text
string | id
string | dump
string | url
string | date
string | file_path
string | license_abbr
string | license_version
string | license_location
string | license_in_head
bool | license_in_footer
bool | license_element
string | license_left_context
string | license_right_context
string | potential_licenses
dict | license_parse_error
bool | license_disagreement
bool | language_script
string | language
string | language_score
float64 |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Pio-Pio (reworked)
by m1981 - uploaded on February 19, 2018, 11:31 am
Original chick by gsyan, pio-pio by Dordy, some details reworked and a coated texture added.
Log into OpenClipart
- Tags
- remix+296967 Remix+270770 chick animals bird Italian onomatopoeic sound naive coated
- Safe for Work?
- Yes
|
<urn:uuid:18267114-6a6a-4463-ae23-f81175b9936f>
|
CC-MAIN-2024-51
|
https://openclipart.org/detail/296975/piopio
|
2024-12-06T19:39:22Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066416984.85/warc/CC-MAIN-20241206185637-20241206215637-00793.warc.gz
|
zero
|
1.0
|
json-ld
| true | false | null | null | null |
{
"abbr": [
"zero"
],
"in_footer": [
false
],
"in_head": [
true
],
"location": [
"json-ld"
],
"version": [
"1.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.939275 |
Deaths in intrastate conflicts based on where they occurred
What you should know about this indicator
An intrastate conflict is a conflict between a state and a non-state armed group that causes at least 25 deaths during a year. This includes combatant and civilian deaths due to fighting. If a foreign state is involved, it is called "internationalized", and "non-internationalized" otherwise.
Sources and processing
This data is based on the following sources
How we process data at Our World in Data
All data and visualizations on Our World in Data rely on data sourced from one or several original data providers. Preparing this original data involves several processing steps. Depending on the data, this can include standardizing country names and world region definitions, converting units, calculating derived indicators such as per capita measures, as well as adding or adapting metadata such as the name or the description given to an indicator.
At the link below you can find a detailed description of the structure of our data pipeline, including links to all the code used to prepare data across Our World in Data.
Notes on our processing step for this indicator
UCDP provides geographical coordinates of each conflict event. We have mapped these coordinates to countries by means of the Natural Earth dataset.
In some instances, the event's coordinates fall within the borders of a country. Other times, the event's coordinates fall outside the borders of a country. In the latter case, we have mapped the event to the country that is closest to the event's coordinates.
Conflict event with id "53238" and relid "PAK-2003-1-345-88" was assigned to "Siachen Glacier" by Natural Earth. We have mapped it to "Pakistan" following the text in the where_description
field from the Natural Earth data, which refers to "Giang sector in Siachen, Pakistani Kashmir".
Reuse this work
- All data produced by third-party providers and made available by Our World in Data are subject to the license terms from the original providers. Our work would not be possible without the data providers we rely on, so we ask you to always cite them appropriately (see below). This is crucial to allow data providers to continue doing their work, enhancing, maintaining and updating valuable data.
- All data, visualizations, and code produced by Our World in Data are completely open access under the Creative Commons BY license. You have the permission to use, distribute, and reproduce these in any medium, provided the source and authors are credited.
Citations
How to cite this page
To cite this page overall, including any descriptions, FAQs or explanations of the data authored by Our World in Data, please use the following citation:
“Data Page: Deaths in intrastate conflicts based on where they occurred”, part of the following publication: Bastian Herre, Lucas Rodés-Guirao and Max Roser (2024) - “War and Peace”. Data adapted from Uppsala Conflict Data Program, Natural Earth. Retrieved from https://ourworldindata.org/grapher/deaths-in-intrastate-conflicts [online resource]
How to cite this data
In-line citationIf you have limited space (e.g. in data visualizations), you can use this abbreviated in-line citation:
Uppsala Conflict Data Program (2024); Natural Earth (2022) – processed by Our World in Data
Full citation
Uppsala Conflict Data Program (2024); Natural Earth (2022) – processed by Our World in Data. “Deaths in intrastate conflicts based on where they occurred” [dataset]. Uppsala Conflict Data Program, “Georeferenced Event Dataset v24.1”; Natural Earth, “Natural Earth - Large scale data (1:10m Cultural Vectors) 5.1.1” [original data]. Retrieved December 6, 2024 from https://ourworldindata.org/grapher/deaths-in-intrastate-conflicts
|
<urn:uuid:ee1876d6-d732-45af-a0d9-630f7b02594b>
|
CC-MAIN-2024-51
|
https://ourworldindata.org/grapher/deaths-in-intrastate-conflicts?tab=chart&country=LCA
|
2024-12-06T20:29:27Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066416984.85/warc/CC-MAIN-20241206185637-20241206215637-00793.warc.gz
|
by
|
4.0
|
a_tag
| false | true | null | null | null |
{
"abbr": [
"by",
"by"
],
"in_footer": [
true,
false
],
"in_head": [
false,
false
],
"location": [
"a_tag",
"a_tag"
],
"version": [
"4.0",
"4.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.993805 |
Unsupervised Microvascular Image Segmentation Using an Active Contours Mimicking Neural Network
The task of blood vessel segmentation in microscopy images is crucial for many diagnostic and research applications. However, vessels can look vastly different, depending on the transient imaging conditions, and collecting data for supervised training is laborious. We present a novel deep learning method for unsupervised segmentation of blood vessels. The method is inspired by the field of active contours and we introduce a new loss term, which is based on the morphological Active Contours Without Edges (ACWE) optimization method. The role of the morphological operators is played by novel pooling layers that are incorporated to the network's architecture. We demonstrate the challenges that are faced by previous supervised learning solutions, when the imaging conditions shift. Our unsupervised method is able to outperform such previous methods in both the labeled dataset, and when applied to similar but different datasets. Our code, as well as efficient PyTorch reimplementations of the baseline methods VesselNN and DeepVess is available on GitHub - https://github.com/shirgur/UMIS.
PDF Abstract ICCV 2019 PDF ICCV 2019 Abstract
|
<urn:uuid:0db89f12-59c4-4946-ae04-e66c7e2e982f>
|
CC-MAIN-2024-51
|
https://paperswithcode.com/paper/unsupervised-microvascular-image-segmentation
|
2024-12-06T20:19:41Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066416984.85/warc/CC-MAIN-20241206185637-20241206215637-00793.warc.gz
|
by-sa
|
4.0
|
a_tag
| false | true | null | null | null |
{
"abbr": [
"by-sa"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.992231 |
Learn new ways to investigate and document issues you see in your local environment. Plan field work, analyze results, and learn how to report environmental impacts.
Explore and improve techniques for documenting environmental issues - learn from others and help expand this public resource.
Connect with others facing similar issues locally & worldwide to solve problems together. Ask and answer questions about your environmental concerns.
Talk to your neighbors, and build a healthier and more equitable world together by going to the press, to regulators, or to court.
|
<urn:uuid:455f88e1-30be-46b2-994a-b4095be5c8a0>
|
CC-MAIN-2024-51
|
https://publiclab.org/
|
2024-12-06T19:38:44Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066416984.85/warc/CC-MAIN-20241206185637-20241206215637-00793.warc.gz
|
by-sa
|
3.0
|
a_tag
| false | true | null | null | null |
{
"abbr": [
"by-sa",
"by-sa",
"by-sa",
"by-sa"
],
"in_footer": [
true,
true,
false,
false
],
"in_head": [
false,
false,
false,
false
],
"location": [
"a_tag",
"a_tag",
"a_tag",
"a_tag"
],
"version": [
"3.0",
"3.0",
"3.0",
"3.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.998635 |
Abstract
Background: Anterior cruciate ligament reconstructions (ACLR) fail at a rate of 10–15%, with graft impingement often a cause. In this study we investigate the prevalence and causes of impingement seen during ACLR surgery. Methods: We reviewed consecutive primary ACLR from 2012-2018. Graft impingement was estimated intraoperatively by placing the arthroscope through the tibial tunnel and passively extending the knee, observing how much was obscured by the lateral femoral condyle from an anterior and lateral direction. Preoperative MRI scans were used to measure the intercondylar notch; Notch Width Index (NWI) and Notch Depth Index (NDI). Positioning of the tunnels was determined on postoperative radiographs. Results: There were 283 ACLRs performed with 33 failures diagnosed on MRI (11.7%). 257 patients had complete imaging and follow up (91%). The mean age was 28 (±9) years and mean follow-up 5.3 (±1.8) years. The mean NWI was 0.26(±0.03), and NDI was 0.49(±0.06). The tibial tunnel aperture was located 42(±6) % of the way from anterior-posterior and 39(±6) % from medial-lateral. Impingement requiring a notchplasty was observed in 80% of cases, with lateral impingement more prominent. Conclusions: The amount of impingement did not correlate with tunnel position, which was located within the recommended area. There was a weak negative correlation between NWI and lateral impingement (r s = −0.16, p = 0.01), and NDI and anterior impingement (r s = −0.12, p = 0.04), therefore a smaller notch is associated with greater impingement. Despite optimal tunnel positioning, impingement still occurs in a significant number of cases therefore notchplasty should always be considered to keep revision rates low.
Keywords
- notch
- notchplasty
- impingement
- graft
- ACL
|
<urn:uuid:df120286-49e4-445a-bb8e-b18c08860949>
|
CC-MAIN-2024-51
|
https://pureportal.strath.ac.uk/en/publications/quantifying-graft-impingement-in-anterior-cruciate-ligament-recon
|
2024-12-06T20:52:42Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066416984.85/warc/CC-MAIN-20241206185637-20241206215637-00793.warc.gz
|
by
|
4.0
|
a_tag
| false | false | null | null | null |
{
"abbr": [
"by",
"by"
],
"in_footer": [
false,
false
],
"in_head": [
false,
false
],
"location": [
"a_tag",
"a_tag"
],
"version": [
"4.0",
"4.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.991663 |
Solving the mystery of recurring low level contamination.
(2023)
Newspaper / Magazine
SMITH, L. 2023. Solving the mystery of recurring low level contamination. Cleanroom technology, June 2023, pages 14-17.
This article is a research review of a study that identified bacteria on cleanroom garments to solve the mystery of recurring low-level contamination in a facility.
|
<urn:uuid:a40b5486-1396-49ee-8396-4ed78bfce86a>
|
CC-MAIN-2024-51
|
https://rgu-repository.worktribe.com/outputs?Author=Laurie+Smith&page=1&Year=2023
|
2024-12-06T19:21:01Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066416984.85/warc/CC-MAIN-20241206185637-20241206215637-00793.warc.gz
|
by
|
3.0
|
a_tag
| false | false | null | null | null |
{
"abbr": [
"by"
],
"in_footer": [
false
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"3.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.988931 |
Description
AbstractThe COVID-19 pandemic caused by SARS-CoV-2 is in immediate need of an effective antidote. Although the Spike glycoprotein (SgP) of SARS-CoV-2 has been shown to bind to heparins, the structural features of this interaction, the role of a plausible heparan sulfate proteoglycan (HSPG) receptor, and the antagonism of this pathway through small molecules remain unaddressed. Using an in vitro cellular assay, we demonstrate HSPGs modified by the 3-O-sulfotransferase isoform-3, but not isoform-5, preferentially increased SgP-mediated cell-to-cell fusion in comparison to control, unmodified, wild-type HSPGs. Computational studies support preferential recognition of the receptor-binding domain of SgP by 3-O-sulfated HS sequences. Competition with either fondaparinux, a 3-O-sulfated HS-binding oligopeptide, or a synthetic, non-sugar small molecule, blocked SgP-mediated cell-to-cell fusion. Finally, the synthetic, sulfated molecule inhibited fusion of GFP-tagged pseudo SARS-CoV-2 with human 293T cells with sub-micromolar potency. Overall, overexpression of 3-O-sulfated HSPGs contribute to fusion of SARS-CoV-2, which could be effectively antagonized by a synthetic, small molecule.
|
<urn:uuid:986b9e47-9990-4578-9692-d2871d1135cf>
|
CC-MAIN-2024-51
|
https://rrid.mitpress.mit.edu/pub/kze30445/release/1
|
2024-12-06T19:13:04Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066416984.85/warc/CC-MAIN-20241206185637-20241206215637-00793.warc.gz
|
by
|
4.0
|
a_tag
| false | false | null | null | null |
{
"abbr": [
"by"
],
"in_footer": [
false
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.938566 |
Edge details
Results from
ConceptNet 5.8
Source:
German Wiktionary
Documentation
FAQ
Chat
Blog
Documentation
FAQ
Chat
Blog
de
ichlaut
―
DerivedFrom
⟶
Weight: 1.0
de
ich
(
n
)
Source:
German Wiktionary
ConceptNet 5 is licensed under a
Creative Commons Attribution-ShareAlike 4.0 International License
. If you use it in research, please cite
this AAAI paper
.
See
Copying and Sharing ConceptNet
for more details.
|
<urn:uuid:5498c15d-e0cf-49fb-8c3d-f80c9123974b>
|
CC-MAIN-2024-51
|
https://conceptnet.media.mit.edu/a/%5B/r/DerivedFrom/,/c/de/ichlaut/,/c/de/ich/n/%5D
|
2024-12-07T23:59:16Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066433271.86/warc/CC-MAIN-20241207224914-20241208014914-00693.warc.gz
|
by-sa
|
4.0
|
a_tag
| false | true | null | null | null |
{
"abbr": [
"by-sa",
"by-sa"
],
"in_footer": [
true,
true
],
"in_head": [
false,
false
],
"location": [
"a_tag",
"a_tag"
],
"version": [
"4.0",
"4.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.871767 |
This website uses cookies. By using this site you agree to the use of cookies. For details, please refer to the Privacy Statement.
To view this list you have to sign in.
|
<urn:uuid:a3b7b060-edeb-4607-8e9c-800528736e46>
|
CC-MAIN-2024-51
|
https://dhb.thulb.uni-jena.de/receive/ufb_cbu_00002097
|
2024-12-08T00:04:45Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066433271.86/warc/CC-MAIN-20241207224914-20241208014914-00693.warc.gz
|
mark
|
1.0
|
a_tag
| false | false | null | null | null |
{
"abbr": [
"mark"
],
"in_footer": [
false
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"1.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.99989 |
Please enter the email address that you used for registration. We will send you a new password.
The following information is mandatory and is required to register an account:
Have you found an error? Do you have any suggestions for making our service even better or any other questions about this page? Please write to us and we'll make sure we get back to you.
I hereby confirm the use of my personal data within the context of the enquiry made.
Contact: [email protected] Status: 2023-05-04 05:47 Christian-Albrechts-Universität zu Kiel
Dear user,
In response to current developments in the web technology used by the Goobi viewer, the software no longer supports your browser.
Please use one of the following browsers to display this page correctly.
Thank you.
|
<urn:uuid:178e58c9-ba77-4218-85a0-5392429ad8fd>
|
CC-MAIN-2024-51
|
https://dibiki.ub.uni-kiel.de/viewer/image/PPN102567314X/13/-/
|
2024-12-08T00:25:56Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066433271.86/warc/CC-MAIN-20241207224914-20241208014914-00693.warc.gz
|
mark
|
1.0
|
a_tag
| false | false | null | null | null |
{
"abbr": [
"mark"
],
"in_footer": [
false
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"1.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.998312 |
Have you found an error? Do you have any suggestions for making our service even better or any other questions about this page? Please write to us and we'll make sure we get back to you.
I hereby confirm the use of my personal data within the context of the enquiry made.
|
<urn:uuid:c348cab2-a4f2-405b-8ce6-eb2297bcb515>
|
CC-MAIN-2024-51
|
https://ds.ub.uni-bielefeld.de/viewer/fullscreen/1236760/42/
|
2024-12-08T00:09:22Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066433271.86/warc/CC-MAIN-20241207224914-20241208014914-00693.warc.gz
|
mark
|
1.0
|
a_tag
| false | false | null | null | null |
{
"abbr": [
"mark"
],
"in_footer": [
false
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"1.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.999219 |
On July 17, Ambassador of Ukraine in Egypt Mr. Yevhen Mykytenko met the Minister of Higher Education and Scientific Research of Egypt Mr. Khaled Abdel Ghaffar
The sides discussed topical issues of bilateral cooperation in the field of higher education, stressed the need for joint coordination of efforts to deepen partnership, in particular, given the fact that Egypt is ranked 6th in the number of foreign students in Ukraine. There are 3412 Egyptians are currently studying in Ukraine. Special attention was paid to the need to further development of contacts between specialized scientific and technical institutions of both states.
The Egyptian side supported the proposal to intensify work on the development of bilateral legal framework in the field of education. An agreement was reached on further close coordination of cooperation between the Ministry and the Embassy.
|
<urn:uuid:be0bd29a-009b-48ae-b249-50681b762667>
|
CC-MAIN-2024-51
|
https://egypt.mfa.gov.ua/en/news/73935-posol-ukrajini-zustrivsya-z-ministrom-vishhoji-osviti-ta-naukovih-doslidzheny-jegiptu
|
2024-12-08T00:22:55Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066433271.86/warc/CC-MAIN-20241207224914-20241208014914-00693.warc.gz
|
by
|
4.0
|
a_tag
| false | true | null | null | null |
{
"abbr": [
"by"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.996081 |
By means of an expansive innervation, the serotonin (5-HT) neurons of the dorsal raphe nucleus (DRN) are positioned to enact coordinated modulation of circuits distributed across the entire brain in order to adaptively regulate behavior. Yet the network computations that emerge from the excitability and connectivity features of the DRN are still poorly understood. To gain insight into these computations, we began by carrying out a detailed electrophysiological characterization of genetically identified mouse 5-HT and somatostatin (SOM) neurons. We next developed a single-neuron modeling framework that combines the realism of Hodgkin-Huxley models with the simplicity and predictive power of generalized integrate-and-fire models. We found that feedforward inhibition of 5-HT neurons by heterogeneous SOM neurons implemented divisive inhibition, while endocannabinoid-mediated modulation of excitatory drive to the DRN increased the gain of 5-HT output. Our most striking finding was that the output of the DRN encodes a mixture of the intensity and temporal derivative of its input, and that the temporal derivative component dominates this mixture precisely when the input is increasing rapidly. This network computation primarily emerged from prominent adaptation mechanisms found in 5-HT neurons, including a previously undescribed dynamic threshold. By applying a bottom-up neural network modeling approach, our results suggest that the DRN is particularly apt to encode input changes over short timescales, reflecting one of the salient emerging computations that dominate its output to regulate behavior.
To characterize physiological properties of dorsal raphe serotonin neurons, the authors applied the approach called an augmented generalized integrate-and-fire [aGIF] model, which incorporates a relatively small number of salient biophysical properties of a specific neuron type, and whose parameters are optimized based on voltage dynamics obtained experimentally. The results showed that after-hyperpolarization and A-type potassium currents, in combination with heterogeneous feedforward inhibition from local GABA neurons, give rise to a derivative-like input-output relationship in serotonin neurons.
https://doi.org/10.7554/eLife.72951.sa0The forebrain-projecting serotonin (5-HT) neurons of the dorsal raphe nucleus (DRN) play a key role in regulating behavior in dynamic environments, but the precise nature of this role is still not well understood (Young et al., 1985; Delgado, 1994; Warden et al., 2012; Dayan and Huys, 2015). DRN serotonin neurons have been proposed to modulate a wide range of cognitive processes, such as encouraging patience for future rewards (Miyazaki et al., 2014; Fonseca et al., 2015), signaling the beneficialness of current actions or states (Luo et al., 2016), complementing reinforcement signals of dopamine (Daw et al., 2002; Maier and Watkins, 2005; Nakamura et al., 2008; Ranade and Mainen, 2009; Tops et al., 2009; Cools et al., 2011; Li et al., 2016), and, partially as a corollary, regulating both learning (Soubrié, 1986; Deakin, 1991; Daw et al., 2002; Dayan and Huys, 2009; Matias et al., 2017; Grossman et al., 2022) and mood (Savitz et al., 2009; Fava and Kendler, 2000; Donaldson et al., 2013; Cipriani et al., 2018). While the remarkable diversity of roles attributed to this single neurotransmitter has historically been perplexing, recent findings are beginning to provide insight (see Okaty et al., 2019 for review). For example, the unsuspected organization of 5-HT neurons into anatomical sub-modules that differentially regulate behavior (Abrams et al., 2004; Lowry et al., 2005; Commons, 2015; Muzerelle et al., 2016; Ren et al., 2018; Paquelet et al., 2022), or the observation that 5-HT neurons can encode distinct salient features of the environment over different timescales (Trulson and Jacobs, 1979; Schweimer and Ungless, 2010; Ranade and Mainen, 2009; Cohen et al., 2015; Zhong et al., 2017) is a compelling mechanism that may contribute to the multiplicity of 5-HT’s actions. These anatomical and dynamical perspectives on 5-HT diversity need not be mutually exclusive. A clearer understanding of the biophysical mechanisms that contribute to the coding features of raphe neurons over multiple timescales has the potential to substantially increase our understanding of how 5-HT regulates behavior.
The spiking statistics of 5-HT neurons necessarily shape and constrain their computational role. For instance, the slow firing rate (~5 Hz) of 5-HT neurons, in large part attributable to a large after-hyperpolarization potential (AHP) (Aghajanian and Vandermaelen, 1982; Vandermaelen and Aghajanian, 1983), may appear to preclude signaling on faster timescales. However, fast signaling despite slow firing can arise naturally in ensemble-rate codes (Knight, 1972; Gerstner, 2000). Consistent with this idea, the in vivo population activity of 5-HT neurons has been observed to track impending rewards over second to sub-second timescales (Zhong et al., 2017), and the trial-averaged ensemble rates of individual 5-HT neurons can track environmental changes over the millisecond timescale (Ranade and Mainen, 2009; Cohen et al., 2015). In addition, the fact that 5-HT receptor subtypes can regulate the excitability of target neurons over different timescales, including ionotropic 5-HT3 receptors with millisecond gating kinetics (Béïque et al., 2004; Béïque et al., 2007; Andrade, 2011; Varga et al., 2009), at the very least suggests that the 5-HT system is capable of fast information transmission, an observation mirrored by the fast dynamics of neurons which project to the DRN (Amo et al., 2014; Matsumoto and Hikosaka, 2007). If fast and slow signaling by the DRN are manifest, it is less clear which cellular mechanisms regulate the interplay between these timescales, nor which input features are represented on which timescales.
Computational modeling is a standard approach to link levels of description and is thus well suited to delineate how network-level function emerges from excitability features identified at the single-cell level. In spite of their conceptual utility, the most detailed single cell models, including those of DRN neurons (Tuckwell and Penington, 2014; Wong-Lin et al., 2011), do not lend themselves with ease to bottom-up modeling efforts because of the substantial technical difficulty of obtaining sufficiently accurate values for a large number of interacting model parameters (Prinz et al., 2004; Gerstner and Naud, 2009). Mathematically simpler generalized integrate-and-fire (GIF) models provide a strong foundation for network modeling because their small number of parameters can be estimated with a high degree of precision (Mensi et al., 2012; Pozzorini et al., 2013; Teeter et al., 2018). This precision comes at a price, however the process of distilling the effects of many biophysical mechanisms into a small number of model parameters makes it difficult to study a specific mechanism (e.g. a subthreshold ion channel) in isolation. A hybrid approach based on a reductionistic GIF model augmented with a limited set of biophysical mechanisms could leverage the precision of GIFs while allowing the ability to link specific biophysical mechanisms with higher-order network function.
In this study, we developed and validated for DRN neurons a hybrid modeling approach that lies between reductionist GIF and biophysical Hodgkin-Huxley-type models to capture excitability features of individual neurons for accurate simulations of population dynamics and, by extension, network computation inference. To this end, we carried out cellular electrophysiological recordings from genetically identified DRN 5-HT and SOM neurons to (1) extract and validate, from sets of noisy inputs, parameters for the automatic development of accurate GIF models and (2) experimentally define complementary biophysical mechanisms to be grafted onto the GIF models to iteratively improve their prediction accuracy (augmented GIFs). This approach recapitulated and extended past findings on DRN neurons by showing that the best-performing models of 5-HT neurons featured slow membrane time constants, an A-type potassium current, and strong adaptation mechanisms. Network simulations of optimized GIF models of both 5-HT and GABAergic SOM neurons organized in a feed-forward inhibitory circuit revealed that 5-HT neuron populations context-dependently encode a mixture of the intensity and temporal derivative of their inputs. Our overall approach further allowed us to trace back specific features of these population responses (e.g. gain) to defined excitability features of DRN neurons.
Our main goal was to develop an experimentally grounded model of the DRN to better understand its computational properties. As a first step toward this goal, we carried out experiments to constrain a set of single-neuron models of the two main cell types found in the DRN: 5-HT and SOM GABA neurons. We performed whole-cell electrophysiological recordings from genetically identified 5-HT (Figure 1A1; SERT-Cre::Rosa-TdTomato mice) and SOM (Figure 1A2; Table 1; SOM-Cre::Rosa-TdTomato mice) neurons in slices. In keeping with previous descriptions (e.g. Vandermaelen and Aghajanian, 1983; Calizo et al., 2011), in the majority of the 5-HT neurons recorded in our dataset, current steps induced strongly adapting action potential firing accompanied by large AHPs, and a characteristic kink in the voltage trace leading up to the first spike (Figure 1B). Qualitatively distinct firing patterns of 5-HT neurons were, however, occasionally observed (Figure 1—figure supplement 1). Recordings from SOM neurons revealed spiking patterns that were more heterogeneous (Figure 1—figure supplement 2). Comparing the relationship between the injected currents and firing frequencies between these populations, we found that SOM neurons were generally more sensitive to changes in input current (gain) than 5-HT neurons and responded to weaker inputs (Figure 1B). The gain showed greater variability in SOM neurons than in 5-HT neurons (Brown-Forsythe equality of variance test p=0.001 on N = 17 5-HT and N = 7 SOM neurons). In line with this observation, SOM neurons also consistently exhibited a wider range of firing frequencies for a given input (e.g. for a 50 pA input 5-HT neurons fired at 2.81 ± 2.22 Hz vs 8.16 ± 5.70 Hz; Brown-Forsythe test p=0.005 in 5-HT neurons and SOM cells). Together, these observations outlined three salient cellular-level features of DRN neurons, namely the strong AHP and voltage kink of 5-HT neurons as well as noticeable heterogeneous excitability of SOM neurons.
The characteristic kink in the voltage leading up to the first spike in 5-HT neurons in principle may be caused by near-threshold activation of voltage-gated potassium channels (VGKCs; Connor and Stevens, 1971; Connor et al., 1977; Drion et al., 2015). We therefore examined whole-cell currents evoked by voltage steps (from –90 mV to –20 mV) in both 5-HT and SOM neurons to look for evidence of such a VGKC. In 5-HT cells, these experiments revealed a large (peak amplitude 928 ± 249 pA, leak-subtracted), partly inactivating (steady-state amplitude 142 ± 45 pA, leak-subtracted) outward current (Figure 1C1) that was sensitive to Kv4-selective potassium channel blockers (Figure 1—figure supplement 4). This current activated rapidly (peak latency 7.46 ± 0.21 ms) and inactivated over tens of milliseconds (inactivation time constant ms; kinetics are similar at near-physiological temperature, see Figure 1—figure supplement 5). The gating and kinetic profile (Table 2, Figure 1—figure supplements 6 and 7) of the inactivating component of this conductance in 5-HT neurons are broadly similar to those expected of the A-type potassium currents (IA) characterized in great detail in several other cell types (e.g. Storm, 1989). Because these parameters are sufficient to construct a model of this conductance (see below), we have not attempted to determine its molecular identity further. For the sake of simplicity, we refer to the inactivating component herein as IA (in keeping with the previous literature; see Aghajanian, 1985; Tuckwell and Penington, 2014) and the steady-state component as . Thus, an IA -like inactivating VGKC is a consistent feature of DRN 5-HT neurons.
The same voltage-clamp protocol applied to SOM neurons, in contrast, triggered a mixture of outward and inward currents that varied widely from cell to cell (Figure 1D2). A significant proportion of SOM neurons did not express a transient outward current at all (27.3 %, Figure 1E), while the remaining cells had currents that were significantly smaller (), activated more slowly (), and exhibited much more heterogeneous kinetic profiles than those found in 5-HT neurons (Figure 1E3). Together, these results show that the expression of this subthreshold voltage-gated current is substantially more variable in SOM neurons than in 5-HT neurons, in line with the distinctive heterogeneity of excitability features observed in this DRN cell type (Figure 1C2, Figure 1—figure supplement 2).
To develop an intuition for how IA impacts the firing patterns of 5-HT populations, we first created a toy leaky integrate-and-fire (LIF) model that captured the effect of this conductance on single-cell voltage dynamics (see Methods). In keeping with previous studies, IA introduced a kink in the subthreshold voltage leading up to spike threshold (Getting, 1983; Segal, 1985; McCormick, 1991; Figure 2A) and increased the latency to the first spike evoked by a square step stimulus, particularly when starting from a hyperpolarized voltage at which IA is free from inactivation (Figure 2B and C). The effect of IA on spike latency depends at least to some extent on its effective magnitude and inactivation kinetics (defined as the ratio of maximal A-type conductance to inverse membrane resistance and the ratio of the inactivation time constant of IA to the membrane time constant; see Methods). When we set the corresponding parameters in our toy model to experimentally determined values from 5-HT neurons, we observed the same qualitative relationship between spike latency and initial voltage (Figure 2—figure supplement 1), further pointing toward a functional effect of IA in this cell type. The predicted relationship between initial voltage and latency was experimentally recapitulated in whole-cell recordings from identified 5-HT neurons (Figure 2D–F). In particular, the onset of spiking was delayed by hyperpolarization (Figure 2D), and the magnitude of this effect was significantly reduced by the partial pharmacological block of IA with 4-AP ( p=3.2e-6 for initial voltages between –90 mV and –70 mV; Figure 2E). Finally, we also observed an inflection point predicted by the model in the normalized initial-voltage/latency relationship (Figure 2F, compare with model prediction in Figure 2C). In summary, our toy model captured the expected effects of IA in single 5-HT cells.
Next, we used our experimentally validated toy model to understand how IA impacts the spiking responses of whole neuronal populations. To do this, we simulated the effect of a shared step input to a population of 600 toy neurons each receiving independent background noise (corresponding to naturalistic fluctuations in synaptic inputs). Whereas subthreshold fluctuations yielded time-locked spikes without IA (Figure 2G), they induced spiking with larger jitter across the simulated population when IA was present (Figure 2H). This desynchronizing effect of IA also decreased the peak population rate at the time corresponding to the mean latency (Figure 2I) since the peak rate corresponds to the coincidence rate from an ensemble of cells with similar properties. (The same effects were also observed in the toy models with parameters constrained to experimentally determined values; Figure 2—figure supplement 1.) Taken together, results from these toy models revealed a role of IA in regulating the degree of synchronization of a population following sudden inputs, suggesting that IA may regulate the gain of the DRN network to time-varying inputs. This intuition gleaned from this toy model is examined in more detail with optimized GIF models (see below).
We next sought to develop a model able to capture the essential biophysical features of DRN neurons and accurately predict their responses to naturalistic inputs. GIF models offer a flexible modeling framework well suited to this purpose because they can be trained to accurately reproduce the firing patterns of individual neurons using less than 5 min of electrophysiological data per neuron (Gerstner et al., 2014; Teeter et al., 2018; Paninski et al., 2005; Mensi et al., 2012; Pozzorini et al., 2015). In this framework, individual neurons are described in terms of three core components: (1) a passive membrane filter, , which transforms input currents into a subthreshold membrane potential; (2) a stochastic spiking process, which transforms the subthreshold membrane potential into action potentials; and (3) two adaptation mechanisms, namely a spike-triggered current mediating the commonly observed AHP, , and change in firing threshold, (Figure 3A1, see Methods). These components are described by parameters, the values of which are inferred from the electrophysiological data using a combination of least-squares multi-linear regression and gradient ascent of a likelihood function. The flexibility and data efficiency of this framework lend itself well to capturing the functional properties of single neurons and, by extension, heterogeneous neural populations.
Our results outlined in Figure 2 show that IA regulates spike timing in 5-HT neurons because of its nonlinear subthreshold effects. Foreseeing that the presence of this prominent current may limit the accuracy of canonical GIF models—which are not designed to capture nonlinear subthreshold effects—we first augmented the canonical GIF model (aGIF; Figure 3A2) with a simplified Hodgkin-Huxley-type model of the subthreshold voltage-dependent currents we recorded in 5-HT neurons (see Methods). To assess whether incorporating additional biophysical details into the aGIF model might further improve its predictive performance, we turned to the previously described sodium channel-inactivation GIF model (iGIF; Figure 3A3), which extends the GIF model of Mensi et al., 2012 by adding a non-parametric voltage coupling function to the dynamic spike threshold (Mensi et al., 2016; see Methods). Although this GIF model extension was initially conceived specifically to capture the influence of subthreshold sodium channel inactivation on firing threshold (hence, its name), the non-parametric definition of the threshold coupling function gives it the capacity to account for a wide range of other subthreshold biophysical mechanisms which regulate spiking, notably including, but not limited to, IA. Comparing the performance of the more parsimonious aGIF model to that of the iGIF model enabled us to assess whether accounting for additional mechanisms that regulate spiking beyond IA might further improve our DRN neuron models.
To establish comparative GIF model benchmarks across cell types, we carried out whole-cell electrophysiological recordings not only from DRN 5-HT and SOM cells but also from canonical deep-layer pyramidal neurons of the medial prefrontal cortex (mPFC). For each recording, we applied two distinct instantiations of noisy in vivo-like inputs (see Supplemental methods, Figure 3—figure supplement 1), one of which was used to determine the model parameters while the other was reserved for post hoc evaluation of the models’ accuracy (i.e. ‘training’ data and ‘validation’ data, respectively; see Figure 3C). Accuracy was assessed by comparing models with recorded data across cell types in terms of Figure 3D: (1) subthreshold voltage changes on training data, R2, and; (2) spike timing on validation data, (where is the best possible performance and is the chance level; see Methods).
The canonical GIF model predicted both the subthreshold dynamics and spike timing of mPFC pyramidal neurons with high accuracy (R2 = 0.431 ± 0.249; = 0.783 ± 0.134; Figure 3E), consistent with previous reports on cortical pyramidal neurons (Mensi et al., 2012; Pozzorini et al., 2015; Mensi et al., 2016; Teeter et al., 2018). While our aGIF model slightly better predicted the voltage of mPFC neurons (R2 = 0.544 ± 0.280, , Figure 3E1), this did not translate into more accurate spike predictions ( = 0.743 ± 0.180, , Figure 3E2), consistent with the observation that IA is not a significant conductance recorded from the cell body of mPFC pyramidal neurons (Figure 3—figure supplement 2 and see Dong and White, 2003; Dong et al., 2005). On the basis of spike timing prediction, the canonical GIF model thus offered the most parsimonious account of the behavior of mPFC neurons.
With this point of comparison established, we next quantified the performance of each of our candidate GIF models (GIF, aGIF, and iGIF) in 5-HT neurons. As previously intuited, the canonical GIF model performed rather poorly in 5-HT neurons (Figure 3F), predicting <15% of the variance of the subthreshold voltage (R2 = 0.128 ± 0.135) and achieving scores less than half of those observed in mPFC neurons ( = 0.352 ± 0.118). This indicates that the passive membrane filter and adaptation mechanisms included in the canonical GIF model were insufficient to capture the behavior of 5-HT neurons. By augmenting the GIF model with our experimentally constrained model of IA, the aGIF model not only better predicted the voltage (R2 = 0.301 ± 0.200, p=1.96e-4; Figure 3F1) but also the spike timing ( = 0.481 ± 0.148, p=0.001; Figure 3F2) of 5-HT neurons. While the more general iGIF model exhibited a similar improvement in spike timing predictions over the GIF model ( = 0.536 ± 0.154, p=5.89e-4), it did not significantly outperform the aGIF model (p=0.644; Figure 3F2), suggesting that accounting for additional biophysical mechanisms that regulate spiking beyond those included in the aGIF model would be unlikely to further improve performance. Repeating this process using data collected closer to physiological temperature yielded the same result (Figure 3—figure supplement 3). Thus, among the models considered, adding IA to the subthreshold and spiking mechanisms of the GIF model best accounts for the biophysical mechanisms responsible for shaping the responses of 5-HT neurons to in vivo-like inputs.
Turning to the other main cell type of the DRN, we next analyzed the performance of each model in SOM cells (Figure 3G). In these cells, the canonical GIF model produced highly accurate predictions (R2 = 0.600 ± 0.238 and = 0.818 ± 0.149), consistent with its high performance previously reported for cortical GABAergic neurons (Mensi et al., 2012; Teeter et al., 2018). Nonetheless, the iGIF achieved small but significant performance gains ( = 0.892 ± 0.094, p=0.004 vs. aGIF and p=0.003 vs. GIF; Figure 3G2), leading us to select it as our model of SOM neurons.
Our model selection approach identified the most salient components required to capture the input-output functions of individual neurons and allowed us to identify functional differences across cell types. 5-HT neurons were distinguishable from SOM and mPFC cells by their long membrane time constants (Figure 4A, Figure 4—figure supplement 1A) and by the presence of conspicuously potent and protracted adaptation mechanisms (Figure 4B–D). Indeed, in addition to evoking a characteristically large and prolonged adaptation current (Figure 4C), action potential firing in 5-HT neurons produced a substantial and long-lasting increase in firing threshold (Figure 4D; but note that this effect is somewhat attenuated near physiological temperature, Figure 4—figure supplement 2). In contrast, SOM neurons most often displayed either negligible or even depolarizing spike-triggered currents (Figure 4B and C) that may underlie the burst firing patterns often observed in this cell type (Figure 1—figure supplement 2). These observations derived from the parameters of GIF models are not only consistent with our experimental characterization (Figures 1—3), but significantly expand it. Thus, 5-HT neurons are characterized by slow membrane dynamics, IA, and particularly prominent adaptation mechanisms.
The development and validation of accurate single-cell models allowed us to identify the population-level computations operating in the DRN. We took advantage of the one-to-one correspondence between our GIF models and real neurons to construct synthetic populations with realistic neuron-to-neuron heterogeneity by sampling from banks of single-cell models (Figure 5A). In response to step increases of synaptic-like inputs delivered to the entire population (Figure 5B left), the population firing rates (in Hz/neuron; Figure 5B right) of 5-HT, SOM, and mPFC neurons (Figure 5C) transiently increased before relaxing to a significantly lower stationary level. Strong inputs did not produce oscillations in the population firing rates, likely because of population heterogeneity (Figure 5—figure supplement 3; Naud and Gerstner, 2012; Mejias and Longtin, 2012; Mejias et al., 2014; Tripathy et al., 2013). The transient and stationary parts of the population input-output functions were approximately rectified linear functions (Figure 5—figure supplement 3) which we summarized and plotted as the time-varying slope (i.e. gain; Figure 5D). While the gain of the transient response was greater than that of the stationary response in all three cell types, the ratio of transient to stationary gain was substantially higher in 5-HT neurons (Figure 5E; ratio of 3.42 ± 0.07 vs. 1.89 ± 0.04 in SOM and 1.50 ± 0.03 in mPFC; p<0.001 in each case; but note that the gain ratio in 5-HT neurons falls to 2.13 ± 0.03 near physiological temperature [Figure 5—figure supplement 5], consistent with a smaller spike-triggered threshold movement [Figure 4—figure supplement 2]). This marked response of 5-HT cells occurred quickly, in the first 100 ms after the onset of the step. Thus, despite 5-HT neurons being characterized by slow membrane time constants, their population activity provided a remarkably strong encoding of the onset of step synaptic inputs.
We next considered the underlying mechanisms giving rise to the distinctive time-dependent gain of 5-HT neurons. We found that the characteristically strong spike-triggered adaptation of 5-HT neurons (spike-triggered hyperpolarizing adaptation current and threshold movement shown in Figure 4) contributed to the observed relaxation of the population response to a lower stationary level: grafting the weak adaptation from SOM neuron models onto 5-HT models dramatically reduced the ratio of transient to stationary gain, and vice-versa (Figure 5F). These findings are consistent with previous models in other cell types showing that spike-triggered adaptation reduces the sensitivity of neural populations to input changes over long timescales (Ermentrout, 1998; Benda and Herz, 2003; Naud and Gerstner, 2012). Therefore the preferential sensitivity of 5-HT neuron populations to sudden changes in synaptic inputs is a natural consequence of strong adaptation at the single neuron level.
Apart from the strong adaptation mechanisms of 5-HT neurons, two other mechanisms have the potential to dynamically modulate the 5-HT output from the DRN: IA in 5-HT neurons and the feedforward inhibition (FFI) enacted by local DRN interneurons (Zhou et al., 2017; Geddes et al., 2016). To examine the contributions of these two mechanisms, we first connected our existing SOM population models to 5-HT population models using experimentally constrained GABAA receptor-mediated synaptic conductances (see Methods and Figure 5—figure supplement 4).
To dissect the contribution of IA in shaping population responses in this connected DRN network, we applied the same inputs to both 5-HT and SOM neuron populations and examined 5-HT neuron population dynamics (as in Figure 5) while varying the maximal conductance of IA (in 5-HT neurons). The gain of the transient component of the 5-HT response increased markedly when the conductance of IA was set to zero (Figure 6A), while increasing the potency of IA substantially dampened and broadened the population response to fast inputs, reminiscent of IA’s modulation of spike timing jitter observed in our toy model (Figure 2I–K). These simulations thus show that IA substantially regulates the gain of the transient component of DRN 5-HT output evoked by sustained inputs, with negligible effects on the gain of the slower stationary component.
Previous work has shown that glutamatergic excitatory inputs from the PFC make strong mono-synaptic contacts onto both DRN 5-HT and GABAergic neurons, triggering a classic FFI. Intriguingly, the PFC axonal inputs onto these two cellular elements of the DRN are functionally distinct in as much as the PFC synapses onto GABAergic neurons are far more sensitive to endocannabinoid neuromodulation than those onto 5-HT neurons (Geddes et al., 2016). The computational role of this differential sensitivity to neuromodulation is currently unknown. We began by determining the role of the DRN FFI per se by comparing the responses of 5-HT neuron population dynamics with or without SOM cells (Figure 6B). Including FFI onto 5-HT neurons substantially dampened the overall response of the 5-HT population to synaptic inputs, while still sustaining the preferential encoding of the early phase of sudden inputs (Figure 6B2). While introducing FFI did decrease the gain ratio, this decrease was quantitatively smaller than the differences between 5-HT neurons and other cell types shown in Figure 5E and the effect of changing IA shown in Figure 6A, Figure 6B2. We next directly simulated the effects of endocannabinoid modulation of excitatory input to the DRN observed experimentally (Geddes et al., 2016) by weakening the strength of the input to SOM neuron populations by 30% while leaving that to 5-HT neurons intact. By favoring the direct monosynaptic excitation of 5-HT neurons by preferentially diminishing the glutamatergic drive of SOM neurons, this neuromodulation led to an increase in the overall gain of the DRN that was unexpectedly apparent across the entire duration of the response to step inputs (i.e. no change in the gain ratio, Figure 6B2). Thus, the target-specific endocannabinoid-mediated modulation of PFC excitatory drive in DRN exerts a normalizing role by increasing the overall gain of 5-HT output evoked by synaptic inputs without altering its preferential encoding of changes in input, which is emerging as a cardinal feature of DRN network dynamics.
Our electrophysiological recordings showed that excitability heterogeneity is a salient feature of the SOM DRN neuron population. Our modeling approach allows us to specifically examine the role of this cellular heterogeneity in shaping the output of the DRN by comparing our DRN model (Figure 6C) to an alternative homogenized version in which the parameters of SOM neurons were set to fixed values (Figure 6D). Thus, while FFI with an experimentally determined degree of heterogeneity mainly imposed a reduction of the slope of the input-output function (i.e. divisive inhibition), homogeneous FFI mainly shifted the input-output function of the transient component of the population response to the right (i.e. subtractive inhibition; Figure 6E). This subtractive feature can be traced back to a strong non-linearity in the input-output functions of homogenized SOM neuron populations (compare Figure 6E1 and Figure 6F1). In the case of the stationary component, both heterogeneous and homogenized DRN models implemented divisive inhibition (Figure 6F). Therefore, we conclude that heterogeneity among GABAergic neurons implements divisive inhibition.
Adaptation plays a critical role in implementing temporal derivative encoding in sensory systems (Lundstrom et al., 2008; Pozzorini et al., 2013) but has not been ascribed a similar role in neuromodulatory systems such as the DRN. To determine whether the DRN also supports this computation, we parameterized the rate of change of DRN inputs by applying ramp stimuli with variable slopes (i.e. derivatives; Figure 7A and B). Remarkably, the peak 5-HT neuron population firing rate linearly reported the slope of the ramps, an effect which was enhanced by FFI (Figure 7C). We further found that this linearity was conditional on the presence of slightly depolarizing background input (≥20 pA, Figure 7D). Simulations using aGIF models fitted to data collected near physiological temperature yielded similar results; Figure 7—figure supplement 1. The potent adaptation mechanisms of 5-HT neurons play a key role in mediating this linear encoding of input derivative, since reducing the strength of adaptation reduces linearity across a wide range of input baselines (Figure 7E and F). Together, these observations suggest that the DRN signals to its brain-wide target a mixture of the intensity and temporal-derivative of its excitatory inputs, and that the derivative-encoding component dominates when the input is increasing rapidly (Figure 7—figure supplement 2).
The extent to which the output of the DRN signals the temporal derivative of its input is likely to be limited by several factors, notably: the long membrane time constants of 5-HT neurons (Table 1, Figure 4—figure supplement 1A), which cause rapidly fluctuating to be filtered out; the fact that firing rates cannot be less than zero, limiting the dynamic range available to encode negative input derivatives; the presence of IA , which filters out inputs with a high temporal derivative (Figure 2); and the level of background input (Figure 7D). Because IA can be partly inactivated by depolarizing background input, the effects of background input and IA on the derivative-encoding properties of the DRN are expected to interact. Consistent with this idea, removing IA from 5-HT neurons in our DRN network models extended the range of background input where the peak 5-HT neuron population firing rate is an approximately linear function of the slope of a ramp stimulus (Figure 7E and G). In summary, we found that the presence of strong spike-frequency adaptation in 5-HT neurons causes the DRN to signal the rate of change of its input to its brainwide targets, but that this core computation is progressively suppressed when a state of hyperpolarization engages IA .
Here, we sought to characterize the computational properties of the DRN using a bottom-up approach grounded in experimentally constrained models of the two most abundant cell types in this region: 5-HT and SOM GABA neurons. Consistent with, and extending, previous work, we found that 5-HT neurons were relatively homogeneous and characterized by potent spike-frequency adaptation (Figure 1) and by the presence of a strong A-type potassium current (Figure 2), while SOM neurons displayed a considerably more heterogeneous excitability profile (Figure 1 and Figure 1—figure supplement 2). Extensions to classical GIF models (Mensi et al., 2012; Pozzorini et al., 2015) to capture the non-linear subthreshold effects of IA observed in 5-HT neurons were required to adequately capture the spiking response of 5-HT neurons to naturalistic stimuli (Figure 3). This work introduces a new approach to capturing such non-linear subthreshold effects in the form of the aGIF model, which augments the GIF model of Mensi et al., 2012 with experimentally constrained Hodgkin-Huxley style currents, improving model interpretability without compromising predictive performance. Inspecting the parameters of the best performing GIF models revealed that the substantial spike-frequency adaptation observed in 5-HT neurons is not fully explained by their distinctively large AHPs and is partly mediated by a previously undescribed dynamic spike threshold (Figure 4). This model-based approach allowed us to probe causal relationships between specific excitability features and population computations. Thus, we found that the prominent adaptation mechanisms in 5-HT neurons regulated DRN population responses to synaptic inputs (Figure 5), that IA suppressed the response to sudden inputs, and that heterogenous FFI had a divisive rather than subtractive effect on DRN output (Figure 6). By further exploring DRN population dynamics, our simulations demonstrated that 5-HT neurons linearly reported a mixture of the intensity and temporal-derivative of their synaptic inputs (Figure 7), and that the temporal-derivative dominates DRN output when the input is increasing rapidly (Figure 7—figure supplement 2). In summary, this work points to a new computational role for the DRN in encoding the derivative of its inputs and identifies specific cellular and network mechanisms that give rise to this computation and modulate its expression. These results raise important questions about how the selective responses of the DRN to changing synaptic inputs might support its role in guiding animal’s behavior in dynamic environments.
The computational and statistical modeling methodology presented here was designed to bridge the gap between specific biophysical mechanisms and network-level computation. Closing this gap has also been the target of complex biophysical simulations, motivated by the hope to create tools for testing disease-related treatments and for untangling the computations performed by large neural networks (Markram, 2006; Billeh et al., 2020). Preserving the accuracy and identifiability of simpler approaches (Gerstner and Naud, 2009; Mensi et al., 2012; Pozzorini et al., 2013; Teeter et al., 2018), the ‘augmented GIF’ model developed here explicitly incorporates the most important biophysical features of 5-HT neurons, allowing us to probe their contributions to network-level computation by altering or removing the corresponding model components during network simulations. While the aGIF framework was developed here to capture the effects of inactivating subthreshold potassium currents in 5-HT neurons, it lends itself equally well to capturing the effects of other subthreshold voltage-gated currents. We note that, as in other methods based on linear regression of nonlinear ion channel dynamics (Huys et al., 2006; Huys and Paninski, 2009), adequate experimental estimates of the voltage-dependent gating features of the conductance at play must be available to be inserted in the aGIF model. Altogether, this expanded modeling framework adds to a toolset of computational approaches for interrogating the role of particular microcircuit motifs (e.g. FFI) or excitability features (e.g. spike-triggered adaptation) in shaping network computations, while lending itself to more elaborate inference methodologies (Gonçalves et al., 2019).
Could the dynamical features identified here have been captured by a simpler modeling framework? Two closely related approaches that we have not considered here are linear-nonlinear (LNL) and generalized linear models (GLMs), which are trained using only the spike output and external input to each cell and do not consider the subthreshold voltage (Pillow and Simoncelli, 2006; Pillow et al., 2008). Despite the fact that the GLM approach was not possible here given the very low firing rates of 5-HT neurons and the large number of action potentials required for accurate characterization in the absence of information about the subthreshold voltage, it is worth asking whether GLMs could in principle capture the network-level properties of 5-HT signaling. For instance, the role of spike-triggered adaptation in conveying preferential sensitivity to suddenly changing inputs arises in GLMs (Naud and Gerstner, 2012), but the state-dependence of the input derivative sensitivity identified in 5-HT neurons (Figure 7) could not have been captured by a GLM implementation. In summary, the GIF framework provides a more solid foundation for network modeling than LNL- or GLM-based approaches for cell types with very low firing rates or highly state-dependent output.
Does the aGIF modeling approach represent an unnecessary complication of the GIF model framework or, conversely, an oversimplification of detailed Hodgkin-Huxley models? GIF models that do not explicitly account for the effects of specific ionic conductances produce highly accurate spiketrain predictions in many cell types (Gerstner and Naud, 2009; Mensi et al., 2012; Pozzorini et al., 2013; Teeter et al., 2018); indeed, even in 5-HT neurons, the iGIF model predicts the timing of spikes with an accuracy equal to that of our aGIF model. For questions where the biophysical mechanisms that regulate spiking are not of primary interest and for systems where simpler LNL or GLM models are not able to predict the timing of spikes accurately (e.g. due to low firing rates as discussed above), non-augmented GIF models remain suitable tools. In our case, it would not have been possible to probe the effect of IA on the network-level processing features of the DRN without the aGIF model.
Previous modeling work has implicated IA in controlling the sensitivity of the stationary response to sustained inputs (Connor and Stevens, 1971; Connor et al., 1977; Tuckwell and Penington, 2014; Drion et al., 2015). These studies contrast with our findings which implicate this current in the control of the transient component but show almost no effect on the stationary component of the response. This discrepancy can be explained by noting that the AHPs of 5-HT neurons (and thus of our computational model) do not reach the hyperpolarized potentials required to free IA from inactivation (Figure 1 and Figure 1—figure supplement 1), in contrast to the model of Connor et al., 1977. As a result, IA remains mostly inactivated during sustained inputs, and the stationary response is mostly regulated by the interplay between spike-triggered adaptation and the strength of the input. Other factors such as a shift in the activation and/or inactivation curves (e.g. by neuromodulators) are expected to influence how IA controls the transient and stationary components of the response. Finally, it is interesting to note that IA is also highly expressed in the dendrites of cortical neurons, where it may have an analogous function (Hoffman et al., 1997; Harnett et al., 2013; Ujfalussy et al., 2018; Payeur et al., 2019). Our results hint at a possible general role of IA in suppressing transient responses to sustained inputs in the midbrain, cortex, and other systems.
5-HT neurons are not all alike in every respect: recent experimental work has uncovered molecular, electrophysiological (Calizo et al., 2011), developmental, and anatomical (Commons, 2015; Ren et al., 2018) differences among 5-HT neurons across raphe nuclei and within the DRN (reviewed in Okaty et al., 2019). Most relevant to our work are previously reported quantitative differences in the excitability of serotonin neurons located in the dorsomedial DRN, ventromedial DRN, and median raphe nucleus (Calizo et al., 2011). These observations suggest that the predictions made by our model, which was fitted primarily to serotonin neurons from the ventromedial DRN, may agree qualitatively but not quantitatively with the behavior of 5-HT neuron ensembles in these areas. While there is not yet any evidence that serotonin neurons in different parts of the serotonin system perform qualitatively different computational operations, this remains an intriguing possibility for future work.
How the heterogeneity of excitability influences the response properties of neuronal populations depends on a number of factors. Specifically, we and others Mejias and Longtin, 2014 have argued that heterogeneity of feedback inhibition (and of principal cells) implements a divisive effect on the stationary part of the population input-output function. For FFI, a divisive effect on the gain of stationary input-output functions is expected in naturalistic conditions (Mejias and Longtin, 2014). The findings outlined here further support these theoretical results by showing that the heterogeneous FFI remains divisive on the transient part of the response. Divisive inhibition has been proposed to be essential to counteract strong excitation so as to maintain activity within an adequate dynamic range (Chance and Abbott, 2000; Ferguson and Cardin, 2020), and it is expected that brain circuits will harness cellular and circuit-level mechanisms to tune their sensitivity to relevant inputs while maintaining overall stability. This point is germane to 5-HT neurons given their position at the confluence of many excitatory input streams (Weissbourd et al., 2014; Pollak Dorocic et al., 2014; Ogawa et al., 2014; Zhou et al., 2017; Ren et al., 2018; Geddes et al., 2016). Thus, while the exact behavioral function of the 5-HT system is still unclear, uncovering important components of its gain control mechanisms might provide useful hints about how it integrates its multifold inputs.
Neuromodulators can dynamically reconfigure information processing in neural circuits that are otherwise anatomically fixed (Marder, 2012; Tsuda et al., 2021). While 5-HT is considered to be a neuromodulator, the DRN network is itself under neuromodulatory influence, both from distal (e.g. locus coeruleus or ventral tegmental area) or local (e.g. endocannabinoids, 5-HT itself) sources (Baraban and Aghajanian, 1981; Aman et al., 2007; Weissbourd et al., 2014; Geddes et al., 2016; Lynn et al., 2022). Whereas previous work has outlined defined cellular metrics that are modulated by specific receptor subtypes (e.g. changes in release probability or direct membrane depolarization/hyperpolarization), the consequences of these neuromodulatory influences on higher-order network computation are only superficially understood. Here, we showcase two broad neuromodulatory mechanisms that enact different effects on population coding. Through simulations, we show that reducing the magnitude of IA (which could be caused, for instance, in vivo by noradrenergic input the DRN [Aghajanian, 1985]) enhances the sensitivity of the raphe response to the onset of step inputs while leaving the stationary firing rate unchanged. In contrast, the cannabinoid-mediated preferential reduction of FFI onto 5-HT neurons (caused by the tonic activation of DRN endocannabinoid receptors, as expected to occur, for instance, during marijuana recreational or therapeutic use [Geddes et al., 2016]) rather causes a general reduction in the output gain of the DRN. Together with our simulations probing the temporal derivative-encoding properties of this region, these observations point to a conceptual model in which the output of the DRN represents a mixture of the intensity and temporal derivative of its input where IA controls the relative balance of the two components, and FFI regulates the overall intensity of the output, and where these functions can be rapidly and independently tuned by neuromodulatory control.
Our heuristic model of the DRN helps to illustrate the unexpectedly multifaceted nature of the computations performed by this evolutionarily ancient region, but, like most heuristics, it remains an oversimplification. Some of the qualitative features of DRN processing emerging from our simulations are not explained by our “input intensity plus temporal derivative” heuristic (e.g. the ability of FFI to modulate the temporal derivative-encoding properties of the DRN, or the attenuation of these same coding properties by hyperpolarization [Figure 7]), presenting further opportunities to better understand the influence of neuromodulation on network computation in this region.
The role of 5-HT signaling in modulating behavior is increasingly conceptualized through the lens of reinforcement learning (RL) theory. Indeed, 5-HT output has been proposed to loosely encode or modulate every component of classical RL (Sutton and Barto, 2018, Dayan and Huys, 2009), including a reward signal (Li et al., 2016), state value (Cohen et al., 2015; Luo et al., 2016), bias in state-action value (Miyazaki et al., 2018), temporal discounting factor (Doya, 2002; Schweighofer et al., 2008), prediction error (Daw et al., 2002, but see Boureau and Dayan, 2011), and learning rate (Matias et al., 2017; Iigaya et al., 2018; Grossman et al., 2022), with varying degrees of experimental support. Might the derivative-like computation described here have a place in an RL-based conception of DRN function? For now, it is only possible to speculate. Existing RL models of DRN function bin time in increments of tens of seconds, obscuring the faster adaptation dynamics that are the subject of our work. How and whether the sub-second fluctuations in DRN 5-HT neuron activity that are consistently observed in reward learning experiments (Ranade and Mainen, 2009; Cohen et al., 2015; Li et al., 2016; Zhong et al., 2017; Grossman et al., 2022) should be incorporated into RL models remains unclear. Our results suggest that RL operations that can be seen as computing a temporal derivative are candidates for an RL-based account of DRN function.
If the electrophysiological features of individual 5-HT neurons directly participate in shaping the computations enacted by the DRN, the same is likely true for other neuromodulatory systems, and this work may offer overall guiding principles. For instance, dopamine neurons, well known for their reward prediction error-like coding properties (Schultz et al., 1997), bear some electrophysiological features in common with DRN 5-HT neurons, with both cell types exhibiting strong adaptation and a prominent A-type potassium current (Grace and Onn, 1989, Khaliq and Bean, 2008). Dopamine neurons have been proposed to encode reward prediction errors partly by approximating a mixture of a value signal and its temporal derivative (Kim et al., 2020), hinting at a possible role for adaptation in implementing one of the central computations of RL.
If the derivative-like operation identified here does not directly contribute to computing one of the key components of RL, what might its role in the DRN be? One possibility is that strong spike-triggered adaptation may optimize the efficiency of neural coding by filtering out temporally redundant information, a phenomenon referred to as predictive coding and that is ubiquitous in sensory systems (Brenner et al., 2000; Barlow, 2001; Ulanovsky et al., 2003; Kohn, 2007). As the search for a unified interpretation of DRN 5-HT activity continues, our results provide a new perspective on the fast component of 5-HT neuron dynamics: fluctuations in 5-HT neuron’s activity do not solely encode the intensity of their input, but rather how quickly their inputs are changing over time.
Experiments were performed on male and female C57/Bl6 mice aged 4–8 weeks. Slc6a4-cre::Rosa-TdTomato (SERT-Cre) and Sst-cre::Rosa-TdTomato transgenic lines were used to fluorescently label DRN 5-HT and somatostatin (SOM) GABA neurons, respectively. Animals were group-housed and kept on a 12:12 hr light/dark cycle with access to food and water ad libitum. All experiments were carried out in accordance with procedures approved by the University of Ottawa Animal Care and Veterinary Services (protocol numbers CMM-164, CMM-176, CMM-1711, CMM-1743, and CMM-2737).
Animals were deeply anesthetized using isofluorane (Baxter Corporation) before being euthanized by decapitation. The brain was quickly removed from the skull and submerged into ice-cold dissection buffer containing the following: 119.0 mM choline chloride, 2.5 mM KCl, 4.3 mM MgSO4, 1.0 mM CaCl2, 1.0 mM NaH2PO4, 1.3 mM sodium ascorbate, 11.0 mM glucose, 26.2 mM NaHCO3; saturated with 95% O2/5% CO2. A Leica VT1000S vibratome was used to cut 300-µm coronal sections of midbrain containing the DRN or of the cortex containing the mPFC in the same ice-cold choline dissection buffer. After cutting, slices were placed in a recovery chamber filled with artificial cerebrospinal fluid containing the following: 119.0 mM NaCl, 2.5 mM KCl, 1.3 mM MgSO4, 2.5 mM CaCl2, 1.0 mM NaH2PO4, 11.0 mM glucose, 26.2 mM NaHCO3; ∼298 mOsm, maintained at 37°C, and continuously bubbled with 95% O2/5% CO2. The recovery chamber was allowed to equilibrate to room temperature for 1 h before beginning experiments.
Neurons were visualized using an upright microscope (Olympus BX51WI) equipped with differential interference contrast and a ×40, 0.8 NA water-immersion objective. Whole-cell recordings were obtained from fluorescently labeled DRN 5-HT and SOM neurons and unlabeled mPFC L5 pyramidal neurons using glass electrodes (Sutter Instruments; tip resistance 4–6 MOhm). For most experiments, the following potassium gluconate-based internal solution was used: 135 mM potassium gluconate, 6.98 mM KCl, 10 mM HEPES, 4 mM Mg ATP, 0.40 mM GTP, 10 mM Na phosphocreatine; adjusted to pH 7.25 with KOH, 280–290 mOsm. A subset of experiments (GABA synaptic physiology) were carried out using a cesium-based internal solution (120 mM CsMeSO3, 10 mM EGTA, 5 mM TEA Cl, 1 mM CaCl2, 10 mM Na HEPES, 4 mM Mg ATP, 2 mM GTP, 2 mM QX-314, and 10 mM Na phosphocreatine; adjusted to pH 7.25 with CsOH, 280–290 mOsm) and in the presence of bath-applied 100 µM (2 R)-amino-5-phosphonovaleric acid (APV) and 5 µM 2,3-dioxo-6-nitro-1,2,3,4-tetrahydrobenzo[f]quinoxaline-7-sulfonamide (NBQX). For voltage clamp experiments, whole-cell capacitance compensation was applied manually following break-in, and leak current subtraction was performed post hoc using membrane leak conductance estimated based on a –5 mV pulse at the start of each sweep. Experiments were carried out at room temperature except where noted. For current clamp experiments used to fit GIF models, access resistance was compensated using an active electrode compensation method (Pozzorini et al., 2015). For voltage clamp experiments used to characterize IA in 5-HT neurons at room temperature, recordings had 14.7 ± 6.2 MOhm (mean ± SD; half of recordings between 12.8 MOhm and 21.6 MOhm) after applying an access resistance cutoff of 30 MOhm (a more stringent cutoff of 20 MOhm yielded statistically indistinguishable estimates of IA maximal conductance and kinetic parameters; compare Figure 1D and Figure 1—figure supplement 5). For voltage clamp experiments used to characterize whole-cell currents in SOM neurons, recordings had 14.3 ± 7.0 MOhm (mean ± SD; half of recordings between 9.8 MOhm and 15.5 MOhm) after applying a similar cutoff of 30 MOhm. For synaptic electrophysiology experiments, recordings had 5.7 ± 0.5 MOhm (mean ± SD; range 5.0 MOhm–6.1 MOhm) after applying a cutoff of 10 MOhm. Recordings were collected with an Axon MultiClamp 700B amplifier, and the analog signals were filtered at 2 kHz and digitized at 10 kHz using an Axon Digidata 1550 digitizer.
The GIF and Na-inactivation GIF (iGIF) models have been described previously in detail (Mensi et al., 2012; Pozzorini et al., 2015; Mensi et al., 2016). Briefly, the GIF and iGIF are composed of a subthreshold component which integrates input currents into voltage and a stochastic spiking rule which transforms subthreshold voltage into a series of spikes. The subthreshold dynamics of the GIF and iGIF are given by
where is the set of spike times and is the spike-triggered adaptation current. Here the are coefficients estimated from the data and the are fixed hyperparameters; see Appendix for details. The GIF emits spikes according to an inhomogeneous Poisson process with intensity , given by
where is the stationary threshold, is the spike-triggered threshold movement (where the are coefficients estimated from the data and the are fixed; see Appendix), is the threshold sharpness (mV; larger values increase the stochasticity of spiking), and Hz is a constant such that is in units of Hz. In the iGIF, an additional variable is added to the numerator of the exponentiated term in Equation 2 to account for voltage-dependent changes in threshold:
The equilibrium voltage-dependent change in spike threshold is a piecewise constant function of voltage where each defines the value of over the voltage range and . The locations of the steps in the piecewise constant function are selected based on the data. (See Mensi et al., 2016 for details on the iGIF model.) Our aGIF model is identical to the GIF model except that two Hodgkin-Huxley currents which together capture the voltage-gated potassium currents found in 5-HT neurons (see ‘Potassium current’, below) are added to the subthreshold dynamics given in Equation 1, yielding
as the definition of the subthreshold dynamics of the aGIF model.
The procedures for fitting the GIF and iGIF models to electrophysiological data have also been described previously in detail (Mensi et al., 2012; Pozzorini et al., 2015; Mensi et al., 2016). Briefly, parameter estimation for both models occurs in two stages: first, the subthreshold parameters are estimated by regression, and second, the threshold parameters are estimated by maximizing the likelihood of the observed spiketrain as a function of the threshold parameters. The fitting procedure for the aGIF is very similar to that of the GIF, with adjustments to the subthreshold fitting procedure to accommodate the extra terms in Equation 3 (see Appendix for details). Neurons with non-stationary firing statistics (Pearson correlation between number of spikes and validation sweep number above 0.9) or highly variable spike timing (intrinsic reliability <0.1) were automatically excluded from our analysis. Exclusion criteria were fixed before comparing candidate models.
Our toy model of a neuron with an inactivating potassium current is based on an LIF augmented with (see ‘Potassium current’ below):
where and are the leak conductance and reversal, respectively, and is the external input to the model. To reduce the number of free parameters, the model we used is non-dimensionalized with respect to the membrane time constant and leak conductance , yielding
where is in units of the membrane time constant, is the effective maximum conductance associated with , and is the effective external input. The gating variables and are described below in ‘Potassium current’.
The voltage-gated potassium currents in 5-HT neurons were modeled in terms of an inactivating current and a non-inactivating current, we refer to as IA and IK , respectively. These were defined as follows
where is the maximal conductance; and are the activation and inactivation gates of , respectively; is the activation gate of ; and EK = –101 mV is the reversal potential of potassium in our recording conditions. Note that although this value is not physiological, the effect of varying this parameter is very similar to the effect of varying , as we have done in the result section. For simulations involving models fitted to data collected at 29–30°C, mV was used. The equilibrium state of each gate is a sigmoid function of voltage
where is the half-activation voltage (mV), is the slope (mV– 1), and is a scaling factor.
To keep the number of parameters in our current model to a minimum, we assumed that the and gates have instantaneous kinetics (allowing their corresponding equilibrium gating functions and to be used directly in Equation 4), and that the gate inactivates and de-inactivates with a single time constant (ms) that does not depend on voltage. The time dynamics of the gate are therefore given by
was calculated based on the training set predicted by the subthreshold component of a given GIF model (Equations 1 and 3, where the spike times were constrained to match the data), excluding a small window around each spike (from 1.5 ms before to 6.5 ms after in 5-HT neurons, and from 1.5 ms before to 4.0 ms after in SOM and mPFC neurons). was calculated based on validation set data as previously described by Naud et al., 2011. This metric is defined as
where is the number of model-predicted spikes that occur within 8 ms of a spike in the validation data, and and are the corresponding numbers of coincident spikes across sweeps in the validation data and model predictions (where is corrected for small sample bias). can be interpreted as the fraction of model-predicted spikes that occur within 8 ms of a spike emitted by a real neuron (the spike timing precision is set to 8 ms by inspecting the relationship between precision and intrinsic reliability [Jolivet et al., 2008]), corrected such that the chance level is 0 and perfect agreement between predicted and observed spikes is 1.
DRN network models were constructed by connecting a population of 400 SOM neuron models to a population of 600 5-HT neuron models in a feed-forward arrangement. Population models were bootstrapped by sampling with replacement from a bank of experimentally constrained GIF models. SOM neuron models were randomly connected to 5-HT neuron models with a connection probability of 2%, such that the expected number of GABAergic synapses on each 5-HT neuron model was 8. We used a conductance-based model of GABAergic synapses with a fixed reversal potential of –76.7 mV, conductance of 0.3 nS, and biexponential kinetics with ms, ms, and a propagation delay of 2.0 ms.
Simulated 5-HT populations with decreased or increased IA were generated by setting in all single neuron models to 0 nS or 10 nS, respectively. DRN network models with homogenized SOM neuron populations were created by setting all SOM neuron model parameters to their respective median values from the bank of experimentally constrained single neuron models. Population models in which the adaptation mechanisms of 5-HT and SOM neuron models were swapped were generated by randomly sampling a GIF model of the opposite cell type and substituting in its adaptation filter coefficients and . This procedure is summarized in the following pseudocode:
for 5-HT_model in 5-HT_population; do
SOM_model = random_choice(SOM_models)
5-HT_model.eta.coefficients= SOM_model.eta.coefficients
5-HT_model.gamma.coefficients= SOM_model.gamma.coefficients
end for.
Simulations were implemented in Python and C++ using custom-written extensions of the GIF Fitting Toolbox (Pozzorini et al., 2015; original code archived at https://github.com/pozzorin/GIFFittingToolbox; Pozzorini, 2016). Numerical integration was performed using the Euler method with a time step of 0.1 ms for the GIF model and related models (to match the sampling rate of electrophysiological recordings) and for the toy model of a neuron with IA .
Statistical analysis was carried out using the SciPy and statannot (https://github.com/webermarcolivier/statannot; Weber, 2022) Python packages. Non-parametric tests were used for all two-sample comparisons (Mann-Whitney U test for unpaired samples and Wilcoxon signed-rank test for paired samples). Non-parametric tests were chosen because we often had reason to believe that our data did not come from a normal distribution, either due to intrinsic qualities of the data, such as being bounded between 0 and 1, or due to skewness apparent in our samples. Whenever multiple tests were performed in the same figure panel, p-values were adjusted for multiple comparisons using the Bonferroni correction. ‘*’, ‘**’, ‘***’, and ‘****’ are used in figures to denote statistical significance at the p≤0.05, 0.01, 0.001, and 0.0001 levels, respectively, and ‘o’ is used to indicate a trend toward significance (defined as 0.05<p≤0.1). Exact p-values are reported in the main text, and summary statistics are presented as mean ± SD. Sample sizes always refer to biological replicates.
The subthreshold dynamics of the aGIF model are given by
where is the membrane voltage, is an externally applied current, is the driving force on potassium, and is the adaptation current summated over all past spikes ( is the set of all spike times).
The adaptation current produced by a single spike is implemented as a sum of exponentials given by
where the timescales are treated as hyperparameters. If we substituted this implementation of back into Equation A1, the term associated with the spike-triggered current would become . This double sum can be written more concisely as
where is a basis for the adaptation current over the timescale .
Given a training dataset , knowledge of the equilibrium gating functions , and appropriate choices of in , our goal is to estimate the remaining parameters in Equation A4; namely, , where is the time constant of the inactivation gate . Fortunately, all of these except for can be estimated easily using linear regression.
We begin by rewriting Equation A4 as the product of a row vector of predictors and a column vector of coefficients as follows
We solve this subject to using scipy.optimize.lsq_linear.
Next we turn to the question of calculating all of the components of . Because Equation A4 only reflects the subthreshold dynamics of the aGIF model, we begin by removing all time points in within a small window around each spike (from 1.5 ms before each spike until the end of the absolute refractory period). Given the voltages in the cleaned dataset and the set of spike times, it is simple to calculate . To calculate for each time point, we order the values of according to time and integrate numerically using a fixed time step, and the initial condition . This has the effect of assuming that the dynamics of the gate are paused just before each spike and resumed at the end of the refractory period.
The variance explained by the subthreshold model is a non-convex function of . We therefore conducted a line search over plausible values of and chose the value associated with the highest variance explained. This is equivalent to solving
where .
Single-neuron model hyperparameters. For more details on the iGIF model hyperparameter , see Mensi et al., 2016.
Model | Parameter | Symbol | Cell type | Value (ms) |
---|---|---|---|---|
All | timescales | All | 3, 10, 30, 100, 300, 1000, 3000 | |
All | timescales | None | All | 3, 30, 300, 3000 |
All | Refractory period | None | 5-HT | 6.5 |
SOM and mPFC | 4.0 | |||
iGIF | Candidate threshold-coupling timescales | All | 1, 2, 5, 10, 22, 46, 100 | |
aGIF | Candidate inactivation timescales | All | 10, 13, 18, 25, 33, 45, 61, 82, 111, 150 |
Raw data is available on Dryad at https://doi.org/10.5061/dryad.66t1g1k2w. Code to fit models, run simulations, and reproduce figures is available at https://github.com/nauralcodinglab/raphegif, (copy archived at swh:1:rev:0a11ab4fe19fa54ddb3f734ad9131d6789b6bed5).
-
-
D2-like dopamine receptors depolarize dorsal raphe serotonin neurons through the activation of nonselective cationic conductanceThe Journal of Pharmacology and Experimental Therapeutics 320:376–385.https://doi.org/10.1124/jpet.106.111690
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Dynamic, nonlinear feedback regulation of slow pacemaking by A-type potassium current in ventral tegmental area neuronsThe Journal of Neuroscience 28:10905–10917.https://doi.org/10.1523/JNEUROSCI.2237-08.2008
-
-
-
-
-
Stressor controllability and learned helplessness: the roles of the dorsal raphe nucleus, serotonin, and corticotropin-releasing factorNeuroscience and Biobehavioral Reviews 29:829–841.https://doi.org/10.1016/j.neubiorev.2005.03.021
-
-
Differential effects of excitatory and inhibitory heterogeneity on the gain and asynchronous state of sparse cortical networksFrontiers in Computational Neuroscience 8:107.https://doi.org/10.3389/fncom.2014.00107
-
Subtractive, divisive and non-monotonic gain control in feedforward nets linearized by noise and delaysFrontiers in Computational Neuroscience 8:19.https://doi.org/10.3389/fncom.2014.00019
-
Parameter extraction and classification of three cortical neuron types reveals two distinct adaptation mechanismsJournal of Neurophysiology 107:1756–1775.https://doi.org/10.1152/jn.00408.2011
-
-
-
Coding and decoding with adapting neurons: A population approach to the peri-stimulus time histogramPLOS Computational Biology 8:e1002711.https://doi.org/10.1371/journal.pcbi.1002711
-
-
Automated high-throughput characterization of single neurons by means of simplified spiking modelsPLOS Computational Biology 11:e1004275.https://doi.org/10.1371/journal.pcbi.1004275
-
-
-
Transient firing of dorsal raphe neurons encodes diverse and specific sensory, motor, and reward eventsJournal of Neurophysiology 102:3026–3037.https://doi.org/10.1152/jn.00507.2009
-
-
-
-
-
-
-
-
-
-
Author details
- Richard Naud
- Jean-Claude Béïque
- Richard Naud
- Jean-Claude Béïque
- Richard Naud
- Jean-Claude Béïque
- Jean-Claude Béïque
The funders had no role in study design, data collection and interpretation, or the decision to submit the work for publication.
This work was carried out on the unceded and unsurrendered land of the Algonquin Anishinaabe people. We thank Dr. Simon Chen for providing SOM-Cre::Rosa-TdTomato mice and Liwen Cai and David Lemelin for technical assistance with mouse lines. We would also like to thank Sébastien Maillé for contributions to pilot-testing of the GIF model in 5-HT neurons and all other members of the J-CB. and RN labs for helpful discussions. EH is thankful to have received graduate scholarships from the Canadian Institutes of Health Research and the Natural Sciences and Engineering Research Council of Canada. This work was supported by grants from the Canadian Institutes of Health Research, the Natural Sciences and Engineering Research Council of Canada, the Canada Foundation for Innovation, Brain Canada (Canadian Neurophotonic Platform), and the Krembil Foundation.
All experiments were carried out in accordance with procedures approved by the University of Ottawa Animal Care and Veterinary Services (protocol numbers CMM-164, CMM-176, CMM-1711, CMM-1743, and CMM-2737). At the beginning of each experiment, animals were deeply anesthetized using isofluorane to minimize suffering before being euthanized.
© 2023, Harkin et al.
This article is distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use and redistribution provided that the original author and source are credited.
-
- 1,331
- views
-
- 172
- downloads
-
- 5
- citations
Views, downloads and citations are aggregated across all versions of this paper published by eLife.
Further reading
-
Planar cell polarity (PCP) – tissue-scale alignment of the direction of asymmetric localization of proteins at the cell-cell interface – is essential for embryonic development and physiological functions. Abnormalities in PCP can result in developmental imperfections, including neural tube closure defects and misaligned hair follicles. Decoding the mechanisms responsible for PCP establishment and maintenance remains a fundamental open question. While the roles of various molecules – broadly classified into ‘global’ and ‘local’ modules – have been well-studied, their necessity and sufficiency in explaining PCP and connecting their perturbations to experimentally observed patterns have not been examined. Here, we develop a minimal model that captures the proposed features of PCP establishment – a global tissue-level gradient and local asymmetric distribution of protein complexes. The proposed model suggests that while polarity can emerge without a gradient, the gradient not only acts as a global cue but also increases the robustness of PCP against stochastic perturbations. We also recapitulated and quantified the experimentally observed features of swirling patterns and domineering non-autonomy, using only three free model parameters - rate of protein binding to membrane, the concentration of PCP proteins, and the gradient steepness. We explain how self-stabilizing asymmetric protein localizations in the presence of tissue-level gradient can lead to robust PCP patterns and reveal minimal design principles for a polarized system.
-
The basolateral amygdala (BLA) is a key site where fear learning takes place through synaptic plasticity. Rodent research shows prominent low theta (~3–6 Hz), high theta (~6–12 Hz), and gamma (>30 Hz) rhythms in the BLA local field potential recordings. However, it is not understood what role these rhythms play in supporting the plasticity. Here, we create a biophysically detailed model of the BLA circuit to show that several classes of interneurons (PV, SOM, and VIP) in the BLA can be critically involved in producing the rhythms; these rhythms promote the formation of a dedicated fear circuit shaped through spike-timing-dependent plasticity. Each class of interneurons is necessary for the plasticity. We find that the low theta rhythm is a biomarker of successful fear conditioning. The model makes use of interneurons commonly found in the cortex and, hence, may apply to a wide variety of associative learning situations.
|
<urn:uuid:559e89f9-80c7-440f-af71-0a279c8bd6fa>
|
CC-MAIN-2024-51
|
https://elifesciences.org/articles/72951
|
2024-12-08T01:35:11Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066433271.86/warc/CC-MAIN-20241207224914-20241208014914-00693.warc.gz
|
by
|
4.0
|
a_tag
| false | true | null | null | null |
{
"abbr": [
"by",
"by"
],
"in_footer": [
true,
false
],
"in_head": [
false,
false
],
"location": [
"a_tag",
"a_tag"
],
"version": [
"4.0",
"4.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.987638 |
Hipparchia miguelensis (Le Cerf, 1935)
Quick facts
Threat status Europe | Least Concern (IUCN) |
---|---|
The EUNIS species component has very limited information about this species. The main focus of the EUNIS species component is to provide relevant information about the European species protected by Directives, Conventions and Agreements. The species assessed in the European Red Lists prepared by the IUCN for the European Commission are also included. See here what is Europe from a geographical point of view. Other resources available below may have more information. |
Distribution
Threat and conservation status
IUCN Red List status of threatened species
The IUCN Red List threat status assesses the risk of extinction.
EU conservation status
The EU conservation status is assessed for species mentioned in the EU Habitats Directive annexes. The EU Habitats Directive does not cover this species.
|
<urn:uuid:9f06fd6c-8649-4cfb-bc5a-c34c03c243f2>
|
CC-MAIN-2024-51
|
https://eunis.eea.europa.eu/species/90892
|
2024-12-08T01:13:12Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066433271.86/warc/CC-MAIN-20241207224914-20241208014914-00693.warc.gz
|
by
|
2.5
|
a_tag
| false | false | null | null | null |
{
"abbr": [
"by"
],
"in_footer": [
false
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"2.5"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.975131 |
From 23-03-13 Aam Aadmi Party ( AAP ) Great leader Arvind Kejriwal is taking up a Gandhian Satyagraha against crippling Electricity rates by sitting on an Indefinite Fast and by a launching a Movement against payment of unjust Bijli Bills. Jalandhar citizens are reminded of the similar Satyagraha conducted by the Father of the Nation ( Salt Satyagraha ) against the Zulms of the Britishers.
In Punjab , Govt. charges Non Vote Banks double the Electricity rates whereas Vote Banks ( including Super Rich Farmers )are given Free Electricity.
No Relief is given to Physically Handicapped Punjabis as they are not considered to be a Vote Bank.
Physically Handicapped are Demanding Deemed SC / ST status.
|
<urn:uuid:afd5a830-6281-408e-a917-fbf5674746af>
|
CC-MAIN-2024-51
|
http://www.punjabjalandhar.info/2013/03/jalandhar-supports-aap-satyagraha.html
|
2024-12-09T03:04:51Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066460657.93/warc/CC-MAIN-20241209024434-20241209054434-00593.warc.gz
|
by
|
2.5
|
a_tag
| false | true | null | null | null |
{
"abbr": [
"by",
"by"
],
"in_footer": [
true,
true
],
"in_head": [
false,
false
],
"location": [
"a_tag",
"a_tag"
],
"version": [
"2.5",
"2.5"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.985647 |
wooden desk accessories
From Wikipedia, the free encyclopedia
Look up wooden desk accessories in Wiktionary, the free dictionary. |
- wooden desk accessoriesMs Stephens continues: “The new extension has provided a fantastic and really flexible space that thanks to the new PURe® patio doors and windows, can be enjoyed whatever the weather. It’s great to be able to open up the living space and enjoy the close access we now have to the garden but even when the blustery weather that we are so familiar with here in the Yorkshire Dales takes hold, the glazing has provided us with a peaceful and cosy retreat. It’s the perfect space for both work and relaxation and I couldn’t be happier!” “Our entry for this award is a thank you to them for their vision and willingness to do things differently. It’s also a thank you to BEIS for the courage and far-sightedness they have shown in working constructively with industry to fit their approach to the needs and circumstances of UK manufacturing.” We’ve been determined to create a more productive conversation and shared vision for improving competitiveness through decarbonisation and energy efficiency – and to get people on all sides to understand one another and be ready to play their part. I want to express my thanks to the British Glass staff who have made this happen.” The black-tie awards ceremony was held on 15 June at the Royal Armouries in Leeds, at the centre of the country’s great east-west glass manufacturing corridor – where nine out of ten of the UK’s largest glass manufacturers have production sites.
This office depot desk with hutch page lists articles associated with the title Seo. If an honey can do lap desk led you here, you may wish to change the link to point directly to the intended article. |
|
<urn:uuid:0142ec38-2717-4afe-ac60-8a430ff7ddaa>
|
CC-MAIN-2024-51
|
http://www.serviziocivile.provincia.foggia.it/desk/?1086210-1.html
|
2024-12-09T04:12:28Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066460657.93/warc/CC-MAIN-20241209024434-20241209054434-00593.warc.gz
|
by-sa
|
3.0
|
link_tag
| true | false | null | null | null |
{
"abbr": [
"by-sa"
],
"in_footer": [
false
],
"in_head": [
true
],
"location": [
"link_tag"
],
"version": [
"3.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.998871 |
desk height standard
From Wikipedia, the free encyclopedia
Look up desk height standard in Wiktionary, the free dictionary. |
- desk height standard Sunglasses allow better vision in bright daylight, and may protect one's eyes against damage from high levels of ultraviolet light. Typical sunglasses are darkened for protection against bright light or glare; some specialized glasses are clear in dark or indoor conditions, but turn into sunglasses when in bright light. Most sunglasses do not have corrective power in the lenses; however, special prescription sunglasses can be ordered. Specialized glasses may be used for viewing specific visual information (such as stereoscopy) or 3D glasses for viewing three-dimensional movies. Sometimes glasses with no corrective power in the lenses are worn simply for aesthetic or fashion purposes. Even with glasses used for vision correction, a wide range of designs are available for fashion purposes, using plastic, wire, and other materials. Owing to the property’s location in heart of the Yorkshire Dales, it was also vital that the new windows and patio doors offered superior thermal efficiency and acoustic performance as well as ease of operation and an attractive appearance. Glasses, also known as eyeglasses or spectacles, are devices consisting of glass or hard plastic lenses mounted in a frame that holds them in front of a person's eyes, typically using a bridge over the nose and arms which rest over the ears. Glasses are typically used for vision correction, such as with reading glasses and glasses used for nearsightedness. Safety glasses provide eye protection against flying debris for construction workers or lab technicians; these glasses may have protection for the sides of the eyes as well as in the lenses. Some types of safety glasses are used to protect against visible and near-visible light or radiation. Glasses are worn for eye protection in some sports, such as squash. Glasses wearers may use a strap to prevent the glasses from falling off during movement or sports. Wearers of glasses that are used only part of the time may have the glasses attached to a cord that goes around their neck, to prevent the loss of the glasses. Commenting on the recent renovations, Ms Stephens said: “I am absolutely delighted with the work that has been carried out and Dortech’s customer service and professional installation has been second to none. Friends and colleagues gathered to applaud worthy winners across seven categories – and recognise the creativity and dedication which underpin the whole sector’s contribution to the economy, to society and to customers, staff and stakeholders.
This imac desk mount page lists articles associated with the title Seo. If an makeup desk with lighted mirror led you here, you may wish to change the link to point directly to the intended article. |
|
<urn:uuid:e051b08a-b600-4f7a-9eb5-657c1105cd9e>
|
CC-MAIN-2024-51
|
http://www.serviziocivile.provincia.foggia.it/desk/?150437-1.html
|
2024-12-09T04:53:45Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066460657.93/warc/CC-MAIN-20241209024434-20241209054434-00593.warc.gz
|
by-sa
|
3.0
|
link_tag
| true | false | null | null | null |
{
"abbr": [
"by-sa"
],
"in_footer": [
false
],
"in_head": [
true
],
"location": [
"link_tag"
],
"version": [
"3.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.998978 |
I wouldn't devote even 24 minutes to learn science
Someone put up a chart purporting to show CO2 and temperature going back 4.5 billion years. I doubt the person tweeting it understood it. They said they got the picture from another denier called Nasif Nahle, who even put a copyright on it! It didn't matter. According to deniers, the tweet was from an acceptable denier so it must mean the greenhouse effect is a hoax.
Anyway, someone suggested the tweeter look at a video of Richard Alley to learn about the role of CO2 in climate. This was his response: "Why should I waste 24 minutes on a lecture".
Why indeed. It might force him to confront his denial. Scientists spend their whole career compiling knowledge about climate, and this drongo refuses to put aside 24 minutes to learn why CO2 is a greenhouse gas.
Here are some more examples typical of denier nonsense on Twitter.
Deniers and "proof"
This next one is an outright lie. The closest I could find to a mission statement for the IPCC was this:
Created in 1988 by the World Meteorological Organization (WMO) and the United Nations Environment Programme (UNEP), the objective of the IPCC is to provide governments at all levels with scientific information that they can use to develop climate policies. IPCC reports are also a key input into international climate change negotiations.Anyone who understands the first thing about science knows the tweet below is fake. Science doesn't do proof. (Mathematics does proofs.) Trek is a disinformer, making up stuff.
Deniers lying about their education
You'll often come across deniers touting their education. Usually it's a certificate course or diploma, of which they have every right to be proud. However, it doesn't mean they know more than career scientists who have PhDs and years of research under their belt.
This is Trek again. He apparently succeeded in persuading a few people that he went to university. People don't normally study "several branches" of science at University. Even in a first year applied science course, the most "branches" they'd study would be around four (e.g. physics, chemistry, biology and maybe a semester of geology). And that would be very basic science, nothing advanced. More like high school science.
Maybe he tried physics and failed, switched to chemistry and failed, switched to botany and failed, tried zoology, oceanography, medicine etc and failed them all. Who knows. It's more likely he just made it up to get "likes" on Twitter.
The fake "I want answers" plea
Studies tell us "nothing"
Sexism and denial
This next one got 6 retweets and 22 likes, so it doesn't falsify my hypothesis :).
I'm tempted to do a more rigorous analysis of deniers on Twitter. One thing is clear. In the conversations I've been following, the majority:
- have never seen a scientific paper and wouldn't know what to do with one
- can't read a chart, though they have no problem posting them
- have no understanding of basic physics or chemistry, not even high school level
- have not had the good fortune of a higher education
- like to mimic words they see from "alarmists", such as "projection", "strawman", "deflect" etc, but use them so oddly it's obvious they don't know what they mean
- spend time on denier blogs of various types, although some don't even do that. They seem to get their denier memes twisted
- have no qualms about defaming scientists, telling blatant lies about them and their work
- don't bother tweeting about climate, they just like and retweet people they follow
- will swallow the most incredible tales without question
- have the ability conspiracy theorists are famed for - they can hold multiple contradictory ideas in their head at the same time and believe them all
- are not swayed one iota by evidence, no matter how strong. (Most refuse to look at it, let alone consider it.)
- end up using vulgarity when their arguments are shown to be flawed or fake.
|
<urn:uuid:584f8476-bdbc-438d-8394-49b255eb0022>
|
CC-MAIN-2024-51
|
https://blog.hotwhopper.com/2019/10/denier-quote-of-day-why-should-i-waste.html
|
2024-12-09T03:48:43Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066460657.93/warc/CC-MAIN-20241209024434-20241209054434-00593.warc.gz
|
by
|
4.0
|
a_tag
| false | true | null | null | null |
{
"abbr": [
"by",
"by"
],
"in_footer": [
true,
true
],
"in_head": [
false,
false
],
"location": [
"a_tag",
"a_tag"
],
"version": [
"4.0",
"4.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.9995 |
“We are governed, our minds are molded, our tastes formed, our ideas suggested, largely by men we have never heard of,” Edward Bernays observed. “People accept the facts which come to them through existing channels. They like to hear new things in accustomed ways. They have neither the time nor the inclination to search for facts that are not readily available to them.”
In our previous exploration, we exposed how institutional expertise often masks groupthink rather than knowledge. Now we pull back the curtain further to reveal something more fundamental: the sophisticated machinery that creates these experts, maintains their authority, and shapes not just what we think, but what we believe is possible to think. Understanding this machinery is essential for anyone seeking to navigate today’s information landscape.
These mechanisms, once obscure, now operate in plain sight. From pandemic policies to climate initiatives, from war propaganda to economic narratives, we’re witnessing unprecedented coordination between institutions, experts, and media – making this understanding more crucial than ever.
The Architecture of Compliance
In 1852, America imported more than just an education system from Prussia – it imported a blueprint for societal conditioning. The Prussian model, designed to produce subservient citizens and docile workers, remains our foundation. Its structure was explicitly created to foster obedience to state authority – standardized testing, age-based classes, rigid schedules governed by bells, and most crucially, the systematic shaping of minds to accept information from authorized sources without question.
The Prussians understood that regulating how people learn shapes what they can conceive. By training children to sit quietly, follow instructions, and memorize official information, they created populations that would instinctively defer to institutional authority.
Horace Mann, who championed this system in America, was explicit about its purpose. “A republican form of government, without intelligence in the people, must be, on a vast scale, what a mad-house, without superintendent or keepers, would be on a small one.”
His mission wasn’t education but standardization – transforming independent minds into submissive citizens.
This model spread globally not because it was the best way to educate, but because it was the most efficient way to mold mass consciousness. Visit any university campus today and the Prussian blueprint remains unmistakable – all disguised as higher learning. Today’s schools still follow this template: rewards for conformity, punishments for questioning authority, and success measured by the ability to reproduce officially sanctioned information. The genius lies not in crude force but in creating populations that police their own thoughts – people so thoroughly conditioned to defer to authority that they mistake their training for natural behavior.
Engineering Social Reality
Edward Bernays transformed this compliant population into a marketer’s dream by pioneering techniques to make rational markets behave irrationally. His most famous campaign illustrates the power of this approach: When tobacco companies wanted to expand their market to women in the 1920s, Bernays didn’t just advertise cigarettes – he rebranded them as “Torches of Freedom,” linking smoking to women’s empowerment. By having young debutantes light up during the Easter Sunday Parade in New York City, he transformed a social taboo into a symbol of liberation.
This campaign, while centered in New York, resonated across the country, tapping into broader cultural movements and setting the stage for national adoption of his methods. The cigarettes themselves were irrelevant; he was selling the idea of defiance packaged as empowerment.
Bernays’ insight went beyond product promotion; he understood the power of engineering social acceptance itself. By linking products to deep psychological needs and social aspirations, Bernays created the blueprint for shaping not only what people buy but also what they believe is acceptable to think.
This technique – wrapping institutional agendas in the language of personal liberation – has become the template for modern social engineering. From recasting war as humanitarian intervention to marketing surveillance as safety, Bernays’ methods still guide how power shapes public perception. These techniques now shape everything from pandemic responses to geopolitical conflicts, evolving into what behavioral scientists and policy advisors today call ‘nudge theory’ – sophisticated psychological operations that guide public behavior while maintaining the illusion of free choice.
The Rockefeller Template
Rockefeller Medicine proved how completely an industry could be infiltrated and reshaped. Through the 1910 Flexner Report, they didn’t just eliminate competition – they redefined what constituted legitimate medical knowledge. Most significantly, John D. Rockefeller leveraged his petroleum empire into the pharmaceutical industry, realizing that oil-based synthetics could replace natural medicines and create a vast new market for petroleum products.
To cement this transformation, he offered massive funding only to medical schools that taught allopathic medicine – treating symptoms with pharmaceutical drugs rather than addressing root causes. This model of medicine revolutionized our understanding of the human body – from a self-healing system to a chemical machine requiring pharmaceutical intervention. This same playbook has since been used across every major institution:
- Control education and credentialing
- Define acceptable boundaries of debate
- Label alternatives as dangerous or unscientific
- Create regulatory capture
- Control funding of research and development
For example, Pfizer has provided substantial grants to institutions like Yale, funding research and educational programs that reinforce drug-centric treatment models. Similarly, federal funding at Ivy League universities shapes research agendas, often aligning studies with government-backed policies and narratives.
This template has transformed virtually every major field. In agriculture, corporations like Monsanto now dominate research institutions studying food safety, fund their own regulators, and shape university programs. In energy, institutional funding and academic appointments systematically marginalize research questioning climate policies, while corporate interests simultaneously profit from both fossil fuels and green technology solutions – controlling both sides of the debate. In psychiatry, pharmaceutical companies redefined mental health itself, delegitimizing approaches from nutrition to talk therapy in favor of medication-based models.
The pattern is consistent: first capture the institutions that generate knowledge, then the ones that legitimize it, and finally the ones that disseminate it. By orchestrating these three layers – creation, authorization, and distribution – alternative perspectives don’t need to be actively censored; they simply become ‘unthinkable’ within the managed framework.
The Factory Goes Digital
Technology hasn’t liberated us from this orchestration – it’s perfected it. Algorithms curate personalized reality bubbles while information gatekeepers enforce compliance with approved viewpoints. Automated systems predict and preempt dissent before it spreads. Unlike traditional censorship, which visibly blocks information, algorithmic curation invisibly guides what we see, creating self-reinforcing cycles of belief that become increasingly difficult to break.
The importance of unrestricted information flow became evident when Twitter/X shifted away from censorship, creating crucial cracks in the control system. While questions remain about freedom of reach versus freedom of speech, this platform’s transformation demonstrated how quickly official narratives can unravel when people have direct access to information and open discourse.
Aldous Huxley foresaw this transformation when he warned that “in the age of advanced technology, spiritual devastation is more likely to come from an enemy with a smiling face than from one whose countenance exudes suspicion and hate.” Indeed, today’s digital chains are comfortable ones – they come wrapped in convenience and personalization.” The vast amount of information being produced,” Huxley noted, “acts to distract and overwhelm, making truth indistinguishable from falsehood.”
This voluntary submission to technological guidance would have fascinated Bernays. As Neil Postman later observed, “People will come to adore the technologies that undo their capacities to think.” The logic is seamless: our culture has learned to outsource our cooking, cleaning, shopping, and transportation – why wouldn’t thinking be part of the trend? The digital revolution became a paradise of social engineering precisely because it makes the cage invisible, even comfortable.
The Twin Pillars: Experts and Influencers
Today’s system of reality orchestration operates through a sophisticated partnership between institutional authority and celebrity influence. This fusion reached its apex during Covid-19, where established experts provided the foundation while celebrities amplified the message.
Social media doctors quickly became influencers, with their TikTok videos wielding more influence than peer-reviewed research, while established experts who questioned official protocols were systematically removed from platforms.
With Ukraine, A-list actors and musicians made high-profile visits to Volodymyr Zelensky, while tech billionaires promoted official storylines about the conflict. During elections, the same pattern emerges: entertainers and influencers suddenly become passionate advocates for specific candidates or policies, always aligned with institutional positions.
In an age of shortened attention spans and declining literacy, this partnership becomes essential for mass influence. While institutions provide the intellectual foundation, few will read their lengthy reports or policy papers. Enter celebrities and influencers – they translate complex institutional dictates into entertaining content for audiences trained on TikTok and Instagram.
This isn’t just the Kardashianification of culture – it’s the deliberate fusion of entertainment and propaganda. When the same influencer pivots from beauty products to promoting pharmaceutical interventions to championing political candidates, they’re not just sharing opinions – they’re delivering carefully crafted institutional messages packaged as entertainment.
The genius of this system lies in its efficiency: while we’re being entertained, we’re also being programmed. The shorter our attention spans become, the more effective this delivery mechanism grows. Complex issues reduce to memorable sound bites, institutional policies become trending hashtags, and serious debates transform into viral moments – all while maintaining the illusion of organic cultural discourse.
Mechanisms of Modern Control
The modern system maintains influence through interlocking mechanisms that create a seamless web of power. Content curation algorithms shape what information we encounter while coordinated messaging creates the illusion of spontaneous consensus. Media outlets are owned by corporations dependent on government contracts.
For instance, the Washington Post, owned by Amazon founder Jeff Bezos, exemplifies this connection. Amazon Web Services (AWS) holds substantial government contracts, including a $10 billion agreement with the National Security Agency (NSA) for cloud computing services. These outlets are regulated by the agencies they report on and staffed by journalists who’ve abandoned their watchdog role to become willing partners in manufacturing public perception.
Today’s information management operates through two distinct enforcement arms: traditional media ‘experts’ (often former intelligence operatives) who shape public perception through television and newspapers, and online ‘fact-checkers’ – organizations funded by the very tech companies, pharmaceutical giants, and foundations that benefit from directing public discourse.
During Covid-19, this machinery was fully exposed: when the Great Barrington Declaration’s scientists – including Dr. Jay Bhattacharya from Stanford, a health policy expert with research experience in infectious diseases, and Dr. Martin Kulldorff from Harvard, a renowned epidemiologist with decades of expertise in disease surveillance and vaccine safety – challenged lockdown policies, their perspective was simultaneously denounced across major platforms and academic institutions. Despite their distinguished careers and positions at elite institutions, they were suddenly labeled “fringe epidemiologists” by media outlets and their own universities distanced themselves.
The pattern was unmistakable: within hours of major publications running hit pieces, social media would restrict the Declaration’s reach, “fact-checkers” would label it misleading, and television experts would emerge to discredit it. When doctors reported success with early treatment protocols, their videos were removed from every platform within hours. Senate testimony from experienced clinicians was deleted from YouTube.
When data showed vaccine risks and dropping efficacy, discussion was systematically suppressed. Medical journals suddenly retracted long-published papers about alternative treatments. The coordinated response wasn’t just about content removal – it included flooding the zone with counternarratives, algorithmic suppression, and social media shadow-banning. Even Nobel laureates and inventors of mRNA technology found themselves erased from public discourse for questioning official orthodoxy.
This playbook wasn’t new – we’ve seen it before. After 9/11, the machinery transformed surveillance from something sinister into a symbol of patriotism.
Opposition to war became “unpatriotic,” skepticism of intelligence agencies became “conspiracy theory,” and privacy concerns became “having something to hide.” The same pattern repeats: crisis provides pretext, institutional experts define acceptable debate, media shapes perception, and dissent becomes unconscionable. What begins as emergency measures becomes normalized, then becomes permanent.
The system doesn’t just censor information – it shapes perception itself. Those who align with institutional interests receive funding, publicity, and platforms to shape public opinion. Those who question approved orthodoxy, regardless of their credentials or evidence, find themselves systematically excluded from discourse. This machinery doesn’t just determine what experts can say – it determines who gets to be considered an expert at all.
Academic gatekeeping determines what questions can be asked, while professional and social consequences await those who step outside acceptable bounds. Financial pressure ensures compliance where softer methods fail. This web of influence is so effective precisely because it’s invisible to those within it – like fish unaware of the water they swim in. The most powerful form of censorship isn’t the suppression of specific facts – it’s the establishment of acceptable boundaries of debate. As Chomsky observed, the real power of modern media lies not in what it tells us to think, but in what it makes unconscionable to question.
The Unreported World
The true measure of control lies not in what makes headlines, but in what never sees light. Federal Reserve policy decisions affecting millions go unreported while celebrity scandals dominate headlines. Military interventions proceed without scrutiny. Scientific findings that challenge profitable paradigms disappear into academic black holes. When identical stories dominate every outlet while significant events go completely uncovered, you’re watching orchestrated reality in action. The system doesn’t just tell you what to think about – it determines what enters your consciousness entirely.
Yet understanding how our reality is manufactured is only the first step. The real challenge lies in developing the tools to see clearly in a landscape designed to obscure truth.
Breaking Free: Beyond Manufactured Consent
Breaking free from manufactured reality requires more than awareness – it demands new skills, practices, and a collective sense of agency. The path begins with pattern recognition: identifying coordinated messaging across institutions, recognizing when divergent viewpoints are systematically suppressed, and understanding the broader systems of manipulation at work.
Information validation requires moving beyond simple source trust. Rather than asking “Is this source reliable?” we must ask “Cui bono?” – who benefits? By tracing the connections between money, power, and media, we can uncover the structures that govern public perception. This isn’t just about skepticism – it’s about developing an informed, proactive stance that reveals hidden interests.
While fact-checkers and experts interpret reality for us, direct access to source material – whether public statements, original documents, or unedited video – bypasses this framing entirely. When we see raw footage of events, read actual scientific studies, or examine original quotes in context, the manufactured narrative often crumbles. This direct engagement with primary sources, rather than predigested interpretations, is crucial for independent understanding.
Learn to identify limited hangouts – those moments when institutions appear to expose their own misconduct but actually control the narrative of their exposure. When official sources ‘reveal’ wrongdoing, ask: What larger story is this confession obscuring? What boundaries of debate does this ‘revelation’ establish? Often, apparent transparency serves to maintain deeper opacity.
As Walter Lippmann noted, “The conscious and intelligent manipulation of the organized habits and opinions of the masses is an important element in democratic society…It is they who pull the wires which control the public mind.” Our task isn’t just to see these wires, but to develop the skills to sever them.
Building resilient networks becomes crucial in this environment. This isn’t about creating echo chambers of alternative views but establishing direct channels for information sharing and collaborative analysis. Supporting independent research, protecting dissenting voices, and sharing methods of discovery prove more valuable than just sharing conclusions.
Personal sovereignty emerges through conscious practice. Breaking free from source dependency means developing our own capacity for analysis and understanding. This requires studying historical patterns, recognizing emotional manipulation techniques, and tracking how official narratives evolve over time. The goal isn’t to become impervious to influence but to engage with information more consciously.
Moving forward requires understanding that truth-seeking is a practice rather than a destination. The goal isn’t perfect knowledge but better questions, not complete certainty but clearer perception. Freedom comes not from finding perfect sources but from developing our own capacity for discernment.
Community builds resilience when it’s founded on shared investigation rather than shared beliefs.
The most crucial skill isn’t knowing whom to trust – it’s learning to think independently while remaining humble enough to adjust our understanding as new information emerges. The greatest act of resistance isn’t fighting within the boundaries of approved discourse – it’s rediscovering our capacity to see beyond them. In a world of manufactured consent, the most revolutionary act is reclaiming our own ability to perceive.
Understanding these mechanisms isn’t cause for despair – it’s a source of empowerment. Just as the Prussian system required belief to function, today’s control systems rely on our unconscious participation. By becoming conscious of these mechanisms, we begin to break their power. The very fact that these systems require such elaborate maintenance reveals their fundamental weakness: they depend entirely on our collective acceptance.
When enough people learn to see the wires, the puppet show loses its magic.
Published under a Creative Commons Attribution 4.0 International License
For reprints, please set the canonical link back to the original Brownstone Institute Article and Author.
|
<urn:uuid:10d2a394-9522-4a40-9196-727fc2778867>
|
CC-MAIN-2024-51
|
https://brownstone.org/articles/how-the-information-factory-evolved/
|
2024-12-09T03:38:43Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066460657.93/warc/CC-MAIN-20241209024434-20241209054434-00593.warc.gz
|
by
|
4.0
|
a_tag
| false | false | null | null | null |
{
"abbr": [
"by"
],
"in_footer": [
false
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.997255 |
Occupation keyword search
Type a title or code for matches
No quick matches found
Search for keyword results
Go
Type a title or code for matches
No quick matches found
Search for keyword results
Go
Help
OnLine Help
About O*NET
OnLine Desk Aid
Job Seeker Help
Job Accommodations
Related Sites
Home
Find Occupations
Bright Outlook
Career Cluster
Hot Technology
Industry
Job Family
Job Zone
STEM
All Occupations
Advanced Searches
Job Duties
Professional Associations
Related Activities
Soft Skills
Technology Skills
O*NET Data
Abilities
Interests
Knowledge
Skills (Basic)
Skills (Cross-Functional)
Work Activities
Work Context
Work Styles
Work Values
Crosswalks
Military
Education
Occupation Handbook
SOC
DOT
RAPIDS
ESCO
Share
Facebook
X
LinkedIn
Reddit
Email
Sites
My Next Move
Mi Próximo Paso
My Next Move for Veterans
Resource Center
O*NET Web Services
Code Connector
Partner sites
Data Collection Program
U.S. Department of Labor
Related Sites
Contact Us
Comments? Questions? Email us at
[email protected]
or write your message below.
Your message
Your message is too short.
Please avoid offensive language.
Do not include HTML or BBCode.
Your message contains language commonly used in advertisements.
Please communicate in English or Spanish.
Your name
Email address
Please enter a valid email address.
Which best describes you?
Select one:
Job Seeker
Career Coach/Counselor
Workforce Development Professional
Employer/Human Resources
Transitioning Military Services Member
Veteran
Student
Product Developer
Academic/Researcher
Other
Please check the “I’m not a robot” checkbox.
Send message
Submitting...
An error occurred, please try again.
Message sent! Thank you.
Type a title or code for matches
No quick matches found
Search for keyword results
Go
Help
OnLine Help
About O*NET
OnLine Desk Aid
Job Seeker Help
Job Accommodations
Related Sites
Home
Find Occupations
Bright Outlook
Career Cluster
Hot Technology
Industry
Job Family
Job Zone
STEM
All Occupations
Advanced Searches
Job Duties
Professional Associations
Related Activities
Soft Skills
Technology Skills
O*NET Data
Abilities
Interests
Knowledge
Skills (Basic)
Skills (Cross-Functional)
Work Activities
Work Context
Work Styles
Work Values
Crosswalks
Military
Education
Occupation Handbook
SOC
DOT
RAPIDS
ESCO
Sites
My Next Move
Mi Próximo Paso
My Next Move for Veterans
Resource Center
O*NET Web Services
Code Connector
Partner sites
Data Collection Program
U.S. Department of Labor
Related Sites
Was this page helpful?
Yes, it was helpful
No, it was not helpful
Job Seeker Help
•
Contact Us
Share:
Facebook
X
LinkedIn
Reddit
Email
Link to Us
•
Cite this Page
Creative Commons CC-BY
License
Contact Us
by
U.S. Department of Labor, Employment and Training Administration
is licensed under a
Creative Commons Attribution 4.0 International License
.
Follow us:
About this Site
•
Privacy
•
Disclaimer
Site updated November 19, 2024
Loading...
Loading...
|
<urn:uuid:3a5a7452-b062-4e80-a502-fae571fbf694>
|
CC-MAIN-2024-51
|
https://www.onetonline.org/shared/contact_resp?from=footer&u=https%3A%2F%2Fwww.onetonline.org%2Flink%2Fcustom%2F23-2011.00&t=23-2011.00%20-%20Paralegals%20and%20Legal%20Assistants
|
2024-12-09T04:19:09Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066460657.93/warc/CC-MAIN-20241209024434-20241209054434-00593.warc.gz
|
by
|
4.0
|
a_tag
| false | false | null | null | null |
{
"abbr": [
"by"
],
"in_footer": [
false
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.926493 |
Here is a recap of what happened in the search forums today, through the eyes of the Search Engine Roundtable and other search forums on the web.
Search Engine Roundtable Stories:
- Matt Cutts Likes Duane Forrester's Example Of Good Links: Unknown Links
On Monday, we shared a bold example from Bing's Duane Forrester about what good links are versus bad links. It was bold because Duane from Bing basically said the only real valuable links are the ones you don't know you are getting in advance... - Would A Domain Like appleandapples.com Trigger A Google Penalty?
Sometimes I see these unique questions in the SEO forums and I just have to share them. This one comes from High Rankings Forums where a webmaster asks if he can use a singular and plural version of the same word, to be his brand name and domain name. For example... - Google Search App For iOS Gets More Voice Friendly
Google announced on Google+ that they've upgraded the iOS Google Search App. The new app is labelled version 4.0 and is available for download in the App Store... - Does Google's Matt Cutts Age Matter?
This is a funny topic that honestly the SEO insider community has been talking about every now and then - how old is Google's Matt Cutts. It is almost impossible to find a source online that shows his date of birth... - Google Glass: Buy Now
Google announced last night on Google+ that any US resident can now buy Google Glass as long as they have them in inventory. To do so, just go to this URL and buy your Google Glass. Google wrote: Last week we told you we'd be trying out new ways to find Explorers... - How Google Does Their Landscaping
Google has a beautiful campus, almost always perfect weather, green grass, free food, everything you can want. Ever wonder how they do their landscaping? They have used goats in the past. But Micha
Other Great Search Forum Threads:
- Pinterest Tests Paid Promoted Pins To Selected Brands, WebmasterWorld
- Twitter Confirms "Mute" Feature Coming To Accounts, WebmasterWorld
- Best SEO Results Where Products May Be For Desktop Or For Mobile, WebmasterWorld
- Ever wondered what happens with your domain registration…, John Mueller - Google+
- I wanted to let you, the folks who read my G+ page, know…, Dan Cobley - Google+
|
<urn:uuid:1695fd23-bfe3-4bb2-b268-f44d9594c064>
|
CC-MAIN-2024-51
|
https://www.seroundtable.com/recap-05-14-2014-18550.html
|
2024-12-09T04:23:58Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066460657.93/warc/CC-MAIN-20241209024434-20241209054434-00593.warc.gz
|
by
|
3.0
|
a_tag
| false | true | null | null | null |
{
"abbr": [
"by"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"3.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.999055 |
Stops gradient computation.
When executed in a graph, this op outputs its input tensor as-is.
When building ops to compute gradients, this op prevents the contribution of its inputs to be taken into account. Normally, the gradient generator adds ops to a graph to compute the derivatives of a specified 'loss' by recursively finding out inputs that contributed to its computation. If you insert this op in the graph it inputs are masked from the gradient generator. They are not taken into account for computing gradients.
This is useful any time you want to compute a value with TensorFlow but need to pretend that the value was a constant. For example, the softmax function for a vector x can be written as
def softmax(x):
numerator = tf.exp(x)
denominator = tf.reduce_sum(numerator)
return numerator / denominator
def stable_softmax(x):
z = x - tf.reduce_max(x)
numerator = tf.exp(z)
denominator = tf.reduce_sum(numerator)
return numerator / denominator
tf.reduce_max(x)
(if the max values are not unique then the
gradient could flow to the wrong input) calculation and treat that as a
constant. Therefore, we should write this out as
def stable_softmax(x):
z = x - tf.stop_gradient(tf.reduce_max(x))
numerator = tf.exp(z)
denominator = tf.reduce_sum(numerator)
return numerator / denominator
- The EM algorithm where the M-step should not involve backpropagation through the output of the E-step.
- Contrastive divergence training of Boltzmann machines where, when differentiating the energy function, the training must not backpropagate through the graph that generated the samples from the model.
- Adversarial training, where no backprop should happen through the adversarial example generation process.
Public Methods
Output<T> |
asOutput()
Returns the symbolic handle of a tensor.
static <T> StopGradient<T> | |
Output<T> |
output()
Inherited Methods
Public Methods
public Output<T> asOutput ()
Returns the symbolic handle of a tensor.
Inputs to TensorFlow operations are outputs of another TensorFlow operation. This method is used to obtain a symbolic handle that represents the computation of the input.
public static StopGradient<T> create (Scope scope, Operand<T> input)
Factory method to create a class wrapping a new StopGradient operation.
Parameters
scope | current scope |
---|
Returns
- a new instance of StopGradient
|
<urn:uuid:7d770d55-f476-485a-898f-b18ae29c79e4>
|
CC-MAIN-2024-51
|
https://www.tensorflow.org/versions/r2.7/api_docs/java/org/tensorflow/op/core/StopGradient?authuser=2
|
2024-12-09T03:14:46Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066460657.93/warc/CC-MAIN-20241209024434-20241209054434-00593.warc.gz
|
by
|
4.0
|
a_tag
| false | false | null | null | null |
{
"abbr": [
"by"
],
"in_footer": [
false
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.97342 |
Safe Earth60 Paremata Street, Atawhai, NelsonNew Zealand Nearest Zenbu Listings
Sponsored Links
About Zenbu
Zenbu is a collaboratively edited directory of businesses, places or things. You can help build Zenbu, edit this entry, report an error.
Zenbu ID 1135100, 22 views
since 28/10/2008
Last edited 28/10/2008 by
|
<urn:uuid:6c1a46e9-2df6-4c0e-8128-0c17a2edb5f8>
|
CC-MAIN-2024-51
|
https://www.zenbu.co.nz/entry/1135100-safe-earth
|
2024-12-09T04:16:13Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066460657.93/warc/CC-MAIN-20241209024434-20241209054434-00593.warc.gz
|
by
|
3.0
|
link_tag
| true | false | null | null | null |
{
"abbr": [
"by",
"by",
"by",
"by"
],
"in_footer": [
false,
false,
false,
false
],
"in_head": [
true,
true,
false,
false
],
"location": [
"link_tag",
"link_tag",
"a_tag",
"a_tag"
],
"version": [
"3.0",
"3.0",
"3.0",
"3.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.960192 |
Interactive: Comparing Average Rate vs. Instantaneous Rate
Move A and C closer together and the line through the two points will approach the tangent line to the curve. When the two points do coincide, the line will be the tangent line.Licenses & Attributions
CC licensed content, Shared previously
- Tangent Line to Function. Provided by: OER Commons Authored by: Geogebra. Located at: https://www.geogebra.org/m/n4PKmhgA. License: CC BY-SA: Attribution-ShareAlike.
|
<urn:uuid:4cc8c596-a4b3-44f9-9af1-3d5c08adff75>
|
CC-MAIN-2024-51
|
https://zt.symbolab.com/study-guides/businesscalc1/interactive-comparing-average-rate-vs-instantaneous-rate.html
|
2024-12-09T04:28:08Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066460657.93/warc/CC-MAIN-20241209024434-20241209054434-00593.warc.gz
|
by-sa
|
4.0
|
a_tag
| false | false | null | null | null |
{
"abbr": [
"by-sa"
],
"in_footer": [
false
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.952324 |
Author Archives for Diane
April come she will “There is no debt that spending time with your child is not worth” … beautiful! This one statement summarizes the issue with money: sometimes Life gets in the way! Is that a problem or an opportunity? How do we deal with Life when it does get in the way of our […]
Dealing with alternative courses of action in your financial plans For those who asked, Diane is still here with us; she just took a small detour along the Road of Life to reconnect with those important to her … under such a situation, personal finances can wait a tad 🙂 But, Diane is weighing up […]
Debtor’s Prison I added the picture, but – given the title of this post – I could not resist 🙂 I think that Diane is running the home as a rental, so I’m hoping that the rents will at least cover the costs (now … or, soon), and that the student loans still have time […]
From what I can gather, Diane has made some good decisions (e.g. pay cash for a car instead of a loan); get an MBA … but, hasn’t really been able to financially ‘cash in’ on it, and is now either looking for work – or, ‘semi retired’ – and currently drawing down from her retirement […]
Diane’s Odyssey I like the pun, Diane! It looks like Diane’s major decisions will be the financial ones (how much to pay. where to get the money from) for her NEXT vehicle … _______________ So Adrian says, “Tell me about your car” and I go, “So, what ya wanna know?” What I drive: 2000 Honda […]
I think I’ve left the best to last (no offense to the other MITs) … Diane says that she is in a ‘rent free’ situation … but, there’s no such thing as a ‘free lunch’ from purely financial perspective … and, even though this post is primarily about housing I am also interested in exploring […]
EAS-y Do I understand the first line of Diane’s post, but I am intrigued by the title (not the mention, the XXXXXXX’s) … Diane laid out her table for her earn/spend/ability/do really neatly … it’s easy to see where the commonalities lie (e.g. writing) … I hope that this helps you, and in return you […]
Once You’re a Pickle Diane is embarking on some Making Money 201 activities (part-time teaching; real-estate investment ) and so on … full points for trying! We had quite a few discussions off-line (actually by e-mail, so I guess that’s really ‘on-line’) about RE attorneys, accountants, structures and the like … maybe, we can ask […]
Climb Ev’ry Mountain Diane’s post shows the enormity of the task ahead; it’s great to say $x million in y years … it’s quite another thing to DO IT. 1,000 unit may BE a business, but Diane will need to think about income to fuel their purchase and maintenance (which may be where another business […]
What’s Going On Diane told us all about her revised Number in this comment to my recent post: I worked my number up again last night. If I am getting this part of the exercise, it is to make us take a hard look at our “wanta” haves and look at see what we will […]
|
<urn:uuid:7dbbae7a-5943-4992-a0ea-1ae930a88e70>
|
CC-MAIN-2024-51
|
http://7m7y.com/author/diane/
|
2024-12-10T08:05:19Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066057523.33/warc/CC-MAIN-20241210071103-20241210101103-00717.warc.gz
|
by
|
2.5
|
a_tag
| false | true | null | null | null |
{
"abbr": [
"by"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"2.5"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.998348 |
The message reads, in part:
“Refined technique, leadership qualities and hard work helped you to defeat a strong opponent in a tough final fight, to deservedly climb to the top step of the podium and to become a three-time world champion.”
The President congratulated Zaurbek Sidakov, the winner of the 2023 World Wrestling Championships in Belgrade, Serbia, in the 74 kg freestyle wrestling competition.
The message reads, in part:
“Refined technique, leadership qualities and hard work helped you to defeat a strong opponent in a tough final fight, to deservedly climb to the top step of the podium and to become a three-time world champion.”
|
<urn:uuid:c9564adf-b5a4-47ad-b638-7f5c000829d3>
|
CC-MAIN-2024-51
|
http://en.kremlin.ru/events/councils/72300
|
2024-12-10T10:03:51Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066057523.33/warc/CC-MAIN-20241210071103-20241210101103-00717.warc.gz
|
by
|
4.0
|
a_tag
| false | true | null | null | null |
{
"abbr": [
"by"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.99795 |
Graduate Careers Australia
The National Association of Graduate Careers Advisory Services (NAGCAS) is Australia’s peak professional body for career development in the higher and tertiary education sectors. In 2017, GCA (Graduate Careers Australia) and NAGCAS partnered in a successful program that saw graduate employability and career development research carried out in several Australian universities.
|
<urn:uuid:e0e36387-a7cb-4dc6-994b-d6a9dba35b2a>
|
CC-MAIN-2024-51
|
https://www.adcet.edu.au/resource/3370/graduate-opportunities
|
2024-12-10T09:47:55Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066057523.33/warc/CC-MAIN-20241210071103-20241210101103-00717.warc.gz
|
by-sa
|
4.0
|
a_tag
| false | true | null | null | null |
{
"abbr": [
"by-sa"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.983557 |
audiotool
Music
Board
About
Manual
Mix
Studio
Login
Login
Stay logged in
Forgot password?
by signing in your accept our
Terms & Conditions
Login with
New to audiotool?
Sign up, it's free
2017-08-25
0
4
0
uncategorized
C00L (2 S00N)
kamarafashion
0:00:00
0:02:53
Comments
0
Assets
Remixes
Favorites
0
In Albums
0
Co-Authors
0
Favorites
This track has no favorites.
00:00
00:00
69%
Login
Stay logged in
Forgot password?
by signing in your accept our
Terms & Conditions
Login with
New to audiotool?
Sign up, it's free
|
<urn:uuid:0d31365d-6ff7-43ce-87ae-c1740c90bf95>
|
CC-MAIN-2024-51
|
https://www.audiotool.com/track/c00l_2_s00n/favorites
|
2024-12-10T08:16:06Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066057523.33/warc/CC-MAIN-20241210071103-20241210101103-00717.warc.gz
|
by-sa
|
3.0
|
a_tag
| false | false | null | null | null |
{
"abbr": [
"by-sa"
],
"in_footer": [
false
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"3.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.944955 |
Please enter the email address that you used for registration. We will send you a new password.
The following information is mandatory and is required to register an account:
Have you found an error? Do you have any suggestions for making our service even better or any other questions about this page? Please write to us and we'll make sure we get back to you.
I hereby confirm the use of my personal data within the context of the enquiry made.
|
<urn:uuid:de1bffba-723e-4426-96ea-1264cf4cc89d>
|
CC-MAIN-2024-51
|
https://www.digitale-bibliothek-mv.de/viewer/image/PPN820890936/193/
|
2024-12-10T07:32:27Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066057523.33/warc/CC-MAIN-20241210071103-20241210101103-00717.warc.gz
|
mark
|
1.0
|
a_tag
| false | false | null | null | null |
{
"abbr": [
"mark"
],
"in_footer": [
false
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"1.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.999352 |
Before the classes
Okay where should I begin? I started the day with a breakfast with the football team which was really cool. So we drove to one of the team members house where some parents prepared it for us. We had pancakes, scrambled eggs, and fruits. Then we drive to school. (I was driven of course). Then I approached the school my name was written on the ground in front of the main entrance with my football number. Also every football player had a sign that looked a football jersey with his name and his number attach to his locker. It was Friday, so game day, so the football team wore their jerseys.
My classes
So at first I took my schedule and got a guided tour through the important parts of the school. Then I had PE, so sport in my first hour. In the second hour I had Chemistry. Wow that room is modern… In Germany you are glad when you have one working monitor per class, but in this room is one monitor for 7 students per table each. The teacher gave us the curriculum for this year and I noticed that I knew almost everything from my previous years. Hmm, we will see if I was right. In the third hour I had study hall so I simply sat down with some people and talked to them because we had nothing to do. Then the juniors where called to the library to get their laptops. Yes you heard right. Every student received it's own Chromebook. In a community school without any extra fees. In Germany you can be glad when the regular computers work. So many of the classes have online content. By now I had almost no problems with finding the room but, now I really struggled finding my math class. With some help I found it, this room had a smartboard so the class is way different from the German math classes. My next class is American government. We started with the us citizenship test. Well, I think for a foreign exchange student this test is an ideal way to check ones progress during the year. Of course because I have a political scholarship that class is perfect for me to learn more about the US system. Then we went to lunch and I sat with some guys from the football team. After lunch we continued the government class. And then we had DEN time. It is just like another study hall to prepare ones stuff and to do homework, so again I met new people. My sixth class was Tech. It is about crafting and machines, that sounded very interesting. The teacher said maybe we will do some welding in the end of the year. Then I had World history. We had not done that much by now, but I am interested how the history taught here differs from the one taught in German schools. My last class is English. The teacher is quite tough, but my last English teacher was very tough as well so I am used to it. I see it just as a challenging opportunity to improve my English a lot.
Conclusion
So those are my classes. What else happened that day? Well, we had a football game that night. I heard a ton of new names on that day. Because that school is so small and I am on the football team way more people came to me than to the other exchange student. So I had so many new people and new impressions that I forgot many things instantly and I was glad when I found a room by myself. All in all I had no really bad experiences on my first school day.
|
<urn:uuid:c04ea544-d1c3-43a3-b042-078bd088ae1f>
|
CC-MAIN-2024-51
|
https://www.dj-bauer.de/my-first-school-day-en.html
|
2024-12-10T08:37:10Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066057523.33/warc/CC-MAIN-20241210071103-20241210101103-00717.warc.gz
|
by-sa
|
3.0
|
a_tag
| false | true | null | null | null |
{
"abbr": [
"by-sa"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"3.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.999628 |
EarthNight Website is up!
The EarthNight website is up, with pamphlet, forum, and blog. The home page is a pamphlet to help find or found the EarthNight you need. The blog adds detail over time. The Forum is where we can ask questions, introduce ourselves, build local groups, and improve this website. EarthNight starts with you!
EarthNight is a worldwide local movement that has been going strong since 2010 in one location in West Newton, MA. Now it is time to send this pattern out widely. All this time we have been building a framework and a pattern that we think others could use. Does it work? You tell us!
This initial website constitutes a pamphlet that you can use to consider finding or founding an EarthNight group of your own. EarthNight starts with you! You are the EarthNight we need. EarthNight is us!
This website also contains a Forum area. There is space to introduce yourself, to ask questions, to improve this website, and to pull together your local EarthNight group.
Please use the Forum to help us make this website useful to you. Ask your questions. Tell us what you need more of. And be patient. Talk among yourselves while you wait for us to reply. This initial website is managed on a volunteer basis by non-experts with limited time!
Thanks,
/peter
What is EarthNight?
EarthNight is a worldwide local movement designed around a weekly two-hour shared practice of asking and receiving help of Earth.
Earthnight is us! Earthnight starts with you! You can find or found the EarthNight you need. You can find a way to thrive with all around you. You can find a way to ask and to receive the help of Earth.
The stakes are high, to wait for another. You are the EarthNight we need.
EarthNight Shared Garden
Earth Night is a shared garden. A few of the gardeners include Peter, Liz, Vittorio, Sarah, Larry, Kathryn, Mary Elizabeth, Joanne, Brenda, Dorothy, Kathy, Jake, Mike, Val, David, David, Annie, Amy, Eden, Lynn, Laura, Alan, Nancy, Emily, Lee, Mark, Adrian, John, John, John, Tomas, Joan, Angela, Thomas, Ramona, and Christina with Basirah, Jesse, Jeffrey, Stephen, and more.
Updated: to add a few missing names from the Shared Garden,
|
<urn:uuid:8e10ca20-7fad-4444-a01a-b1397ed24b4f>
|
CC-MAIN-2024-51
|
https://www.earthnight.us/blog/earthnight-website-is-up/
|
2024-12-10T08:43:37Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066057523.33/warc/CC-MAIN-20241210071103-20241210101103-00717.warc.gz
|
by
|
4.0
|
a_tag
| false | true | null | null | null |
{
"abbr": [
"by",
"by"
],
"in_footer": [
true,
true
],
"in_head": [
false,
false
],
"location": [
"a_tag",
"a_tag"
],
"version": [
"4.0",
"4.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.999191 |
Українською
Перейти до основної сторінки
Українською
Cabinet
Cabinet
Government of Ukraine
Reforms Delivery Office of the Cabinet of Ministers of Ukraine
Council for Economic Development of Ukraine
Government of Ukraine
Reforms Delivery Office of the Cabinet of Ministers of Ukraine
Council for Economic Development of Ukraine
European Integration
The Government Priorities
Government hotline 1545
Contacts
gov.ua
State sites of Ukraine
gov.ua
State sites of Ukraine
Government portal
Official website
Version for people with visual impairment
A-
A+
Українською
Cabinet
Cabinet
Government of Ukraine
Reforms Delivery Office of the Cabinet of Ministers of Ukraine
Council for Economic Development of Ukraine
Government of Ukraine
Reforms Delivery Office of the Cabinet of Ministers of Ukraine
Council for Economic Development of Ukraine
European Integration
The Government Priorities
Government hotline 1545
Contacts
Search
Search in the portal
or
among the acts of the Cabinet of Ministers
Keywords
Знайти
Type of document
Document type not selected
Topic
The subject of the document is not selected
ІТ
Infographics
Anticorruption activities
Privatization
Finances
Commemorative events
Transport
Sports
Social policy
Reforms
Prime Minister
Policy
Taxes and fees
First Deputy Prime Minister
Healthcare
Education and science
Defense
News of regions
Emergency
Supervision and control
Ministries
International activity
Lustration
Culture
Infrastructure
Information policy
Innovations
Investments
Land and agricultural sector
Government session
Law and order
European integration
Energy security
Economy
Ecology
Humanitarian aid
Deputy Prime Minister
Construction
IT
Nomination Committee
Economic Development Council of Ukraine
Date accepted from
by
Keywords in the title or text
Number
Знайти
President of Ukraine
Verkhovna Rada of Ukraine
Constitutional Court of Ukraine
National Security and Defense Council of Ukraine
Home
Media gallery
Denys Shmyhal discussed topical issues of bilateral cooperation with representatives of Swiss business in Ukraine
Denys Shmyhal discussed topical issues of bilateral cooperation with representatives of Swiss business in Ukraine
posted 11 March 2021 14:46
International activity
Prime Minister
|
<urn:uuid:b1c08983-2c39-4873-8e30-e38d9d8ebd4f>
|
CC-MAIN-2024-51
|
https://www.kmu.gov.ua/en/mediagallery/denis-shmigal-obgovoriv-aktualni-pitannya-dvostoronnoyi-spivpraci-z-predstavnikami-shvejcarskogo-biznesu-v-ukrayini
|
2024-12-10T08:08:09Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066057523.33/warc/CC-MAIN-20241210071103-20241210101103-00717.warc.gz
|
by
|
4.0
|
a_tag
| false | true | null | null | null |
{
"abbr": [
"by"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.806126 |
For even experienced students, formatting a paper can be a daunting task. For that reason, the Excelsior Online Writing Lab created this template to give writers a foundation for formatting using Chicago-style guidelines. The template also references OWL sections that might be helpful when writing an essay.
Because the template is formatted to Chicago standards, students should feel confident simply deleting our text and replacing it with their own writing.
To download the template, click here: Chicago 18th Edition Essay Template
|
<urn:uuid:b5ead991-6438-4f8b-8646-8c6365a1f5b9>
|
CC-MAIN-2024-51
|
https://owl.excelsior.edu/citation-and-documentation/chicago-style/chicago-essay-template/
|
2024-12-11T13:45:14Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066083790.8/warc/CC-MAIN-20241211112917-20241211142917-00617.warc.gz
|
by
|
4.0
|
a_tag
| false | true | null | null | null |
{
"abbr": [
"by",
"by"
],
"in_footer": [
true,
true
],
"in_head": [
false,
false
],
"location": [
"a_tag",
"a_tag"
],
"version": [
"4.0",
"4.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.995769 |
Moreover, existing methods often struggle to generate face images that are harmonious, realistic, and consistent with the subject's identity.
The recently released model, Claude 3. 5 Computer Use, stands out as the first frontier AI model to offer computer use in public beta as a graphical user interface (GUI) agent.
The traditional competition mechanism focuses solely on selecting the winner of different channels without considering the spatial information of the features.
Hands are the primary means through which humans interact with the world.
Machine learning based surrogate models offer researchers powerful tools for accelerating simulation-based workflows.
Despite the development of numerous variance reduction algorithms in the past decade aimed at accelerating stochastic optimization in both convex and nonconvex settings, variance reduction has not found widespread success in training deep neural networks or large language models.
We define a strong instance of the ReFT family, Low-rank Linear Subspace ReFT (LoReFT), and we identify an ablation of this method that trades some performance for increased efficiency.
We introduce Open-Sora Plan, an open-source project that aims to contribute a large generation model for generating desired high-resolution videos with long durations based on various user inputs.
The tokenization of speech with neural audio codec models is a vital part of modern AI pipelines for the generation or understanding of speech, alone or in a multimodal context.
|
<urn:uuid:51852e5b-fad1-4fd1-84aa-57eff2833623>
|
CC-MAIN-2024-51
|
https://paperswithcode.com/?q=author%3AMinhyuk+Choi&order_by=date&page=2
|
2024-12-11T12:07:01Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066083790.8/warc/CC-MAIN-20241211112917-20241211142917-00617.warc.gz
|
by-sa
|
4.0
|
a_tag
| false | true | null | null | null |
{
"abbr": [
"by-sa"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.996896 |
Medium Privacy Policy
You can see our previous Privacy Policy here.
This Privacy Policy explains how A Medium Corporation (“Medium,” “we,” or “us”) collects, uses, and discloses information about you. This Privacy Policy applies when you use our websites, mobile applications, and other online products and services that link to this Privacy Policy (collectively, our “Services”), contact our customer service team, engage with us on social media, or otherwise interact with us.
We may change this Privacy Policy from time to time. If we make changes, we will notify you by revising the date at the top of this policy and, in some cases, we may provide you with additional notice (such as adding a statement to our website or providing you with a notification). We encourage you to review this Privacy Policy regularly to stay informed about our information practices and the choices available to you.
CONTENTS
- Collection of Information
- Use of Information
- Sharing of Information
- Third-Party Embeds
- Transfer of Information to the United States and Other Countries
- Your Choices
- Your California Privacy Rights
- Additional Disclosures for Individuals in Europe
- Contact Us
COLLECTION OF INFORMATION
Information You Provide to Us
We collect information you provide directly to us. For example, you share information directly with us when you create an account, fill out a form, submit or post content through our Services, purchase a membership, communicate with us via third-party platforms, request customer support, or otherwise communicate with us. The types of personal information we may collect include your name, display name, username, bio, email address, business information, your content, including your avatar image, photos, posts, responses, and series published by you, and any other information you choose to provide.
In some cases, we may also collect information you provide about others, such as when you purchase a Medium membership as a gift for someone. We will use this information to fulfill your request and will not send communications to your contacts unrelated to your request, unless they separately consent to receive communications from us or otherwise engage with us.
We do not collect payment information through our Services. We rely on third parties to process payments in connection with our Services. Any information you provide to facilitate such a payment is subject to the third-party payment processor’s privacy policy, and we encourage you to review this policy before you provide any information to the payment processor.
Information We Collect Automatically When You Interact with Us
In some instances, we automatically collect certain information, including:
- Activity Information: We collect information about your activity on our Services, such as your reading history and when you share links, follow users, highlight posts, and clap for posts.
- Transactional Information: When you purchase a membership, we collect information about the transaction, such as subscription details, purchase price, and the date of the transaction.
- Device and Usage Information: We collect information about how you access our Services, including data about the device and network you use, such as your hardware model, operating system version, mobile network, IP address, unique device identifiers, browser type, and app version. We also collect information about your activity on our Services, such as access times, pages viewed, links clicked, and the page you visited before navigating to our Services.
- Information Collected by Cookies and Similar Tracking Technologies: We use tracking technologies, such as cookies and web beacons, to collect information about you. Cookies are small data files stored on your hard drive or in device memory that help us improve our Services and your experience, see which areas and features of our Services are popular, and count visits. Web beacons (also known as “pixel tags” or “clear GIFs”) are electronic images that we use on our Services and in our emails to help deliver cookies, count visits, and understand usage. We also work with third party analytics providers who use cookies, web beacons, device identifiers, and other technologies to collect information about your use of our Services and other websites and applications, including your IP address, web browser, mobile network information, pages viewed, time spent on pages or in mobile apps, and links clicked. This information may be used by Medium and others to, among other things, analyze and track data, determine the popularity of certain content, deliver content targeted to your interests on our Services, and better understand your online activity. For more information about cookies and how to disable them, see Your Choices below.
Information We Collect from Other Sources
We obtain information from third-party sources. For example, we may collect information about you from social networks, accounting services providers and data analytics providers. Additionally, if you create or log into your Medium account through a third-party platform (such as Apple, Facebook, Google, or Twitter), we will have access to certain information from that platform, such as your name, lists of friends or followers, birthday, and profile picture, in accordance with the authorization procedures determined by such platform.
Information We Derive
We may derive information or draw inferences about you based on the information we collect. For example, we may make inferences about your location based on your IP address or infer reading preferences based on your reading history.
USE OF INFORMATION
We use the information we collect to provide, maintain, and improve our Services, which includes publishing and distributing user-generated content, personalizing the posts you see and operating our metered paywall. We also use the information we collect to:
- Create and maintain your Medium account;
- Process transactions and send related information, such as confirmations, receipts, and user experience surveys;
- Send you technical notices, security alerts, and support and administrative messages;
- Respond to your comments and questions and provide customer service;
- Communicate with you about new content, products, services, and features offered by Medium and provide other news and information we think will interest you (see Your Choices below for information about how to opt out of these communications at any time);
- Monitor and analyze trends, usage, and activities in connection with our Services;
- Detect, investigate, and prevent security incidents and other malicious, deceptive, fraudulent, or illegal activity and protect the rights and property of Medium and others;
- Debug to identify and repair errors in our Services;
- Comply with our legal and financial obligations; and
- Carry out any other purpose described to you at the time the information was collected.
SHARING OF INFORMATION
We share personal information in the following circumstances or as otherwise described in this policy:
- We share personal information with other users of the Services. For example, if you use our Services to publish content, post comments or send private notes, certain information about you will be visible to others, such as your name, photo, bio, other account information you may provide, and information about your activities on our Services (e.g., your followers and who you follow, recent posts, claps, highlights, and responses).
- We share personal information with vendors, service providers, and consultants that need access to personal information in order to perform services for us, such as companies that assist us with web hosting, storage, and other infrastructure, analytics, payment processing, fraud prevention and security, customer service, communications, and marketing.
- We may disclose personal information if we believe that disclosure is in accordance with, or required by, any applicable law or legal process, including lawful requests by public authorities to meet national security or law enforcement requirements. If we are going to disclose your personal information in response to legal process, we will give you notice so you can challenge it (for example by seeking court intervention), unless we are prohibited by law or believe doing so may endanger others or cause illegal conduct. We will object to legal requests for information about users of our Services that we believe are improper.
- We may share personal information if we believe that your actions are inconsistent with our user agreements or policies, if we believe that you have violated the law, or if we believe it is necessary to protect the rights, property, and safety of Medium, our users, the public, or others.
- We share personal information with our lawyers and other professional advisors where necessary to obtain advice or otherwise protect and manage our business interests.
- We may share personal information in connection with, or during negotiations concerning, any merger, sale of company assets, financing, or acquisition of all or a portion of our business by another company.
- Personal information is shared between and among Medium and our current and future parents, affiliates, and subsidiaries and other companies under common control and ownership.
- We share personal information with your consent or at your direction.
- We also share aggregated or de-identified information that cannot reasonably be used to identify you.
THIRD-PARTY EMBEDS
Medium does not host some of the content displayed on our Services. Users have the ability to post content that is actually hosted by a third party, but is embedded in our pages (an “Embed”). When you interact with an Embed, it can send information about your interaction to the hosting third party just as if you were visiting the third party’s site directly. For example, when you load a Medium post page with a YouTube video Embed and watch the video, YouTube receives information about your activity, such as your IP address and how much of the video you watch. Medium does not control what information third parties collect through Embeds or what they do with the information. This Privacy Policy does not apply to information collected through Embeds. The privacy policy belonging to the third party hosting the Embed applies to any information the Embed collects, and we recommend you review that policy before interacting with the Embed.
TRANSFER OF INFORMATION TO THE UNITED STATES AND OTHER COUNTRIES
Medium is headquartered in the United States, and we have operations and service providers in the United States and other countries. Therefore, we and our service providers may transfer your personal information to, or store or access it in, jurisdictions that may not provide levels of data protection that are equivalent to those of your home jurisdiction. For example, we transfer personal data to Amazon Web Services, one of our service providers that processes personal information for us in various data center locations across the globe, including those listed here. We will take steps to ensure that your personal information receives an adequate level of protection in the jurisdictions in which we process it.
YOUR CHOICES
Account Information
You may access, correct, delete and export your account information at any time by logging into the Services and navigating to the Settings page. Please note that if you choose to delete your account, we may continue to retain certain information about you as required by law or for our legitimate business purposes.
Cookies
Most web browsers are set to accept cookies by default. If you prefer, you can usually adjust your browser settings to remove or reject browser cookies. Please note that removing or rejecting cookies could affect the availability and functionality of our Services.
Communications Preferences
You may opt out of receiving certain communications from us, such as digests, newsletters, and activity notifications, by following the instructions in those communications or through your account’s Settings page. If you opt out, we may still send you administrative emails, such as those about your account or our ongoing business relations.
Mobile Push Notifications
With your consent, we may send push notifications to your mobile device. You can deactivate these messages at any time by changing the notification settings on your mobile device.
YOUR CALIFORNIA PRIVACY RIGHTS
The California Consumer Privacy Act or “CCPA” (Cal. Civ. Code § 1798.100 et seq.) affords consumers residing in California certain rights with respect to their personal information. If you are a California resident, this section applies to you.
In the preceding 12 months, we have collected the following categories of personal information: identifiers, commercial information, internet or other electronic network activity information, and inferences. For details about the precise data points we collect and the categories of sources of such collection, please see the Collection of Information section above. We collect personal information for the business and commercial purposes described in the Use of Information section above. In the preceding 12 months, we have disclosed the following categories of personal information for business purposes to the following categories of recipients:
Medium does not sell your personal information.
Subject to certain limitations, you have the right to (1) request to know more about the categories and specific pieces of personal information we collect, use, and disclose about you, (2) request deletion of your personal information, (3) opt out of any sales of your personal information, if we engage in that activity in the future, and (4) not be discriminated against for exercising these rights. You may make these requests by emailing us at [email protected] or by completing this webform. We will verify a webform request by asking you to provide identifying information. We will not discriminate against you if you exercise your rights under the CCPA.
If we receive your request from an authorized agent, we may ask for evidence that you have provided such agent with a power of attorney or that the agent otherwise has valid written authority to submit requests to exercise rights on your behalf. This may include requiring you to verify your identity. If you are an authorized agent seeking to make a request, please contact us.
ADDITIONAL DISCLOSURES FOR INDIVIDUALS IN EUROPE
If you are located in the European Economic Area (“EEA”), the United Kingdom, or Switzerland, you have certain rights and protections under applicable law regarding the processing of your personal data, and this section applies to you.
Legal Basis for Processing
When we process your personal data, we will do so in reliance on the following lawful bases:
- To perform our responsibilities under our contract with you (e.g., providing the products and services you requested).
- When we have a legitimate interest in processing your personal data to operate our business or protect our interests (e.g., to provide, maintain, and improve our products and services, conduct data analytics, and communicate with you).
- To comply with our legal obligations (e.g., to maintain a record of your consents and track those who have opted out of non-administrative communications).
- When we have your consent to do so (e.g., when you opt in to receive non-administrative communications from us). When consent is the legal basis for our processing your personal data, you may withdraw such consent at any time.
Data Retention
We store personal data associated with your account for as long as your account remains active. If you close your account, we will delete your account data within 14 days. We store other personal data for as long as necessary to carry out the purposes for which we originally collected it and for other legitimate business purposes, including to meet our legal, regulatory, or other compliance obligations.
Data Subject Requests
Subject to certain limitations, you have the right to request access to the personal data we hold about you and to receive your data in a portable format, the right to ask that your personal data be corrected or erased, and the right to object to, or request that we restrict, certain processing. To exercise your rights:
- If you sign up for a Medium account, you may at any time request an export of your personal information from the Settings page, or by going to Settings and then selecting Account within our app.
- You may correct information associated with your account from the Settings page, or by going to Settings and then selecting Account within our app, and the Customize Your Interests page to update your interests.
- You may withdraw consent by deleting your account at any time through the Settings page, or by going to Settings and then selecting Account within our app (except to the extent Medium is prevented by law from deleting your information).
- You may object at any time to the use of your personal data by contacting [email protected].
Questions or Complaints
If you have a concern about our processing of personal data that we are not able to resolve, you have the right to lodge a complaint with the Data Protection Authority where you reside. Contact details for your Data Protection Authority can be found using the links below:
- For individuals in the EEA:
https://edpb.europa.eu/about-edpb/board/members_en - For individuals in the UK:
https://ico.org.uk/global/contact-us/ - For individuals in Switzerland: https://www.edoeb.admin.ch/edoeb/en/home/the-fdpic/contact.html
CONTACT US
If you have any questions about this Privacy Policy, please contact us at [email protected].
If you are from the EEA or the United Kingdom and have questions about this Privacy Policy, please contact us at [email protected] or our privacy representatives as follows:
Privacy representative for EEA
Unit 3D North Point House
North Point Business Park
New Mallow Road
Cork T23AT2P
Ireland
Or here.
Privacy representative for the United Kingdom
37 Albert Embankment
London SE1 7TL
United Kingdom
Or here.
|
<urn:uuid:ef7a281a-1043-45ca-b88f-6cc3f68d93e1>
|
CC-MAIN-2024-51
|
https://policy.medium.com/medium-privacy-policy-f03bf92035c9?source=post_page-----52e4d97886a5--------------------------------
|
2024-12-11T14:17:28Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066083790.8/warc/CC-MAIN-20241211112917-20241211142917-00617.warc.gz
|
by
|
4.0
|
a_tag
| false | false | null | null | null |
{
"abbr": [
"by"
],
"in_footer": [
false
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.993109 |
Medium Privacy Policy
You can see our previous Privacy Policy here.
This Privacy Policy explains how A Medium Corporation (“Medium,” “we,” or “us”) collects, uses, and discloses information about you. This Privacy Policy applies when you use our websites, mobile applications, and other online products and services that link to this Privacy Policy (collectively, our “Services”), contact our customer service team, engage with us on social media, or otherwise interact with us.
We may change this Privacy Policy from time to time. If we make changes, we will notify you by revising the date at the top of this policy and, in some cases, we may provide you with additional notice (such as adding a statement to our website or providing you with a notification). We encourage you to review this Privacy Policy regularly to stay informed about our information practices and the choices available to you.
CONTENTS
- Collection of Information
- Use of Information
- Sharing of Information
- Third-Party Embeds
- Transfer of Information to the United States and Other Countries
- Your Choices
- Your California Privacy Rights
- Additional Disclosures for Individuals in Europe
- Contact Us
COLLECTION OF INFORMATION
Information You Provide to Us
We collect information you provide directly to us. For example, you share information directly with us when you create an account, fill out a form, submit or post content through our Services, purchase a membership, communicate with us via third-party platforms, request customer support, or otherwise communicate with us. The types of personal information we may collect include your name, display name, username, bio, email address, business information, your content, including your avatar image, photos, posts, responses, and series published by you, and any other information you choose to provide.
In some cases, we may also collect information you provide about others, such as when you purchase a Medium membership as a gift for someone. We will use this information to fulfill your request and will not send communications to your contacts unrelated to your request, unless they separately consent to receive communications from us or otherwise engage with us.
We do not collect payment information through our Services. We rely on third parties to process payments in connection with our Services. Any information you provide to facilitate such a payment is subject to the third-party payment processor’s privacy policy, and we encourage you to review this policy before you provide any information to the payment processor.
Information We Collect Automatically When You Interact with Us
In some instances, we automatically collect certain information, including:
- Activity Information: We collect information about your activity on our Services, such as your reading history and when you share links, follow users, highlight posts, and clap for posts.
- Transactional Information: When you purchase a membership, we collect information about the transaction, such as subscription details, purchase price, and the date of the transaction.
- Device and Usage Information: We collect information about how you access our Services, including data about the device and network you use, such as your hardware model, operating system version, mobile network, IP address, unique device identifiers, browser type, and app version. We also collect information about your activity on our Services, such as access times, pages viewed, links clicked, and the page you visited before navigating to our Services.
- Information Collected by Cookies and Similar Tracking Technologies: We use tracking technologies, such as cookies and web beacons, to collect information about you. Cookies are small data files stored on your hard drive or in device memory that help us improve our Services and your experience, see which areas and features of our Services are popular, and count visits. Web beacons (also known as “pixel tags” or “clear GIFs”) are electronic images that we use on our Services and in our emails to help deliver cookies, count visits, and understand usage. We also work with third party analytics providers who use cookies, web beacons, device identifiers, and other technologies to collect information about your use of our Services and other websites and applications, including your IP address, web browser, mobile network information, pages viewed, time spent on pages or in mobile apps, and links clicked. This information may be used by Medium and others to, among other things, analyze and track data, determine the popularity of certain content, deliver content targeted to your interests on our Services, and better understand your online activity. For more information about cookies and how to disable them, see Your Choices below.
Information We Collect from Other Sources
We obtain information from third-party sources. For example, we may collect information about you from social networks, accounting services providers and data analytics providers. Additionally, if you create or log into your Medium account through a third-party platform (such as Apple, Facebook, Google, or Twitter), we will have access to certain information from that platform, such as your name, lists of friends or followers, birthday, and profile picture, in accordance with the authorization procedures determined by such platform.
Information We Derive
We may derive information or draw inferences about you based on the information we collect. For example, we may make inferences about your location based on your IP address or infer reading preferences based on your reading history.
USE OF INFORMATION
We use the information we collect to provide, maintain, and improve our Services, which includes publishing and distributing user-generated content, personalizing the posts you see and operating our metered paywall. We also use the information we collect to:
- Create and maintain your Medium account;
- Process transactions and send related information, such as confirmations, receipts, and user experience surveys;
- Send you technical notices, security alerts, and support and administrative messages;
- Respond to your comments and questions and provide customer service;
- Communicate with you about new content, products, services, and features offered by Medium and provide other news and information we think will interest you (see Your Choices below for information about how to opt out of these communications at any time);
- Monitor and analyze trends, usage, and activities in connection with our Services;
- Detect, investigate, and prevent security incidents and other malicious, deceptive, fraudulent, or illegal activity and protect the rights and property of Medium and others;
- Debug to identify and repair errors in our Services;
- Comply with our legal and financial obligations; and
- Carry out any other purpose described to you at the time the information was collected.
SHARING OF INFORMATION
We share personal information in the following circumstances or as otherwise described in this policy:
- We share personal information with other users of the Services. For example, if you use our Services to publish content, post comments or send private notes, certain information about you will be visible to others, such as your name, photo, bio, other account information you may provide, and information about your activities on our Services (e.g., your followers and who you follow, recent posts, claps, highlights, and responses).
- We share personal information with vendors, service providers, and consultants that need access to personal information in order to perform services for us, such as companies that assist us with web hosting, storage, and other infrastructure, analytics, payment processing, fraud prevention and security, customer service, communications, and marketing.
- We may disclose personal information if we believe that disclosure is in accordance with, or required by, any applicable law or legal process, including lawful requests by public authorities to meet national security or law enforcement requirements. If we are going to disclose your personal information in response to legal process, we will give you notice so you can challenge it (for example by seeking court intervention), unless we are prohibited by law or believe doing so may endanger others or cause illegal conduct. We will object to legal requests for information about users of our Services that we believe are improper.
- We may share personal information if we believe that your actions are inconsistent with our user agreements or policies, if we believe that you have violated the law, or if we believe it is necessary to protect the rights, property, and safety of Medium, our users, the public, or others.
- We share personal information with our lawyers and other professional advisors where necessary to obtain advice or otherwise protect and manage our business interests.
- We may share personal information in connection with, or during negotiations concerning, any merger, sale of company assets, financing, or acquisition of all or a portion of our business by another company.
- Personal information is shared between and among Medium and our current and future parents, affiliates, and subsidiaries and other companies under common control and ownership.
- We share personal information with your consent or at your direction.
- We also share aggregated or de-identified information that cannot reasonably be used to identify you.
THIRD-PARTY EMBEDS
Medium does not host some of the content displayed on our Services. Users have the ability to post content that is actually hosted by a third party, but is embedded in our pages (an “Embed”). When you interact with an Embed, it can send information about your interaction to the hosting third party just as if you were visiting the third party’s site directly. For example, when you load a Medium post page with a YouTube video Embed and watch the video, YouTube receives information about your activity, such as your IP address and how much of the video you watch. Medium does not control what information third parties collect through Embeds or what they do with the information. This Privacy Policy does not apply to information collected through Embeds. The privacy policy belonging to the third party hosting the Embed applies to any information the Embed collects, and we recommend you review that policy before interacting with the Embed.
TRANSFER OF INFORMATION TO THE UNITED STATES AND OTHER COUNTRIES
Medium is headquartered in the United States, and we have operations and service providers in the United States and other countries. Therefore, we and our service providers may transfer your personal information to, or store or access it in, jurisdictions that may not provide levels of data protection that are equivalent to those of your home jurisdiction. For example, we transfer personal data to Amazon Web Services, one of our service providers that processes personal information for us in various data center locations across the globe, including those listed here. We will take steps to ensure that your personal information receives an adequate level of protection in the jurisdictions in which we process it.
YOUR CHOICES
Account Information
You may access, correct, delete and export your account information at any time by logging into the Services and navigating to the Settings page. Please note that if you choose to delete your account, we may continue to retain certain information about you as required by law or for our legitimate business purposes.
Cookies
Most web browsers are set to accept cookies by default. If you prefer, you can usually adjust your browser settings to remove or reject browser cookies. Please note that removing or rejecting cookies could affect the availability and functionality of our Services.
Communications Preferences
You may opt out of receiving certain communications from us, such as digests, newsletters, and activity notifications, by following the instructions in those communications or through your account’s Settings page. If you opt out, we may still send you administrative emails, such as those about your account or our ongoing business relations.
Mobile Push Notifications
With your consent, we may send push notifications to your mobile device. You can deactivate these messages at any time by changing the notification settings on your mobile device.
YOUR CALIFORNIA PRIVACY RIGHTS
The California Consumer Privacy Act or “CCPA” (Cal. Civ. Code § 1798.100 et seq.) affords consumers residing in California certain rights with respect to their personal information. If you are a California resident, this section applies to you.
In the preceding 12 months, we have collected the following categories of personal information: identifiers, commercial information, internet or other electronic network activity information, and inferences. For details about the precise data points we collect and the categories of sources of such collection, please see the Collection of Information section above. We collect personal information for the business and commercial purposes described in the Use of Information section above. In the preceding 12 months, we have disclosed the following categories of personal information for business purposes to the following categories of recipients:
Medium does not sell your personal information.
Subject to certain limitations, you have the right to (1) request to know more about the categories and specific pieces of personal information we collect, use, and disclose about you, (2) request deletion of your personal information, (3) opt out of any sales of your personal information, if we engage in that activity in the future, and (4) not be discriminated against for exercising these rights. You may make these requests by emailing us at [email protected] or by completing this webform. We will verify a webform request by asking you to provide identifying information. We will not discriminate against you if you exercise your rights under the CCPA.
If we receive your request from an authorized agent, we may ask for evidence that you have provided such agent with a power of attorney or that the agent otherwise has valid written authority to submit requests to exercise rights on your behalf. This may include requiring you to verify your identity. If you are an authorized agent seeking to make a request, please contact us.
ADDITIONAL DISCLOSURES FOR INDIVIDUALS IN EUROPE
If you are located in the European Economic Area (“EEA”), the United Kingdom, or Switzerland, you have certain rights and protections under applicable law regarding the processing of your personal data, and this section applies to you.
Legal Basis for Processing
When we process your personal data, we will do so in reliance on the following lawful bases:
- To perform our responsibilities under our contract with you (e.g., providing the products and services you requested).
- When we have a legitimate interest in processing your personal data to operate our business or protect our interests (e.g., to provide, maintain, and improve our products and services, conduct data analytics, and communicate with you).
- To comply with our legal obligations (e.g., to maintain a record of your consents and track those who have opted out of non-administrative communications).
- When we have your consent to do so (e.g., when you opt in to receive non-administrative communications from us). When consent is the legal basis for our processing your personal data, you may withdraw such consent at any time.
Data Retention
We store personal data associated with your account for as long as your account remains active. If you close your account, we will delete your account data within 14 days. We store other personal data for as long as necessary to carry out the purposes for which we originally collected it and for other legitimate business purposes, including to meet our legal, regulatory, or other compliance obligations.
Data Subject Requests
Subject to certain limitations, you have the right to request access to the personal data we hold about you and to receive your data in a portable format, the right to ask that your personal data be corrected or erased, and the right to object to, or request that we restrict, certain processing. To exercise your rights:
- If you sign up for a Medium account, you may at any time request an export of your personal information from the Settings page, or by going to Settings and then selecting Account within our app.
- You may correct information associated with your account from the Settings page, or by going to Settings and then selecting Account within our app, and the Customize Your Interests page to update your interests.
- You may withdraw consent by deleting your account at any time through the Settings page, or by going to Settings and then selecting Account within our app (except to the extent Medium is prevented by law from deleting your information).
- You may object at any time to the use of your personal data by contacting [email protected].
Questions or Complaints
If you have a concern about our processing of personal data that we are not able to resolve, you have the right to lodge a complaint with the Data Protection Authority where you reside. Contact details for your Data Protection Authority can be found using the links below:
- For individuals in the EEA:
https://edpb.europa.eu/about-edpb/board/members_en - For individuals in the UK:
https://ico.org.uk/global/contact-us/ - For individuals in Switzerland: https://www.edoeb.admin.ch/edoeb/en/home/the-fdpic/contact.html
CONTACT US
If you have any questions about this Privacy Policy, please contact us at [email protected].
If you are from the EEA or the United Kingdom and have questions about this Privacy Policy, please contact us at [email protected] or our privacy representatives as follows:
Privacy representative for EEA
Unit 3D North Point House
North Point Business Park
New Mallow Road
Cork T23AT2P
Ireland
Or here.
Privacy representative for the United Kingdom
37 Albert Embankment
London SE1 7TL
United Kingdom
Or here.
|
<urn:uuid:bc42f132-adca-4c3a-a742-6cb06af3ed78>
|
CC-MAIN-2024-51
|
https://policy.medium.com/medium-privacy-policy-f03bf92035c9?source=user_profile_page---user_sidebar-------------------fbe9d60a11d2---------------
|
2024-12-11T14:19:35Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066083790.8/warc/CC-MAIN-20241211112917-20241211142917-00617.warc.gz
|
by
|
4.0
|
a_tag
| false | false | null | null | null |
{
"abbr": [
"by"
],
"in_footer": [
false
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.993109 |
posted on 2023-02-06, 17:18authored byScience Gossip
‘Science Gossip’ is born from a collaboration between an Arts and Humanities Research Council project in the UK, called ‘Constructing Scientific Communities: Citizen Science in the 19th and 21st Centuries’ (ConSciCom) and the Missouri Botanical Garden who are providing content from the Biodiversity Heritage Library (BHL).
Funding
Constructing Scientific Communities: Citizen Science in the 19th and 21st Centuries
|
<urn:uuid:3f3b383b-e7f8-41ee-af90-1e6599e5baaa>
|
CC-MAIN-2024-51
|
https://portal.sds.ox.ac.uk/articles/figure/Hardwicke_Science_Gossip_v_19_1883_Page_205_ASC00004z8/22020227/1
|
2024-12-11T12:03:45Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066083790.8/warc/CC-MAIN-20241211112917-20241211142917-00617.warc.gz
|
by
|
4.0
|
a_tag
| false | false | null | null | null |
{
"abbr": [
"by"
],
"in_footer": [
false
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.928486 |
International and national conditions of enterprises development
Downloads
Metrics
Downloads
Published
How to Cite
Issue
Section
License
Articles are published under the terms of the Creative Commons License (CC BY-ND 4.0; Attribution– NoDerivs).
|
<urn:uuid:65f22624-b893-400b-ab0a-e9f48f093f3a>
|
CC-MAIN-2024-51
|
https://prace-kgp.uken.krakow.pl/article/view/3109
|
2024-12-11T12:56:39Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066083790.8/warc/CC-MAIN-20241211112917-20241211142917-00617.warc.gz
|
by-nd
|
3.0
|
a_tag
| false | false | null | null | null |
{
"abbr": [
"by-nd"
],
"in_footer": [
false
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"3.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.918017 |
- Browse by Topic
Selected Topic:
This Insight explores the importance of a deliberate, phased approach to implementing educational initiatives, emphasizing that intentionality, rather than speed, is crucial for long-term success. By piloting new practices, building teacher...
Supporting Student Nutrition in Virtual and Hybrid Settings: Lessons from Addressing the Digital Divide
Virtual learners often can't access the same level of nutritional support as their in-person peers. This insight helps virtual and hybrid school and system leaders tackle this challenge.
For students to succeed in a virtual/hybrid learning environment, it is essential for schools and teachers to implement learner-centered design practices. This Insight explores the research behind this critical lever and real-world case studies of...
For students to succeed in a virtual/hybrid learning environment, it is essential for schools and teachers to foster learner-centered design practices. This Insight explores the research behind this critical lever and real-world case studies of...
For students to succeed in a virtual/hybrid learning environment, it is essential for schools to establish clear norms and expectations to ease students’ and families’ transitions into virtual and hybrid learning and set them up for success. This...
For students to succeed in a virtual/hybrid learning environment, it is vital that schools put support structures in place that inform, encourage, and support families as an integral part of their child’s learning experience. This Insight explores...
For students to succeed in a virtual/hybrid learning environment, it is crucial to not only attend to students’ emotions on the other side of the screen – but also prioritize building relationships and creating a sense of social presence similar to...
For students to succeed in a virtual/hybrid learning environment, it is essential for schools to improve both teacher and student capacity with technology. This Insight explores the research behind this critical lever and real-world case studies of...
How Do Edtech Products “Stack” Up?: Improving Quality in Virtual and Hybrid Learning Through Technology
This resource distills learnings about what must be true for edtech to promote virtual and hybrid learning program quality and offers leaders a series of questions to ask themselves when considering their own edtech products’ ability to do so.
As technology continues to advance, online resource repositories – the websites, hubs, libraries, or other platforms used to find and implement resources and practices – have become an increasingly popular tool for educators looking to innovate....
This actionable insight covers how education leaders can use The Learning Accelerator's Hop, Skip, Leapfrog Guide to lead their educators through change management and reinvention of school models.
This guidance highlights a number of the considerations that states are making about their course access programs, demonstrates models states have developed based on these considerations, and provides resources to help states address critical...
Measuring Unfinished Learning: A Guide for Schools and Systems to Understand and Measure Student Progress
This insight investigates how education leaders can take an asset-based approach to measuring student learning, offering concrete processes and methodology to examine learner growth during times of disruption to student learning.
Explore ways to design an effective synchronous video learning experiences, starting with what you already know and exploring the effective in-person strategies you used prior to remote learning.
In this Insight, Elizabeth LeBlanc shares some of the hops, skips, and leaps Taos Academy Charter has made during the COVID-19 pandemic to facilitate effective teaching and learning – and examines what they'll take forward with them.
This case study provides an overview of Monterey Peninsula Unified School District's experience progressing through Real-Time Redesign.
This case study provides an overview of Cedar Rapids Community School District's experience progressing through Real-Time Redesign.
This case study provides an overview of Mastery Charter Schools' experience progressing through Real-Time Redesign.
Today's One Thing for Teachers and Leaders: Starting Conversations About Racial Injustice in Schools
This special installment of Today's One Thing shares insights around having conversations in the classroom about racial injustice for both teachers and leaders.
This week’s edition of Today’s One Thing addresses how to keep students engaged with learning during the summer months.
This installment of Today's One Thing for Leaders explores how education leaders can think about planning for the months ahead and the relaunch of learning in the fall.
This installment of Today’s One Thing addresses how to remotely engage families to support student development and outcomes.
This installment of Today's One Thing for Leaders explores how leaders can support and engage families and teachers over the summer.
This installment of Today’s One Thing discusses how to implement social-emotional learning activities in a remote classroom setting.
This installment of Today's One Thing for Leaders explores the process of onboarding new teachers in a remote environment.
In this week’s installment of Today’s One Thing, we address how to differentiate instruction in a remote setting.
Today’s One Thing for Leaders: Hiring Teachers in a Remote Setting, Part 1 – Active Recruitment and Selection
This installment of Today's One Thing for Leaders explores the process of hiring teachers in a remote setting through active recruitment.
This edition of Today’s One Thing for Teachers discusses different ways you can remotely assess learning to improve instruction.
This installment of Today's One Thing for Leaders explores ways to celebrate Teacher Appreciation Week in a remote learning environment.
In this installment of TLA’s Today’s One Thing, we look at how teachers can flip their already existing content and leverage Open Educational Resources (OER) to teach in their virtual classrooms.
This Insight shares useful professional development strategies that help PD providers support educators during the shift to remote learning spaces.
In this first installment of Today's One Thing for Leaders, we discuss how to meet the social needs of school teams and students in a remote environment.
This installment of TLA’s Today’s One Thing addresses how to set up structures for student accountability by using student-driven trackers.
This installment of TLA’s Today’s One Thing touches on how to help build structures to guide students to work effectively and independently from home.
Today's One Thing is TLA's new series aimed at sharing concrete resources, ideas, tools, and best practices around one specific topic targeted towards helping educators and leaders solve their challenges around the recent shift to remote and online...
This Insight, based off of research conducted by the Institute for Teaching and Leading, explores the actions of school and district leadership in terms of their impact on empowerment, self-efficacy, mindset, and motivation of the learning...
This Insight, based off of research conducted by the Institute for Teaching and Leading, explores the most impactful actions site-level leadership can use to effectively lead schools through engagement, collaboration, and teambuilding.
To help understand how district and building-level administrators can successfully manage the change process when leading personalized learning initiatives, the Institute for Teaching and Leading (i4tl) conducted research looking at which actions by...
In this installment of IgnitED Research, a series that aims to build stronger connections between learning science and instructional practice, we look at prior knowledge and its uses in maximizing learning.
In this installment of IgnitED Research, a series that aims to build stronger connections between learning science and instructional practice, we look at classroom management and how to empower students to co-create and drive management processes.
This installment of our series connecting learning science and instructional practice focuses on how retrieving information helps students learn.
This installment of our series connecting learning science and instructional practice focuses on the benefits of mixed-ability student groups.
This installment of our series connecting learning science and instructional practice focuses on the evidence base about feedback, and how this evidence can be applied in your classroom.
This first installment of our series connecting learning science and instructional practice focuses on the evidence base which shows learning styles do not exist, and how this evidence can be applied in your classroom.
This Insight investigates the use of NWEA report data alongside a virtual comparison group to produce actionable insights when implementing blended learning.
Most schools and districts have a specific communications strategy built-in to their yearly calendar; however, many of these schools and districts need to work on the storytelling they use in order to leverage communication strategies more...
We engaged in two researcher-practitioner partnerships (RPPs) with Distinctive Schools, and Leadership Public Schools over one school year to help them determine how best to scale their personalized learning initiatives. Here are the lessons we...
Teachers Guild and The Learning Accelerator are joining forces for a personalized learning collaboration. As a kickoff, we asked educators to submit their favorite lessons or activities that they already use to personalize learning in their...
As more and more educators across the country are moving towards blended learning, they are struggling with a very challenging question: how exactly do I make mastery-based progression happen in my classroom?
Using how your students learn to drive your practices and personalize for students through self-reflection, empowering your learners, and allowing for multiple paths to mastery.
Creating a classroom culture that personalizes learning for students is facilitated by teaching key skills and mindsets that students need to navigate their education.
Springpoint's paper, Inside Mastery Based High Schools: Profiles and Conversations, includes several innovative approaches to the challenge of mastery-based grading.
Discover strategies for implementing blended and personalized learning in classrooms
Snapshots from six schools using blended learning to put students in control. (Originally published in eSchoolNews on November 14, 2016)
Find out how Relay GSE has approached management and classroom culture when implementing blended learning.
Watch these brief videos to discover the multiple features of the Blended & Personalized Learning Practices at Work site.
Blended and personalized learning models attempt to put students into greater control of their learning. Teachers need to build in explicit supports and structures to support students as they exercise greater choice and control. One structure we...
Successful blended and personalized implementations have clear statements for why they are pursuing change through blended and personalized learning. They ground all of their work in this “why,” referring back to it again and again.
|
<urn:uuid:a296f806-0ae9-4122-85c2-9431412ff273>
|
CC-MAIN-2024-51
|
https://practices.learningaccelerator.org/insights?query=formative%20assessments?query=mastery-based?query=feedback?query=Student%20grouping?query=Implementation?query=Implementation?query=learner%20agency?query=data?query=connectivity?query=student%20groups?query=communications?query=learning%20science?query=evidence-based?query=Implementation?query=community?query=reports?query=reports?query=data?query=learning%20styles?query=student%20groups?query=formative%20assessments?query=course%20access?query=grouping?query=formative%20assessments?query=teaching%20practice?query=communications
|
2024-12-11T12:47:10Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066083790.8/warc/CC-MAIN-20241211112917-20241211142917-00617.warc.gz
|
by
|
4.0
|
a_tag
| false | true | null | null | null |
{
"abbr": [
"by"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.99694 |
To start the images, here’s a photo by MANIK of me in front of the billboard advertising my show.
Here’s a close up of the same image for those of you who don’t know what I look like. :-)
To start the images, here’s a photo by MANIK of me in front of the billboard advertising my show.
Here’s a close up of the same image for those of you who don’t know what I look like. :-)
|
<urn:uuid:a1153ac0-867f-4bf8-b7fc-0c2c1e288825>
|
CC-MAIN-2024-51
|
https://rhea.art/2005/08/01/me-and-my-billboard/
|
2024-12-11T13:27:21Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066083790.8/warc/CC-MAIN-20241211112917-20241211142917-00617.warc.gz
|
by-sa
|
4.0
|
a_tag
| false | true | null | null | null |
{
"abbr": [
"by-sa"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.999298 |
Markus Schulz (English pronunciation: /ˈmɑːrkᵿsˈʃʊlts/; German:[ˈmaʁkʊs ˈʃʊlt͡s]; born 3 February 1975), is a German-American DJ and music producer. He lives in Miami, Florida. He is best known for his weekly radio show titled Global DJ Broadcast that airs on Digitally Imported radio, After Hours FM and other online stations. He is also the founder of the labelColdharbour Recordings and Schulz Music Group (SMG), an artist management company which manages rising stars in the industry such as Nifra, Fisherman & Hawkins, Mr. Pit, Grube & Hovsepian and Adina Butar. After several spontaneous back to back performances in early 2013, Markus Schulz and Ferry Corsten announced they would be producing and touring together as the new EDM group New World Punx. Their debut arena show was held at Madison Square Garden, with global tour dates ongoing in the future.
If everybody felt the same and would come to me. If everything I had before, I could be the beginning. If all we knew had gone away, you'd call me the last man standing. And over the edge we drift away.
|
<urn:uuid:dec2c4f9-0073-45bd-ab58-0cd6e7da972d>
|
CC-MAIN-2024-51
|
https://ro.wn.com/Remember_Me_(Shawn_Mitiska_Tyler_Michaud_Remix)_Markus_Schulz
|
2024-12-11T13:27:10Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066083790.8/warc/CC-MAIN-20241211112917-20241211142917-00617.warc.gz
|
by-sa
|
3.0
|
a_tag
| false | false | null | null | null |
{
"abbr": [
"by-sa",
"by-sa",
"by-sa",
"by-sa"
],
"in_footer": [
false,
false,
false,
false
],
"in_head": [
false,
false,
false,
false
],
"location": [
"a_tag",
"a_tag",
"a_tag",
"a_tag"
],
"version": [
"3.0",
"3.0",
"3.0",
"3.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.997544 |
1978, Portugal
By Gemini
Dai Li Dou came 17th.
A rundown of this year's spokespeople, how most of them have been involved before and who the current most frequent spokespeople are.
This site is a labour of love (and compulsiveness) so I'm happy to put in the hours for free. But if you find it useful and want to say thanks, feel free to email me corrections or suggestions or get me a coffee (or send me a tweet!).
|
<urn:uuid:86d5a457-0045-44b3-b806-df241ab3f8d5>
|
CC-MAIN-2024-51
|
https://sixonstage.com/song/1978/portugal
|
2024-12-11T12:44:57Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066083790.8/warc/CC-MAIN-20241211112917-20241211142917-00617.warc.gz
|
by
|
4.0
|
a_tag
| false | true | null | null | null |
{
"abbr": [
"by"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.999662 |
Apple fucked us on right to repair (again)
Today (September 22), I’m (virtually) presenting at the DIG Festival in Modena, Italy. Tonight, I’ll be in person at LA’s Book Soup for the launch of Justin C Key’s The World Wasn’t Ready for You. On September 27, I’ll be at Chevalier’s Books in Los Angeles with Brian Merchant for a joint launch for my new book The Internet Con and his new book, Blood in the Machine.
Right to repair has no cannier, more dedicated adversary than Apple, a company whose most innovative work is dreaming up new ways to sneakily sabotage electronics repair while claiming to be a caring environmental steward, a lie that covers up the mountains of e-waste that Apple dooms our descendants to wade through.
Why does Apple hate repair so much? It’s not that they want to poison our water and bodies with microplastics; it’s not that they want to hasten the day our coastal cities drown; it’s not that they relish the human misery that accompanies every gram of conflict mineral. They aren’t sadists. They’re merely sociopathically greedy.
Tim Cook laid it out for his investors: when people can repair their devices, they don’t buy new ones. When people don’t buy new devices, Apple doesn’t sell them new devices. It’s that’s simple:
So Apple does everything it can to monopolize repair. Not just because this lets the company gouge you on routine service, but because it lets them decide when your phone is beyond repair, so they can offer you a trade-in, ensuring both that you buy a new device and that the device you buy is another Apple.
There are so many tactics Apple gets to use to sabotage repair. For example, Apple engraves microscopic Apple logos on the subassemblies in its devices. This allows the company to enlist US Customs to seize and destroy refurbished parts that are harvested from dead phones by workers in the Pacific Rim:
Of course, the easiest way to prevent harvested components from entering the parts stream is to destroy as many old devices as possible. That’s why Apple’s so-called “recycling” program shreds any devices you turn over to them. When you trade in your old iPhone at an Apple Store, it is converted into immortal e-waste (no other major recycling program does this). The logic is straightforward: no parts, no repairs:
Shredding parts and cooking up bogus trademark claims is just for starters, though. For Apple, the true anti-repair innovation comes from the most pernicious US tech law: Section 1201 of the Digital Millennium Copyright Act (DMCA).
DMCA 1201 is an “anti-circumvention” law. It bans the distribution of any tool that bypasses “an effective means of access control.” That’s all very abstract, but here’s what it means: if a manufacturer sticks some Digital Rights Management (DRM) in its device, then anything you want to do that involves removing that DRM is now illegal — even if the thing itself is perfectly legal.
When Congress passed this stupid law in 1998, it had a very limited blast radius. Computers were still pretty expensive and DRM use was limited to a few narrow categories. In 1998, DMCA 1201 was mostly used to prevent you from de-regionalizing your DVD player to watch discs that had been released overseas but not in your own country.
But as we warned back then, computers were only going to get smaller and cheaper, and eventually, it would only cost manufacturers pennies to wrap their products — or even subassemblies in their products — in DRM. Congress was putting a gun on the mantelpiece in Act I, and it was bound to go off in Act III.
Welcome to Act III.
Today, it costs about a quarter to add a system-on-a-chip to even the tiniest parts. These SOCs can run DRM. Here’s how that DRM works: when you put a new part in a device, the SOC and the device’s main controller communicate with one another. They perform a cryptographic protocol: the part says, “Here’s my serial number,” and then the main controller prompts the user to enter a manufacturer-supplied secret code, and the master controller sends a signed version of this to the part, and the part and the system then recognize each other.
This process has many names, but because it was first used in the automotive sector, it’s widely known as VIN-Locking (VIN stands for “vehicle identification number,” the unique number given to every car by its manufacturer). VIN-locking is used by automakers to block independent mechanics from repairing your car; even if they use the manufacturer’s own parts, the parts and the engine will refuse to work together until the manufacturer’s rep keys in the unlock code:
VIN locking is everywhere. It’s how John Deere stops farmers from fixing their own tractors — something farmers have done literally since tractors were invented:
It’s in ventilators. Like mobile phones, ventilators are a grotesquely monopolized sector, controlled by a single company Medtronic, whose biggest claim to fame is effecting the world’s largest tax inversion in order to manufacture the appearance that it is an Irish company and therefore largely untaxable. Medtronic used the resulting windfall to gobble up most of its competitors.
During lockdown, as hospitals scrambled to keep their desperately needed supply of ventilators running, Medtronic’s VIN-locking became a lethal impediment. Med-techs who used donor parts from one ventilator to keep another running — say, transplanting a screen — couldn’t get the device to recognize the part because all the world’s civilian aircraft were grounded, meaning Medtronic’s technicians couldn’t swan into their hospitals to type in the unlock code and charge them hundreds of dollars.
The saving grace was an anonymous, former Medtronic repair tech, who built pirate boxes to generate unlock codes, using any housing they could lay hands on to use as a case: guitar pedals, clock radios, etc. This tech shipped these gadgets around the world, observing strict anonymity, because Article 6 of the EUCD also bans circumvention:
Of course, Apple is a huge fan of VIN-locking. In phones, VIN-locking is usually called “serializing” or “parts-pairing,” but it’s the same thing: a tiny subassembly gets its own microcontroller whose sole purpose is to prevent independent repair technicians from fixing your gadget. Parts-pairing lets Apple block repairs even when the technician uses new, Apple parts — but it also lets Apple block refurb parts and third party parts.
For many years, Apple was the senior partner and leading voice in blocking state Right to Repair bills, which it killed by the dozen, leading a coalition of monopolists, from Wahl (who boobytrap their hair-clippers with springs that cause their heads irreversibly decompose if you try to sharpen them at home) to John Deere (who reinvented tenant farming by making farmers tenants of their tractors, rather than their land).
But Apple’s opposition to repair eventually became a problem for the company. It’s bad optics, and both Apple customers and Apple employees are volubly displeased with the company’s ecocidal conduct. But of course, Apple’s management and shareholders hate repair and want to block it as much as possible.
But Apple knows how to Think Differently. It came up with a way to eat its cake and have it, too. The company embarked on a program of visibly support right to repair, while working behind the scenes to sabotage it.
Last year, Apple announced a repair program. It was hilarious. If you wanted to swap your phone’s battery, all you had to do was let Apple put a $1200 hold on your credit card, and then wait while the company shipped you 80 pounds’ worth of specialized tools, packed in two special Pelican cases:
Then, you swapped your battery, but you weren’t done! After your battery was installed, you had to conference in an authorized Apple tech who would tell you what code to type into a laptop you tethered to the phone in order to pair it with your phone. Then all you had to do was lug those two 40-pound Pelican cases to a shipping depot and wait for Apple to take the hold off your card (less the $120 in parts and fees).
By contrast, independent repair outfits like iFixit will sell you all the tools you need to do your own battery swap — including the battery! for $32. The whole kit fits in a padded envelope:
But while Apple was able to make a showy announcement of its repair program and then hide the malicious compliance inside those giant Pelican cases, sabotaging right to repair legislation is a lot harder.
Not that they didn’t try. When New York State passed the first general electronics right-to-repair bill in the country, someone convinced New York Governor Kathy Hochul to neuter it with last-minute modifications:
But that kind of trick only works once. When California’s right to repair bill was introduced, it was clear that it was gonna pass. Rather than get run over by that train, Apple got on board, supporting the legislation, which passed unanimously:
But Apple got the last laugh. Because while California’s bill contains many useful clauses for the independent repair shops that keep your gadgets out of a landfill, it’s a state law, and DMCA 1201 is federal. A state law can’t simply legalize the conduct federal law prohibits. California’s right to repair bill is a banger, but it has a weak spot: parts-pairing, the scourge of repair techs:
Every generation of Apple devices does more parts-pairing than the previous one, and the current models are so infested with paired parts as to be effectively unrepairable, except by Apple. It’s so bad that iFixit has dropped its repairability score for the iPhone 14 from a 7 (“recommend”) to a 4 (do not recommend):
Parts-pairing is bullshit, and Apple are scum for using it, but they’re hardly unique. Parts-pairing is at the core of the fuckery of inkjet printer companies, who use it to fence out third-party ink, so they can charge $9,600/gallon for ink that pennies to make:
Parts-pairing is also rampant in powered wheelchairs, a heavily monopolized sector whose predatory conduct is jaw-droppingly depraved:
But if turning phones into e-waste to eke out another billion-dollar stock buyback is indefensible, stranding people with disabilities for months at a time while they await repairs is so obviously wicked that the conscience recoils. That’s why it was so great when Colorado passed the nation’s first wheelchair right to repair bill last year:
California actually just passed two right to repair bills; the other one was SB-271, which mirrors Colorado’s HB22–1031:
This is big! It’s momentum! It’s a start!
But it can’t be the end. When Bill Clinton signed DMCA 1201 into law 25 years ago, he loaded a gun and put it on the nation’s mantlepiece and now it’s Act III and we’re all getting sprayed with bullets. Everything from ovens to insulin pumps, thermostats to lightbulbs, has used DMCA 1201 to limit repair, modification and improvement.
Congress needs to rid us of this scourge, to let us bring back all the benefits of interoperability. I explain how this all came to be — and what we should do about it — in my new Verso Books title, The Internet Con: How to Seize the Means of Computation.
If you’d like an essay-formatted version of this post to read or share, here’s a link to it on pluralistic.net, my surveillance-free, ad-free, tracker-free blog:
Cory Doctorow (craphound.com) is a science fiction author, activist, and blogger. He has a podcast, a newsletter, a Twitter feed, a Mastodon feed, and a Tumblr feed. He was born in Canada, became a British citizen and now lives in Burbank, California. His latest nonfiction book is The Internet Con: How To Seize the Means of Computation, a detailed policy plan for dismantling Big Tech (Verso, 2023);. His latest novel for adults is Red Team Blues. His latest short story collection is Radicalized. His latest picture book is Poesy the Monster Slayer. His latest YA novel is Pirate Cinema. His latest graphic novel is In Real Life. His forthcoming books include The Lost Cause, a utopian post-GND novel about truth and reconciliation with white nationalist militias (Tor, 2023).
|
<urn:uuid:9775517f-f479-415f-8322-19fddefdfcde>
|
CC-MAIN-2024-51
|
https://doctorow.medium.com/apple-fucked-us-on-right-to-repair-again-df4b35030480?responsesOpen=true&sortBy=REVERSE_CHRON&source=read_next_recirc-----2e160d5c57a3----3---------------------91357f51_941a_4644_8d3a_488a6cf157ca-------
|
2024-12-12T17:43:51Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066110042.43/warc/CC-MAIN-20241212155226-20241212185226-00517.warc.gz
|
by
|
4.0
|
a_tag
| false | false | null | null | null |
{
"abbr": [
"by"
],
"in_footer": [
false
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.999047 |
William Hightower's polygraph interrogation took place at the Redwood City jail on August 16, 1921 and was witnessed by Larson's assistant, Philip Edson, and District Attorney Franklin Swart. Compared to the modern polygraph, Larson's equipment was fairly primitive though it was state-of-the-art for that era. Along with a pneumograph to measure Hightower's breathing, his blood pressure, heartbeat, and skin response patterns were all carefully inscribed on drums of smoked paper to monitor any changes during questioning.
The interrogation followed what would be the classic format for polygraph sessions with three phases: an initial phase to establish a baseline for physiological responding, the second phase in which Hightower was asked commonplace questions, and then the third phase in which he was asked questions about the case point-blank. As for how the accused man responded during questioning, Larson would later state that "there were marked rises in Hightower's blood pressure accelerations and marked irregularities as well following the vital questions that were asked of him."
As soon as Larson's test results were available, the Call and Post wrote up an exclusive story on the testing under the blaring headline: "Science Indicates Hightower's Guilt." The story went on to say that:
"Science penetrated the inscrutable face of William A. Hightower today, revealed that beneath an unruffled exterior is a seething torrent of heart throbbing emotions, and that these emotions indicate strongly that he was the murderer of Father Heslin of Colma."
Boasting that "nothing could have been fairer", Hightower's physiological responses to various questions about the murder and his role in the kidnapping were regarded as absolute proof of his guilt. In the same article, Larson described his deception test as a clear improvement over the device developed by his main rival, William Moulton Marston (which he already regarded as "100 percent accurate") and Police Chief August Vollmer insisted that the test clearly demonstrated that Hightower had killed Father Heslin. Vollmer also added that Larson's device was only the beginning and that future lie detectors would make it impossible for criminals to hide their guilt.
In a later interview about what he found, Larson reported that Hightower was "covering up important facts on every crucial question that was asked." The story, which also included photographs of Hightower after he had been hooked up to Larson's machine, ran under the headline "Psychologists Called Upon to Solve Murder" as well as "Scientific Methods Now Being Used to Determine Guilt of William Hightower." According to Larson, changes in William Hightower's blood pressure and respiration when he was asked key questions not only highlighted discrepancies in his testimony but also provided "leads" that police would be able to use to investigate the case further.
Ironically, despite the enthusiasm surrounding Larson's findings, they were never used as evidence in the Hightower trial. Instead, the District Attorney chose to try the case with the evidence he already had (probably because Larson's device hadn't yet been used in court.) With Father Heslin's housekeeper positively identifying William Hightower as the man who had lured the priest away they night he disappeared and the circumstantial evidence presented so far, the prosecution rested its case. Though Hightower's defense attorney William Herron did his best to sway the jury by casting doubt on the prosecution's case, nobody had any real doubt as to the outcome.
Finally, on October 13, 1921, William Hightower was found guilty of murder. It only took 90 minutes for the jury to reach a decision though they also recommended life imprisonment rather than execution. Hightower took the verdict calmly, then turned to the lawyers and newspapermen he had been chatting with and said, "Well, boys. I guess you won't see me for some time." He was was led back to his cell in the county jail while his attorney told reporters that there would be an appeal.
In the months following Hightower's conviction, new developments began to cast doubt on whether he was actually guilty or not. As one of his defense attorneys told reporters, Hightower was a "half-wit" who was "made to serve the law's overzealous demand for a victim." The murder of two other priests in Illinois and South Dakota, under circumstances very similar to Father Heslin's murder, also led to speculations that a serial killer was at work and that Hightower had been wrongfully convicted. These crimes were never solved and, largely due to lack of public interest, Hightower's conviction was never appealed.
William Hightower would go on to serve one of the longest prison sentences in California history. He remained a model prisoner but would be denied parole twenty-six times, largely due to his repeatedly insisting that he wasn't guilty. Still, his years in San Quentin weren't completely wasted. Along with writing letters to politicians and celebrities such as Mary Pickford, he earned headlines for his attempt at writing a book called, "Sweethearts of History." He described this as a history of famous women including Cleopatra, Sappho, Mary Stuart, and Margaret Sanger and also included a series of abstract essays on women that meant as homespun philosophy. No word is given on whether he ever finished it.
Beyond that, Hightower continued to serve his sentence with little notice in the press except for a 1952 news story stating that the 74-year-old convict had been allowed to "retire" after three decades of working in San Quentin's furniture factory. At the time, he told reporters that he intended to spend his time working on his assorted homilies which he titled, "Observations from a Hightower." Soon afterward, he was transferred to a minimum security facility but he continued to fight for exoneration.
In a letter he wrote in 1961, he stated that "being put in prison may have been the best thing that ever happened to me - I bear no grudges." He also thanked the jury for not recommending he be executed since this saved him for his life's work with his writing. He added that "I have done more to make the English language richer than has been done by any other man in any other era." Of course, he then went on to describe his trial as being a sham since his attorney had failed to call any of the witnesses he requested. He also claimed that his lawyer helped the judge prevent him "from developing facts vital to my defense."
Finally, after 43 years in prison, William Hightower was paroled in 1965 and allowed to live in a halfway house in Los Angeles. Even as he was released, he continued to insist that he was innocent and that it was "impossible for me to do such a crime." The 86-year-old convict expressed little bitterness over his long years in prison but announced that, "I'm not going out running all over the world, just to have a look at it." He never had the opportunity since he died a few months later.
Ironically enough, John Augustus Larson would die that same year after a long career using his polygraph technology in hundreds of criminal investigations. His very first polygraph is now on display at the Smithsonian Institution in Washington, D. C. and the polygraph continues to be included in various lists of remarkable scientific achievements. While polygraph advocates continue to insist that it is 90 percent accurate, the polygraph continues to be controversial. A 2003 report b the National Academy of Sciences dismissed most of the research supporting polygraph evidence as "unreliable, unscientific and biased." Despite this skepticism, the polygraph continues to be used in criminal investigations though most jurisdictions do not allow polygraph evidence to be used in criminal trials.
Did John August Larson's polygraph results help convict William Hightower? While Larsons's findings weren't introduced as evidence, the newspaper coverage of Larson's testing of Hightower certainly helped convince the public that he was guilty. Which is still one of the main dangers of polygraph use today, especially in high-profile cases. Today, we can only speculate on whether Hightower's conviction represented a miscarriage of justice or not. Despite attempts by scientists such as John Larson and William Moulton Marston to develop machines for exposing lies, truth seems to be as elusive as ever.
|
<urn:uuid:a06993c8-e5e2-482f-a74c-dfa91c6c9e75>
|
CC-MAIN-2024-51
|
https://drvitelli.typepad.com/providentia/2016/04/to-tell-the-truth-part-two-of-two.html
|
2024-12-12T16:07:41Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066110042.43/warc/CC-MAIN-20241212155226-20241212185226-00517.warc.gz
|
by
|
3.0
|
a_tag
| false | false | null | null | null |
{
"abbr": [
"by",
"by",
"by"
],
"in_footer": [
false,
false,
false
],
"in_head": [
false,
false,
false
],
"location": [
"a_tag",
"a_tag",
"a_tag"
],
"version": [
"3.0",
"3.0",
"3.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.999581 |
Why TypeScript
For many of the developers, TypeScript seems like a completely new language. But to me, it is just JavaScript with added type system. In this post, I am going to discuss why we should use TypeScript over plain old JavaScript.
Type System
Let me lead the post with TypeScript's awesome typing-system. In plain
JavaScript, there are no types. Values are assigned to variables dynamically.
When I say a language is dynamic, I essentially mean that we can re-assign
variables with different data types. For example, if we a declare variable let whatever = 10
, this variable will be of type Integer
. Now in a
strongly-typed static language, we cannot reassign this variable with a
different data type, say a String
.
If a programmer has not used any statically-typed languages in the past, this additional type-system on top of JavaScript can be a bit hectic and frustrating while working on a project. But if we look at the bigger picture, we can prevent so many bugs right at the compile time by passing values of the correct type.
For example, if a function parameter type is set as String
, and we pass a value
of type Number
while invoking it, TypeScript compiler will not compile the
code. On the other hand, JavaScript will report no error at all.
Self Documenting
Since each variable in TypeScript has a type associated with it, it's very easy to read and understand that codebase. Check out the below code for example:
interface DbOpts {
host: string;
port: number;
username: string;
password: string;
database: string;
}
function connectDB(opts: DbOpts) {
return db.connect(opts);
}
In the above code snippet, if we call connectDB()
function without the correct
parameter (or even a single property, as all of the properties, are
required
), the TypeScript compiler will throw an error saying that there's a
type mismatch. Isn't that useful?
Of course, we can use JSDoc, but to be honest, JSDoc is not reliable when it comes to type-checking. The reason is, JSDoc is a documentation tool, not a compiler or type checker.
Object-Oriented Programming
TypeScript fully supports object oriented programming. Class field modifiers
are a recent addition to JavaScript. Thanks to V8 engine, we can use it in Node
without any polyfill. TypeScript had these features for a long time. It
supports class field modifiers such as private
, public
and protected
.
Autocompletion
Almost all of the popular IDE and text editors have great support for TypeScript. With TypeScript, you get better support for auto-completion of code. And most of the time, editors would highlight any type of errors before you even run the program.
Again, JSDoc can be a replacement for this. And it is what we used when TypeScript was not so popular. But both of these tools have their own tasks to accomplish.
Transpile Code
TypeScript can compile to many versions of ECMAScript. You can use all the latest features of JavaScript happily and still be stress-free about supporting the older environments.
Point to be noted here: TypeScript does not polyfill anything. It converts code
from one version of JavaScript to another. For example, if your codebase has
some code snippets that the target
version does not support, TypeScript will
convert the code so that it is compitable with the older version of ECMAScript.
const isTrue: Boolean | undefined = undefined;
const hello = isTrue ?? "not set to a boolean value";
If we choose ES3
as target, above snippet will be compiled to:
"use strict";
var isTrue = undefined;
var hello =
isTrue !== null && isTrue !== void 0 ? isTrue : "not set to a boolean value";
Conclusions
There are certainly some drawbacks of using TypeScript over JavaScript. But those drawbacks are so negligible that they don't even count.
TypeScript produces a maintainable codebase. Maybe it won't matter when the codebase is small. But in the long run, we get a codebase that could be maintained by People without losing their sanity. If someone in the team has never used a statically-typed language before, they will need some training.
|
<urn:uuid:5890566d-2f38-4af0-ae11-09a125e39662>
|
CC-MAIN-2024-51
|
https://abdus.net/posts/why-typescript
|
2024-12-13T22:35:40Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066119651.31/warc/CC-MAIN-20241213202611-20241213232611-00417.warc.gz
|
by
|
4.0
|
link_tag
| true | false | null | null | null |
{
"abbr": [
"by",
"by",
"by",
"by",
"by",
"by"
],
"in_footer": [
false,
false,
false,
false,
false,
false
],
"in_head": [
true,
true,
true,
true,
true,
true
],
"location": [
"link_tag",
"link_tag",
"link_tag",
"link_tag",
"link_tag",
"link_tag"
],
"version": [
"4.0",
"4.0",
"4.0",
"4.0",
"4.0",
"4.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.998589 |
To use these add-ons, you'll need to
download Firefox
.
Dismiss this notice
Firefox Browser Add-ons
Extensions
Themes
More…
for Firefox
Dictionaries & Language Packs
Other Browser Sites
Add-ons for Android
Log in
Search
Search
Reviews for Bonjourr · Minimalist and lightweight startpage
Bonjourr · Minimalist and lightweight startpage
by
Victor Azevedo
,
Tahoe
Rated 4.9 out of 5
4.9 Stars out of 5
5
970
4
91
3
8
2
0
1
4
Review by Rivide
Rated 5 out of 5
by Rivide,
2 months ago
Show all reviews
Show only five-star reviews
Show only four-star reviews
Show only three-star reviews
Show only two-star reviews
Show only one-star reviews
|
<urn:uuid:e914ce3d-3fc6-408e-b36c-518791a21285>
|
CC-MAIN-2024-51
|
https://addons.mozilla.org/en-US/firefox/addon/bonjourr-startpage/reviews/2127794/?utm_content=search&utm_medium=referral&utm_source=addons.mozilla.org
|
2024-12-13T23:07:55Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066119651.31/warc/CC-MAIN-20241213202611-20241213232611-00417.warc.gz
|
by-sa
|
3.0
|
a_tag
| false | true | null | null | null |
{
"abbr": [
"by-sa"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"3.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.980672 |
Skip to main content
CAST
AEM Pilot
Toggle navigation
Home
Manual
Login
(current)
FAQ
Log in to the AEM Pilot
Email address:
Password:
Forgot your password?
Reset password
No account?
Register
Top of Page
|
<urn:uuid:75414e91-c03a-4602-b411-495bebe85540>
|
CC-MAIN-2024-51
|
https://aem-pilot.cast.org/login;jsessionid=FE3E021CCEA49A471A8F20A5CA0B5793
|
2024-12-13T22:01:10Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066119651.31/warc/CC-MAIN-20241213202611-20241213232611-00417.warc.gz
|
by-sa
|
4.0
|
a_tag
| false | true | null | null | null |
{
"abbr": [
"by-sa"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.924441 |
Spreadsheet (The file contains the complete information on the RIRs mapped by Una.Resin in the field of Cultural Heritage)
Repository staff only License: Without prejudice to other rights expressly allowed by the copyright holders, this research contribution can be read, saved and printed for research, teaching and private study. Any other noncommercial and commercial uses are forbidden without the written permission of the copyright holders. Download (381kB) | Request a copy |
Spreadsheet (The file contains the list of RIRs mapped by Una.Resin in the filed of Cultural Heritage: name, short description, URL, keywords)
License: Creative Commons: Attribution 4.0 (CC BY 4.0) Download (73kB) |
Text(odt) (The file contains the Concept Note defining the thematic scope of the pilot exercise for mapping RIRs in the field of Cultural Heritage)
License: Creative Commons: Attribution 4.0 (CC BY 4.0) Download (26kB) |
Text(odt) (The file contains the questionnaire template for providing detailed information on each mapped RIR in the field of Cultural Heritage)
License: Creative Commons: Attribution 4.0 (CC BY 4.0) Download (53kB) |
Text(odt) (README file of the dataset “Una.Resin, WP2, T2.2: Thematic mapping of Research Infrastructures and Resources in the field of Cultural heritage”)
License: Creative Commons: Attribution 4.0 (CC BY 4.0) Download (28kB) |
Abstract
The dataset is related to the Horizon 2020 Una.Resin project Work Package 2 mapping exercise (Task 2.2) on Research Infrastructures and Resources (RIRs). This task, carried out from July to October 2021, intended to map RIRs with the aim of providing a landscape analysis of the RIRs available within the Una Europa universities in the field of Cultural Heritage, for analyzing specific barriers and enablers to sharing RIRs across the alliance and for exploring opportunities for collaboration. Building on the Focus Area of Cultural Heritage and linking to the Focus Areas of European Studies and Data Science & AI, the scope of the thematic questionnaire was defined under the thematic challenge “Exploring cultural heritage to strengthen inclusion and participative communities”. A Concept Note, that was developed in collaboration with the Self-Steering Committee Cultural Heritage, defined the main orientations of the questionnaire, thus providing a clear thematic framework for the identification of the RIRs. Each institution was invited to identify the most important and promising RIRs and provide a maximum of 30 questionnaires. The total number of the RIRs mapped in the field of Cultural Heritage was 113. The target audience consisted of researchers and experts working in the field of the thematic challenge on Cultural Heritage, as defined in the Concept Note, with affinity to RIRs. The members of the Research Infrastructure Cluster acted as institutional contacts of the eight Una Europa universities participating in the Una.Resin project University of Edinburgh (UEDIN), University of Helsinki (UH), University of Bologna (UNIBO), Complutense University of Madrid (UCM), Freie Universität Berlin (FUB), Katholieke Universiteit Leuven (KU Leuven), Jagiellonian University (JU), Université Paris 1 Panthéon-Sorbonne (UP1). They were invited to identify the RIRs and consult the target audience with a methodology that could guarantee the quality of the collected data.
|
<urn:uuid:81ee35f2-4912-4e4e-8c11-1eb19aec37c8>
|
CC-MAIN-2024-51
|
https://amsacta.unibo.it/id/eprint/7568/
|
2024-12-13T21:55:59Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066119651.31/warc/CC-MAIN-20241213202611-20241213232611-00417.warc.gz
|
by
|
4.0
|
a_tag
| false | false | null | null | null |
{
"abbr": [
"by",
"by",
"by",
"by"
],
"in_footer": [
false,
false,
false,
false
],
"in_head": [
false,
false,
false,
false
],
"location": [
"a_tag",
"a_tag",
"a_tag",
"a_tag"
],
"version": [
"4.0",
"4.0",
"4.0",
"4.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.956293 |
First time here? Check out the FAQ!
Sign in
English
tags
users
badges
ALL
UNANSWERED
Ask Your Question
Give us your feedback!
Dear Visitor
, we look forward to hearing your feedback. Please type and send us your message below.
Your name (optional):
Email:
I don't want to give my email or receive a response:
Please note: Askbot requires javascript to work properly, please enable javascript in your browser,
here is how
|
<urn:uuid:cf80e55d-bece-4555-b120-80a27c9f1088>
|
CC-MAIN-2024-51
|
https://askbot.org/en/feedback/?next=eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJuZXh0X3VybCI6Ii9lbi9xdWVzdGlvbnMvc2NvcGU6YWxsL3NvcnQ6YWN0aXZpdHktZGVzYy90YWdzOmxpdmUtc2V0dGluZ3MvcGFnZToxLyJ9.qIrVF35FRRg4GVPLBhZzwmAg95jvJIiFnCnTng_OGYw
|
2024-12-13T20:56:36Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066119651.31/warc/CC-MAIN-20241213202611-20241213232611-00417.warc.gz
|
by-sa
|
3.0
|
a_tag
| false | true | null | null | null |
{
"abbr": [
"by-sa"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"3.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.99709 |
It is quite possible that a paper claiming that empirical data confirm autism symptoms are related to Aluminum and Acetaminophen exposure, and possibly to the MMR vaccine, could put the research standing and careers of the authors in jeopardy. The paper in the journal Entropy is tantamount to treason in some health circles and could invite serious retribution from those who have elevated vaccines to a level beyond criticism.
The researchers, to my great surprise, did not try to sugar coat their findings in Empirical Data Confirm Autism Symptoms Related toAluminum and Acetaminophen Exposure, published in Entropy, November 7, 2012:
Abstract: Autism is a condition characterized by impaired cognitive and social skills, associated with compromised immune function. The incidence is alarmingly on the rise, and environmental factors are increasingly suspected to play a role. This paper investigates word frequency patterns in the U.S. CDC Vaccine Adverse Events Reporting System (VAERS) database. Our results provide strong evidence supporting a link between autism and the aluminum in vaccines. A literature review showing toxicity of aluminum in human physiology offers further support. Mentions of autism in VAERS increased steadily at the end of the last century, during a period when mercury was being phased out, while aluminum adjuvant burden was being increased. Using standard log-likelihood ratio techniques, we identify several signs and symptoms that are significantly more prevalent in vaccine reports after 2000, including cellulitis, seizure, depression, fatigue, pain and death, which are also significantly associated with aluminum-containing vaccines. We propose that children with the autism diagnosis are especially vulnerable to toxic metals such as aluminum and mercury due to insufficient serum sulfate and glutathione. A strong correlation between autism and the MMR (Measles, Mumps, Rubella) vaccine is also observed, which may be partially explained via an increased sensitivity to acetaminophen administered to control fever.
.......................................................................................................................
6. Conclusion
In this paper, we have presented some analyses of the VAERS database which strongly suggest that the aluminum in vaccines is toxic to vulnerable children. While we have not shown that aluminum is directly causative in autism, the compelling evidence available from the literature on the toxicity of aluminum, combined with the evidence we present for severe adverse reactions occurring much more frequently following administration of aluminum-containing vaccines as compared to non-aluminumcontaining vaccines, suggests that neuronal damage due to aluminum penetration into the nervous system may be a significant factor in autism. The fact that mentions of autism rose steadily concomitant with significant increases in the aluminum burden in vaccines, is highly suggestive. However, it is possible that other factors, such as more aggressive reporting or simultaneous increases in other environmental toxins, e.g., herbicides or pesticides, or aluminum in other products such as antiperspirants and antacids, may have contributed to these observed increases. We also observed a strong correlation between the MMR vaccine and autism, which we suggest could be explained by the effects of acetaminophen.
In this paper, we have presented some analyses of the VAERS database which strongly suggest that the aluminum in vaccines is toxic to vulnerable children. While we have not shown that aluminum is directly causative in autism, the compelling evidence available from the literature on the toxicity of aluminum, combined with the evidence we present for severe adverse reactions occurring much more frequently following administration of aluminum-containing vaccines as compared to non-aluminumcontaining vaccines, suggests that neuronal damage due to aluminum penetration into the nervous system may be a significant factor in autism. The fact that mentions of autism rose steadily concomitant with significant increases in the aluminum burden in vaccines, is highly suggestive. However, it is possible that other factors, such as more aggressive reporting or simultaneous increases in other environmental toxins, e.g., herbicides or pesticides, or aluminum in other products such as antiperspirants and antacids, may have contributed to these observed increases. We also observed a strong correlation between the MMR vaccine and autism, which we suggest could be explained by the effects of acetaminophen.
We have proposed elsewhere that an impairment in cholesterol sulfate synthesis in the skin and in
the vasculature may be causative in autism, and we argue here that vaccines can act synergistically
with this impairment in the vulnerable child. We propose that simple corrective measures such as
increased sunlight exposure and decreased use of sunscreen may help protect a child from a severe reaction to aluminum-containing vaccines, but we also feel that the vaccine industry should find a way
to reduce or even eliminate the aluminum content in vaccines.
As might be expected Dr. David H. Gorski, writing under the handle Orac has already spewed some venom on one of the authors of the study in his blog commentary of November 20, 2012, Stephanie Seneff: Following the Geiers dumpster-diving in the VAERS database. I am not sure why Gorski engages in the childish, self inflating style that he does. There is no question he has a loyal following but I doubt very much that he is persuading parents or others with vaccine concerns to abandon those concerns and vaccinate themselves and their children. I suspect his venomous hostility is actually counter productive.
I have received the usual recommended vaccines and so have both of my sons. I have never suspected vaccines as contributing factors to my younger son's severe autistic disorder and profound developmental delays although I have not closed my mind on the possibility either should further research demonstrate such a connection. I believe that more research is needed to persuade those with concerns and, if connections are shown, to recommend study and changes to eliminate those possible connections.
What I don't recommend is the strategy of attacking vaccine safety skeptics and expecting the attacks to change their minds. That approach simply has not worked. A much better scientist than David Gorski, a gentleman named Albert Einstein, characterized "doing the same thing over and over again and expecting different results" as a form of insanity. I don't expect Orac to change his approach. Nor do I expect the results of his attacks to yield different results. What would be helpful is to have the Seneff study findings properly rebutted or, if confirmed, the problems they point to addressed.
As might be expected Dr. David H. Gorski, writing under the handle Orac has already spewed some venom on one of the authors of the study in his blog commentary of November 20, 2012, Stephanie Seneff: Following the Geiers dumpster-diving in the VAERS database. I am not sure why Gorski engages in the childish, self inflating style that he does. There is no question he has a loyal following but I doubt very much that he is persuading parents or others with vaccine concerns to abandon those concerns and vaccinate themselves and their children. I suspect his venomous hostility is actually counter productive.
I have received the usual recommended vaccines and so have both of my sons. I have never suspected vaccines as contributing factors to my younger son's severe autistic disorder and profound developmental delays although I have not closed my mind on the possibility either should further research demonstrate such a connection. I believe that more research is needed to persuade those with concerns and, if connections are shown, to recommend study and changes to eliminate those possible connections.
What I don't recommend is the strategy of attacking vaccine safety skeptics and expecting the attacks to change their minds. That approach simply has not worked. A much better scientist than David Gorski, a gentleman named Albert Einstein, characterized "doing the same thing over and over again and expecting different results" as a form of insanity. I don't expect Orac to change his approach. Nor do I expect the results of his attacks to yield different results. What would be helpful is to have the Seneff study findings properly rebutted or, if confirmed, the problems they point to addressed.
|
<urn:uuid:8858cf7a-dfbc-41b6-be4d-d4c832792208>
|
CC-MAIN-2024-51
|
https://autisminnb.blogspot.com/2012/11/
|
2024-12-13T21:18:16Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066119651.31/warc/CC-MAIN-20241213202611-20241213232611-00417.warc.gz
|
by-sa
|
2.5
|
a_tag
| false | false | null | null | null |
{
"abbr": [
"by-sa",
"by-sa"
],
"in_footer": [
false,
false
],
"in_head": [
false,
false
],
"location": [
"a_tag",
"a_tag"
],
"version": [
"2.5",
"2.5"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.998929 |
A program allowing CalFresh benefits to be used at farmer's markets may end up on the cutting room floor.
CalFresh beneficiaries may soon no longer be able to use their EBT cards at their local farmers' market. Germsteel / Wikimedia Commons C.C. 4.0 Attribution-Share Alike License
BY
Every Thursday at the Fairfield Farmers’ Market, many customers don’t pay for their fruits and vegetables with cash, credit card or Apple Pay. Instead, they go to the information booth, swipe their CalFresh EBT card and receive paper vouchers to spend on produce.
Under Market Match, California food aid recipients get as much as $10 in matching money — meaning they have at least $20 to spend every week at their local farmers’ market.
“We already spend $200 on meat and cheese at Costco,” said Mitzi Castillo, who lives in Fairfield with two young daughters. “If I didn’t have Market Match, they would have to wait ’til next week to eat fruits and veggies when my husband gets paid.”
Castillo buys cherries, strawberries and blueberries from one of the many farmers who also reap benefits from the program, which brings customers and more cash to more than 270 farmers’ markets across the state.
“For me, I get more money, and for the people who use it, they can feed their family more,” said Salvador Navarro, a farmer from Stockton who said he makes as much as $300 from Market Match at the Fairfield Farmers’ Market, more than enough to cover the cost of his stall.
Together with his stalls across the Bay Area, Navarro says he makes $50,000, or a fourth of his income every season, from CalFresh customers and Market Match.
Market Match is the largest funding beneficiary of the California Nutrition Incentive Program, which is run by the California Department of Food and Agriculture. In 2022, the program provided about 38 million servings of fruits and vegetables to CalFresh participants, accounting for $19.5 million in CalFresh and Market Match spending at farmers’ markets across the state.
However, like many initiatives, the fates of Market Match and other healthy food and nutrition programs are in flux as legislative leaders and Gov. Gavin Newsom negotiate the final state budget while tackling a $31.5 billion deficit.
Although the plan that legislative Democrats pushed through on Thursday includes $35 million for the incentive program, advocates, CalFresh recipients and farmers worry that the money won’t be in the final budget.
“What we’re doing now is trying to get the ear of the governor,” said Minni Forman, the director of Market Match, which also includes community groups coordinated by the nonprofit Ecology Center. If the program is not funded in the final budget, Forman says the program will return to fundraising in the philanthropic world, which could mean a major reduction and even the end to Market Match.
Market Match is the largest funding beneficiary of the California Nutrition Incentive Program. In 2022, the program provided about 38 million servings of fruits and vegetables to CalFresh participants.
“I’m worried, and I’m fighting as hard as they are to make sure that it is (part of the final budget),” Assembly Budget Committee Chairperson Phil Ting told CalMatters.
Ting declined to comment on the status of ongoing negotiations between legislative leaders and the Newsom administration, as did Senate Budget Chairperson Nancy Skinner, an Oakland Democrat.
Sen. Melissa Hurtado, a Bakersfield Democrat, emphasized the importance of the $35 million for the nutrition incentive program, calling it a “priority” and highlighting her bill to make it official state policy for everyone to have access to enough healthy food.
Keeping Market Match funded is also a priority for farmers across California promoting the #FundCNIP campaign. They include Jeff Nielsen, an organic avocado farmer who manages Cambria Farmers Market and three other markets. He says that because of the program, people who don’t traditionally go to farmers’ markets find foods they like and keep coming back.
“They’ll get $10, $20, even $30 (in produce) from the market, which is a really big win,” said Nielsen. “For every local that comes every week, it supports them, the farmers, and the community.”
The worries about the possible demise of Market Match and other healthy food incentive programs are growing amid broader concerns that California faces a “catastrophic hunger crisis” as pandemic-era extra CalFresh benefits come to an end. Even with those additional benefits, 20% of Californians experienced food insecurity in 2021. This year, the number is expected to rise rapidly.
Last week, U.S. Health and Human Services Secretary Xavier Becerra visited Sacramento to address food insecurity and nutrition inequities.
“I know the governor has been moving in ways to try to address those social needs, including food insecurity for so many Californians,” Becerra, a former state attorney general and member of Congress, said at a press conference. “I don’t believe that my state, which I’m very proud of, is going to abandon the effort to try to keep people moving in the right direction, and that of course, has to include healthy foods.”
Where Food Aid Stands in Budget
So far, the Legislature has approved the governor’s more modest anti-hunger proposals, including the creation of a summer program for eligible households to receive $40 per monthin food assistance benefits for each child, a substantial drop from the $125 per month for each child that families received last summer. Lawmakers have also approved the expansion of California’s food assistance program for undocumented immigrants 55 and older, beginning in late 2025.
Overall, the governor’s May budget proposal included a total of $2.7 billion in state and federal funding for anti-hunger programs. However, the Legislature’s budget includes a variety of food benefits that the governor did not include:
The original proposal to increase the minimum CalFresh benefit from $23 to $50 per month statewide was estimated to cost $95 million. However, the Legislature’s budget deal includes only $30 million, enough for a pilot program in some counties. As budget negotiations continue, there is some doubt that even the reduced $30 million will make it.
“I recognize with the budget deficit that it’s going to be hard to include,” Sen. Caroline Menjivar, a Van Nuys Democrat who authored the minimum benefit bill, told CalMatters in a recent interview. “But the impact is so big, should this pass and get funding.”
While Market Match focuses on farmers markets and uses vouchers and tokens, the California Fruit & Vegetable EBT Pilot Project borrows a model pioneered by Massachusetts to promote nutritious shopping at grocery stores.
Worries about the possible demise of Market Match are growing amid broader concerns that California faces a “catastrophic hunger crisis” as pandemic-era extra CalFresh benefits come to an end.
Eli Zigas, the food and agriculture policy director at SPUR, a nonprofit policy research institute, says that CalFresh recipients predominantly shop at big-box stores and supermarkets. The test program allows recipients to get money rebated directly back on their EBT cards after buying fruits and vegetables at authorized grocery stores.
The pilot plans to have more than 80 locations running by the end of the summer, but Zigas worries that the final budget may delay efforts to make the program statewide and permanent. Last year, when the state had a record budget surplus, the program received $120 million. This year, supporters asked for $94 million over two years, but received $9.9 million in the Legislature’s budget.
Back at the Fairfield Farmers’ Market last week, 82-year-old Gurdial Singh walked from stand to stand, using his Market Match vouchers to buy vegetables. “My wife and I will cook dinner together tonight with the zucchini, eggplant and cucumbers,” he said. “We enjoy this program very much as senior citizens.”
Luis Nava, a market manager with the Pacific Coast Farmers’ Market Association who staffs the Fairfield Farmers’ Market, said he wants to send a message to the governor:
“We need this program to help low-income families, and if it goes away, it will take away food from our kids’ tables. We need it. We really, really need it.”
The article titled "How fresh will CalFresh be? Food benefits on the table in state budget talks" appeared first at CalMatters here: https://calmatters.org/politics/2023/06/california-food-benefits/
CalMatters is a nonprofit, nonpartisan media venture explaining California policies and politics.
|
<urn:uuid:3d4ee4ae-3b41-4234-ac86-16d901ee94d1>
|
CC-MAIN-2024-51
|
https://californialocal.com/localnews/statewide/ca/article/show/42538-how-fresh-will-calfresh-be-food-benefits-on-the-table-in-state-budget-talks/
|
2024-12-13T21:06:12Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066119651.31/warc/CC-MAIN-20241213202611-20241213232611-00417.warc.gz
|
by-sa
|
4.0
|
a_tag
| false | false | null | null | null |
{
"abbr": [
"by-sa"
],
"in_footer": [
false
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.998873 |
April 29, 2020 Arts & Culture/Health Do You Recognize Toronto? Capturing how COVID-19 has Changed Canada’s Biggest City Toronto photojournalist Shan Qiao goes around the country's largest city to document how Canadians are adapting to a lockdown due to the
|
<urn:uuid:74a8989e-13c2-4b2b-a024-c69d197911ca>
|
CC-MAIN-2024-51
|
https://www.newcanadianmedia.ca/tag/shoppers-drug-mart/
|
2024-12-13T20:53:24Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066119651.31/warc/CC-MAIN-20241213202611-20241213232611-00417.warc.gz
|
by
|
4.0
|
a_tag
| false | false | null | null | null |
{
"abbr": [
"by",
"by"
],
"in_footer": [
false,
false
],
"in_head": [
false,
false
],
"location": [
"a_tag",
"a_tag"
],
"version": [
"4.0",
"4.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.992916 |
Hypoxia is one of the most common pathological conditions which results from ischemic injury, trauma, inflammatory conditions, tumors, The adaptation of the body to hypoxia is a phenomenon that is of great importance both in normal conditions and in Most of the cellular response’ reactions to hypoxia is associated with a family of transcription factors called hypoxia-inducible factors (HIF). They induce the expression of a wide range of genes that help cells adapt to a hypoxic HIF functions are currently being extensively studied. In 2019, William G. Kaelin and Gregg Semenza from the USA and Sir Peter J. Ratcliffe from the UK received the Nobel Prize in Physiology or Medicine for the discovery of the basic mechanisms of adaptation to hypoxia and investigation of the role of HIF factor in the regulation of the hormone erythropoietin Based on its pivotal physiological importance, the HIF factor attracts more and more attention as a new potential target for treating a large number of diseases associated with Most of the experimental work dealing with the HIF factor is focused on its role in liver and However, increasing amount of experimental results clearly demonstrates that the HIF factor-based response represents an universal adaptation mechanism for all kinds of tissues, including the nervous system where HIF is critical for regulating neurogenesis, nerve cell differentiation, and neuronal This review provides actual overview about the complex role of HIF-1 in the adaptation of nerve cells to hypoxia with the focus on its potential role by various neuronal
Keywords:
Subject: Biology and Life Sciences - Anatomy and Physiology
Copyright: This open access article is published under a Creative Commons CC BY 4.0 license, which permit the free download, distribution, and reuse, provided that the author and preprint are cited in any reuse.
Preprints.org is a free preprint server supported by MDPI in Basel, Switzerland.
|
<urn:uuid:9ce34b29-878b-4cb1-8f89-cba12ec7c0cc>
|
CC-MAIN-2024-51
|
https://www.preprints.org/manuscript/202102.0624/v1
|
2024-12-13T22:18:35Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066119651.31/warc/CC-MAIN-20241213202611-20241213232611-00417.warc.gz
|
by
|
4.0
|
a_tag
| false | false | null | null | null |
{
"abbr": [
"by"
],
"in_footer": [
false
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.994338 |
National Taiwan University, Ministry of Health, Ghana Health Services, Taiwan, E-mail: [email protected]
Visit for more related articles at Research & Reviews: Journal of Pharmacology and Toxicological Studies
Pharma Conferences team cordially invites participants from all over the world to attend Global Pharma Summit and Expo in Shanghai, China during July 29-31. This Pharmaceutics Conference includes a wide range of Keynote presentations, Oral talks, Poster presentations, Symposia, Workshops, Exhibitions and Career development programs.
Pharma summit 2020 covers various aspects of Bio-Pharmaceutics, Pharmaceutical Chemistry, Drug Targeting and Design, Pharmacokinetics and Pharmacodynamics in Drugs, Pharmaceutical Formulation, Pharmaceutical Manufacturing, Pharmaceutical Nanotechnology, Novel Drug Delivery Systems, Smart Drug Delivery Systems Biomedical Applications, Biomaterials in Drug Delivery, Vaccine Drug Delivery Systems, Medical Devices for Drug Delivery, Biologics & Biosimilars, Pharmaceutical Analysis, Pharmaceutical Process Validation, Pharmaceutical Packaging, Clinical Trials and Clinical Research, Pharmacokinetics and Genomics, Regulatory Affairs and Intellectual Property Rights, Industrial and Physical Pharmacy, Clinical and Hospital Pharmacy, Pharmacovigilance and Drug Safety, Pharmacy Education and Practice.
Important Tracks/ Research Areas to be Focused
• 200+ Participation (70% Industry: 30% Academia)
• 9+ Keynote Speakers
• 30+ Plenary Speakers
• 3+ Exhibitors
• 14 Innovative Educational Sessions
• B2B Meetings
Why you should attend?
• Access to senior-level executives from leading international pharmaceutical & biotechnology companies
• Exposure to new and exciting companies ready for partnerships and licensing opportunities in the U.S., Europe and Asia
• Tremendous networking opportunities to meet numerous U.S., European, Japanese and Asian biotech and pharmaceutical companies in one place at one time
• Use of state-of-the-art partnering technology
• Targeted partner selections through proprietary screening process
• Get to the heart of why formulation and delivery strategies fail. Dissect the challenges before looking for concrete solutions.
• Discover how advances in the sector are impacting both large and small molecule drugs.
• Explore tried and tested routes to improve bioavailability.
• Understand how to develop the right formulation and delivery strategy with a strong scientific, clinical and commercial mind set.
• Discover the latest innovations in devices.
• Be inspired by innovative case studies and realize the potential impact on your formulation or delivery processes.
• Engage in the exciting event format, with round tables, panels, showcases, speed networking and multiple conference tracks.
• Share experiences, insights and strategies in interactive peer to peer round tables.
• Hear more perspectives in one place – from large medium and small organizations from pharma, biotech and academia.
• Discover how scientific formulation advancements are being implemented in practice.
Major Aspects
Pharmaceutical Journals
Journal of Pharmaceutical Sciences | International Journal of Pharmaceutics | The Pharmaceutical Journal | Pharmaceutical Research | European Journal of Pharmaceutics and Biopharmaceutics | Molecular Pharmaceutics | European Journal of Pharmaceutical Sciences | Asian Journal of Pharmaceutics | Journal of Pharmacy and Pharmacology | Indian Journal of Pharmaceutical Sciences | Journal of Pharmacy and Pharmaceutical Sciences | Drug Development and Industrial Pharmacy | Journal of Pharmacy Practice | American Journal of Pharmaceutical Education | International Journal of Drug Development & Research | Journal of Bioequivalence & Bioavailability | Journal of Bioanalysis & Biomedicine | Journal of Pharmacogenomics & Pharmacoproteomic | Journal of Vaccines & Vaccination | Journal of Drug Metabolism & Toxicology | Drug Designing: Open Access | Medicinal & Aromatic Plants | Journal of Biomolecular Research & Therapeutics | Research & Reviews in Pharmacy and Pharmaceutical Sciences | Journal of Molecular Pharmaceutics & Organic Process Research | Journal of Developing Drugs | Journal of Pharmaceutics & Drug Delivery Research | Molecular Enzymology and Drug Targets | Research & Reviews: Journal of Pharmaceutics and Nanotechnology | Journal of Pharmacokinetics & Experimental Therapeutics.
Contact Details:
Katherine Gracia
Conference manager| Global Pharma summit 2020
|
<urn:uuid:ab47350c-6443-43dc-b6c9-696b7df57506>
|
CC-MAIN-2024-51
|
https://www.rroij.com/open-access/conference-announcement-global-pharma-summit-and-expo.php?aid=87877
|
2024-12-13T21:20:25Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066119651.31/warc/CC-MAIN-20241213202611-20241213232611-00417.warc.gz
|
by
|
4.0
|
a_tag
| false | true | null | null | null |
{
"abbr": [
"by"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.880314 |
Google launched the ability to use regular expressions to do advanced filtering in Google Search Console in April. But what was not supported was the ability to use regular expressions to exclude patterns in your filters. Google added support for negative matching using regular expressions in the performance reports yesterday.
Google said "the Performance report filter supports both matching and not matching regex filters." You can access this within the Google Search Console performance report filters through a secondary dropdown, which appears after picking the "Custom (regex)" option in the filter selector. Here is a screenshot:
This is funny because the other day, Kaitlin McMichael, an SEO manager at Amazon Web Services, asked John Mueller and Daniel Waisberg from Google if Google can add this feature. She said on Twitter "Anyone good at RegEx and figured out a way to express exclusions for Queries in Google Search Console's Performance report? I'd like to be able to exclude some queries via RegEx but it looks like Google Search Console's documentation for RegEx filtering does not support lookahead."
Anyone good at RegEx and figured out a way to express exclusions for Queries in Google Search Console's Performance report? I'd like to be able to exclude some queries via RegEx but it looks like Google Search Console's documentation for RegEx filtering does not support lookahead
— Kaitlin McMichael (@Kakefin) June 1, 2021
Then Daniel Waisberg, a Google Search Advocate with the Google Search Console team said "maybe we can do that." Of course, John Mueller of Google, same team, said maybe not to make promises...
I'd avoid making promises, these things can take a surprisingly long time to implement sometimes...
— 🍌 John 🍌 (@JohnMu) June 2, 2021
I guess this was slated for launch really soon, so the promise was easy to keep.
|
<urn:uuid:669becc1-5baf-4040-865e-22b0dd484542>
|
CC-MAIN-2024-51
|
https://www.seroundtable.com/google-search-console-regular-expressions-exclusions-31526.html
|
2024-12-13T20:49:16Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066119651.31/warc/CC-MAIN-20241213202611-20241213232611-00417.warc.gz
|
by
|
3.0
|
a_tag
| false | true | null | null | null |
{
"abbr": [
"by"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"3.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.998895 |
Bangladesh Clashes Kill 12 As Protesters Push for PM to Resign
TEHRAN (Tasnim) – At least a dozen people were killed and dozens more injured in clashes in Bangladesh on Sunday, as police fired tear gas and lobbed stun grenades to disperse tens of thousands of protesters calling for Prime Minister Sheikh Hasina to resign.
The unrest, which spurred the government to shut down internet services, is its biggest test since deadly protests when Hasina won a fourth straight term in January elections boycotted by the main opposition Bangladesh Nationalist Party, Reuters reported.
Critics of Hasina, along with human rights groups, have accused her government of using excessive force to stamp out the movement, a charge she and her ministers deny.
Demonstrators blocked major highways on Sunday as student protesters launched a non-cooperation program to press for the government's resignation, and violence spread nationwide.
"Those who are protesting on the streets right now are not students, but terrorists who are out to destabilize the nation," Hasina said after a national security panel meeting.
"I appeal to our countrymen to suppress these terrorists with a strong hand."
Two construction workers were killed on their way to work and 30 injured in the central district of Munsiganj, during a three-way clash of protesters, police and ruling party activists, witnesses said.
"They were brought dead to the hospital with bullet wounds," said Abu Hena Mohammad Jamal, the superintendent of the district hospital.
Police said they had not fired any bullets, however, when some improvised explosives were detonated and the area turned into a battleground.
In the northeastern district of Pabna, at least three people were killed and 50 injured during a clash between protesters and activists of Hasina's ruling Awami League, witnesses said.
Two more were killed in violence in the northern district of Bogura, and five were killed in four other districts, hospital officials said.
"An attack on a hospital is unacceptable," said Health Minister Samanta Lal Sen after a group vandalized a medical college hospital in Dhaka, the capital. "Everyone should refrain from this."
For a the second time during the recent protests, the government shut down high-speed internet services, mobile operators said, while social media platforms Facebook and WhatsApp were not available, even via broadband connections.
Last month, at least 150 people were killed, thousands injured and about 10,000 arrested in violence touched off by demonstrations led by student groups protesting against quotas for government jobs.
The protests paused after the Supreme Court scrapped most quotas, but students returned to the streets in sporadic protests last week, demanding justice for the families of those killed.
|
<urn:uuid:2b8b1fbd-fb35-44fb-b1b2-51d6cd6cf1ff>
|
CC-MAIN-2024-51
|
https://www.tasnimnews.com/en/news/2024/08/04/3133958/bangladesh-clashes-kill-12-as-protesters-push-for-pm-to-resign
|
2024-12-13T22:34:28Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066119651.31/warc/CC-MAIN-20241213202611-20241213232611-00417.warc.gz
|
by
|
4.0
|
a_tag
| false | true | null | null | null |
{
"abbr": [
"by",
"by"
],
"in_footer": [
true,
true
],
"in_head": [
false,
false
],
"location": [
"a_tag",
"a_tag"
],
"version": [
"4.0",
"4.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.999752 |
While Riak enables you to take advantage of a wide variety of features that can be useful in application development, such as Search, secondary indexes (2i), and Riak Data Types, Riak almost always performs best when you build your application around basic CRUD operations (create, read, update, and delete) on objects, i.e. when you use Riak as a “pure” key/value store.
In this tutorial, we’ll suggest some strategies for naming and modeling for key/value object interactions with Riak. If you’d like to use some of Riak’s other features, we recommend checking out the documentation for each of them or consulting our guide to building applications with Riak for a better sense of which features you might need.
Advantages of Key/Value Operations
Riak’s key/value architecture enables it to be more performant than relational databases in many scenarios because Riak doesn’t need to perform lock, join, union, or other operations when working with objects. Instead, it interacts with objects on a one-by-one basis, using primary key lookups.
Primary key lookups store and fetch objects in Riak on the basis of three basic locators:
- The object’s key, which can be anything you want as long as it is Unicode compliant
- The bucket which houses the object and its key (bucket names are also Unicode compliant)
- The bucket type that determines the bucket’s replication and other properties
It may be useful to think of this system as analogous to a nested
key/value hash as you
would find in most programming languages. Below is an example from
Ruby. The hash
simpsons
contains keys for all of the available seasons, while each
key houses a hash for each episode of that season:
simpsons = {
'season 1': {
{ 'episode 1': 'Simpsons Roasting on an Open Fire' },
{ 'episode 2': 'Bart the Genius' },
# ...
},
'season 2': {
{ 'episode 1': 'Bart Gets an "F"' },
# ...
},
# ...
}
If we want to find out the title of an episode, we can retrieve it based on hash keys:
simpsons['season 4']['episode 12']
# => "Marge vs. the Monorail"
Storing data in Riak is a lot like this. Let’s say that we want to store JSON objects with a variety of information about every episode of the Simpsons. We could store each season in its own bucket and each episode in its own key within that bucket. Here’s what the URL structure would look like (for the HTTP API):
GET/PUT/DELETE /bucket/<season>/keys/<episode number>
The most important benefit of sorting Riak objects this way is that these types of lookup operations are extremely fast. Riak doesn’t need to search through columns or tables to find an object. If it knows the bucket/key “address” of the object, so to speak, it can locate that object just about as quickly with billions of objects in a cluster as when the cluster holds only a handful of objects.
Overcoming the Limitations of Key/Value Operations
Using any key/value store can be tricky at first, especially if you’re
used to relational databases. The central difficulty is that your
application cannot run arbitrary selection queries like SELECT * FROM
table
, and so it needs to know where to look for objects in advance.
One of the best ways to enable applications to discover objects in Riak more easily is to provide structured bucket and key names for objects. This approach often involves wrapping information about the object in the object’s location data itself.
Here are some example sources for bucket or key names:
- Timestamps, e.g.
2013-11-05T08:15:30-05:00
- UUIDs,
e.g.
9b1899b5-eb8c-47e4-83c9-2c62f0300596
- Geographical coordinates, e.g.
40.172N-21.273E
We could use these markers by themselves or in combination with other
markers. For example, sensor data keys could be prefaced by sensor_
or
temp_sensor1_
followed by a timestamp (e.g.
sensor1_2013-11-05T08:15:30-05:00
), or user data keys could be
prefaced with user_
followed by a UUID (e.g.
user_9b1899b5-eb8c-47e4-83c9-2c62f0300596
).
Any of the above suggestions could apply to bucket names as well as key
names. If you were building Twitter using Riak, for example, you could
store tweets from each user in a different bucket and then construct key
names using a combination of the prefix tweet_
and then a timestamp.
In that case, all the tweets from the user BashoWhisperer123 could be
housed in a bucket named BashoWhisperer123
, and keys for tweets would
look like tweet_<timestamp>
.
The possibilities are essentially endless and, as always, defined by the use case at hand.
Object Discovery with Riak Sets
Let’s say that we’ve created a solid bucket/key naming scheme for a user
information store that enables your application to easily fetch user
records, which are all stored in the bucket users
with each user’s
username acting as the key. The problem at this point is this: how can
Riak know which user records actually exist?
One way to determine this is to list all keys in the
bucket users
. This approach, however, is not recommended, because
listing all keys in a bucket is a very expensive operation that should
not be used in production. And so another strategy must be employed.
A better possibility is to use Riak sets to store lists of keys in a bucket. Riak sets are a Riak Data Type that enable you to store lists of binaries or strings in Riak. Unlike normal Riak objects, you can interact with Riak sets much like you interact with sets in most programming languages, i.e. you can add and remove elements at will.
Going back to our user data example, instead of simply storing user
records in our users
bucket, we could set up our application to store
each key in a set when a new record is created. We’ll store this set in
the bucket user_info_sets
(we’ll keep it simple) and in the key
usernames
. The following will also assume that we’ve set up a bucket type called
sets
.
We can interact with that set on the basis of its location:
Location userIdSet = new Location(new Namespace("sets", "user_info_sets"), "usernames");
// With this Location, we can construct fetch operations like this:
FetchSet fetchUserIdSet = new FetchSet.Builder(userIdSet).build();
require 'riak'
set_bucket = client.bucket('user_info_sets')
# We'll make this set global because we'll use it
# inside of a function later on
$user_id_set = Riak::Crdt::Set.new(set_bucket, 'usernames', 'sets')
$command = (new \Basho\Riak\Command\Builder\FetchSet($riak))
->buildLocation('usernames', 'user_info_sets', 'sets')
->build();
from riak.datatypes import Set
bucket = client.bucket_type('sets').bucket('user_info_sets')
user_id_set = Set(bucket, 'usernames')
Getting started with Riak clients
Then, we can create a function that stores a user record’s key in that set every time a record is created:
// A User class for constructing user records
class User {
public String username;
public String info;
public User(String username, String info) {
this.username = username;
this.info = info;
}
}
// A function for storing a user record that has been created
public void storeUserRecord(User user) throws Exception {
// User records themselves will be stored in the bucket "users"
Location userObjectLocation =
new Location(new Namespace("users"), user.username);
RiakObject userObject = new RiakObject()
// We'll keep it simple and store User object data as plain text
.setContentType("text/plain")
.setValue(user.info);
StoreValue store = new StoreValue.Builder(userObjectLocation, userObject)
.build();
client.execute(store);
Location userIdSet =
new Location(new Namespace("sets", "user_info_sets"), "usernames");
SetUpdate su = new SetUpdate()
.add(BinaryValue.create(user.username));
UpdateSet update = new UpdateSet.Builder(su, update)
.build();
client.execute(update);
}
class User
attr_accessor :username, :info
end
def store_record(user)
# First we create an empty object and specify its bucket and key
obj = Riak::RObject.new(client.bucket('users'), user.username)
# We'll keep it simple by storing plain text for each user's info
obj.content_type = 'text/plain'
obj.raw_data = user.info
obj.store
# Finally, we'll add the user's username to the set
user_id_set.add(user.username)
end
class User
{
public $user_name;
public $info;
public function __construct($user_name, $info)
{
$this->user_name = $user_name;
$this->info = $info;
}
}
function store_user(User $user)
{
(new \Basho\Riak\Command\Builder\StoreObject)
->buildLocation($user->user_name, 'users')
->buildJsonObject($user)
->build()
->execute();
(new \Basho\Riak\Command\Builder\UpdateSet)
->buildLocation('usernames', 'user_info_sets', 'sets')
->add($user->user_name)
->build()
->execute();
}
class User:
def __init__(self, username, info):
this.username = username
this.info = info
# Using the "user_id_set" object from above
def store_record(user):
# First we create an empty object and specify its bucket and key
obj = RiakObject(client, 'users', user.username)
# We'll keep it simple by storing plain text for each user's info
obj.content_type = 'text/plain'
obj.data = user.info
obj.store()
# Finally, we'll add the user's username to the set
user_id_set.add(username)
user_id_set.store()
Now, let’s say that we want to be able to pull up all user records in the bucket at once. We could do so by iterating through the usernames stored in our set and then fetching the object corresponding to each username:
public Set<User> fetchAllUserRecords() {
// Empty builder sets for usernames and User objects
Set<String> userIdSet = new HashSet<String>();
Set<User> userSet = new HashSet<User>();
// Turn the Riak username set into a set of Strings
Location userIdSet =
new Location(new Namespace("sets", "sets"), "usernames");
FetchSet fetchUserIdSet = new FetchSet.Builder(userIdSet).build();
RiakSet set = client.execute(fetchUserIdSet).getDatatype();
set.viewAsSet().forEach((BinaryValue username) -> {
userIdSet.add(username.toString());
});
// Fetch User objects for each of the usernames stored in the set
userIdSet.forEach((String username) -> {
Location userLocation = new Location(new Namespace("users"), username);
FetchValue fetch = new FetchValue.Builder(userLocation).build();
User user = client.execute(fetch).getValue(User.class);
userSet.add(user);
});
return userSet;
}
# Using the "user_id_set" set from above
def fetch_all_user_records
users_bucket = $client.bucket('users')
user_records = Array.new
$user_id_set.members.each do |user_id|
user_record = users_bucket.get(user_id).data
user_records.push(user_record)
end
user_records
end
function fetch_users()
{
$users = [];
$response = (new \Basho\Riak\Command\Builder\UpdateSet)
->buildLocation('usernames', 'user_info_sets', 'sets')
->build()
->execute();
$user_names = $response->getSet()->getData();
foreach($user_names as $user_name) {
$response = (new \Basho\Riak\Command\Builder\FetchObject)
->buildLocation($user_name, 'users')
->build()
->execute();
$users[$user_name] = $response->getObject()->getData();
}
return $users;
}
# We'll create a generator object that will yield a list of Riak objects
def fetch_all_user_records():
users_bucket = client.bucket('users')
user_id_list = list(user_id_set.reload().value)
for user_id in user_id_list:
yield users_bucket.get(user_id)
# We can retrieve that list of Riak objects later on
list(fetch_all_user_records())
Naming and Object Verification
Another advantage of structured naming is that you can prevent queries
for objects that don’t exist or that don’t conform to how your
application has named them. For example, you could store all user data
in the bucket users
with keys beginning with the fragment user_
followed by a username, e.g. user_coderoshi
or user_macintux
. If an
object with an inappropriate key is stored in that bucket, it won’t even
be seen by your application because it will only ever query keys that
begin with user_
:
// Assuming that we've created a class User:
public User getUserByUsername(String username) {
String usernameKey = String.format("user_%s", username)
Location loc = new Location("users")
.setKey(usernameKey);
FetchValue fetchUser = new FetchValue.Builder(loc).build();
FetchValue.Response res = client.execute(fetchUser);
User userObject = res.getValue(User.class);
return userObject;
}
def get_user_by_username(username)
bucket = client.bucket('users')
obj = bucket.get('user_#{username}')
return obj.raw_data
end
function fetchUser($user_name)
{
$response = (new \Basho\Riak\Command\Builder\FetchObject)
->buildLocation($user_name, 'users')
->build()
->execute();
return $response->getObject()->getData();
}
def get_user_by_username(username):
bucket = client.bucket('users')
obj = bucket.get('user_{}'.format(username))
return obj.data
Bucket Types as Additional Namespaces
Riak bucket types have two essential functions: they enable you to manage bucket configurations in an efficient and streamlined way and, more importantly for our purposes here, they act as a third namespace in Riak in addition to buckets and keys. Thus, in Riak versions 2.0 and later you have access to a third layer of information for locating objects if you wish.
While bucket types are typically used to assign different bucket properties to groups of buckets, you can also create named bucket types that simply extend Riak’s defaults or multiple bucket types that have the same configuration but have different names.
Here’s an example of creating four bucket types that only extend Riak’s defaults:
riak-admin bucket-type create john
riak-admin bucket-type create robert
riak-admin bucket-type create jimmy
riak-admin bucket-type create john-paul
Or you can create five different bucket types that all set n_val
to 2
but have different names:
riak-admin bucket-type create earth '{"props":{"n_val":2}}'
riak-admin bucket-type create fire '{"props":{"n_val":2}}'
riak-admin bucket-type create wind '{"props":{"n_val":2}}'
riak-admin bucket-type create water '{"props":{"n_val":2}}'
riak-admin bucket-type create heart '{"props":{"n_val":2}}'
Bucket Types Example
To extend our Simpsons example from above, imagine that we become dissatisfied with our storage scheme because we want to separate the seasons into good seasons and bad seasons (we’ll leave it up to you to make that determination).
One way to improve our scheme might be to change our bucket naming
system and preface each bucket name with good
or bad
, but a more
elegant way would be to use bucket types instead. So instead of this URL
structure…
GET/PUT/DELETE /bucket/<season>/keys/<episode number>
…we can use this structure:
GET/PUT/DELETE /types/<good or bad>/buckets/<season>/keys/<episode number>
That adds an additional layer of namespacing and enables us to think about our data in terms of a deeper hash than in the example above:
simpsons = {
'good': {
'season X': {
{ 'episode 1': '<title>' },
# ...
}
},
'bad': {
'season Y': {
{ 'episode 1': '<title>' },
# ...
}
}
}
We can fetch the title of season 8, episode 6:
# For the sake of example, we'll classify season 8 as good:
simpsons['good']['season 8']['episode 6']
# => "A Milhouse Divided"
If your data is best modeled as a three-layered hash, you may want to consider using bucket types in the way shown above.
|
<urn:uuid:286b881d-c23d-4ee4-9a52-2d38e046f611>
|
CC-MAIN-2024-51
|
https://www.tiot.jp/riak-docs/riak/kv/2.2.2/developing/key-value-modeling/
|
2024-12-13T22:57:54Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066119651.31/warc/CC-MAIN-20241213202611-20241213232611-00417.warc.gz
|
by
|
4.0
|
a_tag
| false | true | null | null | null |
{
"abbr": [
"by"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.969523 |
Why Grow Vertically?
Ripening vertically maximizes developing room, increases furnishes, and shortens pest and malady difficulties. In short, you need to create a vertical grow in your home garden, especially if you have limited space. In today’s 2 hour tip, I’ll picture you how we moved these heavy function trellises that can support the load of undetermined tomatoes, squash, pumpkins, and even watermelons. These easy-to-make trellises follow a very simple pattern. Concrete remesh, made from welded sword cable, supports a strong grid with big openings for easy better access to fruit. The remesh is attached to an EMT conduit frame expending zip ties.
Constructing Your Vertical Grow
Now let’s move on to the construct. If you’re unfamiliar with any of information materials expended, don’t worry, I’ve supplied associates in the specific characteristics for enquiries on every piece. You’ll necessitate two 8 foot parts of 1/2″ EMT conduit for the verticals and a 41 1/2″ fragment for the horizontal. To connect the verticals to the horizontal, you’ll necessitate two 1/2″ EMT 90 degree drag shoulders. Conduit is sold in 10 hoof parts, so you’ll have to cut the verticals to 8 feet and the horizontal to 41 and one half inches. You can use a pipe cutter or a hacksaw to make the cut. I then connected the verticals to the horizontals expending the 90 degree drag shoulders, and laid the frame down to attach the 84 by 43 inch remesh.
The 41 1/2″ horizontal plus the shoulders render the perfect width for the remesh. Applying black UV-resistant zip ties, I fastened the remesh to the frame, expending 7 zip ties to affix the upper part of the grid to the frame and four on each side. I expended two 3 1/3 hoof parts of rebar to assure the trellis to the garden-variety. To determine where to drive the rebar into the grime, I simply put the trellis in place. When I hoisted it up, the conduit had left 2 indentations. I then expended these indentations as steers as to where to drive the rebar.
Final Steps to Your Vertical Grow
I drove each fragment of rebar about half way into the grime. Some weeds, like peas and beans, will naturally cling to the trellis, but for those that don’t, I’ll weave the weeds through the grid as they thrive. This will be delivered more than enough support for most weeds. But big fruiting weeds like pumpkins and watermelons may need additional assist. In this case, I’ll often use a harness made from an old-fashioned t-shirt, wrap the harness around the fruit, and tie it to the frame. Well, that’s all for now. Thank you very much for watching this 2 hour tip.
Excited about getting started with your own home garden? We are too! Join us to learn more practical advice!
[rainmaker_form id=”530″]
As found on Youtube
Photo by Sangre-La.com
|
<urn:uuid:a959f36b-94fd-4011-aff2-135e87f6c9c5>
|
CC-MAIN-2024-51
|
https://www.upcycleandcompany.com/tag/how-to-make-a-garden-trellis/
|
2024-12-13T21:02:54Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066119651.31/warc/CC-MAIN-20241213202611-20241213232611-00417.warc.gz
|
by
|
2.0
|
a_tag
| false | false | null | null | null |
{
"abbr": [
"by"
],
"in_footer": [
false
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"2.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.997279 |
Security Report Summary
R
Redirect: | Click here to follow the redirect to https://blankpistols1.weebly.com/. | ||
---|---|---|---|
Site: | http://blankpistols1.weebly.com/ - (Scan again over https) | ||
IP Address: | 188.8.131.52 | ||
Report Time: | 02 Dec 2024 08:01:42 UTC | ||
Headers: |
Warning: | Grade capped at A, please see warnings below. | ||
Advanced: |
Missing Headers
Content-Security-Policy | Content Security Policy is an effective measure to protect your site from XSS attacks. By whitelisting sources of approved content, you can prevent the browser from loading malicious assets. |
---|---|
X-Frame-Options | X-Frame-Options tells the browser whether you want to allow your site to be framed or not. By preventing a browser from framing your site you can defend against attacks like clickjacking. Recommended value "X-Frame-Options: SAMEORIGIN". |
X-Content-Type-Options | X-Content-Type-Options stops a browser from trying to MIME-sniff the content type and forces it to stick with the declared content-type. The only valid value for this header is "X-Content-Type-Options: nosniff". |
Referrer-Policy | Referrer Policy is a new header that allows a site to control how much information the browser includes with navigations away from a document and should be set by all sites. |
Permissions-Policy | Permissions Policy is a new header that allows a site to control which features and APIs can be used in the browser. |
Warnings
Site is using HTTP | This site was served over HTTP and did not redirect to HTTPS. |
---|
Raw Headers
HTTP/1.1 | 301 Moved Permanently |
---|---|
Date | Mon, 02 Dec 2024 08:01:42 GMT |
Content-Type | text/html; charset=UTF-8 |
Transfer-Encoding | chunked |
Connection | keep-alive |
Location | https://blankpistols1.weebly.com/ |
CF-Ray | 8eb9ca608d09bddb-DUB |
CF-Cache-Status | DYNAMIC |
Set-Cookie | is_mobile=0; path=/; domain=blankpistols1.weebly.com |
Vary | X-W-SSL,User-Agent, Accept-Encoding |
X-Host | grn140.sf2p.intern.weebly.net |
X-UA-Compatible | IE=edge,chrome=1 |
Set-Cookie | __cf_bm=vPttDs_ffiMWnMMuU6dx4Ww7MVEn7n.jR4XvyMZ0kyo-1733126502-184.108.40.206-4nVl4LZepOsBuHs5vYhzHFU7JzjFp8WbPzo7laKXUxmgZuzL8H7WWl0nVrzs332H9rS9PMvsUzaGdjinbBEL3g; path=/; expires=Mon, 02-Dec-24 08:31:42 GMT; domain=.weebly.com; HttpOnly |
Server | cloudflare |
Upcoming Headers
Cross-Origin-Embedder-Policy | Cross-Origin Embedder Policy allows a site to prevent assets being loaded that do not grant permission to load them via CORS or CORP. |
---|---|
Cross-Origin-Opener-Policy | Cross-Origin Opener Policy allows a site to opt-in to Cross-Origin Isolation in the browser. |
Cross-Origin-Resource-Policy | Cross-Origin Resource Policy allows a resource owner to specify who can load the resource. |
Additional Information
Server | Server value has been changed. Typically you will see values like "Microsoft-IIS/8.0" or "nginx 1.7.2". |
---|
|
<urn:uuid:af3b439d-16a8-4594-ac0f-3cb6725ee18a>
|
CC-MAIN-2024-51
|
https://securityheaders.com/?q=blankpistols1.weebly.com
|
2024-12-02T08:01:42Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066127282.52/warc/CC-MAIN-20241202064003-20241202094003-00317.warc.gz
|
by-sa
|
4.0
|
a_tag
| false | false | null | null | null |
{
"abbr": [
"by-sa"
],
"in_footer": [
false
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.9431 |
Household Energy Practices in Low-Energy Buildings: A Qualitative Study of Klosterenga Ecological Housing Cooperative
dc.contributor.author | Standal, Karina | |
dc.contributor.author | Wilhite, Harold Langford | |
dc.contributor.author | Wågø, Solvår Irene | |
dc.date.accessioned | 2023-01-05T07:47:44Z | |
dc.date.available | 2023-01-05T07:47:44Z | |
dc.date.created | 2023-01-04T08:39:15Z | |
dc.date.issued | 2023 | |
dc.identifier.isbn | 978-3-031-11069-6 | |
dc.identifier.issn | 2947-8235 | |
dc.identifier.uri | https://hdl.handle.net/11250/3041080 | |
dc.description.abstract | This chapter examines household energy practices in the ecological housing cooperative Klosterenga in Oslo, Norway. Klosterenga, built in 2000, was one of the early implementers of smart building principles in Oslo, Norway. Although the ecological profile of Klosterenga inspired some of the residents to change behavioural habits such as limiting their car use or consumption patterns, the findings of this article show that expectations of smart technology as a primary solution towards energy efficiency and residents being rational consumers using this technology to save costs do not hold. The residents of Klosterenga rarely emphasised the building’s ecological profile and smart energy systems when purchasing their home, and the energy-efficient systems and integration of heating costs in the rent had adverse effects on residents’ energy consumption. Rather than taking the visions of ecology at heart, many residents legitimised everyday habits of high indoor temperature in the fact that the system was efficient. The findings contribute to the growing body of research that critically examines how smart technology visions for reducing energy use in buildings are implemented and practiced by the residents living in them. | en_US |
dc.language.iso | eng | en_US |
dc.publisher | Palgrave Macmillan | en_US |
dc.relation.ispartof | Consumption, Sustainability and Everyday Life | |
dc.relation.ispartofseries | Consumption and Public Life; | |
dc.rights | CC BY 4.0 | * |
dc.rights.uri | http://creativecommons.org/licenses/by/4.0/ | * |
dc.title | Household Energy Practices in Low-Energy Buildings: A Qualitative Study of Klosterenga Ecological Housing Cooperative | en_US |
dc.title.alternative | Household Energy Practices in Low-Energy Buildings: A Qualitative Study of Klosterenga Ecological Housing Cooperative | en_US |
dc.type | Chapter | en_US |
dc.description.version | publishedVersion | en_US |
dc.rights.holder | © 2022 The authors | en_US |
dc.source.pagenumber | 57-84 | en_US |
dc.identifier.doi | 10.1007/978-3-031-11069-6_3 | |
dc.identifier.cristin | 2100107 | |
cristin.ispublished | true | |
cristin.fulltext | original | |
cristin.qualitycode | 2 |
|
<urn:uuid:a2ffe0f2-1def-4cf0-be43-3c6da3bd3d92>
|
CC-MAIN-2024-51
|
https://sintef.brage.unit.no/sintef-xmlui/handle/11250/3041080?show=full
|
2024-12-02T07:49:29Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066127282.52/warc/CC-MAIN-20241202064003-20241202094003-00317.warc.gz
|
by
|
4.0
|
a_tag
| false | false | null | null | null |
{
"abbr": [
"by"
],
"in_footer": [
false
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.828251 |
A Response to My Dad…. Pt 2
OK, I admit to being surprised, my Dad actually wrote back shortly after that last…
You will be pleased to know that the “Masters” have spoken and the “Servants”, err people, have complied. The people may now assume the position and get prepared for insertion with a barbed wire condom.
Seriously, it has been an extremely long and drawn out battle this election cycle. I congratulate my Republican and Trump loving family, friends, acquaintances and readers, I hope you get everything you expect from the incoming administration; I just hope you want what it is you are getting.
I wish I could say it had been an honorable battle, but with as many outright lies and deceptions, that just cannot be said. I couldn’t sleep last night and kept getting up to modify the following; it pretty much sums up how I feel about last night’s results.
I have three things to say:
Enjoy the fruits of your labors, ’cause I suspect the gloating is going to give way to the reality you have just loosed onto the world. I hope I am wrong and that you are right, I honestly hope that the next two years are everything you want them to be; God help us, they had better be.
I get the psychology of what happened last night, Pavlovian Response Training; it started quite awhile ago, but kicked into high gear on March 12th, 2002; the masses will be glad to know that they passed with flying colors. What I just cannot wrap my head around is the “why”.
I admit I am only an observer of humankind; I am not a trained Cultural Anthropologist, Sociologist or Psychiatrist. I like to think I have at least an average number of correctly firing neurons, for the life of me, I can only find limited viable solutions, and cannot decide if I should laugh or cry.
So here is what I see, let’s lay out the game and its players into the light; do not worry, they will scurry like roaches back into the shadows:
Republicans are about profit, no more and no less; they are defined by greed. What about the Christians? They sold their souls when they got into bed with the Republican Party, oh they can salve their egos by being anti-abortion and anti-same-sex marriage, but, when it comes to the rest of the teachings of Jesus, not so much. They fell in love with mammon (Matt 6:24); though they will likely never have it, ironic that.
The powers that be in both America and around the world have created a system that is destined to fail and do it quite dramatically. The system is based on a finite resource, petroleum, and yet requires infinite consumer growth and spending to keep the worldwide Ponzi scheme going.
Profiteers love war; it makes them LOTS of money and wars they have aplenty. They will claim it’s for this or that, but it is almost always about getting or taking something someone else owns. Though, George Carlin may have been right in his assertions that it is all about males and the fear that their penises are not up to the competition.
Religion, that amazing playbook of control, is once again being manipulated to create tensions amongst the groups and then justify the outcome. Is it any wonder that many people have come to hate religion? Where the Republican right could not handle speaking carefully about the topic, they are likely to embolden certain enemies by the rhetoric they prefer. The Middle East could very easily degrade into a religious war, ISIS would love that, it makes their recruiting efforts easier.
So-called “Political Correctness”, hated by those who just do not have the balls to say what they think and accept the consequences. You claim to love Trump for his absolute lack of PC, but what I think what you like is that he does not care what people think of what spews forth from his mouth. What you have likely failed to consider is that it also goes toward the very electorate that has elected him.
I can only see four potential destinations for the game:
In the short run, it does not matter; the little people will be manipulated to accomplish your goals, and those who are awake enough to call it into question will be ridiculed or removed from the discussion. To quote Mel Brooks, “It’s good to be the king.”
A student of questioning and motive.
Though it is going to seem rather petty, I do have one little thing to remind you of; it’s all on you baby!
You just scored a Neo-Con wet dream:
About the only thing that could make it the perfect orgasm would be super-majorities in both Houses, but hey, what is the satisfaction if it is too easy?
The Beast of the Christian Apocalypse is reportedly capable of holding it all together for three and a half years before it all falls apart, can you keep it up for two?
But, Presidential terms are four years? Why yes they are, but the Mid-Terms are in two, and if the power brokers don’t want to be remembered alongside Marie Antoinette, America had better be a Christian-Republican utopia or the trained haters you have created could just as quickly turn on you. You trained them well, but you had better keep the proles happy.
The Proletariat does not know it, but until the power elite succeeds in chucking the whole thing out, they hold all the cards. They, the proles, cast the votes; illusory as it may be, the forms must be followed until the “Owners” feel safe enough.
Oh, Wizard! Would you please step out from behind the curtain? We would like to see the genuine face of our Masters so we may be devoted and obedient Servants.
Please know that I am hoping to be wrong, there are sometimes when you just want to be mistaken, because being right may mean you could have done something about it.
|
<urn:uuid:28289acb-493d-4d49-ae58-3fd7e02cb995>
|
CC-MAIN-2024-51
|
https://spiritgeek.com/2016/11/masters-and-servants.html?replytocom=1379
|
2024-12-02T06:45:54Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066127282.52/warc/CC-MAIN-20241202064003-20241202094003-00317.warc.gz
|
by-sa
|
3.0
|
a_tag
| false | true | null | null | null |
{
"abbr": [
"by-sa",
"by-sa"
],
"in_footer": [
true,
true
],
"in_head": [
false,
false
],
"location": [
"a_tag",
"a_tag"
],
"version": [
"3.0",
"3.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.998963 |
You do not have permission to edit this page, for the following reason:
You are not allowed to execute the action you have requested.
You can view and copy the source of this page.
Return to Category:Batteries.
|
<urn:uuid:6470d893-4155-4b1c-968a-7a205d6efb0b>
|
CC-MAIN-2024-51
|
https://staging.energypedia.info/index.php?title=Category:Batteries&action=edit
|
2024-12-02T07:25:33Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066127282.52/warc/CC-MAIN-20241202064003-20241202094003-00317.warc.gz
|
by-sa
|
4.0
|
a_tag
| false | true | null | null | null |
{
"abbr": [
"by-sa"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.99882 |
Login required
From energypedia
Please
log in
to view other pages.
Return to
Main Page
.
Retrieved from "
https://staging.energypedia.info/wiki/Special:Badtitle
"
Privacy Policy
Legal
Disclaimers & Terms of Use
Cookies help us deliver our services. By using our services, you agree to our use of cookies.
More information
OK
|
<urn:uuid:f3e30be2-16be-4d6f-8e9a-e93834dbc2c2>
|
CC-MAIN-2024-51
|
https://staging.energypedia.info/index.php?title=Special:CiteThisPage&page=Smart_Grid_on_Main_Street%3A_Electricity_and_Value-added_Processing_for_Agricultural_Goods&id=322215&wpFormIdentifier=titleform
|
2024-12-02T06:58:22Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066127282.52/warc/CC-MAIN-20241202064003-20241202094003-00317.warc.gz
|
by-sa
|
4.0
|
a_tag
| false | true | null | null | null |
{
"abbr": [
"by-sa"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.968176 |
Your Input: | Neighborhood | Gene Fusion | Cooccurrence | Coexpression | Experiments | Databases | Textmining | [Homology] | Score | |
| | ywrD | Putative enzyme; Overexpressed protein with an N-terminal His tag has been reported not to hydrolyze glutathione; it is not clear if the construct is processed to 2 subunits. (525 aa) | |
Predicted Functional Partners: |
| | ggt | Membrane bound gamma-glutamyltranspeptidase; Cleaves the gamma-glutamyl bond of extracellular glutathione (gamma-Glu-Cys-Gly), glutathione conjugates, and other gamma-glutamyl compounds. The metabolism of glutathione releases free glutamate and the dipeptide cysteinyl-glycine, which is hydrolyzed to cysteine and glycine by dipeptidases; Belongs to the gamma-glutamyltransferase family. | | | | | | | | | 0.933 |
| | pepA | Leucyl aminopeptidase; Presumably involved in the processing and regular turnover of intracellular proteins. Catalyzes the removal of unsubstituted N- terminal amino acids from various peptides (By similarity). | | | | | | | | | 0.929 |
| | ycsF | Putative nitrogen-containing heterocycle degradation enzyme; Catalyzes the cleavage of 5-oxoproline to form L-glutamate coupled to the hydrolysis of ATP to ADP and inorganic phosphate. Belongs to the LamB/PxpA family. | | | | | | | | | 0.927 |
| | bsaA | Putative bacillithiol peroxidase; Evidence 3: Function proposed based on presence of conserved amino acid motif, structural feature or limited homology; Product type pe: putative enzyme; Belongs to the glutathione peroxidase family. | | | | | | | | | 0.916 |
| | gltA | Glutamate synthase (large subunit); Evidence 1a: Function experimentally demonstrated in the studied strain; Product type e: enzyme; Belongs to the glutamate synthase family. | | | | | | | | | 0.853 |
| | glnA | Glutamine synthetase; Glutamine synthetase (GS) is an unusual multitasking protein that functions as an enzyme, a transcription coregulator, and a chaperone in ammonium assimilation and in the regulation of genes involved in nitrogen metabolism. It catalyzes the ATP-dependent biosynthesis of glutamine from glutamate and ammonia. Feedback-inhibited GlnA interacts with and regulates the activity of the transcriptional regulator TnrA. During nitrogen limitation, TnrA is in its DNA- binding active state and turns on the transcription of genes required for nitrogen assimilation. Under condi [...] | | | | | | | | | 0.833 |
| | gudB | Cryptic glutamate dehydrogenase; GudB seems to be intrinsically inactive, however spontaneous mutations removing a 9-bp direct repeat within the wild-type gudB sequence activated the GudB protein and allowed more-efficient utilization of amino acids of the glutamate family. This insertion presumably causes severe destabilization of the fold of the protein, leading to an inactive enzyme that is very quickly degraded. The cryptic GudB serves as a buffer that may compensate for mutations in the rocG gene and that can also be decryptified for the utilization of glutamate as a single carbon [...] | | | | | | | | | 0.818 |
| | rocG | Glutamate dehydrogenase; Devoted to catabolic function of glutamate (and other amino acids of the glutamate family) utilization as sole nitrogen source. It is not involved in anabolic function of glutamate biosynthesis since B.subtilis possesses only one route of glutamate biosynthesis from ammonia, catalyzed by glutamate synthase. RocG is unable to utilize glutamate or glutamine as sole carbon source and to synthesize glutamate, but it is involved in the utilization of arginine, and proline as carbon or nitrogen source. The catabolic RocG is essential for controlling gltAB expression [...] | | | | | | | | | 0.818 |
| | putC | 1-pyrroline-5-carboxylate dehydrogenase; Important for the use of proline as a sole carbon and energy source or a sole nitrogen source. | | | | | | | | | 0.805 |
| | purQ | Phosphoribosylformylglycinamidine synthetase I; Part of the phosphoribosylformylglycinamidine synthase complex involved in the purines biosynthetic pathway. Catalyzes the ATP-dependent conversion of formylglycinamide ribonucleotide (FGAR) and glutamine to yield formylglycinamidine ribonucleotide (FGAM) and glutamate. The FGAM synthase complex is composed of three subunits. PurQ produces an ammonia molecule by converting glutamine to glutamate. PurL transfers the ammonia molecule to FGAR to form FGAM in an ATP- dependent manner. PurS interacts with PurQ and PurL and is thought to assist [...] | | | | | | | | | 0.805 |
|
<urn:uuid:bc1be366-8e66-48d3-bc01-c6e1f20f134b>
|
CC-MAIN-2024-51
|
https://string-db.org/network/224308.BSU36100
|
2024-12-02T06:57:02Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066127282.52/warc/CC-MAIN-20241202064003-20241202094003-00317.warc.gz
|
by
|
4.0
|
json-ld
| true | false | null | null | null |
{
"abbr": [
"by"
],
"in_footer": [
false
],
"in_head": [
true
],
"location": [
"json-ld"
],
"version": [
"4.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.888406 |
Grace's Guide is the leading source of historical information on industry and manufacturing in Britain. This web publication contains 147,919 pages of information and 233,587 images on early companies, their products and the people who designed and built them.
Grace's Guide web site design is Copyright © 2021 by Grace's Guide Ltd. The text of this web site is available under the Creative Commons Attribution-ShareAlike License; additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy. Maintained by Sapere Software
|
<urn:uuid:fbab4e89-4729-4c22-ba14-049401df7279>
|
CC-MAIN-2024-51
|
https://gracesguide.co.uk/Ayres_Quay_Bottle_Co
|
2024-12-03T12:40:11Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066137897.45/warc/CC-MAIN-20241203102227-20241203132227-00217.warc.gz
|
by-sa
|
4.0
|
a_tag
| false | true | null | null | null |
{
"abbr": [
"by-sa"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.99645 |
Holtzapffel and Deyerlein
1801 Advertisement. 'TURNING LATHE AND TOOLS - A Variety of SUNDRY IMPLEMENTS, With some hard wood, the property of a Gentleman, Apply at Holtzapffel's Tool Manufactory, No. 118. Long-acre. N.B. An assortment of New Engines, Portable Lathes, Rose Engines, Portable Furnace, and Grinding Apparatus.'[1]
1810 Fire. 'A dreadful fire broke out last week at the house of Messrs. Holtzapffel and Deyerlein's engine and lathe manufactory, in Long Acre, which consumed the whole of the premises, and communicated to the adjoining house belonging to Messrs. Kempsten and Fairburn, leather sellers, which was also burnt the ground. The Crown public house was also very much damaged. The engines arrived as soon as the alarm was given, but no water could procured for near an hour, on account of the frost. The inmates house escaped with great difficulty'[3]
1811 Ornamental turning lathe preserved in Australia. Photo here.
1815 Advert. '.....Holtzapffel and Deyerlein beg to inform Parents and Guardians that they have at present a great variety of Turning Lathes, Tool Chests, or single Instruments, etc. calculated for the above purposes; with many useful or Fancy Articles. Apply at No. 10, Cockspur-street, Charing cross'[5]
1818 Advert. 'Mechanical Implements - Holtzapffel and Deyerlein, Engine, Lathe and Tool Manufacturers, No. 10, Cockspur-street, 2 Charing-cross, beg most respectfully to acquaint their numerous Friends, that they have for the present season added considerably to their Stock, Mechanical Apparatus and Working Tools, consisting of Lathes and other Machinery, Work Benches, and Chests of Tools for general purposes, for home consumption and for exportation, the quality of which they flatter themselves is sufficiently known. Dealers in Hardwood and Ivory. Mechanical Laboratories for Amateurs completely fitted up in town or country.'[6]
1823 Advert. 'Mechanical Tools. Holtzapffel and Deyerlein, 64, Charing-cross, late of Cockspur-street. Manufacturers of Engines, Lathes, Mechanical and Edge Tools, beg most respectfully to inform the Public, and such of their customers who have not yet visited their present House, that they have added many articles to their already extensive Stock in the General Tool line. Also Cutlery in all its Branches, warranted equal in quality to their Edge Tools, at reduced prices, for ready money. Merchants supplied as usual. Dealers in Foreign Wood and Ivory. Catalogues with present prices, may be had on application to 64, Charing-cross.'[9]
1825 Theft. 'John Jackson was indicted for stealing, on the 27th of November, 1 vice, value 5s.; 1 piece of ivory, value 6s.; 2 sets of letters, value 12s.; 1 opera-glass, value 5s., and 1 snuff-box, value 4s., the goods of John Jacob Holtzapffel, and Johana Gorg Deyerlein , his masters.'[10]
1827 Became Holtzapffel and Co after the death of Deyerlein
See Also
Sources of Information
- Morning Post - Wednesday 08 July 1801
- 1808 Post Office Annual Directory
- Norfolk Chronicle - Saturday 27 January 1810
- The Morning Chronicle (London, England), Monday, April 20, 1812
- Morning Post - Saturday 23 December 1815
- Morning Chronicle - Monday 25 May 1818
- The Morning Post, Thursday, October 26, 1820
- 1822 History, Directory and Gazetteer of Yorkshire
- Morning Post - Thursday 18 December 1823
- [1] Old Bailey on-line
|
<urn:uuid:2c3b6af5-6f03-4bbb-a138-7d889060b99a>
|
CC-MAIN-2024-51
|
https://gracesguide.co.uk/Holtzapffel_and_Deyerlein
|
2024-12-03T12:43:27Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066137897.45/warc/CC-MAIN-20241203102227-20241203132227-00217.warc.gz
|
by-sa
|
4.0
|
a_tag
| false | true | null | null | null |
{
"abbr": [
"by-sa"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.980715 |
Reproductive health education is a taught knowledge that extends the vision of learning to prepare learners for literacy and citizenship. However, its integration into the curriculum is finding more difficulties and this is due to several factors. This work aims to identify the difficulties and educational needs of student midwives’ in relation to reproductive health education during the year 2018. We used the focus group technique as a data collection method. Our results highlighted the sources of information and the educational needs of our students towards reproductive health education before any teaching of this knowledge. The main sources of information for students on reproductive health education were high school, the internet, and the media. The obstacles identified were related to shortcomings in theoretical and practical training. 50 % of the students had announced that this is a taboo subject and that the population refuses to discuss it. All the students had approved the integration of reproductive and sexual health education in the Moroccan academic curricula. In addition to identifying students' educational needs, the group focus technique could be used in perspective in training engineering towards other knowledge.
Introduction: Clinical practice in education is the backbone of a midwife's professional career, it is a fundamental component of the teaching and learning process that gives the student the opportunity to develop the competencies required for professional practice. However, experience in clinical practice creates constraints and difficulties.Objective: explore the experience of Midwives students from ISPITS Morocco in clinical practice of emergency obstetric care.Method: Quantitative and descriptive study realized with 23 student midwives of the Higher Institutes of Nursing and Technical Health Professions of Morocco. The data was collected via a questionnaire online.Results: The study of experience of the student midwife in the learning process of emergency obstetric care shows these aspects: Midwives students have difficulty for insertion into clinical practice, as a result of the modalities of coordination between teachers and tutors of the practice, lack of self-confidence, and a lack of professional competence, theoretical knowledge is inadequate to the real context of the internship field and the non-standardization of tools for monitoring and evaluating of practice.Conclusions: Midwives students need to be accompanied and supervised in their clinical practice experience by the teacher who must detect weaknesses, anticipate difficulties and propose teaching/learning strategies that prevent and even mitigate difficulties.
Unlike the official candidates who have been trained in the preparation cycle in the preparatory cycle for the Aggregation of Life and Earth sciences in Morocco, the competition of the Aggregation of this discipline is more and more feared by the free candidates (holders of Master, DEA, DES and PhD) who come directly to this competition without initial training. Indeed, since its creation in Morocco in 1991, none of the candidates could even succeed in writing the contest.
This work, intended for free candidates, aims to contribute, via new technology, to a training of these candidates to improve their preparation for the written tests of cell biology and physiology of the contest.
The results of an exploratory study conducted with two groups of free candidates, control and experimental, emphasize that distance learning, via ICT, could be a promising alternative for effective preparation for the written exams of the competition of the Aggregation of Life and Earth sciences in Morocco. The differences observed between the two groups of candidates highlight an improvement in the cognitive and methodological skills of these candidates.
In the face of environmental problems, effective teaching about the environment is more than necessary. However, Environmental Education confronts several obstacles at the didactic level. The traditional method dominates the professional practices of teachers. The goal of this research is to make the teaching of Environmental Education more effective. To do this, we adopted a quantitative methodology based on a questionnaire for teachers of Science life and earth and the other for learners. This research shows that teachers need ongoing training in Environmental Education. These courses are essential to offer students a more effective teaching. Also, this research shows that students are motivated in ecological outings and they show great autonomy in their learning processes.
To address the problems related to the teaching of life and earth sciences and to develop effective educational activities, the Moroccan Ministry of National Education has selected and trained competent teachers: aggregates in life and earth sciences with both high-level general scientific knowledge and pedagogical and didactic skills evaluated respectively by written and oral tests. The candidates for the Aggregation competition are double:
- Official candidates with initial training in the preparation cycle for Aggregation;
- Free candidates from universities (Master, DEA, DES, Doctorate), who enter the competition directly without specific prior training.
However, this competition is increasingly posing problems for candidates: the overall success rate in this competition is 16.8% among official candidates, but no free candidate was able to succeed even in writing test of this competition.
This work aims to clarify the problems and difficulties faced by candidates in the written competition. To do this, we proceeded to a rigorous analysis of the results of the written competition to highlight the jury's recommendations, also to a critical analysis of the preparation programs for this competition to measure their alignments with the specificity of the written subjects of the competition.
Thus, we were able to demonstrate, that the consequences of university teaching are palpable on the results of the candidates to the competition of the Aggregation of Life and Earth Sciences.
Un enseignement réussi des sciences de la terre en particulier la théorie de la tectonique des plaques demande entre autres un changement pédagogique, c’est le facteur dont la quasi-totalité des enseignants n’en tiennent pas encore compte. Ces sciences sont malheureusement, présentées par nos enseignants d’une façon qui les laissent aux regards de nos élèves comme une suite de découvertes qui se fait d’une manière aléatoire et simple et loin de tout problème qui leur donnée naissance.
Biology can be perceived as a difficult subject to learn due to the conceptual leaps required to understand particular biological topics. In some areas of this discipline, part of the difficulty may be associated with acquiring sufficient imagination to visualize particular concepts, and acquiring sufficient visio-spatial abilities to apply the concept to practical use. This study investigates the use of 3D animation as an aid for teaching the synaptic transmission concepts at baccalaureate level in Morocco. An experiment was conducted with two groups of baccalaureate Earth and life sciences students to ascertain if animation can be used to support the teaching of some concepts in nervous communication such as synaptic transmission. The results of this experiment show that animation can be useful more than static representations.
Une intégration réussie des TIC demande entre autre un changement pédagogique, c’est le facteur dont la quasi-totalité des enseignants n’en tient pas encore compte. Ces enseignants résument, malheureusement, la fonction des TIC comme de simples outils compatibles seulement avec un enseignement traditionnel et dogmatique et sans étude préalable qui se résume par une mise en place d’un scénario pédagogique approprié. Or parmi les éléments avantageux des TIC, c’est qu’elles augmentent la capacité de questionnement et la résolution des problèmes ce qui favorisent le plaisir d’apprendre en défendant la participation des élèves à la construction de leur propre savoir.
The Immunology is a recent scientific discipline. The complexity of its concepts and their ever-changing could present educational challenges for teachers and barriers to learning for learners. In this article, we have tried, through an investigation by a survey, to highlight the views of a group of students for some immunological concepts concerning vaccines and vaccination. The analysis of the survey
Didactic transposition is a process of transformation of the learned knowledge to learn to teach. This passage could leave footprints that can manifest as dogmatization, a uncontextualization and programmability in learning.
We then asked what is to transpose Immunology, given the important place it occupies in the Baccalaureate
|
<urn:uuid:12882776-8677-48d7-a6de-5a161e6c039a>
|
CC-MAIN-2024-51
|
https://ijias.issr-journals.org/fr/authid.php?id=6551
|
2024-12-03T10:57:31Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066137897.45/warc/CC-MAIN-20241203102227-20241203132227-00217.warc.gz
|
by
|
3.0
|
a_tag
| false | false | null | null | null |
{
"abbr": [
"by",
"by"
],
"in_footer": [
false,
false
],
"in_head": [
false,
false
],
"location": [
"a_tag",
"a_tag"
],
"version": [
"3.0",
"3.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.993127 |
Skip to content
×
×
Contact us
Sign up
Profile
Login
Logout
Search & analyse
Search species
Search & download records
Search datasets
Spatial analysis (Spatial Portal)
Explore your area
Explore natural history collections
Contribute
Share your dataset
Upload species list
Record a sighting
Transcribe & digitise (DigiVol)
Discover citizen science projects
Resources
Brochures and reports
ALA logo and identity
ALA-cited publications
Data Mobilisation Program
ALA Labs
About
About us
Governance
News & media
Careers
Internships
Contact us
Current projects
International Living Atlases
Indigenous ecological knowledge
All sites, services & tools
Help
Browse all articles (FAQs)
ALA Data help
ALA Tools & Apps help
ALA Spatial Portal help
How to cite the ALA
Contact us
×
Home
Images
1 Images
Search
Advanced search
Download results
View API
Refine results
Selected filters
Image size (pixels): 17m
Date uploaded: 2016-02
Data resource: South Australian Museum Adelaide provider for OZCAM
Format: image/jpeg
creator.keyword: Kim Wendell
Data resource
South Australian Museum Adelaide provider for OZCAM
(1)
Date uploaded
2016-02
(1)
Format
image/jpeg
(1)
Image size (pixels)
17m
(1)
Creator
Kim Wendell
(1)
File type
image
(1)
Licence
CC BY-NC-SA 4.0
(1)
South Australian Museum Adelaide provider for OZCAM
-
Kim Wendell
«
»
×
Refine your search
Close
×
Advanced search
Criteria:
<Select Criteria>
Image height
Image thumbHeight
Image thumbWidth
Image width
Image zoomLevels
Add criteria
Close
|
<urn:uuid:651715b3-5dba-4518-a274-a1db9f772de1>
|
CC-MAIN-2024-51
|
https://images.ala.org.au/?&fq=&fq=imageSize:17m&fq=dateUploadedYearMonth:2016-02&fq=imageSize:17m&fq=dataResourceUid:dr346&fq=dateUploadedYearMonth:2016-02&fq=format:image/jpeg&fq=format:image/jpeg&fq=creator.keyword:Kim%20Wendell
|
2024-12-03T10:46:20Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066137897.45/warc/CC-MAIN-20241203102227-20241203132227-00217.warc.gz
|
by
|
3.0
|
a_tag
| false | true | null | null | null |
{
"abbr": [
"by",
"by"
],
"in_footer": [
true,
true
],
"in_head": [
false,
false
],
"location": [
"a_tag",
"a_tag"
],
"version": [
"3.0",
"3.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.755302 |
This category is for organizations, places, companies, or other things founded or established in 290.
This category contains only the following page.
|
<urn:uuid:8407a41a-c8c8-4feb-be82-af54708d8ddb>
|
CC-MAIN-2024-51
|
https://infogalactic.com/info/Category:290_establishments
|
2024-12-03T12:34:25Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066137897.45/warc/CC-MAIN-20241203102227-20241203132227-00217.warc.gz
|
by-sa
|
3.0
|
link_tag
| true | false | null | null | null |
{
"abbr": [
"by-sa",
"by-sa",
"by-sa"
],
"in_footer": [
false,
true,
true
],
"in_head": [
true,
false,
false
],
"location": [
"link_tag",
"a_tag",
"a_tag"
],
"version": [
"3.0",
"3.0",
"3.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.987149 |
One way to add more on topic content to your Squidoo lens is with a Frequently Asked Questions (FAQ) section. Providing an FAQ helps visitors who may be looking for the answer to a specific question on your topic.
Where can I get ideas for FAQ questions?
Watch your lens stats for questions in the search terms. If someone is looking for an answer, it’s likely that others are, too. Adding the question to your lens helps the search engines know you have the answer. All of the questions in the FAQ section at the bottom of my fantasy football commissioner guide lens came from search stats. (A bonus of doing this is that you may find search terms that spawn ideas for new lenses to build.)
You might also find questions in your guestbook comments. Another way is to look at the lens from a visitor’s perspective and think of questions you would have about the subject. The cool thing is that you can add to the FAQ over time as you brainstorm or find new questions.
Where do I get the answers for these questions?
Write your own original answers. You’re the expert that wrote the lens so this should be the easy part.
What Squidoo modules are good for an FAQ?
The Text List and Text modules are naturals for an FAQ. They look good, the content gets crawled by the search engines and you have formatting options. When using either module, I like to put each question in bold so it stands out.
What types of questions should I add?
Only feature questions that complement your lens topic. If the FAQ list gets too long, consider building a new lens that covers a subset of the questions and point readers to it.
Any other FAQ tips or ideas?
Another option is to write most of your lens content in a natural question and answer format. Phrase the module title in the form of a question then answer it in the body.
If you have a lot of lenses in a niche, you could build one lens that’s the FAQ for all of them. Each lens in the niche would link to it and the FAQ lens would link back to the other lenses in its answers.
Experiment with different formats and have fun adding an FAQ to your lens! Let me know what you discover.
|
<urn:uuid:c33724d5-2866-4708-8bbc-10ba030ff173>
|
CC-MAIN-2024-51
|
https://lensharbor.com/2011/09/add-an-faq-section-to-your-lens/
|
2024-12-03T11:44:20Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066137897.45/warc/CC-MAIN-20241203102227-20241203132227-00217.warc.gz
|
by
|
2.0
|
a_tag
| false | true | null | null | null |
{
"abbr": [
"by",
"by"
],
"in_footer": [
true,
false
],
"in_head": [
false,
false
],
"location": [
"a_tag",
"a_tag"
],
"version": [
"2.0",
"2.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.999184 |
No Virginia, CNN and MSNBC don’t support Nikki for President. Sadly, she’s under the impression that Democrats support her. But there were enough people who outside the polling areas who said their vote for her was a vote against Trump.
Most of those interviewed said if it came down to Haily or Trump vs Biden, they would vote for Biden. What part of that doesn’t she understand? And Haley’s love fest with CNN and MSNBC?
I guess she doesn’t see that their interest is to keep Haley in the race just to keep the focus off of Biden and his disastrous blunders he makes daily. Remember that they did the same to John McCain.
The more money spent on Trump and Haley fighting, the less available to go after Biden.
https://twitter.com/i/status/1750602705960137129
|
<urn:uuid:addb5ac9-1ae0-4e4e-8317-5916deb20d47>
|
CC-MAIN-2024-51
|
https://mastercreator.atwebpages.com/2024/01/26/no-virginia-cnn-and-msnbc-dont-support-nikki-for-president/
|
2024-12-03T10:57:47Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066137897.45/warc/CC-MAIN-20241203102227-20241203132227-00217.warc.gz
|
by-sa
|
4.0
|
a_tag
| false | true | null | null | null |
{
"abbr": [
"by-sa",
"by-sa"
],
"in_footer": [
true,
true
],
"in_head": [
false,
false
],
"location": [
"a_tag",
"a_tag"
],
"version": [
"4.0",
"4.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.999631 |
Multiple terms: term1 term2 red apples returns results with all terms like: Fructose levels in red and green apples
Precise match in quotes: "term1 term2" "red apples" returns results matching exactly like: Anthocyanin biosynthesis in red apples
Exclude a term with -: term1 -term2 apples -red returns results containing apples but not red: Malic acid in green apples
Research area http://maps.google.de/?ie=UTF8&t=p&ll=47.706065,9.420776&spn=0.646895,1.428223&z=9&output=embed
|
<urn:uuid:f2c1057a-52bf-4626-bddc-2b8b4474ef28>
|
CC-MAIN-2024-51
|
https://egqsj.copernicus.org/articles/60/22/2011/egqsj-60-22-2011-assets.html
|
2024-12-04T14:46:34Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066181697.67/warc/CC-MAIN-20241204141508-20241204171508-00117.warc.gz
|
by
|
4.0
|
a_tag
| false | true | null | null | null |
{
"abbr": [
"by",
"by",
"by",
"by"
],
"in_footer": [
true,
true,
false,
false
],
"in_head": [
false,
false,
false,
false
],
"location": [
"a_tag",
"a_tag",
"a_tag",
"a_tag"
],
"version": [
"4.0",
"4.0",
"3.0",
"3.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.958328 |
Revision history of "File:Cadre politique 22-11-2019 Rap Identification des besoins renforcement capacités EE et E.pdf"
From energypedia
Diff selection: Mark the radio boxes of the revisions to compare and hit enter or the button at the bottom.
Legend: (cur) = difference with latest revision, (prev) = difference with preceding revision, m = minor edit.
|
<urn:uuid:6180eced-6c42-4f29-a024-6d7b3aceabb1>
|
CC-MAIN-2024-51
|
https://energypedia.info/index.php?title=File:Cadre_politique_22-11-2019_Rap_Identification_des_besoins_renforcement_capacit%C3%A9s_EE_et_E.pdf&action=history
|
2024-12-04T15:42:55Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066181697.67/warc/CC-MAIN-20241204141508-20241204171508-00117.warc.gz
|
by-sa
|
4.0
|
a_tag
| false | true | null | null | null |
{
"abbr": [
"by-sa"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.723571 |
During our third day in Havana, we ambled over to a rental car place next to the Hotel Capri in the neighborhood of Vedado to inquire about motorbikes for rent. Alex, you see, had the brilliant (to me, at least) of renting a pair of motos to ride to Mariel, a bayside town west of Vedado by about 30 miles (50 kilometers). We could ride on lightly traveled roads and have the freedom to stop whenever and wherever we pleased along the way.
But there were a couple of issues. One was on this Sunday, a staff member of this motorbike rental place was nowhere to be found. We waited and waited. After about half-an-hour, someone finally came.
Which brought us to the second problem. There were no available rental bikes. In fact, we were told there were only 30 motorbikes in the entire city of Havana (population 2.11 million in 2012) for rent, with 24 of them being rented out from this location. And the folks who rented the motos usually hung on to them for a long time. We were advised to come back the following morning to see if someone returned a motorbike, which we did but to no avail.
Motorbikes for rent, of course, were not the only things Cuba had a lack of. Other things were much more mundane. Let’s talk about the bathrooms, for example.
Most toilets do not have seats. You simply squat or sit on the bowl if you are a woman or a man who needs to take a dump. But then you are faced with a dearth of toilet paper. Fortunately, while going over our packing lists at the last minute before coming to Cuba, Maureen and I decided to bring our own toilet paper because I recalled, “in several third world countries I have been to, the public restrooms lacked T.P.”
What I did not expect, however, was that all the casas particulares (private homes or AirBnBs) we stayed at would have no bathroom tissue either. The chronic shortage of this stuff—reported to be due to a multitude of reasons including factory servicing, an “extraction problem,” and price speculation—was surely compounded by yet another problem: price. Or, rather, the purported average monthly salary of $35 for a Cuban worker. When the cheapest roll of toilet paper costs .30 CUC (1 CUC, or Cuban Convertible Pesos, is roughly equal to 1 USD)—or roughly 1% of the monthly income—it is easy to imagine that Cubans are understandably voluntarily rationing this “luxury” item.
Because any roll of toilet paper inside a public restroom would therefore be ripe for theft, there invariably is none inside the bathroom stalls. Instead, there is usually an attendant standing outside that you are supposed to tip (.25 CUC is usually enough) to get 4-6 squares of toilet paper in exchange. Sometimes, however, they give you no toilet paper and you are still expected to tip them—for what service, I’m not sure.
In private homes where T.P. rationing in the norm, there is usually the cheap version of a French bidet to compensate—a tube running from the shower head to a spout that can reach your underside. Never mind that water pressure usually pales in comparison to, say, squirting yourself with a plastic water bottle.
Speaking of bottled water, that is another item we had some trouble finding. Now, tap water in Cuba reportedly is a bit cleaner than that in many other Latin American countries to the point where it “might” be safe enough for foreigner to drink—but the cautious tourist is advised to buy bottled water instead. So I attempted to buy bottled water where street-side venders were selling beer and liquor, only to be told that there was no H2O for sale. (Tip: many hotels will have some for sale as they cater to tourists. Or bring a water filter made for camping instead.)
Tourists will even encounter a bit of scarcity inside restaurants. More often than not, about half of the items listed on restaurant menus will not be available. Chicken, pork, and beef dishes will often be available, but don’t expect to be able to get an entrée with fish or seafood despite the country being surrounded on all sides by water. When ordering food, be prepared to have a second or third choice. Also, don’t expect there to be boxes available to take home food. I once asked for one at a trendy restaurant after ordering too much food, and while the waiter was willing to give me one, he came back saying there were none to be found.
Despite being an ardent fan of minimalism and zero waste, going to Cuba definitely gave me a new appreciation for the abundance of resources and retail goods that we have in the United States. Even if, come to think of it, I’m not sure how easy it would be to rent a motorbike in the U.S. either!
|
<urn:uuid:e8d5f8d5-63d2-4b22-ab98-c2f3fb06a64a>
|
CC-MAIN-2024-51
|
https://felixwong.com/2017/01/scarcity-in-cuba/
|
2024-12-04T16:13:51Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066181697.67/warc/CC-MAIN-20241204141508-20241204171508-00117.warc.gz
|
by
|
4.0
|
json-ld
| false | false | null | null | null |
{
"abbr": [
"by"
],
"in_footer": [
false
],
"in_head": [
false
],
"location": [
"json-ld"
],
"version": [
"4.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.999296 |
Search GDR Data
Order by:
Available Now:
9 Resources
0 Stars
Publicly accessible
EGS Collab Experiment 1: 3D Seismic Velocity Model and Updated Microseismic Catalog from Double-Difference Seismic Tomography
8 Resources
0 Stars
Publicly accessible
|
<urn:uuid:fc10c4e2-0b4f-4612-9cd9-ae80f9a15ace>
|
CC-MAIN-2024-51
|
https://gdr.openei.org/search?q=E1-PST&dt%5B%5D=video
|
2024-12-04T16:03:05Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066181697.67/warc/CC-MAIN-20241204141508-20241204171508-00117.warc.gz
|
by
|
4.0
|
a_tag
| false | true | null | null | null |
{
"abbr": [
"by"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.780361 |
Please enter the email address that you used for registration. We will send you a new password.
The following information is mandatory and is required to register an account:
Have you found an error? Do you have any suggestions for making our service even better or any other questions about this page? Please write to us and we'll make sure we get back to you.
I hereby confirm the use of my personal data within the context of the enquiry made.
Dear user,
In response to current developments in the web technology used by the Goobi viewer, the software no longer supports your browser.
Please use one of the following browsers to display this page correctly.
Thank you.
|
<urn:uuid:a6982b69-f74e-4a5f-8c4f-b803cb5e81a4>
|
CC-MAIN-2024-51
|
https://goobi.tib.eu/viewer/image/1663687293/810/-/
|
2024-12-04T15:30:58Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066181697.67/warc/CC-MAIN-20241204141508-20241204171508-00117.warc.gz
|
by
|
4.0
|
a_tag
| false | false | null | null | null |
{
"abbr": [
"by"
],
"in_footer": [
false
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.999465 |
Diff selection: Mark the radio boxes of the revisions to compare and hit enter or the button at the bottom. Legend: (cur) = difference with latest revision, (prev) = difference with preceding revision, m = minor edit.
|
<urn:uuid:3a295efd-1b4d-4b2b-b978-1a9ef84c42ee>
|
CC-MAIN-2024-51
|
http://theinfosphere.org/index.php?title=Dr_Beeler&action=history
|
2024-12-05T18:38:09Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066362401.69/warc/CC-MAIN-20241205180803-20241205210803-00017.warc.gz
|
by-sa
|
3.0
|
link_tag
| true | false | null | null | null |
{
"abbr": [
"by-sa",
"by-sa"
],
"in_footer": [
false,
true
],
"in_head": [
true,
false
],
"location": [
"link_tag",
"a_tag"
],
"version": [
"3.0",
"3.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.876129 |
Nwankwo, Casmir N., PhD, Department of Psychology, Madonna University Nigeria., Nigeria
Reminder
- How to do online submission to another Journal?
- If you have already registered in Journal A, then how can you submit another article to Journal B? It takes two steps to make it happen:
Submission Guidelines for Canadian Social Science
We are currently accepting submissions via email only. The registration and online submission functions have been disabled.
Please send your manuscripts to [email protected],or [email protected] for consideration. We look forward to receiving your work.
Articles published in Canadian Social Science are licensed under Creative Commons Attribution 4.0 (CC-BY).
Canadian Social Science Editorial Office
Address: 1020 Bouvier Street, Suite 400, Quebec City, Quebec, G2K 0K9, Canada.
Telephone: 1-514-558 6138
Website: Http://www.cscanada.net; Http://www.cscanada.org
E-mail:[email protected]; [email protected]
Copyright © Canadian Academy of Oriental and Occidental Culture
|
<urn:uuid:702bbd41-be26-4441-8fd7-07a70aff37b2>
|
CC-MAIN-2024-51
|
http://www.cscanada.net/index.php/css/search/authors/view?firstName=Casmir%20N.&middleName=&lastName=Nwankwo&affiliation=PhD%2C%20Department%20of%20Psychology%2C%20Madonna%20University%20Nigeria.&country=NG
|
2024-12-05T20:22:01Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066362401.69/warc/CC-MAIN-20241205180803-20241205210803-00017.warc.gz
|
by
|
4.0
|
a_tag
| false | true | null | null | null |
{
"abbr": [
"by"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.940644 |
Initial thoughts on the elements for a draft decision
Technical examination and periodic assessmentswith respect to “fairness” and “ambition” are at the heart of the climate regime and involve important trade-offs; even in the Convention, negotiated twenty four years ago, in 1992, assessment and review (Article 10) was the very last item to be agreed.
While the proposals are for the pre-2020 period, they include “bridging proposals” and narrowing options for further negotiations and should be considered as a package with the post-2020 text. These initial thoughts take such an integrated view.
The formulations suggested in the draft need further clarity through specificity, with respect to: (i) tension between universality and diversity which the principle of CBDR and respective capabilities enshrines, (ii) whether this will be a Party or secretariat driven process, (iii) relationship with the Convention, (iv) role of non-state actors, and (v) treatment of adaptation:
[1] The technical examination (para 6), or preparation of ‘Technical Briefs’, should be limited to compilation and synthesis of the data and information, as at present, using indicators toreflect the range of issues raised in the INDCs – for example, energy intensity, carbon intensity, per capita emissions, sectoral breakup for production and consumption sectors, access to energy, renewable energy as a share of total electricity, transport emissions, urbanization, water scarcity etc. It should also bring together recent research from other UN bodies and national governments. That is, the diversity of national circumstances and levels of development should be an intrinsic part of the technical examination just as they of the INDCs.
The options should relate to mitigation, adaptation andsharing innovation with respect to energy and agriculture technologies. Adaptation should be included in para 2, not be limited to a co-benefit (para 11) and a technical assessment should include ‘needs’ and opportunities’ (para 15), as in the case of mitigation. A technical examination of ‘needs’ with respect to adaptation is essential to understand impacts on human wellbeing and not only on ecosystems.
An integrated, rather than compartmentalized, perspective is also needed as the distinction between mitigation and adaptation is increasingly is getting blurred in developing countries as urbanization progresses and rural populations shift to citiesand into the middle class at a different pace in different countries. Differentiation is not just a legal concept for burden sharing but also directly related to different national actions in countries at different levels of wellbeing.
The emphasis in the technical examination, or preparation of ‘Technical Briefs’, should really be for the Parties to bring out ‘good practices’ and share their experience with others on the transformation that will be needed. Identifying universal policies and/or actions at the inter-governmental level does not conform to the bottom-up approach that has been adopted in these negotiations, and to which the countries are responding and expect will be maintained.
In a universal regime developing country experts should constitute at least two-thirds of the total (instead of merely improving their access and participation, para 8), as sufficiently trained experts are now available and wide participation of experts will itself lead to the transfer of knowledge to developing countries.
The annual updating of technical papers should begin immediately, from 2017 (the text, in para 10 implies this step would occur post-2020).
The arrangement should be till 2030, when the approach should be reviewed on the basis of experience gained with the technical examination process, for example, as levels of wellbeing converge peer review may be more acceptable, though it should be considered at this stage as well.
[2] The draft does not make a distinction between the process, which is technical, and the output, which is entirely political in nature. The identification of policy options and actions (para 10) and assessments (para 15), if agreed, should be done by an inter-governmental body, like the SBI as at present, and not by the secretariat (para 10), and the technical examination should also done by experts nominated by States.
Enhancing ambition (para 10.a) and assessments of effectiveness (para 15) involve value judgements with respect to sharing the global carbon budget and requires political rather than technical consideration; the importance of ethics and justice, and not just efficiency and effectiveness, has also been recognised by the IPCC in its most recent report – “ambition” and “fairness” must be considered together, as that is the defining feature of the Convention.
Levels of development and national circumstances are integral to the INDCs and should be reflected in the (policy) options and actions separately for those countries who have already capped emissions of greenhouse gases and those who will do so later. The former will need to cut-back already high levels while the latter will need to modify trends; very different options will be relevant for countries at different levels of development.
For example, cities are responsible for two-third of emissions, while retrofitting of buildings is recommended for developed countries urban design is optimum for developing countries that are now urbanizing. The pace and direction of urbanization – urban design, emphasis on access rather than mobility, public transport, energy efficiency of buildings, a healthy diet with less meat and less waste – provides the most appropriate mitigation and adaptation optionsfor developing countries. This will be achieved by shifting rural populations into the urban middle class by 2050, before the adverse effects of climate change begin to impact on the poor, and does not apply to the developed already urbanized countries. Recognising this distinction and regional specificity of the transformation is vital to get support in developing countries for national legislation on dealing with climate change.
The technical papers prepared by experts should be brief and not require a ‘policy’ summary (para 1o.b), which, as the IPCC process shows, adds a layer of subjectivity and needs political input.
The Bureau, not the secretariat (para 10.c) should be charged with coordination with other conventions, as these would include the World Trade Organization and will have political implications, and such a role for the Bureau rather than the secretariat is in accordance with broader reform being considered within the United Nations.
[3] In the Preamble, there should be a ‘stand-alone’ reference to enhancing the implementation the Convention, that is,“achievethe objective of the Convention”. This is distinct from promoting international cooperation in general (and ambitious and ‘fair’ climate action). This clear frame of reference is necessary as it will need to be included in the objective of national legislation to gain support for the needed measures.
The existing mechanisms, and not ‘arrangements; as the text has in para 15, should continue in the new regime, to take care of emerging needs.
Delegating powers of the COP to the President (para 13) is also departure from the Convention. If this is considered necessary the focus of the intervention should belimited to promoting international cooperation, and should be specified. It could be‘finance, technology and capacity building support’ in both the pre- 2020 period (para 3) and in the post-2020 period. The sharing of innovative technologies for energy and agriculture, on which there is no consensus, would benefit from high level engagement to meet the objective of the Convention.
[2] Since this is an inter-governmental process giving a role to non-State actors in (national) implementation (para 9),“recognizing the efforts” of non-State actors (para 12.a) and providing “meaningful and regular opportunities for the effective engagement” of civil society, indigenous peoples, women, youth, academic institutions, the private sector and sub-national authorities (para 12.b) extends arrangements from a very different intergovernmental processes (the Sustainable Development Goals) to a treaty. That agreement puts the means of implementation as its core, which would benefit from a wider participation, while in the climate treaty the technical examination and its assessment process is the core, with legal and policy implications for countries at the international level, for example, enforcement through trade regimes etc.
There needs to be different arrangements for the various actors - government nominated experts in the technical examination, intergovernmental bodies (not international organizations – para 12.b) sharing their reports etc. with the COP and civil society providing inputs as they are doing at present, or taking part in workshops organized by SBSTA (civil society does not have a formal role in the IPCC, for example).
The draft ignores the key formal role social science research is playing with respect to the sustainable development goals, and the International Council for Science (ICSU) and the International Social Science Council (ISSC) should be invited to each COP to share their research on ‘Future Earth’.
[5] Adaptation and mitigation should be treated on equal footing, responding to the concerns of large numbers of citizensin developing countries. For example, elected representatives representing the poor who do not even have access to adequate electricity will support national legislationrelated to mitigation only if it responds to adaptation in greater, or at least equal, measure.
The suggested structure, in the document, is such that including adaptation in the technical examination along with mitigation alone will link adaptation with ‘actions’.Therefore, there should be common provisions with respect to mitigation and adaptation. Paras 14 and 15 should be combined with paras 6 and 10.a. – the common concern is ‘change in the earth’s climate and its adverse effects’.
|
<urn:uuid:c5a87f78-7bdd-4969-aef9-96c5368d44a4>
|
CC-MAIN-2024-51
|
http://www.indiaenvironmentportal.org.in/content/415579/initial-thoughts-on-the-elements-for-a-draft-decision/
|
2024-12-05T18:35:09Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066362401.69/warc/CC-MAIN-20241205180803-20241205210803-00017.warc.gz
|
by-sa
|
2.5
|
a_tag
| false | true | null | null | null |
{
"abbr": [
"by-sa"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"2.5"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.99461 |
Abstract: Sustainability educators are in a difficult spot. They must describe our unsustainable impacts on the environment and marginalized peoples, our growing understanding of how these impacts affect future generations and other species, and our failures to make the changes necessary to approach sustainability. At the same time they must avoid pushing students over an obscure tipping point where such information causes them to retreat into despair. For despair leads to inaction, which will only hasten the deterioration of planetary health. We propose two approaches to helping students avoid despair and strengthen their motivation for pursuing sustainable changes. One approach appeals to the motivational energy of hope and the other to the power of tranquil resolve described in Stoicism. We understand these approaches to be complementary. The skills of hope work well when we are pursuing long shot goals, while those of tranquil resolve aid when the achievement of our goals is beyond our own control. While the skills of hope are more aligned with our cultural norms and thus likely easier to teach, skills associated with a tranquil resolve can more powerfully (and lastingly) address the climate challenges we face. Pedagogical examples and strategies of these skills in action are offered throughout.
Continue ReadingThough often considered an area of importance and emphasis, the enactment of Environmental Sustainability Education can vary considerably across schools and settings. This study used a narrative approach to tell the story of Environmental Sustainability Education at three schools within a 10-mile radius of our institution: a public charter school, a public school with a magnet STEM program, and a private Friends school. Our findings are discussed using the NAAEE’s Essential Underpinnings of Environmental Education, and shed light on possible future direction for pre- and in-service teacher education in Environmental Sustainability Education.
Continue ReadingLearning in the outdoors has significant educational advantages for children in the Primary School years and the need to connect with nature is becoming increasingly prominent in research worldwide. Pro-environmental behaviour, especially in the early years, has been shown to have a causal relationship with connectivity with the natural environment. Place-based outdoor learning promotes a relationship with the natural environment and constructs deep environmental knowledge and understanding of the world that surrounds learners. Embedding Indigenous culture and knowledge into outdoor learning within Primary School programs enables local knowledge and understanding to permeate throughout activities in explicit and experiential ways. A place-based pedagogy recognises the importance of forming intimate relationships with place through regular visitations to the same outdoor environment. One of the many global challenges confronting teachers working in Primary schools is how to implement holistic learning into their educational programs. This paper explores how an Australian case study utilises place-based outdoor learning and environmental sustainability within the school curriculum.
Continue ReadingPDF:McClanahanSpring2014 Abstract: In this state of the field response, I suggest that Education for Sustainable Development (ESD) be considered a mindset that is necessary for teacher educators understand and incorporate into their daily business of educating our future teachers, regardless of grade level or content area. Key Words: Education for Sustainable Development, Education for Sustainability, […]
Continue ReadingPDF: Jaimie Cloud JSE May 2014 “The test of a first-rate intelligence is the ability to hold two opposing ideas in mind at the same time and still retain the ability to function. One should, for example, be able to see that things are hopeless yet be determined to make them otherwise.” F. Scott Fitzgerald […]
Continue ReadingPDF: Rafferty and Laird, Spring 2013 Abstract: This paper explores the observations and perceptions of school children as they engage with nature through place based environmental experiences. The paper reports on two projects, one based in the USA and the other in Australia, designed to promote understanding of sustainability through outdoor […]
Continue ReadingEmbedding education for sustainability, in Faith Based Organisations’ (FBOs) school curricula in Uganda, puzzles. Any progressive education system should be dynamic-always calling for timely transformations in content, instructional methodologies, imparted values,
skills and attitudes, to remain holistic. Once these are adequately embraced, the system tends to remain vibrant and relevant to the institutions, the learner and the community. However, in Uganda especially in education institutions of FBOs, Education for
Sustainability (EfS) – a universally conceived aspect of holistic learning seems not to be whole-heartedly attended to either by omission or unawareness. Problems centre mainly on ideological and operational premises. These include lack of awareness, lack of goodwill of
key stakeholders to plan for and manage EfS and lack of competent teachers in EfS aspects. Answers to these problems in essence center on the theoretical underpinning of this report-curricular transformation. Secondly, proper capacity building, integrative planning,
financing and management to enable sustainable programme growth and development should also be enhanced.
In this insightful, foundational and wide-ranging interview, Jaimie Cloud makes the case…and defends it…for the prime importance of Education for Sustainability (EfS). Her ground-breaking work and years of experience bring an authoritative voice to this nascent field and give confidence that, as she says, “it all begins with a change in thinking” and “we just have to educate for it.” Her impressive accomplishments and the examples she brings to the interview are a must-read of inspiration for anyone involved with sustainability education.
Continue ReadingAnthony Cortese and Richard Cook’s clarion call for colleges to join the Presidents’ Climate Commitment lays out the stakes in no uncertain terms. They succinctly define what sustainability education really means in terms of every-day concrete changes for which every institution of higher learning should strive.
Continue Reading
|
<urn:uuid:b902601c-490e-4aa8-b068-f99fe522b29c>
|
CC-MAIN-2024-51
|
http://www.susted.com/wordpress/tags/education-for-sustainability/
|
2024-12-05T20:31:10Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066362401.69/warc/CC-MAIN-20241205180803-20241205210803-00017.warc.gz
|
by
|
3.0
|
a_tag
| false | true | null | null | null |
{
"abbr": [
"by",
"by"
],
"in_footer": [
true,
true
],
"in_head": [
false,
false
],
"location": [
"a_tag",
"a_tag"
],
"version": [
"3.0",
"3.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.995636 |
The spatial distribution of the reactive iodine species IO from simultaneous active and passive DOAS observations
Abstract. We present investigations of the reactive iodine species (RIS) IO, OIO and I2 in a coastal region from a field campaign simultaneously employing active long path differential optical absorption spectroscopy (LP-DOAS) as well as passive multi-axis differential optical absorption spectroscopy (MAX-DOAS). The campaign took place at the Martin Ryan Institute (MRI) in Carna, County Galway at the Irish West Coast about 6 km south-east of the atmospheric research station Mace Head in summer 2007. In order to study the horizontal distribution of the trace gases of interest, we established two almost parallel active LP-DOAS light paths, the shorter of 1034 m length just crossing the intertidal area, whereas the longer one of 3946 m length also crossed open water during periods of low tide. In addition we operated two passive Mini-MAX-DOAS instruments with the same viewing direction. While neither OIO nor I2 could be unambiguously identified with any of the instruments, IO could be detected with active as well as passive DOAS. The IO column densities seen at both active LP-DOAS light paths are almost the same. Thus it can be concluded that coastal IO is almost exclusively located in the intertidal area, where we detected mixing ratios of up to 29±8.8 ppt (equivalent to pmol/mol). Nucleation events with particle concentrations of 106 cm−3 particles were observed each day correlating with high IO mixing ratios. Therefore we feel that our detected IO concentrations confirm the results of model studies, which state that in order to explain such particle bursts, IO mixing ratios of 50 to 100 ppt in so called "hot-spots" are required.
|
<urn:uuid:072d0fd9-94b8-4491-86d8-1fdfefb9025c>
|
CC-MAIN-2024-51
|
https://acp.copernicus.org/articles/10/2117/2010/acp-10-2117-2010.html
|
2024-12-05T19:14:30Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066362401.69/warc/CC-MAIN-20241205180803-20241205210803-00017.warc.gz
|
by
|
4.0
|
a_tag
| false | true | null | null | null |
{
"abbr": [
"by",
"by",
"by",
"by"
],
"in_footer": [
true,
true,
false,
false
],
"in_head": [
false,
false,
false,
false
],
"location": [
"a_tag",
"a_tag",
"a_tag",
"a_tag"
],
"version": [
"4.0",
"4.0",
"3.0",
"3.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.99308 |
Book Review: Radioactive: Marie and Pierre Curie, A Tale of Love and Fallout March 23, 2011 March 22, 2011 No Comments on Book Review: Radioactive: Marie and Pierre Curie, A Tale of Love and Fallout Teresa Iacobelli presents a thoughtful review of Radioactive: Marie and Pierre Curie, A Tale of Love and Fallout. TweetEmail
|
<urn:uuid:aa732560-70e6-48f1-bb40-4df6eabebbee>
|
CC-MAIN-2024-51
|
https://activehistory.ca/blog/tag/a-tale-of-love-and-fallout/
|
2024-12-05T20:03:47Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066362401.69/warc/CC-MAIN-20241205180803-20241205210803-00017.warc.gz
|
by-nd
|
4.0
|
a_tag
| false | true | null | null | null |
{
"abbr": [
"by-nd",
"by-nd"
],
"in_footer": [
true,
true
],
"in_head": [
false,
false
],
"location": [
"a_tag",
"a_tag"
],
"version": [
"4.0",
"4.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.900151 |
This tool is under development and it is available in Beta Test version
This tool is under development and it was published with the objective to test the usage and performance. All the indicators are real and they are gradually being loaded. Slowness and out of service problems may occur in this version.
|
<urn:uuid:b7dda01d-3087-4fbe-8c4d-05f7b4dd0d2d>
|
CC-MAIN-2024-51
|
https://analytics.scielo.org/?document=S2664-09022023000200376&collection=bol
|
2024-12-05T19:45:03Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066362401.69/warc/CC-MAIN-20241205180803-20241205210803-00017.warc.gz
|
by
|
4.0
|
a_tag
| false | false | null | null | null |
{
"abbr": [
"by",
"by"
],
"in_footer": [
false,
false
],
"in_head": [
false,
false
],
"location": [
"a_tag",
"a_tag"
],
"version": [
"4.0",
"4.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.999529 |
This tool is under development and it is available in Beta Test version
This tool is under development and it was published with the objective to test the usage and performance. All the indicators are real and they are gradually being loaded. Slowness and out of service problems may occur in this version.
|
<urn:uuid:b4ee4ecc-1f80-458c-aa86-48f6d1b99309>
|
CC-MAIN-2024-51
|
https://analytics.scielo.org/?document=S2664-09022023000200428&collection=bol
|
2024-12-05T20:39:33Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066362401.69/warc/CC-MAIN-20241205180803-20241205210803-00017.warc.gz
|
by
|
4.0
|
a_tag
| false | false | null | null | null |
{
"abbr": [
"by",
"by"
],
"in_footer": [
false,
false
],
"in_head": [
false,
false
],
"location": [
"a_tag",
"a_tag"
],
"version": [
"4.0",
"4.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.999529 |
The source of each cross-reference is on the left; the target is on the right. The first verse in the book or section is at the top, and the last verse is at the bottom. Numbers indicate chapters. Section titles are from the ESV Bible.
Blue indicates cross-reference targets in the Old Testament; red in the New Testament. Green indicates a section. Purple indicates cross-references in the same book; gray in the same chapter.
Unless otherwise indicated, all content is licensed under a Creative Commons Attribution License. All Scripture quotations, unless otherwise indicated, are taken from The Holy Bible, English Standard Version. Copyright ©2001 by Crossway Bibles, a publishing ministry of Good News Publishers. Contact me: openbibleinfo (at) gmail.com.
|
<urn:uuid:01dc0851-bbc4-4d73-b340-a6db643bd648>
|
CC-MAIN-2024-51
|
https://www.openbible.info/labs/cross-references/visualization?from=Zeph&to=Prov
|
2024-12-05T19:51:21Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066362401.69/warc/CC-MAIN-20241205180803-20241205210803-00017.warc.gz
|
by
|
4.0
|
a_tag
| false | false | null | null | null |
{
"abbr": [
"by"
],
"in_footer": [
false
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.981698 |
The Autonomous University of Barcelona does not offer Bachelors in this discipline, but other universities do:
The Autonomous University of Barcelona does not offer Bachelors in this discipline, but other universities do:
The Autonomous University of Barcelona does not offer Bachelors in this discipline, but other universities do:
The Autonomous University of Barcelona does not offer Masters in this discipline, but other universities do:
The Autonomous University of Barcelona does not offer Masters in this discipline, but other universities do:
The Autonomous University of Barcelona does not offer Masters in this discipline, but other universities do:
The Autonomous University of Barcelona belongs to the top 150 universities in the world and the top 100 universities in Europe.
Ranking | Year | Rank (in the world) |
Rank (in Europe) |
---|---|---|---|
QS World University Rankings | 2024 | 149 | 63 |
Times Higher Education World University Rankings | 2024 | 201 | 92 |
Shanghai Jiao Tong Academic Ranking of World Universities | 2023 | 301 | 107 |
|
<urn:uuid:580e283d-e010-46db-b894-f80644c557c4>
|
CC-MAIN-2024-51
|
https://www.study.eu/university/autonomous-university-of-barcelona
|
2024-12-05T18:53:52Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066362401.69/warc/CC-MAIN-20241205180803-20241205210803-00017.warc.gz
|
by-sa
|
2.0
|
a_tag
| false | false | null | null | null |
{
"abbr": [
"by-sa"
],
"in_footer": [
false
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"2.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.855012 |
tf_agents.utils.common.get_episode_mask
Stay organized with collections
Save and categorize content based on your preferences.
Create a mask that is 0.0 for all final steps, 1.0 elsewhere.
tf_agents.utils.common.get_episode_mask(
time_steps
)
Args |
time_steps
A TimeStep namedtuple representing a batch of steps.
Returns |
A float32 Tensor with 0s where step_type == LAST and 1s otherwise.
Except as otherwise noted, the content of this page is licensed under the Creative Commons Attribution 4.0 License, and code samples are licensed under the Apache 2.0 License. For details, see the Google Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.
Last updated 2024-04-26 UTC.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Missing the information I need","missingTheInformationINeed","thumb-down"],["Too complicated / too many steps","tooComplicatedTooManySteps","thumb-down"],["Out of date","outOfDate","thumb-down"],["Samples / code issue","samplesCodeIssue","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2024-04-26 UTC."],[],[]]
|
<urn:uuid:af67a059-c0bf-4398-88ee-44bea04c7cb3>
|
CC-MAIN-2024-51
|
https://www.tensorflow.org/agents/api_docs/python/tf_agents/utils/common/get_episode_mask
|
2024-12-05T19:42:36Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066362401.69/warc/CC-MAIN-20241205180803-20241205210803-00017.warc.gz
|
by
|
4.0
|
a_tag
| false | false | null | null | null |
{
"abbr": [
"by"
],
"in_footer": [
false
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.903087 |
Magnified image of CK302-11139 with polishing on bone tool from bison metatarsal
Loading...
Authors
Purifoy, Haley
Issue Date
2023-04-18
Type
Still Image
Language
Keywords
Metatarsal , Polishing , Bone Tool , Vore Buffalo Jump , Bison , Bison Jump , Mass Kill Site , Archaeological Site , Northwest Plains Tribes , Sinkhole , Wyoming , Prehistoric , Archaeology
Alternative Title
Abstract
Description
Metatarsal posterior aspect at 7.3 magnification.
Related Resource
Citation
Publisher
License
These images, documents, and models were digitized through funding provided by the Institute of Museum and Library Services (IMLS), Vore Buffalo Jump Foundation (VBJF), the Office of the Wyoming State Archaeologist (OWSA), and the University of Wyoming Archaeological Repository (UWAR). You may use these data on this website for your private study, scholarship, or research.
|
<urn:uuid:0b961c54-06bb-4263-947f-7fca73fbcfb1>
|
CC-MAIN-2024-51
|
https://wyodigital.uwyo.edu/items/740fc085-3306-495f-87ea-22ff3b081046
|
2024-12-05T20:39:23Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066362401.69/warc/CC-MAIN-20241205180803-20241205210803-00017.warc.gz
|
by
|
4.0
|
a_tag
| false | false | null | null | null |
{
"abbr": [
"by"
],
"in_footer": [
false
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.927867 |
NEWS CRUISE: Our hosts recap a lot of the nerdy and geeky news of the last week or so, including Star Trek: Starfleet Academy, new Dungeons & Dragons, DLC crossovers, and a Doctor Who spinoff?!?
TOPICS:
(00:00) Intro – Both hosts are to blame
(02:22) Star Trek news
(08:50) Dungeons & Dragons news
(16:41) Crossover DLC announcements from Dave the Diver, Balatro, and Dead By Daylight
(26:38) Doctor Who spinoff mini-series, The War Between the Land and the Sea, starts production
(35:09) Outro – Andrew’s Gravity Falls update
(38:53) Outtakes
RELEVANT LINKS:
- Bryant, Jacob. “Star Trek: Starfleet Academy Starts Filming as Full Cast Revealed.” The Wrap, 26 August 2024.
- “Dave the Diver – Balatro, Potion Craft & Mxmtoon Collaboration Announcement Trailer | GamesCom 2024.” uploaded by IGN, 20 August 2024.
- Nelson, Will. “Free Balatro Update Crosses Over with Four Games at Once, Right Now.” PC Games N, Network-N, 27 August 2024.
- “Production Begins on The War Between the Land and the Sea.” Doctor Who News, News in Time and Space, 23 August 2024.
- “Deborah Ann Woll Teaches Jon Bernthal Dungeons & Dragons.” REAL ONES with Jon Bernthal, YouTube, 13 August 2024.
RELEVANT EPISODES:
- “Chasing Chickens” (17 July 2020): Where D. shares his adventures into Gravity Falls.
- “Day of the Diver” (05 January 2024): Where our hosts have a conversation about Dave the Diver.
- “The 2-Body Solution” (29 March 2024): Where D. Bethel obsesses over Balatro.
- “Nerd Intervention” (28 June 2024): Where the hosts discuss the finale to the most recent season/series of Doctor Who.
- “Blanketcast” (09 August 2024): Where Andrew begins his adventure into Gravity Falls.
- “Del Rio Bravo” by Kevin MacLeod (incompetech.com)
FEATURED MUSIC:
- “Disco Medusae” by Kevin McLeod
- “District Four” by Kevin McLeod
- Tracks are licensed under Creative Commons BY Attribution 4.0 License (http://creativecommons.org/licenses/by/4.0/
|
<urn:uuid:bc460c44-66d9-4d59-9c5a-48032f79b761>
|
CC-MAIN-2024-51
|
http://forallintents.net/tag/news/
|
2024-12-06T19:18:05Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066416984.85/warc/CC-MAIN-20241206185637-20241206215637-00817.warc.gz
|
by
|
4.0
|
a_tag
| false | false | null | null | null |
{
"abbr": [
"by",
"by",
"by",
"by",
"by",
"by",
"by",
"by",
"by",
"by"
],
"in_footer": [
false,
false,
false,
false,
false,
false,
false,
false,
false,
false
],
"in_head": [
false,
false,
false,
false,
false,
false,
false,
false,
false,
false
],
"location": [
"a_tag",
"a_tag",
"a_tag",
"a_tag",
"a_tag",
"a_tag",
"a_tag",
"a_tag",
"a_tag",
"a_tag"
],
"version": [
"4.0",
"4.0",
"4.0",
"4.0",
"4.0",
"4.0",
"4.0",
"4.0",
"4.0",
"4.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.935934 |
Downloads: 128
Filesize: 1917965
Download
The Suleymaniye Mosque In Constantinople 1570 Melchior Lorck sourced from Openclipart is licensed under CC0 1.0
* Note: Date might not match original source and might be an educated guess.
Downloads: 128
Filesize: 1917965
The Suleymaniye Mosque In Constantinople 1570 Melchior Lorck sourced from Openclipart is licensed under CC0 1.0
* Note: Date might not match original source and might be an educated guess.
|
<urn:uuid:425ad4a0-f4d4-4ad4-84f4-c4dcb20606f8>
|
CC-MAIN-2024-51
|
http://freesvgclipart.com/clipart/the-suleymaniye-mosque-in-constantinople-1570-melchior-lorck/
|
2024-12-06T20:56:39Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066416984.85/warc/CC-MAIN-20241206185637-20241206215637-00817.warc.gz
|
zero
|
1.0
|
a_tag
| false | false | null | null | null |
{
"abbr": [
"zero"
],
"in_footer": [
false
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"1.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.98114 |
Information For Readers
We encourage readers to sign up for the publishing notification service for this journal. Use the Register link at the top of the home page for the journal. This registration will result in the reader receiving the Table of Contents by email for each new issue of the journal. This list also allows the journal to claim a certain level of support or readership. See the journal's Privacy Statement, which assures readers that their name and email address will not be used for other purposes.
|
<urn:uuid:49b122fc-c3bb-4d46-9af3-7bfd85506f98>
|
CC-MAIN-2024-51
|
http://jemit.fmipa.unila.ac.id/index.php/jurnal/information/readers
|
2024-12-06T19:23:35Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066416984.85/warc/CC-MAIN-20241206185637-20241206215637-00817.warc.gz
|
by
|
4.0
|
a_tag
| false | true | null | null | null |
{
"abbr": [
"by",
"by"
],
"in_footer": [
true,
true
],
"in_head": [
false,
false
],
"location": [
"a_tag",
"a_tag"
],
"version": [
"4.0",
"4.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.997205 |
Honours for a prytany treasurer
SEG 28.160 Date: ca. 30 BC
-os son of Manios[1] uninscribed space Eudaimokrates son of Menophilos of Plothea
Pipe-player Diodoros son of Demetrios
of Alopeke traces (5)Secretary of the prytany Par- …
Copy secretary (antigrapheus) Kleomachos son of Aulos of Phlya
Undersecretary Patron of Sphettos
Philemon being the public servant (leitourgountos) in charge of the Sunshade[2] uninscribed space
col. 1
col. 2
|
<urn:uuid:b894236c-75ec-4d72-a15b-44d8f993e827>
|
CC-MAIN-2024-51
|
https://www.atticinscriptions.com/inscription/AgoraXV/284
|
2024-12-06T20:04:43Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066416984.85/warc/CC-MAIN-20241206185637-20241206215637-00817.warc.gz
|
by-sa
|
3.0
|
a_tag
| false | false | null | null | null |
{
"abbr": [
"by-sa"
],
"in_footer": [
false
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"3.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.88718 |
Now That's What Love Sounds Like Part 3
So for those just tuning in, this is a 4-part series on my love of audiobooks. You can catch up by checking out Part 1 and Part 2.
To explore other parts of this series, select below:
Did you enjoy this read? Let me know your thoughts down below or feel free to browse around and check out some of my other posts!. You might also want to keep up to date with my blog by signing up for them via email.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Listening to the Universe
During one of these audio-fetching sojourns, I came across Hitchhiker’s Guide to the Galaxy again. I looked at it; it looked at me. It taunted me, reminding me of the times I had tried to read the book and failed. It was antagonistically flirting with me. Just trying to get a rise out of me; figure out what got me going.
I was young and still new to audiobooks. Everything to date, I had already read or there was no textual equivalent for. But if I listened to the audiobook of Hitchhiker’s Guide, it would be cheating, right? Could I really say that I read it? Would trying to listen to it be an admission of failure or just a means of getting it out of the way? After all, I could then say I had “read” it, and that it sucked and to please stop recommending it (we were still a handful of years away from Amazon’s recommendation feature). Realistically, it wasn’t a huge moral challenge, but I still had questions about picking it up, even if briefly. I got over it and checked it out.
The version I had was a single-person narration by Douglas Adams himself. Again, I had no clue if that was relevant or not. I was not an audiobook aficionado. The Star Wars books were narrated by Anthony Heald, which seemed good and they added a handful of sound effects and musical segments from the original score to boot. So that was the only standard by which to measure this one. They were not new terrain but well-worn paths like the ones in the woods I would walk while listening.
I have had many a-ha moments over my life. As a lifelong learner, I’m all but dedicated to them. But the profound a-ha moment of listening to the first 5 minutes of Hitchhiker’s Guide to the Galaxy remains one of my most salient. I fell so damn hard, not just for Douglas Adams but for audiobooks that it entirely changed my life. It has opened so many doors in my life and has given me so much more to think about and enjoy.
In all my antagonism towards Hitchhiker’s Guide over the years, it never occurred to me that I wasn’t properly listening to the book. In its black and white print, it spoke to me but I couldn’t properly listen to the words and because I couldn’t make sense of what was being said. I assumed it was irrelevant and meaningless or in my eloquent teenage mind: wicked stupid.
But then I pressed play. The slightly-nasally voice of Douglas Adams introduced the book. Then with an English accent and smooth delivery of one who is both grounded in the text and has experience working in radio, Adams narrated—not read, not spoke—narrated the first words of The Hitchhiker’s Guide to the Galaxy, “Far out in the uncharted backwaters of the unfashionable end of the Western Spiral arm of the Galaxy lies a small unregarded yellow sun.”
Adams gave me what I was missing. The one thing that someone should have explained to me that I need to have in my head when listening to Adams. He gave me tone. The book was humor; British humor to be precise. I had been reading it through the frame of George Lucas when I should have been reading it through the frame of Mel Brooks or Monty Python.
Instantly, the book became readable. Never mind that, I tasted mana from the gods and I had found two loves in one listen. I made my way through the rest of the books in the series and was grateful for each listening moment. I would routinely return to listening to the Hitchhiker’s Guide over the ensuing decades. Shortly thereafter, I also discovered the BBC radio series, which was equally delightful (I’m not a fan of pitting the two against each other—they’re both wonderful to my ears). I would continue for years to come to listen to each new nugget of Douglas Adams content that would be released in audio from the later BBC series to the Dirk Gently series to Salmon of a Doubt.
So inspired by Adams and his work as well as other similar creators (Pratchett, Monty Python, Red Dwarf), that I eventually created on my Geocities website (yes, I had one of those) a quirky newsletter inspired by Hitchhiker’s Guide to the Galaxy called the Multiverse Express. It was a monthly publication with fake news (before it was cool, mind you) that spliced together different fictional characters into goofy and ridiculous parodic situations (Hey, in the early days of the web, here is so many worse things I could have been doing). I joined the fan club, I enjoyed Starship Titanic, and was deeply saddened upon his premature death in 2001. But never a week goes by where I’m not making reference to Adams’ work.
I was young and still new to audiobooks. Everything to date, I had already read or there was no textual equivalent for. But if I listened to the audiobook of Hitchhiker’s Guide, it would be cheating, right? Could I really say that I read it? Would trying to listen to it be an admission of failure or just a means of getting it out of the way? After all, I could then say I had “read” it, and that it sucked and to please stop recommending it (we were still a handful of years away from Amazon’s recommendation feature). Realistically, it wasn’t a huge moral challenge, but I still had questions about picking it up, even if briefly. I got over it and checked it out.
The version I had was a single-person narration by Douglas Adams himself. Again, I had no clue if that was relevant or not. I was not an audiobook aficionado. The Star Wars books were narrated by Anthony Heald, which seemed good and they added a handful of sound effects and musical segments from the original score to boot. So that was the only standard by which to measure this one. They were not new terrain but well-worn paths like the ones in the woods I would walk while listening.
I have had many a-ha moments over my life. As a lifelong learner, I’m all but dedicated to them. But the profound a-ha moment of listening to the first 5 minutes of Hitchhiker’s Guide to the Galaxy remains one of my most salient. I fell so damn hard, not just for Douglas Adams but for audiobooks that it entirely changed my life. It has opened so many doors in my life and has given me so much more to think about and enjoy.
Source: John Johnson |
In all my antagonism towards Hitchhiker’s Guide over the years, it never occurred to me that I wasn’t properly listening to the book. In its black and white print, it spoke to me but I couldn’t properly listen to the words and because I couldn’t make sense of what was being said. I assumed it was irrelevant and meaningless or in my eloquent teenage mind: wicked stupid.
But then I pressed play. The slightly-nasally voice of Douglas Adams introduced the book. Then with an English accent and smooth delivery of one who is both grounded in the text and has experience working in radio, Adams narrated—not read, not spoke—narrated the first words of The Hitchhiker’s Guide to the Galaxy, “Far out in the uncharted backwaters of the unfashionable end of the Western Spiral arm of the Galaxy lies a small unregarded yellow sun.”
Adams gave me what I was missing. The one thing that someone should have explained to me that I need to have in my head when listening to Adams. He gave me tone. The book was humor; British humor to be precise. I had been reading it through the frame of George Lucas when I should have been reading it through the frame of Mel Brooks or Monty Python.
Instantly, the book became readable. Never mind that, I tasted mana from the gods and I had found two loves in one listen. I made my way through the rest of the books in the series and was grateful for each listening moment. I would routinely return to listening to the Hitchhiker’s Guide over the ensuing decades. Shortly thereafter, I also discovered the BBC radio series, which was equally delightful (I’m not a fan of pitting the two against each other—they’re both wonderful to my ears). I would continue for years to come to listen to each new nugget of Douglas Adams content that would be released in audio from the later BBC series to the Dirk Gently series to Salmon of a Doubt.
So inspired by Adams and his work as well as other similar creators (Pratchett, Monty Python, Red Dwarf), that I eventually created on my Geocities website (yes, I had one of those) a quirky newsletter inspired by Hitchhiker’s Guide to the Galaxy called the Multiverse Express. It was a monthly publication with fake news (before it was cool, mind you) that spliced together different fictional characters into goofy and ridiculous parodic situations (Hey, in the early days of the web, here is so many worse things I could have been doing). I joined the fan club, I enjoyed Starship Titanic, and was deeply saddened upon his premature death in 2001. But never a week goes by where I’m not making reference to Adams’ work.
To explore other parts of this series, select below:
Did you enjoy this read? Let me know your thoughts down below or feel free to browse around and check out some of my other posts!. You might also want to keep up to date with my blog by signing up for them via email.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
|
<urn:uuid:ab265ca8-adc5-44a6-bb59-bb71ab131c60>
|
CC-MAIN-2024-51
|
https://www.byanyothernerd.com/2018/06/now-thats-what-love-sounds-like-part-3.html
|
2024-12-06T19:18:02Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066416984.85/warc/CC-MAIN-20241206185637-20241206215637-00817.warc.gz
|
by-sa
|
4.0
|
a_tag
| false | false | null | null | null |
{
"abbr": [
"by-sa",
"by-sa",
"by-sa",
"by-sa"
],
"in_footer": [
false,
false,
false,
false
],
"in_head": [
false,
false,
false,
false
],
"location": [
"a_tag",
"a_tag",
"a_tag",
"a_tag"
],
"version": [
"4.0",
"4.0",
"4.0",
"4.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.999359 |
Quotation Saturday: Christmas Version Posted on December 20, 2008 by Jane GoodwinDecember 20, 2008 2 Mamacita says: 1. Probably the reason we all go so haywire at Christmas time with the endless unrestrained and often silly buying of gifts is that we don’t quite know how to put our love into words. –Harlan Miller 2. … Continue reading →
|
<urn:uuid:9bd31bcd-2304-4aa4-ba72-36bf6365d8db>
|
CC-MAIN-2024-51
|
https://www.janegoodwin.net/tag/charles-nbarnard/
|
2024-12-06T19:57:28Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066416984.85/warc/CC-MAIN-20241206185637-20241206215637-00817.warc.gz
|
by
|
3.0
|
a_tag
| false | false | null | null | null |
{
"abbr": [
"by",
"by"
],
"in_footer": [
false,
false
],
"in_head": [
false,
false
],
"location": [
"a_tag",
"a_tag"
],
"version": [
"3.0",
"3.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.995992 |
Mamacita says: Oh, my dears, it’s so close now, so very, very close. There are a lot of old, boring, easily offended, humorless people out there who don’t care much for the excitement, the wonder, the sparkles and reflections and … Continue reading
Mamacita says: My daughter was seven when she asked the question I’d been dreading for seven years: “Mommy, is there really a Santa Claus?” However, thanks to Caroline Quiner Ingalls, I knew exactly how to answer her. And, this answer … Continue reading
Mamacita says: When the kids came home on Christmas Eve, I was ready with Christmas cookies. I knew the children were glad to be home for Christmas, but I didn’t really understand all the laughing coming from the kitchen. Then … Continue reading
Mamacita says: 1. Thou shalt not be a victim. Thou shalt not be a perpetrator. Above all, thou shalt not be a bystander. –engraved over the Holocaust Museum, Washington, DC 2. A man is truly ethical only when he obeys … Continue reading
Mamacita says: Oh, my dears, it’s so close now, so very, very close. There are a lot of old older people out there who don’t care much for the excitement, the wonder, the sparkles and reflections and tinsel and candles … Continue reading
|
<urn:uuid:ea6753a0-965b-42fe-9f90-89936f0a7c64>
|
CC-MAIN-2024-51
|
https://www.janegoodwin.net/tag/christmas-eve/
|
2024-12-06T19:38:47Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066416984.85/warc/CC-MAIN-20241206185637-20241206215637-00817.warc.gz
|
by
|
3.0
|
a_tag
| false | false | null | null | null |
{
"abbr": [
"by",
"by"
],
"in_footer": [
false,
false
],
"in_head": [
false,
false
],
"location": [
"a_tag",
"a_tag"
],
"version": [
"3.0",
"3.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.999373 |
Image provided by: Harney County Library; Burns, OR
About Harney valley items. (Burns, Grant County, Or.) 188?-19?? | View Entire Issue (Nov. 1, 1902)
Narrow Chest» The <>ld theory that OMMumption w.- i«i>KM itol i* utterly discredited b' mo,!« u: tiK-dical science. The getm» oi «on- «urnt.li. n iiuux be received from with out. These germ« are every whet« Thev are eon.Usntlv being received an.I cast out bv the healthy »«»ten It is iliv narrow vhe-te.l wlio-c ir. beritanci* r we..», new who fall .« pray to NMisutiif'- tiou becaus«.' the« •re too weak < t lung to re-i-t ami throw ott <h»eu 1 Lx tor Fierce s Golden Medical Discovery make« weak lungs It cut, • strung, obstiuate deep seat ed «ulivi -. bleeding lung >. wcakne»«.«ma«: tion ami other COtlditi«>lis \»l:i. ’i if neglected >>r un skilfully Ue.il«-I tind a falsi ter mination in c«>n- •ntnptioti. -tn th.' -prinr it Snap shot«. Oregon Nule* Jack Spratt could eat no beef \V. C. Brown, u lmpuinr. of Dal Hia wife could vat no hum, las, Folk Countv, was so jubilant So wiltn t ic priceof meat w« nt up over the good price ho r-'Ceiv«'«l fi'r Th« y didn’t care a «1—■ - - n. his hops that h«'threw away $100 in nickels to be scrambled for by If money talks it at least talk- I the children of that place. cents. Tho state of Ort gon has a laml In the human race the butcher area of Bl StiO square miles. Of holds the stakes. this area. (*.S.’»‘23 square miles are The grindstone is one stone that's East of the Cascade mountains never IctY unturned. This fives to Eastern Oregon, two- One wnv to make a slow hors«- thirds of the State’s surface. East ern Oregon has a population of l’a-t is to slop his feed 137.002. Ten years ago the popu- There is generally something l.’it.on was 77.5OS. crooked about a straight tip. i President l.vtle. of the Columbia A man must have some sense to Southern Railroad, who is much know whether he has any or not. interested in getting the Deschutes Om> good way to derive an in Valiev occupied bv settlers, is in come from literature is to sell books. clined to the belief that, if the Gov- ernim nt will undertake extensive People who call each other liars irrigation in that ¡«'ountry, larger often get hurt for telling the truth. results will b«‘ accomplished than The successful pickpocket is would flow from the enterprise now- obliged to keep in touch with the on foot un<ler the Carey act. public. An Ingenioiw Tiealuient bv which Drunkard« ar«’ Hcing Cured Daily iu Spite of Themaelven. \’<> Xoxioua Ihisee, No Weülu ning of the Nerve«. V Pleusunl and >*«>«!• live Cure for the Liquor Habit. It is now gcn«'rally known ami understood that brunitene»» laudi- seas«' and not weakness A body fill- cd with poison, and nerves completo |y shuttered by tieriodical or con stant use of intoxicating liquors, re quires nn antidote «spai le of neu- Utilizine an«l eradicating this poison und destroying tho craving for in toxicants. Sufferers may now cure To any one sending uh $1 .50, one yenr’a »ubaoriptitm lu the themselves nt home without pub I tems , wo will mail thu Chicago Weekly Inter-Ocean one year licity or loss of time from business free or to any one Heading uh three ohh I i aubat-ripiion for the by this wonderful "H*>ME GOLD two paper we will give a year*» aubcriplioti to each paper free, Cl’RE” which has been perfected Thu or after many years of close stmlv and treatment of inebriates. The faithful use according to directions of thia __ » h»uff<. and becanir x. \ hm»baffi* . <4 the .. * ■I 1 hwi i\ rui. au J - of ’ brratlk !<'»l l?e*h u»ul ha»’, t«» wonderful discovery in positively rppetite •* vrritr*. Mr. >C- I. Robinett » ! \« ri< l ean •* I waa -|«eT' t«e • ;.su<-d to t-.x I* guaranteed tn cure the nx'st obsti ....... ...... Mtx ...... ’ival Pi- . i.»covcTx Th? hr»: ’< n ’ -:t’. « «.Uxlru i i<» «‘ » wo ! ut .’.tic u- IT ufl.t l nate rase, no matter how har«l a uv>u‘d#v*«n t«c ax is‘ini st that «Trade J. The Admiral Clark testimonial tvi¡Miiii’Hivn. wf whkh iwveial »ux hr th drinker Our records show the mar .1 n. Ila I a’.mo*4 given up i?i u ht n t x ■i nd* |*,''«m»>d rue to fixe x,-,.r t .«;<-t committee which is arranging for Jorgensen is still to the front velous transformation of thousands M<<Teal I hmxacx * a fair tn *. c . r the presentation of a sword to the with low prices. Cull anti see Ilia »i^ u*e uffuin ami in * -h >rt tirr»" xx««- ■ ’it. Ii «v»ntiuur«l it-* u#r until I hu 1 t..k< it of Drunkards into sober industri- For Winter Rending vou cannot find a more liberal offer. •oxtt en I xreigh It' }.«« n xx. ..-«I valiant commander of the Oregon lino of watches, clocks, jewelry, whe-u 1 comtnrns'rd I oalx xveighol p-uii■’* ouh ami upright men. If any of the above, however, do not strike you as what vou It miiv on< .i »»»Ms th»” MatrnK.Lt 1 vw»11 ' k . during th«' late war, have receive«! stationary, etc. pk-.tscU to answer any inquiry ’ I WIVES CURI YOUR HUS want, write uh we will give you a good lilwral olublung offer about IlKKt aud Secretary Mitchell I \s*xTpt th » substitute for ”Gohlen Mt with any periodical publish'd in tbo United Staten Don't put BANDS!! CHILDREN CURI ic.il Idseoven " Not!iing" iu<t as c ' “ is so sanguine «»f success that he For a bilious attcck take Chain YOl:R FATHERS!!This remedy is it off. Nit w is your time Addrri>H, l»r. lhcn-e's Pleasant l'ellet- «k .li has arranged transportation from the cloggetl system from impurities. berlain’s Stomach ami Liver Tab I I in no sense n nostrum but is a spe Phila«l« !pl»ia to Portlaml and re lets and a quick cure is certain cific for this disease only, and is so turn for the Admiral and his wife. For sale by II M. Horton, Burns; skillfully devised ami prepared thai ' Fred Haitie«, Harney. it is thoroughly soluble end pleas Jorgenson repairs watches and ant to the taste, so that it can tie “Something New Vinter the Sun. clocks. Work guarantee«!. given in a cut« of tea or coffee with WAGONS! WAGONS! All doctor« have tried to cur« out the knowledge of the person We will sell you n Mitchell, If you desire to trade for, or buy C ATARRH by the use of powders, taking it. Thousands of Drunkards Rushford or Webber Farm 1!< d neid gases, inhalers an<l drugs in desirable town propertv call at this have cured themselves with this Wagou ; paste form. Their powders dry up ollice. priceless remedy, and us many mor»' :;t Steel Skein $R.'.00 the mticuous membranes causing have been cured ami mn«lc temper ‘,»0.00 34 1 them to crack open ami bl-cl. Th« ate men by having the “Cl’RE” ad (Tubbing rut-a givtn with any 105 00 »1 jiowerfiil acids u«ed in th«- inhalers paper or periodical published in ministered by loving Jricnds ami Send your orders to us, O. C. Co have « ntirelv eaten away the same the I'nittd States. relatives without their knowledge membranes that their u.akers’.Lav«- in coffee or tea, ami believe today nime«i to jcure. while pastes and n with Incendiaries made another at- that they discontinued drinking of «ointments «'snnot reach the disease water-1 tempt laLt Friday to destroy Fort ’.heir ow n fr<ewill DO NOT WAIT. An obi anil experienced practioner Stevens at th«' mouth of thoColum Do not be «lelmled by opp.m-nt nr«l who has for many years made a bia. Efforts to find the inceniarics, misleading ‘ improvement ” Drive «-!.<.-« study and specialty of the who live witbin the fortifications, <«ut th«' disease nt once ami for nil wood WOOD.—Good Juniper treatment of CATARRH, has at. for saie in any quantity, I’riceg bave proved futile. Similar efforts time. Thc“HO.MEGOI.DCVRE”is bi«t perfected a Treatment which going up. Call on W. E. Huston to burns the post were made some sold at ihc extremely low price of wh«-n faithfully us«<l, nut only re :n the Dnrkneimer building, One Dollar, thus placing within time ago. lieves at once, but permanently reach of every L<>«ly a treatment more «•nr« s CATARRH, by removing th- ’ effectual than others costing <25 to Mr. 0. 1’. Daugherty, well known A Remarkable Rceortl. «iiuse, stopping the discharges, and throughout Mercer ami Summer Chamhei Iain’s Cough Remedy ♦•«(*. F ill directions accompany curing all iutlamniation. It is th»- counties. W. Va . most likely owes hn9 a remarkable rec«ird. It has each package Special advice by only remedy known to science that his life to the kindness of a neigh been in use for over thirty years, skilled physician« when reaneshd aclnallv reaches the afilictcl parts, bor. lie was almost hopelessly af- «luring which time many million without extra charge. Sent prepaid the Southern Oregon State Normal School opens Wednesday, i Ins wonderful remedy is known tlirtiii with diarrhoea ; was attend battles have been sold and ue«-d. It to anv part of the world on receipt September 10th. Full faculty ; improv« d building; exhaustivo ns “SNI FFLES the Gl ARAN ed bv two physicians who gave tiim has long been the standard uml of One Dollar. Address Dept H-t’.H.I course of stndv ; ea< h «b-piirtin- it filled by a specialist Latin TEED CATARRH Cl’RE.” and is little, if any. r-'.ief, when a neigh main reliance in the treatment of EDWIN 1’. GILES «t COMPANY, | and economics added for th«- benefit of those preparing to teach sold at the extremely low price of i bor learning of his serious condi «•roup in thousands of homes, vet i 2330 ami 2332 Market Stieel, Phil in High Sch >ols. but are optional $200 in <-n«h prises for excel adelphia One Dollar, each package contait- tion. brought him a bottle of Cham during all this time no csfc has All correspondence strictly con lence in oratory and athletics, Kxp-riees light; social conditio is in*g internal and ■ xternal medicine berlain’s Colic, Cholera and Diar ; ever been reported to the manufact fidential. ideal Send for catalogue. • B. F MULKEY’, President. miflieient for a full month’s treat rhoea Remedy, which cured him in i urers in which it failed to effect a ('Ll F FOItl) THOMAS, Secretary ment and e’.’ervtbing necessary t<> ¡ c « r ti.un twenti -four hours. For cure. When given as roop U9 the CA.8TOIT.IA. perfect use. i -t K ’4 YW Hurt ttWQS MM sal«- by 11. M. Horton, Burns; Ered ehihl becomes hoar«-« or even us Be«r. th» ■SNTFFLES” i« the only per BigMtam Unities, Ilartiev. soon as the crot’.py cough appears, fect CATARRHCl’RE ever mid«’ •f it will prevent the attack. It is O aw .— _ —--------- —- and is now recognized as the only 1 •* 1 " H”1 4l*â’s pleasant to take, many children Dan th-. ► afe and positive cure for that an Siynatiro like it. It contains no opium or noying and disgusting disca-e. It ef CABTOnTA other haripfid substance and may cur- s all inilatnstion quickly and Be»n th» 113 K’’#ú H|W *iWar5 : be given ns confidei.ily to a baby permanently un«I is also wonder fully quick t«« relieve HAY FEVER as to an adult. For sale by H. M. Uieiuktin akes short reads. <>r ( <*>LD in the HEAD. Horton, Burns; Fred Haines, Har < ’ATARRH when neglect««! often For kittv yeum the NEW YORK WEEKLY THIHUFiF. haa been » ns'lotml ner. 1- a<G tiiCONSl MI’TION— S.NT’F weekly new -pap« r, res«! uimot entirely by far.in-rs, ami I ih « Hiijmea ihr cent) NOTICE FOR PCBUCATION. FLES” will save you if you u«<- it defire and support <>( the Anierieiin people to «degree never uttained by any I C m Ian<! lluro», Oregon.22. l'RVJ nt « nee. It is no onlinary remedy, similar publication. THE Notice in hereby <iven that the fnilowinr, :ul li.; ht louas. but a complete treatment which is named ha< tiled notice of hia intention NEW-YORK TRIBUNE EARMER p ■itivclv itnar int“<d to cure tn mr ite final proof In wnppnrt of claim, anr j«a?H is made aosolutely for (armers and their iuiuilivs. The lirwt number was iMued • ATA1JRÍI in any form or stnse •het .«.-I f»t- 4 wdlbe made before Keg« »tor ami Receiver at P irn*. Oregon. *#n Not amber 1, if used according to the <lire<-tioos Jiovemlier "III, I'.SH. v .z: «hieh m’-oifipany <a<h laekag«. Ev ry department of ngr'ctilturnl iml’ift'ry is r««vorc«l Hr special contributors Dtwii«*l IV. .lorclkn. Don’t <ielav but send for i’ at mice who are leaders in their re»|s-etive lines, and the TKIBI'NE FARMER will b« II.I entre Un. »t<;, for the si?4, Sec ». Tp and write lull particulars as t>> in every sense a liiah «dsss, up to date, live, «tiilerprising agricultural p«|w*r pro S o’l V. lltClS, s., r. t-.’»»« w m . THIS TRIP Ile tiatno» Ihr fo,fowin< witn»««»« to prore votir condition, mid von will re (iisely illimtrated with pictures of live stock, model farm buildings uml homes, icorr- :T<j'rro»v •• - t « a ! Hai» • st hO vs.-4| ....gh’ •• l<M lii. «-ontluuo'ie r<-»i‘l«‘nee ujHin eu.l eultlvaifon Sold Everywhere. ceive -preial mlvice from the dis uvricultnrul machinery, elc.. 1.. r ■ « 5 62 lu» ot «kl.l I aiu ). vU: TJiitnr ▼»»! iFCJUltr coverer of this wonderful reinvth Farmers' wives, sons ami daughters will find special pages for entsrtair.ment (.tight Sf I 56 Tsrx.4 adr by MAMMED OIL CO. .1 !.. Sil». Xoah Otr.l, P F. Hein». «u<l Vvt I a .4A UMbwa «•gnrilitig vour «-as«- without cost to Regular priiefl per jeur, with l*IlMb|lX0. AddreM 1T> MB, 1 ums Or. Jinir.iio, ail of Lkwen. Ortiron The Tip «rm tn hi^*Y rn«’-ct''p/'iy’*'* W>|. I V, Reifbfor. v«m I h ’V oik I the r«;gulsr priceof i*, »tie > • 10 Martin vit!i Smoirie«« llafrrl wâinff JJ lOHifh Prrttnrf Car ‘ SNTFI-LKS’’ the “(H ARAN- tridge' I !»IH f.jpc ha » • vc- TEED CATARRH cl’UE.’’ Icr-tv «,( <«vrr 2.ÍXM) let » per •econd with consequent, Sent prepaid to any address in fUt »r-.,“« rnry anJ NOTICE TO CRF.DITull*. Í’ (I li.iitns the I nited St.itpg <ir Canntia <>ti re the »»rj.wer f A FREE PATTERN «•»•ipt of One Dollar. A«ldre«s Dept »? 40 K . k pnw In lhe Coiifitv Court of the State of Ore i'.- rae«m.«t»e • i ’S • «O ’ -• f r w'"n i »»Mr«»». •• II I U EDWIN B GILES A COM ,» t • whew e-H wOF. •• gon fo- Malheur County •• »f »i.i« ’•<•» PANY. ‘233H and 2332 Market m W» (• t .-4 «« . riFi-tf. •• In tin- matter of the Ltst ttner in Street, I*hilu«l«.'Iphia. r’/» i <r- •' n - l - Will an<l Test>ment «>( itiir f n ul/J f»r 9 T. M. Neaweard, I'eeeaae-l EftAft A,*/** - r k *< of ’** a**r*n,ffr<’ loot 3 ISII■■ overs«, or.e of the •*>'. known OREGONIAN and ITEMS, one Year, for $2.00 A WORTHY SUCCESSOR àiui BICYCLES BELOW COST ”tnp III«* Coligli uml XVurL iifFtlin Odd. MAGAZINE Irti MARLIN Finr »’VSCC -IPANV Nf WV HAVÇW. Laxativ«’ Bromo-« Dii ni m1 Tablet» «•uro a cobi in one day. No Cure, N ■ pay. Price 25 cents. Oregonian nn«l Items. $2.00 CASTOR IA . U wc pfrtnpUy obtain L'. S- BAZAR- Head DVMlsi, «k. tell er plxHu o( inventi« D for inr;ri4.>rt ou t«t< ntaHI|ty. F« r fr< # Nek, Ijow sce-itvYo s nr 111 OFC »HU iiu.noi nRuL-IWflnpj » ■P atterns A4 The Kind You Have Always Bough! Baars the tjlgaa'.xre of XNnwH «’M Prrfofdt h *» x MIO* I IS • - ’-Di ' H II r»«» k- M ttt fir * l.r •». » I h.'Lk - ' !! p Ba'tiwa <>. i, A K I the R ecall HMn-117 Ant ìht St.. I Ii»»r i ' torufli PATENTS M9CALL/TÎ for Infants and Children. S- A- _he» 1 » *••»> CO . MW llWH CASNOW& OPPOSITE U S PATENT OFFICE t- WASHINCTON. D.C. Notice is hereby gi en that hr order of the County Cour' of the State of Oregon, for Malheur County, made and eriteie.l on the 2nd <lav of Sept, tnher, Hk)2. that Letters TeHta.’iientary were iss'le.l to the ■lo.lereigned. May II. C e.aueard, Hp- oointing tier as Hole exe ntrix of the L h M. Wi I mid Tesliiment of I' XL Seawear I, <l< i-eaaed. til |M*rsonH having claim» »'zain-t Raid .•►fate are lii’rehy rotiffed and reqnir >1 to present them, w it’ the prn,w-r votw-hora therefor, within six months frnin «ml af- t. r till« date, to -wit' 2ml .lay of Heptem >er, l(k,2. to Raid executrix at tier place oi reeideneo at Cord, 'lalheur County, ■ iregon, Maj II. C. Seawrard, Executrix. w w w w fie tori.-i of th<> country, socured by u< at one-half co»«. F»«r Motto/« ..... I9(M) and 1901 Models ¿X Ciit.alrx/ius with large pAoliy/rapA«« cngravmyt ¿mi full detailed epocificâtiotiR tint frit to auy nddreaw. We SHIP OM APPROVAL to anyone in U S- or Canada mlAout a ont tn (tdvance and allo«/ 10 DAYS FREE TRIAL I&tó; no r/«lr in ordering from 113, as you do noi newl to pay a cent If the bicy«’.1o does not suit you. SOO SECOND-HAND WHEEI& t»krn In Inule by our Cbh.’kfn retal»tt or»». <0 4n *C| mtnyp«d»»iwv. IV it. »>innrl»s,»po««in< •-<!» of «li »inda a th rrvuWr -u.,lry »»«»low. A worin of l.itormaUou Writ* tvr It, IMTC WlMTKn h’ ' <■' ,"*n to r,',n •N I V nNIVIEII und i thll.lt • HHiniUo jnoy model hicyrle. In your »pare flp.e you can m»k<: •»<» ««a ttiO k w.»-l< Nwldes hkvlng ri wh«»l to ride for yot.r-wlf. _ k rellkhle lu-nwm In euch town to distribute cat «Ioni. - for us In 3cbaoi'e ♦«! » hfoyriw. Writ» todnv tor fro« cataforw »«id our »| h < I"’ « w » iv . L. MEAD GYCLE CO., Chicago,' III.
|
<urn:uuid:3a535a1e-53f3-4b33-852f-f851e1d0ee22>
|
CC-MAIN-2024-51
|
https://oregonnews.uoregon.edu/lccn/sn96088256/1902-11-01/ed-1/seq-4/
|
2024-12-07T23:46:53Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066433271.86/warc/CC-MAIN-20241207224914-20241208014914-00717.warc.gz
|
mark
|
1.0
|
a_tag
| false | false | null | null | null |
{
"abbr": [
"mark"
],
"in_footer": [
false
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"1.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.949541 |
Article (2020)
Open Acess document in PolyPublie and at official publisher |
Open Access to the full text of this document Published Version Terms of Use: Creative Commons Attribution Download (4MB) |
Abstract
In urban planning and transportation management, the centrality characteristics of urban streets are vital measures to consider. Centrality can help in understanding the structural properties of dense traffic networks that affect both human life and activity in cities. Many cities classify urban streets to provide stakeholders with a group of street guidelines for possible new rehabilitation such as sidewalks, curbs, and setbacks. Transportation research always considers street networks as a connection between different urban areas. The street functionality classification defines the role of each element of the urban street network (USN). Some potential factors such as land use mix, accessible service, design goal, and administrators’ policies can affect the movement pattern of urban travelers. In this study, nine centrality measures are used to classify the urban roads in four cities evaluating the structural importance of street segments. In our work, a Stacked Denoising Autoencoder (SDAE) predicts a street’s functionality, then logistic regression is used as a classifier. Our proposed classifier can differentiate between four different classes adopted from the U.S. Department of Transportation (USDT): principal arterial road, minor arterial road, collector road, and local road. The SDAE-based model showed that regular grid configurations with repeated patterns are more influential in forming the functionality of road networks compared to those with less regularity in their spatial structure.
Uncontrolled Keywords
urban transportation network; street functionality classification; stacked denoising autoencoder; deep learning; centrality measures; machine learning
Subjects: |
1000 Civil engineering > 1000 Civil engineering 1000 Civil engineering > 1003 Transportation engineering |
---|---|
Department: | Department of Civil, Geological and Mining Engineering |
PolyPublie URL: | https://publications.polymtl.ca/9390/ |
Journal Title: | ISPRS International Journal of Geo-Information (vol. 9, no. 7) |
Publisher: | MDPI |
DOI: | 10.3390/ijgi9070456 |
Official URL: | https://doi.org/10.3390/ijgi9070456 |
Date Deposited: | 16 Aug 2023 12:27 |
Last Modified: | 28 Sep 2024 08:18 |
Cite in APA 7: | Noori, F., Kamangir, H., King, S. A., Sheta, A., Pashaei, M., & SheikhMohammadZadeh, A. (2020). A deep learning approach to urban street functionality prediction based on centrality measures and stacked denoising autoencoder. ISPRS International Journal of Geo-Information, 9(7), 23 pages. https://doi.org/10.3390/ijgi9070456 |
---|---|
Statistics
Total downloads
Downloads per month in the last year
Origin of downloads
Dimensions
|
<urn:uuid:fa235995-ad32-440f-9b58-abf52a5a5f14>
|
CC-MAIN-2024-51
|
https://publications.polymtl.ca/9390/
|
2024-12-08T01:04:17Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066433271.86/warc/CC-MAIN-20241207224914-20241208014914-00717.warc.gz
|
by
|
4.0
|
a_tag
| false | false | null | null | null |
{
"abbr": [
"by"
],
"in_footer": [
false
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.960406 |
Economic Research Centre 4-wave Survey Data from Employers in England (2020-2023): Line manager training and organizational approaches to supporting well-being.
dc.contributor.author | Blake, Professor Holly | |
dc.contributor.author | Roper, Stephen | |
dc.contributor.other | Blake, Professor Holly | |
dc.contributor.other | Roper, Stephen | |
dc.contributor.other | Wishart, Maria | |
dc.contributor.other | Hassard, Juliet | |
dc.contributor.other | Leka, Stavroula | |
dc.contributor.other | Thomson, Louise | |
dc.contributor.other | Bourke, Jane | |
dc.contributor.other | Belt, Vicki | |
dc.coverage.spatial | Midlands, England | en_UK |
dc.coverage.temporal | Wave 1 collected immediately prior to, and at, the outbreak of COVID-19 pandemic in the UK (pandemic declared by WHO on 2020-03-11). Waves 2, 3, 4 collected during the pandemic (which ended on 2023-05-23). | en_UK |
dc.date.accessioned | 2024-11-28T08:47:50Z | |
dc.date.available | 2024-11-28T08:47:50Z | |
dc.date.issued | 2024-11-28 | |
dc.identifier.uri | https://rdmc.nottingham.ac.uk/handle/internal/11651 | |
dc.description | There are multiple papers associated with this sub-study: “Mental health at work: a longitudinal exploration of line manager training provisions and impacts on productivity, individual and organizational outcomes”. Each paper is associated with a separate dataset, which includes only the variables used within that specific paper. This metadata record refers only to the dataset associated with the second paper: Line manager training and organizational approaches to supporting well-being. | en_UK |
dc.description.abstract | Employee mental health and well-being (MH&WB) is critical to the productivity and success of organizations. Training line managers (LMs) in mental health plays an important role in protecting and enhancing employee well-being, but its relationship with other MH&WB practices is under-researched. The aim was to determine whether organizations offering LM training in mental health differ in the adoption of workplace- (i.e. primary/prevention-focused) and worker-directed (including both secondary/resiliency-focused and tertiary/remedial-focused) interventions to those organizations not offering LM training and to explore changes in the proportions of activities offered over time. We conducted secondary analysis of enterprise data from computer-assisted telephone interview surveys. The analysis included data from organizations in England across 4 years (2020: n = 1900; 2021: n = 1551; 2022: n = 1904; 2023: n = 1902). | en_UK |
dc.language.iso | en | en_UK |
dc.publisher | The University of Nottingham | en_UK |
dc.rights | CC-BY | * |
dc.rights.uri | https://creativecommons.org/licenses/by/4.0/ | * |
dc.source | Workplace mental-health and well-being practices, outcomes and productivity (ESRC Grant number: ES/W010216/1). | en_UK |
dc.subject.lcsh | Labor supply | en_UK |
dc.subject.lcsh | Work environment | en_UK |
dc.subject.lcsh | Employees -- Mental health | en_UK |
dc.subject.lcsh | Psychology, Industrial | en_UK |
dc.subject.lcsh | Personnel management | en_UK |
dc.subject.lcsh | Work -- Psychological aspects | en_UK |
dc.subject.mesh | Psychology, Industrial | en_UK |
dc.subject.mesh | Occupational Health | en_UK |
dc.subject.mesh | Work – psychology | en_UK |
dc.subject.mesh | Mental Health | en_UK |
dc.title | Economic Research Centre 4-wave Survey Data from Employers in England (2020-2023): Line manager training and organizational approaches to supporting well-being. | en_UK |
dc.title.alternative | Mental health at work: a longitudinal exploration of line manager training provisions and impacts on productivity, individual and organizational outcomes. Data from TPI paper 2: Line manager training and organizational approaches to supporting well-being. | en_UK |
dc.type | Dataset | en_UK |
dc.identifier.doi | http://doi.org/10.17639/nott.7497 | |
dc.subject.free | workforce, workplace, mental health, training, managers, prevention, secondary data analysis. | en_UK |
dc.subject.jacs | Subjects Allied to Medicine::Others in subjects allied to medicine::Occupational health | en_UK |
dc.subject.jacs | Business & Administrative Studies::Business studies | en_UK |
dc.subject.jacs | Biological Sciences::Psychology::Applied psychology::Organisational psychology | en_UK |
dc.subject.jacs | Biological Sciences::Psychology::Applied psychology::Business psychology | en_UK |
dc.subject.lc | W Medicine and related subjects (NLM Classification)::WA Public health | en_UK |
dc.subject.lc | R Medicine::RA Public aspects of medicine::RA 421 Public health. Hygiene. Preventive Medicine | en_UK |
dc.subject.lc | H Social sciences::HF Commerce | en_UK |
dc.date.collection | Wave 1 collection dates: 2020-01-06 to 2020-03-20 Wave 2 collection dates: 2021-01-28 to 2021-04-15 Wave 3 collection dates: 2022-01-27 to 2022-05-20 Wave 4 collection dates: 2023-01-16 to 2023-05-05 | en_UK |
uon.division | University of Nottingham, UK Campus | en_UK |
uon.funder.controlled | Economic & Social Research Council | en_UK |
uon.funder.controlled | Other | en_UK |
uon.datatype | Dataset in IBM SPSS Statistics (Version 27). The variables used in the analysis were primarily binary, dichotomous variables measured as yes/no. | en_UK |
uon.funder.free | The Productivity Institute | en_UK |
uon.grant | ES/W010216/1 | en_UK |
uon.grant | ES/V002740/1 | en_UK |
uon.parentproject | Workplace mental-health and well-being practices, outcomes and productivity (ESRC Grant number: ES/W010216/1). | en_UK |
uon.collectionmethod | Data were collected using structured computer-assisted telephone (CATI) interviews. Interviews were conducted by call centre operatives from a UK-based independent market research company. Approximately 12%-14% of interviews were subject to live listening quality control (QC), with around 5-10% of interviews undergoing full QC (listening to recordings and checking data once the survey is complete). | en_UK |
uon.legal | The data are owned by the Enterprise Research Centre, University of Warwick. Participants in the surveys provided oral consent which was documented by the telephone operatives, and the data were analysed anonymously. | en_UK |
uon.rightscontact | Holly Blake (principal investigator of the sub-study), Stephen Roper (principal investigator of the parent study). | en_UK |
uon.institutes-centres | University of Nottingham, UK Campus | en_UK |
uon.identifier.risproject | RIS 6297981 (parent study) and RIS 18525748 (sub-study relating to this dataset) | en_UK |
dc.relation.doi | 10.1093/occmed/kqae051 | en_UK |
Files in this item
This item appears in the following Collection(s)
-
Public Research Data
A collection of research data, held in this repository, that is publicly available, except where individual embargoes apply
|
<urn:uuid:302778b0-32d5-49e5-9344-1500269c817f>
|
CC-MAIN-2024-51
|
https://rdmc.nottingham.ac.uk/handle/internal/11651?show=full
|
2024-12-08T00:51:25Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066433271.86/warc/CC-MAIN-20241207224914-20241208014914-00717.warc.gz
|
by
|
4.0
|
a_tag
| false | true | null | null | null |
{
"abbr": [
"by"
],
"in_footer": [
true
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.818559 |
es
pinaza
A
Spanish
term in
ConceptNet 5.8
Source:
English Wiktionary
View this term in the API
Documentation
FAQ
Chat
Blog
Documentation
FAQ
Chat
Blog
Related terms
en
dead
➜
en
pine
➜
en
pinnace
➜
Word forms
es
pinazas
(
n
)
➜
Etymologically related
en
pinnace
➜
Links to other resources
en.wiktionary.org
pinaza
ConceptNet 5 is licensed under a
Creative Commons Attribution-ShareAlike 4.0 International License
. If you use it in research, please cite
this AAAI paper
.
See
Copying and Sharing ConceptNet
for more details.
|
<urn:uuid:ed63d67e-61cf-4345-ac41-f6e1b520476a>
|
CC-MAIN-2024-51
|
https://conceptnet5.media.mit.edu/c/es/pinaza
|
2024-12-09T04:17:50Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066460657.93/warc/CC-MAIN-20241209024434-20241209054434-00617.warc.gz
|
by-sa
|
4.0
|
a_tag
| false | true | null | null | null |
{
"abbr": [
"by-sa",
"by-sa"
],
"in_footer": [
true,
true
],
"in_head": [
false,
false
],
"location": [
"a_tag",
"a_tag"
],
"version": [
"4.0",
"4.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.817333 |
Olga Gouni*
Prenatal Sciences Research Institute SOPHIA, Greece
*Corresponding author: Olga Gouni, Prenatal Sciences Research Institute SOPHIA, Dim Iatridi 12, 37300, Greece
Submission: December 11, 2023;Published: February 14, 2024
ISSN 2639-0612Volume7 Issue5
In the contemporary landscape, maternity hospitals abound, equipped with a plethora of obstetricians, midwives, doulas, advanced medical technologies, and numerous options for birthing environments [1]. However, we find ourselves at a fascinating crossroads. Despite the abundance, many women express dissatisfaction with conventional maternity care and express a deep-seated yearning for something more-an essence captured in the concepts of freedom, autonomy, and a greater range of choices in their birthing experiences. Freebirth, a concept non-existing some years back, seems to gain ground, poses questions and revises standards. Language often serves as a mirror reflecting the nuances of a society. The absence of a specific term in many countries to encapsulate the phenomenon of freebirth hints at the complex interplay between cultural norms, societal expectations, and the legal landscape surrounding childbirth. It beckons us to consider whether the experiences and choices of expectant mothers are adequately represented and acknowledged in the broader social discourse.
In the mid-20th century, childbirth underwent a significant transformation with the widespread adoption of medical interventions [2]. Routine interventions and standardized procedures or foolproof protocols found their way to our everyday health system experience. While these interventions have saved countless lives, they have also become more common, raising questions [3] about their necessity. The rise of cesarean sections (C-sections) became a notable phenomenon, initially reserved for emergencies but later expanding to elective procedures, with implications beyond the delivery room [4]. Over the past 23 years of the 21st century, unfortunately and despite the WHO guidelines, the noticeable increase in C-section rates globally holds well. According to WHO, an optimal rate is around 10-15%, but many countries exceed this, with some rates surpassing 50%. Prematurity rates have also seen fluctuations, influenced by various factors such as lifestyle changes, medical advancements, and socio-economic conditions [5]. Are our babies so fast to be born in their effort to survive the high stress of the maternal environment? Or is the mother so stressed by whatever else that unconsciously opts for a shorter gestation for her baby? And at what cost? [6]. As we navigate the 21st century, societal challenges such as adolescent violence and child criminality have become more prominent [7]. While it’s essential to approach these issues from a holistic perspective, some scholars explore potential links between early-life experiences, including childbirth, and later behavioral outcomes [8]. Factors like the mode of delivery and neonatal care may contribute to a child’s overall well-being.
Over the decades, cultural shifts have transformed societal perspectives on childbirth. The rise of the information age has empowered women with knowledge and awareness, fostering a desire for active participation in decision-making regarding their bodies and birthing experiences. The traditional model of paternalistic care, where medical professionals make decisions on behalf of the patient, in this case the birthing mother, is increasingly being questioned. A longing for more individualized, woman/family-centered care [9] is spreading fast, implying a disconnect with expectations or a potential misalignment between the expectations of expectant mothers and the reality of institutionalized maternity care [10]. While hospitals and medical professionals strive to provide safe and efficient care, the one-sizefits- all approach may not cater to the diverse needs and desires of individual women.
While maternity hospitals are equipped with skilled professionals, the demand for a more holistic, individualized approach to maternity care is growing. Women seek care that goes beyond the clinical aspects, acknowledging the emotional, psychological, and cultural dimensions of childbirth. This desire is reflected in the increasing reconnection of the woman with her inner power for creating new life potentiality and being potent enough to synergize with her baby at birth [11], thus leading to alternative birthing options.
Childbirth, a profound and life-altering experience, is more than a medical event-it’s a journey that intertwines the physical, emotional, and cultural aspects of a woman’s life. That’s the reason why women express a deep yearning for emotional support during the birthing process. Midwives and doulas or other health professionals often try to fulfill this need by offering continuous, personalized care, emphasizing the importance of the emotional journey alongside the physical aspects of childbirth. However, we are still under the hypnotic trance of the centuries long conditioning of how a mother gives birth to her child and how the child gives birth to the self. The early psycho-prophylaxis efforts failed as, in their efforts to meet the sociopolitical needs of the times, placed more control on the woman under the guise of helping her to release her stress [12]. The obedient ones had the trophy, painless birth, while the disobedient one was to lose herself in pain. Of course, the medicalization of childbirth holds strong and in the majority of cases disguised under the sheepskin of assistance, support, compassion and the such. One needs to be intelligent to distinguish between authentic support and disguised control. In this light, it makes sense why the disobedient women who go for freebirth reject assistance (unassisted birth) or opt for the nonpresence of birth professionals. As if safe birth professional is the absent birth professional and here is that the paradox makes its own appearance: On the one hand, the diverse tapestry of global childbirth experiences while on the other hand, the majority of countries seem to lack a specific term for a phenomenon that resonates deeply with expectant mothers. This linguistic gap raises thought-provoking questions about the intersection of societal realities, cultural norms, and legislative frameworks surrounding childbirth [13].
In a survey to map the landscape as concerns Freebirth and whether there is a legal term (with all its paraphernalia) or not, only in 10 out of 23 countries the term was present (although even in these cases, the national language terms were nothing but translations of the English term. In countries where a distinct term has been introduced for this birthing phenomenon, it raises intriguing questions about the alignment-or lack thereof-between legislative frameworks and the lived experiences of women. Does the introduction of new terminology signal a cultural shift, an attempt to bridge a perceived gap between legal structures and the evolving landscape of childbirth experiences? Certainly it makes you reflect on the loud or silent hues of concepts as bearers of values, why the focus is on Freedom and not another concept and why it is also a strong rejection of assistance and the birth professional? The quest for freedom, autonomy, and choices in childbirth is a manifestation of a broader societal movement towards human/ individual empowerment. Women are increasingly seeking active roles in decision-making, desiring birthing experiences that align with their values, preferences, and cultural backgrounds. The absence of a recognized term in the majority of countries suggests an unseen layer of challenges faced by women seeking autonomy and alternative birthing experiences. It prompts us to consider whether current legal frameworks adequately address the diverse needs and desires of expectant mothers. Are the choices and preferences of women during childbirth sufficiently acknowledged, respected, and integrated into the legislative fabric of each society?
As we navigate the global landscape of maternity care, it becomes imperative to recognize the diversity of women’s experiences and the significance of their choices during childbirth [14]. The introduction of specific terms in some countries reflects an acknowledgment of the need for a more nuanced, woman-centered approach, inviting a reevaluation of existing legal frameworks to better align with the evolving landscape of maternity care. The linguistic gap between societal reality and legislation invites us to bridge the divide. It is an opportunity to foster inclusivity in legal frameworks, ensuring that the diverse experiences and choices of expectant mothers are not only recognized but also safeguarded. It beckons us to reconsider whether our language and legislation adequately reflect the evolving narratives of childbirth, and whether they stand as true allies to mothers, fathers and babies navigating the profound journey into parenthood. It is high time we considered the collective responsibility to create a more inclusive, empowering, and respectful landscape for families worldwide.
© 2024 Olga Gouni, This is an open access article distributed under the terms of the Creative Commons Attribution License , which permits unrestricted use, distribution, and build upon your work non-commercially.
|
<urn:uuid:01940ff4-b217-482e-a0ed-2abfc79d1fc7>
|
CC-MAIN-2024-51
|
https://crimsonpublishers.com/pprs/fulltext/PPRS.000672.php
|
2024-12-09T04:04:05Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-51/segments/1733066460657.93/warc/CC-MAIN-20241209024434-20241209054434-00617.warc.gz
|
by
|
4.0
|
a_tag
| false | false | null | null | null |
{
"abbr": [
"by"
],
"in_footer": [
false
],
"in_head": [
false
],
"location": [
"a_tag"
],
"version": [
"4.0"
],
"element": null,
"left_context": null,
"right_context": null
}
| false | false |
Latn
|
eng
| 0.996912 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.