content
stringlengths
71
484k
url
stringlengths
13
5.97k
The Arnolds Park Library Board met Wednesday, July 9, 2014 at 5:00 p.m. in the Arnolds Park Library. Members present were Mitch Brown, Joyce Burgeson, Robb Keizer, Barb Woodley, and Librarian Kara Rice. Absent was Diana Jensen. The minutes of June 11, 2014 were read. Burgeson approved the minutes as corrected and Keizer seconded. All aye. Report on summer reading program: A total of 93 kids signed up. The last program ended the last week of June. Rice is thinking next year of asking for donations from some local businesses to supplement the summer program. The total cost runs $500 - $600. She saw a huge change in easy readers check-out. It has been a busy summer so far. As of July 1st, the library checked out over 700 items. Discussion of DVD's: Rice explained that frequently DVD's are being returned with no DVD in the box. The procedure is being changed so that at check in time, the staff will look to make sure no DVD's are missing. If so, the last person to check it out will get a phone call. Discussion of overdue items and late fees: Current library policy is if the item is not returned after 2 months or more, and the staff has made reasonable attempts to contact the patron, the patron is then liable for payment of the missing item. Rice suggested the library set a time of 3 weeks overdue to trigger notification . If no response from the patron, the library sends a certified letter with a deadline. If no response, the patron receives a bill for the overdue items. After discussion, the board agreed. Rice will present an example of the certified letter next month. Shared programming with local libraries: Rice explained two shared programs coming up on Weather Preparedness. Monday, July 14th at 3:00 p.m. at the Spirit Lake Library is a program for kids presented by Saxby the Squirrel. Tuesday, July 15th at 2:00 p.m. is a program for adults presented by Eddie Weiss called "What's Going On With the Weather?" Publication of Library Minutes: Rice checked with local libraries and none of them publish their minutes in the local newspaper. They just post them on their library website as Arnolds Park is doing. The board members agreed to follow the procedure in place. Ragbrai: Rice said there was a suggestion that the library be open on Sunday July 20th so that Ragbrai participants could use the Wi-Fi and bathrooms. After discussion the board said that people can pick up Wi-Fi from outside the library and there are enough other resources for bathrooms. It shouldn't be necessary to have the library staffed that day. Bills for July 2014 were presented in the amount of $4,083.87. Rice reviewed the bills. Two kids magazine racks have been installed and 2 magazines ordered. The bill of $280 for Friends of the Spirit Lake Library consists of $200 for the 2014 cost of archiving of newspapers, and $80 to cover cost of the two Storm Chaser programs. Rice thought the phone bill seemed to high for one phone line and a fax line. She did some research and found the library has been paying for a second line that was cancelled several months ago. The library should be getting a refund. Keizer moved to pay the bills as presented. Burgeson seconded. All aye. Rice said that Bonnie McKewon, Regional Librarian, had brought her an orientation package. She will need to take two years of training. She will need to go once to Des Moines, but most of the training is available on line. Burgeson mentioned that Hill Avenue Books in Spirit Lake has sold, but will remain a book store. In checking, she found that Arnolds Park is the only library that purchases books from them. The next meeting will be Wednesday, August 13, 2014 at 5:00 p.m. The Arnolds Park Library Board met Wednesday, June 11, 2014 at 5:00 p.m. in the Arnolds Park Library. Members present were Joyce Burgeson, Mitch Brown, Barb Woodley, Diana Jensen, Robb Keizer and librarian Kara Rice. The minutes of May 27, 2014 were approved as read. Employee step plan: The board reviewed spreadsheets of the current library staff step plan. The library staff consists of three levels - Director, Library Aide and Junior Aide. The Junior Aide wage is low compared to the other two. Rice explained the aides were part time positions and further discussed their different duties and skills. After much discussion, the board agreed to rename the three tiers of library staff as follows: Director, Library Assistant, and Library Aide. Burgeson moved to recommend to the City Council to increase the Step 0 pay for the Library Aide to $9.80 per hour with a cost of living increase per the City step plan. The city will figure the percentage increase for the rest of the steps. Keizer seconded. All aye. Dickinson County funding information: Rice presented notes from a recent county librarian's meeting on better county funding. It was decided the county libraries will go together to meet with the County Board of Supervisors this fall to request an increase in funding. Library Hours: Right now the library is open two nights a week until 6 p.m. and on Saturday morning from 10:00 - 12:00. The minimum requirement for Tier 1 libraries to be eligible for state funding is to be open at least one evening until 6:00 p.m. It was suggested by the library staff to discontinue one of the extra evening hours and extend Saturday mornings by one hour to 9:00 - 12:00. Following discussion by the board, Keizer moved to leave the closing times the same and extend Saturday hours to 9:00 - 12:00 beginning July 1, 2014. Burgeson seconded. All aye. Close library on July 5, 2014: Burgeson moved to close the library on Saturday July 5, 2014 . Brown seconded. All aye. Reading program report: Rice reported that 46 children are participating and are excited to get the prizes they earn. She commented that the new books are always gone off the shelf. She will get an article to the newspaper on the activities they have done and those yet to come. Library programming with surrounding libraries: The county libraries have discussed conjoined programming to help with the budget. Each library would host a different program and help each other split the cost. A recent discussion was to get the Storm Chasers for a program. Publish library minutes in the newspaper: Rice was told by the city that any open meeting has to have the minutes published in the Dickinson County News. Jensen asked whose budget would pay the publishing fees. Rice said she will have someone representing the City at next month's meeting to explain the process and cost. Burgeson suggested more articles on the Arnolds Park library activities and upcoming programs be placed in the Dickinson County News and Lakes News Shopper. Kids magazines: Rice said they are thinking of installing magazine poles and get a few kids magazines to see what kind of interest is generated. Bills: Bills were presented for June 2014 in the amount of $6,215.57. Rice said that Amazon is requesting to be paid immediately. Their portion of the bill $4,995.07. The City had amended the library budget to pay for Sue Sup's severance pay. There will still be $21,000 left after paying the bills for June. Keizer moved to accept the bills as presented. Burgeson seconded. All aye. The next meeting will be Wednesday, July 9, 2014 at 5:00 p.m. The meeting adjourned at 5:48 p.m.
https://arnoldsparklibrary.weebly.com/library-board/archives/07-2014
BLOOMFIELD REDISCOVERED The census of 1830 showed about 30 families living within the Township's 36 square miles. In 1874, another census indicated a population of 1,912. In 1940, after Bloomfield Hills had incorporated as a separate city in 1932 and Birmingham in 1933, the resultant 25 square miles left in the Township boasted only 1,771 residents. Ten years later, in 1950, the population had doubled to 3,851. Six people ran the government, all of it. Then came the population explosion! Between 1950 and this Bicentennial Year of 1976, the population has increased to 48,425, twelve times its half century level. Today it takes more than 200 employees to run government operations. The major story of Bloomfield therefore is not in the shadowy past when the pioneers discovered its gentle hills and fair lakes, but in the rediscovery by bright young families of what it has to offer as a beautiful place to live. The natural setting provides a backdrop for its homes and its residents' activities, but only careful planning and a watchful eye have allowed Bloomfield to absorb this influx of new residents without destroying the way of life which attracted them in the first place. Step inside our boundaries and take a look at Beautiful Bloomfield. The Making of Modern Michigan was funded by the Institute for Museum and Library Services , an independent federal agency that supports the nation's museums and libraries. Through agreement, this site is hosted by the MSU Libraries and therefore is subject to its privacy statement . Please feel free to send any comments regarding this site to digital@mail.lib.msu.edu .
https://mmm.lib.msu.edu/record.php?id=3709
Medical doctor who was one of the four founders of the Johns Hopkins Hospital. As per our current Database, William Osler died on Dec 29, 1919 (age 70). After settling in to run the medical program at the University of Pennsylvania, William Osler started the Association of American Physicians. William Osler was born in Bond Head, Canada West (now Ontario), on July 12, 1849, and raised after 1857 in Dundas, Ontario. (He was called William after William of Orange, who won the Battle of the Boyne on July 12, 1690.) His mother, who was very religious, prayed that Osler would become a priest. Osler was educated at Trinity College School (then located in Weston, Ontario). In 1867, Osler announced he would follow his father's footsteps into the ministry and entered Trinity College, Toronto (now part of the University of Toronto), in the autumn. At the time, he was becoming increasingly interested in medical science, under the influence of James Bovell, and Rev. William Arthur Johnson, encouraging him to switch his career. In 1868, Osler enrolled in the Toronto School of Medicine, a privately owned institution, not part of the Medical Faculty of the University of Toronto. Osler lived with James Bovell for a time, and through Johnson, he was introduced to the writings of Sir Thomas Browne; his Religio Medici caused a deep impression on him. Osler left the Toronto School of Medicine after being accepted to the MDCM program at McGill University Faculty of Medicine in Montreal and he received his medical degree (MDCM) in 1872. Following post-graduate training under Rudolf Virchow in Europe, Osler returned to the McGill University Faculty of Medicine as a professor in 1874. Here he created the first formal journal club. During this time, he also showed interest in comparative pathology and is considered the first to teach veterinary pathology in North America as part of a broad understanding of disease pathogenesis. In 1884, he was appointed Chair of Clinical Medicine at the University of Pennsylvania in Philadelphia and in 1885, was one of the seven founding members of the Association of American Physicians, a society dedicated to "the advancement of scientific and practical medicine." When he left Philadelphia in 1889, his farewell address, "Aequanimitas", was on the imperturbability (calm amid storm) and equanimity (moderated emotion, tolerance) necessary for physicians. An inveterate prankster, he wrote several humorous pieces under the pseudonym "Egerton Yorrick Davis", even fooling the editors of the Philadelphia Medical News into publishing a report on the extremely rare phenomenon of penis captivus, on December 13, 1884. The letter was apparently a response to a report on the phenomenon of vaginismus reported three weeks previously in the Philadelphia Medical News by Osler's colleague Theophilus Parvin. Davis, a prolific writer of letters to medical societies, purported to be a retired U.S. Army surgeon living in Caughnawaga, Quebec (now Kahnawake), author of a controversial paper on the obstetrical habits of Native American tribes that was suppressed and unpublished. Osler would enhance Davis's myth by signing Davis's name to hotel registers and medical conference attendance lists; Davis was eventually reported drowned in the Lachine Rapids in 1884. In 1889, he accepted the position as the first Physician-in-Chief of the new Johns Hopkins Hospital in Baltimore, Maryland. Shortly afterwards, in 1893, Osler was instrumental in the creation of the Johns Hopkins School of Medicine and became one of the school's first professors of medicine. Osler quickly increased his reputation as a clinician, humanitarian, and teacher. He presided over a rapidly expanding domain. In the hospital's first year of operation, when it had 220 beds, 788 patients were seen for a total of over 15,000 days of treatment. Sixteen years later, when Osler left for Oxford, over 4,200 patients were seen for a total of nearly 110,000 days of treatment. In 1905, he was appointed to the Regius Professor of Medicine at Oxford, which he held until his death. He was also a Student (fellow) of Christ Church, Oxford. Osler is well known in the field of gerontology for the speech he gave when leaving Hopkins to become the Regius Professor of Medicine at Oxford. "The Fixed Period", given on February 22, 1905, included some controversial words about old age. Osler, who had a well-developed humorous side to his character, was in his mid-fifties when he gave the speech and in it he mentioned Anthony Trollope's The Fixed Period (1882), which envisaged a college where men retired at 67 and after being given a year to settle their affairs, would be "peacefully extinguished by chloroform". He claimed that, "the effective, moving, vitalizing work of the world is done between the ages of twenty-five and forty" and it was downhill from then on. Osler's speech was covered by the popular press which headlined their reports with "Osler recommends chloroform at sixty". The concept of mandatory euthanasia for humans after a "fixed period" (often 60 years) became a recurring theme in 20th century imaginative literature—for example, Isaac Asimov's 1950 novel Pebble in the Sky. In the 3rd edition of his Textbook, he also coined the description of pneumonia as "the friend of the aged" since it allowed elderly individuals a quick, comparatively painless death: "Taken off by it in an acute, short, not often painful illess, the old man escapes those "cold gradations of decay" so distressing to himself and his friends." Coincidentally, Osler himself died of pneumonia. In the UK, he initiated the founding in 1907 of the Association of Physicians and was founding Senior Editor of its publication the Quarterly Journal of Medicine until his death. In 1911, he initiated the Postgraduate Medical Association, of which he was the first President. In the same year, Osler was named a baronet in the Coronation Honours List for his contributions to the field of medicine. In January 1919 he was appointed President of the Fellowship of Medicine and was also in October 1919 appointed founding President of the merged Fellowship of Medicine and Postgraduate Medical Association, now the Fellowship of Postgraduate Medicine. He died at the age of 70, on December 29, 1919, in Oxford, during the Spanish influenza epidemic, most likely of complications from undiagnosed bronchiectasis. His wife, Grace, lived another nine years but succumbed to a series of strokes. Sir William and Lady Osler's ashes now rest in a niche in the Osler Library at McGill University. They had two sons, one of whom died shortly after birth. The other, Edward Revere Osler, was mortally wounded in combat in World War I at the age of 21, during the 3rd battle of Ypres (also known as the battle of Passchendaele). At the time of his death in August 1917, he was a second lieutenant in the (British) Royal Field Artillery; Lt. Osler's grave is in the Dozinghem Military Cemetery in West Flanders, Belgium. According to one biographer, Osler was emotionally crushed by the loss; he was particularly anguished by the fact that his influence had been used to procure a military commission for his son, who had mediocre eyesight. Lady Osler (Grace Revere) was born in Boston in 1854; her paternal great-grandfather was Paul Revere. In 1876, she married Samuel W. Gross, chairman of surgery at Jefferson Medical College in Philadelphia and son of Dr. Samuel D. Gross. Gross died in 1889 and in 1892 she married William Osler who was then professor of medicine at Johns Hopkins University. In 1925, a biography of William Osler was written by Harvey Cushing, who received the 1926 Pulitzer Prize for the work. A later biography by Michael Bliss was published in 1999. In 1994 Osler was inducted into the Canadian Medical Hall of Fame. Osler was a prolific author and a great collector of books and other material relevant to the history of medicine. He willed his library to the Faculty of Medicine of McGill University where it now forms the nucleus of McGill University's Osler Library of the History of Medicine, which opened in 1929. The printed and extensively annotated catalogue of this donation is entitled "Bibliotheca Osleriana: a catalogue of books illustrating the history of medicine and science, collected, arranged and annotated by Sir William Osler, Bt. and bequeathed to McGill University". Osler was a strong supporter of libraries and served on the library committees at most of the universities at which he taught and was a member of the Board of Curators of the Bodleian Library in Oxford. He was instrumental in founding the Medical Library Association in North America, alongside employee and mentee Marcia Croker Noyes, and served as its second president from 1901 to 1904. In Britain he was the first (and only) president of the Medical Library Association of Great Britain and Ireland and also a president of the Bibliographical Society of London (1913). Osler was a founding donor of the American Anthropometric Society, a group of academics who pledged to donate their brains for scientific study. Osler's brain was taken to the Wistar Institute in Philadelphia to join the Wistar Brain Collection. In April 1987 it was taken to the Mütter Museum, on 22nd Street near Chestnut in Philadelphia where it was displayed during the annual meeting of the American Osler Society. William Osler's father was a renowned sailor--either as a merchant or as a pirate, the truth of the matter was up for debate. Currently, William Osler is 172 years, 11 months and 17 days old. William Osler will celebrate 173rd birthday on a Tuesday 12th of July 2022. Below we countdown to William Osler upcoming birthday.
https://www.celeb-networth.com/william-osler-doctor
first publication: fantasy book ( vol. 6, 1950) the early asimov" liar! " robopsychologist susan calvin matches wits with a robot who can read minds and is strictly controlled by the three laws of robotics. asimov story [ a. 028] completed january 1941. order of isaac asimov books isaac asimovwas an american author of hard science fiction and popular science books in addition to being a professor at boston university. he is considered to be one of the greatest science fiction authors of all time. the unique feature of asimov' s robots are the three laws of robotics, hardwired in a robot' s positronic brain, which all robots in his fiction must obey, and which ensure that the. best asimov books score a book’ s total score is based on multiple factors, including the number of people who have voted for it and how highly those voters ranked the book. isaac asimov ( / ˈ æ z ɪ m ɒ v / ; c. janu – ap) was an american writer and professor of biochemistry at boston university. he was known for his works of science fiction and popular science. asimov was a prolific writer who wrote or edited more than 500. a list of isaac asimov' s books. Gulliver s travels book map publishing » here' s my list of isaac asimov' s book titles. the numbering was provided by asimov ( except for a few marked with an asterisk). after that the titles appear in roughly the order they were written, although this is an educated guess. Clue: 1950 asimov classic. It is not price clipped. This clue was last seen on universal crossword aprilanswers. I, robot is the first and best isaac asimov book in the robot series, which was published in 1950. I, robot is a fixup novel of science fiction short stories or essays by american writer isaac asimov. The novel itself takes place in the vast galactic empire based at trantor that features in so many of asimov’ s short stories and novels — most famously, foundation. This is an exact facsimile copy of the first asimov 1950 book edition of i, robot by asimov 1950 book isaac asimov which was first published in 1950 with an initial print run of 5, 000. I robot has a laid in bold signature by asimov. Pebble in asimov 1950 book the sky ( 1950), isaac asimov’ s first published novel, is asimov 1950 book a revision of the earlier short story ‘ grow old with me’ published in the late 1940s. 1950 asimov classic is a crossword puzzle clue. The book comes with its rare original dustjacket. These represent all 3 asimov 1950 book of the scarce asimov 1950 book titles in the series, all in exceptional condition: i robot: stunning clean, asimov 1950 book near fine book with a original near fine vibrant dust jacket, beautifully signed on a. Clue: 1950 isaac asimov book. Free download or read online i, robot pdf ( epub) ( asimov 1950 book robot 0. At the same period, asimov wrote about the bible and forwarded his “ asimov’ s guide to the bible” in two volumes covering both the old and the new testament. Here is the answer for: * asimov sci- fi book 1950 crossword clue answers, solutions for the popular game universal crossword. Asimov was always deeply involved in the advancement of human knowledge — vide his hundreds of nonfiction books on virtually every scientific discipline imaginable — and that conviction carried over into his fiction as far back as 1940. Facsimile of first edition. Please check the asimov 1950 book answer provided below and if its not what you are looking. Here' s a list of isaac asimov' s book titles, arranged by categories in the same fashion as in his autobiographies. The similarities end there and the movie, for the most part, is original from the book. Author: asimov, isaac. There is a bookstamp and some numbers written in the front. : this book is in good condition. The man will always be one. He was also interested in literature, and wrote his “ asimov’ asimov 1950 book s guide to shakespeare” in 1970, and “ the annotated gulliver’ s travel” in 1980. This clue belongs to universal crossword aprilanswers. The first edition of this novel was published in december 2nd 1950, and was written by isaac asimov. I, robot” by isaac asimov, 1950. Below is the solution for * asimov sci- fi book 1950 crossword clue. In case something asimov 1950 book is wrong or missing you are kindly requested to leave a message below and one of our staff members will be more than happy to help you out. Find many great new & used options and get the best deals for i, robot first edition by isaac asimov 1950 rare at the best online asimov 1950 book prices at ebay! The stories originally appeared in science- fiction magazines between 19, the asimov 1950 book year that they were first published together in book form. A new branch of science has been developed called psycho- history which allows predicting the future based on computational mathematics and psychology. The stories originally appeared in the american magazines asimov 1950 book super science stories and astounding science fiction between 19 and were then compiled into a book for stand- alone publication by gnome press in 1950, in an initial edition of 5, 000 copies. 392 the mammoth book of asimov 1950 book classic asimov 1950 book science fiction. * asimov sci- fi book 1950 possible solution: irobot did you already found * asimov sci- fi book 1950 solution? It is a collection of nine previously published short stories that are woven together as a 21st- century interview with robopsychologist, dr. Below you will find the correct answer to 1950 isaac asimov book crossword clue, if you need more help finishing your crossword continue your navigation and try our search function. Prometheus booksisaac asimov presents the great sf stories, 12: 1950 daw booksyoung extraterrestrials harper & row. There are related clues ( shown below). The book was published in multiple languages including english language, consists of 224 pages and is available in hardcover format. 391 isaac asimov presents the best crime stories of the 19th century. Good candidate for either a facsimile dust jacket, or anyone inclined to repair this one. 396 isaac asimov’ s science fiction and fantasy story- a- month™ 1989 calendar. It is a rebound asimov 1950 book ex- library book in blue hardcover binding. The book and jacket are precise copies of the original. 1950 isaac asimov asimov 1950 book book is a crossword puzzle clue that we have. While searching our database we found 1 possible solution matching the query asimov 1950 book “ * asimov sci- fi book 1950”. This clue was last seen on aprin the universal crossword puzzle. We have 1 answer for this clue. Each story involves a witty premise in which the “ three laws of robotics” are stretched to a breaking point and causes aberrant behavior in the robot, leaving the protagonist( s) in search of logical explanations to. Book cover art by stephen youll ( left) ; don dixon ( right). Pebble in the sky ( 1950. Below we have shared * asimov sci- fi book 1950 solution. Shelton, ct: first edition library. 1950 isaac asimov book asimov 1950 book is a crossword puzzle clue. Com: i, robot first edition by isaac asimov 1950 with dust jacket rare! This book by isaac asimov is the first of the foundation series, a science fiction which tells the story of a declining galactic empire in an imaginary world and era. Surprise surprise— it shoots someone. The jacket is in fair condition. These stories all existed in the same universe and some of the same characters showed asimov 1950 book up in several. There is some foxing. In a mostly complete, but poor dust jacket, asimov 1950 book which is stained and soiled, and the front flap is detached, but present and laid- in to the book. ) in fact, asimov wrote these robot stories almost for his entire career— from the 1940s to the 1990s. Here are stories of robots gone mad, of mind- reading robots, and robots with a sense of humor. This clue was last seen on universal, aprilcrossword in case the clue doesn’ t fit or there’ s something wrong please contact us! Details for each book are listed below by title. 1950 asimov classic is a crossword puzzle clue that we have spotted 5 times. Free shipping for many products! 398 saturn: the ringed beauty. Find answers for the crossword clue: 1950 short- story collection by asimov. I, robot, the first and most widely read book in asimov’ s robot asimov 1950 book series, forever changed the world’ s perception of artificial intelligence. I, robot is the 1950 collection of some of the robot stories that asimov wrote between 19. Continue reading ‘ * asimov asimov 1950 book sci- fi book 1950’ ». Go back to find more crossword clues of universal crossword aprilanswers. 394 isaac asimov presents the great sf stor. This short story collection is followed by asimov 1950 book four full novels. I, robot, a collection of nine short stories by science- fiction writer isaac asimov that imagines the development of “ positronic” ( humanlike, with a form of artificial intelligence) robots and wrestles with the moral implications of the technology. The main characters of this science fiction, fiction story are susan calvin, mike donovan. Scifi audiobooks isaac asimov - 1950 pebble in the sky fass. On this page you will find the solution to * asimov sci- fi book, 1950 crossword clue. Find answers for the crossword clue: 1950 asimov classic.
https://stma11fukushima.info/4015/6c921a9a1
Pacific Grove >> While it’s been through its fair share of incarnations, the Pacific Grove Public Library is in the midst of a renovation designed to restore it to its original glory. “The idea is to bring it back to what it might have been,” said Steven Silveria, director of Pacific Grove Library and Information Services. Since opening in 1908, the Andrew Carnegie-designated library, which originally included the library’s gallery, reading room and rotunda, received its first addition of a men’s smoking room in 1926. Then came a designated children’s room in 1938 followed by expansions in 1950 and 1978. While current patrons still use some of the same tables and chairs that were there since 1908, somewhere along the way the original Douglas fir floor was covered with carpet while the building’s interior stained wood and arches were covered with paint. The original chandeliers somehow disappeared. Yet the gallery portion that Carnegie helped fund remained. Carnegie was an industrialist who made his riches in the American steel industry. Later in his life his philanthropic efforts included the establishment of public libraries throughout the United States. The P.G. Library is the only Carnegie building in this region that continues to function as a public library. Silveria said that when he became director three years ago, the library was well used and crowded. He and others overseeing the library examined what needed to be done to accommodate users but also to reclaim its original character. “We have a lot of visitors — the average is 500 in a day,” said Silveria. “So it’s just time to refresh things.” That means new carpet, paint, renovated restrooms and restoring wood where it’s needed. While the outside painting and landscaping began in the summer of 2015, the Nancy and Steve Hauk gallery has also been completed. But everything else — other than the American Disabilities Act updates, including a wheelchair lift by the library’s back door and an access ramp by an exit door — are underway. Silveria said other interior work should begin at the first of the year and may take a few months to complete since it will be done in phases so the library can be open through most of the construction. All of the renovations are now possible because of the recent approval by the P.G. City Council of an agreement between the Pacific Grove Public Library Foundation and Friends of the Pacific Grove Public Library to accept funds that had been raised to support building upgrades. “The library is something that P.G. people treasure,” said Susan Steele, president of Friends of the Library. “It’s so interwoven with the community. It’s a place that everyone uses. It’s the only place that people go to that’s free.” Steele said that the completed gallery will serve as an example of what they want the rest of the Carnegie section of the library to look like. Since 1974, the volunteer-based nonprofit that Steele presides over has helped to keep the library alive. The organization, which includes a board of 12 and 430 members, has made an annual commitment to the library of $35,000 to $40,000 for books and materials and $5,000 for children’s programs. “Friends of the Library has been the single reliable source for books and materials that the library has been using for the last six to seven years,” said Steele. The city of Pacific Grove provides for the library’s basic operating costs. Now, as part of the renovation, Steele and her bevy of volunteers are also overseeing the creation of three replica chandeliers that are modeled after the originals that once hung. That’s while they prepare for an upcoming art exhibition and juried art show that will take place in the library’s gallery in early October. “But we don’t want to hang them (the chandeliers) until the rest of the renewal is done,” said Steele. “It’s really a great project and it’s going to bring back the feel of this building,” said Silveria. “Our goal is to really make it seem like opening day 1908.” Carly Mayberry can be reached at 831-726-4363.
https://www.montereyherald.com/2016/09/08/pacific-grove-works-to-restore-andrew-carnegie-designated-library/
After flirting with a market value of $ 2 trillion over the past two days, the cryptocurrency market is up 7% on April 7, and the total market value of cryptocurrency is down to $ 1.8 trillion. Due to the unexpected sell-off, investors quickly found a reason to explain this move. Excessive influence is generally seen by analysts as a prime suspect, as it usually happens when the market is at a high level and traders are greedy, but this is an easy conclusion to come to. Determining the real cause can be almost impossible. The starting point, however, is to compare the buyer’s influence with previous weeks. Analysts must also wonder whether the $ 1 billion liquidation is significant in the current bullish environment. Exchange increases the price movement on both sides The negative price fluctuation on April 7 is similar to the rally that took place two days ago. However, retailers use leverage using standing futures contracts (reverse swaps) which can exacerbate price corrections. A deduction of 5% is enough to wind up traders with 20x leverage, and trade order books tend to be below this level as traders rarely have orders in place. ADA) USDT order book. Source: Binance As shown above, in the example above, there are $ 4.6 million prices going down to $ 1.15 for Cardano’s ADA. Beyond the 5% threshold, there is only $ 1.9 million left to $ 1.06, or 12% less than the previous trade. Soft order books are a goldmine for valves and arbitration agencies. When end-user markets enter highly utilized positions, there are many incentives to lower prices and stimulate liquidation. Overall qualifications. Source: Bybt A $ 1.4 billion settlement in 12 hours may seem overwhelming, but it unites all futures markets. Furthermore, this represents only 3% of the total open interest rate of $ 46 billion. If this movement had taken place about six months ago, this figure would have been over 12%. However, an indication that the liquidation triggered the downturn is not the best answer, as they only occur when markets are down 4% or more. While analysts may not fully understand why the correction took place, the “rumored buying and selling news” event could have happened after Coinbase reported its quarterly results. The funding rate is high, but not abnormal It is also important to check how high the financing rate is, and most importantly, how long. Even if the 8-hour commission reaches 0.20%, which is equivalent to 4.3% per week, it will not force long-term positions to close. As shown above, the average funding ratio on the major stock exchanges did not rise above 0.10%, well below the end of February. It is normal for long traders to enter into over-the-counter trades during a rally, and this situation can last from hours to weeks. Sometimes dealers turn to sit down ends Perhaps the whales and market producers knew that the order books were weak and the retailers were overused. Therefore, no one can ignore the fact that today’s price movement is a deliberate maneuver. However, arbitrage between stock exchanges and futures markets happens almost immediately, so there is no trace left. Analysts and analysts can identify a number of reasons for the current move, but the available evidence suggests that debt alone is not the cause.
https://sloveniag.com/retail-traders-become-sitting-ducks-as-sell-off-triggers-1-4b-liquidation/
- For reviews, limit search to Document Type: "Entertainment Review." Includes full-text reviews from Variety, back to 1920. - Entertainment Industry Magazine Archive 1880-2000 - For reviews, limit search to Document Type: "Review." - Canadian Periodical Index (CPI.Q) 1988 to present - Reviews Canadian and other films. Select Document Type: “Movie review.“ For reviews back to 1948, see "Movie reviews" in the print volumes of Canadian Periodical Index. - American Film Institute Catalog 1893 to present - Search for the film title, note the release date, and see the source citations at the end of the film record. - New York Times 1851 to three years ago - Search for reviews, profiles, advertisements, and movie listings. For reviews, limit search to month and year of release. - Movie Review Query Engine - Freely available database. Select “Critic reviews.“ Includes New York Times, Chicago Sun-Times (Ebert). Main print resources for reviews - Film Review Index volumes 1-2. - Volume one covers 1882 to 1949; volume two covers 1950 to 1985. Print location: Z 5784 M9F513 - Selected Film Criticism. - Includes full text from sources such as Photoplay and The Film Spectator. Print location: PN 1995 S426 Reviews vs Criticism |Criteria||Film Reviews||Film Criticism| |Audience||general public||scholars and students| |Authors|| || | |Accountability||may be reviewed by an editor||usually peer reviewed or refereed| |Content|| || | |Documentation||may have no references to other sources, and no bibliographies or footnotes||always contains references to other sources, given in a bibliography or footnotes| |Publications||magazines, newspapers||academic journals, books| |When published||when film is released||months or years after release| |Examples||Crowther, Bosley. "Screen: Sordid View of French Life: Breathless' in Debut." New York Times 8 February 1961. ProQuest Historical Newspapers: The New York Times. Web. 12 Sept. 2012.||Hayes, Kevin. "The Newspaper and the Novel in À bout de souffle." Studies in French Cinema 1.3 (2001): 249-251. Film and Television Literature Index. Web. 12 Sept. 2012.| Selected Dictionaries: Definitions - Dictionary of Film Studies. Oxford University Press. 2012. - Cinema Studies: the Key Concepts. Routledge. 2006. - Critical Dictionary of Film and Television theory. Routledge. 2005. - Routledge companion to film history. Routledge. 2011. - Film Analysis Guide. Yale University. 2002. Books: Omni (library catalogue) Use Omni to find books. a) Identify books by searching these selected Subject Headings - Documentary films - Experimental films - Feature films - Feminism and motion pictures - Feminist motion pictures - Film adaptations - Film criticism - Film genres - Film noir - Motion picture industry - Motion picture music - Motion pictures - Motion pictures, Canada - Motion pictures, history - Motion pictures, political aspects - Motion pictures, production and direction - Motion pictures, reviews - Motion pictures, social aspects - Silent films - Silent film music - Video recording b) Or look for specific names or titles: - Hitchcock, Alfred - Hamlet (Motion picture) Useful starting point: Film and Television: A Guide to the Reference Literature, by Mark Emmons. Print Location: PN 1994.E47 Other Resources - Where are the books? - Check Floor Plans - For collections of online texts, see - For film scripts, see: American Film Scripts, early 20th century to present - To identify books not available locally, see - WorldCat, a collection of more than 50,000 library catalogues worldwide - Get Materials from Other Libraries - More resources, including public library catalogues - American Film Scripts - Full text scripts of significant feature films. - California Digital Newspaper Collection - Selection of California newspapers from 1846 to the present. - CineFiles - The Pacific Film Archive's film document image database. Includes reviews, program notes, newspaper articles, etc. for selected films. - Directory of International Film and Video Festivals - Descriptions of collections including some film clips. - Early Modernity on Film - Bibliography of articles and books. - FilmSound.org - Includes articles and annotated links to film sound resources. - Focus on Film - From the U.K.'s National Archives. Includes clips from historical films. - Internet Archive - Includes digitizations of old film magazines such as Moving Picture World and Photoplay. - Margaret Herrick Library Digital Collections - Includes correspondence, photographs, periodicals and sheet music. - Media History Digital Library - Classic media periodicals, including trade papers and fan magazines, in the public domain. Search using Lantern - Moving Image Archive - Selected, digitized titles from the Prelinger Archives: a collection of "ephemeral" (advertising, educational, industrial, and amateur) films. - Moving Image Source: Criticism and Theory - Pulls together quality sources for film and television. - National Film Preservation Foundation (U.S.) - Lists preserved films and their locations, along with selected film clips. - News archives online - Includes full text of New York Times, London Times, Globe and Mail, etc. - ULCA Library Digital Collections - Includes material for film history.
https://library.wlu.ca/services/subject/film-studies
Welcome to The Book Report where we run down everything that happened in the month and update you on challenges, giveaways, reviews and more! Shari’s Update July turned out to be a pretty good month for me. I read 13 books which isn’t great, but not bad either. Balancing that out, I had my best review writing month in a long time, but at least the best in 2018. A total of 9 review and I prepped a lot more for August! It’s almost time to send my kids back to school. Just one week left of summer vacation. It never seems to be much time and I hate going back so early in August. Third grade is the name of the game this year. In Indiana, this is the pivital grade. By this point you should be able to read and comprehend, figure out what’s inferred. Cursive writing along with multiplications. And the slew of standardized tests start that I find a total waste of time. This is my last time through this grade! It’s also senior year for my oldest kid and I don’t know how we got here. She should be wearing pink bows with pigtails, demanding she only wear dresses. Yep, I am not ready to send her to college! In a couple of weeks Sophia Rose will be back and if you haven’t noticed we have Lorna on the team with a lot of new reviews! We are all working hard and hope you have enjoyed our Beach Reads series. August is the last month of them, so pick up the books we suggest because they are keepers! Now grab your books and find some shade. Hope you get to read everything you want! My Reading Breakdown: 0 NetGalleys (95%), 0 author/publisher requests, 0 DNFs, 0 audios, 4 Kindle Unlimited, 9 purchased books. Challenges The Series That Never Ends: 0/6 – 0% Bad Boys of Romance: 14/25 – 56% Literary Pickers: 21/50 – 42% Books ‘N Tunes: 18/25 – 72% Review Writing: 23/50 – 46% Reading Challenge: 83/135 – 61% Sophia Rose’s Update Howdy, all! We had a fabulous 4th with extended family over at Grammy’s. The heat was sweltering so Grammy and Pip’s pool was where it was at (though we all joked about the water being so warm that it was like bathwater). Lots of delicious barbecue pot-luck fare. And, catching up with family. But, now, we’re headed out west to Utah to drop in on my folks and then my brother and his wife to visit, do some camping, and more or less chill (though probably not in a Utah summer). I’ll be offline and unplugged for most of the time so no worries if you don’t seen me about until sometime in August. On a sidenote, I am fed up with airlines who change their policies and charges after I purchase my tickets. I feel like it’s a business contract where they should have to honor what they were offering at the point of ticket purchase. Oh, and good thing I took a quick perusal over what is allowed to be packed in carry-on/checked bags b/c in just a few months since the last time I flew- there are three changes) TRAVEL PRO TIP: Always check even right up to the day of going through security and checking baggage- it changes that fast. LOL I’m still in the middle of my COYER Summer challenge and really pleased with the reading numbers and the fun games, chats and mini-challenges, but also the joy of getting books read and off the back of my Kindle and real life shelves. For the first time in my reviewer history, I’m caught up so that only books not released for a while or books I only just received are on the pile of a dozen. I never thought this would be possible for me. I’ll bask in the thrill of it since we all know it will be short lived-(Sophia has no self-control with review requests). July Reading Total: 15 books (reflects only half of July at this point) Reading Breakdown: 2 Netgalley (98%), 4 author/publisher requests, 5 audio, 10 TBR shelf, 1 library book, 5 new series, 4 new to me authors, Romance Subgenres: Contemporary, New Adult, PNR, Historical, Western, Steampunk, Romantic Suspense, YA Challenge Updates: COYER Summer: 36 books/20+books Delighted Reader’s Series That Never Ends: 9/13 books Simply Angela’s Outlander: 1 of 2 books Herding Cats Burning Soup’s Read All the Books: 62/75 Nalini Singh books and stories My Reader’s Block’s Mt. TBR: 93/100 books moved up a level Austenesque Lovers: 43/50 books Herding Cats Burning Soup’s Blogger Shame: 7/7 COMPLETED (yep, no more oldies left on the pile) Delighted Reader’s Books N Tunes: 34/50 books Delighted Reader’s Literary Pickers; 100/100 books COMPLETED (took me 4ever to get that surfboard) Herding Cats Burning Soup’s Blog All About It: 8/12 topics Hot Listens and Caffeinated Reader’s Audiobook: 48/50 books Angela’s Guilty Pleasures’ Library Love: 11/12 books Under the Cover’s Romance Roundabout: 14/15 categories of five books each Books That Stood Out: Small Town Rumors by Carolyn Brown, CR, Homey feeling and fun Born in Darkness by Lara Adrian, PNR, fresh feeling that has me excited again for the series Inseverable by Cecy Robson, CR, oh the feels And, there you have it! Anyone else having a good time with their summer reading? This Month’s Reviews Did you miss a review? No fear! Here’s what we wrote about.
http://delightedreader.com/the-book-report-july-2018/
Agoncillo unfairly compared the prewar library collection and service with that within the 1980s. At the time of his loss of life in 1985, Agoncillo had a personal library that served all his analysis. He did not need the countrywide Library. Mortals like me had no option. After hard the Rizal manuscripts in the Lopez Museum, a trip to the national Library turned into inevitable. In 1987, when I begun getting to know within the country wide Library, i realized that opposite to universal perception not every thing become lost or destroyed throughout the 1945 fight of Manila. The Rizaliana assortment, consisting of original manuscripts and different materials with the aid of or bearing on the countrywide Hero, survived because they were moved from the Legislative constructing to local Philippine commonplace faculty. Choice substances speculated to be deposited in Manila city corridor were left behind in Philippine usual, a negligence that grew to become fortunate because city hall vaults were forced open and looted on the shut of the battle. Fashioned Rizal manuscripts, that include “Noli me tangere,” “El Filibusterismo,” and “Mi ultimo adios,” are actually preserved within the national Library. With the Biblioteca Nacional de España making infrequent Filipiniana attainable online and downloadable in high-resolution, I never thought of checking out the rare books in the national Library most effective to learn by means of a Spanish historian that there are some materials in Manila which are unavailable in Spain or in different places. Or buy here : Librarian What the catalog card tells us poster i was the primary reader when the countrywide Library reopened after nearly a 12 months of pandemic lockdown. I made a reservation online, acquired a QR code that indicated my seat quantity, and flashed this to two guards that allowed entry to the building. At the time of my consult with, the Filipiniana section only authorised 100 readers per day. The restrict may be raised once alternate reading rooms are ready to settle for more individuals. I had no library card, however a reader’s identification quantity was issued after i was photographed in a makeshift sales space that gave the look of a police reserving station minus the fingerprinting. No plastic library card changed into attainable yet. Readers are seated far from every other. Requests are made on a pc terminal (convey your own hand sanitizer to use after) and books are brought to a claim counter. When complete, scan the barcode on the publication, location it on a return shelf and it will be sanitized before being put into provider once more. Lamentably, not the entire books are in the system pending the migration of the historical catalog to a new online public access catalog that will doubtless make it feasible to request books from home and have them capable if you bodily flip up on the library. Their clientele are students and regularly occurring readers, there isn’t any provision yet for specialists who will check with infrequent or valuable cloth.
https://boituvi.net/librarian-what-the-catalog-card-tells-us-poster/
You all have two and a half months left to prepare for this exam. This time seems less on the basis of statistics but if you prepare with discipline then you can ensure your success. Notification has been issued by Bihar Public Service Commission (BPSC) for the upcoming examination (67th), for which the last date to apply is November 5, 2021. In this, graduate passed students of any state of the country can apply. BPSC Exam Pattern: There are generally three stages in this exam- Preliminary, Main and Interview. The final selection is done on the basis of marks obtained in main examination and interview. Preliminary exam is just a screening test, which reduces the rush of students. Only after clearing it, a certain number of candidates get an opportunity to appear in the main examination. This time the BPSC preliminary exam is proposed in January, 2022. So students do not have much time left. In such a situation, to ensure success, there is a need to make proper strategy according to the examination from now on. Also read- Aparna Ramesh UPSC Topper : Cleared UPSC With Job Attractions of this time: 1. After a long time in BPSC, a total of 88 posts of ADM have been added. 2. According to the notification, this time the total number of posts is more than 700, in which more posts are also expected to be added. Also read- Apala Mishra Success Story Required Steps for BPSC Preliminary Exam: Clearing the Preliminary Exam conducted by Bihar Public Service Commission requires a good strategy, only then one can get success in it. In this, 150 questions have to be solved in two hours. Therefore, it is necessary to make a good strategy keeping in mind the time. For this, first study the syllabus of the Preliminary Examination properly and have a detailed look at the questions asked in the last 10 years. Then plan your preparation according to the nature of questions asked in the last ten years. Since the questions related to facts are more in the Preliminary Examination, therefore the strategy should also be made in the same way. Also read- UPSC Topper Subham Kumar Biography Pay special attention to these points 1. Prepare from NCERT and General Lucent books. 2. You need to give special emphasis on viruses, bacteria, blood, vitamins, diseases etc. 3. Read national level newspapers and reliable magazines based on competitive exams for current affairs. Especially in the last eight months, the current affairs are more important. 4. Keep special focus on Olympics, IPL and T20 World Cup. Apart from this, Census (India and Bihar), Forest Report and other global reports are also a must-see. 5. Bihar has the most prominent contribution in ancient history, so it should also be given special attention. 6. Under medieval history, special attention will have to be paid to the major architecture, the names of the books and the author and the pilgrim. 7. Under Geography, you have to pay attention to NCERT (Books from class 6 to 12), Atlas, as there are five-six questions from World Geography. Also, deserts, lakes, streams, mountains also need to be kept an eye on. 8. For economics you can see the economics of the event cycle. 9. Under the Constitution, President, Governor, Constitutional Institutions, Courts, Articles and Constitutional Amendment etc. are important parts, from which questions are asked? 10. Questions related to sports and institutions are asked in Miscellaneous. 11. Do not study anything new in the last 20 days of the exam. Revise only. Further preparation tips for BPSC: You all have two and a half months left to prepare for this exam. This time seems less on the basis of statistics, but if you prepare with discipline, then you can ensure your success. If you look at the BPSC Prelims exam, then you should have a special focus on four subjects- History of Modern India, General Science, Bihar General Studies and Bihar Current Affairs. Around 100 questions come from these four subjects.
https://mymorningtea.in/bpsc-exam-2022-tips/
BENGALURU: Anecdotes, stories, useless information, serious science of quantum theory, liberal views, jokes, suicidal thoughts, food, games and flowers. Sounds random? These and more such oddities will be brought together in the form of a contemporary dance-cum-theatre performance titled Dream Baby Dream. “The 45-minute performance is about our dreams, which unlike movies, don’t make sense. For example, when we dream we are being chased by a mouse and then suddenly sitting on a cloud the next minute,” says Sahiba Singh, choreographer of the piece. “It is a compilation of different people’s stories and dreams, through which we intend to portray fear, love, emotions, fantasy, desire and nonsensical things,” she adds. The performance will be abstract for two reasons, Singh says. Firstly, it is a dance-cum-theatre performance.“Dance tends to have a level of abstraction as compared to theatre, which is with fixed text. We will have few dialogues and have more of movements, props, motives, and music. The second reason it will seem bizarre, is because of the theme itself,” says Singh, who is also the founder of Meeraqi studio. What does she hope the audience takes away from it? “Nothing,” quips Singh, “I am not concentrating on what people understand but what they feel. Just as we see how people stare at abstract modern paintings and feel something, even without dialogues, the same way our audience will feel.” As complicated as the final result may seem, the cast’s method of choreographing this seems fairly straightforward. Having had experience in Contemporary dance for 12 years, along with creating 5 non-linear dance theatre plays, Singh just asked her 10 member cast to pen down their dreams and found a way to visually portray them.
https://www.newindianexpress.com/cities/bengaluru/2018/apr/07/take-a-second-look-at-your-dreams-1798051.html
We watch as they put on beards and new clothes, their costume change forming part of the action. Drawing attention to the formalities of theatrical production — the screens and disguises required by on-stage performance — here becomes a kind of statement of honesty. These people, this much is made clear to us, are unreliable narrators. They have a propensity for lies. Does that make the play itself untrue? What do we seek when we enter a theatre? But clean edges and easy finishes can make for too neat a tale, and neatness often feels at odds with reality. These stories are both factually true — as we are told again and again — but it is in their fuzziness, their ambiguity, that they are made truer. Sometimes a murkier truth is a more believable one. Accursed be man! How stubbornly he denies the Truth. Addressing Rama, he said,' You are the son of the pure one, who laid down his life for the sake of Truth and you are the brother of noble Bharatha. Meaning and definitions of Truth, translation in hindi language for Truth with similar and opposite words. Also find spoken pronunciation of Truth in hindi and in English language. Tags for the entry "Truth" What Truth means in hindi, Truth meaning in hindi, Truth definition, examples and pronunciation of Truth in hindi language. Tips Note that 'matra' is added after the consonant. Meanings of Truth in Hindi [ Show Transliteration ]. Norbert Servos seems to have made a good summary of that power. Dance-theater developed towards something that could be described as a theater of experience, a theater that transcribes reality aesthetically, via direct confrontation, turning it into a physical fact experienced by the body. By getting rid of the shackles of literature, while making its abstraction concrete, dance becomes attentive for the first time in history, raising its consciousness and taking the means of expression into its own hands Servos, , p. Pina means a position, compared to other artistic movements, that overcomes dichotomies, just as the very content of dance-theater does. In relation to classical ballet, as an example, Pina Bausch has always demonstrated genuine respect, although she treats it with humor and criticism in her plays 4. However, as a creator of a new perspective of dance, she does not look at it under generally valorized optics, that is: neither as an unequaled conquest nor as a symbol of struggle. Norbert Servos brings this to our attention, with great propriety:. - IX. The Meaning of the Word Truth. - “Everything that follows is true”: how verbatim theatre questions the meaning of truth. - Mohandas Gandhi on the Meaning of Truth. - Overly Medicated! Dance-theater diverges enormously from the momentum of the and later movements. It does not seek to confront; it seeks to go to the bottom of things. It does not teach; it engenders experiences. It does not try to change; it allows change to take place Servos, , p. When Pina says that the important thing is not art, but life, she also says that to make art is also to assume a certain demand of meaning, of clarity in what is being said to the public. The imperative of expressing, which escapes a dichotomic logic, that is, neither is it reduced to a subjective truth, which no one else can reach, nor can it claim to mean something objective, which is not the task of art. And that this seems distressing, but does not depress us, on the contrary, it appears with extreme beauty and solidarity. To which Pina responds:. The Meaning of Truth (). By William James // Fair Use Repository This is the theme. But not in the sense that I own it and can chronicle it. It is in me, in us, in this much delimited time. At the time of the searches we are not dancers and choreographer, but human beings. We do this as manual labor, and none of us play any role. I do not want to tell any story if we cannot get behind it to become anonymous. Our themes and motives have to do with desire. Consequently, with the fact that we all want to be loved. When I in the piece ask: what you are afraid of, it is because we are all afraid of something. They are born in several languages, in several hours and days, because they want to express something very precise. That is in every moment different Bausch apud Koldehoff, , p. Escaping, as we have said, a dichotomic logic, Pina realized and was always marveled at the capacity that dance had, in the way that she was forging, to speak of things that affects most of the people, things with which people from different parts of the world identify themselves. As if she could speak, by other means, universal things. We emphasize the term because it should not be read with the philosophical burden that it has, that is, the burden of a tradition that sought to achieve truths beyond time and human life. This is not the case with Pina. Services on Demand In Pina, the body of the dancer effectively ceases to be a matter in which representations can be shaped. All those small boundaries are shaken by dance-theater: in a quiet way, it is true, but vehemently, they are shaken. In Pina, these words exist, but in a much more open and flexible way. Norbert Servos underlines, speaking of the fact that Pina did not create a simple style but a way of thinking dance:. Wikipedia and the Meaning of Truth In dance-theater, no one knows more than the audience - neither the choreographer nor the dancers - and no one raise a finger to teach people lessons. We can only search together for navigable routes, feeling our way carefully and experiencing things. In this understanding, what Pina calls experimentation can also be understood with an existential nuance. That is: it is not about improvising, simply, but to pour into dance language questions, words, and specific themes always concerning the strongest feelings of human beings. It is about expressing not the subjectivities, which concerns each individual, but feelings that would be shared by all. That explains the audacity of Servos in the abovementioned quote, to call this a total complete rehabilitation of poetry. But how does this happen? Pina has always used a way of working that consisted of starting with questions. It seems that from the outset such dynamics worked for her. Gradually, she put it as a working method for the whole company. Pina asked questions and the dancers had to respond through their bodies. The Internet Has Altered the Meaning of “Truth” and “Trust” Along with this method there was a worldview that was expressed in everyday life and relationships, making it clear that dancers are not, as in other dance perspectives, objects with which an art is made. Working with the method of questions entails activating memories and subjective experiences. - Grazing and Agrestic Customs of the Outer Hebrides. - Kamikazes, Corsairs, and Picket Ships: Okinawa 1945. - Most Popular! - Model-oriented Systems Engineering Science: A Unifying Framework for Traditional and Complex Systems (Complex and Enterprise Systems Engineering). - The Meaning of Truth, by William James. - Consumer Fraud. The ability to expose oneself, in other words, to be open and vulnerable, was and is the biggest challenge for the Wuppertal Tanztheater dancers. But whoever faces this challenge quickly realizes a personal source of strength. Anyone who pursues this path finds a truth that tears everything that is superficial and penetrates in the essential. Certain vitality is found and protected at the moment it is revealed. And it becomes clear that change happens very naturally, if we only allow it Servos, , p. From behind her desk, Pina would put herself as some sort of mirror to those universal feelings. Observing more than speaking, Pina had in mind what she once stated:. I am the thermometer. What I feel, I see, what makes me laugh and what I feel afraid of: this is what we show. What is interesting is that despite all the differences, the feelings are strangely identical Bausch apud Koldehoff, , p. We cannot assign to this speech an intention to say that other people think and feel like her. On the other side, Pina has stated several times that the audience was a part of the piece, in a sense that each one would see something in there under his own perspective and that was something the piece was made of, being all the truths inalienably relative - at no point of her life Pina would give up those principles. The success of the company has not changed the intention of her work. In her own words:. There are no special effects; there is nothing on stage that does not belong to it. - Twelve Greeks and Romans Who Changed the World. - What is the meaning of Truth in the Bible?. - A Will to Survive (Hardy Boys). - Meaning and Truth in African Philosophy. Each object has a purpose. Everything else is left out. We deliberately leave all this out Bausch apud Koldehoff, , p. glormayslumvar.tk These ideas of just using what absolutely and precisely makes sense in the scene or not having anything on stage in an accessory way are working precepts that respond to that way of thinking about dance, of how dance is made and of whom dance belongs to. It was in this way that Pina understood and worked with the idea of authenticity to create her works. It is necessary to go beyond preconceived forms and comfort zones, and to express from the inner experience all that concerns to humanity. As Jean-Jacques Roubine puts it,. What he must do is to use his innermost experience to find within himself a true emotion Roubine, , p. But Pina gives to this approach an even greater depth when she proposes that the actor, in this case the dancer, become anonymous behind his own stories. There are stories to be told, but because of what they have of human, not of personal. For Heidegger, rather than the common idea of a self-enclosed subject, the artist is only able to speak because he lets himself be taken by language, by the human questions that are in language, and because he allows language to take place as art through himself. The artist makes the work happen, of course, but he overcomes himself, insofar as it is him who speaks, what he speaks of is nothing but the questions which concern all human beings. Expressing herself in a language that is not that of philosophy and perhaps a much richer one , Pina seems to have worked very closely with this understanding. As Norbert Servos observes:. Behind this lies an uncommon and unprejudiced view of the world, which observes every manifestation of human behavior.
https://iltracebin.tk/the-meaning-of-truth.php
Two of the West Country’s finest fiddle-players join forces to form this fabulous duo with an innovative take on English traditional music and song. Nick Wyke & Becki Driscoll are highly-respected musicians, composers and workshop leaders based in North Devon. They first collaborated as a fiddle duo on a busking trip around Spain and Portugal, and in the years since have worked with some of the leading lights of the English folk scene, always pushing the boundaries and developing new and inventive music. They will take us back to times when stories were told in music, when tunes were used over and again in different times and places for dance and entertainment. C17th books of manuscript, such as Playford’s Dancing Master have informed players through the years, from the local band to musicians at court to today’s masters of tradition. Nick and Becki will tell tales in music and song, adding their own contemporary twists that will surely contribute to the continued web of music that holds us all together. There is no music without the folk to make it!
https://tapa.org.uk/event/blackdowns-early-music-projects-nick-wyke-becki-driscoll-english-fiddles-folk/
The 16th edition of the International Body/Mind Festival will address the notion of time. Artists and curators will collectively consider time in social and biological contexts, as well as at the level of body memory. Edyta Kozak, the artistic director of the festival, stresses that during this year?s edition of the festival various aspects of time will be discussed in artistic and socially engaged artistic projects pondering over such topics as ageing societies (including the notion of passing entailed in the career of a professional dancers), as well as the responsibility for the heritage and history of dance. Ruth Childs, the niece of the co-creator of the legendary Judson Dance Theater, will reconstruct three solo works of her aunt, on which the tow had worked together, in order to record them on film, as none of the three pieces have been video-documented. Togeter with Ruth Childs, one will be able to reflect on whether meticulous reconstruction of dance pieces, based on direct transfer of knowledge, is sufficient to bring time to a standstill? We will find out on 29 September. The DANCE ON ENSEMBLE, created by eminent dancers over 40 years of age, who danced for many years in the companies of William Forsythe, Pina Bausch, or the aforementioned Lucinda Childs, and who stand up to the terror of youth in dance. On the other hand, they currently wok with young choreographers, which results in an intriguing intergenerational exchange, and points towards another approach to time, which is manifested in their piece Water Between Three Hands, choreographed by Rabiha Mroué (6 October). Another original proposal comes with the premiere of Ramona Nagabczyńska?s More (Morus/Więcej) (30 September/1 October), in which time is posed in the context of continuous transformations of the body, thanks to which the very piece itself also undergoes ceaseless change and is recreated anew. The choreographer is interested in posthumanism, in particular in how it influences our thinking about the future, while also discovering the potential in future humans. The artist was inspire by the artist, musician and rock star Genesis P?Orridge, and his partner Lady Jaye Breyer, who originated a type of personal and artistic practice, in which they attempted to fuse into one person. More thus takes up the issue of multiplication, multiplicity in oneness, inspecting the disintegration and transformation of the individual. The title also invokes the figure of Thomas More, the philosopher whose utopian vision which evolved in Nagabczyńska?s concept into corporeal practice as a utopian activity that puts forward alternative modes of existence. The stability of interpersonal relations is also depicted as utopian. Another unique projects will be contributed by the authors of Time and Dance, implemented as part of a multi-annual exchange cycle Exchange/Change, conducted by the Body/Mind Foundation. A Polish-Hungarian artistic project, Exchange/Change has yielded more than what was originally projected as etudes, and what evolved into full-fledged pieces by young choreographers from both countries. Granting them with a good deal of artistic freedom and space for experimentation with regard to the problems of time, the project resulted in several pieces by Anna Biczók Nanastrova, Ula Zerek and Ola Bożek-Muszyńska, who will present their performances on 3 October, and by Luca Dömötör, Aniela Kokosza and Lior Lazarof, who will take to the stage two days later, on 5 October. Alexandra Laudo?s performance lecture An Intellectual History of the Clock (6 October), which will inaugurate the 24-hour conference Today Tomorrow, playfully engages our perception of time and manifests various types of its cultural conditioning that verge beyond the familiar circle of Western culture. The conference Today Tomorrow, co-organised with Goethe-Institut based on the concept by Joanna Warsza, will expand the context of time, which pervades this year?s edition of the Body/Mind Festival. The conference will be attended, above all, by artists, and the talks will be moderated by Bogna Świątkowska of the Bęc Zmiana Foundation. The main part of the conference will take place on Saturday, 7 October. Concluding the festival will be the screenings of film essays on time at the Warsaw branch of Goethe-Institut, accompanied by talks by Thomas Thorausch, deputy director of the German Dance Archive in Cologne. The festival will also be accompanied by the social and artistic project NELKEN ? line (30 September), which invites everyone to join the performance of the famous choreographic passage from Pina Bausch?s Carnations [Nelken] evoking each of the four seasons. The performance will take place at Plac Defilad. On 30 September and 1 October, visitors will be able to participate in an interdisciplinary educational installation, learning about the history of dance (films and publications) and attending meetings with artists and engaging in moderated choreographic games. The starting point for the installation was the open question of ?What does performance mean today??. Curatorial statement: Why the presence of time at the Body/Mind Festival? It is simple?we would like to show something that cannot be seen. Something that must be experienced. First, the memory and the past. What kind of emotions does dance from the past evoke? Are its ideas outdated or still valid? Can something as ethereal as dance be archived and reproduced? This is what a British-American dancer Ruth Childs is concerned with, among others. Childs will present a reconstruction of three solo works created in the 1960s by her aunt Lucinda Childs, a legendary postmodern dancer and founder of the Judson Dance Theater. Today, in the era of ubiquitous deconstructions, remixes, inspirations and borrowings, Childs?s project will be a unique Chance to revisit the historical originals created by an exquisite artist half a century ago. Secondly, the present. Since the past is already gone, and the future is not yet here, the present narrows down to a mere point in time, a moment for dwelling in timelessness, improvising in movement, being ?here and now?. When seeking that state, the Festival will invite its audience to join it in jamming and experiencing the integrating power of dance by means of Pina Bausch?s Nelken- Line. This is a project where everyone is welcome to join and dance a part of Pina Bausch?s choreography Spring, Summer, Autumn, Winter from her 1982 performance Nelken, a piece devoted to the theme of passing. The young generation of Polish and Hungarian artists will try to address the question of timeliness. The artists will approach the concept of time in their practices, presenting pieces commissioned by the Festival. Thirdly, the future. It brings a lot of questions with no easy answers and forces us to confront certain issues. One of them is the deepening problem of ageing society combined with a quest for longevity explored by DANCE ON ENSEMBLE ? a group of dancers aged over 40. Inspired by the sentence Here and gone!, used by the American legend of postmodern dance, Deborah Hay, their piece Water between three hands by the Lebanese director Rabih Mroué refers to the ?remnants of time? left in dancers? bodies and poses questions about irreversible passage of time, whose consequences are particularly dramatic for dancers, as well as the future and the alternatives it brings. Further explorations of the ?hereafter? are offered by Ramona Nagabczyńska, whose premiere piece More contemplates various visions of the future, identity, and the body in the ever-changing world dominated by new technologies. Concluding the series will be the presentation of the Catalan artist Alexandra Laudo, whose performance lecture An intellectual history of the clock explores the social construct of time and the ways in which it is measured and experienced. Laudo?s lecture will precede the 24-hour conference on performance and chronopolitics Today, Tomorrow, in which theorists, artists, curators, and journalists will sum up the festival, trying to determine what has de facto happened with time today? Dance, theatre, art can all bring time to a halt. These are moments where boundaries blur, as if we dissolved in something, becoming part of something greater. I hope you experience with the Body/Mind Festival will abound in such moments. See you at an opportune time!
https://taniecpolska.pl/en/news/warsaw-time-for-time-16th-bodymind-festival-begins-this-friday/
My artwork mainly consists of abstract human figures. Sculpting primarily in clay or plaster, I aim to evoke certain emotions and experiences, commonly solitude and sorrow. I start by building an armature and work the material onto it to produce a lone figure that closely represents the idea or emotion. The piece is then enclosed in a rubber mould and cast using another material. I have been greatly inspired by Judy Chicago’s Dinner Party, which I visited in 1979. This exhibition gave me permission to combine training from my mother in ‘women’s work’, such as sewing and knitting, with more physical tasks associated with traditional sculpture. Dance and gymnastics classes, as well as anatomy lessons, gave me an understanding of balance, poise, line and the energy of the human body.
https://www.pamfoleysculpture.co.uk/about
In celebration of the natural movements of the human body inspired by the natural movements of the Earth, Word Dance Theater expresses heartfelt emotions through dances choreographed by Isadora Duncan, the mother of modern dance. The dance company with their adult and youth students present a collection of dances rooted in inner expression for a magical performance. Founded in 2000 by award-winning artistic director Cynthia Word, Word Dance Theater has created and performed innovative productions in the D.C. area and beyond. The group brings together some of the best artistic minds in dance, theater, music, and production to create cross-disciplinary works that test creative boundaries for artists and tell stories of the human spirit.
https://www.sourceofthespring.com/event/isadora-duncan-in-celebration-of-movement-by-word-dance-theater/
This study aims to interpret interculturalism and find its meaning through the World Cities choreographed by Pina Bausch among contemporary dance works. This study analyzed Masurca Fogo, which was performed in Germany in 2018 among the World Cities. In order to achieve the purpose of this study, the primary and secondary data on Masurca Fogo were analyzed using literature research. The following results were derived by dividing into choreography process, dancers, and movements. The analysis results are as follows. First, the choreographer encountered racial and cultural diversity through activities in the United States and Germany, and tried to find an alternative to coexistence, based on a deep understanding of the life, culture, and languages of different countries. Second, a choreographer and dancers could exchange different cultural backgrounds and communicate freely through understanding and respect for each other’s cultures. Third, when organizing the work, they chose to use the daily lives of people in each country as independent episodes or they broke up the boundaries between reality and the stage by using video. Keywords:Multiculturalism, Contemporary dance, World Cities, Masurca Fogo, Cultural diversity Acknowledgments This work was supported by the Ministry of Education of the Republic of Korea and the National Research Foundation of Korea (NRF-2019S1A5B5A07094306) References - Cantle, T. (2012). Interculturalism: The New Era of Cohesion and Diversity. London: Palgrave MacMillan. [https://doi.org/10.1057/9781137027474] - Climenhaga, R. (2012). The Pina Bausch Sourcebook: The making of Tanztheater. London and New York: Routledge Chapman & Hall. [https://doi.org/10.4324/9780203125243] - Ha, K. H. (2020). The necessity of building an overseas volunteer digital archive for realization of interculturalism: focusing on the case of WFK KOICA (Master's thesis, Hankuk University of Foreign Studies, Seoul, Korea). Retrieved from https://lib.hufs.ac.kr - Hong, J. Y. (2012). The definition and structure of EU's cultural & creative industries. The Journal of Foreign Studies, 21, 263-283. [https://doi.org/10.15755/jfs.2012..21.263] - Kim, J. (2017). An interpretation of the Difference between Multiculturalism and Interculturalism based on the Standpoint of Charles Taylor. Cogito, 82, 77-99. - Kim, K. S. et al. (06.21.2011). Controversy over European multiculturalism failure heated up, Yonhapnews. https://www.yna.co.kr/view/AKR20110212012600085 - Kim, T. W. (2012). Theoretical Exploration of the European Interculturalism as a Paradigm for Social Integration. European Society and Culture, 9, 179-214. - Landis, K., & MacAulay, S. (2017). Cultural Performance: Ethnographic Approaches to Performance Studies. London: Palgrave Macmillan. [https://doi.org/10.1057/978-1-137-60395-1] - Lee, J. W. (2018). Exploring the meaning of interculturalism in contemporary dance. The Korea Dance Education Society Journal, 29(1), 135-155. - Lee, O. K. (1998). A Study on the Dramatical Expression in the Works of Pina Bausch: Centering around the Alienation Technique Theory of Bertolt Brechit (Master's thesis, Ewha Womans University, Seoul, Korea). Retrieved from http://lib.ewha.ac.kr - Linsel, A. (2013). Pina Bausch: Bilder eines lebens. Hamburg: Edel Germany GmbH. - Meyer, M. (2017). Pina Bausch: dance, dance, otherwise we are lost. London: Oberon Books Ltd. - Park, H. (2019). Creator Pina Bausch focusing on views of the 'Rough Cut' premiere. Research in Dance and Physical Education, 3(2), 71-77. [https://doi.org/10.26584/RDPE.2019.12.3.2.71] - Schulze-Reuber, R. (2008). Das Tanztheater Pina Bausch: Spiegel der Gesellschaft. Frankfurt/Main: R.G.Fischer.
http://rdpe.co.kr/_PR/view/?aidx=29149&bidx=2562
Word Dance Theater is dedicated to being a world-class organization that invites people from all walks of life into our unique Isadora Duncan-inspired philosophy, methodology, and aesthetic of dance. Our approach blends music, theater, poetry, and visual art with holistic dance movements that unite us with the full range of our emotions and restores us to our roots: the breath, energy, strength, beauty, spirit, community, and freedom that is the birthright of all people. Word Dance Theater is a 501(C)3 nonprofit organization. Founded in 2000 by award winning Artistic Director Cynthia Word, Word Dance Theater has created and performed innovative productions in the Washington, D.C. area and beyond. Word Dance Theater pays homage to Isadora Duncan’s technique, philosophy and revolutionary spirit, pushing the performing arts to new limits. Word Dance Theater brings together some of the best artistic minds in dance, theater, music, and production to create cross-disciplinary works that test the creative boundaries for artists, tells stories of the human spirit, and creates new experiences for audiences. Learn more about our commitment to Performances, Education, Community, and the Duncan Legacy.
https://www.worddance.org/about
A cultural festival started by a family of children in October 2018. Through different theme projects every year, let the children find stories, tell stories, listen to stories, and find the memory of this city. Treasure Hill’s neighbors “WanFu Elementary School" started all kinds of workshops from 2018, encourage all students, residents, families and teachers to co-create their own family lamp and to linkup the community’s stories and memories. The members from the workshop utilized cardboard boxes, reduction gear, shadows, and paper cut to make a story lamp. Collaborating with National Taiwan University of Arts, students from design department designed the lighting of the culture community, and hold a musical event for the residents to evoke the scenery and memories of them. Story Box lessons for students in classrooms. After learning, students use the story box to tell their own family stories. These warm and beloved course activities let the school developed a new feature, the students get to be part of the honored community as well as the community achieved students’ studying. Presenting the memory of Chinese New Year with traditional paper-cutting techniques – 2019 Taipei Lantern Festival 2019 Families of elders and children from Wanlong use traditional paper-cuts and story lights to tell the story of the city at Cheng-En Gate A Land of Happiness-2019 Treasure Hill Light Festival Through Treasure Hill Light Festival, WanFu Elementary school can bring their unique story lamp to Treasure Hill and light up with the scenery. https://castnet.nctu.edu.tw/castnet/article/13125?issueID=703 EXHIBITION 2018/10/05-10/07 ZA SHARE 2018 雜學校 2018/10/22-11/05 Light-Up! Wansheng Community Story Lamp Festival 2018/11/02-11/04 Maker Faire Taipei 2018 2019/02/16-02/24 2019 Taipei Lantern Festival 2019/03/30-05/05 A Land of Happiness-2019 Treasure Hill Light Festival 2019/08/03-08/04 Maker Faire Tokyo 2019 2020/09/19-11/08 Symbiosis Relationship-2020 Treasure Hill Light Festival 2021/12/04-12/05 You Never Know — 2021 Winter Open Day Memories of water 2020 點亮萬盛庄—故事燈2020—水的記憶 【Way of Thinking】Explore community story in a canoe In 2020, the senior students will build a story boat together to start the year’s cultural festival. The child will row this boat to see the city from the river. The theme of 2020 “Memories of Water" comes from the appearance of an invisible city between the two place names, Gongguan to Jingmei. The “invisible city" refers to an irrigation system in the age of agriculture. Because of the development of the city, the river of life that symbolizes the city is hidden under the city ground. During this year, children and their families use different ways to discover, experience and think about the transformation of the complex hydrology in this area to the past, present and future life. We let the course also connect the emotions of grandparents and parents and children, and make the community full of emotions. In the Woodworking Maker Course, students “build a boat together" and paint community stories on the boat. In this exhibition of Treasure Rock, “Story Boats", “Lanterns in Boats", and “Lamps Telling Stories" tell the feelings and memories that are tied to the community, and let children and big friends see their hometowns with water as their memories. Memory Of Sound 2021 Is it possible to find the common melody of the family in the songs hummed occasionally by the elders in the family? Or when a melody plays, it always brings back a special family memory! We took the children to find out these stories. In 2021, we use our voices to evoke family memories belonging to children and elders. Children record : the most favorite or most impressive memory of the elders. A piece of regional music or song, write down the name of the song or the melody of the piece, record it by humming or performing it down. Let the children follow the memory of the voice to find the family memories and sweet stories hidden behind the voice. Through such learning activities, children can find the sweetness hidden in family stories with their loved ones during the festival point, let the voice string up the stories of the past, and let the children understand the past and stimulate their thoughts about the future in the process picture. Continue the search for community stories and collect stories that belong to this area. By finding memories to connect emotions across generations, we will touch every heart in the south of the city in the post-epidemic era.
https://myteach.blog/2019/07/31/%E3%80%90innovative-teaching%E3%80%91light-up-wansheng-community-story-lamp/
Richard Davey celebrates the independent spirit that characterises Anthony Whishaw RA’s paintings in this extract from a new monograph. - From the Summer 2016 issue of RA Magazine, issued quarterly to Friends of the RA. Every April since his election to the Royal Academy in 1980 Anthony Whishaw has stood in his studio, surrounded by his paintings, and finalised his selection of the works he will be submitting for the year’s Summer Exhibition. April 2015 was no different. In November 2014 Whishaw had already decided on Come Dance with Me (2013-2015; pictured), a three-metre-long canvas he had been working on since 2013. Now, with just a month to go before the submission deadline, he had to decide on the others. With every Royal Academician allowed to submit up to six pieces he could have entered another five, but in the end he selected just three more. The four paintings Whishaw chose challenged the modernist narrative of linear progression, in which artists focus on one defined series of work at a time, and in which one idea flows neatly into the next, always looking forward rather than back. Whishaw doesn’t work in this way. The walls of his Kensington studio are covered with paintings that use a variety of visual languages and explore a range of subjects. Paintings of trees and Mediterranean seascapes, abstract colour fields and chiaroscuro still-lifes jostle for attention with no sense of hierarchy or obvious evolution. Whishaw started some of the paintings here 30 years ago, yet he is still adding to and altering them. On their reverse can be seen crossed-out dates that record a lifetime of continued reflection in which nothing is finished until it actually leaves the studio and is no longer in his possession. The Royal Academy’s Summer Exhibition also challenges the modernist narrative by offering a visual miscellany of paintings, prints and photographs that vie for the viewer’s attention, with abstract works hung next to more traditional figurative works, still-lifes next to portraits, landscapes next to architectural drawings, just as in Whishaw’s studio. In 2015 Come Dance with Me was hung high on the south wall of the RA’s largest gallery surrounded by the work of his fellow Royal Academicians. This large, abstract painting is a celebration of line and colour, its ribbons of pink, red, turquoise and blue weaving sinuous patterns around the picture surface to suggest a series of joyful, dancing rhythms. Nearby was St Paul’s Multiview II (2009–10), a painting that combines elements of cubism and abstraction, collage, realism and topographical architectural drawing. The composition’s fractured space sends the viewer’s gaze ricocheting around multiple viewpoints, sometimes sliding off steeply angled geometric planes of colour, sometimes being drawn into distant views of Wren’s iconic dome. - Whishaw’s two other paintings hung amid the dense grouping of small works in another gallery. Like his depiction of St Paul’s, Flying Above II (2011–15; pictured) has an architectural focus. As we look down on the rooftops of a Spanish hilltop pueblo, the towers of a church rise out of a blue-and-green mist, with roofs and chimneys tumbling around them in a cubist cascade of multiple viewpoints. Some of these architectural features are painted with a hard-edged clarity while others are left as mere suggestions, half-glimpsed through the fog. Mirrored Flowers (1998–2005) employs multiple viewpoints too, but that is where the visual similarity ends. Using elements of both abstraction and figuration to create a fantastical Escher-like composition, the work contains conventional landscape elements, with hints of sea and sky, fields and fences, flowers and stars. Yet it is also a fantasy, with two horizon lines, multiple perspectives, and two dark curving lines that evoke the mirror of the title, pulling the viewer, Alice-like, through the surface into a tilting, twisting pictorial space that is at once rational and incoherent. For those wanting to pigeonhole artists into schools or ‘-isms’, Whishaw’s eclecticism can be frustrating. His paintings defy classification. Despite being a Royal Academician, and exhibiting widely in group shows with other major British artists, he has never been one to follow trends, or to align himself with a particular stylistic group. He resists art-historical categorisation or contextualisation, pursuing his own unique path and commitment to his materials. One moment he is exploring cubist constructions of space, the next, trompe-l’oeil playfulness. His use of photocopies and collage, and his application of plastic cups, plastic flies and other objects to his picture surfaces, suggest that he is someone with contemporary concerns and an interest in experimentation. And yet his subjects are often traditional or come from his everyday experience, focusing on architectural details and picturesque scenes reminiscent of the 19th or early 20th centuries. His disregard for stylistic boundaries and subject hierarchies has all the hallmarks of postmodernism, and yet Whishaw’s art is without the knowingness and parody of much contemporary work. The four pieces Whishaw submitted to the Summer Exhibition in 2015 had so little in common in terms of style or content that they could easily have been mistaken for the work of four different artists. But it is this very commitment to diversity rather than uniformity, and a refusal to be defined and restricted by labels, that unites Whishaw’s prolific output. Even in his 80s he still wants to explore the boundaries of paint, and to push its ability to inspire, delight, evoke memories, shock and excite, as he has always done – not by focusing in and narrowing down his work into an identifiable visual signature, but by constantly trying new things, hoping to be surprised and intrigued by what might emerge. Richard Davey is a writer and a visiting fellow at the School of Art and Design, Nottingham Trent University. - - Enjoyed this article? Become a Friend to receive RA Magazine As well as free entry to all of our exhibitions, Friends of the RA enjoy one of Britain’s most respected art magazines, delivered directly to your door. Why not join the club?
https://www.royalacademy.org.uk/article/ra-magazine-summer-2016-unity-in-diversity
Brian Dillon aka The Line dropped his debut album ‘Matter’ earlier this year via Bad Soup Records. Having already shared releases such as ‘qwasi’, ‘Tribal Dance’ and ‘SSMMUTT’, it’s represents another stellar record for the Dublin label. Dillon’s new solo project is a modern take on the Irish singer-songwriter tradition, consisting of sparse, emotionally bare songs, layered with ambience, noise and mind-bending soundscapes. The subsequent project reflects his desire to explore human emotion through experimentation with noise. The second visuals shared from his debut album for the single ‘Heads (Matching Heartache With Hard Work)’ are unsettling and suffocating. They highlight The Line’s ability to create synthetic sounds that evoke powerful emotions. The dark, almost morbid video directed by Alexander Kuribayashi sees the paranoid, lonely member of a Faculty’s Golf Society rewind to the moment it all went wrong. The record’s glitchy style soundtracks the tearing apart of the main character’s false reality as he yearns for acceptance in a dimly lit bar. It’s feverish, overwhelming and provides a snapshot into the mind of a person struggling and past the point of self-care. On the creation of the song The Line said, “As for the creative process of creating the song – it was mostly written and produced in my room in a cottage I was living in Clogherhead, in rural Louth a couple of years ago. I guess the goal was to sonify grief and a range of negative emotions I was dealing with at the time. The noise build was probably an opportunity for me to lose control, because it’s not something that’s necessarily acceptable in day-to-day life. We’re supposed to be control our emotions, but sometimes they need to be expressed/expelled. The whole process was quite cathartic. I continually worked on this at an outrageously high volume, probably because I felt the need to fill the silence.” “Though there aren’t that many words in the song, they’re pretty important. The title is borrowed from a Modest Mouse song called Trailer Trash and I think that song helps to contextualise this one quite well. In fact, it probably tells the half of the story that I was too obtuse/lazy to explain in the track!” Complementing the immersive sounds is the approach from director Alexander, who used unconventional methods to highlight the main character’s emotional volatility. “I was interested in using Sam Peckinpah’s explosive impressionistic action scene style, but applying it to something ridiculously un-explosive, like a hug, because it’s explosive to him.” Watch the video below:
https://districtmagazine.ie/news/premiere-the-line-heads-matching-heartache-with-hard-work/
In particular, Mead's theory symbolic interactionismwhich suggests that social interaction is responsible for the construction of identity, was highly influential. However, constructionist ideas have also been used This is especially problematic in the context of scientific research. So for example, take the computer screen you're looking at. In other words, to what extent is this claim a social construct? Berger, Peter L. Updated March 28, Social constructionism is the theory that people develop knowledge of the world in a social context, and that much of what we perceive as reality depends on shared assumptions. For more on the psychological dimensions of social constructivism, see the work of Ernst von Glasersfeld and A. Other Theories Social constructionism is often placed in contrast with biological determinism. Our identity is created by interactions with other people and our reactions to the expectations of society.
https://vatuqaxefu.dellrichards.com/social-construction152474583jv.html
The statement that an important dualism runs throughout sociological literature belongs to what can be called extended "sociological common sense". In this context, Alfred Schutz's phenomenology is often used critically as a paradigmatic example of subjectivism, as it supposedly places exclusive emphasis on actors' "subjective" interpretations, thereby neglecting "objective" social structures such as power relationships. This article proposes that not only do those characterizations have dualistic grounds, but they also disregard the explicit intention of phenomenology to overcome the dualism between subjectivism and objectivism. The various criticisms directed at the Schutzian paradigm will be confronted with an analysis of the phenomenon of power based on Schutz's theory of the life-world, in particular his theory of relevance. This theoretical perspective will be replenished by reflections on power as a meaning selection, which specifically allow the hiatus of subjectivism and objectivism to be overcome. Publication details DOI: 10.1007/s10746-014-9338-9 Full citation [Harvard style]: Dreher, J. , López, D.G. (2015). Subjectivity and power. Human Studies 38 (2), pp. 197-222. This document is unfortunately not available for download at the moment.
http://ophen.org/PubliView.php?publi=145291
The aim of this study was to examine how social constructions of children to divorced parents appear in daily newspapers and evening papers. Furthermore this study also examined the difference in the social perception of the child and the parent. The selection of empirical data are news articles, debate articles and reports. This study was grounded in a social constructionist approach and the collected data was analyzed using encoding of thirteen newsarticles, debatearticles and commentarys. The coding was based from a qualitative content analysis, where the aim is to search for the meaning of the text. The results show that media’s construct of a child to divorced parents is one of a very lonely child, who has been abandoned by the adult world. Therefore the conclusion is that children are often objectified while in contrast parents are shown to be subjective acting individuals. However, it is important to note that there is a difference of opinion among both scientists and journalists on how children should be described in the media. Where the dissenting opinion is that children should be seen as more subjective individuals who have the right to express their opinion on issues that concern them.
https://lup.lub.lu.se/student-papers/search/publication/8901250
Yale University is committed to protecting your privacy. In addition, unless you take steps to browse the Internet anonymously, or opt-out, Yale University and the Press, like most institutions and organizations on the Internet, track web browsing patterns to inform understanding of how sites are being used. Data Protection Statement YUP is committed to protecting and respecting the security, integrity and privacy of personal data collected or processed from our customers and users in the operation of our services. By submitting your information to YUP you consent to the practices described in this statement. If you are less than 18 years old, then you must obtain the consent of your parent or legal guardian prior to submitting any personal information. How do we collect information? YUP may collect personal information from you in the following ways: (1) directly from your verbal or written input (such as by consenting to receiving marketing emails); (2) automatically through YUP’s website technologies including online tracking, such as by cookies, or other technologies including algorithms for analyzing data such as records of purchases, online behavioral data, or location data. Information you provide The types of personal information that YUP collects directly from you may include contact details, such as your name, email address, postal address and telephone number; and information about your interests and communication preferences. If you contact us, we may keep a record of that correspondence. We may also ask you to complete surveys that we use for research or marketing purposes, although you do not have to respond to them. Cross Border Transfers? All information you provide to us is stored on our secure servers and may be transferred to, stored at, processed or backed up to a destination outside the country where you live. By submitting your personal information, you agree to this transfer, storing or processing of your information. We will take all steps reasonably necessary to ensure that your personal information is treated securely and in accordance with all applicable data protection laws. Security We will use reasonable and appropriate safeguards to protect your data. Access to your personal data will be restricted to those who need to know that information in order to perform their job function. Use of your information data? We may use your personal information in the performance of any contract we enter into with you, to comply with legal obligations, or where we have a legitimate interest in using your information to improve the services and products we provide. Legitimate purposes may include but are not limited to the following: providing direct marketing and assessing the effectiveness of promotions and advertising; modifying, improving or personalizing our services, products and communications; preventing or detecting fraud; investigating suspicious activity or abuses of our website) and otherwise keeping our site safe and secure; and conducting data analytics. In addition, we may use information held about you in the following ways (with your consent, if required): provide you with information, products or services that you request from us or which we feel may interest you; send you periodic YUP catalogues, seasonal updates and book news; allow you to participate in interactive features of our service, when you choose to do so; notify you about changes to our website, products or services; fulfil your requests – such as competition entries, participation in campaigns and provision of information; record any contact YUP has with you; communicate with you for any other purpose that we may notify you of from time to time. How long will your data be stored for? Personal information will not be kept longer than is necessary for the purpose for which it was collected. If you have opted-in or signed-up to any of our web services, information newsletters or marketing newsletters, we will retain your data until you unsubscribe. If you are a subscriber, we will retain your data in line with our Data Retention Policy after your last subscription has expired. Changes to this Data Protection Statement We reserve the right to update or modify this Statement at any time without notice. Any changes we may make will be posted on our website and will be effective upon posting. By using this site, you agree to be bound by those changes. We encourage you to review this page regularly to keep up to date with our data and privacy practices. Contact Questions, comments and requests regarding this Statement or privacy at Yale University Press are welcomed and should be addressed to dataprotectionatYUP@yale.edu.
https://yalebooks.yale.edu/privacy-policy
This information concerns only the processing carried out by the website https://www.cnsas.it/ and not also the processing performed by other sites to which the user connected via links on the website. The information is provided in compliance not only with the provisions of Decreto Legislativo 30 giugno 2003, n.196 – Codice in materia di protezione dei dati personali (Code regarding the protection of personal data (hereinafter “Privacy Code”), but also is inspired by the provisions of the Raccomandazioni n. 2/2001, 4/2012 and 2/2013 that the European authorities for the protection of personal data, gathered in the Group established by art. 29 of the directive n. 95/46 / EC, adopted in order to identify the minimum requirements for the collection of personal data on-line and through apps, and, in particular, the methods, timing and nature of the information that those entitled to the processing of the data must provide to the users when they connect to web pages and apps, regardless of the purpose of the link. DATA PROCESSING CNSAS, via E. Petrella, 19, 20124, Milano (MI) is entitled to the processing of the data. DATA PROCESSING PURPOSES Cnsas receives and collects information through this website about users who visit the pages of the website and use the web services available on the website. Data are collected for purposes connected to the correct execution of the services of the web services activated upon specific request of the users, to comply with legal obligations or requests of the judicial authority or of anyone legitimated by law and by secondary legislation. Users’ data may also be processed for promotional and commercial purposes and for the sending of informative material on Cnsas products or services or commercial partners, or for the sending of personalized information material, realized through nominative analysis of the profile and customer consumption habits. These purposes will be implemented in compliance with the provisions of the law and therefore Cnsas will request users to give consent if this is necessary to perform a legitimate processing of data. PERSONAL DATA OBJECT OF THE PROCESSING The personal data collected and used by Cnsas are divided into two categories: – navigation data: these are the data that the server automatically registers on each visit to the site, such as the name of the provider, the site from which you access ours, the pages visited, the date and duration of the visit. The navigation data are used for the sole purpose of obtaining, for statistical reasons, information on the use of the website and to monitor its correct functioning. They can also be used to check the legal use of our site and to ascertain any civil liability and/or penalties for damages to our site. They are not deleted. – data provided voluntarily by users: these are data sent spontaneously by users to take advantage of the services offered by our websites, in particular participation in competitions and promotions and membership of initiatives and Fidelity programs, sending newsletters related to our news and offers. To this end, each user must register on the website, providing their name and surname, address, e-mail address, date of birth and their own underwear sizes. Only with the consent of the interested party, we will use the physical and e-mail address for sending promotional and commercial material. The data provided during registration to our websites will be used only for the purposes indicated on each page (promotion, participation in competitions etc.), and prior consent of the interested parties, in particular to contact them for the purpose of participation in promotions or competitions or for sending informative material about new collections or our offers. In particular, in relation to the individual competitions or promotions of Cnsas or companies belonging to the same corporate group or of its commercial partners, we point out that the Company will insert the entire competition rules on the website, so that the user can not only participate in the competition, but also take information on the processing of data. To read the individual information notes, simply click on the link for each competition regulation. Generally, the data provided by participants in the initiatives or competitions through the completion of online forms are used to allow participation in the specific promotion and, subject to consent, may also be used for promotional and informational purposes on products and services and products of Cnsas: these purposes can be realized both with automated methods (eg text messages or e-mail) and not automated (eg ordinary mail). Generally, on the forms inserted on the website for the purposes indicated, information that is not strictly necessary for specific initiatives and activities but which could be useful to the CNSAS to allow a more direct contact with the individual user, is also required; this information is not marked on the individual forms by an asterisk [*], as it is instead done for the mandatory information, and is therefore optional; it follows that their non-conferment will not affect participation in the initiative, the competition etc. We remind you that the execution of User requests (eg registration to the program, newsletters, download of the App) is not conditional to the provision of the consent requested in the appropriate forms. Cookies Users make use of different browsers and different computers. In order to make the access to the website with any technology as easy as possible, the type of browser (i.e., Internet Explorer, Netscape, firefox, etc.) and the operating system (i.e., Windows, Macintosh, Linux, etc.) used by a user and the assigned IP address of his/her Internet service provider are automatically registered. The total number of visitors to the site is also recorded in an aggregate way; no personal data is acquired in these procedures. This information allows us to verify the areas of the website and the services preferred by users, so as to keep the website updated and interesting. Some of our web pages and update e-mails may contain electronic images, also called “one pixel GIFs”, “clear GIFs” or “pixel tags”. On websites they allow us to count the number of users who have visited our pages. In promotional messages/newsletters via e-mail they allow us to count how many subscribers read them. Web beacons allow us to obtain statistical data regarding the activities and characteristics that most interest our customers in order to provide more personalized content. They are not used to access users’ personal data without their consent.
https://www.cnsas.it/en/privacy-policy/
This information concerns only the processing carried out by the website https://www.cnsas.it/ and not also the processing performed by other sites to which the user connected via links on the website. The information is provided in compliance not only with the provisions of Decreto Legislativo 30 giugno 2003, n.196 – Codice in materia di protezione dei dati personali (Code regarding the protection of personal data (hereinafter “Privacy Code”), but also is inspired by the provisions of the Raccomandazioni n. 2/2001, 4/2012 and 2/2013 that the European authorities for the protection of personal data, gathered in the Group established by art. 29 of the directive n. 95/46 / EC, adopted in order to identify the minimum requirements for the collection of personal data on-line and through apps, and, in particular, the methods, timing and nature of the information that those entitled to the processing of the data must provide to the users when they connect to web pages and apps, regardless of the purpose of the link. CNSAS, via E. Petrella, 19, 20124, Milano (MI) is entitled to the processing of the data. Cnsas receives and collects information through this website about users who visit the pages of the website and use the web services available on the website. Data are collected for purposes connected to the correct execution of the services of the web services activated upon specific request of the users, to comply with legal obligations or requests of the judicial authority or of anyone legitimated by law and by secondary legislation. Users’ data may also be processed for promotional and commercial purposes and for the sending of informative material on Cnsas products or services or commercial partners, or for the sending of personalized information material, realized through nominative analysis of the profile and customer consumption habits. These purposes will be implemented in compliance with the provisions of the law and therefore Cnsas will request users to give consent if this is necessary to perform a legitimate processing of data. – navigation data: these are the data that the server automatically registers on each visit to the site, such as the name of the provider, the site from which you access ours, the pages visited, the date and duration of the visit. The navigation data are used for the sole purpose of obtaining, for statistical reasons, information on the use of the website and to monitor its correct functioning. They can also be used to check the legal use of our site and to ascertain any civil liability and/or penalties for damages to our site. They are not deleted. – data provided voluntarily by users: these are data sent spontaneously by users to take advantage of the services offered by our websites, in particular participation in competitions and promotions and membership of initiatives and Fidelity programs, sending newsletters related to our news and offers. To this end, each user must register on the website, providing their name and surname, address, e-mail address, date of birth and their own underwear sizes. Only with the consent of the interested party, we will use the physical and e-mail address for sending promotional and commercial material. The data provided during registration to our websites will be used only for the purposes indicated on each page (promotion, participation in competitions etc.), and prior consent of the interested parties, in particular to contact them for the purpose of participation in promotions or competitions or for sending informative material about new collections or our offers. In particular, in relation to the individual competitions or promotions of Cnsas or companies belonging to the same corporate group or of its commercial partners, we point out that the Company will insert the entire competition rules on the website, so that the user can not only participate in the competition, but also take information on the processing of data. To read the individual information notes, simply click on the link for each competition regulation. Generally, the data provided by participants in the initiatives or competitions through the completion of online forms are used to allow participation in the specific promotion and, subject to consent, may also be used for promotional and informational purposes on products and services and products of Cnsas: these purposes can be realized both with automated methods (eg text messages or e-mail) and not automated (eg ordinary mail). Generally, on the forms inserted on the website for the purposes indicated, information that is not strictly necessary for specific initiatives and activities but which could be useful to the CNSAS to allow a more direct contact with the individual user, is also required; this information is not marked on the individual forms by an asterisk [*], as it is instead done for the mandatory information, and is therefore optional; it follows that their non-conferment will not affect participation in the initiative, the competition etc. We remind you that the execution of User requests (eg registration to the program, newsletters, download of the App) is not conditional to the provision of the consent requested in the appropriate forms. Users make use of different browsers and different computers. In order to make the access to the website with any technology as easy as possible, the type of browser (i.e., Internet Explorer, Netscape, firefox, etc.) and the operating system (i.e., Windows, Macintosh, Linux, etc.) used by a user and the assigned IP address of his/her Internet service provider are automatically registered. The total number of visitors to the site is also recorded in an aggregate way; no personal data is acquired in these procedures. This information allows us to verify the areas of the website and the services preferred by users, so as to keep the website updated and interesting. Some of our web pages and update e-mails may contain electronic images, also called “one pixel GIFs”, “clear GIFs” or “pixel tags”. On websites they allow us to count the number of users who have visited our pages. In promotional messages/newsletters via e-mail they allow us to count how many subscribers read them. Web beacons allow us to obtain statistical data regarding the activities and characteristics that most interest our customers in order to provide more personalized content. They are not used to access users’ personal data without their consent.
https://www.cnsas.it/en/privacy-policy/
Upon written request, THE FOLD will use reasonable efforts to allow users to update or correct Personal Information previously submitted but only to the extent such activities will not compromise privacy or security interests. Also, upon a user’s written request, THE FOLD will functionally delete the user and his or her Personal Information from the database where such information is stored; however, it may be impossible to delete a user’s entry without some residual information being retained because of the nature in which backups of data are maintained. 1. You, the individual retain the right to be informed of the collection and use of their personal data. 1. You, the individual retain the right to access their personal data. This request must be made verbally or in writing. 1. You, the individual retain the right to have their data rectified should it be inaccurate, or completed if it is incomplete. 1. You, the individual retain the right to have their personal data erased. This request must be made verbally or in writing, and is only applicable in certain circumstances. 1. You, the individual retain the right to request that their personal data is restricted or suppressed. 1. You, the individual retain the right to obtain and reuse their data for their own purposes through different services. 1. You, the individual retain the right to object to the processing of their personal data. This is only applicable in certain circumstances. 1. You, the individual retains the right not to be subject to a decision based solely on automated processing, including profiling, which produces legal effects concerning you or similarly significantly affects you. (b) For customers purchasing products. If you make purchases at our online store, we will collect and maintain your name, email address, mailing address, telephone number, purchased product information, payment data supported by our website such as debit or credit card number, order tracking number, referring URL, IP address and a password. If you purchase a gift certificate at our online store, we will also collect the name, email address, mailing address, and telephone number of the recipient. Before confirming your order, you will have the opportunity to review the order form and make changes and additions to the information it contains and these changes will automatically be kept for future use. If you cancel an order or do not complete an order, we may collect and use any email address or other information that you have entered as we would collect and use it if you had completed an order. (c) Web Beacons. THE FOLD may use a variety of other technical methods for tracking purposes, including web beacons. Web beacons are small pieces of data that are embedded in web pages and e-mails. We may use these technical methods in HTML e-mails that we send our users to determine whether they have opened those e-mails and/or clicked on links in those e-mails. The information from use of these technical methods may be collected in a form that is personally identifiable. 2.1 Use of Personal Information and Non Personal Information. (d) Newsletters & Promotional Emails; Opt-Out Option: We may offer free electronic newsletters and promotional emails regarding upcoming products, promotions, events and/or services offered on the Website. We may use your Personal Information to send you newsletters and emails periodically listing current products, promotions, events and/or services, or other items available for purchase on our Website or from our marketing partners or sponsors. However, you have the choice to opt-out of receiving such newsletters and promotional emails for products and/or services offered on the Website by sending an email to us at hello@lesseofficial.com and/or following the instructions in our promotional email. Once we have processed your opt-out request, we will not send you promotional emails with respect to products and/or services offered by us through the Website unless you opt back in to receiving such communications directly. (f) Contact Information: If you contact us by telephone, email or letter, we may keep a record of your contact information, correspondence or comments. If you report a problem with the Website, we may collect this information in a file specific to you. In addition, if you provide us feedback through the Website, by email or by calling us, we may ask for your name and email address in order to send you a reply. You may contact us at hello@lesseofficial.com to request the removal of this information from our database, subject to section 1.2. (c) Links to Other Websites. Our Website may contain links to third party web sites to which we have no affiliation. THE FOLD does not share your Personal Information with those web sites and is not responsible for their privacy practices. THE FOLD suggests you read the privacy policies on those third party web sites. We may from time to time send you email or other communications regarding current promotions, specials and new additions to the Website. If you have supplied us with your telephone number(s) you may receive telephone calls from us with information or requests for information regarding an order you have placed. You may “opt out” or unsubscribe from our newsletters and non-transactional related emails and disclosures to third parties for promotional purposes by following the unsubscribe instructions in any email you receive from us or by sending an email to Hello@lesseofficial.com. Being removed from our email list does not mean that you will automatically be removed from our regular mailing list. If you would like to be removed from our mailing list completely, you will need to contact our office. In order to most efficiently serve you, credit card transactions and order fulfillment are handled by established third-party banking institutions, process agents and distribution institutions. They receive the information they need to verify and authorize your credit card transactions and to ship your order. When collecting credit card information for online purchases, we offer secured server transactions that encrypt your information in transit to prevent someone from intercepting it and misusing it. When you access your account information, the information is kept on a secure server. Furthermore, all of the customer data we collect is protected against unauthorized access by physical security means. Although THE FOLD uses reasonable efforts to safeguard the security of your Personal Information, transmissions made on or through the Internet are vulnerable to attack and cannot be guaranteed to be secure. In addition, submissions made via email are not protected by SSL technology and are vulnerable to interception during transmission. You hereby acknowledge that THE FOLD is not responsible for any intercepted information sent via the internet, and you hereby release us from any and all claims arising out of or related to the use of intercepted information in any unauthorized manner. THE FOLD will promptly notify those persons whose information has been compromised should there be a security breach. You are solely responsible for safeguarding and maintaining the secrecy of your User ID, passwords and/or any account information in your possession or control. Please be careful and responsible whenever you are online. The Website contains links to third parties who may collect information directly from you. Each of the websites linked from the Website have separate privacy policies and data collection practices, independent of THE FOLD, and THE FOLD has no responsibility or liability for these independent policies or actions and is not responsible for the privacy practices or the content of such websites nor does THE FOLD make any warranties or representations about the contents, products or services offered on such websites or the security of any information you provide to them. You can learn more about Internet privacy from government websites such as www.ftc.gov/privacy/ . In addition, it is important to keep us updated with your most current contact information. You may ask us in writing via mail or email at Hello@lesseofficial.com to have the information on your account deleted, updated or corrected, subject to Section 1.2; however, because we keep track of past purchases, you cannot delete information associated with past purchases. Note that we may retain changed or deleted information for archival or other purposes. Contact Hello@lesseofficial.com to have the information on your account deleted, updated or corrected, subject to Section 1.2; however, because we keep track of past purchases, you cannot delete information associated with past purchases. Note that we may retain changed or deleted information for archival or other purposes. 5.1 Changes To Our Policy. 5.2 Children, Parental Consent Policy. The Children’s Online Privacy Protection Act imposes certain requirements on websites directed toward children under 13 that collect information on those children, or on websites that know they are collecting Personal Information from children under the age of 13. We want to let you know that it currently is our policy not to collect Personal Information from any person under 13 because children are not permitted to use the Website or services on the Website, and we request that children under the age of 13 not submit any Personal Information to us via the Website. As one measure to ensure that we do not gather Personal Information from children, we require that all individuals provide a valid credit card number before completing a purchase order. If we learn that we have inadvertently gathered Personal Information from children under 13, we will attempt to notify such child’s parent or guardian and erase such information from our records, unless the child’s parent or guardian consents to our maintaining such information.
https://lesseofficial.com/pages/privacy
Treasure Vase Ventures Private Limited(SmartE) is a private limited company incorporated under the Companies Act, 2013 having its registered office located at B-59, F/F, Front Side Plot No-104, Mansaram Park, Uttam Nagar, ND Near Metro Piller No-750 New Delhi West Delhi DL 110059 IN (hereinafter shall be referred to as “Company”, “We”, “Us”, “Our” and terms of similar meaning). - REGISTERED USERS - If You choose to become a registered member of Website/App, You must provide Your name, mobile number, e-mail address, a unique login name, password, and password validation, and a password hint to help you remember Your password. - As a member, You can choose to complete Your online account by providing Us with ride preferences, frequent – riders or affinity numbers, payment modes and other Personal Information. This information is primarily used to assist You in making ride quickly without having to type in the same information repeatedly. - The Website/App cannot be held responsible for lapses in security caused by third party accesses to Your Personal Information as a result of Your failure to keep Your Personal Information private. Notwithstanding the foregoing, You must notify Us immediately if there is any unauthorised use of your account by any other internet user or any other breach of security. - Minors (as defined under the laws of their jurisdiction or residence) are not eligible to register for, use, or purchase the Products or Services available on Our Website. We do not knowingly collect Personal Information from any minor, and will not use this information if We discover that it has been provided by a minor. - TYPE OF INFORMATION COLLECTED - In order for You to access certain services, We collect personal, non-personal and other information and correspondences from You, as detailed below, that We consider necessary for achieving this purpose (such information and correspondences hereinafter collectively referred to as “Information”). - Personal Information: Personal Information shall include all information that can be linked to a specific individual or to identify any individual, such as name, address, mailing address, telephone number, email address, information about the ride, bookings, passengers, frequent riders numbers and any and all details that may be necessary from the customer (“Personal Information”). - Non-Personal Information: When You visit the Website or install SmartE App, We may collect certain non-personal information such as domain and host from which You access the internet, Your internet protocol address, operating system, browser type, and internet service provider. This type of information does not identify You personally. - Mobile: When You use the App through Your mobile, We may receive information about Your location and Your mobile device, including a unique identifier number for Your device. We may use this information to provide You with suggestions in respect of services if required. - When browsing our Website, you are not required to provide any Personal Information unless and until you choose to make a purchase or sign up for one of our e-mail newsletters or other services as described below. You may, however, visit our site anonymously. - USE OF YOUR INFORMATION - We do not sell, trade, or otherwise transfer to outside parties Your Information. This does not include trusted third parties who assist Us in operating Our Website, conducting Our business, or servicing You. We may also release Your information when We believe release is appropriate to comply with the law, enforce Our Website policies, or protect Ours or others rights, property, or safety. However, non-personally identifiable visitor information may be provided to other parties for marketing, advertising, or other uses. - We process the Information You provide in any one or more of the following manner: - To process and fulfil Your request for Services, - To personalize your experience - For providing Services, We may disclose Your Personal Information to the Company’s and/ - or other registered business partners (as applicable). - To improve our Services; - To enforce our Terms; - To contact You and to customise Our communication with You and the marketing material we share with You; - Your information, whether public or private shall be used for the purpose of delivering the purchased product or service requested and additionally analyse and suggest if any other related product / service that shall be suitable for you. - The email address You provide for booking processing, may be used to send You information and updates pertaining to Your booking, in addition to receiving occasional company news, updates, related product or service information, etc. - To avoid fraud and other prohibited or illegal activities; - To protect the security or integrity of the Website, Our business, Services and users; - To publish any testimonials or reviews that You may have provided on the Website; - We may disclose Information, in good faith, wherein the access, use, preservation or disclosure of such information is reasonably necessary to (i) satisfy any applicable law, regulation, legal process or enforceable governmental request, (ii) enforce applicable Terms, including investigation of potential violations thereof, (iii) detect, prevent, or otherwise address fraud, security or technical issues, or (iv) protect against imminent harm to the rights, property or safety of the Company, its users or the public as required or permitted by law; and - Additionally, in the event of a audit, reorganization, merger, sale, joint venture, assignment, transfer or other disposition of all or any portion of Our business, assets or stock (including in connection with any bankruptcy or similar proceedings), We may share/transfer/assign the Information we have collected to the relevant third party. - DATA RETENTION - ACCESSING AND UPDATING YOUR INFORMATION As a user of the website, you can update or modify the personal information you have included in your profile or change your username by logging in and accessing your account. Though you may delete your account, you acknowledge that it may be impossible to remove your account without some residual information being retained by the website. You may at any time access, delete or change your personal information or subscribed services. You can easily access your personal information if you login as a member on our website or you can follow the links that may be provided within our subscription emails to you to manage your subscription preferences. - SECURITY We use reasonable security measures to protect Information from unauthorized access, maintain data accuracy, and help ensure the appropriate use of Information. When the services are accessed using Internet Explorer, Firefox, Safari, or Chrome or any Secure Socket Layer (“SSL”), or such technology that may protect information using both server authentication and data encryption. We host our website in a secure server environment that uses firewalls and other advanced technology to prevent interference or access from outside intruders. All supplied sensitive/credit information is transmitted via SSL technology and then encrypted into our payment gateway providers database only to be accessible by those authorized with special access rights to such systems, and are required to keep the information confidential. After a transaction, Your sensitive private financial information will not be stored on our servers. The foregoing is subject to Your compliance with the following: - Account Security: You are responsible for maintaining the security and confidentiality of your user ids and passwords while accessing the website as a User (“User Account”). you acknowledge that neither the company nor any of its directors, shareholders or other representatives shall be liable to you under any circumstances for any direct, indirect, punitive, incidental, special or consequential damages that result from or arise out of, or a breach or, or compromise of registration of your user account with us and/or your ability or inability to use the user account or. - Payment Security: We use third-party payment processors (“Payment Processors”) for any payments made on this Website and App. The processing of payments will be subject to the terms, conditions and privacy policies of the payment processors in addition to the terms. you acknowledge that neither the company nor any of its directors, shareholders or other representatives shall be liable to you under any circumstances for any direct, indirect, punitive, incidental, special or consequential damages that result from or arise out of your use of the payment processors, your payment through the payment processors or your ability or inability to complete the payment. - Safeguard Sensitive Information: Sensitive details like Credit/Debit Card and Net Banking information are primarily collected by the Payment Processors and banks and not by Us. However, if this information is stored on our Website, it remains completely unshared and safe. sometimes, such information is shared with certain third parties to process the applicable cash-back offers & discounts. - COOKIES - ANDROID AND IOS PERMISSIONS When SmartE App (“Mobile App”) is installed on your phone, a list of permissions appears. Since there is no option to customize those permissions, below is a description of the permissions that the App requires and the data that the App shall access and use. - Android permissions - Device & App history: we need your device’s permission to get information about your device, like OS (operating system) name, OS version, mobile network, hardware model, unique device identifier, preferred language, etc. Basis these inputs, we intend to optimize your travel booking experience, use OS specific capabilities to drive great in-funnel experiences using components of device’s OS, etc. - Identity: This permission enables us to know about details of your account(s) on your mobile device. We use this info to auto-fill your email ID’s and provide a typing free in-funnel experience. It helps us map email ID’s to a particular user to give you the benefit of exclusive ride offers, wallet cash-backs, etc. It also allows facilitating your Facebook and Google+ login. - Location: This permission enables us to give you the benefit of location specific deals and provide you a personalized in-funnel experience. when you start the App to make a ride booking, We auto-detect your location so that your booking address is auto-filled. - SMS: If you allow us to access your SMS, we will read your sms to autofill or prepopulate ‘OTP’ while making a transaction and to validate Your mobile number. This provides You a seamless experience while making a booking or registration and You don’t need to move out of the app to read the sms and then enter it in theApp. - Phone: The App requires access to make phone calls so that you can make phone calls to, drivers and support centers directly through the App. - Device ID & Call information: This permission is used to detect Your android ID through which We can uniquely identify users. It also lets Us know your contact details using which we pre-populate specific fields to ensure a seamless booking experience. - iOS Permissions: - Notifications: If You opt in for notifications, it enables Us to send across exclusive deals, promotional offers, booking related updates, etc. on your device. If you do not opt for this, updates for your booking like ride status, booking confirmation, refund (in case of cancellation), etc. will be sent through SMS. - Location: This permission enables Us to give You the benefit of location specific deals and provide You a personalized in-funnel experience. when you launch our app to make a booking, We auto-detect Your location and booking address is auto-filled. your options are personalized basis your locations. - LINKS TO THIRD PARTY SITES We do not provide any personal information or personally identifiable information to third party websites/advertisers/ad-servers without your consent. - OPTING-OUT As part of the registration process, we give you the ability to receive via e-mail or direct messaging information about our products and services, updates to our website, customized advertisements and promotions that are targeted to your specific interest, such as flight specials, promotions, contests, sweepstakes and other travel opportunities available on our website and/or sponsored by our travel service providers and advertisers. We send this information directly ourselves, or via third party service providers. YOUR CONSENT - CONTACTING US Details of the Grievance Officer: - Name: Manoj Tarkar - Email: [email protected] Thank you for using the SmartE Website and Mobile App!
https://getsmarte.in/privacy-policy/
At Teamwork Mortgage we understand that you expect customer information to be treated in an appropriate and confidential manner. Teamwork's employees are trained to protect client's confidentiality and are expected to follow these principles: - We recognize that our customers expect us to collect and use their information in an appropriate and responsible fashion. - We collect, retain and use information about our customers that we believe is necessary for operations and in determining which available products, services and other opportunities that may interest customers. TeamWork does not sell customer's names and addresses to solicitors. - We strive to ensure that the information we maintain about our customers is accurate, current and complete. - Information collected via Internet access to the TeamWork's Web site may be used to improve our Web-site, notify customers about updates to the site, contact customers for special promotions, or to keep customers informed of developments in the financial industry. - E-mail sent to TeamWork may be used to answer questions, follow up on suggestions, or to improve the level of service we provide. E-mail is not secure and is subject to interception by unauthorized individuals. Therefore, customers may wish to communicate sensitive or personal information by postal mail.
https://teamworkmtg.com/privacy/
The privacy of our customer’s personal information is of utmost importance to us. Here, we will explain why we need customer’s personal information and how we aim to keep it secure. Why Do We Need Customer’s Personal Information? When a customer subscribe to our newsletter or place an order, the customer is required to provide us personal information such as customer’s name, address, contact number, email address etc., We use that information to serve these purposes: - To make a confirmation call with the customer after an order is placed with us - To deliver the goods at the customer’s doorsteps hassle free - To keep the customer updated about our new promotions and new arrivals through Emails & SMS. It is very important for us to keep the information the customer provide to us secure, however if at anytime the customer wishes to unsubscribe to our Newsletter or SMS about promotions, the customer can simply unsubscribe by writing to us at support@zola.pk The Company Private Limited Policy We are not responsible for the content or privacy practices on any websites
https://ebuildpakistan.com/pages/privacy-policy
To fully benefit from the clinical information available on ORLive.com, please enter your registration information below. This site is not intended for children under the age of 13. We will not knowingly seek site visitors in this age group. We encourage parents to talk to their children about their use of the Internet and the information they disclose to Web sites. Some areas of this site may require you to submit information in order for you to benefit from the specified features (such as members only live or on-demand videos and subscribing to channel RSS feeds) or to participate in a particular activity (such as providing feedback or CME testing). You will be informed at each information collection point what information is required and what information is optional. When you join ORLive.com you will be given the option of receiving recurring informational/promotional newsletters via email from ORLive and/or directly from the content providers of the content you view. These emails will not contain Personal Health Information. At the time you sign up for our email newsletters or any time thereafter, you can choose to Opt-In to receive additional promotional emails from ORLive. In order to subscribe to such newsletters via email, we need your contact information, such as name and email address. ORLive may send you informational announcements of future scheduled live or on-demand video. You can unsubscribe from the newsletters by simply clicking on the "unsubscribe" link at the bottom of any email newsletter. As you navigate through a Web site, certain information can be passively collected (that is, gathered without your actively providing the information) using various technologies and means, such as Internet Protocol addresses, cookies, Internet tags, and navigational data collection (e.g., the page from which you accessed our site). This site may collect Internet Protocol (IP) addresses. An IP Address is a unique number assigned to your computer by your Internet service provider so you can access the Internet. We use this IP address to diagnose problems with our server, report aggregate information (e.g., how many site visitors have we had during a Webcast), determine the fastest route for your computer to use in connecting to our site, and administer and improve the site. A "cookie" is a small text file that a Web server sends to your PC, which helps the site retain information about you and your preferences, so that you do not have to manually reenter these when you return to our site (e.g., you can avoid having to reenter your email address each time you want to view a Webcast). "Session" cookies are temporary cookies that are erased once you exit your Web browser window or otherwise turn your computer off. Session cookies are used to lend continuity to navigating our site and to collect aggregate statistical information. This site uses session cookies. "Navigational data" ("log files," "server logs," and "clickstream" data) are used for system management, to improve the content of the site, for market research purposes, and to communicate information to visitors. This site uses navigational data. As a service, ORLive may feature message boards, chat rooms and other public forums offering online discussions moderated by medical or healthcare experts. Any information shared (including Personally Identifiable and Personal Health Information) that you reveal in a chat room or message board, is by design open to the public and is not a private, secure service. You should think carefully before disclosing any Personally Identifiable or Personal Health Information in any public forum. What you have written may be seen, disclosed to or collected by third parties and may be used by others in ways we are unable to control or predict, including to contact you for unauthorized purposes. Regardless of how information about you is gathered or used on this site, we have made every effort to conform with the Health Insurance Portability and Accountability Act of 1996 (HIPAA), which, among other things, protects the privacy of a person’s health history and current medical condition. iii. where required by applicable laws, court orders, or government regulations. To keep your personally identifiable information accurate, current, and complete, please contact us as specified below. We will take reasonable steps to update, remove or correct personally identifiable information in our possession that you have previously submitted via this site. We take reasonable steps to protect your personally identifiable information as you transmit your information from your computer to our site and to protect such information once it is in our possession from loss, misuse, and unauthorized access, disclosure, alteration, or destruction. You should keep in mind that no Internet transmission is ever 100% secure or error-free. In particular, e-mail sent to or from this site may not be secure, and you should therefore take special care in deciding what information you send to us via e-mail. Moreover, where you use passwords, ID numbers, or other special access features on this site, it is your responsibility to safeguard them. Participate: Interact with presenters on ORLive by asking questions during broadcasts or joining an ORLive forum or Physician-only forums. Learn More: Request information from Hospitals, Device Manufacturers, and Medical Associations about procedures, products, or services. Special Access: Gain Access to invitation only premium content and broadcasts. Receive notification for member exclusive capabilities and broadcasts. Stay in Touch: Receive a weekly email with upcoming broadcasts, new on-demand content, and featured sections of ORLive.com. Get notified when important news, announcements, and updates are available on ORLive. Join today and have instant access to these and other exclusive features of the ORLive website!
http://orlive.com/orliveUser/displayPageRegisterNewUser?returnURL=/orliveuser
MediaBlanket Ltd is committed to providing a high quality service by working with our customers to meet their individual needs where possible. As a business, we take the requirements of the UK's industry regulator the Financial Conduct Authority (FCA), very seriously, in particular the requirement to treat our customers fairly. We strive to do this in everything we do. We undertake that all our actions will be guided by the principle that the interests of our customers are paramount. Our systems and procedures are designed to place our customers at the heart of our business. Our Principles These principles have been designed to ensure that we behave appropriately and to ensure that we are, and remain, customer-focused at all times and act in accordance to our regulators' expectations. We are committed to providing a high quality service by working with our customers to meet their individual needs. We will search our panel of lenders in real time to assist in identifying a lender that is interested in lending to you. We will ensure that the service and products we provide are fair and appropriate to our customer's circumstances. We will always be diligent and work with our customers to understand their individual financial situation and needs. We will ensure that the products selected are in the best interests of the customer. We will ensure that our products and service comply with all regulatory requirements. We will remain open with regulators. We will ensure that we provide all customers with clear and fair information which is not misleading. We will ensure that all our marketing products and services are clear, fair and not misleading. They will contain information which is honest, helpful and accurate. We will tell you about any conflict of interest that may arise between us as soon as we can, after becoming aware of this. We will be transparent about our services and relationships with associated partners or affiliates. To re-iterate: Treating customers fairly takes into account, not only how we use our customers' details, but how we deal with them at all stages of our business relationship. Customers can be confident that they are dealing with a firm where the fair treatment of customers is central to the business culture Customers will receive the best service possible and their details will be referred to a reputable firm who will look to provide them with a suitable product or service to meet their needs and requirements but only if the Customer chooses to take it up Customers are provided with clear and non-misleading information and are kept informed of progress as appropriate Customers receive a service which is of the standard expected by the regulators Customers do not face unreasonable barriers in their dealings with us and are provided with clear communication routes and the ability to make a complaint should our service levels fall below those expected CONDUCT RISK – DELIVERING TCF THROUGH OUR BUSINESS MediaBlanket’s role is to introduce consumers to a product or service through its Broker Partners. GRP recognises that it has an obligation to meet the FCA’s principles for business in all its dealings with customers and trading partners to ensure that customers are treated fairly in the provisions of fair, clear and transparent information, which does not mislead directly or indirectly by content, format or omission to facilitate them making informed choices when using our services or the services of any lender or other financial services or product provider to which we may introduce them to. The following areas are where MediaBlanket’s activities present particularly high risks and our controls and procedures to avert such risks: Breach of Conduct of Business Standards for a Credit Broker MediaBlanket is a credit broker which makes introductions to providers of credit products and services to consumers. To ensure the interests of the customer are always put first, MediaBlanket does not collect data from the consumer and will only display a selection of offers for the consumer to consider, without giving any guidance, advice and nor is there bias towards any product or service offered by the Broker Partners of MediaBlanket. The service is provided equally and fairly to all customers. Risks exist in promoting one service over another, or guiding or suggesting that a product is suitable for the needs of the consumer, without firstly understanding the circumstances of the individual consumer. Accordingly, MediaBlanket has implemented the following mitigation procedures: Personal Data collected, verified or collated shall be the minimum required The data fields collected during any interaction between MediaBlanket and its Broker Partners and Service Providers will be regularly reviewed by the Director to ensure only the fields required are recorded. Consumer Confusion in relation to Credit Brokers vs. Lenders An adverse potential confusion is a consumer understanding the difference between a credit broker, lender, and other consumer credit based service providers. This generates a risk of unfairness and a lack of transparency as consumers may be confused and think that all promotions they receive are by direct lenders. MediaBlanket will mitigate this risk of confusion by the following methods: All financial promotions must be agreed by the Compliance Manager before they can be exposed to consumers on the MediaBlanket network to ensure they comply with the Financial Promotions Policy of MediaBlanket and the relevant regulations. All financial promotions will clearly state that MediaBlanket is a credit broker and not a lender. Financial Promotions In order to introduce consumers to financial service providers, MediaBlanket must make consumers aware of lenders, product and service providers that can provide these financial services. Accodingly, MediaBlanket will be involved in financial promotions through its Broker Partner network and its own data sources. There are specific advertising standards and regulations, in particular the consumer credit products or services to which MediaBlanket will promote to consumers, including CONC 3, governing financial promotions relating to consumer credit. MediaBlanket must ensure that its introductions are to regulated consumer credit lenders, product and service providers, and are suitable to the consumer’s needs. Therefore, the following procedures will be adopted: Any entity seeking to become a Broker Partner, Lender, Product or Service Provider of MediaBlanket must be authorised by the Financial Conduct Authority. MediaBlanket will collect the Affiliate’s FCA reference number and verify that the Broker Partner, Lender, Product or Service Provider is authorised by cross referencing the FCA’s Consumer Credit Register. MediaBlanket’s Compliance Manager will sign off for approval of any Lender, Broker Partner, Product or Service Provider into the MediaBlanket network. This will be after a rigorous due diligence process. Any financial promotion conducted by MediaBlanket or on behalf of MediaBlanket will be reviewed and approved by the MediaBlanket Compliance Manager prior to its use. After a Broker Partner, Lender, Product or Service Provider has been integrated into the MediaBlanket network, the Director shall conduct audits of the promotional material at least once per month. Records of the results of such audits will be kept in accordance with MediaBlanket’s Document Retention and Record Keeping Policy and failure to comply will lead to the termination of the MediaBlanket Network access. All Broker Partners, Lenders, Product and Service providers will be required to enter into contractual arrangements with MediaBlanket which reflects their regulatory responsibilities. Non-compliance will be grounds for termination of the relationship and withholding any commission that is payable to that partner, in addition, the partner will be reported to the FCA in accordance with Principle 11 of PRIN. This is version 1.3 of the policy. This policy shall be reviewed every 12 months or earlier, where any change in business or external environment requires it, in order to comply with rules or regulation changes affecting Treating Customers Fairly. Date of version: 14/08/2018; reviewed 26/03/2020 Representative Example: Amount of credit £1200.00 for 18 months at £90.46 per month. Total amount repayable is £1628.28. Interest: £428.28. Interest rate 49.9% p.a. (variable). Representative 49.9% APR Rates from 39.9% APR to 1333% APR Loan terms between 3 and 60 months Working for you! As a leading loan broker service we exist to find you the most suitable lender for your situation. Mediablanket Ltd is a credit broker and never charge you for the use of their service or take money from your account. Loan costs will vary depending on the lender. We use a consumer application system to allow our customers to make applications to a number of loan providers and brokers using a single online application form. Please only apply for a loan if you are confident that you are able to make the repayments. Missing repayments may have a negative effect on your credit rating and make it more difficult for you to obtain credit in the future. We only want you to apply for a loan if you’re sure you can repay it in full on your due date and still manage your other outgoings. By accepting these terms you confirm you have provided accurate financial information and considered potential future income and outgoings in determining your ability to repay IF YOU ARE THINKING OF CONSOLIDATING EXISTING BORROWING YOU SHOULD BE AWARE THAT YOU MAY BE EXTENDING THE TERMS OF THE DEBT AND INCREASING THE TOTAL AMOUNT YOU REPAY. A PAYDAY LOAN OFFERS A SHORT TERM FINANCIAL SOLUTION AND SHOULD NOT BE USED AS A LONG TERM SOLUTION. * Subject to lenders requirements and approval. Most loans can be paid into your bank account within one hour, although this could take 2-3 days if your bank does not accept faster payments! However not all of our lenders offer this service and some may not pay straight into your bank account . Please note that not everyone will qualify for the full amount – this is subject to creditworthiness and affordability checks* We work exclusively with a selected group of lenders and licensed credit brokers to offer you a range of credit and loan products. We may receive a percentage of the loan amount as a commission from a loan provider or broker if you take out one of their products and/or we may receive a fee for introducing you to them. You can request details of these commissions or fees, by emailing us at hello@mediablanket.co.uk. We will then provide you with the precise amount of the commission or fee or, where that amount is not known, the likely amount. Please note that the lender or broker we direct you to may not offer the cheapest loan that is available to meet your needs. The information contained in this website is subject to UK regulatory regime and is therefore intended for consumers based in the UK. This site is available to UK Residents only aged 18 years and over.
https://supaloans.co.uk/treating-customers-fairly
SA in the green when it comes to its environmental goals Patrick Bond’s analysis of South Africa’s environmental policy, on the premise that “development of a climate policy is relatively simple”, is misplaced. It does not take into account the realities of governance: competing national priorities mean any funding decisions have to be made based on the most pressing areas of need. Like any other government department, the department of environmental affairs makes decisions on the funding of implementation agencies with this very critical factor in mind. Ensuring that the government’s commitments to sustainable development, socioeconomic development and environmental protection are met requires making tough financial decisions. It is a stretch to equate balancing a budget either with what Bond terms “Molewa’s defunding of her climate responsibilities” or with his suggestion that the department acts at the behest of “crony capitalism”. First, the department’s baseline allocation by the national treasury was cut by 1% and 2% respectively for the 2013-2014 and 2014-2015 financial years. Additional funding (above the baseline allocation) was received for specific existing programmes, mainly infrastructure. Like all other government departments, in December 2013 we implemented cost containment measures. This has meant reprioritising operational budgets and exploring different approaches to achieve our objectives and targets. Clarifying these issues is vital to ensure that not just key stakeholders but also the public at large have the correct understanding of the government’s response to the threat and its potential impacts, which pose a major threat to sustainable development, economic growth and the quality of life. Contrary to Bond’s analysis, South Africa is not at risk of not meeting its international obligations regarding climate change or its attendant priority, greenhouse gas emissions monitoring and reduction. Our national climate change response policy guides the government’s approach to climate change impacts and the country’s transition to a climate-resilient, low-carbon, mitigating economy. It represents our commitment to adapt to climate change and our contribution to the global mitigation effort. This includes the introduction of sectoral emission reduction targets and the use of a carbon budget. Bond’s statements that “most countries have accurate measurement mechanisms [for greenhouse gases], not us” and that we are “unable to formulate baselines and monitor emissions versus targets set” should be challenged. South Africa’s national greenhouse gas inventory remains one of the most progressive national emissions inventories of those produced by developing countries. It is the result of a long-standing relationship between industry and the department of environmental affairs. Any sensible and realistic greenhouse gas policy relies on working with industry, as we balance environmental management with the social and economic needs of the country. We are constantly improving our monitoring, reporting and evaluation of greenhouse gases. We remain one of a few countries to have developed an emissions reporting system able to handle the reporting of greenhouse gas emissions and air pollutants simultaneously in a single web-based reporting platform – the National Atmospheric Emission Inventory System (NAEIS). This system has been piloted with several large emitting industry sectors. Regulations to support reporting by industry to the NAEIS are to be finalised in the near future. This is yet another indication that environmental monitoring has not been affected by budget cuts. A reduction of funding allocated to the South African Weather Service was the direct result of treasury budget cuts imposed across departments. Like other affected departments, the weather service has to reprioritise its operational budget. The department continues to invest in the weather service, including about R300-million towards infrastructure investment over the past five years. The service’s radar network has been recapitalised, with a high-performance computer to support operations in the process of being acquired. The global atmospheric watch station referred to in Bond’s article continues to be an internationally recognised centre of excellence. It provides reliable and quality scientific information for baseline setting, risk mitigation and other needs-related greenhouse gas emissions. The project is fully funded as part of the department’s air quality programme. Funding supporting the station is ring-fenced and has been neither reduced nor affected by the budget cuts. The weather service will continue to execute its greenhouse gas monitoring mandate – assisting the government in meeting its national and international obligations. The department is also working on the establishment of desired emission reduction outcomes per sector in order to facilitate the transition to a lower-carbon economy. It promotes sustainable development by prioritising climate change responses that have significant mitigation benefits as well as significant economic growth, job creation and poverty alleviation benefits. The National Development Plan (NDP) has also set emissions targets for the country. We are taking bold practical steps in this regard. The renewable energy independent power producers programme is one the largest of its kind – and continues to feature prominently on the global energy landscape. It has the potential to dramatically reduce the carbon intensity of South Africa’s electricity and hasten the transition to a lower-carbon economy. On the matter of electricity, it is incorrect to say that Eskom has been given an “exemption” by the department with regards to compliance with air quality standards. Though there are transitional arrangements to cater for industries in existence before the standards were set, it should not be concluded that extending compliance time frames will necessarily result in exemptions. Each application for a postponement to comply has to be accompanied by an atmospheric impact report to enable the assessment of the facilities’ impact on the environment. Following its application, Eskom was requested by the department to submit additional information. This has been received and is being reviewed. The department of environmental affairs does not “turn a blind eye to other pollution violations”. In terms of the National Environmental Management: Air Quality Act, and as part of their atmospheric emission licence obligations, companies must report atmospheric emissions (including greenhouse gas emissions) at least once a year. Sasol and Eskom operations are licensed activities and regularly report emissions. Action has been taken and successfully concluded against major “offender” companies such as Bumatech in Gauteng, Independent Foundries in Johannesburg and Blue Sphere/Ocwen in Ekurhuleni. We have also worked on and concluded compliance issues with ArcelorMittal’s Vanderbijlpark plant. On the issue of alternative sources to meet South Africa’s growing energy needs, it is correct that the NDP supports “enabling exploratory drilling to identify economically recoverable coal seam and shale gas reserves” – notably, though, it adds that “environmental investigations will continue to ascertain whether sustainable exploitation of these resources is possible”. The NDP supports the need for South Africa to develop alternative sources to meet our growing energy needs, all the while taking environmental considerations into account. Operation Phakisa, convened by the presidency, is a pioneering programme aimed at accelerating economic transformation and development. In its first stage, it will focus on two sectors: health and the oceans economy. Among the selected growth areas identified are marine transport and manufacturing, tourism, fisheries and aquaculture, renewable energy, marine protection services and offshore oil and gas. That the department of environmental affairs is the lead department on this first phase of the project is indicative of this government’s placing of environmental considerations at the heart of its policies. Ahead of the United Nations climate summit being held during the UN general assembly in New York next week, the answer to those who question whether South Africa has sufficient measures in place to address the threat posed by climate change is simple. We would be the first to acknowledge that a lot more needs to be done. We are constantly addressing issues to do with climate change – mostly behind the scenes. This leads to the incorrect impression, alluded to in Bond’s analysis, that neither the ANC nor the government is vocal on this issue. Whether it’s air quality monitoring, enforcement and compliance, or acting as the final appeals authority on the issuing of environmental impact assessments for mining-related activities, our list of successes should not be underestimated or rubbished. Our track record speaks for itself.
https://mg.co.za/article/2014-09-12-sa-in-the-green-when-it-comes-to-its-environmental-goals
- The position is responsible for supervising the day to day operations and operationalizing the direction provided by the SHE Manager in the Operating Facilities. - Supervises the environment, health and safety programs and systems in the supervised facilities through constant monitoring, checking and validation of their activities if done effectively. - Ensure SHE Compliance in the supervised facilities through regular review of SHE standards and constant communication with relevant regulators. - Identifies hazards in the workplace, its impact to the business activities and its mitigating measures to minimise the likelihood of risk occurrence through constant engagement and collaboration with various departments. - Conducts SHE inspection of the workplace, inclusive of structures, facilities and fittings; machinery and equipment; and work practices, to ensure strict adherence with established safety regulations. - Identifies potential environmental hazards, its impact to the business activities and its mitigating measures together with the process owners in the facility. - Monitors the facility’s compliance to environmental standards as established by relevant regulatory agencies. - In cases of non-compliance, facilitate discussion with the relevant team leaders to identify and execute an action plan. - Ensures hazardous wastes are monitored, handled and disposed of properly in accordance to established guideline and procedure. - Prepare SHE Reports for submission to regulatory agencies (DENR, DOLE, PCG, etc) - Handles the renewal of permits under SHE, and assists other departments in securing permits with government agencies where SHE has developed an engagement Minimum Qualifications - At least 5 years in the Safety Health and Environmental Management Field. - At least 1 year experience in Safety and Environmental Management in a power plant - Leadership: 1 year in a supervisory role - Bachelor's degree in Engineering or Natural Sciences - PRC License; Preferably with PCO Training or Safety Officer - Strong analytical and planning skills - Good communication and presentation skills - Excellent problem-solving skills Jobs Summary - Job level - Associate / Supervisor - Job category - Architecture and Engineering - Educational requirement - Bachelor's degree graduate - Recruiter response to application - Once in a while - Office Address - Maco, Compostela Valley, Philippines - Industry - Oil / Energy / Solar / Greentech - Vacancy - 1 opening - Website - http://careers.aboitiz.com Feel secure when applying: look for the verified icon and always do your research on a company. Avoid and report situations when employers require payment or work without compensation as part of their application process. About Aboitiz Power Generation Group AboitizPower is the holding company for the Aboitiz Group's investments in power generation, distribution, retail and power services. It has several hydroelectric and geothermal assets in its generation portfolio and also has non-renewable power plants located across the country. The company also owns distribution utilities that operate in high-growth areas in Luzon, Visayas and Mindanao. AboitizPower employs a right mix of renewable and non-renewable energy sources to power up the country with reliable, reasonably-priced, and responsible energy. - Hedcor, Inc. - Therma Luzon, Inc. - Therma South, Inc. - Therma Marine, Inc. - Therma Mobile, Inc. - East Asia Utilities Corp. - Cebu Private Power Corp. - AP Renewables, Inc.
https://www.kalibrr.com/c/aboitiz-power-generation-group/jobs/154813/she-supervisor
The 2020 Technical Program comprises nine conference thematic technical presentation and discussion sessions with 88 oral presentations, 13 panels, 2 forums, 1 roundtable, and 4 training workshops in the 14 tracks listed below. For further details, the online conference agenda provides an up-to-date hourly view of the program, speakers, and panelists. Poster Program CASQA is pleased to include a poster session at the conference; adapted to a virtual environment. Tracks CASQA Awardees The mission of the CASQA Awards Program is to advance the stormwater quality management profession by identifying and recognizing exemplary leadership, outstanding projects, activities, and contributions to the field of stormwater quality management. This track will include presentations from CASQA Awardees. Construction and Post Fire Response This track will focus on proven strategies to resolve construction issues: innovative BMPs and controls; challenges and solutions to site management; implementing cost controls; resolving monitoring and sampling issues; and dealing with the challenges of linear utilities and overhead best management programs. Additionally, this track will explore innovative post-wildfire response using techniques in assessment, aerial mapping, outreach, mitigation, funding, contracting, and monitoring. Data Management, GIS / GIS Tools, and Modeling This track will focus on data management and visualization, stormwater geographic information systems (GIS), data collection tracking, advances in watershed planning and modeling. It will focus on the future and how tools from other industries may be used in the stormwater arena. Emerging Contaminants This track focuses on emerging contaminants: what we know or don't know or need to learn, upcoming regulatory changes that may impact the stormwater community, and new advances in science that allow us to measure or characterize both human and environmental risk related to emerging contaminants. Equity This panel will focus on how we identify the connections between the business of water management and its direct and indirect impact on vulnerable communities. Included will be discussions of current programs, lessons learned, and how to bring equity considerations into all aspects of our work in the stormwater communities. Funding and Financing This track will address stormwater program infrastructure funding and financing, both public and private, and asset management. Integration of stormwater needs into existing funding and financing mechanisms, such as capitalization and scheduling for replacing aging infrastructure, will be a focus. Industrial This track will highlight all things industrial, such as pollutant source assessments, exceedance response action levels, monitoring, Total Maximum Daily Loads (TMDLs), how municipalities are modifying their programs to implement SB205, and Clean Water Act citizen lawsuits. Legislation, Policy, Permitting, Legal This track will provide a forum for updates from regulators, discussions of future policy and legislative initiatives, examples of innovative ways that regulatory obligations can be met, and updates from legal experts. Monitoring and TMDL Implementation This track will highlight two topics that are closely related, monitoring and TMDL implementation. Innovations in monitoring methods and monitoring program development will be explored for a range of monitoring situations, including TMDL compliance monitoring. The track will also explore the science that goes into developing TMDLs and TMDL alternatives, the challenges of complying with TMDL-based requirements, and ways in which parties to a TMDL can come together to work on implementation. Municipal Program Implementation This track will focus on the challenges and solutions to implementing a municipal stormwater program for both Phase I and Phase II agencies and cover emerging issues for municipalities such as planning activities for permit compliance, post-fire stormwater management response, permanent post-construction BMPs, monitoring program challenges and unique solutions, and transient encampments. Outreach and Education This track will share experiences creating and implementing innovative stormwater outreach campaigns, building community to foster a sense of stewardship, using social media as an outreach tool, reaching school-age children with programs in/out of the classroom, and measuring effectiveness. Resiliency and Sustainability This track will look at sustainable practices, legal requirements, opportunities for collaboration, and programs that connect stormwater and other environmental sectors. Important topics such as water supply, water rights, groundwater recharge, Sustainable Groundwater Management Act (SGMA) planning, energy, watershed management, resiliency planning, and climate change will be discussed. Stormwater Infrastructure and Natural Waterways This track will highlight examples of physical infrastructure for improving stormwater runoff quality, protecting natural channels from hydromodification, preventing flood impacts to property, recharging groundwater supplies, permanent post-construction BMPs, and harvesting rainwater. It will focus on pilot studies, design lessons learned, operation and maintenance challenges/solutions, and adaptability after installation. Trash This track will incorporate topics relevant to the Trash Amendments, such as full trash capture BMP implementation, monitoring methods, reporting, and demonstrating compliance under Track 2. Related topics will include source identification, effective and sustainable solutions, data comparability, micro-debris, and relationships between trash and other potential pollutants.
https://www.casqa.org/events/annual-conference/virtual-conference-overview/program-tracks
In 2019, ERG developed a process to analyse the impact that Climate Change may have on its business. The project was developed in accordance with the guidelines of the TCFD (Task Force on Climate-related Financial Disclosure) transposed by the European Commission into the "Guidelines on non-financial reporting: Supplement on reporting climate-related information" and required an analysis, with consequent disclosure, of four pillars: • Governance; • Strategy; • Risk Management; • Metrics & Targets. Whereas the Group Governance framework in relation to these matters and the strategy were very clear, identifying the risks and opportunities was a much more in-depth task. The main steps in the process were the following: 1. identification of the reference scenarios; 2. identification of the variables present in the scenarios that could impact ERG's business; 3. identification of the risks and opportunities related to climate change in relation to ERG's business; 4. identification of the corporate functions responsible for the governance, monitoring and management of Climate Change issues; 5. identification of the strategies for managing the risks or achieving the opportunities. Scenarios were chosen from among those most widely accredited in literature, more specifically: • one physical scenario developed by the Intergovernmental Panel of Climate Change (IPCC) that shows the response of the Earth's climate to changes in atmospheric concentrations of GHG, in the absence of mitigation measures. In this scenario it is estimated that, if mitigation strategies are not implemented and current production rates continue, emissions of greenhouse gases will cause an average temperature increase of +1.5°C by 2040, and subsequently +2°C, with significant effects for the planet; • two transition scenarios that focus on assumptions of the development of climate policies and technologies to reduce GHG emissions: - the Below 2 Degree Scenario (B2DS) of the International Energy Agency (IEA), used by the Science Based Target Initiative (SBT) to set the greenhouse gas emission reduction targets; - the Sustainable Development Scenario (SDS) of the IEA, which uses the Sustainable Development Goals (SDGs) as targets. The mitigation strategies consistent with the transition scenarios mentioned require that in order to keep the increase in average temperatures below 2.0°C a 25% reduction in emissions would be needed by 2030, reaching net zero around 2070, while for a target of 1.5°C, global CO2 emissions would need to be reduced, compared to 2010, by approximately 45% by 2030, reaching net zero around 2050. The different variables that may impact ERG's business were subsequently identified and classified into Physical (acute and chronic) and Temporary (Regulatory, Market, Reputational, Technology) events. Equally, the analysis aimed to identify all the opportunities, generated by Climate Change, that could work in the Group's favour. The first fact that emerged from the analysis is that ERG, having already achieved ante litteram the "just transition" towards a decarbonised economy, has already implemented actions and processes that allow it to be resilient and ready to face a predominantly green generation model. The strategy is clear and outlined in the Business Plan: continue the path of growth in the renewables sector increasing, over the 2018- 2022 Plan period, installed capacity in RES by approximately 850 MW (+30%). The governance of the issues relating to Climate Change is divided between Board and Management. The Board is responsible for strategic guidance, designing the Group's green future, analysing the economic, regulatory and market scenarios in order to identify the best development opportunities while continuing to support the low carbon transition. The Management is responsible for managing the assets, with an increased focus on issues such as: managing contributions to optimise production, technological development and increasing the efficiency of plants in order to extract the greatest possible value, asset integrity, and the environmental and safety management to ensure business continuity. In addition, the Governance model implemented by ERG includes a Sustainability Committee that plays a coordinating role with regard to sustainability matters and, more specifically: • defines the sustainability policies aimed at creating value over time for shareholders and stakeholders; • examines the sustainability goals and processes; • examines the non-financial reports submitted to the Board of Directors. These include monitoring the environmental impact of avoided emissions and CO2 saved as a result of production from renewable sources, which are reported annually in the Non-Financial Statement. Find attached the analysis, in table form, of the risks and opportunities identified, using as a reference the structure proposed by the TCFD and the reference scenarios. In conclusion, in order to counter Climate Change risks and seize any opportunities, the ERG Group makes its decisions in a "conscious and responsible" manner, implementing a climate strategy (understood as a reduction of industrial impacts) that is closely integrated with business strategy, based on the following actions: • maintenance and development, both at board and management level, of a culture and a positive approach, that leads the way and is resilient to change, and the ability to evolve and reposition promptly in the context of the energy transition underway, taking maximum advantage of the challenges and opportunities; • implementation of a plan for the development and production of energy from renewable sources (mainly: Wind, Hydro and Solar) in Italy and abroad, which has made it possible to "eliminate" atmospheric CO2 emissions through the use of "clean technologies" instead of traditional generation; • pursuit of a strategy focused on territorial and technological diversification, in order to compensate for the negative impacts resulting from climate change; • continuous monitoring of regulatory developments in the countries in which the Group operates and the establishment and maintenance of effective and long-lasting relations with its stakeholders; • introduction into the portfolio strategy of bilateral contracts/PPAs for sales of electricity with medium/long-term maturity in order to be able to counteract the greater volatility and any downward pressure on prices that may emerge as a result of the effects linked to Climate Change (many of which with opposing impact on prices during the energy transition period); • specific communication activities to maintain the Group's high level of reputation among stakeholders, which include, among other things, a structured Corporate Social Responsibility process (sustainability reporting, monitoring of sustainability objectives, ESG rating).
https://www.erg.eu/en/sustainability/environmental-care/climate-change-risk-management
Presentation is loading. Please wait. Published byJasmine Cannon Modified over 7 years ago 1 Cap-and-Trade 101 Judi Greenwald Director of Innovative Solutions WORLD RESOURCES INSTITUTE Franz Litz Senior Fellow 2 Webinar Series Webinar #1: Introduction to Cap-and-Trade Webinar #2: Program Scope and Point of Regulation Webinar #3:Electricity Sector Options Webinar #4: Cap-and-Trade Design Issues In-Depth: Part I-- Lessons from the U.S./Canadian Acid Rain Programs/Northeast NOx Budgets Webinar #5:Cap-and-Trade Design Issues In-Depth: Part II Lessons from the European Union Emissions Trading Scheme and Northeast RGGI 2 WORLD RESOURCES INSTITUTE 3 Webinar Series Webinar #6: Design Elements in Federal Cap-and-Trade Proposals Webinar #7:Distributing Allowances Webinar #8: Offsets Webinar #9:Linking Cap-and-Trade Programs Webinar #10:Emissions Trading Market Fundamentals 3 WORLD RESOURCES INSTITUTE 4 Overview Some Key Considerations for Climate Policy Why Market Mechanisms & What Role Do They Play in a Comprehensive Climate Change Policy? Examples of Market Mechanisms Building Blocks of Cap-and-Trade How can other policies interact with Cap-and- Trade? Key Design Considerations 4 WORLD RESOURCES INSTITUTE 5 Key Climate Policy Considerations Global problem; needs global solution Location of GHG reduction doesnt matter Thousands of sources, thousands of solutions We know how to get significant GHG reductions-- challenge is to get the vast reductions we need over time, cost-effectively Markets can be effective at addressing these considerations 5 WORLD RESOURCES INSTITUTE 6 Why Market Mechanisms? Enable linkage with the rest of the world Take advantage of gains from trade Drive innovation Create a price for greenhouse gas emissions, and allow market forces to: – minimize the cost of making substantial reductions – Help find most efficient path to compliance – Stimulate technological innovation and lead to further cuts in the future – Identify solutions regulators cannot anticipate 6 WORLD RESOURCES INSTITUTE 7 The Role of Market Mechanisms Market mechanisms are important, but are just one part of reaching overall emissions reduction goals Additional means of reducing GHG emissions should be included: - regulatory standards - tax incentives - public-private technology initiatives, etc. 7 WORLD RESOURCES INSTITUTE 8 The Role of Market Mechanisms Standards (e.g., GHG standards for vehicles, fuels, etc.) –can be complementary to markets; either covering different sources or as baselines –can be implemented through markets (e.g., LCFS) –can be integrated with broader market through use of tradeable standards Pros and cons of economy-wide vs. sector-specific markets 8 WORLD RESOURCES INSTITUTE 9 Examples of Market Mechanisms Emissions Cap-and-Trade Carbon Tax or Per Ton Emissions Charge Renewable Portfolio Standard (RPS) with Certificates Trading Low Carbon Fuel Standard (LCFS) with Certificates Trading Individual Transferable Quotas in Fisheries 9 WORLD RESOURCES INSTITUTE 10 Renewable Portfolio Standard with Trading Government says: minimum amount of electricity will come from renewable sources Renewable energy providers compete to supply the load- serving entity with certificates Objective: market will be created in certificates, ensuring that the lowest cost renewable energy is obtained Achievement of goal is certain (given sufficient time for development and no cap on cost) 10 WORLD RESOURCES INSTITUTE 11 Low Carbon Fuel Standard with Trading Government says: all fuel must meet a low carbon fuel standard by a certain date, i.e. carbon attributable to fuel (on a life-cycle basis) must be reduced by X% by date. Instead of making all producers meet the standard, producers can buy credits from other producers that are able to exceed the standard. Objective: overall average of fuel delivered in the covered area will meet or exceed the LCFS. Achievement of low carbon average is certain, but amount of total carbon is not limited. 11 12 Carbon Tax Government assesses per unit charge for pollution Pollution charge results in reduced pollution, because pollution costs the firms money Firms would reduce pollution as long as it is cheaper to reduce rather than pay the charge Emission reductions uncertain--reductions proceed until the marginal cost of reduction = tax or charge Emphasis is therefore on cost, or revenue, not reductions 12 WORLD RESOURCES INSTITUTE 13 Carbon Tax vs. Cap-and-Trade Extent of Emissions reductions uncertain Emissions reductions fixed by Cap Price of carbon set at level of tax Price of carbon is function of supply and demand in emissions market Both establish market signal to reduce emissions Source of revenue that can be used for complementary purposes Source of revenue can come from auction of allowances 13 14 IDENTIFY SOURCES TO BE COVERED IN ONE OR MORE SECTORS REQUIRE SOURCES TO MEASURE, MONITOR & REPORT EMISSIONS BASIC BUILDING BLOCKS OF CAP-AND-TRADE ENFORCEMENT & PENALTIES FOR NON-COMPLIANCE ESTABLISH AGGREGATE EMISSIONS BASELINE FOR SOURCES DETERMINE THE REDUCTION OVER TIME (i.e., SUCCESSIVE BUDGETS REDUCED) ESTABLISH COMPLIANCE PERIOD FOR SOURCES SOURCES TRUE UP AT END OF EACH COMPLIANCE PERIOD DISTRIBUTE OR AUCTION ONE ALLOWANCE FOR EACH TON IN BUDGET ESTABLISH ANNUAL EMISSIONS CAP (OR ANNUAL ALLOWANCE BUDGET) 14 15 ADDITIONAL DESIGN ISSUES IDENTIFY SOURCES TO BE COVERED IN ONE OR MORE SECTORS REQUIRE SOURCES TO MEASURE, MONITOR & REPORT EMISSIONS ESTABLISH AGGREGATE EMISSIONS BASELINE FOR SOURCES ESTABLISH ANNUAL EMISSIONS CAP (OR ANNUAL ALLOWANCE BUDGET) DISTRIBUTE ONE ALLOWANCE FOR EACH TON IN ALLOWANCE BUDGET ESTABLISH COMPLIANCE PERIOD FOR SOURCES SOURCES TRUE UP AT END OF EACH COMPLIANCE PERIOD BASIC BUILDING BLOCKS OF CAP-AND-TRADE ENFORCEMENT & PENALTIES FOR NON-COMPLIANCE DETERMINE THE REDUCTION OVER TIME (i.e., SUCCESSIVE BUDGETS REDUCED) 15 OFFSETS? FLEXIBILITY & COST-CONTAINMENT? CREDIT FOR EARLY ACTION? LINKING TO OTHER PROGRAMS? PROVISION FOR NEW SOURCES? MANDATORY EMISSIONS REPORTING 16 What is an Offset Credit? An offset credit is a project-based reduction that is demonstrated outside the capped sector. To receive credit, most existing programs require the reduction be real, surplus (or additional), verifiable, permanent, and enforceable (RSVP & E). Examples of offset projects are: land to forest sequestration project; sulfur hexafluoride (SF6) leak prevention; landfill gas capture and destruction. Offsets expand the cap on covered sources in exchange for reductions outside the sector. 16 17 From the Perspective of a Source A cap-and-trade program consists of two basic requirements: (1)Source must measure, monitor and report its emissions to sources central registry account; and (2)At the end of the compliance period, source must hold sufficient allowances in its allowance account to cover all emissions in that compliance period. Allowances are freely tradable among sources. A covered entity can comply by: reducing its emissions; buying allowances from auction or another source that has reduced its emissions; or buying offset credits. 17 WORLD RESOURCES INSTITUTE 18 Regional Cap-and-Trade Programs Mechanics: Each state gets a annual allowance budget; Regional effort produces model program that states must then propose individually; Each state recognizes the allowances of other states as long as the other state is in good standing; and State registries are linked (or a regional registry is established) to allow for seamless trading across states. 18 WORLD RESOURCES INSTITUTE 19 Regional Trading Sources in one state may buy or sell allowances to sources in another state; Cap is maintained; Aggregate total of emissions remains the sum of participating states allowance budgets, plus offsets. 19 20 Potential for Leakage On the Potential for Emissions Leakage: Addressing out-of-state leakage concerns (e.g., cement manufacturing, electricity) Leakage depends on coverage and the cost of doing business Best way to avoid leakage is to expand coverage, minimize costs, and link with other systems Allocation can help on leakage Traditional regulation can drive leakage too 20 WORLD RESOURCES INSTITUTE 21 Key Considerations –Market Fundamentals: most effort should be in set up Good emissions data: measurement, monitoring and reporting Allowance tracking Consistent and transparent rules Good enforcement Minimize transaction costs 21 WORLD RESOURCES INSTITUTE 22 Key Considerations (continued) Who should be covered, and who should not? –Including more sources and gases in the program offers a broader range of opportunities for low-cost reductions –But including too many small sources can make the program administratively complex Put what works well in the market Economy wide: Cover all GHGs in all major emitting sectors –Downstream: at point of emission –Upstream: at point where fuels enter market –Hybrid: Large point sources downstream; others covered upstream –Electric power: generators, first sellers or LSEs –Coverage can expand over time 22 WORLD RESOURCES INSTITUTE 23 Key Considerations (continued) 23 Ends: –Reduce GHGs –Minimize costs –Stimulate innovation –Link efforts with others –Achieve co-benefits –Equity Means: –Markets are part of a comprehensive approach –Get the market fundamentals right –Careful design based on past lessons and analysis –Complement and build on relevant state policies; address state- specific issues WORLD RESOURCES INSTITUTE Create Model that Others will Emulate or Link to 24 Questions? 24 Franz T. Litz Senior Fellow Judi Greenwald Director of Innovative Solutions WORLD RESOURCES INSTITUTE Similar presentations © 2021 SlidePlayer.com Inc. All rights reserved.
https://slideplayer.com/slide/697030/
NSW Irrigators’ Council Key Positions: Basin Plan NSWIC supports a healthy Murray-Darling Basin. Basin Plan policy is required to balance economic, social and environmental objectives. Future implementation of the Basin Plan must acknowledge the impact so far on communities and our capacity to produce food and fibre. This means, going forward, implementation must be responsive and adaptive and value the importance of irrigated agriculture and rural communities to Australians. Please refer to our Basin Plan Policy Paper for full details [HERE] Property Rights Water Access Licences are a property right – water property rights (including accessibility, reliability and their fundamental characteristics) must be protected regardless of ownership. Government must recognise water property rights, and not make regulatory changes which reduce reliability. Environment It is a core principle of NSWIC that environmental health and sustainable resource access is integral to a successful irrigation industry. Irrigation farmers in NSW and Australia are world leaders in water-efficient production with high ethical and environmental standards. Government must work with irrigation farmers to respond and adapt to a changing climate of water availability. All water, including environmental water, must be used most effectively and efficiently, with the measure of success remaining focused on achieving improved ecological outcomes. Healthy Floodplains The NSW Irrigators Council is supportive of the need to bring the legitimate historical floodplain harvesting access into the current regulatory framework by converting a descriptive take licensed under NSW Water Act 1912 into a volumetric license consistent with the NSW Water Management Act 2000. The NSWIC agree that with all water available to irrigators and the river system limited, licensing of floodplain flows must demonstrate ‘no more or no less’ take (than described limits), and provide tools to better measure and monitor floodplain take to ensure overall usage remains within described limits, as set out in water sharing plans and the Basin Plan. Please refer to our Healthy Floodplains Paper for full details [HERE] Metering, Monitoring & Measuring NSWIC supports the continued improvement of Metering, Monitoring & Measurement actions for all water users across the state. If it can’t be measured, it can’t be managed. It is a key principle of NSWIC that all water (agricultural, environment, cultural and industrial) must be measured, and used efficiently and effectively. NSWIC endorses National Metering Standards and expects all Australian states to apply the standards. NSWIC recognises the leadership of NSW in meeting National Metering Standards, and going above the standard in some instances (e.g. telemetry), by implementing an ambitious, high-standard and world-leading metering reform. Socio-economics Water reforms have serious impacts on rural communities. It is crucial that socio-economic impacts are understood, and included in decision-making. Evidence-based policy is essential for best practice policy. NSWIC endorses the ‘Independent Assessment of Social & Economic Conditions in the Basin’ Final Report, including all recommendations and findings. Water Pricing Pricing determinations must be transparent, with cost shares appropriately allocated. The general public must recognise that water users fund vital programs for our river systems, including environmental projects, water quality monitoring and flood management. Water Markets The water market must foster confidence from all water users by being transparent, simple to use, based on well-informed price data and sound reporting. River Operations River systems must be managed most efficiently to minimise operational losses and maintain reliability and accessibility to all water users, whilst respecting the physical capacity and needs of the river system. Please refer to our Deliverability Policy Paper for full details [HERE]. Allocations & Usage Water users have access to water up to the Sustainable Diversion Limit, and it is the responsibility of Governments to permit and foster access to this level. Government should be focused on continuous improvement to the transparency of the allocation system, and the ability to account for inflows. Climate Change NSWIC has established a Climate Change Policy Portfolio, in recognition of the risks to water security for irrigated agriculture. See more [HERE]. Water Resource Plans & Water Sharing Plans Water management must be evidence-based, with review mechanisms, to ensure best-available data can inform best-practice policy through adaptive process. Irrigation farmers are stewards of tremendous knowledge in water management, and extensive consultation is needed to utilise this knowledge. Connectivity NSWIC supports river connectivity, defined as flows to meet critical human, environmental and cultural needs, within the physical, hydrological and climate limits on rainfall, inflows and flow rates. NSWIC recognises the significant recent and ongoing suite of reforms to improve connectivity, as reflected in WSP rules. NSWIC urges better communications to support a shared understanding of what connectivity means, to ensure public expectations pragmatically reflect the physical and hydrological limitations of river systems (which vary widely), particularly with a changing climate. Mining & CSG The preservation of sustainable resources for agriculture – including water – must be absolute in addressing mining exploration or operational licence applications. NSWIC advocates a strict “no regrets” approach to the licencing of both exploration and operations in mining in respect of water sources. Coastal Clear policy to manage coastal water sources fairly is imperative to the success of existing and further development within coastal regions. There is a need for Coastal water management to be treated separately to inland water management. Cultural Water NSWIC recognises and supports the traditional and cultural uses of water by Aboriginal people. Energy Government must invest in reliable, efficient and cost-effective energy solutions.
https://www.nswic.org.au/policy/
For the 2014 Sustainable Development report we again engaged an external assurance service provider to undertake assurance of our compliance with the guidelines of the G4 Global Reporting Initiative (GRI) and the Sustainable Development Principles of the International Council on Mining and Metals (ICMM) and to verify that our report content accurately communicates: - Material sustainable development risks and opportunities and the views and expectations of our stakeholders; - The existence and status of implementation of systems and approaches that the company is using to manage material sustainable development risks and opportunities; - Performance against a number of key performance indicators chosen for reporting which reflect the issues which are material for the business. In addition to reliance on external assurance, our assurance approach also rests on scrutiny of this report and of our ongoing sustainability performance by AngloGold Ashanti’s Group Internal Audit team. Group Internal Audit conducted an audit of our 2014 sustainable development reporting in terms of the Group Internal Audit Charter as approved by the company’s Audit and Risk Committee. The audit was performed in accordance with the Institute of Internal Auditors’ Standards for the Professional Practice of Internal Audit. Internal assurance includes a programme of combined assurance assessments, including site visits and reviews, undertaken during the course of the year. These assessments determine the validity, accuracy and completeness of the relevant GRI indicators in our reports, together with various data transfer and integrity checks. This 2014 Sustainable Development Report was approved by the Board of Directors on 19 March 2015. Key performance indicators covered by external assurance in 2014 |GRI indicator number||GRI indicator description||External assurance level| |Safety and health| |G4-LA6|| | Number of cases of occupational disease |Reasonable| |Non-GRI indicator||Number of new malaria cases and Malaria Lost Time Injury Frequency rate (MLTIFR)||Reasonable| |Environmental stewardship| |MM6||Number and description of significant disputes relating to land use, customary rights of local communities and indigenous peoples||Limited| |G4-EN8||Total water withdrawal by source||Reasonable| |G4-EN10||Water recycled and used||Limited| |G4-EN3||Energy consumption within the organisation (fuel consumption from non-renewable and renewable fuels and electricity purchased)||Reasonable| |G4-EN11||Operational sites owned, leased, managed in or adjacent to protected areas and areas of high biodiversity value outside protected areas||Limited| |G4-EN13||Habitats protected or restored||Limited| |G4-EN15||Total direct greenhouse gas emissions (Scope 1)||Reasonable| |G4-EN16||Total indirect greenhouse gas emissions (Scope 2)||Reasonable| |G4-EN22||Total water discharge by quality and destination||Reasonable| |G4-EN23||Total weight of waste by type and disposal method||Limited| |G4-EN24||Total number and volume of significant spills||Reasonable| |G4-EN29||Monetary value of significant fines and total number of non-monetary sanctions for non-compliance with environmental laws and regulations||Limited| |MM1||Amount of land (owned or managed, disturbed or rehabilitated)||Limited| |MM3||Total amounts of overburden, rock, tailings and sludges and their associated risks||Reasonable| |MM9||Sites where resettlement took place, including number of households resettled in each, and how their livelihoods were affected in the process||Limited| |Closure and rehabilitation| |MM10||Number of operations with closure plans||Reasonable| |Respecting human rights| |G4-HR7||Percentage of security personnel trained in the organisation’s policies and procedures concerning aspects of human rights that are relevant to operations||Reasonable| |G4-HR8||Total number of incidents or violations involving rights of indigenous people and actions taken||Reasonable| |G4-HR9||Percentage and total number of operations that have been subject to human rights reviews and/or impact assessments||Reasonable| |G4 HR10/G4-LA14||Percentage of new suppliers that were screened using labour practices, human rights impacts criteria||Reasonable| |G4-HR12/SO11||Number of grievances about human rights impacts and impacts on society filed, addressed and resolved through formal grievance mechanisms||Limited| |Engaging with stakeholders for mutual benefit| |G4-11||Percentage of employees covered by collective bargaining agreements| |G4-LA8||Health and safety topics covered in formal agreements with trade unions||Limited| |G4-SO5||Minimum notice period for operational changes||Reasonable| |G4-LA4||Percentage of employees covered by collective bargaining agreements||Limited| |Implementing our business strategy through people| |G4-LA10||Programmes for skills management and lifelong learning that support the continued employability of employees and assist in managing career endings||Reasonable| |G4-EC1|| | Direct Economic Value Generated and Distributed:
https://www.aga-reports.com/14/sdr/reporting/assurance
In KGHM we support the initiative related to the global challenge of sustainable development and the reporting of ESG (Environmental, Social & Corporate Governance) data. To meet the needs of our stakeholders we created this section to make it easier to find in one place all information associated with the reporting of non-financial information by KGHM Polska Miedź S.A. To satisfy and comply with the increasing informational demands from capital market regulatory institutions and from society in general, as well as demands from investment funds, banks, customers and suppliers, KGHM has committed to the preparation and publication of an expanded scope of information regarding our environmental impact in compliance with EU regulations and international initiatives on the reporting of emissions and greenhouse gas reduction goals. In 2020, for the first time in its history, KGHM Polska Miedź S.A. took part in the CDP (Carbon Disclosure Project) initiative. The questionnaire developed by CDP incorporates elements such as the management of emissions, risks and opportunities associated with climate change and business strategies. Many of these elements, such as risk analysis and emissions optimisation plans, are an everyday part of the Company’s operations. In the near future, KGHM expects to develop more detailed plans regarding its corporate development and strategic objectives in the area of climate change and impact. In the following documents, incl. spreadsheets we provide data describing our operations in terms of our environmental footprint, actions taken for the benefit and well-being of society and employees, and corporate governance. ESG composite data [available soon] Data on tailings storage facilities operated by the KGHM Group Tailings storage facilities in Poland, Chile, USA New Global Tailings Standard Carbon Disclosure Project 2020 Integrated reporting Integrated Report 2019 On-line Archived reports In KGHM we are cognizant of our obligations and responsibilities in terms of sustainable corporate development. For many years we have been developing and implementing Policies and Codes which reflect our commitment and approach to our natural and social surroundings. The following Policies and Codes have been implemented within the KGHM Group. Natural environment ECOLOGICAL POLICY The ecological policy of KGHM reflects the company's concern for the natural environments in which it operates. KGHM undertakes a number of actions to minimise its impact on the natural environment. The main tenets of the environmental policy are: - Maintenance of all equipment used to protect the natural environment in good working order, - Identifying new technological solutions limiting industrial impact on the environment and implementing them as and when required and feasible, - Development of waste management technologies and a continuous increase in the share of recycled waste in the total volume of generated waste, - Ongoing partnership with the local communities and government authorities for the benefit of the environment, - Collaboration with the Ministry of the Environment in terms of the implementation of national environmental policy, - Cooperation when preparing BAT (Best Available Techniques) reference documents for the non-ferrous metals industry, and - Cooperation with the European mining industry and non-ferrous metals industry in sectoral organisations when preparing EU documentation on environmental protection. Protection of the natural environment and minimising the impact of the company's operations is a priority for KGHM. Thanks to its comprehensive environmental policy, KGHM sets the highest environmental standards. CLIMATE POLICY The KGHM Group is preparing a climate policy which will serve as a systemic approach to implementation of the Communication by the European Commission in the form of Guidelines on non-financial reporting: Supplement on reporting climate-related information (2019/C 209/01), together with the Guidelines of the Task Force on Climate-related Financial Disclosures (TCFD) (in that part concerning Metals and Mining). It will also include the following medium-term (2030) and long-term (2050) quantitative targets: - A decrease in direct GHG (scope 1) emissions, as well as indirect emissions (scope 2 and 3), - Improved energy efficiency, - Increased use of energy from renewables, - Minimalisation of activities in regions exposed to long-term or excessive physical risk, - A higher share of products connected with activities meeting the criteria of having a substantial impact on mitigating the effects of climate change or capable of being adapted to mitigating the effects of such change, - Commitment to the system of green financing arising from the new Green Bonds taxonomy announced on 19 June 2019. Society Code of ethics The Code of Ethics of the KGHM Polska Miedź S.A. Group is the main tool in our corporate culture which assists in the setting of priorities and establishing a collection of principles which are binding for all of our employees in their daily work. The Code of Ethics is a guide to proper conduct at work and helps us in our daily decision-making. It makes us stronger as a team. It also supports our image as a stable, responsible, and socially-engaged company. Code of conduct In June 2018 the Management Board of KGHM Polska Miedź S.A. adopted the Code of Conduct of KGHM Polska Miedź S.A. At the same time the Company declared its commitment to sustainable development, based on respect for ethical principles, transparency and best industry practice, and commitment to being a socially and environmentally responsible enterprise, grounded on the KGHM Group’s Code of Ethics. Both documents regulate behavior standards that the Company is guided by. The Codes are an integral, mutually interconnected whole, based on consistent assumptions and values followed by the Company. Safety policy KGHM Polska Miedź S.A. has adopted an OHS Policy. The life and health of employees and workplace safety in general is the chief priority in the hierarchy of values of the KGHM Polska Miedź S.A. Group. For several years the Company has advanced its vision of „Zero accidents due to human and technical errors, zero occupational illnesses among our employees and contractors”. As a result of the adoption in December 2018 of a new strategy to the year 2023, in 2019 a conceptualisation of the strategy in the area of occupational safety was prepared through formulation of the Employee Safety Improvement Program „Think About The Consequences” as well as a Program to prevent the most common hazards to workplace safety by utilising innovative technology. The Company applies high OHS standards, both towards its own employees as well as towards those providing services on the grounds of KGHM Polska Miedź S.A. Each of the Company’s Divisions has implemented a safety management system which is compliant with standards in force to date, and in 2019 preparations commenced to implement a new OHS standard compliant with the ISO 45001:2018 standard. All work stations have identified threats. The Company has assessed occupational risks and updates them continually. Working environments are continually monitored and periodic reviews and potential threat assessments are conducted, as well as reviews of equipment and required technical checks and approvals. Employees undergo systematic training and continually enhance their qualifications. Diversity declaration The KGHM Polska Miedź S.A. Group does not have in place a shared Diversity Policy in written form. Taking into consideration the international nature of our activities, cultural differences and specific natures of the Group’s industries, each company has been performing a number of actions in the area of respect for diversity. In view of the above, the independent Diversity Declaration has been defined at KGHM Polska Miedź S.A. The Company complies with the prohibitions of discrimination and takes actions in order to ensure respect of diversity in the workplace. It creates an organizational culture based on mutual respect, equality, access to development opportunities and optimal use of employee talent regardless of ethnic origin, age, gender, nationality, citizenship, religious orientation, political convictions or trade union membership, among others. It aims at ensuring reasonable diversity both in the selection of personnel (including in the recruitment process), with special focus on knowledge, technical competence and social skills. The Parent Entity guarantees the implementation of the diversity principle across the KGHM Polska Miedź S.A. Group, and promotes and popularizes these values among its stakeholders and business partners. The management of diversity also pertains to members of the Supervisory Board and Management Board of KGHM Polska Miedź S.A. The management and supervisory teams are composed of persons of different gender, age and experience. More information on the approach to diversity in the supervisory bodies is presented in the Statement on Corporate Governance in The Management Board’s Report on the activities of KGHM Polska Miedź S.A. and of the KGHM Polska Miedź S.A. Group in 2019. Declaration on human rights protection The KGHM Polska Miedź S.A. Group does not have in place a shared Human Rights Protection Policy. Taking into consideration the international nature of our activities, cultural differences and specific natures of the Group’s industries, each company engages in a number of actions to protect human rights. Consequently, an independent Declaration on Human Rights Protection has been defined at KGHM Polska Miedź S.A. KGHM Polska Miedź S.A. declares that it recognizes, respects and promotes human rights wherever it conducts its business. It does not tolerate any violations of human rights. We undertake to operate in compliance with the United Nations’ Universal Declaration of Human Rights and other norms and standards, including the statutory and executive regulations of the home countries of our business operations. KGHM Polska Miedź S.A. is a global organization, aware of the importance of respect for human rights in the modern world. The Company accepts responsibility for protection and respect for fundamental human rights and implements such standards across the KGHM Polska Miedź S.A. Group. It also assumes that respect for human rights by other entities is a vital element of mutual relationships. In compliance with the adopted principles, each employee and collaborator of the KGHM Polska Miedź S.A. Group is responsible for ensuring that in his/her closest environment human rights are respected, and any infringements are reported according to the agreed procedure. This Declaration is the basis of our approach to human rights. It supplements and consolidates the human rights issues contemplated in other policies and guidelines of the Company, such as the Code of Ethics, the Diversity Declaration, HR and the Responsible Supply Chain Policy. The Declaration is implemented in the following manner: - Each employee provided with access to a computer receives the adopted declaration electronically, via the Company Document Circulation System, while employees with no access to a computer for work purposes are informed of the declaration implementation via extranet (accessible to all employees) and by their direct superior. Infringements are reported as follows: - Employees have the right and obligation to report an infringement of the Declaration on Human Rights Protection to their direct superiors; - Employees may report infringement to the trade unions operating in the Company (in KGHM Polska Miedź S.A. there are 15 trade unions, which have established 48 company trade organizations; the trade union membership percentage ratio in the Company is 88.6%). KGHM Polska Miedź S.A. acts in compliance with the Collective Bargaining Agreement; - Infringements may be reported to the Occupational Safety and Health Committee; - Employee Council Institutions are present in the Company, and in the case of Whistleblowers (Ethics Hotline) report to the State Labour Inspection Service (PIP). Statement on Respect for the Rights of First Nations and Indigenous Peoples Responsible supply chain policy The KGHM Group is fully cognizant of the fact that the selection of responsible suppliers, especially as regards the sourcing of conflict minerals (such as gold, tin, tungsten and tantalum), is of key importance for conducting activity oriented on sustainable development. Consequently, in December 2015, KGHM launched an internal system of responsible supply chain management by formally adopting the KGHM Polska Miedź S.A. Group Responsible Supply Chain policy and the Responsible Gold Supply Chain Audit Procedure in KGHM Polska Miedź S.A. In 2019, the Company updated the Supply Chain Audit Procedure with respect to gold and silver with a view to ensuring compliance with LBMA Responsible Gold Guidance V8 and LBMA Responsible Silver Guidance V1. The system is subject to regular independent external audits. It is important to underline the fact that the KGHM Group does not tolerate, support, contribute to or benefit from: - Violating the principles of occupational health and safety, - Child labour or any form of forced labour, - Violating the right of association, - Violations of international humanitarian law, - War crimes, genocide or any crimes against humanity, including indigenous peoples, - Money laundering and terrorist financing. Corporate Governance Remuneration policy The Remuneration Policy for the Members of the Management and Supervisory Boards of KGHM Polska Miedź S.A. is aimed at achieving the business strategy of KGHM, as well as the long-term interests and stability of the Company. Competition policy There is a Competition Law Policy in the KGHM Polska Miedź S.A. Group. Its purpose is to establish the operational framework for the system to ensure compliance with the competition laws prevailing in all the countries in which the KGHM Polska Miedź S.A. Group operates. Procurement policy KGHM Polska Miedź S.A. is guided by high ethical standards across the procurement process. The Code’s main message is to guarantee the professionalism and honesty of the persons responsible for the procurement process. The document also contemplates issues such as preventing conflicts of interest as well as equal treatment of suppliers to ensure compliance with the principles of fair competition. The procurement procedures in effect in KGHM are precisely defined in the Procurement Policy and business partners are selected in accordance with the principle of equal treatment. In tender documentation, the Company reserves the right to audit its suppliers and to assess their activities in terms of compliance with human rights and regulations governing the hiring of minors. External entities are also checked in order to secure the interests of KGHM, in the context of money laundering, breaches of fair competition rules, prevention of conflict of interests, etc. Procedure for counteracting money laudering and the prevention of fraud and extortion… ...in trading transactions regarding the sale of products and the procurement of ore and copper-bearing materials of KGHM Polska Miedź S.A. KGHM uses a diverse range of external counterparty verification in the procurement, sales and investment processes, which are regulated by a number of consistent and uniform internal policies and procedures. This procedure covers verification methods used for the purposes of trading transactions. To protect its image and the Company’s security, KGHM takes measures to prevent the Company from being used by third parties for unlawful purposes, such as money laundering, financing of terrorism or VAT extortion. The security measures undertaken in this respect consist of: - Client identification and verification of its identity based on the data provided by the Client, publicly available information and/or reports of credit bureaus, - Undertaking, with due diligence, actions to determine the ownership as well as organizational structures or the Client’s links to other entities, in order to identify the Beneficial Owner of the transaction and verify its identity, using publicly available information and/or reports of credit bureaus, - Obtaining information on the Client’s objective and intended character of the business relationship, using publicly available information, - Monitoring of the business relationship with the Client, including completed transactions, in order to check if they are consistent with the Company’s knowledge of the Client and its business profile, and - if possible - examining the source of funds. anti-corruption policy The Anti-Corruption Policy in effect in the KGHM Polska Miedź S.A. Group was adopted in July 2018, pursuant to the Resolution of the Management Board of KGHM Polska Miedź S.A. The Policy establishes detailed standards of conduct in corruption-prone situations and identifies the criminal liability in case of abuse. The KGHM Polska Miedź S.A. Group underscores its commitment to fighting corruption in business, by the way of adopting and uncompromising observance of the “zero tolerance for corruption and bribery” rule. Employees are prohibited from offering or accepting material benefits in relation to the performance of professional duties. The only exception is giving and accepting business gifts in line with the local norms and cultural customs, provided that the giving and accepting of gifts cannot lead to a situation in which such behavior could be considered as an attempt to exert pressure or persuade the recipient to act against their duties. Detailed rules pertaining to giving and accepting of customary business gifts have been defined as an instruction under the Corruption Threat Prevention Procedure. Employees are required to avoid any actions or decisions in a situation of a conflict of interests. Particular control under the Policy is over business procurement transactions, including an option of a third party audit, in order to ensure that such transactions meet the highest standards of ethical and transparent business operations. The KGHM Polska Miedź S.A. Group Entities and their Employees may be held accountable for actions of persons or entities acting on their behalf or for them. The Policy also states that the Group Entities and their representatives are obliged to observe all statutory provisions, guidelines of administration bodies and other state authorities, as well as domestic and international legal acts designed to fight corruption. The Policy also states that KGHM Polska Miedź S.A. and the Group Entities and cooperating entities are obliged to follow international legal acts designed to fight corruption, e.g. the U.K. Bribery Act of 2010, the U.S. Foreign Corrupt Practices Act, Canadian Corruption of Foreign Public Officials Act of 1999 and guidelines contained in international agreements, e.g. the OECD Convention or the guidelines of UN Global Compact as regards responsible business and fight with corruption. The document stipulates that Employees of the Group and external partners are obliged to report any suspicion of breaches to the Policy and the Corruption Threat Prevention Procedure, directly to the Security Department of KGHM Polska Miedź S.A. or via the dedicated channels of abuse reporting. Every report is confidential and followed up with due diligence. The KGHM Polska Miedź S.A. Group uses a range of tools to effectively implement the Policy’s objectives, including first of all procedures, instructions, remedies and control mechanisms, which specify in detail the standards of conduct in corruption-prone situations. ESG indices The actions taken by KGHM to protect the natural environment, to care for its employees, their families and the people of the regions where we operate, while applying the highest corporate governance standards, have for many years been a key element of our corporate identity. Our efforts have been recognised by prestigious international institutions such as FTSE Russell, MSCI and by our own Polish exchange – the shares of KGHM are a component element of the FTSE4Good Index Series and the WIG-ESG index. In 2020, for the first time in its history, KGHM participated in the Carbon Disclosure Project, entailing communication of the company’s environmental footprint in terms of greenhouse gas emissions. For our initial report we provided CDP with responses to the Climate Change questionnaire. In subsequent stages of the project we intend to expand our reporting to include information in the Water Security and Forests questionnaires. What are KGHM’s plans for the immediate future as regards reducing CO2 emissions? The following actions have aided in the reduction of direct emissions by KGHM: - The construction and start-up of a new flash furnace smelter at the Głogów Copper Smelter and Refinery; - The long-term increase in the share of scrap as charge material (among others through the use of the RCR scrap processing furnace at the Legnica Copper Smelter and Refinery; the processing of relatively clean scrap means lower carbon dioxide emissions and is in line with the principles of closed economy operations); - Technological improvements (e.g. in terms of fuels). The largest drop in emissions was recorded at the Głogów metallurgical facility thanks to a change in technology from shaft furnace to flash furnace smelting. This change in technology lead to a total decrease in CO2 emissions (indirect and direct) by around 25%. Further reduction of KGHM’s carbon footprint will mainly be based on the consumption of electricity generated to an ever greater degree from low- or zero-emission sources. This in turn leads to lower indirect emissions, which, jointly with the trend towards electrification (increasing use of electricity as a source of energy for industrial processes) which also result in the long term to substantially lower direct emissions. Over the next 24 months the KGHM Polska Miedź S.A. Group plans to bring on-line solar power plants of over 10 MW, which on an annual basis will enable a decrease in emissions of CO2 and other nitrogen and sulphide compounds and of dusts of more than 8 thousand tonnes. KGHM ZANAM, a company belonging to the KGHM Group, is investing in a solar power plant with a capacity of 3 MWp. The photovoltaic power plant was opened in December 2020 and is the first such power plant in Poland which will operate based on 4.0. technology. The facility will be fully computer-controlled and automated, equipped with a Control Room and built under the guidelines of the International Energy Agency for the construction of solar power plants. We are also considering investments in wind farms, though this is dependent on changes in the regulatory environment. What actions are being taken by KGHM to encourage their suppliers to cut emissions? Due to increasing demands by regulators and society in general, including investment funds, the Company is in the process of preparing to publish an expanded scope of information on its environmental impact in compliance with guidelines announced by the EU and by international initiatives on the reporting of emissions and GHG reduction goals. In 2020, for the first time in its history, KGHM Polska Miedź S.A. participated in the Carbon Disclosure Project (CDP). The questionnaire contains elements involving the management of emissions, risks and opportunities, business strategy, etc. Many of these elements, such as risk analysis and emissions plans, are an everyday part of the Company’s operations. In the near future, KGHM expects to develop more detailed plans regarding its corporate development and strategic objectives in the area of climate change and impact. Is KGHM aware of any regulatory activities which could facilitate the process of reducing the company’s carbon footprint? Regulations which could aid in reducing KGHM’s carbon footprint can be divided into two groups. The first involve technical changes which could facilitate operations in the company based on its own sources of energy and its own distribution system. These include: - Amendment of the legal definition of direct lines to the demands of RES and power purchase contracts (simplification of the process of obtaining direct line status for generation sources connected to plant networks); - Streamlining regulations for the functioning of Closed Distribution Systems (removing from companies such as KGHM – which hold the status of Distribution System Operator, but are not professionally involved in this sector – administrative obligations unrelated to its own activities); - Minimising bureaucratic obstacles arising from rules for the functioning of power systems – such as regulations for the balancing of energy and regulatory accounts; - Reinstituting support for high efficiency cogeneration systems for internal company use – a strong stimulus supporting investments in low-emission natural gas cogeneration. The second group of regulations involves the financing of investments in new generation sources and power networks. In particular we believe that an energy-intensive industry investing in its own generation capacity should be allowed to utilise the funds accumulated in the Modernisation Fund and the Fair Transformation Fund. We also wish to point out that the quickest method to reduce emissions is by investing in renewable energy sources. Solar power plants can be built fairly rapidly, but unfortunately the preparatory procedures are much more time consuming. It is worth considering changes to the requirement to include in municipal planning documents the need for permission for solar power plants with capacity above 100 kW (perhaps 500 kW in future based on a draft bill to alter the RES law). For example, consideration could be made of foregoing such a requirement for industrial terrain or areas designated for economic activity. In terms of energy from wind power it is crucial to enable investments in technically advanced and economically mature solutions. The wind turbines available today require the use of tall masts, which is directly bound to the need to liberalise the so-called 10H principle. The directions of changes currently announced are a good example of this. What do KGHM feel are the barriers and difficulties involving the implementation of initatives related to decreasing CO2 emissions? Barriers to transformational initiatives are in the first instance the availability of technology and its costs. There remains a lack of economical and applicable solutions for the capture and storage of carbon dioxide (CCS). Without cheap technology it is impossible to completely eliminate emissions. Much can be achieved by applying low- or zero-emissions energy sources, but to successfully do so financing remains a critical element (preferably non-refundable grants, in terms both of capital expenditures and operating costs), as well as appropriate regulatory support.
https://kghm.com/en/investors/esg
Confronting has the potential to reduce prejudice, especially when implemented by a non-target group member. Not knowing how to respond and fearing social rejection have been identified as barriers to confronting in previous studies. The current study tests whether providing training to confront prejudice and affirming the need to belong helps individuals overcome these barriers. Participants were randomly assigned to one of three training conditions: prejudice confrontation training (PCT), rude comment training (RCT), or no training control group (NT). Participants were also randomly assigned to one of two belonging conditions: belonging affirmation or control. Participants were then asked to imagine that a friend posted a racist Facebook comment on their page, and were asked to respond to the comment. Responses were coded for whether participants labeled the comment as racist, number of confrontation responses and strategy use. Training, belonging, and race interacted to predict participants’ confronting behavior. PCT increased confrontations for participants of color, whereas RCT did so for Whites. Whites confronted more when belonging was affirmed, whereas participants of color did so when belonging was not affirmed. Recommended Citation Bozeman, Rayne, "Bystander Confronting of Anti-Black Racism: Effects of Belonging Affirmation and Confrontation Training" (2015). Master's Theses. 2886. https://ecommons.luc.edu/luc_theses/2886 Creative Commons License This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 License.
https://ecommons.luc.edu/luc_theses/2886/
Humorous way to assign volunteers in cooperative groups. Directions: When it is time to select a spokesperson for the group, participants pint into the air and then, on the count three, point to the person in the group that they want to be the spokesperson. The participant in each group with the most fingers pointing at them becomes the spokesperson. Adaptation Participants: - dressed in blue (or any other color). - wearing contacts or glasses. - wearing jewelry. - who have brothers, sisters, children, or pets. - who live the closest or the farthest form the site. Marcia Tate: Sit & Get Won't Grow Dendrites, 2005. Corwin Press.
https://www.oregonednet.org/strategies/getting-volunteers
|Participants during the kick-off session of D-LAB, Leadership from Within. Photo by Abigail Chen '17.| On January 26, the first meeting of D-LAB, Dartmouth Leadership Attitudes and Behaviors, kicked off with part one of the Leadership from Within session. Co-sponsored by the Rockefeller Center and the Collis Center for Student Involvement, Robin Frye and David Pack began with a quick explanation of the motivations behind creating the D-LAB program and what they hope the participants will gain from it. They then turned the session over to Austin Boral '17 and the other twenty-two student facilitators. The facilitators went on to explain in more detail some of D-LAB’s goals, which include providing an opportunity to reflect on one’s individual experiences at Dartmouth while still on campus and to effectively use the wide variety of resources provided by the college. Another goal is to create valuable time for first-year students to interact with upperclassman students in a positive manner. Something that stuck out during the introduction was the phrase "What ever is said here, stays here. What ever is learned here, leaves here." By including this, the facilitators made the participants excited about the program while ensuring a safe place for discussion and reflection. D-LAB provides a platform for participants to share their experiences and learn from others experiences and also provides a great way to meet a lot of amazing people that you would have never met otherwise. |Participants during the kick-off session of D-LAB, Leadership from Within. Photo by Abigail Chen '17.| Before the session, participants were asked to fill out the "true colors test," a five-minute online test that asks participants to identify some character traits that most describe them and others that do not. Based on this test, participants were assigned a color: blue, green, gold or orange. While taking the test, participants had no idea what these colors meant. Following dinner, participants were split up into groups based on the color they were assigned and given one instruction: describe "how to bake a cake" on a large post-it board. The initial reaction from the participants was confusion. Many of the participants asked themselves, "What does baking a cake have to do with leadership?" Despite this reaction, the different groups engaged in the task. Once everyone was done, the entire group reconvened and presented what their different groups came up with. Different groups approached this task in very different ways. Some simply drew a cake while others wrote a detailed account of how to bake a cake, including things like cake pan size and temperature needed to bake it. The facilitators then went on to explain their observations on how each group approached the task and related this back to their color. Color turned out to represent different personality groups. As the facilitators described the differences in how groups approached this task, this seemingly random and mundane task started to make a lot more sense. The facilitators further further described the different characteristics of the color groups including their strengths, weaknesses, and leadership approachs. This was enlightening for the participants, and it was fascinating to see how most participants thought that the descriptions were extremely accurate. |Participants during the kick-off session of D-LAB, Leadership from Within. Photo by Abigail Chen '17.| For the last portion of the session, even smaller groups were created with a mix of people from the different color groups. These assignments are the permanent groups for the rest of the program and are each lead by two facilitators. In these groups, students were given the opportunity to reflect and share their feelings on the exercise in a less intimidating space. This learning experience for the participants was an opportunity to learn about themselves. It turns out that describing how to bake a cake says more about a person than expected. -Written by Niamé Daffé '18, D-LAB Participant This ongoing series shares the experiences of participants and facilitators in D-LAB (Dartmouth Leadership Attitudes and Behaviors), a student-facilitated program designed for first-year students to discover the relationship between leadership and personal values.
https://rockefeller.dartmouth.edu/news-events/d-lab-kick-session-leadership-within-part-one
I really like the themed small quilt projects that quilt guilds and informal quilter groups are taking on. At the recent Northwest Quilting Expo the Central Oregon group of Studio Art Quilt Associates showed their whisper quilts, a quilt group displayed their 12 by 12 inch color quartet quilts, and the original Twelve by Twelve group showed off their 2012 themes. My favorite Twelve by Twelve theme was maps – no surprise since I used to deal with geographic information. And this was my favorite quilt in that theme. What a great idea to link birds and maps, given birds’ ability to return to the same places over thousands of miles. Click on the image to see the map fabric used for the bird’s body. Here are just two of the whisper quilt groups. Each one had three participants, with the quilts on the left the initial ones. While they’re hard to read, the tags on each quilt give the makers’ explanations of design choices made. Another group of four had this color quartet display. I don’t know if this is a formal group, but I loved seeing the different ways the starting fabric was used. I believe they did eight colors, including off-white. Now that must have been a real challenge. Here are the blue and orange creations. Other groups were represented as well, though no common theme was discernible to me. The Vancouver (Canada) Modern Quilt Guild was well represented, as was High Fiber Diet, a professional fiber artist group. I’ve participated in only a few common theme projects, but would love to try a group effort. What have your experiences been with the group stuff?
https://snarkyquilter.com/2013/10/04/all-together-now/
Ungen-coloring is a coloring technique introduced from China to our country in the 7th century. It is mainly used for something Buddhist, and expresses "vivid colorfulness" and "three-dimensional effects". In Ungen-coloring, there are some differences between China and Japan in spite of being the same painting material and same drawing method. Chinese Ungen-coloring represented by Mogao Caves in Dunhuang is "three-dimensional effects". On the other hand it emphasizes "vivid colorfulness" in Japan. As a result, it is thought that Japanese Ungen-coloring is two-dimensional and then decorative. In this paper, I investigated the reason why the coloring technique, which was originally a coloring technique representing three-dimensional effects, became two-dimensional and later decorative in Japan. Until the Nara period, it was coloring with three-dimensional effects, but gradually changed into Japan's own original Ungen-coloring. There is the influence of two-dimensional painting (Buddhist picture) at that time, and the time of the change is thought to be related to the introduction of esoteric Buddhism into Japan. In the 8th century, the Ungen-coloring which had three three-dimensional effects became two-dimensional in the 10th century after the transition period of the 9th century. And in the 11th century Byodoin phoenix hall, it seems that the influence of the aestheticism of the Heian aristocracy has shifted to the Ungen-coloring that emphasizes decorativeness. It is the Byodoin phoenix hall that is showing the "vivid colorfulness" more than anywhere in Japanese Ungen-coloring. This paper presents the results of a study on changes in memory for object color. In ex1, we presented object images painted with the color near the boundary between the two categories to participants. Objects in 2 conditions have a typical color known in general, and objects in another condition have low color typicality. The result found that color memory may change in the direction towards the typical color of each object with high color typicality when two object images of the same color are presented. On the other hand, no significant differences found for objects with atypical colors. In ex2, the participants were required to classify a set of color patches into several color categories. The patches were composed of the same colors used in ex1. When the color categories classified by the patch were different from the typical colors of the objects, color memory changed more in the direction of the typical color than that of the focal color of the category. These results suggest that knowledge about typical colors of objects may affect color recognition and memory.
https://www.jstage.jst.go.jp/browse/jcsaj/42/1/_contents/-char/en
The Business, Technology, and Innovation Unit at NBC News is looking for a dynamic senior planning producer who is naturally curious and has a sharp editorial understanding of the worlds of business, tech, and innovation. As the senior planning producer, this person will be tasked with leading a team of a mix of NBC News Correspondents and tv producers to create unique and compelling video content that reach our audiences on a number of platforms ranging from Nightly News with Lester Holt to the Today Show as well as our digital properties and shows airing on MSNBC, CNBC, and NBC News Now. Our ideal candidate is an experienced TV producer/editor who is extremely organized and who is able to multitask editorially and with scheduling and workflows under intense daily deadline pressure in a fast-paced news environment. Job Duties: • Supervise and oversee editorial and production workflow for all video content for the unit • Develop and pitch ideas for both television, X-Platform, and digital platforms that make air/publish and oversee their execution • Edit and write scripts for broadcast (and occasionally digital) checking for both content and accuracy in line with NBC News editorial standards • Coach, mentor and develop both tv correspondents and tv producers who are based in various locations • Monitor news to identify TV newsworthy ideas and pitch them out and assign quickly for broadcast • Establish and nurture strong relationships with tv broadcasts/programs across networks • Help maintain editorial calendar along with Senior Business Innovation Editor and Senior Tech Investigations Editor • Contribute to editorial guidance on all breaking, daily, and future news related to business, tech, and innovation for NBC News, MSNBC, and NBC News Now • Attend meetings with Executive Editor as needed for the pitching, development, and execution of larger longer term tv projects and tv special series • Actively foster a diverse and inclusive work environment within the unit and mirror that work editorially by amplifying underrepresented communities, voices and experiences for our audience • Fill in for other senior roles in the unit as needed Qualifications /Requirements • Must have at least 8 years' editorial/broadcast experience on a national level • Must have excellent journalism, writing and research skills with demonstrated strong editorial judgment • Must have demonstrated experience in producing stories for TV, including impeccable storytelling and production skills • Demonstrate strong knowledge and interest in news and current events • Must be willing to work in New York, NY • Interested candidate must submit a resume/CV through www.nbcunicareers.com to be considered • Must be willing and able to work flexible hours, under tight deadline pressure, including breaking news • Must be willing to travel, as needed - Must submit an attestation disclosing your COVID-19 vaccination status and, if partially or fully vaccinated, submitting your vaccination record no later than 7 days following commencement of employment. - Must be fully vaccinated against COVID-19 at the commencement of employment or adhere to enhanced protocols if Company determines your job position requires accessing an NBCUniversal worksite. - Must be willing to adhere to all Company COVID-19 workplace safety policies and protocols.
https://www.entertainmentcareers.net/nbc-news/senior-planning-producer/job/408426/
LONDON: Ogilvy PR has recruited Robin Lacey as director of its content practice. He has joined the agency from game-development production company PLA Studios, where he held the same role. Lacey will oversee the firm's UK content team as it develops new material across mobile, gaming, and social media platforms for clients such as Confused.com. He is reporting to Michael Darragh, Ogilvy's managing partner and director of digital and content. The role was created as part of the agency's growth plans for content creation as it looks to meet increasing client demand for integrated brand communications across earned and owned media. Darragh said that Ogilvy's content team had tripled in size in the past year. It includes strategists, creative directors, and in-house content producers specializing in traditional, social, and mobile media. In February, Ogilvy hired Freud Communications creative directors Alex Wood and Mat Rawlins to work within the content team. This story originally appeared on the website of PRWeek UK.
https://www.prweek.com/article/1275288/ogilvy-enlists-lacey-lead-content-practice
Manager, Distribution OperationsApply NowApply Later Job ID 845803BR Location Burbank, California, United States Business Disney Media & Entertainment Distribution Date posted Oct. 01, 2021 Job Summary: The Manager, Distribution Operations leads a team of Title Managers that coordinate the creation of archival, servicing, and localization assets used to service clients across all media types. The Manager, is also the direct contact with Disney Production entities. Working to align business needs and resolve title delivery issues. Responsibilities: - Responsible for ensuring vendors are meeting Disney metrics and course correcting when issues are identified. - Reviewing and approving invoicing. - The role will oversee the delivery process of episodic, feature, bonus, shorts, trailers, artwork, and metadata to various digital platforms globally. - Some of the key day-to-day tasks will include managing & developing team (P-level employees), leading important launches/projects, and identifying and resolving technical/operational/organizational problems. - The role should be capable of proposing an innovative solution to problems to senior executive team. - The role will lead the team to perform extensive research across all inventories, systems, and tools LTS uses for servicing operations. - The role will lead the team that oversees content delivery to Tier 0 clients (global platforms), Tier 1 clients (domestic platforms), and Tier 2 clients (local/territory platforms). - To be able to adapt departmental plans and priorities to address resource and operational challenges. - To be able to provide technical guidance to employees, colleagues, and customers. - The role should have extensive experience partnering with stakeholders at all levels in an organization while prioritizing varying expectations. - The role will collaborate with Technology teams to define tool requirements/enhancements to help scale our workflows. - To be able to identify and manage risks, perform root cause analysis, recommend remediation plans, and oversee execution/implementation. - To be able to manage suppliers’ performance by controlling key metrics that have direct impact on the success of LTS Servicing org. - The role will guide the team to perform complex level localization for foreign language dub audio and subtitles. Basic Qualifications: - Minimum of 7 years of progressively complex related experience in the digital distribution space - Minimum of 3 years of managing a team of Professional level employees. Required EducationHigh School Diploma About Disney Media & Entertainment Distribution: Comprised of the Company’s international business units and various direct-to-consumer streaming services, Disney Media & Entertainment Distribution (DMED) aligns technology, media distribution and advertising sales into a single business segment to create and deliver personalized entertainment experiences to consumers around the world. About The Walt Disney Company: The Walt Disney Company, together with its subsidiaries and affiliates, is a leading diversified international family entertainment and media enterprise with the following business segments: media networks, parks and resorts, studio entertainment, consumer products and interactive media. From humble beginnings as a cartoon studio in the 1920s to its preeminent name in the entertainment industry today, Disney proudly continues its legacy of creating world-class stories and experiences for every member of the family. Disney’s stories, characters and experiences reach consumers and guests from every corner of the globe. With operations in more than 40 countries, our employees and cast members work together to create entertainment experiences that are both universally and locally cherished. This position is with Disney Streaming Technology LLC, which is part of a business segment we call Disney Media & Entertainment Distribution. Disney Streaming Technology LLC is an equal opportunity employer. Applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability or protected veteran status. Disney fosters a business culture where ideas and decisions from all people help us grow, innovate, create the best stories and be relevant in a rapidly changing world.
https://jobs.disneycareers.com/job/burbank/manager-distribution-operations/391/19720046
NBC News Digital is looking for an experienced Art Director to join its centralized, digital post-production unit. The ideal candidate is an experienced digital production artist and natural leader. They should have proven design expertise and be comfortable working in a multi-platform digital production environment. They will manage a team of artists and animators in the daily production of a variety of digital content to support NBC News Digital's video productions efforts. They should be passionate about news and storytelling and should be ready for a face-paced environment. Job Duties • Provide technical direction, creative direction, feedback and guidance to editors as needed • Help delegate resources and oversee creative production of a variety of digital content, including style frames, motion graphics, brand and marketing materials, presentations, storyboards, templates and advertisements • Work in close collaboration with senior leadership in all areas of production, from concept through execution and delivery • Establish and maintain relationships with internal clients in support of their production efforts • Able and willing to lead creative and technical efforts by example • Work on multiple projects, simultaneously, with tight deadlines Qualifications/Requirements - At least 8+ years professional experience as a designer, animator and/or director - Prior professional experience in a directorial and/or management position - Must have a portfolio with extraordinary digital content that showcases an expertise in modern design fundamentals, art direction and storytelling across a variety of platforms and applications - In-depth understanding of digital and editorial content production process - Experience with analytics and data-driven decision making - Social media savvy and a passion for emerging technologies - Proven news judgment and high ethical standards - Expertise in Photoshop, Illustrator and After Effects Additional Job Requirements:
https://www.showbizjobs.com/jobs/nbc-news-art-director-digital-in-new-york/jid-rjzqme
Part2 pictures creates award-winning, high-end, talent driven programming across a range of formats and platforms - from documentary to reality to lifestyle, from broadcast to digital and beyond. Job Description Interns will work directly with producers and associate producers on various aspects of production. They will also be able to observe the production and editing process first hand at a company that produces a wide variety of content for major media outlets.
https://careerservices.nyujournalism.org/job/2015-07-22/fall-production-intern/
Nick Breen - Reed Smith LLP We’re excited to have esteemed entertainment lawyer Nick Breen on our ‘The Future of the Music Industries’ panel. Nick is a senior associate in the Entertainment and Media Industry Group at law firm Reed Smith, and focuses on digital media, music, advertising and content distribution. Nick has broad experience in advising clients on the production, licensing and digital distribution of content on various digital platforms and networks. In particular, Nick works extensively with digital service providers across Europe and regularly advises clients on managing their relationships with rightsholders, talent and consumers. Nick also represents artists, labels, managers and promoters on a variety of matters.
https://www.resonatescot.co.uk/news/2018/10/1/nick-breen-reed-smith-llp
Sony Pictures Television announces key personnel movements Los Angeles – Sony Pictures Television (SPT) has announced three senior executive moves within its distribution business across Asia-Pacific: Angel Orengo has been promoted to executive vice president, distribution, Asia-Pacific, with oversight of SPT’s sales efforts across the entire region; James Farrell has been promoted to senior vice president, distribution, Japan; and Mark Young has been upped to senior vice president, distribution, Australia and New Zealand. In his new role, Orengo will oversee the distribution of SPT’s vast catalog of programming and formats to free TV broadcasters, basic cable channels, pay-TV platforms and new media clients across Asia-Pacific. He will continue to lead in-country sales teams in Hong Kong, Sydney, Mumbai, Beijing, Seoul and Tokyo. Farrell, for his part, has relocated from Toronto to Tokyo for his new role. He will be responsible for leading all sales functions across multiple distribution platforms including free, pay, digital, online and mobile, in addition to managing format sales in Japan. Young, on the other hand, will manage all sales of SPT content and SPT-owned formats to networks and other partners for the Australia and New Zealand markets.
https://tva.onscreenasia.com/2012/10/sony-pictures-television-announces-key-personnel-movements/
Digital Content Producer The Methodist Church in Singapore (MCS) is a connectional church comprising the General Conference, three Annual Conferences, local churches, and various agencies and organisations. The General Conference (GC) is the highest body of the MCS, responsible for legislation, policy, and the overseeing of its various agencies, including the programme agencies responsible for education, missions, and welfare services. We have a vacancy for Digital Content Producer. Responsibilities and Duties - Plan and create digital content for key communications platforms targeting at different audiences. - Manage transition for current Methodist Message to a fully digital magazine. - Responsible for video and podcast creation and production for MCS communication channels. - Assist in online publicity support for major MCS events in copy writing and design. - Research Search Engine Optimization (SEO) work in trending key words, analyse success of content, work with Social Media Executive to optimize campaigns. - Introduce new and relevant digital media communication platforms. - Work with different members in the team on social media, digital media, content management for both print and media platform. Job Requirements - Minimum Diploma or Degree in Marketing/Digital Marketing from an established institution or university with at least 5 years of relevant working experience. - Good knowledge of digital marketing practice and well-versed in SEO (search engine optimisation) best practices - Able to work across different communications platforms in magazine, social media, website. - Experience in managing and developing online publications. - Proficient in digital content tools, including podcasts and video production and editing. - Must be meticulous, analytical and have an eye for details. - Able to mutli-task, work independently and prioritize to meet deadlines to manage multiple projects and campaigns. - Possess strong analytical and research skills. - Able to work independently and a strong team player whilst working in team. - Strong spoken and written communication skills. Able to communicate effectively across many levels of committees headed by clergy and laity. - Proficient in MS Office Application (Word, Excel, Powerpoint). To apply for the above position, please email us a copy of your resume to hr@methodist.org.sg. Please indicate the following information in your resume: - Current & expected salary - Reason(s) for leaving - Availability to commence work We regret that only short listed candidates will be notified. All applications will be treated with the strictest confidence. By submitting any application or resume to us, you will be deemed to have agreed and consented to us collecting, using, retaining and disclosing your personal information for the processing of your job application.
https://methodist.org.sg/index.php/career-opportunities/695-digital-content-producer
In the Federation Council commented on the criticism of Russia in the nuclear doctrine of the United States MOSCOW, 14 Jan — RIA Novosti. The US is trying “to throw the blame on others,” criticizing Russia in its nuclear doctrine, told RIA Novosti the head of the defense Committee of the Federation Council Viktor Bondarev. In American nuclear doctrine, unclassified portion of which Friday published the newspaper the Huffington Post, claims that Russia denies or avoids the performance of its obligations under the several agreements, and also deviates from the proposals of States on a new round of nuclear disarmament. “Recently in American national security strategy, Russia and China were identified as the main threat to the United States… We are well aware that “threat” in the American interpretation is not what violates the interests of security, integrity, freedom and prosperity of their country, and that undermines the US claim to global hegemony, said the Senator. According to him, now the US nuclear doctrine — “trying to throw the blame on others, attributing to us what you accuse them”. “The strategic nuclear forces of Russia considers as a reliable system of deterrence of large-scale aggression of the enemy, and not an offensive weapon. And let me remind you that only in the history of the country, to use nuclear weapons against civilians was not Russia and its predecessor USSR — said Bondarev. According to the Senator, from the lips of American politicians periodically heard the words of the so-called “preventive nuclear strike” “against one or the other state.” “Our military doctrine is purely defensive in nature. However, as repeatedly emphasized by the Supreme commander of the armed forces, the President of Russia Vladimir Putin, their safety we will defend consistently and harshly,” he added.
https://rusreality.com/2018/01/14/in-the-federation-council-commented-on-the-criticism-of-russia-in-the-nuclear-doctrine-of-the-united-states/
Anyway, here’s a great piece from the latest International Security, Vipin Narang’s, “Posturing for Peace? Pakistan’s Nuclear Postures and South Asian Stability.” From the introduction: On November 26, 2008, terrorists from Lashkar-e-Taiba–a group historically supported by the Pakistani state–launched a daring sea assault from Karachi, Pakistan, and laid siege to India’s economic hub, Mumbai, crippling the city for three days and taking at least 163 lives. The world sat on edge as yet another crisis between South Asia’s two nuclear-armed states erupted with the looming risk of armed conflict. But India’s response was restrained; it did not mobilize its military forces to retaliate against either Pakistan or Lashkar camps operating there. A former Indian chief of Army Staff, Gen. Shankar Roychowdhury, bluntly stated that Pakistan’s threat of nuclear use deterred India from seriously considering conventional military strikes. Yet, India’s nuclear weapons capability failed to deter subconventional attacks in Mumbai and Delhi, as well as Pakistan’s conventional aggression in the 1999 Kargil War. Why are these two neighbors able to achieve such different levels of deterrence with their nuclear weapons capabilities? Do differences in how these states operationalize their nuclear capabilities–their nuclear postures–have differential effects on dispute dynamics? …. Trending: The 15 Best Conservative News Sites On The Internet To many scholars and practitioners, the world’s grimmest security concerns converge in Pakistan. Pakistan has supported the Taliban, against which the Pakistan Army is fighting a de facto civil war; it supports cross-border terrorism in India, provoking periodic crises in South Asia; and, of course, it has a growing nuclear arsenal. In addition to the risk of inadvertent nuclear use by the Pakistan Army, the arsenal could be vulnerable to malicious elements within the state, whose acquisition of nuclear material or weapons could be catastrophic for regional and international security. Pakistan’s designation as one of the United States’ “major non-NATO” allies cannot obscure concerns in Washington that Pakistan may be the world’s worst security nightmare. Given this nexus of instability, a sober analysis of the pressures and compulsions of the Pakistani nuclear weapons program is of critical importance to South Asian and international security. It’s available in PDF, and while long, it’s worth a look. Narang lays out the evolution of Pakistan’s strategic doctrine, which deviates dramatically from the expected predictions of traditional deterrence theory. Especially fascinating is the concept of “catalytic” deterrence, a posture Pakistan adopted to “catalyze” U.S. intervention during a South Asian crisis. The regime in Islamabad would move toward nuclear use amid military confrontations to “signal” to the United States a potentially catastrophic security breakdown. Nuclear mobilization wasn’t designed to deter India, but to bring about U.S. intervention: “Pakistan exploited U.S. interests in the region’s stability to impel the United States to intervene on its behalf when its interference in India triggered periodic crises.” There’s a summary table on page 45 of the essay. Noteworthy is the theory of why Pakistan’s proxy fighting groups (peripheral terrorist organizations like Lashkar) are able to wreak devastating carnage on the Indian state without provoking retaliation against Islamabad. Focusing on “asymmetric escalation,” Narang argues that Pakistan relies on a policy of nuclear first use, so that India, while sustaining devastating losses in sub-conventional warfare, hesitates to respond militarily for fear of catatrophic nuclear escalation: India’s frustration with Pakistan-backed aggression reached deafening heights after roughly a dozen Lashkar-e-Taiba militants executed a precision commando attack on Mumbai on November 26, 2008.98 From the outset, India’s Congress government, and even General Malik (ret.), conceded that its military options to retaliate against Pakistan were again limited, because any meaningful strikes risked uncontrollable escalation, possibly quickly up to the nuclear level.99 India was therefore once more largely restrained by Pakistan’s low nuclear threshold from executing retaliatory airstrikes against suspected Lashkar camps in Pakistan. Former Army Chief of Staff Roychowdhury conceded that “Pakistan’s nuclear weapons deterred India from attacking that country after the Mumbai strikes . . . [and] it was due to Pakistan’s possession of nuclear weapons that India stopped short of a military retaliation following the attack on Parliament in 2001.” A great piece of research. More at the link. Cross-posted from American Power.
https://rightwingnews.com/uncategorized/pakistans-nuclear-posture/
May 10th marked my 20th year serving in the US Air Force’s nuclear community. Two decades into the job as a missileer, I have a reasonable understanding of strategic nuclear deterrence. Acknowledging nuclear weapons remain a clear existential threat to America is the first step in understanding the relevance of nuclear deterrence. Bottom line up front: nuclear weapons can kill tens of millions of Americans in a matter of minutes. Nonetheless, a serious and ongoing debate continues about the relevance of nuclear weapons in the 21st Century. Here are answers to some of the most frequent questions and statements on the subject. “America has a highly technically advanced space, cyber and exceedingly accurate conventional weapons capability; wouldn’t such a capability deter a massive nuclear attack?” Non-nuclear weapons cannot achieve the existential impact of a nuclear attack, and as a result cannot deter conflict to the same degree. Conventional capabilities cannot dissuade a massive attack from an adversary. Even a “small” nuclear attack could severely degrade U.S. conventional capabilities. The imbalance in destructive capacity between nuclear and non-nuclear equipped nations places the non-nuclear equipped nation at a severe strategic disadvantage and subjects it to nuclear blackmail. “But America’s conventional capability is far superior and growing exponentially compared to Russia…right?” Few outside of Russia would even attempt to argue that point. It is this very reason that nuclear deterrence is playing an ever-increasing role within totalitarian countries. These countries understand the disparity between conventional and nuclear weapons effects. The threat of conventional weapons use will never deter another nation to the extent that a potential adversary would second-guess their intent to attack, as a nuclear weapon can. “The threat of a massive American conventional weapon attack, in conjunction with international alliances, can deter a nuclear attack.” To deter a nuclear attack requires the knowledge that conventional weapons, though exceedingly accurate and powerful, lack the ability to pose an existential threat to deter nuclear weapons states. Miniaturization of thermonuclear weapons further complicates this calculus by allowing one bomber or missile to carry numerous nuclear weapons. These weapons are exponentially more powerful than those used on Japan in 1945. However, in order to deter a nuclear attack, a potential adversary must believe a nuclear arsenal is credible and that there is a willingness to respond in kind. “Why are nations interested in acquiring nuclear weapons?” The bombing of Hiroshima and Nagasaki marked the fall of imperial Japan and established physiological effects associated with a nuclear explosion. Through fear of reprisal, nuclear weapons have the ability to deter a nuclear attack but can also deter a conventional attack that threatens national sovereignty. This is most notable through North Korea’s contested treatment of their population and nuclear weapon acquisition despite international pressures. Moreover, nuclear weapons have enabled nations to threaten the sovereignty of other nations, such as Ukraine, under the auspices of a nuclear response should other nations attempt to get involved. Furthermore, once they establish a better foothold through their land reclamation activities in the South China Sea, China might also use such a deterrent tactic to allow for a more aggressive acquisition of land. “Why does America still need three different weapon systems to deter an attack?” America maintains multiple weapon systems in the form of a nuclear triad: submarine-launched ballistic missiles (SLBMs), intercontinental ballistic missiles (ICBMs), and intercontinental nuclear capable bomber aircraft. Together, these systems provide separate and distinct attributes that require completely separate capabilities to render any one of them ineffective. Combined, the minuscule probability of eliminating the capability of each of these elements of the triad are what form the high probability of deterring an adversary attack and at the same time allows for a flexible response should the need arise. “If the United States is on the path to eliminating nuclear weapons, why would it continue to reinvest in them?” The path to eliminating or significantly reducing nuclear weapons will only occur with time and a willingness from all nuclear weapon states to meet this goal. In the interim, nuclear states have a responsibility to ensure their respective nuclear weapons stockpiles remain safe, secure, and credible. Doing so assures continued stability among nuclear equipped nations. As President Obama stated during his April 5, 2009 remarks in Prague, “Make no mistake: as long as these weapons exist, the United States will maintain a safe, secure, and effective arsenal to deter any adversary, and guarantee that defense to our allies.” By ensuring nuclear weapon safety, security, and effectiveness, America will continue to deter against nation-state use of nuclear weapons contributing to global stability. The views expressed in this article are those of the author and do not necessarily reflect the official policy or position of the Air Force, the Department of Defense, or the U.S. Government.
https://leadingedgeairpower.com/2015/06/25/stephen-l-bonin/
What to Expect When You’re Expecting a Defense Budget Masterpiece In December of 2017, before the Department of Defense released its 2019 budget request, then-Deputy Secretary of Defense Patrick Shanahan tried to manage expectations about its contents. He argued that the National Defense Strategy, with its prioritization of competition with China and Russia, was so new that the Pentagon didn’t have time to fully incorporate its precepts into the 2019 budget submission. But, he told us, the 2020 budget request would be a “masterpiece,” fully funding the strategy’s direction to invest in the capabilities required to sustain the U.S. military’s advantage over China and Russia while finding more economical ways of prosecuting ongoing counter-terrorism campaigns. During our time in the Pentagon, we were deeply involved with defense budgets and strategies. Now here we are, over a year later, patiently waiting for a budget request that perfectly aligns resources with the defense strategy and wondering: What would the 2020 defense budget request look like if now-Acting Secretary Shanahan succeeds in delivering on his promised masterpiece? But first, a word on the problems the National Defense Strategy is trying to solve: U.S. defense strategy for the 70 years since the end of World War II has rested on two interdependent pillars: a constellation of allies and partners and an ability to conduct military operations globally. Allies and partners extend U.S. influence and provide bases and forces to support U.S. military operations. In return, the U.S. military’s ability to project power deters or defeats armed aggression against our allies and partners. Together, these pillars have prevented the outbreak of major wars and made the United States secure and immensely powerful. Today, both pillars are endangered by a combination of neglect, underinvestment, and concerted Chinese and Russian efforts to undermine them. While relations with our allies and partners are a critical national security issue, the central problem for the U.S. military is the erosion of America’s conventional military advantage against China in East Asia and versus Russia in Eastern Europe. Why does this matter? The ability to deter aggression in these regions rests on China and Russia believing that the United States will intervene and that U.S., allied, and partner forces can defeat their aggression or make the costs outweigh the benefits. Nuclear threats aren’t a believable response to a limited invasion, while attacks on Chinese and Russian assets overseas aren’t likely to be painful enough to deter them from attacking their neighbors. Conventional military advantages in East Asia and Eastern Europe are the “goldilocks” solution to maintaining credible deterrence — proportional enough to convince China and Russia that the United States will intervene, but powerful enough to threaten them with the prospect of defeat. Chinese and Russian military investments are targeting the way U.S. forces have defended our allies and partners since the end of the Cold War. Foremost among these investments are anti-access/area-denial (A2/AD) systems, such as advanced air defenses and anti-ship missiles. These weapons aren’t designed to defeat the U.S. military but rather to hold it at bay long enough that China or Russia can achieve their objectives — such as assaulting Taiwan or the Baltic states — before U.S. forces can respond effectively. The resulting fait accompli would present U.S. policymakers with an unappetizing dilemma: risk escalation through a massive counter-attack against a nuclear-armed state or accept an armed attack on a U.S. ally or partner and the consequent devaluation of U.S. security guarantees. To thwart this approach, the new strategy requires the Pentagon to develop concepts and weapons systems that can operate in the face of Chinese and Russian A2/AD systems. The National Defense Strategy fully recognizes that reestablishing conventional military advantage is necessary, but not sufficient, to prevailing in great-power military competition. China and Russia will attempt to counter or avoid it through threats of strategic escalation — which traditionally has meant nuclear weapons but increasingly may mean cyber or other forms of strategic attack — and by destabilizing activity below conventional attacks on U.S. interests. In short, the post-Cold War era of unchecked American military superiority is over. The United States will need to up its strategic game if it wishes to sustain its security and prosperity for the next 70 years. Strategic competition with China and Russia will require major shifts in defense budget priorities compared to the post-Cold War era. To this end, Shanahan’s focus on “China, China, China” is a useful correction to decades focused on terrorist threats and rogue regimes. For this budget to be masterpiece, it should shift investments toward prevailing in long-term great-power competitions and also balance this shift with the need to address current threats sustainably (i.e., at lower cost with fewer forces), recognizing that the former can’t happen without the latter. First, and perhaps most important, is figuring out the balance among buying advanced equipment, building a bigger force, and keeping that force trained and maintained for war — in Department of Defense terms, the trinity of capability, capacity, and readiness. Increasing the number of soldiers in the Army or ships in the Navy is generally a political winner, since these are tangible assets that drive employment in congressional districts. As a result, the tendency is to overinvest in the size of the force at the expense of training, maintaining, and fully equipping it. The 2020 budget request should prioritize investment in advanced military capabilities over increasing the size of the force. Any growth in force size should either be focused on defeating Chinese and Russian strategies or should enable a more cost-effective approach to counter-terrorism and irregular warfare. The budget request should deemphasize unrealistic numeric goals (e.g., 355 ships in the Navy or 386 squadrons in the Air Force) and instead should focus on developing capabilities required to sustain the U.S. military’s warfighting edge over China and Russia. Doing so doesn’t only mean buying highly advanced aircraft, ships, submarines, or ground vehicles. It requires less glamorous investments in resilient surveillance and communications equipment, forward bases that can survive enemy attacks, and stockpiles of advanced long-range munitions. Funding for research and development should increase to develop and exploit emerging technologies like artificial intelligence. As second major change, the 2020 budget request should shift focus from the present to the future. Specifically, defense procurement should shift away from continuing to buy and maintain older legacy systems and toward investing in new programs designed for the future threat environment at both the high and low end of the conflict spectrum. While investment accounts grew by almost 14 percent between fiscal year 2018 and fiscal year 2019 budget requests, the Pentagon used much of this growth to buy a lot of “new-old” stuff — upgrading or purchasing additional units of platforms that have been in service for decades. While certain legacy purchases and upgrades might have been necessary to fill near-term gaps in 2019, the Department of Defense should focus on developing and fielding systems designed to operate cost-effectively at the low end or with the capability required to be effective against high-end competitors. For example, the Army should continue pursuing its “big-six” modernization priorities: long-range strike, ground vehicles, future vertical lift, air and missile defense, and soldier equipment. Long-range strike and cruise-missile defense should be top priorities, as these systems are in high demand in both Asia and Europe. It should resist the urge to grow the force or procure legacy systems to meet current needs. Instead, the Army should be researching and developing unmanned vehicles and manned-unmanned teaming concepts to reduce long-term manpower costs. Third, the 2020 budget request should show shifts in a couple specific functional areas, most importantly space and nuclear forces. Plans for the Department of Defense to reorganize its space forces and capabilities have been, shall we say, dynamic. Whatever the final plan ends up being, the cost of new overhead should not detract from needed investment in next-generation space capabilities. Nor should it come from the Air Force’s budget, which is already under considerable pressure, including from necessary investment in nuclear modernization. All three legs of the nuclear triad are currently beyond their intended service life; the Defense Department must now recapitalize them more-or-less simultaneously. Further, the Nuclear Posture Review has directed DoD to develop new nuclear capabilities, such as low-yield weapons. While these new weapons may not make it through the Democratically controlled House of Representatives, recapitalizing the triad will be an enormously expensive, but absolutely crucial undertaking. Depending on how Congress and the executive branch chose to fund this effort, it has the potential to crowd out investment in conventional forces. For example, the Navy’s Columbia-class ballistic missile submarine will fill a critical need as the most survivable leg of the triad, but prioritizing it will pressurize the shipbuilding budget as a whole. The Trump administration may have already missed its best chance to align resources to the new strategy, having largely failed to do so in their 2019 budget request when the Republicans held both houses of Congress. The Democrats’ takeover of the House of Representatives in the 2018 mid-terms and the recent record-setting partial government shutdown indicate greater scrutiny of defense spending and more budget impasses ahead. Further, the bouncing of the defense budget request’s topline from roughly $733 billion to $700 billion to $750 billion signals that even the administration itself is not of one mind on questions of defense spending. While Shanahan may not deliver his “masterpiece,” if he can show meaningful progress in most of these areas, while guarding against growth in force size or excessive legacy procurement, he will have made a meaningful down payment on building a military that can compete, deter, and win 21st century great-power competitions. Susanna V. Blume is a senior fellow and deputy director of the defense program at the Center for a New American Security. Previously she served as deputy chief of staff for programs and plans to Deputy Secretary of Defense Robert O. Work. Christopher Dougherty is a senior fellow in the defense program at the Center for a New American Security. He was a principal drafter of the force management and planning sections of the National Defense Strategy.
https://warontherocks.com/2019/03/what-to-expect-when-youre-expecting-a-defense-budget-masterpiece/
Based on the Obama Administration’s April Nuclear Posture Review, conventional weapons are poised to gain a more prominent role in the U.S. deterrence posture. Carnegie hosted a conference on conventional deterrence to explore conventional weapons’ increasing role in strategic deterrence and the implications for extended deterrence, arms control, and strategic stability. The Role of Conventional Forces in U.S. Deterrence Strategy and War Planning In the event’s first panel, Michael Gerson of the Center for Naval Analyses, Brad Roberts of the Department of Defense, and Victor Utgoff of the Institute for Defense Analyses addressed the potential and optimal roles for conventional weapons in U.S. deterrence policy. Carnegie’s James Acton moderated. Nuclear deterrence generally focuses on preserving peace by relying on the threat of inflicting unacceptable punishment. Conventional deterrence rests on the very different logical of denial. - Denial: Conventional deterrence relies on denying an opponent a quick, low-cost victory, Gerson noted. He outlined the logic behind a conventional denial strategy: - Adversaries seek fast, inexpensive victories. Long, costly wars ruin economies and jeopardize domestic support. - Accordingly, conventional deterrence is based on preventing an opponent from achieving core objectives rapidly and cheaply. - If an adversary seeks a quick victory and deterrence seeks to deny that, then the local balance of power is crucial. The deterring power needs to ensure its potential adversary does not believe itself to have a local military advantage. This suggests forward-deployed forces are singularly important to conventional deterrence, although the value of long-range strike forces should not be underestimated. Gerson noted that forward-deployed does not mean the troops or weapons already need to be in the theatre; they must, however, be able to be rapidly deployed. - Challenges for Denial: Roberts and Gerson stated that conventional deterrence has to overcome several challenges. Low-level attacks are particularly difficult to guard against effectively. Fait accompli attacks, which rely on the element of surprise to accomplish objectives swiftly, must be prevented. Other challenges include: - Local Anti-Access Capabilities: Such weapons, like Chinese anti-ship ballistic missiles, can deny potential opponents the ability to reliably deploy forces quickly. - Credibility: Potential opponents might be emboldened by the belief that they can undermine U.S. resolve by threatening that, should the United States interfere in their activities, they will drag the United States into a protracted, bloody war noted Roberts and Gerson. - Proliferation Risk: The development of extensive conventional capabilities by the U.S. risks leading potential adversaries to produce unconventional weapons to counter the perceived threat. In spite of this potential threat, Roberts emphasized that the United States remains committed to an extensive international presence to support its allies. - Regional Security Architectures: The administration’s strategy of focusing on security regionally and incorporating conventional forces into an overall deterrence strategy serves the broad roles of reassuring allies and ensuring they remain secure, argued Roberts. A prominent concern about an increased role for conventional weapons is doubt that such weapons could be used against the full range of targets potentially relevant for deterrence. Utgoff offered an assessment of U.S. conventional capabilities and potential abilities to strike targets of interest: - Deeply Buried Hard Targets: Precision-delivered conventional penetrators armed with high explosives could close all known entrances to a deeply buried target, but the target itself could not be destroyed. - Dispersed WMD-Armed Mobile Missiles: Precision conventional weapons should be able to disable such missiles, provided sufficiently detailed knowledge about their location was available. - Air and Missile Bases in Reinforced Concrete: Precision-guided weapons with large payloads would be able to deal with such fortified targets. - Cities: If American cities were attacked with nuclear weapons, the US might want the ability to retaliate in kind. Though conventional weapons could be effective, delivering the necessary number of munitions could pose very significant logistical challenges. Conventional Weapons, Extended Deterrence, and Assurance In a second panel, Elaine Bunn of the National Defense University, Carnegie’s Detlef Waechter, and Fumihiko Yoshida of Asahi Shimbun and Princeton University discussed how increasing reliance on conventional weapons will affect the dynamics of extended deterrence. Elbridge Colby of the Center for Naval Analyses chaired the session. - Contradictory Tensions: Allies protected by extended deterrence often fear abandonment; they doubt that America would sacrifice its national interests for the welfare of an ally, Bunn said. Simultaneously, allies fear entrapment or entanglement in U.S. foreign policy maneuvers. Relying on the U.S. security umbrella requires allies to have great confidence in American judgment, Bunn said, which creates chronic tension in alliances. - Role for Conventional Weapons: Bunn emphasized that conventional capabilities have always played a role in extended deterrence. Only recently have conventional weapons been explicitly tied to nuclear postures. The panelists agreed that an increased reliance on conventional weapons in extended deterrence allows for more creatively deterring low-level attacks, and allows allies to play a more active role in their own security. - NATO: Waechter explained that NATO is currently re-evaluating its policies, deciding whether to return to its traditional deterrence role – deterring attacks on European territory – or to adopt more of an expeditionary character. He suggested that strengthening and streamlining conventional capabilities will enable allies to undertake both roles. - Japan: As a country protected through extended deterrence, Japan is experiencing a number of tensions and discordant views surrounding assurance and disarmament, Yoshida said. Many in Japan are interested in seeing expanded security assurances from the United States and are carefully scrutinizing U.S.-China relations. Yoshida argued that increased Japanese participation in improving regional dynamics is imperative. Without strategic dialogue, he warned that an arms race could develop in the region. Presently, many in Japan see the advancing Chinese missiles as threatening Japan rather than the United States. Conventional Weapons, Arms Control, and Strategic Stability In a third panel, Stephen Pifer of the Brookings Institution, Carnegie Moscow’s Petr Topychkanov, and The Hudson Institute’s Chris Ford–who formerly served as principal deputy assistant secretary of State for arms control, nonproliferation, and disarmament verification and dismantlement under President George W. Bush–discussed international reactions to increasing U.S. interest in conventional capabilities. Jan Lodal, former principal deputy undersecretary of defense, chaired the panel. Topychkanov and Pifer addressed some of the chief Russian concerns regarding increased U.S. interest in conventional weapons for strategic deterrence: - Russian Concerns: Russia’s military leaders are increasingly concerned about the U.S. development of advanced conventional weapons, Topychkanov explained. These concerns relate to both prompt systems (like ballistic missiles) and non-prompt systems (like cruise missiles). In particular, Russian experts have expressed concerns about the development of weapons they believe could make Russian intercontinental ballistic missiles vulnerable to a conventional strike. Topychkanov emphasized the perspective among Russian theorists that capabilities endure, while relations can shift. - Future Negotiations: Enhanced conventional weapons would hinder joint NATO-U.S. negotiations with Russia on the withdrawal of tactical nuclear weapons from Europe and on ballistic missile defense cooperation, Topychkanov and Pifer agreed. - Alleviating Tension: To alleviate tensions with Russia, Topychkanov advocated a ban on basing U.S. aerial attack forces in Europe. Russia, he suggested, could adopt a similar ban, and agree not to base its forces in the territory of its CSTO and CIS allies. If U.S. SSGNs were based in the Pacific Ocean, most Russian ICBM bases would be outside of their range, reducing Russian vulnerability and concern. Ford argued that several outstanding questions must be resolved before the United States proceeds with reducing its nuclear arsenal and increasing reliance on conventional weapons. - Lower Yields: Using nuclear weapons enables the destruction of a target whose position is not precisely known. A target’s coordinates must be more accurately determined before launching a successful conventional attack. - Counterforce Targeting: Ford noted that relying on conventional weapons undermines U.S. counterforce targeting ability. Lodal disagreed, pointing out that targeting the entire Russian strategic arsenal is not a serious option, even with nuclear weapons. Ford argued that retaliatory, although not preemptive, strikes should always be possible and relying on conventional weapons would make them more difficult. A reduced focus on nuclear weapons raises a number of strategic questions about military postures, alliance relations, and technological capabilities, the panelists concluded. Addressing these questions requires a clear understanding of what deterrence ought to achieve–and a recognition of its limits.
https://carnegieendowment.org/events/?fa=eventDetail&id=3070
Are Iran’s intentions in the ongoing nuclear negotiations sincere? Popular analyses of Iran’s nuclear motivations have unduly emphasized its leaders’ Shi’a millenarianism or a supposed desire to bomb Israel (home to the third most important city in Islam and over one million Muslims). If one assumes Iran behaves rationally, its intentions become clear: Iran is ready to give up its nuclear program because it doesn’t need one. No longer needed to deter threats of invasion, the program is now just a costly liability. For all but the last three years, Iran faced the threat of a devastating conventional attack on one or multiple fronts. Tehran first perceived an existential threat from Saddam Hussein’s Iraq and later from the US invasions of its neighbors, Iraq and Afghanistan. Iran has used its alleged nuclear weapons program as a deterrent against these overwhelming threats. Saddam Hussein invaded the Islamic Republic shortly after its inception. The ensuing eight years of war resulted in chemical attacks, hundreds of thousands of Iranian casualties, and half a trillion dollars in damage. Over the next decade Hussein continued to threaten his neighbors (Kuwait) and suggested (disingenuously, as it turned out) that Iraq was seeking its own nuclear weapon. The US neutralized the Iraqi threat to Iran in 2003, but the US military represented an even more powerful adversary than Iraq. The US had already demonstrated its willingness to invade members of the “Axis of Evil” and in 2001 had established a presence in Afghanistan, Iran’s neighbor. Furthermore, the enduring US presence in the Persian Gulf strengthened to support these efforts. American military forces imposingly surrounded Iran on three sides for nearly a decade. From Tehran’s perspective, a nuclear weapons program made strategic sense. A nuclear weapon would overcome Iran’s conventional disadvantage vis-à-vis the US, deterring a possible invasion. This security calculus has changed. The past three years of US foreign policy shifts have dramatically improved Iran’s security situation, removing the need for a nuclear deterrent. The US withdrew from Iraq in 2011 and Tehran now has unrestricted influence over Baghdad’s Shiite politicians. The American drawdown in Afghanistan is imminent. President Barack Obama has demonstrated no interest in overseas invasions, and former Secretary of Defense Robert Gates has cautioned against future land wars in the Middle East. Iran is willing to give up its nuclear program because, for the first time in its history, it no longer needs to deter invasion. Its willingness to negotiate coincides with the diminishing of its immediate threats. Threats farther afield, like Israel, alone do not pose an existential challenge and therefore do not necessitate a nuclear deterrent. The nature of warfare in the Middle East now favors proxy wars and operating militias, which plays to Iran’s strengths. Giving up the nuclear weapons program and its reduced benefits in exchange for relaxation of international sanction regimes is an easy trade for Tehran. Confident in Iran’s intentions, the US should see through the negotiations.
https://saisobserver.org/2014/02/17/discussing-irans-intentions-nukes-no-longer-needed/
Donald Trump has now completed his tempestuous voyage from campaigning and transitioning to governing. And governing effectively means making tough choices and trade-offs among options, which often range from bad to worse. Nothing could be closer to the truth than when dealing with the danger posed by North Korea’s nuclear and missile programs. That is certainly clear today after Kim Jung Un’s veiled threat in his New Year’s speech to begin testing an intercontinental ballistic missile that could attack the United States followed by last week’s rampant media speculation that Pyongyang was about to do so coinciding with President Trump’s inauguration. The danger is imminent, an effective strategy is needed and the menu of options is unpalatable. More sanctions will not work. The use of U.S. military force will be ineffective and carries great risks. And engineering regime change is a fool’s errand. Trump’s only realistic option for stopping North Korea’s nuclear march is this: reinvigorated diplomacy, followed by significantly ratcheting up the pressure if it fails. Can he do it? Will he? The North Korean threat has grown worse over the past eight years because the Obama administration, forgetting Einstein’s definition of insanity, clung tenaciously to four flawed assumptions: first, that China would do America’s bidding against the North; second, that North Korea could not survive without greater economic integration with the international community; third, that time was on our side; and finally, that the United States could count on the North to always renege on its commitments. By holding itself captive to these assumptions for so long, the United States is now stuck in a policy no-man’s land, with neither crippling sanctions nor vigorous diplomacy. Worse yet, ignoring this problem is no longer an option since it only guarantees that the dangers posed to the United States and its allies by North Korea’s unconstrained development of missile and nuclear capabilities will metastasize. What are these dangers? Many experts have argued that the threat of a North Korean ICBM attack against the United States has been overblown. In this view, Kim is not suicidal—he prizes above all else the survival of the family dynasty and North Korea, and he would therefore be deterred from attacking the United States by the certain prospect of massive U.S. retaliation and regime change. These are credible arguments that can be neither proved nor disproved. All things being equal, however, the U.S. would be safer if Kim did not have the ability to launch a nuclear-tipped missile. And there are other serious dangers. These include a growing threat to U.S. allies and forces in Northeast Asia, calling into question current military plans to defend South Korea and Japan; strains on the cohesion of those alliances as both countries question the continued viability of America’s deterrent capacity; an escalating crisis in U.S.-Chinese relations if Washington immediately presses Beijing to tighten the sanctions noose and deploys additional military capabilities on the peninsula; the increased risk of a crisis if both Korea and Japan improve their own capabilities for preemptive strikes and the North responds by putting its forces on a higher state of alert; mounting danger that local provocations will trigger a wider conflict because the North, with a growing nuclear arsenal, would feel more emboldened to act provocatively; the proliferation of North Korean nuclear weapons technology, because Pyongyang, with a larger stockpile, would feel more confident that it could deter the United States and the international community from responding; the possibility that Japan and South Korea will build their own nuclear weapons to deter North Korean aggression; and increasing dangers of a larger pile of “loose nukes” if North Korea becomes unstable. The new administration essentially has four options to reduce these threats. The first is to immediately seek an Iran-style campaign to impose draconian sanctions on North Korea to force it back to the negotiating table. President Trump seems to think that trash-talking China—the key player in such a campaign because of its economic ties to Pyongyang—for not lifting a finger to help with North Korea will do the trick. But this approach is doomed to failure: China will not cooperate since it views stability in the North as a paramount national interest and is suspicious that Washington’s real agenda is regime change. Moreover, it will only create more opportunities for the North to further advance its WMD programs by taking advantage of the growing rift between Washington and Beijing. The second option, military strikes to remove the North Korean ICBM threat before it menaces the United States, has low odds of success; it would also be opposed by Korea and Japan and draw China into what could be a second Korean War. The third option, seeking regime change in the North to end the threat, would at best be a long-term approach since it will prove impossible to quickly topple the authoritarian regime in Pyongyang that has been in power for six decades. And at worst, the U.S. and others would spend years hoping its strategy would work while the immediate threat grows. A fourth option, serious coercive diplomacy, stands the best chance of success. It would lead with diplomatic engagement with the North backed by the threat of robust military and economic actions to protect the United States and its allies from an expanding North Korean nuclear program. By necessity, because the North’s nuclear program is far along, the objective of coercive diplomacy would be the gradual denuclearization of North Korea in phases within a broader framework of concluding a comprehensive peace agreement that would, in the eyes of Pyongyang, end the U.S. “hostile policy” toward the North. Such a step-by-step process would be designed to secure the immediate U.S. objectives of capping and reversing the North’s nuclear and missile programs. As long as all parties understand that denuclearization is a process that won’t happen immediately, such an initiative would not mean that the U.S. is accepting North Korea as a nuclear state. Can President Trump, who has talked endlessly about his deal-making prowess, succeed where others before him have largely failed? His administration has a shot at the brass ring if it is willing to try its hand at serious negotiations. Past U.S. strategy toward North Korea has emphasized either diplomacy or confrontation but has never integrated the two tracks with significant incentives to secure U.S. objectives and significant disincentives to punish Pyongyang if it rejects a serious and credible offer of negotiations. President Trump might also be best positioned to deal with domestic opponents—Republicans who will argue that seeking any deal is a waste of time. And he could bring along South Korea, our key ally, whose government may well shift soon from its current emphasis on sanctions to an approach more open to diplomacy with the likely impeachment and replacement of President Park Geun-hye. A first step in this process would be for President Trump to reach out directly to the North Korean leadership, sending a private message that his administration is willing to explore peaceful paths forward. The purpose would be to start preliminary talks without preconditions to explore whether diplomacy has a chance. The North could well be open to such an initiative; despite dire predictions from pundits, Pyongyang has kept its powder dry since its September nuclear test, watching and waiting to see what approach the new U.S. administration will take. But time is also short, with new U.S.-South Korean Joint military exercises scheduled to start in February that could trigger a very strong North Korean response, particularly if those exercises are publicly portrayed, as they have been in the past, as practicing the decapitation of the North Korean leadership or include over-flights of American bombers capable of carrying nuclear weapons. If this initial effort at diplomacy fails, the Trump administration would be on a much firmer foundation—having proved the North’s diplomacy was a ruse and faced with a growing ICBM threat—to contain the threat by significantly raising the pressure. It should move forward with: 1) expanding the national missile defense system as well as regional missile defense systems in Japan and South Korea; 2) continuing to bolster offensive strike capabilities in the region to enhance deterrence of the North; 3) reevaluating the overall U.S. military force posture in Northeast Asia since the growth of North Korea’s nuclear arsenal will have a direct impact on military strategy to protect our allies; 4) making rotational deployments of aircraft capable of carrying conventional and nuclear weapons as well as U.S. nuclear submarines to South Korea; and 5) seeking stronger expanded multilateral sanctions at the United Nations, while also enacting them unilaterally, that would have greater economic bite on the North. A new policy that tries negotiations first, and then puts intense pressure on the North if its intransigence scuttles diplomacy, is no guarantee of success, but the risks of trying this approach and failing are far outweighed by the costs and consequences of applying more sanctions, military force or seeking regime change. To paraphrase what Winston Churchill said about democratic forms of government, negotiating with the North is the worst option except for all others.
https://carnegieendowment.org/publications/67777
Earlier this month Assistant Professor in the School of Communication Sciences and Disorders Michelle Therrien was invited to a workshop at Google in San Francisco. The workshop brought experts in speech, language, and neurology together with Google researches, engineers, and product managers to discuss recent advances in machine learning for people with disabilities. Therrien’s background with computational linguistics and her current research regarding improving the quality of life of individuals with disabilities made her a perfect fit. During the conference, Google shared information about the accessibility features they have been working on. Researchers in multiple fields also presented on topics relating to machine learning and accessibility. Many of the presentations focused on using technology to increase the quality of life for adults with disabilities. “I felt that my role was to listen to the presentations and then consider the potential impact of similar technologies on children with disabilities,” says Therrien. In small group and one-on-one interactions, Therrien was able to share the experiences of children with disabilities with software engineers from Google and other researchers.
https://news.cci.fsu.edu/cci-news/cci-faculty/michelle-therrien-attends-google-conference/
Disability can be defined as "any condition that challenges the development or functioning of an individual, such as sensory, physical, or mental impairments..." Assistive technology can help people with disabilities meet these challenges and become more independent, productive, integrated and included in their communities. An "assistive technology device" is any item, piece of equipment, or product system...that is used to increase, maintain, or improve functional capabilities of individuals with disabilities. An "assistive technology service" is any service that directly assists an individual with a disability in the selection, acquisition, or use of an "assistive technology device." [PL.100-407]. Technology Related Assistance for People with Disabilities Act. Assistive technology can help some people communicate, move around, meet their own needs, control their environment, work, and live more independently. In these ways, technology can allow us to focus on someone's abilities, rather than being preoccupied with what someone cannot do. Technology can make inclusion and participation much more possible. The quality of life for many people with severe disabilities depends on our creativity in developing, applying and funding adaptive devices. According to one policy analysis report, modern technology has been a major force in improving the quality of life for people with disabilities. The report also notes that "in spite of numerous innovative programs, resources, and expertise available in the area,"9 many people with disabilities still do not have access to the types of technology that could improve their quality of life. 9Policy Analysis Series, Issues Related to Welsch v. Levine/No.22 Improving the Quality of Life for People with Disabilities: Potential Uses of Technology, April 1984. Concepts There are many ways we can improve the environment for people with disabilities: Some technology is really sophisticated and complicated. For instance, computer technology allows people who cannot speak or move their hands, to write and deliver speeches to legislative committees. Some technology is very simple and quite liberating. For instance, an emergency buzzer hooked up to a neighbor's place means a person can live on his own rather than have overnight staff. Technology – new new or old, simple or complicated – can enable people with disabilities to: We have never had greater opportunities for developing and applying technology. There is much more support for the idea of helping people to be more and more independent. A number of pieces of important legislation are in place – the Rehabilitation Act Amendments of 1986 and 1992, the Technology-Related Assistance for Individuals with Disabilities Act of 1998 (P.L. 105-394), and the Fair Housing Act Amendments of 1988 and 1995. To take advantage of these opportunities, we must take action to: The cost of this kind of action will be small in comparison to the resulting savings in productivity, economic growth, human dignity and well-being. 10Adapted from Abilities and Technology (1986). MN Governor's Council on Developmental Disabilities. Possible Actions to Improve Accessibility and Use of Technology: Examples of Assistive Technologies: On the horizon:
https://ddc.wv.gov/Training/PartnersinPolicymaking/PIPCurriculum/Pages/Technology.aspx
Promising Practices: Accessible Information Technology In Education Welcome to this special topic issue of Information Technology and Disabilities. It features promising practices in promoting, developing, procuring and using accessible information technology in educational settings. Each article shares a specific practice, as well as evidence of its effectiveness. The result is a collection of documented experiences that can provide guidance to practitioners, both those who work with individuals with disabilities and those who work with technology in the mainstream. This collection of articles represents a diverse set of practices. Included are applications that: - are at K-12 and postsecondary levels; - have impacts school-wide, statewide, nation-wide, and worldwide; - are centered in a variety of locations; - are directed by individuals in a variety of positions within a wide range of organizational units; - deal with both on-site and web-based instruction; and - cover a variety of policy, procurement, procedural, training, support, and technical issues. Three articles describe projects in K-12 settings: - In Universal Design for Learning: A Statewide Improvement Model for Academic Success, Michael Abell and Preston Lewis report on statewide efforts to introduce universal design for learning principles to K-12 educators. - In Systems Change Regarding Accessible Information Technology in the K-12 Educational Environments, Karen Peterson shares top-down and bottom-up strategies used in improve the accessibility of information technology in schools. - In the Kentucky Accessible Information Technology in Schools Project, Steve Noble shares the activities and results of efforts to help educational entities comply with a statewide accessible information technology act. Three articles describe initiatives in higher education: - In Making the Community College Classroom Accessible to Students with Disabilities, Judy Stoneham tells about systemic change efforts to improve the accessibility of information technology at two community college campuses. - In Steps Toward Making Distance Learning Accessible to Students and Instructors with Disabilities, Sheryl Burgstahler, Bill Corrigan, and Joan McCarter share experiences in implementing program policies and practices that assure the accessibility of distance learning courses. - In Closing the Circuit: Accessibility from the Ground Up, Curtis Edmonds, Marsha Allen, Robert Todd, and Shelley Kaplan document the process of creating an online learning object that can be utilized by all students. Thanks to these authors for their efforts in improving the accessibility of technology to individuals with disabilities and for their willingness to share their experiences with ITD readers. Sheryl Burgstahler, Ph. D.
http://itd.athenpro.org/volume11/number1/intro.html
Home » Browse » Magazines » Educational Technology Magazines » Distance Learning » Article details, "Improving Distance Education for Disabled..." According to the American Community Survey, 19.5 million or 9.9% of Americans aged 16-64 have disabilities (United States Census Bureau, 2013). The American Community Survey divides disabilities into six basic types: visual, hearing, cognitive, ambulatory, self-care, and independent living (United States Census Bureau, 2008). Although legislation has transformed the lives of many individuals with intellectual and developmental disabilities, there are still obstacles to individuals living life to its fullest. Higher education students with disabilities can not only identify with the barriers in their physical environment, but also the barriers in teaching and learning. Postsecondary schools are required to provide academic adjustments so that students are not discriminated against due to their disability. Twenty-six percent of students with mobility disabilities accessed distance education courses more frequently than their nondisabled peers (Radford, 2011). For disabled students, online distance education programs that are committed to understanding students with disabilities will have course designers who are knowledgeable about accessibility and universal design for learning. It is important that all faculty and staff in the field of higher education have appropriate training on how to design distance education courses to be accessible and meet the needs of the disabled students who are enrolled. The Georgia Tech Center for Assistive Technology and Environmental Access (CATEA), through the College of Architecture, is a multidisciplinary research center that concentrates on improving the lives of individuals with disabilities through developing and implementing universal design principles and assistive technologies. Within this center a research project entitled Georgia Tech Research on Accessible Distance Education (GRADE) was funded by a grant from the Office of Post-Secondary Education (OPE) at the United States Department of Education. CATEA's features of GRADE were to enhance the lives of individuals with disabilities by providing research, technical assistance, and training on accessibility of distance education materials. GRADE's website features include a free, 10-module tutorial on how to create accessible distance education by way of the Access elearning tutorial. Course design modules provide "how-to" models of accessible design for courses that could be challenging to individuals due to the content. As a result of this, courses were identified with accessibility issues which resulted in proposed solutions for access for those students with disabilities. Examples of these solutions included providing web-based HTML versions of courses, using consistent navigation that is logical in sequence, and the inclusion of text descriptions for PowerPoint slides such as graphics, charts, and tables. For each sound file within a course a transcript should be made available for students to access. When using videos, captions should be included, and if mathematics courses are being offered through distance education, including a Word document that contains explanations of equations and references that are needed to complete mathematical functions are needed.
https://www.questia.com/magazine/1P3-4105539411/improving-distance-education-for-disabled-students
The Election Assistance Commission (EAC) and National Institute of Standards and Technology (NIST) are sponsoring a two day workshop to explore current and future research in accessible voting technology. The sponsoring organizations seek to have lively discussion on the following topics: - Innovative assistive applications and techniques - New approaches to accessibility in voting - Accessibility research benchmarks and results - Transitioning research to industry - New and existing devices that provide accessible access to elements of the voting process - Challenges in accessible voting The workshop will provide an environment for interactive discussions among the attendees including researchers, election officials, government officials, and voting system manufacturers. The workshop will encourage attendee participation through panel discussions and breakout sessions, with trending research presentations to frame the topics to be explored. The goal of the discussions for the workshop is to foster collaborations in the testing, evaluation, and transition of accessible voting technology. To frame the discussions for the workshop, several abstracts were submitted on AVT research topics and products. These abstracts are available for download as a .zip file. The following materials were used during the "Ballot Design and the Emergence of Mobile Devices" session: Voter Personas - based on the voter persona sketches from the ITIF Accessible Election Design Workshops. The following handout was used for the "Usability and Accessibility Testing" session: Webcast This event was webcast live April 1-2, 2013. An archive of the webcast is available at http://www.nist.gov/itl/iad/accessible-voting-technology-workshop-webcast.cfm. Captions for the webcast will be posted soon. Please check back often for updates. If you would like to be included in future AVT related correspondence, send your contact information to the workshop organizers at avtvote@nist.gov. Join the conversation on Twitter! Tweet your comments and questions using the event hashtag #AVTvote. Poster and Demonstration SessionThe workshop will include a poster and demonstration session held on the first day of the workshop. Workshop participants with novel accessible voting system technologies are highly encouraged to present a poster and/or demonstration for this session. Participants should indicate their presentation interests for this session in the email sending your abstract (see Agenda section above). Individuals proposing demonstrations should include a description of any special needs. In general, submitters are expected to be responsible for all materials necessary to conduct their presentation, but symposium organizers will attempt to make reasonable accommodations on a case-by-case basis. Submitters of accepted poster proposals must prepare all poster materials in advance of the workshop, and bring all printouts and illustrations. Posters should not exceed 4' by 3' (1.21m by .091m). Important Dates Abstracts due: Friday, March 8, 2013 Registration deadline: March 25, 2013 Workshop: April 1-2, 2013 Related Project(s) and information: NIST and the Help America Vote Act EAC and NIST: Improving Voting for People with Disabilities In FY 2009 and FY 2010, Congress appropriated $8,000,000 to the U.S. Election Assistance Commission (EAC) to support an accessible voting technology research program to help ensure that all citizens can vote privately and independently. From these funds, in 2010, the EAC awarded the Military Heroes Initiative, a $500,000 grant focused on improving the elections process for wounded warriors. The grantee delivered their findings for this initiative during the summer of 2012. In 2011, the EAC awarded the Accessible Voting Technology Initiative, two three-year grants totaling $7,000,000 targeting greater voting accessibility for all citizens. According to recent government statistics, there are more than 57,000,000 people with a disability living in the United States. The U.S. also faces a rapidly approaching demographic shift to an older population, which will result in an increase in the incidence of disability. The "Help America Vote Act" disability requirements, specifically Section 301 recognized the necessity for dramatically improving the voting process for people with disabilities and these grants help further this vital mission.
https://www.nist.gov/news-events/events/2013/04/accessible-voting-technology-research-workshop
News and Notes 54 February 20 This issue is The Prepared Lifestyle online courses designed to help educators, emergency responders, people with disabilities and healthcare professionals, UAB seeks participants for SCI Project at University of Alabama Birmingham, MIUSA announces video on power of women leaders with disabilities, NIDRR presents “New Model for Preventing Needless Work Disabilities”, SCSCIMA hosts 3rdInternational Transformational Technology Summit, website debuts by OSERS Transition Steering Committee. This time next week we'll be setting up our booth at the 2013 CSUN Conference on Technology and Disability! We are looking forward to connecting with many people from the NIDRR community, including the Rehabilitation Engineering Research Centers and the Small Business Innovative Research grantees. We're also excited to see what's on the horizon for technology in our community, whether it's high-tech brain computer interface, new eye-gaze trackers, robotics, or the simple but profoundly useful reacher. If you're attending or presenting, please stop by booth 113 and say hello! The Prepared Lifestyle The NIDRR-funded Rehabilitation Research and Training Center on Independent Living (H133B110006) sponsors The Prepared Lifestyle, two new online courses in its Emergency Preparedness: Online Trainings designed to help educators, emergency responders, people with disabilities, and healthcare professionals deal with public health threats. Part 1 covers epidemics, pandemics, and the unique risk factors for people with disabilities. Part 2 focuses on seasonal and pandemic flu. Registration is free but required: Kansas residents may take the course through Kansas Train; others may go through the Train National site. NIDRR Presents: New Model for Preventing Needless Work Disability NIDRR hosts Jennifer Christian, MD, for a presentation, "New Model for Preventing Needless Work Disability: Implications for Research, Policy, and Practice", February 27th, 1-2:30pm EST, at Room 4090, Potomac Center Plaza, SW, Washington, DC. Dr. Christian will describe the role that physicians and other influential parties play in determining whether, when, and how working age people with medical conditions (or changes due to aging) will stay at work or return to work. She will also discuss the key features of the biopsychosocial model of sickness and disability which make it better than other models at explaining why working age people with medical impairments end up on disability benefits programs for the long term. Registration is free for in-person or teleconference but space is limited for both. RSVP to Margaret Campbell or call 202/245-7290. SCSCIMS Hosts 3rd International Transformational Technology Summit The NIDRR-funded Southern California Spinal Cord Injury Model System (SCSCIMS) Center (H133N110018) hosts the International Transformational Technology Summit 3 - Robotics in Rehabilitation: The Future is Now! February 22nd and 23rd at Rancho Los Amigos National Rehabilitation Center, Downey, CA. This conference brings together experts in the fields of SCI, rehabilitation, robotics, and brain computer interface (BCI) to discuss the latest evidence for the role of task specific practice in recovery, the impact of exoskeleton robots for paraplegic walking, and the role of BCI technology for individuals with tetraplegia. The plenary session will be recorded and available for viewing after the event. For further information, contact Mindy Aisen, MD. New Transitions Website DebutsThe OSERS Transition Steering Committee, comprised of representatives from all three program offices of OSERS, including NIDRR, launched a new webpage for the Year of College and Career for Youth with Disabilities Initiative (YCC). This transition-oriented webpage features news and resources for youth with disabilities, their families, and the educators and employment professionals who support them. The page includes the latest resources, events, and news from NIDRR-funded projects, as well as other resources, and follows on last year's National Transition Conference. SCI Project at University of Alabama Birmingham The NIDRR-funded UAB Spinal Cord Injury Model System Center (H133N110008) seeks participants for testing of Virtual Walking for Reducing Spinal Cord Injury-Related Neuropathic Pain, a 3D-video simulation as a cost effective, home-based treatment option for neuropathic pain, post-injury. Candidates must live in Alabama, be 19-65 and at least three months out from initial injury, and have chronic neuropathic pain at or below the injury level. Participants will receive payment for participating in the study. Contact Juliette Galindo, MA for more information. Creating the World as It Should Be Mobility International USA (MIUSA) announced the release of Creating the World as it Should Be: The Power of Disabled Women Activists. This 18-minute video documents the power of women leaders with disabilities in their quest to be included in international development programs; and focuses on the work of the Women's Institute on Leadership and Disability, MIUSA's international leadership training model. The video is captioned in English, Spanish, and Arabic.
https://naric.com/?q=en/content/news-and-notes-54-february-20
Resources for Accessibility All individuals have the right to thrive in the communities in which they live, work, and play. Promoting equal access to the built environment as outlined by federal accessibility regulations and other accessible design initiatives is essential to this vision. Additionally, supporting building design that promotes occupant comfort can significantly impact people with disabilities; for example, improving air quality to mitigate symptoms of chronic asthma. It is also important to ensure that people with disabilities enjoy the same benefits afforded to others in both residential and commercial spaces, such as fitness programs that serve all ages and abilities. Accessibility initiatives supported by IFBC include, but are not limited to:
http://www.ifbcommunities.org/resources/accessibility/
UNICEF works in some of the world’s toughest places, to reach the world’s most disadvantaged children. To save their lives. To defend their rights. To help them fulfill their potential. Across 190 countries and territories, we work for every child, everywhere, every day, to build a better world for everyone. And we never give up. For every child, a Champion UNICEF in China promotes policies and laws that better deliver on children's rights. We have about 100 staff members working with the Government of China and other partners to ensure that the benefits of the country's development reach the most impoverished children. And we share what we learn with others. The Education Section works with the Government of China and our partners, communities and parents, to provide the country’s most disadvantaged children with learning opportunities that will change their lives. We help to strengthen China’s education system, so that it addresses the needs of the most excluded and vulnerable children, including those with disabilities, ethnic minorities, and rural and urban poor, while ensuring that girls and boys have the same opportunities. We also promote nurturing environments that ensure that children develop into well-rounded individuals, by meeting their physical, cognitive, creative and social and emotional needs. The 2015-2025 education program also embraces key strategic shifts and will have a renewed focus on upstream engagement and policy work. It will strategically focus on evidence generation and research, policy analysis, advocacy for children’s rights and adaptation of international evidence to China’s context. There will also be a shift from child-friendly schools to child-friendly education systems, scaling-up of adolescent programs, particularly integrating life skills into the secondary technical and vocation education & training (TVET) reform process and expanding alternative learning pathways for out-of-school adolescents. To learn more about what we do, please visit http://v.youku.com/v_show/id_XMzU5ODg1NDcxMg==.html How can you make a difference? Under the overall guidance of the Chief of Education and direct supervision of the Education specialist, the Education Officer will contribute in (a) the design, implementation and monitoring of UNICEF China’s Education programmes; (b) engaging in advocacy, communication and knowledge management in respective technical areas; and (c) communicating UNICEF’s work and research externally. To be specific, the main responsibilities include the following – 1. Provide situation analysis and policy briefing for designated education technical areas, contribute to UNICEF’s strategic direction, advocacy, intervention and development efforts on education and skills programing in China. 2. Provide technical input and support development of interventions in partnership with Ministry of Education (MoE) and implementation partners, with a particular focus on 2.1 Deploying innovative and scale-able education technology to accelerate progress towards improved learning and skills for children and adolescents, especially those who are the most marginalized. 2.2 Designing innovative strategies to address context-specific challenges such as accessibility to the world class digital learning solutions to improve quality and skills acquisition for in and out-of-school children and adolescents. 2.3 Leading digitalization and knowledge management of learning resources across thematic areas (Early Childhood Education, Teachers’ capacity development, Inclusive Education) to maximize access to and effective usage of such resources. 2.4 Leading the UNICEF Education programme contribution on EdTech solutions to the South-South Cooperation and UN-led initiative on digital learning. 3. Lead, manage and monitor the designated programmes components to ensure that the programmatic and financial goals of the projects are achieved efficiently and effectively. 4. Monitor implementation status on supplies, cash assistance and contracts to ensure proper and timely use of UNICEF supplies and funds. 5. Ensure efficient and effective donor services: Providing quality and timely donor reports; facilitating donor and high-level visits; providing inputs for donor presentations and discussions; responding to donor inquiries; providing inputs for mid-year and annual reports; preparing presentations on the programme areas. 6. Provide managerial and technical support for monitoring and evaluation (M&E), documentation (for website updates, in particular), and research activities of the above-mentioned projects. 7. Support programme communication, advocacy and reporting by preparing statements, advocacy materials, presentations, and policy briefings. To qualify as an advocate for every child you will have… 1. A university degree in related fields: Education, ICT technology, development studies, social/public policy, psychology and sociology or related fields. 2. At least 1 year of relevant professional work experience in Education development, education technology, programme management and/or research. 3. Demonstrable knowledge and Hands-on experience in deploying education technology to drive education contents and services is required. EdTech background and experience with EdTech industry is an asset. 4. Fluency in English and Chinese is required. Knowledge of another official UN language is considered as an asset. For every Child, you demonstrate... UNICEF's values of Care, Respect, Integrity, Trust, and Accountability (CRITA) and core competencies in Communication, Working with People and Drive for Results. To view our competency framework, please visit here. Click here to learn more about UNICEF’s values and competencies. UNICEF is committed to diversity and inclusion within its workforce, and encourages all candidates, irrespective of gender, nationality, religious and ethnic backgrounds, including persons living with disabilities, to apply to become a part of the organization. UNICEF has a zero-tolerance policy on conduct that is incompatible with the aims and objectives of the United Nations and UNICEF, including sexual exploitation and abuse, sexual harassment, abuse of authority and discrimination. UNICEF also adheres to strict child safeguarding principles. All selected candidates will be expected to adhere to these standards and principles and will therefore undergo rigorous reference and background checks. Background checks will include the verification of academic credential(s) and employment history. Selected candidates may be required to provide additional information to conduct a background check. Remarks: Only shortlisted candidates will be contacted and advance to the next stage of the selection process.
https://jobs.unicef.org/en-us/job/541238/education-officer-education-technology-no1-temporary-assignment-beijing-china
Should a trauma at birth or accident deny you the chance to experience life’s milestones and accomplishments? Imagine a world where your independence and freedom to make your own decisions, were impacted by not only your level of ability, but societal expectations as well? This is a reality for more than 4 million people in the United States living with cerebral palsy, Autism, Intellectual and Developmental Disability (ID/DD), or other physical disabilities. United Cerebral Palsy (UCP), a national organization and one of the oldest healthcare and human services non-profits in the United States, believes that all individuals living with cerebral palsy, and other disabilities, deserve a life without limits, a life with opportunities to receive a quality education, obtain employment, live independently, and start a family if they so choose. Most importantly, we believe every individual living with a disability has the right to have their voice heard and to be a decision maker in their own life. UCP National’s affiliate network provides support and services to more than 172,000 children and adults living with disabilities and their families. UCP has advocated for the full inclusion of people living with disabilities for the last seven decades in order to create equal opportunities, and most importantly, provide a voice for the disability community. UCP has been on the forefront of the disability rights movement since the beginning. As an organization that was created by families looking for answers and resources for their young children with cerebral palsy in the late 1940s, UCP is recognized today as a trusted leader for people with a wide range of disabilities. We are proud to serve the disability community through a network of 64 independent and well-respected affiliates across the country and Canada. Each affiliate is responsible for providing the highest quality of direct services for individuals with disabilities and their families. With the support of compassionate and dedicated parents, families, donors, advocates and volunteers, all committed to improving the lives of people with disabilities, United Cerebral Palsy continues to be one the largest and most influential health and human service nonprofit organizations in the United States. Through seventy years of advocacy and successful policy reform at the Federal and State levels, by UCP and affiliates, an individual living today in the United States with cerebral palsy, ID/DD and other disabilities, has the best chance in the world to live a long and healthy life. The purpose of the organization is to promote the independence, productivity and full citizenship of people with cerebral palsy, intellectual and developmental disabilities, and other conditions, through an affiliate network. UCP works to enact real change—to revolutionize care, raise standards of living and create opportunities—impacting the lives of millions of individuals living with disabilities. Since 1949, UCP has worked to ensure the full inclusion of individuals with disabilities in every facet of society. Together, with parents and caregivers, UCP will continue to push for the social, legal and technological changes that increase accessibility and independence, allowing people with disabilities to live their own dreams, for the next 70 years, and beyond. Individuals with cerebral palsy and other disabilities deserve every opportunity to live life to the fullest. UCP strives to make that happen. The national office, located in Washington, DC, provides many opportunities for its 64 affiliates that include, but are not limited to, networking opportunities with similar national disability organizations , legislative advocacy (through the partnership with ANCOR), and national brand protection. UCP’s national office also serves people with disabilities and others through the Bellows Fund which provides grants to individuals and families in need of financial assistance to purchase or repair assistive technology devices. The grants are distributed via local affiliates through annual funding allocated by UCP. The network of affiliates offers a range of services tailored to its own community's needs programs which includes but is not limited to: therapy, assistive technology training, early intervention programs, individual and family support, home and community based services, socialization, afterschool programs, community living, state and local referrals, employment assistance and advocacy. Affiliates can be found in 32 states including the District of Columbia and two provinces in Canada providing vital services. UCP is a trusted resource for individuals with cerebral palsy and other disabilities and their families, caregivers and friends. As a leading source of information on cerebral palsy and intellectual and developmental disabilities UCP is a pivotal advocate for the rights of persons with any disability. In fact, there is a significant percentage of people served by UCP affiliates who are diagnosed with a disability other than cerebral palsy.
https://www.3blmedia.com/News/All-Individuals-Living-Cerebral-Palsy-and-Other-Disabilities-Deserve-Life-Without-Limits
The Department of Hearing, Language, and Speech Sciences at Gallaudet University conducts extensive research on communication access for deaf and hard of hearing people. The department has a long history of external research supports from federal agencies and private foundations including Department of Education and National Institutes of Health. Each faculty member is conducting one or more research projects. There are ample opportunities for students to be involved in research projects. AuD students (and SLP students who choose the thesis option) conduct a research project under the guidance of a faculty advisor and fulfill the research capstone requirement for graduation. PhD students typically complete a thorough, in-depth research project and are encouraged to take an opportunity to present their research outcomes in a nationally recognizable conference or publish in a peer-reviewed journal, before competing the dissertation. Students have an opportunity to work with faculty members as a research assistant, typically up to 10 hours/week (for SLP/AuD students) or 20 hours/week (for PhD students). Deaf/Hard of Hearing Technology Rehabilitation Engineering Research Center (RERC): Improving the Accessibility, Usability, and Performance of Technology for Individuals who are Deaf or Hard of Hearing. Funded by the National Institute on Disability, Independent Living, and Rehabilitation Research. HSLS Investigators: Dragana Barac-Cikoja, Bomjun Kwon, Claire Bernstein.
https://www.gallaudet.edu/department-of-hearing-speech-and-language-sciences/research
The following organizations have areas of focus in Knowledge Translation, including evidence-based information and systematic reviews. The purpose of the ADA Network-KTC is to ensure that information and products developed and identified through the 10 ADA regional centers are of high quality, based on the best available research evidence, and are deployed effectively to multiple key stakeholders, and to develop processes and technology to facilitate highly collaborative and efficient progress to accomplishing these goals. The ADA Network-KTC is funded by the National Institute on Disability, Independent Living, and Rehabilitation Research (NIDILRR) and is based at the University of Washington, Department of Rehabilitation Medicine and the University of Illinois at Chicago, Institute on Disability and Human Development. AHRQ is the health services research arm of the U.S. Department of Health and Human Services (HHS). Evidence-based Practice Centers: AHRQ is a "science partner" with private and public organizations in their efforts to improve the quality, effectiveness, and appropriateness of health care by synthesizing the evidence and facilitating the translation of evidence-based research findings. Practice-Based Research Networks: Primary care practice-based research networks (PBRNs) involve practicing clinicians in asking and answering clinical and organizational questions central to primary health care. Alberta Innovates - Health Solutions supports top-quality, internationally competitive health research. Our research seeks to further our understanding of health and disease, and to produce results that will make a difference to the health, economy and societal wellbeing of Albertans and people around the world. On January 1, 2010, the Alberta Heritage Foundation for Medical Research became Alberta Innovates - Health Solutions, part of the province's stronger, more aligned research and innovation system described in Bill 27, the Alberta Research and Innovation Act. Alberta Innovates - Technology Futures supports research and innovation activities directed at the growth and development of technology-based sectors, the commercialization of technology, the provision of business and technical services, and initiatives that encourage a strong science, technology and entrepreneurial culture in Alberta. Tech Futures was created on January 1, 2010, building on the successes of the former Alberta Ingenuity, former Alberta Research Council, former iCORE, and nanoAlberta. CIHR is the major government agency responsible for funding health research in Canada that has established charges for KT research, development, and dissemination. Located at the University of Colorado at Boulder, in 1996 CSPV identified 11 prevention and intervention programs that meet a strict scientific standard of program effectiveness. The model programs, called Blueprints for Violence Prevention, have been effective in reducing adolescent violent crime, aggression, delinquency, and substance abuse. Established in 1988 at Concordia University, CSLP is a multi-institutional research centre of excellence joining 14 colleges and universities in Canada and the US, as well other partners and collaborators worldwide. Systematic Reviews: currently involved in the production of systematic reviews and dissemination of research findings (e.g., distance education). Canadian Network for Knowledge Utilization (CanKnow): will be dedicated to collecting and disseminating evidence in the social sciences to inform and improve Canadian policy-making and practice. Accessibility and Students with Disabilities: examines ways to improve accessibility and academic success for students with various disabilities in higher education. The purpose of AIR's KTDRR Center is to make it easier to find, understand, and use the results of research that can make a positive impact on the lives of people with disabilities. In collaboration with several national and international partners, the Center on KTDRR carries out integrated training, dissemination, utilization, and technical assistance activities to (a) increase use of valid and relevant evidence-based research findings that inform decision-making and (b) increase the understanding and application of knowledge translation principles. The KTDRR Center is funded by the National Institute on Disability, Independent Living, and Rehabilitation Research (NIDILRR) and is based at AIR in Austin, Texas and partners with several international organizations as well as other NIDILRR-funded grantees. AIR's KTER Center synthesizes and disseminates existing high-quality research on improving employment outcomes for people with disabilities; conducts original research to identify and test strategies that encourage the use of such research among businesses/employers, policymakers, vocational rehabilitation agency staff, and people with disabilities; and trains researchers in using the most effective knowledge translation strategies. The KTER Center develops and implements dissemination, training, and technical assistance activities from its base at AIR in Austin, Texas. the KTER Center is funded by the National Institute on Disability, Independent Living, and Rehabilitation Research (NIDILRR). AIR's partner in this activity is Virginia Commonwealth University, (VCU), which works with AIR in conducting all of the activities of the KTER Center. VCU plays an important role in the project’s ongoing exchanges with the employer and vocational rehabilitation practitioner stakeholder groups. Funded in 2008, the Center on KT4TT is focused on improving the performance of those Federal programs intending to result in beneficial socio-economic impacts by generating technology-based innovations. Sponsored by the National Institute on Disability, Independent Living, and Rehabilitation Research (NIDILRR), our primary target applications are devices and services for persons with disabilities and the elderly. However, we are designing the project outputs to be relevant to policies and practices for technology-based innovations in general. The Center on KT4TT is housed at the Center for Assistive Technology, SUNY Buffalo. An independent, not-for-profit organization whose mission is to conduct and share research with workers, labour, employers, clinicians and policy-makers to promote, protect and improve the health of working people. Knowledge Transfer & Exchange (KTE) includes IWH's newsletter, workshops, publications and other outputs. The Joint Program in Knowledge Translation is a collaboration between St. Michael's and the Continuing Education and Professional Development Office, University of Toronto, Faculty of Medicine. The Joint Program in Knowledge Translation designs and evaluates interventions to increase the likelihood of incorporating the best available evidence into practice and policy, and researches the best strategy to implement knowledge in a variety of areas. KUSP is a funded applied health services research health research program focusing on knowledge translation in organizations (University of Alberta, Canada). The MSKTC receives funding from the National Institute on Disability, Independent Living, and Rehabilitation Research (NIDILRR) to summarize research, identify health information needs, and develop systems for sharing information for the NIDILRR Model Systems programs in traumatic brain injury (TBI), spinal cord injury (SCI), and burn injury. The MSKTC is operated by the American Institutes for Research (AIR) in Washington, DC. Our mission is to conduct research aimed at improving the effectiveness of programs for children, youth, and families. Using field research, program evaluation, and research synthesis (meta-analysis), our faculty and staff help determine which programs are actually making a difference in the lives of the people they serve. This project is housed at the Institute for Health Policy at The University of Texas School of Public Health in Houston, Texas. RIA aims to develop new methods of assisting researchers throughout the University of Texas Health Science Center in translating their technical findings into usable advice and recommendations. As an initiative of the U.S. Department of Education’s Institute of Education Sciences (IES), the WWC was created in 2002 to be a central and trusted source of scientific evidence for what works in education. We review the research on the different programs, products, practices, and policies in education. Then, by focusing on the results from high-quality research, we try to answer the question "What works in education?" Our goal is to provide educators with the information they need to make evidence-based decisions. The WWC is administered by IES through a contract with Mathematica Policy Research. The Campbell Collaboration is an international organization that helps people make well-informed decisions by preparing, maintaining and disseminating systematic reviews in education, crime and justice, and social welfare. The Campbell Library contains titles registered, approved protocols, and completed reviews. Users have access to a number of different search methods for locating content within The Campbell Library, including browse, simple search, advanced search, and search history. The Resource Center aims to provide researchers, policy makers, and others who are interested or involved in our work, with helpful resources such as policy documents, guidelines, links and tutorials. It features online resources and tools that have been developed by Campbell, as well as useful external resources. Based at the University of York since 1994, CRD conducts systematic reviews of research and disseminates research-based information about the effects of interventions used in health and social care in the United Kingdom. CRD receives core funding from the UK Department of Health. The Cochrane Collaboration is an international organization that conducts systematic reviews of health and medical research. The Cochrane Library is updated quarterly. Part of the Social Science Research Unit at the Institute of Education, University of London since 1993, the EPPI-Centre has been carrying out research synthesis and developing review methods in social science and public policy, in order to make reliable research findings accessible to the people who need them. JBI facilitates evidence based health care practice through being a leading international organisation for the Translation, Transfer and Utilisation of evidence of the feasibility, appropriateness, meaningfulness and effectiveness of health care practices. Established in 1996, JBI is an international collaboration involving researchers, clinicians, academics and quality managers across 40 countries in every continent. NICE is independent organization in the UK responsible for providing national guidance on the promotion of good health and the prevention and treatment of ill health. Commissioned in 1992 as an independent public authority for the critical evaluation of methods used to prevent, diagnose, and treat health problems, SBU has the mandate of the Swedish Government to comprehensively assess healthcare technology from medical, economic, ethical, and social standpoints.
https://ktdrr.org/ktlibrary/organizations.html
Guide Questions: * What is Computer? * What are the different types of Computer? * What are the different types of Personal Computer? * What is the primary operation of each Computer? A computer is an electronic device that has the capability to manipulate information or data, store, retrieve, and process it for more useful information. It is programmable so it can respond to specific instructions or commands. Computers of the earlier years were of the size of a large room and were required to consume huge amounts of electric power. However, with the advancing technology, computers have shrunk to the size of a small watch. Depending on the processing power and size of computers, they have been classified under various types. Let us look at the classification of computers. Different Types of Computers Based on the operational principle of computers, they are categorized as analog, digital and hybrid computers. Analog Computers These are almost extinct today. These are different from a digital computer because an analog computer can perform several mathematical operations simultaneously. It uses continuous variables for mathematical operations and utilizes mechanical or electrical energy. Digital Computers They use digital circuits and are designed to operate on two states, namely bits 0 and 1. They are analogous to states ON and OFF. Data on these computers is represented as a series of 0s and 1s. Digital computers are suitable for complex computation and have higher processing speeds. They are programmable. Digital computers are either general purpose computers or special purpose ones. Special purpose computers, as their name suggests, are designed for specific types of data processing while general purpose computers are meant for general use. Hybrid Computers These computers are a combination of both digital and analog computers. In this type of computers, the digital segments perform process control by conversion of analog signals to digital ones. Classification of Computers The following are the classification of the different types of computers based on their sizes and functionalities: Mainframe Computers Large organizations use mainframes for highly critical applications such as bulk data processing and ERP. Most of the mainframe computers have the capacities to host multiple operating systems and operate as a number of virtual machines and can substitute for several small servers. Minicomputers In terms of size and processing capacity, minicomputers lie in between mainframes and microcomputers. Minicomputers are also called mid-range systems or workstations. The term began to be popularly used in the 1960s to refer to relatively smaller third generation computers. Servers They are computers designed to provide services to client machines in a computer network. They have larger storage capacities and powerful processors. Running on them are programs that serve client requests and allocate resources like memory and time to client machines. Usually they are very large in size, as they have large processors and many hard drives. They are designed to be fail-safe and resistant to crash. Supercomputers The highly calculation-intensive tasks can be effectively performed by means of supercomputers. Quantum physics, mechanics, weather forecasting, molecular theory are best studied by means of supercomputers. Their ability of parallel processing and their well-designed memory hierarchy give the supercomputers, large transaction processing powers. Microcomputers A computer with a microprocessor and its central processing unit it is known as a microcomputer. They do not occupy space as much as mainframes do. When supplemented with a keyboard and a mouse, microcomputers can be called personal computers. A monitor, a keyboard and other similar input output devices, computer memory in the form of RAM and a power supply unit come packaged in a microcomputer. These computers can fit on desks or tables and prove to be the best choice for single-user tasks. Personal computers come in different forms such as desktops, laptops and personal digital assistants . Let us look at each of these types of computers. Desktops A desktop is intended to be used on a single location. The spare parts of a desktop computer are readily available at relatively lower costs. Power consumption is not as critical as that in laptops. Desktops are widely popular for daily use in the workplace and households. Laptops Similar in operation to desktops, laptop computers are miniaturized and optimized for mobile use. Laptops run on a single battery or an external adapter that charges the computer batteries. Netbooks They fall in the category of laptops, but are inexpensive and relatively smaller in size. They had a smaller feature set and lesser capacities in comparison to regular laptops, at the time they came into the market. Personal Digital Assistants (PDAs) It is a handheld computer and popularly known as a palmtop. It has a touch screen and a memory card for storage of data. PDAs can also be used as portable audio players, web browsers and smart phones. Most of them can access the Internet by means of Bluetooth or Wi-Fi communication. Tablet Computers Tablets are mobile computers that are very handy to use. They use the touch screen technology. Tablets come with an onscreen keyboard or use a stylus or a digital pen. Apple’s iPod redefined the class of tablet computers. Wearable Computers A record-setting step in the evolution of computers was the creation of wearable computers. These computers can be worn on the body and are often used in the study of behavior modeling and human health. Military and health professionals have incorporated wearable computers into their daily routine, as a part of such studies. When the users’ hands and sensory organs are engaged in other activities, wearable computers are of great help in tracking human actions. Wearable computers do not have to be turned on and off and remain in operation without user intervention Follow and Subscribe! Deped TV Official YouTube Channel Deped TV Official Facebook Page Sources:
https://angelotheexplorer.com/2021/04/types-and-classification-of-computers-grade-9-contact-center-services-ccs-deped-tv.html
With the recent outbreak of the coronavirus in China, as well as the spread of the disease into a number of countries including the United States, there has been a spark of fear and panic. The markets have taken a downturn, creating some of the largest daily declines in two years. We have seen similar behavior back in 2003 with the SARS virus, and back in 2015/2016 with the Zika virus. Between these two viruses and the housing crisis of 2008-2009, we have seen major market declines within the past two decades. However, the market continues to run its cycle and has recovered under each of these circumstances. As an investor, it is important to remind yourself to take a long-term approach with your 401(k) plan and think about the overall goals for retirement. With that in mind, here are a few things to consider when it comes to market volatility and investing in your 401(k) plan or IRA account. Dollar Cost Averaging When you’re contributing to your 401(k) plan, the amount you elect to contribute is being invested into your account every pay period (weekly, bi-weekly, etc.). When a consistent amount of money is invested in consistent intervals, this is a form of investing called dollar-cost averaging. With dollar-cost averaging, you are buying shares of a mutual fund throughout all different points in the market cycle. When the market is up, you are buying less shares at higher price. When the market is down, you are buying more shares at a lower price. The advantage to dollar cost averaging is that you are reducing timing risk, and in a fluctuating market, the average cost per share is going to be lower than the average price per share. The Cycle of Emotion The Cycle of Emotion addresses the emotional aspect of investing rather than the financial aspect. The stock market goes up and down, and your investment accounts will usually reflect that. People tend to get excited when they see the market go up and think that it’s a great time to buy into the market/invest more money. When the market goes down, many tend to panic, thinking that they are losing their money, and naturally feel obligated to sell their investments, at which point investors are officially locking in their gains or losses. Locking in a gain or a loss leads into the next point of understanding the difference between a realized gain/loss versus an unrealized gain/loss. Realized vs. Unrealized Gains and Losses When you see your account increasing or decreasing, you are not making or losing any money unless you sell out of your investment position, at which point you would notice a realized gain or loss. An unrealized gain or loss is when the value of your account is above or below the price at which you bought your investment and if you were to sell out of the position, what your return would be. For example, if you bought XYZ at $5/share and the value when down to $2/share, you would have an unrealized loss of $3/share. If, when that value went down to $2/share, you panicked and sold your shares of XYZ, you would now have locked in a realized loss of $3/share. Stay the Course: Diversification and Long-Term Approach While you are not able to control the markets, you are able to control the way your money is invested, as well as your approach and investment behavior. Through economic and market downturns, we encourage investors to remain diversified, take advantage of changing financial markets to reduce risk of loss, and focus on the long-term approach that aligns with your investment and retirement goals.
https://www.tycorbenefit.com/blog/volatile-markets-stay-the-course
I used 23,000 days of actual market data (dating back to the very end of 1927) in order to create my model. My goal was to explore the performance and profitability of Leveraged ETFs using the S&P 500 and Nasdaq-100 as benchmarks. I will both take an in-depth look into leveraged ETFs in this essay as well as explain my model. To start, let me explain what a leveraged ETF is and why I thought this model necessary. Leveraged ETFs (Exchange Traded Funds) have the same structure as any other ETF and track different benchmark indices such as the S&P 500 Index, the Nasdaq Composite Index, Gold, Silver, and other commodity indexes. ETFs as a whole are a very popular way to diversify investments in safe, highly regulated, and liquid securities. Leveraged ETFs were originally invented to be used as a day traders’ tool to allow them to make more money off of small day to day price swings in the market than with traditional market tracking ETFs. The general principle for leveraged ETFs is that they multiply the gains and losses of the index they track by the amount they were meant too on a single day basis. This means that if the actual market rises 1% on a given day a leveraged ETF designed to move 2x the market would rise 2% on the same day. The same in reverse would happen if the actual market dropped 1% on a given day. Because leveraged ETFs are designed to follow the percent changes of the market on a day to day basis rather than for longer periods of time, this means that the leveraged ETFs could severely over-perform or under-perform the market over longer periods of time depending on market conditions that I will attempt to explain later. Leveraged ETFs use financial derivatives contracts such as Swaps and sometimes futures which allow them to multiply the movements of the market. LETFs will also hold the individual stocks that make up the underlying index. The swap contracts constitute the majority of the LETFs notional value and are held between the LETF and large investment banks looking to hedge their investments. Generally, though not always, the long side of the swap contract (the side that is taken by the normal LETF) pays a certain percentage amount upon the notional value of the swaps usually based upon the current LIBOR rate plus some basis points to the short side (seller) of the contract which is detrimental to the performance of the LETF, especially in times of high-interest rates. It is also important to note that swaps are over-the-counter securities meaning they are highly individualized and customizable between parties. LETFs also use exchange-traded index futures contracts to a lesser degree (with the exception of commodity-based LETFs which usually only use futures). The most notable thing about the use of index futures is that they are generally in a state of backwardation which is beneficial to the performance of the index LETF. Finally, the leveraged ETF will hold the stocks that make up the underlying index in a small quantity compared to its notional value. The stocks pay dividends that are distributed to the shareholder of the LETF. The positions of the LETF are rebalanced at the end of every day. Some critics believe when a large-sized LETF sells stock shares to rebalance the portfolio in order to pay the swap counter-party after a negative market day, the downward pressure the selling of the shares would create would paradoxically force the market to move even lower the next day. This would create a constant negative feedback loop detrimental to the value of the LETF. I have not, however, seen any proof to this theoretical phenomenon actually happening since it is reasonable to believe that the quantity of the shares being sold during the rebalancing would usually have a negligible effect upon the market. There are also fees for ETFs known as expense ratios which are how the managers of the ETFs profit. These are always substantially higher on leveraged ETFs, often approaching 1% or more of the total assets. There are also inverse ETFs that move in the opposite direction as the market such as SDS (-2x) and SPXU (-3x) which also use Swaps to function by taking the short side of the swap (though they often have to pay for the swaps even though the short side usually receives the swap rate). Because the stock market historically always rises when given enough time, short leveraged inverse ETFs are extremely bad long-term investments and only useful for short term speculation. Most of these inverse LETFs have lost 99%+ of their value since their inception. As they are very poor medium to long term (and even highly risky for the short term) investments I do not focus on them and will be referring to the inverse ETFs no more for the remainder of the article. The market’s main influences upon leveraged ETFs as to their long-term success is market volatility. As I will try to show, market periods of high volatility (such as now) hurt leveraged ETFs a great deal while periods of low volatility allow leveraged ETFs to greatly outperform the market as long as the market is going at least very slightly upwards and minimize losses when the market is slowing declining or staying the same. The volatility of the market hurts leveraged ETFs even if the stock market is neither going up nor down during a period of time. The reason for this is because of the mathematics behind the percentage movements of leveraged ETFs. I shall illustrate this here: As you can see the price decays even when the underlying value of the market moves between the same two points the leveraged version decays in value. The mathematical reasoning behind this is that if you subtract 1% from 100 you have 99 and then if you add 1% of 99 to 99 you get 99.99 or almost exactly what you started with. However, if you subtract 3% from 100 you will get 97 and if you add back 3% to 97 you will get 99.91 which is not as close to the original number as the last example was. This effect will be even more devastating over a long period of time as shown by the table which was published in the prospectus of one of the leveraged ETF called UPRO. Also, the greater the leverage of the ETF the greater volatility hurts the ETF (2x is not as affected as 3x) It is also important to note that leveraged ETFs perform extremely poorly in bear markets because they lose more than the market loses because of their leveraged nature. From my theoretical calculations (the actual leveraged ETFs didn’t start coming out until the mid-2000s), some of the higher multiple leveraged ETFs would lose as much as 95% and 99% of their value from during some of the worst financial crashes and depressions such as in 2001/2008 and the during the 1930s. With that said they recovered extremely quickly and grew to even higher levels than before. This investment strategy is not for those who are faint of heart or for those who aren’t willing to lock up their money for the foreseeable future. With that said over long periods of time, this investment strategy is unimaginably lucrative as my models will show. There are also certain ways to help the strategies become more stable and lucrative such as continually dollar cost average (as will be shown in my model). In times of low volatility, the leveraged ETFs are able to compound daily and therefore perform very well. This is why even though the leveraged ETFs are toted as a very short-term speculative tool (even the prospectuses of the ETFs say so), I believe that they can make a very lucrative long-term investment. Other things to note about leveraged ETFs is that they pay a much lower dividends rate than most S&P ETFs and have much higher expense ratios. The last thing before I start explaining my model is that the actual leveraged ETFs have surprisingly outperformed what they theoretically should in my model, even with their expense ratios calculated in (which are very high for leveraged ETFs. UPRO (3x S&P) has an expense ratio of 0.92% while VOO (normal S&P) has an expense ratio of 0.03%). I have a portion of my model dedicated to this. I downloaded my actual market data from Yahoo finance. The data has not yet been updated to take into account the market data from the months since the original creation of the model. The entirety of the model is essentially the equivalent of a rough and unpolished draft. There are several useless and random calculations and graphs as well as some repetition of calculations. I was learning as I built the model and tried several different ways to do things. Also, my naming conventions are not always constant. I always have graphs to the left of the data cells of each sheet for easy visualization. In some of my earlier graphs, the time axis is counting the rows of cells the data represents, or in other words the number of market days of data. Only later I found out how to change the actual counted number of days into time actual time periods and dates. I have not calculated the reinvestment of dividends into the performance of the baseline and the leverages. This doesn’t matter too much though as the dollar cost averaging would probably draw from the dividends instead of being on top of the reinvested dividends. I have also not yet included the theoretical expense ratio or swap costs yet; however, this point is lessened due to the fact that the actual leveraged ETFs have historically (during there so far short lifetimes) beat what they theoretically should have performed even when expense ratio and the costs of swaps are included in the actual performance and not in the theoretical. It is also hard to guess what the expense ratios would have been in the past as all ETFs and Mutual Funds have gone down in Expense Ratio greatly over the years (and Index tracking Funds are a considerably newer invention without even mentioning the newness of the leveraged ETFs). My volatility versus the performance section is not yet complete as I struggle to find a way to quantify the correlation. Volatility is greatly based on statistics which is a subject I am not yet very well versed with. Finally, I need more starting points and time ranges in order to solidify the usefulness in my results and I may add a way to change the volatility and actual growth of the S&P to play around with different factors without relying on actual market data (to make it a true model). Here is the spreadsheet download. The first sheet in the model contains 23,000 days of data and compares the different leveraged ETF’s theoretical performance in comparison to the actual market performance of the S&P 500. The value of each test is in terms of the S&P value so that each test starts at a beginning value of 17.66 because that’s the number the S&P index valuation is equal to at the beginning date of the test. The results of this test surprised me as I originally believed that the 3x would perform better than the other variations; However, the 2x greatly outperformed the 3x. I was even more surprised to dee that the 1.5x also performed very well compared to the 3x. The 3x performed worse than the actual S&P for most of the length of time. I believe this is due to the test starting right before the great depression and this really hurt the 3x. I tried various other leverage amounts but none of them performed as well as the 2x. It was proposed to the SEC to have a 4x leveraged ETF but the SEC denied its creation because they believe it would be too risky for the common investor. I threw the 4x into the model anyways and as it turned out while it had its moments of success it would mainly have performed terribly of the course of the past 90 years. Even though I didn’t keep them in the model, I tried variations close to 2x such as 1.75x, 2.25x, and 2.5x to see what was really the most efficient leverage amount. I found that 2x was, in this scenario, really the best leverage amount. On top of that, the real leveraged ETFs don’t have any of those latter leverage multiples currently available of products, so it doesn’t really matter anyway. The results were that the 2x would have peaked about a month ago at a value of almost 25,000 versus the actual S&P 500 that peaked at about 3,400. I then moved on to checking my theoretical results with the leveraged ETF’s actual results. I only checked against two of the different multiples of the leverages as those were the ones, I was most interested in: 2x and 3x. The actual 3x I used to test my theoretical against is an ETF with a ticker symbol of UPRO. It has been around since 2009 so that’s when the test starts. UPRO does about 10% (and because it is exponential growth it would continue to widen the performance gap if there was a longer period of data) better than what I calculated it theoretically does even with expense ratio calculated into its performance. I still am not completely sure why it performs so much better, but when put into perspective, the % of higher gain the theoretical would need to match UPRO’s actual record is about +0.013% each day above the actual 3x price change of the market. This could easily be due to a small rounding error or transactional difference and only is noticeable after long periods of time. I also tested the theoretical 2x against its real-life equivalent that has the ticker SSO. Once again, the actual beat the theoretical but this time by a slightly smaller margin (even though SSO has a lower expense ratio than UPRO). SSO IPO’d in 2006 so that’s when the test starts for the 2x. It’s important to note that since the real leveraged ETFs haven’t been around for much longer than a decade this enhanced performance may not continue into the future, and may in fact in a worst-case scenario reverse itself. Because I thought the lackluster results of the 3x were strange, and because I believe starting the trial right before the greatest economic crisis of at least recent history may have skewed the results, I did a trial with a starting date in 1950. In this case, the 3x did way outperform the 2x and all other multiples. I also threw in 4x to the test and found that 4x would have performed extremely well around the late 90s but then crash down to mostly perform worse than 3x thereafter. It may theoretically perform extremely well again in the future, but I am going to have to look at factors that make it perform so well. In this sheet, I also adjusted the starting value to 1 in order to more easily see their growth over the time period. This means that at its peak a theoretical investment in a 3x leveraged ETF would have returned an amount over 50,000 times the original investment at its recent peak in early 2020 over the course of about 70 years while investing in the regular S&P would have created an increase of about 200 times its original investment at its recent peak. I wanted to find a way to make the 3x give more consistent results as the winner so I added dollar-cost averaging and continual investment in the equation and the results were satisfactory. Before going back to 1929 as a starting point I tried testing it from the 1950 starting point. The principal behind the dollar cost averaging is that a person puts in their initial investment and then adds an additional 1% of the original investment to it every day thereafter. As in you would enter an amount of $100 to start out with and then add another $1 into the investment every day thereafter. The idea behind this is that the investor would buy at all points of the market cycle, including the low points, and therefore make more money on the way up. Also, realistically a person is continually making more money from their main source of income is naturally going to invest some of it. 1% may seem like a high amount to have to invest every day (an investor may have a large sum of money saved up to put initially into this investment through their actual income wouldn’t allow them to invest such a high percentage of the original more each day), and the model allows for an easy change in dollar-cost percentage and can be changed to match possibly more realistic quantities such as .1% per day or .01%. Though the outcomes are not as good as investing 1% more per day they still do very considerably better than just one lump sum upfront. This does not mean however that an investor should break up their initial investment and invest it slowly into the market, as investing the most possible upfront usually does result in much higher returns unless the starting point is right before an economic depression. The idea is rather simply to invest even greater amounts as the cash comes available through dividends or other sources of income. Also, there is no need to invest on a daily basis because realistically on a monthly would do just almost as well and makes more sense for most people. The reason that in the model it is 1% more on a daily basis rather than about 30% on a monthly basis as it was easier to calculate into the model and it would also probably perform slightly better than reinvesting on a monthly basis due to compounding effects. The outcome of investing 1% more of the original investment on a daily basis is that the returns for the 3x are almost 450,000 times the original investment at its 2020 peak over the course of about 70 years. I then tried the dollar-cost averaging for the period starting in 1929 and found that the 3x did in fact beat everything else by a very large margin. An original $1 investment would have turned into about $3.5 million over the 90-year period when $0.01 was added to it every day. If you remember the non-dollar cost averaging 1929 starting point had a 3x lag in performance. Through my calculation, if you had added on average as little as one basis point (0.01%) of the original investment to the investment every day the ending results would have the 3x outperforming all the other variations by the current date (though not by as high as an amount as if the dollar cost average amount had been greater than 0.01%). I also realized how inflation would make the additional 1% daily additional investment an extremely small amount by the end of the test period so I added an inflation adjustment to the dollar-cost averaging. I figured the average inflation rate from the 1930s to the present was about 3% a year on average so I increased each day’s dollar-cost percentage by that amount divided by the number of trading days in each year. It by no means is a perfect inflation adjustment and does not actively change in growth during times of greater than normal inflation or decrease in times of deflation though it does give a pretty good average inflationary amount and can also take into account things such as work promotions and the pay raises that come with them (as people on average make more and more money as they become older and more experienced). In current times the daily dollar-cost averaging is about 15 times the original starting point in 1929. As it turns out that the theoretical performance of dollar-cost averaging does not increase all that much due to the inflationary adjustment as the smaller quantities of money invested earlier very much outweigh the later larger quantities of investment in value. However, I do believe it is important because the longer you keep up this investment the more adjusting for inflation becomes important and it is also a more realistic way to make the model. Also, it allows for much faster recoveries after times of turmoil such as in 2008 as you are investing more money into the leveraged ETFs than ever before exactly when it is best to invest more than usual. My next sheet is still a work in progress but the idea for it is to be able to measure how much volatility actually effects the performance of these securities. I am still thinking of ways to best represent this. I am using volatility measures such as the VIX (Volatility Index) in order to perform this task. VIX dates back to 1990 so that is the starting point of this experiment. As I stated before my this is very statistically-based and therefore not my strong point. I also repeated the tests I performed in with the S & P but with the NASDAQ-100 starting in 1985 (when the index was introduced). There are two pages dedicated to this which cover the theoretical performance and the performance versus reality. The results are such that the theoretical tracked the actual very closely. The theoretical 3x gained a near 800,000% at its peak in 2020 giving it an annualized return of approximately 38%. The spike during the dot-com boom is also noteworthy. I have been shaping my investment strategy off of this model. As it is always unknown how the markets will actually perform in the future this investment strategy is only for those who are able to tie up money for long indefinite periods of time and have large risk tolerance (mostly younger people) though I am certain that this strategy will prove to be extremely lucrative to me (I can only guess as to whether or not it will be as lucrative as it would have theoretically been in the past). As for my picks of leveraged ETFs, I choose UPRO, the 3x S&P 500 tracking ETF and TQQQ, the 3x NASDAQ-100 tracking ETF. Even though TQQQ has beaten UPRO historically instead of investing all in TQQQ I still want to diversify into both because the NASDAQ has not been around nearly as long as the S&P and therefore it is unknown as too whether it will continue its outstanding performance in the future. Additional resources:
https://concessio.com/feasibility-leveraged-etfs/
- Dollar cost averaging (DCA) is an investment strategy that aims to reduce the impact of volatility on large purchases of financial assets such as equities. Dollar cost averaging is also called the constant dollar plan (in the US), pound-cost averaging (in the UK), and, irrespective of currency, unit cost averaging, incremental trading, or the cost average effect. By dividing the total sum to be invested in the market (e.g., $100,000) into equal amounts put into the market at regular intervals (e.g., $1,000 per week over 100 weeks), DCA seeks to reduce the risk of incurring a substantial loss resulting from investing the entire lump sum just before a fall in the market. Dollar cost averaging is not always the most profitable way to invest a large sum, but it is alleged to minimize downside risk. The technique is said to work in markets undergoing temporary declines because it exposes only part of the total sum to the decline. The technique is so called because of its potential for reducing the average cost of shares bought. As the number of shares that can be bought for a fixed amount of money varies inversely with their price, DCA effectively leads to more shares being purchased when their price is low and fewer when they are expensive. As a result, DCA possibly can lower the total average cost per share of the investment, giving the investor a lower overall cost for the shares purchased over time. However, there is also evidence against DCA. Finance journalist Dan Kadlec of Time summarized the relevant research in 2012, writing: “The superior long-term returns of lump sum investing [over DCA] have been acknowledged for more than 30 years.” Similarly, decades of empirical research on DCA have found that it generally does not function as promoted and is usually a sub-optimal investment strategy.
https://btclexicon.com/dollar-cost-averaging-dca/
The upcoming election has many people fretting over their finances and, as a result, they are reaching out for professional help on savings, investments, and estate planning. Indeed, an informal survey of a group of MassMutual financial professionals found that 53 percent have seen an uptick in unsolicited calls from clients concerned about the election, and roughly 76 percent said they expect that number to climb in the coming weeks. Given the uncertainties that linger in 2020, particularly the economic fallout from COVID-19, it’s no surprise that investors this year may require more guidance than usual. (Need a financial professional? Find one here) “My clients are worried about this election,” said survey respondent Amie Fox, a financial professional with Skylight Financial Group in Cleveland, Ohio. “They are bringing it up in almost every service meeting and in new client strategy meetings.” To help alleviate anxiety, nearly three-quarters (72 percent) of the financial professionals surveyed said they have or plan to connect with their clients on this topic, even just as part of a regularly scheduled check-in. Others are taking proactive steps to remind them that market timing rarely works and to put election year trends into context. For example, retail investors are sometimes quick to assume that one party might be better for market performance than another, based on the business and economic policies and priorities espoused during campaigning. But various analyses suggest such impressions may be misplaced. (Related: What the election, amid the pandemic, means for markets) Also, while it’s true that stock market returns do tend to be slightly lower in the 12-months following a presidential election — returning an average of 5 percent compared with the 8.5 percent average return in any given 12-month period — they hardly fall off a cliff, according to a historical analysis of election year market performance by U.S. Bank. Interestingly, the analysis found that the modest decline in equity returns seen immediately after an election appears not to be correlated with which party takes office, but returns do tend to be more muted when a different party comes into power.1 Past performance, of course, is no guarantee of future returns. But for long-term investors, MassMutual financial professionals generally agree that the outcome of this or any other election should not in itself precipitate a strategy shift for average investors and savers. “People are surprised to find out that political party has minimal impact [on their portfolios], and to learn which party has a more positive impact on the markets — it's not usually who they think,” said survey respondent Dominic Marinucci, a MassMutual financial professional in Exton, Pennsylvania. “I do not recommend changing strategies simply because of the election. The markets are essentially politically agnostic in the long term; in the short term, there's minimal impact — not enough for us to be concerned.” Pre-retirees and retirees worry If survey results are any guide, pre-retirees and retirees are reaching out to their MassMutual financial professionals, especially those who worry about volatility and asset preservation. (Related: How life insurance can help you in retirement) Some are asking if they should exit the stock market now and move their money to cash, a practice that most financial professionals discourage. After all, older Americans may spend 30 years or more in retirement. To outpace inflation and maintain their lifestyle, investors typically keep a portion of their savings invested for growth. Retirees can potentially reduce their exposure to volatility, however, by creating a cash cushion valued at anywhere from six months' to a year’s worth of living expenses that they can tap during bear market downturns — so they aren’t compelled to liquidate their holdings when stock prices are low. (Related: Protecting yourself against market fluctuations in retirement) Affluent investors fear change Not surprisingly, the MassMutual financial professionals surveyed said some affluent investors are voicing particular concern about the pending election, since tax policy on a number of fronts is part of the ongoing campaign debates. These issues include changes to the level of individual income tax and capital gains tax rates, as well as the federal estate tax and gift tax exemption thresholds (which currently stand at $11.58 million and $15,000 respectively per recipient annually). (Related: 3 ways to financially prepare when an election looms) As a result, survey respondent Nick Caporaso, a MassMutual financial professional in Syosset, New York, said he is advising high net worth clients to calculate their potential tax liability under both possible election outcomes with their financial and tax professional. “There are various options, but we would have to sit down and do an in-depth tax analysis, speak with their accountant, and look at every single position in their accounts, comparing cost basis and current value of each,” he said, noting that he is currently reviewing his clients’ investment portfolios and strategizing for worst-case scenarios. “We then will see the impact year by year in dollars and cents.” Wealthy taxpayers, for example, who were already planning to pass a portion of their assets along to their heirs, may wish to consider making a larger tax-free gift this year to take advantage of the higher gift tax exemption threshold, Caporaso said, in case it disappears under either future president. They may also wish to explore tax-friendly estate-planning tools. For example, permanent life insurance, like whole life insurance, provides a guaranteed (income tax free) death benefit to beneficiaries when the policyowner passes away. Such policies also accumulate cash value on a tax-deferred basis, which can be used during the policyowner’s lifetime to help pay for emergencies, supplement retirement income, or fund college tuition. Money borrowed or taken from the cash value of a life insurance policy is not subject to taxes up to the “cost basis” — the amount paid into the policy through premiums. Just remember that tapping into the cash value reduces its value and death benefit. It also increases the likelihood that the policy will lapse. (Learn more: Life insurance: 3 income tax advantages) For households that are not high net worth, many financial professionals believe any proposed tax law changes are unlikely to affect their financial picture or portfolio returns in a substantive way. “The market doesn't care who wins; the market just wants to know what the rules are,” said survey respondent Nathan Way, president and owner of Novity Wealth Solutions in Williamsville, New York. “Once that is clear, the market will begin to rotate to the perceived winners and losers based on policy and speculation. The best bet is to stay focused on your investment strategy and goals and look beyond short-term events.” Market timing is tempting, but tricky Investors aren’t just losing sleep over which party wins the election. The MassMutual financial professionals surveyed said some clients are concerned about stock market volatility and a potential economic recession. That’s potentially more likely if the outcome of the election is contested and drawn out. Fox’s advice? If your tolerance for risk has changed, you can revisit your portfolio strategy. If not, and your asset allocation still reflects your time horizon and financial goals, stay the course no matter how the markets move in the aftermath of the election. Remember, she said, long-term investment projections assume that not all market years are positive. Those who continue to make regular contributions to their retirement plan regardless of market volatility help to smooth their average purchase price by ensuring that they buy some stocks when valuations are high, and some when valuations are low — a concept known as dollar-cost averaging. Not all who seek to sell their equity positions and build cash-on-hand this fall are motivated by fear. Some are opportunists who expect the election (whatever the outcome) to fuel market losses, if only temporarily, and don’t want to "miss an opportunity” to buy on a dip, the survey revealed. Some financial professionals pointed out that it may be tempting for some investors to take some profits now on highly appreciated stocks, given the market’s run up since late March. However, the majority maintained that buy-and-hold investors should keep their money invested. Market timing, they agreed, is generally not a successful long-term strategy for building wealth. (Related: How you can win with a steady investment strategy) That doesn’t preclude investors, however, from being tactical, said survey respondent Thomas Cornfield, a financial professional with Generational Financial Group in Southfield, Michigan. “Keep a long-term perspective: be conservative with near-term assets, more aggressive with long-term assets, and use tactical management and/or contractual guarantees,” he said, noting financial services products, such as annuities, provide guaranteed income during retirement in exchange for an upfront payment and can potentially help reduce a retiree’s exposure to market risk. Investors are understandably nervous as Election Day approaches, but their portfolios may not much care who gets named the next president. Trust your long-term strategy, review your financial picture for potential tax ramifications, and take emotion off the table by seeking out sound guidance. Discover more from MassMutual… How to avoid moving into a higher tax bracket Understanding variable universal life insurance Need financial advice? Contact us __________________________________________ 1 U.S. Bank, “How presidential elections affect the stock market,” 2020.
https://blog.massmutual.com/post/election-survey-massmutual-solutions
A lot of people consider themselves emotional investors. They buy stocks because they're fans of the companies behind them, and they're tempted to sell stocks when market conditions take a turn for the worse. Being an emotional investor could have a negative impact on your portfolio, though. For one thing, it might drive you to make rash decisions that lead to losses -- such as selling off stocks during a market crash. Also, while investing in companies whose businesses you know and understand is actually a good thing, there are other considerations that should go into your investing decisions. These include how well those companies are doing financially, what their management teams look like, and what risks and opportunities they face in the coming years. If you've been known to let emotions dictate your investment choices, here are a few ways to avoid getting hurt in the process. 1. Know how to vet a stock Whether you're a fan of a company or not shouldn't really matter when it comes to investing. You might shop often at a given retailer, but if its sales numbers have been on a steady decline and its outlook is poor, that's not a stock to add to your portfolio. Aim to familiarize yourself with some of the different metrics you can use to research a stock from a financial standpoint. These include: - Revenue - Net income - Debt - Earnings per share (which measures profitability on a per-share basis) - P/E ratio (which takes a stock prices and divides it by earnings per share) 2. Commit to an investing pattern Many investors have success with a system known as dollar-cost averaging. With dollar-cost averaging, you commit to investing a certain amount of money at preset intervals, regardless of what stock values look like at that time. You might, for example, decide to put $200 a month into a specific S&P 500 index fund, whether its value is up or down. Or, you might choose to buy $200 worth of a specific company, regardless of what its most recent earnings report looked like. The whole point of dollar-cost averaging is to take emotions out of the equation. And often, if you stick to that system, you'll end up paying less per share than you would by trying to time the market. 3. Shore up your emergency fund When your portfolio value starts to decline, you might panic and sell off stocks before things get worse. After all, what if you need that money in a pinch? If so, you can't afford to let your balance continue to drop. But if you make a point to sock away a separate pile of cash in a savings account for emergencies, you may not need to give in to fear as much. Ideally, you should have enough cash outside of your investments to cover a minimum of three months' worth of bills. For better protection, aim for six months' worth. 4. Don't invest money you might need soon As a general rule, it's a good idea to only invest money in stocks that you don't expect to need for seven years or longer. The logic there is that you'll have plenty of opportunities to recover from market downturns during that long a window. This means that if you're hoping to buy a home in three or four years, you shouldn't put your down payment into stocks and hope for the best. Some people are wired to be more emotional than others. But when it comes to selling and buying stocks, that could hurt you. If you tend to be an emotional investor, aim to adopt these tips to grow your wealth steadily without getting hurt financially.
https://www.fool.com/investing/2022/01/01/if-youre-an-emotional-investor-heres-what-you-need/
December Market CommentaryDecember 1st, 2017 by Anchor Bay Capital's Investment Team This month’s commentary contains: A note from Scott Spiering, Chief Portfolio Manager Should I Invest while the Market is High? by Tanner Wrisley, Associate Portfolio Manager A note from Scott Spiering, Chief Portfolio Manager Multi-year highs have been reached across most global stock markets with many investors believing it’s a result of an economic recovery worldwide. Corporate earnings, low interest rates and healthier economic data have contributed to this global rally in 2017. The Dow Jones has recorded the most new highs this year, in fact the most it has experienced since 1995. The Nasdaq has experienced a 28% gain this year as well as 69 new highs, the most ever in a single year. According to the Wall Street Journal “the U.S. economy has benefited, registering its best six months stretch of growth in three years.” The return to growth and reduced market volatility are in part a result of Federal Reserve policy which has kept interest rates low following the recession. There is plenty of optimism as low market volatility has resulted in many investors buying stocks notwithstanding high valuations. At this point, it is important to be prudent with investment moves as there will inevitably be a correction of these high valuations. This article from Bloomberg Markets explains some of the key factors that may result in a return of volatility: “It has seldom been the case that equities, bonds and credit have been similarly expensive at the same time, only in the Roaring ’20s and the Golden ’50s,” … “All good things must come to an end” and “there will be a bear market, eventually” We remind you that we have made modifications in most of our portfolio models by taking some profits and adding some liquidity. This means that we have sold some stocks that have gains and moved this money to cash equivalents. This will allow us to repurchase those stocks in the moments that we see some better values in the market. We may continue to see growth in the short term, however as noted above, valuations have become much higher recently, with many of the same cyclical stocks. Because of this we have implemented a stop-loss strategy with several companies that have produced strong returns in the current market cycle. A stop-loss order is an order to sell a security when it reaches a certain price. This strategy will allow us to put some downside protection on some of these investments that have produced the largest gains over this year. Finally, this month we will be exercising tax loss strategies in taxable accounts in order to reduce your tax liabilities. Should I Invest While the Market is High? By Tanner Wrisley, Associate Portfolio Manager Over the past few years I have spent time as an intern here at Anchor Bay Capital, providing research and analysis on markets and investments. After graduating from Harvard University with a degree in Economics, I have now become a full-time member of the investment committee providing support to our Chief Portfolio Manager, Scott Spiering. I am a very passionate about investments and I am excited to be a part of this team at Anchor Bay. I look forward to sharing insight with you about our investment process and concepts that will help you better understand how to optimize your investment experience. This month I wanted to discuss a question that has been more common as the stock markets continue to reach new highs. The question is: “Should I invest right now while the market is high, or should I wait until there is a market downturn to get into the market?” This question is a bit complicated because the answer largely depends on your personal situation. However, if you are looking at investing money right now with dollars that are not already in the stock market, it is a good time to discuss Dollar Cost Averaging as a way to start putting your money to work. Dollar Cost Averaging- This is an investing strategy used by investors to allocate a fixed dollar amount to a given investment on a regular schedule. Two factors that often negatively impact the performance of an investor are bad timing and emotion. If implemented properly, dollar cost averaging can help take these out of the equation. Here is an example: Let’s say an individual wants to invest, using dollar cost averaging, in ABC stock which is currently priced at $50 per share. They decide they want to invest $200 per month to this stock. In the first month, they would buy 4 shares with an average cost of $50. If the price then went down to $40 per share in the next month, then they could buy 5 shares. If the price in month 3 went to $25 per share, then the investor would buy 8 shares. At the end of the 3 months, they would have 17 shares for an average cost of $35.29 per share – much cheaper than the initial $50 per share. Implementing a dollar cost averaging strategy forces an investor to stick to a regimented investing schedule, taking out questions about market timing. This is a useful strategy to think about given the current market climate. With stocks at or close to all-time highs, using a dollar cost averaging strategy of investing can help one stay focused on their long term financial goals, and not worry about trying to buy at the lowest lows and sell at the highest highs.
https://www.anchorbaycapital.com/december-market-commentary/
The stock market is incredibly difficult to predict in the short term. The market will decline on plenty of days, weeks, months and years — sometimes drastically so. No matter what prices do, it’s important to keep your eye on the retirement prize: Investing for retirement is a marathon. Money expert Clark Howard’s investing advice virtually never changes whether the stock market is rising or falling. In this article, I’ll provide context that may help you avoid selling your stock market investments at the wrong time. I’ll also pass along Clark’s advice for times of market turmoil. Table of Contents - The Stock Market Sometimes Crashes - Create a Long-Term Investing Plan and Stick to It - Explaining Dollar-Cost Averaging The Stock Market Sometimes Crashes If you track the stock market long enough, you’ll probably witness an epic crash. It happened near the onset of COVID-19, during the global financial crisis of 2007-08 and when the dot-com bubble burst in the early 2000s. If history is any indication, it could happen again relatively soon. However, the U.S. stock market has shown incredible resilience for the last 80+ years. “Markets, even after a painful decline, eventually recover,” Clark says. “The younger you are, the more a decline in the market ultimately makes you money down the road, because you’re buying everything on sale for what, over your working lifetime, will probably recover many times over.” If you could sell the minute before one of these crashes happens and buy the minute we reach the low point, that would always be better than simply holding. However, it’s essentially impossible to do that. Anything other than perfect timing can cause you to miss huge gains, create an ROI-wrecking tax burden and perhaps equally as bad, cause you emotional turmoil and anxiety. How Often Do Corrections Happen? Pullbacks and corrections happen even more often than crashes. They’re healthy for the market in many cases. The S&P 500 experienced a decline of at least 10% in 11 of the 20 years from 2000 to 2019, with an average decline of 15%. However, the market averaged a 6% gain in those 11 years that experienced big intra-year declines. During that 20-year period, the S&P 500 averaged an 8.9% annual return. So in the years with major market pullbacks, the remaining parts of those years were more lucrative for investors than the years with no double-digit decline. There are plenty of other stats that back up these points. Often the biggest stock market gains happen within a concentrated number of days, often in close proximity to a recent decline. If you try to time the market, it’s just as easy to miss those good days as it is to avoid the bad ones. Create a Long-Term Investing Plan and Stick to It If you’re susceptible to making emotional decisions when your investment portfolio is bleeding money (on paper), you may want to consider hiring a financial advisor. Most financial advisors charge about 1% annually, which can be a huge amount of money over decades. But Clark says, for people who may panic sell at the bottom of the market, it’s probably worth the 1% and more. “When the market goes through its inevitable swoons, a lot of people react emotionally and at that point, the main job of the financial advisors is to talk them off the cliff,” says Clark. “The hand-holding when the chips are down becomes a very valuable thing for a certain segment of the people who would panic sell.” If you’re going to manage your investments by yourself, it’s important to create a logical financial plan. From there, you need to be able to stick to that plan come hell or high water in terms of short-term market pricing. If you’re getting closer to retirement, and you’re invested in a target date fund (as Clark recommends), the fund will automatically move away from stocks and lower your risk profile. So you don’t have to worry about an ill-timed crash crushing your retirement plan if you’re in a target date fund. Still far from retirement? Allowing the market to recover on its own is almost always the least risky choice. “As long as you are invested for the right reasons — saving for your long term — and your money is diversified in a way that’s appropriate to your age, just ignore the headlines and hang in there,” Clark says. Prepare for Crashes by Following Sound Financial Practices Especially when the market is booming, it can be easy to invest too much of your net worth. For example, Clark recommends that everyone work toward building an emergency fund with six months of living expenses. If all your investments are continually skyrocketing, maybe you’ll be tempted to take three months of expenses out of your emergency fund and put it in the market. The problem is that you may be putting yourself in a nerve-racking position when the market inevitably crashes. What if you lose your job or incur some other significant and unexpected expense? If the market is now screaming downward, you may be tempted to sell into the panic. It’s important to be prepared emotionally and financially in the event that a crash lasts for years. How big of a crash would it take for you to feel uncomfortable simply waiting it out? And for how long would you feel comfortable doing so? It’s good to prepare for those types of eventualities. Clark’s advice to hold through all the ups and downs is sound. But if you feel like you’re at risk — because a major crash would cause you to sell at a bad time — you may want to consider putting more of your net worth into something more liquid. Explaining Dollar-Cost Averaging Whether you invest in a target date fund, in low-cost index funds or in some other strategy, there’s a good way to avoid investing only when the market is peaking. It’s called dollar-cost averaging. If you accept that most people aren’t going to predict short-term market movements in a way that’s going to lead to easy profits, this becomes easier. With dollar-cost averaging, you simply invest a portion of your income each month or each paycheck. If your plan is to invest it all in a target date fund, just put 100% of your investible income into that fund each month. Sometimes you’re going to buy at a market high point. Sometimes you’re going to buy at a market low point. By investing consistently over time, it’s likely that your “good” and “bad” entry points will average out. So with dollar-cost averaging, you can eliminate the risk of buying into the market at the worst time — or holding your money looking for that perfect entry point while those already in the market enjoy gain after gain. Final Thoughts Watching your net worth dissolve in huge chunks is disconcerting at best, no matter how much investing experience you have. Reacting emotionally to stock market prices is nothing to be ashamed about. It’s just important to separate your financial decisions from those emotions whenever possible. When it comes to investing for retirement, that means sticking to your long-term plan and not letting current prices or market conditions change what you’re doing.
https://clark.com/personal-finance-credit/investing-retirement/stock-market-down-sell-stay/
What Happens When You Trade Stocks Emotionally? Glenn Stok writes about investment and risk-control strategies he perfected in 45 years trading stocks, options, and futures contracts. I've been trading stocks and options for over 45 years and discovered that eliminating emotional trading is the trick to be successful. I'll explain how emotions negatively affect trading decisions and how to improve your results by learning to use a well-defined plan. How Emotions Affect Investment Decisions When we trade on emotion, we tend to do the wrong thing for the wrong reason. For example: - We buy a stock in hopes that it will go up. Then it goes down, and we hold on because it would hurt our ego if we had to admit we were wrong. - We tend to buy too high at times because we see a stock going up, and we want to get in on the action. We end up buying at the highest price out of greed, and then the stock tumbles. - We don’t want to admit we are wrong, so we ride a bad trade down, making it even worse. - We do get out at some point, but not when we should. We get out when we reach our pain threshold. As you can see, when trading stocks on emotion, we tend to do the wrong thing. Instead, we can improve results by entering and exiting every trade based on a specific, well-defined plan and sticking to it. Self-discipline is essential for successful trading. So let's review all that in detail. How to Take Emotions Out of Investing The only way to control emotions with stock trading is to make investment decisions based on a well-defined plan. That is known as mechanical trading. I’m not talking about using software or any process that runs automatically. I’m talking about making your actions follow a strict rule of implementation. It’s a strategy where you don't need to think. Entering and exiting every trade is based on specific rules. So you do it mechanically, no matter what else may affect your decision. You might still be emotional about price movements, but as long as you’re diligent about following a well-defined plan, no matter how you're feeling about it, you will be more in control of ultimate success. When you have a pre-defined plan, and you follow it instead of letting your emotions get in the way, you can increase your chances of buying low and selling high. That's how to avoid selling low out of panic or buying high out of greed. To explain that another way, you need to exercise a buy and sell protocol that does not involve any decision-making. How to Implement a Mechanical Trading Plan You can do this with any stock, but I'll use the S&P 500 (symbol SPY) in my examples. That's an Exchange-Traded Fund (EFT), an index of 500 stocks in the S&P that you can buy and sell just like a single stock. Based on your level of risk and the amount you have available for trading, choose an amount you want to invest on an ongoing basis. For the sake of this example, let's say $200 per month. Start by buying $200 of SPY on the first trading day of next month. Then, on the first trading day of every month, do one of the following: - Buy $200 worth of SPY if the SPY is lower than it was on the first trading day of the prior month. - Sell $200 worth of SPY if the SPY is higher than it was on the first trading day of the previous month. You might need to round up or down since SPY does not trade in fractional amounts. You may use a different quantity for each trade and use a different period other than monthly. Whatever you do, keep it consistent—that's being mechanical. Some brokers will let you specify the dollar limit, and they will adjust the shares accordingly, as shown in the example below: Trading at a Specific Time of Day Is Crucial Too Always make the trade at roughly the same time of the day as well. Otherwise, you’ll let emotion play with your decision. You’ll find yourself deciding to wait an extra hour or two on a fast-moving day, thinking you’ll get a better price. That can help, but it can also go against you. Remember, when you let your emotion guide you, anything can go wrong. Whenever you buy a stock or ETF, there is always a 50/50 chance of the price going up or down. So it makes no sense to wait for a better entry or exit point with odds as even as that. Adjust for Commissions Many online brokers no longer charge trading commissions on actively traded stocks. Check with your broker. They might also have lower fees for EFTs. If you do pay a commission, placing larger trades will reduce the cost. Calculate that into the price when executing the plan to buy or sell a fixed amount each month. Whatever amount you decide to use, keep each monthly trade the same. At least as close as you can when rounding to whole shares. Don’t Overthink Anything By being mechanical, you'll never manipulate things against the rules. You already made your plan—stick to it. Don’t change the amount of investment. You can use any amount, but don’t increase it because you're becoming greedy, and don't lower it out of fear if the stock is dropping. I'll explain why these emotional responses work against you. One month SPY may be so far down that you want to double your next investment. But don’t do it. It may be lower the following month. You already would be getting more shares because you're investing a fixed amount each time. Be happy with that. It's known as dollar-cost averaging. What if the stock goes higher? At first, you're upset that you didn't put more into it. Right? Then you want to put more into it because you feel you want to catch up. That's greed! A trick I use is to ask myself, "Am I doing this out of greed?" But when I stick to a plan, I don't even need to think about it. The beauty of mechanical trading is that you don’t need to think. You don’t need to follow trends. Just carry out your trades according to the plan—mechanically! What’s the Benefit? If you follow the plan I explained earlier, you will always be buying low and selling high. Thus, you will continuously be taking some money off the table at a profit rather than holding too long until things turn against you. You will also be dollar-cost averaging as you buy more shares at lower prices and take some money off the table at higher share prices. That also creates a routine of recycling your funds. What Can Go Wrong? Nothing is a sure thing. World events can negatively affect markets. If the stock or ETF keeps going lower and lower, you could find yourself investing $200 endlessly every month until you have nothing more to invest. And you'd never have the opportunity to take money out at a profit. Of course, the theory is that the stock market won’t go to zero. But to be honest, one never knows. You may need to change your plans if a crisis develops, such as war. That's the only time you'd sway from the method of this mechanical plan. Recap of What to Remember Develop a specific pre-defined plan that you can follow without thinking. Then follow these rules: - Trade on the same day each month. - Trade at the same time of the day. - Enter trades mechanically based on the plan, not on emotion. Emotions always cause us to ignore a known strategy. You'll see better results when you trade consistently according to a specific plan. This article is accurate and true to the best of the author’s knowledge. Content is for informational or entertainment purposes only and does not substitute for personal counsel or professional advice in business, financial, legal, or technical matters.
https://toughnickel.com/personal-finance/How-to-Avoid-Emotional-Stock-Trading-by-Being-Mechanical
This program reads two matrices or permutations and writes their product to Result. The input files must contain two compatible objects, i.e., their product must be defined. Currently, zmu can handle the following data types: | 1 1 | | 2 2 | (1 2 3) * | 2 2 | = | 3 3 | | 3 3 | | 1 1 | With these conventions, products between matrices and permutations are defined in a consistent way. The associative law a(bc)=(ab)c holds whenever ab and bc are defined (a,b,c being matrices or permutations). A permutation matrix created with zcv or zcf, if multiplied with another matrix, produces the same result as the original permutation. In the case of two matrices, a blockwise multiplication can be performed using the "-r" and "-c" options. If one or both of these options are specified on the command line, zmu will read only some rows of A and/or some columns of B. Multiplying the two pieces together yields a rectangular piece of the result. By default the result is divided into 4 pieces of (almost) equal size. To calculate the 4 pieces successively, type zmu -r 1 -c 1 m1 m2 tmp11 zmu -r 1 -c 2 m1 m2 tmp12 zmu -r 2 -c 1 m1 m2 tmp21 zmu -r 2 -c 2 m1 m2 tmp22 The resulting matrices `tmpXX' can then be pasted together using zpt: zpt -R 2 -C 2 result tmp This procedure can be used in a multi-processor environment where each piece of the result is computed on a separate machine. By adding an additional parameter to "-r" and/or "-c" you can control the number of vertical or horizontal slices. For example, zmu -r 3/5 means to cut A horizontally into five slices and use the third slice for multiplication. The number of slice must not be greater than the number of rows.
https://users.fmi.uni-jena.de/~king/SharedMeatAxe/prog_zmu.html
Definitions for "Psychodynamic psychotherapy" Keywords: psychoanalysis, unconscious, psychotherapy, anxiety, twice A form of psychotherapy that concentrates on working through unresolved conflicts from childhood. a modified Freudian approach that considers early experiences and unconscious influences on shaping behavior. ( Related information) Based on the principles of psychoanalysis, this therapy is less intense, tends to occur once or twice a week, and spans a shorter time. It is based on the premise that human behavior is determined by one's past experiences, genetic factors, and current situation. This approach recognizes the significant influence that emotions and unconscious motivation can have on human behavior.
http://www.metaglossary.com/define/psychodynamic+psychotherapy
Individual therapy is a process in which we work closely together to unfold emotions, thoughts, and behaviors that are impacting your daily functioning, relationships and sense of self. “I offer a safe, affirming space to unfold and generate new possibilities for feeling, thinking, and being. I offer an empathic and encouraging environment to increase your self-awareness. I will work with you to unearth the hidden roots of your struggle and to explore ways in which inner conflicts trouble the present. Over time, self-discovery can yield not only insight but also relief from pain and confusion.” I believe that lasting change necessitates addressing the emotional, cognitive, and behavior aspects versus focusing on only problem solving and quick-fix solutions. Treatment Methodology Schema Therapy Cognitive Behavioral Therapy (CBT) Dialectical Behavioral Therapy (DBT) & Rational Emotive Behavioral Therapy (REBT) Attachment Theory & Psychodynamic Therapy Personalized Treatment My approach is rooted in theories and modalities emphasizing attachment theory, emotion-focused, and schema therapy approach. Contact me for more detailed information about each approach.
https://paulsheesleylcpc.com/individual-counseling/
*The boundaries shown and the designations used on the above map and included in lists, tables and documents on this website do not imply official endorsement or acceptance by the United Nations or UNDP | References to Kosovo* shall be understood to be in the context of UN Security Council resolution 1244 (1999). Technical team - Climate Strategies and Policy Programme Cross-cutting programme(s) - Climate Change Adaptation Programme Technical area(s) N/A Landscape(s) - Human altered areas Sub-landscape(s) - Industrial site Transformed sector(s) - Energy - Coal - Transportation UNDP role(s) - Convening / Partnerships / Knowledge Sharing - Data collection and analysis - Policy advice Strategy - Monitor inventory - Law regulation - Capacity building Sub-strategy - Environmental accounting - Data quality - Impact assessment - Laws/ Policy/ Plan formulation - Standards/ Labeling/ Guideline - Partnerships - Awareness raising - Technical capacity building - Institutional capacity building Social inclusion - Local community/CSOs - Private sector Gender equality N/A Gender result effectiveness scale - Gender targeted Pathway(s) - Systems pathway Risk reduction target(s) - Hazard control/mitigation SDG target(s) - 9.5 Enhance scientific research, upgrade industrial capabilities - 13.1 Strengthen resilience, adaptive capacity to climate-related hazards Conventions and protocols - United Nations Framework Convention on Climate Change (UNFCCC) Private sector(s) N/A Hot topic - Multi-stakeholder collaboration - Food and agricultural commodities strategy About this project Description This project is to enable China to fulfill its commitments under the UNFCCC to prepare its Third National Communication (3NC) and Initial Biennial Update Report (BUR) and to gradually establish a supporting system of developing NCs and BUR in accordance with the Guidelines for the Preparation of National Communications from Non-Annex I Parties (17/CP.8) and Biennial Update Reporting Guidelines for Non-Annex I Parties (2/CP.17) adopted by the Conference of Parties (COP). Based on the experience and lessons learned from the previous two NCs, the project will broaden and consolidate the network of stakeholders, including those in the government, research and education institutions, associations, social groups, enterprises, individuals and NGOs, enhance technical capacity of national experts, and strengthen the institutional framework for the preparation of NCs and BURs. Furthermore, the project will place greater emphasis on relevant policies on mitigation of and adaptation to climate change and the results of their implementation, promote the establishment and improvement of the domestic systems for measurement, report and verification, so as to enable China to effectively address climate change in the process of pursuing national sustainable development.The project will develop comprehensive national Greenhouse Gas (GHG) inventory of 2010 and 2012, with extended categories and sources of GHG emissions and reduced uncertainties of the inventory. It will further improve the national GHG inventory database management system, with a view to administering inventory data in a more scientific way and making the preparation of GHG inventories a continuing process. The project will further improve the approach for projecting GHG emissions in China, and estimate China's CO2 emission from energy activities in 2025. It will also identify key impacts of climate change and corresponding adaptation measures, describe relevant policies and measures which China adopts to address climate change, and introduce the activities of enhancing public awareness on climate change. It will provide relevant information on addressing climate change by Hong Kong and Macao. The project will lead to the submission of the 3NC and BUR to the Conference of the Parties (COP) to the UNFCCC. Objectives Strengthened capacity in integrating climate change concerns into national and sectoral development priorities while fulfilling obligations to the UNFCCC.
https://www.undpopenplanet.org/projects/Enabling_China_to_Prepare_Its_Third_National_Communication_3NC_to_the_UNFCCC/
Resiliency gets boost from FHWA via $7.3 billion program In an effort to combat the effects of climate change and address the growing costs of extreme weather events, the U.S. Department of Transportation’s Federal Highway Administration (FHWA) today announced $7.3 billion in funding to help prepare for extreme weather events. The new Promoting Resilient Operations for Transformative, Efficient, and Cost-Saving Transportation (PROTECT) funding is available to make transportation infrastructure more resilient to future weather events and other natural disasters by focusing on resilience planning, making resilience improvements to existing transportation assets and evacuation routes, and addressing at-risk highway infrastructure. In general, eligible projects include highway and transit projects, bicycle and pedestrian facilities, and port facilities including those that help improve evacuations or disaster relief. States are encouraged to work with regional and local partner organizations to prioritize transportation and emergency response improvements, as well as address vulnerabilities.
https://blog.bayareametro.gov/posts/resiliency-gets-boost-fhwa-73-billion-program
Nowadays around the world, pipeline systems are the most common method to transport oil, gas and other related products associated to their own production and extraction processes, mainly due to its proven reliability and effectiveness (Hopkins, 2009). However, the very nature of the oil and gas industry carries a constant potential risk around the processes involved. Pipelines could fail for many reasons, including: fabrication or installation flaws, incorrect operation, leaks caused by pipeline corrosion or theft, etc. Any unmitigated threat or unknown exposure could develop a failure, and it could potentially lead to extreme dangerous consequences for the company, the environment, and even to our human life. Pipeline owners, and companies are compelled to monitor, assess and manage those associated risk and its components (Muhlbauer, 2006). Last decade, in Mexico alone, there have been more than two thousand incidents related to oil pipelines and facilities (PEMEX, 2011; SSPA, 2008). This is why the decision-making process, key factor in most industries, needs constant, accurate and updated feedback in order to prevent, as much as possible, future hazardous events. The oil transportation and distribution systems are usually assessed from different perspectives aiming to evaluate, timely and accurately, the current pipeline integrity. Although there are different tools and methods to assist the decision-making process, risk assessment has become fundamental for financial analysis (Chang, 2014). It is important to coordinate efforts to provide improved resources in order to avoid incidents, including damage reduction, human losses and environmental disasters prevention caused by these failures. Consequently, oil industries and other companies closely monitor risks associated with their operations because risks that are not controlled nor assessed could produce costly outcomes. Accurate knowledge about the company’s current operational condition, history and future projections can provide a powerful business advantage. Furthermore, there are three critical elements to consider when performing the pipeline integrity assessment (Muhlbauer, 2006): Risk of Failure (RoF), Probability of Failure (PoF), also known as Likelihood of Failure (Godoy, 2011), and Consequence of Failure (CoF). Risk of Failure depends on the PoF and CoF and defines the possibility of any hazardous event to happen. It also determines the possible, and extent of impact that it could cause. Hence the importance of risk models that provide solid information about the current condition on both sides of the equation, cause and consequence of a possible pipeline failure. The oil industry, both Mexican and international, are extremely relevant in the global economy. Governments, universities, public and private organizations, and research institutes are continuously making enormous efforts to create state of the art advances related to the industry. These include methodologies and procedures, real time monitoring systems, data acquisition and management systems, decision support systems, AI based applications, Big Data frameworks, etc. PEMEX, Mexican Petroleum, which is the leading company on oil extraction and transport in Mexico, regularly enhances and updates its systems, techniques, methodologies and protocols to ensure the safe and correct operation of the Mexican pipeline systems. This project started from the need to continue those updates, and with the ambition to provide alternative systems to help risk reduction by assisting the company to make smarter choices. The Research Centre for Engineering and Applied Sciences (CIICAp) at the Morelos State Autonomous University (UAEM) in collaboration with the Physical Sciences Institute (ICF) at the National Autonomous University of Mexico (UNAM), and the National Technology and Science Council (CONACyT) supported this particular project.
https://www.igi-global.com/article/implementing-genetic-algorithms-to-assist-oil-and-gas-pipeline-integrity-assessment-and-intelligent-risk-optimization/189176
With cities continuously more threatened by climate change-induced disasters, urban planning’s reflex response is to protect cities against nature. But what if the solution lies in working with nature instead against it? Architect Kongjiang Yu invites readers to imagine what cities could look like if they took into account ancient wisdom on spatial planning. As disasters wreak havoc all over South Asia, health impacts have increasingly emerged as a major concern for communities and governments in the region. It underscores the need for concerted efforts towards building synergies between the Paris Agreement, the Sendai Framework for Disaster Risk Reduction and the 2030 Sustainable Development Agenda, particularly now, in the post-disaster reconstruction phase, to ensure “building back better” and future disaster prevention. To fight illegal coca plantations and conflict actors’ income sources, Colombia’s president wants to loosen the ban on aerial glyphosate spraying. However, considering the dynamics of organised crime, the use of toxic herbicides will not only fail to achieve its aim, it will have many adverse effects for the environment and human health, fundamentally undermining ways to reach peace in the country. International cooperation and national policy-makers need to account for this peace spoiler. Jair Bolsonaro, Brasil’s current de facto presidential frontrunner, says he would withdraw Brazil from the Paris Agreement if he wins the October election. The withdrawal of such an important developing country, home to the world’s largest rainforest, would deal a blow to international climate cooperation. Bolsorano’s opposition to the international pact has drawn criticism from the UN’s environment chief. As Day Zeroes are becoming commonplace across the world, India needs to prepare itself for its worst-ever water crisis by establishing a network of water policies and programmes, ranging from community engagement to multilateral/bilateral collaboration. In May 2018, the Brazilian Institute for Climate and Society and the German Embassy in Brazil hosted an event on international climate and security in Rio de Janeiro. The meeting, joined by experts from the public sector, civil society and international think tanks, reflects Latin America’s increased interest in the international dimension of climate fragility risks. Intensive international cooperation is a key prerequisite for successful and ambitious global climate action. Russia, one of the world’s top 5 greenhouse gas emitters and the second largest producer of crude oil and natural gas, has long been regarded as one of the major veto players in international climate politics. Nevertheless, during the last decade climate awareness among Russian policymakers and other relevant stakeholders has increased dramatically. This is illustrated by the fact that the updated Strategy of National Security of the Russian Federation refers to climate change as a threat to national and public security. The Paris Agreement gave the Russian climate policy a new strong impetus. Cities matter in international climate politics despite being non-state actors. How can their role be strengthened to take forward the world climate agenda? Gianna Gayle Amul and Maxim Shrestha make a case for more city climate diplomacy. Reconciliation with Latin America’s strongest left-wing rebel group, the FARC, will test Colombia’s resolve to see through its climate policies, the government said on Monday. Cities need to be recognized, increasingly more so for their role in implementing necessary and timely action to address the impacts of climate change where it matters – at the local level. With majority of the global population living in urban environments, cities are major sources of carbon emissions as well as highly vulnerable to climate impacts. The involvement and participation of cities and urban localities are therefore important and required in terms of both climate adaptation and mitigation efforts.
https://www.climate-diplomacy.org/news?f%5B0%5D=field_region_topics%3A847&f%5B1%5D=field_topic%3A1997&f%5B2%5D=field_region_topics%3A845&f%5B3%5D=field_topic%3A797
After your system administrator has configured the Expenses App on your device, you can use it to record expenses while away from the office (e.g. on-site with a client, at a trade show, etc), then submit the expenses for review. Note: If your system administrator has not configured your aACE server for remote access, you will still be able to gather expenses in the Expenses App; however, you will not be able to submit an expense envelope until you return to the office. An expense envelope represents a collection of related expenses for the same event (e.g. a trade show). The expenses are the individual purchases you make during the event (e.g. airfare, meals, etc). In the past, the printed receipts for such expenses were collected in an actual envelope, which would be delivered to the supervisor for review. The terms used here are a vestige of these earlier business practices. To effectively organize digital expense information, the Expenses App is designed with three 'levels' of data: - Expense envelopes list view — The envelopes you have created on the app. Tapping an envelope title displays the expense items list. - Expense items list view — All items you have entered as part of a specific envelope. Tapping an expense title displays the details. - Expense item detail view — Specific information about a single expense item. On Open When you open the app, the expense envelopes list view is displayed. Expenses App Icons |Gear||Opens the settings popup where you can adjust network connections, configure the default job or line item code, and sync the app.| |Actions Menu||Displays a popover with additional controls for the app.| |Add||Creates a new envelope or expense item (based on your current screen).| |App Launcher||Closes the app and returns to the FileMaker App Launcher.| |List||Closes the expense items list and returns to the expense envelopes list.| |Back Arrow||Closes the expense item details and returns to the expense items list.| |Up/Down Arrows||Navigates between envelopes or between expense items in an envelope.| |Camera / Receipt||These icons toggle based on whether there is a photo currently attached to the expense item. If a photo is not yet attached, tap the Camera icon to access your device's camera. Otherwise, tap the Receipt icon to view the attached photo.| |Clear||Removes data from the current data field or closes the current popup.| |Trash||Deletes the expense envelope, the expense item, or the attached photo.| Create a New Expense Envelope You can create multiple envelopes for more flexibility (e.g. to separate billable items from non-billable). - At the expense envelopes list, tap Add (). - Tap the Envelope Title field and enter a specific title. - Optionally, tap the Envelope Notes field and enter details about the Expense Envelope. Add Items to an Expense Envelope You can add items to an expense envelope until you submit it. - At the expense items list, tap Add (). The app automatically opens your device camera. - Take a photo of the receipt. The app automatically returns to the expense item details. - Enter other details about the expense: - Item Description — Summarize what the receipt covers. - Camera/Receipt Icon — Tap to take a new photo or to review the photo currently attached to the expense item. - Date — Auto-populates with current date. Tap to select a different date. - Amount (required) — Enter the total figure for the expense. - Payment Method — Tap the correct selection to note the expense is out-of-pocket or on a company charge card. Note: For more information, read about Entering Credit Card Payments for Purchases. - Code (required) — Tap to select or change the relevant line item code. - Job — Tap to select or change the related job. - Notes — Enter any details needed to contextualize the expense item. - After entering data for one expense item: - Record another expense item — Tap Add again. - Navigate through other expense items you have created — Tap the Up or Down arrows. - Return to the expense items list — Tap the Back Arrow. Submit an Expense Envelope The Expenses App is designed for data collection, not data management. After you submit an expense envelope, you must log in to aACE to work with the expense records. - At the Expense Envelopes list view, tap the title of an envelope. - At the expense items list, tap Submit. - At the confirmation popup, tap Submit again. The envelope is transferred into aACE, along with any expense items, notes, or attached photos. If the Expense Envelope is valid, the Tracking Status is set to Submitted and a notice is sent to your expense approver. Note: Company-specific requirements and validations may apply (e.g. including a photo of the receipt). To confirm submission and review if the expense has been approved or rejected, you must log into aACE. Troubleshooting and Personalizing the App If you need to troubleshoot the data or update settings to customize the app for your personal workflows, please refer to the guide for configuring this app.
https://aace5.knowledgeowl.com/help/using-the-aace-expenses-app
Financial Coordination: Ensure that JSI policies and procedures, and donor contractual requirements are followed for all aspects of project office finance and operations; serve as primary point of contact with in country staff for monthly field account processing including review of documentation to ensure it is accurate and properly justified, provide feedback to the field office and ensure corrections are done in timely manner; review and process monthly cash flow requests, advance requests, expense reports, vendor payments, and expatriate staff allowances; assist the Finance and Operations Manager with financial management of project as needed (e.g. research/ request cost inputs, support budget preparation, projections update, expenditures tracking, etc.). Serve as a resource for JSI financial systems and tools, including FieldLink and Quickbooks. Financial Reporting/Invoicing: Prepare complete and accurate back-up documentation for donor invoices in accordance contractual requirements (as needed). Operations: Assist with the preparation and processing of consultant agreements, purchase orders, and vendor agreements, including obtaining bids and preparing purchase requests, and vendor selection justifications.; arrange for shipping of supplies and equipment; process advances and payments for all types including reviewing documentation and ensuring compliance before processing payment. Travel: Make flight and hotel bookings for staff and consultants; manage visa processing; request travel approval, as necessary; purchase insurance; review and process expense reports. Meetings/Events/Conferences: Provide administrative coordination for regular finance, admin and operations team meetings, including calls with field staff; assist with meeting logistics including scheduling, drafting of agenda, sending appointments, taking and circulating notes and following up on action items after meetings; support the preparation and logistics for special technical events such as conferences and workshops. New Business Development: Assist Center staff in the development of proposals and other new business development activities, including supporting the Finance and Operations Manager with the cost proposal development to ensure that all cost documents are drafted, formatted and submitted in accordance with RFP requirements; research or request budget cost inputs from the field and compile cost proposal documents (e.g., financial statements) according to donor needs/requirements. Filing: maintain print and electronic operating files and regularly update network drives; regularly file away field accounts in boxes for shipping off-site. Other duties as assigned. QUALIFICATIONS - Bachelors degree or 3-4 years of experience demonstrating ability in the knowledge, skills to perform the job required; - Proven finance, administrative and organizational skills preferred; - Previous experience backstopping overseas field offices preferred, including relevant in-country experience; - Ability to work independently and in groups, to manage multiple tasks concurrently, and to meet deadlines with attention to detail and quality; - Excellent interpersonal and team skills--demonstrated ability to interact professionally with culturally and linguistically diverse staff, clients, and consultants; - Strong oral and written communication skills; - Fluent spoken and written English required; - Willingness to travel as requested. Salary commensurate with experience. Interested candidates should submit their resumes and cover letters online by 03/27/2019. No phone calls please. Principals only please. JSI is an Equal Opportunity, Affirmative Action Employer committed to workplace diversity. We are committed to providing equal employment opportunities for all qualified applicants and employees without regard to age, race, color, national origin, ancestry, creed, religion, gender, disability, marital status, gender identity, sexual orientation, sexual preference, genetic information, political affiliation, or protected veteran status in any employment decisions. M/F/V/D If you are an individual with a disability, or a disabled veteran and unable to apply online for an available position, you may submit your request for reasonable accommodation by calling Human Resources at 617-482-9485. Please read this notice entitled Equal Employment Opportunity is the Law, and this "EEO is the Law" Poster Supplement.
https://www.jsi.com/JSIInternet/Careers/jobdescription.cfm?id=121246&intern=0
Rabobank has both internal requirements and obligations under the Anti-Money Laundering and Countering Financing of Terrorism Act 2009 to check in with its customers from time-to-time to ensure their information is accurate and up-to-date. Yes they are. The AML/CFT Act applies to all financial institutions, however they may have different methods of addressing these obligations. As a bank with a parent in Europe we also have to adhere to regulations in other jurisdictions. While Rabobank is providing clients with a digital online solution so that you can update your information, other banks may request this information when you visit a branch. If this is the property in which you reside in or if it is used for family holidays or agricultural purposes, then you do not need to consider it as Commercial Property. If you have lived in a country for three months or more, within the last three years, you will need to consider it as a country that you have lived in. Any country that you have either personal or business dealings with which involve sending payments to or receiving payments from that country. When you have logged into your account securely you will be presented with a pop up screen requesting additional information from you. The review can only be completed online through Internet Banking and not the mobile app. It is not compulsory to complete this immediately, you can skip it until a more convenient time. However, you are required to provide us the requested information. We will follow up with you by phone or email if this isn’t completed. Your details and circumstances can change over time. To continue to protect you from fraud and other financial crime, and so that we can continue to comply with the AML/CFT Act, we need to ensure that the details we have about you are accurate and up-to-date on an ongoing basis. If you decide not to provide the information, Rabobank may not be able to continue to provide you the services relating to your account. For more information related to this, click here and view section 16 of our Terms and Conditions. Rabobank New Zealand Limited is a subsidiary of Rabobank Nederland and is subject to supervision by the Dutch Central Bank in addition to local, New Zealand supervision. The Dutch Central Bank has issued a mandatory Policy Rule on integrity in investment property operations. This Policy Rule requires us to ascertain what, if any, commercial property holdings you may have and assess the integrity policy of your entity in relation to your activities in investment property. The Anti-Money Laundering and Counter Financing of Terrorism Act 2009 AML/CFT (2009) requires Rabobank to regularly review our customer’s information to ensure that we hold up-to-date and accurate information. For more information related to this, click here and view section 2 of our Terms and Conditions.
https://www.rabobank.co.nz/help-and-support/update-your-information/
Keeping family member emails up-to-date ..... click here for more information Email is the primary tool through which the College communicates with our families. It is therefore critical that we have the most accurate parent/guardian/carer email addresses at all times. We will provide families with opportunities to update personal, contact and medical details relating to the family and to your child/children at various times during the year - i.e. when your child/children are involved in upcoming excursions (through Consent2Go) and also at the start of each Term. Obviously if emails are not current this information will not get through. We encourage families whose email details have changed to contact our Office Reception either in person, via phone on 6245 0099 or email admin@mackillop.tas.edu.au MacKillop Catholic College is committed to ensuring the safety of our students, families and their information. If you advise us of a change of email address the school has a process in place to ensure that this is authenticated before further communication or information is sent. 2021 - MacKillop Bulletin 3, 2021 - Interim Reports 2021 and Family-Student-Teacher Conferences - Remember ...Continuation Survey ..... click here for more info - MacKillop Open Day - Wednesday, March 17, 2021 - Keeping family member emails up-to-date ..... click here for more information - MKC Bulletin 2, 2021 - Parents and Friends Meeting - Monday, March 1, 2021 - 4:00p.m.-5:00p.m. - IMPORTANT CHANGES TO THE 2021 COLLEGE SWIMMING CARNIVAL - TUESDAY, FEBRUARY 16, 2021 - Year 7 Meet the Tutor and SEQTA Engage Information Evening - MKC Bulletin 1 2021 - Canteen in 2021 via the QKR! App - Register/update your child/children's details .......
https://www.mackillop.tas.edu.au/news/2021/updating-of-family-member-emails-click-here-for-more-information
As a supplier, it is important to ensure your inventory is up-to-date so that retailers have the most accurate inventory information. As your inventory is updated on Spocket, this will be synced in real-time with online shops that are selling your products. If you have the Shopify integration enabled, all of your inventory is automatically synced with Spocket. If you want to update inventory on Spocket, follow these steps: - Log in to the Spocket Supplier App - Select My Products from the menu on the left - Choose the product you’d like to update and click Edit - Scroll down to the Pricing section and input the inventory for each variant If you want to bulk update your inventory, please contact our Customer Support team via live chat or email and we will coordinate the bulk update for you.
https://help.spocket.co/en/articles/3030788-how-do-i-manage-the-stock-levels-of-my-products
If you use the program frequently, make sure you're running the most recent version on your computer to avoid any problems. You will only be requested to update the app the next time you use it if you ignore this optional update message. 1. How to Update Zoom on Desktop Zoom updates itself automatically on Windows and Mac. Automatic updates are enabled by just turning on a one-time setting. If you're experiencing trouble updating, you can manually force an update within the app or download the most recent app file from the Zoom website. Zoom does not offer an automatic update option on a Linux computer. You'll have to rely on manual means of updating. a) How to Update Zoom Automatically (Windows and Mac) Enable a one-time option in the app to make Zoom automatically download and install app updates. Ensure you have administrator privileges on your computer because you'll need them to turn the option on. Begin by launching the Zoom application on your PC. Then click your profile symbol in Zoom's top-right corner. Select settings Select "General" from the left sidebar of the "Settings" window. In the right-hand box, select the Automatically Keep Zoom Up-to-Date option and press Apply. In the event that you are presented with a prompt from a system administrator, you must select yes. A drop-down menu appears next to the "Automatically Keep Zoom Up to Date" option, allowing you to choose how often you want to receive Zoom updates. The following are the choices: Slow: Zoom will receive fewer updates if you choose this option, but your app experience will be more stable. Fast: This choice will provide you with more regular updates, but it may compromise the app's stability. To save your changes, close the "Settings" window. b) How to Update Zoom Manually Force Zoom to look for and install fresh updates if you're on Linux or if it doesn't appear to be updated automatically on your Windows or Mac systems. To begin, start by opening Zoom on your computer. Then click your profile symbol in Zoom's top-right corner. From the pop-up menu, select Check for Updates to begin the process. A "Zoom Update" window will appear. Zoom will check for any available updates automatically. If a new version of the software is available, it will be downloaded and installed. If no updates are available, a notice reading "You are up to date" will appear. You can close the Zoom Update window if all of the updates have been installed or if there are no more updates available by using the Close button. And Zoom on your computer is now up to date. With the latest app version, you may now attend Zoom meetings. c) How to Download and Update Zoom If Zoom won't open on your computer or update using the in-app options, download the most recent Zoom app from the company's website and install it on your computer. This will ensure that you have the most recent version of Zoom. To do so, open your computer's web browser and go to the Zoom Download Center website. Click the large "Download" button on the website. This will install the Zoom application on your PC. Open the place where you saved the program and double-click the app file once it has finished downloading. Install the program normally, and after completion, you'll have the latest version of Zoom. Enjoy! 2. How to Change Zoom Background on Mobile Device a) How to Update Zoom on Android Go to the Google Play Store to keep Zoom up to date on Android phones. Open the Play Store on your phone to check for updates. Type "Zoom" into the search box at the top (without quotes). Tap "Zoom" in the search results. Go to the Zoom app page and tap the "Update" button to update the app. If this button isn't visible, your app is already updated. You've completed the task. b) How to Update Zoom on iOS You may upgrade the Zoom app through the official App Store on iPhone and iPad, just like on Android. To begin, go to your phone's App Store. At the bottom of the App Store, click "Updates." You'll find available updates for all of your apps under the "Updates" page. Find "Zoom" and hit the "Update" button next. If you don't see "Zoom" listed below, your phone is already up to date with the app. If you tapped the "Update" button, wait for the App Store to install it. Then, to get the most recent version of Zoom, launch it. Conclusion The corporation publishes fresh updates regularly to resolve vulnerabilities and flaws, but many users neglect to do so, leaving them open to cyber attacks. As a result, you must update your Zoom regularly using this approach.
https://www.kiwigeeker.com/how-to/update-zoom.html
Loop LDM includes the following functionality for both A-Series and C-Series devices: Version reporting capabilities for all managed devices (to include tracking of the three layers defined below) Complete auto-update mechanism of the Content on the device Reporting of kiosk Locked ("Guided Access" for A-Series) status Remote Screenshot capability (for investigations, debugging and verification) Devices Push Reporting Status Emails LDM Reporting The LDM framework enables remote monitoring and management of devices from the Loop admin pages. LDM Push Report The LDM Push (Devices) Report is intended to be an action-oriented report to support field-management of Loop Kiosk and Scoreboard devices in the field. The LDM Push Report is focused on issues that require staff action (for example, iOS updates, App updates or locking and unlocked kiosk device); all other responsibilities are managed by Benbria and the platform. The report must be scheduled as a new task (example below): The report will be sent only to users with the user permission ‘LDM Push Report’ enabled: The push report summary section appears as follows: And detailed ‘offending locations’ section as below: Definitions of terms used in the report: Established Locations: Locations that are configured, enabled, visible and have had a kiosk or scoreboard registered to that location. Unestablished Locations: Locations that are configured, enabled, visible but have never had a registered kiosk or scoreboard. Online: The device is connected (or has been within one hour of running this report). Offline: (not Online) Locked: The kiosk device is in Guided Access Mode (for A-Series hardware). OS up-to-date: The operating system version meets the current minimum (as configured by Benbria Operations). App up-to-date: The Loop Pulse application meets the current minimum (as configured by Benbria Operations). The app is available from and updated using the Apple iStore or Google Play for C-Series. [Attribute Fields]: Shown above is ‘business manager’ as an example – the option to include an attribute field in the report for additional expediency of resolution. LDM Detailed CSV Report A CSV report is attached to the push email report that includes full details of the above and more. This report can be manually generated from the Export page as well. Fields included in the detailed CSV report are as follows: Location:The name of the location. Store Number: The location's store number. Status: The status of the overall location, one of: Online - both Kiosk and Scoreboard are online. Partially Online - only one of the Kiosk or Scoreboard is online. Offline - neither the Kiosk nor Scoreboard is online. Unestablished - the location is configured but devices not yet connected. Location Enabled: Yes/No if the location is enabled. Enabled locations appear in reporting, LDM push reports and count towards licensing. Location Offline/Partially Offline X Hours Ago: If not online, the time (in hours) since it was last online. 72-hour Engagement Count: (aka "Loop Count") Count of unique customer engagements (either Conversations or Responses) over the past 72-hour period. Kiosk|Scoreboard Status: online, offline or "" of the device at the time of running the report (a device will show as 'online' if it is or was online within 30 seconds of report generation). Kiosk|Scoreboard Last Status Update: ISO-format time of the last status update received from the device. Kiosk|Scoreboard Offline X Hours Ago: If offline, the number of hours since the device was last online. Kiosk|Scoreboard Percent Connected: Over the viewing window (up to 30-days) the percentage of time the device spent in the 'online' state. Kiosk|Scoreboard Hours Connected (Max 30 Days): Total connected hours over the viewing window (up to 30 days). Kiosk|Scoreboard Hours Disconnected (Max 30 Days): Total disconnected connected hours over the viewing window (up to 30 days). Kiosk|Scoreboard Device: Device type name (e.g. "Apple iPad tablet"). Kiosk|Scoreboard OS: Device operating system name and version (e.g. "iOS 11.2.6"). Kiosk|Scoreboard Browser: Embedded browser name and version (e.g. "WebKit 604.5.6"). Kiosk|Scoreboard App Version: Loop App version number (e.g. "2.4.2"). Kiosk|Scoreboard Content Version: Loop Package content version number (e.g. "2.4.3"). Kiosk Locked: For A-Series iPad kiosks only (C-Series are always locked) and where 'locked' means in Guided Access Mode: Yes: The device is online and actively locked. No: The device is online and not locked. ?: The app App Version does not support accurate locked status. "": No information (e.g. device has never connected). (Optional Attribute Groups): Option to include one or more attribute groups to the export; each will appear as a column and if multiple members of a group are assigned to a given location, they will be comma-concatenated. Device Registration and Remote Loop Updates Benbria provides an Administrative Interface for triggering an update to Loop on remote kiosk and scoreboard devices. The interface allows global updates that reload all of the active devices, account updates to reload all of the devices for a specific Loop Customer account and updates to individual devices on the location level. When an update is triggered, the device fetches the latest version of the Loop along with the most recent configuration for the location (questions, video, background image and languages) from the server and refreshes the page. Device Connectivity States Detailed device connectivity status is made visible, including device connectivity status (online/offline) and cached status (latest software content downloaded and running, regardless of current connectivity situation): Device types, updates, and notes are also available. Search & Drill-down Multiple devices per location are supported: Remote drill-down into specific device diagnostics is available:
https://help.benbria.com/en/articles/3358770-loop-device-management
Legitimate genotype frequency estimation for multiallelic loci relies on component allele frequencies, as population surveys represent only a fraction of possible DNA profiles. Multilocus genotypes from two ethnic human populations, African American (n = 195) and U.S. Caucasian (n = 200), were compiled at 13 STR loci that are used worldwide in forensic investigation (D3S1358, vWA, FGA, D16S539, TH01, TPOX, CSF1PO, D8S1179, D21S11, D18S51, D5S818, D13S317, and D7S820). Sex-specific AmpFlSTR(TM) multiplexes provided stringent PCR-based STR typing specifically optimized for multicolor fluorescence detection. Heterozygosity at each STR locus ranged from 0.57 to 0.89 and encompassed from seven (TH01) to twenty-one (D21S11) alleles. Homozygosity tests, tests based on the distinct numbers of observed homozygous and heterozygous classes, log likelihood ratio tests, and exact tests assessed that the degree of divergence from theoretical Hardy-Weinberg proportions for all 13 STRs does not have practical consequence in genotype frequency estimation. Departures from linkage equilibrium, between loci, that imposed significance to forensic calculations were not indicated by observed variance of the number of heterozygous loci or Karlin interclass correlation tests. For forensic casework, reliable multilocus profile estimates may be obtained from the product of component genotype frequencies, each calculated through application of the Hardy-Weinberg equation to population database allele frequency estimates reported here. The average probability that two randomly selected, unrelated individuals possess an identical thirteen-locus DNA profile was one in 1.8 x 1015 African Americans and one in 3.8 x 1014 U.S. Caucasians. (C) 2000 Elsevier Science Ireland Ltd.
https://experts.unthsc.edu/en/publications/practical-applications-of-genotypic-surveys-for-forensic-str-test
Objectives. Recent genetic surveys including a genome-wide association study have identified CD40 as a susceptibility gene for several autoimmune diseases. This study was designed to investigate the association of CD40 gene polymorphisms with Behçet's disease (BD) and Vogt-Koyanagi-Harada (VKH) syndrome in a Han Chinese population. Methods. Two single nucleotide polymorphisms (SNPs), rs4810485 and rs1883832, were genotyped using polymerase chain reaction-restriction fragment length polymorphism in 373 BD patients, 519 VKH patients and 402 controls. A binary logistic regression analysis was applied to assess the influence of gender on the association of CD40 polymorphisms with BD. Results. Our results showed significantly increased frequencies of the homozygous rs4810485 TT and rs1883832 TT in BD patients as compared with the controls [Bonferroni-corrected P-value for gender adjustment (P a c) = 0.006, odds ratio (OR) = 1.98, 95% confidence interval (CI) 1.38, 2.83; Pa c = 0.012, OR= 1.73, 95% CI 1.22, 2.46, respectively]. A markedly decreased frequency of the heterozygous rs4810485 GT was observed in BD patients as compared with the controls (P a c = 0.042, OR= 0.68, 95% CI 0.51, 0.90). The genotype and allele frequencies of rs4810485 and rs1883832 were not different between VKH patients and controls. Stratification analysis did not find any association between the tested SNPs and extra-ocular manifestations of both diseases. Conclusions. The results suggest that TT genotypes of rs4810485 and rs1883832 may be predisposing genotypes for BD, and that the rs4810485 GT genotype may be a protective genotype for BD. The two tested CD40 gene polymorphisms are not associated with VKH syndrome in the investigated Han Chinese population.
https://ohsu.pure.elsevier.com/en/publications/cd40-gene-polymorphisms-confer-risk-of-beh%C3%A7ets-disease-but-not-of-2
Virtual Round Table I 29 September: 17.30- 19:00 BST Manufacturers are discovering just how critical supply chain agility and transparency is as they navigate through the current crisis. Supply chains optimised for cost have been rapidly reconfigured to prioritise resilience – underlining the need for flexibility, visibility and risk control across the entire supply chain. Supply chain management has never been more important. Join your peers for a discussion on how to successfully: Core discussion points: In partnership with: Nick is CEO of Hennik Group, publishers of The Manufacturer and organisers of Digital Manufacturing Week which includes Smart Factory Expo, The Manufacturer of the Year Awards and the Top 100 People in Manufacturing annual programme. He is also CEO of Carbon Offset Services, a start-up focused on enabling organisations to neutralise their carbon footprint through reforestation. In 1994 Nick started Ark Group (a publishing and events company) and grew it into a $30m global business before selling it to a FTSE quoted media company. He subsequently purchased The Manufacturer Magazine and in 2008 Nick was seconded into the Department for Business Innovation and Skills where he headed up the Manufacturing Insight project for the UK Government. He is a founder member of the IET Manufacturing Policy Panel, he sits on the IMechE Manufacturing Industry Division Board and was instrumental in the development of the Made Smarter project headed up by Juergen Maier. He is passionate about all aspects of advanced manufacturing and it making it as efficient, sustainable and profitable as possible. Sundar is a 20+ year Direct Materials and Supply Chain Management veteran and practitioner with Solutions/Customer Marketing, Product Management & Engineering experience, interacting with customers globally. Prior to working in the Enterprise Software Industry, Sundar worked in Manufacturing and Supply Chain in a variety of roles for Aerospace and Automotive companies. He has presented at past Sourcing Interest Group (SIG) events, ISM Supply Management Conference, Ariba Live conference, Procurement Leaders and Procurecon conference and has contributed to several Sourcing and Supply Chain focused blogs and magazines. Sundar holds a Master’s Degree in both Materials Science & Engineering and Mechanical Engineering from Wayne State University, Detroit, MI.
https://info.themanufacturer.com/virtual-round-table-29-sept
The present state of affairs: Recently, widespread COVID-19 has created major economical problems worldwide. It is becoming unmanageable for the industries to avoid its impact on the supply chain. It has impeded the logistic movement globally (Linton and Vakil, 2020). All industrial sectors are affected by the interrupted supply of required materials. The e-retailer giant ‘Amazon’ has safeguarded its inventories to mitigate the risk. With the experiences, society and companies have learned that they should not rely on a single supply base and share resources collaboratively to ensure uninterrupted supplies (Haque and Islam, 2018). More relaxed multi-modal regulations enable the managers to procure parts from any location in the world that turns into a multi-tier sourcing base (Haren and Simchi-Levi, 2020). Multiple reasons put pressure on managers to reduce operational costs and they achieve it by strategizing it in the form of contract manufacturing, lean manufacturing (Cozzolino et al. 2012), offshoring, and outsourcing (Hernandez and Haddud, 2018) and so on. The strategies do not prove sustainable when the supply gets disrupted by such an unprecedented pandemic (Yang et al. 2018). The situation has enforced major manufacturers either to cut their production or suspend the operations temporarily due to a lack of materials (Stauffer et al. 2018). During the initial spreading stage of this pandemic, the logistics service providers have tried all possible transportation alternatives globally and locally, by paying a higher cost to ensure smooth and flawless material movements. But, these attempts proved to be ineffective when the government restricted movements by sealing all international, provincial borders and citywide entries with some exemptions. Thus, the practitioners are insisted to re-evaluate the sourcing strategies. Substantial literature is available focusing on supplier risk evaluation and mitigations to reduce disruptions with respect to disaster relief supply chain (Maghsoudi et al. 2018) and humanitarian operations (Anparasan and Lejeune, 2017). The uncertainty due to coronavirus spread raises difficulty to predict its impact, as the outbreak started with a small scale and dispersed quickly beyond geographies (Ivanov, 2020). Therefore, in spite of intensive research-based solutions on global sourcing and risk management, today all of these proved to be not sustainable. In an attempt to explore viable alternatives to overcome this pandemic impact, Ivanov & Dolgui (2020) suggested an application of intertwined supply networks as a possible survival solution. They assess supply chain performance and identify the factors of risk mitigation. More rational sourcing plans as argued by Kumar (2020) and recovery policies are expected to protect the businesses from such unforeseen global pandemic. Therefore, it becomes imperative to re-look at the sourcing strategies, supply chain risk, and sustainable theories (Kumar, 2020) that can help to evaluate the effect of alternative approaches on global economies and sourcing. The lockdowns and suspension of public transportations left the migrant people unfulfilled with basic necessities. Depending upon the intensity of the spread of the virus, the travel access, and people's movement restrictions differed geographically. No one-dimensional logistic approach or solution can work in such a situation since a pandemic controlled travel environment. Hence, existing humanitarian logistics models are required to revisit to develop more harmonized approaches (Dasaklis et al. 2012). The local communities and government authorities playing a vital role to ensure supply. For example, the Indian government is rescuing the situation by using public rail transportation to distribute essential goods among civilians. Such efforts enforce reliance on public transportation systems and encourage local logistics opportunities. Therefore, research exploring government policies to handle such situations can help to redesign the public distribution and logistics policies. Certainly, technology and data analytics play a vital role here for the people and local commodity movements (Kamble et al. 2019; Mkansi et al. 2019), but how can this technology ensures safe and secure transportation in such pandemic environment is awaited challenge to address. Employees of the industry are advised to work from home and not to travel. Many counties have temporarily suspended the tourism, pilgrimage travel, students’ migration, and diplomats/convoys movements. Public gatherings and events such as marriages, mega-sports, performances, concerts, movies, and educational institutes are also affected. Such gatherings are either getting canceled, or postponed. It will certainly impact the intention of movement for the time being (Stepchenkova et al. 2019) and social balancing aspects, which need to be re-assessed. Therefore, the questions that arose and insist to rethink the practitioners are: • Do contemporary sourcing strategies are competent enough to fight against pandemic such as COVID-19? • Do managers need to rethink for resilient solutions to ensure uninterrupted supplies under pandemic situation? • How technology could ensure quick, safe, and secure transportation in a pandemic environment? • How does the Post COVID-19 economy look like? • Is it possible to design sustainable supply chains that can withstand epidemics and gain control over global supplies? • As a contrary argument, the less or non-affected countries or geographies may consider this situation as a humanitarian opportunity to address the anticipated gaps in sourcing requirements. Target audiences and contributors: The proposed issue invites the executives and practitioners from industries such as manufacturing, aviation, e-retail, process engineering, consumer durables, health care, jewelry, pharmacy, apparel, information technology, oil & gas, agro products, and other commodities to share their experiences of their victimization of the COVID-19 and how they combat the disruption. The policymakers, economists, government agencies, and individuals can also share their views on the situation. The researchers are expected to consider contemporary supply chain issues, have a relook at the existing theories, and suggest appropriate practices and models that can help a quick reclamation from such unforeseen problems in the future. Proposed theme and objectives: The overall objective is to review, assess, and analyze the impact of COVID-19 on sourcing, logistics, global operations, and humanitarian supply chain. This special issue may include research articles of conceptual, empirical studies, case studies, mathematical modeling, and literature reviews discussing challenges that are faced by the global logistics industry. The studies demonstrating novel methods and approaches to such pandemic problems impacting supply chain performance are also welcome. Confining the scope of such contemporary research would be discouraging, but looking at the journal’s scope that broadly revolves around the theme of global sourcing and supply operations assessing COVID-19’s impact would be appropriate. The allied issues that can be addressed, but not limited to are listed below: • Rethinking sourcing strategies for global operations management • Impact of COVID-19 on global sourcing, warehousing and distribution practices • Government policies in response to overcoming COVID-19 impact on the economy • The response of MSME and startups to COVID-19 • Redesigning local supply chain and sourcing networks: Post lockdown situation • Managing inventories to mitigate the impact of COVID-19 • Humanitarian logistics under epidemic controlled travel • Role and contribution of technology for sourcing and supply chain management during pandemics • Assessing the social impact of COVID-19 • Comparing the economical impact of strategic sourcing: Slowdown vs. Lockdown The originality of the research theme: Many incidences during the ongoing pandemic hinted towards either shortages or non-availability of various materials sourcing at the point of requirement or consumption. May it be face masks & shields, hand sanitizers, surgical-grade materials, and equipment, other essential goods including groceries, perishable & non-perishable food items, and other daily need items. Hence it thought necessary to bridge the research gap by means of assessing global operations and sourcing strategies under the impact of COVID-19. IMPORTANT DATES • Submission Due Date: Feb 28th, 2021 • Final Editorial Decision: November 30th, 2021 Submissions to be made through the JGOSS ScolarOne Manuscript submission portal https://mc.manuscriptcentral.com/jgoss and potential authors are encouraged to consult the author guidelines here Note: Submitted papers will go for review process without waiting till deadline and the accepted manuscript will be published accordingly. References: Anparasan, A. and Lejeune, M. (2017), “Analyzing the response to epidemics: concept of evidence-based Haddon matrix”, Journal of Humanitarian Logistics and Supply Chain Management, Vol. 7 No. 3, pp. 266-283. Cozzolino, A., Rossi, S. and Conforti, A. (2012), “Agile and lean principles in the humanitarian supply chain: the case of the United Nations World food programme”, Journal of Humanitarian Logistics and Supply Chain Management, Vol. 2 No. 1, pp. 16-33. Dasaklis, D. K., Pappis, C.K., and Rachaniotis, N.P. (2012), “Epidemics control and logistics operations: A Review”, International Journal of Production Economics, Vol. 139, pp. 393-410. Haren, P, and Simchi-Levi, D. (2020), “How Coronavirus Could Impact the Global Supply Chain by Mid-March”, Harvard Business Review, https://hbr.org/2020/02/how-coronavirus-could-impact-the-global-supply-chain-by-mid-march, Accessed on Feb. 2020. Haque, M. and Islam, R. (2018), “Impact of supply chain collaboration and knowledge sharing on organizational outcomes in the pharmaceutical industry of Bangladesh”, Journal of Global Operations and Strategic Sourcing, Vol. 11 No. 3, pp. 301-320. Hernandez, F. D. and Haddud, A. (2018), "Value creation via supply chain risk management in global fashion organizations outsourcing production to China", Journal of Global Operations and Strategic Sourcing, Vol. 11 No. 2, pp. 250-272. Ivanov, D. (2020), “Predicting the impacts of epidemic outbreaks on global supply chains: A simulation-based analysis on the coronavirus outbreak (COVID-19/SARS-CoV-2) case”, Transportation Research Part E, 136, pp. Ivanov, D, and Dolgui, A. (2020), “Viability of intertwined supply networks: extending the supply chain resilience angles towards survivability. A position paper motivated by COVID-19-19 outbreak”, International Journal of Production Research, DOI:10.1080/00207543.2020.1750727. Kamble, S., Gunasekaran, A., & Arha, H. (2019), “Understanding the Blockchain technology adoption in supply chains-Indian context.” International Journal of Production Research, 57(7), 2009-2033. Kumar, B. (2020), “Coronavirus – Companies now should rethink on the basic Procurement Principles”, Logistics Insider, https://logisticsinsider.in/coronavirus-companies-now-should-rethink-on-the-basic-procurement-principles/, Accessed March 2020. Linton, T, and Vakil, B. (2020), “Coronavirus Is Proving We Need More Resilient Supply Chains”, Harvard Business Review, https://hbr.org/2020/03/coronavirus-is-proving-that-we-need-more-resilient-supply-chains, Accessed March 2020. Maghsoudi, A., Zailani, S., Ramayah, T. and Pazirandeh, A. (2018), “Coordination of efforts in disaster relief supply chains: the moderating role of resource scarcity and redundancy”, International Journal of Logistics Research and Applications, Vol. 21 No. 4, pp. 407-430. Mkansi, M., de Leeuw, S. and Amosun, O. (2019), “Mobile application supported urban-township e-grocery distribution”, International Journal of Physical Distribution & Logistics Management, Vol. 50 No. 1, pp. 26-53. Stauffer JM., Pedraza-Martinez AJ., Yan L., Wassenhove LN., 2020. Asset supply networks in humanitarian operations: A combined empirical simulation approach, Journal of Operations Management, 63(1), 44-58. Stepchenkova, S., Su, L. and Shichkova, E. (2019), "Intention to travel internationally and domestically in unstable world", International Journal of Tourism Cities, Vol. 5 No. 2, pp. 232-246. Yang, Q., Wang, Q. and Zhao, X. (2018), “A taxonomy of transaction-specific investments and its effects on cooperation in logistics outsourcing relationships”, International Journal of Logistics Research and Applications, Vol. 22 No. 6, pp. 557-575.
https://www.emeraldgrouppublishing.com/journal/jgoss/sourcing-strategies-and-supply-chain-operations-under-impact-covid-19
There has been an upheaval in the global economy, that much is obvious. What is not so obvious is that not all of this can be attributed to the damage created by COVID-19 and the subsequent efforts to contain the outbreak. A prime example would be the changing nature of supply chains and the reaction to globalization. These changes have been underway for a long time and had been altering many business practices. The lockdown recession that has occupied the world of late has certainly accelerated the process, but it did not start this year. There have been four trends that have been accelerating over the last decade and all four have implications for manufacturing, transportation, construction, and the consumer as well. - Lack of Reliability. The most immediate trend has been the lack of reliability in a single-sourcing global supply chain strategy. It was common enough to concentrate all sourcing in one country, based largely on price, and often that country was China. It seemingly “checked all of the sourcing boxes” by providing a low-cost production environment and more importantly, offering the infrastructure to support a high volume of trade. Unfortunately, there are other issues that have affected China’s place in the global economy. It’s politics complicate relationships and create rivalries. The movement of operations to China have threatened countries all over the world, creating animosity in the process. The intensity of that rivalry has convinced some companies to seek a more diversified sourcing strategy, leading to expansion into nations such as Vietnam, Thailand, Malaysia, Mexico, India, Brazil, and others. The shift has negatively affected efficiency but has improved reliability. - Immediate Gratification. It was only a few years ago that the concept of “Just-in-Time” dominated supply chain strategy. It was made possible by the technological advances in supply chain management and allowed companies to reduce inventory costs as they could get materials and component parts at the precise moment they were needed. The last few years have demonstrated that such a system is exceedingly fragile. A recent survey of corporate executives found that 85% are considering significant changes in their global sourcing strategy. Natural disasters and trade disputes unexpectedly disrupted upstream flows of parts and raw materials. This has convinced many to return to the days of warehousing and storage; and the COVID-19 pandemic has made this decision even more urgent. As of June 2020, there were over 500,000 sailors stranded on ships or in ports. They are either in quarantine or the port they were headed to has been quarantined. It is estimated that over 45% of global cargo has been stranded or delayed. Cargo operations are engaging in “blank sailing” (sending an empty ship to an alternative port or skipping a normal trade route altogether) and that has led to certain ports being skipped over for months. The construction sector has seen a surge in demand for warehouse operations and there is little sign that this demand will fade. - Technological Advancement. The third is connected to the shift in supply chains as technology has altered the appeal of overseas supply. The primary advantages that were offered by global supply chain sourcing was access to low wage environments and low production costs. The extent to which an operation depended on a large labor pool determined the appeal of a supply chain rooted in Asia or Latin America. The cost savings made up for the added expense of global transportation. As robotics and technology have developed, it has become easier for developed economies (with higher labor rates) to compete and that has spurred the return of manufacturing to the US (re-shoring strategies). It is becoming efficient to use technology to close the cost gap and since production can now be located closer to consumption, it reduces transportation costs. These are not hard and fast rules, but it serves as the underpinnings for re-shoring and near-shoring production and sourcing strategies. - Regional Alliances. The last trend will be created by the new USMCA (US/Mexico/Canada Agreement) that replaces NAFTA. An increase in the regional value parts content requirement for autos from 62.5% to 75% will force many companies to rethink sourcing strategies. Many will consider shifting some production to US/Mexico markets as a result, which will increase cross-border activity and potentially open up a host of labor, tax, and regulatory considerations. Generally, these are positive changes for many companies. Adjusting does come with both challenges and opportunities. A diversified supply chain means working with a variety of nations and a variety of rules and regulations, including tax implications. Many of these nations have trade agreements in place. Many have local incentive structures that can be accessed by companies in the US. There could be additional regulatory considerations and changes as the US expands new trade relationships and restricts or tightens older ones. There are a variety of tax advantages also available for these reshoring efforts as well as for the expanded use of technology. MarksNelson can guide you through the advantages and disadvantages related to tax implications, manufacturing processes and technology, as well as location strategies to help you make a fully formed decision. The rationale for shifting and altering the supply chain is compelling and with proper advance planning the benefits will likely outweigh the concerns.
https://www.marksnelsoncpa.com/blog/post/the-great-globalization-shift-4-supply-chain-trends-accelerated-by-covid-19