The evolution of the James Harden-Giannis Antetokounmpo feud – ESPN

The Houston Rockets' official Twitter account took what could be considered the first jab in the beef between two of the NBA's biggest superstars seconds after Giannis Antetokounmpo was announced as the league's 2018-19 MVP.

James Harden finished as the runner-up for the third time in five seasons, which didn't sit right with the Rockets organization. The tweet has since been deleted but was certainly up long enough to send a message.

"Congrats to the MVP, but we respectfully disagree," the tweet read before rattling off several bullet points making a case that Harden should have been the repeat winner, such as that he was the first player in NBA history to average at least 35 points and seven assists per game for a full season.

It's common for franchises to lobby for their stars to receive postseason honors. But the timing of this tweet -- as first-time winner Antetokounmpo was making his acceptance speech -- was perceived by many around the league as poor form, a disrespectful display of sour grapes.

"The Beard" and "The Greek Freak" have exchanged a handful of jabs since, some direct shots, others more subtle.

As Harden's Rockets prepare to face Antetokounmpo's Milwaukee Bucks in the bubble in Lake Buena Vista, Florida (8:30 p.m. ET, ABC), get up to speed on the pokes between the perennial MVP candidates over the past year.

"I went out there and did what I was supposed to do at a high level. There's only a few other seasons that anybody has ever done that before. People were tuned into how many points I was going to score the next game. It was a thing. But I can't control that." -- Harden

Harden, making an August 2019 appearance on Houston hip hop station 97.9 The Box to promote his annual JH-Town Weekend charity events, readily agreed when one of the hosts declared that "politics" determined the MVP winner.

The implication seems to be that Antetokounmpo wasn't deserving of the honor, which he won by receiving 78 of the 101 first-place votes, despite a historical stat line (averages of 27.7 points, 12.5 rebounds, 5.9 assists, 1.5 blocks and 1.3 steals) to lead the Bucks to the NBA's best record.

There's a precedent for the Rockets complaining about the "narrative" determining the MVP winner when Harden finished second in the voting. It also occurred after the 2016-17 award went to Russell Westbrook in the case of the then-Oklahoma City Thunder point guard joining Oscar Robertson as the only players in NBA history to average a triple-double for the season.

Of course, that didn't prevent the Rockets from pumping up Westbrook as a recent MVP when they pulled the trigger on a blockbuster trade to acquire him last summer.

1 Related

It's not clear why exactly the narrative would have shifted to favor Harden in 2018-19, when he won the MVP in a landslide, getting 86 of 101 first-place votes. It's also hard to build a case that the ballot is biased against Harden when he has received more points in MVP voting over the past five years than anyone.

But Harden doubled down in an interview with GQ weeks after his radio appearance when asked if a narrative had been already formed for this season's MVP race.

"Nah, it hasn't happened yet, it's too early," Harden said. "Wait until the preseason and when the regular season starts up again. But they [the media] for sure got some teams they locked in on. We all know. That's just what it is.

"You can't tell me that a guy whose team was a 14-seed at one point last year, and ended up a 4-seed with everything that was going on -- so many injuries -- and who went on a 32-game 30-point streak, eight 50-point games, two 60-point games in one season ... and all the talk was about [Antetokounmpo]?

"There's no way."

"It's me. I can get any shot I want to." -- Harden

This was Harden's explanation for why he struggled in a season-opening home loss to the Bucks, finishing with 19 points on 2-of-13 shooting.

Harden consistently declines to credit the opposing defense for causing him problems after an off night, never wavering in his confidence that he can create his shot regardless of the defenders or schemes that he encounters.

But it'd be understandable if Antetokounmpo -- rarely if ever the primary defender on Harden but a dominant force in a help role -- and the Bucks believed that their No. 1-ranked defense was due some credit. After all, they held Harden to 23 points on 26 field goal attempts in their previous meeting, a convincing win by the Bucks in late March that might have influenced some MVP ballots.

"I want somebody that's going to pass the ball." -- Antetokounmpo

Credit TNT's Charles Barkley for the assist in provoking Antetokounmpo into blurting a headline-making explanation for passing on Harden when picking his All-Star team.

"What, you don't want The Dribbler?" Barkley asked, interrupting when Antetokounmpo said he was deciding between Trae Young and Kemba Walker when Harden was the only other starter available, prompting a chuckle from fellow captain, Los Angeles Lakers superstar LeBron James.

0:25

Giannis Antetokounmpo is torn between choosing Kemba Walker or Trae Young, and when Charles Barkley jokingly suggests James Harden, Giannis deals a fun jab during the NBA All-Star draft.

Antetokounmpo chose Walker, a selection that didn't quite match his stated criteria. Harden averages 2.5 more assists per game than Walker this season. Walker's career-best assists average was 6.1 per game in 2013-14, and Harden has averaged at least that many dimes in the past seven seasons, including when he won the assists title with 11.2 per game in 2016-17.

Antetokounmpo, for what it's worth, has never averaged at least six assists in a season.

"Offensively, we were just trying to find whoever James Harden was guarding. That's who we thought we'd have the opportunity to score on." -- Antetokounmpo

Unlike during the All-Star Game draft, nobody provoked this swipe at Harden. It was Antetokoumpo's answer to a bland question about his team's approach down the stretch of the All-Star Game.

That swipe wasn't exactly supported by the facts. Team Giannis, which had more turnovers (seven) than field goals (5-of-19) in the fourth quarter while blowing a nine-point lead, attempted only two shots in the frame in which Harden was the primary defender. Neither of those shots was good.

Not that simply targeting Harden on defense is a sound strategy. There's a narrative that Harden is a notoriously poor defender, but the numbers don't back that up.

Harden has established himself as an elite post defender. According to NBA Advanced Stats, Harden ranks in the 90th percentile this season by giving up only 0.65 points per post-up despite being the league's most targeted player in those situations (107 possessions). He has graded as an average isolation defender this season, ranking in the 50th percentile by giving up 0.89 points per possession.

"I wish I could just be 7 feet and run and just dunk. Like, that takes no skill at all. I've got to actually learn how to play basketball and have skill, you know? I'll take that any day." -- Harden

This was the meat of Harden's response to Antetokounmpo's punchline about his passing when ESPN's Rachel Nichols broached the subject during a 1-on-1 interview at All-Star Weekend.

However, just as Antetokounmpo was off target with his disses of Harden's game, it's hard to claim this criticism by Harden is based in reality. It's rare to find a near-7-footer with such top-level athleticism, though there have been several who have played in the NBA.

1:10

Stephen A. Smith agrees with James Harden's response to Giannis Antetokounmpo saying he wanted to draft a player who passes the ball.

But Antetokounmpo is the only player who fits that description that has thrived as his team's primary facilitator. Sure, his jump shot is a work in progress. But Antetokounmpo is certainly a skilled ball handler, especially for a player his size.

Has there ever been a player that size who created most of his own dunks off the dribble?

"There hasn't been a back and forth. I'm not that type of guy. I've never tried to take stabs at somebody. Maybe sometimes it might come out like that, but I'm definitely not. ... If that's what [Harden] believes, that's what he believes." -- Antetokounmpo

Perhaps Antetokounmpo's skill set includes acting, because these comments in a late February interview with ESPN prove he can certainly play coy.

These came in the wake of Antetokounmpo taking stabs at two subjects that are sensitive to Harden: the perception that the Rockets star is a ball hog and that he's a dreadful defender. Did Antetokounmpo really expect anyone to believe those were accidental?

"I've got to go with James Harden." -- Antetokounmpo

Antetokounmpo paused for several seconds when asked during an Instagram Live Q&A in late March which NBA player was most difficult to guard. After carefully considering it, he replied with the player who is en route to his third consecutive NBA scoring title.

Maybe this virtual olive branch ends the back-and-forth beef between the league's last two MVPs. Or maybe the Bucks and Rockets' next meeting could ignite another round inside the bubble.

1:57

Dan Le Batard, Bomani Jones, and Domonique Foxworth react to how hard it was for Giannis Antetokounmpo to admit that James Harden is the hardest player he's had to guard.

Read more:

The evolution of the James Harden-Giannis Antetokounmpo feud - ESPN

Khiry Shelton reflects on his evolution as a player with Glenn Davis on the Soccer Matters podcast – Sporting Kansas City

When Khiry Shelton was 9 or 10 years old, his grade school teacher conducted a time capsule activity. Every student wrote a letter about what they wanted to be when they grew up, sealed the paper into an envelope and returned it to their teacher.

Years later, when Shelton was in high school, he received the envelope in the mail. The letter, scribbled in his own handwriting, said that Shelton wanted to be a professional soccer player.

Consider it a dream come true.

Shelton, a 27-year-old Sporting Kansas City forward who is tied for the team lead with three goals this season, recently joined sportscaster Glenn Davis on the Soccer Matters podcast to reflect on his eventful upbringing in a military family, his early professional days at New York City FC, his experience competing in the German Bundesliga and his evolution as a player.

The No. 2 overall pick in the 2015 MLS SuperDraft, Shelton joined New York City FC as a rookie and became acquainted with teammates David Villa, Frank Lampard and Andrea Pirloall of whom Shelton grew up idolizing.

After three years in New York, Shelton arrived in Kansas City and helped Sporting to a first-place finish in the Western Conference in 2018. He spent 2019 with German club SC Paderborn 07 before sealing a return to Sporting ahead of the 2020 campaign. During his stint in Europe, Shelton said he became a more well-rounded player.

Theres a lot more to my game than just speed and strength, Shelton told Davis. My passing ability, my vision of the game, my knowledge of when to (attack) and when to keep the ball. There are a lot of things that play into my game that people dont take into consideration, but thats not for me to (worry) about.

Shelton also shared details about the special relationship he shares with his father, a military veteran who served in the U.S. Army for 22 years.

Over the last five or six years, hes become my best friend because our relationship has changed over time as Ive gotten older, Shelton said of his dad. Hes not only a father figure but a best friend. We talk every day, and hes still able to push me in different parts of my life but also support me.

After reaching the quarterfinals of the MLS is Back Tournament, Shelton and Sporting will now await the resumption of the MLS regular season. The league plans to announce a revamped schedule in the very near term.

Sporting currently sits atop the Western Conference with 12 points and a 4-1-0 regular season record. Shelton is notably one of two MLS playersalongside teammate and fellow forward Khiry Sheltonwith three goals, five chances created and 30 duels won this year.

Original post:

Khiry Shelton reflects on his evolution as a player with Glenn Davis on the Soccer Matters podcast - Sporting Kansas City

Elizabeth Warrens Evolution on Race Brought Her Here – The New York Times

Of the thousands of students, only a handful were Black, according to former students and teachers. The first few Black faculty members, including Clara Luper, a noted local civil rights activist, wouldnt arrive until two years after Ms. Warren graduated. In a speech years later, Ms. Luper recalled protests outside her classroom window and boys chanting racial slurs at her in the hall.

After Ms. Warrens father lost his job, her family struggled to stay in the district so their children could attend the school, considered one of the academically strongest in the area. Friends described Ms. Warren as conservative at the time, and dont recall spending much time discussing civil rights, even as protests, sit-ins and integration efforts roiled her still largely segregated city throughout her high school years.

Dr. Katrina Cochran, a childhood friend who would go on to become a psychologist, said that Ms. Warren had been deeply conscious of the stigma then associated with having a mother who worked outside the home and that she had displayed an interest in economic inequality that would define her career. But the topic of race didnt often come up between the two girls.

It was so clearly segregated, Dr. Cochran said, of their high school. I look back on it now, and there wasnt one person of color that I recall anywhere, except in the janitorial or kitchen staff. Thats how we grew up.

Ms. Warren left Oklahoma City for George Washington University eager to expand her horizons beyond the confines of her upbringing.

I had never seen a ballet, never been to a museum and never ridden in a taxi, Ms. Warren recalled in her 2014 memoir. Id never had a debate partner who was Black, never known anyone from Asia, and never had a roommate of any kind.

As an older cousin also had, a young Ms. Warren found her way into a sorority, pledging the Gamma Kappa chapter of Kappa Alpha Theta. The university had been officially desegregated in 1954, when it began admitting Black students, but the sororities on campus remained a bastion of discrimination.

Read the original:

Elizabeth Warrens Evolution on Race Brought Her Here - The New York Times

10 Pokmon That Would Be Better Left Un-Evolved | ScreenRant – Screen Rant

Pokmon is one of the most popular franchises of all time. Starting out as a video game, the series developed into a card game, a highly successful anime, and a successful movie series. While several 90s franchises have declined in popularity, Pokmon continues to remain successful, with highly anticipated video game releases every other year.

RELATED:10 Awesome Pokmon That Really Need A New Evolution

As the series has been running for the best part of two decades and 890 Pokmon have been released in this time, there are several individual Pokmon that are generally considered to be awful, either from a design point of view or a gaming perspective. What is worse, though, is when a Pokmon starts out life as a promising first stage evolution before then turning into something thats either useless or ugly.

This entry will be controversial among Pokmon fans. The water type starter Pokmon from generation 8 was hugely popular when it was originally announced, with fans loving the goofy looking design of the creature.

However, some fans were split at seeing Sobbles final evolution, Inteleon. Many believed that the Pokmon didnt look like a Pokmon, with some even suggesting that its design was unimaginative.

Chansey is one of the most iconic Pokmon designs of all time, with the pink Pokmon being closely related to Nurse Joy in the animated series. Chansey does indeed evolve into Blissey, but doing so would be pointless in terms of strengthening aPokmon team for battle.

Rather than evolving a Chansey into a Blissey, it would make far more sense to simply give a Chansey an Eviolite, greatly boosting its defense and special defense stats, making it far more difficult to kill than a Blissey.

For those who may not be too familiar with Glameow, the cat Pokmon is an adorable and fancy looking cat Pokmon. However, while Glameow is adorable, its evolution is a Purugly and, as the name suggests, its not a pretty Pokmon.

RELATED:10 Pokmon That Should Have Gotten A Different Typing

While Purugly certainly has its advantages in Pokmon battles and can pack a punch, evolving a cute cat into a Purugly is something that ought to be avoided.

Oddish is an adorable little plant creature. The little guy is often at the start of a new players adventure, and its happy little demeanor is bound to draw in some admirers. However, evolve this creature at your own peril.

While Oddish is adorable, it evolves into Gloom, one of the ugliest and most disgusting looking creatures in the Pokmon universe.

Murkrow is far from the most famous Pokmon, but if used correctly in battle it can be a tricky little pest to deal with. A Murkrow can be given an Eviolite, which boosts its defense and special defense, making it a particularly tough nut to crack.

Further, its hidden ability of prankster means it can use status moves at +1 priority. This means Murkrow can use moves such as Confuse Ray and Feather Dance to weaken an opponent. However, evolving a Murkrow into a Honchkrow is far more difficult to use well in battle.

Dusclops, similar to Chansey and Murkrow, is another Pokmon that benefits greatly from an Eviolite to boost its defensive stats. With the Eviolite equipped, a Dusclops has higher defensive stats than its evolution, Dusknoir.

RELATED:Which Pokmon Are You Based On Your Zodiac?

Consequently, Dusclops with Eviolite makes for a brilliant defensive wall, being able to absorb several attacks and weaken opponents in return. The Pokmon also features some defensive moves such as Will O Wisp that will make any physical attack barely leave a scratch.

Naturally, Pikachu had to make this list. The mascot of the Pokmon brand is difficult to evolve for any fan, with many feeling an attachment to the mid stage evolution. However, aside from sentimentality, there are practical reasons to stick with a Pikachu.

The first is that a Pikachu gets its attack stats boosted when holding the Light Ball, making it potentially pack more punch than a Raichu. Further, Pikachu also has its own Z-Move, as well as various different cosplay Pikachu variants.

Yamper is one of the most adorable Pokmon to ever grace a Nintendo game system. Based on the insanely cute Corgi dog breed, this electric type Pokmon captured millions of hearts when it was announced as part of generation 8.

While its evolution, Boltund, isnt exactly ugly, its far from the adorable little Corgi that Pokmon fans around the world had come to love.

This one will almost certainly be controversial, as Tepig and its evolution line is one of the most popular fire type starter Pokmon. However, its a real shame that this adorable little piglet evolves into a massive, angry looking pig.

RELATED:Disney: What Would Princess Ariel's Pokmon Team Be?

It would be impossible to blame a trainer for refusing to allow their Tepig to evolve, keeping the cute little piglet around forever. Even though Tepig's final evolution can work well in battle, in terms of design, it's a huge let down from the promising first stage evolution.

In a similar manner to the Tepig entry, Rowlet is simply too adorable to evolve. The Pokmon is the perfect round shape, combined with a perpetually happy face that never seems to look upset.

While the future evolutions of the Pokmon are fine, in terms of design, there is simply no topping the iconic cuteness that is inherent within the first stage evolution of the gen 7 grass starter Pokmon.

NEXT:The 10 Biggest Problems With Pokmon Games (They Need To Fix)

Next Ghost Of Tsushima: 10 Memes That Will Leave You Crying Of Laughter

Writer living in Adelaide, Australia. Long-suffering post-graduate student and lover of pop culture from Game of Thrones to DC. Twitter: @samchinson

Read more here:

10 Pokmon That Would Be Better Left Un-Evolved | ScreenRant - Screen Rant

The Evolution Of Digital Twins – SemiEngineering

Digital twins are starting to make inroads earlier in the chip design flow, allowing design teams to develop more effective models. But they also are adding new challenges in maintaining those models throughout a chips lifecycle.

Until a couple of years ago, few people in the semiconductor industry had even heard the term digital twin. Then, suddenly, it was everywhere, causing confusion because it appeared to be nothing more than development models. Some degree of clarity finally is emerging, but not about how it will affect the development process. What may change are new customers for those models and new ways in which value can be extracted from them, and over time that may influence the models created.

To start, the term digital twin is very broad. Digital twins allow mimicking of real things through simulation, says Aki Fujimura, CEO of D2S. Flight simulators are digital twins. Driving simulators are digital twins, especially if you want to model different ways in which a car can crash, or a pilot needs to learn to control the plane under severe duress. It is a good idea to be dangerous only in a simulated context.

The term has been defined by a number of people. A digital twin is a virtual representation of a physical system that is used to answer questions that cannot be answered, or are difficult to answer, by a physical system, says Marc Serughetti, senior director in the verification group at Synopsys.

But looking at it with too large a context can be problematic. Digital twins are a great idea, but not a reality yet at least not to the extent of seamlessly covering all abstraction layers of a complex system, says Rob van Blommestein, head of marketing for OneSpin Solutions. One of the big issues is interoperability. Right now, there are a few big players that are trying to develop proprietary platforms for modeling a digital twin of a car, for example. In principle, that is great. It would allow manufacturers to have a complete virtual view of the car, including electronic, electrical, mechanical, and physical aspects. The problem is that monolithic platforms are weak by construction.

What has started to become clear are the types of digital twin that exist, and the roles they can perform. There are three elements of digital twins, says Frank Schirrmeister, senior group director for solutions marketing at Cadence. One: Digital twins for the development purpose. These are the ones that naturally fall out of the semiconductor flow. It includes things like a virtual platform, which is a digital twin for software development. Two: Digital twins related to the data. If you look at healthcare, they digital twin the hospital to optimize the process. They digital twin the person. The third element is data over time, and this is often connected to maintenance issues. So in the health domain, people look at your digital twin being your chart.

Schirrmeister uses a bathtub curve, as shown in figure 1, to show how this fits into the semiconductor world.

The digital twin for predictive maintenance has nothing to do with the digital twin used for development, continues Schirrmeister. This is a model nightmare like you wouldnt believe. In order for this to be effective, you actually need to have models of your thing in real life, and you need to maintain these models, over time. So three digital twins for development, for predictive maintenance, and then the operational and production aspect which is, how to optimize your product production line.

This ends the notion that models stop being useful at tape-out.

An emerging standard, Portable Stimulus, could become an important part of this. If high-fidelity and high-accuracy models are used for the individual components of the system, such as a sensor or applications processor, digital twins can help reduce development time by enabling realistic scenario simulation and, crucially, validation, says Chet Babla, vice president for Arms Automotive & IoT Line of Business. This can lead to better products in a shorter period of time.

Others agree. A digital twin can be better than a physical system in that they make it possible to quickly change parameters, operating conditions, functions and overall make the product more configurable instead of having to rebuild a physical system every time, says Syed Alam, global semiconductor lead at Accenture. The semiconductor industry is moving toward more configurable systems, and digital twins are a great way to design, test and manufacture them faster and cheaper.

The boundaries between stages is blurring. Suppose we tape out a design and target a new production facility, says Fram Akiki, vice president of electronics industry strategy at Siemens PLM Software. The production people may come back and say that based on the design you are using a lot of high-performance transistors, you have added a couple of layers of metal, etc. They may conclude that they need to spend another $30 million or $40 million of capital to make sure they optimize the production line for this design (see figure 2). If they dont spend the money and it turns out to be a bottleneck, you are dead. If you do spend the money and later realize that you didnt need it, you also will be in trouble because of the unnecessary expenditure. This has become even more important today. You want to optimize your manufacturing line early on. It doesnt matter if you are operating under an IDM format or if you are a fabless company because costs are costs and risks are risks, and someone has to account for them.

The digital twin is a means to an end. The first question that really needs to be addressed is, What questions are you trying to answer?' says Synopsys Serughetti. Why do I build the digital twin?

Production twinsIn semiconductor manufacturing, the concept of digital twins is finding several applications. We do wafer plane analysis (WPA) from a mask SEM picture to project what that mask will expose on wafer resist by doing a lithography simulation on the extracted contour of a SEM picture, says D2S Fujimura. That is a digital twin of the wafer lithography machine.

This concept can be taken further than would be possible when restricted to real data only. One might want to have a deep learning network that can learn how to classify different types of defects, says Fujimura. But semiconductor fabs and mask shops are very good at avoiding defects. So it is difficult to collect the millions of specific example pictures of each type of a defect in order to properly train the network. Digital twins that generate pictures that look like SEM images, or inspection images out of CAD data, enable a programmer to generate any number of any kind of defect image at will without finding a way to manufacture one to take a picture of.

Even after devices have been deployed in the field, models remain useful. Post-silicon is a different scope of digital twin, but thats one that may become more important as we move forward and as systems become more complex, says Serughetti. In the semiconductor world we tend to think of hardware and software. But the reality is, they live in an environment. And if you are starting to think about digital twins in that space, you need to be able to model the hardware, the software and the environment that has an influence on that hardware and software.

Knowing how your chips are being used is important. Live data from physical chips, either being manufactured, assembled and tested in silicon form, on system/board or in end deployment, are all being collected and integrated with the Digital Thread data, says Accentures Alam. This enables design and product engineers access to the next level of analysis, which helps them improve their designs as well as provide data into the semiconductor ecosystem to resolve design and performance issues.

And being able to predict their performance when used in new situations adds value. Digital twins enable the possibility to test multiple deployment scenarios, including challenging corner cases, with a highly automated and consistent approach, but without the limitation of needing access to physical systems, says Arms Babla. This ability to configure, test, analyze, adjust, configure, and test enables a powerful feedback mechanism to optimize system specifications and finalize or enhance designs.

But some of the necessary models remain elusive. In order to cope with actual field data, real-time execution is often a requirement for digital twins, says Roland Jancke, head of department for design methodology at Fraunhofer IIS Engineering of Adaptive Systems Division. The main advantage of a digital twin as opposed to conventional system-level models is its existence over the complete system lifecycle. This helps during the development and verification phase, but improves itself later by using field data, thereby keeping an eye on safe operation as well as expected responses.

Over time, those models will reinforce themselves. Being able to mine data from the digital twin will provide design engineers the next level of confidence in the simulation models they are building, says Alam. The ability to analyze different test results as well as power consumption and performance parameters means that there will be less re-spins of a product. The design engineers can produce better configurations and derivatives of devices faster and at a lower cost.

Digital twins shift leftModels within the development flow are changing. We are seeing a shift left, and a lot of things that in the past were done in series, such as the development of hardware and do the software later when the hardware has matured, are now being done simultaneously, says Siemens Akiki. To do this effectively is dependent on having effective digital models.

The development of virtual prototypes has been happening for some time. In addition, accuracy can be traded with speed of modeling by deploying models of varying abstraction levels, says Babla. For example, a simple programmers view model of components may suffice for base functionality checking and initial software development, whereas a detailed physics-based image sensor model combined with a full processor RTL model will allow high-accuracy modeling of vehicle or industrial robot dynamics under real-life environmental conditions, such as humidity, temperature or even road surface conditions.

And those models are being connected into flows. Virtual prototyping can start early, before RTL is available, says Serughetti. Then you go into hybrid, for example, with the virtual prototyping and emulation. And then you can go to prototyping, which is FPGA-based, which can also be hybrid. Now you may be talking more system validation, where you connect to the rest of the system. So there is definitively a flow where all those technologies play a role along the development chain. I dont think they are exclusive of each other. And they are not like one finishes, and the next one starts.

Portable Stimulus can help keep those models in sync. Not all tests will run on each level of accuracy, says Cadences Schirrmeister. Some tests may require you to have enough implementation detail to actually work, where others, which are more abstract elements, will work across all fidelities. Some may require the bare metal drivers to be available. If you run the same test on a more abstract implementation of it, then you dont run the real drivers. But you still can run the test itself.

Getting the right abstractions can be tricky. Models used for a digital twin should run as fast as possible while being as accurate as necessary, says Fraunhofers Jancke. The abstraction needs to be representing interactions in the system that are in question, while neglecting what seem to be unnecessary details for the investigation at hand.

The uptake in virtual prototypes is leading to design gains. Customers are being more proactive in the specification phase, says Serughetti. They are benefiting from that because the value of moving to a virtual environment is providing more clarity between hardware and software. There has been a very strong benefit on that side, and the shift left has happened because now you can deploy those verification and validation technologies much more efficiently.

One problem is that digital twins tend to be proprietary. What the industry needs is an open-source, or at least interoperable, platform where open-source and commercial tools, including EDA tools, can be plugged-in seamlessly, says OneSpins van Blommestein. This is an obvious need for safety, where having independent tools checking each other is a requirement. But its not only about safety. It is also important to make sure OEMs and their supply chain have access to the best, most competitive solutions for each specific design and verification task.

Another challenge is the cost of maintaining models over time. Is the investment you have to put into that digital twin manageable for the return youre trying to get out of it, asks Serughetti. When you are at the beginning of the project and theres no physical system, it has a huge value because you can start earlier, and you get more information. Once you are later in the project, the question becomes, Whats my modeling effort for that digital twin? And what is the return for it? If the effort is too high, then people are not going to maintain it. If you are talking about a project that has a very short timeframe, the modeling effort may be too high in order to get returned value.

Digital twins created within the semiconductor flow remain primarily for internal consumption. Digital twins rely on the creation of a flow where these things happen naturally, says Schirrmeister. They are a natural byproduct of developing something. We are not really there yet, even from RTL down. There are times when you need to take into account not only the functional and timing accuracy, but also thermal effects, electromagnetic effects, power effects and all that. We have not figured that out, and its highly dependent on which question you want to answer.

The industry long has held the desire to have an executable specification from which implementations can be derived, and this would create the ultimate digital twin. What if my digital twin was my specification, asks Serughetti. If I start modifying it, I start by modifying the specification, and from that I derive the implementation. Unfortunately, I havent seen it as something that has been practical to realize so far.

ConclusionThe industry is getting more clarity on digital twins, both within the semiconductor development flow and during production and deployment. As the perceived values of doing that increase, additional time and effort will be put into the creation of the appropriate models and the means to keep them in sync. Ultimately, a digital twin has value if it provides a better way to get an answer. The better way could be because its earlier, its cheaper, or it has less risk.

In this time of COVID where more people are working remotely, digital twins may offer additional value because they may be accessible anywhere and at any time.

See original here:

The Evolution Of Digital Twins - SemiEngineering

Remote Possibilities: The evolution of the home office – Pacific Northwest Inlander

click to enlarge

Photo courtesy of Design for the PPL

Design for the PPL's Erin Haskell Gourde redesigned this standard-issue home office for a client who wanted a dramatic Old World feel.

Home sweet home. It's what you've invested a lot of time and energy into, where the family gathers for meals, where you curl up in your favorite chair to relax after work. Only now, for more of us than ever before, the workday might have occurred just down the hall, at a desk nudged into a bedroom, or at a chair near a plugin in the corner of a quiet room.

But even before recent statewide closures and slowdowns forced people out of the office and into telecommuting, there was a trend toward working remotely. According to FlexJobs and Global Workplace Analytics, over the past ten years, the "remote workforce" has grown by more than 90 percent.

Photo courtesy of Design for the PPL

Designer Erin Haskell Gourde (right) enjoys a laugh with Eileen Barbieri, in her newly designed home office.

Global Workplace Analytics further estimates that more than half of the non-self-employed workforce around 75 million Americans could work from home at least part time and that the longer they work from home, the more likely it is that they will never fully return to the conventional office environment.

So how can home offices evolve to meet the needs of a new cadre of stay-at-home workers? Local designers offer ideas on how to create a multipurpose office space that not only meets workday needs, but also offers space for other activities as well.

In their Spokane real estate business, the Fowler Group's Danielle and Ryan Fowler have noticed an uptick in clients looking for extra spaces they might convert into home offices. Many transplants, says Danielle, are moving to the Spokane region knowing they'll be telecommuting.

The Fowlers include themselves in the telecommuting workforce, and like many families, they also needed space where their four children could do schoolwork. So when it came time to build, they incorporated an office into the plan for their still-under-construction Peone Prairie home.

They added steel and glass barndoor-style walls to transform the formal dining room into a roughly 12-by-12-foot, multifunctional office just off the kitchen. The glass lets light in, allows for two-way visibility, and yet provides a minimal sound barrier.

Photo courtesy of Design for the PPL

With expansive windows providing views to the stables, this office for a professional equestrian team owner incorporates built-ins to hide office-related equipment, freeing up shelf space for more interesting displays.

Another consideration in the design, says Danielle, was centralizing paperwork and other frequently-accessed office items, yet hiding clutter through built-in storage.

DESK PICK: Add a little whimsy with this petite, but perfectly functional desk. Signature Design Mirimyn Trestle Desk, Runge Furniture in Coeur d'Alene

"I wanted it to be attractive as well," Danielle says.

Aesthetics and multifunctionality are high priorities for clients, say several local interior designers who, like the Fowlers are seeing increased interest in adding a new office space or converting existing spaces into ones that accommodate those working from home.

"I would say there is a lot more awareness of how an office is designed within a home and clients to a degree have been very involved in this desire for dual function and creating beautiful rooms that they are inclined to want to spend time in that are more fluid and connected with the rest of their homes," says Tammie Ladd, of Tammie Ladd Interior Design.

In addition to more decorative lighting and design that incorporates personal touches, requests have included maximizing space, from storage units to built-ins to the room itself, Ladd says. For example, she recently completed a dual-functioning yoga studio and office space for a client and created a double workspace for another.

"We've added console tables, desks behind sofas in living rooms that can also double as a docking station or place to set up shop and still maintain the enjoyment of one of the best rooms of the home," Ladd says. "Even in a more traditional styled office with a desk, seating, task chair and built-ins, often media will also be incorporated along with direct visual connections to the main living spaces."

Photo courtesy of Design for the PPL

A desk area can be seamlessly combined with comfortable seating and media, allowing the room to offer multiple uses.

Designology's Deanna Goguen and Milieu Design's Sarah McGovern collaborated to overhaul a space for a professional equestrian team owner that also addressed the dual need of multifunctionality and livability.

DESK PICK: Ample storage in this compact, cottage-styled package. Libby Allyson Park L-Shaped DeskWalker's Furniture

Taking a design cue from the world of dressage tack, the design features a leatherwork surface and a metal and glass wall to partially enclose the space, which also has a view towards the barn and track so the owner can oversee the horses and team workout areas.

"Built-in shelves showcase awards and original art, while the enclosed cabinets below hide the day-to-day necessities like files and the printer, so that the beautiful parts can take center stage," McGovern says.

Location of the office within the home is also important. When it's closer to the front door, for example, that allows for meetings with clients without exposing the more intimate spaces of the home.

In the past, Ladd says, the kitchen was the catch-all, sometimes featuring a little desk tucked in among the cabinets that doubled as an office. Now the kitchen island might get extra outlets and charging ports, functioning more like a docking station with thoughtfully concealed or even portable storage.

Photo courtesy of Tammie Ladd Design

Tucked into a long hallway, this docking area offers the perfect location for working, while still enjoying the larger spaces of the home.

Design for the PPL's Erin Haskell Gourde says sometimes clients don't know what they want other than what they have isn't working anymore, especially as more people are finding themselves unexpectedly out of their regular office environment and working remotely from home.

DESK PICK: Tuck work away in time for happy hour with this sustainably sourced, solid walnut laptop desk Copeland Laptop Desk, Tin Roof Furniture

At the same time, she notes people may not want to devote space in their homes exclusively to work. "Don't just design it as an office and that's it, because things can change," she counsels. For example, "A library can be stunningly beautiful and then you can have, you know, cocktails in there." Recently she worked with a client to create a dramatic room, featuring office accouterments like a standalone desk and guest chairs, yet also incorporating stylish touches including a range of inset and ceiling lighting and built-in bookshelves, creating an Old World feel. It was the perfect fit for a client who wanted, "A classic beautifulplace where she can do her work, but also just want to dwell in, a place where she can just be."

Space Specs

Working from home might seem comfy and cozy, but we still need to take our bodies into account when we go about creating a home workspace. "That means practicing self-care," says Contract Design Associate's Gwen Marlow. "An office that's functional makes us feel good."

Whether it's a spot on the couch with your laptop or a wraparound desk in your former third bedroom, ergonomics are important.

"We just have to remember: Don't conform your body to your space," Marlow says.

Instead, conform your space to support your body. Check your posture aim for sitting straight up, with your shoulders relaxed and your feet on the floor. Try using pillows to alleviate pressure and offer support while seated.

If your work from home requires considerable time sitting at a desk, ergonomic seating should be a consideration. A "task" chair with adjustable positioning for the seat, back and armrests can facilitate better body mechanics.

Graphic courtesy of Herman Miller

At Contract Design, customers can even take one of 50 available task chairs home for a "test sit," Marlow notes, adding it can be hard to assess a chair's features without trying it in your own space, with your own office set up.

Also, Marlow says it's a good idea to consider an adjustable-height desk, so you can alternate between sitting and standing. After all, when it comes to sitting, too much is not a good thing. "Those who sat for more than eight hours a day with no physical activity had a risk of dying similar to the risks of dying posed by obesity and smoking," according to the Mayo Clinic.

Taking frequent breaks is also good for your eyes, which can suffer from too much screen time. Be smart about glare, Marlow says, and sit next to natural light if possible.

"I think the light makes us feel better," she says.

Continued here:

Remote Possibilities: The evolution of the home office - Pacific Northwest Inlander

How Did the First Person Evolve? – Gizmodo Australia

We know humans havent always been around. After all, we wouldnt have survived alongside meat-eating dinosaurs like Tyrannosaurus rex.

How the first person came about and who their ancestors were (their grandparents, great-grandparents and so on) is one of the biggest questions archaeologists have. Even today, it puzzles us.

When we think of how humans first came about, we have to first understand that almost every living thing evolved from something else through the process of evolution.

For instance, the first known example of life on Earth dates back more than 3.5 billion years.

This early life would have been in the form of tiny microbes (too small to see with just our eyes) that lived underwater in a very different world to today. At that time, the continents were still forming and there was no oxygen in the air.

Since then, life on Earth has changed incredibly and taken many forms.

In fact, for about a billion years during the middle part of Earths history (1.8 billion to 800 million years ago), life on Earth was nothing more than a large layer of slime.

All living humans today belong to a species called Homo sapiens.

However, we have a long line of family members called hominins who came before us including our ancient human relative, the Neanderthal (Homo neanderthalensis).

Homo sapiens are the only hominin alive today.

These two sculptures are imaginings of what a neanderthal man and woman may have looked like. Neanderthals are extinct today but were also hominins. Martin Meissner/AP

Hominins first showed up millions of years ago, and changed in mostly small ways over a long time, through evolution.

Because of this complicated family tree, in answering your question we need to think about what you mean by person.

This may seem silly, because we know straight away when we pass someone on the street that theyre a person, rather than a dog or cat.

However, the differences between you and your early ancestor Lucy (more about her below) who lived more than 100,000 generations ago, are much smaller than the differences between a person and a dog. This is why the answer is complicated.

So Im going to give you two answers and let you decide which you think is right.

The first answer is to assume the first person was the first member of our species, Homo sapiens. This person would have been just like you and me, but without an iPhone!

The oldest skeleton discovered of our species Homo sapiens (so far) is from Morocco and is about 300,000 years old.

This ancestor of ours would have lived at the same time as other members of the human family, including Neanderthals and Denisovans. Archaeologists have long argued about what makes us different to these other ancient types of humans.

The answer probably lies in our brains. We think Homo sapiens are the only species that can do things like create art and language although some recent discoveries suggest Neanderthals were artists too.

Its hard to know why Homo sapiens survived and the rest of our hominin family didnt. But theres a good chance the creativity that led to some wonderful early cave paintings found in France and Indonesia helped us to succeed over the last 100,000 years.

Another way to answer your question is by assuming the first person was the first hominin to split off from the rest of our extended family, which includes chimpanzees and gorillas.

We cant be sure exactly who our first ancestor was, but many scientists think Australopithecus afarensis is a good bet.

This species would have looked different to you and me, but still would have walked upright and used tools made of stone. The best example of this is a famous fossil skeleton called Lucy.

What Lucy may have looked like when she was alive more than three million years ago. Jason Kuffer/Flickr, CC BY-NC-ND

Her skeleton was found in Africa, and while we have a lot of it compared to other ancient hominin skeletons, its not complete. This makes it hard to work out who the first person was.When Lucy was alive about 3.18 million years ago she was covered in hair. And she was probably about the same height as you are now, even though her bones tell us she was an adult when she died.

Most fossils from Lucys time are incomplete, and we only have a handful of bones to study from each extinct species.

This is why every new discovery in archaeology is so exciting. Each new fossil gives us a new chance to put the puzzle of our family tree together.

Ian Moffat, ARC DECRA Senior Research Fellow in Archaeological Science, Flinders University

This article is republished from The Conversation under a Creative Commons license. Read the original article.

View original post here:

How Did the First Person Evolve? - Gizmodo Australia

Evolution Research Group Announces Appointment of William Martin to Chief Scientific Officer – PRNewswire

NEW PROVIDENCE, N.J., Aug. 4, 2020 /PRNewswire/ --Evolution Research Group ("ERG"), a leading independent clinical research site company with a focus on improving the quality and delivery of complex, specialized trials across 15 geographically diverse clinical trial sites in the United States, announces the appointment of William Martin, Ph.D. to the position of Chief Scientific Officer.

In his role, Dr. Martin will lead ERG's Strategic Client Services division as well as its Scientific Liaison Team, consisting of internal and external medical, clinical and operational experts, including, industry leading drug development veterans.

Working closely with Andria Chastain, Chief Operating Officer, Dr. Martin will support ERG's ongoing efforts to continuously improve its service offerings related to early phase consultation, clinical program management, patient engagement activities, and further advancing ERG's technology platform to progress core focus areas, such as remote monitoring, and telemedicine.

Dr. Martin has had an extensive career in the biopharmaceutical industry having worked in various clinical research roles over the past 20 years.Prior to joining ERG, Dr. Martin most recently worked as a Senior Medical Director and Product Leader with Alkermes and within the Clinical Research and Precision Medicine group at Pfizer. "I am thrilled to be at ERG and look forward to leveraging our extensive network of world-class investigators and seasoned drug developers to add value to our service offerings," said Bill Martin, Chief Scientific Officer.

"As our Chief Scientific Officer, Bill fulfills a crucial role in realizing our vision for ERG's next growth phase, responding to real-time emerging scientific opportunities and challenges," said Andria Chastain, COO of ERG. "Along with our Chief Medical Officer, Dr. Daniel Gruener, Bill will ultimately help guide the advancement of some of the most significant medical and pharmaceutical breakthroughs while ensuring ERG exceeds expectations as a trusted partner."

"It's our pleasure and privilege to have Bill join us as he brings a rare combination of clinical and medical affairs proficiency from his work at Alkermes and Pfizer," said Lori Wright, Founder, Chairman and CEO of ERG. "He will be a vital resource for our sponsors, Scientific Liaison Team, and our entire ERG team as we continue to build momentum toward executing of our corporate vision."

Beyond his industry experience, Dr. Martin serves as a member of the Scientific Advisory Board (SAB) for Axial Biotherapeutics, a clinical stage biopharmaceutical company developing novel central nervous system therapeutics, and is a member of the board of directors for Phoenix House New England, a nationally recognized healthcare provider specialized is substance use and mental health disorders.

Dr. Martin received his Ph.D. from the University of Connecticut, bachelor's degree from Providence College and is a graduate of the business studies program at Providence College.

About Evolution Research Group

Evolution Research Group, LLC is one of the largest, independent site companies in the U.S. focused in the execution of early and late phase CNS disorders with an industry leading clinical and operational team of professionals. ERG's portfolio includes 15 fully owned and operated clinical research units, a network of affiliate sites. With over 400 beds and more than 40+ PIs and KOLs in several therapeutic specialties, ERG's mission is to provide the highest quality on both inpatient and outpatient clinical trial execution across all clinical research phases, beginning with a focus on first-in-human, proof of concept studies. ERG advances research with healthy and specialized populations, across all age groups, and leverages its database to ensure minority ethnic/racial representation to increase enrollment of underrepresented populations. ERG embraces complex, specialized clinical trials with centralized quality assurance and compliance oversight to help sponsors speed lifesaving and life-enhancing therapeutics to market as quickly and safely as possible.

For more information, please visit our website: http://www.ergclinical.com.

Media Contact:Lori WrightPresident & Chief Executive OfficerEvolution Research Group430 Mountain AvenueNew Providence, NJ 07974[emailprotected] 908-650-1360 (phone)

SOURCE Evolution Research Group, LLC

Home

Read the original:

Evolution Research Group Announces Appointment of William Martin to Chief Scientific Officer - PRNewswire

Paid to Kill: An Examination of the Evolution of Combatants for Hire – Global Security Review

Throughout world history, as long as there has been conflict among people, there have been people willing to pay others to carry out violence. From assassins and mercenaries to bounty markers and paramilitary organizations, humans have found limitless ways to pay for their dirty work to be carried out by others. This process is one of the most common threads in human history and has been used by people in every position, of every origin, and in every location on the planet for thousands of years. The issue of pay for violence has entered the spotlight again in the modern age, as humanity moves closer together through information and technology proliferation. The world is growing smaller, and conduct unbecoming of a civilized society is finding fewer and fewer places to hide. This article examines, in part, the historical evolution of the roles of paid actors in the business of war and violence. A complete examination is not presented, as it would require detailing a complete history of humankind. The author instead focuses on the primary themes and points throughout history that explain the origin, necessity, and permanence of paid-for violence, framed by supporting historical and modern-day references to illustrate the concept of combatants for hire and their impact on human society.

Payment comes in many forms, not just money, and over time violence has always been paid for by the cheapest means possible, sometimes even just by allowing life to continue or through advancing promises of ideological or moral philosophies. Jihad, for example, is a direct bounty from Allah on the heads of all infidels, the reward being not financial at all, but promises of luxurious life after death. The most common form of payment is, of course, money and has been used widely for thousands of years to incentivize the public into helping catch or kill criminals or declared criminals of various forms. From wanted posters in the wild west to the modern-day Federal Bureau of Investigations (FBI) most wanted list, American law enforcement has continuously been a significant end-user of various types of bounty systems. Technically, all modern military forces are also a party to the payment-for-violence system as well, as the primary function of all militaries is either offensive or defensive killing operations, and they all receive payment from participating. Assassins, since humanitys early days, have often performed their art for a variety of forms of payment, including revenge, land, influence, or positions in leadership, and of course, money. Some assassins and mercenaries have proven this point to the extreme by conducting operations for opposing factions of a single conflict, sometimes even simultaneously working for both. No matter which way the issue is framed, payment for death is a long-standing human tradition, and it is here to stay until the concept of violent conflict is eliminated.

Assassination has commonly been used as a form of political terrorism. From a historical context, assassinations have been used to instigate larger movements, such as insurrections, rebellions, revolutions, and other events over time designed to conquer a social system or ideology of an era or region on Earth. In 1933, the attack on President-elect Roosevelt by an Italian immigrant, Giuseppe Zangara, was an attack on the concept of leadership itself. Zangara professed that it didnt matter who held the office and that his target was the symbol of the Head of Stateany Head of Stateas he admitted to considering other U.S. Presidents and the King of Italy as targets as well.1 The modern term character assassination is based on this historical and persistent type of motivation for actual assassinations, where the ultimate goal is to target a public figure in a way that moves the public ideology surrounding the target in the desired way, which has become common in todays political environment.

More to the point of payment for death, assassinations have been one of the most effective and persistent tools of ruling bodies, always. The first known writing describing methods of assassination is Kautilyas Arthashastra (1915), an ancient text from India dated to somewhere between 300 BC and 300 AD. The text encompasses many areas of governing, including chapters concerning war strategy, poisons, spy techniques, and strategies for assassination-style killings.2 While payment is not explicitly discussed, the text is clear that the persons used in these operations are employed as a form of combatants. Sun Tzus The Art of War (1910), believed to be written in the 5th century BC, also briefly mentions assassination as a type of mission assigned to paid spies.3 Echoing the ancient Indian Arthashastra(1915), a Central Intelligence Agency (CIA) file, A Study of Assassination (1953), that was declassified in 1997, likewise details modern versions of assassination techniques, potential weapon ideas, and methods to be used for killing,4 and presumably was used as a training doctrine for paid employees of the Agency from its estimated publication in 1953 until the assassination ban encompassed in Executive Order 12333, signed by President Ronald Reagan in 1981.

Impacts achieved from assassinations, or other forms of paid-for violence, can vary from insignificant, like the Italian who failed to assassinate President-elect Roosevelt, to toppling governments or starting a major war. World War I, for example, was initiated by just such an act. Chief of Serbian Military Intelligence and leader of The Black Hand organization, Dragutin Dimitrijevi, was the head of the snake that took a bite out of the Habsburg Monarchy by orchestrating the assassination of the heir presumptive, Archduke Franz Ferdinand, on 28 June 1914. The same Dragutin Dimitrijevi had led an overthrow of the Serbian Monarchy just a decade prior, in 1903, to install a puppet on the throne to enhance his power and political relations with Russia.5 The Black Hand, a unified Serbian nationalist organization, also known as Unification or Death,6 was recognized as an arm of the Serbian military, acting as an early twentieth-century clandestine organization much like modern Private Military Companies (PMC), with civilian members who could offer plausible deniability to the government when necessary.

Archduke Franz Ferdinand was an advocate for peace,7 and at the time, most Serbians wanted to retaliate against Austria-Hungary for annexing Bosnia-Herzegovina in 1908. The Archduke was; therefore, the primary obstacle preventing a war that Dimitrijevi and many Serbians wanted to start. Ferdinand was also the heir to the throne, and the Emperor was dying, which provided Russia an opportunity to eliminate a Monarchy standing in the way of Russian expansionist ideas as well. This opportunity incentivized Russian approval of the assassination, even if it meant going to war as Serbias ally. War could not be achieved with the Archduke constantly advocating for peace and preventing any Austro-Hungarian aggression, so The Black Hand assassins, controlled by Dimitrijevi, launched their operation. Ferdinand was attacked in his motorcade on his way to give a speech in Sarajevo, but the attack did not go as planned. The first assassin shot at Franz from a distance and missed; the second threw an explosive that ricocheted off the Archdukes car and exploded under the vehicle following behind.8 This first attack failed, and the Archduke survived to give his speech, only to be targeted on the next leg of his journey through the city by the remaining assassins. As the motorcade came to a halt, Gavrilo Princip walked up to the vehicle and shot Franz in the neck, and his wife in the gut.9 Both died of their wounds shortly thereafter.

After the assassination of the Archduke, there was a military escalation of forces between Austria-Hungary, Serbia, and all of their allies. Austria-Hungary declared war on Serbia on 28 July 1914, one month after the assassination of the Archduke, after Serbia refused extraordinary terms offered by Austria-Hungary, which were not expected to be met anyway. Russia, allied with Serbia, mobilized its military upon this declaration of war, and Germany responded by declaring war on Russia, which caused Russias ally, France, to declare war on Germany. Then Germany invaded Belgium to get to Paris, instigating Britain, allied to Belgium and France, to declare war on Germany, followed a few weeks later by Japan, bound by a military treaty with Britain Voila, World War I.10 While this is a unique assassination in the history of assassination because the goal was achieved, this is not an unprecedented success in the theme of payment for death, or of payment for death in war, as the history of mercenaries changing the tides of battle clearly shows.

Mercenaries have been participating in violence for likely the same amount of time as assassins, though generally on a more public and destructive scale, without much in the ways of stealth and treachery. Before countries began fielding standing armies, mercenaries were the primary method of large-scale combat. Being a mercenary was a regular job. Groups of mercenaries would sell their services to the highest bidder, always aware that nations would continue to find reasons to use their services. When problems became scarce, and nobody wanted to pay them, they would create problems of their own, extorting their hosts in the process. Throughout most of history up to the signing of the Peace of Westphalia treaties in 1648, which were the origin of the modern-day nation-state with recognized national borders, mercenaries were the primary forces used for war.11 Mercenaries grew primarily to fill a skill void in the area of combat expertise. Before the creation of standing armies, the duties of war were rotated among individuals too often to retain the necessary experience and skill to achieve efficiency, which led to the rise of experienced warriors willing to sell their services to the highest bidder.

Eventually, mercenaries became a global industry, attracting violent, greedy people with the sole motive of money as their driving purpose. The only logical outcome of this scenario is chaos and tyranny, if for no other reason than that the existence of a large permanent mercenary population creates a strong incentive for constant war. In peace, mercenaries posed a threat to the general population, often resorting to extortion for protection to continue their livelihood when their services were not required, as happened in France in the late 15th century following the end of the Hundred Years War.12 Despite the drawbacks associated with mercenaries, the industry itself survived long after the Peace of Westphalia, and even into the modern world, as supplemental forces to a standing national army have often been seen as desirable for several reasons, from bolstering force size to match an enemy force to bending the rules of national militaries to provide plausible deniability.

Force size has been a constant issue in war, often leading to hiring mercenaries to supplement militaries. This method is not always successful, however, as Great Britain learned during the American Revolutionary War. Unable to maintain security throughout the British Empire around the world and quell the American uprising simultaneously with available military forces, Britain hired approximately 10,000 Native Americans and 30,000 German mercenaries to help fight the American Continental Army.13 The Revolutionary War highlights the fact that mercenaries are only as good as the money they are paid, illustrated by the fact that the American Congress instigated the distribution of leaflets offering the Germansland and livestock to switch sides.14 The nature of the Revolutionary war itself also highlights a more general flaw in the use of mercenaries, in that the Revolutionary war, in the words of Benjamin Franklin, had no cause but malice against liberty.15 This stance points out that the cause of a war, if not properly sold to the participants, can cause a severe undermining within the ranks of the combatants, in turn hurting morale, fostering dissent, and decreasing efficiency, which was experienced significantly on the side of the British. Ultimately, the British use of mercenaries failed to win the war; however, the resulting Constitutional debate was greatly informed by the use of paid actors in warfare, strengthening the Constitutional guidelines for military force regulation in America.

As America grew throughout the transition of the world from mercenary warfare to national militaries, mercenaries became less and less acceptable to the international community. Mercenaries became used primarily to provide plausible deniability to governments and avoid regulations, in much the same way assassins have been used to further objectives of leaders over time. The controversy over the use of mercenaries in warfare grew so extensively that the United Nations decided to institute a new international law, in the form of a treaty titled the International Convention Against the Recruitment, Use, Financing and Training of Mercenaries, signed in 1989.16 The treaty is interesting in that while signed by many countries, neither the United States nor Russia, the two primary superpowers at the time, has signed onto it since its creation, and the language used in the treaty leaves significant room for interpretation, specifically with regards to the treatys definition of a mercenary.17 These flaws have led to the continuation of non-military payment for violence, both with the continued use of bounties and bounty hunters and in the case of carefully labeled paramilitary forces that dont fit within the legal parameters of the treaty definition for mercenaries.

In the late 19th century, after the American civil war, the Pinkerton National Detective Agency, a precursor to the American FBI, established what amounts to the first criminal database in history, with mug shots, wanted posters, and descriptions of criminals and their crimes, all circulating in newspapers across the country and filed with the agency until the death of the criminal.18 Bounties have also been used extensively since the signing of the 1989 UN treaty as an incentive for individual citizens to assist law enforcement and governments in capturing or killing wanted persons, from criminals to terrorists. The most widely known examples of this in America are the FBIs most-wanted lists, which are updated regularly, and put price tags on fugitives at large in the United States and around the world. Among the lists, the FBI provides a top ten list of fugitives and a top ten list of terrorists, with price tags ranging from thousands to millions of dollars in rewards for information leading to capture.19 While the FBIs bounty lists today are generally for capture, not killing, some infamous outlaws in American history, like Frank and Jesse James, were the targets of wanted posters that promised a reward whether the criminals were brought in dead or alive.20

The American justice system outlined in the U.S. Constitution eventually eliminated the use of dead or alive wanted posters, as they are illegal under the Constitutional Bill of Rights that provides for a fair trial before sentencing. Still, the bounty system remained intact for capture. During the American-led invasion of Iraq in 2003, another bounty-style system was used to target the most important members of the Iraqi forces and government, in the form of a deck of cards. The Defense Intelligence Agency, after years of research, developed a target/value identification system based on the standard value system assigned to a deck of cards in poker games to assist ground forces in identifying targets of value in Iraq.21 Saddam Hussein occupied the highest value position, the ace of spades, with consecutively lower-valued individuals identified in succession throughout the deck, aces first, then kings down to twos. While money was not directly associated with this example, prestige was undoubtedly a motivating factor for ground forces capturing high-value targets, and the system set the stage for non-government paramilitary forces to participate directly in ongoing military operations during an active war.

Blackwater quickly emerged as one of the first major controversies of the 21st century, as a PMC working for the United States government in active military combat zones in Iraq and Afghanistan, without oversight from Congress equal to that of U.S. military forces, but with missions encompassing the same areas as the American military.22 Acting independently of the military, the organization participated in defensive and offensive combat operations to help accomplish military missions of the United States. Without military oversight, and acting directly on behalf of the Executive Branch of government, PMCs like Blackwater are nearly identical to historical mercenary organizations working for pay in combat environments. The United States is not the only country with PMCs. The practice has become widespread since the signing of the 1989 UN treaty banning mercenaries and includes the Russian PMC, The Wagner Group, which is essentially the Russian version of Blackwater. The authoritarian government of Russia, however, has resulted in a much more dangerous version of a PMC than Blackwater and has included domestic operations within Russia as well as foreign operations.23

Iranian governing practices have given rise to a very different type of PMC. Irans military, paramilitary, and intelligence organs are all essentially PMCs in the way that they operate due to the nature of Irans government structure, and they are all directly controlled by the Supreme Leader. The primary arms of these enterprises are the Ministry of Intelligence and Security (MOIS) and the Iranian Revolutionary Guard Corps (IRGC). These organizations work together in directing and supporting the PMC-like Quds Force operatives around the world in support of collection efforts, intelligence operations, paramilitary operations, assassinations, and terrorist activities. While the Quds Force advances Iranian efforts to export revolution around the world, their local PMC-like organization, known as the Basij, works to subvert independence within Iran, assisting in tyrannical oppression of free speech and liberty within the country and violently suppressing any attempt to cause disturbances against the Supreme Leader. Iran targets enemies abroad using a decentralized system of third-party actions and efforts, combining the principles of the bounty system and PMC architecture instead of engaging directly in combat efforts. In 2006, for example, when the Islamic State terror organization was still called Al-Qaeda in Iraq (AQ-I),24 the MOIS provided financial, material, technological, and other support to their leader, Abu Musab al-Zarqawi, directly supporting the terrorists war against U.S. personnel in Iraq.25

The contrast between Blackwater and the Iranian Quds Force is extreme, but the core issue inherent in their existence is nearly identical. With the rise in popularity of PMCs around the world after their successful use by the United States in the War on Terror, the core issue of their existence needs attention from the world. The international community recognized that even though Blackwater was targeted for their deeds, their success in achieving mission goals was undeniable. China, Pakistan, Great Britain, Australia, India, and many other countries have worked to develop similar types of organizations in their countries to take advantage of the gray area of contractor combat operations. These organizations are primarily in the employ of the Executive Branch of governmentor its national equivalent. They are generally not under the structure of the national military for legal purposes or oversight. They are mercenaries, being used in the modern-day to bolster force size that otherwise cannot grow and to skirt existing national and international laws with regards to combat operations and security. While the attention drawn to Blackwater caused them to change their name to Academi, the core issue of the existence of PMCs, in general, has not been significantly addressed in the international community.

The practice of paying people to kill has been around for a long time and is likely to stay, absent total world peace. The question that comes to mind isnt whether or not this process exists, or even how to eliminate it, but rather, what the best way forward is for the United States and the international community, knowing that this process is an inherent part of world politics and international relationships. Attention, publicization, and regulation are likely the most effective weapons against barbarity in warfare, as has been shown throughout history. Attention drawn to assassins led to a ban on the practice of assassination. Attention drawn to mercenaries led to a ban on mercenaries. Attention drawn to the American Constitutional justice system led to the elimination of dead or alive bounties. Attention drawn to PMCs led to a restructuring of the relationship between the United States government and third-party contractors and continues to shape the potential future of PMCs. When the people of the world pay attention, publicize rights and wrongs perpetrated by governments and leaders, and work to create effective regulations to ensure that human dignity and individual liberty are the primary goals of such regulations, freedom succeeds, and tyranny fails.

The views and opinions expressed in this article are those of the author and do not necessarily reflect the official policy or position of any U.S. government agency, including but not limited to the Department of Defense, the Department of the Army, the Department of the Navy, or the Marine Corps. Assumptions made within the analysis are not reflective of the position of any U.S. government entity.

1William Crotty, Presidential Assassinations, Society 35, no. 2 (1998): 102-103.

2Kautilya, Arthashastra, Translated by R. Shamasastry, (Bangalore: Government Press, 1915), 461-474.

3Sun Tzu, The Art of War, Translated by Lionel Giles, (London, UK: Luzac and Co., 1910), 34.

4Central Intelligence Agency, A Study of Assassination, Central Intelligence Agency (1953), Accessed on July 2, 2020, https://archive.org/details/CIAAStudyOfAssassination1953/mode/2up.

5Donald Yerxa, July 1914: An Interview with Sean McMeekin, Historically Speaking 14, no. 3 (2013): 12-16.

6Elena Kosmach, Serbs and Russians, Canadian Slavonic Papers 43, no. 1 (2001): 109-114.

7Ian Beckett, Franz Ferdinand, Historian no. 120 (2014): 18-22.

8Geoffrey Wawro, Mad Catastrophe: The Outbreak of World War I and the Collapse of the Habsburg Empire, (Boulder, CO, USA: Basic Books, 2014), 104-106.

9Wawro, Mad Catastrophe, 106.

10 Martin Levinson, Mapping the Causes of World War I to Avoid Armageddon Today, Et Cetera 62, no. 2 (2005): 157-164.

11 Matthew Underwood, Jealousies of a Standing Army: The Use of Mercenaries in the American Revolution and its Implications for Congresss Role in Regulating Private Military Firms, Northwestern University Law Review 106, no. 1 (2012): 317-349.

12 Ibid.

13 Ibid.

14 Ibid.

15 Benjamin Franklin, The Life and Letters of Benjamin Franklin, (Eau Claire: E.M. Hale & Company, nd), 253.

16 United Nations, International Convention Against the Recruitment, Use, Financing and Training of Mercenaries, United Nations (1989).

17 Ibid.

18 Pinkerton, Our History, Pinkerton (2020), Accessed on July 6, 2020, http://www.Pinkerton.com/our-story/history.

19 FBI, Most Wanted, FBI (2020), Accessed on July 6, 2020, http://www.FBI.gov/wanted.

20 Sophie Tanno, $5,000 for Jesse James Dead or Alive and $100,000 for Lincolns Three Killers: The Fascinating Wanted Posters for Americas Biggest 19th Century Criminals, Daily Mail (2019), Accessed on July 8, 2020, http://www.dailymail.co.uk/news/article-7280265/the-fascinating-wanted-posters-americas-biggest-19th-century-criminals.html.

21 Doug Sample, The Faces Behind the Faces on the Most Wanted Deck, American Forces Press Service (2003), Accessed on July 6, 2020, archive.defense.gov/news/newsarticle.aspx?id=29017.

22 Underwood, Jealousies of a Standing Army.

23 Kimberly Marten, Russias Use of Semi-State Security Forces: The Case of the Wagner Group, Post-Soviet Affairs 35, no. 3 (2019): 181-204.

24 Kenneth Katzman, Iraq: Politics, Governance, and Human Rights, Current Politics and Economics of the Middle East 5, no. 4 (2014): 415-476.

25 Library of Congress, Irans Ministry of Intelligence and Security: A Profile, Federal Research Division (2012), 37.

Thanks for signing up! Please check your inbox for an email confirming your subscription.

Joshua Duke

Joshua Duke served as a military intelligence analyst, including 24 months in Iraq in support of Operation Iraqi Freedom I, II, III, and IV. He holds a B.A. in Intelligence Studies with a Concentration in Counterintelligence from American Military University, and is now serving in his second branch of the military. Joshua focuses on several national security and intelligence related subjects, including new approaches to counterterrorism using counterintelligence-based models, autonomous weaponry developments and their applications to international law and United States national security, and the future impacts of the space domain on global economics and security.

Follow this link:

Paid to Kill: An Examination of the Evolution of Combatants for Hire - Global Security Review

The delicious history and evolution of MREs – Americas Military Entertainment Brand – We Are The Mighty

Since its official field debut in 1983, the MRE has come a long, long way. Today's current iteration seems like veritable fine dining compared with previous versions, but they're still widely considered "Meals Rejected by Everyone," and "Meals Rarely Edible." Take a look at how MREs have evolved over time and what the DoD is doing to make them more palatable.

1907: The Iron Ration becomes the first individual combat ration issued to military personnel and included three 3-ounce cakes made from beef bouillon powder and cooked wheat, three 1-ounce bars of chocolate, and salt and pepper.

1917: Reserve Rations are issued to soldiers during the end of WWI. These included 12 ounces of fresh bacon or one pound of canned meat, two 8-ounce cans of hardtack biscuits, 1.16 ounces of ground coffee, 2.4 ounces of sugar, and .16 ounces of saltno pepper in sight.

1938's C-Ration is closest to what many now think of as the MRE. It consisted of an individually canned, wet, pre-cooked meal. Service members had three choices: meat and beans, meat and vegetable stew, or meat and potato hash.

Just four years later, the 1942 K-Ration saw an increase in both calories and options. This MRE included meals for breakfast, lunch, and dinner, but the choices (canned ham and eggs, bacon and cheese for lunch, and a beef and pork loaf for dinner) weren't that appetizing.

By 1958, the Meal, Combat, Individual (MCI) included canned wet rations averaging about 1,200 calories each. The majority of all service members disliked the MCI, but this remained the only field option available for almost twenty years.

Adopted as the official DoD combat ration in 1975, large scale production of Meals Ready to Eat began in 1978, and the first delivery went out just three years later. The 25th ID ate nothing but MREs for 34 days, and service members rated the food "acceptable," but only about half of the meals were consumed. Translation: the food was super gross, and the soldiers only ate them out of necessity. Three years later, the same experiment was performed with the same results.

(U.S. Air Force Photo)

So, starting in 1988, the DoD made some changes. Entre size was changed from 5 ounces to 8 ounces, and nine of the 12 entre options were replaced. Candies were added to four choices, as was hot sauce, and for all 12 menus, cold beverage choices were made available.

But the MREs were still pretty gross.

Field testing and early feedback from Operation Desert Storm (ODS) brought another round of changes. This time, the DoD replaced old mil-spec spray-dried coffee with commercially freeze-dried coffee. Hot sauce was made available to all 12 menus, dehydrated fruits were swapped out for wet-pack fruit, and candy was made available to an additional four menus choices.

During ODS, service personnel ate MREs for as many as 60 days in a row, which resulted in another round of changes. Shelf-stable bread inside an MRE pouch was created, a chocolate bar able to withstand high heat was developed, and flameless ration heaters were developed as an easy method for service members to heat their entrees since the only thing grosser than eating MREs for two months is eating cold MREs for two months.

In 1994, more changes were field-tested. The DoD decided that commercial-like graphics should be added to increase consumption and acceptance. MRE bags became easier to open, and biodegradable spoons were added.

1996 saw MREs available for special diets to help increase calorie intake for service members in the field. Menu counts increased to 16 items and included ham slices and chili. One year later, there were 20 entre items, including cheese tortellini and boneless pork chops with noodles.

Current menu offerings include southwest style beef and black beans, pepperoni pizza, creamy spinach fettuccine, and vegetable crumbles with pasta in taco style sauce. While none of those sound exceptionally appealing, they're far better than beef bouillon cakes of 1907.

Ranked as the best MRE available, the chili mac menu comes with pound cake, crackers, a jalapeno cheese spread, and candy. The worst choices tie between the veggie burger (which includes a knockoff Gatorade powder, two slices of snack bread, and a chocolate banana muffin) and the Chicken a la King, which sounds yummy but is, in fact, just a gelatinous goo of shred of "chicken."

MREs are useful for FTXs and good to have on hand in case of natural disasters. They're convenient and shelf-stable, so they're a good addition to emergency preparations. But don't count on them tasting that great.

From Your Site Articles

Related Articles Around the Web

Go here to read the rest:

The delicious history and evolution of MREs - Americas Military Entertainment Brand - We Are The Mighty

New CBRE report shows COVID-19 is ‘accelerating’ the evolution of Korea’s office market – RE Talk Asia

New research has revealed the role of COVID-19 in transforming Korean workspaces, with an increase in space requirements identified as one of the likely by-products of the pandemic.

CBRE Korea'sThe Future is Flexible: The Evolution of Work and the Office in Koreacovers the effects of accelerating changes in the office market due to COVID-19 and a significant increase in new Grade A supply on demand for flexible space, remote working and activity-based working (ABW) environments.

With the transmission of the virus frequently occurring among groups of people in enclosed spaces, CBRE notesit is necessary to revise the space utilization standards of flexible work environments to reduce close interaction between employees, addingcompanies will have to create a balance between employee health and safety, cost and space efficiency.

At a glance:

Source: CBRE Research

CBRE Managing Director Don Lim said there wereconcerns that the shift in the workplace may lead to a decline in footprint requirements in the long term.

The nature of business for most companies means they will retain a strong need for physical office space," he said.

"Companies need to comprehensively consider a variety of aspects besides cost savings from reducing the office area.

"In the future, companies will need to rethink the balance between office work and remote work considering what the office does for efficiency as well as take into account the recent trend of using the office as a means of corporate branding and collaboration.

Occupiers willingness to use flexible space in the next three years (left) and their objectives for doing so (right).

CBRE Research conducted interviews with four major coworking operators in May to identify the status of the flexible space market and its prospects, finding that the coworking market has been largely unaffected by COVID-19.

According to the firm, there have been no major cases of corporate tenants cancelling memberships or returning space, with H1 2020 instead signalling anincrease in leasing and membership enquiries from potential tenants seeking short-term office space as a solution to social distancing and as a consequence of needing to locate staff across different locations to mitigate risk.

CBRE Korea Head of Research Claire Choi said as large occupiers make greater use of flexible space and workplace design solutions in the coming years, demand for coworking space in Seoul wasexpected to remain robust, while the city'sexperiment with remote working due to COVID-19 hadproved to be largely successful,with higher employee satisfaction and increased cost savings and similar productivity.

Source: CBRE Research

It will take some time for remote working practices to be permanently adopted in Korea," she said.

"Companies will adopt remote working selectively as needed.

"As more companies review the efficiency of space with implementation of remote work, it will lead to changes in the size, role and features of the office.

Despite the anticipated shift to remote working and an increase in companies reconsidering the efficiency of their existing office space, CBREforecaststhat employees will continue to demand ABW environments providing a variety of different settings to facilitate different working styles, with the companies prepared to invest in and manage this transformation as well as in augmenting hygiene and safety measures in response to the pandemic able to"reap a myriad of benefits" from a more productive, inspired and loyal workplace.

Click here to view the report.

Similar to this:

Asia Pacific commercial sentiment improving despite drop in investment volume - CBRE

Leasing and investment activity in Seoul 'remains stable' despite pandemic impact - CBRE

Digital transformation of retail in the Asia Pacific accelerating due to COVID-19 -CBRE Survey

Read more:

New CBRE report shows COVID-19 is 'accelerating' the evolution of Korea's office market - RE Talk Asia

The Male Anglerfishs Evolutionary Solution to Female Rejection – The New York Times

In a biopic about the mating rituals of anglerfish, its unclear what would earn the film its R-rating: the sex or the violence.

Born into an inky deep sea world, the males of certain anglerfish species exist solely to sniff out their mates. Upon locating his lady (who might be up to 60 times his size), the male will nip at her belly. His mouth then dissolves in a sludge of chemicals that physically fuse him to his bioluminescent bride, forever commingling his blood and tissues with hers.

This grotesque ritual, called sexual parasitism, looks just as bizarre as it sounds. To an immunologist, though, the aesthetics of this macabre form of unholy matrimony arent actually the weirdest part.

Two genetically distinct animals, no matter how much in love, shouldnt be able to merge their flesh without serious consequences, said Dr. Thomas Boehm of the Max Planck Institute of Immunobiology and Epigenetics. Its the same reason that transplanted organs often get rejected by a recipients body: Vertebrate immune systems are built to wage war on any foreign matter.

And yet, some male anglerfish are full-time grafts the ultimate live-in boyfriends. It really is a mysterious phenomenon, Dr. Boehm said.

With the help of modern genetic sequencing, Dr. Boehm and his colleagues may have solved this deep sea dilemma. Anglerfish have largely jettisoned a branch of the immune system thats been a fixture of vertebrate bodies for the last 500 million years, they report in a study published Thursday in Science. The adaptation may help the clingiest of couples stick together.

Its a substantial sacrifice to make, even for sex: Similar changes would be lethal for humans and no other animals have yet been documented doing the same.

This is some of the cooler science Ive read in a while, said Jesyka Melndez Rosa, an evolutionary biologist and expert in the genetics of the immune system at the University of Puerto Rico who wasnt involved in the study. It just goes to show, nothing is sacred.

Anglerfish have good reason to resort to extreme evolution. Thousands of feet below the surface of the sea, where the suns rays dont shine, both food and friends are scarce. Many males never actually manage to find a female. So if they do meet up, what better thing to do than to bite and hold and stay that way? said Theodore Pietsch, an evolutionary biologist at the University of Washington and an author on the study.

Thats probably why sexual parasitism has supposedly evolved multiple times across the anglerfish family tree. In some cases, the attachments are temporary the boys hop on and off as they please. In others, though, the males become permanent fixtures on the females.

These longer-lasting hookups come with a price. After males glom onto their girls, their innards rapidly atrophy until little more is left than a bulbous pair of testes, fringed with gills, protruding from the females flank like a sperm-filled saddlebag. Theres basically no integrity at this point, Dr. Pietsch said.

In the most extreme version of this trait, females of some species will host up to eight male consorts at a time.

To figure out how the fish tissues tolerate each other, the researchers sequenced the genes of 10 types of anglerfishes. They found that two of the most decorated species, where females sported entourages of males, had lost their ability to produce functional antibodies and T cells two types of immune system sentinels that greatly underpin the bodys ability to distinguish its own cells from unfamiliar ones, and annihilate inbound threats.

That strategy comes in handy when animals must contend with germs or cancerous cells, said Zuri Sullivan, an immunologist at Yale University who wasnt involved in the study. The so-called adaptive immune system, to which antibodies and T cells belong, also helps the body remember past encounters with pathogens so they can be vanquished again. It provides this huge benefit, Ms. Sullivan said. Its a big thing to lose.

Similar genetic changes were present in anglerfish that melded monogamously, though to a lesser degree. These more faithful fish still had genes that allowed them to manufacture a limited selection of disease-fighting antibodies, for instance.

Least altered of all were the ephemeral attachers, who seem to have retained the genes for T cells and a blunted antibody response. In general, the less durable the bond, the more intact the immune system, Dr. Boehm said. That pattern makes sense: Short-lived flings between partners can withstand some tissue rejection, but the stakes are far higher when a relationship is for keeps.

Dr. Boehm said the data so far point to the possibility that deterioration of anglerfish immunity preceded the rise of sexual parasitism. But figuring out the order of these events is really a chicken or egg situation, Dr. Melndez Rosa said.

The researchers also dont yet know how anglerfish manage to ward off infections. But theres more to the immune system than antibodies and T cells; perhaps other members of this complex cavalry have risen in the ranks to compensate, Ms. Sullivan said. Clearly, these animals are doing fine, she said.

Finding these answers will likely require finding more rare deep sea anglerfish. It took several years to amass 31 specimens with enough DNA to analyze, Dr. Boehm said. But the researchers are up for the challenge.

We are not quite sure what lessons the anglerfish will teach us, Dr. Boehm said. But we know they have done something really incredible.

Read the original post:

The Male Anglerfishs Evolutionary Solution to Female Rejection - The New York Times

The evolution of the EITI and next steps for tackling extractive industries corruption – Brookings Institution

Since 2002, one of the highest-profile efforts to increase natural resource transparency in resource-rich countries has been the Extractive Industries Transparency Initiative (EITI), a multistakeholder initiative consisting of countries, companies, and civil society organizations. Any attempt to grapple with issues of transparency, governance, and anti-corruption in the natural resource sector must proceed with an understanding of the groundwork laid by the organization and the lessons learned from its experiences. As the EITI nears its 20-year anniversary, the time is ripe to analyze evidence surrounding EITIs successes in opening up extractive industries data, along with its shortcomingsand its potential. Charting the EITIs evolution and journey through the mechanisms of transparency, accountability, and participation can illustrate the ways in which truly effective natural resource governance can take root.

Today, the governments of 53 countries commit themselves to implementing the set of disclosure requirements known as the EITI Standard. (While the Obama administration committed the United States to EITI implementation in 2011, the Trump administration withdrew the country from the initiative in 2017.) While the EITIs original focus was on transparency in revenue collection, the Standard has expanded to cover a wide variety of resource-related data, including contracts with extractive companies, data on resource production, and extractives-related employment numbers. In other words, the Standard now encompasses much of the natural resource value chain, the sequence of resource governance decisions beginning with the decision to extract a resource and ending with government spending of resource-derived revenues. To date, $2.64 trillion in natural resource revenues have been disclosed by EITI-implementing countries.

The EITI was launched after academics in the 1990s and early 2000s began to note that large endowments of natural resources, far from ensuring a countrys economic future and the well-being of all its citizensas had been suggested by previous theories of development economicsin fact served to undermine economic growth and corrode institutions. At the same time, governments the world over were making deals with oil, gas, and mining companies that purportedly required that some of the revenue be returned to the state in the form of royalties, taxes, and other proceeds. These windfalls could have been the basis for a significant improvement in the material lives of these states citizens. But, too often, they were not.

Efforts to discover where of all the money was going had been stymied, with little information regarding how that money was spentor indeed, even how much governments received from extractive projectsmade publicly available. This opacity limited peoples ability to gauge whether their governments were using the resource wealth to benefit all citizenswho exercise sovereign rights to their countries resource endowments under international lawand so in turn inhibited their ability to hold their governments to account.

At least, that was the theory when the EITI was founded in 2002: that a flood of data about the money would unleash a wave of citizen engagement, which in turn would drive down corruption and improve development outcomes. But reality is far more complicated, and mechanisms beyond transparency are needed to more fully effect change.

Research has shown that while transparency is an important precondition for fostering accountability and ultimately reducing corruption, it is not, by itself, sufficient to promote change.

For example, a recent success stemming from EITIs transparency model demonstrates that its disclosure regime is often only the first link in a chain leading to reduced corruption. In 2017, the nonprofit investigative organization Global Witness analyzed the Democratic Republic of the Congos 2014 EITI report. It found discrepancies which showed that the mining conglomerate Glencore may have paid more than $75 million between 2013 and 2016 to Dan Gertler, a businessman previously accused of bribing senior officials there. Spurred on by these and numerous other accusations of corruption, the United States imposed sanctions on Gertler in 2017. Those sanctions, in turn, may have prompted the then-president of the DRC, Joseph Kabila, to not run for reelection.

The EITI, as this example illustrates, is largely reliant on othersincluding infomediaries, such as journalists and civil society organizationsto translate technical information (which includes all resource-related disclosures) for a general audience. This, in turn, helps foster the participatory civic engagement that is critical to promoting accountability.

From the EITIs inception to the present, transparency has been at the core of the its work, while participatory and accountability mechanisms were often weak or absent. To be sure, the EITIs model requires all implementing countries to form multistakeholder groups (MSGs) consisting of representatives from government, industry, and civil society to oversee EITI implementation and thereby to presumably foster participation. But many MSGs are not representative of society as a whole, and (with a few exceptions), only operate at the national level, leaving critical stakeholders at the regional and city levels out of the discussion. Moreover, the EITI has been criticized for prioritizing the release of data and diminishing the decisionmaking authority of national MSGs. As a result, while some MSGs have become legitimatearenasfor dialogue,in other places they often prove less able to impact decisions or prompt policy changes that are responsive to their concerns.

What participatory efforts like MSGs can missand what is increasingly recognized by academics and practitioners as a critical part of the pictureis an intentional focus on accountability mechanisms. Pioneering work by Jonathan Fox has argued in favor of a sandwich strategy to foster social accountability, which requires an opening from above in the form of commitment by reformists with power over policy implementation along with more traditional citizen engagement efforts that push from below. The mutually reinforcing mechanisms of the sandwich strategy can both strengthen citizen participation efforts and create accessible and responsive institutions.

Of course, a key challenge of the sandwich strategy involves the difficulty of finding powerful policymakers willing to engage with transparency and participatory efforts. Here, one useful tactic is to remove the roadblocks that can inhibit pro-reform policymakers. A requirement first introduced in the 2016 EITI standard could be of use in tackling this challenge: the mandatory disclosure of beneficial ownership information beginning in 2020. Beneficial owners (i.e., the real owners or those who benefit from the profits) of extractive companies often hide behind shell companies and other unaccountable corporate entities, making it impossible to tell if the real owners are, in fact, government officials themselves. These politically exposed persons, as they are known, are fundamentally unable to serve in the role of reformists committed to effective governance in natural resource management, since their personal interests override common interests. Furthermore, murky ownership schemes can fuel perceptions of corruption and trigger citizens to lose confidence in government institutions. While beneficial ownership disclosures are also unlikely to be a panacea for fostering top-down accountability efforts, they will greatly assist in the identification of those government officials who can never serve that role.

Evidence to date suggests that a bundled approach of transparency, accountability, and participatory (TAP) mechanisms is most effective in promoting effective governanceof natural resources and beyond. (Indeed, the EITI itself acknowledges that implementing the Standard is not a silver bullet to solve all corruption issues, but instead can be a tool to identify and address weaknesses in natural resource management.) Bottom-up citizen engagement efforts rely on transparency in policy, actions, and expenditure, so that citizens are aware of government officials actions and can work to hold them to account. Avenues for citizens to participate in the policy process and express their concerns to government officials further this work, and receptive, accountable policymakers committed to reform are indispensable for responding effectively to citizen concerns.

The Leveraging Transparency to Reduce Corruption (LTRC) project adds another hypothesis to this TAP troika: that careful attention to contextual factors; consideration of the implementation gap within TAP programs; and attention to natural resource-specific complementary institutions, structures, and programs that are likely to significantly interact with TAP interventions are needed to have a greater chance of success. (See here and here for more on the TAP-Plus hypothesis and the pilot studies we are undertaking to test it).

The EITI has achieved successes in producing high-quality open data across the natural resource value chain in implementing countries. Now, it is time to test new strategies by developing country-adapted and evidence-informed strategies toaddresscorruption and to achieve sustainable development goals.

Research and editing assistance from Joseph Glandorf. Editing assistance from Robin Lewis.

Visit link:

The evolution of the EITI and next steps for tackling extractive industries corruption - Brookings Institution

The evolution of Liverpool’s front three – The Athletic

Together they form a dazzling three-pronged attack.

Mohamed Salah, Sadio Mane and Roberto Firmino have fired Liverpool to Champions League and Premier League glory over the past two seasons.

Imagine where I would be if these boys did not play for me, wow, beamed Jurgen Klopp after Salahs match-winning double for the champions at Brighton & Hove Albion in July brought up the milestone of 250 goals between the trio during the Germans Anfield reign.

Yet, interestingly, as Liverpool have become more consistent and more successful under Klopp, the collective goals return of his front line has actually dipped.

They scored 91 times between them in all competitions (57 in the Premier League) in 2017-18. That figure dropped to 69 in all competitions (56 in the Premier League) for 2018-19 and 57 in all competitions (46 in the Premier League) for 2019-20.

Analysing the data helps to explain the change in their output and...

Read the rest here:

The evolution of Liverpool's front three - The Athletic

Evolution reverses dispersal rates among fruit flies: Study – The Indian Express

Written by Anjali Marar | Pune | Published: August 4, 2020 12:10:23 am The research aimed at determining the role of population density of the flies in a location to their dispersion behaviours, and how evolved male and female flies undertook dispersion. (Representational)

A study by a group of city-based biologists has concluded that male and female Drosophila, more commonly known as fruit flies, undergo differential rates of dispersal as they evolve.

A team, led by Sutirth Dey, at Indian Institute of Science, Education and Research (IISER), Pune, studied 29,000 fruit flies under controlled conditions in the laboratory. The research aimed at determining the role of population density of the flies in a location to their dispersion behaviours, and how evolved male and female flies undertook dispersion.

Every organism, including humans, disperses from one location to another, either in search of food or better chances of survival. In simple terms, a location with higher density offers fewer resources, like food, forcing organisms to disperse at a higher rate.

Among many factors influencing this movement are environment, habitat, and density of a given location. Dey, along with team members Abhishek Mishra and Partha Chakraborty, attempted to determine this pattern in which female and male fruit flies dispersed as they evolved.

One key parameter that researchers used while performing the evolutionary study was density dependent dispersal (DDD), which tells the existence of an organism at a particular place.

Dey said, In the initial phases, the rate of dispersal of females outnumbered that of males. But as they evolved, the dispersal rate was higher among males. This means evolution completely changed the behaviour and reversed the rate of dispersal of the two sexes, an evidence gathered for the first time.

Scientists said dispersal and its rate offered clues in understanding and predicting movement patterns of organisms. Studies on dispersal could be useful in epidemiology, conservation of biodiversity, and importantly, devising strategies for controlling agricultural pests, they added.

The paper, recently published in Evolution, also highlights a greater need to study endangered organisms, especially when their dispersal is increasingly strained due to climate change and fragmentation of suitable habitats.

The Indian Express is now on Telegram. Click here to join our channel (@indianexpress) and stay updated with the latest headlines

For all the latest Pune News, download Indian Express App.

See the article here:

Evolution reverses dispersal rates among fruit flies: Study - The Indian Express

Vyne Realizes Business Evolution with Dental Business Rebrand – PRNewswire

ATLANTA, Aug. 3, 2020 /PRNewswire/ --Vyne, a recognized market leader in health information exchange and electronic healthcare communication management, announced today a rebrand of its dental business. The Vyne Dental brand reflects the company's evolution into a complete revenue cycle management solutions provider.

Vyne has historically served the dental market with its industry stalwart brand NEA, providing the HITRUST CSF Certified FastAttach solution and the Vyne Connect encrypted email platform. These products connect dental practice offices to hundreds of dental plans and payers nationwide.

In 2019, Vyne was acquired by The Jordan Company, a middle-market private equity firm, initiating the company's evaluation of growth opportunities. Less than a year later, Vyne made a strategic investment in Renaissance Electronic Services, LLC, an Indianapolis-based technology company providing EDI products and services to dental practices across the country.

The rebrand to Vyne Dental allows dental practices to partner with a single vendor for fully electronic management of dental claims, claim attachments, and encrypted email. Eliminating manual, disconnected processes and ensuring data continuity helps empower dental professionals to make processing claims easy, grow their businesses with predictable revenue, and work confidently in an ever-changing industry.

The product portfolio under Vyne Dental includes Remote Lite claims processing, FastAttach electronic claims attachments, and Vyne Connect encrypted email.

The company's website, logo, graphics, and communications have been updated in support of the rebrand. These Vyne Dental brand assets, along with a new website and messaging, convey the value of the integrated platform in a straightforward manner, with a focus on solving key problems today's practices face.

"The Vyne Dental rebrand signifies the integration of the NEA and Renaissance Electronic Services brands into one that allows us to serve dental practices with a complete electronic revenue cycle management solution," said Vyne Dental president Robert Patrick. "Our platform helps eliminate manual, disconnected processes and data to simplify claims processing, attachments, and secure messages, which is essential to the success of today's dental practices."

For more information on Vyne Dental, visit vynedental.com.

About Vyne

Vyne is a recognized industry leader in end-to-end health information exchange and electronic healthcare communication management. The company's robust technology platform facilitates the electronic capture, storage and submission of healthcare data in virtually any form voice, document, image, data, fax or electronic interface. Vyne's proven solutions connect disconnected data to close gaps in documentation and improve the continuum of care through a more complete and fully accessible patient record. For more information, visit vynecorp.com.

2020 Napa EA/MEDX, LLC. All rights reserved. Vyne logos, product and service names, including but not limited to, FastAttach mentioned herein are registered trademarks and are the property of Electronic Attachment, Inc., or their respective affiliated entities.

All third-party trademarks and tradenames (including logos and icons) referenced are and remain the property of their respective owners.

Press Contact:

Scott E. Rupp941-794-5137https://millerrupp.com/

SOURCE Vyne

Home 2024

Follow this link:

Vyne Realizes Business Evolution with Dental Business Rebrand - PRNewswire

Next Phase of ENCODE Finds MORE Functional Information in Genome Junk – Discovery Institute

Image credit: Geralt, via Pixabay.

The first publications from the ENCODE project (Encyclopedia of DNA Elements) made a big splash atEvolution News in 2013, and around the world, because it undermined the junk DNA myth and simultaneously fulfilled an ID prediction: that non-coding parts of the genome would prove functional. Junk-DNA proponents like Dan Graur were upset at the time,admittingas Jonathan Wells reported, If ENCODE is right, evolution is wrong.

Well,ModENCODE(ENCODE for model organisms) found unprecedented complexity in the fruit fly genome in 2014, then ENCODE 2 followed up with more discoveries of function. Now, ENCODE 3 has just finished submitting its reports, with record numbers of DNA annotations listed, and ENCODE 4 is gearing up. Nothing like a little overkill to drive the point home: then evolution is wrong. Look at how much constructive science is being done with the assumption that DNA elements are there for a purpose.

Before introducing the latest results,Natureprovides an overview, Perspectives on ENCODE, that recounts the history and purposes of the project:

The ENCODE Project was launched in2003, as the first nearly complete human genome sequence was reported.At that time, our understanding of the human genome was limited.For example, although 5% of the genome was known to be under purifying selection in placental mammals,our knowledge of specific elements, particularly with regards to non-protein coding genes and regulatory regions, was restrictedto a few well-studied loci.

ENCODE commenced asan ambitious effort to comprehensively annotate the elements in the human genome, such as genes, control elements, and transcript isoforms, and was later expanded to annotate the genomes ofseveral model organisms. Mapping assays identified biochemical activities and thus candidate regulatory elements. [Emphasis added.]

Annotations are like labels or comments on things. For instance, if you have a stereo system with a lot of cables, you might affix tags on them to indicate where the TV plugs in, or where each speaker wire goes. In computer programming, wise programmers add comments in English to explain what a section of code does. Comments do not affect the function of the code, but help the next programmer follow the logic.

DNA is like a program, only it did not come with English comments! That is why ENCODE is important; the project is building a searchable database for researchers to find out what a string like ACCCTGTAAAGTG is doing. Is it a gene? Is it a control region? Medical researchers will want to see if a SNP (single nucleotide polymorphism) in that string correlates with a disease.

The project is sending scientists all over the world on a treasure hunt for functions in the junk pile assumed to exist from evolutionary history. The first results in 2013 indicated that over 80 percent of the genome was being transcribed. That was a strong clue that most non-coding regions were functional, even if the functions were unknown, because a cell would be unlikely to spend the energy transcribing nonsense. Indeed, many of those transcriptions turned out to be important regulatory regions.

The project began slowly but is accelerating.

Phase I (20032007) interrogated a specified 1% of the human genome in order toevaluate emerging technologies.

Phase II(20072012)introduced sequencing-based technologies(for example, chromatin immunoprecipitation with sequencing (ChIPseq) and RNA sequencing (RNA-seq)) that interrogated the whole human genome and transcriptome. General assays such as transcript, open-chromatin and histone modification mapping were used on a wide variety of cell lines, while more specific assays, such as mapping transcription factor binding regions, were performed extensively on a smaller number of cell lines to providedetailed annotations on, and to investigate the relationships of, many regulatory proteinsacross the genome.

The findings of ENCODE are accelerating along with sequencing technologies. The latest Phase III reports were published July 29 inNature. Some of the labs involved are telling what they found.

Cold Spring Harbor Laboratoryincludes a must-watch video:

It begins with a striking moment where Ewan Birney, senior ENCODE researcher at CSHL, opens a huge tome containing a complete printout of the human genome. He calls it a big achievement in 2000, but its just a set of boring letters that ENCODE is bringing to life. These letters actually do something, he says, they mean something. The goal is to find out what they mean to learn their functions. Magdalena Skipper, the next speaker, says that the ENCODE Consortium considers functional elements in very broad terms beyond genes to the regulatory elements, switches and even to parts where we have no idea what they are doing, Birney adds. This fits ID proponent Paul Nelsons motto, If something works, its not happening by accident.

So far ENCODE has produced a staggering hundreds of terabytes of raw data in detailed form:

In Phase 3, researchers took advantage of the latest genetic technologies to glean data from biological specimens and deeply investigate theregulatory regions outside of genes, where most of the genomes person-to-person variation lies.Their data identifies some900,000 candidate regulatory elements from the human genome and more than 300,000 from the mouse, which can be explored through ENCODEs new online browser.

Within the hundreds of cell types studied, ENCODE is helping scientists understand why your liver cell is different from your kidney cell, Birney says; the secrets will be found in the switches that turn genes on and off. Its really a first view of that complexity that generates a human being.

Skipper says it was striking to find that they were able to assign a biochemical function to 80 percent of the genome: striking, because not such a long time ago, we still considered that a vast proportion of the human genome was simply junk. Birney comments, Its very hard to get over the density of information in the genome. They found places that are much more complex than expected, and loci thought to be completely silent are actually teeming with life, teeming with things going on; we still really dont understand that. Another surprise is that portions corresponding with disease are being found in non-coding parts of the genome.

This encyclopedia is a living resource. It has a beginning but really no end. It will continue to be improved, and grown, as time goes on.

MITs news releaseis titled, Bringing RNA into genomics. It describes the new technologies MIT used to identify candidate RNA transcripts and then determine their functions. And function is the key word in their work:

These RNA sequencesdo not get translated into proteins, but act in a variety of ways to control how much protein is madefrom protein-coding genes. The research team, which includes scientists from MIT and several other institutions, made use of RNA-binding proteins to help themlocate and assign possible functionsto tens of thousands of sequences of the genome.

The National Institutes of Health (NIH)describes the search for genetic switches that turn genes on and off in different cell types and in various stages of development. This is being determined for the mouse genome as well as the human genome.

A key challenge in ENCODE is thatdifferent genes and functional regions are active in different cell types,said Elise Feingold, Ph.D., scientific advisor for strategic implementation in the Division of Genome Sciences at NHGRI and a lead on ENCODE for the institute. This means that weneed to test a large and diverse number of biological samplesto work towards a catalog of candidate functional elements in the genome.

Significant progress has been made in characterizing protein-coding genes, which comprise less than 2% of the human genome.Researchers know much less about the remaining 98% of the genome, including how much and which parts of it perform other functions.ENCODE is helping to fill in this significant knowledge gap.

The human body is composed of trillions of cells, with thousands of types of cells.While all these cells share a common set of DNA instructions, the diverse cell types (e.g., heart, lung and brain) carry outdistinct functions by using the information encoded in DNA differently.The DNA regions that act asswitchesto turn genes on or off,or tune the exact levels of gene activity, help drive the formation of distinct cell types in the body and govern their functioning in health and disease.

Naturesown News and Views story, Expanded ENCODE delivers invaluable genomic encyclopedia, boasts that Phase III has generated the most comprehensive catalogue yet of thefunctionalelements that regulate our genes.

In the current third phase of the project, the consortium movedfrom cell lines to cells taken directly from human and mouse tissues, providing a more biologically relevant encyclopedia.They also introduced assays to investigate the broader aspects of functional elements for example, to characterize the elements embedded in RNAs or to analyse chromatin looping, which brings separate CREs into close proximity to enable gene regulation.

There are eight technical papers in the special issue ofNature, all open access. Start with Expanded encyclopaedias of DNA elements in the human and mouse genomes for the details, scan through the other papers, and marvel at the exciting discoveries from Phase III. Or you can read ENCODE explained for an overview with illustrations. Its all part of theENCODE Collectiongoing back to 2012.

What is next for ENCODE? The Perspectives on ENCODE article cited earlier explains why much more research is still needed to understand the vast volume of functional information in our DNA:

It is now apparent that elements that govern transcription, chromatin organization, splicing, and otherkey aspects of genome control and function are densely encodedin the human genome; however,despite the discovery of many new elements, the annotationof elements that are highly selective for particular cell types or statesis lagging behind.

Thus, as part of ENCODE 4,considerable effort is being devoted to expanding the cell types and tissuesanalysed as well as mapping the binding regions for many more transcription factors and RNA-binding proteins.

Further research may even find new functions for repetitive sequences, or for silent sequences that only get switched on under unique circumstances, or in particular cell types, or during certain stages of development. In short: the search is on for function in the junk!

Continued here:

Next Phase of ENCODE Finds MORE Functional Information in Genome Junk - Discovery Institute

To Avoid Debate, Darwinists at the AAAS Would Even CensorDarwin – Discovery Institute

Photo: Statue of Charles Darwin, Shrewsbury Library, by Bs0u10e01 / CC BY-SA.

As you may remember fromearlier coverage here, Herman Bouma is the attorney whose presentation on Darwin was canceled by the 2019 National Science Teaching Associations National Conference. The point of Boumas planned discussion was that Charles Darwin practiced open debate with his critics, an example from which teachers today could take a lesson. This was too much, though, for the influential group to tolerate so they sent conference officials and security guards to escort him out.

Well, the story continues now as the American Association for the Advancement of Science has joined the NSTA in giving Bouma the runaround.

This February, the AAAS held its annual meeting here in Seattle. In addition to lectures and keynotes, the meeting is where different branches hold business meetings. Bouma recently emailed us about what happened when he tried to submit a resolution to the Biological Sciences section for its consideration.

Bouma explained the situation this way:

The resolution simply states that a teacher should feel free to teach how Darwin responded to his critics. I was informed by the chair, Dr. Vicki Chandler, that the main office of the AAAS would be handling the resolution because it dealt with the subject of evolution. Last week I was informed by the current chair of the section, Dr. David Burgess, that the main office did not support the resolution. When I asked why, he refused to give any reason. It seems clear that the AAAS opposes the resolution because it does not want any discussion of scientific arguments against neo-Darwinian evolution, but is too embarrassed to state this publicly.

Was Bouma proposing some distasteful policy, or simply encouraging educators to treat Darwinian evolution like a science? Read the resolution for yourself:

Resolution on Freedom to Teach Darwins Response to His Critics

Whereas in his bookThe Origin of SpeciesDarwin responded to eminent scientists of his day who had scientific arguments against his theory of natural selection, including Louis Agassiz,a world-renowned professor of geology and biology at Harvard University known as the father of the American scientific tradition; Adam Sedgwick, a professor of geology and paleontology at Cambridge University and one of Britains most distinguished geologists; and Karl Nageli, a Swiss professor of botany at the University of Munich who was famous for his work on plant cells;

WhereasDarwin took great care to reply thoughtfully to the scientific arguments against his theory and, by the time of the sixth edition ofThe Origin of Speciesin 1872, approximately one-third of his book consisted of his response to his critics;

Whereas Darwinstated, I look with confidence to the future,to young and rising naturalists, who will be able to view both sides of the question with impartiality (The Origin of Species, p. 444); and

Whereas the Statement on the Teaching of Evolution issued by the AAAS on February 16, 2006, might erroneously lead teachers and professors to think they should not teach Darwins response to his critics,

RESOLVED: When teaching Darwins theory of natural selection, a teacher or professor should feel free to teach Darwins response to his critics, as set forth in his bookThe Origin of Species.

Or dismayed? Disturbed? Actually, its a totally reasonable proposal treat Darwins theory as Darwin himself treated it! But it wasnt received that way. Bouma sent multiple courteous emails to the AAAS leadership, asking them to consider the resolution, but was stonewalled. Heres an example of one email Bouma sent on January 8, 2020:

Dear Dr. Chandler,

Happy New Year! I hope you had an enjoyable time over the holidays.

My name is Herman Bouma and I have been attending the business meetings of the Biological Sciences Section over the last several years. I have a resolution I would like to present to the Section for its approval at the business meeting next month in Seattle. Would you be so kind as to tell me what procedure I should follow for doing this?

Thank you very much for your assistance.

Chandler promised to review and respond to Boumas resolution. Dr. Chandler later replied, declining even to consider it at the AAAS meeting. Chandler gave Bouma no official feedback on his resolution but emphasized instead how much the AAAS fight[s] the good fight to support teaching evolution:

We of course support the teaching of evolution.AAAS takes an active approach to informing the public about, and taking a stand for teaching evolution. Efforts to fight the good fight about teaching evolution are public onaaas.org, and have been ongoing for years. We believe working with the main office folks that handles the evolution effort and policies associated with teaching evolution is the best way forward,as teaching evolution is relevant to a large number of sections and AAAS membership. As such I have forwarded your request to AAAS main office.

Bouma wrote back. He asked, At some point will I be receiving a response from the AAAS main office? He also wondered, Will the Biological Sciences Section and other sections be providing input to the AAAS main office about my resolution? He pointed out that his resolution is fully consistent with Chandlers stated position that the AAAS supports the teaching of evolution:

I wish to emphasize that the resolution is not in any way against the teaching of evolution. It takes the teaching of evolution as a given. The resolution simply seeks to make clear to teachers that they should feel free to teach Darwins response to critics of his theory of natural selection.

Having heard nothing from the AAAS main office, a few weeks later, Bouma asked Chandler if theyd ever get back to him about the resolution. Chandler replied, That is my expectation. This correspondence all took place before the AAAS annual meeting, which was February 13-16. AnEvolution Newscorrespondent reported on the Education business meeting at that same conferencehere. It became clear that the AAAS main office was going to stonewall Bouma as well.

On February 18, Bouma contacted the new chair of the Biological Sciences section of the AAAS, David Burgess, noting that hed not heard back from the AAAS main office about the resolution:

As of this time I have not received any communication from the main office. If you hear anything about the status of the proposal and who is working on it, I would much appreciate your letting me know. I would also greatly appreciate your support of the proposal.

Burgess wrote back three days later:

Herman, thank you for youremail. I know this has been moved up to the main offices of AAAS. There is no support among the officers of the BiologicalSciences section to take this up at the section level.In viewing of your organizations website, it is clear that you represent one whose views are in contrast to that of mainstream science on the issue of evolution and its teaching. I suggest you take it up with the main offices of AAAS.

Its good that Burgess gave Bouma something like a straight answer. The disturbing news is that the answer indicated that the Biological Sciences section of the AAAS is so intolerant that they dont support efforts to teach Darwins theory the way Darwin himself treated it to acknowledge that criticisms exist and to teach Darwins response to his critics.

Bouma had a ready reply:

My organization is simply trying to promote an objective discussion of the scientific merits of the theory of natural selection. Even Darwin wanted that. It would be peculiar if mainstream science was at odds with the expressed wishes of Darwin.

It would indeed be peculiar if mainstream science did not support Darwins approach to dealing with criticisms of his theory. Instead, Darwins ideas are to be treated as sacred dogmas, beyond questioning.

But that was only the position of the AAAS Biological Sciences section. Perhaps the AAAS central office would have a different perspective. Months went by and Bouma received no reply from the AAAS central office. So on July 6 Bouma sent an inquiry to Dr. Burgess, wondering why hed heard nothing about his resolution:

I am following up with respect to my proposed resolution for AAAS. As a reminder, the proposed resolution simply states that a teacher or professor should feel free to teach how Darwin responded to his critics. After I submitted the proposed resolution to the Biological Sciences section, I was informed byDr. Chandler that it would be handled bythe AAAS main office, and in an email on February 21 you suggested I take it up with the main offices of AAAS. So far I have sent three emails about the resolution (on February 24, April 24, and May 18) to Dr. Parikh, the CEO of AAAS, but have received no response. Do you have any information about the present status of my proposal?

Dr. Burgess then explained what was really going on:

Herman, it is apparent that the lack of response is a direct message to you that there is no support.

This is most disconcerting. Boumas modest proposal to teach evolution the way Darwin treated his own theory has no support from one of the worlds largest and most powerful scientific organizations, the AAAS.

Bouma then replied asking Why is there no support, David? but again no reply has been forthcoming.

Bouma explained to us what is really going on here: This is another instance of the scientific communitys zeal to prevent students from hearing any scientific arguments against neo-Darwinian evolution. In furtherance of this objective, the AAAS, like the NSTA, is even willing to censor Darwin.

Excerpt from:

To Avoid Debate, Darwinists at the AAAS Would Even CensorDarwin - Discovery Institute

WATCH | 8 music videos that perfectly display the evolution of Taylor Swift – News24

It's been nearly two weeks since Taylor Swift surprised fans with her eighth studio album, folklore. Since then, the 30-year-old has set numerous records, with the album being called the biggest of 2020 so far by some.

The new album shows a different side to the star - a more indie/folk sound. The change, however minor or drastic you may perceive it to be, is just the latest in many musical transformations Taylor has undergone. Remember the curly-haired, guitar-playing, country star we all fell in love with? Well, we do!

Taylor has released eight studio albums to date, transforming her style with each one. So strap on your seatbelts, cause we're about to take a trip down memory lane.

Here are eight music videos that perfectly show Taylor's musical journey:

1. Teardrops on My Guitar (From the album, Taylor Swift)

Day one Swifties, where you at?

2006 saw the release of Taylor's self-titled debut album. With a head full of curls and her guitar always close by, Taylor was the new girl on the country scene. Her songs were relatable and had every teen singing along.

2. You Belong With Me (From the album, Fearless)

Taylor had established herself a teen country sensation. The year is 2008, and You Belong With Me is playing on every radio station.

Taylor's still rocking those girls, but there's something else that makes people gravitate towards her - she's repping for the underdog. The star lets everyone know it's okay to be the odd kid. Her fanbase continues to grow from here.

3. Back to December (From the album, Speak Now)

Taylor slowly starts to stray from her country roots, leaning more towards mainstream pop. She is growing up, and it shows in her music. While previous songs feel more like high school romances, Back To December shows a more mature side to the singer. Rumour has it the song was penned for Taylor Lautner who she briefly dated.

Taylor also starts to switch up her look here. The tight curls are gone, and in this video, she appears with her iconic straight-cut fringe.

4. I Knew You Were Trouble (From the album, Red)

It's 2012, and the pop scene has fully welcomed Taylor Swift. The singer releases Red, giving us amazing upbeat pop gems like We Are Never Getting Back Together and 22.

There's also a continuation of her "songs inspired by my ex-boyfriends" theme (not a real theme, but you get what we mean). We Are Never Getting Back Together is rumoured to be about Jake Gyllenhaal, while I knew You Were Trouble is said to be inspired by Taylor's relationship with Harry Styles.

The video for I Knew You Were Trouble is just a taste of a more edgy Taylor. The truth is, we had no idea what was coming.

5. Bad Blood (From the album, 1989)

2014 saw Taylor go from the gentle high school nerd who avoided confrontation, to the popular girl who could get her famous friends to beat you up.

The music video for this song features a number of Taylor's close friends, including Selena Gomez and Karlie Kloss, who form part of what many refer to as the "Tay Squad".

The song was rumoured to be directed at Katy Perry, but it was just the tip of the iceberg when it came to that feud. Edgy Taylor was in full swing with a ruffled bob and side-swept fringe.

1989 also gave us bangers like Shake It Off and Blank Space. Taylor was standing up for herself, and she was more overt about it.

6. Look What You Made Me Do (From the album, Reputation)

Sorry, the old Taylor can't come to the phone right now. No more Ms Nice Girl, Taylor's claws were out with this one. The sunshine and butterflies were replaced with zombies and snakes. In fact, in the Look What You Made Me Do video, the "new" Taylor is seen standing on top of a pedestal as past versions of herself try to reach her.

The song, once again rumoured to be about her feud with Katy Perry, sampled a track used in the Mean Girls movie. This after Katy shared a cryptic tweet in which she warned people to "Watch out for the Regina George in sheep's clothing".

Taylor also references an on-going battle with Kim Kardashian and Kanye West. Overall, the video was a lot darker than we're used to seeing from Taylor.

7. Lover (From the album, Lover)

A revival of the "old" Taylor. Not going to lie, we missed her. Lover feels like a throwback to Taylor's country roots. At this point, the star has settled her feud with Katy and found love once again. She knows who she is, and it shows. With guitar in hand and soft curls in her hair, Taylor won over many hearts with this 2019 gem.

8. cardigan (From the album, folklore)

Finally, we've got the 2020 hit, cardigan. The song comes from Taylor's folklore album, and while it introduces a new indie style, it doesn't stray too far from the Taylor we know and love.

Original post:

WATCH | 8 music videos that perfectly display the evolution of Taylor Swift - News24

The Morning Watch: The Evolution of Bugs Bunny’s Voice, Stuntmen React to ‘Birds of Prey’ & More – /FILM

The Morning Watch is a recurring feature that highlights a handful of noteworthy videos from around the web. They could be video essays, fanmade productions, featurettes, short films, hilarious sketches, or just anything that has to do with our favorite movies and TV shows.

In this edition, follow the evolution of the Looney Tunes icon Bugs Bunny from throughout his 80-year history. Plus, watch as stuntmen react to action sequences from Birds of Prey, Romancing the Stone, and even a tough fall from iCarly. And finally, watch a throwback clip from Late Night with Conan OBrien where the comedian visits the set of Martha Stewart Living.

This year Bugs Bunny is celebrating his 80th anniversary, though some will argue that he actually first arrived in 1938. No matter when Bugs Bunny was born, hes gone through several iterations over the years with voice actors like Jeff Bergman, Greg Burson, Billy West, Sam Vincent, Joe Alaskey, Jeff Bergman, and Charlie Schlatter all trying to capture the magic of the original vocal genius Mel Blanc. Hear the differences between all of them in the video above by Dave Lee Down Under.

Next up, a new iteration of Stuntmen React from Corridor Crew brings back Eric Linden to smugly analyze a big action sequence from Birds of Prey, a hard prat fall from the kids TV series iCarly, a dangerous waterfall dive from Romancing the Stone, and a short film featuring The Punisher.

Finally, Conan OBrien flashes back to a hilarious segment from Late Night when he visited the set of Martha Stewart Living at the height of the shows popularity. Conan even partakes in a cooking segment with Martha Stewart, and it goes about as well as youd expect.

Original post:

The Morning Watch: The Evolution of Bugs Bunny's Voice, Stuntmen React to 'Birds of Prey' & More - /FILM