQUIDs). Superconducting sensors require cooling with liquid helium at -270 °C. They are contained inside a vacumm-insulated helmet called a dewar, which is filled with liquid. SQUIDS are placed in fixed positions inside the helmet dewar in the helium coolant, and a subject's head is placed inside the helmet dewar for MEG measurements. The helmet dewar must be sized to satisfy opposing constraints. Clearly, it must be large enough to fit most or all of the heads in the population that will be studied. However, the helmet must also be small enough to keep most of the SQUID sensors within range of the tiny cerebral fields that they are to measure. Conventional whole-head MEG systems are designed to accommodate more than 90% of adult heads. However adult systems are not well suited for measuring brain function in pre-school chidren whose heads have a radius several cm smaller than adults. The KIT-Macquarie Brain Research Laboratory at Macquarie University uses a MEG system custom sized to fit the heads of pre-school children. This child system has 64 first-order axial gradiometers with a 50 mm baseline and is contained inside a magnetically-shielded room (MSR) together with a conventional adult-sized MEG system [3,4]. There are three main advantages of the customized helmet dewar for studying children. First, the smaller radius of the sensor configuration brings the SQUID sensors into range of the neuromagnetic signals of children's heads. Second, the smaller helmet allows full insertion of a child's head into the dewar. Full insertion is prevented in adult dewar helmets because of the smaller crown to shoulder distance in children. These two factors are fundamental in recording brain activity using MEG because neuromagnetic signals attenuate rapidly with distance. Third, the customized child helmet aids in the symmetric positioning of the head and limits the freedom of movement of the child's head within the dewar. When used with a protocol that aligns the requirements of data collection with the motivational and behavioral capacities of children, these features significantly facilitate setup, positioning, and measurement of MEG signals. Neuroscience, Issue 36, Magnetoencephalography, Pediatrics, Brain Mapping, Language, Brain Development, Cognitive Neuroscience, Language Acquisition, Linguistics Cortical Source Analysis of High-Density EEG Recordings in Children Institutions: UCL Institute of Child Health, University College London. EEG is traditionally described as a neuroimaging technique with high temporal and low spatial resolution. Recent advances in biophysical modelling and signal processing make it possible to exploit information from other imaging modalities like structural MRI that provide high spatial resolution to overcome this constraint1 . This is especially useful for investigations that require high resolution in the temporal as well as spatial domain. In addition, due to the easy application and low cost of EEG recordings, EEG is often the method of choice when working with populations, such as young children, that do not tolerate functional MRI scans well. However, in order to investigate which neural substrates are involved, anatomical information from structural MRI is still needed. Most EEG analysis packages work with standard head models that are based on adult anatomy. The accuracy of these models when used for children is limited2 , because the composition and spatial configuration of head tissues changes dramatically over development3 In the present paper, we provide an overview of our recent work in utilizing head models based on individual structural MRI scans or age specific head models to reconstruct the cortical generators of high density EEG. This article describes how EEG recordings are acquired, processed, and analyzed with pediatric populations at the London Baby Lab, including laboratory setup, task design, EEG preprocessing, MRI processing, and EEG channel level and source analysis. Behavior, Issue 88, EEG, electroencephalogram, development, source analysis, pediatric, minimum-norm estimation, cognitive neuroscience, event-related potentials Quantitative Assessment of Cortical Auditory-tactile Processing in Children with Disabilities Institutions: Vanderbilt University, Vanderbilt University, Vanderbilt University. Objective and easy measurement of sensory processing is extremely difficult in nonverbal or vulnerable pediatric patients. We developed a new methodology to quantitatively assess children's cortical processing of light touch, speech sounds and the multisensory processing of the 2 stimuli, without requiring active subject participation or causing children discomfort. To accomplish this we developed a dual channel, time and strength calibrated air puff stimulator that allows both tactile stimulation and sham control. We combined this with the use of event-related potential methodology to allow for high temporal resolution of signals from the primary and secondary somatosensory cortices as well as higher order processing. This methodology also allowed us to measure a multisensory response to auditory-tactile stimulation. Behavior, Issue 83, somatosensory, event related potential, auditory-tactile, multisensory, cortical response, child Using Visual and Narrative Methods to Achieve Fair Process in Clinical Care Institutions: Brandeis University, Brandeis University. The Institute of Medicine has targeted patient-centeredness as an important area of quality improvement. A major dimension of patient-centeredness is respect for patient's values, preferences, and expressed needs. Yet specific approaches to gaining this understanding and translating it to quality care in the clinical setting are lacking. From a patient perspective quality is not a simple concept but is best understood in terms of five dimensions: technical outcomes; decision-making efficiency; amenities and convenience; information and emotional support; and overall patient satisfaction. Failure to consider quality from this five-pronged perspective results in a focus on medical outcomes, without considering the processes central to quality from the patient's perspective and vital to achieving good outcomes. In this paper, we argue for applying the concept of fair process in clinical settings. Fair process involves using a collaborative approach to exploring diagnostic issues and treatments with patients, explaining the rationale for decisions, setting expectations about roles and responsibilities, and implementing a core plan and ongoing evaluation. Fair process opens the door to bringing patient expertise into the clinical setting and the work of developing health care goals and strategies. This paper provides a step by step illustration of an innovative visual approach, called photovoice or photo-elicitation, to achieve fair process in clinical work with acquired brain injury survivors and others living with chronic health conditions. Applying this visual tool and methodology in the clinical setting will enhance patient-provider communication; engage patients as partners in identifying challenges, strengths, goals, and strategies; and support evaluation of progress over time. Asking patients to bring visuals of their lives into the clinical interaction can help to illuminate gaps in clinical knowledge, forge better therapeutic relationships with patients living with chronic conditions such as brain injury, and identify patient-centered goals and possibilities for healing. The process illustrated here can be used by clinicians, (primary care physicians, rehabilitation therapists, neurologists, neuropsychologists, psychologists, and others) working with people living with chronic conditions such as acquired brain injury, mental illness, physical disabilities, HIV/AIDS, substance abuse, or post-traumatic stress, and by leaders of support groups for the types of patients described above and their family members or caregivers. Medicine, Issue 48, person-centered care, participatory visual methods, photovoice, photo-elicitation, narrative medicine, acquired brain injury, disability, rehabilitation, palliative care Making MR Imaging Child's Play - Pediatric Neuroimaging Protocol, Guidelines and Procedure Institutions: Children’s Hospital Boston, University of Zurich, Harvard, Harvard Medical School. Within the last decade there has been an increase in the use of structural and functional magnetic resonance imaging (fMRI) to investigate the neural basis of human perception, cognition and behavior 1, 2 . Moreover, this non-invasive imaging method has grown into a tool for clinicians and researchers to explore typical and atypical brain development. Although advances in neuroimaging tools and techniques are apparent, (f)MRI in young pediatric populations remains relatively infrequent 2 . Practical as well as technical challenges when imaging children present clinicians and research teams with a unique set of problems 3, 2 . To name just a few, the child participants are challenged by a need for motivation, alertness and cooperation. Anxiety may be an additional factor to be addressed. Researchers or clinicians need to consider time constraints, movement restriction, scanner background noise and unfamiliarity with the MR scanner environment2,4-10 . A progressive use of functional and structural neuroimaging in younger age groups, however, could further add to our understanding of brain development. As an example, several research groups are currently working towards early detection of developmental disorders, potentially even before children present associated behavioral characteristics e.g.11 . Various strategies and techniques have been reported as a means to ensure comfort and cooperation of young children during neuroimaging sessions. Play therapy 12 , behavioral approaches 13, 14,15, 16-18 and simulation 19 , the use of mock scanner areas 20,21 , basic relaxation 22 and a combination of these techniques 23 have all been shown to improve the participant's compliance and thus MRI data quality. Even more importantly, these strategies have proven to increase the comfort of families and children involved 12 . One of the main advances of such techniques for the clinical practice is the possibility of avoiding sedation or general anesthesia (GA) as a way to manage children's compliance during MR imaging sessions 19,20 . In the current video report, we present a pediatric neuroimaging protocol with guidelines and procedures that have proven to be successful to date in young children. Neuroscience, Issue 29, fMRI, imaging, development, children, pediatric neuroimaging, cognitive development, magnetic resonance imaging, pediatric imaging protocol, patient preparation, mock scanner
0.711
FineWeb
Courtesy of Paste Magazine Music News, Anti-Music and Oh No They Didn’t! Live Journal. Thank you for reporting this information. (See end of post for Web links.) Patti Smith has announced that she’ll be releasing a greatest hits compilation on Aug. 23 via Columbia/Arista/Legacy. I imagine this means that Patti Smith will be pushing back the release date of the studio recording she is presently working on, (I am not sure what stage of completion that recording is in now.) But when it arrives I will embrace it readily The song choices for Outside Society were personally supervised by Patti Smith, and the CD’s booklet includes notes by the artist for each song. Of “Because The Night,” for example, Patti writes: “Bruce Springsteen gave me a great gift in allowing me to lend verses to his beautifully constructed anthem. My contribution was written for my future husband, Fred ‘Sonic’ Smith. Though we have performed it hundreds of times, the strong response it draws always makes it fresh and exciting to sing.” The landmark 18-song release marks the first single-CD collection to span Patti Smith’s recorded work on both Arista and Columbia. The chronologically arranged tracks move from 1975 (her debut album, Horses, with “Gloria” and “Free Money”) through 2007 (Twelve, with her cover of Nirvana’s “Smells Like Teen Spirit”). Also released on vinyl as a double-LP set, Outside Society will be available everywhere August 23rd. The music on Outside Society is newly remastered by award-winning engineer Greg Calbi and Patti Smith band member Tony Shanahan. 1. Gloria (Horses, 1975) * 2. Free Money (Horses, 1975) * 3. Ain’t It Strange (Radio Ethiopia, 1976) * 4. Pissing In A River (Radio Ethiopia, 1976) * 5. Because The Night (Easter, 1978) * 6. Rock N Roll Nigger (Easter, 1978) * 7. Dancing Barefoot (Wave, 1979) * 8. Frederick (Wave, 1979) * 9. So You Want To Be A Rock N Roll Star (Wave, 1979) * 10. People Have the Power (Dream of Life, 1988) * 11. Up There Down There (Dream of Life, 1988) * 12. Beneath The Southern Cross (Gone Again, 1996) * 13. Summer Cannibals (Gone Again, 1996) * 14. 1959 (Peace and Noise, 1997) * 15. Glitter In Their Eyes (Gung Ho, 2000) * 16. Lo and Beholden (radio edit) (Gung Ho, 2000) * 17. Smells Like Teen Spirit (Twelve, 2007) * 18. Trampin’ (Trampin’, 2004) Writing about “Trampin’,” the final track onOutside Society, Patti muses in autobiographical style reminiscent ofJust Kids: “This unique spiritual, originally sung by Marion Anderson, was performed live in the studio with my daughter Jesse. It sings for the weary traveler seeking a home after years of work, words, and wandering.” Don’t you just wish you could bottle and imbibe their energy, from a 1976 CBCB performance, the Patti Smith Group, “Gloria”
0.7905
FineWeb
Greetings, dear readers! Have you ever called a company and been greeted by a friendly voice on the other end of the line? That friendly voice is likely an operator from a call center. Operators play a crucial role in a company’s customer service team, as they are the front-line representatives who handle incoming calls, answer customer questions, and resolve any issues they may have. In this article, we will explore the world of operator call centers. What is an Operator Call Center? Before we dive into the world of operator call centers, let’s define what we mean by the term. An operator call center is a team of trained professionals who handle incoming calls on behalf of a company. They are equipped with the tools and knowledge needed to assist customers with their questions, complaints, and product inquiries. Operator call centers can be in-house, outsourced, or a combination of both. Why are Operator Call Centers so Important? Operators in call centers are the first point of contact for customers, and as such, they have the ability to make or break a customer’s experience with a company. A good operator can turn a negative customer experience into a positive one by patiently listening to the customer’s concerns and offering helpful solutions. On the other hand, a bad operator can make a bad situation worse, leaving the customer feeling frustrated and dissatisfied with the company. Therefore, it is essential for companies to invest in operator call centers and ensure their operators receive proper training. The Role of an Operator An operator’s role in a call center can vary depending on the company they work for and the type of calls they handle. However, some of the most common responsibilities of an operator include: |Answering calls||Operators are responsible for answering incoming calls and greeting customers with a friendly tone.| |Assessing customer needs||Operators listen carefully to customer inquiries and assess their needs to provide accurate and helpful information.| |Providing information||Operators provide information on products and services, pricing, and policies to aid customers in their decision-making process.| |Troubleshooting||Operators are trained to assist customers in troubleshooting problems with products or services and offer solutions or escalate to higher-tier support as needed.| |Logging calls||Operators record all customer interactions in a database for future reference and follow-up if necessary.| What Skills do Operators Need? Operators need a combination of technical skills and soft skills to excel in their role. Here are some of the most essential skills: 1. Problem-solving skills: Operators must be able to quickly assess customer problems and offer appropriate solutions. 2. Knowledge of relevant products and services: Operators must have a deep understanding of the company’s offerings to answer customer questions accurately. 3. Ability to navigate databases and software: Operators must be proficient in using software and databases to log calls and access customer information. 1. Communication skills: Operators must be able to communicate effectively with customers and colleagues, both verbally and in writing. 2. Empathy: Operators must be able to understand and empathize with customers who may be upset or frustrated with a product or service. 3. Time management: Operators must be able to manage their time effectively to handle a high volume of calls and prioritize urgent issues. 1. Can operators work remotely? With the advent of technology, operators can work remotely from anywhere in the world as long as they have a stable internet connection. 2. How can I become an operator in a call center? Most operators have a high school diploma or equivalent. However, some companies may require specialized training or a college degree. Contact your local call centers to learn more about their hiring requirements. 3. What are the most common challenges that operators face? Operators can face challenges ranging from abusive customers to technical difficulties. Proper training can help them handle such situations effectively. 4. How long should a customer wait on hold? Customers should not wait on hold for more than two minutes. Longer wait times can lead to frustration and lead to higher call abandonment rates. 5. How many calls do operators handle in a day? Operators can handle anywhere from 50-100 calls per day, depending on the volume of calls and the complexity of the issues they handle. 6. What are the benefits of outsourcing call center operators? Outsourcing call center operators can help companies save on costs associated with hiring and training in-house operators. Additionally, outsourcing can offer a wider pool of skilled operators and can provide round-the-clock customer service. 7. How do operators handle angry or abusive customers? Operators are trained to remain calm and professional when dealing with angry or abusive customers. They should listen carefully to the customer’s concerns and offer solutions or escalate to higher-tier support if necessary. 8. Can operators upsell products or services? Some companies may allow operators to upsell products or services, but it should not be the primary focus of their role. Upselling should be done tactfully and should not detract from the customer service experience. 9. How do operators ensure customer satisfaction? Operators can ensure customer satisfaction by actively listening to their concerns, providing accurate information and solutions, and following up with customers to ensure their issue has been resolved. 10. What is the future of operator call centers? The future of operator call centers is bright, as more and more companies invest in customer service to set themselves apart from their competitors. Additionally, advancements in technology, such as chatbots and artificial intelligence, are changing the way call centers operate. 11. What is the average salary of an operator in a call center? The average salary of an operator in a call center can vary depending on their level of experience, location, and company. However, in the United States, the average salary is around $30,000 per year. 12. What is the difference between an operator and a customer service representative? Operators and customer service representatives both work in call centers, but their roles may differ slightly. Operators typically handle incoming calls, while customer service representatives may handle both incoming and outgoing calls. Additionally, customer service representatives may handle other forms of communication, such as email or live chat. 13. Can operators work in any industry? Yes, operators can work in various industries, including healthcare, finance, retail, and telecommunications. In summary, operator call centers play a vital role in a company’s customer service team. Operators are the front-line representatives who handle incoming calls, answer customer questions, and resolve any issues they may have. They require a combination of technical and soft skills to excel in their role, and training is essential to ensure they provide excellent customer service. As more and more companies invest in customer service to set themselves apart from their competitors, the future of operator call centers looks bright. We hope this article has helped you understand the world of operator call centers better. If you have any questions or would like to learn more, feel free to reach out to us. The information presented in this article is for informational purposes only and should not be construed as legal or professional advice. The views and opinions expressed in this article are those of the author and do not necessarily reflect the official policy or position of any agency or organization.
0.5901
FineWeb
The blog post about Overhang For Kitchen Island was posted on August 28, 2017 at 9:16 am. It is published under the Kitchen category. Overhang For Kitchen Island is tagged with Overhang For Kitchen Island, Overhang, For, Kitchen, Island.. Overhango•ver•hang (v. ō′vər hang′;n. ō′vər hang′),USA pronunciation v., -hung, -hang•ing, n. - to hang or be suspended over: A great chandelier overhung the ballroom. - to extend, project, or jut over: A wide balcony overhangs the garden. - to impend over or threaten, as danger or evil; loom over: The threat of war overhung Europe. - to spread throughout; pervade: the melancholy that overhung the proceedings. - to hover over, as a threat or menace: Unemployment continues to overhang the economic recovery. - to hang over; project or jut out over something below: How far does the balcony overhang? - something that extends or juts out over; - the extent of projection, as of the bow of a ship. - an excess or surplus: an overhang of office space in midtown. - a threat or menace: to face the overhang of foreign reprisals. - a projecting upper part of a building, as a roof or balcony. Forfor (fôr; unstressed fər),USA pronunciation prep. - with the object or purpose of: to run for exercise. - intended to belong to, or be used in connection with: equipment for the army; a closet for dishes. - suiting the purposes or needs of: medicine for the aged. - in order to obtain, gain, or acquire: a suit for alimony; to work for wages. - (used to express a wish, as of something to be experienced or obtained): O, for a cold drink! - sensitive or responsive to: an eye for beauty. - desirous of: a longing for something; a taste for fancy clothes. - in consideration or payment of; in return for: three for a dollar; to be thanked for one's efforts. - appropriate or adapted to: a subject for speculation; clothes for winter. - with regard or respect to: pressed for time; too warm for April. - during the continuance of: for a long time. - in favor of; on the side of: to be for honest government. - in place of; instead of: a substitute for butter. - in the interest of; on behalf of: to act for a client. - in exchange for; as an offset to: blow for blow; money for goods. - in punishment of: payment for the crime. - in honor of: to give a dinner for a person. - with the purpose of reaching: to start for London. - contributive to: for the advantage of everybody. - in order to save: to flee for one's life. - in order to become: to train recruits for soldiers. - in assignment or attribution to: an appointment for the afternoon; That's for you to decide. - such as to allow of or to require: too many for separate mention. - such as results in: his reason for going. - as affecting the interests or circumstances of: bad for one's health. - in proportion or with reference to: He is tall for his age. - in the character of; as being: to know a thing for a fact. - by reason of; because of: to shout for joy; a city famed for its beauty. - in spite of: He's a decent guy for all that. - to the extent or amount of: to walk for a mile. - (used to introduce a subject in an infinitive phrase): It's time for me to go. - (used to indicate the number of successes out of a specified number of attempts): The batter was 2 for 4 in the game. - for it, See in (def. 21). - seeing that; Kitchenkitch•en (kich′ən),USA pronunciation n. - a room or place equipped for cooking. - culinary department; cuisine: This restaurant has a fine Italian kitchen. - the staff or equipment of a kitchen. - of, pertaining to, or designed for use in a kitchen: kitchen window; kitchen curtains. - employed in or assigned to a kitchen: kitchen help. - of or resembling a pidginized language, esp. one used for communication between employers and servants or other employees who do not speak the same language. Islandis•land (ī′lənd),USA pronunciation n. - a tract of land completely surrounded by water, and not large enough to be called a continent. - something resembling an island, esp. in being isolated or having little or no direct communication with others. - a raised platform with a counter or other work surface on top situated in the middle area of a room, esp. a kitchen, so as to permit access from all sides. - See safety island. - a low concrete platform for gasoline pumps at an automotive service station. - a clump of woodland in a prairie. - an isolated hill. - an isolated portion of tissue differing in structure from the surrounding tissue. - a platform or building between sets of tracks. is′land•ish, is′land•like′, adj. - to make into an island. - to dot with islands. - to place on an island; Overhang For Kitchen Island have 5 photos it's including Kitchen Island Countertop Overhang, Countertop Island Supports Hidden ., GardenWeb, Cape Kitchen, Kitchen Island With Overhang, Kitchen Island Countertop Overhang Contemporary Kitchen Islands With Seating Kitchen Island Countertop Overhang Contemporary Kitchen Islands. Following are the attachments: The sack is an essential a part of your house and where you may spend a lot of your own time. So it's extremely important that it is provided by you with high flavor. Furthermore it's also wise to make sure that the furniture in accordance with the theme of one's place. Should you examine accessories, it would be described as a good plan where you'll get cheap and good furniture that may match your budget to learn. If you are currently seeking Overhang For Kitchen Island furniture your excellent thing would be to uncover a web based store that offers it in a very economical discount. Along with the greatest element is you can also assess furniture's price before you create your choice. It's also probable that you will discover better options online than in outlets. While looking for your room equipment bear in mind to look at additional considerations that accompany it including pillowcases, linens and stuff like that. These can also be usually obtainable in the exact same retailer.
0.9014
FineWeb
Read Kansas! Intermediate - I-9 Immigrant Contributions The purpose of this lesson is to help fourth grade students understand the contributions to Kansas made by immigrants. It encourages cooperative learning and helps the students to practice their skills at finding the main ideas within an expository text. The students will present information to the class and all students will record the main ideas of the readings on a graphic organizer. The lesson is designed to take place during one class session. To view a PDF of the front and back, click on the card Kansas History, Government and Social Studies Standards: Standard #3: Societies are shaped by beliefs, ideas, and diversity. - 1.1: The student will recognize and evaluate significant beliefs, contributions, and ideas of the many diverse peoples and groups and their impact on individuals, communities, states, and nations. Kansas College and Career Ready Standards: - RI.4.2.: The student determines the meaning the main idea of a text and explain how it is supported by key details; summarize the text. - SL.4.1 a-d: The student will engage effectively in a range of collaborative discussions (one-on-one, in groups, and teacher-led) with diverse partners on grade 4 topics and texts, building on others' ideas and expressing their own clearly. - SL.4.4: The student will report on a topic or text, tell a story, or recount an experience in an organized manner, using appropriate facts and relevant, descriptive details to support main ideas or themes; speak clearly at an understandable pace.
0.9974
FineWeb
This essay presents an aspect of our way of dealing with the dialectical relationship between the two phenomena “Ecology” and “Metaphor”. For practical reason we limit our approach to a semantic dimension of the problematics. Our tradition regards metaphor and analogy both as conceptual activities and patterns as well as pre-conceptual and aconceptual capacities of mode of thinking, talking and acting. Section 1 introduces our concept of ecology, namely as a philosophy-science of and for a living universe, a conscious nature, and many intelligent realities. Our view of ecology offers a new scientific paradigm, because it implies a non-dualistic, non-reductionist, non-causal, and a-causal description of nature, society, and persons. Via a dialectical interpretation of Bell’s theorem we transfer these insights to the fields of communication and dialogue. Section 2 continues the exposition of our concept of a dialogue in a praxis. An implication of these concepts is the concept modality, i.e. our ways of relating to the praxis and the dialogue. We distinguish between a ground mood of modality and a particular mood of modality. The dialogical modality is actually an expression of the interference between persons’ and situations’ undercurrents, i.e. streams of consciousness with waves of feelings, cognitions, and volitions. Centrally in our theory of undercurrents stands the idea and reality of empathy. We discuss these concepts in relation to semantics, by formulating a new semantic matrix. Section 3 unfolds our conception of metaphor-analogy. Both imply transferences of similarities and differences in and between mental models. If the mental models belong to different categories, we term the transference metaphor; do they belong to the same category, we term it analogy. The former implies a novum in the mental transference, and from a survival point of view it works differently than the latter. Metaphor is involved when individualities, species and environments change qualitatively, analogy when they change quantitatively. We end our essay in Section 4 by formulating our preliminary conclusion and some invitations for further discussions.
0.855
FineWeb
In On learning InnoDB: A journey to the core, I introduced the innodb_diagrams project to document the InnoDB internals, which provides the diagrams used in this post. (Note that each image below is linked to a higher resolution version of the same image.) The basic structure of the space and each page was described in The basics of InnoDB space file layout, and we’ll now take a deeper look into how INDEX pages are physically structured. This will lay the ground work to discuss indexes at a logical (and much higher) level. Everything is an index in InnoDB Before diving into physical structures, it’s critical to understand that in InnoDB, everything is an index. What does that mean to the physical structure? When discussing “indexes” in InnoDB (as in this post), this actually means both tables and indexes as the DBA may think of them. Overview of INDEX page structure Every index page has an overall structure as follows: The major sections of the page structure are (not in order): - The FIL header and trailer: This is typical and common to all page types. One aspect somewhat unique to INDEX pages is that the “previous page” and “next page” pointers in the FIL header point to the previous and next pages at the same level of the index, and in ascending order based on the index’s key. This forms a doubly-linked list of all pages at each level. This will be further described in the logical index structure. - The FSEG header: As described in Page management in InnoDB space files, the index root page’s FSEG header contains pointers to the file segments used by this index. All other index pages’ FSEG headers are unused and zero-filled. - The INDEX header: Contains many fields related to INDEX pages and record management. Fully described below. - System records: InnoDB has two system records in each page called infimum and supremum. These records are stored in a fixed location in the page so that they can always be found directly based on byte offset in the page. - User records: The actual data. Every record has a variable-width header and the actual column data itself. The header contains a “next record” pointer which stores the offset to the next record within the page in ascending order, forming a singly-linked list. Details of user record structure will be described in a future post. - The page directory: The page directory grows downwards from the “top” of the page starting at the FIL trailer and contains pointers to some of the records in the page (every 4th to 8th record). Details of the page directory logical structure and its purpose will be described in a future post. The INDEX header The INDEX header in each INDEX page is fixed-width and has the following structure: The fields stored in this structure are (not in order): - Index ID: The ID of the index this page belongs to. - Format Flag: The format of the records in this page, stored in the high bit (0x8000) of the “Number of Heap Records” field. Two values are possible: COMPACT and REDUNDANT. Described fully below. - Maximum Transaction ID: The maximum transaction ID of any modification to any record in this page. - Number of Heap Records: The total number of records in the page, including the infimum and supremum system records, and garbage (deleted) records. - Number of Records: The number of non-deleted user records in the page. - Heap Top Position: The byte offset of the “end” of the currently used space. All space between the heap top and the end of the page directory is free space. - First Garbage Record Offset: A pointer to the first entry in the list of garbage (deleted) records. The list is singly-linked together using the “next record” pointers in each record header. (This is called “free” within InnoDB, but this name is somewhat confusing.) - Garbage Space: The total number of bytes consumed by the deleted records in the garbage record list. - Last Insert Position: The byte offset of the record that was last inserted into the page. - Page Direction: Three values are currently used for page direction: LEFT, RIGHT, and NO_DIRECTION. This is an indication as to whether this page is experiencing sequential inserts (to the left [lower values] or right [higher values]) or random inserts. At each insert, the record at the last insert position is read and its key is compared to the currently inserted record’s key, in order to determine insert direction. - Number of Inserts in Page Direction: Once the page direction is set, any following inserts that don’t reset the direction (due to their direction differing) will instead increment this value. - Number of Directory Slots: The size of the page directory in “slots”, which are each 16-bit byte offsets. - Page Level: The level of this page in the index. Leaf pages are at level 0, and the level increments up the B+tree from there. In a typical 3-level B+tree, the root will be level 2, some number of internal non-leaf pages will be level 1, and leaf pages will be level 0. This will be discussed in more detail in a future post as it relates to logical structure. Record format: redundant versus compact The COMPACT record format is new in the Barracuda table format, while the REDUNDANT record format is the original one in the Antelope table format (neither of which had a name officially until Barracuda was created). The COMPACT format mostly eliminated information that was redundantly stored in each record and can be obtained from the data dictionary, such as the number of fields, which fields are nullable, and which fields are dynamic length. An aside on record pointers Record pointers are used in several different places: the Last Insert Position field in the INDEX header, all values in the page directory, and the “next record” pointers in the system records and user records. All records contain a header (which may be variable-width) followed by the actual record data (which may also be variable-width). Record pointers point to the location of the first byte of record data, which is effectively “between” the header and the record data. This allows the header to be read by reading backwards from that location, and the record data to be read forward from that location. Since the “next record” pointer in system and user records is always the first field in the header reading backwards from this pointer, this means it is also possible to very efficiently read through all records in a page without having to parse the variable-width record data at all. System records: infimum and supremum Every INDEX page contains two system records, called infimum and supremum, at fixed locations (offset 99 and offset 112 respectively) within the page, with the following structure: The two system records have a typical record header preceding their location, and the literal strings “infimum” and “supremum” as their only data. A full description of record header fields will be provided in a future post. For now, it is important primarily to observe that the first field (working backwards from the record data, as previously described) is the “next record” pointer. The infimum record The infimum record represents a value lower than any possible key in the page. Its “next record” pointer points to the user record with the lowest key in the page. Infimum serves as a fixed entry point for sequentially scanning user records. The supremum record The supremum record represents a key higher than any possible key in the page. Its “next record” pointer is always zero (which represents NULL, and is always an invalid position for an actual record, due to the page headers). The “next record” pointer of the user record with the highest key on the page always points to supremum. The actual on-disk format of user records will be described in a future post, as it is fairly complex and will require a lengthy explanation itself. User records are added to the page body in the order they are inserted (and may take existing free space from previously deleted records), and are singly-linked in ascending order by key using the “next record” pointers in each record header. A singly-linked list is formed from infimum, through all user records in ascending order, and terminating at supremum. Using this list, it is trivial to scan in through all user records in a page in ascending order. Further, using the “next page” pointer in the INDEX header, it’s easy to scan from page to page through the entire index in ascending order. This means an ascending-order table scan is also trivial to implement: Since records are singly-linked rather than doubly-linked, traversing the index in descending order is not as trivial, and will be discussed in a future post. The page directory The page directory starts at the FIL trailer and grows “downwards” from there towards the user records. The page directory contains a pointer to every 4-8 records, in addition to always containing an entry for infimum and supremum. The page directory is simply a dynamically-sized array of 16-bit offset pointers to records within the page. Its purpose will be more fully described in a future post dedicated to the page directory. The space between the user records (which grow “upwards”) and the page directory (which grows “downwards”) is considered free space. Once the two sections meet in the middle, exhausting the free space (and assuming no space can be reclaimed by re-organizing to remove the garbage) the page is considered full. Next we’ll look at the logical structure of an index, including some examples.
0.7974
FineWeb
I can't make calls using a voice command Try the following actions: - Verify that your BlackBerry® smartphone is connected to the wireless network. - If you're using a Bluetooth® enabled device, such as a hands-free car kit or wireless headset, verify that the Bluetooth enabled device supports this feature and that you have paired the Bluetooth enabled device with your BlackBerry smartphone. - Verify that the language that you use to say voice commands is the same as the voice dialling language that you have set in the language options. Certain languages might not be supported. Next topic: My headset makes calls instead of my smartphone Previous topic: My phone number appears as Unknown in the Phone application
0.9808
FineWeb
Words With Toa 5 Letters Words With Toa 5 Letters – Writing results-oriented ad copy is difficult because it must appeal, tempt, and convince consumers to take action. In Wordle, players try to find a five-letter word by guessing. After each guess, you learn which letters are in the correct place and which other letters are part of the word but are not correctly placed. Then you guess again – but be careful, you only have six guesses. Words With Toa 5 Letters Variations of this game go back decades. Jotto is a paper version that does not provide information about exact matches. Lingo is a game show that aired from the 1980s to the 2010s and has the same general rules as Wordle. The Alphabetic Principle: From Phonological Awareness To Reading Words Wordle gets what’s right in its community. Everyone gets the same word every day and those words come from a curated list. Players can share their results with the coveted goal of finding the correct word quickly. Using mathematical analysis of Wordle data, we share some tips that will help you win much faster! Wordle’s list of words eligible for Word of the Day can be analyzed for patterns including the most frequent letters in each position. Mainly for the purposes of our analysis, Wordle’s list of words eligible for Word of the Day was hand-picked. A list of terms can be found here. Here’s a complete list of 5-letter words you can use as a guess. More than 15% of Wordle’s words start with S. Only six other initial letters appear in more than 5% of Wordle words. In order of frequency, they are C, B, T, P, A and F. These initial letters may seem very surprising, but they are close to the order of common five-letter words. Correspondence: Text Messages, Emails, Memos, And Letters In order of frequency, A, O, R, E, I, L, U, H appear as the second letter in more than 5% of Wordle words. After that there is a steep drop-off. In second and third positions, vowels dominate. The following letters appear as the third letter in more than 5% of Wordle words: A, I, O, E, U, R, N, in order of frequency. The following letters appear as the fourth letter in more than 5% of Wordle words: E, N, S, A, L, I, R, C, T, O, in order of frequency. By a wide margin, the most common fourth letter is E, which is the fourth letter in 1 in 7 Wordle words. The last letter is the most interesting: E, Y, T, R, L, H, N, D all appear as the last letter in more than 5% of Wordle words. Compare this to the last-letter frequency of common five-letter words: S, E, Y, D, T, A, and R appear in more than 5% of the full set of five-letter words. Magnificent M Words To Maximize Your Vocabulary Tip Warning!: Wordle words rarely end in S – it’s the 15th most popular last letter. Wordle words end in S less than 2% of the time, compared to 31% for the full set of five-letter words. This is the result of a Wordle list made up of hand-picked words – and the contrast is startling. Interested in courses that explore these types of topics? Check out AoPS Online’s Introduction to Programming. The work for this article was done through computer analysis. Use all five letters to remove options When you start a Wordle game, you have a blank slate and can enter any five-letter word. Imagine you played your first word, Chair. The game responds by telling you that H is correct and correctly placed, but all other letter guesses are not in the word. This is a really great breakthrough: there are only 33 possible target words, including GHOST, SEEP and WHOSE. What word will you play next? Review 02 Interactive Worksheet Surprisingly, the best word to play next is STOLE, which doesn’t have an H as the second letter. By playing STOLE, we can distinguish between GHOST and SHEEP and WHOSE, all of which have different reactions. In fact, after playing STOLE as a second guess, the The case scenario requires choosing between three possible words in the third attempt. (Well, you can also play SWOLE with the same results.) Rather than playing another common word, it adds a small chance of hitting the word on the next try. One of the best options to keep H in place, but it’s important to see that it’s less useful than playing STOLE. By playing STOLE, we get information about the letter L, which it does not. The only advantage of playing them is that it has a 1 in 33 chance of being the correct word, whereas STOLE does not. In Wordle’s “hard mode,” there’s a reason you’re forced to play the H wherever it’s found: it’s hard. This is especially true when you put in 3 or 4 letters, but there are many options for final letters. Vocabulary Upper Intermediate Tip Warning! If you’re not playing hard mode, instead of guessing one letter at a time, choose a word that may not be correct, but will tell you which of the following options to use. One of the fun things about Wordle is that there is no single answer to this question. Some people always have an opening word that they play, while others change it. Here are some tips. An important measure of Wordle’s quality is the information you get from it. Let’s say your first guess is KUZDU. Most of the time, you get no information except that K, U, D, and Z are not in the target word. It makes a terrible choice and it can be measured. On average, after playing Kudzu, you still have 870 words that can be correct. A better word has a lower average number of words. Many of the best words are not common English words. If you choose it as your first word, these are the top 10 choices, along with the average words left in the decision pool: Simple Ways To Address A Letter To A Family: 11 Steps Sometimes, your first guess is bad. But you can choose words that minimize bad choices. These words narrow things down to the fewest possible remaining options. They are especially good choices in Absurd, an adversarial version of Wordle, where the target word can change but still fit the choices made. These are the top 10 options for the lowest possible number of words remaining: The first five are all anagrams, and their worst case scenario is that there are no letters. 93% of Wordle words contain at least one of the letters R, A, I, S, or E. Earning a green letter (right letter, right position) is very helpful in the first turn. Here are the top 10 options for earning green letters, ranked by average number of green letters found: Please Don’t Make Me Ask For Another Recommendation While these words can help, they often contain repeated letters and don’t usually do well in narrowing down options if they are missed. Although it has been proven that any Wordle can be won in 5 guesses or less, winning faster is prestigious! A measure of this is how well a hypothesis can narrow down the options to fewer than 10 remaining options. For example, if you choose RAISE and find that the R, S, E are all in the right places and the I is correct but in the wrong place, you will immediately know that the correct word is RINSE. Here are the top 10 options that give you the chance to narrow things down to less than 10 options in one shot: Final Tip Warning! There’s a lot to think about here, but note that good first words almost always use five different letters and use multiple vowels. After the first word, take into account what the possibilities are and find the word that differentiates the rest of the possibilities. And, if you get stuck, use the word list to figure out what your options are. How To Write & End A Personal Letter — Emily Post By clicking this button, I agree to receive AoPS communications and confirm that I am over 13 or under 13 and already a member of the Art of Problem Solving community. Freelancer Gail Faschingbauer Cooper, journalist and pop-culture junkie, writes “What Ever Happened to Pudding Pops? The Lost Toys, Tastes and Trends of the 70s and 80s,” as well as “The Totally Sweet 90s.” If Marathon candy bars ever make a comeback, she’ll be first in line. This is why we cannot have good things. All the upcoming answers for Wordle, the simple word-guessing game that has garnered so much social buzz, are hidden in the game’s code. We know this because of a tweet from a guy in India that I’m linking to here, but won’t embed, because it shows words that will soon answer the puzzle. Ways To Write A Letter To Your Child’s Teacher Warning: If you click on the link above,
0.9234
FineWeb
Enabling LINK does not alter the current Channel Delegate. Rather, the LINK button toggles a special ‘lock-step’ mode. In broad terms, Link mode causes transport control operations (Play, Stop, etc.) to occur in tandem. Other operations – such as changing clip selections – are not linked. For example, when A is lit along with LINK on the Control Surface or Replay Desktop: - The Replay Desktop displays Channel A’s operational state. - Pressing Stop or Play affects playback for CLIP LIST or PLAY LIST sources on both channels simultaneously. - Selecting a different clip (or CLIP LIST /PLAY LIST page) affects the delegated channel only (in this example, A). Tip: The LINK button is behaves like the Caps Lock key on your keyboard, remaining active until you press it again. Just to repeat it in this context, the Channel Info pane under the currently delegated channel output monitor is normally shaded to what source is assigned to it. When LINK is enabled, both panes are shaded, but a white border (Figure 96) is added to denote the delegated channel.
0.9897
FineWeb
The excitement around the Bowen earthquake last week reminded me of this now dated 1999 report I stumbled upon some time ago, with a foreword from a more youthful Warren Entsch. The building construction and location data would be well out of date by now I presume: COMMUNITY RISK IN CAIRNS A MULTI-HAZARD RISK ASSESSMENT The earthquake hazard in Cairns is moderate by global standards, but it is not negligible. Over the past 100 years there have been at least 11 significant earthquakes reported within 200 km of Cairns, the most damaging being the Richter magnitude 4.3 event of 1896. In many places of Australia, probably including Cairns, moderate to strong earthquakes of Richter magnitudes 5 to 6 make up about 90% of the total contribution to the overall earthquake hazard. The occurrence of such an earthquake close to Cairns would be a rare event. However, its impact could be great. An earthquake in this magnitude range (Richter magnitude 5.6) near Newcastle in 1989 caused arguably Australia’s most costly 20th Century natural disaster. We have constructed earthquake urban hazard zonation maps and, from the building database, produced an inventory of buildings, by construction type and usage, in the zones in these maps. Any earthquake of a magnitude likely to cause damage in Cairns will have an effect across all suburbs. The amount of damage, and consequently risk, will increase with the intensity of the event. Whilst all suburbs have some degree of exposure, Risk-GIS analysis of the earthquake hazard reveals that some 86% of Cairns buildings stand on ‘soft’ sediments of the coastal plains and riverine deltas, or the sands, silts and clays of the lower footslopes. These sediments amplify earthquake shaking. The extensive ‘soft’ sediments beneath the coastal suburbs, in particular, would aggravate the impact of any significant earthquake. These are also the suburbs that contain many of the critical facilities and have significant concentrations of people, buildings and infrastructure. The remaining 14% of the buildings are mostly modern and are situated on the upper slope soils or rock of the hills where ground motions will be less damaging. Some of these buildings conform to the earthquake loading provisions of the Australian Building Code, and the majority conform to wind loading provisions. In order to produce a suburb-by-suburb ranking of Cairns for earthquake risk from direct damage to buildings, we have introduced a vulnerability ranking of building construction types. The profile of risk exposure to earthquake and a total earthquake risk profile, which takes account of community vulnerability as well as the exposure to the hazard, are shown in Figures (v) and (vi
0.7365
FineWeb
A family struggling with loss finds themselves at the mercy of an ancient demon trying to destroy them from the inside. Featuring the song "Hear The Souls Who Weep" - Music by Christopher Young, Lyrics by Dennis Spiegel and performed by Carli Duda, Hannah Zhang and John J. Lee 1. Abyzou (15:25) 2. The Thief Of Unborn (10:50) 3. Horrid Screams Of Hell (8:06) 4. Hear The Souls Who Weep (4:30)
0.5512
FineWeb
This is the text of the agreement negotiated between the Mexican government and the EZLN at San Andres in 1996 which the government then refused to implement. The various parties commit themselves to sending to the Debate and National Decision Authorities the following joint proposals upon which they have agreed". On the basis of the new relationship between the State and the indigenous peoples it is necessary to recognize, insure and guarantee rights within an emended federalist framework. Such an objective implies the promotion of reforms and addenda to the Federal Constitution and the laws emerging from it , as well as to State Constitutions and local Judicial Dispositions, to further, on the one hand, the establishment of general foundations that may insure unity and national objectives; and, at the same time, allow the federative entities the true power to legislate and act in accordance to the particularities of the indigenous issues coming before them. 1.- To urge a profound transformation of the State, as well as of the political, social, cultural, and economic relationships with the indigenous peoples, which satisfies their demands for justice. 2.- To urge the emplacement of an all-inclusive new social agreement, based on the understanding of the fundamental plurality of Mexican society and on the contribution that the indigenous people can make to national unity, beginning with the constitutional acknowledgement of their rights, and in particular, to their right to self-determination and autonomy. 3.- The legal reforms to be promoted must originate from the principle of the equality of all Mexicans before the law and judicial organs, and not by the creation of special codes of law that privilege particular people; respecting the principle that the Mexican Nation is a pluricultural entity which is originally supported by its indigenous peoples. 4.- The constitutional modifications represent one of the most important factors in the new relationship between the indigenous peoples and the State within the framework of reforming the State, so that their demands may find support within the State legal system. 1.- The creation of a judicial framework that establishes a new relationship between indigenous peoples and the State, based on the recognition of their right to self-determination and the judicial, political, social, economic and cultural rights that obtain from it. The new constitutional dispositions must include a framework of autonomy. 2.- Such a judicial framework must be produced with the recognition of the self-determination of indigenous peoples, who, with previous societies, are the ones who have suffered a historical continuation of colonial oppression, maintain and recognize their own identities; and possess the will to preserve them, based on their own, distinct cultural, social, political and economic characteristics. Those attributes characterize them as indigenous peoples, and as such, they are constituted as subjects with a right to self-determination. Autonomy is the concrete expression of the exercise of the right to self-determination, within the framework of membership in the National State. The indigenous peoples shall be able, consequently, to decide their own form of internal government as well as decide their way of organizing themselves politically, socially, economically and culturally. Within the new constitutional framework of autonomy, the exercise of self-determination of indigenous peoples shall be respected in each of the domains and levels in which they are asserted, being able to encompass one or more indigenous groups, according to particular and specific circumstances in each federal entity. The exercise of autonomy of indigenous people will contribute to the unity and democratization of national life and will strengthen national sovereignty. It is appropriate to admit, as a fundamental demand of the indigenous peoples, their right to autonomy, insofar as they are communities with different cultures and they have the faculty to decide their own local issues within the framework of the National State. This acknowledgement is based on Agreement 169 of the OIT International Labor Organization, and ratified by the Senate of the Republic. Thus, the recognition of autonomy is based on the concept of indigenous group, which is founded on historical criteria and on cultural identity. 3.- National legislation must acknowledge indigenous peoples as subjects with the right to self-determination and autonomy. 4.- It is proposed to the Congress of the Union to recognize, in national legislation, these communities as entities with public rights, with the right to free association in municipalities with populations that are predominantly indigenous, as well as the right of a group of municipalities to associate, in order to coordinate their actions as indigenous peoples. Competent authorities will execute the orderly and gradual transference of resources, so that the people themselves may administer the public funds assigned to them, and to strengthen the indigenous participation in government, negotiations and administration in the various domains and levels. It will be up to state legislatures to determine, in their case, the obligations and faculties that might be transferred. State legislatures will be able to move forward on the remunicipatization in the territories in which the indigenous villages are established, said remunicipalization must be based on consultation with the towns involved. In order to strengthen the federal contract, it is essential to revise in depth, not only the relationship between the Federation and the state governments, but also the relationship between the latter and the municipalities. The union between townships and predominantly indigenous populations is proposed, not as a different type of municipality, but as one which, within the framework of the general concept of this political institution, may allow indigenous participation in its composition and unity, while, at the same time promoting and integrating indigenous communities into the municipal government. As to what constitutes a municipality with a predominantly indigenous population, reaffirming the full meaning of a free municipality on which federalism is based, it is considered necessary that the organizations be constitutionally strengthened, in such a manner that: a) they may be endowed with duties that guarantee the exercise of autonomy of the indigenous peoples; b) the structure foreseen in the Municipal Organic Law will guide and orient them toward facing the new challenges of development, and in particular to the needs and new forms of organization specifically for indigenous towns; 5.- It is proposed that the Congress of the Union and to the State Legislatures acknowledge and establish the characteristics of self-determination and the levels and modes of autonomy, taking into consideration what "autonomy" means. a) Territory. Every indigenous town is found in a territory that covers the entire habitat occupied or used by indigenous people in one form or another. The territory is the material base of their reproduction as a people and it expresses the inseparable unity people-land-nature. b) Demarcation of application. Jurisdiction is the spatial, material and personal normative field of validity in which the indigenous people apply their rights. The Mexican State will acknowledge the existence of said fields. c) Responsibilities. There must be compatibility with various federal, state and municipal authorities, as well as a distribution of political, administrative, economic, social, cultural, educational, judicial resources, for the management and protection of natural resources, with the purpose of responding opportunely to the requirements and demands of indigenous peoples. Furthermore, it will be required to specify the obligations, faculties and resources that are likely to be transferred to the indigenous communities and towns under the established criteria in Section 5.2 of the document entitled "Joint Pronouncements", as well as the various forms of participation by the communities and towns vis =E0 vis the government authorities, so that they may interact and coordinate their actions with them, particularly at the municipal level. d) Self-development. The indigenous communities and towns themselves must determine their development projects and programs. For this reason, it is considered appropriate to incorporate, in local and federal legislation, the ideal mechanisms that would promote the participation of indigenous peoples in the planning for development at all levels; so that the design of this participation may take into consideration their aspirations, needs and priorities. e) Participation in the national and state channels of representation. Local and national participation and political representation must be ensured, respecting the various socio-cultural characteristics, in order to create a new federalism. It is proposed to the Congress of the Union, the recognition, in constitutional and political reforms that may derive, of the rights of the indigenous woman to participate as an equal with men in all levels of government and in the development of indigenous peoples. 6.- It is proposed to the Congress of the Union and to the State legislatures that, in acknowledging indigenous autonomy and for the determination of all its levels, they take into consideration the main rights that are the objects of said autonomy; establishing the characteristics required to insure its free exercise. Among said rights, the following may be emphasized: a) to exercise the right to develop the specific forms of social, cultural, political and economic organization; b) to obtain the recognition of their internal normative systems for regulation and sanctions, insofar as they are not contrary to constitutional guarantees and human rights, especially those of women; c) to agree to State jurisdiction in a better way; d) to agree collectively to the use and enjoyment of natural resources, except those which fall under national jurisdiction; e) to promote the development of the various components of indigenous identity and cultural heritage; f) to interact with the various levels of political representation in government and the administration of justice; g) to cooperate with other communities of their ethnicity or different groups, in joining efforts and coordinating actions for optimal use of resources, and the initiation of regional and general development projects for the promotion and defense of common interests; h) to design their community and their municipal government representation freely, as well as selecting their authorities as indigenous peoples, in accordance with their own institutions and traditions; i) to promote and develop their languages and cultures, as well as their political, social, economic, religious and cultural customs and traditions. 1.- Increase in political participation and representation. Municipal strengthening. It is convenient to anticipate at the constitutional level the necessary mechanisms that: a) Insure the adequate political participation of indigenous communities and peoples in the Congress of the Union and local congresses, incorporating new criteria in setting the boundaries of the electoral districts that correspond to the indigenous communities and towns; b) Allow participation in the electoral processes without requiring participation of the political parties; c) Guarantee the effective participation of the indigenous peoples in the publicity and supervision of those processes; d) Guarantee the organization of internal election or nomination processes. e) Recognize the system assignation of offices and other forms of organization, methods of designation of representatives, and the making of decisions in the assembly and of popular consultation. f) (Establish the election of municipal agents or allied figures or, when appropriate, be named by the corresponding towns and communities. g) Foresee in the state legislation the mechanisms that may allow the revision, and, when appropriate, the modification of the names of the municipalities, proposed by the population located in the corresponding boundaries. 2.- The guarantee of full access to justice. The State must guarantee the towns full access to the jurisdiction of the Mexican State, with recognition and respect for their own internal normative systems, guaranteeing full respect for human rights. It will promote the recognition that positive Mexican Law may acknowledge the authorities, norms and internal procedures for conflict resolution of towns and communities, will guarantee that local judgments and decisions are confirmed by the judicial authorities of the State. The recognition of jurisdictional spaces to the designated authorities in the heart of the indigenous communities, towns and municipalities stems from a restructuring of the municipal charter, so that said authorities will be able to settle internal conflicts of coexistence; their knowledge and resolution may imply a better acquisition and distribution of justice. The marginalization in which the indigenous people live and the conditions of disadvantage to which they consent in the system of granting and procuring justice, create the need for a serious revision of the federal and state judicial frameworks, so that effective access of the indigenous peoples be guaranteed, or in place of local action, access to its members to the State jurisdiction, and in this manner, avoiding partial distribution of justice to the detriment of[the indigenous sector of the population. In the legislative reforms that may enrich the internal normative systems it must be determined that, when sanctions are imposed upon members of the indigenous towns, the economic, social and cultural characteristics of those sanctioned must be taken into consideration, privileging sanctions other than incarceration. Preferably sentences may carried out in places that are closer to home and also, that integration into the community be favored as an essential mechanism of social readaptation. The insertion of the norms and judicial practices of the indigenous communities as a source of law applicable to procedures and resolutions of controversies under their authorities, will be encouraged; also, in order to provide constitutional guarantees, it is strongly suggested that federal and local judgments in which the indigenous people are involved be taken into consideration. 3.- Knowledge and respect of indigenous culture. It is considered necessary to elevate the constitutional rank of all Mexicans by means of a pluricultural education that acknowledges, disseminates and promotes the history, customs, traditions and, in general, the culture of the indigenous peoples, root of our national identity.. The Federal Government will promote the laws and necessary policies so that the indigenous languages in each state may have the same social value as Spanish, and it will promote the development of practices that deter discrimination against them in administrative and legal transactions. The Federal Government commits itself to the promotion, development, preservation and practice of indigenous languages by providing education in the indigenous languages; moreover, it will favor the instruction of writing and reading in the languages themselves; and measures will be adopted to insure that these peoples have the opportunity to learn Spanish. Knowledge of indigenous cultures is national enrichment and a necessary step to eliminate misunderstandings and discrimination toward indigenous peoples. 4.- Integral Indigenous Education. The various governments commit themselves to respect the educational tasks of the indigenous peoples within their own cultural space. The allocation of financial, material and human resources must be brought about with fairness to plan and carry out educational and cultural activities determined by the indigenous towns and communities. The State must bring about the indigenous peoples' right to a free and quality education, as well as to encourage the participation of the indigenous towns and communities in selecting, ratifying and removing teachers, taking into consideration criteria on academic and professional performance previously agreed on by the indigenous peoples and the corresponding authorities, and to form supervisory committees on the quality of education within the framework of local institutions. The right to bilingual and inter cultural education of the indigenous peoples is ratified. The definition and development of educational programs with regional content, where their cultural heritage is recognized, are established as the jurisdiction of federative entities in consultation with the indigenous towns. It will be possible, through educational action, to insure the use and development of indigenous languages, as well as the participation of towns and communities in conformance with the spirit of Agreement 169 of the OIT (International Labor Organization). 5.- The provision of basic needs. The State must set up mechanisms to guarantee the indigenous towns the conditions that may allow them to satisfactorily tend to their nourishment, health, and housing at an adequate level of well-being. Social policy must set up priority programs for the improvement of the levels of health and nourishment of children, as well as support programs, in an egalitarian plane, for the training of women, increasing their participation in the organization and the development of the family and the community. Priority must be given to the intervention of the indigenous woman in the decisions regarding economic, political, social and cultural development projects. 6.- Production and employment. Historically, development models have not taken into consideration the productive systems of the indigenous peoples. Consequently, the utilization of their potentials must be encouraged. The Mexican judicial system, both at federal and state levels must push for the recognition of the indigenous peoples' right to the sustainable use and the derived benefits of the use and development of the natural resources of the territories they occupy or utilize in any form, so that, in a framework of global development, the economic underdevelopment and isolation may be overcome. This action also implies an increase in and reorientation of social spending. The State must foster the development of the economicbase of the indigenous towns and must guarantee their participation in designing the strategies directed toward the improvement of their living conditions and the provision of basic services. 7.- Protection of migrant indigenous peoples. The State must set up specific social policies to protect migrant indigenous people, both in the national territory as well as beyond its borders, with inter institutional actions to support work and education of women, and health and education for children and youth, which, in rural regions, must be coordinated in the areas of contribution as well as those that attract agricultural workers. 8.- Means of communication. With the purpose of creating an inter cultural dialogue from the community level up to the national level, that may allow a new and positive relationship between the various indigenous groups and between these groups and the rest of society, it is essential to endow these towns with their own means of communication, which are also key mechanisms for the development of their cultures. Therefore, it will be proposed to the respective national authorities, to elaborate a new communications law that may allow the indigenous towns to acquire, operate and administrate their own means of communication. The Federal and State governments will promote that the means of communication currently in the hands of the Indigenists become indigenous means of communication, which is a demand made by the indigenous communities and towns. The Federal Government will recommend to the respective authorities that the seventeen INI (National Indigenist Institute) radio stations be given to the indigenous communities in their respective regions, with the transference of permits, infrastructure and resources, when an expressed request by the indigenous communities has been issued to this effect. In the same manner, it is necessary to create a new judicial framework in the area of communications that may consider the following aspects: national pluriculturalism; the right to use indigenous languages in the media; the right to rebuttal; guarantees to rights of expression, information and communication; and the democratic participation of the indigenous towns and communities before the authorities who decide on matters of communication. The participation of interested parties in establishing a civic responsibility process for the decision making authorities in the area of communication, can be realized through the creation of a communications Ombudsman or a citizens' Council of communications. THE ADOPTION OF THE FOLLOWING PRINCIPLES, WHICH MUST GOVERN THE NEW RELATIONSHIP BETWEEN INDIGENOUS PEOPLE AND THE STATE AND THE REST OF SOCIETY: 1.- Pluralism. The contact between the peoples and cultures that constitute Mexican society must be based on respect for their differences, and must assume their fundamental equality. Consequently, it must be the policy of the State to regulate its action, to promote a pluralist orientation in society, capable of actively combating every form of discrimination, and of correcting economic and social inequalities. Similarly, it will be necessary to move towards the creation of a judicial order nourished by plurality, reflecting intercultural dialogue with common standards for all Mexicans and respect for the internal systems of law of the indigenous peoples. 2.- Self-determination. The State shall respect the exercise of self-determination by indigenous peoples, in all fields and levels where they will try to validate and practice their separate autonomy, without damaging national sovereignty and within the new normative framework for the indigenous towns. This implies respect for their cultural identities and their forms of social organization. It will also respect the abilities of the indigenous towns and communities to determine their own development, as long as national and public interest is respected. The various levels of government and State institutions will not intervene unilaterally in the affairs and decisions of the indigenous towns and communities, in their organization and forms of representation, and in their current strategies for the use of resources. 3.- Sustainability. It is necessary and urgent to safeguard the natural areas and culture of the territories of indigenous peoples. Legislation will push for the recognition of the rights of the indigenous towns and communities to receive the corresponding indemnization, when the exploitation of natural resources carried out by the State causes damages to their habitat which may endanger their cultural survival. In the cases where damage has already occurred, and the towns are where damage has already occurred, and these towns are able to show that the given compensation does not allow their cultural survival, the establishment of review mechanisms will be promoted to allow the State and the affected to jointly analyze the specific case. In both cases the compensatory mechanisms will try to insure the sustainable development of the indigenous towns and communities. In the same manner, there will be launched, in common accord with the indigenous towns, rehabilitation activities of those territories, and support of initiatives to create the conditions that may insure the sustainability of their practices of production and of life. 4.- Consultation and Accord. The policies, laws, programs, and public actions that might relate to the indigenous towns will be consulted. The State must promote the integrity and agreement of all the institutions and levels of government that influence the life of the indigenous towns, avoiding partial practices influence the life of the indigenous towns, avoiding partial practices that may split up public policy. To insure that their action corresponds to the distinct characteristics of the various indigenous towns, and to avoid the imposition of uniform policies and programs, their participation in all the phases of public action, including conception, planning and evaluation must be guaranteed. Similarly, there must be a gradual and orderly transference of powers, obligations and resources to the municipalities and communities so that, with the participation of the latter, the public monies assigned to them may be distributed. As for resources, and for whatever purpose they may exist, they may be transferred to the forms of organization and association that are anticipated in point 5.2 of the document of Joint Pronouncements. Since the policies in the indigenous areas should not only be conceived with the towns themselves, but implemented with them, the present indigenist and social development institutions that operate locally must be transformed into different entities that may be conceived and operated jointly and in concert with the State and the indigenous peoples themselves. 5.- Strengthening of the Federal System and democratic Descentralization. The new relationship with the indigenous peoples encompasses a process of decentralization of the obligations, faculties and resources of the federal and state authorities to the municipal governments, in the spirit of point 5.2 of the document Joint Pronouncements, so that with the active participation of the indigenous communities and the population in general, they may assume the initiatives thereof. CONSTITUTIONAL AND LEGAL REFORMS 1.- The establishment of a new relationship between the indigenous peoples and the State has, as a necessary point of departure, the peoples and the State has, as a necessary point of departure, the creation of a new judicial framework at the national level as well as in the federative entities. The constitutional reforms that recognize the rights of the indigenous towns must be achieved through a creative legislative spirit, that may produce new policies and may give real solutions to social problems. To that effect, we propose that these reforms must contain, among others, the following general aspects: a) To legislate on the autonomy of the indigenous communities and towns, to include the recognition of the communities as entities with public law; their right to associate freely with municipalities that are of predominantly indigenous populations; and also the right of various municipalities to associate for the purpose of coordinating their actions as indigenous towns; b) To legislate to "guarantee the protection of the integrity of the lands belonging to indigenous groups," taking into consideration the specifics of the indigenous towns consideration the specificsof the indigenous towns and communities, in the concept of territorial integrity contained in Agreement 169 of the OIT (International Labor Organization), as well as establishing the procedures and mechanisms for the regularization of the various forms of indigenous property rights and for thepromotion of cultural cohesion; c) In issues related to natural resources, to install a preferential order that privileges the indigenous communities in the granting of concessions in order to reap the benefits of the exploitation and use of natural resources; d) Legislate on the rights of the indigenous people, men and women, to have representatives in the legislative entities, particularly in the Congress of the Union and in the local congresses; incorporating new criteria to delimit the electoral districts that may correspond to the indigenous communities and towns, and that they be allowed to have elections in accordance to the legislation on that matter; e) Legislate on the rights of the indigenous towns to elect their own authorities and to exercise authority according to their own internal norms in their autonomous localities, guaranteeing the participation of women on equal terms; f) In the content of the legislation, to take into consideration the pluricultural nature of the Mexican Nation that may be reflected in intercultural dialogue, with common standards for all Mexicans and with respect for the internal normative systems of the indigenous towns; g) In the Constitution, to insure the obligation to not discriminate on the basis of racial or ethnic origin, language, gender, beliefs or social condition, thus, making possible the designation of discrimination as a crime. The rights of the indigenous towns to the protection of their sacred sites and ceremonial centers, and the use of plants and animals that are sites and ceremonial centers, and the use of plants and animals that are considered sacred for strictly ritual use must also be insured; h) Legislate so that no form of coercion may be exercised against the individual guarantees and the specific rights and freedoms of the indigenous towns; i) Legislate the rights of the indigenous towns to the free exercise and development of their cultures and their access to means of communication.
0.8086
FineWeb
You are indeed correct my friend. In the earth moving world what you describe is called "Bucket Swell". That is, when you drive a bucket loader into say a gravel bank, and then back out, because the gravel in the bucket has been loosened and not as compacted as it was in the ground, it swells. The best way to buy any earthern product is by tonnage, but at least here in Maine, rock, gravel, sand, etc is still sold by the yard, which is an inexact science, but change is hard in that industry. Road builders get run into "Bucket Swell" a lot when they are making cuts and fills for new roads. When they calculate a cut through a hillside,they must automatically make a 15% increase in the amount of fill moved because of bucket swell. It can make the difference between profit and loss, which was posted in RG LeTourneau's book when he failed to do this and paid dearly when he built the road to the Hoover Dam (Boulder Dam then). Scottscoaled wrote:You can lead them to water but you can't make them drink. A solid block of coal. Takes up so much space. crack it in half, and it all ready takes up more space. Take the two halfs of the original block, crack them in half. They too take up more space. All this is if they fit back together perfectly. Once they become misaligned, they take up more space. That drama keeps going. As much as you would think they "pack together", they really have all ready taken up more space, and have more surfaces that are misaligned. Basic physics. One extreme to another. From more to less. This case it's more dense to less dense.
0.7311
FineWeb
Associate Professor Victoria Stodden will be a keynote speaker at the 2018 IEEE Data Science Workshop, which will be held June 4-6 in Lausanne, Switzerland. The workshop will bring together researchers from the academic disciplines of data science, including signal processing, statistics, machine learning, data mining, and computer science, along with industry experts from fields such as personalized health and medicine, earth and environmental science, applied physics, finance and economics, and intelligent manufacturing. Stodden will give the keynote, "Reproducibility and Generalizability in Data-enabled Discovery." Abstract: As computation becomes central to scientific research and discovery – bringing us the field of Data Science – new questions arise regarding the implementation, dissemination, and evaluation of methods that underlie scientific claims. I present a framework for conceptualizing the affordances that support Data Science including computational reproducibility, transparency, and generalizability of findings. For example, reproducibility in computational research can be interpreted most narrowly as a simple trace of computational steps that generate scientific findings, and most expansively as an entirely independent implementation of an experiment that tests the same hypothesis as previously published work. Standards for determining a scientific finding are necessarily adapting to computationally- and data-enabled research. Finally, the social context for these innovations raises important questions regarding incentives to engage in new research practices and the ethics of these practices themselves. Stodden's research addresses a wide range of topics, including standards of openness for data and code sharing, legal and policy barriers to disseminating reproducible research, robustness in replicated findings, cyberinfrastructure to enable reproducibility, and scientific publishing practices. She serves as an associate editor for reproducibility for the Journal of the American Statistical Society and serves on the National Academy of Sciences (NAS) Committee on Reproducibility and Replicability in Science and the NAS Roundtable on Data Science Postsecondary Education. At Illinois, she holds affiliate appointments at the National Center for Supercomputing Applications (NSCA), College of Law, Department of Statistics, and Department of Computer Science. Stodden earned both her PhD in statistics and her law degree from Stanford University.
0.6848
FineWeb
Advanced Fluid and Gas Simulation solutions from SIMULIA What is Computational Fluid Dynamics? Computational fluid dynamics (CFD) assists designers in anticipating and measuring how a gas or liquid flows, as well as how the gas or liquid affects other equipment as it passes through each application. In manufacturing, computational fluid dynamics measures the velocity, pressure, temperature, and density of moving fluids. SIMULIA’s Computational Fluid Dynamics Simulation Software SIMULIA's Computational Fluid Dynamics (CFD) simulation capabilities enable our clients to engineer products with precise real-world performance forecasts and quick turnaround times. SIMULIA's Fluids technologies enable businesses to address a wide range of problems across industries and application use cases. To name a few, we can help customers with eVTOL flight and community noise testing, as well as improving racing car aerodynamics designs for optimal performance and certifying vehicle designs for WLTP fuel efficiency rules. TriMech CFD Solution Learn how the 3DEXPERIENCE Platform allows engineers to evaluate their designs PowerFLOW and XFlow Solutions SIMULIA Fluids Simulation is powered by two complimentary technologies that deliver scalable fluids simulation to clients for a wide range of real-world applications. PowerFLOW CFD solution performs simulations that accurately predict real-world conditions. PowerFLOW imports fully complex model geometry and accurately and efficiently performs aerodynamic, aeroacoustics, and thermal management simulations, this allows engineers to evaluate product performance early in the design process before any physical prototypes are created — when the impact of change is most significant for design and budgets. XFlow is a particle-based Lattice Boltzmann technology solver for high fidelity Computational Fluid Dynamics (CFD) applications. For lubrication workflows like gearboxes and electric motor drives, XFlow delivers multiphase and moving parts modeling capabilities. Together PowerFLOW and XFlow offer a world class Lattice Boltzmann method (LBM) technology for high fidelity simulations that accurately predict real world performance. Fluid Dynamics Engineer Fluid Dynamics Engineer on the 3DEXPERIENCE platform enables multi-scale multi-physical vision by integrating CFD into design, simulation, optimization, data management, and business intelligence applications. Furthermore, a Plastics Injection Molding application allows for the early validation and optimization of plastic part and mold tooling designs. SIMULIA 3DEXPERIENCE Fluids Solver Technology On the 3DEXPERIENCE platform, fluid simulation methods can be defined, stored, replayed, and maintained allowing customers to develop and centralize on their own best-practices to increase quality, reliability, and efficiency. The physical space to be simulated is divided into many small sub-domains called control volumes or cells. The Navier-Stokes equations, a set of continuum equations that describe fluid motion, are discretized by the finite volume method. Iteratively solving the resulting set of algebraic equations yields the pressure, velocity, temperature (and other physical quantities) in each cell for steady or unsteady flows. Other physical phenomena such as turbulence and chemical species can be represented using discretized transport equations in the same way. Lattice Boltzmann method The Lattice Boltzmann method, which is based on a discrete form of the kinetic theory of gases, tracks the microscopic motion of fluid particles through discrete space and time to simulate the flow of gases and liquids. The fluid space is automatically discretized into cubic voxels and the boundaries into surfels, removing the need for traditional surface and volume grid generation. The Very Large Eddy Scale (VLES) turbulence modeling approach ensures high fidelity capture of anisotropic fluid structures, which is critical for aerodynamics and aeroacoustics workflows. Computational Fluid Dynamics (CFD) Software from TriMech Predict real-world conditions through our PowerFLOW CFD, powered by unique, inherently transient Lattice Boltzmann-based physics to accelerate product development. Engineers and analysts may use SIMULIA FEA, CFD simulation software to help reveal the environment we live in thanks to the 3DEXPERIENCE platform. Learn about the high-fidelity Computational Fluid Dynamics (CFD) program XFlow, powered by Dassault Systemes SIMULIA and based on the Lattice-Boltzmann Method (LBM). Computational Fluid Dynamics (CFD) Content Learn more about Computational Fluid Dynamics (CFD) solutions with our resource content:
0.8799
FineWeb
Trees are a big part of what makes living in Edmond special. They save energy by shading our homes, provide habitat for wild creatures, help clean our air, and beautify our neighborhoods. Unfortunately, trees are also the leading cause of storm-related power outages in Edmond's service area. High winds, ice, and heavy snow can all send branches or entire trees crashing into power lines. The lines slap together or fall to the ground and suddenly you're out of power. Sometimes, it doesn't even take a storm; falling limbs from sick or poorly maintained trees can lead to an outage. While Edmond Electric maintains a rigorous tree-maintenance program for trees along power line right-of-ways, a majority of tree-related outages are caused by trees growing outside of the right-of-way. You can help prevent tree-related outages by following the "right tree, right place" guidelines when planting and keeping all of your trees pruned properly.
0.626
FineWeb
Students are admitted to the degree program based upon their musicality and musical literacy rather than on performance accomplishments. Musical background and proficiency in an applied instrument/voice will determine placement within the department. Concentrations are available in a performance area (instrument or voice), theory or history. 64 credit hours, including 54 credit hours, as follows: Music Courses, 37 credit hours: - MUSC 200 - Theory I (3) - MUSC 201 - Sightsinging and Dictation I (1) - MUSC 202 - Theory II (3) - MUSC 203 - Sightsinging and Dictation II (1) - MUSC 210 - Music History I (3) - MUSC 211 - Music History II (3) - MUSC 300 - Theory III (3) - MUSC 301 - Sightsinging and Dictation III (1) - MUSC 302 - Theory IV (3) - MUSC 303 - Sightsinging and Dictation IV (1) - MUSC 304 - Producing Electronic Music I (3) - MUSC 310 - Music History III: Seminar (3) - MUSC 400 - Form and Analysis (3) - MUSC 401 - Orchestration Arranging (3) - MUSC 420 - Conducting I (3) Applied Music, 8 credit hours: - MUSC 278-299 Large Ensembles, 8 credit hours (semesters): - MUSC 259-261 and/or an instrumental ensemble MUSC 265 or MUSC 270 Small Ensemble: 1 credit hour: - MUSC 263 - Edgecliff Vocal Ensemble - MUSC 264 - MUSC 267 - Percussion Ensemble - MUSC 268 - Guitar Ensemble - MUSC 269 - Chamber Music Ensemble - MUSC 271 - Jazz Ensemble - MUSC 273 - MUSC 277 - Piano Ensemble - MUSC 340 - Music Production Workshop - Pass applied music examination at the end of each semester. - Pass eight jury exams. - Pass a piano proficiency examination before graduation. - Present a recital or write a thesis in major area of concentration during the senior year. - Recital attendance (minimum of 40 recitals). - A 2.000 cumulative average must be attained in these music courses. TOTAL Minimum Hours Required for Degree: 120 Semester Hours
0.6223
FineWeb
If both melatopes lie in the field of view, an optic axis figure can be treated as an off centered acute bisectrix figure and the optic sign can be determined using the method outlined previously. If only a single melatope is visible, when the interference figure is obtained, then it can be considered to be half of a Bxa figure. With a single melatope the convex side of the isogyre will point towards the location of the acute bisectrix, when the trace of the optic plane is oriented in 45° position. The isogyre will be curved in this position and the degree of curvature is a direct reflection of the amount of the corresponding 2V angle. If 2V = 90°, the degree of curvature is difficult to determine. The isogyre appears as a straight line parallel to the crosshair when the grain is at extinction. It may be confused with an off-centred uniaxial optic axis figure, however when the stage is rotated the biaxial interference figure isogyre will also rotate while the unixial figure isogyre will move parallel to the crosshairs. In this case the mineral is optically neutral and the sign is neither positive nor negative, and with 2V for the mineral = 90°.
0.8023
FineWeb
Overview of the Long-Term Care Partnership Program GAO-05-1021R: Published: Sep 9, 2005. Publicly Released: Oct 11, 2005. In 2003, the most recent year for which data are available, national spending on long-term care totaled $183 billion, and nearly half of that was paid for by the Medicaid program, the joint federal-state health care financing program that covers basic health and long-term care services for certain low-income individuals. Private insurance paid a small portion of long-term care expenditures--about $16 billion or 9 percent in 2003. With the aging of the baby boom generation, long-term care expenditures are anticipated to increase sharply in coming decades. The projected spending on long-term care presents a looming fiscal challenge for federal and state governments. As a result, some policymakers are looking for ways to reduce the proportion of long-term care spending financed by Medicaid and promote private insurance as a larger funding source. The Long-Term Care Partnership Program is a public-private partnership between states and private insurance companies, designed to reduce Medicaid expenditures by delaying or eliminating the need for some people to rely on Medicaid to pay for long-term care services. Individuals, who buy select private long-term care insurance policies that are designated by a state as partnership policies and eventually need long-term care services, first rely on benefits from their private long-term care insurance policy to cover long-term care costs before they access Medicaid. To qualify for Medicaid, applicants must meet certain eligibility requirements, including income and asset requirements. Traditionally, applicants cannot have assets that exceed certain thresholds and must "spend down" or deplete as much of their assets as is required to meet financial eligibility thresholds. To encourage the purchase of private partnership policies, long-term care insurance policyholders are allowed to protect some or all of their assets from Medicaid spend-down requirements during the eligibility determination process, but they still must meet income requirements. Congress asked that we provide summary information about the Long-Term Care Partnership Program. We examined the demographics of program participants, the types of policies purchased, and the benefits accessed by policyholders. This letter formally conveys our findings. The average age of partnership policyholders at the time of purchase ranged from 58 to 63 in Connecticut, Indiana, and New York. The median age of partnership policyholders in California was 60. Most partnership policyholders were female, married, and purchasing long-term care insurance for the first time. In California and Connecticut surveys of persons who purchased a partnership policy, most policyholders reported being in good or very good health. In the three states that surveyed a sample of partnership policyholders--California, Connecticut, and Indiana--the majority of policyholders in each of these states reported that their total assets were greater than $350,000. About half or more of the policyholders in each of these three states also reported average monthly household incomes of greater than $5,000. In 2004, the number of partnership policies purchased ranged from about 4,000 in Indiana to nearly 10,000 in California. The number of partnership policies purchased each year has increased significantly since the programs began in the early 1990s, though there has been a decline or leveling off in the number of policies purchased in recent years. The amount of coverage purchased by partnership policyholders varies across the four states. The average daily benefit amount for nursing home care in Connecticut was approximately $188 per day. The most common daily benefit amounts purchased for nursing home care in Indiana were $110 and $120 per day. Average premiums for partnership policies differ across states and are based on age and benefits purchased. Less than 1 percent of active partnership policyholders are currently accessing their long-term care insurance benefits. Since the programs began, 251 policyholders in all four states have exhausted their long-term care insurance benefits. Of those 251 policyholders, 119 (47 percent) have accessed Medicaid. The remaining 53 percent have not accessed Medicaid. According to interviews with state officials, this may be because they are spending down income or unprotected assets, their health has improved, or their families provide informal care. More policyholders have died while receiving long-term care insurance benefits (899 policyholders) than have exhausted their long-term care insurance benefits (251 policyholders), which could suggest that the Long-Term Care Partnership Program may be succeeding in eliminating some participants' need to access Medicaid. However, it is difficult to determine whether and to what extent the Long-Term Care Partnership Program has resulted in cost savings to the Medicaid program because there are insufficient data to determine if those individuals who have purchased partnership policies would have accessed Medicaid had they not purchased long-term care insurance benefits.
0.5526
FineWeb
Home » Posts tagged 'fuel trucks' Tag Archives: fuel trucks - Jet Fuel Hoax: Important Information for Air Travelers - Questions For NASA Fanboys: Exposing the Hoax and Fraud that is NASA - Stoneman Douglas False Flag Inquiry: Shomrim, Chabad and DNP. When the unspeakable becomes Unspeakable. Could it Lead to 5G PATSCAN Microwave Technology in all Florida Schools and Nationwide? - SCORPIO, the INFLUENCE OF SUN ON VIBRATION OF BLOOD AT BIRTH, and the analysis of synthesis of CALCIUM SULPH - GEMINI the Esoteric Analysis and synthesis of Potassium Chloride (Kali Mur) - Trichocereus Potency: A basic guide for getting the most out of San Pedro - Blushwood: The Endangered Australian Native Cancer Killer - Curing Cancer by Nutrition, Mineral Cell Salts, Detox and Energy: Alternative Treatment Options to Chemotherapy - Pin the Tail on the Donkey: The Problem with Modern Political Revolution - I WAS ONCE A SHEEPLE TOO
0.6763
FineWeb
It is now time to start thinking about capital structure. Therefore, let's make some financing assumptions near the top of our model. We will add current interest rates (which can be obtained from Bloomberg, for example), a switch to either assume or refinance the target's debt, the minimum cash balance for the company, the size of the revolver (i.e. total bank commitment), and a switch that lets us choose from several financing scenarios that we will create in a subsequent step. The minimum cash balance you select is somewhat arbitrary, and is a function of sales, industry, and other unquantifiable factors. For example, some business activities are cash-intensive, while others are not. Minimum cash balances might range anywhere from 2% to 10% of sales. Company management will have a pretty good idea of what figure to use, as might more senior investment bankers. In any case, don't lose any sleep over this number. The revolver assumption is somewhat arbitrary as well, but should be large enough so that the revolver is not overdrawn and your cash balance never falls below your specified minimum (or zero, which is, of course, impossible). In fact, we'll design this model to prevent you from going below your minimum cash balance and, instead, violate your revolver limit and generate error messages. If, when building your model, you find that your revolver assumption is too small, simply assume a larger number. Of course, there is a limit to how much a bank will commit to lending a given company; leveraged finance bankers can help you put a cap on this number. We have named most of these cells (using Alt>i>n>d) as doing so makes their use throughout the model easier to understand.comments powered by Disqus
0.6812
FineWeb
She with her fiery red curls, tears staining her porcelain, ivory face and a hardened resolve, sat on the Ice Throne. With a gentle wave of hand, the loyal guards in her palace blew into long horns. Thunderous echo howled through the never-ending corridors. She had ordered the gates of her kingdom to be closed forever. Shut off from the outside world, allowing on one to ever enter. The sun had set forever in her world. The world which she had ruled for so long that she no longer recalled when it all began. Once the sun was gone, it was eternal night, eternal cold, eternal snow. They had broken her heart and broken her. They had deceived her and led her out into the sun, into the light, into a made-believe joy and a mirage called solidarity. They, with their hypocritical friendships and fake concerns, were like a thousand knives that had stabbed her in the back. The anguish was immense. From flesh and blood, she slowly morphed into a creature beyond recognition. With life and energy sapped from her, her once-glorious locks became blue, then white, then red, and her complexion developed a darkened aura. Her eyes once bright with hope, now smouldered with rage and drowned in sorrow and regret. That once-beating heart became glass, then stone. As the last tear slid down her face, she whispered, “This world is a lie. It steals from us the joy and hope, leaving us to look in despair, with a languor and nonchalance that one could never recover from.”
0.9873
FineWeb
- The player cannot (de)select pay ways. - The multiplier of 30 is applied to every coin staked. - 20 coins at most can be staked for every spin; - In case of technical difficulties, the games are cancelled. - Regular winnings are determined by multiplying the amount won with the amount staked on each payline. - Scattered winning are determined by multiplying the type of winning string with the amount staked as a regular bet. - Coins covert to credits using the formula: amount of coins x size of the coins = credits. - All symbols pay left-right on the payline, but for the scattered one. - If a player gets more than one winning string with different symbols on each payline, then he receives all of the winnings. If the winnings are of the same symbol, then he receives the winning string that’s worth the most. - If there are 2+ winning strings on different paylines, a player will be paid for every string. Features Of Bridezilla - This is a scattered symbol which forms the winning string once 3+ of them are spread across the reels. 3+ of them also trigger an additional bonus game, called Bridezilla. - It cannot be replaced by the wild symbol. - This is a wild symbol, used to replace others in order to form the winning string. It cannot replace the scattered symbol nor can it form the winning string on its own. - This feature is triggered when 3+ bells are found scattered across the reels. The player is then rewarded with 20 additional spins free of charge at most throughout a x10 multiplier maximum can be won. How many free spins a player gets depends on the amount of bell symbols found in the triggering string. If no winning from the free spin, then Bridezilla gets triggered randomly. Bridezilla rewards the player with extra prizes in case it is combined with: 1. a bouquet and car, rewarding the player with x1 multiplier for every shown symbol; 2. cake brings a x2 multiplier; 3. church can increase the Bridezilla multiplier for 10, 4. groom rewards the player with an extra spin. - Bridezilla acts as the wild multiplier, the value of which varies by other symbols. - It cannot be used to replace the scattered symbol. - The betting and pay ways that applied to the triggering spin apply here as well.
0.9881
FineWeb
Trilobites and brachiopods are the two main fossil groups that allowed construction of the first palaeogeographical maps for the early Palaeozoic. Together with the bivalves and ostracodes, the benthic elements of these fossil groups have proved to be of great palaeobiogeographical importance. For this reason, these groups are usually considered to be ‘better’ fossils for inferring Ordovician palaeogeography. The present study indicates that planktic and nektic fossil groups should not be neglected in such palaeobiogeographical studies. The plotting on a palaeogeographical reconstruction for the Arenig (Lower Ordovician, – 480 Ma) of some planktic (acritarchs, chitinozoans) and nektic (vertebrates, pelagic trilobites) fossil groups indicates that their distribution appears in part surprisingly similar to that of the benthic trilobite faunas that are considered to display the greatest provincialism. For example, the distribution of the ‘peri-Gondwanan’ acritarch province including Arbusculidium filamentosum, Coryphidium and Striatotheca, and the distribution of the Eremochitina brevis chitinozoan assemblage are almost identical to the palaeogeographical distribution of the Calymenacean-Dalmanitacean trilobite fauna. A review of the different planktic and nektic fossil groups also indicates that it is very important to carefully select ‘good’ palaeogeographical indicators, in most cases from a large number of taxa. It appears that almost all fossil groups include some ‘good’ palaeobiogeographical ‘markers’. Therefore it is important to search for ‘better’ taxa within each fossil group, instead of looking only for the ‘better’ fossil groups as a whole.
0.8646
FineWeb
Not getting treatment for attention deficit hyperactivity disorder (ADHD) can affect more than just a child’s ability to sit still. In some cases, it can have long-term effects on things such as substance abuse, driving ability, and eating habits. “An interesting thing happens when people are considering whether or not to treat ADHD,” says Ari Tuckman, psychologist and author of “More Attention, Less Deficit: Success Strategies for Adults with ADHD.” “They will often focus on the potential risks and side effects but ignore the potential benefits. In other words, they ignore the risks and side effects of not treating ADHD.” In many cases, the risks of not treating ADHD outweigh the potential side effects of stimulant medications, which can include loss of appetite, potential slowing of growth in childhood, and increased blood pressure or heart rate. “For kids, [not treating ADHD carries] all the risks that parents worry about,” explains Tuckman. “Doing badly in school, having social struggles, greater substance use, more car accidents, less likely to attend and then graduate college. For adults, untreated ADHD also affects job performance and lifetime earnings, marital satisfaction, and likelihood of divorce.” That’s because untreated kids sometimes don’t learn impulse control, emotional regulation, and social skills. As adults, they can sometimes fall behind the curve and don’t always catch up. Children who receive ADHD treatment can slow down and focus enough to participate in therapy and learn critical skills and coping strategies to manage ADHD into adulthood. Potential Risks of Not Treating ADHD Studies have recognized a number of potential problems that can develop out of untreated ADHD. One is substance abuse. Stimulant medication commonly used to treat ADHD is a controlled substance, which indicates a possibility of addiction. However, in the doses prescribed for ADHD, these stimulants are not addictive. Studies have actually shown that individuals with untreated ADHD are more prone to use and abuse alcohol and illegal drugs. In a 2003 study published in The Journal of Clinical Psychiatry, the author noted, “Findings included confirmation that, in fact, stimulant therapy protected medicated ADHD patients against substance use disorder, which occurred at rates that were 3 to 4 times greater among people with untreated ADHD.” Another potential risk is criminal activity. Studies have shown about 25 percent of individuals behind bars in the United States have ADHD. Experts mainly contribute this fact to impulsivity and poor self-regulation, two symptoms that can be improved with ADHD treatment. Researchers compared rates of antidepressant and stimulant prescriptions to the rate of violent crimes in the United States from 1997 to 2004. They said that as rates of antidepressant and stimulant use rose, the rate of violent crime dropped. Driving abilities can also be affected. Linda Roggli, founder of the ADDiva Network, knows all too well the dangers of driving with untreated ADHD. She learned the hard way when she rushed out the door forgetting to take her ADHD medication one morning. The panic of brushing one car against the other in her garage created enough cognitive confusion to lead her to use the wrong pedal and cause $12,000 worth of damage. “Driving is a complex task,” explains Roggli, “involving paying attention to the road, the people and cars on either side, planning ahead to turn off on the correct exit, and changing lanes. All of which are impacted by my distractibility.” Eating, Studying, and Job Performance Are Also Affected Another potential risk of untreated ADHD is binge eating. A study published last month in the International Journal of Eating Disorders found children with ADHD are 12 times more likely to have loss of control eating syndrome (LOC-ES) than kids without ADHD. The researchers found that the worse a child’s impulse control, the more likely they were to have LOC-ES. Untreated ADHD also impacts academic achievement. Academics affect more than grades on a report card. Job performance is another issue. Individuals with ADHD have increased difficulty getting jobs and keeping them. As well, they make $8,900 to $15,400 per year less than non-ADHD workers. Adults with ADHD were less likely to be currently employed (52% vs. 72%), and had more job changes over a 10-year period (5.4 vs. 3.4 jobs). Poor time management and organizational skills can also lead to poor workplace performance. Treated or not, experts say it’s crucial for people with ADHD to seek careers that play to their strengths. Finally, there’s divorce. Adults with untreated ADHD are nearly twice as likely to get separated or divorced from their spouses. According to Melissa Orlov in her book, “The ADHD Effect on Marriage,” untreated ADHD can cause an unsuccessful parent-child relationship between partners. “[It] can translate into a lot of extra work for a non-ADHD spouse,” Orlov wrote. “If workload distribution inequities aren’t addressed, the resentment and feelings of ‘being a slave’ that the non-ADHD partner often feels can result in divorce.” Determining the Problem First Both Tuckman and Roggli say treatment for ADHD adults is essential if ADHD is impacting one’s ability to function well in life, but it all starts with diagnosis. “When you know what you're dealing with you can actually change the trajectory of your life, in all areas,” says Roggli. Tuckman added one final thought: “There is a price paid in additional suffering from withholding a treatment that research shows is beneficial.” A self-described "veteran" parent of a son with ADHD, Penny Williams is an award-winning blogger and author of the Amazon best seller, "Boy Without Instructions: Surviving the Learning Curve of Parenting a Child with ADHD." Her second book, "What to Expect When You're Not Expecting ADHD," is now available.
0.5104
FineWeb
Scientists at the UK’s National Physical Laboratory are concerned after they discovered that the Earth is spinning faster than usual which is making days shorter. June 29, 2022 was the shortest day ever recorded, with the Earth’s full rotation taking 24 hours minus 1.59 milliseconds. BYPASS THE CENSORS Sign up to get unfiltered news delivered straight to your inbox. Scientists warn that the effects could be devastating. There would be drastic changes to the time and date on computer systems if the irregularity continues and that we may need to remove a second from our clocks. According to astrophysicist Graham Jones if the Earth’s fast rotation continues, it could lead to a “negative leap second which could create problems for IT systems He said “If Earth’s fast rotation continues, it could lead to the introduction of the first-ever negative leap second. This would be required to keep civil time — which is based on the super-steady beat of atomic clocks — in step with solar time, which is based on the movement of the sun across the sky. A negative leap second would mean that our clocks skip one second, which could potentially create problems for IT systems.” Premier Daily reports: In general, the Earth’s speed fluctuates over long periods of time, taking a couple of milliseconds or so longer or shorter for one rotation. Still, the length of a day is determined by how long it takes for Earth to spin completely on its axis, which takes 86,400 seconds or better known as 24 hours. Until a few years ago, in fact, many believed the Earth was slowing its rotation. The International Earth Rotation and Reference Systems Service (IERS) even started adding sporadic leap seconds to make up for the slowed pace. But the last leap second occurred on December 31, 2016. While the Earth might be slowing down overall, it has certainly picked up speed over the last few years. In 2020, there were 28 shortest days recorded since the 1960s, when timing using atomics clocks started. The shortest day in 2020 was July 19 with negative 1.47 milliseconds. In 2021, the Earth still turned quickly but the shortest day of the year was still longer than the ones in 2020. But in 2022, June 29 set the record for the new shortest day at negative 1.59 milliseconds. And that record was almost beaten on July 26, with the length of the day coming to negative 1.50 milliseconds. What is making the Earth spin faster? Well, scientists do not know, and neither can they make confident predictions on how long days will be next year, but there are some theories. One involves the melting of the glaciers that could be reducing the weight on the north and south poles. Another attributes it to motions in the Earth’s inner molten core. One involves seismic activity, and yet another involves gravity from the moon. But Leonid Zotov, a professor of mathematics, popularized the theory that the Earth is spinning faster due to the “Chandler wobble.” This wobble was first discovered in the 1880s by astronomer Seth Carlo Chandler, who noticed the poles wobbled over 14 months. This periodic movement slowed down in the 2000s, disappearing between 2017 to 2020. However, Zotov’s theory has yet to be peer-reviewed. Latest posts by Niamh Harris (see all) - Former Russian President Says Western ‘Idiots’ Want World War III - October 3, 2023 - Researchers Develop Vaccines That Deliver mRNA Directly Into Body Without Using Needles - October 3, 2023 - UK To Ban Trans Women From Female Hospital Wards - October 3, 2023
0.814
FineWeb
SACO’s Buttermilk Oat-Bran Pancakes Serves: 16 pancakes - 1 cup SACO Mix’n Drink Instant Skim Milk - ½ cup SACO Cultured Buttermilk Blend - 1 cup self-rising flour - 2 cups bran cereal - 1 Tbsp baking powder - 3 Tbsp granulated sugar - 6 egg whites - 3 cups water - 6 Tbsp vegetable oil Non-stick cooking spray - In large mixing bowl combine all dry ingredients. - Add beaten egg, water and oil. - Beat until batter is smooth. - Do not overbeat. - Coat cool griddle with non-stick cooking spray. - Drop batter by tablespoonful onto hot griddle and cook until top is full of tiny bubbles and the underside is brown. - Turn and brown on other side. - Note: Pancakes freeze well. - Wrap well before freezing. - Unwrap to warm in microwave oven, or let thaw at room temperature and warm for three minutes in a standard oven at 350°. - Serve with low-calorie syrup or fresh fruit puree. Nutrition InformationCalories: 134 Fat: 6g Saturated fat: 1g Trans fat: 0g Carbohydrates: 17g Sugar: 7g Sodium: 271mg Fiber: 2g Protein: 6g Cholesterol: 3mg
0.6872
FineWeb
This pedal it’s a C++ DSP FX unit made with a Raspberry PI. It’s been originally built and made by Electrosmash It takes the input signal from a guitar (bass it’s also supported if you swap one of the capacitor so it can process lower frequencies), samples it in realtime and feeds it to a C++ script, which outputs a modified signal (the outcome is based on the script) It has a limited processing power/sampling rate (the PI is limited to 40KHz) so it’s mainly a tool used to understand how to write and apply DSP techniques to a realtime audio signal Here’s the code for base clean effect (clean.c) – a sample script that just copies the signal from the input to the output buffer Using the clean effect as a base, it’s possible to create complex effects and audio processing.
0.6888
FineWeb
Is an inert substance that is added in tablet formula intended to create a tablet weight as expected. Usually tablets containing the active substance with a small dose requires a lot of filler material. If the tablet has big dose of active substance, the filler slightly or not at all. 1. Avicel (Microcrystalline Cellulose) • Avicel 103 has the advantage compared with 101, 102 because of small specific volume, better flow and a shorter disintegration time. • Insoluble, non-reactive, the flow is not good, hold 50% capacity. • Generate a hard tablet with a small pressure (compressibility good) and low friability tablets, long-time stability. • Generate a fast wetting and thus distribute the liquid evenly to the entire mass of powder; produce drug distribution and a uniform color. • Acting as an auxiliary binding, resulting in a hard granules with minimal fines. • Can be act as dry binder, disintegrant, lubricant and glidan. • Its use requires a lubricant; its use can be combined with lactose, mannitol, starch, calcium sulfate. • Helps overcome substances that if overwetting (too wet) to something like "clay" is difficult and when dry granulated , the granule becomes hard and resistant to disintegration. Example: kaolin, calcium carbonate. • Avicel in wet granulation improve ties in the compression, reducing the capping and friability of tablets. • Avicel assist with water-soluble drugs for homogeneous, preventing migration of water soluble dyes and helps for quick evaporation and uniform. • For drugs with small doses, Avicel used as a filler and binder addition. • 60% Avicel PH 101 and 40% amylum as 10% starch as a paste made easy moist granulated mass, forming a strong granules on drying with less fine than that just paste made from starch. • Form PH 101: powder, PH 102: granule, PH 103: powder - It is a very good disintegrant, especially at concentrations of 10% or higher. - In wet granulation method, Avicel don’t have disintegrant properties. - Attention: at high concentrations, Avicel can cause sticky on the tongue. 2. Calcium sulfate trihydrate • Used as a filler for granulation with the amount of active ingredient 20-30%. - Synonym: terra alba, snow white filler. - Insoluble, non-hygroscopic. - The higher the grade, increasingly white, most inexpensive filler, the active substance can be used for acidic, neutral, alkaline, have high absorban capacity for oil. - Binder suggested: PVP, Croscarmellose, starch paste. 3. Calcium phosphate dibasic • Used as a filler and binder for direct compression with the smallest in size, not expensive, can not be used with acid compounds or acid salt • If you use a liquid binder that is too much then so sticky and hard, can not be granulated so that the solution combined with the starch / Avicel • Incompatible with: highly alkaline compound, ascorbic acid, salicylamide, pyrilamine maleate, phenilephrine HCl • lactose hydrate granules contain 4-5% moisture content • Lactose is the reductor sugar, reacts with amines to produce Maillard reaction • Isomers: α and β (in the mixture are in equilibrium both forms) • The most common filler, there are 2 forms: hydrated and anhydrous • Rarely reacts with the drug (hydrated and anhydrous) • For wet granulation use lactose hydrate. Anhydrous lactose did not experience Maillard reaction (with an active substance containing amines in the presence of metal stearate), but it absorbs moisture. • In general, tablets show a good release rate, the granule quick to dry, disintegration of the tablets are not much affected by hardness. • Disadvantages : lactose can change color in the presence of alkaline amines and Mg-stearate • Known 4 kinds of forms: coarse granules (60-80 mesh), fine granules (80-100 mesh), spray dried granules (100-200 mesh), and anhydrous lactose • Known as sugar milk. • use as filler for direct compression, usually combined with Avicel. If it’s singular, used in a concentration of 40-50% as the carrier • The nature of its direct compression is reduced if the water content <3%, can be mixed with 20-25% active substance without losing its properties of direct compression • The capacity to hold the active substance 20-25%; have good flow and binding characteristics of lactose better than usual • Disadvantages : can be blackened with a moist, amen, or other compounds containing furaldehid • Use a neutral or acid lubricant • Can act as filler or binder • If used as sole binder, sucrose form hard granules and tablets were more likely be dissolved than disintegrated. Therefore, many in combination with other insoluble fillers • If used as dry filler, usually granulated with water-soluble binder or hydroalcohol. Granules hardness depend on the amount of binder used. The mixture of water and alcohol will produce a softer granules. • It has many forms, most commonly used form of "confectioner" for wet granulation containing 3% corn starch to prevent caking • Sucrose is used as a sweetener in chewable tablet and is used as a binder to improve tablet hardness • Disadvantages : tablets made with the composition of most of the sucrose will harden in storage. Sucrose rather than reducing sugars but become brown on storage and hygroscopic • Derivatives of sucrose that can be used for direct compression: a. Sugartab: 90-93% sucrose, 7-10% invert sugar b. In the Pac: 97% sucrose, 3% modified dextrins c. Nu Tab: 95% sucrose, 4% invert sugar, 1% corn starch, magnesium stearate • Its application limited to wet granulation as filler and binder • Used similar to sucrose, which tends to produce hard tablets, especially if using dextrose anhydrous • To become brown on storage • Good filler for chewable tablet because it’s taste good, slightly sweet, smooth, cool (negative heat solution) • Non-hygroscopic, the flow is poor, needs more liquid binder • Can be used for formulation of vitamins, produce finer granules than sucrose or dextrose • Levels of moist granules are made from sucrose, dextrose, and mannitol after drying overnight at 140-150 0F is 0.2% • Only a few absorbed in the gastrointestinal tract, if used a lot to be laxative 8. Emdex and Celutab • Can react with amines at high temperature and high humidity • Free flowing and can be compressed directly, containing 8-10% moisture, tablet hardness can be increased after compression • Hydrolyzed starch containing 90-92% dextrose and 3-5% maltose • Can be used as a substitute for mannitol in the chewable tablet as sweet and smooth taste. 9. Starch 1500
0.5173
FineWeb
| [Download PDF] |Year : 2004 | Volume | Issue : 3 | Page : 104--108 Why is high grade squamous intraepithelial neoplasia under-diagnosed on cytology in a quarter of cases? Analysis of smear characteristics in discrepant cases Sanjay Gupta, P Sodhani Division of Cytopatholgy, Institute of Cytology and Preventive Oncology (ICMR), I-7, Sector 39, Noida, India Division of Cytopatholgy, Institute of Cytology and Preventive Oncology (ICMR), I-7, Sector 39, Noida BACKGROUND : The accuracy of cervical cytology has been quwstioned due to high false negative rate. In order to improve the sensitivity of cytology it is prudent to analyze the factors which hamper with the diagnosis of high grade lesions. AIMS : To study the cyto-histologic agreement in High grade squamous intraepithelial lesions (HSIL) of uterine cervix and to analyze the smear characteristics in discrepant cases. SETTINGS AND DESIGN : Cervical smears of 100 histology proven cases of Cervical intraepithelial neoplasia III ( CIN III ) were retrieved and reviewed to study cyto-histologic agreement in the diagnosis of high grade lesions.. The discrepant smears, undercalled on cytology, were further analyzed to determine the reasons for misinterpretations. Statistical analysis was performed to find out any significant factors for discrepancies. RESULTS : Cytology was able to correctly identify 74 HSILs while in 26 cases a diagnosis of Low grade squamous intraepithelial lesions (LSIL) or below was given. On review, 16 of these non correlating cases could be reclassified as HSIL on cytology while in 10 the diagnosis of LSIL or less persisted. 12/16 (75%) discrepant cases, reclassified as HSIL represented interpretive errors. Sampling errors (7/10) and air drying (5/10) were more frequent in under diagnosed cases. The statistical analysis did not yield any significant differences in the two review groups. CONCLUSION : 26% of HSIL cases were underdiagnosed on cervical smears. The major confounding factors responsible for under interpretation on cytology included air drying artifacts and metaplastic maturation of abnormal cells. |How to cite this article:| Gupta S, Sodhani P. Why is high grade squamous intraepithelial neoplasia under-diagnosed on cytology in a quarter of cases? Analysis of smear characteristics in discrepant cases.Indian J Cancer 2004;41:104-108 |How to cite this URL:| Gupta S, Sodhani P. Why is high grade squamous intraepithelial neoplasia under-diagnosed on cytology in a quarter of cases? Analysis of smear characteristics in discrepant cases. Indian J Cancer [serial online] 2004 [cited 2019 Aug 24 ];41:104-108 Available from: http://www.indianjcancer.com/text.asp?2004/41/3/104/12677 Despite the undoubted utility of cervical cytology screening in prevention of cervical cancer, it is well accepted that some significant lesions would be missed or underdiagnosed on Papanicolaou test due to inherent limitations of cytology in terms of sensitivity, specificity and predictive value.,,,, However, in resource poor settings where facilities of colposcopy are limited or non existent, cytology is the preferred method of screening. It is therefore essential to maintain strict quality control to improve the sensitivity of cytology and reduce the false negative results. Cyto -histologic correlation is one of the accepted methods of internal quality assurance which allows the pathologists to analyze the various factors leading to discrepant diagnosis., We undertook a retrospective study with the aim to assess the reliability of cytology in correctly identifying HSILs in biopsy proven cases of Cervical Intraepithelial Neoplasia III (CIN III). We also attempted to analyze the smear characteristics and other factors in discrepant cases which were diagnosed as CIN III on histology but were undercalled on cytology. Materials and Methods Cervical smears of 100 consecutive histology proven cases of CIN III, diagnosed over a four and a half year period (January1999 to July 2003), under a hospital based cervical cancer screening programme, were retrieved from the records and reviewed retrospectively. All these women had undergone colposcopic evaluation before taking the biopsy. The study was approved by the institutional review board and ethical committee. An informed consent had been taken from each subject before collecting the smears. The cervical smears were conventional and consisted of one smear in each case containing both ectocervical scraping and endocervical brush sample. The surgical pathology samples consisted of cervical punch biopsies, cones and hysterectomies). All the smears had been diagnosed according to the Bethesda 1991 system of reporting cervico-vaginal smears and the biopsies interpreted according to the CIN classification., The cervical smears signed out originally as LSIL or less were reviewed by one cytopathologist (SG) to analyze the likely reasons for cyto-histo discrepancies. The smear characteristics assessed included (a) relative number of abnormal cells present on the slide: few : 10 cell groups but not many groups many : abundant abnormal cells easily recognizable on smear (b) adequacy of smear as per the Bethesda system (c) presence of associated LSIL cells (mild dysplasia/ koilocytes) (d) overall assessment of confounding factors for the discrepancies noted. Fisher's exact test was applied to derive the significance of different parameters studied in the two review groups (HSIL versus LSIL or below) Mean age of the patients was 39.4 years (range 27-67 years) and mean interval between the cervical smear and biopsy was 4.6 months Out of 100 histology proven cases of CIN III, 74 had a cytology diagnosis of HSIL and were thus the concordant cases. The remaining 26 cases which were diagnosed as LSIL or less on cytology formed the discrepant cases which were reviewed and further analyzed for possible reasons of underdiagnosis. The original cytological interpretation of these non correlating cases was LSIL (encompassing mild dysplasia) in 11, LSIL (encompassing Human Papilloma Virus [HPV] in 5, ASCUS - SIL (squamous intraepithelial lesion) in 6 and ASCUS -NOS (not otherwise specified) in 4 cases. On review, out of 26 non correlating cases, 16 cases could be reclassified as HSIL. These included 10 originally diagnosed LSILs (7 mild dysplasia and 3 HPV), 4 ASCUS -SIL and 2 ASCUS -NOS. The remaining 10 cases were still called as LSIL (6), ASCUS -SIL(2) and ASCUS -NOS (2) even after review. On tracing the previous records of these 10 cases, 4 were found to have an earlier Pap smear test,but in none of these, a diagnosis of HSIL had been made previously also. Various smear characteristics like the number of abnormal cells, adequacy of sample, presence of associated LSIL cells and presence of metaplastic maturation in abnormal cells were examined in the discrepant cases to find possible causes of underdiagnosis on cytology. [Table:1] Number of abnormal cells Out of a total of 26 discrepant cases, 9 had a few abnormal cells, 11 had some, while 6 had many readily discernible abnormal cells on the smears. Thus 20/26 cases had only scanty number of abnormal cells which were missed on original screening. This could have been possibly due to under representation of the lesion in these smears. On careful review of the smears, abnormal cells, representative of HSIL could be picked up in 16 cases [few in 5 [Figure:1], some in 6 and many in 5]. In the remaining 10 cases, cells indicative of HSIL were not identified even after meticulous review by the cytopathologist and this could probably be attributed to sampling errors. Adequacy of sample 15/26 (57.6 %) smears were satisfactory for evaluation while 11/26 (42.3 %) were labeled as satisfactory but limited due to various factors according to the Bethesda system. Among the discrepant cases, 11/26 (42.3 %) cases which were reclassified as HSIL were optimal for interpretation, whereas 4/10 (40%) cases which were LSIL or below were optimal. Air drying artifact was the most common reason for the suboptimal smears, being present in 8/11 (72.7 %) cases [Figure:2]. Obscuring blood / inflammation was present in 2/11 (18.1 %) of satisfactory but limited smears among discrepant cases. Endocervical component was absent in 3/11(27.2 %) of the limited smears. However, there were no significant differences between the reclassified HSIL and LSIL and below categories. Presence of atypical cells with metaplastic differentiation : In 15 /26 (57.6 %) cases abnormal cells revealed metaplastic maturation with rounder, denser cytoplasm and high nuclear/cytoplasmic ratio. Such cells were observed in 11 cases reclassified as HSIL [Figure:3] and [Figure:4] cases reclassified as LSIL and below. Presence of associated LSIL cells: 13/26 (50%) non correlating cases had prominent LSIL cells (including koilocytes) and these included 7/16 (62.5 %) cases reclassified as HSIL [Figure:4] Overall confounding factors for under interpretation: On final analysis, it was observed that 12/16 (75%) cases reclassified as HSIL represented interpretive errors; 8 had both sampling and interpretive errors while 4 (25%) had sampling errors. On the other hand, sampling errors, (7/10) and air drying (5/10) were more frequent in cases that were still called as LSIL or below, after review. Due to various well recognized inherent limitations of cervical cytology, a percentage of high grade lesions is missed/undercalled on Pap test.,,,, It is argued that in the absence of colposcopy and histology facilities in resource limited areas, these cases are likely to progress to invasive cancer. Thus in order to reduce the under reporting of HSILs on cytology, it is imperative that we analyze the smear characteristics and other confounding factors which might lead to underdiagnosis of HSIL. The present study was designed with this objective in mind. Out of 100 histology proven cases of CIN III, cytology was able to correctly identified 74 cases, while in 26 cases a diagnosis of LSIL or below was given on cytology. Other workers have reported similar results. In a study by Sodhani et al, cytohistological correlation was obtained in 77.5% of high grade lesions. Zuna et al in a retrospective review found accuracy of cytology in correctly predicting high grade lesions to be 62.7%. The non correlating cases in our study were retospectively reviewed carefully by one of the cytopathologists (SG) and an attempt made to analyze various clinical and laboratory factors responsible for discrepant results. After review, 16 /26 discordant cases were reclassified as HSIL while in 10, the diagnosis of LSIL or less still persisted.The preparatory factors which resulted in underdiagnosis of lesions included inadequate sampling and suboptimal smear preparation,especially air drying of the smears. The analytical factors included the screening and interpretive errors on the part of cytotechnologists and cytopathologists. Metaplastic differentiation of abnormal cells was responsible for many cases of HSIL being undercalled originally. Also in some cases coexistent LSIL cells with prominent koilocytotic change probably distracted the pathologist from recognition of HSIL cells. Previous studies have also reported similar difficulties in interpretation of HSIL smears.In a study by Zuna et al, on review of cytology smears of 39 discrepant cases which were histologically proven CIN III but were called LSIL or below on cytology, 28 could be reclassified as HSIL whereas11 cases did not have cells representative of high grade lesion and were categorized as sampling errors. Lyall and Duncan reported that their cases of CIN III were preceded by smears diagnosed as mild dyskaryosis in 13.8-29.3% cases per year over a five year period. Klinkhamer et al attributed the cyto-histologic discrepancy in under interpretation of HSIL cases to intraobserver variation. In a College of American Pathologists (CAP) Q - Probes study of 22,349 cervical biopsy-cytology correlations, 9.2% of HSIL biopsies were preceded by ASCUS interpretations whereas 26.5% had LSIL cytologies. Various explanations have been offered for under diagnosis of HSIL in some cases on cytology. One of the reasons may be presence of only a few abnormal cells representative of high grade lesion on the smear, and these may be missed on screening. This is particularly true of small cell lesions high in the endocervical canal. The confounding effects of excessive inflammation and obscuring blood in undercalled cases have also been cited as important reasons. Misinterpretation of cohesive tissue fragments of HSIL as immature metapalstic cells may also lead to under reporting on cytology., In our study, the major confounding factors which led to discrepant diagnoses included the suboptimal smears due to air drying artifacts and difficulty in interpretation of metaplastic differentiation of abnormal cells. Air drying was observed in 8/11 (72.7%) of limited smears and these comprised (30.7%) of non correlating smears. Though the differences between the two review groups are not statistically significant, we feel that the sample size in this study is proabably too small to draw definite conclusions. Our findings are in agreement with those of Zuna et al who have performed a detailed analysis of cervical smear charcteristics in non correlating cases of high grade lesions undercalled on cytology. They have concluded that the main confounding factors to be specimen inadequacy and lack of consistency among pathologists for interpretation of metaplastic patterns. In the present system of patient follow up in our set up, these discrepant cases undercalled on cytology,may finally be detected on colposcopy as all persistent ASCUS and above cases are referred for colposcopic evaluation. However, this entails a lot of burden of the health care system and tremendous referral load. In resource limited settings,if we wish to reduce the referral load by referring only high grade lesions for colpscopy and following up the low grade lesions by yctology alone, we must ensure efficient quality control in the cytology laboratory so that majority of high grade lesions are picked up on cytology. It is therefore imperative that the cytopathologists be aware of the difficult smear patterns and other factors which may hamper with the diagnosis of high grade lesions. Improved specimen handling to avoid drying artifacts, careful screening by the cytotechnologists and diligent reporting by the cytopathologists might help reduce to some extent the discrepancies in cytological interpretation of high grade lesions. |1||Jones BA, Novis DA. Cervical biopsy-cytology correlation: A College of American Pathologists Q- Probes study of 22439 correlations in 48 laboratories. Arch Pathol Lab Med 1996;120:523-31.| |2||Johnson EJ, Patnick J; national Co-ordinator of the NHS Cervical Screening Programme (NHSCSP). Cytopathology 2000;11:212-41.| |3||Renshaw AA. Measuring sensitivity in Gynecologic cytology. Cancer (Cancer Cytopathol) 2002;96:210-7.| |4||Sodhani P, Singh V, Das DK, Bhambhani S. Cytohistological correlation as a measure of quality assurance of a cytology laboratory. Cytopathology 1997;8:103-7.| |5||Chacho MS, Mattie ME, Schwartz PE. Cytohistologic correlation rates between conventional Papanicolaou smears and Thin Prep cervical cytology: A comparison. Cancer 2003;99:35-40.| |6||Bethesda workshop. The revised Bethesda system for reporting cervical/vaginal cytologic diagnoses: Report of the 1991 Bethesda workshop. Acta Cytol 1992;36:273-6.| |7||Kurman RI, Norris HL, Wilkinson EL. Tumors of the cervix, vagina and vulva. Washington DC: Armed Forces Institute of Pathology 1992:48-51.| |8||Zuna RE, Sienko A, Lightfoot S, Gaiser M. Cervical smear interpretations in women with a histologic diagnosis of severe dysplasia. Factors associated with discrepant interpretatations. Cancer (Cancer Cytopathol) 2002;96:218-24.| |9||Lyall H, Duncan ID. Inaccuracy of cytologic diagnosis in high-grade squamous intraepithelial lesions (CIN 3). Acta Cytol 1995;39:50-4.| |10||Klinkhamer PJJM, Voojis GP, deHaan AFL. Intraobserver and interobserver variability in the diagnosis of epithelial abnormalities in cervical smears. Acta Cyol 1988;32:794-800.| |11||DeMay R. Cytopathology of false negatives preceding cervical carcinoma. Am J Obstet Gynecol 1996;175:1110-3.| |12||Bergeron C, Debaque HM Ayivi H, Amaizo S, Fagnani E. Cervical smear histories of 585 women with biopsy-proven carcinoma in situ. Acta Cytol 1997;41:1676-80.| |13||Sherman ME, Kelly D. High grade squamous intraepithelial lesions and invasive carcinoma following the report of three negative Papanicolaou smears: Screening failures or rapid progression? Mod Pathol 1992;5:337-42.| |14||Robertson JH, Woodend B, Elliot H. Cytological changes preceding cervical cancer. J Clin Pathol 1994;47:278-9.|
0.5146
FineWeb
Interest-Driven Learning from Pittsburgh For me, one of the greatest joys of teaching is the chance to learn from other educators: the opportunity to peek under the hood at all the moving parts behind a dynamite lesson plan, a thriving classroom, an effective teacher. When I started teaching history, my more-experienced colleagues were my greatest resources. They recommended discussion questions for starting class, activities for getting my students engaged, and multimedia resources that I never would have found on my own. When I moved to Pittsburgh, I saw some especially effective educators in action through my work on the community building team at The Sprout Fund. From 2011 to 2017, Sprout served as the steward of the Remake Learning Network, a network of thousands of educators and innovators working to make the Pittsburgh region an extraordinary place for learning — both for kids and for their teachers. Networks make it possible for teachers to connect more effectively than ever: learning innovation networks like Hive in New York City and Chicago and Remake Learning in Pittsburgh have been especially effective in helping educators collaborate to design and test remarkable learning practices both in schools and in out-of-school-time environments. With the generous support of funders like the MacArthur Foundation and the Grable Foundation, dozens of collaborative Remake Learning Network projects imbued with connected learning practices have been developed over the years. A recent report celebrating the Network’s 10th year explores the impact of the people, projects, and organizations that have helped transform education in the region over the last decade. It’s notable that many Network members’ most effective, transformative educational programs are deeply rooted in interest-powered, academically oriented, and peer-supported connected learning practices. We’re excited to launch a new collection of resources that exemplify some of the best connected learning practices that have been developed in Pittsburgh over the last several years. Late last year, The Sprout Fund invited 10 Remake Learning Network organizations to develop new lesson plans inspired by their previously supported connected learning programs. These 10 projects come from 10 remarkably varied sources: three were created by public school teachers and the other seven were developed in informal learning settings, including a public library, museums, a YMCA branch, and a community makerspace. Each project is interdisciplinary: major themes include ecology, sustainability, and visual arts, but these lessons delve into intersections between art, technology, science, history, and more. There’s even content that addresses social emotional learning skills, like self-reflection activities that help students effectively transition from high school to college. Some of these lesson plans are for activities lasting an hour or a few class periods; others are intended as major projects that can unfold over several weeks or an entire school year. What’s most remarkable about this collection is that we’re not just showing you what happened here. Instead, these lesson plans were designed so you can remix and reuse them yourself. These 10 organizations reimagined their existing connected learning programs to create new lesson plans that can be used by any educator, anywhere. We hope that these materials help share and spread the remarkable learning practices happening here in Pittsburgh with educators everywhere. We hope these lesson plans become starting points for other teachers to adapt, remix, and reframe connected learning practices in their own classrooms. I invite you to explore these resources on the National Writing Project’s The Current, where you can find lesson plans and a wealth of similar resources created by other teachers steeped in connected learning practices. You can also view an episode of Connected Learning TV featuring these materials on the Educator Innovator website. Image courtesy Ben Filio for The Sprout Fund.
0.8121
FineWeb
The overall redistributive impact of taxes and transfers depends on the progressivity of each instrument, the weight of each instrument in the tax and transfer system and the overall size of the tax and transfer system. Thus, governments can exercise a certain degree of discretion about the redistributive impact of their consolidation strategies by choosing particular combinations of spending reductions and revenue increases, or by changing the progressivity and size mix of transfers and taxes. This is illustrated by the redistributive impact of two polar consolidation strategies. For both strategies it is assumed that the government targets a deficit reduction of 3% of GDP. The first strategy relies entirely on raising direct household taxes and the second on cutting cash transfers to households. The exercise is based on the size and progressivity of taxes and transfers as of the late 2000s (see Joumard et al., 2012). It is assumed that the change in taxes and transfers is proportional across all deciles in each of the two calculations and that market income is not affected. More generally, no behavioural response is considered. As the example shows (see figure below), the required tax increases reduce income inequality, measured by the Gini coefficient, in all OECD countries, although to varying degrees. Similarly, if the same consolidation outcome is to be achieved via reductions in transfers, inequality increases in all countries, to different degrees and with absolute changes in inequality usually higher than in the case of tax increases. Crosscountry differences in impacts reflect pre-existing differences in the progressivity of individual instruments and in their relative size. Any combination of changes in taxes on the one hand and transfers on the other hand would moderate the redistributive impact of consolidation in comparison with exclusive changes in either taxes or transfers, respectively. Changes in progressivity of particular instruments would also change the redistributive impact of the consolidation package. In some cases, cuts in transfers can be designed and supplemented by structural measures in a way that minimises adverse distributive impacts or even avoids them entirely, though possibly at the price of a delay in consolidation. In particular, raising the effective retirement age would be a preferential consolidation measure, as it will increase labour force participation and thus boost income for some persons who otherwise would have received a pension instead, but will produce budgetary savings only very gradually. Reform in the education and health care systems should also rank high on the policy agenda in that it can produce large consolidation gains without compromising equity or service quality. However, such reform would require meticulous programme planning and implementation to be effective and avoid disadvantaging the less well-off. Cuts in unemployment-related benefits and disability benefits would likely hit poorer people in the first place, especially if weak economic activity prevents an offsetting rise in employment. However, if designed properly and supplemented with coherent activation strategies, such adverse effects can be offset by higher employment once the economy adjusts. On the revenue side, cutting certain tax expenditures can increase both equity and economic growth and should be given high priority. Higher taxation of immovable property, which is taxed at a lower rate than other assets in most countries, appears broadly consistent with equity objectives and belongs to the tax increases that are least harmful to long-term growth. However, to be effective, additional measures might be needed that could increase near-term administrative costs, such as proper valuation of property. Raising other property taxes would be beneficial for equity, although potentially at the cost of negative growth effects. Increasing consumption taxes would be regressive from the perspective of the static income distribution, although much less so from a lifetime perspective as over their lifetime people spend more of what they earn. If increases are broadly based, little damage might be done to lifetime income equity and growth. Higher capital income taxes would be positive for equity. They can be distortive with respect to growth, but are more worth considering when capital income is taxed at a significantly lower rate than labour income. Raising labour income taxes can enhance equity in the short run, but would likely reduce growth in the long run. |Rawdanowicz, L., E. Wurzel and A. Christensen (2013), "The Equity Implications of Fiscal Consolidation", OECD Economics Department Working Papers, No. 1013, OECD Publishing. Click cover to READ OECD (2012), OECD Economic Outlook, Vol. 2012/2, OECD Publishing.
0.9418
FineWeb
This post is part of our Industry 101 Series, an ongoing campaign to provide a foundation of knowledge about our unique industry. To learn more about this campaign, please click here. 6.3 Electric Vehicle impact in the Grid Electric cars are becoming more popular every day. What is the motivation for people switching from traditional gasoline cars to electric or plug-in hybrid vehicles? A host of reasons are cited for the increase in popularity including environmentalism, the cost of gasoline, the desire to distance ourselves from foreign energy sources, and the long-term cost and maintenance of electric vehicles cheaper. These reasons are a clear demonstration that electric vehicles are not simply a passing trend, but rather a monumental change in the way we think of daily transportation. Whether all of these are valid reasons to switch to electric vehicles is not the focus of discussion in this article. Instead, the size of the electric vehicle market, the effect of their increasing popularity, and the ways in which this changes the way electric utilities manage their operations and grid will be the focus of examination. 6.2.1 ELECTRIC VEHICLE (EV) MARKET The following graph shows the total number of electric vehicles year over year. Over the last several years, the largest adopter of electric vehicles worldwide is by far the United States. In fact, nearly a third of the world’s electric vehicles are being driven on U.S. roadways, putting U.S. electric utilities in a unique position to define the way in which electric vehicles are managed in relation to the grid. Assuming this trend increasing electric vehicle ownership continues, some changes must be made in order to manage the influx of electric vehicles being plugged into the grid to charge. With stricter policies regarding automobile emissions, friendly policies in regards to alternatively fueled vehicles including tax breaks and incentives, and the rapid expansion of electric vehicle manufacturing, it is only logical to assume that the number of electric vehicles on the road will continue to increase at a rapid rate. Many new electric vehicle models are being released to the market, and the current models are already selling quite well. In the long term, all of this translates to a larger population of drivers using and owning electric vehicles. An important factor in determining which countries upgrade their grids to deal with increased demand and stress of EV charging is where electric vehicle ownership is concentrated within a country. It can be assumed that early adopters of electric vehicles will live in certain highly populated areas that offer charging centers and have the available infrastructure to accommodate electric vehicle charging. Currently in the U.S., the highest concentration of EV ownership is in California. Although the current electrical grid in the U.S. is said to be able to support 150 million battery-powered cars, electric vehicle adoption in concentrated areas can be problematic for local grids. Adding a specific fast charger to a grid can consume the same amount of electricity and generate demand equivalent to an entire small household. If multiple people in one neighborhood install these devices, it creates issues with local grids and transformers sized for smaller neighborhoods. A few solutions address this problem, and one solution is the modernization of the electrical grid. 6.3.2 ELECTRIC GRID UPGRADES Many electric utilities are already in the process of upgrading their grids through increased capacity, smart meters, and many more enhancements. These upgrades, especially ones which deal with capacity, must be introduced in high-demand areas first, so many programs have been developed to help pinpoint areas which need priority upgrades. One example is a customer-driven program in which utility companies ask their customers to let them know if and when they purchase an electric vehicle. Electric utilities are also using smart meter information and data to determine peak charging times and areas which generate the highest demand, so these areas can be prioritized in grid upgrades. 6.3.3 DEMAND/PEAK LOAD IMPACT One of the most significant impacts of electric vehicles is the impact on peak usage. Many people come home from their commute and plug in their cars. As discussed previously, this can be problematic in smaller neighborhoods where the local grid cannot handle the increased demand usage of electricity. This can be handled in a few ways, including delayed charging, time-of-use, and shifted usage plans. Demand spikes can cause issues for utility companies that may need to suddenly shift their energy production to another plant or might need to suddenly increase production. These sudden increases not only cause stress on the grid, but can cost a significant amount of money as utilities must produce electricity to meet this increased peak in demand, especially considering most electric grids are currently built only for transmission and not storage. This means that any electricity that is produced and transmitted must be used when it is generated. This particular issue creates a unique opportunity for electric vehicles to fill gaps during peak demand times in which they are not charging but are still connected to the grid. 6.3.4 POTENTIAL BENEFITS Thus far, we have discussed the potential negative impacts to the electric grid brought about by the advent of the electric vehicle and their increasing popularity. However, the rising popularity of electric cars also creates many positive impacts for the grid and for energy providers such as utility companies. We have already cursorily mentioned some of the potential benefits for the customers including saving money on fuel costs, low cost of maintenance for electric vehicles, and more. But, how does this benefit the utility companies? The major opportunity for utility companies in the shift from fuel-powered to electric vehicles is the shift of the market from petroleum providers to utility companies. This allows utility companies to increase their bottom line and accommodate the emerging needs of their customers. Not only is this an opportunity for increased revenue, EVs also provide an opportunity for cost savings. As previously mentioned, many grids cannot store electricity, so in order to meet increased peak-demand times, generation must be ramped up. Electric vehicles, however, have the ability to store electricity. This means EVs could be used to supply power back to the grid during peak demand hours. Peak demand times are currently determined primarily by the need for heating and cooling peaks, which happen to coincide with the time people are generally not using or charging their electric vehicles. If enough electric vehicles are on the road and connected to the grid during peak demand time periods, it is possible they could help meet peak demand by using stored power in their battery cells. If electric cars are used to combat peak demand from heating and cooling and various other demand generating events, how should utilities handle the increased demand from EV charging? With the advent of smart meters and the smart grid, it is possible to determine when and how people use electricity. The most effective way to combat peak demand generated by the charging of electric vehicles is to use time-of-use plans, which reward customers who shift their usage to off-peak times with lower billing rates for electricity. If the cost of electricity is more during on-peak times, then people will be less inclined to charge their cars during these times. In the long run, this can save utility companies a significant amount of money. This can also encourage EV owners to use the delayed charging capabilities of their electric vehicles,which allow a car to be plugged in, but not begin charging until a specified time. This approach in combination with electrical grid updates is the best way to mitigate any serious negative impacts that may arise from the rising popularity of EVs. Electric vehicles are increasing in popularity, and this sudden and constant increase in EVs on the road will cause significant impacts on the electric grid. However, these impacts do not have to be negative if utility companies use their existing smart grid infrastructure to anticipate where upgrades need to be made as well as use the data collected by smart meters to enforce time-of-use plans, which can shift demand to off-peak times such as overnight charging. The advent of the electric vehicle is a unique and exciting opportunity, not only in terms of the potential for increased revenue for utility companies, but also to decrease our dependence on foreign energy sources and potentially distance ourselves from carbon-emitting fuel sources such as petroleum. If you enjoyed this article, click here to start from the beginning of our Industry 101 Series. Or to continue your journey, click here to access the next installment of our Industry 101 guide. Here is a list of relevant reading material our expert identified as sources for additional information:
0.8848
FineWeb
- Written by Frank Miller - Illustrated by John Romita Jr - Published by Marvel Comics HYDRA, the Hand and a mutant group known as the Dawn of the White Light formed an alliance the purpose of which was to kill and resurrect superheroes under their control, starting with Wolverine. The alliance used Wolverine for various missions until he was recovered by S.H.I.E.L.D. and deprogrammed. Wolverine vowed to dismantle HYDRA and the Hand for what they did to him and for what they made him do.
0.5742
FineWeb
Marketing is one of the three fundamental activities a business has to engage in if it wants its products to reach consumers – the other two being product development and distribution. No business can succeed when no one knows the products or services they offer. The primary goal of marketing is to draw attention to a brand and its products and to generate interest in what the business has for sale. Before the internet, marketing was done through methods that can be described today as traditional marketing methods. Some of the traditional marketing channels that marketers used and continue to use include: - Direct mail - Direct sales - Print advertising - Referral marketing. Even with increasing popularity of the internet, most businesses still incorporate traditional marketing methods in their marketing strategy. The following are some of the reasons why traditional marketing methods are still popular among marketers: 1. They Provide an Established Audience A number of traditional media channels such as TV, radio, and magazines still account for a huge segment of media consumption. According to Think Box, TV reach for adult individuals in the United States currently stands at 92.8%. You can argue that every adult in the United States watches TV. What’s more fascinating than the 92.8% figure is that adults spend more than 35 hours each week watching TV – as per data from Nielson. Also, from the same study, the average adult listens to about 13 hours of radio each week. With such an established audience, marketers can’t simply ignore traditional marketing channels because newer better ones are coming along. - Some Demographics Are Best Reached Offline Not everyone can be found online. If a marketer wanted to reach seniors, for instance, they will definitely achieve better results using traditional marketing methods than online marketing methods. Traditional marketing methods can also be the best option to reach communities where adoption of technology is still low. - Good for Brand Recall A study done by True Impact, a neuromarketing firm based in Canada, asserted that paper-based advertisements and content are easier to process and perform better than digital content when it comes to brand recall. Brand recall refers to how consumers connect a brand to a product or class of products. You probably buy the same brand of items every time you go to the store. If you had no established memory of the brands you buy or how the brands make you feel, you’d probably buy any product you can lay your hands on when you go to the store. With brand recall, a business can build a loyal group of customers who buy from them every time. - Reliable Messaging Platform for Brand Development Traditional media channels such as magazines have subscription options where the same people are guaranteed to get a magazine every two weeks or on a monthly basis. If you were guaranteed that a person who sees your ad this month would see your ad next month and a month after that, would it be easy to craft a brand story and tell it in a series of ads in a way that develops your brand seamlessly in the minds of your target audience? I think you already have the answer. Why You Should Use Online Marketing as Well Online marketing refers to the promotion of products and services using the internet. Popular online marketing methods include: - Email marketing - Search engine optimization - Content marketing - Social media marketing - Pay per click advertising As more and more people use the internet to search and shop for products and services, it is becoming increasingly hard to ignore the place of internet marketing in business. 81% of shoppers now conduct an online search before buying a product or service. If you run a local business, it is in your best interest to establish an online presence as 85% of consumers use the internet to find local businesses. Embracing online marketing can do a lot of good for your business. Below are some of the advantages of using online marketing. - Tracking Results is Easy It is much easier to track results when using online marketing than when using traditional marketing. Various online tools make it easy to track almost any metric you want in real time. You can tell how many people have seen your ad and whether they took action on it or not. With almost 100% accurate reporting on the actions taken by your target audience after seeing your ad, you can send more effective follow up messages or retargeting ads. - Low Barriers to Entry There aren’t many barriers to entry when it comes to online marketing. Any business can start an online marketing campaign today and start seeing results almost immediately. The straightforward nature of internet marketing also makes it easy for businesses to handle their marketing in-house instead of outsourcing it to a third party. You can even create great banner ads yourself. Click here to design a winning flyer or banner. - Promotes Interactivity Online ads are much more interactive than ads running on traditional media. Users can fill in surveys, reply to an ad almost immediately, send queries after clicking on an ad, sign up to an email list, or even tell Google to never show them the ad again. Digital marketing is relatively inexpensive. Some channels such as social media and content marketing can be absolutely free. While you can spend a lot of money in online marketing, businesses usually pour money on campaigns that are actually generating revenue. It is the revenue generated by the online marketing campaigns that are reinvested into the campaign. A business can start small and scale their advertising as they begin to see results from their efforts. - More Accurate Market Segmentation and Targeting Platforms such as Google and Facebook have turned audience targeting into a science. They gather so much data about their users that you can target an ad to the audience you want with pinpoint accuracy. You can target users based on interests and demographic characteristics and even create remarketing lists based on web users who have visited a specific webpage. - Allows Businesses to Build Communities around Their Brand With social media, email lists, or blogs, any business can take steps to build a community around their brand. The social proof that comes with having an engaged community supporting your brand can be tremendous. Everyone wants to be part of something cool.
0.5756
FineWeb
Massive Piece of Sun’s Surface Breaks Off: Should We Worry About its Impact on Earth - Posted on February 13, 2023 - By Akta Yadav - 76 Views Massive Piece of Sun:- NASA’s Finding: Massive Piece of Sun’s Surface Breaks Off A massive piece of the Sun’s Surface has broken away from the Northern Prominence and this has been claimed to be the rarest event in the life of the universe. The whole event has been captured in James Webb Telescope of NASA. The video has been shared on Twitter by Dr. Tamitha Skov, a weather forecaster who specializes in the study of space weather. After the massive piece of the Sun’s surface breaks off, it can now be seen circling around the north pole of the Sun. Scientists Discuss Impact on Earth As a massive piece of the Sun’s surface breaks off lightyears away from the Earth, there are many speculations made by scientists and its impacts on the Earth as well. Prashant Parida, an affluent professor has speculated that the time duration taken by the Sun for one solar year, that is 11 years may be slightly affected as a massive piece of the Sun’s surface breaks off since an increase in the intensity of the maximum Sunspot can be noticed. Massive Piece of Sun However, as scientists discuss the impact on Earth, this is not speculated to affect the Earth’s revolution or rotation in any manner. The only effect that it can have are the increased chances of a solar storm in the Sun’s South and North poles. Solar storms can massively impact the earth by causing disturbances in telecommunications and associated grave consequences of this disruption like plane crashes on account of error in telecommunication. Apart from this, scientists have found no reason to be scared as of now, however, if charged particles from the Sun or a solar flare would be directed towards the Earth, it would be a serious matter of concern. Massive Piece of Sun’s Surface Breaks Off: Will the Piece Reunite with The Sun Soon? Professor Parida has also stated that there are fair chances that the piece of the sun’s surface which has broken off, will unite with the Sun while circling around its pole since the Sun is a body with strong gravity and thus will again attract it to attach with its main filament. ToFor more updates keep visiting our website www.topstoriesworld.com where we provide unbiased, true and top stories of the world.
0.9019
FineWeb
He was a thunderstorm, and people warned me not to play with him; but I had always loved the rain. drunk with the great starry likeness, image of felt myself a pure part of the abyss, I wheeled with the stars, my heart broke loose on the wind. tiny little turn ons: - people leaning against walls with one shoulder while they talk - catching somebody turning away smiling at a joke you made - people who linger on a hug for just a second after you let go - somebody glancing at your lips while you’re talking
0.9882
FineWeb
The often-inadequate disposal of industrial wastewaters into public sewers deteriorates sewer structures, increases maintenance costs, adds problems in sewage treatment and contributes to stream pollution. Direct discharge into streams harms aquatic life and deems the water unfit for its intended use by both communities and businesses. Therefore, it is necessary to reduce the volumes and levels of toxicity of wastes entering waterways through a combination of measures. Challenges resulting from poor Industrial Wastewater Management In Zambia, like in many other countries, issues around industrial wastewater (IWW) management are given less priority than those related to water supply. This is oblivious to the fact that both water supply and IWW management are essential and interrelated. Wastewater from industries and sewage spillages from burst pipes in most urban centres, including Zambia’s capital Lusaka, are released into streams and wetlands. From there, they subsequently discharge into catchment areas or leach into aquifers upon which communities and businesses are heavily dependent on for water supply. Most of the poorly managed wastewater from industries is released into the environment in an untreated or partially treated state. Also, most industries have adopted substandard treatment methods that partially treat and, in some cases, even forego the effluent treatment process in totality. Therefore, industrial wastewater management becomes critical. As such, an effective IWW strategy is necessary to promote and improve IWW management and determine priorities pertaining to the enforcement of applicable legislation, monitoring, and engagement with industries. To effectively do this, an intercountry learning exchange was coordinated by the GIZ Reform of the Water Sector Programme Phase II (RWS II) active in Zambia and the GFA Consulting Group with support from NatuReS Tanzania and Zambia. The objective was for the Tanzanian partners of NatuReS to share best practices, challenges and effective innovations in managing industrial wastewater with their Zambian counterparts. Case presentations were made by Eng. Miriam Esanju from the Wami Ruvu Basin Water Board (WRBWB) from Tanzania and Fred Chimpukutu, Senior Chemist at the Lusaka Water Supply and Sanitation Company (LWSC) from Zambia, triggering insightful exchange of experiences and success factors that could help with challenges such as environmental pollution, faced across both countries. Industrial Wastewater Management in Tanzania: Challenges and Solutions In Tanzania, industrialization is one of the key strategic objectives within the National Development Framework. However, with the expansion of water-intensive production, treating the increasing amounts of wastewater poses major environmental and regulatory challenges, such as the complex process of obtaining official permits for the appropriate disposal of wastewater. As multiple regulating agencies are involved in this process, industries are required to obtain various types of permits. This resulted in complex and lengthy processes to safely dispose of wastewater. The untreated wastewater discharge does not only have negative impacts on the ecosystem and the health of communities using the water, but also on foreign investment, as international investors increasingly value environmental compliance. Therefore, NatuReS under the Partnership with the Tanzania Export Processing Zones Authority has supported the development of industrial wastewater guidelines, as well as the integration of digital water management systems for a more efficient permit regulation. Industrial Wastewater Management in Tanzania: Stakeholder Interviews Industrial Wastewater Management in Zambia: Way Forward A Trade Effluent Management (TEM) Task Team has been established in Lusaka with stakeholders from the mandated and responsible authorities led by LWSC as well as industries located in Lusaka. The TEM seeks to coordinate the mobilization and use of human, financial, and other relevant resources for the implementation of industrial wastewater management activities for the city of Lusaka. The task team also seeks to support the coordination of the regulation, monitoring, enforcement and management of the trade effluent discharge into the sewerage system. The shared lessons from Tanzania have the potential to inform current activities in Zambia and could be adapted by LWSC to ensure the effective treatment and management of industrial wastewater effluent. These lessons also aimed to improve LWSC’s monitoring of industrial wastewater and the safeguarding of the two new wastewater treatment plants to be constructed through the Lusaka Sanitation Programme with support from KFW and EIB, as well as technical assistance from RWS II.
0.678
FineWeb
When we talk about bullying, we mainly think of children and the perceived increase in acts of bullying at schools. However, as we discovered in Home of the Bully, it is very likely that the parents or older siblings who are raising child bullies have been bullied by their parents or are being bullied at work themselves. Therefore, they are merely trapped in a cycle of bullying. In Australia, it is estimated that 1 of 6 people are bullied at work. A research done by Duncan and Riley on the staff of a school cluster found that 97% of staff thought they had been or were still being bullied by another person at work. In 2002, it was estimated that workplace bullying cost the Australian economy 36 billion dollars a year, not including stress leave people took due to bullying. But the implications of this phenomenon are far more devastating than the financial toll society pays for bullying. People who are bullied and made to feel weak at work have a higher chance of finding someone weaker to pick on to regain their power. If they have kids, those kids might become their victims at home. Besides the “obvious” workplace bullies – employers and managers (“the boss”) – anyone may act like a bully: subordinates, colleagues, clients, suppliers, individually or in groups. Anyone who feels weak may use bullying to regain their power by putting another down. Types of workplace bullying Brodsky (1976) claimed there were five types of bullying at work: - Work pressure - Name calling - Physical abuse - Scapegoat – framing and blaming someone - Sexual harassment These still rely on the 4 forms of bullying: physical, verbal, social and cyber (Brodsky did not talk about cyber bullying in 1976, but today it is just another way to extend the verbal and social bullying). As with the definition of bullying of children, workplace bullying is considered an act that repeats and persists with the aim of frustrating, tormenting, wearing down, provoking, frightening, intimidating or bringing discomfort to another person. Workplace bullying is also done with the conscious or subconscious belief that it will help the bully gain power. Effects of workplace bullying Psychologically, bullying is a form of trauma, so victims react to workplace bullying by developing Post-traumatic Stress Syndrome and the impact on our society is severe. Bullying may affect victims in one or a combination of the following ways: - Difficulty sleeping - Panic attacks - Low concentration level - Lack of motivation - Challenges with memory - Difficulties learning new skills - Loss of self-confidence - Challenges making decisions - Low performance - Poor health: increase of sick days, weight gain, cancer, heart attack and more - Higher chance of being injured - Loss of income - Loss of promotion - Decreased savings - Early retirement - Social difficulties and shrinking of personal support system - Low sex drive - Domestic violence If you consider a parent having any of these symptoms, you will see easily that the chance of them taking their frustrations out on their kids by bullying them at home go up a great deal. When their kids try to get their help, they have little to give, which brings the quality of their parenting down. When calculating the implication of bullying on the economy, I do not think the bureau of statistics took into consideration the expenses the system needs to pay to overcome parents’ inability to educate/support their own children. When kids’ most important socializing agents are bullied and made to feel weak, it is very hard to make sure their kids will not become bullies or victims in turn. At work, bullying is a bit different. Some people are bullies in a way that everyone can see and recognize, while others do it so subtly it is difficult for detect. Another problem at work is that the practice of bullying at work was considered acceptable for many years – “Boss” was almost a second name for a manger being inconsiderate, demanding, threatening and abusive. Forms of workplace bullying Here is a list of forms of workplace bullying. If you experience any of them at work on an ongoing basis, check which “player” you are – the bully, the victim or a bystander. Regardless of your role, you have the power to stop the cycle: - Negative criticism without encouragement - Name calling - Spreading rumors - Threats of dismissal - Threats to career - Threats on financial status - Threats on social status - Harassment (based on race, gender, sexuality, etc) - Discrimination (based on age, religion, gender, etc) - Overloading with extra work - High expectation to stay overtime - Changing job requirements without consent - Making fun of someone - Sabotaging someone’s reputation - Professional or personal exclusion or isolation - Micro management - Cyber bullying - Framing someone - Overt aggression/violence - Criminal assault and murder Join me next week when I discuss workplace bullying and the bullied victim at work. In two weeks, we will start going into solutions, so stay tuned. Until next time, be happy! This post is part of the series Bullying: - Bullying Facts and Myth - Bullying Statistics are Scary - What is NOT Bullying? - Types of Bullying - Why Do People Bully? - Victims of Bullying - Bullying Bystanders - Home of the bully - Home of the bully (2) - Workplace Bullying - Workplace Bullying (2) - How to Help Bullying Victims - How to Help Bullying Victims (2) - How to Help Bullying Victims (3) - How to Help Bullying Victims (4) - How to Help Bullying Bystanders - How to Help Bullying Bystanders (2) - How to Stop Workplace Bullying - How to Stop Workplace Bullying (2) - How Workplace Bullying Bystanders Can Break the Cycle - How Organizations Can Stop Bullying - How Organizations Can Stop Bullying (2) - Bully Parents - How to Stop Parental Bullying - How to Stop Parental Bullying (2) - How to Stop Parental Bullying (3) - How to Stop Parental Bullying (4) - How to Stop Parental Bullying (5) - How to Stop Parental Bullying (6) - How to Stop Parental Bullying (7) - How to Stop Parental Bullying (8) - How to Stop Parental Bullying (9) - How to Stop Parental Bullying (10) - How to Stop Parental Bullying (11) - How to Stop Bullying with Empathy: The Story of Two Apples
0.9579
FineWeb
We think that emotions provide a very unique SHIELD for youth. Motivate us to take action Provide us with signals about our environment Help us to identify our needs Help us to make decisions Allow us to communicate with others And much more! We believe that youth can be happy, healthy, and successful -- no matter the context -- if they can understand what they are feeling, what makes them feel that way, and how to handle what they are feeling. In the S.H.I.E.L.D. Lab, we use multiple psychological research methods (i.e., self-report surveys and interviews, experiments, and observations) to understand how various socializing agents such as family, peers, and Internet media influence adolescent emotional development. More specifically, the S.H.I.E.L.D. Lab explores emotional socialization and development through the lens of ethnic minority identity/experiences in an attempt to develop culturally relevant models of emotional development. Emotions play a role in various aspects of our lives, and the S.H.I.E.L.D. Lab acknowledges the impact of ethnic identity/experiences on our emotional development.
0.5545
FineWeb
Old Town Hall Risk: Not at risk - Built by the Dean and Chapter of Durham in the centre of the new Market Place they had laid out circa 1767. - Ashlar with pyramidal slate roof. - Two storeys. - Open arcaded ground floor for use as market hall. - Three arches on south, east and west sides on Doric columns, with square rusticated corner piers against which are set half column responds. - A central pillar on steps which may be part of a former market cross. - The upper floor of 3 bays to each elevation. - A central "Venetian" window flanked on either side by a single semi-circular headed window. - On the east and west fronts the single windows are blank. - On the north front the centre light of the "Venetian" window contains the entrance door with fanlight over. - The upper floor is reached by a symmetrical, double branch stone staircase under which the open market hall can be approached through a grand semi-circular arched opening. - The roof is crowned by a square timber turret and a domed octagonal cupola. - The building was restored in 1977. - The hall was originally built by the Dean and Chapter as a place for holding their Manorial Courts and providing offices for their officials. - It was sold by them in 1855 to the corporation together with the market tolls.
0.51
FineWeb
There's a massive meltdown happening in the Arctic - and it's not just polar bears who will feel the effects. Since satellite monitoring began in 1979, sea ice in the Arctic has been on the decline, shrinking by about 10 to 12 percent per decade. In the summer of 2007, Arctic sea ice cover shrank to an unprecedented low. At this rate, researchers project that the Arctic may experience a summer completely devoid of ice by the end of the century. What's causing the thaw? A major culprit is greenhouse gas emissions from human activities, like burning fossil fuels. Greenhouse gases trap thermal energy that would otherwise dissipate into space. This results in warmer air temperatures which prevent Arctic ice from freezing in the fall and cause the ice to melt earlier in the spring. Snow and ice reflect sunlight and help to keep polar sea temperatures cool, but with less of the sea covered by ice and snow, the ocean absorbs more heat from the sun - raising the water temperature and making it even harder for ice to form. Shrinking ice masses disrupt the life cycles of Arctic animals like seals, walruses, polar bears and seabirds, which depend on ice for places to travel, hunt, and raise young. But a warming Arctic affects the rest of the globe, too. Melting ice means rising sea levels, which can lead to storm surges, flooding and erosion, disrupting delicate coastal ecosystems as well as human communities. A cold Arctic also is essential for the system of wind and ocean currents that regulates Earth's climate. Computer models suggest that, if Arctic warming is curbed, sea ice can recover in the future. That leaves it up to humans to keep climate change in check.
0.9872
FineWeb
The cause of ocean acidification is clear: carbon pollution released by burning fossil fuels. NRDC is working to reduce carbon pollution while also pressing for quick and effective measures to better understand and mitigate the impacts of ocean acidification. While ocean acidification shares the same principal cause as climate change, it is a separate phenomenon that requires distinct strategies as well as independent scientific study. Because we don't fully understand what's to come as the oceans acidify, NRDC has pushed for more funding for research and monitoring to help coastal communities and marine industries cope with the changes already underway. Congress recently increased the funding for ocean acidification research and monitoring from $6 million to $10 million, but even more money is needed. In partnership with scientists and economists from other institutions, we recently completed two studies that identify human populations at risk to the growing threat of ocean acidification. The first assessment, published in the February 2015 issue of Nature Climate Change focused on vulnerable U.S. coastal communities in 15 states. The second assessment focuses on countries most at risk to the combined impacts of ocean acidification and global warming due to their reliance on healthy coral reefs for food, jobs, and storm protection.
0.9567
FineWeb
Crumpled kitchen foil that lays flat for reuse. Bent bumpers that straighten overnight. Dents in car doors that disappear when heated with a hairdryer. These and other physical feats may become possible with a technique to make memory metals discovered by researchers at the University of Illinois. Normally, when a piece of metal – such as a paperclip – is bent, the change in shape becomes permanent. But, when heat is added to bent metal films having the right microstructure, the researchers found, the films return to their original shapes. The higher the temperature, the sooner the metal films revert. "It’s as though the metal has a memory of where it came from," said Taher A. Saif, a professor of mechanical science and engineering at Illinois, and senior author of a paper that describes the findings in the March 30 issue of the journal Science. In the study, Saif and graduate students Jagannathan Rajagopalan and Jong H. Han explored aluminum films and gold films. The aluminum films were 200 nanometers thick, 50-60 microns wide and 300-360 microns long. The gold films were 200 nanometers thick, 12-20 microns wide and 185 microns long. The average grain size in the aluminum films was 65 nanometers; in the gold films, 50 nanometers. "We found that the type of metal doesn’t matter, said Saif, who also is a Willett Faculty Scholar and a researcher at the university’s Micro and Nanotechnology Laboratory. "What matters is the size of the grains in the metal’s crystalline microstructure, and a distribution in the size." Grain sizes are typically one-third to one-half the thickness of a metal film. Raising the temperature by about 50 degrees Celsius causes the grains to grow larger. If the grains are uniformly too small, the metal will be brittle and break while being bent. If the grains are uniformly too large, the metal will bend, but then stay in that position. To return to the initial shape, what’s needed is a balance between brittleness and malleability. That balance can be achieved through a combination of small and large grains, the researchers report. Variations in the microstructure lead to plastic deformation in the larger grains and elastic accommodations in the smaller grains, Saif said. The bigger grains bend, but push and pull on the smaller grains, which become elastically deformed like a spring. If the metal is then left alone, the smaller grains will release this energy and force the bigger grains back to their original shapes over time. This local release of energy can be speeded up by applying heat. Controlling the crystalline microstructure of thin films also could reduce energy loss in oscillators and resonators used in electronic circuits, Saif said. Oscillators and resonators are found in products ranging from air bag sensors and camcorders to digital projectors and global positioning systems. "If the grains that constitute the metal films in these devices are between 50 and 100 nanometers, they can be very lossy," Saif said. "However, if we decrease the grain size, we can reduce much of the energy loss." Source: University of Illinois at Urbana-Champaign Explore further: How we can substitute critical raw materials in catalysis, electronics and photonics
0.6293
FineWeb
Product quality is one of Alfred Camera’s core competencies. We set a high bar for product stability and execute seriously in every product development projects and releases. That’s why Alfred Camera keeps its highest user ratings, average 4.8 stars with 300K+ reviews, among all smart home products. QA engineer plays an important role in the process of product development. They need to think from every angle and design test plans to ensure all features perform as expected, especially for exceptional cases. Also, to provide feedbacks to engineers and designers if any defects are found during the process. This position is mainly focusing on manual app testing. 1. Create comprehensive test plans and test cases with quality documentations 2. Locate and report any potential software quality issue 3. Perform regular and/or project-based quality assurance activities based on established test plans/procedures 4. Spec review/verification and provide meaningful feedbacks to make it more logically comprehensive and reasonable. 5. Cooperate with development and customer support teams to further investigate the quality issues identified 6. Assist on monitoring system metrics to locate issues as early as possible 7. Continuously improve existing practices related to software quality assurance Hard Skills: 1. BS graduated, majored in Computer Science or related areas preferred. 2. 1 year+ hands-on experience in mobile app testing, manual test case design, and issue analysis. 3. Ability to interpret design specifications into actionable plans/items. 4. Decent English reading/writing skill. Soft Skills: 1. Passionate but with discipline and carefulness, willing to drive things to perfection and able to locate the smallest details. 2. Strong curiosity to find out the real factors that drive the final results. 3. Good communication/expression skills.
0.7716
FineWeb
Data science is the most talked subject in the market today. Microsoft has brought a free course on Introduction to R for Data Science will help one master the language R which is becoming the leading language to implement data science and statistics principles. About the course: Introduction to R for Data Science is a self-paced course offered in edx by Microsoft. It will make one understand the basic syntax of R to let them do data analysis with R. It will start from variables and basic operations and guide up to learning the graphical capabilities of R. Anyone can take up this course as no prior information of data science or programming is required. - Course is free of cost - For certification, one needs to pay $49 What will one learn from this course? The course will cover the given topics: - Introductory R fundamentals and basic syntax - What is R and how it is used to perform data analysis - Become familiar with basic R structures - Create your own visualizations using R
0.8978
FineWeb
Review: Lessons for the poor from English history By Martin Hutchinson The author is a Reuters Breakingviews columnist. The opinions expressed are his own. It took England centuries to develop a successful industrial economy. Poor countries today want to recapitulate the process in a few decades. In “The Political Economy of Nation Building” development consultant Mack Ott draws some lessons from the English experience. The basic one is that a liberal nation-state is required to nurture economic development. Ott provides a list of key characteristics. It includes the rule of law, private property and a substantial middle class, religious tolerance and the separation of legislative and executive powers, which permits the development of sound fiscal and monetary policies. Ott argues that these factors, first developed in England between the Norman Conquest and around 1700, explain the country’s economic takeoff and should be the model for today’s developing countries. The first part of the book is a fairly lengthy analysis (111 pages) of England’s political and economic transition, focusing on the emergence of institutions and practices that contributed to economic development. Ott’s survey of English emergence is generally sound, although he is excessively fond of the 1688 Revolution and William III, and insufficiently appreciative of the earlier professionalization of public service under Charles II, the later rationalization of public debt management under Walpole and Pelham, and the even later application of enlightenment economics to public finance under Pitt and Liverpool. The book then applies the lessons of English history to more recent history. For example, Ott explains that Vladimir Putin’s nationalization of the oil company Yukos gave the executive freedom from parliamentary control of its finances, in much the same way as did Henry VIII’s dissolution of the monasteries. Next comes an examination of four pairs of countries in relation to particular reform policies. The difficulty of this sort of analysis is made clear by one of Ott’s examples. Pakistan is portrayed favorably for replacing a military dictator with democracy while Thailand went in the opposite direction. Since the time of writing, Thailand has moved back to democracy while Pakistan’s democracy looks distinctly shaky. Ott’s final section looks in detail at the factors facilitating economic development. He sees all of them, paralleling English developments, as necessary and argues that backsliding on one or another is both frequent and regrettable. By now, that institutional approach is fairly mainstream in development economics. His enthusiasm for free markets and hostility to global government – “Nations remain a bulwark against injustice so long as there are many of them” – are more unusual. Ott demonstrates satisfactorily both the origins of his chosen development requirements in England, and their centrality for countries wishing to become rich. Still, his belief that contemporary democracy with universal suffrage is necessary for economic emergence is hard to reconcile with his clear sympathy for the pre-democratic oligarchy of Augustan Britain, or with the popular election of economically retrogressive authoritarians such as Putin and Venezuela’s Hugo Chavez. Ott is on stronger ground with his claim that authoritarians, even economically fairly sensible ones like Hosni Mubarak and Augusto Pinochet, leave a destructive legacy unless they arrange a satisfactory democratic transition. The book reflects the verdict of a lifetime of development work. He makes the case well that the English model translates to global development, with cultural factors properly causing adaptation of the model rather than its replacement. Developing countries need a (William of) Orange Revolution of their own.
0.5615
FineWeb
Teacher Discovery Placement Scheme What is a teacher placement? Teacher Placements are professional development experiences, work placements or internships in business and industry, which enable teachers or career counsellors to spend a period of time working with an employer. Teacher placements are optimal to facilitate STEM education through hands-on and real-life experiences, providing a full range of skills. Teacher Discovery Placement Scheme For this reason, the STEM Alliance has developed the Teacher Discovery Placement Scheme, an initiative in collaboration with the SYSTEMIC project that highlights existing placement programmes and help ensure the success, promotion and development of these placements. Benefits for Schools - Through placement, teachers can upgrade their competence, knowledge and skills regarding STEM subjects, providing up-to-dated insight about the current situation of STEM careers. - Developing the knowledge of STEM subject can open the opportunities available for students, enhancing their potential and stimulating their curiosity and attention by bringing careers in classrooms. Benefits for Companies - Companies involved profit from attracting new generations of students into STEM careers. - STEM industry can benefit from the opportunity of a low cost, small-scale investment for long term, consistent impact on the future of skilled workforce. - Placements support the talent pipeline and improve companies' recruitment process - Foster local partnership between STEM organisations and schools for educational opportunities such as workshops and apprenticeships. Benefits for Policy Makers - Ensures lifelong learning opportunities for educational staff and provides continuous teacher training and upskilling with real life experience in STEM industry. - Facilitates young people's professional development and their transition into the job market. - Ministries of Education benefits from an ecosystem to engage teachers in placements in industry. Developing a Successful Teacher Placement Scheme – A Guide for Companies 'Developing a Successful Teacher Placement Scheme' is a new Guide for Companies that complements the efforts of STEM Alliance to promote STEM teacher placements in industry through the Teacher Discovery Placement Scheme. The STEM Alliance works to fill the need for more STEM-skilled workforce in Europe and to support the central role STEM teachers are playing to motivate young people to pursue STEM studies and careers. Following the 'Teacher Placement Initiatives – Collection of Best Practices', the guide has been created by a team of education and corporate experts for businesses that are committed to championing and promoting education and employability in science, technology, engineering and maths (STEM). The guide is addressed to those in charge of different types of departments, including Human Resources, Communication, Corporate Social Responsibility (CSR), Outreach or Community Activities, and Education or Training. This publication constitutes the second part of the Intellectual Output 4 ‘Guide on contextualisation of STEM teaching' of the SYSTEMIC project. SYSTEMIC is funded by the Erasmus+ Programme of the European Union. In this publication we include guidelines and conditions of success for this type of school/industry collaboration and some analysis on how teacher placements contribute to improve teachers' STEM skills and their capacity to influence students' studies and career choices. Teacher Placement Initiatives - Collection of Best Practices The STEM Alliance has published the "Teacher Placement Initiatives – Collection of Best Practices" booklet, containing a selection of 15 initiatives collected from 10 countries around the world, providing inspiring examples of STEM teacher placements in industry. One of the main aims of this "Teacher Placement Initiatives – Collection of Best Practices" is to help overcome the lack of awareness of career development opportunities for teachers, taking into consideration the urgent need to bridge employment gaps by sustaining cooperation between school and industries. The publication contains precious insights for industry on how to attract new generations of students into STEM careers while understanding the workforce available, allowing a tailored targeting of specific candidates. Teacher placements are one of the best means to ease the integration of company-sponsored programmes in school curricula, helping policy makers meet the challenge of a lack of resources in schools and expand their knowledge about STEM subjects.
0.6197
FineWeb
How your sewer system works Do you ever wonder what happens to the things that get flushed down the toilet or go down the sink drains? Municipalities spend a great deal of time, money and energy to be sure that when you flush, it is collected, treated and disposed of properly. Not only is this the right thing to do from an environmental standpoint, it is also mandatory to avoid illness to the general public. The City of Cedar Springs is equipped with a sewer system that includes gravity sewers, lift stations, force mains and a waste treatment plant. This is split into two sections; the collection system and the treatment plant. Each of these is exactly what it sounds like. The collection system is the entire underground piping network that collects the waste water from your homes. The collection system pumps all of this waste water to the treatment plant, which treats the waste water before returning it back to the groundwater, lakes and streams of the state. Hopefully, this will explain how your typical sewer system works and what happens when you flush your toilet. The collection system Each home in the city has a toilet, sinks, a shower, bathtubs, washing machines, dishwashers, etc. All of these devices are hooked to the plumbing system that runs through your home, and collect in one common pipe. This pipe, which is usually a 4-inch plastic, clay tile or ductile iron pipe, is typically known as your service lateral. This pipe leaves your home at the lowest point, like a basement or crawlspace. If you go into your crawlspace or basement, you will see this 4-inch pipe exiting your home, usually toward the street, which is where the collection system is. This 4-inch pipe from your house runs under your front yard to a gravity sewer main under the street. This pipe is bigger than your 4-inch service lateral. It is usually 6 to 8 inches in diameter, because there are many homes with service laterals hooked up to it, so it has to accommodate much more flow. The gravity sewer main runs parallel under your street. The pipe is pitched at a very slight angle to allow the waste water to flow down-hill. One gravity sewer main will run into another, larger gravity sewer main, which will run into another gravity sewer main, then to another, then another, always running toward the treatment plant. When the piping under ground can no longer be pitched on this slight down hill angle, you have to pump it up to an elevation which will allow gravity to take over again. This is done by having the gravity sewer mains dump into a catch basin that is equipped with pumps. This catch basin with pumps is called a lift station, and it does exactly what it says; it lifts the waste water! When the gravity sewer mains fill this basin, the pumps are activated by level switches. A switch is activated and the pumps pump the wastewater through a pipe called a force main. The force main pumps the waste water uphill until gravity can take over again. This process is repeated over and over again, until the waste water reaches the treatment plant. The treatment plant The City of Cedar Springs has a treatment plant that is designed to treat 2,400,000 gallons of waste water each day. It is known as a Jet Tech Sequencing Batch Reactor. The treatment plant consists of three reaction tanks, a sludge digesters, two sludge storage tanks and a retention pond. How it works Waste water from the entire city is sent to the plant. The waste water that enters the treatment plant is called influent. The influent is sent to one of the three reaction tanks. Each one of these tanks is loaded with micro-organisms that are bred with the specific purpose of treating waste water. This mixture of micro-organisms is known as mixed liquor. A mixer is activated, and oxygen is pumped into the mixed liquor to stimulate the micro-organisms to attack and eat the “bad” things that are in the waste water. A chemical called Ferric Chloride is added to the treatment process to aid in the treatment of things in the influent that the micro-organisms do not eat. The reaction process is done for two to three hours, giving the micro-organisms a chance to eat all of the “food” available to them. Once this is accomplished, the oxygen and the mixer are shut off to allow the reaction tank to settle. This lets all of the micro-organisms fall to the bottom of the tank, which separates them from the clear, treated water. The water leaving the treatment plant is called effluent. The effluent is sent to the retention pond, and then down an effluent force main to an eighty acre disposal field During each reaction cycle, the oxygen that is added to the treatment process makes the micro-organisms eat, but it also makes them breed. To maintain the correct amount of micro-organisms, each reactor must “waste” a little bit of these excess organisms. This is called waste sludge. The waste sludge is sent to one of two digesters, where it is aerated again to make the micro-organisms eat. Since you do not give them any influent, or “food”, they eat each other. Since the micro-organisms are eating each other, this reduces the amount of sludge during the year. From the digester, the waste sludge is sent over a gravity belt thickener to remove excess water. The sludge is then sent to a lime stabilization tank, where hydrated lime is added to it. The lime drives the PH level of the sludge up over 12. This is done to kill any pathogenic organisms, which are the bacteria that cause disease in humans. After stabilization, the sludge is sent to one of two sludge storage tanks for safe keeping until fall. This sludge is then pumped out of the storage tanks and, just like cow manure, it is used on farm fields for fertilizer. In every day life, you hope that everything goes as it should; your car starts when you want it to, the furnace in your house runs and keeps you warm, and the water comes out of the faucet when you turn the handle. If all goes well, you hardly think twice about these things, and simply go on with your day. If, however, one of these things does not work as it should, it can literally ruin your day! Your sewer system is one of those things that, when working properly, you don’t think twice about it. But if you flush the toilet and it does not go down, it will definitely ruin your day!
0.7046
FineWeb
Jon Jarrett at A Corner of Tenth-Century Europe linked a few weeks ago to an article discussing industrialisation and modernity and asked what it meant for medievalists if the key changes which made the West what it is today only happened in the eighteenth century. The article he linked to wasnt actually saying anything particularly new or remarkable in the debate (although in keeping with it being published by the Cato Institute, it had its own libertarian spin on the issue). Theres been a big debate within the field of world history on the causes of the rise of the west ever since theres been world history, and indeed before. (For an interesting overview of approaches, see this review of a lot of recent books on world history by Raymond Grew in Journal of Modern History 78 (Dec 2006). Jon asked what it meant to medievalists and the study of medieval history if the roots of modernity werent there. I have to say that I dont see it making much difference to me as an early medievalist. Even the view that sees the Rise of the West as coming from medieval factors always really means the late medieval (13th century onwards): banks and capitalism, clock-making, spectacles etc. I dont hold out any hopes of being able to rebrand myself as an ultra-early modernist. What I want to ask here is what does relocating the Rise of the West to around 1750 mean for early modernists? How modern and relevant is their period now? There are several important caveats to make here. One is that modernity is always a concept relative to our own historical period, and so constantly changing. Jonas of Orleans in the ninth century complained about behaviour in modern times (as compared to an apostolic golden age). And it seems to me quite clear that the West now lives in a postmodern world. The second is that Im not saying that the early modern period didnt exist or isnt worthy of study Im saying that its interest and significance now has to be demonstrated rather than assumed. There are some very long-term continuities that can be found between 1500 (or before) and modern life, but they are less obvious than they were. My third point is that its not all the early modern period that is really in danger of de-modernization. If you take the early modern period to be 1500-1750 AD/CE (in round figures), 1650-1750 will still get included in many versions of modernity: the one big change in even the standard English Whig model of why the West won is that theres now more emphasis on the influence of the Dutch Republic. And 1650-1750 can also get counted as modern for its role in the Scientific Revolution. It is 1500-1650 AD/CE that is now looking less and less modern and rather more medieval and I want to briefly consider why. One is that the Reformation looks a lot less like the road to modernity now that Protestantism no longer looks modern. At least in the UK, all religious belief is now considered old-fashioned, if not positively primitive: the view that Roman Catholics are uniquely backward has been greatly tempered by seeing (some) US Protestants look equally pre-Enlightenment. And early modern religious wars look especially barbaric to modern eyes. A second issue is that the Renaissance means a lot less to people than it once did. Much of the art and the architecture of the Renaissance are now as foreign to a modern viewer as that of the Middle Ages. With the end of classical education and the rise of modernism in art, is the Wilton Diptych any more alien to us than, say Titians Diana and Actaeon? And Im not sure that tourists approach the Sistine Chapel in a different spirit than Chartres Cathedral. The Mona Lisa and Michaelangelos David are still icons, but I dont think they are still part of our cultural world in the way that The Scream or Monets water lilies paintings are. Its mainly Leonardos notebooks that thrill now. I also cant think of many authors from 1500-1650 who are now well-known to non-specialists, apart from Machiavelli and Shakespeare, and even Shakespeare doesnt have the central cultural importance he had in the UK sixty years ago. If their religion and culture no longer make the early modern world seem modern to us, what about technological and economic factors? If gunpowder and printing created modernity, where does that leave China? Its not that you cant make an argument that modernity started with European use of these inventions, but that its far less obvious now that these are the key factors. Similarly, if youre looking at the rise of capitalism, its not easy to see why 1500 is the key date rather than the thirteenth century (given there is research on banking crises back to the 1250s). The effect of the Age of Discovery and the beginning of colonial empires remains more plausible as a motor for Western growth, but not much of this effect comes before 1700: the Spanish and Portuguese empires had a terrific impact on South America, but a fairly transitory one on European history, for example. The slave trade and its commercial effects (now often seen as a key reason for Europes advance relative to China or India) is more a phenomenon of the eighteenth than the seventeenth century. In many ways the label of modernity is arbitrary, as exemplified best in the many years when Oxford Universitys Modern History course started in 476 AD. If part or all of early modern history became seen as no longer modern, that wouldnt stop people being fascinated by the Tudors. There are already lots of Medieval and Renaissance centres and courses and journals. Even museums now seem to be getting into the act. But I think some early modernists may find it hard if they are expelled from the circle of modernity: it may smack to them of a loss of status: who wants to be non-modern and possibly irrelevant? Medievalists have many years of experience in showing that the non-modern is still vital perhaps the early modernists will have to learn the same methods to show their continued importance.
0.7362
FineWeb
Before the Enlightenment, the canonical Gospels were thought of as, among other things, written copies of the past. The documents and the history beneath them were taken to be, for all practical Christian purposes, identical. Modernity, however, has inserted a wedge between the literary Jesus and the historical Jesus, and it has pried them apart. The experts may not, when dealing with this saying or that event, concur on the degree of distance between the words on the biblical page and what really happened, but no one who is informed can, without further ado, equate the text with the past: the former often strays from the latter. The order of episodes in Luke is not the same as that in Matthew, so at least one of those gospels does not narrate events according to their historical sequence. And the Jesus of John does not much sound like the Jesus of Mark, so at least one of those representations must be farther from the historical Jesus than the other. What are we to think when our modern historical reconstructions do not match the narratives of our sacred texts? Does history become our authority and so trump the text? Can history somehow replace the text? And what is the theological status of a passage whose historicity is debated or denied? Dale C. Allison Jr, The Historical Christ and the Theological Jesus, pp 40-41. Allison is Princeton Theological Seminary’s Professor of New Testament.
0.5084
FineWeb
Pixels, Plows & Personas: The UX of Food Deserts According to the USDA, a “food desert” is any part of the United States where healthy, affordable food is difficult to obtain, either due to low household income or poor accessibility. In order to close the gap between farm and fork, mobile apps and shopping sites must be barrier-free for both consumers and small-scale suppliers. Although government spending encourages food purveyors to set up shop in food deserts, these interventions are a gamble — and some feel that our increased “Walmartization” of consumer behavior will negatively affect food distribution and quality. Recent trends in urban farming point to an emerging optimism, and it’s likely that virtual grocery stores will soon be the primary driver in improving nutrition literacy. This presentation will examine the cultural and societal impact of technology on food communities, and we'll explore why user-centered design may be the key to solving one of our most fundamental human dilemmas. Kel Smith is a longtime speaker, author and practitioner on digital accessibility and healthcare innovation. His presentation credits span fifty cities in six countries. He is the author of the book "Digital Outcasts: Moving Technology Forward Without Leaving People Behind," published by Morgan Kaufmann in April 2013.
0.7057
FineWeb
Is 5G Safe? Just like when microwave ovens and 4G services were introduced, the rollout of 5G services has sparked concerns about safety. Should you be concerned? Here are some things to keep in mind. Just like when microwave ovens and 4G services were introduced, the rollout of 5G services has sparked concerns about safety. If you perform a web search, you will find many viewpoints on the topic. Some people are saying it’s harmless, while others are warning that it will cause cancer and other health issues. A common argument among the latter group is that 5G is dangerous because it travels over higher frequency radio waves. Another argument concerns what has been said in a certain report by the World Health Organization. So, is 5G safe? To better answer this question for yourself, you need to be familiar with some basic science. Electromagnetic Radiation 101 There is electromagnetic radiation everywhere around us. This radiation travels in waves and varies in the amount energy (aka strength) it has. The shorter the wavelength, the more energy it has — and the more dangerous it is. Some radiation is so strong that it can damage people’s cells and DNA, which increases the risk of developing cancer. This is referred to as ionizing radiation. Radiation that does not damage cells or DNA is called non-ionizing radiation. However, even non-ionizing radiation has some health risks. Exposure to intense, direct amounts of it can result in tissue damage due to the heat generated. Electromagnetic radiation causes electromagnetic fields (EMFs). These fields are broken down into two categories based on their frequency (i.e., number of waves per second): - Higher-frequency EMFs (e.g., x-rays, gamma rays) - Low- to mid-frequency EMFs (e.g., radio waves, microwaves, visible light) EMFs in the ionizing radiation part of the electromagnetic spectrum — known as ionizing EMFs — include x-rays and gamma rays. The rest of the EMFs are referred to as non-ionizing EMFs. They include radio waves, microwaves, and visible light. Where 5G Fits in and What It Means As previously mentioned, a common argument among 5G opponents is that 5G is dangerous because it travels over higher frequency radio waves and therefore will increase the chances of getting cancer. The first part of this statement is true. The frequency of high-band 5G typically ranges from 24 to 40 gigahertz (GHz), which is a big step up from 4G LTE’s frequency of around 2.5 gHz. However, the frequency of high-band 5G is far below the frequency of the various ionizing EMFs, which starts around 30 petahertz (PHz) — in other words, around 30 million gHz. Since a 5G radio wave is not an ionizing EMF, exposure to it won’t damage your cells or DNA, or increase your chance of developing cancer. Plus, while exposure to intense, direct amounts of non-ionizing radiation can result in tissue damage, regulatory agencies around the world know about this issue and regulate it. For example, the US Federal Communications Commission (FCC) sets limits on how much humans can be exposed to radiofrequency emissions from cellphones, transmitters, and facilities. 2B or Not 2B Another reason why some people believe that 5G is unsafe stems from a classification in a report by the World Health Organization’s International Agency for Research on Cancer (IARC). This agency conducts and coordinates research into the causes of cancer. After it researches whether a specific item causes cancer, it places it into one of the following cancer-risk categories: - Group 1: The agent is carcinogenic to humans. - Group 2A: The agent is probably carcinogenic to humans. - Group 2B: The agent is possibly carcinogenic to humans. - Group 3: The agent is not classifiable as to its carcinogenicity to humans. - Group 4: The agent is probably not carcinogenic to humans. IARC classified radiofrequency electromagnetic radiation as 2B. This might sound alarming, but a rating of 2B basically means that there’s not enough evidence to either say it is or is not carcinogenic. Other items such as aloe vera extract, carpentry, gasoline, and even pickled vegetables are also classified as 2B by IARC. The 2B classification also alludes to the need for more research, which is a good thing. Just because there is no undeniable proof either way right now does not mean that can’t change. Humans are always discovering new things and gaining a better understanding of the existing world around them. Two common reasons for claiming that 5G is unsafe — 5G’s higher frequencies and IARC’s 2B classification — turn out to be non-issues, which helps alleviate some of the fear surrounding 5G. These non-issues — combined with the fact that scientific consensus currently says we have nothing to worry about — means you do not have to forgo getting a new 5G phone if you want one. But it is always a good idea to keep an open mind in case any new developments arise in the future.
0.9371
FineWeb
THOR LMG 200 Pouch Intended for transportation and fast reload of a 200 round Light Machine Gun magazine. - Adjustable/removable shoulder strap, a handle and the ALPHA Slot Attachment Interface permits to transport the ammunition as the situation requires. - Zipped acces or speedloading directly from the side opening covered by a OMEGA grab-tab. - ALPHA Square Attachment Interface at the top and on the side. - Eyelet at the bottom permits draining of water.
0.685
FineWeb
When it comes to survival tips and techniques, the more you know, the better. While you can't possibly prepare for every single thing that is out there, you can try your best to be as aware of many of them as you can. Sometimes these bits and pieces of knowledge can seem quite like useless trivia at times, but don't be fooled. The knowledge is there not to be useful ALL the time, but rather to be there when you need it the most. That is why we put together a massive list of 50 Survival Tips and Tricks for the outdoors. Table of Contents - Best Survival Tips and Tricks: Ultimate Guide List - How to create a thick fire signal - How to stay cool in the desert - 2. Staying Cool in the Desert. - 3. Learn to tell where North is without navigational survival gear! - 4. What if you don't have a watch? - 5. Always have char cloth ready. - 6. Use hand sanitizer from your survival kit to start embers. - 7. Shave off that fat wood! - 8. Learn basic body insulation. - How to get water from trees - 9. Get water from trees. - 10. Use toothpaste to relieve bug bites. - 11. Put tampons on your survival first aid kit! - 12. Keep that used up lighter. - 13. Have aluminium foil handy. - 14. Reduce excessive light with masking tape. - 15. Always know how to find the North Star. - 16. Consider a guitar case as your choice of survival bag. - 17. Keep those carbon steel parts! - 18. Grill survival food with metal picks. - 19. Rocks around the campfire are very useful. - 20. Improve taste of water by using simple survival techniques. - 21. Always wear a survival bracelet. - 22. Add aluminium sheets to your survival shelters. - 23. Carry glow sticks with you! - 24. Bring a poncho. - Never use dirty water to wash out wounds - 25. DO NOT use unclean water to wash wounds. - 26. Always carry with your water purifying tablets. - 27. Know what to do with animal entrails and faeces. - 28. Process food away from the camp. - 29. Save energy on chopping wood. - 30. Sleep on elevated surfaces. - 31. Organize your survival pack efficiently. - 32. Minimize layers. - 33. Bring around an extra pair of socks. - 34. Treat those blisters! - 35. Balance food and water. - 36. Learn how to do S.O.S, among other survival tactics. - 37. Know the universal “wave.” - 38. Setting up camp in the proper location is the first of all outdoor survivor techniques. - How to use fungus to start fires easily - 39. Use fungus to start fires easily. - Fire lighting using horse hoot fungus - How to make a wilderness torch for survival - 40. Make an easy torch. - 41. How to collect rainwater for survival. - 42. Invest in waterproofing as much as survival tips and tricks. - 43. Filtering water is one of the most important survival skills. - 44. Reflect heat around the campfire. - 45. Always have two signal mirrors. - 46. Learn about the medicinal properties of nature’s products around you. - 47. Fight intestinal infections with acorns! - 48. Fight constipation with other kinds of tea. - 49. Dock leaves are instant antihistamines. - 50. Willow barks are natural aspirins. - Additional resources for you to read: Best Survival Tips and Tricks: Ultimate Guide List How to create a thick fire signal 1. Create a thick fire signal. A combination of fresh pine and spruce leaves produce a lot of smoke, which is what you want with the signal. Start out by building a small fire using dry leaves, twigs, or other tinder. Collect the fresh pine and spruce leaves and compile them into a bow. When the fire is up and smoking, put the leaves over the fire, making sure to cover it completely. This will cause the branches to burn intensely, producing even more smoke. Additional things to consider: - Choosing the location - ideally, you want to build a fire on elevated grounds, such as a peak, top of a hill or ridge. Clear the area so that the fire will not catch onto nearby twigs/other flammables. If it's too difficult to clear the area of debris, then the next best option is to isolate the fire with stones to control the fire. - What creates the thick smoke? - Dry grass, leaves, pine needles, paper, wood shaving, small sticks are great for starting fires. To sustain the fire, you will need to find dry wood , full branches and anything similar that will provide a slow but long lasting fuel. To create more smoke; simply add living branches, wet leaves and even rubber materials. - Don't forget to thoroughly extinguish the fire when you depart your location or when you are rescued. The last thing you want to do is start a raging fire in the forest. How to stay cool in the desert 2. Staying Cool in the Desert. This may not be the best-smelling solution to preventing heatstroke when you're out in the scorching desert, but it works. Take a piece of cloth like a bandana and soak it in urine. Wrap it around your head and it will keep your head from feeling the wrath of the sun. Heat stroke is the second leading cause of death in the desert, next to dehydration. If you need the help of a compass but you don't have one, you can use an analog watch to do that. Point the hour (short) hand at the sun and draw two imaginary lines between it and the 12 o'clock point. You will create an angle between the two lines. Draw an imaginary straight line bisecting the angle. The line point away from the sun is north, because the sun always goes to set in the west direction. Disclaimer: telling time by sun doesn't work as effectively when you are too far up north or south. 4. What if you don't have a watch? Don't worry. As long as you know what time it is, you can still tell where north is. Simply draw an analog representation of the time on the ground and draw the lines from there. Cellphones are particularly useful in telling the actual time regardless where you are because mobile tech nowadays uses GPS to be able to tell the time of the day regardless of location. Of course, it's always advised that a survivalist have a watch with them at all times. 5. Always have char cloth ready. Take any small piece of cloth and place it inside a metal container. Make sure that the container has a cover. Burn the container (with the cloth inside it) for a couple of minutes. You know you're doing it right if the cloth remains intact but is dark from all the burning. Char cloth is really great for starting fires because it catches fire with just a small spark. Tip: Try cutting or ripping a large cloth into really small pieces and neatly roll them inside a tuna can. You'll have yourself an entire pack of char cloth! How to Start a fire using hand sanitizer [how to video] 6. Use hand sanitizer from your survival kit to start embers. Hand sanitizers may look like they’re only useful for cleaning your hands, but they’re also good for starting fires. This is because they contain alcohol, which is flammable. Simply use some of the stuff on a char cloth or some leaves or other tinder and they’ll easily catch fire from a spark. So always keep a small bottle in your pocket. 7. Shave off that fat wood! The resins from pine trees are very useful if you reduce them into tiny shavings. They easily catch fire and can therefore be used as an easy to find ingredient to starting fires because the can be found practically everywhere. But what makes them special is that the smoke that's produced from burning the shaved fat wood makes effective mosquito repellents. Insulation against cold [HOW TO STAY WARM] 8. Learn basic body insulation. This is a life saver in many situations where you're caught in really cold weather and you've got no means of starting a fire. Simply stuff newspaper, dry grass, and leaves under your clothes and you'll be retaining significant amounts of body heat when you need it the most. You can do this to almost all of your clothing, from head to toe. How to get water from trees 9. Get water from trees. This works on any tree, but it works better with those with leaves that are directly exposed to the sun. Wrap a plastic bag around the leaves. When the sun forces the water inside the leaves to evaporate, the water will be trapped inside the plastic bag and settle into the plastic bag. With proper positioning, the water will be trapped in a way that you can simple poke a hole through the bag so that the water flows through. You can then keep the water in a container. Note: Make sure your plastic bags are clean. It takes grit and a little bit of creativity, but sometimes knowing unique places to find water will be the difference maker in staying hydrated. Similarly, you can use the same tactic to extract water from plants. 10. Use toothpaste to relieve bug bites. This is a well-known home remedy for burns and some wounds, but few people know that their tooth paste can help treat bug bites as well. This is because they have properties that will help sooth any itchiness or pain that most bug bites cause. They will also help reduce any swelling that might result from the bites. 11. Put tampons on your survival first aid kit! Tampons are very effective in dealing with deep wounds because they were designed to absorb lots of moisture. They also gradually take the shape of the wound as they swell over time. You can bring lots of them because they're small, lightweight, can be bought almost anywhere, and are pretty inexpensive. 12. Keep that used up lighter. If your Zippos or flintlock lighters have run out, keep them because you can still use it to make fire. There's usually cotton inside these types of lighters. Take them out and use the flint to create a spark. The cotton is usually so dry it will catch fire easily. Alternatively, you can keep using the lighter to create sparks that could help you start a fire with other types of tinder like char cloth. When SHTF you need to make use of every resource you own. Our friend Unclearless demonstrates on youtube just how this technique is done. (Fastforward to 5 minute mark if you want to jump right into it) 13. Have aluminium foil handy. While you'll always have this in your survival food kits to store your food, keep a separate sheet in your bag to always have a dry surface. This can come in handy as a dry surface to start fires on, especially when it just rained and the soil is too damp for you to be able to start a fire. Use this with your char cloth and other tinder you have with you and you'll be able to start a campfire even when it's wet outside. Aluminium foil can also be used as a makeshift bowl. Simply place a rock on top of the foil and wrap around, using the rock as a mould. Tin foil can also be used as a reflector around a camp fire to maximize the heat. The uses of aluminium foil are endless. 14. Reduce excessive light with masking tape. Having too much light from your flashlight could be dangerous at night depending on your situation. Placing a masking tape over the light will lessen the amount of light enough to give you a low profile while giving you enough to be able to work with. 15. Always know how to find the North Star. The North Star always points to true north, which is great for when you don't have a compass at night or when you want to check the accuracy of the compass you have. Try looking for the big dipper first, which is easy to find if you know your constellations. Then draw an imaginary straight line through the edges of the big dipper and this will lead you to the tail of the little dipper. This is the North Star. 16. Consider a guitar case as your choice of survival bag. This is a rather unusual but very useful alternative to the typical bug out pack. The shape of the bag will allow you to store an unbelievable large amount of things. Plus, it's very inconspicuous, especially when a hiker's or camper's backpack is often the easiest way to spot a person who isn't from around the area, which can have its disadvantages. It's a good way to pack lots of stuff without sticking out in public. We put together a guide for what to include in a bug out bag. Check it out 17. Keep those carbon steel parts! The carbon sheets that you can get from saws have been proven to be able to withstand 22 calibre pistol bullets. With just a bit of duct tape and some proper attachment, you can create armour around your backpack and clothes that will protect you from shrapnel, arrows, and certain types of bullets. They're bendable, snap proof, and pretty darn useful. There is a caveat though, Carbon steel will rust and is not stainless steel. Always check for the health condition on your tools before use. 18. Grill survival food with metal picks. You will most likely have long, thin, metal rods or picks (used for tents) among your equipment. You can use this to form a makeshift grill but laying them across two logs. Use twigs and strings to keep them intact when necessary. Set this up over a fire and you can grill fish over the picks. You can use an aluminium cup to boil water over this setup as well. 19. Rocks around the campfire are very useful. Even after the fire had died, the rocks will still hold on to enough heat to keep you warm. The heat of the rock can also be used to purify water. Simply place them inside aluminium cans filled with water. It will cause the water to boil, purifying it enough to be safe to drink. In some scenarios, it might be necessary to boil water underground. We have you covered; here is our guide to how to boil water underground. How to use charcoal to treat diarhea [GUIDE] 20. Improve taste of water by using simple survival techniques. The water from swamps, even after they've been purified, can still smell really dodgy. To remedy this, add some charcoal to the water while it's being boiled. Not only does this add to the purification process, but it also makes the water taste much more "drinkable" and jettison the bad smell. 21. Always wear a survival bracelet. More popularly known as paracord bracelets (because they're made from the same material as military issued parachutes and equipment), these bands are more than just accessories. They're actually cords that are woven together, which you can unravel and use partly whenever you need the cords to tie stuff up. Almost every single piece of the paracord bracelet is usable string - right to the small threads that are used to keep the end of the cords together. Use them to tie stuff, hang food, set up traps, and even as tinder to start fires. 22. Add aluminium sheets to your survival shelters. The aluminium blankets or sheets added to your shelter will significantly increase your shelter's heat retention capacity. Aluminium facing outward of the shelter can also reflect sunlight, allowing you to stay cooler under the shelter. Among the survivalist community, these are referred to as "super shelters," and rightfully so. Using glow sticks for survival 23. Carry glow sticks with you! These aren't just for rave parties. Glow sticks make it easy for you to be spotted at night (i.e. by rescue groups). When needed, activate one of the sticks and tie them with a paracord outside your backpack, allowing it to hang freely. You will be very easy to spot even in pitch black darkness with these glow sticks. Top 10 uses for a survival poncho [survival video] 24. Bring a poncho. These seemingly simple disposable raincoats actually have so many uses in the outdoors. Obviously, it's best used as a raincoat, but here are some other things you can do: • Use it as a makeshift shelter. It's big enough to fit one person. • Use it to desalinate seawater. Just boil seawater underneath a tented poncho to catch the vapour and produce the water through condensation. This will separate the salt from the water, making it drinkable. • Use it to collect rainwater. Never use dirty water to wash out wounds 25. DO NOT use unclean water to wash wounds. While this sounds like common sense, a lot of people will make the mistake of using water in rivers to clean their wounds without treating them first. Bodies of water, as clear as they may seem, will have bacteria from all sorts of matter, including animal faeces. If your hand has any cuts or lacerations, don't ever dip them into the water. How to use water purification tablets for survival 26. Always carry with your water purifying tablets. You can't always depend on a fire source to be able to boil water, such as when it gets rainy and the ground and everything else is too damp to ignite. Also, you can't always start a fire when you're injured. In these instances, it's better to pop a tablet into a container so you get the much needed water instantly. 27. Know what to do with animal entrails and faeces. When it comes to stuff that animals leave behind, make sure you don’t dispose of the ones that you can use as fishing bait, repellents, etc. Some of these include: • Using bones to make tools/weapons • Using urine of female dead animals to attract other animals for food • Using pelts and skins to make small pouches, etc. Don’t just throw these things away. Figure out if there’s some way you can repurpose the excess parts after you capture your game. 28. Process food away from the camp. Remember that when you process food you catch (i.e. trapped animals or caught fish); you’re likely to leave stuff behind such as blood, bones, inedible parts, etc. If you process your food near you’re going to attract wild animals. They’ll be sniffing around the camp and around you, which could be dangerous. The same survival tips apply to disposing food remains. Cutting down logs without saws, knives or axes 29. Save energy on chopping wood. Don’t bother using an axe. Just place the wood pieces diagonally between the ground and a tree. Give the pieces of wood a good kick (inspect the wood before doing this and assess the right balance between force and strength to avoid breaking ankle/leg). The last thing you want to do is have a broken leg, so do be careful with how you proceed with this tip. Another alternative is to use an axe but since the objective is to build fires anyway, it doesn't need to be perfectly chopped. However, if the wood material will be used for shelter building or creating other necessary pillars, using tools are a good idea. In fact, we put together a resource on how to make a survival shelter, given the popularity of this topic. 30. Sleep on elevated surfaces. Sleeping on the ground will cause you to lose body heat faster, making it more likely for you to get cold. Sleeping on a poncho or a really thin blanket isn’t going to help this either. The best way to do this is to stack up leaves or logs to make a padded bed. Alternatively, you can bring a hammock with you and just set it up when you sleep. How to organize your bug out bag or your survival pack 31. Organize your survival pack efficiently. When arranging the stuff in your rucksack, follow these principles: • My next tip maybe common sense to some, but figured it's still worth noting: for better maintenance of keeping balance, it's best to keep heavier things on top and the lighter items at the bottom. What this will do is help you with stability while you are on the move. • Make sure the backpack is positioned to be on your upper back always. This will allow you to walk freely without your rucksack getting in the way of your legs. • Don’t forget to tighten those straps to prevent stuff from falling off. The wilderness can be full of snags, thanks to branches and bushes. Read more here: creating a bug out bag 32. Minimize layers. Campers often think that you have to bundle up all the time to protect yourself from the cold. But if you cover up too much even when you don’t need to, you’re likely to sweat inside, which minimizes insulation. As long as you’ve got your extremities (i.e. hands, feet, and head) covered, you can go about in cold environments as long as you’re moving. Reserve those extra layers for when you’re sleeping, because you’re not moving around at all. 33. Bring around an extra pair of socks. Aside from the fact that they can help keep you warm, socks are really good for a lot of things, such as filtering water and suspending small objects off branches. Wearing socks when you’re in the wilderness will also keep you from getting blisters, which is likely to happen when you’re walking around and exploring the wilderness all day. Plus, these are pieces of warm clothing that are very easy to dry out in case they get wet. For maximum foot protection on the trails and in the wilderness, it's worth the investment to own a pair of durable leather combat boots that are both comfortable and rugged. The hard sole and ankle protection provide additional security when you step into diverse terrain. 34. Treat those blisters! Blisters can be a literal pain, and they happen a lot when you’re out in the wilderness. If you have a blister, take a needle and a string and poke a hole between two opposite ends of the blister. This will drain the water out and allow the blister to heal faster. If you think you’re about to get a blister, use duct tape to cover the area. This will prevent the blister from forming in the first place because it minimizes friction. 35. Balance food and water. Too much of either one can be harmful, if not fatal to your body. If you’re dehydrated, do not eat anything until you’ve had water because the food will only absorb the remaining water in your body and cause you to be dehydrated even more. Drinking too much water can also mess up your metabolism and cause lots of complications long term. Always make sure you have enough of both food and water. How to send out an S.O.S. 36. Learn how to do S.O.S, among other survival tactics. This signal is literally a lifesaver, so you need to know how to do it in both light and sound. The signal is represented by three dots followed by three dashes, followed by three more dots. In sound, this means having three quick taps followed by three slow taps, and then three more quick taps. The same can be applied to using light signals. Make sure you practice this before you go out there. 37. Know the universal “wave.” Stand up with your legs apart. Raise both your arms and wave them up and down. You’ll look like you’re doing jumping jacks, only without the jumps. 38. Setting up camp in the proper location is the first of all outdoor survivor techniques. The rule is to stay high and dry. Staying dry means you stay away from bodies of water, as convenient as it may seem. This is because water attracts both insects and animals; the presence of either near your camp could cause complications. Higher ground also means a better view of your surroundings while making it easy for rescuers to spot you. You can also work on picking a place that makes your camp easy to spot from the sky. How to use fungus to start fires easily 39. Use fungus to start fires easily. Coal fungus and horse hoof fungus have both very flammable properties. Break the fungus in half and you’ll reveal their flammable parts right in the core. They easily catch sparks. Most of these fungi are usually found in dead trees, which means you’ve got a good source of dry material there as well. What makes fungi particularly unique as tinder is that they smoulder – all you have to do is to blow into the ember to make the fire grow. Because of this, they make portable firelighters as well. Fire lighting using horse hoot fungus How to make a wilderness torch for survival Here is a showing of how to make a torch using just tightly secured phragmites. The torch in the demonstration is really all you need for a 15 minute walk or for 15 minute spear fishing task. There's only really 2 materials needed to make such torch: - Burning material - it can be anything like phragmites, long grass, and bark (on occasion). You want dry long material as possible with only a bit of green to slow down the burn. - Binding material - you can use willow shoots, bark or anything that can secure a tight hold to keep the burning material together. 40. Make an easy torch. Torches are pretty useful to wave at a rescue team from above. It’s also a good way to light your path during the night if your flashlights die on you. To make one, take a long branch and split the tip in half. Take some tree bark and insert them between the split branches. Ignite it and you’ve got yourself a torch. Birch trees are pretty ideal for this because of their flammable material. Make sure you invest in a handy flashlight to be safe. Collecting rain water to survive 41. How to collect rainwater for survival. After a rainfall, you can bet that moss, leaves, and all sorts of plants around you are wet. Collecting bundles of them and wringing them over a container can net you as much as a litre of water. Make sure you check out the tall grass as well. This is good for collecting fresh water because rainwater is guaranteed to be clean. This is also one of the easiest ways to collect water without having to purify it. Alternatively, you can also rub your clothes against the grass and wring out the moisture that gets stuck unto them. 42. Invest in waterproofing as much as survival tips and tricks. This means going for waterproof versions of equipment (i.e. watches and compasses) and getting equipment that will keep your other stuff protected from water. Always use containers that have waterproof seals and never mix anything damp with all your other drop stuff. This is especially important for food containers, because moisture can only hasten spoilage. Water may be essential for hydration, but for everything else, staying as dry as possible is a must for survival. How to make a survival water filter [VIDEO GUIDE] 43. Filtering water is one of the most important survival skills. You never know what’s inside a stream or river. It has all sorts of stuff that you probably don’t want in your system. Grab a sock and fill them with charcoal. Follow it up with a layer of sand and then finally a layer of grass. The grass will catch the large particles in the water while the sand will filter out the fine granules. The charcoal will purify the water of any harmful chemicals. How To Build A Fire Heat Reflector For Cold Weather Survival [Tips & Techniques] 44. Reflect heat around the campfire. Even without aluminium foil or space blanket, you can still conserve heat from a fire by creating a natural reflector. First, create four stakes that will serve as a rack next to the campfire. Stack green (as in fresh) stakes into the rack until they pile up into a small wall next to the campfire. This will reflect heat otherwise blown away by the wind, giving them all to you. This will work as long as you sit across the reflector. How to use a signal mirrors to grab attention 45. Always have two signal mirrors. Relying on one signal mirror isn’t a good idea because the sun always travels south. This means that a single mirror will not allow you to catch the attention of rescuers flying from the north. The second signal mirror will be essential to reflect the light you get from the south to reflect it into the northern direction. Simply hold one of the mirrors facing south and another facing north, making sure that the light bounces off both. 46. Learn about the medicinal properties of nature’s products around you. Crab apples, for instance, have healing properties in their raw form. They possess astringents that can be rubbed across cuts and lacerations, causing the wounds to tighten and heal faster. Pine resin, on the other hand, are great antiseptics. They can be used topically on wounds or gargled to clean the mouth. They’re usually found in solidified form within the tree, but you have to melt them first before using. If found fresh and still gooey, you can apply the substance immediately. 47. Fight intestinal infections with acorns! These, along with oak bark are rich in butyric acid that combats the effects of diarrhoea, among other things. Additionally, you can make medicinal tea by brewing them in hot water. The tea alone will help you fight intestinal problems like dysentery and cholera. You can also use the tea to help treat mouth ulcers. This tip also applies to blackberry leaves. They have less butyric acid than acorns but they will help as well. How to make a rose hips tea For more information around best wild teas for survival, check out our guide here: Top 10 Wild Teas for Survival 48. Fight constipation with other kinds of tea. On the other hand, the fleshy part of rose hips can be used to treat constipation. The outer shell, on the other hand, provides lots of vitamin C. You can also make tea out of dandelions. The plant is edible as well. 49. Dock leaves are instant antihistamines. For those who get bitten by bugs, simply take the sap of these leaves and mix it with saliva. Apply the mixture to help relieve some of the discomfort while effectively preventing the bite or sting from getting worse. How to make a willow bark tea 50. Willow barks are natural aspirins. Chewing on the middle barks of a willow tree are known to have helped with sudden headaches or colds. Don’t try this if you know yourself to be allergic to aspirin. Remember, it’s always much better to know more than less of the best survival tips when you find yourself in the wilderness. Of course our goal at Authorized Boots is to provide even more value so here are few more general survival tips: - Always aim to memorize the map of the area. You should always aim to have a laminated or waterproof case of a map to ensure security of map. We highly recommend that you try to memorize major landmarks, rivers, roads, and other areas that stand out on the map - Redundancy in the wilderness is your friends: always have extra knives, compasses, water gathering tools, and fire starting tools. Remember, surviving is all about making sure you have secured basic necessities to cook, stay warm, and self-defend. - Fish tastes the best when it is smoked but when you boil it, it offers the most amount of nutrients. It saves the fat under and in the skin. If you smoke it, the excess fats evaporate. - When you are getting really low on calories, never forget that insects are a source of protein. Look under logs, rocks, near trees to source them. - If you have the luxury, catch a small fish with a hook and string and use that fish to catch an even bigger fish. Definitely want to fish during dawn and suck for the best bite in most locations. - Did you know that animal organs like bladder and snake skins can be improvised to store water? DISCLAIMER: the tips provided in this list does not guarantee survival. We are providing insights based on our own knowledge and experience. We simply sharing our personal ideas and opinions with our audience. Use the outlined advice at your own risk. Additional resources for you to read: - Here is a guide for types of food best for emergency storage - How about preserving meat in the wilderness? Here is our guide of that; Meat preservation in the wild - Here's our guides to tactical watches, backpacks, cold weather gloves and binoculars - Here's a method for fish trapping: Basket Fish Trap - Want to learn how to make homemade laundry soap? Check out the guide - Preppers guide to preserving bacon - Here is a detailed guide to shortwave radios - Here is our recommendations for best meal prep containers What are some essential survival tips you'd like to share with the Authorized Boots community? We'd be happy to hear.
0.7246
FineWeb
President Trump and his allies in Congress are pushing to limit both legal and illegal immigration to the U.S., but more important than politics are powerful demographic and economic factors that will shrink future low-skill immigration to the U.S. in coming years, according to new research from economists at the University of California. Bottom line: Between 2007 and 2014, the population of undocumented immigrants fell by 160,000 persons annually, and the authors argue that this is only partly the result of the Great Recession. Other factors driving the decline include: - The end of the Latin American baby boom — the average fertility rate in Latin American countries has fallen from more than 5 children per woman in 1970 to just more than 2 today. - Many Latin American economies have made significant gains in per capita income relative to the U.S., decreasing the economic benefit of emigrating.
0.9357
FineWeb
If you buy Antibodies supplied by ELK Biotech they should be stored frozen at - 24°C for long term storage and for short term at + 5°C. Polyclonals and antibodies Polyclonals can be used for Western blot, immunohistochemistry on frozen slices or parrafin fixed tissues. The advantage is that there are more epitopes available in a polyclonal antiserum to detect the proteins than in monoclonal sera.Rabbits are used for polyclonal antibody production by ELK Biotech. Rabbit antibodies are very stable and can be stored for several days at room temperature. ELK Biotech adds sodium azide and glycerol to enhance the stability of the rabbit polyclonal antibodies. Anti-human, anti mouse antibodies to highly immunogenic selected peptide sequences are" monoclonal like" since the epitope to which they are directed is less than 35 amino acids long.
0.9392
FineWeb
As students are returning to schools and office buildings are being reopened, it’s important to consider the safety of the buildings after extensive closures. Proper precautions need to be taken to ensure building readiness, which introduces a critical question: How do you return the HVAC system back to normal operations (and continued operations)? The American Society of Heating, Refrigerating and Air-Conditioning Engineers (ASHRAE) has formed an Epidemic Task Force that provides guidance on how to re-occupy a building and what measures should be taken. Their recommendations can be found here. Adequate ventilation is vital to good indoor air quality, which may require upgrading or improving current filtration systems. Several of us in the United States and abroad are lucky enough to live in a country where the outside air is very clean. Increasing air exchanges between outside/inside air helps to pull in fresher air from outside, reduce allergens, and increase air quality. ASHRAE’s guidance encourages building operators to increase their system’s outdoor air ventilation as much as the system and/or space conditions will allow. Increasing outdoor air ventilation creates more air exchanges, but if not tempered, this could have a negative impact on: - Indoor humidity levels - Indoor temperature levels - Building pressurization (if the area is unable to exhaust the additional air intake) The building system needs to be evaluated and tested with proper equipment by qualified HVAC professionals to ensure that the system is running safely and efficiently. ASHRAE also recommends upgrading filtration to at least a MERV 13 filter efficiency. Higher efficiency filters help remove smaller particles from the air, but also require greater air pressures to force air through the filter. When changing the filter, make sure to validate the changes in airflow caused by the filter change. This will help keep the system running safely and efficiently. In conclusion, increasing outside air input and improving the filter efficiency where necessary will help ensure the wellness and safety of buildings and their occupants. Dwyer offers a complete suite of test and balance equipment and indoor air quality (IAQ) sensors for HVAC professionals when determining air flow, temperature, humidity, and building pressurization.
0.973
FineWeb
Sure, @ncagutierrezart! I like trying to answer questions. 🙂 Yes, the English word heresy does come from Gr. hairesis, via Old French and Latin (where it means “school of thought” or “philosophical sect”). Here’s some more information from one of my favorite websites, the Online Etymology Dictionary: heresy (n.). The word hairesis ultimately comes from Gr. αἱρέω (a common verb with the primary meaning “take” and a bunch of secondary meanings). The form αἱρέομαι is in the middle voice (αἱρέω is in the active voice) and means “take to oneself” or, by extension, “choose.” If you’d like to look up more detailed information about the verb αἱρέω (or other Greek words), I’d recommend the University of Chicago’s Logeion app, which draws from major classical dictionaries and includes examples from the ancient corpus, or Tuft’s Perseus Digital Library (a lifesaver for me in college!). I don’t know what kind of computer you have, but if you’re interesting in learning how to type in the Greek alphabet, try googling how to type in Ancient Greek (polytonic). There’s a lot of good resources out there from various classics departments. The keyboard used is called polytonic Greek, which I’ve installed on my devices in addition to the regular English keyboard.
0.5097
FineWeb
Legal steriods, legal steroids 2021 I can pull up a thread where bodybuilders are taking anabolic steriods and finasteride and some of them swear buy itif it's not banned, but the truth is it's like an aspirin and it does one thing, and that's block it. In a way it can protect from all the other side effects that the drugs can have, but that's only if we don't think about the effects the drugs create. It's so different when you have something as powerful as testosterone that will alter a hormonal balance, mobbs wheatley. And if we look at the studies that have been done, the studies that show the effects on bodybuilders it's actually testosterone and anabolics and so on, and that has never been tested. And this study of the effects of finasteride, what's really interesting is that there were a number of studies done after that, with women, legal steriods. And what was found in them was that they had lower sexual desire, more depression, had more anxiety symptoms than the men who had not been taking the drugs. It's actually been shown in a number of these studies that finasteride, at concentrations low enough, can actually act like an anti-depressant. And so we see these effects where women have decreased sexual desire and in some cases sexual dysfunction, and with the studies in other countries, men who take a combination of drugs have sexual dysfunction for long periods, sometimes years, but they have less libido than men who take a single drug, clenbuterol cycle for sale. So there's got to be something that this compound does that just doesn't have that same effect on one group, but this would suggest that it's more than just an anti-depressant. And so we're finding it out in terms of sex drive and things like that, winston xs blue. And with the effects of finasteride that are not so well documented. And what I found in looking at this is that studies that looked at the effects of finasteride were done in male athletes, in particular in male athletes with a history of breast cancer, so they were very young, steriods legal. That's why the studies that I'm talking about today on male athletes are very good ones because we don't know what the long-term effects of this would be for men. It's a concern with this compound because it seems to have a pretty large cumulative dosage. So what we've really never seen tested so far is that, dbol vs anavar. And to the extent that it's a hormone that could affect other areas of an affected body, then you'd be much better off avoiding this. Legal steroids 2021 Legal steroids is a term recently developed to refer to legal steroids online or legal steroids that work alternativesto steroids that have been banned for human consumption. Legal steroids products (also called "compounds") can be purchased legally online or found under the "fake" or "fake-legal" classifications on internet stores. They're intended for use in a non-recreational medical context as a supplement, legal steroids.com reviews. In some ways they resemble substances of abuse. But in other ways they don't, best legal steroid for cutting. To find out more about the differences see the FAQ about Legal Steroids, legal anabolic steroids gnc. The United States Pharmacopeial Convention defines medical supplements as containing substances that are approved for use for the following purposes: a) Treatment of a medical problem of a person, or of a patient or any member of the patient's immediate family, who is suffering from, is in pain from, or otherwise requires treatment for the medical condition b) Treating a physical, mental or emotional disorder in order to relieve the symptoms or the effects in the person c) Improving physical or mental performance d) Preventing the effects of diseases or injuries e) Supplying a person with the nutrients needed for the person to grow or develop f) Providing vitamins, minerals or other vitamins, minerals, or other substances to nourish the body f.1) Supplying a person with an organic food product containing vitamins, minerals or other essential elements f, top legal bodybuilding supplements.2) Supplying a person with other products that contain vitamins, minerals or essential elements that are also intended for use in human consumption g) Treatment of a physical, mental or emotional disorder, or a symptom(s) associated with one or more disorders, in order to help the person recover from such disorder h) Providing a person with food, drinks or other items that provide a person with a nutritional condition or an electrolyte balance required to sustain and restore healthy human health l) For the prevention of infections m) Providing a person with an organic food, mineral or other food product that is intended for use in human consumption for its nutritional potential n) For the nutritional condition of persons consuming organic food products (i.e., vitamin, mineral or other substances) o) For the preservation of or restoring health or normal functioning of human organs or organs intended for human consumption p) As a supplement or alternative to conventional medicines for a biological, therapeutic or medical purpose s) For the purposes authorized under this chapter: undefined Related Article:
0.7925
FineWeb
What is a Thrust Block Definition of Thrust Block in Construction The term thrust block refers to any type of element that will absorb, or take the thrust that occurs when a liquid is forced through a conduit system. For example a water line that is installed underground, will exert substantial force on any joint or turn of direction in the piping or conduit system. Liquid when flowing in a contained system will push on the opposing wall of the system when the flow of the liquid changes direction. This force on the opposing wall will push the system against this joint or change in direction. If the conduit system is not supported with what is referenced as a thrust block, then would be a chance of the entire system shifting and being compromised. To ensure that this thrust does not incur damage to the piping or conduit system, thrust blocks are installed at the joints and change in direction. In most cases, these thrust blocks are constructed of blocks of concrete, which are poured in strategic locations, to absorb the thrust of the liquid as it changes direction. Mechanical engineers will engineer the location of these required thrust blocks as required. The proper placement of the thrust blocks on a piping system is extremely important to the proper functioning of the system, without any damages incurring, due to the pressures exerted by the liquid flow within the piping system.
0.9905
FineWeb
This article is based on Dr. Ahiakpor’s “A Paradox of Thrift or Keynes’s Misrepresentation of Saving in the Classical Theory of Growth?”, published in the Southern Economic Journal, Vol. 62, July 1995, pp. 16-33. Ask a group of economists whether saving is necessary to promote investment and economic growth, and you will get a variety of responses. Some would claim that the answer depends on whether the economy is operating at “full employment,” since outside of full employment their answer is no. Others would simply say no, it is rather investment which makes savings possible. A minority however would say definitely, without saving there can be nothing to invest. Indeed, a debate last summer among historians of economic thought on the internet well illustrates this amazing state of confusion among economists over an issue so fundamental as the primacy of saving to make investment possible. So how did economists get into this state of affairs? Trace it to the publication of Keynes’ General Theory (1936), in which he argues what is now called “The Paradox of Thrift.” Keynes’ claim is that saving at the national level is bad for an economy because when people decide to save more rather than consume, they deprive producers of market demand. As a result, production contracts, fewer people are hired, less income is generated, and the community becomes poorer. And with lower incomes, people will actually save less than they initially intended—so the argument goes. But a community in which people decide to consume more than save would create more demand for producers who will hire more workers, and thus create more income from which more savings will flow. And interest rates are not supposed to react to the changing desires of the public to save. Through this reasoning, Keynes believes he found “an explanation of the paradox of poverty in the midst of plenty,” namely, the problem of wealthy communities making themselves poorer by their inclination to save. Keynes’ argument defies sound logic, although many economics textbooks teach it as if it were valid. Even some of the few who cast doubt on the empirical validity of Keynes’ claim, nevertheless insist that the proposition is theoretically sound. Modern dissenters from Keynes’ fallacy, especially Henry Hazlitt, have had little luck dissuading a majority of the academic economics community from teaching the doctrine that increased saving is a public vice. Some students who go on to fields such as development economics or finance are taught that the public’s saving in the form of purchasing (private) financial assets is conducive to economic growth. But many still get stuck in a state of ambivalence, never being sure whether saving is logically prior to investment. Such is the state of economics education that Axel Leijonhufvud calls Keynes’ paradox of thrift “one of the most dangerous and harmful confusions ever taught as accepted economic doctrine,” but this critique has had little effect in eradicating its teaching. The key to this dilemma for economists is their continued use of the term saving as Keynes defines it in his General Theory (e.g., pp. 81, 166-67) such that it could mean the hoarding of cash, which is inconsistent with language of the marketplace as well as the teachings of economists before him, including Adam Smith, David Ricardo, and Alfred Marshall. Indeed, when people think of saving, they do not plan to accumulate in cash portions of their monthly paychecks under their mattresses or in their stockings. Rather they think of putting such funds in a bank account, savings or credit union to earn interest, or play the stock market (for capital gains or dividends), or buy bonds for interest income (or capital gains, should they sell them before bond the redemption date). Thus, as Marshall states in his Money, Credit and Commerce, “. . . in `western’ countries even peasants, if well to do, incline to invest the greater part of their savings in Government, or other familiar stock exchange securities, or to commit them to the charge of a bank.” This is why the act of saving is not “the negative act of refraining from spending the whole of [one's] current income on consumption” as Keynes claims it is in his Treatise. But rather, saving is spending on future income-earning assets. Another way to clarify the active, rather than passive, act that saving really is, is to note that it is not the same thing as hoarding one’s income in cash. Henry Hazlitt’s criticism of Keynes on the paradox of thrift proposition focuses on the fact that hoarding is occasioned by government’s disturbance of the people’s confidence which leads to their preference not to hold financial assets. In The Failure of the “New Economics,” Hazlitt also quotes David Ricardo’s correct criticisms of Malthus for the latter’s concerns over excessive saving which could (in Malthus’ mistaken mind) be injurious to effective demand. But Malthus’ firm statement of the meaning of saving, in which he declares that “No political economist of the present day can by saving mean mere hoarding,” better helps to illustrate the error of Keynes’ association of hoarding or nonspending with saving. Similarly, John Stuart Mill’s clarification of the meaning of saving in his Principles helps a great deal. He says: The word saving does not imply that what is saved is not consumed, nor even necessarily that its consumption is deferred, but only that, if consumed immediately, it is not consumed by the person who saves it. If merely laid by for future use, it is said to be hoarded; and while hoarded, is not consumed at all. But if employed as capital, it is all consumed [spent]; though not by the capitalist. Understood as the classical economists taught, and the general public means in common usage in the marketplace, increased saving does not depress total spending, but only shifts the composition of spending more towards investment or producers’ goods and less towards immediate satisfaction of consumption demand. Such understanding helps easily to set aside the analytical fable called the paradox of thrift, promoted to a great extent by Paul Samuelson’s best-selling textbook, Economics, by which increased saving depresses aggregate demand or total spending and causes a fall in subsequent level of income. The great teachers of economics sought to communicate ideas in the language of the marketplace. Indeed, Alfred Marshall urges economists to do the same, arguing in regard to the term “capital” that “economists have no choice but to follow well-established customs as regards the use of the term capital in ordinary business, i.e. trade-capital.” Keynes is known to have made up his own meaning for terms in ordinary usage, much to the confusion of his audience. And many of Keynes’ modern-day followers continue with his distortion of language, as in the case of associating saving with the hoarding of cash, and hence a refusal to spend or “a withdrawal from the spending stream.” Accordingly, modern Keynesians derive some surprising conclusions, e.g., Samuelson and Nordhaus’ warning against “President Reagan’s tax cuts put forth as a means of promoting [private sector] saving” in the United States, and that governments should promote consumption, not saving. But saving is not hoarding. It is what most people understand it to be: buying or investing in financial assets issued by banks and other borrowers or investors. This is why savings promote economic growth, as the classical economists taught before Keynes changed the language of modern economics so drastically to the detriment of meaningful dialogue or communication between economists and the rest of the public. 2. See, for instance, J. Vernon Henderson and William Poole, Principles of Economics (Lexington, Mass.: D.C. Heath, 1991), pp. 279-81, and Michael Parkin, Macroeconomics, 2nd ed. (New York: Harper and Row, 1993), pp. 224-25. 3. See Henry Hazlitt, The Failure of the “New Economics” (Princeton, N.J.: Van Nostrand, 1959) and Economics in One Lesson (Westport, Conn.: Arlington House, 1978 ). Also see Mark Skousen, Economics on Trial (New York: Irwin, 1991), ch. 5, and Dissent on Keynes (New York: Praeger, 1992), ch. 5. 6. John Maynard Keynes, A Treatise on Money makes a similar claim in his General Theory (London: Macmillan, 1930), vol. 1, p. 172, emphasis in original. Keynes makes a similar claim in his General Theory (p. 210). 7. Hazlitt (1959, p. 218) makes the point that “people in a modern economic community do not simply hoard money in a sock or under the mattress,” but does not focus on Keynes’ distortion of saving as defined by the classics. 10. Alfred Marshall, Principles of Economics, 8th ed. (London: Macmillan, 1964 , p. 647. See James C. W. Ahiakpor, “On Keynes’s Misinterpretation of `Capital’ in the Classical Theory of Interest,” History of Political Economy, Vol. 22, Fall 1990, pp. 507-28. Ahiakpor explains how Keynes’ failure to follow this meaning of “capital” led to his inability to recognize Marshall’s explanation of the theory of interest, that is, the rate of interest is determined by the supply and demand for “capital.” In place of that valid explanation, Keynes then substitutes the supply and demand for liquidity (cash) as being the determinants of interest rates, a confusion which continues to plague economists.
0.6654
FineWeb
IanKennedy wrote:Really? You know where every sensor is? I think you'll find you don't. You know where the major components are but not down to the individual sensor devices. Well we know where most of the sensor devices are located (and depending on how generous you are regarding the techmanual even the smaller ones) and since we never hear about a systemwide ship spread out all over the ship in an aztec pattern it seems to me that it falls to you convincing me that it actually exist. Differently coloured panels laid out in an exact pattern might be a clue, I just find it not a very convincing one, sorry. IanKennedy wrote:You are thinking on the wrong scale. I'm not talking about major components I'm talking about smaller parts like sensors. We know that they can sense all sorts of different types of radiation. Do you think that is possible, over the entire surface of the ship, with just one small box located in a fixed location? No real system could do that. You would have to be looking through the ship to see things on the other side. The sensor array must be distributed around the surface of the ship. Thus my comment. I get what you are saying but I stand by that if that where the case it would not lead to an aztec pattern. You build a system and if you have to distribute it over the ship it would lead to an even pattern, like if every aztec were the same from panel to panel, however they are completely inverted. Now you can try to explain that away it does however get ever more unlikely imho. Here is the pattern: As you can see it's exactly the same from panel to panel, just inverted. Now who would build a system that way? IanKennedy wrote:Again you are thinking too large scale. Rooms etc are not the issue, every room need pretty much the same sort of shielding. Actually I think I am thinking on to small a scale. After thinking about it a bit I think your idea HAS merrit however it needs a bit modification, please bear with me a bit. When thinking about why they would either paint their ships in this aztec pattern or make slightly different panels I couldn't really come up with a good reason for it, your idea of shielding certain ship-systems seems flimsy because noone would build a system according to this shape. However then I thought how does it look like? Well, it looks like a bit like cameouflage. Cameouflage in space? In white? Well scratch that. But then I thought maybe it actually is some sort of cameouflage. So instead of shielding certain ship systems, sensors in your example, maybe the pattern helps to actually reduce the signature of the ship by passivly canceling out/scattering certain forms of radiation or heat or other waveforms, helping to reduce the radiation profile of the ship making it harder to detect. So basically a bit of an inversion of your idea. What do you think? I'm Commander Shepard and this is my favorite store on the Citadel.
0.6395
FineWeb
How does one finish off an essay with a personal statement? I'm finding the ending to my essays to be extremely difficult and was hoping that one of you may have an answer. Sometimes teachers encourage students to engage somewhat personally with the text they are analyzing--and I am assuming here your assignment is to analyze something in Othello. If you do want to make a personal statement, and this is something your teacher encourages, you might try "bookending" your analysis with a brief personal anecdote at the beginning that introduces why the play--and the theme you are addressing in it--has meaning for you. An anecdote is a brief account (in strong detail) of a personal experience that has signficance for you. Move from that to your thesis statement, being careful to use strong transition. After you write your analysis, you can return to your anecdote, showing how the play and your discussion of it gives more meaning to your personal experience. This strategy of writing is called "bookending" for it begins and ends the essay with something about the writer, which shows why the analysis itself is important to her or him. It is always important to consider the "so what" of what you write about, and including personal experience can help provide this answer. A literary term for this sort of criticism is "reader response criticism." Did you have extreme difficulty in writing the essays? Is a "personal" statement necessary? The reader will know it's your work! Doesn't the work itself stand as your statement? Ideally, the last statements in an essay should be something that ties the work together. After introducing the topic of your essay, then expanding the points of your arguments, then drawing your conclusions, the last paragraph could be merely a summary. In conclusion, using introductory phrases such as "Finally," or "To summarize," or "To conclude" to begin the last paragraph should provide some structure to your thoughts to finish the essay.
0.8859
FineWeb
A Survival Strategy for Desk-bound Office Workers When working in an office, it is easy for us to lose sight of time amongst the chaos and forget to take the breaks that we need. The common advice to overcome workplace health issues relating to Repetitive Strain Injuries (RSI) is to take frequent breaks, such as a 5 minute break every 45 to 60 minutes. What about 10 second breaks? Much of the stress in RSI is due to muscle fatigue. Fatigued muscles are not able to do their jobs well, and therefore require occasional rest for recovery. Muscles recover very quickly from low levels of fatigue, but quite slowly from high levels of fatigue. Therefore, recovery at frequent periods from low-level fatigue will usually only take around 10 seconds, while high levels of fatigue will require several hours of rest to recover fully. A Survival Strategy Micro pauses, or micro-breaks are regular, small, biologically meaningful breaks from being stuck in one position in the office. These breaks are usually 5 to 10 seconds long and are to be taken every 4 to 10 minutes of repetitive motions (or stationary positions). This dynamic ergonomics concept is an improvement on old-school ergonomic priorities based on ideal positioning. Even with high end ergonomically designed products, no chair or efficiently arranged computer workstation can protect you from the potential dangers of sitting for hours daily without a break. Thus, these pauses relax you and allow you to take on a different posture, position and eye focus. While sedentariness and excessive sitting do not actually cause back pain (contrary to popular assumption), research has revealed that exercise and activity are the best overall treatment for back pain. Thus, micro-breaks are quite advantageous for these reasons: - They take very little time and can easily be developed to become a healthy habit. - They prevent fatigue build up. - They are taken before discomfort occurs. - Micro pauses are the most effective and efficient breaks you can take, but remembering to take them is difficult. What to do during a Micro-break Getting up and doing anything is probably better than nothing, but good micro-breaks definitely involve more than a trip to the pantry. A micro-break really means micro workout. Here are some things that you can try during your micro-break: - Look away from what you are working on and let go of the mouse if you are using the computer. - Drop your arms to your sides, lean back and allow your shoulders to droop and relax. - Pointing the hands towards the floor and gently shaking the wrists is a good idea. - Do this for 5 – 10 seconds.
0.6677
FineWeb
Since the onset of COVID-19, many children have been learning remotely through distance learning programs. While parents are concerned about their children falling behind academically, eye doctors are concerned that undiagnosed vision problems may impact the child’s school performance. Undetected vision problems may hinder a child’s ability to learn. That’s why eye doctors strongly recommend that children undergo a thorough Eye Exam before the new school year begins. While it’s tempting to rely on vision screenings provided by schools, these superficial visual acuity tests can identify only a limited number of vision problems. Only a comprehensive Eye Exam conducted by an eye doctor can accurately diagnose and address a wide range of problems related to vision and eye health. The amount of time children spend looking at digital screens was already a concern in the pre-pandemic era—but the covid pandemic has only exacerbated the issue. According to the Indian Journal of Ophthalmology, children spent twice as much time on screens during COVID-related closures than they did prior to the pandemic. For one thing, spending prolonged periods of time on digital screens forces the eyes to work harder, making children and adults more susceptible to digital eye strain, one of the hallmark symptoms of computer vision syndrome. People who spend 2 or more consecutive hours staring at a screen are at higher risk of developing this condition. Some digital eye strain symptoms include: - Blurred vision - Dry eyes - Eye fatigue - Eye pain - Neck and shoulder pain These symptoms can be caused by a combination of the following factors: - Glare and reflections from the screen - Excessive time looking at a screen - Poor lighting - Poor posture - Screen brightness - Undetected vision problems In addition to digital eye strain, several studies have found that children who spend many hours indoors doing “near work” — writing, reading and looking at computers and other digital devices — have a higher rate of myopia progression. A study published in the American Academy of Ophthalmology’s professional journal, Ophthalmology, found that first-graders who spent at least 11 hours per week playing outside in the sunshine experienced slower myopia progression. Some researchers theorize that exposure to sunlight and looking at distant objects while playing outdoors might help prevent myopia progression. Our optometry practice near you in Burlington, New Jersey, offers a wide range of eye care services, including pediatric eye exams, contact lenses fitting and ocular diseases management Up to 80% of a child’s learning is visual, so even the slightest vision problem can have a negative impact on their academic achievement. Taking a child in for an Eye Exam once a year will allow your eye doctor to detect and correct refractive errors like myopia (nearsightedness), hyperopia (farsightedness) and astigmatism, and check their visual skills, such as convergence insufficiency, binocular vision, focusing and more. Comprehensive eye exams are the best way to detect mild and serious eye health conditions. Eye exams are especially important for children with a family history of eye health problems. While regular eye exams are essential for every member of the family, they’re especially for those who spend a good portion of their day in front of a screen. Don’t put off your child’s annual Eye Exam. Schedule an appointment with Dr.'s Eyecare Center in Burlington today! Dr.’s Eyecare Center, your Burlington eye doctor for eye exams and eye care According to the American and Canadian Optometric Associations, it’s recommended for a child to have their first Eye Exam between 6-12 months of age. Before a child starts school, they should undergo an Eye Exam, and every one to two years after that, based on their Eye Doctor’s recommendation. Yes! School vision screenings are superficial eye evaluations designed to diagnose a limited number of vision problems like myopia. They do not check for visual skills and other problems that may hinder your child’s academic success. Your Eye Doctor will evaluate your child’s vision and eye health, along with visual abilities, including depth perception and eye tracking, to let you know whether your child’s eyes are “school-ready.”
0.6535
FineWeb
Mirror Mirror #2 February 10, 2015 - May 10, 2015 Reading and Deliberating Write a poem in dialogue with one of my poems! You have 5 to choose from (listed below) - make sure you mention your choice in the title or the body of the poem so it's clear. You can either write a poem in whatever form you'd like but about a similar subject matter as my poem (i.e. for "Sturgeon," you could write a poem about fish), OR you can write a thematically similar poem using the same form (i.e. for "rapture" you could write an unrhymed sonnet about a favorite hobby). Remember, I'm not looking for copying - make it connected but still your own! 3) To My Dear Mother 4) Aquarium Haikus I will read and review 3 pieces of your work Created Jan 8, 2015
0.992
FineWeb
You are here To Ask or Not To Ask? Collateral versus Screening in Lending Relationships G21 - Banks; Other Depository Institutions; Mortgages G28 - Government Policy and Regulation G32 - Financing Policy; Capital and Ownership Structure We study the impact of higher capital requirements on banks' decisions to grant collateralized rather than uncollateralized loans. We exploit the 2011 EBA capital exercise, a quasi-natural experiment that required a number of banks to increase their regulatory capital but not others. This experiment makes secured lending more attractive vis-à-vis unsecured lending for the affected banks as secured loans require less regulatory capital. Using a loan-level dataset covering all corporate loans in Portugal, we identify a novel channel of tighter capital requirements: relative to the control group and after the shock, treated banks require loans more often to be collateralized but less so for relationship borrowers. We further nd this impact is stronger for collateral that saves more on regulatory capital.
0.6833
FineWeb
- Ulcerative Colitis Get the facts about ulcerative colitis, including what causes it, signs and symptoms, and complications that can arise from the condition. - Psoriatic Arthritis Get the facts about psoriatic arthritis, including who gets it, the symptoms, and the different types. - Adult Asthma Get the facts about adult asthma, including who gets it, what triggers it, and how allergies can affect it. - Fibromyalgia Get the facts about fibromyalgia, including the symptoms and conditions that may be related to it. - View All Care Guides Prepare for your next visit with our extensive library of Care Guides About Dr. Byron T Field MD Dr. Byron T Field, MD is a doctor primarily located in Anaheim, CA, with another office in Anaheim, CA. Their specialties include Orthopedic Surgery. Dr. Byron T Field has 2 locations Dr. Byron T Field has the following 1 SPECIALTIES Dr. Byron T Field has the following 3 expertise - Knee Osteoarthritis - Osteoarthritis (Hand and Wrist) - Hip Osteoarthritis Dr. Byron T Field Accepts the Following Insurance More about Dr. Byron T Field Dr. Field works in Anaheim, CA and 1 other location and specializes in Orthopedic Surgery. Dr. Field is affiliated with Anaheim Regional Medical Center and Placentia Linda Hospital.
0.8301
FineWeb
Forgot your Samsung Galaxy S23 Ultra password or PIN to unlock the device? You’re not alone, it’s happening to all of us. On this guide will cover different methods to unlock Samsung S23 Ultra when forgot password without losing data or factory reset. Security features on any device are an important factor these days. Samsung’s devices are well known for their innovative and extensive security and privacy features. The easiest way to protect your device is with a screen lock. This includes a security pattern and a 4-digit PIN, which represent a medium level of security. For high security, you can enter a long password or biometric data. The most common biometric unlock options on Samsung phones are fingerprint sensors and face ID (facial recognition). Biometric screen unlock option may vary by model of your phone/tab. With our brand-new tool – PassLess – you can unlock any Samsung locked screen within 5 minutes or less without losing data, without factory reset, without installing any app on your device and, of course, without any cables or connecting your device to a computer – as PassLess works online on your browser. Beside showing you how to use and how our tool works, will also cover lots of method to unlock Samsung S23 Ultra password with forgotten password or pattern lock. So let’s start! Unlock Samsung S23 Ultra when Forgot Password with PassLess Created by NoobDev’s team, PassLess is an online application through you can generate a Samsung secret code based on your phone’s IMEI, which will access hidden features on your Android phone. If you don’t know what Secret Codes are, just check NextPit’s guide on this topic. Common Samsung S23 Ultra Secret Codes List: - *#06# – is used to find your Samsung’s IMEI (which also will be used with our tool). - *#*#2664#*#* – type this code if you need to test the TouchScreen. - *#0228# – use this code to check battery status. - *#0*# – this is a code to access the Info menu. So just like the above codes, our PassLess tool will generate a unique secret code – which will work for your device only – based on the IMEI and iOS version. Actually, we need to know which OS version is installed on your device just to get better results, PassLess having a 85% success rate (to generate the right code), so you can try again if the first code doesn’t work. Some of the best PassLess features include: - unlock all types of Samsung screen lock. - unlock any Samsung phone/tab including new releases. - works online: no download or install needed. - it removes any lock in 5 minutes or less. - will no damage your device or warranty. - will not require a computer or any cable. So if you’re ready to see our tool in action, follow the steps below to remove Galaxy S23 Ultra lock password in the next 5 minutes. Step 1: Connect your IMEI Access PassLess online tool and connect your Samsung’s through our app. Check the above code to find your IMEI, or follow this link to see other methods. The IMEI is helping us to see important data about your smartphone, but also get a secret code which allows us to patch your phone in order to unlock the locked screen. Step 2: Choose Brand and Android version software PassLess supports any mobile brand including (but not limited to) Samsung, LG, Motorola, Nokia, Xiaomi, Sony, Google, Oppo, ZTE, and many others. On this step, you need to choose your phone’s brand (in this case Samsung) and Android version installed on your device. Step 3: Generate a unique secret code Once the previous steps have been completed, now it’s time to let PassLess do its best: based on your submitted data will calculate a code that allows you to access hidden features on your Samsung device just by type the code you received. Once typed, your Samsung phone or tab will be fully unlocked. Please make sure you deactivated any ad-block software, otherwise Passless Tool it may not work. Unlock Galaxy S23 Ultra Without Password With Samsung’s Find my Mobile If you have forgotten which pattern, PIN, or password you used to secure your Samsung smartphone or tablet, you can use Find My Mobile to deactivate the lock screen and access your smartphone again. There are few requirements before being able to use the method: - an active Samsung account linked with your device. - Find My Mobile feature must be activated on your phone. - your phone or tablet must be connected to the internet. Your Samsung smartphone and tablet has an option that allows it to be located if it is misplaced, lost or stolen. With Find My Mobile you can search for his location or unlock your mobile device remotely, among other things. Here are the steps: - Go to findmymobile.samsung.com and log in with the same Samsung account. - Select the device you want to unlock from the Menu. - Click on the Unlock function on the left and remove the lock screen. - Choose a new screen lock password to be use on the future. How to Unlock Samsung S23 Ultra Without Password via Gmail / Google Account Our first method to unlock Samsung S23 without password unless using PassLess, is through your Google account linked with the device, and is our very first method we recommend in using, as this will not require to factory reset your Samsung or cause data loss. The steps are pretty simple: - tap a wrong password or pattern lock multiple times until unlock screen methods appears. - here you can unlock your device by login with Google account or answer to security questions you’ve added. - after completing one of them, your Samsung phone will be unlocked. - now set a new password, PIN, or pattern lock for future use. Bypass Samsung Lock Screen with Android Device Manager Just like Samsung’s Find My Mobile feature work, Google’s Android Device Manager works in the same way. From there you can unlock the locked screen, find your Galaxy S23 Ultra device location, block or erase your smartphone and more. To do any of these, your phone has to be linked with the Device Manager before. - access google.com/android/devicemanager from other phone or PC and log in with your Google account. - choose the device you want to remove the locked screen. - from the menu click on “LOCK” option then remove previously used screen lock. - enter a new password to secure your device. - once unlocked, access lock screen settings on the phone and choose any secure way you want. Remove Samsung S23 Ultra Lock Screen Password Using ADB Another method to unlock Samsung without password is by using ADB tools (Android Debug Bridge) and a command line from your PC. Using this method to disable the locked screen on your Android phone, require to have USB debugging function enabled and ADB tools installed on your computer. If requirements are met: - use a USB cable to connect your device to the PC. - open command prompt in the ADB directory by pressing WIN + R and then enter CMD. - type this command “adb shell rm /data/system/gesture.key” and press Enter. - now restart your phone and the locked screen password or PIN will be disabled. Reset Samsung Galaxy S23 Ultra Password or PIN by Factory Reset This process may cause losing data, as the factory reset will erase your device and allows you for a set-up from scratch. However, you can still unlock Samsung password without losing data if you made a backup before this procedure, though key/buttons combinations. - turn off your phone. - press and hold Volume Down and Power Button keys simultaneously. - hold these buttons for 10-15 seconds until a menu will show on your screen. - press the Volume (Up/Down) keys to navigate to wipe data/factory reset and press the Power key. - press the Power button again to confirm your choice. - select “Reboot System Now” when the factory reset is over.
0.6141
FineWeb
I wondered where they were, Walking down this road. I can no longer hear, Any tales here. I closed my eyes to visualized, All those memories in my mind. Then I saw you, The guy who existed in my life, The one I fell short of saying hi to. Since you are no longer here, My heart still sits here, Hoping one day someone would hear, The cries in my heart all these years….
0.9901
FineWeb
Back Orifice (BO) Definition - What does Back Orifice (BO) mean? Back Orifice (BO) is a remote administration system that allows a user to take full control of a computer remotely running the Microsoft Windows operating system (OS) across a TCP/IP connection, either through a simple console or graphical user interface (GUI). BO actually gives the remote machine more control over a local area network (LAN) or through the Internet, that it does with the person sitting in front of a computer. The program is quite controversial, as it was developed to demonstrate the lack of security in the Windows 98 OS and has all the potential capabilities needs by hackers, despite having a legitimate purpose, like remote administration. The name is a play on words of Microsoft’s BackOffice Server software. Techopedia explains Back Orifice (BO) BO was developed by American hacker Josh Buchbinder, also known as Sir Dystic, to expose the security capabilities of Windows 98. The application came in the form of a remote administration system that is remotely installed without user interaction and does not show up in the task manager panel, so it cannot be killed. It restarts itself each time the OS starts. The system's client side is installed on another computer where the administrator can take control of the remote computer. BO has the following capabilities: - System control: Allows the administrator to remotely log key strokes or lock/reboot the machine. It can get detailed machine information, including access to all drives and passwords saved or cached by the OS or user. - File system control: Allows total control of the file system from copying, modifying, locking and deleting to compression and decompression - Process control: Spawns or kills processes at will - Multimedia and application control: Controls any multimedia device, such as the computer’s webcam or microphone, plays audio/video (A/V) files, take screenshots and more - Network control: Functions as an integrated packet sniffer, allowing the monitoring of data, logs and any passwords while redirecting any incoming packet to any port toward any other port or address Even with a legitimate purpose like remote administration, the server hides itself from the system and can be distributed as the payload of a Trojan horse. Because of this, the antivirus industry categorizes the tool as malware and immediately quarantines the software. 7 Tips For Selecting an Enterprise Mobile Device Management Solution Join thousands of others with our weekly newsletter The 4th Era of IT Infrastructure: Superconverged Systems: Approaches and Benefits of Network Virtualization: Free E-Book: Public Cloud Guide: Free Tool: Virtual Health Monitor: Free 30 Day Trial – Turbonomic:
0.8939
FineWeb
Record companies and their movie studio allies have managed to convince a shockingly large swathe of opinion that the purpose of intellectual property law is to prevent copyright infringement. In fact, the purpose is to advance the general welfare of society. but judging by the number of people who seem to take issue with this in his comments obviously a lot of people don't. Let's go to the constitution: To promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors the exclusive Right to their respective Writings and Discoveries. The key phrases being "to promote the Progress of Science and useful Arts" and " securing for limited Times." A lot of the commenters seem to side with Disney et al who, after having made tons of money ripping off fairy tales without paying any royalties, seem to think that copyright law should extend out to time infinity. The business centered discussion of these and related issues often serves to obscure the point of certain institutions. For example, antitrust law exists solely for the protection of competition for the benefit of consumers, not to protect competitors. It's a seemingly subtle distinction, but it makes a world of difference in how we think about it.
0.5378
FineWeb
How many times have you purchased this product: regularly Place an object on the Sunprint® paper and put it in the sun until the paper turns white. Quickly rinse the paper with water for about a minute and dry flat. Your print will appear like magic! Sunprint® Kit contains 12 sheets of paper (each 4' x 6") and an acrylic sheet. Instructions included.
0.696
FineWeb
Transportation & Fuel Source Technology EPRI-NRDC Report Finds Environmental Benefits of Deploying PHEVs The Electric Power Research Institute (EPRI) and the Natural Resources Defense Council (NRDC) today released a comprehensive assessment that finds that widespread use of plug-in hybrid electric vehicles (PHEVs) in the United States could reduce greenhouse gas (GHG) emissions and potential for improve ambient air quality. The research measures the impact of increasing numbers of PHEVs between 2010 and 2050, including the nationwide environmental impact of potentially large fleets that would use electricity from the grid as their primary fuel source. Among study's key findings were: - Widespread adoption of PHEVs can reduce GHG emissions from vehicles by more than 450 million metric tons annually in 2050 -- equivalent to removing 82.5 million passenger cars from the road - There is an abundant supply of electricity for transportation; a 60 percent U.S. market share for PHEVs would use 7 percent to 8 percent of grid-supplied electricity in 2050 - PHEVs can improve nationwide air quality and reduce petroleum consumption by 3 million to 4 million barrels per day in 2050 The analysis is the first to combine detailed models of the U.S. electric system and transportation sector with sophisticated atmospheric air quality models - accounting for the future evolution of both sectors in technological advances, electricity load growth and capacity expansion. "This research accelerates our understanding of the interplay of emissions from various sources," said Steve Specker, EPRI President and Chief Executive Officer. "We now see that widespread use of PHEVs could expand the fuel options in our transportation sector and at the same time yield net benefits to our environment." The EPRI-NRDC study represents the most comprehensive analysis of the potential reductions of global warming and other emissions from wide-scale introduction of PHEVs over time. The study addresses the impact that lower-emitting electricity generation can have for increasing these benefits. "NRDC believes that a combination of more efficient vehicles, improved battery technology, and a lower-emitting electric power plant fleet can produce substantial reduction in global warming pollution from both the electric power and the transportation sectors, said David Hawkins, Director of NRDC 's Climate Center. "Our results show that PHEVs recharged from low- and non-emitting electricity sources can decrease the carbon footprint in the nation's transportation sector." Several benefits result from the use of grid electricity as a transportation fuel. PHEVs can reduce direct emissions at the vehicle tailpipe and indirect emissions at the fuel source when they recharge by electricity produced by a portfolio of efficient combustion, non-emitting or renewable generation. It is this linkage to a cleaner grid that could enable PHEVs to produce less GHG emissions than conventional or hybrid vehicles. Using electricity produced from diverse domestic resources, PHEVs can reduce U.S. dependence on imported oil. The scale of the greenhouse gas benefit from PHEVs will depend on the efficiency of the vehicles, their range on a battery charge and the greenhouse gas emissions from the electric generation fleet. "The EPRI-NRDC study demonstrates that plug-in hybrid electric vehicles can contribute significantly to the national effort to reduce greenhouse gas emissions," said John E. Bryson, chairman and CEO of Edison International. "With public support, it is likely that someday millions of Americans will fill up their vehicles at the plug instead of the pump, saving money and protecting the environment." Plug-in hybrid electric vehicles combine operational aspects of both battery electric vehicles (BEVs) and power assist hybrid electric vehicles (HEVs). A PHEV, like a BEV, can be recharged from the electric grid, stores energy in an onboard battery and uses the energy while depleting the battery during daily driving. Unlike a BEV, a PHEV can use its internal combustion engine for propulsion in highway driving or when the battery is depleted. Because of this versatility, a PHEV can serve as a direct replacement for a conventional internal combustion engine vehicle or HEV. More Transportation & Fuel Source Technology Articles Stanford researchers seek 'Holy Grail' in battery design Volvo Car Group Makes Conventional Batteries a Thing of the Past Tesla Model S Achieves Best Safety Rating of Any Car Ever Tested in the U.S. Pure Electric BMW i3 Premieres in New York, London and Beijing Smith Electric Vehicles to Open Manufacturing Facility In Chicago BMW and Toyota Partner to Develop Fuel Cells Tesla Motors Secretly Develops Solar Powered EV Charging Station Network Quantum Demonstrates Plug-In Hybrid Electric F-150 Pick-Up Truck NASA Goes Green: NASA Selects Green Propellant Technology Demonstration Mission Increase in Popularity of Alternative Transportation Leads to Decrease in Oil Usage even more articles... Suggest an Article for Green Progress
0.6709
FineWeb
Urban Planning and Sustainable Development is the implementation of shared visions in both natural settings and urban communities, the exploration of laws and policies that incite environmental change, and the promotion of positive change in the environment. Western’s Urban Planning and Sustainable Development major emphasizes an interdisciplinary approach to solving complex problems that face communities from the local to the global level. The program emphasizes a concern for progressive change that is needed towards the design of equitable, healthful, livable, and sustainable communities for present and future generations. The curriculum combines urban planning, sustainable design, environmental policy, and environmental science to provide students with an understanding of the linkages between urban and natural systems and the multidimensional problems in urban development. Students exit the program with the knowledge and skills necessary to make positive changes towards sustainability in an increasingly complex world.
0.6333
FineWeb
SMEX03 Airborne GPS Bistatic Radar Data This data set contains measurements of Global Positioning System (GPS) signals reflected from the Earths surface and collected on an airborne platform. The measurements were taken over the Soil Moisture Experiment 2003 (SMEX03) regional study areas of Brazil and Alabama, Georgia, and Oklahoma, USA. The primary objective was to collect land reflections for sensitivity of the reflected GPS power to temporal and spatial soil moisture and foliage attenuation. The measurements are a form of bistatic radar and can be used to estimate the surface scattering coefficient, such as roughness and/or dielectric properties, as well as path delays between the direct and reflected GPS signals. Scattering coefficients can then be used to estimate changes in surface soil moisture. The reflections collected were from agricultural land in Brazil, Alabama, and Georgia, along with grassland in Oklahoma. Data were collected on 24, 25, 27, 30 June 2003 and 2, 3, 5, 7, 12-15, 17, 18 July 2003. These data were collected as part of a validation study for the Advanced Microwave Scanning Radiometer - Earth Observing System (AMSR-E). AMSR-E is a mission instrument launched aboard NASA's Aqua Satellite on 04 May 2002. AMSR-E validation studies linked to SMEX are designed to evaluate the accuracy of AMSR-E soil moisture data. Specific validation objectives include assessing and refining soil moisture algorithm performance; verifying soil moisture estimation accuracy; investigating the effects of vegetation, surface temperature, topography, and soil texture on soil moisture accuracy; and determining the regions that are useful for AMSR-E soil moisture measurements. The following example shows how to cite the use of this data set in a publication. For more information, see our Use and Copyright Web page. Masters, D. and S. Katzberg. 2009. SMEX03 Airborne GPS Bistatic Radar Data. [indicate subset used]. Boulder, Colorado USA: University of Colorado, Colorado Center for Astrodynamics Research.
0.8417
FineWeb
PLA is a thermoplastic, further classified as a polyester plastic. It has the highest heat capacity and the lowest thermal conductivity relative to other polyester plastics. Material used primarily for home 3D printing. This material is ever gaining pupularity thanks to unpretentious 3D printing and interesting visual quality of individual prints (with good cooling during printing). The material is biodegradable and suitable for printing large objects. Printouts at temperatures above 60 ° C lose their mechanical properties. We recommend a nozzle of 0.47 mm and larger for the colors with sequins.
0.8147
FineWeb
Regional Economic Support These regional economic development trusts and Crown corporations were established through legislation to serve their respective regional areas. They were each capitalized with funding and mandated, in whole or in part, to stimulate economic development and diversification. Over time, each has developed its own distinct business model for distributing funds to meet community needs. Regional Economic Trusts: - Northern Development Initiative Trust is an economic development funding corporation for central and northern B.C. It provides funding and the ability to identify and pursue new opportunities for stimulating economic growth and job creation in the region. - Island Coastal Economic Trust supports economic diversification, planning and regional revitalization in the Vancouver Island and Sunshine Coast region. - Southern Interior Development Initiative Trust helps grow and diversify the economy of the Southern Interior through loans, grants and economic development initiatives in a range of sectors. - Nechako-Kitamaat Development Fund Society is a grant-making agency that sponsors sustainable economic and community stability projects in the area most affected by the Kemano project and the creation of the Nechako Reservoir in Northwest B.C. - Columbia Basin Trust is a Crown corporation established by the provincial government in 1995. The Trust supports efforts by the people of the Columbia Basin to create a legacy of social, economic and environmental well-being and to achieve greater self-sufficiency for present and future generations.
0.8788
FineWeb
How do you know that Odysseus was man known for guile in The Odyssey? One of Odysseus' most famous features is his cleverness (or guile, as you say), and he exhibits this skill at many times during both Homer's Iliad and Odyssey. The most obvious (and probably most famous example) of Odysseus' intellectual prowess is his invention of the Trojan Horse, the downfall of the Trojan Empire. In the Odyssey, there are many famous examples of Odysseus' smarts, but my personal favorite involves his encounter with Polyphemus, the hideous Cyclops. To save his men from being eaten alive, Odysseus' convinces the Cyclops that his name is Nobody, and then, once the monster has fallen asleep, he stabs Polyphemus' eye and escapes with his crew mates. Then, when his friends ask him who blinded him, Polyphemus answers "Nobody," and his friends laugh at him, and Odysseus and his men escape. This remarkable ingenuity is just one example of Odysseus' ability to cleverly deceive his enemies. For starters, he was the hero who conceived of the Trojan Horse, the wooden construction built from ships that the Greeks used to steal into the walls of Troy and finally defeat the Trojans. It was a sneaky stroke of genius! In addition, when he arrives home to Ithaca, he conceals his identity from everyone at first (except an old female servant who recognizes him regardless because she nursed him as a child), so that he can plan his revenge on the suitors without drawing their suspicion. Further, it will be all the more thrilling when he can best them in feats of skill and strength if they still believe him to be a poor beggar and stranger. In this, he is again both clever and deceptive so that his victory over them will be that much more complete and satisfying.
0.8102
FineWeb
Myxomatosis(redirected from Myxomatosis cuniiculi) Also found in: Dictionary, Thesaurus, Medical. an acute viral disease of rabbits characterized by conjunctivitis and formation of edematous-gelatinous tumors of subcutaneous tissue in the head and scrotum. Myxomatosis was discovered and described by G. Sanarelli in Uruguay in 1898. Cases have been reported in America and Australia; the disease was imported into Europe in 1952. Rabbits and hares are susceptible to the disease. The source of the causative agent is an infected animal. Biting arthropod insects (mosquitoes, fleas, sandflies) play the principal role in the spread of myxomatosis. The course of the disease is acute. The skin becomes edematous and gathers into folds, and the ears droop. The swelling of the eyes and the front part of the head gives diseased rabbits a characteristic “leonine look.” Mortality is 90–100 percent. There is no specific remedy for the disease. Recovery imparts permanent immunity. Farms on which myxomatosis is discovered are declared infected. All diseased rabbits, as well as those rabbits suspected of having or transmitting the disease, are slaughtered, and their carcasses are burned. The meat of rabbits suspected of being infected is disinfected by boiling.
0.5198
FineWeb
Over the last few weeks events around the world have made most of us take a closer look at who we are and how we conduct ourselves around people who are of a different race, religion, ethnicity, etc. The #blacklivesmatter and #nojusticenopeace movements across America and now the world have invoked many conversations within households and over a wide range of communities. What role have you played in promoting racial bias? How silent have you been as parents with regards to racial inequality in your homes? If you are a black American then you will have started to have these conversations with your children (especially young boys) from a very young age, and as I am not black, or living in American, I can not even fathom what that conversation could look and feel like. You might feel that you are not racist and so you do not need to have these conversations with your children, however if as parents we do not celebrate differences and similarities between cultures, religions and races then we are not promoting inclusivity. Our silence does not guarantee the fact that we have not raised racist children. Having lived in an international community all my life I have experienced being different, and have seen my children experience being different thus I have made a point to have conversations around their experiences and mine. The main focus of our discussions always end up around the following concepts: respect, empathy and inclusivity. Monkey see, monkey do. How we talk about those different to us around our children will be how they view the world. If we have conversations that are generalized and promote racial, religious and ethnic bias then our children will pick up on the nuances, language and attitudes we express and mimic them in their world. When children come home from school and talk about someone who looks different to them, it is important to make sure that the language used is respectful. When we have conversations about skin colour we look at what is the same and what is different and how everyone is beautiful the way they have been born. We compare ourselves to what nature has shown us in plants and animals, and how none is better than the other but unique in its own way. We celebrate who we are but also celebrate the diversity in the world around us. These discussions can also crossover into conversations around different religions and ethnicities. Because let’s face it, this world has many prejudices, the biggest being race. Do unto others as you would them to you. Modeling behaviour is key when we are raising young and impressionable minds. However teaching them to be mindful of others is also very important. When you are having a bad day, the best thing that could happen to you would be someone to hold your hand and give you permission to have a moment to recover. That connection is empathy. Empathy holds an important role in social and emotional intelligence, and how you empathise as a parent can make a huge difference in how your children learn to empathise with the people in the world around them. In our fast paced and forever changing world we are losing our ability to connect with those closest to us, so how do we expect them to practice empathy when we ourselves don’t make an effort to make time for it. ‘We all should know that diversity makes for a rich tapestry, and we must understand that all the threads of the tapestry are equal in value no matter what their colour’~Maya Angelou. In addition to nurturing empathy, it is important to expose our children to the many different races and cultures of the world. Read stories from around the world, watch movies in different languages and try to connect with people in your community who are not the same as you. As parents when we venture out of our comfort zones to make friends with and ‘break bread’ with people from different backgrounds and cultures than our own we create a normalcy in being different such that being different is not the main point of conversation any more. It also means that the feeling of belonging is not restricted to finding people who look like you, speak the language you speak or worship the same way that you worship. Rather the feeling of belonging breaks these barriers and becomes more about being seen and heard for who you are and not what you are.
0.6517
FineWeb
When you log onto My bookings, you can: - See the booking and the dates of payment - See registered deposits and balances on deposit - Request or remove optional extras (e.g. cleaning) until 11 days before arrival - Enter your bank account number for return of deposit Your password is included in the mail you received in connection with your booking.
0.9142
FineWeb
Want to entice your family to eat healthy? Whip up a batch of garlic knots using this recipe. - ½ teaspoon of yeast - ¾ cup of warm water - 1 and ¾ cups of bread flour - 1 tablespoon of sugar - ½ teaspoon of table salt - 2 tablespoons of unsalted butter, melted - 4 bulbs of fresh roasted garlic - Open your Garlic Shaker®. Toss an entire head of garlic into it. Close the lids. Shake vigorously for 30 seconds. Open a lid. Pour out the peeled cloves. - In a large bowl, combine the warm water and yeast. Let it sit for a few minutes, until foamy. - Remove the garlic skin and mince finely as desired. - Pour the bread flour, sugar, roasted garlic and salt. Mix until everything is well incorporated. Cover with plastic wrap and let it rise for about 20 minutes. - Preheat the oven to about 400 Degrees Fahrenheit. - Sprinkle flour on a flat, clean surface and dump the dough. Divide into 8 equal portions. - Roll the portions into 6 to 8 inches long strands, and then form them into knots. - Dip all knots into the melted butter and place on a sheet pan. - Bake the garlic knots for about 12 to 15 minutes, or until golden brown. Best served warm. Number of Servings: 20 Servings of garlic knots.
0.6772
FineWeb
The beginning of summer brings plenty of opportunities for outdoor fun. Between family beach trips, cookouts, and baseball games, your chances to soak up the sun are nearly endless. Yet, as fun as this all sounds, you still need to keep safety in mind. Summer heat can be especially dangerous for older adults, so taking the proper precautions is a necessary step in your plan for summer fun. 9 Tips for Staying Safe in the Sun - Know your risks: Awareness is the first step to making sure you’re prepared for heat safety. Your normal body response to heat can be affected by age, chronic illnesses, and some medications. - Stay hydrated: Drinking the proper amount of fluid throughout a day of fun in the sun is the most important safety tip we can offer. The Mayo Clinic recommends 13 cups of liquid for men and 9 cups for women, but this number can increase if you’re exposed to heat or outdoor activity. Carry a water bottle with you and refill it frequently. Water is the undisputed best choice for hydrating yourself and you should do your best to avoid sugary or alcoholic drinks, which can actually make your body feel dehydrated. - Take breaks: Even if it means missing out on some of the fun, ducking inside for an air-conditioned break can help your body cool itself down. This is especially important if you’re doing something active in the heat. - Wear the proper attire: Check the weather forecast and make sure you wear clothes that will keep you cool and comfortable. Lightweight fabrics, UV protected sunglasses, and a wide brimmed hat are all good additions to your wardrobe. - Avoid midday sun: The sun is hottest around the midday hours, usually defined as between 10 a.m. and 4 p.m. While you might not always be able to avoid being outside during these hours, take extra precautions against sun exposure and heat. - Use sunscreen: Wearing sunscreen and reapplying throughout the day is crucial to summer safety. Find a broad-spectrum sunscreen with an SPF of 15 or higher and apply liberally. Watch the clock and make sure you’re reapplying as often as recommended. - Seek shade: It’s amazing what a difference shade can make. If you’re going to be somewhere with minimal shady options, bring an umbrella or canopy to make yourself more comfortable. - Monitor your symptoms: You know your body best. Keep a close eye on how the heat is making you feel and don’t be afraid to ask for accommodations if you need them. Don’t allow heat-related illness to spoil your summer. By taking the proper precautions, you can enjoy the sun without taking any unnecessary risks. How do you stay safe in the sun? Share your insight in the comments section below.
0.8776
FineWeb
We routinely get loose with language. Take “phone sex” for example*. I write a family friendly blog, so it’s not like I have any experience with it, but isn’t it a bit presumptuous to label talking about sexual stuff with another person as “sex”? Granted, “talking about sexual stuff on the phone” is uber-wordy, but far more accurate. Similarly, as everyone does these days, it’s presumptuous to label “on-line teaching” as teaching. Take Dr. Paige Harden for example: Harden has an informative twitter thread on how to “teach on-line” and you can see her and a colleague in action here:** Everyone refers to “teaching on-line”, but Harden’s specific phrase “teaching to a camera” highlights the fallacy of the phrase. You can present to a camera, but you cannot teach to one. “Okay Boomer” alert. . . the word “teaching” should be preserved for IRL settings. The “on-liners” can go as crazy as they want with “presenting”. Teaching encompasses more layered relationships with students than presenting. Teaching interactions involve direct eye contact, silences, nonverbal communication, occasional emotion, and one-on-one conversations outside of class where each of those are even more integral. Teaching, at least in the humanities and social sciences, entails learning your students’ stories, tweaking your plans according to those stories, and being spontaneous and authentic in ways that are difficult in a separate studio. Teaching is messy for the same reasons all interpersonal relationships are—because everyone enters into the conversation with different worldviews shaped by contrasting gender identities, class backgrounds, ethnic backgrounds, and political beliefs. And then, for good measure, add in status and power imbalances. Teachers have a more immediate sense of how a course is going than presenters because technology-mediated feedback is harder to interpret. When I lecture in an auditorium, I can assess audience engagement based upon several subtleties including eye contact, head nods, facial expressions, and the number (and quality) of questions asked afterwards. The technologist will argue they can do the same sort of thing on-line, but I’m skeptical because teaching entails a dynamism that I don’t believe exists in on-line presenting. My “in real life” students routinely alter my lectures, discussions, and activities with unpredictable questions, or comments directed to me or their classmates, whose responses cannot be anticipated either. Again, technologist will say their presenting is similarly organic, but again, everything is relative. So let me correct the record. As the nation’s professors and students turn to cameras, microphones, screens, and keyboards, some truth-in-advertising is in order. The country’s colleges are not moving to on-line teaching, they’re moving to on-line presenting. *since no one talks on phones anymore, “sexting” is probably a more relevant frame of reference, another modern phenom I know nothing about **Apple thanks you for the commercial
0.688
FineWeb
What are IQ, OQ and PQ? And why are they needed in the Pharmaceutical Industry? If you work in pharmaceutical or medical device manufacturing, you’ve probably heard the terms IQ, OQ and PQ. But unless you’re directly involved with these tasks, you might not be too sure what they mean. You’re most likely to have heard these terms in relation to installation and commissioning of a new pharmaceutical or medical device manufacturing plant, or its equipment. So what are they and why do we need them? In short – IQ stands for Installation Qualification. OQ is Operational Qualification. And PQ is Performance Qualification. These 3 independent procedures are used together to check that a system meets requirements, specifications and fulfills its intended purpose. Want a more detailed explanation of each? Here goes… What is IQ or Installation Qualification? Installation Qualification verifies that all aspects of facility, utilities and equipment that affect product quality adhere to the approved design specifications (e.g. construction, materials,) and are correctly installed (in the correct physical location using the correct method). Installation Qualification is the first step in the qualification of new equipment. Once equipment is ordered and has arrived on site, it is the job of the Commissioning and Qualification (C&Q) engineers to verify that the technical specifications of the equipment match the technical requirements as were determined in the facility design element of the qualification process. This phase of qualification is carried out by comparing the Manufacturers Technical Specification Data Sheet to the design and operational requirement determined during facility design. Data which might be recorded at this phase of qualification include: - Working Temperatures - Minimum & Maximum Temperatures - Working Pressures - Minimum & Maximum Pressures - Surface Roughness - Maximum Flow Rate - Minimum Flow Rate As well as carrying out these checks on the equipment itself, other checks must be carried out such as the physical location of the equipment in the facility, installation of secondary instruments & other parts and documentation of all manuals, certificates (Cert. of Conformity, Calibration Cert. etc.) and serial numbers. In a practical sense, Installation Qualification is the over sight and verification of every physical aspect of the equipment (materials, dimensions, pressure ratings, etc.), software design specification (software, accessibility, processor speed, etc.) and instruments (operational parameters, accuracy, voltage, etc.). What is OQ or Operational Qualification? Operational Qualification is the testing of each individual component/feature/physical specification of the equipment and is the next step in equipment qualification. Once the equipment has passed the IQ phase the operational requirements, as well as the operational consistency of the equipment, must be put to the test. To carry this out, C&Q engineers must work with maintenance personnel, process & mechanical engineers and operations to carry out various tests on the equipment. Features of the equipment which might be tested at this phase of qualification include: - Temperature Control Systems - Overheating/Low-Temp Alarms - Pressure Control Systems - Fan/Motor Speed/RPM - Display Units/Human-Machine Interface Units (HMI’s) - Operational Signals - Servo Motors Accuracy - Pressure Switches - Level Switches Tests of these features may involve simple tests such as sending power to the unit and opening/closing different ports and valves to ensure signals, switches or HMI’s to ensure that the components are in working order. Other more complicated testing may need to be carried out such as the following: - Pressure Test - Flow Test - Testing of Equipment Interlocks - Speed Test It is important to highlight that during this phase of qualification, each test is carried out individually. For example, if a shell & tube heat exchanger was being pressure tested for operational qualification, it is essential that the shell of the heat exchanger be tested at a different time to when the tubes of the heat exchanger be tested. Essentially, Operational Qualification is the testing of each individual component/feature/physical specification of the equipment. What is PQ or Performance Qualification? Performance Qualification is the final step in equipment qualification. It is much like Operational Qualification, as it tests the operational requirements of the equipment, but in this case, the equipment will contain a load or process medium. In other words, it is the testing of equipment while being subject to “real-world” conditions – conditions which the equipment would be subject to during batch production. This phase is hugely important as it combines the workings, forces and energy of the individual components of the equipment into one harmonious system. By doing so, faults such as the examples below (as well as many more) can be discovered in this phase of qualification: - Excessive Vibration/Noise – This may be caused by a combination of 2 or more individual vibrating components. - Excessive Heat – This may be caused by a build-up of heat due to a driving belt. - Process Media Backflow – This may be caused by incorrect sizing of pipework (a factor which is only highlighted in this case). - Pressure Differentials – This may be caused by the use of a valve (toggle open/closed) or other equipment, as well as Process Media Backflow, as mentioned above. - Combination of Individual Faults – Problems in the system can also arise due to a combination of these faults. The working environment around the system can also be affected by the equipment in use. Excessive heat, for example, can cause a dramatic increase in room temperature depending on what process is being carried out. The spike in room temperature may be uncomfortable for personnel to work in and could possibly be unsafe if personnel are exposed to the high temperatures for an extended period of time. Equally, excessive vibration/noise can not only cause damage to the equipment, but could also be a safety hazard to personnel in the area. In any case, steps must be taken to deal with such problems, whether it be increased air conditioning to combat excessive heat or fitting noise dampening features to the system to reduce vibration/noise, or by simply cordoning off the area while the equipment is in use. Take our 15 Week Program and; - Develop your own 100-Page Validation Protocol - Learn to read P&IDs, Piping Isometrics & Electrical Loop Drawings - Qualify Equipment, Instruments and Piping Systems - Be Ready to Join a Validation Team as a Junior Member Click to learn more about our Commissioning and Qualification (IQ, OQ, PQ) of Equipment and Systems program. What is Calibration and Verification? Calibration of an instrument is the application of accurate upper and lower limits or measurement range. Verification is the act of determining whether or not equipment, software, utilities and services comply with regulations, specifications or operation conditions. It is important not to mistake verification for validation. Verification is an act which is carried out over and over again throughout the validation process. A C&Q engineer, for example, might verify the specifications of equipment as part of the validation of said equipment.
0.5157
FineWeb
Improve the API for controlling and managing operating-system processes. The limitations of the current API often force developers to resort to native code. Java SE provides limited support for native operating-system processes. It provides a basic API to setup the environment and start a process. The process streams can, since Java SE 7, be redirected to files, pipes, or can be inherited. Once started, the API can be used to destroy the process and/or wait for the process to terminate. The java.lang.Process class is enhanced to provide the operating specific process id of the process, information about the process including the arguments, the command, the start time of the process, the accumulated cpu time of the process and the user name for the process. The java.lang.ProcessHandle class returns information about each process as provided by the operating system including process id, arguments, command, start time, etc. A ProcessHandle can return the process' parent, and the direct children, and to all descendants via a stream of ProcessHandles. ProcessHandles can be used to destroy processes and monitor process liveness. With ProcessHandle.onExit, the asynchronous mechanisms of CompletableFuture can be used to schedule an action to be taken when the process exits. Access to information about processes and control of processes is subject to security manager permissions and are limited by the normal operating system access controls. The classes or methods introduced will require new unit tests that can be developed along with the implementation. More functional tests would be useful too. Risks and Assumptions The main risk with this API is differences between operating systems, in particular Windows. The design of this API needs to accommodate possible deployment on smaller devices with different operating system models. It should also take into account environments where multiple Java virtual machines are running in the same operating system process. These considerations could lead to a more abstract API and/or increase the design effort.
0.7177
FineWeb
- Improve wireless coverage in all WLAN networks. - Access to the Internet for computers located on the edge or outside of the range of your access point. - Complies with IEEE 802.11n, IEEE 802.11g, IEEE 802.11b standards. - Provides up to 300Mbps transmission rates. - Support 2.4 GHz WLAN networks. - Maximum WLAN security with WPA2, WPA and WEP (128/64). - Software wizard for simple setup. - 2dBi antennas integrated. - Support Wireless Repeater Mode and Standard AP Mode. - Provides one 10/100Mbps Auto-Negotiation Ethernet LAN ports. - Correct the language and the stablility of signal - Revise default reboot. - The 2 version can support Chinese, English - Product Type: WIFI Repeater - Color: White - Plug Type: EU/US/AU Plug - Voltage: AC 110-240V - Frequency Range: 2.41-2.48GHz - Networking Cable Length: Approx. 1m - 1 x Wireless WiFi Repeater - 1 x RJ-45 Networking Cable - 1 x Installation Guide - 12 Months
0.8388
FineWeb
The “OMS Order” table includes all orders in Infoplus. From this table, you can create new orders, view and edit existing orders, and run order-related processes and reports. Two methods in which to access the “OMS Order” Table: Dashboard: Click the “Account Management” tab, click the “Call Center” App, then click the “OMS Order” Table. - From the Quick Actions shortcut: Press a dot (period) on your keyboard, then select “OMS Order” from the list of Quick Actions.
0.9956
FineWeb
We hear the term ‘nursing shortage’ quite frequently and how it is currently plaguing the healthcare sector. However, is there really a nurse shortage? Many nurses that are currently unemployed would definitely tell you no. While it is true there are many nurses unemployed, it’s also true there is a nurse shortage. How can this be?? When nurses hear the term shortage, they are inclined to think of their own city or town. However, the nurse shortage is not consistent across the U.S. While the hospitals around you may be fully staffed, it doesn’t mean the town a 100 miles away is. The shortage is also not necessarily due to lack of supply of trained nurses in a city, either. It can be measured by nurse-to-patient ratio in a facility or nurse-to-population ratio. This is why Travel Nursing is important. Travel Nursing offers a relief to the shortage because these nurses are willing to relocate to the understaffed locations. This has been found to be a quite lucrative career, as with this great need, hospitals are willing to pay them more to fill their void. But that doesn’t answer why there is a shortage in the first place…There are actually many contributing factors: - Baby boomers are reaching their mid 60’s. The large population of this generation has many medical and health needs, which is putting a strain on our health system. The population aged 65 years and older will double from 2000 to 2030. - Current aging nurse workforce. The median age of nurses is 45. Many are forced to work past their retirement age. - Poor work conditions for current nurses. Many nurses are forced to work longer shifts with lesser pay. This leads to the possibility of nurse wellness decline which can contribute to increased patient error. Many nurses feel that can no longer keep up with the job demand, so they move to a new profession. - A diminishing number of new student nurses. There is also a decreasing number of nursing programs offered to students. There is unfortunately, no foreseeable end to the nursing shortage. There are future concerns for the nurse shortage as well, including the new healthcare reform which will grant healthcare to more of the population.
0.5725
FineWeb
An FFB-funded study at Massachusetts Eye and Ear Infirmary (MEEI) suggests that vitamin A palmitate supplementation may slow the decline of cone function by nearly 50 percent in children with retinitis pigmentosa (RP). Cones are the photoreceptors that normally provide daytime vision, and the ability to read, recognize faces, and perceive colors. Cone function was evaluated in the study by a full-field electroretinogram or ERG, which measures the retina’s electrical response to light. The study included children with different genetic types of RP. There were 55 participants taking vitamin A palmitate and 25 who were not. The daily dose of supplementation ranged from 5,000 to 15,000 IUs, mostly depending on the patient’s age. The MEEI researchers caution that the study results are not definitive, because the number of patients in the investigation was relatively small, the analysis was retrospective, and the determination of who received vitamin A and who didn’t was not random. In earlier studies, Dr. Berson found that vitamin A palmitate slowed vision loss in adults with RP, and its effect was enhanced when combined with docosahexaenoic acid (DHA), a healthy fat abundant in coldwater fish, such as tuna and salmon, and the antioxidant lutein. Dr. Berson used a vegetarian DHA supplement in his studies. Vitamin A is necessary for the biochemical process in the retina that makes vision possible. However, authors of a commentary in JAMA Ophthalmology report that vitamin A’s role in slowing vision loss in people with RP is not well understood. Adults and children considering vitamin A palmitate supplementation should first consult their eye doctor to determine if the regimen is right for them. An annual liver enzymes test is also recommended, because high doses of vitamin A can be toxic to an abnormal liver. Lab studies have shown that vitamin A supplementation can be harmful for those with macular conditions such as Stargardt disease and cone-rod dystrophies. To learn more about vitamin A palmitate supplementation, read FFB’s Vitamin A Packet and the Eye on the Cure post What Everyone with a Retinal Disease Should Know about Vitamin A.
0.6596
FineWeb
Before the Session Facilitator: In advance of the session - Review today’s scripture text and the session activities to help better facilitate the discussion. - Have the Bible Background Video ready to view. - Have any selected video or music clips ready to show - Encourage your group to listen to the Faithelement podcast ahead of the next session (Share the link via email or social media) Fiddler on the Roof Say something like this: “The movie Fiddler on the Roof is set near the beginning of the twentieth century, telling the story of Jews living in the little village of Anatevka in the pre-revolutionary Russia of the Czars. Poor and powerless, they are persecuted by the government because of their race. In the film, the father Tevye, often laments aloud to God — complaining of their situation in life, and asking why. Let’s view this extended scene (it’s 7 minutes long) to watch a few excerpted scenes. The final scene in this clip is set during the wedding of one of Tevye’s daughters. After the clip has been viewed, ask questions like these: - Even in this brief view into the story, where did you see clues as to how the Jews were perceived? - What role did the larger “system” play in the oppression of the Jews? What pressures did the local officer feel from his superiors? - The wedding celebration was still a celebration, even though the gifts were meager and the setting a dusty barn. How did it feel watching the destruction of that celebration? - What did Tevye seem to be saying to God as the camera zoomed out at the end of the clip? Was he expressing lament? Say: Much like Tevye and his family, this passage from Lamentations was penned by Jews who had been taken from their homeland and whose way of life was dismantled by a foreign power. Read together Lamentations 3:22-32 and watch the Bible Background Video. Suffering & Lament Lead the group to list situations in our world today where people suffer. (Hunger, war, oppression, poverty, disease…) Then list personal situations in our communities where people suffer. (death, cancer, loss of job, divorce, estrangement from children, etc.) Lead a discussion using questions like these: - How do most people respond to suffering? - How have experiences of suffering changed you or someone you know? - When you suffer, how easy or hard is it to share your complaints or questions with God? Sharing with God Lead the group in a time of silent reflection. Say: All of us experience difficult times and hardships. In this moment of silence, think of an area in your life where you or a loved one are struggling or suffering. Then, after several moments, say: Sharing our pain, questions or doubts with God is a healthy part of faith. Please take the next few minutes to silently express yourself to God in prayer. After the experience, ask questions like these: - Which is hardest to express to God: Hurt, questions, or doubts? Ask those who share to explain their responses. - When you share deeply with God, how does it change your relationship with God? Close by viewing and sharing in this prayer. It was offered at the 2015 General Assembly of the CBF (cbf.net), a few days after the shooting in Charleston, SC. The prayer is given by Kasey Jones, Senior Pastor, National Baptist Memorial Church in Washington DC.
0.6299
FineWeb