added
stringdate 2024-06-03 18:26:11
2024-06-04 03:14:13
| created
stringdate 2013-04-29 18:49:42
2014-01-03 01:38:26
| id
stringlengths 32
32
| metadata
dict | source
stringclasses 2
values | text
stringlengths 237
356k
| version
stringclasses 1
value |
---|---|---|---|---|---|---|
2024-06-03T21:29:50.578Z
|
2013-05-18T10:03:57.000Z
|
elggau7kmejprneqobhlykwbnhrxfu3s
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:60493",
"uncompressed_offset": 117793369,
"url": "globalvoicesonline.org/2009/06/03/china-chinese-peoples-reaction-to-north-korean-missile-test/",
"warc_date": "2013-11-22T14:34:20.000Z",
"warc_filename": "<urn:uuid:a5b2a457-047b-465d-9fda-eacbfdc10b90>",
"warc_url": "http://globalvoicesonline.org/2009/06/03/china-chinese-peoples-reaction-to-north-korean-missile-test/"
}
|
cccc_CC-MAIN-2013-20
|
GlobalVoices in Learn more »
Chinese people's reaction to North Korea missile test
This post also available in:
polski · Chińczycy o północnokoreańskich próbach nuklearnych.
Español · La reacción china ante la prueba de misiles de Corea del Norte
bahasa Indonesia · Reaksi Masyarakat Cina Terhadap Uji Coba Misil Korea Utara
While the international society is working hard to maintain the security and peace on the Korean Peninsula, North Korea has conducted the second nuclear test on 25 May and launched several missile tests the following days. As the Chinese government has been in good relation with North Korea, it would be interesting to see the mainland Chinese people's opinions on the recent North Korea’s military provocation.
Yide, a mainland blogger predicted that China would not show a strong military alliance with North Korea as it did during the Korean war. He listed out three reasons as below:
1)與美國再度軍事對抗不符合大陸的核心利益,大陸早就步入了以經濟建設為中心的軌道,實行的是市場經濟,並實現著與世界經濟之融合。大陸的經濟已與美國的經濟密不可分,兩相依賴;其政治權威之的合法性很大程度上依賴于持續繁榮,而繁榮能否保持則在於能否進入美國市場。
1. Military confrontation with the United States is against Chinese national interests. China has entered into the track of economic centric development and integrated with the global market economy. Economic relation between the US and China is mutually dependent and inseparable; The political legitimacy of the state has been heavily depending on the sustainable prosperity and such prosperity was relied on China's success in entering the U.S market.
2) 自中韓建交之後,北韓便認為中國背離了傳統的社會主義軌道,兩國在意識形態領域出現著巨大分歧,諸多大陸資深評論家已對北韓持嚴厲批評的態度。如張璉瑰 說:“相對於穩定而言,我更關心的是朝鮮半島的無核化。我們的鄰國進行核子試驗不符合中國的利益。”、張玉山則說:“北韓已成為中國的一大問題。它已成為 世界上一個危險的角色。”
2. After the establishment of formal bilateral diplomatic link between South Korea and China, the North Korean government believed that China has been departed from the traditional socialist track. There is a huge difference between the two nations’ ideology and critics from mainland China have made some very harsh criticism on North Korea diplomacy. As Zhang Liangui argued, “Apart from stability issue, I have greater concern over North Korean peninsula's denuclearization. Nuclear test in our neighboring country is definitely in conflict with our national interest”. Zhang Yushan added, “North Korea has become one of the biggest problems for China and it plays a dangerous role in the world.”
3)中韓兩國高層領導多次互訪,並在國際多邊活動中會晤,增進了相互理解和信任,推動了兩國關係的發展。…相比之下,大陸與北韓2008年經濟貿易額僅20多億美元,不足中韓數字的半個零頭。
金正日政權抱著“會哭多鬧得奶吃”的邏輯行事,不顧大陸之感受,逼奧巴馬讓步,這次大約再也不靈。如今的現實是:朝核問題已經成為中國身邊的火藥桶。
3. There have been several senior bilateral and multilateral meetings between China and South Korea to consolidate the mutual understanding and trust. These meetings helped to promote the relation between two countries…..On the contrary, the total amount of foreign trade between China and North Korea is only USD 2 billion, much less than Sino-South Korean trade.
Kim Jong Il is indeed following the logic of “crying over spilled milk” to push the Obama’s administration for more concession regardless of Chinese government's standpoint. However, this tactic can no longer work. Now the fact is: the Korean nuclear problem has become the barrel of gunpowder next to China.
Another Chinese blogger in Shangdong was outraged by North Korea's nuclear test. As she shared in her blog,
正当国际社会最近一在努力争取恢复朝核六方会谈的时候,朝鲜忽然反其道而行之,于5月25 日再次进行地下核试验。到这则新闻时,我真的无语了 。 无赖! 当前的朝鲜局势看上去是稳定的,但朝鲜拥有了核武装之后,其局势或稳定或动荡,最大的承受方就是中国。当然,朝鲜之所以发展核武器,公开目标是指向美国,日本和韩国,但在客观上,她是中国周边地区的新隐患
While the international society has been trying hard to resume the six parties talk, North Korea suddenly moved into the opposite direction and launched the underground nuclear test on 25 May. I was stunned when I read the news. It is a complete rotter! The situation in Korea peninsular has been quite stable in the past few decades. However, once the North Korean owned the nuclear weapons, the regional stability has been upset and China has to bare the consequence. No doubt, the evident target for the development of North Korea nuclear weapons was the United States, Japan and South Korea. But given its geographical position, it is also a potential threat to China.
On the Qiangguo forum, an official website which is run by China’s state owned The People’s Daily, netizens spelled out their anger over the nuclear test in the comment section:
Fengfeng diandian sen wrote,
朝鲜是唯一依靠别国的经济援助试验核武器的国家。也是是唯一在人员密集区进行核爆炸的国家。中国试验地点在新疆罗布泊无人区,而法国是在国外的一个荒岛,由于造成附近土著人患有原子病,要求赔偿的呼声一直缠绕法国政府。而朝鲜试验地点竟在中朝边境地区….
North Korea is the only country which relies on other countries’ economic assistance to develop their nuclear weapons. It is also the only country which launched the test in the densely populated areas. China tested its nuclear in desolated region in Xinjiang and France did the same in a no man island. With all the precaution taken, the French nuclear pollution had affected nearby indigenous groups and the French government has been entangled in indemnification claims and protests. This time, North Korea tested the weapons along the borders of China and North Korea
这种以邻为壑的行为实在令人失望!要知道中国几乎是朝新在世界上仅存的朋友,每年向它无偿提供了大量的石油、粮食。只是靠中国不断的输血朝鲜才能勉强维持至今。但是朝鲜未别国宝贵的援助用于民生,却直接威胁援助国的安全。
Turning its neighbor's land into a battle field is a shameful act. China is the very few friends of North Korea in the international platform and aids it with large amount of oils and food each year. North Korea can only sustain its life with China’s assistance. But now the North Korean government is using other countries civilian assistance to threaten the donor’s security.
Another comment said,
朝鲜核动作,其出发点是要美国的承认,其宿命是核绑架中国
The political gesture of North Korea was to gain American recognition. However, in order to do that, its politics has kidnapped China in term of our national security.
World regions
Countries
Languages
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:37:36.000Z
|
qn3zxz4tgv5regsgevfwyiobeukos3p6
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:60513",
"uncompressed_offset": 158056219,
"url": "lists.maemo.org/pipermail/maemo-users/2008-February/009241.html",
"warc_date": "2013-11-22T14:34:20.000Z",
"warc_filename": "<urn:uuid:a5b2a457-047b-465d-9fda-eacbfdc10b90>",
"warc_url": "http://lists.maemo.org/pipermail/maemo-users/2008-February/009241.html"
}
|
cccc_CC-MAIN-2013-20
|
[maemo-users] conserv battery live
From: Michael Wiktowy michael.wiktowy at gmail.com
Date: Mon Feb 4 12:27:48 EET 2008
On Feb 4, 2008 2:21 AM, Ryan Pavlik <abiryan at ryand.net> wrote:
> Andres Vargas - zodman wrote:
> > somebody know abouts tips for make my battery during more time ?
> I'd suggest searching the archives and InternetTabletTalk.com for
> hints. What I do is turn down screen brightness and disable bluetooth
> and wifi if I really need battery, enabling only what I need.
Along with Ryan's suggestions, the things I do are:
- Set display "Brightness period" to the lowest setting that is usable.
- Set "Switch off display" to lowest setting that is usable.
- Make sure that the apps that you use are not constantly running
processes in the background. Sometimes it means not installing the
apps. Sometimes it means turning town refresh frequencies. Sometimes
this means not running the desktop applet portion of applications.
- When not mobile, keep the tablet plugged in so that the battery is
completely full when you leave the proximity of a power socket. The
charging circuit will stop charging when the battery is full.
Doing these things, the only time I run out of battery is when I use
my tablet *a lot* during the day.
If you are running out of battery in an unusually short period of
time, you might have a faulty battery. It is known to happen.
/Mike
More information about the maemo-users mailing list
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:30:43.000Z
|
cqozszirdvqsydnh5izbcpuqku7belgz
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:60537",
"uncompressed_offset": 198811971,
"url": "openwetware.org/wiki/Endy:Pouring_plates",
"warc_date": "2013-11-22T14:34:20.000Z",
"warc_filename": "<urn:uuid:a5b2a457-047b-465d-9fda-eacbfdc10b90>",
"warc_url": "http://openwetware.org/wiki/Endy:Pouring_plates"
}
|
cccc_CC-MAIN-2013-20
|
Endy:Pouring plates
From OpenWetWare
Jump to: navigation, search
Add to My Links
This is a general protocol is for the standard preparation of plates.
Also see the shortcut method for using pre-made 1.2% Agar in LB from the Building 68 media prep room.
Contents
Notes
• (Optional) pre-heat a H2O bath to 55 deg C.
• If you don't know how to use the autoclave, ask for a demo.
Materials
For 1 L of Media:
• 10 g of Agar (for 1% Agar plates (w/v))
• media components specific to media of interest
• 1 L ddH2O
• Sterile antibiotic stock solution (if required)
Method
Mixing and Sterilizing Media
1. Add dry materials and H2O to a flask sufficiently large to minimize boil-over. (ex.2 L flask for 1 L of media.)
2. (optional, really unnecessary) add a magnetic stir bar and stir the media.
3. Cover the top of the flask LOOSELY with aluminum foil.
4. Autoclave the media on the Fluid Cycle, 30 min, 255 deg C. (Keep in mind autoclave reduces pressure slowly. It will take more time than 30 min to execute the cycle.)
5. Remove media to 55 deg. H2O bath or room temp to cool.
6. Once media has cooled to ~55 deg. C, add antibiotics, if required.
Pouring Plates
1. Obtain 2 sleeves of empty plates. 1 L of media will make about 40 plates.
2. Using sterile technique, pour the media into the plates.
• Cover the base of the plate, and then just a bit more after that.
3. Recap each plate upon pouring. If there are lots of bubbles in your plates (i.e., more than one or two on the edge), you can flame the plate using the small bunsen burner to eliminate bubbles. (See a demo on this). Another way to remove the fine bubbles that may be in your flask before puring is to mist the inside of the flask with a 75% ethanol spray bottle.
4. Leave plates to dry and cool for a while (overnight even).
• It is a good idea to label the stack of plates to indicate antibiotic.
5. Store the plates in their original bags - upside down, so that the gel is hanging downwards (this keeps condensation off the gel).
6. Label the bags following taping rules:
• Red tape in back (indicates LB)
• Tape in front indicates antibiotic (green=Kan, yellow=Amp, more taping/color rules are on the refrigerator in 68-564)
• Also write name of antibiotic, and concentration, on the front piece of tape.
7. Store the labeled bags of plates in the cold room.
Personal tools
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:04:15.000Z
|
qyowtxfk6rqz6lhwaoghjt35zz4po2m4
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:60557",
"uncompressed_offset": 219080997,
"url": "quotationsbook.com/quote/1871/",
"warc_date": "2013-11-22T14:34:20.000Z",
"warc_filename": "<urn:uuid:a5b2a457-047b-465d-9fda-eacbfdc10b90>",
"warc_url": "http://quotationsbook.com/quote/1871/"
}
|
cccc_CC-MAIN-2013-20
|
Quotation added by staff
Why not add this quote to your bookmarks?
Aim at the sun, and you may not reach it; but your arrow will fly far higher than if aimed at an object on a level with yourself. Hawes, Joel
This quote is about aids · Search on Google Books to find all references and sources for this quotation.
A bit about Hawes, Joel ...
We don't have a biography.
These people bookmarked this quote:
More on the author
This quote around the web
Loading...
Search Quotations Book
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:51:02.000Z
|
ziaikrw5ev4q4ktycx55nadsalarc55a
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:60559",
"uncompressed_offset": 219093776,
"url": "quotationsbook.com/quote/gift/41999/",
"warc_date": "2013-11-22T14:34:20.000Z",
"warc_filename": "<urn:uuid:a5b2a457-047b-465d-9fda-eacbfdc10b90>",
"warc_url": "http://quotationsbook.com/quote/gift/41999/"
}
|
cccc_CC-MAIN-2013-20
|
It's easy! Just pick the product you like and click-through to buy it from trusted partners of Quotations Book. We hope you like these personalized gifts as much as we do.
Make and then buy your OWN fantastic personalized gift from this quote
Words today are like the shells and rope of seaweed which a child brings home glistening from the beach and which in an hour have lost their luster. Connolly, Cyril
Make a fabulous personalised bracelet or other form of jewellery with this quote
Click the banner below to pick the kind of jewellery you'd like ...
Choose something popular ...
Make a custom wrapped canvas ...
Make custom holiday cards ...
Make custom t-shirts ...
Make custom holiday gifts for boys ...
Make custom holiday gifts for girls ...
Make custom holiday gifts for men ...
A selection of more great products and gifts!
212 - The Extra Degree
The one extra degree makes the difference. This simple analogy reflects the ultimate definition of excellence. Because it's the one extra degree of effort, in business and life, that can separate the good from the great. This powerful book by S.L. Parker and Mac Anderson gives great examples, great quotes and great stories to illustrate the 212° concept. A warning - once you read it, it will be hard to forget. Your company will have a target for everything you do ... 212°
Click here to buy this »
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T10:02:26.000Z
|
iwc7gfphssvh7fonk2pwflszxntycajd
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:60629",
"uncompressed_offset": 295836420,
"url": "wikitravel.org/en/Cruising_the_Baltic_Sea",
"warc_date": "2013-11-22T14:34:20.000Z",
"warc_filename": "<urn:uuid:a5b2a457-047b-465d-9fda-eacbfdc10b90>",
"warc_url": "http://wikitravel.org/en/Cruising_the_Baltic_Sea"
}
|
cccc_CC-MAIN-2013-20
|
Help Wikitravel grow by contributing to an article! Learn how.
Cruising the Baltic Sea
From Wikitravel
Jump to: navigation, search
This topic is about international cruise ships visiting the Baltic Sea. See Baltic Sea ferries for local cruiseferries on the Baltic Sea.
This article is a travel topic
The Baltic Sea is one of the newer choices in Cruise travel destinations. Like the Alaska cruises this one is only available in the summer months but it is a great way to visit the countries in Northern Europe as well as Germany and Poland. This is a popular Cruise line destination and provides access to most of Northern Europe as the Mediterranean Sea does for Southern Europe.
The Baltic Sea (click for large map)
The Baltic Sea is a brackish inland sea bounded by the Scandinavian Peninsula, the mainland of Europe, and the Danish islands. While brackish this salt content is fairly low at the surface and swimming pools on board ships should be much more pleasant to swim in than those cruising the open ocean.
[edit] Countries
The idea of cruising is to visit places and this Sea provides connections to many interesting places. The following countries have outlets on the Baltic Sea (moving clockwise)
[edit] Other destinations
[edit] Understand
Much of the Baltic sea ices over in the winter so cruises are limited to the summer season.
[edit] Weather
On Shipboard, the air temperature is dominated by the sea temperature which, in turn, depends on the melting of the Winter accumulation of ice each spring. However, by July air temperatures will reach 16 or 17 deg C (61-63 F) rising to 22 deg (72 F) near mainland coasts.
As soon as the ice melts the sea temperature rises rapidly in late Spring and early Summer. For example the Danish islands and in the Southern Baltic near Kaliningrad will only reach 10 or 11 deg C (50-52 F) in May but will rise to 17 to 18 (63-64 F) by August. To the south of Gotland the May temperatures of 5 or 6 (41-43) will become about 16 degrees (61 F) in August. Even in the Gulf of Finland were the May temperature averages of just 1 deg C (34 F) rises to 16 (61 F) or higher approaching St Petersburg in August. The day time temperatures over land can be as high as 30 deg C (86 F) on occasion but will normally be in the mid to lower 20's.
Thunderstorms can strike the area at any time of the year but the late Spring and Summer months (from May to August) will typically have from 2 to 3 thunderstorms per month at Copenhagen and Stockholm rising to 4 or 5 towards the east near Riga, St Petersburg and Helsinki.
[edit] Cruising the sea itself
The Baltic Sea is a large body of water with several bays but is relatively isolated from the ocean. Thus the tides are minimal and the surface fairly smooth in the absence of an actual storm. Cruising this overgrown lake should be a pleasant and smooth experience most of the time.
There is also a canal between the sea and the ocean. Some cruises feature a trip through the Kiel Canal. This can be an interesting experience if you have never been through a canal before. This is a very busy place.
[edit] Get around
Major Cruise Ships frequent these waters with tours that last 10 to 14 days depending on what countries you want to visit. Typically no cruise will reach all of the countries so you have to be choosy. Often one ship will travel the Baltic Sea alternating between a clockwise and counterclockwise traversal of the sea. Some sea days (days without docking) are to be expected.
Somewhat longer cruises may venture out into the North Sea. And North Sea cruises may also sample a few spots in the Baltic. Most cruises will only stop at a few of the available ports so be sure and study the itinerary to determine which sites are featured.
Some smaller lines offer short trips of 3 or 4 days and visit ports in only 1 or 2 countries. A 7 day cruise can leave from England and reach a few destinations in the Baltic Sea.
[edit] Itineraries
Here are a sampling of some of the longer cruises available. This listing does not constitute an endorsement of any particular cruise line. These cruises are available in 2009 but no guarantee that they will be available in subsequent years. Cruise lines often change the itineraries every year.
12 day 2011 cruise on SeaDream Yacht Club:
1 Stockholm, Sweden same
2 Hanko, Finland same
3 Helsinki, Finland same
4 St. Petersburg, Russia same
5 St. Petersburg, Russia same
6 Tallinn, Estonia same
7 Tallinn, Estonia same
8 Visby, Gotland, Sweden same
9 Bornholm, Denmark same
10 Sassnitz, Ruegen Island, Germany same
11 Faaborg, Denmark same
12 At sea At sea
13 Amsterdam, Netherlands same
10 day cruise on Princess Cruise line: (two different cruises are shown depending on departure date)
1 Copenhagen, Denmark same
2 At Sea same
3 Stockholm, Sweden same
4 Helsinki, Finland same
5 St. Petersburg, Russia same
6 St. Petersburg, Russia same
7 Tallinn, Estonia same
8 Gdansk (Gdynia), Poland same
9 Berlin (Warnemunde), Germany At Sea
10 Helsingborg, Sweden Oslo, Norway
10 Copenhagen, Denmark (10 PM)
11 Copenhagen, Denmark same
12 day cruise on Holland America Cruise line: (This cruise alternates between the itinerary shown and the exact reverse order depending on the departure date)
0 Copenhagen, Denmark
1 At Sea
2 Tallinn, Estonia
3 St. Petersburg, Russia
4 St. Petersburg, Russia
5 Helsinki, Finland
6 Stockholm, Sweden
7 At Sea
8 Berlin (Warnemunde), Germany
9 Aarhus, Denmark
10 Oslo, Norway
11 At Sea
12 Rotterdam, The Netherlands
12 day cruise on Celebrity Cruise line. Similar to the reversed Holland America cruise except for the start/ending location.
0 Amsterdam, Holland
1 At Sea
2 Berlin (Warnemunde), Germany
3 At Sea
4 Stockholm, Sweden
5 Helsinki, Finland
6 St. Petersburg, Russia
7 St. Petersburg, Russia
8 Tallinn, Estonia
9 At Sea
10 Copenhagen, Denmark
11 At Sea
12 Amsterdam, Holland
[edit] Featured Ports
Most of the distinct Baltic Cruises feature an extended stay in St. Petersburg, Russia. This means you can visit the historic city for a couple of full days while returning and sleeping on the ship at night. If you only go ashore using Shipboard excursions you will not need a separate Visa (as of 2009)
Some cruises feature Berlin, Germany in the brochures. As you can see from the map above Berlin is no where near the sea and a visit to the city is not included in the price of the cruise. A shore excursion to Berlin will typically cost more that $200 and will take 3 to 3 1/2 hours to reach the city. Travel can be by bus or rail. The cruise ship accommodates this long travel time by arriving early and leaving late. Even with the 6 or 7 hours travel time you will could still have 7 or 8 hours in the city (depending on the cruise). Of course, a shore excursion is optional and you can choose to enjoy the local fishing village or not even leave the ship if you prefer.
Some cruises make a stop in Kiel, Germany which features the Kiel canal, a very popular and busy canal in Europe. A few cruises may even traverse this canal as a way to get from the North Sea to the Baltic sea or vice versa. Traversing the canal is an interesting experience.
The terminal cities for these cruises are great destinations in themselves so you may wish to extend your trip by a day or two.
This is a usable article. It touches on all the major areas of the topic. An adventurous person could use this article, but please plunge forward and help it grow!
Personal tools
Namespaces
Variants
Actions
Navigation
feeds
Destination Docents
Toolbox
In other languages
other sites
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:39:49.000Z
|
osxzyedvvswjuc4asvpd6zycn754vuyd
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:60636",
"uncompressed_offset": 307988098,
"url": "www.abs.gov.au/AUSSTATS/abs%40.nsf/39433889d406eeb9ca2570610019e9a5/b46c269b71f86f21ca2573e8007dd9ab!OpenDocument",
"warc_date": "2013-11-22T14:34:20.000Z",
"warc_filename": "<urn:uuid:a5b2a457-047b-465d-9fda-eacbfdc10b90>",
"warc_url": "http://www.abs.gov.au/AUSSTATS/abs@.nsf/39433889d406eeb9ca2570610019e9a5/b46c269b71f86f21ca2573e8007dd9ab!OpenDocument"
}
|
cccc_CC-MAIN-2013-20
|
Australian Bureau of Statistics
Celebrating the International Year of Statistics 2013
ABS Home > Statistics > By Release Date
1301.0 - Year Book Australia, 2009–10
Previous ISSUE Released at 11:30 AM (CANBERRA TIME) 04/06/2010
Page tools: Print Page RSS Search this Product
MEDIA RELEASE
June 4, 2010
Embargoed: 11.30 am (AEST)
67/2010
Year Book Australia, 2009-10: Media story leads
Australia’s biodiversity
2010 is the International Year of Biodiversity. Australia’s isolation, varied climate and geology makes it one of the most biologically unique and diverse countries in the world. (Page 2)
Australia’s biodiversity has significant economic value. One of Australia’s World Heritage Areas, the Great Barrier Reef Marine Park, contributed approximately $5.4 billion to the economy in 2006-07. (Page 2)
The national economic value generated by 15 of Australia’s other World Heritage Areas is approximately $7.25 billion and 83,000 jobs. (Page 2)
Australia has experienced the largest documented decline in the diversity of its species compared to any other continent over the past 200 years. (Page 7)
Since European settlement, about 13% of Australia’s vegetation has been cleared. This includes 60 per cent of southern coastal wetlands. (Page 13)
Since 2000, the amount of land dedicated to formal conservation reserves has increased from approximately 62 million hectares to approximately 89 million hectares. This is over 11% of Australia’s land area. (Page 17)
Australia’s cultural and linguistic diversity
2010 is the United Nations International Year of the Rapprochement of Cultures. Over 400 languages, including approximately 145 Indigenous languages are currently spoken in Australia. (Page 25, Indigenous languages page 34)
Australians identify with more than 270 ancestries. (Page 25)
2006-07 saw the highest number of people confer their citizenship to Australia since 1999-00. (Page 27)
More then 4 million people have become Australian citizens since 1949. (Page 27)
In 2006, almost three-quarters of people born overseas who had been resident in Australia for two years or more were Australian citizens. (Page 28)
Languages of Aboriginal and Torres Strait Islander peoples – A uniquely Australian heritage
At the time of colonisation, there were about 250 different Indigenous languages spoken in Australia. Most of these languages had several dialects. (Page 29)
Each Australian Indigenous language is associated with an area of land and has spiritual significance. (Page 29)
Australian Indigenous languages can be divided into between 10 and 24 language families. (Page 30)
According to the 2006 Census, 5,769 Australians spoke Yumplatok and 3,869 Australians spoke Kriol, both Indigenous-English contact languages. (Page 32)
Less than 20 Australian Indigenous languages are considered to be strong in the sense that they are still spoken by all generations. (Page 34)
In 1996, 12.1% of Indigenous Australians were Indigenous language speakers. This declined to 11.1% in 2001, and to 9.2% in 2006. (Page 35)
In 2006, Kaurna and Ngarrindjeri languages registered 34 and 159 speakers respectively. These languages were previously thought to be no longer spoken. (Page 35)
Girl Guides – leading the way for Australian girls and young women
In 2008, there were 28,362 Girl Guides in Australia, contributing to the count of over 10 million girl guides in 145 countries worldwide. (Page 46)
This year, Girl Guides celebrates its centenary. In Australia, Guiding developed independently in each State until its official start in 1911. The Federal Council of the Girl Guides Associations of Australia was formed in 1926. By 1945 every state and territory in Australia was active in the Girl Guides. (Page 44)
Australia was a founding member of the World Association of Girl Guides and Girl Scouts, which formed in 1926. (Page 44)
In 1947 the Australian Girl Guides donated the ingredients for the Queen’s wedding cake. (Page 44)
The golden anniversary of the Girl Guides was commemorated in Australia in 1960 with a postage stamp. This tradition will be continued this year with commemorative stamps to be issued in September 2010 to mark the centenary of Girl Guides. (Page 44)
Today, Girl Guides participate in community activities and events such as Clean Up Australia Day, Harmony Day and National Tree Planting Day. (Page 48)
2010 is the Australian Year of the Girl Guide. (Page 42)
Environment
Australia’s transport sector is one of the largest generators of greenhouse gas emissions (Page 84)
The proportion of households with two or more registered motor vehicles increased from 51% in 2006 to 56% in 2009. (Page 84)
Eight in ten people over the age of 18 used a private motor vehicle to get to or from work or full-time study in 2009. (Page 85)
Almost nine out of ten people are concerned about water shortages (89%), around three-quarters are concerned about climate change (73%), and about two-thirds are concerned about the accumulation and disposal of household waste (69%). (Page 88)
Eighty-eight per cent of Australians reported that they took steps to limit their electricity use in the 12 months to 2007-08. (Page 88)
Queensland was the only state to drop in waste re-use, down to 87% in 2009 from 92% in 2006. (Page 96)
Land, Biodiversity, Water and Air
Between 2000 and 2009, the number of endangered fauna species increased by 41%. (Page 112)
The cost of weeds to Australia’s agriculture (impact and control costs) is estimated to be more then $3.4 billion annually. (Page 115)
Australia has reduced its greenhouse gas emissions by 11.3% per capita over the period 1990 to 2007. (Page 127)
Population
Since Federation in 1901, Australia’s population has grown by over 17.6 million people. In 1958 there were more males than females living in Australia, while in 2008, there were more females than males. (Page 192)
Since 2006, net overseas migration has contributed more people to the population than natural increase. (Page 192)
The change in Australia’s age structure is illustrated by the change in the median age. The median age rose from 31.6 years in 1988 to 36.9 years in 2008. Tasmania experienced the largest increase in median age during this period, increasing from 31.4 years in 1988 to 39.4 years in 2008. (Page 193)
In 2008 there were just over 2.8 million people aged 65 years or more in Australia, an increase from 2007 of 67,700 people. All states and territories experienced growth in this age group with the Northern Territory experiencing the greatest increase. (Page 193)
Between June 2007 and 2056, the populations of both Queensland and Western Australia are projected to more than double. During the same period, the Northern Territory is projected to increase by 87%. In comparison, the projected growth at the Australia level is 69%. (Page 196)
The estimated resident Indigenous population at 30 June 2006, was 517,000 people or 2.5% of the total Australian population. (Page 202)
In 2008, 285,200 births were registered in Australia. This results in a total fertility rate of 1.92 babies per woman. This was 19,300 (17.2%) more births than were registered in 2006. (Page 204)
Male life expectancy has increased from 55.2 years in 1901-1910 to 79.0 years in 2005-07. Female life expectancy has increased from 58.5 years to 83.7 years during the same period. (Page 206)
Australians have a life expectancy which compares well with other developed nations. Life expectancy of Australian males (79.0 years) is exceeded only by Iceland, Hong Kong and Switzerland. (Page 207)
Labour
Between June 2008 and June 2009 the labour force grew by 1.5%. During the same period the population aged 15 years and over grew by 1.8%. The difference between these two growth rates reflects a decrease in the labour force participation rate over this period. (Page 233)
The long term rise in the labour force participation rate is driven by the growth in female participation rate. The female participation rate increased from 50.4% in 1988-89 to 58.7% in 2008-09. (Page 234)
During the period 2004-05, the total number of employed people grew by 9.8% to 10.8 million. This comprised an increase of 9.2% in the level of full-time employment and an increase of 11.5% in the level of part-time employment. (Page 234-235)
In 2008-09, over one quarter of the 11.4 million people in the Australian labour force, were born overseas. (Page 236)
The occupation groups with the highest proportions of employed people were professionals (21%) and clerical and administrative workers (15%). The occupation group with the lowest proportion of employed people was Machinery operators and drivers (7%). (Page 241)
Income & Welfare
Average household income in 2007-08 ($811 per week) was 16% higher than in 2005-06. (Page 276)
Tasmania's average disposable household income was 19% below the national average and South Australia was 8% lower. The Australian Capital Territory was shown to have the highest average household income at 27% above the national average. (Page 279)
In 2005–06 average household net worth was $562,900. Owner occupied dwellings were the main form of asset held by households. Balances in superannuation funds were the largest financial asset held by households, averaging $84,500 per household. (Page 282 and 284)
Australians accessing the Newstart allowance on a short term basis, increased by 40% in 2008-09 on the previous 12 months. (Page 295)
Based on 2005–2007 data, the life expectancy of Indigenous people was estimated to be 67.2 years for males and 72.9 years for females. This represents a gap between Indigenous and non-Indigenous life expectancy of 11.5 years for males and 9.7 years for females (page 308)
In 2008 and 2009 The Australian Government Disaster Recovery Payment supported 114,000 Australians adversely affected by events such as the Mumbai terrorist attacks, South-east Queensland storms, flooding in New South Wales, and the Victorian bushfires. (Page 306)
Housing
Data from 2007-08 shows 33% of households owned their homes outright and 35% were owners with a mortgage. A further 24% were renting from a private landlord and 5% were renting from a state or territory housing authority. (Page 320)
Households in Sydney and Canberra had the highest average weekly housing costs – $292 and $270 respectively. At $160 per week, average housing costs in Hobart were the lowest of all the capital cities in 2007-08. (Page 324)
In 2008–09, lending institutions financed 680,000 dwellings for owner occupation, 55,000 less than in the previous year, but still 50% higher than in 1994–95. While the number of established dwellings financed grew 71% over this longer term period, the number of new dwellings financed declined by 17%. (Page 326)
In 2008–09, first home buyers' average borrowings exceeded that of changeover buyers for the first time in over a decade. First home buyers borrowed $269,000 on average, which was $3,000 more than changeover buyers. (Page 326)
Health
In 2007–08 the majority of Australians aged 15 years and over considered themselves to be in good health, with 85% reporting their health status as good, very good or excellent. (Page 344)
Seventy-five per cent of the Australian population reported one or more long–term conditions in 2007-08 (i.e. conditions that have lasted, or are expected to last, for 6 months or more). (Page 344)
There were 137,854 deaths registered in 2007, consisting of 70,569 males and 67,285 females. (Page 345)
Heart disease and strokes were the leading causes of death in Australia for males and females. (Page 346)
The 2007-08 National Health Survey collected the following information on lifestyle behaviours; 21% of adults were current smokers and 13% of adults consumed alcohol at levels which, if continued, would be risky or a high risk to their long term health. (Page 347)
Education
There were 9,562 schools operating in Australia at the time of the August 2008 schools census, of which 71% were government schools. (Page 384)
The 3.5 million students attending primary and secondary schools in August 2008 comprised 2.3 million (66%) in government schools, and 1.2 million (34%) in non-government schools. (Page 384)
Of the 426,700 apprentices and trainees in training at 31 March 2009, about two-thirds were males (66%). (Page 390)
In 2008, there were 1.1 million students enrolled in higher education courses, of whom 63% were aged less than 25 years and 55% were female. (Page 391)
The fields of study most popular in 2008 higher education enrolments were management and commerce, society and culture, health and education. These four fields account for 74% of all higher education course enrolments. (Page 392)
In May 2009, 2.9 million people aged 15–64 years applied to enrol in a course of study. Of these, 93% gained a place and were enrolled. (Page 397)
Crime and Justice
The number of victims of robbery, attempted murder, motor vehicle theft, unlawful entry and blackmail/extortion recorded by Australian state and territory police agencies decreased in 2008 from the previous year. The offence category that recorded the largest decline was robbery, down 8%. (Page 416)
Motor vehicle theft (319 victims per 100,000 persons) was at its lowest rate since national reporting began in 1993. (Page 417)
At last count there were 27,615 adult prisoners in Australian prisons. Of the total adult prisoner population, 93% were men and most prisoners (55%) had served prior prison sentences. (Page 431)
The Indigenous imprisonment rate was 1,769 prisoners per 100,000 adults, 13 times more than the non-Indigenous rate (which is 133 prisoners per 100,000. (Page 431)
Just over 800,000 Australians, aged 15 years and over, were victims of personal fraud in the 12 months prior to being interviewed in 2007. Over half of these victims (453,100) incurred financial harm from the fraud, resulting in a combined loss of almost one billion dollars ($977 million). (Page 437)
Culture
The vast majority of Australians (85%) visit at least one cultural venue or event in a year. (Page 442)
Cinemas, or other public screenings of a film, were the most highly attended arts venue or event. (Page 442)
Residents in the Australian Capital Territory recorded the highest attendance rates for most cultural venues and events of all states and territories, while Western Australians had the highest attendance rate at zoos and aquariums. (Page 442)
Attendance rates for females tended to be higher than for males across all cultural venues and events. (Page 442)
Industry
In 2007–08, the value of Australian production, or gross domestic product (GDP), was $1,084 billion, an increase of 4% from 2006–07. In 2007–08, the ratio of GDP to the estimated resident population (GDP per person) was $51,253. (Page 471)
The Construction industry had the highest average annual rate of growth (just over 6%), followed by the communication services (6%) and finance and insurance (5%). (Page 471)
The Property and business services industry had the greatest number of businesses at June 2007 (507,508 or 25% of the total), followed by construction (16%), retail trade and agriculture, forestry and fishing (both 11%). There was a marked decline (4%) in businesses within the Electricity, gas and water supply industry. (Page 475)
Agriculture
At 30 June 2008, the estimated total area of establishments with agricultural activity was 417.3 million hectares representing 54% of the total land area. Six per cent of this land had been cropped. (Page 484)
In 2007–08, 28% (39,600) of all agricultural establishments reported irrigation activity. (Page 485)
The majority of agricultural businesses were mainly engaged in beef cattle farming, grain growing, mixed grain/sheep/beef farming, sheep farming, or dairy cattle farming. (Page 487)
On an agricultural commodity basis, slaughtering of cattle and calves contributed most to the gross value of production ($7.4b) followed by wheat ($5.3b), milk ($4.6b), vegetables ($3.4b) and hay ($2.8b). (Page 487)
Increased grain production along with higher prices for grains, wool and lambs helped improve farm income following the drought-affected 2006–07 season. In 2007–08, dairy farms recorded their highest farm cash income for over 20 years. (Page 489)
Forestry
The total area of native forests in Australia is estimated to be 147.4 million hectares, which is about 19% of Australia’s land area. (Page 512)
Plantations accounted for 2 million hectares of land use in Australia, which was an increase of nearly 20% in the five years to 2008. (Page 513)
A total of 28.5 million cubic metres of logs were harvested from Australian native forests and plantations in 2007–08. This was an increase of 35% over ten years. The volume harvested from native forests declined by a little over 10% over ten years while the volume harvested from plantations increased by about 75%. (Pages 515-516)
On average, each Australian consumes about 1 cubic metre of domestic and imported timber products each year, including timber used for home building, joinery, furniture and paper products. (Page 515)
The total value of exports of forest products in 2007–08 was $2.5 billion. The value of imports of forest products in 2007–08 was $4.4 billion. This indicates a trade deficit in forest products of $1.9 billion in 2007–08, similar to that in previous years. (Page 516)
Mining
In 2007-08, Australia’s top five mining export earners were black coal ($24b), iron ore and pellets ($20b), refined gold ($11b), crude oil and other refinery feedstock ($10b), and copper ($7b). (Page 537)
Mining contributed to 8% of Australia’s GDP in 2007–08. (Page 532)
In the period 2004–05 to 2008–09, the value of exports from the mining industry almost tripled. (Page 533)
In 2007–08 mining businesses paid a total of $12,864m in wages and salaries. (Page 534)
At the end of 2008, Australia had 1,163 kilo tonnes of uranium that could be recovered at costs of less than US$80/kilogram of uranium. This represents around 34% of world resources in this category. (Page 548)
Energy
Australia is ranked in the top six countries for resources of black and brown coal, and has the world's largest resources of uranium. (Page 556)
In the period 1999–2009 resources of black coal, brown coal, crude oil and liquified petroleum gas each decreased, while natural gas and uranium both increased. (Page 556)
In 2007–08, black coal accounted for half of Australia's total primary energy production. Renewable energy accounted for only 2%. (Page 558)
In 2007-08 Australia’s total energy use was less than one third of the total energy it produced. (Page 561)
The transport sector was the largest end-user of energy in 2007–08 followed by the manufacturing sector. Together these two sectors account for 66% of total energy end-use. (Page 562)
Manufacturing
Food product manufacturing was the largest contributor to total manufacturing sales and service income ($68b) and the largest contributor to total labour costs ($11b). (Page 576)
In 2008–09, the manufacturing industry employed 9% of all workers in Australia, with males outnumbering females by a ratio of around 3 to 1. (Page 578)
The furniture and other manufacturing industry subdivision experienced the greatest increase in operating profit before tax between 2006–07 and 2007–08 (113% increase). (Page 579)
Overall, capital expenditure by the manufacturing industry increased by $1,484m (9%) between 2006–07 and 2007–08. (Page 580)
Construction
In 2008–09 the construction industry employed an average of 988,000 people, 2% higher than in 2007–08. (Page 591)
Between 2007–08 and 2008–09, the value of total building work increased by $2,953m (4%) to $78,213m. (Page 593)
Service Industries
In 2007–08 the services-producing industries' overall contribution to GDP was 55%. (Page 598)
In 2007–08 the largest services-producing industry, in terms of industry gross value added, was the Property and business services industry, which accounted for 12% of GDP. (Page 598)
Total retail turnover (in volume terms) increased by 13% between 2004–05 and 2008–09. (Page 600)
Tourism chapter
In 2007–08, international visitors consumed over $23 billion worth of goods and services produced by the Australian economy. The tourism industry’s share of total gross value added in the economy was 3% in 2007-08. This share has declined from a peak of 4% in 2000–01. (Pages 615, 617)
The four major source countries for short-term international visitor arrivals to Australia during 2008 were New Zealand, the United Kingdom, Japan and the United States of America. Arrivals from China increased 42% between 2004 and 2008. (Page 618)
The top destinations for Australian residents departing short term during 2008 were New Zealand, the United States of America, the United Kingdom, Thailand and Indonesia. Departures to Thailand grew 115% between 2004 and 2008. (Pages 620, 621)
Transport
The average rate of fuel consumption for all motor vehicles in the year to October 2007 was 14.0 litres per 100 kilometres. The average fuel consumption rate for passenger vehicles was 11.5 litres per 100 kilometres. (Pages 631, 633)
The top 10 airports in Australia all recorded increases in domestic passenger movements in 2008 from a year earlier. The strongest growth was recorded in Darwin (17%), followed by Gold Coast (13%). The lowest growth was recorded in Cairns (4%). (Page 636)
The number of fatal road traffic crashes in 2008 (1,342) fell by 111 compared with 2007. Between 2007 and 2008 fatal crashes in the Northern Territory rose by 43%, while South Australia, Queensland and Western Australia recorded the greatest falls of 19%, 13% and 12% respectively. (Page 637)
Information and communication technology
In 2008–09, the number of households with a broadband internet connection had almost quadrupled from 2004–05 to an estimated 5.0 million households. This represented three out of five households in Australia and 86% of households with internet access. (Page 649)
Overall income that resulted from orders received via the internet for goods or services increased significantly from $56.7 billion to $81.0 billion over the period between 2005-06 and 2007-08. (Page 651)
During 2008–09, two-thirds (67%) of people aged 15–34 years accessed the internet every day, compared with around half the people aged 35 years or more. (Page 652)
An estimated 841,000 children (31%) aged 5 to 14 years had access to their own mobile phones in 2009. (Page 654)
Research and innovation
In 2006–07, gross expenditure on research and development was $21 billion, an increase of 31.5% on 2004–05 spending. (Page 660)
Business expenditure on R&D in 2007–08 was 1.27% of Australia's GDP, an increase from 1.20% in the previous year. On this measure Australia is ranked fourteenth in a table of OECD countries, remaining below the average of 1.59%. (Page 661)
National accounts
Australia has experienced relatively strong growth compared with many developed economies over the past ten years. With an average annual growth rate of 3.5% for GDP volumes from 1997 to 2007, it is higher than all of the 'G7' countries, whose average is 2.3%. (Pages 727, 728)
Australia's net worth at the end of June 2008 was estimated to be $6,390 billion in current prices, an increase of 7.1% on 12 months earlier. (Page 736)
The release of the National Income, Expenditure, and Product for the June 2009 quarter marks a 50 year milestone for the Australian National Accounts. (Page 742)
International accounts and trade
The balance on the current account for 2008–09 was a deficit of $38.4 billion, a decrease of 47% on the previous year. Australia recorded a merchandise trade surplus of $11.0b in 2008-09, a turnaround of $32.5b on the deficit recorded in 2007–08. (Pages 750, 754).
The chain volume measures of Australia’s exports of goods and services increased by 2% between 2007–08 and 2008–09. In comparison, the current price value of those exports, which incorporates both volume and price changes, increased by 22%. (Page 752)
© Commonwealth of Australia 2013
Unless otherwise noted, content on this website is licensed under a Creative Commons Attribution 2.5 Australia Licence together with any terms, conditions and exclusions as set out in the website Copyright notice. For permission to do anything beyond the scope of this licence and copyright terms contact us.
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:50:23.000Z
|
qlkwprvhapotppwovwmsw5xbnlxzljcw
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:60637",
"uncompressed_offset": 308014067,
"url": "www.abs.gov.au/Ausstats/abs%40.nsf/Previousproducts/8A9D8717960327BFCA256DEA00053986",
"warc_date": "2013-11-22T14:34:20.000Z",
"warc_filename": "<urn:uuid:a5b2a457-047b-465d-9fda-eacbfdc10b90>",
"warc_url": "http://www.abs.gov.au/Ausstats/abs@.nsf/Previousproducts/8A9D8717960327BFCA256DEA00053986?opendocument"
}
|
cccc_CC-MAIN-2013-20
|
Australian Bureau of Statistics
Celebrating the International Year of Statistics 2013
ABS Home > Statistics > By Release Date
1301.0 - Year Book Australia, 2004
Previous ISSUE Released at 11:30 AM (CANBERRA TIME) 27/02/2004
Page tools: Print Page RSS Search this Product
Contents >> International relations >> Australia’s human rights policy
Australia takes an active and constructive approach to improving human rights standards and systems internationally, including through targeting development cooperation programs; supporting the establishment of national human rights institutions and good governance; encouraging multilateral, regional and bilateral discussion of human rights issues; and working to develop and strengthen the effectiveness of regional and international human rights institutions and instruments. Australia was elected to serve on the UN Commission on Human Rights for a three-year term from 2003 and served in 2003 a one-year term as Vice-Chair of the Commission. In addition to working through multilateral forums, Australia promotes human rights through bilateral dialogues with individual countries. Australia holds regular bilateral discussions with China, Vietnam and Iran.
Previous PageNext Page
© Commonwealth of Australia 2013
Unless otherwise noted, content on this website is licensed under a Creative Commons Attribution 2.5 Australia Licence together with any terms, conditions and exclusions as set out in the website Copyright notice. For permission to do anything beyond the scope of this licence and copyright terms contact us.
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:50:16.000Z
|
aohqppzhugyfhgyk7sg5u6rfnl2nadmw
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:60638",
"uncompressed_offset": 308021684,
"url": "www.abs.gov.au/ausstats/abs%40.nsf/Previousproducts/1F4AD95509BE5F01CA25773700169C85",
"warc_date": "2013-11-22T14:34:20.000Z",
"warc_filename": "<urn:uuid:a5b2a457-047b-465d-9fda-eacbfdc10b90>",
"warc_url": "http://www.abs.gov.au/ausstats/abs@.nsf/Previousproducts/1F4AD95509BE5F01CA25773700169C85?opendocument"
}
|
cccc_CC-MAIN-2013-20
|
Australian Bureau of Statistics
Celebrating the International Year of Statistics 2013
ABS Home > Statistics > By Release Date
1301.0 - Year Book Australia, 2009–10
Previous ISSUE Released at 11:30 AM (CANBERRA TIME) 04/06/2010
Page tools: Print Page RSS Search this Product
Contents >> Health >> Health risk behaviours
HEALTH RISK BEHAVIOURS
A range of factors influence the health outcomes of an individual or the population. These include the interaction of socio-economic, biomedical and environmental factors which contribute to illness and injury. There are also specific lifestyle behaviours which may have further impact on people's health, increasing the risk of chronic disease.
The 2007-08 NHS collected information on a number of lifestyle behaviours:
• 21% of adults were current smokers.
• 73% of adults reported sedentary or low exercise levels in the two weeks prior to interview.
• 13% of adults consumed alcohol at levels which, if continued, would be risky or a high risk to their health in the long term.
The following information is based on the National Health and Medical Research Council's (NHMRC) Dietary Guidelines for Australians recommended daily intake of fruit and vegetables at specific ages:
• 9% of adults reported they usually consumed five or more serves of vegetables every day.
• 51% of adults reported they usually consumed two or more serves of fruit every day.
Comparisons between the 1995 and 2007-08 National Health Surveys showed an increase in the proportion of adults who were overweight or obese. In 1995 38% of adults were overweight and 19% obese. The 2007-08 results found that 37% of adults were overweight and 25% obese. For more information on this topic see article, Children who are Overweight or Obese in this edition of Year Book Australia.
• 61% of adults were classified as overweight or obese based on their measured height and weight.
• 25% of children aged 5-17 were classified as overweight or obese based on their measured height and weight.
The proportion of adults currently smoking decreased from 24% to 21% between 1995 and 2007-08. There was an increase in the proportion of adults reporting sedentary or low levels of exercise from 69% to 73% and the proportion of adults drinking at risky levels (8% to 13%).
Previous PageNext Page
© Commonwealth of Australia 2013
Unless otherwise noted, content on this website is licensed under a Creative Commons Attribution 2.5 Australia Licence together with any terms, conditions and exclusions as set out in the website Copyright notice. For permission to do anything beyond the scope of this licence and copyright terms contact us.
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:38:26.000Z
|
xwdciwnjhd62abosoytdxvdbxbl7kajp
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:60641",
"uncompressed_offset": 327526974,
"url": "www.appropedia.org/Category:Natural_paint",
"warc_date": "2013-11-22T14:34:20.000Z",
"warc_filename": "<urn:uuid:a5b2a457-047b-465d-9fda-eacbfdc10b90>",
"warc_url": "http://www.appropedia.org/Category:Natural_paint"
}
|
cccc_CC-MAIN-2013-20
|
Category:Natural paint
From Appropedia
Jump to: navigation, search
Natural paint is often a safer and more local alternative to conventional paints that can be high in VOCs and emboddied energy.
Topic page: Natural paints
Pages in this category (listed below) may include subtopics, how-tos, projects, designs, organizations and more.
Learn practical information about about ingredients, costs, types and advantages/disadvantages at Natural paint basics.
To create a page related to Natural paint
* Browse the articles and subcategories of this category.
• Type a proposed name for the project, organization, how to or other Natural paint related resource in the box and click .
• Add what you know. Do not worry about formatting or completeness, others will help and changes are easily made. Be BOLD.
Personal tools
Collaborators
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:49:18.000Z
|
oxyehd45olqqmm7gi54h7x4og5pnnnkz
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:60644",
"uncompressed_offset": 355432665,
"url": "www.biomedcentral.com/1471-244X/12/207/",
"warc_date": "2013-11-22T14:34:20.000Z",
"warc_filename": "<urn:uuid:a5b2a457-047b-465d-9fda-eacbfdc10b90>",
"warc_url": "http://www.biomedcentral.com/1471-244X/12/207/"
}
|
cccc_CC-MAIN-2013-20
|
Study protocol
Problem-solving versus cognitive restructuring of medically ill seniors with depression (PROMISE-D trial): study protocol and design
Louise Sharpe1*, Catherine B Gittins1, Helen M Correia2, Tanya Meade3,4, Michael K Nicholas5, Patrick J Raue6, Sarah McDonald1 and Patricia A Areán7
Author Affiliations
1 School of Psychology, University of Sydney, Sydney, Australia
2 School of Psychology, Murdoch University, Perth, Australia
3 School of Psychology, University of Western Sydney, Sydney, Australia
4 School of Medicine, University of Sydney, Sydney, Australia
5 Pain Management Research Institute, University of Sydney at Royal North Shore Hospital, Sydney, Australia
6 Weill Medical College, Cornell University, New York, USA
7 Department of Psychiatry, University of California, San Francisco, USA
For all author emails, please log on.
BMC Psychiatry 2012, 12:207 doi:10.1186/1471-244X-12-207
The electronic version of this article is the complete one and can be found online at: http://www.biomedcentral.com/1471-244X/12/207
Received:13 September 2012
Accepted:7 November 2012
Published:22 November 2012
© 2012 Sharpe et al.; licensee BioMed Central Ltd.
This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Abstract
Background
With an ageing population in most Western countries, people are living longer but often with one or more chronic physical health problems. Older people in physically poor health are at greater risk of developing clinical depression. Cognitive Behavioural Therapy (CBT) and Problem Solving Therapy (PST) have both been found to be efficacious in treating late-life depression, however patients with “multi-morbidity” (i.e. more than one chronic condition) are often excluded from these trials. The aim of this study is to compare the efficacy of CBT and PST in treating older adults who have one or more chronic physical health conditions and a diagnosable depressive disorder. This study will be the first to explicitly target the treatment of depression in older people in primary care settings presenting with a range of health problems using behavioural interventions.
Methods/design
The PROMISE-D study is a randomised controlled trial of two evidence-based treatments for late-life major or minor depression for patients who also have at least one co-morbid chronic health problem. Participants will be randomised to two active interventions (PST or CBT) or enhanced treatment-as-usual (E-TAU). Primary outcomes will be depression diagnostic status and severity of depression (according to the Hamilton Depression Rating Scale and the Geriatric Depression Scale). Secondary outcomes will be anxiety severity, quality of life and health care utilisation. Assessments will be conducted by a researcher who remains blind to the patient’s treatment allocation and will be conducted pre and post-treatment and at six and 12 months follow-up. Health care utilisation will be assessed throughout a two year period following entry to the trial. Executive function, rumination and emotion regulation will also be measured to determine the impact of these factors on treatment response in two treatment groups.
Discussion
Multi-morbidity, the experience of two or more chronic health problems, is becoming an increasing problem internationally, particularly amongst the elderly. Evidence-based psychological treatments exist for late-life depression and these have been shown to be effective for participants with individual health problems and depression. However, there are no studies that have compared the two leading psychotherapies shown to be effective in the treatment of late-life depression. In addition, many trials of psychotherapy with older adults exclude those with multi-morbidity. Hence, this trial will confirm whether CBT and PST are efficacious in the treatment of depression in the context of complex medical needs and determine which of these two interventions is most efficacious.
Trial registration
ACTRN12612000854831
Keywords:
Depression; Older adults; Chronic illness; Cognitive-behavioural therapy; Problem-solving therapy; Psychotherapy
Background
Older age is associated with an increased risk of depression [1]. A systematic review revealed six consistent factors associated with depression in older people. Excepting female gender, physical health and functional impairment were the strongest predictors of late-life depression [2]. Increased rates of depression have been found in older patients with a range of illnesses [3-6]. Indeed, one study demonstrated 83% of those over 75 had more than one health problem, and a psychological and health problem was the second most common co-morbidity [7]. Of even more concern, research confirms that physical illness also increases the risk of suicide amongst depressed older adults [8].
Despite a large number of trials of psychological therapies in young depressed patients [9], there are far fewer studies in older people. The number of trials in the literature has been increasing, which has given rise to numerous reviews of the efficacy of psychotherapeutic interventions for late-life depression [10-14]. Although those reviews varied in which interventions were found to be definitely efficacious, there is some general consensus.
Cognitive Behavioural Therapy (CBT), a therapy based on changing unhelpful beliefs and increasing activity as a treatment for depression, is the most well researched therapy in the treatment of late-life depression [12]. In their Cochrane Review, Wilson and colleagues [12] concluded that CBT was the only definitely efficacious therapy for late-life depression. They used very stringent criteria for trial inclusion, but nonetheless, on this point there is considerable consistency between reviews. That is, CBT is a proven effective treatment for late-life depression [10-14].
In the Cochrane review, Problem Solving Therapy (PST) was considered under the umbrella of CBT [10,12]. However, there are important differences. CBT focuses on restructuring and challenging beliefs that are associated with low mood and behavioural activation, whereas PST focuses on dealing with the problems associated with daily life and shifting negative cognitions into goal directed activity [15]. One review of psychological treatments in older adults [14] that distinguished between PST and CBT, concluded that PST was probably efficacious. However, since that review, there have been a number of additional, well controlled trials that have evaluated PST as a treatment for late-life depression, each of which has supported the efficacy of PST [16-21]. Hence, PST can be regarded as meeting the criteria for a definitely efficacious treatment [22]. Furthermore, in a meta-analysis comparing psychotherapies for adult depression, PST was found to have the lowest drop out rates of any of the therapies, making it a highly acceptable intervention among people suffering from depression [23].
Although there is good evidence to support the efficacy of CBT and PST for the treatment of later life depression, there is a need for further research [13]. Which of these treatments is most efficacious remains unclear. To date, no trials have compared CBT with PST [10]. Research comparing those treatments shown to be most efficacious for the treatment of late life depression is needed in order to ensure that patients are offered the most efficacious intervention. Large trials comparing these treatments can also investigate whether different patients benefit from different treatments. If the different treatments are suited to patients with different characteristics, there may be ways in which interventions can be matched to those patients most likely to benefit from them.
Similarly, there is a pressing need for outcome studies for depressed patients with complex needs. In their meta-analysis, Pinquart and colleagues [10] found that effect sizes were smaller in studies that included people with a co-morbid medical illness. However, there are few trials of the treatment of late-life depression for people with a range of co-morbid physical health problems and patients with multi-morbidity (i.e. two or more concurrent physical and/or psychological disorders are often excluded from the published trials). Only the PROSPECT [24] and IMPACT [18] trials have studied treatment of depression in older medical patients, however, the interventions studied were not exclusively psychological. In these studies, patients were offered a choice of either medication or behavioral treatment. There are, however, some studies in patients with specific illnesses that show that CBT is effective in reducing depressive symptomatology in patients with chronic illnesses often seen in older adults. For example, CBT is successful in reducing depressive symptoms in arthritis and preventing the development of new “cases” of depression over 18 months [25,26]. Similarly, recent research shows that CBT for Chronic Obstructive Pulmonary Disease (COPD) is successful in improving depressive symptoms [27].
Despite these encouraging results, neither study specifically included patients who met criteria for major or minor depression. Indeed, there appear to be no studies of CBT in late life depression where patients were included on the basis of a diagnosis of clinical depression and a comorbid health problem. Two studies investigated the efficacy of CBT for patients scoring above a cut-off score on questionnaires. Both studies (a small trial in stroke survivors [28] and a larger trial in Chronic Obstructive Pulmonary Disease patients [29]) failed to find a benefit of CBT. However, in the stroke study, patients were recruited on the basis of their scores on a screening test (the Beck Depression Inventory), known to be inflated in physically ill populations. Of those allocated to CBT, 69% met criteria for a depressive disorder, in contrast to only 43% of the control group. These initial differences could have masked any treatment effects. There are also problems with the Chronic Obstructive Pulmonary Disease study. Kunik et al. [29] included patients with heightened levels of depression OR anxiety and attempted in an 8 x 1 h program to address both symptoms in groups of 10 patients. The cognitive component (i.e. cognitive restructuring) involved only two sessions, and this may not be sufficient, particularly in older adults, to have conferred benefit [10]. While these studies have some problems, the null findings highlight the importance of trials to confirm that the efficacy of CBT extends to those with comorbid medical problems and late-life depression.
There is more research about the efficacy of PST in the treatment of late life depression in physically ill patients. One early trial in older adults with medical illness found positive results [30], but was uncontrolled. There have since been a number of large trials in the context of particular health conditions. Areán and her colleagues have shown that PST can improve depression in patients with arthritis [31] and in older disabled people with cognitive dysfunction [16,32]. This provides good evidence that at least in some disorders, PST can ameliorate depressive illness even where complicated by the presence of one serious, chronic health problem. Additionally, PST has been found to be effective in disabled older adults (many of whom have chronic illnesses) [33,34] and reduces the risk of post stroke depression [35], as well as reducing depression symptoms in cancer patients [36]. However, the question of whether PST can be applied across the range of health problems common in later life, particularly in those with multi-morbidity, and whether it is as effective as CBT, remains unclear.
Aims and hypotheses
Although there have been numerous trials of psychological interventions for patients with late-life depression in the past decade, there continue to be major gaps in the literature. Firstly, few studies aim to treat depression in the context of ill health, despite the fact that many older adults have both depression and one or more chronic physical illnesses. There are also few studies that compare different psychotherapies for late-life depression. The PROMISE-D trial aims to bridge these gaps. Specifically, the aim of the study is to evaluate two psychological therapies (PST and CBT), both of which are definitely efficacious for the treatment of late-life depression, for patients with one or more co-morbid physical illness.
We hypothesise that PST and CBT will be superior to a wait-list control group in the treatment of depression for patients with co-morbid health problems. We also aim to determine what baseline characteristics might best predict outcome in each treatment condition. Based on the hypothesised mechanisms of PST, we expect that patients with executive dysfunction (poor score on the Stroop Interference Task [37]) will respond better to PST than CBT [16]. In contrast, we expect patients with excessive rumination (measured by the Ruminative Response Scale; RRS [38]) and patients with affective dysregulation (measured by the Emotion Regulation Questionnaire; ERQ [39]) to respond better to CBT than PST [39,40].
Methods/design
The procedure of the PROMISE-D trial is illustrated in Figure 1. This study has been designed in accordance with CONSORT criteria [41] and is a randomised controlled trial (RCT) registered with the Australian New Zealand Clinical Trial Registry. Ethical approval has been granted for this study by the University of Sydney Human Research Ethics Committee.
Figure 1. Outline of study design.
Participants
Consecutive adults aged 65 years and older presenting at GP surgeries will be screened for the study. The inclusion criteria are (1) one or more chronic physical illness; (2) a diagnosis of major or minor depressive disorder or dysthymia; (3) if taking anti-depressant medication, a stable dose for > 8 weeks; (4) have not received electroconvulsive therapy (ECT) within 6 months (to exclude memory problems) and (5) sufficient English to complete questionnaires and take part in therapy. Participants will be excluded if they have (1) suicidal intent requiring emergency care; (2) alcohol or drug abuse or dependence; (3) a history of bipolar disorder or cyclothymia; (3) a psychotic illness; (4) cognitive deficits (< 25 on the Telephone Interview for Cognitive Status [TICS] [42]); or (5) have received psychotherapy within the last six months.
Participants will be recruited at their GP surgery when they attend for an appointment. Based on the prevalence of physical health problems amongst older people (60%) (and depressive symptoms high enough to warrant screening amongst those [30%]), and the likely rate of actual disorder from those who screen positive (70%), we anticipate that approximately 1400 older people will need to be screened in order to achieve the 177 participants required for the RCT.
Procedure
GP surgeries will be sent a letter inviting them to participate in the study. If they agree to be involved, consecutive attendees at participating surgeries who are 65 and over will be asked to complete a one-page double-sided screening questionnaire and post it in a locked box located in the surgery. The screening questionnaire will consist of the Geriatric Depression Scale- Short Form (GDS-SF [43]) and some basic demographic questions (age, gender). Respondents will also be asked to indicate, from a list provided, which chronic illnesses (if any) they have. People who prefer not to complete the questionnaire will be asked to put the unanswered page into the locked box to provide an estimate of how many individuals refused to take part. Participants will be informed that if they give the researchers their details and are eligible for the study, that the researchers will contact them directly.
Those participants who score ≥ 5 on the GDS-SF [43] and have at least one chronic illness will be telephoned by the researchers and asked if they would like to participate in a phone interview. The interview will be used to determine whether they meet the criteria for major or minor depression using the Primary Care Evaluation of Mental Disorders - Depression subscale (PRIME-MD [44]). Their cognitive status will also be assessed via the Telephone Interview for Cognitive Status [42] and more detailed demographic questions will be asked. If they meet criteria for a clinical depression (major or minor) as assessed by the PRIME-MD, the Hamilton Rating Scale for Depression (HAM-D [45]) will also be conducted and participants will be offered the opportunity to take part in the RCT.
Participants who complete the phone interview and are eligible for the RCT will be told about the trial at the end of the phone interview. Those individuals interested in participating will be sent a participant information statement, consent form and the baseline questionnaires (Short Form (36) Health Survey; SF-36 [46]; Geriatric Anxiety Inventory [47]; Ruminative Response Scale [38]; Emotion Regulation Questionnaire [39]). Upon receipt of their consent form and baseline questionnaires, participants will be randomised, by an independent researcher, into one of three conditions: CBT, PST or E-TAU (described below). Medical files will be accessed to get details of current medications (including anti-depressant medication) and to confirm their diagnoses. Participants will then be contacted by a member of the research team and informed of their condition. If allocated to CBT or PST, the researcher will arrange an appointment for their first therapy session, which will be conducted at a local health clinic. During the first session participants in the PST and CBT conditions will complete the Stroop Interference Task [37].
Treatment consists of 10 one hour weekly sessions. All participants will have their depressive symptoms monitored via the administration of the GDS-SF midway through the trial period (i.e. after 5 weeks). If any individual demonstrates a reliable deterioration [48], from trial entry, in GDS-SF score they will be contacted by the research team to determine their ability to continue the trial and to ensure their safety. Post-treatment assessment using PRIME-MD Depression module, GDS-SF and the HAM-D will be conducted. Participants will also be asked to complete the SF-36 to assess their quality of life and the Geriatric Anxiety Inventory to assess co-morbid anxiety symptoms at post-treatment. Follow-up assessments will be conducted six and 12 months after the trial. Data on health care utilisation will be gained from Medicare and the Pharmaceutical Benefits Scheme in order to determine the cost efficacy of the interventions in the two years following treatment.
Randomisation
Randomisation will be stratified by diagnosis (major depressive episode or minor depression/dysthymia). This will be performed by an independent researcher who has no other involvement in the trial, using computer-generated random numbers.
Therapist training
Clinicians will be registered psychologists, with training in cognitive-behavioural therapy. All therapists will complete a four-day workshop during which they will receive group training in the therapy techniques, with 2 days devoted to PST and 2 days devoted to CBT. The training programs for the two therapies will be as closely matched in structure as possible to allow for comparability across conditions, and recommendations for maintaining treatment fidelity in randomised trials [49] will be followed. PST training will be conducted by PJR and LS and CBT training will be conducted by LS and HMC.
Prior to the training week, all therapists will receive a manual for PST and a manual for CBT which will outline the protocols for treatment. Both PST and CBT will be specifically targeted at treating older adults with chronic physical illnesses. At the start of the first PST session, therapists will be given an overview of PST. Likewise, during the first CBT session an outline of CBT will be provided. For each therapy type, eight role-play scenarios will be conducted in which the trainers act out the roles of patients. Trainees will act as therapists in around two role-plays each. Trainees will also listen to audio or video recordings of PST and CBT sessions and will then be required to analyse the strengths and weaknesses of the recorded sessions. A random selection of PST audio recordings will be evaluated by an independent researcher using the PST Adherence Form (PST-AS [50]), a session check list that determines the degree to which therapists apply the 7-PST steps in a therapy session to high quality. Similarly, the Cognitive Therapy Rating Scale [51] will be used to assess the quality of cognitive therapy administered. In addition, therapists in each condition will be asked to keep a self-reported fidelity checklist of all sessions. This will allow quality of sessions and average fidelity to be compared between the two treatment types.
Trial conditions
Clinicians will follow strict manualised protocols under the supervision of LS.
Cognitive behavioural therapy
There are two primary components of CBT: behavioural activation and cognitive restructuring. Behavioural activation teaches patients about the relationship between activity and mood, such that lowering levels of activity results in reductions in mood, creating a vicious cycle often referred to as the lethargy circuit. Participants are encouraged to develop realistic goals that are associated with either mastery (i.e. the feeling of achievement for having completed a goal) or pleasure. Participants are also encouraged to monitor their moods in relation to their goals and other daily activities. Over the course of the therapy, participants are encouraged to gradually increase their involvement in activities. Cognitive restructuring helps patients learn to identify unhelpful thoughts and beliefs in daily situations. Particular strategies are learned to help challenge the validity of their assumptions and to develop more helpful and realistic appraisals in daily situations. Behavioural experiments are developed within session in order to test out unhelpful beliefs. These challenging strategies are applied in daily situations to help participants to gain better control over their thoughts and subsequently their mood.
Problem solving therapy
PST teaches patients structured problem solving strategies that they learn to apply to everyday difficulties, as well as to more significant adverse life events, such as divorce or serious medical illness. The program will specifically target those problems arising from their medical conditions. In the first session the patient will receive psychoeducation on depression in general and learn specifically about the mechanics of PST and why it is effective. Therapists will guide patients to generate a list of problems that they are currently experiencing in their lives and select and clearly define a moderately challenging one to focus on. Patients will then identify a goal, related to that problem, that they would like to achieve and brainstorm strategies to meet the goal, producing as many solutions as possible. Following this, patients assess the pros and cons of each solution they have created and choose one or more to implement. They then generate an action plan containing steps by which to carry out this solution. At subsequent sessions the action plan is reviewed and the success (or lack of success) at achieving the goal is discussed, and a new solution is developed if necessary.
Enhanced treatment-as-usual
Participants in the E-TAU condition will not receive any specified treatment as a result of the trial. However, they will be free to pursue treatment as usual during the course of the 10 week trial period. Any treatments initiated during the 10 week treatment phase of the trial will be carefully monitored. However, GPs will receive no information about the participant’s mood during the 10 week treatment phase of the trial. Because it would unethical to have assessed a person with a depressive disorder and provide no treatment for such a lengthy period of time, once post-treatment assessments are completed, GPs of participants who still meet criteria for a depressive disorder will be informed of the participant’s depression status.
Outcome measures
The primary outcome will be diagnoses of depression according to the PRIME-MD Depression module. In order to allow for multi-modal assessment we will also measure participants’ depression using the GDS-SF [43] and clinician-rated severity according to the HAM-D [45]. Two secondary outcomes will be measured. Quality of life will be assessed with the SF-36 [46] and anxiety will be measured using the Geriatric Anxiety Inventory [47]. These assessments will be conducted by a researcher who remains blind to the participant’s treatment allocation. Blindness will be confirmed by having the independent researcher guess the group that they think each participant belongs to at the end of the treatment period.
As we are interested in which factors affect treatment success, we will also be taking a number of process measures. Executive function will measured using the Stroop Interference Task [37]. For logistical reasons only participants in PST and CBT conditions will be administered the Stroop task because it requires face-to-face administration. The Stroop will be used as a predictor of treatment outcome and not an outcome measures. All participants will be assessed for level of rumination (via the Ruminative Response Scale [38]) and affective regulation (via the Emotion Regulation Questionnaire [39]).
Additionally, demographic variables such as ethnicity and level of education will be recorded, as well as more specific information about previous depressive diagnoses and treatment. In order to confirm details of their chronic illness(es), RCT participants will also be asked to consent to the research team accessing their medical files.
Analysis
Sample size
177 participants will be recruited to the RCT. In order to achieve 95% power and α = 0.05, 47 participants per group are needed. Allowing for 20% attrition, this requires 59 participants per group.
Statistical analysis
There are 4 measurement times, of which 3 are post-intervention. Linear mixed models will be used to account for the hierarchical, non-independent nature of the data: repeated measures on patients nested within clusters (primary care services). Baseline outcome measures (e.g., HAM-D and GDS-SF) will be used as a covariate, which improves efficiency [52]. These models will allow for 1) comparing patterns of change over time by testing the intervention group by time interaction and 2) estimating and testing differences in outcome measures between groups at time points of interest via linear contrasts. Reporting will follow the CONSORT statement [41].
Sample size
The primary outcomes are a diagnosis of depression according to PRIME-MD and severity of depression according to the HDS and GDS. In a recent meta-analysis, the average effect size for CBT (including PST trials) was 1.06 and for PST was 1.00 [10]. To be conservative, we have used the smaller ES of 1.00. According to G-power, we would need only 25 participants per group have 95% power to detect a significant difference (p < 0.05) between the 2 active treatments and the control condition [53]. However, we are also interested in the relative efficacy of each of the 2 interventions. Given that these two treatments have never been compared in any clinical setting, we determined that to be conservative, we should power the study to identify even small differences in effect sizes (Cohen’s D = 0.25) between the two treatments. In order to be able to observe a difference between the two groups of 0.25 with 80% power and a significance level of 0.05, we need 59 participants per group. That is, 177 participants in total.
Discussion
In Australia, as in the rest of the developed world, we have a large, ageing population. According to the Australian Bureau of Statistics [54], the number of people older than 65 in Australia increased by 170% over the past 2 decades, compared to only a 31% increase in the rest of the population. Research shows that as the ageing population increases, the incidence of both chronic medical illness and late life depression is also increasing. Moreover, the presence of depression amongst the physically ill is known to complicate the physical illness itself. Further, older, depressed people with physical illnesses fare more poorly than those without co-morbid physical problems in therapy. To date, no psychological treatment has been shown to be definitely efficacious with this group of patients with multi-morbidity, and who are amongst the most vulnerable in our community.
The proposed study will be the first to compare two evidence-based interventions in the treatment of late-life depression in older adults who also have one or more chronic medical conditions. This novel and timely research will implement a methodologically rigorous RCT of two interventions which already have substantial evidence of efficacy in treatment of late-life depression in healthy people. The eventual goal of this study is to distribute an evidence-based, manualised, psychological intervention for older people with chronic health problems in primary care.
Strengths of the study
The team who have developed the PROMISE-D trial include senior, experienced researchers who have previously developed manuals for PST in the treatment of late-life depression (PAA and PJR) and cognitive behavioural treatments for people with health problems (LS and MKN) and tested these in randomised controlled trials. These researchers have extensive experience in training psychologists in these strategies and hence the PROMISE-D trial will provide a valid test of these interventions.
The enhanced treatment-as-usual arm will ensure that the pre to post treatment changes are able to determine the efficacy of these interventions in comparison to treatment-as-usual in the short-term (as no correspondence will occur between the GPs and researchers). However, the fact that GPs will be given the opportunity to respond to an identified case of depression following the treatment phase of the PROMISE-D trial, means that this trial will provide a stringent test of the long-term efficacy of these two interventions. Further, this should help us ascertain whether, in the longer term, these interventions are more efficacious than routinely offered treatments if depression were identified in practice.
Challenges
We envisage that the greatest challenge in this trial will be recruiting the sample. There are a number of potential barriers to recruitment in this study. Firstly, recruiting busy GP practices to take part in this study may prove challenging. However, we have designed the PROMISE-D trial to require minimal input from surgeries, such that they need only hand out a single form to all people over 65. Involvement in the trial will result in considerable benefits to older patients with multi-morbidity, a group that is particularly difficult to treat. The benefits include screening for depression and treatment of depression (in 66% of cases) without cost to the patient or GP. We have also agreed to offer free training to the psychologists attached to any GP surgeries at the end of the trial in whichever intervention proves most efficacious. This will also ensure long-term implementation of effective psychological care for these patients.
There are also barriers to recruitment of this particular patient group. Older people with chronic physical illnesses and depression may be difficult to recruit because motivation may be problematic, as related to their mood difficulties. Furthermore, mobility issues may also compromise their ability to attend sessions. To deal with these issues we will attempt to see patients in their GP surgery to minimise travel and have some funding to compensate participants for direct travel costs, where necessary.
Conclusion
In summary, although recent evidence shows that both Cognitive Behavioural Therapy and Problem Solving Therapy are effective in the treatment of late-life depression, many of trials exclude patients with complex medical needs. However, multi-morbidity (the co-morbidity of two or more chronic illnesses) is increasingly common in Australia and in most Western countries. Whether these psychological treatments work for older patients with one or more chronic physical health problems and a diagnosis of depression is currently unknown. Further, whether CBT or PST is more effective has not been tested in the late life depression literature. Information about which of these treatments is most effective in this group of older patients with multi-morbidity will inform the provision of evidence-based care for this particularly vulnerable group of patients.
Abbreviations
PROMISE-D: Problem-solving versus cognitive Restructuring Of Medically Ill SEniors with Depression; CBT: Cognitive Behavioural Therapy; PST: Problem Solving Therapy; E-TAU: Enhanced-Treatment-As-Usual; RCT: Randomised Controlled Trial; TICS: Telephone Interview for Cognitive Status; GDS-SF: Geriatric Depression Scale-Short Form; PRIME-MD: Primary Care Evaluation of Mental Disorders; HAM-D: Hamilton Rating Scale for Depression; SF-36: Short Form (36) Health Survey.
Competing interests
The authors declare no competing interests.
Authors’ contributions
LS, PAA, MKN, TM and HMC were investigators on the successful grant application. This paper was drafted by LS and CBG, which was then modified by all other authors. All authors contributed to the design of the study protocol. The PST intervention was developed by PAA and PJR and the CBT intervention was developed by LS. The final manuscript was read and approved by all authors.
Acknowledgements
The PROMISE-D trial is funded by beyondblue.
References
1. Roberts RE, Kaplan GA, Shema SJ, Strawbridge WJ: Does growing old increase the risk for depression?
Am J Psychiat 1997, 154(10):1384-1390. PubMed Abstract | Publisher Full Text
2. Djernes JK: Prevalence and predictors of depression in populations of elderly: a review.
Acta Psychiatr Scand 2006, 113(5):372-387. PubMed Abstract | Publisher Full Text
3. Egede LE, Grubaugh AL, Ellis C: The effect of major depression on preventive care and quality of life among adults with diabetes.
Gen Hosp Psychiat 2010, 32(6):563-569. Publisher Full Text
4. Patel D, Sharpe L, Thewes B, Bell ML, Clarke S: Using the distress thermometer and hospital anxiety and depression scale to screen for psychosocial morbidity in patients diagnosed with colorectal cancer.
J Affect Disorders 2011, 131(1–3):412-416. PubMed Abstract | Publisher Full Text
5. Yohannes AM, Willgoss TG, Baldwin RC, Connolly MJ: Depression and anxiety in chronic heart failure and chronic obstructive pulmonary disease: Prevalence, relevance, clinical implications and management principles.
Int J Geriatr Psych 2010, 25(12):1209-1221. Publisher Full Text
6. Sharpe L, Sensky T, Allard S: The course of depression in recent onset rheumatoid arthritis: the predictive role of disability, illness perceptions, pain and coping.
J Psychosom Res 2001, 51(6):713-719. PubMed Abstract | Publisher Full Text
7. Britt HC, Harrison CM, Miller GC, Knox SA: Prevalence and patterns of multimorbidity in Australia.
Med J Aust 2008, 189(2):72-77. PubMed Abstract | Publisher Full Text
8. Levy TB, Barak Y, Sigler M, Aizenberg D: Suicide attempts and burden of physical illness among depressed elderly inpatients.
Arch Gerontol Geriatr 2011, 52(1):115-117. PubMed Abstract | Publisher Full Text
9. Hollon SD, Ponniah K: A review of empirically supported psychological therapies for mood disorders in adults.
Depress Anxiety 2010, 27(10):891-932. PubMed Abstract | Publisher Full Text | PubMed Central Full Text
10. Pinquart M, Duberstein PR, Lyness JM: Effects of psychotherapy and other behavioral interventions on clinically depressed older adults: a meta-analysis.
Aging Ment Health 2007, 11(6):645-657. PubMed Abstract | Publisher Full Text
11. Peng XD, Huang CQ, Chen LJ, Lu ZC: Cognitive behavioural therapy and reminiscence techniques for the treatment of depression in the elderly: a systematic review.
J Int Med Res 2009, 37(4):975-982. PubMed Abstract | Publisher Full Text
12. Wilson KCM, Mottram PG, Vassilas CA: Psychotherapeutic treatments for older depressed people.
Cochrane Db Syst Rev 2008, (1): .
13. Areán P, Cook B: Psychotherapy and combined psychotherapy/pharmacotherapy for late life depression.
Biol Psychiat 2002, 52(3):293-303. PubMed Abstract | Publisher Full Text
14. Frazer CJ, Christensen H, Griffiths KM: Effectiveness of treatments for depression in older people.
Med J Aust 2005, 182(12):627-632. PubMed Abstract | Publisher Full Text
15. Areán PA: Problem-solving therapy.
Psychiat Ann 2009, 39(9):854-862. Publisher Full Text
16. Areán PA, Raue P, Mackin RS, Kanellopoulos D, McCulloch C, Alexopoulos GS: Problem-solving therapy and supportive therapy in older adults with major depression and executive dysfunction.
Am J Psychiat 2010, 167(11):1391-1398. PubMed Abstract | Publisher Full Text | PubMed Central Full Text
17. Ayalon L, Bornfeld H, Gum AM, Areán PA: The use of problem-solving therapy and restraint-free environment for the management of depression and agitation in long-term care.
Clin Gerontol 2009, 32(1):77-90.
18. Areán P, Hegel M, Vannoy S, Fan MY, Unuzter J: Effectiveness of problem-solving therapy for older, primary care patients with depression: results from the IMPACT project.
Gerontologist 2008, 48(3):311-323. PubMed Abstract | Publisher Full Text
19. Alexopoulos GS, Raue PJ, Sirey JA, Areán PA: Developing an intervention for depressed, chronically medically ill elders: a model from COPD.
Int J Geriatr Psych 2008, 23(5):447-453. Publisher Full Text
20. Alexopoulos GS, Raue PJ, Kanellopoulos D, Mackin S, Areán PA: Problem solving therapy for the depression-executive dysfunction syndrome of late life.
Int J Geriatr Psych 2008, 23(8):782-788. Publisher Full Text
21. Kiosses DN, Areán PA, Teri L, Alexopoulos GS: Home-delivered problem adaptation therapy (PATH) for depressed, cognitively impaired, disabled elders: a preliminary study.
Am J Geriat Psychiat 2010, 18(11):988-998. Publisher Full Text
22. Chambless D, Hollon S: Defining empirically supported therapies.
J Consult Clin Psychol 1998, 66(1):7-18. PubMed Abstract | Publisher Full Text
23. Cuijpers P, van Straten A, Andersson G, van Oppen P: Psychotherapy for depression in adults: a meta-analysis of comparative outcome studies.
J Consult Clin Psychol 2008, 76(6):909-922. PubMed Abstract | Publisher Full Text
24. Alexopoulos GS: Interventions for depressed elderly primary care patients.
Int J Geriatr Psychiatry 2001, 16(6):553-559. PubMed Abstract | Publisher Full Text
25. Sharpe L, Sensky T, Timberlake N, Ryan B, Brewin C, Allard S: A blind, randomized, controlled trial of cognitive-behavioural intervention for patients with recent onset rheumatoid arthritis: preventing psychological and physical morbidity.
Pain 2001, 89(2–3):275-283. PubMed Abstract | Publisher Full Text
26. Sharpe L, Sensky T, Timberlake N, Ryan B, Allard S: Long term efficacy of a cognitive behavioural treatment from a randomized controlled trial for patients recently diagnosed with rheumatoid arthritis.
Rheumatology 2003, 42(3):435-451. PubMed Abstract | Publisher Full Text
27. Livermore N, Sharpe L, McKenzie D: Prevention of panic attacks and panic disorder in COPD.
Eur Respir J 2010, 35(3):557-563. PubMed Abstract | Publisher Full Text
28. Lincoln NB, Flannaghan T: Cognitive behavioral psychotherapy for depression following stroke: a randomized controlled trial.
Stroke 2003, 34(1):111-115. PubMed Abstract | Publisher Full Text
29. Kunik M, Veazey C, Cully J, Souchek J, Graham D, Hopko D, Carter R, Sharafkhaneh A, Goepfert E, Wray N: COPD education and cognitive behavioral therapy group treatment for clinically significant symptoms of depression and anxiety in COPD patients: a randomized controlled trial.
Psychol Med 2008, 38(03):385-396. PubMed Abstract | Publisher Full Text
30. Areán P, Miranda J: The treatment of depression in elderly primary care patients: a naturalistic study.
J Clin Geropsych 1996, 2(3):153-160.
31. Lin EHB, Katon W, Von Korff M, Tang LQ, Williams JW, Kroenke K, Hunkeler E, Harpole L, Hegel M, Areán P, et al.: Effect of improving depression care on pain and functional outcomes among older adults with arthritis: a randomized controlled trial.
J Amer Med Assoc 2003, 290(18):2428-2434. Publisher Full Text
32. Alexopoulos GS, Raue PJ, Kiosses DN, Mackin RS, Kanellopoulos D, McCulloch C, Areán PA: Problem-solving therapy and supportive therapy in older adults with major depression and executive dysfunction: effect on disability.
Arch Gen Psychiat 2011, 68(1):33-41. PubMed Abstract | Publisher Full Text | PubMed Central Full Text
33. Ciechanowski P, Wagner E, Schmaling K, Schwartz S, Williams B, Diehr P, Kulzer J, Gray S, Collier C, LoGerfo J: Community-integrated home-based depression treatment in older adults: a randomized controlled trial.
J Amer Med Assoc 2004, 291(13):1569-1577. Publisher Full Text
34. Rovner BW, Casten RJ: Preventing late-life depression in age-related macular degeneration.
Am J Geriat Psychiat 2008, 16(6):454-459. Publisher Full Text
35. Paolucci S: Escitalopram and problem solving therapy reduce the incidence of post-stroke depression.
Evid Based Ment Health 2009, 12(1):10. PubMed Abstract | Publisher Full Text
36. Nezu AM, Nezu CM, Felgoise SH, McClure KS, Houts PS: Project genesis: Assessing the efficacy of problem-solving therapy for distressed adult cancer patients.
J Consult Clin Psychol 2003, 71(6):1036-1048. PubMed Abstract | Publisher Full Text
37. Stroop JR: Studies of interference in serial verbal reactions.
J Exp Psychol 1935, 18:643-662.
38. Nolen-Hoeksema S, Morrow J: A prospective-study of depression and posttraumatic stress symptoms after a natural disaster: the 1989 Loma-Prieta earthquake.
J Pers Soc Psychol 1991, 61(1):115-121. PubMed Abstract | Publisher Full Text
39. Gross JJ, John OP: Individual differences in two emotion regulation processes: implications for affect, relationships, and well-being.
J Pers Soc Psychol 2003, 85(2):348-362. PubMed Abstract | Publisher Full Text
40. Michalak J, Hölz A, Teismann T: Rumination as a predictor of relapse in mindfulness-based cognitive therapy for depression.
Psychol Psychother 2010, 84(2):230-236.
41. Schulz KF, Altman DG, Moher D: CONSORT 2010 statement: Updated guidelines for reporting parallel group randomised trials.
Brit Med J 2010, 340:698-702.
42. Brandt J, Spencer M, Folstein M: The telephone interview for cognitive status.
Neuropsy Neuropsy Be 1988, 1(2):111-117.
43. Sheikh JI, Yesavage JA: Geriatric depression scale (GDS): recent evidence and development of a shorter version.
Clin Gerontol 1986, 5(1):165-173. Publisher Full Text
44. Spitzer RL, Williams JBW, Kroenke K, Linzer M, DeGruy FV III, Hahn SR, Brody D, Johnson JG: Utility of a new procedure for diagnosing mental disorders in primary care: the PRIME-MD 1000 study.
J Amer Med Assoc 1994, 272(22):1749-1756. Publisher Full Text
45. Hamilton M: A rating scale for depression.
Brit Med J 1960, 23(1):56-62.
46. Ware JE Jr, Sherbourne CD: The MOS 36-item short-form health survey (SF-36): I. Conceptual framework and item selection.
Med Care 1992, 30(6):473-483. PubMed Abstract | Publisher Full Text
47. Pachana NA, Byrne GJ, Siddle H, Koloski N, Harley E, Arnold E: Development and validation of the geriatric anxiety inventory.
Int Psychogeriatrics/IPA 2007, 19(1):103-114. Publisher Full Text
48. Jacobson NS, Truax P: Clinical significance: a statistical approach to defining meaningful change in psychotherapy research.
J Consult Clin Psychol 1991, 59(1):12-19. PubMed Abstract | Publisher Full Text
49. Leeuw M, Goossens M, de Vet H, Vlaeyen J: The fidelity of treatment delivery can be assessed in treatment outcome studies: a successful illustration from behavioral medicine.
J Clin Epidemiol 2009, 62(1):81-90. PubMed Abstract | Publisher Full Text
50. Hegel MT, Dietrich AJ, Seville JL, Jordan CB: Training residents in problem-solving treatment of depression: a pilot feasibility and impact study.
Fam Med 2004, 36(3):204-208. PubMed Abstract | Publisher Full Text
51. Young J, Beck AT: Manual of the cognitive therapy rating scale. Pittsburgh: Penn University Center for Cognitive Therapy; 1990.
52. Fitzmaurice GM, Laird NM, Ware JH: Applied longitudinal analysis. Hoboken: Wiley; 2004.
53. Faul F, Erdfelder E, Buchner A, Lang AG: Statistical power analyses using G*Power 3.1: Tests for correlation and regression analyses.
Behav Res Methods 2009, 41(4):1149-1160. PubMed Abstract | Publisher Full Text
54. Australian Bureau of Statistics: Australian historical population statistics. Canberra: Australian Bureau of Statistics; 2010.
Pre-publication history
The pre-publication history for this paper can be accessed here:
http://www.biomedcentral.com/1471-244X/12/207/prepub
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:30:15.000Z
|
qf3aludh2jnil5pp5nn32l2hsru77val
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:60645",
"uncompressed_offset": 355466172,
"url": "www.biomedcentral.com/1472-6963/12/422/abstract",
"warc_date": "2013-11-22T14:34:20.000Z",
"warc_filename": "<urn:uuid:a5b2a457-047b-465d-9fda-eacbfdc10b90>",
"warc_url": "http://www.biomedcentral.com/1472-6963/12/422/abstract"
}
|
cccc_CC-MAIN-2013-20
|
Research article
Challenges in identifying barriers to adoption in a theory-based implementation study: lessons for future implementation studies
Andria Hanbury1*, Katherine Farley1, Carl Thompson1, Paul Wilson2 and Duncan Chambers2
Author Affiliations
1 Alcuin C, Department of Health Sciences, University of York, York, England, YO10 5DD, UK
2 Centre for Reviews and Dissemination, University of York, York, England, UK
For all author emails, please log on.
BMC Health Services Research 2012, 12:422 doi:10.1186/1472-6963-12-422
Published: 23 November 2012
Abstract
Background
Exploring barriers to the uptake of research based recommendations into practice is an important part of the development of implementation programmes. Techniques to identify barriers can include use of theory-informed questionnaires and qualitative interviews. Conceptualising and measuring theory-informed factors, and engaging health professionals’ to uncover all potential barriers, can be a difficult task. This paper presents a case study of the process of trying to identify, systematically, the key factors influencing health professionals’ referrals for women diagnosed with mild to moderate postnatal depression for psychological treatment. The paper illustrates how the factors were conceptualised and measured and explores the real world challenges experienced, with implications for future implementation studies.
Methods
Theory-informed factors were conceptualised and measured using a questionnaire and interviews. The questionnaire was piloted, before being administered to general practitioners, practice nurses and health visitors working in general practices in one area of the UK NHS. The interviews were conducted with a small sample of general practitioners who had not completed the questionnaire, further exploring factors influencing their referral decisions in the local context.
Results
The response rate to the questionnaire was low (19%), despite selecting the recommendation to target through engagement with local stakeholders and surveying local health professionals, and despite using two reminders, an incentive prize, and phone calls to practice managers to bolster response rates.
Conclusions
Two significant challenges to achieving higher response rates and successfully exploring local context were identified: the difficulties of developing a robust- but feasible- questionnaire to explore theory-informed factors, and targeting recommendations that are important to policy makers, but which health professionals view as unimportant. This case study highlights the “trade-off” between scientifically rigorous collection of data against the pragmatism and flexibility requirements of “real world” implementation. Future implementation studies should explore different ways of identifying factors influencing the adoption of recommendations to bridge this gulf.
Keywords:
Diagnostic analysis; Tailored implementation; Postnatal depression; Mixed methods
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:29:44.000Z
|
f3wclzyjbn3rbw477niyyqb7kutn6e5d
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:60650",
"uncompressed_offset": 383041879,
"url": "www.ccsenet.org/journal/index.php/ijbm/article/view/11843",
"warc_date": "2013-11-22T14:34:20.000Z",
"warc_filename": "<urn:uuid:a5b2a457-047b-465d-9fda-eacbfdc10b90>",
"warc_url": "http://www.ccsenet.org/journal/index.php/ijbm/article/view/11843"
}
|
cccc_CC-MAIN-2013-20
|
Factors Influencing the Successful Adoption of Decision Support Systems: The Context of Aqaba Special Economic Zone Authority
Fairouz Mosleh Aldhmour, Malek Bakhit Eleyan
Abstract
This research aimed to examine the main factors that influence the successful adoption of Decision Support
Systems (DSS) in the Aqaba Special Economic Zone Authority (ASEZA). It investigated a set of factors which are;
System Characteristics (Perceived Ease of Use (PEOU) & Perceived usefulness (PU)), Technical Aspects
(information technology infrastructure & information systems interoperability), and Organizational Aspects (top
management support (TMS), management style (MS), & organizational structure (OS)).
A questionnaire was distributed to a sample of (161) respondents to collect primary data, & based on a
convenience sample the response rate was about 79%. Furthermore, the findings were analyzed using the
Statistical Package for Social Software (SPSS), with an R2 of 35.3%, linear Multiple Regression analysis revealed
that all research variables have significant effect on successful adoption of DSS.
The results indicated that PU & IT infrastructures have a positive & significant influence on the successful
adoption of DSS. Whereas, PEOU, IS interoperability, TMS, MS, & OS have no significant influence on the
successful adoption of DSS. Finally, the findings indicated that no significant statistical differences existed
between respondents’ perceptions towards DSS adoption in terms of their demographic characteristics. Based on
the research findings & conclusions, a number of recommendations & future research suggestions are proposed.
Full Text: PDF DOI: 10.5539/ijbm.v7n2p163
This work is licensed under a Creative Commons Attribution 3.0 License.
International Journal of Business and Management ISSN 1833-3850 (Print) ISSN 1833-8119 (Online)
Copyright © Canadian Center of Science and Education
To make sure that you can receive messages from us, please add the 'ccsenet.org' domain to your e-mail 'safe list'. If you do not receive e-mail in your 'inbox', check your 'bulk mail' or 'junk mail' folders.
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:19:53.000Z
|
2zw2jxi2buypidywhbolivfvvtkmephk
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:60653",
"uncompressed_offset": 409321347,
"url": "www.crummy.com/1999/02/16",
"warc_date": "2013-11-22T14:34:20.000Z",
"warc_filename": "<urn:uuid:a5b2a457-047b-465d-9fda-eacbfdc10b90>",
"warc_url": "http://www.crummy.com/1999/02/16"
}
|
cccc_CC-MAIN-2013-20
|
<D <M <Y
Y> M> D>
: Well, I just shelled out $67 for a ticket back from San Jose to LAX. Thanks to Stephan Nagey and his gang for offering me a ride up there and saving me from having to spend even more money.
[Main]
Unless otherwise noted, all content licensed by Leonard Richardson
under a Creative Commons License.
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:41:04.000Z
|
gwnu32ikwftbgms3jouobvxqotdshotz
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:60662",
"uncompressed_offset": 450211249,
"url": "www.eoearth.org/article/Yosemite_National_Park,_United_States",
"warc_date": "2013-11-22T14:34:20.000Z",
"warc_filename": "<urn:uuid:a5b2a457-047b-465d-9fda-eacbfdc10b90>",
"warc_url": "http://www.eoearth.org/article/Yosemite_National_Park,_United_States"
}
|
cccc_CC-MAIN-2013-20
|
Rate This Article
Average: 0/5
Yosemite National Park, United States
Yosemite National Park, United States
This article has been reviewed by the following Topic Editor: Langdon D. Clough
Yosemite National Park lies in the heart of the Californian Sierra. Its vast glaciated valley, granite domes, hanging valleys, waterfalls, tarns and moraines, make it an excellent multifaceted example of a glaciated granite landscape. Its range of habitats from 600m to 4,000m contains great biodiversity.
Country
United States of America - California
Name
Yosemite National Park
Natural World Heritage Site
1984: Inscribed on the World Heritage List under Natural Criteria vii and viii.
IUCN Management Category
II National Park
Yosemite National Park (Source: Marietta.edu Marietta College)
Biogeographical Province
Sierra-Cascade (1.20.12 )
Geographical location
In the central Sierra Nevada mountains 225 km due east of San Francisco at 37°30' to 38°11'N by 119°12' to 119°53'W.
Date and History of Establishment
• 1864: Yosemite Valley and Mariposa Big Tree Grove granted to the state of California under President Lincoln by Act of Congress 13 Stat.325;
• 1890: Yosemite National Park created around the Yosemite Valley and Mariposa Grove reserve by decree 26 Stat. 650, through the advocacy of John Muir and President Roosevelt, and granted to the state of California;
• 1905: Californian state lands conveyed to the Federal government; National Park boundary adjusted;
• 1929: Park extended by 4,846.47 ha; further extended in 1930, 1931, 1932, 1937, 1938 and 1984;
• 1984: 95% of the Park designated a Wilderness by Congress;
• 1987: The Merced River designated a National Wild and Scenic River.
Land tenure
Federal government. Managed by the National Park Service (NPS) of the Department of the Interior.
Area
308,283 ha. The Park is surrounded by four national forests: Stanislaus northwest, Toiyabe northeast, Sierra southwest and Inyo southeast.
Altitude
Ranges from 549m to 3997m (Mt. Lyell).
Physical features
The Sierra Nevada range is between 80 and 130 km across, sloping gradually to the west and steeply to the east. Yosemite straddles the Sierra Nevada batholith, a massive composite granite pluton composed of a mosaic of smaller magmatic bodies that solidified underground in the Cretaceous period, were later thrust to the surface and then exposed by the erosion of overlying sedimentary rocks. About 10 million years ago, through tectonic activity accompanied by vulcanism, the batholith was buckled, uplifted and tilted to the west. The steepened gradient greatly accelerated erosion by existing rivers. Some two to three million years ago a series of glacial advances gouged out steep-sided U-shaped valleys. The last of the glaciers carved a 910m cleft in the surrounding uplands, now the spectacular 11km-long Yosemite valley, flanked by massive exfoliated granite domes, half domes and sheer cliffs. In retreat it left a series of morainal dams near El Capitan, impounding a lake which became the valley floor. The sheer monolithic granite walls appear newly glaciated, showing little postglacial erosion though rockfalls are quite frequent. The Park encloses the headwaters of the Tuolumne and Merced rivers. It` contains many waterfalls from the hanging valleys and some 300 lakes. At 746m the three-tier Yosemite falls are the longest falls in the country. The Park’s other large canyons are the Grand Canyon of the Tuolumne river and the Tenaya Canyon. The transmountain Tioga road rises some 1,800m to the Tioga pass at 3,060m, the highest road pass in the country.
Climate
Beyond the semi-arid foothills this is a changeable mountain climate with cold snowy winters when two-thirds of the annual precipitation of 950mm falls as snow which averages 2m deep above the 2,100m level.. The crests and peaks are relatively dry but during the spring thaw when the many waterfalls erupt, floods in the valleys can be destructive. Average winter temperatures in Yosemite Valley and Wawona in the south of the Park, both at 1,200m, range between 12°C to –2°C. Summers are warm to hot, ranging between 31°C and 1°C. Temperatures at Tuolumne Meadows at 2,645m in the mountains are 15° to 20°C colder. The average annual diurnal temperature range is 20°C.
Vegetation
Coniferous forest in Yosemite National Park (Source: Marietta College)
The vegetation of Yosemite is unfragmented, varied and largely intact. It has 1,460 species of vascular plants, ferns, bryophytes and lichens in 27 plant communities and 16 major forest types containing 37 tree species. The six main vegetation types are a small fringe of foothill chaparral-oak woodland from 300m to 900m (~4% of the Park), lower montane mixed forest between 900m and 1.800m (22% of the Park), upper montane conifer forest between 1,800m and 2,450m (28% of the Park), and subalpine forest from 2,450m to 2,900m (39% of the Park). Above this are alpine fell fields and rock (7% of the Park). Small areas of riparian vegetation, wetlands and meadows (~4% of the Park, within the other zones), are found at every elevation and are important as they contain nearly 40% of the Park's flora. There is one endemic species, Yosemite woolly sunflower Eriophyllum nubigenum, and 8 eight nationally threatened or endangered species (NPS,2007).
The foothill chaparral-oak woodland (probably created by Indian burns) has digger pine Pinus sabineana, interior live oak Quercus wislizeni and an understorey of California lilac Ceanothus spp., manzanita Arctostaphylos spp. and chamise Adenostoma fasciculatum. The western foothills are clothed in a lower montane mixed forest of ponderosa pine Pinus ponderosa, incense cedar Calocedrus decurrens, Douglas fir Pseudotsuga menziesii, and white fir Abies concolor (15.18% of the Park), interspersed with areas of black oak Quercus kelloggii and canyon live oak Quercus chrysolepis. A few stands (168 ha) of giant sequoia Sequoiadendron gigantea grow between 1,550 and 2100m. There are three big groves of the tree in the Park: Mariposa, Tuolumne, Merced.
The equally large area of upper montane forest is dominated by lodgepole pine Pinus contorta (20.45% of the Park), red fir Abies magnifica (12.38%), western white pine P. monticola, with jeffrey pine P. jeffreyi, western juniper Juniperus occidentalis, and one of the finest virgin stands of sugar pine Pinus lambertiana in the country. This zone has many meadows and bogs with a very high water table in late summer. Above this is the extensive subalpine forest of lodgepole pine with western white pine, and at higher elevations, mountain hemlock Tsuga mertensiana, and whitebark pine Pinus albicaulis growing to the treeline. Above 3.900m are alpine fell fields with alpine willow Salix petrophila and sparse low growing perennial herbs, grasses and sedges.
Fauna
Coyote are found in the Sierra at all elevations and at all times of the year. (Source: NPS Photo)
Beyond the main tourist areas Yosemite has a wide range of intact habitats which harbour 250 species of vertebrates. 90 species of mammals are recorded, among them opossum Didelphis virginiana, 7 shrews, 17 bats, 5 Lagomorphs, 39 rodents including the golden beaver Castor canadensis auratus and (introduced), yellow-haired porcupine Erethizon dorsatum, 6 squirrels, 8 chipmunks, 8 mice and 19 carnivores (NPS, 2007).
The most commonly seen mammals are in the warmer lowland forests. They include chipmunk Eutamias spp., Sierra black bear Ursus americanus californiensis, mountain coyote Canis latrans lestes, grey fox Urocyon cinereoargenteus, racoon Procyon lotor, pronghorn antelope Antilocapra americana and mule deer Odocoileus hemionus. The western mastiff bat Eumops perotis, whose echolocation calls are audible, is North America’s largest bat. Golden mantled ground squirrel Spermophilus beecheyi is common higher up. Resident but rarely seen are pine marten Martes americana, fisher M. pennati, wolverine Gulo gulo (VU), mountain lion Puma concolor, ringtail cat Bassariscus astutus, bobcat Lynx rufus and Sierra red fox Vulpes vulpes necatoc. In the alpine area Sierra bighorn sheep Ovis canadensis sierrae (40 individuals), extinct in Yosemite by 1914, but reintroduced in 1986, the yellow-bellied marmot Marmota and the Mount Lyell shrew Sorus lyelli, the Park’s only endemic mammal are found. The pika Ochotona princeps is an alpine species which needs cold conditions: its disappearance may be an indicator of climatic warming.
This is an Important Bird Area having 247 species with 150 species regularly and over 80 occasionally seen. 84 species breed in the Park including peregrine falcon Falco peregrinus, great grey owl Strix nebulosa and northern goshawk Accipiter gentiles. The nationally endangered southern bald eagle Haliaeetus leucocephalus migrates through the Park. A decline in the bird population has been partly ascribed to the nest-parasite brown-headed cowbird Molothrus ater, a non-native species.
17 species of amphibians include the Lyell salamander Hydromantes platycephalus which is endemic to the region, the common and noisy Pacific tree frog Pseudacris regilla, the rare mountain yellow-legged frog Rana muscosa (CR) and endemic Yosemite toad Bufo canorus (EN). 22 reptiles are recorded, among them the western pond turtle Terrapine ornata, 8 lizard and 13 snake species including western rattlesnake Crotalus oreganus and the red, black and cream mountain kingsnake Lampropeltis zonata. The Park contains 11 fish species, six of which are endemic. The introduction of alien game fish has adversely effected native species (NPS, 2007).
Cultural heritage
Indians have lived in the valleys for at least 8,000 years. The last Indian inhabitants, the Ahwahneechee, named after their village in the valley, were a sub-tribe of the Mono Paiute from the east. The peaceful Miwok to the west are said to have termed them ‘yosemite’ or ‘killers’ (Anderson, 2007), but the word may denote easterners. Some 1,000 designated archaeological sites have been recorded. The valley was discovered by gold rush adventurers in 1851 and its inhabitants driven out in the Mariposa Indian war of 1861, shortly before the area was granted to the state of California. The great conservationist John Muir campaigned for the Park and unsuccessfully against the Hetch Hetchy reservoir on the Tuolumne river in the Park.
Local human population
The immediately surrounding population is sparse, totalling less than 100,000 in 1995 (NPS, pers.comm., 1995). In 2000, 265 people were living in the Park village of Yosemite Valley.
Visitors and visitor facilities
Annual visitation which was already one million in 1954, now exceeds 3.5 million. A very full range of visitor services is available, both in the Park and in the surrounding communities,: visitor and information centers, library, museum, history center, cultural exhibit, Mariposa Grove museum, nature center, wilderness centers, mountaineering school and clinic. Activities, most run by the Yosemite Concession Services Corporation, cover bus tours, driving, bicycling, mule rides, guided riding and hiking, mountaineering, climbing, fishing, swimmimg, rafting, skating, snowshoeing and skiing, cross-country and downhill. There are 1,280 km of trails and 19 km of roads. The Tioga road, Highway 120, crosses the mountains but is closed in winter. There is overnight accommodation of various kinds for over 15,700: 4 lodges in the valley with several just outside the Park, and camping for 900 in 13 campsites, including group and stock camps for riders. Use of the wilderness is limited by permit and quota. Educational programs are run by the Yosemite National Institutes and interpretive services are offered by the Yosemite Association. There are three airports within an hour and a half from the Park.
Scientific research and facilities
The area has been studied since the 19th century. A detailed baseline survey of the vertebrate fauna made between 1914-1920 by Grinnell & Storer of the Museum of Vertebrate Zoology, University of California at Berkeley was part replicated by a team from the same institution in 2003 (Sanders, 2003). Past research projects have covered atmospheric research, physics, hydrology, geology, biology, plant ecology, zoology and animal ecology, sociology, forestry, epidemiology and geographical information systems. Recent mammal research covered black bear ecology and population dynamics, ground squirrel social behaviour, the distribution, abundance and habitat requirements of Sierra mountain beaver, the population dynamics, movement patterns and foraging ecology of Sierra Nevada bighorn sheep, forest carnivores and the interactions between mountain lions and humans. The air quality is constantly monitored for signs of acid rain and ozone. The Institute for Bird Populations has operated bird-banding stations in Yosemite, yielding valuable data on long-term population trends, and conducted a park-wide survey of species in 1999-2000 that provided extensive information about species-habitat relationships. The Sierra Nevada Aquatic Research Laboratory of the University of California is also researching stream hydrology and ecology in the Park, evaluating fish, amphibian, and invertebrate populations and the effect of non-native species. There is a research library and a museum collection containing some 2,000 bird and mammal study skins, 2,000 insect specimens, an herbarium of 5,000 plant specimens, 5,000 archaeological specimens and over 20,000 historic photographs.
Conservation value
The Park is an area of outstanding mountain scenery and of great value as wilderness. There are areas representing nearly all the different environments of the Sierra Nevada, including sequoia groves, historic sites and evidence of Indian life, It lies within a Conservation International-designated Conservation Hotspot, a WWF Global 200 Eco-region and a WWF/IUCN Centre of Plant Diversity.
Conservation Management
The National Park Service General Management Plan grew out of a major extended planning study and public involvement program and was approved in 1980. It zoned the Park into Natural (98%), Cultural (2%) and Special Use (1%) zones. In the Natural zone were the Wilderness subzone with limited visitor numbers though sport fishing is permitted; Environmental Protection Subzone for scientific research only; Outstanding Natural Feature Subzone for maximum protection; and Natural Environment Subzone for roads, picnicking areas, and trailheads but minimal development. In the Cultural zone were the Historical Subzone for preservation of historical resources; Archeological Subzone for preservation of park-wide archaeological resources; Development Zone for visitor use and park operation and Special-Use Reservoir Subzone for the two reservoirs of Hetch Hetchy and Lake Eleanor in the northwest, managed by the San Francisco Water Department. The four surrounding national forests provide important buffers. A subsequent Resources Management Plan identified the major threats to conservation and the programs designed to tackle them and mitigate their impacts.
The General Management Plan updated in 2000 incorporated the 1992 Concessions Services Management Plan and Final Environmental Impact Statement with Plans for Visitor Use, Indian Cultural Programs, Park Operations and Visitor Protection, Boundary Alteration, Land Acquisition and Additions to Wilderness, and 18 Development Area Plans. Hundreds of projects were to be implemented over a 20 to 30 year period, of which fifteen projects for improvements, maintenance and restoration were submitted to Congress and completion expected by the mid 2000s. A Fire Management Plan prescribes fires in the giant sequoia woodlands and other fire-dependent communities to ensure their future; such controlled burns and the use of wildfires are now used to avoid the build up of debris which makes fires more destructive.
Management Constraints
The most serious current threats to Yosemite's native wildlife and ecosystems include loss of the natural fire regime, invasion by alien species, habitat fragmentation, air pollution and climate change. From 1890 to 1968 the Park management suppressed natural fires causing significant changes to the forests by leaving brush which intensifies fires when they occur. The area was formerly heavily grazed which resulted in changes in species composition and the introduction of exotic plants. Grizzly bear, California bighorn sheep and grey wolf disappeared in the late 19th to early 20th centuries. The beaver, brown-headed cowbird Molothrus ater, the game birds white-tailed ptarmigan Lagopus leucurus and wild turkey Meleagris gallopavo and game fish species are all alien intrusions which unbalances the natural ecology.
Extreme visitor pressure and the inappropriate large-scale development of modern accommodation and commercial facilities have also had a disturbing effect on the Valley. A major trans-Sierra road bisects the Park, giving easier access to the high backcountry and studies have shown serious impacts caused by hikers and campers there. Heavy tourist pressure has forced the closure of uncontrolled camping and controls over the feeding of animals, especially bears which are spoiled by contact with humans. The two hydroelectric and water storage reservoirs permitted under special legislation cause local disturbance. Destructive floods (as in 1997) have enforced the building of new facilities out of floodplains; but destructive rockfalls are harder to predict.
Staff
About 300 year-round permanent and 300 seasonal employees with 1,800 concession employees in summer and 900 in winter (undated information), supplemented with over 5.2 million hours of volunteer labor. Recent figures were not found.
Budget
The 1980 General Management Plan estimated a budget of $15.5 million over 10 years for new and restored concession and government facilities. In 1989 there was an annual operating budget of US$ 10,780,182. Revenue from entrance fees is high. More recent figures were not found.
Local Address
Superintendent, PO Box 577, Yosemite National Park, California 95389.
References
The principal source for the above information was the original nomination for World Heritage status.
• Anderson, D. (2007). Origin of the Word Yosemite. Yosemite Online.
• Arno, S. (1973). Discovering Sierra Trees. Yosemite Natural History Association (YNHA) & Sierra Natural History Association (SNHA), Yosemite.
• Basey, H. (1976). Discovering Sierra Reptiles and Amphibians. YNHA & SNHA, Yosemite.
• Beatty, M. (1971). A Brief Story of the Geology of the Yosemite Valley. YNHA, Yosemite National Park.
• Brockman, C. (1947). Broadleaved trees of Yosemite National Park. Yosemite Nature Notes 26(1).
• Browning, P. (1988). Yosemite Place Names. Great West Books, Lafayette, California, USA.
• Cole, J. (1963). Cone-bearing Trees of Yosemite National Park. YNHA Yosemite National Park.
• Evans, W. & Wallis, L. (1948). Fish of Yosemite National Park. YNHA.
• Gaines, D. (1988). Birds of Yosemite and the East Slope. Artemesia Press, Lee Vining, California.
• Godfrey, E. (1977). Yosemite Indians (revised). YNHA, Yosemite
• Grater, R. (1978). Discovering Sierra mammals. YNHA & SNHA, Yosemite.
• Grinnel, J. & Storer, T. (1924). Animal Life in the Yosemite. An Account of the Mammals, Birds, Reptiles and Amphibians in a Cross Section of the Sierra Nevada. University of California Press, Berkeley, California. 770pp.
• Heady, H. & Zinke, P. (1978). Vegetational Changes in Yosemite Valley. National Park Service Occasional Paper No. 5. Department of the Interior. 25 pp.
• Hill, M (1975).Geology of the Sierra Nevada. Berkeley, University of California Press, 232 p.
• Huber, N. (1987). The Geologic Story of Yosemite National Park. U.S.Geological Survey Bulletin 1595, USGC, Washington, D.C.,USA. 64p.
• Jones, W. (1976). Domes, Cliffs, and Waterfalls; a Brief Geology of Yosemite Valley. Yosemite National Park, Yosemite Natural History Association, 21 p.
• Matthes, F. (1930). Geologic History of the Yosemite Valley + an appendix: Calkins, F. The Granitic Rocks of the Yosemite Region. U.S. Geological Survey Professional Paper 160.137pp
• National Park Service (NPS) (2007). http://www.nps.gov/yose/
• National Park Service (1980).Yosemite National Park, California. General Management Plan: Visitor Use, Park Operations, Development. National Park Service, Department of the Interior. 81 pp.
• Parker, H. (1952). Mammals of Yosemite National Park.
• Russell, C. (1968). One Hundred years in Yosemite. YNHA, Yosemite.
• Sanborn, M. (1981). Yosemite. Its Discovery, its Wonders, its People. Random House, New York.
• Sanders, R. (2003). Museum scientists to repeat landmark 80-year-old Yosemite wildlife survey. UC Berkeley News, August.
• van Wagtendonk, J. (n.d.). Refined Burning Prescriptions for Yosemite National Park. National Park Service Occasional Paper. No. 2. US Department of the Interior. 21 pp.
• Walker, M. (1964). Reptiles and amphibians of Yosemite National Park. Yosemite Nature Notes 25 (1).
• Wilson, L. & Wilson, J. (1987). Wildflowers of Yosemite. Sunrise Productions, Yosemite.
DATE 1983. Updated 5-1990, 7-1995, November 2007.
Disclaimer: This article is taken wholly from, or contains information that was originally published by, the United Nations Environment Programme-World Conservation Monitoring Centre (UNEP-WCMC). Topic editors and authors for the Encyclopedia of Earth may have edited its content or added new information. The use of information from the United Nations Environment Programme-World Conservation Monitoring Centre (UNEP-WCMC) should not be construed as support for or endorsement by that organization for any new information added by EoE personnel, or for any editing of the original content.
Citation
United Nations Environment Programme-World Conservation M, United Nations Environment Programme-World Conservation M (Lead Author);Langdon D. Clough (Topic Editor) "Yosemite National Park, United States". In: Encyclopedia of Earth. Eds. Cutler J. Cleveland (Washington, D.C.: Environmental Information Coalition, National Council for Science and the Environment). [First published in the Encyclopedia of Earth June 9, 2010; Last revised Date June 9, 2010; Retrieved May 18, 2013 <http://www.eoearth.org/article/Yosemite_National_Park,_United_States>
The Authors
The UNEP World Conservation Monitoring Centre (UNEP-WCMC) is a collaboration between the United Nations Environment Programme, the world's foremost intergovernmental organization, and WCMC 2000, a UK-based charity. Our Vision A world where biodiversity counts Our Mission To evaluate and highlight the many values of biodiversity and put authoritative biodiversity knowledge at the centre of decision-making Our Goal To be an internationally recognised Centre of Excellence for the synthe ... (Full Bio)
The UNEP World Conservation Monitoring Centre (UNEP-WCMC) is a collaboration between the United Nations Environment Programme, the world's foremost intergovernmental organization, and WCMC 2000, a UK-based charity. Our Vision A world where biodiversity counts Our Mission To evaluate and highlight the many values of biodiversity and put authoritative biodiversity knowledge at the centre of decision-making Our Goal To be an internationally recognised Centre of Excellence for the synthe ... (Full Bio)
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:11:22.000Z
|
6xwlpgrn5wx7j535tdo4e3pek7lckj2l
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:60664",
"uncompressed_offset": 460520467,
"url": "www.familysearch.org/learn/wiki/en/FamilySearch_Wiki:Moving_a_page",
"warc_date": "2013-11-22T14:34:20.000Z",
"warc_filename": "<urn:uuid:a5b2a457-047b-465d-9fda-eacbfdc10b90>",
"warc_url": "http://www.familysearch.org/learn/wiki/en/FamilySearch_Wiki:Moving_a_page"
}
|
cccc_CC-MAIN-2013-20
|
FamilySearch Wiki:Moving a pageEdit This Page
From FamilySearch Wiki
Pages may be moved to a new title if the previous name is inaccurate, incomplete, misleading or for a host of different housekeeping reasons such as that it is not the common name of the topic or it is an article that was created as a subpage and is ready to "go live". When a page is renamed, its page history is attached to the new name, and the previous title is automatically redirected to the new name (administrators have the option of suppressing the redirect).
When a page in the file namespace (that is, images and media) is moved, the associated file is moved as well.
Pages in category namespace cannot be moved.
See also
• This page was last modified on 24 November 2011, at 14:24.
• This page has been accessed 295 times.
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:43:09.000Z
|
zolr4ws5f7m7pvkmhpxkyytxkomqxwg5
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:60665",
"uncompressed_offset": 460546499,
"url": "www.familysearch.org/learn/wiki/en/index.php?days=3&target=Israel&title=Special%3ARecentChangesLinked",
"warc_date": "2013-11-22T14:34:20.000Z",
"warc_filename": "<urn:uuid:a5b2a457-047b-465d-9fda-eacbfdc10b90>",
"warc_url": "http://www.familysearch.org/learn/wiki/en/index.php?title=Special:RecentChangesLinked&days=3&target=Israel"
}
|
cccc_CC-MAIN-2013-20
|
Changes related to "Israel"
From FamilySearch Wiki
Israel
This is a list of changes made recently to pages linked from a specified page (or to members of a specified category). Pages on your watchlist are bold.
Recent changes options Show last 50 | 100 | 250 | 500 changes in last 1 | 3 | 7 | 14 | 30 days
Hide minor edits | Show bots | Hide anonymous users | Hide logged-in users | Hide my edits
Show new changes starting from 09:43, 18 May 2013
Page name:
No changes on linked pages during the given period.
New to the Research Wiki?
In the FamilySearch Research Wiki, you can learn how to do genealogical research or share your knowledge with others.
Learn More
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:37:21.000Z
|
cpdv37dllbveb72rw73jfypmasnz5kui
|
{
"content_type": "application/xhtml+xml",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:60676",
"uncompressed_offset": 512705098,
"url": "www.hindawi.com/journals/ipid/2012/741273/abs/",
"warc_date": "2013-11-22T14:34:20.000Z",
"warc_filename": "<urn:uuid:a5b2a457-047b-465d-9fda-eacbfdc10b90>",
"warc_url": "http://www.hindawi.com/journals/ipid/2012/741273/abs/"
}
|
cccc_CC-MAIN-2013-20
|
About this Journal Submit a Manuscript Table of Contents
Interdisciplinary Perspectives on Infectious Diseases
Volume 2012 (2012), Article ID 741273, 8 pages
doi:10.1155/2012/741273
Research Article
Diversity of Mosquito Vectors (Diptera: Culicidae) in Caxiuanã, Pará, Brazil
1Fiocruz, CPqRR, LAESA, Avenue Augusto de Lima, 1715, sala 206, 30190-002 Belo Horizonte, MG, Brazil
2PMAGS, DCB, ENSP Expansão do Campus, Avenue Brasil, 4036 sala 703, 21040-361 Rio de Janeiro, RJ, Brazil
Received 11 April 2012; Accepted 1 August 2012
Academic Editor: Cléber Galvão
Copyright © 2012 Ulisses E. C. Confalonieri and Cristina Costa Neto. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Abstract
This paper presents a study based on ecological parameters represented by diversity and richness indices applied in a community of mosquitoes (Diptera: Culicidae), at the National Forest of Caxiuanã, Melgaço municipality, state of Pará, in the Brazilian Amazon. A total of 25,433 specimens of culicids were collected in the study, from five field collection periods, over 10 months, between 2005 and 2006. Specimens were collected in four heights of the forest (ground level, 8 m, 16 m, and 30 m-canopy). Diversity indices of Shannon and Berger-Parker were obtained, and indicators of dominance of species were calculated. The species Culex portesi was dominant in this site, representing about 84% of specimens. Measures of richness and similarity (Jaccard) were obtained for the five strata of time and four height levels. According to the richness estimator abundance-based covered estimator (ACE) the greatest value occurred in April (2006), considering the levels of height to 16 m and on the ground. The estimates obtained have shown quantitative parameters of mosquito populations in the region of the Forest of Caxiuanã.
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:20:40.000Z
|
o3w3hba2llchmk2cbgbsixc4krrpocwy
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:60678",
"uncompressed_offset": 533004603,
"url": "www.indiaenvironmentportal.org.in/category/thesaurus/sustainable-development?page=2",
"warc_date": "2013-11-22T14:34:20.000Z",
"warc_filename": "<urn:uuid:a5b2a457-047b-465d-9fda-eacbfdc10b90>",
"warc_url": "http://www.indiaenvironmentportal.org.in/category/thesaurus/sustainable-development?page=2"
}
|
cccc_CC-MAIN-2013-20
|
IFPRI’s 2012 Global Food Policy Report reviews food policy developments and trends with chapter-by-chapter discussions of major food policy developments, high-quality research, and perspectives of farmers from around the world.
TERI University is all set to get an academic chair under the Railway Ministry, after a formal announcement by the Union Minister at the time of presenting the Railway Budget.
National Bank for Agriculture and Rural Development (Nabard) has estimated the prioritised resource requirement for critical infrastructure needs at Rs 8,098.19 crore for Karnataka during the 12th Plan period. Nabard has adopted the theme "Critical Rural Infrastructure for agriculture and rural development" for 2013-14.
According to Nabard, the critical infrastructure is defined as that infrastructure, which if created, will support increased credit flow under agriculture and benefit a large number of people.
Decrying indiscriminate use of natural resources and deforestation in the name of growth, Union Environment Minister Jayanthi Natarajan today said that industries and corporates should focus on protecting the environment and ensure balanced and sustained development.
"...There are some industries, which feel that we should indiscriminately use natural resources, cut down our forests and use them for growth," she told reporters here on the sidelines of the annual general meeting of the Indian Plywood Industries Research and Training Institute, an autonomous body under the union ministry of environment.
This report by the Ministry of Statistics and Programme focuses extensively on the conceptual foundations of economic evaluation providing an outline of what would ideally be needed for a comprehensive set of national accounts.
An innovation needs support to survive. The same innovation can make a revolution, provided it gets the recognition and support from the government. The Bihar government has shown how an innovation when transformed into a revolution can influence food production.
The United Nations Conference on Sustainable Development (UNCSD) in June 2012—commonly referred to as Rio+20—left many perplexed. If a number of advances were made, the results fell well short of what is needed to redirect the global economy onto a sustainable course.
This paper is aimed at policy level discussions, as well as an aid to civil society to push for necessary changes to take Indian economy, society, and polity towards the goal of human well-being with ecological sustainability as one fulcrum.
Finance minister P Chidambaram batted for sustainable development repeatedly in his speech, marking the arrival of the phrase in mainstream political and economic lexicon.
The FM wants credit for acting on environment, but does the wrong things
The "mool mantra" of Budget 2013 is inclusive and sustainable development, says Finance Minister P Chidambaram. But, as far as the environment is concerned, there is no substance in the Budget that tells us how the direction of growth will be environmentally sound. Instead, the finance minister talks about the Cabinet Committee on Investment, which has been set up to fast-track clearances. There is no indication in his speech that this drive for investment will be cognisant of the needs for sustainability and will strengthen, not weaken, the regulatory system that governs green clearances.
Pages
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:11:43.000Z
|
fzogxhuvv6o4wc3jyrbqxcsogfn2mqek
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:60685",
"uncompressed_offset": 539288631,
"url": "www.isfdb.org/cgi-bin/title.cgi",
"warc_date": "2013-11-22T14:34:20.000Z",
"warc_filename": "<urn:uuid:a5b2a457-047b-465d-9fda-eacbfdc10b90>",
"warc_url": "http://www.isfdb.org/cgi-bin/title.cgi?1038061"
}
|
cccc_CC-MAIN-2013-20
|
Bibliography: Fiddling for Waterbuffaloes
You are not logged in. If you create a free account and sign in, you will be able to customize what is displayed.
Title: Fiddling for Waterbuffaloes
Author: S. P. Somtow
Year: 1992
Type: CHAPTERBOOK
Language: English
ISFDB Record Number: 1038061
User Rating: This title has fewer than 5 votes. VOTE
Current Tags: None Add Tags
Variant Titles:
Publications:
Copyright (c) 1995-2011 Al von Ruff.
ISFDB Engine - Version 4.00 (04/24/06)
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T10:00:41.000Z
|
rclecvzoufph3ji24byducl2ziroq4fr
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:60698",
"uncompressed_offset": 592735031,
"url": "www.mdpi.com/2073-4409/1/4/1089",
"warc_date": "2013-11-22T14:34:20.000Z",
"warc_filename": "<urn:uuid:a5b2a457-047b-465d-9fda-eacbfdc10b90>",
"warc_url": "http://www.mdpi.com/2073-4409/1/4/1089"
}
|
cccc_CC-MAIN-2013-20
|
Cells 2012, 1(4), 1089-1106; doi:10.3390/cells1041089
Article
Cellular Stress Following Water Deprivation in the Model Legume Lotus japonicus
1 Department of Vegetal Biochemistry and Molecular Biology, Chemistry Faculty, University of Seville, Apartado 1203, 41071-Sevilla, Spain 2 Biochemistry Laboratory, Department of Vegetal Biology, Agronomy Faculty, Av. E. Garzón 780, CP 12900 Montevideo, Uruguay
* Author to whom correspondence should be addressed.
Received: 1 August 2012; in revised form: 9 November 2012 / Accepted: 9 November 2012 / Published: 13 November 2012
(This article belongs to the Special Issue Cellular Stress Response)
Download PDF Full-Text [382 KB, uploaded 13 November 2012 11:12 CET]
Abstract: Drought stress is one of the most important factors in the limitation of plant productivity worldwide. In order to cope with water deprivation, plants have adopted several strategies that produce major changes in gene expression. In this paper, the response to drought stress in the model legume Lotus japonicus was studied using a transcriptomic approach. Drought induced an extensive reprogramming of the transcriptome as related to various aspects of cellular metabolism, including genes involved in photosynthesis, amino acid metabolism and cell wall metabolism, among others. A particular focus was made on the genes involved in the cellular stress response. Key genes involved in the control of the cell cycle, antioxidant defense and stress signaling, were modulated as a consequence of water deprivation. Genes belonging to different families of transcription factors were also highly responsive to stress. Several of them were homologies to known stress-responsive genes from the model plant Arabidopsis thaliana, while some novel transcription factors were peculiar to the L. japonicus drought stress response.
Keywords: drought stress; Lotus japonicus; transcriptomics; cellular stress response; reactive oxygen species; transcription factors
Supplementary Files
Article Statistics
Click here to load and display the download statistics.
Cite This Article
MDPI and ACS Style
Betti, M.; Pérez-Delgado, C.; García-Calderón, M.; Díaz, P.; Monza, J.; Márquez, A.J. Cellular Stress Following Water Deprivation in the Model Legume Lotus japonicus. Cells 2012, 1, 1089-1106.
AMA Style
Betti M, Pérez-Delgado C, García-Calderón M, Díaz P, Monza J, Márquez AJ. Cellular Stress Following Water Deprivation in the Model Legume Lotus japonicus. Cells. 2012; 1(4):1089-1106.
Chicago/Turabian Style
Betti, Marco; Pérez-Delgado, Carmen; García-Calderón, Margarita; Díaz, Pedro; Monza, Jorge; Márquez, Antonio J. 2012. "Cellular Stress Following Water Deprivation in the Model Legume Lotus japonicus." Cells 1, no. 4: 1089-1106.
Cells EISSN 2073-4409 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:11:39.000Z
|
oamozdoa5d2iu3ubkk5zll6kz43kwa67
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:60713",
"uncompressed_offset": 641651631,
"url": "www.openwetware.org/index.php?redirect=no&title=Anthrone_cellulose_quantification",
"warc_date": "2013-11-22T14:34:20.000Z",
"warc_filename": "<urn:uuid:a5b2a457-047b-465d-9fda-eacbfdc10b90>",
"warc_url": "http://www.openwetware.org/index.php?title=Anthrone_cellulose_quantification&redirect=no"
}
|
cccc_CC-MAIN-2013-20
|
Anthrone cellulose quantification
From OpenWetWare
Jump to: navigation, search
Updated version of cellulose quantification method described by Updegraff in 1969, for use in 1.5 mL tubes. Based on a protocol by Stewart Gillmor.
Materials
• Spectrophotometer (e.g. Jenway Genova Life Science Analyzer)
• Microbalance (e.g. Mettler UMT 2)
• Tin capsules (weighing vessels)
• 1 mL quartz cuvettes
• Acetone
• Millipore water
Solutions
• Anthrone solution: 100 mg anthrone (CAS 90-44-8) in 10 mL concentrated sulfuric acid. Must be prepared fresh daily
• Acetic nitric reagent: 150 mL 80% acetic acid plus 15 mL concentrated nitric acid.
• 10 mM glucose stock solution: 180.16 mg glucose in 100 mL ddH20
Procedure
1. Collect 10 Arabidopsis seedlings in 70% ethanol. Warm them at 70º C for one hour.
2. Take off the ethanol, replace it with more 70% ethanol and warm at 70º C for another 45 minutes.
3. Remove ethanol, add 1 mL acetone, and let sit for 10 minutes.
4. Remove acetone and let samples dry overnight (or speed-vac, if necessary).
5. Mass seedlings on an analytical balance.
6. Add 1 mL of acetic nitric reagent, heat at 98º C for 30 minutes.
7. Spin seedlings down at 14000 rpm for 10 minutes, then remove most of the supernatant, being careful not to lose any of the tissue.
8. Add 1 mL of ddH2O and invert. Spin down for another 10 minutes at 14000 rpm.
9. Remove half of the supernatant, add 1 mL acetone, and spin for 5 minutes.
10. Remove 1 mL of the supernatant, add 1 mL acetone, spin for another 5 minutes.
11. Remove as much of the supernatant as possible without losing tissue, then dry overnight or speed vac.
12. Add 100 µL 67% H2SO4. Cover, mix well on vortexer.
13. Mix 400 µL ddH2O with this solution, and then add 1 mL of anthrone solution (to tubes on ice). Boil on heat block for 5 minutes.
14. Transfer samples back to ice, then fill a glass or quartz cuvette with the blank (no glucose) solution.
15. Blank machine, read absorbance of all samples at 620 nm, find glucose concentration with standard curve. Wash the cuvette out with both deionized water and acetone each time to prevent a white deposit from clouding the cuvette window.
Make a glucose standard curve: 3 replicates each of the following six solutions:
Total glucose (nmol): 50, 100, 150, 200, 300, 400
Volume of ddH2O (µL): 495, 490, 485, 480, 470, 460
Volume of 10 mM Glc soln. (µL): 5, 10, 15, 20, 30, 40
Add 1 mL anthrone solution to these 500 µL volumes, read OD at 620 nm.
Notes on procedure
1. Polypropylene 1.5 mL tubes and pipette tips are stable to concentrated sulfuric acid, though the use of disposeable polystyrene cuvettes is not recommended (S. Gillmor, personal communication). Tubes should be sealed with cap-locks for all heating steps, especially ones involving acid.
2. Massing dry tissue directly in 1.5 mL tubes is not recommended, as we found that the resulting static electricity caused the microbalance we used to drift, sometimes quite significantly. Transferring tissue from small aluminum weighing vessels to tubes, and then finding the mass transferred by difference yielded much more stable and objective dry mass values. The microbalance values agreed with the values from less precise balances to within their uncertainty. Samples should be handled with tweezers to avoid local air currents from heating.
3. The mixing of sulfuric acid and water is highly exothermic, and is capable of driving the reaction of carbohydrate with anthrone. Accordingly, tubes should be kept on ice upon addition of anthrone solution in step 13, and then all transferred together to a heatblock as quickly as possible to allow the reaction to proceed to the same extent in all tubes (Scott and Melvin, 1953). If multiple batches of tubes are heated in a single day, it is quite important to control the temperature of the heat block in addition to heating time, as failing to control for this results in large absorbance differences between identical standards (not shown). For a five minute boiling time, approximately 75-175 nmol glucose corresponds to the linear range with absorbances between 0.4 and 0.9 that is ideal for spectrophotometric quantification, so tissue samples should have total glucose levels approximately in this range.
4. Scott and Melvin (Scott and Melvin, 1953), who achieved standard deviations of 0.48%, noted that variation between blank samples from minute carbohydrate contamination seems to be the main source of uncertainty in the spectrophotometric assay. Our blanks for a given day generally differed by less than 0.01 absorbance units, indicating small amount of instrument drift. In one run we used a method blank, performing all the extraction steps on an empty tube, and its final absorbance was essentially the same as the standard blank, providing confidence that our samples were not contaminated by stray polysaccharides during the extraction steps.
5. If solution heated in step 13 is insufficiently acidic, a white precipitate forms, preventing collection of absorbance data. If the solution is heated much longer than 5 minutes it will turn brown, and the absorbance at 620 nm will no longer be linear with glucose concentration.
6. There is danger of losing tissue in the various wash steps, especially step 12, because the acetic-nitric reagent treatment turns tubes yellow and the pelleted tissue covered with supernatant is very difficult to see. This problem may have been especially acute when we used an old centrifuge that may not have achieved its nominal maximum speed, causing the seedlings to not pellet properly.
Personal tools
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:48:18.000Z
|
uubav2ir2l4bgyn6qxhevf46cixszrqh
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:60714",
"uncompressed_offset": 647168217,
"url": "www.panarmenian.net/eng/news/118031/",
"warc_date": "2013-11-22T14:34:20.000Z",
"warc_filename": "<urn:uuid:a5b2a457-047b-465d-9fda-eacbfdc10b90>",
"warc_url": "http://www.panarmenian.net/eng/news/118031/"
}
|
cccc_CC-MAIN-2013-20
|
Weightlifter Meline Daluzyan fails at London 2012 Olympics
PanARMENIAN.Net - European champion and World Championship bronze medal winner Meline Daluzyanperformed unsuccessfully at Olympic women’s 69 kg weightlifting class, failing to lift both 140 and 142 kg in the snatch.
Daluzyan came 6th in the clean and jerk.
Rim Jong Sim of North Korea wins Olympic gold.
Another Armenian weightlifter Arakel Mirzoyan (69 kg) also performed unsuccessfully on July 31, scoring no points in the snatch.
Partner news
Top stories
Armenian grandmaster Levon Aronian is currently 3rd with 4 points, Bulgaria’s Veselin Topalov is 7th with 3 points.
European Individual Chess Championship ended in Polish town of Legnica, with 24 chess players winning World Cup qualifications.
Gor Minasyan won silver medal, Andranik Karapetyan and Izabella Yalyan both won bronze at Junior World Championships in Lima.
The chief coach noted that the Greco-Roman wrestlers will participate in Mariupol-hosted tournament in June.
Partner news
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:59:44.000Z
|
isqk7y3ehpptbkvsm6xie2ojxls4mpa6
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:60715",
"uncompressed_offset": 653148211,
"url": "www.perseus.tufts.edu/hopper/text?doc=urn%3Acts%3AgreekLit%3Atlg1799.tlg001.perseus-eng1%3A3.def.2",
"warc_date": "2013-11-22T14:34:20.000Z",
"warc_filename": "<urn:uuid:a5b2a457-047b-465d-9fda-eacbfdc10b90>",
"warc_url": "http://www.perseus.tufts.edu/hopper/text?doc=urn:cts:greekLit:tlg1799.tlg001.perseus-eng1:3.def.2"
}
|
cccc_CC-MAIN-2013-20
|
2
A straight line is said to touch a circle which, meeting the circle and being produced, does not cut the circle.
This work is licensed under a Creative Commons Attribution-ShareAlike 3.0 United States License.
An XML version of this text is available for download, with the additional restriction that you offer Perseus any modifications you make. Perseus provides credit for all accepted changes, storing new additions in a versioning system.
load focus Greek (J. L. Heiberg, 1883)
hideData/Identifiers
Citation URN: urn:cts:greekLit:tlg1799.tlg001.perseus-eng1:3.def.2
Document URN: urn:cts:greekLit:tlg1799.tlg001.perseus-eng1
hide Display Preferences
Greek Display:
Arabic Display:
View by Default:
Browse Bar:
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:13:54.000Z
|
rmzou3fppdu6lcdunoll2wzzipinztfn
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:60735",
"uncompressed_offset": 811659678,
"url": "www.werelate.org/wiki/Place:Mullin,_Mills,_Texas,_United_States",
"warc_date": "2013-11-22T14:34:20.000Z",
"warc_filename": "<urn:uuid:a5b2a457-047b-465d-9fda-eacbfdc10b90>",
"warc_url": "http://www.werelate.org/wiki/Place:Mullin,_Mills,_Texas,_United_States"
}
|
cccc_CC-MAIN-2013-20
|
Place:Mullin, Mills, Texas, United States
Watchers
NameMullin
Alt namesMullensource: USGS, GNIS Digital Gazetteer (1994) GNIS48038866
TypeTown
Coordinates31.556°N 98.666°W
Located inMills, Texas, United States
source: Getty Thesaurus of Geographic Names
the text in this section is copied from an article in Wikipedia
Mullin is a town in Mills County in Northwestern Central Texas. The population was 175 at the 2000 census.
Research Tips
This page uses content from the English Wikipedia. The original content was at Mullin, Texas. The list of authors can be seen in the page history. As with WeRelate, the content of Wikipedia is available under the Creative Commons Attribution/Share-Alike License.
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:14:04.000Z
|
unz7tlwinzsatxysalzguorvy5a4xzi2
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:60736",
"uncompressed_offset": 811665788,
"url": "www.werelate.org/wiki/Place_talk:Toronto,_York,_Ontario,_Canada",
"warc_date": "2013-11-22T14:34:20.000Z",
"warc_filename": "<urn:uuid:a5b2a457-047b-465d-9fda-eacbfdc10b90>",
"warc_url": "http://www.werelate.org/wiki/Place_talk:Toronto,_York,_Ontario,_Canada"
}
|
cccc_CC-MAIN-2013-20
|
Place talk:Toronto, York, Ontario, Canada
Places listed as "Alternate Names" [10 July 2012]
I have now redirected Place:Toronto, Ontario, Canada back into Place:Toronto, York, Ontario, Canada, having moved Contained Places first.
The following places are given as alternate names for Toronto:
• Fort Rouillee. French fort existed in 18th century, abandoned 1769.
• York. Name of Toronto 179? - 1834
• Yorkville. separate village immediately north of Toronto, part of York Township in 1851, an identifiable census area in York Township 1861 till it was merged with Toronto
• Brockton. A small village west of Yorkville, not identifiable on censuses before 1871 if then.
• West Toronto Junction. Not just a railway station, but a large area covered with railway tracks, industry, livestock yard, and people living in houses. In York Township until merged in ????. Identifiable on censuses when?
• Eglinton. A village north of Yorkville, but separated from it by a ravine which could be unnavigable by horse and cart December through May. I notice another village, Davisville, is listed in York. Davisville is in between Yorkville and Eglinton.
• North Toronto. Eglinton became North Toronto (the common parlance name changed) as it grew northward. Not part of Toronto until after 1911.
• East Toronto. Called Little York in the mid-1800s. A census division in 1911.
• Parkdale. South of West Toronto Junction facing Lake Ontario. In York Township 1861. Afterwards to be checked.
• Humber Bay. Beyond Parkdale. The name of a very small community about 1840. Eventually the area became the smallest village that joined Toronto in 1953, but then it was called Swansea. The only reason Humber Bay is in WR is that it was the name of the local LDS congregation and its list of members in 1910 is in WR sources, i.e., it's no different than calling a church by a saint's name.
None of these places are listed separately. I believe that all ought to be with the exception of Fort Rouillee, York, and possibly Humber Bay (which could be completely deleted).
But, how do we find the people pages that ought have their references to the new place pages adjusted?
I had a look at New York City for comparison. Alternate names there include "The Big Apple" and NYC, but not, say, "The Bowery". The list for Toronto omits Muddy York, Hogtown, Metro and T-O or TO, which were/are commonly used and describe the whole city. --goldenoldie 02:46, 5 July 2012 (EDT)
Not knowing anything about Toronto, I concur that according to your analysis, the following ought to be separate place pages:
• Yorkville
• Brockton
• Eglinton == North Toronto
• Davisville
• East Toronto == Little York
• Parkdale
• Humber Bay (size isn't what matters, just separate community. The nucleus of a community can be as simple as a church and a general store.)
I'd say that these pages are for data entry going forward, and there is no need to retroactively reclassify references, except if they happen to be reviewed for some other reason.
(I agree with you that the question of neighborhoods within cities constitutes a totally separate issue which requires resolution WeRelate-wide.)
--Pkeegstra 20:02, 9 July 2012 (EDT)
If you click on the Family History Library Catalog link on this place page, you'll notice the FHLC lists several "Use for" locations. It seems that when the places were originally imported from FHLC, these places were considered "Alt names" instead of a new place page being created for them. This is just a guess, but it is a pattern I'm seeing from working on the NL place pages. So, at times, when there are alt names listed, they are simply names for adjoining small towns whose records could be found in the larger municipality (thus not being a true alt name). So, what I've done is delete the incorrect alt names, and create new places pages for them. --Jennifer (JBS66) 11:45, 10 July 2012 (EDT)
Amalgamating neighbourhoods [7 July 2012]
Wikipedia has this as a topic which will be brought in as a reference, not only in Toronto, but in the places being almalgamated.
I had not found the wiki when I wrote the above topic the other day. --goldenoldie 08:58, 7 July 2012 (EDT)
Revising Toronto [14 August 2012]
I have just completed Phase 1 of the revision.
• The alternate names which should have been separate communities have been moved out (but their individual descriptions have yet to be done).
• The general description of Toronto has been condensed from Wikipedia's provision. (I don't believe we need to import the patting-one's-own-back sections of Wikipedia articles.)
• The history section will also be subjected to a condensation and correction shortly. (I am tempted to do the correcting in Wikipedia.)
• I have added references to two maps found in Wikimedia Commons (and wish we could import them.)
• Research Tips have been added, the section "York local provision" is new. I may break it into two sections: one for York Region (a new place I had to add) and one for Toronto.
• A discussion of late 19th-early 20th century amalgamations relative to the censuses of the time needs doing. This should probably be an "article". Until overall census indexing, such as that on Ancestry and automatedgenealogy, came out it was pretty well impossible to figure out where an ancestor would be found with only the general location of "Toronto". Some census districts were labelled York, some Toronto.--goldenoldie 16:12, 14 August 2012 (EDT)
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:29:05.000Z
|
e6zvzj6juvhalcvl3jferdgyac3zs4ro
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:60739",
"uncompressed_offset": 816289975,
"url": "www.wikidoc.org/index.php/TNF",
"warc_date": "2013-11-22T14:34:20.000Z",
"warc_filename": "<urn:uuid:a5b2a457-047b-465d-9fda-eacbfdc10b90>",
"warc_url": "http://www.wikidoc.org/index.php/TNF"
}
|
cccc_CC-MAIN-2013-20
|
Tumor necrosis factors
(Redirected from TNF)
Jump to: navigation, search
WikiDoc Resources for
Tumor necrosis factors
Articles
Most recent articles on Tumor necrosis factors
Most cited articles on Tumor necrosis factors
Review articles on Tumor necrosis factors
Articles on Tumor necrosis factors in N Eng J Med, Lancet, BMJ
Media
Powerpoint slides on Tumor necrosis factors
Images of Tumor necrosis factors
Photos of Tumor necrosis factors
Podcasts & MP3s on Tumor necrosis factors
Videos on Tumor necrosis factors
Evidence Based Medicine
Cochrane Collaboration on Tumor necrosis factors
Bandolier on Tumor necrosis factors
TRIP on Tumor necrosis factors
Clinical Trials
Ongoing Trials on Tumor necrosis factors at Clinical Trials.gov
Trial results on Tumor necrosis factors
Clinical Trials on Tumor necrosis factors at Google
Guidelines / Policies / Govt
US National Guidelines Clearinghouse on Tumor necrosis factors
NICE Guidance on Tumor necrosis factors
NHS PRODIGY Guidance
FDA on Tumor necrosis factors
CDC on Tumor necrosis factors
Books
Books on Tumor necrosis factors
News
Tumor necrosis factors in the news
Be alerted to news on Tumor necrosis factors
News trends on Tumor necrosis factors
Commentary
Blogs on Tumor necrosis factors
Definitions
Definitions of Tumor necrosis factors
Patient Resources / Community
Patient resources on Tumor necrosis factors
Discussion groups on Tumor necrosis factors
Patient Handouts on Tumor necrosis factors
Directions to Hospitals Treating Tumor necrosis factors
Risk calculators and risk factors for Tumor necrosis factors
Healthcare Provider Resources
Symptoms of Tumor necrosis factors
Causes & Risk Factors for Tumor necrosis factors
Diagnostic studies for Tumor necrosis factors
Treatment of Tumor necrosis factors
Continuing Medical Education (CME)
CME Programs on Tumor necrosis factors
International
Tumor necrosis factors en Espanol
Tumor necrosis factors en Francais
Business
Tumor necrosis factors in the Marketplace
Patents on Tumor necrosis factors
Experimental / Informatics
List of terms related to Tumor necrosis factors
Editor-In-Chief: C. Michael Gibson, M.S., M.D. [1]
Overview
Tumor necrosis factors (or the TNF-family) refers to a group of cytokines family that can cause apoptosis.
Mechanism
TNF acts via the TNF Receptor (TNF-R) and is part of the extrinsic pathway for triggering apoptosis. TNF-R is associated with procaspases through adapter proteins (FADD, TRADD, etc.) that can cleave other inactive procaspases and trigger the caspase cascade, irreversibly committing the cell to apoptosis.
TNF interacts with tumor cells to trigger cytolysis or cell death.
TNF can interact with receptors on epithelial cells, which leads to increased vascular permeability allowing leukocytes access to the site of infection. This is a type of localized inflammatory response, although systemic release may lead to septic shock and death.
Types
• Tumor necrosis factor-alpha (TNF-α) is the most well-known member of this class, and sometimes referred to when the term "tumor necrosis factor" is used.
References
1. Lippincott's Illustrated Reviews: Immunology. Paperback: 384 pages. Publisher: Lippincott Williams & Wilkins; (July 1, 2007). Language: English. ISBN-10: 0781795435. ISBN-13: 978-0781795432. Page 68
External links
Navigation WikiDoc | WikiPatient | Popular pages | Recently Edited Pages | Recently Added Pictures
Table of Contents In Alphabetical Order | By Individual Diseases | Signs and Symptoms | Physical Examination | Lab Tests | Drugs
Editor Tools Become an Editor | Editors Help Menu | Create a Page | Edit a Page | Upload a Picture or File | Printable version | Permanent link | Maintain Pages | What Pages Link Here
There is no pharmaceutical or device industry support for this site and we need your viewer supported Donations | Editorial Board | Governance | Licensing | Disclaimers | Avoid Plagiarism | Policies
Personal tools
Namespaces
Variants
Actions
Navigation
Toolbox
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:19:29.000Z
|
enqg4i33jh6zcjhgqvua2jplfpjjdp2h
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:60750",
"uncompressed_offset": 10095118,
"url": "answers.onstartups.com/questions/26033/negotiating-equity-commission-working-for-friends-startup?answertab=oldest",
"warc_date": "2013-11-22T14:33:36.000Z",
"warc_filename": "<urn:uuid:3942ac6a-f443-4707-8ba8-894b75c6cf35>",
"warc_url": "http://answers.onstartups.com/questions/26033/negotiating-equity-commission-working-for-friends-startup?answertab=oldest"
}
|
cccc_CC-MAIN-2013-20
|
Tell me more ×
Answers OnStartups is a question and answer site for entrepreneurs looking to start or run a new business. It's 100% free, no registration required.
I've been working with a friend's startup for about six months now. We have minimal revenue thus far, but things look to be on the brink of coming through. My role with the company has yet to be completely formalized, but I'm having the conversation with him later this week. I am the only employee working on the project in the US, and thus am responsible for all the business development. I have no idea what to expect/request in negotiating with him. I've been putting in approximately 30 hours a week (in addition to my regular full-time job and another part-time job that helps pay bills).
A) Should I negotiate for equity in the company? I think yes, as he mentioned me being a "member of the founding team." If so, what is a reasonable percentage? There are currently two full-time and two part-time employees working on the project. None of us are on salary, or even hourly at this point. B) Should I negotiate for a percentage of contracts that I arrange? If so, what is an appropriate percentage? C) Is a hybrid approach best?
Being as he's a friend, I don't think he's looking to screw me over, and I'm not looking to do the same to him. But I'm putting in a lot of effort into this project in a variety of ways. How do I take care of myself while still growing the company?
Any and all input is appreciated!
share|improve this question
2 Answers
Sounds like things are going well at the moment, so there is no strain on your friendship, which is good.
However, having run a business with people who were my friends first and business partners second, I would strongly recommend you get yourself on a proper legal footing with your friend; that way, if things get bumpy, you don't have to concern yourself with those sorts of things and can focus on helping the business survive/grow. On the other side of the coin, if things work out well, you don't need to be worrying whether you will be looked after. If your friend has a reasonable grasp of business realities, he shouldn't find any of this threatening. (One more point, guessing from the hours you are putting in across your 3 jobs, sounds like you might have one or more dependents - if so, then their interests should also be protected in the event something happened to you.)
In terms of what you should be asking for, that very much depends on your aspirations. If you are happy to wait for your investment to mature, then a shareholding makes sense, and part of the 'proper legal footing' would be a shareholders agreement. There are lots of ways of establishing what your contribution is worth (see for example) but it obviously needs to be something you are both happy with and feel is fair. Conversely, if you are looking to generate more immediate income, then the % of contract value is perhaps better. As you suggest a hybrid model is an option, although understand that every penny you take out of the company has an impact on the equity valuation (as it is a penny that won't be spent elsewhere on growing the business), so be sensitive to the dynamics here.
Hope this helps. Good luck with the business.
share|improve this answer
I agree with what Steve Wilkinson had to say.
In addition, there is a very good tool out there that enables you to have a conversation with your friend regarding founding shares and options. It will assist both of you in developing a plan for how to grow the company, attract other staff and what milestones you need to preserve equity in the business. I'm assuming that he'll provide you with founder's equity, but both of you need to think longer term than just your immediate situation. Check out www.optionsanity.com - I've used it successfully since we were just a few people and have grown the company around this model. In addition, new employees find the system fair and equitable.
share|improve this answer
Your Answer
discard
By posting your answer, you agree to the privacy policy and terms of service.
Not the answer you're looking for? Browse other questions tagged or ask your own question.
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:47:59.000Z
|
5zvji4bxmt5s7hm63ky6i54vq6vud3rw
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:60753",
"uncompressed_offset": 10148043,
"url": "answers.onstartups.com/questions/tagged/decision%2Bideas",
"warc_date": "2013-11-22T14:33:36.000Z",
"warc_filename": "<urn:uuid:3942ac6a-f443-4707-8ba8-894b75c6cf35>",
"warc_url": "http://answers.onstartups.com/questions/tagged/decision+ideas"
}
|
cccc_CC-MAIN-2013-20
|
0
votes
3answers
182 views
How to work on multiple ideas?
I have multiple projects of different type and in different status, some of them are more like a business and some more like a hobby. In total there are 8. Some are started, other are launched ...
3
votes
1answer
157 views
How do you decide whether to commit to a project?
I have several startup ideas waiting in a drawer, some of which are probably worth further exploring and continuing to a full business plan and start execution. A different person would probably label ...
2
votes
4answers
105 views
How investors decide, jockey or horse?
For your experience do investors bet on the jockey (founder-s) more than on the horse (idea), when it comes to startups? Also what is general considered attractive investment opportunity when it ...
1
vote
5answers
204 views
Does going overseas help startups to grow?
I am a start-up and i am wondering if i should travel to silicon valley first before deciding on what business to do. i have plenty of ideas for websites. and am still thinking what to settle for. ...
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:11:05.000Z
|
27rqqetn5ozvsidzthueem4ds7n52euh
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:60799",
"uncompressed_offset": 71434064,
"url": "dotnetkicks.com/stories/39582/Anonymous_type_equality_follow_up_Equals",
"warc_date": "2013-11-22T14:33:36.000Z",
"warc_filename": "<urn:uuid:3942ac6a-f443-4707-8ba8-894b75c6cf35>",
"warc_url": "http://dotnetkicks.com/stories/39582/Anonymous_type_equality_follow_up_Equals"
}
|
cccc_CC-MAIN-2013-20
|
Error!
Success!
Anonymous type equality follow-up: Equals()
0
kicks
Anonymous type equality follow-up: Equals() (Unpublished)
After publishing yesterday's post on anonymous type equality, I received an interesting comment from a fellow redditor. He stated that even if the sequence of the property assignment were the same, the equality comparison would still return false, because the types generated by the C# compiler are reference types, making their references being tested for equality and not their data. This is very true, unless..
Kicked By:
Drop Kicked By:
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:30:10.000Z
|
erzywvz4feugn7cuaypabrexbke3bope
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:60805",
"uncompressed_offset": 78030025,
"url": "elinux.org/index.php?diff=prev&oldid=210392&title=Talk%3ABeagleBoardUbuntu",
"warc_date": "2013-11-22T14:33:36.000Z",
"warc_filename": "<urn:uuid:3942ac6a-f443-4707-8ba8-894b75c6cf35>",
"warc_url": "http://elinux.org/index.php?title=Talk:BeagleBoardUbuntu&diff=prev&oldid=210392"
}
|
cccc_CC-MAIN-2013-20
|
Difference between revisions of "Talk:BeagleBoardUbuntu"
From eLinux.org
Jump to: navigation, search
m (rcn-ee.net archive notes)
m (rcn-ee.net archive notes)
Line 38: Line 38:
3.6 - Old Stable (minus-omap4430) (Lucid/Maverick/Natty/Oneiric/Precise/Quantal/Raring Squeeze/Wheezy/Sid)
3.6 - Old Stable (minus-omap4430) (Lucid/Maverick/Natty/Oneiric/Precise/Quantal/Raring Squeeze/Wheezy/Sid)
3.7 - Stable (Lucid/Oneiric/Precise/Quantal/Raring Squeeze/Wheezy/Sid)
3.7 - Stable (Lucid/Oneiric/Precise/Quantal/Raring Squeeze/Wheezy/Sid)
3.8 - Development (Oneiric/Precise/Quantal/Raring Squeeze/Wheezy/Sid)
+
3.8 - Development (Quantal/Raring Wheezy/Sid)
Keep Last two RC's at a time..
Keep Last two RC's at a time..
Revision as of 17:38, 11 January 2013
Contents
Tasks
Here's my current list of tastks, listed by priorty:
Jump in if you have an itch...
Everything i have is here: https://github.com/RobertCNelson/
rcn-ee.net archive notes
Kernel:
version - Stable Deb - Testing Deb - Remove Archive
Karmic - (done) - (done) - (done)
Lucid - (Precise) - (done) - (Precise)
Maverick - (Quantal) - (Quantal) - (Quantal)
Natty - (Raring) - (Raring) - (Raring)
Oneiric - (Raring + 1) - (Raring + 1) - (Raring + 1)
Precise - (Raring + 2) - (Raring + 2) - (Raring + 2)
Quantal - (Raring + 3) - (Raring + 3) - (Raring + 3)
Raring - (Raring + 4) - (Raring + 4) - (Raring + 4)
Lenny - (done(keep 2.6.29)) - (done) - (Wheezy)
Squeeze - (Wheezy) - (Wheezy) - (Jessie)
Wheezy - (Jessie) - (Jessie) - (Jessie + 1)
Jessie - (Jessie + 1) - (Jessie + 1) - (Jessie + 2)
Everything Else:
2.6.36 - Removed
2.6.37 - Removed (Removed during 3.2-rc's)
2.6.38 - Removed (Removed during 3.3-rc's)
2.6.39 - Removed (Removal during 3.4-rc's)
3.0 - Removed (Removal during 3.5-rc's)
3.1 - Removed (Removal during 3.6-rc's)
3.2 - Older Stable (Lucid/Maverick/Natty/Oneiric/Precise Squeeze/Wheezy/Sid) (Holding till panda is stable, otherwise: Removal during 3.7-rc's)
3.3 - Removed (Removal during 3.8-rc's)
3.4 - Older Stable (Beagle only)
3.5 - Older Stable (Beagle only)
3.6 - Old Stable (minus-omap4430) (Lucid/Maverick/Natty/Oneiric/Precise/Quantal/Raring Squeeze/Wheezy/Sid)
3.7 - Stable (Lucid/Oneiric/Precise/Quantal/Raring Squeeze/Wheezy/Sid)
3.8 - Development (Quantal/Raring Wheezy/Sid)
Keep Last two RC's at a time..
3.0-rc (Removed during 3.2-rc)
3.1-rc (Removed during 3.3-rc)
3.2-rc (Removed during 3.4-rc)
3.3-rc (Removed during 3.5-rc)
3.4-rc (Removed during 3.6-rc)
3.5-rc (Removed during 3.7-rc)
3.6-rc (Removed during 3.8-rc)
3.7-rc
3.8-rc
Ps: Anything Removed is still in the Archive Mirror: http://rcn-ee.homeip.net:81/dl/mirrors/deb/
Simple: Things
Bug List
Maverick, X Session - Console broken
Looks like the omapfb package is broken with xorg..
Maverick is EOF (april 2012), please retest with oneiric/precise.. --RobertCNelson 14:59, 12 June 2012 (UTC)
Questions
Upgrade X-loader and U-boot
The content of the following git repo seems to be buggy. mmc card builds fine but after running some errors occur.
git clone git://github.com/RobertCNelson/flash-omap.git
After mk_mmc.sh you might get a
Unknown command 'mmcinit' - try 'help'
• Actually, my script never calls "mmcinit/mmc init" as the new mlo/u-boot will "init" the mmc before loading either boot.scr/uEnv.txt from the mmc and then run the reflash script. --RobertCNelson 13:23, 18 May 2011 (UTC)
BTW: Running on a Rev. C3
I guess this one should be addressed to Rob. But anyway:
Thus you could still follow the instructions of the manual run.
Unfortunately this part is outdated as well for the u-boot which arrived late 2010.
Note: If using the latest version of u-boot note that the commands and parameters might have changed. Thus you might have to use mmc init 0; mmc rescan 0 instead of mmcinit or mmc init 0.
A fatload mmc 0:1 0x80200000 MLO will mostlikely result in something like
MMC: block number 0x1 exceeds max(0x0)
** Can't read from device 0 **
until mmc rescan 0. Such things occur quite often in community forums.
Should the current description be kept on the wiki page since older u-boots are still used? Or will we have to replace the text to make it work with the latest u-boot?
Probably this could be done in parallel when updating and solving the content of the git above?
Cheers,
-- Merkel 10:15, 18 May 2011 (UTC)
• The script has been working perfectly fine with u-boot 2010 for a good year on both Bx/Cx boards. It assumes the worst possible situation, an un-bootable beagle, so you *must* hold down the user button on power up to enable mmc boot. Anything else is/has-been unreliable because u-boot will changes there commands on any random whim... The updated mlo on the mmc will then load u-boot.bin which will init the mmc with it's own internal "mmc boot" script (so mmc init/mmcinit/etc is not needed). On the Bx we need to use the older 2010 u-boot which will then load boot.scr and reflash/replace mlo/u-boot in memory leaving your u-boot env alone (so you'll probally need to update your boot env..) For the Cx we can use a newer faster u-boot (2011), which also happens to load uEnv.txt first, which will then load boot.scr and do the same. --RobertCNelson 13:32, 18 May 2011 (UTC)
• Since you got: "Unknown command 'mmcinit' - try 'help'" i'm going to assume you had a much older mlo/u-boot installed previously, if you paste your boot message on pastebin.com and either email me (email listed here http://elinux.org/User:RobertCNelson ) we could work out where your getting stuck.. --RobertCNelson 13:32, 18 May 2011 (UTC)
Adding the SGX is unclear
Your instructions on adding the SGX acceleration are unclear - you don't specify where all the files you are copying are to come from.
e.g. you say "cp *.so /usr/lib" - but you don't say WHERE you are to issue that command from.
David Hagood 21:57, 3 June 2009 (UTC)
Your choice, either the gfx_rel or the gfx_dbg* directory of the SDK. *really not sure how helpful ti/imgtec would be if we ever found a bug.. ;)
--RobertCNelson 01:46, 4 June 2009 (UTC)
any pre-made images?
It seems a lot easier to put Angstrom on the SD card than Ubuntu--why? Is there any way not to build the rootfs from scratch but rather untar onto the ext3 partition?
There's really two issues, hosting and what is a good generic package for everyone???
File Sizes when tar'ed & 7z'ed
bare-bone base: 47Mb
lxde-desktop: 101Mb
xfce4-desktop: 112Mb
gnome-desktop: 144Mb
xubuntu-desktop: 321Mb
kubuntu-desktop: 357Mb
ubuntu-desktop: 382Mb
I've thought of at-least uploading the bare-bone's to rcn-ee.com, which is good generic starting point, but it's still almost faster to just build lxde-desktop from scratch. (specially if you are you are using apt-cacher-ng/etc)
--RobertCNelson 13:54, 24 June 2009 (UTC)
It probably is faster to build from scratch--however (as an unfortunate medium-level non-computer professional linux user) it took me 15 hours to compile the full ubuntu-desktop image (is that normal?). For the life of me I could not get the uImage to load from my RevC3 board, no matter how I updated the uboot--however, it finally worked when I copied the MLO and uboot.bin files from my working Angstrom card as the first ones on my reformatted fat32 partition and then downloaded your kernel and renamed it uImage.bin. I'd rather know how to get it working with your instructions but I'm glad it worked. Your instructions are quite clear btw although I couldn't upgrade the kernel or write kernel scripts as I couldn't get that far--the nand just wouldn't read the uImage at all.
Considering the number of packages, 15 hours sounds about right. For reference on my dual opteron, with the full ubuntu repo mirrored it takes roughly 6 hours for ubuntu-desktop. An lxde (lxde, gdm) or xfce4 (xfce4, gdm) minimal desktop takes roughly and hour and a half... Could you pastebin your U-Boot bootup with error, I'm guessing it's the latest with the default environment (printenv) which has been changed by default to look for uImage.bin instead of just uImage (and "mmcinit" has been replaced by "mmc init")..
--RobertCNelson 12:59, 25 June 2009 (UTC)
Basically it just said "unable to read uImage file" but there was nothing special. I tried renaming uImage to uImage.bin but nothing happened. The only thing that worked for me was the combo MLO+uboot.bin+uImage.bin. --Jthiels 19:20, 27 June 2009 (UTC)
console-setup-min
I'm not sure where to put this in the page, but adding console-setup-mini to my seed list dramatically improved my boot time. --Rwfowler 16:57, 9 November 2009 (UTC)
Interesting.
Maybe after the Jaunty/Karmic setup section in Build Image?
Replace "Note: For USB WIFI adapters, add package "linux-firmware, wireless-tools" to the --seed WiFi Hints: http://elinux.org/BeagleBoardUbuntuNetwork"
with an new subsection:
Useful Seeds:
console-setup-mini: fast console boot...
linux-firmware, wireless-tools: WiFi Hints: http://elinux.org/BeagleBoardUbuntuNetwork
We don't need to explain every one, just ones that make a nice difference for the board..
PS. I've given some thought about making a meta package such as "ubuntu-desktop" but for the beagle, "beagle-console", "beagle-desktop"
--RobertCNelson 20:41, 9 November 2009 (UTC)
uEnv.txt
The listed uEnv.txt for the Beagleboard XM is wrong. For one thing, it references a zimage file and the instructions make a uImage file.
I used the following, but I'm sure its non-optimal (it waits for a network, for one thing). Any suggestions?
bootargs=ro elevator=noop vram=12M omapfb.mode=dvi:1280x720MR-16@60 mpurate=500 root=/dev/mmcblk0p2 fixrtc quiet splash uenvcmd=mmc rescan;fatload mmc 0:1 0x80000000 uImage;fatload mmc 0:1 0x81600000 uInitrd;bootm 0x80000000 0x81600000
--Richdrich 08:52, 11 September 2012 (UTC)
Hi Richdrich,
The directions for the "uImage" are for the BeagleBone, and they won't be there long, as I just changed the BeagleBone to use zImage now too. As soon as i finish uploading the new images, i'll remove that reference from the wiki (yeah no more mkimage). ;)
Other then not specifying your console it looks fine, well you have no (rootwait)...
--RobertCNelson 15:08, 11 September 2012 (UTC)
Staging Section
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:19:12.000Z
|
64qqipn6xsrn5elj4wgkbzg75mwewe7l
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:60816",
"uncompressed_offset": 87545132,
"url": "familysearch.org/learn/wiki/en/Foxcroft_Illinois_Family_History_Center",
"warc_date": "2013-11-22T14:33:36.000Z",
"warc_filename": "<urn:uuid:3942ac6a-f443-4707-8ba8-894b75c6cf35>",
"warc_url": "http://familysearch.org/learn/wiki/en/Foxcroft_Illinois_Family_History_Center"
}
|
cccc_CC-MAIN-2013-20
|
Foxcroft Illinois Family History CenterEdit This Page
From FamilySearch Wiki
This article describes the services and resources available at a Family History Center, a branch facility of the Family History Library.
(Add a brief paragraph about your center here and the area it serves. Information in italics below is guidance for you and should be deleted as you fill out the page. Remove italics from other text by selecting the text and clicking the "I" box in the Toolbar above.)
Contents
Center Contacts and Hours
Location & Map:
1. (Address)
2. (Include information about your center that would be helpful for first time visitors such which entrance in the building to use, parking, etc. Use as many or as few bullet points as needed.)
3. (Link to map using Google or other map sites)
Phone:
E-mail:
Open Hours:
Holiday Schedule:
Calendar and Events
Upcoming Events
Class Schedule
Staff Training Meetings
Center Resources
Collections
• Family History Library Catalog: This center has the ability to order any of the films and fiche available through the Family History Library Catalog.
• (List additional collections you have such as the types of books and microfilm you have on indefinite loan; though you will not want to list every single item you have. Just give visitors to this page a general idea of your resources.)
Databases and Software
• FHC Portal This center has access to the Family History Center Portal page which gives free access in the center to premium family history software and websites that generally charge for subscriptions. (Note to FHC: Not all FHCs have access to this portal. If you do not, you will want to remove this entire bullet. If you do have access to it, just remove this text in italics.)
Hardware and Equipment
• (Include the resources you have to help individuals do their research - computers, microfilm readers, printers, etc. )
Center Services
Staff Research Specialties
(Include sections for any other services your center provides. Add additional sections for those services. See the Mesa and Logan FHC pages for examples.)
Resources in the Local Area
(This section is to highlight other resources in your area that will be helpful for individuals doing research there in your location, if there are any, such as government offices, historical societies, etc.)
Links
(Include links to other websites of interest to those who visit your center such as links to the city, county and state wiki pages where your center is located.)
Volunteer at the Center
(Include information here about the volunteers you are looking for.)
Need additional research help? Contact our research help specialists.
Need wiki, indexing, or website help? Contact our product teams.
Did you find this article helpful?
You're invited to explain your rating on the discussion page (you must be signed in).
• This page was last modified on 11 April 2013, at 20:08.
• This page has been accessed 176 times.
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:39:05.000Z
|
7hbagkvzsvgfo36yp4ntnfuotjyi3zfx
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:60830",
"uncompressed_offset": 108955732,
"url": "googlesystem.blogspot.com/2007/08/define-your-own-top-search-results.html",
"warc_date": "2013-11-22T14:33:36.000Z",
"warc_filename": "<urn:uuid:3942ac6a-f443-4707-8ba8-894b75c6cf35>",
"warc_url": "http://googlesystem.blogspot.com/2007/08/define-your-own-top-search-results.html"
}
|
cccc_CC-MAIN-2013-20
|
An unofficial blog that watches Google's attempts to move your operating system online.
Send your tips to gostips@gmail.com.
August 10, 2007
Define Your Own Top Search Results
I told you last week that Google is experimenting with a new feature that lets you place custom web pages at the top of search results for some queries. Even if this feature may not be released to everyone, there's a way to define custom results using Google Co-op's subscribed links.
For example, when I search for "onebox", I may want to read this page from my blog. The colored box from the screenshot below includes a user-defined web page.
You can define a list of web pages by creating a new Google Spreadsheet using this format:
* the first row contains: # subscribed links TSV file
* the second row contains: author
* all the other rows should contain four columns: in the first column type item, the second column contains your query, the third column includes the web address and in the last column you could write a small description of the web page.
Then you should publish the spreadsheet, enable "automatically re-publish when changes are made", click on "more publishing options", select TXT from the drop-down and copy the URL. To add this file to Google Co-op, enter the URL here and choose a name for your subscribed links. Google will visit the file in less than a minute and you could test if everything went OK by entering one of your queries at Google.com.
The nice thing is that you can edit the spreadsheet and Google will refresh the list of links in a couple of minutes. You can only define a custom link for a query and the web page doesn't replace the top search result: it's displayed in a special OneBox at the top of the page only for you and only when you're logged in.
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:13:16.000Z
|
pccitnbtd4gwmfihj2vfixncxj52ziqs
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:60864",
"uncompressed_offset": 184482031,
"url": "openwetware.org/index.php?diff=656702&oldid=656645&title=BME103%3AT130_Group_6",
"warc_date": "2013-11-22T14:33:36.000Z",
"warc_filename": "<urn:uuid:3942ac6a-f443-4707-8ba8-894b75c6cf35>",
"warc_url": "http://openwetware.org/index.php?title=BME103:T130_Group_6&diff=656702&oldid=656645"
}
|
cccc_CC-MAIN-2013-20
|
BME103:T130 Group 6
From OpenWetWare
(Difference between revisions)
Jump to: navigation, search
(Protocols)
(Results)
Line 157: Line 157:
| '''Sample''' || '''Integrated Density''' || '''DNA μg/mL''' || '''Conclusion'''
| '''Sample''' || '''Integrated Density''' || '''DNA μg/mL''' || '''Conclusion'''
|-
|-
-
| PCR: Negative Control || E6 || F6 || G6
+
| PCR: Negative Control || E6 || F6 || Negative
|-
|-
-
| PCR: Positive Control || E7 || F7 || G7
+
| PCR: Positive Control || E7 || F7 || Positive
|-
|-
| PCR: Patient 1 ID 19185, rep 1 || E8 || F8 || Negative
| PCR: Patient 1 ID 19185, rep 1 || E8 || F8 || Negative
Line 172: Line 172:
|-
|-
| PCR: Patient 2 ID 88142, rep 3 || E13 || F13 || Negative
| PCR: Patient 2 ID 88142, rep 3 || E13 || F13 || Negative
+
|-
+
| PCR: Calf Thymus || E13 || F13 || Positive
+
|-
+
| PCR: Water || E13 || F13 || Negative
|}
|}
Revision as of 16:28, 15 November 2012
BME 103 Fall 2012 Home
People
Lab Write-Up 1
Lab Write-Up 2
Lab Write-Up 3
Course Logistics For Instructors
Photos
Wiki Editing Help
Contents
OUR TEAM
Name: Jocelynn Christensen
Role: Experimental Protocol Planner
Name: Sam Zimmerman
Role: OpenPCR Machine Engineer
Name: Adam Helland
R&D
Name: Ryan Uchimura
Role: Experimental Protocol Planner
Name: Dakota Styck
Role: OpenPCR Machine Engineer
LAB 1 WRITE-UP
Initial Machine Testing
The Original Design
The images above depict our OpenPCR machine. It performs polymerase chain reactions (PCR), a process in which a particular DNA sequence is amplified. The DNA sequence can then be easily analyzed. The OpenPCR machine accomplishes the amplification of a DNA sequence through a series of heating and cooling sequences.
Experimenting With the Connections
When we unplugged the LCD screen from the circuit board, the machine stopped displaying information on the LCD screen.
When we unplugged the white wire that connects the circuit board to the heating block, the heating block would not heat up.
Test Run
We first tested our OpenPCR machine (machine #6) on October 25, 2012. We ran the machine through a preprogrammed sample test run. At first we were not getting consistent temperature readings outputting to the LCD screen; however, after we rebooted the OpenPCR machine and ran the test again the machine worked perfectly.
Protocols
Polymerase Chain Reaction
1. The Polymerase Chain Reaction or PCR works by singling out a single piece of DNA and then multiplying it so there's millions of copies of one strand of DNA. It's a step by step process that first occurs by heating up the DNA to 100°C in order to denature the hydrogen bonds between the two strands of DNA so that both sides of the DNA can be accesible to copy. After the strands are separated, specific primers are added to locate the section of DNA to be amplified. Next, the Taq DNA polymerase is added which actually copies the section of DNA desired and synthesizes the second half of each strand. After this there are only a few copies of the DNA which is why the machine then replicates more strands by repeating the process multiple times until there are millions of copies.
2.
Procedure
• 1. Collect DNA from patients
• 2. Heat Denaturation- the sample is heated to break the bonds between the strands
• 3. Primer Annealing- the solution cools and the DNA matches up to the primer.
• 4. Extension- The DNA replicates to produce millions of copies of the one strand of DNA .
3. The GoTaq master mix contains 400µM dATP, 400µM dGTP, 400µM dCTP, 400µM dTTP, and 3mM MgCl2
4.Reagents used in our PCR test
Reagent Volume
Template DNA (20ng) 0.2μL
10μM forward primer 1.0μL
10μM reverse primer 1.0μL
GoTaq master mix 50.0μL
dH2O 47.8μL
Total Volume 100.0μL
5. 8 Samples
Positive Control Sample 1 ID:19185 Sample 2 ID:19185 Sample 3 ID:19185
Negative Control Sample 1 ID:88142 Sample 2 ID:88142 Sample 3 ID:88142
Out of the eight samples we ran the PCR on, one was a positive control with the cancer DNA template, the other was a Negative control with no cancer DNA template. Then we had three samples of a 57 year old male's DNA (patient ID 19185). We also had three samples of a 63 year old female's DNA (patient ID 88142).
Flourimeter Measurements
SET UP:
1. Take the file box and place it upside down (after it's been emptied) so that there is now an area that will restrict as much light as possible from coming through in the pictures.
2. Place the hydrophobic slide in the center of the fluorimeter and align it so that the row of dots is directly in the middle of the blue lazer.
3. Using a pipet, place two droplets of water gently on the middle hole of the slide.
4. Next use the pipet to add two droplets of the PCR solution for the first sample with the two water droplets. This must be done cautiously so that the droplets will stay in the center and adhere to each other properly.
5. Turn on the light source on and place the fluorimeter as far back as possible inside the upside down box.
6. Turn the camera on a smart phone and adjust the settings accordingly. Inactivate the flash, set iso to 800 (or higher if possible), set white balance to auto, exposure to the highest setting, saturation to highest setting and contrast to the lowest setting.
7. Place a smartphone camera into the cradle and then move the cradle in front of the fluorimeter at the perfect distance for good resolution (may take some adjusting).
8. Take a picture of the mixture on the fluorimeter (best done if camera is on a timer so that you can fully close the box and avoid excess light exposure.
9. Repeat steps 2-8 for each sample.
IMAGE J Analysis Instructions:
1. Download the Image J software
2. Open Image J
3. To chose your pictures click 'file' and 'open' then select the image you wish to analyze
3. Once your image is opened highlight and click on "analyze", "set measurements", and check the boxes "area" "integrated density" and "mean gray value" in order to just analyze the pieces for this lab.
4. After this you have to highlight and click "image", "color", then click "split channels"
5. This splits the image you have into three new images. For this assignment just keep the image "green" and disregard the others.
6. Then analyze the droplet in the picture to get the info for integrated density, mean gray value, and area.
7. Repeat steps for one picture of each sample.
8. Save your data in an excel page for easy access at another time
Research and Development
Specific Cancer Marker Detection - The Underlying Technology
• Our genes can tell us anything and everything about ourselves.
• The sooner we can detect cancer, the more effectively it can be prevented or treated.
So why not find out about our disposition to cancer with our genes?
The science community has identified many DNA sequences that are correlated to incidence of cancer. Through a process known as Polymerase Chain Reaction, (or PCR,) we can make tons of copies of any sequence of DNA from a DNA template. So, let's say we want to find out if someone has a sequence of DNA that may be indicative of a higher cancer risk; how can we do it?
r17879961 is a sequence of DNA that has been positively linked with cancer. It is a part of a sequence of DNA that codes for a protein kinase called CHEK2.
This image depicts the amplification of a DNA sequence. (An original picture made by our group on PowerPoint)
Results
ImageJ Software Processing
Sample Integrated Density DNA μg/mL Conclusion
PCR: Negative Control E6 F6 Negative
PCR: Positive Control E7 F7 Positive
PCR: Patient 1 ID 19185, rep 1 E8 F8 Negative
PCR: Patient 1 ID 19185, rep 2 E9 F9 Negative
PCR: Patient 1 ID 19185, rep 3 E10 F10 Negative
PCR: Patient 2 ID 88142, rep 1 E11 F11 Negative
PCR: Patient 2 ID 88142, rep 2 E12 F12 Negative
PCR: Patient 2 ID 88142, rep 3 E13 F13 Negative
PCR: Calf Thymus E13 F13 Positive
PCR: Water E13 F13 Negative
KEY
• Sample = Comprised of two drops of DNA solution and two drops of SYBR Green.
• Integrated Density = The integrated density of the drop minus the integrated density of the background. This calculation account for background noise.
• DNA μg/mL = The integrated density of sample divided by the integrated density of drop multiplied by two.
• Conclusion = If the reading is positive then it means that the cancerous mutation is present.If the reading is negative or "no signal," then the mutation is not present.
Personal tools
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:48:07.000Z
|
xw2gucdstujizvflvb7dm4z3yjp43tz5
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:60865",
"uncompressed_offset": 184527630,
"url": "openwetware.org/index.php?oldid=185294&title=User%3AMackenzie_L._Cowell",
"warc_date": "2013-11-22T14:33:36.000Z",
"warc_filename": "<urn:uuid:3942ac6a-f443-4707-8ba8-894b75c6cf35>",
"warc_url": "http://openwetware.org/index.php?title=User:Mackenzie_L._Cowell&oldid=185294"
}
|
cccc_CC-MAIN-2013-20
|
User:Mackenzie L. Cowell
From OpenWetWare
Revision as of 12:42, 8 February 2008 by Mackenzie L. Cowell (Talk | contribs)
Jump to: navigation, search
SIGGRAPH 2006
I'm Mac Cowell. I studied Biology at Davidson College under Malcolm Campbell and Laurie Heyer and I work at MIT helping run iGEM, the International Genetically Engineered Machine Competition. Besides synthetic biology and science 2.0, many of my interests revolve around the ways technology can encourage and enable spontaneous cooperation; for instance, flashmobs and alternate reality games.
I'm online: cis-action.com, twitter, Facebooke. Aim: cxmac2 flickr, cis-action.blip.tv. You can find lots of awesome resources about making videos and distributing them online at MakeInternetTv.org.
You can email me through OWW.
Personal tools
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:12:31.000Z
|
7e2odsae6era2lagdtakskfhfdpwtefg
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:60891",
"uncompressed_offset": 205151740,
"url": "quotationsbook.com/quote/20200/",
"warc_date": "2013-11-22T14:33:36.000Z",
"warc_filename": "<urn:uuid:3942ac6a-f443-4707-8ba8-894b75c6cf35>",
"warc_url": "http://quotationsbook.com/quote/20200/"
}
|
cccc_CC-MAIN-2013-20
|
Quotation added by staff
Why not add this quote to your bookmarks?
Trying to define yourself is like trying to bite your own teeth. Watts, Alan W.
This quote is about identity · Search on Google Books to find all references and sources for this quotation.
A bit about Watts, Alan W. ...
We don't have a biography.
These people bookmarked this quote:
More on the author
This quote around the web
Loading...
Search Quotations Book
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:40:39.000Z
|
cb6mz2g7itrb46picvnqi72dhg2oxh4t
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:60892",
"uncompressed_offset": 205158054,
"url": "quotationsbook.com/quote/21380/",
"warc_date": "2013-11-22T14:33:36.000Z",
"warc_filename": "<urn:uuid:3942ac6a-f443-4707-8ba8-894b75c6cf35>",
"warc_url": "http://quotationsbook.com/quote/21380/"
}
|
cccc_CC-MAIN-2013-20
|
Quotation added by staff
Why not add this quote to your bookmarks?
Intelligence appears to be the thing that enables a man to get along without education. Education enables a man to get along without the use of his intelligence. Wiggam, Albert Edward
This quote is about intelligence and intellectuals · Search on Google Books to find all references and sources for this quotation.
A bit about Wiggam, Albert Edward ...
We don't have a biography.
These people bookmarked this quote:
More on the author
This quote around the web
Loading...
Search Quotations Book
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:12:59.000Z
|
5u4d3srt26pqtycidiwkhskifoiwc6vl
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:60893",
"uncompressed_offset": 205164222,
"url": "quotationsbook.com/quote/40334/",
"warc_date": "2013-11-22T14:33:36.000Z",
"warc_filename": "<urn:uuid:3942ac6a-f443-4707-8ba8-894b75c6cf35>",
"warc_url": "http://quotationsbook.com/quote/40334/"
}
|
cccc_CC-MAIN-2013-20
|
Quotation added by staff
Why not add this quote to your bookmarks?
My own suspicion is that the universe is not only queerer than we suppose, but queerer than we can suppose. Haldane, John B. S.
This quote is about universe · Search on Google Books to find all references and sources for this quotation.
A bit about Haldane, John B. S. ...
We don't have a biography.
These people bookmarked this quote:
More on the author
This quote around the web
Loading...
Search Quotations Book
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:52:59.000Z
|
viktlwpb7py56e7noyimvz5dzvhdtjx5
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:60894",
"uncompressed_offset": 205175807,
"url": "quotationsbook.com/quote/gift/10390/",
"warc_date": "2013-11-22T14:33:36.000Z",
"warc_filename": "<urn:uuid:3942ac6a-f443-4707-8ba8-894b75c6cf35>",
"warc_url": "http://quotationsbook.com/quote/gift/10390/"
}
|
cccc_CC-MAIN-2013-20
|
It's easy! Just pick the product you like and click-through to buy it from trusted partners of Quotations Book. We hope you like these personalized gifts as much as we do.
Make and then buy your OWN fantastic personalized gift from this quote
We are not retreating - we are advancing in another direction. Macarthur, Douglas
Make a fabulous personalised bracelet or other form of jewellery with this quote
Click the banner below to pick the kind of jewellery you'd like ...
Choose something popular ...
Make a custom wrapped canvas ...
Make custom holiday cards ...
Make custom t-shirts ...
Make custom holiday gifts for boys ...
Make custom holiday gifts for girls ...
Make custom holiday gifts for men ...
A selection of more great products and gifts!
212 - The Extra Degree
The one extra degree makes the difference. This simple analogy reflects the ultimate definition of excellence. Because it's the one extra degree of effort, in business and life, that can separate the good from the great. This powerful book by S.L. Parker and Mac Anderson gives great examples, great quotes and great stories to illustrate the 212° concept. A warning - once you read it, it will be hard to forget. Your company will have a target for everything you do ... 212°
Click here to buy this »
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:28:20.000Z
|
ah6uisnviatpumufdk2n2cobd5ncofhb
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:60895",
"uncompressed_offset": 205181311,
"url": "quotationsbook.com/quote/gift/14567/",
"warc_date": "2013-11-22T14:33:36.000Z",
"warc_filename": "<urn:uuid:3942ac6a-f443-4707-8ba8-894b75c6cf35>",
"warc_url": "http://quotationsbook.com/quote/gift/14567/"
}
|
cccc_CC-MAIN-2013-20
|
It's easy! Just pick the product you like and click-through to buy it from trusted partners of Quotations Book. We hope you like these personalized gifts as much as we do.
Make and then buy your OWN fantastic personalized gift from this quote
Those who have never had a father can at any rate never know the sweets of losing one. To most men the death of his father is a new lease of life. Butler, Samuel
Make a fabulous personalised bracelet or other form of jewellery with this quote
Click the banner below to pick the kind of jewellery you'd like ...
Choose something popular ...
Make a custom wrapped canvas ...
Make custom holiday cards ...
Make custom t-shirts ...
Make custom holiday gifts for boys ...
Make custom holiday gifts for girls ...
Make custom holiday gifts for men ...
A selection of more great products and gifts!
212 - The Extra Degree
The one extra degree makes the difference. This simple analogy reflects the ultimate definition of excellence. Because it's the one extra degree of effort, in business and life, that can separate the good from the great. This powerful book by S.L. Parker and Mac Anderson gives great examples, great quotes and great stories to illustrate the 212° concept. A warning - once you read it, it will be hard to forget. Your company will have a target for everything you do ... 212°
Click here to buy this »
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:20:19.000Z
|
32w6v37yg3iqaxqex7eishwpu3vrvy6u
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:60896",
"uncompressed_offset": 205186853,
"url": "quotationsbook.com/quote/gift/16682/",
"warc_date": "2013-11-22T14:33:36.000Z",
"warc_filename": "<urn:uuid:3942ac6a-f443-4707-8ba8-894b75c6cf35>",
"warc_url": "http://quotationsbook.com/quote/gift/16682/"
}
|
cccc_CC-MAIN-2013-20
|
It's easy! Just pick the product you like and click-through to buy it from trusted partners of Quotations Book. We hope you like these personalized gifts as much as we do.
Make and then buy your OWN fantastic personalized gift from this quote
To do easily what is difficult for others is the mark of talent. To do what is impossible for talent is the mark of genius. Amiel, Henri Frederic
Make a fabulous personalised bracelet or other form of jewellery with this quote
Click the banner below to pick the kind of jewellery you'd like ...
Choose something popular ...
Make a custom wrapped canvas ...
Make custom holiday cards ...
Make custom t-shirts ...
Make custom holiday gifts for boys ...
Make custom holiday gifts for girls ...
Make custom holiday gifts for men ...
A selection of more great products and gifts!
212 - The Extra Degree
The one extra degree makes the difference. This simple analogy reflects the ultimate definition of excellence. Because it's the one extra degree of effort, in business and life, that can separate the good from the great. This powerful book by S.L. Parker and Mac Anderson gives great examples, great quotes and great stories to illustrate the 212° concept. A warning - once you read it, it will be hard to forget. Your company will have a target for everything you do ... 212°
Click here to buy this »
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:43:22.000Z
|
lipjq2km2c67cmkj3axkurycrnq26cjm
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:60897",
"uncompressed_offset": 205192379,
"url": "quotationsbook.com/quote/gift/18383/",
"warc_date": "2013-11-22T14:33:36.000Z",
"warc_filename": "<urn:uuid:3942ac6a-f443-4707-8ba8-894b75c6cf35>",
"warc_url": "http://quotationsbook.com/quote/gift/18383/"
}
|
cccc_CC-MAIN-2013-20
|
It's easy! Just pick the product you like and click-through to buy it from trusted partners of Quotations Book. We hope you like these personalized gifts as much as we do.
Make and then buy your OWN fantastic personalized gift from this quote
I can sympathize with people's pains, but not with their pleasures. There is something curiously boring about somebody else's happiness. Huxley, Aldous
Make a fabulous personalised bracelet or other form of jewellery with this quote
Click the banner below to pick the kind of jewellery you'd like ...
Choose something popular ...
Make a custom wrapped canvas ...
Make custom holiday cards ...
Make custom t-shirts ...
Make custom holiday gifts for boys ...
Make custom holiday gifts for girls ...
Make custom holiday gifts for men ...
A selection of more great products and gifts!
212 - The Extra Degree
The one extra degree makes the difference. This simple analogy reflects the ultimate definition of excellence. Because it's the one extra degree of effort, in business and life, that can separate the good from the great. This powerful book by S.L. Parker and Mac Anderson gives great examples, great quotes and great stories to illustrate the 212° concept. A warning - once you read it, it will be hard to forget. Your company will have a target for everything you do ... 212°
Click here to buy this »
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:38:51.000Z
|
fxap7nijfhfy3a6ddh7iw7syasnpzfwx
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:60898",
"uncompressed_offset": 205197921,
"url": "quotationsbook.com/quotes/author/83/",
"warc_date": "2013-11-22T14:33:36.000Z",
"warc_filename": "<urn:uuid:3942ac6a-f443-4707-8ba8-894b75c6cf35>",
"warc_url": "http://quotationsbook.com/quotes/author/83/"
}
|
cccc_CC-MAIN-2013-20
|
Quotes by Akhenaton
We don't have a biography. Please consult wikipedia.
"True wisdom is less presuming than folly. The wise man doubteth often, and changeth his mind; the fool is obstinate, and doubteth not; he knoweth all things but his own ignorance."
Akhenaton on doubt
7 fans of this quote
"The ambitious will always be first in the crowd; he presseth forward, he looketh not behind him. More anguish is it to his mind to see one before him, than joy to leave thousands at a distance."
Akhenaton on enthusiasm
"As the ostrich when pursued hideth his head, but forgetteth his body; so the fears of a coward expose him to danger."
Akhenaton on fear
4 fans of this quote
"Say not that honor is the child of boldness, nor believe thou that the hazard of life alone can pay the price of it: it is not to the action that it is due, but to the manner of performing it."
Akhenaton on honor
"Indulge not thyself in the passion of anger; it is whetting a sword to wound thine own breast, or murder thy friend."
Akhenaton on anger
4 fans of this quote
"As the whirlwind in its fury teareth up trees, and deformeth the face of nature, or as an earthquake in its convulsions overturneth whole cities; so the rage of an angry man throweth mischief around him."
Akhenaton on anger
"labor not after riches first, and think thou afterwards wilt enjoy them. He who neglecteth the present moment, throweth away all that he hath. As the arrow passeth through the heart, while the warrior knew not that it was"
Akhenaton on present
"Honor is the inner garment of the Soul; the first thing put on by it with the flesh, and the last it layeth down at its separation from it."
Akhenaton on character
"Be thou incapable of change in that which is right, and men will rely upon thee. Establish unto thyself principles of action; and see that thou ever act according to them. First know that thy principles are just, and then be thou"
Akhenaton on character
"As a rock on the seashore he standeth firm, and the dashing of the waves disturbeth him not. He raiseth his head like a tower on a hill, and the arrows of fortune drop at his feet. In the instant of danger, the courage of his heart here, and scorn to fly."
Akhenaton on courage
5 fans of this quote
Take a look at recent activity on QB!
Search Quotations Book
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:37:18.000Z
|
u7h4xz7aufiyj4cfxqpjad52xd27gc6q
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:60906",
"uncompressed_offset": 223424268,
"url": "scholarship.rice.edu/handle/1911/65991?show=full",
"warc_date": "2013-11-22T14:33:36.000Z",
"warc_filename": "<urn:uuid:3942ac6a-f443-4707-8ba8-894b75c6cf35>",
"warc_url": "http://scholarship.rice.edu/handle/1911/65991?show=full"
}
|
cccc_CC-MAIN-2013-20
|
The Thresher (Houston, Tex.), Vol. 38, No. 29, Ed. 1 Friday, May 11, 1951
Files in this item
Files Size Format View
thr19510511.pdf 10.19Mb application/pdf
Show simple item record
Item Metadata
dc.coverage.spatial United States - Texas - Harris County - Houston
dc.coverage.temporal Into Modern Times, 1939-Present
dc.date.accessioned 2012-11-07T02:57:40Z
dc.date.available 2012-11-07T02:57:40Z
dc.date.issued 1951-05-11
dc.identifier.uri http://hdl.handle.net/1911/65991
dc.description ten pages : ill. ; page 21 x 15 in.
dc.description.abstract A weekly student newspaper from the Rice Institute in Houston, Texas that includes campus news and commentaries along with advertising.
dc.language eng
dc.publisher Rice University
dc.relation.ispartof This digitized newspaper is also presented online at the Portal to Texas History, at http://texashistory.unt.edu/ark:/67531/metapth230873/
dc.relation.ispartofseries This Issue appears in Vol. 38 of the Rice Thresher.
dc.rights Rights to this material belong to Rice University. This digital version is licensed under a Creative Commons Attribution 3.0 Unported license.
dc.rights.uri http://creativecommons.org/licenses/by/3.0/
dc.subject.lcsh Harris County (Tex.) -- Newspapers
Houston (Tex.) -- Newspapers
Houston (Tex.) -- Periodicals
Student publications -- Texas -- Houston
College student newspapers and periodicals -- Texas -- Houston
dc.title The Thresher (Houston, Tex.), Vol. 38, No. 29, Ed. 1 Friday, May 11, 1951
dc.digitization.specifications Page images were scanned by the UNT Portal to Texas History from microfilm as 8-bit grayscale at 400 dpi and saved as TIF masters, with OCR'd PDF access copies.
dc.source.collection Rice Thresher, Fondren Library, Rice University, Houston, Tex.
dc.citation.volumeNumber 38
dc.citation.issueNumber 29
dc.identifier.digital thr19510511
dc.contributor.publisher Rice Institute
dc.type.genre Newspaper
dc.type.dcmi Text
dc.identifier.citation (1951). "The Thresher (Houston, Tex.), Vol. 38, No. 29, Ed. 1 Friday, May 11, 1951." vol. 38. no. 29,
Rights and Usage
This item appears in the following Collection(s)
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:48:13.000Z
|
5adfxjrwmzhla47cgqql3qizjpd6khqa
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:60967",
"uncompressed_offset": 281543456,
"url": "wiki.openstreetmap.org/wiki/Key:opening_hours",
"warc_date": "2013-11-22T14:33:36.000Z",
"warc_filename": "<urn:uuid:3942ac6a-f443-4707-8ba8-894b75c6cf35>",
"warc_url": "http://wiki.openstreetmap.org/wiki/Key:opening_hours"
}
|
cccc_CC-MAIN-2013-20
|
Key:opening_hours
From OpenStreetMap Wiki
Jump to: navigation, search
Available languages
Deutsch English español français 日本語 polski русский
+/- opening_hours
Description
Describes when something is open or closed.
Group
Properties
Element help
It is possible to enter opening hours for almost everything that has opening hours. Supermarkets and small convenience stores close in most countries at different times (even in the same city), in metropolitan areas there are often small shops open the whole night. Some pharmacies, gas stations, pubs and fast-food-restaurants are open 24/7. This is a very important information if you are looking for a certain facility at night.
Contents
How to map
This is a property tag so it must go with a related tag; e.g.,
Values
Before tagging ways , see Key:access.
TimeDomain is a webtool which helps to determine the values.
Examples
• opening_hours=24/7
applied to: any non-stop facilities (related tags), 24 hours 7 days a week
render on map: someting like object icon with a 24
• opening_hours=Sa-Su 00:00-24:00
applied to: opens only the weekend but nonstop, 24h
• opening_hours=Mo-Fr 08:30-20:00 or for more complex opening hours:
opening_hours=Mo 10:00-12:00,12:30-15:00; Tu-Fr 08:00-12:00,12:30-15:00; Sa 08:00-12:00
opening_hours=Mo-Su 08:00-18:00; Apr 10-15 off; Jun 08:00-14:00; Aug off; Dec 25 off
applied to: any facilities with opening hours (related tags)
render on map: nothing, info recovered by software
• opening_hours=Mo-Sa 10:00-20:00; Tu off or opening_hours=Mo-Sa 10:00-20:00; Tu 10:00-14:00
for exceptions in a range of days
applied to: any facilities with opening hours (related tags)
render on map: nothing, info recovered by software
• opening_hours=sunrise-sunset
applied to: opens every day between sunrise and sunset.
use round brackets to add a time offset, for example a park that opens 2 hours after sunrise and closes 2 hours before sunset (sunrise+02:00)-(sunset-02:00)
• opening_hours=Su 10:00+
Sunday from 10:00 to open end or unknown closing time
applied to: any facilities with opening hours (related tags)
render on map: nothing, info recovered by software
• opening_hours=week 1-53/2 Fr 09:00-12:00; week 2-52/2 We 09:00-12:00
open from 09:00 to 12:00 on fridays of odd weeks and on wednesdays of even weeks
applied to: any facilities with opening hours (related tags)
render on map: nothing, info recovered by software
Syntax
• wd weekday, available: Mo · Tu · We · Th · Fr · Sa · Su (e.g., > Fr 08:30-20:00)
• hh hour, always two digits number in 24h basis (no am/pm), in the format "hh:mm" · (e.g., > Fr 08:30-20:00)
• mm minute, always two digits number in the format "hh:mm" (e.g., > Fr 08:30-20:00)
• mo month, available: Jan · Feb · Mar · Apr · May · Jun · Jul · Aug · Sep · Oct · Nov · Dec · "mo md" (e.g., > Dec 25)
• md monthday, always two digits number in the format · "mo md" (e.g., > Dec 25)
• we week number, always a two digit number in range 01-53, in the format "week we" (e.g., > week 25 Mo 08:30-20:00)
• SH School Holiday, can be used to indicate different opening hours during school holidays (e.g., Mo-Fr 08:00-09:00,14:00-15:00; SH off) [1]
• PH Public Holiday, can be used to indicate different opening hours during public holidays (e.g., Mo-Fr 09:00-17:00; PH 10:00-12:00; PH Su off)[1]
The above example means normal hours are monday to friday 9am to 5pm, except on public holidays it is 10am to 12pm, except public holidays that fall on a Sunday.
The general syntax for the value is: hh:mm-hh:mm (e.g., > 08:30-20:00)
The general syntax for the value is: wd hh:mm-hh:mm (e.g., > Fr 08:30-20:00)
The general syntax for the value is: mo md hh:mm-hh:mm (e.g., > Dec 25 08:30-20:00)
The general syntax for the value is: week we wd hh:mm-hh:mm (e.g., > week 25 Mo 08:30-20:00)
Rules
• Consecutive hours [always needs open-close] separated by "-" · (e.g., > 08:30-20:00)
• Consecutive weekdays open separated by "-" · (e.g., > Mo-Fr)
• Consecutive monthdays open separated by "-" · (e.g., > Dec 20-26) or (e.g., > Dec 20-Jan 06)
• Open with periodicity "n" within a range of consecutive monthdays, the range is followed by "/n" (e.g., > 02-30/n)
• Consecutive weeks open separated by "-" · (e.g., > week 01-26)
• Open with periodicity "n" within a range of consecutive weeks, the range is followed by "/n" ( e.g.> week 02-52/n )
• A break on days separated by "," · (e.g., > Mo,We,Fr)
• A break on hours separated by "," · (e.g., > 08:30-14:00,16:30-20:00)
• Different hours on different days are separated by ";" (e.g., > Mo 10:00-12:00,12:30-15:00; Tu-Fr 08:00-12:00,12:30-15:00; Sa 08:00-12:00)
reads as: this opening hours for this days ; this opening hours for this days
• A weekday off will be tagged as "wd off" (e.g., > Tu off)
• A range of weekdays off will be tagged as "wd-wd off" (e.g., > Tu-Th off)
• A month off will be tagged as "mo off" (e.g., > Aug off )
• A range of months off will be tagged as "mo-mo off" (e.g., > Aug-Sep off)
• A monthday off will be tagged as "mo md off" (e.g., > Dec 25 off)
• A range of monthdays off will be tagged as "mo md-md off" (e.g., > Dec 24-26 off) or "mo md - mo md off" (e.g., > Dec 25-Jan 06 off )
• Exceptions to a range of days, first the range then the exception (e.g., > Mo-Sa 10:00-20:00; Tu off) or (e.g., > Mo-Sa 10:00-20:00; Tu 10:00-14:00) (this means these are not additions, for example Mo-Fr 08:00-12:30; We 14:00-17:00 means that on Wednesdays, the shop is only opened in the afternoons and not additionally)
• If it is in the first or last day of a range then don't use the exception rule, use the usual (e.g., > Mo-Fr 10:00-20:00; Sa 10:00-14:00)
• Non-consecutive or semi-consecutive days of the week will be tagged as wd[x] (e.g., Su[3] 09:00-12:00)
This is used to indicate the 3rd Sunday of the month from 9am to 12pm.
Use -1 to indicate the last day of the month; e.g., Aug Th[-1] means last Thursday in July.
Can use grouping, (e.g., Su[1,3,5] and Su[1-3])
• If hours are non stop some days then (e.g., > 00:00-24:00)
• If it is 24 hours 7 days a week it has a specific value: 24/7
this way it can render a specific icon.
• A special time value to mark the time the sun rises is: sunrise.
• A special time value to mark the time the sun sets is: sunset.
• A + behind a time means "from" or "open end" (e.g., Sa 22:00+)
Implementation
This is my second try on an implementation:
Netzwolf 17:16, 26 November 2010 (UTC)
AMDmi3 10:44, 18 December 2012 (UTC)
Rendering
Just in the case of opening_hours=24/7 it can be something like adding a 24 to the object icon.
The rest of values have no rendering and should be accessed with context menu or alike.
Code
PHP code in SVN to parse opening_hours.
Implementations
OsmAnd
OsmAnd uses this tag in the POI search screen. The colour of the arrow changes when the POI is open, closed or the state is unknown.
The implementation is only partial, currently no dates, weeknumbers or holidays are supported, But most values should get parsed.
OpenLinkMap
OpenLinkMap creates a clickable POI overlay over an osm based slippy map. Clicking on a POI opens a dialog window showing informations about it, including its opening hours and open/closed state
Opening hours for Ulm, Neu-Ulm & surroundings
The web application is available on http://oeffnungszeiten.ulmApi.de. Opening hours for the local area are visualized on a map. The source code of this application is freely licensed and available via GitHub. Adapting the application to a different city is very easy and described on the GitHub page.
other
See also
Notes
1. 1.0 1.1 Values can be set as default. Default is a proposal for a default values system. This proposal can set default values such as maxspeed for areas (countries, states...) but also holidays periods. A country, a zone area can subscribe to a default containing such holidays definitions.
Personal tools
Namespaces
Variants
Actions
site
Toolbox
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:19:38.000Z
|
dmzirm2vazli6oqelhl5kujqy35fyma6
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:60969",
"uncompressed_offset": 281767756,
"url": "wikitravel.org/wiki/en/index.php?diff=1615190&oldid=1615180&title=Dead_Sea_%28Israel%29",
"warc_date": "2013-11-22T14:33:36.000Z",
"warc_filename": "<urn:uuid:3942ac6a-f443-4707-8ba8-894b75c6cf35>",
"warc_url": "http://wikitravel.org/wiki/en/index.php?title=Dead_Sea_(Israel)&diff=1615190&oldid=1615180"
}
|
cccc_CC-MAIN-2013-20
|
Help Wikitravel grow by contributing to an article! Learn how.
Difference between revisions of "Dead Sea (Israel)"
From Wikitravel
Asia : Middle East : Dead Sea
Jump to: navigation, search
(Jordan)
m (Reverted edits by Moevenpickjordan (Talk) to last version by Wrh2)
Line 95: Line 95:
* Amman Beach is a public resort with clean facilities, including changing rooms, fresh water showers (both at the beach and in the changing rooms), a pool and a restaurant. Entrance is 15 JOD (January 2010). Lockers can be rented for another 5 JOD, as well as towels (1.50 JD).
* Amman Beach is a public resort with clean facilities, including changing rooms, fresh water showers (both at the beach and in the changing rooms), a pool and a restaurant. Entrance is 15 JOD (January 2010). Lockers can be rented for another 5 JOD, as well as towels (1.50 JD).
* <listing name="ZARA Spa" alt="" directions=" approx. 55km south of Amman " address=" Mövenpick Resort & Spa Dead Sea, Sweimeh, Dead Sea Road" phone="+ 962 5 356 11 11" email="resort.deadsea.spa@moevenpick.com" fax="+ 962 5 356 11 22" url=" http://www.moevenpick-hotels.com/en/pub/your_hotels/worldmap/dead_sea/sports__leisure/zara_spa_dead_sea.cfm" hours="8.30 am – 8.30 pm" price="">At ZARA Spa, guests are invited to cross the threshold and enter a world of pure relaxation. There are several swimming pools, some of which feature different mineral concentrations, including a heated pool for winter. A wide private beach runs along the Dead Sea shore, and there are jacuzzis, tennis courts and a fitness centre. There are also a total of four restaurants and several cafes and bars. The ZARA Spa experience includes the access to the various facilities, such as Hydro Pool, Dead Sea Pool I, Dead Sea Pool II, Kneipp Foot Massage Pool and Infinity Pool.</listing>
==Buy==
==Buy==
Line 125: Line 123:
There are several 4 stars hotels like Movenpick, Marriot and others
There are several 4 stars hotels like Movenpick, Marriot and others
* The Dead Sea Resthouse is a 2-star hotel (phone: 962 5 3560110).
* The Dead Sea Resthouse is a 2-star hotel (phone: 962 5 3560110).
* <sleep name="Mövenpick Resort & Spa Dead Sea" alt="" address="Sweimeh, Dead Sea Road" directions="approx. 55km south of Amman" phone="+ 962 5 356 11 11" url="http://www.moevenpick-deadsea.com/" checkin="15:00 hrs" checkout="12:00 hrs" price="Rates starting from JOD 99.00++" lat="31°43'2.35N" long="35°35'12.47E" email="resort.deadsea.reservations@moevenpick.com" fax="+ 962 5 356 11 22">The Mövenpick Resort & Spa Dead Sea is found in a traditional village setting nestled amongst lush gardens that serve to restore your well-being and balance. Set on the northern shores of the Dead Sea, the resort and its Spa is an oasis of tranquillity.
Despite the antique look of the village, all 346 rooms are luxuriously furnished in warm and natural colours. The latest Beach Rooms and Beach Suites are contemporary with modern furnishings and large terraces. Self-controlled air-conditioning, satellite TV, direct-dial phone, coffee and tea-making facilities, hairdryer, and a safe are standard fittings in every room. A special benefit is our free minibar, available in all rooms. As well as the famous ZARA Spa, there are several swimming pools, some of which feature different mineral concentrations, including a heated pool for winter. A wide private beach runs along the Dead Sea shore, and there are jacuzzis, tennis courts and a fitness centre. There are also a total of four restaurants and several cafes and bars.</sleep>
===Mid range===
===Mid range===
Revision as of 10:58, 21 January 2011
The Dead Sea beachfront
The Dead Sea (Hebrew: ים המלח, Hebrew transliteration:Yam HaMelach; Arabic: البحر الميت, Arabic transliteration: al-Bahir al-Mayyit), borders Israel, the West Bank and Jordan. It is the lowest point in the world at 394.6 m (1269 ft) below sea level. Currently, 25 km of Dead Sea coastline lie within Palestinian Authority territory, including Qumran and Ein Feshka.
Contents
Get in
From Israel and the West Bank
The Israeli side of the Dead Sea is a possible day trip from Jerusalem (39km from Northern Dead Sea), Eilat (220km from Southern Dead Sea), or, at a stretch Tel Aviv (98km from Northern Dead Sea). There are three main road entry routes into the Dead Sea area. The first is via Highway 1 and Highway 90, through the West Bank, from the Jerusalem area. Alternatively, you could access the area from Eilat via Highway 90 from the south, or from the road from Beersheva via Arad.
The main access points are the oases of Ein Gedi and Ein Bokek, both accessible via Egged bus from Jerusalem (lines 486 and 487), Tel Aviv (421, starts once a day from Arlozorov Station at 8.36 am ), Eilat (444), Beersheva and Arad (384). Both Ein Gedi and Ein Bokek have public access beaches, but Ein Bokek's beach is the better of the two. Population services are infrequent, so check schedules before heading out.
Taxi services can also serve the Dead Sea.
From Jordan
On the Jordanian side, the Dead Sea is possible as a day trip from both Amman and Aqaba. The road is a good dual carriage way. Tourist areas are accessible from the main road that runs along the eastern side of the body of water and connects to Jordan's Desert Highway running to Amman. Highways leading to the Dead Sea are clearly marked by brown tourist signs. It is an ambitious 3-hour drive from Aqaba in southern Jordan.
Taxi services for travel to the Dead Sea can be purchased for the day 20JD if you hail a cab from down town, down town hotels charge 35JD for the same service. Many of the local hotels and resorts have shuttles that travel from Amman to the Dead Sea for a fee. There are a handful of bus lines that also run from Amman on a daily basis. Bus from Mujaharin bus station to Rame [Rama]costs approx 750 fills. Taxi from Rame to Amman Beach 4JD or less.
From Aqaba a taxi can be hired for a full day. If booked through the reception of a nice hotel expect to pay about 100 JD. If you find a driver on your own you an haggle and get the price down quite a bit (80 JD in January 2010 - possibly better deals can be agreed on). Make sure to arrange with the driver before you leave if you also want to stop by any other sites as part of your trip as the diver may not want to drive any farther than initially agreed.
The cost to enter the public tourist beach (Amman Beach) is 15 JD (January 2010) (with swimming pools) and 7JD for the Locals/Jordian beach (it's only 15m to left of the touris entrance; not reccomended for women on fridays). Many hotels also sell day passes that include full use of hotel facilities as well as their Dead Sea beachfronts; at the Mövenpick Resort, day passes cost 20 JD per person for hotel guests, while non-hotel guests pay 40 JD on weekdays and 50 JD on weekend.
Understand
Salt deposits
The water in the Dead Sea is extremely salty, and has been estimated to be the second saltiest major body of water in the world. Its name is derived from the fact that the water is far too salinated for marine inhabitation.
The Dead Sea is naturally endorheic (no outlet streams) with the Jordan River being its only major source. The northern part of the Dead Sea receives scarcely 100 mm (4 inches) of rain a year; the southern section receives barely 50 mm (2 inches). Due to the man-made reduction of the Jordan River (the river waters are 70-90 % used for human purposes) and the high evaporation rate of the Dead Sea, the sea is shrinking. All the shallow waters of the southern end of the sea have been drained and are now salt flats.
Although the Dead Sea would never entirely disappear (because evaporation slows down as surface area decreases and saltiness increases), measures are currently being proposed to siphon water from the Red Sea through a series of tunnels or canals in order to replentish the rapidly shrinking waters and provide water and electrical solutions to the surrounding countries.
Climate
The climate at the Dead Sea varies depending on the season. Temperatures during the tourist season can become extremely warm, ranging from 30°C (86°F) in the spring to upwards of 40°C (104°F) in the summer. The area receives an average of 330 days of sunshine per year, with rainy days occurring only during winter (if at all).
Although the Dead Sea is very sunny the low altitude and extra atmosphere makes the sunlight weaker. It is therefore said that sunbathing here carries a lower risk of sunburn, but it is still advisable to take normal precautions using sunblock and adapt gradually. This quality of the Dead Sea sunlight is the real secret behind its mythological curing ability for several diseases, especially skin diseases. This is, in fact, natural phototherapy.
Caution: During winter and spring there is a danger of floods on rainy days. The Dead Sea basin receives rainwater from relatively far-off areas like the Jerusalem Mountains. This means that sometimes during a sunny day a flood will suddenly and unexpectedly occur. Therefore, be careful when hiking to distant narrow places during these seasons and stay tuned to the weather news. The weather forecast always gives warnings if there is a possibility of flooding. Always do as national reserves staff order - they know the terrain very well. In 2007, several Israelis who had been "snappling" (rappelling) were killed by a flood because they did not obey national reserve staff orders.
See
The hypersalinated water of the Dead Sea itself is its own attraction. There are several nearby attractions that are worth attention:
shore
Israel and the West Bank
• Masada - Mountaintop Fortress, Massada National Park is 18 km south of Ein Gedi, or 12 km from Ein Bokek to the cable train on the east (Dead Sea), +972-8-658-4207/8 (fax: +972-8-6584464), [1]. Open 7 Days a Week. First cable car - 8am. October to March - 4pm, April to September - 5pm. Masada is a mountaintop fortress which King Herod transformed in 35 BC into a 3 tiered winter home. Easily accessible via a quick cable car ride or by hiking up the serpentine path. Located only 18 km north of the Ein Bokek hotel area. The site is a UNESCO World Heritage Site.
• Masada Sound and Light Show, +972-8-9959333, [2]. April to October - Tuesday and Thursday (excluding holiday eves). Running time: 40 minutes. Spectacular light show recounts the dramatic history of Masada with special pyrotechnic effects. Spectators sit in a natural amphitheater on the west side of the mountain, reachable only via Arad, 20km away.
• Ein Gedi Oasis and Kibbutz. Ein Gedi is a real oasis with lush vegetation, nestled between two streams, amidst the arid landscape. Today, fresh spring water from Ein Gedi is bottled here.
• Ein Gedi Nature Reserve, The Ein Gedi Nature Reserve is on Route 90 (Dead Sea road) about 1 kilometer north of Kibbutz Ein Gedi, +972-7-658-4285 (fax: +972-7-652-0228), [3]. April-September: 8:00-17:00, October-March: 8:00-16:00. Situated near the Kibbutz, visitors have access to the adjacent nature reserve for viewing bird sanctuaries and wildlife of the desert, including the Nubian ibex. Hikers have the choice of following two riverbeds and can follow trails past waterfalls, springs, caves, canyons and an early Bronze Age temple.
• Qumran - The Dead Sea Scrolls, Qumran National Park is off of Route 90 near Kibbutz Kalia, north of the Dead Sea. The park is about a 40-minute drive from Jerusalem in the West Bank, +972-2-994-2235. Open seven days a week from 8am. Closing hours: October to March - 4pm, April to September - 5pm. Closes one hour earlier on Fridays and eve of Jewish holidays. The ancient caves and settlement at Qumran on the northern shores of the Dead Sea where the oldest biblical documents ever found trace the history and daily lives of the mystical Essenes, a Jewish sect that fled Jerusalem 2000 years ago.
Jordan
• Historic Mount Nebo provides a panorama of the Holy Land, and to the north, a more limited one of the Jordan River valley. The excavated remains of a church and a monument commemorating the biblical story of Moses and the bronze serpent stand atop the mountain. Mount Nebo is a short 15 minute drive from the Dead Sea. Visitors can plan to spend around an hour at the site at a cost of 2 JD per person.
• The nearby town of Madaba known as the 'City of Mosaics' is famous for its Byzantine and Umayyad mosaics, especially a large Byzantine-era mosaic map of Palestine and the Nile delta at St. George Church.
• The Baptism Site (Bethany Beyond the Jordan) at the Jordan River, the location archaeologists are claiming is the baptism site of Jesus by John the Baptist, is a short 10 minute drive from the Dead Sea resort area. The cost to enter the Baptism Site is 7 JD per person (January 2010). Buses transport visitors down to the river basin, and guided tours include visits to a Jordan River overlook, the excavated remains of the Baptismal Site, John the Baptist Church, and down to the River bank.
• The Dead Sea Panoramaic Complex/Dead Sea Museum is a new complex of regional museum about the Dead Sea, panorama lookout, restaurant and conference hall on a steep cliff high above the Dead Sea near Hammamet Ma'in it is accessible from both the Dead Sea and Madaba by car, however it is difficult to reach by public transport. The museum is run by the Royal Society for the Conservation of Nature, and has some fascinating information about the geology, ecology (animal and plant), archaeology, history and industry of the Dead Sea and surrounding area.It has also information about the environmental problem concerning the Dead Sea, such as decreasing of the Dead Sea water level and sinkhole in the Dead Sea coast. As the name suggests it has a magnificent view of the Dead Sea and the hills beyond it. Watching the sunset from here is a wonderful experience.
• The Mujib Reserve of Wadi Mujib is the lowest nature reserve in the world, located in the mountainous landscape to the east of the Dead Sea, approximately 90km south of Amman. The 220 square kilometers reserve was created in 1987 by the Royal Society for the Conservation of Nature and is regionally and internationally important, particularly for the bird life that the reserve supports. The Mujib valley is being developed for adventure tourism, and a number of facilities have been established including a Visitors' Centre and a beach area on the Dead Sea. Experiencing Jordan’s Grand Canyon involves swimming, jumping, abseiling and floating. Its red walls are filled with running water that plunges through a 15 m waterfall.
• Hammamat Ma'in are a remarkable series of natural hot springs and waterfalls, some of which have been channeled into pools and baths. A spa resort is located in the vicinity of the waterfalls [4]
• Lot's cave is found on the site of the remains of an old church. The cave is believed to the the one Lot took refuge in with his two daughters when God according to the Bible destroyed Sodom and Gomorrah. Entrance is free (January 2010), but you can only get a look at the cave entrance. The cave and part of the church ruins are fenced off. Entrance is currently free (January 2010).
Talk
On the Israeli part of the Sea, Hebrew and English are the most widely spoken languages. All resort and tourism staff will be able to speak both. In Ein Bokek, there is a large percentage of those who speak Russian in the plaza/mini mall by the Sea. Arabic might also be spoken by some staff, whilst French will be spoken by a sizeable minority. In the West Bank, both Arabic and Hebrew are widely spoken. On the Jordanian side, both Arabic and English are spoken.
Do
It is nearly impossible to sink in the hypersalinated waters
Many visitors cover their bodies with theraputic mud
• Due to the hypersalination of the water, one can float with ease in the Dead Sea; in fact, it's nearly impossible to sink! A popular fad by visitors is to have their picture taken while reading a newspaper and floating on the surface of the water.
• The mud along the shore of the Dead Sea contains many minerals and is believe to have medicinal and therapeutic benefits. It is not uncommon for visitors to cover their bodies with the dark mud.
• There are many salt deposits and crystals scattered along the shoreline. Many visitors walk the beach in search of large pieces as souvenirs.
• The water of the Dead Sea has a greasy feel to it.
• Wear waterproof sandals. The salt is very jagged and can easily cut your feet.
• Beware! Several people drown every year in the Dead Sea because they do not obey the rule: Only float on your back. Accidents happen when someone tries to swim normally (stomach first) in the water - the legs will float better than usual and the head will be submerged. Note that this applies to weaker swimmers, and specifically to attempts to swim breaststroke. Breaststroke is also made difficult by the fact that the legs are raised too high in the water to provide normal forward motion when kicking. Moreover, the salt in the water stings cuts and causes great pain if it comes in contact with the eyes, adding to the panic if one's head is under water. A strong swimmer can easily swim freestyle; if you plan to try this, goggles are essential and should be tightly fitted. Although safe for a strong swimmer, and an unusual sensation because of the buoyancy of the water, it is not an undertaking most people are likely to sustain for long. Even with the eyes protected by goggles, water will get into the nose and sting, and onto the lips and inevitably into the mouth. It tastes disgusting.
Short of actual drowning, inhalation of the water can cause specific, sometimes lifethreatening medical problems not seen with other bodies of water, because of the water's very high electrolyte content so be sure of your swimming abilities and confidence in the water before deciding to swim on your front.
• Tip if in a resort: Wash the salt off in the beach showers before you use your towel. Otherwise the towel will get salty and leave salt on your skin when you use it after your shower (the salt can cause an itch).
in Israel and the West Bank
• Ein Bokek Public Beach, +972-8-6594433.
• Ein Gedi Public beach, +972-8-6594433.
• Hamai Zohar Public Beach, +972-8-6594433. Alternative to Ein Bokek and Ein Gedi beaches with separate bathing for men and women.
• Ein Gedi Spa Beach, +972-8-6594413. The signature element of the Dead Sea - black mud, has both cosmetic and therapeutic benefits known to cleanse and stimulate the skin. Relieve muscle and emotional tension; improve blood circulation and ease rheumatic pain at Ein Geidi Spa beach.
• Mineral Beach, +972-2-9944888. Visit Mineral Beach, which also includes a fresh water beach and public pool.
• * Atraktzia Water Park, near Kalia, +972-2-9942391. Water park with h water pools and slides.
in Jordan
• Amman Beach is a public resort with clean facilities, including changing rooms, fresh water showers (both at the beach and in the changing rooms), a pool and a restaurant. Entrance is 15 JOD (January 2010). Lockers can be rented for another 5 JOD, as well as towels (1.50 JD).
Buy
Visitors can purchase packets of the famous mud, as well as other cultural artifacts and handicrafts, from local gift shops. The Israeli side is home to the world famous Ahava Dead Sea Products. The Ahava Factory is located at Kibbutz Shalem, directly across Route 90 from Mineral Beach.
Eat & Drink
The restaurant options near the Dead Sea are sparse.
in Israel and the West Bank
The town of Ein Bokek on the Israeli side has two small shopping malls with a McDonald's, a number of Falafal Bars, a liquor store, and a few other stores selling everyday items and souvenirs. The shopping center has a large McDonald's sign on the roof. From the outside, it looks very out of place (and funny in a way) against the majestic background of desert mountains. Many people working there and in nearby hotels can speak Russian. There are also restaurants in each of the resort hotels on the Israeli side.
in Jordan
The Jordanian public beach contains an over-priced buffet-style restaurant and a small beach-side snack bar. It is recommended that visitors planning to visit the public beaches bring their own food and drinks. There are many resorts that can be found in Jordan to cater to tourists.
Sleep
Budget
Israel and the West Bank
• The Ein Gedi Beit Sarah Guest House, Near the Dead Sea road (# 90) at the entrance to the Nahal David reservation, +972-08-6584165 (, fax: +972-08-6584445), [6]. A guest house in the oasis of Ein Gedi with 51 rooms, some of which with balconies.
• Massada Guest House, South of the Massada site, +972-08-9953222 (, fax: +972-08-6584650), [7]. A guest house on the slopes of Massada with 88 rooms and a private swimming pool.
• Shkedi's Camplodge, South of the Dead Sea. Located in Neot Hakikar, Sodom area, 20 minutes from the Dead Sea shoreline, +972-52-2317371 (), [8]. A beautiful hostel with uniquely built large bungalows and wooden cabins, all shaded by acacia trees, a bonfire inside a geodesic dome and a desert bar. Dorms from 85NIS, private from 250NIS.
Jordan
There are several 4 stars hotels like Movenpick, Marriot and others
• The Dead Sea Resthouse is a 2-star hotel (phone: 962 5 3560110).
Mid range
Israel and the West Bank
Jordan
• The Dead Sea Spa [9] is a 4-star hotel with many amenities (phone: 962 5 3561000). The hotel is in the hotel zone, along side the Marriot and Kempinski. Minibus rental with a driver to get here from Amman (including visits to Baptism Site and Mt. Nebo on the way) costs 50 JD. There are a few swimming pools, including 2 children's pools and direct access to the Dead Sea, on the hotels own beach. Wireless internet is available free of charge. Some building work is taking place at the hotel at present (October 2009).
• Prima Oasis, Ein Bokek-Dead Sea, +972-08-6688666 (, fax: +972-8-658-4503), [10]. checkin: 14:00; checkout: 11:00. Our Oasis Dead Sea Resort – nestled between the Judean hills and the shore of the Dead Sea – offers a new grand entrance pavilion and reception, contemporary accommodations and beautiful spacious grounds.
Splurge
Israel and the West Bank
Northern Dead Sea
• Almog Hotel, +972-02-9945201, [11].
Ein Gedi
Ein Bokek
• Le Meridien Dead Sea, +972-08-6591234 (fax: +972-8-659-1235), [13]. checkin: 3:00 PM; checkout: 12:00 PM.
• Royal Rimonim Hotel, Ein Bokek-Dead Sea, +972-08-6688555 (fax: +972-8-658-4503), [14]. checkin: 14:00; checkout: 11:00. At the lowest spot on earth , on the shores of the Dead Sea located the Royal Rimonim Dead Sea. The hotel offers 400n guest rooms and exclusive suites which all offer an enchanting view of the Dead Sea, the Judean Desert and the Moab Mountains. Additional hotel facilities: a fenced beach for hotel's guests, Solarium, outdoor fresh water pool, children's pool and private parking.
• Magic Nirvana Club, +972-08-6689444 (fax: +972-8-6689400), [15]. Newly renamed as Leonardo Club hotel.
• Crowne Plaza Dead Sea, +972-8-6591919 (, fax: +972-8-6591911), [16]. checkin: 3:00 PM; checkout: 11:00 AM.
• Daniel Dead Sea, +972-8-6684666 (fax: +972-8-6684668), [17].
• Caesar Premier, +972-8-6689666 (, fax: +972-8-6520301), [18].
• Novotel Thalassa, +972-8-9553333 (, fax: +972-8-9553344), [19].
• Sheraton Moriah Dead Sea, +972-03-6213333 (fax: +972-8-6584238). checkin: 3:00 PM; checkout: 12:00 PM.
• Hod Hamidbar Resort and Spa, +972-8-6688222 (, fax: +972-8-6584606), [20].
• Dead Sea Gardens, +972-08-6689090 (fax: +972-8-6584383), [21].
• Lot Spa Dead Sea Hotel, Dead Sea Road #90, Ein Bokek, +972-08-6689200, [22]. checkin: 3:00 PM; checkout: 11:00 AM. One of the oldest hotels in the area, with 199 rooms. Freshwater pool, heated Dead Sea pool (36°), 2 sulfur pools, Jacuzzi, sauna, large fitness room and treatment rooms.
• Tsell Harim Hotel, +972-08-6688111, [23]. 3 Stars
• Prima Spa Club, Ein Bokek-Dead sea, +972-08-6688000 (, fax: +972-8-658-4503), [24]. checkin: 14:00; checkout: 11:00. The Spa Club hotel is the first spa hotel of its kind in the entire Dead Sea region. Situated on the shores of the Dead Sea, the hotel is the first choice for business guests wishing to relax and unwind in an unbelievably calm and soothing atmosphere
Jordan
• Mövenpick Resort & Spa Dead Sea, Sweimeh, Dead Sea Road (approx. 55km south of Amman), + 962 5 356 11 11 (, fax: + 962 5 356 11 22), [25]. checkin: 15:00 hrs; checkout: 12:00 hrs. The Mövenpick Resort & Spa Dead Sea is found in a traditional village setting nestled amongst lush gardens that serve to restore your well-being and balance. Set on the northern shores of the Dead Sea, the resort and its Spa is an oasis of tranquillity. Despite the antique look of the village, all 346 rooms are luxuriously furnished in warm and natural colours. The latest Beach Rooms and Beach Suites are contemporary with modern furnishings and large terraces. Self-controlled air-conditioning, satellite TV, direct-dial phone, coffee and tea-making facilities, hairdryer, and a safe are standard fittings in every room. A special benefit is our free minibar, available in all rooms. Rates starting from JOD 99.00++. (31°43'2.35N,35°35'12.47E)
• The Kempinski Hotel Ishtar [26] is a 5 star luxury hotel and spa (phone: +962 5 356 8888).
• Holiday Inn Dead Sea A new 5* resort, just about open in 2009. Also the first hotel on the road from Amman.
• The Jordan Valley Marriott Resort & Spa [27] is a 5-star luxury hotel (phone: 962 5 3560400).
Camping
Israel and the West Bank
Camping is allowed for free on the Ein-Gedi coast (aprox. 500m south of the kibbutz itself), toilets and showers are on site for a little fee. The ground is a bit stony so any kind of mattress is useful.
Get Out
in Israel and the West Bank
• Mount Sodom, the region's only salt desert and home to the biblical towns of Sodom and Gommorah, afford breathtaking scenery within a couple of miles of the Dead Sea.
• The Negev and Judean deserts are also within close radius of the Dead Sea with amazing desert landscapes. Perhaps some must-see landscapes are the three craters including the Ramon Crater.
This is a usable article. It gives a good overview of the region, its sights, and how to get in, as well as links to the main destinations, whose articles are similarly well developed. An adventurous person could use this article, but please plunge forward and help it grow!
Personal tools
Namespaces
Variants
Actions
Navigation
feeds
Destination Docents
Toolbox
In other languages
other sites
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T10:00:17.000Z
|
dru3naxwqzfu6v2rqrkeqfvsu3rgfffp
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:60979",
"uncompressed_offset": 346215084,
"url": "www.biomedcentral.com/1471-2288/6/35",
"warc_date": "2013-11-22T14:33:36.000Z",
"warc_filename": "<urn:uuid:3942ac6a-f443-4707-8ba8-894b75c6cf35>",
"warc_url": "http://www.biomedcentral.com/1471-2288/6/35"
}
|
cccc_CC-MAIN-2013-20
|
Technical advance
Conducting a critical interpretive synthesis of the literature on access to healthcare by vulnerable groups
Mary Dixon-Woods1*, Debbie Cavers2, Shona Agarwal3, Ellen Annandale4, Antony Arthur5, Janet Harvey6, Ron Hsu1, Savita Katbamna7, Richard Olsen7, Lucy Smith1, Richard Riley1 and Alex J Sutton1
Author Affiliations
1 Department of Health Sciences, University of Leicester, 22–28 Princess Road West, Leicester LE1 6TP, UK
2 Division of Oncology/General Practice, University of Edinburgh, Edinburgh Centre for Neuro-Oncology, Western General Hospital, Crewe Road South, Edinburgh EH4 2XU, UK
3 Department of Health Sciences, University of Leicester, Leicester General Hospital, Leicester LE5 4PW, UK
4 Department of Sociology, University of Leicester, Leicester LE1 7RH, UK
5 School of Nursing, University of Nottingham, Queens Medical Centre, Nottingham NG7 2HA, UK
6 Centre for Research in Social Policy, Loughborough University, Leicestershire LE11 3TU, UK
7 Nuffield Research Unit, Department of Health Sciences, University of Leicester, 22–28 Princess Road West, Leicester LE1 6TP, UK
For all author emails, please log on.
BMC Medical Research Methodology 2006, 6:35 doi:10.1186/1471-2288-6-35
The electronic version of this article is the complete one and can be found online at: http://www.biomedcentral.com/1471-2288/6/35
Received:19 April 2006
Accepted:26 July 2006
Published:26 July 2006
© 2006 Dixon-Woods et al; licensee BioMed Central Ltd.
This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Abstract
Background
Conventional systematic review techniques have limitations when the aim of a review is to construct a critical analysis of a complex body of literature. This article offers a reflexive account of an attempt to conduct an interpretive review of the literature on access to healthcare by vulnerable groups in the UK
Methods
This project involved the development and use of the method of Critical Interpretive Synthesis (CIS). This approach is sensitised to the processes of conventional systematic review methodology and draws on recent advances in methods for interpretive synthesis.
Results
Many analyses of equity of access have rested on measures of utilisation of health services, but these are problematic both methodologically and conceptually. A more useful means of understanding access is offered by the synthetic construct of candidacy. Candidacy describes how people's eligibility for healthcare is determined between themselves and health services. It is a continually negotiated property of individuals, subject to multiple influences arising both from people and their social contexts and from macro-level influences on allocation of resources and configuration of services. Health services are continually constituting and seeking to define the appropriate objects of medical attention and intervention, while at the same time people are engaged in constituting and defining what they understand to be the appropriate objects of medical attention and intervention. Access represents a dynamic interplay between these simultaneous, iterative and mutually reinforcing processes. By attending to how vulnerabilities arise in relation to candidacy, the phenomenon of access can be better understood, and more appropriate recommendations made for policy, practice and future research.
Discussion
By innovating with existing methods for interpretive synthesis, it was possible to produce not only new methods for conducting what we have termed critical interpretive synthesis, but also a new theoretical conceptualisation of access to healthcare. This theoretical account of access is distinct from models already extant in the literature, and is the result of combining diverse constructs and evidence into a coherent whole. Both the method and the model should be evaluated in other contexts.
Background
Like many areas of healthcare practice and policy, the literature on access to healthcare is large, diverse, and complex. It includes empirical work using both qualitative and quantitative methods; editorial comment and theoretical work; case studies; evaluative, epidemiological, trial, descriptive, sociological, psychological, management, and economics papers, as well as policy documents and political statements. "Access" itself has not been consistently defined or operationalised across the field. There are substantial adjunct literatures, including those on quality in healthcare, priority-setting, and patient satisfaction. A review of the area would be of most benefit if it were to produce a "mid-range" theoretical account of the evidence and existing theory that is neither so abstract that it lacks empirical applicability nor so specific that its explanatory scope is limited.
In this paper, we suggest that conventional systematic review methodology is ill-suited to the challenges that conducting such a review would pose, and describe the development of a new form of review which we term "Critical Interpretive Synthesis" (CIS). This approach draws is sensitised to the range of issues involved in conducting reviews that conventional systematic review methodology has identified, but draws on a distinctive tradition of qualitative inquiry, including recent interpretive approaches to review [1]. We suggest that that using CIS to synthesise a diverse body of evidence enables the generation of theory with strong explanatory power. We illustrate this briefly using an example based on synthesis of the literature on access to healthcare in the UK by socio-economically disadvantaged people.
Aggregative and interpretive reviews
Conventional systematic review developed as a specific methodology for searching for, appraising, and synthesising findings of primary studies [2]. It offers a way of systematising, rationalising, and making more explicit the processes of review, and has demonstrated considerable benefits in synthesising certain forms of evidence where the aim is to test theories, perhaps especially about "what works". It is more limited when the aim, as here, is to include many different forms of evidence with the aim of generating theory [3]. Conventional systematic review methods are thus better suited to the production of aggregative rather than interpretive syntheses.
This distinction between aggregative and interpretive syntheses, noted by Noblit and Hare in their ground-breaking book on meta-ethnography[1] allows a useful (though necessarily crude) categorisation of two principal approaches to conducting reviews [4]. Aggregative reviews are concerned with assembling and pooling data, may use techniques such as meta-analysis, and require a basic comparability between phenomena so that the data can be aggregated for analysis. Their defining characteristics are a focus on summarising data, and an assumption that the concepts (or variables) under which those data are to be summarised are largely secure and well specified. Key concepts are defined at an early stage in the review and form the categories under which the data from empirical studies are to be summarised.
Interpretive reviews, by contrast, see the essential tasks of synthesis as involving both induction and interpretation. Their primary concern is with the development of concepts and theories that integrate those concepts. An interpretive review will therefore avoid specifying concepts in advance of the synthesis. The interpretive analysis that yields the synthesis is conceptual in process and output. The product of the synthesis is not aggregations of data, but theory grounded in the studies included in the review. Although there is a tendency at present to conduct interpretive synthesis only of qualitative studies, it should in principle be possible and indeed desirable to conduct interpretive syntheses of all forms of evidence, since theory-building need not be based only on one form of evidence. Indeed, Glaser and Strauss [5] in their seminal text, included an (often forgotten) chapter on the use of quantitative data for theory-building.
Recent years have seen the emergence of a range of methods that draw on a more interpretive tradition, but these also have limitations when attempting a synthesis of a large and complex body of evidence. In general, the use to date of interpretive approaches to synthesis has been confined to the synthesis of qualitative research only [6-8]. Meta-ethnography, an approach in which there has been recent significant activity and innovation, has similarly been used solely to synthesise qualitative studies, and has typically been used only with small samples [9-11]. Few approaches have attempted to apply an interpretive approach to the whole corpus of evidence (regardless of study type) included in a review, and few have treated the literature they examine as itself an object of scrutiny, for example by questioning the ways in which the literature constructs its problematics, the nature of the assumptions on the literature draw, or what has influenced proposed solutions.
In this paper we offer a reflexive account of our attempt to conduct an interpretive synthesis of all types of evidence relevant to access to National Health Service (NHS) healthcare in the UK by potentially vulnerable groups. These groups had been defined at the outset by the funders of the project (the UK Department of Health Service Delivery and Organisation R&D Programme) as children, older people, members of minority ethnicities, men/women, and socio-economically disadvantaged people. We explain in particular our development of Critical Interpretive Synthesis as a method for conducting this review.
Methods
Formulating the review question
Conventional systematic review methodology [12,13] emphasises the need for review questions to be precisely formulated. A tightly focused research question allows the parameters of the review to be identified and the study selection criteria to be defined in advance, and in turn limits the amount of evidence required to address the review question.
This strategy is successful where the phenomenon of interest, the populations, interventions, and outcomes are all well specified – i.e. if the aim of the review is aggregative. For our project, it was neither possible nor desirable to specify in advance the precise review question, a priori definitions, or categories under which the data could be summarised, since one of its aims was to allow the definition of the phenomenon of access to emerge from our analysis of the literature [14]. This is not to say that we did not have a review question, only that it was not a specific hypothesis. Instead it was, as Greenhalgh and colleagues [15] describe, tentative, fuzzy and contested at the outset of the project. It did include a focus on equity and on how access, particularly for potentially vulnerable groups, can best be understood in the NHS, a health care system that is, unlike most in the world, free at the point of use.
The approach we used to further specify the review question was highly iterative, modifying the question in response to search results and findings from retrieved items. It treated, as Eakin and Mykhalovskiy [16] suggest, the question as a compass rather than an anchor, and as something that would not finally be settled until the end of the review. In the process of refining the question, we benefited from the multidisciplinary nature of our review team: this allowed a range of perspectives to be incorporated into the process, something that was also helpful and important in other elements of the review.
Searching the literature
A defining characteristic of conventional systematic review methodology is its use of explicit searching strategies, and its requirement that reviewers be able to give a clear account of how they searched for relevant evidence, such that the search methods can be reproduced. [2] Searching normally involves a range of strategies, but relies heavily on electronic bibliographic databases.
We piloted the use of a highly structured search strategy using protocol-driven searches across a range of electronic databases but, like Greenhalgh and Peacock [17] found that was this unsatisfactory. In particular, it risked missing relevant materials by failing to pick up papers that, while not ostensibly about "access", were nonetheless important to the aim of the review. We then developed a more organic process that fitted better with the emergent and exploratory nature of the review questions. This combined a number of strategies, including searching of electronic databases; searching websites; reference chaining; and contacts with experts. Crucially, we also used expertise within the team to identify relevant literature from adjacent fields not immediately or obviously relevant to the question of "access".
However, searching generated thousands of potentially relevant items – at one stage over 100,000 records. A literature of this size would clearly be unmanageable, and well exceed the capacity of the review team. We therefore redefined the aim of the searching phase. Rather than aiming for comprehensive identification and inclusion of all relevant literature, as would be required under conventional systematic review methodology, we saw the purpose of the searching phase as identifying potentially relevant papers to provide a sampling frame. Our sampling frame eventually totalled approximately 1,200 records.
Sampling
Conventional systematic review methodology limits the number of papers to be included in a review by having tightly specified inclusion criteria for papers. Effectively, this strategy constructs the field to be known as having specific boundaries, defined as research that has specifically addressed the review question, used particular study designs and fulfilled the procedural requirements for the proper execution of these. Interpretive reviews might construct the field to be known rather differently, seeing the boundaries as more diffuse and ill-defined, as potentially overlapping with other fields, and as shifting as the review progresses. Nonetheless, there is a need to limit the number of papers to be included in an interpretive synthesis not least for practical reasons, including the time available. Sampling is also warranted theoretically, in that the focus in interpretive synthesis is on the development of concepts and theory rather than on exhaustive summary of all data. A number of authors [18-20] suggest drawing on the sampling techniques of primary qualitative research, including principles of theoretical sampling and theoretical saturation, when conducting a synthesis of qualitative literature.
For purposes of our synthesis, we used purposive sampling initially to select papers that were clearly concerned with aspects of access to healthcare, partly informed by an earlier scoping study [21] and later used theoretical sampling to add, test and elaborate the emerging analysis. Sampling therefore involved a constant dialectic process conducted concurrently with theory generation.
Determination of quality
Conventional systematic review methodology uses assessment of study quality in a number of ways. First, as indicated above, studies included in a review may be limited to particular study designs, often using a "hierarchy of evidence" approach that sees some designs (e.g. randomized controlled trials) as being more robust than others (e.g. case-control studies). Second, it is usual to devise broad inclusion criteria – for example adequate randomisation for RCTs – and to exclude studies that fail to meet these. Third, an appraisal of included studies, perhaps using a structured quality checklist, may be undertaken to allow sensitivity analyses aimed at assessing the effects of weaker papers.
Using this approach when confronted with a complex literature, including qualitative research, poses several challenges. No hierarchy of study designs exists for qualitative research. How or whether to appraise papers for inclusion in an interpretive reviews has received a great deal of attention, but there is little sign of an emergent consensus [22]. Some argue that formal appraisals of quality may not be necessary, and some argue that there is a risk of discounting important studies for the sake of "surface mistakes" [23]. Others propose that weak papers should be excluded from the review altogether, and several published syntheses of qualitative research have indeed used quality criteria to make decisions about excluding papers. [10,24]
We aimed to prioritise papers that appeared to be relevant, rather than particular study types or papers that met particular methodological standards. We might therefore be said to be prioritising "signal" (likely relevance) over "noise" (the inverse of methodological quality) [25]. We felt it important, for purposes of an interpretive review, that a low threshold be applied to maximise the inclusion and contribution of a wide variety of papers at the level of concepts. We therefore took a two-pronged approach to quality. First, we decided that only papers that were deemed to be fatally flawed would be excluded. Second, once in the review, the synthesis itself crucially involved judgements and interpretations of credibility and contribution, as we discuss later.
To identify fatally flawed papers, we used the criteria in Table 1, adapted from those proposed (at the time of our review) by the National Health Service (NHS) National Electronic Library for Health for the evaluation of qualitative research, to inform judgements on the quality of the papers. These criteria were used for assessing all empirical papers (but not those classified as 'reviews') regardless of study type. The final judgement about inclusion of the review rested both on an assessment of relevance as well as on the assessment of the quality of the individual papers. Decisions about relevance and quality were recorded, and a small sample of decisions about relevance and quality was reviewed. In the event, very few papers – approximately 20 – were excluded on grounds of being "fatally flawed", because even weak papers were often judged to have potentially high relevance. The value of deferring judgements of credibility and contribution until the synthesis became increasingly evident.
Table 1. Appraisal prompts for informing judgements about quality of papers
Most fundamentally, as the review progressed, we became increasingly convinced that the assumption that all studies deemed to have satisfactorily fulfilled criteria of execution and reporting can contribute equally to a synthesis is flawed. As we discuss further below, one of the distinctive characteristics of a critical interpretive synthesis is its emphasis not only on summary of data reported in the literature but also on a more fundamental critique, which may involve questioning taken-for-granted assumptions.
Data extraction
A data-extraction pro-forma was initially devised to assist in systematically identifying characteristics of research participants, methods of data collection, methods of data analysis and major findings of each paper. For both qualitative and quantitative papers, this involved extracting the titles of the categories and sub-categories using the terms used in the paper itself and a summary of the relevant material. Practically, however, it proved impossible to conduct this form of data extraction on all documents included in the review, including very large documents. We therefore summarised some documents more informally, for example using highlighter pen. More generally, the value of formal data extraction for purposes of this type of study will require further evaluation.
Conducting an interpretive synthesis
We had intended, at the outset of this project, to use meta-ethnography, a method for interpretive synthesis where there is currently an active programme of methodological research, [9-11] as our approach to synthesis. However, this had previously only been used to synthesise qualitative studies. Our experiences of working with a large sample of papers using multiple methods led us to refine and respecify some of the concepts and techniques of meta-ethnography in order to enable synthesis of a very large and methodologically diverse literature. Eventually we had made so many amendments and additions to the original methodology that we felt it was more appropriate, helpful and informative to deem it a new methodology with its own title and processes. It is this approach which we term critical interpretive synthesis (CIS). It is important to emphasise, however, that CIS is an approach to review and is not solely a method for synthesis.
Meta-ethnography, as originally proposed [1], involves three major strategies.:
1. Reciprocal translational analysis (RTA). The key metaphors, themes, or concepts in each study report are identified. An attempt is then made to translate the concepts into each other. Judgements about the ability of the concept of one study to capture concepts from others are based on attributes of the themes themselves, and the concept that is "most adequate" is chosen.
2. Refutational synthesis. Contradictions between the study reports are characterised, and an attempt made to explain them.
3. Lines-of-argument synthesis (LOA) involves building a general interpretation grounded in the findings of the separate studies. The themes or categories that are most powerful in representing the entire dataset are identified by constant comparisons between individual accounts.
Reciprocal translational analysis
Reciprocal translational analysis involves translating findings of one paper into another by systematically comparing findings from each study, using techniques such as maps. [9] We encountered considerable methodological and practical problems in trying to apply RTA across a large set of papers, in part because of the kinds of iterations we were conducting in refining the sample. These meant that there were difficulties in identifying a stable "set" of papers on which an RTA could be conducted. RTA appears to be most suitable for a well-defined, relatively small (fewer than 50) and complete set of papers, because substitution or deletion of papers causes problems with both identifying index concepts and showing which concepts from other papers translate into these. A further problem is that, when confronted with a very large and diverse literature such as ours, RTA tends to provide only a summary in terms that have already been used in the literature. Although this may be a useful strategy as a stage on the way to a more interpretive synthesis, its value may be more limited than is the case for smaller samples of qualitative study reports where its benefits have been more evident.
Before our review, RTA had previously only been used for synthesising interpretive research, not a large and diverse body of literature, so this may be one reason why it was unsuccessful for our purposes. It is important to distinguish between the doubtful value of RTA in our synthesis (particularly because of the size and diversity of the literature), and the doubtful use of RTA in general. The diversity of the literature would also have prevented us from undertaking an aggregative synthesis using meta-analysis, but this clearly could not be read as a criticism of meta-analysis itself, but of its limitations when applying it to a diverse literature.
Lines of argument synthesis
Recent work [9-11] has innovated in the methodology of lines-of-argument (LOA) synthesis originally proposed by Noblit and Hare by building on Schutz's [26] notions of "orders" of constructs Schutz used the idea of "first order construct" to refer to the everyday understandings of ordinary people and "second order construct" to refer to the constructs of the social sciences. The explanations and theories used by authors in primary study reports could therefore be seen as second order interpretations. This recent work uses LOA synthesis to develop what are referred to as "third order" interpretations, which build on the explanations and interpretations of the constituent studies, and are simultaneously consistent with the original results while extending beyond them. Our experiences have led us to respecify some of this approach.
We suggest that the appropriate way of conceptualising the output of an LOA synthesis is as a synthesising argument. This argument integrates evidence from across the studies in the review into a coherent theoretical framework comprising a network of constructs and the relationships between them. Its function is to provide more insightful, formalised, and generalisable ways of understanding a phenomenon. A synthesising argument can be generated through detailed analysis of the evidence included in a review, analogous to the analysis undertaken in primary qualitative research. It may require the generation of what we call synthetic constructs, which are the result of a transformation of the underlying evidence into a new conceptual form. Synthetic constructs are grounded in the evidence, but result from an interpretation of the whole of that evidence, and allow the possibility of several disparate aspects of a phenomenon being unified in a more useful and explanatory way.
What we have called a "synthetic construct" might also be seen as a "third order construct". We suggest that the term "synthetic construct" is a more useful term because it is more explicit, and also because we emphasise that a synthesising argument need not consist solely of synthetic constructs. Instead, synthesising arguments may explicitly link not only synthetic constructs, but also second order constructs already reported in the literature. In effect, therefore, our approach does not make this precise distinction between second and third order constructs.
Refutational syntheses
We further suggest that what Noblit and Hare [1] call "refutational syntheses" are best conducted as part of the analysis that produces the synthesising argument Few published meta-ethnographies have in fact reported a separate refutational synthesis. It is, we suggest, more productive instead to adopt a critical and reflexive approach to the literature, including consideration of contradictions and flaws in evidence and theory.
An important element of producing a synthesising argument is the need, when conducting the analysis, to consider and reflect on the credibility of the evidence, to make critical judgements about how it contributes to the development of the synthesising argument, and to root the synthesising argument appropriately in critique of existing evidence. Clearly, credibility depends on the quality of the research, its currency, and the robustness of its theoretical base. But more generally, a critical interpretive synthesis is critical in the broader sense of critique rather than this more limited sense of critical appraisal, in which each study is judged against the standards of its type. Critique may involve identification of the research traditions or meta-narratives that have guided particular fields of research [27] as well as critical analysis of particular forms of discourses. Its aim is therefore to treat the literature as warranting critical scrutiny in its own right.
Conducting the analysis
Our analysis of the evidence, in order to produce a synthesising argument, was similar to that undertaken in primary qualitative research. We began with detailed inspection of the papers, gradually identifying recurring themes and developing a critique. We then generated themes that helped to explain the phenomena being described in the literature, constantly comparing the theoretical structures we were developing against the data in the papers, and attempting to specify the categories of our analysis and the relationships between them. To facilitate the process of identifying patterns, themes, and categories across the large volumes of text-based data in our study, we used QSR N5 software. However, it is important to note that, as with any qualitative analysis, full transparency is not possible because of the creative, interpretive processes involved. Nonetheless, the large multidisciplinary team involved in the review, and the continual dialogue made necessary by this, helped to introduce "checks and balances" that guarded against framing of the analysis according to a single perspective.
A key feature of this process that distinguishes it from some other current approaches to interpretive synthesis (and indeed of much primary qualitative research) was its aim of being critical: its questioning of the ways in which the literature had constructed the problematics of access, the nature of the assumptions on which it drew, and what has influenced its choice of proposed solutions. Our critique of the literature was thus dynamic, recursive and reflexive, and, rather than being a stage in which individual papers are excluded or weighted, it formed a key part of the synthesis, informing the sampling and selection of material and playing a key role in theory generation.
Findings: access to healthcare by socio-economically disadvantaged people
Our critical interpretive synthesis of the literature on access to healthcare by socio-economically disadvantaged people in the UK included 119 papers. Early analytic categories were tentative and contingent, but gradually became firmed up and more highly specified as our analysis continued. Our synthesis involved a critique of the tendency to use measures of utilisation as a means of assessing the extent to which access to healthcare is equitable. It further involved the generation of a synthesising argument that has the synthetic construct of candidacy at its core. For space reasons, we can report here only a brief illustrative summary.
Critique of utilisation as a measure of access
Much of the evidence on whether access to healthcare in the UK is equitable has relied on measuring utilisation of health services. This approach measures the units of healthcare (consultations, procedures, etc) that people have actually consumed. The literature suggests that different groups have identifiable patterns of use of services, but the significance of these is often difficult to interpret. General practice (GP) consultation rates among socio-economically disadvantaged people have generally been found to be higher [28,29] though some recent work has suggested that social class variables are generally insignificant in explaining health service use [30] Studies that have attempted to adjust for need, usually on the basis of estimates of morbidity, have generally suggested that the apparent excess of GP consultation can be explained by higher need [31].
Our critique of the literature suggests that utilisation is a generally unhelpful measure of equity of access. Not only do the logistical and practical problems of conducting utilisation studies pose substantial threats to validity and reliability, these studies are problematic for other reasons. They rely on a largely untested set of normative (i.e. ideas about how the world ought to be) and somewhat questionable assumptions about the "correct" level of utilisation, and on a difficult-to-measure (or conceputalise) estimates of "need". They often invoke normative assumptions about need relative to some apparently privileged though often ill-defined reference group (such as "affluent" people), and therefore risk failing to identify problems in access for that reference group. Misleadingly reassuring results may be produced that indicate that "need" and use or receipt are proportionate. We argue that utilisation, or, more appropriately, receipt of healthcare is the outcome of many different complex processes, which all need to be recognised if access is to be properly understood.
Our analysis suggested that a focus instead on candidacy, a synthetic construct that we generated during the course of our analysis, would demonstrate the vulnerabilities associated with socio-economic disadvantage, emphasise the highly dynamic, multi-dimensional and contingent character of access, and allow a more insightful interpretation of the evidence on receipt of healthcare.
Candidacy
Our synthesising argument around access to healthcare by socio-economically disadvantaged people is organised around a set of central concepts and, in particular, the core synthetic category of "candidacy". Candidacy functions as a synthetic construct because it is the product of the transformation of the evidence into a new conceptual form. It is distinct from earlier uses of the term "candidacy", including its use in the lay epidemiology of heart disease [32].
We have defined candidacy as follows: candidacy describes the ways in which people's eligibility for medical attention and intervention is jointly negotiated between individuals and health services. Our synthesising argument runs as follows: candidacy is a dynamic and contingent process, constantly being defined and redefined through interactions between individuals and professionals, including how "cases" are constructed. Accomplishing access to healthcare requires considerable work on the part of users, and the amount, difficulty, and complexity of that work may operate as barriers to receipt of care. The social patterning of perceptions of health and health services, and a lack of alignment between the priorities and competencies of disadvantaged people and the organisation of health services, conspire to create vulnerabilities. Candidacy is managed in the context of operating conditions that are influenced by individuals, the setting and environment in which care takes place, situated activity, the dynamics of face-to-face activity, and aspects of self (such as gender), the typifications staff use in categorising people and diseases, availability of economic and other resources such as time, local pressures, and policy imperatives.
Identification of candidacy
How people recognise their symptoms as needing medical attention or intervention is clearly key to understanding how they assert a claim to candidacy. Our analysis suggests that people in more deprived circumstances are likely to manage health and to recognise candidacy as a series of crises. There is significant evidence of lower use of preventive services among more deprived groups, [33,34] as well as evidence of higher use of accident and emergency facilities, emergency admissions and out-of-hours use [35,35,37,38]. Among more deprived groups, there is a tendency to seek help in response to specific events that are seen as warranting candidacy. "Warning signs" may be downgraded in importance by socio-economically disadvantaged populations because of a lack of a positive conceptualisation of health, [39,40] the normalisation of symptoms within deprived communities [41-43], and fear of being "blamed" by health professionals [44].
Navigation
Using services requires considerable work on the part of people. First, people must be aware of the services on offer, and there has been persistent concern that more deprived people may lack awareness of some services [45,46]. Second, using health services requires the mobilisation of a range of practical resources that may be variably available in the population. A key practical resource that impacts on the ability to seek care for the socio-economically disadvantaged, for example, is transport [44,47,48]. Other practical resources that may impact on the ability of disadvantaged groups to negotiate health services include more rigid patterns of working life [47]. Goddard and Smith [49] summarise evidence suggesting that those from more deprived social groups face financial costs of attending health services which, though not sufficient to dissuade them from using services when they are ill (i.e. in response to a specific "event"), act as a barrier to attending "optional" services related to health promotion and health prevention
The permeability of services
Patterns of use of health services reflect issues in the organisation of services as much as they reflect a tendency to manage health as a series of crises on the part of disadvantaged people. We generated the synthetic construct of "permeability" to refer to the ease with which people can use services. Porous services require few qualifications of candidacy to use them, and may require the mobilisation of relatively fewer resources. Such services might include Accident and Emergency departments. Services that are less permeable demand qualifications (such as a referral), and also demand a higher degree of cultural alignment between themselves and their users, particularly in respect of the extent to which people feel comfortable with the organisational values of the service. Such services might include out-patients clinics in hospitals.
Services that are less permeable tend to have high levels of default by socio-economically disadvantaged people [50-53]. Appointments systems, for example, are a threat to permeability by socio-economically disadvantaged people because they require resources and competencies (including stable addresses, being able to read, and being able to present in particular places at particular times [33,50,54] In addition, the extent to which people feel alienated from the cultural values of health services and their satisfaction with services have important implications for which services they choose to use [41,55].
Appearances at health services
Appearing at health services involves people in asserting a claim to candidacy for medical attention or intervention. Whatever the nature of the claim, making it clearly involves work that requires a set of competencies, including the ability to formulate and articulate the issue for which help is being sought, and the ability to present credibly. More deprived people are at risk in these situations: they may be less used to or less able to provide coherent abstracted explanations of need, and may feel intimidated by their social distance from health professionals. Sword [56] points out that people with low incomes may feel alienated by the power relations that often characterise encounters with professionals. Dixon et al [57] and, in the US, Cooper and Roter [58] suggest that middle class people may be more adept at using their "voice" to demand better and extensive services: they may be more articulate, more confident, and more persistent, while people from lower class backgrounds are less verbally active. Somerset et al [59] report that in making referral decisions, patients' social status and their ability to articulate verbally act as background (and unexpressed) influences that affect the likelihood of referral.
Adjudications
Once a patient has asserted their candidacy by presenting to health services, the professional judgements made about that candidacy strongly influence subsequent access to attention and interventions. We generated the synthetic construct of "adjudication" to refer to the judgements and decisions made by professionals which allow or inhibit continued progression of candidacy. May et al's [60] analysis suggests doctors' practices are often exercised through a repertoire of routine judgements about the possibilities presented by individual patients and the routinely available means of solving these. These typifications are, we suggest, strongly influenced by local conditions, including the operating conditions in which practitioners work and sensitivity to resource constraints. Candidacy of socially disadvantaged people appears to be at risk of being judged to be less eligible, at least for some types of interventions, although the evidence that this happens is not particularly strong.
Our analysis suggests that it is likely that professionals' perceptions of patients who are likely to "do well" as a result of interventions may disadvantage people in more deprived circumstances. As Hughes and Griffiths [61] identify, clinical decisions may rest on often implicit social criteria about which patients "ought" to receive care People in disadvantaged groups are more likely to smoke, to be overweight and to have co-morbidities, and professional perceptions of the cultural and health capital required to convert a unit of health provision into a given unit of health gain may function as barriers to healthcare [34]. In addition, perceptions of social "deservingness" may play a role [61,62]. Goddard and Smith [49] summarise evidence suggesting that independent of the severity of the disease, some GPs are more likely to refer the economically active and those with dependants. Clearly, there is potential for socially disadvantaged people to be disfavoured in such decisions.
Offers and resistance
Much of the work on utilisation of healthcare explicitly or implicitly assumes that non-utilisation is a direct reflection of non-offer. However, this type of normative analysis fails to acknowledge that people may choose to refuse offers. There is some evidence of patterns of resistance to offers. Referral implies that a GP has identified particular features of candidacy and is seeking to match those to a service that deals with that form of candidacy, but patients can resist being referred [42,63] and can resist offers of medication [64,65].
Operating conditions and the local production of candidacy
A small body of recent research has identified what might be called local influences on the production of candidacy, and in our analysis these are hugely important. These are the contingent and locally specific influences on interactions between practitioners and patients, which may be emergent over time through repeated encounters. Crucial to the local production of candidacy is the perceived or actual availability and suitability of resources to address that candidacy [60,63].
Discussion
Demands from health policy-makers and managers for syntheses of evidence that are useful, rigorous and relevant are fuelling interest in the development of methods that can allow the integration of diverse types of evidence [66]. With the diversity of techniques for evidence synthesis now beginning to appear, those using existing, 'new' or evolving techniques need to produce critical reflexive accounts of their experiences of using the methods [3]. Our experience of conducting a review of access to healthcare, where there is a large, amorphous and complex body of literature, and a need to assemble the findings into a form that is useful in informing policy and that is empirically and theoretically grounded [67], has led us to propose a new method – Critical Interpretive Synthesis – which is sensitised to the kinds of processes involved in conventional systematic review while drawing on a distinctively qualitative tradition of inquiry.
Conventional systematic review methodology is well-suited to aggregative syntheses, where what is required is a summary of the findings of the literature under a set of categories which are largely pre-specified, secure, and well-defined. It has been important in drawing attention to the weaknesses of informal reviews, including perceived failures in their procedural specification and the possibility that the (thus) undisciplined reviewer might be chaotic or negligent in identifying the relevant evidence, or might construct idiosyncratic theories and marshall the evidence in support of these. It has thus revealed some of the pitfalls of informal literature review. Conventional systematic review methodology has demonstrated considerable benefits in synthesising certain forms of evidence where the aim is to test theories (in the form of hypotheses), perhaps especially about "what works". However, this approach is limited when the aim, confronted with a complex body of evidence, is to generate theory [15,27].
Current methods for conducting an interpretive synthesis of the literature, (such as meta-ethnography) are also limited, in part because application of many interpretive methods for synthesis has remained confined to studies reporting qualitative research. Realist synthesis [68], which does include diverse forms of evidence, is oriented towards theory evaluation, in particular by focusing on theories of change. Methods for including qualitative and quantitative evidence in systematic reviews developed by the EPPI Centre at the Institute of Education, London, have involved refinements and extensions of conventional systematic review methodology [6-8], and have limited their application of interpretive techniques to synthesis of qualitative evidence.
More generally, many current approaches fail to be sufficiently critical, in the sense of offering a critique. There is rarely an attempt to reconceptualise the phenomenon of interest, to provide a more sweeping critique of the ways in which the literature in the area have chosen to represent it, or to question the epistemological and normative assumptions of the literature. With notable exceptions such as the recent approach of meta-narrative analysis [15], critique of papers in current approaches to review tends to be limited to appraisal of the methodological specificities of the individual papers.
Conducting an interpretive review of the literature on access to healthcare by vulnerable groups in the UK therefore required methodological innovation that would be alert to the issues raised by systematic review methodology but also move beyond both its limitations and those of other current interpretive methods. The methods for review that we developed in this project (Table 2) built on conventional systematic review methodology in their sensitivity to the need for attentiveness to a range of methodological processes. Crucially, in doing so, we drew explicitly on traditions of qualitative research inquiry, and in particular on the principles of grounded theory [5].
Table 2. Key Processes in critical interpretive synthesis
In addition to its explicit orientation towards theory generation, perhaps what most distinguishes CIS from conventional systematic review methods is its rejection of a "stage" approach to review. Processes of question formulation, searching, selection, data extraction, critique and synthesis are characterised as iterative, interactive, dynamic and recursive rather than as fixed procedures to be accomplished in a pre-defined sequence. CIS recognises the need for flexibility in the conduct of review, and future work would need to assess how far formal methods of critical appraisal and data extraction will be essential elements of the method. Our experience suggests that while attention to scientific quality is required, more generally the emphasis should be on critique rather than critical appraisal, and an ongoing critical orientation to the material examined and to emerging theoretical ideas. Formal data extraction may also be an unnecessarily constraining and burdensome process.
CIS emphasises the need for theoretical categories to be generated from the available evidence and for those categories to be submitted to rigorous scrutiny as the review progresses. Further, it emphasises a need for constant reflexivity to inform the emerging theoretical notions, and guides the sampling of articles. Although CIS demands attention to flaws in study design, execution and reporting in our judgements of the quality of individual papers, its critical approach goes beyond standard approaches. Thus, in our review, some methodologically weak papers were important in terms of their theoretical contribution, or in terms of demonstrating the breadth of evidence considered in the construction of particular categories, or in terms of providing a more comprehensive summary of the evidence, while a single strong paper might be pivotal in the development of the synthesis. Hughes and Griffiths' paper on micro-rationing of healthcare [61], for example, was a key paper in helping to generate the construct of candidacy that later came to unify the themes of our analysis. The critical interpretation in our analysis focused on how a synthesising argument could be fashioned from the available evidence, given the quality of the evidence and the kinds of critiques that could be offered of the theory and assumptions that lay behind particular approaches. In treating the literature as an object of scrutiny in its own right, CIS problematises the literature in ways that are quite distinctive from most current approaches to literature reviewing.
Access to healthcare
The CIS approaches we adopted deferred final definition of the phenomenon of access and the appropriate ways of conceptualising it until our analysis was complete. Our critique of the current literature focused on the inadequacies of studies of utilisation as a guide to explaining inequities in health care. The conceptual model of access that we developed emphasises candidacy as the core organising construct, and recasts access as highly dynamic and contingent, and subject to constant negotiation.
In this conceptual model of access to healthcare, health services are continually constituting and seeking to define the appropriate objects of medical attention and intervention, while at the same time people are engaged in constituting and defining what they understand to be the appropriate objects of medical attention and intervention. Candidacy describes how people's eligibility for healthcare is determined between themselves and health services. Candidacy is a continually negotiated property of individuals, subject to multiple influences arising both from people and their social contexts and from macro-level influences on allocation of resources and configuration of services. "Access" represents a dynamic interplay between these simultaneous, iterative and mutually reinforcing processes. By attending to how vulnerabilities arise in relation to candidacy, the phenomenon of access can be much better understood, and more appropriate recommendations made for policy, practice and future research. Although our review focused on the UK, we suggest that the construct of candidacy is transferable, and has useful explanatory value in other contexts.
In addition to the core construct of candidacy, our analysis required the production of a number of other linked synthetic constructs – constructs generated through an attempt to summarise and integrate diverse concepts and data – including "adjudications" and "offers". It was also possible to link existing "second order" constructs, for example relating to help-seeking as the identification of candidacy by patients, into the synthesising argument, and making these work as synthesising constructs. We feel that this approach allows maximum benefit to be gained from previous analyses as well as the new synthesis.
Reflections on the method
Clearly, questions can be raised about the validity and credibility of the CIS analysis we have presented here. Conventional systematic review methodology sets great store by the reproducibility of its protocols and findings. It would certainly have been possible to produce an account of the evidence that was more reproducible. For example, we could have used the evidence to produce a thematic summary that stuck largely to the terms and concepts used in the evidence itself. However, we felt it important that we produced an interpretation of the evidence that could produce new insights and fresh ways of understanding the phenomenon of access, and that the "critical voice" of our interpretation was maintained throughout the analysis. Simply to have produced a thematic summary of what the literature was saying would have run the risk of accepting that the accounts offered in the evidence-base were the only valid way of understanding the phenomenon of access to healthcare by vulnerable groups. We therefore make no claim to reproducibility, but wish to address some possible concerns. First, it could be argued that a different team using the same set of papers would have produced a different theoretical model. However, the same would be true for qualitative researchers working with primary qualitative data, who accept that other possible interpretations might be given to, say, the same set of transcripts. Clearly, the production of a synthesizing argument, as an interpretive process, produces one privileged reading of the evidence, and, as the product of an authorial voice, it cannot be defended as an inherently reproducible process or product. We would suggest, however, that our analysis can be defended on the grounds that it is demonstrably grounded in the evidence; that it is plausible; that it offers insights that are consistent with the available evidence; and that it can generate testable hypotheses and empirically valuable questions for future research.
Second, subjecting a question to continual review and refinement, as we did, may make it more difficult for those conducting critical interpretive reviews to demonstrate, as required by conventional systematic review methodology, the "transparency", comprehensiveness, and reproducibility of search strategies. This dilemma between the "answerable" question and the "meaningful" question has received little attention, but it underpins key tensions between the two ends of the academic/pragmatic systematic review spectrum. On balance, faced with a large and amorphous body of evidence in an area such as access to healthcare, and given the aims of an interpretive synthesis, we feel that our decision not to limit the focus of the review at the outset, and our subsequent sampling strategies, were well justified. Our decision not to commit to a particular view of what access might be and how it should be assessed at the outset of the project was critical to our subsequent development of a more satisfactory understanding of access.
Third, it could be argued that we have synthesized too small a sample of the available papers, or that the processes used to select the papers are not transparent. We recognize that we have analyzed and synthesized only a fraction of all relevant papers in the area of access to healthcare by vulnerable groups. However, a common strategy in conventional systematic review is to limit the study types to be included; this strategy also might result in only a proportion of the potentially relevant literature being synthesised. While we have described our methods for sampling as purposive, it is possible that another team using the same approach could have come up with a different sample, because, particularly in the later stages of our review, our sampling was highly intuitive and guided by the emerging theory.
The final version of the conceptual model of access to healthcare that we eventually developed did not emerge until quite late in the review process, and much of the later sampling was directed at testing and purposively challenging the theory as we began to develop it. Again, such forms of searching and sampling do not lend themselves easily to reproducibility or indeed auditability. Testing whether the interpretations change in response to different findings will be an important focus for future research, which will also need to evaluate whether apparently disconfirming evidence is the result of methodological flaws or poses a genuine challenge to theory.
Conclusion
Conducting interpretive reviews in challenging areas where there is a large body of diverse evidence demands an approach that can draw on the strengths of conventional systematic review methodology and on the recent advances in methods for interpretive synthesis. We have termed the approach we developed to this review "critical interpretive synthesis". We believe that this methodology offers the potential for insight, vividness, illumination, and reconceptualisation of research questions, particularly in challenging areas such as access to healthcare, and look forward to further evaluations of its application.
Competing interests
The author(s) declare that they have no competing interests.
Authors' contributions
MDW designed the project, led and supervised its execution, and drafted the manuscript. EA, AA, JH, RH, SK, RO, LS, RR and AJS participated in the design of the study. All authors engaged in searching, screening, sampling, data extraction, and critical appraisal/critique activities, and contributed to the thematic analysis. DC and SA managed the searching, maintained the databases and coded material using N6 software. All authors contributed to the draft of the manuscript.
Acknowledgements
This project was funded by the NHS Service Delivery and Organisation (SDO) Research Programme.
References
1. Noblit G, Hare R: Meta-ethnography: synthesising qualitative studies. Newbury Park, CA: Sage; 1988.
2. Egger M, Davey Smith G, Phillips A: Meta-analysis: principles and procedures.
BMJ 1997, 315:1533-1537. PubMed Abstract | Publisher Full Text
3. Dixon-Woods M, Bonas S, Booth A, Jones DR, Miller T, Sutton AJ, Shaw RL, Smith JA, Young B: How can systematic reviews incorporate qualitative research? A critical perspective.
Qualitative Research 2006, 6:27-44. Publisher Full Text
4. Dixon-Woods M, Agarwal S, Jones D, Young B, Sutton A: Synthesising qualitative and quantitative evidence: a review of possible methods.
J Health Serv Res Policy 2005, 10:45-53. PubMed Abstract | Publisher Full Text
5. Glaser B, Strauss A: The discovery of grounded theory: strategies for qualitative research. New York: Aldine de Gruyter; 1967.
6. Shepherd J, Harden A, Rees R, Brunton G, Garcia J, Oliver S, Oakley A: Young people and healthy eating: a systematic review of research on barriers and facilitators.
Health Educ Res 2006, 21:239-257. PubMed Abstract | Publisher Full Text
7. Harden A, Garcia J, Oliver S, Rees R, Shepherd J, Brunton G, Oakley A: Applying systematic review methods to studies of people's views: an example from public health research.
J Epidemiol Community Health 2004, 58:794-800. PubMed Abstract | Publisher Full Text
8. Thomas J, Harden A, Oakley A, Oliver S, Sutcliffe K, Rees R, Brunton G, Kavanagh J: Integrating qualitative research with trials in systematic reviews.
BMJ 2004, 328:1010-1012. PubMed Abstract | Publisher Full Text | PubMed Central Full Text
9. Pound P, Britten N, Morgan M, Yardley L, Pope C, Daker-White G, Campbell R: Resisting medicines: a synthesis of qualitative studies of medicine taking.
Soc Sci Med 2005, 61:133-155. PubMed Abstract | Publisher Full Text
10. Campbell R, Pound P, Pope C, et al.: Evaluating meta-ethnography: a synthesis of qualitative research on lay experiences of diabetes and diabetes care.
Soc Sci Med 2003, 56:671-684. PubMed Abstract | Publisher Full Text
11. Britten N, Campbell R, Pope C, Donovan J, Morgan M, Pill R: Using meta-ethnography to synthesise qualitative research: a worked example.
J Health Serv Res Policy 2002, 7:209-215. PubMed Abstract | Publisher Full Text
12. NHS Centre for Reviews and Dissemination: Undertaking systematic reviews of research on effectiveness: CRD's guidance for those carrying out or commissioning reviews. York: NHS CRD; 2001.
13. Alderson P, Green S, Higgins JP: Cochrane Reviewers' Handbook 4.2. The Cochrane Library; 2004.
14. Jensen L, Allen M: Meta-synthesis of qualitative findings.
Qual Health Res 1996, 6:553-560.
15. Greenhalgh T, Robert G, Macfarlane F, Bate P, Kyriakidou O, Peacock R: Storylines of research in diffusion of innovation: a meta-narrative approach to systematic review.
Soc Sci Med 2005, 61:417-430. PubMed Abstract | Publisher Full Text
16. Eakin JM, Mykhalovskiy E: Reframing the evaluation of qualitative health research: reflections on a review of appraisal guidelines in the health sciences.
J Eval Clin Pract 2003, 9:187-194. PubMed Abstract | Publisher Full Text
17. Greenhalgh T, Peacock R: Effectiveness and efficiency of search methods in systematic reviews of complex evidence: audit of primary sources.
BMJ 2005, 331:1064-1065. PubMed Abstract | Publisher Full Text | PubMed Central Full Text
18. Schreiber RCD, Stern P: Qualitative meta-analysis. In: Completing a qualitative project: details and dialogue. Edited by Morse JM. Thousand Oaks, CA: Sage; 1997.
19. Booth A: Cochrane or cock-eyed? How shoul we conduct systematic reviews of qualitative research? In Proceedings of the Qualitative Evidence-based Practice Conference, Taking a Critical Stance. Coventry University; 2001.
May 14 2001
20. Paterson B, Thorne S, C C, Jillings C: Meta-study of qualitative health research. Thousand Oaks: Sage; 2001.
21. Gulliford M, Hughes D, Figeroa-Munoz J, Hudson M, Connell P, Morgan M, Beech R, Gibson B, Arumugam C, Mohiddin A, Sedgwick J: Access to health care: Report of a scoping exercise for NHS Service Delivery and Organisation R&D (NCCSDO).
National Co-ordinating Centre for NHS Service Delivery and Organisation Research 2001.
22. Dixon-Woods M, Shaw RL, Agarwal S, Smith JA: The problem of appraising qualitative research.
Qual Saf Health Care 2004, 13:223-225. PubMed Abstract | Publisher Full Text
23. Sandelowski M, Docherty S, Emden C: Focus on qualitative methods. Qualitative meta-synthesis: issues and techniques.
Res Nurs Health 1997, 20:365-371. PubMed Abstract | Publisher Full Text
24. Paterson B, Thorne S, Dewis M: Adapting to and managing diabetes.
Image 1998, 30:57-62.
25. Edwards A, Elwyn G, Hood K, Rollnick S: Judging the 'weighting of evidence' in systematic reviews: introducing rigour into the qualitative overview stage by assessing Signal and Noise.
J Eval Clin Pract 2000, 6:177-184. PubMed Abstract | Publisher Full Text
26. Schutz A: Collected Papers. Volume 1. The Hague: Martinus Nijhoff; 1962.
27. Greenhalgh T, Robert G, Bate P, Kyriakidou O, Macfarlane F, Peacock R: A systematic review of the literature on diffusion, dissemination and sustainability of innovations in health service delivery. London: NHS SDO Programme; 2004.
28. Carr-Hill R, Rice N, Roland M: Socioeconomic determinants of rates of consultation in general practice based on fourth national morbidity survey of general practices.
BMJ 1996, 312:1008-1012. PubMed Abstract
29. Carlisle R, Johnstone S: The relationship between census-derived socio-economic variables and general practice consultation rates in three town centre practices.
Br J Gen Pract 1998, 48:1675-1678. PubMed Abstract | PubMed Central Full Text
30. Sutton M, Gravelle H, Leyland A, Morris S, Muirhead M, Noble M, Parkin D, Windmeijer F: Small area study of supply and demand determinants of healthcare resource use and estimation of relative needs for primary care trusts in England.
English Department of Health/Advisory Committee on Resource Allocation 2002.
31. Wyke S, Hunt K, Walker J, Wilson P: Frequent attendance, socio-economic status and burden of ill health: an investigation in the West of Scotland.
Eur J Gen Pract 2003, 9:48. PubMed Abstract
32. Davison C, Davey Smith G, Frankel S: Lay epidemiology and the prevention paradox: the implications of coronary candidacy for health education.
Sociol Health Illn 1991, 13:1-19. Publisher Full Text
33. Martin R, Sterne J: Social and economic variation in general practice consultation rates amongst men aged 16–39.
Health Statistics Quarterly 2001, 09:29-36.
34. Watt G: The inverse care law today.
Lancet 2002, 360:252-254. PubMed Abstract | Publisher Full Text
35. Majeed F, Cook D, Hilton S, Poloniecki J, Hagen A: Annual night visiting rates in 129 general practices in one family health services authority: Association with patient and general practice characteristics.
Br J Gen Pract 1995, 45:531-535. PubMed Abstract | PubMed Central Full Text
36. Reid F, Cook D, Majeed A: Explaining variation in hospital admission rates between general practices: cross sectional study.
BMJ 1999, 319:98-103. PubMed Abstract | Publisher Full Text | PubMed Central Full Text
37. Blatchford O, Capewell S, Murray S, Blatchford M: Emergency medical admissions in Glasgow: general practices vary despite adjustment for age, sex, and deprivation.
Br J Gen Pract 1999, 49:551-554. PubMed Abstract | Publisher Full Text | PubMed Central Full Text
38. Carlisle R, Groom L, Avery A, Boot D, Earwicker S: Relation of out-of-hours activity by general practice and accident and emergency services with deprivation in Nottingham: longitudinal survey.
BMJ 1998, 316:520-523. PubMed Abstract | Publisher Full Text
39. Cornwell J: Hard Earned Lives. London: Tavistock; 1984.
40. Calnan M: Health and Illness: the lay perspective.
Tavistock 1987.
41. Richards H, Reid M, Watt C: Socioeconomic variations in responses to chest pain: qualitative study.
BMJ 2002, 324:1308-1310. PubMed Abstract | Publisher Full Text | PubMed Central Full Text
42. Gardner K, Chapple A: Barriers to referral in patients with angina: qualitative study.
BMJ 1999, 319:418-421. PubMed Abstract | Publisher Full Text | PubMed Central Full Text
43. Hunt K, Emslie C, Watt G: Lay constructions of a family history of heart disease: potential for misunderstandings in the clinical encounter?
Lancet 2001, 357:1168-1171. PubMed Abstract | Publisher Full Text
44. Tod A, Read C, Lacey A, Abbott J: Barriers to uptake of services for coronary heart disease: qualitative study.
BMJ 2001, 323:214-217. PubMed Abstract | Publisher Full Text | PubMed Central Full Text
45. Anderson E, Petersen S, Wailoo M: Health concerns and needs of traveller families.
Health Visitor 1997, 70:148-150.
46. House of Commons Health Committee: Inequalities in access to maternity services. Eighth report of session 2002–2003. London: Stationery Office; 2003.
47. Field K, Briggs D: Socio-economic and locational determinants of accessibility and utilization of primary health-care.
Health Soc Care Community 2001, 9:294-308. PubMed Abstract | Publisher Full Text
48. Shipman C, Payne F, Dale J, Jessopp L: Patient-perceived benefits of and barriers to using out-of-hours primary care centres.
Fam Pract 2001, 18:149-155. PubMed Abstract | Publisher Full Text
49. Goddard M, Smith P: Equity of access to health care. York: University of York; 1998.
50. George A, Rubin G: Non-attendance in general practice: A systematic review and its implications for access to primary health care.
Fam Pract 2003, 20:178-184. PubMed Abstract | Publisher Full Text
51. McClure R, Newell S, Edwards S: Patient characteristics affecting attendance at general outpatient clinics.
Arch Dis Child 1996, 74:121-125. PubMed Abstract
52. Macleod U, Ross S, Twelves C, George W, Gillis C, Watt G: Primary and secondary care management of women with early breast cancer from affluent and deprived areas: retrospective review of hospital and general practice records.
BMJ 2000, 320:1442-1445. PubMed Abstract | Publisher Full Text | PubMed Central Full Text
53. Sharp D, Hamilton W: Non-attendance at general practices and outpatient clinics.
BMJ 2002, 323:1081-1082. Publisher Full Text
54. van Cleemput P: Health care needs of travellers.
Arch Dis Child 2000, 82:32-37. PubMed Abstract | Publisher Full Text
55. Rogers A, Hassell K, Nicolas G: Demanding patients? Analysing the use of primary care. Buckingham: Open University Press; 1999.
56. Sword W: A socio-ecological approach to understanding barriers to prenatal care for women of low income.
J Adv Nurs 1999, 29:1170-1177. PubMed Abstract | Publisher Full Text
57. Dixon A, Le Grand J, Henderson J, Murray R, Poteliakhoff E: Is the NHS equitable? A review of the evidence. London.
LSE Health and Social Care 2003.
58. Cooper L, Roter D: Patient-provider communication: the effect of race and ethnicity on process and outcomes of healthcare. In Unequal treatment: confronting racial and ethnic disparities in health care. Edited by Smedley BD, Stith AY, Nelson AR. Washington DC: National Academies Press; 2003.
59. Somerset M, Faulkner A, Shaw A, Dunn L, Sharp D: Obstacles on the path to a primary-care led National Health Service: complexities of outpatient care.
Soc Sci Med 1999, 48:213-225. PubMed Abstract | Publisher Full Text
60. May C, Allison G, Chapple A, Chew-Graham C, Dixon C, Gask L, Graham R, Rogers A, Roland M: Framing the doctor-patient relationship in chronic illness: a comparative study of general practitioners' accounts.
Sociol Health Illn 2004, 26:135-158. PubMed Abstract | Publisher Full Text
61. Hughes D, Griffiths L: Ruling in and Ruling out: two approaches to the micro-rationing of health care.
Soc Sci Med 1997, 44:589-599. PubMed Abstract | Publisher Full Text
62. Dodier N, Camus A: Openness and specialisation: dealing with patients in a hospital emergency service.
Sociol Health Illn 1998, 20:413-444. Publisher Full Text
63. Fuat A, Hungin A, Murphy J: Barriers to accurate diagnosis and effective management of heart failure in primary care: qualitative study.
BMJ 2003, 326:196-200. PubMed Abstract | Publisher Full Text | PubMed Central Full Text
64. Britten N, Stevenson F, Gafaranga J, Barry C, Bradley C: The expression of aversion to medicines in general practice consultations.
Soc Sci Med 2004, 59:1495-1503. PubMed Abstract | Publisher Full Text
65. Scahfheutle E, Hassell K, Noyce P, Weiss M: Access to medicines: cost as an influence on the views and behaviour of patients.
Health Soc Care Community 2002, 10:187-195. PubMed Abstract | Publisher Full Text
66. Sheldon TA: Making evidence synthesis more useful for management and policy-making.
J Health Serv Res Policy 2005, 10(Suppl 1):1-5. PubMed Abstract | Publisher Full Text
67. Dixon-Woods M, Fitzpatrick R, Roberts K: Including qualitative research in systematic reviews: problems and opportunities.
J Eval Clin Pract 2001, 7:125-133. PubMed Abstract | Publisher Full Text
68. Pawson R, Greenhalgh T, Harvey G, Walshe K: Realist review-a new method of systematic review designed for complex policy interventions.
J Health Serv Res Policy 2005, 10(Suppl 1):21-34. PubMed Abstract | Publisher Full Text
Pre-publication history
The pre-publication history for this paper can be accessed here:
http://www.biomedcentral.com/1471-2288/6/35/prepub
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:38:10.000Z
|
jyaj5sqplu47esdhxtcao6krqn2lzfpt
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:60987",
"uncompressed_offset": 402678939,
"url": "www.crummy.com/2006/7/12/1",
"warc_date": "2013-11-22T14:33:36.000Z",
"warc_filename": "<urn:uuid:3942ac6a-f443-4707-8ba8-894b75c6cf35>",
"warc_url": "http://www.crummy.com/2006/7/12/1"
}
|
cccc_CC-MAIN-2013-20
|
< wadl.rb
Trivia >
(3) IF Score System Design, Plus, a Writer's Plea: The above-any-adequate-alliteration-allowance 'First-Timer Foibles' guide to writing IF got passed around a lot among my friends, so I want to talk about that a little bit. This is mostly based on email conversation with Adam Parrish, who I just realized has the awesome job of studying interesting things like IF. I knew about his job, but not that when we talk about this over email I'm slacking off and he's working. Actually now I might be just making stuff up.
First a note about pages like that, which as a good IF writer but a middling static fiction writer, I find kind of frustrating. The page is oriented towards beginning writers. Like most web pages that allege to help you be a writer, it's heavy on "don't misspell words" and less heavy on "don't have a hackneyed plot" and "don't create puzzles that make no freaking sense" and things I don't know or can't articulate. Such pages turn bad writers into readable bad writers, but won't get anyone's work up to really good quality. As I've found out the hard way, good ideas and a good grasp of English don't automatically translate into readable stories. There are additional skills.
These pages chop the head off of a Sturgeon's Power Law that says the vast majority of bad writing is bad for obvious reasons (scroll down to the handy "context of rejection"). With static fiction I can routinely hit the midway point on this particular ring-the-bell carnival game, but I haven't found many good resources for getting higher. I have found one extremely useful page, but the higher-level craft seems to be something you have to learn one-on-one with someone who already knows, or something subjective you learn with practice. Or something that no one has written about because existing documents are enough to get the unintersting people out of your hair.
The problems in the first-timer list are divided into problems of fiction and problems of game design. I'm not going to discuss the problems of fiction because I don't find them very interesting. I can, however, tackle the problems of game design because much less work has been done exploring elementary problems in game design. Because this entry is already huge I'm going to cover one item at a time, over a period of several centuries.
Item 1: bad point systems. There are actually two possible problems here. The first is a poorly-scaled point system where you get 100 points for finding a key. The second is an overgenerous point system where you get 5 points for getting out of bed.
If a piece of IF has a scoring system, it imposes a limit on the score. I don't know of any counterexamples. In general, your score goes up when you do a one-time action that progresses you toward the conclusion of the plot. Your score at any given time is a measure of your progress (Zork III is a notable, and obnoxious, exception).
But if a video game has a scoring system, it imposes no limit on the score (except any imposed by the hardware). Again, I don't know of any counterexamples, though I can conceive of games where your score is represented as a percentage. The score of a video game has nothing to do with the game per se: your advancement towards the end of the game is measured by things like stage numbers. It's just a way of keeping... score. I think this problem is caused by treating a piece of IF like a video game.
It's fine to give the player 100 points for finding a key in a video game, but ridiculous to do the same thing in a piece of IF. This is because people don't handle big numbers well. If your maximum score in an IF game is a big number, it's difficult to tell how close you are to the maximum, and how much 100 points really contributes towards the maximum. A big inscrutable number is cool when you're claiming to be an awesome dude, but it's not as cool when everyone who completes the game gets approximately that same score.
By the same token, you shouldn't give out points for actions that don't advance the plot or don't involve any cleverness. If you do, the score will cease to have meaning as a way of measuring the state of the plot and your cleverness so far.
Filed under: ,
Comments:
Posted by Zack at Wed Jul 12 2006 23:28
You might try the forums at absolutewrite.com? It's not a single coherent essay, but the archived threads as a whole have an awful lot of Craft-of-Writing in 'em...
Posted by Leonard at Wed Jul 12 2006 23:40
From that description I'd say Metroid: Prime and Doom have kind of an IF-style scoring system.
[Main]
Unless otherwise noted, all content licensed by Leonard Richardson
under a Creative Commons License.
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:47:37.000Z
|
hpd4q4ygpzwn3vprsbknvy4ile6ausq5
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:60989",
"uncompressed_offset": 417833580,
"url": "www.diagnosticpathology.org/content/5/1/43/comments",
"warc_date": "2013-11-22T14:33:36.000Z",
"warc_filename": "<urn:uuid:3942ac6a-f443-4707-8ba8-894b75c6cf35>",
"warc_url": "http://www.diagnosticpathology.org/content/5/1/43/comments"
}
|
cccc_CC-MAIN-2013-20
|
Case Report
Superior vena cava syndrome in a patient with previous cardiac surgery: what else should we suspect?
Panagiotis Dedeilias, Ioannis Nenekidis, Panagiotis Hountis, Christos Prokakis, Paraskevi Dolou, Efstratios Apostolakis and Efstratios N Koletsis*
Diagnostic Pathology 2010, 5:43 doi:10.1186/1746-1596-5-43
No comments have yet been made on this article.
Post a comment
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T10:00:44.000Z
|
hvdgnhysm46s5mnhbq5nqcwtk2qa3t2o
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:60993",
"uncompressed_offset": 465394558,
"url": "www.forensicswiki.org/w/index.php?oldid=12782&title=Apple_Safari",
"warc_date": "2013-11-22T14:33:36.000Z",
"warc_filename": "<urn:uuid:3942ac6a-f443-4707-8ba8-894b75c6cf35>",
"warc_url": "http://www.forensicswiki.org/w/index.php?title=Apple_Safari&oldid=12782"
}
|
cccc_CC-MAIN-2013-20
|
Apple Safari
From Forensics Wiki
Jump to: navigation, search
The revision #12782 of the page named "Apple Safari" does not exist.
This is usually caused by following an outdated history link to a page that has been deleted. Details can be found in the deletion log.
Personal tools
Namespaces
Variants
Actions
Navigation:
About forensicswiki.org:
Toolbox
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:20:55.000Z
|
sx7ihukl6byagzf2inciawle2digargt
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:60994",
"uncompressed_offset": 465406394,
"url": "www.forensicswiki.org/wiki/Libregf",
"warc_date": "2013-11-22T14:33:36.000Z",
"warc_filename": "<urn:uuid:3942ac6a-f443-4707-8ba8-894b75c6cf35>",
"warc_url": "http://www.forensicswiki.org/wiki/Libregf"
}
|
cccc_CC-MAIN-2013-20
|
Libregf
From Forensics Wiki
Jump to: navigation, search
libregf
Maintainer: Joachim Metz
OS: Linux, FreeBSD, NetBSD, OpenBSD, Mac OS X, Windows
Genre: Analysis
License: LGPL
Website: libregf.sourceforge.net
The libregf package contains a library and applications to read the Windows NT Registry File (REGF) format.
Contents
Tools
The libregf package contains the following tools:
• regfinfo, which shows information about REGF files.
• regfmount, which mounts the keys and values in a REGF file as directories and files.
History
Libregf was created by Joachim Metz in 2009, while working for Hoffmann Investigations.
Also See
External Links
Personal tools
Namespaces
Variants
Actions
Navigation:
About forensicswiki.org:
Toolbox
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:28:41.000Z
|
6x7th42fsoczao77qxcl3iltkejgbgkf
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:60999",
"uncompressed_offset": 472841150,
"url": "www.ga.gov.au/about-us/news-media/media/releases/2003/31102003_ghostly_skies.jsp",
"warc_date": "2013-11-22T14:33:36.000Z",
"warc_filename": "<urn:uuid:3942ac6a-f443-4707-8ba8-894b75c6cf35>",
"warc_url": "http://www.ga.gov.au/about-us/news-media/media/releases/2003/31102003_ghostly_skies.jsp"
}
|
cccc_CC-MAIN-2013-20
|
Media Release
Sort by Date
Ghostly skies on the horizon
For immediate release, Friday 31 October 2003
Intense solar activity this week has sent the gaze of southern Australians to the skies, in the hope of catching a glimpse of an auroral show. These ghostly lights produce some of the most spectacular displays of nature. Real-time measurements of the geomagnetic field available on the Geoscience Australia web site can indicate the best times for aurora spotting.
In the past, auroras have been seen in southern areas of Australia, and as far north as southern Queensland, but the conditions need to be right. Rapid changes in the Earth's magnetic field indicate the onset of a magnetic storm and that within hours there may be an aurora.
"In Canberra, people need to look to the south, you need cloud free skies and a dark horizon as the aurora will appear quite low in the sky as a diffuse red glow", says Geoscience Australia geophysicist, Andrew Lewis.
"The aurora may build up gradually, and may only last for 10 to 15 minutes, and perhaps only occur once during the night.
During periods of intense solar activity, charged particles can interfere with the earth's magnetic field, causing damage and disturbance to radio and satellite communications, radar, global positioning system (GPS), spacecraft, powerlines and pipelines.
To monitor and help reduce the potential hazardous effects of magnetic storms, Geoscience Australia maintains a national network of geomagnetic observatories, which are part of a global network that records variations in the earth's magnetic field. These are located within Australia at Alice Springs, Canberra, Charters Towers, Gnangara, Kakadu and Learmonth. There are also three Geoscience Australia observatories in the Antarctic region at Mawson, Casey and Macquarie Island.
During the recent magnetic activity over the last few days the most rapid magnetic variations recorded by the GA observatory network have been at Macquarie Island, where during a half hour period the compass swung through 13 degrees.
The data collected from these observatories is critical to monitor geomagnetic storms. The information is also used for a number of other applications.
"The public can access real-time information on the Earth's magnetic field on the Geoscience Australia web site. The magnetic field is constantly changing, but during a magnetic storm, it is highly erratic and there will be a good chance of seeing an aurora in clear night skies at that time."
www.ga.gov.au
For more information or to arrange an interview, please call the
Media Hotline 1800 882 035 (24 hour)
Unless otherwise noted, all Geoscience Australia material on this website is licensed under the Creative Commons Attribution 3.0 Australia Licence.
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:47:05.000Z
|
jbaslrtc3uhnpdmt2oigcgc2l5obk724
|
{
"content_type": "application/xhtml+xml",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:61003",
"uncompressed_offset": 502827404,
"url": "www.hindawi.com/journals/aop/2012/798521/",
"warc_date": "2013-11-22T14:33:36.000Z",
"warc_filename": "<urn:uuid:3942ac6a-f443-4707-8ba8-894b75c6cf35>",
"warc_url": "http://www.hindawi.com/journals/aop/2012/798521/"
}
|
cccc_CC-MAIN-2013-20
|
About this Journal Submit a Manuscript Table of Contents
Advances in Orthopedics
Volume 2012 (2012), Article ID 798521, 6 pages
doi:10.1155/2012/798521
Research Article
Comparison of the Tendon Damage Caused by Four Different Anchor Systems Used in Transtendon Rotator Cuff Repair
1Department of Structural and Cellular Biology, and Tulane Cancer Center, LCRC, Tulane Center for Aging, Tulane Center for Stem Cell Research and Regenerative Medicine, Tulane University School of Medicine, New Orleans, LA 70112, USA
2Department of Orthopaedic Surgery and Tulane Institute of Sports Medicine, Tulane University School of Medicine, New Orleans, LA 70112, USA
3Department of Orthopaedic Surgery, Pu Ai Hospital of Tongji Medical College, Huazhong University of Science and Technology, Wuhan 430033, China
Received 12 December 2011; Revised 15 April 2012; Accepted 1 May 2012
Academic Editor: Virak Tan
Copyright © 2012 Qing-Song Zhang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Abstract
Objectives. The objective of this study was to compare the damage to the rotator cuff tendons caused by four different anchor systems. Methods. 20 cadaveric human shoulder joints were used for transtendon insertion of four anchor systems. The Healix Peek, Fastin RC, Bio-Corkscrew Suture, and Healix Transtend anchors were inserted through the tendons using standard transtendon procedures. The areas of tendon damage were measured. Results. The areas of tendon damage (mean standard deviation, ) were 29.1 4.3 mm2 for the Healix Peek anchor, 20.4 2.3 mm2 for the Fastin RC anchor, 23.4 1.2 mm2 for the Bio-Corkscrew Suture anchor, 13.7 3.2 mm2 for the Healix Transtend anchor inserted directly, and 9.1 2.1 mm2 for the Healix Transtend anchor inserted through the Percannula system ( or , compared to other anchors). Conclusions. In a cadaver transtendon rotator cuff repair model, smaller anchors caused less damage to the tendon tissues. The Healix Transtend implant system caused the least damage to the tendon tissues. Our findings suggest that smaller anchors should be considered when performing transtendon procedures to repair partial rotator cuff tears.
1. Introduction
The rotator cuff of the shoulder joint is made up of four muscles (the supraspinatus, infraspinatus, subscapularis, and teres minor) and their tendons. Its function is to lift and rotate the arm and to stabilize the humeral head against the glenoid. Partial-thickness rotator cuff tears (PRCTs) are a common component of rotator cuff disease, bridging the gap from tendinitis to frank tendon disruption. PRCT has been divided into three types based on its location, including bursal surface, articular surface, and intratendinous tears [1, 2]. Histological studies have shown that anatomical differences make the articular portion of the rotator cuff tendons more vulnerable to tension [35]. Snyder and colleagues used the term PASTA to represent partial articular supraspinatus tendon avulsion [6, 7]. PASTA has a high likelihood of progression to complete tears in patients who are not repaired timely, leading to consistent pain and disability of the shoulder [6, 7].
Arthroscopic surgery is indicated in the patients whose PRCT has failed conservative treatments [8]. Two common surgical treatments include debridement of the tear with or without acromioplasty, or converting the PRCT into a complete tear and then repairing the tendon onto the humeral footprint. The disadvantage of this second treatment option is that the intact portion of the tendon is cut, and it may potentially create a length-tension mismatch in the repaired rotator cuff [9, 10]. In order to preserve the intact portion of the tendon, the transtendon repair technique has been developed [10]. In the transtendon procedure, a small perforation is made either with a self-tapping anchor (and then the anchor is inserted into the underlying bone), or with an awl/tap instrument followed by anchor insertion through the tendon and into the underlying bone. The suture attached to the anchor is used to repair the torn portion of the tendon. It has been reported that PASTA lesions greater than 50% of the width of the rotator cuff tendon are best managed with surgical repair [1113]. Currently, transtendon repair has become more and more popular, because this technique allows the surgeon to selectively repair the torn portion of the tendon while minimizing any length-tension mismatch of the repaired rotator cuff muscles [1417]. The disadvantage of the transtendon procedure is that the tendon at the perforated site is damaged. Lyons et al. reported an alternative method to repair PASTA, in which the tear was closed by a side-to-side suture of the supraspinatus tendon to subscapularis tendon, thus placing the debrided tendon against the bony footprint without an anchor [18]. However, most surgeons prefer repairing the tendon to bone by suture anchors, in order to obtain an anatomical restoration of the rotator cuff [10].
The adverse effects of the tendon damage with a transtendon repair on the healing and mechanical strength of the repaired tendon are unclear. However, it is reasonable to believe that less damage to the tendon causes less adverse effects. Our hypothesis is that anchors with a smaller diameter may cause less damage to the tendon. The purpose of this study was to compare the tendon damage caused by four different anchor systems, in order to guide our choice of anchor systems in the transtendon procedure.
2. Methods
2.1. Source of Specimens and Anchors
This study was performed on cadaveric shoulder joints. Twenty unembalmed human shoulder specimens were obtained from donors through the Bureau of Anatomical Services, Louisiana State Department of Health and Hospitals. The donor ages were from 54 to 88 (average 75.9) years old. The use of these deidentified specimens was determined as “not human subjects study” by the Tulane University Institutional Review Board (Project no. 206610-1). The specimens were stored at −20°C and thawed at room temperature prior to use. Three anchor systems were manufactured by Depuy Mitek, Inc. (Raynham, MA), including the Healix Peek anchor (5.5 mm in diameter), Fastin RC anchor (5.0 mm in diameter), and the Healix Transtend implant system which consists of a Healix Transtend Peek anchor (3.4 mm in diameter) and the Percannula system (a percutaneous cannula with a 4.0 mm diameter). The Bio-Corkscrew Suture anchor (5.0 mm in diameter) was manufactured by Arthrex, Inc. (Naples, FL).
2.2. Transtendon Surgical Procedure
Each specimen was mounted on a custom apparatus. The supraspinatus and infraspinatus tendons of each specimen were exposed after dissecting the skin and subcutaneous tissue and retraction of the deltoid muscle (Figure 1). The rotator cuff footprint on the proximal humerus was identified. Next, an awl or tap was used to perforate the tendon and the underlying bone for the Healix Peek anchor, the Bio-Corkscrew Suture anchor, and the Healix Transtend anchor insertions. Since the Fastin RC anchor is a self-tapping anchor, no awl or tap is required to prepare a hole in the bone. The next step was to insert the anchors. The anchors were inserted into the footprint area at a 45° angle (dead man’s angle) to the direction of contractile force of the rotator cuff muscles, in order to mimic the clinical practice. Then, a second anchor was similarly inserted at a distance of ≥5 mm to the first anchor. In order to compare the tendon damages side by side, the 4 anchors were inserted into the same joint in two specimens (Figure 1). In the remaining specimens, two anchors were inserted. The Healix Peek, Fastin RC, and Bio-Corkscrew Suture anchors were inserted directly through the tendons into the underlying rotator cuff footprint (not through a transtendon cannula, as there are no cannula components in these anchor implant systems). The Healix Transtend implant system includes a percutaneous cannula (the Percannula system, 4.0 mm in diameter), thus the Healix Transtend anchor was inserted either without any cannula (in order to compare it with other anchors under similar insertion conditions) or through the Percannula system (in order to mimic its clinical usage). The procedure to insert the Percannula system followed the manufacturer’s instructions. The cannula was first positioned onto the footprint. Then, the awl/tap was inserted through the cannula and was used to create the bone hole. Next, the awl/tap was removed and the anchor was inserted through the cannula and into the bone. Black pen oil was painted on the outer surfaces of anchors or cannulae, so as to provide a contrast color for taking photographs of the tendon damage.
Figure 1: Transtendon insertion of the anchors. The supraspinatus and infraspinatus tendons were exposed by a superior-lateral approach, after dissecting the skin and subcutaneous tissue and retraction of the anterior portion and middle portion of the deltoid muscle. Four anchors were inserted into the humeral footprint, including the Healix Peek (A), Fastin RC (B), Bio-Corkscrew Suture anchor (C), and Healix Transtend (D).
2.3. Measurement of Tendon Damage
After removing the sutures from the anchors (of note, the sutures were not tied because the purpose was to compare tendon damage caused by anchors), the tendon damage was clearly marked by the black pen oil. Photographs of the tendon damage were taken together with a ruler as a standard of size and transformed into tagged image file format (TIFF) files to fit the computer software used for image analysis. The areas of tendon damage on the photographs were traced along the margin of the black marks and then measured automatically by computer software (Quantity One version 4.6.5, Bio-Rad Laboratories, Hercules, CA). The measured areas were calibrated by the ruler included in each photograph.
2.4. Visualization of Microscopic Tendon Damage
The impacted tendons were embedded in the optimal cutting temperature (OCT) compound and cut into 200 μm thick frozen sections. The sections were scanned with a confocal microscope (Leica TCS SP2, Leica Microsystems, Exton, PA). Ten optical sections were scanned per tendon sample with a magnification of 100x. Each section was 5 μm apart starting approximately 50 μm away from the cutting surface, in order to avoid the sectioning artifacts. The ten optical sections were stacked into one picture.
2.5. Statistical Analysis
The areas of tendon damage were presented as the mean and standard deviation of 7 anchors per each type of anchor system and were analyzed with two tailed Student’s -test. The level of significance was set at .
3. Results
We found that all of the four types of anchors (Figure 2(a)) made a hole-like area of damage when they were inserted through the tendon (Figures 2(b) and 2(c)). As shown in Table 1 and Figure 3, the areas of tendon damage (mean ± standard deviation, ) were mm2 for the Healix Peek anchor, mm2 for the Fastin RC anchor, mm2 for the Bio-Corkscrew Suture anchor, mm2 for the Healix Transtend anchor inserted through the Percannula system, and mm2 for the Healix Transtend anchor inserted without any cannula. The differences of the areas were statistically significant between any two types of anchors ( or 0.001) (Table 1). The area of tendon damage caused by the Healix Transtend anchor (i.e., when it was inserted without the cannula) was significantly larger than that caused by the Percannula system (i.e., when the anchor was inserted within the cannula) ().
Table 1: Areas of tendon damage caused by anchors.
Figure 2: Photographs of anchors and the tendon damages caused by the anchors. (a) Photographs of four types of anchors studied, that is, the Healix Peek, Fastin RC, Bio-Corkscrew Suture, and Healix Transtend (with the Percannula system) anchors. (b) Photographs of tendon damage caused by the four types of anchors. All anchors were inserted through the supraspinatus and infraspinatus tendons without any cannula. (c) Photographs of tendon damage caused by the four types of anchors. The Healix Peek, Fastin RC, and Bio-Corkscrew Suture anchors were inserted through the supraspinatus and infraspinatus tendons without any cannula. The Healix Transtend anchor was inserted through the Percannula system, thus the hole in the tendon was caused by the cannula. The unit of the rulers was cm.
Figure 3: The areas of tendon damage caused by the anchors. A. The Healix Peek anchor; B. The Fastin RC anchor; C. The Bio-Corkscrew Suture anchor; D. The Healix Transtend anchor inserted through the Percannula system; and E. The Healix Transtend anchor inserted without any cannula.
The impacted tendon tissues were sampled as shown in Figure 4(a) for examination of microscopic structures. Under the microscope, the tendons showed signs of fragmentation of tendon fibers when they were impacted by the Healix Peek, Fastin RC, and Bio-Corkscrew Suture anchors (Figure 4(b) to 4(d)). In contrast, the tendons that were impacted by the Percannula system of the Healix Transtend implant system showed signs of slight compression with no fragmentation of the tendon fibers (Figure 4(e)). Without the use of the cannula, the Healix Transtend anchor also fragmented the tendon fibers at the edge of the impacted tendon (Figure 4(f)).
Figure 4: Microscopic structures of the damaged tendon tissues. (a) The rectangular area illustrated where the tendon tissues were sampled for frozen sectioning and confocal microscopy. (b) to (f) Representative microscopic structures of the tendons damaged by the Healix Peek anchor (b), the Fastin RC anchor (c), the Bio-Corkscrew Suture anchor (d), the Healix Transtend anchor inserted through the Percannula system (e), and the Healix Transtend anchor inserted without any cannula (f). Orientation of the photographs: top, edge of the damaged tendon (arrows); bottom, toward the normal part of the tendon. The green fluorescence was the autofluorescence of the tendon fibers. Original magnification, 100x.
4. Discussion
The present study found that the anchor with the largest diameter (i.e., the Healix Peek anchor, 5.5 mm in diameter) made the biggest area of tendon damage (29.1 mm2) and the anchor with the smallest diameter (i.e., the Healix Transtend anchor, 3.4 mm in diameter) produced the smallest area of tendon damage (13.7 mm2) under similar insertion conditions. The Fastin RC and Bio-Corkscrew Suture anchors with the intermediate diameter (5.0 mm) caused intermediate tendon damage (i.e., 20.4 mm2 and 23.4 mm2, resp.). These findings support our hypothesis that the anchor with a smaller diameter may cause less damage to the tendon, which is logical and predictable. Surprisingly, both the Fastin RC anchor and Bio-Corkscrew Suture anchor have a diameter of 5.0 mm, yet the area of tendon damage caused by the Fastin RC was significantly smaller than the area of tendon damage caused by the Bio-Corkscrew Suture anchor (). We speculate that the difference may be due to the different material and shape of the anchor. The Fastin RC anchor is made of titanium alloy, whereas the Bio-Corkscrew Suture anchor is made of bioabsorbable poly-L/D-lactide copolymer. It is possible that the metal material has less friction than the polymer, hence the tendon tissue is more likely to be pushed outward by the metal anchor, rather than being trapped and crushed under the threads. The threads of the Fastin RC anchor are thinner and face more downward than the Bio-Corkscrew Suture anchor, thus making the Fastin RC anchor, at least the anchor’s core cylinder, appear smaller than the Bio-Corkscrew Suture anchor (Figure 2(a)). Also surprising, although the 4.0 mm diameter of the Percannula system is larger than the 3.4 mm diameter of the Healix Transtend anchor, the area of tendon damage (9.1 mm2) caused by the Percannula system was significantly smaller than that caused by the anchor (13.7 mm2) (). We suspect that, because the metal cannula has a smooth surface and tapered tip (of note, the tip is solid when the system’s obturator is placed inside the cannula), the tendon tissue was pushed outward when the cannula was inserted, rather than being screwed and crushed by the anchor that is made of polyetherether ketone material and with threads. When the cannula was removed, the tendon tissues partially rebounded, thus leaving a hole that was smaller than the cannula’s diameter. We predict that, in clinical practice, the live tendon tissues may have much better flexibility than the cadaveric tendon tissues, so that the tendon tissue may rebound more and leave a much smaller hole. This interpretation is supported by our microscopic findings that all of the anchors fragmented the tendon fibers (Figure 4(b), 4(c), 4(d), and 4(f)). The signs of fragmented fibers in addition to lack of fibers in the holes suggest that the tendon fibers are likely transected by the anchors, at least in the center of tendon damage. In contrast, the Healix Transtend implant system (Healix Transtend anchor inserted through the Percannula system) did not fragment the tendon fibers (Figure 4(e)). Instead, the cannula-impacted tendon fibers showed signs of compression (Figure 4(e)). Since the cannula appears to reduce the tendon damage (see Table 1, comparing the Healix Transtend anchor with or without the cannula), it is reasonable to speculate that the mechanical crushing injury to the tendon may be mitigated by using an #11 blade scalpel to cut a small incision in the tendon prior to insertion of the anchors.
We have provided evidence showing smaller anchors cause less damage. One logical question to ask is whether the smaller anchors provide adequate fixation strength. Data released by DePuy Mitek showed that the average load to failure is 67 pounds (298 Newtons) for the 5.5 mm Healix Peek anchor, 51 pounds (227 Newtons) for the 5.5 mm Bio-Corkscrew FT anchor, and 49.6 pounds (221 Newtons) for the 3.4 mm Healix Transtend Peek anchor. Thus, the small anchor only has slightly less fixation strength compared to the large anchors. It is worth pointing out that the Healix Transtend Peek anchor is recommended to use in duplex. Under such circumstances, the combined area of tendon damage caused by two Healix Transtend anchors (inserted with the Percannula system) is still smaller than any of the large anchors used singly.
The limitation of this study was the usage of cadaveric specimens. The cadaveric tendon tissues may have less flexibility than live tendons in human patients. Therefore, the damage caused by the anchors could be greater than in live tendons due to their limited flexibility. The second limitation was that we did open surgery while the anchors are mainly made for arthroscopic surgery. We believe that open surgery simplified our procedure and avoided some confounding factors, such as false passes and incorrect locations that might be caused by the complexity of the arthroscopic surgery. In addition, because we need to use oil marks to show the tendon damage for accurate measurement, passing anchors through skin and muscles in an arthroscopic surgery would remove our marks. Therefore, we believe that open surgery is appropriate for the purpose of this study. The third limitation is that, by using cadaveric specimens, it is not possible to evaluate the effects of the size of the tendon damage on tendon healing. It is possible that the damaged tendon could be repaired after the surgery, regardless of the size of the damage. As a general principle, less damage is preferred in surgery. Thus, animal study is warranted to compare the different anchors used in transtendon repair.
5. Conclusion
In a cadaver transtendon rotator cuff repair model, smaller anchors caused less damage to the tendon tissues. The Healix Transtend implant system (consisting of the Healix Transtend anchor and the Percannula system) among the anchors tested caused the least damage to the tendon tissues. Our findings suggest that smaller anchors should be considered when performing transtendon procedures to repair partial rotator cuff tears.
Conflict of Interests
The authors have no direct financial relations with the commercial identities mentioned in this report and declare no conflicts of interests.
Acknowledgments
The authors thank Edward B. Leonard, Rita Richardson, and Donna M. Watkins (Department of Orthopaedic Surgery, Tulane University) for their laboratory assistance. This work was supported by a research grant from DePuy Mitek, Inc. (Grant no. 549342). Z. You was partially supported by National Institutes of Health’s Centers of Biomedical Research Excellence (COBRE) grant (Grant no. 2P20RR020152-06) and Department of Defense (Grant no. W81XWH-10-1-0937).
References
1. H. Fukuda, “The management of partial-thickness tears of the rotator cuff,” Journal of Bone and Joint Surgery—Series B, vol. 85, pp. 3–11, 2003.
2. H. Ellman, “Diagnosis and treatment of incomplete rotator cuff tears,” Clinical Orthopaedics and Related Research, no. 254, pp. 64–74, 1990. View at Scopus
3. S. S. Burkhart, J. C. Esch, and R. S. Jolson, “The rotator crescent and rotator cable: an anatomic description of the shoulder's ‘suspension bridge’,” Arthroscopy, vol. 9, no. 6, pp. 611–616, 1993. View at Publisher · View at Google Scholar · View at Scopus
4. A. M. Halder, S. W. O'Driscoll, G. Heers et al., “Biomechanical comparison of effects of supraspinatus tendon detachments, tendon defects, and muscle retractions,” Journal of Bone and Joint Surgery—Series A, vol. 84, no. 5, pp. 780–785, 2002. View at Scopus
5. J. F. Lohr and H. K. Uhthoff, “The microvascular pattern of the supraspinatus tendon,” Clinical Orthopaedics and Related Research, no. 254, pp. 35–38, 1990. View at Scopus
6. E. S. Millstein and S. J. Snyder, “Arthroscopic management of partial, full-thickness, and complex rotator cuff tears: indications, techniques, and complications,” Arthroscopy, vol. 19, no. 10, supplement 1, pp. 189–199, 2003. View at Publisher · View at Google Scholar · View at Scopus
7. S. J. Snyder, A. F. Pachelli, W. Del Pizzo, M. J. Friedman, R. D. Ferkel, and G. Pattee, “Partial thickness rotator cuff tears: results of arthroscopic treatment,” Arthroscopy, vol. 7, no. 1, pp. 1–7, 1991. View at Publisher · View at Google Scholar · View at Scopus
8. S. A. Wright and R. H. Cofield, “Management of partial-thickness rotator cuff tears,” Journal of Shoulder and Elbow Surgery, vol. 5, no. 6, pp. 458–466, 1996. View at Scopus
9. S. S. Burkhart, “The principle of margin convergence in rotator cuff repair as a means of strain reduction at the tear margin,” Annals of Biomedical Engineering, vol. 32, no. 1, pp. 166–170, 2004. View at Publisher · View at Google Scholar · View at Scopus
10. I. K. Y. Lo and S. S. Burkhart, “Transtendon arthroscopic repair of partial-thickness, articular surface tears of the rotator cuff,” Arthroscopy, vol. 20, no. 2, pp. 214–220, 2004. View at Publisher · View at Google Scholar · View at Scopus
11. F. A. Cordasco, M. Backer, E. V. Craig, D. Klein, and R. F. Warren, “The partial-thickness rotator cuff tear: is acromioplasty without repair sufficient?” American Journal of Sports Medicine, vol. 30, no. 2, pp. 257–260, 2002. View at Scopus
12. S. L. Miller, Y. Hazrati, R. Cornwall et al., “Failed surgical management of partial thickness rotator cuff tears,” Orthopedics, vol. 25, no. 11, pp. 1255–1258, 2002. View at Scopus
13. S. C. Weber, “Arthroscopic debridement and acromioplasty versus mini-open repair in the treatment of significant partial-thickness rotator cuff tears,” Arthroscopy, vol. 15, no. 2, pp. 126–131, 1999. View at Scopus
14. J. Ide, S. Maeda, and K. Takagi, “Arthroscopic transtendon repair of partial-thickness articular-side tears of the rotator cuff: anatomical clinical study,” American Journal of Sports Medicine, vol. 33, no. 11, pp. 1672–1679, 2005. View at Publisher · View at Google Scholar · View at Scopus
15. K. C. Kim, K. J. Rhee, H. D. Shin, and D. K. Kim, “Arthroscopic transtendon suture-bridge technique for concurrent articular- and bursal-side partial-thickness rotator cuff tears,” Knee Surgery, Sports Traumatology, Arthroscopy, vol. 17, no. 12, pp. 1485–1488, 2009. View at Publisher · View at Google Scholar · View at Scopus
16. M. Tauber, H. Koller, and H. Resch, “Transosseous arthroscopic repair of partial articular-surface supraspinatus tendon tears,” Knee Surgery, Sports Traumatology, Arthroscopy, vol. 16, no. 6, pp. 608–613, 2008. View at Publisher · View at Google Scholar · View at Scopus
17. B. Waibl and E. Buess, “Partial-thickness articular surface supraspinatus tears: a new transtendon suture technique,” Arthroscopy, vol. 21, no. 3, pp. 376–381, 2005. View at Publisher · View at Google Scholar · View at Scopus
18. T. R. Lyons, F. H. Savoie, and L. D. Field, “Arthroscopic repair of partial-thickness tears of the rotator cuff,” Arthroscopy, vol. 17, no. 2, pp. 219–223, 2001. View at Publisher · View at Google Scholar · View at Scopus
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:20:08.000Z
|
5e4ukrrk4awpby2j5nnl7fbwpuqqlzbd
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:61025",
"uncompressed_offset": 631480856,
"url": "www.ohloh.net/p/aceacl/estimated_cost",
"warc_date": "2013-11-22T14:33:36.000Z",
"warc_filename": "<urn:uuid:3942ac6a-f443-4707-8ba8-894b75c6cf35>",
"warc_url": "http://www.ohloh.net/p/aceacl/estimated_cost"
}
|
cccc_CC-MAIN-2013-20
|
Activity Not Available
Estimated Cost
Analyzed 10 months ago based on code collected 10 months ago.
Project Cost Calculator
$ .00
21,445 lines
5 person-years
$ 267,630 *
*Using the Basic COCOMO Model
Estimate seems way too high?
Ohloh scans all files at any given code location to calculate the cost estimate.
Ohloh lets you exclude files and direc-tories from this calculation on the Code Locations page. You can get a more realistic estimate by excluding:
• External dependencies or libraries
• Non-code files
About Cost Estimates
• Software cost estimation is tricky business even when all the variables are known -- knowlegdge which we certainly don't have.
• We calculate the estimated cost of the project using the Basic COCOMO model.
• For those familiar with the details, we are using coeffcients a=2.4 and b=1.05.
• Please note that COCOMO was created to model large institutional projects, which often don't compare well with distributed open-source projects.
• COCOMO is meant to include the design, specification drafting, reviewing and management overhead that goes along with producing quality software.
• This model seems to be most accurate with mature, large projects. Young projects with little activity are typically overvalued.
Copyright © 2013 Black Duck Software, Inc. and its contributors, Some Rights Reserved. Unless otherwise marked, this work is licensed under a Creative Commons Attribution 3.0 Unported License . Ohloh ® and the Ohloh logo are trademarks of Black Duck Software, Inc. in the United States and/or other jurisdictions. All other trademarks are the property of their respective holders.
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:43:06.000Z
|
er6a4ulfltblqjywm6sq7n4akspnks34
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:61033",
"uncompressed_offset": 635199515,
"url": "www.openwetware.org/index.php?diff=prev&oldid=33950&title=BE_Board%3AVisiting_committee",
"warc_date": "2013-11-22T14:33:36.000Z",
"warc_filename": "<urn:uuid:3942ac6a-f443-4707-8ba8-894b75c6cf35>",
"warc_url": "http://www.openwetware.org/index.php?title=BE_Board:Visiting_committee&diff=prev&oldid=33950"
}
|
cccc_CC-MAIN-2013-20
|
BE Board:Visiting committee
From OpenWetWare
(Difference between revisions)
Jump to: navigation, search
m (Advisor Selection Process (Diana))
(Undergraduate Major (Amy))
Line 59: Line 59:
* Ciriculum development
* Ciriculum development
* Senior design course
* Senior design course
-
* Increased number of UROPs looking for experience in BE labs
+
* Increased number of UROPs looking for experience in BE labs (is there any additional funding available to attract them ? )
* Questions to consider:
* Questions to consider:
**How reasonable is/ was your TAing requirement (time commitment, work load)? Should the undergraduate TAing assignments be assigned differently?
**How reasonable is/ was your TAing requirement (time commitment, work load)? Should the undergraduate TAing assignments be assigned differently?
Revision as of 12:20, 18 April 2006
Contents
For current website see begradboard.mit.edu
Student opinion
People
Topic Areas
Add, subtract as you see fit
Curriculum
• Students have suggested a variety of changes to bolster the curriculum.
• In general, students feel the core courses are good preparation for the qualifying exams and provide a good foundation for a PhD, but are divided on the relevance to research.
• Classes some students would like to see: applied statistics, more graduate BE electives, instruction on good paper writing skills, practical biology lab
Advisor Selection Process (Diana)
• First year funding/Timing of joining labs: we understand that a lack of funding is what limits incoming class sizes. Changing the timing may allow greater flexibility, but the majority of students are happy with the current system, with a few at both extremes.
• Rotations: Overwhelmingly against required rotations, although the option would be appreciated by some. IAP would be a possible time for rotations.
• Process: Students would appreciate a list of available faculty (those who have space), but are otherwise happy with the process. Morning preview seminars are especially helpful.
Facilities (Nate & Maxine)
• Space
• BATS and seminar space can be emphasized.
• Proximity?
• Concerns used to revolve around common space - smeinar room, student lounge etc. - We have outgrown our seminar space and the Stata works nicely in the interim, but perhaps the more pressing issue is lack of office space for first and second year students after they have joined labs and lack of bench space for large or rapisly expanding labs.
• Can pressure be put on the MIT admin. to make building 56 and 16 even more homogeneously BE, or does it look like we'll stay scattered in 4or 5 different buildings for a long time to come?
Career Development (Nate, Jordan)
• ISS
• Industry connections - What happens nbow that formal centers like BPEC and BTP are going away?
• Academic Career Workshops - Are students in BE well prepared to interview for top notch faculty positions?
• BE Undergraduate Course Development Opportunities
• Where are current graduates working? (John Kisiday - faculty at Colorado State, Nora Szasz - start-up, Jon Fitzgerald - Merrimack, Jon Szafranski - Guidant, Laurel - industry, Ali K - HST faculty, Jenny Lee - Centacore, Csani Varga - Millenium, Dan Erickson - Sales/Consulting, others?)
• Where are the remaining gaps?
• Are more people going to biotech or pharma in industry? Is BE training better received in one sector versus the other?
• Where are our graduates doing/considering post-docs? Is there a necessity to change fields significantly betond your own interests??
• Is the length of the PhD program deterring some students from toiling away in a post-doc for 2-4 additional years to get a faculty position and scaring them away to industry?
• Do people feel that now that most of the major BME and BE departments around the country have stopped expanding, getting Whitaker funding etc. that it is much harder to get a good faculty position now?
Undergraduate Major (Amy)
• TAing Requirements
• Faculty time split between more responsibilities
• Ciriculum development
• Senior design course
• Increased number of UROPs looking for experience in BE labs (is there any additional funding available to attract them ? )
• Questions to consider:
• How reasonable is/ was your TAing requirement (time commitment, work load)? Should the undergraduate TAing assignments be assigned differently?
• Do you enjoy working with the undergraduates?
• Do the instructors adequately and clearly cover material in class? Do you have to spend a lot of time outside of class explaining and clarifying
concepts?
• Would you like to be more involved in developing the undergraduate classes or have you had the oppurtunity to help develope them?
• What do you think is missing from the undergraduate cirriculum?
• Do you think the undergraduate classes will detract from the graduate experience and how?
• Summarized survey results:
• TAing Experience
• Majoring of students found it valuable(~4)
• Suggestions to avoid increased or unequal responsibilities
• Pay TA’s
• Add graders
• Add undergrads as TA’s
• Formalized guidelined for TAing
• Suggestion – teach graduate students how to teach to better fill the need for the undergrad major
• Students split on TAing two terms (2.64), most people would be willing to TA for additional compensation (3.32)
• Students interested in being associate advisors for undergrads (2.97)
• Positive part of their education (3.21) and want to be involved in learning about what is going on (3.87) and being more involved in the development process (3.76)
• Participation in undergraduate development via:
• A session for all interested parties at the yearly retreat
• Perhaps graduate students could have access to the evaluations of students in the undergraduate courses that they TA. TA's and professors could then discuss potential improvements to the course.
• Having student input for A) which courses should be included, B) which are mandatory, which are elective, and C) the content of certain courses.
• To aid in curriculum development, course plans should be presented to the Division (perhaps in a
seminar-type forum?) to provide the opportunity for members of the BE community to provide initial feedback on the undergraduate curriculum.
Thesis Mentoring (Diana, Danielle)
• Most of the mentoring information focuses on career development and mentoring. Very little information about mentoring during the course of the thesis.
• Thoughts on full vs. joint faculty and their time for students AND knowledge about BE program requirements, etc.
• Formal mentoring for academic writing.
• Other sources for formal mentoring: committee members, older students, recent graduates ?
Faculty Research Directions
Faculty/Student Interactions (Maxine)
• Do the faculty have less time for the graduate students now that the undergraduate major has started?
• Are the faculty generally supportive for all types of career development, or only for academic positions?
ABS/Bioengineering (Paul, Bahar)
General BE Board Activity Updates (Diana, Barry)
• BE Student Directory with possible Alumni Directory extensions?
• BE New Events Fund
• Increasing First-year study breaks
• New BE Diversity Initiatives
Personal tools
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:30:00.000Z
|
6ombm2kadhekvv44xurzhkyjassvvf3h
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:61034",
"uncompressed_offset": 635220044,
"url": "www.openwetware.org/index.php?diff=prev&oldid=630752&title=Image%3ACvmagni.pdf",
"warc_date": "2013-11-22T14:33:36.000Z",
"warc_filename": "<urn:uuid:3942ac6a-f443-4707-8ba8-894b75c6cf35>",
"warc_url": "http://www.openwetware.org/index.php?title=Image:Cvmagni.pdf&diff=prev&oldid=630752"
}
|
cccc_CC-MAIN-2013-20
|
Image:Cvmagni.pdf
From OpenWetWare
(Difference between revisions)
Jump to: navigation, search
Cvmagni.pdf (file size: 43 KB, MIME type: application/pdf)
Current revision
File history
Click on a date/time to view the file as it appeared at that time.
Date/TimeDimensionsUserComment
current06:00, 29 September 2012 (43 KB)Paolo Magni (Talk | contribs)
There are no pages that link to this file.
Personal tools
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T10:04:53.000Z
|
gwzzv263xxlg44kwnvchjrfwkfuccfap
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:61035",
"uncompressed_offset": 635225934,
"url": "www.openwetware.org/index.php?diff=285763&oldid=229537&title=Kafatos%3Acontact",
"warc_date": "2013-11-22T14:33:36.000Z",
"warc_filename": "<urn:uuid:3942ac6a-f443-4707-8ba8-894b75c6cf35>",
"warc_url": "http://www.openwetware.org/index.php?title=Kafatos:contact&diff=285763&oldid=229537"
}
|
cccc_CC-MAIN-2013-20
|
Kafatos:contact
From OpenWetWare
(Difference between revisions)
Jump to: navigation, search
(Administrative)
(Administrative)
Line 9: Line 9:
[[Kafatos:Sultana, Rabeya|Sultana, Rabeya]] (BioMalPar)<br>
[[Kafatos:Sultana, Rabeya|Sultana, Rabeya]] (BioMalPar)<br>
[[Kafatos:Pettera, Isabel|Pettera, Isabel]] (ERC)<br><br>
[[Kafatos:Pettera, Isabel|Pettera, Isabel]] (ERC)<br><br>
+
[[Kafatos:Rankin, Moira|Rankin, Moira]] (PA)
</blockquote>
</blockquote>
|}
|}
Revision as of 09:52, 13 February 2009
Home Lab Members Research Publications Contact
Administrative
Sultana, Rabeya (BioMalPar)
Pettera, Isabel (ERC)
Rankin, Moira (PA)
Mailing Address
Insert Name
Imperial College London
Division of Cell & Molecular Biology
SAF Building
South Kensington Campus
London, SW72AZ
UK
Electronic mail
kafatos-christophides-lab @ imperial.ac.uk
Phone & Fax
Tel : +44 (0) 20 7594 5361 (lab)
Tel : +44 (0) 20 7594 1730 (David)
Tel : +44 (0) 20 7594 1714 (Rabeya)
Fax : +44 (0) 20 7594 1759 (David)
Location on Campus
Our lab is located on the 6th floor of SAF (Sir Alexander Fleming Building).
Public Transit & Maps
Driving & parking is not advisable due to the congestion charge and chronic lack of parking space.
Use the TfL Journey Planner to come to the South Kensington Tube Station. From there, use these maps provided by Imperial College to find out about the location of the Sir Alexander Fleming building where we are located.
Alternatively, you can use Google Maps.
Personal tools
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:28:57.000Z
|
aghatpep3amfz5artt4zns2rur33nbvx
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:61037",
"uncompressed_offset": 640219029,
"url": "www.panarmenian.net/eng/news/101238/",
"warc_date": "2013-11-22T14:33:36.000Z",
"warc_filename": "<urn:uuid:3942ac6a-f443-4707-8ba8-894b75c6cf35>",
"warc_url": "http://www.panarmenian.net/eng/news/101238/"
}
|
cccc_CC-MAIN-2013-20
|
Friends of Syria conference seeks to up pressure on Assad
PanARMENIAN.Net - Western and Arab nations sought to exert more pressure on Syrian President Bashar al-Assad on Sunday, April 1 mistrusting his acceptance of a plan to end a year of bloodshed, but were not expected to arm rebels or fully recognize an opposition council, Reuters reported.
Opening a Friends of Syria conference in Istanbul, Turkish Prime Minister Tayyip Erdogan told foreign ministers and other officials from some 70 countries that the "legitimate demands of the Syrian people must be met, right here, right now".
In her prepared remarks, U.S. Secretary of State Hillary Clinton urged members of Assad's government to halt operations targeting civilians, or face "serious consequences".
She said the United States was providing communications gear among other aid to Syria's civilian opposition, and denounced Assad for failing to follow through on his agreement to a peace plan proposed by U.N.-Arab League special envoy Kofi Annan.
The United States and its Gulf Arab allies, suspecting Assad of playing for time, urged Annan on Saturday to set a timeline for "next steps" if there was no ceasefire.
Violence has raged unabated despite Annan's mediation. Opposition activists reported at least 16 people killed on Sunday, mostly in clashes in northwestern and eastern Syria.
Syrian media derided the Istanbul meeting, which the Baath newspaper described as "a regional and international scramble to find ways of killing more Syrians and destroying their society and country, to reach the broad goal of weakening Syria".
Around 50 Assad supporters protested outside the conference centre, waving Syria, Russian and Chinese flags and brandishing pictures of the Syrian leader. "Allah, Syria, Bashar, that's it" and "Down, down USA" they chanted, before police removed them.
Mahmoud Abdulatif, a Syrian lawyer who joined dozens in a similar protest outside a conference hotel used by delegates, accused Gulf Arab leaders and others of meddling in Syria.
Partner news
Top stories
Jorge Rafael Videla, an austere former army commander, led Argentina during the bloodiest days of its Dirty War dictatorship.
According to the United Nations, April was Iraq's bloodiest month for almost five years, with 712 people killed.
Reports suggest the rebel fighters may have tried to blow up the walls of the prison, which holds some 4,000 inmates.
Moscow has condemned other nations for supporting rebel forces and failing to condemn what it describes as terrorist attacks on the Syrian regime.
Partner news
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:48:15.000Z
|
azcpbthxkzxf2aerecj7dxtuolou6dti
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:61038",
"uncompressed_offset": 640230199,
"url": "www.panarmenian.net/eng/news/146095/",
"warc_date": "2013-11-22T14:33:36.000Z",
"warc_filename": "<urn:uuid:3942ac6a-f443-4707-8ba8-894b75c6cf35>",
"warc_url": "http://www.panarmenian.net/eng/news/146095/"
}
|
cccc_CC-MAIN-2013-20
|
Finland investigating Syria arms smuggling attempt
PanARMENIAN.Net - Finnish customs officials are investigating an attempt to smuggle arms to Syria through a Helsinki port in breach of an EU ban, after intercepting a container with spare parts for tanks last month, Reuters said.
Customs confiscated the parts, found in a container on Finnlines' Finnsun, when the vessel docked at Vuosaari port.
The container appeared have been sent from Russia to Syria, customs said in a statement, adding that there had been no requests for permission of such a delivery.
Finnlines confirmed the cargo in question was loaded in St. Petersburg on December 20 and said it had raised the alarm after finding the equipment in a regular onboard audit at the port of Antwerp, Belgium.
The company decided to deliver the container to customs officials in Finland, its previous stop. "Finnlines immediately requested the Finnish customs to restrain the cargo," it said in a statement.
Russia is one of Syria's main arms supplier and has long been an ally of President Bashar al-Assad, sending him nearly $1 billion of weapons in 2011.
The European Union prohibits the delivery of arms from its countries to Syria, where almost 70,000 people have been killed in two years of civil war, according to the United Nations.
The captain of the ship and Finnlines staff have been questioned, the customs office said, adding that it was also asking for help from other countries.
Vyacheslav Davidenko, spokesman for Rosoboronexport, Russia's state arms exporter, said he had no information about the delivery of any tank spare parts from his company to Syria, adding that they may have been confused with other arms parts.
Partner news
Top stories
Jorge Rafael Videla, an austere former army commander, led Argentina during the bloodiest days of its Dirty War dictatorship.
According to the United Nations, April was Iraq's bloodiest month for almost five years, with 712 people killed.
Reports suggest the rebel fighters may have tried to blow up the walls of the prison, which holds some 4,000 inmates.
Moscow has condemned other nations for supporting rebel forces and failing to condemn what it describes as terrorist attacks on the Syrian regime.
Partner news
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:39:02.000Z
|
7kybzvjsu33tqu6tdx3fm2snl5gchbq4
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:61040",
"uncompressed_offset": 661357016,
"url": "www.pressreleasepoint.com/jito-announces-easy-education-loans-jain-students",
"warc_date": "2013-11-22T14:33:36.000Z",
"warc_filename": "<urn:uuid:3942ac6a-f443-4707-8ba8-894b75c6cf35>",
"warc_url": "http://www.pressreleasepoint.com/jito-announces-easy-education-loans-jain-students"
}
|
cccc_CC-MAIN-2013-20
|
JITO announces Easy Education Loans for Jain Students
Printer-friendly versionPDF version
Education is the true pillar of progress and the most effective tool to propel a sustainable positive change in society. Education is an integral part of JITO’s mission statement and towards its promotion JITO has launched an easy education loan scheme to encourage Jain students to pursue higher studies. The program is called – JITO Educational Loan Programme (JELP).
JITO has appointed Shri Narendrakumar A. Baldota as the Chairman of JELP. Besides Shri Baldota, Mr. Virendra Shah, Mr. Subhash Runwal, Mr. Pannalal Surana, Dr. Bipin Doshi, Mr. Sumatimal Karnavat, Mr. Bhadresh Mehta, Mr. Samit Zaveri are the other committee members.
Speaking at the launch of JELP, Shri Narendrakumar A. Baldota, Chairman of JELP Committee said, there is no tool more effective than education for socio-economic empowerment. Education has the power to change lives, not only of the individual but also of his/her entire family. The main feature of this loan scheme is an attractive and affordable rate of interest.
Under JELP, JITO has joined hands with the Oriental Bank of Commerce (OBC) to empower Jain students by providing education loans upto Rs. 20 Lacs for international studies and upto Rs.10 Lacs for higher education in India at a specially negotiated attractive rate of interest. For all students who avail loans upto Rs.1 Lac, JITO will contribute a significant portion of the interest payment and the male students will effectively pay only 5% interest, while girls will pay only 4.5% interest.
Shri Narendrakumar A. Baldota, while elucidating the organisation’s objectives behind the scheme said it is JITO’s effort to ensure that no Jain student is deprived of higher education due to the shortage of financial resources. He went on to elaborate that through JELP, JITO wants to not only support needy Jain students but also motivate other Jain students to aim higher and be even more ambitious about their educational career. Mr. Hemant Shah, President of JITO added that this year education loan worth Rs. 25 Crores will be disbursed and next year this figure could touch Rs. 50 Crores.
M/s Credila, headed by Mr. Ajay Bohra will process these loan applications on behalf of JITO. To make the process smooth and easy for the students, JITO has specially appointed Credila to assist students in filling the loan application forms and conduct bank follow-ups for timely disbursement.
Jain students and their parents who are desirous to avail this education loan are requested to apply online at www.jito.org or contact JITO at the following addresses:
JITO: JELP
No. 5, 2nd floor, 7/10, Botawala Building,
Horniman Circle, Fort, Mumbai – 400 023.
Tel. Nos.: +91-22-66102003 / 04; 61409848; 22625774 / 76
Fax No.: +91-22-66102097
Email: contact@jito.org or jelp@jito.org
Credila Financial Services Pvt. Ltd (JITO)
B- 301, Citi Point,
Andheri - Kurla Road,
Next to Kohinoor Continental,
Andheri East, Mumbai 400 059. www.credila.com
Press Contact:
Mehul Suthar
Cognito,
5th Floor, Commerce Centre, Sayajigunj, Vadodara - 390005. Phone: 0265-2361331, 2362115
0265-2362115
http://
*****@**g**t**a**.com
Email partially hidden to block spam. Please use the contact form here.
Contact Mehul Suthar
Email the contact person for this press release. Do not send spam or irrelevant message.
CAPTCHA
This question is for testing whether you are a human visitor and to prevent automated spam submissions.
9 + 0 =
Solve this simple math problem and enter the result. E.g. for 1+3, enter 4.
Copy this html code to your website/blog and link to this press release.
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:19:16.000Z
|
knswkmckdseu77wgt76vhpsl57iz6hrc
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:61041",
"uncompressed_offset": 663100603,
"url": "www.progressive-charlestown.com/2012/06/your-schedule-for-today.html",
"warc_date": "2013-11-22T14:33:36.000Z",
"warc_filename": "<urn:uuid:3942ac6a-f443-4707-8ba8-894b75c6cf35>",
"warc_url": "http://www.progressive-charlestown.com/2012/06/your-schedule-for-today.html"
}
|
cccc_CC-MAIN-2013-20
|
Menu Bar
Home Calendar Topics Just Charlestown About Us
Friday, June 22, 2012
Your schedule for today
Carolina Fiber & Fiction at the Farmers' Market
Don't tell me you have to work today. There are more important things in our list of What's Happening!
First: Farmers' Market
We've all been waiting for the Land Trust Farmers' Market so be sure to check it out sometime between 9 am and noon. Your favorite vendors from last year will be there plus some exciting new ones.
Second: Hit the beach
We're going to have another great day for the beach before scattered storms move in later in the afternoon. So head down to Charlestown Town Beach and get some sun. Be sure to check out the new beach pavilion. It's great!
Third: Attend the Wildlife Refuge fundraiser
Head over to the Westerly Yacht Club for the fundraiser for the Friends of the National Wildlife Refuges of Rhode Island. If you have time, get your tickets in advance at Charlestown Wine and Spirits but I bet you can pay at the door. It promises to be a great time with wine and beer tasting, a silent auction and photography for sale.
Fourth: Hit the sack early
Because we have a big list for you on Saturday and it starts early! Look for your Saturday schedule available by 6 am.
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:21:04.000Z
|
lesyyvqmaifanqn6y6e65rep3h3dkv7u
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:61050",
"uncompressed_offset": 698033820,
"url": "www.seroundtable.com/archives/014021.html",
"warc_date": "2013-11-22T14:33:36.000Z",
"warc_filename": "<urn:uuid:3942ac6a-f443-4707-8ba8-894b75c6cf35>",
"warc_url": "http://www.seroundtable.com/archives/014021.html"
}
|
cccc_CC-MAIN-2013-20
|
Google Gadget Ventures: Earn $5,000 to $100,000 From Google
Jun 28, 2007 • 7:12 am | (1) by | Filed Under Other Google Topics
Google announced the Google Gadgets Venture, a program where developers can earn $5,000 or $100,000 grants for developing Google Gadgets.
The $5,000 payout are for developers whose gadgets receive at least 250,000 weekly page views and apply for the program. To apply, you need to submit a one-page proposal detailing how you’d use the grant to improve your gadget, and email it to gadgetventures@google.com.
The $100,000 seed investment is the step above, where developers would like to build a business around the Google gadgets platform. The first requirement is that you be part of the $5,000 grant project, after that - you need to convince Google you are worth the $100,000 investment.
There is a huge Google Ventures FAQ with more details.
Danny Sullivan has a quote, "The payoff for us is in more pageviews and users. By getting more users, we get more searches," said Marissa Mayer, Google's vice president of search products and user experience.
We have a simple Google Gadget with currently only 1,226 users and 32,437 pageviews, so we need some help to reach the $5,000 grant. Go to this page and click on the "Add it Now" button to help our cause, of course, please tell your friends.
Forum discussion at DigitalPoint Forums and Search Engine Watch Forums.
Previous story: Digg Digest - 06/27/07: SEO.com Purchased for $5 million, Google Docs & Spreadsheets Features, & ThreadWatch Closing
blog comments powered by Disqus
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:20:33.000Z
|
dlja6jfg5gznohdxoivuncdoue7x5vqd
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:61051",
"uncompressed_offset": 698043296,
"url": "www.seroundtable.com/recap-10-28-2011-14225.html",
"warc_date": "2013-11-22T14:33:36.000Z",
"warc_filename": "<urn:uuid:3942ac6a-f443-4707-8ba8-894b75c6cf35>",
"warc_url": "http://www.seroundtable.com/recap-10-28-2011-14225.html"
}
|
cccc_CC-MAIN-2013-20
|
Daily Search Forum Recap: October 28, 2011
Oct 28, 2011 • 4:00 pm | (0) by | Filed Under Search Forum Recap
Here is a recap of what happened in the search forums today, through the eyes of the Search Engine Roundtable and other search forums on the web.
Search Engine Roundtable Stories:
Other Great Search Forum Threads:
Previous story: Video Recap of Weekly Search Buzz :: October 28, 2011
blog comments powered by Disqus
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:13:21.000Z
|
obcmpwt7mna4eqiqwovfznoc7mu3i7z6
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:61061",
"uncompressed_offset": 804697492,
"url": "www.werelate.org/wiki/Place:Plainview,_Nassau,_New_York,_United_States",
"warc_date": "2013-11-22T14:33:36.000Z",
"warc_filename": "<urn:uuid:3942ac6a-f443-4707-8ba8-894b75c6cf35>",
"warc_url": "http://www.werelate.org/wiki/Place:Plainview,_Nassau,_New_York,_United_States"
}
|
cccc_CC-MAIN-2013-20
|
Place:Plainview, Nassau, New York, United States
Watchers
NamePlainview
TypeCensus-designated place
Coordinates40.78°N 73.479°W
Located inNassau, New York, United States
source: Getty Thesaurus of Geographic Names
the text in this section is copied from an article in Wikipedia
Plainview is a hamlet (and census-designated place) located on Long Island in the town of Oyster Bay, Nassau County, New York, USA. The population of the CDP was 26,217. The Plainview post office has the ZIP code 11803.
Plainview and its neighboring hamlet, Old Bethpage, share a school system, library, fire department, and water district. Law enforcement for the communities is provided by the Nassau County Police Department, with the Second Precinct serving areas north of Old Country Road and Eighth Precinct serving areas south of Old Country Road. Plainview is split between the 2nd congressional district of New York and the 3rd congressional district of New York.
Research Tips
This page uses content from the English Wikipedia. The original content was at Plainview, New York. The list of authors can be seen in the page history. As with WeRelate, the content of Wikipedia is available under the Creative Commons Attribution/Share-Alike License.
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:47:09.000Z
|
5ugwy4ejk3dpbytz3vgfjfsqbvf53gyu
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:61062",
"uncompressed_offset": 804704042,
"url": "www.werelate.org/wiki/User:Gendo/Baldwin_Family_of_Gettysburg,_PA_%26_Neoga,_IL",
"warc_date": "2013-11-22T14:33:36.000Z",
"warc_filename": "<urn:uuid:3942ac6a-f443-4707-8ba8-894b75c6cf35>",
"warc_url": "http://www.werelate.org/wiki/User:Gendo/Baldwin_Family_of_Gettysburg,_PA_&_Neoga,_IL"
}
|
cccc_CC-MAIN-2013-20
|
User:Gendo/Baldwin Family of Gettysburg, PA & Neoga, IL
Watchers
Currently researching Jonathan Baldwin (b. 1794-1884) wife, Sarah Monfort (1791-1856), and their descendants. Jonathan was b. in NJ, the family moved to Gettysburg, PA, and eventually moved to Neoga, Cumberland County, Illinois, and other near counties, including Douglas and Coles.
Some of the near descendant families are: Baldwin, Mitchell, Reynolds, Kimery, and Blair.
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:11:54.000Z
|
kudg2y4qyzak4iieozlarryviz477647
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:61074",
"uncompressed_offset": 15416519,
"url": "archives.gentoo.org/gentoo-doc-cvs/msg_18b1d97154dcb66ae1d6b395e7a185be.xml",
"warc_date": "2013-11-22T14:35:21.000Z",
"warc_filename": "<urn:uuid:81ae3948-2f99-43b9-9d7c-62fa7a85c520>",
"warc_url": "http://archives.gentoo.org/gentoo-doc-cvs/msg_18b1d97154dcb66ae1d6b395e7a185be.xml"
}
|
cccc_CC-MAIN-2013-20
|
Note: Due to technical difficulties, the Archives are currently not up to date. GMANE provides an alternative service for most mailing lists.
c.f. bug 424647
List Archive: gentoo-doc-cvs
Navigation:
Lists: gentoo-doc-cvs: < Prev By Thread Next > < Prev By Date Next >
Headers:
To: gentoo-doc-cvs@g.o
From: "Sven Vermeulen (swift)" <swift@g.o>
Subject: gentoo commit in xml/htdocs/doc/en: xfce-config.xml
Date: Tue, 15 Nov 2011 18:47:16 +0000 (UTC)
swift 11/11/15 18:47:16
Modified: xfce-config.xml
Log:
Fix bug #389089 - It is not pure cache, but also profile information that is removed. Upgrades however are not supported that we know of (migration). Thanks to Sergey S. Starikoff for reporting.
Revision Changes Path
1.40 xml/htdocs/doc/en/xfce-config.xml
file : http://sources.gentoo.org/viewvc.cgi/gentoo/xml/htdocs/doc/en/xfce-config.xml?rev=1.40&view=markup
plain: http://sources.gentoo.org/viewvc.cgi/gentoo/xml/htdocs/doc/en/xfce-config.xml?rev=1.40&content-type=text/plain
diff : http://sources.gentoo.org/viewvc.cgi/gentoo/xml/htdocs/doc/en/xfce-config.xml?r1=1.39&r2=1.40
Index: xfce-config.xml
===================================================================
RCS file: /var/cvsroot/gentoo/xml/htdocs/doc/en/xfce-config.xml,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -r1.39 -r1.40
--- xfce-config.xml 8 Nov 2011 23:20:35 -0000 1.39
+++ xfce-config.xml 15 Nov 2011 18:47:16 -0000 1.40
@@ -1,6 +1,6 @@
<?xml version='1.0' encoding='UTF-8'?>
<!DOCTYPE guide SYSTEM "/dtd/guide.dtd">
-<!-- $Header: /var/cvsroot/gentoo/xml/htdocs/doc/en/xfce-config.xml,v 1.39 2011/11/08 23:20:35 nightmorph Exp $ -->
+<!-- $Header: /var/cvsroot/gentoo/xml/htdocs/doc/en/xfce-config.xml,v 1.40 2011/11/15 18:47:16 swift Exp $ -->
<guide>
<title>The Xfce Configuration Guide</title>
@@ -18,8 +18,8 @@
<!-- See http://creativecommons.org/licenses/by-sa/2.5 -->
<license/>
-<version>7</version>
-<date>2011-11-08</date>
+<version>8</version>
+<date>2011-11-15</date>
<chapter>
<title>Introduction</title>
@@ -533,9 +533,10 @@
<body>
<p>
-If you're upgrading Xfce from an old version to 4.8 or newer, then you will need
-to remove your old cached sessions. For each of your users, run the following
-commands to remove your old incompatible cached sessions:
+If you're upgrading Xfce from a pre-4.8 version to 4.8 or newer, then you will
+need to remove your old cached sessions and profiles as they are incompatible
+with the 4.8 release (and later releases). For each of your users, run the
+following commands to remove your old incompatible cached sessions and profile:
</p>
<pre caption="Deleting old sessions from the cache">
@@ -544,6 +545,12 @@
$ <i>rm -r ~/.config/Thunar</i>
</pre>
+<p>
+Users will be greeted with a new and shiny interface, but will lose many of
+their individual settings. Sadly, no migration of configuration(s) exist that we
+know of.
+</p>
+
</body>
</section>
<section>
Navigation:
Lists: gentoo-doc-cvs: < Prev By Thread Next > < Prev By Date Next >
Previous by thread:
gentoo commit in xml/htdocs/doc/en: xfce-config.xml
Next by thread:
gentoo commit in xml/htdocs/doc/en: xfce-config.xml
Previous by date:
gentoo commit in xml/htdocs/doc/en: openrc-migration.xml
Next by date:
gentoo commit in xml/htdocs/doc/en/security: shb-limits.xml
Updated Jun 30, 2012
Summary: Archive of the gentoo-doc-cvs mailing list.
Donate to support our development efforts.
Copyright 2001-2013 Gentoo Foundation, Inc. Questions, Comments? Contact us.
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:11:15.000Z
|
kf4v2dakylk25q4qxl45ecbka7jp6yxf
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:61075",
"uncompressed_offset": 16643398,
"url": "arthritis-research.com/content/14/5/R220/email",
"warc_date": "2013-11-22T14:35:21.000Z",
"warc_filename": "<urn:uuid:81ae3948-2f99-43b9-9d7c-62fa7a85c520>",
"warc_url": "http://arthritis-research.com/content/14/5/R220/email"
}
|
cccc_CC-MAIN-2013-20
|
Email this article to a friend
Sulforaphane has opposing effects on TNF-alpha stimulated and unstimulated synoviocytes
Athanassios Fragoulis*, Jendrik Laufs, Susanna Müller, Ulf Soppa, Stephanie Siegl, Lucy K Reiss, Mersedeh Tohidnezhad, Christian Rosen, Klaus Tenbrock, Deike Varoga, Sebastian Lippross, Thomas Pufe and Christoph J Wruck
Arthritis Research & Therapy 2012, 14:R220 doi:10.1186/ar4059
Fields marked * are required
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:47:02.000Z
|
zrhoz3sumkvqeom4ybjhmcsm24meisez
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:61079",
"uncompressed_offset": 29964491,
"url": "blog.mozilla.org/it/2012/06/15/",
"warc_date": "2013-11-22T14:35:21.000Z",
"warc_filename": "<urn:uuid:81ae3948-2f99-43b9-9d7c-62fa7a85c520>",
"warc_url": "http://blog.mozilla.org/it/2012/06/15/"
}
|
cccc_CC-MAIN-2013-20
|
Posts from June 15, 2012
Mozilla DB News, Fri Jun 15th
Sheeri
The theme this week was “data integrity and security”: Upgraded the kernel in our Puppet Dashboard DB master/slave cluster after one of the machines crashed. Verified that none of our databases were running a version of MySQL that was affected … Continue reading
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T10:00:17.000Z
|
2ep5acdkfdztzie6tphoehvtwhzhgelx
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:61097",
"uncompressed_offset": 63448306,
"url": "daviswiki.org/Users/VinceBuffalo",
"warc_date": "2013-11-22T14:35:21.000Z",
"warc_filename": "<urn:uuid:81ae3948-2f99-43b9-9d7c-62fa7a85c520>",
"warc_url": "http://daviswiki.org/Users/VinceBuffalo"
}
|
cccc_CC-MAIN-2013-20
|
Users/VinceBuffalo
Info
Search:
Name: Vince Buffalo
Email: Facebook has it. For anti-spam purposes, I have removed it.
Comments:
Note: You must be logged in to add comments
2006-09-12 11:30:16 what's up with CourseCollab? —ArlenAbraham
2006-11-14 13:00:46 The lectures themselves are copyright of the lecturer, so if you're posting lecture audio or transcripts, you'd need the permission of the copyright holder. I believe that notes count as a derivative or original work. —ArlenAbraham
2011-02-19 13:48:27 Buffalo buffalo buffalo! —NickSchmalenberger
2011-03-27 22:18:58 Greetings from the grass —GregPThrasher
This is a Wiki Spot wiki. Wiki Spot is a 501(c)3 non-profit organization that helps communities collaborate via wikis.
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:59:07.000Z
|
mor5p7lomuco3k4izvxbdfuu3g7iltji
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:61101",
"uncompressed_offset": 66099966,
"url": "demonssouls.wikidot.com/forum/t-307365/silver-coronet",
"warc_date": "2013-11-22T14:35:21.000Z",
"warc_filename": "<urn:uuid:81ae3948-2f99-43b9-9d7c-62fa7a85c520>",
"warc_url": "http://demonssouls.wikidot.com/forum/t-307365/silver-coronet"
}
|
cccc_CC-MAIN-2013-20
|
Silver Coronet / Discussion
Forum » General / Per page discussions » Silver Coronet
Started by: Wikidot
Date: 11 Feb 2011 19:24
Number of posts: 0
RSS: New posts
This is the discussion related to the wiki page Silver Coronet.
New Post
Unless otherwise stated, the content of this page is licensed under Creative Commons Attribution-ShareAlike 3.0 License
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:20:44.000Z
|
jqlppcevsdm7hpuwwzmuljbmnavc563e
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:61128",
"uncompressed_offset": 95205805,
"url": "familysearch.org/learn/wiki/en/Great_Shamokin_Path",
"warc_date": "2013-11-22T14:35:21.000Z",
"warc_filename": "<urn:uuid:81ae3948-2f99-43b9-9d7c-62fa7a85c520>",
"warc_url": "http://familysearch.org/learn/wiki/en/Great_Shamokin_Path"
}
|
cccc_CC-MAIN-2013-20
|
Great Shamokin PathEdit This Page
From FamilySearch Wiki
The Great Shamokin Path was established by Native Americans thousands of years ago. It follows along the West Branch of hte Susquehanna River and then over to Great Island in Pennsylvania. [1] [2]
It connected the two largest Indian communities in Pennsylvania, Shamokin and Kittanning and was used by Native Americans for travel into the current Ohio region of America.
During the French and Indian War, it enabled Delaware and Shawnee warriors to quickly travel cross-country in an attempt to recover lands lost to the British in the French and Indian War. [3]
In 1772, the path was used by John Ettwein and 200 Lenape and Mohican Christians to travel from Friedenshutten to their new village, Friedensstadt in southwestern Pennsylvania. [4]
1. ExplorePAHistory[1]
2. Wikipedia - The Great Shamokin Path[2]
3. Bucknell - Sunbury A History[3]
4. Wikipedia - The Great Shamokin Path[4]
Need additional research help? Contact our research help specialists.
Need wiki, indexing, or website help? Contact our product teams.
Did you find this article helpful?
You're invited to explain your rating on the discussion page (you must be signed in).
• This page was last modified on 4 March 2013, at 21:18.
• This page has been accessed 373 times.
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:29:25.000Z
|
napeazcuedza6ubkpc7sbpawutptddc7
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:61129",
"uncompressed_offset": 95224061,
"url": "familysearch.org/learn/wiki/en/index.php?oldid=147685&title=Maryland_Maps",
"warc_date": "2013-11-22T14:35:21.000Z",
"warc_filename": "<urn:uuid:81ae3948-2f99-43b9-9d7c-62fa7a85c520>",
"warc_url": "http://familysearch.org/learn/wiki/en/index.php?title=Maryland_Maps&oldid=147685"
}
|
cccc_CC-MAIN-2013-20
|
Maryland MapsEdit This Page
From FamilySearch Wiki
Revision as of 16:31, 15 February 2009 by RitcheyMT (Talk | contribs)
Maryland
Contents
MD counties and county seats
Why use maps?
Maps are used to locate the places where your ancestors lived. They identify political boundaries, names of places, geographical features, cemeteries, churches, and migration routes. Historical maps and atlases are especially useful for finding communities that no longer exist.
Before searching you must know
Reliability of maps
Maps improved over time as surveying tools improved. Even though early or primitive maps may not be correct in terms of scale or relative positioning, they are still a good source of the names people used for various jurisdictions and geographic features.
Tips
• Search maps that were published as close as possible to the time period when your ancestor lived in the area.
• Names of places change over time. If you cannot find on a map the place where your ancestor lived (such as a town), check gazetteers published before and after your ancestor lived there to see whether the town had a different name.
What to do next
• After locating the place where your ancestor lived, note the jurisdictions which contained it and surrounded it, as well as the jurisdictions that it contained. All of these jurisdictions may have further records of your ancestor.
Terms
Important Dates
Types of Maryland maps and where to get them
Maryland County Maps
Maryland County Formation Maps. This site will show every change in county boundries from 1637 to the present day in an online map. It shows a map and gives details about each change and the year the change took place.
United States Census Bureau State and County Map This map from the US Census Bureau is a Nation wide county map. You can search for counties by name and can zoom in and see counties and neighboring counties even in other states.
Maryland Map Resources
• Johns Hopkins University, the Enoch Pratt Free Library, the University of Maryland, and the Maryland State Archives have large collections of Maryland maps and atlases. A helpful historical atlas is:
• Papenfuse, Edward C., and Joseph M. Coale. The Hammond-Harwood House Atlas of Historical Maps of Maryland, 1608-1908. Baltimore, Maryland: Johns Hopkins University Press, 1982. (Family History Library book Q 975.2 E7p; film 1597909 item 18.)
• Maps that show the county boundaries at the time the U.S. censuses were taken are in:
• Thorndale, William, and William Dollarhide. Map Guide to the U.S. Federal Censuses, 1790-1920. Baltimore, Maryland: Genealogical Publishing Co., 1987. (Family History Library book 973 X2th.) A limited view of this book is online.
• Baltimore City ward maps that correspond roughly with the censuses of 1820 to 1900 are on Family History Library film 1377700 and Family History Library fiche 6016568-76 .
• For 7.5-, 15-, and 30-minute topographic quadrangle maps for Maryland published between 1884 and 1972 use the:
• United States Geological Survey. Topographic Maps of the United States. Suitland, Maryland: National Archives and Records Service, 1976. The maps are arranged alphabetically by the name of the quadrangle on the following films:
Aberdeen-Flintstone Family History Library film 1433784
Gunpowder-Myersville Family History Library film 1433785
Paw Paw-Urbana Family History Library film 1433786
Wyoming Family History Library film 1433783
• Film numbers for additional and more recent topographical maps are listed in the Locality Search of the Family History Library Catalog under UNITED STATES - MAPS.
• To see changes in county boundaries, use: Long, John H., ed. Delaware, Maryland, District of Columbia atlas of Historical County Boundaries. New York: Charles Schribner’s Sons, 1996. (Family History Library book 975 E3L.) This volume is part of a proposed 40-volume reference work under the common title “Atlas of Historical County Boundaries.” It intends to trace boundary changes from the earliest date to 1990, leaving no gaps. It also intends to provide a frame of reference for understanding boundary changes.
• Also see: Maryland, Delaware Atlas and Gazetteer. DeLorme Mapping. 4th ed., Freeport, Maine: DeLorme, 2004. (Family History Library book 975 E7md .)
• The Place Search of the Family History Library Catalog lists more maps under:
• Selected Maryland Out-of-print historical maps can be viewed online at Historical Maps of Maryland.
• MARYLAND, [COUNTY] - MAPS
• Printable maps are also available from the National Atlas of the United States
• Detail of Maryland's regions
See Also
Maryland Gazetteers | United States Maps
Need additional research help? Contact our research help specialists.
Need wiki, indexing, or website help? Contact our product teams.
Did you find this article helpful?
You're invited to explain your rating on the discussion page (you must be signed in).
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:39:20.000Z
|
4tu5pbcv5dj37avbw6wdvi3mloq4nxhw
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:61160",
"uncompressed_offset": 138834578,
"url": "ipkitten.blogspot.co.uk/2004/07/electrocoin-its-slots-of-fun.html",
"warc_date": "2013-11-22T14:35:21.000Z",
"warc_filename": "<urn:uuid:81ae3948-2f99-43b9-9d7c-62fa7a85c520>",
"warc_url": "http://ipkitten.blogspot.co.uk/2004/07/electrocoin-its-slots-of-fun.html"
}
|
cccc_CC-MAIN-2013-20
|
For the half-year to 30 June 2013, the IPKat's regular team is supplemented by contributions from guest bloggers Stefano Barazza, Matthias Lamping and Jeff John Roberts.
Two of our regular Kats are currently on blogging sabbaticals. They are Birgit Clark and Catherine Lee.
Sunday, 11 July 2004
ELECTROCOIN: IT'S SLOTS OF FUN
Last week Geoffrey Hobbs QC, sitting as a deputy judge in the High Court, decided Electrocoin v Coinworld , an infringement case based on a number of UK and Community trade marks for the names of various slot machines and the sequence of winning symbols used by those machines. In the process of doing so, a number of important infringement issues were raised including:
1. Trade mark use: After considering BMW v Deenik, Holterhoff, Arsenal v Reed (ECJ and Court of Appeal) and R v Johnstone, he came to the conclusion that the rights conferred by trade mark registration are not affected by use other than for the purposes of distinguishing goods or services. He added that distinguishing goods and services corresponds to the role a trade mark must perform to satisfy Article 2 of Directive 89/104. The point of the infringement legislation is to stop defendants from using signs in a way which would conflict with the use of the sign by the claimant. The IPKat says, despite seemingly clear words to the contrary from the ECJ and the Court of Appeal in Arsenal v Reed, a requirement of trade mark use by the defendant is here to stay.
2. Article 5(2) and similar goods: Article 5(2) of Directive 89/104 states that its protection applies when the parties’ goods are dissimilar. However, recent ECJ judgments have found that it also applies to similar and identical goods. It was conceded in Electrocoin that the infringement provisions of the CTM Regulation had to be read in accordance with this case law, however the situation with regard to UK trade marks was less clear. Although s.10(3) (which corresponds to Article 5(2) of the Directive) has now been amended to take the case law into account, the allegedly infringing acts predated the amendment. It was argued that the pre-amendment s.10(3) could not be read in accordance with the ECJ’s rulings because it involved such a great departure from the express wording of the statute and Article 5(2) on which it is based. Geoffrey Hobbs QC rejected this approach saying he was bound to interpret s.10(3) in accordance with the relevant decisions of the ECJ. The ECJ had made it quite clear in Adidas-Salomon v Fitnessworld that any Member State which implements Article 5(2) must extend its protection to similar and identical goods. The IPKat says no real surprises there.
3. Cross-pollination: According to Geoffrey Hobbs:
“Metaphorically speaking, Article 5(2) provides a remedy for cross-pollination: the mark and sign in issue are identical or similar; use of one is liable to influence the effect of the other on people who have been expose to both; the effect is such that advantage or detriment of the kind proscribed is liable to ensue”.
The mechanism by which this happens is the establishing of a “link” between the claimant’s mark and the defendant’s sign à la Adidas v Fitnessworld. Such a link must have an effect on consumers’ economic behaviour – it’s not enough if the two parties’ marks just bring each other to mind. Geoffrey Hobbs has used this idea of cross-pollination before in a couple of his decisions on registration sitting as the Lord Chancellor’s Appointed Person. The IPKat notes that there’s no such language in the Directive or the CTM Regulation or even in the case law of the ECJ and he’s not entirely comfortable with the idea of English judges inventing seemingly superfluous and ill-defined layers of extra terminology.
4. Defences: Although the ECJ has said that Article 6(1)(b) guarantees defendants the right to use a sign descriptively, rather than as a trade mark, it has also said that the existence of aural confusion between a word mark registered in one Member State and an indication of where a product comes from in another does not automatically lead to the conclusion that the latter use is dishonest. By extension, the confusing use of a denomination can be considered to be in accordance with honest practices, as it was in Reed v Reed. Again, no major surprises here, although the IPKat notes that Geoffrey Hobbs has been a bit coy – he hasn’t come out and explicitly said that use of a mark by a defendant as a trade mark will fall within the Article 6(1)(b) defence.
More than you want to know about slot machines here, here, and here
Every home should have one – buy your own slot machine here
How to win here, here and here
Subscribe to the IPKat's posts by email here
Just pop your email address into the box and click 'Subscribe':
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:10:26.000Z
|
hhxyrjl6uctxbih6ax4iuggfjjs5i4ny
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:61161",
"uncompressed_offset": 138858718,
"url": "ipkitten.blogspot.co.uk/2012/02/so-confidentially-what-do-you-think-of.html",
"warc_date": "2013-11-22T14:35:21.000Z",
"warc_filename": "<urn:uuid:81ae3948-2f99-43b9-9d7c-62fa7a85c520>",
"warc_url": "http://ipkitten.blogspot.co.uk/2012/02/so-confidentially-what-do-you-think-of.html"
}
|
cccc_CC-MAIN-2013-20
|
For the half-year to 30 June 2013, the IPKat's regular team is supplemented by contributions from guest bloggers Stefano Barazza, Matthias Lamping and Jeff John Roberts.
Two of our regular Kats are currently on blogging sabbaticals. They are Birgit Clark and Catherine Lee.
Sunday, 5 February 2012
So, confidentially, what DO you think of WIPO?
A rare first: the IPKat
keeps his
comments
on WIPO to himself
You may have been waiting for years to tell the World Intellectual Property Organization (WIPO) what you think of it. If so, your chance has come. WIPO informs him that subscribers to "one or several WIPO e-newsletters" will by now have received a circular entitled "Survey on Stakeholder Perceptions of WIPO". This tells them that WIPO
"... seeks to deliver high quality services and fully engage with all its stakeholders. In an effort to better understand our stakeholders’ expectations and perceptions, and to evaluate and improve our external communications, we are carrying out a perceptions survey
Your insights will help us engage more effectively with our stakeholders and the overall IP community. The survey should take less than fifteen minutes of your valuable time.
The survey is being conducted by a specialized research firm [it's called Zoomerang] on behalf of WIPO. All information gathered will be treated confidentially [well, that's half the fun gone already, moans Merpel] and reported to WIPO in aggregate form only.
We hope that you will take this opportunity to help us shape our future communications efforts for the benefit of all our stakeholders. We are grateful for your participation".
The circular concludes with the ever-so-slightly hopeful line: "Thank you for your continuing support of WIPO".
This member of the IPKat team hopes that his readers will complete the survey. He has already done so: it took him 18 minutes rather than the 15 mentioned in the circular, but that was because it forced him to do quite a bit of serious thinking. Some of the questions are politically sensitive and rather surprised him. For example
Who do you believe is the global leader in the protection and promotion of IP?
• United Nations Educational, Scientific and Cultural Organization (UNESCO)
• World Intellectual Property Organization (WIPO)
• World Trade Organization (WTO)
• United Nations Conference on Trade and Development (UNCTAD)
• Don’t know
• Other, please specify
In his lecturing days, this Kat used to mention how some United Nations Agencies appeared to be in favour of IP, others against it and others again both for and against it. Might this survey mark the beginning of a re-think as to whether the interests of IP creators, their competitors, consumers and beneficiaries can be better balanced across the spread of international agency portfolios?
An even more difficult question was this one:
Who do you believe is the global leader in the provision of IP-related products and services?
• European Patent Office (EPO)
• United States Patent and Trademark Office (USPTO)
• World Intellectual Property Organization (WIPO)
• State Intellectual Property Office of China (SIPO)
• Korean Intellectual Property Office (KIPO)
• Japan Patent Office (JPO)
• Office of Harmonization for the Internal Market (OHIM)
• Don’t know
• Other, please specify
In one sense there is no comparison of like with like, yet each of the bodies listed above exercises a strong gravitational pull and respondents' answers may depend on how they understand the concept of the "global leader": is it the body which leads right across the world, or is it the body which, out of all the organisations in the world, does the most leading within its own sphere of influence?
Other questions boldly ask respondents about their use of blogs and online resources, how (in)effective they find WIPO's services, which adjectives best fit the organisation's operations and its responsiveness, and so on.
This Kat urges readers who use WIPO's services and/or read its publications to respond to the call and complete the survey. We all have our views, which we express to each other both publicly and privately, but this time WIPO is carefully listening. Let's not let this opportunity pass.
Illustration at top right from Cat Confidential, which you can purr-chase here
Subscribe to the IPKat's posts by email here
Just pop your email address into the box and click 'Subscribe':
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:59:20.000Z
|
qfmx3zf74qmt2uy4it4u2x6gb5x5wxrv
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:61162",
"uncompressed_offset": 144497774,
"url": "josm.openstreetmap.de/ticket/2435",
"warc_date": "2013-11-22T14:35:21.000Z",
"warc_filename": "<urn:uuid:81ae3948-2f99-43b9-9d7c-62fa7a85c520>",
"warc_url": "http://josm.openstreetmap.de/ticket/2435"
}
|
cccc_CC-MAIN-2013-20
|
Modify
Opened 4 years ago
Closed 4 years ago
#2435 closed enhancement (fixed)
integrate comment into the upload window
Reported by: jekader Owned by: team
Priority: major Component: Core
Version: Keywords:
Cc:
Description
I think it would be logical to move the comment field to the upload window, where the added/changed/deleted objects are shown.
And of course, making it optional would also be nice.
Attachments (0)
Change History (1)
comment:1 Changed 4 years ago by anonymous
• Resolution set to fixed
• Status changed from new to closed
Modify Ticket
Change Properties
<Author field>
Action
as closed .
as The resolution will be set. Next status will be 'closed'.
The resolution will be deleted. Next status will be 'reopened'.
Author
E-mail address and user name can be saved in the Preferences.
Note: See TracTickets for help on using tickets.
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:47:59.000Z
|
jydvw3j7mhs5e5su6yo5orsspfthp4kd
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:61167",
"uncompressed_offset": 156083425,
"url": "listarchives.libreoffice.org/global/users/msg18340.html",
"warc_date": "2013-11-22T14:35:21.000Z",
"warc_filename": "<urn:uuid:81ae3948-2f99-43b9-9d7c-62fa7a85c520>",
"warc_url": "http://listarchives.libreoffice.org/global/users/msg18340.html"
}
|
cccc_CC-MAIN-2013-20
|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[libreoffice-users] formatting emails
Interesting problem: An email text is received which you need to format for publication.
The email uses a carriage return at the end of each line, and a double carriage return
for paragraph spacing. What I'd like to do is remove the cr's at the end of each line, so
the text can be justified, and turn the double cr's into paragraph controls, or just leave
as double cr's. Obviously all this can be done a line at a time by hand, but it's a pain.
Is there any way someone can suggest to automate this?
Thanx--doug
--
Blessed are the peacekeepers...for they shall be shot at from both sides. --A.M. Greeley
--
For unsubscribe instructions e-mail to: users+help@global.libreoffice.org
Problems? http://www.libreoffice.org/get-help/mailing-lists/how-to-unsubscribe/
Posting guidelines + more: http://wiki.documentfoundation.org/Netiquette
List archive: http://listarchives.libreoffice.org/global/users/
All messages sent to this list will be publicly archived and cannot be deleted
Follow-Ups:
[libreoffice-users] Re: formatting emailsNoOp <glgxg@sbcglobal.net>
Re: [libreoffice-users] formatting emailse-letter <inpost@gmail.com>
Re: [libreoffice-users] formatting emailsBrian Barker <b.m.barker@btinternet.com>
[libreoffice-users] Re: formatting emailsAndreas Säger <villeroy@t-online.de>
Re: [libreoffice-users] formatting emails"T. R. Valentine" <trvalentine@gmail.com>
Re: [libreoffice-users] formatting emailsTom Davies <tomdavies04@yahoo.co.uk>
Privacy Policy | Impressum (Legal Info) | Copyright information: Unless otherwise specified, all text and images on this website are licensed under the Creative Commons Attribution-Share Alike 3.0 License. This does not include the source code of LibreOffice, which is licensed under the GNU Lesser General Public License (LGPLv3). "LibreOffice" and "The Document Foundation" are registered trademarks of their corresponding registered owners or are in actual use as trademarks in one or more countries. Their respective logos and icons are also subject to international copyright laws. Use thereof is explained in our trademark policy.
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:59:29.000Z
|
mcf57zekrxwabs5wzfxuuytr655cjlqa
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:61168",
"uncompressed_offset": 156280807,
"url": "lists.maemo.org/pipermail/maemo-community/2008-October/001204.html",
"warc_date": "2013-11-22T14:35:21.000Z",
"warc_filename": "<urn:uuid:81ae3948-2f99-43b9-9d7c-62fa7a85c520>",
"warc_url": "http://lists.maemo.org/pipermail/maemo-community/2008-October/001204.html"
}
|
cccc_CC-MAIN-2013-20
|
[maemo-community] maemo.org logo variations in SVG
From: Tim tim at samoff.com
Date: Tue Oct 28 01:04:10 EET 2008
Hi,
On Mon, 27 Oct 2008 18:42:23 -0400
"Miguel Peres" <miguel.peres at openbossa.org> wrote:
> Hello everyone,
>
> I'm a coworker of Glaubert at OpenBossa design team. Following the
> requests on the list we've uploaded the final logo in vector format
> (PDF) and the logo style guide to the address below:
> http://wiki.maemo.org/Maemo.org_logo
Thanks! :)
> We've tried to upload the file in svg format but it is not one of the
> allowed file types. Does anyone know how to bypass that?
Tar/Zip it?
Tim
More information about the maemo-community mailing list
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:22:39.000Z
|
u6uhhygxkozvdrligixifo4gd55g2m4a
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:61189",
"uncompressed_offset": 196640064,
"url": "openwetware.org/index.php?oldid=250773&title=User%3APakpoom_Subsoontorn%2FNotebook%2FGenetically_Encoded_Memory",
"warc_date": "2013-11-22T14:35:21.000Z",
"warc_filename": "<urn:uuid:81ae3948-2f99-43b9-9d7c-62fa7a85c520>",
"warc_url": "http://openwetware.org/index.php?title=User:Pakpoom_Subsoontorn/Notebook/Genetically_Encoded_Memory&oldid=250773"
}
|
cccc_CC-MAIN-2013-20
|
User:Pakpoom Subsoontorn/Notebook/Genetically Encoded Memory
From OpenWetWare
Jump to: navigation, search
Search this Project
Customize your entry pages
Project Description/Abstract
Notes
• Our review paper on genetically encoded memory (in preparation)
Media:GeneticEncodeMemory.pdf
Project List
1. Application
2. Grand Challenges
3. Start-up experiments
4. Review Articles
public transportation
Conceptual questions
• In the abstract level, how could we live with imperfect efficiency? No matter writing mechanism we choose in the end, the fraction of cells whose genome is actually rewritten will likely to be significantly less than a hundred percent.
• What are the common/ different challenges between writing memory to DNA versus gene therapy/ transgenic?
TO DO List
• Write up the detail structure and mechanism of integrase
• Take a look at how virus hijack a host and take control of host machinery (i.e. look at Covert's large
scale viral-bacterial models). May be the first step for engineering a cell it to modify the virus to control the cell the way we want.
• discuss HT-in vivo protein evolution project with Jennifer, James, Quake's pp
• Maybe I should start focusing on specific memory encoding problem..like counting the number of cell cycle.
..many signaling protein rise and fall in each cell cycle, so as the copy number of genome..we might be able to make use of them.
Recent changes
Personal tools
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:30:13.000Z
|
qzvkdxlimq5usmfaewniky6lujyjbhvj
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:61204",
"uncompressed_offset": 216969822,
"url": "quotationsbook.com/quote/25549/",
"warc_date": "2013-11-22T14:35:21.000Z",
"warc_filename": "<urn:uuid:81ae3948-2f99-43b9-9d7c-62fa7a85c520>",
"warc_url": "http://quotationsbook.com/quote/25549/"
}
|
cccc_CC-MAIN-2013-20
|
Quotation added by staff
Why not add this quote to your bookmarks?
Marriage is one long conversation, checkered by disputes. Stevenson, Robert Louis
This quote is about marriage · Search on Google Books to find all references and sources for this quotation.
A bit about Stevenson, Robert Louis ...
Robert Louis (Balfour) Stevenson (November 13 1850 - December 3 1894), was a Scottish novelist, poet, and travel writer, and a leading representative of Neo-romanticism in English literature. He was the man who "seemed to pick the right word up on the point of his pen, like a man playing spillikins", as G. K. Chesterton put it. He was also greatly admired by many authors such as Ernest Hemingway, Rudyard Kipling, Vladimir Nabokov and others. Most modernist writers dismissed him, however, because he was popular and did not write within their narrow definition of literature. It is only recently that critics have begun to look beyond Stevenson's popularity and allow him a place in the canon.
These people bookmarked this quote:
More on the author
This quote around the web
Loading...
Search Quotations Book
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:42:28.000Z
|
x4kzudkegr5br55qqsvss23aea4dyea7
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:61205",
"uncompressed_offset": 216976465,
"url": "quotationsbook.com/quote/40245/",
"warc_date": "2013-11-22T14:35:21.000Z",
"warc_filename": "<urn:uuid:81ae3948-2f99-43b9-9d7c-62fa7a85c520>",
"warc_url": "http://quotationsbook.com/quote/40245/"
}
|
cccc_CC-MAIN-2013-20
|
Quotation added by staff
Why not add this quote to your bookmarks?
You take my life when you do take the means whereby I live. Shakespeare, William
Excerpt from The Grammar of English Grammars · This quote is about unemployment · Search on Google Books to find all references and sources for this quotation.
A bit about Shakespeare, William ...
Born ca. 1564 and died ca. 1616 during the Renaissance period (1450-1599). One of the greatest writers of all time, Shakespeare, the peerless poet of the Sonnets and the creator of such dramatic masterpieces as Romeo and Juliet, Hamlet, and King Lear, is a playwright of paradigmatic originality. In his discussion of the Western literary canon, critic Harold Bloom declared: "Shakespeare and Dante are the center of the Canon because they excel all other Western writer in cognitive acuity, linguistic energy, and power of invention." However, one could go a step further and suggest that Shakespeare defines the Western canon because he transcends it. If Shakespeare, as Ben Jonson declared, "was not of an age, but for all time," the great dramatist, one could argue, spoke to the ultimate concerns of humankind, regardless of period or cultural tradition.
These people bookmarked this quote:
More on the author
This quote around the web
Loading...
Search Quotations Book
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:22:08.000Z
|
pwqcdqkskkrhxoiioebbymttoikq5mnq
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:61206",
"uncompressed_offset": 216983180,
"url": "quotationsbook.com/quote/502/",
"warc_date": "2013-11-22T14:35:21.000Z",
"warc_filename": "<urn:uuid:81ae3948-2f99-43b9-9d7c-62fa7a85c520>",
"warc_url": "http://quotationsbook.com/quote/502/"
}
|
cccc_CC-MAIN-2013-20
|
Quotation added by staff
Why not add this quote to your bookmarks?
For what is liberty but the unhampered translation of will into act? Dante Alighieri
This quote is about action · Search on Google Books to find all references and sources for this quotation.
A bit about Dante Alighieri ...
Durante degli Alighieri, better known as Dante Alighieri or simply Dante, (c. June 1 1265 - September 13/14, 1321) was an Italian Florentine poet. His greatest work, la Divina Commedia (The Divine Comedy), is considered one of the greatest literary statements produced in Europe during the Middle Ages.
These people bookmarked this quote:
More on the author
This quote around the web
Loading...
Search Quotations Book
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:47:09.000Z
|
uhqt4qv74ftu5rmyewuf4ttzaiolo2v2
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:61207",
"uncompressed_offset": 220295459,
"url": "redsarmy.com/category/celticsroster/past/rayallen/page/5/",
"warc_date": "2013-11-22T14:35:21.000Z",
"warc_filename": "<urn:uuid:81ae3948-2f99-43b9-9d7c-62fa7a85c520>",
"warc_url": "http://redsarmy.com/category/celticsroster/past/rayallen/page/5/"
}
|
cccc_CC-MAIN-2013-20
|
Ray Allen
LeBron continues to recruit Ray Allen, troll Celtics fans
LeBron James doesn’t like the Celtics. He basically said so in a tweet after Jared Sullinger was drafted. In another tweet that same night he said: While watching the draft my son Bryce ask “Is Ray Allen gonna play for Heat”. I said “I don’t know, I hope so”. The possibility of Ray joining Miami [...]
July 4, 2012 John - Red's Army Free Agency, Ray Allen 30
Celtics Sneaker Madness 2
In a complete blowout, Ray’s Air Jordan VIII beat out Sasha’s Hyperdunks by 76 votes. The AJ VIII’s move on to the next round as expected. Next up, another one of Ray’s sweet p.e.’s goes against The Big Ticket and his XMas-themed Antas: [...]
July 3, 2012 KWAPT CeltKicks, Kevin Garnett, Ray Allen Comments Off
Deja Vu from the Summer of 2010 for Ray Allen
The Celtics had come within minutes of winning Banner 18 on the home floor of the most hated rival in the NBA. There were whispers all season long if this was it for the New Big Three Era. After all, it was year three of the three-year plan. Two of those big three members (Paul Piece [...]
July 3, 2012 Jay Celtics News, Free Agency, MrTrpleDouble10 Videos, Ray Allen 6
Ray Allen visiting Clippers, Heat
As confident as Doc Rivers might be that Ray Allen will be back, Ray will make the Celtics sweat a bit and give other teams a shot to secure his services. The 36-year-old free-agent guard will visit the Miami Heat on Thursday and the Los Angeles Clippers on Friday, according to a source, and [...]
July 3, 2012 John - Red's Army Free Agency, Ray Allen 15
Your Morning Dump… Where Green, Allen AND Terry might be signed
Every morning, we compile the links of the day and dump them here… highlighting the big storyline. Because there’s nothing quite as satisfying as a good morning dump. Boston Celtics coach Doc Rivers made his first phone call on Sunday, the official opening of free agency in the NBA, to Ray Allen. He said he does not [...]
July 2, 2012 John - Red's Army Free Agency, Ray Allen, Rumors, The Morning Dump 28
Free agency update: Ray taking his time, Nads wants back in
In this free agent frenzy, “take his time” could mean 24 hours. These teams can’t wait too long on guys. Doc Rivers told Marc Spears the Celtics “want to bring the band back together.” Remember Nenad Krstic? He is leaving CSKA Moscow. The Celtics still hold his Bird rights. If Brandon Bass were to leave, [...]
July 1, 2012 Chuck - Red's Army Celtics News, Ray Allen 15
Rumor: C’s willing do double Miami’s offer to Ray?
Source: Celtics willing to double (in terms of $) Heat offer to Ray Allen. Will give 2 years/$12 million. Heat can offer only $3 mill a yr — Chris Broussard (@Chris_Broussard) July 1, 2012 The Boston Celtics are clearly not as ready to move on from Ray Allen as we thought. There was mention of [...]
July 1, 2012 John - Red's Army Ray Allen, Rumors 12
Your Morning Dump… Add Jason Terry to the long list of potential shooting guards
Every morning, we compile the links of the day and dump them here… highlighting the big storyline. Because there’s nothing quite as satisfying as a good morning dump. Faced with the possibility of losing Ray Allen, the Boston Celtics are pursuing Dallas Mavericks free-agent guard Jason Terry, league sources told Yahoo! Sports. The Celtics are [...]
July 1, 2012 Chuck - Red's Army Celtics News, Ray Allen, The Morning Dump 11
Celtics Sneaker Madness II
Our first poll has ended, and Rajon Rondo’s Nike Foamposite “Galaxy” are moving on to round 2. They beat out his Nike Hyperenforcers by grabbing a little over 60% of your votes. Now on to seeds #2 and #31.. [...]
June 30, 2012 KWAPT CeltKicks, Rajon Rondo, Ray Allen 2
Rumor: Suns serious contenders for Ray Allen
Yahoo’s Adrian Wojnarowski says there is mutual interest between Ray Allen and the Phoenix Suns: The Phoenix Suns have surfaced as serious contenders to sign Boston Celtics free agent Ray Allen, league sources told Yahoo! Sports. Ray Allen will become a free agent after spending the past five seasons with the Celtics. Allen, 37, is [...]
June 29, 2012 Chuck - Red's Army Around the NBA, Celtics News, Ray Allen, Rumors 27
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:27:26.000Z
|
wfbobmwcx7l2gqqges26fh67drvhrfgu
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:61212",
"uncompressed_offset": 241413568,
"url": "scienceroll.com/2008/06/13/ahead-of-google-health-and-healthvault-pointone/",
"warc_date": "2013-11-22T14:35:21.000Z",
"warc_filename": "<urn:uuid:81ae3948-2f99-43b9-9d7c-62fa7a85c520>",
"warc_url": "http://scienceroll.com/2008/06/13/ahead-of-google-health-and-healthvault-pointone/"
}
|
cccc_CC-MAIN-2013-20
|
Skip to content
Ahead of Google Health and HealthVault: PointOne
Google Health and Microsoft HealthVault seem to be the leading forces in the market of electronic health records. Now I would like to show you something that can shape the future of healthcare. Robert S. Pothier, the President and CEO of PointOne Systems, answered some of my questions about the RedBox system.
• Please tell us what RedBox is about.
RedBox is the core technology of PointOne. It is a software that takes in patient information from a variety of sources, analyzes the information based on established medical best practices, research findings and our own algorithms, and then provides reports that can focus on overall health assessments, risks and next steps.
• What do I need to do to use it?
Although RedBox has been in development since 1998 and PointOne has been marketing its capability since 2001, the tool has not been available at a consumer level until this year. PointOne is now working on interfaces that will allow consumers direct access. At the end of July PointOne will launch a website called ClearSense that will allow consumers to get reports directly and use their Personal Health Records as a source of information for the reports. The new website will be Beta tested with a select group for a short time and then available to the public for free initially.
• Why do you think it is beneficial to have online health records?
Consumers need to be in control of their own healthcare and having immediate access to our own health records is key to that. If we expect individuals to manage their own health, they need the data to do so. It is ridiculous that I can’t see everything that’s been done to me, my wife or my children from a health perspective in one place. How can I monitor my blood pressure or cholesterol if I don’t have access to that data over time? The doctor has it in his records, along with my immunizations and other things. Why don’t I have it? We talk about it being “private” and “confidential” but right now it’s only “private” and “confidential” to the doctor. For me it’s just a hassle to get access to it.
• Where does the health data come from that is used in RedBox?
Initially the data will come directly from the consumer (answers to a questionnaire) or from a PHR (likely not a lot of these at first). Eventually, however, we’d like to see RedBox access data from anywhere health data resides, whether it’s a fitness club, blood donation center or even home monitoring devices.
• In some of the reports you published, there are action items that can improve my health (e.g. get an annual physical exam or schedule a hypertension evaluation). Are these suggestions made by physicians or this is an automatic feature of the software?
This is an automatic feature of the software. The reports we provide are not dispositive, meaning we don’t say “you have diabetes” or “you have breast cancer”. That’s for a doctor to decide. However, our reports are designed to be educational. In addition to learning something about yourself, it also lists what you should be doing to monitor your health or providing information about tests you should consider. For example, many women do not know that the BRCA1/2 tests are even available. If you had a family history of breast or cervical cancer on one of our reports, the action item would mention the test as something to consider. It’s pushing the right information to the right people.
• What do you expect from the next months? How many users do you think will register?
We do not expect that this is a technology that will explode onto the scene. The use of this technology will be a gradual development as PHRs develop, as people become use to the idea that these reports are possible, as health data becomes more consolidated and cleaner. We use the following analogy to describe the process:
(True Story: http://www.niagarakite.com/history.html) – In 1847 in the United States Charles Ellet was trying to build a suspension bridge over the Niagara Falls gorge. The gorge was 800 feet across and 225 feet deep and the river was very swift. In order to get the suspension cables across the gorge they needed a way across that didn’t involve hiking down, taking the boat across and going back up the other side. So, Mr. Ellet sponsored a kite flying contest to get one thread across the gorge. In 1948 a 15 year old boy got his kite across and won the contest. Mr. Ellet used that single thread to tie ever-increasing gauges of string, rope, wire and ultimately the steel wire cables that supported the bridge.
PointOne has the same approach. We are trying to build the bridge of health data analytics being accessible to everyone. Initially, however, we realize we will need to cast some small threads across and pull ever increasing applications across before we will be able to accomplish our goal in full.
The future of healthcare IT is the analytics. Right now everyone’s focused on the collection, management, movement and protection of health data. That’s an IT exercise. The eventual holy grail of healthcare IT will be the analysis of that data to provide information to the ultimate consumer.
Check out more about it at PointOne.
About these ads
Follow
Get every new post delivered to your Inbox.
Join 224 other followers
%d bloggers like this:
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:18:53.000Z
|
q6hjxcrb3wk7k4duipvj7rbxzpyctfdi
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:61231",
"uncompressed_offset": 261302428,
"url": "strategywiki.org/wiki/Chrono_Trigger/We",
"warc_date": "2013-11-22T14:35:21.000Z",
"warc_filename": "<urn:uuid:81ae3948-2f99-43b9-9d7c-62fa7a85c520>",
"warc_url": "http://strategywiki.org/wiki/Chrono_Trigger/We're_Back!"
}
|
cccc_CC-MAIN-2013-20
|
Chrono Trigger/We're Back!
From StrategyWiki, the video game walkthrough and strategy guide wiki
Jump to: navigation, search
We're Back! (1000 A.D. second time)
Back to familiar ground.
You'll pop back into the present at the Millennial Fair, right where you left off. Lucca will leave, and ask you to escort Marle back to the castle. You can buy some more weapons and armor while you're in the area but it probably won't be necessary and you'll find a Lode Sword soon anyway. You can also go back through the gate to 600 A.D. if you really want but it'll be just the same as you left it.
This is your last chance to take care of things at the fairgrounds, see The Millennial Fair for a list of things you can do to affect the outcome of your upcoming trial. When you're ready, head over to Guardia forest, 400 years older than when you last left it. Search the bottom right area for a Power Tab, your third one so far, if you didn't already grab it before your journey in the past.
[edit] The Trial
The Trial
As for how things break down at the trial, this is the best that I've been able to determine so far:
• 1st Juror: Guilty if you claim the fortune tempted you just a little bit OR if you tried to sell the pendant.
• 2nd Juror: Guilty if you talked to the little girl and didn't bring her back her cat. The outcome of this juror varies, however:
1. If you never talk to the little girl who's missing her cat she won't show up in the trial and that juror will vote Not Guilty.
2. If you talk to the little girl who's missing her cat and don't bring it to her, she'll testify against you and that juror will vote Guilty.
3. If you rescue the cat BEFORE talking to her, she'll show up in the trial and the juror will vote innocent.
So, if you want to be perfectly safe you could never talk to her, or just bring her the cat before talking to her.
• 3rd Juror: Guilty if you tried to drag Marle away from the candy booth so she utters the "kidnapper" line.
• 4th Juror: Guilty if you admit the fortune tempted you OR if you picked up the pendant before talking to Marle.
• 5th Juror: Guilty if you admit the fortune tempted you.
• 6th Juror: Guilty if you stole the man's lunch.
• 7th Juror: Guilty if you lied at any point in the trial, either by claiming Marle started it, or by claiming you never stole anything when you did. He doesn't seem to vote Guilty if you lied about not being tempted however when you tried to sell the pendant. Also if you lie twice he still votes Guilty and no one else does.
[edit] For the Best Outcome
• Rescue the little girl's cat, although it works just as well if you just never talk to her, or bring her the cat without talking to her first.
• Don't eat the lunch.
• Don't drag Marle away from the candy booth
• Don't try to sell her pendant
• Talk to her before picking up her pendant
• Tell the truth during the trial, admit you started it and if you stole something admit it
• Say you weren't tempted by the fortune at all, not even a little bit (regardless of your actions).
And if you're going for completely guilty, do the exact opposite, and make sure you talk to the little girl with the cat and don't give it back to her. The second juror is questionable so getting all innocent can be hard, and regardless of what happens at the trial you'll still be sent to prison where the chancellor will change your verdict if he doesn't like it. If you get four innocent jurors, a bare majority, you'll have a gift of one Ether waiting in prison. If you get five innocent, you'll get two Ethers. Six innocent jurors, three Ethers, and if all seven vote innocent you'll get six Ethers.
[edit] Challenging Lavos
In a New Game + once again, as soon as you hop back into the present you can step on the right telepod to warp to fight Lavos. Beat him now and you'll see the Frog Ending. You'll only have Crono and Marle to work with so it will be a tough one. The ending basically shows what might have happened if you left 600 A.D. for good at that point, King Guardia got sick not too much later, and Frog might have returned to marry Leene.
Social networking
Personal tools
Namespaces
Variants
Views
Actions
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:41:07.000Z
|
74h72lpxxmgfc2642bxr3ggmyf3grktn
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:61241",
"uncompressed_offset": 282903551,
"url": "ubuntuforums.org/showthread.php?goto=nextnewest&t=2014691",
"warc_date": "2013-11-22T14:35:21.000Z",
"warc_filename": "<urn:uuid:81ae3948-2f99-43b9-9d7c-62fa7a85c520>",
"warc_url": "http://ubuntuforums.org/showthread.php?t=2014691&goto=nextnewest"
}
|
cccc_CC-MAIN-2013-20
|
Results 1 to 1 of 1
Thread: Ubuntu Weekly Newsletter Issue 273
1. #1
Join Date
Mar 2005
Location
San Francisco, CA, USA
Beans
379
Distro
Xubuntu 12.04 Precise Pangolin
Ubuntu Weekly Newsletter Issue 273
Welcome to the Ubuntu Weekly Newsletter, Issue 273 for the week July 2 - 8, 2012.
Links to UWN
In This Issue
• Ubuntu Stats
• Ubuntu-BR-SC LoCo Team Blog Launches New Visual Identity
• Launchpad News
• EC2 S3 Mirrors globally available
• Lucas Nussbaum: Introducing the Debian Maintainer Dashboard -- help needed!
• Lubuntu Blog: Quantal UI Improvements
• Nicholas Skaggs: Call for Testing: 12.10 kernel on 12.04 -- Part Deux
• Daniel Holbach: Making better apps possible
• Jonathan Carter: Facebook ads for MOTU?
• James Henstridge: u1ftp: a demonstration of the Ubuntu One API
• Ubuntu server 12.04: Fast and flexible
• Why Google and Ubuntu don't say "Linux"
• Shuttleworth: Why Windows 8 made us ditch GPL Linux loader
• In The Blogosphere
• In Other News
• Other Articles of Interest
• Featured Podcasts
• Weekly Ubuntu Development Team Meetings
• Upcoming Meetings and Events
• Updates and Security for 8.04, 10.04, 11.04, 11.10 and 12.04
• And much more!
Ubuntu Stats
Bug Stats
• Open (93884) +31 over last week
• Critical (71) +1 over last week
• Unconfirmed (48228) -75 over last week
As always, the Bug Squad needs more help. If you want to get started, please see https://wiki.ubuntu.com/BugSquad
Translation Stats Precise
• English (Australia) (2) -512 over last week
• Spanish (10787) -61 over last week
• English (United Kingdom) (20268) -424 over last week
• Bosnian (37161) -52 over last week
• German (46257) -56 over last week
Remaining strings to translate in Ubuntu 12.04 "Precise Pangolin", see more at: https://translations.launchpad.net/ubuntu/precise/ and https://wiki.ubuntu.com/Translations
Ubuntu Brainstorm Top this week
Ubuntu Brainstorm is a community site geared toward letting you add your ideas for Ubuntu. You can submit your own idea, or vote for or against another idea. http://brainstorm.ubuntu.com/
Ask Ubuntu Top 5 Questions this week
Ask (and answer!) your own questions at http://askubuntu.com
LoCo News
Ubuntu-BR-SC LoCo Team Blog Launches New Visual Identity
Tiago Hillderbrandt presents a new design for Ubuntu-BR-SC LoCo Team's blog, called Ubuntu Way.
http://tiagohillebrandt.eti.br/blog/...-identity.html
Launchpad News
Meet Vincent Ladeuil who works in the Blue Squad on Launchpad
Laura Czajkowski interviews Vincent Ladeuil, one of the current Blue Squad maintainers, about his work at Canonical, role/work at Launchpad, free software experience and much more.
http://blog.launchpad.net/meet-the-d...d-on-launchpad
Meet Martin Packman in the Blue squad
Laura Czajkowski interviews Martin Packman, one of the current Blue Squad maintainers, about his work at Canonical, role/work at Launchpad, free software experience and much more.
http://blog.launchpad.net/meet-the-d...the-blue-squad
We're hiring software engineers to work on cloud projects in Canonical
Laura Czajkowski announces that Launchpad is hiring software engineers to work on cloud projects in Canonical. Czajkowski states: "Alongside four or five other engineers, you'll be part of an agile engineering squad, in Canonical's Launchpad team, working in either a new development or maintenance role on a different cloud-related project every six to nine months. Your work will touch projects such as OpenStack, MAAS, AWSome and the Launchpad SaaS developer tools platform."
http://blog.launchpad.net/were-hirin...s-in-canonical
Are you a technical writer -Want to work with amazing people and great team- Come join us
Laura Czajkowski announces that Launchpad is hiring technical writers. Czajkowski states: "As technical writer in Canonical's Launchpad team you'll find the best way to ensure that users and developers of our software understand its benefits and how to use it. Whether it's traditional documentation, screen casts or blog posts, you'll find it easy to choose the right medium and you'll have all the skills necessary to produce compelling, involving and effective content."
http://blog.launchpad.net/were-hirin...m-come-join-us
Ubuntu Cloud News
EC2 S3 Mirrors globally available
Ben Howard writes that in "an effort to improve reliability of the Ubuntu archive mirrors, Canonical undertook a project to host the archives utilized by EC2 instances with Amazon's S3" and announces that, following the move of us-east-1 to Amazon S3, all remaining EC2 regions have now been migrated to S3.
http://utlemming.azurewebsites.net/?p=451
The Planet
Lucas Nussbaum: Introducing the Debian Maintainer Dashboard -- help needed!
Lucas Nussbaum introduces Debian Maintainer Dashboard. Some of the dashboard's features include:
• Reports buildd issues (failed builds)
• Upstream status monitor that works (UDD has its own)
• Knows about teams' VCS (if your team uses PET) and displays the current version in the VCS
• Lists packages you maintain or co-maintain, and also the packages you showed interest in by subscribing to them on the PTS
Nussbaum also writes how he needs help with web design. So, anyyone who is interested can contact him for further information.
http://www.lucas-nussbaum.net/blog/?p=722
Lubuntu Blog: Quantal UI Improvements
The Lubuntu Artwork Team is working toward revamping many of the UI elements, including an improved icon theme and a redesigned GTK2/GTK3 theme. The Wallpaper Contest is still ongoing, and submissions are still being accepted through Flickr.
http://lubuntublog.blogspot.com/2012...rovements.html
Nicholas Skaggs: Call for Testing: 12.10 kernel on 12.04 -- Part Deux
Nicolas Skaggs announces a call for kernel testing, together with instructions. Skaggs states: "As announced earlier the kernel team is looking for some folks to help bring the 12.10 kernel to 12.04. Once 12.10 has been released, the team wants to enable newer hardware support via the kernel for the LTS version of the desktop."
http://www.theorangenotebook.com/201...l-on-1204.html
Daniel Holbach: Making better apps possible
Daniel Holbach posts about the recent Ubuntu Apps Sprint and covers their progress, including:
• Number of bugs fixed in arb-lint.
• Smaller issues in packaging which were related to bugs in python-distutils-extra are fixed.
• Problems with apport hooks in apps which are now solved.
• Allison's Trello board set up and review of many apps.
http://daniel.holba.ch/blog/2012/07/...apps-possible/
Jonathan Carter: Facebook ads for MOTU?
Jonathan Carter writes about ways how to attract more people to Ubuntu as a MOTU and discusses his experience with a Facebook ad where he states: "The ad was displayed a total of 20,661 times. That's what Facebook considers it's "outreach". So out of the 129,520 users who were targeted, it was displayed for 20,661 of them. 59 people clicked on the link (that's about as far as you can get with $25).
Did it get more people interested in contributing to Ubuntu? I have no idea. This experiment was mostly to see what $25 gets you in ads."
Carters says he still prefers Google+ as the way for attracting more people to Ubuntu since, as he writes, there are more geeky people who are eager to share information.
http://jonathancarter.org/2012/07/04...-ads-for-motu/
James Henstridge: u1ftp: a demonstration of the Ubuntu One API
James Henstridge shares a small program he wrote to showcase the power of the Ubuntu One API. The program makes a users' files available via a FTP daemon running on localhost, meaning that a users' files can be made available by use of a file manager or FTP client without needing the actual Ubuntu One client installed.
http://blogs.gnome.org/jamesh/2012/07/05/u1ftp/
Canonical News
Ubuntu server 12.04: Fast and flexible
Canonical announces a webinar on the deployment of Ubuntu server.
"Join Matthew Revell and Mark Baker from the Ubuntu Server team to learn about ... new technologies and how they can help you benefit from the same infrastructure as the world's leading web scale companies."
http://www.canonical.com/about-canon...t-and-flexible
In The Press
Why Google and Ubuntu don't say "Linux"
Steven J. Vaughan-Nichols of ZDNet has some thoughts of why Ubuntu and Google "don't use the "L" word" and writes "You see this isn't about reality. It's about perception. Canonical and Google rather than try to fight how Linux is seen by most people ... have chosen to dodge the Linux brand issue entirely."
http://www.zdnet.com/why-google-and-...ux-7000000221/
Shuttleworth: Why Windows 8 made us ditch GPL Linux loader
Gavin Clarke of The Register reports on Mark Suttleworth's explanation as to why they decided to switch from the GPL licensed GRUB2 boot loader to Intel's efilinux. Clarke writes: "According to Shuttleworth, this decision was taken because there is too much uncertainty surrounding the terms of the FSF's GPL v3 and its implications for Ubuntu's secret signing key."
http://www.theregister.co.uk/2012/07...responds_uefi/
In The Blogosphere
Does Ubuntu Need More "Apps"?
The VAR Guy shares thoughts about the tech ecosystem that is pushing "App" development and Canonical's own recent push to add more "Apps" to the Ubuntu operating system. He expresses concern over changing Ubuntu's packaging and software-distribution system to accommodate the new "App" developers.
http://www.thevarguy.com/2012/07/01/...eed-more-apps/
Ubuntu Security: Is There a Threat?
Matt Hartley of Datamation writes about some of the threats that exist on Ubuntu (and Linux) when it comes to keeping the system secure. Hartley covers the danger of unknown commands, antivirus software to help protect Windows systems your Linux machine may share a network with: firewalls, file sharing, updates and encryption and more.
http://www.datamation.com/open-sourc...-threat-1.html
Software Updater updated with refreshed look in Ubuntu 12.10
Razvi of iloveubuntu.com covers the renaming of Update Manager to Software Updater, including screenshots of style changes also made with this new version.
http://iloveubuntu.net/software-upda...ok-ubuntu-1210
Ubuntu Shaped Crop Circles Appear in Italy
Joey Sheddon, OMG! Ubuntu, posts about Ubuntu-shaped impressions which appeared in wheat fields in Italy. There are questions about who could have possibly done it. Sheddons states: "So what is causing the grain-groping geometry? UFOs? Aliens? Pranksters? The answer as to what is making them - and why they chose to draw the Ubuntu logo - remains a mystery."
http://www.omgubuntu.co.uk/2012/07/u...ppear-in-italy
ARM Wrestling: Fedora 17 vs. Ubuntu Linux
Michael Larabel of Phoronix installs ARM versions of Fedora and Ubuntu on a PandaBoard and shares benchmarks. He concludes "While Fedora 17 on ARM is progressing nicely, unfortunately due to the OMAP4460 PandaBoard ES not being properly supported with its default kernel for the PandaBoard, the performance is sub-par to Ubuntu. However, as ARM hardware becomes increasingly common for low-powered desktops, it will be interesting to see how the major Linux distributions wrestle it out on the ARM front."
http://www.phoronix.com/scan.php?pag...restling&num=1
Red Hat & Ubuntu's UEFI solutions not good for FOSS
Chris Hall of FOSS Force writes about concerns with both Red Hat and Ubuntu's UEFI solutions, and says "Instead of cooperating with Microsoft's bid to put a lock on the operating system market, we should be fighting them. For starters, it would appear there are some antitrust issues that could possibly be pursued. Maybe Google could put some pressure on companies making Android ARM devices to just say no to Secure Boot without an easy-to-use "off" button."
http://fossforce.com/2012/07/red-hat...ons-good-foss/
In Other News
4 Fine Linux ARM Distros
Carla Schroder writes for Linux.com writes about the increase in interest in ARM for linux and shares details about "four good distros cram-full of ARM fun:" Arch Linux, Ubuntu, Debian and Fedora.
https://www.linux.com/learn/tutorial...x-arm-distros-
Other Articles of Interest
Featured Podcasts
Fullcircle Podcast Episode 29 - The Great Train Poddery
Full Circle presents their newly formatted podcast hosted by members of Blackpool LUG. Topics in this show include:
• Raspberry Jam Manchester Review
• CHUG - An Impromptu Recording
• Tony's Interviews From the Event
• ROUNDTABLE INTERVIEW - The Hosts and Ben Nuttall
• Linux News
• Review of Full Circle Magazine issue #61
• Feedback, plans for the future and upcoming events
More details and podcast downloads in OGG and MP3 format available here:
http://fullcirclemagazine.org/2012/0...train-poddery/
Ubuntu Podcast from the UK LoCo: S05E10 - The Tale of the Pie and the Patty Pan
"Alan Pope & Mark Johnson (with the spirit of Tony Whitmore and Laura Cowen egging us on via IRC) move to Studio B for the tenth episode of Season Five of the Ubuntu Podcast from the UK LoCo Team!"
Topics included:
• Writing Unity Lenses and ASP pages.
• Review the games available via the Humble Bundle and via the Ubuntu Software Centre.
• Interview Michael Hall about the Ubuntu App Developer Showdown
• Victoria Pritchard and Robin Catling dig up another audio recording of an episode of 'Tomorrow's Technology Today' from the Herbert Maxwell Fosdyke Curmudgeon Memorial Sound Archive.
• Details about their competition to give away one of a brand new highly sought after Raspberry Pis
• News and upcoming events
More details and podcast downloads in OGG and MP3 format available here:
http://podcast.ubuntu-uk.org/2012/07...the-patty-pan/
Weekly Ubuntu Development Team Meetings
Upcoming Meetings and Events
For upcoming meetings and events please visit the calendars at fridge.ubuntu.com: http://fridge.ubuntu.com/calendars/
Updates and Security for 8.04, 10.04, 11.04, 11.10 and 12.04
Security Updates
Ubuntu 8.04 Updates
End of life - April 2013 (Server)
Ubuntu 10.04 Updates
End of Life - April 2013 (Desktop) - April 2015 (Server)
Ubuntu 11.04 Updates
End of Life - October 2012
Ubuntu 11.10 Updates
End of Life - April 2013
Ubuntu 12.04 Updates
End of Life - April 2017
Subscribe
Get your copy of the Ubuntu Weekly Newsletter delivered each week to you via email at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-news
Archives
You can always find older Ubuntu Weekly Newsletter issues at: https://wiki.ubuntu.com/UbuntuWeeklyNewsletter
Additional Ubuntu News
As always you can find more news and announcements at:
http://www.ubuntu.com/news
and
http://fridge.ubuntu.com/
Conclusion
Thank you for reading the Ubuntu Weekly Newsletter.
See you next week!
Credits
The Ubuntu Weekly Newsletter is brought to you by:
• Elizabeth Krumbach
• Jasna Bencic
• Nathan Dyer
• mikewhatever
• Matt Rudge
• And many others
Glossary of Terms
Other acronyms can be found at https://wiki.ubuntu.com/UbuntuWeeklyNewsletter/glossary
Ubuntu - Get Involved
The Ubuntu community consists of individuals and teams, working on different aspects of the distribution, giving advice and technical support, and helping to promote Ubuntu to a wider audience. No contribution is too small, and anyone can help. It's your chance to get in on all the community fun associated with developing and promoting Ubuntu. http://www.ubuntu.com/community/participate
Feedback
This document is maintained by the Ubuntu Weekly News Team. If you have a story idea or suggestions for the Weekly Newsletter, join the Ubuntu News Team mailing list at https://lists.ubuntu.com/mailman/lis...untu-news-team and submit it. Ideas can also be added to the wiki at https://wiki.ubuntu.com/UbuntuWeeklyNewsletter/Ideas. If you'd like to contribute to a future issue of the Ubuntu Weekly Newsletter, please feel free to edit the appropriate wiki page. If you have any technical support questions, please send them to ubuntu-users@lists.ubuntu.com.
Except where otherwise noted, content in this issue is licensed under a Creative Commons Attribution 3.0 License - http://creativecommons.org/licenses/by-sa/3.0/
Last edited by elizabeth; July 17th, 2012 at 05:37 AM.
Bookmarks
Posting Permissions
• You may not post new threads
• You may not post replies
• You may not post attachments
• You may not edit your posts
•
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:39:39.000Z
|
u63dpruqoah7r5c4fhjfh6unlytvmka3
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:61267",
"uncompressed_offset": 309275215,
"url": "www.abs.gov.au/AUSSTATS/abs%40.nsf/Latestproducts/8111.0Abbreviations12010?issue=2010&prodno=8111.0&tabname=Notes",
"warc_date": "2013-11-22T14:35:21.000Z",
"warc_filename": "<urn:uuid:81ae3948-2f99-43b9-9d7c-62fa7a85c520>",
"warc_url": "http://www.abs.gov.au/AUSSTATS/abs@.nsf/Latestproducts/8111.0Abbreviations12010?opendocument&tabname=Notes&prodno=8111.0&issue=2010&num=&view="
}
|
cccc_CC-MAIN-2013-20
|
Australian Bureau of Statistics
Celebrating the International Year of Statistics 2013
ABS Home > Statistics > By Catalogue Number
8111.0 - Research and Experimental Development, Higher Education Organisations, Australia, 2010 Quality Declaration
Latest ISSUE Released at 11:30 AM (CANBERRA TIME) 25/05/2012
Page tools: Print Page Print All RSS Search this Product
ABBREVIATIONS
$'000 thousand dollars
$m million dollars
ABS Australian Bureau of Statistics
ACT Australian Capital Territory
ANZSRC Australian and New Zealand Standard Research Classification
Aust. Australia
CRC Cooperative Research Centre
excl. excluding
FOR Fields of Research
GDP Gross Domestic Product
GSP Gross State Product
HERD Higher Education Expenditure on R&D
NSW New South Wales
NT Northern Territory
OECD Organisation for Economic Co-operation and Development
PYE Person Years of Effort
Qld Queensland
R&D Research and Experimental Development
SA South Australia
SEO Socio-Economic Objective
Tas. Tasmania
Vic. Victoria
WA Western Australia
© Commonwealth of Australia 2013
Unless otherwise noted, content on this website is licensed under a Creative Commons Attribution 2.5 Australia Licence together with any terms, conditions and exclusions as set out in the website Copyright notice. For permission to do anything beyond the scope of this licence and copyright terms contact us.
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:30:32.000Z
|
m5xisf526kkv7wxo2gw3c7ayokwljng3
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:61268",
"uncompressed_offset": 309282718,
"url": "www.abs.gov.au/AUSSTATS/abs%40.nsf/second%2Blevel%2Bview?issue=Feb+2000&prodno=1303.2&prodno=1303.2&tabname=Past+Future+Issues&viewtitle=Monthly+Summary+of+Statistics%2C+Victoria~Feb+2000~Previous~21%2F03%2F2000",
"warc_date": "2013-11-22T14:35:21.000Z",
"warc_filename": "<urn:uuid:81ae3948-2f99-43b9-9d7c-62fa7a85c520>",
"warc_url": "http://www.abs.gov.au/AUSSTATS/abs@.nsf/second+level+view?ReadForm&prodno=1303.2&viewtitle=Monthly%20Summary%20of%20Statistics,%20Victoria~Feb%202000~Previous~21/03/2000&tabname=Past%20Future%20Issues&prodno=1303.2&issue=Feb%202000&num=&view="
}
|
cccc_CC-MAIN-2013-20
|
Australian Bureau of Statistics
Celebrating the International Year of Statistics 2013
ABS Home > Statistics > By Release Date
1303.2 - Monthly Summary of Statistics, Victoria, Feb 2000
Previous ISSUE Released at 11:30 AM (CANBERRA TIME) 21/03/2000
Past Releases
First Release
• First Issue: Oct 2000
© Commonwealth of Australia 2013
Unless otherwise noted, content on this website is licensed under a Creative Commons Attribution 2.5 Australia Licence together with any terms, conditions and exclusions as set out in the website Copyright notice. For permission to do anything beyond the scope of this licence and copyright terms contact us.
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:21:14.000Z
|
jqcuizntqasjwpihojqpvufk25roc2mv
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:61269",
"uncompressed_offset": 309290273,
"url": "www.abs.gov.au/AUSSTATS/abs%40.nsf/second%2Blevel%2Bview?issue=Jun+2009&prodno=1304.6&prodno=1304.6&tabname=Past+Future+Issues&viewtitle=Tasmanian+Key+Indicators~Jun+2009~Previous~14%2F07%2F2009",
"warc_date": "2013-11-22T14:35:21.000Z",
"warc_filename": "<urn:uuid:81ae3948-2f99-43b9-9d7c-62fa7a85c520>",
"warc_url": "http://www.abs.gov.au/AUSSTATS/abs@.nsf/second+level+view?ReadForm&prodno=1304.6&viewtitle=Tasmanian%20Key%20Indicators~Jun%202009~Previous~14/07/2009&tabname=Past%20Future%20Issues&prodno=1304.6&issue=Jun%202009&num=&view="
}
|
cccc_CC-MAIN-2013-20
|
Australian Bureau of Statistics
Celebrating the International Year of Statistics 2013
ABS Home > Statistics > By Release Date
1304.6 - Tasmanian Key Indicators, Jun 2009
Previous ISSUE Released at 11:30 AM (CANBERRA TIME) 14/07/2009
Past Releases
© Commonwealth of Australia 2013
Unless otherwise noted, content on this website is licensed under a Creative Commons Attribution 2.5 Australia Licence together with any terms, conditions and exclusions as set out in the website Copyright notice. For permission to do anything beyond the scope of this licence and copyright terms contact us.
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:37:22.000Z
|
2il4xz6nltp4ilikqfnijr5d6azsrgxg
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:61274",
"uncompressed_offset": 359785295,
"url": "www.bizsugar.com/DirectMarketing/mailchimp-vs-constant-contact-what-system-is-best-for-your-business/",
"warc_date": "2013-11-22T14:35:21.000Z",
"warc_filename": "<urn:uuid:81ae3948-2f99-43b9-9d7c-62fa7a85c520>",
"warc_url": "http://www.bizsugar.com/DirectMarketing/mailchimp-vs-constant-contact-what-system-is-best-for-your-business/"
}
|
cccc_CC-MAIN-2013-20
|
There’s a lot of buzz being generated about which email marketing services is the best to use. The two services gaining quite a bit of attention are Constant Contact and MailChimp. Let’s take a look at the two systems with the goal of helping you decide which program will work for your needs.
Who Voted for this Story
Subscribe
Cendrine Marrouat Makes Social Media A Work of Art @cendrinemedia
To reach a wider audience and sell more of whatever product you create in business today, it is first necessary to … More
Editor's Picks
Shazam! Meet Contributor of the Week Paul Cox...Congrats, Paul!
Got small business blog posts? Register and submit them today!
Add BizSugar buttons and plugins to your small biz toolkit!
See if you're one of our Top 10 Members this week!
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:27:17.000Z
|
2b7574ssmqu4kd32eharwgbojt3q6sxx
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:61275",
"uncompressed_offset": 359799472,
"url": "www.bizsugar.com/Marketing/is-blogging-sucking-the-life-out-of-you/",
"warc_date": "2013-11-22T14:35:21.000Z",
"warc_filename": "<urn:uuid:81ae3948-2f99-43b9-9d7c-62fa7a85c520>",
"warc_url": "http://www.bizsugar.com/Marketing/is-blogging-sucking-the-life-out-of-you/"
}
|
cccc_CC-MAIN-2013-20
|
Has your blog schedule got you feeling trapped. Its time to take a look at whose rules you are following, and change things to play your own game.
Who Voted for this Story
Subscribe
Paul Cox @SpinLessPlates Offers Business in a Bag
Paul Cox was looking for a way to cut back on the hours he was spending on his business. Like many entrepreneurs, Cox … More
Editor's Picks
Shazam! Meet Contributor of the Week Paul Cox...Congrats, Paul!
Add BizSugar buttons and plugins to your small biz toolkit!
Got small business blog posts? Register and submit them today!
See if you're one of our Top 10 Members this week!
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:18:49.000Z
|
fccc6incrqqvoco4pcykx5cemtlpvxqs
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:61276",
"uncompressed_offset": 359813853,
"url": "www.bizsugar.com/rockyourbiz/what-makes-blogging-a-good-foundation-of-your-writing-skills/",
"warc_date": "2013-11-22T14:35:21.000Z",
"warc_filename": "<urn:uuid:81ae3948-2f99-43b9-9d7c-62fa7a85c520>",
"warc_url": "http://www.bizsugar.com/rockyourbiz/what-makes-blogging-a-good-foundation-of-your-writing-skills/"
}
|
cccc_CC-MAIN-2013-20
|
Blogging has been very popular these days. Blogging is just like writing in your diary, the only difference is that when you right in a diary, you keep it privately while in blogging, you publish it online and let other people to read it.
Subscribe
Hesham Zebida: Working at "Working Together"
If you had to choose one job description for our latest BizSugar Contributor of the Week, Hesham Zebida, that job … More
Editor's Picks
Shazam! Meet Contributor of the Week Paul Cox...Congrats, Paul!
Add BizSugar buttons and plugins to your small biz toolkit!
Got small business blog posts? Register and submit them today!
See if you're one of our Top 10 Members this week!
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:29:20.000Z
|
m2jmhusxkhhxiftm5zbb2xe4d2464yam
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:61280",
"uncompressed_offset": 384775636,
"url": "www.ccsenet.org/journal/index.php/ibr/article/view/994",
"warc_date": "2013-11-22T14:35:21.000Z",
"warc_filename": "<urn:uuid:81ae3948-2f99-43b9-9d7c-62fa7a85c520>",
"warc_url": "http://www.ccsenet.org/journal/index.php/ibr/article/view/994"
}
|
cccc_CC-MAIN-2013-20
|
The Financial Process Reengineering Based on the Value Chain
Yinzhuang Zi
Abstract
The theory of the value chain management emphasizes to optimize and reorganize the internal resources of the enterprise, so that the enterprise can establish its long-term and stable competitive advantage. In order to gain a Larger share in the increasingly fierce and competitive market, most enterprises have adopted the value chain theory for reengineering business processes, so the financial Process Reengineering based on the value chain was studied.
This work is licensed under a Creative Commons Attribution 3.0 License.
International Business Research ISSN 1913-9004 (Print), ISSN 1913-9012 (Online)
Copyright © Canadian Center of Science and Education
To make sure that you can receive messages from us, please add the 'ccsenet.org' domain to your e-mail 'safe list'. If you do not receive e-mail in your 'inbox', check your 'bulk mail' or 'junk mail' folders.
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T10:00:38.000Z
|
p4txi6dozyzk6vipvwcbxr7c5qesxyav
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:61281",
"uncompressed_offset": 384781260,
"url": "www.ccsenet.org/journal/index.php/res/article/view/10802",
"warc_date": "2013-11-22T14:35:21.000Z",
"warc_filename": "<urn:uuid:81ae3948-2f99-43b9-9d7c-62fa7a85c520>",
"warc_url": "http://www.ccsenet.org/journal/index.php/res/article/view/10802"
}
|
cccc_CC-MAIN-2013-20
|
Measuring the Impact of Financial Crisis on International Markets: An Application of the Financial Stress Index
Apostolos G. Christopoulos, John Mylonakis, Christos Koromilas
Abstract
The scope of paper is to examine whether the recent financial crisis has had any impact on international capital markets and more precisely on the 4 primary international stock markets of England, France, Japan, the United States and Greece. The research is based on the use of the Financial Stress Index (FSI) from July 2005 until December 2008 and August 2009. Research results showed that the recent financial crisis has had a negative impact on all examined markets, with the Tokyo stock exchange being the one mostly affected. It was, also, found increased variability of performances following the start of the financial crisis, a fact that is indicative of the presence of conditional heteroscedasticity. As far as the Greek market is concerned, the recent financial crisis has not affected in general the credit expansion towards enterprises and households; however, it has affected the credit expansion to enterprises and households on a case-to-case basis.
Full Text: Untitled () PDF
This work is licensed under a Creative Commons Attribution 3.0 License.
Review of European Studies ISSN 1918-7173 (Print) ISSN 1918-7181 (Online)
Copyright © Canadian Center of Science and Education
To make sure that you can receive messages from us, please add the 'ccsenet.org' domain to your e-mail 'safe list'. If you do not receive e-mail in your 'inbox', check your 'bulk mail' or 'junk mail' folders.
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:28:06.000Z
|
ceo7dn22nm4fflme5l3lanz6256k7xo5
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:61285",
"uncompressed_offset": 408331403,
"url": "www.creativeapplications.net/tag/nyc/",
"warc_date": "2013-11-22T14:35:21.000Z",
"warc_filename": "<urn:uuid:81ae3948-2f99-43b9-9d7c-62fa7a85c520>",
"warc_url": "http://www.creativeapplications.net/tag/nyc/"
}
|
cccc_CC-MAIN-2013-20
|
Instead of AdBlock, enjoy ad-free CAN by becoming a member. Everybody wins!
nyc
10/05/2013 / Jobs
Company: Sub Rosa Location: NY, USA Type: Full-Time Category: Creative Code Description Do you like your computing physical? Do Sinatra, Python, and MongoDB get you excited? If so, we should get to know each other. Sub Rosa is looking for a Creative Technologist to join our team and work ...
07/05/2013 / Jobs-Featured
Company: PERCH Location: NY (Soho), USA Type: Full-Time Category: Creative Code Description New York startup Perch Interactive is seeking a talented, diligent and creative Software Engineer to help us build out our game-changing interactive retail platform. If you haven't seen PERCH in person, you can check it out at ...
05/04/2013 / Jobs-Archive
Company: MRY Location: NYC, USA Type: Full-Time Category: Coder Description We are looking for a junior ‘hybrid’ developer to work on both iPhone/iPad apps as well as standard desktop/mobile websites. Must be able to create beautifully crafted code, giving life to the Creative teams’ designs in a clean & ...
25/03/2013 / Jobs-Archive
Company: Bossa Digital Location: New York, USA Type: Freelance Category: Other Description Bossa is looking for a talented Front End Developer who is passionate about technology, and self-motivated to solve problems and come up with solutions. You must be detail oriented, organized, take pride in your work and ...
01/03/2013 / Jobs-Archive
Company: Your Majesty Co. Location: New York, USA Type: Freelance Category: Technologist Description As Your Majesty’s first Dev Ops Engineer you’ll be responsible for maintaining the performance, security and availability of our client’s web applications. Your Majesty’s dev team is small and agile. We work with many ...
22/02/2013 / Jobs-Archive
Company: Fake Love Location: New York, USA Type: Full-Time Category: Creative Code Description Fake Love is an experiential design production company that is looking for a full time developer who can help us make software for augmenting really unique experiences. We have worked with brands like Google, ...
12/02/2013 / Jobs-Archive
Company: Three Byte Intermedia Location: New York, United States Type: Full-Time Category: Technologist Description Three Byte Intermedia is a small custom software company based in NYC. We are looking for a skilled software engineer to join a small team working on several current projects. The software engineer will be ...
22/10/2012 / Jobs-Archive
Company: King & Partners Location: New York, USA Type: Freelance Category: Creative Code
12/10/2012 / Jobs-Archive
Company: School of Visual Arts Location: New York, USA Type: Full-Time Category: Web Designer
23/08/2012 / Jobs-Archive
Company: Motive Location: NYC, USA Type: Intern Category: Coder
21/08/2012 / Jobs-Archive
Company: The Barbarian Group Location: NY, USA Type: Full-Time Category: Technologist
27/07/2012 / Jobs-Archive
Company: Rockwell Group Location: New York, US Type: Seasonal/Temp Job Type: Creative Code
21/07/2012 / Jobs-Archive
Company: School of Visual Arts Location: New York, US Type: Full Time Job Type: Web Designer
18/07/2012 / Cinder
Created by NYC collective Breakfast and located in Manhattan’s Herald Square at 885 6th Ave and 32nd Street, the 23x12 foot display is made up of 44,000 electromagnetic spinning dots which each flip from black to white creating a moving ...
18/06/2012 / Jobs-Archive
Company: ESI Design Location: New York, USA Type: Freelance Job Type: Coder
06/04/2012 / Jobs-Archive
Company: Rocket Chair Media Location: NYC, US Category: Coder Type: Freelance Description Startup Electronic Narrative Company looking for a freelance iOS developer to begin work on an iPad application ASAP. The developer will work directly with the creative director and will be responsible for executing all software and ...
05/03/2012 / WebApp
At the best of times the relationship between cyclists and motorists is tense. Given that the amount of dedicated routes available to cyclists in many cities is quite limited, motorists that opt to stop or park in what should be ...
02/03/2012 / Jobs-Archive
Company: Stinkdigital Location: New York, USA Category: Other Type: Full Time Description About Us Stinkdigital is a world-class interactive production company consisting of a full-time staff of creatives, developers, designers, producers and directors who work as a team to make innovative interactive experiences. As a company, we make everything from ...
Page 1 of 212
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:38:35.000Z
|
nr3zefcmhwrmkpfjggvj43yx4mog5zpo
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:61295",
"uncompressed_offset": 470627393,
"url": "www.forensicswiki.org/w/index.php?redirect=no&title=Xmount",
"warc_date": "2013-11-22T14:35:21.000Z",
"warc_filename": "<urn:uuid:81ae3948-2f99-43b9-9d7c-62fa7a85c520>",
"warc_url": "http://www.forensicswiki.org/w/index.php?title=Xmount&redirect=no"
}
|
cccc_CC-MAIN-2013-20
|
Xmount
From Forensics Wiki
Jump to: navigation, search
xmount
Maintainer: Daniel Gillen
OS: Linux, Mac OS X
Genre: Image mounting
License: GPL
Website: www.pinguin.lu
Description taken from xmount project site on Pinguin's HQ:
xmount allows you to convert on-the-fly between multiple input and output harddisk image types. xmount creates a virtual file system using FUSE (Filesystem in Userspace) that contains a virtual representation of the input image.
The virtual representation can be in:
Input images can be:
In addition, xmount also supports virtual write access to the output files that is redirected to a cache file. This makes it possible to boot acquired harddisk images using QEMU, KVM, VirtualBox, VmWare or alike.
See Also
External Links
Personal tools
Namespaces
Variants
Actions
Navigation:
About forensicswiki.org:
Toolbox
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:21:14.000Z
|
4cjt5hkxpiwqslxh2yjgxx3fqmn5krvp
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:61303",
"uncompressed_offset": 487996846,
"url": "www.go4expert.com/contests/next-number-18-aug-2009-t19083/page2/",
"warc_date": "2013-11-22T14:35:21.000Z",
"warc_filename": "<urn:uuid:81ae3948-2f99-43b9-9d7c-62fa7a85c520>",
"warc_url": "http://www.go4expert.com/contests/next-number-18-aug-2009-t19083/page2/"
}
|
cccc_CC-MAIN-2013-20
|
Go4Expert Founder
19Aug2009,14:51 #11
Quote:
Originally Posted by shabbir
Lets see if after 24 hours what the OP replies to
Kshiteej, Its more than 24 hours and so please update the question and tell us who is the winner.
Contributor
19Aug2009,15:07 #12
Ans is 6121.
31-1 = 30 = (3)^3 +3
253-31 = 222 = (6)^3 + 6
991 -253 = 738 = (9)^3 + 9
2731 - 991 =1740 =(12)^3 + 12
so te ans will be 2731 + (15)^3 + 15 =6121
nimesh, xpi0t0s likes this
Go4Expert Founder
19Aug2009,15:11 #13
So Congrats xpi0t0s
xpi0t0s likes this
Invasive contributor
19Aug2009,16:12 #14
very nice one kshiteej...
Contributor
20Aug2009,09:51 #15
Thanks Mayjune and congrats xpi0t0s.
By the way what was your logic while calculating 6121? The same as of mine??
Invasive contributor
20Aug2009,10:01 #16
nice question kshiteej
Banned
20Aug2009,10:24 #17
Congrs xpi0t0s
Mentor
20Aug2009,14:54 #18
Quote:
Originally Posted by Kshiteej
Thanks Mayjune and congrats xpi0t0s.
By the way what was your logic while calculating 6121? The same as of mine??
Heh, no, I did it in a spreadsheet and made a BIG assumption...column A contained the original sequence in A1-A5; B2=A2-A1 and copied the formula to B3-B5, C3-C5, D4-D5 and E5. I assumed that was the end of it and that the next row, if it existed, would end with E6=E5 and worked backwards to find out what would be in D6, C6, B6 and A6, and that's where I got 6121 from.
Then I looked up the sequence in the sequences database as explained (and linked) earlier in the thread.
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:18:41.000Z
|
jqr5hk7tzijlwd6u6m4hq3shsywor2bm
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:61305",
"uncompressed_offset": 495290594,
"url": "www.grandtheftwiki.com/Marty_Jay_Williams",
"warc_date": "2013-11-22T14:35:21.000Z",
"warc_filename": "<urn:uuid:81ae3948-2f99-43b9-9d7c-62fa7a85c520>",
"warc_url": "http://www.grandtheftwiki.com/Marty_Jay_Williams"
}
|
cccc_CC-MAIN-2013-20
|
Marty Jay Williams
From Grand Theft Wiki
Jump to: navigation, search
Character
Marty Jay Williams
Appearances GTA Vice City Stories
Full Name Marty Jay Williams
Status
Deceased
Gender Male
Place of Birth Vice City
Date of Death 1984
Nationality American
Home Trailer Park, Viceport, Vice City
Family Louise Cassidy-Williams (ex-wife)
Mary-Beth Williams (daughter)
Mary-Jo Cassidy (sister in-law)
Phil Cassidy (brother in-law)
Main Affiliations Phil Cassidy
Umberto Robina
Victor Vance
Vehicles Bobcat
Businesses Protection Racket
Loan Shark
Prostitution
Voiced by Jim Burke
Marty Jay Williams is the head of his own gang in 1984, the setting of Grand Theft Auto: Vice City Stories.
Contents
Description
Marty's gang dominates a wide range of criminal activities in Vice City's poorer communities, such as loan sharking, prostitution, and protection rackets. Victor Vance works for Marty near the beginning of the game. He is a stereotypical redneck - he has a thick accent, is a drunk, is believed to be inbred, and he verbally and physically abuses his wife, Louise; he is thus the brother-in-law of Phil Cassidy and Mary-Jo Cassidy. Louise eventually attempts to move out, but Marty kidnaps her. Vic tracks him down and kills him before he can get to his hideout. After Marty's death, Vic acquires all of the Trailer Park Mafia's businesses as his own.
Marty is voiced by Jim Burke.
Mission appearances
GTA Vice City Stories
Trivia
• The missions Vic does for Marty in GTA Vice City Stories resemble the missions Niko does for Vlad in GTA IV: convincing owners of stores to pay protection money. Also note that Vic shows his dislike for Marty just like Niko shows his dislike for Vlad. Both Marty and Vlad are killed by the protagnist early in the game.
Gallery
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:48:01.000Z
|
pn6uw5n7sjo4225xsjjuwoslijdybal2
|
{
"content_type": "application/xhtml+xml",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:61312",
"uncompressed_offset": 506821367,
"url": "www.hindawi.com/journals/bmri/2011/594809/cta/",
"warc_date": "2013-11-22T14:35:21.000Z",
"warc_filename": "<urn:uuid:81ae3948-2f99-43b9-9d7c-62fa7a85c520>",
"warc_url": "http://www.hindawi.com/journals/bmri/2011/594809/cta/"
}
|
cccc_CC-MAIN-2013-20
|
About this Journal Submit a Manuscript Table of Contents
Journal of Biomedicine and Biotechnology
Volume 2011 (2011), Article ID 594809, 7 pages
doi:10.1155/2011/594809
Review Article
The Role of Cytokine in the Lupus Nephritis
1Department of Disease Control and Homeostasis, School of Medicine, College of Medical, Pharmaceutical and Health Sciences, Kanazawa University, 13-1 Takara-machi, Kanazawa 920-8641, Japan
2Division of Blood Purification, Kanazawa University Hospital, Kanazawa, Japan
3Department of Laboratory Sciences, School of Medicine, College of Medical, Pharmaceutical and Health Sciences, Kanazawa University, Kanazawa, Japan
Received 26 May 2011; Accepted 12 August 2011
Academic Editor: Brian Poole
Copyright © 2011 Yasunori Iwata et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
How to Cite this Article
Yasunori Iwata, Kengo Furuichi, Shuichi Kaneko, and Takashi Wada, “The Role of Cytokine in the Lupus Nephritis,” Journal of Biomedicine and Biotechnology, vol. 2011, Article ID 594809, 7 pages, 2011. doi:10.1155/2011/594809
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:13:27.000Z
|
7znz3q36kdbd6dphrwg2ndjuj5ssmbnw
|
{
"content_type": "application/xhtml+xml",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:61313",
"uncompressed_offset": 506826965,
"url": "www.hindawi.com/journals/jar/2012/438537/ref/",
"warc_date": "2013-11-22T14:35:21.000Z",
"warc_filename": "<urn:uuid:81ae3948-2f99-43b9-9d7c-62fa7a85c520>",
"warc_url": "http://www.hindawi.com/journals/jar/2012/438537/ref/"
}
|
cccc_CC-MAIN-2013-20
|
About this Journal Submit a Manuscript Table of Contents
Journal of Aging Research
Volume 2012 (2012), Article ID 438537, 2 pages
doi:10.1155/2012/438537
Editorial
Successful Aging
1School of Public Health and Health Services, The George Washington University, Washington, DC 20052, USA
2Faculty of Health Sciences, University of Sydney, Sydney, NSW 2000, Australia
3Nutrition, Exercise Physiology Laboratory, Jean Mayer USDA Human Nutrition Research Center on Aging at Tufts University, Boston, MA 02111, USA
4Department of Sports Medical Sciences, Institute of Pathogenesis and Disease Prevention, Shinshu University Graduate School of Medicine, 3-1-1 Asahi, Matsumoto, Nagano 390-8621, Japan
Received 20 November 2012; Accepted 20 November 2012
Copyright © 2012 Loretta DiPietro et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Linked References
1. Administration on Aging and US Department of Health and Human Services, A Profile of Older Americans, Department of Health and Human Services, Washington, DC, USA, 2008.
2. J. W. Rowe and R. L. Kahn, “Human aging: usual and successful,” Science, vol. 237, no. 4811, pp. 143–149, 1987. View at Scopus
3. J. W. Rowe and R. L. Kahn, “Successful aging,” Gerontologist, vol. 37, no. 4, pp. 433–440, 1997. View at Scopus
4. J. F. Fries, “Compression of morbidity in the elderly,” Vaccine, vol. 18, no. 16, pp. 1584–1589, 2000. View at Publisher · View at Google Scholar · View at Scopus
|
v0
|
2024-06-03T21:29:50.578Z
|
2013-05-18T09:52:26.000Z
|
m55x4viawh76tocuu5zjthawkbw75jvx
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:61315",
"uncompressed_offset": 526256855,
"url": "www.indiaenvironmentportal.org.in/news/pmo-pushes-dilution-green-norms",
"warc_date": "2013-11-22T14:35:21.000Z",
"warc_filename": "<urn:uuid:81ae3948-2f99-43b9-9d7c-62fa7a85c520>",
"warc_url": "http://www.indiaenvironmentportal.org.in/news/pmo-pushes-dilution-green-norms"
}
|
cccc_CC-MAIN-2013-20
|
Wants Tribal Consent Clause Toned Down
New Delhi: The PMO has stepped in yet again to push for dilution of the green clearance procedures, this time asking the environment ministry to render the need for projects to comply with the Forest Rights Act (FRA) almost redundant. The recommendation comes as the latest in a series of moves that the PMO has made to alter the environment and forest clearance process for projects even as it failed to fashion the National Investment Board as an over-arching regulator to supersede the environment ministry. The latest recommendation, substantially denting the importance of what was once UPA’s flagship scheme for tribals — the FRA — has again shown the hands-on approach the PMO has taken to tackle the environmental clearance process.
|
v0
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.