text
stringlengths
695
12k
id
stringlengths
47
47
dump
stringclasses
1 value
url
stringlengths
16
1.05k
file_path
stringlengths
125
126
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
1.02k
2.05k
score
float64
2.52
4.97
int_score
int64
3
5
What is yellow fever? Yellow fever is a viral disease caused by the bite of a mosquito. Many countries still require visitors to be vaccinated for it before entering. Yellow fever is found mainly in certain areas of Africa, Central America, and South America. In certain parts of South America, infections happen less often. They occur usually among forestry and agricultural workers or in travelers to jungle areas. But recent outbreaks have been reported in and around major cities in Brazil. In Africa, infections happen most often in the tropical areas of western and central Africa. But they also happen in cities and jungle areas. What causes yellow fever? Yellow fever is caused by a virus (flavivirus). The virus is passed on to people through the bite of a daytime-biting mosquito (Aedes aegypti). What are the symptoms of yellow fever? Each person may have slightly different symptoms. The following are the most common symptoms: Flu-like symptoms, such as headache, vomiting, and backache Bleeding of the gums Yellowing of the skin or eyes (jaundice) Symptoms usually happen within 3 to 6 days after you are exposed to the virus. Symptoms may look like other health problems. Always see your healthcare provider for a diagnosis. How is yellow fever diagnosed? Your healthcare provider will ask about your past health and travel history for dates and exact locations. You will also need an exam. Blood tests can also help with a diagnosis. How is yellow fever treated? Treatment will depend on your symptoms, age, and general health. It will also depend on how severe the condition is. There is no specific medicine for yellow fever, so treatment is aimed at controlling your symptoms. This includes rest and plenty of fluids. You may also need to take medicine to help relieve fever and aching. You should not take aspirin or nonsteroidal anti-inflammatory medicines such as ibuprofen or naproxen. These may raise the risk of bleeding. You should protect yourself from mosquitoes during the illness. This may mean staying indoors or under a mosquito net. This will help keep you from passing the disease on to other people. What are possible complications of yellow fever? Most people who get yellow fever do not have complications. They may not even know they have had the disease. Some people who get it may have some weakness and fatigue for a few months after symptoms go away. If severe disease happens, death is possible. What can I do to prevent yellow fever? A vaccine is available for yellow fever. The disease no longer happens in the U.S. But talk with your healthcare provider to see if you need the shot before visiting areas where yellow fever still exists. People who have had yellow fever develop lifelong immunity. The CDC advises the vaccine for people 9 months and older who are traveling to or living in areas at risk for yellow fever in Africa and South America. Not being bitten by mosquitoes is another important part of preventing yellow fever. Use mosquito repellant that contains DEET and cover exposed skin when traveling in areas where yellow fever occurs. Use DEET cautiously in small children. Always follow label instructions. Wear long-sleeved shirts and long pants when outside. Use screens on windows and mosquito netting over beds. When should I call my healthcare provider? Call your healthcare provider right way if your symptoms get worse or you have new ones. Key points about yellow fever Yellow fever is a disease caused by a virus passed on through the bite of a daytime-biting mosquito. Yellow fever happens only in certain areas of Africa, Central America, and South America. The disease causes flu-like symptoms, slow and weak pulse, bleeding of the gums, bloody urine, and yellow skin (jaundice). Treatment is aimed at controlling the symptoms. It includes rest and plenty of fluids. You may also need to take medicine to help relieve fever and aching. A vaccine is available to prevent yellow fever. You may need it before traveling to some tropical countries in Africa, Central America, or South America. Tips to help you get the most from a visit to your healthcare provider: Know the reason for your visit and what you want to happen. Before your visit, write down questions you want answered. Bring someone with you to help you ask questions and remember what your provider tells you. At the visit, write down the name of a new diagnosis and any new medicines, treatments, or tests. Also write down any new instructions your provider gives you. Know why a new medicine or treatment is prescribed and how it will help you. Also know what the side effects are and when you should report them to your healthcare provider. Ask if your condition can be treated in other ways. Know why a test or procedure is recommended and what the results could mean. Know what to expect if you do not take the medicine or have the test or procedure. If you have a follow-up appointment, write down the date, time, and purpose for that visit. Know how you can contact your provider if you have questions.
<urn:uuid:01f0f91e-03dd-4a66-8c95-809ffb2ca38d>
CC-MAIN-2023-23
https://healthlibrary.somc.org/Library/Encyclopedia/85,P01465
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656963.83/warc/CC-MAIN-20230610030340-20230610060340-00030.warc.gz
en
0.937108
1,107
3.78125
4
All homeschooling moms have them: homeschool topics that we don’t feel confident to teach. Here are some tips for tackling difficult nature study topics. Building the Habit of Tackling Difficult Nature Study Subjects In Our Homeschools Tackling the difficult topics found in nature study can be a stumbling block for many moms. Most of us find it easy to be interested in and to learn about topics like birds and butterflies alongside our children. But, what about things like spiders, fungus, or rocks? Are we as eager to study those things commonly found in nature? I’ve suffered from this lack of interest in tackling difficult topics in nature study with my children. Reasons We May View Topics as Difficult Let’s face it. Most of us are not “experts” in nature study. These things were not covered in our educational years. So many times, when we’re faced with introducing our children to nature study, we feel unqualified. We lack knowledge in the area under study. “But she should not let lack of knowledge be a wet blanket thrown over her pupils’ interest. She should say frankly, ‘I do not know; let us see if we cannot together find out this mysterious thing.’”Handbook of Nature Study, page 3 We lack personal interest in a topic. It’s our attitude about a topic that can either encourage or discourage our children in their pursuing the study of a topic. If you are disgusted by spiders, they will probably take on your attitude. Honestly, I found studying snakes one of the most difficult things to do with my children so I would continually put it off until a future date. Resources may not be readily available. At some point, we come across something during our nature study time that is not in the Handbook of Nature Study. It may be a local wildflower or a migrating bird. Whatever the topic, we lack the knowledge or resources to easily study it with our children. We realize we need to do more research in our study. It seems like too much work. Ideas to Help with Difficult Nature Study Subjects Start with the Handbook of Nature Study lessons for a topic. Build Up Knowledge If you need additional information, try the children’s section at your public library for books that talk about the topic. Search for videos on YouTube if you want some help making a topic less intimidating. (Note: The Outdoor Hour Challenges (OHC) will usually have all these ideas in the lesson so make sure to look up your topic to see if there is an OHC on the website that you may be able to use.) Example from our nature study: Rain Beetle – How to Identify a New Insect: I found that the closer I looked at this insect, the more beauty I found in its design and features. It taught me that sometimes if we just take time to learn more about a topic, the more interesting it becomes. Develop Interest Over Time If you introduce a topic and it falls flat, nothing says you can’t move onto something else. Sometimes you just need to let some time pass before you find a hook for a particular nature study topic. This is especially the case when you’re studying a subject that you haven’t encountered in person. We all get more excited about something new we see and experience with our own eyes! “No teacher is expected to teach all the lessons in this book. A wide range of subjects is given, so that congenial choices may be made.” Handbook of Nature Study, page 24 Study a Variety of Nature Study Subjects There is no end to the variety of nature study subjects available to you. You could easily stick to topics you are passionate about for a long time. Eventually, you may develop a desire to tackle some of the less attractive topics with your children. Give it time. “Usually, the reason for this lack of interest is the limited range of subjects used for nature study lessons. Often the teacher insists upon flowers as the lesson subject, when toads or snakes would prove the key to the door of the child’s interest.” Handbook of Nature Study, page 6 Find a Group That Can Support Your Study Ask around your community or look at local social media to find a group or event that will help you get excited about a nature study topic. Ask at a local nature center. Put the word out in your homeschooling community. Find a mentor for a topic that your child is interested in learning more about and you have no interest in tackling. There is no shame in finding help for difficult topics. My Homeschool Mom Experience with Tackling Diffucult Nature Study Topics One year we studied rocks and I took the kids to the local rock and mineral show at our fairgrounds. Talk about the perfect place to find a mentor in this area! Most of the participants were eager to share their knowledge and even invited the kids to join their rockhounding group. I was able to get suggestions for places to go look for rocks to collect and for books that we could add to our nature library. More Ways to Include Nature Study in Your Homeschool Here are a few more ideas you might enjoy: - Using the Public Library to Enhance Your Nature Study - How to Use the Outdoor Hour Challenges for Your Homeschool Family Nature Study - 3 Tips for Nature Journaling When You Think You Can’t Sketch - Does Homeschool Nature Study Count as Science? - Project Based Learning: A Nature Study Calendar of Firsts Homeschool Nature Study Membership All of the materials in Homeschool Nature Study Membership are going to give you support and direction in offering a simple study of difficult nature topics. Because we each have our individual likes and dislikes, it’s hard for me to point to just one resource for you to use in your study. Be inspired. Be encouraged. Get outdoors!
<urn:uuid:d0f30a89-d700-468d-8769-95a3a1e0392d>
CC-MAIN-2023-23
https://naturestudyhomeschool.com/difficult-nature-study/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644855.6/warc/CC-MAIN-20230529105815-20230529135815-00230.warc.gz
en
0.937073
1,236
2.8125
3
Is my child too young for orthodontics? What is Phase 1? While there is no exact age for children to begin orthodontic treatment, the American Association of Orthodontists recommends visiting the orthodontist around age seven. By this age, most children have a mix of baby teeth and adult teeth, making it easier for Dr. Miller to diagnose and correct tooth and jaw problems sooner and without surgery. Phase 1 treatment can: - Correct and guide the growth of your child’s jaw to help the permanent teeth come in straight - Create more space for crowded teeth by expanding the jaws - Avoid the need for permanent tooth extractions later in life - Correct thumb sucking and help improve minor speech problems What is Phase 2??? Some patients need Phase 1 – Early Treatment – at a young age when they still have a mix of baby and adult teeth. After they complete Phase 1, retainers are worn until the adult teeth come in. Once all the permanent adult teeth are in, it is time for full treatment (braces or aligners) to finish what we’ve started. The goal of Phase 1 is to correct very specific, severe issues — such as crowding or overbite. However, even with a successful first phase, the adult teeth will still not come in “perfectly straight”. That is why Phase 2 is often needed – to finish aligning the teeth and bite. Am I too old for orthodontics? Orthodontic treatment is no longer just for teens. In fact, in our office over 20% of our patients are 30+ years old (we’ve even treated some patients in their 70s and 80s!). With clear aligners and clear ceramic braces, no one can even tell you are having orthodontics! Common reasons why adults consider orthodontic treatment: - A bad bite or malocclusion, causing teeth to fit together incorrectly - Teeth are crowded or spaced apart, possibly causing tooth decay or gum disease - Abnormal jaw pain, or pressure that is caused by crooked teeth - Desire for a healthier mouth and a more confident smile How long will I have orthodontic treatment for? The amount of treatment needed to correct a problem will determine how long the process takes. Different patients react to treatments differently. While it may take one patient only 12 months to complete treatment, it may take another patient 24 months. Treatment times can vary depending on how quickly your body responds and how much work is needed to give you the show-stopping smile you expect. The average adult/teen plan is 18 months. The average Phase 1 Early Treatment plant is 9-12 months. Will my insurance cover orthodontics? Yes, they usually do! As long as you have PPO coverage for orthodontic treatment as part of your dental policy. Some plans have an age restriction (under 26 or under 21) – but many plans will allow orthodontic treatment to be covered at any age! We will gladly check your plan for you to ensure coverage. Typically a plan will contribute $1000 to $2000 towards orthodontics. Why do I need orthodontics? Really, why? - Straight teeth are healthy teeth — Teeth that are properly aligned are easier to keep clean with flossing and brushing, and may help prevent other health problems. - A beautiful, straight smile builds confidence — Orthodontic treatment can help boost your self-confidence, giving you a better quality of life and the freedom to smile without holding back! - Mouths left untreated can get worse — Not receiving orthodontic treatment when it’s needed can create long-term health issues costing you more in the end. Extractions! Why would I need those? We are able to treat most patients (80-90%) without the need to extract any teeth. If we start young enough, with Phase 1 treatment, that gives us the best chance to fit all of the teeth in, since we can expand the jaws of children/teens easily. Sometimes baby teeth are removed, but don’t worry, we are just helping to make room for those larger adult teeth. In some cases, yes, the best treatment option is extraction of permanent teeth (anywhere from 1 to 4 teeth). In some patients there is just no room for the teeth — either large teeth or small jaws are the culprit. In those instances trying to fit all of the teeth in would be unhealthy (loose teeth, gum recession), look terrible (teeth sticking out too far) and poor treatment (many years of dental problems in the future). Ask us to show you some examples of patients with extractions — they have gorgeous, healthy smiles!! Can’t I just have my Primary Care Dentist straighten my teeth? There are no ‘rules’ stating your general dentist can’t use aligners or braces to straighten teeth. However, just like with medical doctors, it is important to specialists – extra experience and training matter! Would you ever consider having your primary care physician deliver your baby? or do brain surgery on you? No way! Some general dentists dabble in orthodontics and may have some basic skills and training. However, Dr. Miller is an Orthodontic Specialist! Which means AFTER becoming a general dentist, he completed 3 additional years of residency training to become an orthodontist. He has been exclusively doing orthodontics for over 13 years. A primary care dentist simply cannot offer the same level of care.
<urn:uuid:d5bc6717-5dfe-4dad-b1b7-f263df50844e>
CC-MAIN-2023-23
https://www.millerbraces.com/faqs/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644506.21/warc/CC-MAIN-20230528182446-20230528212446-00230.warc.gz
en
0.935514
1,159
2.703125
3
By Catherine A. Sanderson, Amherst College Stereotypes are a type of mental shortcut that help us simplify a complex world. According to social categorization theory, which was developed in the 1970s, we quickly divide people into groups on the basis of common attributes, namely into in-groups, people like us versus out-groups, people who are not like us. This differentiation can be done on virtually any grounds. Although dividing people into groups is not inherently problematic, it can lead to two biases. First, there’s a tendency to assume that members of the out-group are all pretty similar to one another, which is known as the out-group homogeneity effect. So, once we’ve divided people into groups, we see people in our in-groups as representing a full range of characteristics, but people in our out-groups as basically all the same. This makes it far easier to use stereotypes and just to see everyone in a particular out-group as the same—people from Texas, or women in sororities, or Ivy League professors. It’s particularly easy to make this assumption when you don’t have a lot of contact with people in the out-group. The second bias resulting from dividing people into in-groups and out-groups is we show in-group favoritism, meaning a tendency to see people who are like us in a more favorable light—as smarter, nicer, more deserving of resources, and so on. We also discriminate in favor of people in our in-group. Research examining calls made by officials in professional sports leagues shows some weak evidence of in-group favoritism by race. NBA players have fewer fouls called against them and score more points when their own race matches that of the referees. White umpires provide a larger strike zone to white pitches and a smaller strike zone to white batters. Stereotypes Can Be Dangerous Now, these are all relatively small effects at most, and some research on officiating has disputed the role of bias, but such studies remind us, in any case, to be alert to the possibility that even people tasked with remaining neutral may lapse into favoring members of their in-group. Once we’ve formed stereotypes about members of a particular group, stereotypes do tend to be maintained, in part because we thereafter perceive people in that group in line with these beliefs, a phenomenon psychologists describe as perceptual confirmation. People see a baby’s reaction to a jack in the box as angry if they believe that baby is a boy versus sad if they believe the baby is a girl. Officials see a football player’s touchdown celebration differently if that player is Black than if that player is white. This tendency to see things in different ways depending on our group membership explains why it can be so frustrating to watch a game with someone who is rooting for the other team. This article comes directly from content in the video series Introduction to Psychology. Watch it now, on Wondrium. The Aerobics Teacher Who Was Smart The power of perceptual confirmation was brought home to me vividly a number of years ago, when I had a part-time job teaching aerobics at a local health club. At the time, I was a graduate student at Princeton University; I had received my masters and was working on my doctorate. Yet when people interacted with me at the gym, they clearly assumed I was pretty dumb; that’s a stereotype some people have of aerobics instructors. At some point, I mentioned to my class that I was cutting back my hours at the gym to concentrate on school. And people in my class were overwhelmingly supportive, telling me that “education was so important” and clearly implying they assumed I was finishing up my GED for high school. Of course, in reality, I was reducing hours because I needed to devote more time to finishing my dissertation, but that wasn’t the image that was coming to mind when those folks at the gym thought about an aerobics instructor focusing more on school. The Self-fulfilling Prophecy So, it’s not just that we see things in line with our expectations. Once we’ve formed a stereotype, we also treat that person in line with our beliefs, which in turn elicits behavior that confirms these biases. This process is known as self-fulfilling prophecy, an expression coined by sociologist Robert Merton in the late 1940s. One of the earliest studies to demonstrate this effect in a dramatic way was conducted at an elementary school in San Francisco in 1964. A Harvard psychologist named Robert Rosenthal told teachers in a San Francisco elementary school that the results of an IQ test had revealed that a few of their students were “late bloomers,” meaning that they would experience a substantial increase in intelligence during the upcoming year. He told them that the principal believed it was important for them to receive this information, so he specifically identified which of these students were in fact expected to show this increase. In reality, these kids were chosen at random. But at the end of the school year, these kids in fact did show a dramatic boost in IQ—especially for the youngest children—those in first grade, who averaged 15 points gains over those not in the experimental group. Although we don’t know precisely how teachers may have changed their behavior, this study illustrated that expectations can dramatically alter reality. Similarly, stereotypes we hold about our own identity can also affect our own performance. In an example of what is called stereotype threat, students taking standardized tests do worse if reminded of an identity they hold that is stereotyped as doing poorly in a particular domain. Common Questions about How Social Categorization Affects People Negatively When social categorization happens, people tend to assume that those in the out-group have the same characteristics. This makes it easier to write off everybody in the out-group as the same and create stereotypes; it’s called the out-group homogeneity effect. The first problem of social categorization is the out-group homogeneity effect that people tend to oversimplify the characters of the out-group. The second problem is in-group favoritism which there exists considerable evidence for. A self-fulfilling prophecy is a process that occurs after we form stereotypes for ourselves. Our stereotypes create biases that elicit behavior which in turn confirms the biases. This cyclic process is called a self-fulfilling prophecy, one of the negative consequences of social categorization.
<urn:uuid:53a11bfc-732b-46a3-85a6-a6f66fb2ce4a>
CC-MAIN-2023-23
https://www.wondriumdaily.com/how-social-categorization-affects-people-negatively/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224645089.3/warc/CC-MAIN-20230530032334-20230530062334-00230.warc.gz
en
0.971083
1,353
3.6875
4
In theory, we all know we should be getting around eight hours of sleep per night. But for many, this may seem totally unattainable. Whether it’s stress, a busy lifestyle, or something else eating into those hours when you should be resting, eight hours of shut-eye are difficult to achieve. It might mean sacrificing time spent exercising, cooking, socializing, or playing with your kids — just to spend time asleep. The truth, however, is that sleep is as essential to good health as eating right and exercising. Sleep is arguably the most important component of a healthy life because, without it, everything else crumbles. In fact, there are a number of studies that conclude the more sleep you get, the longer you will live. So what happens when you skimp on those eight hours and try to function on six or even fewer? The Centers for Disease Control and Prevention (CDC) advise that between the years of 18 to 60, we need over 7 hours of sleep each and every night. Sleep improves memory, cleanses the body of harmful inflammation, increases creativity, helps you to perform better, is responsible for higher grades in school, makes it easier to focus, helps you control your weight, makes you a happier person, and more. In essence, the proper amount of sleep is critical to enhancing everything that is good in life. If you’d like to take a more in-depth look at sleep, consider The New York Times bestseller, Why We Sleep: Unlocking the Power of Sleep and Dreams, which takes a deep dive into the power and purpose of sleep. We also recommend Dr. Nicole Moshfegh’s handy reference guide of sleeping strategies called The Book of Sleep: 75 Strategies to Relieve Insomnia. Most people mistakenly believe that missing a few hours of sleep is the equivalent of skipping a meal – you can do it safely and you might even reap some benefits. Unfortunately, research has determined that sleeping is more akin to breathing – if your body is deprived of oxygen for even a short amount of time, it may be irreparably damaged. Not sleeping enough prevents your body from repairing itself. You may notice that your colds linger a little longer than they should, which might not seem too horrible. On the inside, however, your blood vessels aren’t healing, so your risk for cardiovascular disease increases, even if you’re eating right and exercising. When you don’t sleep, your body releases insulin, which increases your risk of Type 2 Diabetes. Your need to eat will increase, making it harder to maintain a healthy weight, and your ability to make decisions will be impaired. Your overall mood will spiral, making you lose interest in people, relationships, and activities that once brought you joy. Solutions for a restful night While some solutions may require lifestyle adjustments such as exercising regularly, avoiding stimulants, keeping a journal, and establishing healthier routines, there are a number of items that can help you achieve a more restful night. To better manage the accumulated stress of the day, stretch out and release the day’s tension on a Clever Yoga Non-Slip Yoga Mat or gently knead those knots away with a massage pillow, like the Zyllion Shiatsu Pillow Massager with Heat. It also might be helpful to meditate before bed if you find that your mind is racing at bedtime, so a Seat Of Your Soul Meditation Cushion is a great item to keep on hand and near the bed. Create a more restful environment To make sure the environment is more conducive to sleep, a Sound+Sleep High Fidelity Sleep Sound Machine can help create the perfect environment with 30 non-repeating sound options that can put you in the proper mood for slumber. Additionally, Best Home Fashion’s Thermal Insulated Blackout Curtains can keep light from slipping in to disturb your rest. The two most common reasons you’re prematurely roused from a restful night’s sleep are light and sound. With ASUTRA Premium Lavender Silk Eye Pillow and Flents Quiet Time Ear Plugs, you can eradicate those two distractions so you’re assured a peaceful night’s rest. You won’t believe the difference the right accessories add to the quality of your sleep. A Casper Pillow can provide much-needed neck support while aligning your spine. A Calming Comfort’s Weighted Blanket offers the luxurious feeling of security so you can effortlessly drift off in the embrace of a blissful night’s sleep. Why we can’t/don’t sleep There are many factors that can keep you from getting a proper night’s sleep. Following is a quick list of possible reasons why your sleep is not as effective as it should be. Medications: Some medications make you feel drowsy and some keep you awake. Either type can interfere with your regular sleep patterns. Stress: If something is troubling you, it can keep you from both falling asleep and having a restful night when you do. Snoring: Whether it’s you or a partner, snoring can keep you from having uninterrupted sleep. Try earplugs or a white noise machine. Light: The light from a nightlight, a glow from a lamp, or falling asleep with the TV on can all affect the nerve bundle located behind the eyes to keep you from getting a proper night’s rest. Try blackout curtains or an eye mask. Hunger: You don’t stop feeling hungry just because you fall asleep. Those pangs can make for a restless night. Try drinking a protein shake before bed. Exercise: In almost all instances, exercise helps with sleep. The one time it doesn’t is if you do intense cardio within 2 hours of bedtime. Wear a fitness tracker to make sure you’re getting enough activity each day. Stimulants: Anything that affects you, such as caffeine, chocolate, nicotine, or alcohol, can keep you from getting a good night’s sleep. Switch to herbal tea if you want a cup before bed. Interruptions: Noise, lights, and movement from your partner can all create undesirable interruptions. Even if your sleep is only momentarily disturbed, it can have a negative impact on the rest you get for the entire night. Discomfort: If you feel any sort of discomfort, whether it is from an injury, a medical condition, or just an old pillow, you will not sleep as well as you should. Try out a new pillow or mattress topper. Allen Foster is a writer for BestReviews. BestReviews is a product review company with a singular mission: to help simplify your purchasing decisions and save you time and money. BestReviews never accepts free products from manufacturers and purchases every product it reviews with its own funds. BestReviews spends thousands of hours researching, analyzing and testing products to recommend the best picks for most consumers. BestReviews and its newspaper partners may earn a commission if you purchase a product through one of our links. Distributed by Tribune Content Agency, LLC.
<urn:uuid:234e2476-ed72-4703-b496-18cd9c430e1d>
CC-MAIN-2023-23
https://www.courant.com/2019/12/25/youre-supposed-to-get-8-hours-of-sleep-a-night-what-happens-when-you-dont/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655143.72/warc/CC-MAIN-20230608204017-20230608234017-00230.warc.gz
en
0.930579
1,505
3.21875
3
As a result of market conditions and an unprecedented surge in demand, Shipping times may be longer than normal. At the turn of the 20th century, President Theodore Roosevelt endeavored to “beautify” American coinage after concluding that it had come to be “artistically of atrocious hideousness.” Read more about Saint-Gaudens Gold Double Eagle Coins by clicking here. As such, Roosevelt called for the gold Double Eagle coin to be redesigned. He commissioned American sculptor and personal friend, Augustus Saint-Gaudens, to carry out the task, much to the chagrin of top U.S. Mint officials. While the Saint-Gaudens Gold Double Eagle has lived on to present day as what many consider to be one of the most beautiful U.S. coins in history, the story of its inception is peppered with production roadblocks, fervent infighting and other inhibitive obstacles. The Saint-Gaudens Double Eagle was minted for nearly 30 years, beginning in 1907. Production ultimately ended in 1933 after another member of the Roosevelt legacy, President Franklin D. Roosevelt, issued Executive Order 6102 forbidding the “hoarding of gold coin, gold bullion, and gold certificates within the continental United States,” and effectively ending the country’s gold standard. The Saint-Gaudens Double Eagle has a face value of $20 USD, weighs 33.431 grams and measures 34.1 millimeters in diameter. It is composed of 90% gold and 10% copper, and contains .96750 troy ounces of gold. The coins were struck at the Philadelphia, Denver and San Francisco mints, with Denver and San Francisco pieces bearing “D” and “S” mintmarks respectively. Coins minted in Philadelphia were struck with no mintmarks. Coins remaining in bank vaults in the United States were melted after 1933; coins in bank vaults overseas were not. Millions of Double Eagles, of both the Liberty Head and Saint-Gaudens designs, were repatriated for numismatic and investment purposes. The 1924 Saint-Gaudens Double Eagle was once thought to be rare although 4,323,500 were struck. Large quantities of 1924 Double Eagles were found in European bank vaults, and today the 1924 is one of the most common of the series. On the other hand, the 1925-S had 3,776,500 struck, but few were released, most remained at the Treasury and bank vaults but available from the Treasury at face value in 1932. Fewer than a thousand are known to have survived; one, in almost-perfect condition (graded MS-67) sold in 2005 for $287,500. While numismatic experts and precious metals investors laud the Saint-Gaudens Double Eagle today, its journey to fruition was fraught with challenges. Internal squabbling concerning the redesign took place as early as the coin’s conceptualization, with both President Roosevelt and Saint-Gaudens continually ignoring advice from seasoned Mint leaders. Of particular note, the President and sculptor opted to design the new coin in high relief, a decision that would later prove to be most damning, resulting in production delays and heightened tensions. From the beginning, leadership at the U.S. Mint viewed Saint-Gaudens’s high relief proposals as “experiments” that weren’t worth the institution’s time. These doubts were validated after the designer’s first-round “Extra High Relief” and second-round “High Relief” dies proved to be unsuitable for practical production. After these failed attempts, Saint-Gaudens and his assistant set out to create a third version of the dies, further lowering the design’s relief. In the midst of this rework, Saint-Gaudens passed away from cancer, leaving the President and Mint leadership unaware of where the redesign process stood and at a loss of how best to proceed. After a bout of frustrating back-and-forth with President Roosevelt, the Mint’s Chief Engraver forged ahead on his own to create entirely new “Low Relief” dies that would finally and feasibly bring Saint-Gaudens’s design to life. In December 1907, this third “Low Relief” version was complete, and the newly designed coins were finally struck on a large-scale basis. While a mere 24 pieces of the “Extra High Relief” first-round coins, and 12,000 pieces of the “High Relief” second-round coins were produced, a whopping 362,000 of the Chief Engraver’s third-round “Low Relief” version were minted. Outside of a few tweaks – some minor, others notable – the Chief Engraver left Saint-Gaudens’s design largely intact. Production of Double Eagles was paused in 1916, but resumed four years later in 1920 after WWI had ended and demand for the coin returned. The Saint-Gaudens gold Double Eagle would continue to be struck for another 13 years, until 1933, when the gold standard in the U.S. – and across the globe – was effectively ended. While most gold coins were melted down in the years following, the U.S. Mint sent two 1933 Double Eagles to the Smithsonian Institution’s National Coin Collection, where they remain to this day. Saint-Gaudens’s obverse design depicts Lady Liberty regally walking forward, holding a torch, representing enlightenment, in her right hand, and an olive branch, representing peace, in her left hand. A set of sunrays shines brilliantly behind her, and the stately U.S. Capitol building can be seen in the bottom left distance. The coin’s mint year sits to the bottom right, while the word “LIBERTY” traces the coin’s top edge. Forty-six single stars originally lined the obverse’s rounded edge. In 1912, two new stars were added, symbolizing the joining of Arizona and New Mexico with the Union. The original placement of the pre-1912 stars was not adjusted, but rather, the two new stars were added on the outcropping at the lower right of the design. The coin’s reverse portrays a glorious flying eagle traversing its own set of shining sun rays, with the words “UNITED STATES OF AMERICA” lining the top edge of the coin and its face value, “TWENTY DOLLARS,” sitting just below. In 1908, the reverse design was adjusted to include the motto, “IN GOD WE TRUST,” after intense public outcry moved President Roosevelt to change his mind about omitting the phrase originally.
<urn:uuid:40f94e62-f5db-4c68-ab2a-966804f6ff99>
CC-MAIN-2023-23
https://www.usgoldbureau.com/gold/gold-coins/saint-gaudens?product_type=791
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653183.5/warc/CC-MAIN-20230606214755-20230607004755-00430.warc.gz
en
0.95756
1,418
2.640625
3
Thermography refers to the use of a thermal imaging device to detect the radiated heat from an object or hot spots in the data center. Thermography has been around for some time and usually in the security industry, the medical industry, and military applications. Thermography detects heat and converts it into an image that you can see. This technology is now being employed in data centers. Thermography ensures that various equipment in a facility is running at normal operational temperatures. It also detects abnormal heat patterns that may show issues in the data center airflow. Thermal Mapping Technology Thermography is used in various applications and industries, including the following: - Building diagnostics - Chemical imaging - Earth science imaging - Electrical system monitoring - Fluid system monitoring - Law enforcement and security imaging - Machine condition monitoring - Medical imaging, which is often used to diagnose diseases There are many types of infrared thermometers. The basic type of thermometer has a lens that focuses on infrared thermal radiation onto a detector. This radiation is turned into radiant energy that is shown as color-coded signals. Thermometers are designed to measure temperature even from a distance. This prevents the need for close contact with the object being measured. Below are the three most common types of thermometers used today. - Infrared Scanner This thermometer can measure the temperature of larger spaces. It is often used in manufacturing plants with conveyors and those with web processes. - Spot Infrared Thermometer This is a handheld radar gun. It is used to detect the temperature of a specific spot on a surface. Spot infrared thermometer is also known as a pyrometer. It is ideal for measuring heat on hard-to-reach equipment under extreme conditions. HVAC operators often use a pyrometer to check the temperature of a ventilation system. Pyrometer is also used in monitoring electrical rooms, water leaks, and panel boards. It is also used in boiler operation and stream system monitoring. - Infrared Thermal Imaging Camera This is used to measure temperature at various spots across a wide space. It creates 2D thermographic images with an advanced type of infrared thermometer. Thermal imaging cameras are software-based systems that show real-time images to be used with other software. This helps improve accuracy and provides more in-depth insights. Thermal Imaging Uses Color Palettes To Show Varying Temperatures - Black And White Palette. This is also known as grayscale. It only distinguishes temperature between many levels of gray. Black for the coldest and white for the hottest temperatures. - Iron Palette. This is the usual color palette in thermal imaging. The coldest areas are shown in black. Slightly hotter areas are in blue and purple. Mid-range temperatures are red, orange, and yellow. White is for the hottest temperatures. - Rainbow Palette. This shows varying temperatures through different colors. Like the iron palette, it also uses the whole spectrum to demonstrate different temperatures. Thermal Mapping In Data Centers Nowadays, data centers need more than just good IT operations. Efficient software and hardware systems are also essential to function at optimal condition. Thermal imaging and thermal mapping can be used to track power consumption, temperature, cooling, and other IT operations. Using IRt is the best for monitoring electrical, cooling, and computing equipment. In data centers, IRt is used to look for, diagnose, and record issues in the facility. It is used for facility issues with air conditioning systems, loose electrical connections, and worn-out bearings. After fixing these issues, the IRt is used to recheck equipment. Ensuring that all are functioning properly. Two Categories of Employing IRt - Cooling Systems and Heat-Generating Equipment – The IRt capture the condition of the cooling system. Thermal mapping is used to gather and present the data collected. It allows for IT management and HVAC professionals to look at heat-related problems of the system. - Electrical Power Distribution And Mechanical Systems- Monitoring electrical systems is crucial to safe and efficient data center operations. Electrical IRt is the commonly accepted application of IRt technology in data centers. Electrical switchgear, motors, and motor controls need thorough monitoring. HVAC systems, UPS, ATS, and PDU also require in-depth checking. And IRt is here to help do these requirements. The function of cooling systems is to make way for the cooling air intakes and the return exhaust air to the CRAC units. Facilities are typically designed using computer software. It is then modeled using computational fluid dynamics (CFD). CFD models predict the thermal performance of data centers. Despite advanced computer modeling, CFD is not always reliable. Other aspects of building facilities can affect the thermal conditions in data centers. For instance, under-floor cable and ducting installations can have a significant impact on airflow. That is why thermal mapping is a useful tool in data centers. Thermal mapping can capture the full thermal conditions of a facility and all its equipment. Offering comprehensive and actual thermal imagery. Temperature monitors allow you to track the thermal conditions of your facility. You just need to place them on strategic points to maximize their benefits. But thermal imaging brings more advantages. A thermal image can show more than 75,000 temperature points. It is best to incorporate thermal imaging systems with your sensors. Thermal Mapping Designs In Data Centers Each area of a data center must be strategically designed. For your thermal map, you need to gather all thermal and visual imagery of your facility. You can make a 2D or 3D model, depending on your needs and preferences. - 2D Thermal Map Of Data Center Server RacksThe figure below shows an example of a thermal map of server racks. The thermal map shows highly intricate front-facing images of servers. The details are more intricate when you use IR and visible images. You can also see the thermal conditions when cabinet doors are open. By employing thermal maps in your facility. You will have a clearer image of the heat generation in your facility. This is a big advantage towards efficiency. - 2D Thermal Map Of Data Center FloorsA 2D thermal map provides quick access to large spaces of data. The mosaic infrared images (IR) can analyze patterns that may not be clear in single images. The figure below is an example of a 2D thermal map of data center floors. - 3D Thermal Map of Data Center FloorsThe 3D thermal map is the most advanced approach towards capturing thermal conditions. It is also the most powerful of all tools. 3D models can be viewed from any angle. A complete 3D thermal map gives you the big picture of your facility. With 3D maps, professionals can examine your facility without having to be on-site. Monitoring with AKCP AKCP is the world’s leading expert on professional sensor solutions. Our R&D centers specialize in SNMP-based networking and embedded device technology. AKCP is the first company to bring a workable, LoRa based wireless monitoring system and wireless tunnel for critical infrastructure to market. With features specifically tailored for the data center. Wireless Thermal Map Sensor Monitor the temperature differential between the front and rear of your cabinet. Datacenter monitoring with wireless thermal map sensors helps identify and eliminate hotspots in your cabinets by identifying areas where temperature differential between front and rear are too high. With three (3) temperature sensors at the front and three (3) at the rear, it monitors airflow intake and exhaust temperatures, as well as providing the temperature differential between the front and rear of the cabinet (ΔT) Wireless Thermal Maps work with all Wireless Gateways. Cooling is an integral part of data centers. Servers and other IT equipment generate heat that needs to be removed in the facility. Nowadays, there are many cooling methods that you can use in your data center to remove heat. But these cooling techniques are not enough. Monitoring temperature and heat waste remain integral aspects of your facility. Great job for publishing such a nice article. Your article isn’t only useful but it is additionally really informative. Thank you because you have been willing to share information with us. Thermal Polaris 350RLReplyDelete Well-written. Useful and informative. Keep up the good work! and also check this out Data Cabling Houston. Thank you.ReplyDelete I located one reliable example of this fact through this blog website. I am mosting likely to use such information now. Fortinet managed servicesReplyDelete You have done good work by publishing this article here.inexpensive cox tv and internet packges usa I found this article too much informative, and also it is beneficial to enhance our knowledge. Grateful to you for sharing an article like this.ReplyDelete
<urn:uuid:0329890f-6734-4a4d-9902-17fbbc504a03>
CC-MAIN-2023-23
http://www.ruang-server.com/2021/12/thermal-mapping-for-data-centers.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648245.63/warc/CC-MAIN-20230602003804-20230602033804-00430.warc.gz
en
0.909134
1,912
3.5
4
Most people are familiar with routinely collected data (RCD), or any data that have been collected during routine practice (such as via electronic medical charts, population health registries or insurance data) often included under the umbrella «big data». Many of our movements generate electronic traces, such as with every physician encounter, every purchased over-the-counter drug, or every worn Fitbit; for example. Big hopes and dreams of new treatments, better care and improved health follow along. This wealth of data has the potential to predict our deepest wants and needs, and what treatment works best for us. But does the prediction work? This wealth of data has the potential to predict our deepest wants and needs, and what treatment works best for us. Much of medical research done with these big data sets is observational in nature, not an experiment. It is based on statistical models with many assumptions, and for some crucial assumptions it’s even quite impossible to say if they hold true (they are often described as “untestable”). Unfortunately, medical history is full of examples where patients were harmed by basing decisions on observational research. So, when it comes to testing treatments and assessing if patients fare better when receiving such treatment and not the other, we need a randomized experiment. That’s not new. … routinely collected data has emerged as a tool for improving randomized clinical trials (RCTs). Some even said this would be the “next disruptive technology.” in clinical research But there is hope. We can perfectly rely on the tools we have right now: randomized trials. They don’t require complex modelling, knowing anything about treatment mechanisms or understanding the risk profile of patients. And who says we can’t use RCD to find participants or assess their outcomes through randomized interventions and find out what works best? The tech industry, including Microsoft, Google or Amazon, uses randomization as “A/B tests”, in thousands of experiments with millions of participants per year. Those having the largest datasets and incredible computational power, use good old randomization. The problems of non-randomization can be hardly avoided. But most of the problems of randomized trials can be. They are man-made and not the fault of the technique itself. And routine data can be a key to solve many of these issues. Recently, RCD has emerged as a tool for improving randomized clinical trials (RCTs). Some even said this would be the “next disruptive technology” in clinical research. We don’t know yet, but it is a big step in clinical research evolution. The perfect blend: randomized real-world evidence Using RCD for RCTs may provide the best real-world evidence Large strides have been made to include routine data in clinical studies, because to really decide if a treatment works we need many individuals from diverse backgrounds, ideally in real world settings. We can just design simpler trials, more pragmatic trials, being larger and better reflecting real world care. Being larger means being costlier. But we can use the routine data collected in daily care to measure the outcomes, avoiding cumbersome and costly follow-up visits and avoiding an artificial situation. Why spend many resources to call patients or their physicians and ask about clinical events, hospitalizations, accidents, or even mortality? Why not just query the database of the health insurance directly? What makes trials really limited is how expensive it is to collect the data. Using routine data bypasses (most) of the costs and even provides further research potential not otherwise amenable with actively collected data, for example for economic analyses or large scale studies (we recently did a nationwide RCT in Switzerland with more than 10 million patient contacts entirely based on RCD). Using RCD for RCTs may provide the best real-world evidence. … just because this data is present, it doesn’t mean that we are able to get it how we want it and when we want it. There are still many limitations in using routinely collected data… Promises, barriers, and implications Yet, just because this data is present, it doesn’t mean that we are able to get it how we want it and when we want it. There are still many limitations in using routinely collected data, such as their availability, format and detail level, their accuracy and validity, patient privacy concern; the list continues – but of note, all these issues affect both, randomized and observational research. They are thoroughly explored in the article published today in Trials, “Routinely collected data for randomized trials: promises, barriers, and implications”. The RCD 4 RCTs initiative We started recently the “RCD 4 RCTs” initiative. This is aiming at clarifying uncertainties in the application of RCD in clinical trials providing trial planning guidance as well as by establishing a RCD trial repository; thus, supporting fellow researchers and all stakeholders and building an academic network of people interested in improving clinical trials for better decision making in health care. We believe that in a not so distant future, it will be commonplace to use automatically provided health data for clinical trial research, what in turn, will give us general and personalized answers to increasing our wellbeing. In the meantime, thank you for reading our blog post.
<urn:uuid:989cbabe-e705-426b-809f-0e2fa4b4216b>
CC-MAIN-2023-23
https://blogs.biomedcentral.com/on-medicine/2018/01/11/big-data-for-clinical-trials-a-perfect-blend/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648245.63/warc/CC-MAIN-20230602003804-20230602033804-00430.warc.gz
en
0.945359
1,103
2.765625
3
« PreviousContinue » 462. Quadrilaterals are of three kinds, as follows: A parallelogram has its opposite sides parallel; a trapezoid has only two sides parallel; and a trapezium has no two sides parallel. The diagonal of a quadrilateral, as shown in the figures, is a line joining any two angles not adjacent. 463. Parallelograms are of four kinds, as follows: A square has all its sides equal, and all its angles right angles; a rectangle has its opposite sides equal, and all its angles right angles; a rhomboid has its opposite sides equal, and its angles acute and obtuse; a rhombus has all its sides equal, and its angles acute and obtuse. An acute angle is less than a right angle; an obtuse angle is greater than a right angle. The altitude of a parallelogram or a trapezoid is the perpendicular distance between its parallel sides. 464. A circle is a plane figure bounded by a curved line, called the circumference, every point of which is equally distant from a point within called the center. The diameter of a circle is a line passing through its center, and terminated at both ends by the circum. ference. The radius of a circle is a line extending from its center to any point in the circumference. It is one half 465. The base and altitude of a triangle given, to find the area. 1. Find the area of a triangle whose base is 26 ft. and altitude 14.5 feet. 14.5 × 26 1881; hence, the area is 1881 sq. ft. (base x altitude) = area of triangle. Find the area of a triangle, 2. Whose base is 12 ft. 6 in. and altitude 6 ft. 9 in. 3. Whose base is 25.01 chains and altitude 18.14 chains. 4. What is the cost of a triangular piece of land whose base is 15.48 ch. and altitude 9.67 ch., at $60 an acre? 5. At 8.40 a square yard, find the cost of paving a triangu lar court, its base being 105 feet, and its altitude 21 yards? 189 × 2 466. The area and one dimension given, to find the other dimension. 1. Find the base of a triangle whose area is 189 sq. ft., altitude 14 ft. =27; hence, the base is 27 ft. 2. Find the altitude of a triangle whose area is 20 sq. ft., base 9 yards. RULE.-Divide twice the area by the given dimension. Find the other dimension of the triangle, 3. When the area is 65 sq. in. and the altitude 10 in. 4. When the base is 42 rods and the area 588 sq. rods. 5. When the area is 6 acres and the altitude 17 yards. 6. When the base is 12.25 chains and the area 5 A. 33 P. 467. The three sides of a triangle given, to find its 1. Find the area of a triangle whose sides are 30, 40, and 50 ft. SOLUTION. (30 + 40 + 50) ÷ 2 = 60; 603030; 60 - 40 = 20; 60 - 50 10. √60 × 30 × 20 × 10 = 600 ft., area. 2. Find the area of a triangle whose base is 20 ft. and each of the other sides 15 ft. RULE. From half the sum of the three sides subtract each side separately; multiply the half-sum and the three remainders together; the square root of the product is the area. 3. Find the area of a triangle whose sides are 25, 36, and 49 in. 4. How many acres in a field in the form of an equilateral triangle whose sides measure 70 rods? 468. To find the area of a parallelogram. 1. Find the area of a parallelogram 16.25 ft. by 7.5 ft. wide. SOLUTION. 16.25 × 7.5 = 121.875; hence, 121.875 sq. ft. is the area. FORMULA: Base x altitude area of parallelogram. 2. The base of a rhombus is 10 ft. 6 in., and its altitude 8 ft. What is its area? 3. How many acres in a piece of land in the form of a rhomboid, the base being 8.75 ch. and altitude 6 ch.? 4. A man bought a farm 198 rods long and 150 rods wide, and agreed to give $32 an acre. What did the farm cost? 5. A certain rectangular piece of land measures 1000 links by 100. How many acres does it contain?· 6. How many square feet in a board 16 ft. long, 18 inches wide at one end and 25 inches wide at the other end? 469. To find the area of a trapezoid. 1. Find the area of a trapezoid whose parallel sides are 23 and 11 ft., the altitude 9 ft. FORMULA: (sum of the bases altitude)=area of trapezoid. 2. Required the area of a trapezoid whose parallel sides are 178 and 146 feet, and the altitude 69 feet. 3. One side of a quadrilateral field measures 38 rods; the side opposite and parallel to it measures 26 rods, and the distance between the two sides is 10 rods. Find the area. 470. To find the area of a trapezium. 1. Find the area of a trapezium whose diagonal is 42 ft. and perpendiculars to this diagonal, as in the diagram, are 16 ft. and 18 ft. × 42 = 714; hence, 714 sq. ft. is the area. FORMULA: (sum perpendic. × drag.) = area of trapezium. 2. Find the area of a trapezium whose diagonal is 35 ft. 6 in., and the perpendiculars to this diagonal 9 ft. and 12 ft. 3. How many acres in a quadrilateral field whose diagonal is 80 rd. and the perpendiculars to this diagonal 20.453 and 50.832 rd.? To find the area of any regular polygon, multiply its perimeter, or the sum of its sides, by the perpendicular falling from its centre to one of its sides. To find the area of an irregular polygon, divide the figure into triangles and trapeziums, and find the area of each separately. The sum of these areas will be the area of the whole polygon. 471. The diameter or circumference of a circle given, to find the other dimension. 1. Find the circum. of a circle whose diameter is 20 in. SOLUTION.-20 in. x 3.1416 62.832 in., the circumference. 2. Find the diameter of a circle whose circumference is 62.832 ft. SOLUTION.-62.832 ft. 3.1416 20 ft., the diameter. 1. Diameter x 3.1416 circumference. 2. Circumference ÷ 3.1416 = diameter. 3. Find the diameter of a wheel whose circum. is 50 ft. 4. What is the diameter of a tree whose girt is 18 ft. 6 in.? 5. What is the radius of a circle whose circum. is 31.416 ft.? 6. Find the circumference of the greatest circle that can be drawn with a string 14 inches long, used as a radius. 472. To find the area of a circle, when both its diameter and circumference are given, or when either is given. 1. Find the area of a circle whose diameter is 10 ft. and circumference 31.416 feet. SOLUTION.-31.416 ft. x 10÷4 78.54 sq. ft., area. 2. Find the area of a circle whose diameter is 10 ft. SOLUTION.-10 ft. x .7854 = 78.54 sq. ft., area. 3. Find the area of a circle whose circum. is 31.416 ft. SOLUTION.-31.416 ft. ÷ 3.1416 = 10 ft., diam.; (10 ft.)2 × .7854 78.54 sq. ft., area. (diameter x circumference) = area. 2. Square of diameter ×.7854 = area. 4. Find the area of a circular pond, its circum. being 200 ch.? 5. The distance around a circular park is 1 miles. How many acres does it contain ? 6. How much land in a circular garden, that requires 84 rd. of fencing to inclose it?
<urn:uuid:7cdb83db-2b77-4532-83fb-4530596d3ef0>
CC-MAIN-2023-23
https://books.google.com.jm/books?id=Dwm0XJ-OIrUC&pg=PA294&vq=given&dq=editions:HARVARD32044097001838&hl=en&output=html_text
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647810.28/warc/CC-MAIN-20230601110845-20230601140845-00630.warc.gz
en
0.891606
1,980
3.59375
4
With every passing day, human life is brimming with luxuries, modern-day utilities, and comfortable innovations. Technological advances have revamped the entire way of life in the contemporary world. Almost every field of life has become radically different from the past. The equipment, tools, and services we utilize today are making us highly reliant on them, becoming a necessity rather than a mere luxury. However, there is a downside to all of this, as everything comes at a price. These modern-day innovations have also taken a massive toll on the social fabric of the world. We all are witnesses to the unavoidable and alarming impact of the fundamental necessities of life. Education, healthcare, justice, civic services, and employment opportunities are all undergoing considerable change, which isn’t always positive. The disparity between the standard of these services in the world is strikingly huge. Somewhere you find top-of-the-line services with minimal financial expenses. In other regions, people struggle to ensure a vigorous life, given the lack and inaccessibility of primary healthcare facilities. Unfortunately, innovative, fast-paced, and tech-reliant economies have created these differences. The healthcare sector has undoubtedly received the gravest impacts of all. Not everybody is given equal treatment. Despite being an essential social requirement, healthcare has become increasingly commercialized. It seems like only the rich have the fundamental right to proper healthcare. Consequently, marginalization is at its peak in the modern-day healthcare systems. This article sheds more light on it. The social fabric of this newly evolved world is quite intricate and complex. Determining the healthcare services, resources, and their adequate application and distribution requires a proper understanding of the social dynamics. Social workers must collaborate and work shoulder to shoulder with healthcare leaders to eradicate society’s social marginalization. Pursuing masters of social work online degree programs will help them dive deep into the social issues of our community. This online program will enable them to determine factors causing social marginalization in healthcare and resolve it. Treating the masses differently based on their social indicators such as background and ethnicity paves the way for social marginalization. So, the most promising way to tackle this situation is by actively involving the government authorities in ensuring these basic civic needs. They must develop the right policies and provide equal healthcare services to every citizen of the society. The State should ensure that healthcare doesn’t get too commercialized either. Only then will the resultant social marginalization decline. Essential healthcare available and accessible at all times is the right of every citizen. Depriving them of this fundamental right creates social marginalization. Healthcare problems haunt every individual in today’s world. No matter rich or poor, everyone runs away from indulging in healthcare expenses. Healthcare facilities have become exponentially more expensive over the last two or so decades. Something that should stay nonprofit for human welfare has become inclined mainly towards making profits. Today, healthcare itself has become a lucrative commercial business rather than a social welfare construct. As a result, it is one of the great reasons for economic marginalization. According to WHO, a staggering 930 million people are in the vulnerable group because of healthcare expenses. This group of people is most susceptible to fall below the poverty line because of out-of-pocket healthcare expenses. They spend an average of 10% of their household budget on healthcare, leading to declining purchasing power. Therefore, they are the ones who get economically marginalized because of mounting healthcare costs. We can only address this issue with proper financial planning ensuring affordable services and aids for the masses. Authorities need to channel public taxes in the right direction for healthcare improvements. The health of specific communities is indeed declining at an alarming rate. Restricting healthcare to certain privileged groups is having severe physiological impacts on society at large. Racial bias and cultural segregation play a role too. According to a report by Nature, US hospitals are using an algorithm that takes biased decisions to provide healthcare to patients. It is, directly and indirectly, affecting about 200 million people. These problems are promoting physiological marginalization in communities. Unsurprisingly, specific communities are losing the ability to maintain and care for their mental and physical health. It is diverting them toward illicit social activities as well. Therefore, the trickledown effect has a higher cost. These communities are unable to add value to the society that they can. So, a viable way to tackle this issue is to spread awareness and decrease social stigmatization. The people in power need to initiate outreach programs, so society eliminates such biases at large. Healthcare is like a correlated phenomenon. These deprived communities will eventually downgrade the health of others too. Therefore, healthcare facilities must deal with them all equally. Healthcare has a crucial impact on every other domain of life. Mental health, emotional stability, and social understanding depend on proper health. So, if our well-being is disturbed, other aspects of life bear the brunt. Social and family life deteriorate, and marginalized groups face immense stress and mental pressure. Therefore, their overall performance and productivity decline. They become a less warranted member of society, causing substantial psychological impacts on these people. Consequently, they start facing this psychological marginalization in almost every sphere of life since their capabilities are challenged. A plausible strategy to tackle this issue lies in ensuring equal healthcare for all the members of society. However, people need to recognize the gravity of these differences and address them accordingly. This issue needs to be challenged on the grass root. Only then will the impact move bottom-up. Slowly the entire society will eradicate this social evil. So, the most critical aspect is ensuring sustainability. Psychologically challenged people are not easy to handle, and health issues further exacerbate this problem. Social, economic, physiological, and psychological issues will always remain in the world. The complexities and subtleties of society will always produce these issues. However, when arising from healthcare, these issues are alarmingly devastating for the integrity of our social fabric. Government and other authorities in power must address this issue at the earliest. The responsibility lies in our capacity too. We need to start with changing our mindset and embrace inclusivity. Healthcare is an essential element of human life, and everyone deserves this right.
<urn:uuid:c34b278d-d666-46fe-94f7-d30f04c254ab>
CC-MAIN-2023-23
https://www.velillum.com/health/what-is-marginalization-in-healthcare-and-how-to-tackle-it/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648850.88/warc/CC-MAIN-20230602172755-20230602202755-00430.warc.gz
en
0.946134
1,290
3.015625
3
- About Bulbs - Landscaping Tips - Planting & Care of Bulbs - Tips for buying Bulbs & Perennials - Planting & Growing Instructions - Allium Planting and Growing Tips - Begonias Planting and Growing Tips - Calla Lily Planting and Growing Tips - Crocus Planting and Growing Tips - Daffodil Planting and Growing Tips - Dahlia Planting and Growing Tips - Daylily Planting and Growing Tips - Gladiolus Planting and Growing Tips - Hyacinth Planting and Growing Tips - Iris Planting and Growing Tips - Lily Planting and Growing Tips - Peony Planting and Growing Tips - Rose Planting and Growing Tips - Tulip Planting and Growing Tips What are Hyacinths?The Hyacinth is a member of the large and lovely Lily family. (Consider its tubular florets and intense fragrance and you'll understand the connection.) Hyacinths thrive in well-drained soil and full sun to partial shade. Throughout most of the U.S., they will return year after year, adding beauty and fragrance to garden beds and indoor bouquets. Dutch bulb growers have cultivated Hyacinths since the 17th century. By 1838, these brilliantly coloured spring gems had become so popular that more than 2,000 varieties were available! The uniform, upright shape of the flower spikes and jewel-tone colours made Hyacinths a favourite for formal Victorian gardens. Now 21st century gardeners are rediscovering this classic flowering bulb, which complements gardens of all sizes and styles. For a bold, dramatic effect in your spring landscape, fill an entire bed with a single Hyacinth variety, or plant masses of Hyacinths to form a large, gently curving swath of colour. For even more visual excitement, plant a single variety of tulip of a contrasting colour along both sides of the Hyacinths -- choose a tulip that will bloom simultaneously with your hyacinths. Where to grow Hyacinths Plants?For a more informal look, mix hyacinths of various colours with tulips, daffodils, pansies, primroses and other spring-blooming flowers. Be sure to plant a few groups along a walkway, where you can enjoy their fragrance each time you pass. Hyacinths are also one of the easiest bulbs to grow in pots. You can easily force your hyacinths indoors. You will need a Hyacinth Bulb vase - a special glass vase with a pinched neck and bulb-sized "cup" at the top. Most garden centers carry several shapes and colors. How to Plant Hyacinth Bulbs• Place the hyacinth bulb in the top of the vase. Fill the vase with water to just below the bulb (add a piece of charcoal to help prevent algae growth). Place the vase in a cool, dark place for two months. Check the water level weekly to make sure it is just under the base of the hyacinth bulb. • After eight to ten weeks, place the vase in a dimly lit place. By now you should see roots extending into the water and a shoot growing upwards. If the roots have not developed well enough, put the hyacinth bulb back in the dark for a few weeks more. • Over the next three weeks, slowly bring the vase into a warmer, brighter position, but no more than 65 degrees. Too much heat at this stage can result in a rush into flowering before the stem has developed enough height. • Four to six weeks after bringing the vase out of the dark, your hyacinth flower will be in full bloom! Keep it in a bright spot with diffused light. Full sun will cause it to age quickly. After flowering, transplant into your garden. When to Plant Hyacinth Bulbs Hyacinth bulbs are mid-spring bloomers, and, like other springtime bulbs, they are best planted in the fall. Bulbs use the mild fall months to grow root systems and soak up nutrients before settling into dormancy for the cold winter. These bulbs actually need a cold period to begin blooming in spring. During the spring, their leaves photosynthesize energy for the year ahead. Plant your hyacinth bulbs after the ground has cooled but before it's frozen solid. This will give your bulbs time to settle in before the winter. If you want to "force" your bulbs, or start them indoors in pots, refrigerate your hyacinth bulbs for about nine weeks before planting them. Then, keep their pots in a sunny location. What are Common Hyacinth Pests and Diseases? Squirrels and other rodents are known to snack on foliage and bulbs when hyacinths are kept outside. To deter rodents, keep your hyacinth bulbs near less-appealing plants, such as perennials and daffodils. You can also try commercially-available animal repellant to keep pests from carrying away your bulbs. Like other bulbs, hyacinths can be susceptible to rot. Yellow rot is evident when the leaves of the Hyacinth plants turn yellow and water-logged. Bulb mites, fungus, and soft rot are also common among hyacinth plants. To avoid any of these issues, make sure to plant your bulbs in well-draining soil, and amend your soil with loam to keep it draining well. For aphids and mites, try a garden pest spray to keep your plants from becoming infested. If you do see mites or other bugs, knock them off with a strong blast from a hose or mister. What are Popular Hyacinth Varieties? Hyacinth bulbs tend to be known for their deep, vibrant colours, as well as their perfumed fragrance. Hyacinths bloom in both single and double forms, and most grow to a height of a foot or under, although height certainly varies by cultivar. Here are a few of our very favorite hyacinth varieties: - Eros Hyacinth is one of the very best bi-colored hyacinths, with red florets tinged in white, which might remind you of peppermint candy. It's a nice, compact hyacinth cultivar, too. - Royal Navy Double Hyacinth is a shining example of double hyacinth in a striking navy blue. This is a true-blue flower and an award winner to boot. - City of Haarlem Hyacinth is a classic, known for its bright yellow color. Yellow hyacinths are tough to find, and this one is sure to please. - Blue Jacket Fragrant Giant Hyacinth is another blue, this one with a more classic form. One of our best-selling blues year after year, Blue Jacket is among the most fragrant hyacinths. No matter which variety you choose, you'll be sure to have bold and beautiful flowers with just a bit of work. Hyacinths are the perfect flower for welcoming late spring and all its associated festivities. How Often Do Hyacinths Bloom? Hyacinths, like most plants grown from bulbs, bloom just once. Hyacinths bloom in late spring, generally later than most daffodils and other early bloomers. However, that single bloom time lasts for up to four weeks, so you'll get a lot of mileage from that one bloom. Hyacinths typically have a lifespan of about five years, coming back each season. You May Like...
<urn:uuid:80b0e33e-5f74-4cae-9b96-ca8d48503f20>
CC-MAIN-2023-23
https://www.brecks.com/how_to_tips_growing_instructions_hyacinths
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224650264.9/warc/CC-MAIN-20230604193207-20230604223207-00430.warc.gz
en
0.935569
1,593
2.609375
3
Flowers have been used as gifts for centuries, and they hold special significance in different cultures around the world. From expressing love and appreciation to celebrating special occasions, flowers convey emotions and messages that transcend language barriers. But have you ever wondered which flowers are considered typical in different countries when it comes to gifting? We have decided to explore the beauty and symbolism of flowers in various countries, and discover which flowers are commonly given as gifts, along with the best occasions to send them. Flowers hold deep cultural significance in many countries, and they are often associated with specific occasions or events. Let’s take a trip around the world to discover some of the typical flowers of different countries: Japan – Cherry Blossoms (Sakura) Cherry blossoms, or Sakura, are the national flower of Japan and are deeply ingrained in Japanese culture and history. These delicate and beautiful pink flowers bloom in the spring, and their brief yet breathtaking appearance symbolizes the fleeting nature of life. Cherry blossoms are commonly associated with Hanami, the traditional Japanese custom of enjoying the beauty of these flowers during the springtime, and they are often given as gifts to express appreciation for the beauty of life. India – Marigold (Genda Phool) Marigolds, or Genda Phool, hold special significance in Indian culture and are commonly used in religious ceremonies, festivals, and weddings. These vibrant and colorful flowers are believed to bring good luck and prosperity and are often used to create garlands, decorative arrangements, and offerings to deities. Marigolds are also given as gifts during auspicious occasions, such as Diwali, the Festival of Lights, and other celebrations. Netherlands – Tulips Tulips are synonymous with the Netherlands and are one of the most iconic flowers associated with Dutch culture. These elegant and colorful flowers have a long history in the Netherlands, dating back to the 17th century when they were introduced to the country. Tulips are known for their vibrant colors and distinctive shape, and they are often given as gifts to express love, appreciation, and congratulations. Mexico – Mexican Marigold (Cempasuchil) The Mexican Marigold, or Cempasuchil, is a significant flower in Mexican culture and is associated with Dia de los Muertos, the Day of the Dead, a traditional Mexican holiday to honor and celebrate deceased loved ones. These bright orange and yellow flowers are used to create elaborate ofrendas, or altars, as offerings to guide the spirits of the departed back to the world of the living. Mexican Marigolds are also given as gifts during Dia de los Muertos and other festive occasions. United States – Roses Roses are a timeless classic when it comes to flower gifting, and they hold special significance in many countries around the world. In the United States, roses are commonly associated with love and romance and are often given on Valentine’s Day, anniversaries, and other special occasions. Different colors of roses convey different meanings, with red roses symbolizing love, yellow roses symbolizing friendship, and white roses symbolizing purity and innocence, among others. Thailand – Orchids Orchids are highly revered in Thailand and are considered a symbol of strength, beauty, and fertility. These exotic and graceful flowers are commonly used in religious ceremonies, traditional dances, and as offerings to Buddhist temples. Orchids are also given as gifts on special occasions, such as weddings, to convey blessings of happiness and good fortune. France – Lilies Lilies are associated with elegance and grace, and they hold special significance in French culture. These beautiful and fragrant flowers are often used in floral arrangements, and they are commonly associated with funerals and sympathy. Lilies are also given as gifts on occasions like Mother’s Day, to express admiration and appreciation for mothers. In France, lilies are often associated with purity, renewal, and honor. When it comes to sending flowers internationally, it’s important to consider factors such as cultural traditions, symbolism, and availability. Flowers hold different meanings in different cultures, and what may be considered a thoughtful gift in one country might have a different connotation in another. For example, while red roses are commonly associated with love and romance in many countries, they may be considered inappropriate as a gift in some cultures. Additionally, the availability of certain flowers may vary depending on the season and region. Some flowers may be native to specific countries or regions, making them more readily available and affordable in those areas. It’s essential to do some research on the typical flowers and their meanings in the country or region where you plan to send a gift to ensure that your gesture is well-received and culturally appropriate. International flower delivery can also come with challenges such as customs regulations, taxes, and logistics. Shipping flowers internationally by yourself can be complex and expensive, with factors such as import restrictions, perishability, and time-sensitive delivery considerations. This is where online flower delivery services with international delivery options, like Good Choice Flowers, can be a convenient and reliable option. They have a wide network of local florists in various countries, making it easier to send flowers internationally with expertise in navigating customs regulations and ensuring timely delivery. Good Choice Flowers, for instance, offers international flower delivery to almost all countries around the world, providing a convenient way to send flowers to your loved ones abroad or for special occasions such as birthdays, anniversaries, weddings, or to express condolences. Their online platform allows you to choose from a wide variety of flowers, including the typical flowers of various countries, and provides options for customization, such as adding personalized messages or selecting different bouquet sizes and arrangements. Flowers are a universal language of love, appreciation, and celebration, and they hold special significance in different countries and cultures around the world. Knowing the typical flowers and their meanings in different countries can help you choose thoughtful and culturally appropriate gifts. However, it’s crucial to consider factors such as cultural traditions, symbolism, availability, and logistics when sending flowers internationally. Online flower delivery services with international delivery options, like Good Choice Flowers, can provide a convenient and reliable solution for sending flowers internationally and ensuring that your gesture is well-received and cherished by the recipient. So, whether you’re in a long-distance relationship, have a digital nomad friend, an expatriate in your family, or have business with companies in other countries, be sure to choose the right flowers and delivery service to make your international gift-giving experience a memorable one.
<urn:uuid:100c346f-3351-4d9d-8ec5-82689e08706c>
CC-MAIN-2023-23
https://lifestyledezine.com/discover-the-meaningful-flowers-of-each-country-for-international-gift-giving/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224657144.94/warc/CC-MAIN-20230610062920-20230610092920-00230.warc.gz
en
0.946097
1,364
2.984375
3
Fuse terminal blocks are a type of electrical connector used to connect two or more wires. They are often used in automotive and industrial applications where high currents need to be carried. If you’re working on an electrical project, you could use a fuse terminal block. Fuse terminal blocks come in various sizes and shapes, but they all serve the same purpose: to create a secure connection between two or more wires. Here’s how to use them. What is a fuse terminal block? A fuse terminal block is an electrical connector used to connect two or more wires. These blocks are typically used in applications where high current levels are required, such as in automotive applications. Fuse terminal blocks are available in various sizes and shapes and can be either surface-mounted or through-hole-mounted. How to wire a fuse terminal block When it comes to your electrical projects, you want to be sure that everything is properly wired, and fuse terminal blocks are a great way to do that. Here is a step-by-step guide on how to wire a fuse terminal block: - First, you will need to gather all the necessary materials. This includes the fuse terminal block, wires (of the correct gauge), and fuses. - You will need to attach the wires to the correct terminals on the fuse block. Ensure that the wire is securely connected and that no bare wire is exposed. - Once all the wires are attached, you can install the fuses into their respective slots. Ensure that each fuse is seated correctly and that they are of the correct amperage rating for the circuit they are protecting. - Finally, once everything is installed, you can test your work by turning on the power and testing each circuit with a multimeter or other device. Following these simple steps, you can easily wire a fuse terminal block and ensure your electrical project is adequately protected. What size fuse to use in a fuse terminal block When choosing the right size fuse for your fuse terminal block, there are a few things you need to consider. The first is the amperage rating of the circuit. This is the amount of current that the circuit can handle before it trips. The next thing to consider is the voltage rating of the fuse. This is the maximum voltage that the fuse can safely hold before it blows. Finally, you need to consider the time delay of the fuse. This is how long it will take for the fuse to blow if there is an overcurrent situation. Now that you know what to look for, let’s take a look at some standard sizes of fuses and their applications: - 5 amp fuses on lighting circuits. - 10 amp fuses on general-purpose circuits such as outlets and appliances. - 15 or 20-amp fuses on heavier-duty circuits such as air conditioners and large appliances. - 30 amp fuses on heavy-duty circuits such as industrial equipment or service panels. If you need to decide which size fuse to use, it’s always best to err on caution and go with a larger size. It’s better to have a circuit breaker trip than to have a fuse blow and cause damage to your equipment. Pros and cons of using a fuse terminal block There are many benefits to using a fuse terminal block for your electrical projects. They are easy to install and provide a safe, secure way to connect wires. They also allow you to easily change out fuses if they become damaged or burnt out. However, there are also some downsides to using a fuse terminal block. They can be expensive, and if you are not careful, it is easy to touch the live wires and receive a shock accidentally. When to use a fuse terminal block A fuse terminal block is an electrical component used to connect two or more electrical wires. This device is commonly used in electrical projects where multiple cables need to be connected, such as in a home theater system or a car stereo system. When connecting multiple wires, it is crucial to use the correct size and type of fuse terminal block for the application. The size of the fuse terminal block will depend on the number of wires that need to be connected. For example, a four-wire connection will require a larger fuse terminal block than a two-wire connection. It is also essential to use the correct type of fuse terminal block for the application. There are two main types of fuse terminal blocks: screw-type and spring-type. Screw-type fuse terminal blocks are typically used for low-voltage applications, while spring-type fuse terminal blocks are used for high-voltage applications. When connecting multiple wires, it is essential to follow all safety precautions. Always consult with an electrician before beginning any electrical project. There you have it! How to use a fuse terminal block for your electrical projects. This guide should give you all the information you need to use this type of terminal block in your projects. If you have any questions, feel free to leave them in the comments below, and we’ll do our best to answer them. Leave a Reply
<urn:uuid:165d716a-4047-4d81-b967-ccc735e64398>
CC-MAIN-2023-23
https://youthsmagazine.com/how-to-use-fuse-terminal-block-for-your-electrical-projects/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224654031.92/warc/CC-MAIN-20230608003500-20230608033500-00030.warc.gz
en
0.92924
1,048
3.21875
3
TheDissertation » How To Write Dissertation » Dissertation Hypothesis Recommendations for writing a dissertation hypothesis Dissertation is a research report paper that is dedicated to a certain scientific research. But this research should have a specific goal that has to be achieved. If this purpose is unclear or poorly formulated then supervisors will find it hard to find out what a student planned to receive after completing the work. Therefore, it is critically important to create a correct hypothesis prior to starting working on a dissertation since a successful one provides an exact answer to at least of the questions that were put in the introduction section. Thesis is a kind of a test for doctoral candidates that they pass in order to obtain the desired academic degree. Besides, a correctly constructed hypothesis makes it easier to make an outline of a topic research project. When you have a clear view of what should be done, it is much easier to figure out how it has to be done. A relevant hypothesis is your first step to a successful defense of a doctoral dissertation. To make it simple, it is a statement that should make an effect upon university staff and anyone who comes across it. What is hypothesis in dissertation? Brief explanation of an academic term Dissertation hypothesis is a main question that a researcher should provide an answer to. And this answer is a kind of a variable that does not have a constant value. It depends completely on scientific proofs and conclusions that an author provides. If you attend lectures on a regular basis it will be much easier to formulate a relevant hypothesis in dissertation that you work on. So, the principle is quite simple: the more often you attend a class, the more likely you will pass an exam. However, a hypothesis not only can be constructed in the form of a question, but also it can be a theory the correctness of which a dissertation writer has to prove using academic materials as well as online data sources. Thus, hypothesis is a key element of a paper that students have to defend for graduation. Creating a dissertation begins with formulating a hypothesis. It is recommended to attend lectures in a subject that you will have to write a dissertation on. There are three main categories of hypotheses depending on the type of variable: Simple hypothesis indicates the correlation between dependent and independent variable. Directional hypothesis demonstrates the ability of a writer to deliver a specific result. Complex hypotheses express relationships between several independent and dependent variables. It is a main thread that goes through the whole research process. To receive a high score for a dissertation candidates have to convince professors that their initial statement is not false. Even if a writer has done a huge amount of work, but the conclusion it does not the hypothesis, a student will fail defending a PhD. It is crucial not to underestimate the significance of a theory. that is proposed by an author. How to write hypothesis for dissertation: basic recommendations for authors Before making a hypothesis carefully analyze the problem you chose or were assigned to. Define both an object and a subject of research, and try to decide what theory you are going to prove to those people who will review your project. It is crucial to understand that this topic should have an importance for modern science or society. Review opinions of famous researchers about the given problem, and try to use this information as a background for your studies. This type of job has to be done step by step with a detailed analysis of findings that were made at different stages of research. Another recommendation is to attend libraries and browse online information sources to look for materials that will help prove that your hypothesis prediction is scientifically substantiated. Prior to doing research a graduate has to have a complete understanding of a topic and select the proper methods. Do not submit the hypothesis in dissertation if you are not 100% sure that you have enough academic materials to deliver relevant findings on an announced topic. If you struggle formulating a hypothesis of a dissertation, address you problem to a professional dissertation writing service. Qualified and experienced experts know how to do everything right, writing a hypothesis for a dissertation. It is important to specify a discipline as well as a topic of your PhD. For example, a student needs to purchase a paper on mathematics, so the main question could be something like “how does the behavior of the variable change under certain conditions?” Do you need an original paper? Approach our writing company and get top-quality work written from scratch strictly on time! Things which doctor candidates should know creating hypothesis in dissertation The basic requirement for writing the hypothesis of a dissertation is that it must be clear and relevant. When you attend your supervisors to present a PhD they should understand at once what is the exact aim of research and what statement a student is going to defend. As an author of a dissertation you should convince academic personnel of a university that the problem you selected for studying has a scientific value. If an author of a PhD attends all seminars and lectures it will be much easier for him/her to think of a good hypothesis. Your hypothesis has to be brief and concrete. Make sure that it consists of no more than two sentences. The supervisors should have a clear view of what theory you want to prove with research, because otherwise they will get confused and be unable to assess your PhD presentation fairly. Do not forget that an answer to a key question of a dissertation is considered a variable with a permanently changing value, so all statements should be supported by the obvious facts and universally recognized scientific data. Your dissertation score is a variable that depends on several factors, such as: an amount of time and effort you spent on doing research, how well do you understand the studied problem, and also the correctly constructed hypothesis. In case you are not sure what to start writing a dissertation with, elaborate the hypothesis first. For those people who experience difficulties with making a basic statement it is recommended to turn to specialists of content writing. They know how to create a perfect hypothesis that will satisfy supervisors and help you write an excellent dissertation.
<urn:uuid:5b42328f-5f0a-47a2-a7eb-d3d1cd763f81>
CC-MAIN-2023-23
https://thedissertation.net/how-to-write-dissertation/dissertation-hypothesis/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644309.7/warc/CC-MAIN-20230528150639-20230528180639-00030.warc.gz
en
0.959294
1,223
2.609375
3
The lens of history: 100 years of Delaware photography The earliest cameras appeared in the mid-1800s but were relatively primitive and difficult to use. The challenge was, the photographer relied on a cumbersome manual process to coat glass or metal plates with light-sensitive chemicals. The plates were inserted one at a time in the bulky camera — normally mounted on a tripod — so the picture-taking process was anything but spontaneous. Though early cameras were not capable of capturing anything in motion, the still images provided unprecedented visual documentation of events like the Civil War, with photographs that mostly showed key battlefield scenes and, occasionally, the grizzly images of dead soldiers. While the first cameras were crude, the invention of a light sensitive photographic paper by George Eastman — founder of Kodak — later helped improve the quality of photographs by professionals and amateurs alike. In 19th century Delaware, photographs were generally the work of professionals. And, because of equipment limitations, those photos were commonly posed portraits of people taken in homes or studios — or images of nonmoving landscapes and buildings. To document the early days of photography in southern Delaware, the Milford Museum currently has an exhibit that highlights 100 years of local photographic history. “It is an interesting part of Milford history,” said Claudia Furnish Leister, executive director of the museum. “And most of what you see (in the exhibit) is from our own collection.” According to Leister, the first photographer in Milford may not have been a resident. In fact, museum research found that the first was likely an itinerant by the name of William H. Todd, who probably lived in Dover. Todd took out a newspaper ad in 1855, announcing he would be in Milford to take photographs, or more accurately, daguerreotypes, which were metal plates treated with chemicals to make them light sensitive. To avoid accidental exposure from stray light, the photographer usually draped a black cloth over the camera before loading the chemically treated plate. “Those desiring pictures may rely upon having them taken in the most perfect style of the art,” said Todd’s 1855 advertisement in the Delaware State Reporter. Moreover, Todd said the daguerreotypes can be “skillfully set in medallions, rings, breastpins” all common methods of displaying photographs in the 1800s. While Todd was not local, it was not long before Milford and other southern Delaware communities had local photographers. “Virtually, most towns had someone and you also had itinerant photographers coming around,” said Andrew McKay, who is writing a book on the early history of photography in Delaware. Interestingly, one of the earliest in Milford was a woman — in a very male-dominated profession. Theressa M. Sanger, born in 1852, opened her photo studio in 1885. Later, in the local Milford Chronicle, she “announces to the people of Milford and vicinity, that I am now prepared to do all kinds of photography, having lately returned from New York and Philadelphia.” She added that photographing children was a specialty. Sadly, Sager died two years later, survived by her husband and two children. Two years later, her late husband, William, put the business up for sale. “It was an unusual profession for a woman,” said Leister. Daniel Holmes opened his Milford studio in 1868, then developed a portable studio on a horse-drawn wagon that he took to Ocean City in the summer, presumably to capitalize on the tourist trade. His son, Russell, took over the business but relocated it to Dover in 1879. Daniel Holmes, interestingly, was part of a photography team the federal government sent to Kerguelen Land station in the Indian Ocean to record the planet Venus passing between the Earth and sun. He was listed as chief photographer for the 1874 trip, which was called “the most important in photography of any during the year, and the most important to science of any that has occurred during the present generation.” Photographer William W. Daugherty moved to Milford from Sunbury, Pennsylvania, in 1891 and opened a studio three years later. According to the museum exhibit, during his 13 years in business, Daugherty rapidly became Milford’s leading photographer. A 1904 Milford Chronicle article said: “Noteworthy among the leading art photographers of Sussex county is Mr. W.W. Daugherty of Milford. His studio is advantageously situated on Walnut Street. The studio is well equipped and finely appointed. He is a past master in the difficult art of posing; and portraits are gems of perfect contour and artistic taste. He is a photographic artist in the truest and highest sense of the terms.” Unfortunately, Daugherty died of kidney failure in 1907 when he was just 37. Daugherty’s granddaughter, Sylvia Gilmore, still lives in Milford. Daugherty’s photography business was acquired by Charles Lefferts, who moved from New York. Lefferts also was praised locally. In 1909, the Milford Chronicle wrote: “Few photographers ever gained a better reputation for satisfactory work that has been accorded Mr. Lefferts during the less than two years he has been catering to the people of Milford and vicinity.” Lefferts also had an unusual specialty: he produced picture postcards. “The Lefferts Photography Shop had the “largest assortment of souvenir picture postcard views ever offered for sale in a town of this size, which includes over one hundred photographic views of the most attractive points of interest in Milford,” the museum exhibit said. Edward V. Hendrixson — also spelled Hendrickson — opened his Milford studio in 1863 but closed it a few years later to pursue a career as captain of the schooner Three Sisters, which was built in Milford. Andrew Komorowski, a Polish immigrant, moved to Milford in 1920. Though he was not a professional photographer, Komorowski produced some delightfully eccentric photos using a Cirkuit camera. The Cirkuit was equipped with a gear drive that advanced the film and slowly rotated the camera at the same time. Though it was commonly used for things like school class photographs to produce extremely wide, panoramic photographs, some, like Komorowski, found more creative uses. He discovered, for example, that he could start the camera then quickly position himself to be included in the photo. “I like to say that he did Milford’s first ‘selfie,’” Leister said. Komorowski left Milford for Long Island in 1940. The museum exhibit also uncovered a minor mystery. Leister found three photographs stamped “J.H. Hudson Milford, Del.” — all them from the late 1800s. She also discovered that a man named J. Hunter Hudson worked at a photography studio in Wilmington. No other information has been found. Could it be the same person?” she asked. “Right now, Hudson is quite an enigma.” IF YOU GO THE MILFORD MUSEUM Where: 121 S. Walnut St., Milford When: 10 a.m.-3:30 p.m. Tuesdays through Saturdays; 1-3:30 p.m. Sundays
<urn:uuid:97990717-7788-42e9-993e-1e5188f4a5d6>
CC-MAIN-2023-23
https://www.delmarvanow.com/story/news/local/delaware/2015/09/24/photos/72732364/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652184.68/warc/CC-MAIN-20230605221713-20230606011713-00030.warc.gz
en
0.973592
1,585
3.421875
3
ESO’s VLT spots first direct evidence of planet birth The European Southern Observatory's Very Large Telescope (ESO's VLT) have revealed possible signs of a star system being born. Around young star, AB Aurigae lies a dense disc of gas and dust, where astronomers have spotted a prominent spiral structure with a twist marking the spot where a planet may be forming. The feature could be the first direct evidence of a planet being born. While thousands of exoplanets have been identified so far, there is limited knowledge about how they form, according to lead author Anthony Boccaletti from the Paris Observatory at PSL University, France. Astronomers are aware that planets come into existence in dusty discs around young stars, like AB Aurigae, as dust and cold gas glump together. New observations made with VLT now provide major clues to help scientists understand the process better. "We need to observe very young systems to really capture the moment when planets form," said Boccaletti. However, astronomers had not yet been able to take enough sharp and deep images of these young discs to locate the twist that marks the area where a planet might be developing. VLT's new images feature a spiral of dust and gas around AB Aurigae, located 520 light-years from Earth in the Auriga constellation. Spirals of this type indicate the presence of baby planets. These push the gas that produces "disturbances in the disc in the form of a wave, somewhat like the wake of a boat on a lake," explained co-author Emmanuel Di Folco of the Astrophysics Laboratory of Bordeaux. The wave becomes a spiral shape as the planet rotates around the core star. The bright yellow twist area near the center, which is about the same distance from the star as Neptune is from the Sun, is one of the disturbance sites where a planet is being born. A few years ago, observations of the AB Aurigae system made with the Atacama Large Millimeter/submillimeter Array (ALMA), gave initial hints of ongoing planet birth around the star. The ALMA images showed two spiral arms of gas near the star, lying within the disc's interior region. Image credit: ESO/Boccaletti et al. In 2019 and early 2020, Boccaletti and some astronomers from France, Taiwan, Belgium, and the U.S. captured a clearer picture by turning the SPHERE instrument on VLT toward the star. To date, the SPHERE images are the sharpest images of the system. With SPHERE's powerful imaging system, the fainter light is more evident from small dust grains and emissions originating from the inner disc. They also confirmed the presence of the spiral arms first spotted by ALMA and also detected another remarkable feature, which is the twist. Image credit: ESO/Boccaletti et al. "The twist is expected from some theoretical models of planet formation," co-author Anne Dutrey stated. "It corresponds to the connection of two spirals– one winding inwards of the planet’s orbit, the other expanding outwards– which join at the planet location. They allow gas and dust from the disc to accrete onto the forming planet and make it grow." A 39 m (128 feet) Extremely Large Telescope is being constructed by ESO, which will draw on the revolutionary work of ALMA and SPHERE to study extrasolar worlds. Such a telescope will help astronomers get more detailed views of budding planets, Boccaletti said. "We should be able to see directly and more precisely how the dynamics of the gas contributes to the formation of planets." "Possible evidence of ongoing planet formation in AB Aurigae" – Boccaletti, A. et al. – Astronomy & Astrophysics – DOI: 10.1051/0004-6361/202038008 Context. Planet formation is expected to take place in the first million years of a planetary system through various processes, which remain to be tested through observations. Aims. With the recent discovery, using ALMA, of two gaseous spiral arms inside the ∼120 au cavity and connected to dusty spirals, the famous protoplanetary disk around AB Aurigae presents a strong incentive for investigating the mechanisms that lead to giant planet formation. A candidate protoplanet located inside a spiral arm has already been claimed in an earlier study based on the same ALMA data. Methods. We used SPHERE at the Very Large Telescope to perform near-infrared high-contrast imaging of AB Aur in polarized and unpolarized light in order to study the morphology of the disk and search for signs of planet formation. Results. SPHERE has delivered the deepest images ever obtained for AB Aur in scattered light. Among the many structures that are yet to be understood, we identified not only the inner spiral arms, but we also resolved a feature in the form of a twist in the eastern spiral at a separation of about 30 au. The twist of the spiral is perfectly reproduced with a planet-driven density wave model when projection effects are accounted for. We measured an azimuthal displacement with respect to the counterpart of this feature in the ALMA data, which is consistent with Keplerian motion on a 4 yr baseline. Another point sxce is detected near the edge of the inner ring, which is likely the result of scattering as opposed to the direct emission from a planet photosphere. We tentatively derived mass constraints for these two features. Conclusions. The twist and its apparent orbital motion could well be the first direct evidence of a connection between a protoplanet candidate and its manifestation as a spiral imprinted in the gas and dust distributions. Featured image credit: ESO/Boccaletti et al. If you value what we do here, create your ad-free account and support our journalism. Your support makes a difference Dear valued reader, We hope that our website has been a valuable resource for you. The reality is that it takes a lot of time, effort, and resources to maintain and grow this website. We rely on the support of readers like you to keep providing high-quality content. If you have found our website to be helpful, please consider making a contribution to help us continue to bring you the information you need. Your support means the world to us and helps us to keep doing what we love. Support us by choosing your support level – Silver, Gold or Platinum. Other support options include Patreon pledges and sending us a one-off payment using PayPal. Thank you for your consideration. Your support is greatly appreciated. Commenting rules and guidelines We value the thoughts and opinions of our readers and welcome healthy discussions on our website. In order to maintain a respectful and positive community, we ask that all commenters follow these rules: We reserve the right to remove any comments that violate these rules. By commenting on our website, you agree to abide by these guidelines. Thank you for helping to create a positive and welcoming environment for all.
<urn:uuid:7735e70a-126e-4d73-bfa5-321e199211c3>
CC-MAIN-2023-23
https://watchers.news/2020/05/24/eso-vlt-spots-first-direct-evidence-of-planet-birth/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656833.99/warc/CC-MAIN-20230609201549-20230609231549-00630.warc.gz
en
0.930336
1,488
3.34375
3
You are here Chapter 17 - Can the senses be supremely active without desire coming in? School is where one learns not only the knowledge required for daily life but also the art of living with all its complexities and subtleties. We seem to forget this, and become totally caught up in the superficiality of knowledge. Knowledge is always superficial. Learning the art of living is not considered to be necessary; living is not considered to be an art. When one leaves school, one stops learning, and continues to live on that which one has accumulated as knowledge. We never consider that life is a whole process of learning. As one observes life, daily living is a constant change and movement, and one's mind is not quick and sensitive enough to follow its subtleties. One comes to it with ready-made reactions and fixations. Can this be prevented in these schools? This does not mean that one must have an open mind. Generally the open mind is like a sieve retaining little or nothing. It is a mind that is capable of quick perception and action that is necessary. That is why we went into the subject of insight with its immediacy of action. Insight does not leave the scar of memory. Generally, experience, as it is understood, leaves its residue as memory, and from this residue one acts. The action strengthens the residue, and so action becomes mechanical. Insight is not a mechanical activity. Without strengthening the residue that is memory, can it be taught in the school that daily life is a constant process of learning and action in relationship? With most of us the scar of residue becomes all-important, and we lose the swift current of life. Both the student and the educator live in a state of confusion and disorder outwardly and inwardly. One may not be aware of this fact; if one is, one quickly puts order into outward things, but one is rarely aware of inner confusion and disorder. God is disorder. Consider the innumerable gods that man has invented, or the one god, the one saviour, and observe the confusion this has created in the world, the wars it has brought about, the innumerable divisions, the separating beliefs, symbols and images. Isn't this confusion and disorder? We have become accustomed to this; we accept it readily, for our life is so wearisome with boredom and pain that we seek comfort in the gods that thought has conjured up. This has been our way of life for thousands of years. Every civilization has invented gods, and they have been the source of great tyranny, wars and destruction. Their buildings may be extraordinarily beautiful, but inside there is darkness and the source of confusion. Can one put aside these gods? One must if one is to consider why the human mind accepts disorder politically, religiously and economically and lives in it. What is the source of this disorder-the actuality of it, not the theological reason? Can one put aside the concepts of disorder and be free to inquire into the actual daily source of our disorder- not into what order is but disorder? We can find out what absolute order is only when we have thoroughly investigated disorder and its source. We are so eager to find out what order is, so impatient with disorder, that we are apt to suppress it, thinking thereby to bring about order. Here we are asking not only if there can be absolute order in our daily life, but also whether confusion can end. So our first concern is with disorder and its source. Is it thought? Is it contradictory desires? Is it fear and the search for security? Is it the constant demand for pleasure? Is thought one of the sources or the main reason for the disorder? It is not merely the writer but you asking these questions. Please bear this in mind all the time. You must discover the source, not be told the source and then repeat that. Thought, as we have pointed out, is finite, limited; and whatever is limited, however wide its activities may be, inevitably brings confusion. That which is limited is divisive and therefore destructive and confusing. We have gone sufficiently into the nature and structure of thought. To have an insight into the nature of thought is to give it its right place so that it loses its overpowering domination. Is desire and the changing objects of desire one of the causes of our disorder? To suppress desire is to suppress all sensation, which is to paralyse the mind. We think this is the easy and quick way to end desire, but one cannot suppress it; it is much too strong, much too subtle. You cannot grasp it in your hand and twist it according to your wish, which is another desire. We have talked about desire in a previous letter. Desire can never be suppressed or transmuted or corrupted as right and wrong desire; whatever you do about it, it remains always sensation and desire,. Desire for enlightenment and desire for money are the same, though the objects vary. Can one live without desire? Or to put it differently, can the senses be supremely active without desire coming in? There are both psychological and physical sensory activities. The body seeks warmth, food, sex; there is physical pain and so on. These sensations are natural, but when they enter into the psychological field, the trouble begins. Therein lies our confusion. It is important to understand this, especially when we are young, and to observe the physical sensations without suppression or exaggeration; to be alert, watchful that they do not seep into the psychological inner realm where they do not belong. That is our difficulty; the whole process happens so quickly because we do not see this, have not understood it, have never really examined what actually takes place. There is immediate sensory response to challenge. This response is natural and is not under the domination of thought, of desire. Our difficulty begins when these sensory responses enter into the psychological realm. The challenge may be a woman or man or something pleasant, appetizing, or a lovely garden. The response to this is sensation, and when this sensation enters the psychological field, desire begins and thought with its images seeks the fulfilment of desire. Our question is how to prevent the natural physical responses from entering into the psychological. Is this possible? It is possible only when you observe the nature of the challenge with great attention and carefully watch your responses. This total attention will prevent the physical responses from entering into the inner psyche. We are concerned with desire and the understanding of it, not the brutalizing factor of suppressing, avoiding or sublimating. You cannot live without desire. When you are hungry you need food. But to understand, which is to investigate the whole activity of desire, is to give it its right place. Then it will not be a source of disorder in our daily life.
<urn:uuid:abc5465b-2a74-4ffb-b953-623a14c90313>
CC-MAIN-2023-23
https://www.jkrishnamurti.org/content/chapter-17-can-senses-be-supremely-active-without-desire-coming?qt-general_browse=1
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656788.77/warc/CC-MAIN-20230609164851-20230609194851-00430.warc.gz
en
0.955689
1,378
2.578125
3
Float Switch Basics The liquid level float switch is a liquid level control part with a simple structure and convenient use. It is equipped with a complex circuit and will not be disturbed. As long as the material is selected correctly, any liquid, pressure and temperature can be used. The float switch uses magnetic operation, no mechanical connection, simple and reliable operation. It has been widely used in the shipbuilding industry, generator equipment, petrochemical industry, food industry, water treatment equipment, dyeing and finishing industry, hydraulic machinery, etc. When the float switch is floated by the measured medium, the float drives the main body to move, and the magnet at the other end of the float will control the magnet on the switch action lever. The float switch does not contain components such as bellows, springs, seals, etc. that cause failures. Instead, a straight float is used to drive the internal magnet of the switch, and the simple lever of the float switch makes the switch act instantly. The float cantilever angle limit design prevents the float from being vertical. Float switch working principle The float switch does not contain components such as bellows, springs, seals, etc. that cause failures. Instead, a straight float is used to drive the internal magnet of the switch, and the simple lever of the float switch makes the switch act instantly. The float cantilever angle limit design prevents the float from being vertical. In a closed metal or plastic tube, design one or more magnetic reed switches, and then pass the tube through one or more hollow floating rings with ring magnets inside, and use the fixed ring to control the floating ball and the magnetic reed. The switch is in the relevant position to make the float float up and down within a certain range. The magnet in the float ball is used to attract the contacts of the reed switch, and the action of opening and closing is generated to control or indicate the liquid level. What are the types of float switches? Stainless steel float switch The universal stainless steel float level switch is available in two configurations, vertical and horizontal, with 1-way 30VA or 100VA reed switch output, which can reliably detect the level of relatively clean water, diluted chemicals and light oil. Suitable media include deionized hot water and cooking oil. Stainless steel level sensor can be installed vertically in the tank or horizontally on the tank wall for high or low level alarms. Connecting rod float level switch The connecting rod float level switch kit provides reliable multi-point level detection of relatively clean water, diluted chemical solvents, and light oils with a maximum range of 8' (2.44 m). 1-5 channels of reed switch output are adopted, and there are integrated wiring terminals in the integrated junction box. The float level switch is made of stainless steel and is suitable for liquid level measurement in high temperature or high pressure process storage tanks. Magnetic float level switch Float switches are often used in the control of liquid level in storage tanks. No external power supply, side or top mounting, wide temperature and pressure range, a variety of process connections, stainless steel wetted parts and explosion-proof design for a wide range of applications. Side mounted float switch Magnetic side-mounted float switches are often used in tank level control. The side mounted float switch has no external power supply, side or top mounting, wide temperature and pressure range, a variety of process connections, stainless steel wetted parts and explosion proof design make it a universally applicable float level switch. Cable float level switch The float level switch has two chambers, which are completely sealed using a special process when processing the cable float switch. Different switching points can be adjusted via the counterweight at the end of the cable. Non-toxic and mercury-free properties allow cable float level switches to be used in drinking water. Multi-point stainless steel float switch Float switches are used in FM and CSA certified explosion proof and general environment applications. The float switch provides up to 4 switch points, which can be used for PLC or SCADA remote equipment inspection. Multipoint stainless steel float switches are typically used in high temperature and/or high pressure process tanks where explosion proof certification is required. What are the float switches used for? The float liquid level sensor is specially used for liquid level detection of various medium and small atmospheric and pressurized liquid storage tanks, remote transmission of on-site indication signals, and liquid level alarms. It can be applied to various sanitary, toxic, corrosive media and explosive Gas Hazardous Locations. There are a variety of installation forms, suitable for various forms of containers. The float level switch is suitable for controlling the operation of the pump to maintain the liquid level, controlling the automatic loading and unloading of the tank, controlling the liquid level or supply signal, such as oil tank, automatic cleaning system, hydraulic tank, low pressure boiler, sewage treatment system. Relationship between the liquid medium and the floating ball - When the specific gravity of the liquid is different, the action position of the floating ball will change. Generally, when the SG is smaller than the water, the part of the floating ball immersed in the liquid will be relatively increased. - The reference specific gravity of the float switch product is water (SG=1), so the specific gravity SG of the liquid level must be considered when selecting the float ball, which must be larger than that indicated by the float specification, otherwise, the float switch cannot float. - For liquids with high viscosity that will not dry up, float balls with larger outer diameters should generally be used. - The float switch uses a magnet to sense the reed switch, so the liquid level to be measured should be free of iron filings, otherwise it will affect the action of the float on the switch.
<urn:uuid:ace6dfc1-027a-47de-81d5-d183496ebd6a>
CC-MAIN-2023-23
https://www.ato.com/float-switch-basics
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644855.6/warc/CC-MAIN-20230529105815-20230529135815-00230.warc.gz
en
0.881392
1,196
2.78125
3
A Research Community Built for Diverse Discoveries The lack of diversity in health research translates to less-than-optimal health care options for many people. Diversity of researchers and scientists is just as important as diversity of research participants. One of the All of Us Research Program’s goals is to enroll 10,000 researchers to delve into the available data in the Research Hub. As it does for the participant cohort, the program aims to have a group of researchers who are diverse in many characteristics, including race and ethnicity and where they are in their career. All of Us understands that a diverse research community will do more than just drive new types of questions; it will also spark innovation and strengthen our research enterprise. Learn how All of Us is working to ensure a diverse research workforce. Read the full story. Voices of All of Us: Researcher Cheryl Clark A researcher and hospitalist in internal medicine, Cheryl R. Clark, M.D., ScD, has dedicated her career to bridging the gap between the social environment and disease risks, or sometimes referred to as social determinants of health. Dr. Clark serves as co-chair of the All of Us Research Program’s Social Determinants of Health Task Force, drawing on her personal experiences growing up in the south suburb of Harvey, Illinois, and her professional experience as Associate Chief of the Division of General Internal Medicine and Primary Care at Brigham and Women’s Hospital. “The purpose of collecting this data is to form a more complete picture on the influences for susceptibility to disease and resilience that promotes health,” said Dr. Clark. Read more about Dr. Clark and her roles as a researcher, physician, and parent, and what she brings to the program in our newest Voices of All of Us feature. Testimonial: Dr. Jason Karnes More than 80% of people in clinical studies in genetics are White. But the vast majority of genetic variability is outside of individuals who self-report as White, so there is a gap in genetic research. Jason Karnes, Pharm.D., Ph.D., BCPS, FAHA, the Director of Scientific Programs at the University of Arizona, hopes that All of Us can change those statistics. His work with data from All of Us focuses on predicting adverse drug reactions and a person’s response to medications based on their genetics. Watch Dr. Karnes’ testimony on how the Researcher Workbench could be the first step in generating new discoveries that can be translated into patient care. Recent publications demonstrate both the power and the potential of the All of Us dataset. The dataset represents reproducibility, a diverse participant cohort, and a robust collection of data, including EHRs, surveys, and various samples. Below are recent studies related to All of Us: - Khan M.S., Carroll R.J. (2021). Inference-based correction of multi-site height and weight measurement data in the All of Us research program. Journal of the American Medical Informatics Association. Retrieved from https://doi.org/10.1093/jamia/ocab251. - Leasure, A. C., Acosta, J. N., Sansing, L. H., Sheth, K. N., Cohen, J. M., & Falcone, G. J. (2021). Association of lichen planus with cardiovascular disease: A combined analysis of the UK Biobank and All of Us Study. Journal of the American Academy of Dermatology, S0190-9622(21)02512-3. Retrieved from https://doi.org/10.1016/j.jaad.2021.09.030. - Lee, E. B., Hu, W., Singh, K., & Wang, S. Y. (2021). The association between blood pressure, blood pressure medications, and glaucoma in a nationwide electronic health records database. Ophthalmology. Retrieved from https://doi.org/10.1016/j.ophtha.2021.10.018. - Lunt, C., & Denny, J. C. (2021). I can drive in Iceland: Enabling international joint analyses. Cell Genomics, 1(2), 100034. Retrieved from https://doi.org/10.1016/j.xgen.2021.100034. - Montanez-Valverde, R. A., Zucher, S., Isasi, R., McCauley, J., & Carrasquillo, O. (2021). The Latino epidemiological paradox in cardiovascular disease in the All of Us Research Program. Journal of the American College of Cardiology, 77(18), 1464. Retrieved from https://doi.org/10.1016/S0735-1097(21)02822-9. - Na, J., Zong, N., Wang, C., Midthun, D. E., Luo, Y., Yang, P., & Jiang, G. (2021). Characterizing phenotypic abnormalities associated with high-risk individuals developing lung cancer using electronic health records from the All of Us Researcher Workbench. Journal of the American Medical Informatics Association, 28(11), 2313–2324. Retrieved from https://doi.org/10.1093/jamia/ocab174. - The National Institutes of Health (NIH) recently announced a $9.1 million funding opportunity aimed at increasing the number of early-stage investigators and new investigators, particularly those from groups historically underrepresented in health-related sciences. As part of this Request for Applications (RFA), All of Us intends to fund up to three awards for a total of $2.3 million for fiscal year 2022. Learn more and apply by February 22. - Intel has partnered with All of Us to support COVID-19 data curation and related research. Researchers who undertake COVID-19 research within the Researcher Workbench may be eligible to receive compute credits for their work. Learn more about this partnership and the chance to receive credits. All of Us News Check out the latest news: - All of Us has selected Geoffrey Ginsburg, M.D., Ph.D., as its new chief medical and scientific officer. Dr. Ginsburg will help set the scientific vision and strategy for the program. He will also oversee how the program collects and organizes data, leading the integration of new data types to support a range of scientific discoveries. “I’m excited to be at the forefront of this effort, working alongside participants, partners, researchers, and the NIH scientific community to continue to demonstrate the impact of this collaborative effort,” he said. Learn more about Dr. Ginsburg’s vision and background. - All of Us recently launched a new participant survey to collect information about various social and environmental factors, such as neighborhood safety, access to food, and experiences with health care. Responses will provide researchers with key data to better understand the connection between these factors, known as social determinants of health, and overall health. Responses from this survey are expected to be available in the Researcher Workbench in late 2022. Learn more about this survey and what it means for the program’s larger goals. Save the Date & Call for Abstracts: All of Us Science Day The inaugural All of Us Science Day is planned for April 1, 2022, and will highlight the wide variety of research projects underway on the Researcher Workbench. All of Us invites abstracts that describe the value of the initial set of All of Us data and tools in driving discovery. Proposals by registered researchers that address the diversity and utility of data and the promise of impact to the All of Us participant community will be considered for interactive panel discussions. The submission deadline is January 26, 2022. If you would like to receive All of Us Research Roundup, the quarterly researcher newsletter, directly, you can SUBSCRIBE HERE
<urn:uuid:1247f958-78c0-4af2-a8ae-fb42c7ee4a68>
CC-MAIN-2023-23
https://www.researchallofus.org/research-hub-updates/newsletter-2021-q4/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653764.55/warc/CC-MAIN-20230607111017-20230607141017-00230.warc.gz
en
0.898397
1,673
2.71875
3
Whether you recognize carnations from their symbolism of love and devotion, a lovely Mother's Day bouquet, or your high school prom date's boutonniere, this popular flower is one-of-a-kind. As one of the oldest flowers in the world, learn about the carnation's long and rich history full of symbolic meaning. About the Carnation Carnations were admired and adored by the ancient Romans and Greeks, who first cultivated these flowers over 2,000 years ago. Often found among other famous blooms like roses, daisies, and lilies, the beauty of carnations and popular flowers are amplified by one another and make for stunning floral arrangements for all occasions. Due to their passionate allure and symbolism related to love and devotion, red carnations are a suitable substitution for romantic red roses. Characteristics of Carnations A few words to describe carnations are thoughtful, tasteful, dynamic, durable yet delicate, unique, fascinating, fluffy, and fragrant. Carnations are herbaceous perennials, meaning the roots of carnations survive throughout the year resulting in fresh blooms each spring and summer. A fragrant flower, carnations offer a mild spicy or peppery clove-like aroma that is utilized in some perfumes. The appearance of carnations is unforgettable and unlike many other common blooms. Some say that the petals of carnations look as though they were cut with pinking shears, which has led to their nickname "clove pink." The layered petals of carnations are ruffled and full, making them stand-out, eye-catching flowers. Carnations are a beautiful symbol of love, devotion, passion, commitment, distinction, fascination, and a mother's undying love. As with most flowers, each color represents something unique. Learn the symbolism behind the most common carnation colors. Carnation Name Meaning The scientific name for carnations is Dianthus Caryophyllus. Dianthus is derived from the words "dios" and "anothos," meaning "god" and "flower," which translates to "flower of the gods" as well as "flower of love." Caryophyllus was chosen to highlight the carnation's clove-like fragrance, as Caryophyllus was the genus name for the clove family. There are two conflicting theories behind the meaning of "carnation." One suggests that carnation is derived from the word "corone" or "coronation," as the ancient Greeks and Romans utilized carnations in flower crowns and garlands during coronation ceremonies. Others believe that "carnation" comes from the Latin term "carnis," meaning flesh. This would refer to the flower's naturally pink and peach hue that resembles the color of flesh. An offshoot of this theory relates to the Christian belief that carnations first bloomed from the tears of the Virgin Mary as Jesus was crucified on the cross. Derived from the word "incarnayon," translating to "incarnation," this suggests that "carnation" came from the "incarnation" of God-made flesh. Fun Facts About Carnations - Carnations can last in a vase for 7-18 days, with spray carnations having a longer vase life than standard carnations. - You can preserve carnations by pressing them between two sheets of white paper and closing the paper inside a heavy book. Place a second large book on top and allow the carnation blooms to dry for three weeks. - Carnations are the national flower of Monaco, Slovenia, and Spain, and the red carnation is the state flower of Ohio. - Bogota, Colombia, is the capital of carnations as it produces the most carnations worldwide. - Since carnations belong to the Caryophyllaceae family, they are related to baby's breath and sweet william. - Carnations naturally bloom in pale pink and peach hues. Through genetic engineering and selective breeding, we find carnations blooming in red, yellow, white, purple, and green. - Carnations can cause gastrointestinal distress and mild dermatitis if ingested by our furry friends, like cats and dogs. Popular Carnation Varieties There are three main varieties of carnations: Carnations are fantastic flowers for all occasions, particularly when showing love and support to friends, family, and partners. However, some holidays specifically call for carnations, including red carnations for Valentine's Day, green carnations for St. Patrick's Day, and white carnations for Mother's Day. White carnations were chosen by Anna Jarvis, the founder of Mother's Day, as the holiday's official flower since they were her mother's favorite. Carnations are a popular wedding bloom, the flower to honor first wedding anniversaries, and the birth flower for January. Brighten your home or a loved one's day with colorful, fresh-cut, and thoughtful carnations from our online collection.
<urn:uuid:0ea08dad-764a-4904-8c95-4baa08b286df>
CC-MAIN-2023-23
https://www.inbloomflorist.com/knowledge/flower-dictionary/carnation/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649105.40/warc/CC-MAIN-20230603032950-20230603062950-00030.warc.gz
en
0.942178
1,040
2.75
3
The mobility of passengers and freight is fundamental to economic and social activities such as commuting, manufacturing, distributing goods, or supplying energy. Each movement has a purpose, an origin, a potential set of intermediate locations, and a destination. Mobility is supported and driven by transport systems composed of infrastructures, modes, and terminals. They enable individuals, institutions, corporations, regions, and nations to interact and undertake economic, social, cultural, or political activities. Understanding how mobility is linked with the geography of transportation is the primary purpose of this textbook. The Geography of Transport Systems offers a comprehensive and accessible introduction to the field with a broad overview of its concepts, methods, and areas of application. This material is provided to practitioners, policymakers, educators, researchers, students, and individual learners and includes a wide variety of media elements such as maps, figures, and PowerPoint presentations. The textbook is divided into twelve chapters. The first ten chapters cover a specific conceptual dimension of transport geography, such as networks, modes, terminals, and urban transportation. In addition to these conventional topics, emerging issues such as globalization, supply chain management, information technologies, energy, and the environment are also thoroughly discussed. Chapter 1 – Transportation and Geography - 1.1 – What is Transport Geography? - 1.2 – Transportation and the Physical Environment - 1.3 – The Emergence of Mechanized Transportation Systems - 1.4 – The Setting of Global Transportation Systems - 1.5 – Transportation and Commercial Geography Chapter 2 – Transportation and the Spatial Structure - 2.1 – The Geography of Transportation Networks - 2.2 – Transport and Spatial Organization - 2.3 – Transport and Location - 2.4 – Information Technologies and Mobility Chapter 3 – Transportation, Economy and Society - 3.1 – Transportation and Economic Development - 3.2 – Transportation and Society - 3.3 – Transport Costs - 3.4 – The Provision and Demand of Transportation Services Chapter 4 – Transport, Energy and Environment - 4.1 – Transportation and Energy - 4.2 – Transportation and the Environment - 4.3 – The Environmental Footprint of Transportation - 4.4 – Transportation, Sustainability and Decarbonization Chapter 5 – Transportation Modes - 5.1 – Transportation Modes, Modal Competition and Modal Shift - 5.2 – Road Transportation - 5.3 – Rail Transportation - 5.4 – Maritime Transportation - 5.5 – Air Transport - 5.6 – Intermodal Transportation and Containerization Chapter 6 – Transport Terminals - 6.1 – The Function of Transport Terminals - 6.2 – Transport Terminals and Hinterlands - 6.3 – Port Terminals - 6.4 – Rail Terminals - 6.5 – Airport Terminals Chapter 7 – Trade, Logistics and Freight Distribution - 7.1 – Transborder and Crossborder Transportation - 7.2 – Globalization and International Trade - 7.3 – Freight Transportation and Value Chains - 7.4 – Logistics and Freight Distribution Chapter 8 – Urban Transportation - 8.1 – Transportation and the Urban Form - 8.2 – Urban Land Use and Transportation - 8.3 – Urban Mobility - 8.4 – Urban Transport Challenges Chapter 9 – Transport Planning and Policy - 9.1 – The Nature of Transport Policy - 9.2 – Transport Planning and Governance - 9.3 – Transport Safety and Security - 9.4 – Transportation, Disruptions and Resilience Chapter 10 – Challenges for Transport Geography - 10.1 – Transport Resilience - 10.2 – Governance, Management and Digitalization - 10.3 – Social and Environmental Responsibility - 10.4 – Future Transportation Systems Appendix A – Methods in Transport Geography Appendix B – Applications and Case Studies Since transport is a field of application, using methodologies is particularly relevant to assist transport operators in allocating their resources (investments, infrastructure, vehicles) or influencing public policy. Appendix A focuses on qualitative and quantitative methodologies linked with transport geography, such as accessibility, spatial interactions, and graph theory. The convergence between methodologies and information technologies has led to many new analytical opportunities, notably geographic information systems for transportation (GIS-T). Transportation is a very active field of investigation and application to real-world issues, which are covered in Appendix B. - DO NOT COPY, REDISTRIBUTE OR TRANSLATE THE CONTENTS OF THIS WEB SITE. - The content of this site can be freely used for personal or classroom use ONLY. Although the material contained in this web site is freely available, it is not public domain. Its contents, in whole or in part (including graphics and datasets), cannot be copied and published in ANY form (printed or electronic) without consent. - The material, such as maps and figures, can be freely used for educational purposes, such as for classroom presentations, as long as it is not redistributed to the public. This excludes any other form of communication such as conference presentations, business presentations, published reports, and papers. - Backlink and guest post requests are ignored. This web site is an academic, neutral, and reliable source of information, not a marketing tool. - CONSULTANTS: SEE NOTICE BELOW. - PUBLISHERS: Permission requests to reproduce published materials have become abusive as publishers often ask for material (e.g. figures, maps, charts) to be granted unlimited use, in any language, on any media, for an unlimited amount of time and to have to right to grant third parties (anyone) to use the material. This means that such permissions ask the author to give his work away to the publisher to do as it pleases. Therefore, I rarely grant permission to reproduce my material. If I do, it is for a single-use and without the right for third-party use. - Permission to use any graphic material herein in any form of publication, such as an article, a book, or a conference presentation, on any media must be requested before use. - Information cited from this web site should be referred as: Rodrigue, J-P (2020), The Geography of Transport Systems, Fifth Edition, New York: Routledge. - Inquiries: Dr. Jean-Paul Rodrigue. Notice To Consultants Over the years, some of the contents of this website have been plagiarized, often without attribution, by consultants (and professionals) in reports and presentations covering various sectors of the transport industry. Maps and figures have been a particular target. This does involve not only small firms or individual consultants but also large globally recognized firms. This is highly unethical since it involves stealing someone else’s work while being remunerated. A common practice in the consulting industry is to steal and adapt the work of academics and present it as original material. Consultants, please keep in mind the following: - I usually do not provide interviews and advice unless compensated. The only exception is for the press. - By default, NONE of the graphic material on this web site can be used for commercial purposes without my consent. - Instances of plagiarism will be reported to clients and supervisors. - Even if plagiarism is done for internal or confidential reports, this does not remove the risk of detection. I am often asked to act as a third-party reviewer for consulting reports through non-disclosure agreements. Also, on some occasions, clients will release elements of these reports to the public, thinking that they are original work. - Consultants wishing to use some graphic elements contained in this web site, please contact me. For a reasonable fee, I can provide customized maps and graphics for unlimited use (I am also a consultant). - On some occasions (e.g. humanitarian work, NGOs, charitable organizations), the use of some graphic elements can be authorized at no charge.
<urn:uuid:cf6afe47-98f3-415d-88e4-c418f312a6f4>
CC-MAIN-2023-23
https://transportgeography.org/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652149.61/warc/CC-MAIN-20230605153700-20230605183700-00630.warc.gz
en
0.899707
1,675
3.578125
4
WHAT IS LIQUIDITY IN CRYPTOCURRENCY? In the world of cryptocurrencies, liquidity plays a crucial role in determining the efficiency and stability of the market. Liquidity refers to the ease with which an asset, such as a cryptocurrency, can be bought or sold without significantly impacting its price. In this article, we will delve into the concept of liquidity in cryptocurrency, its importance, and the factors that affect it. Definition of Liquidity Liquidity, in the context of cryptocurrency, refers to the ability to convert a digital asset into cash or another cryptocurrency quickly and at a fair market price. It reflects the depth of a market and the ease with which traders can execute trades without causing significant price fluctuations. Importance of Liquidity Liquidity is vital for a healthy and efficient cryptocurrency market. Here are some key reasons why liquidity matters: - Market Efficiency: High liquidity ensures that orders can be executed quickly and at competitive prices, facilitating efficient price discovery and reducing the impact of large trades on market volatility. - Ease of Trading: Traders benefit from liquidity as it allows them to enter or exit positions swiftly, minimizing the risk of slippage and ensuring fair execution. - Attracting Investors: Cryptocurrencies with higher liquidity tend to attract more investors and institutional participants who seek a liquid market to trade large volumes and manage their investments effectively. - Price Stability: Liquidity helps maintain price stability by minimizing the impact of market manipulation and enabling a smooth flow of trading activity. Factors Affecting Liquidity Several factors influence the liquidity of a cryptocurrency. Here are some key considerations: - Trading Volume: The trading volume of a cryptocurrency is a primary indicator of its liquidity. Higher trading volumes indicate greater market participation and increased liquidity. - Exchange Listings: Cryptocurrencies listed on reputable and widely-used exchanges tend to have better liquidity due to access to a larger pool of traders. - Market Depth: The depth of the order book, which represents the quantity of buy and sell orders at different price levels, affects liquidity. Deeper order books indicate better liquidity. - Market Spread: The difference between the highest bid and the lowest ask price, known as the spread, impacts liquidity. Narrow spreads indicate higher liquidity, as there is less price disparity between buyers and sellers. - Market Manipulation: Instances of market manipulation, such as spoofing or wash trading, can artificially inflate trading volumes and create a false sense of liquidity. It is essential to choose exchanges with proper regulatory oversight to minimize the risk of such manipulation. Several metrics and indicators are used to assess the liquidity of a cryptocurrency. These include: - Trading Volume: The daily trading volume is a simple measure of liquidity. Higher trading volumes generally indicate better liquidity. - Order Book Depth: Analyzing the depth of the order book provides insights into the liquidity at different price levels and the ability to execute larger trades without significant price impact. - Spread Analysis: Monitoring the spread between bid and ask prices helps determine the liquidity conditions and the cost of executing trades. - Slippage: Slippage refers to the difference between the expected price of a trade and the price at which the trade is executed. Lower slippage indicates better liquidity. How To Exchange Solana for Fiat on Astro Africa Astro Africa is undoubtedly one of the most fantastic cryptocurrency exchanges to come out of the Nigerian cryptocurrency ecosystem. It is a platform that embodies the definition of profitable, fantastic user experience, security, and transparency. Astro Africa allows users to exchange their cryptocurrency assets for Naira or Cedis (plans are in motion to expand to other parts of Africa). They have a mobile application available for just Android users for now. The amazing thing about Astro Africa is that users are entirely in charge of their portfolios and do not need to hold their assets on the platform before they can trade and withdraw their fiat directly to their local bank accounts free of charge. This makes users focus more on trading and not have to worry too much about how their fiat is being moved around when they need it. Together with the awesomeness of Astro Africa mentioned above, the signup process is one of the most seamless and straightforward processes ever: - Proceed to the Astro Africa signup page, and complete all the required details. - Once the step above is completed, you’ll instantly receive a confirmation code in your email. Copy this code and complete your signup. - Once you’re done, you are required to set up a five-digit (5) transaction pin. It’s that easy, you can now start trading or you can explore the sleek user interface. - Make sure you complete your profile by adding your bank account and other necessary details to ensure a maximum pleasurable user experience. - Next, proceed to select “Sell Crypto”. You first select the amount of crypto you wish to sell (minimum $5). For now, you can only exchange Bitcoin (development is already in progress for supporting other assets). - You can see the exchange rate, the amount you will receive in fiat also, and the wallet address for you to send your assets to. After 2 block confirmations, your Astro Africa wallet is credited with fiat you can proceed to withdraw to your local bank account. You can always learn more about How To Trade on Astro Africa and read their blog on various posts about how to trade various gift cards and cryptocurrencies effectively. It is an exciting innovation that has come to stay. Liquidity is a vital aspect of the cryptocurrency market, ensuring smooth and efficient trading operations. Understanding liquidity and its factors empowers traders and investors to make informed decisions and navigate the market effectively. By considering metrics such as trading volume, order book depth, and market spread, market participants can gauge the liquidity of cryptocurrencies and choose the most suitable trading environments. As the cryptocurrency market continues to evolve, liquidity will remain a critical factor for the growth and maturity of the ecosystem. By staying informed about liquidity dynamics and monitoring relevant metrics, traders and investors can enhance their trading experience and capitalize on the opportunities presented by a liquid market. Disclaimer: The information provided in this article is for informational purposes only and should not be considered as financial or investment advice. Cryptocurrency investments are subject to market risks, and readers should conduct their own research and seek professional guidance before making any investment decisions.
<urn:uuid:6a0112ee-ecf8-4875-bef0-db42b663f91b>
CC-MAIN-2023-23
https://thenovamarkets.com/2023/05/24/what-is-liquidity-in-cryptocurrency-2/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652207.81/warc/CC-MAIN-20230606013819-20230606043819-00230.warc.gz
en
0.924482
1,311
2.796875
3
Do you find yourself turning to that box of Girl Scout cookies you hid in the freezer or that bag of chips that was “for when company comes over” when stress hits? It turns out that stress eating is very real, and it can have a negative impact on your health. Stress activates your adrenal glands to release cortisol, which increases your appetite. Research shows that stress also blocks hunger hormones, like ghrelin, that regulate your appetite. If anxiety is cutting into your sleep, your appetite is revved up even further. Unfortunately, that anxiety-induced hunger can have long-term consequences for your waistline. Researchers found that women who reported being stressed burned fewer calories and less fat and had a higher insulin response after eating a high-fat meal. Published in the journal, Biological Psychiatry, the study concluded that stress-induced changes led women to burn about 100 fewer calories per day. When you’re under stress, you often feel out of control and overwhelmed, which can definitely leak into your eating habits. It’s not shocking to go after junk food instead of keeping up with your normal healthy habits because you’re worried about the past or the future, rather than what you’re eating in the present. Stress depletes the cognitive resources you need to remain strong-willed, focused and capable of practicing creative problem-solving. That’s why getting elbow-deep in a pint of ice cream always feels easier than actually coming up with a plan for how to tackle a personal or work-based dilemma. While it would be better if we crave celery sticks and carrots during crazed moments, there is a biological reason why we don’t. Pizza, french fries, cookies and ice cream are stress-eating staples because these high-carb, high-fat eats increase the brain’s dopamine response, which makes us feel good. So, when you get caught in a stressful situation, you’ll crave the reward of junk food because your brain expects the dopamine reward and knows where to find it. It’s easy for stress snacking to become an ingrained habit. A few recent studies conclude that one reason we eat high sugar foods is because sugar diminishes stress-induced cortisol responses. So, you ultimately feel better on a sugar high. Over time, your brain may start to rely on these foods to simmer down. The problem is that anyone who’s been on the emotional eating train knows what it feels like after you eat for emotional reasons. The guilt, frustration and sugar crash hit you like a hangover. As you might expect, there is also research that eating excess “bad for you” foods can make an irritable mood even worse. If you’re ready to break free from stress eating habits and bring joy back into your eating, here are some tricks to try the next time anxiety strikes. Think Long-Term Goals Take a minute to focus on the future, whether that means recalling your weight loss goals or how awesome you want to look on vacation next month before you give in to stress eating. It can help get you out of the cravings so you can make healthier food choices instead of succumbing to the lure of a tasty treat. Figure Out What the Real Issue Is We all know food is just a crutch when we’re stressed. Stress eating is not the primary problem, but a symptom of needs that have gone unfulfilled. Ask yourself how you feel or what you need to figure out what’s really getting you stressed. There are studies that show that people who try stress reduction techniques, learn to recognize hunger, and pay attention to taste are less likely to stress eat. Next time you’re feeling taxed, look into mindfulness training. You can learn to recognize your feelings, accept the unpleasant ones and focus on your breathing so you can fight the automatic urge to reach for a high fat snack. Be Kind to Yourself Self-compassion can decrease stress eating. When you’re kind to yourself, it’s easier to resist the urge to try to disconnect through stress eating. If you do stress eat, promise that you won’t beat yourself up and understand that it happens to everyone sometimes. That can help stop you from eating out of failure and help you make better choices later. If All Else Fails… Go ahead and indulge. If you’re going to do it anyway, let yourself slowly and fully enjoy it instead of angrily shoveling food down your throat without paying attention. Sit down, let yourself relax, and taste it. Try to do so with some self-control. Plan on savoring a portion of something rather than devouring the whole batch. There are many ways to cope with stress, but for many of us, that involves grabbing for that bag of chips or pint of ice cream. It’s essential to address the root cause of your stress, practice mindful stress-relieving techniques and, most importantly, be kind to yourself so you can break free from stress eating habits and focus more on your health and wellbeing. Recipe: Creamy Green Strawberry Dream Serving in this recipe:1 - Calories: 236.6 - Total Fat: 3.6 g 5.5% - Saturated Fat: 0.4 g 1.9% - Cholesterol: 0 mg 0% - Sodium: 358.7 mg 14.9% - Total Carbs: 45.7 g 15.2% - Dietary Fiber: 9.9 g 39.4% - Sugar: 22.1 g - Protein: 8.1 g 16.2% - Vitamin A: 481.9% Vitamin C: 244.1% - Calcium: 68.5% Iron: 26.1% * Percent Daily Values are based on a 2,000 calorie diet. Your daily values may be higher or lower depending on your calorie needs.
<urn:uuid:46c0b532-bc5a-4384-a2de-ac13ec174957>
CC-MAIN-2023-23
https://nutribulletindia.com/blogs/news/why-you-turn-to-food-when-you-are-stressed
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224643663.27/warc/CC-MAIN-20230528083025-20230528113025-00630.warc.gz
en
0.940272
1,243
2.625
3
We knew this question would spark lively debate among readers. School is a big part of life, not just for kids but for their families and for educators, too. Everyone has an opinion about what’s best for students. And they don’t always agree. Do kids need homework? The answer is . . . (drumroll): It depends. Some of our readers insist that the extra work reinforces what they learn in class. And it helps teachers identify where students need more help. Others say homework adds to students’ stress and takes time away from exercise or learning something new. Readers also wondered what kind of homework kids should do. And how much kids need. Here’s what they said. Pradyun Senthilkumar, 9 Los Angeles, California Kids need homework. When they learn something new in school, reviewing it at home helps them remember it. At my school, teachers give math and language arts homework. That’s because there’s a lot we need to learn. In math, we’re learning addition, subtraction, multiplication, and division. In language arts, we’re learning spelling, reading, and writing. And we’re also learning how to speak. Our homework gives our teachers valuable information. It tells them how much students are paying attention in class and who needs extra help. Homework is important at every stage of learning. Olivia Lin, 9 In my opinion, giving students homework is a bad idea. Kids need time after school for experiences that build a healthy mind and body. Homework is not supposed to stress kids out. It’s meant to help them grow. But when homework heaps up, students get stressed. And the quality of homework that a stressed-out mind produces is low. Doing homework poorly is worse than doing no homework. As long as students are working hard in class, it’s best not to give them extra work. That’s for the sake of their mental and physical health. And their happiness. Isla Dhaliwal-Grizzell, 8 Kids need homework. But the amount should vary by age. Middle and high school students are ready for added responsibility. So they can do much more homework. At my school, elementary students get homework, but not too much. My teacher might assign us spelling words to learn at home, and each week we’ll be given a test. But other assignments can require families to work with kids at home, if they need extra help. That’s why we do most of our learning in class. Sometimes, elementary students at my school will have an optional homework assignment to do for a special prize. Isaac McKee, 11 Durham, North Carolina Kids don’t need homework. They’re learning for six hours a day at school, focusing on subjects from math and science to history and reading. Adding another hour of work for kids to do at home is just having them repeat what they’ve been doing all day. Plus, homework takes time away from activities like team sports, hobbies, exercise, and playing. These are just as important as schoolwork, because they keep kids active. Kids don’t need more time staring at a piece of paper or a computer screen. Homework just covers what they already learned in class. It’s pointless. Jolynn Xiao, 9 Corpus Christi, Texas Here’s why I think kids should have homework. If you can’t solve a math problem, or if you answer a question incorrectly on a homework assignment, your teacher knows exactly what to help you with. Parents also have a chance to help. They can work you through a math problem or clarify a question. I’m not arguing for homework because I want kids to feel a lot of pressure at school. I just think it’s a way to let teachers, parents, and even you know where you might need some improvement or extra help. It’s that simple. Considering the benefits, why wouldn’t we want kids to have homework? Nathaniel Kim, 11 South Pasadena, California Many people believe that homework is essential. They say it can teach kids how to complete tasks on a deadline. I don’t deny that homework teaches students positive work habits. But it takes time away from learning material that wasn’t covered in class. And there’s no guarantee that time spent on homework will be more effective than time spent in the classroom, if students are paying attention and taking notes. Homework should not be done away with completely. But it should be reduced so students have more time for creative activities. The Next Debate! Should all cars be electric? Email your opinion to firstname.lastname@example.org by March 3. Your response might be featured in an upcoming issue.
<urn:uuid:ff8404e4-fad8-4311-9d63-132246fcaabe>
CC-MAIN-2023-23
https://www.timeforkids.com/g34/do-kids-need-homework-g3/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656963.83/warc/CC-MAIN-20230610030340-20230610060340-00030.warc.gz
en
0.962416
1,026
2.859375
3
Companies handle all sorts of information every day, from stock and transactional data to emails and social media posts. While some of this data is stored and structured in databases, nearly 80% of business data is unstructured. Before, it was difficult to gain value from unstructured, resulting in an untapped resource with a huge amount of potential. Luckily, with advancements in machine learning technology, and the accessibility of machine learning software, businesses are now using this data to gain meaningful and more granular insights, in real-time. However, unstructured data still accounts for the majority of dark data (digital data that goes unused), so what’s stopping businesses from making the most of this data? Keep reading to learn more about unstructured data, why it’s so important for businesses, and how AI-powered tools can help you easily organize troves of unstructured data in next to no time. Unstructured data, also known as qualitative data, is disorganized information. It isn’t arranged in a systematic way or format and is difficult to process and analyze using traditional data analysis methods. Examples of unstructured data in business include: Organizations receive huge amounts of unstructured data every day, which is great because it contains valuable insights about how customers feel and why, and helps them understand why a customer churned, for example, or why a customer didn’t finalize their purchase. But, while this data exists in abundance, it accounts for a lot of dark data, data that isn’t used because it’s hard to process and analyze. Business and IT decision-makers estimate that 55% of their data is dark. Structured data, or quantitative data, on the contrary, is easy to process and analyze. While it’s valuable, it doesn’t go beyond facts, figures, and trends. In other words, structured data answers ‘what?’ but not ‘why?’. Unlike unstructured data, it’s organized and easily searchable in databases and spreadsheets. Close-ended responses to surveys, star ratings in reviews, and tagged data are some examples of structured data. In between structured and unstructured data exists semi-structured data. This type of data is partly organized with meta tags, for example, or other elements that assign hierarchy or categories. However, data within each category remains unstructured. Emails are a great example of semi-structured data: you can tag and search for emails by category (inbox, sent, promotions, spam, etc), but the data within each email is disorganized, and the categories don’t provide an accurate overview of what each email is about. In a nutshell, unstructured data offers tremendous value for businesses but it’s difficult to store, process, and analyze, making it hard for companies to unlock its full potential. Manually sorting unstructured data does not scale well either. Imagine, for instance, having to manually tag topics across thousands of survey responses. It’s a time-consuming and tedious task that, if left to humans alone, would result in errors and inconsistencies. Fortunately, machine learning tools can help businesses to make sense of unstructured data in a fast and simple way. Before we delve into business intelligence tools that can help you make the most of your data, let’s look more closely at why unstructured data is so important. Unstructured data helps you understand what makes your customers tick and how you can create better customer experiences. By analyzing social media conversations, product reviews, open-ended survey responses, and more, companies can gain valuable insights about their customers, products, and services, which help them make smart, well-informed decisions. Among other things, analyzing unstructured data can help you: Unstructured data can help you evaluate the quality of your customer support. Traditionally, customer support teams have been measured against metrics like customer satisfaction (CSAT), First Contact Resolution Rate, and Resolution Rate. However, by sending out surveys and analyzing open-ended responses, or filtering and analyzing social media conversations that mention customer support, you can find out the reasons for low or high customer support metrics. NPS responses, for example, could help you understand recurring customer support issues that receive a low score, and lead you to build a self-service knowledge base that can answer these frequent support issues. When customers share opinions and experiences about a brand on product review sites, on social media platforms, or in survey responses, they generate a wealth of qualitative data that you can collect and analyze. Customer feedback contains valuable information about what customers like and dislike about your product, service, or company, and can provide key insights to understand their needs and expectations. Analyzing social media mentions after releasing a new feature for your app, for instance, can help you detect issues, learn more about how customers are using your app, and help you improve your product. Unstructured data can also help you better understand how customers perceive your brand. By monitoring opinions about your brand's image and reputation you can gain insights that go beyond traditional metrics like impressions, reach, likes, shares, and comments, among others. If you compliment these metrics with an analysis of your customers’ social media posts, you can gain an extra layer of insight, allowing you to understand the nuances of brand mentions and topics that customers mention most. Traditional computing systems are not well-suited to deal with unstructured data, except for basic indexing and filtering functions. Therefore, until recently, most unstructured data analysis had to be done manually ‒ something that’s costly, time-consuming, and hard to scale. Machine learning tools uses natural language processing (NLP) to understand, process, and analyze human language, in much the same way as humans, allowing them to extract value from huge amounts of unstructured data in next to no time. This has revolutionized the way businesses handle large volumes of unstructured data in several ways: One huge advantage of machine learning tools is that they automatically learn from past data samples to make predictions about new data. So, there’s no need to keep re-training them. And since machines are trained to analyze data in the same way, you can be confident that your data is accurate and free from any bias With machine learning tools, you can automatically classify unstructured data by sentiment, topic, intent, urgency, and more, and extract meaningful information such as keywords, entities (phone number, names), and features, all in real-time. For example, paste your opinions into this sentiment analyzer, to see how it automatically classifies your data as “Positive”, “Negative”, or “Neutral”. Maybe you want to use machine learning tools to automatically sort customer feedback by sentiment and topic to gain a clear understanding of your products’ strengths and weaknesses (and even compare them against what's being said about your competitors). Or, you might want to monitor social mentions by automatically analyzing customer sentiment in real time. This way you can spot unhappy customers on the fly, and handle negative comments faster so that they don't escalate as fast, or at all. Finally, you might use machine learning tools to automate customer support tasks such as tagging incoming tickets and routing them to the right agents. That way, you can reduce response times and prioritize urgent issues, which results in higher customer satisfaction. While all this may sound complex, there are many tools available that make machine learning extremely accessible. Using a no-code tool like MonkeyLearn, which features native integrations and a robust API, you can easily integrate machine learning models with your helpdesk software, and other data sources. Unstructured data is a rich source of business insight. Now, machine learning tools are allowing businesses to extract meaningful information in real-time and at scale, whether to support data-driven decisions or automate routine tasks. What used to take hours of tiresome manual processing, can now be done in just a few minutes. Thanks to no-code, out-of-the-box tools like MonkeyLearn, you can start getting value from your unstructured data right away. Request a MonkeyLearn demo to learn more about how you can gain value from your unstructured data. August 26th, 2020
<urn:uuid:4830aebb-bf48-4ef1-bfcb-c31a0457a219>
CC-MAIN-2023-23
https://monkeylearn.com/blog/what-is-unstructured-data/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224654606.93/warc/CC-MAIN-20230608071820-20230608101820-00430.warc.gz
en
0.9295
1,755
2.5625
3
This article will give you a detailed step-by-step guide on how to grow jalapenos in pots and still get a good crop. Why Grow Jalapenos In Pots? Growing jalapenos in pots can have many benefits, including: - Pots can be placed anywhere in the garden or greenhouse. - The plants are easier to move around. - Pots can be moved indoors during winter. - Pots are easy to water. - You can grow them with or without fertilizer. - You can add compost to your pots if you wish. - Potting soil is inexpensive and readily available. Read more about A Guide On How To Grow Onions In Texas How To Grow Jalapenos In Pots Growing jalapenos in pots require a little bit of patience, but it’s well worth the effort! Jalapenos are a wonderful addition to any garden. They can be used as a delicious snack, and their spicy flavor can spice up almost any dish. You can use them in salads, soups, sandwiches, pizza, chicken dishes, dips, etc. The following instructions will show you how to grow jalapenos in pots. You can follow these instructions for growing jalapenos in pots in both indoor and outdoor settings. Step 1: Get an ideal pot. When growing jalapenos in pots, you want to choose a pot that is sturdy and deep enough to hold water without getting the soil too wet. You also want to make sure that the pot is large enough to hold the plant and its roots. A good pot for growing jalapenos in pots should be at least 18 inches tall. If you don’t have such a pot, it is best to look for one online or at your local garden center. Step 2: Prepare the potting mix. Once you have the pot and soil, it is time to prepare the soil in the pot. Fill the pot halfway up with potting mix, then add in some fertilizer, such as Osmocote or compost manure, and then water it thoroughly. You can water the soil by either using a watering can or by pouring water directly into the pot. Make sure that the water gets to all parts of the soil, including the drainage holes. Step 3: Set the pot in a warm spot. Once you have prepared the pot and filled it with potting mix and fertilizer, it is time to set it somewhere warm. Keep your pot in the warmest part of your garden or house. However, ensure that your jalapenos do not receive too much direct sunlight as it will kill them. Step 4: Propagate and grow. After you have planted your jalapenos, you will want to wait for them to grow until they are big enough to start harvesting. To start your jalapenos growing, you will need to cut off the top of each plant. Step 5: Water your jalapenos. You should not water your jalapeno plants every day, but only when they are completely dry. Step 6: Fertilize. Once your jalapenos have been planted and have grown, you will want to fertilize them with a balanced fertilizer. You can use any type of fertilizer that you would use on regular plants. You can use any balanced commercial fertilizer, organic fertilizer, or compost manure. Step 7: Harvest. Once you have grown your jalapenos for about 70 – 90 days, it’s time to harvest them. You can harvest the peppers when they are small and tender or leave them until they are bigger. You can also harvest some of the peppers after they have been in the ground for a while. The longer you let the peppers grow, the more they will produce. When you harvest your jalapenos, make sure to remove all of the stems and roots. Step 8: Store. Once you have harvested your jalapenos, you will want to store them somewhere cool and dry. You can keep them in a refrigerator for up to 2 weeks. If you don’t want to use them right away, you can freeze them for up to 4 months. Tips To Grow Jalapenos In Pots Tip #1. When you are growing your jalapenos, you will need to cut off the top of the plant when it is small and tender. Tip #2. Growing your jalapenos in pots is easier than growing them in the ground. It takes less time, and you don’t have to worry about things like weeds or pests. Tip #3. You will need to water them often and check that they are getting enough nutrients. Tip #4. Choose the right pot for your jalapenos. Choose a pot that is shallow so that the roots don’t get too much water. If you use a deep pot, then the roots will be very thirsty, and this will affect how fast they grow. Tip #5. Don’t overcrowd the soil. When you are growing your jalapenos in pots, it is important to keep them evenly spaced out. This will make sure that each plant gets enough sunlight. In Summary – How To Grow Jalapenos In Pots The above guide will help you learn the easy way how to grow jalapenos in pots, especially in the cold season when you cannot grow them outdoors. Read more about How To Cool A Grow Tent Without Ac Frequently Asked Questions How often should I water jalapenos? Jalapenos are an ever-changing crop, so you’ll need to use your best judgment. They don’t have a set schedule, but we recommend watering regularly and monitoring the soil moisture as they mature. In general, water them daily in the early stages of growth. As they mature, water them more frequently as needed to keep the foliage healthy and prevent wilting. How many jalapenos do you get from one plant? We estimate that one plant can produce between 200-400 peppers. You’ll get more if you grow more plants! What month do you plant jalapeno peppers? In the fall, we like to sow them indoors about 2 weeks before the last frost date in your area. If you have a greenhouse or a heated building, you can grow them year-round. What is the best fertilizer for jalapeno peppers? The easiest way to feed your plants is with a foliar application of compost tea or liquid fish emulsion. Jalapeno plants prefer well-drained soil that’s rich in organic matter. They also need plenty of sunlight and good air circulation. If you live in a warmer climate, you can grow them outside year-round in containers. How long do jalapenos take to flower? Our jalapenos usually start flowering around 7 weeks after sowing and continue until they’re done producing fruit. We don’t recommend growing jalapenos if you have trouble with pests or diseases, as the extra stress will reduce yields.
<urn:uuid:5672bb3b-7d65-41f4-affd-eccd9915e1dc>
CC-MAIN-2023-23
https://furneysnursery.com/how-to-grow-jalapenos-in-pots/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648695.4/warc/CC-MAIN-20230602140602-20230602170602-00230.warc.gz
en
0.925334
1,488
2.890625
3
When was the last time you used an application that was just impossible to comprehend? Or that you visited a web page that made it hard to find what you were looking for? I’m guessing you don’t have to rack your brain too hard to come up with an example. In fact, if you’re reading this at work, you might very well have opened our newsletter just to take a break from the confusing enterprise software you’re stuck using for your job. The Science Behind the Suck During World War II, Army Air Force scientists noticed that changes in cockpit design often had disastrous effects on pilot performance. When the mental and physical capabilities of pilots did not align with the design of the aircraft, pilots were much more likely to make a mistake. Considering these “human factors” as part of the design turned out to be an important safety and performance issue. This insight led to a new science that linked human psychology to product design. Fast forward to 1990s. Computer software starts to become mainstream. No longer the realm of the most technical users, human capabilities and product design started to clash again. Building on what the Human Factors researchers had learned, the science of usability engineering took off to meet the challenges of software design. Some of the important human characteristics that must be considered include: - People have limited working memory capacities - Attention limits the ability of our minds to process only so many thoughts and inputs at once - Our eyes are drawn to salient features - We mentally group things in predictable ways - Our perceptions are colored by our experience and expectations So how do you use this knowledge to make digital products that don’t give people fits? I’ll give you a hint: you’ll have to do a little more than add a line that “the application will be designed with usability in mind” to your requirements doc. User-centered design is an approach to designing and developing software that results in applications and websites that are easier to use and better meet the needs of users. What Is User-Centered Design It starts by putting users at the forefront of design decision making. That’s what user-centered design is all about. Through research, observation, iterative design, and usability testing, we can understand the needs and behaviors of our users and use our expertise as designers to craft products which are useful, usable, and pleasurable to the users. A typical user-centered design process would go something like this: - Analysis – Identify the characteristics of the users, user goals, context of use, and business goals. Talk to actual users and business stakeholders. - Design – Create mockups or lo-fi, low cost prototypes of the solution based on the information gathered in the analysis phase. - Testing – Test your mockups or prototypes with actual users to determine what works and what needs to be improved. Iterate on the design and testing phases to improve the process and move closer to … - Development and Delivery – Building as you iterate through the test and design phase, you’ll approach higher fidelity until you’re ready to complete the development and delivery of your project. - Evaluation and Lifecycle Management – Evaluate the success of the project against the characteristics defined in step 1 by measuring the behavior of actual users. Continue to ensure the product is updated using user-centered principles throughout the lifecycle. Noticing a theme? Why Is That So Important? In the realm of ecommerce, the consultants User Interface Engineering used user testing to discover a usability flaw that was costing a major retailer $300M in lost revenue (http://www.uie.com/articles/three_hund_million_button/). When designing products, Jakob Nielsen estimates that spending 10% of a project’s budget on usability doubles the quality metrics for the project (http://www.nngroup.com/articles/usability-101-introduction-to-usability/). When designing intranets and enterprise applications for internal use, your users may not have somewhere else to turn. In those cases, you don’t have to worry about losing customers. But poorly designed applications can cause all sorts of problems. - Employees are less efficient at their jobs when the tools they need are hard to use. - Confusing interfaces may cause employees to make costly errors. - Users blame themselves when they have trouble using an application, so having to spend the day using a suite of poorly designed applications leads to unhappy workers and lowered employee morale. But We Don’t Have Designers! How Can I Get Me Some Of That User-Centered Design? While you may not have designers, someone does design every application. It may be a business analyst or product manager doing mockups in Visio or it might be the developer turning user stories directly into front-end code. Inadvertent design is still design. You don’t have to bring in an expensive agency or hire a team of User Experience Designers when you’re just starting out. The best way to improve the user experience of your products is simply to watch your users use your product. User Interface Engineering has a list of excellent ways to start your user research (http://www.uie.com/articles/starting_user_research/). If you’re interested in learning more, I suggest starting with the following books: - Don’t Make Me Think by Steve Krug – The classic introduction to designing websites and applications for usability. Quick and easy to read, it’s a must read for anybody involved in product work. - The Design of Everyday Things by Donald Norman – Norman is a pre-eminent cognitive psychologist and designer. Norman goes more in depth into the psychology of design than Krug, but this book is still quite accessible. 1 reply on “Why User-Centered Design Matters” Great article! I loved the examples at the beginning. Another really good book on this is “Designing for Situation Awareness: An Approach to User-Centered Design” by Mica R. Endsley and Debra G. Jones (2012), Boca Raton, FL: CRC Press.
<urn:uuid:b0cc781f-d20b-438d-9250-9cacecde124b>
CC-MAIN-2023-23
https://www.shoap.com/why-user-centered-design-matters/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653501.53/warc/CC-MAIN-20230607010703-20230607040703-00630.warc.gz
en
0.928036
1,304
2.625
3
Nicotine stays in the system for approximately 72 hours, though you can test positive for nicotine and its by-products months later. Table of Contents Most people are aware that nicotine is present in cigarettes, tobacco, and vapes. But they’re less familiar with what it actually is and how it affects your body long-term. If you’re facing a blood or urine test, read on to see how your prior tobacco use can influence the results and learn how to clear nicotine from your system. What Is Nicotine? Found in tobacco and other plants, nicotine is an addictive liquid alkaloid that acts as a stimulant to the central nervous system (CNS). An alkaloid is a subcategory of nitrogenous organic compounds known to have a distinct effect on humans. When pure, it is colorless, odorless and oily. The air causes the substance to turn brown and give off a specific smell. The United States is the world’s largest producer of tobacco leaves. How Does Nicotine Affect Your Body? Medical experts will tell you that nicotine is just as addictive as heroin or cocaine. It has several profound effects: - Nicotine floods your CNS within seconds - Dopamine is released, giving the sensation of relaxation and happiness - There is an increase in your heart rate and blood pressure - Your alertness is heightened How Long Can Nicotine Stay In Your System? The length of time nicotine stays in your system depends on a few factors. The amount of nicotine in the tobacco product, and the amount that you inhale play a role. It typically takes between 1 and 3 days for nicotine to leave your system and around the same amount of time for it to leave your saliva. However, in some cases, you can still test positive for nicotine (or its by-products) months after smoking. It can even stay in your hair follicles for up to a year in some instances. Second-hand smoke exposure may result in a positive test result, meaning you can test positive even if you don’t use tobacco. With so many factors at play, just how long nicotine stays in your system is an imperfect science. Nicotine vs. Cotinine While nicotine is processed fairly quickly in the body, its metabolite – cotinine – lingers. Cotinine is a product formed after the chemical nicotine enters the body.– Centers For Disease Control and Prevention The half-life of nicotine and cotinine are very different. In fact, cotinine’s half-life can be up to about 10 times as long as nicotine’s. Cotinine levels are considered the most reliable indicator of a person’s exposure to tobacco products. Just because you haven’t used nicotine within the last few days doesn’t mean you won’t test positive for cotinine. How Do Nicotine Tests Work? Nicotine and its metabolites are routinely tested for when you: - Apply for health/ life insurance - Get a new job - Participate in a smoking cessation program - Undergo some surgeries Here’s a quick look at the four primary methods of nicotine testing. |Detectability||Up to 3 weeks||Up to 10 days||Up to 5 days||Up to one year| Can You Test for Nicotine at Home? At-home nicotine test kits are readily available. A quick search online will provide you with a number of purchasing options. Most at-home kits test urine, but you can also find kits that test blood, saliva, and hair. While not necessarily as accurate as a test via a medical professional, at-home kits can give you an overall picture of whether or not nicotine is in your system. How Can You Clear Nicotine from Your System? If you’re looking to clear nicotine from your system ASAP, the strategies below can help. Ascorbic acid, or vitamin C, is a water-soluble vitamin with antioxidant properties. Vitamin C aids in the metabolization of nicotine and can be found in a variety of healthy foods, such as: - red peppers From mental clarity to cardiovascular health, exercising is just plain good for you. Exercise has innumerable health benefits, including aiding in the flushing of nicotine from your system. Here’s how it works: Your metabolism rises when you exercise. Consequently, nicotine leaves your body faster. Water is another natural solution with a myriad of health benefits. Not only does it improve your body’s functions, clear your skin and boost energy levels, but it can also help with nicotine removal. When you drink H2O, it flushes nicotine and other toxins from the body. What Products Contain Nicotine? If you’re wondering whether or not one of your products could lead to a positive test result, take a look at the list below. The number of products has increased over the years. It is common to test positive for nicotine if you use any of the following: - Electronic cigarettes - Electronic delivery systems (ENDS) - Roll-your-own tobacco - Pipe tobacco - Smokeless tobacco - Nicotine gels, gum, patches Interestingly, in 2018, the Food and Drug Administration announced their desire to sharply decrease the amount of nicotine found in cigarettes. Conventional domestic cigarettes contain somewhere between 1.1 to 1.7 milligrams. The FDA hopes to drastically cut the amount to 0.4 milligrams in hopes to decrease addiction rates. What Are Some Risks Associated with Nicotine? The greatest disease-producing product known to man is tobacco.– U.S. National Library of Medicine, National Institutes of Health Most products that contain nicotine are associated with negative health consequences, particularly: - Cardiovascular disease - Heart attack - COPD (chronic obstructive pulmonary disease) Interestingly, many of the negative health effects come from other chemicals found in the products, not specifically nicotine. Nicotine replacement therapy (NRT) can help you quit smoking, but unfortunately, in a study published by the Harvard Public School of Health, NRT was shown to be ineffective long term. The recidivism rates for tobacco-use are highest during the first year after quitting. If you can make it one year without using, your odds of long-term success jump. Because it is an imperfect science, a lot of ambiguity surrounds just how long nicotine will remain in your system. Factors that affect the length of time include: - Type of product - Frequency of use - Age and overall health - Diet and exercise While it leaves your blood, saliva, and urine quickly, nicotine could stay in your hair for up to a year. The tips above can help you to flush nicotine out of your system more quickly, but the best long-term solution is to stop using tobacco.
<urn:uuid:994a4e8e-1c40-4657-bfb6-d2ff777e9cab>
CC-MAIN-2023-23
https://www.bestliferates.org/blog/how-long-does-nicotine-stay-in-the-system/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656833.99/warc/CC-MAIN-20230609201549-20230609231549-00630.warc.gz
en
0.904807
1,561
2.9375
3
The right to food was recognized in 1948, and the Sustainable Development Goals (SDGs) underscore the necessity to achieve Zero Hunger. Yet, almost 690 million people in the world were undernourished in 2019, a number that’s likely to be higher now due to the COVID-19 pandemic. The High Level Panel of Experts (HLPE) on Food Security and Nutrition, the science-policy interface of the UN Committee on World Food Security, has recently published the report “Food Security and Nutrition: Building a Global Narrative towards 2030”, calling for a worldwide change of narrative in food security policy and practice. HLPE experts argue that a radical transformation of our food systems requires critical shifts in policy and a change in our thinking. Based on the HLPE report, this article provides an outline of three key steps for creating a new theory of change. Let’s take a look at what needs to happen. 1. Expand our food security vocabulary Expanding our understanding of food security to include agency and sustainability is the first step. These concepts join the four other dimensions of food security: access, availability, utilization and stability. Agency refers to the capacity of individuals or groups to make their own decisions. In the context of food, agency means making decisions about what you eat, how your food is produced and processed, and having a voice in decision-making and policy about food systems. Marginalized groups, including women, indigenous communities, small-scale food producers and poor people in urban areas have long lacked agency. Not surprisingly, these groups are more likely to be food insecure. Sustainability is not a new concept. However, it is essential to formally incorporate it into our food security mindset. Why? Because the idea of sustainability implies a long-term perspective, necessary when facing challenges such as ecological degradation, climate change and growing social and economic inequalities. Our food systems need to foster ecological, social and economic regeneration. Only then can food systems be truly sustainable, fulfilling this generation’s food needs without compromising the needs of future generations. 2. Employ a holistic approach The second step emphasized in the report is to embrace a more sustainable food systems framework, with the right to food as its central principle. Including consideration about access to adequate food and its production for everyone throughout the entire food system, and the systems that support it, would reinforce the connections among ecological, social and economic dimensions. This holistic approach is also valuable for achieving other goals of the 2030 Agenda, as many of them boost each other. A food systems framework captures the complexity of drivers and feedbacks that come into play when we talk about food. These drivers range from biophysical to technological to social, and beyond. Unsustainable diets drive ineffective and irresponsible food production, leading to environmental degradation. Societal challenges, such as gender inequality, can worsen within food production systems if women are excluded from decision-making processes. A systems approach recognizes these drivers and works towards the right to adequate food, while addressing systemic challenges, ultimately, paving the way to resilient adaptive and just food systems. A holistic approach is key in a globalized world, where events in one country can trigger global repercussions. The most recent example is the global COVID-19 health crisis, which has disrupted trade, reducing access to food and changing consumption patterns worldwide. A systemic approach can ensure higher preparedness to such events and enable the creation of policy and legislation that support all food system actors, from farmers all the way through the supply chain to consumers. 3. Change policies The HLPE report also outlines four essential policy shifts that need to happen to achieve the SDG2 targets. Let’s take a closer look at each of them and what it may look like in practice. First, food systems must move away from the “production at all costs” principle. Instead, food systems need to be focused on quality. Agroecology initiatives offer effective ways of making food systems more regenerative, resource-efficient, and ecologically diverse. Moving towards this mode of operation may be challenging, but it starts with securing land access and insurance for local producers, followed by education and training. The experience from applying agroecology shows improved soil fertility, greater pest resistance and more sustainable livelihoods. Second, production systems need to be in sync with nature. The two are linked through feedback loops and complex interactions; therefore, they must be mutually supportive. A classic successful example is the rice-fish-duck system in Asia. Fish and ducks planted in rice paddies act as natural pest control and fertilize the soil. The rice provides shade, food and shelter for the animals. The fields become hotspots for biodiversity in contrast to monoculture rice cultivation. This way farmers produce three commodities in the same space, benefitting both food and ecological systems. Identifying climate-smart agricultural techniques for local farmers should be easier in a supportive policy environment. Third, policy needs to address hunger as well as other forms of malnutrition. Malnutrition manifests in many ways, including micronutrient deficiencies and obesity. Chile has taken an impressive step forward in tackling soaring levels of overweight and diet-related diseases. In 2016, Chile implemented the Law of Food Labeling and Advertising, requiring companies to declare if foods and drinks contain an excessive amount of sugar and are ultra-processed. The law also limits advertising and marketing of these products to children younger than 14. In addition, schools are not allowed to sell these products. The law has changed Chilean’s consumption patterns in a positive manner. Finally, policy needs to be context-specific because every food system is unique. One of the greatest modern food security challenges is bridging the rural-urban divide. In Brazil’s Belo Horizonte policymakers managed to meet the needs of urban residents’ and regional farmers’ livelihood at the same time. Since 1993, the Secretariat for Nutrition and Food Security (SMASAN) established restaurants in Belo Horizonte with a serving capacity of 14,000 meals a day. The meals are prepared with ingredients sourced from local farmers who sold their produce directly to the city. All visitors paid the same price, which removed social stigma of visiting these restaurants. This program has also established a network of home, school and community gardens to provide healthy nutritious food within the city limits as well as additional income to disadvantaged groups. The results were impressive: among others, child hospitalizations for malnutrition dropped by 60%. How do we proceed? The report ends with a list of 12 concrete recommendations on how to move forward. These include advice on how decision-makers can learn and progress from the COVID-19 pandemic. The authors of the report recommend that governments support food supply chains to avoid disruptions and increase local production and consumption. UN agencies must also create a rapid response system to help the world’s poorest if we encounter crisis like COVID-19 again. Finally, knowledge, data and experience exchange need to be as open as possible so we can learn as a collective. Let’s put the pieces together. To drastically change our food systems, we need to integrate agency and sustainability into our food mindset, re-build our food system framework and reach radical changes in policy. Incorporating these factors into our food systems will be challenging. But even though it may seem overly ambitious, these changes are possible. With these tools in hand, we stand a much better chance of achieving the goal of Zero Hunger by 2030. Written by David Falk, Communications Consultant, SIANI and Ekaterina Bessonova, Communications Officer, SIANI.
<urn:uuid:3280d08d-9ef4-4cb2-9cd3-fac198bc1412>
CC-MAIN-2023-23
https://www.siani.se/news-story/food-systems-must-mainstream-sustainability/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224657144.94/warc/CC-MAIN-20230610062920-20230610092920-00230.warc.gz
en
0.944043
1,563
3.453125
3
SEO is abbreviated as "search engine optimization" it is the methodology of initiating steps to facilitate the website or content to be ranked on Google or another platform of search engines. In simplest terminologies, it states the procedure for improving the site to enhance the visibility when people look for different products and services pertains to business in Google, Bing, and other kinds of search engines. When there is a great range of visibility on your page while searching, you are under the attention and attraction of people or existing customers. SEO is based upon the strategy you follow, and a good strategy helps you build your portfolio with quality and the attention of people's traffic on your site. There is a difference between SEO and paid advertisements, i.e., the SEO involves ranking which is "organic," it states that you haven't to pay in order to rely upon the certain space. To make it easy, search engine optimization elaborates by taking a part of the content and optimizing it through the platform of search engines like Google and displaying it at the top when anybody searches it to get knowledge or to read it. Technological advancement has made SEO easy because keywords' search and volume, and reputation calculation have become very reliable through the SEO software platforms. Most website owners utilize the software's of SEO to get information on how much their site is performing and improving day by day. Identifying SEO goals Setting SEO goals is an essential component of any SEO plan. Setting SEO goals and aligning them with the broader business goals is critical because they inspire buy-in from relevant parties. - They assist you in developing your SEO strategy. - They make certain that objectives are met. You should keep track of setting objectives may seem like a tedious process, but assessing them can assist you in making long-term development with overall SEO. There are different aspects which can be measured for defining the correct definition of SEO. Consider the following metrics: - Market Share - Brand recognition and - Lead generation A good SEO incorporates: - Searching relevant keywords with high search volume potential - Creating and optimizing high-quality, valuable content for users and search engines - Incorporating useful connections from reputable sources - Results evaluation How does SEO work? Google and Bing search engines used crawlers, sometimes known as bots and spiders, to assemble the knowledge and information about all content available on the internet. The crawler begins at a well-known online page and tracks links externally and internally to other websites' pages. The crawler can capture what each website is like and how it's conceptually linked to most of the other webpages in the search engine's enormous record, called an index, thanks to the information on those webpages and the contexts of the connections it followed. When the user highlights the query in the search bar, the engine utilizes the complicated algorithms to instigate what is the most accurate result entailed in the list for the relevant query. The results include the full of text webpages, articles, videos and images, descriptions of businesses, and other types of content for distinct niches. Numerous aspects rely upon the algorithm of search engines, and those aspects change continuously to build the changing behavior of users and bring dynamic patterns in machine learning. Machine learning has advanced the patterns of algorithms and it progressed to change as a new setup commenced in the market of technology. A search engine works depending upon three phases, the crawling state to be discovering stage, and the second is indexing, the filling stage. Last is ranking, considered as retrieval stage. The description of these three phases are as mentioned below in detail: The primary step is crawling. Web crawlers are sent out by search engines such as Google to search out new pages and gather data about them. Such web crawlers are also known as spiders or 'robots.' Their goal is to find new web pages and review the content of pages they've already viewed to see if it's updated or modified. Indexing is the second step. Indexing facilitates when the search engine figures out whether the content will be be utilized or not when it is done with crawling. When the search engine considers the crawled page worthy, it is added to the index. A certain index is utilized at a final ranking stage. When the web page or the content piece is indexed, it can be stored in the database and retrieved later on. Those web pages offering unique content are categorized and placed in the index. The third and most important stage is ranking, which is by far the most essential. Just after the crawling and indexing stages are completed, ranking can begin. As a result, after a search engine has browsed and classified your website, the site can easily be ranked. Because of technology advancements, SEO has been much smoother, as the research of keywords and associated volume and credibility calculation has become much more reliable. The majority of website owners use SEO tools to determine how well their site is working and expanding day by day. SEO Importance in Marketing In digital marketing, SEO is considered the major fundamental part because people used to search billions of topics every day, whether it is content of high importance or low importance. The most usual purpose of searching the content is to gather the relevant information about the products and services. Before talking about writing about any topic, the search is the most prior and primary option and the initial source to get the traffic for newly launched or revamped brands. SEO recognizes and complements the channels of marketing. If the visibility is high and ranking is higher in the search results, then the competition can give you a greater impact on the bottom line. The technological software's have made SEO a big easiest way to figure out how to gain the critiques of search engine optimization to rank the website at the top of the page. Although, search results have been evolving for years to provide direct answers to users. Remember that the results of searching features like rich results and Knowledge Panels can facilitate you stand out and provide users more knowledge and information about the business rights in results. SEO is the building block of the holistic ecosystem of marketing. When you know what your users want from your website, it would be easy for you to implement that knowledge in the circle of your campaigns, either paid or organic, across the websites, properties of social media, etc. The three building blocks of SEO Digital marketing grasps zeal through good incorporation of SEO. A digital marketer possesses the knowledge about how to rank the brand, website, and company through the help of SEO. Having a proper understanding of evolving SEO keeps you at the top of the list. SEO is evolving and changing in different ways, but its key practices won't change. The SEO can break into three core features or pillars that must be familiar with and need action daily if you are an SEO optimizer. Let's discuss these three features: - Technical optimization is the procedure of finishing activities on your website designated to modify the SEO but aren't related to content. It most often happens behind the scenarios. - The on-page optimization is the methodology of assuring the content on the site is authentic and incorporates a greater experience for the user. It infers targeting the keywords inside your content and can be highlighted through the content management system. WordPress, Drupal, Shopify, etc., is the most common illustration of a content management system. - Off-page optimization is the featuring process of improving and advancing the ranking of site engines with the help of activities incurring outside of the website. This can be driven through backlinks, which facilitate building the site's reputation. SEO and Businesses Whether your company is commercial or analytical, your goals will be different. If your company is transactional and has an e-commerce component, you should focus your goals on measuring sales and lead engagements. However, if you have a non-e-commerce business site, you should concentrate on lead creation. If you run an informative business, you're more capable of setting goals centered on brand recognition or web traffic. Finally, consider that SEO is never complete, even though your strategy is correctly deployed. When it comes to SEO, you may need to switch strategies in the middle of the game, play a healthy game, and wait for the outcomes. However, with a strong SEO framework in place – and a little perseverance – the advantages of your SEO plan should become apparent. The technological period is rapidly expanding, and if we look to the future, the predicted nature of SEO will be much higher than it is now. The SEO algorithms are always evolving, and we have no idea what they will be in the future. However, website competitiveness would become more difficult and complex by facilitating SEO.
<urn:uuid:b9aa3806-b78b-41fd-885e-12ab26264fce>
CC-MAIN-2023-23
https://www.designanddevelopmentagency.com/post/what-is-search-engine-optimization
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224654606.93/warc/CC-MAIN-20230608071820-20230608101820-00430.warc.gz
en
0.938387
1,802
2.625
3
Onions are a must-have staple for many dishes, whether it be breakfast, lunch, or dinner. Growing your own onions is an excellent way to keep costs down and have a bountiful supply whenever you may need them. When it comes to planting and germinating onions, the temperature will play a role. If the temperatures are warmer, your onion seeds will germinate faster. But that isn't to say they aren't still a great candidate for colder climates. Plant outdoors in spring, about an inch deep into the soil, allowing approximately half an inch between seedlings. Onions like cold temperatures, especially in the earlier part of their growth. They are straightforward to grow, so it is the perfect time to try growing a vegetable if you're a beginner! Beetroot is another versatile vegetable to have in your crops for the cooler months. They can be used in several meals like salads or side dishes or eaten roasted with other vegetables. They can even be used in desserts! Their color is vibrant, the flavor is off the charts, and they are super healthy. According to Nourish by WebMD, beets are excellent for reducing inflammation and increasing blood flow. Start by growing beets outdoors and note they can tolerate transportation if required. They are, of course, cool-weather tolerant, so starting them off outside is ideal. Sow half an inch deep and 1-2 inches apart, then cover with a thin layer of soil. Mulch and water regularly, and you should be able to harvest roughly two months after planting. Did you know that potatoes are grown in nearly every state in the USA? They are a known staple in every home and almost any dish, for that matter! Potatoes love cool weather, hence why they are on this list, so aim to plant any time after your last frost in spring. If you live in the south, you can grow potatoes from September through February; otherwise, you will want to wait until your soil's temperature is roughly 50 degrees Fahrenheit. Space your potatoes approximately three feet apart in rows dug about 8ft deep. Keep the soil well-drained and cool with plenty of organic matter. Some people may be on the fence about kale, but once you learn how versatile it can be – you're hooked! The possibilities are almost endless, with several uses like kale chips, breakfast muffins, soups, hash, and salads. The temperature plays a huge factor in how kale tastes; if kale grows and matures in cooler climates, the leaves will taste better. Plant your seeds three to five weeks before the last spring frost; however, there are several different times kale can be grown depending on when you want to harvest. Just keep in mind kale won't grow in heat! Sow half an inch deep and 6-8 inches apart. Keep your kale in full sun and water well for best results. Spinach is full of health benefits. According to Nourish by WebMD, spinach can hydrate you, prevent osteoporosis and even curb your appetite. If you have limited space, you can plant spinach indoors, but you will need to keep it inside from then on, as spinach seedlings do not transfer well. When planting, sprinkle roughly 12 seeds per row and sow a half to one inch deep. Water spinach seedlings well in spring and continue to keep moist with mulch. Be wary that spinach is more prone to the elements when it is new and fresh, but it can still tolerate the cold to an extent. If extreme cold is predicted, cover your spinach up overnight. Enjoy your fresh spinach with savory meals like salad and stir-fries, or add it to a smoothie for a healthy twist. Turnips are the perfect beginner gardener vegetable! They may not have sprung to mind instantly when growing vegetables, but they are great to use when you need a warm home-cooked meal, especially something hearty like a soup or stew. You can sow turnip seeds in early fall for a late fall harvest. Simply sow a half to a quarter-inch deep in the soil, roughly one inch apart. Ensure your seeds are set out in rows approximately 18 inches apart. Water your turnips consistently until the soil is lightly moist, not soaked. Handy tip: harvest after one or two frosts if you like your turnips on the sweeter side! For the more experienced gardener or anyone who wants to challenge themselves, cauliflower is an excellent cool-weather crop to experiment with. Cauliflower can be used to make rice, pizza dough, or used as an ingredient in many dishes. It has a strong resemblance to broccoli in appearance but with a sweeter, slightly earthier flavor. Unlike other cool-weather crops, cauliflower requires two full seasons to complete its 'cycle', which is quite a long time to wait! Patience certainly will be a virtue when it comes to growing this crop. You will want to plant cauliflower roughly four to five weeks before the last frost is due. Experts recommend planting in biodegradable pots to make it easier to transfer your cauliflower seedlings later on. Ensure you sow seeds half an inch deep in the soil and keep them moist. Mulch can be beneficial in moisture retention. Take your time and experiment; remember, there are no mistakes, only lessons! Marigolds are a great cool-weather crop to add a punch of color and flavor to your garden! That's right; you can eat their flowers, which are mildly citrusy and a little spicy. As the name suggests, marigolds bloom in beautiful shades of gold, orange and yellow, making them an eye-catching feature in any garden bed. After the last frost has passed, plant your marigold seeds directly into the garden soil. They will sprout as soon as the weather warms up and bloom about eight weeks later. For a more tolerant marigold, try the French variety; they are far less fussy on conditions! Another cool-weather bloom that everybody loves; pansies! Plant in early spring or fall. Growing pansies from seedlings can be significantly more challenging, so you may want to start with an established pansy. Depending on how harsh the weather is, you may choose between planting indoors or outdoors, but don't forget, pansies can handle frost. Plant in part or full sun, and don't worry about the temperature; pansies love cool weather. Water them regularly and fertilize if they look a little sad, and you will soon enjoy their vibrant blooms! This late winter flower is a stunning choice when it comes to cool-weather crops. Keep them cool in the summer by planting in the shade, and don't forget to ensure the soil is loose. Unfortunately, if you live in Florida or South Carolina, you will have to pass on these beauties as they love the cold. However, if you are lucky enough to have snowdrops, they make excellent cut flowers and are the perfect plant for lining a path or bare patch in your backyard. There you have it, our top 10 cool-weather crops! Now enjoy the fall weather and look forward to reaping the benefits of your bountiful garden.
<urn:uuid:e3873ac9-2d1c-4fb3-b45e-c40981ae4be4>
CC-MAIN-2023-23
https://www.hoselink.com/blogs/gardening-blogs-usa/cool-weather-crops
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648850.88/warc/CC-MAIN-20230602172755-20230602202755-00430.warc.gz
en
0.94434
1,502
2.828125
3
A Mumbai-based research firm had a sudden scare during a pan-India video meeting when there was a breach by an intruder. While no data was stolen, this company’s client base of more than 10 entities sought a complete external audit of this incident by independent consultants including the list of participants and their background, possible data leaks and private information theft. Considering the amount of information to be assessed, a cost of almost Rs 40 lakh cost was incurred by the company. While this firm’s cyber cover would pay for this cost, the company is looking to hike the size of the policy. Amidst the coronavirus (COVID-19) outbreak, companies in India are having a re-look at cyber insurance covers to look into what their risks and liabilities could be. Here, the potential situations and cost estimates are being analysed to arrive at appropriate insurance covers. COVID-19 has led to employees across companies working from home. With this, all client meetings, audit meetings as well as confidential board meetings are held virtually. This opens up corporates to potential threats of breach, phishing and ransomware. Also Read: Live updates on the Coronavirus outbreak in India Frequently Asked Questions A vaccine works by mimicking a natural infection. A vaccine not only induces immune response to protect people from any future COVID-19 infection, but also helps quickly build herd immunity to put an end to the pandemic. Herd immunity occurs when a sufficient percentage of a population becomes immune to a disease, making the spread of disease from person to person unlikely. The good news is that SARS-CoV-2 virus has been fairly stable, which increases the viability of a vaccine. There are broadly four types of vaccine — one, a vaccine based on the whole virus (this could be either inactivated, or an attenuated [weakened] virus vaccine); two, a non-replicating viral vector vaccine that uses a benign virus as vector that carries the antigen of SARS-CoV; three, nucleic-acid vaccines that have genetic material like DNA and RNA of antigens like spike protein given to a person, helping human cells decode genetic material and produce the vaccine; and four, protein subunit vaccine wherein the recombinant proteins of SARS-COV-2 along with an adjuvant (booster) is given as a vaccine. Vaccine development is a long, complex process. Unlike drugs that are given to people with a diseased, vaccines are given to healthy people and also vulnerable sections such as children, pregnant women and the elderly. So rigorous tests are compulsory. History says that the fastest time it took to develop a vaccine is five years, but it usually takes double or sometimes triple that time. In an interaction with Moneycontrol, Anup Dhingra, MD - FINPRO (Financial and Professional Liability) & Private Equity M&A Leader of insurance broking firm Marsh India said that a lot of companies are looking at taking higher covers to match their liabilities. “Apart from liabilities related to COVID-19, exchange rate fluctuations are also forcing companies to increase the cover size. This is because the insurance is pegged to the dollar rate,” he added. Each company has to disclose as part of its customer contracts the amount of insurance cover taken for segments like cyber. Due to rupee depreciation, there have been cases where due to rupee value declining versus the US dollar, these companies been found to not adhere to the earlier disclosed limits. This makes it essential that they buy additional limits on the cyber cover. In India, less than 1,000 cyber insurance policies have been issued so far. The cover differs depending on the industry and individual companies. On average, for $1 million covers, the premium could range from $6,000-11,000. Sectors like banking and financial services, IT/ITeS and e-commerce with a high focus on retail customers are considered to be at higher risk as far as cyber liability is concerned. Higher the limit, lower could be the premium share. Dhingra said that apart from the traditional industries mentioned above, sectors alike pharmaceuticals, oil refinery, energy and power sectors are taking steps to ramp up their cyber insurance covers. He explained that the cover offers protection against liabilities related to ransomware, breach response and phishing incidents among others. “Companies have realised that cyber is the number one risk at this point. Even if there is no direct data loss, there could be other costs related to audits or help taken from external consultants in case of a breach,” he added. Apart from breach incidents, ransomware attacks have become common ever since the lockdown due to COVID-19 was announced. Here, an attacker threatens to publish private data or block access to confidential information unless a ransom is paid. Mid-to-large size companies take between $10 million to 350 million of limits in the cyber insurance covers. This ransom could be instruments like bitcoins where negotiations are done with the criminals to retrieve the data. Insurance would pay for these costs. When an Indian corporate’s global client had a breach event, the biggest worry was whether there would be any loss of data. While there was no data theft or breach the global client billed $1 million to this Indian company for seeking the help of an external consultant. The cyber cover paid for these losses. The Marsh Microsoft 2019 Global Cyber Risk Perception Survey showed that 79 percent of respondents ranked cyber risk among the top five concerns for their organization, up from 62 percent in 2017. This survey report also said cyber risk has moved beyond data breaches and privacy concerns to sophisticated schemes that can disrupt entire businesses, industries, supply chains, and nations, costing the economy billions of dollars and affecting companies in every sector. Follow our full coverage of the coronavirus pandemic here.
<urn:uuid:e8f07169-14fb-4f0d-9c7a-a833311d932e>
CC-MAIN-2023-23
https://www.moneycontrol.com/news/business/economy/coronavirus-forces-corporates-to-have-a-re-look-at-cyber-insurance-covers-5193251.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649348.41/warc/CC-MAIN-20230603233121-20230604023121-00230.warc.gz
en
0.960669
1,213
2.875
3
At a time when Africa, like the rest of the world, is facing three major challenges: population growth, climate change and the health crisis caused by the Covid-19 pandemic, voices are being raised about their impact on the already unstable supply of drinking water. On the occasion of World Water Week, Afrik 21 presents the contours of these major challenges to access to drinking water on the African continent. In Africa, population growth is amplifying the challenges related to drinking water supply. On the occasion of World Water Day, Afrik 21 decrypt the challenges of water management for a continent has today 1.3 billion inhabitants, 17% of the world’s population, making it the second most populated continent in the world after Asia. According to United Nations (UN) forecasts, Africa’s population is expected to almost double by 2050. It is likely to total nearly 4.5 billion people by 2100, or 40% of humanity. Today, one in four Africans do not have access to a safe source of drinking water, and if nothing is done, the situation is likely to get even worse in the years to come. The situation may seem hopeless, but it is important to note the initiatives that have been taken to improve water supply on the continent. In Nigeria, Africa’s most populated country (over 206 million people by 2020), the central government launched the Sustainable Rural Water Supply and Sanitation Project in 2016. It is divided into three phases. The water component of this project will build drinking water supply (AEP) systems in semi-urban areas of Nigeria. These will be operated by solar off-grid installations. In addition, human powered pumps will be constructed. Work will start in 2019 and is expected to be completed by 2025. Drinking water plants The West African country is also financing the rehabilitation of drinking water plants. In 2019, Bauchi State in Nigeria launched work to rehabilitate the Gubi Dam, which has a holding capacity of 38.4 million m3, and the Gubi Water Treatment Plant that operates it. The upgraded drinking water plant will provide 90,000 m3 of water per day to the population. The Bauchi local government is also planning to build a 7,000 m3 reservoir at Warinji Hills. A large drinking water plant is also under construction in Bita, a town 40 km southeast of Luanda in Angola. The facility will have a capacity of 260,000 m3 per day, making it one of the largest drinking water plants on the African continent. Empresa Publica de Aguas de Luanda (Epal), which provides the public drinking water service in the capital, awarded the contract to Suez in June 2020. According to the French group, this major plant in Bita will meet the drinking water needs of Luanda’s rapidly growing population, which has reached 7.5 million, while supporting its economic development. Suez will also build a water intake in the Kwanza River, which runs near the capital Luanda before emptying into the Atlantic Ocean, as well as a pipeline that will carry the raw water to the plant. The group has 39 months to complete the contract. After the Bita drinking water plant is commissioned, it will provide operational support for a period of nine months. In addition to tapping groundwater and rivers, desalination also helps to improve access to drinking water in Africa. Desalination is a process by which brackish or salty water is transformed into fresh water. Although the various projects carried out have made it possible to secure access to drinking water for certain sections of the African population and thus to reduce the unequal distribution of this resource, things could quickly change because of climate change. A global phenomenon, global warming is manifesting itself in some African countries through increased drought. This leads to water evaporation and changes the rainfall pattern, making it even more difficult to collect water resources and creating a situation of water stress. The challenge today for African states is to progress towards a 100% supply of drinking water to their populations. Some coastal countries are therefore focusing on desalination. The process is applied in desalination plants that treat water pumped from the sea or from salt lakes. There are currently two desalination techniques. The one most used by plants in Africa is reverse osmosis, which is based on the principle of salt-water separation using a semi-permeable membrane. The second desalination method is electrolysis, which is less suitable for seawater treatment. In North Africa, for example, per capita freshwater availability has declined by more than 30% over the past 20 years. And in sub-Saharan Africa, 400 people do not have a secure source of drinking water. Namibia, one of the driest countries south of the Sahara, has extensive access to the sea and intends to exploit this potential, notably by developing the Walvis Bay desalination project in partnership with its neighbour Botswana. The water produced by this plant will be shared between the two countries. The Botswana share should be pumped to the capital Gaborone via a pipeline that will run from the Walvis Bay desalination plant, a distance of at least 1,490 km. Beyond this project, which is still at an embryonic stage, small desalination units are being built in several localities in this southern African country to supply the population. These installations are known to be energy-intensive and more and more suppliers are seeking to combine them with small solar energy plants. Walvis Bay Town Council is also considering recycling wastewater into drinking water to meet the growing population of this port town of over 52,000 people. Currently, the municipality relies on two main sources to supply water to its population. This system allows treated water to be injected directly into the drinking water network. The reuse of treated water as drinking water, which is not universally accepted in this port city, has already been applied in the Namibian capital Windhoek for 50 years. With this system, treated water is injected directly into the drinking water network. At present, Namibia is the only country in Africa that makes wastewater potable. Other countries may soon follow suit. Elsewhere on the continent, reuse is mainly used for irrigation in order to preserve groundwater and surface water for drinking water production. Another way of improving access to drinking water in Africa is through rainwater harvesting. Theoretically, the amount of rain that falls on the continent alone would be equivalent to the needs of 9 billion people, i.e. one and a half times the current world population, according to the United Nations Educational, Scientific and Cultural Organisation (UNESCO). For now, in Africa, this rainwater is only stored for irrigation. In Tadla, a region in central Morocco, the regional office for agricultural development (ORMVA) recently began work on a rainwater retention basin. The resource will be used to irrigate 20,000 hectares of farmland in Tadla. Although Covid-19 has paradoxically accelerated drinking water projects in African regions, especially south of the Sahara, the challenge remains significant. You must be logged in to post a comment.
<urn:uuid:b6b743d9-a960-4b9b-a4f2-b006e0f4cd8d>
CC-MAIN-2023-23
https://www.afrik21.africa/en/africa-the-major-challenges-of-access-to-drinking-water/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656788.77/warc/CC-MAIN-20230609164851-20230609194851-00430.warc.gz
en
0.949559
1,481
3.09375
3
The clothes we wear represent our way of being. And fashion is the visual manifestation of the character, desires, economic aspects and values of an era and of a society, in this case, of Venetian society. Today we stroll through the fashion in Venice throughout the centuries, and through it, we will discover aspects of its history. Do you want to discover them? WE DISCOVER VENICE THROUGH FASHION. Venice's wealth was based on the trade in spices and precious fabrics from the East, which were exported throughout Europe. Venice was the capital of fashion for centuries with its magnificent velvets, silks and lace. THE FASHION OF THE PALEOVENETIANS (1000 BC) and PRE-VENETIANS The young Paleovenetian aristocrats wore high boots, and a shawl. The women a flared skirt below the knee that touched the cuffs of the high boots Small bronze statues of Atestine, reconstruct the way of dressing of the men and women of the Veneto region during the first millennium BC. and in Roman times the Venetians adopted the toga, which they mixed with typical garments such as the cucullo, a hooded cape. CURIOSITY 1. From them on, the color blue was synonymous of being Venetian From the 6th century on, the clothing of these pre-Venetians was influenced by contacts with the Greco-Oriental world: the man wears a short tunic fitted at the waist over tight breeches and a purple cloak; the woman two overlapping garments of different lengths. Leather is also used, especially sable and fox. Byzantine influence is still evident in Venetian clothing until the 12th century. SERENISSIMA, A REPUBLIC WITH A LOT OF GLAMOUR While in the other states and in the other kingdoms, women were mortified with high-necked dresses and subjected to harsh regulations of very modest wardrobe, Venice discoverede the necklines, heels and impossible hairstyles But why did Venice become the undisputed queen of fashion? On the one hand, his maritime trade with the East revealed fabrics and brocades never seen before. CURIOSITY 2. And these special fabrics from the East were mixed with the richness of Burano lace to adorn their dresses. CURIOSITY 3. Venice always ignored the dictates of the church of Rome, and lived a religion quite independent from the Catholicism of the time, with more freedom regarding laws on clothing in force in other places. Venetian noble compared to Spanish maiden COME ALONG WITH ME THROUGH THE CENTURIES !!!! IN THE 13TH CENTURY The mosaics on the portal of San Alipio in the Basilica of Saint Mark, reveal to us dignitaries dressed in long robes to the ankles, with precious belts and noble women with very long robes, tied with short overcoats, necklines and wide sleeves IN THE 14TH CENTURY We discover a mosaic of the first half of the fourteenth century in the baptistery of the Basilica Saint Mark. Salomé already with original elements compared to other fashions, in colors that go from the blue of the inhabitants of the lagoon, to the crimson red of the aristocracy and the doge, and decorations of ermine and vaio (a kind of squirrel) leather. IN THE 15TH CENTURY Venice is separated from the rest of Europe, and in the second half of the 15th century, women stop waxing their foreheads (they did it to look taller!), And go on to collect their hair in "fungus" (a mushroom-shaped hairstyle) covering the ears with curly locks. CURIOSITY 4. THE FUNGO HAIRSTYLE (SHAPED "MUSHROOM") Under wide dresses with a train, tight-sleeved shirts, open at the elbows from which white fabric comes out. Rounded neckline bodices. The first lace appears in the hems of the dresses. The nobles, dignitaries, speziali (pharmacists), lawyers wear robes, which can be crimson red, pavonazza (red-violet) or black, with the wide sleeves alla dogalina, tight at the wrist with frills and a band on the shoulders. made of velvet, as in the following detail from a Mansueti painting. IN 15TH CENTURY In the 15th century, while Spanish fashion spread through Italy, and encased women in rigid high-necked dresses, in Venice, ladies wore low-cut dresses. Even widows wore vertigo (very wide) necklines! CURIOSITY 5. THE SHOES-STILTS OF 50 CENTIMETERS HIGH The temptation to increase the height starting from the shoes culminates in Venice: here in the sixteenth century, the taller the shoe, the more noble was the lady, they are called "ciopine "or" calcagnini ", up to 50 centimeters (you have read correctly, half a meter!). Not even Lady Gaga wedges are that tall, as they "only" rise to 35-40 centimeters! But it is curious, that they were alsoused by common women and prostitutes, without distinction of class, the purpose was to appear taller or perhaps, to walk on the high water (aqua alta) without getting dirty mud dresses. In Venice each woman wore her Cyopines, and visitors of the time came to the lagoon to admire this type of "sculpture on pedestals" that moved through the streets of the city. And they needed to be accompanied by service ladies so as not to fall down. CURIOSITY 6. VENETIAN WOMEN WANTED TO BE BLONDE! During the Renaissance, hair had to be blonde (a bit coppery blonde), and Venetians dyed hairt in the altanas (elevated terraces) the hair colour known as "juvenile water", a liquid made with spices, herbs and even horse urine (which carried ammonia, like current dyes). CURIOSITY 7. THE IMPOSSIBLE COLLARS, INEVITABLE NOT TO SUFFER TORTICOLIS The collars of the Burano lacemakers, whose secrets Venice controlled, were fanned up behind the head by means of hidden metal frames. The dresses wore very curious accessories such as weather vane fans. CURIOSITY 8. TWO-HORN HAIRSTYLING The hair, gathered at the back, is raised on the forehead in two curls in the shape of a horn or half moon (only brides wore their hair down). CURIOSITY 9. pointed bustiers and dangling earrings The women's fashion of the last 20 years of the 16th century is extravagant, characterized by tight and pointed bustiers, rigid by small internal metal rods, square and deep necklines, an opening in the middle of the front of the shirts enriched with lace and embroidery. And also, the dangling earrings, an absolute novelty for that time, pierced the lobes “like Moorish women” IN THE 17TH CENTURY In the second quarter of a century, the rich Dutch bourgeois had a leading role in Europe, and imposed their round lines. The Venetians wrapped themselves in airy and puffy clothes, giving them the appearance of hot air balloons. In Venice, as elsewhere, with the identification of the lace accessory as the most important status symbol, the production of lace is reaching its peak. Lace everywhere: collars, cuffs, handkerchiefs, waist bands, shoe ornaments ... The cuts of women's clothing in the second half of the 17th century are strongly influenced by Versailles. These are jackets over a dress decorated with embroidery and trimmings, with a train behind. The hair is gathered in curls and decorated with hairpieces, ribbons, veils, headdresses with pieces of lace ... IN THE 18th CENTURY CURIOSITY 10. THE ANDRIENNE DRESS AND THE CAGES UNDER THE DRESSES Of French origin, this pompous dress with a pleated train stretching from the shoulders, was painted by Longhi and described in the texts of Carlo Goldoni. Andrienne dress of a Venetian lady from the 18th century And the wicker cages arrive under the dresses that reach extreme dimensions (so exaggerated that they cause the production of seats and armchairs without armrests). The bottom hem takes the shape of a gondola. Paintings by the Venetian costumbrist painter Pietro Longhi. Dresses with internal wicker cage. If for Carnival you want to dress up as an authentic Venetian, you will need ciopine or stilt shoes (and two people to hold you up), a mushroom or horned hairstyle, hair colour in Venetian blonde, and a broad neckline in your brocade lace dress.
<urn:uuid:0be72325-6df0-4c80-a89d-4f67955aeca5>
CC-MAIN-2023-23
https://www.venecisima.com/post/10-fascinating-facts-in-the-history-of-venetian-fashion
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646457.49/warc/CC-MAIN-20230531090221-20230531120221-00030.warc.gz
en
0.938226
1,919
2.890625
3
All about Salmon and Steelhead follows or skip down to re-imagining the future. Wild Snake River salmon and steelhead are keystone species that 130+ other species depend on. 140 miles of their spawning habitat was affected with dam construction on the Snake. They must navigate 8 total dams twice in their anadromous life cycle to successfully reproduce. Salmon fishing has defined the Pacific Northwest, but this integral part of the economy and cultural identity has continued to decline every year these barriers remain. Find out how salmon and steelhead faired in 2021 by reading our State of the Snake report. show / hide Since construction of the dams, all of the Snake River basin’s wild salmon and steelhead have been listed as endangered or threatened, and several species have been driven to extinction. The demise of Snake River chinook salmon, preyed upon by iconic endangered Southern Resident Orcas in Puget Sound and the Pacific Ocean, is also limiting the orcas’ ability to recover and elevating the urgency for action on the lower Snake River. Climate change is already impacting lower Snake River runs, with much greater impacts on the horizon that include increased sediment loads and higher water temperatures hazardous to salmon, earlier spring run-off and generation of less hydropower. Serious loss of salmon smolts continues. Despite installation of over $ 700 million worth of hardware at the lower Snake River dams smolt to adult survival ratios for listed species have shown little improvement. Northwest rate payers and tax payers have spent more than $13 billion on salmon recovery measures that haven’t worked for Snake River stocks, and that is money that could otherwise be invested into revitalizing riverside communities and clean, renewable energy that isn’t lethal for fish. Two-hundred years ago, when Lewis and Clark first traversed the Pacific Northwest, an estimated 10 to 16 million salmon and steelhead entered the Columbia River annually. About 4 million were destined for the Snake River drainage. Now, following dam construction on the Columbia and Snake rivers, there are fewer than 60,000 wild fish returning every year. show / hide In recorded history salmon populations fell first as a result of unrestricted fishing by European immigrants. Canneries appeared along the Columbia River in the 1860s, and commercial fishers used seines at the mouth of the Columbia River, the doorway through which countless fish needed to pass to return from the ocean. So many fish were caught that draft horses were used to haul the nets from the water. Fish wheels–giant water-powered nets that “wheeled” fish in–were eventually employed, scooping up tens of thousands of fish. But it quickly became evident that salmon were not returning as they once did. Then came the dream of inland barge transportation and electricity and the prosperity they might bring to the region. Construction of dams on the lower Columbia and lower Snake between the 1930s and 1970s made it harder for young salmon to migrate to and from the ocean. Those that did return faced new challenges migrating to their spawning grounds. The Columbia and Snake rivers were transformed into a series of lakes that confuse migration instincts and make fish more vulnerable to predators. Wild salmon and steelhead have been reduced by nearly 90 percent in the Columbia River Basin over the past 125 years due to a number of factors, but dam building is chief among them. In particular, construction of the four dams on the lower Snake River in eastern Washington state sent populations of upper-basin salmon and steelhead plummeting, and the region’s once-bountiful fishing opportunities have been reduced to isolated seasons on certain rivers–for hatchery-raised fish only. In fact, the region’s abundance of hatcheries were built to specifically offset the huge mortality rates for wild salmon at the dams, and now two-thirds of the Columbia River’s salmon are reared in tanks and raceways. By 1986 Snake River populations of coho salmon were extinct and sockeye salmon were approaching extinction. By the mid-1990s, all Snake River salmon populations were protected by the Endangered Species Act, and fishing opportunities were practically non existent. According to economic studies by independent cconomists and state agencies, the lost salmon fishery translates into hundreds of millions of dollars each year in lost economic activity for the people of Washington, Oregon and Idaho. A 2005 study by Boise-based Ben Johnson Associates estimated the economic impact of a restored salmon and steelhead fishery to Idaho alone at $544 million per year. In 2001 the Idaho Department of Fish and Game calculated the direct spending benefit of anglers who bought salmon and steelhead tags in a rare year of decent salmon returns to the state: $46 million, with $10 million of that in the rural riverside town of Riggins, Idaho, alone. Another April 2003 study by Ben Johnson Associates placed direct and indirect angler spending in Idaho during the 2001 fishing season at $89.9 million. By contrast, a 2002 report by the U.S. Army Corps of Engineers valued “general recreation” on a free-flowing Snake River at a paltry $5.9 million to $31 million. Improved fishing, both in the Snake and its hundreds of miles of wilderness tributaries, was to be worth a maximum of $4.5 million if the four lower Snake River dams were removed. This is yet another example of the federal agency grossly undervaluing one of the direct benefits lower Snake River dam removal would achieve. The first hatcheries were built to sustain the over-harvest. Early harvest managers eventually dismantled the fish wheels, and salmon runs stabilized at a sizable, albeit reduced level. show / hide Recent years have seen modest increases in some salmon populations, but these increases have had little effect on listed fish. Most are of hatchery origin and from unlisted salmon populations and are no indication of the health of the Northwest’s most imperiled salmon runs. Salmon fishing seasons, if they happen at all, are a shadow of their former vitality. Hatchery fish, in many cases, are a big part of wild salmon declines, so this nullifies a lot of the chinook habitat work taxpayers and ratepayers have spent billions on. Obviously, river and stream habitat improvements are critical to wild fish, not so much for hatchery fish. The state is forking over more millions because of the Culvert decision. This legislation would further undermine the benefits derived from culvert removals, not to mention all the other habitat work that has been going on for decades. re-imagining the future Breaching will put salmon and steelhead on the road to recovery and provide much needed prey to feed Southern Resident Orcas. Fish will return to thousands of miles of habitat and re-establish a salmon stronghold to help iconic species survive climate change. If the dams remain in place, it is likely the wild salmon and steelhead will be lost, and no amount of future recovery efforts or money will bring them back.
<urn:uuid:1b683537-12ca-44a0-b760-b598f4c439fd>
CC-MAIN-2023-23
https://damsense.org/salmon-and-steelhead/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656788.77/warc/CC-MAIN-20230609164851-20230609194851-00430.warc.gz
en
0.955566
1,447
3.546875
4
WASHINGTON — The Supreme Court on Thursday curtailed the Environmental Protection Agency’s authority to police millions of acres of wetlands, delivering another setback to the agency’s ability to combat pollution. Writing for five justices, Justice Samuel Alito said that the Clean Water Act does not allow the agency to regulate discharges into wetlands near bodies of water unless they have “a continuous surface connection” to those waters. The decision was a second major blow to the EPA’s authority and to the power of administrative agencies generally. Last year, the court limited the EPA’s power to address climate change under the Clean Air Act. Experts in environmental law said the decision would leave many wetlands subject to pollution without penalty, sharply undercutting the EPA’s authority to protect them under the Clean Water Act. “This is a really disastrous outcome for wetlands, which have become absolutely vital for biodiversity preservation and flood control,” said Patrick Parenteau, a professor at Vermont Law School. Kevin Minoli, who worked as a senior EPA lawyer from the Clinton through the Trump administrations, overseeing the enforcement of Clean Water Act regulations, said the decision would have enormous practical consequences and estimated that it would affect more than half the nation’s wetlands. “If you’re in an area with a lot of wetlands but those wetlands are not directly connected to a continuously flowing water body, then those wetlands are no longer protected by the Clean Water Act,” he said. The decision was nominally unanimous, with all the justices agreeing that the homeowners who brought the case should not have been subject to the agency’s oversight because the wetlands on their property were not subject to regulation in any event. But there was sharp disagreement about a new test the majority established to determine which wetlands are covered by the law. Justice Brett Kavanaugh, joined by the three liberal justices in a concurring opinion, said the decision would harm the federal government’s ability to address pollution and flooding. “By narrowing the act’s coverage of wetlands to only adjoining wetlands,” he wrote, “the court’s new test will leave some long-regulated adjacent wetlands no longer covered by the Clean Water Act, with significant repercussions for water quality and flood control throughout the United States.” In a second concurring opinion, Justice Elena Kagan, referring to the court’s decision in June to curtail the EPA’s ability to restrict power plant emissions, criticized the majority’s interpretation of the law. “There,” she wrote, “the majority’s non-textualism barred the EPA from addressing climate change by curbing power plant emissions in the most effective way. Here, that method prevents the EPA from keeping our country’s waters clean by regulating adjacent wetlands. The vice in both instances is the same: the court’s appointment of itself as the national decision maker on environmental policy.” The ruling was also another example of the court’s skepticism of the authority of administrative agencies, said Jonathan H. Adler, a law professor at Case Western Reserve University. “The current court,” he said, “is clearly unwilling to defer to an agency about the scope of that agency’s own power.” Michael Regan, administrator of the EPA, said the agency would consider next steps. “I am disappointed by today’s Supreme Court decision that erodes long-standing clean water protections,” he said in a statement. The case, Sackett v. Environmental Protection Agency, concerned an Idaho couple, Michael and Chantell Sackett, who sought to build a house on what an appeals court called “a soggy residential lot” near Priest Lake, in the state’s panhandle. After the couple started preparing the property for construction in 2007 by adding sand gravel and fill, the agency ordered them to stop and return the property to its original state, threatening them with substantial fines. The couple instead sued the agency, and a dispute about whether that lawsuit was premature reached the Supreme Court in an earlier appeal. In 2012, the justices ruled that the suit could proceed. In a concurring opinion at the time, Alito said the law gave the agency too much power. “The reach of the Clean Water Act is notoriously unclear,” he wrote. “Any piece of land that is wet at least part of the year is in danger of being classified by EPA employees as wetlands covered by the act, and according to the federal government, if property owners begin to construct a home on a lot that the agency thinks possesses the requisite wetness, the property owners are at the agency’s mercy.” On Thursday, all nine justices agreed that the agency had gone too far in seeking to regulate the Sacketts’ property. “I agree with the court’s bottom-line judgment,” Kavanaugh wrote, “that the wetlands on the Sacketts’ property are not covered by the act and are therefore not subject to permitting requirements.” That suggested that the court could have issued a far more limited ruling, Parenteau said. “They could have rendered a narrow decision based on the facts of the Sackett case and said, in this case, where a wetland is this small and is not connected to the lake, it should not be subject to federal control.” Instead, he said, the majority “fashioned a policy for the entire United States based on this one particular set of facts of this property in northern Idaho.” The two sides on Thursday differed principally on the Clean Water Act’s coverage of wetlands that are “adjacent” to what the law calls “waters of the United States.” That second term, Alito wrote, “was decidedly not a well-known term of art” and a “frustrating drafting choice.” He said it included “streams, oceans, rivers and lakes.” But what does it mean for wetlands to be “adjacent” to such bodies of water? Alito wrote the term can mean “contiguous” or “near.” For purposes of the Clean Water Act, he wrote, “wetlands that are separate from traditional navigable waters cannot be considered part of those waters, even if they are located nearby.” The four justices in the minority took a different view. “‘Adjacent’ and ‘adjoining’ have distinct meaning,” Kavanaugh wrote, adding that he would have included wetlands that are “separated from a covered water only by a man-made dike or barrier, natural river berm, beach dune, or the like.” He added: “There is a good reason why Congress covered not only adjoining wetlands but also adjacent wetlands. Because of the movement of water between adjacent wetlands and other waters, pollutants in wetlands often end up in adjacent rivers, lakes, and other waters.”
<urn:uuid:60ece7a7-45cd-4e12-a00e-290c893edb1f>
CC-MAIN-2023-23
https://www.bostonglobe.com/2023/05/25/nation/supreme-court-limits-epas-power-address-water-pollution/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647614.56/warc/CC-MAIN-20230601042457-20230601072457-00230.warc.gz
en
0.961197
1,493
2.609375
3
Hanmade of whole shungit and quartz, electroconductive Lenghth of the base: 3 cm (1,18 inch) Weight: 0,12 lb (55 g) Quartz as a unique component Shunghit with quartz blotches is very difficult to find. For finding it you should sort out very much stones. So, the pyramid consisted of quartz and shunghit is really unique. Shining of quartz stripes makes black faces of the pyramid magnificent and mysterious. Quartz and shunghit pyramids have a real special force because of the combination of two unique materials. This pyramid let you to contact the Universe and find unknown features of your body, soul and brain. Why Golod’s pyramid? So called Golod’s pyramid was created by famous Russian scientist and engineer Alexander Golod. The primary goal of his research was the influence of pyramids to alive organisms. He was an author of some projects of big pyramids. People say that when they were in such building, they felt relax and harmony, and stress and nervous passed away. A small model of Golod’s pyramid has the same effect as big ones, but sphere of it’s influence is less – it may be a room or an office. Golod’s pyramid made of shunghit is a perfect way to protect yourself from different diseases and mental disorders. Why the ancient Egyptians built the Pyramids? Pyramids were built in case of perfect proportions – so called golden section. These buildings are possessed of great torsion fields, so what there is a powerful protection from bad-energy attacks. People say that it’s a curse or “an evil eye”. One of the most important things about shunghit pyramids is that they protect people from electromagnetic radiation. Nowadays there are many different electronic gadgets around us. Digital technologies make our life better and easier, but many scientists speak about their damage for human organism. Our biofield is not able to resist bad influence of electromagnetic waves. May be next generation will be protected from radiation, but now it’s very dangerous. We are influenced by electromagnetic radiation every day and everywhere: - Phones and other mobile gadgets; - Electrical wiring. Enough high-density waves could break up the human energy field, so, you can feel bad in the room full of gadgets: - Bad mood, depression; Different heart, brain and nerve diseases develop when the level of radiation is too high. Sometimes the waves may be a reason for cancer and other hard diseases. We have got an experiment during investigation the properties of shunghit. We took 3 parts of eggs. One part was influenced by high electromagnetic radiation without any protection. The other part was influenced too, but we put the shunghit pyramid near them. The third control part has been left without any harmful influence. What about a result? The part of eggs has been protected by shunghit pyramid gave the same result as the control part (without any influence): 70% chicks hatched. The third part – without protection from electromagnetic radiation – had a bad result: only 5 % of chicks hatched, the other dyed. So, we can see that shunghit really protected organisms from harmful waves. We have another one method of checking the effect of the shunghit pyramids: put the pyramid near the electromagnetic radiation measuring device. When the pyramid is here, the device shows zero active. How can you protect yourself and your family with the help of shunghit pyramid? You need put two or three pyramids in the room where some powerful gadgets and appliances have a place. It’s necessary to put the pyramids close to radiation point. I have some pyramids in my home: two pyramids in every bedroom, two in the kitchen, one in the hall and one in the bathroom. Pyramids of 6-10 cm in size can be placed on a coffee table or desktop, on a fireplace, or on a shelf. The power of such a pyramid is enough to neutralize the electromagnetic radiation of a work computer or tablet, as well as positively influence the energy background in close proximity. A larger pyramid - 12-15 cm in size, will affect the energy of the whole room and will protect from electromagnetic radiation of 2-3 electrical appliances. Pyramids of 20–25 cm in size will affect a larger room (for example, an office or a small house). A pyramid of 3-5 cm in size can be placed in a car or taken on a journey as an energy generator. The most powerful points of radiation are ovens and microwave ovens, and also refrigerators. Computer and TV are also dangerous, because we spend much time in contact with it. The power of radiation is not so strong, but it influences us for a long time. The shunghit pyramid must be on every computer table, because all our life today is connected with computer. Electromagnetic radiation is especially harmful for children and pregnant, so, they must be protected firstly. You will feel better as soon as you begin using a pyramid: - Your immune system will enforce; - All the systems of organism will work better; - Your efficiency will arise; -You’ll stop suffering from insomnia. The deposits of shunghit are located in Karelia, so, shunghit is not very popular in the USA. You have a great possibility to be the first who use it and tell other people about it. Our company has already made more than 5000 shunghit pyramids. Every pyramid is made by hand: we cut a pyramid form out a whole piece of shunghit, than the shape is made perfect also by hand only. No posts found
<urn:uuid:acfe59b2-d4d8-492b-888b-321707a27328>
CC-MAIN-2023-23
https://shungitrussia.ru/piramida-goloda-s-kvarcem-3-sm-maksovskiy-kamen/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656833.99/warc/CC-MAIN-20230609201549-20230609231549-00630.warc.gz
en
0.947823
1,253
2.6875
3
We all want money — some of us dangerously so. Thankfully, there are simple and powerful ways to get rich without gambling your hard-earned savings. For sure, they won’t all just stick in your brain. And many will change over time as Uncle Sam reforms our taxes and benefits, and as new and better financial products come on board. Still, having guiding principles at hand can help you manage your money and achieve financial security: As an economist, here are the top 21 money rules that I live by and teach: 1. Don’t borrow for college. It’s far too risky and expensive. I don’t say this lightly. I’m a college professor. But you can get a fine education without mortgaging your future and potentially dashing your career plans. It simply involves pursuing scholarships and applying to less expensive, if generally less prestigious, institutions. 2. If your parents are borrowing for your tuition, discuss who will repay. And consider whether they’re blowing your inheritance or sacrificing their welfare by “helping” you attend an unaffordable college. 3. Strive to own your home, not rent — and try to buy in cash. Having more of your money packed in your home is a way to shelter it from federal and state asset-income taxation. This is particularly the case if you’re a moderate to high earner. 4. Mortgages are tax and financial losers. Pay them off ASAP. Think about it: If you have $100,000 that you can invest right now in a bond earning 1.5%, you’d have $1,500 in interest income over the course of a year. But if you had a $100,000 debt at a 3.2% interest that you could pay off right now, you’d save $3,200 over the course of the year in interest payments. On balance, you’d make $1,700 with no risk by investing in debt repayment rather than investing in the bond. 5. Owning a home can reduce longevity risk. Here’s another reason it’s better to own instead of rent.Let’s say you’re 70 and have found your dream location. Renting for the rest of your life runs the risk of rent hikes without the possibility of your fixed income increasing. In contrast, if you owned your home, home prices can soar or collapse, but you’ll be insulated. Since you are neither buying nor selling your home, who cares what the housing market does? Your housing consumption is guaranteed through the end of your days. 6. Your perfect home may be far cheaper several time zones away. Or it may be someplace with no state income tax, no state estate tax, and no state inheritance tax. Yes, things are more complicated. Land values in New Hampshire may be higher in light of the state’s tax advantage. And the school system may be better in Massachusetts. But who knows? You may be childless and happy to live in a tall five-decker with no yard. 7. Choose jobs that everyone but you hates. All else being equal — skills, education and experience — people with unpleasant, nerve-racking, insecure, disturbing or financially risky jobs get paid more than people with the same skills working jobs with none of these drawbacks. Economists call the extra pay a “compensating differential.” The key to taking advantage of it is to find something that you love and, ideally, others don’t. 8. Don’t worry about career and job hopping. How can you not shop around when there are so many options? Certainly, the fastest path to a raise is getting a credible outside offer. 9. Consider working for yourself. I tell this to my students often. If you start the right business the right way, it will raise your remaining future earnings and provide unmatched job security. If that sounds too risky, brainstorm ways to turn your hobby and interests into a side hustle. 10. Keep thinking about tomorrow. Are you in the best possible career for the rest of your working days? Should you make a switch? Is your current job in danger? Set a date every few months to do a career review with a spouse, partner or friend. 11. Your living standard is your bottom line. Simulate its potential paths based on alternative investment and spending strategies to see where these strategies can land you. 12. Marriage beats partnering long-term. It may mean somewhat higher net taxes, but it comes with an array of valuable implicit insurance arrangements, which the formality and legality of marriage help enforce. 13. If you do get married, count on getting divorced. It’s as likely as not. Protect yourself and the love of your life with a prenup. 14. All lifestyle decisions — switching careers, moving homes, getting married, having kids, getting divorced — come at a price. Measure these prices in terms of your sustainable living standard. 15. Use retirement-account contributions, conversions and withdrawals to cut your lifetime taxes. And make sure to contribute enough to get your employer’s match! 16. Wait until age 70 to take Social Security retirement benefits. Retirees who wait to claim can get hundreds of dollars more each month than those who take benefits early. Of course, this isn’t feasible for everyone. But here’s my plea: Before making any moves, figure out the strategy that maximizes your household’s total lifetime benefits. 17. If you don’t formally request your Social Security benefits, you won’t get it. I’ve had many people in their mid-70s ask me when they’ll start getting their checks. That’s when I groan and tell them they need to file for their benefits immediately. Social Security isn’t in the business of letting us know what it owes us, never mind that we have paid FICA taxes our entire working lives for those benefits. 18. The Social Security Administration’s Program Operations Manual System has thousands of rules, which its staff can get wrong, in part or in full. Talk to multiple offices and do your own research. 19. Retiring early is financial suicide. Yes, there are situations where retiring early makes sense. But very few of us think of early retirement as what it really is: a decision to take the longest and most expensive vacation (that most of us can’t afford). Putting it this way makes clear that the wonderful benefits — extra time with the grandkids, freedom to pursue hobbies, reduction in stress — all come at a high price: the loss of years, if not decades, of earnings. 20. Most conventional investment advice is, to be nice, of dubious value. It’s predicated on you making four major economic mistakes: Saving the wrong amount when younger, putting your preretirement savings on autopilot, spending the wrong amount when you’re older, and never adjusting to market conditions. 21. If you’re worried about downside risk, play the stock market like a casino. Set a floor to your living standard and spend only out of stocks that have been converted to safe assets. Laurence J. Kotlikoff is an economics professor and the author of “Money Magic: An Economist’s Secrets to More Money, Less Risk, and a Better Life.” He received his Ph.D. in Economics from Harvard University in 1977. His columns have appeared in The New York Times, WSJ, Bloomberg and The Financial Times. In 2014, The Economist named him one of the world’s 25 most influential economists. Follow him on Twitter @Kotlikoff.
<urn:uuid:5eb8c38d-4964-43fc-8183-c04c54f5ef0b>
CC-MAIN-2023-23
https://entrepreneurshipis.com/a-harvard-trained-economist-shares-his-top-21-money-rules-own-your-home-and-try-to-buy-in-cash
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653631.71/warc/CC-MAIN-20230607074914-20230607104914-00030.warc.gz
en
0.94065
1,631
2.671875
3
Many people assert that they taught themselves how to program (which is great)! But what about the newbies? It's not easy picking up a new language, especially if one does not have a background in computer science. So here are some tips to make the process a whole lot easier. Learn As You Go The best way to learn a program is through learning while you work. By predicting what will happen next, you will learn to troubleshoot every possible situation that might occur. The basics of programming lie in predicting the behavior of your language. Decide what your program should do, write down the code that you expect to have the result, and later run the code to ascertain if you are correct. Be Consistent With Your Practice All new skills are mastered through continuous practice. And this applies even more when you are learning about software. Programming tools are under constant improvement, and you need to ensure that you are up to date with each new development that gets released. Do your practice using a main version of the language you are trying to learn. Once you've gained full confidence, venture into the other modified languages. It'll will make it much easier, as you've already conquered the master language. Remember: Consistent practice is the key to perfect programming! Understand The Basics First Imagine you let your kid ride a motorbike before they've even comfortably mastered the psuhbike — you'd be setting them up for failure. Similarly, you might find yourself completely frustrated if you try to do new tasks for which you still do not possess the skills for. Therefore, try to start with the most basic programming language and slowly (and steadily) work yourself up — this isn't a race you need to win. If you are a newbie to programming, the code can be confusing and overwhelming. Instead, focus on understanting the various terminologies first; such as control flow, comparison, and variable assignment. Once your conquered the fundamental principles, you can move on to bigger and better issues (or rather, more complex languages). Respect The Differences In Languages Programming has many languages, and each has different idiomatic expressions according to how they have been coded by the developers. Therefore, it is imperative to learn a flexible way of coding. When writing code, keep in mind that it is something that needs to be read by other people. Ensure you learn various language idioms by going through various open source codes, exploring the philosophy behind each code, and analyzing an array of blog posts. As you move up the ladder, review your code and offer to engage with the feedback provided by critic. Be proactive, ask if a feature in your code doesn't make sense. This method shall ensure that you receive varied answers which will only help you grow your programming skills. Ensure That You Love What You Build Don't follow the suggestions of any particular expert; instead, seek advice from different programming experts, and look towards building your knowledge base. Next, work on that project which you've always wanted to give a try. Think of your increased motivation if you actually decided to focus on building what you truly loved. Remember: You will understand very little if you are trying to learn about programming and if it's not something that you're actually interested in. Find Experienced People Who Can Help You Learning to code is great. You can start at your own pace, and then speed up a little once you find resources that help your understanding. However, coding can get a little hectic if you choose to go at it alone. Here are some ways to find help on the go: - Ensure that you have a resourceful network of people whom you can always turn to whenever you are hard pressed. - Ensure that you have done enough research to find any online communities that are into the same language as you. - Find online forums, slack groups, and IRC channels to learn from. - Find a friend from your area who understands programming and from whom you could borrow some knowledge. While learning a new programming language you might not have heard of before, you may face untold and unsung challenges. This is where mentors come in. In the Cyber Era, the internet has spread its roots to almost every corner, and you may friend someone who has already mastered the language that you are trying to learn. Contact them and let them know that you have recently started the journey and that you require their help. Studies have found that 88% people who make use of this method succeed on their path to successfully mastering new languages. Make Your Schedule And Learn To Follow It It's okay to learn alone. However, you may even often find yourself procrastinating too much. What often helps is ensuring that you know the schedule that works best for you. We all have different timelines of learning; whether it be early in the morning, or later on at night. Moreover, you'd need to find a location that would provide you with minimal distractions. Therefore: - Think about the time you need to digest each activity. - Your learning sessions should not be the same as those of another person. The way you absorb things will be different when compared to someone else. Therefore, think of what works best for you. - When scheduling your learning times, work in an area where you can reward yourself. Work in a coffee shop and treat yourself after you have mentally exhausted yourself. - If you choose to work from home, ensure that you set some timeslots to unwind before moving on to your next activity. Learning a new programming language? Feel free to share your challenges in the comment section below!
<urn:uuid:97237d29-4f2e-491c-a19b-a8976d0d0032>
CC-MAIN-2023-23
https://www.dk.freelancer.com/community/articles/7-tips-for-success-when-learning-a-programming-language
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652116.60/warc/CC-MAIN-20230605121635-20230605151635-00430.warc.gz
en
0.956438
1,159
3.421875
3
Every summer has its own story. For residents of Southern California, this summer’s story is going to include a chapter about rolling blackouts. The L.A. Times wrote the prequel earlier this month. To summarize, the natural gas leak this winter at the Aliso Canyon Underground Storage Facility has left Southern California short on natural gas, which means that, come summer, the region’s utilities could be unable to generate enough electricity to meet demand. To prevent the entire grid from, power managers will institute rolling blackouts by cutting electricity to certain individual sectors of the grid at moments of peak demand. To many, the possibility of a blackout seems quaint. Who doesn’t enjoy the occasional candlelit dinner? And what parent doesn’t wish their kids would watch less television? The reality of blackouts, however, is deadly serious. Electricity provides us with more than just entertainment. We depend on it to, among other things, refrigerate our food, power hospital equipment, and illuminate traffic signals. We hardly notice it when it’s there, but without electricity are lives are much less safe. Anatomy of a Blackout A lot of us might have a hard time conceptualizing how a natural gas leak in October can lead to a blackout the next July. The specifics of how we’ve arrived at our present situation underscore its gravity, however, so they’re important to understand. The first step is to understand that demand for electricity does not remain constant throughout the day. Instead, it ebbs and flows like a tide. Demand is greatest in the summer, when air conditioners are in use (while homes can be heated using electricity, most use gas as it is more efficient). Day to day, we use the least electricity in the middle of the night, when we’re asleep and do not require lighting or the use of appliances. As we wake up and begin to turn on lights and appliances we begin to use more. Demand peaks in the afternoon and early evening, when air conditioners are working hardest. To accommodate cyclical demand, electrical utilities draw from a variety of generation sources. Base load power plants operate near-continuously to provide the amount of electricity that is constantly in demand. These plants—usually coal or nuclear—are expensive and time-consuming to start up and shut down, but cheap to operate once in a steady state. The next tier of power plants—load following (or “mid-merit”) plants—strike a balance between start-up and operating costs, and thus increase and decrease their output cyclically to “follow” demand. In the western U.S., hydroelectric dams provide the ideal source of mid-merit electricity, which is why there are tides on the Grand Canyon stretch of the Colorado River. The final tier of power generation are “peaker” plants that only operate at times of peak demand. These plants can start up and begin providing electricity very fast and at little cost, but only because they burn more expensive fuels than base load or mid-merit plants. In the United States, peaker plants are almost always fueled by natural gas. This fact, that peaker plants burn natural gas, is the connection between a fuel leak in October and blackouts in July. We established above that peak demand for electricity occurs during the summer months and is driven by the use of air conditioning. Unfortunately, the electricity that allows millions of businesses and homeowners to simultaneously turn on their air conditioners is provided by natural gas-fueled peaker plants. Thus, when there is a shortage of natural gas, there is a shortage of electricity at peak demand, which causes blackouts. That they occur when demand is greatest is what makes blackouts so dangerous. Consider this: peak demand occurs from the afternoon into early evening. Rush hour occurs at the same time, and would certainly be a bad time for traffic signals to go out. Or, consider the driver of peak demand, air conditioning. While it certainly makes life less sweaty, for healthy adults A/C is arguably much more a pleasantry than a necessity. Healthy adults can easily survive even record-breaking temperatures with only a little lifestyle adaptation. But not all of us are healthy adults. Some of us are children, some of us are elderly, some of us are sick. For these groups, exposure to environmental extremes (such as in a heat wave) can be fatal. If you don’t think heat can kill, think again: More than 70,000 lives were lost in the 2003 European heat wave. Closer to home, 739 people died in only three days during the July 1995 heat wave in Chicago, Illinois. We strongly recommend this haunting account. We’ve said it before, and we’ll say it again, climate change is real and the world is getting hotter. Each of the past six months has been the hottest on record. If this trend continues—and it will—this summer will be the hottest ever, and by a wide margin. Extreme heat and electrical shortages are a potentially deadly combination, and are, scarily, quite likely in Southern California this summer. How Whole House Fans Help You may be wondering at this point, “what does any of this have to with whole house fans?” A lot! Since air conditioning is the primary driver of peak electrical demand, reducing its use is the most effective way to reduce peak demand and, by extension, the probability of blackouts. Simply turning off the air conditioning doesn’t help much though, because the outdoor temperature remains high. After all, we’re sure you’d still like to stay cool. A whole house fan is one of the only ways to cool a home without air conditioning. Moreover, they do so much more efficiently. In fact, AirScape’s “e-series” line of whole house fans can cool even the largest homes using only a tenth of the electricity of A/C. If you live in Southern California, installing a whole house fan, and using it in place of A/C as often as possible, is one of the best ways you can do your part to prevent blackouts this summer. You don’t even have to take our (admittedly biased) word for it: If you are one of their ratepayers, the Los Angeles Dept. of Water and Power offers a $200 rebate for installing a whole house fan. They do so because these devices work to reduce demand for electricity. And with such a generous rebate, we’re sure you’ll find a whole house fan pays for itself very quickly. If you’d like to learn more about AirScape whole house fans, visit our website. You can also talk with any of our friendly, well-trained sale techs in person on the phone. We’re available anytime between 9:00 am and 5:00pm pacific time, Monday through Friday, at 1.866.448.4187. We’d love to help you find the right fan for your home, so you can start conserving electricity and saving money as soon as possible.
<urn:uuid:d8787024-52a7-414d-99a6-1b15a9cf8d7f>
CC-MAIN-2023-23
https://blog.airscapefans.com/archives/coming-soon-to-southern-california-rolling-blackouts
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649193.79/warc/CC-MAIN-20230603101032-20230603131032-00430.warc.gz
en
0.950396
1,481
3.3125
3
Let’s set the stage for what greenhouse gasses are by using a familiar scenario. You’re walking in a greenhouse. That warm, damp air that you feel on your skin and the additional sunlight that warms the space likens it to a 24/7 hot yoga session for plants. That, in a simple example, is the greenhouse gas effect. Now, take that greenhouse and expand it to the size of the planet. Imagine the world as one large terrarium with man-made greenhouse gasses (GHGs) trapping heat in the atmosphere. The impact, according to the United Nations Environment Programme (UNEP) Emissions Gap Report, is measurable and critically damaging to life on planet earth. Global temperatures are expected to rise at least 2.7C this century. The report goes on to say that GHGs need to be halved by 2030 to avoid a climate catastrophe. According to the Environmental Protection Agency (EPA), one of the leading GHGs is carbon dioxide (CO2), which accounts for 79% of all GHGs from human activities. Reducing CO2 (or decarbonization) is critical. The EPA points out that carbon emissions alter climate patterns and that “human health, agriculture, water resources, forests, wildlife, and coastal areas are all vulnerable to climate change.” Fortunately, data available from Internet of Things (IoT) technology can help accelerate decarbonization efforts as explained, in part, below. The Intersection of IoT and Carbon Markets As the world faces the challenge of reducing GHG emissions, industries are turning to regulated carbon credit markets and voluntary carbon offset markets to help them shrink their carbon footprints. Carbon markets — where carbon credits and offsets are sold and bought, similar to commodity futures like grain — provide a way for industries to compensate for unavoidable emissions by investing in certified projects that reduce or remove carbon dioxide from the atmosphere. These projects mitigate the environmental impacts of industrial operations while helping organizations work toward net-zero commitments and environmental, social, and governance (ESG) reporting goals. Carbon credit markets create accountability. Along with international pacts to drastically lower GHG emissions, consumer demand to reduce environmental harm is spurring carbon market growth. This demand is driven by deep-seated concerns that are literally keeping Americans up at night. A new survey from the American Academy of Sleep Medicine (AASM) reveals that one-third of adults (32%) “always or often” lose sleep due to worries about environmental issues. Investing in carbon offset projects shows that an organization’s commitment to combat climate change goes beyond lip service. A worldwide awareness of climate change could be one reason companies are taking note. The voluntary carbon market recently exceeded $1 billion in global value and could surpass $30 billion in annual value by the end of the decade, according to a Bain & Company report. While investments are clearly on the rise, “the carbon market has reached a crossroads,” the report states. That’s because carbon markets today are built largely on trust — and as it turns out, that trust is tenuous. Enter the critical role of data. Verification methods for carbon offsetting lack uniformity, which raises uncertainties about the fair market value of credits as well as doubts about the efficacy of the projects they fund. As a result, many organizations that need carbon offsets to meet their net-zero commitments have nevertheless chosen not to buy them. For carbon markets to achieve their potential, reliable emissions measurements and data are needed for valuation and verification. “Zero Trust” Begets Absolute Trust Leveraging IoT technology consisting of sensors, network configurations, and cloud-based analytics can significantly improve the accuracy, reliability, and scalability of the carbon offset verification process. That’s where FreeWave comes in and its partnership with Inmarsat to provide global coverage, collecting IoT sensor data from anywhere and transporting it to the cloud for analysis and action. The FreeWave platform has reputable third-party auditors who analyze data to confirm the efficacy of certified carbon offsetting projects. For example, in a reforestation project, auditors can accurately measure and convey to offset buyers how much carbon is being sequestered, and it won’t be long before buyers, through a dashboard, can track these measurements themselves and compare them against a projected scenario of how many tons of carbon emissions would have occurred were it not for the project. Using incontrovertible metrics to assess project performance increases investor confidence, while sellers can ensure that their credits are backed by measurable emissions reductions. This could ultimately help move the voluntary carbon market toward a more transparent, zero-trust model. When there’s absolute trust in carbon market performance, the value of carbon offsets will increase. That’s good news for industries like smart agriculture that can potentially capture more carbon than they produce, enabling them to sell offsets as an additional revenue stream. Beyond Carbon Markets — Sustainability Best Practices Carbon offsetting is part of a holistic sustainability plan that starts with reducing the use of fossil fuels and pollutants, taking carbon reduction efforts as far as possible before offsetting any remaining emissions. Here, too, IoT and FreeWave come into play, deploying technologies that improve operational efficiency while protecting and conserving natural resources. Growers, for example, can use sensor data to optimize efficiency for irrigation and fertilization programs. IoT data allows agriculture and other industries to monitor and manage their environmental impact. It also gives them data-based ESG impact reports that they can use to their competitive advantage — and to discredit accusations of greenwashing (exaggerated claims of environmental practices). Most business leaders (76 percent) in major industries doubt their peers’ ESG reporting, according to recent research by satellite solutions provider Inmarsat. Beyond the environmental and humanitarian imperatives, investing in climate-smart IoT technologies can be part of a long-term revenue enhancement strategy. We at FreeWave believe that products that are verifiably carbon-neutral will warrant premium pricing in the eyes of environmentally conscious consumers, just as produce grown organically commands a higher price. The Journey to Net-Zero Most business leaders believe that data collected via IoT solutions is critical to building trust (81 percent) and improving ESG outcomes overall (82 percent), according to the Inmarsat survey. Four in five respondents planned to increase their use of IoT solutions this year to measure and better understand the impact of their sustainability initiatives. In addition, 78 percent of respondents reported that they are seeing a return on investment from IoT tools used to improve sustainability. From an environmental and competitive standpoint, the message is clear: It’s time to hasten decarbonization. Connect with a FreeWave expert to find out how IoT and connectivity can advance your sustainability goals, including carbon reduction and carbon offsetting opportunities.
<urn:uuid:050367f8-090d-4583-ae61-bc3bf20c80f0>
CC-MAIN-2023-23
https://www.freewave.com/data_and_decarbonization/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653071.58/warc/CC-MAIN-20230606182640-20230606212640-00230.warc.gz
en
0.934241
1,403
3.515625
4
IEP Objectives : Expanded Core Curriculum Games for Visually Impaired Students ObjectiveEd.com is our new organization where we are building Expanded Core Curriculum interactive simulations for blind and low vision students, based on the child’s IEP . The child’s progression in acquiring skills in our ECC-based games and interactive simulations are preserved in a private secure cloud, available to the school team in a web-based console . If you are a Teacher of Visually Impaired Students , click for more information on using these types of games as part of maximizing student outcomes, relating to their RTI and IEP I often get asked for a list of games that we’ve built. Here’s the current list, from the newest to the oldest. Click on the game to go directly to the iTunes download page. All games are designed for rapid audio play and have been built with the help of dozens of visually impaired gamers Blindfold Feud – Inspired by Family Feud. Blindfold Road Trip– Be the first player to drive 1000 miles in this card game similar to 1000 miles or Miles Bornes. Now with cars, sailboats and trains. Blindfold Words From Words – How many words can you create from one word? Blindfold Oppoly – Inspired by Monopoly. Blindfold Euchre – Trick-taking card game, much easier than spades. Blindfold Fireworks – Tap and swipe to conduct your own audio fireworks show. Blindfold Seven Words – Similar to seven little words. Blindfold Word Biggle – Inspired by Boggle – Find words in a 5 by 5 grid of letters. Blindfold Trivia Match – Just like Jeopardy Blindfold Snakes and Puzzles – Snakes and Ladders but with trivia or arithmetic puzzles Blindfold Soccer Kick – Soccer – European Football – Kicking and Blocking. Blindfold Cat and Mouse – Just like Skipbo. A two player card game similar to Solitaire, but much easier. Blindfold Sound Search – More Sound Packs added. Matching game using Common Animals, Asian Animals, National Anthems, Musical Instruments and Everyday Sounds. Blindfold Color Crush – Many more gem packs added: A cross between Bejeweled and Candy Crush. Blindfold Barnyard – New barnyards added: Move your animals from the barnyard to the fence to the barn. It’s addicting! Braille Spin and Solve – Practice your braille contractions. Inspired by Wheel of Fortune, spin to guess a letter or a contraction in the phrase and win. Blindfold Greeting Card – Create and send your own audio cards to friends and family. Blindfold RS Games – 21 different multi-player games, played by thousands of people on Windows and Mac, are now available on the iPhone and iPad. Blindfold Sound Search – Matching game using Common Animals, Asian Animals, National Anthems, Musical Instruments and Everyday Sounds. Blindfold Basketball – Grab the ball and start shooting. Great sound effects! Blindfold Bird Songs – Find that Bird and Match that bird – two great games for learning bird songs. Blindfold Checkers – Play checkers with easy, medium or expert opponents. Phrase Madness – Famous as a windows game, now on the iPhone and iPad. Match the phrases and laugh your socks off. Blindfold Pinball – Play pinball on diffferent pinball machines. Blindfold Pool – Play pool by hitting your cue ball into the other balls, and landing them in the pockets. Hours and hours of fun. Blindfold Spin and Solve – Inspired by Wheel of Fortune, spin to guess a letter in the phrase and win. Blindfold Shuffleboard – Slide your discs into the scoring area, and push your opponents discs out of the way. Blindfold Bingo – Play bingo with lots of patterns. Win coins. Record yourself saying Bingo and share it. Blindfold Crazy Eights with Friends – Crazy Eights card game with with other people, via Game Center or in the same room. Blindfold Word Games– Hangman, Word Ladder, Scramble and Word Flick. Blindfold Horse Race– Race against other horses by walking your fingers on the screen. Blindfold Juggle– Juggle animals on earth and other planets. Blindfold Rummy – Gin Rummy card game – collect sets and runs of cards. Blindfold Tile Puzzle – Tile games including 2048 and Threes, with several variations. Blindfold Vee Ball – Just like Skee ball: Roll a ball up a ramp to land in the highest point hole. Blindfold Craps – Dice game where you bet on the outcome of a dice roll, just like in Las Vegas. Blindfold Air Hockey – Air Hockey – use your mallet to shoot the puck into your opponent’s goal. Blindfold Breakout – Breakout game where you smash bricks with a ball, similar to the arcade game. Blindfold Bowling – Ten pin bowling just like at the bowling alley. Blindfold Roulette – Play roulette just like in Las Vegas. Blindfold Hopper – Inspired by the old video game frogger. Blindfold Pong – Pong game similar to the classic arcade game. Blindfold Dominoes -Dominoes game where you play until you are out of tiles or blocked. Blindfold Hearts – Hearts card game where you avoid collecting hearts or you can shoot the moon. Blindfold Simon – My Simon type game where you follow patterns based on gestures and sounds. Blindfold Spades – Spades card game where you bid and collect tricks as you win each hand. Blindfold War – The classic war card game where you try to collect all the cards. Blindfold Solitaire – Solitaire card games including Klondike, Spider, Free Cell, Golf and many others. Blindfold Wildcard – An Uno type card game. Blindfold Crazy Eights – Crazy Eights card game with several variants of play. Blindfold Video Poker – Video Poker just like the machines in Las Vegas. Blindfold Blackjack – Play Blackjack against the dealer. Blindfold Sudoku – Audio Sudoku in a 9 by 9 grid, with easy, medium and hard levels. Blindfold Sudoku Mini – Audio Sudoku in a 4 by 4 grid, lots of fun and great for people who never played Sudoku before. Blindfold Cryptogram – Decode famous quotes and phrases in a letter substitution game Blindfold Racer – Drive your car using your ears, not your eyes. The original game that started all of this.
<urn:uuid:8d0a9a6c-2b0f-4bf6-815e-f195a324e858>
CC-MAIN-2023-23
https://blindfoldgames.org/2017/03/27/blindfold-games-march-update/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653183.5/warc/CC-MAIN-20230606214755-20230607004755-00430.warc.gz
en
0.877864
1,457
2.625
3
What is a design? The German Design Act provides protection for both two-dimensional “designs” (e.g. fabric design) and three-dimensional models. These must be designs or models of commercial objects that appeal to the aesthetic sense for colour or form. A prerequisite condition for protection is the novelty and distinctiveness of the object, i.e. resulting from creative activity of the designer. Since the new design law entered into force, the previous stricter requirements now demand a certain „level of originality”. Thus the new design law offers greater protection for physical forms. For example, designs of technical devices, designs of consumer goods and packages can be protected. However, under design law, which has entered into force in 2003, separate parts of an end product, for example a car, can only be protected if they are visible during their intended use. This limitation results from the EU harmonisation. However, separate parts, such us a wing, a bonnet or a shock absorber can be protected as designs, as long as they fulfil the requirements for protection as separate parts. What are the differences between design law and copyright law? A design is – similarly to a utility design – an unchecked protective right, but there is no monopolist supervisory body for copyright in Germany. Design protection is usually created by an entry in the register (European protection for a limited period can also come into being without an entry) and when substantive prerequisites exist, whereas copyright protection is guaranteed by law. At the same time, it is “easier” for a designer to obtain protection of registered designs than protection by copyright, since the latter requires a significantly higher degree of creativity that exceeds the prerequisites novelty/distinctiveness necessary for protection of registered designs. Therefore, it is usually recommended for a designer to seek protection of registered designs, which can by the way exist parallel to protection by copyright. Further substantial differences include the limited maximum validity period of protection of registered designs which amounts to a total of 25 years after the amendment of the German design law in 2003, as well as the possibility of collective registration of up to 100 designs or models for the same goods category. This means that for example 100 different fabric designs can be applied for in just one collective act of registration. In the case of a an unchallenged design, it is assumed that protection of registered designs exists, whereas the author basically has to present and prove authorship, that a sufficient degree of creativity exists, etc. Based on the European Community Directive on design, as of April 2003 you can register Community designs that offer numerous cost-efficient possibilties and protection all over Europe regarding their prerequesites and validity and others. How long is design right protection effective? Starting with the day of registration the design is protected for a maximum of 25 years (registered Community design- 25 years; exploited unregistered Community design – 3 years) as long as the utility design is maintained, i.e. especially by paying the three renewal fees to the German Patent Office. In spite of the harmonisation of law in the European Union there is still no German unregistered design. What territorial protection does a design offer? At the moment there is no worldwide design, but there is a Community design effective for the whole of Europe. A German design is protected in Germany. Additionally, at international level, the Hague agreement provides protection for commercial designs or models. Can a design be announced before registration (novelty period of grace)? Whereas in Germany inventions have to be registered before they can be announced in any way whatsoever, there is a so called period of grace of 12 months for designs (and utility designs) entering into force with the new German Design Act. Under certain conditions which absolutely have to be fulfilled (especially: Eigenveröffentlichung) designs can be announced prior to their registration. How does a design come into being? German designs come into being by means of a registration at the German Patent Office after an application has been filed. For this purpose there is a form by the German Patent and Trademark Office (http://www.dpma.de). You should consult an expert in case a collective registration is advisable. What is the course of the registering process of a design? At first each application received undergoes a primary check, the purpose of which is merely to state whether there are evident lacks, e.g. whether documents / forms are lacking. At the end of the checking procedure an acceptance certificate or a rejection is issued. Then a design is published or entered in the Register of Designs. Is it possible to challenge a design by means of interference proceedings at low cost? Contrary to patent or trademark law, there is no deadline for interference/contradiction proceedings in the area of design law. Contrary to the utility design cancellation procedure before the Patent Office, the first step against a design consists in a costly petition to cancel its entry in the register before a Regional Court. It is then determined whether all necessary substantive protection prerequisites for registration are fulfilled, i.e. novelty and innovation. What do we need to register your design? Usually a sketch, a description and if needed a visual model are necessary. In some cases we need further details which we cannot generally state due to the complexity of the given object. In the initial phase we only need general information on the area in question (furniture, fabrics, consumer goods, technical design, package, etc.) to plan further proceedings so that our expert in charge can contact you and settle further details with you, including estimation of costs.
<urn:uuid:48877a78-58a6-4068-9d06-96cc58a73c01>
CC-MAIN-2023-23
https://competition-attorneys.de/design-registration/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656675.90/warc/CC-MAIN-20230609100535-20230609130535-00030.warc.gz
en
0.934975
1,158
2.96875
3
The River Stinchar has its headwaters in the Carrick Forest to the north of the Galloway Forest Park, only one kilometer from the source of the River Girvan. The Stinchar has a main drainage course of 54km and flows south-west via Barr, Pinwherry and Colmonell, finally entering the sea at Ballantrae. The river has a catchment area of 314km2, which includes the main tributaries of the Muck Water, the Duisk River, Water of Assel and the Water of Tig. Forestry, hill grazing and agriculture are the main land uses in the Stinchar catchment which has a low human population density and very little industry. The main stem of the river runs through a relatively low lying valley with tributaries draining steep valley sides. The maximum altitude that salmon can reach naturally is approximately 150m which is much lower than the highest naturally accessible point of the River Ayr which is at 300m altitude. Water quality in the River Stinchar is generally very good with a diverse range of invertebrates present even in the lower reaches. The River Stinchar is a famous salmon fishery and is renowned for its autumn run, producing fish which are often large. The Salmon Fishery Board of Scotland Report 1887 notes that the “Stinchar, remarkable for its shifting mouth, and for yielding larger salmon than any river of its size in Scotland“. A 62lb salmon was caught in the coastal nets in 1898. To view current River Stinchar water levels: River Stinchar Catchment Map highlighting main tributaries. Click here to buy a Fisherman’s Map of the River Stinchar Every small donation helps! Payment by credit/debit card is quick and easy. - Most rural of Ayrshire river catchments with low human population. Main settlements are Ballantrae, Colmonell, Barr and Barrhill - Some water is abstracted from the upper reaches of the Stinchar and diverted into Loch Bradan, Ayrshire’s major water supply reservoir. No major man-made obstructions - Upstream of the Duisk confluence, the Stinchar is known locally as the “Wee Stinchar” - The Stinchar is a highly responsive catchment with rapid run-off from the steep valley sides resulting in sudden changes in river flow - The geology of the Stinchar catchment is relatively uniform and is dominated by sedimentary greywacke. Knockdolian Hill in the lower catchment is formed by a volcanic outcrop and the burns draining this area have a higher pH than those on the opposite side of the river - The Stinchar has a number of tributaries, the largest of which is the Duisk River which enters the Stinchar at Pinwherry. The Duisk River catchment is extensively afforested. Low pH levels are a feature of many of the Duisk tributaries - With no major industry or large sewage treatment works in the catchment, and little intensive agriculture, water quality is generally very good. The river supports large stoneflies such as Perla bipunctata, throughout its length - Common fish species include salmon, trout, eels, minnows, sticklebacks and lampreys (sea and brook). The Stinchar is the only one of the major Ayrshire rivers which does not have a stone loach population, adding weight to the argument that it is a non-native fish with its occurrence linked to spread by humans. The Stinchar is a stronghold for eels with a widespread and abundant population. Vendace have been introduced into one of the small lochs in the Stinchar catchment in an attempt to establish a sentinel population for threatened stocks Monitoring and Science on the River Stinchar Data is collected to allow evidence based management and restoration We undertake annual electrofishing surveys on behalf of the River Stinchar District Salmon Fishery Board to monitor fish production in the main stem and tributaries. We have a large database which may be available upon request for those requiring information. River Stinchar Habitat survey published in 2003. This survey provided a detailed inventory of habitat type and quality, obstructions to migration as well as identifying priority areas for habitat restoration. The survey showed that main impacts on river habitat quality in the Stinchar were commercial coniferous plantations with localised impacts from intensive livestock farming and riverbed excavation. Forestry has resulted in acidification in the headwaters, and more rapid water runoff due to an increased number of drainage channels. These have degraded instream and riparian habitat, and transported large amounts of potential spawning gravel downstream. There is an ever increasing interest in lamprey species across the UK. Lamprey are an important species within the Stinchar catchment and ART hold considerable data on their distribution. The Stinchar supports all three native lamprey species and appear to be stable. River lamprey are protected as a schedule 3 fish species of the Conservation (Natural Habitats, &C) Regulations 1994. River and sea lamprey are a UK BAP species. Brook lamprey are listed on the International Union for Conservation of Nature (IUCN) Red List of threatened species. Invertebrates respond to long term changes in water quality therefore they can be used to determine pollution problems. ART provide various levels of assessment both commercially and for our own use. Invertebrate sampling offers opportunities for citizen science. Invasive Species Management Over many years, ART have undertaken scientific habitat assessment to determine distribution and impacts with invasive species. Invasive weeds can have an impact on habitat and water quality. Through strategic management and control we continue to address issues created by these species. Invasive plants surveys carried out in since 2008 to assess the distribution and density of giant hogweed, Japanese knotweed and Himalayan balsam Atlantic Salmon Pressures Tool ART contributed to the development of Fishery Management Scotland’s Atlantic Salmon Pressures Tool. This involved looking at all pressures affecting the species across Ayrshire. The FMS Pressures tool is an interactive mapping platform that will be available to local river managers to inform and target management actions and to provide important evidence for policy development at national level. This tool will align very well with the forthcoming Fishery Management Plans that the Trust are currently developing for FMS.
<urn:uuid:fd768638-7c72-41bd-bdb4-e5a1a6dbf9b6>
CC-MAIN-2023-23
https://www.ayrshireriverstrust.org/river-stinchar/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648858.14/warc/CC-MAIN-20230602204755-20230602234755-00630.warc.gz
en
0.92972
1,382
3.046875
3
Written by Maggie Oct 14 2021 Succulents, in the hearts of flower friends are lovely, but did you know that there is a succulent plant called the Zulu giant plant? Zulu Giant plant is a descendant, which lures flies to pollinate with its stench. This is a unique plant in the succulent plant. Today we will get to know How to care for Zulu giant plant! Optimum growing time: dividing plants usually in early spring combined with changing pots;Cuttings are available at any time; Best growing soil: Zulu Giant plant is best for fertile sandy soil with good drainage. Growth humidity requirements: zulu giant requires dry air and enhanced ventilation in summer; Optimum growth temperature: Zulu Giant plant likes warm, and the optimal growth temperature is 12 ~ 22°C. Zulu giant plant is not cold resistant, and in winter, temperature should be maintained above 8°C. Zulu giant does not bear intense heat, the plant grows slowly or stops growing when high temperature. In addition to strengthen ventilation and shading outside, often spray water to the plant and all around even, in order to reduce temperature.; Optimum Growth Light: zulu giant plant likes sufficient light and is tolerant to semi-shade. Sufficient sunshine should be provided in autumn, winter and spring. Avoid strong light exposure, otherwise the plant is easy to burn and atrophy. When the sun is strong, fleshy stems appear red, and can be restored to normal after being moved to the shade. From May to September, when the temperature is high and the light is strong, shade should be given, or plants should be placed in a place with sufficient scattered light. Spring is the most vigorous growth period for Zulu Giant plant, and fertilizer and water should be fully supplied. Nitrogen, phosphate and potassium fertilizer should be applied once every half month. Fertilizer should be stopped in summer when the temperature is high, or only thin fertilizer should be applied. After autumn, the plants have entered a period of rapid growth. Fertilizer should be applied every half month, but nitrogen fertilizer should be stopped and potash fertilizer should be applied only, which can not only promote the differentiation and flowering of flower buds, but also improve the cold resistance of the plants. Plant enters dormancy in winter, and we should stop fertilizing. Hornhorn crowns in cultivation should not be too full of fat and water, otherwise there will be a "return to the ancestor" phenomenon, long columnar fleshy stem. Zulu Giant plant is drought-tolerant and prefers dry soils due to its fleshy stems. In spring, autumn growth period, watering should master "dry and wet and partial dry", to prevent basin soil too wet. However, it should not be too dry, otherwise the stem will shrivel and lose its ornamental value. In summer high temperatures, we should pay attention to avoid excessive watering, high temperature and basin soil that is too wet easily leads to rotten roots. We can spray instead of pouring the method to maintain appropriate water. In winter, water conservation should be controlled and dry soil in the basin should be maintained. Although the flowers of the Zulu Giant plant are large and peculiar, they will give off a bad smell when they bloom. If they are placed in a room, they should be moved to the outside when they bloom, or the buds should be removed. Because the root system is shallow, it is easy to produce lodging, so it should pay attention to support when planting. Horn crown in the growth of the phenomenon of "atavism" and long columnar fleshy stem should be cut off as soon as possible, in order to maintain the beauty of the plant shape. Turns the pot every 2 to 3 years, preferably in spring and fall. The basin soil needs to be fertile and loose with good drainage, otherwise the root is easy to rot. The substrate can be made up of leaf rot soil, garden soil, peat soil and plain sand. Because the root system is shallow, we can use shallow potted seed. Years of plants growth will become weak, and they should be eliminated and renewed. Zulu Giant's propagation methods include cuttings, sowing and planting. Cutting propagation is mainly used. Cutting: Spring, autumn. Cut the stout stem from the mother plant and make cuttings about 10 cm long. Place the ventilated place for 2 ~ 3 days, and insert the matrix after the wound is dry. After insertion, keep the temperature at 20~25°C and root for 10~15 days. The new plant grows quickly and grows into a thicker cluster that year. The horn crown of rhinoceros rhinoceros is also propagated by cutting the abnormal stem into several pieces, which are dried and then propagated. Sowing: April to May. Because the seed is large, it is appropriate to sow in the pot on demand. The optimum temperature for germination was 25 ~ 28°C, and germinated 5 ~ 6 days after sowing. Planting: It is carried out when turning the pot in spring. The tufted plants from the base part of the open, after a little dry, root can be directly on the pot, rootless cuttings. Zulu Giant plant is affected by stem rot, black spot and mealworms.
<urn:uuid:ff7fc962-e3dc-4a8e-9457-1ef9c73ad91a>
CC-MAIN-2023-23
https://www.rayagarden.com/how-to-garden/how-to-grow-and-care-for-zulu-giant.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647614.56/warc/CC-MAIN-20230601042457-20230601072457-00230.warc.gz
en
0.932816
1,112
2.796875
3
Microsoft Excel (Spreadsheet 10th Class) Q:- What is Auto sum? How to use to Auto sum in Cells? Ans:- Auto sum is used for adding the values given in cells automatically without writing the formula to perform the operation. Sum is one of the functions available in the spreadsheet to perform the addition of selected numbers in the sheet. Autosum automatically select values around the cells either horizontally or vertically. - Create a New or Existing Worksheet. - Enter the desire numeric number in cells - Then select the all cells which want to add. 4. Click the option Auto sum under the Editing group in the Home tab. Q:- What is Conditional Formatting? Ans:- Condition Formatting(CF) is a tool that allows you to apply formats to a cell or range of cells. Conditional formatting changes depending on the value of the cell or the value of a formula. Condition formatting allows us to change the formatting (font color, border size, shadow) of the cells based on values in it. In Excel, Conditional formatting enables us to highlight cells with a certain color. Conditional formatting available under style group in Home Tab. Q:- Explain the Freeze a row or column in Excel? Ans:- Freezing rows and columns is a feature in a spreadsheet. When we want the header to remain constant while scrolling through the data, we can do the features of freezing in a spreadsheet. To freeze the rows or columns do the following – - Open a new or existing spreadsheet. - To freeze rows or columns click on Freeze panes option available under window group in the View tab. Spreadsheet 10th Class Q:- Explain the Page Layout. How to set the layout of a page in Excel? Ans:- Spreadsheet software provides various page layout options for organizing pages using the page layout option. Page layout is the term used to describe how each page of our document will appear when it is printed. Page layout option |· Margins||· Orientation Page Headers and Footers||· Hide or Display grid lines| |· Size of the page||· Define the print area||· Specify the background| Q:- Define a Workbook, Worksheet. Ans:-A workbook is the MS Excel file in which you enter and store related data. A worksheet is collection of cells on a single sheet. It is also known as Spreadsheet. we can manipulate the data in easy way in the worksheet. Each workbook can contain many worksheets. Q:- How many types of views in the spreadsheet? Ans:-There are five types of views available in the spreadsheet. - Normal:– This is the default view of spreadsheet application. It’s a collection of cells arranged in the work area. - Page layout:– use page layout view to see where pages begin and end, and to add headers and footers. - Page break preview:- This option is similar to the Page Layout option except we can set the area that is to be set as a page after inserting a page break. - Custom view:– If we would like to view selected areas of a document. We can use the custom view option. - Full-screen view:– If the select full-screen view then the workbook covers the entire screen. All tabs are hidden from view. Spreadsheet 10th Class Q:- Write the short note of Range and Range name. Ans:- Range:- A Range is a group of blocks of cells in a worksheet that has been selected or highlighted. When cells have been selected by black border or outline. Normally only one cell in worksheet with black outline. Range names – A named range is just a human-readable name for a range of cells in Excel. For example, if we name the range A1: A50 data. we can use MAX to get maximum value with simple formula. Q:- What is Chart? Ans:- A chart is a powerful tool that allows you to visually display data in a variety of different chart formats. A Spreadsheet enables us to create, modify and format charts based on the data given in the spreadsheet. We can represent data or functions in tabular form with the help of Chart. A Chart is graphical representation of data, in which data is represented by some types of chart i.e bar chart, line chart and column chart. Q:- List of Seven Chart Elements. Ans:- Chart has many elements, only some of the elements are displayed by default. |1. Chart Area of the chart||2. Plot Area of the chart||3. Data points| |4. Horizontal and vertical axis||5. Legend||6. Chart and Axis Title| |7. Data Label| Q:- List Six chart types available in the spreadsheet. Ans:- Excel chart helps is to display data visually in the most meaningful way. - Bar Charts - Column Chart - Line Chart - Pie Chart - Area Chart - Scatter Chart Spreadsheet 10th Class Q:- What is Sorting and Filtering? How to sort and filter data in Excel? Ans:- Sorting:- Sort is a feature that helps arrange the selected data either in an ascending or descending order. We can quickly reorganize a worksheet by sorting your data. For example, we could organize a list of contact information by last name. Data can be sorted alphabetically, numerically and in many other ways. Filter:- Filter is a feature used for extracting particular data using some conditions. If we want to certain data displayed, we can use Filtering tool in spreadsheet. The basic filter allow to view specific rows in Excel while hiding other rows. Q:- What is multiple workbooks and linking cells? Ans:- Spreadsheet also allows us to link the cells from various worksheets and from various spreadsheets to summarize data from several sources. Q:- How to Share worksheet data in Microsoft Excel? Ans:- Spreadsheet software allows the user to share the workbook and place it in the network location where several users can access it simultaneously. - Open new spreadsheet and type the following - Now to share a spreadsheet. - Click on the Share workbook option under the changes group in the Review tab. - Check the option Allow changes by more than one user at the same time. - Click ok. You can also more details about spreadsheet – Click Here
<urn:uuid:0eb48a8e-379d-4b4d-a589-a334078b7dfb>
CC-MAIN-2023-23
https://bloggerkey.com/spreadsheet-10th-class-it-notes-english/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649105.40/warc/CC-MAIN-20230603032950-20230603062950-00030.warc.gz
en
0.842276
1,357
3.203125
3
Energy security relates to how the electricity grid or 'power system' reacts to events that may influence it. It includes the grid's capability to react and recover securely to major events such as faults or generation tripping, termed 'contingencies'. The ability of the grid to respond to events and contingencies is termed ‘power system security’. Because the grid is balanced in real time – where the generation (supply) must equal demand plus any transmission losses – power system security requires all parts of the grid to work together. Ensuring that the power system is secure requires close monitoring and coordination, which is the role of the Australian Energy Market Operator (AEMO). A secure energy system is of fundamental importance to modern economies around the world. Electricity grids everywhere are currently going through a technological transformation, driven by a move away from conventional gas and coal generation technologies to renewable energy and energy storage technologies. The objective of a transition towards renewable energy is to reduce emissions and tap into the competitive and energy independence advantages that come with using renewable energy resources. Of course, this objective has to be delivered alongside energy security constraints. In Australia, more than 3 million homes and businesses already have solar on their rooftops, and investment in large-scale solar and wind farms dominates over conventional generation technologies. This new capability and capacity is coming online at a time when the National Electricity Market (NEM) is expected to deal with the withdrawal of many large conventional coal generators that have approached the end of their useful lifespan. Emissions abatement efforts are expected to accelerate these closures. Emissions from Australia’s coal power stations also need to be addressed to ensure that we can meet our emissions reduction commitments. |Year||Average annual emissions from coal aged over 40 (tCO2e)||% of electricity sector emissions from coal aged over 40||Average annual emissions from coal aged over 50 (tCO2e)||% of electricity sector emissions from coal aged over 50| The withdrawal of thermal generators has been occurring because they have been approaching the end of their useful lifespans. Closures of coal generation is expected to accelerate with international emissions abatement commitments. However, the amount of renewables currently deployed is less than the coal capacity that has been withdrawn, and investment in renewables needs to continue to replace these retiring coal generators. Australia should be embracing this change to secure a low-cost and reliable energy system as we transition towards a renewable energy future. The volume and extent of change is enormous and requires a clear plan. Synchronous generators have spinning magnetic fields that keep frequency close to 50 Hz. These magnetic fields are locked in synchronism across the grid, and synchronous generators rely on them to operate stably. Non-synchronous generators are wind, solar and battery storage that use power electronics to follow the grid frequency in order to inject power into the grid, but can operate in a range of grid conditions. Energy system reliability Energy system reliability is ensuring that there is enough generation, demand-side and network capacity to supply customers with the energy they demand, with a very high degree of confidence. Energy system security Energy system security is a power system that is able to operate within defined technical limits, such as frequency, even if there is an incident such as the loss of a major transmission line or large generator. Frequency is an outcome of supply and demand balance and is kept close to 50 Hz with the Frequency Control Ancillary Services (FCAS) market to provide this balance. The Australian Energy Market Operator operates the FCAS market, which has historically tended towards changes in generation (supply) rather than demand. Rate of change of frequency (ROCOF) Rate of change of frequency or ROCOF is the steepness of a change in frequency following a contingency event. Inertia is the power system’s immediate response to a contingency event. The level of inertia dictates the rate of change of frequency away from 50 Hz immediately after the event. Inertia allows for time to bring the power systems other emergency frequency control mechanisms into assist and restore frequency. Fast frequency response Fast frequency response is the fast-acting frequency control capability that can be delivered from a battery storage system or wind turbine generator. Acting like a synthetic form of inertia it swiftly injects (or consumers) power into (or from) the grid to push against a high rate of change of frequency event, with an aim to assist in restoring the supply-demand balance and therefore the frequency.
<urn:uuid:cc1962ae-3c23-4899-88c0-b1757fc136a9>
CC-MAIN-2023-23
https://www.cleanenergycouncil.org.au/advocacy-initiatives/energy-transformation/energy-security?token=404
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652116.60/warc/CC-MAIN-20230605121635-20230605151635-00430.warc.gz
en
0.92855
1,132
2.90625
3
What are the best treatments for nose infection? What symptoms should you look out for to know if you are dealing with a case of nasal infection? Is fungal nose infection a cause for concern? You will find all this and more in just a moment. Nose Infection Symptoms A nose infection may be caused by bacteria, viruses, or fungi. Nose infection manifests in different nasal conditions, depending on the nature of the infection. Nose infection symptoms in that regard also varies widely depending on the underlying condition. Sinusitis (sinus infection) is the most common form of nose infection. This is characterized by swelling of the tissues lining the sinuses – air-filled cavities occurring behind the nose, on the cheeks, and in the forehead. Sinusitis affects approximately 37 million people in America every year according to the WebMD website. Among the most common sinus infection symptoms are: - Facial pain – around the cheeks, forehead and eyes - Nasal blockage and discharge - Loss of smell - Upper teeth pain - Bad breath (halitosis) - Thick, yellowish-green nasal discharge - Mucus drainage in the back of the neck, i.e. postnasal drip The following nose infection symptoms are specific to bacterial infection of the nostrils: - Folliculitis: Painful pimples at the base of the nose hairs. - Crusts around the nostrils - Bleeding – especially when the crusts start peeling - Boils inside the nostrils Nose skin infection Staphylococcus bacteria are usually to blame for most cases of nose skin infection. These are beneficial bacteria that are found abundantly throughout the skin. In case of injuries and cuts on the skin, they can get into the body, resulting in an infection. This may manifest itself as furuncles (boils) on the nose and sometimes in the nasal vestibule (the part just inside the opening of the nostril. Treatment for nose skin infections ranges from topical antibiotic creams such as Bacitracin and Neosporin to oral antibiotics and surgical drainage. Hot compresses – applying moist. Hot cloths on the affected area also help. Nose cartilage infection after nose piercings Nose cartilage infection is one of the most common complications of nose piercings. This is usually attributed to staphylococcus bacteria that are found in abundance all over the human skin. According to The American Academy of Family Physicians’ treatment of an infected nose, cartilage involves using antibiotics that offer good coverage against Staphylococcus bacteria. Mupirocin is one such antibiotic. You can always avoid nasal piercing infections by taking good aftercare measures as directed by your piercing specialist. You will at the very least want to keep the piercing clean by washing it with warm, salty water 3 times every day until it has healed. Nose infection treatment or how to treat infected nose The most appropriate nose infection treatment depends on the nature of the patient’s condition. Here is a breakdown of how to treat infected nose: About two-thirds of sinusitis cases will go away in about two and a half weeks and don’t necessarily need the attention of a doctor. You may, however, want to take care of the symptoms and hasten the healing process using the following treatment options: 2. Pain-relieving medications Taking over the counter painkillers helps to alleviate the pain and headache caused by a sinus infection as well as fever. Among the most common pain relievers are: - Ibuprofen – available OTC as Advil, Motrin etc. - Acetaminophen – sold as Tylenol NB: Do not give aspirin to children aged below 16 years. It can increase the risk for Reye’s syndrome which is rare but fatal. Ibuprofen on the other hand should not be used by people with asthma, stomach ulcers, and heart conditions. 3. Nasal decongestants Usually sold OTC in most drugstores, nasal decongestant medication can also help to unblock your nose and enhance your breathing. They should however not be used for more than a few days as this may end up worsening rather than improving the condition. 4. When to see your doctor You should seek medical attention if sinusitis lasts more than a couple weeks or doesn’t seem to improve – or even worsens – after a week of treatment with the options listed above. Your doctor may recommend one of the following treatment measures: Antibiotics: A course of antibiotics may be prescribed for a case of severe sinus infection, especially if no improvement has been noted in a week or so. This helps to treat any bacterial infection that could be responsible or have resulted from the sinusitis. 6. Steroid sprays or drops Steroid drops can help to lessen the inflammation (swelling) in the sinuses. Surgery is used as the last resort for persistent sinusitis. Functional Endoscopic Sinus Surgery is preferred for the treatment of sinus infection. It involves inserting an endoscope into your nose – usually under general anesthesia, although it can as well be done under local anesthesia – to allow the surgeon access to your sinuses. The surgeon then removes any issues that could be causing the inflammation and blockage of the sinuses e.g. nasal polyps, and then inflate a small balloon to open up the sinus drainage. A self-dissolving implant may as well be used for the purpose. The UK National Health Service cautions AGAINST using the following as treatment options sinus infection: - Steam inhalation - Steroid medication - Mucolytics – drugs that help to thin out mucus 8. External and nasal vestibule infection - Topical antibiotic ointments e.g. Bacitracin and Neosporin - Oral antibiotics - Surgical drainage - Hot compresses – Dip a washcloth in hot water, wring out excess water and pat the nose gently with it until the heat dissipates out, then repeat for 10 to 15 minutes, 2-3 times daily. Fungal infection in nose i.e. fungal sinusitis There has been a notable increase in reported cases of fungal infection in the nose, or fungal sinusitis, over the last three decades according to The American Academy of Otolaryngology-Head and Neck Surgery. This is attributed to three main factors, namely heightened public awareness, use of immunosuppressive therapies e.g. cyclosporine medications that are used to “fool” the immune system in order to stop organ rejection, and excessive use of antibiotics. With a suppressed immune system, fungi kick into action and invade the body, resulting in numerous side effects. The damp cavities in the sinuses are ideal for fungal activity and because fungi require no light in order to breakdown food substances, they thrive very well in there, causing fungal sinusitis. According to the American Academy of Otolaryngology-Head and Neck surgery, there are four main types of fungal sinusitis and treatment varies from one to the other as follows: Mycetoma fungal sinusitis This type of fungal infection in the nose so to speak produces fungal pore clumps, called “fungal balls”, within the sinus cavities. It often causes injury to the sinuses, resulting in discomfort. Treatment involves scraping off the problematic sinuses. Allergic fungal sinusitis This is an allergic reaction to fungi floating in the air. This type of fungal sinusitis tends to affect immunocompetent people (possessing normal immune response) with a history of allergic rhinitis. The condition results in huge fungal debris and mucin (a substance featuring carbohydrate-rich glycoproteins) within the sinus cavities and surgery is typically required to remove them. Medications may also be prescribed to prevent the recurrence of this condition. Chronic indolent sinusitis This type of fungal sinusitis is common in Sudan and northern India and affects people with no identifiable immune deficiency, progressing gradually over months or even years. Symptoms for this condition include facial swelling – often resulting in impaired vision – and chronic headache. Chronic indolent sinusitis is distinguishable for nodular shaped lesions that are only visible when examined under a microscope. Surgery coupled with Intravenous anti-fungal therapy is typically used to treat chronic indolent sinusitis. This form of sinusitis affects people with compromised immune systems. It typically invades the sinuses leading to continued destruction and often reaches the bony cavities that house the eyeball and brain. Aggressive surgical procedures and anti-fungal therapy (intravenous) are used to treat the condition. Fungal nose infection is a rather rare occurrence as The Health Line website notes; bacterial and viral infections are more common.
<urn:uuid:d1134f7a-39d9-48a2-81f6-9ceeabf266d0>
CC-MAIN-2023-23
https://americanceliac.org/nose-infection-symptoms-pictures-cartilage-and-fungal-infection/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653930.47/warc/CC-MAIN-20230607143116-20230607173116-00430.warc.gz
en
0.916095
1,958
2.609375
3
Saturday August 27, 2016 The Toronto Suburban Railway (TSR) line was closed in 1931 but parts of it have been resurrected as the Guelph Radial Trail. Much of the trail runs on the old railway right of way but large parts are also on trails granted by local landowners. Hiking the GTA has crossed paths with the TSR several times during our wanderings in and around the GTA. The TSR schedule shown below illustrates the two hour trip from Guelph to Toronto. Access to the trail can be made off of the corner of 25 and 25 just south of the town of Acton. Side Road 25 has some parking just before the intersection with Regional Road 25. A previous hike starting on Mill Street in Acton led onto the Guelph Radial Trail and ended at 25 and 25 and so a continuation east from there seemed to be in order. The trail follows the fence line east across the field. The wild grapes are ripening in clusters where the vines are taking over the bushes and trees. Wild grape, unlike moonseed, has climbing tendrils. They can be seen in the picture below wrapped around one of the branches to the left of the cluster. If in doubt on the identification of wild grapes versus the poisonous moonseed you should eat a leaf. Grape leaves will taste like grapes. At the back corner of the field the trail turns and enters the woods. There is some kind of a hunter’s blind built into the trees where it can look into two fields. It is not uncommon to find some sort of fort or tree house on an exploration but this time there was far more wooden structures than is normal. There were two of these blinds in different fields. At the foot of this one is an old rectangular structure made of concrete. Livestock needed water and farmers had to provide large amounts for cows and horses. They had several options, including creating a pond by damming a creek on the property. Some landowners were lucky enough to have a spring which could feed into a watering trough. Others would install windmills to drive the pump needed to bring water from a well to a trough. There are a couple of pipes on the ground beside this abandoned trough that brought water from somewhere else on the farm. The trail leads through an area of young growth trees. The forest floor through here is covered with large stumps of burnt trees. Canada has about 10 percent of the world’s forest cover. Each year in Canada about 8,300 fires burn and they consume an average of 2.3 million hectares annually. These fires are essential to forest renewal because they release nutrients that are trapped in the plant matter on the forest floor. They also open up the forest canopy so that light reaches the floor and gives new growth an opportunity to get started. Older, often diseased, trees are cleared out giving the forest a chance to grow new healthy ones. The cones of the jack pine tree don’t open and release their seeds until they are heated in a fire. They actually require a fire to reproduce, and the older ones get out of the way! Crown Coral fungus is a member of a group of fungi species which, though not related, are grouped together as coral fungi. The crown coral, or crown-tipped coral, is distinguished by the little crown shaped tips on the end of the fruit bodies. They tend to grow on decaying wood and have a peppery taste that disappears when cooked. A hand-painted sign announced that we had found a tree fort but it’s possible we would have identified it even without the sign. This two story tree fort had been covered with tarps but they have since started to come loose. The steps to climb up into the fort, as well as the height of the rooms suggest that this was not built to be used by children but rather by teenagers. The trail runs along the south side of a small creek until it meets up with the abandoned rail line. The trail follows the railway corridor to the right but it needed to be investigated a short ways to the left. The berm is very obvious even though it has been covered with forest on both sides. The berm rises above the surrounding fields which are also over grown with forest through here. The railway crossed the creek on a short trestle which has been replaced with an improvised foot bridge in the bottom of the creek ravine. Just beyond the creek crossing the berm runs through an open field and is clearly visible in Google Earth shots. After following the railway for a short distance it was time to return to the trail and follow it out to where it intersects with the third line. Along the side of the trail is the most fully realized tree house I have ever seen. It has several rooms some with sitting or sleeping provisions. It can be seen from the rail berm and is featured in the cover photo. It even includes a library, complete with Ghost Rider, a book by Rush drummer Neil Peart. A note welcomes everyone to use the place provided they take care of it. At the third line the abandoned railway ran parallel to the active line and a short distance in from the road lies what appears to be an old railroad sign. The Guelph Radial Trail runs for 33 kilometers and is best enjoyed with two vehicles parked on different sideroads. This allows you to go twice as far because you don’t have to back track like was done here. Artifacts from the Toronto Suburban Railway that have been featured in previous posts include: - The trestle pilings that remain in the mill pond in Limehouse. - The decaying concrete abutments across the tail race for Silverthorne’s Mill in Meadowvale. - The rail berm and tracks in Eldorado Park. Google Maps Link: Acton Like us at http://www.facebook.com/hikingthegta Follow us at http://www.hikingthegta.com
<urn:uuid:02155fa2-ab00-4f8a-beb4-e4e95940f2ac>
CC-MAIN-2023-23
https://hikingthegta.com/tag/crown-coral-fungi/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224643462.13/warc/CC-MAIN-20230528015553-20230528045553-00230.warc.gz
en
0.972835
1,228
2.640625
3
Cognitive Impairment in Migraine Sufferers Cognitive impairment in migraine sufferers is a phenomenon with a good body of evidence to support it. During these painful and annoying attacks, changes occur at the brain level. They cause dysfunctions in attention and concentration. Moreover, thoughts slow down, causing memory failures. These are mild alterations and are almost always temporary. However, it’s common for many migraine sufferers to complain of cognitive deficits. This encourages them to adopt more therapeutic strategies which offer them a better quality of life. Attention and executive function are the two processes most affected during migraines. Cognitive impairment in migraine sufferers As a rule, any feeling of discomfort can be a distraction that impairs cognitive performance. This makes everyday tasks such as studying, concentrating, or solving problems difficult. However, studies such as those published in the journal Dementia y Neuropsychologia highlight that migraine sufferers exhibit slight alterations in the kinds of tasks where various cognitive processes come into play. Often, people who’ve suffered from migraine for years experience memory and attention failures. These are almost always temporary episodes and are linked to the period of time of the attack. However, science is also concerned with determining whether these could have a long-term effect. People with chronic migraine and those who suffer frequent attacks are at higher risk of permanent cognitive decline. Associated causes: electrical disturbances in migraine Cognitive impairment is more common in chronic migraine sufferers. Analyses such as those conducted by the Institute of Experimental Neurology, Milan (Italy) highlight that this condition exhibits functional and structural alterations in various cortical and subcortical areas of the brain. In addition, electrical dysfunctions often appear such as cortical spreading depression (CSD). This causes great sensitivity to external stimuli and problems focusing attention. The abnormal electrical activity parallel to the migraine makes it difficult for the cerebral cortex to carry out tasks such as concentration and decision-making, among others. You might also like to read Menstrual Migraine: An All Too Frequent and Silent Reality What cognitive functions are affected? The cognitive processes that are most affected during a migraine attack are attention and executive function. These are extremely critical areas for daily performance. As a rule, a migraine attack will affect the following processes: - Drawing up plans. - Verbal memory. - Taking decisions. - Analyzing information. - Emotional regulation. - Self-control processes. An investigation conducted by the University of Lisbon (Portugal) claims that when patients experience a migraine attack without aura, these cognitive alterations are reversible. The problem arises in sufferers of chronic migraines with auras. Cognitive impairment: reversible or permanent? Data suggests that the majority of people show temporary and reversible dysfunctions. However, chronic migraine sufferers who experience frequent attacks have a greater risk of suffering long-term disorders. A 2022 study published in The Journal of Headache and Pain claims there’s a significant association between migraine, cognitive impairment, and the risk of developing some type of dementia in the future. This is the first meta-analysis to demonstrate such data. Therefore, more work would be required to claim solid evidence of such a claim. These kinds of explorations stress the need for neurology departments to pay more attention to the cognitive processes of migraine sufferers in order to prevent possible deterioration over the years. You might be interested to read The Brains of Migraine Sufferers Work Differently What can be done to prevent cognitive alterations in migraines? Migraine is an extremely complex clinical reality with many needs. The main objective isn’t only to reduce pain but to preserve brain health and the correct functionality of its processes. Therefore, it’s important that new therapeutic and approach mechanisms be developed. However, cognitive impairment in chronic migraine sufferers and frequent attacks are more worrisome. In these cases, adequate psychological and neurological evaluations are recommended to detect any possible permanent deterioration. It’s necessary to ascertain if these failures happen only during migraine attacks or if they occur on a daily basis. Advice for frequent migraine sufferers - Find the best drug treatment to reduce the pain. - Introduce psychological therapies that improve the quality of life. Include techniques to manage stress, promote relaxation, and manage emotions. - Cognitive stimulation programs - Consider other comorbid conditions. For instance, often, a depressive disorder can affect the sufferer’s cognitive performance. - Taking care of diet. Foods that are rich in amines often trigger migraines. In fact, a study published by the Spanish Journal of Community Nutrition explains that biogenic amines can have a vasodilator effect that leads to discomfort. As a rule, experiencing these events only during attacks is completely normal and doesn’t have long-term effects. If you’re a migraine sufferer and experience memory lapses and/or attention problems long after a migraine, consult your doctor.It might interest you... All cited sources were thoroughly reviewed by our team to ensure their quality, reliability, currency, and validity. The bibliography of this article was considered reliable and of academic or scientific accuracy. - de Araújo, C. M., Barbosa, I. G., Lemos, S. M. A., Domingues, R. B., & Teixeira, A. L. (2012). Cognitive impairment in migraine: A systematic review. Dementia & neuropsychologia, 6(2), 74–79. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5619244/ - Filippi, M., & Messina, R. (2020). The Chronic Migraine Brain: What Have We Learned From Neuroimaging? Frontiers in neurology, 10, 1356. https://pubmed.ncbi.nlm.nih.gov/31998217/ - Gil-Gouveia, R., Oliveira, A. G., & Martins, I. P. (2015). Cognitive dysfunction during migraine attacks: a study on migraine without aura. Cephalalgia: an international journal of headache, 35(8), 662–674. https://pubmed.ncbi.nlm.nih.gov/25324500/ - Gu, L., Wang, Y., & Shu, H. (2022). Association between migraine and cognitive impairment. The journal of headache and pain, 23(1), 88. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9317452/ - Navarro, E., Castan Cuella, E., Gasco Dalmau, L., & Santafé Martínez, M. (2019). Recomendaciones dietéticas actualizadas en la prevención de la migraña. Revisión. Revista Española de Nutrición Comunitaria, 25(3). https://dialnet.unirioja.es/servlet/articulo?codigo=7137733 - Vuralli, D., Ayata, C., & Bolay, H. (2018). Cognitive dysfunction and migraine. J Headache Pain 19(109). https://thejournalofheadacheandpain.biomedcentral.com/articles/10.1186/s10194-018-0933-4
<urn:uuid:ed56ff68-6155-4fd6-90e1-8d8c504c770b>
CC-MAIN-2023-23
https://exploringyourmind.com/cognitive-impairment-in-migraine-sufferers/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649986.95/warc/CC-MAIN-20230604125132-20230604155132-00030.warc.gz
en
0.874887
1,570
2.84375
3
By Eden Zekarias If you ask most people today where the first human being was found, chances are they can probably tell you Ethiopia. What’s not so widely known is that Ethiopia remains home to the the oldest Christian tradition in the world. The ancient kingdom of Axum (located in modern-day Tigray) began the practice of Christianity as early as 1 AD, preceding Europe by 3+ centuries. Outside of Ethiopia, this knowledge has been buried, due to the global Europeanization of Christianity and the hegemony of Catholicism. Colonization has taken a religion produced by Africa, and disfigured it to colonize and enslave Africans. I will demonstrate this claim as evident using historical record from the continent, and throughout the Americas. First, it is to be understood that European missionaries began coming to Africa in the nineteenth century with more than mere charity. The following quote by South African bishop and humanitarian Desmond Tutu best conveys this truth, “When the missionaries came to Africa, they had the Bible and we had the land. They said ‘Let us pray.’ We closed our eyes. When we opened them, we had the Bible and they had the land”. Meanwhile, in East Africa the Ge’ez Bible was slowly aging as the world’s oldest Bible. Perhaps it should have been screaming, “Go back! We have already one.” Missionaries arrived with supremacist myths of wayward Africans needing both their salvation and civilization. Rather than respecting the people to whom they were visitors (or not–as in the case of settler colonialism), they desecrated existing spiritual relics. Instead, replacing them with a blue-eyed Jesus. On many accounts, missionaries worked alongside poachers and colonizers who murdered Indigenous people, while dismissing them as a voodoo-worshiping and backwards people. Roman Catholic King Leopold II of Belgium is a prime example of white supremacy cloaked in the rhetoric of mission work. From 1885-1908, Leopold’s reign of terror ensured in the Congo, murdering over 15 million Congolese people. This act of genocide is often referred to as the African Holocaust. In his 1883 “Letter to Colonial Missionaries” he writes the following to his readership, “Your principal objective in our mission in the Congo is never to teach the niggers to know God, this they know already. Have courage to admit it; you are not going to teach them what they know already. Your essential role is to facilitate the task of administrators and industrials, which means you will go to interpret the gospel in the way it will be the best to protect your interests in that part of the world. Your knowledge of the gospel will allow you to find texts ordering, and encouraging your followers to love poverty, like “Happier are the poor because they will inherit the heaven” and, “It’s very difficult for the rich to enter the kingdom of God.” It is important to note the specific verses knit-picked by missionaries, as the explicit ends are to make Africans submissive and malleable to European control. On the other side of the world, slave masters were petrified by the mere though of enslaved Africans gaining literacy and obtaining a Bible. They feared the liberating messages of resistance found in Exodus, where Yaweh delivers Moses and the Israelites from slavery. Such fear was warranted, as powerful Africans such as the preacher Nat Turner used these verses to free our people. It was through bloodshed that Africans collectively educated themselves and one another, in spite of laws that made reading punishable by death. Seeing this as inevitable, slave masters panicked and adopted the agenda highlighted by Leopold above. Distorting Bible verses remains a key component in enforcing African inferiority. One of the most commonly utilized verses can be found in Genesis 9:25-27: “Cursed be Canaan! The lowest of slaves will he be to his brothers. He also said, ‘Blessed be the Lord, the God of Shem! May Canaan be the slave of Shem. May God extend the territory of Japheth; may Japeth live in the tents of Shem and may Canaan be his slave’.” Whites claimed the curse of Canaan to be the curse of dark-skin, and therefore a divine justification for slavery. Beating into the psyche that God Himself wants Africans to suffer. Still, such missionary-colonialism is not unique to Africa. Though the origins of Christianity itself are indeed African, we may find this across the so-called “Third-World”. Throughout the 1400s in South America, Hernán Cortés and Spanish conquistadores slaughtering Aztec people under the slogan “For Gold, God, and Glory.” Move up to North America and stumble upon the nineteenth century text “Manifest Destiny”, a declaration justifying the murder of First Nation people. In this document, settlers claim it is God’s will for colonial expansion to take place “from coast-to-coast” by any means necessary. The fact that Europe has perverted a religion it did not even produce is all the more bewildering. Such falsification of Christianity accounts for why many conscious Africans today hold the belief that Christianity is “the white man’s religion.” We must stop giving such credit to Europe, as mass genocide is the sole reason for such myth parading as fact. We must undo this miseducation process, that even in our quest for de-colonizing leaves us hook-winked. This subversive process, that even in Ethiopia (the land of origins) we find images of blue-eyed, blond-haired Jesus holding a significant space. Let us instead look to the walls of monasteries at Bahir Dar. Walls that have been covered with paintings of African Christianity for centuries pre-dating European presence. We must re-claim African history on a global scale, looking onward to Psalms 69:31 “Princes shall come out of Egypt; Ethiopia (Africa) shall soon stretch out her hands unto God.” Ed.’s Note: The writer is on an internship at The Reporter.
<urn:uuid:8965261b-079e-4981-b388-8a207d959134>
CC-MAIN-2023-23
https://www.thereporterethiopia.com/5163/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224654606.93/warc/CC-MAIN-20230608071820-20230608101820-00430.warc.gz
en
0.95747
1,298
2.921875
3
Did you know that chronic inflammation has been found to be a precursor to almost every chronic disease and chronic disease? And that it affects 133 million Americans? Right now, that may look like slow and steady weight gain, sleep disturbances, joint pain, migraines, brain fog, and fatigue, and over time these symptoms will get worse.And you may not even realize that the food you’re putting in your body is causing acute inflammation now that can lead to serious problems later. The problem is that a lot of people don’t even realize that they have signs of chronic inflammation or if they do, they don’t know what the long term effects are or what they can do to fix it now. Today, we’re going to talk about the signs of inflammation and what you should be doing about it to help prevent some serious chronic conditions and to just help you feel better on a daily basis because if you’re bloated and tired all of the time you’re not going to feel your best. What is inflammation? It isn’t necessarily a bad thing. Inflammation is how your body tries to protect itself. It’s your body’s way of protecting itself. Think back on the last time you stubbed your toe or got a tiny paper cut. Your skin puffs up and it turns pink. What you’re seeing is fluid rushing to that location to try to heal the tissue. Or Have you ever tried a new workout and then the next day everything is sore and hurts? You have muscles you didn’t even realize you had. You probably noticed that your body felt kind of tight, swollen, achy, and sore. Well, that is inflammation. It’s a good thing. It’s healing your tissues. Bodily inflammation is weight in fluids that you may have been carrying around for years simply because you’re eating foods that are inflammatory for YOU. Basically anything that stresses your body out is a cue for your body to protect itself. It’s our first line of defense. I mean, we’re pretty good at taking care of ourselves. When your body gets the message that it needs to heal, it sends inflammation to that area. Now, there’s two different types of inflammation. You’re going to know these. The first one is what we call acute inflammation. If you’ve ever rolled your ankle, stubbed your toe, or got a sliver in your finger, the inflammation comes on suddenly. The second type of inflammation is what we call chronic inflammation. Chronic inflammation builds up over time slowly, over days, weeks, months, decades. We often don’t even notice it. It’s also the root cause of so many diseases. Chronic inflammation is what happens when we’re repeatedly exposed to something that our body sees as foreign, even though we might not see it as foreign. In other words, you can go into the grocery store and see a bag of chips that looks familiar to you, but it’s filled with chemicals and fake ingredients. Even though you can eat it and you’re not going to get sick, your body still, because of evolution, sees it as a foreign object, the result of which, consuming fake foods for years and years, is the buildup of chronic inflammation. Chronic inflammation is the cause of almost all disease. Chronic inflammation can cause diseases such as: rheumatoid arthritis, lupus, ulcerative colitis, Crohn’s disease, IBS, heart disease, and so many more. Just about any disease of the brain or the immune system can be directly linked back to chronic inflammation. Then, it’s really easy to pack on the pounds even when you’re like, “I don’t get it. I’m exercising like crazy. I’m eating the right foods and I’m counting calories.” Inflammation can also be caused by an infection or a food sensitivity, even a food sensitivity to something that should be healthy. So what types of food cause inflammation? Some are obvious like high fructose corn syrup and processed crap, like artificial trans fats, vegetable and seed oils, refined carbohydrates and processed meat. But some aren’t as obvious like seasoning mixes, agave and peanuts. Plus, you will notice that some foods aren’t on a list, but they seem to affect you and that’s because food affects people differently. That’s why it’s so important to make notes about how you feel after eating so that you can cut out the food that is causing inflammation for you and start eliminating that food from your diet. Now let me clear, does this mean that you can never have a cupcake or ice cream again? Definitely not, because that’s not realistic, but it’s going to make you much more aware. It’s going to make you stop and think about if it’s really worth it and the goal is to limit it to special occasions or when you’re truly craving it not as a dessert every night. So, first thing you need to do to eliminate inflammation is keep a food diary for a few days, write down everything you eat and how you feel afterwards. Second, start adding more anti-inflammatory food like berries (strawberries, blueberries, etc.), fatty fish like salmon. Avocado and broccoli are great superfoods that have tons of other benefits too! Also, drink green tea or add turmeric to your meals to help with inflammation. Keep a food diary for the next 3 days. Write down everything that you eat and how you feel afterwards and then let us know what you learned. Let us know what foods leave you feeling bloated or tired or in a brain fog so that you can cut them out of your diet and prevent inflammation! Join me for my FREE 7 Day Wellness Challenge
<urn:uuid:1d827f66-e023-4762-9067-55f4a5f5b073>
CC-MAIN-2023-23
https://facesoftbi.com/tag/disease/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647614.56/warc/CC-MAIN-20230601042457-20230601072457-00230.warc.gz
en
0.941665
1,294
2.546875
3
AI Boosts Cancer Screens to Nearly 100 Percent Accuracy Diagnosing cancer is about to get more accurate, with the help of artificial intelligence. Pathologists have diagnosed diseases in more or less the same way for the past 100 years, by laboring over a microscope reviewing biopsy samples on little glass slides. Working almost robotically, they sift through millions of normal cells to identify just a few diseased ones. The task is tedious and prone to human error. But now, scientists and engineers have created a technique that uses artificial intelligence (AI) and can differentiate cancer cells from normal cells almost as well as a top-notch pathologist. A Harvard-based team demonstrated the AI method as part of a competition at the 2016 International Symposium of Biomedical Imaging in Prague, showing how it could pinpoint, with 92 percent accuracy,cancer cells among samples of breast tissue cells. That accuracy was far better than the other AI methods in the competition, landing the team first place. Humans + AI Humans still have the edge: Pathologists beat the robots in this competition with their ability to identify 96 percent of the biopsy samples with cancer cells. [Super-Intelligent Machines: 7 Robotic Futures] But the real surprise came when pathologists were teamed up with the Harvard team's AI. Together, the artificial intelligence and good, ole human intelligence identified 99.5 percent of the cancerous biopsies. While the thought of trusting Dr. Robot with your medical analysis may seem a bit scary, some scientists see great promise in AI-assisted doctor services. "Our guiding hypothesis is that 'AI plus pathologist' will be superior to pathologist alone," said Dr. Andrew Beck, of Beth Israel Deaconess Medical Center and Harvard Medical School in Boston, who led the creation of the winning AI design. "If we and the larger research community are able to demonstrate that the use of AI tools significantly reduces diagnostic errors, I believe patients, physicians, health care payers and health systems will be supportive of the addition of AI tools in the clinical workflow," he told Live Science. Why breast cancer cells? The contest, held in April, invited AI designs from around the world created by private companies and academic research organizations. The goal was to spur interest in creating more accurate AI methods of disease diagnosis. "The fact that computers [in the April competition] had almost comparable performance to humans is way beyond what I had anticipated," said Jeroen van der Laak of Radboud University Medical Center in the Netherlands, who organized the contest. "It is a clear indication that artificial intelligence is going to shape the way we deal with histopathological images in years to come." [Infographic: The History of Artificial Intelligence (AI)] The contest organizers chose the topic of breast cancer detection — more specifically, metastatic cancer cells in sentinel lymph node biopsies — as a real-world test of an important public health issue. Among U.S. women, breast cancer is the second most common type of cancer (after skin cancer) and the second deadliest type of cancer (after lung cancer), according to the Centers for Disease Control and Prevention. A sentinel lymph node biopsy is a surgical procedure in which a sample of tissue is removed from a sentinel node, the first in a group of lymph nodes, or glands, where cancer cells might spread after leaving the original site. A multicenter study published in 2003 in the Journal of the American College of Surgeons found that these biopsies, using traditional human analysis, were 96-percent accurate, with a false-negative rate of 8 percent. Because cancer surgeons rely on the biopsies to decide what tissue to remove or leave in place, often at the very moment a cancer is beginning to spread, accuracy in the biopsy analysis is crucial. Machines that learn Beck's group used a process called "deep learning" to essentially teach a computer to better recognize what cancer cells look like. This process is a machine-learning algorithm used in applications such as speech recognition; it makes the system more and more accurate with each use. In preparation for the contest, Beck's group fed the computer thousands of images of cancer cells. The team identified examples for which the computer was prone to make a mistake in cancer identification and retrained the computer using greater numbers of more difficult examples. The development of such automated diagnostics has been a goal for the AI field for the past 30 years, as computers became more commonplace in labs, Beck said. But only recently has the field seen the improvements in scanning, storage, computational power and algorithms necessary to make this possible. Don't worry, pathologists won't be fading away. Beck said the field will evolve to adopt new skill sets. For example, pitfalls to avoid with AI include a system that routinely misses a particular rare form of cancer the AI hasn't seen before or that is routinely thrown off by an artifact in the biopsy image, he said. Humans will be needed to continuously teach the robots. Beck's team includes postdocs in his Harvard lab, Dayong Wang and Humayun Irshad, along with Harvard graduate student Rishab Gargya and MIT researcher Aditya Khosla. A technical report describing this work was posted yesterday (June 20) on the open-access e-print archive arXiv.org. Follow Christopher Wanjek @wanjek for daily tweets on health and science with a humorous edge. Wanjek is the author of "Food at Work" and "Bad Medicine." His column, Bad Medicine, appears regularly on Live Science. Live Science newsletter Stay up to date on the latest science news by signing up for our Essentials newsletter. Christopher Wanjek is a Live Science contributor and a health and science writer. He is the author of three science books: Spacefarers (2020), Food at Work (2005) and Bad Medicine (2003). His "Food at Work" book and project, concerning workers' health, safety and productivity, was commissioned by the U.N.'s International Labor Organization. For Live Science, Christopher covers public health, nutrition and biology, and he has written extensively for The Washington Post and Sky & Telescope among others, as well as for the NASA Goddard Space Flight Center, where he was a senior writer. Christopher holds a Master of Health degree from Harvard School of Public Health and a degree in journalism from Temple University. By Robert Lea By Sascha Pare By Ben Turner
<urn:uuid:df27cc40-f180-45fe-ada0-959d235f255e>
CC-MAIN-2023-23
https://www.livescience.com/55145-ai-boosts-cancer-screen-accuracy.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646181.29/warc/CC-MAIN-20230530230622-20230531020622-00430.warc.gz
en
0.951352
1,342
3.40625
3
What Are “Moments of Truth”? “The moment when a customer/user interacts with a brand, product or service to form or change an impression about that particular brand, product or service.” - Jan Carlzon, CEO SAS This is the first known definition of Moment of Truth (MoT) from the CEO of SAS, back in 1987. In 2005, Procter & Gamble defines two specific moments: the First Moment of Truth (FMOT) and the Second Moment of Truth (SMOT). They added the Third Moment of Truth (TMOT) in 2006. Google updated the concept with the Zero Moment of Truth (ZMOT) in 2011. Let's dive into these concepts. - Zero Moment of Truth (ZMOT). It's that moment when you grab your laptop, mobile phone, or any other device and start learning about a product or service, prior to buying. - First Moment of Truth (FMOT). This is when you are first confronted with a product or service, either offline or online. Procter & Gamble describes this as the decision-making moment: when a consumer chooses a product over the competitor's offerings. - Second Moment of Truth (SMOT). This moment is your experience with the product or service. After purchasing, but also every time you're using it or interacting with the service. - Third Moment of Truth (TMOT). During this moment, you will share your experiences via word-of-mouth, in a review, or on social media. This can be positive, negative, or neutral consumer feedback towards a brand, product, or service. This is based on a rather linear customer journey. Today, we know that not one customer's journey is the same. And journeys are often not linear. Google researched customer journeys (and related models) thoroughly and shows most decisions are made in 'the messy middle' of a journey. Source: Think with Google The Messy Middle The authors of Google's 'Decoding Decisions: Making sense of the messy middle' explain the model with four E's: Exposure, Exploration, Evaluation, and Experience. Exposure is the total sum of everything you've heard of seen about brands and products in a category. From your friends via word-of-mouth, a LinkedIn ad, a news article, a TikTok video, an out-of-home ad, or anything else. It's not just advertising, but your entire awareness. Crucially, exposure is not a phase, nor a singular touchpoint: it's always-on, and present throughout the decision-making process. Exploration and Evaluation. The model includes an infinite loop, visualizing how consumers are more informed and autonomous. They're looping between exploring and evaluating available options while processing information before they're ready to purchase. Time is not set: some will move fast between exploration and evaluation, some will skip it completely, and some will take their time for lengthy research. Experience. Not in the messy middle, but important to mention. This is the experience the customer has with the purchased product or service and the brand, feeding their exposure. Customers will share their experiences with others, both offline and online. No More "Moments of Truth"? If you now think: well, we can forget about the "moments of truth". Think again. "Moments of truth" matter more than ever. Especially since anything can impact 'Exposure'. If we look back at the initial definition of Jan Carlzon in 1987, it's still relevant. Every interaction can impact their thoughts of a brand, product, or service. And nowadays, customers are more in touch with financial services than ever before. However, "moments of truth" can be different for customers than they are for companies. Every interaction counts, but in some cases, it's really a make-or-break moment. Let's see what their "moments of truth" are. Be There When It Matters Most Finance comes with emotion. Any change in your financial situation, whether good or bad, will trigger some emotion. Think of it: when do you contact your financial advisor or company? Only when you really need support. These critical moments can be life-changing events, such as a new home. However, it can also be a car crash or something small like losing your credit card. Completely different events, but they all matter. Especially at that moment. If the support is not as expected, customers might consider leaving this company. Let's look at it from an insurer's perspective. What can you do to help your customers best? Be there when it matters most! Help them with empathy. We'll take three situations to see what you can do. - Car Accident. Your customer is still at the place of the accident and is calling you - his insurer. You can imagine he is experiencing a lot of stress. It's important he can speak directly to a human agent, who can help him. Make sure you have an emergency number available with human, empathic support. - Moving. Your customer is buying a new house. They need to act quickly and want to get updates on the status of their new insurance. Help them with automated updates. - Pregnancy. A new family member is oftentimes a happy moment. Changes in their insurance can be made via a virtual assistant. However, it is important to help them in an empathic way. Make sure to teach your Conversational AI how to respond to emotional situations, and implement a handover to a human agent. In any situation, it's important to offer your customers the best possible experience. Find out what the "moments of truth" are for your customers, to assist them in the best possible way.
<urn:uuid:9e753937-1a29-4533-bbda-384ac75c5d23>
CC-MAIN-2023-23
https://www.cm.com/blog/moments-of-truth/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649986.95/warc/CC-MAIN-20230604125132-20230604155132-00030.warc.gz
en
0.943767
1,189
2.71875
3
Orion is proud to partner with BBC Sky at Night Magazine, the UK's biggest selling astronomy periodical, to bring you this article as part of an ongoing series to provide valuable content to our customers. Check back each month for exciting articles from renowned amateur astronomers, practical observing tutorials, and much more! These tiny accessories can make a huge difference to what you can see If there is one seriously neglected and underused tool in your astronomical toolbox, then it surely has to be the filter. These often-colorful discs are available in 1.25-inch or 2-inch sizes and screw into the barrel of an eyepiece, the end that attaches to a telescope. The point of filters is that they alter how astronomical targets appear. They work by stopping — filtering out — some wavelengths of light from passing through your telescope's tube, changing what you see through the eyepiece. This flies in the face of conventional astronomical wisdom that every photon counts, that more light means better views. But this is precisely the point of filters: they remove the light you don't need and only deliver the wavelengths you want for a given situation. It's for this reason that there are so many filters out there. Some are colored, some are clear, but each has a slightly different effect and is designed with a different purpose in mind. Sometimes the effects can be remarkable: there are, for instance, filters that can enhance the polar caps of Mars and reveal the subtle shadings of clouds on the otherwise bland disc of Venus. It has to be said, though, that filters can't perform feats of magic. There is still no filter in existence that acts as a cure-all for poor seeing or poor sky transparency. Where to Begin Most astronomers, whether budding or experienced, are aware of color filters, which are used for planetary work to tease out hidden details like the ones already described. But there are many more types, and they can cut down on lunar glare, help to reduce the insipid orange glow of streetlighting and even block out all light bar one specific wavelength, which can work wonders if you are keen on examining the denizens of the deep sky. We cover all of these in a bit more detail below. Some filters can even be used together for an enhanced effect, but bear in mind that stacking them in this manner will further dim the view. If, once you have read up on all the different types, you decide filters might be of use to you, where should you begin? Many suggest a neutral density filter — otherwise known as the Moon filter. This one simply dims the view, and as such it is great for observing our close companion when it is in its dazzling fuller phases. As always, if you can try before you buy, then do so — astronomical society events and the larger star parties around the country are both good opportunities to get some hands-on insight into the kinds of changes filters can deliver. Once you're committed to making a purchase, be aware that you don't always have to buy filters individually: colored filters in particular are often sold in sets. If you get to the point that you are using a lot of filters, you may wish to consider another accessory, the filter wheel. Some are motorized, some are manually operated, but the basic premise is the same — they allow you to swap filters without having to remove your eyepiece each time. Do be aware that all of the filters discussed here are intended for night-time use only. Under no circumstances should they be used to view the Sun, as they will do nothing to mitigate the dangerous intensity of its light. But, just as with any other object in the sky, the Sun's appearance changes once viewed through different filters. Never view the Sun without a solar filter in place. Color filters are designed for planetary work. They are often referred to by their Wratten number, written in the style '#1'. This is based on the original Eastman Kodak filter range, which had 100 shades, although for most astronomical purposes only a few are required. Among the most useful are: - #8 (Yellow) — For cloud bands on Jupiter and Saturn - #25 (Red) — For picking out surface detail on Mars and cloud details on Venus - #47 Violet — Useful for Venus and enhances the Schröter effect - #58 (Green) — For improving red features such as Jupiter's Great Red Spot - #80A (Blue) — For Martian dust storms and clouds, and the belts of Jupiter Like narrowband filters, ultra-high contrast filters improve contrast, making the background sky darker and helping deep-sky targets to stand out better. They pass both hydrogen-beta and oxygen III light, so will improve your view of a wider range of nebulae than any single narrowband filter. Light Pollution Reduction These are designed to suppress the specific wavelengths giving the orange glow from sodium streetlights, with the result that they darken the background sky. This can help you see deep-sky objects better, particularly nebulae and galaxies, as they are more easily washed out than the planets are. As the name suggests, narrowband filters cut all but a few select wavelengths of light — typically the ones emitted by bright emission and planetary nebulae. By blocking the rest, they help to improve contrast and so bring out subtle detail. Typical narrowband filters include hydrogen-beta and oxygen III. Both of these filter types reduce the glare of bright targets — the Moon, Venus, Mars, Saturn and Jupiter. Neutral density filters reduce the intensity of all wavelengths, but are particularly favoured for lunar use. Polarizing filters can often be tuned to control the amount of dimming they deliver. These filters can help you to combat the chromatic effects often seen through achromatic refractors, which most commonly take the form of noticeable blue or violet halos around bright stars. Hence these filters are also sometimes referred to as 'minus violet' filters. They can be used on any target. Copyright © Immediate Media. All rights reserved. No part of this article may be reproduced or transmitted in any form or by any means, electronic or mechanical without permission from the publisher.
<urn:uuid:aafc1c56-e59c-407f-aa78-4845e5f434b6>
CC-MAIN-2023-23
https://www.telescope.com/Back-Garden-Astronomy-Understanding-Filters/p/116493.uts
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653764.55/warc/CC-MAIN-20230607111017-20230607141017-00230.warc.gz
en
0.941246
1,304
2.921875
3
Throughout the Great Depression the United States went through tremendous change. When there is a time of great change, there are always people who oppose it, whether the change is good or bad. The issue of this report is not to discuss if the changes in America throughout the depression were positive or negative, but to discuss the people who opposed it; primarily focusing on Huey Long and Charles Coughlin, or Father Coughlin, and their reasoning and methods of protest. Huey Long and Father Coughlin were extremely influential politicians who opposed the creeping new society of Big Business and high technology. They blamed certain companies and they’re owners (Carnegie, Rockefeller, Pullman, ect.) of Big Business for the financial distraught of America, and were very successful in conveying their argument. However, they were not so successful in achieving their goal in the destruction of this new technological society, for the simple reason that they were too late. The society of America and the world had already turned towards this economic change. To understand the views of Long and Coughlin you must understand the people that they are. Huey Long was a fiery young man from the start. At the age of twenty he made the prophecy that he would run for election “first to secondary stated office in Louisiana, then for governor, then for United States Senator, and finally for president” (page 8). He had the combination of ruthless ambition, along with compassion of the downtrodden. Throughout his life he completed all of his predictions, except for the most prestigious: the presidency. Many believe the only reason he did not succeed in becoming president is because he was assassinated before he got the chance. He was known to many as “the Kingfish,” referring to his near dictatorship on Louisiana. He constantly went off into filibusters during congressional meetings, whether it be to pursuade against or in favor of a new bill. He killed many bills in this way, many being essentially “dangerous” to the common people. He lived a very flamboyant lifestyle, constantly headlining in the newspaper in one way or another. Even after all the graft and controversy in the Louisiana political system was finally proven after his death, people of Lousianna generally still supported him. His impromptu speeches and campaigning were very appealing to his audiences, as mobs of twenty thousand people clustered to hear him. Longs beliefs that Big Business was corrupting the society were the main platform throughout his political life. At times he was known to filibuster for twelve hours on the injustices that “Mr. Morgan and Mr. Rockefeller” spread on the society. His speaking abilities and his use of radio made him known all over the nation. And finally, he was, if anything, very hard to ignore. Coughlin, although fundamentally different than Long, used many of the same tactics and ideas as Long. Coughlin was born into a Catholic family in Canada. He virtually had no choice but to become a priest. He went to many very accomplished Catholic schools. He finished top in his class in college, and he taught at the college of Assumption for seven years. These years were rewarding, and he first got involved in society at this time. He soon decided to go the distance and become a parish priest. He made a life time friendship with Bishop Gallagher, who first realized Coughlin’s rare skills. Father Coughlin was given his own parish in a tiny village of North Branch, Michigan. This church is the sight of Coughlins ingenious idea to use radio as a unit of advertising. His first goal in the use of radio was to get people to attend his church, but he soon realized what a gold mine he had run into. As little as two years later the “Radio Priest” had as many as six million people listening to his Sunday sermons at a given time. His charismatic speeches, carefully drawn up each week, caught the United States on fire. Coughlin also started using his newly found power to express some of his political views. He spread his influential opinion on the danger of Big Business and was known to tell tales of “the Carnegies and the Rockefellers.” He denounced “greed, corruption, and the concentration of wealth in the hands of few” (page 96). He also made reference to the plight of farmers, and sometimes even the League of Nations for its international ties. Coughlin had an absolutely huge audience, and he used it to spread upon his ideals for the nation. All of Huey Long and Father Coughlins ideals stemmed from the then ancient Jeffersonian and Jacksonian times. They, along with Jefferson and Jackson, believed in the common man. They felt that power should be distributed among the masses and not amongst a few select men. They believed a “Nobel Yeoman” or a “Horatio Alger” existed in everybody. They often argued that “no citizen should be allowed to accumulate so much wealth that his ownership of it became injurious to the rest of the community;” (page 145-145). Alan Brinkley so brilliantly states when referring to the Big Businesses as “Large, faceless institutions; wealthy, insulated men; power and controlling wealth that more properly belonged in the hands of ordinary citizens.” Long and Coughlin hailed all these ideals to the public, and like Long and Coughlin the public believed the solution lay in the businesses themselves. But, what most people either failed to understand or failed to admit is that the real problem lay even deeper in the society. The real problem, which obviously does not exclude Big Business, lay deep in the roots of the economic system, and could not be so easily fixed. The Big Businesses and their technology were already a part of American society, and that could not be changed. Coughlin and Long were too late for the issue, although they so brilliantly stated their case. Long and Coughlin played a huge role in the protest movements during the Depression. Although being somewhat unsuccessful in their overall goal, they did complete many beneficial things. They brought rise to the monopolies during the Depression. They revolutionized the radio. They provided “an affirmation of threatened values and institutions, and a vision of a properly structured society in which those values and institutions could thrive” (page 143). Long and Coughlin were “creations of the moment”, which rested on “some of the oldest and deepest impulses in American political life” (page 144). They gave immediate hope to their followers that the depression could be ended soon. They represented the peoples hopes and dreams, and although both men’s’ dreams ended tragic, they earned their respective place in history. Brinkley, Alan. Voices of Protest. First Vintage Books Series. Random House Inc., New
<urn:uuid:1fd978ab-d158-47ce-b600-57f573fba9b1>
CC-MAIN-2023-23
https://graduateway.com/the-political-carreers-of-huey-long-and-father-coughlin/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653183.5/warc/CC-MAIN-20230606214755-20230607004755-00430.warc.gz
en
0.986685
1,422
3.21875
3
While bedding, for rabbits is not a strict necessity, it has a lot to offer as far as comfort and hygiene. This means that, when it comes to the question, ‘do rabbits need bedding?’ the answer is basically ‘yes’. Do rabbits need bedding? In the wild, rabbits live in dens, also known as There are several materials people have used as bedding mistakenly (one of the worst being cat litter). ‘Do rabbits need bedding?’ yes, and the bedding should be made out of straw, ideally. Do Rabbits Need Bedding? Straw Instead Of Hay Or The Like Straw bedding has a lot to offer; it is affordable, provides comfort for rabbits, and it can help keep messes and odor in the cage in check. Rabbits will root around in the straw. They may sometimes give the bedding a nibble. This is one reason non-toxic bedding, such as straw, is so important. A bunny should not eat too much of their bedding, but a piece here and there is inevitable, really. Some opt to use hay as bedding for their bunny. However, one of the primary staples of their diet is hay. This will encourage your rabbit to eat their bedding to excess. Even if the straw is non-toxic, it will doubtlessly absorb urine and the like. Your rabbit ingesting this is clearly not healthy. Straw is dust-free. Make sure that it is fresh, free of mold and of good quality. Litter-Train Your Rabbit to Make Cleaning the Cage Easy If your rabbits are properly litter-trained, you will not have to replace the straw too frequently. It must still be replaced regularly, perhaps one to two times weekly, depending on the individual bunny. You can clean moderately dirty straw out of a rabbit cage pretty easily, with the use of a brush or similar. Dirtier straw may take a little more work. Litter-training your rabbit with a litter-pan will go a long way to keeping the cage tidy. This can be accomplished by starting your rabbit out in a small space. They will have to confront the pan and will be encouraged in its use. As they develop the habit of using the litter pan, you may expand their area accordingly. Repeat as necessary. Some Litter Alternatives to Straw to the Keep Cage Tidy ‘Do rabbits need bedding?’ is a good question. What should also be considered is litter for your bunny. This is key to maintaining clean bedding for your bunny. Following are a few litter options, all alternatives to straw. Never use the same material for bedding and litter; this will only confuse your bunny. Strictly speaking, straw is for bedding and rabbits won’t eat White Computer Paper and Brown Paper Bag Litter for Your Bunny You can use white computer or printer paper and brown paper bags from around the home to make a decent litter for your bunny. Do not substitute anything with ink, such as printed white paper, or newspapers especially. These kinds of paper can be turned into litter with a paper shredder, or by hand, fairly simply. Paper litter like this is springy, and absorbent of both liquids and odors alike. Paper litter is also different enough than staw, so your rabbit will not get their paper litter and straw bedding mixed up, ideally. Wood Pellets and Shavings Can be a Good Rabbit Litter Choice As rabbit litter, wood shavings can be a sound choice. However, some woods are toxic when they come in contact with urine. They may also be dusty. As attributes for a litter, these are not ideal, clearly. Some of the worst woods to use for bedding or litter are cedar and pine. They will release harmful fumes for your bunny. Instead, aspen wood shavings are ideal. They are toxin-free, relatively free of dust, and affordable. They are also effective at eliminating odors and smells. Unlike some other wood varieties, aspen wood is also free of splinters and other risks. Of course, the aspen shavings must be obtained from a reliable source. A lumber yard may have aspen wood of okay quality, but it will not be sanitized for mites, bugs, etc. These are not things you will want to introduce to your bunny. Moderately-priced aspen shavings from your local pet store will do nicely. Paper Pellets Make a Fine Litter for a Bunny These are natural, non-toxic and highly absorbent as a litter for a bunny. They are affordable and reasonably comfortable. The only downside is they do not control odor as well as some other options. It is all a matter of personal preference, so feel free to let your rabbits give a couple of litter types a try, separately. You can see what works best odor and cleanliness-wise for you and your bunny. Do Rabbits Need Bedding? Keep Bedding Litter and Food Separately Once your rabbit is all set up with bedding made from straw, you will need to place the litter and food separately. A raised food trough will help keep your bunny from mixing the straw bedding up with the hay. The hay should be kept in its own space where your bunny can eat at their leisure. Conveniently, a cat litter pan can be used for a bunny. Place this in the corner of the cage, far from the food and without too much surrounding straw. You will not need to fill this too deeply, as rabbits do not bury their droppings as cats do. The entire contents will be discarded each time you empty the box. Corner litter boxes are popular but actually too small for even a single bunny. Avoid these. As mentioned above, to help keep the cage sanitary, the litter should be changed out once to twice weekly. It is true that litter and food should be separate. This in mind, rabbits should still have access to their food before and after using the litter box. Rabbits have the habit of eating before or after using their litter box. This is considered healthy. Hay can be nearby if it is raised up properly. This will allow your bunny access, while still marking the boundary. Our Top 5 Bedding Picks…. Conclusion: Do Rabbits Need Bedding? So, when it comes to the question, ‘do rabbits need bedding?’ the answer is straw. It is a superior choice. Other ‘bedding’ materials, such as paper, paper mulch, pellets, etc. for other rodents, work far better as litter for a bunny. The combination of quality straw bedding and an appropriate litter material are a powerful duo for keeping the cage cozy, fresh and tidy for you and your bunny.
<urn:uuid:d08dc713-bc98-4dd5-a6f4-6cdaaaca4951>
CC-MAIN-2023-23
https://hutchandcage.com/do-rabbits-need-bedding/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644907.31/warc/CC-MAIN-20230529173312-20230529203312-00630.warc.gz
en
0.951228
1,429
2.578125
3
Tribal communities in 10 Indian states consume 303 insect species The idea of actually eating insects may sound disgusting, yet, edible insects, which have been a part of several traditional communities the world over, are now in the limelight for their ability to curb greenhouse gas (GHG) emissions. The United Nations (UN), in its special report on climate change and land, released in August 2019, said insects are an environment-friendly substitute to meat. At the same time, the Food and Agriculture Organization (FAO) said insects will play a significant role in providing food security for the ever-increasing population that is slated to reach 9 billion in the next three decades. “Insects are part of the food choice of about 2 billion people. They are also part of the natural feed of chickens, fish and pigs,” says Paul Vantomme, a senior FAO offcial and one of the authors of the 2013 FAO report “Edible insects: Future prospects for food and feed security”. Over 1,900 different insect species are eaten world over. In India, as many as 303 insect species are consumed by tribal communities in 10 states. Khajuri poka or date palm worm is a delicacy in Odisha’s Rayagada district, inhabited by Khond and Sora tribes. “Around March every year, we harvest the larvae of this mouth-watering insect, which is found in the roots of the date tree,” said Santosh Kumar Negi, a Rayagada resident. He added that they sauté the larvae and eat it with rice. The community also consumes red ant eggs called kaionda, which is mixed with ragi powder and eaten along with rice. In Nagaland, woodworm, locally called lipa, is harvested from oak trees. “We collect them when we go to our jhum fields,” says Seno Tsushah, a resident of Chizami village in Nagaland’s Phek district. EDIBLE INSECT is being promoted for three major reasons: environmental benefits, nutritional value and livelihood opportunities. Edible insects have a high feed conversion efficiency (the quantity of feed required to increase the weight of a livestock by a kg) because they are cold-blooded. On an average, insects can convert 2 kg of feed into 1 kg of insect mass, whereas cattle require 8 kg of feed for 1 kg of body weight gain, according to FAO. Insect farming is also resource efficient. “A gramme (g) of beef protein requires about 14 times more land and five times as much water to produce compared with a gramme of mealworm protein,” stated the UN report. The production of GHGs by most insects is lower than that of conventional livestock. For example, pigs produce 10 to 100 times more GHG per kg of weight than mealworms. The nutrition obtained from insect and beef is also comparable — cricket contains 205 g of protein and 68 g of fat per kg, while ground beef contains about 256 g of protein and a worrying 187 g of fat per kg. Crickets are also rich in calcium, termites in iron, and the silkworm moth larvae can provide daily copper and riboflavin requirements. Some studies also claim that bees boost the libido. “Most insects possess significant levels of unsaturated fats and omega 3 fats, which are in less quantity in plant-based foods. Also, plants that have been genetically engineered for high-volum production will always be more vulnerable to attacks making them less reliable than insects, which are not susceptible to such threats,” said David Gracer, president of Small Stock Food Strategies, a US-based company that raises funds and develops infrastructure around entomophagy. He added that insect gathering and rearing can offer important livelihood to the poor. “Urban agriculture is a wonderfully efficient method of producing insect protein, and industrial-scale insect farming in cities is a very feasible concept, whereas plant crop production in cities is difficult,” he said. Commercial exploitation of edible insects is on the rise. “More and more start-ups are engaging in the industry. Some of them are attracting large sums of money, which shows that investors are becoming aware of the business opportunities,” said A van Huis, professor of tropical entomology at Wageningen University in the Netherlands, and author of a 2019 paper titled Insects as food and feed, a new emerging agricultural sector: a review. Financial consultancy firm Global Market Insights says the edible insect market was worth US $33 million in 2015 and would grow at a compound annual growth rate 40 per cent. As per the Persistence Market Research, by 2024, the market will be worth over US $700 million. Edible insects offer a lot of potential in countries like India, which are already farming bees, silk moth larvae and lacquer-scale insects. “The opportunity lies in farming insects on vegetable and fruit waste to produce insect powder,” says Vantomme. The challenge, however, is to change the perspective of the people towards insects, a shift that is already underway. A recent study by industry group Agricultural Biotechnology Council found a third of Britons think they will be eating insects by 2029. “Thirty years ago, eating raw fish in Europe (such as sushi) was considered disgusting. Food habits evolve over time, but of course, awareness and information campaigns will be needed to convince people that eating insects is good for their health and for the Earth as well,” said Vantomme. This article was part of Down To Earth's print edition dated October 1-15, 2019 We are a voice to you; you have been a support to us. Together we build journalism that is independent, credible and fearless. You can further help us by making a donation. This will mean a lot for our ability to bring you news, perspectives and analysis from the ground so that we can make change together. Comments are moderated and will be published only after the site moderator’s approval. Please use a genuine email ID and provide your name. Selected comments may also be used in the ‘Letters’ section of the Down To Earth print edition.
<urn:uuid:ac2b4e23-e892-4966-9200-e715be49cac6>
CC-MAIN-2023-23
https://www.downtoearth.org.in/news/food/will-insects-become-an-integral-part-of-our-diet-again--67167
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224654871.97/warc/CC-MAIN-20230608103815-20230608133815-00630.warc.gz
en
0.958796
1,298
3.078125
3
Your thyroid gland is a small butterfly shaped gland. It is located just below the larynx, in the lower part of the neck. Most of us are familiar with the thyroid gland and its control over our metabolism. A lot of you will be familiar with Eltroxin (levothyroxine), the medicine for an underactive thyroid. The purpose of the thyroid gland is to take iodine from foods we consume and convert them into thyroid hormones: thyroxine (T4) and triiodothyronine (T3). The thyroid combines iodine and the amino acid tyrosine to make T4 and T3. T4 and T3, once released into the blood stream control our metabolism. The thyroid is also responsible for proper growth, development and repair of the body. Thyroid hormones play a particularly crucial role in brain maturation during foetal development and the central nervous system. The metabolism of every single cell in our body is dependent on thyroid hormones. We often think of our metabolism as a way to lose or what is causing us to gain weight. Your metabolism is the way we create energy for everything we do – thinking, running, blinking, your heart beating etc. etc. The thyroid produces about 80% T4 and 20% T3, but T3 is four to ten times the strength of T4. T4 is converted into T3 in organs like the spleen, the kidney and the liver. Thyroid & Fertility: As your thyroid controls the metabolism of every cell in your body, it has a role to play in our reproductive organs. Your thyroid gland is part of the endocrine system. The endocrine system is made up of a few glands, including your reproductive glands. If your thyroid is underperforming (for a variety of reasons) this will have a negative effect on hormonal output, sperm creation and egg development. |Fertility Signs and Symptoms of Hyperthyroidism for Women (over stimulated)||Fertility Signs and Symptoms of Hyperthyroidism for Men (over stimulated)| |Loss of libido||Abnormal enlargement of the mammary glands in males| |Amenorrhea (Absent Period)||Feminization| |Postpartum thyroiditis, occurs in 7% of women within the first year after childbirth||Loss of libido| Other Symptoms Include: |Hyperthyroidism (over accelerated)||Hypothyroidism (sluggish)| |Inability to tolerate heat||Female Infertility| |Infrequent, Scant menstrual periods||Elevated prolactin levels| |Irritability or Nervousness||Flow of milk in the absence of pregnancy or childbirth| |Muscle Weakness or Tremors||Abnormal menstrual cycles| |Vision problems or eye irritation||Low body temperature| |Weight Loss||MEN:Decreased Libido – creates impairment of testicular testosterone synthesis| |Enlarged Thyroid Gland||Abnormal enlargement of the mammary glands| As a note, some of these symptoms can be an isolated issue, a thyroid issue or something else entirely. If you tick a lot of those symptoms, have a word with your healthcare provider. The next article will help you identify throi What Can We Do? Earlier on I mentioned that most of your thyroid hormones are made up of Iodine and the amino acid (protein) Tyrosine. For starters, let’s make sure that we supply our body with these nutrients. Foods rich in these can be found in the images. I also mentioned that the body produces more T4 then T3. In many ways, the body is a fan of having ‘inactive,’ substances travelling in our blood stream – so we can activate it when we need it! Brilliant really! In the organs mentioned, we convert T4 to T3 when required. This conversion uses Selenium, Vitamin A, B Vitamins, Vitamin K, Copper and Zinc. There are other factors like, heavy metal toxicity, immunological issues that can have a negative impact on the thyroid and its hormones too. So first off, let’s make sure we have the building blocks and the necessary co-factors (agents) to create and make the hormone work. As a note, 9 in 10 of us are deficient in Selenium and Zinc according to a UK food survey. However, constituents of certain foods (sometimes referred to as goitrogens) can promote a deficiency state by binding to iodine, making the iodine inaccessible for thyroid hormone synthesis. Cooking these foods tends to make them less goitrogenic. Common goitrogenic foods that can inhibit thyroid hormone synthesis are in the image below. A few helpful hints and tips: - Avoid food allergens, if you have them. Get this checked out if you don’t know - Be mindful of heavy metals and also check your iodine levels - Be careful of simple, refined sugars – interfere with the thyroid’s functionality - Exercise keeps the metabolism clock ticking - Good dietary habits as always, including good fats, very beneficial for your thyroid! For more information on Pillar Healthcare – click HERE
<urn:uuid:a103c068-14d5-407b-ac7d-201eac04bdd0>
CC-MAIN-2023-23
https://www.dolledup.ie/your-thyroid-your-fertility/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224657144.94/warc/CC-MAIN-20230610062920-20230610092920-00230.warc.gz
en
0.904003
1,076
2.984375
3
Jesus said: Assuredly I say to you, this generation will not pass away until all these things take place. Jesus prophesied these unforgettable words to four of his disciples on the Mount of Olives as recorded in Matthew 24:34, Mark 13:30 and Luke 21:30. It is critical to understand which generation Jesus meant. Taking the plain meaning without any bias, Jesus was referring to his own generation—the generation of his listeners there on the Mount of Olives. But some scholars say Jesus must have meant a future generation. Some others insist that Jesus meant the word “race”, i.e., the Hebrew race. They reason that because the Hebrew race remains today, the coming of Jesus has not taken place, putting his coming far into the unknown future. These scholars avoid the obvious meaning in the context of the gospel, dogmatically committed to a future return of Jesus, instead of simply accepting that Jesus spoke of the relative closeness of His coming. Jesus prophesied to those disciples on the Mount of Olives, that He would return before His hearers’ generation had passed away. Yet many of the same scholars and teachers have no problem in accepting that Jesus spoke literally about the coming fall of the Jerusalem temple. So then there is no logical reason to exclude the plain fact that Jesus spoke of his soon coming. Further, there is no doubt the disciples took Jesus’ words “this generation” to mean soon, at the door, at hand. They knew His coming was imminent, perhaps even in their lifetime. We see it in their writings. Their letters in the N.T. frequently reflect their expectancy of a soon coming, though the hour and day were unknown. We read of their warnings, their urgency to proclaim the gospel of the Kingdom of God and their urgings for their readers to live righteously. They knew Jesus warned them to get the Kingdom proclaimed in the towns of Judea before His coming (Matthew 10:23). Check these references out for yourself: Rom 13:11-13, 1 Cor 10:11, Phil 1:6,10, 1 Thes 1:10, 4:17; 2 Thes 1:7; 2 Tim 3:1; Heb 1:2, 9:28, 10:29; Jas 5:3; 1 Pet 1:5, 7-9, 13, 17, 20; 2 Pet 3:3; Jude 19). Now let’s look at only a few instances of Jesus’ phrase this generation in the gospels, paying close attention to the context of each. You will see they consistently refer to the people alive then as Jesus spoke. Mat 12:45. . . the last of that man is worse than the first. Even so shall it be also unto this wicked generation. Mat 12:41-42. The men of Nineveh will stand up with this generation at the judgment, and will condemn it because they repented. . . The Queen of the South will rise up with this generation at the judgment. . . Mark 8:12. Why does this generation seek . . sign? Truly I say to you, no sign will be given to this generation. Mark 8:38 : “For whoever is ashamed of Me and My words in this adulterous and sinful generation, the Son of Man will also be ashamed of him when He comes in the glory of His Father with the holy angels”. Jesus warned people in that crowd that some of them, this generation, will be alive ‘when He comes in glory! He said this generation not that generation. Luke 17:25. But first he must suffer many things and be rejected by this generation. Mat 17:17. O faithless generation, how long shall I bear with you . . Here he referred to the crowd who had no faith to heal. Mat 23:35-36. Assuredly, I say unto you, all these things will come upon this generation. That phrase is repeated in Mat 24:34, Mark 31:30, and Luke 21:30. Mat 24:34f, Mk 13:30f, Lu 21:30f. NKJV. Assuredly, I say to you, this generation will by no means pass away till all these things take place. Heaven and earth will pass away, but My words will by no means pass away. In all three synoptic gospels! And all three carry the word assuredly! (Grk amen) and the affirmation that though heaven and earth could pass away, his words stand forever! So who would dare to change his plain words? In Mat 23 we read Jesus’ savage attacks on the Jewish ruling elites of that current generation: Woe to you, scribes and Pharisees, hypocrites! Then after the 7 woes, we read verses 31-36: Therefore you are witnesses against yourselves that you are sons of those who murdered the prophets. Fill up, then, the measure of your fathers’ guilt. Serpents, brood of vipers! How can you escape the condemnation of hell? Therefore, indeed, I send you prophets, wise men, and scribes: some of them you will kill and crucify, and some of them you will scourge in your synagogues and persecute from city to city, that on you may come all the righteous blood shed on the earth, from the blood of righteous Abel to the blood of Zechariah, son of Berechiah, whom you murdered between the temple and the altar. Assuredly, I say to you, all these things will come upon this generation. Further, this particular generation was condemned to such a great extent, that Jesus warned those weeping women as He was led to the cross saying: Weep not for me but for yourselves and your children . . . as he knew what terrible times they would face (Luke 23:28). In the Olivet discourse of Matthew, Mark and Luke, the generation named by Jesus can only mean the generation of people Jesus was addressing. We can see that this is consistent with the other numerous references of his using the phrase this generation. There is no logical or hermeneutical reason why we should not believe and accept that Jesus spoke literally about “all these things will come upon this generation.” (Mat 24:34). The letters in the New Testament frequently reflect the expectancy of a soon coming, though the hour and day were unknown. We read of their warnings, their urgency to proclaim the gospel of the Kingdom of God and their urgings for their readers to live righteously.
<urn:uuid:eeb1260e-ce25-4a16-a03b-25142e5571b3>
CC-MAIN-2023-23
https://ianthomsonian.org/tag/jesus-second-coming/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656963.83/warc/CC-MAIN-20230610030340-20230610060340-00030.warc.gz
en
0.959174
1,387
2.5625
3
Since some drugs are legal, Americans might be inclined to think they are less dangerous. Take Ritalin, for example. It helps people struggling with attention-deficit hyperactivity disorder (ADHD) by millions. Yet, psychiatric studies indicate that it could lead to homicide. Ritalin addiction can cause a person to have a psychotic break and go on a rampage. Although Ritalin abuse doesn’t typically lead to homicidal rage, reports happen. Those suffering from a substance use disorder of this nature must find help quickly, even if they feel they must avoid it. Firstly, Ritalin is a type of stimulant drug. Stimulants work by speeding up the body’s systems, including chemical production. Ritalin is a stimulant specifically known as methylphenidate. Generally, Ritalin helps children and adults with attention-deficit hyperactivity disorder. Tasks and activities that disinterest individuals with ADHD may become entertaining or rewarding with Ritalin. To touch on how Ritalin helps those with health disorders, it’s important to explore the common signs of ADHD. Men and women typically experience attention-deficit hyperactivity disorder differently. More men than women are diagnosed with this disorder. For this reason, doctors at times turn a blind eye toward women or girls with ADHD. Signs of ADHD in men: Signs of ADHD in women: Some of the signs of ADHD in women and men are the same. Yet, men tend to display more symptoms of hyperactivity. Ritalin may help with a dual diagnosis aka co-occurring disorder. Both women and men with this neurodevelopmental disorder are prone to depression. Women especially tend to become distressed psychologically when they suffer from it. Further, because of the way that Ritalin works, it combats depression in a way. That said, Ritalin is diverted by the illicit market, which often turns into Ritalin abuse. Alcohol and drug abuse occur when a person overuses substances or uses them in a legally unintended way. Unfortunately, people use Ritalin in an unintended way. They might pretend they have ADHD to get a prescription. A person with a prescription might sell them to friends. The misconception that stimulants like Ritalin help with focus propels further illegal use. To continue, stimulants speed up the body’s systems. This includes the central nervous system, predominantly located in the brain. In particular, methylphenidates, like Ritalin, increase dopamine levels. It does this by blocking the chemicals in the body that transport dopamine. While this seems counterintuitive, these chemicals also move dopamine after release. By stopping this function, dopamine sits there, increasing without being removed. This works for individuals with ADHD because they have too many chemicals that transport dopamine. This is why they have low levels. Low levels of dopamine can be traced back to the following issues: Also, Ritalin increases the levels of norepinephrine. This chemical, in tandem with adrenaline, speeds up the heart rate. This gets the blood pumping and increases energy levels in turn. The increased levels of dopamine and norepinephrine help those who have a deficiency. Yet, people who engage in Ritalin abuse end up with too many of these chemicals. It can be pleasant at first. Increased energy and mood levels seem great in the short-term. Yet, using this prescription medication illegally can end up in a Ritalin addiction. Although unneeded, the brain becomes used to these high levels of “feel-good” chemicals. In turn, it craves more and any. This physically manifests as withdrawal symptoms. The science behind Ritalin makes it easy to get addicted. Yet, Ritalin addiction is likely to happen when it has the ability to take effect quickly. For instance, people may engage in Ritalin abuse by snorting or injecting it. This leads to quicker absorption than taking it orally, hence a higher rate of addiction. Though, those with Ritalin prescriptions can end up addicted to it as well. This can happen if they decide the dose isn’t strong enough, so they take more than prescribed. Their body builds up a tolerance to it; it wants more than it had before. Before they know it, they start to display signs and symptoms of Ritalin addiction. Continuing, these are common signs and symptoms of Ritalin abuse: These signs and symptoms are classic examples of Ritalin abuse. Millions of Americans engage in it every year, according to the National Institute on Drug Abuse (NIDA). They note that five million Americans misuse prescription stimulants every year. Also, NIDA writes that around half a million Americans have a diagnosed stimulant addiction disorder. Methylphenidate isn’t as addictive as other drugs like opioids. Yet, thousands suffer from an addiction every year nonetheless. People develop a Ritalin addiction after they get hooked on the stimulant sensation. Ritalin can make a person feel: Additionally, a person might stop feeling focused and happy without Ritalin. This is a common sign of addiction. They need help before it gets worse. Surprisingly, people who use Ritalin legally and illegally can experience a withdrawal from Ritalin. Not only that, the withdrawal can be painful and mentally taxing. Typically, doctors may taper a patient off of this medication. In this way, a patient might be able to avoid withdrawal or at least the worst of it. Those who abuse Ritalin will likely have withdrawal symptoms and signs. Individuals suffering from a Ritalin addiction may choose not to stop even if they want to. This is because they can’t stand the way it feels without it. Withdrawal can result in a psychotic break if they are severe enough. Signs and symptoms of Ritalin withdrawal include: Further, the list above isn’t exhaustive. Individuals suffering from a withdrawal from Ritalin may display one or more of these signs and symptoms. This depends on the severity of their addiction. In other words, a person who has been battling a Ritalin addiction for decades might hallucinate vividly. On the other hand, a person who’s engaged in Ritalin abuse for a month may not. That’s not to say that they won’t at all. The best way to mitigate the symptoms of Ritalin withdrawal is by attending an addiction treatment center. For instance, the trained staff at a stimulant addiction center can safely taper revering individuals off of Ritalin. They might also provide other medications to stop a mood or anxiety disorder from occurring. While the experience may be uncomfortable, they can prevent it from becoming unbearable. Otherwise, a person might choose to stay addicted, but not in pain as a result. Unfortunately, anyone is at risk for addiction. People who may not think that they could become addicted to substances might be the ones most at risk. The wrong situation can turn into drug abuse. There is a misconception that people develop a drug and alcohol addiction because they’re immoral or mentally weak. Actually, it’s the opposite. People who end up with a Ritalin addiction may be trying to cope with deeper physical or mental pain. That’s why it’s important to never judge anyone when they go through a situation as terrible as addiction. It’s even more important to support them when they make the decision to stop using. Certain groups of people may be more at risk for a Ritalin addiction than others: These groups of people may resort to Ritalin abuse when they don’t see another viable option. This is especially true for the millions of uninsured Americans. They’re unable to pay for a consultation, but they can afford to buy Ritalin illegally and periodically. Studies indicate that prescription drugs, like Ritalin, can be more addictive than cocaine. That’s why it’s important to go with a reputable stimulant treatment center. Ritalin withdrawal can be excruciating in multiple ways. That’s not the case if it happens within a facility that understands how to bypass the worst parts of withdrawal. Treatment for Ritalin addiction typically starts with detoxification (detox). This crucial, initial stage rids the body of any harmful toxin build-up. Also, it removes the drug from a person’s system completely. This stage might last a couple of days to a couple of weeks. Medical professionals might aid a patient via medications that block the worst of withdrawal symptoms. Forms of treatment for a Ritalin Addiction might include: No form of treatment for an addiction to Ritalin is better than another. It depends on what works for the recovering individual. That said, residential treatment might be good for a severe drug abuse problem. That way, they can focus completely on recovery rather than other responsibilities. If you are battling a Ritalin addiction, you may feel alone. Your family and friends might not understand that you’re not in control of your actions anymore—the drugs are. Trust us, that doesn’t make you a bad person. It just makes you a person who needs help. Free By The Sea offers treatment for Ritalin abuse in Washington, meaning we can help you get over this together. Contact us now to begin your journey to recovery from Ritalin abuse. We’re here to help! Dr. Richard Crabbe joined our team in 2019 as our psychiatrist and medical director. He attended the University of Ghana Medical School where he became a Medical Doctor in 1977. From 1978 through 1984, he was a medical officer in the Ghana Navy and provided a variety of services from general medicine to surgeries. He received his Certificate in General Psychology from the American Board of Psychology and Neurology in 2002.
<urn:uuid:d4753e0d-dcec-4a7e-b194-07081589627c>
CC-MAIN-2023-23
https://freebythesea.com/rehab/ritalin/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648209.30/warc/CC-MAIN-20230601211701-20230602001701-00230.warc.gz
en
0.943944
2,036
2.65625
3
What do we mean by libc? On Posix-y systems, programs link against a library (either dynamically or statically) called libc. This library provides the functions defined by the C standard, as well as the runtime environment for C programs. Many systems also define other platform-specific interfaces in the same library. Many of these interfaces are the preferred way for userspace to access kernel functionality. For example, Posix-y systems have an open function in their libc, which calls an open system call. Sometimes these are cross-platform standards, such as pthreads. Others are interfaces to kernel-specific functionality, such as kqueue. In any case, this library is present on the system itself and is a stable interface. In contrast, Windows does not provide a systemwide libc in its stable win32 interface. On Fuchsia the story is a bit different from Posix systems. First, the Zircon kernel (Fuchsia's kernel) does not provide a typical Posix system call interface. So a Posix function like call a Zircon open syscall. Secondly, Fuchsia implements some parts of Posix, but omits large parts of the Posix model. Most conspicuously absent are signals, fork, and exec. Third, Fuchsia does not require that programs use libc's ABI. Programs are free to use their own libc, or to do without. However, Fuchsia does provide a libc.so that programs can dynamically link, which provides implementations both of the C standard library and of the parts of Posix Fuchsia supports, as typical Posix systems do. Piece by piece This is a partial list of what is implemented (or not) in Fuchsia's libc. The C standard library Fuchsia's libc implements the C11 standard. In particular this includes the threading-related interfaces such as threads ( and mutexes ( mtx_t). A small handful of extensions are also in this portion of the system to bridge the C11 structures, like a to underlying kernel structures, like the zx_handle_t underlying it. Posix defines a number of interfaces. These include (not exhaustively): file I/O, BSD sockets, and pthreads. File I/O and BSD sockets Recall that Zircon is a kernel that is not in the business of implementing file I/O. Instead, other Fuchsia userspace services provide filesystems. libc itself defines weak symbols for Posix file I/O functions such as fstat. However, all these calls simply fail. In addition to libc.so, programs can link the fdio.so library. fdio knows how to speak to those other Fuchsia Channel IPC, and provides a Posix-like layer for libc to expose. Sockets are similarly implemented via fdio communicating with the userspace network stack. Fuchsia's libc provides parts of the pthread standard. In particular, the core parts of pthread_t (those that map straightforwardly onto the corresponding C11 concepts) and synchronization primitives like pthread_mutex_t are provided. Some details, like process-shared mutexes, are not implemented. The implemented subset does not aim to Fuchsia does not have Unix-style signals. Zircon provides no way to directly implement them (the kernel provides no way to cause another thread to jump off its context of execution). Fuchsia's libc does not, therefore, have a notion of signal-safe functions, and is not implemented internally to be aware of mechanisms like signals. Because of this fact, libc functions will not EINTR, and it is not necessary for Fuchsia-only code to consider that case. However, it is perfectly safe to do so. Fuchsia still defines the and code written for both Posix and Fuchsia may still have fork and exec Zircon does not have fork or exec. Instead, process creation is provided by fdio. While Zircon has Process and Thread objects, these are pretty raw and know nothing about fdio_spawn function family knows how to turn an ELF binary and some initial state into a running process.
<urn:uuid:e09d8110-58f4-4063-b67d-b72d73a545c7>
CC-MAIN-2023-23
https://fuchsia.dev/fuchsia-src/concepts/kernel/libc
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656788.77/warc/CC-MAIN-20230609164851-20230609194851-00430.warc.gz
en
0.90706
1,026
3.5625
4
Dr Ian Rowlands The Google Generation The key thoughts that I take from Ian Rowlands talk on the Google Generation are : - Extravagant Claims - Diversity and segmentation (he picked out three clusters) - Google and Wikipedia dependence - Text based to visual - The mental maps of children - Books as chapters - Good students and ‘good’ research techniques - A mental map of information The middleman, or the ‘intermediary function’ has been cut out. He mentioned travel agents, we could just as easily exclude secretaries (because of word processors), the post man and(because of email), people in ‘middle management’ because analytics run from the shop floor, or retail outlet to a directors computer and … even the teacher as subject matter expert. The Extravagant Claims as popular commentators, authors and publications become mashed-up with serious study. These are the Marc Prensky (Digital Natives) and Malcolm Bradbury (The Tipping Point) types who take indicators from genuine research and then exaggerate and extend the claims and findings. They are not ‘one homogenous blob’ as Dr Rowland puts it. There is diversity by age, gender, and exposure to IT. This is complex picture is exactly what advertising agency and product marketing departments understand and it was about time educators took a similar approach to understand the minutiae of the ‘audience’ who will choose to purchase information from their libraries …. Or not, that fails to attract interest because a headline is easier to consume than a 30 page report. There is segmenting by diversity type … something librarians once did for users, but now readers can do for themselves. Do modern users care or understand the relevance of what they find Can they not differentiate between dirt or a pearl? That a Google search is not a library search and that there are more sources than Wikipedia? We’re shifting from text based to a preference for the visual. But has not the visual always been preeminent. People learn less from reading than they do by observing and doing, always have done. Indeed, has not there simply been a period of text based education elitism? The mental maps of children are indeed different Rowland expresses concern about this as if it isn’t commonly understood. It would help if those in education took a formal course in education as teachers in primary and secondary education are required to do, they therefore might understand something about childhood development, developmental psychology and basic neuroscience. Each generation is a product of how and where it is brought up and what they are exposed to; if we have a Net Generation today, then in the past we have had generations brought up with Television, with Movies, with the car, and before that the train … and further back still, the first generations to be literate and have books. It isn't helpful to isolate the Google generation and think they're different from us. They're not. There's a continuum. Dr Rowland Books as chapters Is this not the same with tracks from albums, rather than the entire LP concept? Good search technique students get better grades than poor search technique students Is it the good research technique, or the good student that gets the results? I’m not convinced the correct correlation is being made here. We need a mental map of information so that stuff doesn’t get ‘hidden behind the screen.’ From the point of view of methods of communicating the information I would prefer a summary and article to a informal talk cum-lecture. Armed with a verbatim transcript I will immediately do a search for words and phrases that would have been edited out of any written piece on the subject. So out come the following: ‘actually’ 19 uses. ‘really’ 56 uses ‘very’ 54 uses ‘you know’ 20 uses ‘simply’ 12 uses ‘literally’ 3 uses ‘sorts of’ 4 uses (This I should add is a very modest tally of a normal convesational style that would occur with anyone except a seasoned broadcaster. The point is, you don't want to read a verbatim transcript). Here I am making something I want to read, easier to read. All that counts is how the information goes in, if there is motivation to engage with it, and how the information is then labelled, enabled, packaged and chunked in your mind. Are the right kind of neurological activities going on that result in the information withering, or proving fruitful? Is it to be engaged in deep learning, or is it just ‘stuff’ top be learnt, tested and dropped? The key word for any expression of information that matters to me is EFFORT. Has the person wishing to communicate something made the effort to get it right? We have a plethora of choices A subject we may be interested in may be delivered as a lecture, a workshop, a classroom talk, a presentation of any kind, an after dinner or at the dinner table, live or recorded, in vision or not, edited or not. It may be a paper, a leaflet or pamphlet. It may be a formal study or report, an assignment or essay, even a thesis, a chapter in a book, or entry in Wikipedia. It might also be the basis for an entire course of study or a module within one. The subject of a three minute news story, with an interview and cut-aways, or a documentary, or a panel debate. It might be a poster, a website, a blog entry or email as body text or an attachment. It can be many things and all things. One dish can make a smorgasbord There are lectures and there are informal talks, some like this, perhaps ought not to receive wide circulation, it may be unfair to take a speaker out of context. I get the feeling that this is an intimate, even informal, sharing of ideas, a catalyst to get a discussion going amongst a group of professionals. From a learning point of view I cannot sit back and listen to these things and get much from it This is didactic, being talked to. My attendance at lectures as an undergraduate stopped during my first term and I doubt I attended ANY lecture afterwards; it was easier to read their book, as I felt most lecturers were ‘reading from their book.’ So I got their book from the faculty library, or got to it first in the Bodleian, or bought it from Blackwell’s (all three within a 2 minute bike ride of each other). Just as a sheet of grabs of bullet points from a Power Point presentation are NOT ‘presenter notes,’ nor is a verbatim transcript of the person talking. This is LAZY, though of value as a point of ACCESS best practice. If I can read the presentation then I’ll do so, not at three words a second (the spoken voice) and ideally not with all the ticks and circumlocutions that slow the spoken word down in what can be an indulgent perambulation around a subject. Academics are not broadcasters. What do we read at? Nine words a second? When someone was born does NOT dictate whether they are or are not exposed to a plethora of electronic gadgets, tools and resources. Whilst they have to have been born after the technology has come into existence and popular use, this does not mean that they are ‘brought up in an immersive rich media interactive culture’. If we take everyone born on the planet after 1993 the percentage exposed to this immersive media immediately and understandably drops massively. It is a western, developed, first world phenomenon.
<urn:uuid:6b9a2b8b-c887-4d0b-8af5-d36f3ac366f7>
CC-MAIN-2023-23
https://learn1.open.ac.uk/mod/oublog/view.php?user=35680&amp;taglimit=500&tag=middlemen
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644915.48/warc/CC-MAIN-20230530000715-20230530030715-00030.warc.gz
en
0.953714
1,633
2.65625
3
India has faced a scarcity of electricity for decades, but could in the coming years be confronted with the problem of plenty in the future. With the addition of many projects in recent years, the country’s gross electricity capacity is now higher than the demand, and shortfalls have significantly dropped. Official data indicate that chronic power shortfall fell to as little as 0.7 per cent in 2016-17, and this year, there could well be a surplus. This is the result of simultaneous growth in renewable energy (RE), as well as continuing growth in power output from conventional sources. RE is growing dramatically; India had the second-highest solar capacity addition in the world in 2017. The central government has set a target of 175 gigawatt (GW) by 2022, which requires an annual growth of well over 25 per cent. Further, coal-based capacity for the period FY 2011-17 has also risen over 12 per cent annually, which is twice the rate of growth in demand for power. A new RE-ality in power management Isn't this a good thing? Yes, and no, as it turns out. While adequate power supply is surely a worthy goal, the rising contribution from RE also presents the grid with a challenge. The question, “How much RE can the grid handle” does not have a simple answer, as a recent reports by the Brookings Institute points out. The report, titled "Embarassment of riches: The rise of RE in India and steps to manage surplus electricity" points to the challenges that loom in the changing power situation in the country. Compared to conventional power generation from coal and gas, and even hydro-electric ones, power generated from renewable sources are quite variable, depending on changes in cloud-free daylight and winds in source areas. At low RE levels, the grid can be managed despite this variability, but as the share of RE in the power sector rises, this becomes much harder. States need to invest in nimble, standby alternatives to be able to respond to drops in power from renewables. Also, when there is a surge in power from renewable sources, other plants cannot be quickly backed down to keep the overall supply constant. According to a study by the Central Electricity Authority (CEA), the system-level costs associated with managing RE on the grid are almost Rs 1.5/kWh, or more than half of recent RE bids. The Brookings report points out, additionally, that the targeted 175 GW of RE is also concentrated in only a handful of states. For example, Karnataka has almost 5 GW of solar, and more of wind, well ahead of its targets, but the maximum load served is only about 10.2 GW. During the windy months of the monsoon, the demand is as low as 6.5 GW. In the coming years, the focus will increasingly have to be on the management of surplus, especially during certain months and times of the day. Storage technologies could help save the day in the future, with excess RE being steered towards storage rather than be wasted. But for now, the costs of large-scale storage are still high. Until their viability improves or until prediction of RE availability becomes more accurate, we'll have to focus on balancing supply and demand, or continue to accept the losses - and system costs - of surplus renewable power. As an aside to the reader, the report also points out that surplus capacity doesn't automatically guarantee an end to load-shedding. The state distribution companies are in poor financial health, and unable to purchase power even when it is available, and this is often the most important cause of shedding. New policy directions needed To properly plan for the management and growth of RE in India, the Brookings report suggests four steps. - Data capture regarding wastage of RE must be mandated: Currently, when surplus RE is thrown away - known as 'curtailment' - there is no aggregated record kept of this information. Just as importantly, the reasons for curtailment should also be recorded. This would be of huge commercial significance, since in India most power contracts are set up in a way that producers don't get paid if their energy is not delivered. Whenever RE is curtailed for no fault of the producers, there should be a compensation mechanism for this. Draft regulations from the Ministry of New and Renewable Energy indicate that the government is moving in this direction. - Frameworks for curtailment compensation must be created: The burden of curtailment must be shared, and India requires fair and efficient frameworks for this. Each coal-based plant has its distinct variable costs, so a hierarchy of pain-sharing can be developed based on who would lose the most if curtailed. Solar plants, on the other hand, all have identically marginal costs - zero. If only technical efficiency yardsticks were applied in terms of which power plants should be curtailed, it’s possible that some of them will be disproportionately affected. To minimise the impact on selected plants, socialising their costs is an option. China has done this; its model could offer a starting point for India's efforts too. - RE generation data should be captured with granularity, and dissemminated: For economic as well as technical reasons, the addition of new RE should be guided by good information about how much is already produced and used. Aside from the need to make better predictions, consumers with rooftop solar and other RE producers will benefit from this information. The Central Electricity Authority recently began compiling aggregate RE production per month, a small step but a lot more is required. - All units of power must not be treated the same: Time of Day pricing must be introduced : Almost all Indian power transactions are made on the basis of Power Purchase Agreements which treat all power the same. However, the value of power differs based on the time of day, predictability, ramping ability, and other factors. The rise of RE will require the system to be become more flexible. In the future, signalling will have to vary for different grid locations; peak power that operates a few hours a day will be more expensive than baseload coal or opportunistic RE, but such power must be enabled. The shift from a bleak, power-scarce situation to a surplus offers hope that universal, affordable access to energy will be achieved. That's certainly something to look forward to, but as this Brookings report reminds us, it is a path that wil be paved better with foresight and planning for this new reality.
<urn:uuid:2d54acf7-b89c-4301-870d-2cfd5420e302>
CC-MAIN-2023-23
https://www.indiatogether.org/articles/too-much-re-economy/print
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224651815.80/warc/CC-MAIN-20230605085657-20230605115657-00230.warc.gz
en
0.960546
1,327
2.921875
3
No, they won't bite: Debunking 8 common myths about cicadas and the incoming Brood X For the first time in 17 years, millions of periodical cicadas will soon be swarming Indiana. And 17 years, experts say, is just long enough for people to forget what happened last time they came. The cicada swarm is a natural phenomenon unlike any other, as millions of cicadas that have been living underground for years emerge en masse in a monthlong mating ritual. Brood X, the name given to this cycle of cicada emergence, is one of the largest broods in the eastern United States and is slated to appear in Indiana by late April to mid-May. In areas of high cicada concentration it's a spectacular sight, experts say. But it's also alarming for some people, and often accompanied by a slew of misinformation and myths. That's why Hoosier scientists are gearing up to address this misinformation head-on. 'Otherworldly':For the first time in 17 years, millions of cicadas will be swarming Indiana Purdue University entomologist Cliff Sadof said a team of experts around the state are pooling their information and preparing messaging for people who might be surprised or fearful about the sudden onslaught of insects appearing in their backyard. Maybe along the way, he said, they can generate some interest in a field that often flies under the radar. "We want this to be an opportunity for people to learn about nature and insects, and begin to appreciate them a little bit more," Sadof said. "The other thing that we're trying to do is, we are trying to help maintain public calm." Here are common myths about cicadas, debunked. Myth: Cicadas are locusts When a mass of cicadas shows up outside their home almost as if overnight, some people associate the emergence, much like the Biblical plague of locusts, with a bad omen. While cicadas might be colloquially called locusts in some parts, they're actually completely different species. Locusts are a type of grasshopper, while cicadas are a distinct insect type. Locusts swarm in large groups much like cicadas emerge all at once. But locusts are much more damaging than cicadas, eating substantial amounts of vegetation and causing significant damage for local farmers. Cicadas, on the other hand, won't destroy crops and only feed on juices from trees. Myth: Cicadas will harm you or your pets Although it may look a little "Night of the Living Dead" when the ground starts bubbling up with emerging cicadas, there's no reason to panic. Cicada emergences are a natural phenomenon that has taken place for tens of thousands of years. Cicadas have been around since the age of the dinosaurs. And they can't hurt you, said Elizabeth Barnes, exotic forest pest educator at Purdue. People tend to worry that cicadas will bite, but they don't have the mouthparts to do that, she said. Instead, they have a long, straw-like tube that they use to suck fluids from trees. "They can't bite you, even if they want to," she said. They also won't hurt your pets if they eat them, she said. In fact, many wildlife species will get nice and plump this year from all the extra protein. Sometimes, Barnes said, turkeys are even larger in the falls after a cicada emergence. If your dog or cat is throwing up or acting sick, it's probably because they ate too many of them. That said, it's always a good idea to take your pet to the vet if you're concerned, she said. Myth: Eating cicadas is gross Although the idea of eating an insect may make some squirm, cicadas are a great source of protein and perfectly tasty, said Marten Edwards, a biology professor at Muhlenberg College. "Seventeen years ago eating insects kind of had this yuck factor," Edwards said. "That's really changed since the last emergence. There's restaurants now that are serving insects, not as a gimmick, but actually because they're really good to eat." For a cicada snack at peak deliciousness, Edwards suggests cooking a fresh one right after it emerges from the ground. At this point, the cicada will be pure white and soft before it hardens its shell, and there's less chance it's been affected by insecticide or other toxins. That said, if you're allergic to shellfish, you might want to steer clear. Sadof explained that because insects are arthropods like shrimp or lobsters, there's a chance eating cicadas won't be good for you. Myth: Cicada killer wasps are murder hornets A type of wasp called a cicada killer or a cicada hawk feasts on cicada emergences, so if you live near an area of high cicada concentration, there's a chance you'll see these buzzing around as well. With their striking black and yellow stripes, people will confuse them with infamous "murder hornets" that were sighted in Washington last year, Sadof said. They're not the same, and they're probably going to leave you alone, Barnes said. "We're trying to make sure that people know the difference between the two and not worry too much about them," she said. "It does hurt a lot if they sting you, but they're not aggressive ... these particular wasps, unless you directly threaten their nest, they should leave you alone." Myth: Insecticides will keep cicadas away Sadof said a major goal for the cicada team at Purdue this spring is preventing people from panicking at the sight of cicadas and then spraying insecticide all over the place. "There are people who see bugs, and they hate them so much they just want to spray, spray, spray," Sadof said. "And that is precisely the wrong thing to do, because it's not going to have any effect." There are too many cicadas to make an impact with insecticide, he said. In some parts of the state, there may be as many as 1.5 million cicadas per acre. Even if you kill a few cicadas, more will just take their place. And remember, they'll only be around for a couple of weeks. Cicadas don't bite or sting, hurt your plants or your pets, and so there's really no reason to try and kill them, Sadof points out. Myth: They'll be everywhere Many of the maps showing where Brood X will emerge depict huge swaths of land covered in cicadas. But that's not exactly the case, Edwards said. "It's a bit of an urban legends that they are going to be millions everywhere," Edwards said. There will be some areas with higher concentrations of cicadas — again, as many as 1.5 million per acre — but those hot spots will probably be in forested areas. You're not likely to see concentrations near that high in many parts of Indianapolis. Myth: Cicadas will keep you up at night Cicadas can be loud — really loud. Some songs can reach 90 decibels, roughly the same level as a lawnmower. Because of this, people tend to assume they'll keep them up all night, Barnes said, but that's not the case. Cicadas tend to mainly sing in the afternoon. If you hear the sounds of cicadas at night, it's probably just because a cicada was startled by something or it's the sound of something else entirely, she said. Myth: Cicadas will hurt your plants Possibly related to locusts' reputation for crop destruction, there's a common fear that cicadas will eat flowers, landscaping or vegetables. They won't hurt your plants, Barnes said. In fact, they might help them. When cicadas die, their decomposing bodies have a lot of nitrogen in them, which makes for excellent fertilizer. That said, if you have a small tree in your yard you might want to wrap it with mesh before the cicadas arrive. When they lay their eggs, female cicadas use a tool on their abdomen to saw a groove into the small twigs or branches. The result may cause those twigs to die. Large trees won't be too affected, she said, but small trees might need a little protection. Contact IndyStar reporter London Gibson at 317-419-1912 or firstname.lastname@example.org. Follow her on Twitter @londongibson. Connect with IndyStar’s environmental reporters: Join The Scrub on Facebook. IndyStar's environmental reporting project is made possible through the generous support of the nonprofit Nina Mason Pulliam Charitable Trust.
<urn:uuid:25369a9b-681c-4beb-ad1c-a16e3e439779>
CC-MAIN-2023-23
https://www.indystar.com/story/news/environment/2021/04/13/debunking-8-common-myths-cicadas-and-brood-x/7139163002/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656963.83/warc/CC-MAIN-20230610030340-20230610060340-00030.warc.gz
en
0.959312
1,880
3.15625
3
When the 2008 campaign for president began, it wasn't such a big story that there would be superdelegates at the 2008 Democratic National Convention in Denver, Colorado. After all, superdelegates have been at every convention since they were created through Democratic National Committee (DNC) rules in 1982 [source: CNN]. In previous contests, superdelegates hadn't enjoyed much of the spotlight. But as the Democratic primaries whittled down the number of competitors for the nomination, a close race emerged between Senators Hillary Clinton and Barack Obama. Even as the end of the 2008 Democratic primary calendar wound down, the two candidates were neck and neck for the Democratic Party's nomination for president of the United States. Scores of primaries and caucuses, including those on Super Tuesday – a day designed to establish a clear front-runner – produced no obvious candidate. With the delegate counts for Clinton and Obama so close, it was thought that in the 2008 primary season, superdelegates would have a huge impact on which candidate the Democrats nominate for the run for the presidency. In the end, Obama won the nomination thanks in part to superdelegates who defected from Clinton over to his side, though he was ahead in pledged delegates as well [source: Schor and Glaister]. So, who are these superdelegates? And how do they have so much power? Delegates won in primaries and caucuses are considered pledged voters, meant to represent the will of the people who voted for a particular candidate. At the national convention, these delegates are expected to vote for the candidate chosen by the thousands of voters they represent. This is not the case with superdelegates. Superdelegates are simply "unpledged voters." Their vote represents their own choice, rather than the wishes of the voters, and these unpledged delegates can pledge their votes as they see fit. Superdelegates have to consider how to use their votes carefully. They may: - Vote in step with how the voters in the majority of states voted - Vote in line with Democratic voters nationwide - Vote in favor of the candidate with the most pledged delegates, even if it is just a slim majority. The Democratic National Committee delegate selection rulebook says that pledged delegates "shall in all good conscience reflect the sentiments of those who elected them." In stark contrast, a superdelegate can also choose to vote his or her "conscience." This is one way of saying that a superdelegate may not vote the way the majority of voters do, but on the candidate he or she feels is best. To win the 2020 Democratic Party nomination for president, a candidate has to rack up 1,991 delegates – half of the 3,979 total delegates plus 1 [source: 270 to Win]. Delegates in 2020 or any other year are won through votes from state primaries or caucuses. Generally, delegates are awarded by percentage in Democratic nominating contests; this is in contrast to some Republican contests, which are winner-take-all. So if one Democratic candidate wins 60 percent of the popular vote in a state that offers 10 delegates, for example, that candidate will win six delegates in that state. This continues state by state, and usually one candidate manages to rack up a clear majority of the delegates before the convention. In the 2020 Democratic primary, there are about 764 superdelegates, making up around 16 percent of the delegate count for the party [source: Ballotpedia]. These superdelegates are Democratic members of Congress, high-ranking members of the Democratic Party, state governors and former presidents and vice presidents [source: Fang]. (Pledged delegates are selected at the local or state level and are usually ordinary party members who have applied and campaigned for the spots.) Superdelegates are allowed to switch their pledges from one candidate to another at the national convention. They can also pledge and switch long before the convention. Some say this gives superdelegates undue influence on the course of primary voting behavior, and because they know this, candidates often swoon over superdelegates to curry their favor [source: Heersink]. When they do switch, it's usually to reflect the direction they see the vote going. For instance, 30 superdelegates switched from Clinton to Obama in 2008 after he had gotten a narrow lead in pledged delegates. More might have switched, but Clinton dropped out at this point. Usually, though, superdelegates don't change their minds, even when candidates plead with them to shift their alliances, as Bernie Sanders did during the 2016 primary season [source: AP News]. That's where things often get messy. In 2016, many superdelegates came out early in support of Hillary Clinton, a fact that caused Sanders to claim that the Democratic Party powers-that-be were manipulating the system to swap public opinion in Clinton's favor, a task made easier by the inherently confusing and messy delegate/superdelegate system. Although Clinton did win a majority of pledged delegates, Sanders and his supporters thought her early endorsements from so many superdelegates might have swayed primary voters [source: Conway]. In the wake of these conflicts, Sanders and his activists sought several rule changes to the nominating process, which were mostly rejected by the DNC. However, they did get one big change for the 2020 election – superdelegates were no longer allowed to cast their votes during the first ballot at the national convention, unless the outcome was already certain [source: 270 to Win]. So why does the Democratic Party have superdelegates? And does the Republican Party have anything equivalent?
<urn:uuid:3b56323a-d989-42c2-8899-565d0a77c9e5>
CC-MAIN-2023-23
https://people.howstuffworks.com/superdelegate.htm
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224654097.42/warc/CC-MAIN-20230608035801-20230608065801-00230.warc.gz
en
0.970891
1,136
2.84375
3
Great Canadian Genocide: Today we’ll draw your attention to a shameful chapter in Canadian history. It is no secret that aboriginals have been wiped off their own land in Canada. The truth is now unravelling itself with the unearthing of thousands of unmarked graves from Canadian soil. Today we’ll talk about the Great Canadian Genocide. Residential schools are the legacy of the tumultuous colonial past of Canada. Before Europeans began to settle in the nation, indigenous people were organised in hundreds of distinct communities across the sprawling forests, plains and mountains, making up the largest group. The Metis, who are descended through marriages between Europeans and First Nations peoples during the 17th and 19th centuries, are also recognised under the Canadian Constitution. The smallest group recognised by the government is the Inuit, whose territory consists of 51 villages that live in the Arctic areas. Members of all communities would eventually be sent to the schools. Now, here comes a startling fact. The truth and reconciliation commission concluded in 2015 that the residential school systems had amounted to the “cultural genocide” of Indigenous people after hearing testimony from survivors for thousands of hours. The federal government issued a formal apology for the schools in 2008 but requests for an independent investigation, including the prospect of criminal charges against the federal government and the Catholic church, have been sparked by the new terrible discovery. Almost a year back, nearly 1,300 unmarked graves on the grounds of five old residential schools for indigenous children in Canada were discovered using ground-penetrating radar. In retaliation, demonstrators destroyed sculptures of historical people, and other cities postponed their customary July 1 Canada Day celebrations back then. Deb Haaland, the first Native American secretary of the interior of the United States, revealed on June 22nd 2021 that her own nation’s boarding schools for Native Americans would be under scrutiny. Now, let’s know, what actually occurred at these institutions for Native American children. The American government moved native people westward in the middle of the 1800s, frequently to arid regions, in order to seize their land. On the way, a lot of Native Americans died. Read More: Papa Trudeau laid the foundation for boy Trudeau to make money in the name of indigenous Canadians Tribes that rebelled were engaged in combat or slaughtered by the US military. Also, some people were concerned that there wouldn’t be enough room to transfer Native Americans as white settlers migrated westward. Instead, the government adopted forced assimilation and in the middle to late 1800s started heavily subsidising boarding schools for native youngsters. Canada did likewise. “Kill the Indian” and “rescue the man” were the goals of the educational institutions. Government funding and church management combined to operate several schools. Some were run directly by the government. The use of children’s native tongues was prohibited. Several people suffered from physical and sexual abuse, and some were forced to labour for white families. Parents who refused to send their children to school were penalised by the Canadian government. Several kids died as a result of the unsanitary conditions and small living spaces. Others perished in mishaps or in their attempts to flee. Indigenous children in Canadian residential schools died at a rate that was two to five times higher than that of their counterparts in other parts of the nation until the 1950s. If we talk about Canada alone, then the number of students who passed through residential schools between the 1870s and 1990s is around 150,000 indigenous children. The onslaught was so massive that the Canadian government apologised to the institutions and compensated survivors, in a response to a lawsuit brought by survivors of the schools and settled in 2007. Moreover, according to the supplementary report of the National Inquiry into Missing and Murdered Indigenous Women and Girls, there has been a huge level of violence against Indigenous women and girls. The National Inquiry found that colonial institutions and practices are still in place in Canada and are to blame for the violence that 2SLGBTQIA people and Indigenous women and girls endure. The report emphasises how the vast majority of testimonies presented to the National Inquiry confirm that acts of Great Canadian Genocide against Indigenous women, girls, and 2SLGBTQIA people have occurred: The violence that was reported to the National Inquiry amounts to a racial genocide against Indigenous Peoples, including First Nations, Inuit, and Métis, and it targets women, girls, and 2SLGBTQQIA individuals in particular. Still, to all the atrocities against the aboriginal communities in Canada, many questions remain unanswered. The government has been unreachable on the issue. Moreover, the current Trudeau regime is capitalising on the atrocities of the indigenous community. We at TFI have already covered, since coming to power, Justin Trudeau has been actively engaged in portraying himself as the sole protector of the Indigenous people. His government has doubled the spending, from $11.4 billion in 2015 to $27.4 billion this year, to work for the betterment of the lives of the Indigenous people. But, the reality is different from what he portrays. Ironically, doubling the amount of spending has not led to a doubling in the output of the cause. In fact, the graph has seen a steep drop. Read More: Justin Trudeau killed Michel Trudeau for Sophie As a result, compared to the general population, the rates of poverty, unemployment, addiction, incarceration, abuse, and school dropout remain stubbornly higher. Citing the current situation, the gaps don’t seem to be closing anytime soon. Now, the major question is, where is the amount being used? Where are the funds going? Perhaps, in the garb of Indigenous Canadians, Trudeau Jr is filling his own coffers. Yes, that is what perfectly suits his persona. The state of the aboriginals in Canada is distressing. Despite the numerous atrocities committed against the community, the government remains frustratingly out of reach when it comes to addressing these grave injustices. Leave a Reply
<urn:uuid:1886cdf2-47fc-4e09-864d-bf0680020cd3>
CC-MAIN-2023-23
https://tfiglobalnews.com/2023/03/23/the-great-canadian-genocide/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224654606.93/warc/CC-MAIN-20230608071820-20230608101820-00430.warc.gz
en
0.973358
1,228
2.859375
3
Australian Curriculum Homeschooling The Australian Curriculum is a comprehensive framework that outlines what students should learn in each subject area at each grade level. While it can seem daunting at first, there are ways to make it more manageable. With the right approach, you can navigate the Australian Curriculum with ease and use it for homeschooling. What is the Australian Curriculum? The Australian Curriculum (ACARA) is the Australia wide school curriculum written to help young Australians learn about and engage with the world. This curriculum is used as a guiding principle in many states for home education registration. It is managed by the Australian Federal Government. It is secular. It was introduced in 2012 and its goal is to standardise teaching outcomes around Australia. Consequently, schools in Queensland, the Northern Territory, Canberra (ACT), South Australia, and Tasmania have all followed the Australian Curriculum. New South Wales, Western Australia, and Victoria incorporate the national curriculum into their state syllabi. In 2022 a Version 9 of the Australian Curriculum was released. You can find the full government curriculum here. Do home educators need to use the Australian Curriculum for homeschooling? Northern Territory is the only state that links homeschool registration directly to the Australian Curriculum. If you live in NSW you need to use the NSW Curriculum for homeschooling planning. Whilst the NSW Curriculum is based on the Australian Curriculum, they take an adopt and adapt approach and the layout of the curriculum and the codes they use are different. In 2022 NSW released a new version of their English and Maths curriculum but this has not yet been tagged with the V9 Australian Curriculum codes. The other NSW subjects still use the Version 8.4 of the Australian Curriculum. The Western Australian Curriculum uses the Australian Curriculum’s English, Maths, and Science in an unchanged format. The subjects of Humanities and Social Sciences, Health and Physical Education, Technologies, The Arts and Languages have some minor changes to make them more relevant to Western Australians. The Western Australian Curriculum still uses 8.4 of the Australian Curriculum and has not updated to Version 9 of the Australian Curriculum. Homeschoolers in Western Australia need to use the Western Australian Curriculum to plan for homeschool registration. In other states and territories, the expectation is that you provide a high-quality education. You don’t need to stick to the Australian Curriculum for homeschooling. However, many Australian and international families find the structure of the Australian Curriculum a helpful framework for developing a plan that is sequential and age appropriate. Understand the structure of the curriculum. Before diving into the content of the Australian Curriculum, it’s important to understand its structure. The curriculum is divided into three main areas: - Learning areas are subject-specific and include English, mathematics, science, and more. - General capabilities are skills that are important across all subject areas, such as critical thinking and communication. - Cross-curriculum priorities are themes that are integrated throughout the curriculum. They are Australia’s place in Asia, sustainability and Aboriginal and Torres Strait Islander histories and cultures. The learning areas are where homeschoolers will find most of the information that they need. You’ll find the general capabilities and cross curriculum priorities are weaved into the learning areas. Focus on the learning areas that are most relevant to your teaching. With so much information available on the Australian Curriculum website, it can be overwhelming to try to absorb it all at once. Instead, you should try to focus on the learning areas that are most relevant to your child. For example, if you are homeschooling a Year 4 child, you may want to prioritise the English, Mathematics, and Science learning areas for Year 4. By prioritising your focus, you can ensure that you are able to navigate the curriculum with ease. The Australian Curriculum and Charlotte Mason Method There is no specific Charlotte Mason Curriculum. Nevertheless, Charlotte Mason’s ideas on what is important for children to learn are integral to her method. The learning goals in the English Curriculum of Charlotte Mason and the Australian Curriculum are quite similar, except the type of literature used in the Charlotte Mason method is more classical in its approach. Also, the Australian Curriculum places a much stronger emphasis on phonics, creative writing, and spelling in the early years. The Humanities in the early years of the Australian Curriculum are more of a Social Science subject. Whereas Charlotte Mason also includes chronological history and specific geography lessons. Charlotte also introduces Plutarch as a Civics and leadership lesson. The Australian Curriculum supports Charlotte Mason’s method of teaching science through observation, literature, and scientist biographies. Charlotte Mason employed an immersion technique, where a child learns a topic in depth in one block, while the Australian Curriculum utilises a spiral approach, providing tiny quantities of content on the same topic year after year. Charlotte didn’t talk a lot about maths, so there is no real comparison to make. At My Homeschool we merge the philosophy of Charlotte Mason method and content of the Australian Curriculum (NSW and WA Curriculum).
<urn:uuid:30d1c338-95f9-4ff5-936a-1a0e7f24afed>
CC-MAIN-2023-23
https://myhomeschool.com/au/homeschooling/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648850.88/warc/CC-MAIN-20230602172755-20230602202755-00430.warc.gz
en
0.939608
1,107
3.234375
3
Analysis: Spring Exams Are the Best Shot State Leaders Have at Knowing What’s Happening With Their Students Education news this year could give you whiplash. Think of all the news stories we’ve seen: Students are learning in person, online or hybrid, depending on the day of the week. Some enrolled and engaged, but too many haven’t and can’t be found. Some have internet access and devices; many don’t. The truth is, we don’t know what happened in 2020 for students. But we have one shot at getting a comparable data point that will say something about learning for all students within a state. And that is to administer spring assessments. As 2021 begins, we can’t make assumptions about what students have learned this school year. Education leaders and teachers, of course, have interacted with students and watched them through computer screens for many months — but we won’t truly know what happened and where learning gaps exist without statewide exams. These assessments provide state leaders and educators with the only comparable information about how students in their state performed in math and reading. And with news that the National Assessment of Educational Progress has been canceled, statewide tests are even more important. Without them, policy and education leaders will be reduced to guessing about learning loss and gains, device access and equitable outcomes for students in their state. Estimates and anecdotes are not enough. The public needs information, however imperfect, about what students learned last year. State and district leaders should use assessment data in conjunction with all the other information they have, including local exam results and which students have access to a device and high-speed internet. Fortunately, 19 states have already publicly committed to administering 2021 assessments. But for those that haven’t, the window for state leaders to move forward in a manner that meets the moment is closing. Those leaders must keep the following three things top of mind: 1 Tests should be easy to administer and easy to take When I worked in Baltimore City Public Schools, we had a policy never to put students in a position to be potentially harmed while getting to school in inclement weather. If a child was freezing in the ice and snow at a bus stop because the bus got stuck in ice, we had failed. That seems more than obvious — but it’s how leaders should be thinking about assessments this year. Tests shouldn’t be burdensome for educators to administer, for parents to manage or for students to take. Schools and students have all had different experiences this year — some in person, some online — and how students are assessed must reflect how they have been learning. Leaders should focus on a practical, common-sense approach to administering these tests and what they look like. Pivoting isn’t easy, but it is necessary and it can be done. For example, last spring, the College Board worked to make Advanced Placement exams virtual in a matter of weeks and removed proctoring burdens by making tests open-book. It was not perfect, but in short order, students and educators were provided with good comparable information about content mastery. Just because tests have always looked a certain way doesn’t mean that’s what they should look like this year. Assessments can be what states need them to be now. Maybe that means pushing back the testing window. Maybe that means changing the format. The burden is on states and assessment vendors to be thinking about how to most easily do this for students and teachers. And that’s something state leaders need to pursue now. 2 Assessment data provides an evidence base for leaders to decide next steps As someone who led assessment and accountability for both Baltimore and New York City public schools, I understand the value of valid and reliable data for decisionmaking. But this year, the priority cannot be a perfect data set. Given the enrollment and engagement information, and the record numbers of students who haven’t been able to attend school regularly because of a lack of technology, we likely can’t test everyone. But districts and states should have a data point for each student — either a test score or a specific reason why the student didn’t take the test (e.g., lack of internet). Taken together, this information provides critical insights to state and local leaders about what happened, where, and to whom. At its heart, this is an equity issue. Leaders must have comparable data to begin planning for the 2021–22 school year, and to engage in conversations with advocates about next steps, resources, and supports. And the public deserves transparent information about the decisions made this year. We’ll have none of this if states don’t administer the test at all. 3 This is a moment to pause on releasing school ratings Coming from someone who has dedicated her career to assessment and accountability, this is really hard to say — but that’s how I know it’s the right thing to do. There’s no doubt the 2020–21 school year will have an asterisk beside it. As a country, we need to capture what we know about students and their experiences during this most disruptive time in the history of education. But information gleaned from assessments in the spring must be used smartly — and that means that now may be the moment to take the high stakes out of publicly reporting school ratings this year. This is not the moment to publicly rate school performance. Rather, in this unpredictable year, assessment results — including data on the reasons students weren’t assessed — should be used to target resources and support, not make decisions about individual schools. This year has been anything but ordinary, and that means assessments won’t be, either. Even under the best of circumstances, administering tests is a challenge, and it will be even more complex this school year. But this is hard work worth doing. Leaders must be responsible about how they move forward and make assessments happen in a way that’s not burdensome for students and teachers. It’s time for state exams, and how they are used, to change to meet the moment. Without summative assessments, leaders will be leaving themselves — and students — in the dark. Jennifer Bell-Ellwanger is president and CEO of the Data Quality Campaign. Get stories like these delivered straight to your inbox. Sign up for The 74 Newsletter
<urn:uuid:25f18763-b0f7-4008-b929-7fcebc9a2693>
CC-MAIN-2023-23
https://www.the74million.org/article/analysis-spring-exams-are-the-best-shot-state-leaders-have-at-knowing-whats-happening-with-their-students/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224645089.3/warc/CC-MAIN-20230530032334-20230530062334-00230.warc.gz
en
0.956938
1,314
2.671875
3
More than just another Jab: The role of vaccines in helping prevent certain diseases November 7, 2022 Vaccines have had a significant positive impact on human health. Their administration has led to a drop in the incidence of vaccine-preventable diseases that were historically fatal to millions. During the COVID-19 outbreak, the world was reminded of the vital role that a single vaccine plays not just for one’s health but for the well-being of populations around the globe. “COVID-19 vaccines are one of the most incredible medical advances in history. Unfortunately, many people do not appreciate the level of importance of vaccines. These vaccines will be the solution, the way for us to end this current pandemic,” said Dr. Melvin Sanicas, Infectious Diseases Global Health Specialist and Ten Outstanding Young Men 2021 Awardee. This year’s World Immunization Week theme, “Long Life for All,” highlights that we have a part in promoting the use of all available vaccines to help protect people of all ages against disease. In line with this year’s theme of ‘Long Life for All,’ the ImMUnity Team of the Mu Sigma Phi Medical Sorority, University of the Philippines-Manila College of Medicine (UPCM), held a webinar entitled ImMUnization: A Passport to Longevity. This brought focus on the relevance of immunization through the ages and for all ages. The event was organized by the UP Philippine General Hospital (PGH), the Philippine Foundation for Vaccination, the Mu Sigma Phi Foundation, and healthcare company MSD in the Philippines. Keeping its commitment to promoting vaccine confidence alongside the health community, MSD actively engages in multi-stakeholder collaborations, such as the advocacy partnership with UPCM – Mu Sigma Phi Medical Sorority, Inc., to address the challenges of vaccine hesitancy and emphasize the importance of a life-course vaccination. MSD also supports campaigns that aim to enhance vaccine confidence by communicating the value of immunization in helping save lives and preventing vaccine-preventable diseases and outbreaks. A life-course approach to immunization Vaccination programs often focus on distinct life stages, such as childhood immunization, but evidence supports a life-course approach where vaccination is given throughout an individual’s life. The life-course approach to vaccination stems from the simple fact that the risk of infectious diseases extends far beyond childhood and into old age. With this life-course vaccine approach, not only will individuals reap the benefits, but it will also have a favorable impact on public health and socioeconomics. The National Immunization Program (NIP) of the Department of Health aims to provide Filipinos access to routinely recommended vaccines. It also aims to help reduce morbidity and mortality among children against the most common vaccine-preventable diseases (VPDs) like tuberculosis, poliomyelitis, diphtheria, tetanus, pertussis, and measles. The program currently provides vaccines against VPDs for newborns, infants, older children, pregnant women, and senior citizens. The government’s vaccination services are set to continue with adaptive guidelines to help protect vulnerable age groups like senior citizens, who are more prone to acquiring pneumococcal diseases. It is also stipulated under RA 9994 or the “Expanded Senior Citizens Act of 2010” that indigent senior citizens are entitled to free vaccinations for pneumonia and influenza. “Please ensure children have the right vaccination because they are our future. Let’s give them a long and fruitful life in a country where vaccination is at the forefront of our health delivery system in previous years,” Philippine Foundation for Vaccination Executive Director Dr. Lulu Bravo emphasized. Despite the evidence of health gains from immunization programs, some groups have always resisted vaccines. Dr. Bravohoped addresses this by highlighting the importance of vaccines and sharing practical tips on how to deal with vaccine hesitancy. “Vaccines do not kill. Misinformation and disinformation kill,” Dr. Bravo emphasized. She stressed that communication plays an essential role in fighting vaccine hesitancy and relaying the message about how vaccines work for our health and the community. Building vaccine confidence and a more resilient health system require addressing the stigma surrounding vaccination, which prohibits many people from getting the vaccinations that will help protect them against vaccine-preventable diseases. “Engage with the hesitant people. There is no single solution. We must understand their motivation. People need to be listened to, and vaccination framed in a way that it matters to them,” she encouraged. “You can help by positively shaping public perception of the benefits of immunization. Increase awareness of the burden of diseases in life and the economy. Dispel myths and rumors on immunization.” The Mu Sigma Phi Medical Sorority (MSPS) also helped spur awareness about the benefits of vaccines through a social media campaign on TikTok. “Social media is an important tool in our arsenal to educate and urge Filipinos, especially the youth, about vaccination. Through this campaign, we hoped to engage them in this popular platform and emphasize how vaccines help save lives,” shared Ron Villas, MSPS Service Committee Chairperson. Meanwhile, Dr. Beverly Ho, Director IV of the Department of Health, Health Promotion Bureau, enumerated the government’s programs and campaigns to promote the acceptance and usage of vaccines. “Vaccines may offer protection from vaccine-preventable diseases across life stages. Among the vaccines provided for free under the National Immunization program include vaccines against tuberculosis, Hepatitis B, polio, pneumonia, measles, mumps, and rubella. Dr. Ho underscored that routine immunization is the foundation for strong, resilient health systems and universal health coverage. “However, we also want to inform the public that routine immunization is only a part of the overall health program of the government, and there is still a need for regular consultations at your local health centers.” Dr. Ho further emphasized that “immunization is just one of the basic health services that infants, children, teenagers, women, and senior citizens need, and part of the department’s catch-up immunization program is to vaccinate at least 80% of the remaining 1,100,000 infants who missed their routine immunization in 2021 due the pandemic.” Having a resilient and sustainable immunization system depends on building vaccine confidence. Hence, stronger collaboration among stakeholders plays a crucial role in raising awareness about how vaccines may help protect oneself, one’s family, and the community from vaccine-preventable diseases, as well as emphasizing vaccines’ importance at all stages in the pursuit of building a healthy citizenry.
<urn:uuid:12a3093a-0355-4cd4-a882-9bcf56f9452c>
CC-MAIN-2023-23
https://www.msd.com.ph/stories/more-than-just-another-jab-the-role-of-vaccines-in-helping-prevent-certain-diseases/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652235.2/warc/CC-MAIN-20230606045924-20230606075924-00430.warc.gz
en
0.933661
1,413
2.859375
3
In Chapter 13 of the book, we have a description of the mechanism forcing the Chandler Wobble in the Earth’s rotation. As a counter to a recent GeoenergyMath post suggesting there is little consensus behind this mechanism, a recent paper by Na et al provides a foundation to understand how the lunar forcing works. Chandler wobble and free core nutation are two major modes of perturbation in the Earth rotation. Earth rotation status needs to be known for the coordinate conversion between celestial reference frame and terrestrial reference frame. Due mainly to the tidal torque exerted by the moon and the sun on the Earth’s equatorial bulge, the Earth undergoes precession and nutation.Na, S.-H. et al. Chandler Wobble and Free Core Nutation: Theory and Features. Journal of Astronomy and Space Sciences 36, 11–20 (2019). The tidal torque of the earth and sun are sufficient, and the non-spherical bulge is essential to start any kind of precession — as a perfectly-uniform rotating spherical object can’t be influenced by an external torque, explained by symmetry arguments alone. Na et al estimate the Chandler Wobble cycle from the empirical time-series to be 432.2 days, compared to our estimate of 432.4 days based on the lunar nodal cycle synchronized to a semi-annual cycle. They continue with a further rationale and formulate a precession matrix that one can apply. For precession, one may assume the lunar and solar masses as circularly distributed around the Earth like donuts. In fact, the moon and the sun give periodic torques as oscillatory perturbations and lead Earth nutation. By analogy of harmonic oscillator to periodic forces, amplitude of long period nutation is larger than short period one.Na, S.-H. et al. Chandler Wobble and Free Core Nutation: Theory and Features. Journal of Astronomy and Space Sciences 36, 11–20 (2019). So the foundation is in place but they have yet to make an association of the ~432 day cycle to the known simultaneous nodal crossing period. Another finding that they make is the apparent measured decrease in the amplitude of the Chandler wobble over time. This may be related to the Earth’s spin axis drift over recent years, perhaps revealing a change in the moment of inertia — caused by redistribution of mass such as in glaciers, glacial rebound, and/or mantle convection. Less likely, but perhaps coincidental, could this decrease be related to the QBO anomaly of 2016, which also is synchronized to the nodal crossing cycle? In any case, it will be interesting if the cycle period remains constant with further reduction in wobble amplitude. 7 thoughts on “Chandler Wobble according to Na” see this as well: This study correlates the 6.4 year envelope of Chandler Wobble with magma eruptions on Mt. Etna Lambert, S. & Sottili, G. Is there an influence of the pole tide on volcanism? Insights from Mount Etna recent activity. Geophysical Research Letters (2019) doi:10.1029/2019GL085525. And from earlier in the year, Tamino found this correlation of Chandler Wobble with sea-level rise oscillations at mid-latitudes along the USA east cost: Pingback: EGU 2020 Notes | GeoEnergy Math Click to access Sp16Bell.pdf Some aspects of a random walk in an energy well (i.e. Ornstein-Uhlenbeck process) applied to the wobble. Click to access 2001.05965.pdf International Journal of Modern Physics C Article Title: Model discrepancy of Earth polar motion using topological data analysis and convolutional neural network analysis Author(s): Dongjin Lee, Christopher Bresten, Kookhyoun Youm, Ki-Weon Seo, JaeHun Jung Krylov S.S., Perepelkin V.V., Filippova A.S. (2020) Long-Period Lunar Perturbations in Earth Pole Oscillatory Process: Theory and Observations. In: Jain L., Favorskaya M., Nikitin I., Reviznikov D. (eds) Advances in Theory and Practice of Computational Mechanics. Smart Innovation, Systems and Technologies, vol 173. Springer, Singapore. https://doi.org/10.1007/978-981-15-2600-8_22 No idea if they are saying what drives the frequency, even though Fig 22-2 pins down the 18.6 year period
<urn:uuid:e492fe1c-0b28-4f85-ba43-bab13c945f07>
CC-MAIN-2023-23
https://geoenergymath.com/2019/09/15/chandler-wobble-according-to-na/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653183.5/warc/CC-MAIN-20230606214755-20230607004755-00430.warc.gz
en
0.827395
1,161
3.84375
4
A new trial has begun in Victoria this week to evaluate a potential vaccine against COVID-19. The vaccine is called NVX-CoV2373 and is from a US biotech company, Novavax. The trial will be carried out across Melbourne and Brisbane, and is the first human trial of a vaccine specifically for COVID-19 to take place in Australia. This vaccine is actually based on a vaccine that was already in development for influenza. But how might it work against SARS-CoV-2, the coronavirus that causes COVID-19? What’s in the mix? Vaccines trigger an immune response by introducing the cells of our immune system to a virus in a safe way, without any exposure to the pathogen itself. All vaccines have to do two things. The first is make our immune cells bind to and “eat up” the vaccine. The second is to activate these immune cells so they’re prepared to fight the current and any subsequent threats from the virus in question. We often add molecules called adjuvants to vaccines to deliver a danger signal to the immune system, activate immune cells and trigger a strong immune response. The Novavax vaccine is what we call a “subunit” vaccine because, instead of delivering the whole virus, it delivers only part of it. The element of SARS-CoV-2 in this vaccine is the spike protein, which is found on the surface of the virus. By targeting a particular protein, a subunit vaccine is a great way to focus the immune response. However, protein by itself is not very good at binding to and activating the cells of our immune system. Proteins are generally soluble, which doesn’t appeal to immune cells. They like something they can chew on. So instead of soluble protein, Novavax has assembled the SARS-CoV-2 spike protein into very small particles, called nanoparticles. To immune cells, these nanoparticles look like little viruses, so immune cells can bind to these pre-packaged chunks of protein, rapidly engulfing them and becoming activated. The Novavax vaccine also contains an adjuvant called Matrix-M. While the nanoparticles deliver a modest danger signal, Matrix-M can be added to deliver a much stronger danger signal and really wake up the immune system. The spike protein is formed into nanoparticles to attract immune cells, and Matrix-M is added as an adjuvant to further activate immune cells. Author provided Rethinking an influenza vaccine The Novavax vaccine for SARS-CoV-2 is based on a vaccine the company was already developing for influenza, called NanoFlu. The NanoFlu vaccine contains similar parts – nanoparticles with the Matrix-M adjuvant. But it uses a different protein in the nanoparticle (hemagglutinin, which is on the outside of the influenza virus). In October last year, Novavax started testing NanoFlu in a phase III clinical trial, the last level of clinical testing before a vaccine can be licensed. This trial had 2,650 volunteers and researchers were comparing whether NanoFlu performed as well as Fluzone, a standard influenza vaccine. An important feature of this trial is participants were over the age of 65. Older people tend to have poorer responses to vaccines, because immune cells become more difficult to activate as we age. This trial is ongoing, with volunteers to be followed until the end of the year. However, early results suggest NanoFlu can generate significantly higher levels of antibodies than Fluzone – even given the older people in the trial. Antibodies are small proteins made by our immune cells which bind strongly to viruses and can stop them from infecting cells in the nose and lungs. So increased antibodies with NanoFlu should result in lower rates of infection with influenza. These results were similar to those released after the phase I trial of NanoFlu, and suggest NanoFlu would be the superior vaccine for influenza. So the big question is – will the same strategy work for SARS-CoV-2? The Novavax vaccine is one of several potential COVID-19 vaccines being trialed around the world. Shutterstock The Australian clinical trial The new phase I/II trial will enrol around 131 healthy volunteers aged between 18 and 59 to assess the vaccine’s safety and measure how it affects the body’s immune response. Some volunteers will not receive the vaccine, as a placebo control. The rest will receive the vaccine, in a few different forms. The trial will test two doses of protein nanoparticles – a low (5 microgram) or a high (25 microgram) dose. Both doses will be delivered with Matrix-M adjuvant but the higher dose will also be tested without Matrix-M. All groups will receive two shots of the vaccine 21 days apart, except one group that will just get one shot. This design enables researchers to ask four important questions: can the vaccine induce an immune response? if so, what dose of nanoparticle is best? do you need adjuvant or are nanoparticles enough? do you need two shots or is one enough? While it’s not yet clear how the vaccine will perform for SARS-CoV-2, Novavax has reported it generated strong immune responses in animals. And we know NanoFlu performed well and had a good safety profile for influenza. NanoFlu also seemed to work well in older adults, which would be essential for a vaccine for COVID-19. We eagerly await the first set of results, expected in a couple of months – an impressive turnaround time for a clinical trial. If this initial study is successful, the phase II portion of the trial will begin, with more participants. The Novavax vaccine joins at least nine other vaccine candidates for SARS-CoV-2 currently in clinical testing around the world. By Kylie Quinn, Vice-Chancellor's Research Fellow, School of Health and Biomedical Sciences, RMIT University and Kirsty Wilson, Postdoctoral Research Fellow, RMIT University. This article is republished from The Conversation under a Creative Commons license. Read the original article.
<urn:uuid:30a6759b-b1a0-41d1-a0c5-0f7da34cc20c>
CC-MAIN-2023-23
https://scienceblogs.com/sb-admin/2020/05/27/nvx-cov2373-heres-how-coronavirus-vaccine-based-flu-shot-works-151450
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224645089.3/warc/CC-MAIN-20230530032334-20230530062334-00230.warc.gz
en
0.945642
1,311
3.578125
4
I got a Facebook message early this week from a friend in Sacramento CA that said after over 200 days with no rain, she got 4.83 inches in a 24-hour period from the latest extreme rainfall that occurred over northern California. Others have reported up to a foot of rain in three days. If you follow the news, you may have heard the term “atmospheric river” used to describe the torrential rains and flooding that have occurred this week in San Francisco and other parts of Northern California. In this post, I want to explain what atmospheric rivers are and how they affect rain climatology in the Western U.S. as well as other parts of the United States and the world. Tahquamenon Falls–Autumn. Source: Wfgc, Commons Wikimedia. What is an “atmospheric river”? The term “atmospheric river” first appeared in the modern scientific literature in the early 1990s. Since it was first used, there has been a lot of discussion about what the term actually means. Commonly, it is seen as a band of very moist air flowing into a coastal area, bringing the potential for a lot of rain to the region that is at the downwind end of the flow. In some respects, it is like being on the receiving end of a firehose streaming high-intensity water right towards you! After a lot of discussion by meteorologists (described in this Bulletin of the American Meteorological Society article) the official definition in the Glossary of Meteorology became: Atmospheric river – A long, narrow, and transient corridor of strong horizontal water vapor transport that is typically associated with a low-level jet stream ahead of the cold front of an extratropical cyclone. The water vapor in atmospheric rivers is supplied by tropical and/or extratropical moisture sources. Atmospheric rivers frequently lead to heavy precipitation where they are forced upward—for example, by mountains or by ascent in the warm conveyor belt. Horizontal water vapor transport in the mid-latitudes occurs primarily in atmospheric rivers and is focused in the lower troposphere. Atmospheric rivers are the largest “rivers” of fresh water on Earth, transporting on average more than double the flow of the Amazon River. Source: NASA Earth Observatory Why do atmospheric rivers produce so much rain? The strong flow of moisture into a region provides an excellent source of water vapor for the development of heavy rain, especially if it is moving into an area with flow up mountain slopes that can help storms develop vertically. That enhances the rain-producing process. The West Coast of the United States provides a perfect location for the occurrence of atmospheric rivers since there is a broad expanse of ocean to provide the water vapor, dynamic storms that concentrate the flow into bands that can stretch all the way from the Hawaiian Islands to California (which explains an alternate name, “Pineapple Express”), and mountains near the coast to provide lifting for the moist air once it comes onshore. Cliff Mass of the University of Washington often discusses them in his blog on the weather of the Pacific Northwest. Do atmospheric rivers occur in other places? The short answer is Yes! While historically they are discussed most often when talking about weather on the West Coast, atmospheric rivers (ARs) can and do occur in other places as well. Anywhere that has a good source of moisture plus dynamic storms with strong airflow can experience ARs. In the Southeastern U.S., we get them when strong flow from the Gulf of Mexico or the Atlantic Ocean feeds into our region, usually ahead of a strong low pressure center that provides the necessary dynamics to create a narrow band of moisture feeding into the region. According to research by University of Georgia researchers, they occur most often in the cold months of November through March but can occur in any month of the year. In the Southeast, we get about 40 events per year that are classified as ARs. I was surprised to read that there are slightly more events on the East Coast than along the Gulf of Mexico, but anywhere along the Southeast coast can be affected. No trend towards more or fewer events was seen in the 1979-2014 period. NOAA’s Physical Sciences Laboratory’s page describing ARs says that on average, about 30-50% of annual precipitation in the west coast states occurs in just a few AR events, thus contributing to water supply. ARs move with the weather and are present somewhere on the Earth at any given time. This site has some great resources for tracking and forecasting ARs around the world. Of course, atmospheric rivers are not the only source of heavy rain events, but they are one of the primary sources for the West Coast. In other areas, tropical systems like slow-moving hurricanes or stalled fronts can also drop a lot of rain. You can also get very heavy rains from small local systems of thunderstorms if conditions are right, especially if the storms “train” or move one after another over the same area like cars on a freight train. We saw this in the Nashville area a few weeks ago, where the heavy rains resulted in significant flooding over a few counties. Rain garden in the Allen Centennial Gardens on the campus of the University of Wisconsin-Madison. Source: James Steakley, Commons Wikimedia. How do atmospheric rivers and other heavy rain events affect gardeners? If you are a gardener in the Western United States, you are already well aware of the long dry season over the summer followed by bouts of rain that can occur over the winter months. The timing of the switchover from dry to wet conditions depends on how far north you are on the coast, with the summer dry spell coming earliest in southern California and moving northward with the position of the jet stream as the summer progresses. Dealing with the effects of an AR is like any other attempt to protect your garden against heavy rainfall, and can mean proactive action to make sure that water-sensitive plants and trees are not located in low-lying areas where rain collects. This 2013 article from the Garden Professors blog on-site assessment is still good advice for planning ahead for soggy conditions by walking through your property in the rain. Designing for erosion control, such as rain gardens, can also help divert water in high-intensity rainfall. In spite of the heavy rain that fell in this last atmospheric river event, the rainfall barely made a dent in the long-term drought that is present across a lot of the Western U.S. Drought will continue to be a part of the hydrologic cycle that affects gardeners, farmers, and water managers across that region and across the world. One thought on ““Cry Me A River””
<urn:uuid:6d16c5dd-033f-4703-9ec2-79bf84d8aa12>
CC-MAIN-2023-23
https://gardenprofessors.com/cry-me-a-river/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646937.1/warc/CC-MAIN-20230531150014-20230531180014-00430.warc.gz
en
0.949605
1,387
3.765625
4
Author: Peter Cantelon, Executive Director When I was a kid out for Hallowe’en, we carried small cardboard containers (with terrible, easy to rip handles) to collect change for UNICEF. We were agents for ethical investment encouraging our family, friends and neighbors to invest some of their hard-earned dollars into the lives of impoverished children around the world. Thus mine, and perhaps your personal histories include a history of ethical investment. Maybe it was a carwash to raise money for a family whose house burned down or some other initiative but I bet you have more of a history in this area than you thought. Tracing the history of ethical investment is a road fraught with twists, turns and potholes. After all the question is “who’s history are we talking about?” and “why this particular history?” etc. Still, we’ll do our best to try to capture the salient points and craft for you an overview of the practice. By many accounts the roots of modern ethical investment are situated in 18th century United States and the religious movement known as the Quakers who chose to restrict their members from contributing time and money (aka investing) in the slave trade. Reality Check – As long as people have been making decisions about where to expend resources there has been a form of ethical investment going on. All decisions involve an ethical framework of one sort or another. What we are looking at here is the history of ethical investment as a modern movement rather than simply a decision. It makes sense then, to look historically at the world’s religions as a foundation for such a movement given that, by their nature, religions structure an ethical and moral framework affecting decision making. The Qur’an in Islam, for instance, forbids the payment of interest. Obviously, this creates a unique condition in the world of investment and so finding ways to allow Muslims to invest without breaking this condition (moral and ethical obligation) becomes a form of ethical investment. In 2010 Assiniboine Credit Union became the first financial institution in Canada to offer mortgages that would not breach this condition. This is a form of ethical investment at work – a way of investing that specifically takes into account the investor’s ethical framework. Heading back in time again we can see that the establishment of the modern hospital system in the west was due in large part to the expansion of Christianity. Early Christians invested, time energy, money and other resources into their religious/ethical mandate to heal the sick utilizing a model developed by the Roman military. In the 18th century John Wesley, the founder of the Christian denomination/movement Methodism delivered a sermon entitled The Use of Money in which he handily packaged a Christian’s use of money into three simple axioms – earn, save and give all that you can and do so within a moral and ethical framework (in this instance a Christian one). More recently with the development of the United Nations’ 17 Sustainable Development Goals, increased awareness of the effects of Climate Change, and broader awareness of poverty and the long-term effects it has on a society we have begin to see large scale adoption of ethical and social investment models. Financial institutions around the world, sensing a market for ethical investment, combined with younger employees who have a moral drive in this direction, are creating social and ethical investment funds as an outlet for the rising need. “Now wait a minute,” you say. “Most of what you have been talking about sounds suspiciously like donations and not investment. Shouldn’t investment include some expectation of a return?” When we turn to the Oxford Dictionary, we note that in its simplest definition investment is defined as “The action or process of investing money for profit.” It is never super helpful when a definition includes a variation of the word it is defining. A better definition provided would be “an act of devoting time, effort, or energy to a particular undertaking with the expectation of a worthwhile result.” I would add to this “resources”. In its original form ethical investment was simply you or a group of people committing resources to increase and improve the well-being of others. As market economies developed and matured investment automatically and simplistically focused primarily on the idea of financial return. Today with ethical investment maturing and coming into its own at an institutional level the idea of return or value is broadening to encompass things like social and environmental return. An ethical investment may, from time to time, net zero in the financial realm but substantial value in the social and environmental realms. Of course, investments that net the investor a charitable donation receipt for tax purposes are also providing a form of financial return as they offset debt to federal and provincial governments. It is this history that gives rise to organizations like Jubilee Fund. Jubilee is a natural outcome of the history of ethical investment with its focus as an organization that offers financing for poverty reduction and related initiatives Jubilee gives people an opportunity to invest in Jubilee Investment Certificates (like GICs) that are leveraged to provide loan guarantees and loans for things like affordable housing, accessible child care and more.
<urn:uuid:6a67e729-c508-4b68-87ac-f8124240bf67>
CC-MAIN-2023-23
https://www.jubileefund.ca/you-are-an-ethical-investor-a-very-brief-history-of-ethical-investment/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224643462.13/warc/CC-MAIN-20230528015553-20230528045553-00230.warc.gz
en
0.953868
1,075
2.625
3
During the Revolutionary War, when there wasn’t any internet or telephones to provide instantaneous communication over long distances, the connective tissue that held the American colonies together was mail that was transported by horseback riders on the rough-hewn roads between cities and towns. Making sure that the mail was delivered as quickly and dependably as possible was critical to the colonies’ survival. That’s why three months after the battles of Lexington and Concord, the Continental Congress turned to Benjamin Franklin to establish a national post service as the first Postmaster General. “When he was appointed postmaster general for the American confederation in 1775, it clearly showed the extent to which he was trusted by American leaders to have Americans’ best interests at heart,” explains Carla J. Mulford, a professor of English at Penn State University and author of an upcoming book, Benjamin Franklin’s Electrical Diplomacy. Franklin already had years of experience in the business of delivering mail. WATCH: ‘Ben Franklin: Citizen of the World’ on HISTORY Vault Ben Franklin Kept Mail Moving Swiftly as Philadelphia Postmaster In 1737, by age 31, Franklin had already built a prosperous business as a printer, shopkeeper and publisher of a newspaper, The Pennsylvania Gazette. That year he was appointed postmaster of Philadelphia, after British authorities removed his predecessor for failing to submit financial reports. As Devin Leonard notes in his book Neither Snow Nor Rain: A History of the United States Postal Service, being a local postmaster didn’t pay much—a 10 percent commission on customers’ postage—but it came with a big fringe benefit. Franklin had franking privileges, which enabled him to mail his newspaper to readers at no cost. That helped Franklin build a big circulation and turn the Pennsylvania Gazette into one of the colonies’ most successful publications. In a similar way that modern politicians and celebrities rely on Twitter, Franklin used the mail for self-promotion. As Leonard notes, Franklin’s ability to send his own letters without paying postage—he instead simply inscribed them with “Free.B.Franklin”—enabled him to correspond with other intellectuals in Europe. That helped to publicize Franklin’s achievements, “thereby helping to make Franklin into one of the world’s most admired Americans,” as Leonard writes. Stanford University historian Caroline Winterer, who has studied the 20,000 letters left behind by Franklin, describes him as “a man with a dynamic social network” comparable to our interconnected world today. READ MORE: How Presidents Have Communicated With the Public—From Telegraph to Twitter Britain Appoints Franklin as Postmaster of 13 Colonies Franklin, a meticulous record-keeper, was so skillful at running postal operations in Philadelphia that in 1753, the British Crown appointed him as joint postmaster for all 13 colonies. Though he nominally shared authority with William Hunter, a Virginia-based printer, Hunter pretty much let Franklin call the shots, according to Leonard’s book. Franklin held that post for more than two decades, during which he orchestrated huge improvements in mail service, including establishing a regular schedule that allowed mail to move efficiently along post roads up and down the Eastern Seaboard. Franklin “traveled widely to inspect postal routes, find the most reliable postal clerks to serve as his associates in the different towns and cities, and create a system of communication that would work well for riders of the post,” Mulford explains. “Franklin had foresight. He was a good systems analyst,” Mulford says. “He was agreeable to work with, when others were agreeable. And he was an excellent trouble-shooter, able to figure out work-around solutions when plans went awry.” READ MORE: 11 Surprising Facts About Ben Franklin Mail Delivery Time Is Cut, Newspaper Get Flat Rate Eventually, by putting mail riders out on the roads at night, Franklin managed to cut the delivery time for a letter from Philadelphia to New York and receive a reply to just 24 hours. Franklin also arranged for small, swift packet ships to transport mail to and from the West Indies and Canada, which complemented the transatlantic service that the British Crown provided from England, and established the first home-delivery system in the colonies, according to Franklin biographer Walter Isaacson. He even set up a dead-letter office in Philadelphia to handle undeliverable mail. Another of Franklin’s reforms—after he’d already made his own fortune—was to issue an 1758 decree that all newspapers would be transported by postal riders for the same, uniformly low rate, according to Winifred Gallagher’s book How the Post Office Created America: A History. That greatly increased the colonists’ access to information, particularly about what was going on elsewhere in the world. As colonial postmaster, Franklin did much of his work remotely. Starting in the late 1750s, he began spending much of his time in England, where he did his job through the mail, auditing postal statements from afar and implementing his decisions by letter. The British government didn’t mind, because by 1760, the postal operation in the colonies was profitable for the first time. But Franklin’s involvement with the growing resistance to British taxation and rule eventually caused him to run afoul of British authorities. READ MORE: How Ben Franklin’s Viral Political Cartoon Helped Unite the Colonies Leaked Letters Lead to Franklin’s Dismissal Things came to a head after Franklin received an anonymously-sent package of letters written by Thomas Hutchinson, the British governor of Massachusetts. Franklin gave them to a friend, who then leaked them to a Boston newspaper, and they caused an uproar. “The letters [Franklin] sent over to Massachusetts from London showed the extent to which British leaders in the colonies sought the suppression of colonists at all costs,” Mulford says. As a result, Franklin “was rudely and summarily dismissed” from his postmaster-general position in January 1774. After Franklin returned to America, the clockwork-like postal system he’d built started to fall apart without his management skills. The colonists began to set up their own independent post offices. A former postmaster from Providence, R.I., William Goddard, set up the Constitutional Post, an alternative service that allowed colonists to send letters to one another without the risk that the Crown’s postmasters would open and read them. After Declaration of Independence, US Post Office Is Born Goddard tried unsuccessfully to get the Continental Congress to adopt his makeshift service as the official mail system. But the delegates wanted something bigger and better. After two months of study, in July 1775 they offered Franklin the new job of Postmaster General, at a salary of $1,000—about $33,500 in today’s dollars—and authorized him to hire a staff. He was assigned to establish a new system of postal routes from Falmouth, Massachusetts (now Portland, Maine) to Savannah, Georgia., with as many connections in between as he saw fit. Franklin hired his son-in-law-Richard Bache as his deputy, and the disappointed Goddard as chief surveyor, and set about replicating the system that he’d built for the British Crown. As only a man who already knew the territory could do, he quickly set up new post offices and hired local postmasters to run them. Unfortunately, few documents from Franklin’s term as Postmaster General remain to provide details of his decisions. But he was so successful at taking business away from the Crown’s mail service in the colonies that by Christmas that year, it was so starved for business it had to shut down, according to Gallagher. Franklin also took advantage of his franking privilege to send out his usual prolific output of letters, playfully replacing his franking symbol with “B. Free Franklin” to show his defiance of the British. Franklin served as Postmaster General for only about a year. A few months after the founding fathers declared independence in July 1776, Franklin was dispatched to France to perform another important mission as an ambassador to the court of King Louis XVI. But the postal system that Franklin helped build continued to flourish, and became a critical part of the new democracy. His achievements were honored by putting him, along with George Washington, on the first U.S. postage stamps in 1847. READ MORE: The 10 Most Valuable US Stamps
<urn:uuid:406010e4-2aef-4f7e-94c2-b30f28a68e9d>
CC-MAIN-2023-23
https://www.history.com/news/us-post-office-benjamin-franklin
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647409.17/warc/CC-MAIN-20230531182033-20230531212033-00630.warc.gz
en
0.970352
1,786
3.6875
4
Are you managing multiple projects and wondering how you plan them on a single Gantt Chart? Gantt Chart is frequently used to manage a single project at a time. Devised by management consultant Henry Gantt in 1901, it shows the to-be-completed tasks allocated for a specific period, along with its start and end dates. All types of businesses dealing with various projects recognize the benefits of the Gantt chart. As it has evolved over the years, some tools offer the Gantt charts to display, - Interdependencies between the tasks, - Highlighting assignee involved in the project - Tasks completed before and after a specific task. What is the Gantt chart? It’s a graphical representation view used in project management. This chart is a plot of the time against the tasks allocated in the project. To run your project smoothly, create this chart before the start of the project. You can, - Easily view the order of the task. - Notice the project progress in terms of where you are and where you should be. - Task start and finish time, as each task has a time allotment. With the Gantt chart, you decide the course of action to take, plus monitor your projects to keep them on track. It assists in the planning phase of the project, When you set up a Gantt chart, you think on - Requirements or resources to create a task list? - Who is responsible for each task? - How long will each task take to complete? - What problems may occur while you build in contingency time? - What tasks are dependent on other tasks? - What tasks can start together? With a clear idea of the order of tasks, - Sharing the order of activities - Tasks that can occur at the same time, - One task must be complete before, - Others can start you can start filling in your Gantt chart. Once you have the Gantt chart designed and agreed upon by the project stakeholders, you can use this one document to keep your team updated and aware of their tasks and goals. All plans won’t run successfully, and it’s essential to change your plan at the right time. To modify your plan, update or reschedule your task to fit in the estimated milestone. As the developers, use multiple tools to accelerate the project development phase. A Program manager handles multiple projects and shares the same resource between two or more projects. In such cases, a single Gantt Chart combining the details of all the projects is required to give the details of resources, tasks, and required time for completion. The unique feature of having task details of all the projects on the same Gantt Chart is in the TeamBoard Jira plugin. Developed by the Devsamurai team, it is a unique design for program managers working on Agile projects. A clear visual layout gives a bird-view of the goals of all the projects, individual teams goals, sprints, milestones under the same Gantt Chart. Let’s discuss the unique features of Timeline View. 1. Drag and Drop your plans: By dragging and dropping your project plans, you can easily schedule your tasks against the Gantt chart. 2. Adjust your start and end date: The start and due dates can be changed on the fly, while keeping the tasks aligned, in sync with other tasks in the milestone. 3. A quick glimpse: A right-click gives you the details of the task and schedule. Change the schedule of each task with a simple dialog displaying the details. 4. Colors for tasks status: Set appropriate tasks colors in Gantt Chart. An impression of the Gantt Chart for stakeholders gives an idea of the project status and individual tasks. The status used is in progress, done, backlog, and blocked. Set and change your color preferences any time for any task. 5. Deadline driven: Timeline view gives a confident picture that fits the multiple daily tasks, a sprint, or a quarter release. 6. Break your project plan: Plan to start and finish every project. Timeline view breaks a big project into sprints. Check out the linked issues with the given tasks, to see projects together from start to finish. 7. Birds view on goals: Tasks displayed in Timeline are in the pipeline, that ladders up to project goals. From allocating resources, linking the tasks, issues, and schedule, view intermediate goals and milestones in the same chart. 8. Managing and preventing workload: Timeline helps you manage and prevent overload on team members. To make sure team members are not overburdened with work, it displays the resource working on the tasks and links the tasks with each other. 9. Dimensional view: It’s great to have a dimensional view of tasks lined up for project completion. This view identifies the tasks that are linked and unrelated unlined tasks that could start together without dependency. 10. Ease in adjustments: As most successfully planned and executed projects require adjustments, stretch the start and end day of the task or move the task horizontally to change the dates. Change the assignee or even the task title in a single click. Additionally, you can add attachments, link issues, create sub-tasks, add your work log details. 11. Detail view of all the projects in the same view: An essential functionality for program managers but usually missed in commercial tools. Programs managers can see the details of all the projects in the same Gantt Chart. It’s easy to allocate the same resources for multiple projects with different tasks. Timeline saves time and frustration while planning for different projects with limited resources at the same time. The unique clear view of planned tasks, ladders up the multiple projects and company mission. Leave behind productivity gaps in ongoing projects, and work on projects where the task falls between the cracks. Now planning product sprints is made easy with the Timeline view of TeamBoard, at every step of your milestone. Explore the Timeline for your project, the special feature of handling multiple projects is a boon for project managers working on Jira and Agile projects.
<urn:uuid:2c30d276-0674-46c5-a825-83c05c189e65>
CC-MAIN-2023-23
https://www.teamboard.cloud/timeline-view-manage-multiple-projects/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648000.54/warc/CC-MAIN-20230601175345-20230601205345-00030.warc.gz
en
0.907043
1,310
3.1875
3
This article is about modern ethnic group of Latvians inhabiting or coming from Latgale. For ancient Baltic people see Latgalians. |(c. 150,000 (est.))| |Regions with significant populations| c. 50 (est.) |Related ethnic groups| The Latgalians (Latvian: latgalieši, latgalīši) are the ethnic Latvians of Latgale, who speak a distinct dialect of Latvian and share a common culture that sets them apart from other Latvians. In the Latgalian language, the terms latgalīši and latgaļi have been traditionally used as synonyms describing both ancient and contemporary Latgalians as a part of the same continuum. The term latgalīši (in both meanings) prevailed in Latgalian literature and mass media during the first decades of the 20th century, whereas the term latgali has been consistently used (also in both meanings) in Latgalian literature and media published during the 1920s and 1930s in Latvia and from 1940 to 1988 in exile. Since the cultural revival of Latgalians in 1988, there is a tendency in Latgalian literature and media to follow Latvians in their use of both names. Modern Latgalians developed as a result of Latgale having developed separately from other parts of contemporary Latvia after it was divided between Sweden and Poland after 1621 Truce of Altmark, leaving most eastern part of Latvia under Polish control as Inflanty Voivodeship. This resulted in the Roman Catholic church becoming the main religious denomination in Latgale (while the rest of Latvia is traditionally Lutheran). The local dialects of Latvian language underwent a sound change probably due to Slavic influence, resulting in another feature distinguishing Latgalians from rest of Latvians. After first Partition of Poland in 1772 Inflanty was incorporated in Russian Empire. In 1865, as part of Russia's anti-Polish policies, a period of Russification was begun, during which the Latgalian language (written in Latin script) was forbidden. This ban was lifted in 1904, and a period of Latgalian reawakening began. First World War to Soviet era During the first independence of Latvia (1918–1940), Latgale was the only region of Latvia with strong regional political parties. Although Latvian governments mainly promoted a united Latvian culture, fostering assimilation of Latgalians, especially after the coup by Kārlis Ulmanis in 1934, the Latgalian language was also used. Books were published in Latgalian, it was taught in some schools, and people could choose to use Latgalian when communicating with the government. They were classified as a Narodnosti in the First All Union Census of the Soviet Union in 1926. In the Nazi German Generalplan Ost, as far as can be told from the surviving documentation, the Latgalians were scheduled for deportation, while only half of the Latvian population was to be treated so. The reasons for this difference are unclear, but possibly based on racist linguistic arguments, considering that the Nazis planned to physically remove 85% of the Lithuanians (whose language – and by erroneous inference ethnicity – has similarities to Latgalian). The Soviet period severely damaged Latgalian culture. Although publishing in Latgalian was generally banned, some political periodicals, like "Ludzas Taisneiba" ("Truth of Ludza") were published from the end of the 1940s to the 1960s in Latgalian. Russian and Latvian were the only recognized languages. Latgalians continued to publish books and periodicals abroad. Publishing in Latgalian in Latvia resumed during the Third National Awakening in the late 1980s but is still rare. The Latgalian language is mostly used at home in rural areas and Latvian is overwhelmingly used in official use and in urban areas. Some government protection for the Latgalian language is provided by the language law of 2000 which states that "the state guarantees the preservation, protection and development of the written Latgalian language as a historic form of the Latvian language." Some Latgalians consider themselves to be an ethnic group separate from Latvians. The majority opinion is, however, that present-day Latgalians are a subgroup of the Latvians who are united by a dialect, which has many regional varieties. The number of people who would identify themselves as separate from Latvians is unknown because the Latvian government does not identify Latgalians as a separate group in census data. 2011 Census of Latvia established that 8.8% of Latvia's inhabitants or 164 500 people daily speak Latgalian dialect. 97 600 of them live in Latgale, 29 400 in Riga and 14 400 in Riga region. Additionally, the majority view is that Latgalians appeared because Latgale was part of Poland for 100 years and later under Russian rule, while the rest of Latvia was under German and Swedish rule. Thus, Latvians living in Latgale are more Russified/Polonized as opposed to the rest of the Latvian people (who have undergone more prolonged Germanization).
<urn:uuid:c7ad634c-6043-4a96-a694-ded830260fd0>
CC-MAIN-2023-23
https://gateway.ipfs.io/ipfs/QmXoypizjW3WknFiJnKLwHCnL72vedxjQkDDP1mXWo6uco/wiki/Latgalians_(modern).html
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648695.4/warc/CC-MAIN-20230602140602-20230602170602-00230.warc.gz
en
0.965451
1,151
3.390625
3
Patient Success Stories Preserving the legacy of wildlife Our actions impact the environment and its wildlife. Our province is home to 587 wildlife species — one of the most diverse areas in the world. Wildlife health is an important indicator to the health of our environment. 95% of animals admitted to AIWC’s care are injured or orphaned due to human activity. Wildlife is critical to our survival, and with your support, we are working to ensure future generations can enjoy the animals that call our province home. 2022 YTD Statistics Patient Success Stories Great Blue Heron On April 27, 2023 this great blue heron came into care after becoming oiled. Animal care staff performed supportive care and ran blood tests which indicated that the heron was also suffering from an infection. The heron was treated for the infection and stabilized over the following week. Once stable a wash was performed on the heron to remove the oil, this is a very intensive and stressful procedure but they made it through! After another couple weeks of monitoring the heron, another blood test was run. The infection had cleared and the heron was waterproofed! They were released back into the wild where they belong on May 12, 2023! Great Horned Owl Great horned owl 22-1919 was touch and go for a while. They came into care in November of 2022 with extreme head trauma and an eye injury. They were quiet and unaware of their surroundings, making them unable to eat on their own for over a week, things did not look promising. Finally, after a lot of supportive care from the animal care team, the patient began to act brighter and more aware of their surroundings, and started to eat on their own! Once making sure the great horned owl was stable, our veterinarian performed surgery to remove the owl’s injured eye. Owls are the only raptor species that can survive in the wild with one eye since they have binocular vision (both eyes face forward and share the same field of view). This is unlike other raptors, with eyes on the sides of their head that do not share the same field of vision. The owl recovered from the surgery with no complications and was soon moved to an outdoor enclosure to acclimate to the temperature and begin flight conditioning. Once ensuring they were flying, landing, and finding their food appropriately, the great horned owl was released back into the wild in March of 2023! On August 27, 2022 this red fox was brought into AIWC in extremely poor condition after being found lying in a field. He was suffering from large infected wounds all over his torso, as well as dehydration and emaciation (starvation). For months our veterinarian and clinic team performed daily critical care on this patient. And finally, after all the treatments and a number of surgeries, he was able to be moved outside to begin reacclimating to the outdoors. His temperament changed substantially during his time in care. He went from nearly lifeless, barely able to stand up, to becoming extremely feisty and agile. After acclimating to the weather, reaching a healthy weight, and growing back all his fur, he was ready for release! Back to the wild! Western grebe 22-1876 was being attacked by another bird after landing on dry land. Grebes need large bodies of water to take flight and in poor weather they can often mistake roads as bodies of water. The grebe was admitted into care at AIWC in November of 2022. Aside from a few minor abrasions, the grebe was healthy and after a few days of monitoring to ensure their water proofing was 100%, the grebe was returned to the wild. If they aren’t water proof, they can drown or become hypothermic and die. When they land on roads, for example, it’s easy for their feather condition to become comprised and they need time in fresh water to realign their feathers again and restore waterproofing. In early July 2022, bald eagle 22-861 was found injured in a field by Dr. Judith Samson-French. The eagle was rescued and brought to our hospital for care. Thank you, Judith! Not only did the eagle have suspected rodenticide poisoning, but while he was down in the field, he was attacked by a coyote which left a significant head wound. For the first few days the eagle was in very poor condition and unable to stand. With supportive care by our team, the eagle slowly started to recover. Soon, they were able to stand on their own and they became feistier by the day – a great sign. After regular reassessments and some time in one of our outdoor enclosures to flight condition, the eagle was ready for release and here they go! In May of 2021 American badger 21-332 was found wandering around on the side of the road, alone. His sibling had been hit by a car and died, and their mother had been missing for over 24 hours. When he came into care he was 1.7kg. He required frequent formula feedings and a balanced diet, once weaned, to provide the right nutrients to grow properly. Within two months he grew into a feisty 10kg juvenile. Animal care staff prey tested him to ensure he could hunt and survive in the wild on his own, and he passed with flying colors. He was released back into the wild in August of 2021. Moose calf 19-360 came into care in June of 2019 from north of Calgary. She had fallen down a hill and become tangled in some pallets. A helpful farmer untangled her and let her be, checking in occasionally to see if her mother had returned for her. Unfortunately, after 24 hours, she had not returned. With the combined effort of multiple organizations, she was brought to AIWC for care. Luckily she took to the bottle right away! Moose calves are always with their mothers and this must be replicated in care. With consistent caregivers and steady care over 12 hours a day, she thrived! After 11+ months in care she was ready to return to the wild!
<urn:uuid:95b89f35-ab62-48a1-8458-308ac8791583>
CC-MAIN-2023-23
https://www.aiwc.ca/what-we-do/patient-success-stories/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644309.7/warc/CC-MAIN-20230528150639-20230528180639-00030.warc.gz
en
0.987208
1,285
2.6875
3
Leisure facility for children and young people A children's and youth recreational facility is understood to be a facility for open child and youth work . Often such devices are also called youth center , youth center ( JZ , JUZ , JuZe ) Jugendcafé , Jugendtreff , Jugendklub , Jugendfreizeitstätte , Jugendfreizeitheim ( JFH ), children Freizeitheim designated or similar. Some school shops are also institutions for open child and youth work. As Open House Houses (HoT), they offer children and young people low-threshold offers and programs. Often, individual institutions specialize in certain age and target groups (e.g. young people, gap children , girls, ...) and often express this in their own name. The offers of the respective institution are designed accordingly. Sections 11–15 ( youth work and youth social work ) of the KJHG (Child and Youth Welfare Act ) are the legal basis for most institutions across the country. The sponsors of youth leisure facilities are usually municipalities (cities or municipalities) as well as churches or other independent youth welfare organizations (e.g. DRK , ASB , local associations ...). The technical supervision usually has the local youth welfare office or the community youth care. Using the instrument of the youth welfare committee , among other things, the funding for the individual institutions is determined. As there is - in contrast to the legal right to a kindergarten place - in Germany so far no binding obligation for the municipalities to operate youth leisure facilities, facilities are repeatedly threatened with closure - in the course of general austerity measures. Typical work focuses and the associated socio-educational concepts of children's and youth recreational facilities are often a combination of several of the following approaches: - Prevention and leisure education: Alternatives to "hanging around" and boredom through attractive programs (e.g. discos , holiday programs, children's and youth camps, group offers ) as well as non-binding meeting opportunities in the café with play facilities ( table football , table tennis , billiards and games rental are typical at the Counter) - Advice and individual help: in difficult life situations and with problems typical of young people (e.g. transition from school to work, parents , drugs , love and sex , legal issues) - Culture and subculture : Realization of youth cultural events (e.g. concerts , music festivals , youth theater) - Education : Seminars and workshops on topics relevant to young people (e.g. group leader training , application training, self-defense course , internet seminar) - Participation : Participation, opportunities to participate in programs and projects, in teams and working groups (e.g. café team, disco team, concert working group) and possibly in committees or the youth house association - Party-zipation: rooms and free spaces for teenagers and young adults, (e.g. rentals and private use of rooms outside of opening hours, room allocation to different user groups, rehearsal rooms for local school bands) - Community orientation and networking : Cooperation with schools , associations, institutions and local initiatives on youth issues, service and rental of play equipment or event technology for youth and cultural events - Media educational projects: Introduction and training of young people in handling the future-oriented new media (film projects, Internet, website design, etc.) Self-managed youth houses The term self-governing means that no social pedagogues have decision-making power in the youth center. Instead, it is mostly the counter service or the board of directors or a general assembly of young people who decide on the use of the finances, based on democracy. In this context, young people can discover themselves and their abilities. They also learn how democracy works, how to assert interests that others accept and that not everything can be fair to everyone. Often there is a lack of financial means because the cities only support such institutions to a limited extent (or not at all). The oldest self-administered youth center still in existence in Germany is that of Aktion Jugendzentrum Backnang e. V. , founded and entered in the register of associations on April 6, 1971. Also in 1971, the self-administered Aktion Jugendzentrum Neumünster e. V. (AJZ), as well as on November 15, 1971 the youth club Wadrill e. V. In the 1970s, the question of self-administration and co-determination was often one of the main lines of conflict between groups that favor peaceful cooperation or coexistence with the communal authorities, such as the Working Group of Young Socialists of the SPD (Jusos) and the Socialist German Workers' Youth (SDAJ ) on the one hand and the left-wing radical or spontaneousist groups or individual young people who rely on confrontation and often also still continuous class struggle. Self-government was repeated in the 1970s and in some cases persistent attempts to enforce with squatting (e.g. in Bremen the Haus Auf den Häfen, in West Berlin the Georg-von-Rauchhaus , the Tommy-Weisbecker-Haus , the Putte in Wedding, the workers' youth center Bielefeld and the Erich-Dobhardt-Haus Dortmund). Mobile youth centers In areas where there are no permanent youth centers, mobile youth centers (in the form of buses, for example) can bring their functions to the spot and thus give access to children and young people who otherwise live too far away. One example of this is the mobile youth center Of (f) Road , a joint project of the Kaiserswerther Diakonie and the Düsseldorf youth welfare office for the north of Düsseldorf. A converted former bus offers games, contacts, a cozy seating area and internet access. Youth cultural works and centers The so-called youth cultural centers and centers represent a special kind of children's and youth recreational facilities, the focus of which is on a wide range of cross-generational and cross-national offers in the cultural and sporting fields as well as in the creative, artisanal and creative fields; in their own workshops and technical rooms, these offer an inexpensive or even free alternative to commercial facilities. The "Youth, Culture and Work Center Grenzallee" in Berlin can be seen as a good example of such a center. Youth leisure facilities as low-threshold offers particularly reach disadvantaged, socially disadvantaged young people who are often excluded elsewhere ( exclusion ). The typical visitor structure of a youth recreational facility with its high proportion of young people from migrant families of multi-cultural origins, a disproportionate proportion of secondary and special school students and a high proportion of behavior-difficult to violent, preferably male adolescents, reflects overall social imbalances. Depending on the facility and the focus of work, additional young people target groups are addressed with additional offers. In “ gender mainstreaming ” with gender-specific work with girls and, in recent years, increasingly through work with boys, attempts have been made to improve equal opportunities for both sexes. Children's offers (Lücke meetings) and teen clubs are aimed at younger age groups. In some institutions there are upper age restrictions in order to counteract the displacement of children by young people. Courses and special one-on-one events are often aimed at adults or volunteers. As a rule, social pedagogues , social workers , youth and home educators and educators or other educational specialists are employed as full-time educational staff in children's and youth leisure facilities . Often part of the work is carried out and made possible by federal volunteers, FSJ'men , volunteers and committed individuals. Various youth institutions are in turn joined together in working groups or associations (e.g. AOJA in the district of Tübingen, district youth associations, state youth associations). Work aids (e.g. ABC of the youth centers) are often published there or other advisory services are made. - ↑ Dirty feet . In: Der Spiegel . No. 32 , 1971 ( online ). - ↑ Creative donation idea: Düsseldorfer Sparkasse for the youth. In: Kaiserswerther Mitteilungen, 3/2009 (143rd volume). - ↑ Donation projects : Youth work becomes mobile - the “Off-road Bus” project is picking up speed ( memento of October 17, 2011 in the Internet Archive ). To: Kaiserswerther Diakonie - Help from here. . - ↑ http ://www. limitallee.com/ (youth, culture and work center Grenzallee, Berlin)
<urn:uuid:d5d1a1f9-7162-4862-b980-808921e5fa5d>
CC-MAIN-2023-23
https://de.zxc.wiki/wiki/Kinder-_und_Jugendfreizeiteinrichtung
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646937.1/warc/CC-MAIN-20230531150014-20230531180014-00430.warc.gz
en
0.929105
1,846
2.59375
3
How is a solar energy system priced? When installing a solar panel system into your home, you will want an idea of the costs of the various pieces of equipment that make up your system. Installing a solar energy system isn’t a small investment. There are the equipment costs, the costs of installation, and other services that we provide during your solar energy system’s installation. We will give you an insight into how a solar energy system is priced. So you can understand the value of a solar energy system and the work that goes into installing one on your property. Understanding solar energy systems Transitioning to solar power requires a bit of learning and understanding about how the system will work and operate on your property. We help our customers through this process by breaking down and explaining each step of the installation process beginning from our first conversation. If you are keen to start learning, there are plenty of resources to help you get started. A good starting place is the Department of Energy’s website or other free online resources. Taking the time to research and understand solar energy systems will make the entire installation process smoother and easier to understand. You might be looking into the various pieces of equipment that go into a solar energy system. These pieces of equipment will be part of your home and energy system. Doing some research into the different brands and models can give you an idea of how they operate, their efficiency, and their cost. Solar energy equipment comes with data sheets that provide a detailed breakdown of technical specifications. When browsing through equipment, we will run you through the options we have on offer. We will also explain which ones are the most suitable for your property, and work out a system that will suit your needs and budget. Solar Panels: Solar Panels are an assembly of photovoltaic cells that capture the sun’s energy and convert it into electricity. The higher-end solar panels will produce much more energy over a smaller surface area. They also tend to last longer than other panels. Inverters: The function of an inverter is to convert the DC power that your solar panels are generating into AC power for your property. The kinds of inverters for solar panels are String inverters (Central inverters), power optimizers that are connected to a single string inverter, or micro inverters built into or attached to the solar panels. Our article on how inverters work offers a detailed breakdown of how they work in a solar energy system. Mounting Systems: There are multiple ways to mount a solar energy system on your property. Solar panels can be mounted on your roof if it is suitable to hold the weight of all the equipment. If your solar system is being installed on the ground, we can equip a tracking system. So you can monitor and make the most of its energy production. Figuring out which arrangement will be most suitable for your home is part of the installation procedure, a complicated system will require more expensive mounting equipment. Cost of installation, groundskeeping, and permits. Installing a solar energy system will also require the help of skilled specialists. They understand the proper installation methods and have the technical knowledge to get your system up and running. Groundskeeping might be needed to make your property suitable. We will also need to have permits to start the installation and afterward to get it running. These are just some additional costs that might come up during a solar energy installation. Warranties: A solar energy installation will come with multiple warranties. There is of course the warranty on the installation itself and the warranties of the individual pieces of equipment. The warranties for each can vary in coverage and time, so be sure to ask us about the warranties on our services and your system’s equipment. Roofs: If you are looking to have your solar system installed on your roof, we will have to see how complex the layout of your roof is. Your panels will be laid out and mounted to generate the most energy it can, a tricky roof layout can require additional labor and equipment. Trimming and/or cutting down trees: If there are trees on your property, they might get in the way of your solar panels. You might need to have tree branches trimmed, pruned, or cut down entirely. This way your solar panels can maximize their energy production without any obstacles. Electrical Upgrades: With a solar energy install, your property’s electrical system might need an upgrade to fit code. It would be best to do a check and upgrade in advance to avoid the additional cost and time needed during your solar energy installation. Installing a solar energy system on your property All of the information above should give you an idea of how a solar energy system installation is priced. If you want specific information for a solar energy installation on your property. Our website has a free online estimate tool that generates a personalized report for you from a simplified questionnaire. That report will contain the potential savings you can net, and the cost of a solar energy system installed on your property. You can also contact us directly via phone at +1 (602) 363-8919 or via email at email@example.com for more information regarding solar energy for your property.
<urn:uuid:e03b4c6d-3f5f-4521-960f-c27943782f8e>
CC-MAIN-2023-23
https://goelitesolar.com/energy/how-is-a-solar-energy-system-priced/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649439.65/warc/CC-MAIN-20230604025306-20230604055306-00430.warc.gz
en
0.935244
1,069
2.59375
3
New possibilities for life at the bottom of Earth's oceans, and perhaps on other planets [Nov 27, 2021: Karin Valentine, Arizona State University] A chimney structure from the Sea Cliff hydrothermal vent field located more than 8,800 feet (2,700 meters) below the sea’s surface at the submarine boundary of the Pacific and Gorda tectonic plates. (Credit: Ocean Exploration Trust) In the strange, dark world of the ocean floor, underwater fissures, called hydrothermal vents, host complex communities of life. These vents belch scorching hot fluids into extremely cold seawater, creating the chemical forces necessary for the small organisms that inhabit this extreme environment to live. In a newly published study, biogeoscientists Jeffrey Dick and Everett Shock have determined that specific hydrothermal seafloor environments provide a unique habitat where certain organisms can thrive. In so doing, they have opened up new possibilities for life in the dark at the bottom of oceans on Earth, as well as throughout the solar system. Their results have been published in the Journal of Geophysical Research: Biogeosciences. On land, when organisms get energy out of the food they eat, they do so through a process called cellular respiration, where there is an intake of oxygen and the release of carbon dioxide. Biologically speaking, the molecules in our food are unstable in the presence of oxygen, and it is that instability that is harnessed by our cells to grow and reproduce, a process called biosynthesis. But for organisms living on the seafloor, the conditions for life are dramatically different. "On land, in the oxygen-rich atmosphere of Earth, it is familiar to many people that making the molecules of life requires energy," said co-author Shock of Arizona State University's School of Earth and Space Exploration and the School of Molecular Sciences. "In stunning contrast, around hydrothermal vents on the seafloor, hot fluids mix with extremely cold seawater to produce conditions where making the molecules of life releases energy." In deep-sea microbial ecosystems, organisms thrive near vents where hydrothermal fluid mixes with ambient seawater. Previous research led by Shock found that the biosynthesis of basic cellular building blocks, like amino acids and sugars, is particularly favorable in areas where the vents are composed of ultramafic rock (igneous and meta-igneous rocks with very low silica content), because these rocks produce the most hydrogen. Supporting life beyond Earth could be possible thanks to graphene innovation A protein may be the key to achieving a long and healthy life Besides basic building blocks like amino acids and sugars, cells need to form larger molecules, or polymers, also known as biomacromolecules. Proteins are the most abundant of these molecules in cells, and the polymerization reaction (where small molecules combine to produce a larger biomolecule) itself requires energy in almost all conceivable environments. "In other words, where there is life, there is water, but water needs to be driven out of the system for polymerization to become favorable," said lead author Dick, who was a postdoctoral scholar at ASU when this research began and who is currently a geochemistry researcher in the School of Geosciences and Info-Physics at Central South University in Changsha, China. "So, there are two opposing energy flows: release of energy by biosynthesis of basic building blocks, and the energy required for polymerization." What Dick and Shock wanted to know is what happens when you add them up: Do you get proteins whose overall synthesis is actually favorable in the mixing zone? They approached this problem by using a unique combination of theory and data. From the theoretical side, they used a thermodynamic model for the proteins, called "group additivity," which accounts for the specific amino acids in protein sequences as well as the polymerization energies. For the data, they used all the protein sequences in an entire genome of a well-studied vent organism called Methanocaldococcus jannaschii. By running the calculations, they were able to show that the overall synthesis of almost all the proteins in the genome releases energy in the mixing zone of an ultramafic-hosted vent at the temperature where this organism grows the fastest, at around 185 degrees Fahrenheit (85 Celsius). By contrast, in a different vent system that produces less hydrogen (a basalt-hosted system), the synthesis of proteins is not favorable. "This finding provides a new perspective on not only biochemistry but also ecology because it suggests that certain groups of organisms are inherently more favored in specific hydrothermal environments," Dick said. "Microbial ecology studies have found that methanogens, of which Methanocaldococcus jannaschii is one representative, are more abundant in ultramafic-hosted vent systems than in basalt-hosted systems. The favorable energetics of protein synthesis in ultramafic-hosted systems are consistent with that distribution." For next steps, Dick and Shock are looking at ways to use these energetic calculations across the tree of life, which they hope will provide a firmer link between geochemistry and genome evolution. "As we explore, we're reminded time and again that we should never equate where we live as what is habitable to life," Shock said. For more science news stories check out our New Discoveries section at The Brighter Side of News. Like these kind of feel good stories? Get the Brighter Side of News' newsletter. Tags: #New_Discoveries, #Oceans, #Gold, #Mining, #Science, #The_Brighter_Side_of_News
<urn:uuid:7d10516a-5dad-4133-a822-1686a8937162>
CC-MAIN-2023-23
https://www.thebrighterside.news/post/new-possibilities-for-life-at-the-bottom-of-earth-s-oceans-and-perhaps-on-other-planets
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648858.14/warc/CC-MAIN-20230602204755-20230602234755-00630.warc.gz
en
0.943203
1,183
4.0625
4
This past week I encountered two groups of students (5th/6th grade) of contrasting culture, though possessing a raw impulsiveness. One (Expeditionary Learning model) is well versed in the concrete facts of their physical world. The other (Montessori method) is more imaginative in their outlook. Still, in a unique way they expressed a deliberate self-will. There actions, planned or immediate, were deemed as only natural without thought of moral consequence. Now, what happens when they become discontent perhaps come to despair with the sinful world they inherit? This is not to say that these children were terrors. Actually, there were a number of redemptive qualities for each group. What I am really getting at is the world view these young ones held. If continued in thought/practice as they grow older, there will surely be disastrous outcomes. Like I said, a raw impulsiveness. In other words, will anybody be able to control them when they come of age? Someone who can direct these headstrong beings shall very likely be of the same mind, just only more cunning. The first of the two are definitely textbook learners, with the ability to comprehend technical ideas. Displaying excellent communication and motivation, they seem well on their way adapting to the modern world. What may bite this world a decade or so from now is their self-awareness in their role of the evolutionary process. For you see, they spoke indirectly of a view on morals that combines the necessity of animal survival and contemporary social rules. Believing they are animals on close terms with all members of this kingdom, their bodily needs are practically as important as what is right. After all, the first core value of their education model is “The Primacy of Self-Discovery.” The second is of a more tactile drive, learning according to their individual abilities. They can be intensely engaged and focused on what interests them. Likewise they possess a genuine innocence, a dreamy sense of wonder for the world around them. Behavior often hinges on childishness, not child likeness, for most of them. They are trained to adhere more to their wants than what is outside their concern. Self-control being of secondary value, they are not reliable to adapt to social environments or work together in ongoing tasks. The world is pretty much extensions to their personally customized class rooms. The inspiration/founder of both educational systems were ‘reformers’ discontent with contemporary society of the early 1900s. They were advocates for science by their own distinction, sharing the attitude that the approach needed to be more man-centered on the individual student. Kurt Hahn, whom Expeditionary is based on, believed that youth were innately good, needing to grow in self-development, less they be corrupted by society at large. Maria Montessori, physician & psychologist, desired children to be influenced in their self-direction towards the “spirit” of science, with the intended goal of curiosity for imaginative mastery of the “mechanics.” C.S. Lewis, lead Christian author of the 20th century, wrote a lesser known character of a rather forgotten book, which illustrates an ideological force lying in wait to engulf civilization. In “The Pilgrim’s Regress,” the newly converted Lewis depicts the nihilistic ‘Savage’ as a sophisticated conqueror in barbarian dress. He represents a mindset/spirit not of a unique personality but an apathy to modern society due to disillusion from all the ideals and promises unmet. Casually under his elaborate orders are social movements akin to fascism and communism. The beings for these ideologies in Lewis’ allegory are sub-human trolls, meant to be a parody of the grand ideal humanity is supposed to become under these social systems. Savage was raised in the world below his “honey-combed” mountain fortress. Leaving it behind, seeing it as vain talk, he desires to destroy it, for according to him, “The excellent deed is eternal. The hero alone has this privilege, that death for him is not defeat, and the lamenting over him and the memory is part of the good he aimed for; and the moment of battle fears nothing from the future because it has already cast security away [italics added] (“Furthest North” of book 6).” This mode of thought is the extreme product of a world view/morality based on the individual will. Being social beings, we assemble ourselves with those of a likeminded will. This applies to a desire to carve out a world for the ‘truly’ fit or one forcefully levelled for all to be equal in social standing. The expeditionary students seemed ready to decide who/what would thrive after the culling of survival. The Montessori pupils only care to strive for what catches their immediate fancy. Those who can manipulate such raw yet refined impulsiveness, can acquire a self-driven horde for self-justified amoral acts, as well as systems of savagery. Lord Jesus Christ, may your Spirit be with us disciples of your Word, to speak and live the Truth before the deceived younger generations, while encouraging those who know You to allow your will be done. “In the beginning a was the Word, and the Word was with God, and the Word was God. He was in the beginning with God. All things were made through Him, and without Him nothing was made that was made. In Him was life, and the life was the light of men. And the light shines in the darkness, and the darkness did not comprehend it. There was a man sent from God, whose name was John. This man came for a witness, to bear witness of the Light, that all through him might believe. He was not that Light, but was sent to bear witness of that m Light. That was the true Light which gives light to every man coming into the world. He was in the world, and the world was made through Him, and the world did not know Him. He came to His own, and His own did not receive Him. But as many as received Him, to them He gave the right to become children of God, to those who believe in His name: who were born, not of blood, nor of the will of the flesh, nor of the will of man, but of God.”John 1:1-13
<urn:uuid:0d51c11b-f574-4b4e-b476-b67b394170e3>
CC-MAIN-2023-23
https://knowledgeandtheholy.blog/2019/03/16/educating-students-for-savage/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644907.31/warc/CC-MAIN-20230529173312-20230529203312-00630.warc.gz
en
0.98136
1,323
2.671875
3
Coastal southern California; Rancho La Brea, Baja California In Our Region: Found in the San Diego Formation of southwestern San Diego County and northern Baja California Pliocene fossil bird remains are particularly rich in the southern California area, with over 24 species being recovered from the San Diego Formation alone. The first published record of any fossil bird from California was in 1901 for the species designated as Mancalla californiensis. The extinct flightless auks are represented by fossils of at least three species within the genus Mancalla in the San Diego Formation: Mancalla milleri, M. emlongi, and M. diegensis. These birds stood about a foot tall (30 centimeters.) The legs were short and slender as opposed to the chunky legs of penguins. Although these birds could not fly, they were adept as wing-propelled swimmers, with very flattened, paddle-like wing bones that helped push them through the water. Like other members of the family Alcidae, they would have “flown” underwater with wings outspread. Paleontologists also believe that the rigidity of the vertebrae may have helped them adapt to swimming. Birds in this genus were the most common bird of the San Diego Formation, with thousands of fossils being recovered. Modern alcids are not flightless, but are diving birds that also use their powerful wings to swim. They are found in the Northern Hemisphere, and include the murres, Atlantic puffins, razorbills, and guillemots. It is likely that, here in the Northern Hemisphere, the flightless auks occupied a similar ecological niche that the penguins fill in the Southern Hemisphere. They may have lived in large groups, much as modern penguins do today. Both alcids and penguins are extremely proficient divers; some alcids have been captured at depths of 180 meters (590 feet!) Scientists postulate that flightless birds most likely developed in conditions where there was an abundant and regular supply of food, and a lack of predators, or at least where predators were rarely encountered. These seemingly ideal conditions may have been present in San Diego’s Pliocene embayment. There was apparently an abundance of fish for these birds to feed on, and there may have been islets and islands off shore that allowed them to avoid the majority of large mammalian predators. These islands could have served as rookeries for young birds, also. Why would it be favorable for survival for a bird to lose the ability to fly? Large flight wing muscles and bones require much energy to maintain. In a safe supportive environment, Mancalla and many other birds conserved energy by becoming flightless over time. The physical mechanism for this transformation to flightlessness involves the simple alteration of a few genes that control development, so that the adult bird has many features of the flightless young chick. Feathers became more open and less tightly constructed and the bird’s overall size tended to become larger, with a bigger pelvic region and hind legs. In many ways the adult flightless Mancalla would have looked like a large, overgrown chick. Another member of the Alcidae that has become extinct did so only during very recent times. The Great Auk, or Pinguinis impennis, a large black and white flightless seabird found in the north Atlantic, was often seen by fishermen offshore. Standing as tall as two feet (60 centimeters), these birds were slow and awkward on land. During its nesting period of a few weeks each summer the birds waddled onshore to lay their eggs in huge colonies on the islands off Greenland, Iceland, Labrador, Great Britain, and Europe. Laying only a single egg and having little or no defense against human predation, the birds were slaughtered by the thousands by hunters and their eggs collected as well, with the sad result that they became extinct by 1844. Part of their vulnerability could be attributed to the fact that as large, plump birds they, and their large eggs, made more tempting targets for hunters than other smaller birds. Like modern penguins, their colonial nesting habits also put them at risk. Of Historical Interest Great Auk images figure in several prehistoric cave paintings in France and Spain. Abbott, Patrick L. 1999. The Rise and Fall of San Diego. San Diego: Sunbelt Publications. Chandler, Robert M. 1990. Fossil Birds of the San Diego Formation. Ornithological Monographs No. 44. Washington, D.C. Feduccia, Alan. 1996. The Origin and Evolution of Birds. New Haven: Yale University Press. Olson, Storrs L. 1985. The fossil record of birds. In: Farner, D. S., King, J. R. and Parkes, K. C., eds., : Avian Biology Vol. 8. NY: Academic Press. Illustration: Doug Henderson
<urn:uuid:a897d570-3695-41de-bb63-10ab9dffd148>
CC-MAIN-2023-23
https://www.sdnat.org/exhibitions/fossil-mysteries/fossil-field-guide-a-z/flightless-auk/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224650264.9/warc/CC-MAIN-20230604193207-20230604223207-00430.warc.gz
en
0.962314
1,062
3.84375
4
Vaccinating young kids might finally be possible this month. But will it be easy? AILSA CHANG, HOST: Well, after a long wait, COVID-19 vaccines could finally be available really soon for very young children. We're talking about kids under 5 years old. Dr. Ashish Jha, the White House COVID 19 response coordinator, delivered these words yesterday. (SOUNDBITE OF ARCHIVED RECORDING) ASHISH JHA: We expect that vaccinations will begin in earnest as early as Tuesday, June 21, and really roll on throughout that week. CHANG: It is news that some parents around the country have been waiting for for what seems like forever. So we have brought Dr. Jha back to the show to talk about this announcement and answer some questions about the vaccination plan going forward. Welcome. JHA: Thank you for having me back. CHANG: OK. So even though parents of this age group have been waiting so long for a vaccine, I want to ask you, if we look at the next age group up - that's 5 to 11-year-olds - vaccination was authorized for them six months ago. And only about 30% of that age group is fully vaccinated. Do you have any reason to believe the vaccination rate will be any better for these younger children? JHA: Yeah, so that's a great question. I think we have to continue to do a better job of explaining why vaccines are such an important way of protecting children. There's a lot of misinformation out there about kids and COVID. And, you know, we have to counter that. And we have to help parents understand that if you want to protect your children moving forward, vaccines represent the best way to do it. CHANG: Right. But do you feel the administration has failed somewhat with the 5 to 11 age group in getting them vaccinated more fully? JHA: No. I think, look. The administration has made these vaccines widely available. I think we have worked with pediatricians and family practitioners, and we've got to do more of that. We've got to keep going. We've got to help parents understand that if - in this pandemic, the pandemic is not over, that COVID is still out there, we're going to see other variants. And we want to protect children, and the best way to do it is through vaccines. CHANG: And what is the plan then to improve the vaccination rate among not just 5 to 11-year-olds, but also among these younger kids as well? JHA: Yeah. At the end of the day, you know, I'm a parent, and when I think about decisions I make for my kids, I am really guided and shaped by my pediatrician or my kid's pediatrician or family practitioner. So one important part of the plan certainly is to work with trusted medical providers. And the American Academy of Pediatrics has been very strong and very clear on this. I think getting more information out to pediatricians and family practitioners and helping them communicate directly to parents, I think, will also make a really important difference. CHANG: I am curious, though. Do you see these lower vaccination rates among children as - it's an issue of mistrust in the vaccines, or is it more about parents making an informed, deliberate choice? Because data does show that these vaccines provide only modest protection for kids. What do you think the issue here is? JHA: I think there are a couple of things. One is from the beginning of this pandemic, we have seen a downplaying of COVID. You've heard over and over again that somehow COVID is not a big deal. And the way that that has been set up is by saying it's less risky than it is for elderly people. Well, that's always true. Every disease is lower risk for children than it is for the elderly. The real question is, how does COVID compare to other risks children face? And COVID is a real challenge. And what we know is that the vaccines provide terrific protection against severe illness for kids as well as adults. And I think we have to make that - help parents understand that. And I think as we make that case, I think more parents will choose to get their kids vaccinated. CHANG: Do you think the delay in making the vaccine available for these youngest kids has has affected the course of the pandemic in a significant way in this country? What do you think the impact has been? JHA: Well, it's - certainly for the parents of kids under 5, it's been an incredibly frustrating period. And I have a lot of friends who have kids under 5. They have been, I think, frustrated by the delay. But it isn't - the issue is that when you think about kids under 5, you've got to get the right dosing. You can't just use an adult dose. You know, obviously, these are smaller humans, and so we want to get the dosing right. You want to make sure that it's safe and effective in this population. And that has all taken time. And I think the companies have worked quickly. I think the FDA has worked quickly. But at the end of the day, we've always wanted to get it right. We thought that was the most important thing. CHANG: Right. Well, I want to talk about your job in particular, because, you know, in many ways - it feels like this to me, it feels like this to my friends, my colleagues - that people all over the U.S. are just sort of moving on right now, like, either pretending the pandemic is over or simply deciding for themselves that the risk of infection is acceptable. And I'm wondering, does that shifting mindset now, does it make your job harder these days? Does it make it harder to get the message across from the White House that we still need to care about COVID? JHA: Well, the way I look at it is that the goal was always to make COVID less disruptive, to make COVID less harmful to the American people. We've made an incredible amount of progress on that. So I think that's a good thing, by the way, Ailsa. That's not a problem. That's a good thing. And the way we've done it is by making sure that, you know, that vaccines are widely available. Two-thirds of Americans are now fully vaccinated, a third are boosted. We've done a lot to make treatments available. The fact that COVID creates less fear is a good thing. That's always been a goal. Now, we still have a messaging challenge, which is we have to help people understand that COVID is not over - doesn't mean that it needs to rule our lives the way it did a year ago, but that we need to still take precautions to make sure we have plenty of vaccines and treatments, continue to do the things that we know will protect Americans. That's still on the agenda. CHANG: That is Dr. Ashish Jha, White House COVID-19 response coordinator. Thank you very much for joining us again today. JHA: Thank you for having me back. Transcript provided by NPR, Copyright NPR.
<urn:uuid:efcca77c-f8bd-4fe9-a69e-e6e7de14aa78>
CC-MAIN-2023-23
https://www.kzyx.org/national-news/national-news/2022-06-03/vaccinating-young-kids-might-finally-be-possible-this-month-but-will-it-be-easy
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224651325.38/warc/CC-MAIN-20230605053432-20230605083432-00030.warc.gz
en
0.981256
1,518
2.5625
3
How to Grow Daylilies If there's a "sure bet" perennial, it must be the daylily. They thrive from Minnesota to Florida (zones 3 to 9), tolerate a wide variety of soil conditions, are not troubled by diseases or pests, and bloom faithfully for years with virtually no attention. The daylily's botanical name, Hemerocallis, means "beauty for a day", and indeed most daylily flowers open in the morning and die by nightfall. However, each flower stem (also called a scape) typically has at least a dozen flower buds, so the plant stays in bloom for several weeks. Unlike most perennials, daylilies are well-suited to many different uses in the garden and landscape. The shorter, more compact varieties work well planted directly into perennial borders, where their blooms provide a welcome mid-summer boost. In groups of 3 or 5, daylilies are ideal for landscape plantings, especially when paired with ornamental grasses and small shrubs. Daylilies are also the perfect plant for mass plantings along a fence or walkway, where they'll form a dense, weed-proof display. How to Select a Daylily There are several different species of daylilies, including the ubiquitous pale orange roadside lily (Hemerocallis fulva), the night-blooming Hemerocallis citrina, and the fragrant lemon lily (Hemerocallis flava). Most of the daylilies planted by home gardeners are hybrid cultivars. Flower breeders have had a field day with daylilies and there are now thousands of named cultivars. These cultivars can be grouped in a variety of ways: by bloom time (early, mid-, and late), flower color (white to yellow, pink and purple), scape height (6 inches to 3 feet tall), and flower form (trumpet, double, ruffled, recurved). By choosing early-, mid-, and late-flowering cultivars, you can have daylily flowers blooming through most of the summer. If you also mix various heights, flower colors, and flower shapes, you can enjoy new and different flowers each day. Professional horticulturists separate daylilies into several additional categories. Here are some of the terms you may encounter: - Diploid: These cultivars have 22 chromosomes in the plant. They tend to have more numerous, but smaller flowers than tetraploids, and a graceful, old-fashioned form. Many double-flowered daylilies are diploids. - Tetraploid: These daylilies have 44 chromosomes. Tetraploid daylilies tend to have larger, more intensely colored flowers than diploids. They're also supported by stronger, sturdier scapes. - Miniature: These compact varieties range from 12 to 25 inches tall. Flowers are smaller, too. They're excellent for small spaces and for planting directly in the perennial border. - Dormant: The foliage of these cultivars dies back to the ground in fall regardless of the weather. These cultivars grow best in cold climates. Most daylily cultivars fall in this category. - Evergreen/Semi-Evergreen: Some daylilies have foliage that stays evergreen or semi-evergreen all winter in mild areas. These cultivars are best adapted to warm-climate areas. - Reblooming: Some daylily cultivars will bloom a number of times during the summer. In general, daylilies have a main bloom period in summer, followed by intermittent blooms, often right up until frost. Removing the faded flower heads encourages reblooming. Daylilies flower best when planted in full sun (6 hours/day), on moist, yet well-drained soil. In hot climates, dark-colored cultivars should receive some afternoon shade to help them retain their flower color. When planted in the correct location, daylilies will flower for years with little care. They do not require fertilization other than a yearly addition of compost. If buying daylilies by mail, plant them within a few days of receiving them. In the South, plant in spring or fall while temperatures are still cool. In the North, daylilies should be planted in spring so they have plenty of time to get established before winter. However, daylilies are such tough plants, that in the North, most can be planted anytime from spring through fall. Amend the soil with compost before planting. Space plants 12 to 18 inches apart and plant so the crown is about 1 inch below the soil surface. Water well and mulch with bark or straw to conserve moisture and prevent weeds from growing. Although resilient once established, young transplants should be kept free from weeds and well watered the first year. Daylilies have few pests. However, a new daylily disease--a type of rust--has been spreading throughout the county, attacking many plants. To control this disease, keep the area around daylilies open and airy, remove diseased foliage, and water plants when rainfall is insufficient. One of the few routine maintenance chores needed when growing daylilies is dividing them. Depending on their growth, your daylily clump will usually become crowded after four to five years and flowering will diminish. In most areas, late summer is the best time to divide daylilies. In the North, early spring is an alternate option, especially if the weather typically turns cold quickly in fall. Dig up individual clumps and put them on a tarp. Use a sharp knife or spade to separate healthy young plants (fans) with strong root systems. Cut back the foliage and replant immediately in compost-amended soil or plant in containers for holding. You'll have many extra plants from each clump to give away to friends and neighbors. Discard any small or diseased plants. In northern areas, newly planted daylilies can be mulched in late fall. This is important for young plants which otherwise may be heaved out of the ground the first winter. Dead foliage can be removed in spring, unless it was diseased. In that case it is best to remove it in fall. Last updated: 12/14/2022 Share this Article: Get the Dirt Stay up to date on new articles and advice. Please fill out the information below.
<urn:uuid:37d38b03-b575-4f78-b062-45e983267ff9>
CC-MAIN-2023-23
https://www.gardeners.com/how-to/growing-daylilies/8104.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647639.37/warc/CC-MAIN-20230601074606-20230601104606-00430.warc.gz
en
0.927603
1,359
3
3
Are eggs acidic or alkaline? Are eggs acidic or alkaline explains how eggs are effective in an alkaline diet. One of the most common questions I get asked is Are eggs acidic or alkaline? There’s a very simple answer: Yes, of course eggs are acidic! But that begs many more questions: - Why do I say “of course”? - Why do you ask if eggs are acidic? - Does it matter that eggs are acidic? Before I answer those, here are some facts about eggs. Now, there are many types, such as duck eggs, goose eggs, turkey eggs, and quail eggs, I’m going to focus on the humble hen egg. Getting good balance in your alkaline diet is vital. The balance of acid to alkali in a pH balanced diet depends on portion size. In Acid-Alkaline Dairy and Egg Products Food Chart, I list the PRAL values for many ways of preparing eggs. In that list, we see Egg, whole, cooked, scrambled with a PRAL value of 7.59 for 100g. Now, this is a very precise number. We need to remember that PRAL is affected mostly by portion size. But, it is also affected by: - Hens diet - Cooking method - Our own metabolism Therefore, PRAL values, despite their precision, are best thought of as a range. It just happens that a typical serving of two large eggs scrambled is around 100g. So, we can say that the PRAL of eggs is 7 to 8 in a typical meal. Of course, eggs are acidic! Eggs are a valuable protein source. Protein is the biggest factor in PRAL calculation. 100g scrambled eggs contain around 10g protein, and about 150 calories. There is a lot of recent nutrition research investigating the value of protein for breakfast. Though there are no definitive guidelines, some research suggests that high protein breakfast might be beneficial for weight loss and diabetes. Certainly, protein is important. So eggs for breakfast can be a healthy choice. But… Why do you ask if eggs are acidic? Are asking about the pH of eggs? I.e. the acidity of eggs in the lab? Maybe you need this information for packaging purposes. I can’t really help you with this. I deal with the acidity pf eggs after you have digested them. In effect, this is the effect on the pH of your urine. PRAL is one of the best estimates of the effect of food on the kidneys. This is a very good indicator of general health. Of course, if you have specific health problems, you must discuss the effects of an alkaline diet with your doctor. For most people, an alkaline diet is the healthiest way to eat. But, acidic foods are an important part of alkaline diet. To alkalize properly, you must balance essential protein and phosphorus with alkaline forming nutrients (potassium, magnesium, and calcium). Other nutrients are important. But, by eating more whole foods, we will automatically get trace nutrients. That is why PRAL uses a selection of important nutrients. Which brings me to my second question about the acidity of eggs… Does it matter that eggs are acidic? I hope you can see that it does not matter that eggs are acidic. What matters is balance. If you want the best alkaline diet, you should aim to make each meal alkaline in total. However, there’s no point in making life miserable. Adopt healthy eating plans on a daily or weekly basis. Whatever suits you. One easy way is to look at one week’s shopping. As I’ve explained, detailed PRAL analysis is only ever an estimate. Therefore, I’m working on a simpler scoring system that makes alkaline diets easy. Please sign-up to my update service to stay informed about that new project. So, if you want to balance an acid-forming egg breakfast with an alkaline-forming lunch, that’s up to you. If you want to make your meal alkaline, spinach is a fantastic accompaniment to eggs. The exact recipe will affect the precise PRAL calculation. We really don’t need to know that. A good estimate for one large egg with one and a half cups of spinach is about -20. That’s an excellent start to an alkaline day. Share your questions, experiences, and opinions about eggs acidic or alkaline in the feedback form below. But before you do, please subscribe to my free update service: Subscribe to Free Foodary Nexus Subscription is free, and your email address is safe - I will never share it with anyone else. I use Gumroad to provide this service, as described at the Foodary Nexus Newsletter Service. Leave Are eggs acidic or alkaline to read Healthy Food Facts. Are eggs acidic or alkaline Related Topics Please remember: to find more related pages that are relevant to you, use the search box near the top of every page. Common Terms: chicken, duck, Most Helpful Foodary Articles, turkey
<urn:uuid:9e8edaf7-1b2d-4af0-a092-a90d864514b0>
CC-MAIN-2023-23
https://foodary.com/649/are-eggs-acidic-or-alkaline/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648858.14/warc/CC-MAIN-20230602204755-20230602234755-00630.warc.gz
en
0.941007
1,081
2.75
3
Sir Martin & Churchill Alan Brown’s UKTV History programme on ‘Churchill … in the wilderness’, with contributions by Sir Martin Gilbert, Piers Brendon, Geoffrey Best and Maria Misra. Winston Churchill: The Wilderness Years – Episode 8, What Price Churchill? TV mini series devised by Martin Gilbert and Richard Broke starring Robert Hardy, Sian Phillips and Nigel Havers Sir Martin Gilbert-The Will of the People-author interview Sir Martin Gilbert is British Prime Minister Winston Churchilll’s official biographer. His latest volume is “The Will of the People: Churchill and Parliamentary Democracy”. Churchill at Fulton: The Enduring Importance of the “Iron Curtain” Speech – Sir Martin Gilbert Sir Martin Gilbert delivered this lecture on Sir Winston Churchill at Hillsdale College on October 22, 2004. Churchill at Fulton the Enduring Importance of the Iron Curtain speech Churchill’s Statesmanship, 1935-1945 – Sir Martin Gilbert. Sir Martin Gilbert delivered this speech at Hillsdale’s campus on September 10, 2001 as part of a CCA seminar titled “One of Freedom’s Finest Hours: Statesmanship and Soldiership in World War II. What Did Democracy Mean to Churchill? – Sir Martin Gilbert. Sir Martin Gilbert, the official biographer of Winston Churchill, speaks at Hillsdale College on September 7, 2006 as part of the Distinguished Fellow Lecture Series. What Did the United States Mean to Winston Churchill? – Sir Martin Gilbert. Sir Martin Gilbert, the official biographer of Winston Churchill, speaks at Hillsdale College on September 22, 2005 as part of the Distinguished Fellow Lecture Series. Interview Sir Martin Gilbert and Connie Martinson, Churchill A Life Sir Martin & the Second World War Sir Martin Gilbert: Non-Jews who Helped Jews During WWII In The Righteous—Non-Jews Who Helped Jews During the Second World War Gilbert tells how, as the Third Reich carried out its program to exterminate European Jewry, many Gentiles risked their careers and lives to conceal and rescue Jewish refugees. His stories on the Righteous include such now-famous names as Raoul Wallenberg and Oskar Schindler, as well as ordinary people who exercised ordinary decency in Sir Martin Gilbert Interview. One of the world’s most respected historians of WWII, Sir Martin Gilbert, speaks about his personal research of the action of Pope Pius XII during WWII. For an edited version of this video: Sir Martin & the Holocaust Auschwitz Secrets Of The Dead, The Story Of Escapee Rudolf Vrba How the Nazis tricked jews into their own death ,Rudolf “Rudi” Vrba (11 September 1924 — 27 March 2006) he is known for his escape, at the age of 19, from the Auschwitz concentration camp in German-occupied Poland during the Second World War, and for having provided some of the earliest and most detailed information about the mass murder that was taking place there . Hogy a nácik zsidók becsapott a saját halál, Rudolf “Rudi” Vrba (1924. szeptember 11. — 2006. március 27.) a legismertebb a szökését, 19 éves korában az Auschwi Published on Jun 5, 2014 A clip from the film The Rescuers, of Sir Martin at Wannsee, courtesy of Michael King: The Rescuers Official Trailer 1 (2014) – Holocaust Documentary Buy The Rescuers DVD at Amazon : Click Here Sir Martin & Israel & Jewish History Martin Gilbert – Sowing the Seeds of Jewish Statehood: Britain and Palestine, 1909-1922 Sir Martin Gilbert delivered the Irene and Hyman Kreitman Annual Memorial Lecture on May 30, 2011 during the 41st Annual Board of Governors Meeting at Ben-Gurion University of the Negev. His lecture was entitled Sowing the Seeds of Jewish Statehood: Britain and Palestine, 1909-1922 Conferment of Honorary Doctoral Degree on Sir Martin Gilbert at BGU, May 2011. The ceremony took place during Ben-Gurion University of the Negev’s 41st Annual Board of Governors. Sir Gilbert: Jerusalem: A Microcosm of Jewish Rights. Date: March 26, 2008. Conference: “Israel at 60: Confronting the Rising Challenge to Its Historical and Legal Rights” hosted by the Jerusalem Center for Public Affairs Historian Martin Gilbert & the Israel British Mandate Foreseen in the 19th Century book Elpis Israel Sir Martin & 20th Century Martin Gilbert – The Jews in the 20th Century Sir Martin Gilbert, author of numerous books including, The Jews in the 20th Century: An Illustrated History, talked about British Prime Minister Winston Churchill’s relationship with the Jewish people. The author said that Churchill was an advocate for Jewish equal rights and an opponent of anti-Semitism. He also described Churchill’s role in the formation and subsequent developments in the Middle East. The author said that Churchill kept a vigilant watch on the treatment of the Jews during World War II and attempted several times to mitigate the situation of the Jews under control of the Nazis. It was Churchill’s suggestion that a refugee camp be established in North Africa for Jewish Europeans fleeing the Nazis.
<urn:uuid:e61e0f9b-859c-4530-bb3c-d3ae9621ecac>
CC-MAIN-2023-23
https://www.martingilbert.com/sir-martins-filmography/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647639.37/warc/CC-MAIN-20230601074606-20230601104606-00430.warc.gz
en
0.883297
1,141
2.8125
3
Via is one of the important components of multilayer PCB, and the cost of drilling usually accounts for 30% to 40% of the cost of PCB manufacturing. Simply put, every hole on the PCB can be called a via. From the point of view of function, vias can be divided into two categories: One is for electrical connection between layers; the other is for fixing or positioning of devices. In terms of process, these vias are generally divided into three categories, namely blind vias, buried vias and through vias. Blind vias are located on the top and bottom surfaces of the printed circuit board and have a certain depth. They are used to connect the surface line and the underlying inner line. The depth of the hole usually does not exceed a certain ratio (aperture). Buried hole refers to the connection hole located in the inner layer of the printed circuit board, which does not extend to the surface of the circuit board. The above-mentioned two types of holes are located in the inner layer of the circuit board, and are completed by a through-hole forming process before lamination, and several inner layers may be overlapped during the formation of the via. The third type is called a through hole, which penetrates the entire circuit board and can be used for internal interconnection or as a component mounting positioning hole. Because the through hole is easier to implement in the process and the cost is lower, most of the printed circuit boards use it instead of the other two types of through holes. The following via holes, unless otherwise specified, are considered as via holes. From a design point of view, a via is mainly composed of two parts, one is the drill hole in the middle, and the other is the pad area around the drill hole, as shown in the figure below. The size of these two parts determines the size of the via. Obviously, in high-speed, high-density PCB design, designers always hope that the smaller the via hole is, the better, so that more wiring space can be left on the board. In addition, the smaller the via hole, the parasitic capacitance of its own. The smaller it is, the more suitable it is for high-speed circuits. However, the reduction of hole size also brings about an increase in cost, and the size of vias cannot be reduced indefinitely. It is limited by process technologies such as drilling and plating: the smaller the hole, the more drilling The longer the hole takes, the easier it is to deviate from the center position; and when the depth of the hole exceeds 6 times the diameter of the drilled hole, it cannot be guaranteed that the hole wall can be uniformly plated with copper. For example, the thickness of a normal 6-layer PCB board (through hole depth) is about 50Mil, so the drill hole diameter that PCB manufacturers can provide is relatively small and can only reach 8Mil. Second, the parasitic capacitance of the via The via itself has a parasitic capacitance to the ground. If it is known that the diameter of the isolation hole on the ground layer of the via is D2, the diameter of the via pad is D1, and the thickness of the PCB board is T, The dielectric constant of the board substrate is ε, and the parasitic capacitance of the via is approximately: C=1.41εTD1/(D2-D1) The parasitic capacitance of the via will have the main effect on the circuit is to prolong the rise time of the signal and reduce The speed of the circuit. For example, for a PCB with a thickness of 50Mil, if a via with an inner diameter of 10Mil and a pad diameter of 20Mil is used, and the distance between the pad and the ground copper area is 32Mil, then we can approximate the via using the above formula The parasitic capacitance is roughly C=1.41x4.4x0.050x0.020/(0.032-0.020)=0.517pF, the rise time change caused by this part of the capacitance is: T10-90=2.2C(Z0/2)=2.2x0 .517x(55/2)=31.28ps. It can be seen from these values that although the effect of the rise delay caused by the parasitic capacitance of a single via is not obvious, if the via is used multiple times in the trace to switch between layers, the designer should still consider carefully. 3. Parasitic inductance of vias Similarly, there are parasitic inductances along with parasitic capacitances in vias. In the design of high-speed digital circuits, the damage caused by parasitic inductances of vias is often greater than the impact of parasitic capacitance. Its parasitic series inductance will weaken the contribution of the bypass capacitor and weaken the filtering effect of the entire power system. We can simply calculate the approximate parasitic inductance of a via with the following formula: L=5.08h[ln(4h/d)+1] where L refers to the inductance of the via, h is the length of the via, and d is the center The diameter of the hole. It can be seen from the formula that the diameter of the via has a small influence on the inductance, and the length of the via has a greater influence on the inductance. Still using the above example, the inductance of the via can be calculated as: L=5.08x0.050[ln(4x0.050/0.010)+1]=1.015nH. If the rise time of the signal is 1ns, then its equivalent impedance is: XL=πL/T10-90=3.19Ω. Such impedance can no longer be ignored when high-frequency currents pass. Special attention should be paid to the fact that the bypass capacitor needs to pass through two vias when connecting the power plane and the ground plane, so that the parasitic inductance of the vias will increase exponentially. 4. Via design in high-speed PCB. Through the above analysis of the parasitic characteristics of vias, we can see that in high-speed PCB design, seemingly simple vias often bring great negatives to circuit design. effect. In order to reduce the adverse effects caused by the parasitic effects of the vias, the following can be done in the design: 1. Considering the cost and signal quality, choose a reasonable size via size. For example, for the 6-10 layer memory module PCB design, it is better to use 10/20Mil (drilled/pad) vias. For some high-density small-size boards, you can also try to use 8/18Mil. hole. Under current technical conditions, it is difficult to use smaller vias. For power or ground vias, you can consider using a larger size to reduce impedance. 2. The two formulas discussed above can be concluded that using a thinner PCB is beneficial to reduce the two parasitic parameters of the via. 3. Try not to change the layers of the signal traces on the PCB board, that is to say, try not to use unnecessary vias. 4. The power and ground pins should be drilled nearby, and the lead between the via and the pin should be as short as possible, because they will increase the inductance. At the same time, the power and ground leads should be as thick as possible to reduce impedance. 5. Place some grounded vias near the vias of the signal change layer to provide a relatively close loop for the signal. It is even possible to place a large number of redundant ground vias on the PCB board. Of course, the design needs to be flexible. The via model discussed earlier is the case where there are pads on each layer. Sometimes, we can reduce or even remove the pads of some layers. Especially when the density of vias is very high, it may lead to the formation of a break groove that separates the loop in the copper layer. To solve this problem, in addition to moving the position of the via, we can also consider placing the via on the copper layer. The pad size is reduced. Next:100 PCB people, 99 will make mistakes in these places...
<urn:uuid:fbf1c4ad-70a5-4411-bf8a-d9c68087753b>
CC-MAIN-2023-23
http://en.xinoupcb.com/a/89.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656788.77/warc/CC-MAIN-20230609164851-20230609194851-00430.warc.gz
en
0.935753
1,712
3.890625
4
Each year, the Office of Community Engagement & Health Equity collaborates with affinity groups, including BCM Pride, and academic and administrative departments across the College to celebrate Pride Month, LGBT History Month and National Coming Out Day. The Office of Community Engagement & Health Equity also acknowledges that every day must be an opportunity to work towards eliminating bias, discrimination, and injustices against members of the LGBTQ+ community, including our learners, employees, and patients. June is Lesbian, Gay, Bisexual and Transgender Pride Month (LGBT Pride Month), commemorating the 1969 Stonewall riots in Manhattan to protest civil injustices and brutality against the LGBTQ+ community. The Stonewall Uprising marks the beginning of a movement to outlaw discriminatory laws and practices against LGBTQ+ Americans. Memorials are held during this month for those members of the community who have been lost to hate crimes or other injustices associated with discrimination against the LGBTQ+ community. This commemorative month also recognizes the impact that lesbian, gay, bisexual and transgender individuals have had on history locally, nationally, and internationally. Today, LGBTQ+ Pride Month celebrations include pride parades, workshops, symposia, concerts, and other events. BCM Pride has new merch! Our student group is selling embroidered baseball caps and enamel pins. They work to promote peer development, professional support, community outreach, and provide input to the administration to allow our school to become more inclusive and supportive of sexual and gender minorities. View a flyer with more info. LGBT History Month LGBT History Month is an annual month-long observance of lesbian, gay, bisexual and transgender history, and the history of the gay rights and related civil rights movements. LGBT History Month was created in 1994 by Rodney Wilson, a high school history teacher in Missouri. In 1995, a resolution passed by the General Assembly of the National Education Association included LGBT History Month within a list of commemorative months. October was selected to coincide with National Coming Out Day (Oct. 11), which was already established, and the anniversary of the first march on Washington for gay and lesbian rights in 1979. LGBT History Month provides role models, builds community, and represents a civil rights statement about the contributions of the LGBTQ+ community. You may have noticed more students, trainees, faculty, staff and patients share their pronouns when they introduce themselves or include their pronouns with their name in an email, patient forms or on their name tag? Like names, pronouns are an important part of how we identify that deserves to be respected. Pronouns come in many forms. They are linguistic tools that we use to refer to people, such as they/them/theirs, she/her/hers, and he/him/his. There are other nonbinary pronouns. Someone’s pronouns inform us how to best refer to and honor them. It is important to ask people what their pronouns are. If you have questions, politely ask the person if they feel comfortable giving examples of how to use those pronouns. While we want to do our best to use someone’s correct pronouns, mistakes can happen. If this does happen, it is best to apologize, say what pronoun you meant to use, and move on without dwelling on the mistake. The Human Rights Campaign offers some guidance in this video. By sharing our own pronouns routinely, we encourage others to do the same and demonstrate that we understand the importance of sharing pronouns. This practice helps minimize misgendering and is an important strategy towards inclusivity. Using someone’s correct pronouns is an important way of affirming someone’s identity and is a fundamental step in being an ally. Safe Zone Program at Baylor College of Medicine The Safe Zone Program at Baylor College of Medicine, adapted from The Safe Zone Project, is a comprehensive program designed for our health sciences environment to create a commitment from learners and employees and departments committed to creating a more inclusive environment for LGBTQ+ community members, including our students, trainees, faculty, staff and patients. The four core components of the program include: - Education Programs - initial and ongoing education for learners and employees about LGBTQ+ issues related to BCM mission areas, - Evaluation and Assessment - ongoing evaluation and modifications to individual and unit processes, practices, behaviors, etc. to improve inclusion for LGBTQ+ community members, - Safe Zone Spaces - foster creation of designated safe spaces for LGBTQ+ community members and their allies to receive support, guidance, mentorship, etc.; and - Advocacy and Outreach - develop opportunities for advocacy for LGBTQ+ rights at multiple levels (e.g. clinics, community, institution, etc.) to improve respect, dignity, access and outcomes for the LGBTQ+ community. For more information about The Safe Zone Program or to request delivery of the Introduction to Safe Zone Program workshop, please email the steering committee at email@example.com. - American Civil Liberties Union - AAMC Sexual & Gender Minority Health Resources - AAMC: To Protect Evidence-Based Medicine and Promote Health Justice, Protect Gender-Affirming Medical Care - AMA Creating an LGBTQ-friendly Practice - Center of Excellence in LGBTQ+ Behavioral Health Equity - GLAAD: Gay & Lesbian Alliance Against Defamation - GLMA: Health Professionals Advancing LGBTQ Equality - GLSEN: Gay, Lesbian, and Straight Education Network - Human Rights Campaign - Lambda Legal - Montrose Center - NIH Sexual & Gender Minority - National LGBTQIA+ Health Education Center (A Program of The Fenway Institute) - Parents, Families, Friends, and Allies United with LGBT People (PFLAG) National - PFLAG Houston - Proclamation on Lesbian, Gay, Bisexual, Transgender, Queer, and Intersex Pride Month, 2023 - The Trevor Project - Transgender Law Center
<urn:uuid:1219553d-be93-472b-b548-5c1e06ef959f>
CC-MAIN-2023-23
https://cdn.bcm.edu/about-us/institutional-community-engagement-health-equity/programs/pride-month-lgbt-history-month-and-lgbtq-resources
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656675.90/warc/CC-MAIN-20230609100535-20230609130535-00030.warc.gz
en
0.928868
1,213
3.03125
3
Anti-Money Laundering (AML) for crypto, also known as AML crypto, refers to the set of regulations, practices, and technologies aimed at preventing the illicit use of cryptocurrencies for money laundering and other financial crimes. As cryptocurrencies gained popularity, concerns emerged regarding their potential misuse for illegal activities due to the inherent privacy and anonymity features they offer. Money laundering involves the process of making illegally obtained funds appear legitimate by disguising their true origin. Criminals often exploit cryptocurrencies to obscure their illicit activities, such as drug trafficking, terrorism financing, and tax evasion. To address these risks, regulatory authorities and financial institutions worldwide have implemented AML measures specific to cryptocurrencies. Objectives of AML Crypto The primary objectives of AML crypto are as follows: - Preventing Money Laundering: AML regulations aim to detect and prevent the conversion of illicit funds into cryptocurrencies, as well as the subsequent transfer and conversion of those funds back into fiat currencies. - Disrupting Criminal Networks: By implementing AML measures, authorities strive to disrupt criminal networks engaged in money laundering and other illicit activities facilitated by cryptocurrencies. This includes identifying individuals involved in such activities and taking legal action against them. - Ensuring Compliance: AML regulations ensure that individuals and businesses engaged in cryptocurrency-related activities, such as cryptocurrency exchanges, wallet providers, and initial coin offerings (ICOs), adhere to specific anti-money laundering guidelines. Key Components of AML Crypto To achieve its objectives, AML crypto incorporates various components and practices: - Customer Due Diligence (CDD): Cryptocurrency exchanges and other regulated entities are required to conduct thorough customer due diligence procedures. This includes verifying the identity of customers, assessing their risk profile, and monitoring their transactions for suspicious activities. - Know Your Customer (KYC): KYC procedures involve collecting and verifying customer information, such as identification documents and proof of address. These measures help establish the true identity of cryptocurrency users and mitigate the risk of impersonation or fraud. - Transaction Monitoring: Financial institutions and crypto exchanges employ advanced transaction monitoring systems to identify and analyze patterns of suspicious transactions. Unusual transaction volumes, frequent transfers to high-risk jurisdictions, or inconsistent transaction patterns may trigger alerts for further investigation. - Suspicious Activity Reporting (SAR): Entities subject to AML regulations are obligated to report any suspicious activities or transactions to the appropriate authorities. SARs provide a mechanism for reporting potentially illegal or suspicious activities, allowing law enforcement agencies to take appropriate action. - Compliance Programs: Crypto businesses are required to establish robust AML compliance programs, including policies, procedures, and internal controls. These programs ensure ongoing compliance with regulatory obligations and help detect and prevent money laundering. - Information Sharing and Cooperation: International cooperation and information sharing among regulatory authorities, financial institutions, and cryptocurrency service providers are essential for effectively combating money laundering. Collaboration enables the identification of cross-border illicit activities and enhances the global response to financial crimes. Challenges and Future Developments While AML crypto measures have significantly improved the security and integrity of the cryptocurrency ecosystem, challenges remain. Some of these challenges include: - Technological Complexity: Cryptocurrencies’ decentralized nature and the use of privacy-enhancing technologies make it challenging to trace transactions and identify illicit activities. - Regulatory Variability: AML regulations for cryptocurrencies vary across jurisdictions, leading to compliance complexities for global crypto businesses. Harmonization and international cooperation are crucial for addressing these challenges effectively. - Emerging Technologies: The rapid evolution of blockchain technology and the emergence of new cryptocurrencies pose ongoing challenges for AML efforts. Regulatory frameworks must adapt to these developments to ensure continued effectiveness. To address these challenges and enhance AML crypto measures, ongoing research, technological advancements, and collaboration between regulators and the crypto industry are vital. Striking a balance between privacy and transparency will be essential to maintain the integrity of cryptocurrencies while combating financial crimes effectively. Note: The content provided here is for informational purposes only and should not be considered as legal or financial advice. It is important to consult relevant authorities or professionals for specific guidance on AML regulations and compliance in your jurisdiction. FAQ (Frequently Asked Questions) Q: What is money laundering? A: Money laundering is the process of making illegally obtained funds appear legitimate by disguising their origin. It involves various complex transactions and activities that aim to obscure the true source of funds. Q: Why are cryptocurrencies vulnerable to money laundering? A: Cryptocurrencies offer a certain level of privacy and anonymity, making them attractive to individuals seeking to hide the proceeds of illegal activities. Transactions conducted with cryptocurrencies can be difficult to trace, which poses challenges for traditional anti-money laundering efforts. Q: How do AML regulations apply to cryptocurrencies? A: AML regulations for cryptocurrencies require cryptocurrency exchanges, wallet providers, and other relevant entities to implement robust compliance programs. These programs include customer due diligence (CDD), transaction monitoring, suspicious activity reporting (SAR), and adherence to know your customer (KYC) requirements. Q: What is customer due diligence (CDD) in the context of AML crypto? A: Customer due diligence involves the process of verifying the identity of customers, assessing their risk profiles, and monitoring their transactions for suspicious activities. It is a crucial component of AML crypto measures to ensure the legitimacy of cryptocurrency transactions. Q: What is the role of know your customer (KYC) procedures in AML crypto? A: KYC procedures require cryptocurrency businesses to collect and verify customer information, such as identification documents and proof of address. These measures help establish the true identity of cryptocurrency users, mitigate the risk of impersonation or fraud, and enhance the effectiveness of AML efforts. Q: How are suspicious activities or transactions reported in AML crypto? A: Entities subject to AML regulations are obligated to report suspicious activities or transactions to the appropriate authorities. This is typically done through the submission of Suspicious Activity Reports (SARs), which provide details about potentially illegal or suspicious activities for further investigation. Q: How do transaction monitoring systems work in AML crypto? A: Transaction monitoring systems employ advanced technologies to analyze cryptocurrency transactions and identify patterns of suspicious activities. These systems use algorithms and risk-based indicators to detect unusual transaction volumes, frequent transfers to high-risk jurisdictions, or inconsistent transaction patterns that may indicate potential money laundering or other illicit activities. Q: Are AML regulations for cryptocurrencies consistent globally? A: AML regulations for cryptocurrencies vary across jurisdictions, and compliance requirements may differ. The lack of global uniformity poses challenges for global cryptocurrency businesses. However, international efforts are being made to promote harmonization and cooperation among regulatory authorities. Q: Can AML measures eliminate all money laundering in cryptocurrencies? A: While AML measures significantly improve the security and integrity of the cryptocurrency ecosystem, it is impossible to eliminate all money laundering. Criminals continually adapt their techniques, and cryptocurrencies’ inherent characteristics present challenges. AML efforts aim to minimize the risks and detect suspicious activities effectively. Q: What is the future of AML crypto? A: The future of AML crypto relies on ongoing research, technological advancements, and collaboration between regulators and the crypto industry. Striking a balance between privacy and transparency is crucial. As technologies evolve and new cryptocurrencies emerge, regulatory frameworks will need to adapt to ensure the continued effectiveness of AML efforts.
<urn:uuid:eceaa5df-811f-4b6b-aa41-4d21dede8990>
CC-MAIN-2023-23
https://www.idwise.com/glossary/aml-crypto/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649177.24/warc/CC-MAIN-20230603064842-20230603094842-00230.warc.gz
en
0.914038
1,499
2.53125
3
Explore Taiwan which is located off the coast of southwest of Okinawa, Japan and north of the Philippines. The island has been governed by the Republic of China (ROC) since 1945. Shaped roughly like a sweet potato, the island nation has more than 23 million people and is one of the most densely populated places in the world. Besides its crowded cities, Taiwan is also known for steep mountains and lush forests. Taiwan has some very impressive scenic sites and its capital city, Taipei, is a vibrant culture and entertainment hub. Taiwanese cuisine is highly regarded with the Japanese in particular taking short trips to enjoy its relatively cheaper hospitality. Lately, with the relaxation of restrictions, there are increasing numbers of mainland Chinese visiting, and Taiwan is perhaps the most favorite destination for short holidays for Hong Kong residents. Taiwan has been populated for thousands of years by more than a dozen non-Han Chinese aboriginal tribes. Written history begins with the partial colonization of southern Taiwan by the Dutch and the northern part by Spanish in the early 17th century. (The old name of Taiwan, Formosa, comes from the Portuguese Ilha Formosa for “beautiful island”.) Han Chinese immigrants arrived in significant numbers with the onset of European trade. Although controlled by the Dutch, the Ming loyalist Koxinga defeated the Dutch garrisons in 1662 and set up Taiwan as a rump Ming Empire with the hope of reconquering Qing China Taiwan was originally populated by indigenous tribes that spoke various Austronesian languages, which are closely related to Malay, Tagalog and Indonesian and who are ancestors of the great Polynesian navigators of the Pacific. Today the remaining tribes make up only about 2% of the population, while the other 98% are Han Chinese. The climate of lowland Taiwan is marine tropical. Summers are hot and humid and above 30°C from June through September. Winters are relatively cold, especially in northern Taiwan where temperatures can be as low as 8°C. Northern Taiwan rains year-round while southern Taiwan has dry winters. The best time of year to visit is from Oct-Dec, although the occasional typhoons can spoil the fun. Spring is also nice, although it rains more than during autumn. During the typhoon season, the east coast bears the brunt of the damage as it is facing the Pacific Ocean. Taiwan is largely mountainous with a chain of mountains running from north to south at the centre of the island. The west coast is largely plains and unsurprisingly is where most of the population is concentrated, and is where all the larger cities like Taichung and Kaohsiung are located. The east coast also has some plains but is more sparsely populated due to the higher typhoon risk. It is also home to the cities of Hualien and Taitung with significant populations. Baseball was brought to Taiwan by the Japanese during the colonial period. Its popularity rose greatly when the Taiwanese baseball team finished second in the Japanese national championships. Today, baseball retains a strong following and remains by far the most popular team sport in Taiwan. Several Taiwanese players have also gone on to successful careers in the US and Japanese Major League Baseball (MLB) and the Taiwanese national baseball teams are considered to be one of the strongest in the world. Besides baseball, basketball also has a sizeable following in Taiwan and is quite popular among teenagers. When classes are over, the basketball courts inside schools are not only open to students but also the public. Billiard is another popular sport in Taiwan. It’s easy to find billiard rooms throughout the country and there are also many championship-winning players in Taiwan, most of whom started training when they were still teens. Other sports which are popular include Taekwondo, table tennis and golf. Regions – cities – other destinations in Taiwan The legal driving age in Taiwan is 18. Luxgen, a Taiwanese automaker is extremely popular. An international driving license is required for driving in Taiwan and may be used for up to 30 days, after which you’ll need to apply for a local permit. Some municipalities may impose additional restrictions, so check ahead with the rental shop. The numbered freeway system in Taiwan is great. They cover many parts of the island and are in excellent shape. Most traffic signs are in international symbols, but many signs show names of places and streets in Taiwanese only. Nevertheless, almost all official directional signs will be written in both Taiwanese and English. However, the non-standardized Romanization means that English names can vary between road signs, making it rather confusing. Taiwanese Mandarin has always been the primary official language since the establishment of the Republic of China in Taiwan during the Kuomingtang rule in 1949. From 2018 onwards, the native aboriginal languages of Taiwan and Hakka Chinese are promoted to official languages of Taiwan. If you’re having trouble finding English speaking people, try looking for college or high school students. At ticket booths, the better chance is at those with student-age agents. Younger people generally speak a basic conversational level of English, especially in Taipei. Children often understand more English than their parents, especially with the emphasis on English language education today, and English being a compulsory subject in Taiwanese schools. However, attempts to speak Mandarin, Taiwanese Minnan or Hakka will be met with beaming smiles and encouragement, by and large. Cherry Blossom Season – Every spring, in Yangmingshan. Hot Springs – Taiwan’s geographical location between an oceanic trench and volcanic system makes it an ideal hot springs vacation spot. There are several hot springs destinations throughout the country, including Beitou, Wulai and Yangmingshan. While gambling is technically illegal in Taiwan, mahjong remains popular. The Taiwanese version of the game differs significantly from the better known Cantonese and Japanese versions, most notably because a hand consists of 16 tiles instead of the 13 used in other version. However, it remains mostly a family and friends affair and there are no publicly advertised mahjong parlors. Taiwan often experiences typhoons during the summer months and early fall, especially on the East Coast. Heavy monsoon rainfall also occurs during the summer. Hikers and mountaineers should be sure to consult weather reports before heading into the mountains. A major hazard following heavy rainfall in the mountains is falling rocks caused by the softening of the earth and there are occasional reports of people being killed or injured by these. Taiwan is also located on the Pacific Ring of Fire, which means that earthquakes are a common occurrence. Most earthquakes are barely noticeable, though the effect may be slightly amplified for those in higher buildings. While the local building codes are extremely strict, general precautions should still be observed during an earthquake, including opening the door for preventing it being jammed, taking cover and checking for gas leaks afterwards. Taiwan’s wild areas are home to a variety of venomous snakes, including the bamboo viper, Russel’s viper, banded krait, coral snake, Chinese cobra, Taiwan habu, and the so-called “hundred pacer”. Precautions against snake bites include making plenty of noise as you hike, wearing long trousers and avoiding overgrown trails. Most snakes are scared of humans, so if you make noise you will give them time to get away. Walking quietly means that you may suddenly startle them and trigger an attack. The Russel’s viper, one of the most dangerous snakes in Taiwan, is an exception…it generally prefers to take a stand against threats. Eating and Drinking Westerners should be cautious of relatively undercooked food. Many Taiwanese restaurants offer plates of raw, sliced red meat and uncooked seafood that are brought to the table and either barbecued or simmered in a pot of stock. As this constitutes a staple of the Taiwanese diet, any bacteria that may remain doesn’t affect the locals, but it can wreak havoc with foreigners. The best policy is to make sure you cook the food in a manner to which you are accustomed. Don’t drink tap water without boiling it, though it’s safe for brushing your teeth. Internet cafes are plentiful, although you may have to wander around before finding one. Rather, Internet cafes in Taiwan should be called gaming cafes. These are often found on the first or second floor of a building, and equipped with very comfortable chairs and large screens. Although people do surf the Internet, most people primarily go there for a smooth experience of online gaming. Some machines in the internet cafes are coin operated. For free internet access in big cities, try out the local libraries. The government of Taiwan offers nationwide free Wi-Fi service named iTaiwan, and the City of Taipei offers free Wi-Fi service in many public locations and some of city buses called TPE-Free. Registration is required but one account covers both services. If you have mobile phone from selected countries it can be done online; otherwise, bring your passport to the visitor information centre at the airport, MRT stations etc., and the friendly staff will do it for you. McDonald’s and 7-Eleven provides free Wi-Fi. Official tourism websites of Taiwan For more information please visit the official government website:
<urn:uuid:6d55a27b-5e09-42d8-87b7-685341b79d46>
CC-MAIN-2023-23
https://worldtourismportal.com/explore-taiwan/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652207.81/warc/CC-MAIN-20230606013819-20230606043819-00230.warc.gz
en
0.962209
1,945
2.8125
3
In the Cold War, the government constructed a line of radar stations near the Arctic Circle to provide an early warning if Soviet bombers ever attacked the United States. Businesses can also benefit from setting up an early warning system to give advance notice of problems that might pose a threat to their operations and resources. In today’s post we’ll look at what an early warning system for business looks like, why your organization should have one, and some of the challenges involved in setting such a system up. Related on BCMMETRICS: The Cost of Calamity: The Cost of Calamity: How Being Unprepared Can Harm An Organization EARLY WARNING SYSTEMS AND NATIONAL SECURITY Perhaps the most famous early warning system ever was the Cold War–era DEW Line, or Distant Early Warning Line. This was the line of radar stations set up in northern Canada in the 1950s to detect Soviet nuclear bombers that might come flying over the Arctic on the way to targets in the U.S. The most famous early warning system that unfortunately did not exist was one that might have prevented the attacks of September 11. Only after the attacks did the government wake up and create the National Network of Fusion Centers. These centers synthesize intelligence gathered by various agencies to help authorities detect, prevent, and respond to attacks by terrorists and criminals. EARLY WARNING SYSTEMS FOR BUSINESS The value of early warning systems for business has been recognized for some time. For example, the international business continuity standard ISO 22031 calls on organizations to have systems in place for providing early warning of potentially disruptive incidents. In business, a fusion center is typically a room staffed by representatives of a few critical core support functions. These might include security, facilities, technology, property management, and other key operations. By sharing among themselves information from their various networks, these folks can form a clearer, quicker picture of developing threats. They can make sure others in the organization who need to know about them are brought into the loop. This capability helps the organization prepare for the incident, contain the disruption, and speed restoration and recovery. If the IT person at the fusion center learns a cyber incident is going on, they can share that information with their colleagues who can ensure that the right people in their own departments are given a timely heads up. Ditto if a facilities person learns of a power outage at an important facility. This way people in other departments aren’t blind-sided, and the time needed to respond and initiate recovery is reduced. An Early Warning System is like the whiskers of a cat. It’s out there in front, sensing various things that are going on and reporting back with vital information about the environment. Whiskers help a cat avoid danger. A business’s early warning system can help you detect, prepare for, and contain threats to its operations and resources. OPTIONS IN SETTING UP AN EARLY WARNING SYSTEM Organizations have many different options in setting up an early warning system. The arrangement can be varied to suit the needs of the company, whether it’s a multinational corporation or a midsize or small business. The usual starting point is a room to serve as the fusion center. This would typically be at the global security operations center, for organizations that have one. In terms of how the fusion center is staffed, this can vary depending on the organization’s size and resources. Large multinationals might have dedicated fusion center staffers monitoring for trouble 24/7. Other companies might have staffers working in the fusion center while conducting their day-to-day jobs. Another option is to have workstations set up in the fusion center for representatives of the different core areas. At the first sign of trouble, those representatives or their alternates are called in and take their pre-assigned seats. They begin monitoring the situation, sharing information with their fusion center colleagues, and alerting key people in their home department and possibly elsewhere. OBSTACLES TO SETTING UP WARNING SYSTEMS Regrettably, business has not been quick to embrace setting up early warning networks. When asked about this, executives typically say, “Everything is working fine now, I don’t see the need.” This is just what the CIA and FBI thought before the attacks of September 11. Naturally, many businesses are concerned about the expense of setting up early warning networks. However, these systems can be scaled to the company’s resources. And if and when a serious incident occurs, such a system is likely to pay for itself quickly. Two more common obstacles to creating early warning systems are: - People prefer to keep things in silos. It’s hard to get people to share their inside information with people from other departments. Often they fear that by doing so, they will lose a measure of control. - Departments cannot agree on which severity matrix to use. This is a small thing, but in my experience, it causes big problems. It’s common for different departments in the same organization to each have their own incident severity matrix. For example, facilities might use a matrix where a Level 1 event is minor and Level 4 means the world is ending, while the security department at the same company might use a color-coded system going from green to red. WARNING SYSTEMS FOR SMALLER ORGANIZATIONS A final note regarding how even small and midsize companies can set up early warning networks. It may be that such companies cannot afford to set up fancy command centers. Most likely, they can set up a cross-functional team and take steps to promote the sharing of data and information. They can also establish one severity matrix to be used by all departments across the organization. Such measures can provide even small organizations with an effective early warning system. BEING READY, REDUCING IMPACTS Chances are your organization would benefit from having an early warning system. Such systems promote the sharing of information across departments and the early detection of threats, as well as the prompt notification of key personnel. This helps organizations get ready sooner, minimizing impacts and speeding recovery. In setting up such a system, obstacles do exist. But considering that overcoming obstacles is the main activity of every successful organization, this need not prevent yours from succeeding in setting up an early warning system. For more information on disaster preparedness and other hot topics in BC and IT/disaster recovery, check out these recent posts from BCMMETRICS and MHA Consulting: - As Easy as 1-2-3: How to Launch a Business Continuity Program - Ditch the Data Silos: Improve Your Resiliency with Integrated Information - Getting in Sync: Eliminating Recovery Strategy Gaps between BC and IT - “This Is an Emergency”: Why You Should Consider an Emergency Notification System - Standard Time: The Best Time to Choose a Business Continuity Standard Is Right Now - The Cost of Calamity: How Being Unprepared Can Harm An Organization
<urn:uuid:8a65d340-72f9-4928-bad3-e8217e73e21a>
CC-MAIN-2023-23
https://www.mha-it.com/2019/11/21/early-warning-system/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649343.34/warc/CC-MAIN-20230603201228-20230603231228-00030.warc.gz
en
0.947806
1,462
2.796875
3
English is the most learned Hard language globally because it is the international language of business, science, and academia. In addition, there are 1.5 billion English learners and 527 million indigenous English talkers globally, implying that English is vocalized by about a quarter of the world’s population. English is a complicated language to master, despite its importance in world affairs and trade. The language has a lot of broken grammatical rules, an alphabet that can be confusing for folks who Hard are used to a character-based system, and spelling and pronunciation inconsistencies that even native speakers can’t figure out. Here are some grammatical differences that make the English language tricky for non-native talkers to learn and why it may still be a good idea to seek additional assistance when using English (or any other foreign language) in your business or organization. Words with the exact spelling can be pronounced differently. Context and parts of speech are critical in English pronunciation. “It’s time to deliver the gift,” for example, contains the same word (“present”) twice yet is pronounced each time (free-ZENT and PREZ-ent) differently. Non-native speakers may have trouble remembering Hard which pronunciation to use at what time in both speaking and reading. In many cases, words with the exact spelling have a verb and a noun form (“produce and produce,” “present and present,” “record and record”), with the noun form stressing the first syllable (“PRO-duce,” “PREZ-ent,” and “RE-cord”) and the verb form stressing the second syllable (“pro-DUCE,” “pre-ZENT,” and “reCORD”). Rules of grammar frequently aren’t applicable. For instance, “I before E, but after C” is a phrase that English speakers are familiar with. What about words like “science,” “their,” and “foreign,” which all break the rule? Or how about that annoying requirement that English verbs in the past tense end in “-ed.” For example, you “ate” instead of “ate” and “slept” instead of “sleeped”? Non-native speakers may find it difficult to remember all of the exceptions to the English spelling and grammar norms. The best answer is memorizing irregular verbs and spellings, which can only be achieved via practice and repeated exposure to the language. The Formality Level is Uncertain Spanish, Korean, and Japanese have varied verb conjugations depending on the formality of the language. For example, the “tu” form addresses friends and family in Spanish, whereas the “usted” paper addresses an older or superior. Because the English language lacks a direct equivalent, some non-native speakers may consider it “too informal.” Formal, semi-formal, and casual formality levels in English depend on vocabulary rather than a specific tense or verb conjugation, which can be difficult for non-native speakers to adjust to when using English in the office or other professional contexts. Idioms are abundant in English. The English language is not designed to be taken literally in every instance. Idioms, metaphors, and other figurative language abound in English, making it difficult for a newcomer to understand. Cabs in New York City are a dime a dozen, but that doesn’t imply they’re ten cents each; it just means they’re plentiful and hence not particularly valued. Idioms, like irregular verbs, require memorization and practice. Different dialects of English exist. American English is distinct from British English, which is different from Australian English. Dialects can differ even between countries and regions. For example, when referring to the second person plural form, someone from the southern United States would say “y’all” (short for “you all”), although most other sections of the United States would just tell “you.” The term “toilet” in the United States is translated as “loo” in English, while “garbage” is translated as “rubbish.” Non-native speakers are often taught one of the “mainstream” dialects, but depending on the situation, they may need to adapt to a different dialect Hard to communicate with the right audience. Choosing the Proper Expressions Learning new languages, particularly those that your sector or organization will frequently use while communicating with clients, patients, business partners, or other organizations, is always beneficial. It’s not uncommon for it to be contradictory. Simple sentence wording used by native speakers. From the perspective of a foreign speaker, they can be full of confusing and illogical structures. Keywords used in everyday phrases are frequently incomprehensible to someone studying this language. For instance, “I get up and put my outfits on” — to the untrained eye or ear, the statement might be both confusing and contradictory – with the usage of “get up” rather than the much more sensible “stand up” or claiming that you’ve placed your clothes on when they are never put on, only taken off. These phrasal verbs can be found everywhere, providing terms like “set off” that don’t imply anything Hard when taken out of context. It’s not always the case that synonyms are interchangeable. Many English terms are said to have the same meaning. You may find countless groups of these terms by skimming through the thesaurus. You’d think they’d be easy to swap out, but that’s not the case. Words with the same definitions can have subtle variances. Words in English can have several meanings. People may end up misusing a term as a result of this. For example, you would “see a film” or “watch television,” but you would never “see television.” Another example is when you reply, “I received a present,” you don’t answer, “I embraced a present,” even if the two terms are interchangeable depending on the setting. Again, it’s possible that the meaning is altogether different. Consider employing a language solutions partner for any business translation or interpretation in English so that your meaning is communicated as precisely as feasible while still meeting your learning objectives. There are several other reasons why studying English can be difficult, in addition to the ones we’ve discussed. However, with enough tuition, practice, patience, and development, knowing English can be accomplished. Like any other language, English can be learned. To Read more article, just click on: https://24x7offshoring.com/blog/
<urn:uuid:dfc16a8e-6d18-4269-8e1e-5792a3c7e5f3>
CC-MAIN-2023-23
https://24x7offshoring.com/english-a-hard-language/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655244.74/warc/CC-MAIN-20230609000217-20230609030217-00430.warc.gz
en
0.943007
1,476
3.5625
4
What Is A PDF: The Portable Document Format Explained PDF: what is this file type, and what purpose does it serve in the wonderful world of documents? No matter how much of a computer whiz you are, you’ve surely come across this three-letter file type that you can’t edit or modify in any way. No, I’m not talking about those common .docx file or MP3’s, or even .ppt’s, .xml’s or HTML’s. The file type that you have surely come across by now in your academic, personal, or professional career, is what’s commonly referred to as the PDF. But what exactly is this file type anyways, how did they come about, and why should we use PDFs when they’re (seemingly) impossible to manipulate? Why does it seem like this file type is the one that everyone, from students to professors, businessmen to governing bodies, seem to be using? And what does the PDF stand for anyways and how is it any different from all the other file types out there? Well, Soda PDF (yes, we really are experts on this matter–you’ve come to the right place!) is here to help users understand the power a PDF can provide. Here’s why people should always use this type of document type as their final file version. The Portable Document Format (PDF) At A Glance So, what does PDF stand for? P = Portable D = Document F = Format. What does Portable Document Format mean exactly? Well, a PDF is basically a file that cannot be modified (though we respectfully disagree, more on that later) and its main purpose is to be a file type that can be shared and printed. But how did this file format come to be born? For that, we need to look at the beginnings of Adobe, the true breeders of the PDF file, and go all the way back to 1991. The Camelot Project Back in the spring of 1991, a gentleman by the name of John Warnock came up with a project titled “Camelot” in which he set out to solve an issue facing many businesses at that time. The problem that Mr. Warnock was trying to solve? The fact that there was no universal format for viewing printed data electronically. Thus, Warnock’s “Camelot” project was born to provide just what businesses needed: a file format that would maintain the printed format and layout while also optimized for being shared electronically. In short, Warnock set out to establish one format for everyone to use to share and print information that wasn’t going to be compromised or affected by the limitations of a FAX machine or various printing services. Soon after, Warnock was a highly-sought after man–and for good reason. He had found an issue and had created a project that set out to make businesses run more efficiently without any information getting lost in transfer. The Camelot project soon turned into what we now commonly refer to as the PDF, in which written works could be kept and preserved digitally, similar to an electronic library. Thus Warnock’s Adobe company, which was founded in 1982, soon found its true calling: the Portable Document Format. Adobe Acrobat: The PDF MASTER Portable Document Format files can normally only be read by a software that contains a PDF reader, in which this file type is easily opened and keeps the file’s formatting in tact. Traditionally, this PDF-reader was Adobe Acrobat. Users needed to download this software in order to open the PDF in its original format and layout. Otherwise, the file would look like chicken scratch on the page if you attempted to open the file with Word or Notepad, for example. Thus, the PDF-reader was limited to just that: reading. Editing a PDF, especially after it had been published, proved to be tricky business–that is, unless you purchased one of Adobe’s products. Adobe soon had a stronghold on the Portable Document Format since businesses were now using this file type to share information with clients or employees, and in order for anyone to view the document, a download of Adobe Reader was required. Soon, a lot of software competitors saw an opportunity that Adobe, or the “Camelot” project for that matter, realized back in 1991. Adobe competitors were all too aware of the fact that published PDFs were seemingly edit proof. Soon, they sought to help businesses with their modern problems: managing a high volume of documents and projects simultaneously. As businesses and corporations grew at a more rapid rate, so does their need to edit, share, compress and modify PDFs. Adobe was conscious of the fact that they seemed to be the only solution for these businesses, but their monopoly was not going to last forever. Main benefits of the PDF format PDFs have found their home across multiple industries. People rely on the fact that no matter what device that file loads on, the content will always display the same. This makes it easy to send information across the plethora of different devices someone may be using. PDFs have become a staple for forms. They provide end users with a clean interactive way to gather information while insuring the integrity of the initial file. PDFs are like open templates. Over the last 27 years the format has evolved way beyond it’s original vision. One of the main changes over time is that in 2008 the PDF format was standardized. With its new ISO, new developers could appear on the scene. As you can imagine, we are quite fond of one in particular… Meet Soda PDF: The Portable Document Format Modifier Ahem, remember when we mentioned how Soda PDF is somewhat experts in this domain? Well, maybe its about time we told you why! Soda PDF is indeed one of those competitors to Adobe, and our goal is to provide affordable PDF solutions for individuals or businesses looking to make quick and efficient changes to and from PDF files. For example, converting a PDF to a Word file used to be a difficult. People often found themselves struggling to deal with this challenge or task from their boss. Sure, exporting your Word file to a PDF was simple, but what if you needed to make changes to that PDF file? Do you convert that document back into a Word file? And how would you even go about it? Most people, it seems, had this kind of thinking: I’ve been at this all day its so frustrating! Stop us if you’re not one of these users. That’s right, we thought so. But Soda PDF makes the entire process look easy. With our Word to PDF online converter tool, individuals and businesses alike have been flocking to our service page for a quick and painless solution to their PDF frustrations. Converting file types with Soda PDF isn’t just limited to Word files. Soda PDF enables conversion from over 300+ file types, both to and from the PDF format. Furthermore, Soda PDF is available not only online, but on desktop as well. Plus, users can easily switch between our desktop and online programs and access our product on their favorite device. Available whenever and wherever you may be, Soda PDF is happy to provide document solutions to any and all PDF problems. How Can I Get A Taste of Soda PDF? Curious to learn more about Soda PDF, or even try out our online tools and desktop app? Well, lucky for you, we’re happy to offer you a FREE download of our desktop app! Edit convert, merge and create PDFs to your heart’s content–and even save them to a cloud or export as a different file type! Soda PDF is not only a PDF reader, its a PDF modifier. So be sure to try out our product and get with the times as there’s no such thing as published PDF problems with Soda by your side!
<urn:uuid:58102a4c-5a2a-402c-8c6f-1319dd893998>
CC-MAIN-2023-23
https://www.sodapdf.com/blog/pdf-the-portable-document-format/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649105.40/warc/CC-MAIN-20230603032950-20230603062950-00030.warc.gz
en
0.95302
1,678
2.734375
3
When it comes to windy cities, two of the nation’s most iconic metropolises come to mind: Chicago and Texas. But which city is actually the windiest? While both cities experience relatively high winds at times, Texas has the edge when it comes to average wind speed. Chicago experiences an average wind speed of about 11 mph, according to data from the National Weather Service. In comparison, Texas sees an average wind speed of about 13 mph. The difference may not seem like much, but over time Texas’ higher average speed can add up to a significant amount of extra wind. In addition to its higher wind speed, parts of Texas are well known for their strong gusts of wind. In fact, some of the highest wind gusts ever recorded in the US (often referred to as “gustnadoes”) have been in the Lone Star State. With wind gusts reaching speeds of up to 150 mph, these winds are nothing to be taken lightly. In the end, the answer to our question is that yes, Texas is indeed more windy than Chicago. Though the differences might not always be immediately noticeable, the evidence shows that Texas experiences more wind overall, especially when it comes to its stronger gusts. So if you’re looking for a windy place to be, Texas should be at the top of your list. Which US state is the windiest? Wind is an important factor in many parts of life, from providing energy to making our outdoor activities more difficult. So which U.S. state is the windiest? The answer might surprise you: it depends on how you measure it! Some states have higher average wind speeds, while others experience more wind gusts and extreme weather events. To clear up any confusion, let’s take a closer look at which states are the windiest in the United States. The winner of the “most wind” award goes to North Dakota. This state has an average wind speed of 11 mph and consistently ranks as one of the windiest states in the country. In fact, it’s not unusual for residents to experience winds of over 40 mph on a regular basis. While it might not always be pleasant, this wind does bring some advantages! For example, North Dakota is a major hub for wind energy production, powering thousands of homes and businesses across the region. Kansas is another important contender for the title of windiest state. Kansas has an average wind speed of 10 mph and frequently experiences gusts of over 50 mph. The high winds are largely caused by the cool moist air that moves in from the Rocky Mountains. The high winds make the state a great place for wind energy, with Kansas currently being third in the nation for installed wind capacity. Other states that deserve a mention include Nebraska and Wyoming, which both have an average wind speed of 9 mph. Wyoming is especially prone to powerful windstorms due to its location in the middle of the Great Plains. And while Illinois isn’t always the windiest state, it is the home of the world-famous Windy City, Chicago. So there you have it, the four states that are the windiest in the U.S. are North Dakota, Kansas, Nebraska, and Wyoming. As you can see, it depends on how you measure it! But one thing is for sure, these states know how to make the most of their wind, using it to power communities and create beautiful scenery. What is the windiest city in TX? Texas, known for its hot summers and unpredictable weather, is home to some of the windiest cities in the U.S. The Texas panhandle city of Amarillo, located near the Oklahoma and New Mexico borders, has been named one of the windiest cities in the country, and has consistently battled for the top spot on the list. Amarillo is located in an area with strong winds caused by differences in air pressure between the Rocky Mountains and the Central Plains. Additionally, the wind gusts can be amplified by the wide-open spaces and lack of trees that make up the Texas panhandle. In Amarillo, the average wind speeds can reach up to 15 miles per hour. During extreme weather events, wind speeds can exceed 40 miles per hour. And while Amarillo is known as one of the windiest cities in the country, it isn’t the only windy city in the Lone Star State. Other windy cities in Texas include Lubbock, Midland, Corpus Christi and Abilene. Lubbock experiences ideal conditions for wind with high terrain to the north, low terrain to its south, and a limited amount of trees. These factors often cause wind gusts in excess of 23 miles per hour. Midland and Abilene are also known for their strong winds, with wind gusts reaching 30 miles per hour during stormy weather. Unsurprisingly, Texas sees its share of weather-related damage because of its strong winds. In addition to wind damage, the Lone Star State has seen tremendous destruction from tornadoes and hurricanes in recent years. Nonetheless, the wind keeps many Texans cool during the sweltering summer months. What is the nickname for Chicago? Chicago is known by several nicknames, including the Windy City, Second City, Chi-Town, and City of Big Shoulders. These nicknames reflect the city’s unique character and its position as a major urban center of culture, business, and industry. The Windy City nickname is thought to have been given to Chicago by a New York newspaper editor referring sarcastically to Chicago’s blustery politicians, or based on the chilly gusts experienced off of Lake Michigan. Meanwhile, the Second City moniker emerged in the 1950s, reflecting the city’s role as the Midwest’s premier metropolis after the great fire during the 19th century nearly wiped out the entire city. Chi-Town, another well-known nickname for Chicago, has its roots in the African American community during the 1970s, and it is still used today by many. Finally, City of Big Shoulders is a phrase from a 1916 Carl Sandburg poem which honors the working people of Chicago. This phrase has become a symbol for the city’s strength and resilience, declaring that Chicago will always do what it takes to push forward. Nicknamed “The City That Works,” Chicago continues to inspire through its nicknames and culture. Whether you find yourself in the heart of Chicago, near the lakefront, or visiting one of its iconic neighborhoods, you’ll feel the windy hospitality that makes Chicagoans proud.
<urn:uuid:2e3b4edf-0adb-46fa-99ed-15dfaa43b9bb>
CC-MAIN-2023-23
https://www.westsidelilos.com/is-texas-more-windy-than-chicago/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648000.54/warc/CC-MAIN-20230601175345-20230601205345-00030.warc.gz
en
0.959718
1,368
2.734375
3
On November 7, 2016, LGBTQ mental health help lines across the country saw a jump in calls. For many hotlines, call volumes have remained high ever since. The month of May, which was Mental Health Awareness Month, served as a reminder that it is critical for us to continue our efforts to increase understanding of how the LGBTQ community is impacted by mental health challenges. As we see it, these challenges are three-fold: First: We live in a world where our community continues to face incredible backlash, pressures, and challenges. Yes, we have achieved marriage equality and the end of “Don’t Ask, Don’t Tell,” but at the same time, dozens of states introduce anti-LGBTQ legislation every year, and incidents of violence and threats against our community are on the rise. Second: The mental health field as a whole has been woefully slow to recognize the psychological stress and impact this has on us as individuals and as a community. While we have certainly come a long way since the American Psychiatric Association’s (APA’s) Diagnostic and Statistical Manual of Mental Disorders listed homosexuality as a “sociopathic personality disturbance,” and transgender and gender non-conforming identities as experiencing “gender identity disorder,” there is still progress to be made. LGBTQ individuals are almost 3 times more likely to experience mental health issues such as depression or anxiety, according to the National Alliance on Mental Health, yet many mental health providers receive no training in addressing the challenges unique to our community. Third: the LGBTQ community has been reluctant to openly discuss the depression and anxiety that plague so many of us. The stigma, on so many levels, is enormous. Some of us hide our sexual orientation or our gender identities from our mental health providers for fear of being misunderstood, ridiculed, or rejected. At the same time, we also often hide our mental health conditions from our LGBTQ friends and family. Both are rational and justifiable responses to widespread bias and prejudice—but both actions markedly undermine our ability to overcome mental health issues and get healthy. Yet, as I travel throughout our region, I see promising signs that these problematic trends are shifting. The anti-LGBTQ rhetoric in Washington DC and in some state capitals has our community working together with renewed purpose and determination, making gains that only a decade ago seemed impossible. I see and hear many in our community openly sharing their distress in response to the epidemic of suicides that we are experiencing across the region. A growing number of mental health lines for our community have been established to meet this need. I also see the mental health community rising to the challenge. From Boston to Seattle, there are increasing number of efforts to bridge the gap and both ensure the mental health community is equipped to serve the LGBTQ community and that the LGBTQ community is aware of the range of mental health resources available. On June 14, we will further bridge this gap when, with support from Pride Foundation, Cardea will host a free webinar for mental health providers in the Northwest to help them understand how they can better engage with their LGBTQ clients. “This training is one of the first of its kind and is a response to the situation we find ourselves in now,” said Ginny Cassidy-Brinn, Clinical Training Manager at Cardea. “The queer community is meeting increased levels of violence and discrimination which can exacerbate underlying mental health issues. In this environment, how can providers help people feel safe when, in the past, they’ve been mistreated?” Luis Fernando Ramírez Limón, Executive Director of Entre Hermanos, explained that the hurdles for Latina/o/x LGBTQ individuals to obtain the mental healthcare they need is even greater, “There are cultural barriers that make going to a mental health professional quite challenging. And now, we are adding to these challenges the fact that many of our clients are undocumented and fear that they could be deported. This can put mental health assistance even further out of reach.” These issues will also be discussed as part of the webinar. At Pride Foundation, when we say “Be Who You Are, Where You Are”—we mean it. Whether our stories are full of joy, anxiety, or pain, we must continue to share openly and honestly. Only then can we truly be there for one another and celebrate genuinely. Gunner Scott is Director of Programs at Pride Foundation. For more information or to register for the Cardea Webinar, follow this link. Additional Community Resources: - Gay City LGBTQ Resources and Referrals: 206-323-5428 - M-F 11 am – 8 pm - Sat 11 am – 5 pm - Crisis Clinic: 866-427-4747 - 24-hour help line - GLBT National Help Center - National Hotline: 888-843-4564 - Sage LGBT Elder Hotline 888-234-7243 - Youth Talkline 800-246-7743 - Trans Lifeline - Seattle Counseling Service (206) 323-1768 - Entre Hermanos (206) 322-7700 - 10 am to 5 pm
<urn:uuid:8c4d42c9-3bef-400f-b371-b380f9676511>
CC-MAIN-2023-23
https://pridefoundation.org/2017/06/mental-health-in-the-lgbtq-community-where-do-we-go-from-here/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648695.4/warc/CC-MAIN-20230602140602-20230602170602-00230.warc.gz
en
0.946334
1,088
2.671875
3
What Are Ontologies? Attempts to synthesize and summarize what is known about the world date back thousands of years. Scholars and nonscholars alike have faced the problem of how to organize knowledge and to integrate new observations with what is already known. Box 2-1 presents a brief summary of some early efforts to organize knowledge. Philosophers use the term ontology (literally, discourse on being) to describe efforts to classify or group ideas, particularly those related to the nature of existence. Scientists today use the word ontology to refer to efforts to organize knowledge in particular domains. Although there is no universal definition of a scientific ontology, a valuable working definition is an explicit, formal specification of a shared conceptualization—a systematic set of shared terms and an explication of their interrelationships.1 As a simple example, an ontology might define and categorize types of ice cream products, distinguishing among those served in vessels, in cones, and on sticks, as shown in Figure 2-1. Ontologies are used in many different kinds of applications, including those for information integration, knowledge management, Semantic Web services, and enterprise application integration. Ontologies can be used in different ways depending on the nature of the problem at hand. For example, ontologies can be applied to improve information retrieval 1 We generally use the term “ontology” to refer to a range of systems that have been developed to enumerate the essential entities in a discipline, though not all of the systems may meet the precise definition; see Chapter 3 in the full report for a detailed discussion. systems by providing a common understanding of concepts that humans and computers can both use. Ontologies can also be applied to undergird automated reasoning systems by providing formal definitions for concepts and the relationships among them. Ontologies may be specified in various ways, such as lists of controlled terms, thesauri, taxonomies, and formal representations in logic. All of these can represent explicit specifications of shared conceptualizations—although with different degrees of formality. Ontologies shape many aspects of human life, including media consumption, e-commerce, and the use of social media. For example, the ability to turn on Netflix and scroll through recommended movies depends in part on an ontology that the company has used to classify its content. Ontological systems lie on a continuum of increasing semantic complexity. That is, classification systems designed for ontological purposes (the specification of definitions and relationships) may include weak semantics (such as a simple taxonomy that specifies only class–subclass relationships) or strong semantics (such as formal representation in a logic that allows developers to specify the properties of entities and constraints on those properties). Thus, in this report the term ontological systems can refer to those that may or may not meet the definition of ontology. Figure 2-2 illustrates the spectrum of semantic specification used in the context of the behavioral sciences, showing where controlled lists, thesauri, loose hierarchies, and taxonomies fall. Controlled lists, such as a list of social and behavioral determinants of health, are enumerations of specifically defined terms that help to provide consistency for users of the list. Thesauri organize terms so that the grouping reflects relationships among the terms: closely related terms are situated near one another, although exact relationships are unspecified. Taxonomies expand on thesauri by also showing hierarchical, class-subclass relationships, such as parent-child relationships, but the concepts are only enumerated: the relationships between concepts are not expressed in formal axioms. Table 2-1 provides more information about the examples shown Figure 2-2. The point of the continuum is to demonstrate that a variety of representation systems are used in the behavioral sciences and that these repre- TABLE 2-1 Examples of Ontological Systems on a Continuum |Social and Behavioral Determinants of Health||A controlled list of defined terms related to behavioral, social, economic, environmental, and occupational factors. The list helps organize information and provides terminology for the causes of morbidity, mortality, and future well-being.| |Thesaurus of Psychological Index Terms||A controlled list of standardized terms and definitions of psychological concepts with a loose hierarchy showing relationships to other terms. The controlled vocabulary allows for indexing, cataloging, and searching of psychological concepts.| |Diagnostic and Statistical Manual of Mental Disorders (DSM)||A loose hierarchy of the behavioral phenotypic manifestation of mental disorders using a common language and standard criteria based on consensus. The DSM features descriptions of mental health conditions and use categories to offer a diagnostic tool for clinical practice and research.| |Big Five Personality Traits||A suggested grouping (taxonomy) of personality traits. The grouping provides a model of the primary dimensions of individual differences in personality, and personality trait facets that form part of a primary dimension.a| |Behavioral Change Intervention Ontology (BCIO)||A formally specified set of entities and their relationships that establishes a common language. BCIO is used to organize information in a form that enables efficient accumulation of knowledge and enables links to other knowledge systems.| a The five traits are extraversion (or extroversion), agreeableness, openness, conscientiousness, and neuroticism. sentation systems vary in their degree of semantic specification. Considering this variety and the importance of designing classification structures to suit the needs of the researchers in a particular domain, the committee found that it was not useful to try discern a strict cutoff below which a structure would not be considered an ontology or to classify known structures as ontologies or “non-ontologies.” Instead, we highlight that the structures that exist along this continuum in the behavioral sciences serve ontological purposes that are scientifically valuable. These examples are discussed in more detail below. All ontologies provide a structure for the enumeration of the entities in some domain. They articulate formal decisions about what is known and, to varying degrees, about the relationships among the elements of what is known, and they provide a means for sharing these enumerations across diverse approaches and methodologies. It is in this sense that a range of systems may serve ontological purposes: an ontological system with strong semantics is not necessarily better than one with weaker semantics. The use of strong or weak semantics will fit a specific purpose or set of purposes, and each inevitably will reflect the relative immaturity or maturity of the domain it is designed to systematize. This page intentionally left blank.
<urn:uuid:84b17803-8d93-4958-aff5-d08f1ed533d2>
CC-MAIN-2023-23
https://nap.nationalacademies.org/read/26755/chapter/3
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649105.40/warc/CC-MAIN-20230603032950-20230603062950-00030.warc.gz
en
0.908408
1,343
3.515625
4
If you have a bike, it’s important to know how to pump air in the tires. This process is simple and only takes a few minutes. You’ll need an air pump, either a hand pump or a floor pump. If you don’t have one, you can usually borrow one from a friend or the bike shop. Once you have the pump, follow these steps: To pump air in a bike tire, you will need to first locate the valve stem on the tire. Once you have found the valve stem, you will need to use a bike pump to pump air into the tire. Typically, you will want to pump the tire until it is firm, but not too hard. Why can’t I pump air in my bike tire? If you’re having trouble getting your tire to inflate, it could be for any number of reasons. Make sure you’re using the right head on your pump for your valve stem style, and that the pump is fitted correctly. If your valve stem is damaged, there could be a puncture in your tire. Alternatively, your pump may be damaged. If you’re going tubeless, it’s also possible that your bead isn’t set correctly. It is important to remove the dust cap before using a CO2 cartridge to inflate a bike tire. This is to avoid mixing dust and particles with pressurized air in the bike tire. Once the dust cap is removed, check the tire to see if it needs to be inflated. If so, connect the inflator head to the cartridge and remove the inflator head from the valve. Once the tire is inflated, return the dust cap. Why won’t my tire accept air If you have a puncture or tear in your tyre, it is most likely caused by an external object piercing the tyre and creating a small hole. This can be difficult to diagnose, as the puncture could be very small. If you think you may have a puncture, check your tyres for any signs of damage and look for any objects that may have caused it. If you can’t find anything, take your tyre to a professional to have it checked. Make sure the pump is compatible with the valve before connecting. Clean any dirt from the cap and stem connect The pump to the valve by pressing the nozzle straight onto the valve. If the pump has a pressure gauge, check that the needle is in the green zone. Can you fill bike tire with hand pump? Most bike pumps will work with Schrader valves, however you may need an additional adapter if your bike tire has a Presta valve. You can either use a floor pump or a hand pump to inflate your bike tire. Below, we outline how to pump a bike tire with both types of pumps. Bikes have either Schrader or Presta valves. Make sure your bike pump has a head that is compatible with your valve style. All pumps on this list are compatible with both. Bike’s Wheel Size: If you have 12″ kids bikes, some bike tire pumps are much easier to use than others. Can you fill bike tires at gas station? You can inflate your bike’s tires with a gas station pump, but they must have a Schrader valve (or a Schrader adapter for a Presta valve). Inflate in small, quick bursts and watch the pressure so the tire doesn’t blow out. Air pumps at gas stations are meant for quick inflation of car and motorcycle tires. It is important to check your tire pressure with a gauge to ensure accuracy. Do not eyeball it, as this could result in your tires being under or over inflated. Why is my tire pressure not going up If your tires are old and worn, they may not be able to hold air pressure as well as they used to. This can cause problems with your car’s handling and performance. If you’re having trouble keeping your tires inflated, it may be time to replace them. This is a note about how to fix a goal. You keep adding to it until you get to where you want it to be. Be sure to replace the valve stem if needed. What PSI should my bike tires be? As a general rule, street/road bike tires should be inflated to between 90 and 120 PSI. This range provides a good balance of comfort and performance. For mountain bikes, the range is generally lower, between 30 and 60 PSI. Over to the edge And we’re gonna keep pulling So you can see what sid’s doing is as she works her way up slowly but surely she’s gonna make it to the top and no matter what anyone says she’s gonna keep going until she gets there How do you manually inflate You should always start by inflating your air bed flat. This will help to prevent any undesired creases or folds. Once the bed is flat, open up the valve to begin the inflation process. If your air bed has a one-way valve, be sure to close it when you are finished so that air doesn’t escape. If your presta valve tire is flat, you can use your mouth to blow air into it to inflate it. However, if your schrader valve tire is flat, you will need to use a pump to inflate it. If neither of these methods work to inflate your tire, then check the tire and tube for damage and replace if necessary. How do I know if my bike is Presta? Presta valves are most commonly seen on road bikes, while Schrader valves are more often seen on mountain bikes. The main difference between the two is the size and shape of the valve, with Presta valves being thinner and lighter than Schrader valves. Presta valves also have a lock nut to keep the valve closed, which is not present on Schrader valves. Yes, the valve for a car and bike is the same, so this pump is suitable for both. What kind of pump do you need for a bike tire A floor pump is the fastest and most efficient way to pump up your tires. It will eliminate the hassle and workout of using a mini or frame pump to top off the pressure before rides. And, if you have a floor pump, you won’t wear out your frame pump so quickly. tyre pressures can be lowered to marginally improve comfort and grip, However, its rolling efficiency will suffer too much. Therefore, tyre pressure is normally maintained at a relatively high level of 90-100psi. proper way to pump air in bike tire There are a few things you need to do in order to ensure that you are properly pumping air into your bike tire. First, you need to make sure that the valve is open. Next, you will need to attached the pump to the valve. Once the pump is attached, you will need to pump the air into the tire until it is at the desired PSI. It is quite simple to pump air in bike tire and all you need is a pump. First, take off the wheel of your bike and then use the pump to put air in the tube. Once the tube is full, reattach the wheel and you’re good to go!
<urn:uuid:8259f896-cc9b-4b19-a655-09ed2e70b7f3>
CC-MAIN-2023-23
https://titanxtrem.com/how-to-pump-air-in-bike-tire/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648858.14/warc/CC-MAIN-20230602204755-20230602234755-00630.warc.gz
en
0.950936
1,526
2.671875
3
Harassment and Discrimination Policy Collierville Schools Policy 6.304 Student Discrimination, Harassment, Bullying, Cyber-bullying and Intimidation The Collierville Board of Education has determined that a safe, civil, and supportive environment in school is necessary for students to learn and achieve high academic standards. In order to maintain that environment, acts of bullying, cyber-bullying, discrimination, harassment, hazing or any other victimization of students, based on any actual or perceived traits or characteristics, are prohibited. This policy shall be disseminated annually to all school staff, students, and parents. This policy shall cover employees, employees' behaviors, students and students' behaviors while on school property, at any school sponsored activity, on school-provided equipment or transportation, or at any official school bus stop. If the act takes place off school property or outside of a school-sponsored activity, this policy is in effect if the conduct is directed specifically at a student or students and has the effect of creating a hostile educational environment or otherwise creating a substantial disruption to the education environment or learning process. Building administrators are responsible for educating and training their respective staff and students as to the definition and recognition of discrimination/harassment. - Bullying/Intimidation/Harassment - An act that substantially interferes with a student’s educational benefits, opportunities, or performance, and the act has the effect of physically harming a student or damaging a student’s property; knowingly placing a student or students in reasonable fear of physical harm to the student or damage to the student’s property; causing emotional distress to a student or students; or creating a hostile educational environment. Bullying, intimidation, or harassment may also be unwelcome conduct based on a protected class (race, nationality, origin, color, gender, age, disability, religion) that is severe, pervasive, or persistent and creates a hostile environment. - Cyber-bullying - A form of bullying undertaken through the use of electronic devices. Electronic devices include but are not limited to telephones, cellular phones or other wireless telecommunication devices, text messaging, emails, social networking sites, instant messaging, videos, web sites or fake profiles. - Hazing - An intentional or reckless act by a student or group of students that is directed against any other student(s) that endangers the mental or physical health or safety of the student(s) or that induces or coerces a student to endanger his/her mental or physical health or safety. Coaches and other employees of the school district shall not encourage, permit, condone or tolerate hazing activities. “Hazing” does not include customary athletic events or similar contest or competitions and is limited to those actions taken and situations created in connection with initiation into or affiliation with any organization. COMPLAINTS AND INVESTIGATIONS Alleged victims of the above-referenced offenses shall report these incidents immediately to a teacher, counselor or building administrator. All school employees are required to report alleged violations of this policy to the principal/designee. All other members of the school community, including students, parents, volunteers, and visitors, are encouraged to report any act that may be a violation of this policy. While reports may be made anonymously, an individual's need for confidentiality must be balanced with obligations to cooperate with police investigations or legal proceedings, to provide due process to the accused, to conduct a thorough investigation or to take necessary actions to resolve a complaint, and the identity of parties and witnesses may be disclosed in appropriate circumstances to individuals with a need to know. The principal/designee at each school shall be responsible for investigating and resolving complaints. The principal/designee is responsible for determining whether an alleged act constitutes a violation of this policy, and such act shall be held to violate this policy when it meets one of the following conditions: - It places the student in reasonable fear or harm for the student’s person or property; - It has a substantially detrimental effect on the student’s physical or mental health; - It has the effect of substantially interfering with the student’s academic performance; or - It has the effect of substantially interfering with the student’s ability to participate in or benefit from the services, activities, or privileges provided by a school. Upon the determination of a violation, the principal/designee shall conduct a prompt, thorough, and complete investigation of each alleged incident. Within the parameters of the federal Family Educational Rights and Privacy Act (FERPA) at 20 U.S.C. § 1232g, a written report on the investigation will be delivered to the parents of the complainant, parents of the accused students and to the Director of Schools. RESPONSE AND PREVENTION School administrators shall consider the nature and circumstances of the incident, the age of the violator, the degree of harm, previous incidences or patterns of behavior, or any other factors, as appropriate to properly respond to each situation. A substantiated charge against an employee shall result in disciplinary action up to and including termination. A substantiated charge against a student may result in corrective or disciplinary action up to and including suspension. An employee disciplined for violation of this policy may appeal the decision by contacting the Federal Rights Coordinator. Any student disciplined for violation of this policy may appeal the decision in accordance with disciplinary policies and procedures. When a complaint is filed alleging a violation of this policy where there is physical harm or the threat of physical harm to a student or a student's property, the principal/designee of each school, shall report the findings and any disciplinary actions taken to the director of schools and the chair of the board of education. By July 1 of each year, the director of schools/designee shall prepare a report of all of the bullying cases brought to the attention of school officials during the prior academic year. The report shall also indicate how the cases were resolved and/or the reasons they are still pending. This report shall be presented to the board of education at its regular July meeting, and it shall be submitted to the state department of education by August 1. The director of schools shall develop forms and procedures to ensure compliance with the requirements of this policy and TCA 49-6-1016. RETALIATION AND FALSE ACCUSATIONS Retaliation against any person who reports or assists in any investigation of an act alleged in this policy is prohibited. The consequences and appropriate remedial action for a person who engages in retaliation shall be determined by the administrator after consideration of the nature, severity, and circumstances of the act. False accusations accusing another person of having committed an act prohibited under this policy are prohibited. The consequences and appropriate remedial action for a person found to have falsely accused another may range from positive behavioral interventions up to and including suspension and expulsion. Collierville Schools offers educational and employment opportunities without regard to race, color, creed, national origin, religion, sex, age, or disability and adheres to the provisions of the Family Education Rights and Privacy Act (FERPA).
<urn:uuid:2e815998-b4ea-4b17-9be9-8bd67cdbe086>
CC-MAIN-2023-23
https://colliervillehs.colliervilleschools.org/apps/pages/index.jsp?uREC_ID=280219&type=d&pREC_ID=2356733
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648858.14/warc/CC-MAIN-20230602204755-20230602234755-00630.warc.gz
en
0.939646
1,449
2.609375
3
(The following is a post by Susan Meinheit, Reference Specialist for Tibet, Asian Division) A very attractive task it is to pursue the gradual growth of the Kanjur and Tanjur through the course of many centuries, and to establish the chronology of the translations. (Berthold Laufer, “Notices of Books,” Journal of the Royal Asiatic Society, Oct. 1914) A recent acquisition has added a new resource for this task to the Library’s Tibetan collection. The “Dragon Tripitaka” is an elaborate reproduction of a rare manuscript edition of the Kanjur (Bka’ ‘gyur in Tibetan), the canonical texts of Tibetan Buddhism. The original was hand-copied in gold ink on dark blue paper, in 1669 for presentation to the Qing Emperor, Kangxi (reigned 1661-1722). This reproduction was produced by the National Palace Museum, Taipei, which holds the original. It is complete in 111 volumes, 100,000 pages, including an index. Two separate volumes feature 756 beautifully painted illustrations of Buddhas, Bodhisattvas, Dharmapalas, patriarchs, and arhats, which adorn the first and last folios of each volume. This set, one of only 210 printed, was acquired in October 2015 as an Asian Division’s special yearend purchase. The original gold manuscript was created in 108 traditional Tibetan volumes, with folios measuring 87.5 centimeters by 33 cm. It is divided into categories as: Rgyud (Tantra, 24 volumes), Shes-phyin (Perfection of Wisdom, 24 volumes), Dkon-brtsegs (Heap of Jewels Sutras, 6 volumes), Phal-chen (Flower Ornament Sutras, 6 volumes), Mdo-sna-tshogs (Sutras, 32 volumes) and ‘Dul-ba (Discipline, 16 volumes). The use of gold ink for producing Tibetan Buddhist texts was quite common and reflects the reverence in which such books are held. They are considered to be sacred objects worthy of the finest materials and workmanship. The Tibetan canon consists of two parts, Kanjur (Bka’ ‘gyur), the words of the Buddha, and Tanjur (Bstan ‘gyur), commentaries written by Indian and Tibetan scholars. The Kanjur contains texts translated from Sanskrit into Tibetan, and is especially valued due to the precision of the translation, which allows the reconstruction of lost original texts of early Indian Buddhism. These texts, translated into Tibetan beginning in the 7th century, were first assembled into comprehensive manuscript collections in Tibet in the 14th century, resulting in the “old Narthang” edition (Narthang was a monastery in central Tibet). After that, scholars generally recognize two main transmission lineages, the them spangs ma, sometimes called the Western transmission, and the tshal pa or Eastern transmissions, both of which were based on the old Narthang manuscript. The Tibetan canon was never a fixed compilation, but rather varied based on different arrangements and inclusions of texts. This is why textual criticism is a major focus of study of the various editions, and the words of Laufer, one of the early contributors to the Library’s Tibetan collection, still hold relevance today. New discoveries are still being made of previously unknown editions, which can sometimes call into question actual transmission lines. The Peking editions, to which the “Dragon Tripitaka” belongs, represent the tshal pa transmission, which began with the Yongle edition of 1410, the first wood-block (xylograph) edition. In 1605, a second Peking xylograph, the Wanli edition, was produced using the same blocks. During the Qing dynasty (1644-1912), the Kangxi emperor produced a slightly revised Peking edition, 1684-1692, from newly carved blocks. So the “Dragon Tripitaka” of 1669 was produced before the revised edition and we might assume that it was copied from the 1605 edition, as manuscript Kanjurs were often copied from the nearest printed set. But further study is needed to learn the history of this particular manuscript: who prepared it, where, how long did it take to complete, is it a direct copy, and are there any inconsistencies? Other representatives of the tshal pa transmission are also in the Asian Division’s Tibetan rare book collection. This includes a reproduction of the 1737 Peking edition held in Otani University (Kyoto, Japan). This edition had been revised with new material based on the Derge edition. Another Peking edition is represented by a digital copy held by the National Library of Mongolia, although recent research indicates that it also has elements of both transmissions. The “Dragon Tripitaka” seems, then, to represent the earlier un-revised tshal pa transmission. Another representative of this transmission is the Choni (Co ne) edition, which was acquired for the Library from Joseph Rock in 1928, and printed from the original 18th century blocks. In terms of structure of texts, the Choni is said to most resemble the Peking xylographs, with a few variations. The Library’s Choni edition has been digitized from a microfilm and digital images are available onsite only. The Western transmission, the them spangs ma, evolved in Tibet, with a manuscript created in Gyantse in 1431, also based on the 14th century old Narthang manuscript. This lineage is represented in the Asian Division’s collections by a digital copy of the Ulan Bator manuscript of 1671, in 111 volumes on seven DVDs acquired several years ago. Also in the collection is a reprinted representative of this tradition in the edition of Stog Palace, Ladakh. Several 18th century Kanjurs are considered to have elements of both transmissions, and are represented in the Library’s collection by an original print of the Derge Kanjur (1733), and reprint editions of both Derge, and Urga (1908-1910). Derge Printing House was established in 1729 in eastern Tibet, now northern Sichuan Province, China. It was one of the most famous of Tibet’s many printing monasteries. Urga is the historic name for Ulaanbaatar, Mongolia, where this edition was produced. Writing this I am reminded of the veritable wealth of Kanjurs available in our Tibetan collection. Other than the delight at viewing such a fine example of the Tibetan manuscript production and beautiful illustrations of the “Dragon Tripitaka,” there are questions which can only be answered by a thorough examination of the texts and colophons, and comparison with other editions. Scholars of Tibetan canonical transmission and the art of the Tibetan book will now have an additional resource for the pursuit of Laufer’s “attractive task.” The “Dragon Tripitaka,” cataloged as “Kanjur: Long zang jing, Tibetan language edition,” is classified as rare material and its usage is governed by the policy described here. Subscribe to 4 Corners of the World – it’s free! – and the world’s largest library will send you cool stories about its collections from around the world! Lovely work. Thank you for the informative description! I too have enjoyed spending some time looking at the incredibly beautiful and intricate drawings and editions of these samples Tibetan manuscripts. I encourage others to be sure to spend some time reviewing the artwork and commentaries that go with them You will find it well worth your time. Even if Tibetan literature was not your original goal. There is so much to be learned from spending a short time reading and enjoying these pages. I can’t figure out how to send the comment. All I see is “Add a Comment” and “Clear”. There is no “Send” Lovely! Thank you, Susan!
<urn:uuid:1621538f-0a05-49da-8a84-ad0eac225527>
CC-MAIN-2023-23
https://blogs.loc.gov/international-collections/2016/07/a-newly-acquired-tibetan-kanjur-the-dragon-tripitaka/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646181.29/warc/CC-MAIN-20230530230622-20230531020622-00430.warc.gz
en
0.949426
1,697
2.765625
3