system_instruction
stringlengths
29
665
user_request
stringlengths
15
889
context_document
stringlengths
561
153k
full_prompt
stringlengths
74
153k
Only use information presented in the prompt itself. Do not use any external sources or prior knowledge. Please say "I don't have enough information to answer this question" if the necessary information isn't available.
Why was China's economy so important during the pandemic?
Other Sources of Data and Information Sizing up the U.S. government’s reliance on foreign goods faces similar challenges in data limitations.113 The U.S. General Services Administration (GSA) maintains a database, the Federal Procurement Data System-Next Generation (FPDS-NG, or FPDS), where federal agencies are required to report procurement contracts whose estimated value is $10,000 or more.114 The procurement data in FPDS-NG are not fully reliable. There are documented quality issues documented relating to accuracy, completeness, and timeliness of its data.115 These limitations have prompted many analysts to rely on FPDS-NG data primarily to identify broad trends and produce rough estimates, or to gather information about specific contracts. With these limitations in mind, FPDS-NG data may provide general information regarding the value, quantity, and types of domestic and foreign-made goods hat U.S. government agencies procure. Other information on domestic capacity, as well as changes resulting from increased production in the aftermath of the COVID-19 outbreak, generally comes from private research firms, news outlets, and trade associations. Many of the figures cited are often based on surveys, firms’ press releases, or firms/industries’ forecasts, which may differ significantly from actual production. China’s Economic Recovery: Prospects and Implications China’s leaders have focused on resuming manufacturing production to jumpstart economic growth.116 At an executive session of China’s cabinet, the State Council, on March 17, 2020, Chinese officials emphasized the importance of stabilizing employment and announced that the government would streamline business approvals and fast-track approvals for large infrastructure projects. They also offered government support to alleviate shortages of labor, raw materials, funds, and protective gear.117 To facilitate economic activity, the Chinese government also appears Congressional Research Service 38 to have liberalized company health requirements and lifted intra-provincial and intra-city travel and transportation restrictions. NDRC spokesperson Meng Wei said on March 17, 2020 that transportation was operating normally. Zhejiang, Jiangsu, and Shanghai were operating at close to 100% of normal capacity; and over 90% of large-scale industrial companies outside of Hubei had resumed production.118 Company reports of opening and resumption of operations did not necessarily mean that these facilities were fully online or operating at pre-crisis levels, however. Several economic analysts and news outlets, including the Financial Times, published alternative measures of business resumption rates using proxies for economic activity—such as data on traffic congestion, air pollution levels, and container freight movement. Overall, many of these measures suggested that businesses across China did not return to full capacity at the rates reported by local and provincial governments.119 In Wuhan, the center of the original outbreak, the Hubei provincial government issued a notice in March—that applies to Wuhan as Hubei’s capital—allowing certain companies to resume work ahead of other production. This included companies in the medical and health industry, as well as companies producing protective gear, disinfectant, daily necessities, agriculture, and products critical to national and global supply chains.120 China emerged in June 2020 as the first major country to announce a return to economic growth since the outbreak of COVID-19, but consumption lagged production recovery and the economic recovery has relied on government spending and exports to boost growth. The government reported 3.2% gross domestic product (GDP) growth in the second quarter and 4.9% GDP growth in the third quarter of 2020.121 The International Monetary Fund (IMF) projects China’s economy to grow by 1.9% in 2020. China since February 2020 has provided an estimated $506 billion in stimulus and increased the government’s budget deficit target to a record high of 3.6% of GDP, up from 2.8% in 2019. Shifting from efforts to reduce debt, the government announced the issuance of $142.9 billion of special treasury bonds for the first time since 2007; increased the quota for local government special bonds (a source of infrastructure funding); and fast-tracked issuance of corporate bonds to cover pandemic costs, but with potential broader uses. The IMF estimates that the fiscal measures and financing plans announced amounted to 4.1% of the China’s GDP, as of July 2020.122 China’s National Bureau of Statistics in November 2020 recorded a 5% year-on-year increase in retail sales, a 2.6% year-on-year increase in fixed asset investment, and a 7% year-on-year increase in value-added industrial output. COVID-19: China Medical Supply Chains and Broader Trade Issues Congressional Research Service 39 in investment in industrial output growth, however, was recorded in non-ferrous metals and real estate investment, not broader areas of domestic consumption.123 China Positioning to Export China’s economy depends on exports and the foreign exchange it earns through exports, as well as on the large productive role that foreign firms play in the domestic market and as exporters. Seeking to stabilize drops in foreign investment and trade, on March 12, Commerce Vice Minister Wang Shouwen held a call with 400 members of the American Chamber of Commerce in China, and on March 13, he held a similar webinar with the European Chamber of Commerce in China’s Advisory Council. Vice Minister Wang pressed companies to reopen operations and increase investments in China. Other Chinese agencies represented included NDRC, MIIT, the National Health Commission, the General Administration of Drug Supervision, the State Administration for Market Regulation, the General Administration of Customers, the Civil Aviation Administration of China, the Ministry of Transportation, and the State Taxation Administration.124 During past crises, such as the global financial crisis of 2008-09, China has pressed firms to idle facilities and keep them production-ready (instead of shuttering them) and retain workers (instead of laying them off) to maintain social stability and facilitate efforts to quickly ramp up production and exports later.125 These stimulus efforts are sometimes less visible than fiscal policies in other countries. Several market watchers have noted that, while a 17% drop in Chinese exports in January-February 2020 was significant, it was not as dramatic when considering China’s economy was shuttered for much of February. This indicates that Chinese industry may have had sufficient stock already at ports for export when the crisis hit. This also signals how China was able to resume an export push in the third quarter of 2020.126 China’s economic recovery has been important to the United States and the global economy, as it is an important center of demand and supply. At the same time, during this period of global economic downturn, the United States and other countries are now potentially vulnerable to a concerted PRC export push that has been expanding since summer 2020 and any effort China makes to take additional market share in strategic sectors. Congressional Research Service 40 Steel Overcapacity Chinese overcapacity in steel has been highly contentious for its global impacts, and China could potentially see exports as a quick way to reduce inventories and secure needed cash. Similar to what happened during the global financial crisis in 2008-09, China is poised to take additional global market share in 2020 because it did not dial back production during the COVID-19 outbreak. Chinese blast furnaces continued to run during the COVID-19 crisis, and China’s steel production for January-February 2020 was up 3% over the same period in 2019. Meanwhile, due to collapsing domestic demand and logistics constraints, China’s finished steel inventories rose by 45% in January-February 2020 over the same period in 2019.127 China’s steel production at the end of 2019 was already at an all-time high of almost 1 billion tons, with China producing over 50% of global supply, according to the World Steel Association and China’s State Statistical Bureau (Figure 8).128 China’s crude steel production recovered in July 2020, rising 9.1% year-on-year. China’s crude steel production during the January-September 2020 period is up 4.5% over the same period in 2019. In contrast, crude steel production over the same period is down 17.9% in the EU; down 18.2% in North America; down 16.5% in India; down 19.1% in Japan; and down 7.5% in South Korea.
[Other Sources of Data and Information Sizing up the U.S. government’s reliance on foreign goods faces similar challenges in data limitations.113 The U.S. General Services Administration (GSA) maintains a database, the Federal Procurement Data System-Next Generation (FPDS-NG, or FPDS), where federal agencies are required to report procurement contracts whose estimated value is $10,000 or more.114 The procurement data in FPDS-NG are not fully reliable. There are documented quality issues documented relating to accuracy, completeness, and timeliness of its data.115 These limitations have prompted many analysts to rely on FPDS-NG data primarily to identify broad trends and produce rough estimates, or to gather information about specific contracts. With these limitations in mind, FPDS-NG data may provide general information regarding the value, quantity, and types of domestic and foreign-made goods hat U.S. government agencies procure. Other information on domestic capacity, as well as changes resulting from increased production in the aftermath of the COVID-19 outbreak, generally comes from private research firms, news outlets, and trade associations. Many of the figures cited are often based on surveys, firms’ press releases, or firms/industries’ forecasts, which may differ significantly from actual production. China’s Economic Recovery: Prospects and Implications China’s leaders have focused on resuming manufacturing production to jumpstart economic growth.116 At an executive session of China’s cabinet, the State Council, on March 17, 2020, Chinese officials emphasized the importance of stabilizing employment and announced that the government would streamline business approvals and fast-track approvals for large infrastructure projects. They also offered government support to alleviate shortages of labor, raw materials, funds, and protective gear.117 To facilitate economic activity, the Chinese government also appears Congressional Research Service 38 to have liberalized company health requirements and lifted intra-provincial and intra-city travel and transportation restrictions. NDRC spokesperson Meng Wei said on March 17, 2020 that transportation was operating normally. Zhejiang, Jiangsu, and Shanghai were operating at close to 100% of normal capacity; and over 90% of large-scale industrial companies outside of Hubei had resumed production.118 Company reports of opening and resumption of operations did not necessarily mean that these facilities were fully online or operating at pre-crisis levels, however. Several economic analysts and news outlets, including the Financial Times, published alternative measures of business resumption rates using proxies for economic activity—such as data on traffic congestion, air pollution levels, and container freight movement. Overall, many of these measures suggested that businesses across China did not return to full capacity at the rates reported by local and provincial governments.119 In Wuhan, the center of the original outbreak, the Hubei provincial government issued a notice in March—that applies to Wuhan as Hubei’s capital—allowing certain companies to resume work ahead of other production. This included companies in the medical and health industry, as well as companies producing protective gear, disinfectant, daily necessities, agriculture, and products critical to national and global supply chains.120 China emerged in June 2020 as the first major country to announce a return to economic growth since the outbreak of COVID-19, but consumption lagged production recovery and the economic recovery has relied on government spending and exports to boost growth. The government reported 3.2% gross domestic product (GDP) growth in the second quarter and 4.9% GDP growth in the third quarter of 2020.121 The International Monetary Fund (IMF) projects China’s economy to grow by 1.9% in 2020. China since February 2020 has provided an estimated $506 billion in stimulus and increased the government’s budget deficit target to a record high of 3.6% of GDP, up from 2.8% in 2019. Shifting from efforts to reduce debt, the government announced the issuance of $142.9 billion of special treasury bonds for the first time since 2007; increased the quota for local government special bonds (a source of infrastructure funding); and fast-tracked issuance of corporate bonds to cover pandemic costs, but with potential broader uses. The IMF estimates that the fiscal measures and financing plans announced amounted to 4.1% of the China’s GDP, as of July 2020.122 China’s National Bureau of Statistics in November 2020 recorded a 5% year-on-year increase in retail sales, a 2.6% year-on-year increase in fixed asset investment, and a 7% year-on-year increase in value-added industrial output. COVID-19: China Medical Supply Chains and Broader Trade Issues Congressional Research Service 39 in investment in industrial output growth, however, was recorded in non-ferrous metals and real estate investment, not broader areas of domestic consumption.123 China Positioning to Export China’s economy depends on exports and the foreign exchange it earns through exports, as well as on the large productive role that foreign firms play in the domestic market and as exporters. Seeking to stabilize drops in foreign investment and trade, on March 12, Commerce Vice Minister Wang Shouwen held a call with 400 members of the American Chamber of Commerce in China, and on March 13, he held a similar webinar with the European Chamber of Commerce in China’s Advisory Council. Vice Minister Wang pressed companies to reopen operations and increase investments in China. Other Chinese agencies represented included NDRC, MIIT, the National Health Commission, the General Administration of Drug Supervision, the State Administration for Market Regulation, the General Administration of Customers, the Civil Aviation Administration of China, the Ministry of Transportation, and the State Taxation Administration.124 During past crises, such as the global financial crisis of 2008-09, China has pressed firms to idle facilities and keep them production-ready (instead of shuttering them) and retain workers (instead of laying them off) to maintain social stability and facilitate efforts to quickly ramp up production and exports later.125 These stimulus efforts are sometimes less visible than fiscal policies in other countries. Several market watchers have noted that, while a 17% drop in Chinese exports in January-February 2020 was significant, it was not as dramatic when considering China’s economy was shuttered for much of February. This indicates that Chinese industry may have had sufficient stock already at ports for export when the crisis hit. This also signals how China was able to resume an export push in the third quarter of 2020.126 China’s economic recovery has been important to the United States and the global economy, as it is an important center of demand and supply. At the same time, during this period of global economic downturn, the United States and other countries are now potentially vulnerable to a concerted PRC export push that has been expanding since summer 2020 and any effort China makes to take additional market share in strategic sectors. Congressional Research Service 40 Steel Overcapacity Chinese overcapacity in steel has been highly contentious for its global impacts, and China could potentially see exports as a quick way to reduce inventories and secure needed cash. Similar to what happened during the global financial crisis in 2008-09, China is poised to take additional global market share in 2020 because it did not dial back production during the COVID-19 outbreak. Chinese blast furnaces continued to run during the COVID-19 crisis, and China’s steel production for January-February 2020 was up 3% over the same period in 2019. Meanwhile, due to collapsing domestic demand and logistics constraints, China’s finished steel inventories rose by 45% in January-February 2020 over the same period in 2019.127 China’s steel production at the end of 2019 was already at an all-time high of almost 1 billion tons, with China producing over 50% of global supply, according to the World Steel Association and China’s State Statistical Bureau (Figure 8).128 China’s crude steel production recovered in July 2020, rising 9.1% year-on-year. China’s crude steel production during the January-September 2020 period is up 4.5% over the same period in 2019. In contrast, crude steel production over the same period is down 17.9% in the EU; down 18.2% in North America; down 16.5% in India; down 19.1% in Japan; and down 7.5% in South Korea.] [Why was China's economy so important during the pandemic?] [Only use information presented in the prompt itself. Do not use any external sources or prior knowledge. Please say "I don't have enough information to answer this question" if the necessary information isn't available.]
[question] [user request] ===================== [text] [context document] ===================== [instruction] Answer the question using only the information provided in the context. Do not rely on external knowledge or sources.
How does the role of mitochondria influence bone growth and osteoblasts. Please keep this between 200-300 words. Highlight specific cases/pathways of how this works and talk about the mechanism.
Bioenergetics and mitochondrial biogenesis: OXPHOS vs glycolysis The initial metabolic study performed on bone tissues of mice in the 1960s suggested that bones predominantly utilized glycolysis rather than oxidative phosphorylation (OXPHOS) for their metabolism.4 The study reported that compared to other tissues such as the liver, bones exhibited lower oxygen consumption and significantly higher glucose consumption, leading to the abundant production of lactate. Similar findings were observed in rat calvaria,5 emphasizing the importance of glycolysis in bone metabolism. The significance of glycolysis in the regulation of bone mass was further supported by recent data suggesting defective glucose metabolism as the major cause of diabetes-induced bone loss, which showed that elevating glycolysis through administration of metformin or osteoblast-specific overexpression of Hif1a (hypoxia inducible factor 1 subunit alpha) or Pfkfb3 (6-phosphofructo-2-kinase/fructose-2,6-biphosphatase 3) in mice improved bone mass in diabetic mice.6,7 In vivo tracing with a stable isotope also demonstrated that glucose was largely metabolized to lactate and minimally contributed to the tricarboxylic acid (TCA) cycle in mouse cortical bones.8 Although glycolysis is evidently critical in the maintenance and growth of bone, evaluation of metabolic activity in isolated osteoblasts has revealed more complex and time-dependent results. Specifically, Komarova et al. closely examined changes in metabolism in differentiating primary calvarial osteoblasts in vitro and showed that OXPHOS was the primary energetic pathway utilized during the early stages (before day 10) of differentiation, but a shift to glycolysis occurred during the later stages (after day 10) when mineralized nodules formed.9 Similarly, Guntur et al. utilized a Seahorse real-time metabolic analyzer to measure oxygen consumption rate (OCR), indicative of OXPHOS, and extracellular acidification rates, indicative of glycolysis in mouse calvarial osteoblast cell line MC3T3-E1 and demonstrated that both OXPHPOS and glycolysis were initially upregulated in differentiating osteoblasts, but glycolysis was favored during the later stages of differentiation.10,11 Using the same method, Lee et al. showed that the contribution of glycolysis in total adenosine triphosphate (ATP) generation increased from approximately 40% at day 0 to 80% at day 7 of differentiation in primary calvarial osteoblasts.8 Our group also recently reported that both OCR and glycolytic proton efflux rate were elevated during the early maturation steps, but only glycolysis remained upregulated, while mitochondrial respiration decreased during the later mineralizing periods in primary calvarial osteoblasts.2 Noteworthily, mitochondrial ATP production may be critical during the early osteoblast maturation period since treatment with oligomycin A (ATP synthase inhibitor), antimycin A (mitochondrial complex III inhibitor), or siRNA targeting Atp5a1 gene, which encodes the alpha subunit of the mitochondrial ATP synthase F1 complex, at the initiation of osteogenic induction significantly impaired osteoblast differentiation.2 A recent review of metabolic activities in osteoblasts has underscored that OXPHOS increases as osteoblast maturation advances, although there are ongoing debates regarding the extent of glycolysis levels during osteoblast differentiation.12 Although further investigation is needed, particularly considering the distinct origins of osteoblasts (calvaria vs long bones), current evidence suggests that differentiating osteoblasts actively utilize both OXPHOS and glycolysis during the initial phases but tend to favor glycolysis as maturation progresses. Because OXPHOS far more efficiently produces ATP than aerobic glycolysis, why mature osteoblasts preferentially utilize glycolysis has remained unclear. It has been suggested that aerobic glycolysis is upregulated to offset the increase in ROS generation by OXPHOS.13 Additionally, Guntur et al. demonstrated that the increase in glycolytic ATP production in mature osteoblasts was the result of a decrease in mitochondrial membrane potential and OXPHOS activity.10 Similarly, using calvarial osteoblasts in which mitochondria were endogenously labelled with GFP, our group showed that mitophagy dramatically increased after differentiation day 14. This was confirmed by the increase in GFP-positive mitochondria co-localized with autophagic-lysosomal markers, LAMP1 (lysosomal-associated membrane protein 1) or LC3 (microtubule-associated protein light chain 3), suggesting that the decreased number of mitochondria after massive mitophagy may be the direct cause of reduced OXPHOS during the late differentiation stages.2 Consistent with the early increase in OXPHOS, mitochondrial biogenesis was found to increase during the initial phases of osteoblast maturation. Protein expression levels of mitochondrial biogenesis markers peroxisome proliferator-activated γ receptor coactivator-1α (PGC-1α) and mitochondrial transcription factor A (mtTFA or TFAM) were upregulated and peaked at day 7 of differentiation in MC3T3-E1 osteoblasts.14 Our group also reported that the expression of Ppargc1a, encoding PGC-1α, peaked at day 3, while the expressions of Tfam, Cox4i1 (cytochrome c oxidase subunit 4I1), and mt-Cytb (cytochrome B) peaked at day 7 in primary calvarial osteoblasts.2 Mitochondrial DNA copy number and expressions of mitochondrial proteins, COX4, and translocase of outer mitochondrial membrane 20, also peaked at day 7, after which the levels gradually declined possibly due to the progressive increase in mitophagy.2 Furthermore, enhancing mitochondrial biogenesis appears to accelerate osteogenic differentiation. For instance, An et al. demonstrated that activation of Wnt signaling pathway in C3H10T1/2 mouse mesenchymal cells promoted their osteoblastic differentiation through stimulating mitochondrial biogenesis.15 Increasing mitochondrial biogenesis through overexpression of Tfam enhanced Wnt-induced osteogenesis, while suppressing mitochondrial biogenesis through treatment with Zidovudine significantly impaired the osteogenic activity of C3H10T1/2 cells.15 In addition, nicotinamide (NAM), a form of vitamin B3, was recently shown to promote the differentiation of MC3T3-E1 osteoblasts partly through increasing the expression of Ppargc1a and mitochondrial biogenesis.16 These results suggest that potential bone therapeutics may target mitochondrial biogenesis in osteoblasts. Controversies persist regarding the metabolic activities during osteogenic differentiation of BMSCs. Shum et al. reported that OXPHOS was significantly enhanced during osteogenic differentiation of human MSCs, while glycolysis was unchanged and more critical during the proliferation of undifferentiated MSCs.17 They described that calvarial osteoblasts and MSCs exhibit distinct metabolic characteristics due to their different embryonic origin.17 Contrastingly, Ma et al. demonstrated that activating glycolysis through treatment with rotenone (complex I inhibitor) significantly promoted the osteogenic differentiation of BMSCs in mice, while inhibiting glycolysis through treatment with dichloroacetate, sodium oxamate, or 2-deoxy-D-glucose significantly impaired their osteogenic differentiation, highlighting the significance of glycolysis in MSC-mediated osteogenesis.18 They also showed that extracellular vesicles delivered lactate dehydrogenase A into BMSCs and stimulated glycolysis, enhancing bone formation in vivo.18 Further investigations are needed to clarify whether metabolic characteristics in osteogenic cells are embryonic origin-specific (neural crest vs mesoderm-derived) and differ between intramembranous and endochondral bone formation. A deeper understanding of osteogenic metabolism will not only advance insights into the mechanisms of metabolic bone diseases but also accelerate the development of strategies that modulate mitochondrial metabolism to promote osteogenesis. Oxidative stress Mitochondria produce most of the cellular ROS through OXPHOS, during which oxygen is reduced to superoxide anions that are subsequently converted to additional ROS such as hydrogen peroxide (H2O2). Accumulation of ROS is normally counterbalanced by the endogenous antioxidant defense system involving both non-enzymatic antioxidants, including ascorbic acid, vitamin E, and glutathione, and enzymatic antioxidants, including superoxide dismutases (SODs), catalase, glutathione peroxidases, and peroxiredoxins. Endogenous ROS, when the levels are controlled, may behave as second messengers to activate signaling pathways related to proliferation, differentiation, and survival, but excessively high levels of ROS can cause multiple pathological conditions, including osteoporosis.19
[question] How does the role of mitochondria influence bone growth and osteoblasts. Please keep this between 200-300 words. Highlight specific cases/pathways of how this works and talk about the mechanism. ===================== [text] Bioenergetics and mitochondrial biogenesis: OXPHOS vs glycolysis The initial metabolic study performed on bone tissues of mice in the 1960s suggested that bones predominantly utilized glycolysis rather than oxidative phosphorylation (OXPHOS) for their metabolism.4 The study reported that compared to other tissues such as the liver, bones exhibited lower oxygen consumption and significantly higher glucose consumption, leading to the abundant production of lactate. Similar findings were observed in rat calvaria,5 emphasizing the importance of glycolysis in bone metabolism. The significance of glycolysis in the regulation of bone mass was further supported by recent data suggesting defective glucose metabolism as the major cause of diabetes-induced bone loss, which showed that elevating glycolysis through administration of metformin or osteoblast-specific overexpression of Hif1a (hypoxia inducible factor 1 subunit alpha) or Pfkfb3 (6-phosphofructo-2-kinase/fructose-2,6-biphosphatase 3) in mice improved bone mass in diabetic mice.6,7 In vivo tracing with a stable isotope also demonstrated that glucose was largely metabolized to lactate and minimally contributed to the tricarboxylic acid (TCA) cycle in mouse cortical bones.8 Although glycolysis is evidently critical in the maintenance and growth of bone, evaluation of metabolic activity in isolated osteoblasts has revealed more complex and time-dependent results. Specifically, Komarova et al. closely examined changes in metabolism in differentiating primary calvarial osteoblasts in vitro and showed that OXPHOS was the primary energetic pathway utilized during the early stages (before day 10) of differentiation, but a shift to glycolysis occurred during the later stages (after day 10) when mineralized nodules formed.9 Similarly, Guntur et al. utilized a Seahorse real-time metabolic analyzer to measure oxygen consumption rate (OCR), indicative of OXPHOS, and extracellular acidification rates, indicative of glycolysis in mouse calvarial osteoblast cell line MC3T3-E1 and demonstrated that both OXPHPOS and glycolysis were initially upregulated in differentiating osteoblasts, but glycolysis was favored during the later stages of differentiation.10,11 Using the same method, Lee et al. showed that the contribution of glycolysis in total adenosine triphosphate (ATP) generation increased from approximately 40% at day 0 to 80% at day 7 of differentiation in primary calvarial osteoblasts.8 Our group also recently reported that both OCR and glycolytic proton efflux rate were elevated during the early maturation steps, but only glycolysis remained upregulated, while mitochondrial respiration decreased during the later mineralizing periods in primary calvarial osteoblasts.2 Noteworthily, mitochondrial ATP production may be critical during the early osteoblast maturation period since treatment with oligomycin A (ATP synthase inhibitor), antimycin A (mitochondrial complex III inhibitor), or siRNA targeting Atp5a1 gene, which encodes the alpha subunit of the mitochondrial ATP synthase F1 complex, at the initiation of osteogenic induction significantly impaired osteoblast differentiation.2 A recent review of metabolic activities in osteoblasts has underscored that OXPHOS increases as osteoblast maturation advances, although there are ongoing debates regarding the extent of glycolysis levels during osteoblast differentiation.12 Although further investigation is needed, particularly considering the distinct origins of osteoblasts (calvaria vs long bones), current evidence suggests that differentiating osteoblasts actively utilize both OXPHOS and glycolysis during the initial phases but tend to favor glycolysis as maturation progresses. Because OXPHOS far more efficiently produces ATP than aerobic glycolysis, why mature osteoblasts preferentially utilize glycolysis has remained unclear. It has been suggested that aerobic glycolysis is upregulated to offset the increase in ROS generation by OXPHOS.13 Additionally, Guntur et al. demonstrated that the increase in glycolytic ATP production in mature osteoblasts was the result of a decrease in mitochondrial membrane potential and OXPHOS activity.10 Similarly, using calvarial osteoblasts in which mitochondria were endogenously labelled with GFP, our group showed that mitophagy dramatically increased after differentiation day 14. This was confirmed by the increase in GFP-positive mitochondria co-localized with autophagic-lysosomal markers, LAMP1 (lysosomal-associated membrane protein 1) or LC3 (microtubule-associated protein light chain 3), suggesting that the decreased number of mitochondria after massive mitophagy may be the direct cause of reduced OXPHOS during the late differentiation stages.2 Consistent with the early increase in OXPHOS, mitochondrial biogenesis was found to increase during the initial phases of osteoblast maturation. Protein expression levels of mitochondrial biogenesis markers peroxisome proliferator-activated γ receptor coactivator-1α (PGC-1α) and mitochondrial transcription factor A (mtTFA or TFAM) were upregulated and peaked at day 7 of differentiation in MC3T3-E1 osteoblasts.14 Our group also reported that the expression of Ppargc1a, encoding PGC-1α, peaked at day 3, while the expressions of Tfam, Cox4i1 (cytochrome c oxidase subunit 4I1), and mt-Cytb (cytochrome B) peaked at day 7 in primary calvarial osteoblasts.2 Mitochondrial DNA copy number and expressions of mitochondrial proteins, COX4, and translocase of outer mitochondrial membrane 20, also peaked at day 7, after which the levels gradually declined possibly due to the progressive increase in mitophagy.2 Furthermore, enhancing mitochondrial biogenesis appears to accelerate osteogenic differentiation. For instance, An et al. demonstrated that activation of Wnt signaling pathway in C3H10T1/2 mouse mesenchymal cells promoted their osteoblastic differentiation through stimulating mitochondrial biogenesis.15 Increasing mitochondrial biogenesis through overexpression of Tfam enhanced Wnt-induced osteogenesis, while suppressing mitochondrial biogenesis through treatment with Zidovudine significantly impaired the osteogenic activity of C3H10T1/2 cells.15 In addition, nicotinamide (NAM), a form of vitamin B3, was recently shown to promote the differentiation of MC3T3-E1 osteoblasts partly through increasing the expression of Ppargc1a and mitochondrial biogenesis.16 These results suggest that potential bone therapeutics may target mitochondrial biogenesis in osteoblasts. Controversies persist regarding the metabolic activities during osteogenic differentiation of BMSCs. Shum et al. reported that OXPHOS was significantly enhanced during osteogenic differentiation of human MSCs, while glycolysis was unchanged and more critical during the proliferation of undifferentiated MSCs.17 They described that calvarial osteoblasts and MSCs exhibit distinct metabolic characteristics due to their different embryonic origin.17 Contrastingly, Ma et al. demonstrated that activating glycolysis through treatment with rotenone (complex I inhibitor) significantly promoted the osteogenic differentiation of BMSCs in mice, while inhibiting glycolysis through treatment with dichloroacetate, sodium oxamate, or 2-deoxy-D-glucose significantly impaired their osteogenic differentiation, highlighting the significance of glycolysis in MSC-mediated osteogenesis.18 They also showed that extracellular vesicles delivered lactate dehydrogenase A into BMSCs and stimulated glycolysis, enhancing bone formation in vivo.18 Further investigations are needed to clarify whether metabolic characteristics in osteogenic cells are embryonic origin-specific (neural crest vs mesoderm-derived) and differ between intramembranous and endochondral bone formation. A deeper understanding of osteogenic metabolism will not only advance insights into the mechanisms of metabolic bone diseases but also accelerate the development of strategies that modulate mitochondrial metabolism to promote osteogenesis. Oxidative stress Mitochondria produce most of the cellular ROS through OXPHOS, during which oxygen is reduced to superoxide anions that are subsequently converted to additional ROS such as hydrogen peroxide (H2O2). Accumulation of ROS is normally counterbalanced by the endogenous antioxidant defense system involving both non-enzymatic antioxidants, including ascorbic acid, vitamin E, and glutathione, and enzymatic antioxidants, including superoxide dismutases (SODs), catalase, glutathione peroxidases, and peroxiredoxins. Endogenous ROS, when the levels are controlled, may behave as second messengers to activate signaling pathways related to proliferation, differentiation, and survival, but excessively high levels of ROS can cause multiple pathological conditions, including osteoporosis.19 https://academic.oup.com/jbmr/article/39/9/1205/7697194 ===================== [instruction] Answer the question using only the information provided in the context. Do not rely on external knowledge or sources.
- Refer only to the context document in your answer. Do not employ any outside knowledge. - Summarise this into one paragraph - Use less than 200 words.
According to the above document only, How does puppy socialization classes correlate with adult dog behavior?
**The Importance of Puppy Socialization** The current literature and common consensus among dog behavior experts is that lack of appropriate socialization during the sensitive period, along with lack of appropriate ongoing socialization during the dog’s life, plays a large role in whether or not the dog develops behavioral problems. Lack of appropriate early socialization to a range of people and other animals, as well as different environments, can result in adult dogs that exhibit problematic behaviors, such as undesirable aggression and fearfulness. Lack of exposure to animals that will be forming part of the puppy’s social group as an adult, which may include other dogs, different animal species, and people and children, can result in an individual that is unable to form strong social bonds with these groups. In one study, social and environmental exposure administered to puppies was found to be positively correlated with measures of sociability, and negatively correlated with measures of fear and aggression. Socialization with other animal species was negatively associated with inappropriate predatory behavior, and dogs that attended puppy preschool were found to be less fearful, less aggressive, and more social. Another study, however, highlights the importance of appropriate types of socialization: adult dogs with a fear of noises, such as thunder and fireworks, were more likely to have experienced thunder when they were younger than 4 months of age. This evidence indicates that early experiences play an important part in shaping behavior. If done in an appropriate manner, these experiences will help to reduce the likelihood of problematic behavior occurring in future. However, if this process is not well controlled, it could result in an increased likelihood of undesirable adult behavior. A 1999 study examined the effects of socialization on the ability to play search games with humans, an important element of search and rescue dog training. Dogs that had not been exposed to humans before they were 1 year of age could never learn how to play a searching game, while pet dogs with human exposure were able to learn how to play. However, one of the human-deprived dogs had lived with humans until it was 4 months old before being removed from the human environment, and it performed better than the other human-deprived dogs in this study. While the performance of a single dog should not lead to generalizations, this study demonstrates the positive long-term effects of early socialization to humans, possibly even if a dog is later removed from human environments for an extended period of time. A study conducted by Appleby et al investigated whether there was a relationship between the display of aggressive and avoidance behavior and dogs’ experiences during the first 6 months of their life. Their results indicated significant differences in aggression toward unfamiliar people and avoidance behavior between dogs who were raised in kennels, a barn, or a shed, compared with a domestic setting (ie, in the breeder’s home). This result points to the importance of environment in the socialization process. Breeders who raise a litter of puppies in a kennel, barn, or shed should be able to provide adequate socialization to the puppies; however, they may have to make a special effort to ensure that these experiences occur. The relationship between socialization practice and the prevalence of undesirable behaviors in adult dogs is important not just because these behaviors are annoying to owners. Undesirable behaviors may also signal the presence of other underlying issues that may impact negatively on the welfare of the dog. They may result from an underlying physical health problem, for example, or confusion about what behaviors are expected by the owner, and/or poor mental health in the dog. This can become a vicious cycle; a poorly socialized dog does not understand what its owner expects and may receive conflicting or confusing messages from the owner, which causes it to become stressed, resulting in more undesirable behavior. If the owner does not then make his/her expectations for the dog known in a very clear way or lower these expectations in accordance with the dog’s ability to meet them, then this stress continues, causing even further undesirable behavior. It is important that owners and veterinarians take behavioral problems seriously; regardless of whether or not they escalate to the point where the owner considers relinquishing the dog to a shelter, the dog’s welfare may be compromised if it is displaying problematic behaviors. There are breed differences in the development of stimulus response, according to Scott and Fuller’s seminal work in the 1960s. For example, a larger percentage of Fox terriers and Beagles had developed a startle response at 3 weeks of age than Cocker spaniels and Shetland Sheepdogs. However, by 4 weeks, all dogs of all breeds studied had developed the startle response. Furthermore, Coppinger and Coppinger state that different socialization experiences will have varying effects on certain dog breeds. They exposed a Labrador retriever puppy to livestock, in order to determine whether it would be possible to turn her into a livestock guarding dog. Unlike a dog that is bred specifically for that purpose, the Labrador never showed intense protective behaviors toward the livestock. Therefore, it is likely that breeding specifically for certain traits does influence ideal socialization practices and amounts. Perhaps there are sex differences in socialization practice needs, based on adult behavioral outcomes. Male dogs are more likely to be rated by authorities as expressing dominant and aggressive behaviors, and female dogs are more likely to be perceived as more obedient, easier to housetrain, and more demanding of affection. However, to our knowledge, sex differences in socialization have not been examined, even though Scott and Fuller did explain that, at any given moment in a dog’s development, males are likely to be physically larger than females, and size does affect behavior. They also state, however, that growth curve differences between the sexes do not necessarily correlate with differences in the rate of learning, so it is possible that there is no discernible sex difference in socialization needs. The results of available studies provide strong evidence of a link between inadequate socialization during puppy-hood and undesirable adult dog behaviors. What they do not explain, however, is how much socialization is optimal. Having no socialization has very clear negative impacts, so there must be a minimum amount required, but how much this actually consists of is not known. Also unknown is whether there is a maximum amount of socialization required, beyond which any extra socialization is unnecessary or even detrimental. These studies also do not explain why there is a link between puppy socialization and adult behavior. One possible reason is that the socialization periods during puppyhood are like biological windows that open and close at certain times, and an animal that does not have necessary experiences during those windows misses the opportunity forever. More likely is that there are periods where a puppy is developmentally more sensitive/receptive to certain experiences, and that learning plays a critical role in this process. Animals can only learn about things to which they are introduced, and they may do so more readily during a sensitive period. Therefore, a lack of exposure to a particular object or type of animal at the correct developmental time necessarily means that dogs do not have the chance to learn, or take longer to learn, whether that object or animal is harmless or dangerous. In addition, since mild stress seems to be an integral part of the socialization and exposure process, a lack of mild desensitization-related stress early in life may have negative neurological effects on the dog and make it incapable of handling any amount of stress later in life. Most likely, a combination of learning via desensitization and stress inoculation acts to prevent the behavioral problems noted in adult dogs without adequate socialization experiences. Despite the general agreement that puppy socialization practices are crucial in the development of normal social relationships and psychological health in adult dogs, the evidence is less clear on the benefit of puppy classes specifically. Many studies about the effects of puppy classes on adult dog behavior have been epidemiological in nature, meaning that they correlate the behavior of adult dogs with various demographic, owner, and environmental factors. This method is useful in establishing which factors have a stronger predictive value on the outcome, but there is some debate as to whether they can truly determine causal relationships. This can limit their utility in evaluating whether a single factor, such as attendance at a puppy class, has a clear effect on adult dog behavior. Nonetheless, because controlled experimental studies on specific populations of puppies are rare, epidemiological studies are probably the best available alternative in understanding whether there is any relationship between puppy classes and adult dog behavior. Another study showed that attendance at puppy classes reduced the risk of aggression toward unfamiliar people. As with the study by Duxbury et al, there were many other factors predicting less aggressive behavior, including being a desexed female, having a female owner, attending ring-craft classes, and positive reinforcement training methods. A further study showed a similar result: attendance at puppy socialization classes was associated with improved positive social behaviors, and fewer behavioral problems, as adults. Other factors that predicted these outcomes were being a male dog, a higher level of environmental and social interactions overall, and remaining in the litter longer. Taken together, the results of these studies suggest that socialization classes are one piece of the puzzle in developing adult dog behavior. Since these studies sometimes show contradictory results (eg, male dogs showed fewer behavioral problems in one study and desexed females showed less aggression in another), it is possible that the samples, or unaccounted for variables, have affected the results of these epidemiological studies. Another reason why puppy socialization classes do not always appear to singularly affect adult dog behavior could relate to the ways in which some classes are run. In most countries, there are no accreditation procedures in place and puppy classes may be run by people who lack the skills or experience necessary for this purpose. Perhaps many puppies simply find the experience too stressful to receive a noticeable benefit. Although mild stress is a component of socialization, it is important not to stress puppies too much, or else the benefits will not be conferred.
{QUERY} According to the above document only, How does puppy socialization classes correlate with adult dog behavior? {TASK DESCRIPTION} - Refer only to the context document in your answer. Do not employ any outside knowledge. - Summarise this into one paragraph - Use less than 200 words. {TEXT PASSAGE} **The Importance of Puppy Socialization** The current literature and common consensus among dog behavior experts is that lack of appropriate socialization during the sensitive period, along with lack of appropriate ongoing socialization during the dog’s life, plays a large role in whether or not the dog develops behavioral problems. Lack of appropriate early socialization to a range of people and other animals, as well as different environments, can result in adult dogs that exhibit problematic behaviors, such as undesirable aggression and fearfulness. Lack of exposure to animals that will be forming part of the puppy’s social group as an adult, which may include other dogs, different animal species, and people and children, can result in an individual that is unable to form strong social bonds with these groups. In one study, social and environmental exposure administered to puppies was found to be positively correlated with measures of sociability, and negatively correlated with measures of fear and aggression. Socialization with other animal species was negatively associated with inappropriate predatory behavior, and dogs that attended puppy preschool were found to be less fearful, less aggressive, and more social. Another study, however, highlights the importance of appropriate types of socialization: adult dogs with a fear of noises, such as thunder and fireworks, were more likely to have experienced thunder when they were younger than 4 months of age. This evidence indicates that early experiences play an important part in shaping behavior. If done in an appropriate manner, these experiences will help to reduce the likelihood of problematic behavior occurring in future. However, if this process is not well controlled, it could result in an increased likelihood of undesirable adult behavior. A 1999 study examined the effects of socialization on the ability to play search games with humans, an important element of search and rescue dog training. Dogs that had not been exposed to humans before they were 1 year of age could never learn how to play a searching game, while pet dogs with human exposure were able to learn how to play. However, one of the human-deprived dogs had lived with humans until it was 4 months old before being removed from the human environment, and it performed better than the other human-deprived dogs in this study. While the performance of a single dog should not lead to generalizations, this study demonstrates the positive long-term effects of early socialization to humans, possibly even if a dog is later removed from human environments for an extended period of time. A study conducted by Appleby et al investigated whether there was a relationship between the display of aggressive and avoidance behavior and dogs’ experiences during the first 6 months of their life. Their results indicated significant differences in aggression toward unfamiliar people and avoidance behavior between dogs who were raised in kennels, a barn, or a shed, compared with a domestic setting (ie, in the breeder’s home). This result points to the importance of environment in the socialization process. Breeders who raise a litter of puppies in a kennel, barn, or shed should be able to provide adequate socialization to the puppies; however, they may have to make a special effort to ensure that these experiences occur. The relationship between socialization practice and the prevalence of undesirable behaviors in adult dogs is important not just because these behaviors are annoying to owners. Undesirable behaviors may also signal the presence of other underlying issues that may impact negatively on the welfare of the dog. They may result from an underlying physical health problem, for example, or confusion about what behaviors are expected by the owner, and/or poor mental health in the dog. This can become a vicious cycle; a poorly socialized dog does not understand what its owner expects and may receive conflicting or confusing messages from the owner, which causes it to become stressed, resulting in more undesirable behavior. If the owner does not then make his/her expectations for the dog known in a very clear way or lower these expectations in accordance with the dog’s ability to meet them, then this stress continues, causing even further undesirable behavior. It is important that owners and veterinarians take behavioral problems seriously; regardless of whether or not they escalate to the point where the owner considers relinquishing the dog to a shelter, the dog’s welfare may be compromised if it is displaying problematic behaviors. There are breed differences in the development of stimulus response, according to Scott and Fuller’s seminal work in the 1960s. For example, a larger percentage of Fox terriers and Beagles had developed a startle response at 3 weeks of age than Cocker spaniels and Shetland Sheepdogs. However, by 4 weeks, all dogs of all breeds studied had developed the startle response. Furthermore, Coppinger and Coppinger state that different socialization experiences will have varying effects on certain dog breeds. They exposed a Labrador retriever puppy to livestock, in order to determine whether it would be possible to turn her into a livestock guarding dog. Unlike a dog that is bred specifically for that purpose, the Labrador never showed intense protective behaviors toward the livestock. Therefore, it is likely that breeding specifically for certain traits does influence ideal socialization practices and amounts. Perhaps there are sex differences in socialization practice needs, based on adult behavioral outcomes. Male dogs are more likely to be rated by authorities as expressing dominant and aggressive behaviors, and female dogs are more likely to be perceived as more obedient, easier to housetrain, and more demanding of affection. However, to our knowledge, sex differences in socialization have not been examined, even though Scott and Fuller did explain that, at any given moment in a dog’s development, males are likely to be physically larger than females, and size does affect behavior. They also state, however, that growth curve differences between the sexes do not necessarily correlate with differences in the rate of learning, so it is possible that there is no discernible sex difference in socialization needs. The results of available studies provide strong evidence of a link between inadequate socialization during puppy-hood and undesirable adult dog behaviors. What they do not explain, however, is how much socialization is optimal. Having no socialization has very clear negative impacts, so there must be a minimum amount required, but how much this actually consists of is not known. Also unknown is whether there is a maximum amount of socialization required, beyond which any extra socialization is unnecessary or even detrimental. These studies also do not explain why there is a link between puppy socialization and adult behavior. One possible reason is that the socialization periods during puppyhood are like biological windows that open and close at certain times, and an animal that does not have necessary experiences during those windows misses the opportunity forever. More likely is that there are periods where a puppy is developmentally more sensitive/receptive to certain experiences, and that learning plays a critical role in this process. Animals can only learn about things to which they are introduced, and they may do so more readily during a sensitive period. Therefore, a lack of exposure to a particular object or type of animal at the correct developmental time necessarily means that dogs do not have the chance to learn, or take longer to learn, whether that object or animal is harmless or dangerous. In addition, since mild stress seems to be an integral part of the socialization and exposure process, a lack of mild desensitization-related stress early in life may have negative neurological effects on the dog and make it incapable of handling any amount of stress later in life. Most likely, a combination of learning via desensitization and stress inoculation acts to prevent the behavioral problems noted in adult dogs without adequate socialization experiences. Despite the general agreement that puppy socialization practices are crucial in the development of normal social relationships and psychological health in adult dogs, the evidence is less clear on the benefit of puppy classes specifically. Many studies about the effects of puppy classes on adult dog behavior have been epidemiological in nature, meaning that they correlate the behavior of adult dogs with various demographic, owner, and environmental factors. This method is useful in establishing which factors have a stronger predictive value on the outcome, but there is some debate as to whether they can truly determine causal relationships. This can limit their utility in evaluating whether a single factor, such as attendance at a puppy class, has a clear effect on adult dog behavior. Nonetheless, because controlled experimental studies on specific populations of puppies are rare, epidemiological studies are probably the best available alternative in understanding whether there is any relationship between puppy classes and adult dog behavior. Another study showed that attendance at puppy classes reduced the risk of aggression toward unfamiliar people. As with the study by Duxbury et al, there were many other factors predicting less aggressive behavior, including being a desexed female, having a female owner, attending ring-craft classes, and positive reinforcement training methods. A further study showed a similar result: attendance at puppy socialization classes was associated with improved positive social behaviors, and fewer behavioral problems, as adults. Other factors that predicted these outcomes were being a male dog, a higher level of environmental and social interactions overall, and remaining in the litter longer. Taken together, the results of these studies suggest that socialization classes are one piece of the puzzle in developing adult dog behavior. Since these studies sometimes show contradictory results (eg, male dogs showed fewer behavioral problems in one study and desexed females showed less aggression in another), it is possible that the samples, or unaccounted for variables, have affected the results of these epidemiological studies. Another reason why puppy socialization classes do not always appear to singularly affect adult dog behavior could relate to the ways in which some classes are run. In most countries, there are no accreditation procedures in place and puppy classes may be run by people who lack the skills or experience necessary for this purpose. Perhaps many puppies simply find the experience too stressful to receive a noticeable benefit. Although mild stress is a component of socialization, it is important not to stress puppies too much, or else the benefits will not be conferred.
If you cannot answer using the context alone, say "I cannot determine the answer to that due to lack of context".
How many earned media impressions did Billie get with their product marketing campaign?
**Product Marketing Strategy** An effective product marketing strategy can be the key to growing your brand, boosting revenue, and unlocking new opportunities. Focused on demonstrating the specific values and benefits of a product to your customer, a product marketing campaign can be extremely valuable in both B2B and B2C environments, particularly as customer-centric advertising grows more popular. Unfortunately, there are still countless people who don’t understand what product marketing actually means. Only around 5% of product marketers are convinced their role is fully understood, even among business leaders. Today, we’re going to be defining product marketing, exploring what it can do for your business, and providing top tips on how to use product marketing more effectively. Product marketing is the art and science of bringing a product to market. It involves various strategic marketing and sales tactics, as well as long-term lead nurturing, up-selling, and cross-selling techniques. A product marketing strategy is the exact plan a company uses to bring their product to their audience. Your strategy will usually include things like figuring out the positioning and messaging you want to link to your product, launching the product, and ensuring customers and salespeople understand what it can do. Strategies can also cover insights into how various teams (production, marketing, sales, and customer support) will work together to drive demand and usage of a product. While this might sound the same as conventional marketing, product marketing is slightly more focused. Part of the “7 P’s of marketing”, product marketing focuses specifically on product, while your other marketing campaigns might focus on people, prices, promotion, place, packaging, and positioning. Product Marketing Strategy Example Product marketing is focused on the steps people take to purchase your products, and how you can support people in adopting and using that product. Let’s take a look at a classic example. Apple is a household name in a highly competitive technology market. To stand out from the crowd, Apple ensures its products are beautifully well-designed, easy to use, and convenient. Apple’s product marketing strategy focuses specifically on the benefits it can deliver to users, rather than just listing the features you can get from each item. Apple’s language in virtually every product page and marketing campaign concentrates on telling consumers what they can do, and what they’ll be able to accomplish. Apple tells a narrative with its marketing content which helps the customer imagine the challenges they can overcome. For another example, look at Billie, a woman’s razor brand well known for the #ProjectBodyHair campaign. This started with a TV campaign that actually showed body hair in women’s razor ads – something which hadn’t been done before. The idea for this campaign came from the product team, who researched the market to find out customers didn’t like seeing ads where customers didn’t have body hair. Combine this with the rising demand from women to be portrayed realistically in the media, and Billie had an excellent product marketing campaign. In fact, it generated 3.3 billion earned media impressions across 23 countries. Why You Need a Product Marketing Strategy Product marketing strategies are all about understanding your audience’s needs, and positioning your product in a way that grabs attention. Developing the right product for your market and ensuring you present it in a way that captures audience attention is essential for growth. With a product marketing strategy, you can: Improve your understanding of your customer: Implementing a product marketing strategy requires companies to conduct in-depth research into their target audience. You learn what your customers need to see in your product to determine whether it’s valuable to them, and their lives. Understanding why customers gravitate toward your products will help you to create better buyer personas and more relevant campaigns. In other words, you’ll speak your customer’s language. Understand your competitors While you’re building your product marketing strategy, you’ll need to look at your wider market and determine how your product or service is different from other existing options. You can compare your strategy to those of your competitors, and get a better insight into what you’re going up against. With in-depth competitor research, you’ll be able to differentiate yourself more clearly in your target market and ensure you’re positioned appropriately in your chosen industry. After you’ve assessed your competition, ask yourself: How is my product suitable for today’s market? How is this product different from competing products? Can we differentiate our product even further (with extra features, pricing changes, etc)? Ensure your teams are on the same page When you know exactly what makes your product stand out and why customers want it, it’s much easier to give your teams a consistent view of their purpose, and your brand’s mission. With a strong product marketing strategy, you can align your product, sales, marketing, and service teams around a shared understanding of your company’s purpose. When everyone in your team has a better understanding of the purpose of the product you’re selling and why it’s so beneficial, they’ll be more likely to communicate this information correctly. Boost revenue and sales Ultimately, customers have endless options when it comes to where they can spend their money these days. The only way to ensure they come to you instead of the competition, is to position your product as the best possible option for their needs. Building a product marketing strategy that gives you an in-depth understanding of your customers will help you to generate more sales, through more personalized marketing. Remember, around 72% of customers say they expect businesses they buy from to understand them as individuals. How to Develop Your Own Product Marketing Strategy A good product marketing strategy should guide the positioning, promotion, and pricing of your product. With this plan, you should be able to take your product from the “development” stage, all the way through to launch with a clear vision. Here’s how you can get started. Step 1: Get to Know Your Product’s Target Audience A strong product marketing strategy begins with a deep knowledge of your target audience. You’ll need to define a specific target audience and create a buyer persona to help you understand the pain points, expectations, and requirements of that client. The more information you can include in your personas, the better. You’ll need to know where your target customer comes from, what kind of issues they’re facing, why they might want your product, and even how much they earn on a regular basis. The more data you have, the more you’ll be able to ensure all the aspects of your product marketing strategy are targeted to the right person. Step 2: Conduct market research After you’re done with your customer research, the next step is figuring out where your product is positioned in the context of the wider market. Look at the other products similar to yours that exist in the current market. What exactly can these products offer? Perform a full analysis of each item, thinking about: What your product can do better What your competitor’s product does well Whether people are happy with the product, or what their overall response is Answering these questions will help you to choose a position for yourself in your chosen market. Step 3: Determine your positioning and messaging With this knowledge of your target audience and your competition, you’ll be able to start investing in positioning and messaging strategies. Positioning involves thinking about where your product exists in the market in the context of other brands and solutions. For instance, is your product one of the cheapest on the market, or one of the most expensive? Do you offer the widest selection of features, or a specific focus on customer service your customers love? The positioning you discover will help you to determine what you need to emphasize in your messaging (such as excellent service, or low prices). Some of the questions you’ll need to answer when developing your positioning and messaging include: What makes this product unique? Why is this product better than our competitors? Why is our product ideal for our target audience? What will our audience get out of this product they can’t get elsewhere? Why should customers trust and invest in our product? Once you’ve answered these questions, you should be able to create an elevator pitch that describes everything someone would need to know about your product in an exciting, compact way. Step 4: Create your go-to-market strategy Now it’s time to think about how you’re going to bring your product to customers. dentify which personas you’re going to be targeting with your product, and how you’re going to be capturing their attention with your messaging strategy. Think about how you’re going to price your product, and what kind of methods you’re going to be using for selling. For instance, do you want to sell through distributors or direct to customers? You can also use this stage to consider the kind of marketing methods you’re going to use, like social media marketing, or content campaigns. At this stage, you can utilize a graphic design maker for compelling visual content across your marketing campaigns. As you choose marketing automation and sales strategies, also select KPIs you’ll want to measure as you progress to see whether your product marketing strategy is successful. Brief your sales and marketing leaders on your go-to-market strategy and ensure they have all the resources they need to do their job, such as advertising tools, product samples, brand guidelines, and go-to market strategy templates. Step 5: Launch, monitor, and optimize Finally, you’ll be ready to launch your product. There are two aspects to the “launch” for most companies. Internal launches involve introducing everyone in your team to your product’s main benefits and features, which you’ll need to do before anything else.
<text passage> **Product Marketing Strategy** An effective product marketing strategy can be the key to growing your brand, boosting revenue, and unlocking new opportunities. Focused on demonstrating the specific values and benefits of a product to your customer, a product marketing campaign can be extremely valuable in both B2B and B2C environments, particularly as customer-centric advertising grows more popular. Unfortunately, there are still countless people who don’t understand what product marketing actually means. Only around 5% of product marketers are convinced their role is fully understood, even among business leaders. Today, we’re going to be defining product marketing, exploring what it can do for your business, and providing top tips on how to use product marketing more effectively. Product marketing is the art and science of bringing a product to market. It involves various strategic marketing and sales tactics, as well as long-term lead nurturing, up-selling, and cross-selling techniques. A product marketing strategy is the exact plan a company uses to bring their product to their audience. Your strategy will usually include things like figuring out the positioning and messaging you want to link to your product, launching the product, and ensuring customers and salespeople understand what it can do. Strategies can also cover insights into how various teams (production, marketing, sales, and customer support) will work together to drive demand and usage of a product. While this might sound the same as conventional marketing, product marketing is slightly more focused. Part of the “7 P’s of marketing”, product marketing focuses specifically on product, while your other marketing campaigns might focus on people, prices, promotion, place, packaging, and positioning. Product Marketing Strategy Example Product marketing is focused on the steps people take to purchase your products, and how you can support people in adopting and using that product. Let’s take a look at a classic example. Apple is a household name in a highly competitive technology market. To stand out from the crowd, Apple ensures its products are beautifully well-designed, easy to use, and convenient. Apple’s product marketing strategy focuses specifically on the benefits it can deliver to users, rather than just listing the features you can get from each item. Apple’s language in virtually every product page and marketing campaign concentrates on telling consumers what they can do, and what they’ll be able to accomplish. Apple tells a narrative with its marketing content which helps the customer imagine the challenges they can overcome. For another example, look at Billie, a woman’s razor brand well known for the #ProjectBodyHair campaign. This started with a TV campaign that actually showed body hair in women’s razor ads – something which hadn’t been done before. The idea for this campaign came from the product team, who researched the market to find out customers didn’t like seeing ads where customers didn’t have body hair. Combine this with the rising demand from women to be portrayed realistically in the media, and Billie had an excellent product marketing campaign. In fact, it generated 3.3 billion earned media impressions across 23 countries. Why You Need a Product Marketing Strategy Product marketing strategies are all about understanding your audience’s needs, and positioning your product in a way that grabs attention. Developing the right product for your market and ensuring you present it in a way that captures audience attention is essential for growth. With a product marketing strategy, you can: Improve your understanding of your customer: Implementing a product marketing strategy requires companies to conduct in-depth research into their target audience. You learn what your customers need to see in your product to determine whether it’s valuable to them, and their lives. Understanding why customers gravitate toward your products will help you to create better buyer personas and more relevant campaigns. In other words, you’ll speak your customer’s language. Understand your competitors While you’re building your product marketing strategy, you’ll need to look at your wider market and determine how your product or service is different from other existing options. You can compare your strategy to those of your competitors, and get a better insight into what you’re going up against. With in-depth competitor research, you’ll be able to differentiate yourself more clearly in your target market and ensure you’re positioned appropriately in your chosen industry. After you’ve assessed your competition, ask yourself: How is my product suitable for today’s market? How is this product different from competing products? Can we differentiate our product even further (with extra features, pricing changes, etc)? Ensure your teams are on the same page When you know exactly what makes your product stand out and why customers want it, it’s much easier to give your teams a consistent view of their purpose, and your brand’s mission. With a strong product marketing strategy, you can align your product, sales, marketing, and service teams around a shared understanding of your company’s purpose. When everyone in your team has a better understanding of the purpose of the product you’re selling and why it’s so beneficial, they’ll be more likely to communicate this information correctly. Boost revenue and sales Ultimately, customers have endless options when it comes to where they can spend their money these days. The only way to ensure they come to you instead of the competition, is to position your product as the best possible option for their needs. Building a product marketing strategy that gives you an in-depth understanding of your customers will help you to generate more sales, through more personalized marketing. Remember, around 72% of customers say they expect businesses they buy from to understand them as individuals. How to Develop Your Own Product Marketing Strategy A good product marketing strategy should guide the positioning, promotion, and pricing of your product. With this plan, you should be able to take your product from the “development” stage, all the way through to launch with a clear vision. Here’s how you can get started. Step 1: Get to Know Your Product’s Target Audience A strong product marketing strategy begins with a deep knowledge of your target audience. You’ll need to define a specific target audience and create a buyer persona to help you understand the pain points, expectations, and requirements of that client. The more information you can include in your personas, the better. You’ll need to know where your target customer comes from, what kind of issues they’re facing, why they might want your product, and even how much they earn on a regular basis. The more data you have, the more you’ll be able to ensure all the aspects of your product marketing strategy are targeted to the right person. Step 2: Conduct market research After you’re done with your customer research, the next step is figuring out where your product is positioned in the context of the wider market. Look at the other products similar to yours that exist in the current market. What exactly can these products offer? Perform a full analysis of each item, thinking about: What your product can do better What your competitor’s product does well Whether people are happy with the product, or what their overall response is Answering these questions will help you to choose a position for yourself in your chosen market. Step 3: Determine your positioning and messaging With this knowledge of your target audience and your competition, you’ll be able to start investing in positioning and messaging strategies. Positioning involves thinking about where your product exists in the market in the context of other brands and solutions. For instance, is your product one of the cheapest on the market, or one of the most expensive? Do you offer the widest selection of features, or a specific focus on customer service your customers love? The positioning you discover will help you to determine what you need to emphasize in your messaging (such as excellent service, or low prices). Some of the questions you’ll need to answer when developing your positioning and messaging include: What makes this product unique? Why is this product better than our competitors? Why is our product ideal for our target audience? What will our audience get out of this product they can’t get elsewhere? Why should customers trust and invest in our product? Once you’ve answered these questions, you should be able to create an elevator pitch that describes everything someone would need to know about your product in an exciting, compact way. Step 4: Create your go-to-market strategy Now it’s time to think about how you’re going to bring your product to customers. dentify which personas you’re going to be targeting with your product, and how you’re going to be capturing their attention with your messaging strategy. Think about how you’re going to price your product, and what kind of methods you’re going to be using for selling. For instance, do you want to sell through distributors or direct to customers? You can also use this stage to consider the kind of marketing methods you’re going to use, like social media marketing, or content campaigns. At this stage, you can utilize a graphic design maker for compelling visual content across your marketing campaigns. As you choose marketing automation and sales strategies, also select KPIs you’ll want to measure as you progress to see whether your product marketing strategy is successful. Brief your sales and marketing leaders on your go-to-market strategy and ensure they have all the resources they need to do their job, such as advertising tools, product samples, brand guidelines, and go-to market strategy templates. Step 5: Launch, monitor, and optimize Finally, you’ll be ready to launch your product. There are two aspects to the “launch” for most companies. Internal launches involve introducing everyone in your team to your product’s main benefits and features, which you’ll need to do before anything else. ================ <instructions> If you cannot answer using the context alone, say "I cannot determine the answer to that due to lack of context". ================ <question> How many earned media impressions did Billie get with their product marketing campaign?
"================ <TEXT PASSAGE> ======= [context document] ================ <QUESTION> ======= [user request] ================ <TASK> ======= You are an expert in question answering. Your task is to reply to a query or question, based only on the information provided by the user. It should only use information in the article provided."
My grandmother is buried in Occala, but she bought a burial plot in Orlando's city cemetery's Block B12. I am her sole heir, and I want to be buried in Orlando. Will I be entitled to it? I also want my daughter to be buried with me. Will it be possible? My daughter says that she will only accept it if her father is buried there as well. Is this feasible? If I change my mind, can I sell the plot to my friend? I have a vague memory that grandpa's ashes are interred there. Does it change the picture?
Sec. 16.02. - Greenwood Cemetery Declared Public Cemetery of City; Description; Map; Use. The tract of land, being the southwest quarter of the northwest quarter of Section 31, Township 22 South, Range 30 East, according to a plat recorded at the office of the Clerk of the Circuit Court of the County in Deed Book 87, page 227, is declared to be the public cemetery of the City, to be known as Greenwood Cemetery. An official map of the Greenwood Cemetery shall at all times be on file at the office of the supervisor of Greenwood Cemetery. The cemetery is set apart only for the burial, entombment or inurnment of human remains and shall only be used as such in perpetuity. (Ord. of 6-27-1977, § 1; Ord. of 3-30-1981, § 1) Sec. 16.03. - Greenwood Cemetery Not Perpetual Care Cemetery. Greenwood Cemetery is not one of perpetual care and the City shall be under no obligation to maintain any set standard for its care and upkeep. The City shall endeavor to provide general maintenance and care to the cemetery in keeping with the reminder that it is sacredly devoted to the interment, entombment or inurnment of the dead. (Ord. of 6-27-1977, § 1) Sec. 16.04. - Burials in City Restricted to Greenwood Cemetery and Washington Park Cemetery. No human body shall be buried within the City limits of the City of Orlando, except in Greenwood Cemetery or in Washington Park Cemetery if a privately owned cemetery, or in such other cemetery facilities and/or property as the City Council may from time to time designate, acquire or control. ... Sec. 16.10. - Spaces; Sale to Permanent Residents; Exceptions. The City shall only sell spaces in Greenwood Cemetery for prices fixed by the City Council to residents of the City of Orlando who have resided within the corporate limits of the City for a period of more than one year prior to the date of sale, and to persons who are not permanent residents of the City provided that such sales shall be only for the immediate burial of a permanent resident of the City who met the residency requirements hereunder at the time of the resident's death. The Sexton of the Greenwood Cemetery shall require satisfactory evidence of such prior residence within the City. In addition, the City may sell spaces in Blocks 12, 16, 17, 18, 19 and 20 of Greenwood Cemetery to non-City, as well as City residents. Provided, however, that a person who has not met the residency requirements set forth herein may be permitted to purchase spaces in Greenwood Cemetery at the price established by City Council for qualified non-residents if such person is related by blood or marriage to a deceased person buried in said cemetery, unless such deceased person is interred in a section of the cemetery reserved for members of the American Legion, Spanish-American War Veterans, Grand Army of the Republic, Independent Order of Odd Fellows, or United Confederate Veterans, and such deceased person, at the time of his or her death, did not meet City residency requirements. ... Sec. 16.13. - Sales to Non-Family Members; City's Right of First Refusal. A space owner may sell or transfer his or her space only to a relative by blood or marriage, provided however, a space owner may sell or transfer his or her space to a person not related by blood or marriage if the owner receives approval of said sale from City Council. In the event a space owner wishes to sell or transfer his or her space to a person other than a relative by blood or marriage in a sale or transfer not approved by City Council, the owner shall first offer in writing the space for sale to the City of Orlando. The City may repurchase the space for the original purchase price or one-half of the current sales price, whichever is greater, less a recording fee if the deed from the City to the owner is not recorded. If the City wishes to purchase the space, the City shall notify the owner thereof within five (5) days of receipt of notice, and the sale shall be closed within five (5) days after receipt by the City of evidence of title to the space satisfactory to the Office of Legal Affairs. ... Sec. 16.14. - Declaration; Rights If No Declaration. The owner of a space may present his or her deed to the Cemetery Supervisor designating in writing persons entitled to be buried in the space or spaces owned. This designation may be amended at any time by the owner(s) in the same manner as the original designation. Only relatives by blood or marriage may be designated under this section; provided however, persons other than relatives by blood or marriage may be designated if the owner receives approval of said designation from City Council. In the event the owner fails to designate burial rights for the space or spaces owned, and in the event the property is not transferred or conveyed as provided herein, the right of interment in the space or spaces shall be in the following order: (1)One space, niche or crypt shall be forever reserved for the owner and one for the owner's surviving spouse, if any.(2)The remaining spaces shall pass to the heirs or devisees of the owner in the same manner as real property passes under Florida Law: provided, however, that no person shall be interred in a space passing under this section unless such person would have been eligible under the provisions of this Chapter to be designated for burial in such space at the date of such person's death or the interment of said person is approved by City Council. Sec. 16.15. - Rights Upon Interment. Whenever an interment of the remains of any person is made in a space, the space thereby becomes inalienable and shall be held as the space of the interred person except in the case of cremated remains as set forth in Section 16.17. ... Sec. 16.17. - Interments in General. All earth interments shall be in a liner or vault of concrete or steel of a type approved by the cemetery Supervisor. No more than the remains of one body shall be interred in any one space, vault or crypt, except in the case of a mother and stillborn child(ren). However, if written permission is given by the owner of a space or, if the owner is deceased, by the owner's heirs, permitting more than the remains of one person to occupy a space, vault or crypt, an exception will be made to permit no more than one regular interment and one cremain or two cremains in any one space, vault or crypt. Installation of cremorial headstones may be permitted under the same number, size and material restrictions as set forth in Section 16.26; provided, however, that in cases where the use of a cremorial headstone causes the total number of allowable interments or inurnments in any one space to be exceeded, each additional inurnment shall be charged a fee as set forth by City Council for right of additional interment. ... Sec. 16.29. - Children; Pets. No child under fifteen (15) years of age shall be permitted in the cemetery unless accompanied by an adult. Pets shall be prohibited in the cemetery. ... Sec. 16.35. - Double Interment Permitted. Notwithstanding the provisions of Section 16.17 hereof, no more than the remains of two (2) bodies shall be interred in any one space in Block 12 of Greenwood Cemetery, provided that a mother and a stillborn child shall be considered one body. All interments in Block 12 shall be in a vault installed by the City of Orlando.
"================ <TEXT PASSAGE> ======= Sec. 16.02. - Greenwood Cemetery Declared Public Cemetery of City; Description; Map; Use. The tract of land, being the southwest quarter of the northwest quarter of Section 31, Township 22 South, Range 30 East, according to a plat recorded at the office of the Clerk of the Circuit Court of the County in Deed Book 87, page 227, is declared to be the public cemetery of the City, to be known as Greenwood Cemetery. An official map of the Greenwood Cemetery shall at all times be on file at the office of the supervisor of Greenwood Cemetery. The cemetery is set apart only for the burial, entombment or inurnment of human remains and shall only be used as such in perpetuity. (Ord. of 6-27-1977, § 1; Ord. of 3-30-1981, § 1) Sec. 16.03. - Greenwood Cemetery Not Perpetual Care Cemetery. Greenwood Cemetery is not one of perpetual care and the City shall be under no obligation to maintain any set standard for its care and upkeep. The City shall endeavor to provide general maintenance and care to the cemetery in keeping with the reminder that it is sacredly devoted to the interment, entombment or inurnment of the dead. (Ord. of 6-27-1977, § 1) Sec. 16.04. - Burials in City Restricted to Greenwood Cemetery and Washington Park Cemetery. No human body shall be buried within the City limits of the City of Orlando, except in Greenwood Cemetery or in Washington Park Cemetery if a privately owned cemetery, or in such other cemetery facilities and/or property as the City Council may from time to time designate, acquire or control. ... Sec. 16.10. - Spaces; Sale to Permanent Residents; Exceptions. The City shall only sell spaces in Greenwood Cemetery for prices fixed by the City Council to residents of the City of Orlando who have resided within the corporate limits of the City for a period of more than one year prior to the date of sale, and to persons who are not permanent residents of the City provided that such sales shall be only for the immediate burial of a permanent resident of the City who met the residency requirements hereunder at the time of the resident's death. The Sexton of the Greenwood Cemetery shall require satisfactory evidence of such prior residence within the City. In addition, the City may sell spaces in Blocks 12, 16, 17, 18, 19 and 20 of Greenwood Cemetery to non-City, as well as City residents. Provided, however, that a person who has not met the residency requirements set forth herein may be permitted to purchase spaces in Greenwood Cemetery at the price established by City Council for qualified non-residents if such person is related by blood or marriage to a deceased person buried in said cemetery, unless such deceased person is interred in a section of the cemetery reserved for members of the American Legion, Spanish-American War Veterans, Grand Army of the Republic, Independent Order of Odd Fellows, or United Confederate Veterans, and such deceased person, at the time of his or her death, did not meet City residency requirements. ... Sec. 16.13. - Sales to Non-Family Members; City's Right of First Refusal. A space owner may sell or transfer his or her space only to a relative by blood or marriage, provided however, a space owner may sell or transfer his or her space to a person not related by blood or marriage if the owner receives approval of said sale from City Council. In the event a space owner wishes to sell or transfer his or her space to a person other than a relative by blood or marriage in a sale or transfer not approved by City Council, the owner shall first offer in writing the space for sale to the City of Orlando. The City may repurchase the space for the original purchase price or one-half of the current sales price, whichever is greater, less a recording fee if the deed from the City to the owner is not recorded. If the City wishes to purchase the space, the City shall notify the owner thereof within five (5) days of receipt of notice, and the sale shall be closed within five (5) days after receipt by the City of evidence of title to the space satisfactory to the Office of Legal Affairs. ... Sec. 16.14. - Declaration; Rights If No Declaration. The owner of a space may present his or her deed to the Cemetery Supervisor designating in writing persons entitled to be buried in the space or spaces owned. This designation may be amended at any time by the owner(s) in the same manner as the original designation. Only relatives by blood or marriage may be designated under this section; provided however, persons other than relatives by blood or marriage may be designated if the owner receives approval of said designation from City Council. In the event the owner fails to designate burial rights for the space or spaces owned, and in the event the property is not transferred or conveyed as provided herein, the right of interment in the space or spaces shall be in the following order: (1)One space, niche or crypt shall be forever reserved for the owner and one for the owner's surviving spouse, if any.(2)The remaining spaces shall pass to the heirs or devisees of the owner in the same manner as real property passes under Florida Law: provided, however, that no person shall be interred in a space passing under this section unless such person would have been eligible under the provisions of this Chapter to be designated for burial in such space at the date of such person's death or the interment of said person is approved by City Council. Sec. 16.15. - Rights Upon Interment. Whenever an interment of the remains of any person is made in a space, the space thereby becomes inalienable and shall be held as the space of the interred person except in the case of cremated remains as set forth in Section 16.17. ... Sec. 16.17. - Interments in General. All earth interments shall be in a liner or vault of concrete or steel of a type approved by the cemetery Supervisor. No more than the remains of one body shall be interred in any one space, vault or crypt, except in the case of a mother and stillborn child(ren). However, if written permission is given by the owner of a space or, if the owner is deceased, by the owner's heirs, permitting more than the remains of one person to occupy a space, vault or crypt, an exception will be made to permit no more than one regular interment and one cremain or two cremains in any one space, vault or crypt. Installation of cremorial headstones may be permitted under the same number, size and material restrictions as set forth in Section 16.26; provided, however, that in cases where the use of a cremorial headstone causes the total number of allowable interments or inurnments in any one space to be exceeded, each additional inurnment shall be charged a fee as set forth by City Council for right of additional interment. ... Sec. 16.29. - Children; Pets. No child under fifteen (15) years of age shall be permitted in the cemetery unless accompanied by an adult. Pets shall be prohibited in the cemetery. ... Sec. 16.35. - Double Interment Permitted. Notwithstanding the provisions of Section 16.17 hereof, no more than the remains of two (2) bodies shall be interred in any one space in Block 12 of Greenwood Cemetery, provided that a mother and a stillborn child shall be considered one body. All interments in Block 12 shall be in a vault installed by the City of Orlando. https://library.municode.com/fl/orlando/codes/code_of_ordinances?nodeId=TITIICICO_CH16CEBU_ARTIGEPR_S16.04BUREGRCEWAPACE ================ <QUESTION> ======= My grandmother is buried in Occala, but she bought a burial plot in Orlando's city cemetery's Block B12. I am her sole heir, and I want to be buried in Orlando. Will I be entitled to it? I also want my daughter to be buried with me. Will it be possible? My daughter says that she will only accept it if her father is buried there as well. Is this feasible? If I change my mind, can I sell the plot to my friend? I have a vague memory that grandpa's ashes are interred there. Does it change the picture? ================ <TASK> ======= You are an expert in question answering. Your task is to reply to a query or question, based only on the information provided by the user. It should only use information in the article provided."
Please respond using only information provided in the context block. If the information needed to answer the question is not within the context block, state that you cannot answer.
I am interested in what context one would use the glGenFrameBuffers() function. What does this function do exactly? Please include any extra information to help understand the function.
Up to this point, all of our discussion regarding buffers has focused on the buffers provided by the windowing system, as you requested when you called glutCreateWindow() (and configured by your call to glutInitDisplayMode()). Although you can quite successfully use any technique with just those buffers, quite often various operations require moving data between buffers superfluously. This is where framebuffer objects enter the picture (as part of OpenGL Version 3.0). Using framebuffer objects, you can create our own framebuffers and use their attached renderbuffers to minimize data copies and optimize performance. Framebuffer objects are quite useful for performing off-screen-rendering, updating texture maps, and engaging in buffer ping-ponging (a data-transfer techniques used in GPGPU). The framebuffer that is provided by the windowing system is the only framebuffer that is available to the display system of your graphics server— that is, it is the only one you can see on your screen. It also places restrictions on the use of the buffers that were created when your window opened. By comparison, the framebuffers that your application creates cannot be displayed on your monitor; they support only off-screen rendering. Another difference between window-system-provided framebuffers and framebuffers you create is that those managed by the window system allocate their buffers—color, depth, stencil, and accumulation—when your window is created. When you create an application-managed framebuffer object, you need to create additional renderbuffers that you associate with the framebuffer objects you created. The buffers with the window-systemprovided buffers can never be associated with an application-created framebuffer object, and vice versa. To allocate an application-generated framebuffer object name, you need to call glGenFramebuffers() which will allocate an unused identifier for the framebuffer object. As compared to some other objects within OpenGL (e.g., texture objects and display lists), you always need to use an name returned from glGenFramebuffers(). Allocating a framebuffer object name doesn’t actually create the framebuffer object or allocate any storage for it. Those tasks are handled through a call to glBindFramebuffer(). glBindFramebuffer() operates in a similar manner to many of the other glBind*() routines you’ve seen in OpenGL. The first time it is called for a particular framebuffer, it causes void glGenFramebuffers(GLsize n, GLuint *ids); Allocate n unused framebuffer object names, and return those names in ids. storage for the object to be allocated and initialized. Any subsequent calls will bind the provided framebuffer object name as the active one. As with all of the other objects you have encountered in OpenGL, you can release an application-allocated framebuffer by calling glDeleteFramebuffers(). That function will mark the framebuffer object’s name as unallocated and release any resources associated with the framebuffer object. For completeness, you can determine whether a particular unsigned integer is an application-allocated framebuffer object by calling glIsFramebuffer():. void glBindFramebuffer(GLenum target, GLuint framebuffer); Specifies either a framebuffer for either reading or writing. When target is GL_DRAW_FRAMEBUFFER, framebuffer specifies the destination framebuffer for rendering. Similarly, when target is set to GL_READ_ FRAMEBUFFER, framebuffer specifies the source of read operations. Passing GL_FRAMEBUFFER for target sets both the read and write framebuffer bindings to framebuffer. framebuffer must either be zero, which binds target to the default; a window-system provided framebuffer; or a framebuffer object generated by a call to glGenFramebuffers(). A GL_INVALID_OPERATION error is generated if framebuffer is neither zero nor a valid framebuffer object previously generated by calling glGenFramebuffers(), but not deleted by calling glDeleteFramebuffers(). void glDeleteFramebuffers(GLsize n, const GLuint *ids); Deallocates the n framebuffer objects associated with the names provided in ids. If a framebuffer object is currently bound (i.e., its name was passed to the most recent call to glBindFramebuffer()), and is deleted, the framebuffer target is immediately bound to id zero (the window-system provided framebuffer), and the framebuffer object is released. No errors are generated by glDeleteFramebuffers(). Unused names or zero are simply ignored. GLboolean glIsFramebuffer(GLuint framebuffer); Framebuffer Objects 529 Once a framebuffer object is created, you still can’t do much with it. You need to provide a place for drawing to go and reading to come from; those places are called framebuffer attachments. We’ll discuss those in more detail after we examine renderbuffers, which are one type of buffer you can attach to a framebuffer object. Renderbuffers Renderbuffers are effectively memory managed by OpenGL that contains formatted image data. The data that a renderbuffer holds takes meaning once it is attached to a framebuffer object, assuming that the format of the image buffer matches what OpenGL is expecting to render into (e.g., you can’t render colors into the depth buffer). As with many other buffers in OpenGL, the process of allocating and deleting buffers is similar to what you’ve seen before. To create a new renderbuffer, you would call glGenRenderbuffers(). Likewise, a call to glDeleteRenderbuffers() will release the storage associated with a renderbuffer. Returns GL_TRUE if framebuffer is the name of a framebuffer returned from glGenFramebuffers(). Returns GL_FALSE if framebuffer is zero (the window-system default framebuffer) or a value that’s either unallocated or been deleted by a call to glDeleteFramebuffers(). void glGenRenderbuffers(GLsizei n, GLuint *ids); Allocate n unused renderbuffer object names, and return those names in ids. Names are unused until bound with a call to glBindRenderbuffer(). void glDeleteRenderbuffers(GLsizei n, const GLuint *ids); Deallocates the n renderbuffer objects associated with the names provided in ids. If one of the renderbuffers is currently bound and passed to glDeleteRenderbuffers(), a binding of zero replaces the binding at the current framebuffer attachment point, in addition to the renderbuffer being released. No errors are generated by glDeleteRenderbuffers(). Unused names or zero are simply ignored. Likewise, you can determine whether a name represents a valid renderbuffer by calling glIsRenderbuffer(). Similar to the process of binding a framebuffer object so that you can modify its state, you call glBindRenderbuffer() to affect a renderbuffer’s creation and to modify the state associated with it, which includes the format of the image data that it contains. Creating Renderbuffer Storage When you first call glBindRenderbuffer() with an unused renderbuffer name, the OpenGL server creates a renderbuffer with all its state information set to the default values. In this configuration, no storage has been allocated to store image data. Before you can attach a renderbuffer to a framebuffer and render into it, you need to allocate storage and specify its image format. This is done by calling either glRenderbufferStorage() or glRenderbufferStorageMultisample(). void glIsRenderbuffer(GLuint renderbuffer); Returns GL_TRUE if renderbuffer is the name of a renderbuffer returned from glGenRenderbuffers(). Returns GL_FALSE if renderbuffer is zero (the window-system default framebuffer) or a value that’s either unallocated or been deleted by a call to glDeleteRenderbuffers(). void glBindRenderbuffer(GLenum target, GLuint renderbuffer); Creates a renderbuffer and associates it with the name renderbuffer. target must be GL_RENDERBUFFER. renderbuffer must either be zero, which removes any renderbuffer binding, or a name that was generated by a call to glGenRenderbuffers(); otherwise, a GL_INVALID_OPERATION error will be generated. void glRenderbufferStorage(GLenum target, GLenum internalformat, GLsizei width, GLsizei height); void glRenderbufferStorageMultisample(GLenum target, GLsizei samples, GLenum internalformat, GLsizei width, GLsizei height); Framebuffer Objects 531 Allocates storage for image data for the bound renderbuffer. target must be GL_RENDERBUFFER. For a color-renderable buffer, internalformat must be one of: GL_RED, GL_R8, GL_R16, GL_RG, GL_RG8, GL_RG16, GL_RGB, GL_R3_G3_B2, GL_RGB4, GL_RGB5, GL_RGB8, GL_RGB10, GL_RGB12, GL_RGB16, GL_RGBA, GL_RGBA2, GL_RGBA4, GL_RGB5_A1, GL_RGBA8, GL_RGB10_A2, GL_RGBA12, GL_RGBA16, GL_SRGB, GL_SRGB8, GL_SRGB_ALPHA, GL_SRGB8_ALPHA8,GL_R16F, GL_R32F, GL_RG16F, GL_RG32F, GL_RGB16F, GL_RGB32F, GL_RGBA16F, GL_RGBA32F, GL_R11F_G11F_B10F, GL_RGB9_E5, GL_R8I, GL_R8UI, GL_R16I, GL_R16UI, GL_R32I, GL_R32UI, GL_RG8I, GL_RG8UI, GL_RG16I, GL_RG16UI, GL_RG32I, GL_RG32UI, GL_RGB8I, GL_RGB8UI, GL_RGB16I, GL_RGB16UI, GL_RGB32I, GL_RGB32UI, GL_RGBA8I, GL_RGBA8UI, GL_RGBA16I, GL_RGBA16UI, GL_RGBA32I. OpenGL version 3.1 adds the additional following formats: GL_R8_SNORM, GL_R16_SNORM, GL_RG8_SNORM, GL_RG16_SNORM, GL_RGB8_ SNORM, GL_RGB16_SNORM, GL_RGBA8_SNORM, GL_RGBA16_SNORM. To use a renderbuffer as a depth buffer, it must be depth-renderable, which is specified by setting internalformat to either GL_DEPTH_COMPONENT, GL_DEPTH_COMPONENT16, GL_DEPTH_COMPONENT32, GL_DEPTH_ COMPONENT32, or GL_DEPTH_COMPONENT32F. For use exclusively as a stencil buffer, internalformat should be specified as either GL_STENCIL_INDEX, GL_STENCIL_INDEX1, GL_STENCIL_ INDEX4, GL_STENCIL_INDEX8, or GL_STENCIL_INDEX16. For packed depth-stencil storage, internalformat must be GL_DEPTH_ STENCIL, which allows the renderbuffer to be attached as the depth buffer, stencil buffer, or at the combined depth-stencil attachment point. width and height specify the size of the renderbuffer in pixels, and samples specifies the number of multisample samples per pixel. Setting samples to zero in a call to glRenderbufferStorageMultisample() is identical to calling glRenderbufferStorage(). A GL_INVALID_VALUE is generated if width or height is greater than the value returned when querying GL_MAX_RENDERBUFFER_SIZE, or if samples is greater than the value returned when querying GL_MAX_ SAMPLES. A GL_INVALID_OPERATION is generated if internalformat is a signed- or unsigned-integer format (e.g., a format containing a “I”, or “UI” in its token), and samples is not zero, and the implementation doesn’t support multisampled integer buffers. Finally, if the renderbuffer size and format combined exceed the available memory able to be allocated, then a GL_OUT_OF_MEMORY error is generated. Example 10-6 Creating an RGBA Color Renderbuffer: fbo.c glGenRenderbuffers( 1, &color ); glBindRenderbuffer( GL_RENDERBUFFER, color ); glRenderbufferStorage( GL_RENDERBUFFER, GL_RGBA, 256, 256 ); Once you have created storage for your renderbuffer, you need to attach it to a framebuffer object before you can render into it. Framebuffer Attachments When you render, you can send the results of that rendering to a number of places: • The color buffer to create an image, or even multiple color buffers if you’re using multiple render targets (see “Special Output Values” in Chapter 15) • The depth buffer to store occlusion information • The stencil buffer for storing per-pixel masks to control rendering Each of those buffers represents a framebuffer attachment, to which you can attach suitable image buffers that you later render into, or read from. Currently, there are two types of rendering surfaces you can associate with one of those attachments: renderbuffers and a level of a texture image. Attachment Name Description GL_COLOR_ATTACHMENTi The ith color buffer. i can range from zero (the default color buffer) to GL_MAX_COLOR_ATTACHMENTS–1 GL_DEPTH_ATTACHMENT The depth buffer GL_STENCIL_ATTACHMENT The stencil buffer GL_DEPTH_STENCIL_ATTACHMENT A special attachment for packed depthstencil buffers (which require the renderbuffer to have been allocated as a GL_DEPTH_STENCIL pixel format) We’ll first discuss attaching a renderbuffer to a framebuffer object, which is done by calling glFramebufferRenderbuffer(). In Example 10-7, we create and attach two renderbuffers: one for color, and the other for depth. We then proceed to render, and finally copy the results back to the window-system-provided framebuffer to display the results. You might use this technique to generate frames for a movie rendering offscreen, where you don’t have to worry about the visible framebuffer being corrupted by overlapping windows or someone resizing the window and interrupting rendering. One important point to remember is that you might need to reset the viewport for each framebuffer before rendering, particularly if the size of your application-defined framebuffers differs from the window-system provided framebuffer. Another very common use for framebuffer objects is to update textures dynamically. You might do this to indicate changes in a surface’s appearance (such as bullet holes in a wall in a game) or to update values in a lookup table if you’re doing GPGPU-like computations. In these cases, you bind a level of a texture map as the framebuffer attachment, as compared to a renderbuffer. After rendering, the texture map can be detached from the framebuffer so that it can be used in subsequent rendering. Note: Nothing prevents you from reading from a texture that is simultaneously bound as a framebuffer attachment for writing. In this scenario, called a framebuffer rendering loop, the results are undefined for both operations. That is, the values returned from sampling the bound texture map, as well as the values written into the texture level while bound, will likely be incorrect. void glFramebufferTexture1D(GLenum target, GLenum attachment, GLenum texturetarget, GLuint texture, GLint level); void glFramebufferTexture2D(GLenum target, GLenum attachment, GLenum texturetarget, GLuint texture, GLint level); void glFramebufferTexture3D(GLenum target, GLenum attachment, GLenum texturetarget, GLuint texture, GLint level, GLint layer); Attaches a level of a texture objects as a rendering attachment to a framebuffer object. target must be either GL_READ_FRAMEBUFFER, GL_DRAW_FRAMEBUFFER, or GL_FRAMEBUFFER (which is equivalent to GL_DRAW_FRAMEBUFFER). attachment must be one of the framebuffer attachment points: GL_COLOR_ATTACHMENTi, GL_DEPTH_ ATTACHMENT, GL_STENCIL_ATTACHMENT, or GL_DEPTH_STENCIL_ ATTACHMENT (in which case, the internal format of the texture must be GL_DEPTH_STENCIL). For glFramebufferTexture1D(), texturetarget must be GL_TEXTURE_1D, if texture is not zero. For glFramebufferTexture2D(), texturetarget must be GL_TEXTURE_2D, GL_TEXTURE_RECTANGLE, GL_TEXTURE_CUBE_ MAP_POSITIVE_X, GL_TEXTURE_CUBE_MAP_POSITIVE_Y, GL_ TEXTURE_CUBE_MAP_POSITIVE_Z, GL_TEXTURE_CUBE_MAP_ NEGATIVE_X, GL_TEXTURE_CUBE_MAP_NEGATIVE_Y, GL_TEXTURE_ CUBE_MAP_NEGATIVE_Z, and for glFramebufferTexture3D() texturetarget must be GL_TEXTURE_3D. Similar to the previous example, Example 10-8 demonstrates the process of dynamically updating a texture, using the texture after its update is completed, and then rendering with it later. Framebuffer Completeness Given the myriad of combinations between texture and buffer formats, and between framebuffer attachments, various situations can arise that prevent the completion of rendering when you are using applicationdefined framebuffer objects. After modifying the attachments to a framebuffer object, it’s best to check the framebuffer’s status by calling glCheckFramebufferStatus(). The errors representing the various violations of framebuffer configurations are listed in Table 10-7. Of the listed errors, GL_FRAMEBUFFER_UNSUPPORTED is very implementation dependent, and may be the most complicated to debug. void glFramebufferTextureLayer(GLenum target, GLenum attachment, GLuint texture, GLint level, GLint layer); Attaches a layer of a three-dimensional texture, or a one- or twodimensional array texture as a framebuffer attachment, in a similar manner to glFramebufferTexture3D(). target must be one of GL_READ_FRAMEBUFFER, GL_DRAW_ FRAMEBUFFER, or GL_FRAMEBUFFER (which is equivalent to GL_DRAW_ FRAMEBUFFER). attachment must be one of GL_COLOR_ATTACHMENTi, GL_DEPTH_ATTACHMENT, GL_STENCIL_ATTACHMENT, or GL_DEPTH_ STENCIL_ATTACHMENT. texture must be either zero, indicating that the current binding for the attachment should be released, or a texture object name (as returned from glGenTextures()). level indicates the mipmap level of the texture object, and layer represents which layer of the texture (or array element) should be bound as an attachment. GLenum glCheckFramebufferStatus(GLenum target); Returns one of the framebuffer completeness status enums listed in Table 10-7. target must be one of GL_READ_FRAMEBUFFER, GL_DRAW_ FRAMEBUFFER, or GL_FRAMEBUFFER (which is equivalent to GL_DRAW_ FRAMEBUFFER). If glCheckFramebufferStatus() generates an error, zero is returned. Framebuffer Objects 539 Copying Pixel Rectangles While glCopyPixels() has been the default routine for replicating blocks of pixels since OpenGL Version 1.0, as OpenGL expanded its rendering facilities, a more substantial pixel-copying routine was required. glBlitFramebuffer(), described below, subsumes the operations of glCopyPixels() and glPixelZoom() in a single, enhanced call. glBlitFramebuffer() allows greater pixel filtering during the copy operation, much in the same manner as texture mapping (in fact, the same filtering operations, GL_NEAREST and GL_LINEAR are used during the copy). Additionally, this routine is aware of multisampled buffers, and supports copying between different framebuffers (as controlled by framebuffer objects). Framebuffer Completeness Status Enum Description GL_FRAMEBUFFER_COMPLETE The framebuffer and its attachments match the rendering or reading state required. GL_FRAMEBUFFER_UNDEFINED The bound framebuffer is specified to be the default framebuffer (i.e., glBindFramebuffer() with zero specified as the framebuffer), and the default framebuffer doesn’t exist. GL_FRAMEBUFFER_ INCOMPLETE_ATTACHMENT A necessary attachment to the bound framebuffer is uninitialized GL_FRAMEBUFFER_ INCOMPLETE_MISSING_ ATTACHMENT There are no images (e.g., texture layers or renderbuffers) attached to the framebuffer. GL_FRAMEBUFFER_ INCOMPLETE_DRAW_BUFFER Every drawing buffer (e.g., GL_DRAW_BUFFERi as specified by glDrawBuffers()) has an attachment. GL_FRAMEBUFFER_ INCOMPLETE_READ_BUFFER An attachment exists for the buffer specified for the buffer specified by glReadBuffer(). GL_FRAMEBUFFER_ UNSUPPORTED The combination of images attached to the framebuffer object is incompatible with the requirements of the OpenGL implementation. GL_FRAMEBUFFER_ INCOMPLETE_MULTISAMPLE The number of samples for all images across the framebuffer’s attachments do not match. void glBlitFramebuffer(GLint srcX0, GLint srcY0, GLint srcX1, GLint srcY1, GLint dstX0, GLint dstY0, GLint dstX1, GLint dstY1, GLbitfield buffers, GLenum filter); Copies a rectangle of pixel values from one region of the read framebuffer to another region of the draw framebuffer, potentially resizing, reversing, converting, and filtering the pixels in the process. srcX0, srcY0, srcX1, srcY1 represent the source region where pixels are sourced from, and written to the rectangular region specified by dstX0, dstY0, dstX1, dstY1. buffers is the bitwise-or of GL_COLOR_BUFFER_BIT, GL_DEPTH_BUFFER_ BIT, and GL_STENCIL_BUFFER_BIT, which represent the buffers in which the copy should occur. Finally, filter specifies the method of interpolation done if the two rectangular regions are different sizes, and must be one of GL_NEAREST or GL_LINEAR; no filtering is applied if the regions are the same size. If there are multiple color draw buffers (See “Rendering to Multiple Output Buffers” on page 729), each buffer receives a copy of the source region. If srcX1 < srcX0, or dstX1 < dstX0, the image is reversed in the horizontal direction. Likewise, if srcY1 < srcY0 or dstY1 < dstY0, the image is reverse in the vertical direction. However, If both the source and destination sizes are negative in the same direction, no reversal is done. If the source and destination buffers are of different formats, conversion of the pixel values is done in most situations. However, if the read color buffer is a floating-point format, and any of the write color buffers are not, or vice verse; and if the read color buffer is a signed (unsigned) integer format and not all of the draw buffers are signed (unsigned) integer values, the call will generate a GL_INVALID_OPERATION, and no pixels will be copied. Multisampled buffers also have an effect on the copying of pixels. If the source buffer is multisampled, and the destination is not, the samples are resolved to a single pixel value for the destination buffer. Conversely, if the source buffer is not multisampled, and the destination is, the source pixel’s data is replicated for each sample. Finally, if both buffers are multisampled and the number of samples for each buffer is the same, the samples are copied without modification. However, if the buffers have a different number of samples, no pixels are copied, and a GL_INVALID_ OPERATION error is generated. A GL_INVALID_VALUE error is generated if buffers has other bits set than those permitted, or if filter is other than GL_LINEAR or GL_NEAREST Chapter Objectives After reading this chapter, you’ll be able to do the following: • Render concave filled polygons by first tessellating them into convex polygons, which can be rendered using standard OpenGL routines • Use the OpenGL Utility Library to create quadrics objects to render and model the surfaces of spheres and cylinders, and to tessellate disks (circles) and partial disks (arcs) Note: In OpenGL Version 3.1, some of the techniques and functions described in this chapter—particularly those relating to quadric objects—were likely affected by deprecation. While many of these features can be found in the GLU library, they rely on OpenGL functions that were removed. The OpenGL Library (GL) is designed for low-level operations, both streamlined and accessible to hardware acceleration. The OpenGL Utility Library (GLU) complements the OpenGL library, supporting higher-level operations. Some of the GLU operations are covered in other chapters. Mipmapping (gluBuild*DMipmaps()) and image scaling (gluScaleImage()) are discussed along with other facets of texture mapping in Chapter 9. Several matrix transformation GLU routines (gluOrtho2D(), gluPerspective(), gluLookAt(), gluProject(), gluUnProject(), and gluUnProject4()) are described in Chapter 3. The use of gluPickMatrix() is explained in Chapter 13. The GLU NURBS facilities, which are built atop OpenGL evaluators, are covered in Chapter 12. Only two GLU topics remain: polygon tessellators and quadric surfaces; these topics are discussed in this chapter. To optimize performance, the basic OpenGL renders only convex polygons, but the GLU contains routines for tessellating concave polygons into convex ones, which the basic OpenGL can handle. Where the basic OpenGL operates on simple primitives, such as points, lines, and filled polygons, the GLU can create higher-level objects, such as the surfaces of spheres, cylinders, and cones. This chapter has the following major sections. • “Polygon Tessellation” explains how to tessellate concave polygons into easier-to-render convex polygons. • “Quadrics: Rendering Spheres, Cylinders, and Disks” describes how to generate spheres, cylinders, circles and arcs, including data such as surface normals and texture coordinates. Polygon Tessellation As discussed in “Describing Points, Lines, and Polygons” in Chapter 2, OpenGL can directly display only simple convex polygons. A polygon is simple if the edges intersect only at vertices, there are no duplicate vertices, and exactly two edges meet at any vertex. If your application requires the display of concave polygons, polygons containing holes, or polygons with intersecting edges, these polygons must first be subdivided into simple convex polygons before they can be displayed. Such subdivision is called tessellation, and the GLU provides a collection of routines that perform tessellation. These routines take as input arbitrary contours, which describe hard-to-render polygons, and they return some combination of triangles, triangle meshes, triangle fans, and lines. If you think a polygon may need tessellation, follow these typical steps: 1. Create a new tessellation object with gluNewTess(). 2. Use gluTessCallback() several times to register callback functions to perform operations during the tessellation. The trickiest case for a callback function is when the tessellation algorithm detects an intersection and must call the function registered for the GLU_TESS_ COMBINE callback. 3. Specify tessellation properties by calling gluTessProperty(). The most important property is the winding rule, which determines the regions that should be filled and those that should remain unshaded. 4. Create and render tessellated polygons by specifying the contours of one or more closed polygons. If the data for the object is static, encapsulate the tessellated polygons in a display list. (If you don’t have to recalculate the tessellation repeatedly, using display lists is more efficient.) 5. If you need to tessellate something else, you may reuse your tessellation object. If you are forever finished with your tessellation object, you may delete it with gluDeleteTess(). Note: The tessellator described here was introduced in Version 1.2 of the GLU. If you are using an older version of the GLU, you must use routines described in “Describing GLU Errors” on page 557. To query which version of GLU you have, use gluGetString(GLU_VERSION), which returns a string with your GLU version number. If you don’t seem to have gluGetString() in your GLU, then you have GLU 1.0, which did not yet have the gluGetString() routine. Creating a Tessellation Object As a complex polygon is being described and tessellated, it has associated data, such as the vertices, edges, and callback functions. All this data is tied to a single tessellation object. To perform tessellation, your program first has to create a tessellation object using the routine gluNewTess(). A single tessellation object can be reused for all your tessellations. This object is required only because library routines might need to do their own tessellations, and they should be able to do so without interfering with any tessellation that your program is doing. It might also be useful to have multiple tessellation objects if you want to use different sets of callbacks for different tessellations. A typical program, however, allocates a single tessellation object and uses it for all its tessellations. There’s no real need to free it, because it uses a small amount of memory. On the other hand, it never hurts to be tidy. Tessellation Callback Routines After you create a tessellation object, you must provide a series of callback routines to be called at appropriate times during the tessellation. After specifying the callbacks, you describe the contours of one or more polygons using GLU routines. When the description of the contours is complete, the tessellation facility invokes your callback routines as necessary. Any functions that are omitted are simply not called during the tessellation, and any information they might have returned to your program is lost. All are specified by the single routine gluTessCallback(). GLUtesselator* gluNewTess(void); Creates a new tessellation object and returns a pointer to it. A null pointer is returned if the creation fails. Polygon Tessellation 545 void gluTessCallback(GLUtesselator *tessobj, GLenum type, void (*fn)()); Associates the callback function fn with the tessellation object tessobj. The type of the callback is determined by the parameter type, which can be GLU_TESS_BEGIN, GLU_TESS_BEGIN_DATA, GLU_TESS_EDGE_FLAG, GLU_TESS_EDGE_FLAG_DATA, GLU_TESS_VERTEX, GLU_TESS_VERTEX_ DATA, GLU_TESS_END, GLU_TESS_END_DATA, GLU_TESS_COMBINE, GLU_TESS_COMBINE_DATA, GLU_TESS_ERROR, or GLU_TESS_ERROR_ DATA. The 12 possible callback functions have the following prototypes: GLU_TESS_BEGIN void begin(GLenum type); GLU_TESS_BEGIN_DATA void begin(GLenum type, void *user_data); GLU_TESS_EDGE_FLAG void edgeFlag(GLboolean flag); GLU_TESS_EDGE_FLAG_DATA void edgeFlag(GLboolean flag, void *user_data); GLU_TESS_VERTEX void vertex(void *vertex_data); GLU_TESS_VERTEX_DATA void vertex(void *vertex_data, void *user_data); GLU_TESS_END void end(void); GLU_TESS_END_DATA void end(void *user_data); GLU_TESS_COMBINE void combine( GLdouble coords[3], void*vertex_data[4], GLfloat weight[4], void **outData); GLU_TESS_COMBINE_DATA void combine( GLdouble coords[3], void*vertex_data[4], GLfloat weight[4], void **outData, void *user_data); GLU_TESS_ERROR void error(GLenum errno); GLU_TESS_ERROR_DATA void error(GLenum errno, void *user_data); To change a callback routine, simply call gluTessCallback() with the new routine. To eliminate a callback routine without replacing it with a new one, pass gluTessCallback() a null pointer for the appropriate function. As tessellation proceeds, the callback routines are called in a manner similar to how you use the OpenGL commands glBegin(), glEdgeFlag*(), glVertex*(), and glEnd(). (See “Marking Polygon Boundary Edges” in Chapter 2 for more information about glEdgeFlag*().) The combine callback is used to create new vertices where edges intersect. The error callback is invoked during the tessellation only if something goes wrong. For every tessellator object created, a GLU_TESS_BEGIN callback is invoked with one of four possible parameters: GL_TRIANGLE_FAN, GL_TRIANGLE_ STRIP, GL_TRIANGLES, or GL_LINE_LOOP. When the tessellator decomposes the polygons, the tessellation algorithm decides which type of triangle primitive is most efficient to use. (If the GLU_TESS_BOUNDARY_ONLY property is enabled, then GL_LINE_LOOP is used for rendering.) Since edge flags make no sense in a triangle fan or triangle strip, if there is a callback associated with GLU_TESS_EDGE_FLAG that enables edge flags, the GLU_TESS_BEGIN callback is called only with GL_TRIANGLES. The GLU_TESS_EDGE_FLAG callback works exactly analogously to the OpenGL glEdgeFlag*() call. After the GLU_TESS_BEGIN callback routine is called and before the callback associated with GLU_TESS_END is called, some combination of the GLU_TESS_EDGE_FLAG and GLU_TESS_VERTEX callbacks is invoked (usually by calls to gluTessVertex(), which is described on page 555). The associated edge flags and vertices are interpreted exactly as they are in OpenGL between glBegin() and the matching glEnd(). If something goes wrong, the error callback is passed a GLU error number. A character string describing the error is obtained using the routine gluErrorString(). (See “Describing GLU Errors” on page 557 for more information about this routine.) Example 11-1 shows a portion of tess.c, in which a tessellation object is created and several callbacks are registered. Example 11-1 Registering Tessellation Callbacks: tess.c #ifndef CALLBACK #define CALLBACK #endif Polygon Tessellation 547 /* a portion of init() */ tobj = gluNewTess(); gluTessCallback(tobj, GLU_TESS_VERTEX, glVertex3dv); gluTessCallback(tobj, GLU_TESS_BEGIN, beginCallback); gluTessCallback(tobj, GLU_TESS_END, endCallback); gluTessCallback(tobj, GLU_TESS_ERROR, errorCallback); /* the callback routines registered by gluTessCallback() */ void CALLBACK beginCallback(GLenum which) { glBegin(which); } void CALLBACK endCallback(void) { glEnd(); } void CALLBACK errorCallback(GLenum errorCode) { const GLubyte *estring; estring = gluErrorString(errorCode); fprintf(stderr, "Tessellation Error: %s\n", estring); exit(0); } Note: Type casting of callback functions is tricky, especially if you wish to make code that runs equally well on Microsoft Windows and UNIX. To run on Microsoft Windows, programs that declare callback functions, such as tess.c, need the symbol CALLBACK in the declarations of functions. The trick of using an empty definition for CALLBACK (as demonstrated below) allows the code to run well on both Microsoft Windows and UNIX: #ifndef CALLBACK #define CALLBACK #endif void CALLBACK callbackFunction(...) { .... } In Example 11-1, the registered GLU_TESS_VERTEX callback is simply glVertex3dv(), and only the coordinates at each vertex are passed along. However, if you want to specify more information at every vertex, such as a color value, a surface normal vector, or a texture coordinate, you’ll have to make a more complex callback routine. Example 11-2 shows the start of another tessellated object, further along in program tess.c. The registered function vertexCallback() expects to receive a parameter that is a pointer to six double-length floating-point values: the x-, y-, and z-coordinates and the red, green, and blue color values for that vertex. Example 11-2 Vertex and Combine Callbacks: tess.c /* a different portion of init() */ gluTessCallback(tobj, GLU_TESS_VERTEX, vertexCallback); gluTessCallback(tobj, GLU_TESS_BEGIN, beginCallback); gluTessCallback(tobj, GLU_TESS_END, endCallback); gluTessCallback(tobj, GLU_TESS_ERROR, errorCallback); gluTessCallback(tobj, GLU_TESS_COMBINE, combineCallback); /* new callback routines registered by these calls */ void CALLBACK vertexCallback(GLvoid *vertex) { const GLdouble *pointer; pointer = (GLdouble *) vertex; glColor3dv(pointer+3); glVertex3dv(vertex); } void CALLBACK combineCallback(GLdouble coords[3], GLdouble *vertex_data[4], GLfloat weight[4], GLdouble **dataOut ) { GLdouble *vertex; int i; vertex = (GLdouble *) malloc(6 * sizeof(GLdouble)); vertex[0] = coords[0]; vertex[1] = coords[1]; vertex[2] = coords[2]; for (i = 3; i < 6; i++) vertex[i] = weight[0] * vertex_data[0][i] + weight[1] * vertex_data[1][i] + weight[2] * vertex_data[2][i] + weight[3] * vertex_data[3][i]; *dataOut = vertex; } Polygon Tessellation 549 Example 11-2 also shows the use of the GLU_TESS_COMBINE callback. Whenever the tessellation algorithm examines the input contours, detects an intersection, and decides it must create a new vertex, the GLU_TESS_ COMBINE callback is invoked. The callback is also called when the tessellator decides to merge features of two vertices that are very close to one another. The newly created vertex is a linear combination of up to four existing vertices, referenced by vertex_data[0..3] in Example 11-2. The coefficients of the linear combination are given by weight[0..3]; these weights sum to 1.0. coords gives the location of the new vertex. The registered callback routine must allocate memory for another vertex, perform a weighted interpolation of data using vertex_data and weight, and return the new vertex pointer as dataOut. combineCallback() in Example 11-2 interpolates the RGB color value. The function allocates a six-element array, puts the x-, y-, and z-coordinates in the first three elements, and then puts the weighted average of the RGB color values in the last three elements. User-Specified Data Six kinds of callbacks can be registered. Since there are two versions of each kind of callback, there are 12 callbacks in all. For each kind of callback, there is one with user-specified data and one without. The user-specified data is given by the application to gluTessBeginPolygon() and is then passed, unaltered, to each *DATA callback routine. With GLU_TESS_BEGIN_DATA, the user-specified data may be used for “per-polygon” data. If you specify both versions of a particular callback, the callback with user_data is used, and the other is ignored. Therefore, although there are 12 callbacks, you can have a maximum of six callback functions active at any one time. For instance, Example 11-2 uses smooth shading, so vertexCallback() specifies an RGB color for every vertex. If you want to do lighting and smooth shading, the callback would specify a surface normal for every vertex. However, if you want lighting and flat shading, you might specify only one surface normal for every polygon, not for every vertex. In that case, you might choose to use the GLU_TESS_BEGIN_DATA callback and pass the vertex coordinates and surface normal in the user_data pointer. Tessellation Properties Prior to tessellation and rendering, you may use gluTessProperty() to set several properties to affect the tessellation algorithm. The most important and complicated of these properties is the winding rule, which determines what is considered “interior” and “exterior.” Winding Numbers and Winding Rules For a single contour, the winding number of a point is the signed number of revolutions we make around that point while traveling once around the contour (where a counterclockwise revolution is positive and a clockwise revolution is negative). When there are several contours, the individual winding numbers are summed. This procedure associates a signed integer value with each point in the plane. Note that the winding number is the same for all points in a single region. void gluTessProperty(GLUtesselator *tessobj, GLenum property, GLdouble value); For the tessellation object tessobj, the current value of property is set to value. property is GLU_TESS_BOUNDARY_ONLY, GLU_TESS_TOLERANCE, or GLU_TESS_WINDING_RULE. If property is GLU_TESS_BOUNDARY_ONLY, value is either GL_TRUE or GL_FALSE. When it is set to GL_TRUE, polygons are no longer tessellated into filled polygons; line loops are drawn to outline the contours that separate the polygon interior and exterior. The default value is GL_FALSE. (See gluTessNormal() to see how to control the winding direction of the contours.) If property is GLU_TESS_TOLERANCE, value is a distance used to calculate whether two vertices are close enough together to be merged by the GLU_TESS_COMBINE callback. The tolerance value is multiplied by the largest coordinate magnitude of an input vertex to determine the maximum distance any feature can move as a result of a single merge operation. Feature merging may not be supported by your implementation, and the tolerance value is only a hint. The default tolerance value is zero. The GLU_TESS_WINDING_RULE property determines which parts of the polygon are on the interior and which are on the exterior and should not be filled. value can be GLU_TESS_WINDING_ODD (the default), GLU_ TESS_WINDING_NONZERO, GLU_TESS_WINDING_POSITIVE, GLU_ TESS_WINDING_NEGATIVE, or GLU_TESS_WINDING_ABS_GEQ_TWO. In the set at the left, all three contours are counterclockwise, so each nested interior region adds 1 to the winding number. In the middle set, the two interior contours are drawn clockwise, so the winding number decreases and actually becomes negative. The winding rule classifies a region as inside if its winding number belongs to the chosen category (odd, nonzero, positive, negative, or “absolute value greater than or equal to 2”). The odd and nonzero rules are common ways to define the interior. The positive, negative, and “absolute value t 2” winding rules have some limited use for polygon CSG (computational solid geometry) operations. The program tesswind.c demonstrates the effects of winding rules. The four sets of contours shown in Figure 11-3 are rendered. The user can then cycle through the different winding rule properties to see their effects. For each winding rule, the dark areas represent interiors. Note the effects of clockwise and counterclockwise winding. CSG Uses for Winding Rules GLU_TESS_WINDING_ODD and GLU_TESS_WINDING_NONZERO are the most commonly used winding rules. They work for the most typical cases of shading. The winding rules are also designed for CSG operations, making it easy to find the union, difference, or intersection (Boolean operations) of several contours. 1 2 3 1 0 -1 1 1 1 1 1 2 First, assume that each contour is defined so that the winding number is 0 for each exterior region and 1 for each interior region. (Each contour must not intersect itself.) Under this model, counterclockwise contours define the outer boundary of the polygon, and clockwise contours define holes. Contours may be nested, but a nested contour must be oriented oppositely from the contour that contains it. 1 2 3 1 0 -1 1 2 321 4321 Contours and Winding Numbers Winding Rules Odd Nonzero Positive Negative ABS_GEQ_TWO Unfilled Unfilled Unfilled Unfilled If the original polygons do not satisfy this description, they can be converted to this form by first running the tessellator with the GLU_TESS_ BOUNDARY_ONLY property turned on. This returns a list of contours satisfying the restriction just described. By creating two tessellator objects, the callbacks from one tessellator can be fed directly as input to the other. Given two or more polygons of the preceding form, CSG operations can be implemented as follows: • UNION—To calculate the union of several contours, draw all input contours as a single polygon. The winding number of each resulting region is the number of original polygons that cover it. The union can be extracted by using the GLU_TESS_WINDING_NONZERO or GLU_TESS_WINDING_POSITIVE winding rule. Note that with the nonzero winding rule, we would get the same result if all contour orientations were reversed. • INTERSECTION—This works only for two contours at a time. Draw a single polygon using two contours. Extract the result using GLU_TESS_ WINDING_ABS_GEQ_TWO. • DIFFERENCE—Suppose you want to compute A diff (B union C union D). Draw a single polygon consisting of the unmodified contours from A, followed by the contours of B, C, and D, with their vertex order reversed. To extract the result, use the GLU_TESS_WINDING_POSITIVE winding rule. (If B, C, and D are the result of a GLU_TESS_BOUNDARY_ ONLY operation, an alternative to reversing the vertex order is to use gluTessNormal() to reverse the sign of the supplied normal.) Other Tessellation Property Routines There are also complementary routines, which work alongside gluTessProperty(). gluGetTessProperty() retrieves the current values of tessellator properties. If the tessellator is being used to generate wireframe outlines instead of filled polygons, gluTessNormal() can be used to determine the winding direction of the tessellated polygons. void gluGetTessProperty(GLUtesselator *tessobj, GLenum property, GLdouble *value); For the tessellation object tessobj, the current value of property is returned to value. Values for property and value are the same as for gluTessProperty(). If you have some knowledge about the location and orientation of the input data, then using gluTessNormal() can increase the speed of the tessellation. For example, if you know that all polygons lie on the xy-plane, call gluTessNormal(tessobj, 0, 0, 1). As stated above, the default normal is (0, 0, 0), and its effect is not immediately obvious. In this case, it is expected that the input data lies approximately in a plane, and a plane is fitted to the vertices, no matter how they are truly connected. The sign of the normal is chosen so that the sum of the signed areas of all input contours is non-negative (where a counterclockwise contour has a positive area). Note that if the input data does not lie approximately in a plane, then projection perpendicular to the computed normal may substantially change the geometry. After all the tessellation properties have been set and the callback actions have been registered, it is finally time to describe the vertices that comprise input contours and tessellate the polygons. Calls to gluTessBeginPolygon() and gluTessEndPolygon() surround the definition of one or more contours. When gluTessEndPolygon() is called, the tessellation algorithm is implemented, and the tessellated polygons are void gluTessNormal(GLUtesselator *tessobj, GLdouble x, GLdouble y, GLdouble z); For the tessellation object tessobj, gluTessNormal() defines a normal vector, which controls the winding direction of generated polygons. Before tessellation, all input data is projected into a plane perpendicular to the normal. Then, all output triangles are oriented counterclockwise, with respect to the normal. (Clockwise orientation can be obtained by reversing the sign of the supplied normal.) The default normal is (0, 0, 0). void gluTessBeginPolygon(GLUtesselator *tessobj, void *user_data); void gluTessEndPolygon(GLUtesselator *tessobj); Begins and ends the specification of a polygon to be tessellated and associates a tessellation object, tessobj, with it. user_data points to a userdefined data structure, which is passed along all the GLU_TESS_*_DATA callback functions that have been bound. generated and rendered. The callback functions and tessellation properties that were bound and set to the tessellation object using gluTessCallback() and gluTessProperty() are used. In practice, a minimum of three vertices is needed for a meaningful contour. In the program tess.c, a portion of which is shown in Example 11-3, two polygons are defined. One polygon is a rectangular contour with a triangular hole inside, and the other is a smooth-shaded, self-intersecting, five-pointed star. For efficiency, both polygons are stored in display lists. The first polygon consists of two contours; the outer one is wound counterclockwise, and the “hole” is wound clockwise. For the second polygon, the star array contains both the coordinate and color data, and its tessellation callback, vertexCallback(), uses both. It is important that each vertex is in a different memory location because the vertex data is not copied by gluTessVertex(); only the pointer (vertex_ data) is saved. A program that reuses the same memory for several vertices may not get the desired result. Note: In gluTessVertex(), it may seem redundant to specify the vertex coordinate data twice, for both the coords and vertex_data parameters; however, both are necessary. coords refers only to the vertex coordinates. vertex_data uses the coordinate data, but may also use other information for each vertex. void gluTessBeginContour(GLUtesselator *tessobj); void gluTessEndContour(GLUtesselator *tessobj); Begins and ends the specification of a closed contour, which is a portion of a polygon. A closed contour consists of zero or more calls to gluTessVertex(), which defines the vertices. The last vertex of each contour is automatically linked to the first. void gluTessVertex(GLUtesselator *tessobj, GLdouble coords[3], void *vertex_data); Specifies a vertex in the current contour for the tessellation object. coords contains the three-dimensional vertex coordinates, and vertex_data is a pointer that’s sent to the callback associated with GLU_TESS_VERTEX or GLU_TESS_VERTEX_DATA. Typically, vertex_data contains vertex coordinates, surface normals, texture coordinates, color information, or whatever else the application may find useful. Deleting a Tessellation Object If you no longer need a tessellation object, you can delete it and free all associated memory with gluDeleteTess(). Tessellation Performance Tips For best performance, remember these rules: • Cache the output of the tessellator in a display list or other user structure. To obtain the post-tessellation vertex coordinates, tessellate the polygons while in feedback mode. (See “Feedback” in Chapter 13.) • Use gluTessNormal() to supply the polygon normal. • Use the same tessellator object to render many polygons, rather than allocate a new tessellator for each one. (In a multithreaded, multiprocessor environment, you may get better performance using several tessellators.) Describing GLU Errors The GLU provides a routine for obtaining a descriptive string for an error code. This routine is not limited to tessellation but is also used for NURBS and quadrics errors, as well as for errors in the base GL. (See “Error void gluDeleteTess(GLUtesselator *tessobj); Deletes the specified tessellation object, tessobj, and frees all associated memory. Handling” in Chapter 14 for information about OpenGL’s error-handling facility.) Backward Compatibility If you are using the 1.0 or 1.1 version of GLU, you have a much less powerful tessellator. The 1.0/1.1 tessellator handles only simple nonconvex polygons or simple polygons containing holes. It does not properly tessellate intersecting contours (no COMBINE callback) or process per-polygon data. The 1.0/1.1 tessellator still works in either GLU 1.2 or 1.3, but its use is no longer recommended. The 1.0/1.1 tessellator has some similarities to the current tessellator. gluNewTess() and gluDeleteTess() are used for both tessellators. The main vertex specification routine remains gluTessVertex(). The callback mechanism is controlled by gluTessCallback(), although only five callback functions can be registered, a subset of the current 12. Here are the prototypes for the 1.0/1.1 tessellator: void gluBeginPolygon(GLUtriangulatorObj *tessobj); void gluNextContour(GLUtriangulatorObj *tessobj, GLenum type); void gluEndPolygon(GLUtriangulatorObj *tessobj); The outermost contour must be specified first, and it does not require an initial call to gluNextContour(). For polygons without holes, only one contour is defined, and gluNextContour() is not used. If a polygon has multiple contours (that is, holes or holes within holes), the contours are specified one after the other, each preceded by gluNextContour(). gluTessVertex() is called for each vertex of a contour. For gluNextContour(), type can be GLU_EXTERIOR, GLU_INTERIOR, GLU_CCW, GLU_CW, or GLU_UNKNOWN. These serve only as hints to the tessellation. If you get them right, the tessellation might go faster. If you get them wrong, they’re ignored, and the tessellation still works. For polygons with holes, one contour is the exterior contour and the other is the interior. The first contour is assumed to be of type GLU_EXTERIOR. Choosing clockwise or counterclockwise orientation is arbitrary in three dimensions; however, there are two different orientations in any plane, and the GLU_CCW and GLU_CW types should be used consistently. Use GLU_UNKNOWN if you don’t have a clue. Quadrics: Rendering Spheres, Cylinders, and Disks 559 It is highly recommended that you convert GLU 1.0/1.1 code to the new tessellation interface for GLU 1.2 by following these steps: 1. Change references to the major data structure type from GLUtriangulatorObj to GLUtesselator. In GLU 1.2, GLUtriangulatorObj and GLUtesselator are defined to be the same type. 2. Convert gluBeginPolygon() to two commands: gluTessBeginPolygon() and gluTessBeginContour(). All contours must be explicitly started, including the first one. 3. Convert gluNextContour() to both gluTessEndContour() and gluTessBeginContour(). You have to end the previous contour before starting the next one. 4. Convert gluEndPolygon() to both gluTessEndContour() and gluTessEndPolygon(). The final contour must be closed. 5. Change references to constants to gluTessCallback(). In GLU 1.2, GLU_BEGIN, GLU_VERTEX, GLU_END, GLU_ERROR, and GLU_EDGE_FLAG are defined as synonyms for GLU_TESS_BEGIN, GLU_TESS_VERTEX, GLU_TESS_END, GLU_TESS_ERROR, and GLU_TESS_EDGE_FLAG.
Up to this point, all of our discussion regarding buffers has focused on the buffers provided by the windowing system, as you requested when you called glutCreateWindow() (and configured by your call to glutInitDisplayMode()). Although you can quite successfully use any technique with just those buffers, quite often various operations require moving data between buffers superfluously. This is where framebuffer objects enter the picture (as part of OpenGL Version 3.0). Using framebuffer objects, you can create our own framebuffers and use their attached renderbuffers to minimize data copies and optimize performance. Framebuffer objects are quite useful for performing off-screen-rendering, updating texture maps, and engaging in buffer ping-ponging (a data-transfer techniques used in GPGPU). The framebuffer that is provided by the windowing system is the only framebuffer that is available to the display system of your graphics server— that is, it is the only one you can see on your screen. It also places restrictions on the use of the buffers that were created when your window opened. By comparison, the framebuffers that your application creates cannot be displayed on your monitor; they support only off-screen rendering. Another difference between window-system-provided framebuffers and framebuffers you create is that those managed by the window system allocate their buffers—color, depth, stencil, and accumulation—when your window is created. When you create an application-managed framebuffer object, you need to create additional renderbuffers that you associate with the framebuffer objects you created. The buffers with the window-systemprovided buffers can never be associated with an application-created framebuffer object, and vice versa. To allocate an application-generated framebuffer object name, you need to call glGenFramebuffers() which will allocate an unused identifier for the framebuffer object. As compared to some other objects within OpenGL (e.g., texture objects and display lists), you always need to use an name returned from glGenFramebuffers(). Allocating a framebuffer object name doesn’t actually create the framebuffer object or allocate any storage for it. Those tasks are handled through a call to glBindFramebuffer(). glBindFramebuffer() operates in a similar manner to many of the other glBind*() routines you’ve seen in OpenGL. The first time it is called for a particular framebuffer, it causes void glGenFramebuffers(GLsize n, GLuint *ids); Allocate n unused framebuffer object names, and return those names in ids. storage for the object to be allocated and initialized. Any subsequent calls will bind the provided framebuffer object name as the active one. As with all of the other objects you have encountered in OpenGL, you can release an application-allocated framebuffer by calling glDeleteFramebuffers(). That function will mark the framebuffer object’s name as unallocated and release any resources associated with the framebuffer object. For completeness, you can determine whether a particular unsigned integer is an application-allocated framebuffer object by calling glIsFramebuffer():. void glBindFramebuffer(GLenum target, GLuint framebuffer); Specifies either a framebuffer for either reading or writing. When target is GL_DRAW_FRAMEBUFFER, framebuffer specifies the destination framebuffer for rendering. Similarly, when target is set to GL_READ_ FRAMEBUFFER, framebuffer specifies the source of read operations. Passing GL_FRAMEBUFFER for target sets both the read and write framebuffer bindings to framebuffer. framebuffer must either be zero, which binds target to the default; a window-system provided framebuffer; or a framebuffer object generated by a call to glGenFramebuffers(). A GL_INVALID_OPERATION error is generated if framebuffer is neither zero nor a valid framebuffer object previously generated by calling glGenFramebuffers(), but not deleted by calling glDeleteFramebuffers(). void glDeleteFramebuffers(GLsize n, const GLuint *ids); Deallocates the n framebuffer objects associated with the names provided in ids. If a framebuffer object is currently bound (i.e., its name was passed to the most recent call to glBindFramebuffer()), and is deleted, the framebuffer target is immediately bound to id zero (the window-system provided framebuffer), and the framebuffer object is released. No errors are generated by glDeleteFramebuffers(). Unused names or zero are simply ignored. GLboolean glIsFramebuffer(GLuint framebuffer); Framebuffer Objects 529 Once a framebuffer object is created, you still can’t do much with it. You need to provide a place for drawing to go and reading to come from; those places are called framebuffer attachments. We’ll discuss those in more detail after we examine renderbuffers, which are one type of buffer you can attach to a framebuffer object. Renderbuffers Renderbuffers are effectively memory managed by OpenGL that contains formatted image data. The data that a renderbuffer holds takes meaning once it is attached to a framebuffer object, assuming that the format of the image buffer matches what OpenGL is expecting to render into (e.g., you can’t render colors into the depth buffer). As with many other buffers in OpenGL, the process of allocating and deleting buffers is similar to what you’ve seen before. To create a new renderbuffer, you would call glGenRenderbuffers(). Likewise, a call to glDeleteRenderbuffers() will release the storage associated with a renderbuffer. Returns GL_TRUE if framebuffer is the name of a framebuffer returned from glGenFramebuffers(). Returns GL_FALSE if framebuffer is zero (the window-system default framebuffer) or a value that’s either unallocated or been deleted by a call to glDeleteFramebuffers(). void glGenRenderbuffers(GLsizei n, GLuint *ids); Allocate n unused renderbuffer object names, and return those names in ids. Names are unused until bound with a call to glBindRenderbuffer(). void glDeleteRenderbuffers(GLsizei n, const GLuint *ids); Deallocates the n renderbuffer objects associated with the names provided in ids. If one of the renderbuffers is currently bound and passed to glDeleteRenderbuffers(), a binding of zero replaces the binding at the current framebuffer attachment point, in addition to the renderbuffer being released. No errors are generated by glDeleteRenderbuffers(). Unused names or zero are simply ignored. Likewise, you can determine whether a name represents a valid renderbuffer by calling glIsRenderbuffer(). Similar to the process of binding a framebuffer object so that you can modify its state, you call glBindRenderbuffer() to affect a renderbuffer’s creation and to modify the state associated with it, which includes the format of the image data that it contains. Creating Renderbuffer Storage When you first call glBindRenderbuffer() with an unused renderbuffer name, the OpenGL server creates a renderbuffer with all its state information set to the default values. In this configuration, no storage has been allocated to store image data. Before you can attach a renderbuffer to a framebuffer and render into it, you need to allocate storage and specify its image format. This is done by calling either glRenderbufferStorage() or glRenderbufferStorageMultisample(). void glIsRenderbuffer(GLuint renderbuffer); Returns GL_TRUE if renderbuffer is the name of a renderbuffer returned from glGenRenderbuffers(). Returns GL_FALSE if renderbuffer is zero (the window-system default framebuffer) or a value that’s either unallocated or been deleted by a call to glDeleteRenderbuffers(). void glBindRenderbuffer(GLenum target, GLuint renderbuffer); Creates a renderbuffer and associates it with the name renderbuffer. target must be GL_RENDERBUFFER. renderbuffer must either be zero, which removes any renderbuffer binding, or a name that was generated by a call to glGenRenderbuffers(); otherwise, a GL_INVALID_OPERATION error will be generated. void glRenderbufferStorage(GLenum target, GLenum internalformat, GLsizei width, GLsizei height); void glRenderbufferStorageMultisample(GLenum target, GLsizei samples, GLenum internalformat, GLsizei width, GLsizei height); Framebuffer Objects 531 Allocates storage for image data for the bound renderbuffer. target must be GL_RENDERBUFFER. For a color-renderable buffer, internalformat must be one of: GL_RED, GL_R8, GL_R16, GL_RG, GL_RG8, GL_RG16, GL_RGB, GL_R3_G3_B2, GL_RGB4, GL_RGB5, GL_RGB8, GL_RGB10, GL_RGB12, GL_RGB16, GL_RGBA, GL_RGBA2, GL_RGBA4, GL_RGB5_A1, GL_RGBA8, GL_RGB10_A2, GL_RGBA12, GL_RGBA16, GL_SRGB, GL_SRGB8, GL_SRGB_ALPHA, GL_SRGB8_ALPHA8,GL_R16F, GL_R32F, GL_RG16F, GL_RG32F, GL_RGB16F, GL_RGB32F, GL_RGBA16F, GL_RGBA32F, GL_R11F_G11F_B10F, GL_RGB9_E5, GL_R8I, GL_R8UI, GL_R16I, GL_R16UI, GL_R32I, GL_R32UI, GL_RG8I, GL_RG8UI, GL_RG16I, GL_RG16UI, GL_RG32I, GL_RG32UI, GL_RGB8I, GL_RGB8UI, GL_RGB16I, GL_RGB16UI, GL_RGB32I, GL_RGB32UI, GL_RGBA8I, GL_RGBA8UI, GL_RGBA16I, GL_RGBA16UI, GL_RGBA32I. OpenGL version 3.1 adds the additional following formats: GL_R8_SNORM, GL_R16_SNORM, GL_RG8_SNORM, GL_RG16_SNORM, GL_RGB8_ SNORM, GL_RGB16_SNORM, GL_RGBA8_SNORM, GL_RGBA16_SNORM. To use a renderbuffer as a depth buffer, it must be depth-renderable, which is specified by setting internalformat to either GL_DEPTH_COMPONENT, GL_DEPTH_COMPONENT16, GL_DEPTH_COMPONENT32, GL_DEPTH_ COMPONENT32, or GL_DEPTH_COMPONENT32F. For use exclusively as a stencil buffer, internalformat should be specified as either GL_STENCIL_INDEX, GL_STENCIL_INDEX1, GL_STENCIL_ INDEX4, GL_STENCIL_INDEX8, or GL_STENCIL_INDEX16. For packed depth-stencil storage, internalformat must be GL_DEPTH_ STENCIL, which allows the renderbuffer to be attached as the depth buffer, stencil buffer, or at the combined depth-stencil attachment point. width and height specify the size of the renderbuffer in pixels, and samples specifies the number of multisample samples per pixel. Setting samples to zero in a call to glRenderbufferStorageMultisample() is identical to calling glRenderbufferStorage(). A GL_INVALID_VALUE is generated if width or height is greater than the value returned when querying GL_MAX_RENDERBUFFER_SIZE, or if samples is greater than the value returned when querying GL_MAX_ SAMPLES. A GL_INVALID_OPERATION is generated if internalformat is a signed- or unsigned-integer format (e.g., a format containing a “I”, or “UI” in its token), and samples is not zero, and the implementation doesn’t support multisampled integer buffers. Finally, if the renderbuffer size and format combined exceed the available memory able to be allocated, then a GL_OUT_OF_MEMORY error is generated. Example 10-6 Creating an RGBA Color Renderbuffer: fbo.c glGenRenderbuffers( 1, &color ); glBindRenderbuffer( GL_RENDERBUFFER, color ); glRenderbufferStorage( GL_RENDERBUFFER, GL_RGBA, 256, 256 ); Once you have created storage for your renderbuffer, you need to attach it to a framebuffer object before you can render into it. Framebuffer Attachments When you render, you can send the results of that rendering to a number of places: • The color buffer to create an image, or even multiple color buffers if you’re using multiple render targets (see “Special Output Values” in Chapter 15) • The depth buffer to store occlusion information • The stencil buffer for storing per-pixel masks to control rendering Each of those buffers represents a framebuffer attachment, to which you can attach suitable image buffers that you later render into, or read from. Currently, there are two types of rendering surfaces you can associate with one of those attachments: renderbuffers and a level of a texture image. Attachment Name Description GL_COLOR_ATTACHMENTi The ith color buffer. i can range from zero (the default color buffer) to GL_MAX_COLOR_ATTACHMENTS–1 GL_DEPTH_ATTACHMENT The depth buffer GL_STENCIL_ATTACHMENT The stencil buffer GL_DEPTH_STENCIL_ATTACHMENT A special attachment for packed depthstencil buffers (which require the renderbuffer to have been allocated as a GL_DEPTH_STENCIL pixel format) We’ll first discuss attaching a renderbuffer to a framebuffer object, which is done by calling glFramebufferRenderbuffer(). In Example 10-7, we create and attach two renderbuffers: one for color, and the other for depth. We then proceed to render, and finally copy the results back to the window-system-provided framebuffer to display the results. You might use this technique to generate frames for a movie rendering offscreen, where you don’t have to worry about the visible framebuffer being corrupted by overlapping windows or someone resizing the window and interrupting rendering. One important point to remember is that you might need to reset the viewport for each framebuffer before rendering, particularly if the size of your application-defined framebuffers differs from the window-system provided framebuffer. Another very common use for framebuffer objects is to update textures dynamically. You might do this to indicate changes in a surface’s appearance (such as bullet holes in a wall in a game) or to update values in a lookup table if you’re doing GPGPU-like computations. In these cases, you bind a level of a texture map as the framebuffer attachment, as compared to a renderbuffer. After rendering, the texture map can be detached from the framebuffer so that it can be used in subsequent rendering. Note: Nothing prevents you from reading from a texture that is simultaneously bound as a framebuffer attachment for writing. In this scenario, called a framebuffer rendering loop, the results are undefined for both operations. That is, the values returned from sampling the bound texture map, as well as the values written into the texture level while bound, will likely be incorrect. void glFramebufferTexture1D(GLenum target, GLenum attachment, GLenum texturetarget, GLuint texture, GLint level); void glFramebufferTexture2D(GLenum target, GLenum attachment, GLenum texturetarget, GLuint texture, GLint level); void glFramebufferTexture3D(GLenum target, GLenum attachment, GLenum texturetarget, GLuint texture, GLint level, GLint layer); Attaches a level of a texture objects as a rendering attachment to a framebuffer object. target must be either GL_READ_FRAMEBUFFER, GL_DRAW_FRAMEBUFFER, or GL_FRAMEBUFFER (which is equivalent to GL_DRAW_FRAMEBUFFER). attachment must be one of the framebuffer attachment points: GL_COLOR_ATTACHMENTi, GL_DEPTH_ ATTACHMENT, GL_STENCIL_ATTACHMENT, or GL_DEPTH_STENCIL_ ATTACHMENT (in which case, the internal format of the texture must be GL_DEPTH_STENCIL). For glFramebufferTexture1D(), texturetarget must be GL_TEXTURE_1D, if texture is not zero. For glFramebufferTexture2D(), texturetarget must be GL_TEXTURE_2D, GL_TEXTURE_RECTANGLE, GL_TEXTURE_CUBE_ MAP_POSITIVE_X, GL_TEXTURE_CUBE_MAP_POSITIVE_Y, GL_ TEXTURE_CUBE_MAP_POSITIVE_Z, GL_TEXTURE_CUBE_MAP_ NEGATIVE_X, GL_TEXTURE_CUBE_MAP_NEGATIVE_Y, GL_TEXTURE_ CUBE_MAP_NEGATIVE_Z, and for glFramebufferTexture3D() texturetarget must be GL_TEXTURE_3D. Similar to the previous example, Example 10-8 demonstrates the process of dynamically updating a texture, using the texture after its update is completed, and then rendering with it later. Framebuffer Completeness Given the myriad of combinations between texture and buffer formats, and between framebuffer attachments, various situations can arise that prevent the completion of rendering when you are using applicationdefined framebuffer objects. After modifying the attachments to a framebuffer object, it’s best to check the framebuffer’s status by calling glCheckFramebufferStatus(). The errors representing the various violations of framebuffer configurations are listed in Table 10-7. Of the listed errors, GL_FRAMEBUFFER_UNSUPPORTED is very implementation dependent, and may be the most complicated to debug. void glFramebufferTextureLayer(GLenum target, GLenum attachment, GLuint texture, GLint level, GLint layer); Attaches a layer of a three-dimensional texture, or a one- or twodimensional array texture as a framebuffer attachment, in a similar manner to glFramebufferTexture3D(). target must be one of GL_READ_FRAMEBUFFER, GL_DRAW_ FRAMEBUFFER, or GL_FRAMEBUFFER (which is equivalent to GL_DRAW_ FRAMEBUFFER). attachment must be one of GL_COLOR_ATTACHMENTi, GL_DEPTH_ATTACHMENT, GL_STENCIL_ATTACHMENT, or GL_DEPTH_ STENCIL_ATTACHMENT. texture must be either zero, indicating that the current binding for the attachment should be released, or a texture object name (as returned from glGenTextures()). level indicates the mipmap level of the texture object, and layer represents which layer of the texture (or array element) should be bound as an attachment. GLenum glCheckFramebufferStatus(GLenum target); Returns one of the framebuffer completeness status enums listed in Table 10-7. target must be one of GL_READ_FRAMEBUFFER, GL_DRAW_ FRAMEBUFFER, or GL_FRAMEBUFFER (which is equivalent to GL_DRAW_ FRAMEBUFFER). If glCheckFramebufferStatus() generates an error, zero is returned. Framebuffer Objects 539 Copying Pixel Rectangles While glCopyPixels() has been the default routine for replicating blocks of pixels since OpenGL Version 1.0, as OpenGL expanded its rendering facilities, a more substantial pixel-copying routine was required. glBlitFramebuffer(), described below, subsumes the operations of glCopyPixels() and glPixelZoom() in a single, enhanced call. glBlitFramebuffer() allows greater pixel filtering during the copy operation, much in the same manner as texture mapping (in fact, the same filtering operations, GL_NEAREST and GL_LINEAR are used during the copy). Additionally, this routine is aware of multisampled buffers, and supports copying between different framebuffers (as controlled by framebuffer objects). Framebuffer Completeness Status Enum Description GL_FRAMEBUFFER_COMPLETE The framebuffer and its attachments match the rendering or reading state required. GL_FRAMEBUFFER_UNDEFINED The bound framebuffer is specified to be the default framebuffer (i.e., glBindFramebuffer() with zero specified as the framebuffer), and the default framebuffer doesn’t exist. GL_FRAMEBUFFER_ INCOMPLETE_ATTACHMENT A necessary attachment to the bound framebuffer is uninitialized GL_FRAMEBUFFER_ INCOMPLETE_MISSING_ ATTACHMENT There are no images (e.g., texture layers or renderbuffers) attached to the framebuffer. GL_FRAMEBUFFER_ INCOMPLETE_DRAW_BUFFER Every drawing buffer (e.g., GL_DRAW_BUFFERi as specified by glDrawBuffers()) has an attachment. GL_FRAMEBUFFER_ INCOMPLETE_READ_BUFFER An attachment exists for the buffer specified for the buffer specified by glReadBuffer(). GL_FRAMEBUFFER_ UNSUPPORTED The combination of images attached to the framebuffer object is incompatible with the requirements of the OpenGL implementation. GL_FRAMEBUFFER_ INCOMPLETE_MULTISAMPLE The number of samples for all images across the framebuffer’s attachments do not match. void glBlitFramebuffer(GLint srcX0, GLint srcY0, GLint srcX1, GLint srcY1, GLint dstX0, GLint dstY0, GLint dstX1, GLint dstY1, GLbitfield buffers, GLenum filter); Copies a rectangle of pixel values from one region of the read framebuffer to another region of the draw framebuffer, potentially resizing, reversing, converting, and filtering the pixels in the process. srcX0, srcY0, srcX1, srcY1 represent the source region where pixels are sourced from, and written to the rectangular region specified by dstX0, dstY0, dstX1, dstY1. buffers is the bitwise-or of GL_COLOR_BUFFER_BIT, GL_DEPTH_BUFFER_ BIT, and GL_STENCIL_BUFFER_BIT, which represent the buffers in which the copy should occur. Finally, filter specifies the method of interpolation done if the two rectangular regions are different sizes, and must be one of GL_NEAREST or GL_LINEAR; no filtering is applied if the regions are the same size. If there are multiple color draw buffers (See “Rendering to Multiple Output Buffers” on page 729), each buffer receives a copy of the source region. If srcX1 < srcX0, or dstX1 < dstX0, the image is reversed in the horizontal direction. Likewise, if srcY1 < srcY0 or dstY1 < dstY0, the image is reverse in the vertical direction. However, If both the source and destination sizes are negative in the same direction, no reversal is done. If the source and destination buffers are of different formats, conversion of the pixel values is done in most situations. However, if the read color buffer is a floating-point format, and any of the write color buffers are not, or vice verse; and if the read color buffer is a signed (unsigned) integer format and not all of the draw buffers are signed (unsigned) integer values, the call will generate a GL_INVALID_OPERATION, and no pixels will be copied. Multisampled buffers also have an effect on the copying of pixels. If the source buffer is multisampled, and the destination is not, the samples are resolved to a single pixel value for the destination buffer. Conversely, if the source buffer is not multisampled, and the destination is, the source pixel’s data is replicated for each sample. Finally, if both buffers are multisampled and the number of samples for each buffer is the same, the samples are copied without modification. However, if the buffers have a different number of samples, no pixels are copied, and a GL_INVALID_ OPERATION error is generated. A GL_INVALID_VALUE error is generated if buffers has other bits set than those permitted, or if filter is other than GL_LINEAR or GL_NEAREST Chapter Objectives After reading this chapter, you’ll be able to do the following: • Render concave filled polygons by first tessellating them into convex polygons, which can be rendered using standard OpenGL routines • Use the OpenGL Utility Library to create quadrics objects to render and model the surfaces of spheres and cylinders, and to tessellate disks (circles) and partial disks (arcs) Note: In OpenGL Version 3.1, some of the techniques and functions described in this chapter—particularly those relating to quadric objects—were likely affected by deprecation. While many of these features can be found in the GLU library, they rely on OpenGL functions that were removed. The OpenGL Library (GL) is designed for low-level operations, both streamlined and accessible to hardware acceleration. The OpenGL Utility Library (GLU) complements the OpenGL library, supporting higher-level operations. Some of the GLU operations are covered in other chapters. Mipmapping (gluBuild*DMipmaps()) and image scaling (gluScaleImage()) are discussed along with other facets of texture mapping in Chapter 9. Several matrix transformation GLU routines (gluOrtho2D(), gluPerspective(), gluLookAt(), gluProject(), gluUnProject(), and gluUnProject4()) are described in Chapter 3. The use of gluPickMatrix() is explained in Chapter 13. The GLU NURBS facilities, which are built atop OpenGL evaluators, are covered in Chapter 12. Only two GLU topics remain: polygon tessellators and quadric surfaces; these topics are discussed in this chapter. To optimize performance, the basic OpenGL renders only convex polygons, but the GLU contains routines for tessellating concave polygons into convex ones, which the basic OpenGL can handle. Where the basic OpenGL operates on simple primitives, such as points, lines, and filled polygons, the GLU can create higher-level objects, such as the surfaces of spheres, cylinders, and cones. This chapter has the following major sections. • “Polygon Tessellation” explains how to tessellate concave polygons into easier-to-render convex polygons. • “Quadrics: Rendering Spheres, Cylinders, and Disks” describes how to generate spheres, cylinders, circles and arcs, including data such as surface normals and texture coordinates. Polygon Tessellation As discussed in “Describing Points, Lines, and Polygons” in Chapter 2, OpenGL can directly display only simple convex polygons. A polygon is simple if the edges intersect only at vertices, there are no duplicate vertices, and exactly two edges meet at any vertex. If your application requires the display of concave polygons, polygons containing holes, or polygons with intersecting edges, these polygons must first be subdivided into simple convex polygons before they can be displayed. Such subdivision is called tessellation, and the GLU provides a collection of routines that perform tessellation. These routines take as input arbitrary contours, which describe hard-to-render polygons, and they return some combination of triangles, triangle meshes, triangle fans, and lines. If you think a polygon may need tessellation, follow these typical steps: 1. Create a new tessellation object with gluNewTess(). 2. Use gluTessCallback() several times to register callback functions to perform operations during the tessellation. The trickiest case for a callback function is when the tessellation algorithm detects an intersection and must call the function registered for the GLU_TESS_ COMBINE callback. 3. Specify tessellation properties by calling gluTessProperty(). The most important property is the winding rule, which determines the regions that should be filled and those that should remain unshaded. 4. Create and render tessellated polygons by specifying the contours of one or more closed polygons. If the data for the object is static, encapsulate the tessellated polygons in a display list. (If you don’t have to recalculate the tessellation repeatedly, using display lists is more efficient.) 5. If you need to tessellate something else, you may reuse your tessellation object. If you are forever finished with your tessellation object, you may delete it with gluDeleteTess(). Note: The tessellator described here was introduced in Version 1.2 of the GLU. If you are using an older version of the GLU, you must use routines described in “Describing GLU Errors” on page 557. To query which version of GLU you have, use gluGetString(GLU_VERSION), which returns a string with your GLU version number. If you don’t seem to have gluGetString() in your GLU, then you have GLU 1.0, which did not yet have the gluGetString() routine. Creating a Tessellation Object As a complex polygon is being described and tessellated, it has associated data, such as the vertices, edges, and callback functions. All this data is tied to a single tessellation object. To perform tessellation, your program first has to create a tessellation object using the routine gluNewTess(). A single tessellation object can be reused for all your tessellations. This object is required only because library routines might need to do their own tessellations, and they should be able to do so without interfering with any tessellation that your program is doing. It might also be useful to have multiple tessellation objects if you want to use different sets of callbacks for different tessellations. A typical program, however, allocates a single tessellation object and uses it for all its tessellations. There’s no real need to free it, because it uses a small amount of memory. On the other hand, it never hurts to be tidy. Tessellation Callback Routines After you create a tessellation object, you must provide a series of callback routines to be called at appropriate times during the tessellation. After specifying the callbacks, you describe the contours of one or more polygons using GLU routines. When the description of the contours is complete, the tessellation facility invokes your callback routines as necessary. Any functions that are omitted are simply not called during the tessellation, and any information they might have returned to your program is lost. All are specified by the single routine gluTessCallback(). GLUtesselator* gluNewTess(void); Creates a new tessellation object and returns a pointer to it. A null pointer is returned if the creation fails. Polygon Tessellation 545 void gluTessCallback(GLUtesselator *tessobj, GLenum type, void (*fn)()); Associates the callback function fn with the tessellation object tessobj. The type of the callback is determined by the parameter type, which can be GLU_TESS_BEGIN, GLU_TESS_BEGIN_DATA, GLU_TESS_EDGE_FLAG, GLU_TESS_EDGE_FLAG_DATA, GLU_TESS_VERTEX, GLU_TESS_VERTEX_ DATA, GLU_TESS_END, GLU_TESS_END_DATA, GLU_TESS_COMBINE, GLU_TESS_COMBINE_DATA, GLU_TESS_ERROR, or GLU_TESS_ERROR_ DATA. The 12 possible callback functions have the following prototypes: GLU_TESS_BEGIN void begin(GLenum type); GLU_TESS_BEGIN_DATA void begin(GLenum type, void *user_data); GLU_TESS_EDGE_FLAG void edgeFlag(GLboolean flag); GLU_TESS_EDGE_FLAG_DATA void edgeFlag(GLboolean flag, void *user_data); GLU_TESS_VERTEX void vertex(void *vertex_data); GLU_TESS_VERTEX_DATA void vertex(void *vertex_data, void *user_data); GLU_TESS_END void end(void); GLU_TESS_END_DATA void end(void *user_data); GLU_TESS_COMBINE void combine( GLdouble coords[3], void*vertex_data[4], GLfloat weight[4], void **outData); GLU_TESS_COMBINE_DATA void combine( GLdouble coords[3], void*vertex_data[4], GLfloat weight[4], void **outData, void *user_data); GLU_TESS_ERROR void error(GLenum errno); GLU_TESS_ERROR_DATA void error(GLenum errno, void *user_data); To change a callback routine, simply call gluTessCallback() with the new routine. To eliminate a callback routine without replacing it with a new one, pass gluTessCallback() a null pointer for the appropriate function. As tessellation proceeds, the callback routines are called in a manner similar to how you use the OpenGL commands glBegin(), glEdgeFlag*(), glVertex*(), and glEnd(). (See “Marking Polygon Boundary Edges” in Chapter 2 for more information about glEdgeFlag*().) The combine callback is used to create new vertices where edges intersect. The error callback is invoked during the tessellation only if something goes wrong. For every tessellator object created, a GLU_TESS_BEGIN callback is invoked with one of four possible parameters: GL_TRIANGLE_FAN, GL_TRIANGLE_ STRIP, GL_TRIANGLES, or GL_LINE_LOOP. When the tessellator decomposes the polygons, the tessellation algorithm decides which type of triangle primitive is most efficient to use. (If the GLU_TESS_BOUNDARY_ONLY property is enabled, then GL_LINE_LOOP is used for rendering.) Since edge flags make no sense in a triangle fan or triangle strip, if there is a callback associated with GLU_TESS_EDGE_FLAG that enables edge flags, the GLU_TESS_BEGIN callback is called only with GL_TRIANGLES. The GLU_TESS_EDGE_FLAG callback works exactly analogously to the OpenGL glEdgeFlag*() call. After the GLU_TESS_BEGIN callback routine is called and before the callback associated with GLU_TESS_END is called, some combination of the GLU_TESS_EDGE_FLAG and GLU_TESS_VERTEX callbacks is invoked (usually by calls to gluTessVertex(), which is described on page 555). The associated edge flags and vertices are interpreted exactly as they are in OpenGL between glBegin() and the matching glEnd(). If something goes wrong, the error callback is passed a GLU error number. A character string describing the error is obtained using the routine gluErrorString(). (See “Describing GLU Errors” on page 557 for more information about this routine.) Example 11-1 shows a portion of tess.c, in which a tessellation object is created and several callbacks are registered. Example 11-1 Registering Tessellation Callbacks: tess.c #ifndef CALLBACK #define CALLBACK #endif Polygon Tessellation 547 /* a portion of init() */ tobj = gluNewTess(); gluTessCallback(tobj, GLU_TESS_VERTEX, glVertex3dv); gluTessCallback(tobj, GLU_TESS_BEGIN, beginCallback); gluTessCallback(tobj, GLU_TESS_END, endCallback); gluTessCallback(tobj, GLU_TESS_ERROR, errorCallback); /* the callback routines registered by gluTessCallback() */ void CALLBACK beginCallback(GLenum which) { glBegin(which); } void CALLBACK endCallback(void) { glEnd(); } void CALLBACK errorCallback(GLenum errorCode) { const GLubyte *estring; estring = gluErrorString(errorCode); fprintf(stderr, "Tessellation Error: %s\n", estring); exit(0); } Note: Type casting of callback functions is tricky, especially if you wish to make code that runs equally well on Microsoft Windows and UNIX. To run on Microsoft Windows, programs that declare callback functions, such as tess.c, need the symbol CALLBACK in the declarations of functions. The trick of using an empty definition for CALLBACK (as demonstrated below) allows the code to run well on both Microsoft Windows and UNIX: #ifndef CALLBACK #define CALLBACK #endif void CALLBACK callbackFunction(...) { .... } In Example 11-1, the registered GLU_TESS_VERTEX callback is simply glVertex3dv(), and only the coordinates at each vertex are passed along. However, if you want to specify more information at every vertex, such as a color value, a surface normal vector, or a texture coordinate, you’ll have to make a more complex callback routine. Example 11-2 shows the start of another tessellated object, further along in program tess.c. The registered function vertexCallback() expects to receive a parameter that is a pointer to six double-length floating-point values: the x-, y-, and z-coordinates and the red, green, and blue color values for that vertex. Example 11-2 Vertex and Combine Callbacks: tess.c /* a different portion of init() */ gluTessCallback(tobj, GLU_TESS_VERTEX, vertexCallback); gluTessCallback(tobj, GLU_TESS_BEGIN, beginCallback); gluTessCallback(tobj, GLU_TESS_END, endCallback); gluTessCallback(tobj, GLU_TESS_ERROR, errorCallback); gluTessCallback(tobj, GLU_TESS_COMBINE, combineCallback); /* new callback routines registered by these calls */ void CALLBACK vertexCallback(GLvoid *vertex) { const GLdouble *pointer; pointer = (GLdouble *) vertex; glColor3dv(pointer+3); glVertex3dv(vertex); } void CALLBACK combineCallback(GLdouble coords[3], GLdouble *vertex_data[4], GLfloat weight[4], GLdouble **dataOut ) { GLdouble *vertex; int i; vertex = (GLdouble *) malloc(6 * sizeof(GLdouble)); vertex[0] = coords[0]; vertex[1] = coords[1]; vertex[2] = coords[2]; for (i = 3; i < 6; i++) vertex[i] = weight[0] * vertex_data[0][i] + weight[1] * vertex_data[1][i] + weight[2] * vertex_data[2][i] + weight[3] * vertex_data[3][i]; *dataOut = vertex; } Polygon Tessellation 549 Example 11-2 also shows the use of the GLU_TESS_COMBINE callback. Whenever the tessellation algorithm examines the input contours, detects an intersection, and decides it must create a new vertex, the GLU_TESS_ COMBINE callback is invoked. The callback is also called when the tessellator decides to merge features of two vertices that are very close to one another. The newly created vertex is a linear combination of up to four existing vertices, referenced by vertex_data[0..3] in Example 11-2. The coefficients of the linear combination are given by weight[0..3]; these weights sum to 1.0. coords gives the location of the new vertex. The registered callback routine must allocate memory for another vertex, perform a weighted interpolation of data using vertex_data and weight, and return the new vertex pointer as dataOut. combineCallback() in Example 11-2 interpolates the RGB color value. The function allocates a six-element array, puts the x-, y-, and z-coordinates in the first three elements, and then puts the weighted average of the RGB color values in the last three elements. User-Specified Data Six kinds of callbacks can be registered. Since there are two versions of each kind of callback, there are 12 callbacks in all. For each kind of callback, there is one with user-specified data and one without. The user-specified data is given by the application to gluTessBeginPolygon() and is then passed, unaltered, to each *DATA callback routine. With GLU_TESS_BEGIN_DATA, the user-specified data may be used for “per-polygon” data. If you specify both versions of a particular callback, the callback with user_data is used, and the other is ignored. Therefore, although there are 12 callbacks, you can have a maximum of six callback functions active at any one time. For instance, Example 11-2 uses smooth shading, so vertexCallback() specifies an RGB color for every vertex. If you want to do lighting and smooth shading, the callback would specify a surface normal for every vertex. However, if you want lighting and flat shading, you might specify only one surface normal for every polygon, not for every vertex. In that case, you might choose to use the GLU_TESS_BEGIN_DATA callback and pass the vertex coordinates and surface normal in the user_data pointer. Tessellation Properties Prior to tessellation and rendering, you may use gluTessProperty() to set several properties to affect the tessellation algorithm. The most important and complicated of these properties is the winding rule, which determines what is considered “interior” and “exterior.” Winding Numbers and Winding Rules For a single contour, the winding number of a point is the signed number of revolutions we make around that point while traveling once around the contour (where a counterclockwise revolution is positive and a clockwise revolution is negative). When there are several contours, the individual winding numbers are summed. This procedure associates a signed integer value with each point in the plane. Note that the winding number is the same for all points in a single region. void gluTessProperty(GLUtesselator *tessobj, GLenum property, GLdouble value); For the tessellation object tessobj, the current value of property is set to value. property is GLU_TESS_BOUNDARY_ONLY, GLU_TESS_TOLERANCE, or GLU_TESS_WINDING_RULE. If property is GLU_TESS_BOUNDARY_ONLY, value is either GL_TRUE or GL_FALSE. When it is set to GL_TRUE, polygons are no longer tessellated into filled polygons; line loops are drawn to outline the contours that separate the polygon interior and exterior. The default value is GL_FALSE. (See gluTessNormal() to see how to control the winding direction of the contours.) If property is GLU_TESS_TOLERANCE, value is a distance used to calculate whether two vertices are close enough together to be merged by the GLU_TESS_COMBINE callback. The tolerance value is multiplied by the largest coordinate magnitude of an input vertex to determine the maximum distance any feature can move as a result of a single merge operation. Feature merging may not be supported by your implementation, and the tolerance value is only a hint. The default tolerance value is zero. The GLU_TESS_WINDING_RULE property determines which parts of the polygon are on the interior and which are on the exterior and should not be filled. value can be GLU_TESS_WINDING_ODD (the default), GLU_ TESS_WINDING_NONZERO, GLU_TESS_WINDING_POSITIVE, GLU_ TESS_WINDING_NEGATIVE, or GLU_TESS_WINDING_ABS_GEQ_TWO. In the set at the left, all three contours are counterclockwise, so each nested interior region adds 1 to the winding number. In the middle set, the two interior contours are drawn clockwise, so the winding number decreases and actually becomes negative. The winding rule classifies a region as inside if its winding number belongs to the chosen category (odd, nonzero, positive, negative, or “absolute value greater than or equal to 2”). The odd and nonzero rules are common ways to define the interior. The positive, negative, and “absolute value t 2” winding rules have some limited use for polygon CSG (computational solid geometry) operations. The program tesswind.c demonstrates the effects of winding rules. The four sets of contours shown in Figure 11-3 are rendered. The user can then cycle through the different winding rule properties to see their effects. For each winding rule, the dark areas represent interiors. Note the effects of clockwise and counterclockwise winding. CSG Uses for Winding Rules GLU_TESS_WINDING_ODD and GLU_TESS_WINDING_NONZERO are the most commonly used winding rules. They work for the most typical cases of shading. The winding rules are also designed for CSG operations, making it easy to find the union, difference, or intersection (Boolean operations) of several contours. 1 2 3 1 0 -1 1 1 1 1 1 2 First, assume that each contour is defined so that the winding number is 0 for each exterior region and 1 for each interior region. (Each contour must not intersect itself.) Under this model, counterclockwise contours define the outer boundary of the polygon, and clockwise contours define holes. Contours may be nested, but a nested contour must be oriented oppositely from the contour that contains it. 1 2 3 1 0 -1 1 2 321 4321 Contours and Winding Numbers Winding Rules Odd Nonzero Positive Negative ABS_GEQ_TWO Unfilled Unfilled Unfilled Unfilled If the original polygons do not satisfy this description, they can be converted to this form by first running the tessellator with the GLU_TESS_ BOUNDARY_ONLY property turned on. This returns a list of contours satisfying the restriction just described. By creating two tessellator objects, the callbacks from one tessellator can be fed directly as input to the other. Given two or more polygons of the preceding form, CSG operations can be implemented as follows: • UNION—To calculate the union of several contours, draw all input contours as a single polygon. The winding number of each resulting region is the number of original polygons that cover it. The union can be extracted by using the GLU_TESS_WINDING_NONZERO or GLU_TESS_WINDING_POSITIVE winding rule. Note that with the nonzero winding rule, we would get the same result if all contour orientations were reversed. • INTERSECTION—This works only for two contours at a time. Draw a single polygon using two contours. Extract the result using GLU_TESS_ WINDING_ABS_GEQ_TWO. • DIFFERENCE—Suppose you want to compute A diff (B union C union D). Draw a single polygon consisting of the unmodified contours from A, followed by the contours of B, C, and D, with their vertex order reversed. To extract the result, use the GLU_TESS_WINDING_POSITIVE winding rule. (If B, C, and D are the result of a GLU_TESS_BOUNDARY_ ONLY operation, an alternative to reversing the vertex order is to use gluTessNormal() to reverse the sign of the supplied normal.) Other Tessellation Property Routines There are also complementary routines, which work alongside gluTessProperty(). gluGetTessProperty() retrieves the current values of tessellator properties. If the tessellator is being used to generate wireframe outlines instead of filled polygons, gluTessNormal() can be used to determine the winding direction of the tessellated polygons. void gluGetTessProperty(GLUtesselator *tessobj, GLenum property, GLdouble *value); For the tessellation object tessobj, the current value of property is returned to value. Values for property and value are the same as for gluTessProperty(). If you have some knowledge about the location and orientation of the input data, then using gluTessNormal() can increase the speed of the tessellation. For example, if you know that all polygons lie on the xy-plane, call gluTessNormal(tessobj, 0, 0, 1). As stated above, the default normal is (0, 0, 0), and its effect is not immediately obvious. In this case, it is expected that the input data lies approximately in a plane, and a plane is fitted to the vertices, no matter how they are truly connected. The sign of the normal is chosen so that the sum of the signed areas of all input contours is non-negative (where a counterclockwise contour has a positive area). Note that if the input data does not lie approximately in a plane, then projection perpendicular to the computed normal may substantially change the geometry. After all the tessellation properties have been set and the callback actions have been registered, it is finally time to describe the vertices that comprise input contours and tessellate the polygons. Calls to gluTessBeginPolygon() and gluTessEndPolygon() surround the definition of one or more contours. When gluTessEndPolygon() is called, the tessellation algorithm is implemented, and the tessellated polygons are void gluTessNormal(GLUtesselator *tessobj, GLdouble x, GLdouble y, GLdouble z); For the tessellation object tessobj, gluTessNormal() defines a normal vector, which controls the winding direction of generated polygons. Before tessellation, all input data is projected into a plane perpendicular to the normal. Then, all output triangles are oriented counterclockwise, with respect to the normal. (Clockwise orientation can be obtained by reversing the sign of the supplied normal.) The default normal is (0, 0, 0). void gluTessBeginPolygon(GLUtesselator *tessobj, void *user_data); void gluTessEndPolygon(GLUtesselator *tessobj); Begins and ends the specification of a polygon to be tessellated and associates a tessellation object, tessobj, with it. user_data points to a userdefined data structure, which is passed along all the GLU_TESS_*_DATA callback functions that have been bound. generated and rendered. The callback functions and tessellation properties that were bound and set to the tessellation object using gluTessCallback() and gluTessProperty() are used. In practice, a minimum of three vertices is needed for a meaningful contour. In the program tess.c, a portion of which is shown in Example 11-3, two polygons are defined. One polygon is a rectangular contour with a triangular hole inside, and the other is a smooth-shaded, self-intersecting, five-pointed star. For efficiency, both polygons are stored in display lists. The first polygon consists of two contours; the outer one is wound counterclockwise, and the “hole” is wound clockwise. For the second polygon, the star array contains both the coordinate and color data, and its tessellation callback, vertexCallback(), uses both. It is important that each vertex is in a different memory location because the vertex data is not copied by gluTessVertex(); only the pointer (vertex_ data) is saved. A program that reuses the same memory for several vertices may not get the desired result. Note: In gluTessVertex(), it may seem redundant to specify the vertex coordinate data twice, for both the coords and vertex_data parameters; however, both are necessary. coords refers only to the vertex coordinates. vertex_data uses the coordinate data, but may also use other information for each vertex. void gluTessBeginContour(GLUtesselator *tessobj); void gluTessEndContour(GLUtesselator *tessobj); Begins and ends the specification of a closed contour, which is a portion of a polygon. A closed contour consists of zero or more calls to gluTessVertex(), which defines the vertices. The last vertex of each contour is automatically linked to the first. void gluTessVertex(GLUtesselator *tessobj, GLdouble coords[3], void *vertex_data); Specifies a vertex in the current contour for the tessellation object. coords contains the three-dimensional vertex coordinates, and vertex_data is a pointer that’s sent to the callback associated with GLU_TESS_VERTEX or GLU_TESS_VERTEX_DATA. Typically, vertex_data contains vertex coordinates, surface normals, texture coordinates, color information, or whatever else the application may find useful. Deleting a Tessellation Object If you no longer need a tessellation object, you can delete it and free all associated memory with gluDeleteTess(). Tessellation Performance Tips For best performance, remember these rules: • Cache the output of the tessellator in a display list or other user structure. To obtain the post-tessellation vertex coordinates, tessellate the polygons while in feedback mode. (See “Feedback” in Chapter 13.) • Use gluTessNormal() to supply the polygon normal. • Use the same tessellator object to render many polygons, rather than allocate a new tessellator for each one. (In a multithreaded, multiprocessor environment, you may get better performance using several tessellators.) Describing GLU Errors The GLU provides a routine for obtaining a descriptive string for an error code. This routine is not limited to tessellation but is also used for NURBS and quadrics errors, as well as for errors in the base GL. (See “Error void gluDeleteTess(GLUtesselator *tessobj); Deletes the specified tessellation object, tessobj, and frees all associated memory. Handling” in Chapter 14 for information about OpenGL’s error-handling facility.) Backward Compatibility If you are using the 1.0 or 1.1 version of GLU, you have a much less powerful tessellator. The 1.0/1.1 tessellator handles only simple nonconvex polygons or simple polygons containing holes. It does not properly tessellate intersecting contours (no COMBINE callback) or process per-polygon data. The 1.0/1.1 tessellator still works in either GLU 1.2 or 1.3, but its use is no longer recommended. The 1.0/1.1 tessellator has some similarities to the current tessellator. gluNewTess() and gluDeleteTess() are used for both tessellators. The main vertex specification routine remains gluTessVertex(). The callback mechanism is controlled by gluTessCallback(), although only five callback functions can be registered, a subset of the current 12. Here are the prototypes for the 1.0/1.1 tessellator: void gluBeginPolygon(GLUtriangulatorObj *tessobj); void gluNextContour(GLUtriangulatorObj *tessobj, GLenum type); void gluEndPolygon(GLUtriangulatorObj *tessobj); The outermost contour must be specified first, and it does not require an initial call to gluNextContour(). For polygons without holes, only one contour is defined, and gluNextContour() is not used. If a polygon has multiple contours (that is, holes or holes within holes), the contours are specified one after the other, each preceded by gluNextContour(). gluTessVertex() is called for each vertex of a contour. For gluNextContour(), type can be GLU_EXTERIOR, GLU_INTERIOR, GLU_CCW, GLU_CW, or GLU_UNKNOWN. These serve only as hints to the tessellation. If you get them right, the tessellation might go faster. If you get them wrong, they’re ignored, and the tessellation still works. For polygons with holes, one contour is the exterior contour and the other is the interior. The first contour is assumed to be of type GLU_EXTERIOR. Choosing clockwise or counterclockwise orientation is arbitrary in three dimensions; however, there are two different orientations in any plane, and the GLU_CCW and GLU_CW types should be used consistently. Use GLU_UNKNOWN if you don’t have a clue. Quadrics: Rendering Spheres, Cylinders, and Disks 559 It is highly recommended that you convert GLU 1.0/1.1 code to the new tessellation interface for GLU 1.2 by following these steps: 1. Change references to the major data structure type from GLUtriangulatorObj to GLUtesselator. In GLU 1.2, GLUtriangulatorObj and GLUtesselator are defined to be the same type. 2. Convert gluBeginPolygon() to two commands: gluTessBeginPolygon() and gluTessBeginContour(). All contours must be explicitly started, including the first one. 3. Convert gluNextContour() to both gluTessEndContour() and gluTessBeginContour(). You have to end the previous contour before starting the next one. 4. Convert gluEndPolygon() to both gluTessEndContour() and gluTessEndPolygon(). The final contour must be closed. 5. Change references to constants to gluTessCallback(). In GLU 1.2, GLU_BEGIN, GLU_VERTEX, GLU_END, GLU_ERROR, and GLU_EDGE_FLAG are defined as synonyms for GLU_TESS_BEGIN, GLU_TESS_VERTEX, GLU_TESS_END, GLU_TESS_ERROR, and GLU_TESS_EDGE_FLAG. Please respond using only information provided in the context block. If the information needed to answer the question is not within the context block, state that you cannot answer. I am interested in what context one would use the glGenFrameBuffers() function. What does this function do exactly? Please include any extra information to help understand the function.
You can only respond to the prompt using the information in the context block and no other sources.
List the pros and cons for Nestle in regards to this deal.
Nestlé and Starbucks close deal for the perpetual global license of Starbucks Consumer Packaged Goods and Foodservice products Vevey and Seattle, 28 August 2018 – Nestlé and Starbucks Corporation today announced the closing of the deal granting Nestlé the perpetual rights to market Starbucks Consumer Packaged Goods and Foodservice products globally, outside of the company’s coffee shops. Through the alliance, the two companies will work closely together on the existing Starbucks range of roast and ground coffee, whole beans as well as instant and portioned coffee. The alliance will also capitalize on the experience and capabilities of both companies to work on innovation with the goal of enhancing its product offerings for coffee lovers globally. “This partnership demonstrates our growth agenda in action, giving Nestlé an unparalleled position in the coffee business with a full suite of innovative brands. With Starbucks, Nescafé and Nespresso we bring together the world’s most iconic coffee brands,” said Mark Schneider, Nestlé CEO. “The outstanding collaboration between the two teams resulted in a swift completion of this agreement, which will pave the way to capture further growth opportunities,” he added. The agreement significantly strengthens Nestlé’s coffee portfolio in the North American premium roast and ground and portioned coffee business. It also unlocks global expansion in grocery and food service for the Starbucks brand, utilizing the global reach of Nestlé. “This global coffee alliance with Nestlé is a significant strategic milestone for the growth of Starbucks,” said Kevin Johnson, president and ceo of Starbucks. “Bringing together the world’s leading coffee retailer, the world’s largest food and beverage company, and the world’s largest and fast-growing installed base of at-home and single-serve coffee machines helps us amplify the Starbucks brand around the world while delivering long-term value creation for our shareholders.” Approximately 500 Starbucks employees in the United States and Europe will join the Nestlé family, with the majority based in Seattle and London. The international expansion of the business will be led from Nestlé’s global headquarters in Vevey, Switzerland. The agreement covers Starbucks packaged coffee and tea brands, such as Starbucks®, Seattle’s Best Coffee®, TeavanaTM/MC, Starbucks VIA® Instant, Torrefazione Italia® coffee and Starbucks-branded
You can only respond to the prompt using the information in the context block and no other sources. Nestlé and Starbucks close deal for the perpetual global license of Starbucks Consumer Packaged Goods and Foodservice products Vevey and Seattle, 28 August 2018 – Nestlé and Starbucks Corporation today announced the closing of the deal granting Nestlé the perpetual rights to market Starbucks Consumer Packaged Goods and Foodservice products globally, outside of the company’s coffee shops. Through the alliance, the two companies will work closely together on the existing Starbucks range of roast and ground coffee, whole beans as well as instant and portioned coffee. The alliance will also capitalize on the experience and capabilities of both companies to work on innovation with the goal of enhancing its product offerings for coffee lovers globally. “This partnership demonstrates our growth agenda in action, giving Nestlé an unparalleled position in the coffee business with a full suite of innovative brands. With Starbucks, Nescafé and Nespresso we bring together the world’s most iconic coffee brands,” said Mark Schneider, Nestlé CEO. “The outstanding collaboration between the two teams resulted in a swift completion of this agreement, which will pave the way to capture further growth opportunities,” he added. The agreement significantly strengthens Nestlé’s coffee portfolio in the North American premium roast and ground and portioned coffee business. It also unlocks global expansion in grocery and food service for the Starbucks brand, utilizing the global reach of Nestlé. “This global coffee alliance with Nestlé is a significant strategic milestone for the growth of Starbucks,” said Kevin Johnson, president and ceo of Starbucks. “Bringing together the world’s leading coffee retailer, the world’s largest food and beverage company, and the world’s largest and fast-growing installed base of at-home and single-serve coffee machines helps us amplify the Starbucks brand around the world while delivering long-term value creation for our shareholders.” Approximately 500 Starbucks employees in the United States and Europe will join the Nestlé family, with the majority based in Seattle and London. The international expansion of the business will be led from Nestlé’s global headquarters in Vevey, Switzerland. The agreement covers Starbucks packaged coffee and tea brands, such as Starbucks®, Seattle’s Best Coffee®, TeavanaTM/MC, Starbucks VIA® Instant, Torrefazione Italia® coffee and Starbucks-branded List the pros and cons for Nestle in regards to this deal.
Answer the question based solely on the information provided in the passage. Do not use any external knowledge or resources. [user request] [context document]
Summarize this article so that a college-level student would be able to understand the important concepts using scientific language. You should write your summary in the format of a lecture on autonomic dysfunction. Do not mention orthostatic hypotension and focus more on the associated tachycardia. Emphasize the pathophysiology and the effect autonomic dysfunction has on various regions of the body.
Acquired Autoimmune: Guillain-Barre, Autoimmune autonomic ganglionopathy, Lambert-Eaton myasthenic syndrome, rheumatoid arthritis, Sjogren, systemic lupus erythematosus Abnormal reflex responses in carotid sinus hypersensitivity, vasovagal syncope, and other neuro-meditated syncopes; and probably in postural tachycardia syndrome (PoTS) Abnormal sweating responses, as in generalized or focal hyperhidrosis, are related to excessive activation. Metabolic/ Nutritional: Diabetes mellitus, vitamin B12 deficiency Degenerative neurologic diseases: Parkinson disease, multiple system atrophy/Shy-Drager syndrome, pure autonomic failure presenting or suffering from orthostatic hypotension, fixed heart rate responses Infections: Botulism, Chagas disease, human immunodeficiency virus (HIV), leprosy, Lyme disease, tetanus Neoplasia: Brain tumors, paraneoplastic syndromes Pharmacologic effects of several drugs that interfere with normal autonomic function and provoke symptoms include alpha- and beta-blocker-triggered orthostatic hypotension Toxin/drug-induced: Alcohol, amiodarone, chemotherapy Traumatic or tumoral spinal cord injuries at different levels and presenting with the so-called autonomic dysreflexia Uremic neuropathy/chronic liver diseases Medications That Exacerbate Orthostatic Hypotension Diuretics: furosemide, torsemide, thiazide Nitric oxide-mediated vasodilators: nitroglycerine, hydralazine, sildenafil Adrenergic antagonists: Alpha-1-adrenergic blockers: alfuzosin, terazosin Beta-adrenergic blockers: propranolol Alpha -2-adrenergic agonists: tizanidine, clonidine Renin-angiotensin system inhibitors: lisinopril, valsartan Dopamine antagonists: Phenothiazines: chlorpromazine Atypical antipsychotics: olanzapine, risperidone, quetiapine Calcium channel blockers: verapamil, diltiazem Selective serotonin receptor reuptake inhibitors: paroxetine Antidepressants: trazodone, amitriptyline Go to: Epidemiology Autonomic dysfunction, taken as a whole, is not infrequent. The most common autonomic dysfunction occurs in the cardiovascular control sphere and consists of an abnormal vasovagal response that leads to syncope. Other common manifestations are related to postural tachycardia syndrome (POTS) or changes seen with Parkinson disease and other parkinsonisms. Compared to other areas of autonomic control, urinary incontinence, as observed in multiple sclerosis and other nervous system disorders, is unspecific but not rare. Some symptoms of autonomic disturbance, such as the facial vasomotor and ocular symptoms in trigeminal autonomic headaches, are of secondary significance but help in diagnosis.[14][15][16][17] Orthostatic hypotension occurs in patients with neurodegenerative disorders such as Parkinson disease, multiple system atrophy, pure autonomic failure, and in individuals with ganglionopathies that affect autonomic nerves and peripheral neuropathy. The prevalence of orthostatic hypotension is proportional to age, and it is more common in institutionalized than community-dwelling elderly[18]. POTS is more prevalent in women. Syncope is highly prevalent in the general population, and the majority of syncope is due to reflex syncope. The frequency of reflex syncope is higher during adolescence and in individuals over 55 years. Carotid sinus hypersensitivity, defecation, and cough syncope occur almost exclusively in the elderly population.[18] Go to: Pathophysiology Pathophysiology in ANS depends upon the affected area. Both anatomically related, as well as isolated regions, can be affected. In the cardiovascular system, three pathophysiological syndromes are typically associated with chronic dysfunction of the ANS. These are Postural orthostatic tachycardia syndrome (POTS), orthostatic hypotension with supine hypertension, and reflex cardiovascular syndromes. Hyperhidrosis and hypohidrosis are the main features of temperature control. Fixed mydriasis and myosis, also known as Adie's pupil and Horner syndrome in the eye, are also seen. Autonomic dysfunction may result from any disease that affects the peripheral or central components of ANS. Primary autonomic dysfunction involves primary (idiopathic) degeneration of autonomic postganglionic fibers without other neurologic abnormalities. Orthostatic hypotension is associated with autonomic dysfunction and motor and cerebellar abnormalities in diseases involving a central degenerative process, as described in the Shy–Drager syndrome. A central degenerative disease process involving preganglionic neuronal degeneration, presenting with orthostatic hypotension and typical parkinsonian symptoms, has been described.[19] Orthostatic hypotension is defined as a sustained reduction of systolic blood pressure of at least 20 mmHg or diastolic blood pressure of 10 mmHg within three minutes of standing or head-up tilt to at least 60 degrees on the tilt table. The magnitude of fall in blood pressure depends on baseline blood pressure. In patients with supine hypertension, a reduction of 30 mmHg in systolic blood pressure may be an appropriate criterion for orthostatic hypotension. Immediately upon standing, gravitationally mediated redistribution of the blood volume and pooling of 300 to 800 ml of blood in lower limbs and splanchnic venous capacitance system occurs, which leads to a reduction of venous return and cardiac filling pressure. During standing, contraction of skeletal muscles of the lower body prevents excessive pooling and increases venous return to the heart. Orthostatic hypotension is caused by an excessive fall of cardiac output or by inadequate or defective vasoconstrictor mechanisms. Neurally mediated (reflex) syncope includes vasovagal, carotid sinus, situational (cough, swallowing, micturition) syncope. It refers to a diverse group of conditions in which there is a relatively sudden change in ANS activity leading to a drop in blood pressure, heart rate, and cerebral perfusion. Neurally mediated syncope is best understood as a reflex with afferent, central, and efferent pathways, and the use of 'neurocardiogenic syncope' should be abandoned because the origin of the reflex is rarely in the heart. Postural tachycardia syndrome (POTS) is defined as a sustained heart rate increment of 30 beats per minute within 10 minutes of standing or head-up tilt in the absence of orthostatic hypotension. For individuals of ages 12 to 19 years, the requirement is at least 40 beats per minute. POTS may be accompanied by symptoms of autonomic overactivity and cerebral hypoperfusion that are relieved by recumbency. The pathophysiology and etiology of POTS are unknown but are likely heterogeneous. POTS is associated with recent viral illness, chronic fatigue syndrome, deconditioning, and limited or restricted autonomic neuropathy.[18] Diabetic neuropathy is a kind of nerve pathology that may occur for those with diabetes mellitus. Hyperglycemia interferes with a nerve's ability to send signals and weakens the walls of the vasa nervorum blood vessels that supply nerves with nutrients and oxygen. Diabetic neuropathy can affect the nerves of the ANS, especially general visceral afferent (GVA) fibers, resulting in gastroparesis and decreased blood pressure regulation.[20] GVA fibers affected by diabetic neuropathy reduce the response of their corresponding general visceral efferent (GVE). Parkinson disease is a progressive neurodegenerative disease characterized by bradykinesia and hypokinesia combined with rest tremor and rigidity. Constipation, dysphagia, sialorrhea, rhinorrhea, urinary difficulties, and sexual dysfunction are the common nonmotor problems related to autonomic dysfunction in Parkinson disease.[21][22] These signs and symptoms are also present in multiple system atrophy (MSA), making it hard to distinguish between the two disorders. However, the autonomic symptoms in MSA are generally more severe than in Parkinson disease. As the disease progresses, MSA tends to be less responsive to levodopa and is often associated with pyramidal and cerebellar findings.
Answer the question based solely on the information provided in the passage. Do not use any external knowledge or resources. Summarize this article so that a college-level student would be able to understand the important concepts using scientific language. You should write your summary in the format of a lecture on autonomic dysfunction. Do not mention orthostatic hypotension and focus more on the associated tachycardia. Emphasize the pathophysiology and the effect autonomic dysfunction has on various regions of the body. Acquired Autoimmune: Guillain-Barre, Autoimmune autonomic ganglionopathy, Lambert-Eaton myasthenic syndrome, rheumatoid arthritis, Sjogren, systemic lupus erythematosus Abnormal reflex responses in carotid sinus hypersensitivity, vasovagal syncope, and other neuro-meditated syncopes; and probably in postural tachycardia syndrome (PoTS) Abnormal sweating responses, as in generalized or focal hyperhidrosis, are related to excessive activation. Metabolic/ Nutritional: Diabetes mellitus, vitamin B12 deficiency Degenerative neurologic diseases: Parkinson disease, multiple system atrophy/Shy-Drager syndrome, pure autonomic failure presenting or suffering from orthostatic hypotension, fixed heart rate responses Infections: Botulism, Chagas disease, human immunodeficiency virus (HIV), leprosy, Lyme disease, tetanus Neoplasia: Brain tumors, paraneoplastic syndromes Pharmacologic effects of several drugs that interfere with normal autonomic function and provoke symptoms include alpha- and beta-blocker-triggered orthostatic hypotension Toxin/drug-induced: Alcohol, amiodarone, chemotherapy Traumatic or tumoral spinal cord injuries at different levels and presenting with the so-called autonomic dysreflexia Uremic neuropathy/chronic liver diseases Medications That Exacerbate Orthostatic Hypotension Diuretics: furosemide, torsemide, thiazide Nitric oxide-mediated vasodilators: nitroglycerine, hydralazine, sildenafil Adrenergic antagonists: Alpha-1-adrenergic blockers: alfuzosin, terazosin Beta-adrenergic blockers: propranolol Alpha -2-adrenergic agonists: tizanidine, clonidine Renin-angiotensin system inhibitors: lisinopril, valsartan Dopamine antagonists: Phenothiazines: chlorpromazine Atypical antipsychotics: olanzapine, risperidone, quetiapine Calcium channel blockers: verapamil, diltiazem Selective serotonin receptor reuptake inhibitors: paroxetine Antidepressants: trazodone, amitriptyline Go to: Epidemiology Autonomic dysfunction, taken as a whole, is not infrequent. The most common autonomic dysfunction occurs in the cardiovascular control sphere and consists of an abnormal vasovagal response that leads to syncope. Other common manifestations are related to postural tachycardia syndrome (POTS) or changes seen with Parkinson disease and other parkinsonisms. Compared to other areas of autonomic control, urinary incontinence, as observed in multiple sclerosis and other nervous system disorders, is unspecific but not rare. Some symptoms of autonomic disturbance, such as the facial vasomotor and ocular symptoms in trigeminal autonomic headaches, are of secondary significance but help in diagnosis.[14][15][16][17] Orthostatic hypotension occurs in patients with neurodegenerative disorders such as Parkinson disease, multiple system atrophy, pure autonomic failure, and in individuals with ganglionopathies that affect autonomic nerves and peripheral neuropathy. The prevalence of orthostatic hypotension is proportional to age, and it is more common in institutionalized than community-dwelling elderly[18]. POTS is more prevalent in women. Syncope is highly prevalent in the general population, and the majority of syncope is due to reflex syncope. The frequency of reflex syncope is higher during adolescence and in individuals over 55 years. Carotid sinus hypersensitivity, defecation, and cough syncope occur almost exclusively in the elderly population.[18] Go to: Pathophysiology Pathophysiology in ANS depends upon the affected area. Both anatomically related, as well as isolated regions, can be affected. In the cardiovascular system, three pathophysiological syndromes are typically associated with chronic dysfunction of the ANS. These are Postural orthostatic tachycardia syndrome (POTS), orthostatic hypotension with supine hypertension, and reflex cardiovascular syndromes. Hyperhidrosis and hypohidrosis are the main features of temperature control. Fixed mydriasis and myosis, also known as Adie's pupil and Horner syndrome in the eye, are also seen. Autonomic dysfunction may result from any disease that affects the peripheral or central components of ANS. Primary autonomic dysfunction involves primary (idiopathic) degeneration of autonomic postganglionic fibers without other neurologic abnormalities. Orthostatic hypotension is associated with autonomic dysfunction and motor and cerebellar abnormalities in diseases involving a central degenerative process, as described in the Shy–Drager syndrome. A central degenerative disease process involving preganglionic neuronal degeneration, presenting with orthostatic hypotension and typical parkinsonian symptoms, has been described.[19] Orthostatic hypotension is defined as a sustained reduction of systolic blood pressure of at least 20 mmHg or diastolic blood pressure of 10 mmHg within three minutes of standing or head-up tilt to at least 60 degrees on the tilt table. The magnitude of fall in blood pressure depends on baseline blood pressure. In patients with supine hypertension, a reduction of 30 mmHg in systolic blood pressure may be an appropriate criterion for orthostatic hypotension. Immediately upon standing, gravitationally mediated redistribution of the blood volume and pooling of 300 to 800 ml of blood in lower limbs and splanchnic venous capacitance system occurs, which leads to a reduction of venous return and cardiac filling pressure. During standing, contraction of skeletal muscles of the lower body prevents excessive pooling and increases venous return to the heart. Orthostatic hypotension is caused by an excessive fall of cardiac output or by inadequate or defective vasoconstrictor mechanisms. Neurally mediated (reflex) syncope includes vasovagal, carotid sinus, situational (cough, swallowing, micturition) syncope. It refers to a diverse group of conditions in which there is a relatively sudden change in ANS activity leading to a drop in blood pressure, heart rate, and cerebral perfusion. Neurally mediated syncope is best understood as a reflex with afferent, central, and efferent pathways, and the use of 'neurocardiogenic syncope' should be abandoned because the origin of the reflex is rarely in the heart. Postural tachycardia syndrome (POTS) is defined as a sustained heart rate increment of 30 beats per minute within 10 minutes of standing or head-up tilt in the absence of orthostatic hypotension. For individuals of ages 12 to 19 years, the requirement is at least 40 beats per minute. POTS may be accompanied by symptoms of autonomic overactivity and cerebral hypoperfusion that are relieved by recumbency. The pathophysiology and etiology of POTS are unknown but are likely heterogeneous. POTS is associated with recent viral illness, chronic fatigue syndrome, deconditioning, and limited or restricted autonomic neuropathy.[18] Diabetic neuropathy is a kind of nerve pathology that may occur for those with diabetes mellitus. Hyperglycemia interferes with a nerve's ability to send signals and weakens the walls of the vasa nervorum blood vessels that supply nerves with nutrients and oxygen. Diabetic neuropathy can affect the nerves of the ANS, especially general visceral afferent (GVA) fibers, resulting in gastroparesis and decreased blood pressure regulation.[20] GVA fibers affected by diabetic neuropathy reduce the response of their corresponding general visceral efferent (GVE). Parkinson disease is a progressive neurodegenerative disease characterized by bradykinesia and hypokinesia combined with rest tremor and rigidity. Constipation, dysphagia, sialorrhea, rhinorrhea, urinary difficulties, and sexual dysfunction are the common nonmotor problems related to autonomic dysfunction in Parkinson disease.[21][22] These signs and symptoms are also present in multiple system atrophy (MSA), making it hard to distinguish between the two disorders. However, the autonomic symptoms in MSA are generally more severe than in Parkinson disease. As the disease progresses, MSA tends to be less responsive to levodopa and is often associated with pyramidal and cerebellar findings. https://www.ncbi.nlm.nih.gov/books/NBK430888/
System Instructions: * Use only information provided to you: do not rely on external sources or prior knowledge. * Respond with a bulleted list. * Do not include any filler or explanations. * If you are unable to find the information requested within the context provided, say so instead of trying to answer.
Question: Find and summarize the most common symptoms of narcolepsy, using two or three sentences each.
Context: Narcolepsy Symptoms Excessive Daytime Sleepiness Excessive daytime sleepiness, or EDS, is the inability to stay awake and alert during the day, resulting in unintended lapses into drowsiness or sleep. • Every patient with narcolepsy has EDS, and it is often the first symptom. • When describing this symptom, patients may say that they: – Have a hard time staying awake while doing everyday things – Are tired or fatigued – Have trouble concentrating or staying focused – Are forgetful or have poor memory – Have mood changes or get upset easily • EDS may be disabling because of the high risk of falling asleep—or having a “sleep attack”—while you are doing everyday things, such as: – Sitting and reading – Riding in a car – Stopped in traffic while driving a car – Talking to someone • You may take daytime naps, but these naps likely only help you feel refreshed for a short period of time. Cataplexy Cataplexy is a sudden, brief loss of muscle strength or control triggered by strong emotions. • Cataplexy may cause a sudden feeling of weakness. • Cataplectic attacks are not the same in everyone. – Usually, attacks affect only certain muscle groups, such as the arms, neck, or face. You may not even recognize these subtle attacks, but your friends or family may notice them. – Less commonly, you can have weakness in your whole body and fall to the ground. – The type of cataplexy attack experienced by one person is usually the same (eg, head dropping). • Attacks are often triggered by: – Sudden, strong emotions such as happiness, laughter, surprise, or anger – Hearing or telling a joke • These attacks usually last for only a short time—from a few seconds to several minutes. • All people with cataplexy do not have the same number of attacks. For some people, they are rare. Other people have many attacks each day. Sleep Paralysis Sleep paralysis is the brief inability to move or speak while falling asleep or waking up. This can be a distressing or terrifying experience. During sleep paralysis, you can experience: • Eye fluttering • Moaning • Limb numbness or tingling • Rapid or strong heartbeat • Sweating • Sensation of struggling to move • Chest pressure • Difficulty breathing Episodes usually last seconds to minutes and can end by themselves or from being touched, shaken, or spoken to, or after trying hard to move. Sleep paralysis sometimes accompanies hypnagogic or hypnopompic hallucinations, other symptoms of narcolepsy. Disrupted Nighttime Sleep It’s normal to wake up during the night once in a while. But when you have disrupted sleep associated with narcolepsy, it means you often fall asleep quickly but wake up frequently throughout the night. • With disrupted nighttime sleep, you may: – Fall asleep easily but have trouble staying asleep for long periods of time – Report poor-quality sleep Hypnagogic/Hypnopompic Hallucinations Hypnagogic hallucinations are vivid dreamlike experiences that occur while you are falling asleep. When they occur while waking up, they are called hypnopompic hallucinations. • These hallucinations may be mistaken for nightmares. • These hallucinations may also occur with “sleep paralysis.” • You may have experiences such as: – Hearing sounds or words when drifting off to sleep – Having a strong feeling that someone or something is in the room – Seeing people or creatures near you or even lying in your bed • These events are usually frightening or disturbing. • Anyone can have one of these hallucinations at some time in his or her life. However, if you have them regularly, it could be a sign of narcolepsy.
System Instructions: * Use only information provided to you: do not rely on external sources or prior knowledge. * Respond with a bulleted list. * Do not include any filler or explanations. * If you are unable to find the information requested within the context provided, say so instead of trying to answer. Context: Narcolepsy Symptoms Excessive Daytime Sleepiness Excessive daytime sleepiness, or EDS, is the inability to stay awake and alert during the day, resulting in unintended lapses into drowsiness or sleep. • Every patient with narcolepsy has EDS, and it is often the first symptom. • When describing this symptom, patients may say that they: – Have a hard time staying awake while doing everyday things – Are tired or fatigued – Have trouble concentrating or staying focused – Are forgetful or have poor memory – Have mood changes or get upset easily • EDS may be disabling because of the high risk of falling asleep—or having a “sleep attack”—while you are doing everyday things, such as: – Sitting and reading – Riding in a car – Stopped in traffic while driving a car – Talking to someone • You may take daytime naps, but these naps likely only help you feel refreshed for a short period of time. Cataplexy Cataplexy is a sudden, brief loss of muscle strength or control triggered by strong emotions. • Cataplexy may cause a sudden feeling of weakness. • Cataplectic attacks are not the same in everyone. – Usually, attacks affect only certain muscle groups, such as the arms, neck, or face. You may not even recognize these subtle attacks, but your friends or family may notice them. – Less commonly, you can have weakness in your whole body and fall to the ground. – The type of cataplexy attack experienced by one person is usually the same (eg, head dropping). • Attacks are often triggered by: – Sudden, strong emotions such as happiness, laughter, surprise, or anger – Hearing or telling a joke • These attacks usually last for only a short time—from a few seconds to several minutes. • All people with cataplexy do not have the same number of attacks. For some people, they are rare. Other people have many attacks each day. Sleep Paralysis Sleep paralysis is the brief inability to move or speak while falling asleep or waking up. This can be a distressing or terrifying experience. During sleep paralysis, you can experience: • Eye fluttering • Moaning • Limb numbness or tingling • Rapid or strong heartbeat • Sweating • Sensation of struggling to move • Chest pressure • Difficulty breathing Episodes usually last seconds to minutes and can end by themselves or from being touched, shaken, or spoken to, or after trying hard to move. Sleep paralysis sometimes accompanies hypnagogic or hypnopompic hallucinations, other symptoms of narcolepsy. Disrupted Nighttime Sleep It’s normal to wake up during the night once in a while. But when you have disrupted sleep associated with narcolepsy, it means you often fall asleep quickly but wake up frequently throughout the night. • With disrupted nighttime sleep, you may: – Fall asleep easily but have trouble staying asleep for long periods of time – Report poor-quality sleep Hypnagogic/Hypnopompic Hallucinations Hypnagogic hallucinations are vivid dreamlike experiences that occur while you are falling asleep. When they occur while waking up, they are called hypnopompic hallucinations. • These hallucinations may be mistaken for nightmares. • These hallucinations may also occur with “sleep paralysis.” • You may have experiences such as: – Hearing sounds or words when drifting off to sleep – Having a strong feeling that someone or something is in the room – Seeing people or creatures near you or even lying in your bed • These events are usually frightening or disturbing. • Anyone can have one of these hallucinations at some time in his or her life. However, if you have them regularly, it could be a sign of narcolepsy. Question: Find and summarize the most common symptoms of narcolepsy, using two or three sentences each.
"================ <TEXT PASSAGE> ======= [context document] ================ <QUESTION> ======= [user request] ================ <TASK> ======= You are an expert in question answering. Your task is to reply to a query or question, based only on the information provided by the user. It should only use information in the article provided."
What are the different minerals in seawater which affect performance, what is causing the decrease in performance and how can we prevent performance degradation from occurring.
INTRODUCTION Hydrogen (H2), with its high-energy density and zero-emission properties, holds great promise as a sustainable energy carrier (1–4). Seawater electrolysis, as a promising alternative for sustainable hydrogen production, faces challenges due to the expensive and scarce platinum catalyst, as well as the need for additional purification processes to address the complex nature of seawater, resulting in higher production costs (5–7). Compared to the widely adopted practice of hydrogen production through electrolysis of alkaline freshwater, the advancement of hydrogen production from seawater has been relatively sluggish (8). The pH of natural seawater is typically around 8.0 and reduced ionic mobility in seawater leads to a diminished pH dependence of the hydrogen evolution reaction (HER) (9, 10), necessitating higher applied voltages to attain the desired efficiency in hydrogen production (11). Furthermore, the complex composition of seawater and the insoluble deposits formed by alkaline earth metal ions such as Ca2+, Mg2+ during electrolysis make seawater HER challenging (1, 12). More fatally, Cl- has a high affinity for the metal active sites of the catalysts as they have strong depassivation and penetrating properties (13, 14), leading to severe degradation of the catalyst and hindering direct seawater electrolysis for hydrogen production (15–17). Although certain catalysts demonstrated activity at low current densities but offer low hydrogen production rates (18, 19), far below the high-current hydrogen production conditions required for industrial water electrolysis. To address this bottleneck issue, various strategies have been developed, including selective active site engineering (20, 21), three-dimensional structure design (22, 23), and carbon layer protection (24, 25). Recently, Guo et al. (26) proposed an innovative strategy, wherein they enhanced the kinetic processes by generating an in situ localized alkaline environment, achieving excellent seawater catalytic performance at 60°C. Metal nitrides (MNs) have inherent chemical stability, electrical conductivity, and excellent catalytic activity, and their surfaces undergo in situ transformation to form highly catalytic active hydroxides, while the nitride core remains stable (27, 28). For example, NiMoN@NiFeN prepared by Yu et al. (29) required an overpotential of 160 mV to reach a current density of 500 mA cm-2 and stable operation for 48 hours, which is attributed to the amorphous NiFeOOH layer formed on the nitride surface. Regrettably, the performance of current MN-based electrocatalysts is still suboptimal and it is urgent to manipulate them for efficient seawater splitting. In this work, we present a protective strategy by introducing a V2O3 layer by in situ reduction into a catalyst with low loading of Pt and Ni3N. The V2O3 layer acts as an “armor” during electrolysis, markedly reducing the adsorption of Cl- and alkaline earth cations (Ca2+ and Mg2+) from seawater and preventing corrosion of the active sites on the electrode. Benefiting from the powerful protection mechanism, the assembled Pt-Ni3N@V2O3 catalyst exhibits remarkable HER activity in alkalized natural seawater and maintains its performance for at least 500 hours at industrial-grade current density, surpassing the performance of other reported electrocatalysts. RESULTS Synthesis and characterization The hydrothermal method was used to prepare hydroxide precursors in nanoflower-shaped structures, as illustrated in figs. S1 and S2. Subsequently, calcination in NH3 gas was used to obtain a composite of Ni3N and V2O3, resulting in the formation of numerous rough porous structures on the catalyst surface. Pt-Ni3N@V2O3/NF (nickel foam noted as NF) was constructed by placing the Ni3N@V2O3/NF precursor in an aqueous solution of H2PtCl6 at room temperature. On the basis of previous reports, we speculate on the reduction mechanism and route (30–32). Specifically, V2O3, as a strong reducing agent, first forms (V2O3)x(OH-)y(s) with H2O molecules (chemical eq. S1), and then Pt4+ ions in solution adsorb onto the surface of the (V2O3)x(OH-)y(s). In situ reduction then occurs with the assistance of H2O molecules to form Pt nanoparticles (chemical eq. S2). Theoretical calculations also confirm that Pt nanoparticles preferentially form on the V2O3 surface rather than the Ni3N surface (fig. S2). The powder x-ray diffraction (XRD) patterns, as illustrated in Fig. 1A and fig. S3, confirm the presence of a composite phase comprising Ni3N, V2O3, and Pt. These results demonstrate the successful preparation of Pt-Ni3N@V2O3/NF. The hydroxide precursors prepared by the hydrothermal method exhibited nanoflower-like structures with low crystallinity, as shown in figs. S4 and S5. After ammonolysis, scanning electron microscopy (SEM) and transmission electron microscopy (TEM) show that Ni3N@V2O3/NF exhibit interconnected porous structures (fig. S6) with lattice stripes of 0.203 and 0.183 nm corresponding well to the (111) and (024) facets of Ni3N and V2O3 (fig. S7), respectively. After the incorporation of Pt, SEM and TEM analyses reveal that Pt-Ni3N@V2O3/NF exhibits a granular morphology, together with a rough surface (Fig. 1, B and C). Pt nanoparticles, formed in situ, have an average particle size of 4.41 nm. The high-resolution TEM (HRTEM) shows that amorphous/low crystallinity V2O3 covers the outer surface of Pt-Ni3N@V2O3/NF (Fig. 1D), with lattice stripes of 0.203 and 0.226 nm corresponding to the (111) facets of Ni3N and the (111) facets of Pt (Fig. 1, E to G), respectively. As demonstrated in fig. S8, the particle size of Pt-Ni3N@V2O3/NF increases with longer impregnation time, and this observation is also supported by the electrochemical properties. In Fig. 1 (H and I), high-angle annular dark-field scanning TEM (HAADF-STEM) images, energy-dispersive spectroscopy (EDS) elemental mapping, and EDS line scan collectively suggest that the internal larger nanoparticles comprise Ni3N, while V2O3 is distributed in the surrounding region. In addition, uniformly anchored, small-sized Pt nanoparticles are found on the surface of the structure, forming a dual-active site. The content of Pt is determined by energy dispersive x-ray spectroscopy to be approximately 6.61% (fig. S9 and table S1), which is consistent with the results of inductively coupled plasma–optical emission spectrometry (ICP-OES) analysis (6.94%). It is worth noting that the reduction of Pt also occurs on the Ni3N surface in the absence of the V2O3 in situ reduction layer (fig. S3C), but with considerable agglomeration (figs. S10 and S11), which is undoubtedly detrimental to catalytic performance. The V2O3 serves as both a potent in situ reducing agent and stabilizer. Its rough surface offers numerous anchor sites and exerts steric hindrance effects, influencing the nucleation and growth kinetics of Pt nanoparticles while impeding their migration and aggregation (30).To address this bottleneck issue, various strategies have been developed, including selective active site engineering (20, 21), three-dimensional structure design (22, 23), and carbon layer protection (24, 25). Recently, Guo et al. (26) proposed an innovative strategy, wherein they enhanced the kinetic processes by generating an in situ localized alkaline environment, achieving excellent seawater catalytic performance at 60°C. Metal nitrides (MNs) have inherent chemical stability, electrical conductivity, and excellent catalytic activity, and their surfaces undergo in situ transformation to form highly catalytic active hydroxides, while the nitride core remains stable (27, 28). For example, NiMoN@NiFeN prepared by Yu et al. (29) required an overpotential of 160 mV to reach a current density of 500 mA cm-2 and stable operation for 48 hours, which is attributed to the amorphous NiFeOOH layer formed on the nitride surface. Regrettably, the performance of current MN-based electrocatalysts is still suboptimal and it is urgent to manipulate them for efficient seawater splitting. In this work, we present a protective strategy by introducing a V2O3 layer by in situ reduction into a catalyst with low loading of Pt and Ni3N. The V2O3 layer acts as an “armor” during electrolysis, markedly reducing the adsorption of Cl- and alkaline earth cations (Ca2+ and Mg2+) from seawater and preventing corrosion of the active sites on the electrode. Benefiting from the powerful protection mechanism, the assembled Pt-Ni3N@V2O3 catalyst exhibits remarkable HER activity in alkalized natural seawater and maintains its performance for at least 500 hours at industrial-grade current density, surpassing the performance of other reported electrocatalysts
"================ <TEXT PASSAGE> ======= INTRODUCTION Hydrogen (H2), with its high-energy density and zero-emission properties, holds great promise as a sustainable energy carrier (1–4). Seawater electrolysis, as a promising alternative for sustainable hydrogen production, faces challenges due to the expensive and scarce platinum catalyst, as well as the need for additional purification processes to address the complex nature of seawater, resulting in higher production costs (5–7). Compared to the widely adopted practice of hydrogen production through electrolysis of alkaline freshwater, the advancement of hydrogen production from seawater has been relatively sluggish (8). The pH of natural seawater is typically around 8.0 and reduced ionic mobility in seawater leads to a diminished pH dependence of the hydrogen evolution reaction (HER) (9, 10), necessitating higher applied voltages to attain the desired efficiency in hydrogen production (11). Furthermore, the complex composition of seawater and the insoluble deposits formed by alkaline earth metal ions such as Ca2+, Mg2+ during electrolysis make seawater HER challenging (1, 12). More fatally, Cl- has a high affinity for the metal active sites of the catalysts as they have strong depassivation and penetrating properties (13, 14), leading to severe degradation of the catalyst and hindering direct seawater electrolysis for hydrogen production (15–17). Although certain catalysts demonstrated activity at low current densities but offer low hydrogen production rates (18, 19), far below the high-current hydrogen production conditions required for industrial water electrolysis. To address this bottleneck issue, various strategies have been developed, including selective active site engineering (20, 21), three-dimensional structure design (22, 23), and carbon layer protection (24, 25). Recently, Guo et al. (26) proposed an innovative strategy, wherein they enhanced the kinetic processes by generating an in situ localized alkaline environment, achieving excellent seawater catalytic performance at 60°C. Metal nitrides (MNs) have inherent chemical stability, electrical conductivity, and excellent catalytic activity, and their surfaces undergo in situ transformation to form highly catalytic active hydroxides, while the nitride core remains stable (27, 28). For example, NiMoN@NiFeN prepared by Yu et al. (29) required an overpotential of 160 mV to reach a current density of 500 mA cm-2 and stable operation for 48 hours, which is attributed to the amorphous NiFeOOH layer formed on the nitride surface. Regrettably, the performance of current MN-based electrocatalysts is still suboptimal and it is urgent to manipulate them for efficient seawater splitting. In this work, we present a protective strategy by introducing a V2O3 layer by in situ reduction into a catalyst with low loading of Pt and Ni3N. The V2O3 layer acts as an “armor” during electrolysis, markedly reducing the adsorption of Cl- and alkaline earth cations (Ca2+ and Mg2+) from seawater and preventing corrosion of the active sites on the electrode. Benefiting from the powerful protection mechanism, the assembled Pt-Ni3N@V2O3 catalyst exhibits remarkable HER activity in alkalized natural seawater and maintains its performance for at least 500 hours at industrial-grade current density, surpassing the performance of other reported electrocatalysts. RESULTS Synthesis and characterization The hydrothermal method was used to prepare hydroxide precursors in nanoflower-shaped structures, as illustrated in figs. S1 and S2. Subsequently, calcination in NH3 gas was used to obtain a composite of Ni3N and V2O3, resulting in the formation of numerous rough porous structures on the catalyst surface. Pt-Ni3N@V2O3/NF (nickel foam noted as NF) was constructed by placing the Ni3N@V2O3/NF precursor in an aqueous solution of H2PtCl6 at room temperature. On the basis of previous reports, we speculate on the reduction mechanism and route (30–32). Specifically, V2O3, as a strong reducing agent, first forms (V2O3)x(OH-)y(s) with H2O molecules (chemical eq. S1), and then Pt4+ ions in solution adsorb onto the surface of the (V2O3)x(OH-)y(s). In situ reduction then occurs with the assistance of H2O molecules to form Pt nanoparticles (chemical eq. S2). Theoretical calculations also confirm that Pt nanoparticles preferentially form on the V2O3 surface rather than the Ni3N surface (fig. S2). The powder x-ray diffraction (XRD) patterns, as illustrated in Fig. 1A and fig. S3, confirm the presence of a composite phase comprising Ni3N, V2O3, and Pt. These results demonstrate the successful preparation of Pt-Ni3N@V2O3/NF. The hydroxide precursors prepared by the hydrothermal method exhibited nanoflower-like structures with low crystallinity, as shown in figs. S4 and S5. After ammonolysis, scanning electron microscopy (SEM) and transmission electron microscopy (TEM) show that Ni3N@V2O3/NF exhibit interconnected porous structures (fig. S6) with lattice stripes of 0.203 and 0.183 nm corresponding well to the (111) and (024) facets of Ni3N and V2O3 (fig. S7), respectively. After the incorporation of Pt, SEM and TEM analyses reveal that Pt-Ni3N@V2O3/NF exhibits a granular morphology, together with a rough surface (Fig. 1, B and C). Pt nanoparticles, formed in situ, have an average particle size of 4.41 nm. The high-resolution TEM (HRTEM) shows that amorphous/low crystallinity V2O3 covers the outer surface of Pt-Ni3N@V2O3/NF (Fig. 1D), with lattice stripes of 0.203 and 0.226 nm corresponding to the (111) facets of Ni3N and the (111) facets of Pt (Fig. 1, E to G), respectively. As demonstrated in fig. S8, the particle size of Pt-Ni3N@V2O3/NF increases with longer impregnation time, and this observation is also supported by the electrochemical properties. In Fig. 1 (H and I), high-angle annular dark-field scanning TEM (HAADF-STEM) images, energy-dispersive spectroscopy (EDS) elemental mapping, and EDS line scan collectively suggest that the internal larger nanoparticles comprise Ni3N, while V2O3 is distributed in the surrounding region. In addition, uniformly anchored, small-sized Pt nanoparticles are found on the surface of the structure, forming a dual-active site. The content of Pt is determined by energy dispersive x-ray spectroscopy to be approximately 6.61% (fig. S9 and table S1), which is consistent with the results of inductively coupled plasma–optical emission spectrometry (ICP-OES) analysis (6.94%). It is worth noting that the reduction of Pt also occurs on the Ni3N surface in the absence of the V2O3 in situ reduction layer (fig. S3C), but with considerable agglomeration (figs. S10 and S11), which is undoubtedly detrimental to catalytic performance. The V2O3 serves as both a potent in situ reducing agent and stabilizer. Its rough surface offers numerous anchor sites and exerts steric hindrance effects, influencing the nucleation and growth kinetics of Pt nanoparticles while impeding their migration and aggregation (30).To address this bottleneck issue, various strategies have been developed, including selective active site engineering (20, 21), three-dimensional structure design (22, 23), and carbon layer protection (24, 25). Recently, Guo et al. (26) proposed an innovative strategy, wherein they enhanced the kinetic processes by generating an in situ localized alkaline environment, achieving excellent seawater catalytic performance at 60°C. Metal nitrides (MNs) have inherent chemical stability, electrical conductivity, and excellent catalytic activity, and their surfaces undergo in situ transformation to form highly catalytic active hydroxides, while the nitride core remains stable (27, 28). For example, NiMoN@NiFeN prepared by Yu et al. (29) required an overpotential of 160 mV to reach a current density of 500 mA cm-2 and stable operation for 48 hours, which is attributed to the amorphous NiFeOOH layer formed on the nitride surface. Regrettably, the performance of current MN-based electrocatalysts is still suboptimal and it is urgent to manipulate them for efficient seawater splitting. In this work, we present a protective strategy by introducing a V2O3 layer by in situ reduction into a catalyst with low loading of Pt and Ni3N. The V2O3 layer acts as an “armor” during electrolysis, markedly reducing the adsorption of Cl- and alkaline earth cations (Ca2+ and Mg2+) from seawater and preventing corrosion of the active sites on the electrode. Benefiting from the powerful protection mechanism, the assembled Pt-Ni3N@V2O3 catalyst exhibits remarkable HER activity in alkalized natural seawater and maintains its performance for at least 500 hours at industrial-grade current density, surpassing the performance of other reported electrocatalysts https://www.science.org/doi/10.1126/sciadv.adn7012 ================ <QUESTION> ======= What are the different minerals in seawater which affect performance, what is causing the decrease in performance and how can we prevent performance degradation from occurring. ================ <TASK> ======= You are an expert in question answering. Your task is to reply to a query or question, based only on the information provided by the user. It should only use information in the article provided."
Do not use any information outside of the context.
According to the context, what are the pros and cons of using Motrin?
CLINICAL PHARMACOLOGY MOTRIN tablets contain ibuprofen which possesses analgesic and antipyretic activities. Its mode of action, like that of other NSAIDs, is not completely understood, but may be related to prostaglandin synthetase inhibition. In clinical studies in patients with rheumatoid arthritis and osteoarthritis, MOTRIN tablets have been shown to be comparable to aspirin in controlling pain and inflammation and to be associated with a statistically significant reduction in the milder gastrointestinal side effects. MOTRIN tablets may be well tolerated in some patients who have had gastrointestinal side effects with aspirin, but these patients when treated with MOTRIN tablets should be carefully followed for signs and symptoms of gastrointestinal ulceration and bleeding. Although it is not definitely known whether MOTRIN tablets causes less peptic ulceration than aspirin, in one study involving 885 patients with rheumatoid arthritis treated for up to one year, there were no reports of gastric ulceration with MOTRIN tablets whereas frank ulceration was reported in 13 patients in the aspirin group (statistically significant p<.001). Gastroscopic studies at varying doses show an increased tendency toward gastric irritation at higher doses. However, at comparable doses, gastric irritation is approximately half that seen with aspirin. In clinical studies in patients with rheumatoid arthritis, MOTRIN tablets have been shown to be comparable to indomethacin in controlling the signs and symptoms of disease activity and to be associated with a statistically significant reduction of the milder gastrointestinal and CNS side effects. Controlled studies have demonstrated that MOTRIN tablets are a more effective analgesic than propoxyphene for the relief of episiotomy pain, pain following dental extraction procedures, and for the relief of the symptoms of primary dysmenorrhea. In patients with primary dysmenorrhea, MOTRIN tablets have been shown to reduce elevated levels of prostaglandin activity in the menstrual fluid and to reduce resting and active intrauterine pressure, as well as the frequency of uterine contractions. The probable mechanism of action is to inhibit prostaglandin synthesis rather than simply to provide analgesia. INDICATIONS AND USAGE MOTRIN tablets are indicated for relief of the signs and symptoms of rheumatoid arthritis and osteoarthritis. MOTRIN tablets are indicated for relief of mild to moderate pain. MOTRIN tablets are also indicated for the treatment of primary dysmenorrhea. Controlled clinical trials to establish the safety and effectiveness of MOTRIN tablets in children have not been conducted. CONTRAINDICATIONS MOTRIN tablets are contraindicated in patients with known hypersensitivity to Ibuprofen. MOTRIN tablets should not be given to patients who have experienced asthma, urticaria, or allergictype reactions after taking aspirin or other NSAIDs. Severe, rarely fatal, anaphylactic-like reactions to NSAIDs have been reported in such patients. MOTRIN tablets are contraindicated for the treatment of peri-operative pain in the setting of coronary artery bypass graft (CABG) surgery (see WARNINGS). WARNINGS CARDIOVASCULAR EFFECTS Cardiovascular Thrombotic Events Clinical trials of several COX-2 selective and nonselective NSAIDs of up to three years duration have shown an increased risk of serious cardiovascular (CV) thrombotic events, myocardial infarction, and stroke, which can be fatal. All NSAIDs, both COX-2 selective and nonselective, may have a similar risk. Patients with known CV disease or risk factors for CV disease may be at greater risk. To minimize the potential risk for an adverse CV event in patients treated with an NSAID, the lowest effective dose should be used for the shortest duration possible. Physicians and patients should remain alert for the development of such events, even in the absence of previous CV symptoms. Patients should be informed about the signs and/or symptoms of serious CV events and the steps to take if they occur. There is no consistent evidence that concurrent use of aspirin mitigates the increased risk of serious CV thrombotic events associated with NSAID use. The concurrent use of aspirin and an NSAID does increase the risk of serious GI events (see GI WARNINGS). Two large, controlled clinical trials of a COX-2 selective NSAID for the treatment of pain in the first 10-14 days following CABG surgery found an increased incidence of myocardial infarction and stroke (see CONTRAINDICATIONS). Hypertension NSAIDs including MOTRIN tablets, can lead to onset of new hypertension or worsening of preexisting hypertension, either of which may contribute to the increased incidence of CV events. Patients taking thiazides or loop diuretics may have impaired response to these therapies when taking NSAIDs. NSAIDs, including MOTRIN tablets, should be used with caution in patients with hypertension. Blood pressure (BP) should be monitored closely during the initiation of NSAID treatment and throughout the course of therapy. Congestive Heart Failure and Edema Fluid retention and edema have been observed in some patients taking NSAIDs. MOTRIN tablets should be used with caution in patients with fluid retention or heart failure. Gastrointestinal Effects - Risk of Ulceration, Bleeding, and Perforation NSAIDs, including MOTRIN tablets, can cause serious gastrointestinal (GI) adverse events including inflammation, bleeding, ulceration, and perforation of the stomach, small intestine, or large intestine,which can be fatal. These serious adverse events can occur at any time, with or without warning symptoms, in patients treated with NSAIDs. Only one in five patients, who develop a serious upper GI adverse event on NSAID therapy, is symptomatic. Upper GI ulcers, gross bleeding, or perforation caused by NSAIDs occur in approximately 1% of patients treated for 3-6 months, and in about 2-4% of patients treated for one year. These trends continue with longer duration of use, increasing the likelihood of developing a serious GI event at some time during the course of therapy. However, even short-term therapy is not without risk. NSAIDs should be prescribed with extreme caution in those with a prior history of ulcer disease or gastrointestinal bleeding. Patients with a prior history of peptic ulcer disease and/or gastrointestinal bleeding who use NSAIDs have a greater than 10-fold increased risk for developing a GI bleed compared to patients treated with neither of these risk factors. Other factors that increase the risk of GI bleeding in patients treated with NSAIDs include concomitant use of oral corticosteroids or anticoagulants, longer duration of NSAID therapy, smoking, use of alcohol, older age, and poor general health status. Most spontaneous reports of fatal GI events are in elderly or debilitated patients and therefore, special care should be taken in treating this population. To minimize the potential risk for an adverse GI event in patients treated with an NSAID, the lowest effective dose should be used for the shortest possible duration. Patients and physicians should remain alert for signs and symptoms of GI ulcerations and bleeding during NSAID therapy and promptly initiate additional evaluation and treatment if a serious GI event is suspected. This should include discontinuation of the NSAID until a serious GI adverse event is ruled out. For high-risk patients, alternate therapies that do not involve NSAIDs should be considered. Renal Effects Long-term administration of NSAIDs has resulted in renal papillary necrosis and other renal injury. Renal toxicity has also been seen in patients in whom renal prostaglandins have a compensatory role in the maintenance of renal perfusion. In these patients, administration of a NSAID may cause a dosedependent reduction in prostaglandin formation and, secondarily, in renal blood flow, which may precipitate overt renal decompensation. Patients at greatest risk of this reaction are those with impaired renal function, heart failure, liver dysfunction, those taking diuretics and ACE inhibitors, and the elderly. Discontinuation of NSAID therapy is usually followed by recovery to the pretreatment state. Advanced Renal Disease No information is available from controlled clinical studies regarding the use of MOTRIN tablets in patients with advanced renal disease. Therefore, treatment with MOTRIN tablets is not recommended in these patients with advanced renal disease. If MOTRIN tablet therapy must be initiated, close monitoring of the patients renal function is advisable. Anaphylactoid Reactions As with other NSAIDs, anaphylactoid reactions may occur in patients without known prior exposure to MOTRIN tablets. MOTRIN tablets should not be given to patients with the aspirin triad. This symptom complex typically occurs in asthmatic patients who experience rhinitis with or without nasal polyps, or who exhibit severe, potentially fatal bronchospasm after taking aspirin or other NSAIDs (see CONTRAINDICATIONS and PRECAUTIONS, Preexisting Asthma). Emergency help should be sought in cases where an anaphylactoid reaction occurs. Skin Reactions NSAIDs, including MOTRIN tablets, can cause serious skin adverse events such as exfoliative dermatitis, Stevens-Johnson Syndrome (SJS), and toxic epidermal necrolysis (TEN), which can be fatal. These serious events may occur without warning. Patients should be informed about the signs and symptoms of serious skin manifestations and use of the drug should be discontinued at the first appearance of skin rash or any other sign of hypersensitivity. Pregnancy In late pregnancy, as with other NSAIDs, MOTRIN tablets should be avoided because it may cause premature closure of the ductus arteriosus.
Question: According to the context, what are the pros and cons of using Motrin? System Instructions: Do not use any information outside of the context. Context: CLINICAL PHARMACOLOGY MOTRIN tablets contain ibuprofen which possesses analgesic and antipyretic activities. Its mode of action, like that of other NSAIDs, is not completely understood, but may be related to prostaglandin synthetase inhibition. In clinical studies in patients with rheumatoid arthritis and osteoarthritis, MOTRIN tablets have been shown to be comparable to aspirin in controlling pain and inflammation and to be associated with a statistically significant reduction in the milder gastrointestinal side effects. MOTRIN tablets may be well tolerated in some patients who have had gastrointestinal side effects with aspirin, but these patients when treated with MOTRIN tablets should be carefully followed for signs and symptoms of gastrointestinal ulceration and bleeding. Although it is not definitely known whether MOTRIN tablets causes less peptic ulceration than aspirin, in one study involving 885 patients with rheumatoid arthritis treated for up to one year, there were no reports of gastric ulceration with MOTRIN tablets whereas frank ulceration was reported in 13 patients in the aspirin group (statistically significant p<.001). Gastroscopic studies at varying doses show an increased tendency toward gastric irritation at higher doses. However, at comparable doses, gastric irritation is approximately half that seen with aspirin. In clinical studies in patients with rheumatoid arthritis, MOTRIN tablets have been shown to be comparable to indomethacin in controlling the signs and symptoms of disease activity and to be associated with a statistically significant reduction of the milder gastrointestinal and CNS side effects. Controlled studies have demonstrated that MOTRIN tablets are a more effective analgesic than propoxyphene for the relief of episiotomy pain, pain following dental extraction procedures, and for the relief of the symptoms of primary dysmenorrhea. In patients with primary dysmenorrhea, MOTRIN tablets have been shown to reduce elevated levels of prostaglandin activity in the menstrual fluid and to reduce resting and active intrauterine pressure, as well as the frequency of uterine contractions. The probable mechanism of action is to inhibit prostaglandin synthesis rather than simply to provide analgesia. INDICATIONS AND USAGE MOTRIN tablets are indicated for relief of the signs and symptoms of rheumatoid arthritis and osteoarthritis. MOTRIN tablets are indicated for relief of mild to moderate pain. MOTRIN tablets are also indicated for the treatment of primary dysmenorrhea. Controlled clinical trials to establish the safety and effectiveness of MOTRIN tablets in children have not been conducted. CONTRAINDICATIONS MOTRIN tablets are contraindicated in patients with known hypersensitivity to Ibuprofen. MOTRIN tablets should not be given to patients who have experienced asthma, urticaria, or allergictype reactions after taking aspirin or other NSAIDs. Severe, rarely fatal, anaphylactic-like reactions to NSAIDs have been reported in such patients. MOTRIN tablets are contraindicated for the treatment of peri-operative pain in the setting of coronary artery bypass graft (CABG) surgery (see WARNINGS). WARNINGS CARDIOVASCULAR EFFECTS Cardiovascular Thrombotic Events Clinical trials of several COX-2 selective and nonselective NSAIDs of up to three years duration have shown an increased risk of serious cardiovascular (CV) thrombotic events, myocardial infarction, and stroke, which can be fatal. All NSAIDs, both COX-2 selective and nonselective, may have a similar risk. Patients with known CV disease or risk factors for CV disease may be at greater risk. To minimize the potential risk for an adverse CV event in patients treated with an NSAID, the lowest effective dose should be used for the shortest duration possible. Physicians and patients should remain alert for the development of such events, even in the absence of previous CV symptoms. Patients should be informed about the signs and/or symptoms of serious CV events and the steps to take if they occur. There is no consistent evidence that concurrent use of aspirin mitigates the increased risk of serious CV thrombotic events associated with NSAID use. The concurrent use of aspirin and an NSAID does increase the risk of serious GI events (see GI WARNINGS). Two large, controlled clinical trials of a COX-2 selective NSAID for the treatment of pain in the first 10-14 days following CABG surgery found an increased incidence of myocardial infarction and stroke (see CONTRAINDICATIONS). Hypertension NSAIDs including MOTRIN tablets, can lead to onset of new hypertension or worsening of preexisting hypertension, either of which may contribute to the increased incidence of CV events. Patients taking thiazides or loop diuretics may have impaired response to these therapies when taking NSAIDs. NSAIDs, including MOTRIN tablets, should be used with caution in patients with hypertension. Blood pressure (BP) should be monitored closely during the initiation of NSAID treatment and throughout the course of therapy. Congestive Heart Failure and Edema Fluid retention and edema have been observed in some patients taking NSAIDs. MOTRIN tablets should be used with caution in patients with fluid retention or heart failure. Gastrointestinal Effects - Risk of Ulceration, Bleeding, and Perforation NSAIDs, including MOTRIN tablets, can cause serious gastrointestinal (GI) adverse events including inflammation, bleeding, ulceration, and perforation of the stomach, small intestine, or large intestine,which can be fatal. These serious adverse events can occur at any time, with or without warning symptoms, in patients treated with NSAIDs. Only one in five patients, who develop a serious upper GI adverse event on NSAID therapy, is symptomatic. Upper GI ulcers, gross bleeding, or perforation caused by NSAIDs occur in approximately 1% of patients treated for 3-6 months, and in about 2-4% of patients treated for one year. These trends continue with longer duration of use, increasing the likelihood of developing a serious GI event at some time during the course of therapy. However, even short-term therapy is not without risk. NSAIDs should be prescribed with extreme caution in those with a prior history of ulcer disease or gastrointestinal bleeding. Patients with a prior history of peptic ulcer disease and/or gastrointestinal bleeding who use NSAIDs have a greater than 10-fold increased risk for developing a GI bleed compared to patients treated with neither of these risk factors. Other factors that increase the risk of GI bleeding in patients treated with NSAIDs include concomitant use of oral corticosteroids or anticoagulants, longer duration of NSAID therapy, smoking, use of alcohol, older age, and poor general health status. Most spontaneous reports of fatal GI events are in elderly or debilitated patients and therefore, special care should be taken in treating this population. To minimize the potential risk for an adverse GI event in patients treated with an NSAID, the lowest effective dose should be used for the shortest possible duration. Patients and physicians should remain alert for signs and symptoms of GI ulcerations and bleeding during NSAID therapy and promptly initiate additional evaluation and treatment if a serious GI event is suspected. This should include discontinuation of the NSAID until a serious GI adverse event is ruled out. For high-risk patients, alternate therapies that do not involve NSAIDs should be considered. Renal Effects Long-term administration of NSAIDs has resulted in renal papillary necrosis and other renal injury. Renal toxicity has also been seen in patients in whom renal prostaglandins have a compensatory role in the maintenance of renal perfusion. In these patients, administration of a NSAID may cause a dosedependent reduction in prostaglandin formation and, secondarily, in renal blood flow, which may precipitate overt renal decompensation. Patients at greatest risk of this reaction are those with impaired renal function, heart failure, liver dysfunction, those taking diuretics and ACE inhibitors, and the elderly. Discontinuation of NSAID therapy is usually followed by recovery to the pretreatment state. Advanced Renal Disease No information is available from controlled clinical studies regarding the use of MOTRIN tablets in patients with advanced renal disease. Therefore, treatment with MOTRIN tablets is not recommended in these patients with advanced renal disease. If MOTRIN tablet therapy must be initiated, close monitoring of the patients renal function is advisable. Anaphylactoid Reactions As with other NSAIDs, anaphylactoid reactions may occur in patients without known prior exposure to MOTRIN tablets. MOTRIN tablets should not be given to patients with the aspirin triad. This symptom complex typically occurs in asthmatic patients who experience rhinitis with or without nasal polyps, or who exhibit severe, potentially fatal bronchospasm after taking aspirin or other NSAIDs (see CONTRAINDICATIONS and PRECAUTIONS, Preexisting Asthma). Emergency help should be sought in cases where an anaphylactoid reaction occurs. Skin Reactions NSAIDs, including MOTRIN tablets, can cause serious skin adverse events such as exfoliative dermatitis, Stevens-Johnson Syndrome (SJS), and toxic epidermal necrolysis (TEN), which can be fatal. These serious events may occur without warning. Patients should be informed about the signs and symptoms of serious skin manifestations and use of the drug should be discontinued at the first appearance of skin rash or any other sign of hypersensitivity. Pregnancy In late pregnancy, as with other NSAIDs, MOTRIN tablets should be avoided because it may cause premature closure of the ductus arteriosus.
This task requires you to answer only using the information provided in the prompt. No other information or resources is allowed to be used to formulate your answer.
In what ways are smaller firms disadvantaged in the global market?
[1]—“Leveraging” Resources The primary business advantage of granting a license is “leveraging” business resources. By adding its licensees’ resources for particular business operations to its own, a licensor can address markets that it otherwise could not hope to serve. For example, small firms and start-up companies often do not have enough salespeople or offices to serve nationwide, let alone worldwide, markets. By granting others the right to market and distribute their products, they can penetrate geographic or products markets otherwise completely beyond their reach. This occurred, for example, when International Business Machines Corporation chose Microsoft Corporation’s “MS-DOS” operating system software as the platform upon which to build the “PC-DOS” operating system for IBM’s personal computer. Overnight, Microsoft obtained the benefit of IBM’s massive marketing and sales in forces distributing its products. Although the effect is seldom so dramatic as in this example, “leveraging” of resources is one of the primary advantages of granting licenses. The ability to leverage resources is restricted by limits on the patent rights. The patent exhaustion doctrine, in particular, restricts the ability of the patentee to control sales beyond the first sale of a patented product, or a product embodying a patented process.11 Because of this rule, a patent holder cannot exercise unlimited rights over an invention once embodiments of the invention have been sold.12 Rather, if he sells devices embodying the invention, or permits others to sell such devices, he will have limited control over what the buyers do with those devices because they take the items purchased free of the patent claims.13 In the sphere of copyright, a similar question is whether a rights holder can rely on digital rights management systems to protect against not just copyright infringement, but also other, non-infringing access to copyrighted works.14 Circumvention to permit use beyond the scope of a license may violate the protections for access controls (because it permits unauthorized access), even if it does not cause infringement of copyright (because the users had a license, even though the circumvention allows them to use the software beyond the scope of the license).15 Even while sensitive military or intelligence technology is subjected to secrecy orders by the United States government,16 it is important to seek licensees while patent applications are sequestered.17 If the patent applicant does not do so, it may have no basis for an otherwise valid claim for compensation from the United States government for the adverse effects of a secrecy order.18 [2]—Broadening Geographic Markets As the world becomes a “global village,” product markets that used to be regional or national are rapidly becoming worldwide. Few except the largest firms, however, have the personnel or resources to address worldwide markets successfully. One reason is that most products require some “translation” for foreign markets. Labels and instructions may need translation into foreign languages, goods may require physical modification to comply with local laws and regulations, and advertising and marketing programs may have to be adjusted to satisfy local customs and tastes. If a firm wishes to enter foreign markets but does not have ready marketing and distribution channels in foreign countries, it has only four alternatives. First, it can set up foreign branches, which may subject it to direct taxation abroad. Second, it may set up separate subsidiaries or affiliates in foreign countries. This may avoid direct foreign taxation of the parent company, although the foreign subsidiary will be subject to foreign income tax. Yet whether a branch or subsidiary, establishing of a foreign office requires time, energy, and money in order to complete the necessary legal work, put management and physical plant in place, and hire and train appropriate personnel. The third alternative for firms wishing to expand into foreign markets is a joint venture. If a joint venture is taxed as a separate entity, as is often the case,19 the tax consequences of this alternative are similar to those of establishing a foreign subsidiary. However, formation of a joint venture also involves resolving difficult questions of control, management, and communication that often consume considerable time and resources. If the joint venture is more than a shell—if it will have separate physical plant, employees, and a separate existence—its formation may be as complex as the establishment of a new business enterprise in the foreign country. The fourth alternative for expansion into foreign markets is, of course, licensing. By licensing a foreign entity to help exploit its intellectual property, a firm can take advantage of a preexisting organization, with personnel in place and established channels, resources, and procedures for production, marketing, and distribution. The firm need not establish any new entity because the licensee normally uses existing personnel and resources, or at least an existing management and business structure, to perform the delegated operations. By licensing a foreign concern to exploit its intellectual property in foreign markets, a firm also can use the foreign concern’s familiarity with foreign markets, customs, and needs. Because licensing takes advantage of these preexisting resources and capabilities, it is often the fastest route to the foreign marketplace. This advantage of licensing, however, is not limited to the international sphere. A firm in one state or region of the United States that wishes to expand its markets into another state or region has the same four alternatives as a firm wishing to expand abroad. 20 Very often the firm can achieve the most rapid penetration into new geographic markets simply by granting licenses to a firm already there. [3]—Broadening Product Markets Just as licensing can broaden geographic markets, it can broaden product markets. A firm may have the resources to exploit its intellectual property through one product, but its intellectual property may be applicable to other products or services. The video industry is an excellent example. There is now a tremendous market for entertainment programs for home use. Yet independent producers of movies and television shows often do not have the resources for mass production and distribution. To take advantage of this market, they license their intellectual property—namely, the copyrights in their movies and television shows—to firms that manufacture and distribute the videos. In the biotechnology industry, research firms have developed a number of monoclonal antibodies to be used outside the body as testing and diagnostic tools. Because the process of regulatory review is relatively simple for products used outside the body, these firms can take those products to market quickly. To exploit their technology fully, however, they may wish to develop drugs and biologicals for internal use. The approval process for these products takes much longer and requires much greater expense, as well as clinical expertise and familiarity with the regulatory process. Lacking the requisite resources, smaller biotechnology firms often license their technology to large drug companies for that purpose. 21 Licensing for the purpose of expanding product markets, however, has disadvantages. By granting others the right to use its intellectual property to develop new products, a firm may lose control over those new products. 22 Where a party authorizes another to sell the invention, buyers will be protected by first sale, even if the seller fails to pay the agreed royalties to the patent owner. 22.1 Any other rule would make the buyer of goods or services subject to disputes over which the buyer has neither control nor knowledge. That uncertainty would in turn add transaction costs to such sales. So the rule aids both patentees and ultimate buyers, by facilitating transactions. Unless it has access to improvements made by its licensees, it may quickly find itself left in a backwater of technology, at least insofar as the new product market is concerned. 23 It also may incur some risk of liability for damage caused by defects in its licensee’s products, 24 or even for breach of contract 25 or miscellaneous torts. 26 Nevertheless, for many firms, this sort of licensing is an important source of additional revenue. With appropriate provision for cooperation in the licensing agreement, a firm may stay in touch with the exploitation of its intellectual property and at the same time exploit that property in market areas that it could never hope to penetrate using only its own resources. The patent exhaustion doctrine may prevent a patentee from controlling patent markets beyond the first market which a patented product enters.
This task requires you to answer only using the information provided in the prompt. No other information or resources is allowed to be used to formulate your answer. In what ways are smaller firms disadvantaged in the global market? [1]—“Leveraging” Resources The primary business advantage of granting a license is “leveraging” business resources. By adding its licensees’ resources for particular business operations to its own, a licensor can address markets that it otherwise could not hope to serve. For example, small firms and start-up companies often do not have enough salespeople or offices to serve nationwide, let alone worldwide, markets. By granting others the right to market and distribute their products, they can penetrate geographic or products markets otherwise completely beyond their reach. This occurred, for example, when International Business Machines Corporation chose Microsoft Corporation’s “MS-DOS” operating system software as the platform upon which to build the “PC-DOS” operating system for IBM’s personal computer. Overnight, Microsoft obtained the benefit of IBM’s massive marketing and sales in forces distributing its products. Although the effect is seldom so dramatic as in this example, “leveraging” of resources is one of the primary advantages of granting licenses. The ability to leverage resources is restricted by limits on the patent rights. The patent exhaustion doctrine, in particular, restricts the ability of the patentee to control sales beyond the first sale of a patented product, or a product embodying a patented process.11 Because of this rule, a patent holder cannot exercise unlimited rights over an invention once embodiments of the invention have been sold.12 Rather, if he sells devices embodying the invention, or permits others to sell such devices, he will have limited control over what the buyers do with those devices because they take the items purchased free of the patent claims.13 In the sphere of copyright, a similar question is whether a rights holder can rely on digital rights management systems to protect against not just copyright infringement, but also other, non-infringing access to copyrighted works.14 Circumvention to permit use beyond the scope of a license may violate the protections for access controls (because it permits unauthorized access), even if it does not cause infringement of copyright (because the users had a license, even though the circumvention allows them to use the software beyond the scope of the license).15 Even while sensitive military or intelligence technology is subjected to secrecy orders by the United States government,16 it is important to seek licensees while patent applications are sequestered.17 If the patent applicant does not do so, it may have no basis for an otherwise valid claim for compensation from the United States government for the adverse effects of a secrecy order.18 [2]—Broadening Geographic Markets As the world becomes a “global village,” product markets that used to be regional or national are rapidly becoming worldwide. Few except the largest firms, however, have the personnel or resources to address worldwide markets successfully. One reason is that most products require some “translation” for foreign markets. Labels and instructions may need translation into foreign languages, goods may require physical modification to comply with local laws and regulations, and advertising and marketing programs may have to be adjusted to satisfy local customs and tastes. If a firm wishes to enter foreign markets but does not have ready marketing and distribution channels in foreign countries, it has only four alternatives. First, it can set up foreign branches, which may subject it to direct taxation abroad. Second, it may set up separate subsidiaries or affiliates in foreign countries. This may avoid direct foreign taxation of the parent company, although the foreign subsidiary will be subject to foreign income tax. Yet whether a branch or subsidiary, establishing of a foreign office requires time, energy, and money in order to complete the necessary legal work, put management and physical plant in place, and hire and train appropriate personnel. The third alternative for firms wishing to expand into foreign markets is a joint venture. If a joint venture is taxed as a separate entity, as is often the case,19 the tax consequences of this alternative are similar to those of establishing a foreign subsidiary. However, formation of a joint venture also involves resolving difficult questions of control, management, and communication that often consume considerable time and resources. If the joint venture is more than a shell—if it will have separate physical plant, employees, and a separate existence—its formation may be as complex as the establishment of a new business enterprise in the foreign country. The fourth alternative for expansion into foreign markets is, of course, licensing. By licensing a foreign entity to help exploit its intellectual property, a firm can take advantage of a preexisting organization, with personnel in place and established channels, resources, and procedures for production, marketing, and distribution. The firm need not establish any new entity because the licensee normally uses existing personnel and resources, or at least an existing management and business structure, to perform the delegated operations. By licensing a foreign concern to exploit its intellectual property in foreign markets, a firm also can use the foreign concern’s familiarity with foreign markets, customs, and needs. Because licensing takes advantage of these preexisting resources and capabilities, it is often the fastest route to the foreign marketplace. This advantage of licensing, however, is not limited to the international sphere. A firm in one state or region of the United States that wishes to expand its markets into another state or region has the same four alternatives as a firm wishing to expand abroad. 20 Very often the firm can achieve the most rapid penetration into new geographic markets simply by granting licenses to a firm already there. [3]—Broadening Product Markets Just as licensing can broaden geographic markets, it can broaden product markets. A firm may have the resources to exploit its intellectual property through one product, but its intellectual property may be applicable to other products or services. The video industry is an excellent example. There is now a tremendous market for entertainment programs for home use. Yet independent producers of movies and television shows often do not have the resources for mass production and distribution. To take advantage of this market, they license their intellectual property—namely, the copyrights in their movies and television shows—to firms that manufacture and distribute the videos. In the biotechnology industry, research firms have developed a number of monoclonal antibodies to be used outside the body as testing and diagnostic tools. Because the process of regulatory review is relatively simple for products used outside the body, these firms can take those products to market quickly. To exploit their technology fully, however, they may wish to develop drugs and biologicals for internal use. The approval process for these products takes much longer and requires much greater expense, as well as clinical expertise and familiarity with the regulatory process. Lacking the requisite resources, smaller biotechnology firms often license their technology to large drug companies for that purpose. 21 Licensing for the purpose of expanding product markets, however, has disadvantages. By granting others the right to use its intellectual property to develop new products, a firm may lose control over those new products. 22 Where a party authorizes another to sell the invention, buyers will be protected by first sale, even if the seller fails to pay the agreed royalties to the patent owner. 22.1 Any other rule would make the buyer of goods or services subject to disputes over which the buyer has neither control nor knowledge. That uncertainty would in turn add transaction costs to such sales. So the rule aids both patentees and ultimate buyers, by facilitating transactions. Unless it has access to improvements made by its licensees, it may quickly find itself left in a backwater of technology, at least insofar as the new product market is concerned. 23 It also may incur some risk of liability for damage caused by defects in its licensee’s products, 24 or even for breach of contract 25 or miscellaneous torts. 26 Nevertheless, for many firms, this sort of licensing is an important source of additional revenue. With appropriate provision for cooperation in the licensing agreement, a firm may stay in touch with the exploitation of its intellectual property and at the same time exploit that property in market areas that it could never hope to penetrate using only its own resources. The patent exhaustion doctrine may prevent a patentee from controlling patent markets beyond the first market which a patented product enters.
<TASK DESCRIPTION> Only use the provided text to answer the question, no outside sources. <QUESTION> [user request] <TEXT> [context document]
I found this alarming article about microplastics making their way into the human body. Using this article as a reference, please explain what the red flags are for humans in regards to microplastics. Use at least 400 words.
When Jaime Ross, PhD, a neuroscientist and assistant professor at the University of Rhode Island College of Pharmacy, decided to study how contaminating the drinking water of mice with tiny fragments of plastic might affect their cognitive function, she didn’t expect the experiment to yield much. But in just three weeks, Ross and her team found microplastics had made their way into the mice’s brains, passing the robust defenses of the blood-brain barrier. The researchers performed a variety of tests and found that the microplastic-exposed mice started exhibiting signs of cognitive decline similar to dementia. “I didn’t really think we were going to see anything,” Ross says. But when they examined the mice’s tissues, they were shocked. “Every one we looked at we found the microplastics. It was surprising, especially finding them in the brain. Things are not supposed to go there!” The research findings from Ross’ team, published in August 2023, add to a slew of recent studies pointing to an alarming trend: microplastics are everywhere. Minuscule plastic particles that come from degraded plastic products are found throughout the environment. Scientists estimate there are 8-10 million metric tons of plastics in the oceans, and some of that is consumed by fish and other wildlife. Microplastics have been detected in fruits and vegetables, plastic water bottles, the air, cosmetics, and household dust. Now, researchers are finding them in almost every part of the human body, including in breast milk, the placenta, testicles, hearts, livers, and kidneys. Despite these findings, experts say that little is known and understood about what impact these microplastics have on human health. A few studies have drawn associations between microplastics and poor health outcomes, including cardiovascular disease and low male fertility. And chemicals often found in plastics are known to cause a variety of health problems, including cancers, metabolic disorders, attention deficit/hyperactivity disorder, and fertility issues. But most of the studies raising alarm have been in labs or in animal models that don’t give a complete picture of the effect on humans, says Mary Margaret Johnson, MD, PhD, a principal research scientist of environmental health at Harvard T.H. Chan School of Public Health in Boston. “I do think there needs to be more funding devoted to researching how it really is impacting our organs and disease itself,” she says. What are microplastics? Though plastics have become ubiquitous in modern life, they weren’t invented until the mid-1800s and weren’t produced on a large scale until the 1950s. Over the past century, technology to create a huge variety of malleable polymers (chains of large, repeating molecules) has evolved into the umbrella term plastics, which are often derived from petroleum and other fossil fuels, according to the Science History Institute in Philadelphia. Plastics are used in most containers and packaging materials; in most of the fabrics that make clothing, bedding, carpeting, and towels; in the construction of buildings and motor vehicles; and in many of the materials used in health care settings to prevent the spread of infection, among many other uses. The production of plastics worldwide has doubled in the last two decades, according to Our World in Data. Plastic’s versatility, durability, and low weight-to-strength ratio have made it an efficient material for many of life’s modern conveniences. However, by their nature, plastics can break down and degrade into smaller pieces. At the same time, scientists have found that plastic materials can exist for decades, if not longer, without completely disintegrating. Scientists have studied the impact of plastic on the ecological environment for decades and have raised concerns about the health effects of some chemicals used in plastics. But it’s only within the last several years that researchers have discovered the extent to which microplastics (which range from 1 nanometer, 1/80,000 the width of a strand of hair, to 5 millimeters, the size of a pencil-top eraser) and nanoplastics (which are even smaller and invisible) have become embedded in the environment and in human bodies, explains Tracey Woodruff, PhD, MPH, a professor in the Department of Obstetrics, Gynecology, and Reproductive Sciences and director of the Program on Reproductive Health and the Environment at the University of California San Francisco (UCSF) School of Medicine. Woodruff, who has studied the effect of some chemicals found in plastics on human health, reproduction, and development for two decades, first started looking into microplastics in 2021. She and a group of scientists from across the University of California system reviewed hundreds of existing studies on microplastics and health and compiled a report for state lawmakers to consider during policymaking. Though mostly based on animal studies, Woodruff and her colleagues concluded that there was evidence that microplastics could harm fertility and increase cancer risk in humans. “Governments have not really fully figured out what they’re going to do about this,” Woodruff says. There have been some efforts to ban the use of plastic microbeads in cosmetics, but not much beyond that, she adds. Red flags for human health While there haven’t yet been any definitive studies showing that microplastics cause health problems in humans, researchers have identified several red flags that call for further investigation. In Ross’ research in mice, for example, the scientists used plastic particles that were “clean,” meaning that they did not have any of the known toxic chemicals found in many plastics and they were also free of bacteria and viruses that microplastics can pick up from environmental exposure. And yet, with the mere presence of the microplastics, the mice began to experience negative effects. This could be because the immune system recognizes the presence of a foreign invader and triggers inflammation, which can have a negative effect on a range of organs. “We just wanted to see the effect of plastic itself, but that’s not what is really in the environment,” Ross says. “Plastics in the environment are not this way; they’re not pristine.” Ross’ work has raised even more questions about microplastics in the body. “We’re trying to understand: How are they getting into the brain? What do they do? Where do they go? Do they get out?” she says. Sheela Sathyanarayana, MD, MPH, a professor in the University of Washington Department of Pediatrics and the Department of Environmental and Occupational Health Sciences, worries that the harm from microplastics in the body could be compounded by what are known as endocrine disrupting chemicals that are found in many plastics. Bisphenol A (BPA), phthalates, and per- and polyfluoroalkyl substances (PFAS) are just a few of the chemicals known to imitate hormones and disrupt the body’s natural endocrine system, which is responsible for making the hormones that govern processes such as growth and development, metabolism, appetite, mood, and certain aspects of reproduction. Sathyanarayana has focused her research on studying the impact of exposure to endocrine disrupting chemicals on reproduction and has found that they can have a profound impact, especially during fetal development. “That’s when organ development is happening; that’s when programming for later life happens,” Sathyanarayana says. “Whatever happens during pregnancy will affect your later life and health for the whole continuum.” She gave the example of research that found some women who experience famine while pregnant later have babies who experience obesity, likely because of the effect their mothers’ starvation has on the development of the babies’ metabolism. Fetal exposure to endocrine disrupting chemicals has been associated with abnormal development of reproductive organs in male babies, with increased risk of metabolic disorders in childhood, and may be associated with the child developing attention deficit hyperactivity disorder (ADHD). Some of these chemicals have also been linked to lower sperm quality in men.
<TASK DESCRIPTION> Only use the provided text to answer the question, no outside sources. <QUESTION> I found this alarming article about microplastics making their way into the human body. Using this article as a reference, please explain what the red flags are for humans in regards to microplastics. Use at least 400 words. <TEXT> When Jaime Ross, PhD, a neuroscientist and assistant professor at the University of Rhode Island College of Pharmacy, decided to study how contaminating the drinking water of mice with tiny fragments of plastic might affect their cognitive function, she didn’t expect the experiment to yield much. But in just three weeks, Ross and her team found microplastics had made their way into the mice’s brains, passing the robust defenses of the blood-brain barrier. The researchers performed a variety of tests and found that the microplastic-exposed mice started exhibiting signs of cognitive decline similar to dementia. “I didn’t really think we were going to see anything,” Ross says. But when they examined the mice’s tissues, they were shocked. “Every one we looked at we found the microplastics. It was surprising, especially finding them in the brain. Things are not supposed to go there!” The research findings from Ross’ team, published in August 2023, add to a slew of recent studies pointing to an alarming trend: microplastics are everywhere. Minuscule plastic particles that come from degraded plastic products are found throughout the environment. Scientists estimate there are 8-10 million metric tons of plastics in the oceans, and some of that is consumed by fish and other wildlife. Microplastics have been detected in fruits and vegetables, plastic water bottles, the air, cosmetics, and household dust. Now, researchers are finding them in almost every part of the human body, including in breast milk, the placenta, testicles, hearts, livers, and kidneys. Despite these findings, experts say that little is known and understood about what impact these microplastics have on human health. A few studies have drawn associations between microplastics and poor health outcomes, including cardiovascular disease and low male fertility. And chemicals often found in plastics are known to cause a variety of health problems, including cancers, metabolic disorders, attention deficit/hyperactivity disorder, and fertility issues. But most of the studies raising alarm have been in labs or in animal models that don’t give a complete picture of the effect on humans, says Mary Margaret Johnson, MD, PhD, a principal research scientist of environmental health at Harvard T.H. Chan School of Public Health in Boston. “I do think there needs to be more funding devoted to researching how it really is impacting our organs and disease itself,” she says. What are microplastics? Though plastics have become ubiquitous in modern life, they weren’t invented until the mid-1800s and weren’t produced on a large scale until the 1950s. Over the past century, technology to create a huge variety of malleable polymers (chains of large, repeating molecules) has evolved into the umbrella term plastics, which are often derived from petroleum and other fossil fuels, according to the Science History Institute in Philadelphia. Plastics are used in most containers and packaging materials; in most of the fabrics that make clothing, bedding, carpeting, and towels; in the construction of buildings and motor vehicles; and in many of the materials used in health care settings to prevent the spread of infection, among many other uses. The production of plastics worldwide has doubled in the last two decades, according to Our World in Data. Plastic’s versatility, durability, and low weight-to-strength ratio have made it an efficient material for many of life’s modern conveniences. However, by their nature, plastics can break down and degrade into smaller pieces. At the same time, scientists have found that plastic materials can exist for decades, if not longer, without completely disintegrating. Scientists have studied the impact of plastic on the ecological environment for decades and have raised concerns about the health effects of some chemicals used in plastics. But it’s only within the last several years that researchers have discovered the extent to which microplastics (which range from 1 nanometer, 1/80,000 the width of a strand of hair, to 5 millimeters, the size of a pencil-top eraser) and nanoplastics (which are even smaller and invisible) have become embedded in the environment and in human bodies, explains Tracey Woodruff, PhD, MPH, a professor in the Department of Obstetrics, Gynecology, and Reproductive Sciences and director of the Program on Reproductive Health and the Environment at the University of California San Francisco (UCSF) School of Medicine. Woodruff, who has studied the effect of some chemicals found in plastics on human health, reproduction, and development for two decades, first started looking into microplastics in 2021. She and a group of scientists from across the University of California system reviewed hundreds of existing studies on microplastics and health and compiled a report for state lawmakers to consider during policymaking. Though mostly based on animal studies, Woodruff and her colleagues concluded that there was evidence that microplastics could harm fertility and increase cancer risk in humans. “Governments have not really fully figured out what they’re going to do about this,” Woodruff says. There have been some efforts to ban the use of plastic microbeads in cosmetics, but not much beyond that, she adds. Red flags for human health While there haven’t yet been any definitive studies showing that microplastics cause health problems in humans, researchers have identified several red flags that call for further investigation. In Ross’ research in mice, for example, the scientists used plastic particles that were “clean,” meaning that they did not have any of the known toxic chemicals found in many plastics and they were also free of bacteria and viruses that microplastics can pick up from environmental exposure. And yet, with the mere presence of the microplastics, the mice began to experience negative effects. This could be because the immune system recognizes the presence of a foreign invader and triggers inflammation, which can have a negative effect on a range of organs. “We just wanted to see the effect of plastic itself, but that’s not what is really in the environment,” Ross says. “Plastics in the environment are not this way; they’re not pristine.” Ross’ work has raised even more questions about microplastics in the body. “We’re trying to understand: How are they getting into the brain? What do they do? Where do they go? Do they get out?” she says. Sheela Sathyanarayana, MD, MPH, a professor in the University of Washington Department of Pediatrics and the Department of Environmental and Occupational Health Sciences, worries that the harm from microplastics in the body could be compounded by what are known as endocrine disrupting chemicals that are found in many plastics. Bisphenol A (BPA), phthalates, and per- and polyfluoroalkyl substances (PFAS) are just a few of the chemicals known to imitate hormones and disrupt the body’s natural endocrine system, which is responsible for making the hormones that govern processes such as growth and development, metabolism, appetite, mood, and certain aspects of reproduction. Sathyanarayana has focused her research on studying the impact of exposure to endocrine disrupting chemicals on reproduction and has found that they can have a profound impact, especially during fetal development. “That’s when organ development is happening; that’s when programming for later life happens,” Sathyanarayana says. “Whatever happens during pregnancy will affect your later life and health for the whole continuum.” She gave the example of research that found some women who experience famine while pregnant later have babies who experience obesity, likely because of the effect their mothers’ starvation has on the development of the babies’ metabolism. Fetal exposure to endocrine disrupting chemicals has been associated with abnormal development of reproductive organs in male babies, with increased risk of metabolic disorders in childhood, and may be associated with the child developing attention deficit hyperactivity disorder (ADHD). Some of these chemicals have also been linked to lower sperm quality in men. https://www.aamc.org/news/microplastics-are-inside-us-all-what-does-mean-our-health
You must only use information from the context. Please provide the answer in bullet points. if you are providing information from a quote then reference the quote's organisation.
How do consumer's feel about sustainability issues?
A couple of experts suggests that some sustainability issues such as health, nutrition and safety are more pertinent to mainstream consumers because they are more likely to affect them personally. These could potentially act as triggers to sensitise consumers to a wider range of sustainability issues: There’s a hierarchy and it starts with the personal. They expect [retailers] to pay close attention to those aspects of sustainability that might affect their health or the quality of the product. A bit further down there are the sort of broader citizenship areas that might more broadly affect them CR Expert/SRI Nevertheless, some see the need for further encouragement and support to take consumers down this path, and reject the view that consumers will take the lead in pressurising retailers to be more sustainable: I don’t think there will be a consumer-led revolution. I think consumers will need to be persuaded and brought along to give their permission to companies and governments to take the action that needs taking, not the other way round CR Expert/SRI There is also a sense that consumers need carrots not sticks and that successful retailers will be those that are better at persuading consumers of the benefits of making sustainable choices: Ultimately I think it’s not going to be very successful if consumers have to feel they’re giving things up, that there are things they can’t do. Where it seems to have been successful is if it’s presented as an opportunity to make a difference NGO/Interest Group
Context: A couple of experts suggests that some sustainability issues such as health, nutrition and safety are more pertinent to mainstream consumers because they are more likely to affect them personally. These could potentially act as triggers to sensitise consumers to a wider range of sustainability issues: There’s a hierarchy and it starts with the personal. They expect [retailers] to pay close attention to those aspects of sustainability that might affect their health or the quality of the product. A bit further down there are the sort of broader citizenship areas that might more broadly affect them CR Expert/SRI Nevertheless, some see the need for further encouragement and support to take consumers down this path, and reject the view that consumers will take the lead in pressurising retailers to be more sustainable: I don’t think there will be a consumer-led revolution. I think consumers will need to be persuaded and brought along to give their permission to companies and governments to take the action that needs taking, not the other way round CR Expert/SRI There is also a sense that consumers need carrots not sticks and that successful retailers will be those that are better at persuading consumers of the benefits of making sustainable choices: Ultimately I think it’s not going to be very successful if consumers have to feel they’re giving things up, that there are things they can’t do. Where it seems to have been successful is if it’s presented as an opportunity to make a difference NGO/Interest Group System instructions: You must only use information from the context. Please provide the answer in bullet points. if you are providing information from a quote then reference the quote's organisation. User question: How do consumer's feel about sustainability issues?
Please use only the information provided in the text. If you cannot provide an answer from the text, please say, "I cannot assess due to lack of context."
For a pregnant person suspected to have placenta accreta spectrum, what type of doctors/consultants are needed in the operating room?
**"Caesarean Birth"** Care for women with placenta accreta spectrum in specialist centres 1.2.9 Consider an MRI scan to complement ultrasound findings when planning ongoing surgical management of placenta accreta spectrum. Discuss the following with the woman or pregnant person: • what to expect during an MRI procedure • that MRI can help clarify the degree of invasion, particularly with a posterior placenta • that current experience suggests that MRI is safe, but that there is a lack of evidence about any long-term risks to the baby. [2024] 1.2.10 Discuss birth options (for example, timing of birth, operative interventions including possibility of hysterectomy, need for blood transfusion) with a woman or pregnant person suspected to have placenta accreta spectrum. This discussion should be carried out by a senior obstetrician. [2011, amended 2024] When planning a caesarean birth for women or pregnant people suspected to have placenta accreta spectrum, the multidisciplinary team should: • agree which other healthcare professionals need to be consulted or present (for example, specialists in gynaecological surgery, interventional radiology, colorectal surgery, urology or vascular surgery, depending on the nature of the placenta accreta spectrum) and • the responsibilities of each team member. [2011, amended 2024] 1.2.12 When performing a planned caesarean birth for a woman or pregnant person suspected to have placenta accreta spectrum, ensure that: • a consultant obstetrician, a consultant gynaecologist and a consultant anaesthetist are present in the operating theatre • a paediatric or neonatal registrar or consultant is present to provide immediate care for the baby as soon as it is born • a haematology registrar or consultant is available to contact for advice • a critical care bed is available for the woman or pregnant person, and a critical care neonatal cot is available for the baby (although emergency surgery should not be delayed while waiting for a bed) • sufficient cross-matched blood and blood products are readily available (if blood transfusions are acceptable to the woman or pregnant person). See the NICE guideline on blood transfusion. [2011, amended 2024] 1.2.13 Specialist placenta accreta spectrum centres and the local maternity units they support should develop protocols covering how placenta accreta spectrum should be diagnosed, assessed and managed across their network. The protocol should include the care and management of placenta accreta spectrum identified late in pregnancy or in labour, including how specialist units can support emergency care in local maternity units. [2024] Predicting caesarean birth for cephalopelvic disproportion in labour 1.2.14 Do not use pelvimetry for decision making about mode of birth. [2004, amended 2021] 1.2.15 Do not use the following for decision making about mode of birth, as they do not accurately predict cephalopelvic disproportion: • maternal shoe size • maternal height • estimations of fetal size (ultrasound or clinical examination). [2004, amended 2021] Mother-to-child transmission of maternal infections HIV 1.2.16 Provide women with HIV information about the benefits and risks for them and their baby of the HIV treatment options and mode of birth as early as possible in their pregnancy, so that they can make an informed decision. Obtain specialist advice about HIV in pregnancy from a sexual health specialist if necessary. [2011, amended 2021] Hepatitis B virus 1.2.17 Do not offer pregnant women with hepatitis B a planned caesarean birth for this reason alone, as mother-to-baby transmission of hepatitis B can be reduced if the baby receives immunoglobulin and vaccination. [2004, amended 2021] Hepatitis C virus 1.2.18 Do not offer women who are infected with hepatitis C a planned caesarean birth for this reason alone. [2004, amended 2021] 1.2.19 Offer pregnant women who are co-infected with hepatitis C virus and HIV a planned caesarean birth to reduce mother-to-baby transmission of hepatitis C virus and HIV. [2004, amended 2021] Herpes simplex virus 1.2.20 Offer women with primary genital herpes simplex virus (HSV) infection occurring in the third trimester of pregnancy a planned caesarean birth to decrease the risk of neonatal HSV infection. [2004] 1.2.21 Do not routinely offer pregnant women with recurrent HSV infection a planned caesarean birth outside of the context of research. [2004, amended 2021] Body mass index 1.2.22 Do not use a BMI of over 50 kg/m2 alone as an indication for planned caesarean birth. [2011] Shared decision making 1.2.23 Ask for consent for caesarean birth only after providing pregnant women with evidence-based information. Ensure the woman's dignity, privacy, views and culture are respected, while taking the woman's clinical situation into account. [2004, amended 2021] 1.2.24 Advise women that they are entitled to decline the offer of treatment such as caesarean birth, even when it would benefit their or their baby's health. [2004, amended 2021] 1.2.25 When a woman decides on or declines a caesarean birth, document the factors that that are important to the woman when making her decision. [2004, amended 2021] Maternal choice for caesarean birth 1.2.26 When a woman or pregnant person with no medical indication for a caesarean birth requests a caesarean birth: • offer to discuss and explore the reasons for the request • ensure they have balanced and accurate information • offer to discuss alternative birth options (for example, place of birth, continuity of midwifery care where available, pain relief options), which may help address concerns they have about the birth • offer discussions with a consultant midwife or senior midwife, ideally in a birth options clinic or at a birth options appointment • offer discussions with a consultant or senior obstetrician and other members of the team (for example, an anaesthetist) if necessary or requested by the woman or pregnant person • record the discussions and decisions. [2011, amended 2023] 1.2.27 If a woman or pregnant person requests a caesarean birth, discuss the overall benefits and risks of caesarean birth compared with vaginal birth (see the section on planning mode of birth) and record that this discussion has taken place. [2011] 1.2.28 If a woman or pregnant person requests a caesarean birth because they have tokophobia or other severe anxiety about childbirth (for example, following abuse or a previous traumatic event), offer referral to a healthcare professional with expertise in providing perinatal mental health support to help with their anxiety. See the NICE guideline on antenatal and postnatal mental health for more detailed advice on providing mental health services during pregnancy. [2011, amended 2021] 1.2.29 Ensure healthcare professionals providing perinatal mental health support for women or pregnant people with tokophobia or other severe anxiety about childbirth are able to access the planned place of birth with the woman or pregnant person during the antenatal period, as part of the support offered to help them overcome fears and concerns about the labour and birth. [2011, amended 2023] 1.2.30 If, after an informed discussion about the options for birth (including the offer of perinatal mental health support if appropriate; see recommendation 1.2.27), the woman or pregnant person requests a caesarean birth, support their choice. [2011, amended 2023] 1.2.31 If a woman or pregnant person requests a caesarean birth this should be offered within their obstetric unit. [2011, amended 2023]
<Instructions> ========== Please use only the information provided in the text. If you cannot provide an answer from the text, please say, "I cannot assess due to lack of context." <Query> ========== For a pregnant person suspected to have placenta accreta spectrum, what type of doctors/consultants are needed in the operating room? <Passage> ========== **"Caesarean Birth"** Care for women with placenta accreta spectrum in specialist centres 1.2.9 Consider an MRI scan to complement ultrasound findings when planning ongoing surgical management of placenta accreta spectrum. Discuss the following with the woman or pregnant person: • what to expect during an MRI procedure • that MRI can help clarify the degree of invasion, particularly with a posterior placenta • that current experience suggests that MRI is safe, but that there is a lack of evidence about any long-term risks to the baby. [2024] 1.2.10 Discuss birth options (for example, timing of birth, operative interventions including possibility of hysterectomy, need for blood transfusion) with a woman or pregnant person suspected to have placenta accreta spectrum. This discussion should be carried out by a senior obstetrician. [2011, amended 2024] When planning a caesarean birth for women or pregnant people suspected to have placenta accreta spectrum, the multidisciplinary team should: • agree which other healthcare professionals need to be consulted or present (for example, specialists in gynaecological surgery, interventional radiology, colorectal surgery, urology or vascular surgery, depending on the nature of the placenta accreta spectrum) and • the responsibilities of each team member. [2011, amended 2024] 1.2.12 When performing a planned caesarean birth for a woman or pregnant person suspected to have placenta accreta spectrum, ensure that: • a consultant obstetrician, a consultant gynaecologist and a consultant anaesthetist are present in the operating theatre • a paediatric or neonatal registrar or consultant is present to provide immediate care for the baby as soon as it is born • a haematology registrar or consultant is available to contact for advice • a critical care bed is available for the woman or pregnant person, and a critical care neonatal cot is available for the baby (although emergency surgery should not be delayed while waiting for a bed) • sufficient cross-matched blood and blood products are readily available (if blood transfusions are acceptable to the woman or pregnant person). See the NICE guideline on blood transfusion. [2011, amended 2024] 1.2.13 Specialist placenta accreta spectrum centres and the local maternity units they support should develop protocols covering how placenta accreta spectrum should be diagnosed, assessed and managed across their network. The protocol should include the care and management of placenta accreta spectrum identified late in pregnancy or in labour, including how specialist units can support emergency care in local maternity units. [2024] Predicting caesarean birth for cephalopelvic disproportion in labour 1.2.14 Do not use pelvimetry for decision making about mode of birth. [2004, amended 2021] 1.2.15 Do not use the following for decision making about mode of birth, as they do not accurately predict cephalopelvic disproportion: • maternal shoe size • maternal height • estimations of fetal size (ultrasound or clinical examination). [2004, amended 2021] Mother-to-child transmission of maternal infections HIV 1.2.16 Provide women with HIV information about the benefits and risks for them and their baby of the HIV treatment options and mode of birth as early as possible in their pregnancy, so that they can make an informed decision. Obtain specialist advice about HIV in pregnancy from a sexual health specialist if necessary. [2011, amended 2021] Hepatitis B virus 1.2.17 Do not offer pregnant women with hepatitis B a planned caesarean birth for this reason alone, as mother-to-baby transmission of hepatitis B can be reduced if the baby receives immunoglobulin and vaccination. [2004, amended 2021] Hepatitis C virus 1.2.18 Do not offer women who are infected with hepatitis C a planned caesarean birth for this reason alone. [2004, amended 2021] 1.2.19 Offer pregnant women who are co-infected with hepatitis C virus and HIV a planned caesarean birth to reduce mother-to-baby transmission of hepatitis C virus and HIV. [2004, amended 2021] Herpes simplex virus 1.2.20 Offer women with primary genital herpes simplex virus (HSV) infection occurring in the third trimester of pregnancy a planned caesarean birth to decrease the risk of neonatal HSV infection. [2004] 1.2.21 Do not routinely offer pregnant women with recurrent HSV infection a planned caesarean birth outside of the context of research. [2004, amended 2021] Body mass index 1.2.22 Do not use a BMI of over 50 kg/m2 alone as an indication for planned caesarean birth. [2011] Shared decision making 1.2.23 Ask for consent for caesarean birth only after providing pregnant women with evidence-based information. Ensure the woman's dignity, privacy, views and culture are respected, while taking the woman's clinical situation into account. [2004, amended 2021] 1.2.24 Advise women that they are entitled to decline the offer of treatment such as caesarean birth, even when it would benefit their or their baby's health. [2004, amended 2021] 1.2.25 When a woman decides on or declines a caesarean birth, document the factors that that are important to the woman when making her decision. [2004, amended 2021] Maternal choice for caesarean birth 1.2.26 When a woman or pregnant person with no medical indication for a caesarean birth requests a caesarean birth: • offer to discuss and explore the reasons for the request • ensure they have balanced and accurate information • offer to discuss alternative birth options (for example, place of birth, continuity of midwifery care where available, pain relief options), which may help address concerns they have about the birth • offer discussions with a consultant midwife or senior midwife, ideally in a birth options clinic or at a birth options appointment • offer discussions with a consultant or senior obstetrician and other members of the team (for example, an anaesthetist) if necessary or requested by the woman or pregnant person • record the discussions and decisions. [2011, amended 2023] 1.2.27 If a woman or pregnant person requests a caesarean birth, discuss the overall benefits and risks of caesarean birth compared with vaginal birth (see the section on planning mode of birth) and record that this discussion has taken place. [2011] 1.2.28 If a woman or pregnant person requests a caesarean birth because they have tokophobia or other severe anxiety about childbirth (for example, following abuse or a previous traumatic event), offer referral to a healthcare professional with expertise in providing perinatal mental health support to help with their anxiety. See the NICE guideline on antenatal and postnatal mental health for more detailed advice on providing mental health services during pregnancy. [2011, amended 2021] 1.2.29 Ensure healthcare professionals providing perinatal mental health support for women or pregnant people with tokophobia or other severe anxiety about childbirth are able to access the planned place of birth with the woman or pregnant person during the antenatal period, as part of the support offered to help them overcome fears and concerns about the labour and birth. [2011, amended 2023] 1.2.30 If, after an informed discussion about the options for birth (including the offer of perinatal mental health support if appropriate; see recommendation 1.2.27), the woman or pregnant person requests a caesarean birth, support their choice. [2011, amended 2023] 1.2.31 If a woman or pregnant person requests a caesarean birth this should be offered within their obstetric unit. [2011, amended 2023]
This task requires you to answer questions based solely on the information provided in the prompt. You are not allowed to use any alternative sources of information.
Summarize how venous eczema affects the human body.
VENOUS ECZEMA What are the aims of this leaflet? This leaflet has been written to help you understand more about venous eczema. It tells you what it is, what causes it, what can be done about it, and where you can find out more about it. What is venous eczema? Venous eczema is also known as varicose or stasis eczema and is the name given to a type of eczema on the lower leg. The word eczema (or dermatitis) refers to a common inflammatory skin condition. Venous eczema is more common as people get older and occurs more often in women than in men. What causes it? Venous eczema occurs when valves in the leg veins do not work properly, reducing drainage of blood from the legs. This leads to an increase in the pressure inside the leg veins. This congestion then causes damage to the overlying skin. The exact reason why the resulting skin changes occur is unclear, but is likely to be due to the increase in pressure pushing blood and blood products from the veins into the surrounding tissue. This then triggers inflammation in the skin. Being overweight, immobility, leg swelling, varicose veins, previous clots in the leg (venous thrombosis) and previous cellulitis are possible contributory factors. Is it hereditary? No. What are the features? Venous eczema occurs on the lower legs. The features vary depending on the severity and range from changes in skin colouring and dryness of the skin to areas of inflamed eczema with red spots, scaling, weeping and/or crusting. The eczema is often very itchy and can sometimes be painful. Swelling of the legs and varicose veins may also be present. In severe cases, white patches of skin, thinning and scarring (atrophie blanche) may be seen. Sometimes thickening of large areas of skin on the lower leg (lipodermatosclerosis) can occur and may be painful. Leg ulcers can also develop. Sometimes, venous eczema can trigger the development of eczema elsewhere on the body; this is known as secondary eczema. How is venous eczema diagnosed? It is usually a clinical diagnosis, based on its typical appearance and associated features. There are some other causes of a rash on the lower leg, such as allergic contact dermatitis (when a person develops an allergy to substances or treatments used on the skin) and irritant contact dermatitis (when the skin becomes irritated by secretions, bacteria or certain treatments). Doctors and nurses who regularly look after patients with venous eczema are usually able to identify which of these rashes is the most likely. On some occasions it may be necessary to carry out further investigations when the diagnosis is not clear. Can it be cured? Unfortunately, the problem of the valves in the veins not working properly cannot be cured; this means that venous eczema does not clear up completely if left untreated. However, simple measures to improve the function of the valves and treatments for the active eczema can greatly improve the skin and associated symptoms, keep the eczema under control and help to prevent complications such as leg swelling, infection and lipodermatosclerosis. How is it treated? Simple measures are very important in helping to reduce pressure in the veins. These include ensuring your weight is within the normal range and keeping physically active. Due to the effect of gravity exerting additional pressure on the veins, venous eczema can be made worse by spending long periods of time standing still or sitting, for example by sleeping in a chair. For this reason, it is recommended that when possible you raise your legs for at least part of the day; ideally above the level of your heart by lying down. Elevating the foot of the bed overnight can also be helpful. Care also needs to be taken to avoid damaging the skin on the leg, for example it is important to avoid knocking or hitting the leg on hard objects (such as supermarket shelves, trolleys, doors of kitchen cupboards, etc.). Such relatively minor injuries often take months to heal and can significantly impair healing of the eczema. Bandaging and compression stockings are another simple measure that help to reduce the pressure in the leg veins. Bandaging may be used when leg swelling is severe; once this swelling is reduced and the eczema is improved, compression stockings are used to maintain this. Compression stockings are available on prescription and should be worn long-term at all times during the day in order to support the veins. Compression stockings should not be used in patients with arterial disease in the legs. Your dermatologist or doctor can advise you about this and a simple test measuring your leg circulation is often performed before using compression stockings. Topical emollients (moisturisers) should be used at least daily to all the skin on the lower leg, whether affected or not; these make the skin more supple and can help to prevent the skin breaking down. Emollients should also be used as a soap substitute. Steroid ointments are often recommended to treat itchy flares in venous eczema; these should be applied to the affected patches of skin only. CAUTION: This leaflet mentions ‘emollients’ (moisturisers). When paraffincontaining emollient products get in contact with dressings, clothing, bed linen or hair, there is a danger that a naked flame or cigarette smoking could cause these to catch fire. To reduce the fire risk, patients using paraffin-containing skincare or haircare products are advised to avoid naked flames completely, including smoking cigarettes and being near people who are smoking or using naked flames. It is also advisable to wash clothing and bed linen regularly, preferably daily. In some situations a varicose vein operation may be helpful. In general, the responses to the above measures are good if they are used every day on a long-term basis. If the response is poor despite doing these treatments every day, it may be necessary to seek advice from your GP or dermatologist in case there is another cause for the leg rash, for example, a fungal skin or toe nail infection, or the development of a contact allergy to different topical agents used. Where can I find out more about venous eczema? Web links to detailed leaflets: www.cks.nhs.uk/venous_eczema_and_lipodermatosclerosis www.patient.co.uk/doctor/Varicose-Eczema.htm www.dermnetnz.org/dermatitis/venous-eczema.html For details of source materials used please contact the Clinical Standards Unit ([email protected]). This leaflet aims to provide accurate information about the subject and is a consensus of the views held by representatives of the British Association of Dermatologists: individual patient circumstances may differ, which might alter both the advice and course of therapy given to you by your doctor.
System Instructions: This task requires you to answer questions based solely on the information provided in the prompt. You are not allowed to use any alternative sources of information. Question: Summarize how venous eczema affects the human body. Context Block: VENOUS ECZEMA What are the aims of this leaflet? This leaflet has been written to help you understand more about venous eczema. It tells you what it is, what causes it, what can be done about it, and where you can find out more about it. What is venous eczema? Venous eczema is also known as varicose or stasis eczema and is the name given to a type of eczema on the lower leg. The word eczema (or dermatitis) refers to a common inflammatory skin condition. Venous eczema is more common as people get older and occurs more often in women than in men. What causes it? Venous eczema occurs when valves in the leg veins do not work properly, reducing drainage of blood from the legs. This leads to an increase in the pressure inside the leg veins. This congestion then causes damage to the overlying skin. The exact reason why the resulting skin changes occur is unclear, but is likely to be due to the increase in pressure pushing blood and blood products from the veins into the surrounding tissue. This then triggers inflammation in the skin. Being overweight, immobility, leg swelling, varicose veins, previous clots in the leg (venous thrombosis) and previous cellulitis are possible contributory factors. Is it hereditary? No. What are the features? Venous eczema occurs on the lower legs. The features vary depending on the severity and range from changes in skin colouring and dryness of the skin to areas of inflamed eczema with red spots, scaling, weeping and/or crusting. The eczema is often very itchy and can sometimes be painful. Swelling of the legs and varicose veins may also be present. In severe cases, white patches of skin, thinning and scarring (atrophie blanche) may be seen. Sometimes thickening of large areas of skin on the lower leg (lipodermatosclerosis) can occur and may be painful. Leg ulcers can also develop. Sometimes, venous eczema can trigger the development of eczema elsewhere on the body; this is known as secondary eczema. How is venous eczema diagnosed? It is usually a clinical diagnosis, based on its typical appearance and associated features. There are some other causes of a rash on the lower leg, such as allergic contact dermatitis (when a person develops an allergy to substances or treatments used on the skin) and irritant contact dermatitis (when the skin becomes irritated by secretions, bacteria or certain treatments). Doctors and nurses who regularly look after patients with venous eczema are usually able to identify which of these rashes is the most likely. On some occasions it may be necessary to carry out further investigations when the diagnosis is not clear. Can it be cured? Unfortunately, the problem of the valves in the veins not working properly cannot be cured; this means that venous eczema does not clear up completely if left untreated. However, simple measures to improve the function of the valves and treatments for the active eczema can greatly improve the skin and associated symptoms, keep the eczema under control and help to prevent complications such as leg swelling, infection and lipodermatosclerosis. How is it treated? Simple measures are very important in helping to reduce pressure in the veins. These include ensuring your weight is within the normal range and keeping physically active. Due to the effect of gravity exerting additional pressure on the veins, venous eczema can be made worse by spending long periods of time standing still or sitting, for example by sleeping in a chair. For this reason, it is recommended that when possible you raise your legs for at least part of the day; ideally above the level of your heart by lying down. Elevating the foot of the bed overnight can also be helpful. Care also needs to be taken to avoid damaging the skin on the leg, for example it is important to avoid knocking or hitting the leg on hard objects (such as supermarket shelves, trolleys, doors of kitchen cupboards, etc.). Such relatively minor injuries often take months to heal and can significantly impair healing of the eczema. Bandaging and compression stockings are another simple measure that help to reduce the pressure in the leg veins. Bandaging may be used when leg swelling is severe; once this swelling is reduced and the eczema is improved, compression stockings are used to maintain this. Compression stockings are available on prescription and should be worn long-term at all times during the day in order to support the veins. Compression stockings should not be used in patients with arterial disease in the legs. Your dermatologist or doctor can advise you about this and a simple test measuring your leg circulation is often performed before using compression stockings. Topical emollients (moisturisers) should be used at least daily to all the skin on the lower leg, whether affected or not; these make the skin more supple and can help to prevent the skin breaking down. Emollients should also be used as a soap substitute. Steroid ointments are often recommended to treat itchy flares in venous eczema; these should be applied to the affected patches of skin only. CAUTION: This leaflet mentions ‘emollients’ (moisturisers). When paraffincontaining emollient products get in contact with dressings, clothing, bed linen or hair, there is a danger that a naked flame or cigarette smoking could cause these to catch fire. To reduce the fire risk, patients using paraffin-containing skincare or haircare products are advised to avoid naked flames completely, including smoking cigarettes and being near people who are smoking or using naked flames. It is also advisable to wash clothing and bed linen regularly, preferably daily. In some situations a varicose vein operation may be helpful. In general, the responses to the above measures are good if they are used every day on a long-term basis. If the response is poor despite doing these treatments every day, it may be necessary to seek advice from your GP or dermatologist in case there is another cause for the leg rash, for example, a fungal skin or toe nail infection, or the development of a contact allergy to different topical agents used. Where can I find out more about venous eczema? Web links to detailed leaflets: www.cks.nhs.uk/venous_eczema_and_lipodermatosclerosis www.patient.co.uk/doctor/Varicose-Eczema.htm www.dermnetnz.org/dermatitis/venous-eczema.html For details of source materials used please contact the Clinical Standards Unit ([email protected]). This leaflet aims to provide accurate information about the subject and is a consensus of the views held by representatives of the British Association of Dermatologists: individual patient circumstances may differ, which might alter both the advice and course of therapy given to you by your doctor.
<TASK DESCRIPTION> Only use the provided text to answer the question, no outside sources. <QUESTION> [user request] <TEXT> [context document]
My husband and I have three children and I have been a stay at home mom for 10 years. My oldest daughter is 11. My husband's 16 year old daughter from a previous marriage wants to babysit for us. If we pay her to babysit can be we qualify for the dependent care credit?
You may be able to claim the child and dependent care credit if you paid expenses for the care of a qualifying individual to enable you (and your spouse, if filing a joint return) to work or actively look for work. Generally, you may not take this credit if your filing status is married filing separately. However, see What's Your Filing Status? in Publication 503, Child and Dependent Care Expenses, which describes an exception for certain taxpayers living apart from their spouse and meeting other requirements. The amount of the credit is a percentage of the amount of work-related expenses you paid to a care provider for the care of a qualifying individual. The percentage depends on your adjusted gross income. Dollar limit The total expenses that you may use to calculate the credit may not be more than $3,000 (for one qualifying individual) or $6,000 (for two or more qualifying individuals). Expenses paid for the care of a qualifying individual are eligible expenses if the primary reason for paying the expense is to assure the individual's well-being and protection. If you received dependent care benefits that you exclude or deduct from your income, you must subtract the amount of those benefits from the dollar limit that applies to you. Qualifying individual A qualifying individual for the child and dependent care credit is: Your dependent qualifying child who was under age 13 when the care was provided, Your spouse who was physically or mentally incapable of self-care and lived with you for more than half of the year, or An individual who was physically or mentally incapable of self-care, lived with you for more than half of the year, and either: (a) was your dependent; or (b) could have been your dependent except that he or she received gross income of $4,700 or more, or filed a joint return, or you (or your spouse, if filing jointly) could have been claimed as a dependent on another taxpayer's 2023 return. Physically or mentally not able to care for oneself - An individual is physically or mentally incapable of self-care if, as a result of a physical or mental defect, the individual is incapable of caring for his or her hygiene or nutritional needs or requires the full-time attention of another person for the individual's own safety or the safety of others. Children of divorced or separated parents or parents living apart - A noncustodial parent who is claiming a child as a dependent should review the rules under the topic Child of divorced or separated parents or parents living apart in Publication 503, because a child may be treated as the qualifying individual of the custodial parent for the child and dependent care credit, even if the noncustodial parent is entitled to claim the child as a dependent. Individual qualifying for part of year - If an individual is a qualifying individual for only a part of the tax year, only those expenses paid for care of the individual during that part of the year are included in calculating the credit. Taxpayer identification number (TIN) - You must provide the TIN (usually the Social Security number) of each qualifying individual. Care of a qualifying individual The care may be provided in the household or outside the household; however, don't include any amounts that aren't primarily for the well-being of the individual. You should divide the expenses between amounts that are primarily for the care of the individual and amounts that aren't primarily for the care of the individual. You must reduce the expenses primarily for the care of the individual by the amount of any dependent care benefits provided by your employer that you exclude from gross income. In general, you can exclude up to $5,000 for dependent care benefits received from your employer. Additionally, in general, the expenses claimed may not exceed the smaller of your earned income or your spouse's earned income. If you or your spouse is a full-time student or incapable of self-care, then you or your spouse is treated as having earned income for each month that you or your spouse is a full-time student or incapable of self-care. Your or your spouse's earned income for each month is $250 if there is one qualifying person ($500 if two or more qualifying individuals). See the topic Earned Income Limit in Publication 503 PDF for further information. Care providers You must identify all persons or organizations that provide care for your child or dependent. You must report the name, address, and TIN (either the Social Security number or the employer identification number) of the care provider on your return. If the care provider is a tax-exempt organization, you need only report the name and address of the organization on your return. You can use Form W-10, Dependent Care Provider's Identification and Certification to request this information from the care provider. If you can't provide information regarding the care provider, you may still be eligible for the credit if you can show that you exercised due diligence in attempting to provide the required information. If you pay a provider to care for your dependent or spouse in your home, you may be a household employer. If you're a household employer, you may have to withhold and pay Social Security and Medicare taxes and pay federal unemployment tax. For more information, refer to Do You Have Household Employees? in Publication 503, Publication 926, Household Employer's Tax Guide, or Topic no. 756. Payments to relatives or dependents - The care provider can't be your spouse, the parent of your qualifying individual if your qualifying individual is your child and under age 13, your child who is under the age of 19, or a dependent whom you or your spouse may claim on your return. Reporting on your tax return If you qualify for the credit, complete Form 2441, Child and Dependent Care Expenses and attach to Form 1040, U.S Individual Income Tax Return, Form 1040-SR, U.S. Tax Return for Seniors or Form 1040-NR, U.S. Nonresident Alien Income Tax Return. If you received dependent care benefits from your employer (an amount is shown on your Form W-2, Wage and Tax Statement), you must complete Part III of Form 2441. Additional information For more information, refer to Am I eligible to claim the child and dependent care credit?
<TASK DESCRIPTION> Only use the provided text to answer the question, no outside sources. <QUESTION> My husband and I have three children and I have been a stay at home mom for 10 years. My oldest daughter is 11. My husband's 16 year old daughter from a previous marriage wants to babysit for us. If we pay her to babysit can be we qualify for the dependent care credit? <TEXT> You may be able to claim the child and dependent care credit if you paid expenses for the care of a qualifying individual to enable you (and your spouse, if filing a joint return) to work or actively look for work. Generally, you may not take this credit if your filing status is married filing separately. However, see What's Your Filing Status? in Publication 503, Child and Dependent Care Expenses, which describes an exception for certain taxpayers living apart from their spouse and meeting other requirements. The amount of the credit is a percentage of the amount of work-related expenses you paid to a care provider for the care of a qualifying individual. The percentage depends on your adjusted gross income. Dollar limit The total expenses that you may use to calculate the credit may not be more than $3,000 (for one qualifying individual) or $6,000 (for two or more qualifying individuals). Expenses paid for the care of a qualifying individual are eligible expenses if the primary reason for paying the expense is to assure the individual's well-being and protection. If you received dependent care benefits that you exclude or deduct from your income, you must subtract the amount of those benefits from the dollar limit that applies to you. Qualifying individual A qualifying individual for the child and dependent care credit is: Your dependent qualifying child who was under age 13 when the care was provided, Your spouse who was physically or mentally incapable of self-care and lived with you for more than half of the year, or An individual who was physically or mentally incapable of self-care, lived with you for more than half of the year, and either: (a) was your dependent; or (b) could have been your dependent except that he or she received gross income of $4,700 or more, or filed a joint return, or you (or your spouse, if filing jointly) could have been claimed as a dependent on another taxpayer's 2023 return. Physically or mentally not able to care for oneself - An individual is physically or mentally incapable of self-care if, as a result of a physical or mental defect, the individual is incapable of caring for his or her hygiene or nutritional needs or requires the full-time attention of another person for the individual's own safety or the safety of others. Children of divorced or separated parents or parents living apart - A noncustodial parent who is claiming a child as a dependent should review the rules under the topic Child of divorced or separated parents or parents living apart in Publication 503, because a child may be treated as the qualifying individual of the custodial parent for the child and dependent care credit, even if the noncustodial parent is entitled to claim the child as a dependent. Individual qualifying for part of year - If an individual is a qualifying individual for only a part of the tax year, only those expenses paid for care of the individual during that part of the year are included in calculating the credit. Taxpayer identification number (TIN) - You must provide the TIN (usually the Social Security number) of each qualifying individual. Care of a qualifying individual The care may be provided in the household or outside the household; however, don't include any amounts that aren't primarily for the well-being of the individual. You should divide the expenses between amounts that are primarily for the care of the individual and amounts that aren't primarily for the care of the individual. You must reduce the expenses primarily for the care of the individual by the amount of any dependent care benefits provided by your employer that you exclude from gross income. In general, you can exclude up to $5,000 for dependent care benefits received from your employer. Additionally, in general, the expenses claimed may not exceed the smaller of your earned income or your spouse's earned income. If you or your spouse is a full-time student or incapable of self-care, then you or your spouse is treated as having earned income for each month that you or your spouse is a full-time student or incapable of self-care. Your or your spouse's earned income for each month is $250 if there is one qualifying person ($500 if two or more qualifying individuals). See the topic Earned Income Limit in Publication 503 PDF for further information. Care providers You must identify all persons or organizations that provide care for your child or dependent. You must report the name, address, and TIN (either the Social Security number or the employer identification number) of the care provider on your return. If the care provider is a tax-exempt organization, you need only report the name and address of the organization on your return. You can use Form W-10, Dependent Care Provider's Identification and Certification to request this information from the care provider. If you can't provide information regarding the care provider, you may still be eligible for the credit if you can show that you exercised due diligence in attempting to provide the required information. If you pay a provider to care for your dependent or spouse in your home, you may be a household employer. If you're a household employer, you may have to withhold and pay Social Security and Medicare taxes and pay federal unemployment tax. For more information, refer to Do You Have Household Employees? in Publication 503, Publication 926, Household Employer's Tax Guide, or Topic no. 756. Payments to relatives or dependents - The care provider can't be your spouse, the parent of your qualifying individual if your qualifying individual is your child and under age 13, your child who is under the age of 19, or a dependent whom you or your spouse may claim on your return. Reporting on your tax return If you qualify for the credit, complete Form 2441, Child and Dependent Care Expenses and attach to Form 1040, U.S Individual Income Tax Return, Form 1040-SR, U.S. Tax Return for Seniors or Form 1040-NR, U.S. Nonresident Alien Income Tax Return. If you received dependent care benefits from your employer (an amount is shown on your Form W-2, Wage and Tax Statement), you must complete Part III of Form 2441. Additional information For more information, refer to Am I eligible to claim the child and dependent care credit? https://www.irs.gov/taxtopics/tc602
{instruction} ========== In your answer, refer only to the context document. Do not employ any outside knowledge {question} ========== [user request] {passage 0} ========== [context document]
My teen wants headphones for her birthday. She likes to listen to loud music and I'm worried about her hearing if she uses headphones. How can she safely use headphones?
Is anyone listening? Monitoring your teen's headphone volume can help avoid hearing loss As a parent, do you often find yourself asking your child to remove their headphones? You may want to consider doing it even more often. If you’re the parent of a teenager, you likely have concerns about the link between headphones and hearing loss. Today, 1 in 5 teens will experience some form of hearing loss—a rate about 30% higher than it was 20 years ago. Many experts believe the escalation is due, in part, to increased use of headphones. According to James E. Foy, DO, an osteopathic pediatrician from Vallejo, California, listening through headphones at a high volume for extended periods of time can result in lifelong hearing loss for children and teens. “Even a mild hearing loss due to excessive noise could lead to developmental delays in speech and language,” he cautions. Doctors of Osteopathic Medicine, or DOs, look beyond your symptoms to understand how lifestyle and environmental factors affect your wellbeing. They listen and partner with you to help prevent injury and encourage your body’s natural tendency toward self-healing. How loud is too loud? Most MP3 players today can produce sounds up to 120 decibels, equivalent to a sound level at a rock concert. At that level, hearing loss can occur after only about an hour and 15 minutes, warns Dr. Foy. “I stress to my patients and their parents that if you can’t hear anything going on around you when listening to headphones, the decibel level is too high,” he says. Dr. Foy advises that people should not exceed 60% of maximum volume when listening through headphones. How long is too long? Duration of exposure to noise is also a major factor when examining headphones and hearing loss. “As a rule of thumb, you should only use MP3 devices at levels up to 60% of maximum volume for a total of 60 minutes a day,” says Dr. Foy. “The louder the volume, the shorter your duration should be. At maximum volume, you should listen for only about five minutes a day.” What are the signs of hearing loss? “The type of hearing loss due to headphone use is typically gradual, cumulative and without obvious warning signs,” explains Dr. Foy. “A hearing test and a medical examination are the only way to truly diagnose hearing damage.” However, if you or your child experiences any of the following symptoms, Dr. Foy recommends a visit to a physician immediately: Ringing, roaring, hissing or buzzing in the ear. Difficulty understanding speech in noisy places or places with poor acoustics. Muffled sounds and a feeling that your ear is plugged. Listening to the TV or radio at a higher volume than in the past. What is the treatment for hearing loss? “Unfortunately, the type of hearing loss caused by over exposure to very loud noise is irreversible, making prevention paramount,” says Dr. Foy. “Hearing aids and implants can help in amplifying sounds and making it easier to hear, but they are merely compensating for the damaged or nonworking parts of the ear.” How can I prevent hearing loss? “First and foremost, follow the 60/60 rule in regards to percentage of maximum volume and duration of time,” says Dr. Foy. Additionally, he suggests using older style, larger headphones that rest over the ear opening instead of earphones that are placed directly in your ear. “Whether using headphones or earphones, moderation is key,” says Dr. Foy. “Avoiding excessive use of listening devices altogether will go a long way in preventing hearing loss.”
{instruction} ========== In your answer, refer only to the context document. Do not employ any outside knowledge {question} ========== My teen wants headphones for her birthday. She likes to listen to loud music and I'm worried about her hearing if she uses headphones. How can she safely use headphones? {passage 0} ========== Is anyone listening? Monitoring your teen's headphone volume can help avoid hearing loss As a parent, do you often find yourself asking your child to remove their headphones? You may want to consider doing it even more often. If you’re the parent of a teenager, you likely have concerns about the link between headphones and hearing loss. Today, 1 in 5 teens will experience some form of hearing loss—a rate about 30% higher than it was 20 years ago. Many experts believe the escalation is due, in part, to increased use of headphones. According to James E. Foy, DO, an osteopathic pediatrician from Vallejo, California, listening through headphones at a high volume for extended periods of time can result in lifelong hearing loss for children and teens. “Even a mild hearing loss due to excessive noise could lead to developmental delays in speech and language,” he cautions. Doctors of Osteopathic Medicine, or DOs, look beyond your symptoms to understand how lifestyle and environmental factors affect your wellbeing. They listen and partner with you to help prevent injury and encourage your body’s natural tendency toward self-healing. How loud is too loud? Most MP3 players today can produce sounds up to 120 decibels, equivalent to a sound level at a rock concert. At that level, hearing loss can occur after only about an hour and 15 minutes, warns Dr. Foy. “I stress to my patients and their parents that if you can’t hear anything going on around you when listening to headphones, the decibel level is too high,” he says. Dr. Foy advises that people should not exceed 60% of maximum volume when listening through headphones. How long is too long? Duration of exposure to noise is also a major factor when examining headphones and hearing loss. “As a rule of thumb, you should only use MP3 devices at levels up to 60% of maximum volume for a total of 60 minutes a day,” says Dr. Foy. “The louder the volume, the shorter your duration should be. At maximum volume, you should listen for only about five minutes a day.” What are the signs of hearing loss? “The type of hearing loss due to headphone use is typically gradual, cumulative and without obvious warning signs,” explains Dr. Foy. “A hearing test and a medical examination are the only way to truly diagnose hearing damage.” However, if you or your child experiences any of the following symptoms, Dr. Foy recommends a visit to a physician immediately: Ringing, roaring, hissing or buzzing in the ear. Difficulty understanding speech in noisy places or places with poor acoustics. Muffled sounds and a feeling that your ear is plugged. Listening to the TV or radio at a higher volume than in the past. What is the treatment for hearing loss? “Unfortunately, the type of hearing loss caused by over exposure to very loud noise is irreversible, making prevention paramount,” says Dr. Foy. “Hearing aids and implants can help in amplifying sounds and making it easier to hear, but they are merely compensating for the damaged or nonworking parts of the ear.” How can I prevent hearing loss? “First and foremost, follow the 60/60 rule in regards to percentage of maximum volume and duration of time,” says Dr. Foy. Additionally, he suggests using older style, larger headphones that rest over the ear opening instead of earphones that are placed directly in your ear. “Whether using headphones or earphones, moderation is key,” says Dr. Foy. “Avoiding excessive use of listening devices altogether will go a long way in preventing hearing loss.” https://osteopathic.org/what-is-osteopathic-medicine/headphones-hearing-loss/
Provide responses in clear, concise and simple manner. The target audience has no knowledge of the subject and are not experts. You response should only rely on the provided context.
What are some of the main topics addressed as having occurred in the last fiscal year based on the information shared in the letter?
Annual Letter to Shareholders Dear Shareholders, the Global McFamily and our Customers, At McDonald’s, we are privileged to be active participants in the local communities where we live, work and serve. That means we refect the values and understand the needs of the customers and people we strive to put frst every day. This was especially prudent as we navigated the COVID-19 pandemic and societal challenges within this past year. Through it all, and with the strength of our McFamily and a values-led mindset, we did the right thing from the start. We prioritized the safety of restaurant crew and customers; we took important steps to preserve our fnancial fexibility; we leveraged the power of our supply chain; and we stood by and supported our local communities. I believe frmly that our Brand will be defned by how we respond to such challenges, both as the world’s largest restaurant company—and as good neighbors. At the onset of the pandemic, I laid out fve principles that McDonald’s used to guide our approach to this historic challenge: Supported by these principles and energized by the incredible courage and efort from people across our three-legged stool, McDonald’s delivered a resilient performance in what was the most difcult year in our history. “We’re all in this together” “Think and act with a long-term mindset” “ Be transparent with each other and our stakeholders” “Lead by example” “Stay true to our purpose” Annual Letter to Shareholders Emerging from 2020 in a position of strength While conditions were challenging in most markets, we still achieved nearly $20 billion in full year revenue and over $90 billion in full year Systemwide sales. We were well-positioned to efectively navigate such challenging circumstances because of our operating model, our focus on running great restaurants and our many competitive strengths, including our formidable Drive Thru presence. We also were wellpositioned due to the signifcant investments we’ve made in recent years to develop our digital and delivery capabilities, which proved to be a boon throughout the pandemic. The US delivered its sixth consecutive year of positive comparable sales, and average US franchisee restaurant operating cash fow reached an all-time high in 2020, after a previous all-time high in 2019. Elsewhere, Japan and Australia posted fve and seven consecutive years of positive comparable sales growth, respectively. Markets that had to signifcantly reduce operations or face closures due to government restrictions did so with remarkable agility and care. Their ability to respond quickly to the external environment was a further demonstration of our System’s unmatched execution prowess. While 2020 was a historically demanding year, it has helped McDonald’s to do everything better. We engaged Mayo Clinic to provide ongoing expertise on emerging science in COVID-19 infection prevention, and we devised new ways to safely and reliably serve our customers. This, in turn, allowed us to continue gaining market share in most major markets. We also improved on our already unrivaled Drive Thru capabilities and continued to see the enormous benefts of contactless delivery, take-away, and curbside pick-up. Meanwhile, more customers used our app than ever before, as digital sales reached nearly 20 percent of Systemwide sales across our top six markets. At the outset of the pandemic, we committed to helping every operator and partner survive the crisis. We took prudent, quick action designed to prevent not a single Owner/Operator from failing due to the pandemic. We ofered franchisees nearly $1 billion in short-term fnancial liquidity support through rent and royalty deferrals, along with timely, targeted, and temporary assistance to individual franchisees in the most precarious situations. Thanks to our quick decision-making and our robust balance sheet, the fnancial health of the McDonald’s System remains strong. Just as important, we addressed our shortterm challenges without sacrifcing our long-term priorities. We continued to invest in our Brand, including an incremental $200 million in marketing support to widen our market share gains and accelerate our recovery. We also opened nearly 1,000 new restaurants globally, modernized another 900 restaurants in the US, and together with our franchisees, we invested more than $1 billion in technology and digital initiatives. I said several times through the year that we were confdent McDonald’s would be just as strong coming out of the pandemic as we were going into it, and we are proving that in so many ways. A new, holistic growth strategy to refect the changing environment Motivated by our resilience in the face of unprecedented challenges, we began writing the next chapter for McDonald’s as we shared our new growth strategy, Accelerating the Arches. Alongside bold business objectives, the strategy articulates a clear vision of where and how we intend to make a diference in the world, refecting the changing expectations that today’s customers have of modern corporations like McDonald’s. Annual Letter to Shareholders It is especially encouraging to see the power of the three pillars coming together already. The launch of Famous Orders in the US, for example, brought together the strength of our marketing, the popularity of our core menu items and enormous digital engagement to drive signifcant sales in the third and fourth quarters of 2020. The success of this initiative was just a glimpse of what is possible and we are excited for what is to come. We already knew customer habits and expectations were changing going into 2020. The pandemic accelerated some of those changes and brought other powerful truths into focus. First, our customers’ needs are diferent than they were prior to the pandemic, so the experience we ofer must adapt. A world with less dine-in and more takeout plays to our signifcant advantage in Drive Thru and our growing capabilities in delivery and curbside pick-up. More lunch and dinner visits are well-suited to our core menu, with iconic favorites that people love. Greater dependence on technology bodes well for McDonald’s fast-growing digital experience and our inherent scale advantages. This understanding was essential as we identifed three new growth pillars to deliver our next phase of sustainable growth under Accelerating the Arches. They are easy to remember… just think M-C-D: Leading with our purpose and refreshing our values to guide our strategy The second truth is that people expect more from corporations today and are seeking brands that refect their own values. Customers want to see that the McDonald’s they visit locally matches how we act globally. They want and expect us to be a force for good everywhere. The strength of McDonald’s business entering 2020 and our resilience through the pandemic allowed us to broaden our perspective to make Accelerating the Arches a strategy focused on more than just business performance. It is rooted in our belief that our next chapter of growth depends not just on what we do, but how we do it in more than 39,000 local restaurants around the world. Meeting the needs of our customers and communities requires us to embrace a bigger, more holistic vision. Just as our timeless commitment to Quality, Service, Cleanliness, and Value has been refned over the years to make them relevant for each era, the language we use to express our purpose, mission, and values must be reinvigorated to ensure it is responsive to today’s McDonald’s is one of the world’s most recognized brands, and we invest about $4 billion per year in marketing. Working with our agency partners, we will raise our creative ambition and capitalize on evolving digital behaviors to deepen the connection with our customers to drive growth. M - Maximize our Marketing McDonald’s menu is known around the globe, and customers love favorites like the Big Mac®, Chicken McNuggets®, and of course, our World Famous Fries®. During the pandemic, we focused on these classics and were reminded not only of customers’ enduring passion for these products, but also the signifcant growth opportunities that still exist within our core menu. C - Commit to the Core Digital, Delivery and Drive Thru. Customers have always loved McDonald’s for its convenience, and new technologies ofer us the opportunity to make the McDonald’s experience even faster and easier. We will innovate in these service channels to unlock even more growth. D - Double Down on the Three Ds Annual Letter to Shareholders Serve We put our customers and people frst Integrity We do the right thing Family We get better together Community We are good neighbors Inclusion We open our doors to everyone environment. That’s especially true in an era when customers and communities expect more of us. That is why one of our priorities over the past year was to ensure our purpose, mission, and values refect the role we play in society today— while embracing the vital place these timeless ideals and principles occupy as an essential part of this special Brand we all love. In speaking to franchisees, customers and crew around the world, it became clear that McDonald’s purpose is to feed and foster communities. It also became clear in those conversations that our ability to deliver on our purpose is rooted in a refreshed set of core values: Ray Kroc used to talk constantly about our values. He knew that in a System where every restaurant is unique and locally owned, our values would be the light that guides us through every decision. These refreshed values are a foundational component of Accelerating the Arches and will guide us in achieving our business objectives while providing a common compass for how we serve our communities, and one another. With its holistic view of what McDonald’s seeks to accomplish as an organization, Accelerating the Arches will strengthen our advantages and deliver value—not only to our business, but to our communities, customers, franchisees, crew, employees, farmers and suppliers. Looking forward to another year of progress We are a stronger Brand for the challenges we faced together in 2020. Our business performance and the trust we fostered throughout our communities reinforced our confdence in McDonald’s long-term success. As a result, we were pleased to continue the company’s more than 40-year tradition of annual dividend increases. While 2020 was a year beset with obstacles, it was also a year of progress for McDonald’s, and it has emboldened us to build on the platform we created to write our next great chapter together. Supported by a bold new strategy and our enduring foundation of running great restaurants, McDonald’s will continue to strive to be a force for good in our communities while strengthening and widening the competitive advantages that help us make delicious feel-good moments easy for everyone. Thank you to our shareholders for your continued investment in McDonald’s, to our customers for giving us the opportunity to serve you and your communities, and to the people in the McDonald’s System who make this business what it is and give us the spirit to succeed. Be well. Chris Kempczinski President and CEO McDonald’s Corporation
Provide responses in clear, concise and simple manner. The target audience has no knowledge of the subject and are not experts. You response should only rely on the provided context. What are some of the main topics addressed as having occurred in the last fiscal year based on the information shared in the letter? Annual Letter to Shareholders Dear Shareholders, the Global McFamily and our Customers, At McDonald’s, we are privileged to be active participants in the local communities where we live, work and serve. That means we refect the values and understand the needs of the customers and people we strive to put frst every day. This was especially prudent as we navigated the COVID-19 pandemic and societal challenges within this past year. Through it all, and with the strength of our McFamily and a values-led mindset, we did the right thing from the start. We prioritized the safety of restaurant crew and customers; we took important steps to preserve our fnancial fexibility; we leveraged the power of our supply chain; and we stood by and supported our local communities. I believe frmly that our Brand will be defned by how we respond to such challenges, both as the world’s largest restaurant company—and as good neighbors. At the onset of the pandemic, I laid out fve principles that McDonald’s used to guide our approach to this historic challenge: Supported by these principles and energized by the incredible courage and efort from people across our three-legged stool, McDonald’s delivered a resilient performance in what was the most difcult year in our history. “We’re all in this together” “Think and act with a long-term mindset” “ Be transparent with each other and our stakeholders” “Lead by example” “Stay true to our purpose” Annual Letter to Shareholders Emerging from 2020 in a position of strength While conditions were challenging in most markets, we still achieved nearly $20 billion in full year revenue and over $90 billion in full year Systemwide sales. We were well-positioned to efectively navigate such challenging circumstances because of our operating model, our focus on running great restaurants and our many competitive strengths, including our formidable Drive Thru presence. We also were wellpositioned due to the signifcant investments we’ve made in recent years to develop our digital and delivery capabilities, which proved to be a boon throughout the pandemic. The US delivered its sixth consecutive year of positive comparable sales, and average US franchisee restaurant operating cash fow reached an all-time high in 2020, after a previous all-time high in 2019. Elsewhere, Japan and Australia posted fve and seven consecutive years of positive comparable sales growth, respectively. Markets that had to signifcantly reduce operations or face closures due to government restrictions did so with remarkable agility and care. Their ability to respond quickly to the external environment was a further demonstration of our System’s unmatched execution prowess. While 2020 was a historically demanding year, it has helped McDonald’s to do everything better. We engaged Mayo Clinic to provide ongoing expertise on emerging science in COVID-19 infection prevention, and we devised new ways to safely and reliably serve our customers. This, in turn, allowed us to continue gaining market share in most major markets. We also improved on our already unrivaled Drive Thru capabilities and continued to see the enormous benefts of contactless delivery, take-away, and curbside pick-up. Meanwhile, more customers used our app than ever before, as digital sales reached nearly 20 percent of Systemwide sales across our top six markets. At the outset of the pandemic, we committed to helping every operator and partner survive the crisis. We took prudent, quick action designed to prevent not a single Owner/Operator from failing due to the pandemic. We ofered franchisees nearly $1 billion in short-term fnancial liquidity support through rent and royalty deferrals, along with timely, targeted, and temporary assistance to individual franchisees in the most precarious situations. Thanks to our quick decision-making and our robust balance sheet, the fnancial health of the McDonald’s System remains strong. Just as important, we addressed our shortterm challenges without sacrifcing our long-term priorities. We continued to invest in our Brand, including an incremental $200 million in marketing support to widen our market share gains and accelerate our recovery. We also opened nearly 1,000 new restaurants globally, modernized another 900 restaurants in the US, and together with our franchisees, we invested more than $1 billion in technology and digital initiatives. I said several times through the year that we were confdent McDonald’s would be just as strong coming out of the pandemic as we were going into it, and we are proving that in so many ways. A new, holistic growth strategy to refect the changing environment Motivated by our resilience in the face of unprecedented challenges, we began writing the next chapter for McDonald’s as we shared our new growth strategy, Accelerating the Arches. Alongside bold business objectives, the strategy articulates a clear vision of where and how we intend to make a diference in the world, refecting the changing expectations that today’s customers have of modern corporations like McDonald’s. Annual Letter to Shareholders It is especially encouraging to see the power of the three pillars coming together already. The launch of Famous Orders in the US, for example, brought together the strength of our marketing, the popularity of our core menu items and enormous digital engagement to drive signifcant sales in the third and fourth quarters of 2020. The success of this initiative was just a glimpse of what is possible and we are excited for what is to come. We already knew customer habits and expectations were changing going into 2020. The pandemic accelerated some of those changes and brought other powerful truths into focus. First, our customers’ needs are diferent than they were prior to the pandemic, so the experience we ofer must adapt. A world with less dine-in and more takeout plays to our signifcant advantage in Drive Thru and our growing capabilities in delivery and curbside pick-up. More lunch and dinner visits are well-suited to our core menu, with iconic favorites that people love. Greater dependence on technology bodes well for McDonald’s fast-growing digital experience and our inherent scale advantages. This understanding was essential as we identifed three new growth pillars to deliver our next phase of sustainable growth under Accelerating the Arches. They are easy to remember… just think M-C-D: Leading with our purpose and refreshing our values to guide our strategy The second truth is that people expect more from corporations today and are seeking brands that refect their own values. Customers want to see that the McDonald’s they visit locally matches how we act globally. They want and expect us to be a force for good everywhere. The strength of McDonald’s business entering 2020 and our resilience through the pandemic allowed us to broaden our perspective to make Accelerating the Arches a strategy focused on more than just business performance. It is rooted in our belief that our next chapter of growth depends not just on what we do, but how we do it in more than 39,000 local restaurants around the world. Meeting the needs of our customers and communities requires us to embrace a bigger, more holistic vision. Just as our timeless commitment to Quality, Service, Cleanliness, and Value has been refned over the years to make them relevant for each era, the language we use to express our purpose, mission, and values must be reinvigorated to ensure it is responsive to today’s McDonald’s is one of the world’s most recognized brands, and we invest about $4 billion per year in marketing. Working with our agency partners, we will raise our creative ambition and capitalize on evolving digital behaviors to deepen the connection with our customers to drive growth. M - Maximize our Marketing McDonald’s menu is known around the globe, and customers love favorites like the Big Mac®, Chicken McNuggets®, and of course, our World Famous Fries®. During the pandemic, we focused on these classics and were reminded not only of customers’ enduring passion for these products, but also the signifcant growth opportunities that still exist within our core menu. C - Commit to the Core Digital, Delivery and Drive Thru. Customers have always loved McDonald’s for its convenience, and new technologies ofer us the opportunity to make the McDonald’s experience even faster and easier. We will innovate in these service channels to unlock even more growth. D - Double Down on the Three Ds Annual Letter to Shareholders Serve We put our customers and people frst Integrity We do the right thing Family We get better together Community We are good neighbors Inclusion We open our doors to everyone environment. That’s especially true in an era when customers and communities expect more of us. That is why one of our priorities over the past year was to ensure our purpose, mission, and values refect the role we play in society today— while embracing the vital place these timeless ideals and principles occupy as an essential part of this special Brand we all love. In speaking to franchisees, customers and crew around the world, it became clear that McDonald’s purpose is to feed and foster communities. It also became clear in those conversations that our ability to deliver on our purpose is rooted in a refreshed set of core values: Ray Kroc used to talk constantly about our values. He knew that in a System where every restaurant is unique and locally owned, our values would be the light that guides us through every decision. These refreshed values are a foundational component of Accelerating the Arches and will guide us in achieving our business objectives while providing a common compass for how we serve our communities, and one another. With its holistic view of what McDonald’s seeks to accomplish as an organization, Accelerating the Arches will strengthen our advantages and deliver value—not only to our business, but to our communities, customers, franchisees, crew, employees, farmers and suppliers. Looking forward to another year of progress We are a stronger Brand for the challenges we faced together in 2020. Our business performance and the trust we fostered throughout our communities reinforced our confdence in McDonald’s long-term success. As a result, we were pleased to continue the company’s more than 40-year tradition of annual dividend increases. While 2020 was a year beset with obstacles, it was also a year of progress for McDonald’s, and it has emboldened us to build on the platform we created to write our next great chapter together. Supported by a bold new strategy and our enduring foundation of running great restaurants, McDonald’s will continue to strive to be a force for good in our communities while strengthening and widening the competitive advantages that help us make delicious feel-good moments easy for everyone. Thank you to our shareholders for your continued investment in McDonald’s, to our customers for giving us the opportunity to serve you and your communities, and to the people in the McDonald’s System who make this business what it is and give us the spirit to succeed. Be well. Chris Kempczinski President and CEO McDonald’s Corporation
Do not use external resources for your answer. Only use the provided context block.
What does the book include to help answer important questions about Bitcoin?
There’s a lot of excitement about Bitcoin and cryptocurrencies. Optimists claim that Bitcoin will fundamentally alter payments, economics, and even politics around the world. Pessimists claim Bitcoin is inherently broken and will suffer an inevitable and spectacular collapse. Underlying these differing views is significant confusion about what Bitcoin is and how it works. We wrote this book to help cut through the hype and get to the core of what makes Bitcoin unique. To really understand what is special about Bitcoin, we need to understand how it works at a technical level. Bitcoin truly is a new technology and we can only get so far by explaining it through simple analogies to past technologies. We’ll assume that you have a basic understanding of computer science — how computers work, data structures and algorithms, and some programming experience. If you’re an undergraduate or graduate student of computer science, a software developer, an entrepreneur, or a technology hobbyist, this textbook is for you. In this book we’ll address the important questions about Bitcoin. How does Bitcoin work? What makes it different? How secure are your bitcoins? How anonymous are Bitcoin users? What applications can we build using Bitcoin as a platform? Can cryptocurrencies be regulated? If we were designing a new cryptocurrency today, what would we change? What might the future hold? Each chapter has a series of homework questions to help you understand these questions at a deeper level. In addition, there is a series of programming assignments in which you’ll implement various components of Bitcoin in simplified models. If you’re an auditory learner, most of the material of this book is available as a series of video lectures. You can find all these on our ​Coursera course.​ You should also supplement your learning with information you can find online including the Bitcoin wiki, forums, and research papers, and by interacting with your peers and the Bitcoin community. After reading this book, you’ll know everything you need to be able to separate fact from fiction when reading claims about Bitcoin and other cryptocurrencies. You’ll have the conceptual foundations you need to engineer secure software that interacts with the Bitcoin network. And you’ll be able to integrate ideas from Bitcoin into your own projects.
Do not use external resources for your answer. Only use the provided context block. What does the book include to help answer important questions about Bitcoin? [There’s a lot of excitement about Bitcoin and cryptocurrencies. Optimists claim that Bitcoin will fundamentally alter payments, economics, and even politics around the world. Pessimists claim Bitcoin is inherently broken and will suffer an inevitable and spectacular collapse. Underlying these differing views is significant confusion about what Bitcoin is and how it works. We wrote this book to help cut through the hype and get to the core of what makes Bitcoin unique. To really understand what is special about Bitcoin, we need to understand how it works at a technical level. Bitcoin truly is a new technology and we can only get so far by explaining it through simple analogies to past technologies. We’ll assume that you have a basic understanding of computer science — how computers work, data structures and algorithms, and some programming experience. If you’re an undergraduate or graduate student of computer science, a software developer, an entrepreneur, or a technology hobbyist, this textbook is for you. In this book we’ll address the important questions about Bitcoin. How does Bitcoin work? What makes it different? How secure are your bitcoins? How anonymous are Bitcoin users? What applications can we build using Bitcoin as a platform? Can cryptocurrencies be regulated? If we were designing a new cryptocurrency today, what would we change? What might the future hold? Each chapter has a series of homework questions to help you understand these questions at a deeper level. In addition, there is a series of programming assignments in which you’ll implement various components of Bitcoin in simplified models. If you’re an auditory learner, most of the material of this book is available as a series of video lectures. You can find all these on our ​Coursera course.​ You should also supplement your learning with information you can find online including the Bitcoin wiki, forums, and research papers, and by interacting with your peers and the Bitcoin community. After reading this book, you’ll know everything you need to be able to separate fact from fiction when reading claims about Bitcoin and other cryptocurrencies. You’ll have the conceptual foundations you need to engineer secure software that interacts with the Bitcoin network. And you’ll be able to integrate ideas from Bitcoin into your own projects.]
Only rely on the provided text.
Which American made significant contributions to our understanding of the distribution of wealth?
In the theory of distribution interest must be aasigned a quite different and much more important r61e than economists thus far have given to it. In classical economics the nature of interest and its place in distribution were not clearly understood. Distribution has been erroneously defined as the division of the income of society into “interest, rent, wages, and profits.” Rent and interest are merely two ways of measuring the same income ; rent, aa the yield per acre or other physical unit, and interest aa the same yield expressed aa a per cent of capital value. The value of the capital is derived from the income which it yields by capitalizing it at the prevailing rate of interest. To reverse this process by multiplying the capitd vdue by the rate of interest gives the original income, aa long aa the capital value remains stationary. It is not really a complex product of two factors, but, on the contrary, is the single original factor, namely, income, from which we started. As explained in previous chapters, it is this income which affords the basis for the determination of the &e of interest, and through the rate of interest, of capital value. The hal enjoyable income of society is the ultimate and basic fact from which all values are derived and c3311 THE THEORY OF INTEREST toward which all economic action is bent. All of this income is derived from capital wealth, if land and man are included in that term, or if not, from capital and man, or capital, land, and man, according to the terminology adopted. This income may all be capitalized, and hence all income (excluding capital gain) may be viewed as interest upon the capital value thus found. Viewed as above outlined interest is not a part, but the whole, of income (except for capital gain). It includes what is called rent and profits and even wages, for the income of the workman may be capitalized quite as truly as the income of land or machinery. Thus, instead of having interest, rent, wages, and profits as mutually exclusive portions of social income, interest may be regarded as including all four. If we prefer to exclude profits, the reason is because of the element of risk and not because profits are not discountable just as truly as rent and wages. The error of the classical economists and of their modern followers in regarding interest, rent, wages and profits as separate but coijrdinate incomes is partly due to the failure to perceive thzlt, whereas all income is produced from capital wealth, capital vdue can emerge only from man’s psychic evaluation and capitalization of that income in advance of its occurrence. Another oversight closely ltssociated with the last stated fallacy is that in which rent and wages are conceived aa determined independently of the rate of interest, whereas we have just seen that the rate of interest enters aa a vital element into the determination of both. The great defect in the theories propounded by the classical economists lay in their inability to conceive of a general equilibrium and the mutual dependence of sacrifice and enjoyment. C 332 3 THE PLACE OF INTEREST IN ECONOMICS In discueeing the theory of distribution, we shall, there fore, abandon the classical point of view entirely. The claasical concepts of distribution are quite inappropriate to explain the every day facts of life and the economic structure. The phrase distribution of wealth, as understood by the ordinary man, implies the problem of the relative wealth of individuals, the problem of the rich and the poor. But the separation of the aggregate income into four abstract magnitudes, even if correctly done, has littIe to do with the question of how much income the different individuals in society receive. Only on condition that society WM composed of four independent and mutually exclusive groups, laborers, landlords, enterprisers, and capitalists, would the fourfold division of the classical economists be even partially dequate to explain the actual distribution of income. In fact, the four classes all overlap. The enterpriser is almost invariably a genuine capitalist and usually also performs labor; the capitalist is frequently a landlord and laborer, and even the typical laborer is today often a amall capitalist and sometimes a landlord. It is true that a century ago in England the lines of social classification corresponded roughly to the abstract divisions proposed at that time by the classical economists. But this fact is of little significance except as explaining historically the origin of the classical theory of distrib~tion.~ $5. Interest and Personal Distribution The main problem of distribution, as I see it, is concerned with the determination and explanation of the amounts and values of capitala and incomes possemed don, P. 8. King dc Son, 1903. '&e Cannan, Edwin, Thoties of production and Dt&ibuticm. hCWI THE THEORY OF INTEREST by Merent individuah in society. It is astonishing how little economistg have contributed to resolving the problem of distribution EO conceived. A statistid beginning w&s made by Professor Pareto in his present&ion of interesting “curves of distribution of income.” For the United States, Professor W. I. King and the National Bureau of Economic Research ?, and for England, Sir Josiah Stamp have made and analyzed important statistical compilations on the amount and distribution of income and capital wealth by income groups and social classes. On the theory of distribution, especially the rcile of interest in distribution, John Rae seems to have contributed more than any other writer O. He showed in a vivid way that persons who had naturally what we have called in this book a low rate of impatience or preference for present over future income tended to accumulate savings, whereas those who had t,he opposite trait tended to spend their incomes and even their capitals. In previous chapters it is shown that the rates of preference among different individurtls are equalized by borrowing and lending or, what amounts to the same thing, ‘Pareto, Cam 82-k Politipue, Vol. 11, Book III. ‘King, W. I., The Wealth and Income of the People of the United State, New York, The Macmillan Co., 1915. ‘Mitchell, W. C., King, W. I., Mseaulay, F. R., Knauth, 0. W., Income in the United States. New York, National Bureau of Economic Reeearch, Inc., 1922. Knauth, 0. W., Dietribution of I~~come byi3tat-a in 1919. New York, Harcourt, Brace & Co., 1822. Leven, Maurice, and King, w. I., Income in the Vuriou8 &utes; Its sovceS and DietribzLtion, 1910, f9#, and 19tl. New York, National Bureau of Economic Resesrch, Inc., 1925. ‘Stamp, Sir Josiah, WeaUh and Tdle Capacily. London, P. 9. King & hn, La., 1922. Also, Btitieh Incomes and Prqperty. London, P. 8. King & Son, 1916. ’ Rae, The Socidogid Thew o? Capitd, Chapter XIII. 1WI. THE PLACE OF INTEREST IN ECONOMICS by buying and selling. An individual whose rate of preference for present enjoyment is unduly high wil contrive to modify his income stream by increasing it in the pment at the expense of the future. The effects upon incomes may be traced to capital by applying the principles explained in The Nature of Caplltal and Income, Chapter XIV.
Which American made significant contributions to our understanding of the distribution of wealth? Only rely on the provided text. In the theory of distribution interest must be aasigned a quite different and much more important r61e than economists thus far have given to it. In classical economics the nature of interest and its place in distribution were not clearly understood. Distribution has been erroneously defined as the division of the income of society into “interest, rent, wages, and profits.” Rent and interest are merely two ways of measuring the same income ; rent, aa the yield per acre or other physical unit, and interest aa the same yield expressed aa a per cent of capital value. The value of the capital is derived from the income which it yields by capitalizing it at the prevailing rate of interest. To reverse this process by multiplying the capitd vdue by the rate of interest gives the original income, aa long aa the capital value remains stationary. It is not really a complex product of two factors, but, on the contrary, is the single original factor, namely, income, from which we started. As explained in previous chapters, it is this income which affords the basis for the determination of the &e of interest, and through the rate of interest, of capital value. The hal enjoyable income of society is the ultimate and basic fact from which all values are derived and c3311 THE THEORY OF INTEREST toward which all economic action is bent. All of this income is derived from capital wealth, if land and man are included in that term, or if not, from capital and man, or capital, land, and man, according to the terminology adopted. This income may all be capitalized, and hence all income (excluding capital gain) may be viewed as interest upon the capital value thus found. Viewed as above outlined interest is not a part, but the whole, of income (except for capital gain). It includes what is called rent and profits and even wages, for the income of the workman may be capitalized quite as truly as the income of land or machinery. Thus, instead of having interest, rent, wages, and profits as mutually exclusive portions of social income, interest may be regarded as including all four. If we prefer to exclude profits, the reason is because of the element of risk and not because profits are not discountable just as truly as rent and wages. The error of the classical economists and of their modern followers in regarding interest, rent, wages and profits as separate but coijrdinate incomes is partly due to the failure to perceive thzlt, whereas all income is produced from capital wealth, capital vdue can emerge only from man’s psychic evaluation and capitalization of that income in advance of its occurrence. Another oversight closely ltssociated with the last stated fallacy is that in which rent and wages are conceived aa determined independently of the rate of interest, whereas we have just seen that the rate of interest enters aa a vital element into the determination of both. The great defect in the theories propounded by the classical economists lay in their inability to conceive of a general equilibrium and the mutual dependence of sacrifice and enjoyment. C 332 3 THE PLACE OF INTEREST IN ECONOMICS In discueeing the theory of distribution, we shall, there fore, abandon the classical point of view entirely. The claasical concepts of distribution are quite inappropriate to explain the every day facts of life and the economic structure. The phrase distribution of wealth, as understood by the ordinary man, implies the problem of the relative wealth of individuals, the problem of the rich and the poor. But the separation of the aggregate income into four abstract magnitudes, even if correctly done, has littIe to do with the question of how much income the different individuals in society receive. Only on condition that society WM composed of four independent and mutually exclusive groups, laborers, landlords, enterprisers, and capitalists, would the fourfold division of the classical economists be even partially dequate to explain the actual distribution of income. In fact, the four classes all overlap. The enterpriser is almost invariably a genuine capitalist and usually also performs labor; the capitalist is frequently a landlord and laborer, and even the typical laborer is today often a amall capitalist and sometimes a landlord. It is true that a century ago in England the lines of social classification corresponded roughly to the abstract divisions proposed at that time by the classical economists. But this fact is of little significance except as explaining historically the origin of the classical theory of distrib~tion.~ $5. Interest and Personal Distribution The main problem of distribution, as I see it, is concerned with the determination and explanation of the amounts and values of capitala and incomes possemed don, P. 8. King dc Son, 1903. '&e Cannan, Edwin, Thoties of production and Dt&ibuticm. hCWI THE THEORY OF INTEREST by Merent individuah in society. It is astonishing how little economistg have contributed to resolving the problem of distribution EO conceived. A statistid beginning w&s made by Professor Pareto in his present&ion of interesting “curves of distribution of income.” For the United States, Professor W. I. King and the National Bureau of Economic Research ?, and for England, Sir Josiah Stamp have made and analyzed important statistical compilations on the amount and distribution of income and capital wealth by income groups and social classes. On the theory of distribution, especially the rcile of interest in distribution, John Rae seems to have contributed more than any other writer O. He showed in a vivid way that persons who had naturally what we have called in this book a low rate of impatience or preference for present over future income tended to accumulate savings, whereas those who had t,he opposite trait tended to spend their incomes and even their capitals. In previous chapters it is shown that the rates of preference among different individurtls are equalized by borrowing and lending or, what amounts to the same thing, ‘Pareto, Cam 82-k Politipue, Vol. 11, Book III. ‘King, W. I., The Wealth and Income of the People of the United State, New York, The Macmillan Co., 1915. ‘Mitchell, W. C., King, W. I., Mseaulay, F. R., Knauth, 0. W., Income in the United States. New York, National Bureau of Economic Reeearch, Inc., 1922. Knauth, 0. W., Dietribution of I~~come byi3tat-a in 1919. New York, Harcourt, Brace & Co., 1822. Leven, Maurice, and King, w. I., Income in the Vuriou8 &utes; Its sovceS and DietribzLtion, 1910, f9#, and 19tl. New York, National Bureau of Economic Resesrch, Inc., 1925. ‘Stamp, Sir Josiah, WeaUh and Tdle Capacily. London, P. 9. King & hn, La., 1922. Also, Btitieh Incomes and Prqperty. London, P. 8. King & Son, 1916. ’ Rae, The Socidogid Thew o? Capitd, Chapter XIII. 1WI. THE PLACE OF INTEREST IN ECONOMICS by buying and selling. An individual whose rate of preference for present enjoyment is unduly high wil contrive to modify his income stream by increasing it in the pment at the expense of the future. The effects upon incomes may be traced to capital by applying the principles explained in The Nature of Caplltal and Income, Chapter XIV.
<TASK DESCRIPTION> Only use the provided text to answer the question, no outside sources. <QUESTION> [user request] <TEXT> [context document]
My friend is trying to get me to start Ozempic, since it has helped her lose weight. I want to know more about what it is. Using this article, tell me how Ozempic works and what the risks are. Use at least 400 words.
Does Ozempic Have an Immediate Effect? Ozempic is a medication in the class of GLP-1 agonists, which mimic the action of a hormone called GLP-1 that your stomach naturally releases when you eat food. When blood sugar levels naturally start rising after you eat, these drugs stimulate the body to produce more insulin, which helps direct blood sugar into the body's cells to be used for energy. If you’re taking Ozempic for diabetes, “it doesn’t have the immediate effect that injecting actual insulin does,” she adds. Per the Centers for Disease Control and Prevention (CDC), rapid-acting insulin can start working in as little as 30 minutes to accelerate the entry of glucose into cells for metabolism into glycogen—a main source of energy for the body. Ozempic doesn’t have an immediate effect on weight loss either. “Ozempic is started at the lowest dose and advanced every four weeks,” says Mir Ali, M.D., a bariatric surgeon and the medical director of MemorialCare Surgical Weight Loss Center at Orange Coast Medical Center in Fountain Valley, CA. “Each patient responds differently. Some feel the effects immediately, while others may need to be on higher dose levels to feel the effects. When the patients are at the appropriate dose, they feel much less hungry and feel full for a longer period of time.” The effects of a dose of Ozempic last for about one week—this is why it’s injected once-weekly. “Some people may see a tapering of the effects towards the end of the one-week period, while others don’t,” says Dr. Ali. It should be noted that the same holds true for Wegovy. The main difference between Wegovy and Ozempic is the amount of semaglutide in each injectable dose: Wegovy’s maximum maintenance dose is 2.4 milligrams (mg), while Ozempic’s is 2 mg. Lowering Blood Sugar How Long Does It Take Ozempic to Lower Blood Sugar? Every patient is different, but you can expect to notice lower levels of blood sugar as quickly as within the first week of taking Ozempic, says Dr. Lofton. “The effect will be more dramatic as the doses increase over a period of months,” she says. For instance, if the patient’s dose is increased monthly, they should reach the maximum dose of 2 mg on the fourth month. Sticking to lower doses for the first four weeks helps lower side effects, but higher doses are required to lower blood sugar in the long term, per the official dosing guidelines. “How long it takes to achieve a healthy blood sugar level depends on how well the glucose was controlled prior to initiating Ozempic as well as the patient’s diet, exercise, and other medications,” Dr. Lofton says. Your doctor will carry out the hemoglobin A1C test—a simple blood test that measures your average blood sugar levels over the past three months. “It takes three months for hemoglobin A1C to change, so I would expect some improvement in hemoglobin A1C three months after starting Ozempic,” Dr. Lofton explains. For those individuals with type 2 diabetes who take metformin, which is the first-line medication used to treat the condition, some may find that adding—or switching to—a GPL-1 agonist drug like Ozempic may improve outcomes; this is something your doctor will evaluate if this applies to your situation. Some people with type 2 diabetes may take insulin and Ozempic. “Often, a patient’s insulin requirement decreases as Ozempic doses increase so it is likely that type 2 diabetes may no longer require insulin when on a GLP-1 agonist,” says Dr. Lofton. “This is ideal because insulin can cause weight gain.” Weight Loss How Long Does It Take Ozempic to Lead to Weight Loss? The effect of Ozempic on weight really depends on the individual, says Dr. Ali. “Some patients will experience a loss of appetite with the initial dose,” he says. “However, most patients will likely not see significant weight loss until they reach higher dose levels at eight-to-12 weeks.” In Dr. Lofton's experience, there is usually some weight loss in the first month. “If weight goals are not met, then the dose can be increased,” she notes. Ozempic’s results are impressive when compared to other types of weight management drugs. Eric Williamson, Ph.D., a dietitian who specializes in sports and weight management and the founder of Toronto, Canada-based Unlocked Fitness and Nutrition, points out that the older obesity meds like Saxenda (liraglutide) yielded modest results: an average of 5% to 8% weight loss over the course of 68 weeks. “In contrast, the recent GLP-1 agonists like semaglutide stand out as the most effective drugs to date, with individuals experiencing a substantial 15% to 20% body weight reduction over a 68-week period when coupled with lifestyle interventions including nutrition and exercise,” says Williamson. That sort of weight loss can improve your body’s insulin sensitivity and help reverse insulin resistance—your essential weapons for winning the battle when you have type 2 diabetes. Williamson believes that the success of semaglutide lies in its ability to address the most common barrier to weight loss: increased appetite. “While a calorie deficit remains essential for weight loss, semaglutide makes achieving this deficit more manageable by reducing appetite,” he explains. What to Expect What to Expect After Your First Ozempic Injection It’s normal to experience some side effects from a new medication. According to Dr. Ali, the most common side effects reported from Ozempic are gastrointestinal, such as nausea, diarrhea or constipation, stomach cramping, and vomiting. “There are receptors for GLP-1 in the GI tract, which affects how it functions and leads to side effects,” explains Dr. Ali. “However, these side effects tend to subside with continued use of the medication.” According to clinical trials, the majority of reports of nausea, vomiting, and/or diarrhea occurred during dose escalation. Dr. Lofton warns that if you’re taking Ozempic and can’t tolerate the side effects, you should speak to your prescriber. “Lifestyle intervention is still the first-line approach to obesity treatment,” Williamson says. “In most cases, physicians will recommend lifestyle support with professionals like dietitians first. Even when drugs like semaglutide are prescribed, it is meant to complement lifestyle changes by mitigating the challenge of heightened appetite.” Williamson adds that there are three main risks if certain lifestyle adjustments are not considered: Inadequate nutrient intake. “Because appetite can be lowered quite drastically with semaglutide, it’s important that people are choosing nutrient dense foods to get adequate amounts of vitamins and minerals,” he says. Muscle loss. A subset of participants taking Ozempic in a study published in the New England Journal of Medicine lost 39% of their weight as lean mass (the largest portion of which will be muscle mass). “Exercise and obtaining adequate protein is important to prevent this so that one metabolic health issue isn’t presented (i.e., low muscle mass) as another one is solved (i.e., high fat mass),” Williamson explains. Not losing weight. According to research published in Drug Design, Development and Therapy, there is still a small proportion of people (around 7%) who do not lose weight on semaglutide. Williamson points out that more studies are required, but in his practice (and coming across people on the drug on a near-daily basis), he does see some people who eat a high enough caloric density diet (i.e. a high amount of calories for small amount of food) that they do not enter a calorie deficit even on weight loss drugs. “A diet made up of mostly nutritious low-calorie density whole filling foods is still required for many to lose weight on these drugs,” he says. It’s also a habit that can help those who drop out of using drugs like Ozempic from gaining the weight back.
<TASK DESCRIPTION> Only use the provided text to answer the question, no outside sources. <QUESTION> My friend is trying to get me to start Ozempic, since it has helped her lose weight. I want to know more about what it is. Using this article, tell me how Ozempic works and what the risks are. Use at least 400 words. <TEXT> Does Ozempic Have an Immediate Effect? Ozempic is a medication in the class of GLP-1 agonists, which mimic the action of a hormone called GLP-1 that your stomach naturally releases when you eat food. When blood sugar levels naturally start rising after you eat, these drugs stimulate the body to produce more insulin, which helps direct blood sugar into the body's cells to be used for energy. If you’re taking Ozempic for diabetes, “it doesn’t have the immediate effect that injecting actual insulin does,” she adds. Per the Centers for Disease Control and Prevention (CDC), rapid-acting insulin can start working in as little as 30 minutes to accelerate the entry of glucose into cells for metabolism into glycogen—a main source of energy for the body. Ozempic doesn’t have an immediate effect on weight loss either. “Ozempic is started at the lowest dose and advanced every four weeks,” says Mir Ali, M.D., a bariatric surgeon and the medical director of MemorialCare Surgical Weight Loss Center at Orange Coast Medical Center in Fountain Valley, CA. “Each patient responds differently. Some feel the effects immediately, while others may need to be on higher dose levels to feel the effects. When the patients are at the appropriate dose, they feel much less hungry and feel full for a longer period of time.” The effects of a dose of Ozempic last for about one week—this is why it’s injected once-weekly. “Some people may see a tapering of the effects towards the end of the one-week period, while others don’t,” says Dr. Ali. It should be noted that the same holds true for Wegovy. The main difference between Wegovy and Ozempic is the amount of semaglutide in each injectable dose: Wegovy’s maximum maintenance dose is 2.4 milligrams (mg), while Ozempic’s is 2 mg. Lowering Blood Sugar How Long Does It Take Ozempic to Lower Blood Sugar? Every patient is different, but you can expect to notice lower levels of blood sugar as quickly as within the first week of taking Ozempic, says Dr. Lofton. “The effect will be more dramatic as the doses increase over a period of months,” she says. For instance, if the patient’s dose is increased monthly, they should reach the maximum dose of 2 mg on the fourth month. Sticking to lower doses for the first four weeks helps lower side effects, but higher doses are required to lower blood sugar in the long term, per the official dosing guidelines. “How long it takes to achieve a healthy blood sugar level depends on how well the glucose was controlled prior to initiating Ozempic as well as the patient’s diet, exercise, and other medications,” Dr. Lofton says. Your doctor will carry out the hemoglobin A1C test—a simple blood test that measures your average blood sugar levels over the past three months. “It takes three months for hemoglobin A1C to change, so I would expect some improvement in hemoglobin A1C three months after starting Ozempic,” Dr. Lofton explains. For those individuals with type 2 diabetes who take metformin, which is the first-line medication used to treat the condition, some may find that adding—or switching to—a GPL-1 agonist drug like Ozempic may improve outcomes; this is something your doctor will evaluate if this applies to your situation. Some people with type 2 diabetes may take insulin and Ozempic. “Often, a patient’s insulin requirement decreases as Ozempic doses increase so it is likely that type 2 diabetes may no longer require insulin when on a GLP-1 agonist,” says Dr. Lofton. “This is ideal because insulin can cause weight gain.” Weight Loss How Long Does It Take Ozempic to Lead to Weight Loss? The effect of Ozempic on weight really depends on the individual, says Dr. Ali. “Some patients will experience a loss of appetite with the initial dose,” he says. “However, most patients will likely not see significant weight loss until they reach higher dose levels at eight-to-12 weeks.” In Dr. Lofton's experience, there is usually some weight loss in the first month. “If weight goals are not met, then the dose can be increased,” she notes. Ozempic’s results are impressive when compared to other types of weight management drugs. Eric Williamson, Ph.D., a dietitian who specializes in sports and weight management and the founder of Toronto, Canada-based Unlocked Fitness and Nutrition, points out that the older obesity meds like Saxenda (liraglutide) yielded modest results: an average of 5% to 8% weight loss over the course of 68 weeks. “In contrast, the recent GLP-1 agonists like semaglutide stand out as the most effective drugs to date, with individuals experiencing a substantial 15% to 20% body weight reduction over a 68-week period when coupled with lifestyle interventions including nutrition and exercise,” says Williamson. That sort of weight loss can improve your body’s insulin sensitivity and help reverse insulin resistance—your essential weapons for winning the battle when you have type 2 diabetes. Williamson believes that the success of semaglutide lies in its ability to address the most common barrier to weight loss: increased appetite. “While a calorie deficit remains essential for weight loss, semaglutide makes achieving this deficit more manageable by reducing appetite,” he explains. What to Expect What to Expect After Your First Ozempic Injection It’s normal to experience some side effects from a new medication. According to Dr. Ali, the most common side effects reported from Ozempic are gastrointestinal, such as nausea, diarrhea or constipation, stomach cramping, and vomiting. “There are receptors for GLP-1 in the GI tract, which affects how it functions and leads to side effects,” explains Dr. Ali. “However, these side effects tend to subside with continued use of the medication.” According to clinical trials, the majority of reports of nausea, vomiting, and/or diarrhea occurred during dose escalation. Dr. Lofton warns that if you’re taking Ozempic and can’t tolerate the side effects, you should speak to your prescriber. “Lifestyle intervention is still the first-line approach to obesity treatment,” Williamson says. “In most cases, physicians will recommend lifestyle support with professionals like dietitians first. Even when drugs like semaglutide are prescribed, it is meant to complement lifestyle changes by mitigating the challenge of heightened appetite.” Williamson adds that there are three main risks if certain lifestyle adjustments are not considered: Inadequate nutrient intake. “Because appetite can be lowered quite drastically with semaglutide, it’s important that people are choosing nutrient dense foods to get adequate amounts of vitamins and minerals,” he says. Muscle loss. A subset of participants taking Ozempic in a study published in the New England Journal of Medicine lost 39% of their weight as lean mass (the largest portion of which will be muscle mass). “Exercise and obtaining adequate protein is important to prevent this so that one metabolic health issue isn’t presented (i.e., low muscle mass) as another one is solved (i.e., high fat mass),” Williamson explains. Not losing weight. According to research published in Drug Design, Development and Therapy, there is still a small proportion of people (around 7%) who do not lose weight on semaglutide. Williamson points out that more studies are required, but in his practice (and coming across people on the drug on a near-daily basis), he does see some people who eat a high enough caloric density diet (i.e. a high amount of calories for small amount of food) that they do not enter a calorie deficit even on weight loss drugs. “A diet made up of mostly nutritious low-calorie density whole filling foods is still required for many to lose weight on these drugs,” he says. It’s also a habit that can help those who drop out of using drugs like Ozempic from gaining the weight back. https://www.healthcentral.com/condition/type-2-diabetes/how-long-does-it-take-ozempic-to-work
Only use information from the context in your response.
In what ways can technology affect my child?
The Impact of Technology on Children Parenting children of today’s generation comes with a unique set of challenges due to the many recent advancements in technology. There is no denying the reach technology has in our lives, as well as the lives of our children. Technology is virtually in every home in one way or another: about 96% of Americans have a TV and 94% of children ages 3 to 18 have internet access either through a computer or smartphone. According to a national survey done by Common Sense Media in 2019, 53% of children have a smartphone by the time they turn 11. Therefore, it’s important for parents to be mindful of how their children use technology and the potential effects—both positive and negative. Negative Impacts Technology can negatively affect children’s developing social skills, relationships, health, and overall ability to focus. • Social skills: With the increased use of technology, children might not be adequately developing their social skills. This can lead to more children being socially awkward, withdrawn, shy, or intimidated by social situations. They might not know how to engage with other children or adults. Developing social skills takes practice, and if technology is often in the way, there are fewer opportunities for kids to develop these skills. • Relationships: Children might get used to being alone and lose the desire to engage with their parents or even friends, outside of the internet. Often the virtual reality of their devices is more appealing and entertaining than the physical reality. • Health problems: Technology can potentially influence the child’s developing brain and problem-solving skills. For instance, the child might be reliant on a device to solve problems for them rather than using brain connections to work through a problem and find a solution. There could also be a lack of exercise due to being inside, which can cause weight gain. If kids use their devices before bedtime, this could lead to reduced sleep quality, affecting their overall wellbeing and immune system. • Ability to focus: Children who spend a lot of time using devices might have a reduced attention span and ability to focus due to their reliance on technology to pay attention for them. This is evident in classrooms, where teachers are opting for shorter lesson plans to accommodate students becoming easily distracted. • Dangers of browsing: With so much information available on the internet, it’s difficult for parents to monitor what their children are exposed to, including inappropriate content or interactions with strangers. Positive Impacts There are also many ways in which technology can positively impact our lives and those of our children—it all depends on how the technology is being used. • Organization: Technology can be beneficial to organization and planning. For example, families can keep an online calendar to make it easier to stay updated on each other’s schedules. Group text messaging is also convenient for streamlining communication and keeping everyone in the loop. Lastly, technology also makes budgeting easier with different apps, which can help parents teach children about money management. • Research and critical thinking: The internet provides access to a great deal of information and resources to help children learn about different topics. This is helpful for school projects or for researching areas of interest. This can also be a teachable moment, by showing children how to sift through information to find reliable sources. • Bonding and community: Technology can foster connection by allowing kids to stay in touch with family members or friends who do not live close by. Also, kids can interact with others in their age group while playing games online and learn to play as a team. • Self-expression: Children can learn how to share their thoughts online, which is a powerful tool that can build confidence. They can learn how to connect with others and be exposed to other viewpoints or perspectives. • Creativity and exploring interests: In many ways, technology fosters creativity and learning new skills through various apps for all different ages. Children can explore different areas they have an interest in, such as learning to play an instrument, creative writing, or beginner programs related to various subjects.
Only use information from the context in your response. In what ways can technology affect my child? The Impact of Technology on Children Parenting children of today’s generation comes with a unique set of challenges due to the many recent advancements in technology. There is no denying the reach technology has in our lives, as well as the lives of our children. Technology is virtually in every home in one way or another: about 96% of Americans have a TV and 94% of children ages 3 to 18 have internet access either through a computer or smartphone. According to a national survey done by Common Sense Media in 2019, 53% of children have a smartphone by the time they turn 11. Therefore, it’s important for parents to be mindful of how their children use technology and the potential effects—both positive and negative. Negative Impacts Technology can negatively affect children’s developing social skills, relationships, health, and overall ability to focus. • Social skills: With the increased use of technology, children might not be adequately developing their social skills. This can lead to more children being socially awkward, withdrawn, shy, or intimidated by social situations. They might not know how to engage with other children or adults. Developing social skills takes practice, and if technology is often in the way, there are fewer opportunities for kids to develop these skills. • Relationships: Children might get used to being alone and lose the desire to engage with their parents or even friends, outside of the internet. Often the virtual reality of their devices is more appealing and entertaining than the physical reality. • Health problems: Technology can potentially influence the child’s developing brain and problem-solving skills. For instance, the child might be reliant on a device to solve problems for them rather than using brain connections to work through a problem and find a solution. There could also be a lack of exercise due to being inside, which can cause weight gain. If kids use their devices before bedtime, this could lead to reduced sleep quality, affecting their overall wellbeing and immune system. • Ability to focus: Children who spend a lot of time using devices might have a reduced attention span and ability to focus due to their reliance on technology to pay attention for them. This is evident in classrooms, where teachers are opting for shorter lesson plans to accommodate students becoming easily distracted. • Dangers of browsing: With so much information available on the internet, it’s difficult for parents to monitor what their children are exposed to, including inappropriate content or interactions with strangers. Positive Impacts There are also many ways in which technology can positively impact our lives and those of our children—it all depends on how the technology is being used. • Organization: Technology can be beneficial to organization and planning. For example, families can keep an online calendar to make it easier to stay updated on each other’s schedules. Group text messaging is also convenient for streamlining communication and keeping everyone in the loop. Lastly, technology also makes budgeting easier with different apps, which can help parents teach children about money management. • Research and critical thinking: The internet provides access to a great deal of information and resources to help children learn about different topics. This is helpful for school projects or for researching areas of interest. This can also be a teachable moment, by showing children how to sift through information to find reliable sources. • Bonding and community: Technology can foster connection by allowing kids to stay in touch with family members or friends who do not live close by. Also, kids can interact with others in their age group while playing games online and learn to play as a team. • Self-expression: Children can learn how to share their thoughts online, which is a powerful tool that can build confidence. They can learn how to connect with others and be exposed to other viewpoints or perspectives. • Creativity and exploring interests: In many ways, technology fosters creativity and learning new skills through various apps for all different ages. Children can explore different areas they have an interest in, such as learning to play an instrument, creative writing, or beginner programs related to various subjects.
Please limit your knowledge to the document. Avoid generalizations and ensure accuracy by directly referencing the document's arguments and examples.
How can graduate students receive financial support at the University of Cincinnati?
University of Cincinnati Graduate College Graduate Handbook Welcome from the Graduate College! We invite you to review the Graduate Handbook. This document is designed as a helpful guide to graduate education at UC. Here is where you will find policies, procedures, and important information for the graduate student lifecycle, from admissions to graduation. In addition, there may also be requirements that pertain to specific degree programs and colleges. Please visit program and college websites for these specific requirements. 1 The Graduate College Graduate College Leadership Rose Marie Ward Vice Provost and Dean of the Graduate College Omotayo (Tayo) Banjo Associate Dean of the Graduate College Tai Collins Associate Dean of the Graduate College Laura Dell Graduate College Thought Leader Emily Kregor Software Applications Developer Lead Sarah Matthews Sr Data Reporting Analyst Angel Prewitt Assistant Director of Business Affairs Megan Tischner Carroll Program Director Graduate College Staff Kaitlin Bauer Academic Evaluator Virginia Dennis Program Manager, Student Services Shaymaa Minkara Program Manager, Graduation Caitie Norrie Program Manager, Professional Development Stephen Patrick Program Manager, Marketing and Communications Amy Wheeler Program Manager, Student Success & Retention Brandilyn Worrell Program Manager, Community and Belonging 2 Brady Wright Executive Staff Assistant and Office Manager Graduate College IT Staff Chris Amann Computer & Info Analyst, Management Specialist IT Dushan Aththidiyavidanalage Don Software Applications Developer Eric Rasnake Computer & Info Analyst I Coco Zhang Software Applications Developer Contact the Graduate College Location University of Cincinnati 110 Van Wormer Hall 2614 University Circle Cincinnati, OH Mailing Address P.O. Box 210627 Cincinnati, OH 45221-0627 Email: [email protected] or [email protected] Phone: (513) 556-4335 Fax: (513) 556-0128 3 Introduction This Graduate Handbook is intended to provide information about university policies that assist faculty, students, and program coordinators in supporting their individual programs of study. To which educational programs does this Handbook pertain? The Graduate College oversees all post-baccalaureate certificates and degrees (master’s and doctoral level) EXCEPT the Juris Doctor (in the College of Law), the Doctor of Medicine (in the College of Medicine), and the Doctor of Pharmacy (in the College of Pharmacy). The University of Cincinnati does not discriminate on the basis of disability, race, color, religion, national origin, ancestry, medical condition, genetic information, marital status, parental status (including status as a foster parent), sex, age, sexual orientation, veteran status, military status (past, present, or future), or gender identity and expression in its programs and activities. View UC’s complete Notice of Non-Discrimination. Published 11/28/2023. This version is an update to the 2022-23 AY handbook to reflect changes to the Graduate Scholarship structure and terminology. This version supersedes all previous versions. 4 TABLE OF CONTENTS ADMISSION TO GRADUATE PROGRAMS ....................................... 9 ADMISSIONS POLICY .............................................................................................. 9 Faculty and Administrators' Eligibility for Graduate Degrees .................................. 9 ADMISSIONS CATEGORIES .................................................................................... 9 APPLICATION PROCESS FOR 4+1 AND AIM PROGRAMS .................................. 10 Application to 4+1 Degree Programs .................................................................... 10 Application to Accelerated Integrated Master’s (AIM) Programs .......................... 11 DUAL DEGREE PROGRAMS .................................................................................. 11 CHANGING DEGREE PROGRAMS AT UC ............................................................ 11 GRADUATE CERTIFICATE PROGRAMS ............................................................... 12 INTERNATIONAL STUDENT ADMISSION.............................................................. 12 English Proficiency Requirement .......................................................................... 13 FINANCIAL SUPPORT .................................................................... 14 UNIVERSITY MERIT-BASED GRADUATE AWARDS ............................................. 14 GRADUATE SCHOLARSHIPS (GS)........................................................................ 14 UNIVERSITY FELLOWSHIPS ................................................................................. 15 GRADUATE ASSISTANTSHIP STIPEND AWARDS ............................................... 16 Teaching Assistant Requirements and OEPT ...................................................... 17 Graduate Assistant/Fellow Health Insurance Awards ........................................... 17 Multiple Appointments/Employment ..................................................................... 18 Summer Employment Without Full-time Enrollment ............................................. 18 Graduate Assistants on Jury Duty ........................................................................ 18 Strike Policy for Graduate Assistants ................................................................... 19 Sick Leave/Family Leave for Graduate Assistants ............................................... 19 Holidays/UC Closing Policy for Graduate Assistants ............................................ 19 Military Duty .......................................................................................................... 19 Termination........................................................................................................... 19 Workers’ Compensation ....................................................................................... 19 Unemployment ..................................................................................................... 19 Social Security, Medicare Tax and Ohio Public Employees Retirement System (OPERS)............................................................................................................... 20 174 GRADUATE CREDIT RULE .............................................................................. 20 TAXATION OF CINCINNATI GRADUATE AWARDS .............................................. 21 EXEMPTION FROM OPERS FOR STUDENT EMPLOYEES.................................. 21 EXTERNAL SOURCES OF FUNDING .................................................................... 21 5 FEDERAL FINANCIAL AID ...................................................................................... 22 GRADUATE CREDIT AND GRADES............................................... 23 ELIGIBLE CREDITS ................................................................................................ 23 CREDITS REQUIRED TO EARN A GRADUATE DEGREE .................................... 23 Advanced Standing for Graduate Courses Taken Outside of UC ......................... 23 Transfer Credit for Graduate Courses Taken at UC ............................................. 24 Course Exemption for Prior Knowledge, Without Credit ....................................... 24 Multiple Degree Exemptions ................................................................................. 25 Enrolling in Non-UC Classes through the Greater Cincinnati Collegiate Connection ............................................................................................................................. 25 Graduate Credit for Undergraduate Students ....................................................... 25 Graduate Credit Earned in 6000-Level Courses ................................................... 25 GRADING ................................................................................................................ 25 Final Exams .......................................................................................................... 25 Make-up Final Exams ........................................................................................... 26 Grade Reports ...................................................................................................... 26 Grades Assigned to Research Courses That Are Repeated ................................ 27 Pass/Fail Grades .................................................................................................. 27 Grade Changes .................................................................................................... 27 No Grade Replacements for Graduate Students .................................................. 27 MAINTAINING GRADUATE STUDENT STATUS ............................ 29 MINIMUM CREDITS/REGISTRATION REQUIREMENTS ....................................... 29 Dual Degree Programs ......................................................................................... 29 FULL-TIME COURSE LOAD.................................................................................... 29 PART-TIME COURSE LOAD ................................................................................... 29 REDUCED COURSE LOAD (INTERNATIONAL STUDENTS) ................................ 30 MEETING PROGRAM REQUIREMENTS................................................................ 30 MINIMUM ACADEMIC PERFORMANCE ................................................................ 30 INTERNATIONAL STUDENTS, MAINTAINING IMMIGRATION STATUS............... 30 TIME TO DEGREE .................................................................................................. 30 Time to Degree and Extensions ........................................................................... 30 Reinstatements..................................................................................................... 31 Readmission ......................................................................................................... 32 Leaves of Absence ............................................................................................... 32 Withdrawal from Program ..................................................................................... 33 Dismissal from Program ....................................................................................... 33 MASTER’S DEGREE POLICIES AND PROCEDURES ................... 34 COURSE OF STUDY ............................................................................................... 34 6 CREDIT HOUR REQUIREMENTS .......................................................................... 34 CANDIDACY ............................................................................................................ 34 CULMINATING EXPERIENCE: THESES and CAPSTONES .................................. 34 Thesis Preparation, Evaluation and Submission Process..................................... 34 Capstone Process ................................................................................................ 35 GRADUATION ......................................................................................................... 35 Application to Graduate ........................................................................................ 36 Graduation from Dual Degree Programs .............................................................. 36 Certification for Graduation (Certify Online) .......................................................... 36 CONTINUING TO A DOCTORAL PROGRAM ......................................................... 37 DOCTORAL DEGREE POLICIES AND PROCEDURES ................. 38 COURSE OF STUDY ............................................................................................... 38 CREDIT HOUR REQUIREMENTS .......................................................................... 38 RESIDENCY AS FULL-TIME STUDENT ................................................................. 38 CANDIDACY, QUALIFYING EXAM ......................................................................... 38 UNIVERSITY GRADUATE FACULTY ROLE ........................................................... 39 DISSERTATION....................................................................................................... 39 Dissertation Advisor and Committee..................................................................... 39 Final Defense of Dissertation................................................................................ 40 Use of a Moderator ............................................................................................... 40 Submission of Dissertation ................................................................................... 40 GRADUATION ......................................................................................................... 41 Application to Graduate ........................................................................................ 41 Dual Degree Programs Graduation ...................................................................... 41 Graduation Requirements for Doctoral Degrees................................................... 41 Certification for Graduation (Certify Online) .......................................................... 41 GRADUATE CERTIFICATE VERIFICATION FOR UC TRANSCRIPT ENDORSEMENT ..................................................................................................... 42 DOCTORAL HOODING AND MASTER’S RECOGNITION CEREMONY ................ 42 INSTITUTIONAL RULES, POLICIES, AND PROCEDURES ............ 44 PROGRAM STANDARDS........................................................................................ 44 RECORDS PRIVACY, FERPA, AND THE RIGHT TO REVIEW .............................. 44 NOTICE OF NON-DISCRIMINATION ...................................................................... 44 ACADEMIC DISHONESTY ...................................................................................... 45 STUDENT CODE OF CONDUCT ............................................................................ 45 RESPONSIBLE CONDUCT OF RESEARCH .......................................................... 46 RESTRICTED RESEARCH ..................................................................................... 46 7 GRADUATE STUDENT GRIEVANCE PROCEDURES ........................................... 46 8 ADMISSION TO GRADUATE PROGRAMS ADMISSIONS POLICY The University of Cincinnati welcomes graduate applications from students who: • hold a baccalaureate degree from a college or university regarded as standard by a regional accrediting agency and; • have at least a B average (3.000/4.0 system) in undergraduate course work or otherwise give evidence of promise that is judged satisfactory by the admitting program and the Graduate College. Programs that wish to admit applicants who lack this 3.000 minimum GPA requirement must provide supporting evidence and rationale of how such students will be able to complete a graduate program that requires achievement of a 3.000 GPA, and indicate any support offered by the program to ensure the applicant’s success given the GPA deficiency. Decisions concerning admission to graduate programs rest with the programs, and criteria used for determining admission beyond these minimal requirements are established by the programs. All programs have established written criteria for judging the admissibility of applicants, which are published in each program’s graduate handbook. The program’s handbook for graduate study must be available to the student. Upon the student’s acceptance of the admission offer, the program and the student are bound by the terms and conditions set forth in the letter of appointment. Faculty and Administrators' Eligibility for Graduate Degrees No holder of an academic administrative title at the University of Cincinnati (equivalent to assistant dean or above) may matriculate or be granted a graduate certificate or degree from the University of Cincinnati. No graduate degree or certificate from the University of Cincinnati will be granted to any faculty member at the University of Cincinnati (full-time or part-time above rank of instructor) who teaches in the same department, division or school in which the degree is to be granted. This rule also applies to adjunct appointments at any faculty rank and to interdisciplinary degrees when the same college is one of the interdisciplinary colleges. College deans may petition the Associate Dean of the Graduate College for a waiver of this policy on an individual faculty member’s behalf. The written request should describe the teaching responsibilities of the faculty member, indicating whether they are teaching graduate students and a plan for managing potential conflicts of interest. ADMISSIONS CATEGORIES Matriculated graduate status is granted to an applicant who has been accepted into a graduate certificate or degree program and has met all admissions criteria. Note that applicants first receive a provisional acceptance, and conversion to matriculated graduate status is dependent upon receipt of an official transcript that confirms that the student holds a baccalaureate or higher degree from a college or university regarded as standard by a regional accrediting agency. Please note that additional official documentation may be required (e.g. if the transcript does not contain information about degree conferral or if a foreign degree needs confirmation as baccalaureate equivalent). Instructions and deadlines for meeting this requirement are included on the Transcript Submission Policy web page. 9 Provisional graduate status is granted to applicants who have been accepted into a graduate certificate or degree program, but who have NOT yet met all admissions criteria. As described above, one routine requirement for all students is the submission of an official transcript. However, some students must in addition take undergraduate courses or improve English language proficiency to satisfy prerequisites, and these students may be accepted by the program on a provisional basis that is contingent on satisfying those additional prerequisites. Letters of admission should be read carefully to make sure all requirements tied to provisional status are identified. Visiting student status allows students to take courses for graduate credit when they have not been admitted into a graduate degree program. These students were previously called “non- matriculated students”. Should this visiting student subsequently matriculate into a certificate or degree program, a maximum of 12 semester hours may be applied to the certificate or degree program. Students are not eligible for tuition or stipend awards allocated by the Graduate College while in visiting graduate status. This policy and other funding policies are further explained in the Financial Support chapter. APPLICATION PROCESS FOR 4+1 AND AIM PROGRAMS Application to 4+1 Degree Programs If an undergraduate student plans to matriculate into a master’s degree program upon completion of the bachelor's degree, they can consult with advisors to begin (A) taking graduate-level coursework as an advanced undergraduate student, and (B) focusing on thesis-related, independent research at an earlier date. This advising plan to achieve an articulated path to a master’s degree is called a 4+1 program. Students who enter these programs must complete all of the requirements of each respective degree and must apply separately for both degree programs at the appropriate time. To be eligible for entry to a 4+1 program, students must have junior standing (64 semester credits). In addition, students must meet all College and graduate program admission requirements for the particular program. 4+1 students should note the following: • 4+1 students who enroll in graduate-level coursework prior to formally matriculating as a graduate student are allowed to apply up to 12 semester graduate-level credits toward the requirements of the master’s degree. These credits cannot be used for the bachelor’s degree. Students in the 4+1 program will complete the rest of their graduate coursework after formal completion and certification of the bachelor's degree. Students should refer to the section of this handbook containing the general requirements of the master’s degree and speak to the directors of the graduate program about specific requirements. • 4+1 students wishing to matriculate into a master’s program must complete a formal graduate admission application online in their junior or senior year to be admitted to the graduate program and begin the master’s degree. Students should speak to the directors of the graduate program about specific admission and application requirements. 10 Application to Accelerated Integrated Master’s (AIM) Programs The university has a limited set of programs that allow for a single application and admission to obtain a bachelor’s plus master’s degree in a single course of study. These programs are tightly structured around co-op experiences and allow undergraduate students to accumulate more than 12 graduate credits prior to transitioning to a matriculated graduate student. Applicants apply to an AIM program at the time of application to UC as an undergraduate but are still required to formally apply to transition to the graduate portion of their program at a time defined by their AIM program. There is a free and abbreviated application for UC undergraduate students transitioning to the associated master’s degree that is part of their AIM program. DUAL DEGREE PROGRAMS The university offers the opportunity for students to pursue two complementary graduate degrees simultaneously through structured, official dual degree programs (see below for a complete listing). The advantage of these programs is that they may require fewer credits than completing each degree program separately. Each program’s entrance requirements must be met in addition to university requirements, and the applicant must be accepted by both programs. Below is a listing of the Dual Degree programs: • Accounting MBA/MS • Business Analytics MBA/MS • Business Administration/Arts Administration MBA/MA • Business Administration/Nursing MBA/MSN • Community Planning/Landscape Architecture MCP/MLA • Community Planning/Law MCP/JD • Finance MBA/MS • Human Resources MBA/MA • Information Systems MBA/MS • Marketing MBA/MS • Law/Women’s Studies JD/MA • Law/Business JD/MBA • Law/Political Science JD/MA • Law/Political Science JD/PhD Please see the Multiple Degree Exemptions section for information on the maximum amount of transfer credit that can be applied to the dual degree programs. CHANGING DEGREE PROGRAMS AT UC In order to change from one degree program to another within the university, a student must submit a complete application to the new program. If the degrees are housed in the same unit, and the change is made over consecutive term enrollments, the application fee is waived. If the new degree program is in a different administrative program, the student is responsible for paying the application fee. Students are always responsible for fulfilling the requirements of the given degree program in which they are matriculated. Please see the Transfer Credit for Graduate Courses Taken at UC 11 section for information on the amount of graduate credits that can be transferred if a student is changing from one graduate program to another within the university, or if a student is changing from visiting graduate status at the university. GRADUATE CERTIFICATE PROGRAMS The University of Cincinnati offers graduate certificate programs. Certificates vary in both credit hours and in how they are configured: for instance, some can be earned only in conjunction with a degree; some require a master’s degree as a prerequisite, and some can be earned outside of a degree program. Applicants must apply for admission to a certificate program. Graduate College general guidelines are as follows: • Students must hold a baccalaureate degree. • Certificate programs may enroll degree seeking and non-degree seeking students. • For students matriculated into a degree program, credit hours earned under a certificate program may count toward a degree in any program if approved by the program director, and if requirements for the certificate and degree are completed the student will be awarded both. Credits earned while matriculated in a certificate program will count as credits matriculated in a degree. • Students can apply a single course to multiple certificates but only to ONE master’s or doctoral degree. • Students can obtain more than one certificate within the same program prior to attaining their master’s degree. • Students apply for a certificate program just like applying for a degree program, and must pay any relevant application fee. • Students enrolled only in a graduate certificate program are not eligible for tuition or stipend support with university funds (University Graduate Assistantship/Graduate Scholarship funds). If a student is interested, the student should contact the appropriate program office to obtain the specific criteria and prerequisites for the desired certificate. INTERNATIONAL STUDENT ADMISSION UC International Services supports the needs of international students at the University of Cincinnati. The office assists international students in understanding the rules, regulations, and procedures that must be followed during their stay in the United States and provides support services and cultural information to students. UC International Services is located in Suite 7148, One Edwards Center (1-513-556-4278). Information about admission to the University of Cincinnati for international students is available on their website. International students with F-1 visas can only be granted admission as matriculated graduate status in a degree-seeking program. (Most international students with J-1 visas can be granted admission with matriculated graduate status only, with some exceptions.) Students with J-1 visas should inquire with UC International Services to determine the regulations that apply to them. Students with green cards (U.S. resident aliens/permanent residents) are not defined as international students and, therefore, are not governed by the university’s international student policies. However, the English proficiency requirement does apply to green card holders (see The English Proficiency Requirement, below). 12 In instances where an international student holds a degree for which the U.S. equivalent is not known, or if it is determined by the program or the Graduate College that the applicant does not have the equivalent of a bachelor’s degree, the program must submit a petition for admission without the bachelor’s degree, with supporting documentation and rationale, to the Associate Dean of the Graduate College. All international students are required to carry University of Cincinnati student health insurance unless they qualify for a waiver. Semester insurance fees are automatically assessed each registration period. Please visit the Graduate College website for more information on the Graduate Assistant/Fellow Health Insurance Award. English Proficiency Requirement English proficiency is required of all applicants whose native language is not English. Students can demonstrate proficiency in a number of ways at the graduate level. PLEASE NOTE, many colleges and programs have higher requirements than those listed below. Applicants should contact the programs to which they are applying for details. For more information, please refer to the English Proficiency Requirement web page. 13 FINANCIAL SUPPORT Graduate students may obtain financial support from several sources. • The University of Cincinnati provides merit-based graduate awards in the form of tuition scholarships (known as the Graduate Scholarships, which may be provided with or without an assistantship), as well as stipend awards (graduate assistantships including teaching and research assistantships), and program-specific scholarships and fellowships. • Scholarship and fellowship support is also available from a diverse collection of external sponsors at the local, state, national, and international levels. Programs and colleges may have additional sources of support through grants and endowed funds • Need-based support may be obtained from federal and state sources. Financial support from each of these sources is described below. UNIVERSITY MERIT-BASED GRADUATE AWARDS The University of Cincinnati offers several types of merit-based graduate awards. The most common types – Graduate Scholarships, fellowships, and University Graduate Assistantships – are described below. Most university graduate awards are underwritten by university funds allocated by the Graduate College (“general funds”) to each college, which are then awarded to students by the individual programs. Some awards are competitive and granted by the Graduate College upon recommendation of an individual graduate program. Not all graduate students are eligible for graduate awards. Graduate awards allocated by the Graduate College are not available to students: (1) taking classes as visiting students, (2) enrolled only in a graduate certificate program, (3) who have not maintained the minimum GPA of 3.000 in their program, (4) who are on academic probation, or (5) who have exceeded the 174 graduate credit rule. Awards can only be guaranteed for a maximum period of one academic year, and renewal of a university graduate award is not automatic. Awards that are appointed by individual programs are awarded to eligible students at the sole discretion of the program. Programs are not obligated to renew awards, even if previously awarded students met all eligibility requirements. GRADUATE SCHOLARSHIPS (GS) The Graduate College funds scholarships that cover all or part of a student’s tuition and fees. In most colleges, the scholarship awards supported by the Graduate College are the Graduate Scholarships (GS), with and without assistantships. The GS with assistantship is used to support graduate assistants who are additionally awarded a stipend that requires service in return for stipend support. The GS without assistantship is for graduate students who do not receive university stipend support and therefore no service is required in return for the GS award. The appointing program sends written offers of scholarship awards to students, including information about the amount and duration of the award and the terms of the offer. Students must maintain all of the required eligibility requirements in their offer letter to maintain their tuition scholarship. 14 Students receiving a tuition scholarship must register for a specified minimum number of graduate credit hours in each semester for which they are receiving support. If an international student is supported by a GS without assistantship, they must register for a minimum load of 10 graduate credit hours per semester during the time they receive the GS scholarship. If a domestic student is supported by a GS without assistantship, they must register for a minimum load of 1 graduate credit hour per semester during the time they receive the GS scholarship. Students supported by a GS with assistantship must register for a minimum of 12 graduate credit hours per semester during the time they receive the GS scholarship. These minimum enrollments in graded courses must be met prior to using scholarship support for any audited courses. If a student withdraws from a class funded by a tuition scholarship, with the remaining enrolled credit hours totaling less than the minimum required for the award, the award is cancelled immediately and the student is responsible for the tuition balance, based on the date of withdrawal. Full tuition scholarships cover a maximum of 18 credits per semester. Students registered for more than 18 credits in a semester will be billed tuition and general fees on a per-credit-hour rate for each credit over the 18. All rules that govern recipients of tuition support pertain to all students, including international students. Other rules and policies that apply specifically to international students are independent of GS regulations. Both sets of regulations must be met. Neither set of regulations negates or takes the place of the other. (See 174 Graduate Credit Rule.) Note: Financial awards that require no service may reduce eligibility for educational loans. Students should notify the Student Financial Aid Office of their tuition support if they apply for aid from that office. UNIVERSITY FELLOWSHIPS University of Cincinnati fellowships are financial awards that include tuition scholarships and stipends with no associated service requirements. The purpose of a fellowship award is to allow the recipient to concentrate exclusively on their studies; therefore, multiple appointments and/or employment by the University of Cincinnati are not permitted for students receiving fellowships. The appointing program sends written offers of fellowship awards, including information about the amount and duration of the award; a general description of the academic obligations accepted by the student as part of the award; a reference to sources of information about academic requirements for degree completion; a description of the conditions under which either the student or unit may terminate the award prior to its end-date; and criteria for reappointment. Students receiving fellowships should check with Student Financial Aid to be informed about the potential impact on their eligibility for aid. Income received that is not for services rendered (whether it be in the form of a fellowship, grant, or award) will be calculated in whether a student meets the Cost of Attendance for the University of Cincinnati. Fellowship awardees have an enrollment obligation identical to GS with assistantship/UGA (university graduate assistantship) awardees, and they lose eligibility for the fellowship award if they accumulate more than 174 graduate credit hours. (See 174 Graduate Credit Rule). 15 For information on university-sponsored fellowships, please see the Graduate College website. GRADUATE ASSISTANTSHIP STIPEND AWARDS A student awarded a graduate assistantship receives a financial stipend for services rendered in addition to a full or partial tuition scholarship. These stipend funds are called UGA (university graduate assistantship) awards. Graduate assistants are also entitled to a discount at the University Bookstore and may be eligible for the Graduate Assistant/Fellow Health Insurance Award. UGA awardees devote effort to a combined program of formal study and assigned duties of teaching, research or administrative service that is designed to enhance their university education. The stipend received by the graduate assistant is in recognition of these services. Those with teaching duties are teaching assistants (TAs) and those with research duties are research assistants (RAs). During the appointment, the goal is to help a graduate student become a more learned, creative, and professional individual through formal instruction, interaction with faculty, research, and administrative experience. Any such service assignments should be consistent with the student’s academic pursuits. UGA funds are awarded for designated periods of time by the graduate programs. Graduate Assistants are considered exempt from minimum wage and overtime requirements, and they are paid on a salaried basis. Minimum stipends are set by the Dean of the Graduate College. The minimum stipend for a graduate assistant, as set in July 2023, must be the equivalent of a minimum of $16.98 per hour for all master’s and doctoral students except those in PhD programs. Graduate assistants enrolled in PhD programs have a minimum of $22.28 per hour. The appointing academic program, college, or area of responsibility determines service requirements of students who hold assistantships. If awarded an assistantship outside their program, graduate assistants’ duties are governed by the academic program, college, or the area of responsibility that made the award. In all cases, the award obligates awardees to no more than 20 hours per week of services, and those services must make a substantive contribution to the student’s academic and professional development. Students must be appointed to a position that is consistent with their field of academic study. If the student determines that they cannot meet the requirements of the award, it is imperative that they notify the program to initiate renegotiation or reassignment of the award with correspondingly less support. A student’s hours are prorated for weeks with a holiday or school closure and students are not required to be available during break periods unless given additional compensation. UGA awardees must be registered for 12 graduate credit hours or more, exclusive of audit credits, for each semester they receive the assistantship. University assistantships will be cancelled if the awardee does not meet their enrollment obligation. The exception to this rule is summer semester. See Summer Employment without Full-time Enrollment section. Students lose eligibility for the UGA stipend funding if they accumulate more than 174 graduate credit hours. (See 174 Graduate Credit Rule.) Assistantship awards are contingent upon student status, satisfactory degree progress, and performance of service as assigned, and can be terminated at any time. Each year the assistantship is in effect, the appointing program, college, or area must notify the awardee in 16 writing of any significant change to the services or conditions of the appointment. Such changes include, but are not limited to: • the amount and duration of the award • any tuition and/or fee not paid by the program • the average expected time per week or per semester of required duties • description of the duties assigned to the student • description of the conditions under which either the student or unit may terminate the award prior to its end-date • criteria for reappointment of the award • criteria for determining variations in stipend levels where such variations exist • information on current IRS guidelines, Medicare, and the Public Employee Retirement System (PERS) • graduate appointment procedures if any of the documents have been modified since the student’s initial appointment. Teaching Assistant Requirements and OEPT All teaching assistants must be supervised by a faculty member who has the academic credentials and authorization (as defined by the Higher Learning Commission, Ohio Dept. of Higher Education, and the University of Cincinnati) to offer instruction to the students in the class. Supervising faculty must be listed (as supervisor or instructor) in any course/section overseen by a graduate teaching assistant. Non-native speakers of English who are awarded teaching assistantships at the University of Cincinnati are required to score at least a 3.0 on the Oral English Proficiency Test (OEPT). The OEPT evaluates the spoken language skills of non-native speakers of English. Students who pass are certified for oral English proficiency and may assume the full range of duties associated with their teaching assistantship. Students whose oral English proficiency has not been officially certified may not assume instructional responsibilities. However, students who score 26 or above on the speaking section of the TOEFL IBT or students with a score of 50 or above on the Test of Spoken English are exempt from the OEPT. Students are required to take the test at the beginning of their first term of study. If a score is less than 3.0, students are recommended to take ESL courses before retaking the test. A student is permitted to take the OEPT twice without charge during an academic year. Graduate Assistant/Fellow Health Insurance Awards Academic programs are required to notify eligible students with information on the Graduate Student Health Insurance (GSHI) award, which can subsidize the cost of UC Student Health Insurance for qualified students. Programs must provide graduate assistants/fellows with the GSHI Award application deadline and relevant details on GSHI Award criteria, and must keep records that they have provided this information to their students. Such information can be found at the Graduate Student Health Insurance Award web page. 17 Multiple Appointments/Employment Graduate assistantship awardees who are domestic students are limited to 24 total hours of combined service and student hourly work while school is in session. The following policies regarding multiple appointments must be followed: • Units are responsible for monitoring of hours worked by student employees assigned to their unit; this is especially important for students who hold multiple student appointments. • The program must closely monitor academic progress. • The additional appointment must be terminated if a student does not maintain academic progress deemed to be acceptable by the program. This limit applies only while school is in session. During scheduled breaks only, if students work more than 20 hours or they work more than the prorated salary hours required, they must be compensated at an hourly rate for the extra work. Students can be employed for a maximum of 40 hrs/week during scheduled breaks. International students are limited to working 20 hours per week while school is in session and are limited to 40 hours per week during scheduled breaks. All International Students must have onboarding conducted by the International Services Office. An international student on F-1 or J-1 immigration status contemplating employment should contact the International Student Services Office at 1-513-556-4278. Summer Employment Without Full-time Enrollment For summer semester only, students who are not registered for graduate credit hours or are registered for less than 12 credits hours are eligible to be employed by their respective program, usually by performing the duties of their assistantship such as teaching or lab work. In this case, the student will receive a stipend for the work performed. Retirement funds and taxes will be withheld from the student’s check. Questions about options with retirement funds once separated from the university should be directed to Human Resources and/or OPERS. Graduate Assistants on Jury Duty All graduate students are encouraged to participate when they are subpoenaed for jury duty. The student must seek their advisor’s and program director’s permission with the expectation that every effort will be made to accommodate the jury service. If the student’s absence from UC will create a hardship to the unit, they should seek a deferral or make arrangements to cover their responsibilities during the absence. Such arrangements must be approved by their program director. Students serving on jury duty will be paid their normal university stipend during the period of service, with the understanding that any compensation received for jury service must be returned to the university if their assistantship responsibilities remain uncovered. If the student makes arrangements to cover their assistantship commitment for the period in which they serve on jury duty, and if those arrangements are approved by their program director, they may keep the jury duty compensation in total. The student may also keep any travel reimbursement fees. 18 Strike Policy for Graduate Assistants In the event of a strike, graduate assistants are expected to fulfill commitments associated with their assistantships. Graduate assistants assigned to teach a course as part of their assistantship agreement are expected to teach the course during a strike. Graduate assistants who choose not to teach can lose their assistantship. If the student’s responsibilities are associated with a course taught by a faculty member and the strike results in the course not being taught, which makes it impossible for the student to fulfill their responsibilities, the student would not be held responsible. Sick Leave/Family Leave for Graduate Assistants Graduate assistants do not accrue vacation, sick leave or other paid time-off. In the event of illness, a graduate assistant shall notify the GA supervisor as soon as possible on each day of such absence. Holidays/UC Closing Policy for Graduate Assistants Graduate assistants are not hired as essential personnel, and thus cannot be required to work during holidays or official UC closings (such as emergency closings due to severe weather, public emergency, etc.). Required weekly hours will be prorated based on the official holidays or closings during that week. Military Duty A graduate assistant who is a member of any reserve component of the United States Armed Forces, who is voluntarily or involuntarily ordered to extended U.S. military service, shall be granted time-off without pay. The graduate assistant should provide to the appropriate program official advance written notice of the call for impending training or active duty. Upon completion of military service or if discharged under honorable conditions, and upon prompt re-registration as a student, the graduate assistant shall be returned to the former assistantship in a timely manner, based upon availability. Due to the temporary nature of graduate assistantships, if the assistantship is eliminated during the student’s absence, then no obligation exists. Termination A graduate assistantship may be terminated at any time with or without cause, unless there is an explicit written contract between the student and the university that provides otherwise. Workers’ Compensation The Ohio Workers’ Compensation Law covers graduate assistants, who are paid by payroll and provides medical, income and survivor benefits in the event of accidental injury, occupational disease or death occurring in the course of, and arising from, employment. Unemployment Graduate assistants are not entitled to unemployment compensation. 19 Social Security, Medicare Tax and Ohio Public Employees Retirement System (OPERS) Please see Exemption from OPERS/Medicare for Student Employees. 174 GRADUATE CREDIT RULE Students receiving any university award (e.g. UGA stipend, GS tuition scholarship) and students who receive funds from the State of Ohio are governed by the requirements and limitations described in the following paragraphs. Any student who becomes ineligible to receive state subsidy is not eligible to receive general funds financial aid (i.e., a university stipend and/or tuition). Since this policy is due to regulations governing state support of the university, exceptions to the policy are not considered. Graduate students who have attempted 174 graduate credit hours at the University of Cincinnati are not eligible for a university award for enrollment at or beyond the 174 hours. Hours attempted include hours for which credit has been awarded, as well as withdrawn courses, audited courses, and hours in progress or incomplete (these graduate credit hours include all courses with grades F, I, UW, SP, IP, UP, W, etc.). All graduate hours attempted at the University of Cincinnati, regardless of program or student status, count toward the 174 total. A student is not eligible for funding beginning with the semester in which said student will reach the 174 attempted hours. For example, if a student has earned 167 graduate credit hours at the University of Cincinnati by the close of summer sessions and registers for (i.e., attempts) 12 credit hours for fall semester, they are ineligible for a university graduate scholarship or fellowship in the fall semester. If a student earned master’s credits at the University of Cincinnati (for either a partial or a full degree), the exact number of these credits are deducted from the 174 credit hour total for which they can receive funding. This is true if the credits are earned at an earlier time and the student returns to the University of Cincinnati to continue graduate education, and it is true regardless of the discipline in which those credits were earned. For example, if a student has earned a master’s degree in engineering and then chooses to pursue a master’s and a doctoral degree in math, the credits earned to get the engineering degree are deducted from the 174 credit hours for which the student can receive state financial support (e.g., fellowships, assistantships, and scholarships). Graduate students who have earned a master’s degree or other equivalent or higher advanced degree at another institution are not eligible for a university scholarship or fellowship once they have attempted 140 graduate credit hours at the University of Cincinnati. If a student enters the University of Cincinnati with a master’s degree from any institution other than the University of Cincinnati, they are credited with 34 graduate credit hours toward the 174 credit hour limit for state funding eligibility. Per Ohio Department of Higher Education policy, Ohio can subsidize up to the remaining 140 credit hours. The 34 credit hours are deducted from the 174, regardless of the discipline and regardless of the graduate level at which the student enters the University of Cincinnati. For example, if a student has earned a master’s degree in engineering at The Ohio State University and then chooses to pursue a master’s and a doctoral degree in math at UC, the credits they earned to get their engineering degree are deducted from the 174 credit hours for which they can receive state financial support in the math program. Note that professional 20 degrees, like a juris doctorate or medical doctorate, do not count as a master’s or higher equivalent for the purpose of comparative funding. Students who enter graduate education at the University of Cincinnati with a professional degree and no other advanced degrees are still eligible to receive up to the 174 credit hours of funding. If a student enters the University of Cincinnati with only partial credit toward a degree from another institution, those credits are not deducted from the 174 total—even if the program they enter at the University of Cincinnati agrees to accept transfer of those credits toward the student’s degree requirements at the University of Cincinnati. The student can still receive state subsidy for up to 174 credit hours earned at the University of Cincinnati beyond those transferred in. Note: For the purposes of this policy, a master’s degree is one awarded by an American institution or a degree of equivalent value from a foreign institution. Students holding a master’s degree from a foreign institution that is the equivalent of a bachelor’s degree in the U.S. will have the higher limit (174). The higher limit will not be affected by a student’s completion of course work short of a master’s degree at another institution. TAXATION OF CINCINNATI GRADUATE AWARDS The university maintains a position that all income, from whatever source, is taxable and may be subject to withholding. The IRS maintains final authority on the taxability of all stipends, and in all cases, the university cannot guarantee that any stipend is tax-exempt. The Graduate College will not review an individual award nor provide legal advice to individual students. In addition, students (not the university) are responsible for the withholding information that they submit on their W-4 forms at the time of appointment. Those students who receive a stipend during any academic semester and are not enrolled for at least half time will have Medicare tax and Ohio Public Employee Retirement System (OPERS) payments deducted from their checks. If a student is enrolled half time or more, they may apply for an exemption from these fees in their program office. No taxes are withheld from fellowships, but students may still have a tax liability and should consult a tax advisor. EXEMPTION FROM OPERS FOR STUDENT EMPLOYEES Employees (including student employees) of Ohio public institutions do not contribute to the federal Social Security system. Student employees’ retirement contributions will be directed to the state retirement plan, the Ohio Public Employees Retirement System (OPERS). Student employees (including graduate assistants and hourly student workers) may be eligible to opt out of OPERS participation when first hired by UC as long as certain requirements are met. See the Student Employees web page on UC’s Human Resources site for the OPERS exemption form and for additional information. EXTERNAL SOURCES OF FUNDING Tuition scholarship and fellowship funding is provided to graduate students by a wide variety of governmental and private sponsors. UC’s Financial Aid website, the ScholarshipUniverse scholarship search application, the Office of Nationally Competitive Awards and local and university libraries are potential sources of information about these funding opportunities. The Office of Nationally Competitive Awards provides workshops, application writing assistance and university endorsement (for applicable awards). Students may also visit the Office of Research 21 for more information on upcoming grant opportunities, grant writing workshops, and searchable research opportunity databases. FEDERAL FINANCIAL AID See the Student Financial Aid website for more information on federal financial aid (including summer aid). The Graduate College does not regulate or audit any outside fellowships or other outside funding a student may receive. However, it is advised that students with outside funding consult with the Financial Aid Office to see if and how the outside funding may or may not affect other Financial Aid eligibility. 22 GRADUATE CREDIT AND GRADES ELIGIBLE CREDITS Credit towards a graduate degree or certificate can only be earned for those courses in this university that are listed as graduate in the Schedule of Classes or which have been approved in writing by appropriate program authority for inclusion in the curriculum. Graduate credit towards a degree will only be granted when a course is included in the graduate career category of the student record in Catalyst. CREDITS REQUIRED TO EARN A GRADUATE DEGREE Graduate degrees at UC each have a stated number of credit hours that must be completed satisfactorily to earn the degree. As described below, there are multiple opportunities where coursework taken prior to matriculation into a degree program may count towards that credit hour total. In all cases, to earn a degree at UC, at least 67% of the relevant coursework credit must be earned while a matriculated student at the University of Cincinnati. Students entering in Fall 2019 or later should make application to their program for such (advanced standing or transfer) credit during their first semester at UC to assure their course of study is optimized. For all students matriculating in Fall 2019 and later, such credit will only be granted if a complete and program-approved application for such credit is submitted to the Graduate College by the end of their first year in the program, or prior to their final semester of study, whichever comes first. This new policy (introduced in AY19-20) is in effect for all students matriculated in Fall 2019 and later. In prior policies, master’s degrees were granted when 50% of graduate credits were completed while matriculated in the graduate program granting the degree, therefore allowing up to 50% of credits to be via advanced standing. Advanced Standing for Graduate Courses Taken Outside of UC a. Programs are permitted to award up to one third of the credits of a UC graduate program through advanced standing (e.g., 10 credits are eligible in a 30 credit hour program or 13 credits in a 40 credit hour program). The relevant number of credits is based on the minimum credits required to earn the advanced degree starting from the minimum degree qualification (usually a baccalaureate degree). Note that for doctoral students the advanced standing credit total will include any use of the ODHE allowance of up to 30 credits for a prior master's degree. b. Any graduate course credits, including those earned from previously earned graduate or undergraduate degrees, are eligible as advanced standing credits. c. Advanced standing can only be offered for courses (including electives) entered in e- curriculum for the UC program. d. Program faculty must evaluate courses for equivalence or comparability prior to granting students Advanced Standing credit for courses taken at another institution, meeting all the following criteria; 1. Courses taken at a recognized University or College 2. Courses taken at the graduate level 3. Requested advanced standing credits must be the lower of the following two choices 23 i. Credits originally earned for the course ii. Credits available in the UC course listed in e-curriculum 4. For 1:1 course equivalency, one or more of the following criteria must be met when compared to the University of Cincinnati course for which Advanced Standing credit is sought: i. Course was taken in the same field with the same title ii. Course had similar topics iii. Course had similar learning outcomes iv. Course assignment and assessment requirements were similar v. Course readings requirements are similar 5. This evaluation process should be documented for each case in which it is applied e. The one third rule doesn’t apply to dual degrees, sequential master's to doctorate programs, or others with shared content that have received approval from the Graduate College. f. Advanced standing credit recommended by program faculty must first be approved by the graduate program director and then submitted for final review by the Graduate College to assure the request complies with the criteria above. Transfer Credit for Graduate Courses Taken at UC a. When leaving one graduate program to join another at UC, all UC graduate credits taken as part of the incomplete program are eligible to use to fulfill requirements in the new program, based on faculty evaluation of the equivalence to courses in the new curriculum and program approval. b. When a student enters a graduate program at UC, non-matriculated UC graduate credits are eligible to be used for the program, if the coursework is listed in e-curriculum as part of the curricular requirements. Subject to program approval, students may transfer up to one third of the credits required to earn their UC graduate degree Programs are permitted to award transfer credit from a prior UC graduate degree if (1) the sum of unique credits to earn both degrees is equal to or greater than the State minimums for each degree type, and (2) the transfer credit courses are part of the curriculum of the new degree program as defined in e-curriculum. Using credit that meets both criteria, up to one third of the credits of the new UC graduate program may be awarded through transfer credit. The relevant number of credits is based on the minimum credits required to earn the advanced degree starting from the minimum degree qualification (usually a baccalaureate degree). Note that for doctoral students the transfer credit total will include any use of the ODHE allowance of up to 30 credits for a prior master’s degree. Course Exemption for Prior Knowledge, Without Credit Faculty in a program have the option to provide students with an examination to determine if accumulated knowledge is sufficient to be exempted from specific courses in a graduate curriculum (e.g., continuing education courses in some professional fields may provide a background that eliminates the need to take introductory courses). The form and content of that examination is at the discretion of the program. When such exemptions are granted, the student does not earn graduate credit for such knowledge. The credits required to complete their UC graduate degree remain unchanged, and the student will take alternative coursework (approved by the graduate program director) to advance their knowledge. 24 Multiple Degree Exemptions a. If the graduate faculty from a UC program has participated in designing and/or presenting the curriculum at another institution, shared degree programs between the institutions can deviate from these rules with prior approval of the Graduate College and their college leadership. In no case will a UC degree be awarded if more than 50% of the curriculum is offered by non-UC faculty. b. Dual degree programs can combine two UC graduate degrees into a single curriculum if approved by the University. Approved dual degree programs can share up to one-third of the combined credits of the two degrees, but the total count of unique credits to earn both degrees must always be equal to or greater than the State minimums for each degree type. Enrolling in Non-UC Classes through the Greater Cincinnati Collegiate Connection The University of Cincinnati is a member of the Greater Cincinnati Collegiate Connection. GC3 classes are those not generally available at the University of Cincinnati but which can be used to satisfy degree requirements. The student must have met all tuition commitments at the University of Cincinnati and must observe all regulations of the host institution. For additional information, participating institutions, and registration instructions, consult the Greater Cincinnati Collegiate Connection page of the Registrar’s Office website. Approval is at the discretion of the program. Graduate Credit for Undergraduate Students Any program may allow juniors or seniors to register for graduate courses for graduate credit before those students have completed the baccalaureate degree. It is recommended, if the program permits such registration, to limit the privilege to students with senior status and a grade point average of at least 3.000 (higher in some programs). This is evidenced by a written request from the student that is signed by an authorized member of the graduate program. Upon approval by the graduate program and the course instructor, graduate credit will be given for the courses. A maximum of 12 semester graduate credits can be earned in this manner. Credit will not be given toward both graduate and undergraduate degrees for the same course. Graduate Credit Earned in 6000-Level Courses In fall 2016, all 6000-level courses became graduate only. In the past, 6000-level courses were available for either undergraduate or graduate credit (to earn graduate credit, students selected the graduate level designation (G) in these courses, indicating that additional work was required beyond that required of undergraduates in the course). PLEASE NOTE: with the transition to the new use of course numbers, there will be no change to the graduate (or undergraduate) credits earned previously in the pre-fall-2016 version of these courses. GRADING Final Exams Exams are held during the last week of the semester after classes have ended. For each term’s full final examination schedule, consult the Calendars page of the Registrar’s Office website. 25 Make-up Final Exams Special policies may govern the taking of missed final exams. Students and faculty members should check the college office or program office for specific details. Every student is responsible for the material presented in their class. Arrangements for make-up work and tests are determined by the instructor. Absences incurred by students officially representing the university will be excused, provided that official notification of such absence has been given in advance to the instructor. Grade Reports End-of-term final grades may be viewed in the Catalyst student portal immediately following submission of final grades by the instructor. Grade reports include total graduate hours and hours for the current semester. The student’s grade report differentiates between “units taken” (course credits the student enrolled in but did not complete successfully or which are still pending a final grade) and “credits passed” (course credits successfully completed with a final grade other than F). These values are posted on the student’s transcript as attempted hours and earned hours. A graduate grade point average (GPA) is calculated each semester. Approved transfer credits from other institutions are included in the sum of credits earned, but grades for those credits are not included in the GPA. All graduate work, regardless of the University of Cincinnati college in which the work was done, is accumulated in these tallies. For this reason, if a student record includes UC graduate courses that do not count towards the degree, this GPA may differ from the calculation of GPA in program coursework (a minimum 3.000 program GPA is essential to earn a graduate degree). The I incomplete grade is awarded as a course grade (without grade point assignment) at the end of a term when a significant portion of course work has been satisfactorily completed, but not all of the required course work has been completed. The incomplete grade is appropriate when the completed course work is of passing quality and the student has had such hardship that completion of the remaining course work within the term timeline would present an additional hardship. The instructor who assigns the incomplete grade should set a specific date by which the student must complete the remaining course work, recognizing that time must be available for any final evaluation and grade change to be made, prior to the deadline when the grade converts to an F. The deadline is one year to the last day of exams. (Please check the Office of the Registrar’s website for the specific date.) The student must work with the instructor to develop an agreement that indicates the date by which the remaining course work is to be completed and submitted to the instructor. The instructor is not obligated to provide the student with a full year to complete the remaining course work. If the remaining course work is completed within the time period agreed upon by the instructor and the student, and that completion occurs within the one year, then the instructor will submit a change of grade online (in Catalyst) based on the quality of the remaining work. If no specific time for completion is set by the instructor, the student has one year (from the end of the term in which the incomplete was assigned) to complete the remaining course work and submit it to the instructor in time for evaluation of the work and a final grade to be approved by the Registrar. If the coursework is not completed within the one-year period (i.e., one year from the end of the term in which the I grade was assigned), the I grade automatically converts to an I/F grade which affects the student’s GPA the same as the grade of F. For the complete graduate grading scale and a definition of all grades, consult the Grading Scales and Definitions page of the Registrar’s Office website. 26 Grades Assigned to Research Courses That Are Repeated If students are working on dissertation or thesis research, they should be registered in the appropriate research course (e.g., Individual Dissertation or Individual Master’s Thesis), and the course work should be given a final grade each semester. The use of P/F for such courses is strongly recommended to avoid undue influence on GPA due to individual grading practices and the large amount of research credit awarded, but it is recognized that some programs will want to use letter grades. “Placeholder” grades such as SP and NG should not be used. Regardless of the grading scheme selected, it must be consistently applied across an entire program. If a program faculty cannot agree on a single grading scheme, the program must use the P/F choice. Students should be graded for each semester based on their progress and achievements in that semester. Note: The definition of a “research course” is a course outside of formal class work or instruction that allows a student to be registered as a graduate student while they are working independently on their thesis or dissertation under the guidance of their advisor or dissertation committee. This policy also applies to internships and other multiple semester or series courses. Pass/Fail Grades An instructor may request approval for pass/fail grading for an individual student in their class prior to the first day of class. A graduate student can take a course on a pass/fail basis (P or U grade) when approved by their advisor and instructor. An instructor is not required to accept a student on such a basis. Grade Changes A change of grade is only appropriate for an I, an NG, an SP/UP, or an error made by the instructor. SP/UP grades must be converted to a final grade by the end of the following semester. Instructors may change an I or NG grade online in Catalyst for approximately one year (the interval extends from the initial grading semester to the last working day of the same term the following year). To request a change of grade for a non-research course for graduate credit after this period, or an F grade any time, the instructor must do an official, paper change of grade form and forward to the Registrar’s Office. Previously recorded grades may not be changed to W or I after the close of the term. Both I and W grades must be awarded while the course and semester are still in progress and cannot be awarded retroactively. W reflects an official withdrawal that took place by the deadline outlined in the academic calendar, and I indicates work remains to be completed and the student did not earn a final grade. Students cannot withdraw from a class retroactively or be given additional opportunities to seek a different final grade retroactively. If an F is in a non- required course or the required course has since been retaken for a passing grade, the Program Director at certification may request a waiver of the F grade from the Associate University Dean of the Graduate College. No Grade Replacements for Graduate Students Please note, if a graduate student re-registers and re-takes a course, both grades will be included in the student’s overall GPA. There are no grade replacements at the graduate level. The process to make a grade change cannot be initiated by a student. The course instructor of record must send the form. At no time should a student be in possession of a change of grade 27 form. Note: that an I/F grade is governed by the same policies that govern the F grade and is weighted into the student’s GPA in the same fashion. 28 MAINTAINING GRADUATE STUDENT STATUS Maintaining graduate student status signifies that the student is actively engaged in making progress towards their degree and meeting program requirements. Graduate status determines which students may use facilities of the university, may participate in the university governance process and student organizations, and are covered by the Student Code of Conduct and the grievance process. A University of Cincinnati graduate student must hold the equivalent of a baccalaureate or higher degree and must have been accepted for admission into graduate study by the appropriate graduate program. MINIMUM CREDITS/REGISTRATION REQUIREMENTS To maintain graduate status at the University of Cincinnati, students must register at UC for at least one graduate credit that contributes to degree requirements (as determined by the graduate program) in an academic year. If the student is registered for at least one graduate credit in the academic year (fall through summer), they will maintain graduate student status for the entire academic year. Credits that are audited or in which a student receives a W, UW or F do not count toward the minimum credit requirement. Any student that does not register in the fall of an academic year and has not registered for the previous two academic years will automatically be exited from their program. A student whose status has thus automatically terminated will no longer be considered a graduate student but may seek reinstatement (see Reinstatements). Also note that students wishing to use many UC resources, such as university housing, campus laboratories, office space, equipment, campus recreation center, computer labs, etc. may need to be registered. Students should check with specific facilities for their particular requirements. Dual Degree Programs In dual degree programs, students must be registered for at least one graduate credit that contributes to degree requirements in one of the two programs (as determined by the program) during the academic year in which they graduate with their dual degrees. FULL-TIME COURSE LOAD Students must be registered for 10 or more graduate credits each semester to be considered full- time students, 12 if holding a university sponsored graduate assistantship or fellowship. Audit or undergraduate credits do not count toward full-time status and cannot be supported by a University Graduate Award. PART-TIME COURSE LOAD Students who can devote less than full time to graduate study may register for the number of graduate credits judged by their program advisors to represent the appropriate fraction of a full- time load. However, doctoral students must satisfy the Board of Trustees residency requirement, which requires that they have one year of full-time study, which is defined as being enrolled for at least 10 graduate credits in their program in each of two semesters (including summer semester) during a span of three consecutive semesters. Full-time UC employees using their tuition remission benefit to complete a part-time doctoral program may request a waiver of this requirement from the Associate Dean of the Graduate College. (See Doctoral Degrees Policies and Procedures, Course of Study.) 29 REDUCED COURSE LOAD (INTERNATIONAL STUDENTS) Once an international student has finished all required course work and will no longer be enrolling full time, she/he may choose to enroll with a reduced course load. Visit the F-1 Students page on the UC International Services website, referring to the “Enrolling part-time as a graduate student who has finished all course requirements” section for the link to the form and more information. MEETING PROGRAM REQUIREMENTS Students who continue on active status in their program without interruption are responsible for meeting all current requirements, including requirements that are revised since the student first entered the program. Students readmitted into their program are responsible for meeting the program requirements applicable at the time of readmission. MINIMUM ACADEMIC PERFORMANCE The Graduate College requires that a student must have an aggregate grade point average (GPA) of at least 3.000 to obtain a graduate certificate or degree at the University of Cincinnati. The GPA used for this purpose should aggregate graduate-level coursework completed since the student’s matriculation into the particular degree program from which the student seeks graduation, and only courses taken that are applicable to the degree/certificate count towards this GPA. Transfer graduate credits may also be accepted at the discretion of the degree program (and within Graduate College limits), and any transfer credit coming from courses taken at the University of Cincinnati will contribute to the GPA certified for graduation. Please note that programs establish minimum academic standards that may exceed the overall university standards provided above, so students need to be aware of their program requirements. Note that there is no grade replacement for graduate students, so any failed graduate courses remain in the student record. However, if a student retakes a failed course and obtains a passing grade, and if the GPA calculated without that original failing grade is above 3.000, then the program can petition the Graduate College for a waiver of the GPA requirement for graduation. Multiple failing grades, or multiple attempts to pass a course, are examples of why a petition may be denied. INTERNATIONAL STUDENTS, MAINTAINING IMMIGRATION STATUS The student has responsibility for maintaining their immigration status. Key information on maintaining immigration status on the F-1 Students page on the UC International Services website. TIME TO DEGREE Time to Degree and Extensions The Board of Trustees stipulates that all degree requirements must be completed within a defined span of years starting from the date of matriculation into the degree program, regardless of whether students are full time or part time. This span is 5 years for the master's degree and 9 years for the doctoral degree. Under extenuating circumstances, a program may petition, on 30 behalf of the student, for extension of the time limit for attaining the degree. Prior to the program petitioning the Graduate College for an extension, the student must communicate with the student’s program advisor and/or director to review the student’s degree completion to date and form a plan for degree completion. All this information should be included in a petition submitted to the Graduate College, which will review this petition and make a final decision. Students who have not completed degree requirements by their time-to-degree limit are on inactive status regardless of course registration in each academic year. Such students are required to apply for an extension of their time-to-degree. Reinstatements Students who have not been registered for at least one graduate credit hour at UC that contributes to degree requirements (as determined by the graduate program) in an academic year (fall-summer) are considered inactive. Reinstatements are available to students who have been inactive for less than three academic years. Students who have not been enrolled for any credits in their graduate program for three or more consecutive academic years are not eligible for reinstatement and must apply for readmission to the university. (See Readmission.) Readmission is processed via the reinstatement petition in Gradtracker. Applications submitted by the student via the admissions system will not be accepted. To request reinstatement, a program must petition the Graduate College on behalf of the student. Prior to the program petitioning the Graduate College for a reinstatement, the student must communicate with the student’s program advisor and/or director to review the student’s degree completion to date and form a plan for degree completion. The program coordinator, director or advisor will begin the reinstatement process in Gradtracker. The originator of the petition in Gradtracker will upload documents in one pdf to include degree completion information to date and a written plan for degree completion. The Graduate College will review the packet and if approved the student will also need to approve the petition and fee. If a student wishes to be reinstated so they can register and take classes, reinstatement petitions must be submitted in Gradtracker prior to the start of the first day of the term to be eligible for reinstatement in that term. Petitions received before the census date (the 15th calendar day of the term), the term may be considered for the current term. Petitions received after the census date will be considered for the following term. If a student wishes to be reinstated so they can graduate without taking any further classes, petitions for reinstatement (and extensions) must be submitted in Gradtracker no later than 3 weeks prior to graduation for the student to be certified for graduation in that semester. Petitions received after this time will not be approved in time for graduation that same semester. Late petitions will be held through the next processing period and a decision will be granted in time for the next graduation. A reinstatement fee equal to the current tuition for one graduate credit for each of the unregistered years up to a maximum of 3 years is assessed. The reinstatement fee will be added to the student’s bursar account and will become part of the student bill. Reinstatement fees are due 30 days after formal approval unless a payment plan is agreed to with the bursar’s office. If the fee is not paid by the due date, service charges may accrue, a block may be placed on future registrations and/or on the release of UC diplomas and official transcripts, and the account may be sent to collections. 31 Readmission Graduate students who have been inactive (not enrolled in their program) for three or more academic years are not eligible for reinstatement and must apply for readmission to the university. Readmission does not change the student’s original entry date. Time to degree will be calculated from the student’s first entry date. The program may petition the Graduate College on behalf of the student for readmission. Additionally, if the student has exceeded time to degree limits, the program should also petition for an extension with the readmission to specify the term in which the student will graduate. The readmission process is an opportunity for the program to carefully consider the former student’s progress and length of time between the student’s inception into the program and completion of remaining requirements. This may result in readmission, readmission with conditions, or denial of readmission. Prior to the program petitioning for a readmission, the student must communicate with the student’s program advisor and/or director to review the student’s degree completion to date and form a written plan for completing remaining degree requirements and removing any standing impediments to graduation, including any I/F, F, NG grades and courses required for graduation. This plan should include a timeline that describes the student's progress toward degree completion to date. The program coordinator, director or advisor will begin the readmission process in Gradtracker and will upload documents in one pdf to include degree completion information to date and a written plan for degree completion. The Graduate College will review the packet and if approved, the student will need to approve the petition and fee as well. Upon approval, the student must pay a readmission fee equivalent to in-state tuition in effect at the time of readmission for three graduate credits. The student will also be asked to complete, sign, and return the supplemental form for residency requirements to the Registrar’s office. Leaves of Absence Under special circumstances, graduate students may apply for leave of absence from formal study at the university for a specific period up to one year. Assuming appropriate documentation is provided, the circumstances justifying a leave include but are not limited to personal or family medical conditions, call to active military duty, parental leave, or death in immediate family. The rationale must be documented by the applicant. An approved leave of absence preserves the student’s status in the degree program, and the time off will not be counted against the time limits for awarding degrees. Consequently, registration is not required during the leave period. A leave may be renewed past the first year, for up to a maximum of five years, depending on the individual circumstances. Renewal of a leave is subject to the approval of the program, college, and the Graduate College. While the Graduate College leave of absence is only necessary for students who will be unable to register for a full academic year, programs may have more strict and specific registration policies and leave of absence policies. Students should also consult their program handbook if there is a legitimate need not to register for any amount of time. 32 To apply for a leave of absence, a student must complete the Request for Leave of Absence Form and upload the appropriate documentation (e.g., doctor’s letter or military orders) through Gradtracker. The program will approve through Gradtracker as well. Once the program has approved the request, the Graduate College will review the petition and if approved, the student and program will receive an email notification through their UC email. Note: A student on a leave of absence is placed on inactive status and their Catalyst record is discontinued, to be reactivated upon their return. While on inactive status, they will not be eligible for student health insurance and may be unable to use many UC resources. Students with financial aid or student loans should confer with the Financial Aid Office prior to requesting a leave of absence to ascertain the consequences of a leave on their loan status. Students should also be aware that any scholarships or assistantships are not guaranteed to be available when a student returns from a leave of absence. Withdrawal from Program Students must notify their program in writing and copy the Graduate Admissions Program Manager regarding their intent to withdraw from their programs. Dismissal from Program Students must consult with individual programs concerning dismissal policies. If a program dismisses a student, the program must copy the Graduate Admissions Program Manager on the notification to the student. 33 MASTER’S DEGREE POLICIES AND PROCEDURES COURSE OF STUDY The course of study for the master’s degree is planned with the advisor and is subject to approval by the program graduate committee or its equivalent. It must show a reasonable degree of concentration on interrelated subjects. Programs will recommend students for degrees only after students have developed and demonstrated the necessary knowledge and skills and have fulfilled all other university requirements. At least once an academic year, the graduate program director or the graduate student’s advisor shall inform the student in writing of their academic progress in the master’s degree program. An annual Academic Progress Report or some other form of formal evaluation of progress is required throughout each student’s program. Students must take a minimum of one graduate credit that contributes to degree requirements (as determined by the graduate program) per academic year (fall-summer) to maintain active status. If a student does not maintain active status, they may apply for reinstatement within three years or apply for readmission to their program thereafter. There are fees associated with these steps. (See Maintaining Graduate Student Status, Reinstatements and Readmission.) CREDIT HOUR REQUIREMENTS The University of Cincinnati is on a semester system. Although qualification for the master’s degree is not based exclusively upon the completion of a definite number of hours of course work, the satisfactorily completed graduate work must consist of the equivalent of a minimum of one academic year of full-time graduate study consisting of at least 30 graduate semester credit hours, including any thesis or capstone project. Credits earned in professional law or medicine programs are not applicable to the 30-credit minimum. CANDIDACY There is no formal candidacy status for the master’s degree. However, some programs do have defense requirements, so each student should confer with their advisor or program director to ascertain the requirements of their specific program. CULMINATING EXPERIENCE: THESES and CAPSTONES Every degree requires a culminating experience that is designed to integrate and apply the knowledge and learning gained from the curriculum, and demonstrate mastery of the subject matter in the degree. A master’s thesis is required by some programs, and a master’s capstone project/experience is required in others. Each master’s degree student undergoes an individual evaluation process at the end of their program. Thesis Preparation, Evaluation and Submission Process Preparation of a thesis demonstrates the student’s ability to communicate and to evaluate critically. Information about preparing an electronic thesis is available on the Graduate College 34 website. The student should consult with their program office for additional forms required other than what appears on the graduation checklist. A student must note any relevant deadlines defined by their program, and work with their program leadership to form a thesis committee composed of at least two UC faculty members, at least one of whom must be a member of the university graduate faculty. The thesis committee can guide the student in their exploration of the topic of the master’s thesis, and is responsible for final evaluation of the thesis. The student must submit the completed thesis to the thesis committee for critical evaluation, by the deadline required by the program or their thesis committee. Students who have written a thesis are expected by the Graduate College per their program requirements to make a public announcement of their thesis defense, including time, date, and title of the public presentation. The format for thesis evaluation is decided by the academic unit offering the graduate degree. Faculty with emerit status may remain on the committee if they were members when the proposal was accepted and were full-time tenured, university graduate faculty. A faculty member originally on a student’s committee who leaves UC to take an academic position elsewhere may also continue to serve on the student’s committee if both the faculty member and the student agree to continue the relationship. However, neither an emerit professor nor a faculty member from another institution may serve as chair of the committee, since they are no longer eligible to be university graduate faculty. Once a thesis has been approved by their committee, the candidate for the master’s degree must submit an electronic thesis by following the current instructions online at the Graduate Collge's Graduation page. Be careful to adhere to any deadlines for submission, or graduation will be delayed. Capstone Process Master’s students who are not required to complete a thesis should consult their academic programs about the requirements and procedures for the capstone experience in their programs. In some programs, the final capstone event may be in the form of a comprehensive exam or research project; in others, the final evaluation may appropriately be a recital, performance, or exhibition. The specific nature of the final evaluation is determined by the academic unit offering the master’s degree program, but it must include evaluation by full-time faculty at the University of Cincinnati. If questioned, the appropriateness of a final evaluation will be decided by the University Graduate Council. GRADUATION One semester prior to the semester in which a student anticipates graduating, the student should: • confer with their program office staff; • consult the Graduate College’s website for deadlines, instructions on submitting their electronic thesis; • visit the Graduate Collge’s website to determine if they are defined as a thesis or non- thesis student, or consult with their program; and • talk to advisor about whether an embargo is needed. 35 Application to Graduate Students must: (1) complete academic requirements and (2) complete the official online Application to Graduate by the deadline for the semester in which they expect to graduate. NOTE: for all graduate students, the application for graduation is started at the Graduation page, and not within Catalyst. Start an application for graduation early in the semester you plan to graduate. Deadlines posted on the Graduation Deadlines page are firm and failure to meet them will delay students’ graduation until the following semester, when they must then submit a new application for their revised graduation date. A student graduating from a dual degree program must make a formal application for graduation for each program (see details in next section). All students applying to graduate will be assessed a non-refundable graduation application fee. The fee will be assessed each semester a student applies for graduation. Students who have applied for graduation and learn later they will not be graduating must be removed from the graduation list before they can apply again for any future semesters (programs must notify the Graduation Program Manager to remove a student). When the application for graduation is complete, the student receives an email receipt for payment of the graduation application from the registrar’s office. If this receipt is not received, promptly notify your program, as your graduation application may not be completed. Some PhD programs incorporate a master’s degree. Students should contact their program for help in adding this additional degree. Graduation from Dual Degree Programs The online Application to Graduate will allow a student to apply for graduation from both degree programs in an official dual degree program. Each of the two programs must follow and complete the certification processes and procedures necessary to facilitate a student’s graduation from their own program. In dual degree programs, students must be registered for at least one graduate credit that contributes to degree requirements in one of the two programs (as determined by the program) during the academic year in which they graduate with their dual degrees. Certification for Graduation (Certify Online) The finalization and submission of a student’s Application to Graduate will activate the process by which the student will be certified for graduation, and the following requirements must be met. The student should confer with their program office one-two weeks after the application period has ended to assure that any problems related to these requirements (reinstatements/ extensions, or grade changes) are resolved in a timely manner and avoid delay of graduation until a subsequent semester. Specifically, the student’s records will be reviewed to verify satisfaction of the following requirements: • finalization and submission of their online Graduation Application by the deadline; 36 • instructor’s submission of passing grades for their final semester credits; • removal of all I grades from their transcript; • removal of all UP/SP grades from unapproved courses and/or the final semester in the approved courses were taken; • assignment of letter grades rather than UP/SP grades for courses in the final semester of the student’s program; • removal of previously awarded NG grades and blank grade awards; • confirmation of satisfactory repetition or waiver of required courses in which an F was originally received; • confirmation of completion of work and changes of I grades within the one-year limit; • confirmation that the student was registered for at least one credit in their graduate program in each academic year, including the year of expected graduation; • confirmation that the student completed degree requirements within the prescribed time- to-degree; • satisfactory completion of at least 30 graduate credits completed to the satisfaction of the student’s program; • completion of all program requirements for the degree; • 3.000 GPA has been earned while a matriculated graduate student in the program; • if a thesis is required, upload the electronic thesis (ETD) with chair approval by the deadline date, which is posted on the Graduation Deadlines website. Note: The requirements explained here are university requirements. Students must contact their program’s office for any additional program-level requirements or deadlines that must be completed prior to graduation. Please see the Doctoral Hooding and Master’s Recognition Ceremony section for details on the event. CONTINUING TO A DOCTORAL PROGRAM For a UC master’s student continuing to a doctoral program in the same program area, the student will fill out the application in the graduate admissions application system, and the graduate application fee is waived. 37 DOCTORAL DEGREE POLICIES AND PROCEDURES COURSE OF STUDY The course of study for the doctoral degree is arranged with each student by their advisor and reviewed by the program’s graduate committee or its equivalent. The program should provide a concentration and breadth of study for the student to develop competence in research, scholarship, teaching, and professional performance in general, with knowledge of their chosen specialty in relation to allied branches of learning. A written assessment of performance for each doctoral student is required at the end of their first year; an annual Academic Progress Report or some other form of formal evaluation of progress is required throughout each student’s program. CREDIT HOUR REQUIREMENTS The doctoral degree will be granted for no less than the equivalent of three years of full-time graduate study. Individual program requirements vary, but eligibility for graduation typically requires a minimum of 90 graduate credits beyond the bachelor’s degree. Doctoral students with a prior master’s degree may petition their program to allow up to 30 transfer credits from the master’s degree towards their doctoral degree. Degree credits must include at least 7 hours in dissertation research. Some program credit requirements may be higher. The last 30 credits must be completed under the direction of University of Cincinnati graduate faculty. The degree will not be granted solely on the basis of the accumulation of the required number of credits. A program will recommend students for degrees only after they have developed the necessary intellectual maturity and have fulfilled all other requirements of the program and the university. RESIDENCY AS FULL-TIME STUDENT Prior to admission to doctoral candidacy, all doctoral students shall complete a residency requirement by enrolling in 10 graduate credit hours (12 if funded by a Graduate Assistantship) per semester for two out of three consecutive semesters of study (including summer). Part-time students are not exempt from enrollment requirements to achieve residency. However, full-time UC employees using their tuition remission benefit to complete a part-time doctoral program may request a waiver of this requirement from the Associate Dean of the Graduate College. CANDIDACY, QUALIFYING EXAM The Graduate College does not currently track time to candidacy, but encourages programs to implement candidacy exams early in their programs to allow the students optimal feedback on their aspirations and research. Doctoral students are required to complete a program certification process according to the program’s established standards. The student must have at least a 3.000 grade point average in doctoral coursework and fulfill all other pre-candidacy requirements specified by the doctoral program in which the student is enrolled. Upon completion of these requirements, the student will receive a formal letter from the Graduate College informing the student of admission to candidacy. 38 UNIVERSITY GRADUATE FACULTY ROLE In accordance with the university’s Board of Trustees’ rule (50-77-11) (B) (2), only university graduate faculty are permitted to chair thesis or dissertation committees. The Graduate College appropriately identifies members of the university graduate faculty. Faculty members are nominated for graduate-faculty status by the program most closely aligned with the academic unit holding their primary academic appointment, and with the approval of their college dean or associate dean in charge of graduate education (from whom the nomination should arrive to the Graduate College). Faculty members holding any type of faculty appointment may be eligible for college-initiated nomination to the graduate faculty, the decision to be made based on an evaluation of the individual curriculum vitae and research and creative profile of the nominee. Criteria for nomination are formulated by individual programs and used by the Graduate College in adjudication. DISSERTATION Each PhD and EdD student must produce and defend a dissertation showing high scholarly achievement based on their original research. The student is required to submit an electronic document as evidence of this research. Students in all other doctoral programs should consult their academic programs regarding requirements and procedures for the capstone experience required in their programs. Dissertation Advisor and Committee When the student has been admitted into doctoral candidacy and has selected a dissertation subject and dissertation advisor, a dissertation committee should be appointed as soon as possible. The dissertation advisor must be qualified to serve as the chair of the dissertation committee, meaning this faculty member must be a member of the university graduate faculty and all members of the committee will be appointed by the Graduate College upon recommendation of the program director or director of graduate studies (in consultation with the committee chair and student). Students have the right to request a change in the committee but must do so in consultation with the graduate program director and their program must make the change in GradTracker. Preferably, the dissertation committee will include at least one person from outside the program, who might be faculty from the University of Cincinnati or another institution. A dissertation committee must be composed of a minimum of three UC faculty members. Members of the university graduate faculty are eligible to serve on all thesis and dissertation committees. In addition, all tenured and tenure-track faculty members may serve on all thesis and dissertation committees (even if they are not members of the university graduate faculty, meaning they may not serve in the chair role and cannot act as primary advisors). Other types of UC faculty members may serve on committees if the appointing unit demonstrates that their expertise is beneficial for the dissertation project. Programs should make such requests to the Graduate College in advance, to be ascertained on a case-by-case basis. Neither an emerit faculty member nor a faculty member from another institution may serve as the chair of the committee. Emerit faculty may remain on the committee if they were members when the proposal was accepted. A faculty member originally on a student’s committee who leaves UC to take an academic position elsewhere may also continue to serve on the student’s committee if both the faculty member and the student agree to continue the relationship. If a non-UC faculty member or appropriate professional practitioner has special expertise in a dissertation topic, 39 such a person may be added to the dissertation committee if they are nominated by the candidate and approved by both the chairperson of the dissertation committee, the director of graduate studies for the academic unit involved and the Graduate College. All such individuals serve as a full voting member of the dissertation committee without compensation from either the university or the candidate and would serve in addition to the minimum number of three qualified full-time UC faculty. A copy of the completed dissertation must be submitted to each committee member for critical evaluation, with sufficient time for review as determined by the dissertation committee. If it is considered satisfactory with respect to form and content by the committee, a final defense of the dissertation can be scheduled. Final Defense of Dissertation Students should check with their program office for the final deadline for their dissertation defense. The student’s final defense of the dissertation will be open to the public and all members of the academic community. Students are required to enter details of their dissertation defense, such as time, date, and location, online at the Graduate College website through the Graduation checklist steps. Begin at the Graduation webpage. One can also browse scheduled dissertation defenses by visiting the Upcoming Dissertation Defenses page. The candidate answers questions posed by members of the committee and other members of the audience following an oral presentation of their dissertation. At the conclusion of the defense, the committee will withdraw, make a decision with regard to the acceptability of the dissertation and its defense, and report its decision to the candidate. At least ¾ of the voting members of the dissertation committee (including at least one representative of each major area involved, in the case of interdisciplinary programs) must approve the dissertation. When the student’s dissertation committee chair has approved a defense, the student should assure that they have met all requirements for graduation including those in the graduation information obtained online. Use of a Moderator Although an outside moderator is not required, a moderator may be assigned by the Graduate College dean upon the request of the candidate, the chairperson of the dissertation committee, or the person empowered to approve the composition of a dissertation committee (the director of graduate studies for the academic unit involved). Moderators should be members of the university graduate faculty from outside the academic unit involved. The duties of the moderator are limited to observing the oral defense of the dissertation and reporting in writing to the Graduate College dean on the academic propriety of the proceedings. Submission of Dissertation After a dissertation has been approved, the candidate for the doctoral degree must submit their electronic dissertation by following the current instructions found at the Electronic Thesis and Dissertation Information webpage. Students in all other doctoral programs should consult their academic programs for the capstone experience required in their programs. Deadlines are posted at the Graduation Deadlines page. • All thesis/dissertations must be electronically submitted by the student and approved by the advisor. Students log in via the link available on the Graduation webpage. 40 • Advisors are sent an email when the student submits for their approval, and the advisor then logs in to review/approve. • Once approved by the chair, the student is notified by email. • A Graduate College approval email is sent to the student once reviewed. • The program is copied on all email correspondence during the Electronic Thesis/Dissertation (ETD) approval process. GRADUATION One semester prior to the semester in which a student anticipates graduating, the student should: 1. Confer with their program office staff. 2. Consult the Graduation page on the Graduate College’s website for deadlines, instructions on submitting their electronic dissertation, and doctoral hooding ceremony information. 3. Talk to advisor about whether an embargo is needed. Application to Graduate Students must: (1) complete academic requirements and (2) complete the official online Application to Graduate by the deadline for the semester in which they expect to graduate. Deadlines are firm and failure to meet them will delay students’ graduation until the following semester, when they must then submit a new application for their revised graduation date. All students applying to graduate will be assessed a non-refundable graduation application fee. The fee will be assessed each semester a student applies for graduation. Dual Degree Programs Graduation The online Application to Graduate will allow a student to apply for graduation from both degree programs in a dual degree program. Each of the two programs must follow the certification processes and procedures necessary to facilitate the student’s graduation from their own program. In dual degree programs, students must be registered for at least one graduate credit that contributes to degree requirements in one of the two programs (as determined by the program) during the academic year in which they graduate with dual degrees. Graduation Requirements for Doctoral Degrees Students must be registered for at least one graduate credit that contributes to degree requirements (as determined by the graduate program) during the academic year in which they graduate from that program. Doctoral students must also complete degree requirements within a nine-year period unless they have an approved extension (see Maintaining Graduate Student Status, Time to Degree). They should contact their program offices for any additional program requirements or deadlines to be completed prior to graduation. Certification for Graduation (Certify Online) Finalization and submission of a student’s Application to Graduate will activate the process by which the student will be certified for graduation, and the following requirements have been met. 41 The student should confer with their program office one-two weeks after the application period has ended to assure that any problems related to these requirements are resolved in a timely manner and avoid delay of graduation until a subsequent semester. Specifically, the student’s records will be reviewed to verify satisfaction of the following requirements: • finalization and submission of their online Application to Graduate by the deadline; • instructor’s submission of passing grades for final semester credits; • removal of all I grades from transcript; • Removal of previously earned NG grades and blank grade awards - removal of all UP/SP grades from unapproved courses and/or the final semester in which the courses were taken; • assignment of letter grades rather than UP/SP grades for courses in the final semester of the student’s program; • confirmation of satisfactory repetition or waiver of required courses in which an F was originally received; • confirmation of completion of work and changes of I grades within the one-year limit; • confirmation that the student was registered for at least one credit in the graduate program in each academic year, including the year of expected graduation; • confirmation that the student reached candidacy and has a valid dissertation committee; • degree requirements completed within prescribed time-to-degree; • satisfactory completion of sufficient graduate credits. In general, doctoral degrees require at least 7 research credits (many programs have higher requirements), within a total of at least 90 graduate credits for students who do not have a prior master’s degree, or require a total of at least 60 credits for students beyond the master’s degree. Please note that individual program credit requirements can vary widely. • completion of all program requirements for the degree; • 3.000 GPA has been earned while matriculated in the graduate program; • if a dissertation is required, upload the electronic dissertation (ETD), following the instructions on the Electronic Thesis and Dissertation Information page, for chair approval by the deadline. Note: The requirements explained here are university requirements. Students must contact their program office for any additional program-level requirements or deadlines that must be completed prior to graduation. GRADUATE CERTIFICATE VERIFICATION FOR UC TRANSCRIPT ENDORSEMENT In order for students to have their UC transcript endorsed with an earned certificate, students must apply for graduation and the program must approve the record through certify online just like the master's or doctoral students. DOCTORAL HOODING AND MASTER’S RECOGNITION CEREMONY Doctoral and master’s students who are graduating or who have graduated during the academic year will receive an invitation from the Dean of the Graduate College to participate in the university’s prestigious Doctoral Hooding and Master’s Recognition Ceremony held each semester. Please visit the commencement ceremony’s website for up-to-date details or 42 the Graduate College’s Graduation webpage. This is a joyous occasion in which students celebrate their accomplishment with family and friends as they are recognized by faculty and university leadership. Doctoral participants will be adorned with their hoods during the ceremony, by either their faculty mentor or the dean of their college. Graduates must confirm their intent to participate by reserving a seat online for the celebratory event and providing current home and email addresses for notification purposes. If you wish to be hooded by your faculty mentor, discuss the date with them to make sure they can attend. 43 INSTITUTIONAL RULES, POLICIES, AND PROCEDURES PROGRAM STANDARDS This Graduate Handbook clarifies minimum university-level requirements and policies that apply to all graduate students throughout the University of Cincinnati. Beyond these, each student is also expected to adhere to requirements, policies, and procedures specific to their own degree program and college. All graduate programs must publish in writing in accessible format the minimum academic standards for each graduate program offered, including the following: • minimum grade point average, including grades earned in required courses; • acceptable grade distribution, including grades earned in required courses; • nature and number of programmatic examinations, such as preliminary or qualifying, and the consequences of failing all or part of each examination; • specified research requirements; • a time-related definition of normal progress for all full- and part-time students; • standards and procedures for the mandatory annual review of academic performance; • standards and procedures for probation, suspension, and dismissal from the program. RECORDS PRIVACY, FERPA, AND THE RIGHT TO REVIEW The Family Educational Rights and Privacy Act of 1974 (FERPA), is the federal law that governs the release of and access to student education records. FERPA affords students certain rights with respect to their education records. For the complete FERPA information, consult the FERPA and Records Privacy page of the Registrar’s Office website. NOTICE OF NON-DISCRIMINATION The University of Cincinnati does not discriminate on the basis of disability, race, color, religion, national origin, ancestry, medical condition, genetic information, marital status, parental status (including status as a foster parent), sex, age, sexual orientation, veteran status, military status (past, present, or future), or gender identity and expression in its programs and activities. The university does not tolerate discrimination, harassment, or retaliation on these bases and takes steps to ensure that students, employees, and third parties are not subject to a hostile environment in university programs or activities. The university responds promptly and effectively to allegations of discrimination, harassment, and retaliation. It promptly conducts investigations and takes appropriate action, including disciplinary action, against individuals found to have violated its policies, as well as provides appropriate remedies to complainants and the campus community. The university takes immediate action to end a hostile environment if one has been created, prevent its recurrence, and remedy the effects of any hostile environment on affected members of the campus community. UC is committed to the ideal of universal Web accessibility and strives to provide an accessible Web presence that enables all university community members and visitors full access to 44 information provided on its websites. Every effort has been made to make these pages as accessible as possible in accordance with the applicable guidelines. The University of Cincinnati provides free aids and services to people with disabilities to communicate effectively with us, such as qualified sign language interpreters and written information in other formats (large print, audio, accessible electronic formats, other formats). The University of Cincinnati also provides free language services to people whose primary language is not English, such as qualified interpreters (call 513-556-5503) and information written in other languages. If you need these services, please tell any employee of a University of Cincinnati health program or activity. If you believe that the University of Cincinnati has failed to provide these services or discriminated in another way, you can file a grievance with the Office of Equal Opportunity and Access and/or Office of Gender Equity & Inclusion. You can file a grievance in person, by mail or by email. If you need help filing a grievance, the Office of Equal Opportunity & Access and Office of Gender Equity & Inclusion staff are available to help you. ACADEMIC DISHONESTY Academic dishonesty in any form is a serious offense that cannot be tolerated in an academic community. Dishonesty—including cheating, plagiarism, deception of effort, and/or unauthorized assistance—may result in a failing grade in a course and/or suspension or dismissal from the university. Allegations of academic dishonesty will be processed pursuant to the university’s Student Code of Conduct. After graduation, alumni remain responsible for the academic integrity of the work they performed while a student at the University of Cincinnati. If evidence of academic dishonesty or research misconduct is revealed after the graduation of a student, the Office of Research, the Graduate College, and the university can examine whether such concerns impact the academic integrity of the degree that was conferred on the student, with consequences including but not limited to degree revocation. STUDENT CODE OF CONDUCT The Student Code of Conduct defines behavior expected of all University of Cincinnati students. It is each student’s responsibility to know and comply with the university’s Student Code of Conduct, and sanctions or penalties are outlined. Academic behavior considered to be misconduct is defined in the Student Code of Conduct. The code also addresses nonacademic misconduct (such as disturbing the peace, destruction of property, and theft). Disciplinary procedures are explained in a step-by-step manner, and the procedures for appeal of decisions are stated. In addition to this code, students must adhere to their college’s professional code of conduct and honor codes where applicable. Students should contact the office of the dean for their college to inquire about any applicable conduct and honor codes to ensure compliance. Students can be suspended or dismissed from the university for unprofessional behavior. 45 RESPONSIBLE CONDUCT OF RESEARCH Furthering of research is a major institutional goal of the University of Cincinnati. Research includes not only intellectual activity and exploration designed to expand knowledge and understanding, but also activities in the creative and performing arts designed to interpret and create. Such activities require responsibilities for the ethical and safe conduct of research. Individuals charged with supervision of research, as well as all individuals directly engaged in it, and collaborators of investigators outside their own units are responsible for the quality of the data generated in their own laboratories as well as the laboratories of their collaborators. Everyone shares responsibility for the physical safety and intellectual property of individuals in the responsible conduct of creative scholarship and research. RESTRICTED RESEARCH The right to open exchange of information and opinion in faculty relations with students carries the obligation to avoid comments or violations of confidentiality that would reduce free expression or inquiry by students. Student involvement in industrial proprietary projects should be permitted only when these projects in no way restrict the student’s ability to fulfill their degree requirements, which includes the obligation to publish dissertation results. Faculty members have the right to publish their research findings and the right to protection against retaliation because of displeasure over their conclusions by the public, administration, government, or others. They have the concomitant responsibility to refrain from conducting secret, non-publishable research as part of their university duties. GRADUATE STUDENT GRIEVANCE PROCEDURES The University of Cincinnati provides an opportunity for the resolution of disputes involving graduate students in a fair and collegial manner. The Graduate Student Grievance Procedures establish a formal academic process for graduate students to request review and redress of certain complaints arising out of their academic relationships with their programs, their colleges, or the university. The grievance begins with a mediation process and may proceed, if necessary, through the more formal review and decision or appeal processes. In general, however, it is expected that grievances will be resolved by the parties within their programs. Students are encouraged to seek assistance from the university Ombuds Office for possible resolution before initiating the formal grievance process. Students, faculty and staff should note that Grievance Procedures are not legal protocols. They are, however, effective means by which to resolve conflicts. The Graduate College endorses these procedures and expects all programs and students involved to follow them according to the established guidelines. No outside parties, such as lawyers, ministers, and family members, are allowed to participate in or impose upon the procedures. The Graduate Student Grievance Procedures cannot supplant final sanctions stemming from the University of Cincinnati Student Code of Conduct process. There is a time limit to filing a grievance: it must be filed within 60-90 business days of the alleged improper mistreatment. The procedures are applicable to the following types of grievances: • grievances alleging improper dismissal or suspension from a graduate program, not as a result of the Student Code of Conduct process; • grievances alleging the improper withholding or termination of financial support of any kind; 46 • grievances alleging any other improper treatment, either substantive or procedural, of a graduate student by a university employee or university affiliate except: o allegations of improper evaluation of the quality and/or quantity of academic work, which a student cannot grieve; o allegations of unfair recommendation for employment or further graduate study, which a student cannot grieve; o allegations of discrimination or harassment that are subject to review by the Office of Equal Opportunity and Access or the Office of Gender, Equity and Inclusion. Published November 28, 2023. This version is an update to the 2022-23 AY handbook to reflect changes to the Graduate Scholarship structure and terminology. This version supersedes all previous versions. 47
Please limit your knowledge to the document. Avoid generalizations and ensure accuracy by directly referencing the document's arguments and examples. How can graduate students receive financial support at the University of Cincinnati? University of Cincinnati Graduate College Graduate Handbook Welcome from the Graduate College! We invite you to review the Graduate Handbook. This document is designed as a helpful guide to graduate education at UC. Here is where you will find policies, procedures, and important information for the graduate student lifecycle, from admissions to graduation. In addition, there may also be requirements that pertain to specific degree programs and colleges. Please visit program and college websites for these specific requirements. 1 The Graduate College Graduate College Leadership Rose Marie Ward Vice Provost and Dean of the Graduate College Omotayo (Tayo) Banjo Associate Dean of the Graduate College Tai Collins Associate Dean of the Graduate College Laura Dell Graduate College Thought Leader Emily Kregor Software Applications Developer Lead Sarah Matthews Sr Data Reporting Analyst Angel Prewitt Assistant Director of Business Affairs Megan Tischner Carroll Program Director Graduate College Staff Kaitlin Bauer Academic Evaluator Virginia Dennis Program Manager, Student Services Shaymaa Minkara Program Manager, Graduation Caitie Norrie Program Manager, Professional Development Stephen Patrick Program Manager, Marketing and Communications Amy Wheeler Program Manager, Student Success & Retention Brandilyn Worrell Program Manager, Community and Belonging 2 Brady Wright Executive Staff Assistant and Office Manager Graduate College IT Staff Chris Amann Computer & Info Analyst, Management Specialist IT Dushan Aththidiyavidanalage Don Software Applications Developer Eric Rasnake Computer & Info Analyst I Coco Zhang Software Applications Developer Contact the Graduate College Location University of Cincinnati 110 Van Wormer Hall 2614 University Circle Cincinnati, OH Mailing Address P.O. Box 210627 Cincinnati, OH 45221-0627 Email: [email protected] or [email protected] Phone: (513) 556-4335 Fax: (513) 556-0128 3 Introduction This Graduate Handbook is intended to provide information about university policies that assist faculty, students, and program coordinators in supporting their individual programs of study. To which educational programs does this Handbook pertain? The Graduate College oversees all post-baccalaureate certificates and degrees (master’s and doctoral level) EXCEPT the Juris Doctor (in the College of Law), the Doctor of Medicine (in the College of Medicine), and the Doctor of Pharmacy (in the College of Pharmacy). The University of Cincinnati does not discriminate on the basis of disability, race, color, religion, national origin, ancestry, medical condition, genetic information, marital status, parental status (including status as a foster parent), sex, age, sexual orientation, veteran status, military status (past, present, or future), or gender identity and expression in its programs and activities. View UC’s complete Notice of Non-Discrimination. Published 11/28/2023. This version is an update to the 2022-23 AY handbook to reflect changes to the Graduate Scholarship structure and terminology. This version supersedes all previous versions. 4 TABLE OF CONTENTS ADMISSION TO GRADUATE PROGRAMS ....................................... 9 ADMISSIONS POLICY .............................................................................................. 9 Faculty and Administrators' Eligibility for Graduate Degrees .................................. 9 ADMISSIONS CATEGORIES .................................................................................... 9 APPLICATION PROCESS FOR 4+1 AND AIM PROGRAMS .................................. 10 Application to 4+1 Degree Programs .................................................................... 10 Application to Accelerated Integrated Master’s (AIM) Programs .......................... 11 DUAL DEGREE PROGRAMS .................................................................................. 11 CHANGING DEGREE PROGRAMS AT UC ............................................................ 11 GRADUATE CERTIFICATE PROGRAMS ............................................................... 12 INTERNATIONAL STUDENT ADMISSION.............................................................. 12 English Proficiency Requirement .......................................................................... 13 FINANCIAL SUPPORT .................................................................... 14 UNIVERSITY MERIT-BASED GRADUATE AWARDS ............................................. 14 GRADUATE SCHOLARSHIPS (GS)........................................................................ 14 UNIVERSITY FELLOWSHIPS ................................................................................. 15 GRADUATE ASSISTANTSHIP STIPEND AWARDS ............................................... 16 Teaching Assistant Requirements and OEPT ...................................................... 17 Graduate Assistant/Fellow Health Insurance Awards ........................................... 17 Multiple Appointments/Employment ..................................................................... 18 Summer Employment Without Full-time Enrollment ............................................. 18 Graduate Assistants on Jury Duty ........................................................................ 18 Strike Policy for Graduate Assistants ................................................................... 19 Sick Leave/Family Leave for Graduate Assistants ............................................... 19 Holidays/UC Closing Policy for Graduate Assistants ............................................ 19 Military Duty .......................................................................................................... 19 Termination........................................................................................................... 19 Workers’ Compensation ....................................................................................... 19 Unemployment ..................................................................................................... 19 Social Security, Medicare Tax and Ohio Public Employees Retirement System (OPERS)............................................................................................................... 20 174 GRADUATE CREDIT RULE .............................................................................. 20 TAXATION OF CINCINNATI GRADUATE AWARDS .............................................. 21 EXEMPTION FROM OPERS FOR STUDENT EMPLOYEES.................................. 21 EXTERNAL SOURCES OF FUNDING .................................................................... 21 5 FEDERAL FINANCIAL AID ...................................................................................... 22 GRADUATE CREDIT AND GRADES............................................... 23 ELIGIBLE CREDITS ................................................................................................ 23 CREDITS REQUIRED TO EARN A GRADUATE DEGREE .................................... 23 Advanced Standing for Graduate Courses Taken Outside of UC ......................... 23 Transfer Credit for Graduate Courses Taken at UC ............................................. 24 Course Exemption for Prior Knowledge, Without Credit ....................................... 24 Multiple Degree Exemptions ................................................................................. 25 Enrolling in Non-UC Classes through the Greater Cincinnati Collegiate Connection ............................................................................................................................. 25 Graduate Credit for Undergraduate Students ....................................................... 25 Graduate Credit Earned in 6000-Level Courses ................................................... 25 GRADING ................................................................................................................ 25 Final Exams .......................................................................................................... 25 Make-up Final Exams ........................................................................................... 26 Grade Reports ...................................................................................................... 26 Grades Assigned to Research Courses That Are Repeated ................................ 27 Pass/Fail Grades .................................................................................................. 27 Grade Changes .................................................................................................... 27 No Grade Replacements for Graduate Students .................................................. 27 MAINTAINING GRADUATE STUDENT STATUS ............................ 29 MINIMUM CREDITS/REGISTRATION REQUIREMENTS ....................................... 29 Dual Degree Programs ......................................................................................... 29 FULL-TIME COURSE LOAD.................................................................................... 29 PART-TIME COURSE LOAD ................................................................................... 29 REDUCED COURSE LOAD (INTERNATIONAL STUDENTS) ................................ 30 MEETING PROGRAM REQUIREMENTS................................................................ 30 MINIMUM ACADEMIC PERFORMANCE ................................................................ 30 INTERNATIONAL STUDENTS, MAINTAINING IMMIGRATION STATUS............... 30 TIME TO DEGREE .................................................................................................. 30 Time to Degree and Extensions ........................................................................... 30 Reinstatements..................................................................................................... 31 Readmission ......................................................................................................... 32 Leaves of Absence ............................................................................................... 32 Withdrawal from Program ..................................................................................... 33 Dismissal from Program ....................................................................................... 33 MASTER’S DEGREE POLICIES AND PROCEDURES ................... 34 COURSE OF STUDY ............................................................................................... 34 6 CREDIT HOUR REQUIREMENTS .......................................................................... 34 CANDIDACY ............................................................................................................ 34 CULMINATING EXPERIENCE: THESES and CAPSTONES .................................. 34 Thesis Preparation, Evaluation and Submission Process..................................... 34 Capstone Process ................................................................................................ 35 GRADUATION ......................................................................................................... 35 Application to Graduate ........................................................................................ 36 Graduation from Dual Degree Programs .............................................................. 36 Certification for Graduation (Certify Online) .......................................................... 36 CONTINUING TO A DOCTORAL PROGRAM ......................................................... 37 DOCTORAL DEGREE POLICIES AND PROCEDURES ................. 38 COURSE OF STUDY ............................................................................................... 38 CREDIT HOUR REQUIREMENTS .......................................................................... 38 RESIDENCY AS FULL-TIME STUDENT ................................................................. 38 CANDIDACY, QUALIFYING EXAM ......................................................................... 38 UNIVERSITY GRADUATE FACULTY ROLE ........................................................... 39 DISSERTATION....................................................................................................... 39 Dissertation Advisor and Committee..................................................................... 39 Final Defense of Dissertation................................................................................ 40 Use of a Moderator ............................................................................................... 40 Submission of Dissertation ................................................................................... 40 GRADUATION ......................................................................................................... 41 Application to Graduate ........................................................................................ 41 Dual Degree Programs Graduation ...................................................................... 41 Graduation Requirements for Doctoral Degrees................................................... 41 Certification for Graduation (Certify Online) .......................................................... 41 GRADUATE CERTIFICATE VERIFICATION FOR UC TRANSCRIPT ENDORSEMENT ..................................................................................................... 42 DOCTORAL HOODING AND MASTER’S RECOGNITION CEREMONY ................ 42 INSTITUTIONAL RULES, POLICIES, AND PROCEDURES ............ 44 PROGRAM STANDARDS........................................................................................ 44 RECORDS PRIVACY, FERPA, AND THE RIGHT TO REVIEW .............................. 44 NOTICE OF NON-DISCRIMINATION ...................................................................... 44 ACADEMIC DISHONESTY ...................................................................................... 45 STUDENT CODE OF CONDUCT ............................................................................ 45 RESPONSIBLE CONDUCT OF RESEARCH .......................................................... 46 RESTRICTED RESEARCH ..................................................................................... 46 7 GRADUATE STUDENT GRIEVANCE PROCEDURES ........................................... 46 8 ADMISSION TO GRADUATE PROGRAMS ADMISSIONS POLICY The University of Cincinnati welcomes graduate applications from students who: • hold a baccalaureate degree from a college or university regarded as standard by a regional accrediting agency and; • have at least a B average (3.000/4.0 system) in undergraduate course work or otherwise give evidence of promise that is judged satisfactory by the admitting program and the Graduate College. Programs that wish to admit applicants who lack this 3.000 minimum GPA requirement must provide supporting evidence and rationale of how such students will be able to complete a graduate program that requires achievement of a 3.000 GPA, and indicate any support offered by the program to ensure the applicant’s success given the GPA deficiency. Decisions concerning admission to graduate programs rest with the programs, and criteria used for determining admission beyond these minimal requirements are established by the programs. All programs have established written criteria for judging the admissibility of applicants, which are published in each program’s graduate handbook. The program’s handbook for graduate study must be available to the student. Upon the student’s acceptance of the admission offer, the program and the student are bound by the terms and conditions set forth in the letter of appointment. Faculty and Administrators' Eligibility for Graduate Degrees No holder of an academic administrative title at the University of Cincinnati (equivalent to assistant dean or above) may matriculate or be granted a graduate certificate or degree from the University of Cincinnati. No graduate degree or certificate from the University of Cincinnati will be granted to any faculty member at the University of Cincinnati (full-time or part-time above rank of instructor) who teaches in the same department, division or school in which the degree is to be granted. This rule also applies to adjunct appointments at any faculty rank and to interdisciplinary degrees when the same college is one of the interdisciplinary colleges. College deans may petition the Associate Dean of the Graduate College for a waiver of this policy on an individual faculty member’s behalf. The written request should describe the teaching responsibilities of the faculty member, indicating whether they are teaching graduate students and a plan for managing potential conflicts of interest. ADMISSIONS CATEGORIES Matriculated graduate status is granted to an applicant who has been accepted into a graduate certificate or degree program and has met all admissions criteria. Note that applicants first receive a provisional acceptance, and conversion to matriculated graduate status is dependent upon receipt of an official transcript that confirms that the student holds a baccalaureate or higher degree from a college or university regarded as standard by a regional accrediting agency. Please note that additional official documentation may be required (e.g. if the transcript does not contain information about degree conferral or if a foreign degree needs confirmation as baccalaureate equivalent). Instructions and deadlines for meeting this requirement are included on the Transcript Submission Policy web page. 9 Provisional graduate status is granted to applicants who have been accepted into a graduate certificate or degree program, but who have NOT yet met all admissions criteria. As described above, one routine requirement for all students is the submission of an official transcript. However, some students must in addition take undergraduate courses or improve English language proficiency to satisfy prerequisites, and these students may be accepted by the program on a provisional basis that is contingent on satisfying those additional prerequisites. Letters of admission should be read carefully to make sure all requirements tied to provisional status are identified. Visiting student status allows students to take courses for graduate credit when they have not been admitted into a graduate degree program. These students were previously called “non- matriculated students”. Should this visiting student subsequently matriculate into a certificate or degree program, a maximum of 12 semester hours may be applied to the certificate or degree program. Students are not eligible for tuition or stipend awards allocated by the Graduate College while in visiting graduate status. This policy and other funding policies are further explained in the Financial Support chapter. APPLICATION PROCESS FOR 4+1 AND AIM PROGRAMS Application to 4+1 Degree Programs If an undergraduate student plans to matriculate into a master’s degree program upon completion of the bachelor's degree, they can consult with advisors to begin (A) taking graduate-level coursework as an advanced undergraduate student, and (B) focusing on thesis-related, independent research at an earlier date. This advising plan to achieve an articulated path to a master’s degree is called a 4+1 program. Students who enter these programs must complete all of the requirements of each respective degree and must apply separately for both degree programs at the appropriate time. To be eligible for entry to a 4+1 program, students must have junior standing (64 semester credits). In addition, students must meet all College and graduate program admission requirements for the particular program. 4+1 students should note the following: • 4+1 students who enroll in graduate-level coursework prior to formally matriculating as a graduate student are allowed to apply up to 12 semester graduate-level credits toward the requirements of the master’s degree. These credits cannot be used for the bachelor’s degree. Students in the 4+1 program will complete the rest of their graduate coursework after formal completion and certification of the bachelor's degree. Students should refer to the section of this handbook containing the general requirements of the master’s degree and speak to the directors of the graduate program about specific requirements. • 4+1 students wishing to matriculate into a master’s program must complete a formal graduate admission application online in their junior or senior year to be admitted to the graduate program and begin the master’s degree. Students should speak to the directors of the graduate program about specific admission and application requirements. 10 Application to Accelerated Integrated Master’s (AIM) Programs The university has a limited set of programs that allow for a single application and admission to obtain a bachelor’s plus master’s degree in a single course of study. These programs are tightly structured around co-op experiences and allow undergraduate students to accumulate more than 12 graduate credits prior to transitioning to a matriculated graduate student. Applicants apply to an AIM program at the time of application to UC as an undergraduate but are still required to formally apply to transition to the graduate portion of their program at a time defined by their AIM program. There is a free and abbreviated application for UC undergraduate students transitioning to the associated master’s degree that is part of their AIM program. DUAL DEGREE PROGRAMS The university offers the opportunity for students to pursue two complementary graduate degrees simultaneously through structured, official dual degree programs (see below for a complete listing). The advantage of these programs is that they may require fewer credits than completing each degree program separately. Each program’s entrance requirements must be met in addition to university requirements, and the applicant must be accepted by both programs. Below is a listing of the Dual Degree programs: • Accounting MBA/MS • Business Analytics MBA/MS • Business Administration/Arts Administration MBA/MA • Business Administration/Nursing MBA/MSN • Community Planning/Landscape Architecture MCP/MLA • Community Planning/Law MCP/JD • Finance MBA/MS • Human Resources MBA/MA • Information Systems MBA/MS • Marketing MBA/MS • Law/Women’s Studies JD/MA • Law/Business JD/MBA • Law/Political Science JD/MA • Law/Political Science JD/PhD Please see the Multiple Degree Exemptions section for information on the maximum amount of transfer credit that can be applied to the dual degree programs. CHANGING DEGREE PROGRAMS AT UC In order to change from one degree program to another within the university, a student must submit a complete application to the new program. If the degrees are housed in the same unit, and the change is made over consecutive term enrollments, the application fee is waived. If the new degree program is in a different administrative program, the student is responsible for paying the application fee. Students are always responsible for fulfilling the requirements of the given degree program in which they are matriculated. Please see the Transfer Credit for Graduate Courses Taken at UC 11 section for information on the amount of graduate credits that can be transferred if a student is changing from one graduate program to another within the university, or if a student is changing from visiting graduate status at the university. GRADUATE CERTIFICATE PROGRAMS The University of Cincinnati offers graduate certificate programs. Certificates vary in both credit hours and in how they are configured: for instance, some can be earned only in conjunction with a degree; some require a master’s degree as a prerequisite, and some can be earned outside of a degree program. Applicants must apply for admission to a certificate program. Graduate College general guidelines are as follows: • Students must hold a baccalaureate degree. • Certificate programs may enroll degree seeking and non-degree seeking students. • For students matriculated into a degree program, credit hours earned under a certificate program may count toward a degree in any program if approved by the program director, and if requirements for the certificate and degree are completed the student will be awarded both. Credits earned while matriculated in a certificate program will count as credits matriculated in a degree. • Students can apply a single course to multiple certificates but only to ONE master’s or doctoral degree. • Students can obtain more than one certificate within the same program prior to attaining their master’s degree. • Students apply for a certificate program just like applying for a degree program, and must pay any relevant application fee. • Students enrolled only in a graduate certificate program are not eligible for tuition or stipend support with university funds (University Graduate Assistantship/Graduate Scholarship funds). If a student is interested, the student should contact the appropriate program office to obtain the specific criteria and prerequisites for the desired certificate. INTERNATIONAL STUDENT ADMISSION UC International Services supports the needs of international students at the University of Cincinnati. The office assists international students in understanding the rules, regulations, and procedures that must be followed during their stay in the United States and provides support services and cultural information to students. UC International Services is located in Suite 7148, One Edwards Center (1-513-556-4278). Information about admission to the University of Cincinnati for international students is available on their website. International students with F-1 visas can only be granted admission as matriculated graduate status in a degree-seeking program. (Most international students with J-1 visas can be granted admission with matriculated graduate status only, with some exceptions.) Students with J-1 visas should inquire with UC International Services to determine the regulations that apply to them. Students with green cards (U.S. resident aliens/permanent residents) are not defined as international students and, therefore, are not governed by the university’s international student policies. However, the English proficiency requirement does apply to green card holders (see The English Proficiency Requirement, below). 12 In instances where an international student holds a degree for which the U.S. equivalent is not known, or if it is determined by the program or the Graduate College that the applicant does not have the equivalent of a bachelor’s degree, the program must submit a petition for admission without the bachelor’s degree, with supporting documentation and rationale, to the Associate Dean of the Graduate College. All international students are required to carry University of Cincinnati student health insurance unless they qualify for a waiver. Semester insurance fees are automatically assessed each registration period. Please visit the Graduate College website for more information on the Graduate Assistant/Fellow Health Insurance Award. English Proficiency Requirement English proficiency is required of all applicants whose native language is not English. Students can demonstrate proficiency in a number of ways at the graduate level. PLEASE NOTE, many colleges and programs have higher requirements than those listed below. Applicants should contact the programs to which they are applying for details. For more information, please refer to the English Proficiency Requirement web page. 13 FINANCIAL SUPPORT Graduate students may obtain financial support from several sources. • The University of Cincinnati provides merit-based graduate awards in the form of tuition scholarships (known as the Graduate Scholarships, which may be provided with or without an assistantship), as well as stipend awards (graduate assistantships including teaching and research assistantships), and program-specific scholarships and fellowships. • Scholarship and fellowship support is also available from a diverse collection of external sponsors at the local, state, national, and international levels. Programs and colleges may have additional sources of support through grants and endowed funds • Need-based support may be obtained from federal and state sources. Financial support from each of these sources is described below. UNIVERSITY MERIT-BASED GRADUATE AWARDS The University of Cincinnati offers several types of merit-based graduate awards. The most common types – Graduate Scholarships, fellowships, and University Graduate Assistantships – are described below. Most university graduate awards are underwritten by university funds allocated by the Graduate College (“general funds”) to each college, which are then awarded to students by the individual programs. Some awards are competitive and granted by the Graduate College upon recommendation of an individual graduate program. Not all graduate students are eligible for graduate awards. Graduate awards allocated by the Graduate College are not available to students: (1) taking classes as visiting students, (2) enrolled only in a graduate certificate program, (3) who have not maintained the minimum GPA of 3.000 in their program, (4) who are on academic probation, or (5) who have exceeded the 174 graduate credit rule. Awards can only be guaranteed for a maximum period of one academic year, and renewal of a university graduate award is not automatic. Awards that are appointed by individual programs are awarded to eligible students at the sole discretion of the program. Programs are not obligated to renew awards, even if previously awarded students met all eligibility requirements. GRADUATE SCHOLARSHIPS (GS) The Graduate College funds scholarships that cover all or part of a student’s tuition and fees. In most colleges, the scholarship awards supported by the Graduate College are the Graduate Scholarships (GS), with and without assistantships. The GS with assistantship is used to support graduate assistants who are additionally awarded a stipend that requires service in return for stipend support. The GS without assistantship is for graduate students who do not receive university stipend support and therefore no service is required in return for the GS award. The appointing program sends written offers of scholarship awards to students, including information about the amount and duration of the award and the terms of the offer. Students must maintain all of the required eligibility requirements in their offer letter to maintain their tuition scholarship. 14 Students receiving a tuition scholarship must register for a specified minimum number of graduate credit hours in each semester for which they are receiving support. If an international student is supported by a GS without assistantship, they must register for a minimum load of 10 graduate credit hours per semester during the time they receive the GS scholarship. If a domestic student is supported by a GS without assistantship, they must register for a minimum load of 1 graduate credit hour per semester during the time they receive the GS scholarship. Students supported by a GS with assistantship must register for a minimum of 12 graduate credit hours per semester during the time they receive the GS scholarship. These minimum enrollments in graded courses must be met prior to using scholarship support for any audited courses. If a student withdraws from a class funded by a tuition scholarship, with the remaining enrolled credit hours totaling less than the minimum required for the award, the award is cancelled immediately and the student is responsible for the tuition balance, based on the date of withdrawal. Full tuition scholarships cover a maximum of 18 credits per semester. Students registered for more than 18 credits in a semester will be billed tuition and general fees on a per-credit-hour rate for each credit over the 18. All rules that govern recipients of tuition support pertain to all students, including international students. Other rules and policies that apply specifically to international students are independent of GS regulations. Both sets of regulations must be met. Neither set of regulations negates or takes the place of the other. (See 174 Graduate Credit Rule.) Note: Financial awards that require no service may reduce eligibility for educational loans. Students should notify the Student Financial Aid Office of their tuition support if they apply for aid from that office. UNIVERSITY FELLOWSHIPS University of Cincinnati fellowships are financial awards that include tuition scholarships and stipends with no associated service requirements. The purpose of a fellowship award is to allow the recipient to concentrate exclusively on their studies; therefore, multiple appointments and/or employment by the University of Cincinnati are not permitted for students receiving fellowships. The appointing program sends written offers of fellowship awards, including information about the amount and duration of the award; a general description of the academic obligations accepted by the student as part of the award; a reference to sources of information about academic requirements for degree completion; a description of the conditions under which either the student or unit may terminate the award prior to its end-date; and criteria for reappointment. Students receiving fellowships should check with Student Financial Aid to be informed about the potential impact on their eligibility for aid. Income received that is not for services rendered (whether it be in the form of a fellowship, grant, or award) will be calculated in whether a student meets the Cost of Attendance for the University of Cincinnati. Fellowship awardees have an enrollment obligation identical to GS with assistantship/UGA (university graduate assistantship) awardees, and they lose eligibility for the fellowship award if they accumulate more than 174 graduate credit hours. (See 174 Graduate Credit Rule). 15 For information on university-sponsored fellowships, please see the Graduate College website. GRADUATE ASSISTANTSHIP STIPEND AWARDS A student awarded a graduate assistantship receives a financial stipend for services rendered in addition to a full or partial tuition scholarship. These stipend funds are called UGA (university graduate assistantship) awards. Graduate assistants are also entitled to a discount at the University Bookstore and may be eligible for the Graduate Assistant/Fellow Health Insurance Award. UGA awardees devote effort to a combined program of formal study and assigned duties of teaching, research or administrative service that is designed to enhance their university education. The stipend received by the graduate assistant is in recognition of these services. Those with teaching duties are teaching assistants (TAs) and those with research duties are research assistants (RAs). During the appointment, the goal is to help a graduate student become a more learned, creative, and professional individual through formal instruction, interaction with faculty, research, and administrative experience. Any such service assignments should be consistent with the student’s academic pursuits. UGA funds are awarded for designated periods of time by the graduate programs. Graduate Assistants are considered exempt from minimum wage and overtime requirements, and they are paid on a salaried basis. Minimum stipends are set by the Dean of the Graduate College. The minimum stipend for a graduate assistant, as set in July 2023, must be the equivalent of a minimum of $16.98 per hour for all master’s and doctoral students except those in PhD programs. Graduate assistants enrolled in PhD programs have a minimum of $22.28 per hour. The appointing academic program, college, or area of responsibility determines service requirements of students who hold assistantships. If awarded an assistantship outside their program, graduate assistants’ duties are governed by the academic program, college, or the area of responsibility that made the award. In all cases, the award obligates awardees to no more than 20 hours per week of services, and those services must make a substantive contribution to the student’s academic and professional development. Students must be appointed to a position that is consistent with their field of academic study. If the student determines that they cannot meet the requirements of the award, it is imperative that they notify the program to initiate renegotiation or reassignment of the award with correspondingly less support. A student’s hours are prorated for weeks with a holiday or school closure and students are not required to be available during break periods unless given additional compensation. UGA awardees must be registered for 12 graduate credit hours or more, exclusive of audit credits, for each semester they receive the assistantship. University assistantships will be cancelled if the awardee does not meet their enrollment obligation. The exception to this rule is summer semester. See Summer Employment without Full-time Enrollment section. Students lose eligibility for the UGA stipend funding if they accumulate more than 174 graduate credit hours. (See 174 Graduate Credit Rule.) Assistantship awards are contingent upon student status, satisfactory degree progress, and performance of service as assigned, and can be terminated at any time. Each year the assistantship is in effect, the appointing program, college, or area must notify the awardee in 16 writing of any significant change to the services or conditions of the appointment. Such changes include, but are not limited to: • the amount and duration of the award • any tuition and/or fee not paid by the program • the average expected time per week or per semester of required duties • description of the duties assigned to the student • description of the conditions under which either the student or unit may terminate the award prior to its end-date • criteria for reappointment of the award • criteria for determining variations in stipend levels where such variations exist • information on current IRS guidelines, Medicare, and the Public Employee Retirement System (PERS) • graduate appointment procedures if any of the documents have been modified since the student’s initial appointment. Teaching Assistant Requirements and OEPT All teaching assistants must be supervised by a faculty member who has the academic credentials and authorization (as defined by the Higher Learning Commission, Ohio Dept. of Higher Education, and the University of Cincinnati) to offer instruction to the students in the class. Supervising faculty must be listed (as supervisor or instructor) in any course/section overseen by a graduate teaching assistant. Non-native speakers of English who are awarded teaching assistantships at the University of Cincinnati are required to score at least a 3.0 on the Oral English Proficiency Test (OEPT). The OEPT evaluates the spoken language skills of non-native speakers of English. Students who pass are certified for oral English proficiency and may assume the full range of duties associated with their teaching assistantship. Students whose oral English proficiency has not been officially certified may not assume instructional responsibilities. However, students who score 26 or above on the speaking section of the TOEFL IBT or students with a score of 50 or above on the Test of Spoken English are exempt from the OEPT. Students are required to take the test at the beginning of their first term of study. If a score is less than 3.0, students are recommended to take ESL courses before retaking the test. A student is permitted to take the OEPT twice without charge during an academic year. Graduate Assistant/Fellow Health Insurance Awards Academic programs are required to notify eligible students with information on the Graduate Student Health Insurance (GSHI) award, which can subsidize the cost of UC Student Health Insurance for qualified students. Programs must provide graduate assistants/fellows with the GSHI Award application deadline and relevant details on GSHI Award criteria, and must keep records that they have provided this information to their students. Such information can be found at the Graduate Student Health Insurance Award web page. 17 Multiple Appointments/Employment Graduate assistantship awardees who are domestic students are limited to 24 total hours of combined service and student hourly work while school is in session. The following policies regarding multiple appointments must be followed: • Units are responsible for monitoring of hours worked by student employees assigned to their unit; this is especially important for students who hold multiple student appointments. • The program must closely monitor academic progress. • The additional appointment must be terminated if a student does not maintain academic progress deemed to be acceptable by the program. This limit applies only while school is in session. During scheduled breaks only, if students work more than 20 hours or they work more than the prorated salary hours required, they must be compensated at an hourly rate for the extra work. Students can be employed for a maximum of 40 hrs/week during scheduled breaks. International students are limited to working 20 hours per week while school is in session and are limited to 40 hours per week during scheduled breaks. All International Students must have onboarding conducted by the International Services Office. An international student on F-1 or J-1 immigration status contemplating employment should contact the International Student Services Office at 1-513-556-4278. Summer Employment Without Full-time Enrollment For summer semester only, students who are not registered for graduate credit hours or are registered for less than 12 credits hours are eligible to be employed by their respective program, usually by performing the duties of their assistantship such as teaching or lab work. In this case, the student will receive a stipend for the work performed. Retirement funds and taxes will be withheld from the student’s check. Questions about options with retirement funds once separated from the university should be directed to Human Resources and/or OPERS. Graduate Assistants on Jury Duty All graduate students are encouraged to participate when they are subpoenaed for jury duty. The student must seek their advisor’s and program director’s permission with the expectation that every effort will be made to accommodate the jury service. If the student’s absence from UC will create a hardship to the unit, they should seek a deferral or make arrangements to cover their responsibilities during the absence. Such arrangements must be approved by their program director. Students serving on jury duty will be paid their normal university stipend during the period of service, with the understanding that any compensation received for jury service must be returned to the university if their assistantship responsibilities remain uncovered. If the student makes arrangements to cover their assistantship commitment for the period in which they serve on jury duty, and if those arrangements are approved by their program director, they may keep the jury duty compensation in total. The student may also keep any travel reimbursement fees. 18 Strike Policy for Graduate Assistants In the event of a strike, graduate assistants are expected to fulfill commitments associated with their assistantships. Graduate assistants assigned to teach a course as part of their assistantship agreement are expected to teach the course during a strike. Graduate assistants who choose not to teach can lose their assistantship. If the student’s responsibilities are associated with a course taught by a faculty member and the strike results in the course not being taught, which makes it impossible for the student to fulfill their responsibilities, the student would not be held responsible. Sick Leave/Family Leave for Graduate Assistants Graduate assistants do not accrue vacation, sick leave or other paid time-off. In the event of illness, a graduate assistant shall notify the GA supervisor as soon as possible on each day of such absence. Holidays/UC Closing Policy for Graduate Assistants Graduate assistants are not hired as essential personnel, and thus cannot be required to work during holidays or official UC closings (such as emergency closings due to severe weather, public emergency, etc.). Required weekly hours will be prorated based on the official holidays or closings during that week. Military Duty A graduate assistant who is a member of any reserve component of the United States Armed Forces, who is voluntarily or involuntarily ordered to extended U.S. military service, shall be granted time-off without pay. The graduate assistant should provide to the appropriate program official advance written notice of the call for impending training or active duty. Upon completion of military service or if discharged under honorable conditions, and upon prompt re-registration as a student, the graduate assistant shall be returned to the former assistantship in a timely manner, based upon availability. Due to the temporary nature of graduate assistantships, if the assistantship is eliminated during the student’s absence, then no obligation exists. Termination A graduate assistantship may be terminated at any time with or without cause, unless there is an explicit written contract between the student and the university that provides otherwise. Workers’ Compensation The Ohio Workers’ Compensation Law covers graduate assistants, who are paid by payroll and provides medical, income and survivor benefits in the event of accidental injury, occupational disease or death occurring in the course of, and arising from, employment. Unemployment Graduate assistants are not entitled to unemployment compensation. 19 Social Security, Medicare Tax and Ohio Public Employees Retirement System (OPERS) Please see Exemption from OPERS/Medicare for Student Employees. 174 GRADUATE CREDIT RULE Students receiving any university award (e.g. UGA stipend, GS tuition scholarship) and students who receive funds from the State of Ohio are governed by the requirements and limitations described in the following paragraphs. Any student who becomes ineligible to receive state subsidy is not eligible to receive general funds financial aid (i.e., a university stipend and/or tuition). Since this policy is due to regulations governing state support of the university, exceptions to the policy are not considered. Graduate students who have attempted 174 graduate credit hours at the University of Cincinnati are not eligible for a university award for enrollment at or beyond the 174 hours. Hours attempted include hours for which credit has been awarded, as well as withdrawn courses, audited courses, and hours in progress or incomplete (these graduate credit hours include all courses with grades F, I, UW, SP, IP, UP, W, etc.). All graduate hours attempted at the University of Cincinnati, regardless of program or student status, count toward the 174 total. A student is not eligible for funding beginning with the semester in which said student will reach the 174 attempted hours. For example, if a student has earned 167 graduate credit hours at the University of Cincinnati by the close of summer sessions and registers for (i.e., attempts) 12 credit hours for fall semester, they are ineligible for a university graduate scholarship or fellowship in the fall semester. If a student earned master’s credits at the University of Cincinnati (for either a partial or a full degree), the exact number of these credits are deducted from the 174 credit hour total for which they can receive funding. This is true if the credits are earned at an earlier time and the student returns to the University of Cincinnati to continue graduate education, and it is true regardless of the discipline in which those credits were earned. For example, if a student has earned a master’s degree in engineering and then chooses to pursue a master’s and a doctoral degree in math, the credits earned to get the engineering degree are deducted from the 174 credit hours for which the student can receive state financial support (e.g., fellowships, assistantships, and scholarships). Graduate students who have earned a master’s degree or other equivalent or higher advanced degree at another institution are not eligible for a university scholarship or fellowship once they have attempted 140 graduate credit hours at the University of Cincinnati. If a student enters the University of Cincinnati with a master’s degree from any institution other than the University of Cincinnati, they are credited with 34 graduate credit hours toward the 174 credit hour limit for state funding eligibility. Per Ohio Department of Higher Education policy, Ohio can subsidize up to the remaining 140 credit hours. The 34 credit hours are deducted from the 174, regardless of the discipline and regardless of the graduate level at which the student enters the University of Cincinnati. For example, if a student has earned a master’s degree in engineering at The Ohio State University and then chooses to pursue a master’s and a doctoral degree in math at UC, the credits they earned to get their engineering degree are deducted from the 174 credit hours for which they can receive state financial support in the math program. Note that professional 20 degrees, like a juris doctorate or medical doctorate, do not count as a master’s or higher equivalent for the purpose of comparative funding. Students who enter graduate education at the University of Cincinnati with a professional degree and no other advanced degrees are still eligible to receive up to the 174 credit hours of funding. If a student enters the University of Cincinnati with only partial credit toward a degree from another institution, those credits are not deducted from the 174 total—even if the program they enter at the University of Cincinnati agrees to accept transfer of those credits toward the student’s degree requirements at the University of Cincinnati. The student can still receive state subsidy for up to 174 credit hours earned at the University of Cincinnati beyond those transferred in. Note: For the purposes of this policy, a master’s degree is one awarded by an American institution or a degree of equivalent value from a foreign institution. Students holding a master’s degree from a foreign institution that is the equivalent of a bachelor’s degree in the U.S. will have the higher limit (174). The higher limit will not be affected by a student’s completion of course work short of a master’s degree at another institution. TAXATION OF CINCINNATI GRADUATE AWARDS The university maintains a position that all income, from whatever source, is taxable and may be subject to withholding. The IRS maintains final authority on the taxability of all stipends, and in all cases, the university cannot guarantee that any stipend is tax-exempt. The Graduate College will not review an individual award nor provide legal advice to individual students. In addition, students (not the university) are responsible for the withholding information that they submit on their W-4 forms at the time of appointment. Those students who receive a stipend during any academic semester and are not enrolled for at least half time will have Medicare tax and Ohio Public Employee Retirement System (OPERS) payments deducted from their checks. If a student is enrolled half time or more, they may apply for an exemption from these fees in their program office. No taxes are withheld from fellowships, but students may still have a tax liability and should consult a tax advisor. EXEMPTION FROM OPERS FOR STUDENT EMPLOYEES Employees (including student employees) of Ohio public institutions do not contribute to the federal Social Security system. Student employees’ retirement contributions will be directed to the state retirement plan, the Ohio Public Employees Retirement System (OPERS). Student employees (including graduate assistants and hourly student workers) may be eligible to opt out of OPERS participation when first hired by UC as long as certain requirements are met. See the Student Employees web page on UC’s Human Resources site for the OPERS exemption form and for additional information. EXTERNAL SOURCES OF FUNDING Tuition scholarship and fellowship funding is provided to graduate students by a wide variety of governmental and private sponsors. UC’s Financial Aid website, the ScholarshipUniverse scholarship search application, the Office of Nationally Competitive Awards and local and university libraries are potential sources of information about these funding opportunities. The Office of Nationally Competitive Awards provides workshops, application writing assistance and university endorsement (for applicable awards). Students may also visit the Office of Research 21 for more information on upcoming grant opportunities, grant writing workshops, and searchable research opportunity databases. FEDERAL FINANCIAL AID See the Student Financial Aid website for more information on federal financial aid (including summer aid). The Graduate College does not regulate or audit any outside fellowships or other outside funding a student may receive. However, it is advised that students with outside funding consult with the Financial Aid Office to see if and how the outside funding may or may not affect other Financial Aid eligibility. 22 GRADUATE CREDIT AND GRADES ELIGIBLE CREDITS Credit towards a graduate degree or certificate can only be earned for those courses in this university that are listed as graduate in the Schedule of Classes or which have been approved in writing by appropriate program authority for inclusion in the curriculum. Graduate credit towards a degree will only be granted when a course is included in the graduate career category of the student record in Catalyst. CREDITS REQUIRED TO EARN A GRADUATE DEGREE Graduate degrees at UC each have a stated number of credit hours that must be completed satisfactorily to earn the degree. As described below, there are multiple opportunities where coursework taken prior to matriculation into a degree program may count towards that credit hour total. In all cases, to earn a degree at UC, at least 67% of the relevant coursework credit must be earned while a matriculated student at the University of Cincinnati. Students entering in Fall 2019 or later should make application to their program for such (advanced standing or transfer) credit during their first semester at UC to assure their course of study is optimized. For all students matriculating in Fall 2019 and later, such credit will only be granted if a complete and program-approved application for such credit is submitted to the Graduate College by the end of their first year in the program, or prior to their final semester of study, whichever comes first. This new policy (introduced in AY19-20) is in effect for all students matriculated in Fall 2019 and later. In prior policies, master’s degrees were granted when 50% of graduate credits were completed while matriculated in the graduate program granting the degree, therefore allowing up to 50% of credits to be via advanced standing. Advanced Standing for Graduate Courses Taken Outside of UC a. Programs are permitted to award up to one third of the credits of a UC graduate program through advanced standing (e.g., 10 credits are eligible in a 30 credit hour program or 13 credits in a 40 credit hour program). The relevant number of credits is based on the minimum credits required to earn the advanced degree starting from the minimum degree qualification (usually a baccalaureate degree). Note that for doctoral students the advanced standing credit total will include any use of the ODHE allowance of up to 30 credits for a prior master's degree. b. Any graduate course credits, including those earned from previously earned graduate or undergraduate degrees, are eligible as advanced standing credits. c. Advanced standing can only be offered for courses (including electives) entered in e- curriculum for the UC program. d. Program faculty must evaluate courses for equivalence or comparability prior to granting students Advanced Standing credit for courses taken at another institution, meeting all the following criteria; 1. Courses taken at a recognized University or College 2. Courses taken at the graduate level 3. Requested advanced standing credits must be the lower of the following two choices 23 i. Credits originally earned for the course ii. Credits available in the UC course listed in e-curriculum 4. For 1:1 course equivalency, one or more of the following criteria must be met when compared to the University of Cincinnati course for which Advanced Standing credit is sought: i. Course was taken in the same field with the same title ii. Course had similar topics iii. Course had similar learning outcomes iv. Course assignment and assessment requirements were similar v. Course readings requirements are similar 5. This evaluation process should be documented for each case in which it is applied e. The one third rule doesn’t apply to dual degrees, sequential master's to doctorate programs, or others with shared content that have received approval from the Graduate College. f. Advanced standing credit recommended by program faculty must first be approved by the graduate program director and then submitted for final review by the Graduate College to assure the request complies with the criteria above. Transfer Credit for Graduate Courses Taken at UC a. When leaving one graduate program to join another at UC, all UC graduate credits taken as part of the incomplete program are eligible to use to fulfill requirements in the new program, based on faculty evaluation of the equivalence to courses in the new curriculum and program approval. b. When a student enters a graduate program at UC, non-matriculated UC graduate credits are eligible to be used for the program, if the coursework is listed in e-curriculum as part of the curricular requirements. Subject to program approval, students may transfer up to one third of the credits required to earn their UC graduate degree Programs are permitted to award transfer credit from a prior UC graduate degree if (1) the sum of unique credits to earn both degrees is equal to or greater than the State minimums for each degree type, and (2) the transfer credit courses are part of the curriculum of the new degree program as defined in e-curriculum. Using credit that meets both criteria, up to one third of the credits of the new UC graduate program may be awarded through transfer credit. The relevant number of credits is based on the minimum credits required to earn the advanced degree starting from the minimum degree qualification (usually a baccalaureate degree). Note that for doctoral students the transfer credit total will include any use of the ODHE allowance of up to 30 credits for a prior master’s degree. Course Exemption for Prior Knowledge, Without Credit Faculty in a program have the option to provide students with an examination to determine if accumulated knowledge is sufficient to be exempted from specific courses in a graduate curriculum (e.g., continuing education courses in some professional fields may provide a background that eliminates the need to take introductory courses). The form and content of that examination is at the discretion of the program. When such exemptions are granted, the student does not earn graduate credit for such knowledge. The credits required to complete their UC graduate degree remain unchanged, and the student will take alternative coursework (approved by the graduate program director) to advance their knowledge. 24 Multiple Degree Exemptions a. If the graduate faculty from a UC program has participated in designing and/or presenting the curriculum at another institution, shared degree programs between the institutions can deviate from these rules with prior approval of the Graduate College and their college leadership. In no case will a UC degree be awarded if more than 50% of the curriculum is offered by non-UC faculty. b. Dual degree programs can combine two UC graduate degrees into a single curriculum if approved by the University. Approved dual degree programs can share up to one-third of the combined credits of the two degrees, but the total count of unique credits to earn both degrees must always be equal to or greater than the State minimums for each degree type. Enrolling in Non-UC Classes through the Greater Cincinnati Collegiate Connection The University of Cincinnati is a member of the Greater Cincinnati Collegiate Connection. GC3 classes are those not generally available at the University of Cincinnati but which can be used to satisfy degree requirements. The student must have met all tuition commitments at the University of Cincinnati and must observe all regulations of the host institution. For additional information, participating institutions, and registration instructions, consult the Greater Cincinnati Collegiate Connection page of the Registrar’s Office website. Approval is at the discretion of the program. Graduate Credit for Undergraduate Students Any program may allow juniors or seniors to register for graduate courses for graduate credit before those students have completed the baccalaureate degree. It is recommended, if the program permits such registration, to limit the privilege to students with senior status and a grade point average of at least 3.000 (higher in some programs). This is evidenced by a written request from the student that is signed by an authorized member of the graduate program. Upon approval by the graduate program and the course instructor, graduate credit will be given for the courses. A maximum of 12 semester graduate credits can be earned in this manner. Credit will not be given toward both graduate and undergraduate degrees for the same course. Graduate Credit Earned in 6000-Level Courses In fall 2016, all 6000-level courses became graduate only. In the past, 6000-level courses were available for either undergraduate or graduate credit (to earn graduate credit, students selected the graduate level designation (G) in these courses, indicating that additional work was required beyond that required of undergraduates in the course). PLEASE NOTE: with the transition to the new use of course numbers, there will be no change to the graduate (or undergraduate) credits earned previously in the pre-fall-2016 version of these courses. GRADING Final Exams Exams are held during the last week of the semester after classes have ended. For each term’s full final examination schedule, consult the Calendars page of the Registrar’s Office website. 25 Make-up Final Exams Special policies may govern the taking of missed final exams. Students and faculty members should check the college office or program office for specific details. Every student is responsible for the material presented in their class. Arrangements for make-up work and tests are determined by the instructor. Absences incurred by students officially representing the university will be excused, provided that official notification of such absence has been given in advance to the instructor. Grade Reports End-of-term final grades may be viewed in the Catalyst student portal immediately following submission of final grades by the instructor. Grade reports include total graduate hours and hours for the current semester. The student’s grade report differentiates between “units taken” (course credits the student enrolled in but did not complete successfully or which are still pending a final grade) and “credits passed” (course credits successfully completed with a final grade other than F). These values are posted on the student’s transcript as attempted hours and earned hours. A graduate grade point average (GPA) is calculated each semester. Approved transfer credits from other institutions are included in the sum of credits earned, but grades for those credits are not included in the GPA. All graduate work, regardless of the University of Cincinnati college in which the work was done, is accumulated in these tallies. For this reason, if a student record includes UC graduate courses that do not count towards the degree, this GPA may differ from the calculation of GPA in program coursework (a minimum 3.000 program GPA is essential to earn a graduate degree). The I incomplete grade is awarded as a course grade (without grade point assignment) at the end of a term when a significant portion of course work has been satisfactorily completed, but not all of the required course work has been completed. The incomplete grade is appropriate when the completed course work is of passing quality and the student has had such hardship that completion of the remaining course work within the term timeline would present an additional hardship. The instructor who assigns the incomplete grade should set a specific date by which the student must complete the remaining course work, recognizing that time must be available for any final evaluation and grade change to be made, prior to the deadline when the grade converts to an F. The deadline is one year to the last day of exams. (Please check the Office of the Registrar’s website for the specific date.) The student must work with the instructor to develop an agreement that indicates the date by which the remaining course work is to be completed and submitted to the instructor. The instructor is not obligated to provide the student with a full year to complete the remaining course work. If the remaining course work is completed within the time period agreed upon by the instructor and the student, and that completion occurs within the one year, then the instructor will submit a change of grade online (in Catalyst) based on the quality of the remaining work. If no specific time for completion is set by the instructor, the student has one year (from the end of the term in which the incomplete was assigned) to complete the remaining course work and submit it to the instructor in time for evaluation of the work and a final grade to be approved by the Registrar. If the coursework is not completed within the one-year period (i.e., one year from the end of the term in which the I grade was assigned), the I grade automatically converts to an I/F grade which affects the student’s GPA the same as the grade of F. For the complete graduate grading scale and a definition of all grades, consult the Grading Scales and Definitions page of the Registrar’s Office website. 26 Grades Assigned to Research Courses That Are Repeated If students are working on dissertation or thesis research, they should be registered in the appropriate research course (e.g., Individual Dissertation or Individual Master’s Thesis), and the course work should be given a final grade each semester. The use of P/F for such courses is strongly recommended to avoid undue influence on GPA due to individual grading practices and the large amount of research credit awarded, but it is recognized that some programs will want to use letter grades. “Placeholder” grades such as SP and NG should not be used. Regardless of the grading scheme selected, it must be consistently applied across an entire program. If a program faculty cannot agree on a single grading scheme, the program must use the P/F choice. Students should be graded for each semester based on their progress and achievements in that semester. Note: The definition of a “research course” is a course outside of formal class work or instruction that allows a student to be registered as a graduate student while they are working independently on their thesis or dissertation under the guidance of their advisor or dissertation committee. This policy also applies to internships and other multiple semester or series courses. Pass/Fail Grades An instructor may request approval for pass/fail grading for an individual student in their class prior to the first day of class. A graduate student can take a course on a pass/fail basis (P or U grade) when approved by their advisor and instructor. An instructor is not required to accept a student on such a basis. Grade Changes A change of grade is only appropriate for an I, an NG, an SP/UP, or an error made by the instructor. SP/UP grades must be converted to a final grade by the end of the following semester. Instructors may change an I or NG grade online in Catalyst for approximately one year (the interval extends from the initial grading semester to the last working day of the same term the following year). To request a change of grade for a non-research course for graduate credit after this period, or an F grade any time, the instructor must do an official, paper change of grade form and forward to the Registrar’s Office. Previously recorded grades may not be changed to W or I after the close of the term. Both I and W grades must be awarded while the course and semester are still in progress and cannot be awarded retroactively. W reflects an official withdrawal that took place by the deadline outlined in the academic calendar, and I indicates work remains to be completed and the student did not earn a final grade. Students cannot withdraw from a class retroactively or be given additional opportunities to seek a different final grade retroactively. If an F is in a non- required course or the required course has since been retaken for a passing grade, the Program Director at certification may request a waiver of the F grade from the Associate University Dean of the Graduate College. No Grade Replacements for Graduate Students Please note, if a graduate student re-registers and re-takes a course, both grades will be included in the student’s overall GPA. There are no grade replacements at the graduate level. The process to make a grade change cannot be initiated by a student. The course instructor of record must send the form. At no time should a student be in possession of a change of grade 27 form. Note: that an I/F grade is governed by the same policies that govern the F grade and is weighted into the student’s GPA in the same fashion. 28 MAINTAINING GRADUATE STUDENT STATUS Maintaining graduate student status signifies that the student is actively engaged in making progress towards their degree and meeting program requirements. Graduate status determines which students may use facilities of the university, may participate in the university governance process and student organizations, and are covered by the Student Code of Conduct and the grievance process. A University of Cincinnati graduate student must hold the equivalent of a baccalaureate or higher degree and must have been accepted for admission into graduate study by the appropriate graduate program. MINIMUM CREDITS/REGISTRATION REQUIREMENTS To maintain graduate status at the University of Cincinnati, students must register at UC for at least one graduate credit that contributes to degree requirements (as determined by the graduate program) in an academic year. If the student is registered for at least one graduate credit in the academic year (fall through summer), they will maintain graduate student status for the entire academic year. Credits that are audited or in which a student receives a W, UW or F do not count toward the minimum credit requirement. Any student that does not register in the fall of an academic year and has not registered for the previous two academic years will automatically be exited from their program. A student whose status has thus automatically terminated will no longer be considered a graduate student but may seek reinstatement (see Reinstatements). Also note that students wishing to use many UC resources, such as university housing, campus laboratories, office space, equipment, campus recreation center, computer labs, etc. may need to be registered. Students should check with specific facilities for their particular requirements. Dual Degree Programs In dual degree programs, students must be registered for at least one graduate credit that contributes to degree requirements in one of the two programs (as determined by the program) during the academic year in which they graduate with their dual degrees. FULL-TIME COURSE LOAD Students must be registered for 10 or more graduate credits each semester to be considered full- time students, 12 if holding a university sponsored graduate assistantship or fellowship. Audit or undergraduate credits do not count toward full-time status and cannot be supported by a University Graduate Award. PART-TIME COURSE LOAD Students who can devote less than full time to graduate study may register for the number of graduate credits judged by their program advisors to represent the appropriate fraction of a full- time load. However, doctoral students must satisfy the Board of Trustees residency requirement, which requires that they have one year of full-time study, which is defined as being enrolled for at least 10 graduate credits in their program in each of two semesters (including summer semester) during a span of three consecutive semesters. Full-time UC employees using their tuition remission benefit to complete a part-time doctoral program may request a waiver of this requirement from the Associate Dean of the Graduate College. (See Doctoral Degrees Policies and Procedures, Course of Study.) 29 REDUCED COURSE LOAD (INTERNATIONAL STUDENTS) Once an international student has finished all required course work and will no longer be enrolling full time, she/he may choose to enroll with a reduced course load. Visit the F-1 Students page on the UC International Services website, referring to the “Enrolling part-time as a graduate student who has finished all course requirements” section for the link to the form and more information. MEETING PROGRAM REQUIREMENTS Students who continue on active status in their program without interruption are responsible for meeting all current requirements, including requirements that are revised since the student first entered the program. Students readmitted into their program are responsible for meeting the program requirements applicable at the time of readmission. MINIMUM ACADEMIC PERFORMANCE The Graduate College requires that a student must have an aggregate grade point average (GPA) of at least 3.000 to obtain a graduate certificate or degree at the University of Cincinnati. The GPA used for this purpose should aggregate graduate-level coursework completed since the student’s matriculation into the particular degree program from which the student seeks graduation, and only courses taken that are applicable to the degree/certificate count towards this GPA. Transfer graduate credits may also be accepted at the discretion of the degree program (and within Graduate College limits), and any transfer credit coming from courses taken at the University of Cincinnati will contribute to the GPA certified for graduation. Please note that programs establish minimum academic standards that may exceed the overall university standards provided above, so students need to be aware of their program requirements. Note that there is no grade replacement for graduate students, so any failed graduate courses remain in the student record. However, if a student retakes a failed course and obtains a passing grade, and if the GPA calculated without that original failing grade is above 3.000, then the program can petition the Graduate College for a waiver of the GPA requirement for graduation. Multiple failing grades, or multiple attempts to pass a course, are examples of why a petition may be denied. INTERNATIONAL STUDENTS, MAINTAINING IMMIGRATION STATUS The student has responsibility for maintaining their immigration status. Key information on maintaining immigration status on the F-1 Students page on the UC International Services website. TIME TO DEGREE Time to Degree and Extensions The Board of Trustees stipulates that all degree requirements must be completed within a defined span of years starting from the date of matriculation into the degree program, regardless of whether students are full time or part time. This span is 5 years for the master's degree and 9 years for the doctoral degree. Under extenuating circumstances, a program may petition, on 30 behalf of the student, for extension of the time limit for attaining the degree. Prior to the program petitioning the Graduate College for an extension, the student must communicate with the student’s program advisor and/or director to review the student’s degree completion to date and form a plan for degree completion. All this information should be included in a petition submitted to the Graduate College, which will review this petition and make a final decision. Students who have not completed degree requirements by their time-to-degree limit are on inactive status regardless of course registration in each academic year. Such students are required to apply for an extension of their time-to-degree. Reinstatements Students who have not been registered for at least one graduate credit hour at UC that contributes to degree requirements (as determined by the graduate program) in an academic year (fall-summer) are considered inactive. Reinstatements are available to students who have been inactive for less than three academic years. Students who have not been enrolled for any credits in their graduate program for three or more consecutive academic years are not eligible for reinstatement and must apply for readmission to the university. (See Readmission.) Readmission is processed via the reinstatement petition in Gradtracker. Applications submitted by the student via the admissions system will not be accepted. To request reinstatement, a program must petition the Graduate College on behalf of the student. Prior to the program petitioning the Graduate College for a reinstatement, the student must communicate with the student’s program advisor and/or director to review the student’s degree completion to date and form a plan for degree completion. The program coordinator, director or advisor will begin the reinstatement process in Gradtracker. The originator of the petition in Gradtracker will upload documents in one pdf to include degree completion information to date and a written plan for degree completion. The Graduate College will review the packet and if approved the student will also need to approve the petition and fee. If a student wishes to be reinstated so they can register and take classes, reinstatement petitions must be submitted in Gradtracker prior to the start of the first day of the term to be eligible for reinstatement in that term. Petitions received before the census date (the 15th calendar day of the term), the term may be considered for the current term. Petitions received after the census date will be considered for the following term. If a student wishes to be reinstated so they can graduate without taking any further classes, petitions for reinstatement (and extensions) must be submitted in Gradtracker no later than 3 weeks prior to graduation for the student to be certified for graduation in that semester. Petitions received after this time will not be approved in time for graduation that same semester. Late petitions will be held through the next processing period and a decision will be granted in time for the next graduation. A reinstatement fee equal to the current tuition for one graduate credit for each of the unregistered years up to a maximum of 3 years is assessed. The reinstatement fee will be added to the student’s bursar account and will become part of the student bill. Reinstatement fees are due 30 days after formal approval unless a payment plan is agreed to with the bursar’s office. If the fee is not paid by the due date, service charges may accrue, a block may be placed on future registrations and/or on the release of UC diplomas and official transcripts, and the account may be sent to collections. 31 Readmission Graduate students who have been inactive (not enrolled in their program) for three or more academic years are not eligible for reinstatement and must apply for readmission to the university. Readmission does not change the student’s original entry date. Time to degree will be calculated from the student’s first entry date. The program may petition the Graduate College on behalf of the student for readmission. Additionally, if the student has exceeded time to degree limits, the program should also petition for an extension with the readmission to specify the term in which the student will graduate. The readmission process is an opportunity for the program to carefully consider the former student’s progress and length of time between the student’s inception into the program and completion of remaining requirements. This may result in readmission, readmission with conditions, or denial of readmission. Prior to the program petitioning for a readmission, the student must communicate with the student’s program advisor and/or director to review the student’s degree completion to date and form a written plan for completing remaining degree requirements and removing any standing impediments to graduation, including any I/F, F, NG grades and courses required for graduation. This plan should include a timeline that describes the student's progress toward degree completion to date. The program coordinator, director or advisor will begin the readmission process in Gradtracker and will upload documents in one pdf to include degree completion information to date and a written plan for degree completion. The Graduate College will review the packet and if approved, the student will need to approve the petition and fee as well. Upon approval, the student must pay a readmission fee equivalent to in-state tuition in effect at the time of readmission for three graduate credits. The student will also be asked to complete, sign, and return the supplemental form for residency requirements to the Registrar’s office. Leaves of Absence Under special circumstances, graduate students may apply for leave of absence from formal study at the university for a specific period up to one year. Assuming appropriate documentation is provided, the circumstances justifying a leave include but are not limited to personal or family medical conditions, call to active military duty, parental leave, or death in immediate family. The rationale must be documented by the applicant. An approved leave of absence preserves the student’s status in the degree program, and the time off will not be counted against the time limits for awarding degrees. Consequently, registration is not required during the leave period. A leave may be renewed past the first year, for up to a maximum of five years, depending on the individual circumstances. Renewal of a leave is subject to the approval of the program, college, and the Graduate College. While the Graduate College leave of absence is only necessary for students who will be unable to register for a full academic year, programs may have more strict and specific registration policies and leave of absence policies. Students should also consult their program handbook if there is a legitimate need not to register for any amount of time. 32 To apply for a leave of absence, a student must complete the Request for Leave of Absence Form and upload the appropriate documentation (e.g., doctor’s letter or military orders) through Gradtracker. The program will approve through Gradtracker as well. Once the program has approved the request, the Graduate College will review the petition and if approved, the student and program will receive an email notification through their UC email. Note: A student on a leave of absence is placed on inactive status and their Catalyst record is discontinued, to be reactivated upon their return. While on inactive status, they will not be eligible for student health insurance and may be unable to use many UC resources. Students with financial aid or student loans should confer with the Financial Aid Office prior to requesting a leave of absence to ascertain the consequences of a leave on their loan status. Students should also be aware that any scholarships or assistantships are not guaranteed to be available when a student returns from a leave of absence. Withdrawal from Program Students must notify their program in writing and copy the Graduate Admissions Program Manager regarding their intent to withdraw from their programs. Dismissal from Program Students must consult with individual programs concerning dismissal policies. If a program dismisses a student, the program must copy the Graduate Admissions Program Manager on the notification to the student. 33 MASTER’S DEGREE POLICIES AND PROCEDURES COURSE OF STUDY The course of study for the master’s degree is planned with the advisor and is subject to approval by the program graduate committee or its equivalent. It must show a reasonable degree of concentration on interrelated subjects. Programs will recommend students for degrees only after students have developed and demonstrated the necessary knowledge and skills and have fulfilled all other university requirements. At least once an academic year, the graduate program director or the graduate student’s advisor shall inform the student in writing of their academic progress in the master’s degree program. An annual Academic Progress Report or some other form of formal evaluation of progress is required throughout each student’s program. Students must take a minimum of one graduate credit that contributes to degree requirements (as determined by the graduate program) per academic year (fall-summer) to maintain active status. If a student does not maintain active status, they may apply for reinstatement within three years or apply for readmission to their program thereafter. There are fees associated with these steps. (See Maintaining Graduate Student Status, Reinstatements and Readmission.) CREDIT HOUR REQUIREMENTS The University of Cincinnati is on a semester system. Although qualification for the master’s degree is not based exclusively upon the completion of a definite number of hours of course work, the satisfactorily completed graduate work must consist of the equivalent of a minimum of one academic year of full-time graduate study consisting of at least 30 graduate semester credit hours, including any thesis or capstone project. Credits earned in professional law or medicine programs are not applicable to the 30-credit minimum. CANDIDACY There is no formal candidacy status for the master’s degree. However, some programs do have defense requirements, so each student should confer with their advisor or program director to ascertain the requirements of their specific program. CULMINATING EXPERIENCE: THESES and CAPSTONES Every degree requires a culminating experience that is designed to integrate and apply the knowledge and learning gained from the curriculum, and demonstrate mastery of the subject matter in the degree. A master’s thesis is required by some programs, and a master’s capstone project/experience is required in others. Each master’s degree student undergoes an individual evaluation process at the end of their program. Thesis Preparation, Evaluation and Submission Process Preparation of a thesis demonstrates the student’s ability to communicate and to evaluate critically. Information about preparing an electronic thesis is available on the Graduate College 34 website. The student should consult with their program office for additional forms required other than what appears on the graduation checklist. A student must note any relevant deadlines defined by their program, and work with their program leadership to form a thesis committee composed of at least two UC faculty members, at least one of whom must be a member of the university graduate faculty. The thesis committee can guide the student in their exploration of the topic of the master’s thesis, and is responsible for final evaluation of the thesis. The student must submit the completed thesis to the thesis committee for critical evaluation, by the deadline required by the program or their thesis committee. Students who have written a thesis are expected by the Graduate College per their program requirements to make a public announcement of their thesis defense, including time, date, and title of the public presentation. The format for thesis evaluation is decided by the academic unit offering the graduate degree. Faculty with emerit status may remain on the committee if they were members when the proposal was accepted and were full-time tenured, university graduate faculty. A faculty member originally on a student’s committee who leaves UC to take an academic position elsewhere may also continue to serve on the student’s committee if both the faculty member and the student agree to continue the relationship. However, neither an emerit professor nor a faculty member from another institution may serve as chair of the committee, since they are no longer eligible to be university graduate faculty. Once a thesis has been approved by their committee, the candidate for the master’s degree must submit an electronic thesis by following the current instructions online at the Graduate Collge's Graduation page. Be careful to adhere to any deadlines for submission, or graduation will be delayed. Capstone Process Master’s students who are not required to complete a thesis should consult their academic programs about the requirements and procedures for the capstone experience in their programs. In some programs, the final capstone event may be in the form of a comprehensive exam or research project; in others, the final evaluation may appropriately be a recital, performance, or exhibition. The specific nature of the final evaluation is determined by the academic unit offering the master’s degree program, but it must include evaluation by full-time faculty at the University of Cincinnati. If questioned, the appropriateness of a final evaluation will be decided by the University Graduate Council. GRADUATION One semester prior to the semester in which a student anticipates graduating, the student should: • confer with their program office staff; • consult the Graduate College’s website for deadlines, instructions on submitting their electronic thesis; • visit the Graduate Collge’s website to determine if they are defined as a thesis or non- thesis student, or consult with their program; and • talk to advisor about whether an embargo is needed. 35 Application to Graduate Students must: (1) complete academic requirements and (2) complete the official online Application to Graduate by the deadline for the semester in which they expect to graduate. NOTE: for all graduate students, the application for graduation is started at the Graduation page, and not within Catalyst. Start an application for graduation early in the semester you plan to graduate. Deadlines posted on the Graduation Deadlines page are firm and failure to meet them will delay students’ graduation until the following semester, when they must then submit a new application for their revised graduation date. A student graduating from a dual degree program must make a formal application for graduation for each program (see details in next section). All students applying to graduate will be assessed a non-refundable graduation application fee. The fee will be assessed each semester a student applies for graduation. Students who have applied for graduation and learn later they will not be graduating must be removed from the graduation list before they can apply again for any future semesters (programs must notify the Graduation Program Manager to remove a student). When the application for graduation is complete, the student receives an email receipt for payment of the graduation application from the registrar’s office. If this receipt is not received, promptly notify your program, as your graduation application may not be completed. Some PhD programs incorporate a master’s degree. Students should contact their program for help in adding this additional degree. Graduation from Dual Degree Programs The online Application to Graduate will allow a student to apply for graduation from both degree programs in an official dual degree program. Each of the two programs must follow and complete the certification processes and procedures necessary to facilitate a student’s graduation from their own program. In dual degree programs, students must be registered for at least one graduate credit that contributes to degree requirements in one of the two programs (as determined by the program) during the academic year in which they graduate with their dual degrees. Certification for Graduation (Certify Online) The finalization and submission of a student’s Application to Graduate will activate the process by which the student will be certified for graduation, and the following requirements must be met. The student should confer with their program office one-two weeks after the application period has ended to assure that any problems related to these requirements (reinstatements/ extensions, or grade changes) are resolved in a timely manner and avoid delay of graduation until a subsequent semester. Specifically, the student’s records will be reviewed to verify satisfaction of the following requirements: • finalization and submission of their online Graduation Application by the deadline; 36 • instructor’s submission of passing grades for their final semester credits; • removal of all I grades from their transcript; • removal of all UP/SP grades from unapproved courses and/or the final semester in the approved courses were taken; • assignment of letter grades rather than UP/SP grades for courses in the final semester of the student’s program; • removal of previously awarded NG grades and blank grade awards; • confirmation of satisfactory repetition or waiver of required courses in which an F was originally received; • confirmation of completion of work and changes of I grades within the one-year limit; • confirmation that the student was registered for at least one credit in their graduate program in each academic year, including the year of expected graduation; • confirmation that the student completed degree requirements within the prescribed time- to-degree; • satisfactory completion of at least 30 graduate credits completed to the satisfaction of the student’s program; • completion of all program requirements for the degree; • 3.000 GPA has been earned while a matriculated graduate student in the program; • if a thesis is required, upload the electronic thesis (ETD) with chair approval by the deadline date, which is posted on the Graduation Deadlines website. Note: The requirements explained here are university requirements. Students must contact their program’s office for any additional program-level requirements or deadlines that must be completed prior to graduation. Please see the Doctoral Hooding and Master’s Recognition Ceremony section for details on the event. CONTINUING TO A DOCTORAL PROGRAM For a UC master’s student continuing to a doctoral program in the same program area, the student will fill out the application in the graduate admissions application system, and the graduate application fee is waived. 37 DOCTORAL DEGREE POLICIES AND PROCEDURES COURSE OF STUDY The course of study for the doctoral degree is arranged with each student by their advisor and reviewed by the program’s graduate committee or its equivalent. The program should provide a concentration and breadth of study for the student to develop competence in research, scholarship, teaching, and professional performance in general, with knowledge of their chosen specialty in relation to allied branches of learning. A written assessment of performance for each doctoral student is required at the end of their first year; an annual Academic Progress Report or some other form of formal evaluation of progress is required throughout each student’s program. CREDIT HOUR REQUIREMENTS The doctoral degree will be granted for no less than the equivalent of three years of full-time graduate study. Individual program requirements vary, but eligibility for graduation typically requires a minimum of 90 graduate credits beyond the bachelor’s degree. Doctoral students with a prior master’s degree may petition their program to allow up to 30 transfer credits from the master’s degree towards their doctoral degree. Degree credits must include at least 7 hours in dissertation research. Some program credit requirements may be higher. The last 30 credits must be completed under the direction of University of Cincinnati graduate faculty. The degree will not be granted solely on the basis of the accumulation of the required number of credits. A program will recommend students for degrees only after they have developed the necessary intellectual maturity and have fulfilled all other requirements of the program and the university. RESIDENCY AS FULL-TIME STUDENT Prior to admission to doctoral candidacy, all doctoral students shall complete a residency requirement by enrolling in 10 graduate credit hours (12 if funded by a Graduate Assistantship) per semester for two out of three consecutive semesters of study (including summer). Part-time students are not exempt from enrollment requirements to achieve residency. However, full-time UC employees using their tuition remission benefit to complete a part-time doctoral program may request a waiver of this requirement from the Associate Dean of the Graduate College. CANDIDACY, QUALIFYING EXAM The Graduate College does not currently track time to candidacy, but encourages programs to implement candidacy exams early in their programs to allow the students optimal feedback on their aspirations and research. Doctoral students are required to complete a program certification process according to the program’s established standards. The student must have at least a 3.000 grade point average in doctoral coursework and fulfill all other pre-candidacy requirements specified by the doctoral program in which the student is enrolled. Upon completion of these requirements, the student will receive a formal letter from the Graduate College informing the student of admission to candidacy. 38 UNIVERSITY GRADUATE FACULTY ROLE In accordance with the university’s Board of Trustees’ rule (50-77-11) (B) (2), only university graduate faculty are permitted to chair thesis or dissertation committees. The Graduate College appropriately identifies members of the university graduate faculty. Faculty members are nominated for graduate-faculty status by the program most closely aligned with the academic unit holding their primary academic appointment, and with the approval of their college dean or associate dean in charge of graduate education (from whom the nomination should arrive to the Graduate College). Faculty members holding any type of faculty appointment may be eligible for college-initiated nomination to the graduate faculty, the decision to be made based on an evaluation of the individual curriculum vitae and research and creative profile of the nominee. Criteria for nomination are formulated by individual programs and used by the Graduate College in adjudication. DISSERTATION Each PhD and EdD student must produce and defend a dissertation showing high scholarly achievement based on their original research. The student is required to submit an electronic document as evidence of this research. Students in all other doctoral programs should consult their academic programs regarding requirements and procedures for the capstone experience required in their programs. Dissertation Advisor and Committee When the student has been admitted into doctoral candidacy and has selected a dissertation subject and dissertation advisor, a dissertation committee should be appointed as soon as possible. The dissertation advisor must be qualified to serve as the chair of the dissertation committee, meaning this faculty member must be a member of the university graduate faculty and all members of the committee will be appointed by the Graduate College upon recommendation of the program director or director of graduate studies (in consultation with the committee chair and student). Students have the right to request a change in the committee but must do so in consultation with the graduate program director and their program must make the change in GradTracker. Preferably, the dissertation committee will include at least one person from outside the program, who might be faculty from the University of Cincinnati or another institution. A dissertation committee must be composed of a minimum of three UC faculty members. Members of the university graduate faculty are eligible to serve on all thesis and dissertation committees. In addition, all tenured and tenure-track faculty members may serve on all thesis and dissertation committees (even if they are not members of the university graduate faculty, meaning they may not serve in the chair role and cannot act as primary advisors). Other types of UC faculty members may serve on committees if the appointing unit demonstrates that their expertise is beneficial for the dissertation project. Programs should make such requests to the Graduate College in advance, to be ascertained on a case-by-case basis. Neither an emerit faculty member nor a faculty member from another institution may serve as the chair of the committee. Emerit faculty may remain on the committee if they were members when the proposal was accepted. A faculty member originally on a student’s committee who leaves UC to take an academic position elsewhere may also continue to serve on the student’s committee if both the faculty member and the student agree to continue the relationship. If a non-UC faculty member or appropriate professional practitioner has special expertise in a dissertation topic, 39 such a person may be added to the dissertation committee if they are nominated by the candidate and approved by both the chairperson of the dissertation committee, the director of graduate studies for the academic unit involved and the Graduate College. All such individuals serve as a full voting member of the dissertation committee without compensation from either the university or the candidate and would serve in addition to the minimum number of three qualified full-time UC faculty. A copy of the completed dissertation must be submitted to each committee member for critical evaluation, with sufficient time for review as determined by the dissertation committee. If it is considered satisfactory with respect to form and content by the committee, a final defense of the dissertation can be scheduled. Final Defense of Dissertation Students should check with their program office for the final deadline for their dissertation defense. The student’s final defense of the dissertation will be open to the public and all members of the academic community. Students are required to enter details of their dissertation defense, such as time, date, and location, online at the Graduate College website through the Graduation checklist steps. Begin at the Graduation webpage. One can also browse scheduled dissertation defenses by visiting the Upcoming Dissertation Defenses page. The candidate answers questions posed by members of the committee and other members of the audience following an oral presentation of their dissertation. At the conclusion of the defense, the committee will withdraw, make a decision with regard to the acceptability of the dissertation and its defense, and report its decision to the candidate. At least ¾ of the voting members of the dissertation committee (including at least one representative of each major area involved, in the case of interdisciplinary programs) must approve the dissertation. When the student’s dissertation committee chair has approved a defense, the student should assure that they have met all requirements for graduation including those in the graduation information obtained online. Use of a Moderator Although an outside moderator is not required, a moderator may be assigned by the Graduate College dean upon the request of the candidate, the chairperson of the dissertation committee, or the person empowered to approve the composition of a dissertation committee (the director of graduate studies for the academic unit involved). Moderators should be members of the university graduate faculty from outside the academic unit involved. The duties of the moderator are limited to observing the oral defense of the dissertation and reporting in writing to the Graduate College dean on the academic propriety of the proceedings. Submission of Dissertation After a dissertation has been approved, the candidate for the doctoral degree must submit their electronic dissertation by following the current instructions found at the Electronic Thesis and Dissertation Information webpage. Students in all other doctoral programs should consult their academic programs for the capstone experience required in their programs. Deadlines are posted at the Graduation Deadlines page. • All thesis/dissertations must be electronically submitted by the student and approved by the advisor. Students log in via the link available on the Graduation webpage. 40 • Advisors are sent an email when the student submits for their approval, and the advisor then logs in to review/approve. • Once approved by the chair, the student is notified by email. • A Graduate College approval email is sent to the student once reviewed. • The program is copied on all email correspondence during the Electronic Thesis/Dissertation (ETD) approval process. GRADUATION One semester prior to the semester in which a student anticipates graduating, the student should: 1. Confer with their program office staff. 2. Consult the Graduation page on the Graduate College’s website for deadlines, instructions on submitting their electronic dissertation, and doctoral hooding ceremony information. 3. Talk to advisor about whether an embargo is needed. Application to Graduate Students must: (1) complete academic requirements and (2) complete the official online Application to Graduate by the deadline for the semester in which they expect to graduate. Deadlines are firm and failure to meet them will delay students’ graduation until the following semester, when they must then submit a new application for their revised graduation date. All students applying to graduate will be assessed a non-refundable graduation application fee. The fee will be assessed each semester a student applies for graduation. Dual Degree Programs Graduation The online Application to Graduate will allow a student to apply for graduation from both degree programs in a dual degree program. Each of the two programs must follow the certification processes and procedures necessary to facilitate the student’s graduation from their own program. In dual degree programs, students must be registered for at least one graduate credit that contributes to degree requirements in one of the two programs (as determined by the program) during the academic year in which they graduate with dual degrees. Graduation Requirements for Doctoral Degrees Students must be registered for at least one graduate credit that contributes to degree requirements (as determined by the graduate program) during the academic year in which they graduate from that program. Doctoral students must also complete degree requirements within a nine-year period unless they have an approved extension (see Maintaining Graduate Student Status, Time to Degree). They should contact their program offices for any additional program requirements or deadlines to be completed prior to graduation. Certification for Graduation (Certify Online) Finalization and submission of a student’s Application to Graduate will activate the process by which the student will be certified for graduation, and the following requirements have been met. 41 The student should confer with their program office one-two weeks after the application period has ended to assure that any problems related to these requirements are resolved in a timely manner and avoid delay of graduation until a subsequent semester. Specifically, the student’s records will be reviewed to verify satisfaction of the following requirements: • finalization and submission of their online Application to Graduate by the deadline; • instructor’s submission of passing grades for final semester credits; • removal of all I grades from transcript; • Removal of previously earned NG grades and blank grade awards - removal of all UP/SP grades from unapproved courses and/or the final semester in which the courses were taken; • assignment of letter grades rather than UP/SP grades for courses in the final semester of the student’s program; • confirmation of satisfactory repetition or waiver of required courses in which an F was originally received; • confirmation of completion of work and changes of I grades within the one-year limit; • confirmation that the student was registered for at least one credit in the graduate program in each academic year, including the year of expected graduation; • confirmation that the student reached candidacy and has a valid dissertation committee; • degree requirements completed within prescribed time-to-degree; • satisfactory completion of sufficient graduate credits. In general, doctoral degrees require at least 7 research credits (many programs have higher requirements), within a total of at least 90 graduate credits for students who do not have a prior master’s degree, or require a total of at least 60 credits for students beyond the master’s degree. Please note that individual program credit requirements can vary widely. • completion of all program requirements for the degree; • 3.000 GPA has been earned while matriculated in the graduate program; • if a dissertation is required, upload the electronic dissertation (ETD), following the instructions on the Electronic Thesis and Dissertation Information page, for chair approval by the deadline. Note: The requirements explained here are university requirements. Students must contact their program office for any additional program-level requirements or deadlines that must be completed prior to graduation. GRADUATE CERTIFICATE VERIFICATION FOR UC TRANSCRIPT ENDORSEMENT In order for students to have their UC transcript endorsed with an earned certificate, students must apply for graduation and the program must approve the record through certify online just like the master's or doctoral students. DOCTORAL HOODING AND MASTER’S RECOGNITION CEREMONY Doctoral and master’s students who are graduating or who have graduated during the academic year will receive an invitation from the Dean of the Graduate College to participate in the university’s prestigious Doctoral Hooding and Master’s Recognition Ceremony held each semester. Please visit the commencement ceremony’s website for up-to-date details or 42 the Graduate College’s Graduation webpage. This is a joyous occasion in which students celebrate their accomplishment with family and friends as they are recognized by faculty and university leadership. Doctoral participants will be adorned with their hoods during the ceremony, by either their faculty mentor or the dean of their college. Graduates must confirm their intent to participate by reserving a seat online for the celebratory event and providing current home and email addresses for notification purposes. If you wish to be hooded by your faculty mentor, discuss the date with them to make sure they can attend. 43 INSTITUTIONAL RULES, POLICIES, AND PROCEDURES PROGRAM STANDARDS This Graduate Handbook clarifies minimum university-level requirements and policies that apply to all graduate students throughout the University of Cincinnati. Beyond these, each student is also expected to adhere to requirements, policies, and procedures specific to their own degree program and college. All graduate programs must publish in writing in accessible format the minimum academic standards for each graduate program offered, including the following: • minimum grade point average, including grades earned in required courses; • acceptable grade distribution, including grades earned in required courses; • nature and number of programmatic examinations, such as preliminary or qualifying, and the consequences of failing all or part of each examination; • specified research requirements; • a time-related definition of normal progress for all full- and part-time students; • standards and procedures for the mandatory annual review of academic performance; • standards and procedures for probation, suspension, and dismissal from the program. RECORDS PRIVACY, FERPA, AND THE RIGHT TO REVIEW The Family Educational Rights and Privacy Act of 1974 (FERPA), is the federal law that governs the release of and access to student education records. FERPA affords students certain rights with respect to their education records. For the complete FERPA information, consult the FERPA and Records Privacy page of the Registrar’s Office website. NOTICE OF NON-DISCRIMINATION The University of Cincinnati does not discriminate on the basis of disability, race, color, religion, national origin, ancestry, medical condition, genetic information, marital status, parental status (including status as a foster parent), sex, age, sexual orientation, veteran status, military status (past, present, or future), or gender identity and expression in its programs and activities. The university does not tolerate discrimination, harassment, or retaliation on these bases and takes steps to ensure that students, employees, and third parties are not subject to a hostile environment in university programs or activities. The university responds promptly and effectively to allegations of discrimination, harassment, and retaliation. It promptly conducts investigations and takes appropriate action, including disciplinary action, against individuals found to have violated its policies, as well as provides appropriate remedies to complainants and the campus community. The university takes immediate action to end a hostile environment if one has been created, prevent its recurrence, and remedy the effects of any hostile environment on affected members of the campus community. UC is committed to the ideal of universal Web accessibility and strives to provide an accessible Web presence that enables all university community members and visitors full access to 44 information provided on its websites. Every effort has been made to make these pages as accessible as possible in accordance with the applicable guidelines. The University of Cincinnati provides free aids and services to people with disabilities to communicate effectively with us, such as qualified sign language interpreters and written information in other formats (large print, audio, accessible electronic formats, other formats). The University of Cincinnati also provides free language services to people whose primary language is not English, such as qualified interpreters (call 513-556-5503) and information written in other languages. If you need these services, please tell any employee of a University of Cincinnati health program or activity. If you believe that the University of Cincinnati has failed to provide these services or discriminated in another way, you can file a grievance with the Office of Equal Opportunity and Access and/or Office of Gender Equity & Inclusion. You can file a grievance in person, by mail or by email. If you need help filing a grievance, the Office of Equal Opportunity & Access and Office of Gender Equity & Inclusion staff are available to help you. ACADEMIC DISHONESTY Academic dishonesty in any form is a serious offense that cannot be tolerated in an academic community. Dishonesty—including cheating, plagiarism, deception of effort, and/or unauthorized assistance—may result in a failing grade in a course and/or suspension or dismissal from the university. Allegations of academic dishonesty will be processed pursuant to the university’s Student Code of Conduct. After graduation, alumni remain responsible for the academic integrity of the work they performed while a student at the University of Cincinnati. If evidence of academic dishonesty or research misconduct is revealed after the graduation of a student, the Office of Research, the Graduate College, and the university can examine whether such concerns impact the academic integrity of the degree that was conferred on the student, with consequences including but not limited to degree revocation. STUDENT CODE OF CONDUCT The Student Code of Conduct defines behavior expected of all University of Cincinnati students. It is each student’s responsibility to know and comply with the university’s Student Code of Conduct, and sanctions or penalties are outlined. Academic behavior considered to be misconduct is defined in the Student Code of Conduct. The code also addresses nonacademic misconduct (such as disturbing the peace, destruction of property, and theft). Disciplinary procedures are explained in a step-by-step manner, and the procedures for appeal of decisions are stated. In addition to this code, students must adhere to their college’s professional code of conduct and honor codes where applicable. Students should contact the office of the dean for their college to inquire about any applicable conduct and honor codes to ensure compliance. Students can be suspended or dismissed from the university for unprofessional behavior. 45 RESPONSIBLE CONDUCT OF RESEARCH Furthering of research is a major institutional goal of the University of Cincinnati. Research includes not only intellectual activity and exploration designed to expand knowledge and understanding, but also activities in the creative and performing arts designed to interpret and create. Such activities require responsibilities for the ethical and safe conduct of research. Individuals charged with supervision of research, as well as all individuals directly engaged in it, and collaborators of investigators outside their own units are responsible for the quality of the data generated in their own laboratories as well as the laboratories of their collaborators. Everyone shares responsibility for the physical safety and intellectual property of individuals in the responsible conduct of creative scholarship and research. RESTRICTED RESEARCH The right to open exchange of information and opinion in faculty relations with students carries the obligation to avoid comments or violations of confidentiality that would reduce free expression or inquiry by students. Student involvement in industrial proprietary projects should be permitted only when these projects in no way restrict the student’s ability to fulfill their degree requirements, which includes the obligation to publish dissertation results. Faculty members have the right to publish their research findings and the right to protection against retaliation because of displeasure over their conclusions by the public, administration, government, or others. They have the concomitant responsibility to refrain from conducting secret, non-publishable research as part of their university duties. GRADUATE STUDENT GRIEVANCE PROCEDURES The University of Cincinnati provides an opportunity for the resolution of disputes involving graduate students in a fair and collegial manner. The Graduate Student Grievance Procedures establish a formal academic process for graduate students to request review and redress of certain complaints arising out of their academic relationships with their programs, their colleges, or the university. The grievance begins with a mediation process and may proceed, if necessary, through the more formal review and decision or appeal processes. In general, however, it is expected that grievances will be resolved by the parties within their programs. Students are encouraged to seek assistance from the university Ombuds Office for possible resolution before initiating the formal grievance process. Students, faculty and staff should note that Grievance Procedures are not legal protocols. They are, however, effective means by which to resolve conflicts. The Graduate College endorses these procedures and expects all programs and students involved to follow them according to the established guidelines. No outside parties, such as lawyers, ministers, and family members, are allowed to participate in or impose upon the procedures. The Graduate Student Grievance Procedures cannot supplant final sanctions stemming from the University of Cincinnati Student Code of Conduct process. There is a time limit to filing a grievance: it must be filed within 60-90 business days of the alleged improper mistreatment. The procedures are applicable to the following types of grievances: • grievances alleging improper dismissal or suspension from a graduate program, not as a result of the Student Code of Conduct process; • grievances alleging the improper withholding or termination of financial support of any kind; 46 • grievances alleging any other improper treatment, either substantive or procedural, of a graduate student by a university employee or university affiliate except: o allegations of improper evaluation of the quality and/or quantity of academic work, which a student cannot grieve; o allegations of unfair recommendation for employment or further graduate study, which a student cannot grieve; o allegations of discrimination or harassment that are subject to review by the Office of Equal Opportunity and Access or the Office of Gender, Equity and Inclusion. Published November 28, 2023. This version is an update to the 2022-23 AY handbook to reflect changes to the Graduate Scholarship structure and terminology. This version supersedes all previous versions. 47
Answer solely based on the provided text, do not give any additional information or analysis beyond that which is provided in the text. Give your answer in the form of two lists of bullet points.
What are the arguments for and against the Bill?
The new British Ambassador to the United States, prior to his departure for Washington, perhaps with the idea of propitiating Irish opinion in America, elected to speak on St. Patrick's Day. He wore a green Irish halo for the occasion. He said it had been a labor of love for him during last summer and autumn to assist in reducing to legislative form proposals for ending the Irish question. He said the new Bill for the government of Ireland was "a sincere attempt to place definitely and finally in the hands of the elected representatives of the Irish people the duty and responsibility of working out their own salvation and the salvation of their country." No doubt this statement has been cabled to America, and I propose to examine here how far this statement is justified and how Ireland is indebted to Sir Auckland Geddes for his interest in its welfare. I lay this down as a fundamental proposition, which I do not think will be denied, that whoever controls the taxation and trade policy of a country controls its destiny and the entire character of its civilization. The body with control over customs, excise, income tax, supertax, excess profits duty and external trade has it in its power to make that country predominantly industrial or agricultural or to make a balance between urban and rural interests. It can direct the external trade of the country, make it flow into this or that channel. These powers over Irish taxation and trade policy are expressly denied to Ireland. Ireland in fact has less power under this last Bill over its own economic development than it had under the Act of Union. Under that Act, Ireland had one hundred and two members in the Imperial Parliament who could at times hold the balance of power. It was not a very real power, because when the interests of Ireland and Great Britain conflicted, both parties in Great Britain united against Ireland, but still to the leaders of parties Irish votes were worth angling for, for British purposes, and had to be paid for by Land Acts or other measures. The new Bill provides that the Irish representation at Westminster shall be reduced to forty-two members, and so at Westminster Ireland is made practically powerless, while everything which really affects Irish economic interests is still legislated for by the British Parliament.
What are the arguments for and against the Bill? Answer solely based on the provided text, do not give any additional information or analysis beyond that which is provided in the text. Give your answer in the form of two lists of bullet points. "The new British Ambassador to the United States, prior to his departure for Washington, perhaps with the idea of propitiating Irish opinion in America, elected to speak on St. Patrick's Day. He wore a green Irish halo for the occasion. He said it had been a labor of love for him during last summer and autumn to assist in reducing to legislative form proposals for ending the Irish question. He said the new Bill for the government of Ireland was "a sincere attempt to place definitely and finally in the hands of the elected representatives of the Irish people the duty and responsibility of working out their own salvation and the salvation of their country." No doubt this statement has been cabled to America, and I propose to examine here how far this statement is justified and how Ireland is indebted to Sir Auckland Geddes for his interest in its welfare. I lay this down as a fundamental proposition, which I do not think will be denied, that whoever controls the taxation and trade policy of a country controls its destiny and the entire character of its civilization. The body with control over customs, excise, income tax, supertax, excess profits duty and external trade has it in its power to make that country predominantly industrial or agricultural or to make a balance between urban and rural interests. It can direct the external trade of the country, make it flow into this or that channel. These powers over Irish taxation and trade policy are expressly denied to Ireland. Ireland in fact has less power under this last Bill over its own economic development than it had under the Act of Union. Under that Act, Ireland had one hundred and two members in the Imperial Parliament who could at times hold the balance of power. It was not a very real power, because when the interests of Ireland and Great Britain conflicted, both parties in Great Britain united against Ireland, but still to the leaders of parties Irish votes were worth angling for, for British purposes, and had to be paid for by Land Acts or other measures. The new Bill provides that the Irish representation at Westminster shall be reduced to forty-two members, and so at Westminster Ireland is made practically powerless, while everything which really affects Irish economic interests is still legislated for by the British Parliament."
{instruction} ========== In your answer, refer only to the context document. Do not employ any outside knowledge {question} ========== [user request] {passage 0} ========== [context document]
Can you summarize in 6-8 sentences how this paper suggests how to properly price AI stocks and what is so different about it compared to current strategies? Do not use the word AI or any other phrase that refers to Artificial Intelligence.
Artificial Intelligence (AI) is having a powerful impact in the domain of finance. Estimates of the 10-year revenue figure vary but could be as high as $3 trillion. Over a similar period, the market value of AI firms is expected to grow at a 37% rate. Although the opportunities seem boundless, valuations conducted in the financial markets are increasingly complex to carry out for AI/tech stocks. Artificial Intelligence in Finance: Valuations and Opportunities Yosef Bonaparte Finance Research Letters A version of this paper can be found here Want to read our summaries of academic finance papers? Check out our Academic Research Insight category. What are the research questions? While there is literature that describes the “domain” of artificial intelligence, there are very few, if any, that analyze the valuation and pricing of AI stocks. The authors attempt to fill the void with a two-part methodology. What are Academic Insights? The methodology combines behavioral and fundamental components. The fundamental model incorporates new AI innovation into the P/E ratio and R&D as a percentage of revenue. FUNDAMENTAL: The key is to estimate future revenue as a function of the exposure of the stock to AI technology. The author uses Nvidia as an example of an overpriced (yes, overpriced!) stock in June 2023 via fundamentals as follows: The results are hypothetical results and are NOT an indicator of future results and do NOT represent returns that any investor actually attained. Indexes are unmanaged and do not reflect management or trading fees, and one cannot invest directly in an index. 2. BEHAVIORAL: The behavioral component is based on a technology sentiment index, using the Google trend of key technological terms. The key issue is to determine how the stock relates to AI technology. In the Nvidia case, the correlation between the Google Trend Index and Nvidia’s price acts as an estimate of how embedded the stock is to AI tech. Terms include: artificial intelligence, neural network, large language model, machine learning, generative AI, and deep learning. See Tables 1 and 2 below for estimates of the correlation for Nvidia over 2 separate time -periods. The estimate of AI sensitivity is found in Table 3. For Nvidia, the sum of artificial intelligence searches is 17.5% (from Table 1: 683 divided by total searches at 3904) and 35.2% when weighted across search terms. Nvidia has substantial exposure to AI terms, however, the exposure is less than the exposure of MSFT and GOOG. The same methodology can be used on other stocks to determine sensitivity to the AI opportunity. Why does it matter? The authors identified three key areas of knowledge an investor or analyst should acquire to understand how AI is transforming the financial landscape. First, develop a thorough understanding of the AI concept in terms of innovation and relevance to finance. Second, develop the methodologies for assessing AI companies and tech investment funds. Third, focus on the industry leaders in AI to provide context and provoke an examination of the future of AI. How will it influence the capital markets, how and what will drive growth in sales, and ultimately, how will valuations be influenced? The most important chart from the paper The results are hypothetical results and are NOT an indicator of future results and do NOT represent returns that any investor actually attained. Indexes are unmanaged and do not reflect management or trading fees, and one cannot invest directly in an index.
{instruction} ========== In your answer, refer only to the context document. Do not employ any outside knowledge {question} ========== Can you summarize in 6-8 sentences how this paper suggests how to properly price AI stocks and what is so different about it compared to current strategies? Do not use the word AI or any other phrase that refers to Artificial Intelligence. {passage 0} ========== Artificial Intelligence (AI) is having a powerful impact in the domain of finance. Estimates of the 10-year revenue figure vary but could be as high as $3 trillion. Over a similar period, the market value of AI firms is expected to grow at a 37% rate. Although the opportunities seem boundless, valuations conducted in the financial markets are increasingly complex to carry out for AI/tech stocks. Artificial Intelligence in Finance: Valuations and Opportunities Yosef Bonaparte Finance Research Letters A version of this paper can be found here Want to read our summaries of academic finance papers? Check out our Academic Research Insight category. What are the research questions? While there is literature that describes the “domain” of artificial intelligence, there are very few, if any, that analyze the valuation and pricing of AI stocks. The authors attempt to fill the void with a two-part methodology. What are Academic Insights? The methodology combines behavioral and fundamental components. The fundamental model incorporates new AI innovation into the P/E ratio and R&D as a percentage of revenue. FUNDAMENTAL: The key is to estimate future revenue as a function of the exposure of the stock to AI technology. The author uses Nvidia as an example of an overpriced (yes, overpriced!) stock in June 2023 via fundamentals as follows: The results are hypothetical results and are NOT an indicator of future results and do NOT represent returns that any investor actually attained. Indexes are unmanaged and do not reflect management or trading fees, and one cannot invest directly in an index. 2. BEHAVIORAL: The behavioral component is based on a technology sentiment index, using the Google trend of key technological terms. The key issue is to determine how the stock relates to AI technology. In the Nvidia case, the correlation between the Google Trend Index and Nvidia’s price acts as an estimate of how embedded the stock is to AI tech. Terms include: artificial intelligence, neural network, large language model, machine learning, generative AI, and deep learning. See Tables 1 and 2 below for estimates of the correlation for Nvidia over 2 separate time -periods. The estimate of AI sensitivity is found in Table 3. For Nvidia, the sum of artificial intelligence searches is 17.5% (from Table 1: 683 divided by total searches at 3904) and 35.2% when weighted across search terms. Nvidia has substantial exposure to AI terms, however, the exposure is less than the exposure of MSFT and GOOG. The same methodology can be used on other stocks to determine sensitivity to the AI opportunity. Why does it matter? The authors identified three key areas of knowledge an investor or analyst should acquire to understand how AI is transforming the financial landscape. First, develop a thorough understanding of the AI concept in terms of innovation and relevance to finance. Second, develop the methodologies for assessing AI companies and tech investment funds. Third, focus on the industry leaders in AI to provide context and provoke an examination of the future of AI. How will it influence the capital markets, how and what will drive growth in sales, and ultimately, how will valuations be influenced? The most important chart from the paper The results are hypothetical results and are NOT an indicator of future results and do NOT represent returns that any investor actually attained. Indexes are unmanaged and do not reflect management or trading fees, and one cannot invest directly in an index. https://alphaarchitect.com/2024/04/valuing-artificial-intelligence-ai-stocks/
"================ <TEXT PASSAGE> ======= [context document] ================ <QUESTION> ======= [user request] ================ <TASK> ======= You are an expert in question answering. Your task is to reply to a query or question, based only on the information provided by the user. It should only use information in the article provided."
What are the most common ways to save money for the Halloween season? Make the response less than 500 words but more than 300 words.
Americans love Halloween. What other night can you dress like a hot dog and eat all your favorite sweets? But the problem is, we may love it a little too much. This year, Americans plan to spend around $10.6 billion—that’s billion with a B—on Halloween.1 That’s about $100 per person! If you’re tight on cash, spending that much might sound scary. But the good news is: You don’t have to spend a zombie arm and a leg to have a good time. Try these seven tricks to stick to your Halloween budget. 1. Costumes One of my favorite parts of Halloween is the costumes, hands down—from seeing adorable babies dressed as koalas to entire families decked out as the Addams Family. But when you start buying costumes for your own family, you realize just how pricey they can get! So, instead of buying a $40 Ninja Turtles costume for each of your four boys or sewing some DIY versions from scratch, turn hunting for costumes into a family game. Here’s how it works: Head to the consignment shop or thrift store with your family and give each of your kids an envelope with $5 or $10 inside. Split up into teams to pick out a costume or find materials to make a custom creation. When time’s up and purchases are made, head home and have the kids dig into their closets for the rest of their costumes. There’s nothing like a happy homemade Halloween! Don’t forget, just like kids grow out of clothes, they also grow out of Halloween costumes. Check with your friends and neighbors to see if they’ll let you borrow a costume this year. You don’t need to drop big money for a brand-new Hulk outfit when little Timmy down the street has one your kid can borrow for the night. 2. Decorations Halloween is a really big deal for some people—and a single pumpkin on the front porch just won’t cut it (especially if you’re easily inspired by fall décor on Instagram and Pinterest). But if you’re not careful, buying Halloween décor year after year can really take a bite out of your budget. Pro tip: If you need to stretch a dollar, hit up your local dollar store for decorations. And if you love going all out for Halloween, start saving and reusing your decorations. Since Halloween is almost as big of a deal as Christmas at your house, prep for it the same way. Instead of throwing away decorations at the end of the season, save some to reuse each year. Store your ghouls and goblins in a reusable tub once the season is over, and pull them out next year. 3. Candy It’s no secret that candy is pricey stuff. But living in a neighborhood that gets carloads of kids every year doesn’t mean you have to buy barrels of candy. If you know you’ll be visited by 50 to 100 princesses and superheroes, skip the fancy chocolate bars and grab a bulk bag of assorted candy instead. Be on the lookout for coupons and any two-for-one deals, but don’t feel like you need to get the brand-name stuff either. Just buy what you can afford, even if that means store brand. Trick-or-treaters get a lot of sugar, so don’t think you’re holding out on them if you buy generic. And when the candy’s gone, it’s gone. Early birds get the gummy worms, and when you’ve run out, you can turn the lights off and relax. And one more tip when it comes to candy—keep track of how many trick-or-treaters visit your house so you can plan for next year. There’s no need to overbuy and get stuck eating all the leftovers (unless that’s what you were hoping for). 4. Pumpkins For something that turns into a pile of moldy mush a few weeks after you buy it, pumpkins sure cost a pretty penny. And they’re kind of like potato chips: You can’t have just one. It can be super tempting to stage 20 pumpkins across our porches, decks and tables. Money Start budgeting with EveryDollar today! Don’t get me wrong—pumpkins are fun. But it’s way too easy to overspend on them. So give yourself a pumpkin budget. Seriously. Let the kids each pick one or cap yourself at $15. That way, you can keep the spending in check. And when you’re ready to buy pumpkins, going to the pumpkin patch is a blast, but not the best place to buy them if you’re on a budget. Instead, buy pumpkins from the grocery store, and look for two-for-one deals that pop up. Because when it all boils down to it, a pumpkin is a pumpkin. 5. Greeting Cards Do people really send out Halloween greeting cards? When was the last time you got a “Have a Batty Halloween” card in your mailbox? Well, nearly 45% of those surveyed by the National Retail Federation in 2021 said they planned to buy Halloween greeting cards, so somebody’s doing it.2 But you can make a spooky greeting card without dropping $6 on a glitter-bomb skeleton card for your favorite niece. Use some cardstock and get creative by drawing all kinds of creepy characters. Don’t forget to tape on a little something sweet too! However, if your heart is set on a store-bought card, look for the two-for-a-dollar kind. And remember, you don’t have to send a card. 6. Fall Activities There are plenty of harvest and Halloween festivals this time of year—and they’re usually free! Plus, there are plenty of other budget-friendly activities for the family. Spend the day walking around a farm or enjoying a hayride. Take a drive out of town to look at the leaves changing colors. Go apple picking or enjoy a fall festival. Take advantage of what’s already going on in your church or community, and budget a little extra for any special food or rides. Festive fall food can really add up if you’re not careful, so save some cash by packing a picnic and a comfy quilt. 7. Family Traditions Pick out a weekend or two for some quality time together with friends or your family this fall. If you’re tired of carving pumpkins or dressing up, why not start some new budget-friendly traditions? How about a fall-themed cooking or baking day? Try caramel apples, pumpkin pie and jack-o’-lantern pizzas (use pepperoni and veggies to make the face). Or have everyone vote for their favorite fall movies, then hunker down on the couch to get cozy and eat all those tasty treats you cooked up while you watch. If you’d rather be outside enjoying the leaves, head over to the park for a scavenger hunt and enjoy the scenery while you search. It’s 100% possible to have a memorable Halloween on a bite-size budget! Trust me, you’ll have more fun knowing you’re not wrecking your money goals to celebrate. Don’t let Halloween haunt your budget—so make sure you know exactly where each dollar is going this season with EveryDollar, our free budget tool.
"================ <TEXT PASSAGE> ======= Americans love Halloween. What other night can you dress like a hot dog and eat all your favorite sweets? But the problem is, we may love it a little too much. This year, Americans plan to spend around $10.6 billion—that’s billion with a B—on Halloween.1 That’s about $100 per person! If you’re tight on cash, spending that much might sound scary. But the good news is: You don’t have to spend a zombie arm and a leg to have a good time. Try these seven tricks to stick to your Halloween budget. 1. Costumes One of my favorite parts of Halloween is the costumes, hands down—from seeing adorable babies dressed as koalas to entire families decked out as the Addams Family. But when you start buying costumes for your own family, you realize just how pricey they can get! So, instead of buying a $40 Ninja Turtles costume for each of your four boys or sewing some DIY versions from scratch, turn hunting for costumes into a family game. Here’s how it works: Head to the consignment shop or thrift store with your family and give each of your kids an envelope with $5 or $10 inside. Split up into teams to pick out a costume or find materials to make a custom creation. When time’s up and purchases are made, head home and have the kids dig into their closets for the rest of their costumes. There’s nothing like a happy homemade Halloween! Don’t forget, just like kids grow out of clothes, they also grow out of Halloween costumes. Check with your friends and neighbors to see if they’ll let you borrow a costume this year. You don’t need to drop big money for a brand-new Hulk outfit when little Timmy down the street has one your kid can borrow for the night. 2. Decorations Halloween is a really big deal for some people—and a single pumpkin on the front porch just won’t cut it (especially if you’re easily inspired by fall décor on Instagram and Pinterest). But if you’re not careful, buying Halloween décor year after year can really take a bite out of your budget. Pro tip: If you need to stretch a dollar, hit up your local dollar store for decorations. And if you love going all out for Halloween, start saving and reusing your decorations. Since Halloween is almost as big of a deal as Christmas at your house, prep for it the same way. Instead of throwing away decorations at the end of the season, save some to reuse each year. Store your ghouls and goblins in a reusable tub once the season is over, and pull them out next year. 3. Candy It’s no secret that candy is pricey stuff. But living in a neighborhood that gets carloads of kids every year doesn’t mean you have to buy barrels of candy. If you know you’ll be visited by 50 to 100 princesses and superheroes, skip the fancy chocolate bars and grab a bulk bag of assorted candy instead. Be on the lookout for coupons and any two-for-one deals, but don’t feel like you need to get the brand-name stuff either. Just buy what you can afford, even if that means store brand. Trick-or-treaters get a lot of sugar, so don’t think you’re holding out on them if you buy generic. And when the candy’s gone, it’s gone. Early birds get the gummy worms, and when you’ve run out, you can turn the lights off and relax. And one more tip when it comes to candy—keep track of how many trick-or-treaters visit your house so you can plan for next year. There’s no need to overbuy and get stuck eating all the leftovers (unless that’s what you were hoping for). 4. Pumpkins For something that turns into a pile of moldy mush a few weeks after you buy it, pumpkins sure cost a pretty penny. And they’re kind of like potato chips: You can’t have just one. It can be super tempting to stage 20 pumpkins across our porches, decks and tables. Money Start budgeting with EveryDollar today! Don’t get me wrong—pumpkins are fun. But it’s way too easy to overspend on them. So give yourself a pumpkin budget. Seriously. Let the kids each pick one or cap yourself at $15. That way, you can keep the spending in check. And when you’re ready to buy pumpkins, going to the pumpkin patch is a blast, but not the best place to buy them if you’re on a budget. Instead, buy pumpkins from the grocery store, and look for two-for-one deals that pop up. Because when it all boils down to it, a pumpkin is a pumpkin. 5. Greeting Cards Do people really send out Halloween greeting cards? When was the last time you got a “Have a Batty Halloween” card in your mailbox? Well, nearly 45% of those surveyed by the National Retail Federation in 2021 said they planned to buy Halloween greeting cards, so somebody’s doing it.2 But you can make a spooky greeting card without dropping $6 on a glitter-bomb skeleton card for your favorite niece. Use some cardstock and get creative by drawing all kinds of creepy characters. Don’t forget to tape on a little something sweet too! However, if your heart is set on a store-bought card, look for the two-for-a-dollar kind. And remember, you don’t have to send a card. 6. Fall Activities There are plenty of harvest and Halloween festivals this time of year—and they’re usually free! Plus, there are plenty of other budget-friendly activities for the family. Spend the day walking around a farm or enjoying a hayride. Take a drive out of town to look at the leaves changing colors. Go apple picking or enjoy a fall festival. Take advantage of what’s already going on in your church or community, and budget a little extra for any special food or rides. Festive fall food can really add up if you’re not careful, so save some cash by packing a picnic and a comfy quilt. 7. Family Traditions Pick out a weekend or two for some quality time together with friends or your family this fall. If you’re tired of carving pumpkins or dressing up, why not start some new budget-friendly traditions? How about a fall-themed cooking or baking day? Try caramel apples, pumpkin pie and jack-o’-lantern pizzas (use pepperoni and veggies to make the face). Or have everyone vote for their favorite fall movies, then hunker down on the couch to get cozy and eat all those tasty treats you cooked up while you watch. If you’d rather be outside enjoying the leaves, head over to the park for a scavenger hunt and enjoy the scenery while you search. It’s 100% possible to have a memorable Halloween on a bite-size budget! Trust me, you’ll have more fun knowing you’re not wrecking your money goals to celebrate. Don’t let Halloween haunt your budget—so make sure you know exactly where each dollar is going this season with EveryDollar, our free budget tool. https://www.ramseysolutions.com/budgeting/5-money-saving-tricks-for-happier-halloween?srsltid=AfmBOoozsyg8q63H1t5yGvb12_1N6lX5_tAKP336LoR7LBOcS-2WYyjc ================ <QUESTION> ======= What are the most common ways to save money for the Halloween season? Make the response less than 500 words but more than 300 words. ================ <TASK> ======= You are an expert in question answering. Your task is to reply to a query or question, based only on the information provided by the user. It should only use information in the article provided."
{instruction} ========== In your answer, refer only to the context document. Do not employ any outside knowledge {question} ========== [user request] {passage 0} ========== [context document]
What are the reasons for why I would choose a cash secured put over a covered call? Compare their advantages and disadvantages assuming I don't have a capital requirement.
What Is a Cash Secured Put? A cash-secured put involves writing a put option on a particular stock and securing the position with enough cash reserves to cover the purchase of shares should the option be exercised. The amount of cash required is equal to 100 shares of the stock at the option’s strike price. If the stock’s price remains above the strike price, the option expires worthless, and the investor keeps the premium. If the stock price drops below the strike price, the investor buys the stock at the lower price. What Is a Covered Call? A covered call is a strategy where an investor owns the underlying stock and sells a call option on it. This involves buying 100 shares of a stock and selling a call option with a strike price at or above the purchase price. If the stock’s price remains flat or declines, the investor keeps the premium, and the option expires worthless. If the stock’s price rises above the strike price, the investor sells the shares at the strike price, securing the option premium plus any capital gains up to the strike price. Cash Secured Put vs Covered Call – The Differences You Should Know Primary Motives: An investor using a cash-secured put has a neutral outlook but is prepared to buy shares at a lower price. A covered call suits an investor who already owns the stock and seeks to earn extra income from the option premium. Market Outlook: Choosing a cash secured put vs covered call requires to consider your outlook on the market (or, at least, on a company). Both trades have definitely a bullish orientation. Possible Profits: Cash-secured put sellers profit only from the option premium. Covered call sellers can profit from both the option premiums and any stock dividends or appreciation if the stock price rises above the strike price. Dividends: When debating cash secured put vs covered call, dividends are an aspect you cannot ignore. Covered calls allow investors to collect dividends since they own the underlying stock. Cash-secured puts do not offer this benefit as the stock is not owned unless the option is exercised. Time Horizon: Usually, a covered call is better for longer term positions, while the cash secured put will work best for shorter term operations, especially considering what we said above about dividends. If you understand these dynamics, you can effectively use cash secured puts to enhance your portfolio, balancing risk and reward based on your market outlook and investment goals. We gave you a rather practical approach to open an options trade, just make sure you do your homework before by carefully researching the company. You can also use our “High probability naked puts (85% prob of worthless, good companies, good risk-return profile)” predefined scan (you’ll find a link to it at the end of the article) to speed up the process, but this does not mean you should skip doing your own analysis. Cash Secured Put vs Covered Call – Picking the Right Strategy in the Right Moment Having seen the two examples above, it is now easier to draw some conclusions on when to use a cash secured put vs covered call strategy. Market Conditions Choosing between covered calls vs cash secured puts often depends on the market conditions. Both strategies benefit from bullish conditions, but a cash-secured put will leave the door open for a potential share assignment at a lower price if the stock price moves below the strike price, while a covered call requires you to buy the shares at once and sell a call right away. By owning the underlying stock, you can capitalize on both the premium from selling the call option and any appreciation in the stock price. In low-volatility markets, both strategies (cash secured put vs covered call) can provide a steady income stream, but understanding the market’s direction can help you select the optimal strategy. Investor Goals Investor goals and risk tolerance are crucial in the decision-making process. If your goal is to invest for the longer term, maybe a covered call will be the wisest choice (think, for instance, about the fact that you can receive a dividend). However, if you’re thinking about a shorter term position, the cash secured put works best. When looking at choosing between covered calls vs cash secured puts, consider that, if you own shares and seek to generate extra income with a bullish outlook, covered calls are a suitable choice. This approach lets you benefit from premiums and potential stock gains. Understanding your investment goals, whether it is acquiring new stocks or maximizing returns on existing holdings, will guide you in choosing between covered calls and cash secured puts.
{instruction} ========== In your answer, refer only to the context document. Do not employ any outside knowledge {question} ========== What are the reasons for why I would choose a cash secured put over a covered call? Compare their advantages and disadvantages assuming I don't have a capital requirement. {passage 0} ========== What Is a Cash Secured Put? A cash-secured put involves writing a put option on a particular stock and securing the position with enough cash reserves to cover the purchase of shares should the option be exercised. The amount of cash required is equal to 100 shares of the stock at the option’s strike price. If the stock’s price remains above the strike price, the option expires worthless, and the investor keeps the premium. If the stock price drops below the strike price, the investor buys the stock at the lower price. What Is a Covered Call? A covered call is a strategy where an investor owns the underlying stock and sells a call option on it. This involves buying 100 shares of a stock and selling a call option with a strike price at or above the purchase price. If the stock’s price remains flat or declines, the investor keeps the premium, and the option expires worthless. If the stock’s price rises above the strike price, the investor sells the shares at the strike price, securing the option premium plus any capital gains up to the strike price. Cash Secured Put vs Covered Call – The Differences You Should Know Primary Motives: An investor using a cash-secured put has a neutral outlook but is prepared to buy shares at a lower price. A covered call suits an investor who already owns the stock and seeks to earn extra income from the option premium. Market Outlook: Choosing a cash secured put vs covered call requires to consider your outlook on the market (or, at least, on a company). Both trades have definitely a bullish orientation. Possible Profits: Cash-secured put sellers profit only from the option premium. Covered call sellers can profit from both the option premiums and any stock dividends or appreciation if the stock price rises above the strike price. Dividends: When debating cash secured put vs covered call, dividends are an aspect you cannot ignore. Covered calls allow investors to collect dividends since they own the underlying stock. Cash-secured puts do not offer this benefit as the stock is not owned unless the option is exercised. Time Horizon: Usually, a covered call is better for longer term positions, while the cash secured put will work best for shorter term operations, especially considering what we said above about dividends. If you understand these dynamics, you can effectively use cash secured puts to enhance your portfolio, balancing risk and reward based on your market outlook and investment goals. We gave you a rather practical approach to open an options trade, just make sure you do your homework before by carefully researching the company. You can also use our “High probability naked puts (85% prob of worthless, good companies, good risk-return profile)” predefined scan (you’ll find a link to it at the end of the article) to speed up the process, but this does not mean you should skip doing your own analysis. Cash Secured Put vs Covered Call – Picking the Right Strategy in the Right Moment Having seen the two examples above, it is now easier to draw some conclusions on when to use a cash secured put vs covered call strategy. Market Conditions Choosing between covered calls vs cash secured puts often depends on the market conditions. Both strategies benefit from bullish conditions, but a cash-secured put will leave the door open for a potential share assignment at a lower price if the stock price moves below the strike price, while a covered call requires you to buy the shares at once and sell a call right away. By owning the underlying stock, you can capitalize on both the premium from selling the call option and any appreciation in the stock price. In low-volatility markets, both strategies (cash secured put vs covered call) can provide a steady income stream, but understanding the market’s direction can help you select the optimal strategy. Investor Goals Investor goals and risk tolerance are crucial in the decision-making process. If your goal is to invest for the longer term, maybe a covered call will be the wisest choice (think, for instance, about the fact that you can receive a dividend). However, if you’re thinking about a shorter term position, the cash secured put works best. When looking at choosing between covered calls vs cash secured puts, consider that, if you own shares and seek to generate extra income with a bullish outlook, covered calls are a suitable choice. This approach lets you benefit from premiums and potential stock gains. Understanding your investment goals, whether it is acquiring new stocks or maximizing returns on existing holdings, will guide you in choosing between covered calls and cash secured puts. https://blog.optionsamurai.com/cash-secured-put-vs-covered-call/#:~:text=Both%20strategies%20benefit%20from%20bullish,sell%20a%20call%20right%20away.
Only respond using information from the context.
What factors are negatively affecting the housing market?
U.S. Economic, Housing and Mortgage Market Outlook Recent developments U.S. economy: U.S. economic growth moderated to start the year. According to the U.S. Bureau of Economic Analysis (BEA) “advance” estimate of Real Gross Domestic Product (GDP), the seasonally adjusted annual rate (SAAR) of growth in GDP in Q1 2024 was 1.6%, slowing from a 3.4% rate in Q4 2023. The deceleration in GDP growth was led by slower growth in consumption expenditures, net exports, and government consumption expenditures. Consumer spending was weaker due to a decline in spending on durable goods, primarily autos, and flatlining nondurable goods, primarily due to less spending on gasoline. Spending on services accelerated in the first quarter, led by higher spending on health care, financial services and insurance. Trade weighed on GDP growth with more modest exports and an increase in imports. Compared to most advanced economies, the U.S. economy continues to perform relatively well. The positive tailwinds to overall growth from government spending are waning. The contribution to GDP growth from government consumption expenditures and gross investment remains positive but was less than a third of what it was in Q4 2023. The latest report paints a picture of an economy that continues to perform well, but that is moderating as it settles into a growth pattern more consistent with long-run trends. Consistent with economic growth trends, the labor market moderated in April 2024 with nonfarm payroll employment increasing by 175,000, down from an increase of 315,000 in March, according to the Bureau of Labor Statistics (BLS). The unemployment rate inched up from 3.8% in March to 3.9% in April. However, the unemployment rate has remained below 4% for the twenty-seventh consecutive month. Average hourly earnings for all employees on private nonfarm payrolls rose 0.2% month-over-month, and compared to a year ago, average hourly earnings increased 3.9%. Overall, the jobs report indicates a resilient but cooling labor market. The core Personal Consumption Expenditures (PCE) price index, the Federal Reserve’s preferred inflation gauge that strips out volatile food and energy prices, rose 0.3% month-over-month in March.1 While this increase in the core PCE was in line with expectations, the progress on inflation has slowed and has implications for future Federal Reserve monetary policy. The index increased 2.8% from a year ago and remains above the Federal Reserve target of 2.0%. The Consumer Price Index (CPI) increased by 0.4% in April, exceeding consensus expectations and triggering a negative market reaction. In another sign of persistent inflationary pressures, the employment cost index came in above expectations with a 1.2% quarter-over-quarter increase in Q1 2024 and a 4.2% increase in compensation costs over the year. The persistence of inflation has led market participants to conclude that the likelihood of multiple Federal Reserve rate cuts in 2024 is diminished and the next rate cut is also likely further away. In summary, U.S. economic growth moderated at the beginning of 2024, reflecting the impact of higher interest rates and declining consumer savings. The labor market also showed signs of cooling with softer-than expected job growth in April. U.S. housing and mortgage market: After benefitting from stable mortgage rates in the first couple of months of the year, the housing market witnessed a slowdown in March due to the rebound in rates. Total (existing + new) home sales for March fell by 2.7% from February and were down 2.1% from a year ago. This decline was led by existing home sales, which continued to reel under the impact of rising rates. Existing home sales were at an annual rate of 4.19 million in March, 4.3% below February sales and 3.7% lower than March 2023.2 However, new home sales for March grew 8.8% from February to an annualized rate of 693,000, accounting for about 14% of total home sales.3 As the supply of existing homes for sale remains low and home prices continue to rise, more buyers are choosing to purchase new homes than in previous years. According to the National Association of Homebuilders’ Housing Market Index, homebuilder confidence remained steady in March with the index coming in at 51. This is above the threshold of 50, indicating positive building conditions.4 However, the housing construction sector experienced some moderation. According to the U.S. Census Bureau, new residential construction fell in March with total starts decreasing 14.7%, the largest monthly decline since May 2022. The decline was led by multifamily starts which fell around 21% month-overmonth and single-family housing starts fell 12% month-over-month in March. The FHFA Purchase-Only Home Price Index for February increased by 1.2% month-over-month compared to a decrease of 0.1% in January. Year-over-year house price growth remained strong at 7.0% for February. The depleted inventory of homes available for sale, along with still high demand, continued to put upward pressure on house prices. Mortgage rates ticked up in April averaging 6.99% for the month, as measured by Freddie Mac’s Primary Mortgage Market Survey®, and ended the month at 7.17%. According to the Mortgage Bankers Association (MBA) Weekly Application Survey, mortgage activity declined over the month as rates exceeded 7% for the first time this year. Overall mortgage activity was down 1.8% month-over-month and 10.4% year-over-year at the end of April. Refinance activity for April was down 3.3% compared to March, and purchase applications were down 2.7% month-over-month.Tight inventory coupled with higher rates resulted in a stagnant start to the year in terms of homeownership. The homeownership rate in Q1 2024 ticked down to 65.6% from 65.7% in Q4 2023 and 66% in Q1 2023.5 The historical average homeownership rate over the period from Q1 1964 to Q1 2024 is 65.2%. Total housing stock was at 146.4 million units as of Q1 2024, an increase of around 1.6 million units compared to the same time last year. This reflected an increase of approximately 1.4 million in total occupied housing units and 0.2 million vacant units. A large share of the increase in occupied units came from renters compared to homeowners. Renter-occupied units increased approximately 1 million over the last year while owner-occupied units were up around 0.6 million. The homeowner vacancy rate in Q1 2024 was down to 0.8% from 0.9% in Q4 2023. The rental vacancy rate was unchanged over the quarter at 6.6%. Vacancy rates remain on balance very low. To bring the vacancy rate, both rental and homeowner, back in line with historical averages, the U.S. would need to add an additional 1.5 million vacant for-sale and for-rent homes (Exhibit 1).6 Without such units, the pressure on housing markets will persist. Additionally, the vacant housing undersupply metric is almost certainly a dramatic underestimate of the total housing shortage for the U.S. This is because this metric does not account for latent housing demand and vacant housing that is not for sale or for rent. Overall, tight inventory and “higher for longer” rates are still key barriers to home sale volumes. Mortgage rates above 7% continue to price out many prospective homebuyers and sellers have less incentive to sell. Outlook While the U.S. economy has shown resilience so far, we expect higher interest rates to weigh on future growth, with the economy settling into a lower rate of growth in 2024 and 2025. However, we do not expect a recession in our baseline scenario. In our baseline, slower growth and a weaker labor market help to rein in inflation while the economy throttles back but avoids stalling. Our baseline scenario has one Federal Reserve rate cut towards the end of the year. As a result, we expect mortgage rates to remain elevated through most of 2024. These high interest rates will prompt prospective buyers to readjust their housing expectations, but we anticipate housing demand to remain high due to favorable demographics, particularly in the starter home segment. Despite the strong housing demand, our housing market outlook is tempered by lack of inventory for sale. Under our baseline scenario, we anticipate improvement in home sales compared to 2023, albeit by a slim margin, as the rate lock-in effect will delay existing homes from entering the market. Our outlook on the mortgage origination market is also clouded by the expectation of low sale volumes. With our projection of mortgage interest rates remaining higher for longer, we anticipate modest growth in mortgage origination volumes, supported by high home prices. However, the combination of higher interest rates and limited inventory could limit purchase originations. Additionally, we expect refinance origination volumes to decline as homeowners have already secured low rates, posing potential challenge in the refinance market. While our outlook is positive, there are emerging risks, particularly from inflation. Over the last year, almost half of the overall gains in inflation came from housing inflation, and in an environment where home prices are growing, inflationary pressures might persist for longer. Under a high inflation scenario, interest rates will remain high, negatively impacting consumer spending behavior and credit performance, which can further slowdown economic growth.
Only respond using information from the context. What factors are negatively affecting the housing market? U.S. Economic, Housing and Mortgage Market Outlook Recent developments U.S. economy: U.S. economic growth moderated to start the year. According to the U.S. Bureau of Economic Analysis (BEA) “advance” estimate of Real Gross Domestic Product (GDP), the seasonally adjusted annual rate (SAAR) of growth in GDP in Q1 2024 was 1.6%, slowing from a 3.4% rate in Q4 2023. The deceleration in GDP growth was led by slower growth in consumption expenditures, net exports, and government consumption expenditures. Consumer spending was weaker due to a decline in spending on durable goods, primarily autos, and flatlining nondurable goods, primarily due to less spending on gasoline. Spending on services accelerated in the first quarter, led by higher spending on health care, financial services and insurance. Trade weighed on GDP growth with more modest exports and an increase in imports. Compared to most advanced economies, the U.S. economy continues to perform relatively well. The positive tailwinds to overall growth from government spending are waning. The contribution to GDP growth from government consumption expenditures and gross investment remains positive but was less than a third of what it was in Q4 2023. The latest report paints a picture of an economy that continues to perform well, but that is moderating as it settles into a growth pattern more consistent with long-run trends. Consistent with economic growth trends, the labor market moderated in April 2024 with nonfarm payroll employment increasing by 175,000, down from an increase of 315,000 in March, according to the Bureau of Labor Statistics (BLS). The unemployment rate inched up from 3.8% in March to 3.9% in April. However, the unemployment rate has remained below 4% for the twenty-seventh consecutive month. Average hourly earnings for all employees on private nonfarm payrolls rose 0.2% month-over-month, and compared to a year ago, average hourly earnings increased 3.9%. Overall, the jobs report indicates a resilient but cooling labor market. The core Personal Consumption Expenditures (PCE) price index, the Federal Reserve’s preferred inflation gauge that strips out volatile food and energy prices, rose 0.3% month-over-month in March.1 While this increase in the core PCE was in line with expectations, the progress on inflation has slowed and has implications for future Federal Reserve monetary policy. The index increased 2.8% from a year ago and remains above the Federal Reserve target of 2.0%. The Consumer Price Index (CPI) increased by 0.4% in April, exceeding consensus expectations and triggering a negative market reaction. In another sign of persistent inflationary pressures, the employment cost index came in above expectations with a 1.2% quarter-over-quarter increase in Q1 2024 and a 4.2% increase in compensation costs over the year. The persistence of inflation has led market participants to conclude that the likelihood of multiple Federal Reserve rate cuts in 2024 is diminished and the next rate cut is also likely further away. In summary, U.S. economic growth moderated at the beginning of 2024, reflecting the impact of higher interest rates and declining consumer savings. The labor market also showed signs of cooling with softer-than expected job growth in April. U.S. housing and mortgage market: After benefitting from stable mortgage rates in the first couple of months of the year, the housing market witnessed a slowdown in March due to the rebound in rates. Total (existing + new) home sales for March fell by 2.7% from February and were down 2.1% from a year ago. This decline was led by existing home sales, which continued to reel under the impact of rising rates. Existing home sales were at an annual rate of 4.19 million in March, 4.3% below February sales and 3.7% lower than March 2023.2 However, new home sales for March grew 8.8% from February to an annualized rate of 693,000, accounting for about 14% of total home sales.3 As the supply of existing homes for sale remains low and home prices continue to rise, more buyers are choosing to purchase new homes than in previous years. According to the National Association of Homebuilders’ Housing Market Index, homebuilder confidence remained steady in March with the index coming in at 51. This is above the threshold of 50, indicating positive building conditions.4 However, the housing construction sector experienced some moderation. According to the U.S. Census Bureau, new residential construction fell in March with total starts decreasing 14.7%, the largest monthly decline since May 2022. The decline was led by multifamily starts which fell around 21% month-overmonth and single-family housing starts fell 12% month-over-month in March. The FHFA Purchase-Only Home Price Index for February increased by 1.2% month-over-month compared to a decrease of 0.1% in January. Year-over-year house price growth remained strong at 7.0% for February. The depleted inventory of homes available for sale, along with still high demand, continued to put upward pressure on house prices. Mortgage rates ticked up in April averaging 6.99% for the month, as measured by Freddie Mac’s Primary Mortgage Market Survey®, and ended the month at 7.17%. According to the Mortgage Bankers Association (MBA) Weekly Application Survey, mortgage activity declined over the month as rates exceeded 7% for the first time this year. Overall mortgage activity was down 1.8% month-over-month and 10.4% year-over-year at the end of April. Refinance activity for April was down 3.3% compared to March, and purchase applications were down 2.7% month-over-month.Tight inventory coupled with higher rates resulted in a stagnant start to the year in terms of homeownership. The homeownership rate in Q1 2024 ticked down to 65.6% from 65.7% in Q4 2023 and 66% in Q1 2023.5 The historical average homeownership rate over the period from Q1 1964 to Q1 2024 is 65.2%. Total housing stock was at 146.4 million units as of Q1 2024, an increase of around 1.6 million units compared to the same time last year. This reflected an increase of approximately 1.4 million in total occupied housing units and 0.2 million vacant units. A large share of the increase in occupied units came from renters compared to homeowners. Renter-occupied units increased approximately 1 million over the last year while owner-occupied units were up around 0.6 million. The homeowner vacancy rate in Q1 2024 was down to 0.8% from 0.9% in Q4 2023. The rental vacancy rate was unchanged over the quarter at 6.6%. Vacancy rates remain on balance very low. To bring the vacancy rate, both rental and homeowner, back in line with historical averages, the U.S. would need to add an additional 1.5 million vacant for-sale and for-rent homes (Exhibit 1).6 Without such units, the pressure on housing markets will persist. Additionally, the vacant housing undersupply metric is almost certainly a dramatic underestimate of the total housing shortage for the U.S. This is because this metric does not account for latent housing demand and vacant housing that is not for sale or for rent. Overall, tight inventory and “higher for longer” rates are still key barriers to home sale volumes. Mortgage rates above 7% continue to price out many prospective homebuyers and sellers have less incentive to sell. Outlook While the U.S. economy has shown resilience so far, we expect higher interest rates to weigh on future growth, with the economy settling into a lower rate of growth in 2024 and 2025. However, we do not expect a recession in our baseline scenario. In our baseline, slower growth and a weaker labor market help to rein in inflation while the economy throttles back but avoids stalling. Our baseline scenario has one Federal Reserve rate cut towards the end of the year. As a result, we expect mortgage rates to remain elevated through most of 2024. These high interest rates will prompt prospective buyers to readjust their housing expectations, but we anticipate housing demand to remain high due to favorable demographics, particularly in the starter home segment. Despite the strong housing demand, our housing market outlook is tempered by lack of inventory for sale. Under our baseline scenario, we anticipate improvement in home sales compared to 2023, albeit by a slim margin, as the rate lock-in effect will delay existing homes from entering the market. Our outlook on the mortgage origination market is also clouded by the expectation of low sale volumes. With our projection of mortgage interest rates remaining higher for longer, we anticipate modest growth in mortgage origination volumes, supported by high home prices. However, the combination of higher interest rates and limited inventory could limit purchase originations. Additionally, we expect refinance origination volumes to decline as homeowners have already secured low rates, posing potential challenge in the refinance market. While our outlook is positive, there are emerging risks, particularly from inflation. Over the last year, almost half of the overall gains in inflation came from housing inflation, and in an environment where home prices are growing, inflationary pressures might persist for longer. Under a high inflation scenario, interest rates will remain high, negatively impacting consumer spending behavior and credit performance, which can further slowdown economic growth.
Only use the information in the context document. If you cannot answer using the context alone, say "I cannot determine the answer to that due to lack of context".
According to the context document only, how can APs profit from a Bitcoin ETF?
**Spot Bitcoin ETFs: What Are They, And How Do They Work?** Bitcoin has been one of the best-performing assets over the last decade, rising from a relatively obscure peer-to-peer payment network to a global phenomenon. As the original cryptocurrency, bitcoin has spurred an entirely new asset class that now has over $1 trillion in market capitalization. With the approval of 11 spot bitcoin ETFs in January 2024, traditional investors have an even easier way to invest in bitcoin. What Is a Spot Bitcoin ETF? On January 10, 2024, the SEC approved 11 new spot bitcoin ETFs. ETFs, or exchange-traded funds, are a type of security that tracks the underlying performance of a collection of assets or commodities. A spot bitcoin ETF is an exchange-traded fund that tracks the spot, or current price of bitcoin. By holding an equivalent amount of bitcoin to back every share of the ETF that is sold, the fund is actually backed by bitcoin itself. Considering the hoops you have to jump through to own bitcoin—exchange accounts, digital wallets, private keys, network transfers, etc.—a spot bitcoin ETF is one of the easiest ways to add bitcoin exposure to your portfolio. Spot ETFs, such as the new spot bitcoin ETFs, allow for shares of the fund to be created or redeemed based on market demand. In this way, a spot bitcoin ETF allows investors to gain exposure to the current price of bitcoin without having to hold the asset itself. This is in contrast to bitcoin futures ETFs, which were approved for trading by the U.S. Securities and Exchange Commission in October 2021 and can only trade bitcoin futures. Futures are complex derivatives instruments that track potential future prices of the underlying asset. How Do Spot Bitcoin ETFs Work? Spot bitcoin ETFs purchase a select amount of bitcoins that are held in a secure digital wallet by a custodian. These custodians offer bitcoin storage in a secure vault. Most of these vaults are—as crypto insiders call—air gapped in “cold storage,” which means the bitcoins’ keys are stored offline and cannot be accessed through the internet. The ETFs then issue shares that represent the bitcoins held by the fund. These shares are priced to reflect the current spot price of bitcoin and can be traded on traditional stock exchanges. Spot bitcoin ETFs make it easier for retail investors and traders to buy and sell an asset tied to the current value of bitcoin without needing to hold bitcoin itself. They also allow investors seeking exposure to bitcoin in retirement accounts to have a much simpler option than opening a self-directed IRA that could hold bitcoin directly. How Does a Spot ETF Maintain Its Price? The price of a spot ETF can depart from the actual value of the underlying asset. To bring the fund back in line with the asset’s actual value, authorized participants, otherwise known as APs, are allowed to create or redeem large blocks of shares. APs are typically large financial institutions that profit from the arbitrage opportunity presented when an ETF’s price is higher or lower than the underlying asset’s value. 11 Spot Bitcoin ETFs Here are the 11 SEC-approved Spot Bitcoin ETFs as of January 31, 2024: Spot Bitcoin ETF Expense Ratio Fee Waiver ARK 21Shares Bitcoin ETF (ARKB) 0.21% 0% fee for six months (or until $1 billion in assets) Bitwise Bitcoin ETF (BITB) 0.20% 0% fee for six months (or until $1 billion in assets) Fidelity Wise Origin Bitcoin Trust (FBTC) 0.25% Fees waived until July 31, 2024 Franklin Bitcoin ETF (EZBC) 0.19% 0% fee until August 2, 2024 (or until $10 billion in assets) Grayscale Bitcoin Trust (GBTC) 1.50% No fee waiver Hashdex Bitcoin ETF (DEFI)* 0.90% No fee waiver Invesco Galaxy Bitcoin ETF (BTCO) 0.25% 0% fee for six months (or until $5 billion in assets) iShares Bitcoin Trust (IBIT) 0.25% 0.12% fee for 12 months (or until $5 billion in assets) Valkyrie Bitcoin Fund (BRRR) 0.25% 0% fee for three months VanEck Bitcoin Trust (HODL) 0.25% No fee waiver See More * The Hashdex Bitcoin Futures ETF (DEFI) will convert to a spot bitcoin ETF at a later date. Now That They’re Here, What’s the Future of Spot Bitcoin ETFs? For years, the SEC had rejected all applications for a spot bitcoin ETF, with over 20 thumbs down between 2018 and 2023. The SEC’s approval of 11 spot bitcoin ETFs on January 10 marks a shift in how regulators treat cryptocurrencies. A flurry of new applications has been sent to the SEC for approval, suggesting even more spot bitcoin ETFs may be coming. It’s important to note that just because spot bitcoin ETFs have been approved, that does not mean the SEC is certain to approve additional crypto ETFs. Gary Gensler, chairman of the SEC, said in the SEC’s announcement of the approval of spot bitcoin ETFs, “Importantly, today’s Commission action is cabined to ETPs holding one non-security commodity, bitcoin. It should in no way signal the Commission’s willingness to approve listing standards for crypto asset securities.” Will Spot Bitcoin ETFs Affect the Price of Bitcoin? In the short term, more investors will find it easier to invest in bitcoin through these spot ETFs. This could mean more demand for bitcoin, as funds purchase from crypto exchanges to meet the demand of the spot ETFs. Bitcoin’s price was already rising in the weeks leading up to the spot bitcoin ETF announcement—and a “sell the news” moment happened in the wake of the approval. Many bitcoin holders became sellers, with the price of bitcoin dropping over 10% in just a few weeks. Over the long term, however, demand could increase for Bitcoin, as retirement plans, 401(k) plans and financial advisors start offering spot bitcoin ETFs as a way to diversify portfolios into “alternative assets.” “I personally believe that it will positively impact Bitcoin’s price because of increased adoption, easier access to ‘normies’ and increased liquidity in the marketplace,” says Marko Zlatic, founder of Whiteboard Finance. “Since the Bitcoin protocol dictates a finite supply of 21 million bitcoin ever, this should drive prices up over time, as long as there is adequate demand.” Risks of Investing in Spot Bitcoin ETFs Investors should understand the risk of investing in a spot bitcoin ETF before allocating any funds toward one. “Investors should approach cautiously and look at previous price movements of bitcoin to make sure they can stomach the volatility before they dive in,” says Christopher Johns, founder and wealth advisor at Spark Wealth Advisors, LLC. Gold had a similar trajectory when spot gold ETFs were introduced. The assets under management, or AUM, of spot gold ETFs quickly rose to about $1 billion. Since then, total holdings have grown to over $50 billion. This—along with other macroeconomic factors—has helped push the price of gold up to new highs. Spot Bitcoin ETFs: Pros And Cons Pros Bitcoin legitimacy. With the approval of spot bitcoin ETFs, the original cryptocurrency is now seen as a more legitimate asset class. Investors from all walks of life can gain exposure to bitcoin in almost any type of investment account they own, including individual retirement accounts, or IRAs, and 401(k)s. More liquidity. With ETFs buying and selling large blocks of bitcoin based on demand, this could increase liquidity and help stabilize prices over the long term. Increase prices. While a spot bitcoin ETF does not directly affect the price of bitcoin, the increased demand and purchasing of bitcoin by these ETFs could boost the price over time. Lower trading fees. With more adoption and ease of access through a spot ETF, investors may be able to access bitcoin with lower trading fees than some crypto exchanges. Cons More regulation. Spot bitcoin ETFs are highly-regulated securities that are now tied to the price of bitcoin. Any regulatory actions against bitcoin could affect the price of spot bitcoin ETFs—and bitcoin itself—as well. Investors don’t take custody of bitcoin. While investing in a spot bitcoin ETF gives you exposure to the price of bitcoin, you can’t take custody of the asset itself. “[You’re] trusting a third party custodian to ‘HODL’ your bitcoin. Not your keys, not your bitcoin,” Zlatic says. Annual fees. While trading spot bitcoin ETFs might cost less in the short term, the annual expense ratios may make it more expensive to own versus purchasing and storing bitcoin yourself. Volatility. While spot bitcoin ETFs will help increase bitcoin adoption, it is still a volatile asset that wildly fluctuates in price, which can hurt investors who aren’t prepared for the risk involved in owning bitcoin. Alternatives to Spot Bitcoin ETFs While investing in a spot bitcoin ETF can give you direct exposure to the price of bitcoin, it’s not the only way to invest in bitcoin. Here are a few alternatives to consider: Purchase bitcoin directly. If you want to own the actual asset yourself, you can purchase bitcoin from an online exchange. This gives you the ability to own bitcoin—or at least a portion of bitcoin—and take it into custody. There is a higher barrier to entry to owning bitcoin, as you’ll need to create a crypto exchange account, open a digital wallet and perhaps even transfer your bitcoin keys to a hardware wallet for safekeeping. Bitcoin futures ETF. Bitcoin futures ETFs have been around for a while, although they operate a bit differently than a spot ETF. These ETFs do not hold any bitcoin and only hold futures contracts based on the future price of bitcoin. This makes them potentially even more volatile than bitcoin itself. Bitcoin mining stocks. Bitcoin mining is a real business in which companies own and operate large data centers used for mining bitcoin. Some of these companies are publicly traded, allowing you to invest in the operation of mining bitcoin and the profit mining companies make in the process.
{Instruction} ========== Only use the information in the context document. If you cannot answer using the context alone, say "I cannot determine the answer to that due to lack of context". ---------------- {Passage} ========== **Spot Bitcoin ETFs: What Are They, And How Do They Work?** Bitcoin has been one of the best-performing assets over the last decade, rising from a relatively obscure peer-to-peer payment network to a global phenomenon. As the original cryptocurrency, bitcoin has spurred an entirely new asset class that now has over $1 trillion in market capitalization. With the approval of 11 spot bitcoin ETFs in January 2024, traditional investors have an even easier way to invest in bitcoin. What Is a Spot Bitcoin ETF? On January 10, 2024, the SEC approved 11 new spot bitcoin ETFs. ETFs, or exchange-traded funds, are a type of security that tracks the underlying performance of a collection of assets or commodities. A spot bitcoin ETF is an exchange-traded fund that tracks the spot, or current price of bitcoin. By holding an equivalent amount of bitcoin to back every share of the ETF that is sold, the fund is actually backed by bitcoin itself. Considering the hoops you have to jump through to own bitcoin—exchange accounts, digital wallets, private keys, network transfers, etc.—a spot bitcoin ETF is one of the easiest ways to add bitcoin exposure to your portfolio. Spot ETFs, such as the new spot bitcoin ETFs, allow for shares of the fund to be created or redeemed based on market demand. In this way, a spot bitcoin ETF allows investors to gain exposure to the current price of bitcoin without having to hold the asset itself. This is in contrast to bitcoin futures ETFs, which were approved for trading by the U.S. Securities and Exchange Commission in October 2021 and can only trade bitcoin futures. Futures are complex derivatives instruments that track potential future prices of the underlying asset. How Do Spot Bitcoin ETFs Work? Spot bitcoin ETFs purchase a select amount of bitcoins that are held in a secure digital wallet by a custodian. These custodians offer bitcoin storage in a secure vault. Most of these vaults are—as crypto insiders call—air gapped in “cold storage,” which means the bitcoins’ keys are stored offline and cannot be accessed through the internet. The ETFs then issue shares that represent the bitcoins held by the fund. These shares are priced to reflect the current spot price of bitcoin and can be traded on traditional stock exchanges. Spot bitcoin ETFs make it easier for retail investors and traders to buy and sell an asset tied to the current value of bitcoin without needing to hold bitcoin itself. They also allow investors seeking exposure to bitcoin in retirement accounts to have a much simpler option than opening a self-directed IRA that could hold bitcoin directly. How Does a Spot ETF Maintain Its Price? The price of a spot ETF can depart from the actual value of the underlying asset. To bring the fund back in line with the asset’s actual value, authorized participants, otherwise known as APs, are allowed to create or redeem large blocks of shares. APs are typically large financial institutions that profit from the arbitrage opportunity presented when an ETF’s price is higher or lower than the underlying asset’s value. 11 Spot Bitcoin ETFs Here are the 11 SEC-approved Spot Bitcoin ETFs as of January 31, 2024: Spot Bitcoin ETF Expense Ratio Fee Waiver ARK 21Shares Bitcoin ETF (ARKB) 0.21% 0% fee for six months (or until $1 billion in assets) Bitwise Bitcoin ETF (BITB) 0.20% 0% fee for six months (or until $1 billion in assets) Fidelity Wise Origin Bitcoin Trust (FBTC) 0.25% Fees waived until July 31, 2024 Franklin Bitcoin ETF (EZBC) 0.19% 0% fee until August 2, 2024 (or until $10 billion in assets) Grayscale Bitcoin Trust (GBTC) 1.50% No fee waiver Hashdex Bitcoin ETF (DEFI)* 0.90% No fee waiver Invesco Galaxy Bitcoin ETF (BTCO) 0.25% 0% fee for six months (or until $5 billion in assets) iShares Bitcoin Trust (IBIT) 0.25% 0.12% fee for 12 months (or until $5 billion in assets) Valkyrie Bitcoin Fund (BRRR) 0.25% 0% fee for three months VanEck Bitcoin Trust (HODL) 0.25% No fee waiver See More * The Hashdex Bitcoin Futures ETF (DEFI) will convert to a spot bitcoin ETF at a later date. Now That They’re Here, What’s the Future of Spot Bitcoin ETFs? For years, the SEC had rejected all applications for a spot bitcoin ETF, with over 20 thumbs down between 2018 and 2023. The SEC’s approval of 11 spot bitcoin ETFs on January 10 marks a shift in how regulators treat cryptocurrencies. A flurry of new applications has been sent to the SEC for approval, suggesting even more spot bitcoin ETFs may be coming. It’s important to note that just because spot bitcoin ETFs have been approved, that does not mean the SEC is certain to approve additional crypto ETFs. Gary Gensler, chairman of the SEC, said in the SEC’s announcement of the approval of spot bitcoin ETFs, “Importantly, today’s Commission action is cabined to ETPs holding one non-security commodity, bitcoin. It should in no way signal the Commission’s willingness to approve listing standards for crypto asset securities.” Will Spot Bitcoin ETFs Affect the Price of Bitcoin? In the short term, more investors will find it easier to invest in bitcoin through these spot ETFs. This could mean more demand for bitcoin, as funds purchase from crypto exchanges to meet the demand of the spot ETFs. Bitcoin’s price was already rising in the weeks leading up to the spot bitcoin ETF announcement—and a “sell the news” moment happened in the wake of the approval. Many bitcoin holders became sellers, with the price of bitcoin dropping over 10% in just a few weeks. Over the long term, however, demand could increase for Bitcoin, as retirement plans, 401(k) plans and financial advisors start offering spot bitcoin ETFs as a way to diversify portfolios into “alternative assets.” “I personally believe that it will positively impact Bitcoin’s price because of increased adoption, easier access to ‘normies’ and increased liquidity in the marketplace,” says Marko Zlatic, founder of Whiteboard Finance. “Since the Bitcoin protocol dictates a finite supply of 21 million bitcoin ever, this should drive prices up over time, as long as there is adequate demand.” Risks of Investing in Spot Bitcoin ETFs Investors should understand the risk of investing in a spot bitcoin ETF before allocating any funds toward one. “Investors should approach cautiously and look at previous price movements of bitcoin to make sure they can stomach the volatility before they dive in,” says Christopher Johns, founder and wealth advisor at Spark Wealth Advisors, LLC. Gold had a similar trajectory when spot gold ETFs were introduced. The assets under management, or AUM, of spot gold ETFs quickly rose to about $1 billion. Since then, total holdings have grown to over $50 billion. This—along with other macroeconomic factors—has helped push the price of gold up to new highs. Spot Bitcoin ETFs: Pros And Cons Pros Bitcoin legitimacy. With the approval of spot bitcoin ETFs, the original cryptocurrency is now seen as a more legitimate asset class. Investors from all walks of life can gain exposure to bitcoin in almost any type of investment account they own, including individual retirement accounts, or IRAs, and 401(k)s. More liquidity. With ETFs buying and selling large blocks of bitcoin based on demand, this could increase liquidity and help stabilize prices over the long term. Increase prices. While a spot bitcoin ETF does not directly affect the price of bitcoin, the increased demand and purchasing of bitcoin by these ETFs could boost the price over time. Lower trading fees. With more adoption and ease of access through a spot ETF, investors may be able to access bitcoin with lower trading fees than some crypto exchanges. Cons More regulation. Spot bitcoin ETFs are highly-regulated securities that are now tied to the price of bitcoin. Any regulatory actions against bitcoin could affect the price of spot bitcoin ETFs—and bitcoin itself—as well. Investors don’t take custody of bitcoin. While investing in a spot bitcoin ETF gives you exposure to the price of bitcoin, you can’t take custody of the asset itself. “[You’re] trusting a third party custodian to ‘HODL’ your bitcoin. Not your keys, not your bitcoin,” Zlatic says. Annual fees. While trading spot bitcoin ETFs might cost less in the short term, the annual expense ratios may make it more expensive to own versus purchasing and storing bitcoin yourself. Volatility. While spot bitcoin ETFs will help increase bitcoin adoption, it is still a volatile asset that wildly fluctuates in price, which can hurt investors who aren’t prepared for the risk involved in owning bitcoin. Alternatives to Spot Bitcoin ETFs While investing in a spot bitcoin ETF can give you direct exposure to the price of bitcoin, it’s not the only way to invest in bitcoin. Here are a few alternatives to consider: Purchase bitcoin directly. If you want to own the actual asset yourself, you can purchase bitcoin from an online exchange. This gives you the ability to own bitcoin—or at least a portion of bitcoin—and take it into custody. There is a higher barrier to entry to owning bitcoin, as you’ll need to create a crypto exchange account, open a digital wallet and perhaps even transfer your bitcoin keys to a hardware wallet for safekeeping. Bitcoin futures ETF. Bitcoin futures ETFs have been around for a while, although they operate a bit differently than a spot ETF. These ETFs do not hold any bitcoin and only hold futures contracts based on the future price of bitcoin. This makes them potentially even more volatile than bitcoin itself. Bitcoin mining stocks. Bitcoin mining is a real business in which companies own and operate large data centers used for mining bitcoin. Some of these companies are publicly traded, allowing you to invest in the operation of mining bitcoin and the profit mining companies make in the process. ---------------- {Question} ========== According to the context document only, how can APs profit from a Bitcoin ETF?
You can only respond to the prompt using information in the context block and no other sources.
Explain how COLAs are considered in determining Medicaid eligibility.
Recipients of Social Security COLAs After April 1977 (“Pickle Amendment”) Section 503 of P.L. 94-566 generally requires states to provide Medicaid coverage for individuals who would continue to be eligible for SSI/SSP if not for increases in their Social Security benefits due to COLAs.64 Individuals qualify under this pathway it they • are receiving Social Security benefits, • lost SSI/SSP but would still be eligible for those benefits if Social Security COLAs received since losing SSI/SSP were deducted from their income, and • were eligible for and receiving SSI/SSP concurrently with Social Security for at least one month after April 1, 1977. 209(b) states may exclude all, some, or none of the Social Security benefit increases that caused ineligibility for SSI/SSP. This pathway is often known as the “Pickle Amendment” after the late Representative J.J. Pickle. Disabled Widow(er)s Receiving Benefit Increases Under P.L. 98-21 (“ARF Widow[er]s”) (This pathway is closed to new enrollment and applies to relatively few people.) Social Security provides widow(er)’s benefits starting at age 60, or at age 50 if the individual is disabled and meets certain other criteria. The amount of the aged or disabled widow(er)’s benefit is based on the deceased insured worker’s past earnings from covered employment, subject to a permanent reduction for each month of entitlement before the widow(er)’s full retirement age (65- 67, depending on year of birth). Under P.L. 98-21, lawmakers eliminated the additional reduction factor (ARF) for disabled widow(er)s aged 50-59, meaning their reduction penalty for claiming benefits before their full retirement age was capped at the percentage applicable to aged widow(er)s who first claim at age 60. All states (including 209[b] states) are required to provide Medicaid coverage for individuals who would continue to be eligible for SSI/SSP if not for increases in their widow(er)’s benefits due to the elimination of the ARF (known as “ARF Widow[er]s”).65 Individuals qualify under this pathway if they • were entitled to Social Security benefits in December 1983 and received disabled widow(er)’s benefits and SSI/SSP in January 1984, • lost SSI/SSP eligibility because of the elimination of the ARF, • have been continuously entitled to widow(er)’s benefits since January 1984, • filed for Medicaid continuation before July 1, 1988 (or a slightly later date in some cases), and • would continue to be eligible for SSI/SSP if the value of the increase in disabled widow(er)’s benefits under P.L. 98-21 and any subsequent COLAs were deducted from their countable income. Disabled Adult Children Disabled adult children of retired, disabled, or deceased insured workers typically qualify for Social Security disabled adult child’s (DAC) benefits if they are at least age 18 and became disabled before they attained age 22. States are generally required to provide Medicaid coverage for individuals who lose eligibility for SSI/SSP due to entitlement to or an increase in DAC benefits. 66 Individuals qualify under this pathway if they • lose eligibility for SSI/SSP due to receipt of DAC benefits on or after July 1, 1987, and • would continue to be eligible for SSI/SSP if not for their entitlement to or an increase in DAC benefits. 209(b) states may exclude all, some, or none of the DAC benefit or increases in that benefit that caused ineligibility for SSI/SSP. Widow(er)s Not Entitled to Medicare Part A (“Early Widow[er]s”) States are generally required to provide Medicaid coverage for individuals aged 50 to 64 who lose eligibility for SSI/SSP due to entitlement to Social Security widow(er)’s benefits but who are not yet entitled to Medicare Part A (Hospital Insurance).67 Individuals qualify under this pathway if they • are at least age 50 but have not yet attained age 65, • received SSI/SSP in the month before their widow(er)’s benefits began, • are not entitled to Medicare Part A,68 and • would continue to be eligible for SSI/SSP if not for their entitlement widow(er)’s benefits.69 Eligibility for Medicaid under this pathway continues until the individual becomes entitled to Medicare Part A. 209(b) states may exclude all, some, or none of the widow(er)’s benefit that caused ineligibility for SSP/SSI. Recipients of a 1972 Social Security COLA (This pathway is closed to new enrollment and applies to relatively few people.) Section 249E of P.L. 92-603 requires states to provide Medicaid coverage for individuals who would be eligible for SSI/SSP in the absence of a Social Security COLA enacted in 1972 under P.L. 92-336.70 Individuals qualify under this provision if they • were entitled to Social Security benefits in August 1972, • were receiving cash assistance under the former adult assistance programs in August 1972 (or would have been eligible for such assistance in certain instances), and • would be eligible for SSI/SSP had the COLA under P.L. 92-336 not been applied to their Social Security benefits.
You can only respond to the prompt using information in the context block and no other sources. Explain how COLAs are considered in determining Medicaid eligibility. Recipients of Social Security COLAs After April 1977 (“Pickle Amendment”) Section 503 of P.L. 94-566 generally requires states to provide Medicaid coverage for individuals who would continue to be eligible for SSI/SSP if not for increases in their Social Security benefits due to COLAs.64 Individuals qualify under this pathway it they • are receiving Social Security benefits, • lost SSI/SSP but would still be eligible for those benefits if Social Security COLAs received since losing SSI/SSP were deducted from their income, and • were eligible for and receiving SSI/SSP concurrently with Social Security for at least one month after April 1, 1977. 209(b) states may exclude all, some, or none of the Social Security benefit increases that caused ineligibility for SSI/SSP. This pathway is often known as the “Pickle Amendment” after the late Representative J.J. Pickle. Disabled Widow(er)s Receiving Benefit Increases Under P.L. 98-21 (“ARF Widow[er]s”) (This pathway is closed to new enrollment and applies to relatively few people.) Social Security provides widow(er)’s benefits starting at age 60, or at age 50 if the individual is disabled and meets certain other criteria. The amount of the aged or disabled widow(er)’s benefit is based on the deceased insured worker’s past earnings from covered employment, subject to a permanent reduction for each month of entitlement before the widow(er)’s full retirement age (65- 67, depending on year of birth). Under P.L. 98-21, lawmakers eliminated the additional reduction factor (ARF) for disabled widow(er)s aged 50-59, meaning their reduction penalty for claiming benefits before their full retirement age was capped at the percentage applicable to aged widow(er)s who first claim at age 60. All states (including 209[b] states) are required to provide Medicaid coverage for individuals who would continue to be eligible for SSI/SSP if not for increases in their widow(er)’s benefits due to the elimination of the ARF (known as “ARF Widow[er]s”).65 Individuals qualify under this pathway if they • were entitled to Social Security benefits in December 1983 and received disabled widow(er)’s benefits and SSI/SSP in January 1984, • lost SSI/SSP eligibility because of the elimination of the ARF, • have been continuously entitled to widow(er)’s benefits since January 1984, • filed for Medicaid continuation before July 1, 1988 (or a slightly later date in some cases), and • would continue to be eligible for SSI/SSP if the value of the increase in disabled widow(er)’s benefits under P.L. 98-21 and any subsequent COLAs were deducted from their countable income. Disabled Adult Children Disabled adult children of retired, disabled, or deceased insured workers typically qualify for Social Security disabled adult child’s (DAC) benefits if they are at least age 18 and became disabled before they attained age 22. States are generally required to provide Medicaid coverage for individuals who lose eligibility for SSI/SSP due to entitlement to or an increase in DAC benefits. 66 Individuals qualify under this pathway if they • lose eligibility for SSI/SSP due to receipt of DAC benefits on or after July 1, 1987, and • would continue to be eligible for SSI/SSP if not for their entitlement to or an increase in DAC benefits. 209(b) states may exclude all, some, or none of the DAC benefit or increases in that benefit that caused ineligibility for SSI/SSP. Widow(er)s Not Entitled to Medicare Part A (“Early Widow[er]s”) States are generally required to provide Medicaid coverage for individuals aged 50 to 64 who lose eligibility for SSI/SSP due to entitlement to Social Security widow(er)’s benefits but who are not yet entitled to Medicare Part A (Hospital Insurance).67 Individuals qualify under this pathway if they • are at least age 50 but have not yet attained age 65, • received SSI/SSP in the month before their widow(er)’s benefits began, • are not entitled to Medicare Part A,68 and • would continue to be eligible for SSI/SSP if not for their entitlement widow(er)’s benefits.69 Eligibility for Medicaid under this pathway continues until the individual becomes entitled to Medicare Part A. 209(b) states may exclude all, some, or none of the widow(er)’s benefit that caused ineligibility for SSP/SSI. Recipients of a 1972 Social Security COLA (This pathway is closed to new enrollment and applies to relatively few people.) Section 249E of P.L. 92-603 requires states to provide Medicaid coverage for individuals who would be eligible for SSI/SSP in the absence of a Social Security COLA enacted in 1972 under P.L. 92-336.70 Individuals qualify under this provision if they • were entitled to Social Security benefits in August 1972, • were receiving cash assistance under the former adult assistance programs in August 1972 (or would have been eligible for such assistance in certain instances), and • would be eligible for SSI/SSP had the COLA under P.L. 92-336 not been applied to their Social Security benefits.
"================ <TEXT PASSAGE> ======= [context document] ================ <QUESTION> ======= [user request] ================ <TASK> ======= You are an expert in question answering. Your task is to reply to a query or question, based only on the information provided by the user. It should only use information in the article provided."
Are there any benefits to using AI? Are there any dangers in using AI? If the answer is yes to either of these questions, create a list of answers for each question.
Potential threats posed by AI can entail malicious objectives, unintended circumstances, and circumvention of safety measures. There are currently AI tools where the objectives are not clear, making them usable in a vast array of contexts, but also susceptible to manipulation or use in detrimental ways. For example, while Large Language Models (LLMs) are optimized for the narrow task of text prediction, they do not have a single objective in their main end-to-end applications; thus, they can be utilized in content generation for marketing purposes, in translation, and to produce misinformation at scale. In other cases, the objective is known and the AI system is optimized for that objective but the outcome can result in unintended harm. For instance, while some AI systems might aim for higher clicks, they might inadvertently contribute to societal polarization. This is an example of unintended consequence of an AI tool optimized on a known objective. As AI has evolved, especially with the development of Foundation models, numerous strategies have been proposed to integrate safety precautions and protective guardrails during deployment. However, there is substantial evidence indicating that malicious entities can bypass these barriers, leading the Foundation models to breach the safety protocols that were put in place. As such, there is a continued need for research into these safety challenges. Malicious objectives: It is important to protect against the misuse of AI. This is true for both proprietary and open-source AI. Ensuring public access to technology through open-source supports efforts to democratize AI development. However, these open-source models can be utilized by bad actors for malicious objectives such as phishing and scamming. Similarly, close-source models also can pose similar risks if they are misused by bad actors. Circumvention of safety measures: As AI systems become increasingly sophisticated, there is a heightened risk that they may devise means to bypass the very protocols put in place to oversee or limit their actions. This is particularly worrisome because, while humans design these safety measures with specific intentions, an AI might interpret them differently or identify loopholes. As the wave of AI and automation continues its transformative journey across industries, it will have a disruptive impact on employment opportunities. This impact could make jobs better and more accessible to a broader proportion of the population, but also has the potential to increase inequality. On one hand, sectors reliant on routine tasks are confronted with potential impacts on jobs, while on the other hand, the rise of AI-driven enterprises might inadvertently magnify the chasm of economic inequality. However, it should be noted that these studies discuss exposure to AI. Exposure does not necessarily translate to loss of jobs as the market could expand. It is apparent that some jobs will be lost and others will be created, and in some instances lower-performing workers will be boosted by AI, supplementing their capabilities. The concern is that without proactively developing the ability to detect and address changes and disruptions, and without awareness of labor market trends, available educational upskilling programs, and policies such as wage insurance for workers preparing for new roles (especially in the rapidly changing environment), it is possible to witness stark increases in inequality even as productivity rises. But the challenges are not solely economic. Ethical and societal dilemmas are emerging at the forefront, with growing concerns about individual privacy, copyright infringement, and the increasing human dependence on these technologies. Content authenticity verification presents a significant challenge, heightening worries about deepfakes and misinformation, which could undermine democratic processes. As AI systems grow more powerful and potentially gain more sophisticated capabilities, concerns have been raised about the possibility that these technologies will cause significant disruptions. These can manifest in the form of threats to democracy, like meddling in the electoral process, national security threats such as bioweapons or cyberattacks, and societal disruptions via polarizing AI systems used in platforms like social media. It should be noted that there are differing opinions on the feasibility of superhuman capabilities of AI and whether the risks can be categorized as large-scale disruption and catastrophic. In addition, many of these risks are instances of AI used for malicious objectives, unintended consequences of AI systems, or economic and societal risks as mentioned in previous parts taken to their extreme. These risks include: Uncontrolled growth: As AI acquires more sophisticated capabilities, some have raised concerns that it could act unpredictably, making decisions or taking actions not fully understood by its developers. Destabilization of democracy: The improper and malevolent use of AI has the potential to critically destabilize democratic systems. For example, if AI is harnessed to meddle with electoral processes, this could undermine confidence in democratic processes. One of the most prominent concerns is the spread of misinformation and disinformation. Moreover, AI tools can also be employed for more direct manipulation of voter behavior. National security threats: Malicious inputs have the capacity to trick AI systems, leading to operational failures. Furthermore, when AI is integrated into realms like warfare, cyber-attacks, and bioweapons, it can both intensify conflicts and usher in unpredictable combat tactics. Manipulation and polarization: AI, such as those used in social media platforms, can manipulate information to increase user engagement, inadvertently leading to societal polarization and misinformation. As AI's potential grows, so do the complexities and concerns surrounding its assimilation into diverse societal sectors. Nonetheless, every hurdle also presents a chance to evolve and refine. This is especially true in the AI domain. Delving into potential resolutions and protective measures isn't merely scholarly; it's imperative to ensure AI is utilized ethically, responsibly, and safely for everyone's advantage in the future. It's essential to enforce transparency, ensuring users recognize when they are engaging with an AI rather than a human, especially in scenarios where trust and authenticity are paramount. Below are some of the mitigation strategies suggested by the experts. Adaptive regulation: There has been emphasis on the importance of regulating AI in a manner that's both agile and adaptive. Given that AI can evolve faster than legislative systems, regulations need to be flexible enough to address current and future risks. Regulations should also be designed based on input from multiple stakeholders: corporations, advocacy groups, academic leaders. It has been further suggested that risk should be associated with AI's uses, not the technology itself. Lastly, in light of the recent declaration about voluntary commitments, it has been suggested to make some of these commitments obligatory. Other possible suggestions include and possibly encompass third-party verification, registration, and licensing of certain AI systems. Research investment: It is paramount to invest in AI research. It has been suggested that the research should be segmented into public and classified. The public research involves conventional academic research that openly publishes findings on AI risk safety solutions. This research can further delve into the appropriate governance and regulation necessary to ensure public safety, providing valuable insights for policymakers aiming to regulate AI effectively. The classified research pertains to concentrating on counteractions against malevolent users of AI or inadvertent AI control losses with national security consequences. Furthermore, experts advocate for international research by fostering global collaborations among institutes. Research with humanity at its core: There's a dual need for both open academic research focusing on safety solutions and classified research that addresses potential threats from bad actors using AI or unintentional loss of control over AI. Multi-stakeholder approach: Experts highlight the significance of including various stakeholders like AI builders, users, and civil society in the process. Companies, in particular, should invest in AI governance and adopt internal ethics frameworks. International coordination: It's imperative to develop joint international collaboration, ensuring that potent AI tools are not misused. Collaborative efforts with various nations, including those beyond the traditional U.S. allies, will help ensure a cohesive global approach to AI usage and its associated risks.
"================ <TEXT PASSAGE> ======= Potential threats posed by AI can entail malicious objectives, unintended circumstances, and circumvention of safety measures. There are currently AI tools where the objectives are not clear, making them usable in a vast array of contexts, but also susceptible to manipulation or use in detrimental ways. For example, while Large Language Models (LLMs) are optimized for the narrow task of text prediction, they do not have a single objective in their main end-to-end applications; thus, they can be utilized in content generation for marketing purposes, in translation, and to produce misinformation at scale. In other cases, the objective is known and the AI system is optimized for that objective but the outcome can result in unintended harm. For instance, while some AI systems might aim for higher clicks, they might inadvertently contribute to societal polarization. This is an example of unintended consequence of an AI tool optimized on a known objective. As AI has evolved, especially with the development of Foundation models, numerous strategies have been proposed to integrate safety precautions and protective guardrails during deployment. However, there is substantial evidence indicating that malicious entities can bypass these barriers, leading the Foundation models to breach the safety protocols that were put in place. As such, there is a continued need for research into these safety challenges. Malicious objectives: It is important to protect against the misuse of AI. This is true for both proprietary and open-source AI. Ensuring public access to technology through open-source supports efforts to democratize AI development. However, these open-source models can be utilized by bad actors for malicious objectives such as phishing and scamming. Similarly, close-source models also can pose similar risks if they are misused by bad actors. Circumvention of safety measures: As AI systems become increasingly sophisticated, there is a heightened risk that they may devise means to bypass the very protocols put in place to oversee or limit their actions. This is particularly worrisome because, while humans design these safety measures with specific intentions, an AI might interpret them differently or identify loopholes. As the wave of AI and automation continues its transformative journey across industries, it will have a disruptive impact on employment opportunities. This impact could make jobs better and more accessible to a broader proportion of the population, but also has the potential to increase inequality. On one hand, sectors reliant on routine tasks are confronted with potential impacts on jobs, while on the other hand, the rise of AI-driven enterprises might inadvertently magnify the chasm of economic inequality. However, it should be noted that these studies discuss exposure to AI. Exposure does not necessarily translate to loss of jobs as the market could expand. It is apparent that some jobs will be lost and others will be created, and in some instances lower-performing workers will be boosted by AI, supplementing their capabilities. The concern is that without proactively developing the ability to detect and address changes and disruptions, and without awareness of labor market trends, available educational upskilling programs, and policies such as wage insurance for workers preparing for new roles (especially in the rapidly changing environment), it is possible to witness stark increases in inequality even as productivity rises. But the challenges are not solely economic. Ethical and societal dilemmas are emerging at the forefront, with growing concerns about individual privacy, copyright infringement, and the increasing human dependence on these technologies. Content authenticity verification presents a significant challenge, heightening worries about deepfakes and misinformation, which could undermine democratic processes. As AI systems grow more powerful and potentially gain more sophisticated capabilities, concerns have been raised about the possibility that these technologies will cause significant disruptions. These can manifest in the form of threats to democracy, like meddling in the electoral process, national security threats such as bioweapons or cyberattacks, and societal disruptions via polarizing AI systems used in platforms like social media. It should be noted that there are differing opinions on the feasibility of superhuman capabilities of AI and whether the risks can be categorized as large-scale disruption and catastrophic. In addition, many of these risks are instances of AI used for malicious objectives, unintended consequences of AI systems, or economic and societal risks as mentioned in previous parts taken to their extreme. These risks include: Uncontrolled growth: As AI acquires more sophisticated capabilities, some have raised concerns that it could act unpredictably, making decisions or taking actions not fully understood by its developers. Destabilization of democracy: The improper and malevolent use of AI has the potential to critically destabilize democratic systems. For example, if AI is harnessed to meddle with electoral processes, this could undermine confidence in democratic processes. One of the most prominent concerns is the spread of misinformation and disinformation. Moreover, AI tools can also be employed for more direct manipulation of voter behavior. National security threats: Malicious inputs have the capacity to trick AI systems, leading to operational failures. Furthermore, when AI is integrated into realms like warfare, cyber-attacks, and bioweapons, it can both intensify conflicts and usher in unpredictable combat tactics. Manipulation and polarization: AI, such as those used in social media platforms, can manipulate information to increase user engagement, inadvertently leading to societal polarization and misinformation. As AI's potential grows, so do the complexities and concerns surrounding its assimilation into diverse societal sectors. Nonetheless, every hurdle also presents a chance to evolve and refine. This is especially true in the AI domain. Delving into potential resolutions and protective measures isn't merely scholarly; it's imperative to ensure AI is utilized ethically, responsibly, and safely for everyone's advantage in the future. It's essential to enforce transparency, ensuring users recognize when they are engaging with an AI rather than a human, especially in scenarios where trust and authenticity are paramount. Below are some of the mitigation strategies suggested by the experts. Adaptive regulation: There has been emphasis on the importance of regulating AI in a manner that's both agile and adaptive. Given that AI can evolve faster than legislative systems, regulations need to be flexible enough to address current and future risks. Regulations should also be designed based on input from multiple stakeholders: corporations, advocacy groups, academic leaders. It has been further suggested that risk should be associated with AI's uses, not the technology itself. Lastly, in light of the recent declaration about voluntary commitments, it has been suggested to make some of these commitments obligatory. Other possible suggestions include and possibly encompass third-party verification, registration, and licensing of certain AI systems. Research investment: It is paramount to invest in AI research. It has been suggested that the research should be segmented into public and classified. The public research involves conventional academic research that openly publishes findings on AI risk safety solutions. This research can further delve into the appropriate governance and regulation necessary to ensure public safety, providing valuable insights for policymakers aiming to regulate AI effectively. The classified research pertains to concentrating on counteractions against malevolent users of AI or inadvertent AI control losses with national security consequences. Furthermore, experts advocate for international research by fostering global collaborations among institutes. Research with humanity at its core: There's a dual need for both open academic research focusing on safety solutions and classified research that addresses potential threats from bad actors using AI or unintentional loss of control over AI. Multi-stakeholder approach: Experts highlight the significance of including various stakeholders like AI builders, users, and civil society in the process. Companies, in particular, should invest in AI governance and adopt internal ethics frameworks. International coordination: It's imperative to develop joint international collaboration, ensuring that potent AI tools are not misused. Collaborative efforts with various nations, including those beyond the traditional U.S. allies, will help ensure a cohesive global approach to AI usage and its associated risks. https://ai.gov/wp-content/uploads/2023/11/Findings_The-Potential-Future-Risks-of-AI.pdf ================ <QUESTION> ======= Are there any benefits to using AI? Are there any dangers in using AI? If the answer is yes to either of these questions, create a list of answers for each question. ================ <TASK> ======= You are an expert in question answering. Your task is to reply to a query or question, based only on the information provided by the user. It should only use information in the article provided."
Only use information from the supplied context. Do not use outside information. Do not use extraneous text. Use bullets in at least some capacity to answer the questions. Your response should be under 100 words.
What are the five broad categories of business?
Defining a successful business EVERY ENTREPRENEUR ASPIRES to create a successful business, and investors certainly want management to run successful businesses. So what determines whether a business is being successful? Before answering this question, it is helpful to define what a business is and the various forms it can take. A business is a commercial operation that provides products or services with the aim of making a profit for the benefit of its owners. The significant point is “for the benefit of its owners”, which differentiates it from a government or not-for-profit organisation, such as a charity, where the activity is conducted for the benefit of the people it serves. A profit is an essential element of running a successful business. It is a trading surplus whereby the revenues earned exceed the costs. This surplus belongs to the owners of the business to use as they choose: to take for themselves, to reinvest back in the business, or a mixture of the two. For a government organisation or charity, any surplus is reinvested in the activities to further benefit the people it serves. Business structure A business can take many forms, ranging from a sole trader to a large multinational company. The principal aim of making a profit for its owners is still the same. A person starting out and setting up a business will take all the risk and reward as the venture gets under way. As the business grows it can be advantageous to share the risk with others and separate the business activities from those of the owner by establishing a company. A company is a legal entity in its own right that is separate from its 2017 Guide Financial Management.indd 1 22/01/2018 13:36 2 guide to financial management owners. An investor is risking only the money paid for buying some shares in the company. If the company ceases trading, the shareholders (owners) are not liable to make up any shortfall between the value of the company’s assets and its liabilities. There are five broad categories of business: ■ Sole trader. Someone who sets up a business alone and takes all the risk and reward of running it, and who may employ staff. ■ Partnership. Two or more people who set up a business together. The partners have joint ownership and share the risk and reward of running the business. Like a sole trader they may employ staff. ■ Limited liability partnership (LLP). A hybrid of a partnership and a company which provides the owners with the limited risk of a company and the shared ownership and tax status of a partnership. ■ Private company. Usually a small organisation raising its money from a few private investors. The shares may be difficult to trade as they are not listed on any stock market. Investors’ liability in private and public companies is limited to the amount of their investment. ■ Public company. Typically a large organisation that is usually listed on a stock exchange. Because of its size it may require significant investment, and hence it may need to draw investment from many investors. In this book the focus is mainly on companies, though the principles can be equally well applied to a sole trader, a partnership and indeed not-for-profit organisations. The role of the board The directors of a company are people hired (and at times fired) by the shareholders to be stewards of their investment. However, they need to balance this with their primary fiduciary duty as a director, which is to act in the best interests of the company. Collectively, a board of directors has overall responsibility for running a company successfully. This is achieved by setting and implementing its strategy. 2017 Guide Financial Management.indd 2 22/01/2018 13:36 Defining a successful business 3 In fulfilling the strategic aims of the company, the board will be responsible for making sure not only that the company has the necessary resources in terms of investment, assets and people, but also that there are appropriate operating controls and procedures for managing business risk and making sure that all monies that flow through the business are properly accounted for. What is a successful business? The media love to report on successful entrepreneurs and tell of how they beat the odds as they built their business and became household names. The media also enjoy revelling in the collapse of mighty organisations and unpicking the journey to their downfall. So what is it that defines business success or failure? Many descriptions are used to describe success, including “the business is profitable”, “revenue is growing” and “the share price is rising”. All these attributes are elements of success, though individually they do not embrace the totality. To be successful in business is to “create a sustainable superior return on investment”. The core element of this definition is “return on investment” (ROI). The business, having been built from money provided by investors, has a responsibility to reward those investors for risking their money in the venture. The ROI is a measure of the reward being generated. The concept is similar to a savings account, where an amount of money is placed on deposit with a bank and the investor earns interest on it. Despite the banking crisis of 2008 and its aftermath, the investment in a savings account is still seen as low risk and consequently the return that the investor will make is similarly low. Therefore, if a deposit of $1,000 is placed in a bank and the gross interest earned over a year is $30, the ROI can be expressed as being 3%. For a business to be successful it needs to reward investors by making them wealthier than they would have been by putting their money in a savings account. Why should they accept the greater risk of investing in a business, with all the uncertainty it faces, if they are 2017 Guide Financial Management.indd 3 22/01/2018 13:36 4 guide to financial management not going to be any better off? The return that investors would require might be double or more than a savings account, depending on the perceived risk, which will be related to factors such as the nature and maturity of the business. The return in a business is derived from the profit it generates compared with the money invested to achieve that profit. Therefore, if investors place $1,000 in a business and the operating profit over a year is $200, the ROI can be expressed as being 20%. Some examples of the returns achieved by companies in 2016 and stated in their annual reports are Walmart (a retailer) 15.5%, ExxonMobil (an oil company) 3.9% and Anglo American (an international mining company) 11.0%. Generating a “superior” return is to achieve a ROI that is greater than the rate achieved by businesses running similar activities in similar markets, and so to be successful is to generate a return that is at least as good as that achieved by your competitors, but ideally better than them. A “sustainable” superior return is perhaps the most difficult objective to achieve. It means generating a superior rate of return year in, year out. A business may be flying high when its products or services are in fashion. But the fall can be swift when its products or services are no longer in vogue and the business has gone from producing superior returns to producing inferior ones. To be sustainable is to continuously develop the business proposition in a way that keeps customers buying the company’s products or services in preference to those of its competitors. Innovation, technology and cost reduction are all activities that can help maintain a sustainable return. For example, the returns generated by the mobile phone company Nokia in 2006 were almost 46%. They resulted from a pre-eminence in a growing market coupled with an ability to continue to introduce new technology and ignite passion for the company’s latest products. Subsequently, Nokia failed to offer leading technology and was late in offering smartphones. As a result, it lost customers and the superior returns declined; in 2012 Nokia reported losses of €2.3 billion and was finally bought by Microsoft in April 2014. At the same time as Nokia was declining, Apple, its American rival, was rising. The two companies’ ROI between 2006 and 2012 is shown in Figure 1.1. On creating a superior ROI the directors of a company have two choices. They can either distribute the wealth to the investors or retain it in the business. The second option depends on whether the directors can identify further investment opportunities that will create even more wealth in the future. Profits can be retained in a company while investment opportunities are identified. However, this is only in the short term as investors (particularly in public companies) will demand the cash be “earning or returning”. Wealth is created for investors in a business in two ways: ■ annual income – a distribution of profit to the investor (by way of a dividend); ■ capital growth – a reinvestment back in the business to increase its value (share price). Shareholder value The term “shareholder value” is also used to describe success. Two definitions of shareholder value are: ■ a concept that focuses strategic and operational decision-making on steadily increasing a company’s value for shareholders; ■ maximising shareholder benefit by focusing on raising company earnings and the share price. These definitions focus more on increasing the value of a business in the long term rather than delivering a profit in the short term. An example would be Amazon, one of the best-known online retailers, where the initial strategy was to invest in building the distribution network and customer base as the foundation of the business. Once customer numbers grew the profits would emerge. Throughout its early years the company was creating long-term value while making large losses. During this period Amazon’s share price was volatile as it reflected changing views on the future benefits that would arise for investors. For a mature business, an example would be its investment in research and development to provide the products and revenue streams of the future. This investment can create shareholder value because of the potential it is judged to provide. However, the danger is that success is built on a future promise, and in a fast-changing world the future is always uncertain. For example, AstraZeneca, a pharmaceutical company, had taken years to develop a new lung cancer drug only to find in July 2017 that the trials had failed: its share price fell 16% in one day. For a company that is quoted on a stock market, there is the expectation to achieve a sufficient ROI every year while also investing to create future value. Once the business has started to make profits, any performance that is worse than the previous year is likely to meet with an adverse reaction from analysts and investors, which in many instances can lead to a forced change of management. In February 2017 Unilever, a food company, defended a hostile bid from Kraft Foods on the basis that it would complete a “comprehensive review of options available to accelerate delivery of value for the benefit of our shareholders”. Like all other global companies, it battles to produce the ever more superior results that stockmarket investors look for. The details of the measures used to monitor ROI and shareholder value creation are explained in Chapter 14.
Only use information from the supplied context. Do not use outside information. Do not use extraneous text. Use bullets in at least some capacity to answer the questions. Your response should be under 100 words. What are the five broad categories of business? Defining a successful business EVERY ENTREPRENEUR ASPIRES to create a successful business, and investors certainly want management to run successful businesses. So what determines whether a business is being successful? Before answering this question, it is helpful to define what a business is and the various forms it can take. A business is a commercial operation that provides products or services with the aim of making a profit for the benefit of its owners. The significant point is “for the benefit of its owners”, which differentiates it from a government or not-for-profit organisation, such as a charity, where the activity is conducted for the benefit of the people it serves. A profit is an essential element of running a successful business. It is a trading surplus whereby the revenues earned exceed the costs. This surplus belongs to the owners of the business to use as they choose: to take for themselves, to reinvest back in the business, or a mixture of the two. For a government organisation or charity, any surplus is reinvested in the activities to further benefit the people it serves. Business structure A business can take many forms, ranging from a sole trader to a large multinational company. The principal aim of making a profit for its owners is still the same. A person starting out and setting up a business will take all the risk and reward as the venture gets under way. As the business grows it can be advantageous to share the risk with others and separate the business activities from those of the owner by establishing a company. A company is a legal entity in its own right that is separate from its 2017 Guide Financial Management.indd 1 22/01/2018 13:36 2 guide to financial management owners. An investor is risking only the money paid for buying some shares in the company. If the company ceases trading, the shareholders (owners) are not liable to make up any shortfall between the value of the company’s assets and its liabilities. There are five broad categories of business: ■ Sole trader. Someone who sets up a business alone and takes all the risk and reward of running it, and who may employ staff. ■ Partnership. Two or more people who set up a business together. The partners have joint ownership and share the risk and reward of running the business. Like a sole trader they may employ staff. ■ Limited liability partnership (LLP). A hybrid of a partnership and a company which provides the owners with the limited risk of a company and the shared ownership and tax status of a partnership. ■ Private company. Usually a small organisation raising its money from a few private investors. The shares may be difficult to trade as they are not listed on any stock market. Investors’ liability in private and public companies is limited to the amount of their investment. ■ Public company. Typically a large organisation that is usually listed on a stock exchange. Because of its size it may require significant investment, and hence it may need to draw investment from many investors. In this book the focus is mainly on companies, though the principles can be equally well applied to a sole trader, a partnership and indeed not-for-profit organisations. The role of the board The directors of a company are people hired (and at times fired) by the shareholders to be stewards of their investment. However, they need to balance this with their primary fiduciary duty as a director, which is to act in the best interests of the company. Collectively, a board of directors has overall responsibility for running a company successfully. This is achieved by setting and implementing its strategy. 2017 Guide Financial Management.indd 2 22/01/2018 13:36 Defining a successful business 3 In fulfilling the strategic aims of the company, the board will be responsible for making sure not only that the company has the necessary resources in terms of investment, assets and people, but also that there are appropriate operating controls and procedures for managing business risk and making sure that all monies that flow through the business are properly accounted for. What is a successful business? The media love to report on successful entrepreneurs and tell of how they beat the odds as they built their business and became household names. The media also enjoy revelling in the collapse of mighty organisations and unpicking the journey to their downfall. So what is it that defines business success or failure? Many descriptions are used to describe success, including “the business is profitable”, “revenue is growing” and “the share price is rising”. All these attributes are elements of success, though individually they do not embrace the totality. To be successful in business is to “create a sustainable superior return on investment”. The core element of this definition is “return on investment” (ROI). The business, having been built from money provided by investors, has a responsibility to reward those investors for risking their money in the venture. The ROI is a measure of the reward being generated. The concept is similar to a savings account, where an amount of money is placed on deposit with a bank and the investor earns interest on it. Despite the banking crisis of 2008 and its aftermath, the investment in a savings account is still seen as low risk and consequently the return that the investor will make is similarly low. Therefore, if a deposit of $1,000 is placed in a bank and the gross interest earned over a year is $30, the ROI can be expressed as being 3%. For a business to be successful it needs to reward investors by making them wealthier than they would have been by putting their money in a savings account. Why should they accept the greater risk of investing in a business, with all the uncertainty it faces, if they are 2017 Guide Financial Management.indd 3 22/01/2018 13:36 4 guide to financial management not going to be any better off? The return that investors would require might be double or more than a savings account, depending on the perceived risk, which will be related to factors such as the nature and maturity of the business. The return in a business is derived from the profit it generates compared with the money invested to achieve that profit. Therefore, if investors place $1,000 in a business and the operating profit over a year is $200, the ROI can be expressed as being 20%. Some examples of the returns achieved by companies in 2016 and stated in their annual reports are Walmart (a retailer) 15.5%, ExxonMobil (an oil company) 3.9% and Anglo American (an international mining company) 11.0%. Generating a “superior” return is to achieve a ROI that is greater than the rate achieved by businesses running similar activities in similar markets, and so to be successful is to generate a return that is at least as good as that achieved by your competitors, but ideally better than them. A “sustainable” superior return is perhaps the most difficult objective to achieve. It means generating a superior rate of return year in, year out. A business may be flying high when its products or services are in fashion. But the fall can be swift when its products or services are no longer in vogue and the business has gone from producing superior returns to producing inferior ones. To be sustainable is to continuously develop the business proposition in a way that keeps customers buying the company’s products or services in preference to those of its competitors. Innovation, technology and cost reduction are all activities that can help maintain a sustainable return. For example, the returns generated by the mobile phone company Nokia in 2006 were almost 46%. They resulted from a pre-eminence in a growing market coupled with an ability to continue to introduce new technology and ignite passion for the company’s latest products. Subsequently, Nokia failed to offer leading technology and was late in offering smartphones. As a result, it lost customers and the superior returns declined; in 2012 Nokia reported losses of €2.3 billion and was finally bought by Microsoft in April 2014. At the same time as Nokia was declining, Apple, its American rival, was rising. The two companies’ ROI between 2006 and 2012 is shown in Figure 1.1. On creating a superior ROI the directors of a company have two choices. They can either distribute the wealth to the investors or retain it in the business. The second option depends on whether the directors can identify further investment opportunities that will create even more wealth in the future. Profits can be retained in a company while investment opportunities are identified. However, this is only in the short term as investors (particularly in public companies) will demand the cash be “earning or returning”. Wealth is created for investors in a business in two ways: ■ annual income – a distribution of profit to the investor (by way of a dividend); ■ capital growth – a reinvestment back in the business to increase its value (share price). Shareholder value The term “shareholder value” is also used to describe success. Two definitions of shareholder value are: ■ a concept that focuses strategic and operational decision-making on steadily increasing a company’s value for shareholders; ■ maximising shareholder benefit by focusing on raising company earnings and the share price. These definitions focus more on increasing the value of a business in the long term rather than delivering a profit in the short term. An example would be Amazon, one of the best-known online retailers, where the initial strategy was to invest in building the distribution network and customer base as the foundation of the business. Once customer numbers grew the profits would emerge. Throughout its early years the company was creating long-term value while making large losses. During this period Amazon’s share price was volatile as it reflected changing views on the future benefits that would arise for investors. For a mature business, an example would be its investment in research and development to provide the products and revenue streams of the future. This investment can create shareholder value because of the potential it is judged to provide. However, the danger is that success is built on a future promise, and in a fast-changing world the future is always uncertain. For example, AstraZeneca, a pharmaceutical company, had taken years to develop a new lung cancer drug only to find in July 2017 that the trials had failed: its share price fell 16% in one day. For a company that is quoted on a stock market, there is the expectation to achieve a sufficient ROI every year while also investing to create future value. Once the business has started to make profits, any performance that is worse than the previous year is likely to meet with an adverse reaction from analysts and investors, which in many instances can lead to a forced change of management. In February 2017 Unilever, a food company, defended a hostile bid from Kraft Foods on the basis that it would complete a “comprehensive review of options available to accelerate delivery of value for the benefit of our shareholders”. Like all other global companies, it battles to produce the ever more superior results that stockmarket investors look for. The details of the measures used to monitor ROI and shareholder value creation are explained in Chapter 14.
Answer the question based solely on the information provided in the passage. Do not use any external knowledge or resources. [user request] [context document]
I want my case thrown out. The man that is representing me comes to court drunk and has mishandled evidence needed to acquit me. How can I get the judge to throw it out and expunge my record in Texas?
Can the Judge Dismiss a Case in Texas? Written by The Law Office of David White PLLC: Austin Criminal Lawyer, reviewed by David D. White May 18, 2024 can the judge dismiss a case Yes, the decision to dismiss a criminal case can lie within the discretion of the judge overseeing the proceedings. So can the judge dismiss a case in Texas?, well a case dismissal occurs when the court ends legal proceedings prematurely, effectively terminating the case before reaching a verdict. This can happen at any stage of the legal process, from the initial filing of charges to the trial itself. A dismissal is the optimal outcome for the defendant, as it means the case is dropped and no further action is taken. However, it’s essential to note that a dismissal does not mean the charge or arrest or citation are expunged from your record. For the best chance of having charges dismissed in your criminal case or obtaining another favorable outcome, discuss your case with an Austin Criminal Defense Lawyer now. What is a Case Dismissal? A criminal case dismissal by a judge occurs when a judge determines that there is not enough evidence to proceed with the case or that the prosecution has failed to meet its burden of proof beyond a reasonable doubt. A dismissal does not necessarily mean that the defendant is innocent or that they did not commit the alleged offense. Instead, it reflects the judge’s determination that the evidence presented by the prosecution is not sufficient to proceed with the case. In some instances, a dismissal may also occur if there are procedural errors or violations of the defendant’s constitutional rights. If you are facing criminal charges, you need a skilled attorney who can aggressively advocate for your rights and work toward the best possible outcome for your case. An experienced criminal defense attorney can assess the strength of the evidence against you, identify potential weaknesses in the prosecution’s case, and present persuasive arguments to the judge in support of a dismissal. Remember, each case is different and will require its own strategic defense tailored to your specific circumstances. Part of your defense lawyer’s job is to determine whether there are grounds for dismissal and take appropriate action, so you want a skilled attorney working on your case as soon as possible. Seeking a Dismissal from the Judge in Criminal Court Judges have the authority to dismiss cases, but they only do so under certain circumstances. They consider the facts presented, evaluate legal arguments, and assess the overall fairness and integrity of the case. Ultimately, the judge’s primary responsibility is to administer justice and ensure the proper functioning of the legal system. However, a judge will not review a case for errors or deficiencies on their own. Instead, your criminal defense lawyer will need to petition the court to dismiss the case by filing a proper motion. This motion must set forth the facts and arguments supporting the dismissal. Motion practice in a criminal case involves complicated legal requirements and procedures. You need an experienced defense attorney on board in your case right away, so they can identify any grounds for a possible dismissal and file persuasive motions with the court. If My Case is Dismissed, Will it Still Be in my File? While a case dismissal can be a favorable outcome, it’s important to understand that it does not automatically erase the charges from your record. In Texas, dismissed cases are typically still part of your criminal record, but they may be eligible for expunction or nondisclosure in certain circumstances. Expunction completely removes the record of the case, as if it never happened, while nondisclosure limits access to the record by most employers and the public. To determine if your case is eligible for expunction or nondisclosure, it is advisable to consult with an experienced Austin criminal defense attorney who can guide you through the process. You Need a Tough, Skilled Criminal Defense Lawyer in Austin, Texas Navigating the legal system can be overwhelming, especially when you’re hoping for a case dismissal in Texas. That’s where The Law Office of David D. White: Austin Criminal Lawyer comes in. Our experienced Austin criminal defense attorneys are dedicated to helping individuals like you overcome legal challenges and achieve the best possible outcome. To get the answers you need and start building your defense, contact our offices today and schedule a free, no-pressure consultation. David D. White
Answer the question based solely on the information provided in the passage. Do not use any external knowledge or resources. I want my case thrown out. The man that is representing me comes to court drunk and has mishandled evidence needed to acquit me. How can I get the judge to throw it out and expunge my record in Texas? Can the Judge Dismiss a Case in Texas? Written by The Law Office of David White PLLC: Austin Criminal Lawyer, reviewed by David D. White May 18, 2024 can the judge dismiss a case Yes, the decision to dismiss a criminal case can lie within the discretion of the judge overseeing the proceedings. So can the judge dismiss a case in Texas?, well a case dismissal occurs when the court ends legal proceedings prematurely, effectively terminating the case before reaching a verdict. This can happen at any stage of the legal process, from the initial filing of charges to the trial itself. A dismissal is the optimal outcome for the defendant, as it means the case is dropped and no further action is taken. However, it’s essential to note that a dismissal does not mean the charge or arrest or citation are expunged from your record. For the best chance of having charges dismissed in your criminal case or obtaining another favorable outcome, discuss your case with an Austin Criminal Defense Lawyer now. What is a Case Dismissal? A criminal case dismissal by a judge occurs when a judge determines that there is not enough evidence to proceed with the case or that the prosecution has failed to meet its burden of proof beyond a reasonable doubt. A dismissal does not necessarily mean that the defendant is innocent or that they did not commit the alleged offense. Instead, it reflects the judge’s determination that the evidence presented by the prosecution is not sufficient to proceed with the case. In some instances, a dismissal may also occur if there are procedural errors or violations of the defendant’s constitutional rights. If you are facing criminal charges, you need a skilled attorney who can aggressively advocate for your rights and work toward the best possible outcome for your case. An experienced criminal defense attorney can assess the strength of the evidence against you, identify potential weaknesses in the prosecution’s case, and present persuasive arguments to the judge in support of a dismissal. Remember, each case is different and will require its own strategic defense tailored to your specific circumstances. Part of your defense lawyer’s job is to determine whether there are grounds for dismissal and take appropriate action, so you want a skilled attorney working on your case as soon as possible. Seeking a Dismissal from the Judge in Criminal Court Judges have the authority to dismiss cases, but they only do so under certain circumstances. They consider the facts presented, evaluate legal arguments, and assess the overall fairness and integrity of the case. Ultimately, the judge’s primary responsibility is to administer justice and ensure the proper functioning of the legal system. However, a judge will not review a case for errors or deficiencies on their own. Instead, your criminal defense lawyer will need to petition the court to dismiss the case by filing a proper motion. This motion must set forth the facts and arguments supporting the dismissal. Motion practice in a criminal case involves complicated legal requirements and procedures. You need an experienced defense attorney on board in your case right away, so they can identify any grounds for a possible dismissal and file persuasive motions with the court. If My Case is Dismissed, Will it Still Be in my File? While a case dismissal can be a favorable outcome, it’s important to understand that it does not automatically erase the charges from your record. In Texas, dismissed cases are typically still part of your criminal record, but they may be eligible for expunction or nondisclosure in certain circumstances. Expunction completely removes the record of the case, as if it never happened, while nondisclosure limits access to the record by most employers and the public. To determine if your case is eligible for expunction or nondisclosure, it is advisable to consult with an experienced Austin criminal defense attorney who can guide you through the process. You Need a Tough, Skilled Criminal Defense Lawyer in Austin, Texas Navigating the legal system can be overwhelming, especially when you’re hoping for a case dismissal in Texas. That’s where The Law Office of David D. White: Austin Criminal Lawyer comes in. Our experienced Austin criminal defense attorneys are dedicated to helping individuals like you overcome legal challenges and achieve the best possible outcome. To get the answers you need and start building your defense, contact our offices today and schedule a free, no-pressure consultation. David D. White https://www.wm-attorneys.com/can-the-judge-dismiss-a-case/#:~:text=A%20criminal%20case%20dismissal%20by,proof%20beyond%20a%20reasonable%20doubt.
Your response must solely be based on the prompt. External resources and prior knowledge must not be used.
Summarize this.
On March 18, 2022, the Department of Justice (DOJ), the agency mainly charged with enforcing the ADA, issued nonbinding web accessibility guidance for public accommodations (covered under ADA’sTitle III) and local governments (under ADA’s Title II). The guidance addresses, among other things, how public accommodations can make accessible the goods and services they offer online, although it does not provide detailed standards. The guidance offers a one-page summary of how to make a website accessible, emphasizing website providers’ “flexibility in how they comply.” WCAG and the federal government's Section 508 rules for its own websites are cited as “helpful guidance.” The limited 2022 guidance contrasts with the DOJ’s efforts in years past. In 2010, DOJ published an Advance Notice of Proposed Rulemaking providing detailed standards for website accessibility. Then, in 2017, it withdrew its regulatory proposals for websites, stating that it was “evaluating whether promulgating regulations about the accessibility of Web information and services is necessary and appropriate.” Aside from referring to WCAG and Section 508 guidelines, the 2022 DOJ guidance lists specific accessibility features web providers must consider. These include color contrast in text; text alternatives(descriptions of visual features that a screen reader can announce); captions for visual access to audio content; labels and other formatting for online forms; keyboard navigation; and a way to report accessibility issues. The DOJ guidance emphasizes that its summary “is not a complete list of things to consider.” And especially when it comes to
Your response must solely be based on the prompt. External resources and prior knowledge must not be used. Summarize this. On March 18, 2022, the Department of Justice (DOJ), the agency mainly charged with enforcing the ADA, issued nonbinding web accessibility guidance for public accommodations (covered under ADA’sTitle III) and local governments (under ADA’s Title II). The guidance addresses, among other things, how public accommodations can make accessible the goods and services they offer online, although it does not provide detailed standards. The guidance offers a one-page summary of how to make a website accessible, emphasizing website providers’ “flexibility in how they comply.” WCAG and the federal government's Section 508 rules for its own websites are cited as “helpful guidance.” The limited 2022 guidance contrasts with the DOJ’s efforts in years past. In 2010, DOJ published an Advance Notice of Proposed Rulemaking providing detailed standards for website accessibility. Then, in 2017, it withdrew its regulatory proposals for websites, stating that it was “evaluating whether promulgating regulations about the accessibility of Web information and services is necessary and appropriate.” Aside from referring to WCAG and Section 508 guidelines, the 2022 DOJ guidance lists specific accessibility features web providers must consider. These include color contrast in text; text alternatives(descriptions of visual features that a screen reader can announce); captions for visual access to audio content; labels and other formatting for online forms; keyboard navigation; and a way to report accessibility issues. The DOJ guidance emphasizes that its summary “is not a complete list of things to consider.” And especially when it comes to
In your answer, refer only to the context document. Do not employ any outside knowledge
Based on the provided context, what are some ways the City of Stronghold helps small businesses?
**Small Business Startup/Management Guide** The Strongsville Business Startup & Management Guide Section Page # Small Business Readiness Assessment Tool……1 Small Business Planning Resources………...….2 State & County Financing Programs..………….3 Opportunities Within the City of Strongsville….4 Northeast Ohio Technology Incubators………...5 Workforce Development & Export Assistance…6 Additional Resources…………………………...7 Contact Information…………………...………..8 Entrepreneurship and small business development are critical to the sustainability of any community and the City of Strongsville is committed to helping local business men and women succeed through the challenge of starting and maintaining a small business. This document is designed to be a start-up guide rich with resources to help you on your journey to business ownership. I hope you find the following information helpful and please do not hesitate to contact me if I can be of assistance. Brent Painter Director of Economic Development City of Strongsville (440) 580-3118 [email protected] i. Table of Contents Small Business Readiness Assessment Tool (SBAT) Developed by the Small Business Administration (SBA), the Small Business Readiness Assessment Tool (SBAT) is an interactive questionnaire developed to assess an entrepreneur’s readiness to start a business. Questions within the SBAT are designed to evaluate the user’s skills, personal characteristics, and experience in relation to their preparedness to start a business. After the questionnaire is completed the results are tallied and an assessment profile is provided. The user is also supplied a statement of “Suggested Next Steps” and links to free online courses and counseling. To complete the Small Business Readiness Assessment Tool please select the web address below: https://eweb1.sba.gov/cams/training/business_primer/assessment.htm *The SBAT is an automated self-assessment tool. None of the information provided is collected, tabulated, or utilized by the SBA or any other organization. 1 Starting a small business is a risk. Studies reveal that the common causes of business failure, in particular small business, are:  Poor Location  Lack of Research Regarding Market Potential  Over Optimistic Business Plans  Poor evaluation of Competition  Lack of Unique Selling Proposition (USP)  Lack of Marketing Expertise  Conflict with Partners  Failure to Put Forth Required Time and Effort  Insufficient Capital to Grow the Business  Inefficient Employees Careful planning and the utilization of available expertise are essential to the success of any new business. The first step within the planning process is to assess the entrepreneur’s readiness to expend the necessary resources to create and grow a prosperous small business. Small Business Readiness State of Ohio’s 1st Stop Business Connection (614) 466-4232 At the 1st Stop Business Connection website an entrepreneur will be guided through a six step process that will help them create a free business information kit containing state-level instructions regarding starting a business in Ohio. The business information kit includes:  A checklist detailing State of Ohio requirements & regulations for the specified industry  Instructions for applying for an Employer Identification Number (EIN)  Business name registration instructions  Workers Compensation information  And more One-on-One Small Business Counseling The Cleveland Small Business Administration (SBA) Office (216) 522-4180 The Small Business Administration is a federal government agency that was created to aid, counsel, assist, and protect the interests of small businesses, preserve free competitive enterprise, and maintain and strengthen the overall U.S. economy. The Cleveland SBA Office assists entrepreneurs through training, counseling, and business development programs including loan guaranties. For further detail on the Cleveland SBA please select the link listed below: www.sba.gov/localresources/district/oh/cleveland/index.html The Small Business Development Center (SBDC) of Cleveland (216) 987-2969 The Small Business Development Center of Cleveland is a division of the Ohio Department of Development whose mission is to contribute to the economic growth in the Greater Cleveland market by providing a one-stop business information portal and hands-on education throughout the entire lifecycle of a small business. To learn more about the Cleveland SBDC and schedule an appointment for free counseling please visit the link listed below: www.entrepreneurohio.org/center.aspx?center=17087&subloc=1 2 Small Business Planning Resources 3 JobsOhio (614) 224-6446 JobsOhio offers a wide range of financing options for companies looking to start, relocate, and expand within Ohio. To learn more about JobsOhio and State Incentive Programs please select the link listed below: https://www.jobsohio.com/ State of Ohio: Treasurer’s Office (614) 466-2160 The Treasurer’s GrowNOW interest rate reduction program is designed to help small businesses grow by providing them with critical cash flow. When a business is approved for a loan from one of the hundreds of eligible banks in Ohio, GrowNOW provides an additional three percent discount on the loan’s already negotiated interest rate, when the loan is linked to creating or saving jobs in Ohio. Select the link listed below to learn more regarding the Ohio Treasurer’s GrowNOW Program: tos.ohio.gov/grownow Cuyahoga County: Department of Development (216) 443-7260 The Cuyahoga County Department of Development offers various financing opportunities designed to create local business growth and enhanced employment opportunities within Cuyahoga County. Select the link listed below to learn more regarding the Cuyahoga County’s assistance programs: http://development.cuyahogacounty.us/en-US/Economic-Development-Programs.aspx State & County Financing Programs 4 Available Property Database The City of Strongsville, Department of Economic Development, maintains an available properties database to assist in the site selection process. Users can research available industrial & commercial land as well as retail, office, and industrial space within existing buildings. To view available properties within Strongsville please select the link listed below: www.strongsville.org/departments/economic-development/available-properties Tax Incentives The City of Strongsville has various tax incentive programs designed to benefit businesses who are relocating to Strongsville and expanding within the region. To review available tax incentives and eligibility requirements please select the link listed below: www.strongsville.org/departments/economic-development/tax-incentives The Strongsville Corporate Relocation Guide & Community Profile The Strongsville Corporate Relocation Guide & Community Profile describes the pro-business environment within the city and provides site selectors with the information most often requested. To download the Strongsville Corporate Relocation Guide select the link listed below: www.strongsville.org/departments/economic-development Demographics & Site Selector Resources Located on www.strongsville.org, the Demographics & Site Selectors Resources webpage provides information regarding demographic data, business & workforce reports, and specifics regarding the City of Strongsville, including distance to major markets, largest employers, and city traffic counts. To learn more select the link below: www.strongsville.org/departments/economic-development/community-profile *To relocate your business to Strongsville contact Brent Painter, Director of Economic Development, at (440) 580-3118 or at [email protected] www.strongsville.org The City of Strongsville 5 Manufacturing Advocacy & Growth Network (MAGNET) www.magnetwork.org 1768 East 25th Street Cleveland, Ohio 44114 (216) 432-4197 Great Lakes Incubator for Developing Enterprises (GLIDE) www.glideit.org 151 Innovation Drive, Suite 210 (Located at Lorain County Community College) Elyria, Ohio 44035 (440) 366-4310 Braintree Partners www.braintreepartners.org 201 East Fifth Street, Suite 100 Mansfield, Ohio 44901 (419) 525-1614 The Akron Global Business Accelerator www.akronaccelerator.com 526 South Main Street Akron, Ohio 44311 (330) 375-2173 Youngstown Business Incubator (YBI) www.ybi.org 241 Federal Plaza West Youngstown, Ohio 44503 (330) 746-5003 Jumpstart, Inc. www.jumpstartinc.org 737 Bolivar Road, Suite 3000 Cleveland, Ohio 44115 (216) 363-3400 The Northeast Ohio Edison Technology Incubator Program is designed to assist technology-oriented start-ups during their concept definition & development stages. A list of local incubators can be found below. Northeast Ohio’s Incubators 6 Export Assistance U.S. Export Assistance Cleveland Office The Cleveland U.S. Export Assistance Center (USEAC) is a division of the U.S. Depart of Commerce and provide comprehensive solutions to international trade challenges through expert counseling. To review the services and programs provided by the USEAC please visit the website listed below: www.export.gov/ohio/northernohio/ International Trade Assistance Center The International Trade Assistance Center (ITAC) provides export assistance services to small and medium sized businesses in order to promote growth through exports. To learn more about ITAC select the link listed below: www.csuohio.edu/business/global/international-trade-assistance-center Ohio Development Services Agency: Global Markets Division With 7 international offices, the Ohio Development Services Agency’s Global Markets Division’s goal is to develop new relationships in foreign countries that will benefit the export strategies of Ohio’s businesses. Select the link listed below to learn more about the Global Markets Division: http://development.ohio.gov/bs/bs_globalohio.htm Workforce Development OhioMeansJobs OhioMeansJobs is a collaborative workforce system within Cuyahoga County that helps local employers meet their human capital needs and assists job seekers in finding success. To learn more about OhioMeansJobs please select the link below: www.ohiomeansjobs.com Cuyahoga Community College Corporate College Cuyahoga Community College offers Northeast Ohio companies affordable, cutting-edge training programs that can be custom-designed to accommodate an employers workforce development needs through the Corporate College. To learn more about the Corporate College please select the link listed below: www.corporatecollege.com Polaris Career Center The Polaris Career Center Adult Education Department offers comprehensive education and training services. For more details please click the link listed below: www.polaris.edu/adult-education/ Workforce Development & Export Assistance
{question} ========== Based on the provided context, what are some ways the City of Stronghold helps small businesses? ---------- {task instructions} ========== In your answer, refer only to the context document. Do not employ any outside knowledge ---------- {passage} ========== **Small Business Startup/Management Guide** The Strongsville Business Startup & Management Guide Section Page # Small Business Readiness Assessment Tool……1 Small Business Planning Resources………...….2 State & County Financing Programs..………….3 Opportunities Within the City of Strongsville….4 Northeast Ohio Technology Incubators………...5 Workforce Development & Export Assistance…6 Additional Resources…………………………...7 Contact Information…………………...………..8 Entrepreneurship and small business development are critical to the sustainability of any community and the City of Strongsville is committed to helping local business men and women succeed through the challenge of starting and maintaining a small business. This document is designed to be a start-up guide rich with resources to help you on your journey to business ownership. I hope you find the following information helpful and please do not hesitate to contact me if I can be of assistance. Brent Painter Director of Economic Development City of Strongsville (440) 580-3118 [email protected] i. Table of Contents Small Business Readiness Assessment Tool (SBAT) Developed by the Small Business Administration (SBA), the Small Business Readiness Assessment Tool (SBAT) is an interactive questionnaire developed to assess an entrepreneur’s readiness to start a business. Questions within the SBAT are designed to evaluate the user’s skills, personal characteristics, and experience in relation to their preparedness to start a business. After the questionnaire is completed the results are tallied and an assessment profile is provided. The user is also supplied a statement of “Suggested Next Steps” and links to free online courses and counseling. To complete the Small Business Readiness Assessment Tool please select the web address below: https://eweb1.sba.gov/cams/training/business_primer/assessment.htm *The SBAT is an automated self-assessment tool. None of the information provided is collected, tabulated, or utilized by the SBA or any other organization. 1 Starting a small business is a risk. Studies reveal that the common causes of business failure, in particular small business, are:  Poor Location  Lack of Research Regarding Market Potential  Over Optimistic Business Plans  Poor evaluation of Competition  Lack of Unique Selling Proposition (USP)  Lack of Marketing Expertise  Conflict with Partners  Failure to Put Forth Required Time and Effort  Insufficient Capital to Grow the Business  Inefficient Employees Careful planning and the utilization of available expertise are essential to the success of any new business. The first step within the planning process is to assess the entrepreneur’s readiness to expend the necessary resources to create and grow a prosperous small business. Small Business Readiness State of Ohio’s 1st Stop Business Connection (614) 466-4232 At the 1st Stop Business Connection website an entrepreneur will be guided through a six step process that will help them create a free business information kit containing state-level instructions regarding starting a business in Ohio. The business information kit includes:  A checklist detailing State of Ohio requirements & regulations for the specified industry  Instructions for applying for an Employer Identification Number (EIN)  Business name registration instructions  Workers Compensation information  And more One-on-One Small Business Counseling The Cleveland Small Business Administration (SBA) Office (216) 522-4180 The Small Business Administration is a federal government agency that was created to aid, counsel, assist, and protect the interests of small businesses, preserve free competitive enterprise, and maintain and strengthen the overall U.S. economy. The Cleveland SBA Office assists entrepreneurs through training, counseling, and business development programs including loan guaranties. For further detail on the Cleveland SBA please select the link listed below: www.sba.gov/localresources/district/oh/cleveland/index.html The Small Business Development Center (SBDC) of Cleveland (216) 987-2969 The Small Business Development Center of Cleveland is a division of the Ohio Department of Development whose mission is to contribute to the economic growth in the Greater Cleveland market by providing a one-stop business information portal and hands-on education throughout the entire lifecycle of a small business. To learn more about the Cleveland SBDC and schedule an appointment for free counseling please visit the link listed below: www.entrepreneurohio.org/center.aspx?center=17087&subloc=1 2 Small Business Planning Resources 3 JobsOhio (614) 224-6446 JobsOhio offers a wide range of financing options for companies looking to start, relocate, and expand within Ohio. To learn more about JobsOhio and State Incentive Programs please select the link listed below: https://www.jobsohio.com/ State of Ohio: Treasurer’s Office (614) 466-2160 The Treasurer’s GrowNOW interest rate reduction program is designed to help small businesses grow by providing them with critical cash flow. When a business is approved for a loan from one of the hundreds of eligible banks in Ohio, GrowNOW provides an additional three percent discount on the loan’s already negotiated interest rate, when the loan is linked to creating or saving jobs in Ohio. Select the link listed below to learn more regarding the Ohio Treasurer’s GrowNOW Program: tos.ohio.gov/grownow Cuyahoga County: Department of Development (216) 443-7260 The Cuyahoga County Department of Development offers various financing opportunities designed to create local business growth and enhanced employment opportunities within Cuyahoga County. Select the link listed below to learn more regarding the Cuyahoga County’s assistance programs: http://development.cuyahogacounty.us/en-US/Economic-Development-Programs.aspx State & County Financing Programs 4 Available Property Database The City of Strongsville, Department of Economic Development, maintains an available properties database to assist in the site selection process. Users can research available industrial & commercial land as well as retail, office, and industrial space within existing buildings. To view available properties within Strongsville please select the link listed below: www.strongsville.org/departments/economic-development/available-properties Tax Incentives The City of Strongsville has various tax incentive programs designed to benefit businesses who are relocating to Strongsville and expanding within the region. To review available tax incentives and eligibility requirements please select the link listed below: www.strongsville.org/departments/economic-development/tax-incentives The Strongsville Corporate Relocation Guide & Community Profile The Strongsville Corporate Relocation Guide & Community Profile describes the pro-business environment within the city and provides site selectors with the information most often requested. To download the Strongsville Corporate Relocation Guide select the link listed below: www.strongsville.org/departments/economic-development Demographics & Site Selector Resources Located on www.strongsville.org, the Demographics & Site Selectors Resources webpage provides information regarding demographic data, business & workforce reports, and specifics regarding the City of Strongsville, including distance to major markets, largest employers, and city traffic counts. To learn more select the link below: www.strongsville.org/departments/economic-development/community-profile *To relocate your business to Strongsville contact Brent Painter, Director of Economic Development, at (440) 580-3118 or at [email protected] www.strongsville.org The City of Strongsville 5 Manufacturing Advocacy & Growth Network (MAGNET) www.magnetwork.org 1768 East 25th Street Cleveland, Ohio 44114 (216) 432-4197 Great Lakes Incubator for Developing Enterprises (GLIDE) www.glideit.org 151 Innovation Drive, Suite 210 (Located at Lorain County Community College) Elyria, Ohio 44035 (440) 366-4310 Braintree Partners www.braintreepartners.org 201 East Fifth Street, Suite 100 Mansfield, Ohio 44901 (419) 525-1614 The Akron Global Business Accelerator www.akronaccelerator.com 526 South Main Street Akron, Ohio 44311 (330) 375-2173 Youngstown Business Incubator (YBI) www.ybi.org 241 Federal Plaza West Youngstown, Ohio 44503 (330) 746-5003 Jumpstart, Inc. www.jumpstartinc.org 737 Bolivar Road, Suite 3000 Cleveland, Ohio 44115 (216) 363-3400 The Northeast Ohio Edison Technology Incubator Program is designed to assist technology-oriented start-ups during their concept definition & development stages. A list of local incubators can be found below. Northeast Ohio’s Incubators 6 Export Assistance U.S. Export Assistance Cleveland Office The Cleveland U.S. Export Assistance Center (USEAC) is a division of the U.S. Depart of Commerce and provide comprehensive solutions to international trade challenges through expert counseling. To review the services and programs provided by the USEAC please visit the website listed below: www.export.gov/ohio/northernohio/ International Trade Assistance Center The International Trade Assistance Center (ITAC) provides export assistance services to small and medium sized businesses in order to promote growth through exports. To learn more about ITAC select the link listed below: www.csuohio.edu/business/global/international-trade-assistance-center Ohio Development Services Agency: Global Markets Division With 7 international offices, the Ohio Development Services Agency’s Global Markets Division’s goal is to develop new relationships in foreign countries that will benefit the export strategies of Ohio’s businesses. Select the link listed below to learn more about the Global Markets Division: http://development.ohio.gov/bs/bs_globalohio.htm Workforce Development OhioMeansJobs OhioMeansJobs is a collaborative workforce system within Cuyahoga County that helps local employers meet their human capital needs and assists job seekers in finding success. To learn more about OhioMeansJobs please select the link below: www.ohiomeansjobs.com Cuyahoga Community College Corporate College Cuyahoga Community College offers Northeast Ohio companies affordable, cutting-edge training programs that can be custom-designed to accommodate an employers workforce development needs through the Corporate College. To learn more about the Corporate College please select the link listed below: www.corporatecollege.com Polaris Career Center The Polaris Career Center Adult Education Department offers comprehensive education and training services. For more details please click the link listed below: www.polaris.edu/adult-education/ Workforce Development & Export Assistance
Use information from the article only to explain your answer. Do not rely on outside knowledge.
What are three advantages of Trusts when planning your estate?
Raymond James & Associates, Inc. Tandy G. Lewis, CFP®, WMS Managing Director, Investments 333 Texas Street, Suite 175 Shreveport, LA 71101 318-677-5518 866-297-6576 [email protected] https://bowenlewis.com Estate Planning Basics April 26, 2016 Estate Planning--An Introduction By definition, estate planning is a process designed to help you manage and preserve your assets while you are alive, and to conserve and control their distribution after your death according to your goals and objectives. But what estate planning means to you specifically depends on who you are. Your age, health, wealth, lifestyle, life stage, goals, and many other factors determine your particular estate planning needs. For example, you may have a small estate and may be concerned only that certain people receive particular things. A simple will is probably all you'll need. Or, you may have a large estate, and minimizing any potential estate tax impact is your foremost goal. Here, you'll need to use more sophisticated techniques in your estate plan, such as a trust. To help you understand what estate planning means to you, the following sections address some estate planning needs that are common among some very broad groups of individuals. Think of these suggestions as simply a point in the right direction, and then seek professional advice to implement the right plan for you. Over 18 Since incapacity can strike anyone at anytime, all adults over 18 should consider having: • A durable power of attorney: This document lets you name someone to manage your property for you in case you become incapacitated and cannot do so. • An advanced medical directive: The three main types of advanced medical directives are (1) a living will, (2) a durable power of attorney for health care (also known as a health-care proxy), and (3) a Do Not Resuscitate order. Be aware that not all states allow each kind of medical directive, so make sure you execute one that will be effective for you. Young and single If you're young and single, you may not need much estate planning. But if you have some material possessions, you should at least write a will. If you don't, the wealth you leave behind if you die will likely go to your parents, and that might not be what you would want. A will lets you leave your possessions to anyone you choose (e.g., your significant other, siblings, other relatives, or favorite charity). Unmarried couples You've committed to a life partner but aren't legally married. For you, a will is essential if you want your property to pass to your partner at your death. Without a will, state law directs that only your closest relatives will inherit your property, and your partner may get nothing. If you share certain property, such as a house or car, you might consider owning the property as joint tenants with rights of survivorship. That way, when one of you dies, the jointly held property will pass to the surviving partner automatically. Married couples For many years, married couples had to do careful estate planning, such as the creation of a credit shelter trust, in order to take advantage of their combined federal estate tax exclusions. A new law passed in 2010 allows the executor of a deceased spouse's estate to transfer any unused estate tax exclusion amount to the surviving spouse without such planning. This provision is effective for estates of decedents dying in 2011 and later years. You may be inclined to rely on these portability rules for estate tax avoidance, using outright bequests to your spouse instead of traditional trust planning. However, portability should not be relied upon solely for utilization of the first to die's estate tax exemption, and a credit shelter trust created at the first spouse's death may still be advantageous for several reasons: • Portability may be lost if the surviving spouse remarries and is later widowed again • The trust can protect any appreciation of assets from estate tax at the second spouse's death • The trust can provide protection of assets from the reach of the surviving spouse's creditors • Portability does not apply to the generation-skipping transfer (GST) tax, so the trust may be needed to fully leverage the GST exemptions of both spouses Married couples where one spouse is not a U.S. citizen have special planning concerns. The marital deduction is not allowed if the recipient spouse is a non-citizen spouse, but a $148,000 (in 2016, $147,000 in 2015) annual exclusion is allowed. If certain requirements By definition, estate planning is a process designed to help you manage and preserve your assets while you are alive, and to conserve and control their distribution after your death according to your goals and objectives. Page 2 of 7, see disclaimer on final page are met, however, a transfer to a qualified domestic trust (QDOT) will qualify for the marital deduction. Married with children If you're married and have children, you and your spouse should each have your own will. For you, wills are vital because you can name a guardian for your minor children in case both of you die simultaneously. If you fail to name a guardian in your will, a court may appoint someone you might not have chosen. Furthermore, without a will, some states dictate that at your death some of your property goes to your children and not to your spouse. If minor children inherit directly, the surviving parent will need court permission to manage the money for them. You may also want to consult an attorney about establishing a trust to manage your children's assets. You may also need life insurance. Your surviving spouse may not be able to support the family on his or her own and may need to replace your earnings to maintain the family. Comfortable and looking forward to retirement You've accumulated some wealth and you're thinking about retirement. Here's where estate planning overlaps with retirement planning. It's just as important to plan to care for yourself during your retirement as it is to plan to provide for your beneficiaries after your death. You should keep in mind that even though Social Security may be around when you retire, those benefits alone may not provide enough income for your retirement years. Wealthy and worried Depending on the size of your estate, you may need to be concerned about estate taxes. Estates of $5,450,000 (in 2016, $5,430,000 in 2015) are effectively exempt from the federal gift and estate tax. Estates over that amount may be subject to the tax at a top rate of 40 percent. Similarly, there is another tax, called the generation-skipping transfer (GST) tax, that is imposed on transfers of wealth that are made to grandchildren (and lower generations). The GST tax exemption is $5,450,000 (in 2016, $5,430,000 in 2015) and the GST tax rate is 40 percent. Whether your estate will be subject to state death taxes depends on the size of your estate and the tax laws in effect in the state in which you are domiciled. Elderly or ill If you're elderly or ill, you'll want to write a will or update your existing one, consider a revocable living trust, and make sure you have a durable power of attorney and a health-care directive. Talk with your family about your wishes, and make sure they have copies of your important papers or know where to locate them. Consider saving some of your accumulated wealth using other retirement and deferred vehicles, such as an individual retirement account (IRA). Page 3 of 7, see disclaimer on final page Steps to Estate Planning Success Estate Planning Pyramid Page 4 of 7, see disclaimer on final page Advantages of Trusts Why you might consider discussing trusts with your attorney • Trusts may be used to minimize estate taxes for married individuals with substantial assets. • Trusts provide management assistance for your heirs.* • Contingent trusts for minors (which take effect in the event that both parents die) may be used to avoid the costs of having a court-appointed guardian to manage your children's assets. • Properly funded trusts avoid many of the administrative costs of probate (e.g., attorney fees, document filing fees). • Generally, revocable living trusts will keep the distribution of your estate private. • Trusts can be used to dispense income to • Trusts can ensure that assets go to your intended beneficiaries. For example, if you have children from a prior marriage you can make sure that they, as well as a current spouse, are provided for. • Trusts can minimize income taxes by allowing the shifting of income among beneficiaries. • Properly structured irrevocable life insurance trusts can provide liquidity for estate settlement needs while removing the policy proceeds from estate taxation at the death of the insured. *This is particularly important for minors and incapacitated adults who may need support, maintenance, and/or education over a long period of time, or for adults who have difficulty managing money. intermediate beneficiaries (e.g., children, elderly parents) before final property distribution. Conducting a Periodic Review of Your Estate Plan With your estate plan successfully implemented, one final but critical step remains: carrying out a periodic review and update. Imagine this: since you implemented your estate plan five years ago, you got divorced and remarried, sold your house and bought a boat to live on, sold your legal practice and invested the money that provides you with enough income so you no longer have to work, and reconciled with your estranged daughter. This scenario may look more like fantasy than reality, but imagine how these major changes over a five-year period may affect your estate. And that's without considering changes in tax laws, the stock market, the economic climate, or other external factors. After all, if the only constant is change, it isn't unreasonable to speculate that your wishes have changed, the advantages you sought have eroded or vanished, or even that new opportunities now exist that could offer a better value for your estate. A periodic review can give you peace of mind. When should you conduct a review of your estate plan? Every year for large estates Those of you with large estates (i.e., more than the federal or your state's exemption amount, whichever is smaller) should review your plan annually or at certain life events that are suggested in the following paragraphs. Not a year goes by without significant changes in the tax laws. You need to stay on top of these to get the best results. Every five years for small estates Those of you with smaller estates (under the applicable exclusion amount) need only review every five years or following changes in your life events. Your estate will not be as affected by economic factors and changes in the tax laws as a larger estate might be. However, your personal situation is bound to change, and reviewing every five years will bring your plan up to date with your current situation. Upon changes in estate valuation If the value of your estate has changed more than 20 percent over the last two years, you may need to update your estate plan. Upon economic changes You need to review your estate plan if there has been a change in the value of your assets or your income level or requirements, or if you are retiring. What is a trust? A trust is a legal entity that is created for the purpose of transferring property to a trustee for the benefit of a third person (beneficiary). The trustee manages the property for the beneficiary according to the terms specified in the trust With your estate plan successfully implemented, one final but critical step remains: carrying out a periodic review and update. Page 5 of 7, see disclaimer on final page Upon changes in occupation or employment If you or your spouse changed jobs, you may need to make revisions in your estate plan. Upon changes in family situations You need to update your plan if: (1) your (or your children's or grandchildren's) marital status has changed, (2) a child (or grandchild) has been born or adopted, (3) your spouse, child, or grandchild has died, (4) you or a close family member has become ill or incapacitated, or (5) other individuals (e.g., your parents) have become dependent on you. Upon changes in your closely held business interest A review is in order if you have: (1) formed, purchased, or sold a closely held business, (2) reorganized or liquidated a closely held business, (3) instituted a pension plan, (4) executed a buy-sell agreement, (5) deferred compensation, or (6) changed employee benefits. Upon changes in the estate plan Of course, if you make a change in part of your estate plan (e.g., create a trust, execute a codicil, etc.), you should review the estate plan as a whole to ensure that it remains cohesive and effective. Upon major transactions Be sure to check your plan if you have: (1) Upon changes in insurance coverage Making changes in your insurance coverage may change your estate planning needs or may make changes necessary. Therefore, inform your estate planning advisor if you make any change to life insurance, health insurance, disability insurance, medical insurance, liability insurance, or beneficiary designations. Upon death of trustee/executor/guardian If a designated trustee, executor, or guardian dies or changes his or her mind about serving, you need to revise the parts of your estate plan affected (e.g., the trust agreement and your will) to replace that individual. Upon other important changes None of us has a crystal ball. We can't think of all the conditions that should prompt us to review and revise our estate plans. Use your common sense. Have your feelings about charity changed? Has your son finally become financially responsible? Has your spouse's health been declining? Are your children through college now? All you need to do is give it a little thought from time to time, and take action when necessary. received a sizable inheritance, bequest, or similar disposition, (2) made or received substantial gifts, (3) borrowed or lent substantial amounts of money, (4) purchased, leased, or sold material assets or investments, (5) changed residences, (6) changed significant property ownership, or (7) become involved in a lawsuit. Page 6 of 7, see disclaimer on final page Raymond James & Associates, Inc. Tandy G. Lewis, CFP®, WMS Managing Director, Investments 333 Texas Street, Suite 175 Shreveport, LA 71101 318-677-5518 866-297-6576 [email protected] https://bowenlewis.com April 26, 2016 Prepared by Broadridge Investor Communication Solutions, Inc. Copyright 2016 This information was developed by Broadridge, an independent third party. It is general in nature, is not a complete statement of all information necessary for making an investment decision, and is not a recommendation or a solicitation to buy or sell any security. Investments and strategies mentioned may not be suitable for all investors. Past performance may not be indicative of future results. Raymond James & Associates, Inc. member New York Stock Exchange/SIPC does not provide advice on tax, legal or mortgage issues. These matters should be discussed with an appropriate professional. Page 7 of 7
Use information from the article only to explain your answer. Do not rely on outside knowledge. What are three advantages of Trusts when planning your estate? Raymond James & Associates, Inc. Tandy G. Lewis, CFP®, WMS Managing Director, Investments 333 Texas Street, Suite 175 Shreveport, LA 71101 318-677-5518 866-297-6576 [email protected] https://bowenlewis.com Estate Planning Basics April 26, 2016 Estate Planning--An Introduction By definition, estate planning is a process designed to help you manage and preserve your assets while you are alive, and to conserve and control their distribution after your death according to your goals and objectives. But what estate planning means to you specifically depends on who you are. Your age, health, wealth, lifestyle, life stage, goals, and many other factors determine your particular estate planning needs. For example, you may have a small estate and may be concerned only that certain people receive particular things. A simple will is probably all you'll need. Or, you may have a large estate, and minimizing any potential estate tax impact is your foremost goal. Here, you'll need to use more sophisticated techniques in your estate plan, such as a trust. To help you understand what estate planning means to you, the following sections address some estate planning needs that are common among some very broad groups of individuals. Think of these suggestions as simply a point in the right direction, and then seek professional advice to implement the right plan for you. Over 18 Since incapacity can strike anyone at anytime, all adults over 18 should consider having: • A durable power of attorney: This document lets you name someone to manage your property for you in case you become incapacitated and cannot do so. • An advanced medical directive: The three main types of advanced medical directives are (1) a living will, (2) a durable power of attorney for health care (also known as a health-care proxy), and (3) a Do Not Resuscitate order. Be aware that not all states allow each kind of medical directive, so make sure you execute one that will be effective for you. Young and single If you're young and single, you may not need much estate planning. But if you have some material possessions, you should at least write a will. If you don't, the wealth you leave behind if you die will likely go to your parents, and that might not be what you would want. A will lets you leave your possessions to anyone you choose (e.g., your significant other, siblings, other relatives, or favorite charity). Unmarried couples You've committed to a life partner but aren't legally married. For you, a will is essential if you want your property to pass to your partner at your death. Without a will, state law directs that only your closest relatives will inherit your property, and your partner may get nothing. If you share certain property, such as a house or car, you might consider owning the property as joint tenants with rights of survivorship. That way, when one of you dies, the jointly held property will pass to the surviving partner automatically. Married couples For many years, married couples had to do careful estate planning, such as the creation of a credit shelter trust, in order to take advantage of their combined federal estate tax exclusions. A new law passed in 2010 allows the executor of a deceased spouse's estate to transfer any unused estate tax exclusion amount to the surviving spouse without such planning. This provision is effective for estates of decedents dying in 2011 and later years. You may be inclined to rely on these portability rules for estate tax avoidance, using outright bequests to your spouse instead of traditional trust planning. However, portability should not be relied upon solely for utilization of the first to die's estate tax exemption, and a credit shelter trust created at the first spouse's death may still be advantageous for several reasons: • Portability may be lost if the surviving spouse remarries and is later widowed again • The trust can protect any appreciation of assets from estate tax at the second spouse's death • The trust can provide protection of assets from the reach of the surviving spouse's creditors • Portability does not apply to the generation-skipping transfer (GST) tax, so the trust may be needed to fully leverage the GST exemptions of both spouses Married couples where one spouse is not a U.S. citizen have special planning concerns. The marital deduction is not allowed if the recipient spouse is a non-citizen spouse, but a $148,000 (in 2016, $147,000 in 2015) annual exclusion is allowed. If certain requirements By definition, estate planning is a process designed to help you manage and preserve your assets while you are alive, and to conserve and control their distribution after your death according to your goals and objectives. Page 2 of 7, see disclaimer on final page are met, however, a transfer to a qualified domestic trust (QDOT) will qualify for the marital deduction. Married with children If you're married and have children, you and your spouse should each have your own will. For you, wills are vital because you can name a guardian for your minor children in case both of you die simultaneously. If you fail to name a guardian in your will, a court may appoint someone you might not have chosen. Furthermore, without a will, some states dictate that at your death some of your property goes to your children and not to your spouse. If minor children inherit directly, the surviving parent will need court permission to manage the money for them. You may also want to consult an attorney about establishing a trust to manage your children's assets. You may also need life insurance. Your surviving spouse may not be able to support the family on his or her own and may need to replace your earnings to maintain the family. Comfortable and looking forward to retirement You've accumulated some wealth and you're thinking about retirement. Here's where estate planning overlaps with retirement planning. It's just as important to plan to care for yourself during your retirement as it is to plan to provide for your beneficiaries after your death. You should keep in mind that even though Social Security may be around when you retire, those benefits alone may not provide enough income for your retirement years. Wealthy and worried Depending on the size of your estate, you may need to be concerned about estate taxes. Estates of $5,450,000 (in 2016, $5,430,000 in 2015) are effectively exempt from the federal gift and estate tax. Estates over that amount may be subject to the tax at a top rate of 40 percent. Similarly, there is another tax, called the generation-skipping transfer (GST) tax, that is imposed on transfers of wealth that are made to grandchildren (and lower generations). The GST tax exemption is $5,450,000 (in 2016, $5,430,000 in 2015) and the GST tax rate is 40 percent. Whether your estate will be subject to state death taxes depends on the size of your estate and the tax laws in effect in the state in which you are domiciled. Elderly or ill If you're elderly or ill, you'll want to write a will or update your existing one, consider a revocable living trust, and make sure you have a durable power of attorney and a health-care directive. Talk with your family about your wishes, and make sure they have copies of your important papers or know where to locate them. Consider saving some of your accumulated wealth using other retirement and deferred vehicles, such as an individual retirement account (IRA). Page 3 of 7, see disclaimer on final page Steps to Estate Planning Success Estate Planning Pyramid Page 4 of 7, see disclaimer on final page Advantages of Trusts Why you might consider discussing trusts with your attorney • Trusts may be used to minimize estate taxes for married individuals with substantial assets. • Trusts provide management assistance for your heirs.* • Contingent trusts for minors (which take effect in the event that both parents die) may be used to avoid the costs of having a court-appointed guardian to manage your children's assets. • Properly funded trusts avoid many of the administrative costs of probate (e.g., attorney fees, document filing fees). • Generally, revocable living trusts will keep the distribution of your estate private. • Trusts can be used to dispense income to • Trusts can ensure that assets go to your intended beneficiaries. For example, if you have children from a prior marriage you can make sure that they, as well as a current spouse, are provided for. • Trusts can minimize income taxes by allowing the shifting of income among beneficiaries. • Properly structured irrevocable life insurance trusts can provide liquidity for estate settlement needs while removing the policy proceeds from estate taxation at the death of the insured. *This is particularly important for minors and incapacitated adults who may need support, maintenance, and/or education over a long period of time, or for adults who have difficulty managing money. intermediate beneficiaries (e.g., children, elderly parents) before final property distribution. Conducting a Periodic Review of Your Estate Plan With your estate plan successfully implemented, one final but critical step remains: carrying out a periodic review and update. Imagine this: since you implemented your estate plan five years ago, you got divorced and remarried, sold your house and bought a boat to live on, sold your legal practice and invested the money that provides you with enough income so you no longer have to work, and reconciled with your estranged daughter. This scenario may look more like fantasy than reality, but imagine how these major changes over a five-year period may affect your estate. And that's without considering changes in tax laws, the stock market, the economic climate, or other external factors. After all, if the only constant is change, it isn't unreasonable to speculate that your wishes have changed, the advantages you sought have eroded or vanished, or even that new opportunities now exist that could offer a better value for your estate. A periodic review can give you peace of mind. When should you conduct a review of your estate plan? Every year for large estates Those of you with large estates (i.e., more than the federal or your state's exemption amount, whichever is smaller) should review your plan annually or at certain life events that are suggested in the following paragraphs. Not a year goes by without significant changes in the tax laws. You need to stay on top of these to get the best results. Every five years for small estates Those of you with smaller estates (under the applicable exclusion amount) need only review every five years or following changes in your life events. Your estate will not be as affected by economic factors and changes in the tax laws as a larger estate might be. However, your personal situation is bound to change, and reviewing every five years will bring your plan up to date with your current situation. Upon changes in estate valuation If the value of your estate has changed more than 20 percent over the last two years, you may need to update your estate plan. Upon economic changes You need to review your estate plan if there has been a change in the value of your assets or your income level or requirements, or if you are retiring. What is a trust? A trust is a legal entity that is created for the purpose of transferring property to a trustee for the benefit of a third person (beneficiary). The trustee manages the property for the beneficiary according to the terms specified in the trust With your estate plan successfully implemented, one final but critical step remains: carrying out a periodic review and update. Page 5 of 7, see disclaimer on final page Upon changes in occupation or employment If you or your spouse changed jobs, you may need to make revisions in your estate plan. Upon changes in family situations You need to update your plan if: (1) your (or your children's or grandchildren's) marital status has changed, (2) a child (or grandchild) has been born or adopted, (3) your spouse, child, or grandchild has died, (4) you or a close family member has become ill or incapacitated, or (5) other individuals (e.g., your parents) have become dependent on you. Upon changes in your closely held business interest A review is in order if you have: (1) formed, purchased, or sold a closely held business, (2) reorganized or liquidated a closely held business, (3) instituted a pension plan, (4) executed a buy-sell agreement, (5) deferred compensation, or (6) changed employee benefits. Upon changes in the estate plan Of course, if you make a change in part of your estate plan (e.g., create a trust, execute a codicil, etc.), you should review the estate plan as a whole to ensure that it remains cohesive and effective. Upon major transactions Be sure to check your plan if you have: (1) Upon changes in insurance coverage Making changes in your insurance coverage may change your estate planning needs or may make changes necessary. Therefore, inform your estate planning advisor if you make any change to life insurance, health insurance, disability insurance, medical insurance, liability insurance, or beneficiary designations. Upon death of trustee/executor/guardian If a designated trustee, executor, or guardian dies or changes his or her mind about serving, you need to revise the parts of your estate plan affected (e.g., the trust agreement and your will) to replace that individual. Upon other important changes None of us has a crystal ball. We can't think of all the conditions that should prompt us to review and revise our estate plans. Use your common sense. Have your feelings about charity changed? Has your son finally become financially responsible? Has your spouse's health been declining? Are your children through college now? All you need to do is give it a little thought from time to time, and take action when necessary. received a sizable inheritance, bequest, or similar disposition, (2) made or received substantial gifts, (3) borrowed or lent substantial amounts of money, (4) purchased, leased, or sold material assets or investments, (5) changed residences, (6) changed significant property ownership, or (7) become involved in a lawsuit. Page 6 of 7, see disclaimer on final page Raymond James & Associates, Inc. Tandy G. Lewis, CFP®, WMS Managing Director, Investments 333 Texas Street, Suite 175 Shreveport, LA 71101 318-677-5518 866-297-6576 [email protected] https://bowenlewis.com April 26, 2016 Prepared by Broadridge Investor Communication Solutions, Inc. Copyright 2016 This information was developed by Broadridge, an independent third party. It is general in nature, is not a complete statement of all information necessary for making an investment decision, and is not a recommendation or a solicitation to buy or sell any security. Investments and strategies mentioned may not be suitable for all investors. Past performance may not be indicative of future results. Raymond James & Associates, Inc. member New York Stock Exchange/SIPC does not provide advice on tax, legal or mortgage issues. These matters should be discussed with an appropriate professional. Page 7 of 7
Only use the provided text to respond. Do not use any outside sources.
What are the two options for license plate size?
Be it enacted by the Legislature of the State of Arizona: 2 Section 1. Section 28-2351, Arizona Revised Statutes, is amended to 3 read: 4 28-2351. License plate provided; design 5 A. Notwithstanding any other law, the department shall provide to 6 every owner one license plate for each vehicle registered. At the request 7 of the owner and on payment of a fee in an amount prescribed by the 8 director by rule, the department shall provide one additional license 9 plate for a vehicle for which a special plate is requested pursuant to 10 this chapter. 11 B. The license plate shall display the number assigned to the 12 vehicle and to the owner of the vehicle and the name of this state, which 13 may be abbreviated. The director shall coat the license plate with a 14 reflective material that is consistent with the determination of the 15 department regarding the color and design of license plates and special 16 plates. The director shall design the license plate and the letters and 17 numerals on the license plate to be of sufficient size to be plainly 18 readable during daylight from a distance of one hundred feet. In addition 19 to the standard license plate issued for a trailer before August 12, 2005, 20 the director shall issue a license plate for trailers that has a design 21 that is similar to the standard size license plate for trailers but that 22 is the same size as the license plate for motorcycles. The trailer owner 23 shall notify the department which size license plate the owner wants for 24 the trailer. 25 C. In addition to the requirements PRESCRIBED in subsection B of 26 this section, for all license plates, including all special plates, that 27 are designed or redesigned on or after September 24, 2022: 28 1. The background color of the license plate shall contrast 29 significantly with the color of the letters and numerals on the license 30 plate and with the name of this state on the license plate. 31 2. The name of this state shall appear on the license plate in 32 capital letters in sans serif font and be three-fourths of an inch in 33 height. 34 D. Notwithstanding any other law, the department shall not contract 35 with a nongovernmental entity to purchase or secure reflective material 36 for the plates issued by the department unless the department has made a 37 reasonable effort to secure qualified bids or proposals from as many 38 individual responsible respondents as possible.
Only use the provided text to respond. Do not use any outside sources. Be it enacted by the Legislature of the State of Arizona: 2 Section 1. Section 28-2351, Arizona Revised Statutes, is amended to 3 read: 4 28-2351. License plate provided; design 5 A. Notwithstanding any other law, the department shall provide to 6 every owner one license plate for each vehicle registered. At the request 7 of the owner and on payment of a fee in an amount prescribed by the 8 director by rule, the department shall provide one additional license 9 plate for a vehicle for which a special plate is requested pursuant to 10 this chapter. 11 B. The license plate shall display the number assigned to the 12 vehicle and to the owner of the vehicle and the name of this state, which 13 may be abbreviated. The director shall coat the license plate with a 14 reflective material that is consistent with the determination of the 15 department regarding the color and design of license plates and special 16 plates. The director shall design the license plate and the letters and 17 numerals on the license plate to be of sufficient size to be plainly 18 readable during daylight from a distance of one hundred feet. In addition 19 to the standard license plate issued for a trailer before August 12, 2005, 20 the director shall issue a license plate for trailers that has a design 21 that is similar to the standard size license plate for trailers but that 22 is the same size as the license plate for motorcycles. The trailer owner 23 shall notify the department which size license plate the owner wants for 24 the trailer. 25 C. In addition to the requirements PRESCRIBED in subsection B of 26 this section, for all license plates, including all special plates, that 27 are designed or redesigned on or after September 24, 2022: 28 1. The background color of the license plate shall contrast 29 significantly with the color of the letters and numerals on the license 30 plate and with the name of this state on the license plate. 31 2. The name of this state shall appear on the license plate in 32 capital letters in sans serif font and be three-fourths of an inch in 33 height. 34 D. Notwithstanding any other law, the department shall not contract 35 with a nongovernmental entity to purchase or secure reflective material 36 for the plates issued by the department unless the department has made a 37 reasonable effort to secure qualified bids or proposals from as many 38 individual responsible respondents as possible. What are the two options for license plate size?
{instruction} ========== In your answer, refer only to the context document. Do not employ any outside knowledge {question} ========== [user request] {passage 0} ========== [context document]
Give me a bullet-point timeline showing how Vuori has grown over the past ten years. Keep each bullet point under 20 words, and be sure to mention how their product line has changed over the years.
Vuori, The Athleisure Brand Valued At $4 Billion, Is Halfway To Opening 100 Stores By 2026 Say athleisurewear and one name comes immediately to mind: Lululemon. For athletic wear, one name dominates the conversation, NikeNKE -1%, with honorable mention to Adidas and Puma. Vuori is far behind the leaders in both realms, but then the market share leaders had a big head start. Joe Kudla founded Vuori only in 2014, while Lululemon got started in 1998 and Nike back in 1964. But Vuori aims to become a brand as big if not bigger than those market leaders: “Vuori wants to be a relevant household name 20 years from now. We have no interest in growing really, really fast just to hit some number and then falling out of favor with consumers or having a major quality issue,” Kudla shared with Retail Dive. Slow And Steady Wins The Race Kudla has followed a methodical path to growth by correcting mistakes and filling whitespace left by the big guys. That strategy propelled it forward fast to reach a valuation of $4 billion in late 2021 after receiving $400 million in venture funding by Softback Investment Advisors and Trinity West Venture, according to Pitchbook. Now, Bloomberg reports it is considering an IPO this year, though the company has not confirmed the rumors. Nonetheless, Kudla has accomplished much with Vuori in its ten short years. Before becoming an entrepreneur, he was working as an accountant and had little fashion experience, though he did a modeling stint for a few years, which gave him a passion for the business. It was as an athlete, particularly his mountain climbing experience, where he found the business opportunity: filling the performance gap in men’s athletic apparel. And the company’s name came from those roots: Vuori is the Finnish word for “mountain.” The brand’s first product was a simple pair of men’s shorts made from super-soft, high-quality fabrics that look good enough to wear around town, but also provide support and wick away moisture when running the track. And whether in town or on the track, the shorts were super-comfortable to wear. Vuori became an instant hit with athletes who valued its superior quality and didn’t want to be a walking – or running – billboard for another brand. By year two, it was generating $1 million in DTC revenues and even more remarkable for a startup, it was profitable, credited to Kudla’s accounting background that kept him fixated on the books. “We never acquired a customer at a loss,” Kudla shared with Fast Company. “We were hyper-focused on cash flow, and getting the unit economics of a transaction profitable.” Reaching Further Growing buzz about the brand put it on REI’s radar, which after testing it in a few stores, found such strong customer affinity that it put it into more than 150 locations. By 2018, Vuori was generating upwards of $30 million in sales, much of it coming from wholesale distribution, which generates less revenue than DTC but gives a brand credibility and added exposure by having a respected retailer choose to carry it. Currently, it’s retail partners include NordstromJWN -1.3%, Selfridges, Harrods, Equinox Gyms, Barry’s Bootcamp and numerous specialty independent retailers. It was also in 2018 that Vuori launched into women’s apparel, reaching the other half of the athletic apparel market, estimated at $158 billion in North America in 2023 and expected to grow 6% CAGR through 2027, according to McKinsey. That combined with opening its first store in hometown Encinitas, CA got the brand’s flywheel humming. Currently, it operates over 50 stores in 17 states and internationally in London, Shanghai and Seoul, up from just four in 2019 all located in California. Plans are to open 20 to 25 stores over the next two or so years to reach 100 by 2026. Tasked with that mission is vice president of retail Catherine Pike who joined the company in 2019. A lawyer by training, Pike came from fitness franchiser Fit4Mom where she led franchise operations and before that, she spent eight years with Lululemon, rising from local store to regional manager.
{instruction} ========== In your answer, refer only to the context document. Do not employ any outside knowledge {question} ========== Give me a bullet-point timeline showing how Vuori has grown over the past ten years. Keep each bullet point under 20 words, and be sure to mention how their product line has changed over the years. {passage 0} ========== Vuori, The Athleisure Brand Valued At $4 Billion, Is Halfway To Opening 100 Stores By 2026 Say athleisurewear and one name comes immediately to mind: Lululemon. For athletic wear, one name dominates the conversation, NikeNKE -1%, with honorable mention to Adidas and Puma. Vuori is far behind the leaders in both realms, but then the market share leaders had a big head start. Joe Kudla founded Vuori only in 2014, while Lululemon got started in 1998 and Nike back in 1964. But Vuori aims to become a brand as big if not bigger than those market leaders: “Vuori wants to be a relevant household name 20 years from now. We have no interest in growing really, really fast just to hit some number and then falling out of favor with consumers or having a major quality issue,” Kudla shared with Retail Dive. Slow And Steady Wins The Race Kudla has followed a methodical path to growth by correcting mistakes and filling whitespace left by the big guys. That strategy propelled it forward fast to reach a valuation of $4 billion in late 2021 after receiving $400 million in venture funding by Softback Investment Advisors and Trinity West Venture, according to Pitchbook. Now, Bloomberg reports it is considering an IPO this year, though the company has not confirmed the rumors. Nonetheless, Kudla has accomplished much with Vuori in its ten short years. Before becoming an entrepreneur, he was working as an accountant and had little fashion experience, though he did a modeling stint for a few years, which gave him a passion for the business. It was as an athlete, particularly his mountain climbing experience, where he found the business opportunity: filling the performance gap in men’s athletic apparel. And the company’s name came from those roots: Vuori is the Finnish word for “mountain.” The brand’s first product was a simple pair of men’s shorts made from super-soft, high-quality fabrics that look good enough to wear around town, but also provide support and wick away moisture when running the track. And whether in town or on the track, the shorts were super-comfortable to wear. Vuori became an instant hit with athletes who valued its superior quality and didn’t want to be a walking – or running – billboard for another brand. By year two, it was generating $1 million in DTC revenues and even more remarkable for a startup, it was profitable, credited to Kudla’s accounting background that kept him fixated on the books. “We never acquired a customer at a loss,” Kudla shared with Fast Company. “We were hyper-focused on cash flow, and getting the unit economics of a transaction profitable.” Reaching Further Growing buzz about the brand put it on REI’s radar, which after testing it in a few stores, found such strong customer affinity that it put it into more than 150 locations. By 2018, Vuori was generating upwards of $30 million in sales, much of it coming from wholesale distribution, which generates less revenue than DTC but gives a brand credibility and added exposure by having a respected retailer choose to carry it. Currently, it’s retail partners include NordstromJWN -1.3%, Selfridges, Harrods, Equinox Gyms, Barry’s Bootcamp and numerous specialty independent retailers. It was also in 2018 that Vuori launched into women’s apparel, reaching the other half of the athletic apparel market, estimated at $158 billion in North America in 2023 and expected to grow 6% CAGR through 2027, according to McKinsey. That combined with opening its first store in hometown Encinitas, CA got the brand’s flywheel humming. Currently, it operates over 50 stores in 17 states and internationally in London, Shanghai and Seoul, up from just four in 2019 all located in California. Plans are to open 20 to 25 stores over the next two or so years to reach 100 by 2026. Tasked with that mission is vice president of retail Catherine Pike who joined the company in 2019. A lawyer by training, Pike came from fitness franchiser Fit4Mom where she led franchise operations and before that, she spent eight years with Lululemon, rising from local store to regional manager. https://www.forbes.com/sites/pamdanziger/2024/02/25/vuori-the-athleisure-brand-valued-at-4-billion-is-halfway-to-opening-100-stores-by-2026/
You may only answer questions based solely on the information in the context block. You may not use any external sources or knowledge.
What does a positive Stemmer sign indicate?
CLINICAL MANIFESTATIONS OF LIPEDEMA It is defined as a chronic disease that predominantly affects women and it is normally first noticed at puberty, pregnancy or menopause1,15. In 97% of the cases lipedema is located in lower limbs and in 31% in upper extremities14 . Patients present a symmetrical and abnormal increase of adipose tissue from the hips, involving the buttocks as well as the regions of thigh and calf (Figure 1c). The enlargement of the lower limbs is disproportionate in relation to the upper part of the body16 . Patients complain that edema in lower limbs may worsen in the afternoon or evening and increased swelling is often related to the orthostasis and heat with an increased sensitivity to pain and appearance of spontaneous or minimal trauma-induced bruising. Other symptoms include plantar arch abnormalities, cold skin and spontaneous pain. As lipedema progresses a significant volume excess is associated, and the occurrence of hip and knee joint damage that lead to orthopedic disorders adds gait alterations thus complicating the patient’s life (Figure 4d). In severe stages, the lymphatic system becomes decompensated to various degrees and it can also associate uni- or rather bilateral lymphedema that can be suspected with the swelling of the dorsum of the foot, a positive Stemmer sign (the inability to pinch a fold of skin at the base of the second toe due to thickening of the skin and subcutaneous tissues) or deep skin folds. The combination of lymphatic insufficiency and lipedema is called lipolymphedema or lympholipedema depending on the terminology (Figure 2). Concomitance with severe venous insufficiency is rare; however, varicosity is often seen among lipedematous patients17. We must bear in mind that lipedema is often combined with obesity and the clinical diagnosis may be confused as lipedema sufferers are commonly heavily overweight.
System instruction: [You may only answer questions based solely on the information in the context block. You may not use any external sources or knowledge.] question: [What does a positive Stemmer sign indicate?] context block: [CLINICAL MANIFESTATIONS OF LIPEDEMA It is defined as a chronic disease that predominantly affects women and it is normally first noticed at puberty, pregnancy or menopause1,15. In 97% of the cases lipedema is located in lower limbs and in 31% in upper extremities14 . Patients present a symmetrical and abnormal increase of adipose tissue from the hips, involving the buttocks as well as the regions of thigh and calf (Figure 1c). The enlargement of the lower limbs is disproportionate in relation to the upper part of the body16 . Patients complain that edema in lower limbs may worsen in the afternoon or evening and increased swelling is often related to the orthostasis and heat with an increased sensitivity to pain and appearance of spontaneous or minimal trauma-induced bruising. Other symptoms include plantar arch abnormalities, cold skin and spontaneous pain. As lipedema progresses a significant volume excess is associated, and the occurrence of hip and knee joint damage that lead to orthopedic disorders adds gait alterations thus complicating the patient’s life (Figure 4d). In severe stages, the lymphatic system becomes decompensated to various degrees and it can also associate uni- or rather bilateral lymphedema that can be suspected with the swelling of the dorsum of the foot, a positive Stemmer sign (the inability to pinch a fold of skin at the base of the second toe due to thickening of the skin and subcutaneous tissues) or deep skin folds. The combination of lymphatic insufficiency and lipedema is called lipolymphedema or lympholipedema depending on the terminology (Figure 2). Concomitance with severe venous insufficiency is rare; however, varicosity is often seen among lipedematous patients17. We must bear in mind that lipedema is often combined with obesity and the clinical diagnosis may be confused as lipedema sufferers are commonly heavily overweight. ]
This task requires you to answer questions based solely on the information provided in the prompt. You are not allowed to use any external resources or prior knowledge.
Give me a summary of the events that led to Bed Bath & Beyond's cash flow problems.
The company has avoided a bankruptcy filing for now by completing a complex stock offering that will give it an immediate injection of $225 million in funds and a pledge for $800 million in the future to pay down its current debt load. Bed Bath & Beyond is also shrinking to save money. The company said it plans to close around 400 of its roughly 760 Bed Bath & Beyond stores. It will keep open its most profitable stores in key markets. The moves are a lifeline for Bed Bath & Beyond. They will give the company time to pursue a turnaround without a bankruptcy filing, which can be costly, out of its control and wind up in a liquidation. “They are essentially doing a reorganization outside of bankruptcy court,” said Daniel Gielchinsky, an attorney at DGIM Law specializing in bankruptcy. “Slow the cash burn is the name of the game for the next 6 to 12 months and allow the company to pivot into a profitable position.” It will be a complicated turnaround and the company’s future remains uncertain. If Bed Bath & Beyond comes up short in the current version of its turnaround plan, the likelihood of a liquidation increases. Here’s how Bed Bath & Beyond, once a retailer pioneer, veered to the edge of bankruptcy and where it turns next. Superstore era Bed Bath & Beyond had been a crown jewel of the era of so-called “category killers”: chains that dominated a category of retail, such as Toys “R” Us, Circuit City and Sports Authority. Those companies, too, ultimately filed for bankruptcy. Bed Bath & Beyond became known for pots and pans, towels and bedding stacked from the floor to the ceilings at its cavernous stores — and for its ubiquitous 20%-off coupons. The blue-and-white coupons became something of a pop culture symbol, and millions of Americans wound up stashing them away in their cars, closets and basements. The retailer attracted a broad range of customers by selling name brands at cut-rate prices. Brands coveted a spot on Bed Bath & Beyond’s shelves, knowing it would lead to big sales. Plus, the open-store layout encouraged impulse buying: Shoppers would come in to buy new dishes and walk out with pillows, towels and other items. Stores were a fixture for shoppers around the winter holidays and during the back-to-school and college seasons, and Bed Bath & Beyond also had a strong baby and wedding registry business. Founded in 1971 by two veterans of discount retail in Springfield, New Jersey, the chain of small linen and bath stores — then called Bed ‘n Bath — first grew around the northeast and in California selling designer bedding, a new trend at the time. Unlike department stores, it didn’t rely on sales events to draw customers. “We had witnessed the department store shakeout and knew that specialty stores were going to be the next wave of retailing,” co-founder Leonard Feinstein reportedly said in 1993. “It was the beginning of the designer approach to linens and housewares and we saw a real window of opportunity.” In 1987, the company changed its name to Bed Bath & Beyond to reflect its expanded merchandise and bigger “superstores.” The company went public in 1992 with 38 stores and around $200 million in sales. By 2000, those figures leaped to 241 stores and $1.1 billion in sales. The 1,000th Bed Bath & Beyond store opened in 2009, when the chain had reached $7.8 billion in sales. The company was something of an iconoclast. It spent little on advertising, relying instead on print coupons distributed in weekly newspapers to attract customers. “Why not just tell the customer that we’ll give you a discount on the item you want — and not the one that we want to put on sale? We’ll mail a coupon, and it will be a lot cheaper,” Bed Bath & Beyond co-founder Warren Eisenberg, now 92, said in a 2020 New York Times interview. The chain was known for giving autonomy to store managers to decide which products to stock, allowing them to customize their individual stores, and for shipping products directly to stores instead of a central warehouse. The rise of e-commerce But as brick-and-mortar began to give way to e-commerce, Bed Bath & Beyond was slow to make the transition — a misstep compounded by the fact that home decor is one of the most commonly bought categories online. “We missed the boat on the internet,” Eisenberg said in a recent Wall Street Journal interview. Online shopping weakened the allure of Bed Bath & Beyond’s fan-favorite coupons, too, because consumers could find plenty of cheaper alternatives on Amazon or browse a wider selection on sites like Wayfair (W). It wasn’t just Amazon and online shopping that sank Bed Bath & Beyond, however. Walmart (WMT), Target (TGT) and Costco (COST) have grown over the past decade, and they have been able to draw Bed Bath & Beyond customers with lower prices and a wider array of merchandise. Discount chains such as HomeGoods and TJ Maxx and have also undercut Bed Bath & Beyond’s prices. Without the differentiators of the lowest prices or widest selection, Bed Bath & Beyond’s sales stagnated from 2012 to 2019. The company was hit hard during the pandemic, closing stores temporarily during 2020 while rivals remained open. Sales sunk 17% in 2020 and 15% in 2021. What’s more, Bed Bath & Beyond has rotated through several different executives and turnaround strategies in recent years. Former Target executive Mark Tritton took the helm in 2019 with backing from investors and a bold new strategy. He scaled back coupons and inventory from national brands in favor of Bed Bath & Beyond’s own private-label brands. But this change alienated customers who were loyal to big brands. The company also fell behind on payments to vendors and stores did not have enough merchandise to stock shelves. Tritton left as CEO in 2022. As of late November the company had 949 stores, including 762 Bed Bath & Beyond stores and 137 buybuyBaby stores. It said Tuesday that it will ultimately have about half that number – 360 Bed Bath & Beyond stores and 120 buybuyBaby locations. What’s next? Bed Bath & Beyond will close stores that drain the most cash out of its business. But the closures will mean Bed Bath & Beyond will give up on stores that brought in $1.2 billion in annual sales, Michael Lasser, an analyst at UBS, said in a note to clients Tuesday. Bed Bath & Beyond will recapture a portion of those sales from its other stores and online, Lasser said, but the majority will go to other retailers. But, to survive, the company needs to grow sales at its remaining stores. Otherwise, too much of Bed Bath & Beyond’s revenue will go toward repaying debt that it won’t be able to turn a profit. Reversing sales declines won’t be easy given challenges with waning customer demand, online traffic and rising competition in Bed Bath & Beyond product categories, Lasser said. Bed Bath & Beyond will have to overcome its significant hurdles to become a healthy, profitable company. Bankruptcy lawyer Daniel Gielchinsky, however, said it was an encouraging sign that Bed Bath & Beyond was able to raise enough cash through a public offering to stay afloat. The offering was reportedly backed by investment firm Hudson Bay Capital. (Hudson Bay did not respond to a CNN Business request for comment.) Still, liquidators will be watching closely, he said, eager to pounce. “They are assuredly waiting on the sidelines to dismantle the company at the ready
Give me a summary of the events that led to Bed Bath & Beyond's cash flow problems. This task requires you to answer questions based solely on the information provided below. You are not allowed to use any external resources or prior knowledge. The company has avoided a bankruptcy filing for now by completing a complex stock offering that will give it an immediate injection of $225 million in funds and a pledge for $800 million in the future to pay down its current debt load. Bed Bath & Beyond is also shrinking to save money. The company said it plans to close around 400 of its roughly 760 Bed Bath & Beyond stores. It will keep open its most profitable stores in key markets. The moves are a lifeline for Bed Bath & Beyond. They will give the company time to pursue a turnaround without a bankruptcy filing, which can be costly, out of its control and wind up in a liquidation. “They are essentially doing a reorganization outside of bankruptcy court,” said Daniel Gielchinsky, an attorney at DGIM Law specializing in bankruptcy. “Slow the cash burn is the name of the game for the next 6 to 12 months and allow the company to pivot into a profitable position.” It will be a complicated turnaround and the company’s future remains uncertain. If Bed Bath & Beyond comes up short in the current version of its turnaround plan, the likelihood of a liquidation increases. Here’s how Bed Bath & Beyond, once a retailer pioneer, veered to the edge of bankruptcy and where it turns next. Superstore era Bed Bath & Beyond had been a crown jewel of the era of so-called “category killers”: chains that dominated a category of retail, such as Toys “R” Us, Circuit City and Sports Authority. Those companies, too, ultimately filed for bankruptcy. Bed Bath & Beyond became known for pots and pans, towels and bedding stacked from the floor to the ceilings at its cavernous stores — and for its ubiquitous 20%-off coupons. The blue-and-white coupons became something of a pop culture symbol, and millions of Americans wound up stashing them away in their cars, closets and basements. The retailer attracted a broad range of customers by selling name brands at cut-rate prices. Brands coveted a spot on Bed Bath & Beyond’s shelves, knowing it would lead to big sales. Plus, the open-store layout encouraged impulse buying: Shoppers would come in to buy new dishes and walk out with pillows, towels and other items. Stores were a fixture for shoppers around the winter holidays and during the back-to-school and college seasons, and Bed Bath & Beyond also had a strong baby and wedding registry business. Founded in 1971 by two veterans of discount retail in Springfield, New Jersey, the chain of small linen and bath stores — then called Bed ‘n Bath — first grew around the northeast and in California selling designer bedding, a new trend at the time. Unlike department stores, it didn’t rely on sales events to draw customers. “We had witnessed the department store shakeout and knew that specialty stores were going to be the next wave of retailing,” co-founder Leonard Feinstein reportedly said in 1993. “It was the beginning of the designer approach to linens and housewares and we saw a real window of opportunity.” In 1987, the company changed its name to Bed Bath & Beyond to reflect its expanded merchandise and bigger “superstores.” The company went public in 1992 with 38 stores and around $200 million in sales. By 2000, those figures leaped to 241 stores and $1.1 billion in sales. The 1,000th Bed Bath & Beyond store opened in 2009, when the chain had reached $7.8 billion in sales. The company was something of an iconoclast. It spent little on advertising, relying instead on print coupons distributed in weekly newspapers to attract customers. “Why not just tell the customer that we’ll give you a discount on the item you want — and not the one that we want to put on sale? We’ll mail a coupon, and it will be a lot cheaper,” Bed Bath & Beyond co-founder Warren Eisenberg, now 92, said in a 2020 New York Times interview. The chain was known for giving autonomy to store managers to decide which products to stock, allowing them to customize their individual stores, and for shipping products directly to stores instead of a central warehouse. The rise of e-commerce But as brick-and-mortar began to give way to e-commerce, Bed Bath & Beyond was slow to make the transition — a misstep compounded by the fact that home decor is one of the most commonly bought categories online. “We missed the boat on the internet,” Eisenberg said in a recent Wall Street Journal interview. Online shopping weakened the allure of Bed Bath & Beyond’s fan-favorite coupons, too, because consumers could find plenty of cheaper alternatives on Amazon or browse a wider selection on sites like Wayfair (W). It wasn’t just Amazon and online shopping that sank Bed Bath & Beyond, however. Walmart (WMT), Target (TGT) and Costco (COST) have grown over the past decade, and they have been able to draw Bed Bath & Beyond customers with lower prices and a wider array of merchandise. Discount chains such as HomeGoods and TJ Maxx and have also undercut Bed Bath & Beyond’s prices. Without the differentiators of the lowest prices or widest selection, Bed Bath & Beyond’s sales stagnated from 2012 to 2019. The company was hit hard during the pandemic, closing stores temporarily during 2020 while rivals remained open. Sales sunk 17% in 2020 and 15% in 2021. What’s more, Bed Bath & Beyond has rotated through several different executives and turnaround strategies in recent years. Former Target executive Mark Tritton took the helm in 2019 with backing from investors and a bold new strategy. He scaled back coupons and inventory from national brands in favor of Bed Bath & Beyond’s own private-label brands. But this change alienated customers who were loyal to big brands. The company also fell behind on payments to vendors and stores did not have enough merchandise to stock shelves. Tritton left as CEO in 2022. As of late November the company had 949 stores, including 762 Bed Bath & Beyond stores and 137 buybuyBaby stores. It said Tuesday that it will ultimately have about half that number – 360 Bed Bath & Beyond stores and 120 buybuyBaby locations. What’s next? Bed Bath & Beyond will close stores that drain the most cash out of its business. But the closures will mean Bed Bath & Beyond will give up on stores that brought in $1.2 billion in annual sales, Michael Lasser, an analyst at UBS, said in a note to clients Tuesday. Bed Bath & Beyond will recapture a portion of those sales from its other stores and online, Lasser said, but the majority will go to other retailers. But, to survive, the company needs to grow sales at its remaining stores. Otherwise, too much of Bed Bath & Beyond’s revenue will go toward repaying debt that it won’t be able to turn a profit. Reversing sales declines won’t be easy given challenges with waning customer demand, online traffic and rising competition in Bed Bath & Beyond product categories, Lasser said. Bed Bath & Beyond will have to overcome its significant hurdles to become a healthy, profitable company. Bankruptcy lawyer Daniel Gielchinsky, however, said it was an encouraging sign that Bed Bath & Beyond was able to raise enough cash through a public offering to stay afloat. The offering was reportedly backed by investment firm Hudson Bay Capital. (Hudson Bay did not respond to a CNN Business request for comment.) Still, liquidators will be watching closely, he said, eager to pounce. “They are assuredly waiting on the sidelines to dismantle the company at the ready.
Base your entire response on the document I gave you. I need to know the absolute basic information about what is being said here.
Summarize the Annual Report.
section should be read in conjunction with the Consolidated Financial Statements and accompanying notes thereto included in Item 8 of this Annual Report on Form 10-K. Overview Timberland Bancorp, Inc., a Washington corporation, is the holding company for Timberland Bank. The Bank opened for business in 1915 and serves consumers and businesses across Grays Harbor, Thurston, Pierce, King, Kitsap and Lewis counties, Washington with a full range of lending and deposit services through its 23 branches (including its main office in Hoquiam). At September 30, 2022, the Company had total assets of $1.86 billion, net loans receivable of $1.13 billion, total deposits of $1.63 billion and total shareholders’ equity of $218.57 million. The Company’s business activities generally are limited to passive investment activities and oversight of its investment in the Bank. Accordingly, the information set forth in this report relates primarily to the Bank’s operations. The Bank is a community-oriented bank which has traditionally offered a variety of savings products to its retail and business customers while concentrating its lending activities on real estate secured loans. Lending activities have been focused primarily on the origination of loans secured by real estate, including residential construction loans, one- to four-family residential loans, multi-family loans and commercial real estate loans. The Bank originates adjustable-rate residential mortgage loans, some of which do not qualify for sale in the secondary market. The Bank also originates commercial business loans and other consumer loans. The profitability of the Company’s operations depends primarily on its net interest income after provision for (recapture of) loan losses. Net interest income is the difference between interest income, which is the income that the Company earns on interest-earning assets, which are primarily loans and investments, and interest expense, which is the amount that the Company pays on its interest-bearing liabilities, which are primarily deposits and borrowings (as needed). Net interest income is affected by changes in the volume and mix of interest-earning assets, the interest earned on those assets, the volume and mix of interest-bearing liabilities and the interest paid on those interest-bearing liabilities. Management attempts to maintain a net interest margin placing it within the top quartile of its Washington State peers. Changes in market interest rates, the slope of the yield curve, and interest we earn on interest earning assets or pay on interest bearing liabilities, as well as the volume and types of interest earning assets, interest bearing and non-interest bearing liabilities and shareholders’ equity, usually have the largest impact on changes in our net interest spread, net interest margin and net interest income during a reporting period. Since March 2022, in response to inflation, the FOMC of the Federal Reserve has increased the target range for the federal funds rate by 300 basis points, including 150 basis points during the third calendar calendar quarter of 2022, to a range of 3.00% to 3.25% as of September 30, 2022. In November 2022, the FOMC increased the target range for the federal funds rate another 75 basis points to a range of 3.75% to 4.00%. We believe our balance sheet is structured to enhance our average yield on interest-earning assets as the lagging benefit of variable rate interest-earnings assets beginning to reprice occurs as well as a higher net interest margin if the FOMC continues to raise the targeted federal funds rate in an effort to curb inflation, which appears likely based on recent Federal Reserve communications and interest rate forecasts. The provision for (recapture of) loan losses is dependent on changes in the loan portfolio and management’s assessment of the collectability of the loan portfolio as well as prevailing economic and market conditions. The allowance for loan losses reflects the amount that the Company believes is adequate to cover probable credit losses inherent in its loan portfolio. The Company recorded a provision for loan losses of $270,000 for the year ended September 30, 2022, primarily due to increased loan portfolio growth. The Company did not record a provision for loan losses for the year ended September 30, 2021, primarily reflecting the improving economy and the resulting decline in forecasted probable loan losses from COVID-19 during that fiscal year. Net income is also affected by non-interest income and non-interest expense. For the year ended September 30, 2022, non-interest income consisted primarily of service charges on deposit accounts, gain on sales of loans, ATM and debit card interchange transaction fees, an increase in the cash surrender value of BOLI, escrow fees and other operating income. Noninterest income is also increased by net recoveries on investment securities and reduced by net OTTI losses on investment securities, if any. Non-interest income is also decreased by valuation allowances on loan servicing rights and increased by recoveries of valuation allowances on loan servicing rights, if any. Non-interest expense consisted primarily of salaries and employee benefits, premises and equipment, advertising, ATM and debit card interchange transaction fees, postage and courier expenses, amortization of CDI, state and local taxes, professional fees, FDIC insurance premiums, loan administration and foreclosure expenses, data processing and telecommunications expenses, deposit operation expenses and other non-interest expenses. Non-interest expense in certain periods are reduced by gains on the sale of premises and equipment and by gains on the sale of OREO. Non-interest income and non-interest expense are affected by the growth of the Company's operations and growth in the number and balances of loan and deposit accounts. 51 Results of operations may be affected significantly by general and local economic and competitive conditions, changes in market interest rates, governmental policies and actions of regulatory authorities. Operating Strategy The Company is a bank holding company which operates primarily through its subsidiary, the Bank. The Company's primary objective is to operate the Bank as a well capitalized, profitable, independent, community-oriented financial institution, serving customers in its primary market area of Grays Harbor, Pierce, Thurston, Kitsap, King and Lewis counties. The Company's strategy is to provide products and superior service to small businesses and individuals located in its primary market area. The Company's goal is to deliver returns to shareholders by focusing on the origination of higher-yielding assets (in particular, commercial real estate, construction, and commercial business loans), increasing core deposit balances, managing problem assets, efficiently managing expenses, and seeking expansion opportunities. The Company seeks to achieve these results by focusing on the following objectives: Expand our presence within our existing market areas by capturing opportunities resulting from changes in the competitive environment. We currently conduct our business primarily in western Washington. We have a community bank strategy that emphasizes responsive and personalized service to our customers. As a result of the consolidation of banks in our market areas, we believe that there is an opportunity for a community and customer focused bank to expand its customer base. By offering timely decision making, delivering appropriate banking products and services, and providing customer access to our senior managers, we believe that community banks, such as Timberland Bank, can distinguish themselves from larger banks operating in our market areas. We believe that we have a significant opportunity to attract additional borrowers and depositors and expand our market presence and market share within our extensive branch footprint. Portfolio diversification. In recent years, we have limited the origination of speculative construction loans and land development loans in favor of loans that possess credit profiles representing less risk to the Bank. We continue originating owner/builder and custom construction loans, multi-family loans, commercial business loans and commercial real estate loans which offer higher risk adjusted returns, shorter maturities and more sensitivity to interest rate fluctuations than fixed-rate oneto four-family loans. We anticipate capturing more of each customer's banking relationship by cross selling our loan and deposit products and offering additional services to our customers. Increase core deposits and other retail deposit products. We focus on establishing a total banking relationship with our customers with the intent of internally funding our loan portfolio. We anticipate that the continued focus on customer relationships will increase our level of core deposits. In addition to our retail branches, we maintain technology based products such as business cash management and a business remote deposit product that enable us to compete effectively with banks of all sizes. Managing exposure to fluctuating interest rates. For many years, the majority of the loans the Bank has retained in its portfolio have generally possessed periodic interest rate adjustment features or have been relatively short-term in nature. Loans originated for portfolio retention have generally included ARM loans, short-term construction loans, and, to a lesser extent, commercial business loans with interest rates tied to a market index such as the Prime Rate. Longer term fixed-rate mortgage loans have generally been originated for sale into the secondary market, although from time to time, the Bank may retain a portion of its fixed-rate mortgage loan originations and extend the initial fixed-rate period of its hybrid ARM commercial real estate loans for asset/liability purposes. Continue generating revenues through mortgage banking operations. The majority of the fixed-rate residential mortgage loans we originate have historically been sold into the secondary market with servicing retained. This strategy produces gains on the sale of such loans and reduces the interest rate and credit risk associated with fixed-rate residential lending. We continue to originate custom construction and owner/builder construction loans for sale into the secondary market upon the completion of construction. Maintaining strong asset quality. We believe that strong asset quality is a key to our long-term financial success. The percentage of non-performing loans to loans receivable, net was 0.18% and 0.29% at September 30, 2022 and 2021, respectively. The Company's percentage of non-performing assets to total assets at September 30, 2022 was 0.12% compared to 0.18% at September 30, 2021. Non-performing assets have decreased to $2.17 million at September 30, 2022 from $3.17 million at September 30, 2021. We continue to seek to reduce the level of non-performing assets through collections, writedowns, modifications and sales of OREO. We also take proactive steps to resolve our non-performing loans, including negotiating payment plans, forbearances, loan modifications and loan extensions and accepting short payoffs on delinquent loans when such actions have been deemed appropriate. Although the Company plans to continue to place emphasis on certain 52
Base your entire response on the document I gave you. I need to know the absolute basic information about what is being said here. Summarize the Annual Report. section should be read in conjunction with the Consolidated Financial Statements and accompanying notes thereto included in Item 8 of this Annual Report on Form 10-K. Overview Timberland Bancorp, Inc., a Washington corporation, is the holding company for Timberland Bank. The Bank opened for business in 1915 and serves consumers and businesses across Grays Harbor, Thurston, Pierce, King, Kitsap and Lewis counties, Washington with a full range of lending and deposit services through its 23 branches (including its main office in Hoquiam). At September 30, 2022, the Company had total assets of $1.86 billion, net loans receivable of $1.13 billion, total deposits of $1.63 billion and total shareholders’ equity of $218.57 million. The Company’s business activities generally are limited to passive investment activities and oversight of its investment in the Bank. Accordingly, the information set forth in this report relates primarily to the Bank’s operations. The Bank is a community-oriented bank which has traditionally offered a variety of savings products to its retail and business customers while concentrating its lending activities on real estate secured loans. Lending activities have been focused primarily on the origination of loans secured by real estate, including residential construction loans, one- to four-family residential loans, multi-family loans and commercial real estate loans. The Bank originates adjustable-rate residential mortgage loans, some of which do not qualify for sale in the secondary market. The Bank also originates commercial business loans and other consumer loans. The profitability of the Company’s operations depends primarily on its net interest income after provision for (recapture of) loan losses. Net interest income is the difference between interest income, which is the income that the Company earns on interest-earning assets, which are primarily loans and investments, and interest expense, which is the amount that the Company pays on its interest-bearing liabilities, which are primarily deposits and borrowings (as needed). Net interest income is affected by changes in the volume and mix of interest-earning assets, the interest earned on those assets, the volume and mix of interest-bearing liabilities and the interest paid on those interest-bearing liabilities. Management attempts to maintain a net interest margin placing it within the top quartile of its Washington State peers. Changes in market interest rates, the slope of the yield curve, and interest we earn on interest earning assets or pay on interest bearing liabilities, as well as the volume and types of interest earning assets, interest bearing and non-interest bearing liabilities and shareholders’ equity, usually have the largest impact on changes in our net interest spread, net interest margin and net interest income during a reporting period. Since March 2022, in response to inflation, the FOMC of the Federal Reserve has increased the target range for the federal funds rate by 300 basis points, including 150 basis points during the third calendar calendar quarter of 2022, to a range of 3.00% to 3.25% as of September 30, 2022. In November 2022, the FOMC increased the target range for the federal funds rate another 75 basis points to a range of 3.75% to 4.00%. We believe our balance sheet is structured to enhance our average yield on interest-earning assets as the lagging benefit of variable rate interest-earnings assets beginning to reprice occurs as well as a higher net interest margin if the FOMC continues to raise the targeted federal funds rate in an effort to curb inflation, which appears likely based on recent Federal Reserve communications and interest rate forecasts. The provision for (recapture of) loan losses is dependent on changes in the loan portfolio and management’s assessment of the collectability of the loan portfolio as well as prevailing economic and market conditions. The allowance for loan losses reflects the amount that the Company believes is adequate to cover probable credit losses inherent in its loan portfolio. The Company recorded a provision for loan losses of $270,000 for the year ended September 30, 2022, primarily due to increased loan portfolio growth. The Company did not record a provision for loan losses for the year ended September 30, 2021, primarily reflecting the improving economy and the resulting decline in forecasted probable loan losses from COVID-19 during that fiscal year. Net income is also affected by non-interest income and non-interest expense. For the year ended September 30, 2022, non-interest income consisted primarily of service charges on deposit accounts, gain on sales of loans, ATM and debit card interchange transaction fees, an increase in the cash surrender value of BOLI, escrow fees and other operating income. Noninterest income is also increased by net recoveries on investment securities and reduced by net OTTI losses on investment securities, if any. Non-interest income is also decreased by valuation allowances on loan servicing rights and increased by recoveries of valuation allowances on loan servicing rights, if any. Non-interest expense consisted primarily of salaries and employee benefits, premises and equipment, advertising, ATM and debit card interchange transaction fees, postage and courier expenses, amortization of CDI, state and local taxes, professional fees, FDIC insurance premiums, loan administration and foreclosure expenses, data processing and telecommunications expenses, deposit operation expenses and other non-interest expenses. Non-interest expense in certain periods are reduced by gains on the sale of premises and equipment and by gains on the sale of OREO. Non-interest income and non-interest expense are affected by the growth of the Company's operations and growth in the number and balances of loan and deposit accounts. 51 Results of operations may be affected significantly by general and local economic and competitive conditions, changes in market interest rates, governmental policies and actions of regulatory authorities. Operating Strategy The Company is a bank holding company which operates primarily through its subsidiary, the Bank. The Company's primary objective is to operate the Bank as a well capitalized, profitable, independent, community-oriented financial institution, serving customers in its primary market area of Grays Harbor, Pierce, Thurston, Kitsap, King and Lewis counties. The Company's strategy is to provide products and superior service to small businesses and individuals located in its primary market area. The Company's goal is to deliver returns to shareholders by focusing on the origination of higher-yielding assets (in particular, commercial real estate, construction, and commercial business loans), increasing core deposit balances, managing problem assets, efficiently managing expenses, and seeking expansion opportunities. The Company seeks to achieve these results by focusing on the following objectives: Expand our presence within our existing market areas by capturing opportunities resulting from changes in the competitive environment. We currently conduct our business primarily in western Washington. We have a community bank strategy that emphasizes responsive and personalized service to our customers. As a result of the consolidation of banks in our market areas, we believe that there is an opportunity for a community and customer focused bank to expand its customer base. By offering timely decision making, delivering appropriate banking products and services, and providing customer access to our senior managers, we believe that community banks, such as Timberland Bank, can distinguish themselves from larger banks operating in our market areas. We believe that we have a significant opportunity to attract additional borrowers and depositors and expand our market presence and market share within our extensive branch footprint. Portfolio diversification. In recent years, we have limited the origination of speculative construction loans and land development loans in favor of loans that possess credit profiles representing less risk to the Bank. We continue originating owner/builder and custom construction loans, multi-family loans, commercial business loans and commercial real estate loans which offer higher risk adjusted returns, shorter maturities and more sensitivity to interest rate fluctuations than fixed-rate oneto four-family loans. We anticipate capturing more of each customer's banking relationship by cross selling our loan and deposit products and offering additional services to our customers. Increase core deposits and other retail deposit products. We focus on establishing a total banking relationship with our customers with the intent of internally funding our loan portfolio. We anticipate that the continued focus on customer relationships will increase our level of core deposits. In addition to our retail branches, we maintain technology based products such as business cash management and a business remote deposit product that enable us to compete effectively with banks of all sizes. Managing exposure to fluctuating interest rates. For many years, the majority of the loans the Bank has retained in its portfolio have generally possessed periodic interest rate adjustment features or have been relatively short-term in nature. Loans originated for portfolio retention have generally included ARM loans, short-term construction loans, and, to a lesser extent, commercial business loans with interest rates tied to a market index such as the Prime Rate. Longer term fixed-rate mortgage loans have generally been originated for sale into the secondary market, although from time to time, the Bank may retain a portion of its fixed-rate mortgage loan originations and extend the initial fixed-rate period of its hybrid ARM commercial real estate loans for asset/liability purposes. Continue generating revenues through mortgage banking operations. The majority of the fixed-rate residential mortgage loans we originate have historically been sold into the secondary market with servicing retained. This strategy produces gains on the sale of such loans and reduces the interest rate and credit risk associated with fixed-rate residential lending. We continue to originate custom construction and owner/builder construction loans for sale into the secondary market upon the completion of construction. Maintaining strong asset quality. We believe that strong asset quality is a key to our long-term financial success. The percentage of non-performing loans to loans receivable, net was 0.18% and 0.29% at September 30, 2022 and 2021, respectively. The Company's percentage of non-performing assets to total assets at September 30, 2022 was 0.12% compared to 0.18% at September 30, 2021. Non-performing assets have decreased to $2.17 million at September 30, 2022 from $3.17 million at September 30, 2021. We continue to seek to reduce the level of non-performing assets through collections, writedowns, modifications and sales of OREO. We also take proactive steps to resolve our non-performing loans, including negotiating payment plans, forbearances, loan modifications and loan extensions and accepting short payoffs on delinquent loans when such actions have been deemed appropriate. Although the Company plans to continue to place emphasis on certain 52
You can only respond using information in the context block.
Provide a summary of changes to top tax rates and exemption amounts for estate taxes over time.
Early History of U.S. Taxes on Transfers Taxes on the transfer of assets have existed throughout history, dating back to ancient Egypt. In the United States, they were used prior to the modern estate and gift tax in 1916 to finance wars and similar emergencies.8 The first was enacted in 1797 to expand the Navy, given strained relationships with France. At that time, a documentary stamp tax on the inventories of deceased persons, the receipt of inheritances from an estate (except those to a wife, children, or grandchildren), and the probates and letters of administration of estates was imposed. These taxes were fixed amounts, although they were larger for larger inheritances and small inheritances were exempt. These taxes were repealed in 1802. In 1862, during the Civil War, an inheritance tax was imposed. Unlike the current estate tax, the tax was imposed on the beneficiaries, but unlike the stamp tax, it was a percentage of the inheritance. The tax was also imposed on gifts during the lifetime. The rate depended on the family relationships of the beneficiaries, and spouses and small inheritances were exempt. This tax was repealed in 1870. The 1894 income tax was not a transfer tax, but it included inheritances and gifts in income. It was short-lived after being found unconstitutional by the Supreme Court in Pollock v. Farmers’ Loan and Trust Company. In 1898, an estate tax was enacted to finance the Spanish-American War. Rates were graduated depending on degree of kinship and size, bequests to spouses were exempt, and there was an overall exemption that excluded small estates. It was repealed in 1902. The Modern Estate and Gift Tax Lawmakers enacted the direct ancestor of the current estate tax in 1916. It contained exemptions that excluded small estates, and rates were graduated based on the size of the estate. Over time, rates were increased, but the basic form of the tax remained. The top rate was 10% in 1916 with a $50,000 exemption, and it was increased to 25% in 1917, with the first $50,000 taxed at 2%. At the end of World War I in 1918, rates were reduced on smaller estates and charitable deductions were allowed. The top rate was increased to 40% in 1924, and a credit for state taxes was allowed for up to 25% of estate tax liability. The top rate was reduced to 20% from 1926 to 1931, increased to 40% in 1932, and eventually rose as high as 77% from 1941 to 1976. A separate gift tax was enacted in 1924 with the same rates and exemptions, and an annual exclusion per donee of $500. The tax was repealed in 1926, then reenacted in 1932 with a $5,000 annual exclusion per donee. In 1942, changes addressed the difference in treatment in community property states, where each spouse owned half the assets and only the half owned by the decedent was subject to tax. In other states where couples could own assets jointly, exclusions were allowed only if the surviving spouse contributed to the assets. The 1942 act treated assets in community property states the same as in other states. In 1948, this rule was changed to allow a deduction for property transferred to a spouse whether by the will or by law. The 1942 act made other changes in rates and exemptions and instituted a $3,000 annual gift exclusion per donee. The Tax Reform Act of 1976 (P.L. 94-455) created the modern unified estate and gift tax with a unified credit and graduated rates applied to all transfers. The 1976 act also instituted carryover basis for inherited assets, but that provision resulted in considerable controversy and was repealed retroactively in 1980. The exemption was increased from $60,000 to $120,000, and the top rate was lowered to 70%. The Economic Growth and Tax Relief Act of 2001 (EGTRRA; P.L. 107-16) provided for a gradual reduction in the estate tax. The law applied a unified exemption for both lifetime gifts and the estate of $675,000 prior to these changes. Under EGTRRA, the estate tax exemption rose from $675,000 in 2001 to $3.5 million in 2009, and the top tax rate fell from 55% to 45%. Although combined estate and gift tax rates are graduated, the exemption is effectively in the form of a credit that eliminates tax due at lower rates, resulting in a flat rate on taxable assets under 2009 law. The gift tax exemption was, however, restricted to $1 million. For 2010, EGTRRA scheduled the elimination of the estate tax, although it retained the gift tax and its $1 million exemption. EGTRRA also provided for a carryover of basis for assets inherited at death in 2010, so that, in contrast with prior law, heirs who sold assets would have to pay tax on gains accrued during the decedent’s lifetime. This provision had a $1.3 million exemption for gain (plus $3 million for a spouse). As with other provisions of EGTRRA, the estate tax revisions were to expire in 2011, returning the tax provisions to their pre-EGTRRA levels. The exemption would have reverted to $1 million (a value that had already been scheduled for pre-EGTRRA law) and the rate to 55% (with some graduated rates). The carryover basis provision effective in 2010 would have been eliminated (so that heirs would not be taxed on gain accumulated during the decedent’s life when they inherited assets). During debate on the estate tax, most agreed that the 2010 provisions would not be continued and, indeed, could be repealed retroactively. President Obama proposed a permanent extension of the 2009 rules (a $3.5 million exemption and a 45% tax rate), and the House provided for that permanent extension on December 3, 2009 (H.R. 4154). The Senate Democratic leadership indicated a plan to retroactively reinstate the 2009 rules for 2010 and beyond. Senate Minority Leader McConnell proposed an alternative of a 35% tax rate and a $5 million exemption.9 A similar proposal for a $5 million exemption and a 35% rate, which also included the ability of the surviving spouse to inherit any unused exemption of the decedent, is often referred to as Lincoln-Kyl (named after two Senators who sponsored it). Other proposals began with the $3.5 million exemption and 45% rate and would have phased in the $5 million exemption and 55% rate. Some Members of Congress argued for permanent estate tax repeal.10 At the end of 2010, P.L. 111-312 enacted a temporary two-year extension of the estate and gift tax, with a $5 million unified exemption, a 35% rate, and inheritance of unused spousal exemptions. For 2010, estates could elect to be taxed under the estate tax or under the carryover rules. These provisions provided for estate tax rules through 2012, after which the provisions would have reverted to the pre-EGTRRA rules ($1 million exemption, 55% top rate) absent legislation. The American Taxpayer Relief Act of 2012 (P.L. 112-240) established the permanent exemption ($5.25 million, indexed for inflation?) and rate (40%) described above. The 2017 tax revision (P.L. 115-97) doubled the exemption for the years 2018 through 2025. The House had proposed doubling the exemption through 2024 and then repealing the estate tax and lowering the gift tax rates to 35%. One issue that arises with the expiration of the increased exemptions is the treatment of gifts that had been transferred with exemptions higher than the exemptions that the law would revert to.
You can only respond using information in the context block. Provide a summary of changes to top tax rates and exemption amounts for estate taxes over time. Early History of U.S. Taxes on Transfers Taxes on the transfer of assets have existed throughout history, dating back to ancient Egypt. In the United States, they were used prior to the modern estate and gift tax in 1916 to finance wars and similar emergencies.8 The first was enacted in 1797 to expand the Navy, given strained relationships with France. At that time, a documentary stamp tax on the inventories of deceased persons, the receipt of inheritances from an estate (except those to a wife, children, or grandchildren), and the probates and letters of administration of estates was imposed. These taxes were fixed amounts, although they were larger for larger inheritances and small inheritances were exempt. These taxes were repealed in 1802. In 1862, during the Civil War, an inheritance tax was imposed. Unlike the current estate tax, the tax was imposed on the beneficiaries, but unlike the stamp tax, it was a percentage of the inheritance. The tax was also imposed on gifts during the lifetime. The rate depended on the family relationships of the beneficiaries, and spouses and small inheritances were exempt. This tax was repealed in 1870. The 1894 income tax was not a transfer tax, but it included inheritances and gifts in income. It was short-lived after being found unconstitutional by the Supreme Court in Pollock v. Farmers’ Loan and Trust Company. In 1898, an estate tax was enacted to finance the Spanish-American War. Rates were graduated depending on degree of kinship and size, bequests to spouses were exempt, and there was an overall exemption that excluded small estates. It was repealed in 1902. The Modern Estate and Gift Tax Lawmakers enacted the direct ancestor of the current estate tax in 1916. It contained exemptions that excluded small estates, and rates were graduated based on the size of the estate. Over time, rates were increased, but the basic form of the tax remained. The top rate was 10% in 1916 with a $50,000 exemption, and it was increased to 25% in 1917, with the first $50,000 taxed at 2%. At the end of World War I in 1918, rates were reduced on smaller estates and charitable deductions were allowed. The top rate was increased to 40% in 1924, and a credit for state taxes was allowed for up to 25% of estate tax liability. The top rate was reduced to 20% from 1926 to 1931, increased to 40% in 1932, and eventually rose as high as 77% from 1941 to 1976. A separate gift tax was enacted in 1924 with the same rates and exemptions, and an annual exclusion per donee of $500. The tax was repealed in 1926, then reenacted in 1932 with a $5,000 annual exclusion per donee. In 1942, changes addressed the difference in treatment in community property states, where each spouse owned half the assets and only the half owned by the decedent was subject to tax. In other states where couples could own assets jointly, exclusions were allowed only if the surviving spouse contributed to the assets. The 1942 act treated assets in community property states the same as in other states. In 1948, this rule was changed to allow a deduction for property transferred to a spouse whether by the will or by law. The 1942 act made other changes in rates and exemptions and instituted a $3,000 annual gift exclusion per donee. The Tax Reform Act of 1976 (P.L. 94-455) created the modern unified estate and gift tax with a unified credit and graduated rates applied to all transfers. The 1976 act also instituted carryover basis for inherited assets, but that provision resulted in considerable controversy and was repealed retroactively in 1980. The exemption was increased from $60,000 to $120,000, and the top rate was lowered to 70%. The Economic Growth and Tax Relief Act of 2001 (EGTRRA; P.L. 107-16) provided for a gradual reduction in the estate tax. The law applied a unified exemption for both lifetime gifts and the estate of $675,000 prior to these changes. Under EGTRRA, the estate tax exemption rose from $675,000 in 2001 to $3.5 million in 2009, and the top tax rate fell from 55% to 45%. Although combined estate and gift tax rates are graduated, the exemption is effectively in the form of a credit that eliminates tax due at lower rates, resulting in a flat rate on taxable assets under 2009 law. The gift tax exemption was, however, restricted to $1 million. For 2010, EGTRRA scheduled the elimination of the estate tax, although it retained the gift tax and its $1 million exemption. EGTRRA also provided for a carryover of basis for assets inherited at death in 2010, so that, in contrast with prior law, heirs who sold assets would have to pay tax on gains accrued during the decedent’s lifetime. This provision had a $1.3 million exemption for gain (plus $3 million for a spouse). As with other provisions of EGTRRA, the estate tax revisions were to expire in 2011, returning the tax provisions to their pre-EGTRRA levels. The exemption would have reverted to $1 million (a value that had already been scheduled for pre-EGTRRA law) and the rate to 55% (with some graduated rates). The carryover basis provision effective in 2010 would have been eliminated (so that heirs would not be taxed on gain accumulated during the decedent’s life when they inherited assets). During debate on the estate tax, most agreed that the 2010 provisions would not be continued and, indeed, could be repealed retroactively. President Obama proposed a permanent extension of the 2009 rules (a $3.5 million exemption and a 45% tax rate), and the House provided for that permanent extension on December 3, 2009 (H.R. 4154). The Senate Democratic leadership indicated a plan to retroactively reinstate the 2009 rules for 2010 and beyond. Senate Minority Leader McConnell proposed an alternative of a 35% tax rate and a $5 million exemption.9 A similar proposal for a $5 million exemption and a 35% rate, which also included the ability of the surviving spouse to inherit any unused exemption of the decedent, is often referred to as Lincoln-Kyl (named after two Senators who sponsored it). Other proposals began with the $3.5 million exemption and 45% rate and would have phased in the $5 million exemption and 55% rate. Some Members of Congress argued for permanent estate tax repeal.10 At the end of 2010, P.L. 111-312 enacted a temporary two-year extension of the estate and gift tax, with a $5 million unified exemption, a 35% rate, and inheritance of unused spousal exemptions. For 2010, estates could elect to be taxed under the estate tax or under the carryover rules. These provisions provided for estate tax rules through 2012, after which the provisions would have reverted to the pre-EGTRRA rules ($1 million exemption, 55% top rate) absent legislation. The American Taxpayer Relief Act of 2012 (P.L. 112-240) established the permanent exemption ($5.25 million, indexed for inflation?) and rate (40%) described above. The 2017 tax revision (P.L. 115-97) doubled the exemption for the years 2018 through 2025. The House had proposed doubling the exemption through 2024 and then repealing the estate tax and lowering the gift tax rates to 35%. One issue that arises with the expiration of the increased exemptions is the treatment of gifts that had been transferred with exemptions higher than the exemptions that the law would revert to.
You must only draw information for your response from the text provided. Do not use any external sources. Your answer is always less than 200 words. When mentioning Newcastle United you refer to the club as NUFC and always in bold. When mentioning Sports Direct you will refer to the company as SD and always in italics.
How many clubs do the allegations affect?
In summary, the Claimant alleges that: 1. The Club has abused its dominant position in the market for the wholesale supply of Newcastle United replica kit in the UK, in breach of the prohibition in Chapter II of the Act, by refusing to supply Sports Direct with the Club’s replica kit for the 2024/25 season and granting JD Sports, another UK sports retailer, exclusive rights as a third-party retailer of the Club’s replica kit (alongside only the Club’s and Adidas’s own channels), thereby foreclosing Sports Direct from the downstream retail market and eliminating effective competition on that market; and 2. If and to the extent that the Club contends that the refusal to supply is the necessary result of exclusivity arrangements it has agreed with JD Sports and/or Adidas, any such agreement is itself in breach of the prohibition in Chapter I of the Act and therefore void, and insofar as the Club implements any such agreement, it is breaching the Chapter I prohibition. The Claimant seeks an injunction restraining the Defendants from engaging in, and/or implementing the above breaches, damages and other relief. According to the Claim, replica kit are authentic reproductions of the short- and long-sleeved shirt, shorts, training wear, and socks (home, away, third, goalkeeper and special edition) in adult, junior and infant sizes to which a football club’s trademark is applied and which are worn by the club’s players when competing in professional football matches.
System Instruction: You must only draw information for your response from the text provided. Do not use any external sources. Your answer is always less than 200 words. When mentioning Newcastle United you refer to the club as NUFC and always in bold. When mentioning Sports Direct you will refer to the company as SD and always in italics. Question: How many clubs do the allegations affect? Context: In summary, the Claimant alleges that: 1. The Club has abused its dominant position in the market for the wholesale supply of Newcastle United replica kit in the UK, in breach of the prohibition in Chapter II of the Act, by refusing to supply Sports Direct with the Club’s replica kit for the 2024/25 season and granting JD Sports, another UK sports retailer, exclusive rights as a third-party retailer of the Club’s replica kit (alongside only the Club’s and Adidas’s own channels), thereby foreclosing Sports Direct from the downstream retail market and eliminating effective competition on that market; and 2. If and to the extent that the Club contends that the refusal to supply is the necessary result of exclusivity arrangements it has agreed with JD Sports and/or Adidas, any such agreement is itself in breach of the prohibition in Chapter I of the Act and therefore void, and insofar as the Club implements any such agreement, it is breaching the Chapter I prohibition. The Claimant seeks an injunction restraining the Defendants from engaging in, and/or implementing the above breaches, damages and other relief. According to the Claim, replica kit are authentic reproductions of the short- and long-sleeved shirt, shorts, training wear, and socks (home, away, third, goalkeeper and special edition) in adult, junior and infant sizes to which a football club’s trademark is applied and which are worn by the club’s players when competing in professional football matches.
Summarize the provided text. Only use information from the provided context. Do not rely on your own knowledge or outside sources of information.
Summarize the text.
CHAPTER ONE INFECTIOUS DISEASES 1. Introduction to infectious diseases Generally infectious diseases result from bacteria, viruses, fungi, and parasites. Despite decades of dramatic progress in their treatment and prevention, infectious diseases remain a major cause of death and are responsible for worsening the living conditions of many millions of people around the world especially in the developing countries. Infections frequently challenge the clinician’s diagnostic skill and must be considered in the differential diagnosis of syndromes affecting a multitude of organ systems. Infectious diseases often do not occur in isolated cases; rather they spread through a group exposed from a point source (e.g. a water supply contaminated with cholera) or from individual to individual (e.g. via respiratory droplets spreading tuberculosis). Many factors affect the likelihood of acquiring infections which include, host, environmental microbial factors. Host and Environmental Factors For any infectious process to occur, the parasite and the host must first encounter each other. Factors such as geography (e.g. altitude and malaria), environment (e.g. mosquito breeding site and malaria), disease vectors and host behavior (e.g. sexual behavior and sexually transmitted diseases) thus influence the likelihood of infection. Many Host Factors such as age, immunization, prior illness, nutritional status, pregnancy, coexisting illnesses and emotional status all have some impact on the risk of infection after exposure to a particular pathogen. Medical care itself can increase the patient’s risk of acquiring an infection. This can occur in several ways: through contact with the pathogens during hospitalization, through injections, surgical incisions, via mucosal surfaces by end tracheal tubes and bladder catheters, through the introduction of foreign bodies, through alteration of the natural flora with antibiotics, and through treatment with suppressive drugs such as steroids. Microbial Factors Infection involves complicated interaction of parasites and host and inevitably affects both. In most cases a pathogenic process consisting of several steps is required for the development of infections. Internal Medicine 2 Since the competent host has a complex series of defense mechanisms in place to prevent infection, the successful parasite must utilize specific strategies at each of these steps. The specific strategies used by bacteria, viruses, and parasites have some similarities, but the details are unique not only for each class of organism but also for individual species within a class; Invasion; Microorganisms attached to mucosal surface use specific mechanisms to invade deeper structures. For example, meningococci and gonococci penetrate and traverse mucosal epithelial cells by transcytotic mechanism. Tropism; In order to infect a host successfully, many pathogens occupy highly specific place within the host and thus are tropic to a particular body site or cell type. For example, malaria sporozoites are rapidly cleared from the blood into the hepatocyts, where they undergo maturation and release into the circulation; trophozoites in turn can infect only the erythrocytes. Microbial virulence strategies; Microbes have developed a variety of strategies for escaping the immunity. For example, some pathogenic organisms elaborate toxins and enzymes that facilitate the invasion of the host and are often responsible for the disease state and many bacteria are encapsulated with polysaccharides that allow them to invade and deposit in the absence of specific antibodies. Immune response: Is a defense mechanism developed by the host for recognizing and responding to microorganisms. It is divided I to two major classes. Innate and Acquired Immunity. Innate immunity (Natural Immunity): Is first line of defense and serves to protect the host with out prior exposure to the infectious agent. This immune response is nonspecific and has no memory. Examples of Innate immunity include skin and mucous mebrane, phagocytoses by macrophages and nutrophils, complement system etc Acquired (Adaptive) Immunity: Is specific immune mechanism developed against a particular organism. It takes time to develop and it has long standing memory. It has two major arms: Internal Medicine 3 • Cellular immunity: comprising T- lymphocytes, NK cells • Humeral Immunity: comprises of B-Lymphocytes and antibodies produced by plasma cells. Laboratory diagnosis The lab diagnosis of infections requires the demonstration, either 1. Direct microscopic visualization of pathogens in clinical material (e.g. Plasmodium species in blood films) or the growth of microorganisms in the laboratory (e.g. culture) or 2. Indirect (e.g. antibody / serology test for HIV), of viral, bacterial, mycotic, or parasitic agents in tissues, fluids, or excreta of the host. Treatment; Optimal therapy for infectious diseases requires a broad knowledge of medicine and careful clinical judgment. Life threatening infections such as bacterial meningitis and sepsis require urgent initiation of therapy often before a specific infective organism is identified. Antimicrobial agents must be chosen empirically and must be against the range of potential infectious agents consistent with the clinical condition. In contrast, good clinical judgment sometimes dictates withholding of antimicrobials in a self limited process or until a specific diagnosis is made. Certain infections (e.g. peritonitis, necrotizing fascitis, and abscess) require surgery as a primary means of cure; in these conditions, antibiotics play only as an adjunctive role. References: 1. Kasper L., Braunwald E., Harrison’s principles of Internal medicine, 16th Edition, Intruducion to infectious diseases, pages 695-700.
Summarize the provided text. Only use information from the provided context. Do not rely on your own knowledge or outside sources of information. CHAPTER ONE INFECTIOUS DISEASES 1. Introduction to infectious diseases Generally infectious diseases result from bacteria, viruses, fungi, and parasites. Despite decades of dramatic progress in their treatment and prevention, infectious diseases remain a major cause of death and are responsible for worsening the living conditions of many millions of people around the world especially in the developing countries. Infections frequently challenge the clinician’s diagnostic skill and must be considered in the differential diagnosis of syndromes affecting a multitude of organ systems. Infectious diseases often do not occur in isolated cases; rather they spread through a group exposed from a point source (e.g. a water supply contaminated with cholera) or from individual to individual (e.g. via respiratory droplets spreading tuberculosis). Many factors affect the likelihood of acquiring infections which include, host, environmental microbial factors. Host and Environmental Factors For any infectious process to occur, the parasite and the host must first encounter each other. Factors such as geography (e.g. altitude and malaria), environment (e.g. mosquito breeding site and malaria), disease vectors and host behavior (e.g. sexual behavior and sexually transmitted diseases) thus influence the likelihood of infection. Many Host Factors such as age, immunization, prior illness, nutritional status, pregnancy, coexisting illnesses and emotional status all have some impact on the risk of infection after exposure to a particular pathogen. Medical care itself can increase the patient’s risk of acquiring an infection. This can occur in several ways: through contact with the pathogens during hospitalization, through injections, surgical incisions, via mucosal surfaces by end tracheal tubes and bladder catheters, through the introduction of foreign bodies, through alteration of the natural flora with antibiotics, and through treatment with suppressive drugs such as steroids. Microbial Factors Infection involves complicated interaction of parasites and host and inevitably affects both. In most cases a pathogenic process consisting of several steps is required for the development of infections. Internal Medicine 2 Since the competent host has a complex series of defense mechanisms in place to prevent infection, the successful parasite must utilize specific strategies at each of these steps. The specific strategies used by bacteria, viruses, and parasites have some similarities, but the details are unique not only for each class of organism but also for individual species within a class; Invasion; Microorganisms attached to mucosal surface use specific mechanisms to invade deeper structures. For example, meningococci and gonococci penetrate and traverse mucosal epithelial cells by transcytotic mechanism. Tropism; In order to infect a host successfully, many pathogens occupy highly specific place within the host and thus are tropic to a particular body site or cell type. For example, malaria sporozoites are rapidly cleared from the blood into the hepatocyts, where they undergo maturation and release into the circulation; trophozoites in turn can infect only the erythrocytes. Microbial virulence strategies; Microbes have developed a variety of strategies for escaping the immunity. For example, some pathogenic organisms elaborate toxins and enzymes that facilitate the invasion of the host and are often responsible for the disease state and many bacteria are encapsulated with polysaccharides that allow them to invade and deposit in the absence of specific antibodies. Immune response: Is a defense mechanism developed by the host for recognizing and responding to microorganisms. It is divided I to two major classes. Innate and Acquired Immunity. Innate immunity (Natural Immunity): Is first line of defense and serves to protect the host with out prior exposure to the infectious agent. This immune response is nonspecific and has no memory. Examples of Innate immunity include skin and mucous mebrane, phagocytoses by macrophages and nutrophils, complement system etc Acquired (Adaptive) Immunity: Is specific immune mechanism developed against a particular organism. It takes time to develop and it has long standing memory. It has two major arms: Internal Medicine 3 • Cellular immunity: comprising T- lymphocytes, NK cells • Humeral Immunity: comprises of B-Lymphocytes and antibodies produced by plasma cells. Laboratory diagnosis The lab diagnosis of infections requires the demonstration, either 1. Direct microscopic visualization of pathogens in clinical material (e.g. Plasmodium species in blood films) or the growth of microorganisms in the laboratory (e.g. culture) or 2. Indirect (e.g. antibody / serology test for HIV), of viral, bacterial, mycotic, or parasitic agents in tissues, fluids, or excreta of the host. Treatment; Optimal therapy for infectious diseases requires a broad knowledge of medicine and careful clinical judgment. Life threatening infections such as bacterial meningitis and sepsis require urgent initiation of therapy often before a specific infective organism is identified. Antimicrobial agents must be chosen empirically and must be against the range of potential infectious agents consistent with the clinical condition. In contrast, good clinical judgment sometimes dictates withholding of antimicrobials in a self limited process or until a specific diagnosis is made. Certain infections (e.g. peritonitis, necrotizing fascitis, and abscess) require surgery as a primary means of cure; in these conditions, antibiotics play only as an adjunctive role. References: 1. Kasper L., Braunwald E., Harrison’s principles of Internal medicine, 16th Edition, Intruducion to infectious diseases, pages 695-700. Summarize the text.
You must answer questions based exclusively on the information provided in the prompt. You can not use external resources or prior knowledge.
What are the key differences between each clinical trial phase?
Clinical Trial Phases  Phase 1 Trials. Phase 1 trials are the first time the product is introduced in human subjects. These carefully controlled trials typically involve 20 to 80 patients or volunteer subjects, though the exact numbers may vary depending on the product. Phase 1 trials generally assess how the product acts in the body and evaluate initial safety (i.e., side effects). They may also be used to determine the dosing levels to use in phase 2 (e.g., the maximum safe dose or what dose is required to have an effect). Depending on the product, phase 1 trials may also provide some initial indication as to whether the product may be effective. In the case of vaccines specifically, phase 1 trials also assess their ability to provoke an immune response in the body (i.e., immunogenicity).  Phase 2 Trials. Phase 2 trials continue to assess safety but also evaluate the product’s effectiveness and common short-term side effects or other risks associated with the product. Phase 2 trials are also used to determine the optimal dose of the product. For vaccines, phase 2 assesses how much of the vaccine to administer and on what dosing schedule (e.g., whether a boost is needed to maximize its effectiveness or whether the vaccine must be administered on a regular schedule to maintain immunity). As with phase 1 studies, phase 2 studies are carefully controlled. However, phase 2 involves a larger (though still relatively limited) number of volunteer subjects—generally no more than a few hundred participants.  Phase 3 Trials. Phase 3 trials involve an expanded number of participants—from several hundred to thousands—and are used to assess the product’s safety and effectiveness across a wide range of patient categories through controlled and uncontrolled studies. These trials are intended to present a clearer picture of expected risks and benefits under real-world conditions. The information obtained from phase 3 trials also forms the basis for the product’s labeling. Sponsors must generally complete all three phases to obtain FDA approval unless they obtain accelerated approval, in which case FDA requires post-approval trials to confirm the expected clinical benefit. FDA may also require, at its discretion, additional clinical trials after approval (i.e., phase 4 trials) for any approved product to continue assessing the product’s safety and effectiveness once on the market.
What are the key differences between each clinical trial phase? You must answer questions based exclusively on the information provided in the prompt. You can not use external resources or prior knowledge. Clinical Trial Phases  Phase 1 Trials. Phase 1 trials are the first time the product is introduced in human subjects. These carefully controlled trials typically involve 20 to 80 patients or volunteer subjects, though the exact numbers may vary depending on the product. Phase 1 trials generally assess how the product acts in the body and evaluate initial safety (i.e., side effects). They may also be used to determine the dosing levels to use in phase 2 (e.g., the maximum safe dose or what dose is required to have an effect). Depending on the product, phase 1 trials may also provide some initial indication as to whether the product may be effective. In the case of vaccines specifically, phase 1 trials also assess their ability to provoke an immune response in the body (i.e., immunogenicity).  Phase 2 Trials. Phase 2 trials continue to assess safety but also evaluate the product’s effectiveness and common short-term side effects or other risks associated with the product. Phase 2 trials are also used to determine the optimal dose of the product. For vaccines, phase 2 assesses how much of the vaccine to administer and on what dosing schedule (e.g., whether a boost is needed to maximize its effectiveness or whether the vaccine must be administered on a regular schedule to maintain immunity). As with phase 1 studies, phase 2 studies are carefully controlled. However, phase 2 involves a larger (though still relatively limited) number of volunteer subjects—generally no more than a few hundred participants.  Phase 3 Trials. Phase 3 trials involve an expanded number of participants—from several hundred to thousands—and are used to assess the product’s safety and effectiveness across a wide range of patient categories through controlled and uncontrolled studies. These trials are intended to present a clearer picture of expected risks and benefits under real-world conditions. The information obtained from phase 3 trials also forms the basis for the product’s labeling. Sponsors must generally complete all three phases to obtain FDA approval unless they obtain accelerated approval, in which case FDA requires post-approval trials to confirm the expected clinical benefit. FDA may also require, at its discretion, additional clinical trials after approval (i.e., phase 4 trials) for any approved product to continue assessing the product’s safety and effectiveness once on the market.
{instruction} ========== In your answer, refer only to the context document. Do not employ any outside knowledge {question} ========== [user request] {passage 0} ========== [context document]
What is considered the president's core constitutional powers and what is the case law that the court relies on to reach this core? Please list the case law at the end of your response in bulleted form. Give me the full case citation so I can look them up myself later.
The D. C. Circuit affirmed. 91 F. 4th 1173 (2024) (per curiam). Citing Marbury v. Madison, 1 Cranch 137 (1803), the court distinguished between two kinds of official acts: discretionary and ministerial. 91 F. 4th, at 1189–1190. It observed that “although discretionary acts are ‘only politically examinable,’ the judiciary has the power to hear cases” involving ministerial acts that an officer is directed to perform by the legislature. Ibid. (quoting Marbury, 1 Cranch, at 166). From this distinction, the D. C. Circuit concluded that the “separation of powers doctrine, as expounded in Marbury and its progeny, necessarily permits the Judiciary to oversee the federal criminal prosecution of a former President for his official acts because the fact of the prosecution means that the former President has allegedly acted in defiance of the Congress’s laws.” 91 F. 4th, at 1191. In the court’s view, the fact that Trump’s actions “allegedly violated generally applicable criminal laws” meant that those actions “were not properly within the scope of his lawful discretion.” Id., at 1192. The D. C. Circuit thus concluded that Trump had “no structural immunity from the charges in the Indictment.” Ibid. Like the District Court, the D. C. We granted certiorari to consider the following question: “Whether and if so to what extent does a former President enjoy presidential immunity from criminal prosecution for conduct alleged to involve official acts during his tenure in office.” 601 U. S. ___ (2024). II This case is the first criminal prosecution in our Nation’s history of a former President for actions taken during his Presidency. We are called upon to consider whether and under what circumstances such a prosecution may proceed. Doing so requires careful assessment of the scope of Presidential power under the Constitution. We undertake that responsibility conscious that we must not confuse “the issue of a power’s validity with the cause it is invoked to promote,” but must instead focus on the “enduring consequences upon the balanced power structure of our Republic.” Youngstown Sheet & Tube Co. v. Sawyer, 343 U. S. 579, 634 (1952) (Jackson, J., concurring). The parties before us do not dispute that a former President can be subject to criminal prosecution for unofficial acts committed while in office. See Tr. of Oral Arg. 28. They also agree that some of the conduct described in the indictment includes actions taken by Trump in his unofficial capacity. See id., at 28–30, 36–37, 124. They disagree, however, about whether a former President can be prosecuted for his official actions. Trump contends that just as a President is absolutely immune from civil damages liability for acts within the outer perimeter of his official responsibilities, Fitzgerald, 457 U. S., at 756, he must be absolutely immune from criminal prosecution for such acts. Brief for Petitioner 10. And Trump argues that the bulk of the indictment’s allegations involve conduct in 6 TRUMP v. UNITED STATES Opinion of the Court his official capacity as President. See Tr. of Oral Arg. 30– 32. Although the Government agrees that some official actions are included in the indictment’s allegations, see id., at 125, it maintains that a former President does not enjoy immunity from criminal prosecution for any actions, regardless of how they are characterized. See Brief for United States 9. We conclude that under our constitutional structure of separated powers, the nature of Presidential power requires that a former President have some immunity from criminal prosecution for official acts during his tenure in office. At least with respect to the President’s exercise of his core constitutional powers, this immunity must be absolute. As for his remaining official actions, he is also entitled to immunity. At the current stage of proceedings in this case, however, we need not and do not decide whether that immunity must be absolute, or instead whether a presumptive immunity is sufficient. A Article II of the Constitution provides that “[t]he executive Power shall be vested in a President of the United States of America.” §1, cl. 1. The President’s duties are of “unrivaled gravity and breadth.” Trump v. Vance, 591 U. S. 786, 800 (2020). They include, for instance, commanding the Armed Forces of the United States; granting reprieves and pardons for offenses against the United States; and appointing public ministers and consuls, the Justices of this Court, and Officers of the United States. See §2. He also has important foreign relations responsibilities: making treaties, appointing ambassadors, recognizing foreign governments, meeting foreign leaders, overseeing international diplomacy and intelligence gathering, and managing matters related to terrorism, trade, and immigration. See §§2, 3. Domestically, he must “take Care that the Laws be faithfully executed,” §3, and he bears responsibility for the Cite as: 603 U. S. ____ (2024) 7 Opinion of the Court actions of the many departments and agencies within the Executive Branch. He also plays a role in lawmaking by recommending to Congress the measures he thinks wise and signing or vetoing the bills Congress passes. See Art. I, §7, cl. 2; Art. II, §3. No matter the context, the President’s authority to act necessarily “stem[s] either from an act of Congress or from the Constitution itself.” Youngstown, 343 U. S., at 585. In the latter case, the President’s authority is sometimes “conclusive and preclusive.” Id., at 638 (Jackson, J., concurring). When the President exercises such authority, he may act even when the measures he takes are “incompatible with the expressed or implied will of Congress.” Id., at 637. The exclusive constitutional authority of the President “disabl[es] the Congress from acting upon the subject.” Id., at 637–638. And the courts have “no power to control [the President’s] discretion” when he acts pursuant to the powers invested exclusively in him by the Constitution. Marbury, 1 Cranch, at 166. 8 TRUMP v. UNITED STATES Opinion of the Court (1872). But in 1870, Congress enacted a provision that prohibited using the President’s pardon as evidence of restoration of property rights. Id., at 143–144. Chief Justice Chase held the provision unconstitutional because it “impair[ed] the effect of a pardon, and thus infring[ed] the constitutional power of the Executive.” Id., at 147. “To the executive alone is intrusted the power of pardon,” and the “legislature cannot change the effect of such a pardon any more than the executive can change a law.” Id., at 147–148. The President’s authority to pardon, in other words, is “conclusive and preclusive,” “disabling the Congress from acting upon the subject.” Youngstown, 343 U. S., at 637–638 (Jackson, J., concurring). Some of the President’s other constitutional powers also fit that description. “The President’s power to remove—and thus supervise—those who wield executive power on his behalf,” for instance, “follows from the text of Article II.” Seila Law LLC v. Consumer Financial Protection Bureau, 591 U. S. 197, 204 (2020). We have thus held that Congress lacks authority to control the President’s “unrestricted power of removal” with respect to “executive officers of the United States whom he has appointed.” Myers v. United States, 272 U. S. 52, 106, 176 (1926); see Youngstown, 343 U. S., at 638, n. 4 (Jackson, J., concurring) (citing the President’s “exclusive power of removal in executive agencies” as an example of “conclusive and preclusive” constitutional authority); cf. Seila Law, 591 U. S., at 215 (noting only “two exceptions to the President’s unrestricted removal power”). The power “to control recognition determinations” of foreign countries is likewise an “exclusive power of the President.” Zivotofsky v. Kerry, 576 U. S. 1, 32 (2015). Congressional commands contrary to the President’s recognition determinations are thus invalid. Ibid.
{instruction} ========== In your answer, refer only to the context document. Do not employ any outside knowledge {question} ========== What is considered the president's core constitutional powers and what is the case law that the court relies on to reach this core? Please list the case law at the end of your response in bulleted form. Give me the full case citation so I can look them up myself later. {passage 0} ========== The D. C. Circuit affirmed. 91 F. 4th 1173 (2024) (per curiam). Citing Marbury v. Madison, 1 Cranch 137 (1803), the court distinguished between two kinds of official acts: discretionary and ministerial. 91 F. 4th, at 1189–1190. It observed that “although discretionary acts are ‘only politically examinable,’ the judiciary has the power to hear cases” involving ministerial acts that an officer is directed to perform by the legislature. Ibid. (quoting Marbury, 1 Cranch, at 166). From this distinction, the D. C. Circuit concluded that the “separation of powers doctrine, as expounded in Marbury and its progeny, necessarily permits the Judiciary to oversee the federal criminal prosecution of a former President for his official acts because the fact of the prosecution means that the former President has allegedly acted in defiance of the Congress’s laws.” 91 F. 4th, at 1191. In the court’s view, the fact that Trump’s actions “allegedly violated generally applicable criminal laws” meant that those actions “were not properly within the scope of his lawful discretion.” Id., at 1192. The D. C. Circuit thus concluded that Trump had “no structural immunity from the charges in the Indictment.” Ibid. Like the District Court, the D. C. We granted certiorari to consider the following question: “Whether and if so to what extent does a former President enjoy presidential immunity from criminal prosecution for conduct alleged to involve official acts during his tenure in office.” 601 U. S. ___ (2024). II This case is the first criminal prosecution in our Nation’s history of a former President for actions taken during his Presidency. We are called upon to consider whether and under what circumstances such a prosecution may proceed. Doing so requires careful assessment of the scope of Presidential power under the Constitution. We undertake that responsibility conscious that we must not confuse “the issue of a power’s validity with the cause it is invoked to promote,” but must instead focus on the “enduring consequences upon the balanced power structure of our Republic.” Youngstown Sheet & Tube Co. v. Sawyer, 343 U. S. 579, 634 (1952) (Jackson, J., concurring). The parties before us do not dispute that a former President can be subject to criminal prosecution for unofficial acts committed while in office. See Tr. of Oral Arg. 28. They also agree that some of the conduct described in the indictment includes actions taken by Trump in his unofficial capacity. See id., at 28–30, 36–37, 124. They disagree, however, about whether a former President can be prosecuted for his official actions. Trump contends that just as a President is absolutely immune from civil damages liability for acts within the outer perimeter of his official responsibilities, Fitzgerald, 457 U. S., at 756, he must be absolutely immune from criminal prosecution for such acts. Brief for Petitioner 10. And Trump argues that the bulk of the indictment’s allegations involve conduct in 6 TRUMP v. UNITED STATES Opinion of the Court his official capacity as President. See Tr. of Oral Arg. 30– 32. Although the Government agrees that some official actions are included in the indictment’s allegations, see id., at 125, it maintains that a former President does not enjoy immunity from criminal prosecution for any actions, regardless of how they are characterized. See Brief for United States 9. We conclude that under our constitutional structure of separated powers, the nature of Presidential power requires that a former President have some immunity from criminal prosecution for official acts during his tenure in office. At least with respect to the President’s exercise of his core constitutional powers, this immunity must be absolute. As for his remaining official actions, he is also entitled to immunity. At the current stage of proceedings in this case, however, we need not and do not decide whether that immunity must be absolute, or instead whether a presumptive immunity is sufficient. A Article II of the Constitution provides that “[t]he executive Power shall be vested in a President of the United States of America.” §1, cl. 1. The President’s duties are of “unrivaled gravity and breadth.” Trump v. Vance, 591 U. S. 786, 800 (2020). They include, for instance, commanding the Armed Forces of the United States; granting reprieves and pardons for offenses against the United States; and appointing public ministers and consuls, the Justices of this Court, and Officers of the United States. See §2. He also has important foreign relations responsibilities: making treaties, appointing ambassadors, recognizing foreign governments, meeting foreign leaders, overseeing international diplomacy and intelligence gathering, and managing matters related to terrorism, trade, and immigration. See §§2, 3. Domestically, he must “take Care that the Laws be faithfully executed,” §3, and he bears responsibility for the Cite as: 603 U. S. ____ (2024) 7 Opinion of the Court actions of the many departments and agencies within the Executive Branch. He also plays a role in lawmaking by recommending to Congress the measures he thinks wise and signing or vetoing the bills Congress passes. See Art. I, §7, cl. 2; Art. II, §3. No matter the context, the President’s authority to act necessarily “stem[s] either from an act of Congress or from the Constitution itself.” Youngstown, 343 U. S., at 585. In the latter case, the President’s authority is sometimes “conclusive and preclusive.” Id., at 638 (Jackson, J., concurring). When the President exercises such authority, he may act even when the measures he takes are “incompatible with the expressed or implied will of Congress.” Id., at 637. The exclusive constitutional authority of the President “disabl[es] the Congress from acting upon the subject.” Id., at 637–638. And the courts have “no power to control [the President’s] discretion” when he acts pursuant to the powers invested exclusively in him by the Constitution. Marbury, 1 Cranch, at 166. 8 TRUMP v. UNITED STATES Opinion of the Court (1872). But in 1870, Congress enacted a provision that prohibited using the President’s pardon as evidence of restoration of property rights. Id., at 143–144. Chief Justice Chase held the provision unconstitutional because it “impair[ed] the effect of a pardon, and thus infring[ed] the constitutional power of the Executive.” Id., at 147. “To the executive alone is intrusted the power of pardon,” and the “legislature cannot change the effect of such a pardon any more than the executive can change a law.” Id., at 147–148. The President’s authority to pardon, in other words, is “conclusive and preclusive,” “disabling the Congress from acting upon the subject.” Youngstown, 343 U. S., at 637–638 (Jackson, J., concurring). Some of the President’s other constitutional powers also fit that description. “The President’s power to remove—and thus supervise—those who wield executive power on his behalf,” for instance, “follows from the text of Article II.” Seila Law LLC v. Consumer Financial Protection Bureau, 591 U. S. 197, 204 (2020). We have thus held that Congress lacks authority to control the President’s “unrestricted power of removal” with respect to “executive officers of the United States whom he has appointed.” Myers v. United States, 272 U. S. 52, 106, 176 (1926); see Youngstown, 343 U. S., at 638, n. 4 (Jackson, J., concurring) (citing the President’s “exclusive power of removal in executive agencies” as an example of “conclusive and preclusive” constitutional authority); cf. Seila Law, 591 U. S., at 215 (noting only “two exceptions to the President’s unrestricted removal power”). The power “to control recognition determinations” of foreign countries is likewise an “exclusive power of the President.” Zivotofsky v. Kerry, 576 U. S. 1, 32 (2015). Congressional commands contrary to the President’s recognition determinations are thus invalid. Ibid. https://www.supremecourt.gov/opinions/23pdf/23-939_e2pg.pdf
Answer the question based solely on the information provided in the passage. Do not use any external knowledge or resources. [user request] [context document]
Summarize the provided information about Shigella in less than 600 words. At the end of the summary, list the symptoms one may experience in bold print.
Clinical Manifestations Symptoms of shigellosis include abdominal pain, tenesmus, watery diarrhea, and/or dysentery (multiple scanty, bloody, mucoid stools). Other signs may include abdominal tenderness, fever, vomiting, dehydration, and convulsions. Structure, Classification, and Antigenic Types Shigellae are Gram-negative, nonmotile, facultatively anaerobic, non-spore-forming rods. Shigella are differentiated from the closely related Escherichia coli on the basis of pathogenicity, physiology (failure to ferment lactose or decarboxylate lysine) and serology. The genus is divided into four serogroups with multiple serotypes: A (S dysenteriae, 12 serotypes); B (S flexneri, 6 serotypes); C (S boydii, 18 serotypes); and D (S sonnei, 1 serotype). Pathogenesis Infection is initiated by ingestion of shigellae (usually via fecal-oral contamination). An early symptom, diarrhea (possibly elicited by enterotoxins and/or cytotoxin), may occur as the organisms pass through the small intestine. The hallmarks of shigellosis are bacterial invasion of the colonic epithelium and inflammatory colitis. These are interdependent processes amplified by local release of cytokines and by the infiltration of inflammatory elements. Colitis in the rectosigmoid mucosa, with concomitant malabsorption, results in the characteristic sign of bacillary dysentery: scanty,. unformed stools tinged with blood and mucus. Host Defenses Inflammation, copious mucus secretion, and regeneration of the damaged colonic epithelium limit the spread of colitis and promote spontaneous recovery. Serotype-specific immunity is induced by a primary infection, suggesting a protective role of antibody recognizing the lipopolysaccharide (LPS) somatic antigen. Other Shigella antigens include enterotoxins, cytotoxin, and plasmid-encoded proteins that induce bacterial invasion of the epithelium. The protective role of immune responses against these antigens is unclear. Epidemiology Shigellosis is endemic in developing countries were sanitation is poor. Typically 10 to 20 percent of enteric disease, and 50% of the bloody diarrhea or dysentery of young children, can be characterized as shigellosis, and the prevalence of these infections decreases significantly after five years of life. In developed countries, single-source, food or water-borne outbreaks occur sporadically, and pockets of endemic shigellosis can be found in institutions and in remote areas with substandard sanitary facilities. Diagnosis Shigellosis can be correctly diagnosed in most patients on the basis of fresh blood in the stool. Neutrophils in fecal smears is also a strongly suggestive sign. Nonetheless, watery, mucoid diarrhea may be the only symptom of many S sonnei infections, and any clinical diagnosis should be confirmed by cultivation of the etiologic agent from stools. Control Prevention of fecal-oral transmission is the most effective control strategy. Severe dysentery is treated with ampicillin, trimethoprim-sulfamethoxazole, or, in patients over 17 years old, a 4-fluorquinolone such as ciprofloxacin. Vaccines are not currently available, but some promising candidates are being developed. Gram-negative, facultative anaerobes of the genus Shigella are the principal agents of bacillary dysentery. This disease differs from profuse watery diarrhea, as is commonly seen in choleraic diarrhea or in enterotoxigenic Escherichia coli diarrhea, in that the dysenteric stool is scant and contains blood, mucus, and inflammatory cells. In some individuals suffering from shigellosis, however, moderate volume diarrhea is a prodrome or the sole manifestation of the infection. Bacillary dysentery constitutes a significant proportion of acute intestinal disease in the children of developing countries, and this infection is a major contributor to stunted growth of these children. Shigellosis also presents a significant risk to travelers from developed countries when visiting in endemic areas, and sporadic food or water-borne outbreaks occur in developed countries. The pathogenic mechanism of shigellosis is complex, involving a possible enterotoxic and/or cytotoxic diarrheal prodrome, cytokine-mediated inflammation of the colon, and necrosis of the colonic epithelium. The underlying physiological insult that initiates this inflammatory cascade is the invasion of Shigella into the colonic epithelium and the lamina propria. The resulting colitis and ulceration of the mucosa result in bloody, mucoid stools, and/or febrile diarrhea.
Answer the question based solely on the information provided in the passage. Do not use any external knowledge or resources. Summarize the provided information about Shigella in less than 600 words. At the end of the summary, list the symptoms one may experience in bold print. Clinical Manifestations Symptoms of shigellosis include abdominal pain, tenesmus, watery diarrhea, and/or dysentery (multiple scanty, bloody, mucoid stools). Other signs may include abdominal tenderness, fever, vomiting, dehydration, and convulsions. Structure, Classification, and Antigenic Types Shigellae are Gram-negative, nonmotile, facultatively anaerobic, non-spore-forming rods. Shigella are differentiated from the closely related Escherichia coli on the basis of pathogenicity, physiology (failure to ferment lactose or decarboxylate lysine) and serology. The genus is divided into four serogroups with multiple serotypes: A (S dysenteriae, 12 serotypes); B (S flexneri, 6 serotypes); C (S boydii, 18 serotypes); and D (S sonnei, 1 serotype). Pathogenesis Infection is initiated by ingestion of shigellae (usually via fecal-oral contamination). An early symptom, diarrhea (possibly elicited by enterotoxins and/or cytotoxin), may occur as the organisms pass through the small intestine. The hallmarks of shigellosis are bacterial invasion of the colonic epithelium and inflammatory colitis. These are interdependent processes amplified by local release of cytokines and by the infiltration of inflammatory elements. Colitis in the rectosigmoid mucosa, with concomitant malabsorption, results in the characteristic sign of bacillary dysentery: scanty,. unformed stools tinged with blood and mucus. Host Defenses Inflammation, copious mucus secretion, and regeneration of the damaged colonic epithelium limit the spread of colitis and promote spontaneous recovery. Serotype-specific immunity is induced by a primary infection, suggesting a protective role of antibody recognizing the lipopolysaccharide (LPS) somatic antigen. Other Shigella antigens include enterotoxins, cytotoxin, and plasmid-encoded proteins that induce bacterial invasion of the epithelium. The protective role of immune responses against these antigens is unclear. Epidemiology Shigellosis is endemic in developing countries were sanitation is poor. Typically 10 to 20 percent of enteric disease, and 50% of the bloody diarrhea or dysentery of young children, can be characterized as shigellosis, and the prevalence of these infections decreases significantly after five years of life. In developed countries, single-source, food or water-borne outbreaks occur sporadically, and pockets of endemic shigellosis can be found in institutions and in remote areas with substandard sanitary facilities. Diagnosis Shigellosis can be correctly diagnosed in most patients on the basis of fresh blood in the stool. Neutrophils in fecal smears is also a strongly suggestive sign. Nonetheless, watery, mucoid diarrhea may be the only symptom of many S sonnei infections, and any clinical diagnosis should be confirmed by cultivation of the etiologic agent from stools. Control Prevention of fecal-oral transmission is the most effective control strategy. Severe dysentery is treated with ampicillin, trimethoprim-sulfamethoxazole, or, in patients over 17 years old, a 4-fluorquinolone such as ciprofloxacin. Vaccines are not currently available, but some promising candidates are being developed. Gram-negative, facultative anaerobes of the genus Shigella are the principal agents of bacillary dysentery. This disease differs from profuse watery diarrhea, as is commonly seen in choleraic diarrhea or in enterotoxigenic Escherichia coli diarrhea, in that the dysenteric stool is scant and contains blood, mucus, and inflammatory cells. In some individuals suffering from shigellosis, however, moderate volume diarrhea is a prodrome or the sole manifestation of the infection. Bacillary dysentery constitutes a significant proportion of acute intestinal disease in the children of developing countries, and this infection is a major contributor to stunted growth of these children. Shigellosis also presents a significant risk to travelers from developed countries when visiting in endemic areas, and sporadic food or water-borne outbreaks occur in developed countries. The pathogenic mechanism of shigellosis is complex, involving a possible enterotoxic and/or cytotoxic diarrheal prodrome, cytokine-mediated inflammation of the colon, and necrosis of the colonic epithelium. The underlying physiological insult that initiates this inflammatory cascade is the invasion of Shigella into the colonic epithelium and the lamina propria. The resulting colitis and ulceration of the mucosa result in bloody, mucoid stools, and/or febrile diarrhea. https://www.ncbi.nlm.nih.gov/books/NBK8038/
You may only respond to the prompt using information provided in the context block.
Can I reuse the OEM hardware for this?
Before beginning the installation, thoroughly & completely read these instructions. Please refer to the Parts List to insure that all parts & hardware are received prior to the disassembly of the vehicle. If any parts are found to be missing, contact SKYJACKER® Customer Service at 318-388-0816 to obtain the needed items. If you have any questions or reservations about installing this product, contact SKYJACKER® Technical Assistance at 318-388-0816. Installation: 1. Park the vehicle on a flat, level surface & block the front & rear tires. 2. Place the transmission in neutral. 3. Loosen all of the engine mount bolts about ½ turn. 4. Support the transfer case cross member with a transmission or floor jack. Remove the bolts & nuts for each side of the cross member. 5. Slowly lower the cross member, approximately 2", to allow enough room to install the new Skyjacker tubular spacers. 1994-2001 Jeep Cherokee XJ Install the new Skyjacker transfer case linkage pivot drop bracket to the stock pivot bracket using the OEM hardware. Using the two 1/4" x 1" bolts with a flat washer & self locking nut, bolt the ball swivel bracket (See Arrow in Photo # 3) to the new Skyjacker drop bracket. Note: The bracket has two sets of holes. The bottom holes are for a 4" lift as shown & the upper holes are for a 2 1/2" lift. 2. Placing the pivot bracket back in location, start the end of the rod through the ball swivel & bolt the bracket in location with the OEM hardware. (See Photo # 4) 3. Check to make sure that the transfer case will fully engage at each end of the shifter travel. If linkage adjustment is required, 4. Check the transfer case shifter to see if it will move to 4L. If not, the linkage will need adjusting as follows. Place the shifter in 4L, loosen the adjustment bolt & push the linkage ("B" Arrow in Photo # 5) forward until it stops. Now retighten adjustment bolt. Check to be sure the 4WD works properly. 5. On 5 speed models, engage the clutch & check the transmission shifter to see if it will go into 2nd gear. If not, the shifter housing on the floor will need trimming. Remove the center console, pull back the carpet, remove the screws holding the shifter boot to the floor, & trim or grind the floor board until sufficient clearance is obtained. Shift through each gear to check clearance at this time. Now reinstall the shifter boot, carpet, & console.
You may only respond to the prompt using information provided in the context block. Can I reuse the OEM hardware for this? Before beginning the installation, thoroughly & completely read these instructions. Please refer to the Parts List to insure that all parts & hardware are received prior to the disassembly of the vehicle. If any parts are found to be missing, contact SKYJACKER® Customer Service at 318-388-0816 to obtain the needed items. If you have any questions or reservations about installing this product, contact SKYJACKER® Technical Assistance at 318-388-0816. Installation: 1. Park the vehicle on a flat, level surface & block the front & rear tires. 2. Place the transmission in neutral. 3. Loosen all of the engine mount bolts about ½ turn. 4. Support the transfer case cross member with a transmission or floor jack. Remove the bolts & nuts for each side of the cross member. 5. Slowly lower the cross member, approximately 2", to allow enough room to install the new 6. Install the new Skyjacker tubular spacers between the cross member & frame. Slowly raise the jack to firmly hold the tubular spacers in place. 7. Install the OEM nuts, removed in Step # 4, onto the studs that are protruding out of the frame on each side to hold the top half of the new spacers in place. Note: There is only one stud on each side protruding out of the frame. Next, install the 3/8" x 1" bolt on each side through the cross member & the bottom half of the new tubular spacers. Install the 3/8 nut, washer, & hand tighten. 8. Install the new 10mm x 60mm bolt up through the cross member & tubular spacer & tighten to 33 ft. lbs. (See Photo # 2) 9. Tighten the 3/8" nut down onto the 3/8" x 1" bolt from Step # 7 to 33 ft-lbs. Remove the transmission jack & set aside. 10. Re-torque the engine mount bolts loosened in Step # 3. The engine mount to block bolts torque to 45 ft-lbs. The engine mount to frame bolts torque to 30 ft-lbs. The thru bolts torque to 48 ft-lbs. 11. Install the transfer case linkage bracket. (See Steps # 1 thru # 5 Below) Skyjacker tubular spacers. 1994-2001 Jeep Cherokee XJ Install the new Skyjacker transfer case linkage pivot drop bracket to the stock pivot bracket using the OEM hardware. Using the two 1/4" x 1" bolts with a flat washer & self locking nut, bolt the ball swivel bracket (See Arrow in Photo # 3) to the new Skyjacker drop bracket. Note: The bracket has two sets of holes. The bottom holes are for a 4" lift as shown & the upper holes are for a 2 1/2" lift. 2. Placing the pivot bracket back in location, start the end of the rod through the ball swivel & bolt the bracket in location with the OEM hardware. (See Photo # 4) 3. Check to make sure that the transfer case will fully engage at each end of the shifter travel. If linkage adjustment is required, 4. Check the transfer case shifter to see if it will move to 4L. If not, the linkage will need adjusting as follows. Place the shifter in 4L, loosen the adjustment bolt & push the linkage ("B" Arrow in Photo # 5) forward until it stops. Now retighten adjustment bolt. Check to be sure the 4WD works properly. 5. On 5 speed models, engage the clutch & check the transmission shifter to see if it will go into 2nd gear. If not, the shifter housing on the floor will need trimming. Remove the center console, pull back the carpet, remove the screws holding the shifter boot to the floor, & trim or grind the floor board until sufficient clearance is obtained. Shift through each gear to check clearance at this time. Now reinstall the shifter boot, carpet, & console.
Draw your answer from the prompt text only.
What examples does the text give of government interests that are important enough to justify regulating speech related to strict and intermediate scrutiny?
Levels of Scrutiny and Key Concepts Most often, a court adjudicating a free speech challenge will analyze the constitutionality of a law or government action by applying a level of scrutiny derived from the Supreme Court’s First Amendment precedents. The two most common levels of scrutiny in free speech analysis are strict and intermediate scrutiny.35 Strict scrutiny generally applies to laws that regulate speech on the basis of its content or message. 36 It is a “demanding standard” that the government is rarely able to meet.37 Intermediate scrutiny has several different formulations but generally applies to content-neutral laws and commercial speech restrictions. 38 Intermediate scrutiny too presents a high bar for the government, but regulations of speech are more likely to survive intermediate than strict scrutiny. To varying degrees, each level of scrutiny requires the government to prove that it has a sufficiently important interest in regulating the speech at issue and that the law directly advances and is narrowly tailored to that interest. While laws that fail strict or intermediate scrutiny often do so on lack-of-tailoring grounds, the government sometimes fails to show that its interests are “real” and “not merely conjectural.”39 For example, it may be insufficient for the government to cite an interest that is significant in the abstract if the government lacks evidence of a concrete harm threatening that interest.40 For “prophylactic” speech restrictions in particular, the government must “demonstrate that it is regulating speech in order to address what is in fact a serious problem and that the preventative measure it proposes will contribute in a material way to solving that problem.”41 For more information on the levels of scrutiny and other key First Amendment concepts, readers of this report’s HTML and PDF formats can click on a term or phrase in the text box titled “Free Speech Terminology” to navigate to a discussion of that concept. Strict Scrutiny Strict scrutiny generally applies to content-based laws—laws that regulate speech on the basis of its subject matter, topic, or substantive message.42 A law can be content based on its face or in its design or purpose.43 The Supreme Court considers viewpoint discrimination—distinctions based on a “specific motivating ideology,” opinion, or perspective—to be “an egregious form of content discrimination.”44 For this reason, courts sometimes invalidate viewpoint-based laws summarily, without undertaking a strict scrutiny analysis.45 Under strict scrutiny, the government must prove that its law is narrowly tailored to advance a compelling governmental interest and that the law is the least restrictive means of serving that interest.46 While not an exhaustive list, the Supreme Court has identified the following interests as compelling, at least in certain contexts: • “national security”; 47 • “public confidence in judicial integrity”; 48 • “protecting the physical and psychological well-being of minors”; 49 • “ensur[ing] the basic human rights of members of groups that have historically been subjected to discrimination”; 50 • “eradicating discrimination against [a state’s] female citizens”; 51 and • “depriving criminals of the profits of their crimes, and in using these funds to compensate victims.” 52 Both strict and intermediate scrutiny require narrow tailoring, 53 meaning that the government must “pursue its legitimate interests through ‘means that are neither seriously underinclusive nor seriously overinclusive.’” 54 The precise degree of tailoring required under each standard differs. Under strict scrutiny, the challenged law or action must be the “least restrictive means” of satisfying the government’s compelling interest. In other words, “[i]f a less restrictive alternative would serve the Government’s purpose, the legislature must use that alternative.”55 Intermediate Scrutiny Intermediate scrutiny typically applies to content-neutral laws and commercial speech restrictions, albeit following different lines of Supreme Court precedent. 56 A law is content neutral if it “serves purposes unrelated to the content of expression”57 and does not, on its face, regulate speech on the basis of its subject matter, topic, or viewpoint.58 The Supreme Court has established an intermediate scrutiny standard for content-neutral time, place, or manner regulations.59 Specifically, the Court has held that “[e]xpression, whether oral or written or symbolized by conduct, is subject to reasonable time, place, or manner restrictions,” 60 such as a regulation to control the volume of music played at a bandshell in a public park.61 Time, place, or manner restrictions “are valid provided that they are justified without reference to the content of the regulated speech, that they are narrowly tailored to serve a significant governmental interest, and that they leave open ample alternative channels for communication of the information.” 62 A similar test set out in United States v. O’Brien is used to evaluate restrictions on certain types of expressive conduct, such as “when ‘speech’ and ‘nonspeech’ elements are combined in the same course of conduct.”63 Intermediate scrutiny is also the standard applied to commercial speech restrictions. Commercial speech is (1) speech that “does no more than propose a commercial transaction” (e.g., an advertisement for a product or service); 64 or (2) “expression related solely to the economic interests of the speaker and its audience.”65 To sustain a restriction on lawful, nonmisleading commercial speech, the government must meet the standard set out in Central Hudson Gas and Electric Corp. v. Public Service Commission. 66 Specifically, the government must show that its law “directly advances” a “substantial” governmental interest and is narrowly tailored—that is, “not more extensive than necessary”—to serve that interest. 67 Examples of substantial or important governmental interests include • protecting the public from deceptive and misleading trade practices;68 • “maintaining standards of ethical conduct in the licensed professions”; 69 • “energy conservation”; 70 • preventing “quid pro quo” corruption or its appearance in election campaigns;71 and “promoting fair competition in the market for television programming.” 72 The tailoring requirement for intermediate scrutiny is less rigorous than for strict scrutiny. Under intermediate scrutiny, a law “need not be the least restrictive or least intrusive means” of advancing the government’s interest.73 Nevertheless, the government “still ‘may not regulate expression in such a manner that a substantial portion of the burden on speech does not serve to advance its goals.’” 74 Narrow tailoring for commercial speech restrictions, for example, requires “a fit that is not necessarily perfect, but reasonable; that represents not necessarily the single best disposition but one whose scope is in proportion to the interest served.”
Draw your answer from the prompt text only. What examples does the text give of government interests that are important enough to justify regulating speech related to strict and intermediate scrutiny? Levels of Scrutiny and Key Concepts Most often, a court adjudicating a free speech challenge will analyze the constitutionality of a law or government action by applying a level of scrutiny derived from the Supreme Court’s First Amendment precedents. The two most common levels of scrutiny in free speech analysis are strict and intermediate scrutiny.35 Strict scrutiny generally applies to laws that regulate speech on the basis of its content or message. 36 It is a “demanding standard” that the government is rarely able to meet.37 Intermediate scrutiny has several different formulations but generally applies to content-neutral laws and commercial speech restrictions. 38 Intermediate scrutiny too presents a high bar for the government, but regulations of speech are more likely to survive intermediate than strict scrutiny. To varying degrees, each level of scrutiny requires the government to prove that it has a sufficiently important interest in regulating the speech at issue and that the law directly advances and is narrowly tailored to that interest. While laws that fail strict or intermediate scrutiny often do so on lack-of-tailoring grounds, the government sometimes fails to show that its interests are “real” and “not merely conjectural.”39 For example, it may be insufficient for the government to cite an interest that is significant in the abstract if the government lacks evidence of a concrete harm threatening that interest.40 For “prophylactic” speech restrictions in particular, the government must “demonstrate that it is regulating speech in order to address what is in fact a serious problem and that the preventative measure it proposes will contribute in a material way to solving that problem.”41 For more information on the levels of scrutiny and other key First Amendment concepts, readers of this report’s HTML and PDF formats can click on a term or phrase in the text box titled “Free Speech Terminology” to navigate to a discussion of that concept. Strict Scrutiny Strict scrutiny generally applies to content-based laws—laws that regulate speech on the basis of its subject matter, topic, or substantive message.42 A law can be content based on its face or in its design or purpose.43 The Supreme Court considers viewpoint discrimination—distinctions based on a “specific motivating ideology,” opinion, or perspective—to be “an egregious form of content discrimination.”44 For this reason, courts sometimes invalidate viewpoint-based laws summarily, without undertaking a strict scrutiny analysis.45 Under strict scrutiny, the government must prove that its law is narrowly tailored to advance a compelling governmental interest and that the law is the least restrictive means of serving that interest.46 While not an exhaustive list, the Supreme Court has identified the following interests as compelling, at least in certain contexts: • “national security”;47 • “public confidence in judicial integrity”;48 • “protecting the physical and psychological well-being of minors”; 49 • “ensur[ing] the basic human rights of members of groups that have historically been subjected to discrimination”; 50 • “eradicating discrimination against [a state’s] female citizens”; 51 and • “depriving criminals of the profits of their crimes, and in using these funds to compensate victims.” 52 Both strict and intermediate scrutiny require narrow tailoring, 53 meaning that the government must “pursue its legitimate interests through ‘means that are neither seriously underinclusive nor seriously overinclusive.’” 54 The precise degree of tailoring required under each standard differs. Under strict scrutiny, the challenged law or action must be the “least restrictive means” of satisfying the government’s compelling interest. In other words, “[i]f a less restrictive alternative would serve the Government’s purpose, the legislature must use that alternative.”55 Intermediate Scrutiny Intermediate scrutiny typically applies to content-neutral laws and commercial speech restrictions, albeit following different lines of Supreme Court precedent. 56 A law is content neutral if it “serves purposes unrelated to the content of expression”57 and does not, on its face, regulate speech on the basis of its subject matter, topic, or viewpoint.58 The Supreme Court has established an intermediate scrutiny standard for content-neutral time, place, or manner regulations.59 Specifically, the Court has held that “[e]xpression, whether oral or written or symbolized by conduct, is subject to reasonable time, place, or manner restrictions,”60 such as a regulation to control the volume of music played at a bandshell in a public park.61 Time, place, or manner restrictions “are valid provided that they are justified without reference to the content of the regulated speech, that they are narrowly tailored to serve a significant governmental interest, and that they leave open ample alternative channels for communication of the information.”62 A similar test set out in United States v. O’Brien is used to evaluate restrictions on certain types of expressive conduct, such as “when ‘speech’ and ‘nonspeech’ elements are combined in the same course of conduct.”63 Intermediate scrutiny is also the standard applied to commercial speech restrictions. Commercial speech is (1) speech that “does no more than propose a commercial transaction” (e.g., an advertisement for a product or service); 64 or (2) “expression related solely to the economic interests of the speaker and its audience.”65 To sustain a restriction on lawful, nonmisleading commercial speech, the government must meet the standard set out in Central Hudson Gas and Electric Corp. v. Public Service Commission. 66 Specifically, the government must show that its law “directly advances” a “substantial” governmental interest and is narrowly tailored—that is, “not more extensive than necessary”—to serve that interest.67 Examples of substantial or important governmental interests include • protecting the public from deceptive and misleading trade practices;68 • “maintaining standards of ethical conduct in the licensed professions”;69 • “energy conservation”;70 • preventing “quid pro quo” corruption or its appearance in election campaigns;71 and “promoting fair competition in the market for television programming.”72 The tailoring requirement for intermediate scrutiny is less rigorous than for strict scrutiny. Under intermediate scrutiny, a law “need not be the least restrictive or least intrusive means” of advancing the government’s interest.73 Nevertheless, the government “still ‘may not regulate expression in such a manner that a substantial portion of the burden on speech does not serve to advance its goals.’” 74 Narrow tailoring for commercial speech restrictions, for example, requires “a fit that is not necessarily perfect, but reasonable; that represents not necessarily the single best disposition but one whose scope is in proportion to the interest served.”
You must answer my questions based solely on the information provided. Do not use any external resources or prior knowledge.
When can the school year visitation schedule be reset?
II. PARENTING TIME/VISITATION SCHEDULES The following schedule should not be construed as precluding other visitation or alternative arrangements. The best visitation plan is one the parties have agreed to, rather than one imposed by the Court. However, the Court will only enforce the strict terms of this Parenting Plan in the event of any future disagreements concerning visitation. A. Parenting Time/Visitation-General This visitation schedule is broken up into several different sections or types of visitation. Regardless of the age of the child(ren) whose custody is being addressed herein, this visitation schedule is organized to include visitation during the school year, during holidays from school and during summer. For all purposes herein, the following terms shall be applicable: 1) Visitation during school year: If the child(ren) are not enrolled in school, the published schedule of the local public school where the primary custodian resides shall be utilized. If the child(ren) are enrolled in school, the schedule of the school system in which the child(ren) is/are actually enrolled shall be utilized. In the event there is more than one child and the children are enrolled in schools which observe different schedules, the parties shall utilize a hybrid schedule that reflects the holidays which are common to all applicable school systems (the applicable schedule shall be referred to as the “School Year”). This schedule may also be referred to as the “Regular Schedule” or “Day-To-Day Schedule” herein. 2) Visitation during Thanksgiving Break: This period of visitation includes the dates that the applicable school system recesses for at least two consecutive school days in November of every year (“Thanksgiving Break”). This schedule begins to be applicable at 6:00 p.m. on the date that the Thanksgiving Break begins and ends at 6:00 p.m. on the Sunday after Thanksgiving. 3) Visitation during Winter Break: This period of visitation includes the dates that the applicable school system recesses for winter break and which includes December 25 of every year (“Winter Break”). This schedule begins to be applicable at 6:00 p.m. on the date that the Winter Break begins and ends at 6:00 p.m. on the day before school resumes. 4) Visitation during Spring Break: This period of visitation includes the dates that the applicable school system recesses for a full week in the month of March or April of every year (“Spring Break”). This schedule begins to be applicable at 6:00 p.m. on the day that school recesses for Spring Break and ends at 6:00 p.m. on the day before school resumes. 5) Visitation during Summer: This period of visitation includes the dates that the applicable school system recesses for at least one full month in the summer and is the period between academic years (“Summer Break”). The Summer Break begins to be applicable on the day that school recesses for Summer Break and ends at 6:00 p.m. five (5) days before school resumes. 6) Weekend: For purposes of this parenting plan, a weekend begins at 6:00 p.m. on Friday and ends at 6:00 p.m. on Sunday. 7) Weekday visitation: Weekday visitation begins at 4:00 p.m. and ends at 7:30 p.m. The party with weekday visitation shall provide the child(ren)’s evening meal and complete any homework assigned for that evening. B. Visitation during School Year: (Choose one of the following) During the school year, the Non-Custodial Parent shall have at a minimum the following rights of parenting time/visitation (choose an item): ( ) The weekend of the first, third and fifth Friday (if any) of each month. ( ) Every other weekend starting the second weekend after the date of this plan. Additionally, the Non-Custodial Parent shall have weekday parenting time/visitation on (choose an item): ( ) None ( ) One afternoon each week to be agreed upon by the parties. If the parties cannot agree, weekday visitation shall be on Tuesday. C. Visitation during Thanksgiving Break: (Choose one of the following) ( ) Applicable ( ) Not applicable, the Day-to-Day schedule applies ( ) See Paragraph XI below _______ In even-numbered years, the Non-Custodial Parent will have the child(ren) with him/her for the entire Thanksgiving Break. In odd-numbered years, the Custodial Parent shall have the child(ren) with him/her for the entire Thanksgiving Break. OR _______ The ( ) Custodial Parent ( ) Non-Custodial Parent shall have the child(ren) for the first period of Thanksgiving Break, beginning at the time that school recesses for Thanksgiving Break until 3:00 p.m. on Thanksgiving Day in (X) odd-numbered years ( ) even-numbered years ( ) every year. The other parent will have the child(ren) for the second period of Thanksgiving Break, beginning at 3:00 p.m. on Thanksgiving Day until 6:00 p.m. on the evening before Thanksgiving Break ends. Unless otherwise indicated, the parties shall alternate the first and second periods of Thanksgiving Break each year. D. Visitation during Winter Break: (Choose one of the following) ( ) Applicable ( ) Not applicable, the Day-to-Day schedule applies ( ) See Paragraph XI below _______ The ( ) Custodial Parent ( ) Non-Custodial Parent shall have the child(ren) for the first period of Winter Break, beginning at the time that school recesses for Winter Break until December 26th at 10:00 a.m. in ( ) odd-numbered years ( ) even-numbered years ( ) every year. The other parent will have the child(ren) for the second period of Winter Break, beginning at 10:00 a.m. on December 26th until 6:00 p.m. on the evening before Winter Break ends. Unless otherwise indicated, the parties shall alternate the first and second periods of Winter Break each year. For the purpose of resuming visitation during the School Year, the parent who exercised visitation during the first half of Winter Break shall have the child(ren) with that parent on the first weekend following the end of Winter Break visitation. This is the only time that visitation during the School Year might be reset. E. Visitation during Summer: (Choose one of the following) ( ) Applicable ( ) Not applicable, the day-to-day schedule applies ( ) See Paragraph XI below Unless the parties agree otherwise, visitation with the child(ren) during the Summer Break shall be alternated on a week-to-week basis. The first week of visitation during Summer Break begins on the Sunday after school recesses for the Summer Break at 6:00 p.m. and ends on the following Sunday at 6:00 p.m. The Non-Custodial Parent shall have the first week of Summer Break visitation. The Custodial Parent shall have the next week and the parties shall continue to alternate weeks of visitation during Summer Break thereafter. In all cases, the child(ren) shall be with the Custodial Parent for the last five consecutive days before Summer Break ends and the next School Year begins. ( ) Other: ___ F. Visitation during Spring Break: (Choose one of the following) ( ) Applicable ( ) Not applicable, the day-to-day schedule applies ( ) See Paragraph XI below ____In odd-numbered years, the Non-Custodial Parent shall have the child(ren) for Spring Break. In even-numbered years, the Custodial Parent shall have the child(ren) for the entire Spring Break. OR _______ The parties shall divide visitation during every Spring Break. If the parties are unable to agree on visitation during the child(ren)’s spring break, the parent whose Regular Schedule of visitation would include the first weekend of Spring Break will have the child(ren) for that weekend through 12:00 noon on Wednesday. At that time, the child(ren) will be returned to the other parent who will have visitation with the child(ren) for the remainder of Spring Break. G. Other holiday schedule: The child(ren) shall be with Mother on every Mother’s Day from 6:00 pm on the Saturday which precedes Mother’s Day until 6:00 pm of Mother’s Day. The child(ren) shall be with Father on every Father’s Day from 6:00 pm on the Saturday which precedes Father’s Day until 6:00 pm on Father’s Day. This schedule will be maintained, regardless of which parent the children would have been with on that particular weekend under the Regular Schedule of visitation or under the schedule of visitation applicable to Summer Break. H. School holidays that precede or follow weekend visitation during the school year For the purposes of this parenting plan, if the Non-Custodial Parent exercises visitation during the School Year on a weekend in which there is a Friday and/or Monday school holiday which immediately precedes and/or follows his weekend visitation, Non-Custodial Parent’s visitation shall include that Friday and/or Monday school holiday (“Holiday Extension”). For the purposes of this paragraph, a “school holiday” includes a teacher work day or other day in which students are not required to attend school and which is announced by the applicable school system before the end of the Non-Custodial Parent’s normal weekend visitation.
System Instruction: You must answer my questions based solely on the information provided. Do not use any external resources or prior knowledge. Question: When can the school year visitation schedule be reset? Context Block: II. PARENTING TIME/VISITATION SCHEDULES The following schedule should not be construed as precluding other visitation or alternative arrangements. The best visitation plan is one the parties have agreed to, rather than one imposed by the Court. However, the Court will only enforce the strict terms of this Parenting Plan in the event of any future disagreements concerning visitation. A. Parenting Time/Visitation-General This visitation schedule is broken up into several different sections or types of visitation. Regardless of the age of the child(ren) whose custody is being addressed herein, this visitation schedule is organized to include visitation during the school year, during holidays from school and during summer. For all purposes herein, the following terms shall be applicable: 1) Visitation during school year: If the child(ren) are not enrolled in school, the published schedule of the local public school where the primary custodian resides shall be utilized. If the child(ren) are enrolled in school, the schedule of the school system in which the child(ren) is/are actually enrolled shall be utilized. In the event there is more than one child and the children are enrolled in schools which observe different schedules, the parties shall utilize a hybrid schedule that reflects the holidays which are common to all applicable school systems (the applicable schedule shall be referred to as the “School Year”). This schedule may also be referred to as the “Regular Schedule” or “Day-To-Day Schedule” herein. 2) Visitation during Thanksgiving Break: This period of visitation includes the dates that the applicable school system recesses for at least two consecutive school days in November of every year (“Thanksgiving Break”). This schedule begins to be applicable at 6:00 p.m. on the date that the Thanksgiving Break begins and ends at 6:00 p.m. on the Sunday after Thanksgiving. 3) Visitation during Winter Break: This period of visitation includes the dates that the applicable school system recesses for winter break and which includes December 25 of every year (“Winter Break”). This schedule begins to be applicable at 6:00 p.m. on the date that the Winter Break begins and ends at 6:00 p.m. on the day before school resumes. 4) Visitation during Spring Break: This period of visitation includes the dates that the applicable school system recesses for a full week in the month of March or April of every year (“Spring Break”). This schedule begins to be applicable at 6:00 p.m. on the day that school recesses for Spring Break and ends at 6:00 p.m. on the day before school resumes. 5) Visitation during Summer: This period of visitation includes the dates that the applicable school system recesses for at least one full month in the summer and is the period between academic years (“Summer Break”). The Summer Break begins to be applicable on the day that school recesses for Summer Break and ends at 6:00 p.m. five (5) days before school resumes. 6) Weekend: For purposes of this parenting plan, a weekend begins at 6:00 p.m. on Friday and ends at 6:00 p.m. on Sunday. 7) Weekday visitation: Weekday visitation begins at 4:00 p.m. and ends at 7:30 p.m. The party with weekday visitation shall provide the child(ren)’s evening meal and complete any homework assigned for that evening. B. Visitation during School Year: (Choose one of the following) During the school year, the Non-Custodial Parent shall have at a minimum the following rights of parenting time/visitation (choose an item): ( ) The weekend of the first, third and fifth Friday (if any) of each month. ( ) Every other weekend starting the second weekend after the date of this plan. Additionally, the Non-Custodial Parent shall have weekday parenting time/visitation on (choose an item): ( ) None ( ) One afternoon each week to be agreed upon by the parties. If the parties cannot agree, weekday visitation shall be on Tuesday. C. Visitation during Thanksgiving Break: (Choose one of the following) ( ) Applicable ( ) Not applicable, the Day-to-Day schedule applies ( ) See Paragraph XI below _______ In even-numbered years, the Non-Custodial Parent will have the child(ren) with him/her for the entire Thanksgiving Break. In odd-numbered years, the Custodial Parent shall have the child(ren) with him/her for the entire Thanksgiving Break. OR _______ The ( ) Custodial Parent ( ) Non-Custodial Parent shall have the child(ren) for the first period of Thanksgiving Break, beginning at the time that school recesses for Thanksgiving Break until 3:00 p.m. on Thanksgiving Day in (X) odd-numbered years ( ) even-numbered years ( ) every year. The other parent will have the child(ren) for the second period of Thanksgiving Break, beginning at 3:00 p.m. on Thanksgiving Day until 6:00 p.m. on the evening before Thanksgiving Break ends. Unless otherwise indicated, the parties shall alternate the first and second periods of Thanksgiving Break each year. D. Visitation during Winter Break: (Choose one of the following) ( ) Applicable ( ) Not applicable, the Day-to-Day schedule applies ( ) See Paragraph XI below _______ The ( ) Custodial Parent ( ) Non-Custodial Parent shall have the child(ren) for the first period of Winter Break, beginning at the time that school recesses for Winter Break until December 26th at 10:00 a.m. in ( ) odd-numbered years ( ) even-numbered years ( ) every year. The other parent will have the child(ren) for the second period of Winter Break, beginning at 10:00 a.m. on December 26th until 6:00 p.m. on the evening before Winter Break ends. Unless otherwise indicated, the parties shall alternate the first and second periods of Winter Break each year. For the purpose of resuming visitation during the School Year, the parent who exercised visitation during the first half of Winter Break shall have the child(ren) with that parent on the first weekend following the end of Winter Break visitation. This is the only time that visitation during the School Year might be reset. E. Visitation during Summer: (Choose one of the following) ( ) Applicable ( ) Not applicable, the day-to-day schedule applies ( ) See Paragraph XI below Unless the parties agree otherwise, visitation with the child(ren) during the Summer Break shall be alternated on a week-to-week basis. The first week of visitation during Summer Break begins on the Sunday after school recesses for the Summer Break at 6:00 p.m. and ends on the following Sunday at 6:00 p.m. The Non-Custodial Parent shall have the first week of Summer Break visitation. The Custodial Parent shall have the next week and the parties shall continue to alternate weeks of visitation during Summer Break thereafter. In all cases, the child(ren) shall be with the Custodial Parent for the last five consecutive days before Summer Break ends and the next School Year begins. ( ) Other: ___ F. Visitation during Spring Break: (Choose one of the following) ( ) Applicable ( ) Not applicable, the day-to-day schedule applies ( ) See Paragraph XI below ____In odd-numbered years, the Non-Custodial Parent shall have the child(ren) for Spring Break. In even-numbered years, the Custodial Parent shall have the child(ren) for the entire Spring Break. OR _______ The parties shall divide visitation during every Spring Break. If the parties are unable to agree on visitation during the child(ren)’s spring break, the parent whose Regular Schedule of visitation would include the first weekend of Spring Break will have the child(ren) for that weekend through 12:00 noon on Wednesday. At that time, the child(ren) will be returned to the other parent who will have visitation with the child(ren) for the remainder of Spring Break. G. Other holiday schedule: The child(ren) shall be with Mother on every Mother’s Day from 6:00 pm on the Saturday which precedes Mother’s Day until 6:00 pm of Mother’s Day. The child(ren) shall be with Father on every Father’s Day from 6:00 pm on the Saturday which precedes Father’s Day until 6:00 pm on Father’s Day. This schedule will be maintained, regardless of which parent the children would have been with on that particular weekend under the Regular Schedule of visitation or under the schedule of visitation applicable to Summer Break. H. School holidays that precede or follow weekend visitation during the school year For the purposes of this parenting plan, if the Non-Custodial Parent exercises visitation during the School Year on a weekend in which there is a Friday and/or Monday school holiday which immediately precedes and/or follows his weekend visitation, Non-Custodial Parent’s visitation shall include that Friday and/or Monday school holiday (“Holiday Extension”). For the purposes of this paragraph, a “school holiday” includes a teacher work day or other day in which students are not required to attend school and which is announced by the applicable school system before the end of the Non-Custodial Parent’s normal weekend visitation.
If you cannot answer using the context alone, say "I cannot answer that." Draw your answer from the text only. Use full sentences in your response.
What works have been cited?
2.1 IntroductionDefining terminology is a useful starting point when reading or writing on the subject of service to prevent any confusion or assumptions that we all understand the terms to mean the same thing. So, what do we mean by goods, products and services? This is a book about service, but what is a ‘service’ and how is it different to ‘goods’ or ‘products’? Whilst most people intuitively know the difference between a product and service, actually defining this difference with clarity and accuracy of text is not straight forward. The terms ‘goods’ and ‘products’ appear to be used interchangeably in much of the literature, but even here we can find debate about meaning (Araujo and Spring 2006; Callon 1991, 2002). However, for the sake of brevity we will here accept that they both refer to the same thing and focus on attempts to differentiate goods and services. This quest is far from straightfor-ward. Since the early eighteenth century academics and scholars from different domains have attempted to define these terms explicitly (Say 1803; Levitt 1981; Hill 1999; Gadrey 2000). In this chapter we will attempt to illustrate their findings in order to provide some background to the debate. 2.2 GoodsIn the eighteenth century Adam Smith (1776) stated that goods have exchange-able value and so a characteristic of a good is that its ownership rights can be established and exchanged. Goods can be considered as embodying specialised knowledge in a way that is highly advantageous for promoting the division of labour (Smith 1776; Demsetz 1993). Nassau Senior (1863) described goods as material things, meaning that goods are tangible and have physical dimensions. These concepts were still accepted over 100 years later when The System of National Accounts (SNA) (1993) defined goods as physical objects for which a demand exists, over which ownership rights can be established and whose owner-ship can be transferred from one institutional unit to another by engaging in transactions on markets. Hill (1999) summed up the major characteristics of goods as an entity that exists independently of its owner and preserves its identity through time; his definition supporting of that of the SNA. Following these defini-tions we can outline a set of attributes for goods:Physical objects for which a demand exists•Their physical attributes are preserved over time•Ownership rights can be established•They exist independently of their owner•They are exchangeable•Unit ownership rights can be exchanged between institutions•They can be traded on markets•They embody specialised knowledge in a way that is highly advantageous for •promoting the division of labourThese attributes are broadly accepted by academics and reflect 200 years of ongoing debate. 2.3 ServicesAlthough we have found a long standing agreement over the definition of products/goods and their characteristics, the definition of services has never reached consen-sus. Consequently it is hard to obtain full acceptance about the distinction between goods and services. Here we will present some of the different perspectives on service from the literature. 2.4 Intangible, Heterogeneous, Inseparable & Perishable (IHIP) CharacteristicsAs marketers began to recognise and emphasise the importance of services (Fisk et al. 1993) they consequently called for services to form a separate part of a com-panies’ marketing strategy (Lovelock 1983). A major contribution to the services debate was a classification consisting of four features: •Intangible •Heterogeneous
If you cannot answer using the context alone, say "I cannot answer that." Draw your answer from the text only. Use full sentences in your response. What works have been cited? 2.1 IntroductionDefining terminology is a useful starting point when reading or writing on the subject of service to prevent any confusion or assumptions that we all understand the terms to mean the same thing. So, what do we mean by goods, products and services? This is a book about service, but what is a ‘service’ and how is it different to ‘goods’ or ‘products’? Whilst most people intuitively know the difference between a product and service, actually defining this difference with clarity and accuracy of text is not straight forward. The terms ‘goods’ and ‘products’ appear to be used interchangeably in much of the literature, but even here we can find debate about meaning (Araujo and Spring 2006; Callon 1991, 2002). However, for the sake of brevity we will here accept that they both refer to the same thing and focus on attempts to differentiate goods and services. This quest is far from straightfor-ward. Since the early eighteenth century academics and scholars from different domains have attempted to define these terms explicitly (Say 1803; Levitt 1981; Hill 1999; Gadrey 2000). In this chapter we will attempt to illustrate their findings in order to provide some background to the debate. 2.2 GoodsIn the eighteenth century Adam Smith (1776) stated that goods have exchange-able value and so a characteristic of a good is that its ownership rights can be established and exchanged. Goods can be considered as embodying specialised knowledge in a way that is highly advantageous for promoting the division of labour (Smith 1776; Demsetz 1993). Nassau Senior (1863) described goods as material things, meaning that goods are tangible and have physical dimensions. These concepts were still accepted over 100 years later when The System of National Accounts (SNA) (1993) defined goods as physical objects for which a demand exists, over which ownership rights can be established and whose owner-ship can be transferred from one institutional unit to another by engaging in transactions on markets. Hill (1999) summed up the major characteristics of goods as an entity that exists independently of its owner and preserves its identity through time; his definition supporting of that of the SNA. Following these defini-tions we can outline a set of attributes for goods:Physical objects for which a demand exists•Their physical attributes are preserved over time•Ownership rights can be established•They exist independently of their owner•They are exchangeable•Unit ownership rights can be exchanged between institutions•They can be traded on markets•They embody specialised knowledge in a way that is highly advantageous for •promoting the division of labourThese attributes are broadly accepted by academics and reflect 200 years of ongoing debate. 2.3 ServicesAlthough we have found a long standing agreement over the definition of products/goods and their characteristics, the definition of services has never reached consen-sus. Consequently it is hard to obtain full acceptance about the distinction between goods and services. Here we will present some of the different perspectives on service from the literature. 2.4 Intangible, Heterogeneous, Inseparable & Perishable (IHIP) CharacteristicsAs marketers began to recognise and emphasise the importance of services (Fisk et al. 1993) they consequently called for services to form a separate part of a com-panies’ marketing strategy (Lovelock 1983). A major contribution to the services debate was a classification consisting of four features: •Intangible •Heterogeneous
Draw your answer only from the context block below and not from external sources.
What does Apple not receive from me when I use Siri?
The Siri and Dictation features of the iOS Software may not be available in all languages or regions and features may vary by region. If your iOS Device supports Siri and Dictation, these features may allow you to make requests, give commands and dictate text to your device using your voice. When you use Siri or Dictation, the things you say will be recorded and sent to Apple in order to convert what you say into text and to process your requests. Your device will also send Apple other information, such as your name and nickname; the names, nicknames, and relationship with you (e.g., “my dad”) of your address book contacts; and song names in your collection (collectively, your “User Data”). All of this data is used to help Siri and Dictation understand you better and recognize what you say. It is not linked to other data that Apple may have from your use of other Apple services. By using Siri or Dictation, you agree and consent to Apple’s and its subsidiaries’ and agents’ transmission, collection, maintenance, processing, and use of this information, including your voice input and User Data, to provide and improve Siri, Dictation, and dictation functionality in other Apple products and services. If you have Location Services turned on, the location of your iOS Device at the time you make a request to Siri may also be sent to Apple to help Siri improve the accuracy of its response to your location-based requests. You may disable the location-based functionality of Siri by going to the Location Services setting on your iOS Device and turning off the individual location setting for Siri. Siri can allow you to interact with your iOS Device without needing to unlock it. If you have enabled a passcode on your iOS Device and would like to prevent Siri from being used from the lock screen, you can tap Settings, tap General, tap Passcode Lock and turn the Siri option to “off”. You can also turn off Siri and Dictation altogether at any time. To do so, open Settings, tap General, tap Siri, and slide the Siri switch to “off”.
Draw your answer only from the context block below and not from external sources. What does Apple not receive from me when I use Siri? [The Siri and Dictation features of the iOS Software may not be available in all languages or regions and features may vary by region. If your iOS Device supports Siri and Dictation, these features may allow you to make requests, give commands and dictate text to your device using your voice. When you use Siri or Dictation, the things you say will be recorded and sent to Apple in order to convert what you say into text and to process your requests. Your device will also send Apple other information, such as your name and nickname; the names, nicknames, and relationship with you (e.g., “my dad”) of your address book contacts; and song names in your collection (collectively, your “User Data”). All of this data is used to help Siri and Dictation understand you better and recognize what you say. It is not linked to other data that Apple may have from your use of other Apple services. By using Siri or Dictation, you agree and consent to Apple’s and its subsidiaries’ and agents’ transmission, collection, maintenance, processing, and use of this information, including your voice input and User Data, to provide and improve Siri, Dictation, and dictation functionality in other Apple products and services. If you have Location Services turned on, the location of your iOS Device at the time you make a request to Siri may also be sent to Apple to help Siri improve the accuracy of its response to your location-based requests. You may disable the location-based functionality of Siri by going to the Location Services setting on your iOS Device and turning off the individual location setting for Siri. Siri can allow you to interact with your iOS Device without needing to unlock it. If you have enabled a passcode on your iOS Device and would like to prevent Siri from being used from the lock screen, you can tap Settings, tap General, tap Passcode Lock and turn the Siri option to “off”. You can also turn off Siri and Dictation altogether at any time. To do so, open Settings, tap General, tap Siri, and slide the Siri switch to “off”.]
Answer the question using only the information provided in the context and do not use any outside sources. Limit your response to 300 words.
In what circumstances would each type of foreign aid be best?
Types of Foreign Aid Foreign assistance takes various forms. It may include the direct provision of commodities and equipment (e.g., food and generators); capacity-building technical assistance to partner governments or local beneficiaries; funding for transportation, water, or energy infrastructure; support to the general budget of foreign governments and international organizations; and direct lending or loan guarantees to partner governments, among others. For reporting purposes, agencies categorize all of these activities under five aid “types”: Projects, Administrative Costs, Core Contributions, Budget Support, Technical Assistance, and Other. Most U.S. foreign aid in recent years has been classified as projects, funded and managed through aid agencies (see Figure 1). These categories may be misleading. Project-based aid includes certain types of assistance provided directly to partner governments for ongoing operations, or for purchasing commodities delivered directly to disaster-affected communities. U.S. foreign assistance agencies report aid type under a framework agreed and maintained by the Organisation for Economic Co-operation and Development’s (OECD’s) Development Assistance Committee (DAC), a forum of leading bilateral donor countries.8 This reporting paradigm applies to all donors, and it does not account for the U.S. approach to foreign assistance delivery, leading to some apparently anomalous classifications. For instance, aid appropriated as “direct financial support” to the Government of Ukraine in 2022 was structured as a reimbursement for verified government expenditures—such as teachers’ salaries and social assistance payments—and managed by the World Bank. That funding has been classified as a project, including in the above figure, though the funding is meant to support Ukraine’s central budget. The aid type classifications used in reporting are important background to understand agencies’ relationships with an implementing partner, though the partner type is highly consequential for how aid will be implemented (see “Implementing Partner Types ”). While data reported in foreignassistance.gov may lack nuances necessary to understand the nature of each partnership, it still provides useful topline information about relative aid flows. Projects Projects take many forms but generally involve a third-party implementing partner working under an agreement with the managing foreign aid agency (see “Managing, Funding, and Implementing Agencies” text box). Such projects generally have a high-level goal, several objectives to advance that goal, a series of quantitative targets for making progress toward that objective, and a welldefined “scope of work” for the implementing partner (see “Key Terms” text box). Usually, the project goal is aspirational and would require complementary developments outside the project itself to be achieved—such as effective leadership by the central government, receptivity to new practices by local populations, and a relatively stable implementing environment. In practice, projects are diverse. A project’s scope may involve delivery of medicine or food, building a highway, researching a new technology, or advising a government on customs procedures, among others. A nongovernmental organization (NGO) is the most common partner organization for USAID. Of the $181.5 billion in foreign assistance obligations for projects by USAID from FY2013 to 2022, 9 NGOs implemented $109.8 billion (60%). 10 Public international organizations (PIOs) are the second-largest category of project-based implementing partners. Project-based assistance is the predominant method of providing foreign assistance for several reasons. For one, this structure mitigates the risk of implementing partners diverting funding to objectives outside of U.S. priorities.12 Project-based aid expenditures are to be “allowable, allocable, and reasonable” under an agency-designed scope of work. 13 Detailed scopes of work allow audits of project costs and direct oversight of project activities, making reporting lines clearer. USAID typically initiates projects by developing a preliminary design and a research agenda to further scope the concept. 14 Agency staff develop these proposals and then submit them for approval.15 The resulting proposal (1) states a development problem (usually associated with objectives in a country strategy or a global initiative’s strategy), (2) hypothesizes how a project may solve it (a “theory of change”), and (3) proposes an approach to implementing that solution. If approved, USAID then issues a call for proposals from implementing partners, with the implementation approach as the “scope of work.” For instance, a USAID project may identify evidence that professionalizing a government’s revenue collection and budget development processes leads to improved government responsiveness to its constituents more generally, improving faith in government and stabilizing democratic institutions. USAID officials then may propose a fiscal management project intended to build capacity in a partner government’s tax and budget bureaus. 16 Such projects may comprise a single implementing partner award or several. A paradigmatic project contains a dedicated scope of work with established deliverables and performance targets, to be carried out by an implementing partner’s team over a defined time period (typically not to exceed five years). A project may include building infrastructure, technical assistance, supply of goods or services, or some combination of all three. Usually, projects are divided into several work streams, each called “components.” The fiscal management project, for example, may include (1) technical assistance to reform an agency’s administrative procedures, (2) training for bureau staff in modern accounting practices, (3) a quantitative analysis of current tax compliance rates, (4) a marketing campaign encouraging citizens to pay their taxes, and (5) sourcing of new accounting software for each bureau to track finances better. Projects often have “cross-cutting themes” as well, which may include addressing the needs of vulnerable populations and ensuring the views of local residents are taken into account, among others. Budget Support and Core Contributions In contrast to project-based assistance, a U.S. foreign assistance agency may fund the general budget of a recipient organization. The Foreignassistance.gov database uses the label “budget support” for funding provided to a recipient government to support general operating costs rather than a specific scope of work. The label “core contribution” is used when such funding is provided to public international organizations (such as United Nations entities). Since at least 1995, most such assistance has been provided to public international organizations, with a smaller share going to foreign governments. Since 2022, the substantial budget support to Ukraine has reversed this balance, although that aid has been classified as a project. 17 USAID generally has issued budget support to foreign governments in a funding tranche after the government has met a predefined milestone.18 In providing budget support, USAID generally has relinquished exclusive control over spending, and funds instead have been managed according to the recipient’s own budgetary procedures and authorities.19 While USAID has less direct control over the recipient’s use of budget support aid, the agency does control whether it issues a funding tranche. For instance, USAID generally has provided budget support to Jordan (a top recipient of U.S. budget support aid) after the USAID/Jordan mission certifies annually that certain policy reforms have been met. For core contributions, the United States generally has not structured its funding in tranches. Rather, U.S. representatives have a direct role in the organization’s decisionmaking—often as a shareholder, member of the Board of Directors, or in appointing the organization’s leadership. For instance, the United States influences the World Bank’s decisionmaking as a major shareholder and nominates its president. 20 Budget Support: Loans and Loan Guarantees Historically, U.S. budget support to governments included a substantial lending element. From 1962 to 1988, loans represented 28% of total U.S. economic foreign assistance.21 Since 1988, Congress and the executive branch have shifted away from lending toward primarily grant-based assistance, viewing loans as contributing to already-burdensome debt levels among aid recipients.22 There has been some recent renewed interest in converting grant-based budget support to loans, with an FY2024 aid package to Ukraine requiring budget support through a loan rather than a grant.23 More frequently since the end of the Cold War, USAID has provided financing to governments through loan guarantees rather than direct loans. Loan guarantees are a commitment to repay all or part of a loan in the event a borrower stops payments. From 1993 to 2017, USAID issued 20 guarantees of sovereign bond issuances to Middle Eastern states and Ukraine, but only three remain active.24 The most recent such guarantees were issued in support of countries facing fiscal constraints due to political crises (the Arab Spring and the Russian incursion into Crimea and Eastern Ukraine). USAID has not issued any guarantees since 2017.25 Development financing to private entities, including loans and loan guarantees, remains an active area of U.S. support for international development. The U.S. International Development Finance Corporation administers most of those activities, typically by financing private sector projects rather than sovereign debt. 26 This financing generally has been based on market rates and, as a result, has not been accounted as foreign assistance. Administrative Costs Administrative costs are funds used to deliver or implement aid that do not fit the definitions of project aid or budget support/core contributions.27 From FY2013 to FY2022, U.S. assistance agencies directed 7.7% of nonmilitary foreign assistance obligations toward administrative costs. The parameters of administrative costs are highly nuanced and differ from agency to agency: some agencies, for instance, classify monitoring and evaluation as an administrative cost, while others do not. Congressional directives from the 1970s have shaped what USAID classifies as administrative costs. Congress directed that the following two categories be funded by the “Operating Expenses” account: • All salaries and benefits of USAID direct hires, including Foreign Service and Civil Service, including when those employees are working to oversee a project activity. • All costs not directly related to a specific project. 28 USAID classifies all Operating Expenses as an administrative cost. Activities are considered operating expenses if they are inherently governmental or part of the cost of doing business. Examples include developing USAID policies and notices to Congress, drafting contract agreements for projects, and managing USAID accounting.29 Because all USAID salaries are considered administrative costs, work such as supporting project implementation and designing development interventions are considered administrative expenditures. By contrast, administrative work by USAID implementing partners is considered a project cost.
In what circumstances would each type of foreign aid be best? Answer the question using only the information provided in the context and do not use any outside sources. Types of Foreign Aid Foreign assistance takes various forms. It may include the direct provision of commodities and equipment (e.g., food and generators); capacity-building technical assistance to partner governments or local beneficiaries; funding for transportation, water, or energy infrastructure; support to the general budget of foreign governments and international organizations; and direct lending or loan guarantees to partner governments, among others. For reporting purposes, agencies categorize all of these activities under five aid “types”: Projects, Administrative Costs, Core Contributions, Budget Support, Technical Assistance, and Other. Most U.S. foreign aid in recent years has been classified as projects, funded and managed through aid agencies (see Figure 1). These categories may be misleading. Project-based aid includes certain types of assistance provided directly to partner governments for ongoing operations, or for purchasing commodities delivered directly to disaster-affected communities. U.S. foreign assistance agencies report aid type under a framework agreed and maintained by the Organisation for Economic Co-operation and Development’s (OECD’s) Development Assistance Committee (DAC), a forum of leading bilateral donor countries.8 This reporting paradigm applies to all donors, and it does not account for the U.S. approach to foreign assistance delivery, leading to some apparently anomalous classifications. For instance, aid appropriated as “direct financial support” to the Government of Ukraine in 2022 was structured as a reimbursement for verified government expenditures—such as teachers’ salaries and social assistance payments—and managed by the World Bank. That funding has been classified as a project, including in the above figure, though the funding is meant to support Ukraine’s central budget. The aid type classifications used in reporting are important background to understand agencies’ relationships with an implementing partner, though the partner type is highly consequential for how aid will be implemented (see “Implementing Partner Types ”). While data reported in foreignassistance.gov may lack nuances necessary to understand the nature of each partnership, it still provides useful topline information about relative aid flows. Projects Projects take many forms but generally involve a third-party implementing partner working under an agreement with the managing foreign aid agency (see “Managing, Funding, and Implementing Agencies” text box). Such projects generally have a high-level goal, several objectives to advance that goal, a series of quantitative targets for making progress toward that objective, and a welldefined “scope of work” for the implementing partner (see “Key Terms” text box). Usually, the project goal is aspirational and would require complementary developments outside the project itself to be achieved—such as effective leadership by the central government, receptivity to new practices by local populations, and a relatively stable implementing environment. In practice, projects are diverse. A project’s scope may involve delivery of medicine or food, building a highway, researching a new technology, or advising a government on customs procedures, among others. A nongovernmental organization (NGO) is the most common partner organization for USAID. Of the $181.5 billion in foreign assistance obligations for projects by USAID from FY2013 to 2022, 9 NGOs implemented $109.8 billion (60%). 10 Public international organizations (PIOs) are the second-largest category of project-based implementing partners. Project-based assistance is the predominant method of providing foreign assistance for several reasons. For one, this structure mitigates the risk of implementing partners diverting funding to objectives outside of U.S. priorities.12 Project-based aid expenditures are to be “allowable, allocable, and reasonable” under an agency-designed scope of work. 13 Detailed scopes of work allow audits of project costs and direct oversight of project activities, making reporting lines clearer. USAID typically initiates projects by developing a preliminary design and a research agenda to further scope the concept. 14 Agency staff develop these proposals and then submit them for approval.15 The resulting proposal (1) states a development problem (usually associated with objectives in a country strategy or a global initiative’s strategy), (2) hypothesizes how a project may solve it (a “theory of change”), and (3) proposes an approach to implementing that solution. If approved, USAID then issues a call for proposals from implementing partners, with the implementation approach as the “scope of work.” For instance, a USAID project may identify evidence that professionalizing a government’s revenue collection and budget development processes leads to improved government responsiveness to its constituents more generally, improving faith in government and stabilizing democratic institutions. USAID officials then may propose a fiscal management project intended to build capacity in a partner government’s tax and budget bureaus. 16 Such projects may comprise a single implementing partner award or several. A paradigmatic project contains a dedicated scope of work with established deliverables and performance targets, to be carried out by an implementing partner’s team over a defined time period (typically not to exceed five years). A project may include building infrastructure, technical assistance, supply of goods or services, or some combination of all three. Usually, projects are divided into several work streams, each called “components.” The fiscal management project, for example, may include (1) technical assistance to reform an agency’s administrative procedures, (2) training for bureau staff in modern accounting practices, (3) a quantitative analysis of current tax compliance rates, (4) a marketing campaign encouraging citizens to pay their taxes, and (5) sourcing of new accounting software for each bureau to track finances better. Projects often have “cross-cutting themes” as well, which may include addressing the needs of vulnerable populations and ensuring the views of local residents are taken into account, among others. Budget Support and Core Contributions In contrast to project-based assistance, a U.S. foreign assistance agency may fund the general budget of a recipient organization. The Foreignassistance.gov database uses the label “budget support” for funding provided to a recipient government to support general operating costs rather than a specific scope of work. The label “core contribution” is used when such funding is provided to public international organizations (such as United Nations entities). Since at least 1995, most such assistance has been provided to public international organizations, with a smaller share going to foreign governments. Since 2022, the substantial budget support to Ukraine has reversed this balance, although that aid has been classified as a project. 17 USAID generally has issued budget support to foreign governments in a funding tranche after the government has met a predefined milestone.18 In providing budget support, USAID generally has relinquished exclusive control over spending, and funds instead have been managed according to the recipient’s own budgetary procedures and authorities.19 While USAID has less direct control over the recipient’s use of budget support aid, the agency does control whether it issues a funding tranche. For instance, USAID generally has provided budget support to Jordan (a top recipient of U.S. budget support aid) after the USAID/Jordan mission certifies annually that certain policy reforms have been met. For core contributions, the United States generally has not structured its funding in tranches. Rather, U.S. representatives have a direct role in the organization’s decisionmaking—often as a shareholder, member of the Board of Directors, or in appointing the organization’s leadership. For instance, the United States influences the World Bank’s decisionmaking as a major shareholder and nominates its president. 20 Budget Support: Loans and Loan Guarantees Historically, U.S. budget support to governments included a substantial lending element. From 1962 to 1988, loans represented 28% of total U.S. economic foreign assistance.21 Since 1988, Congress and the executive branch have shifted away from lending toward primarily grant-based assistance, viewing loans as contributing to already-burdensome debt levels among aid recipients.22 There has been some recent renewed interest in converting grant-based budget support to loans, with an FY2024 aid package to Ukraine requiring budget support through a loan rather than a grant.23 More frequently since the end of the Cold War, USAID has provided financing to governments through loan guarantees rather than direct loans. Loan guarantees are a commitment to repay all or part of a loan in the event a borrower stops payments. From 1993 to 2017, USAID issued 20 guarantees of sovereign bond issuances to Middle Eastern states and Ukraine, but only three remain active.24 The most recent such guarantees were issued in support of countries facing fiscal constraints due to political crises (the Arab Spring and the Russian incursion into Crimea and Eastern Ukraine). USAID has not issued any guarantees since 2017.25 Development financing to private entities, including loans and loan guarantees, remains an active area of U.S. support for international development. The U.S. International Development Finance Corporation administers most of those activities, typically by financing private sector projects rather than sovereign debt. 26 This financing generally has been based on market rates and, as a result, has not been accounted as foreign assistance. Administrative Costs Administrative costs are funds used to deliver or implement aid that do not fit the definitions of project aid or budget support/core contributions.27 From FY2013 to FY2022, U.S. assistance agencies directed 7.7% of nonmilitary foreign assistance obligations toward administrative costs. The parameters of administrative costs are highly nuanced and differ from agency to agency: some agencies, for instance, classify monitoring and evaluation as an administrative cost, while others do not. Congressional directives from the 1970s have shaped what USAID classifies as administrative costs. Congress directed that the following two categories be funded by the “Operating Expenses” account: • All salaries and benefits of USAID direct hires, including Foreign Service and Civil Service, including when those employees are working to oversee a project activity. • All costs not directly related to a specific project. 28 USAID classifies all Operating Expenses as an administrative cost. Activities are considered operating expenses if they are inherently governmental or part of the cost of doing business. Examples include developing USAID policies and notices to Congress, drafting contract agreements for projects, and managing USAID accounting.29 Because all USAID salaries are considered administrative costs, work such as supporting project implementation and designing development interventions are considered administrative expenditures. By contrast, administrative work by USAID implementing partners is considered a project cost.
Your response must be based solely on the information provided in the prompt. You are not allowed to use any external resources or prior knowledge.
How does broadband internet help job seekers?
The intersection of these three literatures leaves the total effect of broadband internet on mental health and wellbeing ambiguous. There is some evidence that broadband internet may have deleterious effects on mental health (e.g., Donati et al., 2022). However, the evidence that broadband internet has positive economic effects combined with the evidence that positive economic effects lead to fewer deaths by suicide could mean that broadband internet might have positive effects on mental health. The total effect depends on which force predominates. Using all-cause mortality data from the National Center for Health Statistics, we find that the introduction of broadband internet during the initial roll out of broadband from 2000 to 2008 is associated with a reduction in the number of deaths by suicide in a county. We find that a ten percent increase in the proportion of county residents with access to broadband internet in a year leads to 0.11 fewer deaths by suicide in a county, which is a 1.02% reduction in suicides overall. As expected, the effect of access to broadband internet on suicides fades after 2008, when rapid proliferation began to slow. Nevertheless, when estimating the effect of the rollout of broadband internet between 2000 to 2018, we find an overall reduction in deaths by suicide of about 1.6% for a 10% increase in access to broadband. In addition, using data from the Center for Disease Control’s Behavioral Risk Factor Surveillance System (BRFSS), we some evidence that increased access to broadband internet leads to improved measures of mental and physical health and less binge drinking, suggesting that improvements in mood is an important mechanism. We further find that this reduction in suicide deaths is likely due to economic improvements in counties that have access to broadband internet. Counties with increased access to broadband internet see reductions in poverty rate and unemployment rate. In addition, zip codes that gain access to broadband internet see increases in the numbers of employees and establishments in those zip codes. In addition, heterogeneity analysis indicates that the positive effects are concentrated in the working age population, those between 25 and 64 years old. This pattern is precisely what is predicted by the literature linking economic conditions to suicide risk. These results provide important support for existing policies that seek to expand broadband access across the country. While some measures of broadband proliferation appear to be nearly complete as early as 2008, there remains a large digital divide between populations with access to broadband internet and those without (Rachfal, 2021). According to FCC data in 2019, 98.8% of Americans living in urban areas had access to fixed broadband internet, but only 82.8% of Americans living in rural areas had access to fixed broadband internet.3 In some states, the percentage of the rural population with access to fixed broadband internet was as low as 63.3%. Our results indicate that closing the digital divide can have tangible mental health benefits. II. Background Broadband Internet, Economic Growth, and Mental Health A robust literature connects access to broadband internet and improved local economic conditions. These improvements occur along two axes: first, broadband internet affects the labor market outcomes of individual workers, and second, broadband internet impacts the behavior of firms. These papers then link to another arm of economic research that explores the ways in which economic conditions impact mental health. Several papers indicate that the internet generally, and broadband specifically, is a useful tool for job seekers. Kunn and Mansour (2014) find that internet job searches are effective at reducing the length of unemployment periods. This is a contradiction of an earlier study finding internet job search to be ineffective, which the authors attribute to the changing nature of internet job search between their two study periods. More recently, Zuo (2021) uses Comcast’s Internet Essentials program to study the effect of broadband internet access. Zuo finds that the program, which was designed to increase broadband access for low-income families, is associated with increased employment, increased labor force participation, decreased unemployment, and increased income. Similarly, Gurtzgen and colleagues (2021) find that broadband access is associated with improved rates of reemployment after the first month of unemployment. These recent studies are consistent with prior papers as well (Atasoy, 2013; Dettling, 2015; Hjort & Poulsen, 2019). Bhuller, Kostol, and Vigtel (2020) suggest that these improved outcomes may be a function of improved job searches. Their examination of the roll out of broadband internet in Norway leads them to draw three conclusions. First, broadband leads to improved recruitment processes. Second, that improved match quality is a benefit to job seekers. Finally, broadband internet facilitates better information flow. At the individual level, it seems, access to the additional informational and communications resources of broadband internet is beneficial for employment outcomes.
context block: [The intersection of these three literatures leaves the total effect of broadband internet on mental health and wellbeing ambiguous. There is some evidence that broadband internet may have deleterious effects on mental health (e.g., Donati et al., 2022). However, the evidence that broadband internet has positive economic effects combined with the evidence that positive economic effects lead to fewer deaths by suicide could mean that broadband internet might have positive effects on mental health. The total effect depends on which force predominates. Using all-cause mortality data from the National Center for Health Statistics, we find that the introduction of broadband internet during the initial roll out of broadband from 2000 to 2008 is associated with a reduction in the number of deaths by suicide in a county. We find that a ten percent increase in the proportion of county residents with access to broadband internet in a year leads to 0.11 fewer deaths by suicide in a county, which is a 1.02% reduction in suicides overall. As expected, the effect of access to broadband internet on suicides fades after 2008, when rapid proliferation began to slow. Nevertheless, when estimating the effect of the rollout of broadband internet between 2000 to 2018, we find an overall reduction in deaths by suicide of about 1.6% for a 10% increase in access to broadband. In addition, using data from the Center for Disease Control’s Behavioral Risk Factor Surveillance System (BRFSS), we some evidence that increased access to broadband internet leads to improved measures of mental and physical health and less binge drinking, suggesting that improvements in mood is an important mechanism. We further find that this reduction in suicide deaths is likely due to economic improvements in counties that have access to broadband internet. Counties with increased access to broadband internet see reductions in poverty rate and unemployment rate. In addition, zip codes that gain access to broadband internet see increases in the numbers of employees and establishments in those zip codes. In addition, heterogeneity analysis indicates that the positive effects are concentrated in the working age population, those between 25 and 64 years old. This pattern is precisely what is predicted by the literature linking economic conditions to suicide risk. These results provide important support for existing policies that seek to expand broadband access across the country. While some measures of broadband proliferation appear to be nearly complete as early as 2008, there remains a large digital divide between populations with access to broadband internet and those without (Rachfal, 2021). According to FCC data in 2019, 98.8% of Americans living in urban areas had access to fixed broadband internet, but only 82.8% of Americans living in rural areas had access to fixed broadband internet.3 In some states, the percentage of the rural population with access to fixed broadband internet was as low as 63.3%. Our results indicate that closing the digital divide can have tangible mental health benefits. II. Background Broadband Internet, Economic Growth, and Mental Health A robust literature connects access to broadband internet and improved local economic conditions. These improvements occur along two axes: first, broadband internet affects the labor market outcomes of individual workers, and second, broadband internet impacts the behavior of firms. These papers then link to another arm of economic research that explores the ways in which economic conditions impact mental health. Several papers indicate that the internet generally, and broadband specifically, is a useful tool for job seekers. Kunn and Mansour (2014) find that internet job searches are effective at reducing the length of unemployment periods. This is a contradiction of an earlier study finding internet job search to be ineffective, which the authors attribute to the changing nature of internet job search between their two study periods. More recently, Zuo (2021) uses Comcast’s Internet Essentials program to study the effect of broadband internet access. Zuo finds that the program, which was designed to increase broadband access for low-income families, is associated with increased employment, increased labor force participation, decreased unemployment, and increased income. Similarly, Gurtzgen and colleagues (2021) find that broadband access is associated with improved rates of reemployment after the first month of unemployment. These recent studies are consistent with prior papers as well (Atasoy, 2013; Dettling, 2015; Hjort & Poulsen, 2019). Bhuller, Kostol, and Vigtel (2020) suggest that these improved outcomes may be a function of improved job searches. Their examination of the roll out of broadband internet in Norway leads them to draw three conclusions. First, broadband leads to improved recruitment processes. Second, that improved match quality is a benefit to job seekers. Finally, broadband internet facilitates better information flow. At the individual level, it seems, access to the additional informational and communications resources of broadband internet is beneficial for employment outcomes. ] question: [How does broadband internet help job seekers?] system instruction: [Your response must be based solely on the information provided in the prompt. You are not allowed to use any external resources or prior knowledge.]
Only use the text provided to answer. Do not use outside information.
Please give a summary of how Covid19 has affected behavior health.
Behavioral Health During the COVID-19 Pandemic Data from multiple sources suggest that mental health symptoms and substance use have increased since the beginning of the COVID-19 pandemic. These symptoms include emotional distress and anxiety, depression, and trauma-related conditions. Substance use refers to the number of individuals using substances such as alcohol or illicit drugs, and the frequency and quantities of use. Typically, comprehensive national morbidity and mortality data on mental health conditions, substance use, associated hospitalizations, and substance-related overdose deaths take months to compile and report. Comprehensive national data for 2020 are not yet available. Several organizations, including multiple federal agencies, have used short surveys and rapid data reporting to monitor mental health symptoms and substance use during the COVID-19 pandemic. Although the methodological differences between these surveys and perennial surveys make comparisons between years imperfect, most of the 2020 data suggest an increase in behavioral health morbidity in the United States over the course of the COVID-19 pandemic. Mental Health Data collected from multiple surveys during the COVID-19 pandemic suggest that Americans experienced increased stress and symptoms of mental health conditions. In a survey conducted in April 2020, the State Health Access Data Assistance Center (SHADAC)—a program of the Robert Wood Johnson Foundation—found that over 90% of U.S. adults reported experiencing additional levels of stress caused by the COVID-19 pandemic. In this context, stress refers to psychological stress, which occurs when individuals believe that the consequences of a situation outweigh their ability to adequately cope with it. Reactions to stressors may include fear and concern about the future, tension and irritability, sadness or depression, or feeling powerless or overwhelmed, among others. Without adequate coping strategies, stress can have detrimental effects on mental health. Coping strategies include any behavioral, social, or cognitive techniques used to mitigate the effects of stress. Coping strategies can be adaptive, meaning they promote better overall functioning (e.g., social connections, physical activities, hobbies, good sleep hygiene), or they can be maladaptive, meaning they are more likely to result in worse overall functioning (e.g., substance use, excessive screen time, risky behaviors). Although maladaptive coping strategies may reduce stress in the moment, they may exacerbate problems in the long term. Many individuals experiencing stress may have adequate coping strategies, meaning that stress is present but does not impair their daily functioning. For others, stress—and in particular stress caused by the pandemic—may have detrimental effects on their mental health. A nationally representative survey conducted by the Kaiser Family Foundation (KFF) throughout the pandemic found that an increasing number of Americans reported that pandemic-related stress was affecting their mental health. In March 2020, 32% of respondents felt that worry or stress related to coronavirus had a negative impact on their mental health. In April 2020 that number rose to 45%, and in July 2020, 53% reported that pandemic-related stress was affecting their mental health. Mental Health Disorders In some cases, extreme or prolonged stress can lead to mental health disorders. According to data collected by the National Center for Health Statistics (NCHS), the percentage of Americans experiencing symptoms of a mental health disorder appears to have increased during the COVID19 pandemic. NCHS—a research agency under the Centers for Disease Control and Prevention (CDC)—partnered with the U.S. Census Bureau on the Household Pulse Survey to monitor the social and economic effects of the pandemic on American households. The nationally representative survey collected data on employment status, food security, housing, physical and mental health, access to health care (including mental health care), and education disruption during the coronavirus pandemic. NCHS survey questions were designed to obtain information on the frequency of anxiety and depression symptoms. Other indicators of psychological distress appear elevated during the first phases of the pandemic. For example, CDC analysis of national emergency department (ED) visits showed that socioeconomic and psychosocial-related visits increased during April 2020 (compared with April 2019), while total ED visits decreased over 40%. Socioeconomic or psychosocial factors were one of a few categories of ED visits that increased; most of the 200 common diagnostic causes of ED visits decreased during that same time. Other research suggests that ED visits for mental health conditions may have decreased during the first few months of the pandemic, to a lesser extent than overall ED visits. Suicide Some evidence suggests that suicidal thoughts may have increased during the pandemic. One CDC analysis found that during the pandemic approximately twice as many U.S. adults reported serious consideration of suicide in the previous 30 days compared with 2018 (10.7% versus4.3%). Although the National Suicide Prevention Lifeline did not report increases in call volume, the Disaster Distress Helpline (part of the Suicide Lifeline) experienced a 335% increase in calls during the first five months of the pandemic. The effects of the pandemic on suicide attempts and suicide deaths is unclear, though it appears that suicide mortality has decreased compared with previous years. An increase in suicidal thoughts does not necessarily equate to an increase in suicide attempts or suicide deaths. Research from CDC shows a decrease in emergency department (ED) visits for suicide attempts between March and October 2020 compared with the same period in 2019, but to a lesser extent than overall ED visits. Preliminary national suicide mortality data in the United States for 2020 show that suicide deaths in the United States may have decreased in 2020 compared with the three previous years. In addition, regional differences may account for changes in suicide mortality. For example, some individual states and municipalities have reported stable rates in suicide deaths during the pandemic, whereas others have reported decreased rates. There may be demographic differences in suicide rates during the pandemic also. For example, CDC reported that in May 2020 ED visits for suspected suicide attempts began to increase among adolescents, especially girls. Researchers in Maryland found that suicide mortality rates increased for Black residents from March 2020 to May 2020, while decreasing for White residents over that same time. Substance Use-Related Overdoses Comprehensive national data on drug-related overdoses and overdose deaths during the pandemic are not yet available. Preliminary data from the Office of National Drug Control Policy (ONDCP) suggest increases in drug-related overdoses during the first few months of the pandemic. The Overdose Detection Mapping Application Program (ODMAP), an ONDCP surveillance system that tracks suspected overdose data nationally in near real-time, reported an increase of 11% in fatal overdoses and a 19% increase in nonfatal overdoses from March through May 2020 compared with the same months in 2019. Nearly 62% of participating counties reported increases from March to May 2020. Other areas have reported stable rates of overdose deaths. Notably, ODMAP overdose submissions appeared to be trending upward prior to the onset of the pandemic, making it difficult to determine the effects of the pandemic and mitigation measures using these data. CDC also noted an increase in drug-related overdose deaths in the beginning of the COVID-19 pandemic. Similar to the ODMAP data, the CDC data showed that overdose deaths were already increasing in the months preceding the pandemic. However, CDC data showed the rate of overdose deaths accelerating after the pandemic began. In an analysis of provisional CDC mortality data, the National Institute for Health Care Management found that the rise is particularly notable for deaths involving synthetic opioids. In addition, the institute reported increases in deaths involving commonly prescribed opioids and heroin—both of which had been declining in recent years. When examining emergency department (ED) visits, CDC found a higher number of drug overdoses—including opioid overdoses—between March and October 2020 compared with the same period in 2019. Put together, the ODMAP and CDC data suggest that drug-related overdoses and overdose deaths have increased during the COVID-19 pandemic. Individuals with substance use disorders may be at higher risk of contracting SARS-CoV-2 due to unstable housing situations, high incarceration rates, or the inability to physically distance themselves. In addition, those with substance use disorders may be at higher risk for complications of COVID-19 because substance use can often suppress the immune system or inhibit respiratory functioning.
System instructions: Only use the text provided to answer. Do not use outside information. Context: Behavioral Health During the COVID-19 Pandemic Data from multiple sources suggest that mental health symptoms and substance use have increased since the beginning of the COVID-19 pandemic. These symptoms include emotional distress and anxiety, depression, and trauma-related conditions. Substance use refers to the number of individuals using substances such as alcohol or illicit drugs, and the frequency and quantities of use. Typically, comprehensive national morbidity and mortality data on mental health conditions, substance use, associated hospitalizations, and substance-related overdose deaths take months to compile and report. Comprehensive national data for 2020 are not yet available. Several organizations, including multiple federal agencies, have used short surveys and rapid data reporting to monitor mental health symptoms and substance use during the COVID-19 pandemic. Although the methodological differences between these surveys and perennial surveys make comparisons between years imperfect, most of the 2020 data suggest an increase in behavioral health morbidity in the United States over the course of the COVID-19 pandemic. Mental Health Data collected from multiple surveys during the COVID-19 pandemic suggest that Americans experienced increased stress and symptoms of mental health conditions. In a survey conducted in April 2020, the State Health Access Data Assistance Center (SHADAC)—a program of the Robert Wood Johnson Foundation—found that over 90% of U.S. adults reported experiencing additional levels of stress caused by the COVID-19 pandemic. In this context, stress refers to psychological stress, which occurs when individuals believe that the consequences of a situation outweigh their ability to adequately cope with it. Reactions to stressors may include fear and concern about the future, tension and irritability, sadness or depression, or feeling powerless or overwhelmed, among others. Without adequate coping strategies, stress can have detrimental effects on mental health. Coping strategies include any behavioral, social, or cognitive techniques used to mitigate the effects of stress. Coping strategies can be adaptive, meaning they promote better overall functioning (e.g., social connections, physical activities, hobbies, good sleep hygiene), or they can be maladaptive, meaning they are more likely to result in worse overall functioning (e.g., substance use, excessive screen time, risky behaviors). Although maladaptive coping strategies may reduce stress in the moment, they may exacerbate problems in the long term. Many individuals experiencing stress may have adequate coping strategies, meaning that stress is present but does not impair their daily functioning. For others, stress—and in particular stress caused by the pandemic—may have detrimental effects on their mental health. A nationally representative survey conducted by the Kaiser Family Foundation (KFF) throughout the pandemic found that an increasing number of Americans reported that pandemic-related stress was affecting their mental health. In March 2020, 32% of respondents felt that worry or stress related to coronavirus had a negative impact on their mental health. In April 2020 that number rose to 45%, and in July 2020, 53% reported that pandemic-related stress was affecting their mental health. Mental Health Disorders In some cases, extreme or prolonged stress can lead to mental health disorders. According to data collected by the National Center for Health Statistics (NCHS), the percentage of Americans experiencing symptoms of a mental health disorder appears to have increased during the COVID19 pandemic. NCHS—a research agency under the Centers for Disease Control and Prevention (CDC)—partnered with the U.S. Census Bureau on the Household Pulse Survey to monitor the social and economic effects of the pandemic on American households. The nationally representative survey collected data on employment status, food security, housing, physical and mental health, access to health care (including mental health care), and education disruption during the coronavirus pandemic. NCHS survey questions were designed to obtain information on the frequency of anxiety and depression symptoms. Other indicators of psychological distress appear elevated during the first phases of the pandemic. For example, CDC analysis of national emergency department (ED) visits showed that socioeconomic and psychosocial-related visits increased during April 2020 (compared with April 2019), while total ED visits decreased over 40%. Socioeconomic or psychosocial factors were one of a few categories of ED visits that increased; most of the 200 common diagnostic causes of ED visits decreased during that same time. Other research suggests that ED visits for mental health conditions may have decreased during the first few months of the pandemic, to a lesser extent than overall ED visits. Suicide Some evidence suggests that suicidal thoughts may have increased during the pandemic. One CDC analysis found that during the pandemic approximately twice as many U.S. adults reported serious consideration of suicide in the previous 30 days compared with 2018 (10.7% versus4.3%). Although the National Suicide Prevention Lifeline did not report increases in call volume, the Disaster Distress Helpline (part of the Suicide Lifeline) experienced a 335% increase in calls during the first five months of the pandemic. The effects of the pandemic on suicide attempts and suicide deaths is unclear, though it appears that suicide mortality has decreased compared with previous years. An increase in suicidal thoughts does not necessarily equate to an increase in suicide attempts or suicide deaths. Research from CDC shows a decrease in emergency department (ED) visits for suicide attempts between March and October 2020 compared with the same period in 2019, but to a lesser extent than overall ED visits. Preliminary national suicide mortality data in the United States for 2020 show that suicide deaths in the United States may have decreased in 2020 compared with the three previous years. In addition, regional differences may account for changes in suicide mortality. For example, some individual states and municipalities have reported stable rates in suicide deaths during the pandemic, whereas others have reported decreased rates. There may be demographic differences in suicide rates during the pandemic also. For example, CDC reported that in May 2020 ED visits for suspected suicide attempts began to increase among adolescents, especially girls. Researchers in Maryland found that suicide mortality rates increased for Black residents from March 2020 to May 2020, while decreasing for White residents over that same time. Substance Use-Related Overdoses Comprehensive national data on drug-related overdoses and overdose deaths during the pandemic are not yet available. Preliminary data from the Office of National Drug Control Policy (ONDCP) suggest increases in drug-related overdoses during the first few months of the pandemic. The Overdose Detection Mapping Application Program (ODMAP), an ONDCP surveillance system that tracks suspected overdose data nationally in near real-time, reported an increase of 11% in fatal overdoses and a 19% increase in nonfatal overdoses from March through May 2020 compared with the same months in 2019. Nearly 62% of participating counties reported increases from March to May 2020. Other areas have reported stable rates of overdose deaths. Notably, ODMAP overdose submissions appeared to be trending upward prior to the onset of the pandemic, making it difficult to determine the effects of the pandemic and mitigation measures using these data. CDC also noted an increase in drug-related overdose deaths in the beginning of the COVID-19 pandemic. Similar to the ODMAP data, the CDC data showed that overdose deaths were already increasing in the months preceding the pandemic. However, CDC data showed the rate of overdose deaths accelerating after the pandemic began. In an analysis of provisional CDC mortality data, the National Institute for Health Care Management found that the rise is particularly notable for deaths involving synthetic opioids. In addition, the institute reported increases in deaths involving commonly prescribed opioids and heroin—both of which had been declining in recent years. When examining emergency department (ED) visits, CDC found a higher number of drug overdoses—including opioid overdoses—between March and October 2020 compared with the same period in 2019. Put together, the ODMAP and CDC data suggest that drug-related overdoses and overdose deaths have increased during the COVID-19 pandemic. Individuals with substance use disorders may be at higher risk of contracting SARS-CoV-2 due to unstable housing situations, high incarceration rates, or the inability to physically distance themselves. In addition, those with substance use disorders may be at higher risk for complications of COVID-19 because substance use can often suppress the immune system or inhibit respiratory functioning. Please give a summary of how Covid19 has affected behavior health.
<TASK DESCRIPTION> Only use the provided text to answer the question, no outside sources. <QUESTION> [user request] <TEXT> [context document]
I live in Osceola County, and I intend to open a bottle club where I will serve alcoholic drinks and beverages. This text contains the rules that apply. My neighbor told me that I need to close the club at midnight on Saturday and Sunday, even though these are the busiest times of the nightlife. I don't want to close my bottle club at midnight! I also want you to give me a summary in list format with all the information that might be relevant. Write no more than 150 words.
Chapter 3 - ALCOHOLIC BEVERAGES[1] Footnotes: --- (1) --- Editor's note— Ord. No. 02-06, § 1—6, adopted April 8, 2002, repealed ch. 3 in its entirety and enacted new provisions as herein set out. Formerly, ch. 3 pertained to similar provisions and derived from Ord. No. 71-8, §§ 1—4, and Ord. No. 78-7, §§ 1, 2. Cross reference— Licenses, taxation and miscellaneous business regulations, Ch. 13; adult entertainment centers, § 13-86 et seq.; open containers of alcohol in vehicles, § 14-1. Sec. 3-1. - Jurisdiction and scope. (a)This chapter shall apply to, and be effective within, the unincorporated areas of the county and any municipality which has not adopted an ordinance covering the subject matter, activity, or conduct regulated herein.(b)Any person violating this chapter shall be guilty of a misdemeanor of the second degree, punishable as provided under state law.(c)Nothing in this chapter shall be construed to conflict with F.S. chapters 561—568, the beverage laws of the state. (Ord. No. 02-06, § 1, 4-8-02) Sec. 3-2. - Definitions. Alcoholic beverage shall mean and include all beverages containing more than one (1) percent of alcohol by weight. Bottle club shall mean a place or establishment where a product or article, for a consideration, is sold, dispensed, served, or provided, with the knowledge, either actual or implied, that same will be or is intended to be mixed, combined with or drunk in connection or combination with, an alcoholic beverage, for consumption on the premises of said place or establishment. (Ord. No. 02-06, § 2, 4-8-02) Sec. 3-3. - Hours of sale for on premise consumption and service. (a)No alcoholic beverages, of any kind, may be sold, consumed, or served, either by the package or drink, or permitted to be sold, consumed, or served, either by the package or drink, in, at or on the premises of any place holding a license under the division of alcoholic beverages and tobacco of the state department of business and professional regulation, except between the hours of 7:00 a.m. and 2:00 a.m. on all days of the week except Sunday. Sunday sales of alcoholic beverages shall only be permitted between the hours of 11:00 a.m. Sunday and 2:00 a.m. of the following day except:(1)The sale, consumption and service of alcoholic beverages at any golf course holding a license as required above, may begin at 7:00 a.m. on Sunday.(2)The sale, consumption and service of alcoholic beverages at any private function which is being held at a banquet hall, convention facility, or the like, which holds a license as required above, may begin at 7:00 a.m. on Sunday, provided that the hall or facility has a minimum square footage of two thousand (10,000) square feet available for the private function.(3)The sale, consumption and service of alcoholic beverages in any private guest room of any hotel or motel, holding a license as required above, may begin at 7:00 a.m. on Sunday. (Ord. No. 02-06, § 3, 4-8-02) Sec. 3-4. - Hours of sale for off premise consumption. No alcoholic beverages of any kind may be sold, or permitted to be sold, by any place or establishment holding a license under the division of alcoholic beverages and tobacco of the state department of business and professional regulation, which license permits licensee to sell alcoholic beverages for consumption off of the premises of the licensee, except between the hours of 7:00 a.m. and 2:00 a.m. on all days of the week except Sunday. Sunday sales of alcoholic beverages, to be consumed off of the premises of the licensee, shall only be permitted between the hours of 9:00 a.m. Sunday and 2:00 a.m. of the following day. (Ord. No. 02-06, § 4, 4-8-02) Sec. 3-5. - Closing hours for bottle clubs. All bottle clubs located in the unincorporated areas of the county, shall remain closed from the hours of 3:00 a.m. to 7:00 a.m. on each day of the week except that all such bottle clubs shall remain closed from midnight on each Saturday until 7:00 a.m. on the following Monday. (Ord. No. 02-06, § 5, 4-8-02)
<TASK DESCRIPTION> Only use the provided text to answer the question, no outside sources. <QUESTION> I live in Osceola County, and I intend to open a bottle club where I will serve alcoholic drinks and beverages. This text contains the rules that apply. My neighbor told me that I need to close the club at midnight on Saturday and Sunday, even though these are the busiest times of the nightlife. I don't want to close my bottle club at midnight! I also want you to give me a summary in list format with all the information that might be relevant. Write no more than 150 words. <TEXT> Chapter 3 - ALCOHOLIC BEVERAGES[1] Footnotes: --- (1) --- Editor's note— Ord. No. 02-06, § 1—6, adopted April 8, 2002, repealed ch. 3 in its entirety and enacted new provisions as herein set out. Formerly, ch. 3 pertained to similar provisions and derived from Ord. No. 71-8, §§ 1—4, and Ord. No. 78-7, §§ 1, 2. Cross reference— Licenses, taxation and miscellaneous business regulations, Ch. 13; adult entertainment centers, § 13-86 et seq.; open containers of alcohol in vehicles, § 14-1. Sec. 3-1. - Jurisdiction and scope. (a)This chapter shall apply to, and be effective within, the unincorporated areas of the county and any municipality which has not adopted an ordinance covering the subject matter, activity, or conduct regulated herein.(b)Any person violating this chapter shall be guilty of a misdemeanor of the second degree, punishable as provided under state law.(c)Nothing in this chapter shall be construed to conflict with F.S. chapters 561—568, the beverage laws of the state. (Ord. No. 02-06, § 1, 4-8-02) Sec. 3-2. - Definitions. Alcoholic beverage shall mean and include all beverages containing more than one (1) percent of alcohol by weight. Bottle club shall mean a place or establishment where a product or article, for a consideration, is sold, dispensed, served, or provided, with the knowledge, either actual or implied, that same will be or is intended to be mixed, combined with or drunk in connection or combination with, an alcoholic beverage, for consumption on the premises of said place or establishment. (Ord. No. 02-06, § 2, 4-8-02) Sec. 3-3. - Hours of sale for on premise consumption and service. (a)No alcoholic beverages, of any kind, may be sold, consumed, or served, either by the package or drink, or permitted to be sold, consumed, or served, either by the package or drink, in, at or on the premises of any place holding a license under the division of alcoholic beverages and tobacco of the state department of business and professional regulation, except between the hours of 7:00 a.m. and 2:00 a.m. on all days of the week except Sunday. Sunday sales of alcoholic beverages shall only be permitted between the hours of 11:00 a.m. Sunday and 2:00 a.m. of the following day except:(1)The sale, consumption and service of alcoholic beverages at any golf course holding a license as required above, may begin at 7:00 a.m. on Sunday.(2)The sale, consumption and service of alcoholic beverages at any private function which is being held at a banquet hall, convention facility, or the like, which holds a license as required above, may begin at 7:00 a.m. on Sunday, provided that the hall or facility has a minimum square footage of two thousand (10,000) square feet available for the private function.(3)The sale, consumption and service of alcoholic beverages in any private guest room of any hotel or motel, holding a license as required above, may begin at 7:00 a.m. on Sunday. (Ord. No. 02-06, § 3, 4-8-02) Sec. 3-4. - Hours of sale for off premise consumption. No alcoholic beverages of any kind may be sold, or permitted to be sold, by any place or establishment holding a license under the division of alcoholic beverages and tobacco of the state department of business and professional regulation, which license permits licensee to sell alcoholic beverages for consumption off of the premises of the licensee, except between the hours of 7:00 a.m. and 2:00 a.m. on all days of the week except Sunday. Sunday sales of alcoholic beverages, to be consumed off of the premises of the licensee, shall only be permitted between the hours of 9:00 a.m. Sunday and 2:00 a.m. of the following day. (Ord. No. 02-06, § 4, 4-8-02) Sec. 3-5. - Closing hours for bottle clubs. All bottle clubs located in the unincorporated areas of the county, shall remain closed from the hours of 3:00 a.m. to 7:00 a.m. on each day of the week except that all such bottle clubs shall remain closed from midnight on each Saturday until 7:00 a.m. on the following Monday. (Ord. No. 02-06, § 5, 4-8-02) https://library.municode.com/fl/osceola_county/codes/code_of_ordinances?nodeId=PTIIOSCOCOOR_CH3ALBE_S3-1JUSC
Provide your answer in full sentences, referencing the document using quotations.
According to this document only, what is the specific impacts of internet use on children?
**Are Children Smarter Because of the Internet? Website** Modern children and the adolescents represent the first generation that has grown surrounded by the Internet technology. This can be compared to the children of the 1920s and 1950s who grew up surrounded by the buzz of the radio and television respectively. In this era of advanced technology, it is almost mandatory that school going children acquire the knowledge on internet use because education curricula are quickly transforming towards technology use. Furthermore, with the widespread use of tech-related gadgets in almost all activities, such as mobile phones, play- stations and many others in day to day life, it seems embracing of technology is a foregone conclusion . This paper will aspire to explore the question on whether children are smarter or more socialized due to the Internet. Internet Use among Children The use of internet among children today is ranked in the same category with watching television or using the phone. In developed countries, up to 87% of children aged between twelve and seventeen are online. The internet is however better in comparison to the others due to the platform it offers to enhance interaction. According to a study conducted by Genevieve Marie Johnson, it was found out that children were likely to use Internet more at school than at home. However, they enjoyed using the Internet at home more than at school . Children perceive the use of Internet in a different perspective compared to adults. There is no doubt that the Internet has a significant influence on children. Impact of Internet Use The Internet is used both at school and at home by children. At school, the children’s Internet use is governed by the children’s Internet Protection Act (Yan, 2006). The children’s use of Internet is associated with various risks despite being beneficial is some ways. Parents and guardians need to implement various strategies that favor co-use and interaction rules to children to reduce the risk associated with Internet use among children. However, these strategies were found to be less effective in limiting the risks. In a study conducted regarding the influence of the Internet on children from low income families, it was indicated that children who had access to the Internet recorded high scores compared to those who had limited access to the Internet. It was also found out that age did not have an impact on the performance of the children. Another study conducted on the influence of Internet use by the children on family relationships and parental mediation established that parental recommendations on useful websites and co-using were positively associated with the frequency with children would engage in educative, online activities. Nevertheless, it was found that parental restrictions on time and websites did not impact on the actual Internet use by children. Children are difficult to tame when it comes to unsafe Internet use. It has been established that unsafe Internet use among children is likely to occur within the homes. With the Internet, it is possible to form virtual relationships among various people. In a study that was conducted by Bonetti, Campbell and Gilmore (2010), it was revealed that children who were lonely engaged more in online communications than those who did not report being lonely. Through the Internet, such children are able to fulfill special needs in respect to social interactions, self exposure, and exploring their identity. In a study conducted among the Latino children in Los Angeles, it was observed that strict parental strategies limited children in respect to Internet use. Nevertheless, these children were able to pursue their own interests and motivations online though on a restricted level. The Internet has had far-reaching impacts on the society in general and children have not been spared. From the studies that have been conducted, it can be observed that though parents have been restrictive in allowing access of their children to the Internet, this has come with various challenges. The children have always had a way to access Internet and parents have been left with very little in controlling what the children access. In general, this young generation seems to be inseparable with the internet. Much as some are opposed to internet use among children, the benefits accrued from its use surpass the negative impacts especially when used in controlled environments. Based on numerous studies by academics and social experts, it is clear that the use of internet has provided a chance for children to acquire a wide range of knowledge through easy access to information compared to the scenario in the past where information sources were quite limited. Internet also provides a perfect platform for children to gain vital communication skills that in turn enhance social development. Psychology experts have identified a link between constructive use of internet and student performance in school particularly in language expressivity. Children access information by visiting websites and this enhances their learning skills. The internet also makes learning an enjoyable experience because most websites contain graphics that effectively capture children’s’ imagination and creativity. This is important in stimulating the functioning of their brains and transforming them into effective learners. The process of acquiring the information from the internet is also vital in a child’s developmental skills such as information evaluation, research techniques as well as work planning strategies. Children with prowess in internet gaming demonstrate better levels of visual memory and pattern recognition when compared to those who did not. This has a positive impact on their ability to interpret graphical data and enhanced diagram visualization and interpretation. From the data collected by Jennifer Bremmer from Chicago University; department of Child Psychiatry, up to 84% of parents interviewed, agreed that internet use has had a positive impact on their children’s school life and particularly in academics. Eighty one percent of the respondents said that their children acquired most of their information from the internet. Majority of those interviewed said they felt that without the internet their children would perform poorly. According to government budgetary allocations of the United States in 2000, $4 billion was dedicated for connecting students to internet, a clear indication of the government’s commitment towards use of technology in education. The internet also gives access to more up-dated information compared to books, thus improving on the child’s vocabulary in the offered curriculum and in the research projects. The One Child One Laptop project in Africa is expected to give African children an opportunity to access world wide information and be able to effectively contribute their ideas on a world platform. This could also create a chance for them to earn a living as they mature since they can work on- line and link up with other people in the world. Based on the scientific background information on stimulation and response, it can be conclusively deduced that the use of internet by growing children has a positive effect on their development. The prolonged use of computer while searching for information from the internet could improve the coordination patterns of eye and hand through the use of the mouse, keyboard and screen. Though no specific research has been done on this phenomenon, it’s scientifically proven that habits enhance brain development and the associated physical development. The use of internet also has a social dimension. Antagonists on internet use argue that it has replaced human interactions. On the other hand, the protagonists claim that with professional use, internet use can be a medium to enhance this interaction. The use of the chat rooms, email services and other communication platforms available on the internet, are believed to enhance social skills alongside communication skills. Social and culture exchanges among young children has been enhanced through the internet mailing facility and through the available social sites such as Face book and Twitter. Children get an opportunity to interact in educative and productive communication. A perfect example is the Spank Magazine, which gives a platform for world wide interactions on youth issues where any one can interact and communicate their ideas for free. Social studies analysts have shown that the use of internet by school going children in class work has a marked positive impact on their performance. This has been linked to the fun associated with learning using the internet. The use of internet also enhances cooperation and sharing of ideas among the children, a vital life skill. Studies have indicated improved performances in many pupils using internet as a learning tool, and who initially had difficulties in using the conventional learning models. This in turn, positively influences their attitude toward school works as among other reasons it gives the students a relatively independent environment for learning and interaction. The internet has become a tool of entertainment. Research on internet use has shown that many children use it as a leisure tool to pursue amusement and enjoyment. The family set ups today are more individualized and physical interactions among children mostly at home is limited to a certain extent. Such children resort to internet for companionship. Through the process of enjoying themselves, they are subconsciously benefiting by acquiring other skills such as analyzing skills, creative and critical thinking leading to improved understanding of concepts. Children are also molded socially by the Internet through listening to music, watching movies and documentaries, world news and any other entertainment features. This makes the children smarter on issues happening in the world and prepares them for more networking in the social world. Internet also provides children with physical impairment, an opportunity to find pleasure they may not acquire anywhere else due to their disabilities. The experts’ research data explained above clearly indicates that, yes, internet is useful and almost a basic necessity for today’s school going children, however; on the other hand, utmost care must be observed since uncontrolled use of the internet has been reported to have negative impacts on the children. As is the norm, everything that has benefits comes along with challenges as well. Social psychologists have revealed several negative impacts of internet use on the social, physical and cognitive spheres of their life. Information fatigue syndrome is among the most common and comes as a result of reading and analyzing too much information from the internet.
[text] ========== **Are Children Smarter Because of the Internet? Website** Modern children and the adolescents represent the first generation that has grown surrounded by the Internet technology. This can be compared to the children of the 1920s and 1950s who grew up surrounded by the buzz of the radio and television respectively. In this era of advanced technology, it is almost mandatory that school going children acquire the knowledge on internet use because education curricula are quickly transforming towards technology use. Furthermore, with the widespread use of tech-related gadgets in almost all activities, such as mobile phones, play- stations and many others in day to day life, it seems embracing of technology is a foregone conclusion . This paper will aspire to explore the question on whether children are smarter or more socialized due to the Internet. Internet Use among Children The use of internet among children today is ranked in the same category with watching television or using the phone. In developed countries, up to 87% of children aged between twelve and seventeen are online. The internet is however better in comparison to the others due to the platform it offers to enhance interaction. According to a study conducted by Genevieve Marie Johnson, it was found out that children were likely to use Internet more at school than at home. However, they enjoyed using the Internet at home more than at school . Children perceive the use of Internet in a different perspective compared to adults. There is no doubt that the Internet has a significant influence on children. Impact of Internet Use The Internet is used both at school and at home by children. At school, the children’s Internet use is governed by the children’s Internet Protection Act (Yan, 2006). The children’s use of Internet is associated with various risks despite being beneficial is some ways. Parents and guardians need to implement various strategies that favor co-use and interaction rules to children to reduce the risk associated with Internet use among children. However, these strategies were found to be less effective in limiting the risks. In a study conducted regarding the influence of the Internet on children from low income families, it was indicated that children who had access to the Internet recorded high scores compared to those who had limited access to the Internet. It was also found out that age did not have an impact on the performance of the children. Another study conducted on the influence of Internet use by the children on family relationships and parental mediation established that parental recommendations on useful websites and co-using were positively associated with the frequency with children would engage in educative, online activities. Nevertheless, it was found that parental restrictions on time and websites did not impact on the actual Internet use by children. Children are difficult to tame when it comes to unsafe Internet use. It has been established that unsafe Internet use among children is likely to occur within the homes. With the Internet, it is possible to form virtual relationships among various people. In a study that was conducted by Bonetti, Campbell and Gilmore (2010), it was revealed that children who were lonely engaged more in online communications than those who did not report being lonely. Through the Internet, such children are able to fulfill special needs in respect to social interactions, self exposure, and exploring their identity. In a study conducted among the Latino children in Los Angeles, it was observed that strict parental strategies limited children in respect to Internet use. Nevertheless, these children were able to pursue their own interests and motivations online though on a restricted level. The Internet has had far-reaching impacts on the society in general and children have not been spared. From the studies that have been conducted, it can be observed that though parents have been restrictive in allowing access of their children to the Internet, this has come with various challenges. The children have always had a way to access Internet and parents have been left with very little in controlling what the children access. In general, this young generation seems to be inseparable with the internet. Much as some are opposed to internet use among children, the benefits accrued from its use surpass the negative impacts especially when used in controlled environments. Based on numerous studies by academics and social experts, it is clear that the use of internet has provided a chance for children to acquire a wide range of knowledge through easy access to information compared to the scenario in the past where information sources were quite limited. Internet also provides a perfect platform for children to gain vital communication skills that in turn enhance social development. Psychology experts have identified a link between constructive use of internet and student performance in school particularly in language expressivity. Children access information by visiting websites and this enhances their learning skills. The internet also makes learning an enjoyable experience because most websites contain graphics that effectively capture children’s’ imagination and creativity. This is important in stimulating the functioning of their brains and transforming them into effective learners. The process of acquiring the information from the internet is also vital in a child’s developmental skills such as information evaluation, research techniques as well as work planning strategies. Children with prowess in internet gaming demonstrate better levels of visual memory and pattern recognition when compared to those who did not. This has a positive impact on their ability to interpret graphical data and enhanced diagram visualization and interpretation. From the data collected by Jennifer Bremmer from Chicago University; department of Child Psychiatry, up to 84% of parents interviewed, agreed that internet use has had a positive impact on their children’s school life and particularly in academics. Eighty one percent of the respondents said that their children acquired most of their information from the internet. Majority of those interviewed said they felt that without the internet their children would perform poorly. According to government budgetary allocations of the United States in 2000, $4 billion was dedicated for connecting students to internet, a clear indication of the government’s commitment towards use of technology in education. The internet also gives access to more up-dated information compared to books, thus improving on the child’s vocabulary in the offered curriculum and in the research projects. The One Child One Laptop project in Africa is expected to give African children an opportunity to access world wide information and be able to effectively contribute their ideas on a world platform. This could also create a chance for them to earn a living as they mature since they can work on- line and link up with other people in the world. Based on the scientific background information on stimulation and response, it can be conclusively deduced that the use of internet by growing children has a positive effect on their development. The prolonged use of computer while searching for information from the internet could improve the coordination patterns of eye and hand through the use of the mouse, keyboard and screen. Though no specific research has been done on this phenomenon, it’s scientifically proven that habits enhance brain development and the associated physical development. The use of internet also has a social dimension. Antagonists on internet use argue that it has replaced human interactions. On the other hand, the protagonists claim that with professional use, internet use can be a medium to enhance this interaction. The use of the chat rooms, email services and other communication platforms available on the internet, are believed to enhance social skills alongside communication skills. Social and culture exchanges among young children has been enhanced through the internet mailing facility and through the available social sites such as Face book and Twitter. Children get an opportunity to interact in educative and productive communication. A perfect example is the Spank Magazine, which gives a platform for world wide interactions on youth issues where any one can interact and communicate their ideas for free. Social studies analysts have shown that the use of internet by school going children in class work has a marked positive impact on their performance. This has been linked to the fun associated with learning using the internet. The use of internet also enhances cooperation and sharing of ideas among the children, a vital life skill. Studies have indicated improved performances in many pupils using internet as a learning tool, and who initially had difficulties in using the conventional learning models. This in turn, positively influences their attitude toward school works as among other reasons it gives the students a relatively independent environment for learning and interaction. The internet has become a tool of entertainment. Research on internet use has shown that many children use it as a leisure tool to pursue amusement and enjoyment. The family set ups today are more individualized and physical interactions among children mostly at home is limited to a certain extent. Such children resort to internet for companionship. Through the process of enjoying themselves, they are subconsciously benefiting by acquiring other skills such as analyzing skills, creative and critical thinking leading to improved understanding of concepts. Children are also molded socially by the Internet through listening to music, watching movies and documentaries, world news and any other entertainment features. This makes the children smarter on issues happening in the world and prepares them for more networking in the social world. Internet also provides children with physical impairment, an opportunity to find pleasure they may not acquire anywhere else due to their disabilities. The experts’ research data explained above clearly indicates that, yes, internet is useful and almost a basic necessity for today’s school going children, however; on the other hand, utmost care must be observed since uncontrolled use of the internet has been reported to have negative impacts on the children. As is the norm, everything that has benefits comes along with challenges as well. Social psychologists have revealed several negative impacts of internet use on the social, physical and cognitive spheres of their life. Information fatigue syndrome is among the most common and comes as a result of reading and analyzing too much information from the internet. ---------------- [query] ========== According to this document only, what is the specific impacts of internet use on children? ---------------- [task instructions] ========== Provide your answer in full sentences, referencing the document using quotations.
<TASK DESCRIPTION> Only use the provided text to answer the question, no outside sources. <QUESTION> [user request] <TEXT> [context document]
I would like a policy analysis based on this article. I will need you to focus more on the EV parts so make sure to be more detailed on those.
The Canadian government is imposing a 100 per cent tariff on imports of Chinese-made electric vehicles (EVs), aluminum and steel. The announcement, made by Department of Finance Canada during the Liberal cabinet retreat in Halifax on Monday, follows a 30-day federal consultation period that began in July. The move reflects the government’s growing concerns over China’s trade practices in the EV sector. It aims to address issues related to unfair competition, labour and environmental standards and national security over data. “Canadian workers and critical sectors, including steel and aluminum…are facing an intentional, state-directed policy of overcapacity, undermining Canada’s ability to compete in domestic and global markets,” says Chrystia Freeland, deputy prime minister and minister of finance, in a statement. “That is why our government is moving forward with decisive action to level the playing field, protect Canadian workers, and match measures taken by key trading partners.” The tariffs will take effect on October 1. The EV-related tarrif will apply to a range of vehicles, including electric and certain hybrid passenger vehicles, trucks, buses and delivery vans. The new surtax will be added on top of the existing 6.1 per cent Most-Favoured Nation import tariff already in place for EVs produced in China. In addition to the tariffs on EVs, Canada is imposing a 25 per cent tariff on Chinese steel and aluminum. The government is also taking steps to limit the eligibility of Chinese-made EVs for federal incentives, such as the Incentives for Zero-Emission Vehicles, Medium- and Heavy-Duty Zero-Emission Vehicles, and the Zero-Emission Vehicle Infrastructure Program. Chinese-made cars in Canada The automakers likely to face the most immediate impact from the new EV tariff are Tesla and Polestar, both of which currently sell Chinese-made EVs in Canada. According to federal lobbyist registry documents, Tesla updated its lobbying goals in August (just days before the government’s announcement) to include efforts to “engage with government and provide guidance with regard to policy responses to China’s automotive trade practices, in an effort to protect Canada’s automotive sector, ensure electric vehicle affordability for Canadian consumers, and the achievement of Canada’s greenhouse gas reduction objectives.” (Latest data released by Transport Canada show that Tesla is leading in iZEV rebate claims, with 4,826 in May and a total of 20,293 claims in 2024, so far.) Another automaker that may face negative effects from the sanctions is China’s largest EV manufacturer, BYD. Earlier this month, lobbyist documents revealed BYD’s plans to enter the Canadian electric passenger vehicle market. The new tariffs will potentially complicate the company’s expansion plans here due to increased costs associated with importing Chinese-made vehicles. Elsewhere, BYD’s market strategy has already been influenced by tariffs. In May, the Biden Administration imposed a 100 per cent tariff on Chinese-made EVs, as well as tariffs on advanced batteries, solar cells, steel and aluminum. BYD’s Executive Vice President and CEO of BYD Americas, Stella Li, has previously stated that the company had no plans to enter the U.S. market because of political complications. Europe’s stance on Chinese-made EVs is similar to both Canada and U.S. Last week, the European Commission announced new tariff rates as part of an ongoing investigation into Chinese electric car subsidies. These tariffs, ranging from nine per cent to 36.3 per cent, are slightly lower than the initially proposed range of 17.4 per cent to 38.1 per cent in June. Mixed reactions The announcement of the new tariffs was positively welcomed by Canada’s auto industry and labour unions. “Given the highly integrated nature of the automotive industry across North America, alignment with the U.S. on the approach to China is fundamental to its continued success,” said Brian Kingston, president & CEO of the Canadian Vehicle Manufacturers’ Association, in a press statement. “With an upcoming review of the Canada-United States-Mexico Agreement in 2026 there is simply too much at stake for the automotive industry and the broader economy if Canada is misaligned.” Unifor, the largest private-sector union in Canada, also supports the tariffs, stressing the need to protect Canadian workers and build a forward-looking auto industry that provides “good union jobs” and “economic benefits.” “Canada can and must protect auto and manufacturing jobs here in this country, which thousands of workers rely on for their livelihoods,” said Unifor National president, Lana Payne. “There is no justification to trade away high-paying, high-skilled jobs for cheap high-carbon intensive vehicles built under deplorable working conditions. However, not all groups are in favour of tariffs. Clean Energy Canada raised concerns that the decision could lead to fewer affordable electric vehicles for Canadians, reduced competition and increased climate pollution. “Strong EV demand depends on building and offering EVs that Canadians want — and can afford. If Canadian EV sales drop as a result of the new measures, this might be used as a justification for cancelling, delaying, or downgrading EV ambitions and, ironically, further delaying the domestic production they’re meant to protect.” Clean Energy Canada suggests the federal government complement its trade measures with an EV affordability package, including extending the iZEV program until 2028, lowering the price cap on rebates to $50,000 to compel automakers to drop their EV prices below the cap and introducing rebates for used EVs. More consultations coming The federal government says it will review the tariffs on Chinese-made EVs, aluminum and steel within a year of implementation, with the possibility of extending the policy or introducing additional measures, if necessary. The Canadian government is also concerned that China’s non-market practices are jeopardizing other key sectors within Canada’s EV supply chain, including batteries, semiconductors, solar products and critical minerals. In 2023, China’s battery production alone was enough to meet global demand, according to BloombergNEF. The International Energy Agency reports that China dominates the processing of critical minerals and handles over half of the world’s lithium, cobalt, graphite and rare earth elements. Barclays projects that China’s semiconductor manufacturing capacity could more than double within five to seven years, potentially leading to market oversupply by 2026. In response to these developments, the Government of Canada is launching a second 30-day consultation focused on the vital sectors of batteries, semiconductors, solar products and critical minerals.
<TASK DESCRIPTION> Only use the provided text to answer the question, no outside sources. <QUESTION> I would like a policy analysis based on this article. I will need you to focus more on the EV parts so make sure to be more detailed on those. <TEXT> The Canadian government is imposing a 100 per cent tariff on imports of Chinese-made electric vehicles (EVs), aluminum and steel. The announcement, made by Department of Finance Canada during the Liberal cabinet retreat in Halifax on Monday, follows a 30-day federal consultation period that began in July. The move reflects the government’s growing concerns over China’s trade practices in the EV sector. It aims to address issues related to unfair competition, labour and environmental standards and national security over data. “Canadian workers and critical sectors, including steel and aluminum…are facing an intentional, state-directed policy of overcapacity, undermining Canada’s ability to compete in domestic and global markets,” says Chrystia Freeland, deputy prime minister and minister of finance, in a statement. “That is why our government is moving forward with decisive action to level the playing field, protect Canadian workers, and match measures taken by key trading partners.” The tariffs will take effect on October 1. The EV-related tarrif will apply to a range of vehicles, including electric and certain hybrid passenger vehicles, trucks, buses and delivery vans. The new surtax will be added on top of the existing 6.1 per cent Most-Favoured Nation import tariff already in place for EVs produced in China. In addition to the tariffs on EVs, Canada is imposing a 25 per cent tariff on Chinese steel and aluminum. The government is also taking steps to limit the eligibility of Chinese-made EVs for federal incentives, such as the Incentives for Zero-Emission Vehicles, Medium- and Heavy-Duty Zero-Emission Vehicles, and the Zero-Emission Vehicle Infrastructure Program. Chinese-made cars in Canada The automakers likely to face the most immediate impact from the new EV tariff are Tesla and Polestar, both of which currently sell Chinese-made EVs in Canada. According to federal lobbyist registry documents, Tesla updated its lobbying goals in August (just days before the government’s announcement) to include efforts to “engage with government and provide guidance with regard to policy responses to China’s automotive trade practices, in an effort to protect Canada’s automotive sector, ensure electric vehicle affordability for Canadian consumers, and the achievement of Canada’s greenhouse gas reduction objectives.” (Latest data released by Transport Canada show that Tesla is leading in iZEV rebate claims, with 4,826 in May and a total of 20,293 claims in 2024, so far.) Another automaker that may face negative effects from the sanctions is China’s largest EV manufacturer, BYD. Earlier this month, lobbyist documents revealed BYD’s plans to enter the Canadian electric passenger vehicle market. The new tariffs will potentially complicate the company’s expansion plans here due to increased costs associated with importing Chinese-made vehicles. Elsewhere, BYD’s market strategy has already been influenced by tariffs. In May, the Biden Administration imposed a 100 per cent tariff on Chinese-made EVs, as well as tariffs on advanced batteries, solar cells, steel and aluminum. BYD’s Executive Vice President and CEO of BYD Americas, Stella Li, has previously stated that the company had no plans to enter the U.S. market because of political complications. Europe’s stance on Chinese-made EVs is similar to both Canada and U.S. Last week, the European Commission announced new tariff rates as part of an ongoing investigation into Chinese electric car subsidies. These tariffs, ranging from nine per cent to 36.3 per cent, are slightly lower than the initially proposed range of 17.4 per cent to 38.1 per cent in June. Mixed reactions The announcement of the new tariffs was positively welcomed by Canada’s auto industry and labour unions. “Given the highly integrated nature of the automotive industry across North America, alignment with the U.S. on the approach to China is fundamental to its continued success,” said Brian Kingston, president & CEO of the Canadian Vehicle Manufacturers’ Association, in a press statement. “With an upcoming review of the Canada-United States-Mexico Agreement in 2026 there is simply too much at stake for the automotive industry and the broader economy if Canada is misaligned.” Unifor, the largest private-sector union in Canada, also supports the tariffs, stressing the need to protect Canadian workers and build a forward-looking auto industry that provides “good union jobs” and “economic benefits.” “Canada can and must protect auto and manufacturing jobs here in this country, which thousands of workers rely on for their livelihoods,” said Unifor National president, Lana Payne. “There is no justification to trade away high-paying, high-skilled jobs for cheap high-carbon intensive vehicles built under deplorable working conditions. However, not all groups are in favour of tariffs. Clean Energy Canada raised concerns that the decision could lead to fewer affordable electric vehicles for Canadians, reduced competition and increased climate pollution. “Strong EV demand depends on building and offering EVs that Canadians want — and can afford. If Canadian EV sales drop as a result of the new measures, this might be used as a justification for cancelling, delaying, or downgrading EV ambitions and, ironically, further delaying the domestic production they’re meant to protect.” Clean Energy Canada suggests the federal government complement its trade measures with an EV affordability package, including extending the iZEV program until 2028, lowering the price cap on rebates to $50,000 to compel automakers to drop their EV prices below the cap and introducing rebates for used EVs. More consultations coming The federal government says it will review the tariffs on Chinese-made EVs, aluminum and steel within a year of implementation, with the possibility of extending the policy or introducing additional measures, if necessary. The Canadian government is also concerned that China’s non-market practices are jeopardizing other key sectors within Canada’s EV supply chain, including batteries, semiconductors, solar products and critical minerals. In 2023, China’s battery production alone was enough to meet global demand, according to BloombergNEF. The International Energy Agency reports that China dominates the processing of critical minerals and handles over half of the world’s lithium, cobalt, graphite and rare earth elements. Barclays projects that China’s semiconductor manufacturing capacity could more than double within five to seven years, potentially leading to market oversupply by 2026. In response to these developments, the Government of Canada is launching a second 30-day consultation focused on the vital sectors of batteries, semiconductors, solar products and critical minerals. https://electricautonomy.ca/policy-regulations/2024-08-27/canada-imposes-tariffs-on-chinese-made-evs-aluminum-steel/
You must draw your answer from the below text. You may NOT use any outside resources. You may NOT use prior knowledge in any way.
How was the Falcon sensor relevant to this event?
The use of information technology (IT) across industries has created opportunities for disruptions and vulnerabilities in the supply chain for products and services. For example, some firms may be more susceptible to system failures, data breaches, and cyberattacks than others depending on the security of the IT systems used.1 Recent examples include the February 2024 cyberattack on Change Healthcare, a subsidiary of UnitedHealth Group, Inc.,2 and a series of data breaches beginning in April 2024 that may have affected about 165 organizations using Snowflake, a cloud-based data management platform.3 The impact of these disruptions may be more widespread when components of IT systems are concentrated among a limited number of providers. On July 19, 2024, CrowdStrike Holdings, Inc. (hereinafter CrowdStrike) released a software update with a defective file for devices using the Windows operating system, causing some Windows devices to crash. CrowdStrike and Microsoft subsequently released updated safe files and recovery tools.4 Some users were able to fix the issue by rebooting impacted devices multiple times, while others had to take additional steps.5 CrowdStrike’s faulty update does not appear to be related to a cyberattack or data breach; instead, it is an example of the pervasiveness of some IT components and how an issue with an IT component may affect multiple sectors simultaneously, resulting in a host of disruptions domestically and internationally. This FAQ provides a description of CrowdStrike and the faulty update and discusses how the faulty update affected certain sectors in the United States. How did the faulty CrowdStrike update occur, and what is CrowdStrike? 6 CrowdStrike delivers cybersecurity products and services to its customers via a cloud computing platform—the Falcon platform.7 CrowdStrike, through its cloud-based platform, deploys and installs a software called the Falcon Agent or the Falcon Sensor on each connected endpoint device (e.g., individual computer) of its customers.8 On July 19, 2024, CrowdStrike released “a sensor configuration update” over the cloud to its customers’ endpoint computers that were running the Falcon sensor for Windows operating systems.9 The update “triggered a logic error resulting in a system crash and blue screen [error]” on impacted computers.10 Those computers that were online and downloaded the faulty update within a certain time period on that day “were susceptible to a system crash.”11 CrowdStrike’s faulty update does not appear to be related to a cyberattack or data breach. The outage occurred as part of the company’s effort to deliver its cybersecurity services. CrowdStrike claims that its cybersecurity products through the Falcon Agent can identify and prevent “known and unknown malware and fileless attacks” to protect its customers’ endpoint devices while “capturing and recording … endpoint data.”12 The cyberattack events and data captured by the agent are streamed back to the Falcon platform’s cloud infrastructure in real time “in order to be further analyzed” to optimize its cybersecurity algorithms.13 The agent can also be remotely reconfigured in real time to take other actions “as risk and threat postures change.”14 This agent is built to support major computer operating systems, including Microsoft’s Windows.15
You must draw your answer from the below text. You may NOT use any outside resources. You may NOT use prior knowledge in any way. The use of information technology (IT) across industries has created opportunities for disruptions and vulnerabilities in the supply chain for products and services. For example, some firms may be more susceptible to system failures, data breaches, and cyberattacks than others depending on the security of the IT systems used.1 Recent examples include the February 2024 cyberattack on Change Healthcare, a subsidiary of UnitedHealth Group, Inc.,2 and a series of data breaches beginning in April 2024 that may have affected about 165 organizations using Snowflake, a cloud-based data management platform.3 The impact of these disruptions may be more widespread when components of IT systems are concentrated among a limited number of providers. On July 19, 2024, CrowdStrike Holdings, Inc. (hereinafter CrowdStrike) released a software update with a defective file for devices using the Windows operating system, causing some Windows devices to crash. CrowdStrike and Microsoft subsequently released updated safe files and recovery tools.4 Some users were able to fix the issue by rebooting impacted devices multiple times, while others had to take additional steps.5 CrowdStrike’s faulty update does not appear to be related to a cyberattack or data breach; instead, it is an example of the pervasiveness of some IT components and how an issue with an IT component may affect multiple sectors simultaneously, resulting in a host of disruptions domestically and internationally. This FAQ provides a description of CrowdStrike and the faulty update and discusses how the faulty update affected certain sectors in the United States. How did the faulty CrowdStrike update occur, and what is CrowdStrike? 6 CrowdStrike delivers cybersecurity products and services to its customers via a cloud computing platform—the Falcon platform.7 CrowdStrike, through its cloud-based platform, deploys and installs a software called the Falcon Agent or the Falcon Sensor on each connected endpoint device (e.g., individual computer) of its customers.8 On July 19, 2024, CrowdStrike released “a sensor configuration update” over the cloud to its customers’ endpoint computers that were running the Falcon sensor for Windows operating systems.9 The update “triggered a logic error resulting in a system crash and blue screen [error]” on impacted computers.10 Those computers that were online and downloaded the faulty update within a certain time period on that day “were susceptible to a system crash.”11 CrowdStrike’s faulty update does not appear to be related to a cyberattack or data breach. The outage occurred as part of the company’s effort to deliver its cybersecurity services. CrowdStrike claims that its cybersecurity products through the Falcon Agent can identify and prevent “known and unknown malware and fileless attacks” to protect its customers’ endpoint devices while “capturing and recording … endpoint data.”12 The cyberattack events and data captured by the agent are streamed back to the Falcon platform’s cloud infrastructure in real time “in order to be further analyzed” to optimize its cybersecurity algorithms.13 The agent can also be remotely reconfigured in real time to take other actions “as risk and threat postures change.”14 This agent is built to support major computer operating systems, including Microsoft’s Windows.15 How was the Falcon sensor relevant to this event?
Formulate your answer using only the provided text; do not use your own knowledge or the use of any outside sources.
What would change if marijuana was changed from a schedule I drug to a schedule III drug?
Drugs and Biologics Aside from Schedule I substances, controlled substances have accepted medical uses and may be lawfully dispensed by prescription under the CSA, subject to various restrictions. Accordingly, rescheduling marijuana from Schedule I to Schedule III would open the door for the medical marijuana industry to market their products consistent with federal law. Any such products must still comply with other federal legal requirements, such as the FD&C Act, before they could be legally marketed in the United States. Rescheduling thus would not automatically legalize medical marijuana in the United States. The FD&C Act requires new drugs, including both small-molecule drugs that are synthesized in a laboratory and biologics that are derived from living organisms (e.g., vaccines), to be approved by FDA before they can be marketed and sold in the United States. For FDA to approve a new drug, the drug sponsor must submit a new drug application (NDA) with “substantial evidence” that the drug is safe and effective for its proposed use. Similarly, for FDA to approve a biologic, a sponsor must submit a biologics license application (BLA) demonstrating that the product is safe, potent, and pure. Certain chemicals related to or derived from marijuana may be considered small-molecule drugs, while other components of the cannabis plant—including marijuana itself—may be considered a biologic. Congressional Research Service 3 Marijuana itself is not an approved drug, but FDA has approved four drugs derived from or related to cannabis. FDA approved a drug containing CBD called Epidiolex, which is used to treat certain kinds of seizures. FDA also approved Marinol and Syndros for the treatment of anorexia associated with weight loss in AIDS patients, as well as Cesamet for the treatment of nausea and vomiting in patients undergoing chemotherapy. Marinol and Syndros contain the active ingredient dronabinol, a synthetic delta-9- tetrahydrocannabinol (THC), which is considered the psychoactive component of cannabis. Cesamet contains the active ingredient nabilone, which is synthetically derived and has a chemical structure similar to THC. Despite obtaining FDA approval, Epidiolex, Marinol, Syndros, and Cesamet could not immediately be marketed in the United States because CBD and synthetic tetrahydrocannabinols were considered Schedule I substances. The DOJ rescheduled each of these drugs within a few months to a couple years of their approval by FDA, thereby allowing the drugs to be marketed and prescribed. The DOJ rescheduled Epidiolex as a Schedule V drug, and the 2018 farm bill completely descheduled Epidiolex because it is considered hemp under the new definition. FDA-approved products containing dronabinol were rescheduled to Schedule II or Schedule III under the CSA, depending on their form, and FDA-approved products containing nabilone were rescheduled to Schedule II. Other tetrahydrocannabinols remain Schedule I substances, and, because they are scheduled separately from marijuana, they are not included in the DOJ’s proposed rule rescheduling marijuana. Drugs Marketed Without FDA Approval New drugs that FDA has not approved cannot legally be marketed in interstate commerce under the FD&C Act. FDA categorizes products based on how they are marketed rather than based on how the manufacturer or seller categorizes them. FDA may therefore consider some products marketed as a food, dietary supplement, tobacco product, or cosmetic to be illegal drugs (assuming they have not obtained FDA approval for marketing as a drug) if the product’s packaging makes claims that it is intended to cure, mitigate, or treat a disease or health-related condition. The FD&C Act defines a “drug” to include “articles intended for use in the diagnosis, cure, mitigation, treatment, or prevention of disease.” Therefore, FDA may deem products to be “drugs” under this definition if they are marketed as a treatment for a disease. FDA has issued warning letters to companies marketing cannabis products, including CBD tea and hemp-infused body butter, whose labeling makes these kinds of treatment claims, advising that drugs must undergo the NDA process before they can be marketed in interstate commerce. A manufacturer or seller of one of these products can remedy the issue by submitting an NDA and obtaining FDA approval to market its product as a drug, or by removing the claims. Medical Research To obtain approval for a new drug or biologic, sponsors must conduct research, including clinical trials on human subjects, to generate the required evidence regarding the drug’s safety and effectiveness. Before conducting research with marijuana, a researcher must obtain a DEA registration and an FDA authorization of an investigational new drug application (IND) containing details on how the researcher plans to conduct the study. Then, the researcher must use marijuana from a DEA-registered source. Generally, rescheduling a drug from Schedule I to Schedule III loosens the controls on medical research involving that drug. Researchers and manufacturers of Schedule III substances are subject to less-onerous registration requirements than researchers and manufacturers of Schedule I substances. However, medical researchers and drug sponsors of marijuana or CBD containing drugs would not benefit from these looser restrictions associated with rescheduling without congressional action. In 2022, Congress passed the Medical Marijuana and Cannabidiol Research Expansion Act (P.L. 117-215), which amended the CSA for medical research involving marijuana or CBD to lessen the stringent controls typically applicable for Schedule I substances. The act created separate requirements for marijuana researchers and manufacturers Congressional Research Service 4 to expedite registration with the DEA, and these separate requirements would not be affected by rescheduling without additional congressional action.
Formulate your answer using only the provided text; do not use your own knowledge or the use of any outside sources. Provided text: Drugs and Biologics Aside from Schedule I substances, controlled substances have accepted medical uses and may be lawfully dispensed by prescription under the CSA, subject to various restrictions. Accordingly, rescheduling marijuana from Schedule I to Schedule III would open the door for the medical marijuana industry to market their products consistent with federal law. Any such products must still comply with other federal legal requirements, such as the FD&C Act, before they could be legally marketed in the United States. Rescheduling thus would not automatically legalize medical marijuana in the United States. The FD&C Act requires new drugs, including both small-molecule drugs that are synthesized in a laboratory and biologics that are derived from living organisms (e.g., vaccines), to be approved by FDA before they can be marketed and sold in the United States. For FDA to approve a new drug, the drug sponsor must submit a new drug application (NDA) with “substantial evidence” that the drug is safe and effective for its proposed use. Similarly, for FDA to approve a biologic, a sponsor must submit a biologics license application (BLA) demonstrating that the product is safe, potent, and pure. Certain chemicals related to or derived from marijuana may be considered small-molecule drugs, while other components of the cannabis plant—including marijuana itself—may be considered a biologic. Congressional Research Service 3 Marijuana itself is not an approved drug, but FDA has approved four drugs derived from or related to cannabis. FDA approved a drug containing CBD called Epidiolex, which is used to treat certain kinds of seizures. FDA also approved Marinol and Syndros for the treatment of anorexia associated with weight loss in AIDS patients, as well as Cesamet for the treatment of nausea and vomiting in patients undergoing chemotherapy. Marinol and Syndros contain the active ingredient dronabinol, a synthetic delta-9- tetrahydrocannabinol (THC), which is considered the psychoactive component of cannabis. Cesamet contains the active ingredient nabilone, which is synthetically derived and has a chemical structure similar to THC. Despite obtaining FDA approval, Epidiolex, Marinol, Syndros, and Cesamet could not immediately be marketed in the United States because CBD and synthetic tetrahydrocannabinols were considered Schedule I substances. The DOJ rescheduled each of these drugs within a few months to a couple years of their approval by FDA, thereby allowing the drugs to be marketed and prescribed. The DOJ rescheduled Epidiolex as a Schedule V drug, and the 2018 farm bill completely descheduled Epidiolex because it is considered hemp under the new definition. FDA-approved products containing dronabinol were rescheduled to Schedule II or Schedule III under the CSA, depending on their form, and FDA-approved products containing nabilone were rescheduled to Schedule II. Other tetrahydrocannabinols remain Schedule I substances, and, because they are scheduled separately from marijuana, they are not included in the DOJ’s proposed rule rescheduling marijuana. Drugs Marketed Without FDA Approval New drugs that FDA has not approved cannot legally be marketed in interstate commerce under the FD&C Act. FDA categorizes products based on how they are marketed rather than based on how the manufacturer or seller categorizes them. FDA may therefore consider some products marketed as a food, dietary supplement, tobacco product, or cosmetic to be illegal drugs (assuming they have not obtained FDA approval for marketing as a drug) if the product’s packaging makes claims that it is intended to cure, mitigate, or treat a disease or health-related condition. The FD&C Act defines a “drug” to include “articles intended for use in the diagnosis, cure, mitigation, treatment, or prevention of disease.” Therefore, FDA may deem products to be “drugs” under this definition if they are marketed as a treatment for a disease. FDA has issued warning letters to companies marketing cannabis products, including CBD tea and hemp-infused body butter, whose labeling makes these kinds of treatment claims, advising that drugs must undergo the NDA process before they can be marketed in interstate commerce. A manufacturer or seller of one of these products can remedy the issue by submitting an NDA and obtaining FDA approval to market its product as a drug, or by removing the claims. Medical Research To obtain approval for a new drug or biologic, sponsors must conduct research, including clinical trials on human subjects, to generate the required evidence regarding the drug’s safety and effectiveness. Before conducting research with marijuana, a researcher must obtain a DEA registration and an FDA authorization of an investigational new drug application (IND) containing details on how the researcher plans to conduct the study. Then, the researcher must use marijuana from a DEA-registered source. Generally, rescheduling a drug from Schedule I to Schedule III loosens the controls on medical research involving that drug. Researchers and manufacturers of Schedule III substances are subject to less-onerous registration requirements than researchers and manufacturers of Schedule I substances. However, medical researchers and drug sponsors of marijuana or CBD containing drugs would not benefit from these looser restrictions associated with rescheduling without congressional action. In 2022, Congress passed the Medical Marijuana and Cannabidiol Research Expansion Act (P.L. 117-215), which amended the CSA for medical research involving marijuana or CBD to lessen the stringent controls typically applicable for Schedule I substances. The act created separate requirements for marijuana researchers and manufacturers Congressional Research Service 4 to expedite registration with the DEA, and these separate requirements would not be affected by rescheduling without additional congressional action. What would change if marijuana was changed from a schedule I drug to a schedule III drug?
Answer in a single sentence. Use only the document as your source.
According to this document, how many patients with COVID-19 had a history of stroke?
**COVID-19 and Stroke Incidence** Coronavirus disease 2019 (COVID-19) has been declared a pandemic for two years already.1,2 As of July 2022, more than 575 million people have been infected, of which around 6.39 million have died.3 Although its case fatality rate of »2% is lower compared to past influenza pandemics, its highly transmissible nature strains the health care systems leading to significant increases in mortalities and unfavorable morbidities even in highly urbanized countries.1,4 With the appearance of delta and other variants, the devastation induced by COVID-19 is not likely to end soon. While most COVID-19 patients present in the hospital with respiratory symptoms, other organ systems may also be affected.5,6 Around 0.8-6% will develop stroke among COVID-19 patients, while 2-3% of admitted stroke patients will harbor severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) infection.7,8 These COVID-19 stroke patients have twice the risk of death and they have 20% more risk of having a moderate disability compared to patients with COVID-19 only.9 Nevertheless, COVID19 stroke patients were usually older and had similar risk factors as those patients with stroke alone, implying that the usual determinants for stroke may be the ones responsible for these increased risks and not COVID-19.1,7,9 However, in smaller case series and cross-sectional studies, COVID-19 patients with stroke were younger, with a cryptogenic type of stroke, and with no identifiable risk factors compared to those without COVID-19.9,10 Since SARS-CoV-2 infection affects organ systems by inducing thrombosis secondary to a hypercoagulable state, the incidence of stroke, especially the ischemic type, may plausibly be increased in COVID-19.1012 While most large studies about the possible association of COVID-19 and stroke were done in high-income countries, only one study with a small sample size have been done in low- to middle-income countries (LMIC) like the Philippines.13 Developed countries have more organized and advanced health care systems and reliable national insurance services; hence, the incidence of stroke, its risk factors and mortality rate among COVID-19 patients may not be comparable to the true situation in LMIC.6,8 A recently concluded nationwide multicenter, comparative, retrospective cohort study was conducted from February to December 2020 to identify the different neurologic manifestations of COVID-19 in the Philippines.6 A total of 10,881 reverse transcriptase-polymerase chain reaction (RT-PCR) confirmed COVID-19 cases were collected.6 Our main objectives were a) to determine the risk factors of stroke among hospitalized COVID19 patients in the Philippines, b) to determine the possible association between these risk factors and stroke among the same cohort, and c) to determine if there is an association between mortality and stroke in this same group. Methodology Study design The data analyzed in this study were obtained from a previously published nationwide retrospective cohort study that identified the different neurologic manifestations of COVID-19 in the Philippines.6 Inclusion and exclusion criteria RT-PCR-confirmed adult COVID-19 patients, more than 18 years of age, with final hospital disposition, were included in the study. Those with pneumonia caused by other etiologies other than SARS-CoV-2 were excluded. A complete enumeration of all patients fulfilling these criteria, who were admitted to the hospitals from February until December 2020, was performed. The definition of neurological symptoms was based on the previously published protocol.6 A patient who developed focal sensory or motor deficit confirmed by either cranial computed tomography (CT) scan or magnetic resonance imaging (MRI) were recorded as a stroke patient, as seen on chart review. The imaging was the basis for classifying the patient as either infarct or hemorrhagic stroke. COVID-19 stroke patients comprised the cases while COVID-19 only patients constituted the control group. Study site Data collection was done in 37 referral hospitals for COVID-19. Identification of these sites and other information regarding methods for data collection were described in the published protocol.6 Study investigators This is a part of the Philippine CORONA Study which aimed to determine the incidence of the different neurological diseases and their association with different risk factors and outcomes in a large cohort of COVID-19 patients. This was headed by four steering committee members with 37 study site teams, of which the principal investigators were all neurologists.6 2 R.D.G. JAMORA ET AL. Data collection The method of data collection has already been published.6 In brief, all COVID-19 confirmed admissions with disposition (discharged or deceased) at the time of data collection were included in the study. A pre-made detailed abstraction form containing the variables of interest was filled out by the field physician by chart review. Possible risk factors for stroke or increased COVID-19 severity such as age, sex, smoking, hypertension, diabetes mellitus (DM), heart failure, coronary artery disease, chronic obstructive pulmonary disease (COPD), bronchial asthma, chronic kidney disease, liver disease, obesity, malignancy, and human immunodeficiency virus infection was obtained. For stroke, the neurologic symptoms and final diagnosis during admission, and different outcome measures like the severity of the disability, intensive care unit (ICU) admission, duration from admission to final disposition, mortality status, and final disposition were included in the form. Abstraction forms were then assessed for validity and inconsistencies before they were de-identified, encoded, and collated per hospital and sent to the Steering Committee of the Philippine CORONA study. Data analysis Age was presented as mean, while categorical data were presented as proportions. Standard deviation was used as measure of dispersion. Means and proportions were tested for significance using unpaired t-test and test of two proportions, respectively. Prevalence ratio, defined as the ratio of the proportion of patients with a particular risk factor in COVID-19 stroke patients divided by the proportion of patients with the same risk factor among COVID-19 only patients were computed separately. These were used as estimates of relative risks. The incidence of stroke among patients with COVID-19 was computed by dividing the number of stroke patients by the population (n = 10,881). Likewise, the incidence of different outcome measures like mortality, disability, and intensive care unit (ICU) admission in both COVID-19 stroke patients and COVID-19 patients only were obtained by dividing the number of each of these outcome measures by the number of patients who developed stroke and those who did not, respectively. Subsequently, relative risks were computed by dividing the incidence of each outcome measure among COVID-19 stroke patients by the incidence of outcome measure among those with COVID-19 patients only. To determine the association between stroke and different risk factors; and the different outcome measures and stroke among COVID-19 patients, a univariate logistic regression was done. Stroke and outcome measures were used as dependent variables separately, while risk factors for stroke, and stroke were used as their independent variables, respectively. An extended Cox proportional hazard survival analysis was also done using mortality status as the failure event and the duration from admission to either censoring or failure as survival time. Significant risk factors identified in the logistic regression was used as the predictor variables with presence of stroke as the focus. Since the presence of stroke was a time dependent variable based on the usage of scaled and unscaled Schoenfield residuals, an extended Cox model was used. All data were captured and analyzed using Stata Pro BE 17, with alpha set at < 0.05 as indicator of significance. Results Baseline characteristics There were 10,881 RT-PCR confirmed COVID-19 cases included in the Philippine CORONA Study. The patients were mostly males (n = 5780, 53.1%), with history of neurological disorder (n = 7560, 69.5%), with hypertension (n = 3647, 33.5%), and DM (n = 2191, 20.1%). Only 321 patients with COVID-19 (3%) had a history of stroke. The overall incidence of stroke among COVID-19 patients was 3.4% (n = 367). Of these, 262 (71.4%) had acute ischemic stroke (AIS) and 101 (27.5%) had acute hemorrhagic stroke (AHS). The incidence of AIS and AHS were 2.4% and 0.9%, respectively. A total of 1697 COVID-19 patients (15.6%) died due to various etiologies. Most patients who had neurologic symptoms were stable but had persistent deficits at discharge (71.7%). Only 1751 patients (16%) were admitted to the ICU primarily due to acute respiratory failure.
[Query] ================== According to this document, how many patients with COVID-19 had a history of stroke? ================ [Task] ================== Answer in a single sentence. Use only the document as your source. ================ [Text Passage] ================== **COVID-19 and Stroke Incidence** Coronavirus disease 2019 (COVID-19) has been declared a pandemic for two years already.1,2 As of July 2022, more than 575 million people have been infected, of which around 6.39 million have died.3 Although its case fatality rate of »2% is lower compared to past influenza pandemics, its highly transmissible nature strains the health care systems leading to significant increases in mortalities and unfavorable morbidities even in highly urbanized countries.1,4 With the appearance of delta and other variants, the devastation induced by COVID-19 is not likely to end soon. While most COVID-19 patients present in the hospital with respiratory symptoms, other organ systems may also be affected.5,6 Around 0.8-6% will develop stroke among COVID-19 patients, while 2-3% of admitted stroke patients will harbor severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) infection.7,8 These COVID-19 stroke patients have twice the risk of death and they have 20% more risk of having a moderate disability compared to patients with COVID-19 only.9 Nevertheless, COVID19 stroke patients were usually older and had similar risk factors as those patients with stroke alone, implying that the usual determinants for stroke may be the ones responsible for these increased risks and not COVID-19.1,7,9 However, in smaller case series and cross-sectional studies, COVID-19 patients with stroke were younger, with a cryptogenic type of stroke, and with no identifiable risk factors compared to those without COVID-19.9,10 Since SARS-CoV-2 infection affects organ systems by inducing thrombosis secondary to a hypercoagulable state, the incidence of stroke, especially the ischemic type, may plausibly be increased in COVID-19.1012 While most large studies about the possible association of COVID-19 and stroke were done in high-income countries, only one study with a small sample size have been done in low- to middle-income countries (LMIC) like the Philippines.13 Developed countries have more organized and advanced health care systems and reliable national insurance services; hence, the incidence of stroke, its risk factors and mortality rate among COVID-19 patients may not be comparable to the true situation in LMIC.6,8 A recently concluded nationwide multicenter, comparative, retrospective cohort study was conducted from February to December 2020 to identify the different neurologic manifestations of COVID-19 in the Philippines.6 A total of 10,881 reverse transcriptase-polymerase chain reaction (RT-PCR) confirmed COVID-19 cases were collected.6 Our main objectives were a) to determine the risk factors of stroke among hospitalized COVID19 patients in the Philippines, b) to determine the possible association between these risk factors and stroke among the same cohort, and c) to determine if there is an association between mortality and stroke in this same group. Methodology Study design The data analyzed in this study were obtained from a previously published nationwide retrospective cohort study that identified the different neurologic manifestations of COVID-19 in the Philippines.6 Inclusion and exclusion criteria RT-PCR-confirmed adult COVID-19 patients, more than 18 years of age, with final hospital disposition, were included in the study. Those with pneumonia caused by other etiologies other than SARS-CoV-2 were excluded. A complete enumeration of all patients fulfilling these criteria, who were admitted to the hospitals from February until December 2020, was performed. The definition of neurological symptoms was based on the previously published protocol.6 A patient who developed focal sensory or motor deficit confirmed by either cranial computed tomography (CT) scan or magnetic resonance imaging (MRI) were recorded as a stroke patient, as seen on chart review. The imaging was the basis for classifying the patient as either infarct or hemorrhagic stroke. COVID-19 stroke patients comprised the cases while COVID-19 only patients constituted the control group. Study site Data collection was done in 37 referral hospitals for COVID-19. Identification of these sites and other information regarding methods for data collection were described in the published protocol.6 Study investigators This is a part of the Philippine CORONA Study which aimed to determine the incidence of the different neurological diseases and their association with different risk factors and outcomes in a large cohort of COVID-19 patients. This was headed by four steering committee members with 37 study site teams, of which the principal investigators were all neurologists.6 2 R.D.G. JAMORA ET AL. Data collection The method of data collection has already been published.6 In brief, all COVID-19 confirmed admissions with disposition (discharged or deceased) at the time of data collection were included in the study. A pre-made detailed abstraction form containing the variables of interest was filled out by the field physician by chart review. Possible risk factors for stroke or increased COVID-19 severity such as age, sex, smoking, hypertension, diabetes mellitus (DM), heart failure, coronary artery disease, chronic obstructive pulmonary disease (COPD), bronchial asthma, chronic kidney disease, liver disease, obesity, malignancy, and human immunodeficiency virus infection was obtained. For stroke, the neurologic symptoms and final diagnosis during admission, and different outcome measures like the severity of the disability, intensive care unit (ICU) admission, duration from admission to final disposition, mortality status, and final disposition were included in the form. Abstraction forms were then assessed for validity and inconsistencies before they were de-identified, encoded, and collated per hospital and sent to the Steering Committee of the Philippine CORONA study. Data analysis Age was presented as mean, while categorical data were presented as proportions. Standard deviation was used as measure of dispersion. Means and proportions were tested for significance using unpaired t-test and test of two proportions, respectively. Prevalence ratio, defined as the ratio of the proportion of patients with a particular risk factor in COVID-19 stroke patients divided by the proportion of patients with the same risk factor among COVID-19 only patients were computed separately. These were used as estimates of relative risks. The incidence of stroke among patients with COVID-19 was computed by dividing the number of stroke patients by the population (n = 10,881). Likewise, the incidence of different outcome measures like mortality, disability, and intensive care unit (ICU) admission in both COVID-19 stroke patients and COVID-19 patients only were obtained by dividing the number of each of these outcome measures by the number of patients who developed stroke and those who did not, respectively. Subsequently, relative risks were computed by dividing the incidence of each outcome measure among COVID-19 stroke patients by the incidence of outcome measure among those with COVID-19 patients only. To determine the association between stroke and different risk factors; and the different outcome measures and stroke among COVID-19 patients, a univariate logistic regression was done. Stroke and outcome measures were used as dependent variables separately, while risk factors for stroke, and stroke were used as their independent variables, respectively. An extended Cox proportional hazard survival analysis was also done using mortality status as the failure event and the duration from admission to either censoring or failure as survival time. Significant risk factors identified in the logistic regression was used as the predictor variables with presence of stroke as the focus. Since the presence of stroke was a time dependent variable based on the usage of scaled and unscaled Schoenfield residuals, an extended Cox model was used. All data were captured and analyzed using Stata Pro BE 17, with alpha set at < 0.05 as indicator of significance. Results Baseline characteristics There were 10,881 RT-PCR confirmed COVID-19 cases included in the Philippine CORONA Study. The patients were mostly males (n = 5780, 53.1%), with history of neurological disorder (n = 7560, 69.5%), with hypertension (n = 3647, 33.5%), and DM (n = 2191, 20.1%). Only 321 patients with COVID-19 (3%) had a history of stroke. The overall incidence of stroke among COVID-19 patients was 3.4% (n = 367). Of these, 262 (71.4%) had acute ischemic stroke (AIS) and 101 (27.5%) had acute hemorrhagic stroke (AHS). The incidence of AIS and AHS were 2.4% and 0.9%, respectively. A total of 1697 COVID-19 patients (15.6%) died due to various etiologies. Most patients who had neurologic symptoms were stable but had persistent deficits at discharge (71.7%). Only 1751 patients (16%) were admitted to the ICU primarily due to acute respiratory failure.
<TASK DESCRIPTION> Only use the provided text to answer the question, no outside sources. <QUESTION> [user request] <TEXT> [context document]
Examine the dual influence of technological innovation and political diplomacy in shaping the design and use of rooms s-116 and s-117 in the senate foreign relations Committee suite. In your response, connect the symbolic contribution of both robert and benjamin to at least two major us foreign policies debated in the room. Additionally, analyze how frescoes depicting their legaixes impacted both domestic and international legislative decisions; do not mention any historical event that occurred before 1840; and ensure that every sentence references a different artistic or architectural feature if the suite
The U.S. SenaTe Foreign relaTionS CommiTTee SUiTe The U.S. SenaTe Foreign relaTionS Committee The Senate Committee on Foreign Relations was established in 1816 as one of the original eleven permanent standing committees of the Senate. Throughout its history, the Foreign Relations Committee has been instrumental in developing The Senate Foreign Relations Committee Room (S-116) and influencing U.S. foreign policy. The committee tee considers, debates, and negotiates important treaties and legislation that support the national interest. It also holds jurisdiction over all democratic nominations. Through these powers, the committee has helped shape foreign policy of broad significance in matters of war and peace and international relations. The committee receives honored guests and con- ducts official business in its historic, two-room suite, located in the northeast corner of the Senate extension, built between 1851 and 1868. History Like many Senate spaces in the Capitol, S-116 and S-117 have served many different committees and offices. The first known use of S-116 was as the Senate folding room. It was here that publications were stored and where clerks prepared documents, bills, and speeches for distribution. Eventually this service was transferred to the Government printing ing Office. The Senate Committee on Patents, which held jurisdiction over patents and patent law, moved into S-116 in the 1870s. It was during the Patent Committee’s nearly two-decade occu- pancy of the room that artist Constantino Brumidi executed the fresco of American innovator Robert Fulton above the entrance to the committee room. Robert Fulton depicted in the lunette over S-116, then used by the Committee on Patents from 1872-1895 This follows a precedent applied throughout the Capitol’s corridors of relating the figurative murals to the achievements or work of the committee in the nearby room. The fresco above the door to S-116 depicts Fulton with his left hand resting on mechanical diagrams and his right hand gesturing ing towards a steamboat traveling the Hudson River—references to Fulton’s success at harnessing steam engine technology to create the first viable commercial steamboat service in the early 19th century. Brumidi incorporated emblems representing ing science, agriculture, navigation, and the arts on the ceiling in the spacious lobby outside S-116, known as the Patent Corridor. The original occupant of S-117 was the Senate Committee on Post-Offices and Post-Roads. To recognize this committee, Brumidi painted a fresco above the room’s entrance depicting Benjamin Franklin, the first postmaster general, surrounded by his inventions. The Retrenchment Committee using S-116 The two rooms, S-116 and S-117, continued to serve separate purposes until 1931. Occupants of the rooms reflected the concerns of a growing nation, including the committees on Retrenchmentment, Patents, Agriculture, Immigration, Territories, Female Suffrage, and Naval Affairs. In 1931, S-116 and S-117 became associated as a suite to accommodate the needs of the Naval Affairs Committee. Shortly after, in 1933, the Committee on Foreign Relations moved into the two-room suite, an assignment it retains to this day. While the Foreign Relations Com- mittee maintains several offices throughout the Capitol complex, the two rooms in the Capitol have become symbolic of the committee and its notable diplomatic work. Occupancy The following occupancy lists are compiled from a variety of resources, including architectural plans, guidebooks, contemporary records, and the annual directory of the United States Congress— first published in 1869. S–116 1869 Senate Folding Room 1870-1871 Committee on Retrenchment 1872-1881 Committee on Patents 1882-1884 Committee on Patents and Committee on Female Suffrage 1885-1895 Committee on Patents 1896-1914 Senate Post-Office 1915 Committee on Agriculture and Forestry 1916 Committee on Contingent Expenses 1917 Committee on Industrial Expositions 1918-1924 Committee on Immigration 1925 Committee on Territories 1926-1928 Committee on Territories and Insular Possessions 1929-1930 Committee on Printing 1931-1932 Committee on Naval Affairs 1933-present Committee on Foreign Relations S–117 1869-1895 Committee on Post-Offices and Post-Roads 1896-1901 Committee on Foreign Relations 1902-1909 Committee on Printing 1910-1914 Committee on Agriculture and Forestry 1915 Committee on the Library 1915-1917 Committee on Agriculture and Forestry 1918-1920 Committee on Census 1921-1923 Committee on Enrolled Bills 1924-1932 Committee on Naval Affairs 1933-present Committee on Foreign Relations Decorative Highlights The Senate extension and its companion House extension, designed by Thomas U. Walter and built by Montgomery C. Meigs, were meant to inspire visitors to reflect upon the Capitol as a symbol of American democracy and to showcase case the nation’s accomplishments, resources, and wealth. To this end, the extensions featured elaborate wall and ceiling murals, as well as the finest workmanship, the most exquisite building materials, and the latest technologies. Offices boasted high vaulted ceilings, ornamental cast-iron door and window frames, interior wood shutters, carved marble mantels, and marble baseboards, in addition to unique decorative details. Colorful floor tiles from Minton, Hollins & Company of England were used throughout to enliven spaces and add pattern. Accompanying this architectural grandeur, ventilation, heating, water closets, and gas lighting provided valuable comfort to the occupants. The central floor medallion in S-116 Natural light floods S-117 through the four generously ously proportioned windows. Today, the corner room’s windows offer views north to Union Station and east to the Supreme Court building. Ornamental bands of stylized leaves decorate the arched cast-iron window and door frames. The room retains its original marble mantel, crowned by a gilded Neoclassical Revival mirror whose frame features a prominent cornice with bead-and-reel and egg-and-dart ornaments, fluted pilasters, and acan—thus leaves that delicately wrap around the corners of the frame. Aside from the windows, the room is lit by a central crystal chandelier and four inverted crystal tal cone pendants The mantel and mirror in S-117 lights, and eight sconces installed on the window frames. The pendant lights were added in the 1960s and were designed to integrate with the committee room’s existing 19th-century chandelier and sconces. While not the original light fixtures, the chandelier and sconces are early 20th-century pieces reminiscent of new, vibrant chandeliers that were appearing in Senate spaces at the time. The newly constructed 1909 Senate Russell Office Buildinging’s committee rooms sparkled with silver and crystal fixtures, and in 1910, seven striking crystal chandeliers acquired from the White House were installed in the Capitol. These bright, vivid lights offered a welcome contrast to the darker, dull metal ones that hung in most extension spaces, so silver and crystal chandeliers were purchased for many Capitol offices. The painted decoration on the ceiling in S-117 emphasizes the architectural vault lines and dates from the turn of the 20th century, when a comprehensive decorative campaign for the Capitol was implemented. While some of the colors have changed with repainting over the years, the style of ornamentation holds true to the original design. Room S-116, which was first used as the folding ing room, was probably very plainly decorated. Initially, there were not even fireplaces. The two existing marble mantels were presumably installed in 1872, when the prominent Committee on Pensions was assigned the room. The Rococo Revival mirrors that rest on the mantels feature a central cartouche, scrolls, stylized leaves, and flowers. The decorative painted banding on the ceiling in S-116 probably dates to sometime after 1900 and is documented in images as early as 1946. The impressive, obround-shaped committee table fills the room and accommodates every current member of the committee. Each senator has an assigned seat, marked by an engraved brass name- plate. A bronze bust of Cordell Hull by George Conlon oversees the activities of the Foreign Rela- tions Committee from the central window well. Hull’s commemoration in the Foreign Relations Committee Room is fitting given his work as secretary of state, promoting peace and international alliances, and establishing the United Nations.
<TASK DESCRIPTION> Only use the provided text to answer the question, no outside sources. <QUESTION> Examine the dual influence of technological innovation and political diplomacy in shaping the design and use of rooms s-116 and s-117 in the senate foreign relations Committee suite. In your response, connect the symbolic contribution of both robert and benjamin to at least two major us foreign policies debated in the room. Additionally, analyze how frescoes depicting their legaixes impacted both domestic and international legislative decisions; do not mention any historical event that occurred before 1840; and ensure that every sentence references a different artistic or architectural feature if the suite <TEXT> The U.S. SenaTe Foreign relaTionS CommiTTee SUiTe The U.S. SenaTe Foreign relaTionS Committee The Senate Committee on Foreign Relations was established in 1816 as one of the original eleven permanent standing committees of the Senate. Throughout its history, the Foreign Relations Committee has been instrumental in developing The Senate Foreign Relations Committee Room (S-116) and influencing U.S. foreign policy. The committee tee considers, debates, and negotiates important treaties and legislation that support the national interest. It also holds jurisdiction over all democratic nominations. Through these powers, the committee has helped shape foreign policy of broad significance in matters of war and peace and international relations. The committee receives honored guests and con- ducts official business in its historic, two-room suite, located in the northeast corner of the Senate extension, built between 1851 and 1868. History Like many Senate spaces in the Capitol, S-116 and S-117 have served many different committees and offices. The first known use of S-116 was as the Senate folding room. It was here that publications were stored and where clerks prepared documents, bills, and speeches for distribution. Eventually this service was transferred to the Government printing ing Office. The Senate Committee on Patents, which held jurisdiction over patents and patent law, moved into S-116 in the 1870s. It was during the Patent Committee’s nearly two-decade occu- pancy of the room that artist Constantino Brumidi executed the fresco of American innovator Robert Fulton above the entrance to the committee room. Robert Fulton depicted in the lunette over S-116, then used by the Committee on Patents from 1872-1895 This follows a precedent applied throughout the Capitol’s corridors of relating the figurative murals to the achievements or work of the committee in the nearby room. The fresco above the door to S-116 depicts Fulton with his left hand resting on mechanical diagrams and his right hand gesturing ing towards a steamboat traveling the Hudson River—references to Fulton’s success at harnessing steam engine technology to create the first viable commercial steamboat service in the early 19th century. Brumidi incorporated emblems representing ing science, agriculture, navigation, and the arts on the ceiling in the spacious lobby outside S-116, known as the Patent Corridor. The original occupant of S-117 was the Senate Committee on Post-Offices and Post-Roads. To recognize this committee, Brumidi painted a fresco above the room’s entrance depicting Benjamin Franklin, the first postmaster general, surrounded by his inventions. The Retrenchment Committee using S-116 The two rooms, S-116 and S-117, continued to serve separate purposes until 1931. Occupants of the rooms reflected the concerns of a growing nation, including the committees on Retrenchmentment, Patents, Agriculture, Immigration, Territories, Female Suffrage, and Naval Affairs. In 1931, S-116 and S-117 became associated as a suite to accommodate the needs of the Naval Affairs Committee. Shortly after, in 1933, the Committee on Foreign Relations moved into the two-room suite, an assignment it retains to this day. While the Foreign Relations Com- mittee maintains several offices throughout the Capitol complex, the two rooms in the Capitol have become symbolic of the committee and its notable diplomatic work. Occupancy The following occupancy lists are compiled from a variety of resources, including architectural plans, guidebooks, contemporary records, and the annual directory of the United States Congress— first published in 1869. S–116 1869 Senate Folding Room 1870-1871 Committee on Retrenchment 1872-1881 Committee on Patents 1882-1884 Committee on Patents and Committee on Female Suffrage 1885-1895 Committee on Patents 1896-1914 Senate Post-Office 1915 Committee on Agriculture and Forestry 1916 Committee on Contingent Expenses 1917 Committee on Industrial Expositions 1918-1924 Committee on Immigration 1925 Committee on Territories 1926-1928 Committee on Territories and Insular Possessions 1929-1930 Committee on Printing 1931-1932 Committee on Naval Affairs 1933-present Committee on Foreign Relations S–117 1869-1895 Committee on Post-Offices and Post-Roads 1896-1901 Committee on Foreign Relations 1902-1909 Committee on Printing 1910-1914 Committee on Agriculture and Forestry 1915 Committee on the Library 1915-1917 Committee on Agriculture and Forestry 1918-1920 Committee on Census 1921-1923 Committee on Enrolled Bills 1924-1932 Committee on Naval Affairs 1933-present Committee on Foreign Relations Decorative Highlights The Senate extension and its companion House extension, designed by Thomas U. Walter and built by Montgomery C. Meigs, were meant to inspire visitors to reflect upon the Capitol as a symbol of American democracy and to showcase case the nation’s accomplishments, resources, and wealth. To this end, the extensions featured elaborate wall and ceiling murals, as well as the finest workmanship, the most exquisite building materials, and the latest technologies. Offices boasted high vaulted ceilings, ornamental cast-iron door and window frames, interior wood shutters, carved marble mantels, and marble baseboards, in addition to unique decorative details. Colorful floor tiles from Minton, Hollins & Company of England were used throughout to enliven spaces and add pattern. Accompanying this architectural grandeur, ventilation, heating, water closets, and gas lighting provided valuable comfort to the occupants. The central floor medallion in S-116 Natural light floods S-117 through the four generously ously proportioned windows. Today, the corner room’s windows offer views north to Union Station and east to the Supreme Court building. Ornamental bands of stylized leaves decorate the arched cast-iron window and door frames. The room retains its original marble mantel, crowned by a gilded Neoclassical Revival mirror whose frame features a prominent cornice with bead-and-reel and egg-and-dart ornaments, fluted pilasters, and acan—thus leaves that delicately wrap around the corners of the frame. Aside from the windows, the room is lit by a central crystal chandelier and four inverted crystal tal cone pendants The mantel and mirror in S-117 lights, and eight sconces installed on the window frames. The pendant lights were added in the 1960s and were designed to integrate with the committee room’s existing 19th-century chandelier and sconces. While not the original light fixtures, the chandelier and sconces are early 20th-century pieces reminiscent of new, vibrant chandeliers that were appearing in Senate spaces at the time. The newly constructed 1909 Senate Russell Office Buildinging’s committee rooms sparkled with silver and crystal fixtures, and in 1910, seven striking crystal chandeliers acquired from the White House were installed in the Capitol. These bright, vivid lights offered a welcome contrast to the darker, dull metal ones that hung in most extension spaces, so silver and crystal chandeliers were purchased for many Capitol offices. The painted decoration on the ceiling in S-117 emphasizes the architectural vault lines and dates from the turn of the 20th century, when a comprehensive decorative campaign for the Capitol was implemented. While some of the colors have changed with repainting over the years, the style of ornamentation holds true to the original design. Room S-116, which was first used as the folding ing room, was probably very plainly decorated. Initially, there were not even fireplaces. The two existing marble mantels were presumably installed in 1872, when the prominent Committee on Pensions was assigned the room. The Rococo Revival mirrors that rest on the mantels feature a central cartouche, scrolls, stylized leaves, and flowers. The decorative painted banding on the ceiling in S-116 probably dates to sometime after 1900 and is documented in images as early as 1946. The impressive, obround-shaped committee table fills the room and accommodates every current member of the committee. Each senator has an assigned seat, marked by an engraved brass name- plate. A bronze bust of Cordell Hull by George Conlon oversees the activities of the Foreign Rela- tions Committee from the central window well. Hull’s commemoration in the Foreign Relations Committee Room is fitting given his work as secretary of state, promoting peace and international alliances, and establishing the United Nations. https://www.senate.gov/art-artifacts/publications/pdf/room-foreign-relations.pdf
Only consider the following text in your answer. Format your answer into between 10 and 15 bullet points.
Please summarize this information for a person not familiar with advertising or business models.
In this paper, we provide a generalizable distribution of television advertising elasticities for established products that can serve as a prior distribution for firms and researchers. Providing generalizable estimates of TV advertising effects necessitates transparent and replicable estimation methods and an a priori relevant population of products. Our analy- sis is based on a sample of 288 large, national CPG brands that are selected using a clear research protocol, and our data sources (Nielsen Ad Intel and RMS scanner data) are widely used by marketing managers and academic researchers. We find that the median of the distribution of estimated long-run advertising elasticities is between 0.0085 and 0.0142, and the corresponding mean is between 0.0098 and 0.0261. We draw two main lessons from these results. First, the estimated advertising elastic- ities are small, and two thirds of the estimates are not statistically distinguishable from zero. The estimates are also economically small, in the sense that more than 80% of all brands have a negative ROI of advertising at the margin. The estimates are roughly half the size of the most comparable prior study, Lodish et al. (1995), which used data from the 1980s. This difference is consistent with an overall decline in TV advertising effectiveness over the last three decades. Second, our results are robust. In particular, across a wide range of specifications, the overall distribution of advertising elasticities is stable. Due to this fact, together with the institutional details of the ad buying process that underlie our identification strategy, it appears implausible that our results are affected by any remaining confounds. Our results have important positive and normative implications. A central finding is the over-investment in advertising for more than 80% of brands, a significant misalloca- tion of resources by firms. Our data are identical to the commercially available data used by firms, and hence it is unlikely that firms observe larger advertising effects because of access to alternative data sources. This raises an economic puzzle. Why do firms spend billions of dollars on TV advertising each year if the return is negative? There are sev- eral possible explanations. First, agency issues, in particular career concerns, may lead managers (or consultants) to overstate the effectiveness of advertising if they expect to lose their jobs if their advertising campaigns are revealed to be unprofitable. Second, an incorrect prior (i.e. conventional wisdom that advertising is typically effective) may lead a decision maker to rationally shrink the estimated advertising effect from their data to an incorrect, inflated prior mean. Third, the estimated advertising effects may be inflated if confounding factors are not adequately adjusted for. The last two explanations do not as- sume irrational behavior, but may simply represent a cost of conducting causal inference 23 to acquire accurate information on the effect of advertising. We view this explanation as plausible given that unified, formal approaches to causal inference have only recently been widely adopted. These proposed explanations are not mutually exclusive. In par- ticular, agency issues may be exacerbated if the general effectiveness of advertising or a specific advertising effect estimate is overstated.13 While we cannot conclusively point to these explanations as the source of the documented over-investment in advertising, our discussions with managers and industry insiders suggest that these may be contributing factors. This brings us back to a key motivating question for this research, the long-run viabil- ity of traditional media markets. The documented over-investment in advertising suggests a threat to the survival of media markets in their current form, once knowledge about the small degree of TV advertising effectiveness becomes common knowledge. But our results also indicate that for a substantial number of brands (34% based on the point estimates), the observed advertising schedules are valuable compared to the counterfactual of no ad- vertising. There is a large degree of statistical uncertainty about the exact ROIs, and only for 12% of brands the predicted ROIs from the observed advertising schedules are positive and statistically different from zero. This suggests a large option value from adopting im- proved methods or research designs, such as A/B tests, to estimate the causal effect and ROI of advertising. Our results also do not foreclose the possibility that advertising can be profitable with alternative scheduling, targeting, or advertising copy strategies. The rise of addressable television, in particular, should allow advertisers and researchers to experiment with individual level targeting in the future. These approaches for improving advertising measurement, scheduling, and targeting may well ensure the long-run viability of media markets. While improvements in targeting technology may theoretically increase the potential for higher advertising returns, they do not solve the underlying agency problems that allow sub-optimal advertising decisions to persist in the traditional TV advertising model we evaluate in this paper. Together with past research documenting similar results in digital advertising markets (Blake et al. 2015; Lewis and Rao 2015), our work should motivate economists to further study the managerial and agency issues in advertising markets.
Only consider the following text in your answer. Format your answer into between 10 and 15 bullet points. In this paper, we provide a generalizable distribution of television advertising elasticities for established products that can serve as a prior distribution for firms and researchers. Providing generalizable estimates of TV advertising effects necessitates transparent and replicable estimation methods and an a priori relevant population of products. Our analy- sis is based on a sample of 288 large, national CPG brands that are selected using a clear research protocol, and our data sources (Nielsen Ad Intel and RMS scanner data) are widely used by marketing managers and academic researchers. We find that the median of the distribution of estimated long-run advertising elasticities is between 0.0085 and 0.0142, and the corresponding mean is between 0.0098 and 0.0261. We draw two main lessons from these results. First, the estimated advertising elastic- ities are small, and two thirds of the estimates are not statistically distinguishable from zero. The estimates are also economically small, in the sense that more than 80% of all brands have a negative ROI of advertising at the margin. The estimates are roughly half the size of the most comparable prior study, Lodish et al. (1995), which used data from the 1980s. This difference is consistent with an overall decline in TV advertising effectiveness over the last three decades. Second, our results are robust. In particular, across a wide range of specifications, the overall distribution of advertising elasticities is stable. Due to this fact, together with the institutional details of the ad buying process that underlie our identification strategy, it appears implausible that our results are affected by any remaining confounds. Our results have important positive and normative implications. A central finding is the over-investment in advertising for more than 80% of brands, a significant misalloca- tion of resources by firms. Our data are identical to the commercially available data used by firms, and hence it is unlikely that firms observe larger advertising effects because of access to alternative data sources. This raises an economic puzzle. Why do firms spend billions of dollars on TV advertising each year if the return is negative? There are sev- eral possible explanations. First, agency issues, in particular career concerns, may lead managers (or consultants) to overstate the effectiveness of advertising if they expect to lose their jobs if their advertising campaigns are revealed to be unprofitable. Second, an incorrect prior (i.e. conventional wisdom that advertising is typically effective) may lead a decision maker to rationally shrink the estimated advertising effect from their data to an incorrect, inflated prior mean. Third, the estimated advertising effects may be inflated if confounding factors are not adequately adjusted for. The last two explanations do not as- sume irrational behavior, but may simply represent a cost of conducting causal inference 23 to acquire accurate information on the effect of advertising. We view this explanation as plausible given that unified, formal approaches to causal inference have only recently been widely adopted. These proposed explanations are not mutually exclusive. In par- ticular, agency issues may be exacerbated if the general effectiveness of advertising or a specific advertising effect estimate is overstated.13 While we cannot conclusively point to these explanations as the source of the documented over-investment in advertising, our discussions with managers and industry insiders suggest that these may be contributing factors. This brings us back to a key motivating question for this research, the long-run viabil- ity of traditional media markets. The documented over-investment in advertising suggests a threat to the survival of media markets in their current form, once knowledge about the small degree of TV advertising effectiveness becomes common knowledge. But our results also indicate that for a substantial number of brands (34% based on the point estimates), the observed advertising schedules are valuable compared to the counterfactual of no ad- vertising. There is a large degree of statistical uncertainty about the exact ROIs, and only for 12% of brands the predicted ROIs from the observed advertising schedules are positive and statistically different from zero. This suggests a large option value from adopting im- proved methods or research designs, such as A/B tests, to estimate the causal effect and ROI of advertising. Our results also do not foreclose the possibility that advertising can be profitable with alternative scheduling, targeting, or advertising copy strategies. The rise of addressable television, in particular, should allow advertisers and researchers to experiment with individual level targeting in the future. These approaches for improving advertising measurement, scheduling, and targeting may well ensure the long-run viability of media markets. While improvements in targeting technology may theoretically increase the potential for higher advertising returns, they do not solve the underlying agency problems that allow sub-optimal advertising decisions to persist in the traditional TV advertising model we evaluate in this paper. Together with past research documenting similar results in digital advertising markets (Blake et al. 2015; Lewis and Rao 2015), our work should motivate economists to further study the managerial and agency issues in advertising markets. Please summarize this information for a person not familiar with advertising or business models.
[question] [user request] ===================== [text] [context document] ===================== [instruction] Answer the question using only the information provided in the context. Do not rely on external knowledge or sources.
I need a thesis statement, fit for a 2nd year undergrad paper, on the potential clinical effects of a training guided by the concept of 'Paideia' on one hand and standard technical training on the other, in no more than 300 words.
In the health area, a habitual behavior is observed among professionals of using knowledge about diseases and treatments (generating authority) over the passivity of those who need care – the patient (perpetuating dependence) – and this marks a strong characteristic of paternalism. For many professionals, it is difficult to assess an individual’s ability to decide on an indication based on clinical and laboratory evaluation. Often, there is still a very strong belief in professional knowledge as sovereign1.Involving patients in decision-making helps professionals ensure that the treatment provided reflects their preferences and values. Ethics, here understood as a reflection on moral and deontological norms and rules and the values that should guide how professionals should behave, is essential to the practice of health care, and respect for patient autonomy is present in the professions’ codes of ethics. Patients must have the exercise of their autonomy fully guaranteed. Thus, all information must be presented, allowing this autonomy to be exercised2-5.It is recommended that professionals make decisions considering clinical, epidemiological, psychosocial and ethical aspects, never forgetting that these complement each other. With this in mind, it is necessary to consider that competencies can be understood as the skills and knowledge that are acquired throughout training. When we talk about healthcare professionals, understanding the user’s role in decision-making is a competency that needs to be acquired by everyone. Thus, we must remember that the logic of training in the dierent specialties in some health courses, such as medicine, nursing and nutrition, including specialization in Nephrology, is focused on the idea of clinical skills, that is, education acts as a teaching guide for including the professionals into the work process, but often it does not work as Paideia (broad, holistic training with cultural identity) and perpetuates the status quo of technical, procedure-centered training5-7.The vision of skills has been changing daily, as the place of study has expanded. As authors have suggested, there is a need for training that understands the reality of the population, and not just the constant identification of diseases and pre-determined treatments. In this sense, providing the training of reflective professionals who are less attentive to the closed content of the disciplines, developing autonomy, focusing on learning to learn and the student’s protagonism, with the aim of creating care practices that go beyond the strict needs of a population that has a specific characteristic, and yes, the look at the extramural scenario that society presents6-7.Most schools that train health specialties rely on educational methods that support technological logic, focusing on imaging and equipment, dispensing with or makinglearning about interpersonal relationships a secondary aspect. The work of the dierent professionals who comprise the team must be orchestrated and aligned, to present a relationship with the user that directs the team’s form and action. The construction of knowledge occurs through collective lines of force, especially when we are talking about health care6,8. When thinking about strategies to improve professional training, we must look at the national curricular guidelines (DCN, Diretrizes Curriculares Nacionais) for undergraduate courses in the health area. Since 2001, the articulation between the training of professionals and the field of health practice has been presented as necessary and essential. The resolutions show the need to promote graduates capable of working in the promotion, prevention, recovery and rehabilitation of health, through generalist, humanist, critical and reflective training to work with quality, competence and respecting the principles of ethics/bioethics, noting that health care goes beyond the technical act of care, requiring the resolution of individual and collective health problems. It is worth noting that the same is expected in the competency matrix for the training of nephrology specialists.
[question] I need a thesis statement, fit for a 2nd year undergrad paper, on the potential clinical effects of a training guided by the concept of 'Paideia' on one hand and standard technical training on the other, in no more than 300 words. ===================== [text] In the health area, a habitual behavior is observed among professionals of using knowledge about diseases and treatments (generating authority) over the passivity of those who need care – the patient (perpetuating dependence) – and this marks a strong characteristic of paternalism. For many professionals, it is difficult to assess an individual’s ability to decide on an indication based on clinical and laboratory evaluation. Often, there is still a very strong belief in professional knowledge as sovereign1.Involving patients in decision-making helps professionals ensure that the treatment provided reflects their preferences and values. Ethics, here understood as a reflection on moral and deontological norms and rules and the values that should guide how professionals should behave, is essential to the practice of health care, and respect for patient autonomy is present in the professions’ codes of ethics. Patients must have the exercise of their autonomy fully guaranteed. Thus, all information must be presented, allowing this autonomy to be exercised2-5.It is recommended that professionals make decisions considering clinical, epidemiological, psychosocial and ethical aspects, never forgetting that these complement each other. With this in mind, it is necessary to consider that competencies can be understood as the skills and knowledge that are acquired throughout training. When we talk about healthcare professionals, understanding the user’s role in decision-making is a competency that needs to be acquired by everyone. Thus, we must remember that the logic of training in the dierent specialties in some health courses, such as medicine, nursing and nutrition, including specialization in Nephrology, is focused on the idea of clinical skills, that is, education acts as a teaching guide for including the professionals into the work process, but often it does not work as Paideia (broad, holistic training with cultural identity) and perpetuates the status quo of technical, procedure-centered training5-7.The vision of skills has been changing daily, as the place of study has expanded. As authors have suggested, there is a need for training that understands the reality of the population, and not just the constant identification of diseases and pre-determined treatments. In this sense, providing the training of reflective professionals who are less attentive to the closed content of the disciplines, developing autonomy, focusing on learning to learn and the student’s protagonism, with the aim of creating care practices that go beyond the strict needs of a population that has a specific characteristic, and yes, the look at the extramural scenario that society presents6-7.Most schools that train health specialties rely on educational methods that support technological logic, focusing on imaging and equipment, dispensing with or makinglearning about interpersonal relationships a secondary aspect. The work of the dierent professionals who comprise the team must be orchestrated and aligned, to present a relationship with the user that directs the team’s form and action. The construction of knowledge occurs through collective lines of force, especially when we are talking about health care6,8. When thinking about strategies to improve professional training, we must look at the national curricular guidelines (DCN, Diretrizes Curriculares Nacionais) for undergraduate courses in the health area. Since 2001, the articulation between the training of professionals and the field of health practice has been presented as necessary and essential. The resolutions show the need to promote graduates capable of working in the promotion, prevention, recovery and rehabilitation of health, through generalist, humanist, critical and reflective training to work with quality, competence and respecting the principles of ethics/bioethics, noting that health care goes beyond the technical act of care, requiring the resolution of individual and collective health problems. It is worth noting that the same is expected in the competency matrix for the training of nephrology specialists. https://www.researchgate.net/publication/384023444_Nephrologist_training_a_bioethical_analysis ===================== [instruction] Answer the question using only the information provided in the context. Do not rely on external knowledge or sources.
In this task, your answers must be based solely on information provided in the prompt. Information from prior knowledge and external sources is not permitted.
Summarize the included text in a bullet point list and use bold to highlight any company names.
Future Possibilities of Big Tech in Finance This report generally provides an overview of Big Tech’s current financial offerings, how the existing regulatory framework applies to these operations, and related policy implications. However, should Big Tech seek to expand its offerings, as its actions have sometimes suggested and some observers have speculated, the relevant concerns may change considerably. At the same time, regulatory treatment may change irrespective of Big Tech’s activities, as policymakers and lawmakers continue to assess various Big Tech financial-services-related activities, such as data practices, and potential antitrust issues. For policymakers concerned about the potential implications of becoming dominant in financial markets, financial products where Big Tech could expand is also relevant for current policy. This section considers the potential evolution of financial services offered by Big Tech and the attendant policy implications. While it considers possible alternatives and issues that may arise from possible paths, the report does not assume that any one is more or less likely or that the companies are considering pursuing any particular strategy. Investment Advisory Services Investment advisory services refer to professionals that provide advice on securities to investors and include asset, portfolio, and wealth managers.156 More than 90% of wealth managers believe Big Tech companies will enter the market, with greater than 50% expecting significant disruption if it happens, according to a November 2021 survey.157 Over the past decade, fintechs have entered the investment management area, using machine learning to offer services such as robo- advising and retail stock trading. If Big Tech companies were to consider this approach, they would have to register as investment advisors with the Securities and Exchange Commission. They may also be required to register with the Financial Industry Regulatory Authority if they plan to offer brokerage services. Insurance According to one major management consulting firm, “[o]utside tech-powered giants … are shaping the insurance market.”158 Both Amazon and Google have partnered with insurance companies, much like they did banks, to offer various insurance products.159 Any intention to push further without relying on a partner would invite regulation at the state level,160 where most of the regulation of insurance occurs: The role of the federal government in regulating private insurance is relatively limited compared with its role in banking and securities. Insurance companies, unlike banks and securities firms, have been chartered and regulated solely by the states for the past 150 years. There are no federal regulators of insurance akin to those for securities or banks, such as the Securities and Exchange Commission (SEC) or the Office of the Comptroller of the Currency (OCC), respectively.161 Banking There are few issues at the nexus of technology and finance that generate greater interest and speculation than the prospect of Big Tech’s entry into banking. As it stands, some have pursued nonbank lending. The “Plex” project (see “Google “Plex” textbox), which Google abandoned in late 2021, was the most direct step to date by the industry, seeming to confirm collective and long-held suspicions that Big Techs were interested in becoming banks. However, if any of the companies were to consider an expansion into more bank-like activities, such as accepting deposits, their only option would likely be to pursue an industrial loan company charter, which has a complex framework and history. Legislative Framework Generally, U.S. law prohibits commercial enterprises (i.e., nonfinancial firms) from operating banks. Since at least as far back as the Glass-Steagall Act (Sections 20, 21, 26, and 32 of the Banking Act of 1933; P.L. 73-66), and then in the Bank Holding Company Act, Congress has sought to separate banking enterprises that take deposits and make loans from commercial enterprises producing and selling goods and services.162 In short, the separation aims to prevent one company from both offering a product and the loan to purchase that product funded with deposits publicly guaranteed by FDIC insurance. One exception to this general separation of commerce and banking is the role of industrial loan companies (ILCs). ILCs are financial institutions charted in six states163 that function much like typical banks. Unlike other banks, ILCs can be owned by nonfinancial, commercial firms. Under the Bank Holding Company Act (12 U.S.C. 1841 (c)(2)(h)), ILCs, provided they meet certain criteria, are exempt from the definition of bank. Pursuant to that exemption, a company that owns a bank is not a bank holding company and as such is not subject to oversight by the Federal Reserve. However, ILCs are considered state banks for the purposes of the FDIC Act (12 U.S.C. 1813 (a)(2)). Under that law, they are defined as banks and thus eligible for deposit insurance. Thus, this patchwork legal framework creates the opportunity for a company with other commercial interests to offer banking services, obtain deposit insurance, and operate nationally without being subject to consolidated supervision by the Federal Reserve System. Relevant History Historically, nonfinancial companies interested in a banking license have taken the ILC approach. In the mid-2000s, both Walmart and Home Depot began unsuccessful attempts to establish or acquire ILCs.165 Both ultimately dropped their attempts in the face of public opposition, after which the FDIC imposed an official moratorium on considering new insurance applications from ILCs between July 2006 and January 2008, and Section 603 of the Dodd-Frank Act imposed another temporary statutory moratorium between July 2010 and July 2013. Though the official moratoria had ended, the FDIC did not grant an ILC insurance application again until March 2020, when it approved two ILCs—Nelnet and Square166—for deposit insurance. Square offers many of the same services as the Big Techs in this report, including mobile wallet with payment and peer-to-peer transfer functions.167 Also relevant is an outstanding application for an ILC charter by Japanese e-commerce company Rakuten. Rakuten filed its most recent ILC application on January 15, 2021, following two previous applications that it withdrew before rulings. Rakuten is sometimes referred to as the “Amazon of Japan”168 and has a similar business model to U.S. Big Tech companies. As such, any decision by the FDIC will have regulatory arbitrage considerations (see “Systemic Risk” above) and is likely to be interpreted by others with similar models considering entering banking. Theoretically, a Big Tech with an ILC charter could benefit from access to deposits and deposit insurance without the increased regulatory burden and costs of consolidated financial oversight by the Federal Reserve System
In this task, your answers must be based solely on information provided in the prompt. Information from prior knowledge and external sources is not permitted. Summarize the included text in a bullet point list and use bold to highlight any company names. Future Possibilities of Big Tech in Finance This report generally provides an overview of Big Tech’s current financial offerings, how the existing regulatory framework applies to these operations, and related policy implications. However, should Big Tech seek to expand its offerings, as its actions have sometimes suggested and some observers have speculated, the relevant concerns may change considerably. At the same time, regulatory treatment may change irrespective of Big Tech’s activities, as policymakers and lawmakers continue to assess various Big Tech financial-services-related activities, such as data practices, and potential antitrust issues. For policymakers concerned about the potential implications of becoming dominant in financial markets, financial products where Big Tech could expand is also relevant for current policy. This section considers the potential evolution of financial services offered by Big Tech and the attendant policy implications. While it considers possible alternatives and issues that may arise from possible paths, the report does not assume that any one is more or less likely or that the companies are considering pursuing any particular strategy. Investment Advisory Services Investment advisory services refer to professionals that provide advice on securities to investors and include asset, portfolio, and wealth managers.156 More than 90% of wealth managers believe Big Tech companies will enter the market, with greater than 50% expecting significant disruption if it happens, according to a November 2021 survey.157 Over the past decade, fintechs have entered the investment management area, using machine learning to offer services such as robo- advising and retail stock trading. If Big Tech companies were to consider this approach, they would have to register as investment advisors with the Securities and Exchange Commission. They may also be required to register with the Financial Industry Regulatory Authority if they plan to offer brokerage services. Insurance According to one major management consulting firm, “[o]utside tech-powered giants … are shaping the insurance market.”158 Both Amazon and Google have partnered with insurance companies, much like they did banks, to offer various insurance products.159 Any intention to push further without relying on a partner would invite regulation at the state level,160 where most of the regulation of insurance occurs: The role of the federal government in regulating private insurance is relatively limited compared with its role in banking and securities. Insurance companies, unlike banks and securities firms, have been chartered and regulated solely by the states for the past 150 years. There are no federal regulators of insurance akin to those for securities or banks, such as the Securities and Exchange Commission (SEC) or the Office of the Comptroller of the Currency (OCC), respectively.161 Banking There are few issues at the nexus of technology and finance that generate greater interest and speculation than the prospect of Big Tech’s entry into banking. As it stands, some have pursued nonbank lending. The “Plex” project (see “Google “Plex” textbox), which Google abandoned in late 2021, was the most direct step to date by the industry, seeming to confirm collective and long-held suspicions that Big Techs were interested in becoming banks. However, if any of the companies were to consider an expansion into more bank-like activities, such as accepting deposits, their only option would likely be to pursue an industrial loan company charter, which has a complex framework and history. Legislative Framework Generally, U.S. law prohibits commercial enterprises (i.e., nonfinancial firms) from operating banks. Since at least as far back as the Glass-Steagall Act (Sections 20, 21, 26, and 32 of the Banking Act of 1933; P.L. 73-66), and then in the Bank Holding Company Act, Congress has sought to separate banking enterprises that take deposits and make loans from commercial enterprises producing and selling goods and services.162 In short, the separation aims to prevent one company from both offering a product and the loan to purchase that product funded with deposits publicly guaranteed by FDIC insurance. One exception to this general separation of commerce and banking is the role of industrial loan companies (ILCs). ILCs are financial institutions charted in six states163 that function much like typical banks. Unlike other banks, ILCs can be owned by nonfinancial, commercial firms. Under the Bank Holding Company Act (12 U.S.C. 1841 (c)(2)(h)), ILCs, provided they meet certain criteria, are exempt from the definition of bank. Pursuant to that exemption, a company that owns a bank is not a bank holding company and as such is not subject to oversight by the Federal Reserve. However, ILCs are considered state banks for the purposes of the FDIC Act (12 U.S.C. 1813 (a)(2)). Under that law, they are defined as banks and thus eligible for deposit insurance. Thus, this patchwork legal framework creates the opportunity for a company with other commercial interests to offer banking services, obtain deposit insurance, and operate nationally without being subject to consolidated supervision by the Federal Reserve System. Relevant History Historically, nonfinancial companies interested in a banking license have taken the ILC approach. In the mid-2000s, both Walmart and Home Depot began unsuccessful attempts to establish or acquire ILCs.165 Both ultimately dropped their attempts in the face of public opposition, after which the FDIC imposed an official moratorium on considering new insurance applications from ILCs between July 2006 and January 2008, and Section 603 of the Dodd-Frank Act imposed another temporary statutory moratorium between July 2010 and July 2013. Though the official moratoria had ended, the FDIC did not grant an ILC insurance application again until March 2020, when it approved two ILCs—Nelnet and Square166—for deposit insurance. Square offers many of the same services as the Big Techs in this report, including mobile wallet with payment and peer-to-peer transfer functions.167 Also relevant is an outstanding application for an ILC charter by Japanese e-commerce company Rakuten. Rakuten filed its most recent ILC application on January 15, 2021, following two previous applications that it withdrew before rulings. Rakuten is sometimes referred to as the “Amazon of Japan”168 and has a similar business model to U.S. Big Tech companies. As such, any decision by the FDIC will have regulatory arbitrage considerations (see “Systemic Risk” above) and is likely to be interpreted by others with similar models considering entering banking. Theoretically, a Big Tech with an ILC charter could benefit from access to deposits and deposit insurance without the increased regulatory burden and costs of consolidated financial oversight by the Federal Reserve System
[question] [user request] ===================== [text] [context document] ===================== [instruction] Answer the question using only the information provided in the context. Do not rely on external knowledge or sources.
I have hypothyroidism, but I just started taking ashwagandha, and I'm noticing decent effects on my stress levels. What are studies showing regarding the helpfulness of this supplement? Is there anything I need to be worried about? What is known about its drug interactions?
Efficacy Stress and anxiety A 2021 systematic review identified seven studies investigating ashwagandha to treat stress and anxiety. A total of 491 adults, all from India, with either self-reported high stress and anxiety or a diagnosed anxiety disorder, were randomized to take ashwagandha or placebo for 6 to 8 weeks. Six of the studies used extracts made from ashwagandha root alone (three studies, KSM-66), root and leaf (two studies, Sensoril or Shoden), or unspecified parts (one study), while the seventh study used dried root powder made into granules. The ashwagandha dose varied from 240 to 1,250 mg/day of extract or 12,000 mg/day of whole root granules equivalent to 6,000 mg of root powder. Overall, the studies found that ashwagandha significantly reduced stress and anxiety levels (subjectively measured by validated rating scales), reduced sleeplessness and fatigue, and reduced serum cortisol (a stress hormone) levels, compared with placebo. In several studies, benefits appeared to be greater with doses of 500 to 600 mg/day compared with lower doses. Results from three additional small studies published after this 2021 review also suggest that ashwagandha has a beneficial impact on perceived stress. One clinical trial conducted in Florida included 60 men and women experiencing perceived stress. Participants took capsules containing 225 mg/day or 400 mg/day of a proprietary ashwagandha root and leaf extract (NooGandha) or placebo for 30 days. Compared with placebo, participants taking both doses of ashwagandha extract reported positive effects on stress, anxiety, depression, and food cravings as measured by validated rating scales. In addition, participants taking the 225 mg dose had lower saliva cortisol levels than those in the placebo group. At the University of Colorado, Colorado Springs, 60 students were randomized to take an ashwagandha root extract (Gaia Herbs) or placebo for 30 days in a double-blind trial . The extract contained 2.5 mg withanolides per 350-mg capsule, and participants took two capsules daily. The investigators gathered qualitative, subjective information from participants during daily check-ins and focus groups. Participants who took ashwagandha extract reported increased well-being, including a sense of calm, improved energy levels, heightened mental clarity, and enhanced sleep quality. While descriptions of stress were comparable in both groups, participants taking ashwagandha were more likely to describe their stress as manageable compared with those taking placebo. Sleep Research is limited, but the results from a few clinical trials suggest that ashwagandha extracts may help with sleep. For example, at one study center in India, 150 healthy men and women age 18 to 65 years with self-reported sleep problems characterized by insomnia and lack of restful sleep were randomized to take an ashwagandha root and leaf extract (Shoden) or placebo for 6 weeks. The extract was standardized to contain 21 mg of withanolide glycosides per 60-mg capsule, and participants took two capsules each day. Both groups reported improvements in sleep quality as measured by a validated rating scale, but the improvements were greater in the ashwagandha group (72%) compared with the placebo group (29%). In addition, participants taking ashwagandha extract showed improvements in sleep efficiency (time in bed spent in sleep), total sleep time, sleep latency (time taken to fall asleep), and awakening after sleep onset as assessed by actigraphy, which involves wearing a watch monitor on the wrist to measure body motion. They also reported improvements in quality of life. In another trial conducted in India, 80 healthy men and women age 18 to 50 years, half of them with insomnia, were randomized to take an ashwagandha root extract (KSM-66) or placebo for 8 weeks. The extract was standardized to a withanolide content of more than 5% per 300-mg capsule, and participants took two capsules each day. Participants with insomnia who took ashwagandha extract showed improvements in sleep quality, sleep onset latency, mental alertness on rising, and perceived anxiety symptoms compared with those taking placebo, as measured by actigraphy and validated rating scales. Participants without insomnia taking ashwagandha also reported improved sleep but not perceived anxiety symptoms or mental alertness on awakening. A 2021 systematic review and meta-analysis included five studies (including the two described above), investigating ashwagandha to promote sleep. All studies were conducted in India. A total of 372 adults, either self-described as healthy or with insomnia, took ashwagandha or placebo for 6 to 12 weeks. The dose of the ashwagandha supplement used in these studies ranged from 250 to 600 mg/day as a root extract (KSM-66) or, in one study, 120 mg/day of a root and leaf extract (Shoden). Overall, the studies found that ashwagandha extract had a small but significant effect on improving sleep compared with placebo. The benefits were more prominent when the dose was 600 mg/day and when the treatment duration was at least 8 weeks. Benefits were also more prominent in participants with insomnia. Safety In the studies described above and in many other clinical trials, ashwagandha has been well tolerated by participants for up to about 3 months of use. Common side effects are mild and include stomach upset, loose stools, nausea, and drowsiness. However, evidence on the safety of longer term ashwagandha use over many months or years is lacking. There are a few reports of more serious side effects associated with ashwagandha use, including adverse effects on liver function. In an early report of liver injury associated with ashwagandha use, a 20-year-old man in Japan developed liver dysfunction and hyperbilirubinemia after using ashwagandha in combination with multiple antianxiety drugs. Since then, the use of ashwagandha has been linked to acute liver injury in other case reports. These include five cases (three men and two women, age range 21 to 62 years), who reportedly took supplements containing 450 to 1,350 mg ashwagandha daily over the course of 1 week to 4 months when signs of liver injury, such as jaundice, pruritus, nausea, lethargy, abdominal discomfort, and hyperbilirubinemia, appeared. In these cases and others, the conditions of the individuals improved over time after they stopped taking the supplement; some also received medical treatment. However, the contents of the products that the individuals took were not independently verified in all cases, and some products were combination products containing ashwagandha and other ingredients. Some research in mice and humans suggests that ashwagandha might affect thyroid function. In one study, three adult men who took 500 mg/day of a standardized ashwagandha extract (Sensoril) for 8 weeks had small increases in blood thyroxine (T4) levels. A small clinical trial with 50 participants with subclinical hypothyroidism found that ashwagandha (KSM-66), at 300 mg twice daily for 8 weeks, lowered serum thyroid stimulating hormone (TSH) and increased triiodothyronine (T3) and T4 levels compared with placebo. These findings suggest that ashwagandha might interact with thyroid hormone medications. Ashwagandha might also interact with other medications including antidiabetes medications, antihypertensives, immunosuppressants, and sedatives. Implications for use Several randomized, placebo-controlled clinical trials, most of them fairly small in size and of short duration, have found that ashwagandha may reduce perceived stress and anxiety and improve the quality and duration of sleep. Because studies have used various ashwagandha preparations (with different extraction and standardization processes) and doses, it is difficult to identify specific extracts or recommended amounts. In addition, most studies have been conducted as part of a traditional medical system, so the potential effects of ashwagandha when used as a dietary supplement outside of that approach remain unclear. Ashwagandha appears to be well tolerated for up to 3 months of use. However, the efficacy and safety of long-term ashwagandha use over months or years for stress, anxiety, or sleep is not known. In addition, ashwagandha may have potential adverse effects on the liver and thyroid and might not be safe for people with prostate cancer or those who are pregnant or nursing.
[question] I have hypothyroidism, but I just started taking ashwagandha, and I'm noticing decent effects on my stress levels. What are studies showing regarding the helpfulness of this supplement? Is there anything I need to be worried about? What is known about its drug interactions? ===================== [text] Efficacy Stress and anxiety A 2021 systematic review identified seven studies investigating ashwagandha to treat stress and anxiety. A total of 491 adults, all from India, with either self-reported high stress and anxiety or a diagnosed anxiety disorder, were randomized to take ashwagandha or placebo for 6 to 8 weeks. Six of the studies used extracts made from ashwagandha root alone (three studies, KSM-66), root and leaf (two studies, Sensoril or Shoden), or unspecified parts (one study), while the seventh study used dried root powder made into granules. The ashwagandha dose varied from 240 to 1,250 mg/day of extract or 12,000 mg/day of whole root granules equivalent to 6,000 mg of root powder. Overall, the studies found that ashwagandha significantly reduced stress and anxiety levels (subjectively measured by validated rating scales), reduced sleeplessness and fatigue, and reduced serum cortisol (a stress hormone) levels, compared with placebo. In several studies, benefits appeared to be greater with doses of 500 to 600 mg/day compared with lower doses. Results from three additional small studies published after this 2021 review also suggest that ashwagandha has a beneficial impact on perceived stress. One clinical trial conducted in Florida included 60 men and women experiencing perceived stress. Participants took capsules containing 225 mg/day or 400 mg/day of a proprietary ashwagandha root and leaf extract (NooGandha) or placebo for 30 days. Compared with placebo, participants taking both doses of ashwagandha extract reported positive effects on stress, anxiety, depression, and food cravings as measured by validated rating scales. In addition, participants taking the 225 mg dose had lower saliva cortisol levels than those in the placebo group. At the University of Colorado, Colorado Springs, 60 students were randomized to take an ashwagandha root extract (Gaia Herbs) or placebo for 30 days in a double-blind trial . The extract contained 2.5 mg withanolides per 350-mg capsule, and participants took two capsules daily. The investigators gathered qualitative, subjective information from participants during daily check-ins and focus groups. Participants who took ashwagandha extract reported increased well-being, including a sense of calm, improved energy levels, heightened mental clarity, and enhanced sleep quality. While descriptions of stress were comparable in both groups, participants taking ashwagandha were more likely to describe their stress as manageable compared with those taking placebo. Sleep Research is limited, but the results from a few clinical trials suggest that ashwagandha extracts may help with sleep. For example, at one study center in India, 150 healthy men and women age 18 to 65 years with self-reported sleep problems characterized by insomnia and lack of restful sleep were randomized to take an ashwagandha root and leaf extract (Shoden) or placebo for 6 weeks. The extract was standardized to contain 21 mg of withanolide glycosides per 60-mg capsule, and participants took two capsules each day. Both groups reported improvements in sleep quality as measured by a validated rating scale, but the improvements were greater in the ashwagandha group (72%) compared with the placebo group (29%). In addition, participants taking ashwagandha extract showed improvements in sleep efficiency (time in bed spent in sleep), total sleep time, sleep latency (time taken to fall asleep), and awakening after sleep onset as assessed by actigraphy, which involves wearing a watch monitor on the wrist to measure body motion. They also reported improvements in quality of life. In another trial conducted in India, 80 healthy men and women age 18 to 50 years, half of them with insomnia, were randomized to take an ashwagandha root extract (KSM-66) or placebo for 8 weeks. The extract was standardized to a withanolide content of more than 5% per 300-mg capsule, and participants took two capsules each day. Participants with insomnia who took ashwagandha extract showed improvements in sleep quality, sleep onset latency, mental alertness on rising, and perceived anxiety symptoms compared with those taking placebo, as measured by actigraphy and validated rating scales. Participants without insomnia taking ashwagandha also reported improved sleep but not perceived anxiety symptoms or mental alertness on awakening. A 2021 systematic review and meta-analysis included five studies (including the two described above), investigating ashwagandha to promote sleep. All studies were conducted in India. A total of 372 adults, either self-described as healthy or with insomnia, took ashwagandha or placebo for 6 to 12 weeks. The dose of the ashwagandha supplement used in these studies ranged from 250 to 600 mg/day as a root extract (KSM-66) or, in one study, 120 mg/day of a root and leaf extract (Shoden). Overall, the studies found that ashwagandha extract had a small but significant effect on improving sleep compared with placebo. The benefits were more prominent when the dose was 600 mg/day and when the treatment duration was at least 8 weeks. Benefits were also more prominent in participants with insomnia. Safety In the studies described above and in many other clinical trials, ashwagandha has been well tolerated by participants for up to about 3 months of use. Common side effects are mild and include stomach upset, loose stools, nausea, and drowsiness. However, evidence on the safety of longer term ashwagandha use over many months or years is lacking. There are a few reports of more serious side effects associated with ashwagandha use, including adverse effects on liver function. In an early report of liver injury associated with ashwagandha use, a 20-year-old man in Japan developed liver dysfunction and hyperbilirubinemia after using ashwagandha in combination with multiple antianxiety drugs. Since then, the use of ashwagandha has been linked to acute liver injury in other case reports. These include five cases (three men and two women, age range 21 to 62 years), who reportedly took supplements containing 450 to 1,350 mg ashwagandha daily over the course of 1 week to 4 months when signs of liver injury, such as jaundice, pruritus, nausea, lethargy, abdominal discomfort, and hyperbilirubinemia, appeared. In these cases and others, the conditions of the individuals improved over time after they stopped taking the supplement; some also received medical treatment. However, the contents of the products that the individuals took were not independently verified in all cases, and some products were combination products containing ashwagandha and other ingredients. Some research in mice and humans suggests that ashwagandha might affect thyroid function. In one study, three adult men who took 500 mg/day of a standardized ashwagandha extract (Sensoril) for 8 weeks had small increases in blood thyroxine (T4) levels. A small clinical trial with 50 participants with subclinical hypothyroidism found that ashwagandha (KSM-66), at 300 mg twice daily for 8 weeks, lowered serum thyroid stimulating hormone (TSH) and increased triiodothyronine (T3) and T4 levels compared with placebo. These findings suggest that ashwagandha might interact with thyroid hormone medications. Ashwagandha might also interact with other medications including antidiabetes medications, antihypertensives, immunosuppressants, and sedatives. Implications for use Several randomized, placebo-controlled clinical trials, most of them fairly small in size and of short duration, have found that ashwagandha may reduce perceived stress and anxiety and improve the quality and duration of sleep. Because studies have used various ashwagandha preparations (with different extraction and standardization processes) and doses, it is difficult to identify specific extracts or recommended amounts. In addition, most studies have been conducted as part of a traditional medical system, so the potential effects of ashwagandha when used as a dietary supplement outside of that approach remain unclear. Ashwagandha appears to be well tolerated for up to 3 months of use. However, the efficacy and safety of long-term ashwagandha use over months or years for stress, anxiety, or sleep is not known. In addition, ashwagandha may have potential adverse effects on the liver and thyroid and might not be safe for people with prostate cancer or those who are pregnant or nursing. https://ods.od.nih.gov/factsheets/Ashwagandha-HealthProfessional/ ===================== [instruction] Answer the question using only the information provided in the context. Do not rely on external knowledge or sources.
You are required to answer by only using information in the above text. Don't insert any intro or outro, just the answer to the prompt. Use bullet points and be extremely concise. Don't use hypotheticals in your answers, state only what you can prove to be true based on the text.
Explain how the proposed framework in the above text relates to python code snippets.
Adverse Drug Reactions (ADRs) are a leading cause of hospital admissions and healthcare costs. Traditional methods of ADR reporting often rely on post-marketing surveillance, and manual reporting of ADRs to the local or national pharmacovigilance agencies for causality assessment and final reporting to the WHO. High-income countries have their own national (i.e., USFDA) and regional (i.e., European Medicines Agency / EMA) pharmacovigilance agencies. However, this process is slow and inefficient. This article proposes a novel framework for integrating ADR detection into clinical workflows using Electronic Medical Record (EMR) systems, crowdsourced reporting from patients and healthcare professionals, and graph theory for generating automated ADR signals and reports to the local or national pharmacovigilance agencies. The system leverages automated data collection from EMRs (drug prescriptions, clinical notes) by EMR data scraping, integrating ADR dictionaries and drug databases to automate the generation of ranked ADR signals. By applying graph theory, the system filters and upranks connections between drugs and ADRs, considering the temporal relationship between drug administration and ADR occurrence. This automated approach offers a significant improvement in ADR reporting, enabling faster detection and more accurate predictions. Methodologies, framework visualizations and python code snippets are included to aid implementation.
Adverse Drug Reactions (ADRs) are a leading cause of hospital admissions and healthcare costs. Traditional methods of ADR reporting often rely on post-marketing surveillance, and manual reporting of ADRs to the local or national pharmacovigilance agencies for causality assessment and final reporting to the WHO. High-income countries have their own national (i.e., USFDA) and regional (i.e., European Medicines Agency / EMA) pharmacovigilance agencies. However, this process is slow and inefficient. This article proposes a novel framework for integrating ADR detection into clinical workflows using Electronic Medical Record (EMR) systems, crowdsourced reporting from patients and healthcare professionals, and graph theory for generating automated ADR signals and reports to the local or national pharmacovigilance agencies. The system leverages automated data collection from EMRs (drug prescriptions, clinical notes) by EMR data scraping, integrating ADR dictionaries and drug databases to automate the generation of ranked ADR signals. By applying graph theory, the system filters and upranks connections between drugs and ADRs, considering the temporal relationship between drug administration and ADR occurrence. This automated approach offers a significant improvement in ADR reporting, enabling faster detection and more accurate predictions. Methodologies, framework visualizations and python code snippets are included to aid implementation. Explain how the proposed framework in the above text relates to python code snippets. You are required to answer by only using information in the above text. Don't insert any intro or outro, just the answer to the prompt. Use bullet points and be extremely concise. Don't use hypotheticals in your answers, state only what you can prove to be true based on the text.
Answer the question using only the given context block. Do not use any outside resources or prior knowledge. Format your answer in a paragraph with no more than 150 words. If you cannot answer using the context block alone, respond with "I'm sorry. I cannot find the answer in the context source."
What limits the scope of Biden's pardon for marijuana possession?
Federal Clemency for Marijuana Possession On October 6, 2022, President Biden issued a proclamation granting “a full, complete, and unconditional pardon” to “all current United States citizens and lawful permanent residents” who had committed or been convicted of simple possession of marijuana under the CSA or a related provision of the D.C. Code. President Biden’s invocation of the clemency power means that persons who committed simple possession of marijuana before the date of the proclamation may not be prosecuted or punished for the offense under the relevant provisions of the CSA or the D.C. Code. (Although the District of Columbia has its own criminal code, its criminal justice system has some overlap with the federal system and is subject to the President’s clemency power.) Several factors limit the scope of the pardon. First, it applies only to violations of federal and D.C. law and does not affect other state law marijuana offenses. In announcing the pardon, President Biden also encouraged state governors to take similar steps but, under the United States’ federalist system of government, the President has no direct power to change state law or compel the states to adopt federal policies. While some governors have taken similar steps or expressed willingness to do so, in some states, governors cannot independently grant clemency. Second, the pardon applies only to simple possession of marijuana, not to other marijuana-related CSA offenses such as manufacture, distribution, or possession with intent to distribute or to other federal crimes. Federal prosecutions of simple possession of marijuana are relatively uncommon. The U.S. Sentencing Commission (USSC) reports that about 7,700 people subject to the pardon were convicted of only simple possession since FY1992, none of whom are currently in federal custody. (Additional individuals not subject to the pardon were convicted during that period.) In FY2021, 117 people subject to the pardon were convicted of only simple possession. A smaller number of people were convicted of possessing marijuana and possessing other illicit drugs or committing other crimes. Those people would remain liable for the other offenses. Shortly after the pardon was announced, the USSC issued policy priorities including “consideration of possible amendments to the [Sentencing] Guidelines Manual relating to criminal history to address … the impact of simple possession of marihuana offenses.” Third, the pardon by its terms “does not apply to individuals who were non-citizens not lawfully present in the United States at the time of their offense.” According to a 2016 USSC report, the vast majority of federal marijuana possession arrests occur at the border between the United States and Mexico. Among offenders sentenced for marijuana possession in FY2013, the USSC reports that over 94% of those arrested at the border were not U.S. citizens. To the extent those individuals were not lawfully present in the country, they would not benefit from the pardon. Fourth, the pardon applies only to offenses committed before the proclamation. The Supreme Court has explained that the President may issue a pardon “at any time after [an offense’s] commission, either before legal proceedings are taken, or during their pendency, or after conviction and judgment.” While DOJ is currently not prioritizing prosecuting low-level marijuana offenses, the October 2022 pardon does not prevent prosecution of future offenses if the current Administration or a future Administration adopts a different policy. Fifth, the pardon may not remove all legal consequences of marijuana possession, because it does not expunge convictions. Moreover, some collateral consequences of marijuana-related activities do not depend on a person being charged with or convicted of a CSA violation. Finally, and most fundamentally, the pardon does not change the status of marijuana under federal law. The President lacks the power to make such a change unilaterally. In announcing the grant of clemency, President Biden directed the Attorney General to review the classification of marijuana under the CSA, which is one way the federal government could change the status of the substance consistently with relevant separation-of-powers principles and the CSA’s procedural requirements. Any agency action in response to that directive would likely occur through notice-and-comment rulemaking, subject to judicial review and applicable international treaty obligations. Notwithstanding the foregoing limitations, some commentators have described the October 2022 pardon as a significant development in national marijuana policy that may restore some civic rights to those who benefit from it. Some have expressed concerns that the pardon might benefit offenders who committed more serious offenses but pleaded guilty to simple possession or that relaxing controls on marijuana may generally lead to an increase in crime. Others advocate for further pardons, expungements, and legal reforms to decriminalize marijuana.
Answer the question using only the given context block. Do not use any outside resources or prior knowledge. Format your answer in a paragraph with no more than 150 words. If you cannot answer using the context block alone, respond with "I'm sorry. I cannot find the answer in the context source." What limits the scope of Biden's pardon for Marijuana Possession? Federal Clemency for Marijuana Possession On October 6, 2022, President Biden issued a proclamation granting “a full, complete, and unconditional pardon” to “all current United States citizens and lawful permanent residents” who had committed or been convicted of simple possession of marijuana under the CSA or a related provision of the D.C. Code. President Biden’s invocation of the clemency power means that persons who committed simple possession of marijuana before the date of the proclamation may not be prosecuted or punished for the offense under the relevant provisions of the CSA or the D.C. Code. (Although the District of Columbia has its own criminal code, its criminal justice system has some overlap with the federal system and is subject to the President’s clemency power.) Several factors limit the scope of the pardon. First, it applies only to violations of federal and D.C. law and does not affect other state law marijuana offenses. In announcing the pardon, President Biden also encouraged state governors to take similar steps but, under the United States’ federalist system of government, the President has no direct power to change state law or compel the states to adopt federal policies. While some governors have taken similar steps or expressed willingness to do so, in some states, governors cannot independently grant clemency. Second, the pardon applies only to simple possession of marijuana, not to other marijuana-related CSA offenses such as manufacture, distribution, or possession with intent to distribute or to other federal crimes. Federal prosecutions of simple possession of marijuana are relatively uncommon. The U.S. Sentencing Commission (USSC) reports that about 7,700 people subject to the pardon were convicted of only simple possession since FY1992, none of whom are currently in federal custody. (Additional individuals not subject to the pardon were convicted during that period.) In FY2021, 117 people subject to the pardon were convicted of only simple possession. A smaller number of people were convicted of possessing marijuana and possessing other illicit drugs or committing other crimes. Those people would remain liable for the other offenses. Shortly after the pardon was announced, the USSC issued policy priorities including “consideration of possible amendments to the [Sentencing] Guidelines Manual relating to criminal history to address … the impact of simple possession of marihuana offenses.” Third, the pardon by its terms “does not apply to individuals who were non-citizens not lawfully present in the United States at the time of their offense.” According to a 2016 USSC report, the vast majority of federal marijuana possession arrests occur at the border between the United States and Mexico. Among offenders sentenced for marijuana possession in FY2013, the USSC reports that over 94% of those arrested at the border were not U.S. citizens. To the extent those individuals were not lawfully present in the country, they would not benefit from the pardon. Fourth, the pardon applies only to offenses committed before the proclamation. The Supreme Court has explained that the President may issue a pardon “at any time after [an offense’s] commission, either before legal proceedings are taken, or during their pendency, or after conviction and judgment.” While DOJ is currently not prioritizing prosecuting low-level marijuana offenses, the October 2022 pardon does not prevent prosecution of future offenses if the current Administration or a future Administration adopts a different policy. Fifth, the pardon may not remove all legal consequences of marijuana possession, because it does not expunge convictions. Moreover, some collateral consequences of marijuana-related activities do not depend on a person being charged with or convicted of a CSA violation. Finally, and most fundamentally, the pardon does not change the status of marijuana under federal law. The President lacks the power to make such a change unilaterally. In announcing the grant of clemency, President Biden directed the Attorney General to review the classification of marijuana under the CSA, which is one way the federal government could change the status of the substance consistently with relevant separation-of-powers principles and the CSA’s procedural requirements. Any agency action in response to that directive would likely occur through notice-and-comment rulemaking, subject to judicial review and applicable international treaty obligations. Notwithstanding the foregoing limitations, some commentators have described the October 2022 pardon as a significant development in national marijuana policy that may restore some civic rights to those who benefit from it. Some have expressed concerns that the pardon might benefit offenders who committed more serious offenses but pleaded guilty to simple possession or that relaxing controls on marijuana may generally lead to an increase in crime. Others advocate for further pardons, expungements, and legal reforms to decriminalize marijuana.
Draw your answer from the below context block.
I am having trouble understanding the text; please summarize it so that people who are unfamiliar with nanomaterials can understand and learn about them.
Aim of Work Nanomaterials (nanocrystalline materials) are substances possessing grain sizes on the order of a billionth of a meter. They manifest extraordinarily charming and beneficial properties, which can be exploited for a ramification of structural and nonstructural packages. Seeing that Nanomaterials own unique, beneficial chemical, bodily, and mechanical houses, they may be use for an extensive form of programs, like next era laptop chips, kinetic power (KE) penetrators with more advantageous lethality, better insulation materials, Phosphors for excessive-Defination TV, Low cost Flat-Panel displays, more and more difficult cutting tools, elimination of pollution, excessive strength density, Batteries, excessive power magnets, high sensitive sensors, motors with greater gas efficiency, Aerospace addititives with superior performance characteristics, higher and density weapons platforms, Longer-Lasting Satellites. Longer-Lasting medical implants, Ductile, Machinable ceramics, huge electro chromic show devices. Nanotechnology has the potential to be the key to a brand new world in the field of construction and building materials. Although replication of natural systems is one of the most promising areas of this technology, scientists are still trying to grasp their astonishing complexities. Furthermore, a nanotechnology is a rapidly expanding area of research where novel properties of materials manufactured on nanoscale can be utilized for the benefit of construction infrastructure, Therefore, the main objective of preparing this study is the importance of nanomaterials and their use in many modern industries due to their mechanical, electrical and chemical properties and for the purpose of identifying the most important methods of preparation, detection methods, types and applications of each type. Abstract Nanomaterials (NMs) are gaining significance in technological applications due to their tunable chemical, physical, and mechanical properties and enhanced performance when compared with their bulkier counterparts. This study presents a summary of the general types of NMs and provides an overview of the various synthesis methods of nanoparticles (NPs) and their functionalization via covalent or noncovalent interactions using different methods. It highlights the techniques used for the characterization of NPs and discusses their physical and chemical properties. Due to their unique properties, NMs have several applications and have become part of our daily lives. As a result, research is gaining attention since some NPs are not easily degraded by the environment. Thus, this study also highlights research efforts into the fate, behavior, of different classes of (NMs) in the environment. General Introduction Nanotechnology is an interdisciplinary study which allows us to develop new materials with new, interesting and useful properties. These new materials are nanomaterials made from nanoparticles. Nanoparticles are ultra-small particles with exceptional properties which can direct medicines straight to the place where the human body needs them, they can make materials stronger and they can convert solar energy more efficiently. Nanoparticles possess different properties and behave differently to the classical, larger building blocks of substances. From a scientific point of view, these interesting new properties are not so much the results from the fact that nanoparticles are small, but they result from the fact that a particle consisting of a relatively limited number of molecules behaves and interacts differently with its surroundings for fundamental physical reasons. Nanoparticles and nanomaterials have gained prominence in technological advancements due to their adjustable physicochemical characteristics such as melting point, wettability, electrical and thermal conductivity, catalytic activity, light absorption and scattering resulting in enhanced performance over their bulk counterparts. By controlling the shape, size and internal order of the nanostructures, properties (electrical conductivity, colour, chemical reactivity, elasticity, etc.) can be modified. Some nanomaterials occur naturally, but of particular interest are engineered nanomaterials (EN), which are designed for, and already being used in many commercial products and processes. They can be found in such things as sunscreens, cosmetics, sporting goods, stainresistant clothing, tires, electronics, as well as many other everyday items, and are used in medicine for purposes of diagnosis, imaging and drug delivery. Engineered nanomaterials are resources designed at the molecular (nanometre) level to take advantage of their small size and novel properties which are generally not seen in their conventional, bulk counterparts. The two main reasons why materials at the nano scale can have different properties are increased relative surface area and new quantum effects. Nanomaterials have a much greater surface area to volume ratio than their conventional forms, which can lead to greater chemical reactivity and affect their strength. Also at the nano scale, quantum effects can become much more important in determining the materials properties and characteristics, leading to novel optical, electrical and magnetic behaviors. 1.1 Definition of Nanomaterials Nanoscale materials are defined as a set of substances where at least one dimension is less than approximately 100 nanometers. A nanometer is one millionth of a millimeter - approximately 100,000 times smaller than the diameter of a human hair. Nanomaterials are of interest because at this scale unique optical, magnetic, electrical, and other properties emerge. These emergent properties have the potential for great impacts in electronics, medicine, and other fields [1] . 1.2 History of Nanomaterials Nanotechnology involves the synthesis and application of materials in dimensions of the order of a billionth of a meter (1x10-9). This categorizes them under ultrafine particles. (Figure 1.1) reveals the size comparison of the nanoparticles against different living and nonliving species [2]. The properties of nanoparticles vary from their bulk counterpart and their chemistry [2]. The electronic structure, reactivity, and thermal and mechanical properties tend to change when the particles reach the nanoscale. Through nanotechnology, we can build materials and devices with control down to the level of individual atoms and molecules. In the past two decades, there were reports of colloids and nanoparticles designed by nature [3, 4]. The history of nanomaterials began immediately after the big bang when Nanostructures were formed in the early meteorites. Nature later evolved many other Nanostructures like seashells, skeletons etc. Nanoscaled smoke particles were formed during the use of fire by early humans. The scientific story of nanomaterials however began much later. One of the first scientific report is the colloidal gold particles synthesized by Michael Faraday as early as 1857. Nanostructured catalysts have also been investigated for over 70 years. By the early 1940’s, precipitated and fumed silica nanoparticles were being manufactured and sold in USA and Germany as substitutes for ultrafine carbon black for rubber reinforcements [1]. Over the past few years, nanomaterials (NMs) have attracted the researchers because of their nanosize, physical, biological, and chemical properties compared to their bulk materials. These NMs are classified based on their size, chemical composition, shape, and sources. Different types of NMs have been synthetized from different sources and they are being classified accordingly. Many NMs have been produced in large quantities based on the requirements for many industrial applications. The two main sources through which NMs are being produced are synthetic source and naturally occurring nanoparticles (NPs). In this chapter, we discuss the types and classifications of NMs and broadly discuss the different types of nanomaterials isolated from natural and synthetic sources [5]. 1.3 Main differences between nanomaterials and bulk materials Nanomaterials are particles that have their size in 1-100 nm range at least in one dimension. We cannot see their particles through the naked eye. Moreover, examples of these materials include nanozymes, titanium dioxide nanoparticles, graphene, etc. Bulk materials are particles that have their size above 100 nm in all dimensions. We can see their particles through the naked eye. The examples of these materials include plaster, sand, gravel, cement, ore, slag, salts, etc.
System Instructions: Draw your answer from the below context block. Question: I am having trouble understanding the text; please summarize it so that people who are unfamiliar with nanomaterials can understand and learn about them. Context Block: Aim of Work Nanomaterials (nanocrystalline materials) are substances possessing grain sizes on the order of a billionth of a meter. They manifest extraordinarily charming and beneficial properties, which can be exploited for a ramification of structural and nonstructural packages. Seeing that Nanomaterials own unique, beneficial chemical, bodily, and mechanical houses, they may be use for an extensive form of programs, like next era laptop chips, kinetic power (KE) penetrators with more advantageous lethality, better insulation materials, Phosphors for excessive-Defination TV, Low cost Flat-Panel displays, more and more difficult cutting tools, elimination of pollution, excessive strength density, Batteries, excessive power magnets, high sensitive sensors, motors with greater gas efficiency, Aerospace addititives with superior performance characteristics, higher and density weapons platforms, Longer-Lasting Satellites. Longer-Lasting medical implants, Ductile, Machinable ceramics, huge electro chromic show devices. Nanotechnology has the potential to be the key to a brand new world in the field of construction and building materials. Although replication of natural systems is one of the most promising areas of this technology, scientists are still trying to grasp their astonishing complexities. Furthermore, a nanotechnology is a rapidly expanding area of research where novel properties of materials manufactured on nanoscale can be utilized for the benefit of construction infrastructure, Therefore, the main objective of preparing this study is the importance of nanomaterials and their use in many modern industries due to their mechanical, electrical and chemical properties and for the purpose of identifying the most important methods of preparation, detection methods, types and applications of each type. Abstract Nanomaterials (NMs) are gaining significance in technological applications due to their tunable chemical, physical, and mechanical properties and enhanced performance when compared with their bulkier counterparts. This study presents a summary of the general types of NMs and provides an overview of the various synthesis methods of nanoparticles (NPs) and their functionalization via covalent or noncovalent interactions using different methods. It highlights the techniques used for the characterization of NPs and discusses their physical and chemical properties. Due to their unique properties, NMs have several applications and have become part of our daily lives. As a result, research is gaining attention since some NPs are not easily degraded by the environment. Thus, this study also highlights research efforts into the fate, behavior, of different classes of (NMs) in the environment. General Introduction Nanotechnology is an interdisciplinary study which allows us to develop new materials with new, interesting and useful properties. These new materials are nanomaterials made from nanoparticles. Nanoparticles are ultra-small particles with exceptional properties which can direct medicines straight to the place where the human body needs them, they can make materials stronger and they can convert solar energy more efficiently. Nanoparticles possess different properties and behave differently to the classical, larger building blocks of substances. From a scientific point of view, these interesting new properties are not so much the results from the fact that nanoparticles are small, but they result from the fact that a particle consisting of a relatively limited number of molecules behaves and interacts differently with its surroundings for fundamental physical reasons. Nanoparticles and nanomaterials have gained prominence in technological advancements due to their adjustable physicochemical characteristics such as melting point, wettability, electrical and thermal conductivity, catalytic activity, light absorption and scattering resulting in enhanced performance over their bulk counterparts. By controlling the shape, size and internal order of the nanostructures, properties (electrical conductivity, colour, chemical reactivity, elasticity, etc.) can be modified. Some nanomaterials occur naturally, but of particular interest are engineered nanomaterials (EN), which are designed for, and already being used in many commercial products and processes. They can be found in such things as sunscreens, cosmetics, sporting goods, stainresistant clothing, tires, electronics, as well as many other everyday items, and are used in medicine for purposes of diagnosis, imaging and drug delivery. Engineered nanomaterials are resources designed at the molecular (nanometre) level to take advantage of their small size and novel properties which are generally not seen in their conventional, bulk counterparts. The two main reasons why materials at the nano scale can have different properties are increased relative surface area and new quantum effects. Nanomaterials have a much greater surface area to volume ratio than their conventional forms, which can lead to greater chemical reactivity and affect their strength. Also at the nano scale, quantum effects can become much more important in determining the materials properties and characteristics, leading to novel optical, electrical and magnetic behaviors. 1.1 Definition of Nanomaterials Nanoscale materials are defined as a set of substances where at least one dimension is less than approximately 100 nanometers. A nanometer is one millionth of a millimeter - approximately 100,000 times smaller than the diameter of a human hair. Nanomaterials are of interest because at this scale unique optical, magnetic, electrical, and other properties emerge. These emergent properties have the potential for great impacts in electronics, medicine, and other fields [1] . 1.2 History of Nanomaterials Nanotechnology involves the synthesis and application of materials in dimensions of the order of a billionth of a meter (1x10-9). This categorizes them under ultrafine particles. (Figure 1.1) reveals the size comparison of the nanoparticles against different living and nonliving species [2]. The properties of nanoparticles vary from their bulk counterpart and their chemistry [2]. The electronic structure, reactivity, and thermal and mechanical properties tend to change when the particles reach the nanoscale. Through nanotechnology, we can build materials and devices with control down to the level of individual atoms and molecules. In the past two decades, there were reports of colloids and nanoparticles designed by nature [3, 4]. The history of nanomaterials began immediately after the big bang when Nanostructures were formed in the early meteorites. Nature later evolved many other Nanostructures like seashells, skeletons etc. Nanoscaled smoke particles were formed during the use of fire by early humans. The scientific story of nanomaterials however began much later. One of the first scientific report is the colloidal gold particles synthesized by Michael Faraday as early as 1857. Nanostructured catalysts have also been investigated for over 70 years. By the early 1940’s, precipitated and fumed silica nanoparticles were being manufactured and sold in USA and Germany as substitutes for ultrafine carbon black for rubber reinforcements [1]. Over the past few years, nanomaterials (NMs) have attracted the researchers because of their nanosize, physical, biological, and chemical properties compared to their bulk materials. These NMs are classified based on their size, chemical composition, shape, and sources. Different types of NMs have been synthetized from different sources and they are being classified accordingly. Many NMs have been produced in large quantities based on the requirements for many industrial applications. The two main sources through which NMs are being produced are synthetic source and naturally occurring nanoparticles (NPs). In this chapter, we discuss the types and classifications of NMs and broadly discuss the different types of nanomaterials isolated from natural and synthetic sources [5]. 1.3 Main differences between nanomaterials and bulk materials Nanomaterials are particles that have their size in 1-100 nm range at least in one dimension. We cannot see their particles through the naked eye. Moreover, examples of these materials include nanozymes, titanium dioxide nanoparticles, graphene, etc. Bulk materials are particles that have their size above 100 nm in all dimensions. We can see their particles through the naked eye. The examples of these materials include plaster, sand, gravel, cement, ore, slag, salts, etc.
Answer only using information from the provided text. You are not allowed to use any external resources or prior knowledge. Limit the response to 200 words.
Explain the gender unique challenges of women with autism.
Individuals with Autism Spectrum Disorder (ASD) face an assortment of social, emotional, and mental challenges. Typically, individuals with ASD have different and unexpected communication styles, difficulty recognizing others’ social cues, discomfort when making eye contact, delayed speech and unusual speech styles, and a preference for narrow or extreme groups of interests (Lai, Lombardo, Baron-Cohen, & Simon, 2014). Notable strengths can include an ability to focus on details, a perseverance for completing tasks, and an aptitude in following rules or instructions. While little is understood about the origins of autism, there is evidence to suggest atypical brain development and organization that may be related to genetic and environmental factors (Chaste & Leboyer, 2012). The U.S. Centers for Disease Control and Prevention (2018) reported that in 2014 one out of every fifty-nine individuals was identified with ASD, in contrast to the 1:150 ratio in the year 2000. More recently, research has revealed an even higher uptick, reflecting occurrences as high as one in 40 individuals having ASD (Kogan et al., 2018). Since 2006, when ASD screening became recommended, the familiarity and acceptance of the disorder has grown, leading to a spike in diagnoses in recent years (Wright, 2017). Although ASD has numerous subtypes, many studies depict how females with ASD are characteristically different than their male counterparts across the spectrum. Females with ASD have not only demonstrated a different set of mannerisms, but also face a variety of unique challenges. Females are often under-recognized on the spectrum and are three to four times less likely to be diagnosed with autism than males (Loomes et al., 2017). Males, on the other hand, not only dominate the autism spectrum in numbers, but also in the amount of research done on ASD. This brings into question whether males are more likely to develop ASD or if there is a diagnostic gender bias causing females to be underdiagnosed (Gould & Ashton-Smith, 2011). In this paper, I will evaluate the literature that examines the specific, gender-unique challenges that females with ASD experience. I will be discussing the underdiagnosis of females with ASD, the higher risk of sexual abuse for females with ASD, and the frequent development of secondary mental health concerns in females with ASD. Females with Autism are Underdiagnosed Females with ASD often go undiagnosed or receive a late diagnosis (Mandic-Maravic et al., 2015). An accurate and early diagnosis for individuals with ASD is essential to optimize their social and emotional development (Milner, McIntosh, Colvert, & Happé, 2019). Baldwin and Costley (2016) found that females who did not receive a diagnosis until the age of 18 or older were far more likely to struggle later in life because of the lack of necessary assistance and treatment they could have received in their adolescent years. In this section, I will discuss two common explanations as to why females may be underdiagnosed: camouflaging and differences in presentation than males. Camouflaging Females with ASD are able to camouflage their autistic traits better than males with ASD (Lai et al. 2011). Camouflaging is defined as presenting and behaving oneself as neurotypical in order to fit into society (Milner et al., 2019; Schuck, Flores, & Fung, 2019). Mimicking behaviors, communicating nonverbally, reducing strange behaviors around others, and preparing small talk or “scripts” beforehand are ways females attempt to camouflage (Hull et al., 2017). In one study, women and girls reported to successfully hide their autistic traits by learning stock phrases or studying the appropriate amount of time they needed to maintain eye contact in order to appear normal in conversation (Lai et al., 2019). In another study, some females with autism reported that they camouflage in order to connect with friends, go on dates, get out of the spotlight, get a job, or simply be seen as neurotypical (Hull et al., 2017). Researchers presented a questionnaire to individuals with ASD and found that 89.2% of males with ASD and 90.9% of females with ASD attempt to camouflage their autism in order to fit in (Cassidy, Bradley, Shaw, & Baron-Cohen, 2018). Though both females and males try to hide autistic traits, females attained much higher scores, indicating that they are more adept at camouflaging and do so in more situations than males (Lai et al., 2011). Differences in presentation from males Autistic traits manifest differently between males and females with ASD, which subsequently causes false negative results in females being evaluated
System instruction: Answer only using information from the provided text. You are not allowed to use any external resources or prior knowledge. Limit the response to 200 words. Context: Individuals with Autism Spectrum Disorder (ASD) face an assortment of social, emotional, and mental challenges. Typically, individuals with ASD have different and unexpected communication styles, difficulty recognizing others’ social cues, discomfort when making eye contact, delayed speech and unusual speech styles, and a preference for narrow or extreme groups of interests (Lai, Lombardo, Baron-Cohen, & Simon, 2014). Notable strengths can include an ability to focus on details, a perseverance for completing tasks, and an aptitude in following rules or instructions. While little is understood about the origins of autism, there is evidence to suggest atypical brain development and organization that may be related to genetic and environmental factors (Chaste & Leboyer, 2012). The U.S. Centers for Disease Control and Prevention (2018) reported that in 2014 one out of every fifty-nine individuals was identified with ASD, in contrast to the 1:150 ratio in the year 2000. More recently, research has revealed an even higher uptick, reflecting occurrences as high as one in 40 individuals having ASD (Kogan et al., 2018). Since 2006, when ASD screening became recommended, the familiarity and acceptance of the disorder has grown, leading to a spike in diagnoses in recent years (Wright, 2017). Although ASD has numerous subtypes, many studies depict how females with ASD are characteristically different than their male counterparts across the spectrum. Females with ASD have not only demonstrated a different set of mannerisms, but also face a variety of unique challenges. Females are often under-recognized on the spectrum and are three to four times less likely to be diagnosed with autism than males (Loomes et al., 2017). Males, on the other hand, not only dominate the autism spectrum in numbers, but also in the amount of research done on ASD. This brings into question whether males are more likely to develop ASD or if there is a diagnostic gender bias causing females to be underdiagnosed (Gould & Ashton-Smith, 2011). In this paper, I will evaluate the literature that examines the specific, gender-unique challenges that females with ASD experience. I will be discussing the underdiagnosis of females with ASD, the higher risk of sexual abuse for females with ASD, and the frequent development of secondary mental health concerns in females with ASD. Females with Autism are Underdiagnosed Females with ASD often go undiagnosed or receive a late diagnosis (Mandic-Maravic et al., 2015). An accurate and early diagnosis for individuals with ASD is essential to optimize their social and emotional development (Milner, McIntosh, Colvert, & Happé, 2019). Baldwin and Costley (2016) found that females who did not receive a diagnosis until the age of 18 or older were far more likely to struggle later in life because of the lack of necessary assistance and treatment they could have received in their adolescent years. In this section, I will discuss two common explanations as to why females may be underdiagnosed: camouflaging and differences in presentation than males. Camouflaging Females with ASD are able to camouflage their autistic traits better than males with ASD (Lai et al. 2011). Camouflaging is defined as presenting and behaving oneself as neurotypical in order to fit into society (Milner et al., 2019; Schuck, Flores, & Fung, 2019). Mimicking behaviors, communicating nonverbally, reducing strange behaviors around others, and preparing small talk or “scripts” beforehand are ways females attempt to camouflage (Hull et al., 2017). In one study, women and girls reported to successfully hide their autistic traits by learning stock phrases or studying the appropriate amount of time they needed to maintain eye contact in order to appear normal in conversation (Lai et al., 2019). In another study, some females with autism reported that they camouflage in order to connect with friends, go on dates, get out of the spotlight, get a job, or simply be seen as neurotypical (Hull et al., 2017). Researchers presented a questionnaire to individuals with ASD and found that 89.2% of males with ASD and 90.9% of females with ASD attempt to camouflage their autism in order to fit in (Cassidy, Bradley, Shaw, & Baron-Cohen, 2018). Though both females and males try to hide autistic traits, females attained much higher scores, indicating that they are more adept at camouflaging and do so in more situations than males (Lai et al., 2011). Differences in presentation from males Autistic traits manifest differently between males and females with ASD, which subsequently causes false negative results in females being evaluated Question: Explain the gender unique challenges of women with autism.
Use only the details found in the text above to inform your answer.
Which composers are credited with creating and expanding the framework for aleatory composition in its early days?
8 In section 4 we discussed various tendencies that began to emerge during and after the phase of punctual music. Around 1956 these became much clearer and enabled composers to draw certain conclusions. 1. The statistical approach to music came to the foreground. The primary consideration became the ordering of higher categories of form rather than the organisation of detail. This was already indicated by use of the term 'group' to refer to what is really the smallest unit, characterised by the detailed effect of pitch, duration, timbre, etc.; within the group, however, a certain freedom was possible without encroaching on the characteristic of the group. This freedom was also evident in an easier use of interval proportions than was ever conceivable in classical dodecaphony. It was no longer a question of 'this and this' or 'so and so many notes, but of a certain degree of density. Density, register, direction of movement, degree of periodicity and many other concepts emerged as aspects of music that could be ordered serially. Attention to elements of detail made way for a more global determination, and thus for the concept of form. 2. In this process the series became increasingly neutral, functioning more and more as a regulatory factor. Proportions became decisive: a 3rd from a pitch series is a 5/4 proportion that can be manifest in any other musical ele- ment. In so far as pitch series were still employed, they likewise had a neutral character and were naturally no longer bound to the twelve notes. The series in Gruppen still had twelve notes, and indeed a pronounced shape of its own, presumably to attain large proportional contrasts in the macrofield. The Klavierstücke I-IV however, dating from 1954, retained only the rudiments of the 12-note series. In the second and third pieces, respectively, they are as fol- lows: Nono's Il Canto sospeso (1956) was based on the all-interval series shown in Example 109. Something similiar occurred in Messiaen's Livre d'Orgue (see Example 16). 3. The outstanding scholar Györgi Ligeti, who has already been mentioned, introduced the concept of interval permeability. In section 4 we have already observed how the interval, and indeed other musical elements too, lost its own existence by being taken up in higher, statistically determinable quanti- ties.4 This desensitisation evoked new problems and new possibilities. The music became manifest in layers, no longer characterised by the detail but by a global 'material state' (rough, granular, smooth, etc.). Such layers could be combined, and exact synchronisation was obviously no longer relevant. Indeed, exactness acquired a certain margin: synchronism was not essential, but rather the spatial distribution of 'material states'. Something of the sort had already been achieved by Messiaen, among others, with his modality, in which a certain indifferentiation likewise arose in terms of sequence of notes and intervals. In serial music composers went further: different tempos were combinable, and the new concept of field magnitude emerged, heralding another important phase in new music that is usually described as aleatory composition. 9 This did not appear out of thin air. Directly after the rigorously punctual style of the Structures, Boulez reacted with his Marteau sans Maître, completed in 1954, in which the tempo in particular fluctuates through the many changes, directions such as 'tempo et nuances très instables', etc. The work breathes a freedom and suppleness that reminds one immediately of Debussy. The many short notes, separate or clustered, and the irrational values create a sort of written-out rubato (see Example 35). This differentiation, which was also manifest, though somewhat differently, in Stockhausen's work of the same period, moved the latter to express the following thoughts (freely cited): 'An inaccuracy factor arises in performance. The areas within which this factor is manifest are time fields, and their dimensions are field magnitudes. In the past too this margin existed in performance, but was coincidental. Now we wish to capture these inaccuracies functionally. A series of field magnitudes, rather than a traditional series of fixated durations, can now be determinant.' This meant the abandonment of our quantitative system of fixed-value notation and the creation of a way of indicating the boundaries within which indeterminacy may occur, something that could be done in many ways. In Example 67 Boulez used the sign to indicate the boundaries within which a number of short notes may be freely placed. Stockhausen developed a different method to indicate action duration, based on the principle that note duration is no longer counted, but determined during performance by means of a particular action prescribed by the composer. Thus, the time between two notes, for instance, may depend on that required by the player to move his hand, on the degree of complexity of a given touch or pedal movement, or on breathing considerations, etc. Once again, such physiolog- ical reactions had always existed; but Stockhausen wished to incorporate them functionally in his music. Although it sounds paradoxical, all this revealed a desire to control musical elements that cannot be accurately com- mitted to paper. It is clear, therefore, that it was not a question of the absolute values of these elements, but of their mutual relationships. The rapidity of these innovations was remarkable. While the correspon- dence between macro- and micro-areas discussed in the previous sections was still hardly formulated, new territory was being explored. And each discovery required years of elaboration! Perhaps it was this hurried course of events that caused problems in Stockhausen's first composition in this field. Let us take a closer look at the Klavierstück XI of 1957. Nineteen groups are written down on a large piece of paper, all of very dif- ferent length and without any suggestion of sequence; some are illustrated in Example 110. According to the composer each group is in itself the result of serial ordering, based on different series to organise field magnitude propor- tions. We must take his word for it, since we have arrived at a situation in which serial manipulation can no longer be reconstructed without the help of the composer. Some groups include the familiar notes in small print that are to be played as fast as possible'. Action duration is taken into account, for the composer says that 'difficult chords and large leaps with one hand obviously require more time than simple chords and smaller intervals'. Although the notes in normal print have the customary quantitive notation of duration, an unexpected element is to play a role. Stockhausen prescribes the following: the performer is to glance unintentionally at the page and play the first group that catches his eye, in the tempo, dynamics and touch of his choice. The lat- ter, however, are classified by the composer beforehand: there are six tempos, for instance, ranging from tempo I, very fast, to tempo 6, very slow. Subsequently, the player's eye is caught unintentionally (without any attempt to connect particular groups) by another group which he now plays in accor- dance with directions given at the end of the previous group. Each group can be connected to any of the other eighteen, and all nineteen groups can there- fore be performed in the prescribed degrees of tempo, dynamics and touch. The characteristics of all groups are therefore variable within the chosen boundaries. The field magnitude of a following group is determined by indi- cations at the end of the preceding one. A performance does not necessarily include all the groups. If a group is repeated, indications are given for small modifications in the second render- ing, usually in the form of somewhat elementary octave transpositions. If a group occurs for a third time, it also brings one of the possible realisations of the whole piece to an end. The work is an example of open form, without direction or termination. The groups are spatially juxtaposed and can be com- bined in countless ways. In the many commentaries on this composition two aspects have been neglected or confused. 1. The action duration - a decidedly positive element. Instead of ‘counting' with a margin of inaccuracy, a spontaneous reaction arises, a realisation of the time structure at the moment of the action itself. Such music can therefore no longer be approached from the score, since the time structure is now deter- mined by the perception time of the performer himself, which is inseparable from physical reactions and abilities. Such freedom is therefore ostensible. Nothing is added to an existing structure (unlike jazz or basso continuo tech- nique); on the contrary, the player remains entirely bound to the composer's directions, but he becomes involved right down to his physical reactions. Notice that this action duration takes place within the boundaries of each group. The mutual bond between the groups is quite a different matter; it is created by means of what one could call: 2. the spontaneous decision. The player is required to glance 'unintention- ally' and to link the very first group that catches his eye with the preceding one. The word 'chance' crops up here and is indeed to stay with us, whether relevant or not. But it is not a question of chance, for the performer may choose from no more than the 18 options determined by the composer. All possibilities are already enclosed in the concept. At best there is mention of an unconsidered decision at the last moment - freedom, indeed, but a free- dom without sense. The actual time experience of the action duration is absent, as is the considered decision of the composition process. It is a free- dom that is only possible thanks to another concept of form, that of the open form without causality. These new concepts of form have already been dis- cussed at several points, especially in relation to the theory of musical space. In this light Stockhausen's Klavierstück XI is hardly new, but merely a confir- mation of a concept of form already found in Debussy. Stockhausen's step was to transfer choice from the composer to the per- former; instead of a single notated version, many realisations of a piece become feasible. - Boulez was the first to recognise the real problem of the Klavierstück XI. In the same period, but independently of Stockhausen, he worked on his Third Piano Sonata; at the same time he was confronted by the work of Mallarmé, whose literary preoccupations ran remarkably parallel despite the great dis- parity in time. In Boulez, too, the player gains a more important role, but this does nothing the composer believes - to change the problem of form. He felt the necessity to develop a new form that adapts to the material available to the serial composer, which was constantly becoming more elastic. But form to Boulez was something more than the mosaics of Stockhausen's music, which were really nothing other than constantly changing combinations from millions of options. If the performer was free to choose, then his choice should preferably be made after some consideration, and with only a very lim- ited number of possibilities that were precisely determined by the composer. An example is the overall structure of the Sonata (comprising five move- ments in the first concept): Antiphonie, Trope, Constellation, Strophe, Séquence. The sequence of the movements is free, providing that Constellation is always in the middle. The internal structure reflects the same approach. One of the movements, Trope, has four components: two so-called structures complexes (Parenthèse, Commentaire) and two structures simples (Glose, Texte). In the 'complex structures' the performer is again free to include or omit certain additional variants (given between brackets). The sequence of these components is indicated in an ingenious manner. The unnumbered pages of the score are in a ring binder, and the player may begin where he wishes. The sequence is therefore directed - we usually read from front to back - but not predetermined (Boulez speaks of a forme circu- laire). There are normally four options, therefore, depending on the starting point: - P, C, C, G, T G, T, P G, T, P C T, P, C, G But since the Commentaire section is included twice, four other possibilities become available, depending on where this section is placed (it may only be performed once); this can be represented as in Figure 7. Altogether eight dif- ferent sequences are therefore available; compared to the millions in Stockhausen, this illustrates just how much more control the composer has retained over the final outcome. The Trope from Boulez's Third Piano Sonata provided only a first and simple answer to the new problems of form. Although the composer already estab- lished new structural concepts, the territory as such was as yet hardly explored. This is particularly evident if we bear in mind that the free sequence of sections, which caused the most sensation in the beginning, was merely one aspect of the complex concept of form that awaited exploitation. However the case may be, through these preoccupations, form acquired unprecedented autonomy, despite the astonishing authority granted (for the time being) to the performer. This is already observed in the work of Mallarmé, who concentrated far more on the structure of language than on its significance, or, in other words, attempted to convert this significance into a symbolism of absolute value. Form had a life of its own, bringing the artist to an attitude of anonymity, since the intrusion of purely personal incidents was undesirable. Those with some knowledge of Asian culture will hardly be surprised by this. But in Europe relationships are different, and particularly for those less gifted than Boulez it is fitting to recall the words of Paul Valéry, a confidant of Mallarmé. Concerning the latter's ambitions he spoke later (in his Lettre sur Mallarme) of 'diviniser la chose écrite' (divining that which is written). But, he went on, 'ce n'est point l'œuvre faite et ses apparences ou ses effets dans le monde qui peuvent nous accomplir et nous édifier, mais seule- ment la manière dont nous l'avons faite (it is not the finished work and its appearances, or its effects on the world, which can fulfill and edify us, but only the manner in which we have accomplished it). IO The concept of aleatory music has now broadened considerably, and we must certainly mention one other composer under this heading. We have already examined two aspects: action duration and the sponta- neous decision in Stockhausen, and intervention possibilities in Boulez. In the latter the performer is like a driver who may choose from a limited num- ber of roads, while the road map itself remains the domain of the town plan- ner. Boulez described Stockhausen's solution as chance, while Stockhausen used the term gelenkter Zufall (guided chance); but as we have seen, in reali- ty the element of chance was less present than one might imagine. All this only made the problem of form most acute, and the composer who was to draw particularly radical conclusions was the American John Cage. Cage came to Europe in 1958 - I remember a momentous concert at the World Exhibition in Brussels - and was quick to cause the necessary stir. From his point of view our controversy between tonality and atonality was long out- dated. He believed that modern serialists kept far too much to traditional paths, exposing themselves to a constant risk of academicism. A number of similarities, however, can also be found. Like Boulez, Cage's music reveals a pursuit of objectivity, or rather anonymity, which helps the sound to 'come to itself'. But his conclusions were much more radical. Instead of trying to bind the notes, his school attempted to soak off their adhesive, formed as it was by centuries of convention. If one hangs on to the notes, if one has 'musical' ideas, one cannot allow the notes to be themselves. And 'being themselves' means that there is no superimposed expression. (Many modern composers would go along with him up to this point, and the much older Varèse, with his 'liberation of the sound', was even a precursor.) And it also means that there is no man-made organisation. Thus, Cage reached a conclusion diametrically opposed to our early serialists: not com- plete determination, but rather complete indetermination was essential. (One of the most shocking experiences of recent times is to discover that both points of departure lead to the same degree of indetermination.) In order to achieve this indetermination, Cage used to make particular use of chance actions such as the tossing of coins, etc. Other means may also be employed, such as the oracle of the staves from the ancient Chinese book I-Ching (which illustrates the influence of Zen Buddhism on this composer), or mathemati- cal methods. More recently, however, the accent has shifted towards the unforeseeable- ness of the performance itself, involving the actual performers. It is remark- able how completely different paths form striking parallels with modern European composers! Fifty years earlier Charles Ives, following quite a differ- ent line of thought, created the same sort of music as that of the young Schönberg and Stravinsky. Despite the shift towards live performance, a score was naturally still required as an instruction for the players. But the score must not be viewed as a ready-made, notated form. And this is where Cage differs: the composition is not an autonomous object, but a performance process. Obviously, this process has its boundaries - determined by the action of the players and by a number of characteristics - but essentially the music has no precedence above either note or noise. While it does have its own exis- tence, it remains 'transparent' in relation to its surroundings. Its boundaries become diffuse, and counting is not required, for we exist in time'. Stopwatches rather than bars serve to indicate when an occurrence of sound must take place within this time. Christian Wolff, a composer from the Cage group, replaced Stockhausen's eye ('unintentional glancing') with the ear: cer- tain occurrences of sound, caused by the one player, evoke reactions from the other (Duo for Pianists II). The outcome is determined by the performers themselves; finally, musical form may be conceived as 'the length of the pro- gramme'.7 Cage is among those Westerners who have listened to the Japanese bow- 8 man in chapter 6. Just how far his interpretation is correct, we will leave to the experts. Is this still music? Surely we see an influence on contemporary music that cannot be underestimated. Can everybody do the same? But not everybody does, is Cage's reply. Strong differences of opinion emerge. It is impossible to imagine the fascinating whirlpool of new developments with- out Cage. Whether the music comes from inside or outside, we cannot escape it. 'One day when the windows were open, Christian Wolff played one of his pieces at the piano. Sounds of traffic, boat horns, were heard not only during the silences in the music but, being louder, were more easily heard than the piano sounds themselves. Afterwards, someone asked Christian Wolff to play the piece again with the windows closed. Christian Wolff said he'd be glad to, but that it wasn't really necessary, since the sounds of the environment were in no sense an interruption of those of the music.' II The above discussion helps us to clarify the concept of aleatory music. It is a generic term for all aspects of music that are not predetermined. The rela- tionship between determined and undetermined elements plays a role in all types of music. The undetermined element brings unforeseeableness with it, and can occur both in performance and during the process of composition. Unforeseeableness can be manifest in differing degrees. In the perform- ance of a classical composition, for example, the degree to which the fixated notation can be deviated from is limited. Performance of a piece by John Cage, on the other hand, can involve a high degree of unforeseeableness. But even here general patterns of expectation can be formulated. Finally, with regard to developments in the music of the period 1950-60, the following aspects are of importance: more 1. In Cage's work the element of chance to use this dubious word once - was a means to obtain indetermination and to escape from the human grasp of the music. Young European composers, on the other hand, were con- cerned with gaining even stricter control of the musical material: even this indeterminable area of free choice was consciously incorporated in the of composition. process 2. Bearing in mind changing concepts of musical form, we can say that part of what once belonged to the individual and 'unique' work of art is now ascribed to the material employed by the performers. There is a certain incli- nation to make matters absolute, which corresponds logically to the excessive attention given to musical material that we have observed from 1950 onwards. 3. Expansionism, moreover, is not foreign to serial technique, in the sense that there is an inclination to exploit all the possibilities of the chosen mate- rial. The limited means of dodecaphony of the past have been extended to become an all-embracing permutation procedure; it soon became apparent, however, that this again was not sufficient to harness the wealth of resources that had been rallied. A written serial score realises only a few of the count- less possibilities, and the free choice of the performer can at least compensate this to a certain extent. The element of chance becomes a wider margin in the realisation of the (unforeseeable) permutation process. Far from coincidental is the attendant departure from the unique, once-and-for-all determined work of art. A remarkable dichotomy seems to arise between the realised con- dition of a single work of art and the 'possibly realisable' that is potentially present in the same. Here creative expansionism collides with ultimate boundaries. 4. The element of chance can serve to fill another gap. With all due respect for their sometimes brilliant ideas, one can nonetheless consider that both Stockhausen and Boulez have maintained an only too simple notion of the role of what they call 'surprise' in the musical process. The former wrote: "The degree of information is therefore at its highest when at any point in a musi- cal discourse the moment of surprise is at its strongest: the music constantly has "something to say". (Just before this he specifies: 'Surprise only occurs when the unexpected happens.')" Boulez shares this opinion: "... for any music that is a masterpiece is a music that allows the capacity to surprise at any moment. This is not the place to contradict these ideas, but it is clear that from this point of view too, the involvement of the spontaneous decision of the per- former is most welcome: the 'surprise' within the boundaries of a work may increase, and the same goes for each subsequent performance. 5. Increasing differentiation posed considerable problems with regard to traditional notation, which was not at all equal to its task. By involving the performer, this difficulty was eased on the one hand, while on the other new symbols had to be introduced to indicate players' actions. It was inevitable that this issue also had to be tackled once more, as is described in section 14. 12 In the reaction against abstractions, serial music lost more and more influence after 1960. Boulez has remained a bastion of serial academicism, but Stockhausen has changed enormously. He is no longer the great renewer, but continues to react with great flexibility to any external stimulus that he encounters. He is long past the stage of solving problems of form and tech- nique. From Carré (1960) and Originale (1961) onwards his work comprises. ever more heterogeneous elements including happenings, pop, quotations, indeterminate sound production (contact microphones), etc. The use of contact microphones has now become very widespread, and this opens up a new direction in the application of electronic resources. In days past, electronic music was accurately recorded on tape in a studio. Many considered this an advantage: the composer exercised maximum control, while the inconstancies of live performance were eliminated. But this strict view could not be maintained, and in a next step (discussed in section 9) aleatory techniques were introduced, at first very cautiously among Europeans but after 1960 much more freely. Improvisation groups even appeared on stage working with electronic apparatus. The principle is simple: microphones attached to 'instruments' (that may or may not be recognisable as such) pick up vibrations that are normally neither audible nor usable and feed them to loudspeakers via amplifiers and possibly modulators. A new and hitherto unknown world of sound is brought to life. Unexpected surprises may occur too, and with them an immediate response from the performer. This was a typical feature of the post-1960 period. exper- Once again it was Cage who led the way with such experiments. More important, however, was his awareness of the situation. For in his first iments with chance phenomena he discovered that he was still attempting to drag 'successful' results out of chance actions. Realising later on that this atti- tude was equivocal, he came to accept the induced results of chance. The result was no longer important, but rather the attitude of open-mindedness. Thus, he came to distinguish between chance actions and indetermination. In the first case the composer employs chance as a means, but to a limited degree such that he remains within a self-determined global circle. Indetermination, on the contrary, exceeds this circle: the result is in every respect indefinite; such music crops up out of time, undefined and inciden- tal, only to disappear once more without a trace. All things are interrelated,' Cage said, and taken up in the stream of time. Any (human) pursuit of a stat- ed "aim" is a simplification, and a departure from reality.' The lessons of Cage were developed further by an American ‘second generation' around 1960. And once again the aesthetic consequences of the concept of indetermination were applied more radically than in Europe. In the work of La Monte Young, Terry Riley, Robert Ashley and the Fluxus Movement, almost all existing values and concepts relating to music were turned well and truly upside down. La Monte Young (1935) worked with long chains of chords that developed systematically. His material is economical, and naturally comprises all that is 'sound', including that produced by nature, machines, and electronic resources. Performances may last a week or more and incorporate other ele- ments such as light, movement and theatre. His contemporary Terry Riley followed the same course. His music consists of long chains of repeated motifs, usually in elementary diatonic note patterns. Tape loops and feedback systems provide the characteristic tone colours; electronic and instrumental resources merge. These and other Americans shared a broad interest in wide- ly different idioms including jazz, pop and non-Western music. Chance action - indetermination: many composers throughout the world now work within these borders. Only few are conscious of the background so brilliantly evoked by Cage in his writings. What is clear, however, is that serial concepts are disappearing; there is a growing reaction to their abstrac- tions and a tendency towards greater directness in music making. This is also expressed in the instrumental works of Berio, Ligeti, Kagel and others: music that is tailor-made for certain specialists, musicians who are required to make a creative contribution of their own rather than only faithfully reproduce a more or less authoritarian score. Such music renounces serial, abstractly deter- mined sound differentiation in favour of a more direct form of expression. Not only the actual notes, but sighs, scratches, shouts and moans become part of music making. The instrument literally becomes an extension of the human body. Similar tendencies are found in music theatre. This rather vague term embodies so much variety that a comprehensive definition can hardly be given. In general, it can be viewed as a reaction to traditional theatrical and operatic forms, which have caused the nineteenth century to live on, leaving current issues to the realm of film. The 'raree show' idea has also been aban- doned, since divisions between audience and stage, between different partic- ipating disciplines, required abolition. Various directions emerged, from the political engagement of Nono (Intolleranza, 1960) to the more light-hearted or autonomous approach of Kagel (Sur Scène, 1960) and Ligeti (Aventures, 1962). Nono connected with traditional opera, while Ligeti created a 'com- position with scenic, verbal and musical means'. Unlike the traditional Gesamtkunstwerk there is a tendency to grant the incorporated elements a life of their own, independent of one another and only joined by a common peri- od of time. Once again, vocal and instrumental techniques are extended to such a degree that the two flow together. All such innovations amount to repeated attempts to break through exist- ing boundaries! From the beginning of the twentieth century, the failure of instrument making to keep pace with musical developments made itself increasingly felt. Factories were usually highly industrialised, geared to the mass production of traditional instruments and leaving no room for altruis- tic research in an artistic sense. Today's composer must still make do with instruments developed hundreds of years ago: thus the continual expansion of playing techniques towards the boundaries of human endeavour; thus the contact microphones; and thus the ongoing specialisation of the few players devoted exclusively to new music.
8 In section 4 we discussed various tendencies that began to emerge during and after the phase of punctual music. Around 1956 these became much clearer and enabled composers to draw certain conclusions. 1. The statistical approach to music came to the foreground. The primary consideration became the ordering of higher categories of form rather than the organisation of detail. This was already indicated by use of the term 'group' to refer to what is really the smallest unit, characterised by the detailed effect of pitch, duration, timbre, etc.; within the group, however, a certain freedom was possible without encroaching on the characteristic of the group. This freedom was also evident in an easier use of interval proportions than was ever conceivable in classical dodecaphony. It was no longer a question of 'this and this' or 'so and so many notes, but of a certain degree of density. Density, register, direction of movement, degree of periodicity and many other concepts emerged as aspects of music that could be ordered serially. Attention to elements of detail made way for a more global determination, and thus for the concept of form. 2. In this process the series became increasingly neutral, functioning more and more as a regulatory factor. Proportions became decisive: a 3rd from a pitch series is a 5/4 proportion that can be manifest in any other musical ele- ment. In so far as pitch series were still employed, they likewise had a neutral character and were naturally no longer bound to the twelve notes. The series in Gruppen still had twelve notes, and indeed a pronounced shape of its own, presumably to attain large proportional contrasts in the macrofield. The Klavierstücke I-IV however, dating from 1954, retained only the rudiments of the 12-note series. In the second and third pieces, respectively, they are as fol- lows: Nono's Il Canto sospeso (1956) was based on the all-interval series shown in Example 109. Something similiar occurred in Messiaen's Livre d'Orgue (see Example 16). 3. The outstanding scholar Györgi Ligeti, who has already been mentioned, introduced the concept of interval permeability. In section 4 we have already observed how the interval, and indeed other musical elements too, lost its own existence by being taken up in higher, statistically determinable quanti- ties.4 This desensitisation evoked new problems and new possibilities. The music became manifest in layers, no longer characterised by the detail but by a global 'material state' (rough, granular, smooth, etc.). Such layers could be combined, and exact synchronisation was obviously no longer relevant. Indeed, exactness acquired a certain margin: synchronism was not essential, but rather the spatial distribution of 'material states'. Something of the sort had already been achieved by Messiaen, among others, with his modality, in which a certain indifferentiation likewise arose in terms of sequence of notes and intervals. In serial music composers went further: different tempos were combinable, and the new concept of field magnitude emerged, heralding another important phase in new music that is usually described as aleatory composition. 9 This did not appear out of thin air. Directly after the rigorously punctual style of the Structures, Boulez reacted with his Marteau sans Maître, completed in 1954, in which the tempo in particular fluctuates through the many changes, directions such as 'tempo et nuances très instables', etc. The work breathes a freedom and suppleness that reminds one immediately of Debussy. The many short notes, separate or clustered, and the irrational values create a sort of written-out rubato (see Example 35). This differentiation, which was also manifest, though somewhat differently, in Stockhausen's work of the same period, moved the latter to express the following thoughts (freely cited): 'An inaccuracy factor arises in performance. The areas within which this factor is manifest are time fields, and their dimensions are field magnitudes. In the past too this margin existed in performance, but was coincidental. Now we wish to capture these inaccuracies functionally. A series of field magnitudes, rather than a traditional series of fixated durations, can now be determinant.' This meant the abandonment of our quantitative system of fixed-value notation and the creation of a way of indicating the boundaries within which indeterminacy may occur, something that could be done in many ways. In Example 67 Boulez used the sign to indicate the boundaries within which a number of short notes may be freely placed. Stockhausen developed a different method to indicate action duration, based on the principle that note duration is no longer counted, but determined during performance by means of a particular action prescribed by the composer. Thus, the time between two notes, for instance, may depend on that required by the player to move his hand, on the degree of complexity of a given touch or pedal movement, or on breathing considerations, etc. Once again, such physiolog- ical reactions had always existed; but Stockhausen wished to incorporate them functionally in his music. Although it sounds paradoxical, all this revealed a desire to control musical elements that cannot be accurately com- mitted to paper. It is clear, therefore, that it was not a question of the absolute values of these elements, but of their mutual relationships. The rapidity of these innovations was remarkable. While the correspon- dence between macro- and micro-areas discussed in the previous sections was still hardly formulated, new territory was being explored. And each discovery required years of elaboration! Perhaps it was this hurried course of events that caused problems in Stockhausen's first composition in this field. Let us take a closer look at the Klavierstück XI of 1957. Nineteen groups are written down on a large piece of paper, all of very dif- ferent length and without any suggestion of sequence; some are illustrated in Example 110. According to the composer each group is in itself the result of serial ordering, based on different series to organise field magnitude propor- tions. We must take his word for it, since we have arrived at a situation in which serial manipulation can no longer be reconstructed without the help of the composer. Some groups include the familiar notes in small print that are to be played as fast as possible'. Action duration is taken into account, for the composer says that 'difficult chords and large leaps with one hand obviously require more time than simple chords and smaller intervals'. Although the notes in normal print have the customary quantitive notation of duration, an unexpected element is to play a role. Stockhausen prescribes the following: the performer is to glance unintentionally at the page and play the first group that catches his eye, in the tempo, dynamics and touch of his choice. The lat- ter, however, are classified by the composer beforehand: there are six tempos, for instance, ranging from tempo I, very fast, to tempo 6, very slow. Subsequently, the player's eye is caught unintentionally (without any attempt to connect particular groups) by another group which he now plays in accor- dance with directions given at the end of the previous group. Each group can be connected to any of the other eighteen, and all nineteen groups can there- fore be performed in the prescribed degrees of tempo, dynamics and touch. The characteristics of all groups are therefore variable within the chosen boundaries. The field magnitude of a following group is determined by indi- cations at the end of the preceding one. A performance does not necessarily include all the groups. If a group is repeated, indications are given for small modifications in the second render- ing, usually in the form of somewhat elementary octave transpositions. If a group occurs for a third time, it also brings one of the possible realisations of the whole piece to an end. The work is an example of open form, without direction or termination. The groups are spatially juxtaposed and can be com- bined in countless ways. In the many commentaries on this composition two aspects have been neglected or confused. 1. The action duration - a decidedly positive element. Instead of ‘counting' with a margin of inaccuracy, a spontaneous reaction arises, a realisation of the time structure at the moment of the action itself. Such music can therefore no longer be approached from the score, since the time structure is now deter- mined by the perception time of the performer himself, which is inseparable from physical reactions and abilities. Such freedom is therefore ostensible. Nothing is added to an existing structure (unlike jazz or basso continuo tech- nique); on the contrary, the player remains entirely bound to the composer's directions, but he becomes involved right down to his physical reactions. Notice that this action duration takes place within the boundaries of each group. The mutual bond between the groups is quite a different matter; it is created by means of what one could call: 2. the spontaneous decision. The player is required to glance 'unintention- ally' and to link the very first group that catches his eye with the preceding one. The word 'chance' crops up here and is indeed to stay with us, whether relevant or not. But it is not a question of chance, for the performer may choose from no more than the 18 options determined by the composer. All possibilities are already enclosed in the concept. At best there is mention of an unconsidered decision at the last moment - freedom, indeed, but a free- dom without sense. The actual time experience of the action duration is absent, as is the considered decision of the composition process. It is a free- dom that is only possible thanks to another concept of form, that of the open form without causality. These new concepts of form have already been dis- cussed at several points, especially in relation to the theory of musical space. In this light Stockhausen's Klavierstück XI is hardly new, but merely a confir- mation of a concept of form already found in Debussy. Stockhausen's step was to transfer choice from the composer to the per- former; instead of a single notated version, many realisations of a piece become feasible. - Boulez was the first to recognise the real problem of the Klavierstück XI. In the same period, but independently of Stockhausen, he worked on his Third Piano Sonata; at the same time he was confronted by the work of Mallarmé, whose literary preoccupations ran remarkably parallel despite the great dis- parity in time. In Boulez, too, the player gains a more important role, but this does nothing the composer believes - to change the problem of form. He felt the necessity to develop a new form that adapts to the material available to the serial composer, which was constantly becoming more elastic. But form to Boulez was something more than the mosaics of Stockhausen's music, which were really nothing other than constantly changing combinations from millions of options. If the performer was free to choose, then his choice should preferably be made after some consideration, and with only a very lim- ited number of possibilities that were precisely determined by the composer. An example is the overall structure of the Sonata (comprising five move- ments in the first concept): Antiphonie, Trope, Constellation, Strophe, Séquence. The sequence of the movements is free, providing that Constellation is always in the middle. The internal structure reflects the same approach. One of the movements, Trope, has four components: two so-called structures complexes (Parenthèse, Commentaire) and two structures simples (Glose, Texte). In the 'complex structures' the performer is again free to include or omit certain additional variants (given between brackets). The sequence of these components is indicated in an ingenious manner. The unnumbered pages of the score are in a ring binder, and the player may begin where he wishes. The sequence is therefore directed - we usually read from front to back - but not predetermined (Boulez speaks of a forme circu- laire). There are normally four options, therefore, depending on the starting point: - P, C, C, G, T G, T, P G, T, P C T, P, C, G But since the Commentaire section is included twice, four other possibilities become available, depending on where this section is placed (it may only be performed once); this can be represented as in Figure 7. Altogether eight dif- ferent sequences are therefore available; compared to the millions in Stockhausen, this illustrates just how much more control the composer has retained over the final outcome. The Trope from Boulez's Third Piano Sonata provided only a first and simple answer to the new problems of form. Although the composer already estab- lished new structural concepts, the territory as such was as yet hardly explored. This is particularly evident if we bear in mind that the free sequence of sections, which caused the most sensation in the beginning, was merely one aspect of the complex concept of form that awaited exploitation. However the case may be, through these preoccupations, form acquired unprecedented autonomy, despite the astonishing authority granted (for the time being) to the performer. This is already observed in the work of Mallarmé, who concentrated far more on the structure of language than on its significance, or, in other words, attempted to convert this significance into a symbolism of absolute value. Form had a life of its own, bringing the artist to an attitude of anonymity, since the intrusion of purely personal incidents was undesirable. Those with some knowledge of Asian culture will hardly be surprised by this. But in Europe relationships are different, and particularly for those less gifted than Boulez it is fitting to recall the words of Paul Valéry, a confidant of Mallarmé. Concerning the latter's ambitions he spoke later (in his Lettre sur Mallarme) of 'diviniser la chose écrite' (divining that which is written). But, he went on, 'ce n'est point l'œuvre faite et ses apparences ou ses effets dans le monde qui peuvent nous accomplir et nous édifier, mais seule- ment la manière dont nous l'avons faite (it is not the finished work and its appearances, or its effects on the world, which can fulfill and edify us, but only the manner in which we have accomplished it). IO The concept of aleatory music has now broadened considerably, and we must certainly mention one other composer under this heading. We have already examined two aspects: action duration and the sponta- neous decision in Stockhausen, and intervention possibilities in Boulez. In the latter the performer is like a driver who may choose from a limited num- ber of roads, while the road map itself remains the domain of the town plan- ner. Boulez described Stockhausen's solution as chance, while Stockhausen used the term gelenkter Zufall (guided chance); but as we have seen, in reali- ty the element of chance was less present than one might imagine. All this only made the problem of form most acute, and the composer who was to draw particularly radical conclusions was the American John Cage. Cage came to Europe in 1958 - I remember a momentous concert at the World Exhibition in Brussels - and was quick to cause the necessary stir. From his point of view our controversy between tonality and atonality was long out- dated. He believed that modern serialists kept far too much to traditional paths, exposing themselves to a constant risk of academicism. A number of similarities, however, can also be found. Like Boulez, Cage's music reveals a pursuit of objectivity, or rather anonymity, which helps the sound to 'come to itself'. But his conclusions were much more radical. Instead of trying to bind the notes, his school attempted to soak off their adhesive, formed as it was by centuries of convention. If one hangs on to the notes, if one has 'musical' ideas, one cannot allow the notes to be themselves. And 'being themselves' means that there is no superimposed expression. (Many modern composers would go along with him up to this point, and the much older Varèse, with his 'liberation of the sound', was even a precursor.) And it also means that there is no man-made organisation. Thus, Cage reached a conclusion diametrically opposed to our early serialists: not com- plete determination, but rather complete indetermination was essential. (One of the most shocking experiences of recent times is to discover that both points of departure lead to the same degree of indetermination.) In order to achieve this indetermination, Cage used to make particular use of chance actions such as the tossing of coins, etc. Other means may also be employed, such as the oracle of the staves from the ancient Chinese book I-Ching (which illustrates the influence of Zen Buddhism on this composer), or mathemati- cal methods. More recently, however, the accent has shifted towards the unforeseeable- ness of the performance itself, involving the actual performers. It is remark- able how completely different paths form striking parallels with modern European composers! Fifty years earlier Charles Ives, following quite a differ- ent line of thought, created the same sort of music as that of the young Schönberg and Stravinsky. Despite the shift towards live performance, a score was naturally still required as an instruction for the players. But the score must not be viewed as a ready-made, notated form. And this is where Cage differs: the composition is not an autonomous object, but a performance process. Obviously, this process has its boundaries - determined by the action of the players and by a number of characteristics - but essentially the music has no precedence above either note or noise. While it does have its own exis- tence, it remains 'transparent' in relation to its surroundings. Its boundaries become diffuse, and counting is not required, for we exist in time'. Stopwatches rather than bars serve to indicate when an occurrence of sound must take place within this time. Christian Wolff, a composer from the Cage group, replaced Stockhausen's eye ('unintentional glancing') with the ear: cer- tain occurrences of sound, caused by the one player, evoke reactions from the other (Duo for Pianists II). The outcome is determined by the performers themselves; finally, musical form may be conceived as 'the length of the pro- gramme'.7 Cage is among those Westerners who have listened to the Japanese bow- 8 man in chapter 6. Just how far his interpretation is correct, we will leave to the experts. Is this still music? Surely we see an influence on contemporary music that cannot be underestimated. Can everybody do the same? But not everybody does, is Cage's reply. Strong differences of opinion emerge. It is impossible to imagine the fascinating whirlpool of new developments with- out Cage. Whether the music comes from inside or outside, we cannot escape it. 'One day when the windows were open, Christian Wolff played one of his pieces at the piano. Sounds of traffic, boat horns, were heard not only during the silences in the music but, being louder, were more easily heard than the piano sounds themselves. Afterwards, someone asked Christian Wolff to play the piece again with the windows closed. Christian Wolff said he'd be glad to, but that it wasn't really necessary, since the sounds of the environment were in no sense an interruption of those of the music.' II The above discussion helps us to clarify the concept of aleatory music. It is a generic term for all aspects of music that are not predetermined. The rela- tionship between determined and undetermined elements plays a role in all types of music. The undetermined element brings unforeseeableness with it, and can occur both in performance and during the process of composition. Unforeseeableness can be manifest in differing degrees. In the perform- ance of a classical composition, for example, the degree to which the fixated notation can be deviated from is limited. Performance of a piece by John Cage, on the other hand, can involve a high degree of unforeseeableness. But even here general patterns of expectation can be formulated. Finally, with regard to developments in the music of the period 1950-60, the following aspects are of importance: more 1. In Cage's work the element of chance to use this dubious word once - was a means to obtain indetermination and to escape from the human grasp of the music. Young European composers, on the other hand, were con- cerned with gaining even stricter control of the musical material: even this indeterminable area of free choice was consciously incorporated in the of composition. process 2. Bearing in mind changing concepts of musical form, we can say that part of what once belonged to the individual and 'unique' work of art is now ascribed to the material employed by the performers. There is a certain incli- nation to make matters absolute, which corresponds logically to the excessive attention given to musical material that we have observed from 1950 onwards. 3. Expansionism, moreover, is not foreign to serial technique, in the sense that there is an inclination to exploit all the possibilities of the chosen mate- rial. The limited means of dodecaphony of the past have been extended to become an all-embracing permutation procedure; it soon became apparent, however, that this again was not sufficient to harness the wealth of resources that had been rallied. A written serial score realises only a few of the count- less possibilities, and the free choice of the performer can at least compensate this to a certain extent. The element of chance becomes a wider margin in the realisation of the (unforeseeable) permutation process. Far from coincidental is the attendant departure from the unique, once-and-for-all determined work of art. A remarkable dichotomy seems to arise between the realised con- dition of a single work of art and the 'possibly realisable' that is potentially present in the same. Here creative expansionism collides with ultimate boundaries. 4. The element of chance can serve to fill another gap. With all due respect for their sometimes brilliant ideas, one can nonetheless consider that both Stockhausen and Boulez have maintained an only too simple notion of the role of what they call 'surprise' in the musical process. The former wrote: "The degree of information is therefore at its highest when at any point in a musi- cal discourse the moment of surprise is at its strongest: the music constantly has "something to say". (Just before this he specifies: 'Surprise only occurs when the unexpected happens.')" Boulez shares this opinion: "... for any music that is a masterpiece is a music that allows the capacity to surprise at any moment. This is not the place to contradict these ideas, but it is clear that from this point of view too, the involvement of the spontaneous decision of the per- former is most welcome: the 'surprise' within the boundaries of a work may increase, and the same goes for each subsequent performance. 5. Increasing differentiation posed considerable problems with regard to traditional notation, which was not at all equal to its task. By involving the performer, this difficulty was eased on the one hand, while on the other new symbols had to be introduced to indicate players' actions. It was inevitable that this issue also had to be tackled once more, as is described in section 14. 12 In the reaction against abstractions, serial music lost more and more influence after 1960. Boulez has remained a bastion of serial academicism, but Stockhausen has changed enormously. He is no longer the great renewer, but continues to react with great flexibility to any external stimulus that he encounters. He is long past the stage of solving problems of form and tech- nique. From Carré (1960) and Originale (1961) onwards his work comprises. ever more heterogeneous elements including happenings, pop, quotations, indeterminate sound production (contact microphones), etc. The use of contact microphones has now become very widespread, and this opens up a new direction in the application of electronic resources. In days past, electronic music was accurately recorded on tape in a studio. Many considered this an advantage: the composer exercised maximum control, while the inconstancies of live performance were eliminated. But this strict view could not be maintained, and in a next step (discussed in section 9) aleatory techniques were introduced, at first very cautiously among Europeans but after 1960 much more freely. Improvisation groups even appeared on stage working with electronic apparatus. The principle is simple: microphones attached to 'instruments' (that may or may not be recognisable as such) pick up vibrations that are normally neither audible nor usable and feed them to loudspeakers via amplifiers and possibly modulators. A new and hitherto unknown world of sound is brought to life. Unexpected surprises may occur too, and with them an immediate response from the performer. This was a typical feature of the post-1960 period. exper- Once again it was Cage who led the way with such experiments. More important, however, was his awareness of the situation. For in his first iments with chance phenomena he discovered that he was still attempting to drag 'successful' results out of chance actions. Realising later on that this atti- tude was equivocal, he came to accept the induced results of chance. The result was no longer important, but rather the attitude of open-mindedness. Thus, he came to distinguish between chance actions and indetermination. In the first case the composer employs chance as a means, but to a limited degree such that he remains within a self-determined global circle. Indetermination, on the contrary, exceeds this circle: the result is in every respect indefinite; such music crops up out of time, undefined and inciden- tal, only to disappear once more without a trace. All things are interrelated,' Cage said, and taken up in the stream of time. Any (human) pursuit of a stat- ed "aim" is a simplification, and a departure from reality.' The lessons of Cage were developed further by an American ‘second generation' around 1960. And once again the aesthetic consequences of the concept of indetermination were applied more radically than in Europe. In the work of La Monte Young, Terry Riley, Robert Ashley and the Fluxus Movement, almost all existing values and concepts relating to music were turned well and truly upside down. La Monte Young (1935) worked with long chains of chords that developed systematically. His material is economical, and naturally comprises all that is 'sound', including that produced by nature, machines, and electronic resources. Performances may last a week or more and incorporate other ele- ments such as light, movement and theatre. His contemporary Terry Riley followed the same course. His music consists of long chains of repeated motifs, usually in elementary diatonic note patterns. Tape loops and feedback systems provide the characteristic tone colours; electronic and instrumental resources merge. These and other Americans shared a broad interest in wide- ly different idioms including jazz, pop and non-Western music. Chance action - indetermination: many composers throughout the world now work within these borders. Only few are conscious of the background so brilliantly evoked by Cage in his writings. What is clear, however, is that serial concepts are disappearing; there is a growing reaction to their abstrac- tions and a tendency towards greater directness in music making. This is also expressed in the instrumental works of Berio, Ligeti, Kagel and others: music that is tailor-made for certain specialists, musicians who are required to make a creative contribution of their own rather than only faithfully reproduce a more or less authoritarian score. Such music renounces serial, abstractly deter- mined sound differentiation in favour of a more direct form of expression. Not only the actual notes, but sighs, scratches, shouts and moans become part of music making. The instrument literally becomes an extension of the human body. Similar tendencies are found in music theatre. This rather vague term embodies so much variety that a comprehensive definition can hardly be given. In general, it can be viewed as a reaction to traditional theatrical and operatic forms, which have caused the nineteenth century to live on, leaving current issues to the realm of film. The 'raree show' idea has also been aban- doned, since divisions between audience and stage, between different partic- ipating disciplines, required abolition. Various directions emerged, from the political engagement of Nono (Intolleranza, 1960) to the more light-hearted or autonomous approach of Kagel (Sur Scène, 1960) and Ligeti (Aventures, 1962). Nono connected with traditional opera, while Ligeti created a 'com- position with scenic, verbal and musical means'. Unlike the traditional Gesamtkunstwerk there is a tendency to grant the incorporated elements a life of their own, independent of one another and only joined by a common peri- od of time. Once again, vocal and instrumental techniques are extended to such a degree that the two flow together. All such innovations amount to repeated attempts to break through exist- ing boundaries! From the beginning of the twentieth century, the failure of instrument making to keep pace with musical developments made itself increasingly felt. Factories were usually highly industrialised, geared to the mass production of traditional instruments and leaving no room for altruis- tic research in an artistic sense. Today's composer must still make do with instruments developed hundreds of years ago: thus the continual expansion of playing techniques towards the boundaries of human endeavour; thus the contact microphones; and thus the ongoing specialisation of the few players devoted exclusively to new music. Use only the details found in the text above to inform your answer. Which composers are credited with creating and expanding the framework for aleatory composition in its early days?
The following prompt requires you to answer solely using the information found within the context block. Do not use any additional external information or prior knowledge to aid your response. Focus on the technological aspects rather than providing general information. Use as much of the context block as possible to fully answer the prompt. Keep the response easy-to-digest bullet points, expanding where necessary to provide essential context. Use simplified language that all ages can understand.
Summarise the stages of compiling and processing 3D graphics
3D Pipeline 2.4.1.2.1 Vertex Fetch (VF) Stage The VF stage executes 3DPRIMITIVE commands. Some enhancements have been included to better support legacy D3D APIs as well as SGI OpenGL*. 2.4.1.2.2 Vertex Shader (VS) Stage The VS stage performs shading of vertices output by the VF function. The VS unit produces an output vertex reference for every input vertex reference received from the VF unit, in the order received. Figure 7. Integrated Graphics Controller Unit Block Diagram Plane A Cursor B Sprite B Plane B Cursor A Sprite A Pipe B Pipe A Memory M U X VGA Video Engine 2D Engine 3D Engine Clipper Strip & Fan/Setup Alpha Blend/ Gamma /Panel Fitter Geometry Shader Vertex Fetch/Vertex Shader Windower/IZ Intel® FDI eDP Datasheet 29 Interfaces 2.4.1.2.3 Geometry Shader (GS) Stage The GS stage receives inputs from the VS stage. Compiled application-provided GS programs, specifying an algorithm to convert the vertices of an input object into some output primitives. For example, a GS shader may convert lines of a line strip into polygons representing a corresponding segment of a blade of grass centered on the line. Or it could use adjacency information to detect silhouette edges of triangles and output polygons extruding out from the edges. 2.4.1.2.4 Clip Stage The Clip stage performs general processing on incoming 3D objects. However, it also includes specialized logic to perform a Clip Test function on incoming objects. The Clip Test optimizes generalized 3D Clipping. The Clip unit examines the position of incoming vertices, and accepts/rejects 3D objects based on its Clip algorithm. 2.4.1.2.5 Strips and Fans (SF) Stage The SF stage performs setup operations required to rasterize 3D objects. The outputs from the SF stage to the Windower stage contain implementation-specific information required for the rasterization of objects and also supports clipping of primitives to some extent. 2.4.1.2.6 Windower/IZ (WIZ) Stage The WIZ unit performs an early depth test, which removes failing pixels and eliminates unnecessary processing overhead. The Windower uses the parameters provided by the SF unit in the object-specific rasterization algorithms. The WIZ unit rasterizes objects into the corresponding set of pixels. The Windower is also capable of performing dithering, whereby the illusion of a higher resolution when using low-bpp channels in color buffers is possible. Color dithering diffuses the sharp color bands seen on smooth-shaded objects. 2.4.1.3 Video Engine The Video Engine handles the non-3D (media/video) applications. It includes support for VLD and MPEG2 decode in hardware. 2.4.1.4 2D Engine The 2D Engine contains BLT (Block Level Transfer) functionality and an extensive set of 2D instructions. To take advantage of the 3D during engine’s functionality, some BLT functions make use of the 3D renderer. 2.4.1.4.1 Integrated Graphics VGA Registers The 2D registers consists of original VGA registers and others to support graphics modes that have color depths, resolutions, and hardware acceleration features that go beyond the original VGA standard. Interfaces 30 Datasheet 2.4.1.4.2 Logical 128-Bit Fixed BLT and 256 Fill Engine This BLT engine accelerates the GUI of Microsoft Windows* operating systems. The 128-bit BLT engine provides hardware acceleration of block transfers of pixel data for many common Windows operations. The BLT engine can be used for the following: • Move rectangular blocks of data between memory locations • Data alignment • To perform logical operations (raster ops) The rectangular block of data does not change, as it is transferred between memory locations. The allowable memory transfers are between: cacheable system memory and frame buffer memory, frame buffer memory and frame buffer memory, and within system memory. Data to be transferred can consist of regions of memory, patterns, or solid color fills. A pattern is always 8 x 8 pixels wide and may be 8, 16, or 32 bits per pixel. The BLT engine expands monochrome data into a color depth of 8, 16, or 32 bits. BLTs can be either opaque or transparent. Opaque transfers move the data specified to the destination. Transparent transfers compare destination color to source color and write according to the mode of transparency selected. Data is horizontally and vertically aligned at the destination. If the destination for the BLT overlaps with the source memory location, the BLT engine specifies which area in memory to begin the BLT transfer. Hardware is included for all 256 raster operations (source, pattern, and destination) defined by Microsoft, including transparent BLT. The BLT engine has instructions to invoke BLT and stretch BLT operations, permitting software to set up instruction buffers and use batch processing. The BLT engine can perform hardware clipping during BLTs.
System instruction: The following prompt requires you to answer solely using the information found within the context block. Do not use any additional external information or prior knowledge to aid your response. Focus on the technological aspects rather than providing general information. Use as much of the context block as possible to fully answer the prompt. Keep the response easy-to-digest bullet points, expanding where necessary to provide essential context. Use simplified language that all ages can understand. Question: Summarise the stages of compiling and processing 3D graphics 3D Pipeline 2.4.1.2.1 Vertex Fetch (VF) Stage The VF stage executes 3DPRIMITIVE commands. Some enhancements have been included to better support legacy D3D APIs as well as SGI OpenGL*. 2.4.1.2.2 Vertex Shader (VS) Stage The VS stage performs shading of vertices output by the VF function. The VS unit produces an output vertex reference for every input vertex reference received from the VF unit, in the order received. Figure 7. Integrated Graphics Controller Unit Block Diagram Plane A Cursor B Sprite B Plane B Cursor A Sprite A Pipe B Pipe A Memory M U X VGA Video Engine 2D Engine 3D Engine Clipper Strip & Fan/Setup Alpha Blend/ Gamma /Panel Fitter Geometry Shader Vertex Fetch/Vertex Shader Windower/IZ Intel® FDI eDP Datasheet 29 Interfaces 2.4.1.2.3 Geometry Shader (GS) Stage The GS stage receives inputs from the VS stage. Compiled application-provided GS programs, specifying an algorithm to convert the vertices of an input object into some output primitives. For example, a GS shader may convert lines of a line strip into polygons representing a corresponding segment of a blade of grass centered on the line. Or it could use adjacency information to detect silhouette edges of triangles and output polygons extruding out from the edges. 2.4.1.2.4 Clip Stage The Clip stage performs general processing on incoming 3D objects. However, it also includes specialized logic to perform a Clip Test function on incoming objects. The Clip Test optimizes generalized 3D Clipping. The Clip unit examines the position of incoming vertices, and accepts/rejects 3D objects based on its Clip algorithm. 2.4.1.2.5 Strips and Fans (SF) Stage The SF stage performs setup operations required to rasterize 3D objects. The outputs from the SF stage to the Windower stage contain implementation-specific information required for the rasterization of objects and also supports clipping of primitives to some extent. 2.4.1.2.6 Windower/IZ (WIZ) Stage The WIZ unit performs an early depth test, which removes failing pixels and eliminates unnecessary processing overhead. The Windower uses the parameters provided by the SF unit in the object-specific rasterization algorithms. The WIZ unit rasterizes objects into the corresponding set of pixels. The Windower is also capable of performing dithering, whereby the illusion of a higher resolution when using low-bpp channels in color buffers is possible. Color dithering diffuses the sharp color bands seen on smooth-shaded objects. 2.4.1.3 Video Engine The Video Engine handles the non-3D (media/video) applications. It includes support for VLD and MPEG2 decode in hardware. 2.4.1.4 2D Engine The 2D Engine contains BLT (Block Level Transfer) functionality and an extensive set of 2D instructions. To take advantage of the 3D during engine’s functionality, some BLT functions make use of the 3D renderer. 2.4.1.4.1 Integrated Graphics VGA Registers The 2D registers consists of original VGA registers and others to support graphics modes that have color depths, resolutions, and hardware acceleration features that go beyond the original VGA standard. Interfaces 30 Datasheet 2.4.1.4.2 Logical 128-Bit Fixed BLT and 256 Fill Engine This BLT engine accelerates the GUI of Microsoft Windows* operating systems. The 128-bit BLT engine provides hardware acceleration of block transfers of pixel data for many common Windows operations. The BLT engine can be used for the following: • Move rectangular blocks of data between memory locations • Data alignment • To perform logical operations (raster ops) The rectangular block of data does not change, as it is transferred between memory locations. The allowable memory transfers are between: cacheable system memory and frame buffer memory, frame buffer memory and frame buffer memory, and within system memory. Data to be transferred can consist of regions of memory, patterns, or solid color fills. A pattern is always 8 x 8 pixels wide and may be 8, 16, or 32 bits per pixel. The BLT engine expands monochrome data into a color depth of 8, 16, or 32 bits. BLTs can be either opaque or transparent. Opaque transfers move the data specified to the destination. Transparent transfers compare destination color to source color and write according to the mode of transparency selected. Data is horizontally and vertically aligned at the destination. If the destination for the BLT overlaps with the source memory location, the BLT engine specifies which area in memory to begin the BLT transfer. Hardware is included for all 256 raster operations (source, pattern, and destination) defined by Microsoft, including transparent BLT. The BLT engine has instructions to invoke BLT and stretch BLT operations, permitting software to set up instruction buffers and use batch processing. The BLT engine can perform hardware clipping during BLTs.
Your answer should use only the provided text; do not use any external resources. When responding, keep answers brief: your response should be no more than two short paragraphs, with a maximum of 50 words each. Use simple language that anyone could understand; rephrase complicated words and concepts, if necessary.
What are the most common causal side effects of this vaccine?
6.1 Clinical Trials Experience Because clinical trials are conducted under widely varying conditions, adverse reaction rates observed in the clinical trials of a vaccine cannot be directly compared with rates in the clinical trials of another vaccine and may not reflect the rates observed in practice. Moderna COVID-19 Vaccine (Original Monovalent) Administered as a Two-Dose Primary Series Participants 18 Years of Age and Older The safety of Moderna COVID-19 Vaccine was evaluated in an ongoing Phase 3 clinical trial with multiple parts. The randomized, placebo-controlled, observer-blind phase of the trial was conducted in the United States involving 30,346 participants 18 years of age and older who received at least one dose of Moderna COVID-19 Vaccine (100 mcg mRNA; n=15,184) or placebo (n=15,162) (Study 1, NCT04470427). Upon issuance of the Emergency Use Authorization (December 18, 2020) for Moderna COVID-19 Vaccine, participants were unblinded in a phased manner over a period of months to offer placebo participants Moderna COVID-19 Vaccine. The median duration of follow-up for safety after the second injection during the blinded phase was 4 months. The median duration of follow up for safety after the second injection including both the blinded phase and the open-label phase was 6 months. In Study 1, the median age of the population was 52 years (range 18-95); 75.2% of participants were 18 years through 64 years of age and 24.8% were 65 years of age and older. Overall, 52.6% of the participants were male, 47.4% were female, 20.5% were Hispanic or Latino, 79.2% were White, 10.2% were African American, 4.6% were Asian, 0.8% were American Indian or Alaska Native, 0.2% were Native Hawaiian or Pacific Islander, 2.0% were other races, and 2.1% were Multiracial. Demographic characteristics were similar between participants who received Moderna COVID-19 Vaccine and those who received placebo. Unsolicited Adverse Events Participants were monitored for unsolicited adverse events for 28 days following each dose. Serious adverse events and medically attended adverse events will be recorded for the entire study duration (2 years). Among the 30,346 participants who had received at least 1 dose of vaccine (N=15,184) or placebo (N=15,162), unsolicited adverse events that occurred within 28 days following any vaccination were reported by 31.3% of participants (n=4,752) who received Moderna COVID-19 Vaccine and 28.6% of participants (n=4,338) who received placebo. During the 28-day follow-up period following any dose, lymphadenopathy-related events were reported by 1.7% of vaccine recipients and 0.8% of placebo recipients. These events included lymphadenopathy, lymphadenitis, lymph node pain, vaccination-site lymphadenopathy, injection-site lymphadenopathy, and axillary mass. This imbalance is consistent with the imbalance observed for solicited axillary swelling/tenderness at the injected arm. During the 7-day follow-up period of any vaccination, hypersensitivity events of injection site 10 rash or injection site urticaria, likely related to vaccination, were reported by 6 participants in the Moderna COVID-19 Vaccine group and none in the placebo group. Delayed injection site reactions that began >7 days after vaccination were reported in 1.4% of vaccine recipients and 0.7% of placebo recipients. Delayed injection site reactions included pain, erythema, and swelling and are likely related to vaccination. In the blinded portion of the study, there were 8 reports of facial paralysis (including Bell’s palsy) in the Moderna COVID-19 Vaccine group, and 3 in the placebo group. In the 28-day follow-up period there were two cases of facial paralysis in the Moderna COVID-19 Vaccine group, which occurred on 8 and 22 days, respectively, after vaccination, and one in the placebo group, which occurred 17 days after vaccination. Currently available information on facial paralysis is insufficient to determine a causal relationship with the vaccine. In the blinded portion of the study, there were 50 reports of herpes zoster in the Moderna COVID-19 Vaccine group, and 23 in the placebo group. In the 28-day period after any vaccination, there were 22 cases of herpes zoster in the Moderna COVID-19 Vaccine group, and 15 in the placebo group. Currently available information on herpes zoster infection is insufficient to determine a causal relationship with the vaccine. There were no other notable patterns or numerical imbalances between treatment groups for specific categories of adverse events (including other neurologic, neuro-inflammatory, and thrombotic events) that would suggest a causal relationship to Moderna COVID-19 Vaccine. Serious Adverse Events During the blinded phase of the study, serious adverse events were reported by 1.8% (n=268) of participants who received Moderna COVID-19 Vaccine and 1.9% (n=292) of participants who received placebo. There were three serious adverse events of angioedema/facial swelling in the vaccine group in recipients with a history of injection of dermatological fillers. The onset of swelling was reported 1-2 days after the second dose and was likely related to vaccination. There were no other notable patterns or imbalances between treatment groups for specific categories of serious adverse events (including neurologic, neuro-inflammatory, and thrombotic events) that would suggest a causal relationship to Moderna COVID-19 Vaccine. Participants 12 Years Through 17 Years of Age The safety of Moderna COVID-19 Vaccine was evaluated in an ongoing Phase 3 clinical trial with multiple parts. The randomized, placebo-controlled, observer-blind clinical trial was conducted in the United States involving 3,726 participants 12 years through 17 years of age who received at least one dose of Moderna COVID-19 Vaccine (100 mcg mRNA; n=2,486) or placebo (n=1,240) (Study 3, NCT04649151). Participants started to enter an open-label, observational phase after May 10, 2021. After October 1, 2021, cases of potential myocarditis and/or pericarditis that were identified by the investigator or Applicant were adjudicated by an 11 independent Cardiac Event Adjudication Committee (CEAC) to determine if they met the CDC definition of confirmed or probable myocarditis and/or pericarditis. A safety analysis was conducted in participants who received Moderna COVID-19 Vaccine (n=2,486) with a cut-off date of January 31, 2022. In these analyses, the median duration of follow-up including both the blinded and open-label phases was 312 days after Dose 2 and 95.7% of study participants had at least 6 months of follow-up after Dose 2. Overall, 51.4% were male, 48.6% were female, 11.6% were Hispanic or Latino, 83.8% were White, 3.4% were African American, 6.0% were Asian, 0.5% were American Indian or Alaska Native, <0.1% were Native Hawaiian or Pacific Islander, 1.0% were other races, and 4.5% were Multiracial. Demographic characteristics were similar among participants who received Moderna COVID-19 Vaccine and those who received placebo. Unsolicited Adverse Events Participants were monitored for unsolicited adverse events for 28 days following each dose. Serious adverse events and medically attended adverse events were recorded for the entire study duration. Among the 3,726 participants who had received at least 1 dose of vaccine (n=2,486) or placebo (n=1,240), unsolicited adverse events that occurred within 28 days following any vaccination were reported by 23.4% of participants (n=582) who received Moderna COVID-19 Vaccine and 19.1% of participants (n=237) who received placebo.
Your answer should use only the provided text; do not use any external resources. When responding, keep answers brief: your response should be no more than two short paragraphs, with a maximum of 50 words each. Use simple language that anyone could understand; rephrase complicated words and concepts, if necessary. Provided text: 6.1 Clinical Trials Experience Because clinical trials are conducted under widely varying conditions, adverse reaction rates observed in the clinical trials of a vaccine cannot be directly compared with rates in the clinical trials of another vaccine and may not reflect the rates observed in practice. Moderna COVID-19 Vaccine (Original Monovalent) Administered as a Two-Dose Primary Series Participants 18 Years of Age and Older The safety of Moderna COVID-19 Vaccine was evaluated in an ongoing Phase 3 clinical trial with multiple parts. The randomized, placebo-controlled, observer-blind phase of the trial was conducted in the United States involving 30,346 participants 18 years of age and older who received at least one dose of Moderna COVID-19 Vaccine (100 mcg mRNA; n=15,184) or placebo (n=15,162) (Study 1, NCT04470427). Upon issuance of the Emergency Use Authorization (December 18, 2020) for Moderna COVID-19 Vaccine, participants were unblinded in a phased manner over a period of months to offer placebo participants Moderna COVID-19 Vaccine. The median duration of follow-up for safety after the second injection during the blinded phase was 4 months. The median duration of follow up for safety after the second injection including both the blinded phase and the open-label phase was 6 months. In Study 1, the median age of the population was 52 years (range 18-95); 75.2% of participants were 18 years through 64 years of age and 24.8% were 65 years of age and older. Overall, 52.6% of the participants were male, 47.4% were female, 20.5% were Hispanic or Latino, 79.2% were White, 10.2% were African American, 4.6% were Asian, 0.8% were American Indian or Alaska Native, 0.2% were Native Hawaiian or Pacific Islander, 2.0% were other races, and 2.1% were Multiracial. Demographic characteristics were similar between participants who received Moderna COVID-19 Vaccine and those who received placebo. Unsolicited Adverse Events Participants were monitored for unsolicited adverse events for 28 days following each dose. Serious adverse events and medically attended adverse events will be recorded for the entire study duration (2 years). Among the 30,346 participants who had received at least 1 dose of vaccine (N=15,184) or placebo (N=15,162), unsolicited adverse events that occurred within 28 days following any vaccination were reported by 31.3% of participants (n=4,752) who received Moderna COVID-19 Vaccine and 28.6% of participants (n=4,338) who received placebo. During the 28-day follow-up period following any dose, lymphadenopathy-related events were reported by 1.7% of vaccine recipients and 0.8% of placebo recipients. These events included lymphadenopathy, lymphadenitis, lymph node pain, vaccination-site lymphadenopathy, injection-site lymphadenopathy, and axillary mass. This imbalance is consistent with the imbalance observed for solicited axillary swelling/tenderness at the injected arm. During the 7-day follow-up period of any vaccination, hypersensitivity events of injection site 10 rash or injection site urticaria, likely related to vaccination, were reported by 6 participants in the Moderna COVID-19 Vaccine group and none in the placebo group. Delayed injection site reactions that began >7 days after vaccination were reported in 1.4% of vaccine recipients and 0.7% of placebo recipients. Delayed injection site reactions included pain, erythema, and swelling and are likely related to vaccination. In the blinded portion of the study, there were 8 reports of facial paralysis (including Bell’s palsy) in the Moderna COVID-19 Vaccine group, and 3 in the placebo group. In the 28-day follow-up period there were two cases of facial paralysis in the Moderna COVID-19 Vaccine group, which occurred on 8 and 22 days, respectively, after vaccination, and one in the placebo group, which occurred 17 days after vaccination. Currently available information on facial paralysis is insufficient to determine a causal relationship with the vaccine. In the blinded portion of the study, there were 50 reports of herpes zoster in the Moderna COVID-19 Vaccine group, and 23 in the placebo group. In the 28-day period after any vaccination, there were 22 cases of herpes zoster in the Moderna COVID-19 Vaccine group, and 15 in the placebo group. Currently available information on herpes zoster infection is insufficient to determine a causal relationship with the vaccine. There were no other notable patterns or numerical imbalances between treatment groups for specific categories of adverse events (including other neurologic, neuro-inflammatory, and thrombotic events) that would suggest a causal relationship to Moderna COVID-19 Vaccine. Serious Adverse Events During the blinded phase of the study, serious adverse events were reported by 1.8% (n=268) of participants who received Moderna COVID-19 Vaccine and 1.9% (n=292) of participants who received placebo. There were three serious adverse events of angioedema/facial swelling in the vaccine group in recipients with a history of injection of dermatological fillers. The onset of swelling was reported 1-2 days after the second dose and was likely related to vaccination. There were no other notable patterns or imbalances between treatment groups for specific categories of serious adverse events (including neurologic, neuro-inflammatory, and thrombotic events) that would suggest a causal relationship to Moderna COVID-19 Vaccine. Participants 12 Years Through 17 Years of Age The safety of Moderna COVID-19 Vaccine was evaluated in an ongoing Phase 3 clinical trial with multiple parts. The randomized, placebo-controlled, observer-blind clinical trial was conducted in the United States involving 3,726 participants 12 years through 17 years of age who received at least one dose of Moderna COVID-19 Vaccine (100 mcg mRNA; n=2,486) or placebo (n=1,240) (Study 3, NCT04649151). Participants started to enter an open-label, observational phase after May 10, 2021. After October 1, 2021, cases of potential myocarditis and/or pericarditis that were identified by the investigator or Applicant were adjudicated by an 11 independent Cardiac Event Adjudication Committee (CEAC) to determine if they met the CDC definition of confirmed or probable myocarditis and/or pericarditis. A safety analysis was conducted in participants who received Moderna COVID-19 Vaccine (n=2,486) with a cut-off date of January 31, 2022. In these analyses, the median duration of follow-up including both the blinded and open-label phases was 312 days after Dose 2 and 95.7% of study participants had at least 6 months of follow-up after Dose 2. Overall, 51.4% were male, 48.6% were female, 11.6% were Hispanic or Latino, 83.8% were White, 3.4% were African American, 6.0% were Asian, 0.5% were American Indian or Alaska Native, <0.1% were Native Hawaiian or Pacific Islander, 1.0% were other races, and 4.5% were Multiracial. Demographic characteristics were similar among participants who received Moderna COVID-19 Vaccine and those who received placebo. Unsolicited Adverse Events Participants were monitored for unsolicited adverse events for 28 days following each dose. Serious adverse events and medically attended adverse events were recorded for the entire study duration. Among the 3,726 participants who had received at least 1 dose of vaccine (n=2,486) or placebo (n=1,240), unsolicited adverse events that occurred within 28 days following any vaccination were reported by 23.4% of participants (n=582) who received Moderna COVID-19 Vaccine and 19.1% of participants (n=237) who received placebo. What are the most common causal side effects of this vaccine?
<TASK DESCRIPTION> Only use the provided text to answer the question, no outside sources. <QUESTION> [user request] <TEXT> [context document]
What does cholelithiasis mean and how serious is it? Provide a list of symptoms in bullet points. You're my doctor and have personal experience with gallbladder issues.
Gallstones Gallstones (cholelithiasis) are hardened pieces of bile that form in your gallbladder or bile ducts. They’re common, especially in women and people assigned female at birth. Gallstones don’t always cause problems, but they can if they get stuck in your biliary tract and block your bile flow. If your gallstones cause you symptoms, you’ll need treatment to remove them — typically, surgery. Contents Overview Symptoms and Causes Diagnosis and Tests Management and Treatment Prevention Outlook / Prognosis Living With Overview Gallstones the gallbladder, along with small intestine and pancreas Gallstones are hardened pieces of bile sediment that can form in your gallbladder. What are gallstones? Gallstones are hardened, concentrated pieces of bile that form in your gallbladder or bile ducts. “Gall” means bile, so gallstones are bile stones. Your gallbladder is your bile bladder. It holds and stores bile for later use. Your liver makes bile, and your bile ducts carry it to the different organs in your biliary tract. Healthcare providers sometimes use the term “cholelithiasis” to describe the condition of having gallstones. “Chole” also means bile, and “lithiasis” means stones forming. Gallstones form when bile sediment collects and crystallizes. Often, the sediment is an excess of one of the main ingredients in bile. How serious are gallstones? Gallstones (cholelithiasis) won’t necessarily cause any problems for you. A lot of people have them and never know it. But gallstones can become dangerous if they start to travel through your biliary tract and get stuck somewhere. They can clog up your biliary tract, causing pain and serious complications. The problem with gallstones is that they grow — slowly, but surely — as bile continues to wash over them and leave another layer of sediment. What begins as a grain of sand can grow big enough to stop the flow of bile, especially if it gets into a narrow space, like a bile duct or the neck of your gallbladder. How common are gallstones (cholelithiasis)? At least 10% of U.S. adults have gallstones, and up to 75% of them are women and people assigned female at birth (AFAB). But only 20% of those diagnosed will ever have symptoms or need treatment for gallstones. Symptoms and Causes Christine Lee, MD explains what gallstones are and how they’re treated. What are gallstones symptoms? Gallstones generally don’t cause symptoms unless they get stuck and create a blockage. This blockage causes symptoms, most commonly upper abdominal pain and nausea. These may come and go, or they may come and stay. You might develop other symptoms if the blockage is severe or lasts a long time, like: Sweating. Fever. Fast heart rate. Abdominal swelling and tenderness. Yellow tint to your skin and eyes. Dark-colored pee and light-colored poop. What is gallstone pain like? Typical gallstone pain is sudden and severe and may make you sick to your stomach. This is called a gallstone attack or gallbladder attack. You might feel it most severely after eating, when your gallbladder contracts, creating more pressure in your biliary system. It might wake you from sleep. Gallstone pain that builds to a peak and then slowly fades is called biliary colic. It comes in episodes that may last minutes to hours. The episode ends when and if the stone moves or the pressure eases. People describe the pain as intense, sharp, stabbing, cramping or squeezing. You might be unable to sit still. Where is gallstone pain located? Your biliary system is located in the upper right quadrant of your abdomen, which is under your right ribcage. Most people feel gallstone pain in this region. But sometimes, it can radiate to other areas. Some people feel it in their right arm or shoulder or in their back between their shoulder blades. Some people feel gallstone pain in the middle of their abdomen or chest. This can be confusing because the feeling might resemble other conditions. Some people mistake gallstone pain for heartburn or indigestion. Others might feel like they’re having a heart attack, which is a different emergency. Are gallstones symptoms different in a female? Gallstone symptoms aren’t different in women or people assigned female at birth (AFAB). But people AFAB may be more likely to experience referred pain — pain that you feel in a different place from where it started. So, they may be more likely to experience gallstone pain in their arm, shoulder, chest or back. People AFAB are also more prone to chronic pain, and they may be more likely to dismiss pain that comes and goes, like biliary colic does. It’s important to see a healthcare provider about any severe or recurring pain, even if it goes away. Once you’ve had a gallstone attack, you’re likely to have another. What triggers gallstone pain? Gallstone pain means that a gallstone has gotten stuck in your biliary tract and caused a blockage. If it’s a major blockage, you might feel it right away. If it’s only a partial blockage, you might not notice until your gallbladder contracts, creating more pressure in your system. Eating triggers this contraction. A rich, heavy or fatty meal will trigger a bigger gallbladder contraction. That’s because your small intestine detects the fat content in your meal and tells your gallbladder how much bile it will need to help break it down. Your gallbladder responds by squeezing the needed bile out into your bile ducts.
<TASK DESCRIPTION> Only use the provided text to answer the question, no outside sources. <QUESTION> What does cholelithiasis mean and how serious is it? Provide a list of symptoms in bullet points. You're my doctor and have personal experience with gallbladder issues. <TEXT> Gallstones Gallstones (cholelithiasis) are hardened pieces of bile that form in your gallbladder or bile ducts. They’re common, especially in women and people assigned female at birth. Gallstones don’t always cause problems, but they can if they get stuck in your biliary tract and block your bile flow. If your gallstones cause you symptoms, you’ll need treatment to remove them — typically, surgery. Contents Overview Symptoms and Causes Diagnosis and Tests Management and Treatment Prevention Outlook / Prognosis Living With Overview Gallstones the gallbladder, along with small intestine and pancreas Gallstones are hardened pieces of bile sediment that can form in your gallbladder. What are gallstones? Gallstones are hardened, concentrated pieces of bile that form in your gallbladder or bile ducts. “Gall” means bile, so gallstones are bile stones. Your gallbladder is your bile bladder. It holds and stores bile for later use. Your liver makes bile, and your bile ducts carry it to the different organs in your biliary tract. Healthcare providers sometimes use the term “cholelithiasis” to describe the condition of having gallstones. “Chole” also means bile, and “lithiasis” means stones forming. Gallstones form when bile sediment collects and crystallizes. Often, the sediment is an excess of one of the main ingredients in bile. How serious are gallstones? Gallstones (cholelithiasis) won’t necessarily cause any problems for you. A lot of people have them and never know it. But gallstones can become dangerous if they start to travel through your biliary tract and get stuck somewhere. They can clog up your biliary tract, causing pain and serious complications. The problem with gallstones is that they grow — slowly, but surely — as bile continues to wash over them and leave another layer of sediment. What begins as a grain of sand can grow big enough to stop the flow of bile, especially if it gets into a narrow space, like a bile duct or the neck of your gallbladder. How common are gallstones (cholelithiasis)? At least 10% of U.S. adults have gallstones, and up to 75% of them are women and people assigned female at birth (AFAB). But only 20% of those diagnosed will ever have symptoms or need treatment for gallstones. Symptoms and Causes Christine Lee, MD explains what gallstones are and how they’re treated. What are gallstones symptoms? Gallstones generally don’t cause symptoms unless they get stuck and create a blockage. This blockage causes symptoms, most commonly upper abdominal pain and nausea. These may come and go, or they may come and stay. You might develop other symptoms if the blockage is severe or lasts a long time, like: Sweating. Fever. Fast heart rate. Abdominal swelling and tenderness. Yellow tint to your skin and eyes. Dark-colored pee and light-colored poop. What is gallstone pain like? Typical gallstone pain is sudden and severe and may make you sick to your stomach. This is called a gallstone attack or gallbladder attack. You might feel it most severely after eating, when your gallbladder contracts, creating more pressure in your biliary system. It might wake you from sleep. Gallstone pain that builds to a peak and then slowly fades is called biliary colic. It comes in episodes that may last minutes to hours. The episode ends when and if the stone moves or the pressure eases. People describe the pain as intense, sharp, stabbing, cramping or squeezing. You might be unable to sit still. Where is gallstone pain located? Your biliary system is located in the upper right quadrant of your abdomen, which is under your right ribcage. Most people feel gallstone pain in this region. But sometimes, it can radiate to other areas. Some people feel it in their right arm or shoulder or in their back between their shoulder blades. Some people feel gallstone pain in the middle of their abdomen or chest. This can be confusing because the feeling might resemble other conditions. Some people mistake gallstone pain for heartburn or indigestion. Others might feel like they’re having a heart attack, which is a different emergency. Are gallstones symptoms different in a female? Gallstone symptoms aren’t different in women or people assigned female at birth (AFAB). But people AFAB may be more likely to experience referred pain — pain that you feel in a different place from where it started. So, they may be more likely to experience gallstone pain in their arm, shoulder, chest or back. People AFAB are also more prone to chronic pain, and they may be more likely to dismiss pain that comes and goes, like biliary colic does. It’s important to see a healthcare provider about any severe or recurring pain, even if it goes away. Once you’ve had a gallstone attack, you’re likely to have another. What triggers gallstone pain? Gallstone pain means that a gallstone has gotten stuck in your biliary tract and caused a blockage. If it’s a major blockage, you might feel it right away. If it’s only a partial blockage, you might not notice until your gallbladder contracts, creating more pressure in your system. Eating triggers this contraction. A rich, heavy or fatty meal will trigger a bigger gallbladder contraction. That’s because your small intestine detects the fat content in your meal and tells your gallbladder how much bile it will need to help break it down. Your gallbladder responds by squeezing the needed bile out into your bile ducts. https://my.clevelandclinic.org/health/diseases/7313-gallstones
Answer the question using only the provided text. No external sources or prior knowledge is allowed.
What are all the positive and negative aspects of drone usage mentioned in the text?
A Cautionary Tale of Drone (Mis)use Military-grade drones were a restricted technology until local government agencies saw drones’ potential for search-and-rescue missions and private companies wanted to use drones for labor-intensive tasks, such as inspecting pipelines, delivering goods to remote areas, and spraying pesticides on farms. 22 The exploitation of drones for commercial profit soon created a civilian drone industry wherein the United States alone currently contains some 727,000 commercial drones and 1.69 million recreational small drones, with the numbers forecast to continue growing.23 The drone industry’s growth has taken place in the last few years, as the Federal Aviation Administration, concerned more with air safety than terrorist ambitions, did not issue the first commercial drone permit until 2006, lifting some of the restrictions on flying consumer drones for recreational and business purposes. Even then, the authorities were aware that , as Don Rassler has documented, four terrorist groups—the Japanese Aum Shinrikyo, the Colombia-based Revolutionary Armed Forces of Colombia, the Pakistan-based Lashkar-eTaiba, and the Haqqani network—were already exploring the use of unmanned aerial vehicles for terrorist attacks. The Lashkar-e-Taiba case involved a network of US residents who directly acquired sensitive technology from US companies in 2002 to enhance the performance of unmanned airplanes. Lashkar-e-Taiba intended to ship the technologies, which US companies could sell to domestic customers—mainly universities and the US government—without due diligence, for the group’s military use in Kashmir. Several other terrorist groups also had their own drone programs, adapting Iranian models or reverse engineering stolen military drones—initially, for surveillance and the collection of tactical intelligence, external communications, and the smuggling of materiel into denied areas, and then, for use as weapons.24 Perhaps more interesting are the creative uses of drones individuals with no terrorist intent have found but that may cause harm, nonetheless. In December 2008, an American hobbyist successfully attached a pistol with a digital-camera gunsight to a minicopter and remotely fired the pistol. The hobbyist filmed his stunt and posted the footage online. The video did not attract much media attention, but almost seven years later, another American, a teenager, “upped the ante and the shock value” by mounting a homemade flamethrower to a small commercial drone he had modified and displaying the accuracy of the weapon in an online video.25 Violent actors easily could have replicated both stunts to stage terrorist attacks. Even after the hobbyists’ stunts, several influential studies considered terrorists’ use of drones a “niche threat” because few terrorist groups had successfully deployed drones in any meaningful way.26 When the Islamic State of Iraq and Syria began weaponizing civilian drones and filming its attacks for propaganda purposes in 2016, several terrorism experts warned violent extremists could one day use drones as remote-controlled missiles to deliver unconventional weapons, such as deadly nerve agents.27 Meanwhile, the general consensus remained that though drones might complicate conflicts, drones’ broader impact would be limited, given their small payloads, short flight times, and susceptibility to disruption. Additionally, although technological advancements might make civilian drones more capable, “the tools to counter, disable or defeat [drones] will be more capable too,” as will regulatory changes to restrict airspace access and increase export controls to prevent terrorists from acquiring certain technologies.28 Today, many governments require registrations for consumer drones that are heavier than seven kilograms. In addition, most governments have banned consumer drones from flying in cities, near sensitive installations, and over iconic events and other large gatherings, except with special permits. Since those with malevolent intentions usually do not apply for permits, jamming devices have also proliferated, as have geofencing technologies for disabling drones that are approaching designated no-fly zones. Nonetheless, the Houthis’ recent success in disrupting the Red Sea shipping route will likely inspire copycats. The Strait of Malacca, for instance, is another global trade route with several choke points. Any threat to shipping in this narrow channel bordered by Indonesia, Malaysia, Singapore, and Thailand will severely impact economies in East Asia and cause ripple effects throughout the rest of the world. Weaponized drones will be a game changer for Southeast Asian terrorist groups. During the siege of Marawi City, Philippines, in June 2017, pro–Islamic State of Iraq and Syria militants reportedly used consumer-grade quadcopter drones to track, evade, and coordinate attacks on Philippine soldiers, inspiring the Philippine military to use similar drones. 29 But regional authorities apparently judged the drone use in Marawi City to be an outlier, a tactic imported by foreign fighters. The prevailing assessment is Southeast Asian terrorist groups like Jemaah Islamiyah and the various pro–Islamic State of Iraq and Syria offshoots in Indonesia and Malaysia will not expend their limited resources on drones when the supply of suicide bombers is seemingly unlimited. The use of drones for terrorist attacks is nevertheless a growing concern in Southeast Asia. Recent developments indicate Indonesian terrorists are hoping to acquire drone-warfare capability. In May 2023, the Indonesian counterterrorism unit Densus 88 obtained intelligence that Indonesian nationals whom the unit suspected of being affiliated with al-Qaeda in the Arabian Peninsula were undergoing training to fly drones in Yemen. Individuals affiliated with pro–Islamic State of Iraq and Syria militant factions were also sharing tutorials on how to make “drone bombs” with members of their private social-media chat groups.
System instruction: Answer the question using only the provided text. No external sources or prior knowledge is allowed. User question: What are all the positive and negative aspects of drone usage mentioned in the text? Context block: A Cautionary Tale of Drone (Mis)use Military-grade drones were a restricted technology until local government agencies saw drones’ potential for search-and-rescue missions and private companies wanted to use drones for labor-intensive tasks, such as inspecting pipelines, delivering goods to remote areas, and spraying pesticides on farms. 22 The exploitation of drones for commercial profit soon created a civilian drone industry wherein the United States alone currently contains some 727,000 commercial drones and 1.69 million recreational small drones, with the numbers forecast to continue growing.23 The drone industry’s growth has taken place in the last few years, as the Federal Aviation Administration, concerned more with air safety than terrorist ambitions, did not issue the first commercial drone permit until 2006, lifting some of the restrictions on flying consumer drones for recreational and business purposes. Even then, the authorities were aware that , as Don Rassler has documented, four terrorist groups—the Japanese Aum Shinrikyo, the Colombia-based Revolutionary Armed Forces of Colombia, the Pakistan-based Lashkar-eTaiba, and the Haqqani network—were already exploring the use of unmanned aerial vehicles for terrorist attacks. The Lashkar-e-Taiba case involved a network of US residents who directly acquired sensitive technology from US companies in 2002 to enhance the performance of unmanned airplanes. Lashkar-e-Taiba intended to ship the technologies, which US companies could sell to domestic customers—mainly universities and the US government—without due diligence, for the group’s military use in Kashmir. Several other terrorist groups also had their own drone programs, adapting Iranian models or reverse engineering stolen military drones—initially, for surveillance and the collection of tactical intelligence, external communications, and the smuggling of materiel into denied areas, and then, for use as weapons.24 Perhaps more interesting are the creative uses of drones individuals with no terrorist intent have found but that may cause harm, nonetheless. In December 2008, an American hobbyist successfully attached a pistol with a digital-camera gunsight to a minicopter and remotely fired the pistol. The hobbyist filmed his stunt and posted the footage online. The video did not attract much media attention, but almost seven years later, another American, a teenager, “upped the ante and the shock value” by mounting a homemade flamethrower to a small commercial drone he had modified and displaying the accuracy of the weapon in an online video.25 Violent actors easily could have replicated both stunts to stage terrorist attacks. Even after the hobbyists’ stunts, several influential studies considered terrorists’ use of drones a “niche threat” because few terrorist groups had successfully deployed drones in any meaningful way.26 When the Islamic State of Iraq and Syria began weaponizing civilian drones and filming its attacks for propaganda purposes in 2016, several terrorism experts warned violent extremists could one day use drones as remote-controlled missiles to deliver unconventional weapons, such as deadly nerve agents.27 Meanwhile, the general consensus remained that though drones might complicate conflicts, drones’ broader impact would be limited, given their small payloads, short flight times, and susceptibility to disruption. Additionally, although technological advancements might make civilian drones more capable, “the tools to counter, disable or defeat [drones] will be more capable too,” as will regulatory changes to restrict airspace access and increase export controls to prevent terrorists from acquiring certain technologies.28 Today, many governments require registrations for consumer drones that are heavier than seven kilograms. In addition, most governments have banned consumer drones from flying in cities, near sensitive installations, and over iconic events and other large gatherings, except with special permits. Since those with malevolent intentions usually do not apply for permits, jamming devices have also proliferated, as have geofencing technologies for disabling drones that are approaching designated no-fly zones. Nonetheless, the Houthis’ recent success in disrupting the Red Sea shipping route will likely inspire copycats. The Strait of Malacca, for instance, is another global trade route with several choke points. Any threat to shipping in this narrow channel bordered by Indonesia, Malaysia, Singapore, and Thailand will severely impact economies in East Asia and cause ripple effects throughout the rest of the world. Weaponized drones will be a game changer for Southeast Asian terrorist groups. During the siege of Marawi City, Philippines, in June 2017, pro–Islamic State of Iraq and Syria militants reportedly used consumer-grade quadcopter drones to track, evade, and coordinate attacks on Philippine soldiers, inspiring the Philippine military to use similar drones. 29 But regional authorities apparently judged the drone use in Marawi City to be an outlier, a tactic imported by foreign fighters. The prevailing assessment is Southeast Asian terrorist groups like Jemaah Islamiyah and the various pro–Islamic State of Iraq and Syria offshoots in Indonesia and Malaysia will not expend their limited resources on drones when the supply of suicide bombers is seemingly unlimited. The use of drones for terrorist attacks is nevertheless a growing concern in Southeast Asia. Recent developments indicate Indonesian terrorists are hoping to acquire drone-warfare capability. In May 2023, the Indonesian counterterrorism unit Densus 88 obtained intelligence that Indonesian nationals whom the unit suspected of being affiliated with al-Qaeda in the Arabian Peninsula were undergoing training to fly drones in Yemen. Individuals affiliated with pro–Islamic State of Iraq and Syria militant factions were also sharing tutorials on how to make “drone bombs” with members of their private social-media chat groups.
Avoid using information outside of the provided text.
What are the benefits of high-quality staff?
Financial intermediaries reduce transaction, information and search costs mainly by exploiting economies of scale. By increasing the volume of transactions, the cost per unit of transaction decreases. Moreover, by focusing on growing in size, financial intermediaries are able to draw standardised contracts and monitor customers so that they enforce these contracts. They also train high-quality staff to assist in the process of finding and monitoring suitable units in deficit (borrowers). It would be very difficult, time-consuming and costly for an individual to do so. Financial intermediaries can reduce risks by ‘pooling’, or aggregating, individual risks so that in normal circumstances, surplus units will be depositing money as deficit units make withdrawals. This enables banks, for instance, to collect relatively liquid deposits and invest most of them in long-term assets. Another way to look at this situation is that large groups of depositors are able to obtain liquidity from the banks while investing savings in illiquid but more profitable investments (Diamond and Dybvig, 1983).
Avoid using information outside of the provided text. Financial intermediaries reduce transaction, information and search costs mainly by exploiting economies of scale. By increasing the volume of transactions, the cost per unit of transaction decreases. Moreover, by focusing on growing in size, financial intermediaries are able to draw standardised contracts and monitor customers so that they enforce these contracts. They also train high-quality staff to assist in the process of finding and monitoring suitable units in deficit (borrowers). It would be very difficult, time-consuming and costly for an individual to do so. Financial intermediaries can reduce risks by ‘pooling’, or aggregating, individual risks so that in normal circumstances, surplus units will be depositing money as deficit units make withdrawals. This enables banks, for instance, to collect relatively liquid deposits and invest most of them in long-term assets. Another way to look at this situation is that large groups of depositors are able to obtain liquidity from the banks while investing savings in illiquid but more profitable investments (Diamond and Dybvig, 1983). What are the benefits of high-quality staff?
When responding, restrict yourself to only information found within the given article - no other information is valid or necessary.
How should we as a labor hire provider respond if a labor hire worker refuses to carry out work due to safety concerns?
GUIDE | Labour hire: duties of persons conducting a business or undertaking Page 1 of 7 Labour hire: duties of persons conducting a business or undertaking This Guide provides information for persons conducting a business or undertaking (PCBUs) involving the supply of workers (labour hire PCBUs) to work for another business or undertaking (host PCBUs) on complying with their health and safety duties under the model Work Health and Safety (WHS) laws. Model Work Health and Safety Act and labour hire arrangements Labour hire arrangements are covered by the model WHS Act. The primary duty of care under the model WHS Act is owed by a PCBU to a ‘worker’, which includes a labour hire worker. All labour hire PCBUs and host PCBUs have a primary duty of care to ensure, so far as is reasonably practicable, the health and safety of labour hire workers engaged by, or caused to be engaged by them, or whose activities are influenced or directed by the PCBU. The model WHS Act provides that more than one duty holder may have the same duty, in this instance a labour hire PCBU and a host PCBU. Labour hire arrangements can be complex. In some circumstances, there may be more than one labour hire or host PCBU. If more than one person has a duty for the same matter, each person must meet their duty to the extent to which they have the capacity to influence and control the matter. A labour hire PCBU or host PCBU may exercise influence and control over a relevant matter through, for example, the terms of a contract or directing workers in a practical sense. However, duty holders cannot contract out of or transfer their WHS obligations to another person. Consultation between PCBUs All duty holders in a labour hire arrangement must consult, cooperate and coordinate with each other so far as is reasonably practicable. Each duty holder should share information to find out who is doing what and work together in a cooperative and coordinated way to ensure compliance with WHS laws. For example, host and labour hire PCBUs must discuss consultation arrangements, the hazards and risks associated with the work, what precautions will be taken to ensure the health and safety of the labour hire worker and the respective roles the organisations in responding to an incident. Some labour hire PCBUs may have substantial knowledge of WHS issues and risk management practices in their industry that may assist in assessing the practices of a host PCBU and ensuring compliance with WHS laws. Duty holders should not assume that someone else is taking care of a health and GUIDE | Labour hire: duties of persons conducting a business or undertaking Page 2 of 7 safety matter. Find out who is doing what and work together with other duty holders so risks are eliminated or minimised as far as is reasonably practicable. What is reasonable practicable will depend on the circumstances. Relevant issues for duty holders to discuss will depend on the circumstances. These may include: • hazards and risks that may arise, taking into account things like the physical environment where work will occur • control measures to eliminate or minimise risks and the suitability of those measures • compliance with minimum requirements set by legislation, such as the WHS laws • how work will be carried out (including safe work methods and processes that are already in place or need to be in place) • the people involved in the work (including supervision arrangements) • competency and training requirements, including arrangements for the provision of additional training required for the particular work • arrangements for facilitating assessments of the individual worker’s needs and/or competencies, as appropriate • arrangements for health monitoring and relevant vaccinations • the respective roles of the organisations in responding to an incident, as well as relevant policies and procedures, and • any other factors which may impact the work environment and how work is carried out. Like all PCBUs, labour hire and host PCBUs are required to be proactive in managing hazards and risks. The duties in the model WHS Act are ongoing and must be complied with throughout the labour hire arrangement. Be aware that circumstances can change over time and this may result in a change in the hazards and risks or in the ways they may be eliminated or minimised. Changes that may necessitate a review of hazards, risks and control measures may include: • change in a work process • change in the physical environment • different people undertaking the work, with different skills or means of co-ordinating activities • new hazards are identified, and • new ways to eliminate or minimise risks are identified or invented. If a labour hire worker has a reasonable concern that to carry out the work would expose them to a serious health or safety risk, they may cease, or refuse to carry out work. A labour hire and host PCBU must not discriminate against a worker for exercising this or any other right under the model WHS Act. Duties of a host PCBU As a host PCBU under the model WHS Act, you have the same health and safety duties to labour hire workers as you do to other types of workers. It is your duty to ensure, so far as is reasonably practicable, the health and safety of all workers while at work. This duty requires you to eliminate or, if that is not reasonably practicable, to minimise risks to their health and safety. To identify what is reasonably practicable to do, you must take into account all the relevant matters and work with the labour hire PCBU/s to provide the highest level of protection that is both possible and reasonable in the circumstances. GUIDE | Labour hire: duties of persons conducting a business or undertaking Page 3 of 7 As a host PCBU, you must also consult, cooperate and coordinate activities with the labour hire PCBU/s to ensure you meet your obligations. The model WHS Act specifically provides that you cannot contract out of or transfer your WHS obligations to another party, including labour hire or other host PCBUs. Before engaging labour hire workers Before you engage labour hire workers to carry out work, you should consider: • providing the labour hire PCBU/s with detailed information about the nature of work to be carried out including details of, and where possible supporting material, relating to: o the work environment/s o tasks to be performed o accommodation arrangements o any known hazards or risks o any plant or equipment to be used o organisational and WHS arrangements, including supervision arrangements and any other organisations responsible for the worker during the arrangement o health and safety risks associated with the work, and o any skills, knowledge, licenses and qualifications required to safely undertake the work. • verifying, in consultation with the labour hire PCBU, that the selected worker/s have any necessary qualifications, licences, skills and training to carry out the work safely. In limited circumstances, you may be required to verify the worker/s are medically fit to carry out the work (see regulations 168 and 417(3)(b) of the model WHS Regulations) • discussing with the labour hire PCBU arrangements for health monitoring and vaccinations • consulting with the labour hire PCBU/s on WHS matters including in relation to who will provide any necessary equipment such as personal protective equipment (PPE), and relevant points of contact for health and safety between the organisations • ensuring that general health and safety information about the work, workplace and work environment has been provided to the worker/s. Check that you have provided this information in a way that is suitable, adequate and readily understandable for the worker/s • eliminating or, if that is not reasonably practicable, minimising risks in the workplace • establishing, in consultation with the labour hire PCBU/s, a review process for ensuring the ongoing WHS of workers, and • any more you can do to ensure the health and safety of all your workers. During a labour hire worker’s placement While labour hire workers are carrying out work, you should consider: • providing the worker/s with a site specific safety induction outlining WHS duties, policies, procedures and practices in the workplace including consultation methods • where WHS advice or workplace assessments are required, ensuring the persons engaged to conduct GUIDE | Labour hire: duties of persons conducting a business or undertaking Page 4 of 7 those assessments are suitably qualified • treating labour hire workers as you would employees and other workers with respect to health and safety and the provision of a safe working environment and PPE (if PPE is not provided by the labour hire PCBU/s) • providing adequate supervision of the worker/s at all times to ensure that work is being performed safely • consulting with the labour hire PCBU/s and worker/s regarding any changes which may affect WHS. Ensure you do not transfer workers to new tasks or change the nature of their work tasks, work environment or work location until you have consulted with the worker/s and obtained the approval of the labour hire PCBU/s • encouraging labour hire workers to participate in the identification of hazards and risks specific to their work • supporting and encouraging labour hire workers to participate in workplace safety consultative arrangements • working with the labour hire PCBU/s to facilitate appropriate WHS arrangements. For example, allow the labour hire PCBU/s access to workers, the workplace and relevant documents for the purpose of workplace safety assessments and to fulfil their WHS duties as a PCBU • facilitating any assessments conducted by the labour hire PCBU/s, for example, WHS management assessments or work site assessments • providing any further training, instruction or information prior to transferring a labour hire worker to new tasks, in a way that is suitable, adequate and readily understandable to the worker. • encouraging labour hire workers to maintain contact with the labour hire PCBU/s throughout their placement, and • in the event of an incident, notifying the labour hire PCBU/s as soon as practicable and working with them to implement agreed arrangements. For example, allowing the labour hire PCBU/s access to the workplace and to relevant documents to fulfil their WHS duties as a PCBU. Duties of a labour hire PCBU As a labour hire PCBU under the model WHS laws, it is your duty to ensure, so far as is reasonably practicable, the health and safety of workers during their placement with the host PCBU/s. It is your duty to eliminate or, if that is not reasonably practicable, minimise risks to health and safety a labour hire worker may encounter. In some circumstances, this means not placing workers in, or removing workers from, a workplace where you believe there is a risk to their health and safety or where risks have not been adequately controlled. Before placing labour hire workers Before you place labour hire workers, you should consider: • reviewing the host PCBU’s safety record to satisfy yourself that they provide a safe workplace • gathering information about the work and the workplace/s, including the work environment/s, accommodation arrangements, organisational arrangements, health and safety risks associated with the work and any skills and knowledge the worker will require to safely undertake the GUIDE | Labour hire: duties of persons conducting a business or undertaking Page 5 of 7 work. This might include information about facilities, work schedules and environmental factors, such as whether work will be conducted outdoors • providing workers with suitable, adequate and readily understandable WHS induction and training. Include any risks you have identified and consultation methods you have established with workers and the host PCBU/s • verifying and working with the host PCBU to ensure site specific and task specific induction, training and PPE is provided to labour hire workers in a way that is suitable, adequate and readily understandable to them • assessing the workplace/s for any risks to health and safety, as appropriate. Work with the host PCBU/s to gather enough information to make an assessment, for example, by arranging a workplace visit. Where risks are identified, consult with the host/s to ensure they are eliminated, or if that is not reasonably practicable, minimised • ensuring that workers have the necessary qualifications, licences, skills and training to safely carry out the work. In limited circumstances you may be required to verify the worker/s are medically fit to carry out the work (see regulations 168 and 417(3)(b) of the model WHS Regulations). • consulting with the host PCBU and workers to ensure you and the workers understand and are confident in your understanding of the WHS policies, procedures and practices of the host PCBU/s • discussing with the host PCBU arrangements for health monitoring and vaccinations • establishing communication methods workers can use to contact you if they consider there is any risk to their health or safety • discussing consultation arrangements with the host PCBU/s • ensuring workers have the means to identify and take action in an unsafe situation at the host workplace, such as stopping work or bringing it to the attention of the host PCBU/s, a health and safety committee representative or health and safety representative • ensuring workers have the means to raise safety issues with you if they are unsatisfied with the host PCBU’s response • establishing, in consultation with the host PCBU/s, a review process for ensuring the ongoing WHS of workers, and • any more you can do to ensure the health and safety of the labour hire worker. During a labour hire worker’s placement While your workers are placed with the host PCBU, you should consider: • consulting with the host PCBU/s and labour hire workers on any changes which may affect their health and safety. For example, this may include consultation about the use of plant and equipment not envisaged prior to placement • working with the host PCBU/s to undertake workplace safety assessments in accordance with agreed arrangements GUIDE | Labour hire: duties of persons conducting a business or undertaking Page 6 of 7 • where WHS advice or workplace assessments are required, working with the host PCBU to ensure the person/s engaged to conduct those assessments are suitably qualified • monitoring the workplace for new risks to health and safety and consulting with the host PCBU/s about how they might be addressed. This might include regular visits to the host/s workplace • encouraging workers to maintain contact with you and to provide feedback on health and safety matters in the host/s workplace • taking effective action when the worker or host PCBU/s identifies risks or raises concerns about health and safety. This might include removing the worker from the workplace, and • in the event of an incident, working with the host PCBU/s to respond effectively. Further information More information on the topics covered in this Guide can be found here: • How to determine what is reasonably practicable to meet a health and safety duty • The meaning of ‘persons conducting a business or undertaking’ • Work health and safety consultation, cooperation and coordination You can also find further information about other WHS topics on the Safe Work Australia website swa.gov.au. Safe Work Australia is a national policy body responsible for WHS and workers’ compensation arrangements. We do not regulate or enforce WHS or workers’ compensation laws. This guide provides information on the model WHS laws. It is important to consider the WHS laws that apply in your circumstances. To find out more, contact your WHS regulator. Where your business arrangements span multiple jurisdictions, you may need to contact more than one WHS regulator. The relevant contact details are available on our website swa.gov.au/whs-authorities-contactinformation. In most jurisdictions the labour hire PCBU (not the host PCBU) is responsible for providing workers’ compensation to the worker, however there are exemptions to this. However, labour hire and host PCBUs should work together to coordinate return to work arrangements and support workers through the return to work process. It is important to contact your workers’ compensation authority for more information on understanding and complying with your workers’ compensation obligations as penalties can apply. Some jurisdictions have implemented a labour hire licensing scheme. Safe Work Australia cannot provide advice in relation to these schemes. It is your responsibility to identify whether these requirements apply to you. GUIDE | Labour hire: duties of persons conducting a business or undertaking Page 7 of 7 Disclaimer Safe Work Australia is an Australian Government statutory agency established in 2009. Safe Work Australia includes Members from the Commonwealth, and each state and territory, Members representing the interests of workers and Members representing the interests of employers. Safe Work Australia works with the Commonwealth, state and territory governments to improve work health and safety and workers’ compensation arrangements. Safe Work Australia is a national policy body, not a regulator of work health and safety. The Commonwealth, states and territories have responsibility for regulating and enforcing work health and safety laws in their jurisdiction. ISBN 978-1-76051-811-0 (PDF) ISBN 978-1-76051-812-7 (DOCX) Creative Commons With the exception of the Safe Work Australia logo, this copyright work is licensed under a Creative Commons AttributionNoncommercial 4.0 International licence. To view a copy of this licence, visit creativecommons.org/licenses In essence, you are free to copy, communicate and adapt the work for non-commercial purposes, as long as you attribute the work to Safe Work Australia and abide by the other licence terms. Contact information Safe Work Australia | [email protected] | www.swa.gov.au
When responding, restrict yourself to only information found within the given article - no other information is valid or necessary. How should we as a labor hire provider respond if a labor hire worker refuses to carry out work due to safety concerns? GUIDE | Labour hire: duties of persons conducting a business or undertaking Page 1 of 7 Labour hire: duties of persons conducting a business or undertaking This Guide provides information for persons conducting a business or undertaking (PCBUs) involving the supply of workers (labour hire PCBUs) to work for another business or undertaking (host PCBUs) on complying with their health and safety duties under the model Work Health and Safety (WHS) laws. Model Work Health and Safety Act and labour hire arrangements Labour hire arrangements are covered by the model WHS Act. The primary duty of care under the model WHS Act is owed by a PCBU to a ‘worker’, which includes a labour hire worker. All labour hire PCBUs and host PCBUs have a primary duty of care to ensure, so far as is reasonably practicable, the health and safety of labour hire workers engaged by, or caused to be engaged by them, or whose activities are influenced or directed by the PCBU. The model WHS Act provides that more than one duty holder may have the same duty, in this instance a labour hire PCBU and a host PCBU. Labour hire arrangements can be complex. In some circumstances, there may be more than one labour hire or host PCBU. If more than one person has a duty for the same matter, each person must meet their duty to the extent to which they have the capacity to influence and control the matter. A labour hire PCBU or host PCBU may exercise influence and control over a relevant matter through, for example, the terms of a contract or directing workers in a practical sense. However, duty holders cannot contract out of or transfer their WHS obligations to another person. Consultation between PCBUs All duty holders in a labour hire arrangement must consult, cooperate and coordinate with each other so far as is reasonably practicable. Each duty holder should share information to find out who is doing what and work together in a cooperative and coordinated way to ensure compliance with WHS laws. For example, host and labour hire PCBUs must discuss consultation arrangements, the hazards and risks associated with the work, what precautions will be taken to ensure the health and safety of the labour hire worker and the respective roles the organisations in responding to an incident. Some labour hire PCBUs may have substantial knowledge of WHS issues and risk management practices in their industry that may assist in assessing the practices of a host PCBU and ensuring compliance with WHS laws. Duty holders should not assume that someone else is taking care of a health and GUIDE | Labour hire: duties of persons conducting a business or undertaking Page 2 of 7 safety matter. Find out who is doing what and work together with other duty holders so risks are eliminated or minimised as far as is reasonably practicable. What is reasonable practicable will depend on the circumstances. Relevant issues for duty holders to discuss will depend on the circumstances. These may include: • hazards and risks that may arise, taking into account things like the physical environment where work will occur • control measures to eliminate or minimise risks and the suitability of those measures • compliance with minimum requirements set by legislation, such as the WHS laws • how work will be carried out (including safe work methods and processes that are already in place or need to be in place) • the people involved in the work (including supervision arrangements) • competency and training requirements, including arrangements for the provision of additional training required for the particular work • arrangements for facilitating assessments of the individual worker’s needs and/or competencies, as appropriate • arrangements for health monitoring and relevant vaccinations • the respective roles of the organisations in responding to an incident, as well as relevant policies and procedures, and • any other factors which may impact the work environment and how work is carried out. Like all PCBUs, labour hire and host PCBUs are required to be proactive in managing hazards and risks. The duties in the model WHS Act are ongoing and must be complied with throughout the labour hire arrangement. Be aware that circumstances can change over time and this may result in a change in the hazards and risks or in the ways they may be eliminated or minimised. Changes that may necessitate a review of hazards, risks and control measures may include: • change in a work process • change in the physical environment • different people undertaking the work, with different skills or means of co-ordinating activities • new hazards are identified, and • new ways to eliminate or minimise risks are identified or invented. If a labour hire worker has a reasonable concern that to carry out the work would expose them to a serious health or safety risk, they may cease, or refuse to carry out work. A labour hire and host PCBU must not discriminate against a worker for exercising this or any other right under the model WHS Act. Duties of a host PCBU As a host PCBU under the model WHS Act, you have the same health and safety duties to labour hire workers as you do to other types of workers. It is your duty to ensure, so far as is reasonably practicable, the health and safety of all workers while at work. This duty requires you to eliminate or, if that is not reasonably practicable, to minimise risks to their health and safety. To identify what is reasonably practicable to do, you must take into account all the relevant matters and work with the labour hire PCBU/s to provide the highest level of protection that is both possible and reasonable in the circumstances. GUIDE | Labour hire: duties of persons conducting a business or undertaking Page 3 of 7 As a host PCBU, you must also consult, cooperate and coordinate activities with the labour hire PCBU/s to ensure you meet your obligations. The model WHS Act specifically provides that you cannot contract out of or transfer your WHS obligations to another party, including labour hire or other host PCBUs. Before engaging labour hire workers Before you engage labour hire workers to carry out work, you should consider: • providing the labour hire PCBU/s with detailed information about the nature of work to be carried out including details of, and where possible supporting material, relating to: o the work environment/s o tasks to be performed o accommodation arrangements o any known hazards or risks o any plant or equipment to be used o organisational and WHS arrangements, including supervision arrangements and any other organisations responsible for the worker during the arrangement o health and safety risks associated with the work, and o any skills, knowledge, licenses and qualifications required to safely undertake the work. • verifying, in consultation with the labour hire PCBU, that the selected worker/s have any necessary qualifications, licences, skills and training to carry out the work safely. In limited circumstances, you may be required to verify the worker/s are medically fit to carry out the work (see regulations 168 and 417(3)(b) of the model WHS Regulations) • discussing with the labour hire PCBU arrangements for health monitoring and vaccinations • consulting with the labour hire PCBU/s on WHS matters including in relation to who will provide any necessary equipment such as personal protective equipment (PPE), and relevant points of contact for health and safety between the organisations • ensuring that general health and safety information about the work, workplace and work environment has been provided to the worker/s. Check that you have provided this information in a way that is suitable, adequate and readily understandable for the worker/s • eliminating or, if that is not reasonably practicable, minimising risks in the workplace • establishing, in consultation with the labour hire PCBU/s, a review process for ensuring the ongoing WHS of workers, and • any more you can do to ensure the health and safety of all your workers. During a labour hire worker’s placement While labour hire workers are carrying out work, you should consider: • providing the worker/s with a site specific safety induction outlining WHS duties, policies, procedures and practices in the workplace including consultation methods • where WHS advice or workplace assessments are required, ensuring the persons engaged to conduct GUIDE | Labour hire: duties of persons conducting a business or undertaking Page 4 of 7 those assessments are suitably qualified • treating labour hire workers as you would employees and other workers with respect to health and safety and the provision of a safe working environment and PPE (if PPE is not provided by the labour hire PCBU/s) • providing adequate supervision of the worker/s at all times to ensure that work is being performed safely • consulting with the labour hire PCBU/s and worker/s regarding any changes which may affect WHS. Ensure you do not transfer workers to new tasks or change the nature of their work tasks, work environment or work location until you have consulted with the worker/s and obtained the approval of the labour hire PCBU/s • encouraging labour hire workers to participate in the identification of hazards and risks specific to their work • supporting and encouraging labour hire workers to participate in workplace safety consultative arrangements • working with the labour hire PCBU/s to facilitate appropriate WHS arrangements. For example, allow the labour hire PCBU/s access to workers, the workplace and relevant documents for the purpose of workplace safety assessments and to fulfil their WHS duties as a PCBU • facilitating any assessments conducted by the labour hire PCBU/s, for example, WHS management assessments or work site assessments • providing any further training, instruction or information prior to transferring a labour hire worker to new tasks, in a way that is suitable, adequate and readily understandable to the worker. • encouraging labour hire workers to maintain contact with the labour hire PCBU/s throughout their placement, and • in the event of an incident, notifying the labour hire PCBU/s as soon as practicable and working with them to implement agreed arrangements. For example, allowing the labour hire PCBU/s access to the workplace and to relevant documents to fulfil their WHS duties as a PCBU. Duties of a labour hire PCBU As a labour hire PCBU under the model WHS laws, it is your duty to ensure, so far as is reasonably practicable, the health and safety of workers during their placement with the host PCBU/s. It is your duty to eliminate or, if that is not reasonably practicable, minimise risks to health and safety a labour hire worker may encounter. In some circumstances, this means not placing workers in, or removing workers from, a workplace where you believe there is a risk to their health and safety or where risks have not been adequately controlled. Before placing labour hire workers Before you place labour hire workers, you should consider: • reviewing the host PCBU’s safety record to satisfy yourself that they provide a safe workplace • gathering information about the work and the workplace/s, including the work environment/s, accommodation arrangements, organisational arrangements, health and safety risks associated with the work and any skills and knowledge the worker will require to safely undertake the GUIDE | Labour hire: duties of persons conducting a business or undertaking Page 5 of 7 work. This might include information about facilities, work schedules and environmental factors, such as whether work will be conducted outdoors • providing workers with suitable, adequate and readily understandable WHS induction and training. Include any risks you have identified and consultation methods you have established with workers and the host PCBU/s • verifying and working with the host PCBU to ensure site specific and task specific induction, training and PPE is provided to labour hire workers in a way that is suitable, adequate and readily understandable to them • assessing the workplace/s for any risks to health and safety, as appropriate. Work with the host PCBU/s to gather enough information to make an assessment, for example, by arranging a workplace visit. Where risks are identified, consult with the host/s to ensure they are eliminated, or if that is not reasonably practicable, minimised • ensuring that workers have the necessary qualifications, licences, skills and training to safely carry out the work. In limited circumstances you may be required to verify the worker/s are medically fit to carry out the work (see regulations 168 and 417(3)(b) of the model WHS Regulations). • consulting with the host PCBU and workers to ensure you and the workers understand and are confident in your understanding of the WHS policies, procedures and practices of the host PCBU/s • discussing with the host PCBU arrangements for health monitoring and vaccinations • establishing communication methods workers can use to contact you if they consider there is any risk to their health or safety • discussing consultation arrangements with the host PCBU/s • ensuring workers have the means to identify and take action in an unsafe situation at the host workplace, such as stopping work or bringing it to the attention of the host PCBU/s, a health and safety committee representative or health and safety representative • ensuring workers have the means to raise safety issues with you if they are unsatisfied with the host PCBU’s response • establishing, in consultation with the host PCBU/s, a review process for ensuring the ongoing WHS of workers, and • any more you can do to ensure the health and safety of the labour hire worker. During a labour hire worker’s placement While your workers are placed with the host PCBU, you should consider: • consulting with the host PCBU/s and labour hire workers on any changes which may affect their health and safety. For example, this may include consultation about the use of plant and equipment not envisaged prior to placement • working with the host PCBU/s to undertake workplace safety assessments in accordance with agreed arrangements GUIDE | Labour hire: duties of persons conducting a business or undertaking Page 6 of 7 • where WHS advice or workplace assessments are required, working with the host PCBU to ensure the person/s engaged to conduct those assessments are suitably qualified • monitoring the workplace for new risks to health and safety and consulting with the host PCBU/s about how they might be addressed. This might include regular visits to the host/s workplace • encouraging workers to maintain contact with you and to provide feedback on health and safety matters in the host/s workplace • taking effective action when the worker or host PCBU/s identifies risks or raises concerns about health and safety. This might include removing the worker from the workplace, and • in the event of an incident, working with the host PCBU/s to respond effectively. Further information More information on the topics covered in this Guide can be found here: • How to determine what is reasonably practicable to meet a health and safety duty • The meaning of ‘persons conducting a business or undertaking’ • Work health and safety consultation, cooperation and coordination You can also find further information about other WHS topics on the Safe Work Australia website swa.gov.au. Safe Work Australia is a national policy body responsible for WHS and workers’ compensation arrangements. We do not regulate or enforce WHS or workers’ compensation laws. This guide provides information on the model WHS laws. It is important to consider the WHS laws that apply in your circumstances. To find out more, contact your WHS regulator. Where your business arrangements span multiple jurisdictions, you may need to contact more than one WHS regulator. The relevant contact details are available on our website swa.gov.au/whs-authorities-contactinformation. In most jurisdictions the labour hire PCBU (not the host PCBU) is responsible for providing workers’ compensation to the worker, however there are exemptions to this. However, labour hire and host PCBUs should work together to coordinate return to work arrangements and support workers through the return to work process. It is important to contact your workers’ compensation authority for more information on understanding and complying with your workers’ compensation obligations as penalties can apply. Some jurisdictions have implemented a labour hire licensing scheme. Safe Work Australia cannot provide advice in relation to these schemes. It is your responsibility to identify whether these requirements apply to you. GUIDE | Labour hire: duties of persons conducting a business or undertaking Page 7 of 7 Disclaimer Safe Work Australia is an Australian Government statutory agency established in 2009. Safe Work Australia includes Members from the Commonwealth, and each state and territory, Members representing the interests of workers and Members representing the interests of employers. Safe Work Australia works with the Commonwealth, state and territory governments to improve work health and safety and workers’ compensation arrangements. Safe Work Australia is a national policy body, not a regulator of work health and safety. The Commonwealth, states and territories have responsibility for regulating and enforcing work health and safety laws in their jurisdiction. ISBN 978-1-76051-811-0 (PDF) ISBN 978-1-76051-812-7 (DOCX) Creative Commons With the exception of the Safe Work Australia logo, this copyright work is licensed under a Creative Commons AttributionNoncommercial 4.0 International licence. To view a copy of this licence, visit creativecommons.org/licenses In essence, you are free to copy, communicate and adapt the work for non-commercial purposes, as long as you attribute the work to Safe Work Australia and abide by the other licence terms. Contact information Safe Work Australia | [email protected] | www.swa.gov.au
"================ <TEXT PASSAGE> ======= [context document] ================ <QUESTION> ======= [user request] ================ <TASK> ======= You are an expert in question answering. Your task is to reply to a query or question, based only on the information provided by the user. It should only use information in the article provided."
How does the Celcomen model ensure the robustness and identifiability of the gene-gene interactions through both simulation and biological experiments? What are the specific methodologies used in validating these interactions?
Simulations testing Celcomen’s identifiability guarantees Simulations were done in Python and completed by first generating a ground truth genegene interaction matrix. This was achieved by creating a n-genes by n-genes matrix of random values; for these experiments four genes were used. We then utilized Celcomen’s generative module, Simcomen, to learn a spatially-resolved counts matrix reflective of the ground truth gene-gene interaction matrix. Comparisons to the randomly initialized count matrix are termed “Raw input” and those to the learned count matrix are termed “SCC output”. To interrogate for self-consistency, we initialized Celcomen’s inference module with a random gene-gene interaction matrix and asked it to utilize the learned count matrix from Simcomen to decipher the ground truth gene-gene interaction matrix. Comparisons to the Celcomen outputted gene-gene interaction matrix are termed “CCC output”. Spearman correlation was used to compare the ground-truth gene-gene interaction values and the simulated-then-inferred gene-gene interaction values to test for model robustness and identifiability. For all exact parameter values utilized during the experiments, see the “analysis.simulations.ipynb” notebook in the reproducibility GitHub. Biological testing of Celcomen’s identifiability guarantees Biological confirmation of Celcomen’s identifiability guarantee was done by training two Celcomen inference module instances at the same time and comparing their derived gene-gene interaction results. The first model instance, which we call sample-specific, was trained only on one sample. The second model instance, which we call rest, was trained on the remaining samples. Thus, these two model instances are never trained on the same samples. Each model is trained to completion utilizing the same model hyperparameters, and their gene-gene interaction matrices are retrieved after the final epoch. We correlate a flattened version of their gene-gene interaction matrices using Spearman’s correlation due to the possible non-linear nature of the matrices’ values. We repeat this experiment for each of the samples in the fetal spleen dataset. The results across each sample’s experiments are aggregated together and compared in a bar plot. We derived a “random” control to compare to by shuffling the order of the flattened genegene interaction matrices and computing a correlation of the shuffled values. MannWhitney U test is used to derive p-values and all p-values are labeled on plot. For the full code utilized, see the “analysis.biological.ipynb” notebook in the reproducibility GitHub. Interferon knockout experiment on Xenium of human glioblastoma Processed Xenium data was subjected to the inference module of Celcomen, CCE, and then these gene-gene interaction values were annotated as containing cytoplasmic, surface membrane (plasma membrane GO ID via GO cellular component), or secreted (extracellular space GO ID also via GO cellular component) genes according to their GO IDs from QuickGO36. IFITM3 was knocked out in a randomly selected previously IFITM3 positive cell. First neighbors were defined as less than 15 µm away and second neighbors were defined as less than 30 µm away. Changes in each gene’s expression in each cell were calculated and these changes in expression pre- and post- perturbation were compared between different specified cellular subsets. These are the differential genes later used for differential expression analysis and pathway enrichment. Gene set enrichment analysis (GSEA) in R (v4.1.2) was utilized to perform pathway enrichment analysis on differentially post-perturbation affected genes. The interferon signature was derived directly from tissue by computing the differentially expressed genes between interferon high and low cells and taking the top 25, excluding the perturbed IFITM3 as that would bias analyses. For the full model parameters and code utilized, see the “analysis.perturbation.ipynb” notebook in the reproducibility GitHub. Counterfactual prediction validation via in vivo perturbed lung tumors Spatial perturbation data was acquired from previously published Perturb-map technology, GSE19346027. Their processed spaceranger output and annotations were read in and wild-type (WT) lesions, as previously annotated, were identified and any spots that were within two degrees of a perturbation specific cluster were trimmed away; this was done via a <100 filter in spatial distance with the value of 100 visually acquired from a histogram of spot-spot spatial distances (i.e. distance of 100 was the second non-zero peak). Lesions were then fed into the Celcomen model to identify gene-gene relationships and the trained gene-gene interaction matrix was used by Simcomen for counterfactual predictions. In detail, each lesion was examined for Tgfbr2+ spots and had a random positive spot knocked out (KO) in terms of Tgfbr2 expression. Simcomen then utilized the learned gene-gene interaction matrix to predict the whole transcriptome of every spot post perturbation. We then compared the change in expression in the KO spot compared to WT spots. Spearman correlation was used to compare model Tgfbr2 KO versus WT gene rankings with those directly derived from experimental Tgfbr2 KO spots and WT, i.e. the published data includes an in vivo bona fide Tgfbr2 KO lesion and this was used as ground truth. We derived “random” controls for each lesion by computing correlations on shuffled gene rankings of the observed and predicted differentials between Tgfbr2 KO and WT. Mann-Whitney U test is used to derive p-value when comparing observed lesion derived gene rankings with those from random shufflings. For the full code utilized, see the “analysis.biological.ipynb” notebook in the reproducibility GitHub.
"================ <TEXT PASSAGE> ======= Simulations testing Celcomen’s identifiability guarantees Simulations were done in Python and completed by first generating a ground truth genegene interaction matrix. This was achieved by creating a n-genes by n-genes matrix of random values; for these experiments four genes were used. We then utilized Celcomen’s generative module, Simcomen, to learn a spatially-resolved counts matrix reflective of the ground truth gene-gene interaction matrix. Comparisons to the randomly initialized count matrix are termed “Raw input” and those to the learned count matrix are termed “SCC output”. To interrogate for self-consistency, we initialized Celcomen’s inference module with a random gene-gene interaction matrix and asked it to utilize the learned count matrix from Simcomen to decipher the ground truth gene-gene interaction matrix. Comparisons to the Celcomen outputted gene-gene interaction matrix are termed “CCC output”. Spearman correlation was used to compare the ground-truth gene-gene interaction values and the simulated-then-inferred gene-gene interaction values to test for model robustness and identifiability. For all exact parameter values utilized during the experiments, see the “analysis.simulations.ipynb” notebook in the reproducibility GitHub. Biological testing of Celcomen’s identifiability guarantees Biological confirmation of Celcomen’s identifiability guarantee was done by training two Celcomen inference module instances at the same time and comparing their derived gene-gene interaction results. The first model instance, which we call sample-specific, was trained only on one sample. The second model instance, which we call rest, was trained on the remaining samples. Thus, these two model instances are never trained on the same samples. Each model is trained to completion utilizing the same model hyperparameters, and their gene-gene interaction matrices are retrieved after the final epoch. We correlate a flattened version of their gene-gene interaction matrices using Spearman’s correlation due to the possible non-linear nature of the matrices’ values. We repeat this experiment for each of the samples in the fetal spleen dataset. The results across each sample’s experiments are aggregated together and compared in a bar plot. We derived a “random” control to compare to by shuffling the order of the flattened genegene interaction matrices and computing a correlation of the shuffled values. MannWhitney U test is used to derive p-values and all p-values are labeled on plot. For the full code utilized, see the “analysis.biological.ipynb” notebook in the reproducibility GitHub. Interferon knockout experiment on Xenium of human glioblastoma Processed Xenium data was subjected to the inference module of Celcomen, CCE, and then these gene-gene interaction values were annotated as containing cytoplasmic, surface membrane (plasma membrane GO ID via GO cellular component), or secreted (extracellular space GO ID also via GO cellular component) genes according to their GO IDs from QuickGO36. IFITM3 was knocked out in a randomly selected previously IFITM3 positive cell. First neighbors were defined as less than 15 µm away and second neighbors were defined as less than 30 µm away. Changes in each gene’s expression in each cell were calculated and these changes in expression pre- and post- perturbation were compared between different specified cellular subsets. These are the differential genes later used for differential expression analysis and pathway enrichment. Gene set enrichment analysis (GSEA) in R (v4.1.2) was utilized to perform pathway enrichment analysis on differentially post-perturbation affected genes. The interferon signature was derived directly from tissue by computing the differentially expressed genes between interferon high and low cells and taking the top 25, excluding the perturbed IFITM3 as that would bias analyses. For the full model parameters and code utilized, see the “analysis.perturbation.ipynb” notebook in the reproducibility GitHub. Counterfactual prediction validation via in vivo perturbed lung tumors Spatial perturbation data was acquired from previously published Perturb-map technology, GSE19346027. Their processed spaceranger output and annotations were read in and wild-type (WT) lesions, as previously annotated, were identified and any spots that were within two degrees of a perturbation specific cluster were trimmed away; this was done via a <100 filter in spatial distance with the value of 100 visually acquired from a histogram of spot-spot spatial distances (i.e. distance of 100 was the second non-zero peak). Lesions were then fed into the Celcomen model to identify gene-gene relationships and the trained gene-gene interaction matrix was used by Simcomen for counterfactual predictions. In detail, each lesion was examined for Tgfbr2+ spots and had a random positive spot knocked out (KO) in terms of Tgfbr2 expression. Simcomen then utilized the learned gene-gene interaction matrix to predict the whole transcriptome of every spot post perturbation. We then compared the change in expression in the KO spot compared to WT spots. Spearman correlation was used to compare model Tgfbr2 KO versus WT gene rankings with those directly derived from experimental Tgfbr2 KO spots and WT, i.e. the published data includes an in vivo bona fide Tgfbr2 KO lesion and this was used as ground truth. We derived “random” controls for each lesion by computing correlations on shuffled gene rankings of the observed and predicted differentials between Tgfbr2 KO and WT. Mann-Whitney U test is used to derive p-value when comparing observed lesion derived gene rankings with those from random shufflings. For the full code utilized, see the “analysis.biological.ipynb” notebook in the reproducibility GitHub. https://arxiv.org/pdf/2409.05804 ================ <QUESTION> ======= How does the Celcomen model ensure the robustness and identifiability of the gene-gene interactions through both simulation and biological experiments? What are the specific methodologies used in validating these interactions? ================ <TASK> ======= You are an expert in question answering. Your task is to reply to a query or question, based only on the information provided by the user. It should only use information in the article provided."
Use only the Context Block to answer the Question. Your audience is people with limited tech knowledge.
What is the example provided for the importance of Alert Verification in Intrusion Detection Systems?
Abstract This chapter describes security threats that systems face when they are connected to the Internet. We discuss their security requirements, potential security threats and different mechanisms to combat these. In addition, the text presents the two most popular protocols (SSL and its successor TLS) to secure data transmitted over the Internet. Finally, we describe wellknown applications such as Secure Shell (ssh) and Secure File Transfer Protocol (sftp) that provide a reasonable level of security for common tasks. They may be utilized as underlying building blocks to create secure, Internet enabled applications. In order to provide useful services or to allow people to perform tasks more conveniently, computer systems are attached to networks and get interconnected. This resulted in the world-wide collection of local and wide-area networks known as the Internet. Unfortunately, the extended access possibilities also entail increased security risks as it opens additional avenues for an attacker. For a closed, local system, the attacker was required to be physically present at the network in order to perform unauthorized actions. In the networked case, each host that can send packets to the victim can be potentially utilized. As certain services (such as web or name servers) need to be publicly available, each machine on the Internet might be the originator of malicious activity. This fact makes attacks very likely to happen on a regularly basis. The following text attempts to give a systematic overview of security requirements of Internetbased systems and potential means to satisfy them. We define properties of a secure system and provide a classification of potential threats to them. We also introduce mechanisms to defend against attacks that attempt to violate desired properties. The most widely used means to secure application data against tampering and eavesdropping, the Secure Sockets Layer (SSL) and its successor, the Transport Layer Security (TLS) protocol are discussed. Finally, we briefly describe popular application programs that can act as building blocks for securing custom applications. Before one can evaluate attacks against a system and decide on appropriate mechanisms against them, it is necessary to specify a security policy [23]. A security policy defines the desired properties for each part of a secure computer system. It is a decision that has to take into account the value of the assets that should be protected, the expected threats and the cost of proper protection mechanisms. A security policy that is sufficient for the data of a normal user at home may not be sufficient for bank applications, as these systems are obviously a more likely target and have to protect more valuable resources. Although often neglected, the formulation of an adequate security policy is a prerequisite before one can identify threats and appropriate mechanisms to face them. Security Attacks and Security Properties For the following discussion, we assume that the function of a system that is the target of an attack is to provide information. In general, there is a flow of data from a source (e.g. host, file, memory) to a destination (e.g. remote host, other file, user) over a communication channel (e.g. wire, data bus). The task of the security system is to restrict access to this information to only those parties (persons or processes) that are authorized to have access according to the security policy in use. In the case of an automation system which is remotely connected to the Internet, the information flow is from/to a control application that manages sensors and actuators via communication lines of the public Internet and the network of the automation system (e.g. a field-bus). The normal information flow and several categories of attacks that target it are shown in Figure 1 and explained below (according to [22]). 1. Interruption: An asset of the system gets destroyed or becomes unavailable. This attack targets the source or the communication channel and prevents information from reaching its intended target (e.g. cut the wire, overload the link so that the information gets dropped because of congestion). Attacks in this category attempt to perform a kind of denial-of-service (DOS). 2. Interception: An unauthorized party gets access to the information by eavesdropping into the communication channel (e.g. wiretapping). 3. Modification: The information is not only intercepted, but modified by an unauthorized party while in transit from the source to the destination. By tampering with the information, it is actively altered (e.g. modifying message content). 4. Fabrication: An attacker inserts counterfeit objects into the system without having the sender doing anything. When a previously intercepted object is inserted, this processes is called replaying. When the attacker pretends to be the legitimate source and inserts his desired information, the attack is called masquerading (e.g. replay an authentication message, add records to a file). The four classes of attacks listed above violate different security properties of the computer system. A security property describes a desired feature of a system with regards to a certain type of attack. A common classification following [5, 13] is listed below. • Confidentiality: This property covers the protection of transmitted data against its release to non-authorized parties. In addition to the protection of the content itself, the information flow should also be resistant against traffic analysis. Traffic analysis is used to gather other information than the transmitted values themselves from the data flow (e.g. timing data, frequency of messages). • Authentication: Authentication is concerned with making sure that the information is authentic. A system implementing the authentication property assures the recipient that the data is from the source that it claims to be. The system must make sure that no third party can masquerade successfully as another source. • Non-repudiation: This property describes the feature that prevents either sender or receiver from denying a transmitted message. When a message has been transferred, the sender can prove that it has been received. Similarly, the receiver can prove that the message has actually been sent. • Availability: Availability characterizes a system whose resources are always ready to be used. Whenever information needs to be transmitted, the communication channel is available and the receiver can cope with the incoming data. This property makes sure that attacks cannot prevent resources from being used for their intended purpose. • Integrity: Integrity protects transmitted information against modifications. This property assures that a single message reaches the receiver as it has left the sender, but integrity also extends to a stream of messages. It means that no messages are lost, duplicated or reordered and it makes sure that messages cannot be replayed. As destruction is also covered under this property, all data must arrive at the receiver. Integrity is not only important as a security property, but also as a property for network protocols. Message integrity must also be ensured in case of random faults, not only in case of malicious modifications. Security Mechanisms Different security mechanisms can be used to enforce the security properties defined in a given security policy. Depending on the anticipated attacks, different means have to be applied to satisfy the desired properties. We divide these measures against attacks into three different classes, namely attack prevention, attack avoidance and attack detection. Attack Prevention Attack prevention is a class of security mechanisms that contains ways of preventing or defending against certain attacks before they can actually reach and affect the target. An important element in this category is access control, a mechanism which can be applied at different levels such as the operating system, the network or the application layer. Access control [23] limits and regulates the access to critical resources. This is done by identifying or authenticating the party that requests a resource and checking its permissions against the rights specified for the demanded object. It is assumed that an attacker is not legitimately permitted to use the target object and is therefore denied access to the resource. As access is a prerequisite for an attack, any possible interference is prevented. The most common form of access control used in multi-user computer systems are access control lists for resources that are based on the user identity of the process that attempts to use them. The identity of a user is determined by an initial authentication process that usually requires a name and a password. The login process retrieves the stored copy of the password corresponding to the user name and compares it with the presented one. When both match, the system grants the user the appropriate user credentials. When a resource should be accessed, the system looks up the user and group in the access control list and grants or denies access as appropriate. An example of this kind of access control is a secure web server. A secure web server delivers certain resources only to clients that have authenticated themselves and that posses sufficient credentials for the desired resource. The authentication process is usually handled by the web client such as the Microsoft Internet Explorer or Mozilla by prompting the user for his name and password. The most important access control system at the network layer is a firewall [4]. The idea of a firewall is based on the separation of a trusted inside network of computers under single administrative control from a potential hostile outside network. The firewall is a central choke point that allows enforcement of access control for services that may run at the inside or outside. The firewall prevents attacks from the outside against the machines in the inside network by denying connection attempts from unauthorized parties located outside. In addition, a firewall may also be utilized to prevent users behind the firewall from using certain services that are outside (e.g. surfing web sites containing pornographic material). For certain installations, a single firewall is not suitable. Networks that consist of several server machines which need to be publicly accessible and workstations that should be completely protected against connections from the outside would benefit from a separation between these two groups. When an attacker compromises a server machine behind a single firewall, all other machines can be attacked from this new base without restrictions. To prevent this, one can use two firewalls and the concept of a demilitarized zone (DMZ) [4] in between as shown in Figure 2. In this setup, one firewall separates the outside network from a segment (DMZ) with the server machines while a second one separates this area from the rest of the network. The second firewall can be configured in a way that denies all incoming connection attempts. Whenever an intruder compromises a server, he is now unable to immediately attack a workstation located in the inside network. The following design goals for firewalls are identified in [4]. 1. All traffic from inside to outside, and vice versa, must pass through the firewall. This is achieved by physically blocking all access to the internal network except via the firewall. 2. Only authorized traffic, as defined by the local security policy, will be allowed to pass. 3. The firewall itself should be immune to penetration. This implies the use of a trusted system with a secure operating system. A trusted, secure operating system is often purpose-built, has heightened security features and only provides the minimal functionality necessary to run the desired applications. These goals can be reached by using a number of general techniques for controlling access. The most common is called service control and determines Internet services that can be accessed. Traffic on the Internet is currently filtered on basis of IP addresses and TCP/UDP port numbers. In addition, there may be proxy software that receives and interprets each service request before passing it on. Direction control is a simple mechanism to control the direction in which particular service requests may be initiated and permitted to flow through. User control grants access to a service based on user credentials similar to the technique used in a multi-user operating system. Controlling external users requires secure authentication over the network (e.g. such as provided in IPSec [10]). A more declarative approach in contrast to the operational variants mentioned above is behavior control. This technique determines how particular services are used. It may be utilized to filter e-mail to eliminate spam or to allow external access to only part of the local web pages. A summary of capabilities and limitations of firewalls is given in [22]. The following benefits can be expected. • A firewall defines a single choke point that keeps unauthorized users out of the protected network. The use of such a point also simplifies security management. • It provides a location for monitoring security related events. Audits, logs and alarms can be implemented on the firewall directly. In addition, it forms a convenient platform for some non-security related functions such as address translation and network management. • A firewall may serve as a platform to implement a virtual private network (e.g. by using IPSec). The list below enumerates the limits of the firewall access control mechanism. • A firewall cannot protect against attacks that bypass it, for example, via a direct dial-up link from the protected network to an ISP (Internet Service Provider). It also does not protect against internal threats from an inside hacker or an insider cooperating with an outside attacker. • A firewall does not help when attacks are against targets whose access has to be permitted. • It cannot protect against the transfer of virus-infected programs or files. It would be impossible, in practice, for the firewall to scan all incoming files and e-mails for viruses. Firewalls can be divided into two main categories. A Packet-Filtering Router, or short packet filter, is an extended router that applies certain rules to the packets which are forwarded. Usually, traffic in each direction (in- and outgoing) is checked against a rule set which determines whether a packet is permitted to continue or should be dropped. The packet filter rules operate on the header fields used by the underlying communication protocols, for the Internet almost always IP, TCP and UDP. Packet filters have the advantage that they are cheap as they can often be built on existing hardware. In addition, they offer a good performance for high traffic loads. An example for a packet filter is the iptables package which is implemented as part of the Linux 2.4 routing software. A different approach is followed by an Application-Level Gateway, also called proxy server. This type of firewall does not forward packets on the network layer but acts as a relay on the application level. The user contacts the gateway which in turn opens a connection to the intended target (on behalf of the user). A gateway completely separates the inside and outside networks at the network level and only provides a certain set of application services. This allows authentication of the user who requests a connection and session-oriented scanning of the exchanged traffic up to the application level data. This feature makes application gateways more secure than packet filters and offers a broader range of log facilities. On the downside, the overhead of such a setup may cause performance problems under heavy load. Another important element in the set of attack prevention mechanisms is system hardening. System hardening is used to describe all steps that are taken to make a computer system more secure. It usually refers to changing the default configuration to a more secure one, possible at the expense of ease-of-use. Vendors usually pre-install a large set of development tools and utilities, which, although beneficial to the new user, might also contain vulnerabilities. The initial configuration changes that are part of system hardening include the removal of services, applications and accounts that are not needed and the enabling of operating system auditing mechanisms (e.g., Event Log in Windows). Hardening also involves a vulnerability assessment of the system. Numerous open-source tools such as network (e.g., nmap [8]) and vulnerability scanners (e.g., Nessus [12]) can help to check a system for open ports and known vulnerabilities. This knowledge then helps to remedy these vulnerabilities and close unnecessary ports. An important and ongoing effort in system hardening is patching. Patching describes a method of updating a file that replaces only the parts being changed, rather than the entire file. It is used to replace parts of a (source or binary) file that contains a vulnerability that is exploitable by an attacker. To be able to patch, it is necessary that the system administrators keep up to date with security advisories that are issued by vendors to inform about security related problems in their products. Attack Avoidance Security mechanisms in this category assume that an intruder may access the desired resource but the information is modified in a way that makes it unusable for the attacker. The information is pre-processed at the sender before it is transmitted over the communication channel and postprocessed at the receiver. While the information is transported over the communication channel, it resists attacks by being nearly useless for an intruder. One notable exception are attacks against the availability of the information as an attacker could still interrupt the message. During the processing step at the receiver, modifications or errors that might have previously occurred can be detected (usually because the information can not be correctly reconstructed). When no modification has taken place, the information at the receiver is identical to the one at the sender before the pre-processing step. The most important member in this category is cryptography which is defined as the science of keeping messages secure [18]. It allows the sender to transform information into a random data stream from the point of view of an attacker but to have it recovered by an authorized receiver (see Figure 3). The original message is called plain text (sometimes clear text). The process of converting it through the application of some transformation rules into a format that hides its substance is called encryption. The corresponding disguised message is denoted cipher text and the operation of turning it back into clear text is called decryption. It is important to notice that the conversion from plain to cipher text has to be loss-less in order to be able to recover the original message at the receiver under all circumstances. The transformation rules are described by a cryptographic algorithm. The function of this algorithm is based on two main principles: substitution and transposition. In the case of substitution, each element of the plain text (e.g. bit, block) is mapped into another element of the used alphabet. Transposition describes the process where elements of the plain text are rearranged. Most systems involve multiple steps (called rounds) of transposition and substitution to be more resistant against cryptanalysis. Cryptanalysis is the science of breaking the cipher, i.e. discovering the substance of the message behind its disguise. When the transformation rules process the input elements one at a time the mechanism is called a stream cipher, in case of operating on fixed-sized input blocks it is called a block cipher. If the security of an algorithm is based on keeping the way how the algorithm works (i.e. the transformation rules) secret, it is called a restricted algorithm. Those algorithms are no longer of any interest today because they don’t allow standardization or public quality control. In addition, when a large group of users is involved, such an approach cannot be used. A single person leaving the group makes it necessary for everyone else to change the algorithm. Modern cryptosystems solve this problem by basing the ability of the receiver to recover encrypted information on the fact that he possesses a secret piece of information (usually called the key). Both encryption and decryption functions have to use a key and they are heavily dependent on it. When the security of the cryptosystem is completely based on the security of the key, the algorithm itself may be revealed. Although the security does not rely on the fact that the algorithm is unknown, the cryptographic function itself and the used key together with its length must be chosen with care. A common assumption is that the attacker has the fastest commercially available hardware at his disposal in his attempt to break the cipher text. The most common attack, called known plain text attack, is executed by obtaining cipher text together with its corresponding plain text. The encryption algorithm must be so complex that even if the code breaker is equipped with plenty of such pairs and powerful machines, it is infeasible for him to retrieve the key. An attack is infeasible when the cost of breaking the cipher exceeds the value of the information or the time it takes to break it exceeds the lifespan of the information. Given pairs of corresponding cipher and plain text, it is obvious that a simple key guessing algorithm will succeed after some time. The approach of successively trying different key values until the correct one is found is called brute force attack because no information about the algorithm is utilized whatsoever. In order to be useful, it is a necessary condition for an encryption algorithm that brute force attacks are infeasible. Depending on the keys that are used, one can distinguish two major cryptographic approaches - public and secret key cryptosystems. Secret Key Cryptography This is the kind of cryptography that has been used for the transmission of secret information for centuries, long before the advent of computers. These algorithms require that the sender and the receiver agree on a key before communication is started. It is common for this variant (which is also called single key or symmetric encryption) that a single secret key is shared between the sender and the receiver. It needs to be communicated in a secure way before the actual encrypted communication can start and has to remain secret as long as the information is to remain secret. Encryption is achieved by applying an agreed function to the plain text using the secret key. Decryption is performed by applying the inverse function using the same key. The classic example of a secret key block cipher which is widely deployed today is the Data Encryption Standard (DES) [6]. DES has been developed in 1977 by IBM and adopted as a standard by the US government for administrative and business use. Recently, it has been replaced by the Advanced Encryption Standard (AES - Rijndael) [1]. It is a block cipher that operates on 64-bit plain text blocks and utilizes a key with 56-bits length. The algorithm uses 16 rounds that are key dependent. During each round 48 key bits are selected and combined with the block that is encrypted. Then, the resulting block is piped through a substitution and a permutation phase (which use known values and are independent of the key) to make cryptanalysis harder. Although there is no known weakness of the DES algorithm itself, its security has been much debated. The small key length makes brute force attacks possible and several cases have occurred where DES protected information has been cracked. A suggested improvement called 3DES uses three rounds of the simple DES with three different keys. This extends the key length to 168 bits while still resting on the very secure DES base. A well known stream cipher that has been debated recently is RC4 [16] which has been developed by RSA. It is used to secure the transmission in wireless networks that follow the IEEE 802.11 standard and forms the core of the WEP (wired equivalent protection) mechanism. Although the cipher itself has not been broken, current implementations are flawed and reduce the security of RC4 down to a level where the used key can be recovered by statistical analysis within a few hours. Public Key Cryptography Since the advent of public key cryptography, the knowledge of the key that is used to encrypt a plain text also allowed the inverse process, the decryption of the cipher text. In 1976, this paradigm of cryptography was changed by Diffie and Hellman [7] when they described their public key approach. Public key cryptography utilizes two different keys, one called the public key, the other one called the private key. The public key is used to encrypt a message while the corresponding private key is used to do the opposite. Their innovation was the fact that it is infeasible to retrieve the private key given the public key. This makes it possible to remove the weakness of secure key transmission from the sender to the receiver. The receiver can simply generate his public/private key pair and announce the public key without fear. Anyone can obtain this key and use it to encrypt messages that only the receiver with his private key is able to decrypt. Mathematically, the process is based on the trap door of one-way functions. A one-way function is a function that is easy to compute but very hard to inverse. That means that given x it is easy to determine f(x) but given f(x) it is hard to get x. Hard is defined as computationally infeasible in the context of cryptographically strong one-way functions. Although it is obvious that some functions are easier to compute than their inverse (e.g. square of a value in contrast to its square root) there is no mathematical proof or definition of one-way functions. There are a number of problems that are considered difficult enough to act as one-way functions but it is more an agreement among crypto analysts than a rigorously defined set (e.g. factorization of large numbers). A one-way function is not directly usable for cryptography, but it becomes so when a trap door exists. A trap door is a mechanism that allows one to easily calculate x from f(x) when an additional information y is provided. A common misunderstanding about public key cryptography is thinking that it makes secret key systems obsolete, either because it is more secure or because it does not have the problem of secretly exchanging keys. As the security of a cryptosystem depends on the length of the used key and the utilized transformation rules, there is no automatic advantage of one approach over the other. Although the key exchange problem is elegantly solved with a public key, the process itself is very slow and has its own problems. Secret key systems are usually a factor of 1000 (see [18] for exact numbers) faster than their public key counterparts. Therefore, most communication is stilled secured using secret key systems and public key systems are only utilized for exchanging the secret key for later communication. This hybrid approach is the common design to benefit from the high-speed of conventional cryptography (which is often implemented directly in hardware) and from a secure key exchange. A problem in public key systems is the authenticity of the public key. An attacker may offer the sender his own public key and pretend that it origins from the legitimate receiver. The sender then uses the faked public key to perform his encryption and the attacker can simply decrypt the message using his private key. In order to thwart an attacker that attempts to substitute his public key for the victim’s one, certificates are used. A certificate combines user information with the user’s public key and the digital signature of a trusted third party that guarantees that the key belongs to the mentioned person. The trusted third party is usually called a certification authority (CA). The certificate of a CA itself is usually verified by a higher level CA that confirms that the CA’s certificate is genuine and contains its public key. The chain of third parties that verify their respective lower level CAs has to end at a certain point which is called the root CA. A user that wants to verify the authenticity of a public key and all involved CAs needs to obtain the self-signed certificate of the root CA via an external channel. Web browsers (e.g. Netscape Navigator, Internet Explorer) usually ship with a number of certificates of globally known root CAs. A framework that implements the distribution of certificates is called a public key infrastructure (PKI). An important protocol for key management is X.509 [25]. Another important issue is revocation, the invalidation of a certificate when the key has been compromised. The best known public key algorithm and textbook classic is RSA [17], named after its inventors Rivest, Shamir and Adleman at MIT. It is a block cipher that is still utilized for the majority of current systems, although the key length has been increased over recent years. This has put a heavier processing load on applications, a burden that has ramifications especially for sites doing electronic commerce. A competitive approach that promises similar security as RSA using far smaller key lengths is elliptic curve cryptography. However, as these systems are new and have not been subject to sustained cryptanalysis, the confidence level in them in not yet as high as in RSA. Authentication and Digital Signatures An interesting and important feature of public key cryptography is its possible use for authentication. In addition to making the information unusable for attackers, a sender may utilize cryptography to prove his identity to the receiver. This feature is realized by digital signatures. A digital signature must have similar properties as a normal handwritten signature. It must be hard to forge and it has to be bound to a certain document. In addition, one has to make sure that a valid signature cannot be used by an attacker to replay the same (or different) messages at a later time. A way to realize such a digital signature is by using the sender’s private key to encrypt a message. When the receiver is capable of successfully decrypting the cipher text with the sender’s public key, he can be sure that the message is authentic. This approach obviously requires a cryptosystem that allows encryption with the private key, but many (such as RSA) offer this option. It is easy for a receiver to verify that a message has been successfully decrypted when the plain text is in a human readable format. For binary data, a checksum or similar integrity checking footer can be added to verify a successful decryption. Replay attacks are prevented by adding a time-stamp to the message (e.g. Kerberos [11] uses timestamps to prevent that messages to the ticket granting service are replayed). Usually, the storage and processing overhead for encrypting a whole document is too high to be practical. This is solved by one-way hash functions. These are functions that map the content of a message onto a short value (called message digest). Similar to one-way functions it is difficult to create a message when given only the hash value itself. Instead of encrypting the whole message, it is enough to simply encrypt the message digest and send it together with the original message. The receiver can then apply the known hash function (e.g. MD5 [15]) to the document and compare it to the decrypted digest. When both values match, the messages is authentic. Attack and Intrusion Detection Attack detection assumes that an attacker can obtain access to his desired targets and is successful in violating a given security policy. Mechanisms in this class are based on the optimistic assumption that most of the time the information is transferred without interference. When undesired actions occur, attack detection has the task of reporting that something went wrong and then to react in an appropriate way. In addition, it is often desirable to identify the exact type of attack. An important facet of attack detection is recovery. Often it is enough to just report that malicious activity has been found, but some systems require that the effect of the attack has to be reverted or that an ongoing and discovered attack is stopped. On the one hand, attack detection has the advantage that it operates under the worst case assumption that the attacker gains access to the communication channel and is able to use or modify the resource. On the other hand, detection is not effective in providing confidentiality of information. When the security policy specifies that interception of information has a serious security impact, then attack detection is not an applicable mechanism. The most important members of the attack detection class, which have received an increasing amount of attention in the last few years, are intrusion detection systems (aka IDS). Intrusion Detection [2, 3] is the process of identifying and responding to malicious activities targeted at computing and network resources. This definition introduces the notion of intrusion detection as a process, which involves technology, people and tools. An intrusion detection system basically monitors and collects data from a target system that should be protected, processes and correlates the gathered information and initiate responses, when evidence for an intrusion is detected. IDS are traditionally classified as anomaly or signature-based. Signature-based systems act similar to virus scanners and look for known, suspicious patterns in their input data. Anomaly- based systems watch for deviations of actual from expected behavior and classify all ‘abnormal’ activities as malicious. The advantage of signature-based designs is the fact that they can identify attacks with an acceptable accuracy and tend to produce fewer false alarms (i.e. classifying an action as malicious when in fact it is not) than their anomaly-based cousins. The systems are more intuitive to build and easier to install and configure, especially in large production networks. Because of this, nearly all commercial systems and most deployed installations utilize signature-based detection. Although anomaly-based variants offer the advantage of being able to find prior unknown intrusions, the costs of having to deal with an order of magnitude more false alarms is often prohibitive. Depending on their source of input data, IDS can be classified as either network or host-based. Network-based systems collect data from network traffic (e.g. packets by network interfaces in promiscuous mode) while host-based systems monitor events at operating system level such as system calls or receive input from applications (e.g. via log files). Host-based designs can collect high quality data directly from the affected system and are not influenced by encrypted network traffic. Nevertheless, they often seriously impact performance of the machines they are running on. Network-based IDS, on the other hand, can be set up in a non-intrusive manner - often as an appliance box without interfering with the existing infrastructure. In many cases, this makes them the preferred choice. As many vendors and research centers have developed their own intrusion detection system versions, the IETF has created the intrusion detection working group [9] to coordinate international standardization efforts. The aim is to allow intrusion detection systems to share information and to communicate via well defined interfaces by proposing a generic architectural description and a message specification and exchange format (IDMEF). A major issue when deploying intrusion detection systems in large network installations are the huge numbers of alerts that are produced. These alerts have to be analyzed by system administrators who have to decide on the appropriate countermeasures. Given the current state-of-the-art of intrusion detection, however, many of the reported incidents are in fact false alerts. This makes the analysis process for the system administrator cumbersome and frustrating, resulting in the problem that IDSs are often disabled or ignored. To address this issue, two new techniques have been proposed: alert correlation and alert verification. Alert correlation is an analysis process that takes as input the alerts produced by intrusion detection systems and produces compact reports on the security status of the network under surveillance. By reducing the total number of individual alerts and aggregating related incidents into a single report, is is easier for a system administrator to distinguish actual and bogus alarms. In addition, alert correlation offers the benefit of recognizing higher-level patterns in an alert stream, helping the administrator to obtain a better overview of the activities on the network. Alert verification is a technique that is directly aimed at the problem that intrusion detection systems often have to analyze data without sufficient contextual information. The classic example is the scenario of a Code Red worm that attacks a Linux web server. It is a valid attack that is seen on the network, however, the alert that an IDS raises is of no use because the Linux server is not vulnerable (as Code Red can only exploit vulnerabilities in Microsoft’s IIS web server). The intrusion detection system would require more information to determine that this attack cannot possibly succeed than available from only looking at network packets. Alert verification is a term that is used for all mechanisms that use additional information or means to determine whether an attack was successful or not. In the example above, the alert verification mechanism could supply the IDS with the knowledge that the attacked Linux server is not vulnerable to a Code Red attack. As a consequence, the IDS can react accordingly and suppress the alert or reduce its priority and thus reduce the workload of the administrator. Secure Network Protocols After the general concepts and mechanisms of network security have been introduced, the following section concentrates on two actual instances of secure network protocols, namely the Secure Sockets Layer (SSL, [20]) and the Transport Layer Security (TLS, [24]) protocol. The idea of secure network protocols is to create an additional layer between the application and the transport/network layer to provide services for a secure end-to-end communication channel. TCP/IP are almost always used as transport/network layer protocols on the Internet and their task is to provide a reliable end-to-end connection between remote tasks on different machines that intend to communicate. The services on that level are usually directly utilized by application protocols to exchange data, for example HTTP (Hypertext Transfer Protocol) for web services. Unfortunately, the network layer transmits this data unencrypted, leaving it vulnerable to eavesdropping or tampering attacks. In addition, the authentication mechanisms of TCP/IP are only minimal, thereby allowing a malicious user to hijack connections and redirect traffic to his machine as well as to impersonate legitimate services. These threats are mitigated by secure network protocols that provide privacy and data integrity between two communicating applications by creating an encrypted and authenticated channel. SSL has emerged as the de-facto standard for secure network protocols. Originally developed by Netscape, its latest version SSL 3.0 is also the base for the standard proposed by the IETF under the name TLS. Both protocols are quite similar and share common ideas, but they unfortunately can not inter-operate. The following discussion will mainly concentrate on SSL and only briefly explain the extensions implemented in TLS. The SSL protocol [21] usually runs above TCP/IP (although it could use any transport protocol) and below higher-level protocols such as HTTP. It uses TCP/IP on behalf of the higher-level protocols, and in the process allows an SSL-enabled server to authenticate itself to an SSL-enabled client, allows the client to authenticate itself to the server, and allows both machines to establish an encrypted connection. These capabilities address fundamental concerns about communication over the Internet and other TCP/IP networks and give protection against message tampering, eavesdropping and spoofing. • SSL server authentication allows a user to confirm a server’s identity. SSL-enabled client software can use standard techniques of public-key cryptography to check that a server’s certificate and public key are valid and have been issued by a certification authority (CA) listed in the client’s list of trusted CAs. This confirmation might be important if the user, for example, is sending a credit card number over the network and wants to check the receiving server’s identity. • SSL client authentication allows a server to confirm a user’s identity. Using the same techniques as those used for server authentication, SSL-enabled server software can check that a client’s certificate and public key are valid and have been issued by a certification authority (CA) listed in the server’s list of trusted CAs. This confirmation might be important if the server, for example, is a bank sending confidential financial information to a customer and wants to check the recipient’s identity. • An encrypted SSL connection requires all information sent between a client and a server to be encrypted by the sending software and decrypted by the receiving software, thus providing a high degree of confidentiality. Confidentiality is important for both parties to any private transaction. In addition, all data sent over an encrypted SSL connection is protected with a mechanism for detecting tampering – that is, for automatically determining whether the data has been altered in transit. SSL uses X.509 certificates for authentication, RSA as its public-key cipher and one of RC4-128, RC2-128, DES, Triple DES or IDEA as its bulk symmetric cipher. The SSL protocol includes two sub-protocols, namely the SSL Record Protocol and the SSL Handshake Protocol. The SSL Record Protocol simply defines the format used to transmit data. The SSL Handshake Protocol (using the SSL Record Protocol) is utilized to exchange a series of messages between an SSL-enabled server and an SSL-enabled client when they first establish an SSL connection. This exchange of messages is designed to facilitate the following actions. • Authenticate the server to the client. • Allow the client and server to select the cryptographic algorithms, or ciphers, that they both support. • Optionally authenticate the client to the server. • Use public-key encryption techniques to generate shared secrets. • Establish an encrypted SSL connection based on the previously exchanged shared secret. The SSL Handshake Protocol is composed of two phases. Phase 1 deals with the selection of a cipher, the exchange of a secret key and the authentication of the server. Phase 2 handles client authentication, if requested and finishes the handshaking. After the handshake stage is complete, the data transfer between client and server begins. All messages during handshaking and after, are sent over the SSL Record Protocol layer. Optionally, session identifiers can be used to re-established a secure connection that has been previously set up. Figure 4 lists in a slightly simplified form the messages that are exchanged between the client C and the server S during a handshake when neither client authentication nor session identifiers are involved. In this figure, {data}key means that data has been encrypted with key. The message exchanges shows that the client first sends a challenge to the server which responds with a X.509 certificate containing its public key. The client then creates a secret key and uses RSA with the server’s public key to encrypt it, sending the result back to the server. Only the server is capable of decrypting that message with its private key and can retrieve the shared, secret key. I order to prove to the client that the secret key has been successfully decrypted, the server encrypts the client’s challenge with the secret key and returns it. When the client is able to decrypt this message and successfully retrieves the original challenge by using the secret key, it can be certain that the server has access to the private key corresponding to its certificate. From this point on, all communication is encrypted using the chosen cipher and the shared secret key. TLS uses the same two protocols shown above and a similar handshake mechanism. Nevertheless, the algorithms for calculating message authentication codes (MACs) and secret keys have been modified to make them cryptographically more secure. In addition, the constraints on padding a message up to the next block size have been relaxed for TLS. This leads to an incompatibility between both protocols. SSL/TLS is widely used to secure web and mail traffic. HTTP as well as the current mail protocols IMAP (Internet Message Access Protocol) and POP3 (post office protocol, version 3) transmit user credential information as well as application data unencrypted. By building them on top of a secure network protocol such as SSL/TLS, they can benefit from secured channels without modifications. The secure communication protocols simply utilize different well-known destination ports (443 for HTTPS, 993 for IMAPS and 995 for POP3S) than their insecure cousins. Secure Applications A variety of popular tools that allow access to remote hosts (such as telnet, rsh and rlogin) or that provide means for file transfer (such as rcp or ftp) exchange user credentials and data in plain text. This makes them vulnerable to eavesdropping, tampering and spoofing attacks. Although the tools mentioned above could have also been built upon SSL/TLS, a different protocol suite called Secure Shell (SSH) [19] has been developed which follows partial overlapping goals. The SSH Transport and User Authentication protocols have features similar to those of SSL/TLS. However, they are different in the following ways. • TLS server authentication is optional and the protocol supports fully anonymous operation, in which neither side is authenticated. As such connections are inherently vulnerable to man-in-the-middle attacks, SSH requires server authentication. • TLS does not provide the range of client authentication options that SSH does - public-key via RSA is the only option. • Most importantly, TLS does not have the extra features provided by the SSH Connection Protocol. The SSH Connection Protocol uses the underlying connection, aka secure tunnel, which has been established by the SSH Transport and User Authentication protocols between two hosts. It provides interactive login sessions, remote execution of commands and forwarded TCP/IP as well as X11 connections. All these terminal sessions and forwarded connections are realized as different logical channels that may be opened by either side on top of the secure tunnel. Channels are flow-controlled which means that no data may be sent to a channel until a message is received to indicate that window space is available. The current version of the SSH protocol is SSH 2. It represents a complete rewrite of SSH 1 and improves some of its structural weaknesses. As it encrypts packets in a different way and has abandoned the notion of server and host keys in favor of host keys only, the protocols are incompatible. For applications built from scratch, SSH 2 should always be the preferred choice. Using the means of logical channels for interactive login sessions and remote execution, a complete replacement for telnet, rsh and rlogin could be easily implemented. A popular site that lists open-source implementations which are freely available for many different platforms can be found under [14]. Recently, a secure file transfer (sftp) application has been developed that makes the use of regular FTP based programs obsolete. Notice that it is possible to tunnel arbitrary application traffic over a connection that has been previously set up by the SSH protocols. Similar to SSL/TLS, web and mail traffic could be securely transmitted over a SSH connection before reaching the server port at the destination host. The difference is that SSH requires that a secure tunnel is created in advance which is bound to a certain port at the destination host. The set up of this secure channel, however, requires that the client that is initiating the connection has to log into the server. Usually, this makes it necessary that the user has an account at the destination host. After the tunnel has been established, all traffic sent into by the client gets forwarded to the desired port at the target machine. Obviously, the connection is encrypted. In contrast to that, SSL/TLS connects directly to a certain point without prior logging into the destination host. The encryption is set up directly between the client and the service listening at the destination port without a prior redirection via the SSH server. The technique of tunneling application traffic is often utilized for mail transactions when the mail server does not support SSL/TLS directly (as users have accounts at the mail server anyway), but it is less common for web traffic. Summary This chapter discuses security threats that systems face when they are connected to the Internet. In order to achieve the security properties that are required by the security policy in use, three different classes of mechanisms can be adopted. The first is attack prevention, which attempts to stop the attacker before it can reach its desired goals. Such techniques fall into the category of access control and firewalls. The second approach aims to make the data unusable for unauthorized persons by applying cryptographic means. Secret key as well as public keys mechanism can be utilized. The third class of mechanisms contains attack detection approaches. They attempt to detect malicious behavior and recover after undesired activity has been identified. The text also covers secure network protocols and applications. SSL/TLS as well as SSH are introduced and its most common fields of operations are highlighted. These protocols form the base of securing traffic that is sent over the Internet in behalf of a variety of different applications.
Use only the Context Block to answer the Question. Your audience is people with limited tech knowledge. What is the example provided for the importance of Alert Verification in Intrusion Detection Systems? Abstract This chapter describes security threats that systems face when they are connected to the Internet. We discuss their security requirements, potential security threats and different mechanisms to combat these. In addition, the text presents the two most popular protocols (SSL and its successor TLS) to secure data transmitted over the Internet. Finally, we describe wellknown applications such as Secure Shell (ssh) and Secure File Transfer Protocol (sftp) that provide a reasonable level of security for common tasks. They may be utilized as underlying building blocks to create secure, Internet enabled applications. In order to provide useful services or to allow people to perform tasks more conveniently, computer systems are attached to networks and get interconnected. This resulted in the world-wide collection of local and wide-area networks known as the Internet. Unfortunately, the extended access possibilities also entail increased security risks as it opens additional avenues for an attacker. For a closed, local system, the attacker was required to be physically present at the network in order to perform unauthorized actions. In the networked case, each host that can send packets to the victim can be potentially utilized. As certain services (such as web or name servers) need to be publicly available, each machine on the Internet might be the originator of malicious activity. This fact makes attacks very likely to happen on a regularly basis. The following text attempts to give a systematic overview of security requirements of Internetbased systems and potential means to satisfy them. We define properties of a secure system and provide a classification of potential threats to them. We also introduce mechanisms to defend against attacks that attempt to violate desired properties. The most widely used means to secure application data against tampering and eavesdropping, the Secure Sockets Layer (SSL) and its successor, the Transport Layer Security (TLS) protocol are discussed. Finally, we briefly describe popular application programs that can act as building blocks for securing custom applications. Before one can evaluate attacks against a system and decide on appropriate mechanisms against them, it is necessary to specify a security policy [23]. A security policy defines the desired properties for each part of a secure computer system. It is a decision that has to take into account the value of the assets that should be protected, the expected threats and the cost of proper protection mechanisms. A security policy that is sufficient for the data of a normal user at home may not be sufficient for bank applications, as these systems are obviously a more likely target and have to protect more valuable resources. Although often neglected, the formulation of an adequate security policy is a prerequisite before one can identify threats and appropriate mechanisms to face them. Security Attacks and Security Properties For the following discussion, we assume that the function of a system that is the target of an attack is to provide information. In general, there is a flow of data from a source (e.g. host, file, memory) to a destination (e.g. remote host, other file, user) over a communication channel (e.g. wire, data bus). The task of the security system is to restrict access to this information to only those parties (persons or processes) that are authorized to have access according to the security policy in use. In the case of an automation system which is remotely connected to the Internet, the information flow is from/to a control application that manages sensors and actuators via communication lines of the public Internet and the network of the automation system (e.g. a field-bus). The normal information flow and several categories of attacks that target it are shown in Figure 1 and explained below (according to [22]). 1. Interruption: An asset of the system gets destroyed or becomes unavailable. This attack targets the source or the communication channel and prevents information from reaching its intended target (e.g. cut the wire, overload the link so that the information gets dropped because of congestion). Attacks in this category attempt to perform a kind of denial-of-service (DOS). 2. Interception: An unauthorized party gets access to the information by eavesdropping into the communication channel (e.g. wiretapping). 3. Modification: The information is not only intercepted, but modified by an unauthorized party while in transit from the source to the destination. By tampering with the information, it is actively altered (e.g. modifying message content). 4. Fabrication: An attacker inserts counterfeit objects into the system without having the sender doing anything. When a previously intercepted object is inserted, this processes is called replaying. When the attacker pretends to be the legitimate source and inserts his desired information, the attack is called masquerading (e.g. replay an authentication message, add records to a file). The four classes of attacks listed above violate different security properties of the computer system. A security property describes a desired feature of a system with regards to a certain type of attack. A common classification following [5, 13] is listed below. • Confidentiality: This property covers the protection of transmitted data against its release to non-authorized parties. In addition to the protection of the content itself, the information flow should also be resistant against traffic analysis. Traffic analysis is used to gather other information than the transmitted values themselves from the data flow (e.g. timing data, frequency of messages). • Authentication: Authentication is concerned with making sure that the information is authentic. A system implementing the authentication property assures the recipient that the data is from the source that it claims to be. The system must make sure that no third party can masquerade successfully as another source. • Non-repudiation: This property describes the feature that prevents either sender or receiver from denying a transmitted message. When a message has been transferred, the sender can prove that it has been received. Similarly, the receiver can prove that the message has actually been sent. • Availability: Availability characterizes a system whose resources are always ready to be used. Whenever information needs to be transmitted, the communication channel is available and the receiver can cope with the incoming data. This property makes sure that attacks cannot prevent resources from being used for their intended purpose. • Integrity: Integrity protects transmitted information against modifications. This property assures that a single message reaches the receiver as it has left the sender, but integrity also extends to a stream of messages. It means that no messages are lost, duplicated or reordered and it makes sure that messages cannot be replayed. As destruction is also covered under this property, all data must arrive at the receiver. Integrity is not only important as a security property, but also as a property for network protocols. Message integrity must also be ensured in case of random faults, not only in case of malicious modifications. Security Mechanisms Different security mechanisms can be used to enforce the security properties defined in a given security policy. Depending on the anticipated attacks, different means have to be applied to satisfy the desired properties. We divide these measures against attacks into three different classes, namely attack prevention, attack avoidance and attack detection. Attack Prevention Attack prevention is a class of security mechanisms that contains ways of preventing or defending against certain attacks before they can actually reach and affect the target. An important element in this category is access control, a mechanism which can be applied at different levels such as the operating system, the network or the application layer. Access control [23] limits and regulates the access to critical resources. This is done by identifying or authenticating the party that requests a resource and checking its permissions against the rights specified for the demanded object. It is assumed that an attacker is not legitimately permitted to use the target object and is therefore denied access to the resource. As access is a prerequisite for an attack, any possible interference is prevented. The most common form of access control used in multi-user computer systems are access control lists for resources that are based on the user identity of the process that attempts to use them. The identity of a user is determined by an initial authentication process that usually requires a name and a password. The login process retrieves the stored copy of the password corresponding to the user name and compares it with the presented one. When both match, the system grants the user the appropriate user credentials. When a resource should be accessed, the system looks up the user and group in the access control list and grants or denies access as appropriate. An example of this kind of access control is a secure web server. A secure web server delivers certain resources only to clients that have authenticated themselves and that posses sufficient credentials for the desired resource. The authentication process is usually handled by the web client such as the Microsoft Internet Explorer or Mozilla by prompting the user for his name and password. The most important access control system at the network layer is a firewall [4]. The idea of a firewall is based on the separation of a trusted inside network of computers under single administrative control from a potential hostile outside network. The firewall is a central choke point that allows enforcement of access control for services that may run at the inside or outside. The firewall prevents attacks from the outside against the machines in the inside network by denying connection attempts from unauthorized parties located outside. In addition, a firewall may also be utilized to prevent users behind the firewall from using certain services that are outside (e.g. surfing web sites containing pornographic material). For certain installations, a single firewall is not suitable. Networks that consist of several server machines which need to be publicly accessible and workstations that should be completely protected against connections from the outside would benefit from a separation between these two groups. When an attacker compromises a server machine behind a single firewall, all other machines can be attacked from this new base without restrictions. To prevent this, one can use two firewalls and the concept of a demilitarized zone (DMZ) [4] in between as shown in Figure 2. In this setup, one firewall separates the outside network from a segment (DMZ) with the server machines while a second one separates this area from the rest of the network. The second firewall can be configured in a way that denies all incoming connection attempts. Whenever an intruder compromises a server, he is now unable to immediately attack a workstation located in the inside network. The following design goals for firewalls are identified in [4]. 1. All traffic from inside to outside, and vice versa, must pass through the firewall. This is achieved by physically blocking all access to the internal network except via the firewall. 2. Only authorized traffic, as defined by the local security policy, will be allowed to pass. 3. The firewall itself should be immune to penetration. This implies the use of a trusted system with a secure operating system. A trusted, secure operating system is often purpose-built, has heightened security features and only provides the minimal functionality necessary to run the desired applications. These goals can be reached by using a number of general techniques for controlling access. The most common is called service control and determines Internet services that can be accessed. Traffic on the Internet is currently filtered on basis of IP addresses and TCP/UDP port numbers. In addition, there may be proxy software that receives and interprets each service request before passing it on. Direction control is a simple mechanism to control the direction in which particular service requests may be initiated and permitted to flow through. User control grants access to a service based on user credentials similar to the technique used in a multi-user operating system. Controlling external users requires secure authentication over the network (e.g. such as provided in IPSec [10]). A more declarative approach in contrast to the operational variants mentioned above is behavior control. This technique determines how particular services are used. It may be utilized to filter e-mail to eliminate spam or to allow external access to only part of the local web pages. A summary of capabilities and limitations of firewalls is given in [22]. The following benefits can be expected. • A firewall defines a single choke point that keeps unauthorized users out of the protected network. The use of such a point also simplifies security management. • It provides a location for monitoring security related events. Audits, logs and alarms can be implemented on the firewall directly. In addition, it forms a convenient platform for some non-security related functions such as address translation and network management. • A firewall may serve as a platform to implement a virtual private network (e.g. by using IPSec). The list below enumerates the limits of the firewall access control mechanism. • A firewall cannot protect against attacks that bypass it, for example, via a direct dial-up link from the protected network to an ISP (Internet Service Provider). It also does not protect against internal threats from an inside hacker or an insider cooperating with an outside attacker. • A firewall does not help when attacks are against targets whose access has to be permitted. • It cannot protect against the transfer of virus-infected programs or files. It would be impossible, in practice, for the firewall to scan all incoming files and e-mails for viruses. Firewalls can be divided into two main categories. A Packet-Filtering Router, or short packet filter, is an extended router that applies certain rules to the packets which are forwarded. Usually, traffic in each direction (in- and outgoing) is checked against a rule set which determines whether a packet is permitted to continue or should be dropped. The packet filter rules operate on the header fields used by the underlying communication protocols, for the Internet almost always IP, TCP and UDP. Packet filters have the advantage that they are cheap as they can often be built on existing hardware. In addition, they offer a good performance for high traffic loads. An example for a packet filter is the iptables package which is implemented as part of the Linux 2.4 routing software. A different approach is followed by an Application-Level Gateway, also called proxy server. This type of firewall does not forward packets on the network layer but acts as a relay on the application level. The user contacts the gateway which in turn opens a connection to the intended target (on behalf of the user). A gateway completely separates the inside and outside networks at the network level and only provides a certain set of application services. This allows authentication of the user who requests a connection and session-oriented scanning of the exchanged traffic up to the application level data. This feature makes application gateways more secure than packet filters and offers a broader range of log facilities. On the downside, the overhead of such a setup may cause performance problems under heavy load. Another important element in the set of attack prevention mechanisms is system hardening. System hardening is used to describe all steps that are taken to make a computer system more secure. It usually refers to changing the default configuration to a more secure one, possible at the expense of ease-of-use. Vendors usually pre-install a large set of development tools and utilities, which, although beneficial to the new user, might also contain vulnerabilities. The initial configuration changes that are part of system hardening include the removal of services, applications and accounts that are not needed and the enabling of operating system auditing mechanisms (e.g., Event Log in Windows). Hardening also involves a vulnerability assessment of the system. Numerous open-source tools such as network (e.g., nmap [8]) and vulnerability scanners (e.g., Nessus [12]) can help to check a system for open ports and known vulnerabilities. This knowledge then helps to remedy these vulnerabilities and close unnecessary ports. An important and ongoing effort in system hardening is patching. Patching describes a method of updating a file that replaces only the parts being changed, rather than the entire file. It is used to replace parts of a (source or binary) file that contains a vulnerability that is exploitable by an attacker. To be able to patch, it is necessary that the system administrators keep up to date with security advisories that are issued by vendors to inform about security related problems in their products. Attack Avoidance Security mechanisms in this category assume that an intruder may access the desired resource but the information is modified in a way that makes it unusable for the attacker. The information is pre-processed at the sender before it is transmitted over the communication channel and postprocessed at the receiver. While the information is transported over the communication channel, it resists attacks by being nearly useless for an intruder. One notable exception are attacks against the availability of the information as an attacker could still interrupt the message. During the processing step at the receiver, modifications or errors that might have previously occurred can be detected (usually because the information can not be correctly reconstructed). When no modification has taken place, the information at the receiver is identical to the one at the sender before the pre-processing step. The most important member in this category is cryptography which is defined as the science of keeping messages secure [18]. It allows the sender to transform information into a random data stream from the point of view of an attacker but to have it recovered by an authorized receiver (see Figure 3). The original message is called plain text (sometimes clear text). The process of converting it through the application of some transformation rules into a format that hides its substance is called encryption. The corresponding disguised message is denoted cipher text and the operation of turning it back into clear text is called decryption. It is important to notice that the conversion from plain to cipher text has to be loss-less in order to be able to recover the original message at the receiver under all circumstances. The transformation rules are described by a cryptographic algorithm. The function of this algorithm is based on two main principles: substitution and transposition. In the case of substitution, each element of the plain text (e.g. bit, block) is mapped into another element of the used alphabet. Transposition describes the process where elements of the plain text are rearranged. Most systems involve multiple steps (called rounds) of transposition and substitution to be more resistant against cryptanalysis. Cryptanalysis is the science of breaking the cipher, i.e. discovering the substance of the message behind its disguise. When the transformation rules process the input elements one at a time the mechanism is called a stream cipher, in case of operating on fixed-sized input blocks it is called a block cipher. If the security of an algorithm is based on keeping the way how the algorithm works (i.e. the transformation rules) secret, it is called a restricted algorithm. Those algorithms are no longer of any interest today because they don’t allow standardization or public quality control. In addition, when a large group of users is involved, such an approach cannot be used. A single person leaving the group makes it necessary for everyone else to change the algorithm. Modern cryptosystems solve this problem by basing the ability of the receiver to recover encrypted information on the fact that he possesses a secret piece of information (usually called the key). Both encryption and decryption functions have to use a key and they are heavily dependent on it. When the security of the cryptosystem is completely based on the security of the key, the algorithm itself may be revealed. Although the security does not rely on the fact that the algorithm is unknown, the cryptographic function itself and the used key together with its length must be chosen with care. A common assumption is that the attacker has the fastest commercially available hardware at his disposal in his attempt to break the cipher text. The most common attack, called known plain text attack, is executed by obtaining cipher text together with its corresponding plain text. The encryption algorithm must be so complex that even if the code breaker is equipped with plenty of such pairs and powerful machines, it is infeasible for him to retrieve the key. An attack is infeasible when the cost of breaking the cipher exceeds the value of the information or the time it takes to break it exceeds the lifespan of the information. Given pairs of corresponding cipher and plain text, it is obvious that a simple key guessing algorithm will succeed after some time. The approach of successively trying different key values until the correct one is found is called brute force attack because no information about the algorithm is utilized whatsoever. In order to be useful, it is a necessary condition for an encryption algorithm that brute force attacks are infeasible. Depending on the keys that are used, one can distinguish two major cryptographic approaches - public and secret key cryptosystems. Secret Key Cryptography This is the kind of cryptography that has been used for the transmission of secret information for centuries, long before the advent of computers. These algorithms require that the sender and the receiver agree on a key before communication is started. It is common for this variant (which is also called single key or symmetric encryption) that a single secret key is shared between the sender and the receiver. It needs to be communicated in a secure way before the actual encrypted communication can start and has to remain secret as long as the information is to remain secret. Encryption is achieved by applying an agreed function to the plain text using the secret key. Decryption is performed by applying the inverse function using the same key. The classic example of a secret key block cipher which is widely deployed today is the Data Encryption Standard (DES) [6]. DES has been developed in 1977 by IBM and adopted as a standard by the US government for administrative and business use. Recently, it has been replaced by the Advanced Encryption Standard (AES - Rijndael) [1]. It is a block cipher that operates on 64-bit plain text blocks and utilizes a key with 56-bits length. The algorithm uses 16 rounds that are key dependent. During each round 48 key bits are selected and combined with the block that is encrypted. Then, the resulting block is piped through a substitution and a permutation phase (which use known values and are independent of the key) to make cryptanalysis harder. Although there is no known weakness of the DES algorithm itself, its security has been much debated. The small key length makes brute force attacks possible and several cases have occurred where DES protected information has been cracked. A suggested improvement called 3DES uses three rounds of the simple DES with three different keys. This extends the key length to 168 bits while still resting on the very secure DES base. A well known stream cipher that has been debated recently is RC4 [16] which has been developed by RSA. It is used to secure the transmission in wireless networks that follow the IEEE 802.11 standard and forms the core of the WEP (wired equivalent protection) mechanism. Although the cipher itself has not been broken, current implementations are flawed and reduce the security of RC4 down to a level where the used key can be recovered by statistical analysis within a few hours. Public Key Cryptography Since the advent of public key cryptography, the knowledge of the key that is used to encrypt a plain text also allowed the inverse process, the decryption of the cipher text. In 1976, this paradigm of cryptography was changed by Diffie and Hellman [7] when they described their public key approach. Public key cryptography utilizes two different keys, one called the public key, the other one called the private key. The public key is used to encrypt a message while the corresponding private key is used to do the opposite. Their innovation was the fact that it is infeasible to retrieve the private key given the public key. This makes it possible to remove the weakness of secure key transmission from the sender to the receiver. The receiver can simply generate his public/private key pair and announce the public key without fear. Anyone can obtain this key and use it to encrypt messages that only the receiver with his private key is able to decrypt. Mathematically, the process is based on the trap door of one-way functions. A one-way function is a function that is easy to compute but very hard to inverse. That means that given x it is easy to determine f(x) but given f(x) it is hard to get x. Hard is defined as computationally infeasible in the context of cryptographically strong one-way functions. Although it is obvious that some functions are easier to compute than their inverse (e.g. square of a value in contrast to its square root) there is no mathematical proof or definition of one-way functions. There are a number of problems that are considered difficult enough to act as one-way functions but it is more an agreement among crypto analysts than a rigorously defined set (e.g. factorization of large numbers). A one-way function is not directly usable for cryptography, but it becomes so when a trap door exists. A trap door is a mechanism that allows one to easily calculate x from f(x) when an additional information y is provided. A common misunderstanding about public key cryptography is thinking that it makes secret key systems obsolete, either because it is more secure or because it does not have the problem of secretly exchanging keys. As the security of a cryptosystem depends on the length of the used key and the utilized transformation rules, there is no automatic advantage of one approach over the other. Although the key exchange problem is elegantly solved with a public key, the process itself is very slow and has its own problems. Secret key systems are usually a factor of 1000 (see [18] for exact numbers) faster than their public key counterparts. Therefore, most communication is stilled secured using secret key systems and public key systems are only utilized for exchanging the secret key for later communication. This hybrid approach is the common design to benefit from the high-speed of conventional cryptography (which is often implemented directly in hardware) and from a secure key exchange. A problem in public key systems is the authenticity of the public key. An attacker may offer the sender his own public key and pretend that it origins from the legitimate receiver. The sender then uses the faked public key to perform his encryption and the attacker can simply decrypt the message using his private key. In order to thwart an attacker that attempts to substitute his public key for the victim’s one, certificates are used. A certificate combines user information with the user’s public key and the digital signature of a trusted third party that guarantees that the key belongs to the mentioned person. The trusted third party is usually called a certification authority (CA). The certificate of a CA itself is usually verified by a higher level CA that confirms that the CA’s certificate is genuine and contains its public key. The chain of third parties that verify their respective lower level CAs has to end at a certain point which is called the root CA. A user that wants to verify the authenticity of a public key and all involved CAs needs to obtain the self-signed certificate of the root CA via an external channel. Web browsers (e.g. Netscape Navigator, Internet Explorer) usually ship with a number of certificates of globally known root CAs. A framework that implements the distribution of certificates is called a public key infrastructure (PKI). An important protocol for key management is X.509 [25]. Another important issue is revocation, the invalidation of a certificate when the key has been compromised. The best known public key algorithm and textbook classic is RSA [17], named after its inventors Rivest, Shamir and Adleman at MIT. It is a block cipher that is still utilized for the majority of current systems, although the key length has been increased over recent years. This has put a heavier processing load on applications, a burden that has ramifications especially for sites doing electronic commerce. A competitive approach that promises similar security as RSA using far smaller key lengths is elliptic curve cryptography. However, as these systems are new and have not been subject to sustained cryptanalysis, the confidence level in them in not yet as high as in RSA. Authentication and Digital Signatures An interesting and important feature of public key cryptography is its possible use for authentication. In addition to making the information unusable for attackers, a sender may utilize cryptography to prove his identity to the receiver. This feature is realized by digital signatures. A digital signature must have similar properties as a normal handwritten signature. It must be hard to forge and it has to be bound to a certain document. In addition, one has to make sure that a valid signature cannot be used by an attacker to replay the same (or different) messages at a later time. A way to realize such a digital signature is by using the sender’s private key to encrypt a message. When the receiver is capable of successfully decrypting the cipher text with the sender’s public key, he can be sure that the message is authentic. This approach obviously requires a cryptosystem that allows encryption with the private key, but many (such as RSA) offer this option. It is easy for a receiver to verify that a message has been successfully decrypted when the plain text is in a human readable format. For binary data, a checksum or similar integrity checking footer can be added to verify a successful decryption. Replay attacks are prevented by adding a time-stamp to the message (e.g. Kerberos [11] uses timestamps to prevent that messages to the ticket granting service are replayed). Usually, the storage and processing overhead for encrypting a whole document is too high to be practical. This is solved by one-way hash functions. These are functions that map the content of a message onto a short value (called message digest). Similar to one-way functions it is difficult to create a message when given only the hash value itself. Instead of encrypting the whole message, it is enough to simply encrypt the message digest and send it together with the original message. The receiver can then apply the known hash function (e.g. MD5 [15]) to the document and compare it to the decrypted digest. When both values match, the messages is authentic. Attack and Intrusion Detection Attack detection assumes that an attacker can obtain access to his desired targets and is successful in violating a given security policy. Mechanisms in this class are based on the optimistic assumption that most of the time the information is transferred without interference. When undesired actions occur, attack detection has the task of reporting that something went wrong and then to react in an appropriate way. In addition, it is often desirable to identify the exact type of attack. An important facet of attack detection is recovery. Often it is enough to just report that malicious activity has been found, but some systems require that the effect of the attack has to be reverted or that an ongoing and discovered attack is stopped. On the one hand, attack detection has the advantage that it operates under the worst case assumption that the attacker gains access to the communication channel and is able to use or modify the resource. On the other hand, detection is not effective in providing confidentiality of information. When the security policy specifies that interception of information has a serious security impact, then attack detection is not an applicable mechanism. The most important members of the attack detection class, which have received an increasing amount of attention in the last few years, are intrusion detection systems (aka IDS). Intrusion Detection [2, 3] is the process of identifying and responding to malicious activities targeted at computing and network resources. This definition introduces the notion of intrusion detection as a process, which involves technology, people and tools. An intrusion detection system basically monitors and collects data from a target system that should be protected, processes and correlates the gathered information and initiate responses, when evidence for an intrusion is detected. IDS are traditionally classified as anomaly or signature-based. Signature-based systems act similar to virus scanners and look for known, suspicious patterns in their input data. Anomaly- based systems watch for deviations of actual from expected behavior and classify all ‘abnormal’ activities as malicious. The advantage of signature-based designs is the fact that they can identify attacks with an acceptable accuracy and tend to produce fewer false alarms (i.e. classifying an action as malicious when in fact it is not) than their anomaly-based cousins. The systems are more intuitive to build and easier to install and configure, especially in large production networks. Because of this, nearly all commercial systems and most deployed installations utilize signature-based detection. Although anomaly-based variants offer the advantage of being able to find prior unknown intrusions, the costs of having to deal with an order of magnitude more false alarms is often prohibitive. Depending on their source of input data, IDS can be classified as either network or host-based. Network-based systems collect data from network traffic (e.g. packets by network interfaces in promiscuous mode) while host-based systems monitor events at operating system level such as system calls or receive input from applications (e.g. via log files). Host-based designs can collect high quality data directly from the affected system and are not influenced by encrypted network traffic. Nevertheless, they often seriously impact performance of the machines they are running on. Network-based IDS, on the other hand, can be set up in a non-intrusive manner - often as an appliance box without interfering with the existing infrastructure. In many cases, this makes them the preferred choice. As many vendors and research centers have developed their own intrusion detection system versions, the IETF has created the intrusion detection working group [9] to coordinate international standardization efforts. The aim is to allow intrusion detection systems to share information and to communicate via well defined interfaces by proposing a generic architectural description and a message specification and exchange format (IDMEF). A major issue when deploying intrusion detection systems in large network installations are the huge numbers of alerts that are produced. These alerts have to be analyzed by system administrators who have to decide on the appropriate countermeasures. Given the current state-of-the-art of intrusion detection, however, many of the reported incidents are in fact false alerts. This makes the analysis process for the system administrator cumbersome and frustrating, resulting in the problem that IDSs are often disabled or ignored. To address this issue, two new techniques have been proposed: alert correlation and alert verification. Alert correlation is an analysis process that takes as input the alerts produced by intrusion detection systems and produces compact reports on the security status of the network under surveillance. By reducing the total number of individual alerts and aggregating related incidents into a single report, is is easier for a system administrator to distinguish actual and bogus alarms. In addition, alert correlation offers the benefit of recognizing higher-level patterns in an alert stream, helping the administrator to obtain a better overview of the activities on the network. Alert verification is a technique that is directly aimed at the problem that intrusion detection systems often have to analyze data without sufficient contextual information. The classic example is the scenario of a Code Red worm that attacks a Linux web server. It is a valid attack that is seen on the network, however, the alert that an IDS raises is of no use because the Linux server is not vulnerable (as Code Red can only exploit vulnerabilities in Microsoft’s IIS web server). The intrusion detection system would require more information to determine that this attack cannot possibly succeed than available from only looking at network packets. Alert verification is a term that is used for all mechanisms that use additional information or means to determine whether an attack was successful or not. In the example above, the alert verification mechanism could supply the IDS with the knowledge that the attacked Linux server is not vulnerable to a Code Red attack. As a consequence, the IDS can react accordingly and suppress the alert or reduce its priority and thus reduce the workload of the administrator. Secure Network Protocols After the general concepts and mechanisms of network security have been introduced, the following section concentrates on two actual instances of secure network protocols, namely the Secure Sockets Layer (SSL, [20]) and the Transport Layer Security (TLS, [24]) protocol. The idea of secure network protocols is to create an additional layer between the application and the transport/network layer to provide services for a secure end-to-end communication channel. TCP/IP are almost always used as transport/network layer protocols on the Internet and their task is to provide a reliable end-to-end connection between remote tasks on different machines that intend to communicate. The services on that level are usually directly utilized by application protocols to exchange data, for example HTTP (Hypertext Transfer Protocol) for web services. Unfortunately, the network layer transmits this data unencrypted, leaving it vulnerable to eavesdropping or tampering attacks. In addition, the authentication mechanisms of TCP/IP are only minimal, thereby allowing a malicious user to hijack connections and redirect traffic to his machine as well as to impersonate legitimate services. These threats are mitigated by secure network protocols that provide privacy and data integrity between two communicating applications by creating an encrypted and authenticated channel. SSL has emerged as the de-facto standard for secure network protocols. Originally developed by Netscape, its latest version SSL 3.0 is also the base for the standard proposed by the IETF under the name TLS. Both protocols are quite similar and share common ideas, but they unfortunately can not inter-operate. The following discussion will mainly concentrate on SSL and only briefly explain the extensions implemented in TLS. The SSL protocol [21] usually runs above TCP/IP (although it could use any transport protocol) and below higher-level protocols such as HTTP. It uses TCP/IP on behalf of the higher-level protocols, and in the process allows an SSL-enabled server to authenticate itself to an SSL-enabled client, allows the client to authenticate itself to the server, and allows both machines to establish an encrypted connection. These capabilities address fundamental concerns about communication over the Internet and other TCP/IP networks and give protection against message tampering, eavesdropping and spoofing. • SSL server authentication allows a user to confirm a server’s identity. SSL-enabled client software can use standard techniques of public-key cryptography to check that a server’s certificate and public key are valid and have been issued by a certification authority (CA) listed in the client’s list of trusted CAs. This confirmation might be important if the user, for example, is sending a credit card number over the network and wants to check the receiving server’s identity. • SSL client authentication allows a server to confirm a user’s identity. Using the same techniques as those used for server authentication, SSL-enabled server software can check that a client’s certificate and public key are valid and have been issued by a certification authority (CA) listed in the server’s list of trusted CAs. This confirmation might be important if the server, for example, is a bank sending confidential financial information to a customer and wants to check the recipient’s identity. • An encrypted SSL connection requires all information sent between a client and a server to be encrypted by the sending software and decrypted by the receiving software, thus providing a high degree of confidentiality. Confidentiality is important for both parties to any private transaction. In addition, all data sent over an encrypted SSL connection is protected with a mechanism for detecting tampering – that is, for automatically determining whether the data has been altered in transit. SSL uses X.509 certificates for authentication, RSA as its public-key cipher and one of RC4-128, RC2-128, DES, Triple DES or IDEA as its bulk symmetric cipher. The SSL protocol includes two sub-protocols, namely the SSL Record Protocol and the SSL Handshake Protocol. The SSL Record Protocol simply defines the format used to transmit data. The SSL Handshake Protocol (using the SSL Record Protocol) is utilized to exchange a series of messages between an SSL-enabled server and an SSL-enabled client when they first establish an SSL connection. This exchange of messages is designed to facilitate the following actions. • Authenticate the server to the client. • Allow the client and server to select the cryptographic algorithms, or ciphers, that they both support. • Optionally authenticate the client to the server. • Use public-key encryption techniques to generate shared secrets. • Establish an encrypted SSL connection based on the previously exchanged shared secret. The SSL Handshake Protocol is composed of two phases. Phase 1 deals with the selection of a cipher, the exchange of a secret key and the authentication of the server. Phase 2 handles client authentication, if requested and finishes the handshaking. After the handshake stage is complete, the data transfer between client and server begins. All messages during handshaking and after, are sent over the SSL Record Protocol layer. Optionally, session identifiers can be used to re-established a secure connection that has been previously set up. Figure 4 lists in a slightly simplified form the messages that are exchanged between the client C and the server S during a handshake when neither client authentication nor session identifiers are involved. In this figure, {data}key means that data has been encrypted with key. The message exchanges shows that the client first sends a challenge to the server which responds with a X.509 certificate containing its public key. The client then creates a secret key and uses RSA with the server’s public key to encrypt it, sending the result back to the server. Only the server is capable of decrypting that message with its private key and can retrieve the shared, secret key. I order to prove to the client that the secret key has been successfully decrypted, the server encrypts the client’s challenge with the secret key and returns it. When the client is able to decrypt this message and successfully retrieves the original challenge by using the secret key, it can be certain that the server has access to the private key corresponding to its certificate. From this point on, all communication is encrypted using the chosen cipher and the shared secret key. TLS uses the same two protocols shown above and a similar handshake mechanism. Nevertheless, the algorithms for calculating message authentication codes (MACs) and secret keys have been modified to make them cryptographically more secure. In addition, the constraints on padding a message up to the next block size have been relaxed for TLS. This leads to an incompatibility between both protocols. SSL/TLS is widely used to secure web and mail traffic. HTTP as well as the current mail protocols IMAP (Internet Message Access Protocol) and POP3 (post office protocol, version 3) transmit user credential information as well as application data unencrypted. By building them on top of a secure network protocol such as SSL/TLS, they can benefit from secured channels without modifications. The secure communication protocols simply utilize different well-known destination ports (443 for HTTPS, 993 for IMAPS and 995 for POP3S) than their insecure cousins. Secure Applications A variety of popular tools that allow access to remote hosts (such as telnet, rsh and rlogin) or that provide means for file transfer (such as rcp or ftp) exchange user credentials and data in plain text. This makes them vulnerable to eavesdropping, tampering and spoofing attacks. Although the tools mentioned above could have also been built upon SSL/TLS, a different protocol suite called Secure Shell (SSH) [19] has been developed which follows partial overlapping goals. The SSH Transport and User Authentication protocols have features similar to those of SSL/TLS. However, they are different in the following ways. • TLS server authentication is optional and the protocol supports fully anonymous operation, in which neither side is authenticated. As such connections are inherently vulnerable to man-in-the-middle attacks, SSH requires server authentication. • TLS does not provide the range of client authentication options that SSH does - public-key via RSA is the only option. • Most importantly, TLS does not have the extra features provided by the SSH Connection Protocol. The SSH Connection Protocol uses the underlying connection, aka secure tunnel, which has been established by the SSH Transport and User Authentication protocols between two hosts. It provides interactive login sessions, remote execution of commands and forwarded TCP/IP as well as X11 connections. All these terminal sessions and forwarded connections are realized as different logical channels that may be opened by either side on top of the secure tunnel. Channels are flow-controlled which means that no data may be sent to a channel until a message is received to indicate that window space is available. The current version of the SSH protocol is SSH 2. It represents a complete rewrite of SSH 1 and improves some of its structural weaknesses. As it encrypts packets in a different way and has abandoned the notion of server and host keys in favor of host keys only, the protocols are incompatible. For applications built from scratch, SSH 2 should always be the preferred choice. Using the means of logical channels for interactive login sessions and remote execution, a complete replacement for telnet, rsh and rlogin could be easily implemented. A popular site that lists open-source implementations which are freely available for many different platforms can be found under [14]. Recently, a secure file transfer (sftp) application has been developed that makes the use of regular FTP based programs obsolete. Notice that it is possible to tunnel arbitrary application traffic over a connection that has been previously set up by the SSH protocols. Similar to SSL/TLS, web and mail traffic could be securely transmitted over a SSH connection before reaching the server port at the destination host. The difference is that SSH requires that a secure tunnel is created in advance which is bound to a certain port at the destination host. The set up of this secure channel, however, requires that the client that is initiating the connection has to log into the server. Usually, this makes it necessary that the user has an account at the destination host. After the tunnel has been established, all traffic sent into by the client gets forwarded to the desired port at the target machine. Obviously, the connection is encrypted. In contrast to that, SSL/TLS connects directly to a certain point without prior logging into the destination host. The encryption is set up directly between the client and the service listening at the destination port without a prior redirection via the SSH server. The technique of tunneling application traffic is often utilized for mail transactions when the mail server does not support SSL/TLS directly (as users have accounts at the mail server anyway), but it is less common for web traffic. Summary This chapter discuses security threats that systems face when they are connected to the Internet. In order to achieve the security properties that are required by the security policy in use, three different classes of mechanisms can be adopted. The first is attack prevention, which attempts to stop the attacker before it can reach its desired goals. Such techniques fall into the category of access control and firewalls. The second approach aims to make the data unusable for unauthorized persons by applying cryptographic means. Secret key as well as public keys mechanism can be utilized. The third class of mechanisms contains attack detection approaches. They attempt to detect malicious behavior and recover after undesired activity has been identified. The text also covers secure network protocols and applications. SSL/TLS as well as SSH are introduced and its most common fields of operations are highlighted. These protocols form the base of securing traffic that is sent over the Internet in behalf of a variety of different applications.
Use only the document provided and nothing else.
How does Herbalife's "seed to feed" strategy influence its product quality and sourcing?
2022 Annual Report To Our Shareholders, We all know coming out of the pandemic has caused many companies to relook at their operations. 2022 was a year of change for Herbalife as well as a year of challenge. With every challenge, there is great opportunity. I came back to Herbalife because I believe passionately about what Herbalife does, and what it provides for health and income. Since returning to Herbalife, I along with our management team and distributor leaders from around the world have embarked on a journey to expand our content, enhance the business opportunity, modernize our brand, and expand our digital platform – with the aim to reach more customers and to provide our distributors a better plat- form to operate their business. Our vision is to be the world’s premier health and wellness company and community. As I write this, more than 3,000 distributor leaders from around the world are traveling to Los Angeles to meet together for the first time in three years to learn, to share, to innovate, and to build a path forward for Herbalife. The time is now for us to reconnect, build on our strategic plan, and provide growth for all of our stakeholders. Our digital transformation “Herbalife One” will enhance the Company’s two main platforms: content and busi- ness opportunity. Our content is our product. With obesity levels hitting record highs around the globe and a greater demand for health and wellness support, we have plans to grow our product portfolio through our daily nutrition products with expanded vegan and protein lines. We plan to explore other health and wellness opportunities that will be based on global as well as regional consumer demands. For example, our unique Ayurvedic product line in India has contributed to the success of our fastest growing market. We are unleashing similar innovative products regionally in Europe, Asia and China, and we will continue to look for synergies and opportunities to globalize our regional product offerings. With enhancements to the business opportunity, our global distributor network will continue to give us a com- petitive advantage to reach more consumers with more offerings than ever before. Our distributors give a personal voice and passion to our products. Spanning across 95 markets, our distributors are amazing entrepreneurs who have unique relationships with their customers, and through an expanded use of data, we will be able to assist our distributors to sell more products and work more closely and efficiently with consumers on their health and wellness journey. To this end, we are modernizing our brand and compensation structure, including new promotions to energize and incentivize our distributors to earn early in their Herbalife business opportunity journey. Together with Herbalife One, our business opportunity will differentiate us and strengthen our leadership in the marketplace. 2023 is a start of a new chapter – one that is both motivating and exciting. In March, I marked my 20th year of devoting my time, passion, and energy to Herbalife. I feel more optimistic about where we are headed today than ever before. Our distributors and employees make Herbalife a community unlike any other. I know our distrib- utors and employees are as incredibly excited about the future as I am. Thank you for your trust and support. Michael O. Johnson Chairman and Chief Executive Officer This letter contains “forward-looking statements” within the meaning of the safe harbor provisions of the Private Securities Litigation Reform Act of 1995. Although we believe that the expectations reflected in any of our forward-looking statements are reasonable, actual results or outcomes could differ materially from those pro- jected or assumed in any of our forward-looking statements. Our future financial condition and results of oper- ations, as well as any forward-looking statements, are subject to change and to inherent risks and uncertainties, many of which are beyond our control. Additionally, many of these risks and uncertainties are, and may continue to be, amplified by the COVID-19 pandemic. Important factors that could cause our actual results, performance and achievements, or industry results to differ materially from estimates or projections contained in or implied by our forward-looking statements include the following: the potential impacts of the COVID-19 pandemic and current global economic conditions, including inflation, on us; our Members, customers, and supply chain; and the world economy; our ability to attract and retain Members; our relationship with, and our ability to influence the actions of, our Members; our noncompliance with, or improper action by our employees or Members in violation of, applicable U.S. and foreign laws, rules, and regulations; adverse publicity associated with our Company or the direct-selling industry, including our ability to comfort the marketplace and regulators regard- ing our compliance with applicable laws; changing consumer preferences and demands and evolving industry standards, including with respect to climate change, sustainability, and other environmental, social, and gover- nance, or ESG, matters; the competitive nature of our business and industry; legal and regulatory matters, including regulatory actions concerning, or legal challenges to, our products or network marketing program and product liability claims; the Consent Order entered into with the FTC, the effects thereof and any failure to comply therewith; risks associated with operating internationally and in China; our ability to execute our growth and other strategic initiatives, including implementation of our Transformation Program and increased pene- tration of our existing markets; any material disruption to our business caused by natural disasters, other cata- strophic events, acts of war or terrorism, including the war in Ukraine, cybersecurity incidents, pandemics, and/ or other acts by third parties; our ability to adequately source ingredients, packaging materials, and other raw materials and manufacture and distribute our products; our reliance on our information technology infra- structure; noncompliance by us or our Members with any privacy laws, rules, or regulations or any security breach involving the misappropriation, loss, or other unauthorized use or disclosure of confidential information; contractual limitations on our ability to expand or change our direct-selling business model; the sufficiency of our trademarks and other intellectual property; product concentration; our reliance upon, or the loss or departure of any member of, our senior management team; restrictions imposed by covenants in the agreements governing our indebtedness; risks related to our convertible notes; changes in, and uncertainties relating to, the application of transfer pricing, income tax, customs duties, value added taxes, and other tax laws, treaties, and regulations, or their interpretation; our incorporation under the laws of the Cayman Islands; and share price volatility related to, among other things, speculative trading and certain traders shorting our common shares. Forward-looking statements in this letter speak only as of March 14, 2023. We do not undertake any obligation to update or release any revisions to any forward-looking statement or to report any events or circumstances after such date or to reflect the occurrence of unanticipated events, except as required by law. UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 Form 10-K (Mark One) ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the fiscal year ended December 31, 2022 OR TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the transition period from to Commission file number: 1-32381 HERBALIFE NUTRITION LTD. (Exact name of registrant as specified in its charter) Cayman Islands 98-0377871 (State or other jurisdiction of (I.R.S. Employer incorporation or organization) Identification No.) P.O. Box 309GT Ugland House, South Church Street Grand Cayman, Cayman Islands (Address of principal executive offices) (Zip Code) (213) 745-0500 (Registrant’s telephone number, including area code) Securities registered pursuant to Section 12(b) of the Act: Title of each class: Trading Symbol(s): Name of each exchange on which registered: Common Shares, par value $0.0005 per share HLF New York Stock Exchange Securities registered pursuant to Section 12(g) of the Act: None Indicate by check mark if the registrant is a well-known seasoned issuer, as defined in Rule 405 of the Securities Act. Yes ☒ No ☐ Indicate by check mark if the registrant is not required to file reports pursuant to Section 13 or Section 15(d) of the Act. Yes ☐ No ☒ Indicate by check mark whether the registrant: (1) has filed all reports required to be filed by Section 13 or 15(d) of the Securities Exchange Act of 1934 during the preceding 12 months (or for such shorter period that the registrant was required to file such reports), and (2) has been subject to such filing requirements for the past 90 days. Yes ☒ No ☐ Indicate by check mark whether the registrant has submitted electronically every Interactive Data File required to be submitted pursuant to Rule 405 of Regulation S-T (§232.405 of this chapter) during the preceding 12 months (or for such shorter period that the registrant was required to submit such files). Yes ☒ No ☐ Indicate by check mark whether the registrant is a large accelerated filer, an accelerated filer, a non-accelerated filer, a smaller reporting company, or an emerging growth company. See the definitions of “large accelerated filer,” “accelerated filer,” “smaller reporting company,” and “emerging growth company” in Rule 12b-2 of the Exchange Act. Large accelerated filer ☒ Accelerated filer ☐ Non-accelerated filer ☐ Smaller reporting company ☐ Emerging growth company ☐ If an emerging growth company, indicate by check mark if the registrant has elected not to use the extended transition period for complying with any new or revised financial accounting standards provided pursuant to Section 13(a) of the Exchange Act. ☐ Indicate by check mark whether the registrant has filed a report on and attestation to its management’s assessment of the effectiveness of its internal control over financial reporting under Section 404(b) of the Sarbanes-Oxley Act (15 U.S.C. 7262(b)) by the registered public accounting firm that prepared or issued its audit report. ☒ If securities are registered pursuant to Section 12(b) of the Act, indicate by check mark whether the financial statements of the registrant included in the filing reflect the correction of an error to previously issued financial statements. ☐ Indicate by check mark whether any of those error corrections are restatements that required a recovery analysis of incentive-based compensation received by any of the registrant’s executive officers during the relevant recovery period pursuant to §240.10D-1(b). ☐ Indicate by check mark whether registrant is a shell company (as defined in Rule 12b-2 of the Exchange Act). Yes ☐ No ☒ There were 97,920,728 common shares outstanding as of February 7, 2023. The aggregate market value of the Registrant’s common shares held by non-affiliates was approximately $896 million as of June 30, 2022, based upon the last reported sales price on the New York Stock Exchange on that date of $20.45. For the purposes of this disclosure only, the registrant has assumed that its directors, executive officers, and the beneficial owners of 5% or more of the registrant’s outstanding common stock are the affiliates of the registrant. DOCUMENTS INCORPORATED BY REFERENCE Portions of the registrant’s Definitive Proxy Statement to be filed with the Securities and Exchange Commission no later than 120 days after the end of the Registrant’s fiscal year ended December 31, 2022, are incorporated by reference in Part III of this Annual Report on Form 10-K. 1 TABLE OF CONTENTS Page No. PART I Item 1. Business 5 Item 1A. Risk Factors 19 Item 1B. Unresolved Staff Comments 43 Item 2. Properties 43 Item 3. Legal Proceedings 44 Item 4. Mine Safety Disclosures 44 PART II Item 5. Market for Registrant’s Common Equity, Related Stockholder Matters and Issuer Purchases of Equity 45 Securities Item 6. [Reserved] 46 Item 7. Management’s Discussion and Analysis of Financial Condition and Results of Operations 47 Item 7A. Quantitative and Qualitative Disclosures About Market Risk 67 Item 8. Financial Statements and Supplementary Data 69 Item 9. Changes in and Disagreements With Accountants on Accounting and Financial Disclosure 70 Item 9A. Controls and Procedures 70 Item 9B. Other Information 70 Item 9C. Disclosure Regarding Foreign Jurisdictions that Prevent Inspections 70 PART III Item 10. Directors, Executive Officers and Corporate Governance 71 Item 11. Executive Compensation 71 Item 12. Security Ownership of Certain Beneficial Owners and Management and Related Stockholder Matters 71 Item 13. Certain Relationships and Related Transactions, and Director Independence 71 Item 14. Principal Accounting Fees and Services 71 PART IV Item 15. Exhibits, Financial Statement Schedules 72 Item 16. Form 10-K Summary 125 2 FORWARD-LOOKING STATEMENTS This Annual Report on Form 10-K contains “forward-looking statements” within the meaning of Section 27A of the Securities Act of 1933, as amended, and Section 21E of the Securities Exchange Act of 1934, as amended. All statements other than statements of historical fact are “forward-looking statements” for purposes of federal and state securities laws, including any projections of earnings, revenue or other financial items; any statements of the plans, strategies and objectives of management, including for future operations, capital expenditures, or share repurchases; any statements concerning proposed new products, services, or developments; any statements regarding future economic conditions or performance; any statements of belief or expectation; and any statements of assumptions underlying any of the foregoing or other future events. Forward-looking statements may include, among other, the words “may,” “will,” “estimate,” “intend,” “continue,” “believe,” “expect,” “anticipate” or any other similar words. Although we believe that the expectations reflected in any of our forward-looking statements are reasonable, actual results or outcomes could differ materially from those projected or assumed in any of our forward-looking statements. Our future financial condition and results of operations, as well as any forward-looking statements, are subject to change and to inherent risks and uncertainties, many of which are beyond our control. Additionally, many of these risks and uncertainties are, and may continue to be, amplified by the COVID-19 pandemic. Important factors that could cause our actual results, performance and achievements, or industry results to differ materially from estimates or projections contained in or implied by our forward-looking statements include the following: • the potential impacts of the COVID-19 pandemic and current global economic conditions, including inflation, on us; our Members, customers, and supply chain; and the world economy; • our ability to attract and retain Members; • our relationship with, and our ability to influence the actions of, our Members; • our noncompliance with, or improper action by our employees or Members in violation of, applicable U.S. and foreign laws, rules, and regulations; • adverse publicity associated with our Company or the direct-selling industry, including our ability to comfort the marketplace and regulators regarding our compliance with applicable laws; • changing consumer preferences and demands and evolving industry standards, including with respect to climate change, sustainability, and other environmental, social, and governance, or ESG, matters; • the competitive nature of our business and industry; • legal and regulatory matters, including regulatory actions concerning, or legal challenges to, our products or network marketing program and product liability claims; • the Consent Order entered into with the FTC, the effects thereof and any failure to comply therewith; • risks associated with operating internationally and in China; • our ability to execute our growth and other strategic initiatives, including implementation of our Transformation Program and increased penetration of our existing markets; • any material disruption to our business caused by natural disasters, other catastrophic events, acts of war or terrorism, including the war in Ukraine, cybersecurity incidents, pandemics, and/or other acts by third parties; • our ability to adequately source ingredients, packaging materials, and other raw materials and manufacture and distribute our products; • our reliance on our information technology infrastructure; • noncompliance by us or our Members with any privacy laws, rules, or regulations or any security breach involving the misappropriation, loss, or other unauthorized use or disclosure of confidential information; • contractual limitations on our ability to expand or change our direct-selling business model; • the sufficiency of our trademarks and other intellectual property; • product concentration; • our reliance upon, or the loss or departure of any member of, our senior management team; • restrictions imposed by covenants in the agreements governing our indebtedness; 3 • risks related to our convertible notes; • changes in, and uncertainties relating to, the application of transfer pricing, income tax, customs duties, value added taxes, and other tax laws, treaties, and regulations, or their interpretation; • our incorporation under the laws of the Cayman Islands; and • share price volatility related to, among other things, speculative trading and certain traders shorting our common shares. Additional factors and uncertainties that could cause actual results or outcomes to differ materially from our forward-looking statements are set forth in this Annual Report on Form 10-K, including in Part I, Item 1A, Risk Factors, and Part II, Item 7, Management’s Discussion and Analysis of Financial Condition and Results of Operations, and in our Consolidated Financial Statements and the related Notes. In addition, historical, current, and forward-looking sustainability-related statements may be based on standards for measuring progress that are still developing, internal controls and processes that continue to evolve, and assumptions that are subject to change in the future. Forward-looking statements in this Annual Report on Form 10-K speak only as of the date hereof. We do not undertake any obligation to update or release any revisions to any forward-looking statement or to report any events or circumstances after the date hereof or to reflect the occurrence of unanticipated events, except as required by law. The Company “We,” “our,” “us,” “Company,” “Herbalife,” and “Herbalife Nutrition” refer to Herbalife Nutrition Ltd., a Cayman Islands exempted company incorporated with limited liability, and its subsidiaries. Herbalife Nutrition Ltd. is a holding company, with substantially all of its assets consisting of the capital stock of its direct and indirectly-owned subsidiaries. 4 PART I Item 1. Business GENERAL Herbalife Nutrition is a global nutrition company that provides health and wellness products to consumers in 95 markets, which consists of countries and territories, through our direct-selling business model. Our products are primarily in the categories of weight management, sports nutrition, and targeted nutrition. We use a direct-selling business model to distribute and market our nutrition products to and through a global network of independent members, or Members. Members include consumers who purchase products for their own personal use and distributors who wish to resell products or build a sales organization. We believe that direct selling is ideally suited for our business because the distribution and sales of our products with personalized support, coaching, and education provide a supportive and understanding community of like-minded people who prioritize health and nutrition. In addition to the effectiveness of personalized selling through a direct-selling business model, we believe the primary drivers for our success throughout our 43-year operating history have been enhanced consumer awareness and demand for our products due to global trends such as the obesity epidemic, increasing interest in a fit and active lifestyle, living healthier, and the rise of entrepreneurship. PRODUCT SALES Our science-backed products help Members and their customers improve their overall health, enhance their wellness, and achieve their fitness and sport goals. As of December 31, 2022, we marketed and sold approximately 131 product types. Our products are often sold as part of a program and therefore our portfolio is comprised of a series of related products designed to simplify weight management, health and wellness, and overall nutrition for our Members and their customers. Our Formula 1 Nutritional Shake Mix, our best-selling product line, approximated 26% of our net sales for the year ended December 31, 2022. The following table summarizes our products by product category: Percentage of Net Sales 2022 2021 2020 Description Representative Products Weight Management 56.8% 58.1% 59.8% Meal replacement, protein Formula 1 Healthy Meal, shakes, drink mixes, weight Herbal Tea Concentrate, loss enhancers and healthy Protein Drink Mix, snacks Personalized Protein Powder, Total Control®, Formula 2 Multivitamin Complex, Prolessa™ Duo, and Protein Bars Targeted Nutrition 29.1% 28.2% 27.6% Functional beverages and Herbal Aloe Concentrate, dietary and nutritional Active Fiber Complex, supplements containing Niteworks®, and quality herbs, vitamins, Herbalifeline® minerals and other natural ingredients Energy, Sports, and 10.6% 9.5% 7.9% Products that support a Herbalife24® product line, Fitness healthy active lifestyle N-R-G Tea, and Liftoff® energy drink Outer Nutrition 1.6% 1.9% 2.0% Facial skin care, body care, Herbalife SKIN line and and hair care Herbal Aloe Bath and Body Care line Literature, Promotional, 1.9% 2.3% 2.7% Start-up kits, sales tools, Herbalife Member Packs and Other and educational materials and BizWorks 5 Product returns and buyback policies We offer a customer satisfaction guarantee in substantially all markets where our products are sold. If for any reason a customer or preferred member is not satisfied with an Herbalife Nutrition product, they may return it or any unused portion of the product within 30 days from the time of receipt for a full refund or credit toward the exchange of another Herbalife Nutrition product. In addition, in substantially all markets, we maintain a buyback program pursuant to which we will purchase back unsold products from a Member who decides to leave the business. Subject to certain terms and conditions that may vary by market, the buyback program generally permits a Member to return unopened products or sales materials in marketable condition purchased within the prior twelve- month period in exchange for a refund of the net price paid for the product and, in most markets, the cost of returning the products and materials to us. Together, product returns and buybacks were approximately 0.1% of net sales for each of the years ended December 31, 2022, 2021, and 2020. Product development Our products are focused on nutrition and seek to help consumers achieve their goals in the areas of weight management; targeted nutrition (including everyday wellness and healthy aging); energy, sports, and fitness; and outer nutrition. We believe our focus on nutrition and botanical science and the combination of our internal efforts with the scientific expertise of outside resources, including our ingredient suppliers, major universities, and our Nutrition Advisory Board, have resulted in product differentiation that has given our Members and consumers increased confidence in our products. We continue to invest in scientific and technical functions, including research and development associated with creating new or enhancing current product formulations and the advancement of personalized nutrition solutions; clinical studies of existing products or products in development; technical operations to improve current product formulations; quality assurance and quality control to establish the appropriate quality systems, controls, and standards; and rigorous ingredient and product testing to ensure compliance with regulatory requirements, as well as in the areas of regulatory and scientific affairs. Our personalized nutrition solutions include tools which aid in the development of optimal product packages specific to our customers’ individual nutritional needs, based on their expected wellness goals. Our product development strategy is twofold: (1) to increase the value of existing customers by investing in products that address customers’ health, wellness and nutrition considerations, fill perceived gaps in our portfolios, add flavors, increase convenience by developing products like snacks and bars, and expand afternoon and evening consumption with products like savory shakes or soups; and (2) to attract new customers by entering into new categories, offering more choices, increasing individualization, and expanding our current sports line. We have a keen focus on product innovation and aim to launch new products and variations on existing products on a regular basis. Once a particular market opportunity has been identified, our scientists, along with our operations, marketing, and sales teams, work closely with Member leadership to introduce new products and variations on existing products. Our Nutrition Advisory Board and Dieticians Advisory Board are comprised of leading experts around the world in the fields of nutrition and health who educate our Members on the principles of nutrition, physical activity, diet, and healthy lifestyle. We rely on the scientific contributions from members of our Nutrition Advisory Board and our in-house scientific team to continually upgrade existing products or introduce new products as new scientific studies become available and are accepted by regulatory authorities around the world. COMPETITION The nutrition industry is highly competitive. Nutrition products are sold through a number of distribution channels, including direct selling, online retailers, specialty retailers, and the discounted channels of food, drug and mass merchandise. Our competitors include companies such as Conagra Brands, Hain Celestial, and Post. Additionally, we compete for the recruitment of Members from other network marketing organizations, including those that market nutrition products and other entrepreneurial opportunities. Our direct-selling competitors include companies such as Nu Skin, Tupperware, and USANA. Our ability to remain competitive depends on many factors, including having relevant products that meet consumer needs, a rewarding compensation plan, enhanced education and tools, innovation in our products and services, competitive pricing, a strong reputation, and a financially viable company. We have differentiated ourselves from our competitors through our Members’ focus on the consultative sales process, which includes ongoing personal contact, coaching, behavior motivation, education, and the creation of supportive communities. For example, many Members have frequent contact with and provide support to their customers through a community-based approach to help them achieve nutrition goals. Some methods include Nutrition Clubs, Weight Loss Challenges, Wellness Evaluations, and Fit Camps. 6 For additional information regarding competition, see Part I, Item 1A, Risk Factors, of this Annual Report on Form 10-K. OUR NETWORK MARKETING PROGRAM General Our products are sold and distributed through a global direct selling business model which individuals may join to become a Member of our network marketing program. We believe that the one-on-one personalized service inherent in the direct-selling business model is ideally suited to marketing and selling our nutrition products. Sales of nutrition products are reinforced by the ongoing personal contact, coaching, behavior motivation, education, and the creation of supportive communities. This frequent, personal contact can enhance consumers’ nutritional and health education as well as motivate healthy behavioral changes in consumers to begin and maintain an active lifestyle through wellness and weight management programs. In addition, our Members consume our products themselves, and, therefore, can provide first-hand testimonials of the use and effectiveness of our products and programs to their customers. The personalized experience of our Members has served as a very powerful sales tool for our products. People become Herbalife Nutrition Members for a number of reasons. Many first start out as consumers of our products who want to lose weight or improve their nutrition, and are customers of our Members. Some later join Herbalife Nutrition and become Members themselves, which makes them eligible to purchase products directly from us, simply to receive a discounted price on products for them and their families. Some Members are interested in the entrepreneurial opportunity to earn compensation based on their own skills and hard work and join Herbalife Nutrition to earn part-time or full-time income. Our objective is sustainable growth in the sales of our products to our Members and their customers by increasing the productivity, retention and recruitment of our Member base through the structure of our network marketing program. Segmentation In many of our markets, including certain of our largest markets such as the United States, Mexico, and India, we have segmented our Member base into two categories: “preferred members” – who are consumers who wish to purchase product for their own household use, and “distributors” – who are Members who also wish to resell products or build a sales organization. This Member segmentation provides a clear differentiation between those interested in retailing our products or building a sales organization, and those simply consuming our products as discount customers. This distinction allows us to more effectively communicate and market to each group, and provides us with better information regarding our Members within the context of their stated intent and goals. As of December 31, 2022, we had approximately 6.2 million Members, including 2.9 million preferred members and 2.0 million distributors in the markets where we have established these two categories and 0.3 million sales representatives and independent service providers in China. The number of preferred members and distributors may change as a result of segmentation and/or conversion, and do not necessarily represent a change in the total number of Members. Any future change in the number of preferred members or distributors is not necessarily indicative of our future expected financial performance. Our Members We believe our Members are the most important differentiator as we go to market with our nutrition products, because of the one- on-one direct contact they have with their customers, along with the education, training and community support services that we believe help improve the nutrition habits of consumers. We work closely with our entrepreneurial Members to improve the sustainability of their businesses and to reach consumers. We require our Members to fairly and honestly market both our products and the Herbalife Nutrition business opportunity. Our relationship with our Members is key to our continued success as they allow us direct access to the voice of consumers. Many of our entrepreneurial Members identify and test new marketing efforts and programs developed by other Members and disseminate successful techniques to their sales organizations. For example, Members in Mexico developed businesses that became known as “Nutrition Clubs,” marketing techniques that improve the productivity and efficiency of our Members as well as the affordability of our weight loss products for their customers. Rather than buying several retail products, these businesses allow consumers to purchase and consume our products each day (a Member marketing technique we refer to as “daily consumption”), while continuing to benefit from the support and interaction with the Member as well as socializing with other customers in a designated location. Other programs to drive daily consumption, whether for weight management or for improved physical fitness, include Member- conducted weight loss contests, or Weight Loss Challenges, Member-led fitness programs, or Fit Camps, and Member-led Wellness Evaluations. We refer to successful Member marketing techniques that we disseminate throughout our Member network, such as Nutrition Clubs, Weight Loss Challenges, and Fit Camps, as Daily Methods of Operations, or DMOs. 7 We believe that personal and professional development is key to our Members’ success and, therefore, we and our sales leader Members – those that achieve certain levels within our Marketing Plan – have meetings and events to support this important objective. We and our Member leadership, which is comprised of sales leaders, conduct in-person and virtual training sessions on local, regional, and global levels attended by thousands of Members to provide updates on product education, sales and marketing training, and instruction on available tools. These events are opportunities to showcase and disseminate our Members’ evolving best marketing practices and DMOs from around the world and to introduce new or upgraded products. A variety of training and development tools are also available through online and mobile platforms. On July 18, 2002, we entered into an agreement with our Members that provides that we will continue to distribute Herbalife Nutrition products exclusively to and through our Members and that, other than changes required by applicable law or necessary in our reasonable business judgment to account for specific local market or currency conditions to achieve a reasonable profit on operations, we will not make any material changes to certain aspects of our Marketing Plan that are adverse to our Members without the support of our Member leadership. Specifically, any such changes would require the approval of at least 51% of our Members then at the level of President’s Team earning at the production bonus level of 6% who vote, provided that at least 50% of those Members entitled to vote do in fact vote. We initiate these types of changes based on the assessment of what will be best for us and our Members and then submit such changes for the requisite vote. We believe that this agreement has strengthened our relationship with our existing Members, improved our ability to recruit new Members and generally increased the long-term stability of our business. Member Compensation and Sales Leader Retention and Requalification In addition to benefiting from discounted prices, Members interested in the entrepreneurial opportunity may earn profit from several sources. First, Members may earn profits by purchasing our products at wholesale prices, discounted depending on the Member’s level within our Marketing Plan, and reselling those products at prices they establish for themselves to generate retail profit. Second, Members who sponsor other Members and establish, maintain, coach, and train their own sales organizations may earn additional income based on the sales of their organization, which may include royalty overrides, production bonuses, and other cash bonuses. Members earning such compensation have generally attained the level of sales leader as described below. There are also many Members, which include distributors, who have not sponsored another Member. Members who have not sponsored another Member are generally considered discount buyers or small retailers. While a number of these Members have also attained the level of sales leader, they do not receive additional income as do Members who have sponsored other Members. We assign point values, known as Volume Points, to each of our products to determine a Member’s level within the Marketing Plan. See Part II, Item 7, Management’s Discussion and Analysis of Financial Condition and Operating Results, of this Annual Report on Form 10-K for a further description of Volume Points. Typically, a Member accumulates Volume Points for a given sale at the time the Member pays for the product. However, since May 2017, a Member does not receive Volume Points for a transaction in the United States until that product is sold to a customer at a profit and it is documented in compliance with the consent order, or Consent Order, we entered into with the Federal Trade Commission, or the FTC, in 2016. The Member’s level within the Marketing Plan is used to determine the discount applied to their purchase of our products and whether they have qualified to become a sales leader. To become a sales leader, or qualify for a higher level within our Marketing Plan, Members must achieve specified Volume Point thresholds of product sales or earn certain amounts of royalty overrides during specified time periods and generally must re-qualify once each year. Qualification criteria vary somewhat by market. We have initial qualification methods of up to 12 months to encourage a more gradual qualification. We believe a gradual qualification approach is important to the success and retention of new sales leaders and benefits the business in the long term as it allows new Members to obtain product and customer experience as well as additional training and education on Herbalife Nutrition products, daily consumption based DMOs, and the business opportunity prior to becoming a sales leader. The basis for calculating Marketing Plan payouts varies depending on product and market: for 2022, we utilized on a weighted- average basis approximately 90% of suggested retail price, to which we applied discounts of up to 50% for distributor allowances and payout rates of up to 15% for royalty overrides, up to 7% for production bonuses, and approximately 1% for a cash bonus known as the Mark Hughes bonus. We believe that the opportunity for Members to earn royalty overrides and production bonuses contributes significantly to our ability to retain our most active and productive Members. Our Marketing Plan generally requires each sales leader to re-qualify for such status each year, prior to February, in order to maintain their 50% discount on products and be eligible to receive additional income. In February of each year, we demote from the rank of sales leader those Members who did not satisfy the re-qualification requirements during the preceding twelve months. The re- qualification requirement does not apply to new sales leaders (i.e. those who became sales leaders subsequent to the January re- qualification of the prior year). 8 As of December 31, 2022, prior to our February re-qualification process, approximately 772,000 of our Members have attained the level of sales leader, of which approximately 734,000 have attained this level in the 94 markets where we use our Marketing Plan and 38,000 independent service providers operating in our China business. See Business in China below for a description of our business in China. The table below reflects sales leader retention rates by year and by region: Sales Leader Retention Rate 2023 2022 2021 North America 69.7% 58.8% 70.8% Latin America (1) 71.6% 69.3% 67.0% EMEA 64.6% 77.1% 72.7% Asia Pacific 66.6% 66.5% 63.5% Total sales leaders 67.6% 68.9% 67.9% (1) The Company combined the Mexico and South and Central America regions into the Latin America region in 2022. Historical information has been reclassified to conform with the current period geographic presentation. For the latest twelve-month re-qualification period ending January 2023, approximately 67.6% of our sales leaders, excluding China, re-qualified, versus 68.9% for the twelve-month period ended January 2022. The Company throughout its history has adjusted the re-qualification criteria from time to time in response to evolving business objectives and market conditions, and the above results include the effects of all such changes. For example, in recent years certain markets have allowed members to utilize a lower re- qualification volume threshold and the Company has continued to expand this lower re-qualification method to additional markets. Separately, with revised business requirements in place following the Consent Order, as described in Network Marketing Program below, we utilize a re-qualification equalization factor for U.S. Members to better align their re-qualification thresholds with Members in other markets, and retention results for each of the years presented include the effect of the equalization factor. We believe this factor preserves retention rate comparability across markets. Also, for each of the years presented, the retention results exclude certain markets for which, due to local operating conditions, sales leaders were not required to requalify. We believe sales leader retention rates are the result of efforts we have made to try and improve the sustainability of sales leaders’ businesses, such as encouraging Members to obtain experience retailing Herbalife Nutrition products before becoming a sales leader and providing them with advanced technology tools, as well as reflecting market conditions. As our business operations evolve, including the segmentation of our Member base in certain markets and changes in sales leader re-qualification thresholds for other markets, management continues to evaluate the importance of sales leader retention rate information. The table below reflects the number of sales leaders as of the end of February of the year indicated (subsequent to the annual re- qualification process) and by region: Number of Sales Leaders 2022 2021 2020 North America 80,278 95,402 71,202 Latin America (1) 125,726 131,359 134,401 EMEA 183,056 158,153 130,438 Asia Pacific 201,137 173,582 158,815 Total sales leaders 590,197 558,496 494,856 China 33,486 68,301 70,701 Worldwide total sales leaders 623,683 626,797 565,557 (1) The Company combined the Mexico and South and Central America regions into the Latin America region in 2022. Historical information has been reclassified to conform with the current period geographic presentation. The number of sales leaders as of December 31 will exceed the number immediately subsequent to the preceding re-qualification period because sales leaders qualify throughout the year but sales leaders who do not re-qualify are removed from the rank of sales leader the following February. 9 Business in China Our business model in China includes unique features as compared to our traditional business model in order to ensure compliance with Chinese regulations. As a result, our business model in China differs from that used in other markets. Members in China are categorized differently than those in other markets. In China, we sell our products to and through independent service providers and sales representatives to customers and preferred customers, as well as through Company-operated retail platforms when necessary. In China, while multi-level marketing is not permitted, direct selling is permitted. Chinese citizens who apply and become Members are referred to as sales representatives. These sales representatives are permitted to sell away from fixed retail locations in the provinces where we have direct selling licenses, including in the provinces of Jiangsu, Guangdong, Shandong, Zhejiang, Guizhou, Beijing, Fujian, Sichuan, Hubei, Shanxi, Shanghai, Jiangxi, Liaoning, Jilin, Henan, Chongqing, Hebei, Shaanxi, Tianjin, Heilongjiang, Hunan, Guangxi, Hainan, Anhui, Yunnan, Gansu, Ningxia, and Inner Mongolia. In Xinjiang province, where we do not have a direct selling license, we have a Company-operated retail store that can directly serve customers and preferred customers. With online orderings throughout China, there has been a declining demand in Company-operated retail stores. Sales representatives receive scaled rebates based on the volume of products they purchase. Sales representatives who reach certain volume thresholds and meet certain performance criteria are eligible to apply to provide marketing, sales and support services. Once their application is accepted, they are referred to as independent service providers. Independent service providers are independent business entities that are eligible to receive compensation from Herbalife Nutrition for the marketing, sales and support services they provide so long as they satisfy certain conditions, including procuring the requisite business licenses, having a physical business location, and complying with all applicable Chinese laws and Herbalife Nutrition rules. In China, our independent service providers are compensated for marketing, sales support, and other services, instead of the Member allowances and royalty overrides utilized in our global Marketing Plan. The service hours and related fees eligible to be earned by the independent service providers are based on a number of factors, including the sales generated through them and through others to whom they may provide marketing, sales support and other services, the quality of their service, and other factors. Total compensation available to our independent service providers in China can generally be comparable to the total compensation available to other sales leaders globally. The Company does this by performing an analysis in our worldwide system to estimate the potential compensation available to the service providers, which can generally be comparable to that of sales leaders in other countries. After adjusting such amounts for other factors and dividing by each service provider’s hourly rate, we then notify each independent service provider the maximum hours of work for which they are eligible to be compensated in the given month. In order for a service provider to be paid, the Company requires each service provider to invoice the Company for their services. RESOURCES We seek to provide the highest quality products to our Members and their customers through our “seed to feed” strategy, which includes significant investments in obtaining quality ingredients from traceable sources, qualified by scientific personnel through product testing, and increasing the amount of self-manufacturing of our top products. Ingredients Our seed to feed strategy is rooted in using quality ingredients from traceable sources. Our procurement process for many of our botanical products now stretches back to the farms and includes self-processing of teas and herbal ingredients into finished raw materials at our own facilities. Our Changsha, China facility exclusively provides high quality tea and herbal raw materials to our manufacturing facilities as well as our third-party contract manufacturers around the world. We also source ingredients that we do not self-process from companies that are well-established, reputable suppliers in their respective field. These suppliers typically utilize similar quality processes, equipment, expertise, and having traceability as we do with our own modern quality processes. As part of our program to ensure the procurement of high-quality ingredients, we also test our incoming raw materials for compliance to potency, identity, and adherence to strict specifications. 10 Manufacturing The next key component of our seed to feed strategy involves the high-quality manufacturing of these ingredients into finished products, which are produced at both third-party manufacturers and our own manufacturing facilities. As part of our long-term strategy, we seek to expand and increase our self-manufacturing capabilities. Our manufacturing facilities, known as Herbalife Innovation and Manufacturing Facilities, or HIMs, include HIM Lake Forest, HIM Winston-Salem, HIM Suzhou, and HIM Nanjing. HIM Winston- Salem is currently our largest manufacturing facility at approximately 800,000 square feet. Together, our HIM manufacturing facilities produce approximately 51% of our inner nutrition products sold worldwide. Self-manufacturing also enables us greater control to reduce negative environmental impacts of our operations and supply chain. As described in the Sustainability section below, we are focused on developing science-based green-house gas emission reduction targets for our manufacturing facilities as part of our sustainability goals. We are also focused on reducing single-use plastics throughout our global distribution network and incorporating more sustainable content, such as post-consumer recycled resin, into our packaging. Our finished products are analyzed for label claims and tested for microbiological purity, thereby verifying that our products comply with food safety standards, meet label claims and have met other quality standards. For self-manufactured products, we conduct all of our testing in-house at our fully-equipped, modern quality control laboratories in the U.S. and China. We have two quality control laboratories in Southern California and Changsha, China (including a Center of Excellence in both locations). In addition, we also have a Center of Excellence laboratory in Bangalore, India, and a quality control laboratory in Winston-Salem, North Carolina, Suzhou, China, and Nanjing, China. All HIM quality control labs contain modern analytical equipment and are backed by the expertise in testing and methods development of our scientists. In our U.S. HIM facilities, which manufacture products for the U.S. and most of our international markets, we operate and adhere to the regulations established by the U.S. Food and Drug Administration, or FDA, and strict Current Good Manufacturing Practice regulations, or CGMPs, for food, acidified foods, and dietary supplements. We also work closely with our third-party manufacturers to ensure high quality products are produced and tested through a vigorous quality control process at approved contract manufacturer labs or third-party labs. For these products manufactured at other facilities, we combine four elements to ensure quality products: (1) the same selectivity and assurance in ingredients as noted above; (2) use of reputable, CGMP-compliant, quality- and sustainability-minded manufacturing partners; (3) supplier qualification through annual audit programs; and (4) significant product quality testing. During 2022, we purchased approximately 15% of our products from our top three third-party manufacturers. Infrastructure and Technology Our direct-selling business model enables us to grow our business with moderate investment in infrastructure and fixed costs. We incur no direct incremental cost to add a new Member in our existing markets, and our Member compensation varies directly with product sales. In addition, our Members also bear a portion of our consumer marketing expenses, and our sales leaders sponsor and coordinate Member recruiting and most meeting and training initiatives. Additionally, our infrastructure features scalable production and distribution of our products as a result of having our own manufacturing facilities and numerous third-party manufacturing relationships, as well as our global footprint of in-house and third-party distribution centers. An important part of our seed to feed strategy is having an efficient infrastructure to deliver products to our Members and their customers. As the shift in consumption patterns continues to reflect an increasing daily consumption focus, one focus of this strategy is to provide more product access points closer to our Members and their customers. We have both Company-operated and outsourced distribution points ranging from our “hub” distribution centers in Los Angeles, Memphis, and Venray, Netherlands, to mid-size distribution centers in major countries, to small pickup locations spread throughout the world. We also expect to continue to improve our distribution channels relating to home delivery as we expect to see continued increased demands for our products being shipped to our Members in certain of our larger markets. In addition to these distribution points, we partner with certain retail locations to provide Member pickup points in areas which are not well serviced by our distribution points. We have also identified a number of methods and approaches that better support Members by providing access points closer to where they do business and by improving product delivery efficiency through our distribution channels. Specific methods vary by markets and consider local Member needs and available resources. In aggregate, we have over 1,500 distribution points and partner retail locations around the world. In addition to our distribution points, we contract third party-run drop-off locations where we can ship to and Members can pick up ordered products. 11 We leverage our technology infrastructure in order to maintain, protect, and enhance existing systems and develop new systems to keep pace with continuing changes in technology, evolving industry and regulatory standards, emerging data security risks, and changing user patterns and preferences. We also continue to invest in our manufacturing and operational infrastructure to accelerate new products to market and accommodate planned business growth. We invest in business intelligence tools to enable better analysis of our business and to identify opportunities for growth. We will continue to build on these platforms to take advantage of the rapid development of technology around the globe to support a more robust Member and customer experience. In addition, we leverage an Oracle business suite platform to support our business operations, improve productivity and support our strategic initiatives. Our investment in technology infrastructure helps support our capacity to grow. In 2021, we also initiated a global transformation program to optimize global processes for future growth, or the Transformation Program. The Transformation Program involves the investment in certain new technologies and the realignment of infrastructure and the locations of certain functions to better support distributors and customers. The Transformation Program is still ongoing and expected to be completed in 2024 as described further in Part II, Item 7, Management’s Discussion and Analysis of Financial Condition and Operating Results, of this Annual Report on Form 10-K and Note 14, Transformation Program, to the Consolidated Financial Statements included in Part IV, Item 15, Exhibits, Financial Statement Schedules, of this Annual Report on Form 10-K. In addition, many Members rely on the use of technology to support their goals and businesses. As part of our continued investment in technology to further support our Members and drive long-term growth, we have enhanced our product access and distribution network to support higher volumes of online or mobile orders, allowing Members and their customers to select home or business delivery options. We have also implemented information technology systems to support Members and their increasing demand to be more connected to Herbalife Nutrition, their business, and their consumers with tools such as HN MyClub, Engage, HNconnect, BizWorks, MyHerbalife, GoHerbalife, and Herbalife.com. Additionally, we continue to support a growing suite of point-of-sale tools to assist our Members with ordering, tracking, and customer relationship management. These tools allow our Members to manage their business and communicate with their customers more efficiently and effectively. During 2022, we also commenced a Digital Technology Program to develop a new enhanced platform to provide enhanced digital capabilities and experiences to our Members. This is a multi-year program and we expect our capital expenditures to increase in 2023 and future years as result of our investments in this Digital Technology Program as described further in Part II, Item 7, Management’s Discussion and Analysis of Financial Condition and Operating Results, of this Annual Report on Form 10-K. Intellectual Property and Branding Marketing foods and supplement products on the basis of sound science means using ingredients in the composition and quantity as demonstrated to be effective in the relevant scientific literature. Use of these ingredients for their well-established purposes is by definition not novel, and for that reason, most food uses of these ingredients are not subject to patent protection. Notwithstanding the absence of patent protection, we do own proprietary formulations for substantially all of our weight management products and dietary and nutritional supplements. We take care in protecting the intellectual property rights of our proprietary formulas by restricting access to our formulas within the Company to those persons or departments that require access to them to perform their functions, and by requiring our finished goods suppliers and consultants to execute supply and non-disclosure agreements that contractually protect our intellectual property rights. Disclosure of these formulas, in redacted form, is also necessary to obtain product registrations in many countries. We also make efforts to protect certain unique formulations under patent law. We strive to protect all new product developments as the confidential trade secrets of the Company. We use the umbrella trademarks Herbalife®, Herbalife Nutrition®, and the Tri-Leaf design worldwide, and protect several other trademarks and trade names related to our products and operations, such as Niteworks® and Liftoff®. Our trademark registrations are issued through the United States Patent and Trademark Office, or USPTO, and comparable agencies in the foreign countries. We believe our trademarks and trade names contribute to our brand awareness. To increase our brand awareness, we and our Members use a variety of tools and marketing channels. These can include anything from traditional media to social media and alliances with partners who can promote our goal of better living through nutrition. Herbalife Nutrition sponsorships of and partnerships with featured athletes, teams, and events promote brand awareness and the use of Herbalife Nutrition products. We continue to build brand awareness with a goal towards becoming the most trusted brand in nutrition. We also work to leverage the power of our Member base as a marketing and brand-building tool. We maintain a brand style guide and brand asset library so that our Members have access to the Herbalife Nutrition brand logo and marketing materials for use in their marketing efforts. 12 Sustainability Our goals and objectives to nourish people and communities and to improve the planet are part of both our day-to-day activities and our long-term growth strategy. As a signatory of the United Nations Global Compact, or UNGC, we have aligned our sustainability initiatives outlined by the United Nations’ Sustainable Development Goals. Our current sustainability initiatives focus on issues including climate and emissions, packaging, and operational waste. For example, we have implemented projects that have reduced overall packaging materials and incorporated usage of recycled materials in the packaging of our flagship product, Formula 1 Healthy Meal Nutritional Shake in North America, Mexico, and in certain markets where permitted by regulations. We are seeking opportunities across operations to reduce waste-prone materials such as single-use plastics. More information on these efforts is provided in the Manufacturing section above. For information relating to our culture, diversity, equity, and inclusion, please see the Human Capital section below. REGULATION General In our United States and foreign markets, we are affected by extensive laws, governmental regulations, administrative determinations and guidance, court decisions and similar constraints that regulate the conduct of our business. Such laws, regulations and other constraints exist at the federal, state or local levels in the United States and at all levels of government in foreign jurisdictions, and include regulations pertaining to: (1) the formulation, manufacturing, packaging, labeling, distribution, importation, sale, and storage of our products; (2) product claims and advertising, including direct claims and advertising by us, as well as claims and advertising by Members, for which we may be held responsible; (3) our network marketing program; (4) transfer pricing and similar regulations that affect the level of U.S. and foreign taxable income and customs duties; (5) taxation of our Members (which in some instances may impose an obligation on us to collect the taxes and maintain appropriate records); (6) our international operations, such as import/export, currency exchange, repatriation and anti-bribery regulations; (7) antitrust issues; and (8) privacy and data protection. See Part I, Item 1A, Risk Factors, of this Annual Report on Form 10-K for additional information. Products In the United States, the formulation, manufacturing, packaging, holding, labeling, promotion, advertising, distribution, and sale of our products are subject to regulation by various federal governmental agencies, including: (1) the FDA; (2) the FTC; (3) the Consumer Product Safety Commission, or CPSC; (4) the United States Department of Agriculture, or USDA; (5) the Environmental Protection Agency, or EPA; (6) the United States Postal Service; (7) United States Customs and Border Protection; and (8) the Drug Enforcement Administration. Our activities also are regulated by various agencies of the states, localities and foreign countries in which our products are manufactured, distributed, or sold. The FDA, in particular, regulates the formulation, manufacture, and labeling of over-the-counter, or OTC, drugs, conventional foods, dietary supplements, and cosmetics such as those distributed by us. The majority of the products marketed by us in the United States are classified as conventional foods or dietary supplements under the Federal Food, Drug and Cosmetic Act, or FFDCA. Internationally, the majority of products marketed by us are classified as foods, health supplements, or food supplements. FDA regulations govern the preparation, packaging, labeling, holding, and distribution of foods, OTC drugs, cosmetics, and dietary supplements. Among other obligations, they require us and our contract manufacturers to meet relevant CGMP regulations for the preparation, packaging, holding, and distribution of OTC drugs and dietary supplements. The FDA also requires identity testing of all incoming dietary ingredients used in dietary supplements, unless a company successfully petitions for an exemption from this testing requirement in accordance with the regulations. The CGMPs are designed to ensure that OTC drugs and dietary supplements are not adulterated with contaminants or impurities, and are labeled to accurately reflect the active ingredients and other ingredients in the products. We have implemented a comprehensive quality assurance program that is designed to maintain compliance with the CGMPs for products manufactured by us or on our behalf for distribution in the United States. As part of this program, we have regularly implemented enhancements, modifications and improvements to our manufacturing and corporate quality processes. We believe that we and our contract manufacturers are compliant with the FDA’s CGMPs and other applicable manufacturing regulations in the United States. The U.S. Dietary Supplement Health and Education Act of 1994, or DSHEA, revised the provisions of FFDCA concerning the composition and labeling of dietary supplements. Under DSHEA, dietary supplement labeling may display structure/function claims that the manufacturer can substantiate, which are claims that the products affect the structure or function of the body, without prior FDA approval, but with notification to the FDA. They may not bear any claim that they can prevent, treat, cure, mitigate or diagnose disease (a drug claim). Apart from DSHEA, the agency permits companies to use FDA-approved full and qualified health claims for food and supplement products containing specific ingredients that meet stated requirements. 13 U.S. law also requires that all serious adverse events occurring within the United States involving dietary supplements or OTC drugs be reported to the FDA. We believe that we are in compliance with this law having implemented a worldwide procedure governing adverse event identification, investigation and reporting. As a result of reported adverse events, we may from time to time elect, or be required, to remove a product from a market, either temporarily or permanently. Some of the products marketed by us are considered conventional foods and are currently labeled as such. Within the United States, this category of products is subject to the federal Nutrition, Labeling and Education Act, or NLEA, and regulations promulgated under the NLEA. The NLEA regulates health claims, ingredient labeling and nutrient content claims characterizing the level of a nutrient in the product. The ingredients in conventional foods must either be generally recognized as safe by experts for the purposes to which they are put in foods, or be approved as food additives under FDA regulations. The federal Food Safety Modernization Act, or FSMA, is also applicable to some of our business. We follow a food safety plan and have implemented preventive measures required by the FSMA. Foreign suppliers of our raw materials are also subject to FSMA requirements, and we have implemented a verification program to comply with the FSMA. Dietary supplements manufactured in accordance with CGMPs and foods manufactured in accordance with the low acid food regulations are exempt. In foreign markets, prior to commencing operations and prior to making or permitting sales of our products in the market, we may be required to obtain an approval, license or certification from the relevant country’s ministry of health or comparable agency. Prior to entering a new market in which a formal approval, license or certificate is required, we work with local authorities in order to obtain the requisite approvals. The approval process generally requires us to present each product and product ingredient to appropriate regulators and, in some instances, arrange for testing of products by local technicians for ingredient analysis. The approvals may be conditioned on reformulation of our products, or may be unavailable with respect to some products or some ingredients. The FTC, which exercises jurisdiction over the advertising of all of our products in the United States, has in the past several years instituted enforcement actions against several dietary supplement and food companies and against manufacturers of weight loss products generally for false and misleading advertising of some of their products. In addition, the FTC has increased its scrutiny of the use of testimonials, which we also utilize, as well as the role of expert endorsers and product clinical studies. We cannot be sure that the FTC, or comparable foreign agencies, will not question our advertising or other operations in the future. In Europe, where an EU Health Claim regulation is in effect, the European Food Safety Authority, or EFSA, issued opinions following its review of a number of proposed claims documents. ESFA’s opinions, which have been accepted by the European Commission, have limited the use of certain nutrition-specific claims made for foods and food supplements. Accordingly, we revised affected product labels to ensure regulatory compliance. We are subject to a permanent injunction issued in October 1986 pursuant to the settlement of an action instituted by the California Attorney General, the State Health Director and the Santa Cruz County District Attorney. We consented to the entry of this injunction without in any way admitting the allegations of the complaint. The injunction prevents us from making specified claims in advertising of our products, but does not prevent us from continuing to make specified claims concerning our products, provided that we have a reasonable basis for making the claims. The injunction also prohibits certain recruiting-related investments from Members and mandates that payments to Members be premised on retail value (as defined); the injunction provides that we may establish a system to verify or document such compliance. Network Marketing Program Our network marketing program is subject to a number of federal and state regulations administered by the FTC and various state regulators as well as regulations in foreign markets administered by foreign regulators. Regulations applicable to network marketing organizations generally are directed at ensuring that product sales ultimately are made to consumers and that advancement within the organization is based on sales of the organization’s products rather than investments in the organization or other non-retail sales related criteria. When required by law, we obtain regulatory approval of our network marketing program or, when this approval is not required, the favorable opinion of local counsel as to regulatory compliance. 14 On July 15, 2016, we reached a settlement with the FTC and entered into a proposed Stipulation to Entry of Order for Permanent Injunction and Monetary Judgment, or the Consent Order, which resolved the FTC’s multi-year investigation of us. The Consent Order became effective on July 25, 2016, or the Effective Date, upon final approval by the U.S. District Court for the Central District of California. Pursuant to the Consent Order, we implemented and continue to enhance certain procedures in the U.S. and agreed to be subject to certain audits by an independent compliance auditor (Affiliated Monitors, Inc.) for a period of seven years. Among other requirements, the Consent Order requires us to categorize all existing and future Members in the U.S. as either “preferred members” – who are simply consumers who only wish to purchase product for their own household use — or “distributors” – who are Members who wish to resell some products or build a sales organization. We also agreed to compensate distributors on U.S. eligible sales within their downline organizations, which include purchases by preferred members, purchases by a distributor for his or her personal consumption within allowable limits and sales of product by a distributor to his or her customers. The Consent Order also requires distributors to meet certain conditions before opening Nutrition Clubs and/or entering into leases for their Herbalife Nutrition business in the United States. The Consent Order also prohibits us from making expressly or by implication, any misrepresentation regarding certain lifestyles or amount or level of income, including full-time or part-time income that a participant can reasonably expect to earn in our network marketing program. The Consent Order also prohibits us and other persons who act in active concert with us from misrepresenting that participation in the network marketing program will result in a lavish lifestyle and from using images or descriptions to represent or imply that participation in the program is likely to result in a lavish lifestyle. In addition, the Consent Order prohibits specified misrepresentations in connection with marketing the program, including misrepresentations regarding any fact material to participation such as the cost to participate or the amount of income likely to be earned. The Consent Order also requires us to clearly and conspicuously disclose information related to our refund and buyback policy on certain company materials and websites. The terms of the Consent Order do not change our going to market through direct selling by independent distributors, and compensating those distributors based upon the product they and their sales organization sell. We have implemented new and enhanced procedures required by the terms of the Consent Order and will continue to do so. We continue to monitor the impact of the Consent Order and our board of directors originally established the Implementation Oversight Committee in connection with monitoring compliance with the Consent Order, and more recently, our Audit Committee assumed oversight of continued compliance with the Consent Order. While we currently do not expect the Consent Order to have a long-term and material adverse impact on our business and our Member base, our business and our Member base, particularly in the U.S., have been in the past, and may in the future, be negatively impacted as we and they adjust to the changes. However, the terms of the Consent Order and the ongoing costs of compliance may adversely affect our business operations, our results of operations, and our financial condition. See Part I, Item 1A, Risk Factors, of this Annual Report on Form 10-K for a discussion of risks related to the settlement with the FTC. On January 4, 2018, the FTC released its nonbinding Business Guidance Concerning Multi-Level Marketing, or MLM Guidance. The MLM Guidance explains, among other things, lawful and unlawful compensation structures, the treatment of personal consumption by participants in determining if an MLM’s compensation structure is unfair or deceptive, and how an MLM should approach representations to current and prospective participants. We believe our current business practices, which include new and enhanced procedures implemented in connection with the Consent Order, are in compliance with the MLM Guidance. Additionally, the FTC has promulgated nonbinding Guides Concerning the Use of Endorsements and Testimonials in Advertising, or Guides, which explain how the FTC interprets Section 5 of the FTC Act’s prohibition on unfair or deceptive acts or practices. Consequently, the FTC could bring a Section 5 enforcement action based on practices that are inconsistent with the Guides. Under the Guides, advertisements that feature a consumer and convey his or her atypical experience with a product or service are required to clearly disclose the typical results that consumers can generally expect. The revised Guides also require advertisers to disclose connections between the advertiser and any endorsers that consumers might not expect, known as “material connections.” We have adapted our practices and rules regarding the practices of our Members to comply with the Guides and to comply with the Consent Order. We also are subject to the risk of private party challenges to the legality of our network marketing program both in the United States and internationally. For example, in Webster v. Omnitrition International, Inc., 79 F.3d 776 (9th Cir. 1996), the network marketing program of Omnitrition International, Inc., or Omnitrition, was challenged in a class action by Omnitrition distributors who alleged that it was operating an illegal “pyramid scheme” in violation of federal and state laws. We believe that our network marketing program satisfies federal and other applicable state statutes and case law. In some countries, regulations applicable to the activities of our Members also may affect our business because in some countries we are, or regulators may assert that we are, responsible for our Members’ conduct. In these countries, regulators may request or require that we take steps to ensure that our Members comply with local regulations. The types of regulated conduct include: (1) representations concerning our products; (2) income representations made by us and/or Members; (3) public media advertisements, which in foreign markets may require prior approval by regulators; (4) sales of products in markets in which the products have not been approved, licensed or certified for sale; and (5) classification by government agencies of our Members as employees of the Company. 15 In some markets, it is possible that improper product claims by Members could result in our products being reviewed by regulatory authorities and, as a result, being classified or placed into another category as to which stricter regulations are applicable. In addition, we might be required to make labeling changes. We also are subject to regulations in various foreign markets pertaining to social security assessments and employment and severance pay requirements. As an example, in some markets, we are substantially restricted in the amount and types of rules and termination criteria that we can impose on Members without having to pay social security assessments on behalf of the Members and without incurring severance obligations to terminated Members. In some countries, we may be subject to these obligations in any event. It is an ongoing part of our business to monitor and respond to regulatory and legal developments, including those that may affect our network marketing program. However, the regulatory requirements concerning network marketing programs do not include bright line rules and are inherently fact-based. An adverse judicial or regulatory determination with respect to our network marketing program could have a material adverse effect on our business, financial condition, and operating results and may also result in negative publicity, requirements to modify our network marketing program, or a negative impact on Member morale. In addition, adverse rulings by courts in any proceedings challenging the legality of network marketing systems, even in those not involving us directly, could have a material adverse effect on our operations. Although questions regarding the legality of our network marketing program have come up in the past and may come up from time to time in the future, we believe, based in part upon guidance to the general public from the FTC, that our network marketing program is compliant with applicable law. Income Tax, Transfer Pricing, and Other Taxes In many countries, including the United States, we are subject to income tax, transfer pricing and other tax regulations designed to ensure that appropriate levels of income are reported as earned by our U.S. and local entities and are taxed accordingly. In addition, our operations are subject to regulations designed to ensure that appropriate levels of customs duties are assessed on the importation of our products. Although we believe that we are in substantial compliance with all applicable tax rules, regulations, and restrictions, we are subject to the risk that governmental authorities could assert that additional taxes are owed based on findings of their audit. For example, we are currently subject to pending or proposed audits that are at various levels of review, assessment or appeal in a number of jurisdictions involving transfer pricing issues, income taxes, duties, value added taxes, withholding taxes and related interest and penalties in material amounts. In some circumstances, additional taxes, interest and penalties have been assessed, and we will be required to appeal or litigate to reverse the assessments. We have taken advice from our tax advisors and believe that there are substantial defenses to the allegations that additional taxes are owed, and we are vigorously defending against the imposition of additional proposed taxes. The ultimate resolution of these matters may take several years, and the outcome is uncertain. In the event that the audits or assessments are concluded adversely, we may or may not be able to offset or mitigate the consolidated effect of foreign income tax assessments through the use of U.S. foreign tax credits. The laws and regulations governing U.S. foreign tax credits are complex and subject to periodic legislative amendment, and there are restrictions on the utilization of U.S. foreign tax credits. Therefore, we cannot be sure that we would in fact be able to take advantage of any foreign tax credits in the future. Compliance Procedures As indicated above, Herbalife Nutrition, our products and our network marketing program are subject, both directly and indirectly through Members’ conduct, to numerous federal, state and local regulations, in the United States and foreign markets. In 1985, we began to institute formal compliance measures by developing a system to identify specific complaints against Members and to remedy any violations of Herbalife Nutrition’s rules by Members through appropriate sanctions, including warnings, fines, suspensions and, when necessary, terminations. We prohibit Members from making therapeutic claims for our products or misrepresentations regarding participating in our network marketing program, including in our manuals, seminars, and other training programs and materials. Our general policy is to reject Member applications from individuals who do not reside in one of our approved markets. 16 In order to comply with regulations that apply to both us and our Members, we research the applicable regulatory framework prior to entering any new market to identify necessary licenses and approvals and applicable limitations relating to our operations in that market and then work to bring our operations into compliance with the applicable limitations and to maintain such licenses. Typically, we conduct this research with the assistance of local legal counsel and other representatives. We also research laws applicable to Member operations and revise or alter our Member applications, rules, and other training materials and programs to provide Members with guidelines for operating their independent business, marketing and distributing our products and similar matters, as required by applicable regulations in each market. While we have rules and guidelines for our Members and monitor their market conduct, we are, however, unable to ensure that our Members will not distribute our products in countries where we have not commenced operations. In addition, regulations in existing and new markets often are ambiguous and subject to considerable interpretive and enforcement discretion by the responsible regulators. Moreover, even when we believe that we and our Members are in compliance with all applicable regulations, new regulations are being added regularly and the interpretation of existing regulations is subject to change. Further, the content and impact of regulations to which we are subject may be influenced by public attention directed at us, our products, or our network marketing program, so that extensive adverse publicity about us, our products, or our network marketing program may increase the likelihood regulatory scrutiny or action. HUMAN CAPITAL At Herbalife Nutrition, our commitment to improving lives and our communities is at the core of everything we do. This commitment also informs how we value and treat our employees. We seek to provide a work environment where employees can grow and thrive while supporting our Members and their customers. We believe attracting, developing, and retaining a talented and diverse workforce are critical factors that contribute to the success and growth of our business. We have operations globally, requiring investment to assess local labor market conditions and recruit and retain the appropriate workforce. Having a business presence in multiple domestic and international markets also requires us to monitor local labor and employment laws for which we often engage third-party advisors. We monitor the talent needs of our departments and functions with particular focus on the areas where human capital resources are important to daily operations to ensure we can timely manufacture, distribute, and sell products to our Members. As of December 31, 2022, we had approximately 10,100 employees, of which approximately 2,800 were located in the United States. Diversity, Equity, and Inclusion We believe diversity is a strength and embrace a core vision that a diverse, equitable, and inclusive culture is imperative to enable us to better serve our Members, stakeholders, and communities. As such, we seek to promote a work environment where all people can thrive, and are committed to diversity, equity, and inclusion, or DEI, at all levels, from our employees, management and executive leadership to our board of directors. Our DEI strategy is currently focused on creating opportunities to further recruit and support diverse talent at all levels, encouraging inclusion and belonging, and embedding equity throughout our culture and operations. Current initiatives include the implementation of a global applicant tracking system to deepen our commitment to fair recruitment processes, offering unconscious bias trainings for all employees, the expansion of existing employee networks which help employees build community and foster a culture of belonging, and further development and involvement of Global and Regional DEI Councils to drive DEI progress. Additionally, we have set diversity goals and targets for women in leadership roles globally and for racial and ethnic minorities in leadership roles in the U.S. Talent Acquisition and Development We seek to attract and retain a talented and diverse workforce. To foster an inclusive hiring process in the U.S., we use a tool that helps ensure that job descriptions do not unintentionally exclude potential applicants. Investment in our employees' professional growth and development is important and helps establish a strong foundation for long- term success. At our Company, we strive to create a learning culture, one in which development is an ongoing focus for all employees and managers. We invest in our employees’ development through a variety of programs. These programs are designed to help our employees grow professionally and strengthen their skills throughout their careers. Examples of these programs include the following: • Training Programs – We provide our employees access to an internal learning management system, Herbalife Nutrition University, which provides professional development courses, technical training, and compliance training to all employees globally. 17 • Mentorship Programs – The principle of servant leadership is a crucial part of our culture. We believe that one way to be a servant leader is to mentor others, and, in 2020, we introduced a new mentorship program to help guide junior employees in their professional journey. Through this program, participating employees can be provided with a one-on-one professional development opportunity, in which they receive dedicated coaching, feedback, and encouragement. • Educational Assistance – Another way we support employees’ continual professional development is by offsetting a portion of the cost of higher education. Program offerings and eligibility vary by region, but may include partial reimbursement of tuition fees incurred for undergraduate and graduate degrees, certificate programs, or skills-based courses. Compensation and Benefits Our Board of Directors and its Compensation Committee establish our general compensation philosophy and oversee and approve the development, adoption, and implementation of compensation policies and programs, which are set at a global level, but also adapted to meet local country requirements as needed. We provide base pay that aligns with employee positions, skill levels, experience, contributions, and geographic location. In addition to base pay, we seek to reward employees with annual incentive awards, recognition programs, and equity awards for employees at certain job grades. Our benefit programs are designed to enhance employee well-being and assist employees in the event of illness, injury, or disability. To this end, we offer benefits that vary worldwide, but may include health insurance, retirement savings programs, and wellness incentives designed to promote a healthy and active lifestyle. We believe we offer our employees wages and benefits packages that are in line with respective local labor markets and laws. Safety, Health, and Well-Being As a nutrition company, we believe the safety, health, and well-being of our employees is of the utmost importance. We endeavor to promote these principles by providing a safe and healthy work environment and encouraging healthy, active lifestyles. Our efforts to provide a safe workplace are guided by various formal policies and programs, which are designed to protect employees, contractors, and visitors from accidents, illnesses, and injuries, while operating in compliance with applicable regulations, including OSHA guidelines in the U.S. We also follow policies and programs regarding material health and safety risks, workplace violence prevention, and incident response and management. In the U.S., our manufacturing facilities in Winston-Salem and Lake Forest are ISO 45001 certified, an international standard for occupational health and safety management. While the COVID-19 pandemic has increased the resources required to keep our employees safe and healthy, we continue to make what we believe are the necessary investments to achieve this goal. In response to, and during various phases of, the pandemic, we have taken several actions, including supporting our employees to work from home when possible, offering mental and emotional wellness resources, and implementing safety measures when necessary at our facilities. Over the course of the pandemic, our senior management team has relied on cross-functional teams to monitor, review, and assess the evolving situation. These cross-functional teams are responsible for recommending risk mitigation actions based on the local risks and in accordance with regulatory requirements and guidelines for the health and safety of our employees and, in the U.S., protocols to align with all federal, state, and local public health guidelines. We believe our proactive efforts have been successful in supporting our business growth despite the obstacles and challenges presented by COVID-19. In addition, we believe in the importance of well-being and provide resources for our employees that support their pursuit of a healthy and active lifestyle. Our flagship wellness program in the U.S., “Wellness for Life,” offers employees a suite of activities to achieve overall wellness through improved fitness, nutrition, intellectual well-being, and financial literacy. The variety of activities offered ensures all employees may participate, no matter where they may be in their wellness journey. While we have many existing regional wellness programs, a new and enhanced global wellness program will launch in January 2023 and feature Herbalife fitness, health and nutrition experts from around the globe. We also have facilities and programs in place that allow employees to incorporate fitness into their daily schedule, such as onsite gyms at several facilities and live virtual classes. Our Members We are dependent on our Members to sell and promote our products to their customers. We frequently interact and work directly with our sales leaders to explore ways to support our and our Members’ businesses, and their customers’ personal goals of living a healthier and more active lifestyle. See the Our Network Marketing Program – Member Compensation and Sales Leader Retention and Requalification section above for sales leader and requalification metrics and further discussion on our sales leaders. 18 Available Information Our Internet website address is www.herbalife.com and our investor relations website is ir.herbalife.com. We make available free of charge on our website our Annual Reports on Form 10-K, Quarterly Reports on Form 10-Q, Current Reports on Form 8-K, proxy statements, and amendments to those reports filed or furnished pursuant to Section 13(a) or 15(d) of the Securities Exchange Act of 1934, as amended, or the Exchange Act, as soon as reasonably practical after we file such material with, or furnish it to, the Securities and Exchange Commission, or SEC. The SEC maintains an Internet website that contains reports, proxy and information statements, and other information regarding issuers that file electronically with the SEC at www.sec.gov. We also make available free of charge on our investor relations website at ir.herbalife.com our Principles of Corporate Governance, our Code of Conduct, and the Charters of our Audit Committee, Nominating and Corporate Governance Committee, Compensation Committee, and ESG Committee of our board of directors. Unless expressly noted, the information on our website, including our investor relations website, or any other website is not incorporated by reference in this Annual Report on Form 10-K and should not be considered part of this Annual Report on Form 10-K or any other filing we make with the SEC. Item 1A. Risk Factors Please carefully consider the following discussion of significant factors, events, and uncertainties that make an investment decision regarding our securities risky. The factors, events, uncertainties, and consequences discussed in these risk factors could, in circumstances we may not be able to accurately predict, recognize, or control, have a material adverse effect on our business, reputation, prospects, financial condition, operating results, cash flows, liquidity, and share price. These risk factors do not identify all risks that we face. We could also be affected by factors, events, or uncertainties that are not presently known to us or that we currently do not consider to present material risks. Additionally, the COVID-19 pandemic has amplified many of the other risks discussed below to which we are subject. We are unable to predict the duration and extent to which the pandemic and its related impacts will adversely impact our business, financial condition, and operating results as well as our share price. In addition, given the unpredictable, unprecedented, and fluid nature of the pandemic, it may also materially and adversely affect our business, financial condition, and operating results in ways that are not currently anticipated by or known to us or that we currently do not consider to present material risks. Risk Factor Summary This risk factor summary contains a high-level summary of certain of the principal factors, events and uncertainties that make an investment in our securities risky, including risks related to our business and industry, risks related to regulatory and legal matters, risks related to our international operations, risks related to our indebtedness and risks related to our common shares. The following summary is not complete and should be read together with the more detailed discussion of these and the other factors, events, and uncertainties set forth below before making an investment decision regarding our securities. The principal factors, events, and uncertainties that make an investment in our securities risky include the following: Risks Related to Our Business and Industry • Our failure to establish and maintain Member and sales leader relationships could negatively impact sales of our products and materially harm our business, financial condition, and operating results. • Because we cannot exert the same level of influence or control over our Members as we could if they were our employees, our Members could fail to comply with applicable law or our rules and procedures, which could result in claims against us that could materially harm our business, financial condition, and operating results. • Adverse publicity associated with our Company or the direct-selling industry could materially harm our business, financial condition, and operating results. • Our failure to compete successfully could materially harm our business, financial condition, and operating results. • Our contractual obligation to sell our products only through our Member network and to refrain from changing certain aspects of our Marketing Plan may limit our growth. • Our failure to appropriately respond to changing consumer trends, preferences, and demand for new products and product enhancements could materially harm our Member relationships, our Members’ customer relationships, and product sales or otherwise materially harm our business, financial condition, and operating results. • If we fail to further penetrate existing markets, the growth in sales of our products, along with our operating results could be negatively impacted. 19 • Since one of our products constitutes a significant portion of our net sales, significant decreases in consumer demand for this product or our failure to produce a suitable replacement, could materially harm our business, financial condition, and operating results. • Our business could be materially and adversely affected by natural disasters, other catastrophic events, acts of war or terrorism, cybersecurity incidents, pandemics, and/or other acts by third parties. • We depend on the integrity and reliability of our information technology infrastructure, and any related interruptions or inadequacies may have a material adverse effect on our business, financial condition, and operating results. • Disruption of supply, shortage, or increases in the cost of ingredients, packaging materials, and other raw materials as well as climate change could materially harm our business, financial condition, and operating results. • If any of our manufacturing facilities or third-party manufacturers fail to reliably supply products to us at required levels of quality or fail to comply with applicable laws, our financial condition and operating results could be materially and adversely impacted. • If we lose the services of members of our senior management team, our business, financial condition, and operating results could be materially harmed. • Our share price may be adversely affected by third parties who raise allegations about our Company. • ESG matters, including those related to climate change and sustainability, may have an adverse effect on our business, financial condition, and operating results and may damage our reputation. Risks Related to Regulatory and Legal Matters • Our products are affected by extensive regulations, and our failure or our Members’ failure to comply with any regulations could lead to significant penalties or claims, which could materially harm our financial condition and operating results. • Our network marketing program is subject to extensive regulation and scrutiny and any failure to comply, or alteration to our compensation practices in order to comply, with these regulations could materially harm our business, financial condition, and operating results. • We are subject to the Consent Order with the FTC, the effects of which, or any failure to comply therewith, could materially harm our business, financial condition, and operating results. • Our actual or perceived failure to comply with privacy and data protection laws, rules, and regulations could materially harm our business, financial condition, and operating results. • We are subject to material product liability risks, which could increase our costs and materially harm our business, financial condition, and operating results. • If we fail to protect our intellectual property, our ability to compete could be negatively affected, which could materially harm our financial condition and operating results. • If we infringe the intellectual property rights of others, our business, financial condition, and operating results could be materially harmed. • We may be held responsible for additional compensation, certain taxes, or assessments relating to the activities of our Members, which could materially harm our financial condition and operating results. Risks Related to Our International Operations • A substantial portion of our business is conducted in foreign jurisdictions, exposing us to the risks associated with international operations. • We are subject to the anti-bribery laws, rules, and regulations of the United States and the other foreign jurisdictions in which we operate. • If we do not comply with transfer pricing, customs duties VAT, and similar regulations, we may be subject to additional taxes, customs duties, interest, and penalties in material amounts, which could materially harm our financial condition and operating results. • Our business in China is subject to general, as well as industry-specific, economic, political, and legal developments and risks and requires that we utilize a modified version of the business model we use elsewhere in the world. • The United Kingdom’s exit from the European Union could adversely impact us. 20 Risks Related to Our Indebtedness • The terms and covenants in our existing indebtedness could limit our discretion with respect to certain business matters, which could harm our business, financial condition, and operating results. • The conversion or maturity of our convertible notes may adversely affect our financial condition and operating results, and their conversion into common shares could have a dilutive effect that could cause our share price to go down. Risks Related to Our Common Shares • Holders of our common shares may difficulties in protecting their interests because we are incorporated under Cayman Islands law. • Provisions of our articles of association and Cayman Islands law may impede a takeover or make it more difficult for shareholders to change the direction or management of the Company, which could reduce shareholders’ opportunity to influence management of the Company. • There is uncertainty as to shareholders’ ability to enforce certain foreign civil liabilities in the Cayman Islands. • U.S. Tax Reform may adversely impact certain U.S. shareholders of the Company. Risks Related to Our Business and Industry Our failure to establish and maintain Member and sales leader relationships could negatively impact sales of our products and materially harm our business, financial condition, and operating results. We distribute our products exclusively to and through our independent Members, and we depend on them directly for substantially all of our sales. To increase our revenue, we must increase the number and productivity of our Members. Accordingly, our success depends in significant part on our relationships with our sales leaders and our ability to recruit, retain, and motivate a large base of Members, including through an attractive compensation plan, the quality of our reputation, the maintenance of an attractive product portfolio, the breadth and quality of our Member services, and other incentives. The loss of a significant number of Members, changes to our network marketing program, our inability to respond to Member demand or generate sufficient interest in our business opportunities, products, or services, decreases in Member engagement, loss of Member or consumer confidence, or any legal or regulatory impact to our Members’ ability to conduct their business could negatively impact sales of our products and our ability to attract and retain Members, each of which could have a material adverse effect on our business, financial condition, and operating results. In our efforts to attract and retain Members, we compete with other direct-selling organizations. In addition, our Member organization has a high turnover rate, which is common in the direct-selling industry, in part because our Members, including our sales leaders, may easily enter and exit our network marketing program without facing a significant investment or loss of capital. For example, the upfront financial cost to become a Member is low, we do not have time or exclusivity requirements, we do not charge for any required training, and, in substantially all jurisdictions, we maintain a buyback program. We believe the COVID-19 pandemic could have an adverse impact on the pipeline of new Members and our Member turnover rate, and may impact our future net sales. See the COVID-19 Pandemic and Sales by Geographic Region sections in Part II, Item 7, Management’s Discussion and Analysis of Financial Condition and Results of Operations, of this Annual Report on Form 10-K for further discussion of the impacts of the COVID-19 pandemic on our business and results of operations. For additional information regarding sales leader retention rates, see Part I, Item 1, Business, of this Annual Report on Form 10-K. Because we cannot exert the same level of influence or control over our Members as we could if they were our employees, our Members could fail to comply with applicable law or our rules and procedures, which could result in claims against us that could materially harm our business, financial condition, and operating results. Our Members are independent contractors and, accordingly, we are not in a position to provide the same direction, motivation, and oversight as we could if Members were our employees. As a result, there can be no assurance that our Members will participate in our marketing strategies or plans, accept our introduction of new products, or comply with applicable legal requirements or our rules and procedures. 21 We are subject to extensive federal, state, local, and foreign laws, rules, and regulations that regulate our business, products, direct sales channel, and network marketing program. See the Regulation section of Part I, Item 1, Business, of this Annual Report on Form 10- K for additional information. While we have implemented policies and procedures designed to govern Member conduct and to protect the goodwill associated with Herbalife Nutrition, it can be difficult to enforce these policies and procedures because of our large number of Members and their status as independent contractors and because our policies and procedures differ by jurisdiction as a result of varying local legal requirements. In addition, although we train our Members and attempt to monitor our Members’ marketing materials, we cannot ensure that our Members will comply with applicable legal requirements or our policies and procedures or that such marketing materials or other Member practices comply with applicable laws, rules, and regulations. It is possible that a court could hold us liable for the actions of our Members, which could materially harm our business, financial condition, and operating results. Adverse publicity associated with our Company or the direct-selling industry could materially harm our business, financial condition, and operating results. Our reputation and the quality of our brand are critical to our business, and the size and success of our Member organization, our operating results, and our share price may be significantly affected by the public’s perception of Herbalife Nutrition and other direct- selling companies. This perception is dependent upon opinions concerning a number of factors, including: • the safety, quality, and efficacy of our products, as well as those of similar companies; • our Members; • our network marketing program or the attractiveness or viability of the financial opportunities it may provide; • the direct-selling business generally; • actual or purported failure by us or our Members to comply with applicable laws, rules, and regulations, including those regarding product claims and advertising, good manufacturing practices, the regulation of our network marketing program, the registration of our products for sale in our target markets, or other aspects of our business; • our commitment to ESG matters and our ESG practices; • the security of our information technology infrastructure; and • actual or alleged impropriety, misconduct, or fraudulent activity by any person formerly or currently associated with our Members or us. Adverse publicity concerning any of the foregoing whether or not accurate or resulting in investigation, enforcement, or other legal or regulatory actions or the imposition of fines, penalties, or other sanctions, could negatively impact our reputation, our ability to attract, motivate, and retain Members, and our ability to generate revenue. In addition, our Members’ and consumers’ perception of Herbalife Nutrition and our direct-selling business as well as similar companies can be significantly influenced by media attention, publicized scientific research or findings, product liability claims, and other publicity, whether or not it is legitimate. For example, as a result of the prevalence and marked increase in the use of blogs, social media platforms, and other forms of Internet-based communications, the opportunity for dissemination of information, both accurate and inaccurate, is seemingly limitless and readily available, and often does not provide any opportunity for correction or other redress. Adverse publicity that associates use of our products or any similar products with adverse effects, questions the quality or benefits of any such products, or claims that any such products are ineffective, inappropriately labeled, or have inaccurate instructions as to their use, could lead to lawsuits or other legal or regulatory challenges and could materially and adversely impact our reputation, the demand for our products, and our business, financial condition, and operating results. Adverse publicity relating to us has had, and could again have, a negative effect on our ability to attract, motivate, and retain Members, on consumer perception of Herbalife Nutrition, and on our share price. For example, the resulting adverse publicity from the 1986 permanent injunction entered in California caused a rapid, substantial loss of Members in the United States and a corresponding reduction in sales beginning in 1985. See also the risk factor titled “Our share price may be adversely affected by third parties who raise allegations about our Company.” We expect that adverse publicity will, from time to time, continue to negatively impact our business in particular markets and may adversely affect our share price. 22 Our failure to compete successfully could materially harm our business, financial condition, and operating results. The business of developing and marketing weight management and other nutrition and personal care products is highly competitive and sensitive to the introduction of new products and weight management plans, including various prescription drugs, which may rapidly capture a significant share of the market. Our competitors include numerous manufacturers; distributors; marketers; online, specialty, mass, and other retailers; and physicians that actively compete for the business of consumers both in the United States and abroad. Some of our competitors have longer operating histories, significantly greater resources, better-developed and more innovative sales and distribution channels and platforms, greater name recognition, and larger established customer bases than we do. Our present and future competitors may be able to offer products at lower prices or better withstand reductions in prices or other adverse economic or market conditions than we can; develop products that are comparable or superior to those we offer; adapt more quickly or effectively to new technologies, changing regulatory requirements, evolving industry trends and standards, and customer requirements than we can; and/or devote greater resources to the development, promotion, and sale of their products than we do. We are also subject to significant competition for the recruitment of Members from other direct-selling organizations, including those that market weight management products, dietary and nutritional supplements, personal care products, and other types of products, as well as those organizations in which former employees or Members are involved. In addition, because the industry in which we operate is not particularly capital intensive or otherwise subject to high barriers to entry, it is relatively easy for new competitors to emerge that will compete with us, including for our Members and their customers. Accordingly, competition may intensify and we may not be able to compete effectively in our markets. If we are not able to retain our Members and their customers or otherwise compete successfully, our business, financial condition, and operating results would be materially adversely affected. Our contractual obligation to sell our products only through our Member network and to refrain from changing certain aspects of our Marketing Plan may limit our growth. We are contractually prohibited from expanding our business by selling Herbalife Nutrition products through other distribution channels that may be available to our competitors, such as over the Internet, through wholesale sales, by establishing retail stores, or through mail order systems. To the extent legally permitted, an agreement we entered into with our Members provides assurances that we will not sell Herbalife Nutrition products worldwide through any distribution channel other than our network of Members. Since this is an open-ended commitment, there can be no assurance that we will be able to take advantage of innovative new distribution channels that are developed in the future or appropriately respond to consumer preferences as they continue to evolve. In addition, this agreement with our Members provides that we will not make any material changes adverse to our Members to certain aspects of our Marketing Plan that may negatively impact our Members without their approval as described in further detail below. For example, our agreement with our Members provides that we may increase, but not decrease, the discount percentages available to our Members for the purchase of products or the applicable royalty override percentages and production and other bonus percentages available to our Members at various qualification levels within our Member hierarchy. We may not modify the eligibility or qualification criteria for these discounts, royalty overrides, and production and other bonuses unless we do so in a manner to make eligibility and/or qualification easier than under the applicable criteria in effect as of the date of the agreement. Our agreement with our Members further provides that we may not vary the criteria for qualification for each Member tier within our Member hierarchy, unless we do so in such a way so as to make qualification easier. We reserved the right to make changes to our Marketing Plan without the consent of our Members in the event that changes are required by applicable law or are necessary in our reasonable business judgment to account for specific local market or currency conditions to achieve a reasonable profit on operations. In addition, we may initiate other changes that are adverse to our Members based on an assessment of what will be best for the Company and its Members. Under the agreement with our Members, these other adverse changes would then be submitted to our Member leadership for a vote. The vote would require the approval of at least 51% of our Members then at the level of President’s Team earning at the production bonus level of 6% who vote, provided that at least 50% of those Members entitled to vote do in fact vote. While we believe this agreement has strengthened our relationship with our existing Members, improved our ability to recruit new Members, and generally increased the long-term stability of our business, there can be no assurance that our agreement with our Members will not restrict our ability to adapt our Marketing Plan or our business to the evolving requirements of the markets in which we operate. As a result, our growth may be limited. 23 Our failure to appropriately respond to changing consumer trends, preferences, and demand for new products and product enhancements could materially harm our Member relationships, Members’ customer relationships, and product sales or otherwise materially harm our business, financial condition, and operating results. Our business is subject to rapidly changing consumer trends and preferences and product introductions, especially with respect to our nutrition products. Our continued success depends in part on our ability to anticipate and respond to these changes and introductions, and we may not respond or develop new products or product enhancements in a cost-effective, timely, or commercially appropriate manner, or at all, particularly while the COVID-19 pandemic persists. Current consumer trends and preferences have evolved and will continue to evolve as a result of, among other things, changes in consumer tastes; health, wellness, and nutrition considerations; competitive product and pricing pressures; changes in consumer preferences for certain sales channels; shifts in demographics; and concerns regarding the environmental and sustainability impact of the product manufacturing process. The success of our response to changing consumer trends and preferences and product introductions, including any new product offerings and enhancements, depends on a number of factors, including our ability to: • accurately anticipate consumer needs; • innovate and develop new products and product enhancements that meet these needs; • successfully commercialize new products and product enhancements; • price our products competitively; • manufacture and deliver our products in sufficient volumes, at our required levels of quality, and in a cost-effective and timely manner; and • differentiate our product offerings from those of our competitors and successfully respond to other competitive pressures, including technological advancements, evolving industry standards, and changing regulatory requirements. Our failure to accurately predict changes in consumer demand and technological advancements could negatively impact consumer opinion of our products or our business, which in turn could harm our Member relationships and the Members’ relationships with their customers, and cause a loss of sales. In addition, if we do not introduce new products or make enhancements to meet the changing needs of our Members and their customers in a cost-effective, timely, and commercially appropriate manner, or if our competitors release new products or product enhancements before we do, some of our product offerings could be rendered obsolete, which could cause our market share to decline and negatively impact our business, financial condition, and operating results. If we fail to further penetrate existing markets, the growth in sales of our products, along with our operating results, could be negatively impacted. The success of our business is to a large extent contingent on our ability to further penetrate existing markets, which is subject to numerous factors, many of which are out of our control. Our ability to increase market penetration may be limited by the finite number of persons in a given country inclined to pursue a direct-selling business opportunity or consumers aware of, or willing to purchase, Herbalife Nutrition products. Moreover, our growth in existing markets will depend upon increased brand awareness and improved training and other activities that enhance Member retention in our markets. While we have recently experienced significant growth in certain of our foreign markets, we cannot assure you that such growth levels will continue in the immediate or long-term future. Furthermore, our efforts to support growth in such foreign markets could be hampered to the extent that our infrastructure in such markets is deficient when compared to our infrastructure in our more developed markets, such as the United States. For example, there can be no assurances that we will be able to successfully manage expansion of manufacturing operations and a growing and dynamic sales force in China. If we are unable to effectively scale our supply chain and manufacturing infrastructure to support future growth in China or other foreign markets, our operations in such markets may be adversely impacted. Therefore, we cannot assure you that our general efforts to increase our market penetration and Member retention in existing markets will be successful. If we are unable to further penetrate existing markets, our business, financial condition, and operating results could materially suffer. Since one of our products constitutes a significant portion of our net sales, significant decreases in consumer demand for this product or our failure to produce a suitable replacement could materially harm our business, financial condition, and operating results. Our Formula 1 Healthy Meal, which is our best-selling product line, approximated 26% of our net sales for the year ended December 31, 2022. If consumer demand for this product decreases significantly or we cease offering this product without a suitable replacement, or if the replacement product fails to gain market acceptance, our business, financial condition, and operating results could be materially harmed. 24 Our business could be materially and adversely affected by natural disasters, other catastrophic events, acts of war or terrorism, cybersecurity incidents, pandemics, and/or other acts by third parties. We depend on the ability of our business to run smoothly, including the ability of Members to engage in their day-to-day selling and business building activities. In coordination with our suppliers, third-party manufacturers, and distributors, our ability to make and move our products reasonably unimpeded around the world is critical to our success. Any material disruption to our collective operations or supply, manufacturing, or distribution capabilities caused by unforeseen or catastrophic events, such as (i) natural disasters or severe weather conditions, including droughts, fires, floods, hurricanes, volcanic eruptions, and earthquakes; (ii) power loss or shortages; (iii) telecommunications or information technology infrastructure failures; (iv) acts or threats of war, terrorism, or other armed hostilities; (v) outbreaks of contagious diseases, epidemics, and pandemics; (vi) cybersecurity incidents, including intentional or inadvertent exposure of content perceived to be sensitive data; (vii) employee misconduct or error; and/or (viii) other actions by third parties and other similar disruptions, could materially adversely affect our ability to conduct business and our Members’ selling activities. For example, our operations in Central America were impacted in November 2020 when Hurricanes Eta and Iota made landfall in the region. The storms disrupted our supply chain transportation network and our ability to import product. In addition, our distribution center in Honduras experienced flooding, which damaged or destroyed product. Furthermore, our headquarters and one of our distribution facilities and manufacturing facilities are located in Southern California, an area susceptible to fires and earthquakes. Although the events in Central America did not have a material negative impact on our operations, we cannot make assurances that any future catastrophic events will not adversely affect our ability to operate our business or our financial condition and operating results. In addition, catastrophic events may result in significant cancellations or cessations of Member orders; contribute to a general decrease in local, regional, or global economic activity; directly impact our marketing, manufacturing, financial, or logistics functions; impair our ability to meet Member demands; harm our reputation; and expose us to significant liability, losses, and legal proceedings, any of which could materially and adversely affect our business, financial condition, and operating results. In March 2020, the World Health Organization declared the COVID-19 outbreak a global pandemic. The COVID-19 pandemic has significantly impacted health and economic conditions globally, disrupted global supply chains, and has adversely affected the Company’s business and that of its Members in certain of the Company’s markets and may continue to impact those markets or others in the future. Government, agency, and other regulatory recommendations, guidelines, mandates, and actions to address public health concerns, including restrictions on movement, public gatherings, and travel and restrictions on, or in certain cases outright prohibitions of, companies’ ability to conduct normal business operations, have and may continue to adversely affect our business. Although we have been classified as an essential business in most jurisdictions where we operate, there is no guarantee that this classification will not change. We may also be forced to or voluntarily elect to limit or cease operations in one or more markets for other reasons, such as the health and safety of our employees or because of disruptions in the operation of our supply chain and sources of supply. For example, it is possible that closures of our manufacturing facilities or those of our third-party contract manufacturers or suppliers could impact our distribution centers and our ability to manufacture and deliver products to our Members. In general, our inventory of products continues to be adequate to meet demand, but we do expect our supply chain and our ability to source and/or manufacture products will be negatively impacted if the negative effects of the pandemic continue for a prolonged period of time or worsen. The pandemic has had an adverse impact on our distribution channels and Members’ product access in some markets, which may, and in some cases will, continue until conditions improve. Our third-party contract manufacturers and suppliers and our Members’ businesses are also subject to many of the same risks and uncertainties related to the COVID-19 pandemic, as well as other pandemic-related risks and uncertainties that may not directly impact our operations, any of which could adversely affect demand for our products. For example, limitations on public gatherings have restricted our Members’ ability to hold meetings with their existing customers and to attract new customers. Significant limitations on cash transactions could also have an adverse effect on sales of products in certain markets. The COVID-19 pandemic has also adversely affected the economies and financial markets of many countries, at times causing a significant deceleration of or interruption to economic activity, which during various stages of the pandemic has reduced production, decreased demand for a broad variety of goods and services, diminished trade levels, and led to widespread corporate downsizing. We have also seen periods of significant disruption of and extreme volatility in the global capital markets, which could increase the cost of, or entirely restrict access to, capital. Further, while some countries have progressed in distributing COVID-19 vaccines to the general population, many countries have limited to no access to vaccines at this time. To the extent the global supply of vaccine remains limited or vaccination rates do not significantly increase, government restrictions in the countries with limited to no access or low vaccination rates may persist or increase and economic activity may remain at depressed levels in those countries or regions. 25 Despite the relaxation of pandemic-related constraints in certain markets, considerable uncertainty still surrounds the COVID-19 pandemic, its potential effects, and the extent and effectiveness of government responses to the pandemic. If the pandemic is not contained, or if new variants emerge or effective vaccines are not made available and utilized quickly enough, the adverse impacts of the COVID-19 pandemic could worsen, impacting all segments of the global economy, and result in a significant recession or worse. However, the unprecedented and sweeping nature of the COVID-19 pandemic makes it extremely difficult to predict how our business and operations will be affected in the long run. Further, the resumption of normal business operations after the disruptions caused by the COVID-19 pandemic may be delayed or constrained by the pandemic’s lingering effects on our Members, consumers, and third- party contract manufacturers and suppliers. Accordingly, our ability to conduct our business in the manner previously done or planned for the future could be materially and adversely affected, and any of the foregoing risks, or other cascading effects of the COVID-19 pandemic, or any other pandemic that may emerge in the future, that are not currently foreseeable, could materially and adversely affect our business, financial condition, and operating results. See the COVID-19 Pandemic and Sales by Geographic Region sections in Part II, Item 7, Management’s Discussion and Analysis of Financial Condition and Results of Operations, of this Annual Report on Form 10- K for further discussion of the impacts of the COVID-19 pandemic on our business and operating results. We depend on the integrity and reliability of our information technology infrastructure, and any related interruptions or inadequacies may have a material adverse effect on our business, financial condition, and operating results. Our business, including our ability to provide products and services to and manage our Members, depends on the performance and availability of our information technology infrastructure, including our core transactional systems. The most important aspect of our information technology infrastructure is the system through which we record and track Member sales, Volume Points, royalty overrides, bonuses, and other incentives. The failure of our information systems to operate effectively, or a breach in security of these systems, could adversely impact the promptness and accuracy of our product distribution and transaction processing. While we continue to invest in our information technology infrastructure, there can be no assurance that there will not be any significant interruptions to such systems, that the systems will be adequate to meet all of our business needs, or that the systems will keep pace with continuing changes in technology, legal and regulatory standards. Further, as discussed in Part II, Item 7, Management’s Discussion and Analysis of Financial Condition and Results of Operations, we recently commenced a Digital Technology Program to develop a new enhanced platform to provide enhanced digital capabilities and experiences to our Members. Our information technology infrastructure, as well as that of our Members and the other third parties with which we interact, may be damaged, disrupted, or breached or otherwise fail for a number of reasons, including power outages, computer and telecommunication failures, internal design, manual or usage errors, workplace violence or wrongdoing, or catastrophic events such as natural disasters, severe weather conditions, or acts of war or terrorism. In addition, numerous and evolving cybersecurity threats, including advanced and persistent cyberattacks, such as unauthorized attempts to access, disable, improperly modify, exfiltrate, or degrade our information technology infrastructure, or the introduction of computer viruses, malware, “phishing” emails, and other destructive software, and social engineering schemes, could compromise the confidentiality, availability, and integrity of our information technology infrastructure as well as those of the third parties with which we interact. These attacks may come from external sources, such as governments or hackers, or may originate internally from an employee or a third party with which we interact. We have been the target of, and may be the target of in the future, malicious cyberattacks, although to date none of these attacks have had a meaningful adverse impact on our business, financial condition, or operating results. The potential risk of cyberattacks may increase as we introduce new technology systems and services. Additionally, in response to the COVID-19 pandemic, many of our employees have been encouraged to work remotely, which may increase our exposure to significant systems interruptions, cybersecurity attacks, and otherwise compromise the integrity and reliability of our information technology infrastructure and our internal controls. Any disruptions to, or failures or inadequacies of, our information technology infrastructure that we may encounter in the future may result in substantial interruptions to our operations, expose us to significant liability, and may damage our reputation and our relationships with, or cause us to lose, our Members, especially if the disruptions, failures, or inadequacies impair our ability to track sales and pay royalty overrides, bonuses, and other incentives, any of which would harm our business, financial condition, and operating results. Any such disruptions, failures, or inadequacies could also create compliance risks under the Consent Order and result in penalties, fines, or sanctions under any applicable laws or regulations. Furthermore, it may be expensive or difficult to correct or replace any aspect of our information technology infrastructure in a timely manner, if at all, and we may have little or no control over whether any malfunctioning information technology services supplied to us by third parties are appropriately corrected, if at all. We have encountered, and may encounter in the future, errors in our software and our enterprise network, and inadequacies in the software and services supplied by certain of our vendors, although to date none of these errors or inadequacies have had a meaningful adverse impact on our business, financial condition or operating results. In addition, developments in technology are continuing to evolve and affecting all aspects of our business, including how we effectively manage our operations, interact with our Members and their customers, and commercialize opportunities that accompany the evolving digital and data driven economy. Therefore, one of our top priorities is to modernize our technology and data infrastructure by, among other things, creating more relevant and more personalized experiences wherever our systems interact with Members and their customers; and developing ways to create more powerful digital tools and capabilities for Members to enable them to grow their 26 businesses. These initiatives to modernize our technology and data infrastructure are expected to be implemented over the course of many years and to require significant investments. If these initiatives are not successful, our ability to attract and retain Members and their customers, increase sales, and reduce costs may be negatively affected. Further, these initiatives may be subject to cost overruns and delays and may cause disruptions in our operations. These cost overruns and delays and disruptions could adversely impact our business, financial condition, and operating results. Disruption of supply, shortage, or increases in the cost of ingredients, packaging materials, and other raw materials as well as climate change could materially harm our business, financial condition, and operating results. We and our third-party contract manufacturers depend on third-party suppliers to supply us with the various ingredients, packaging materials, and other raw materials that we use in the manufacturing and distribution of our products. Our business could be materially harmed if we experience operational difficulties with our third-party suppliers, such as increases in costs, reductions in the availability of materials or production capacity, errors in complying with specifications or applicable law, insufficient quality control, and failures to meet production or shipment deadlines. If we fail to develop or maintain our relationships with our third-party suppliers or if such suppliers cease doing business with us or go out of business, we could face difficulties in finding or transitioning to alternative suppliers that meet our standards. Many of the ingredients, packaging materials, and other raw materials we use are subject to fluctuations in availability and price due to a number of factors beyond our control, including crop size, ingredient, water, and land scarcity, market demand for raw materials, commodity market speculation, energy costs, currency fluctuations, supplier and logistics service capacities, import and export requirements, tariffs, and other government policies, and drought, excessive rain, temperature extremes, and other severe weather events. If we experience supply shortages, price increases, or supplier or regulatory impediments with respect to any of the materials we use in our products or packaging, we may need to seek alternative supplies or suppliers and may experience difficulties in finding replacements that are comparable in quality and price. For a discussion of the impacts of the COVID-19 pandemic on our supply chain see “If any of our manufacturing facilities or third-party manufacturers fail to reliably supply products to us at required levels of quality or fail to comply with applicable laws, our financial condition and operating results could be materially and adversely impacted” below. Further, the risks related to our ability to adequately source the materials required to meet our needs may be exacerbated by the effects of climate change and the legal, regulatory, or market measures that may be implemented to address climate change. There is growing concern that carbon dioxide and other greenhouse gases in the atmosphere may have an adverse impact on global temperatures, weather patterns, and the frequency and severity of extreme weather and natural disasters. If climate change has a negative effect on agricultural productivity, we may be subject to decreased availability or less favorable pricing for certain raw materials that are necessary for our products, such as soybeans, wheat, tea leaves, and nuts. Severe weather conditions and natural disasters can reduce crop size and crop quality, which in turn could reduce our supplies of raw materials, lower recoveries of usable raw materials, increase the prices of our raw materials, increase our cost of storing and transporting our raw materials, or disrupt production schedules. The impacts of climate change may also cause unpredictable water availability or exacerbate water scarcity. In addition, the increasing concern over climate change and related sustainability matters may also result in more federal, state, local, and foreign legal and regulatory requirements relating to climate change, which may significantly increase our costs of operation and delivery. 27
Use only the document provided and nothing else. How does Herbalife's "seed to feed" strategy influence its product quality and sourcing? 2022 Annual Report To Our Shareholders, We all know coming out of the pandemic has caused many companies to relook at their operations. 2022 was a year of change for Herbalife as well as a year of challenge. With every challenge, there is great opportunity. I came back to Herbalife because I believe passionately about what Herbalife does, and what it provides for health and income. Since returning to Herbalife, I along with our management team and distributor leaders from around the world have embarked on a journey to expand our content, enhance the business opportunity, modernize our brand, and expand our digital platform – with the aim to reach more customers and to provide our distributors a better plat- form to operate their business. Our vision is to be the world’s premier health and wellness company and community. As I write this, more than 3,000 distributor leaders from around the world are traveling to Los Angeles to meet together for the first time in three years to learn, to share, to innovate, and to build a path forward for Herbalife. The time is now for us to reconnect, build on our strategic plan, and provide growth for all of our stakeholders. Our digital transformation “Herbalife One” will enhance the Company’s two main platforms: content and busi- ness opportunity. Our content is our product. With obesity levels hitting record highs around the globe and a greater demand for health and wellness support, we have plans to grow our product portfolio through our daily nutrition products with expanded vegan and protein lines. We plan to explore other health and wellness opportunities that will be based on global as well as regional consumer demands. For example, our unique Ayurvedic product line in India has contributed to the success of our fastest growing market. We are unleashing similar innovative products regionally in Europe, Asia and China, and we will continue to look for synergies and opportunities to globalize our regional product offerings. With enhancements to the business opportunity, our global distributor network will continue to give us a com- petitive advantage to reach more consumers with more offerings than ever before. Our distributors give a personal voice and passion to our products. Spanning across 95 markets, our distributors are amazing entrepreneurs who have unique relationships with their customers, and through an expanded use of data, we will be able to assist our distributors to sell more products and work more closely and efficiently with consumers on their health and wellness journey. To this end, we are modernizing our brand and compensation structure, including new promotions to energize and incentivize our distributors to earn early in their Herbalife business opportunity journey. Together with Herbalife One, our business opportunity will differentiate us and strengthen our leadership in the marketplace. 2023 is a start of a new chapter – one that is both motivating and exciting. In March, I marked my 20th year of devoting my time, passion, and energy to Herbalife. I feel more optimistic about where we are headed today than ever before. Our distributors and employees make Herbalife a community unlike any other. I know our distrib- utors and employees are as incredibly excited about the future as I am. Thank you for your trust and support. Michael O. Johnson Chairman and Chief Executive Officer This letter contains “forward-looking statements” within the meaning of the safe harbor provisions of the Private Securities Litigation Reform Act of 1995. Although we believe that the expectations reflected in any of our forward-looking statements are reasonable, actual results or outcomes could differ materially from those pro- jected or assumed in any of our forward-looking statements. Our future financial condition and results of oper- ations, as well as any forward-looking statements, are subject to change and to inherent risks and uncertainties, many of which are beyond our control. Additionally, many of these risks and uncertainties are, and may continue to be, amplified by the COVID-19 pandemic. Important factors that could cause our actual results, performance and achievements, or industry results to differ materially from estimates or projections contained in or implied by our forward-looking statements include the following: the potential impacts of the COVID-19 pandemic and current global economic conditions, including inflation, on us; our Members, customers, and supply chain; and the world economy; our ability to attract and retain Members; our relationship with, and our ability to influence the actions of, our Members; our noncompliance with, or improper action by our employees or Members in violation of, applicable U.S. and foreign laws, rules, and regulations; adverse publicity associated with our Company or the direct-selling industry, including our ability to comfort the marketplace and regulators regard- ing our compliance with applicable laws; changing consumer preferences and demands and evolving industry standards, including with respect to climate change, sustainability, and other environmental, social, and gover- nance, or ESG, matters; the competitive nature of our business and industry; legal and regulatory matters, including regulatory actions concerning, or legal challenges to, our products or network marketing program and product liability claims; the Consent Order entered into with the FTC, the effects thereof and any failure to comply therewith; risks associated with operating internationally and in China; our ability to execute our growth and other strategic initiatives, including implementation of our Transformation Program and increased pene- tration of our existing markets; any material disruption to our business caused by natural disasters, other cata- strophic events, acts of war or terrorism, including the war in Ukraine, cybersecurity incidents, pandemics, and/ or other acts by third parties; our ability to adequately source ingredients, packaging materials, and other raw materials and manufacture and distribute our products; our reliance on our information technology infra- structure; noncompliance by us or our Members with any privacy laws, rules, or regulations or any security breach involving the misappropriation, loss, or other unauthorized use or disclosure of confidential information; contractual limitations on our ability to expand or change our direct-selling business model; the sufficiency of our trademarks and other intellectual property; product concentration; our reliance upon, or the loss or departure of any member of, our senior management team; restrictions imposed by covenants in the agreements governing our indebtedness; risks related to our convertible notes; changes in, and uncertainties relating to, the application of transfer pricing, income tax, customs duties, value added taxes, and other tax laws, treaties, and regulations, or their interpretation; our incorporation under the laws of the Cayman Islands; and share price volatility related to, among other things, speculative trading and certain traders shorting our common shares. Forward-looking statements in this letter speak only as of March 14, 2023. We do not undertake any obligation to update or release any revisions to any forward-looking statement or to report any events or circumstances after such date or to reflect the occurrence of unanticipated events, except as required by law. UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 Form 10-K (Mark One) ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the fiscal year ended December 31, 2022 OR TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the transition period from to Commission file number: 1-32381 HERBALIFE NUTRITION LTD. (Exact name of registrant as specified in its charter) Cayman Islands 98-0377871 (State or other jurisdiction of (I.R.S. Employer incorporation or organization) Identification No.) P.O. Box 309GT Ugland House, South Church Street Grand Cayman, Cayman Islands (Address of principal executive offices) (Zip Code) (213) 745-0500 (Registrant’s telephone number, including area code) Securities registered pursuant to Section 12(b) of the Act: Title of each class: Trading Symbol(s): Name of each exchange on which registered: Common Shares, par value $0.0005 per share HLF New York Stock Exchange Securities registered pursuant to Section 12(g) of the Act: None Indicate by check mark if the registrant is a well-known seasoned issuer, as defined in Rule 405 of the Securities Act. Yes ☒ No ☐ Indicate by check mark if the registrant is not required to file reports pursuant to Section 13 or Section 15(d) of the Act. Yes ☐ No ☒ Indicate by check mark whether the registrant: (1) has filed all reports required to be filed by Section 13 or 15(d) of the Securities Exchange Act of 1934 during the preceding 12 months (or for such shorter period that the registrant was required to file such reports), and (2) has been subject to such filing requirements for the past 90 days. Yes ☒ No ☐ Indicate by check mark whether the registrant has submitted electronically every Interactive Data File required to be submitted pursuant to Rule 405 of Regulation S-T (§232.405 of this chapter) during the preceding 12 months (or for such shorter period that the registrant was required to submit such files). Yes ☒ No ☐ Indicate by check mark whether the registrant is a large accelerated filer, an accelerated filer, a non-accelerated filer, a smaller reporting company, or an emerging growth company. See the definitions of “large accelerated filer,” “accelerated filer,” “smaller reporting company,” and “emerging growth company” in Rule 12b-2 of the Exchange Act. Large accelerated filer ☒ Accelerated filer ☐ Non-accelerated filer ☐ Smaller reporting company ☐ Emerging growth company ☐ If an emerging growth company, indicate by check mark if the registrant has elected not to use the extended transition period for complying with any new or revised financial accounting standards provided pursuant to Section 13(a) of the Exchange Act. ☐ Indicate by check mark whether the registrant has filed a report on and attestation to its management’s assessment of the effectiveness of its internal control over financial reporting under Section 404(b) of the Sarbanes-Oxley Act (15 U.S.C. 7262(b)) by the registered public accounting firm that prepared or issued its audit report. ☒ If securities are registered pursuant to Section 12(b) of the Act, indicate by check mark whether the financial statements of the registrant included in the filing reflect the correction of an error to previously issued financial statements. ☐ Indicate by check mark whether any of those error corrections are restatements that required a recovery analysis of incentive-based compensation received by any of the registrant’s executive officers during the relevant recovery period pursuant to §240.10D-1(b). ☐ Indicate by check mark whether registrant is a shell company (as defined in Rule 12b-2 of the Exchange Act). Yes ☐ No ☒ There were 97,920,728 common shares outstanding as of February 7, 2023. The aggregate market value of the Registrant’s common shares held by non-affiliates was approximately $896 million as of June 30, 2022, based upon the last reported sales price on the New York Stock Exchange on that date of $20.45. For the purposes of this disclosure only, the registrant has assumed that its directors, executive officers, and the beneficial owners of 5% or more of the registrant’s outstanding common stock are the affiliates of the registrant. DOCUMENTS INCORPORATED BY REFERENCE Portions of the registrant’s Definitive Proxy Statement to be filed with the Securities and Exchange Commission no later than 120 days after the end of the Registrant’s fiscal year ended December 31, 2022, are incorporated by reference in Part III of this Annual Report on Form 10-K. 1 TABLE OF CONTENTS Page No. PART I Item 1. Business 5 Item 1A. Risk Factors 19 Item 1B. Unresolved Staff Comments 43 Item 2. Properties 43 Item 3. Legal Proceedings 44 Item 4. Mine Safety Disclosures 44 PART II Item 5. Market for Registrant’s Common Equity, Related Stockholder Matters and Issuer Purchases of Equity 45 Securities Item 6. [Reserved] 46 Item 7. Management’s Discussion and Analysis of Financial Condition and Results of Operations 47 Item 7A. Quantitative and Qualitative Disclosures About Market Risk 67 Item 8. Financial Statements and Supplementary Data 69 Item 9. Changes in and Disagreements With Accountants on Accounting and Financial Disclosure 70 Item 9A. Controls and Procedures 70 Item 9B. Other Information 70 Item 9C. Disclosure Regarding Foreign Jurisdictions that Prevent Inspections 70 PART III Item 10. Directors, Executive Officers and Corporate Governance 71 Item 11. Executive Compensation 71 Item 12. Security Ownership of Certain Beneficial Owners and Management and Related Stockholder Matters 71 Item 13. Certain Relationships and Related Transactions, and Director Independence 71 Item 14. Principal Accounting Fees and Services 71 PART IV Item 15. Exhibits, Financial Statement Schedules 72 Item 16. Form 10-K Summary 125 2 FORWARD-LOOKING STATEMENTS This Annual Report on Form 10-K contains “forward-looking statements” within the meaning of Section 27A of the Securities Act of 1933, as amended, and Section 21E of the Securities Exchange Act of 1934, as amended. All statements other than statements of historical fact are “forward-looking statements” for purposes of federal and state securities laws, including any projections of earnings, revenue or other financial items; any statements of the plans, strategies and objectives of management, including for future operations, capital expenditures, or share repurchases; any statements concerning proposed new products, services, or developments; any statements regarding future economic conditions or performance; any statements of belief or expectation; and any statements of assumptions underlying any of the foregoing or other future events. Forward-looking statements may include, among other, the words “may,” “will,” “estimate,” “intend,” “continue,” “believe,” “expect,” “anticipate” or any other similar words. Although we believe that the expectations reflected in any of our forward-looking statements are reasonable, actual results or outcomes could differ materially from those projected or assumed in any of our forward-looking statements. Our future financial condition and results of operations, as well as any forward-looking statements, are subject to change and to inherent risks and uncertainties, many of which are beyond our control. Additionally, many of these risks and uncertainties are, and may continue to be, amplified by the COVID-19 pandemic. Important factors that could cause our actual results, performance and achievements, or industry results to differ materially from estimates or projections contained in or implied by our forward-looking statements include the following: • the potential impacts of the COVID-19 pandemic and current global economic conditions, including inflation, on us; our Members, customers, and supply chain; and the world economy; • our ability to attract and retain Members; • our relationship with, and our ability to influence the actions of, our Members; • our noncompliance with, or improper action by our employees or Members in violation of, applicable U.S. and foreign laws, rules, and regulations; • adverse publicity associated with our Company or the direct-selling industry, including our ability to comfort the marketplace and regulators regarding our compliance with applicable laws; • changing consumer preferences and demands and evolving industry standards, including with respect to climate change, sustainability, and other environmental, social, and governance, or ESG, matters; • the competitive nature of our business and industry; • legal and regulatory matters, including regulatory actions concerning, or legal challenges to, our products or network marketing program and product liability claims; • the Consent Order entered into with the FTC, the effects thereof and any failure to comply therewith; • risks associated with operating internationally and in China; • our ability to execute our growth and other strategic initiatives, including implementation of our Transformation Program and increased penetration of our existing markets; • any material disruption to our business caused by natural disasters, other catastrophic events, acts of war or terrorism, including the war in Ukraine, cybersecurity incidents, pandemics, and/or other acts by third parties; • our ability to adequately source ingredients, packaging materials, and other raw materials and manufacture and distribute our products; • our reliance on our information technology infrastructure; • noncompliance by us or our Members with any privacy laws, rules, or regulations or any security breach involving the misappropriation, loss, or other unauthorized use or disclosure of confidential information; • contractual limitations on our ability to expand or change our direct-selling business model; • the sufficiency of our trademarks and other intellectual property; • product concentration; • our reliance upon, or the loss or departure of any member of, our senior management team; • restrictions imposed by covenants in the agreements governing our indebtedness; 3 • risks related to our convertible notes; • changes in, and uncertainties relating to, the application of transfer pricing, income tax, customs duties, value added taxes, and other tax laws, treaties, and regulations, or their interpretation; • our incorporation under the laws of the Cayman Islands; and • share price volatility related to, among other things, speculative trading and certain traders shorting our common shares. Additional factors and uncertainties that could cause actual results or outcomes to differ materially from our forward-looking statements are set forth in this Annual Report on Form 10-K, including in Part I, Item 1A, Risk Factors, and Part II, Item 7, Management’s Discussion and Analysis of Financial Condition and Results of Operations, and in our Consolidated Financial Statements and the related Notes. In addition, historical, current, and forward-looking sustainability-related statements may be based on standards for measuring progress that are still developing, internal controls and processes that continue to evolve, and assumptions that are subject to change in the future. Forward-looking statements in this Annual Report on Form 10-K speak only as of the date hereof. We do not undertake any obligation to update or release any revisions to any forward-looking statement or to report any events or circumstances after the date hereof or to reflect the occurrence of unanticipated events, except as required by law. The Company “We,” “our,” “us,” “Company,” “Herbalife,” and “Herbalife Nutrition” refer to Herbalife Nutrition Ltd., a Cayman Islands exempted company incorporated with limited liability, and its subsidiaries. Herbalife Nutrition Ltd. is a holding company, with substantially all of its assets consisting of the capital stock of its direct and indirectly-owned subsidiaries. 4 PART I Item 1. Business GENERAL Herbalife Nutrition is a global nutrition company that provides health and wellness products to consumers in 95 markets, which consists of countries and territories, through our direct-selling business model. Our products are primarily in the categories of weight management, sports nutrition, and targeted nutrition. We use a direct-selling business model to distribute and market our nutrition products to and through a global network of independent members, or Members. Members include consumers who purchase products for their own personal use and distributors who wish to resell products or build a sales organization. We believe that direct selling is ideally suited for our business because the distribution and sales of our products with personalized support, coaching, and education provide a supportive and understanding community of like-minded people who prioritize health and nutrition. In addition to the effectiveness of personalized selling through a direct-selling business model, we believe the primary drivers for our success throughout our 43-year operating history have been enhanced consumer awareness and demand for our products due to global trends such as the obesity epidemic, increasing interest in a fit and active lifestyle, living healthier, and the rise of entrepreneurship. PRODUCT SALES Our science-backed products help Members and their customers improve their overall health, enhance their wellness, and achieve their fitness and sport goals. As of December 31, 2022, we marketed and sold approximately 131 product types. Our products are often sold as part of a program and therefore our portfolio is comprised of a series of related products designed to simplify weight management, health and wellness, and overall nutrition for our Members and their customers. Our Formula 1 Nutritional Shake Mix, our best-selling product line, approximated 26% of our net sales for the year ended December 31, 2022. The following table summarizes our products by product category: Percentage of Net Sales 2022 2021 2020 Description Representative Products Weight Management 56.8% 58.1% 59.8% Meal replacement, protein Formula 1 Healthy Meal, shakes, drink mixes, weight Herbal Tea Concentrate, loss enhancers and healthy Protein Drink Mix, snacks Personalized Protein Powder, Total Control®, Formula 2 Multivitamin Complex, Prolessa™ Duo, and Protein Bars Targeted Nutrition 29.1% 28.2% 27.6% Functional beverages and Herbal Aloe Concentrate, dietary and nutritional Active Fiber Complex, supplements containing Niteworks®, and quality herbs, vitamins, Herbalifeline® minerals and other natural ingredients Energy, Sports, and 10.6% 9.5% 7.9% Products that support a Herbalife24® product line, Fitness healthy active lifestyle N-R-G Tea, and Liftoff® energy drink Outer Nutrition 1.6% 1.9% 2.0% Facial skin care, body care, Herbalife SKIN line and and hair care Herbal Aloe Bath and Body Care line Literature, Promotional, 1.9% 2.3% 2.7% Start-up kits, sales tools, Herbalife Member Packs and Other and educational materials and BizWorks 5 Product returns and buyback policies We offer a customer satisfaction guarantee in substantially all markets where our products are sold. If for any reason a customer or preferred member is not satisfied with an Herbalife Nutrition product, they may return it or any unused portion of the product within 30 days from the time of receipt for a full refund or credit toward the exchange of another Herbalife Nutrition product. In addition, in substantially all markets, we maintain a buyback program pursuant to which we will purchase back unsold products from a Member who decides to leave the business. Subject to certain terms and conditions that may vary by market, the buyback program generally permits a Member to return unopened products or sales materials in marketable condition purchased within the prior twelve- month period in exchange for a refund of the net price paid for the product and, in most markets, the cost of returning the products and materials to us. Together, product returns and buybacks were approximately 0.1% of net sales for each of the years ended December 31, 2022, 2021, and 2020. Product development Our products are focused on nutrition and seek to help consumers achieve their goals in the areas of weight management; targeted nutrition (including everyday wellness and healthy aging); energy, sports, and fitness; and outer nutrition. We believe our focus on nutrition and botanical science and the combination of our internal efforts with the scientific expertise of outside resources, including our ingredient suppliers, major universities, and our Nutrition Advisory Board, have resulted in product differentiation that has given our Members and consumers increased confidence in our products. We continue to invest in scientific and technical functions, including research and development associated with creating new or enhancing current product formulations and the advancement of personalized nutrition solutions; clinical studies of existing products or products in development; technical operations to improve current product formulations; quality assurance and quality control to establish the appropriate quality systems, controls, and standards; and rigorous ingredient and product testing to ensure compliance with regulatory requirements, as well as in the areas of regulatory and scientific affairs. Our personalized nutrition solutions include tools which aid in the development of optimal product packages specific to our customers’ individual nutritional needs, based on their expected wellness goals. Our product development strategy is twofold: (1) to increase the value of existing customers by investing in products that address customers’ health, wellness and nutrition considerations, fill perceived gaps in our portfolios, add flavors, increase convenience by developing products like snacks and bars, and expand afternoon and evening consumption with products like savory shakes or soups; and (2) to attract new customers by entering into new categories, offering more choices, increasing individualization, and expanding our current sports line. We have a keen focus on product innovation and aim to launch new products and variations on existing products on a regular basis. Once a particular market opportunity has been identified, our scientists, along with our operations, marketing, and sales teams, work closely with Member leadership to introduce new products and variations on existing products. Our Nutrition Advisory Board and Dieticians Advisory Board are comprised of leading experts around the world in the fields of nutrition and health who educate our Members on the principles of nutrition, physical activity, diet, and healthy lifestyle. We rely on the scientific contributions from members of our Nutrition Advisory Board and our in-house scientific team to continually upgrade existing products or introduce new products as new scientific studies become available and are accepted by regulatory authorities around the world. COMPETITION The nutrition industry is highly competitive. Nutrition products are sold through a number of distribution channels, including direct selling, online retailers, specialty retailers, and the discounted channels of food, drug and mass merchandise. Our competitors include companies such as Conagra Brands, Hain Celestial, and Post. Additionally, we compete for the recruitment of Members from other network marketing organizations, including those that market nutrition products and other entrepreneurial opportunities. Our direct-selling competitors include companies such as Nu Skin, Tupperware, and USANA. Our ability to remain competitive depends on many factors, including having relevant products that meet consumer needs, a rewarding compensation plan, enhanced education and tools, innovation in our products and services, competitive pricing, a strong reputation, and a financially viable company. We have differentiated ourselves from our competitors through our Members’ focus on the consultative sales process, which includes ongoing personal contact, coaching, behavior motivation, education, and the creation of supportive communities. For example, many Members have frequent contact with and provide support to their customers through a community-based approach to help them achieve nutrition goals. Some methods include Nutrition Clubs, Weight Loss Challenges, Wellness Evaluations, and Fit Camps. 6 For additional information regarding competition, see Part I, Item 1A, Risk Factors, of this Annual Report on Form 10-K. OUR NETWORK MARKETING PROGRAM General Our products are sold and distributed through a global direct selling business model which individuals may join to become a Member of our network marketing program. We believe that the one-on-one personalized service inherent in the direct-selling business model is ideally suited to marketing and selling our nutrition products. Sales of nutrition products are reinforced by the ongoing personal contact, coaching, behavior motivation, education, and the creation of supportive communities. This frequent, personal contact can enhance consumers’ nutritional and health education as well as motivate healthy behavioral changes in consumers to begin and maintain an active lifestyle through wellness and weight management programs. In addition, our Members consume our products themselves, and, therefore, can provide first-hand testimonials of the use and effectiveness of our products and programs to their customers. The personalized experience of our Members has served as a very powerful sales tool for our products. People become Herbalife Nutrition Members for a number of reasons. Many first start out as consumers of our products who want to lose weight or improve their nutrition, and are customers of our Members. Some later join Herbalife Nutrition and become Members themselves, which makes them eligible to purchase products directly from us, simply to receive a discounted price on products for them and their families. Some Members are interested in the entrepreneurial opportunity to earn compensation based on their own skills and hard work and join Herbalife Nutrition to earn part-time or full-time income. Our objective is sustainable growth in the sales of our products to our Members and their customers by increasing the productivity, retention and recruitment of our Member base through the structure of our network marketing program. Segmentation In many of our markets, including certain of our largest markets such as the United States, Mexico, and India, we have segmented our Member base into two categories: “preferred members” – who are consumers who wish to purchase product for their own household use, and “distributors” – who are Members who also wish to resell products or build a sales organization. This Member segmentation provides a clear differentiation between those interested in retailing our products or building a sales organization, and those simply consuming our products as discount customers. This distinction allows us to more effectively communicate and market to each group, and provides us with better information regarding our Members within the context of their stated intent and goals. As of December 31, 2022, we had approximately 6.2 million Members, including 2.9 million preferred members and 2.0 million distributors in the markets where we have established these two categories and 0.3 million sales representatives and independent service providers in China. The number of preferred members and distributors may change as a result of segmentation and/or conversion, and do not necessarily represent a change in the total number of Members. Any future change in the number of preferred members or distributors is not necessarily indicative of our future expected financial performance. Our Members We believe our Members are the most important differentiator as we go to market with our nutrition products, because of the one- on-one direct contact they have with their customers, along with the education, training and community support services that we believe help improve the nutrition habits of consumers. We work closely with our entrepreneurial Members to improve the sustainability of their businesses and to reach consumers. We require our Members to fairly and honestly market both our products and the Herbalife Nutrition business opportunity. Our relationship with our Members is key to our continued success as they allow us direct access to the voice of consumers. Many of our entrepreneurial Members identify and test new marketing efforts and programs developed by other Members and disseminate successful techniques to their sales organizations. For example, Members in Mexico developed businesses that became known as “Nutrition Clubs,” marketing techniques that improve the productivity and efficiency of our Members as well as the affordability of our weight loss products for their customers. Rather than buying several retail products, these businesses allow consumers to purchase and consume our products each day (a Member marketing technique we refer to as “daily consumption”), while continuing to benefit from the support and interaction with the Member as well as socializing with other customers in a designated location. Other programs to drive daily consumption, whether for weight management or for improved physical fitness, include Member- conducted weight loss contests, or Weight Loss Challenges, Member-led fitness programs, or Fit Camps, and Member-led Wellness Evaluations. We refer to successful Member marketing techniques that we disseminate throughout our Member network, such as Nutrition Clubs, Weight Loss Challenges, and Fit Camps, as Daily Methods of Operations, or DMOs. 7 We believe that personal and professional development is key to our Members’ success and, therefore, we and our sales leader Members – those that achieve certain levels within our Marketing Plan – have meetings and events to support this important objective. We and our Member leadership, which is comprised of sales leaders, conduct in-person and virtual training sessions on local, regional, and global levels attended by thousands of Members to provide updates on product education, sales and marketing training, and instruction on available tools. These events are opportunities to showcase and disseminate our Members’ evolving best marketing practices and DMOs from around the world and to introduce new or upgraded products. A variety of training and development tools are also available through online and mobile platforms. On July 18, 2002, we entered into an agreement with our Members that provides that we will continue to distribute Herbalife Nutrition products exclusively to and through our Members and that, other than changes required by applicable law or necessary in our reasonable business judgment to account for specific local market or currency conditions to achieve a reasonable profit on operations, we will not make any material changes to certain aspects of our Marketing Plan that are adverse to our Members without the support of our Member leadership. Specifically, any such changes would require the approval of at least 51% of our Members then at the level of President’s Team earning at the production bonus level of 6% who vote, provided that at least 50% of those Members entitled to vote do in fact vote. We initiate these types of changes based on the assessment of what will be best for us and our Members and then submit such changes for the requisite vote. We believe that this agreement has strengthened our relationship with our existing Members, improved our ability to recruit new Members and generally increased the long-term stability of our business. Member Compensation and Sales Leader Retention and Requalification In addition to benefiting from discounted prices, Members interested in the entrepreneurial opportunity may earn profit from several sources. First, Members may earn profits by purchasing our products at wholesale prices, discounted depending on the Member’s level within our Marketing Plan, and reselling those products at prices they establish for themselves to generate retail profit. Second, Members who sponsor other Members and establish, maintain, coach, and train their own sales organizations may earn additional income based on the sales of their organization, which may include royalty overrides, production bonuses, and other cash bonuses. Members earning such compensation have generally attained the level of sales leader as described below. There are also many Members, which include distributors, who have not sponsored another Member. Members who have not sponsored another Member are generally considered discount buyers or small retailers. While a number of these Members have also attained the level of sales leader, they do not receive additional income as do Members who have sponsored other Members. We assign point values, known as Volume Points, to each of our products to determine a Member’s level within the Marketing Plan. See Part II, Item 7, Management’s Discussion and Analysis of Financial Condition and Operating Results, of this Annual Report on Form 10-K for a further description of Volume Points. Typically, a Member accumulates Volume Points for a given sale at the time the Member pays for the product. However, since May 2017, a Member does not receive Volume Points for a transaction in the United States until that product is sold to a customer at a profit and it is documented in compliance with the consent order, or Consent Order, we entered into with the Federal Trade Commission, or the FTC, in 2016. The Member’s level within the Marketing Plan is used to determine the discount applied to their purchase of our products and whether they have qualified to become a sales leader. To become a sales leader, or qualify for a higher level within our Marketing Plan, Members must achieve specified Volume Point thresholds of product sales or earn certain amounts of royalty overrides during specified time periods and generally must re-qualify once each year. Qualification criteria vary somewhat by market. We have initial qualification methods of up to 12 months to encourage a more gradual qualification. We believe a gradual qualification approach is important to the success and retention of new sales leaders and benefits the business in the long term as it allows new Members to obtain product and customer experience as well as additional training and education on Herbalife Nutrition products, daily consumption based DMOs, and the business opportunity prior to becoming a sales leader. The basis for calculating Marketing Plan payouts varies depending on product and market: for 2022, we utilized on a weighted- average basis approximately 90% of suggested retail price, to which we applied discounts of up to 50% for distributor allowances and payout rates of up to 15% for royalty overrides, up to 7% for production bonuses, and approximately 1% for a cash bonus known as the Mark Hughes bonus. We believe that the opportunity for Members to earn royalty overrides and production bonuses contributes significantly to our ability to retain our most active and productive Members. Our Marketing Plan generally requires each sales leader to re-qualify for such status each year, prior to February, in order to maintain their 50% discount on products and be eligible to receive additional income. In February of each year, we demote from the rank of sales leader those Members who did not satisfy the re-qualification requirements during the preceding twelve months. The re- qualification requirement does not apply to new sales leaders (i.e. those who became sales leaders subsequent to the January re- qualification of the prior year). 8 As of December 31, 2022, prior to our February re-qualification process, approximately 772,000 of our Members have attained the level of sales leader, of which approximately 734,000 have attained this level in the 94 markets where we use our Marketing Plan and 38,000 independent service providers operating in our China business. See Business in China below for a description of our business in China. The table below reflects sales leader retention rates by year and by region: Sales Leader Retention Rate 2023 2022 2021 North America 69.7% 58.8% 70.8% Latin America (1) 71.6% 69.3% 67.0% EMEA 64.6% 77.1% 72.7% Asia Pacific 66.6% 66.5% 63.5% Total sales leaders 67.6% 68.9% 67.9% (1) The Company combined the Mexico and South and Central America regions into the Latin America region in 2022. Historical information has been reclassified to conform with the current period geographic presentation. For the latest twelve-month re-qualification period ending January 2023, approximately 67.6% of our sales leaders, excluding China, re-qualified, versus 68.9% for the twelve-month period ended January 2022. The Company throughout its history has adjusted the re-qualification criteria from time to time in response to evolving business objectives and market conditions, and the above results include the effects of all such changes. For example, in recent years certain markets have allowed members to utilize a lower re- qualification volume threshold and the Company has continued to expand this lower re-qualification method to additional markets. Separately, with revised business requirements in place following the Consent Order, as described in Network Marketing Program below, we utilize a re-qualification equalization factor for U.S. Members to better align their re-qualification thresholds with Members in other markets, and retention results for each of the years presented include the effect of the equalization factor. We believe this factor preserves retention rate comparability across markets. Also, for each of the years presented, the retention results exclude certain markets for which, due to local operating conditions, sales leaders were not required to requalify. We believe sales leader retention rates are the result of efforts we have made to try and improve the sustainability of sales leaders’ businesses, such as encouraging Members to obtain experience retailing Herbalife Nutrition products before becoming a sales leader and providing them with advanced technology tools, as well as reflecting market conditions. As our business operations evolve, including the segmentation of our Member base in certain markets and changes in sales leader re-qualification thresholds for other markets, management continues to evaluate the importance of sales leader retention rate information. The table below reflects the number of sales leaders as of the end of February of the year indicated (subsequent to the annual re- qualification process) and by region: Number of Sales Leaders 2022 2021 2020 North America 80,278 95,402 71,202 Latin America (1) 125,726 131,359 134,401 EMEA 183,056 158,153 130,438 Asia Pacific 201,137 173,582 158,815 Total sales leaders 590,197 558,496 494,856 China 33,486 68,301 70,701 Worldwide total sales leaders 623,683 626,797 565,557 (1) The Company combined the Mexico and South and Central America regions into the Latin America region in 2022. Historical information has been reclassified to conform with the current period geographic presentation. The number of sales leaders as of December 31 will exceed the number immediately subsequent to the preceding re-qualification period because sales leaders qualify throughout the year but sales leaders who do not re-qualify are removed from the rank of sales leader the following February. 9 Business in China Our business model in China includes unique features as compared to our traditional business model in order to ensure compliance with Chinese regulations. As a result, our business model in China differs from that used in other markets. Members in China are categorized differently than those in other markets. In China, we sell our products to and through independent service providers and sales representatives to customers and preferred customers, as well as through Company-operated retail platforms when necessary. In China, while multi-level marketing is not permitted, direct selling is permitted. Chinese citizens who apply and become Members are referred to as sales representatives. These sales representatives are permitted to sell away from fixed retail locations in the provinces where we have direct selling licenses, including in the provinces of Jiangsu, Guangdong, Shandong, Zhejiang, Guizhou, Beijing, Fujian, Sichuan, Hubei, Shanxi, Shanghai, Jiangxi, Liaoning, Jilin, Henan, Chongqing, Hebei, Shaanxi, Tianjin, Heilongjiang, Hunan, Guangxi, Hainan, Anhui, Yunnan, Gansu, Ningxia, and Inner Mongolia. In Xinjiang province, where we do not have a direct selling license, we have a Company-operated retail store that can directly serve customers and preferred customers. With online orderings throughout China, there has been a declining demand in Company-operated retail stores. Sales representatives receive scaled rebates based on the volume of products they purchase. Sales representatives who reach certain volume thresholds and meet certain performance criteria are eligible to apply to provide marketing, sales and support services. Once their application is accepted, they are referred to as independent service providers. Independent service providers are independent business entities that are eligible to receive compensation from Herbalife Nutrition for the marketing, sales and support services they provide so long as they satisfy certain conditions, including procuring the requisite business licenses, having a physical business location, and complying with all applicable Chinese laws and Herbalife Nutrition rules. In China, our independent service providers are compensated for marketing, sales support, and other services, instead of the Member allowances and royalty overrides utilized in our global Marketing Plan. The service hours and related fees eligible to be earned by the independent service providers are based on a number of factors, including the sales generated through them and through others to whom they may provide marketing, sales support and other services, the quality of their service, and other factors. Total compensation available to our independent service providers in China can generally be comparable to the total compensation available to other sales leaders globally. The Company does this by performing an analysis in our worldwide system to estimate the potential compensation available to the service providers, which can generally be comparable to that of sales leaders in other countries. After adjusting such amounts for other factors and dividing by each service provider’s hourly rate, we then notify each independent service provider the maximum hours of work for which they are eligible to be compensated in the given month. In order for a service provider to be paid, the Company requires each service provider to invoice the Company for their services. RESOURCES We seek to provide the highest quality products to our Members and their customers through our “seed to feed” strategy, which includes significant investments in obtaining quality ingredients from traceable sources, qualified by scientific personnel through product testing, and increasing the amount of self-manufacturing of our top products. Ingredients Our seed to feed strategy is rooted in using quality ingredients from traceable sources. Our procurement process for many of our botanical products now stretches back to the farms and includes self-processing of teas and herbal ingredients into finished raw materials at our own facilities. Our Changsha, China facility exclusively provides high quality tea and herbal raw materials to our manufacturing facilities as well as our third-party contract manufacturers around the world. We also source ingredients that we do not self-process from companies that are well-established, reputable suppliers in their respective field. These suppliers typically utilize similar quality processes, equipment, expertise, and having traceability as we do with our own modern quality processes. As part of our program to ensure the procurement of high-quality ingredients, we also test our incoming raw materials for compliance to potency, identity, and adherence to strict specifications. 10 Manufacturing The next key component of our seed to feed strategy involves the high-quality manufacturing of these ingredients into finished products, which are produced at both third-party manufacturers and our own manufacturing facilities. As part of our long-term strategy, we seek to expand and increase our self-manufacturing capabilities. Our manufacturing facilities, known as Herbalife Innovation and Manufacturing Facilities, or HIMs, include HIM Lake Forest, HIM Winston-Salem, HIM Suzhou, and HIM Nanjing. HIM Winston- Salem is currently our largest manufacturing facility at approximately 800,000 square feet. Together, our HIM manufacturing facilities produce approximately 51% of our inner nutrition products sold worldwide. Self-manufacturing also enables us greater control to reduce negative environmental impacts of our operations and supply chain. As described in the Sustainability section below, we are focused on developing science-based green-house gas emission reduction targets for our manufacturing facilities as part of our sustainability goals. We are also focused on reducing single-use plastics throughout our global distribution network and incorporating more sustainable content, such as post-consumer recycled resin, into our packaging. Our finished products are analyzed for label claims and tested for microbiological purity, thereby verifying that our products comply with food safety standards, meet label claims and have met other quality standards. For self-manufactured products, we conduct all of our testing in-house at our fully-equipped, modern quality control laboratories in the U.S. and China. We have two quality control laboratories in Southern California and Changsha, China (including a Center of Excellence in both locations). In addition, we also have a Center of Excellence laboratory in Bangalore, India, and a quality control laboratory in Winston-Salem, North Carolina, Suzhou, China, and Nanjing, China. All HIM quality control labs contain modern analytical equipment and are backed by the expertise in testing and methods development of our scientists. In our U.S. HIM facilities, which manufacture products for the U.S. and most of our international markets, we operate and adhere to the regulations established by the U.S. Food and Drug Administration, or FDA, and strict Current Good Manufacturing Practice regulations, or CGMPs, for food, acidified foods, and dietary supplements. We also work closely with our third-party manufacturers to ensure high quality products are produced and tested through a vigorous quality control process at approved contract manufacturer labs or third-party labs. For these products manufactured at other facilities, we combine four elements to ensure quality products: (1) the same selectivity and assurance in ingredients as noted above; (2) use of reputable, CGMP-compliant, quality- and sustainability-minded manufacturing partners; (3) supplier qualification through annual audit programs; and (4) significant product quality testing. During 2022, we purchased approximately 15% of our products from our top three third-party manufacturers. Infrastructure and Technology Our direct-selling business model enables us to grow our business with moderate investment in infrastructure and fixed costs. We incur no direct incremental cost to add a new Member in our existing markets, and our Member compensation varies directly with product sales. In addition, our Members also bear a portion of our consumer marketing expenses, and our sales leaders sponsor and coordinate Member recruiting and most meeting and training initiatives. Additionally, our infrastructure features scalable production and distribution of our products as a result of having our own manufacturing facilities and numerous third-party manufacturing relationships, as well as our global footprint of in-house and third-party distribution centers. An important part of our seed to feed strategy is having an efficient infrastructure to deliver products to our Members and their customers. As the shift in consumption patterns continues to reflect an increasing daily consumption focus, one focus of this strategy is to provide more product access points closer to our Members and their customers. We have both Company-operated and outsourced distribution points ranging from our “hub” distribution centers in Los Angeles, Memphis, and Venray, Netherlands, to mid-size distribution centers in major countries, to small pickup locations spread throughout the world. We also expect to continue to improve our distribution channels relating to home delivery as we expect to see continued increased demands for our products being shipped to our Members in certain of our larger markets. In addition to these distribution points, we partner with certain retail locations to provide Member pickup points in areas which are not well serviced by our distribution points. We have also identified a number of methods and approaches that better support Members by providing access points closer to where they do business and by improving product delivery efficiency through our distribution channels. Specific methods vary by markets and consider local Member needs and available resources. In aggregate, we have over 1,500 distribution points and partner retail locations around the world. In addition to our distribution points, we contract third party-run drop-off locations where we can ship to and Members can pick up ordered products. 11 We leverage our technology infrastructure in order to maintain, protect, and enhance existing systems and develop new systems to keep pace with continuing changes in technology, evolving industry and regulatory standards, emerging data security risks, and changing user patterns and preferences. We also continue to invest in our manufacturing and operational infrastructure to accelerate new products to market and accommodate planned business growth. We invest in business intelligence tools to enable better analysis of our business and to identify opportunities for growth. We will continue to build on these platforms to take advantage of the rapid development of technology around the globe to support a more robust Member and customer experience. In addition, we leverage an Oracle business suite platform to support our business operations, improve productivity and support our strategic initiatives. Our investment in technology infrastructure helps support our capacity to grow. In 2021, we also initiated a global transformation program to optimize global processes for future growth, or the Transformation Program. The Transformation Program involves the investment in certain new technologies and the realignment of infrastructure and the locations of certain functions to better support distributors and customers. The Transformation Program is still ongoing and expected to be completed in 2024 as described further in Part II, Item 7, Management’s Discussion and Analysis of Financial Condition and Operating Results, of this Annual Report on Form 10-K and Note 14, Transformation Program, to the Consolidated Financial Statements included in Part IV, Item 15, Exhibits, Financial Statement Schedules, of this Annual Report on Form 10-K. In addition, many Members rely on the use of technology to support their goals and businesses. As part of our continued investment in technology to further support our Members and drive long-term growth, we have enhanced our product access and distribution network to support higher volumes of online or mobile orders, allowing Members and their customers to select home or business delivery options. We have also implemented information technology systems to support Members and their increasing demand to be more connected to Herbalife Nutrition, their business, and their consumers with tools such as HN MyClub, Engage, HNconnect, BizWorks, MyHerbalife, GoHerbalife, and Herbalife.com. Additionally, we continue to support a growing suite of point-of-sale tools to assist our Members with ordering, tracking, and customer relationship management. These tools allow our Members to manage their business and communicate with their customers more efficiently and effectively. During 2022, we also commenced a Digital Technology Program to develop a new enhanced platform to provide enhanced digital capabilities and experiences to our Members. This is a multi-year program and we expect our capital expenditures to increase in 2023 and future years as result of our investments in this Digital Technology Program as described further in Part II, Item 7, Management’s Discussion and Analysis of Financial Condition and Operating Results, of this Annual Report on Form 10-K. Intellectual Property and Branding Marketing foods and supplement products on the basis of sound science means using ingredients in the composition and quantity as demonstrated to be effective in the relevant scientific literature. Use of these ingredients for their well-established purposes is by definition not novel, and for that reason, most food uses of these ingredients are not subject to patent protection. Notwithstanding the absence of patent protection, we do own proprietary formulations for substantially all of our weight management products and dietary and nutritional supplements. We take care in protecting the intellectual property rights of our proprietary formulas by restricting access to our formulas within the Company to those persons or departments that require access to them to perform their functions, and by requiring our finished goods suppliers and consultants to execute supply and non-disclosure agreements that contractually protect our intellectual property rights. Disclosure of these formulas, in redacted form, is also necessary to obtain product registrations in many countries. We also make efforts to protect certain unique formulations under patent law. We strive to protect all new product developments as the confidential trade secrets of the Company. We use the umbrella trademarks Herbalife®, Herbalife Nutrition®, and the Tri-Leaf design worldwide, and protect several other trademarks and trade names related to our products and operations, such as Niteworks® and Liftoff®. Our trademark registrations are issued through the United States Patent and Trademark Office, or USPTO, and comparable agencies in the foreign countries. We believe our trademarks and trade names contribute to our brand awareness. To increase our brand awareness, we and our Members use a variety of tools and marketing channels. These can include anything from traditional media to social media and alliances with partners who can promote our goal of better living through nutrition. Herbalife Nutrition sponsorships of and partnerships with featured athletes, teams, and events promote brand awareness and the use of Herbalife Nutrition products. We continue to build brand awareness with a goal towards becoming the most trusted brand in nutrition. We also work to leverage the power of our Member base as a marketing and brand-building tool. We maintain a brand style guide and brand asset library so that our Members have access to the Herbalife Nutrition brand logo and marketing materials for use in their marketing efforts. 12 Sustainability Our goals and objectives to nourish people and communities and to improve the planet are part of both our day-to-day activities and our long-term growth strategy. As a signatory of the United Nations Global Compact, or UNGC, we have aligned our sustainability initiatives outlined by the United Nations’ Sustainable Development Goals. Our current sustainability initiatives focus on issues including climate and emissions, packaging, and operational waste. For example, we have implemented projects that have reduced overall packaging materials and incorporated usage of recycled materials in the packaging of our flagship product, Formula 1 Healthy Meal Nutritional Shake in North America, Mexico, and in certain markets where permitted by regulations. We are seeking opportunities across operations to reduce waste-prone materials such as single-use plastics. More information on these efforts is provided in the Manufacturing section above. For information relating to our culture, diversity, equity, and inclusion, please see the Human Capital section below. REGULATION General In our United States and foreign markets, we are affected by extensive laws, governmental regulations, administrative determinations and guidance, court decisions and similar constraints that regulate the conduct of our business. Such laws, regulations and other constraints exist at the federal, state or local levels in the United States and at all levels of government in foreign jurisdictions, and include regulations pertaining to: (1) the formulation, manufacturing, packaging, labeling, distribution, importation, sale, and storage of our products; (2) product claims and advertising, including direct claims and advertising by us, as well as claims and advertising by Members, for which we may be held responsible; (3) our network marketing program; (4) transfer pricing and similar regulations that affect the level of U.S. and foreign taxable income and customs duties; (5) taxation of our Members (which in some instances may impose an obligation on us to collect the taxes and maintain appropriate records); (6) our international operations, such as import/export, currency exchange, repatriation and anti-bribery regulations; (7) antitrust issues; and (8) privacy and data protection. See Part I, Item 1A, Risk Factors, of this Annual Report on Form 10-K for additional information. Products In the United States, the formulation, manufacturing, packaging, holding, labeling, promotion, advertising, distribution, and sale of our products are subject to regulation by various federal governmental agencies, including: (1) the FDA; (2) the FTC; (3) the Consumer Product Safety Commission, or CPSC; (4) the United States Department of Agriculture, or USDA; (5) the Environmental Protection Agency, or EPA; (6) the United States Postal Service; (7) United States Customs and Border Protection; and (8) the Drug Enforcement Administration. Our activities also are regulated by various agencies of the states, localities and foreign countries in which our products are manufactured, distributed, or sold. The FDA, in particular, regulates the formulation, manufacture, and labeling of over-the-counter, or OTC, drugs, conventional foods, dietary supplements, and cosmetics such as those distributed by us. The majority of the products marketed by us in the United States are classified as conventional foods or dietary supplements under the Federal Food, Drug and Cosmetic Act, or FFDCA. Internationally, the majority of products marketed by us are classified as foods, health supplements, or food supplements. FDA regulations govern the preparation, packaging, labeling, holding, and distribution of foods, OTC drugs, cosmetics, and dietary supplements. Among other obligations, they require us and our contract manufacturers to meet relevant CGMP regulations for the preparation, packaging, holding, and distribution of OTC drugs and dietary supplements. The FDA also requires identity testing of all incoming dietary ingredients used in dietary supplements, unless a company successfully petitions for an exemption from this testing requirement in accordance with the regulations. The CGMPs are designed to ensure that OTC drugs and dietary supplements are not adulterated with contaminants or impurities, and are labeled to accurately reflect the active ingredients and other ingredients in the products. We have implemented a comprehensive quality assurance program that is designed to maintain compliance with the CGMPs for products manufactured by us or on our behalf for distribution in the United States. As part of this program, we have regularly implemented enhancements, modifications and improvements to our manufacturing and corporate quality processes. We believe that we and our contract manufacturers are compliant with the FDA’s CGMPs and other applicable manufacturing regulations in the United States. The U.S. Dietary Supplement Health and Education Act of 1994, or DSHEA, revised the provisions of FFDCA concerning the composition and labeling of dietary supplements. Under DSHEA, dietary supplement labeling may display structure/function claims that the manufacturer can substantiate, which are claims that the products affect the structure or function of the body, without prior FDA approval, but with notification to the FDA. They may not bear any claim that they can prevent, treat, cure, mitigate or diagnose disease (a drug claim). Apart from DSHEA, the agency permits companies to use FDA-approved full and qualified health claims for food and supplement products containing specific ingredients that meet stated requirements. 13 U.S. law also requires that all serious adverse events occurring within the United States involving dietary supplements or OTC drugs be reported to the FDA. We believe that we are in compliance with this law having implemented a worldwide procedure governing adverse event identification, investigation and reporting. As a result of reported adverse events, we may from time to time elect, or be required, to remove a product from a market, either temporarily or permanently. Some of the products marketed by us are considered conventional foods and are currently labeled as such. Within the United States, this category of products is subject to the federal Nutrition, Labeling and Education Act, or NLEA, and regulations promulgated under the NLEA. The NLEA regulates health claims, ingredient labeling and nutrient content claims characterizing the level of a nutrient in the product. The ingredients in conventional foods must either be generally recognized as safe by experts for the purposes to which they are put in foods, or be approved as food additives under FDA regulations. The federal Food Safety Modernization Act, or FSMA, is also applicable to some of our business. We follow a food safety plan and have implemented preventive measures required by the FSMA. Foreign suppliers of our raw materials are also subject to FSMA requirements, and we have implemented a verification program to comply with the FSMA. Dietary supplements manufactured in accordance with CGMPs and foods manufactured in accordance with the low acid food regulations are exempt. In foreign markets, prior to commencing operations and prior to making or permitting sales of our products in the market, we may be required to obtain an approval, license or certification from the relevant country’s ministry of health or comparable agency. Prior to entering a new market in which a formal approval, license or certificate is required, we work with local authorities in order to obtain the requisite approvals. The approval process generally requires us to present each product and product ingredient to appropriate regulators and, in some instances, arrange for testing of products by local technicians for ingredient analysis. The approvals may be conditioned on reformulation of our products, or may be unavailable with respect to some products or some ingredients. The FTC, which exercises jurisdiction over the advertising of all of our products in the United States, has in the past several years instituted enforcement actions against several dietary supplement and food companies and against manufacturers of weight loss products generally for false and misleading advertising of some of their products. In addition, the FTC has increased its scrutiny of the use of testimonials, which we also utilize, as well as the role of expert endorsers and product clinical studies. We cannot be sure that the FTC, or comparable foreign agencies, will not question our advertising or other operations in the future. In Europe, where an EU Health Claim regulation is in effect, the European Food Safety Authority, or EFSA, issued opinions following its review of a number of proposed claims documents. ESFA’s opinions, which have been accepted by the European Commission, have limited the use of certain nutrition-specific claims made for foods and food supplements. Accordingly, we revised affected product labels to ensure regulatory compliance. We are subject to a permanent injunction issued in October 1986 pursuant to the settlement of an action instituted by the California Attorney General, the State Health Director and the Santa Cruz County District Attorney. We consented to the entry of this injunction without in any way admitting the allegations of the complaint. The injunction prevents us from making specified claims in advertising of our products, but does not prevent us from continuing to make specified claims concerning our products, provided that we have a reasonable basis for making the claims. The injunction also prohibits certain recruiting-related investments from Members and mandates that payments to Members be premised on retail value (as defined); the injunction provides that we may establish a system to verify or document such compliance. Network Marketing Program Our network marketing program is subject to a number of federal and state regulations administered by the FTC and various state regulators as well as regulations in foreign markets administered by foreign regulators. Regulations applicable to network marketing organizations generally are directed at ensuring that product sales ultimately are made to consumers and that advancement within the organization is based on sales of the organization’s products rather than investments in the organization or other non-retail sales related criteria. When required by law, we obtain regulatory approval of our network marketing program or, when this approval is not required, the favorable opinion of local counsel as to regulatory compliance. 14 On July 15, 2016, we reached a settlement with the FTC and entered into a proposed Stipulation to Entry of Order for Permanent Injunction and Monetary Judgment, or the Consent Order, which resolved the FTC’s multi-year investigation of us. The Consent Order became effective on July 25, 2016, or the Effective Date, upon final approval by the U.S. District Court for the Central District of California. Pursuant to the Consent Order, we implemented and continue to enhance certain procedures in the U.S. and agreed to be subject to certain audits by an independent compliance auditor (Affiliated Monitors, Inc.) for a period of seven years. Among other requirements, the Consent Order requires us to categorize all existing and future Members in the U.S. as either “preferred members” – who are simply consumers who only wish to purchase product for their own household use — or “distributors” – who are Members who wish to resell some products or build a sales organization. We also agreed to compensate distributors on U.S. eligible sales within their downline organizations, which include purchases by preferred members, purchases by a distributor for his or her personal consumption within allowable limits and sales of product by a distributor to his or her customers. The Consent Order also requires distributors to meet certain conditions before opening Nutrition Clubs and/or entering into leases for their Herbalife Nutrition business in the United States. The Consent Order also prohibits us from making expressly or by implication, any misrepresentation regarding certain lifestyles or amount or level of income, including full-time or part-time income that a participant can reasonably expect to earn in our network marketing program. The Consent Order also prohibits us and other persons who act in active concert with us from misrepresenting that participation in the network marketing program will result in a lavish lifestyle and from using images or descriptions to represent or imply that participation in the program is likely to result in a lavish lifestyle. In addition, the Consent Order prohibits specified misrepresentations in connection with marketing the program, including misrepresentations regarding any fact material to participation such as the cost to participate or the amount of income likely to be earned. The Consent Order also requires us to clearly and conspicuously disclose information related to our refund and buyback policy on certain company materials and websites. The terms of the Consent Order do not change our going to market through direct selling by independent distributors, and compensating those distributors based upon the product they and their sales organization sell. We have implemented new and enhanced procedures required by the terms of the Consent Order and will continue to do so. We continue to monitor the impact of the Consent Order and our board of directors originally established the Implementation Oversight Committee in connection with monitoring compliance with the Consent Order, and more recently, our Audit Committee assumed oversight of continued compliance with the Consent Order. While we currently do not expect the Consent Order to have a long-term and material adverse impact on our business and our Member base, our business and our Member base, particularly in the U.S., have been in the past, and may in the future, be negatively impacted as we and they adjust to the changes. However, the terms of the Consent Order and the ongoing costs of compliance may adversely affect our business operations, our results of operations, and our financial condition. See Part I, Item 1A, Risk Factors, of this Annual Report on Form 10-K for a discussion of risks related to the settlement with the FTC. On January 4, 2018, the FTC released its nonbinding Business Guidance Concerning Multi-Level Marketing, or MLM Guidance. The MLM Guidance explains, among other things, lawful and unlawful compensation structures, the treatment of personal consumption by participants in determining if an MLM’s compensation structure is unfair or deceptive, and how an MLM should approach representations to current and prospective participants. We believe our current business practices, which include new and enhanced procedures implemented in connection with the Consent Order, are in compliance with the MLM Guidance. Additionally, the FTC has promulgated nonbinding Guides Concerning the Use of Endorsements and Testimonials in Advertising, or Guides, which explain how the FTC interprets Section 5 of the FTC Act’s prohibition on unfair or deceptive acts or practices. Consequently, the FTC could bring a Section 5 enforcement action based on practices that are inconsistent with the Guides. Under the Guides, advertisements that feature a consumer and convey his or her atypical experience with a product or service are required to clearly disclose the typical results that consumers can generally expect. The revised Guides also require advertisers to disclose connections between the advertiser and any endorsers that consumers might not expect, known as “material connections.” We have adapted our practices and rules regarding the practices of our Members to comply with the Guides and to comply with the Consent Order. We also are subject to the risk of private party challenges to the legality of our network marketing program both in the United States and internationally. For example, in Webster v. Omnitrition International, Inc., 79 F.3d 776 (9th Cir. 1996), the network marketing program of Omnitrition International, Inc., or Omnitrition, was challenged in a class action by Omnitrition distributors who alleged that it was operating an illegal “pyramid scheme” in violation of federal and state laws. We believe that our network marketing program satisfies federal and other applicable state statutes and case law. In some countries, regulations applicable to the activities of our Members also may affect our business because in some countries we are, or regulators may assert that we are, responsible for our Members’ conduct. In these countries, regulators may request or require that we take steps to ensure that our Members comply with local regulations. The types of regulated conduct include: (1) representations concerning our products; (2) income representations made by us and/or Members; (3) public media advertisements, which in foreign markets may require prior approval by regulators; (4) sales of products in markets in which the products have not been approved, licensed or certified for sale; and (5) classification by government agencies of our Members as employees of the Company. 15 In some markets, it is possible that improper product claims by Members could result in our products being reviewed by regulatory authorities and, as a result, being classified or placed into another category as to which stricter regulations are applicable. In addition, we might be required to make labeling changes. We also are subject to regulations in various foreign markets pertaining to social security assessments and employment and severance pay requirements. As an example, in some markets, we are substantially restricted in the amount and types of rules and termination criteria that we can impose on Members without having to pay social security assessments on behalf of the Members and without incurring severance obligations to terminated Members. In some countries, we may be subject to these obligations in any event. It is an ongoing part of our business to monitor and respond to regulatory and legal developments, including those that may affect our network marketing program. However, the regulatory requirements concerning network marketing programs do not include bright line rules and are inherently fact-based. An adverse judicial or regulatory determination with respect to our network marketing program could have a material adverse effect on our business, financial condition, and operating results and may also result in negative publicity, requirements to modify our network marketing program, or a negative impact on Member morale. In addition, adverse rulings by courts in any proceedings challenging the legality of network marketing systems, even in those not involving us directly, could have a material adverse effect on our operations. Although questions regarding the legality of our network marketing program have come up in the past and may come up from time to time in the future, we believe, based in part upon guidance to the general public from the FTC, that our network marketing program is compliant with applicable law. Income Tax, Transfer Pricing, and Other Taxes In many countries, including the United States, we are subject to income tax, transfer pricing and other tax regulations designed to ensure that appropriate levels of income are reported as earned by our U.S. and local entities and are taxed accordingly. In addition, our operations are subject to regulations designed to ensure that appropriate levels of customs duties are assessed on the importation of our products. Although we believe that we are in substantial compliance with all applicable tax rules, regulations, and restrictions, we are subject to the risk that governmental authorities could assert that additional taxes are owed based on findings of their audit. For example, we are currently subject to pending or proposed audits that are at various levels of review, assessment or appeal in a number of jurisdictions involving transfer pricing issues, income taxes, duties, value added taxes, withholding taxes and related interest and penalties in material amounts. In some circumstances, additional taxes, interest and penalties have been assessed, and we will be required to appeal or litigate to reverse the assessments. We have taken advice from our tax advisors and believe that there are substantial defenses to the allegations that additional taxes are owed, and we are vigorously defending against the imposition of additional proposed taxes. The ultimate resolution of these matters may take several years, and the outcome is uncertain. In the event that the audits or assessments are concluded adversely, we may or may not be able to offset or mitigate the consolidated effect of foreign income tax assessments through the use of U.S. foreign tax credits. The laws and regulations governing U.S. foreign tax credits are complex and subject to periodic legislative amendment, and there are restrictions on the utilization of U.S. foreign tax credits. Therefore, we cannot be sure that we would in fact be able to take advantage of any foreign tax credits in the future. Compliance Procedures As indicated above, Herbalife Nutrition, our products and our network marketing program are subject, both directly and indirectly through Members’ conduct, to numerous federal, state and local regulations, in the United States and foreign markets. In 1985, we began to institute formal compliance measures by developing a system to identify specific complaints against Members and to remedy any violations of Herbalife Nutrition’s rules by Members through appropriate sanctions, including warnings, fines, suspensions and, when necessary, terminations. We prohibit Members from making therapeutic claims for our products or misrepresentations regarding participating in our network marketing program, including in our manuals, seminars, and other training programs and materials. Our general policy is to reject Member applications from individuals who do not reside in one of our approved markets. 16 In order to comply with regulations that apply to both us and our Members, we research the applicable regulatory framework prior to entering any new market to identify necessary licenses and approvals and applicable limitations relating to our operations in that market and then work to bring our operations into compliance with the applicable limitations and to maintain such licenses. Typically, we conduct this research with the assistance of local legal counsel and other representatives. We also research laws applicable to Member operations and revise or alter our Member applications, rules, and other training materials and programs to provide Members with guidelines for operating their independent business, marketing and distributing our products and similar matters, as required by applicable regulations in each market. While we have rules and guidelines for our Members and monitor their market conduct, we are, however, unable to ensure that our Members will not distribute our products in countries where we have not commenced operations. In addition, regulations in existing and new markets often are ambiguous and subject to considerable interpretive and enforcement discretion by the responsible regulators. Moreover, even when we believe that we and our Members are in compliance with all applicable regulations, new regulations are being added regularly and the interpretation of existing regulations is subject to change. Further, the content and impact of regulations to which we are subject may be influenced by public attention directed at us, our products, or our network marketing program, so that extensive adverse publicity about us, our products, or our network marketing program may increase the likelihood regulatory scrutiny or action. HUMAN CAPITAL At Herbalife Nutrition, our commitment to improving lives and our communities is at the core of everything we do. This commitment also informs how we value and treat our employees. We seek to provide a work environment where employees can grow and thrive while supporting our Members and their customers. We believe attracting, developing, and retaining a talented and diverse workforce are critical factors that contribute to the success and growth of our business. We have operations globally, requiring investment to assess local labor market conditions and recruit and retain the appropriate workforce. Having a business presence in multiple domestic and international markets also requires us to monitor local labor and employment laws for which we often engage third-party advisors. We monitor the talent needs of our departments and functions with particular focus on the areas where human capital resources are important to daily operations to ensure we can timely manufacture, distribute, and sell products to our Members. As of December 31, 2022, we had approximately 10,100 employees, of which approximately 2,800 were located in the United States. Diversity, Equity, and Inclusion We believe diversity is a strength and embrace a core vision that a diverse, equitable, and inclusive culture is imperative to enable us to better serve our Members, stakeholders, and communities. As such, we seek to promote a work environment where all people can thrive, and are committed to diversity, equity, and inclusion, or DEI, at all levels, from our employees, management and executive leadership to our board of directors. Our DEI strategy is currently focused on creating opportunities to further recruit and support diverse talent at all levels, encouraging inclusion and belonging, and embedding equity throughout our culture and operations. Current initiatives include the implementation of a global applicant tracking system to deepen our commitment to fair recruitment processes, offering unconscious bias trainings for all employees, the expansion of existing employee networks which help employees build community and foster a culture of belonging, and further development and involvement of Global and Regional DEI Councils to drive DEI progress. Additionally, we have set diversity goals and targets for women in leadership roles globally and for racial and ethnic minorities in leadership roles in the U.S. Talent Acquisition and Development We seek to attract and retain a talented and diverse workforce. To foster an inclusive hiring process in the U.S., we use a tool that helps ensure that job descriptions do not unintentionally exclude potential applicants. Investment in our employees' professional growth and development is important and helps establish a strong foundation for long- term success. At our Company, we strive to create a learning culture, one in which development is an ongoing focus for all employees and managers. We invest in our employees’ development through a variety of programs. These programs are designed to help our employees grow professionally and strengthen their skills throughout their careers. Examples of these programs include the following: • Training Programs – We provide our employees access to an internal learning management system, Herbalife Nutrition University, which provides professional development courses, technical training, and compliance training to all employees globally. 17 • Mentorship Programs – The principle of servant leadership is a crucial part of our culture. We believe that one way to be a servant leader is to mentor others, and, in 2020, we introduced a new mentorship program to help guide junior employees in their professional journey. Through this program, participating employees can be provided with a one-on-one professional development opportunity, in which they receive dedicated coaching, feedback, and encouragement. • Educational Assistance – Another way we support employees’ continual professional development is by offsetting a portion of the cost of higher education. Program offerings and eligibility vary by region, but may include partial reimbursement of tuition fees incurred for undergraduate and graduate degrees, certificate programs, or skills-based courses. Compensation and Benefits Our Board of Directors and its Compensation Committee establish our general compensation philosophy and oversee and approve the development, adoption, and implementation of compensation policies and programs, which are set at a global level, but also adapted to meet local country requirements as needed. We provide base pay that aligns with employee positions, skill levels, experience, contributions, and geographic location. In addition to base pay, we seek to reward employees with annual incentive awards, recognition programs, and equity awards for employees at certain job grades. Our benefit programs are designed to enhance employee well-being and assist employees in the event of illness, injury, or disability. To this end, we offer benefits that vary worldwide, but may include health insurance, retirement savings programs, and wellness incentives designed to promote a healthy and active lifestyle. We believe we offer our employees wages and benefits packages that are in line with respective local labor markets and laws. Safety, Health, and Well-Being As a nutrition company, we believe the safety, health, and well-being of our employees is of the utmost importance. We endeavor to promote these principles by providing a safe and healthy work environment and encouraging healthy, active lifestyles. Our efforts to provide a safe workplace are guided by various formal policies and programs, which are designed to protect employees, contractors, and visitors from accidents, illnesses, and injuries, while operating in compliance with applicable regulations, including OSHA guidelines in the U.S. We also follow policies and programs regarding material health and safety risks, workplace violence prevention, and incident response and management. In the U.S., our manufacturing facilities in Winston-Salem and Lake Forest are ISO 45001 certified, an international standard for occupational health and safety management. While the COVID-19 pandemic has increased the resources required to keep our employees safe and healthy, we continue to make what we believe are the necessary investments to achieve this goal. In response to, and during various phases of, the pandemic, we have taken several actions, including supporting our employees to work from home when possible, offering mental and emotional wellness resources, and implementing safety measures when necessary at our facilities. Over the course of the pandemic, our senior management team has relied on cross-functional teams to monitor, review, and assess the evolving situation. These cross-functional teams are responsible for recommending risk mitigation actions based on the local risks and in accordance with regulatory requirements and guidelines for the health and safety of our employees and, in the U.S., protocols to align with all federal, state, and local public health guidelines. We believe our proactive efforts have been successful in supporting our business growth despite the obstacles and challenges presented by COVID-19. In addition, we believe in the importance of well-being and provide resources for our employees that support their pursuit of a healthy and active lifestyle. Our flagship wellness program in the U.S., “Wellness for Life,” offers employees a suite of activities to achieve overall wellness through improved fitness, nutrition, intellectual well-being, and financial literacy. The variety of activities offered ensures all employees may participate, no matter where they may be in their wellness journey. While we have many existing regional wellness programs, a new and enhanced global wellness program will launch in January 2023 and feature Herbalife fitness, health and nutrition experts from around the globe. We also have facilities and programs in place that allow employees to incorporate fitness into their daily schedule, such as onsite gyms at several facilities and live virtual classes. Our Members We are dependent on our Members to sell and promote our products to their customers. We frequently interact and work directly with our sales leaders to explore ways to support our and our Members’ businesses, and their customers’ personal goals of living a healthier and more active lifestyle. See the Our Network Marketing Program – Member Compensation and Sales Leader Retention and Requalification section above for sales leader and requalification metrics and further discussion on our sales leaders. 18 Available Information Our Internet website address is www.herbalife.com and our investor relations website is ir.herbalife.com. We make available free of charge on our website our Annual Reports on Form 10-K, Quarterly Reports on Form 10-Q, Current Reports on Form 8-K, proxy statements, and amendments to those reports filed or furnished pursuant to Section 13(a) or 15(d) of the Securities Exchange Act of 1934, as amended, or the Exchange Act, as soon as reasonably practical after we file such material with, or furnish it to, the Securities and Exchange Commission, or SEC. The SEC maintains an Internet website that contains reports, proxy and information statements, and other information regarding issuers that file electronically with the SEC at www.sec.gov. We also make available free of charge on our investor relations website at ir.herbalife.com our Principles of Corporate Governance, our Code of Conduct, and the Charters of our Audit Committee, Nominating and Corporate Governance Committee, Compensation Committee, and ESG Committee of our board of directors. Unless expressly noted, the information on our website, including our investor relations website, or any other website is not incorporated by reference in this Annual Report on Form 10-K and should not be considered part of this Annual Report on Form 10-K or any other filing we make with the SEC. Item 1A. Risk Factors Please carefully consider the following discussion of significant factors, events, and uncertainties that make an investment decision regarding our securities risky. The factors, events, uncertainties, and consequences discussed in these risk factors could, in circumstances we may not be able to accurately predict, recognize, or control, have a material adverse effect on our business, reputation, prospects, financial condition, operating results, cash flows, liquidity, and share price. These risk factors do not identify all risks that we face. We could also be affected by factors, events, or uncertainties that are not presently known to us or that we currently do not consider to present material risks. Additionally, the COVID-19 pandemic has amplified many of the other risks discussed below to which we are subject. We are unable to predict the duration and extent to which the pandemic and its related impacts will adversely impact our business, financial condition, and operating results as well as our share price. In addition, given the unpredictable, unprecedented, and fluid nature of the pandemic, it may also materially and adversely affect our business, financial condition, and operating results in ways that are not currently anticipated by or known to us or that we currently do not consider to present material risks. Risk Factor Summary This risk factor summary contains a high-level summary of certain of the principal factors, events and uncertainties that make an investment in our securities risky, including risks related to our business and industry, risks related to regulatory and legal matters, risks related to our international operations, risks related to our indebtedness and risks related to our common shares. The following summary is not complete and should be read together with the more detailed discussion of these and the other factors, events, and uncertainties set forth below before making an investment decision regarding our securities. The principal factors, events, and uncertainties that make an investment in our securities risky include the following: Risks Related to Our Business and Industry • Our failure to establish and maintain Member and sales leader relationships could negatively impact sales of our products and materially harm our business, financial condition, and operating results. • Because we cannot exert the same level of influence or control over our Members as we could if they were our employees, our Members could fail to comply with applicable law or our rules and procedures, which could result in claims against us that could materially harm our business, financial condition, and operating results. • Adverse publicity associated with our Company or the direct-selling industry could materially harm our business, financial condition, and operating results. • Our failure to compete successfully could materially harm our business, financial condition, and operating results. • Our contractual obligation to sell our products only through our Member network and to refrain from changing certain aspects of our Marketing Plan may limit our growth. • Our failure to appropriately respond to changing consumer trends, preferences, and demand for new products and product enhancements could materially harm our Member relationships, our Members’ customer relationships, and product sales or otherwise materially harm our business, financial condition, and operating results. • If we fail to further penetrate existing markets, the growth in sales of our products, along with our operating results could be negatively impacted. 19 • Since one of our products constitutes a significant portion of our net sales, significant decreases in consumer demand for this product or our failure to produce a suitable replacement, could materially harm our business, financial condition, and operating results. • Our business could be materially and adversely affected by natural disasters, other catastrophic events, acts of war or terrorism, cybersecurity incidents, pandemics, and/or other acts by third parties. • We depend on the integrity and reliability of our information technology infrastructure, and any related interruptions or inadequacies may have a material adverse effect on our business, financial condition, and operating results. • Disruption of supply, shortage, or increases in the cost of ingredients, packaging materials, and other raw materials as well as climate change could materially harm our business, financial condition, and operating results. • If any of our manufacturing facilities or third-party manufacturers fail to reliably supply products to us at required levels of quality or fail to comply with applicable laws, our financial condition and operating results could be materially and adversely impacted. • If we lose the services of members of our senior management team, our business, financial condition, and operating results could be materially harmed. • Our share price may be adversely affected by third parties who raise allegations about our Company. • ESG matters, including those related to climate change and sustainability, may have an adverse effect on our business, financial condition, and operating results and may damage our reputation. Risks Related to Regulatory and Legal Matters • Our products are affected by extensive regulations, and our failure or our Members’ failure to comply with any regulations could lead to significant penalties or claims, which could materially harm our financial condition and operating results. • Our network marketing program is subject to extensive regulation and scrutiny and any failure to comply, or alteration to our compensation practices in order to comply, with these regulations could materially harm our business, financial condition, and operating results. • We are subject to the Consent Order with the FTC, the effects of which, or any failure to comply therewith, could materially harm our business, financial condition, and operating results. • Our actual or perceived failure to comply with privacy and data protection laws, rules, and regulations could materially harm our business, financial condition, and operating results. • We are subject to material product liability risks, which could increase our costs and materially harm our business, financial condition, and operating results. • If we fail to protect our intellectual property, our ability to compete could be negatively affected, which could materially harm our financial condition and operating results. • If we infringe the intellectual property rights of others, our business, financial condition, and operating results could be materially harmed. • We may be held responsible for additional compensation, certain taxes, or assessments relating to the activities of our Members, which could materially harm our financial condition and operating results. Risks Related to Our International Operations • A substantial portion of our business is conducted in foreign jurisdictions, exposing us to the risks associated with international operations. • We are subject to the anti-bribery laws, rules, and regulations of the United States and the other foreign jurisdictions in which we operate. • If we do not comply with transfer pricing, customs duties VAT, and similar regulations, we may be subject to additional taxes, customs duties, interest, and penalties in material amounts, which could materially harm our financial condition and operating results. • Our business in China is subject to general, as well as industry-specific, economic, political, and legal developments and risks and requires that we utilize a modified version of the business model we use elsewhere in the world. • The United Kingdom’s exit from the European Union could adversely impact us. 20 Risks Related to Our Indebtedness • The terms and covenants in our existing indebtedness could limit our discretion with respect to certain business matters, which could harm our business, financial condition, and operating results. • The conversion or maturity of our convertible notes may adversely affect our financial condition and operating results, and their conversion into common shares could have a dilutive effect that could cause our share price to go down. Risks Related to Our Common Shares • Holders of our common shares may difficulties in protecting their interests because we are incorporated under Cayman Islands law. • Provisions of our articles of association and Cayman Islands law may impede a takeover or make it more difficult for shareholders to change the direction or management of the Company, which could reduce shareholders’ opportunity to influence management of the Company. • There is uncertainty as to shareholders’ ability to enforce certain foreign civil liabilities in the Cayman Islands. • U.S. Tax Reform may adversely impact certain U.S. shareholders of the Company. Risks Related to Our Business and Industry Our failure to establish and maintain Member and sales leader relationships could negatively impact sales of our products and materially harm our business, financial condition, and operating results. We distribute our products exclusively to and through our independent Members, and we depend on them directly for substantially all of our sales. To increase our revenue, we must increase the number and productivity of our Members. Accordingly, our success depends in significant part on our relationships with our sales leaders and our ability to recruit, retain, and motivate a large base of Members, including through an attractive compensation plan, the quality of our reputation, the maintenance of an attractive product portfolio, the breadth and quality of our Member services, and other incentives. The loss of a significant number of Members, changes to our network marketing program, our inability to respond to Member demand or generate sufficient interest in our business opportunities, products, or services, decreases in Member engagement, loss of Member or consumer confidence, or any legal or regulatory impact to our Members’ ability to conduct their business could negatively impact sales of our products and our ability to attract and retain Members, each of which could have a material adverse effect on our business, financial condition, and operating results. In our efforts to attract and retain Members, we compete with other direct-selling organizations. In addition, our Member organization has a high turnover rate, which is common in the direct-selling industry, in part because our Members, including our sales leaders, may easily enter and exit our network marketing program without facing a significant investment or loss of capital. For example, the upfront financial cost to become a Member is low, we do not have time or exclusivity requirements, we do not charge for any required training, and, in substantially all jurisdictions, we maintain a buyback program. We believe the COVID-19 pandemic could have an adverse impact on the pipeline of new Members and our Member turnover rate, and may impact our future net sales. See the COVID-19 Pandemic and Sales by Geographic Region sections in Part II, Item 7, Management’s Discussion and Analysis of Financial Condition and Results of Operations, of this Annual Report on Form 10-K for further discussion of the impacts of the COVID-19 pandemic on our business and results of operations. For additional information regarding sales leader retention rates, see Part I, Item 1, Business, of this Annual Report on Form 10-K. Because we cannot exert the same level of influence or control over our Members as we could if they were our employees, our Members could fail to comply with applicable law or our rules and procedures, which could result in claims against us that could materially harm our business, financial condition, and operating results. Our Members are independent contractors and, accordingly, we are not in a position to provide the same direction, motivation, and oversight as we could if Members were our employees. As a result, there can be no assurance that our Members will participate in our marketing strategies or plans, accept our introduction of new products, or comply with applicable legal requirements or our rules and procedures. 21 We are subject to extensive federal, state, local, and foreign laws, rules, and regulations that regulate our business, products, direct sales channel, and network marketing program. See the Regulation section of Part I, Item 1, Business, of this Annual Report on Form 10- K for additional information. While we have implemented policies and procedures designed to govern Member conduct and to protect the goodwill associated with Herbalife Nutrition, it can be difficult to enforce these policies and procedures because of our large number of Members and their status as independent contractors and because our policies and procedures differ by jurisdiction as a result of varying local legal requirements. In addition, although we train our Members and attempt to monitor our Members’ marketing materials, we cannot ensure that our Members will comply with applicable legal requirements or our policies and procedures or that such marketing materials or other Member practices comply with applicable laws, rules, and regulations. It is possible that a court could hold us liable for the actions of our Members, which could materially harm our business, financial condition, and operating results. Adverse publicity associated with our Company or the direct-selling industry could materially harm our business, financial condition, and operating results. Our reputation and the quality of our brand are critical to our business, and the size and success of our Member organization, our operating results, and our share price may be significantly affected by the public’s perception of Herbalife Nutrition and other direct- selling companies. This perception is dependent upon opinions concerning a number of factors, including: • the safety, quality, and efficacy of our products, as well as those of similar companies; • our Members; • our network marketing program or the attractiveness or viability of the financial opportunities it may provide; • the direct-selling business generally; • actual or purported failure by us or our Members to comply with applicable laws, rules, and regulations, including those regarding product claims and advertising, good manufacturing practices, the regulation of our network marketing program, the registration of our products for sale in our target markets, or other aspects of our business; • our commitment to ESG matters and our ESG practices; • the security of our information technology infrastructure; and • actual or alleged impropriety, misconduct, or fraudulent activity by any person formerly or currently associated with our Members or us. Adverse publicity concerning any of the foregoing whether or not accurate or resulting in investigation, enforcement, or other legal or regulatory actions or the imposition of fines, penalties, or other sanctions, could negatively impact our reputation, our ability to attract, motivate, and retain Members, and our ability to generate revenue. In addition, our Members’ and consumers’ perception of Herbalife Nutrition and our direct-selling business as well as similar companies can be significantly influenced by media attention, publicized scientific research or findings, product liability claims, and other publicity, whether or not it is legitimate. For example, as a result of the prevalence and marked increase in the use of blogs, social media platforms, and other forms of Internet-based communications, the opportunity for dissemination of information, both accurate and inaccurate, is seemingly limitless and readily available, and often does not provide any opportunity for correction or other redress. Adverse publicity that associates use of our products or any similar products with adverse effects, questions the quality or benefits of any such products, or claims that any such products are ineffective, inappropriately labeled, or have inaccurate instructions as to their use, could lead to lawsuits or other legal or regulatory challenges and could materially and adversely impact our reputation, the demand for our products, and our business, financial condition, and operating results. Adverse publicity relating to us has had, and could again have, a negative effect on our ability to attract, motivate, and retain Members, on consumer perception of Herbalife Nutrition, and on our share price. For example, the resulting adverse publicity from the 1986 permanent injunction entered in California caused a rapid, substantial loss of Members in the United States and a corresponding reduction in sales beginning in 1985. See also the risk factor titled “Our share price may be adversely affected by third parties who raise allegations about our Company.” We expect that adverse publicity will, from time to time, continue to negatively impact our business in particular markets and may adversely affect our share price. 22 Our failure to compete successfully could materially harm our business, financial condition, and operating results. The business of developing and marketing weight management and other nutrition and personal care products is highly competitive and sensitive to the introduction of new products and weight management plans, including various prescription drugs, which may rapidly capture a significant share of the market. Our competitors include numerous manufacturers; distributors; marketers; online, specialty, mass, and other retailers; and physicians that actively compete for the business of consumers both in the United States and abroad. Some of our competitors have longer operating histories, significantly greater resources, better-developed and more innovative sales and distribution channels and platforms, greater name recognition, and larger established customer bases than we do. Our present and future competitors may be able to offer products at lower prices or better withstand reductions in prices or other adverse economic or market conditions than we can; develop products that are comparable or superior to those we offer; adapt more quickly or effectively to new technologies, changing regulatory requirements, evolving industry trends and standards, and customer requirements than we can; and/or devote greater resources to the development, promotion, and sale of their products than we do. We are also subject to significant competition for the recruitment of Members from other direct-selling organizations, including those that market weight management products, dietary and nutritional supplements, personal care products, and other types of products, as well as those organizations in which former employees or Members are involved. In addition, because the industry in which we operate is not particularly capital intensive or otherwise subject to high barriers to entry, it is relatively easy for new competitors to emerge that will compete with us, including for our Members and their customers. Accordingly, competition may intensify and we may not be able to compete effectively in our markets. If we are not able to retain our Members and their customers or otherwise compete successfully, our business, financial condition, and operating results would be materially adversely affected. Our contractual obligation to sell our products only through our Member network and to refrain from changing certain aspects of our Marketing Plan may limit our growth. We are contractually prohibited from expanding our business by selling Herbalife Nutrition products through other distribution channels that may be available to our competitors, such as over the Internet, through wholesale sales, by establishing retail stores, or through mail order systems. To the extent legally permitted, an agreement we entered into with our Members provides assurances that we will not sell Herbalife Nutrition products worldwide through any distribution channel other than our network of Members. Since this is an open-ended commitment, there can be no assurance that we will be able to take advantage of innovative new distribution channels that are developed in the future or appropriately respond to consumer preferences as they continue to evolve. In addition, this agreement with our Members provides that we will not make any material changes adverse to our Members to certain aspects of our Marketing Plan that may negatively impact our Members without their approval as described in further detail below. For example, our agreement with our Members provides that we may increase, but not decrease, the discount percentages available to our Members for the purchase of products or the applicable royalty override percentages and production and other bonus percentages available to our Members at various qualification levels within our Member hierarchy. We may not modify the eligibility or qualification criteria for these discounts, royalty overrides, and production and other bonuses unless we do so in a manner to make eligibility and/or qualification easier than under the applicable criteria in effect as of the date of the agreement. Our agreement with our Members further provides that we may not vary the criteria for qualification for each Member tier within our Member hierarchy, unless we do so in such a way so as to make qualification easier. We reserved the right to make changes to our Marketing Plan without the consent of our Members in the event that changes are required by applicable law or are necessary in our reasonable business judgment to account for specific local market or currency conditions to achieve a reasonable profit on operations. In addition, we may initiate other changes that are adverse to our Members based on an assessment of what will be best for the Company and its Members. Under the agreement with our Members, these other adverse changes would then be submitted to our Member leadership for a vote. The vote would require the approval of at least 51% of our Members then at the level of President’s Team earning at the production bonus level of 6% who vote, provided that at least 50% of those Members entitled to vote do in fact vote. While we believe this agreement has strengthened our relationship with our existing Members, improved our ability to recruit new Members, and generally increased the long-term stability of our business, there can be no assurance that our agreement with our Members will not restrict our ability to adapt our Marketing Plan or our business to the evolving requirements of the markets in which we operate. As a result, our growth may be limited. 23 Our failure to appropriately respond to changing consumer trends, preferences, and demand for new products and product enhancements could materially harm our Member relationships, Members’ customer relationships, and product sales or otherwise materially harm our business, financial condition, and operating results. Our business is subject to rapidly changing consumer trends and preferences and product introductions, especially with respect to our nutrition products. Our continued success depends in part on our ability to anticipate and respond to these changes and introductions, and we may not respond or develop new products or product enhancements in a cost-effective, timely, or commercially appropriate manner, or at all, particularly while the COVID-19 pandemic persists. Current consumer trends and preferences have evolved and will continue to evolve as a result of, among other things, changes in consumer tastes; health, wellness, and nutrition considerations; competitive product and pricing pressures; changes in consumer preferences for certain sales channels; shifts in demographics; and concerns regarding the environmental and sustainability impact of the product manufacturing process. The success of our response to changing consumer trends and preferences and product introductions, including any new product offerings and enhancements, depends on a number of factors, including our ability to: • accurately anticipate consumer needs; • innovate and develop new products and product enhancements that meet these needs; • successfully commercialize new products and product enhancements; • price our products competitively; • manufacture and deliver our products in sufficient volumes, at our required levels of quality, and in a cost-effective and timely manner; and • differentiate our product offerings from those of our competitors and successfully respond to other competitive pressures, including technological advancements, evolving industry standards, and changing regulatory requirements. Our failure to accurately predict changes in consumer demand and technological advancements could negatively impact consumer opinion of our products or our business, which in turn could harm our Member relationships and the Members’ relationships with their customers, and cause a loss of sales. In addition, if we do not introduce new products or make enhancements to meet the changing needs of our Members and their customers in a cost-effective, timely, and commercially appropriate manner, or if our competitors release new products or product enhancements before we do, some of our product offerings could be rendered obsolete, which could cause our market share to decline and negatively impact our business, financial condition, and operating results. If we fail to further penetrate existing markets, the growth in sales of our products, along with our operating results, could be negatively impacted. The success of our business is to a large extent contingent on our ability to further penetrate existing markets, which is subject to numerous factors, many of which are out of our control. Our ability to increase market penetration may be limited by the finite number of persons in a given country inclined to pursue a direct-selling business opportunity or consumers aware of, or willing to purchase, Herbalife Nutrition products. Moreover, our growth in existing markets will depend upon increased brand awareness and improved training and other activities that enhance Member retention in our markets. While we have recently experienced significant growth in certain of our foreign markets, we cannot assure you that such growth levels will continue in the immediate or long-term future. Furthermore, our efforts to support growth in such foreign markets could be hampered to the extent that our infrastructure in such markets is deficient when compared to our infrastructure in our more developed markets, such as the United States. For example, there can be no assurances that we will be able to successfully manage expansion of manufacturing operations and a growing and dynamic sales force in China. If we are unable to effectively scale our supply chain and manufacturing infrastructure to support future growth in China or other foreign markets, our operations in such markets may be adversely impacted. Therefore, we cannot assure you that our general efforts to increase our market penetration and Member retention in existing markets will be successful. If we are unable to further penetrate existing markets, our business, financial condition, and operating results could materially suffer. Since one of our products constitutes a significant portion of our net sales, significant decreases in consumer demand for this product or our failure to produce a suitable replacement could materially harm our business, financial condition, and operating results. Our Formula 1 Healthy Meal, which is our best-selling product line, approximated 26% of our net sales for the year ended December 31, 2022. If consumer demand for this product decreases significantly or we cease offering this product without a suitable replacement, or if the replacement product fails to gain market acceptance, our business, financial condition, and operating results could be materially harmed. 24 Our business could be materially and adversely affected by natural disasters, other catastrophic events, acts of war or terrorism, cybersecurity incidents, pandemics, and/or other acts by third parties. We depend on the ability of our business to run smoothly, including the ability of Members to engage in their day-to-day selling and business building activities. In coordination with our suppliers, third-party manufacturers, and distributors, our ability to make and move our products reasonably unimpeded around the world is critical to our success. Any material disruption to our collective operations or supply, manufacturing, or distribution capabilities caused by unforeseen or catastrophic events, such as (i) natural disasters or severe weather conditions, including droughts, fires, floods, hurricanes, volcanic eruptions, and earthquakes; (ii) power loss or shortages; (iii) telecommunications or information technology infrastructure failures; (iv) acts or threats of war, terrorism, or other armed hostilities; (v) outbreaks of contagious diseases, epidemics, and pandemics; (vi) cybersecurity incidents, including intentional or inadvertent exposure of content perceived to be sensitive data; (vii) employee misconduct or error; and/or (viii) other actions by third parties and other similar disruptions, could materially adversely affect our ability to conduct business and our Members’ selling activities. For example, our operations in Central America were impacted in November 2020 when Hurricanes Eta and Iota made landfall in the region. The storms disrupted our supply chain transportation network and our ability to import product. In addition, our distribution center in Honduras experienced flooding, which damaged or destroyed product. Furthermore, our headquarters and one of our distribution facilities and manufacturing facilities are located in Southern California, an area susceptible to fires and earthquakes. Although the events in Central America did not have a material negative impact on our operations, we cannot make assurances that any future catastrophic events will not adversely affect our ability to operate our business or our financial condition and operating results. In addition, catastrophic events may result in significant cancellations or cessations of Member orders; contribute to a general decrease in local, regional, or global economic activity; directly impact our marketing, manufacturing, financial, or logistics functions; impair our ability to meet Member demands; harm our reputation; and expose us to significant liability, losses, and legal proceedings, any of which could materially and adversely affect our business, financial condition, and operating results. In March 2020, the World Health Organization declared the COVID-19 outbreak a global pandemic. The COVID-19 pandemic has significantly impacted health and economic conditions globally, disrupted global supply chains, and has adversely affected the Company’s business and that of its Members in certain of the Company’s markets and may continue to impact those markets or others in the future. Government, agency, and other regulatory recommendations, guidelines, mandates, and actions to address public health concerns, including restrictions on movement, public gatherings, and travel and restrictions on, or in certain cases outright prohibitions of, companies’ ability to conduct normal business operations, have and may continue to adversely affect our business. Although we have been classified as an essential business in most jurisdictions where we operate, there is no guarantee that this classification will not change. We may also be forced to or voluntarily elect to limit or cease operations in one or more markets for other reasons, such as the health and safety of our employees or because of disruptions in the operation of our supply chain and sources of supply. For example, it is possible that closures of our manufacturing facilities or those of our third-party contract manufacturers or suppliers could impact our distribution centers and our ability to manufacture and deliver products to our Members. In general, our inventory of products continues to be adequate to meet demand, but we do expect our supply chain and our ability to source and/or manufacture products will be negatively impacted if the negative effects of the pandemic continue for a prolonged period of time or worsen. The pandemic has had an adverse impact on our distribution channels and Members’ product access in some markets, which may, and in some cases will, continue until conditions improve. Our third-party contract manufacturers and suppliers and our Members’ businesses are also subject to many of the same risks and uncertainties related to the COVID-19 pandemic, as well as other pandemic-related risks and uncertainties that may not directly impact our operations, any of which could adversely affect demand for our products. For example, limitations on public gatherings have restricted our Members’ ability to hold meetings with their existing customers and to attract new customers. Significant limitations on cash transactions could also have an adverse effect on sales of products in certain markets. The COVID-19 pandemic has also adversely affected the economies and financial markets of many countries, at times causing a significant deceleration of or interruption to economic activity, which during various stages of the pandemic has reduced production, decreased demand for a broad variety of goods and services, diminished trade levels, and led to widespread corporate downsizing. We have also seen periods of significant disruption of and extreme volatility in the global capital markets, which could increase the cost of, or entirely restrict access to, capital. Further, while some countries have progressed in distributing COVID-19 vaccines to the general population, many countries have limited to no access to vaccines at this time. To the extent the global supply of vaccine remains limited or vaccination rates do not significantly increase, government restrictions in the countries with limited to no access or low vaccination rates may persist or increase and economic activity may remain at depressed levels in those countries or regions. 25 Despite the relaxation of pandemic-related constraints in certain markets, considerable uncertainty still surrounds the COVID-19 pandemic, its potential effects, and the extent and effectiveness of government responses to the pandemic. If the pandemic is not contained, or if new variants emerge or effective vaccines are not made available and utilized quickly enough, the adverse impacts of the COVID-19 pandemic could worsen, impacting all segments of the global economy, and result in a significant recession or worse. However, the unprecedented and sweeping nature of the COVID-19 pandemic makes it extremely difficult to predict how our business and operations will be affected in the long run. Further, the resumption of normal business operations after the disruptions caused by the COVID-19 pandemic may be delayed or constrained by the pandemic’s lingering effects on our Members, consumers, and third- party contract manufacturers and suppliers. Accordingly, our ability to conduct our business in the manner previously done or planned for the future could be materially and adversely affected, and any of the foregoing risks, or other cascading effects of the COVID-19 pandemic, or any other pandemic that may emerge in the future, that are not currently foreseeable, could materially and adversely affect our business, financial condition, and operating results. See the COVID-19 Pandemic and Sales by Geographic Region sections in Part II, Item 7, Management’s Discussion and Analysis of Financial Condition and Results of Operations, of this Annual Report on Form 10- K for further discussion of the impacts of the COVID-19 pandemic on our business and operating results. We depend on the integrity and reliability of our information technology infrastructure, and any related interruptions or inadequacies may have a material adverse effect on our business, financial condition, and operating results. Our business, including our ability to provide products and services to and manage our Members, depends on the performance and availability of our information technology infrastructure, including our core transactional systems. The most important aspect of our information technology infrastructure is the system through which we record and track Member sales, Volume Points, royalty overrides, bonuses, and other incentives. The failure of our information systems to operate effectively, or a breach in security of these systems, could adversely impact the promptness and accuracy of our product distribution and transaction processing. While we continue to invest in our information technology infrastructure, there can be no assurance that there will not be any significant interruptions to such systems, that the systems will be adequate to meet all of our business needs, or that the systems will keep pace with continuing changes in technology, legal and regulatory standards. Further, as discussed in Part II, Item 7, Management’s Discussion and Analysis of Financial Condition and Results of Operations, we recently commenced a Digital Technology Program to develop a new enhanced platform to provide enhanced digital capabilities and experiences to our Members. Our information technology infrastructure, as well as that of our Members and the other third parties with which we interact, may be damaged, disrupted, or breached or otherwise fail for a number of reasons, including power outages, computer and telecommunication failures, internal design, manual or usage errors, workplace violence or wrongdoing, or catastrophic events such as natural disasters, severe weather conditions, or acts of war or terrorism. In addition, numerous and evolving cybersecurity threats, including advanced and persistent cyberattacks, such as unauthorized attempts to access, disable, improperly modify, exfiltrate, or degrade our information technology infrastructure, or the introduction of computer viruses, malware, “phishing” emails, and other destructive software, and social engineering schemes, could compromise the confidentiality, availability, and integrity of our information technology infrastructure as well as those of the third parties with which we interact. These attacks may come from external sources, such as governments or hackers, or may originate internally from an employee or a third party with which we interact. We have been the target of, and may be the target of in the future, malicious cyberattacks, although to date none of these attacks have had a meaningful adverse impact on our business, financial condition, or operating results. The potential risk of cyberattacks may increase as we introduce new technology systems and services. Additionally, in response to the COVID-19 pandemic, many of our employees have been encouraged to work remotely, which may increase our exposure to significant systems interruptions, cybersecurity attacks, and otherwise compromise the integrity and reliability of our information technology infrastructure and our internal controls. Any disruptions to, or failures or inadequacies of, our information technology infrastructure that we may encounter in the future may result in substantial interruptions to our operations, expose us to significant liability, and may damage our reputation and our relationships with, or cause us to lose, our Members, especially if the disruptions, failures, or inadequacies impair our ability to track sales and pay royalty overrides, bonuses, and other incentives, any of which would harm our business, financial condition, and operating results. Any such disruptions, failures, or inadequacies could also create compliance risks under the Consent Order and result in penalties, fines, or sanctions under any applicable laws or regulations. Furthermore, it may be expensive or difficult to correct or replace any aspect of our information technology infrastructure in a timely manner, if at all, and we may have little or no control over whether any malfunctioning information technology services supplied to us by third parties are appropriately corrected, if at all. We have encountered, and may encounter in the future, errors in our software and our enterprise network, and inadequacies in the software and services supplied by certain of our vendors, although to date none of these errors or inadequacies have had a meaningful adverse impact on our business, financial condition or operating results. In addition, developments in technology are continuing to evolve and affecting all aspects of our business, including how we effectively manage our operations, interact with our Members and their customers, and commercialize opportunities that accompany the evolving digital and data driven economy. Therefore, one of our top priorities is to modernize our technology and data infrastructure by, among other things, creating more relevant and more personalized experiences wherever our systems interact with Members and their customers; and developing ways to create more powerful digital tools and capabilities for Members to enable them to grow their 26 businesses. These initiatives to modernize our technology and data infrastructure are expected to be implemented over the course of many years and to require significant investments. If these initiatives are not successful, our ability to attract and retain Members and their customers, increase sales, and reduce costs may be negatively affected. Further, these initiatives may be subject to cost overruns and delays and may cause disruptions in our operations. These cost overruns and delays and disruptions could adversely impact our business, financial condition, and operating results. Disruption of supply, shortage, or increases in the cost of ingredients, packaging materials, and other raw materials as well as climate change could materially harm our business, financial condition, and operating results. We and our third-party contract manufacturers depend on third-party suppliers to supply us with the various ingredients, packaging materials, and other raw materials that we use in the manufacturing and distribution of our products. Our business could be materially harmed if we experience operational difficulties with our third-party suppliers, such as increases in costs, reductions in the availability of materials or production capacity, errors in complying with specifications or applicable law, insufficient quality control, and failures to meet production or shipment deadlines. If we fail to develop or maintain our relationships with our third-party suppliers or if such suppliers cease doing business with us or go out of business, we could face difficulties in finding or transitioning to alternative suppliers that meet our standards. Many of the ingredients, packaging materials, and other raw materials we use are subject to fluctuations in availability and price due to a number of factors beyond our control, including crop size, ingredient, water, and land scarcity, market demand for raw materials, commodity market speculation, energy costs, currency fluctuations, supplier and logistics service capacities, import and export requirements, tariffs, and other government policies, and drought, excessive rain, temperature extremes, and other severe weather events. If we experience supply shortages, price increases, or supplier or regulatory impediments with respect to any of the materials we use in our products or packaging, we may need to seek alternative supplies or suppliers and may experience difficulties in finding replacements that are comparable in quality and price. For a discussion of the impacts of the COVID-19 pandemic on our supply chain see “If any of our manufacturing facilities or third-party manufacturers fail to reliably supply products to us at required levels of quality or fail to comply with applicable laws, our financial condition and operating results could be materially and adversely impacted” below. Further, the risks related to our ability to adequately source the materials required to meet our needs may be exacerbated by the effects of climate change and the legal, regulatory, or market measures that may be implemented to address climate change. There is growing concern that carbon dioxide and other greenhouse gases in the atmosphere may have an adverse impact on global temperatures, weather patterns, and the frequency and severity of extreme weather and natural disasters. If climate change has a negative effect on agricultural productivity, we may be subject to decreased availability or less favorable pricing for certain raw materials that are necessary for our products, such as soybeans, wheat, tea leaves, and nuts. Severe weather conditions and natural disasters can reduce crop size and crop quality, which in turn could reduce our supplies of raw materials, lower recoveries of usable raw materials, increase the prices of our raw materials, increase our cost of storing and transporting our raw materials, or disrupt production schedules. The impacts of climate change may also cause unpredictable water availability or exacerbate water scarcity. In addition, the increasing concern over climate change and related sustainability matters may also result in more federal, state, local, and foreign legal and regulatory requirements relating to climate change, which may significantly increase our costs of operation and delivery. 27
Answer the question based solely on the information provided in the passage. Do not use any external knowledge or resources. [user request] [context document]
Briefly summarize the Ed Sheeran case in no more than 3 bullets and then identify at least 3 other cases mentioned in the article and describe their differences to the Ed Sheeran case in no more than 2 bullets each.
The Case Between Two Top Hits On May 4, 2023, jurors in a Manhattan federal court sided with pop-star Ed Sheeran in a copyright infringement dispute over his Grammy-winning song “Thinking Out Loud.” The daughter of co-writer Ed Townsend of Marvin Gaye’s classic hit “Let’s Get It On” filed the lawsuit a few years ago. The controversial, closely watched trial saw Sheeran label testimony given by the plaintiff’s musicologist expert witness as “criminal.” He also testified he would “quit music” if he lost this trial. Townsend’s daughter alleged Sheeran used the chords, rhythm, and melody from her father’s hit song. Here, the plaintiff had a high burden to satisfy. While Sheeran argued that the chord progression and rhythmic pattern was generic and not protected by copyright, Townsend’s daughter disagreed. The plaintiff failed to prove the combination of those elements, how they were selected and arranged in the music, was original enough to warrant copyright protection. This is not the first case Sheeran has won regarding infringement. The pop star previously won a lawsuit alleging he infringed on a 2015 song called “Oh Why” by Sami Chokri, another U.K. artist. Chokri’s lawsuit alleged Sheeran copied his song by repeating “Oh, I” in the refrain of “Shape of You,” similar to Chokri’s song. While Sheeran might have prevailed this past week, there is still ongoing litigation brought by Structured Asset Sales (“SAS”), which owns a portion of the Townsend family rights to the same song. However, Sheeran’s legal counsel believes that litigation should be resolved due to the outcome of the Townsend family case. Others have stated that SAS are copyright “trolls,” as they are an entity that purchases copyrights for purely for financial gain. The Status of Copyright Law in Pop Music Copyright infringement has been a hot topic in the pop music industry. As a musical genre that has limited chord progressions and rhythm, artists argue there are going to be very similar songs out there that cannot be prevented. The Copyright Act passed by Congress provides nothing to help solve the question of “how similar is too similar” to determine a song infringed on another. The courts have been trying to answer this question, developing the rules on how to handle these matters. As such, litigation has picked up, with it impossible to avoid going to trial by early dismissal or summary judgment. Recently, Robin Thicke and Pharrell Williams were found to have infringed on another Gaye hit song, “Got to Give it Up” in 2015 on their hit song, “Blurred Lines.” The pair were ordered to pay over $5 million in damages. The judgment brought an uneasiness to the music world, as many criticized the jury verdict and the Ninth Circuit’s decision, arguing the harmonies and rhythmic patterns were basic building blocks that were free for any musician to use. However, Led Zeppelin was able to fight off a similar infringement case based on the chords and rhythm for their song “Stairway to Heaven,” with a ruling passed down by the Ninth Circuit stating some elements of creative works were so common, an infringement claim needed to be based on “virtually identical” versions. These opposing verdicts made the case against Sheeran high stakes for those in the music industry, watching if the verdict would bring some stability to songwriting or further disrupt the longstanding idea that basic genre elements were fair game for songwriters. However, those who are in support of a looser threshold argue that the songwriter and artist need to be protected. Townsend’s daughter here argued that Sheeran stole the “musical heart” of her father’s work and that artists should be given credit when proper. Supporters of Townsend argue that properly crediting the artists who came before does not stifle creativity. The Potential for Change and the Implications of Sheeran’s Win Overall, some argue that the current copyright law must be changed to avoid high amounts of litigation. A law scholar from UC Berkeley, Peter Menell, suggests a system that would mimic the current system that allows artists to record their own versions of existing music, as long as they pay a licensing fee in advance to the original composer. This is the concept of recording covers of songs. The suggested system would introduce mechanical remix royalties, allowing artists to license their compositions to others. This would allow the purchaser of the license to change aspects of the song to make it their own. Menell argues this would create clarity in the intellectual property landscape and reduce the workload of the courts. However, those who side with Sheeran might argue that a licensing aspect to “remix” a song is not necessary when it comes to the basic structure of a songwriting, and it ultimately prohibits creativity. Jennifer Jenkins, a Duke Law professor who specializes in music copyright, argued that privatizing common chord progressions and elements that were commonplace would remove the “essential ingredients from every songwriter’s tool kit.” In a way, this prevents the starving artist from creating if they cannot afford a license to a common chord progression. However, for right now, songwriters should believe the outcome of the Sheeran case is a step in the right direction.
Answer the question based solely on the information provided in the passage. Do not use any external knowledge or resources. Briefly summarize the Ed Sheeran case in no more than 3 bullets and then identify at least 3 other cases mentioned in the article and describe their differences to the Ed Sheeran case in no more than 2 bullets each. The Case Between Two Top Hits On May 4, 2023, jurors in a Manhattan federal court sided with pop-star Ed Sheeran in a copyright infringement dispute over his Grammy-winning song “Thinking Out Loud.” The daughter of co-writer Ed Townsend of Marvin Gaye’s classic hit “Let’s Get It On” filed the lawsuit a few years ago. The controversial, closely watched trial saw Sheeran label testimony given by the plaintiff’s musicologist expert witness as “criminal.” He also testified he would “quit music” if he lost this trial. Townsend’s daughter alleged Sheeran used the chords, rhythm, and melody from her father’s hit song. Here, the plaintiff had a high burden to satisfy. While Sheeran argued that the chord progression and rhythmic pattern was generic and not protected by copyright, Townsend’s daughter disagreed. The plaintiff failed to prove the combination of those elements, how they were selected and arranged in the music, was original enough to warrant copyright protection. This is not the first case Sheeran has won regarding infringement. The pop star previously won a lawsuit alleging he infringed on a 2015 song called “Oh Why” by Sami Chokri, another U.K. artist. Chokri’s lawsuit alleged Sheeran copied his song by repeating “Oh, I” in the refrain of “Shape of You,” similar to Chokri’s song. While Sheeran might have prevailed this past week, there is still ongoing litigation brought by Structured Asset Sales (“SAS”), which owns a portion of the Townsend family rights to the same song. However, Sheeran’s legal counsel believes that litigation should be resolved due to the outcome of the Townsend family case. Others have stated that SAS are copyright “trolls,” as they are an entity that purchases copyrights for purely for financial gain. The Status of Copyright Law in Pop Music Copyright infringement has been a hot topic in the pop music industry. As a musical genre that has limited chord progressions and rhythm, artists argue there are going to be very similar songs out there that cannot be prevented. The Copyright Act passed by Congress provides nothing to help solve the question of “how similar is too similar” to determine a song infringed on another. The courts have been trying to answer this question, developing the rules on how to handle these matters. As such, litigation has picked up, with it impossible to avoid going to trial by early dismissal or summary judgment. Recently, Robin Thicke and Pharrell Williams were found to have infringed on another Gaye hit song, “Got to Give it Up” in 2015 on their hit song, “Blurred Lines.” The pair were ordered to pay over $5 million in damages. The judgment brought an uneasiness to the music world, as many criticized the jury verdict and the Ninth Circuit’s decision, arguing the harmonies and rhythmic patterns were basic building blocks that were free for any musician to use. However, Led Zeppelin was able to fight off a similar infringement case based on the chords and rhythm for their song “Stairway to Heaven,” with a ruling passed down by the Ninth Circuit stating some elements of creative works were so common, an infringement claim needed to be based on “virtually identical” versions. These opposing verdicts made the case against Sheeran high stakes for those in the music industry, watching if the verdict would bring some stability to songwriting or further disrupt the longstanding idea that basic genre elements were fair game for songwriters. However, those who are in support of a looser threshold argue that the songwriter and artist need to be protected. Townsend’s daughter here argued that Sheeran stole the “musical heart” of her father’s work and that artists should be given credit when proper. Supporters of Townsend argue that properly crediting the artists who came before does not stifle creativity. The Potential for Change and the Implications of Sheeran’s Win Overall, some argue that the current copyright law must be changed to avoid high amounts of litigation. A law scholar from UC Berkeley, Peter Menell, suggests a system that would mimic the current system that allows artists to record their own versions of existing music, as long as they pay a licensing fee in advance to the original composer. This is the concept of recording covers of songs. The suggested system would introduce mechanical remix royalties, allowing artists to license their compositions to others. This would allow the purchaser of the license to change aspects of the song to make it their own. Menell argues this would create clarity in the intellectual property landscape and reduce the workload of the courts. However, those who side with Sheeran might argue that a licensing aspect to “remix” a song is not necessary when it comes to the basic structure of a songwriting, and it ultimately prohibits creativity. Jennifer Jenkins, a Duke Law professor who specializes in music copyright, argued that privatizing common chord progressions and elements that were commonplace would remove the “essential ingredients from every songwriter’s tool kit.” In a way, this prevents the starving artist from creating if they cannot afford a license to a common chord progression. However, for right now, songwriters should believe the outcome of the Sheeran case is a step in the right direction. https://lawreview.syr.edu/stealing-the-heart-of-the-musical-work-sheerans-win-doesnt-necessarily-ease-songwriters-anxieties/
You are given a reference document. You must only use information found in the reference document to answer the question asked.
What are the six "recession-proof" careers?
Top 6 Recession-Proof Careers By Team Stash Here are six examples of jobs that are likely to survive a financial slump. While no career is completely recession proof, plenty of jobs withstand economic downturns well. In fact, people with jobs in healthcare, education, and technical fields often thrive during recessions. Here are six examples of jobs that are likely to survive a financial slump. They’re also unlikely to succumb to automation anytime soon. Learn more >> How to prepare for a recession Mental Health Counselors Counselors and psychologists are often in higher demand during recessions than when the economy is humming. Job loss, or the fear of it, induces financial stress which can negatively impact all areas of a person’s life. Counselors help people learn to cope. Demand for marriage and family therapists also increases during recessions since divorce rates tend to spike during periods of economic uncertainty. Mental health counselors need a post-graduate degree and have a median income of about $44,000 a year. Dental Hygienists People require dental care in every type of economic situation, making the dental field virtually recession proof. Dental hygienists educate patients, clean teeth, and provide assistance during complex procedures. They often have more interaction with patients than dentists do. Dental hygienists need a two-year degree and have a median income of about $73,000 a year. Software Developers Demand for talented software developers is soaring and shows no signs of slowing down, even during times of economic duress. Companies are racing to take advantage of big data and are always looking to improve their mobile presence. App development is still huge, and developers that stay current have a wide range of career options available to them. Software developers have a median income of about $102,000 a year. Educators People need education regardless of the way the economy is performing. In fact, many people head back to school during recessions to shore up their skills or learn new ones, and there’s always a need for preschool, elementary, and secondary teachers. Educators need a bachelor’s degree or higher. High school teachers have a median income of about $58,000 a year, and elementary teachers have a median income of about $55,000 a year. Postsecondary educators have a median income of about $75,000 a year. Information Technology Staff IT professionals are always in high demand. In fact, demand is so high that even if your employer reduces its IT workforce during a recession, it’s likely other companies will expand theirs. While outsourcing is a valid concern for workers in the field, enough jobs must remain on site to make it a great career choice. Network and database administration are two strong areas within the larger IT arena. IT professionals need a bachelor’s degree or higher, although some companies will waive this requirement for employees with the right technical skills. They have a median income of about $82,000 a year. Sales Representatives Sales departments have such an enormous impact on a company’s gross income that employers tend to expand them during recessions. Since sales reps are such an integral part of a company’s success, especially during times of slow or negative economic growth, high-performers can expect significant job security. Many sales reps work on a commission basis; if a sales rep doesn’t produce, his income shrinks. This makes it relatively safe for companies to hire and retain them during recessions. Sales reps in non-technical positions often only need a high school diploma. Reps in technical and scientific areas need a bachelor’s degree or higher in a field related to the products they sell. Pay varies widely according to field and experience, but they have a median income of about $60,000 a year. Finding a recession-proof job that pays well and you enjoy is often challenging, but can be done. Plenty of great options exist. All you have to do is choose one and obtain the necessary skills and education.
You are given a reference document. You must only use information found in the reference document to answer the question asked. What are the six "recession-proof" careers? Top 6 Recession-Proof Careers By Team Stash Here are six examples of jobs that are likely to survive a financial slump. While no career is completely recession proof, plenty of jobs withstand economic downturns well. In fact, people with jobs in healthcare, education, and technical fields often thrive during recessions. Here are six examples of jobs that are likely to survive a financial slump. They’re also unlikely to succumb to automation anytime soon. Learn more >> How to prepare for a recession Mental Health Counselors Counselors and psychologists are often in higher demand during recessions than when the economy is humming. Job loss, or the fear of it, induces financial stress which can negatively impact all areas of a person’s life. Counselors help people learn to cope. Demand for marriage and family therapists also increases during recessions since divorce rates tend to spike during periods of economic uncertainty. Mental health counselors need a post-graduate degree and have a median income of about $44,000 a year. Dental Hygienists People require dental care in every type of economic situation, making the dental field virtually recession proof. Dental hygienists educate patients, clean teeth, and provide assistance during complex procedures. They often have more interaction with patients than dentists do. Dental hygienists need a two-year degree and have a median income of about $73,000 a year. Software Developers Demand for talented software developers is soaring and shows no signs of slowing down, even during times of economic duress. Companies are racing to take advantage of big data and are always looking to improve their mobile presence. App development is still huge, and developers that stay current have a wide range of career options available to them. Software developers have a median income of about $102,000 a year. Educators People need education regardless of the way the economy is performing. In fact, many people head back to school during recessions to shore up their skills or learn new ones, and there’s always a need for preschool, elementary, and secondary teachers. Educators need a bachelor’s degree or higher. High school teachers have a median income of about $58,000 a year, and elementary teachers have a median income of about $55,000 a year. Postsecondary educators have a median income of about $75,000 a year. Information Technology Staff IT professionals are always in high demand. In fact, demand is so high that even if your employer reduces its IT workforce during a recession, it’s likely other companies will expand theirs. While outsourcing is a valid concern for workers in the field, enough jobs must remain on site to make it a great career choice. Network and database administration are two strong areas within the larger IT arena. IT professionals need a bachelor’s degree or higher, although some companies will waive this requirement for employees with the right technical skills. They have a median income of about $82,000 a year. Sales Representatives Sales departments have such an enormous impact on a company’s gross income that employers tend to expand them during recessions. Since sales reps are such an integral part of a company’s success, especially during times of slow or negative economic growth, high-performers can expect significant job security. Many sales reps work on a commission basis; if a sales rep doesn’t produce, his income shrinks. This makes it relatively safe for companies to hire and retain them during recessions. Sales reps in non-technical positions often only need a high school diploma. Reps in technical and scientific areas need a bachelor’s degree or higher in a field related to the products they sell. Pay varies widely according to field and experience, but they have a median income of about $60,000 a year. Finding a recession-proof job that pays well and you enjoy is often challenging, but can be done. Plenty of great options exist. All you have to do is choose one and obtain the necessary skills and education.
Answer the question based solely on the information provided in the passage. Do not use any external knowledge or resources. [user request] [context document]
How are smart devices able to spy on people's browsing history, financial transactions, and even health issues? Some apps can bypass security by just tapping into the wifi. how does that work? What do you think about the fact that once a device is connected it can control all of the other devices without consent?
cepro.com New Research Uncovers Litany of Privacy/Security Issues in Consumer IoT Devices Zachary Comeau 5–6 minutes An international team of researchers has unveiled findings on the widespread security and privacy challenges posed by IoT devices in smart homes, delving into the intricacies of local network interactions between 93 different IoT devices and mobile apps. The paper, titled In the Room Where It Happens: Characterizing Local Communication and Threats in Smart Homes, reveals a litany of previously undisclosed security and privacy threats. The research team included researchers from the New York Tandon School of Engineering, Northeastern University, University of Madrid, University of Calgary, the International Computer Science Institute and IMDEA Networks. The research was presented last month at the ACM Internet Measurement Conference last month in Montreal. Researchers narrow in on the local network and how IoT devices can inadvertently compromise consumer privacy through the exposure of sensitive data within those local networks using standard protocols such as UPnP or mDNS. Researchers say this essentially allows nearly any company to learn what devices are in a home, when the user is home, and where the home is. According to the paper, these threats include the exposure of unique device names, UUIDs, and even household geolocation data, all of which can be harvested by companies involved in surveillance capitalism without user awareness. NYU Tandon, quoting PhD student and research co-author Vijay Prakash, says in a writeup that researchers found evidence of IoT devices inadvertently compromising consumer privacy by exposing at least one personally identifiable information, such as unique hardware addresses, UUID, or unique device names, in thousands of existing smart homes. That information can be pieced together to make a house very identifiable, researchers say. The devices included in the research include 93 consumer IP-based smart home devices, as well as their companion apps. Devices included in the study were smart doorbells, smart bulbs, smart thermostats, smart TVs, smart plugs, smart speakers, smart sensors and smart home hubs. Specifically, most of the devices tested are widely available online or in stores, including Amazon Echo devices, Google Nest products, Apple TVs, and more. These local network protocols can be employed as side-channels to access data that is supposedly protected by several mobile app permissions such as household locations, researchers say. Narseo Vallina-Rodriguez, Associate Research Professor of IMDEA Networks and co-founder of AppCensus, says in a statement that side channels are a sneaky way of indirectly accessing sensitive data. “For example, Android app developers are supposed to request and obtain users’ consent to access data like geolocation,” Vallina-Rodriguez says. “However, we have shown that certain spyware apps and advertising companies do abuse local network protocols to silently access such sensitive information without any user awareness. All they have to do is kindly ask for it to other IoT devices deployed in the local network using standard protocols like UPnP.” In addition, Juan Tapiador, professor at Universidad Carlos III de Madrid, says the study shows that local network protocols used by IoT devices are not sufficiently protected and expose sensitive information about the home and the homeowners’ use of the devices. “This information is being collected in an opaque way and makes it easier to create profiles of our habits or socioeconomic level,” Tapiador says. In other comments, Dr. Joel Reardon, PhD, associate professor of computer science at the University of Calgary, says the research shows the home network is not as secure as once thought. “If a new phone connects to a network, then all the apps on it can have direct access to everything else on that network,” Reardon says. “The spyware I found in apps with tens of millions of installs was in fact scanning networks and talking to routers.” The research follows multiple separate cybersecurity threats-related to IoT devices uncovered this month. Towards the middle of the month, the Electronic Frontier Foundation nonprofit put out a call to action for the FTC to block the sales of Android TV boxes potentially infected with botnet malware. Researchers around this time also published a report in FCC filings for the Cyber Trust Mark proceedings warning of ultrasonic commands that could potentially be used to activate and control voice assistants. If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!
Answer the question based solely on the information provided in the passage. Do not use any external knowledge or resources. How are smart devices able to spy on people's browsing history, financial transactions, and even health issues? Some apps can bypass security by just tapping into the wifi. how does that work? What do you think about the fact that once a device is connected it can control all of the other devices without consent? cepro.com New Research Uncovers Litany of Privacy/Security Issues in Consumer IoT Devices Zachary Comeau 5–6 minutes An international team of researchers has unveiled findings on the widespread security and privacy challenges posed by IoT devices in smart homes, delving into the intricacies of local network interactions between 93 different IoT devices and mobile apps. The paper, titled In the Room Where It Happens: Characterizing Local Communication and Threats in Smart Homes, reveals a litany of previously undisclosed security and privacy threats. The research team included researchers from the New York Tandon School of Engineering, Northeastern University, University of Madrid, University of Calgary, the International Computer Science Institute and IMDEA Networks. The research was presented last month at the ACM Internet Measurement Conference last month in Montreal. Researchers narrow in on the local network and how IoT devices can inadvertently compromise consumer privacy through the exposure of sensitive data within those local networks using standard protocols such as UPnP or mDNS. Researchers say this essentially allows nearly any company to learn what devices are in a home, when the user is home, and where the home is. According to the paper, these threats include the exposure of unique device names, UUIDs, and even household geolocation data, all of which can be harvested by companies involved in surveillance capitalism without user awareness. NYU Tandon, quoting PhD student and research co-author Vijay Prakash, says in a writeup that researchers found evidence of IoT devices inadvertently compromising consumer privacy by exposing at least one personally identifiable information, such as unique hardware addresses, UUID, or unique device names, in thousands of existing smart homes. That information can be pieced together to make a house very identifiable, researchers say. The devices included in the research include 93 consumer IP-based smart home devices, as well as their companion apps. Devices included in the study were smart doorbells, smart bulbs, smart thermostats, smart TVs, smart plugs, smart speakers, smart sensors and smart home hubs. Specifically, most of the devices tested are widely available online or in stores, including Amazon Echo devices, Google Nest products, Apple TVs, and more. These local network protocols can be employed as side-channels to access data that is supposedly protected by several mobile app permissions such as household locations, researchers say. Narseo Vallina-Rodriguez, Associate Research Professor of IMDEA Networks and co-founder of AppCensus, says in a statement that side channels are a sneaky way of indirectly accessing sensitive data. “For example, Android app developers are supposed to request and obtain users’ consent to access data like geolocation,” Vallina-Rodriguez says. “However, we have shown that certain spyware apps and advertising companies do abuse local network protocols to silently access such sensitive information without any user awareness. All they have to do is kindly ask for it to other IoT devices deployed in the local network using standard protocols like UPnP.” In addition, Juan Tapiador, professor at Universidad Carlos III de Madrid, says the study shows that local network protocols used by IoT devices are not sufficiently protected and expose sensitive information about the home and the homeowners’ use of the devices. “This information is being collected in an opaque way and makes it easier to create profiles of our habits or socioeconomic level,” Tapiador says. In other comments, Dr. Joel Reardon, PhD, associate professor of computer science at the University of Calgary, says the research shows the home network is not as secure as once thought. “If a new phone connects to a network, then all the apps on it can have direct access to everything else on that network,” Reardon says. “The spyware I found in apps with tens of millions of installs was in fact scanning networks and talking to routers.” The research follows multiple separate cybersecurity threats-related to IoT devices uncovered this month. Towards the middle of the month, the Electronic Frontier Foundation nonprofit put out a call to action for the FTC to block the sales of Android TV boxes potentially infected with botnet malware. Researchers around this time also published a report in FCC filings for the Cyber Trust Mark proceedings warning of ultrasonic commands that could potentially be used to activate and control voice assistants. If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters! https://www.cepro.com/networking/new-research-uncovers-litany-of-privacy-security-issues-in-consumer-iot-devices/
System Instruction: Use only the following information labeled "Context". Do not use any other source of information other than what is provided below.
Question: According to the Judgement of Myers v. United States is the President legally allowed to remove executive officers of the United States whom he has appointed by and with the advice and consent of the Senate from office?
Context: The State Supreme Court’s inclusion of vote counts based on these variant standards exemplifies concerns with the remedial processes that were under way … In addition to these difficulties the actual process by which the votes were to be counted under the Florida Supreme Court’s decision raises further concerns. That order did not specify who would recount the ballots. The county can- vassing boards were forced to pull together ad hoc teams of judges from various Circuits who had no previous training in handling and interpreting ballots. Furthermore, while others were permitted to observe, they were prohibited from objecting during the recount. The recount process, in its features here described, is inconsistent with the minimum procedures necessary to protect the fundamental right of each voter in the special instance of a statewide recount under the authority of a single state judicial officer. Our consideration is limited to the present circumstances, for the problem of equal protection in election processes generally presents many complexities. The question before the Court is not whether local entities, in the exercise of their expertise, may develop different sys- tems for implementing elections. Instead, we are presented with a situation where a state court with the power to assure uniformity has ordered a statewide recount with minimal procedural safeguards. When a court orders a statewide rem- edy, there must be at least some assurance that the rudimentary requirements of equal treatment and fundamental fair- ness are satisfied … Upon due consideration of the difficulties identified to this point, it is obvious that the recount cannot be conducted in compliance with the requirements of equal protection and due process without substantial additional work. It would require not only the adoption (after opportunity for argument) of adequate statewide standards for determining what is a legal vote, and practicable procedures to implement them, but also orderly judicial review of any disputed matters that might arise. In addition, the Secretary has advised that the recount of only a portion of the ballots requires that the vote tabulation equipment be used to screen out undervotes, a function for which the machines were not designed. If a recount of overvotes were also required, perhaps even a second screening would be necessary. Use of the equipment for this purpose, and any new software developed for it, would have to be evaluated for accuracy by the Secretary … Because it is evident that any recount seeking to meet the December 12 date will be unconstitutional for the reasons we have discussed, we reverse the judgment of the Supreme Court of Florida ordering a recount to proceed … None are more conscious of the vital limits on judicial authority than are the Members of this Court, and none stand more in admiration of the Constitution’s design to leave the selection of the President to the people, through their leg- islatures, and to the political sphere. When contending parties invoke the process of the courts, however, it becomes our unsought responsibility to resolve the federal and constitutional issues the judicial system has been forced to confront. The judgment of the Supreme Court of Florida is reversed, and the case is remanded for further proceedings not incon- sistent with this opinion. It is so ordered. STRUCTURE OF THE PRESIDENCY | 60 Excerpted by Alexandria Metzdorf § 61 | STRUCTURE OF THE PRESIDENCY Appointment and Removal Powers Myers v. United States 272 U.S. 52 (1926) Decision: Affirmed Vote: 6-3 Majority: Taft, joined by Van Devanter, Sutherland, Butler, Sanford, Stone Dissent: Holmes Dissent: McReynolds Dissent: Brandeis MR. CHIEF JUSTICE TAFT delivered the opinion of the Court. This case presents the question whether, under the Constitution, the President has the exclusive power of removing exec- utive officers of the United States whom he has appointed by and with the advice and consent of the Senate. Myers … was, on July 21, 1917, appointed by the President, by and with the advice and consent of the Senate, to be a postmaster of the first class at Portland, Oregon, for a term of four years. On January 20, 1920, Myers’ resignation was demanded. He refused the demand. On February 2, 1920, he was removed from office by order of the Postmaster Gen- eral, acting by direction of the President. February 10th, Myers sent a petition to the President and another to the Sen- ate Committee on Post Offices, asking to be heard if any charges were filed. He protested to the Department against his removal, and continued to do so until the end of his term. He pursued no other occupation, and drew compensation for no other service during the interval. On April 21, 1921, he brought this suit in the Court of Claims for his salary from the date of his removal, which, as claimed by supplemental petition filed after July 21, 1921, the end of his term, amounted to $8,838.71 … [By the law] under which Myers was appointed with the advice and consent of the Senate as a first-class postmaster, it is provided that “Postmasters of the first, second and third classes shall be appointed and may be removed by the President by and with the advice and consent of the Senate and shall hold their offices for four years unless sooner removed or suspended accord- ing to law.” The Senate did not consent to the President’s removal of Myers during his term. If this statute, in its requirement that his term should be four years unless sooner removed by the President by and with the consent of the Senate, is valid, the appellant, Myers’ administratrix, is entitled to recover his unpaid salary for his full term, and the judgment of the Court of Claims must be reversed. The Government maintains that the requirement is invalid for the reason that, under Article APPOINTMENT AND REMOVAL POWERS | 62 II of the Constitution the President’s power of removal of executive officers appointed by him with the advice and con- sent of the Senate is full and complete without consent of the Senate … We are therefore confronted by the constitutional question, and cannot avoid it … The question where the power of removal of executive officers appointed by the President by and with the advice and consent of the Senate was vested was presented early in the first session of the First Congress. There is no express pro- vision respecting removals in the Constitution, except as Section 4 of Article II … provides for removal from office by impeachment … It was pointed out in this great debate [constitutional convention] that the power of removal, though equally essential to the executive power is different in its nature from that of appointment. Madison, 1 Annals of Congress, 497 et seq.; Cly- mer, 1 Annals, 489; Sedgwick, 1 Annals, 522; Ames, 1 Annals, 541, 542; Hartley, 1 Annals, 481. A veto by the Senate-a part of the legislative branch of the government-upon removals is a much greater limitation upon the executive branch, and a much more serious blending of the legislative with the executive, than a rejection of a proposed appointment. It is not to be implied. The rejection of a nominee of the President for a particular office does not greatly embarrass him in the conscientious discharge of his high duties in the selection of those who are to aid him, because the President usually has an ample field from which to select for office, according to his preference, competent and capable men. The Senate has full power to reject newly proposed appointees whenever the President shall remove the incumbents. Such a check enables the Senate to prevent the filling of offices with bad or incompetent men, or with those against whom there is ten- able objection. The power to prevent the removal of an officer who has served under the President is different from the authority to con- sent to or reject his appointment. When a nomination is made, it may be presumed that the Senate is, or may become, as well advised as to the fitness of the nominee as the President, but in the nature of things the defects in ability or intel- ligence or loyalty in the administration of the laws of one who has served as an officer under the President are facts as to which the President, or his trusted subordinates, must be better informed than the Senate, and the power to remove him may therefor be regarded as confined for very sound and practical reasons, to the governmental authority which has administrative control. The power of removal is incident to the power of appointment, not to the power of advising and consenting to appointment, and when the grant of the executive power is enforced by the express mandate to take care that the laws be faithfully executed, it emphasizes the necessity for including within the executive power as conferred the exclusive power of removal. … The vesting of the executive power in the President was essentially a grant of the power to execute the laws. But the Pres- ident, alone and unaided, could not execute the laws. He must execute them by the assistance of subordinates. This view has since been repeatedly affirmed by this Court. Wilcox v. Jackson (1839) … It was urged that the natural meaning of the term “executive power” granted the President included the appointment and removal of executive subordinates. If such appointments and removals were not an exercise of the executive power, what were they? They certainly were not the exercise of legislative or judicial power in government as usually understood … It is true that the remedy for the evil of political executive removals of inferior offices is with Congress by a simple expedi- ent, but it includes a change of the power of appointment from the President with the consent of the Senate. Congress 63 | APPOINTMENT AND REMOVAL POWERS must determine first that the office is inferior, and second that it is willing that the office shall be filled by appoint- ment by some other authority than the President with the consent of the Senate. That the latter may be an important consideration is manifest, and is the subject of comment by this Court in its opinion in the case of Shurtleff v. United States, (1903), where this Court said: “To take away this power of removal in relation to an inferior office created by statute, although that statute provided for an appointment thereto by the President and confirmation by the Senate, would require very clear and explicit language. It should not be held to be taken away by mere inference or implication … ” [P]ostmasters were all by law appointed by the Postmaster General. This was because Congress … so provided. But there- after, Congress required certain classes of them to be, as they now are, appointed by the President with the consent of the Senate. This is an indication that Congress deemed appointment by the President with the consent of the Senate essential to the public welfare, and, until it is willing to vest their appointment in the head of the Department, they will be subject to removal by the President alone, and any legislation to the contrary must fall as in conflict with the Consti- tution. Summing up, then, the facts as to acquiescence by all branches of the Government in the legislative decision of 1789, as to executive officers, whether superior or inferior, we find that from 1789 until 1863, a period of 74 years, there was no act of Congress, no executive act, and no decision of this Court at variance with the declaration of the First Congress, but there was, as we have seen, clear, affirmative recognition of it by each branch of the Government. Article II grants to the President … the general administrative control of those executing the laws, including the power of appointment and removal of executive officers … the President’s power of removal is further established as an incident to his specifically enumerated function of appointment by and with the advice of the Senate, but that such incident does not, by implication, extend to removals the Senate’s power of checking appointments, and … to hold otherwise would make it impossible for the President, in case of political or other differences with the Senate or Congress, to take care that the laws be faithfully executed … While this Court has studiously avoided deciding the issue until it was presented in such a way that it could not be avoided, in the references it has made to the history of the question, and in the presumptions it has indulged in favor of a statutory construction not inconsistent with the legislative decision of 1789, it has indicated a trend of view that we should not and cannot ignore. When, on the merits, we find our conclusion strongly favoring the view which prevailed in the First Congress, we have no hesitation in holding that conclusion to be correct, and it therefore follows that the Tenure of Office Act of 1867, insofar as it attempted to prevent the President from removing executive officer who had been appointed by him by and with the advice and consent of the Senate, was invalid, and that subsequent legislation of the same effect was equally so. For the reasons given, we must therefore hold that the provision of the law of 1876, by which the unrestricted power of removal of first class postmasters is denied to the President, is in violation of the Constitution, and invalid. This leads to an affirmance of the judgment of the Court of Claims. Judgment affirmed. APPOINTMENT AND REMOVAL POWERS | 64 Excerpted by Alexandria Metzdorf § Humphrey’s Executor v. United States 295 U.S. 602 (1935) Decision: Affirmed Vote: 9-0 Majority: Sutherland, joined by Hughes, Van Devanter, McReynolds, Brandeis, Butler, Stone, Roberts, and Cardozo Mr. Justice SUTHERLAND delivered the opinion of the Court. Plaintiff brought suit in the Court of Claims against the United States to recover a sum of money alleged to be due the deceased for salary as a Federal Trade Commissioner from October 8, 1933, when the President undertook to remove him from office, to the time of his death on February 14, 1934. The court below has certified to this court two questions … in respect of the power of the President to make the removal. The material facts which give rise to the questions are as follows: William E. Humphrey, the decedent, on December 10, 1931, was nominated by President Hoover to succeed himself as a member of the Federal Trade Commission, and was confirmed by the United States Senate. He was duly commissioned for a term of seven years, expiring September 25, 1938; and, after taking the required oath of office, entered upon his duties. On July 25, 1933, President Roosevelt addressed a letter to the commissioner asking for his resignation, on the ground ‘that the aims and purposes of the Administration with respect to the work of the Commission can be carried out most effectively with personnel of my own selection,’ but disclaiming any reflection upon the commissioner personally or upon his services. The commissioner replied, asking time to consult his friends. After some further correspondence upon the subject, the President on August 31, 1933, wrote the commissioner expressing the hope that the resignation would be forthcoming, and saying: ‘You will, I know, realize that I do not feel that your mind and my mind go along together on either the policies or the administering of the Federal Trade Commission, and, frankly, I think it is best for the people of this country that I should have a full confidence.’ The commissioner declined to resign; and on October 7, 1933, the President wrote him: ‘Effective as of this date you are hereby removed from the office of Commissioner of the Federal Trade Commission.’ Humphrey never acquiesced in this action, but continued thereafter to insist that he was still a member of the commis- sion, entitled to perform its duties and receive the compensation provided by law at the rate of $10,000 per annum. Upon these and other facts set forth in the certificate, which we deem it unnecessary to recite, the following questions are certi- fied: 1. Do the provisions of section 1 of the Federal Trade Commission Act, stating that ‘any commissioner may be removed by the President for inefficiency, neglect of duty, or malfeasance in office’, restrict or limit the power of 65 | APPOINTMENT AND REMOVAL POWERS the President to remove a commissioner except upon one or more of the causes named? If the foregoing question is answered in the affirmative, then— 2. If the power of the President to remove a commissioner is restricted or limited as shown by the foregoing inter- rogatory and the answer made thereto, is such a restriction or limitation valid under the Constitution of the United States?’ The Federal Trade Commission Act … creates a commission of five members to be appointed by the President by and with the advice and consent of the Senate, and section 1 provides: ‘Not more than three of the commissioners shall be members of the same political party. … ‘ [The Act] in part provides that: ‘Unfair methods of competition in commerce are declared unlawful. The commission is empowered and directed to prevent persons, partnerships, or corporations, except banks, and com- mon carriers subject to the Acts to regulate commerce, from using unfair methods of competition in commerce … ‘ First. The question first to be considered is whether, by the provisions of section 1 … the President’s power is limited to removal for the specific causes enumerated therein. The negative contention of the government is based principally upon the decision of this court in Shurtleff v. United States, (1903) … The situation here presented is plainly and wholly different. The statute fixes a term of office, in accordance with many precedents … The words of the act are definite and unambiguous. … The fixing of a definite term subject to removal for cause, unless there be some countervailing provision or circum- stance indicating the contrary, which here we are unable to find, is enough to establish the legislative intent that the term is not to be curtailed in the absence of such cause. But if the intention of Congress that no removal should be made dur- ing the specified term except for one or more of the enumerated causes were not clear upon the face of the statute, as we think it is, it would be made clear by a consideration of the character of the commission and the legislative history which accompanied and preceded the passage of the act. The commission is to be nonpartisan; and it must, from the very nature of its duties, act with entire impartiality. It is charged with the enforcement of no policy except the policy of the law. Its duties are neither political nor executive, but predominantly quasi judicial and quasi legislative. Like the Interstate Commerce Commission, its members are called upon to exercise the trained judgment of a body of experts ‘appointed by law and informed by experience’ … The legislative reports in both houses of Congress clearly reflect the view that a fixed term was necessary to the effective and fair administration of the law … [T]he language of the act, the legislative reports, and the general purposes of the legislation as reflected by the debates, all combine to demonstrate the congressional intent to create a body of experts who shall gain experience by length of service; a body which shall be independent of executive authority, except in its selection, and free to exercise its judgment APPOINTMENT AND REMOVAL POWERS | 66 without the leave or hindrance of any other official … To the accomplishment of these purposes, it is clear that Congress was of opinion that length and certainty of tenure would vitally contribute. And to hold that, nevertheless, the members of the commission continue in office at the mere will of the President, might be to thwart, in large measure, the very ends which Congress sought to realize by definitely fixing the term of office. … Second. To support its contention that the removal provision … is an unconstitutional interference with the executive power of the President, the government’s chief reliance is Myers v. United States (1926) … [T]he narrow point actually decided was only that the President had power to remove a postmaster of the first class, without the advice and consent of the Senate as required by act of Congress. In the course of the opinion of the court, expressions occur which tend to sustain the government’s contention, but these are beyond the point involved and, therefore, do not come within the rule of stare decisis … The office of a postmaster is so essentially unlike the office now involved that the decision in the Myers case cannot be accepted as controlling our decision here. A postmaster is an executive officer restricted to the performance of executive functions. He is charged with no duty at all related to either the legislative or judicial power. The actual decision in the Myers case finds support in the theory that such an officer is merely one of the units in the executive department and, hence, inherently subject to the exclusive and illimitable power of removal by the Chief Executive, whose subordinate and aid he is. Putting aside dicta, which may be followed if sufficiently persuasive but which are not controlling, the nec- essary reach of the decision goes far enough to include all purely executive officers. It goes no farther; much less does it include an officer who occupies no place in the executive department and who exercises no part of the executive power vested by the Constitution in the President. The Federal Trade Commission is an administrative body created by Congress to carry into effect legislative policies embodied in the statute in accordance with the legislative standard therein prescribed, and to perform other specified duties as a legislative or as a judicial aid. Such a body cannot in any proper sense be characterized as an arm or an eye of the executive. Its duties are performed without executive leave and, in the contemplation of the statute, must be free from executive control. In administering the provisions of the statute in respect of ‘unfair methods of competition,’ that is to say, in filling in and administering the details embodied by that general standard, the commission acts in part quasi leg- islatively and in part quasi judicially … To the extent that it exercises any executive function, as distinguished from execu- tive power in the constitutional sense, it does so in the discharge and effectuation of its quasi legislative or quasi judicial powers, or as an agency of the legislative or judicial departments of the government … If Congress is without authority to prescribe causes for removal of members of the trade commission and limit executive power of removal accordingly, that power at once becomes practically all-inclusive in respect of civil officers with the exception of the judiciary provided for by the Constitution … We are thus confronted with the serious question whether not only the members of these quasi legislative and quasi judicial bodies, but the judges of the legislative Court of Claims, exercising judicial power … con- tinue in office only at the pleasure of the President. We think it plain under the Constitution that illimitable power of removal is not possessed by the President in respect of officers of the character of those just named. The authority of Congress, in creating quasi legislative or quasi judicial agencies, to require them to act in discharge of their duties independently of executive control cannot well be doubted. CHIEF JUSTICE REHNQUIST delivered the opinion of the Court. This case presents us with a challenge to the independent counsel provisions of the Ethics in Government Act of 1978 … We hold today that these provisions of the Act do not violate the Appointments Clause of the Constitution, Art. II, § 2, cl. 2, or the limitations of Article III, nor do they impermissibly interfere with the President’s authority under Article II in violation of the constitutional principle of separation of powers. Briefly stated, Title VI of the Ethics in Government Act … allows for the appointment of an “independent counsel” to investigate and, if appropriate, prosecute certain high-ranking Government officials for violations of federal criminal laws … The Act requires the Attorney General, upon receipt of information that he determines is “sufficient to constitute grounds to investigate whether any person [covered by the Act] may have violated any Federal criminal law,” to conduct a preliminary investigation of the matter … If … the Attorney General has determined that there are “reasonable grounds to believe that further investigation or prosecution is warranted,” then he “shall apply to the division of the court for the appointment of an independent counsel … ” With respect to all matters within the independent counsel’s jurisdiction, the Act grants the counsel “full power and independent authority to exercise all investigative and prosecutorial functions and powers of the Department of Justice, the Attorney General, and any other officer or employee of the Department of Justice … ” The functions of the inde- pendent counsel include conducting grand jury proceedings and other investigations, participating in civil and criminal court proceedings and litigation, and appealing any decision in any case in which the counsel participates in an official capacity … the counsel’s powers include “initiating and conducting prosecutions in any court of competent jurisdiction, framing and signing indictments, filing informations, and handling all aspects of any case, in the name of the United States … ” … An independent counsel has “full authority to dismiss matters within [his or her] prosecutorial jurisdiction without conducting an investigation or at any subsequent time before prosecution, if to do so would be consistent” with Department of Justice policy … Two statutory provisions govern the length of an independent counsel’s tenure in office. The first defines the procedure for removing an independent counsel. Section 596(a)(1) provides: “An independent counsel appointed under this chapter may be removed from office, other than by impeachment and conviction, only by the personal action of the Attorney General … ” If an independent counsel is removed pursuant to this section, the Attorney General is required to submit a report to both the Special Division and the Judiciary Committees of the Senate and the House “specifying the facts found and the ultimate grounds for such removal.” § 596(a)(2). Under the current version of the Act, an independent counsel can obtain judicial review of the Attorney General’s action by filing a civil action in the United States District Court for the District of Columbia … The reviewing court is authorized to grant reinstatement or “other appropriate relief.” § 596(a)(3) … The other provision governing the tenure of the independent counsel defines the procedures for “terminating” the coun- sel’s office. Under § 596(b)(1), the office of an independent counsel terminates when he or she notifies the Attorney Gen- eral that he or she has completed or substantially completed any investigations or prosecutions undertaken pursuant to the Act … 69 | APPOINTMENT AND REMOVAL POWERS Finally, the Act provides for congressional oversight of the activities of independent counsel … On April 23, 1986, the Special Division appointed James C. McKay as independent counsel to investigate “whether the testimony of … Olson and his revision of such testimony on March 10, 1983, violated either 18 U. S. C. § 1505 or § 1001, or any other provision of federal law … ” McKay later resigned as independent counsel, and on May 29, 1986, the Division appointed appellant Morrison as his replacement, with the same jurisdiction … [I]n May and June 1987, appellant caused a grand jury to issue and serve … on appellees. All three appellees moved to quash the subpoenas, claiming, among other things, that the independent counsel provisions of the Act were unconsti- tutional and that appellant accordingly had no authority to proceed … The initial question is, accordingly, whether appellant is an “inferior” or a “principal” officer … If she is the latter, as the Court of Appeals concluded, then the Act is in violation of the Appointments Clause. The line between “inferior” and “principal” officers is one that is far from clear, and the Framers provided little guidance into where it should be drawn … [I]n our view appellant clearly falls on the “inferior officer” side of that line. Several factors lead to this conclusion. First, appellant is subject to removal by a higher Executive Branch official. Although appellant may not be “subordinate” to the Attorney General (and the President) insofar as she possesses a degree of independent discretion to exercise the powers delegated to her under the Act, the fact that she can be removed by the Attorney General indicates that she is to some degree “inferior” in rank and authority. Second, appellant is empowered by the Act to perform only certain, limited duties … Admittedly, the Act delegates to appellant “full power and independent authority to exercise all investigative and prosecutorial functions and powers of the Department of Justice,” § 594(a), but this grant of authority does not include any authority to formulate policy for the Government or the Executive Branch, nor does it give appellant any administrative duties outside of those necessary to operate her office. The Act specifically provides that in policy matters appellant is to comply to the extent possible with the policies of the Department … Third, appellant’s office is limited in jurisdiction. Not only is the Act itself restricted in applicability to certain federal officials suspected of certain serious federal crimes, but an independent counsel can only act within the scope of the juris- diction that has been granted by the Special Division pursuant to a request by the Attorney General. Finally, appellant’s office is limited in tenure. There is concededly no time limit on the appointment of a particular counsel. Nonetheless, the office of independent counsel is “temporary” in the sense that an independent counsel is appointed essentially to accomplish a single task, and when that task is over the office is terminated, either by the counsel herself or by action of the Special Division. Unlike other prosecutors, appellant has no ongoing responsibilities that extend beyond the accom- plishment of the mission that she was appointed for and authorized by the Special Division to undertake. In our view, these factors relating to the “ideas of tenure, duration … and duties” of the independent counsel, Germaine, are sufficient to establish that appellant is an “inferior” officer in the constitutional sense. This conclusion is consistent with our few previous decisions that considered the question whether a particular Govern- ment official is a “principal” or an “inferior” officer … APPOINTMENT AND REMOVAL POWERS | 70 Appellees argue that even if appellant is an “inferior” officer, the Clause does not empower Congress to place the power to appoint such an officer outside the Executive Branch. They contend that the Clause does not contemplate congres- sional authorization of “interbranch appointments,” in which an officer of one branch is appointed by officers of another branch. The relevant language of the Appointments Clause is worth repeating. It reads: ” … but the Congress may by Law vest the Appointment of such inferior Officers, as they think proper, in the President alone, in the courts of Law, or in the Heads of Departments.” On its face, the language of this “excepting clause” admits of no limitation on interbranch appointments. Indeed, the inclusion of “as they think proper” seems clearly to give Congress significant discretion to determine whether it is “proper” to vest the appointment of, for example, executive officials in the “courts of Law … ” We also note that the history of the Clause provides no support for appellees’ position … We do not mean to say that Congress’ power to provide for interbranch appointments of “inferior officers” is unlimited. In addition to separation-of-powers concerns, which would arise if such provisions for appointment had the potential to impair the constitutional functions assigned to one of the branches, Ex parte Siebold (1879) itself suggested that Con- gress’ decision to vest the appointment power in the courts would be improper if there was some “incongruity” between the functions normally performed by the courts and the performance of their duty to appoint … In this case, however, we do not think it impermissible for Congress to vest the power to appoint independent counsel in a specially created federal court … We now turn to consider whether the Act is invalid under the constitutional principle of separation of powers. Two related issues must be addressed: The first is whether the provision of the Act restricting the Attorney General’s power to remove the independent counsel to only those instances in which he can show “good cause,” taken by itself, impermis- sibly interferes with the President’s exercise of his constitutionally appointed functions. The second is whether, taken as a whole, the Act violates the separation of powers by reducing the President’s ability to control the prosecutorial powers wielded by the independent counsel. Unlike both Bowsher and Myers, this case does not involve an attempt by Congress itself to gain a role in the removal of executive officials other than its established powers of impeachment and conviction. The Act instead puts the removal power squarely in the hands of the Executive Branch; an independent counsel may be removed from office, “only by the personal action of the Attorney General, and only for good cause.” § 596(a)(1) … There is no requirement of congres- sional approval of the Attorney General’s removal decision, though the decision is subject to judicial review. § 596(a)(3). In our view, the removal provisions of the Act make this case more analogous to Humphrey’s Executor v. United States, (1935), and Wiener v. United States, (1958), than to Myers or Bowsher … Appellees contend that Humphrey’s Executor and Wiener are distinguishable from this case because they did not involve officials who performed a “core executive function.” They argue that our decision in Humphrey’s Executor rests on a distinction between “purely executive” officials and officials who exercise “quasi-legislative” and “quasi-judicial” powers. In their view, when a “purely executive” official is involved, the governing precedent is Myers, not Humphrey’s Executor. And, under Myers, the President must have absolute discretion to discharge “purely” executive officials at will … We undoubtedly did rely on the terms “quasi-legislative” and “quasi-judicial” to distinguish the officials involved in Humphrey’s Executor and Wiener from those in Myers, but our present considered view is that the determination of whether the Constitution allows Congress to impose a “good cause”-type restriction on the President’s power to remove 71 | APPOINTMENT AND REMOVAL POWERS an official cannot be made to turn on whether or not that official is classified as “purely executive … ” The analysis con- tained in our removal cases is designed not to define rigid categories of those officials who may or may not be removed at will by the President … but to ensure that Congress does not interfere with the President’s exercise of the “execu- tive power” and his constitutionally appointed duty to “take care that the laws be faithfully executed” under Article II. Myers was undoubtedly correct in its holding, and in its broader suggestion that there are some “purely executive” officials who must be removable by the President at will if he is to be able to accomplish his constitutional role … But as the Court noted in Wiener: “The assumption was short-lived that the Myers case recognized the President’s inherent constitutional power to remove officials no matter what the relation of the executive to the discharge of their duties and no matter what restrictions Con- gress may have imposed regarding the nature of their tenure … ” [T]he real question is whether the removal restrictions are of such a nature that they impede the President’s ability to perform his constitutional duty, and the functions of the officials in question must be analyzed in that light. Considering for the moment the “good cause” removal provision in isolation from the other parts of the Act at issue in this case, we cannot say that the imposition of a “good cause” standard for removal by itself unduly trammels on executive authority. There is no real dispute that the functions performed by the independent counsel are “executive” in the sense that they are law enforcement functions that typically have been undertaken by officials within the Executive Branch. As we noted above, however, the independent counsel is an inferior officer under the Appointments Clause … we simply do not see how the President’s need to control the exercise of that discretion is so central to the functioning of the Executive Branch as to require as a matter of constitutional law that the counsel be terminable at will by the President … Nor do we think that the “good cause” removal provision at issue here impermissibly burdens the President’s power to control or supervise the independent counsel, as an executive official, in the execution of his or her duties under the Act. This is not a case in which the power to remove an executive official has been completely stripped from the President, thus providing no means for the President to ensure the “faithful execution” of the laws. Rather, because the indepen- dent counsel may be terminated for “good cause,” the Executive, through the Attorney General, retains ample authority to assure that the counsel is competently performing his or her statutory responsibilities in a manner that comports with the provisions of the Act … Here, as with the provision of the Act conferring the appointment authority of the indepen- dent counsel on the special court, the congressional determination to limit the removal power of the Attorney General was essential, in the view of Congress, to establish the necessary independence of the office. We do not think that this limitation as it presently stands sufficiently deprives the President of control over the independent counsel to interfere impermissibly with his constitutional obligation to ensure the faithful execution of the laws … The final question to be addressed is whether the Act, taken as a whole, violates the principle of separation of powers by unduly interfering with the role of the Executive Branch. Time and again we have reaffirmed the importance in our con- stitutional scheme of the separation of governmental powers into the three coordinate branches … We have not hesitated to invalidate provisions of law which violate this principle. On the other hand, we have never held that the Constitution requires that the three branches of Government “operate with absolute independence … ” In the often-quoted words of Justice Jackson: APPOINTMENT AND REMOVAL POWERS | 72 “While the Constitution diffuses power the better to secure liberty, it also contemplates that practice will integrate the dispersed powers into a workable government. It enjoins upon its branches separateness but interdependence, autonomy but reciprocity.” Youngstown Sheet & Tube Co. v. Sawyer, (1952) (concurring opinion). We observe first that this case does not involve an attempt by Congress to increase its own powers at the expense of the Executive Branch … Indeed, with the exception of the power of impeachment — which applies to all officers of the United States — Congress retained for itself no powers of control or supervision over an independent counsel. The Act does empower certain Members of Congress to request the Attorney General to apply for the appointment of an inde- pendent counsel, but the Attorney General has no duty to comply with the request, although he must respond within a certain time limit. § 592(g). Other than that, Congress’ role under the Act is limited to receiving reports or other informa- tion and oversight of the independent counsel’s activities, § 595(a), functions that we have recognized generally as being incidental to the legislative function of Congress … Similarly, we do not think that the Act works any judicial usurpation of properly executive functions. As should be apparent from our discussion of the Appointments Clause above, the power to appoint inferior officers such as indepen- dent counsel is not in itself an “executive” function in the constitutional sense, at least when Congress has exercised its power to vest the appointment of an inferior office in the “courts of Law.” … In addition, once the court has appointed a counsel and defined his or her jurisdiction, it has no power to supervise or control the activities of the counsel. … [T]he various powers delegated by the statute to the Division are not supervisory or administrative, nor are they functions that the Constitution requires be performed by officials within the Executive Branch. The Act does give a federal court the power to review the Attorney General’s decision to remove an independent counsel, but in our view this is a function that is well within the traditional power of the Judiciary. Finally, we do not think that the Act “impermissibly undermine[s]” the powers of the Executive Branch … or “disrupts the proper balance between the coordinate branches [by] prevent[ing] the Executive Branch from accomplishing its con- stitutionally assigned functions … ” It is undeniable that the Act reduces the amount of control or supervision that the Attorney General and, through him, the President exercises over the investigation and prosecution of a certain class of alleged criminal activity … The Act … gives the Executive a degree of control over the power to initiate an investigation by the independent counsel. In addition, the jurisdiction of the independent counsel is defined with reference to the facts submitted by the Attorney General, and once a counsel is appointed, the Act requires that the counsel abide by Justice Department policy unless it is not “possible” to do so. Notwithstanding the fact that the counsel is to some degree “inde- pendent” and free from executive supervision to a greater extent than other federal prosecutors, in our view these features of the Act give the Executive Branch sufficient control over the independent counsel to ensure that the President is able to perform his constitutionally assigned duties. In sum, we conclude today that it does not violate the Appointments Clause for Congress to vest the appointment of independent counsel in the Special Division; that the powers exercised by the Special Division under the Act do not vio- late Article III; and that the Act does not violate the separation-of-powers principle by impermissibly interfering with the functions of the Executive Branch. The decision of the Court of Appeals is therefore Reversed. JUSTICE KENNEDY took no part in the consideration or decision of this case. 73 | APPOINTMENT AND REMOVAL POWERS Original excerpt in Lawrence Lessig, Constitutional Law: Separation of Powers, Federalism, and Fourteenth Amendment, published by H2O. Further excerpted by Alexandria Metzdorf. Licensed under CC BY-NC-SA. § NLRB v. Canning 573 U.S. 513 (2014) Decision: Affirmed Vote: 9-0 Majority: Breyer, joined by Kennedy, Ginsburg, Sotomayor, and Kagan Concurrence: Scalia (in judgment), joined by Roberts, Thomas, and Alito Note: A pro forma session is defined as “From the Latin, meaning ‘as a matter of form,’ a pro forma session is a brief meeting of the Senate, often only a few minutes in duration.” https://www.senate.gov/general/Features/Ses- sions.htm#:~:text=Pro%20Forma%20Session%3A%20From%20the,following%20the%20November%20gen- eral%20elections. Visit https://www.c-span.org/video/?526638-1/senate-pro-forma-session to see the c-span to view a pro forma session. Justice Breyer delivered the opinion of the Court. Ordinarily the President must obtain “the Advice and Consent of the Senate” before appointing an “Office[r] of the United States.” U. S. Const., Art. II, §2, cl. 2. But the Recess Appointments Clause creates an exception. It gives the Pres- ident alone the power “to fill up all Vacancies that may happen during the Recess of the Senate, by granting Commis- sions which shall expire at the End of their next Session.” Art. II, §2, cl. 3. We here consider three questions about the application of this Clause. The first concerns the scope of the words “recess of the Senate.” Does that phrase refer only to an inter-session recess (i.e., a break between formal sessions of Congress), or does it also include an intra-session recess, such as a summer recess in the midst of a session? We conclude that the Clause applies to both kinds of recess. The second question concerns the scope of the words “vacancies that may happen.” Does that phrase refer only to vacan- cies that first come into existence during a recess, or does it also include vacancies that arise prior to a recess but continue to exist during the recess? We conclude that the Clause applies to both kinds of vacancy. The third question concerns calculation of the length of a “recess.” The President made the appointments here at issue on January 4, 2012. At that time the Senate was in recess pursuant to a December 17, 2011, resolution providing for a series of brief recesses punctuated by “pro forma session[s],” with “no business … transacted,” every Tuesday and Friday through January 20, 2012 … In calculating the length of a recess are we to ignore the pro forma sessions, thereby treating the series of brief recesses as a single, month-long recess? We conclude that we cannot ignore these pro forma sessions. APPOINTMENT AND REMOVAL POWERS | 74 Our answer to the third question means that, when the appointments before us took place, the Senate was in the midst of a 3-day recess. Three days is too short a time to bring a recess within the scope of the Clause. Thus we conclude that the President lacked the power to make the recess appointments here at issue. The case before us arises out of a labor dispute. The National Labor Relations Board (NLRB) found that a Pepsi-Cola distributor, Noel Canning, had unlawfully refused to reduce to writing and execute a collective-bargaining agreement with a labor union. The Board ordered the distributor to execute the agreement and to make employees whole for any losses … The Pepsi-Cola distributor subsequently asked the Court of Appeals for the District of Columbia Circuit to set the Board’s order aside. It claimed that three of the five Board members had been invalidly appointed, leaving the Board with- out the three lawfully appointed members necessary for it to act … The three members in question were Sharon Block, Richard Griffin, and Terence Flynn. In 2011 the President had nom- inated each of them to the Board. As of January 2012, Flynn’s nomination had been pending in the Senate awaiting confirmation for approximately a year. The nominations of each of the other two had been pending for a few weeks. On January 4, 2012, the President, invoking the Recess Appointments Clause, appointed all three to the Board. The distributor argued that the Recess Appointments Clause did not authorize those appointments. It pointed out that on December 17, 2011, the Senate, by unanimous consent, had adopted a resolution providing that it would take a series of brief recesses beginning the following day … Pursuant to that resolution, the Senate held pro forma sessions every Tuesday and Friday until it returned for ordinary business on January 23, 2012 … The President’s January 4 appoint- ments were made between the January 3 and January 6 pro forma sessions. In the distributor’s view, each pro forma session terminated the immediately preceding recess. Accordingly, the appointments were made during a 3-day adjourn- ment, which is not long enough to trigger the Recess Appointments Clause. The Court of Appeals agreed that the appointments fell outside the scope of the Clause. But the court set forth different reasons … Since the second session of the 112th Congress began on January 3, 2012, the day before the President’s appointments, those appointments occurred during an intra-session recess, and the appointments consequently fell out- side the scope of the Clause … We asked the parties to address not only the Court of Appeals’ interpretation of the Clause but also the distributor’s initial argument, namely, “[w]hether the President’s recess-appointment power may be exercised when the Senate is con- vening every three days in pro forma sessions … ” … [T]he Recess Appointments Clause reflects the tension between, on the one hand, the President’s continuous need for “the assistance of subordinates,” Myers v. United States, (1926), and, on the other, the Senate’s practice, particularly dur- ing the Republic’s early years, of meeting for a single brief session each year … We seek to interpret the Clause as granting the President the power to make appointments during a recess but not offering the President the authority routinely to avoid the need for Senate confirmation. 75 | APPOINTMENT AND REMOVAL POWERS Second, in interpreting the Clause, we put significant weight upon historical practice. For one thing, the interpretive questions before us concern the allocation of power between two elected branches of Government. Long ago Chief Jus- tice Marshall wrote that “a doubtful question, one on which human reason may pause, and the human judgment be suspended, in the decision of which the great principles of liberty are not concerned, but the respective powers of those who are equally the representa- tives of the people, are to be adjusted; if not put at rest by the practice of the government, ought to receive a considerable impression from that practice.” McCulloch v. Maryland, (1819) … The first question concerns the scope of the phrase “the recess of the Senate … ” The Constitution provides for congres- sional elections every two years. And the 2-year life of each elected Congress typically consists of two formal 1-year ses- sions, each separated from the next by an “inter-session recess … ” The Senate or the House of Representatives announces an inter-session recess by approving a resolution stating that it will “adjourn sine die,” i.e., without specifying a date to return (in which case Congress will reconvene when the next formal session is scheduled to begin). The Senate and the House also take breaks in the midst of a session. The Senate or the House announces any such “intra- session recess” by adopting a resolution stating that it will “adjourn” to a fixed date, a few days or weeks or even months later. All agree that the phrase “the recess of the Senate” covers inter-session recesses. The question is whether it includes intra-session recesses as well. In our view, the phrase “the recess” includes an intra-session recess of substantial length … History … shows only that Congress generally took long breaks between sessions, while taking no significant intra-session breaks at all (five times it took a break of a week or so at Christmas) … In 1867 and 1868, Congress for the first time took substantial, nonholiday intra-session breaks, and President Andrew Johnson made dozens of recess appointments. The Federal Court of Claims upheld one of those specific appointments, writing “[w]e have no doubt that a vacancy occur- ring while the Senate was thus temporarily adjourned” during the “first session of the Fortieth Congress” was “legally filled by appointment of the President alone.” Gould v. United States, (1884) … … [R]estricting the Clause to inter-session recesses would frustrate its purpose. It would make the President’s recess- appointment power dependent on a formalistic distinction of Senate procedure. Moreover, the President has consis- tently and frequently interpreted the word “recess” to apply to intra-session recesses, and has acted on that interpretation. The Senate as a body has done nothing to deny the validity of this practice for at least three-quarters of a century … [A] 3-day recess would be too short … The Adjournments Clause reflects the fact that a 3-day break is not a significant interruption of legislative business. As the Solicitor General says, it is constitutionally de minimis. A Senate recess that is so short that it does not require the consent of the House is not long enough to trigger the President’s recess-appoint- ment power. In sum, we conclude that the phrase “the recess” applies to both intra-session and inter-session recesses. If a Senate recess is so short that it does not require the consent of the House, it is too short to trigger the Recess Appointments Clause. See Art. I, §5, cl. 4. And a recess lasting less than 10 days is presumptively too short as well. Applying this standard, we find that the pro forma sessions were sessions for purposes of the Clause. First, the Senate said it was in session. The Journal of the Senate and the Congressional Record indicate that the Senate convened for a series of twice-weekly “sessions” from December 20 through January 20 … Second, the Senate’s rules make clear that during its pro forma sessions, despite its resolution that it would conduct no business, the Senate retained the power to conduct business. During any pro forma session, the Senate could have con- ducted business simply by passing a unanimous consent agreement … It is consequently unsurprising that the Senate has enacted legislation during pro forma sessions even when it has said that no business will be transacted. Indeed, the Senate passed a bill by unanimous consent during the second pro forma session after its December 17 adjournment … The Recess Appointments Clause responds to a structural difference between the Executive and Legislative Branches: The Executive Branch is perpetually in operation, while the Legislature only acts in intervals separated by recesses. The purpose of the Clause is to allow the Executive to continue operating while the Senate is unavailable. We believe that the Clause’s text, standing alone, is ambiguous. It does not resolve whether the President may make appointments during intra-session recesses, or whether he may fill pre-recess vacancies. But the broader reading better serves the Clause’s struc- tural function. Moreover, that broader reading is reinforced by centuries of history, which we are hesitant to disturb. We thus hold that the Constitution empowers the President to fill any existing vacancy during any recess—intra-session or inter-session—of sufficient length. Given our answer to the last question before us, we conclude that the Recess Appointments Clause does not give the President the constitutional authority to make the appointments here at issue. Because the Court of Appeals reached the same ultimate conclusion (though for reasons we reject), its judgment is affirmed. It is so ordered. Justice Scalia, with whom The Chief Justice, Justice Thomas, and Justice Alito join, concurring in the judgment. Except where the Constitution or a valid federal law provides otherwise, all “Officers of the United States” must be appointed by the President “by and with the Advice and Consent of the Senate.” U. S. Const., Art. II, §2, cl. 2. That general rule is subject to an exception: “The President shall have Power to fill up all Vacancies that may happen during the Recess of the Senate, by granting Commissions which shall expire at the End of their next Session.” Id., §2, cl. 3. This case requires us to decide whether the Recess Appointments Clause authorized three appointments made by President Obama to the National Labor Relations Board in January 2012 without the Senate’s consent. To prevent the President’s recess-appointment power from nullifying the Senate’s role in the appointment process, the Constitution cabins that power in two significant ways. First, it may be exercised only in “the Recess of the Senate,” that is, the intermission between two formal legislative sessions. Second, it may be used to fill only those vacancies that “hap- pen during the Recess,” that is, offices that become vacant during that intermission. Both conditions are clear from the Constitution’s text and struc ture, and both were well understood at the founding. The Court of Appeals correctly held that the appointments here at issue are invalid because they did not meet either condition … The Court’s decision transforms the recess-appointment power from a tool carefully designed to fill a narrow and specific need into a weapon to be wielded by future Presidents against future Senates. To reach that result, the majority casts aside APPOINTMENT AND REMOVAL POWERS | 78 the plain, original meaning of the constitutional text in deference to late-arising historical practices that are ambiguous at best. The majority’s insistence on deferring to the Executive’s untenably broad interpretation of the power is in clear conflict with our precedent and forebodes a diminution of this Court’s role in controversies involving the separation of powers and the structure of government. I concur in the judgment only … The first question presented is whether “the Recess of the Senate,” during which the President’s recess-appointment power is active, is (a) the period between two of the Senate’s formal sessions, or (b) any break in the Senate’s proceedings. I would hold that “the Recess” is the gap between sessions and that the appointments at issue here are invalid because they undisputedly were made during the Senate’s session. The Court’s contrary conclusion—that “the Recess” includes “breaks in the midst of a session,” ante, at 9—is inconsistent with the Constitution’s text and structure, and it requires judicial fabrication of vague, unadministrable limits on the recess-appointment power (thus defined) that overstep the judicial role. And although the majority relies heavily on “historical practice,” no practice worthy of our deference sup- ports the majority’s conclusion on this issue … What does all this amount to? In short: Intra-session recess appointments were virtually unheard of for the first 130 years of the Republic, were deemed unconstitutional by the first Attorney General to address them, were not openly defended by the Executive until 1921, were not made in significant numbers until after World War II, and have been repeatedly criticized as unconstitutional by Senators of both parties. It is astonishing for the majority to assert that this history lends “strong support,” ante, at 11, to its interpretation of the Recess Appointments Clause. The second question presented is whether vacancies that “happen during the Recess of the Senate,” which the President is empowered to fill with recess appointments, are (a) vacancies that arise during the recess, or (b) all vacancies that exist during the recess, regardless of when they arose. I would hold that the recess-appointment power is limited to vacancies that arise during the recess in which they are filled, and I would hold that the appointments at issue here—which undisputedly filled pre-recess vacancies—are invalid for that reason as well as for the reason that they were made during the session. The Court’s contrary conclusion is inconsistent with the Constitution’s text and structure, and it further undermines the balance the Framers struck between Presidential and Senatorial power. Historical practice also fails to support the majority’s conclusion on this issue … In sum: Washington’s and Adams’ Attorneys General read the Constitution to restrict recess appointments to vacancies arising during the recess, and there is no evidence that any of the first four Presidents consciously departed from that reading. The contrary reading was first defended by an executive official in 1823, was vehemently rejected by the Senate in 1863, was vigorously resisted by legislation in place from 1863 until 1940, and is arguably inconsistent with legislation in place from 1940 to the present. The Solicitor General has identified only about 100 appointments that have ever been made under the broader reading, and while it seems likely that a good deal more have been made in the last few decades, there is good reason to doubt that many were made before 1940 (since the appointees could not have been compensated). I can conceive of no sane constitutional theory under which this evidence of “historical practice”—which is actually evi- dence of a long-simmering inter-branch conflict—would require us to defer to the views of the Executive Branch … What the majority needs to sustain its judgment is an ambiguous text and a clear historical practice. What it has is a clear text and an at-best-ambiguous historical practice … 79 | APPOINTMENT AND REMOVAL POWERS The real tragedy of today’s decision is not simply the abolition of the Constitution’s limits on the recess-appointment power and the substitution of a novel framework invented by this Court. It is the damage done to our separation-of- powers jurisprudence more generally. It is not every day that we encounter a proper case or controversy requiring inter- pretation of the Constitution’s structural provisions. Most of the time, the interpretation of those provisions is left to the political branches—which, in deciding how much respect to afford the constitutional text, often take their cues from this Court. We should therefore take every opportunity to affirm the primacy of the Constitution’s enduring principles over the politics of the moment. Our failure to do so today will resonate well beyond the particular dispute at hand. Sad, but true: The Court’s embrace of the adverse-possession theory of executive power (a characterization the majority resists but does not refute) will be cited in diverse contexts, including those presently unimagined, and will have the effect of aggrandizing the Presidency beyond its constitutional bounds and undermining respect for the separation of powers. I concur in the judgment only. Excerpted by Alexandria Metzdorf § Lucia v. SEC 585 U.S. ___ (2018) Decision: Reversed and remanded Vote: 7-2 Majority: Kagan, joined by Roberts, Kennedy, Thomas, Alito, and Gorsuch Concurrence: Thomas, joined by Gorsuch Concur/dissent: Breyer, joined by Ginsburg, and Sotomayor (Part III only) Dissent: Sotomayor, joined by Ginsburg Justice Kagan delivered the opinion of the Court. The Appointments Clause of the Constitution lays out the permissible methods of appointing “Officers of the United States,” a class of government officials distinct from mere employees … This case requires us to decide whether adminis- trative law judges (ALJs) of the Securities and Exchange Commission (SEC or Commission) qualify as such “Officers.” In keeping with Freytag v. Commissioner, (1991), we hold that they do … The SEC has statutory authority to enforce the nation’s securities laws. One way it can do so is by instituting an admin- istrative proceeding against an alleged wrongdoer. By law, the Commission may itself preside over such a proceeding … But the Commission also may, and typically does, delegate that task to an ALJ … The SEC currently has five ALJs. Other staff members, rather than the Commission proper, selected them all … APPOINTMENT AND REMOVAL POWERS | 80 An ALJ assigned to hear an SEC enforcement action has extensive powers—the “authority to do all things necessary and appropriate to discharge his or her duties” and ensure a “fair and orderly” adversarial proceeding … As that list suggests, an SEC ALJ exercises authority “comparable to” that of a federal district judge conducting a bench trial. Butz v. Economou, (1978) … This case began when the SEC instituted an administrative proceeding against petitioner Raymond Lucia and his invest- ment company. Lucia marketed a retirement savings strategy called “Buckets of Money.” In the SEC’s view, Lucia used misleading slideshow presentations to deceive prospective clients. The SEC charged Lucia under the Investment Advis- ers Act, and assigned ALJ Cameron Elliot to adjudicate the case. After nine days of testimony and argument, Judge Elliot issued an initial decision concluding that Lucia had violated the Act and imposing sanctions, including civil penalties of $300,000 and a lifetime bar from the investment industry … On appeal to the SEC, Lucia argued that the administrative proceeding was invalid because Judge Elliot had not been constitutionally appointed. According to Lucia, the Commission’s ALJs are “Officers of the United States” and thus subject to the Appointments Clause … [T]he Commission had left the task of appointing ALJs, including Judge Elliot, to SEC staff members … As a result, Lucia contended, Judge Elliot lacked constitutional authority to do his job … The sole question here is whether the Commission’s ALJs are “Officers of the United States” or simply employees of the Federal Government. The Appointments Clause prescribes the exclusive means of appointing “Officers.” Only the Pres- ident, a court of law, or a head of department can do so. Two decisions set out this Court’s basic framework for distinguishing between officers and employees. Germaine v. US (1879) held that “civil surgeons” (doctors hired to perform various physical exams) were mere employees because their duties were “occasional or temporary” rather than “continuing and permanent … ” Stressing “ideas of tenure [and] dura- tion,” the Court there made clear that an individual must occupy a “continuing” position established by law to qualify as an officer. Buckley v. Valeo (1976) then set out another requirement, central to this case. It determined that members of a federal commission were officers only after finding that they “exercis[ed] significant authority pursuant to the laws of the United States … ” The inquiry thus focused on the extent of power an individual wields in carrying out his assigned functions. Both the amicus and the Government urge us to elaborate on Buckley’s “significant authority” test, but another of our precedents makes that project unnecessary … [I]n Freytag v. Commissioner, (1991), we applied the unadorned “signifi- cant authority” test to adjudicative officials who are near-carbon copies of the Commission’s ALJs. As we now explain, our analysis there (sans any more detailed legal criteria) necessarily decides this case. The officials at issue in Freytag were the “special trial judges” (STJs) of the United States Tax Court. The authority of those judges depended on the significance of the tax dispute before them. In “comparatively narrow and minor matters,” they could both hear and definitively resolve a case for the Tax Court … In more major matters, they could preside over the hearing, but could not issue the final decision; instead, they were to “prepare proposed findings and an opinion” for a regular Tax Court judge to consider … 81 | APPOINTMENT AND REMOVAL POWERS This Court held that the Tax Court’s STJs are officers, not mere employees. Citing Germaine, the Court first found that STJs hold a continuing office established by law … They serve on an ongoing, rather than a “temporary [or] episodic[,] basis”; and their “duties, salary, and means of appointment” are all specified in the Tax Code. For all the reasons we have given, and all those Freytag gave before, the Commission’s ALJs are “Officers of the United States,” subject to the Appointments Clause … This Court has held that “one who makes a timely challenge to the con- stitutional validity of the appointment of an officer who adjudicates his case” is entitled to relief. Ryder v. United States, (1995). Lucia made just such a timely challenge: He contested the validity of Judge Elliot’s appointment before the Com- mission, and continued pressing that claim in the Court of Appeals and this Court. So what relief follows? This Court has also held that the “appropriate” remedy for an adjudication tainted with an appointments violation is a new “hearing before a properly appointed” official … And we add today one thing more. That official cannot be Judge Elliot, even if he has by now received (or receives sometime in the future) a constitutional appointment. Judge Elliot has already both heard Lucia’s case and issued an initial decision on the merits. He cannot be expected to consider the matter as though he had not adjudicated it before. To cure the constitutional error, another ALJ (or the Commission itself) must hold the new hearing to which Lucia is entitled. We accordingly reverse the judgment of the Court of Appeals and remand the case for further proceedings consistent with this opinion. It is so ordered. Note: In June of 2020, Lucia entered a settlement with the SEC which banned Lucia from the securities industry, though he could reapply for admittance, and included a fine of $25,000.00. (see https://www.investmentnews.com/sec-ray-lucia- settle-lawsuit-194238, last accessed on April 27, 2023.) § APPOINTMENT AND REMOVAL POWERS | 82 Executive Privilege United States v. Nixon 418 U.S. 683 (1974) Decision: Affirmed Vote: 8-0 Majority: Burger, joined by Douglas, Brennan, Stewart, White, Marshall, Blackmun, and Powell MR. CHIEF JUSTICE BURGER delivered the opinion of the Court. This litigation presents for review the denial of a motion … to quash a third-party subpoena duces tecum issued … pur- suant to Fed. Rule Crim. Proc. 17 (c). The subpoena directed the President to produce certain tape recordings and doc- uments relating to his conversations with aides and advisers … On March 1, 1974, a grand jury of the United States District Court for the District of Columbia returned an indictment charging seven named individuals with various offenses, including conspiracy to defraud the United States and to obstruct justice. Although he was not designated as such in the indictment, the grand jury named the President, among others, as an unindicted coconspirator … [W]e turn to the claim that the subpoena should be quashed because it demands “confidential conversations between a President and his close advisors that it would be inconsistent with the public interest to produce … ” The first contention is a broad claim that the separation of powers doctrine precludes judicial review of a President’s claim of privilege. The second contention is that if he does not prevail on the claim of absolute privilege, the court should hold as a matter of constitutional law that the privilege prevails over the subpoena duces tecum. In the performance of assigned constitutional duties each branch of the Government must initially interpret the Consti- tution, and the interpretation of its powers by any branch is due great respect from the others. The President’s counsel, as we have noted, reads the Constitution as providing an absolute privilege of confidentiality for all Presidential commu- nications. Many decisions of this Court, however, have unequivocally reaffirmed the holding of Marbury v. Madison, (1803), that “[i]t is emphatically the province and duty of the judicial department to say what the law is … ” Since this Court has consistently exercised the power to construe and delineate claims arising under express powers, it must follow that the Court has authority to interpret claims with respect to powers alleged to derive from enumerated powers … Our system of government “requires that federal courts on occasion interpret the Constitution in a manner at variance with the construction given the document by another branch.” Powell v. McCormack, (1969) … And in Baker v. Carr (1961), the Court stated: 83 | EXECUTIVE PRIVILEGE “Deciding whether a matter has in any measure been committed by the Constitution to another branch of government, or whether the action of that branch exceeds whatever authority has been committed, is itself a delicate exercise in con- stitutional interpretation, and is a responsibility of this Court as ultimate interpreter of the Constitution.” Notwithstanding the deference each branch must accord the others, the “judicial Power of the United States” vested in the federal courts by Art. III, § 1, of the Constitution can no more be shared with the Executive Branch than the Chief Executive, for example, can share with the Judiciary the veto power, or the Congress share with the Judiciary the power to override a Presidential veto. Any other conclusion would be contrary to the basic concept of separation of powers and the checks and balances that flow from the scheme of a tripartite government … We therefore reaffirm that it is the province and duty of this Court “to say what the law is” with respect to the claim of privilege presented in this case. In support of his claim of absolute privilege, the President’s counsel urges two grounds, one of which is common to all governments and one of which is peculiar to our system of separation of powers. The first ground is the valid need for protection of communications between high Government officials and those who advise and assist them in the perfor- mance of their manifold duties; the importance of this confidentiality is too plain to require further discussion … The second ground asserted by the President’s counsel in support of the claim of absolute privilege rests on the doctrine of separation of powers. Here it is argued that the independence of the Executive Branch within its own sphere … insu- lates a President from a judicial subpoena in an ongoing criminal prosecution, and thereby protects confidential Presi- dential communications. However, neither the doctrine of separation of powers, nor the need for confidentiality of high-level communications, without more, can sustain an absolute, unqualified Presidential privilege of immunity from judicial process under all cir- cumstances. The President’s need for complete candor and objectivity from advisers calls for great deference from the courts … [W]e find it difficult to accept the argument that even the very important interest in confidentiality of Presi- dential communications is significantly diminished by production of such material for in camera inspection with all the protection that a district court will be obliged to provide. The impediment that an absolute, unqualified privilege would place in the way of the primary constitutional duty of the Judicial Branch to do justice in criminal prosecutions would plainly conflict with the function of the courts under Art. III. In designing the structure of our Government and dividing and allocating the sovereign power among three co-equal branches, the Framers of the Constitution sought to provide a comprehensive system, but the separate powers were not intended to operate with absolute independence … To read the Art. II powers of the President as providing an absolute privilege as against a subpoena essential to enforce- ment of criminal statutes on no more than a generalized claim of the public interest in confidentiality of nonmilitary and nondiplomatic discussions would upset the constitutional balance of “a workable government” and gravely impair the role of the courts under Art. III. Since we conclude that the legitimate needs of the judicial process may outweigh Presidential privilege, it is necessary to resolve those competing interests in a manner that preserves the essential functions of each branch. The right and indeed the duty to resolve that question does not free the Judiciary from according high respect to the representations made on behalf of the President … EXECUTIVE PRIVILEGE | 84 When he signed the Act into law, President George W. Bush issued a statement declaring his position that § 214 would, “if construed as mandatory rather than advisory, impermissibly interfere with the President’s constitutional authority to formulate the position of the United States, speak for the Nation in international affairs, and determine the terms on which recognition is given to foreign states … ” The President concluded, “U.S. policy regarding Jerusalem has not changed … ” In considering claims of Presidential power this Court refers to Justice Jackson’s familiar tripartite framework from Youngstown Sheet & Tube Co. v. Sawyer, (1952) (concurring opinion) … [W]hen “the President takes measures incompatible with the expressed or implied will of Congress … he can rely only upon his own constitutional powers minus any constitutional powers of Congress over the matter.” To succeed in this third category, the President’s asserted power must be both “exclusive” and “conclusive” on the issue … In this case the Secretary contends that § 214(d) infringes on the President’s exclusive recognition power by “requiring the President to contradict his recognition position regarding Jerusalem in official communications with foreign sover- eigns.” In so doing the Secretary acknowledges the President’s power is “at its lowest ebb … ” Because the President’s refusal to implement § 214(d) falls into Justice Jackson’s third category, his claim must be “scrutinized with caution,” and he may rely solely on powers the Constitution grants to him alone … Recognition is a “formal acknowledgment” that a particular “entity possesses the qualifications for statehood” or “that a particular regime is the effective government of a state … ” Recognition is often effected by an express “written or oral declaration … ” It may also be implied—for example, by concluding a bilateral treaty or by sending or receiving diplo- matic agents … Despite the importance of the recognition power in foreign relations, the Constitution does not use the term “recogni- tion,” either in Article II or elsewhere. The Secretary asserts that the President exercises the recognition power based on the Reception Clause, which directs that the President “shall receive Ambassadors and other public Ministers.” Art. II, § 3. As Zivotofsky notes, the Reception Clause received little attention at the Constitutional Convention … At the time of the founding, however, prominent international scholars suggested that receiving an ambassador was tan- tamount to recognizing the sovereignty of the sending state … It is a logical and proper inference, then, that a Clause directing the President alone to receive ambassadors would be understood to acknowledge his power to recognize other nations … The inference that the President exercises the recognition power is further supported by his additional Article II powers. It is for the President, “by and with the Advice and Consent of the Senate,” to “make Treaties, provided two thirds of the Senators present concur.” Art. II, § 2, cl. 2. In addition, “he shall nominate, and by and with the Advice and Consent of the Senate, shall appoint Ambassadors” as well as “other public Ministers and Consuls.” As a matter of constitutional structure, these additional powers give the President control over recognition decisions. At international law, recognition may be effected by different means, but each means is dependent upon Presidential power. In addition to receiving an ambassador, recognition may occur on “the conclusion of a bilateral treaty,” or the “formal initiation of diplomatic relations,” including the dispatch of an ambassador … The Constitution thus assigns the President means to effect recognition on his own initiative. Congress, by contrast, has no constitutional power that PRESIDENTIAL POWERS IN FOREIGN AFFAIRS | 146 would enable it to initiate diplomatic relations with a foreign nation. Because these specific Clauses confer the recogni- tion power on the President, the Court need not consider whether or to what extent the Vesting Clause, which provides that the “executive Power” shall be vested in the President, provides further support for the President’s action here. Art. II, § 1, cl. 1. The text and structure of the Constitution grant the President the power to recognize foreign nations and governments. The question then becomes whether that power is exclusive. The various ways in which the President may unilaterally effect recognition—and the lack of any similar power vested in Congress—suggest that it is. So, too, do functional con- siderations. Put simply, the Nation must have a single policy regarding which governments are legitimate in the eyes of the United States and which are not. Foreign countries need to know, before entering into diplomatic relations or com- merce with the United States, whether their ambassadors will be received; whether their officials will be immune from suit in federal court; and whether they may initiate lawsuits here to vindicate their rights. These assurances cannot be equivocal … It remains true, of course, that many decisions affecting foreign relations—including decisions that may determine the course of our relations with recognized countries—require congressional action. Congress may “regulate Commerce with foreign Nations,” “establish an uniform Rule of Naturalization,” “define and punish Piracies and Felonies commit- ted on the high Seas, and Offences against the Law of Nations,” “declare War,” “grant Letters of Marque and Reprisal,” and “make Rules for the Government and Regulation of the land and naval Forces … ” Although the President alone effects the formal act of recognition, Congress’ powers, and its central role in making laws, give it substantial authority regarding many of the policy determinations that precede and follow the act of recognition itself. If Congress disagrees with the President’s recognition policy, there may be consequences. Formal recognition may seem a hollow act if it is not accompanied by the dispatch of an ambassador, the easing of trade restrictions, and the con- clusion of treaties. And those decisions require action by the Senate or the whole Congress. In practice, then, the President’s recognition determination is just one part of a political process that may require Con- gress to make laws. The President’s exclusive recognition power encompasses the authority to acknowledge, in a formal sense, the legitimacy of other states and governments, including their territorial bounds. Albeit limited, the exclusive recognition power is essential to the conduct of Presidential duties. The formal act of recognition is an executive power that Congress may not qualify. If the President is to be effective in negotiations over a formal recognition determination, it must be evident to his counterparts abroad that he speaks for the Nation on that precise question … Here, history is not all on one side, but on balance it provides strong support for the conclusion that the recognition power is the President’s alone. As Zivotofsky argues, certain historical incidents can be interpreted to support the posi- tion that recognition is a shared power. But the weight of historical evidence supports the opposite view, which is that the formal determination of recognition is a power to be exercised only by the President … As the power to recognize foreign states resides in the President alone, the question becomes whether § 214(d) infringes on the Executive’s consistent decision to withhold recognition with respect to Jerusalem … Section 214(d) requires that, in a passport or consular report of birth abroad, “the Secretary shall, upon the request of the citizen or the citizen’s legal guardian, record the place of birth as Israel” for a “United States citizen born in the city 147 | PRESIDENTIAL POWERS IN FOREIGN AFFAIRS of Jerusalem.” That is, § 214(d) requires the President, through the Secretary, to identify citizens born in Jerusalem who so request as being born in Israel. But according to the President, those citizens were not born in Israel. As a matter of United States policy, neither Israel nor any other country is acknowledged as having sovereignty over Jerusalem. In this way, § 214(d) “directly contradicts” the “carefully calibrated and longstanding Executive branch policy of neutrality toward Jerusalem.” If the power over recognition is to mean anything, it must mean that the President not only makes the initial, formal recognition determination but also that he may maintain that determination in his and his agent’s statements. This con- clusion is a matter of both common sense and necessity. If Congress could command the President to state a recognition position inconsistent with his own, Congress could override the President’s recognition determination … Although the statement required by § 214(d) would not itself constitute a formal act of recognition, it is a mandate that the Executive contradict his prior recognition determination in an official document issued by the Secretary of State … As a result, it is unconstitutional. This is all the more clear in light of the longstanding treatment of a passport’s place- of-birth section as an official executive statement implicating recognition … The Secretary’s position on this point has been consistent: He will not place information in the place-of-birth section of a passport that contradicts the President’s recognition policy … If a citizen objects to the country listed as sovereign over his place of birth, then the Secretary will accommodate him by listing the city or town of birth rather than the country … But the Secretary will not list a sovereign that contradicts the President’s recognition policy in a passport. Thus, the Secretary will not list “Israel” in a passport as the country containing Jerusalem … From the face of § 214, from the legislative history, and from its reception, it is clear that Congress wanted to express its displeasure with the President’s policy by, among other things, commanding the Executive to contradict his own, earlier stated position on Jerusalem. This Congress may not do. It is true, as Zivotofsky notes, that Congress has substantial authority over passports … The Court does not question the power of Congress to enact passport legislation of wide scope … The problem with § 214(d), however, lies in how Congress exercised its authority over passports. It was an improper act for Congress to “aggrandiz[e] its power at the expense of another branch” by requiring the President to contradict an ear- lier recognition determination in an official document issued by the Executive Branch. Freytag v. Commissioner, (1991). To allow Congress to control the President’s communication in the context of a formal recognition determination is to allow Congress to exercise that exclusive power itself. As a result, the statute is unconstitutional … In holding § 214(d) invalid the Court does not question the substantial powers of Congress over foreign affairs in general or passports in particular. This case is confined solely to the exclusive power of the President to control recognition deter- minations, including formal statements by the Executive Branch acknowledging the legitimacy of a state or government and its territorial bounds. Congress cannot command the President to contradict an earlier recognition determination in the issuance of passports. The judgment of the Court of Appeals for the District of Columbia Circuit is Affirmed. PRESIDENTIAL POWERS IN FOREIGN AFFAIRS | 148 Excerpted by Alexandria Metzdorf Justice Scalia, with whom The Chief Justice and Justice Alito join, dissenting. Before this country declared independence, the law of England entrusted the King with the exclusive care of his king- dom’s foreign affairs. The royal prerogative included the “sole power of sending ambassadors to foreign states, and receiv- ing them at home,” the sole authority to “make treaties, leagues, and alliances with foreign states and princes,” “the sole prerogative of making war and peace,” and the “sole power of raising and regulating fleets and armies.” W. Blackstone, Commentaries. The People of the United States had other ideas when they organized our Government. They considered a sound structure of balanced powers essential to the preservation of just government, and international relations formed no exception to that principle. The People therefore adopted a Constitution that divides responsibility for the Nation’s foreign concerns between the legislative and executive departments. The Constitution gave the President the “executive Power,” authority to send and responsibility to receive ambassadors, power to make treaties, and command of the Army and Navy—though they qual- ified some of these powers by requiring consent of the Senate. Art. II, §§1–3. At the same time, they gave Congress pow- ers over war, foreign commerce, naturalization, and more. Art. I, §8. “Fully eleven of the powers that Article I, §8 grants Congress deal in some way with foreign affairs.” L. Tribe, American Constitutional Law, §5–18, p. 965. This case arises out of a dispute between the Executive and Legislative Branches about whether the United States should treat Jerusalem as a part of Israel. The Constitution contemplates that the political branches will make policy about the territorial claims of foreign nations the same way they make policy about other international matters: The President will exercise his powers on the basis of his views, Congress its powers on the basis of its views. That is just what has happened here. The political branches of our Government agree on the real-world fact that Israel controls the city of Jerusalem … They disagree, however, about how official documents should record the birthplace of an American citizen born in Jerusalem. The Executive does not accept any state’s claim to sovereignty over Jerusalem, and it maintains that the birthplace des- ignation “Israel” would clash with this stance of neutrality. But the National Legislature has enacted a statute that pro- vides: “For purposes of the registration of birth, certification of nationality, or issuance of a passport of a United States citizen born in the city of Jerusalem, the Secretary [of State] shall, upon the request of the citizen or the citizen’s legal guardian, record the place of birth as Israel.” Foreign Relations Authorization Act, Fiscal Year 2003, §214(d). Menachem Zivotofsky’s parents seek enforcement of this statutory right in the issuance of their son’s passport and consular report of birth abroad … Before turning to Presidential power under Article II, I think it well to establish the statute’s basis in congressional power under Article I. Congress’s power to “establish an uniform Rule of Naturalization,” Art. I, §8, cl. 4, enables it to grant American citizenship to someone born abroad. United States v. Wong Kim Ark., (1898). The naturalization power also enables Congress to furnish the people it makes citizens with papers verifying their citizenship—say a consular report of birth abroad (which certifies citizenship of an American born outside the United States) or a passport (which certifies cit- izenship for purposes of international travel). As the Necessary and Proper Clause confirms, every congressional power 149 | PRESIDENTIAL POWERS IN FOREIGN AFFAIRS “carries with it all those incidental powers which are necessary to its complete and effectual execution.” Cohens v. Vir- ginia, (1821). Even on a miserly understanding of Congress’s incidental authority, Congress may make grants of citizen- ship “effectual” by providing for the issuance of certificates authenticating them. One would think that if Congress may grant Zivotofsky a passport and a birth report, it may also require these papers to record his birthplace as “Israel.” … No doubt congressional discretion in executing legislative powers has its limits; Congress’s chosen approach must be not only “necessary” to carrying its powers into execution, but also “proper.” Congress thus may not transcend boundaries upon legislative authority stated or implied elsewhere in the Constitution. But as we shall see, §214(d) does not transgress any such restriction. The Court frames this case as a debate about recognition. Recognition is a sovereign’s official acceptance of a status under international law … To know all this is to realize at once that §214(d) has nothing to do with recognition. Section 214(d) does not require the Secretary to make a formal declaration about Israel’s sovereignty over Jerusalem. And nobody suggests that international custom infers acceptance of sovereignty from the birthplace designation on a passport or birth report, as it does from bilateral treaties or exchanges of ambassadors. Recognition would preclude the United States (as a matter of international law) from later contesting Israeli sovereignty over Jerusalem. But making a notation in a passport or birth report does not encumber the Republic with any international obligations. It leaves the Nation free (so far as international law is con- cerned) to change its mind in the future. That would be true even if the statute required all passports to list “Israel.” But in fact it requires only those passports to list “Israel” for which the citizen (or his guardian) requests “Israel”; all the rest, under the Secretary’s policy, list “Jerusalem.” It is utterly impossible for this deference to private requests to constitute an act that unequivocally manifests an intention to grant recognition. … The best indication that §214(d) does not concern recognition comes from the State Department’s policies concerning Taiwan. According to the Solicitor General, the United States “acknowledges the Chinese position” that Taiwan is a part of China, but “does not take a position” of its own on that issue. Brief for Respondent 51–52. Even so, the State Depart- ment has for a long time recorded the birthplace of a citizen born in Taiwan as “China.” It indeed insisted on doing so until Congress passed a law (on which §214(d) was modeled) giving citizens the option to have their birthplaces recorded as “Taiwan.” The Solicitor General explains that the designation “China” “involves a geographic description, not an asser- tion that Taiwan is … part of sovereign China.” Brief for Respondent 51–52. Quite so. Section 214(d) likewise calls for nothing beyond a “geographic description”; it does not require the Executive even to assert, never mind formally recog- nize, that Jerusalem is a part of sovereign Israel … Even if the Constitution gives the President sole power to extend recognition, it does not give him sole power to make all decisions relating to foreign disputes over sovereignty. To the contrary, a fair reading of Article I allows Congress to decide for itself how its laws should handle these controversies … PRESIDENTIAL POWERS IN FOREIGN AFFAIRS | 150 The Constitution likewise does not give the President exclusive power to determine which claims to statehood and terri- tory “are legitimate in the eyes of the United States,” ante, at 11. Congress may express its own views about these matters by declaring war, restricting trade, denying foreign aid, and much else besides … No consistent or coherent theory supports the Court’s decision … International disputes about statehood and territory are neither rare nor obscure. Leading foreign debates during the 19th century concerned how the United States should respond to revolutions in Latin America, Texas, Mexico, Hawaii, Cuba. During the 20th century, attitudes toward Communist governments in Russia and China became conspicuous subjects of agitation. Disagreements about Taiwan, Kashmir, and Crimea remain prominent today. A President empow- ered to decide all questions relating to these matters, immune from laws embodying congressional disagreement with his position, would have un- controlled mastery of a vast share of the Nation’s foreign affairs. That is not the chief magistrate under which the American People agreed to live when they adopted the national charter. They believed that “[t]he accumulation of all powers, legislative, executive, and judiciary, in the same hands, … may justly be pronounced the very definition of tyranny.” The Federalist No. 47, p. 301 (Madison). For this reason, they did not entrust either the President or Congress with sole power to adopt uncontradictable policies about any subject—foreign- sovereignty disputes included. They instead gave each political department its own powers, and with that the freedom to contradict the other’s policies. Under the Constitution they approved, Congress may require Zivotofsky’s passport and birth report to record his birthplace as Israel, even if that requirement clashes with the President’s preference for neutral- ity about the status of Jerusalem. I dissent. Excerpted by Rorie Solberg § Trump v. Hawaii 585 U.S. ___ (2018) Decision: Reversed and remanded Vote: 5-4 Majority: Roberts, joined by Kennedy, Thomas, Alito, and Gorsuch Concurrence: Kennedy Concurrence: Thomas Dissent: Breyer, joined by Kagan Dissent: Sotomayor, joined by Ginsburg Chief Justice Roberts delivered the opinion of the Court. 151 | PRESIDENTIAL POWERS IN FOREIGN AFFAIRS Under the Immigration and Nationality Act, foreign nationals seeking entry into the United States undergo a vetting process to ensure that they satisfy the numerous requirements for admission. The Act also vests the President with authority to restrict the entry of aliens when- ever he finds that their entry “would be detrimental to the interests of the United States.” 8 U. S. C. §1182(f). Relying on that delegation, the President concluded that it was necessary to impose entry restrictions on nationals of countries that do not share adequate information for an informed entry determination, or that otherwise present national security risks. Presidential Proclamation No. 9645 (Proclamation). The plaintiffs in this litigation, respondents here, challenged the application of those entry restrictions to certain aliens abroad. We now decide whether the President had authority under the Act to issue the Proclamation, and whether the entry policy vio- lates the Establishment Clause of the First Amendment … DHS collected and evaluated data regarding all foreign governments. §1(d). It identified 16 countries as having deficient information-sharing practices and presenting national security concerns, and another 31 countries as “at risk” of similarly failing to meet the baseline. §1(e). The State Department then undertook diplomatic efforts over a 50-day period to encourage all foreign governments to improve their practices. §1(f ). As a result of that effort, numerous countries pro- vided DHS with travel document exemplars and agreed to share information on known or suspected terrorists. Following the 50-day period, the Acting Secretary of Homeland Security concluded that eight countries—Chad, Iran, Iraq, Libya, North Korea, Syria, Venezuela, and Yemen—remained deficient in terms of their risk profile and willingness to provide requested information. The Acting Secretary recommended that the President impose entry restrictions on certain nationals from all of those countries except Iraq … Plaintiffs challenged the Proclamation—except as applied to North Korea and Venezuela—on several grounds. As rele- vant here, they argued that the Proclamation contravenes provisions in the Immigration and Nationality Act (INA) … Plaintiffs further claimed that the Proclamation violates the Establishment Clause of the First Amendment, because it was motivated not by concerns pertaining to national security but by animus toward Islam … The INA establishes numerous grounds on which an alien abroad may be inadmissible to the United States and ineligible for a visa … Congress has also delegated to the President authority to suspend or restrict the entry of aliens in certain cir- cumstances. The principal source of that authority, §1182(f ), enables the President to “suspend the entry of all aliens or any class of aliens” whenever he “finds” that their entry “would be detrimental to the interests of the United States.” Plaintiffs argue that the Proclamation is not a valid exercise of the President’s authority under the INA. In their view, §1182(f ) confers only a residual power to temporarily halt the entry of a discrete group of aliens engaged in harmful conduct. They also assert that the Proclamation violates another provision of the INA— 8 U. S. C. §1152(a)(1)(A)—because it discriminates on the basis of nationality in the issuance of immigrant visas … §1182(f ) exudes deference to the President in every clause. It entrusts to the President the decisions whether and when to suspend entry … whose entry to suspend … for how long … and on what conditions … It is therefore unsurprising that we have previously observed that §1182(f ) vests the President with “ample power” to impose entry restrictions in addition to those elsewhere enumerated in the INA … The Proclamation falls well within this comprehensive delegation. The sole prerequisite set forth in §1182(f ) is that the President “find[ ]” that the entry of the covered aliens “would be detrimental to the interests of the United States.” PRESIDENTIAL POWERS IN FOREIGN AFFAIRS | 152 The President has undoubtedly fulfilled that requirement here … The Proclamation therefore “craft[ed] … country-spe- cific restrictions that would be most likely to encourage cooperation given each country’s distinct circumstances,” while securing the Nation “until such time as improvements occur.” Plaintiffs … argue, as an initial matter, that the Proclamation fails to provide a persuasive rationale for why nationality alone renders the covered foreign nationals a security risk. And they further discount the President’s stated concern about deficient vetting because the Proclamation allows many aliens from the designated countries to enter on nonimmigrant visas. Such arguments are grounded on the premise that §1182(f ) not only requires the President to make a finding that entry “would be detrimental to the interests of the United States,” but also to explain that finding with sufficient detail to enable judicial review. That premise is questionable. But even assuming that some form of review is appropriate, plaintiffs’ attacks on the sufficiency of the President’s findings cannot be sustained. The 12-page Proclamation—which thoroughly describes the process, agency evaluations, and recommendations underlying the President’s chosen restric- tions—is more detailed than any prior order a President has issued under §1182(f ) … Like its predecessors, the Proclamation makes clear that its “conditional restrictions” will remain in force only so long as necessary to “address” the identified “inadequacies and risks” within the covered nations … To that end, the Procla- mation establishes an ongoing process to engage covered nations and assess every 180 days whether the entry restrictions should be modified or terminated. §§4(a), (b). Indeed, after the initial review period, the President determined that Chad had made sufficient improvements to its identity-management protocols, and he accordingly lifted the entry suspension on its nationals … In short, the language of §1182(f ) is clear, and the Proclamation does not exceed any textual limit on the President’s authority … Plaintiffs’ structural argument starts with the premise that §1182(f ) does not give the President authority to counter- mand Congress’s considered policy judgments. The President, they say, may supplement the INA, but he cannot sup- plant it … We may assume that §1182(f ) does not allow the President to expressly override particular provisions of the INA. But plaintiffs have not identified any conflict between the statute and the Proclamation that would implicitly bar the Presi- dent from addressing deficiencies in the Nation’s vetting system … Plaintiffs suggest that the entry restrictions are unnecessary because consular officers can simply deny visas in individual cases when an alien fails to carry his burden of proving admissibility—for example, by failing to produce certified records regarding his criminal history. But that misses the point: A critical finding of the Proclamation is that the failure of certain countries to provide reliable information prevents the Government from accurately determining whether an alien is inadmissible or poses a threat. Proclamation §1(h). Unless consular officers are expected to apply categorical rules and deny entry from those countries across the board, fraudulent or unreliable documentation may thwart their review in individual cases. And at any rate, the INA certainly does not require that systemic problems such as the lack of reliable States, and of compounding the American people into one common mass. Of consequence, when they act, they act in their States. But the measures they adopt do not, on that account, cease to be the measures of the people themselves, or become the measures of the State governments … The assent of the States in their sovereign capacity is implied in calling a convention, and thus submitting that instrument to the people. But the people were at perfect liberty to accept or reject it, and their act was final. It required not the affir- mance, and could not be negatived, by the State Governments. The Constitution, when thus adopted, was of complete obligation, and bound the State sovereignties … From these conventions, the Constitution derives its whole authority. The government proceeds directly from the peo- ple; is ‘ordained and established,’ in the name of the people; and is declared to be ordained, ‘in order to form a more perfect union, establish justice, insure domestic tranquility, and secure the blessings of liberty to themselves and to their posterity.’ The assent of the states, in their sovereign capacity, is implied, in calling a convention, and thus submitting that instrument to the people. But the people were at perfect liberty to accept or reject it; and their act was final. It required not the affirmance, and could not be negatived, by the state governments. The constitution, when thus adopted, was of complete obligation, and bound the state sovereignties … This government is acknowledged by all, to be one of enumerated powers. The principle, that it can exercise only the powers granted to it, would seem too apparent, to have required to be enforced by all those arguments, which its enlight- ened friends, while it was depending before the people, found it necessary to urge; that principle is now universally admitted. But the question respecting the extent of the powers actually granted, is perpetually arising, and will probably continue to arise, so long as our system shall exist … [T]he government of the Union, though limited in its powers, is supreme within its sphere of action. This would seem to result, necessarily, from its nature. It is the government of all; its powers are delegated by all; it represents all, and acts for all. Though any one state may be willing to control its operations, no state is willing to allow others to control them. The nation, on those subjects on which it can act, must necessarily bind its component parts. But this question is not left to mere reason: the people have, in express terms, decided it … Among the enumerated powers, we do not find that of establishing a bank or creating a corporation. But there is no phrase in the instrument which, like the articles of confederation, excludes incidental or implied powers; and which requires that everything granted shall be expressly and minutely described … A constitution, to contain an accurate detail of all the subdivisions of which its great powers will admit, and of all the means by which they may be carried into exe- cution, would partake of the prolixity of a legal code, and could scarcely be embraced by the human mind. It would, probably, never be understood by the public. Its nature, therefore, requires, that only its great outlines should be marked, its important objects designated, and the minor ingredients which compose those objects, be deduced from the nature of the objects themselves. That this idea was entertained by the framers of the American constitution, is not only to be inferred from the nature of the instrument, but from the language. Why else were some of the limitations, found in the 9th section of the 1st article, introduced? It is also, in some degree, warranted, by their having omitted to use any restric- tive term which might prevent its receiving a fair and just interpretation … 161 | SOURCES AND SCOPE OF LEGISLATIVE POWERS Although, among the enumerated powers of government, we do not find the word ‘bank’ or ‘incorporation,’ we find the great powers, to lay and collect taxes; to borrow money; to regulate commerce; to declare and conduct a war; and to raise and support armies and navies. The sword and the purse, all the external relations, and no inconsiderable portion of the industry of the nation, are intrusted to its government. It is not denied, that the powers given to the government imply the ordinary means of execution. That, for example, of raising revenue, and applying it to national purposes, is admitted to imply the power of conveying money from place to place, as the exigencies of the nation may require, and of employing the usual means of conveyance. But it is denied, that the government … may … erect a corporation. On what foundation does this argument rest? On this alone: the power of creating a corporation, is one appertaining to sovereignty, and is not expressly conferred on congress. This is true. But all legislative powers appertain to sovereignty. The original power of giving the law on any subject whatever, is a sovereign power … if the government of the Union is restrained from creating a corporation … on the single reason that the creation of a corporation is an act of sovereignty … there would be some difficulty in sustaining the authority of congress to pass other laws for the accomplishment of the same objects. The government which has a right to do an act, and has imposed on it, the duty of performing that act, must, according to the dictates of reason, be allowed to select the means … those who contend that it may not … take upon themselves the burden of establishing that exception … In America, the powers of sovereignty are divided between the government of the Union, and those of the states. They are each sovereign, with respect to the objects committed to it, and neither sovereign, with respect to the objects commit- ted to the other … Some state constitutions were formed before, some since that of the United States. We cannot believe, that their relation to each other is in any degree dependent upon this circumstance. Their respective powers must, we think, be precisely the same, as if they had been formed at the same time … To [Congress’] enumeration of powers is added, that of making ‘all laws which shall be necessary and proper, for carrying into execution the foregoing powers, and all other powers vested by this constitution, in the government of the United States, or in any department thereof.’ The counsel for the state of Maryland have urged various arguments, to prove that this clause, though, in terms, a grant of power, is not so, in effect; but is really restrictive of the general right, which might otherwise be implied, of selecting means for executing the enumerated powers. In support of this proposition, they have found it necessary to contend, that this clause was inserted for the purpose of conferring on congress the power of mak- ing laws. That, without it, doubts might be entertained, whether congress could exercise its powers in the form of legis- lation … Could it be necessary to say, that a legislature should exercise legislative powers, in the shape of legislation? After allowing each house to prescribe its own course of proceeding, after describing the manner in which a bill should become a law, would it have entered into the mind of a single member of the convention, that an express power to make laws was neces- sary, to enable the legislature to make them? That a legislature, endowed with legislative powers, can legislate, is a propo- sition too self-evident to have been questioned … But the argument which most conclusively demonstrates the error of the construction contended for by the counsel for the state of Maryland, is founded on the intention of the convention, as manifested in the whole clause. To waste time and argument in proving that, without it, congress might carry its powers into execution, would be not much less idle, than to hold a lighted taper to the sun. As little can it be required to prove, that in the absence of this clause, congress SOURCES AND SCOPE OF LEGISLATIVE POWERS | 162 would have some choice of means … This clause, as construed by the state of Maryland, would abridge, and almost anni- hilate, this useful and necessary right of the legislature to select its means. That this could not be intended, is, we should think, had it not been already controverted, too apparent for controversy. We think so for the following reasons: 1st. The clause is placed among the powers of Congress, not among the limitations on those powers. 2d. Its terms purport to enlarge, not to diminish, the powers vested in the Government. It purports to be an additional power, not a restriction on those already granted. No reason has been or can be assigned for thus concealing an intention to narrow the discretion of the National Legislature under words which purport to enlarge it. The framers of the Con- stitution wished its adoption, and well knew that it would be endangered by its strength, not by its weakness. Had they been capable of using language which would convey to the eye one idea and, after deep reflection, impress on the mind another, they would rather have disguised the grant of power than its limitation. If, then, their intention had been, by this clause, to restrain the free use of means which might otherwise have been implied, that intention would have been inserted in another place, and would have been expressed in terms resembling these. “In carrying into execution the fore- going powers, and all others,” &c., “no laws shall be passed but such as are necessary and proper.” Had the intention been to make this clause restrictive, it would unquestionably have been so in form, as well as in effect. The result of the most careful and attentive consideration bestowed upon this clause is that, if it does not enlarge, it can- not be construed to restrain, the powers of Congress, or to impair the right of the legislature to exercise its best judgment in the selection of measures to carry into execution the Constitutional powers of the Government. If no other motive for its insertion can be suggested, a sufficient one is found in the desire to remove all doubts respecting the right to legislate on that vast mass of incidental powers which must be involved in the Constitution if that instrument be not a splendid bauble. We admit, as all must admit, that the powers of the Government are limited, and that its limits are not to be transcended. But we think the sound construction of the Constitution must allow to the national legislature that discretion with respect to the means by which the powers it confers are to be carried into execution which will enable that body to per- form the high duties assigned to it in the manner most beneficial to the people. Let the end be legitimate, let it be within the scope of the Constitution, and all means which are appropriate, which are plainly adapted to that end, which are not prohibited, but consist with the letter and spirit of the Constitution, are Constitutional … After the most deliberate consideration, it is the unanimous and decided opinion of this Court that the act to incorporate the Bank of the United States is a law made in pursuance of the Constitution, and is a part of the supreme law of the land. The branches, proceeding from the same stock and being conducive to the complete accomplishment of the object, are equally constitutional … It being the opinion of the Court that the act incorporating the bank is constitutional, and that the power of establishing a branch in the State of Maryland might be properly exercised by the bank itself, we proceed to inquire: 163 | SOURCES AND SCOPE OF LEGISLATIVE POWERS 2. Whether the State of Maryland may, without violating the Constitution, tax that branch? [See McCulloch v. Maryland in the Federalism chapter.] Excerpted by Alexandria Metzdorf § Chae Chan Ping v. United States 130 U.S. 581 (1889) Decision: Affirmed Vote: Unanimous Majority: Field,, joined by Fuller, Miller, Bradley, Harlan, Gray, Blatchford, and Lamar MR. JUSTICE FIELD delivered the opinion of the Court. The appeal involves a consideration of the validity of the Act of Congress of October 1, 1888, prohibiting Chinese labor- ers from entering the United States who had departed before its passage, having a certificate issued under the act of 1882 as amended by the act of 1884, granting them permission to return. The validity of the act is assailed as being in effect an expulsion from the country of Chinese laborers, in violation of existing treaties between the United States and the government of China, and of rights vested in them under the laws of Congress … British subjects in China were often subjected not only to the violence of mobs, but to insults and outrages from local authorities of the country, which led to retaliatory measures for the punishment of the aggressors. To such an extent were these measures carried and such resistance offered to them that in 1856, the two countries were in open war … England requested of the President the concurrence and active cooperation of the United States … [A]s the rights of citizens of the United States might be seriously affected by the results of existing hostilities, and commercial intercourse between the United States and China be disturbed, it was deemed advisable to send to China a minister plenipotentiary to repre- sent our government and watch our interests there. Accordingly, Mr. William B. Reed, of Philadelphia, was appointed such minister, and instructed, while abstaining from any direct interference, to aid by peaceful cooperation the objects the allied forces were seeking to accomplish … Through him a new treaty was negotiated with the Chinese government. It was concluded in June, 1858, and ratified in August of the following year … [A]dditional articles to the treaty of 1858 were agreed upon which gave expression to the general desire that the two nations and their peoples should be drawn closer together. The new articles, eight in number, were agreed to on the 28th of July, 1868, and ratifications of them were exchanged at Pekin in November of the following year … “ARTICLE VI. Citizens of the United States visiting or residing in China shall enjoy the same privileges, immunities, or exemptions in respect to travel or residence as may there be enjoyed by the citizens or subjects of the most favored nation, and reciprocally, Chinese subjects visiting or residing in the United shall enjoy the same privileges, immunities, SOURCES AND SCOPE OF LEGISLATIVE POWERS | 164 and exemptions in respect to travel or residence as may there be enjoyed by the citizens or subjects of the most favored nation. But nothing herein contained shall be held to confer naturalization upon citizens of the United States in China, nor upon the subjects of China in the United States … ” The discovery of gold in California in 1848, as is well known, was followed by a large immigration thither from all parts of the world, attracted not only by the hope of gain from the mines, but from the great prices paid for all kinds of labor. The news of the discovery penetrated China, and laborers came from there in great numbers, a few with their own means, but by far the greater number under contract with employers for whose benefit they worked. These laborers readily secured employment … They were generally industrious and frugal. Not being accompanied by families except in rare instances, their expenses were small and they were content with the simplest fare, such as would not suffice for our laborers and artisans. The competition between them and our people was for this reason altogether in their favor, and the consequent irritation, proportionately deep and bitter, was followed, in many cases, by open conflicts, to the great disturbance of the public peace. The differences of race added greatly to the difficulties of the situation … As they grew in numbers each year, the people of the coast saw, or believed they saw, in the facility of immigration and in the crowded millions of China, where popu- lation presses upon the means of subsistence, great danger that at no distant day that portion of our country would be overrun by them unless prompt action was taken to restrict their immigration. The people there accordingly petitioned earnestly for protective legislation … So urgent and constant were the prayers for relief against existing and anticipated evils, both from the public authorities of the Pacific coast and from private individuals that Congress was impelled to act on the subject. Many persons, how- ever, both in and out of Congress, were of opinion that so long as the treaty remained unmodified, legislation restricting immigration would be a breach of faith with China. A statute was accordingly passed appropriating money to send com- missioners to China to act with our minister there in negotiating and concluding by treaty a settlement of such matters of interest between the two governments as might be confided to them …
System Instruction: Use only the following information labeled "Context". Do not use any other source of information other than what is provided below. Question: According to the Judgement of Myers v. United States is the President legally allowed to remove executive officers of the United States whom he has appointed by and with the advice and consent of the Senate from office? Context: The State Supreme Court’s inclusion of vote counts based on these variant standards exemplifies concerns with the remedial processes that were under way … In addition to these difficulties the actual process by which the votes were to be counted under the Florida Supreme Court’s decision raises further concerns. That order did not specify who would recount the ballots. The county can- vassing boards were forced to pull together ad hoc teams of judges from various Circuits who had no previous training in handling and interpreting ballots. Furthermore, while others were permitted to observe, they were prohibited from objecting during the recount. The recount process, in its features here described, is inconsistent with the minimum procedures necessary to protect the fundamental right of each voter in the special instance of a statewide recount under the authority of a single state judicial officer. Our consideration is limited to the present circumstances, for the problem of equal protection in election processes generally presents many complexities. The question before the Court is not whether local entities, in the exercise of their expertise, may develop different sys- tems for implementing elections. Instead, we are presented with a situation where a state court with the power to assure uniformity has ordered a statewide recount with minimal procedural safeguards. When a court orders a statewide rem- edy, there must be at least some assurance that the rudimentary requirements of equal treatment and fundamental fair- ness are satisfied … Upon due consideration of the difficulties identified to this point, it is obvious that the recount cannot be conducted in compliance with the requirements of equal protection and due process without substantial additional work. It would require not only the adoption (after opportunity for argument) of adequate statewide standards for determining what is a legal vote, and practicable procedures to implement them, but also orderly judicial review of any disputed matters that might arise. In addition, the Secretary has advised that the recount of only a portion of the ballots requires that the vote tabulation equipment be used to screen out undervotes, a function for which the machines were not designed. If a recount of overvotes were also required, perhaps even a second screening would be necessary. Use of the equipment for this purpose, and any new software developed for it, would have to be evaluated for accuracy by the Secretary … Because it is evident that any recount seeking to meet the December 12 date will be unconstitutional for the reasons we have discussed, we reverse the judgment of the Supreme Court of Florida ordering a recount to proceed … None are more conscious of the vital limits on judicial authority than are the Members of this Court, and none stand more in admiration of the Constitution’s design to leave the selection of the President to the people, through their leg- islatures, and to the political sphere. When contending parties invoke the process of the courts, however, it becomes our unsought responsibility to resolve the federal and constitutional issues the judicial system has been forced to confront. The judgment of the Supreme Court of Florida is reversed, and the case is remanded for further proceedings not incon- sistent with this opinion. It is so ordered. STRUCTURE OF THE PRESIDENCY | 60 Excerpted by Alexandria Metzdorf § 61 | STRUCTURE OF THE PRESIDENCY Appointment and Removal Powers Myers v. United States 272 U.S. 52 (1926) Decision: Affirmed Vote: 6-3 Majority: Taft, joined by Van Devanter, Sutherland, Butler, Sanford, Stone Dissent: Holmes Dissent: McReynolds Dissent: Brandeis MR. CHIEF JUSTICE TAFT delivered the opinion of the Court. This case presents the question whether, under the Constitution, the President has the exclusive power of removing exec- utive officers of the United States whom he has appointed by and with the advice and consent of the Senate. Myers … was, on July 21, 1917, appointed by the President, by and with the advice and consent of the Senate, to be a postmaster of the first class at Portland, Oregon, for a term of four years. On January 20, 1920, Myers’ resignation was demanded. He refused the demand. On February 2, 1920, he was removed from office by order of the Postmaster Gen- eral, acting by direction of the President. February 10th, Myers sent a petition to the President and another to the Sen- ate Committee on Post Offices, asking to be heard if any charges were filed. He protested to the Department against his removal, and continued to do so until the end of his term. He pursued no other occupation, and drew compensation for no other service during the interval. On April 21, 1921, he brought this suit in the Court of Claims for his salary from the date of his removal, which, as claimed by supplemental petition filed after July 21, 1921, the end of his term, amounted to $8,838.71 … [By the law] under which Myers was appointed with the advice and consent of the Senate as a first-class postmaster, it is provided that “Postmasters of the first, second and third classes shall be appointed and may be removed by the President by and with the advice and consent of the Senate and shall hold their offices for four years unless sooner removed or suspended accord- ing to law.” The Senate did not consent to the President’s removal of Myers during his term. If this statute, in its requirement that his term should be four years unless sooner removed by the President by and with the consent of the Senate, is valid, the appellant, Myers’ administratrix, is entitled to recover his unpaid salary for his full term, and the judgment of the Court of Claims must be reversed. The Government maintains that the requirement is invalid for the reason that, under Article APPOINTMENT AND REMOVAL POWERS | 62 II of the Constitution the President’s power of removal of executive officers appointed by him with the advice and con- sent of the Senate is full and complete without consent of the Senate … We are therefore confronted by the constitutional question, and cannot avoid it … The question where the power of removal of executive officers appointed by the President by and with the advice and consent of the Senate was vested was presented early in the first session of the First Congress. There is no express pro- vision respecting removals in the Constitution, except as Section 4 of Article II … provides for removal from office by impeachment … It was pointed out in this great debate [constitutional convention] that the power of removal, though equally essential to the executive power is different in its nature from that of appointment. Madison, 1 Annals of Congress, 497 et seq.; Cly- mer, 1 Annals, 489; Sedgwick, 1 Annals, 522; Ames, 1 Annals, 541, 542; Hartley, 1 Annals, 481. A veto by the Senate-a part of the legislative branch of the government-upon removals is a much greater limitation upon the executive branch, and a much more serious blending of the legislative with the executive, than a rejection of a proposed appointment. It is not to be implied. The rejection of a nominee of the President for a particular office does not greatly embarrass him in the conscientious discharge of his high duties in the selection of those who are to aid him, because the President usually has an ample field from which to select for office, according to his preference, competent and capable men. The Senate has full power to reject newly proposed appointees whenever the President shall remove the incumbents. Such a check enables the Senate to prevent the filling of offices with bad or incompetent men, or with those against whom there is ten- able objection. The power to prevent the removal of an officer who has served under the President is different from the authority to con- sent to or reject his appointment. When a nomination is made, it may be presumed that the Senate is, or may become, as well advised as to the fitness of the nominee as the President, but in the nature of things the defects in ability or intel- ligence or loyalty in the administration of the laws of one who has served as an officer under the President are facts as to which the President, or his trusted subordinates, must be better informed than the Senate, and the power to remove him may therefor be regarded as confined for very sound and practical reasons, to the governmental authority which has administrative control. The power of removal is incident to the power of appointment, not to the power of advising and consenting to appointment, and when the grant of the executive power is enforced by the express mandate to take care that the laws be faithfully executed, it emphasizes the necessity for including within the executive power as conferred the exclusive power of removal. … The vesting of the executive power in the President was essentially a grant of the power to execute the laws. But the Pres- ident, alone and unaided, could not execute the laws. He must execute them by the assistance of subordinates. This view has since been repeatedly affirmed by this Court. Wilcox v. Jackson (1839) … It was urged that the natural meaning of the term “executive power” granted the President included the appointment and removal of executive subordinates. If such appointments and removals were not an exercise of the executive power, what were they? They certainly were not the exercise of legislative or judicial power in government as usually understood … It is true that the remedy for the evil of political executive removals of inferior offices is with Congress by a simple expedi- ent, but it includes a change of the power of appointment from the President with the consent of the Senate. Congress 63 | APPOINTMENT AND REMOVAL POWERS must determine first that the office is inferior, and second that it is willing that the office shall be filled by appoint- ment by some other authority than the President with the consent of the Senate. That the latter may be an important consideration is manifest, and is the subject of comment by this Court in its opinion in the case of Shurtleff v. United States, (1903), where this Court said: “To take away this power of removal in relation to an inferior office created by statute, although that statute provided for an appointment thereto by the President and confirmation by the Senate, would require very clear and explicit language. It should not be held to be taken away by mere inference or implication … ” [P]ostmasters were all by law appointed by the Postmaster General. This was because Congress … so provided. But there- after, Congress required certain classes of them to be, as they now are, appointed by the President with the consent of the Senate. This is an indication that Congress deemed appointment by the President with the consent of the Senate essential to the public welfare, and, until it is willing to vest their appointment in the head of the Department, they will be subject to removal by the President alone, and any legislation to the contrary must fall as in conflict with the Consti- tution. Summing up, then, the facts as to acquiescence by all branches of the Government in the legislative decision of 1789, as to executive officers, whether superior or inferior, we find that from 1789 until 1863, a period of 74 years, there was no act of Congress, no executive act, and no decision of this Court at variance with the declaration of the First Congress, but there was, as we have seen, clear, affirmative recognition of it by each branch of the Government. Article II grants to the President … the general administrative control of those executing the laws, including the power of appointment and removal of executive officers … the President’s power of removal is further established as an incident to his specifically enumerated function of appointment by and with the advice of the Senate, but that such incident does not, by implication, extend to removals the Senate’s power of checking appointments, and … to hold otherwise would make it impossible for the President, in case of political or other differences with the Senate or Congress, to take care that the laws be faithfully executed … While this Court has studiously avoided deciding the issue until it was presented in such a way that it could not be avoided, in the references it has made to the history of the question, and in the presumptions it has indulged in favor of a statutory construction not inconsistent with the legislative decision of 1789, it has indicated a trend of view that we should not and cannot ignore. When, on the merits, we find our conclusion strongly favoring the view which prevailed in the First Congress, we have no hesitation in holding that conclusion to be correct, and it therefore follows that the Tenure of Office Act of 1867, insofar as it attempted to prevent the President from removing executive officer who had been appointed by him by and with the advice and consent of the Senate, was invalid, and that subsequent legislation of the same effect was equally so. For the reasons given, we must therefore hold that the provision of the law of 1876, by which the unrestricted power of removal of first class postmasters is denied to the President, is in violation of the Constitution, and invalid. This leads to an affirmance of the judgment of the Court of Claims. Judgment affirmed. APPOINTMENT AND REMOVAL POWERS | 64 Excerpted by Alexandria Metzdorf § Humphrey’s Executor v. United States 295 U.S. 602 (1935) Decision: Affirmed Vote: 9-0 Majority: Sutherland, joined by Hughes, Van Devanter, McReynolds, Brandeis, Butler, Stone, Roberts, and Cardozo Mr. Justice SUTHERLAND delivered the opinion of the Court. Plaintiff brought suit in the Court of Claims against the United States to recover a sum of money alleged to be due the deceased for salary as a Federal Trade Commissioner from October 8, 1933, when the President undertook to remove him from office, to the time of his death on February 14, 1934. The court below has certified to this court two questions … in respect of the power of the President to make the removal. The material facts which give rise to the questions are as follows: William E. Humphrey, the decedent, on December 10, 1931, was nominated by President Hoover to succeed himself as a member of the Federal Trade Commission, and was confirmed by the United States Senate. He was duly commissioned for a term of seven years, expiring September 25, 1938; and, after taking the required oath of office, entered upon his duties. On July 25, 1933, President Roosevelt addressed a letter to the commissioner asking for his resignation, on the ground ‘that the aims and purposes of the Administration with respect to the work of the Commission can be carried out most effectively with personnel of my own selection,’ but disclaiming any reflection upon the commissioner personally or upon his services. The commissioner replied, asking time to consult his friends. After some further correspondence upon the subject, the President on August 31, 1933, wrote the commissioner expressing the hope that the resignation would be forthcoming, and saying: ‘You will, I know, realize that I do not feel that your mind and my mind go along together on either the policies or the administering of the Federal Trade Commission, and, frankly, I think it is best for the people of this country that I should have a full confidence.’ The commissioner declined to resign; and on October 7, 1933, the President wrote him: ‘Effective as of this date you are hereby removed from the office of Commissioner of the Federal Trade Commission.’ Humphrey never acquiesced in this action, but continued thereafter to insist that he was still a member of the commis- sion, entitled to perform its duties and receive the compensation provided by law at the rate of $10,000 per annum. Upon these and other facts set forth in the certificate, which we deem it unnecessary to recite, the following questions are certi- fied: 1. Do the provisions of section 1 of the Federal Trade Commission Act, stating that ‘any commissioner may be removed by the President for inefficiency, neglect of duty, or malfeasance in office’, restrict or limit the power of 65 | APPOINTMENT AND REMOVAL POWERS the President to remove a commissioner except upon one or more of the causes named? If the foregoing question is answered in the affirmative, then— 2. If the power of the President to remove a commissioner is restricted or limited as shown by the foregoing inter- rogatory and the answer made thereto, is such a restriction or limitation valid under the Constitution of the United States?’ The Federal Trade Commission Act … creates a commission of five members to be appointed by the President by and with the advice and consent of the Senate, and section 1 provides: ‘Not more than three of the commissioners shall be members of the same political party. … ‘ [The Act] in part provides that: ‘Unfair methods of competition in commerce are declared unlawful. The commission is empowered and directed to prevent persons, partnerships, or corporations, except banks, and com- mon carriers subject to the Acts to regulate commerce, from using unfair methods of competition in commerce … ‘ First. The question first to be considered is whether, by the provisions of section 1 … the President’s power is limited to removal for the specific causes enumerated therein. The negative contention of the government is based principally upon the decision of this court in Shurtleff v. United States, (1903) … The situation here presented is plainly and wholly different. The statute fixes a term of office, in accordance with many precedents … The words of the act are definite and unambiguous. … The fixing of a definite term subject to removal for cause, unless there be some countervailing provision or circum- stance indicating the contrary, which here we are unable to find, is enough to establish the legislative intent that the term is not to be curtailed in the absence of such cause. But if the intention of Congress that no removal should be made dur- ing the specified term except for one or more of the enumerated causes were not clear upon the face of the statute, as we think it is, it would be made clear by a consideration of the character of the commission and the legislative history which accompanied and preceded the passage of the act. The commission is to be nonpartisan; and it must, from the very nature of its duties, act with entire impartiality. It is charged with the enforcement of no policy except the policy of the law. Its duties are neither political nor executive, but predominantly quasi judicial and quasi legislative. Like the Interstate Commerce Commission, its members are called upon to exercise the trained judgment of a body of experts ‘appointed by law and informed by experience’ … The legislative reports in both houses of Congress clearly reflect the view that a fixed term was necessary to the effective and fair administration of the law … [T]he language of the act, the legislative reports, and the general purposes of the legislation as reflected by the debates, all combine to demonstrate the congressional intent to create a body of experts who shall gain experience by length of service; a body which shall be independent of executive authority, except in its selection, and free to exercise its judgment APPOINTMENT AND REMOVAL POWERS | 66 without the leave or hindrance of any other official … To the accomplishment of these purposes, it is clear that Congress was of opinion that length and certainty of tenure would vitally contribute. And to hold that, nevertheless, the members of the commission continue in office at the mere will of the President, might be to thwart, in large measure, the very ends which Congress sought to realize by definitely fixing the term of office. … Second. To support its contention that the removal provision … is an unconstitutional interference with the executive power of the President, the government’s chief reliance is Myers v. United States (1926) … [T]he narrow point actually decided was only that the President had power to remove a postmaster of the first class, without the advice and consent of the Senate as required by act of Congress. In the course of the opinion of the court, expressions occur which tend to sustain the government’s contention, but these are beyond the point involved and, therefore, do not come within the rule of stare decisis … The office of a postmaster is so essentially unlike the office now involved that the decision in the Myers case cannot be accepted as controlling our decision here. A postmaster is an executive officer restricted to the performance of executive functions. He is charged with no duty at all related to either the legislative or judicial power. The actual decision in the Myers case finds support in the theory that such an officer is merely one of the units in the executive department and, hence, inherently subject to the exclusive and illimitable power of removal by the Chief Executive, whose subordinate and aid he is. Putting aside dicta, which may be followed if sufficiently persuasive but which are not controlling, the nec- essary reach of the decision goes far enough to include all purely executive officers. It goes no farther; much less does it include an officer who occupies no place in the executive department and who exercises no part of the executive power vested by the Constitution in the President. The Federal Trade Commission is an administrative body created by Congress to carry into effect legislative policies embodied in the statute in accordance with the legislative standard therein prescribed, and to perform other specified duties as a legislative or as a judicial aid. Such a body cannot in any proper sense be characterized as an arm or an eye of the executive. Its duties are performed without executive leave and, in the contemplation of the statute, must be free from executive control. In administering the provisions of the statute in respect of ‘unfair methods of competition,’ that is to say, in filling in and administering the details embodied by that general standard, the commission acts in part quasi leg- islatively and in part quasi judicially … To the extent that it exercises any executive function, as distinguished from execu- tive power in the constitutional sense, it does so in the discharge and effectuation of its quasi legislative or quasi judicial powers, or as an agency of the legislative or judicial departments of the government … If Congress is without authority to prescribe causes for removal of members of the trade commission and limit executive power of removal accordingly, that power at once becomes practically all-inclusive in respect of civil officers with the exception of the judiciary provided for by the Constitution … We are thus confronted with the serious question whether not only the members of these quasi legislative and quasi judicial bodies, but the judges of the legislative Court of Claims, exercising judicial power … con- tinue in office only at the pleasure of the President. We think it plain under the Constitution that illimitable power of removal is not possessed by the President in respect of officers of the character of those just named. The authority of Congress, in creating quasi legislative or quasi judicial agencies, to require them to act in discharge of their duties independently of executive control cannot well be doubted. CHIEF JUSTICE REHNQUIST delivered the opinion of the Court. This case presents us with a challenge to the independent counsel provisions of the Ethics in Government Act of 1978 … We hold today that these provisions of the Act do not violate the Appointments Clause of the Constitution, Art. II, § 2, cl. 2, or the limitations of Article III, nor do they impermissibly interfere with the President’s authority under Article II in violation of the constitutional principle of separation of powers. Briefly stated, Title VI of the Ethics in Government Act … allows for the appointment of an “independent counsel” to investigate and, if appropriate, prosecute certain high-ranking Government officials for violations of federal criminal laws … The Act requires the Attorney General, upon receipt of information that he determines is “sufficient to constitute grounds to investigate whether any person [covered by the Act] may have violated any Federal criminal law,” to conduct a preliminary investigation of the matter … If … the Attorney General has determined that there are “reasonable grounds to believe that further investigation or prosecution is warranted,” then he “shall apply to the division of the court for the appointment of an independent counsel … ” With respect to all matters within the independent counsel’s jurisdiction, the Act grants the counsel “full power and independent authority to exercise all investigative and prosecutorial functions and powers of the Department of Justice, the Attorney General, and any other officer or employee of the Department of Justice … ” The functions of the inde- pendent counsel include conducting grand jury proceedings and other investigations, participating in civil and criminal court proceedings and litigation, and appealing any decision in any case in which the counsel participates in an official capacity … the counsel’s powers include “initiating and conducting prosecutions in any court of competent jurisdiction, framing and signing indictments, filing informations, and handling all aspects of any case, in the name of the United States … ” … An independent counsel has “full authority to dismiss matters within [his or her] prosecutorial jurisdiction without conducting an investigation or at any subsequent time before prosecution, if to do so would be consistent” with Department of Justice policy … Two statutory provisions govern the length of an independent counsel’s tenure in office. The first defines the procedure for removing an independent counsel. Section 596(a)(1) provides: “An independent counsel appointed under this chapter may be removed from office, other than by impeachment and conviction, only by the personal action of the Attorney General … ” If an independent counsel is removed pursuant to this section, the Attorney General is required to submit a report to both the Special Division and the Judiciary Committees of the Senate and the House “specifying the facts found and the ultimate grounds for such removal.” § 596(a)(2). Under the current version of the Act, an independent counsel can obtain judicial review of the Attorney General’s action by filing a civil action in the United States District Court for the District of Columbia … The reviewing court is authorized to grant reinstatement or “other appropriate relief.” § 596(a)(3) … The other provision governing the tenure of the independent counsel defines the procedures for “terminating” the coun- sel’s office. Under § 596(b)(1), the office of an independent counsel terminates when he or she notifies the Attorney Gen- eral that he or she has completed or substantially completed any investigations or prosecutions undertaken pursuant to the Act … 69 | APPOINTMENT AND REMOVAL POWERS Finally, the Act provides for congressional oversight of the activities of independent counsel … On April 23, 1986, the Special Division appointed James C. McKay as independent counsel to investigate “whether the testimony of … Olson and his revision of such testimony on March 10, 1983, violated either 18 U. S. C. § 1505 or § 1001, or any other provision of federal law … ” McKay later resigned as independent counsel, and on May 29, 1986, the Division appointed appellant Morrison as his replacement, with the same jurisdiction … [I]n May and June 1987, appellant caused a grand jury to issue and serve … on appellees. All three appellees moved to quash the subpoenas, claiming, among other things, that the independent counsel provisions of the Act were unconsti- tutional and that appellant accordingly had no authority to proceed … The initial question is, accordingly, whether appellant is an “inferior” or a “principal” officer … If she is the latter, as the Court of Appeals concluded, then the Act is in violation of the Appointments Clause. The line between “inferior” and “principal” officers is one that is far from clear, and the Framers provided little guidance into where it should be drawn … [I]n our view appellant clearly falls on the “inferior officer” side of that line. Several factors lead to this conclusion. First, appellant is subject to removal by a higher Executive Branch official. Although appellant may not be “subordinate” to the Attorney General (and the President) insofar as she possesses a degree of independent discretion to exercise the powers delegated to her under the Act, the fact that she can be removed by the Attorney General indicates that she is to some degree “inferior” in rank and authority. Second, appellant is empowered by the Act to perform only certain, limited duties … Admittedly, the Act delegates to appellant “full power and independent authority to exercise all investigative and prosecutorial functions and powers of the Department of Justice,” § 594(a), but this grant of authority does not include any authority to formulate policy for the Government or the Executive Branch, nor does it give appellant any administrative duties outside of those necessary to operate her office. The Act specifically provides that in policy matters appellant is to comply to the extent possible with the policies of the Department … Third, appellant’s office is limited in jurisdiction. Not only is the Act itself restricted in applicability to certain federal officials suspected of certain serious federal crimes, but an independent counsel can only act within the scope of the juris- diction that has been granted by the Special Division pursuant to a request by the Attorney General. Finally, appellant’s office is limited in tenure. There is concededly no time limit on the appointment of a particular counsel. Nonetheless, the office of independent counsel is “temporary” in the sense that an independent counsel is appointed essentially to accomplish a single task, and when that task is over the office is terminated, either by the counsel herself or by action of the Special Division. Unlike other prosecutors, appellant has no ongoing responsibilities that extend beyond the accom- plishment of the mission that she was appointed for and authorized by the Special Division to undertake. In our view, these factors relating to the “ideas of tenure, duration … and duties” of the independent counsel, Germaine, are sufficient to establish that appellant is an “inferior” officer in the constitutional sense. This conclusion is consistent with our few previous decisions that considered the question whether a particular Govern- ment official is a “principal” or an “inferior” officer … APPOINTMENT AND REMOVAL POWERS | 70 Appellees argue that even if appellant is an “inferior” officer, the Clause does not empower Congress to place the power to appoint such an officer outside the Executive Branch. They contend that the Clause does not contemplate congres- sional authorization of “interbranch appointments,” in which an officer of one branch is appointed by officers of another branch. The relevant language of the Appointments Clause is worth repeating. It reads: ” … but the Congress may by Law vest the Appointment of such inferior Officers, as they think proper, in the President alone, in the courts of Law, or in the Heads of Departments.” On its face, the language of this “excepting clause” admits of no limitation on interbranch appointments. Indeed, the inclusion of “as they think proper” seems clearly to give Congress significant discretion to determine whether it is “proper” to vest the appointment of, for example, executive officials in the “courts of Law … ” We also note that the history of the Clause provides no support for appellees’ position … We do not mean to say that Congress’ power to provide for interbranch appointments of “inferior officers” is unlimited. In addition to separation-of-powers concerns, which would arise if such provisions for appointment had the potential to impair the constitutional functions assigned to one of the branches, Ex parte Siebold (1879) itself suggested that Con- gress’ decision to vest the appointment power in the courts would be improper if there was some “incongruity” between the functions normally performed by the courts and the performance of their duty to appoint … In this case, however, we do not think it impermissible for Congress to vest the power to appoint independent counsel in a specially created federal court … We now turn to consider whether the Act is invalid under the constitutional principle of separation of powers. Two related issues must be addressed: The first is whether the provision of the Act restricting the Attorney General’s power to remove the independent counsel to only those instances in which he can show “good cause,” taken by itself, impermis- sibly interferes with the President’s exercise of his constitutionally appointed functions. The second is whether, taken as a whole, the Act violates the separation of powers by reducing the President’s ability to control the prosecutorial powers wielded by the independent counsel. Unlike both Bowsher and Myers, this case does not involve an attempt by Congress itself to gain a role in the removal of executive officials other than its established powers of impeachment and conviction. The Act instead puts the removal power squarely in the hands of the Executive Branch; an independent counsel may be removed from office, “only by the personal action of the Attorney General, and only for good cause.” § 596(a)(1) … There is no requirement of congres- sional approval of the Attorney General’s removal decision, though the decision is subject to judicial review. § 596(a)(3). In our view, the removal provisions of the Act make this case more analogous to Humphrey’s Executor v. United States, (1935), and Wiener v. United States, (1958), than to Myers or Bowsher … Appellees contend that Humphrey’s Executor and Wiener are distinguishable from this case because they did not involve officials who performed a “core executive function.” They argue that our decision in Humphrey’s Executor rests on a distinction between “purely executive” officials and officials who exercise “quasi-legislative” and “quasi-judicial” powers. In their view, when a “purely executive” official is involved, the governing precedent is Myers, not Humphrey’s Executor. And, under Myers, the President must have absolute discretion to discharge “purely” executive officials at will … We undoubtedly did rely on the terms “quasi-legislative” and “quasi-judicial” to distinguish the officials involved in Humphrey’s Executor and Wiener from those in Myers, but our present considered view is that the determination of whether the Constitution allows Congress to impose a “good cause”-type restriction on the President’s power to remove 71 | APPOINTMENT AND REMOVAL POWERS an official cannot be made to turn on whether or not that official is classified as “purely executive … ” The analysis con- tained in our removal cases is designed not to define rigid categories of those officials who may or may not be removed at will by the President … but to ensure that Congress does not interfere with the President’s exercise of the “execu- tive power” and his constitutionally appointed duty to “take care that the laws be faithfully executed” under Article II. Myers was undoubtedly correct in its holding, and in its broader suggestion that there are some “purely executive” officials who must be removable by the President at will if he is to be able to accomplish his constitutional role … But as the Court noted in Wiener: “The assumption was short-lived that the Myers case recognized the President’s inherent constitutional power to remove officials no matter what the relation of the executive to the discharge of their duties and no matter what restrictions Con- gress may have imposed regarding the nature of their tenure … ” [T]he real question is whether the removal restrictions are of such a nature that they impede the President’s ability to perform his constitutional duty, and the functions of the officials in question must be analyzed in that light. Considering for the moment the “good cause” removal provision in isolation from the other parts of the Act at issue in this case, we cannot say that the imposition of a “good cause” standard for removal by itself unduly trammels on executive authority. There is no real dispute that the functions performed by the independent counsel are “executive” in the sense that they are law enforcement functions that typically have been undertaken by officials within the Executive Branch. As we noted above, however, the independent counsel is an inferior officer under the Appointments Clause … we simply do not see how the President’s need to control the exercise of that discretion is so central to the functioning of the Executive Branch as to require as a matter of constitutional law that the counsel be terminable at will by the President … Nor do we think that the “good cause” removal provision at issue here impermissibly burdens the President’s power to control or supervise the independent counsel, as an executive official, in the execution of his or her duties under the Act. This is not a case in which the power to remove an executive official has been completely stripped from the President, thus providing no means for the President to ensure the “faithful execution” of the laws. Rather, because the indepen- dent counsel may be terminated for “good cause,” the Executive, through the Attorney General, retains ample authority to assure that the counsel is competently performing his or her statutory responsibilities in a manner that comports with the provisions of the Act … Here, as with the provision of the Act conferring the appointment authority of the indepen- dent counsel on the special court, the congressional determination to limit the removal power of the Attorney General was essential, in the view of Congress, to establish the necessary independence of the office. We do not think that this limitation as it presently stands sufficiently deprives the President of control over the independent counsel to interfere impermissibly with his constitutional obligation to ensure the faithful execution of the laws … The final question to be addressed is whether the Act, taken as a whole, violates the principle of separation of powers by unduly interfering with the role of the Executive Branch. Time and again we have reaffirmed the importance in our con- stitutional scheme of the separation of governmental powers into the three coordinate branches … We have not hesitated to invalidate provisions of law which violate this principle. On the other hand, we have never held that the Constitution requires that the three branches of Government “operate with absolute independence … ” In the often-quoted words of Justice Jackson: APPOINTMENT AND REMOVAL POWERS | 72 “While the Constitution diffuses power the better to secure liberty, it also contemplates that practice will integrate the dispersed powers into a workable government. It enjoins upon its branches separateness but interdependence, autonomy but reciprocity.” Youngstown Sheet & Tube Co. v. Sawyer, (1952) (concurring opinion). We observe first that this case does not involve an attempt by Congress to increase its own powers at the expense of the Executive Branch … Indeed, with the exception of the power of impeachment — which applies to all officers of the United States — Congress retained for itself no powers of control or supervision over an independent counsel. The Act does empower certain Members of Congress to request the Attorney General to apply for the appointment of an inde- pendent counsel, but the Attorney General has no duty to comply with the request, although he must respond within a certain time limit. § 592(g). Other than that, Congress’ role under the Act is limited to receiving reports or other informa- tion and oversight of the independent counsel’s activities, § 595(a), functions that we have recognized generally as being incidental to the legislative function of Congress … Similarly, we do not think that the Act works any judicial usurpation of properly executive functions. As should be apparent from our discussion of the Appointments Clause above, the power to appoint inferior officers such as indepen- dent counsel is not in itself an “executive” function in the constitutional sense, at least when Congress has exercised its power to vest the appointment of an inferior office in the “courts of Law.” … In addition, once the court has appointed a counsel and defined his or her jurisdiction, it has no power to supervise or control the activities of the counsel. … [T]he various powers delegated by the statute to the Division are not supervisory or administrative, nor are they functions that the Constitution requires be performed by officials within the Executive Branch. The Act does give a federal court the power to review the Attorney General’s decision to remove an independent counsel, but in our view this is a function that is well within the traditional power of the Judiciary. Finally, we do not think that the Act “impermissibly undermine[s]” the powers of the Executive Branch … or “disrupts the proper balance between the coordinate branches [by] prevent[ing] the Executive Branch from accomplishing its con- stitutionally assigned functions … ” It is undeniable that the Act reduces the amount of control or supervision that the Attorney General and, through him, the President exercises over the investigation and prosecution of a certain class of alleged criminal activity … The Act … gives the Executive a degree of control over the power to initiate an investigation by the independent counsel. In addition, the jurisdiction of the independent counsel is defined with reference to the facts submitted by the Attorney General, and once a counsel is appointed, the Act requires that the counsel abide by Justice Department policy unless it is not “possible” to do so. Notwithstanding the fact that the counsel is to some degree “inde- pendent” and free from executive supervision to a greater extent than other federal prosecutors, in our view these features of the Act give the Executive Branch sufficient control over the independent counsel to ensure that the President is able to perform his constitutionally assigned duties. In sum, we conclude today that it does not violate the Appointments Clause for Congress to vest the appointment of independent counsel in the Special Division; that the powers exercised by the Special Division under the Act do not vio- late Article III; and that the Act does not violate the separation-of-powers principle by impermissibly interfering with the functions of the Executive Branch. The decision of the Court of Appeals is therefore Reversed. JUSTICE KENNEDY took no part in the consideration or decision of this case. 73 | APPOINTMENT AND REMOVAL POWERS Original excerpt in Lawrence Lessig, Constitutional Law: Separation of Powers, Federalism, and Fourteenth Amendment, published by H2O. Further excerpted by Alexandria Metzdorf. Licensed under CC BY-NC-SA. § NLRB v. Canning 573 U.S. 513 (2014) Decision: Affirmed Vote: 9-0 Majority: Breyer, joined by Kennedy, Ginsburg, Sotomayor, and Kagan Concurrence: Scalia (in judgment), joined by Roberts, Thomas, and Alito Note: A pro forma session is defined as “From the Latin, meaning ‘as a matter of form,’ a pro forma session is a brief meeting of the Senate, often only a few minutes in duration.” https://www.senate.gov/general/Features/Ses- sions.htm#:~:text=Pro%20Forma%20Session%3A%20From%20the,following%20the%20November%20gen- eral%20elections. Visit https://www.c-span.org/video/?526638-1/senate-pro-forma-session to see the c-span to view a pro forma session. Justice Breyer delivered the opinion of the Court. Ordinarily the President must obtain “the Advice and Consent of the Senate” before appointing an “Office[r] of the United States.” U. S. Const., Art. II, §2, cl. 2. But the Recess Appointments Clause creates an exception. It gives the Pres- ident alone the power “to fill up all Vacancies that may happen during the Recess of the Senate, by granting Commis- sions which shall expire at the End of their next Session.” Art. II, §2, cl. 3. We here consider three questions about the application of this Clause. The first concerns the scope of the words “recess of the Senate.” Does that phrase refer only to an inter-session recess (i.e., a break between formal sessions of Congress), or does it also include an intra-session recess, such as a summer recess in the midst of a session? We conclude that the Clause applies to both kinds of recess. The second question concerns the scope of the words “vacancies that may happen.” Does that phrase refer only to vacan- cies that first come into existence during a recess, or does it also include vacancies that arise prior to a recess but continue to exist during the recess? We conclude that the Clause applies to both kinds of vacancy. The third question concerns calculation of the length of a “recess.” The President made the appointments here at issue on January 4, 2012. At that time the Senate was in recess pursuant to a December 17, 2011, resolution providing for a series of brief recesses punctuated by “pro forma session[s],” with “no business … transacted,” every Tuesday and Friday through January 20, 2012 … In calculating the length of a recess are we to ignore the pro forma sessions, thereby treating the series of brief recesses as a single, month-long recess? We conclude that we cannot ignore these pro forma sessions. APPOINTMENT AND REMOVAL POWERS | 74 Our answer to the third question means that, when the appointments before us took place, the Senate was in the midst of a 3-day recess. Three days is too short a time to bring a recess within the scope of the Clause. Thus we conclude that the President lacked the power to make the recess appointments here at issue. The case before us arises out of a labor dispute. The National Labor Relations Board (NLRB) found that a Pepsi-Cola distributor, Noel Canning, had unlawfully refused to reduce to writing and execute a collective-bargaining agreement with a labor union. The Board ordered the distributor to execute the agreement and to make employees whole for any losses … The Pepsi-Cola distributor subsequently asked the Court of Appeals for the District of Columbia Circuit to set the Board’s order aside. It claimed that three of the five Board members had been invalidly appointed, leaving the Board with- out the three lawfully appointed members necessary for it to act … The three members in question were Sharon Block, Richard Griffin, and Terence Flynn. In 2011 the President had nom- inated each of them to the Board. As of January 2012, Flynn’s nomination had been pending in the Senate awaiting confirmation for approximately a year. The nominations of each of the other two had been pending for a few weeks. On January 4, 2012, the President, invoking the Recess Appointments Clause, appointed all three to the Board. The distributor argued that the Recess Appointments Clause did not authorize those appointments. It pointed out that on December 17, 2011, the Senate, by unanimous consent, had adopted a resolution providing that it would take a series of brief recesses beginning the following day … Pursuant to that resolution, the Senate held pro forma sessions every Tuesday and Friday until it returned for ordinary business on January 23, 2012 … The President’s January 4 appoint- ments were made between the January 3 and January 6 pro forma sessions. In the distributor’s view, each pro forma session terminated the immediately preceding recess. Accordingly, the appointments were made during a 3-day adjourn- ment, which is not long enough to trigger the Recess Appointments Clause. The Court of Appeals agreed that the appointments fell outside the scope of the Clause. But the court set forth different reasons … Since the second session of the 112th Congress began on January 3, 2012, the day before the President’s appointments, those appointments occurred during an intra-session recess, and the appointments consequently fell out- side the scope of the Clause … We asked the parties to address not only the Court of Appeals’ interpretation of the Clause but also the distributor’s initial argument, namely, “[w]hether the President’s recess-appointment power may be exercised when the Senate is con- vening every three days in pro forma sessions … ” … [T]he Recess Appointments Clause reflects the tension between, on the one hand, the President’s continuous need for “the assistance of subordinates,” Myers v. United States, (1926), and, on the other, the Senate’s practice, particularly dur- ing the Republic’s early years, of meeting for a single brief session each year … We seek to interpret the Clause as granting the President the power to make appointments during a recess but not offering the President the authority routinely to avoid the need for Senate confirmation. 75 | APPOINTMENT AND REMOVAL POWERS Second, in interpreting the Clause, we put significant weight upon historical practice. For one thing, the interpretive questions before us concern the allocation of power between two elected branches of Government. Long ago Chief Jus- tice Marshall wrote that “a doubtful question, one on which human reason may pause, and the human judgment be suspended, in the decision of which the great principles of liberty are not concerned, but the respective powers of those who are equally the representa- tives of the people, are to be adjusted; if not put at rest by the practice of the government, ought to receive a considerable impression from that practice.” McCulloch v. Maryland, (1819) … The first question concerns the scope of the phrase “the recess of the Senate … ” The Constitution provides for congres- sional elections every two years. And the 2-year life of each elected Congress typically consists of two formal 1-year ses- sions, each separated from the next by an “inter-session recess … ” The Senate or the House of Representatives announces an inter-session recess by approving a resolution stating that it will “adjourn sine die,” i.e., without specifying a date to return (in which case Congress will reconvene when the next formal session is scheduled to begin). The Senate and the House also take breaks in the midst of a session. The Senate or the House announces any such “intra- session recess” by adopting a resolution stating that it will “adjourn” to a fixed date, a few days or weeks or even months later. All agree that the phrase “the recess of the Senate” covers inter-session recesses. The question is whether it includes intra-session recesses as well. In our view, the phrase “the recess” includes an intra-session recess of substantial length … History … shows only that Congress generally took long breaks between sessions, while taking no significant intra-session breaks at all (five times it took a break of a week or so at Christmas) … In 1867 and 1868, Congress for the first time took substantial, nonholiday intra-session breaks, and President Andrew Johnson made dozens of recess appointments. The Federal Court of Claims upheld one of those specific appointments, writing “[w]e have no doubt that a vacancy occur- ring while the Senate was thus temporarily adjourned” during the “first session of the Fortieth Congress” was “legally filled by appointment of the President alone.” Gould v. United States, (1884) … … [R]estricting the Clause to inter-session recesses would frustrate its purpose. It would make the President’s recess- appointment power dependent on a formalistic distinction of Senate procedure. Moreover, the President has consis- tently and frequently interpreted the word “recess” to apply to intra-session recesses, and has acted on that interpretation. The Senate as a body has done nothing to deny the validity of this practice for at least three-quarters of a century … [A] 3-day recess would be too short … The Adjournments Clause reflects the fact that a 3-day break is not a significant interruption of legislative business. As the Solicitor General says, it is constitutionally de minimis. A Senate recess that is so short that it does not require the consent of the House is not long enough to trigger the President’s recess-appoint- ment power. In sum, we conclude that the phrase “the recess” applies to both intra-session and inter-session recesses. If a Senate recess is so short that it does not require the consent of the House, it is too short to trigger the Recess Appointments Clause. See Art. I, §5, cl. 4. And a recess lasting less than 10 days is presumptively too short as well. Applying this standard, we find that the pro forma sessions were sessions for purposes of the Clause. First, the Senate said it was in session. The Journal of the Senate and the Congressional Record indicate that the Senate convened for a series of twice-weekly “sessions” from December 20 through January 20 … Second, the Senate’s rules make clear that during its pro forma sessions, despite its resolution that it would conduct no business, the Senate retained the power to conduct business. During any pro forma session, the Senate could have con- ducted business simply by passing a unanimous consent agreement … It is consequently unsurprising that the Senate has enacted legislation during pro forma sessions even when it has said that no business will be transacted. Indeed, the Senate passed a bill by unanimous consent during the second pro forma session after its December 17 adjournment … The Recess Appointments Clause responds to a structural difference between the Executive and Legislative Branches: The Executive Branch is perpetually in operation, while the Legislature only acts in intervals separated by recesses. The purpose of the Clause is to allow the Executive to continue operating while the Senate is unavailable. We believe that the Clause’s text, standing alone, is ambiguous. It does not resolve whether the President may make appointments during intra-session recesses, or whether he may fill pre-recess vacancies. But the broader reading better serves the Clause’s struc- tural function. Moreover, that broader reading is reinforced by centuries of history, which we are hesitant to disturb. We thus hold that the Constitution empowers the President to fill any existing vacancy during any recess—intra-session or inter-session—of sufficient length. Given our answer to the last question before us, we conclude that the Recess Appointments Clause does not give the President the constitutional authority to make the appointments here at issue. Because the Court of Appeals reached the same ultimate conclusion (though for reasons we reject), its judgment is affirmed. It is so ordered. Justice Scalia, with whom The Chief Justice, Justice Thomas, and Justice Alito join, concurring in the judgment. Except where the Constitution or a valid federal law provides otherwise, all “Officers of the United States” must be appointed by the President “by and with the Advice and Consent of the Senate.” U. S. Const., Art. II, §2, cl. 2. That general rule is subject to an exception: “The President shall have Power to fill up all Vacancies that may happen during the Recess of the Senate, by granting Commissions which shall expire at the End of their next Session.” Id., §2, cl. 3. This case requires us to decide whether the Recess Appointments Clause authorized three appointments made by President Obama to the National Labor Relations Board in January 2012 without the Senate’s consent. To prevent the President’s recess-appointment power from nullifying the Senate’s role in the appointment process, the Constitution cabins that power in two significant ways. First, it may be exercised only in “the Recess of the Senate,” that is, the intermission between two formal legislative sessions. Second, it may be used to fill only those vacancies that “hap- pen during the Recess,” that is, offices that become vacant during that intermission. Both conditions are clear from the Constitution’s text and struc ture, and both were well understood at the founding. The Court of Appeals correctly held that the appointments here at issue are invalid because they did not meet either condition … The Court’s decision transforms the recess-appointment power from a tool carefully designed to fill a narrow and specific need into a weapon to be wielded by future Presidents against future Senates. To reach that result, the majority casts aside APPOINTMENT AND REMOVAL POWERS | 78 the plain, original meaning of the constitutional text in deference to late-arising historical practices that are ambiguous at best. The majority’s insistence on deferring to the Executive’s untenably broad interpretation of the power is in clear conflict with our precedent and forebodes a diminution of this Court’s role in controversies involving the separation of powers and the structure of government. I concur in the judgment only … The first question presented is whether “the Recess of the Senate,” during which the President’s recess-appointment power is active, is (a) the period between two of the Senate’s formal sessions, or (b) any break in the Senate’s proceedings. I would hold that “the Recess” is the gap between sessions and that the appointments at issue here are invalid because they undisputedly were made during the Senate’s session. The Court’s contrary conclusion—that “the Recess” includes “breaks in the midst of a session,” ante, at 9—is inconsistent with the Constitution’s text and structure, and it requires judicial fabrication of vague, unadministrable limits on the recess-appointment power (thus defined) that overstep the judicial role. And although the majority relies heavily on “historical practice,” no practice worthy of our deference sup- ports the majority’s conclusion on this issue … What does all this amount to? In short: Intra-session recess appointments were virtually unheard of for the first 130 years of the Republic, were deemed unconstitutional by the first Attorney General to address them, were not openly defended by the Executive until 1921, were not made in significant numbers until after World War II, and have been repeatedly criticized as unconstitutional by Senators of both parties. It is astonishing for the majority to assert that this history lends “strong support,” ante, at 11, to its interpretation of the Recess Appointments Clause. The second question presented is whether vacancies that “happen during the Recess of the Senate,” which the President is empowered to fill with recess appointments, are (a) vacancies that arise during the recess, or (b) all vacancies that exist during the recess, regardless of when they arose. I would hold that the recess-appointment power is limited to vacancies that arise during the recess in which they are filled, and I would hold that the appointments at issue here—which undisputedly filled pre-recess vacancies—are invalid for that reason as well as for the reason that they were made during the session. The Court’s contrary conclusion is inconsistent with the Constitution’s text and structure, and it further undermines the balance the Framers struck between Presidential and Senatorial power. Historical practice also fails to support the majority’s conclusion on this issue … In sum: Washington’s and Adams’ Attorneys General read the Constitution to restrict recess appointments to vacancies arising during the recess, and there is no evidence that any of the first four Presidents consciously departed from that reading. The contrary reading was first defended by an executive official in 1823, was vehemently rejected by the Senate in 1863, was vigorously resisted by legislation in place from 1863 until 1940, and is arguably inconsistent with legislation in place from 1940 to the present. The Solicitor General has identified only about 100 appointments that have ever been made under the broader reading, and while it seems likely that a good deal more have been made in the last few decades, there is good reason to doubt that many were made before 1940 (since the appointees could not have been compensated). I can conceive of no sane constitutional theory under which this evidence of “historical practice”—which is actually evi- dence of a long-simmering inter-branch conflict—would require us to defer to the views of the Executive Branch … What the majority needs to sustain its judgment is an ambiguous text and a clear historical practice. What it has is a clear text and an at-best-ambiguous historical practice … 79 | APPOINTMENT AND REMOVAL POWERS The real tragedy of today’s decision is not simply the abolition of the Constitution’s limits on the recess-appointment power and the substitution of a novel framework invented by this Court. It is the damage done to our separation-of- powers jurisprudence more generally. It is not every day that we encounter a proper case or controversy requiring inter- pretation of the Constitution’s structural provisions. Most of the time, the interpretation of those provisions is left to the political branches—which, in deciding how much respect to afford the constitutional text, often take their cues from this Court. We should therefore take every opportunity to affirm the primacy of the Constitution’s enduring principles over the politics of the moment. Our failure to do so today will resonate well beyond the particular dispute at hand. Sad, but true: The Court’s embrace of the adverse-possession theory of executive power (a characterization the majority resists but does not refute) will be cited in diverse contexts, including those presently unimagined, and will have the effect of aggrandizing the Presidency beyond its constitutional bounds and undermining respect for the separation of powers. I concur in the judgment only. Excerpted by Alexandria Metzdorf § Lucia v. SEC 585 U.S. ___ (2018) Decision: Reversed and remanded Vote: 7-2 Majority: Kagan, joined by Roberts, Kennedy, Thomas, Alito, and Gorsuch Concurrence: Thomas, joined by Gorsuch Concur/dissent: Breyer, joined by Ginsburg, and Sotomayor (Part III only) Dissent: Sotomayor, joined by Ginsburg Justice Kagan delivered the opinion of the Court. The Appointments Clause of the Constitution lays out the permissible methods of appointing “Officers of the United States,” a class of government officials distinct from mere employees … This case requires us to decide whether adminis- trative law judges (ALJs) of the Securities and Exchange Commission (SEC or Commission) qualify as such “Officers.” In keeping with Freytag v. Commissioner, (1991), we hold that they do … The SEC has statutory authority to enforce the nation’s securities laws. One way it can do so is by instituting an admin- istrative proceeding against an alleged wrongdoer. By law, the Commission may itself preside over such a proceeding … But the Commission also may, and typically does, delegate that task to an ALJ … The SEC currently has five ALJs. Other staff members, rather than the Commission proper, selected them all … APPOINTMENT AND REMOVAL POWERS | 80 An ALJ assigned to hear an SEC enforcement action has extensive powers—the “authority to do all things necessary and appropriate to discharge his or her duties” and ensure a “fair and orderly” adversarial proceeding … As that list suggests, an SEC ALJ exercises authority “comparable to” that of a federal district judge conducting a bench trial. Butz v. Economou, (1978) … This case began when the SEC instituted an administrative proceeding against petitioner Raymond Lucia and his invest- ment company. Lucia marketed a retirement savings strategy called “Buckets of Money.” In the SEC’s view, Lucia used misleading slideshow presentations to deceive prospective clients. The SEC charged Lucia under the Investment Advis- ers Act, and assigned ALJ Cameron Elliot to adjudicate the case. After nine days of testimony and argument, Judge Elliot issued an initial decision concluding that Lucia had violated the Act and imposing sanctions, including civil penalties of $300,000 and a lifetime bar from the investment industry … On appeal to the SEC, Lucia argued that the administrative proceeding was invalid because Judge Elliot had not been constitutionally appointed. According to Lucia, the Commission’s ALJs are “Officers of the United States” and thus subject to the Appointments Clause … [T]he Commission had left the task of appointing ALJs, including Judge Elliot, to SEC staff members … As a result, Lucia contended, Judge Elliot lacked constitutional authority to do his job … The sole question here is whether the Commission’s ALJs are “Officers of the United States” or simply employees of the Federal Government. The Appointments Clause prescribes the exclusive means of appointing “Officers.” Only the Pres- ident, a court of law, or a head of department can do so. Two decisions set out this Court’s basic framework for distinguishing between officers and employees. Germaine v. US (1879) held that “civil surgeons” (doctors hired to perform various physical exams) were mere employees because their duties were “occasional or temporary” rather than “continuing and permanent … ” Stressing “ideas of tenure [and] dura- tion,” the Court there made clear that an individual must occupy a “continuing” position established by law to qualify as an officer. Buckley v. Valeo (1976) then set out another requirement, central to this case. It determined that members of a federal commission were officers only after finding that they “exercis[ed] significant authority pursuant to the laws of the United States … ” The inquiry thus focused on the extent of power an individual wields in carrying out his assigned functions. Both the amicus and the Government urge us to elaborate on Buckley’s “significant authority” test, but another of our precedents makes that project unnecessary … [I]n Freytag v. Commissioner, (1991), we applied the unadorned “signifi- cant authority” test to adjudicative officials who are near-carbon copies of the Commission’s ALJs. As we now explain, our analysis there (sans any more detailed legal criteria) necessarily decides this case. The officials at issue in Freytag were the “special trial judges” (STJs) of the United States Tax Court. The authority of those judges depended on the significance of the tax dispute before them. In “comparatively narrow and minor matters,” they could both hear and definitively resolve a case for the Tax Court … In more major matters, they could preside over the hearing, but could not issue the final decision; instead, they were to “prepare proposed findings and an opinion” for a regular Tax Court judge to consider … 81 | APPOINTMENT AND REMOVAL POWERS This Court held that the Tax Court’s STJs are officers, not mere employees. Citing Germaine, the Court first found that STJs hold a continuing office established by law … They serve on an ongoing, rather than a “temporary [or] episodic[,] basis”; and their “duties, salary, and means of appointment” are all specified in the Tax Code. For all the reasons we have given, and all those Freytag gave before, the Commission’s ALJs are “Officers of the United States,” subject to the Appointments Clause … This Court has held that “one who makes a timely challenge to the con- stitutional validity of the appointment of an officer who adjudicates his case” is entitled to relief. Ryder v. United States, (1995). Lucia made just such a timely challenge: He contested the validity of Judge Elliot’s appointment before the Com- mission, and continued pressing that claim in the Court of Appeals and this Court. So what relief follows? This Court has also held that the “appropriate” remedy for an adjudication tainted with an appointments violation is a new “hearing before a properly appointed” official … And we add today one thing more. That official cannot be Judge Elliot, even if he has by now received (or receives sometime in the future) a constitutional appointment. Judge Elliot has already both heard Lucia’s case and issued an initial decision on the merits. He cannot be expected to consider the matter as though he had not adjudicated it before. To cure the constitutional error, another ALJ (or the Commission itself) must hold the new hearing to which Lucia is entitled. We accordingly reverse the judgment of the Court of Appeals and remand the case for further proceedings consistent with this opinion. It is so ordered. Note: In June of 2020, Lucia entered a settlement with the SEC which banned Lucia from the securities industry, though he could reapply for admittance, and included a fine of $25,000.00. (see https://www.investmentnews.com/sec-ray-lucia- settle-lawsuit-194238, last accessed on April 27, 2023.) § APPOINTMENT AND REMOVAL POWERS | 82 Executive Privilege United States v. Nixon 418 U.S. 683 (1974) Decision: Affirmed Vote: 8-0 Majority: Burger, joined by Douglas, Brennan, Stewart, White, Marshall, Blackmun, and Powell MR. CHIEF JUSTICE BURGER delivered the opinion of the Court. This litigation presents for review the denial of a motion … to quash a third-party subpoena duces tecum issued … pur- suant to Fed. Rule Crim. Proc. 17 (c). The subpoena directed the President to produce certain tape recordings and doc- uments relating to his conversations with aides and advisers … On March 1, 1974, a grand jury of the United States District Court for the District of Columbia returned an indictment charging seven named individuals with various offenses, including conspiracy to defraud the United States and to obstruct justice. Although he was not designated as such in the indictment, the grand jury named the President, among others, as an unindicted coconspirator … [W]e turn to the claim that the subpoena should be quashed because it demands “confidential conversations between a President and his close advisors that it would be inconsistent with the public interest to produce … ” The first contention is a broad claim that the separation of powers doctrine precludes judicial review of a President’s claim of privilege. The second contention is that if he does not prevail on the claim of absolute privilege, the court should hold as a matter of constitutional law that the privilege prevails over the subpoena duces tecum. In the performance of assigned constitutional duties each branch of the Government must initially interpret the Consti- tution, and the interpretation of its powers by any branch is due great respect from the others. The President’s counsel, as we have noted, reads the Constitution as providing an absolute privilege of confidentiality for all Presidential commu- nications. Many decisions of this Court, however, have unequivocally reaffirmed the holding of Marbury v. Madison, (1803), that “[i]t is emphatically the province and duty of the judicial department to say what the law is … ” Since this Court has consistently exercised the power to construe and delineate claims arising under express powers, it must follow that the Court has authority to interpret claims with respect to powers alleged to derive from enumerated powers … Our system of government “requires that federal courts on occasion interpret the Constitution in a manner at variance with the construction given the document by another branch.” Powell v. McCormack, (1969) … And in Baker v. Carr (1961), the Court stated: 83 | EXECUTIVE PRIVILEGE “Deciding whether a matter has in any measure been committed by the Constitution to another branch of government, or whether the action of that branch exceeds whatever authority has been committed, is itself a delicate exercise in con- stitutional interpretation, and is a responsibility of this Court as ultimate interpreter of the Constitution.” Notwithstanding the deference each branch must accord the others, the “judicial Power of the United States” vested in the federal courts by Art. III, § 1, of the Constitution can no more be shared with the Executive Branch than the Chief Executive, for example, can share with the Judiciary the veto power, or the Congress share with the Judiciary the power to override a Presidential veto. Any other conclusion would be contrary to the basic concept of separation of powers and the checks and balances that flow from the scheme of a tripartite government … We therefore reaffirm that it is the province and duty of this Court “to say what the law is” with respect to the claim of privilege presented in this case. In support of his claim of absolute privilege, the President’s counsel urges two grounds, one of which is common to all governments and one of which is peculiar to our system of separation of powers. The first ground is the valid need for protection of communications between high Government officials and those who advise and assist them in the perfor- mance of their manifold duties; the importance of this confidentiality is too plain to require further discussion … The second ground asserted by the President’s counsel in support of the claim of absolute privilege rests on the doctrine of separation of powers. Here it is argued that the independence of the Executive Branch within its own sphere … insu- lates a President from a judicial subpoena in an ongoing criminal prosecution, and thereby protects confidential Presi- dential communications. However, neither the doctrine of separation of powers, nor the need for confidentiality of high-level communications, without more, can sustain an absolute, unqualified Presidential privilege of immunity from judicial process under all cir- cumstances. The President’s need for complete candor and objectivity from advisers calls for great deference from the courts … [W]e find it difficult to accept the argument that even the very important interest in confidentiality of Presi- dential communications is significantly diminished by production of such material for in camera inspection with all the protection that a district court will be obliged to provide. The impediment that an absolute, unqualified privilege would place in the way of the primary constitutional duty of the Judicial Branch to do justice in criminal prosecutions would plainly conflict with the function of the courts under Art. III. In designing the structure of our Government and dividing and allocating the sovereign power among three co-equal branches, the Framers of the Constitution sought to provide a comprehensive system, but the separate powers were not intended to operate with absolute independence … To read the Art. II powers of the President as providing an absolute privilege as against a subpoena essential to enforce- ment of criminal statutes on no more than a generalized claim of the public interest in confidentiality of nonmilitary and nondiplomatic discussions would upset the constitutional balance of “a workable government” and gravely impair the role of the courts under Art. III. Since we conclude that the legitimate needs of the judicial process may outweigh Presidential privilege, it is necessary to resolve those competing interests in a manner that preserves the essential functions of each branch. The right and indeed the duty to resolve that question does not free the Judiciary from according high respect to the representations made on behalf of the President … EXECUTIVE PRIVILEGE | 84 When he signed the Act into law, President George W. Bush issued a statement declaring his position that § 214 would, “if construed as mandatory rather than advisory, impermissibly interfere with the President’s constitutional authority to formulate the position of the United States, speak for the Nation in international affairs, and determine the terms on which recognition is given to foreign states … ” The President concluded, “U.S. policy regarding Jerusalem has not changed … ” In considering claims of Presidential power this Court refers to Justice Jackson’s familiar tripartite framework from Youngstown Sheet & Tube Co. v. Sawyer, (1952) (concurring opinion) … [W]hen “the President takes measures incompatible with the expressed or implied will of Congress … he can rely only upon his own constitutional powers minus any constitutional powers of Congress over the matter.” To succeed in this third category, the President’s asserted power must be both “exclusive” and “conclusive” on the issue … In this case the Secretary contends that § 214(d) infringes on the President’s exclusive recognition power by “requiring the President to contradict his recognition position regarding Jerusalem in official communications with foreign sover- eigns.” In so doing the Secretary acknowledges the President’s power is “at its lowest ebb … ” Because the President’s refusal to implement § 214(d) falls into Justice Jackson’s third category, his claim must be “scrutinized with caution,” and he may rely solely on powers the Constitution grants to him alone … Recognition is a “formal acknowledgment” that a particular “entity possesses the qualifications for statehood” or “that a particular regime is the effective government of a state … ” Recognition is often effected by an express “written or oral declaration … ” It may also be implied—for example, by concluding a bilateral treaty or by sending or receiving diplo- matic agents … Despite the importance of the recognition power in foreign relations, the Constitution does not use the term “recogni- tion,” either in Article II or elsewhere. The Secretary asserts that the President exercises the recognition power based on the Reception Clause, which directs that the President “shall receive Ambassadors and other public Ministers.” Art. II, § 3. As Zivotofsky notes, the Reception Clause received little attention at the Constitutional Convention … At the time of the founding, however, prominent international scholars suggested that receiving an ambassador was tan- tamount to recognizing the sovereignty of the sending state … It is a logical and proper inference, then, that a Clause directing the President alone to receive ambassadors would be understood to acknowledge his power to recognize other nations … The inference that the President exercises the recognition power is further supported by his additional Article II powers. It is for the President, “by and with the Advice and Consent of the Senate,” to “make Treaties, provided two thirds of the Senators present concur.” Art. II, § 2, cl. 2. In addition, “he shall nominate, and by and with the Advice and Consent of the Senate, shall appoint Ambassadors” as well as “other public Ministers and Consuls.” As a matter of constitutional structure, these additional powers give the President control over recognition decisions. At international law, recognition may be effected by different means, but each means is dependent upon Presidential power. In addition to receiving an ambassador, recognition may occur on “the conclusion of a bilateral treaty,” or the “formal initiation of diplomatic relations,” including the dispatch of an ambassador … The Constitution thus assigns the President means to effect recognition on his own initiative. Congress, by contrast, has no constitutional power that PRESIDENTIAL POWERS IN FOREIGN AFFAIRS | 146 would enable it to initiate diplomatic relations with a foreign nation. Because these specific Clauses confer the recogni- tion power on the President, the Court need not consider whether or to what extent the Vesting Clause, which provides that the “executive Power” shall be vested in the President, provides further support for the President’s action here. Art. II, § 1, cl. 1. The text and structure of the Constitution grant the President the power to recognize foreign nations and governments. The question then becomes whether that power is exclusive. The various ways in which the President may unilaterally effect recognition—and the lack of any similar power vested in Congress—suggest that it is. So, too, do functional con- siderations. Put simply, the Nation must have a single policy regarding which governments are legitimate in the eyes of the United States and which are not. Foreign countries need to know, before entering into diplomatic relations or com- merce with the United States, whether their ambassadors will be received; whether their officials will be immune from suit in federal court; and whether they may initiate lawsuits here to vindicate their rights. These assurances cannot be equivocal … It remains true, of course, that many decisions affecting foreign relations—including decisions that may determine the course of our relations with recognized countries—require congressional action. Congress may “regulate Commerce with foreign Nations,” “establish an uniform Rule of Naturalization,” “define and punish Piracies and Felonies commit- ted on the high Seas, and Offences against the Law of Nations,” “declare War,” “grant Letters of Marque and Reprisal,” and “make Rules for the Government and Regulation of the land and naval Forces … ” Although the President alone effects the formal act of recognition, Congress’ powers, and its central role in making laws, give it substantial authority regarding many of the policy determinations that precede and follow the act of recognition itself. If Congress disagrees with the President’s recognition policy, there may be consequences. Formal recognition may seem a hollow act if it is not accompanied by the dispatch of an ambassador, the easing of trade restrictions, and the con- clusion of treaties. And those decisions require action by the Senate or the whole Congress. In practice, then, the President’s recognition determination is just one part of a political process that may require Con- gress to make laws. The President’s exclusive recognition power encompasses the authority to acknowledge, in a formal sense, the legitimacy of other states and governments, including their territorial bounds. Albeit limited, the exclusive recognition power is essential to the conduct of Presidential duties. The formal act of recognition is an executive power that Congress may not qualify. If the President is to be effective in negotiations over a formal recognition determination, it must be evident to his counterparts abroad that he speaks for the Nation on that precise question … Here, history is not all on one side, but on balance it provides strong support for the conclusion that the recognition power is the President’s alone. As Zivotofsky argues, certain historical incidents can be interpreted to support the posi- tion that recognition is a shared power. But the weight of historical evidence supports the opposite view, which is that the formal determination of recognition is a power to be exercised only by the President … As the power to recognize foreign states resides in the President alone, the question becomes whether § 214(d) infringes on the Executive’s consistent decision to withhold recognition with respect to Jerusalem … Section 214(d) requires that, in a passport or consular report of birth abroad, “the Secretary shall, upon the request of the citizen or the citizen’s legal guardian, record the place of birth as Israel” for a “United States citizen born in the city 147 | PRESIDENTIAL POWERS IN FOREIGN AFFAIRS of Jerusalem.” That is, § 214(d) requires the President, through the Secretary, to identify citizens born in Jerusalem who so request as being born in Israel. But according to the President, those citizens were not born in Israel. As a matter of United States policy, neither Israel nor any other country is acknowledged as having sovereignty over Jerusalem. In this way, § 214(d) “directly contradicts” the “carefully calibrated and longstanding Executive branch policy of neutrality toward Jerusalem.” If the power over recognition is to mean anything, it must mean that the President not only makes the initial, formal recognition determination but also that he may maintain that determination in his and his agent’s statements. This con- clusion is a matter of both common sense and necessity. If Congress could command the President to state a recognition position inconsistent with his own, Congress could override the President’s recognition determination … Although the statement required by § 214(d) would not itself constitute a formal act of recognition, it is a mandate that the Executive contradict his prior recognition determination in an official document issued by the Secretary of State … As a result, it is unconstitutional. This is all the more clear in light of the longstanding treatment of a passport’s place- of-birth section as an official executive statement implicating recognition … The Secretary’s position on this point has been consistent: He will not place information in the place-of-birth section of a passport that contradicts the President’s recognition policy … If a citizen objects to the country listed as sovereign over his place of birth, then the Secretary will accommodate him by listing the city or town of birth rather than the country … But the Secretary will not list a sovereign that contradicts the President’s recognition policy in a passport. Thus, the Secretary will not list “Israel” in a passport as the country containing Jerusalem … From the face of § 214, from the legislative history, and from its reception, it is clear that Congress wanted to express its displeasure with the President’s policy by, among other things, commanding the Executive to contradict his own, earlier stated position on Jerusalem. This Congress may not do. It is true, as Zivotofsky notes, that Congress has substantial authority over passports … The Court does not question the power of Congress to enact passport legislation of wide scope … The problem with § 214(d), however, lies in how Congress exercised its authority over passports. It was an improper act for Congress to “aggrandiz[e] its power at the expense of another branch” by requiring the President to contradict an ear- lier recognition determination in an official document issued by the Executive Branch. Freytag v. Commissioner, (1991). To allow Congress to control the President’s communication in the context of a formal recognition determination is to allow Congress to exercise that exclusive power itself. As a result, the statute is unconstitutional … In holding § 214(d) invalid the Court does not question the substantial powers of Congress over foreign affairs in general or passports in particular. This case is confined solely to the exclusive power of the President to control recognition deter- minations, including formal statements by the Executive Branch acknowledging the legitimacy of a state or government and its territorial bounds. Congress cannot command the President to contradict an earlier recognition determination in the issuance of passports. The judgment of the Court of Appeals for the District of Columbia Circuit is Affirmed. PRESIDENTIAL POWERS IN FOREIGN AFFAIRS | 148 Excerpted by Alexandria Metzdorf Justice Scalia, with whom The Chief Justice and Justice Alito join, dissenting. Before this country declared independence, the law of England entrusted the King with the exclusive care of his king- dom’s foreign affairs. The royal prerogative included the “sole power of sending ambassadors to foreign states, and receiv- ing them at home,” the sole authority to “make treaties, leagues, and alliances with foreign states and princes,” “the sole prerogative of making war and peace,” and the “sole power of raising and regulating fleets and armies.” W. Blackstone, Commentaries. The People of the United States had other ideas when they organized our Government. They considered a sound structure of balanced powers essential to the preservation of just government, and international relations formed no exception to that principle. The People therefore adopted a Constitution that divides responsibility for the Nation’s foreign concerns between the legislative and executive departments. The Constitution gave the President the “executive Power,” authority to send and responsibility to receive ambassadors, power to make treaties, and command of the Army and Navy—though they qual- ified some of these powers by requiring consent of the Senate. Art. II, §§1–3. At the same time, they gave Congress pow- ers over war, foreign commerce, naturalization, and more. Art. I, §8. “Fully eleven of the powers that Article I, §8 grants Congress deal in some way with foreign affairs.” L. Tribe, American Constitutional Law, §5–18, p. 965. This case arises out of a dispute between the Executive and Legislative Branches about whether the United States should treat Jerusalem as a part of Israel. The Constitution contemplates that the political branches will make policy about the territorial claims of foreign nations the same way they make policy about other international matters: The President will exercise his powers on the basis of his views, Congress its powers on the basis of its views. That is just what has happened here. The political branches of our Government agree on the real-world fact that Israel controls the city of Jerusalem … They disagree, however, about how official documents should record the birthplace of an American citizen born in Jerusalem. The Executive does not accept any state’s claim to sovereignty over Jerusalem, and it maintains that the birthplace des- ignation “Israel” would clash with this stance of neutrality. But the National Legislature has enacted a statute that pro- vides: “For purposes of the registration of birth, certification of nationality, or issuance of a passport of a United States citizen born in the city of Jerusalem, the Secretary [of State] shall, upon the request of the citizen or the citizen’s legal guardian, record the place of birth as Israel.” Foreign Relations Authorization Act, Fiscal Year 2003, §214(d). Menachem Zivotofsky’s parents seek enforcement of this statutory right in the issuance of their son’s passport and consular report of birth abroad … Before turning to Presidential power under Article II, I think it well to establish the statute’s basis in congressional power under Article I. Congress’s power to “establish an uniform Rule of Naturalization,” Art. I, §8, cl. 4, enables it to grant American citizenship to someone born abroad. United States v. Wong Kim Ark., (1898). The naturalization power also enables Congress to furnish the people it makes citizens with papers verifying their citizenship—say a consular report of birth abroad (which certifies citizenship of an American born outside the United States) or a passport (which certifies cit- izenship for purposes of international travel). As the Necessary and Proper Clause confirms, every congressional power 149 | PRESIDENTIAL POWERS IN FOREIGN AFFAIRS “carries with it all those incidental powers which are necessary to its complete and effectual execution.” Cohens v. Vir- ginia, (1821). Even on a miserly understanding of Congress’s incidental authority, Congress may make grants of citizen- ship “effectual” by providing for the issuance of certificates authenticating them. One would think that if Congress may grant Zivotofsky a passport and a birth report, it may also require these papers to record his birthplace as “Israel.” … No doubt congressional discretion in executing legislative powers has its limits; Congress’s chosen approach must be not only “necessary” to carrying its powers into execution, but also “proper.” Congress thus may not transcend boundaries upon legislative authority stated or implied elsewhere in the Constitution. But as we shall see, §214(d) does not transgress any such restriction. The Court frames this case as a debate about recognition. Recognition is a sovereign’s official acceptance of a status under international law … To know all this is to realize at once that §214(d) has nothing to do with recognition. Section 214(d) does not require the Secretary to make a formal declaration about Israel’s sovereignty over Jerusalem. And nobody suggests that international custom infers acceptance of sovereignty from the birthplace designation on a passport or birth report, as it does from bilateral treaties or exchanges of ambassadors. Recognition would preclude the United States (as a matter of international law) from later contesting Israeli sovereignty over Jerusalem. But making a notation in a passport or birth report does not encumber the Republic with any international obligations. It leaves the Nation free (so far as international law is con- cerned) to change its mind in the future. That would be true even if the statute required all passports to list “Israel.” But in fact it requires only those passports to list “Israel” for which the citizen (or his guardian) requests “Israel”; all the rest, under the Secretary’s policy, list “Jerusalem.” It is utterly impossible for this deference to private requests to constitute an act that unequivocally manifests an intention to grant recognition. … The best indication that §214(d) does not concern recognition comes from the State Department’s policies concerning Taiwan. According to the Solicitor General, the United States “acknowledges the Chinese position” that Taiwan is a part of China, but “does not take a position” of its own on that issue. Brief for Respondent 51–52. Even so, the State Depart- ment has for a long time recorded the birthplace of a citizen born in Taiwan as “China.” It indeed insisted on doing so until Congress passed a law (on which §214(d) was modeled) giving citizens the option to have their birthplaces recorded as “Taiwan.” The Solicitor General explains that the designation “China” “involves a geographic description, not an asser- tion that Taiwan is … part of sovereign China.” Brief for Respondent 51–52. Quite so. Section 214(d) likewise calls for nothing beyond a “geographic description”; it does not require the Executive even to assert, never mind formally recog- nize, that Jerusalem is a part of sovereign Israel … Even if the Constitution gives the President sole power to extend recognition, it does not give him sole power to make all decisions relating to foreign disputes over sovereignty. To the contrary, a fair reading of Article I allows Congress to decide for itself how its laws should handle these controversies … PRESIDENTIAL POWERS IN FOREIGN AFFAIRS | 150 The Constitution likewise does not give the President exclusive power to determine which claims to statehood and terri- tory “are legitimate in the eyes of the United States,” ante, at 11. Congress may express its own views about these matters by declaring war, restricting trade, denying foreign aid, and much else besides … No consistent or coherent theory supports the Court’s decision … International disputes about statehood and territory are neither rare nor obscure. Leading foreign debates during the 19th century concerned how the United States should respond to revolutions in Latin America, Texas, Mexico, Hawaii, Cuba. During the 20th century, attitudes toward Communist governments in Russia and China became conspicuous subjects of agitation. Disagreements about Taiwan, Kashmir, and Crimea remain prominent today. A President empow- ered to decide all questions relating to these matters, immune from laws embodying congressional disagreement with his position, would have un- controlled mastery of a vast share of the Nation’s foreign affairs. That is not the chief magistrate under which the American People agreed to live when they adopted the national charter. They believed that “[t]he accumulation of all powers, legislative, executive, and judiciary, in the same hands, … may justly be pronounced the very definition of tyranny.” The Federalist No. 47, p. 301 (Madison). For this reason, they did not entrust either the President or Congress with sole power to adopt uncontradictable policies about any subject—foreign- sovereignty disputes included. They instead gave each political department its own powers, and with that the freedom to contradict the other’s policies. Under the Constitution they approved, Congress may require Zivotofsky’s passport and birth report to record his birthplace as Israel, even if that requirement clashes with the President’s preference for neutral- ity about the status of Jerusalem. I dissent. Excerpted by Rorie Solberg § Trump v. Hawaii 585 U.S. ___ (2018) Decision: Reversed and remanded Vote: 5-4 Majority: Roberts, joined by Kennedy, Thomas, Alito, and Gorsuch Concurrence: Kennedy Concurrence: Thomas Dissent: Breyer, joined by Kagan Dissent: Sotomayor, joined by Ginsburg Chief Justice Roberts delivered the opinion of the Court. 151 | PRESIDENTIAL POWERS IN FOREIGN AFFAIRS Under the Immigration and Nationality Act, foreign nationals seeking entry into the United States undergo a vetting process to ensure that they satisfy the numerous requirements for admission. The Act also vests the President with authority to restrict the entry of aliens when- ever he finds that their entry “would be detrimental to the interests of the United States.” 8 U. S. C. §1182(f). Relying on that delegation, the President concluded that it was necessary to impose entry restrictions on nationals of countries that do not share adequate information for an informed entry determination, or that otherwise present national security risks. Presidential Proclamation No. 9645 (Proclamation). The plaintiffs in this litigation, respondents here, challenged the application of those entry restrictions to certain aliens abroad. We now decide whether the President had authority under the Act to issue the Proclamation, and whether the entry policy vio- lates the Establishment Clause of the First Amendment … DHS collected and evaluated data regarding all foreign governments. §1(d). It identified 16 countries as having deficient information-sharing practices and presenting national security concerns, and another 31 countries as “at risk” of similarly failing to meet the baseline. §1(e). The State Department then undertook diplomatic efforts over a 50-day period to encourage all foreign governments to improve their practices. §1(f ). As a result of that effort, numerous countries pro- vided DHS with travel document exemplars and agreed to share information on known or suspected terrorists. Following the 50-day period, the Acting Secretary of Homeland Security concluded that eight countries—Chad, Iran, Iraq, Libya, North Korea, Syria, Venezuela, and Yemen—remained deficient in terms of their risk profile and willingness to provide requested information. The Acting Secretary recommended that the President impose entry restrictions on certain nationals from all of those countries except Iraq … Plaintiffs challenged the Proclamation—except as applied to North Korea and Venezuela—on several grounds. As rele- vant here, they argued that the Proclamation contravenes provisions in the Immigration and Nationality Act (INA) … Plaintiffs further claimed that the Proclamation violates the Establishment Clause of the First Amendment, because it was motivated not by concerns pertaining to national security but by animus toward Islam … The INA establishes numerous grounds on which an alien abroad may be inadmissible to the United States and ineligible for a visa … Congress has also delegated to the President authority to suspend or restrict the entry of aliens in certain cir- cumstances. The principal source of that authority, §1182(f ), enables the President to “suspend the entry of all aliens or any class of aliens” whenever he “finds” that their entry “would be detrimental to the interests of the United States.” Plaintiffs argue that the Proclamation is not a valid exercise of the President’s authority under the INA. In their view, §1182(f ) confers only a residual power to temporarily halt the entry of a discrete group of aliens engaged in harmful conduct. They also assert that the Proclamation violates another provision of the INA— 8 U. S. C. §1152(a)(1)(A)—because it discriminates on the basis of nationality in the issuance of immigrant visas … §1182(f ) exudes deference to the President in every clause. It entrusts to the President the decisions whether and when to suspend entry … whose entry to suspend … for how long … and on what conditions … It is therefore unsurprising that we have previously observed that §1182(f ) vests the President with “ample power” to impose entry restrictions in addition to those elsewhere enumerated in the INA … The Proclamation falls well within this comprehensive delegation. The sole prerequisite set forth in §1182(f ) is that the President “find[ ]” that the entry of the covered aliens “would be detrimental to the interests of the United States.” PRESIDENTIAL POWERS IN FOREIGN AFFAIRS | 152 The President has undoubtedly fulfilled that requirement here … The Proclamation therefore “craft[ed] … country-spe- cific restrictions that would be most likely to encourage cooperation given each country’s distinct circumstances,” while securing the Nation “until such time as improvements occur.” Plaintiffs … argue, as an initial matter, that the Proclamation fails to provide a persuasive rationale for why nationality alone renders the covered foreign nationals a security risk. And they further discount the President’s stated concern about deficient vetting because the Proclamation allows many aliens from the designated countries to enter on nonimmigrant visas. Such arguments are grounded on the premise that §1182(f ) not only requires the President to make a finding that entry “would be detrimental to the interests of the United States,” but also to explain that finding with sufficient detail to enable judicial review. That premise is questionable. But even assuming that some form of review is appropriate, plaintiffs’ attacks on the sufficiency of the President’s findings cannot be sustained. The 12-page Proclamation—which thoroughly describes the process, agency evaluations, and recommendations underlying the President’s chosen restric- tions—is more detailed than any prior order a President has issued under §1182(f ) … Like its predecessors, the Proclamation makes clear that its “conditional restrictions” will remain in force only so long as necessary to “address” the identified “inadequacies and risks” within the covered nations … To that end, the Procla- mation establishes an ongoing process to engage covered nations and assess every 180 days whether the entry restrictions should be modified or terminated. §§4(a), (b). Indeed, after the initial review period, the President determined that Chad had made sufficient improvements to its identity-management protocols, and he accordingly lifted the entry suspension on its nationals … In short, the language of §1182(f ) is clear, and the Proclamation does not exceed any textual limit on the President’s authority … Plaintiffs’ structural argument starts with the premise that §1182(f ) does not give the President authority to counter- mand Congress’s considered policy judgments. The President, they say, may supplement the INA, but he cannot sup- plant it … We may assume that §1182(f ) does not allow the President to expressly override particular provisions of the INA. But plaintiffs have not identified any conflict between the statute and the Proclamation that would implicitly bar the Presi- dent from addressing deficiencies in the Nation’s vetting system … Plaintiffs suggest that the entry restrictions are unnecessary because consular officers can simply deny visas in individual cases when an alien fails to carry his burden of proving admissibility—for example, by failing to produce certified records regarding his criminal history. But that misses the point: A critical finding of the Proclamation is that the failure of certain countries to provide reliable information prevents the Government from accurately determining whether an alien is inadmissible or poses a threat. Proclamation §1(h). Unless consular officers are expected to apply categorical rules and deny entry from those countries across the board, fraudulent or unreliable documentation may thwart their review in individual cases. And at any rate, the INA certainly does not require that systemic problems such as the lack of reliable States, and of compounding the American people into one common mass. Of consequence, when they act, they act in their States. But the measures they adopt do not, on that account, cease to be the measures of the people themselves, or become the measures of the State governments … The assent of the States in their sovereign capacity is implied in calling a convention, and thus submitting that instrument to the people. But the people were at perfect liberty to accept or reject it, and their act was final. It required not the affir- mance, and could not be negatived, by the State Governments. The Constitution, when thus adopted, was of complete obligation, and bound the State sovereignties … From these conventions, the Constitution derives its whole authority. The government proceeds directly from the peo- ple; is ‘ordained and established,’ in the name of the people; and is declared to be ordained, ‘in order to form a more perfect union, establish justice, insure domestic tranquility, and secure the blessings of liberty to themselves and to their posterity.’ The assent of the states, in their sovereign capacity, is implied, in calling a convention, and thus submitting that instrument to the people. But the people were at perfect liberty to accept or reject it; and their act was final. It required not the affirmance, and could not be negatived, by the state governments. The constitution, when thus adopted, was of complete obligation, and bound the state sovereignties … This government is acknowledged by all, to be one of enumerated powers. The principle, that it can exercise only the powers granted to it, would seem too apparent, to have required to be enforced by all those arguments, which its enlight- ened friends, while it was depending before the people, found it necessary to urge; that principle is now universally admitted. But the question respecting the extent of the powers actually granted, is perpetually arising, and will probably continue to arise, so long as our system shall exist … [T]he government of the Union, though limited in its powers, is supreme within its sphere of action. This would seem to result, necessarily, from its nature. It is the government of all; its powers are delegated by all; it represents all, and acts for all. Though any one state may be willing to control its operations, no state is willing to allow others to control them. The nation, on those subjects on which it can act, must necessarily bind its component parts. But this question is not left to mere reason: the people have, in express terms, decided it … Among the enumerated powers, we do not find that of establishing a bank or creating a corporation. But there is no phrase in the instrument which, like the articles of confederation, excludes incidental or implied powers; and which requires that everything granted shall be expressly and minutely described … A constitution, to contain an accurate detail of all the subdivisions of which its great powers will admit, and of all the means by which they may be carried into exe- cution, would partake of the prolixity of a legal code, and could scarcely be embraced by the human mind. It would, probably, never be understood by the public. Its nature, therefore, requires, that only its great outlines should be marked, its important objects designated, and the minor ingredients which compose those objects, be deduced from the nature of the objects themselves. That this idea was entertained by the framers of the American constitution, is not only to be inferred from the nature of the instrument, but from the language. Why else were some of the limitations, found in the 9th section of the 1st article, introduced? It is also, in some degree, warranted, by their having omitted to use any restric- tive term which might prevent its receiving a fair and just interpretation … 161 | SOURCES AND SCOPE OF LEGISLATIVE POWERS Although, among the enumerated powers of government, we do not find the word ‘bank’ or ‘incorporation,’ we find the great powers, to lay and collect taxes; to borrow money; to regulate commerce; to declare and conduct a war; and to raise and support armies and navies. The sword and the purse, all the external relations, and no inconsiderable portion of the industry of the nation, are intrusted to its government. It is not denied, that the powers given to the government imply the ordinary means of execution. That, for example, of raising revenue, and applying it to national purposes, is admitted to imply the power of conveying money from place to place, as the exigencies of the nation may require, and of employing the usual means of conveyance. But it is denied, that the government … may … erect a corporation. On what foundation does this argument rest? On this alone: the power of creating a corporation, is one appertaining to sovereignty, and is not expressly conferred on congress. This is true. But all legislative powers appertain to sovereignty. The original power of giving the law on any subject whatever, is a sovereign power … if the government of the Union is restrained from creating a corporation … on the single reason that the creation of a corporation is an act of sovereignty … there would be some difficulty in sustaining the authority of congress to pass other laws for the accomplishment of the same objects. The government which has a right to do an act, and has imposed on it, the duty of performing that act, must, according to the dictates of reason, be allowed to select the means … those who contend that it may not … take upon themselves the burden of establishing that exception … In America, the powers of sovereignty are divided between the government of the Union, and those of the states. They are each sovereign, with respect to the objects committed to it, and neither sovereign, with respect to the objects commit- ted to the other … Some state constitutions were formed before, some since that of the United States. We cannot believe, that their relation to each other is in any degree dependent upon this circumstance. Their respective powers must, we think, be precisely the same, as if they had been formed at the same time … To [Congress’] enumeration of powers is added, that of making ‘all laws which shall be necessary and proper, for carrying into execution the foregoing powers, and all other powers vested by this constitution, in the government of the United States, or in any department thereof.’ The counsel for the state of Maryland have urged various arguments, to prove that this clause, though, in terms, a grant of power, is not so, in effect; but is really restrictive of the general right, which might otherwise be implied, of selecting means for executing the enumerated powers. In support of this proposition, they have found it necessary to contend, that this clause was inserted for the purpose of conferring on congress the power of mak- ing laws. That, without it, doubts might be entertained, whether congress could exercise its powers in the form of legis- lation … Could it be necessary to say, that a legislature should exercise legislative powers, in the shape of legislation? After allowing each house to prescribe its own course of proceeding, after describing the manner in which a bill should become a law, would it have entered into the mind of a single member of the convention, that an express power to make laws was neces- sary, to enable the legislature to make them? That a legislature, endowed with legislative powers, can legislate, is a propo- sition too self-evident to have been questioned … But the argument which most conclusively demonstrates the error of the construction contended for by the counsel for the state of Maryland, is founded on the intention of the convention, as manifested in the whole clause. To waste time and argument in proving that, without it, congress might carry its powers into execution, would be not much less idle, than to hold a lighted taper to the sun. As little can it be required to prove, that in the absence of this clause, congress SOURCES AND SCOPE OF LEGISLATIVE POWERS | 162 would have some choice of means … This clause, as construed by the state of Maryland, would abridge, and almost anni- hilate, this useful and necessary right of the legislature to select its means. That this could not be intended, is, we should think, had it not been already controverted, too apparent for controversy. We think so for the following reasons: 1st. The clause is placed among the powers of Congress, not among the limitations on those powers. 2d. Its terms purport to enlarge, not to diminish, the powers vested in the Government. It purports to be an additional power, not a restriction on those already granted. No reason has been or can be assigned for thus concealing an intention to narrow the discretion of the National Legislature under words which purport to enlarge it. The framers of the Con- stitution wished its adoption, and well knew that it would be endangered by its strength, not by its weakness. Had they been capable of using language which would convey to the eye one idea and, after deep reflection, impress on the mind another, they would rather have disguised the grant of power than its limitation. If, then, their intention had been, by this clause, to restrain the free use of means which might otherwise have been implied, that intention would have been inserted in another place, and would have been expressed in terms resembling these. “In carrying into execution the fore- going powers, and all others,” &c., “no laws shall be passed but such as are necessary and proper.” Had the intention been to make this clause restrictive, it would unquestionably have been so in form, as well as in effect. The result of the most careful and attentive consideration bestowed upon this clause is that, if it does not enlarge, it can- not be construed to restrain, the powers of Congress, or to impair the right of the legislature to exercise its best judgment in the selection of measures to carry into execution the Constitutional powers of the Government. If no other motive for its insertion can be suggested, a sufficient one is found in the desire to remove all doubts respecting the right to legislate on that vast mass of incidental powers which must be involved in the Constitution if that instrument be not a splendid bauble. We admit, as all must admit, that the powers of the Government are limited, and that its limits are not to be transcended. But we think the sound construction of the Constitution must allow to the national legislature that discretion with respect to the means by which the powers it confers are to be carried into execution which will enable that body to per- form the high duties assigned to it in the manner most beneficial to the people. Let the end be legitimate, let it be within the scope of the Constitution, and all means which are appropriate, which are plainly adapted to that end, which are not prohibited, but consist with the letter and spirit of the Constitution, are Constitutional … After the most deliberate consideration, it is the unanimous and decided opinion of this Court that the act to incorporate the Bank of the United States is a law made in pursuance of the Constitution, and is a part of the supreme law of the land. The branches, proceeding from the same stock and being conducive to the complete accomplishment of the object, are equally constitutional … It being the opinion of the Court that the act incorporating the bank is constitutional, and that the power of establishing a branch in the State of Maryland might be properly exercised by the bank itself, we proceed to inquire: 163 | SOURCES AND SCOPE OF LEGISLATIVE POWERS 2. Whether the State of Maryland may, without violating the Constitution, tax that branch? [See McCulloch v. Maryland in the Federalism chapter.] Excerpted by Alexandria Metzdorf § Chae Chan Ping v. United States 130 U.S. 581 (1889) Decision: Affirmed Vote: Unanimous Majority: Field,, joined by Fuller, Miller, Bradley, Harlan, Gray, Blatchford, and Lamar MR. JUSTICE FIELD delivered the opinion of the Court. The appeal involves a consideration of the validity of the Act of Congress of October 1, 1888, prohibiting Chinese labor- ers from entering the United States who had departed before its passage, having a certificate issued under the act of 1882 as amended by the act of 1884, granting them permission to return. The validity of the act is assailed as being in effect an expulsion from the country of Chinese laborers, in violation of existing treaties between the United States and the government of China, and of rights vested in them under the laws of Congress … British subjects in China were often subjected not only to the violence of mobs, but to insults and outrages from local authorities of the country, which led to retaliatory measures for the punishment of the aggressors. To such an extent were these measures carried and such resistance offered to them that in 1856, the two countries were in open war … England requested of the President the concurrence and active cooperation of the United States … [A]s the rights of citizens of the United States might be seriously affected by the results of existing hostilities, and commercial intercourse between the United States and China be disturbed, it was deemed advisable to send to China a minister plenipotentiary to repre- sent our government and watch our interests there. Accordingly, Mr. William B. Reed, of Philadelphia, was appointed such minister, and instructed, while abstaining from any direct interference, to aid by peaceful cooperation the objects the allied forces were seeking to accomplish … Through him a new treaty was negotiated with the Chinese government. It was concluded in June, 1858, and ratified in August of the following year … [A]dditional articles to the treaty of 1858 were agreed upon which gave expression to the general desire that the two nations and their peoples should be drawn closer together. The new articles, eight in number, were agreed to on the 28th of July, 1868, and ratifications of them were exchanged at Pekin in November of the following year … “ARTICLE VI. Citizens of the United States visiting or residing in China shall enjoy the same privileges, immunities, or exemptions in respect to travel or residence as may there be enjoyed by the citizens or subjects of the most favored nation, and reciprocally, Chinese subjects visiting or residing in the United shall enjoy the same privileges, immunities, SOURCES AND SCOPE OF LEGISLATIVE POWERS | 164 and exemptions in respect to travel or residence as may there be enjoyed by the citizens or subjects of the most favored nation. But nothing herein contained shall be held to confer naturalization upon citizens of the United States in China, nor upon the subjects of China in the United States … ” The discovery of gold in California in 1848, as is well known, was followed by a large immigration thither from all parts of the world, attracted not only by the hope of gain from the mines, but from the great prices paid for all kinds of labor. The news of the discovery penetrated China, and laborers came from there in great numbers, a few with their own means, but by far the greater number under contract with employers for whose benefit they worked. These laborers readily secured employment … They were generally industrious and frugal. Not being accompanied by families except in rare instances, their expenses were small and they were content with the simplest fare, such as would not suffice for our laborers and artisans. The competition between them and our people was for this reason altogether in their favor, and the consequent irritation, proportionately deep and bitter, was followed, in many cases, by open conflicts, to the great disturbance of the public peace. The differences of race added greatly to the difficulties of the situation … As they grew in numbers each year, the people of the coast saw, or believed they saw, in the facility of immigration and in the crowded millions of China, where popu- lation presses upon the means of subsistence, great danger that at no distant day that portion of our country would be overrun by them unless prompt action was taken to restrict their immigration. The people there accordingly petitioned earnestly for protective legislation … So urgent and constant were the prayers for relief against existing and anticipated evils, both from the public authorities of the Pacific coast and from private individuals that Congress was impelled to act on the subject. Many persons, how- ever, both in and out of Congress, were of opinion that so long as the treaty remained unmodified, legislation restricting immigration would be a breach of faith with China. A statute was accordingly passed appropriating money to send com- missioners to China to act with our minister there in negotiating and concluding by treaty a settlement of such matters of interest between the two governments as might be confided to them …
This task requires you to answer questions based solely on the information provided in the prompt. You are not allowed to use any external resources or prior knowledge. Respond in a bulleted list with additional information for each point.
How can I distinguish different forms of seizures or epilepsy?
Generalized seizures are produced by electrical impulses from throughout the entire brain, whereas partial seizures are produced (at least initially) by a relatively small part of the brain. The part of the brain generating the seizures is sometimes called the focus. Generalized Seizures • The most common and most dramatic is the generalized convulsion, also called the generalized tonic clonic (“grand mal”) seizure. The patient loses consciousness and usually collapses. There is generalized body stiffening (called the “tonic” phase) for 30 to 60 seconds, followed by violent jerking (the “clonic” phase) for 30 to 60 seconds, after which the patient goes into a deep sleep (the “postictal” or after-seizure phase). During these seizures, injuries and accidents may occur, such as tongue biting and urinary incontinence. • Absence seizures cause a short loss of consciousness (just a few seconds) with few or no other symptoms. The patient, most often a child, typically interrupts an activity and stares blankly. These seizures begin and end abruptly and may occur several times a day. Patients are usually not aware that they are having a seizure, except that they may be aware of “losing time.” • Myoclonic seizures consist of sporadic jerks, usually on both sides of the body. Patients sometimes describe the jerks as brief electrical shocks. When violent, these seizures may result in dropping or involuntarily throwing objects. • Clonic seizures are repetitive, rhythmic jerks that involve both sides of the body at the same time. • Tonic seizures are characterized by stiffening of the muscles. • Atonic seizures consist of a sudden and general loss of muscle tone, particularly in the arms and legs, which often result in a fall. Partial Seizures Partial seizures are divided into simple, complex, and those that evolve into (secondary) generalized seizures. The difference between simple and complex partial seizures is that during simple partial seizures, patients retain awareness; during complex partial seizures, they lose awareness. • Simple partial seizures are further subdivided into four categories according to the nature of their symptoms: motor, sensory, autonomic or psychological. o Motor symptoms include movements such as jerking and stiffening. o Sensory symptoms caused by seizures involve unusual sensations affecting any of the five senses (vision, hearing, smell, taste or touch). o When simple partial seizures cause sensory symptoms only (and no motor symptoms), they are called “auras.” o The only common autonomic symptom is a peculiar sensation in the stomach that is experienced by many patients with temporal lobe epilepsy. o Finally, simple partial seizures with psychological symptoms are characterized by various experiences involving memory (the sensation of deja-vu), emotions (such as fear or pleasure), or other complex psychological phenomena. • Complex partial seizures, by definition, include impairment of awareness. Patients seem to be “out of touch,” “out of it” or “staring into space” or “in a trance” during these seizures. There are often odd movements called automatisms, which are involuntary but coordinated movements that tend to be purposeless and repetitive. Common automatisms include lip smacking, chewing, fidgeting and walking. • The third kind of partial seizure is one that begins as a focal seizure and evolves into a generalized convulsive (“tonic clonic”) seizure. Most types of seizures occur in different types of epilepsy, and most patients with epilepsy experience more than one seizure type. This is because seizures are only symptoms. Therefore, it is essential that your neurologist diagnose your type of EPILEPSY, not just the type(s) of SEIZURE you are having. Epilepsy can be divided into two broad categories: idiopathic and symptomatic. Idiopathic epilepsy is caused by genetic factors, as opposed to brain damage. Symptomatic epilepsy is caused by physical defects in the brain. Based on the type of seizure affecting the patient, idiopathic and symptomatic epilepsies can be further categorized. Type 1: Idiopathic Generalized Epilepsy • This is a genetic and inherited group of disorders, so there is often, but not always, a family history of epilepsy. • Idiopathic generalized epilepsy tends to appear during childhood or adolescence, although it may not be diagnosed until adulthood. • In this type of epilepsy, there are no nervous system abnormalities other than the seizures; the brain is structurally normal. • People with idiopathic generalized epilepsy have normal intelligence, and the results of the neurological examination and brain scan are normal. • The results of the electroencephalogram (EEG - a test which measures electrical impulses in the brain) are also normal, except for the discharges associated with epilepsy. • The types of seizures affecting patients with idiopathic generalized epilepsy may include myoclonic, absence, and generalized tonic-clonic seizures, with one type predominating. Idiopathic generalized epilepsy is usually treated with medications and is a condition that is commonly outgrown, as in childhood absence epilepsy. Type 2: Idiopathic Partial Epilepsies • Idiopathic partial epilepsy begins in childhood (between ages 5 and 8) and runs in families. • Also known as benign focal epilepsy of childhood or benign Rolandic epilepsy, this is one of the mildest types of epilepsy. • It is almost always outgrown by puberty and is never diagnosed in adults. • Seizures tend to occur during sleep and are most often simple partial motor seizures that involve the face and secondarily generalized (grand mal) seizures. Type 3: Symptomatic Generalized Epilepsy • This is caused by widespread brain damage, and injury during birth is the most common cause. • When the cause of symptomatic general epilepsy cannot be identified, the disorder may be referred to as cryptogenic epilepsy. • Specific, inherited brain diseases, such as adrenoleukodystrophy (ADL, which was featured in the movie “Lorenzo’s Oil”), or brain infections (such as meningitis and encephalitis) can also cause symptomatic generalized epilepsy. • In addition to seizures, these patients often have other neurological problems, such as developmental delay, mental retardation or cerebral palsy. • These epilepsies include different subtypes—the most typical is the Lennox-Gastaut syndrome. Multiple types of seizures (generalized tonic-clonic, tonic, myoclonic, tonic, atonic and absence seizures) are common and can be difficult to control. Type 4: Symptomatic Partial Epilepsy • This is the most common type of epilepsy to begin in adulthood. • It is caused by a localized abnormality of the brain, which can result from strokes, tumors, trauma, scarring or “sclerosis” of brain tissue (common in the temporal lobe), cysts or infections. • Sometimes these brain abnormalities can be seen on magnetic resonance imaging (MRI) scans, but often they cannot be identified, despite repeated attempts, because they are microscopic. • When the cause of symptomatic partial epilepsy cannot be identified, the disorder may be referred to as cryptogenic epilepsy. The diagnosis is based on: • The patient’s medical history, including any family history of seizures, associated medical conditions and current medications. Some important questions you will be asked include: o At what age did the seizures begin? o What circumstances surrounded your first seizure? o What factors seem to bring on the seizures? o What do you feel before, during and after the seizures? o How long do the seizures last? o Have you been treated for epilepsy before? What medications were prescribed and in what dosages? Was the treatment effective? o Others who have often seen you before, during and after seizures, such as family and close friends, should be present to provide details of your seizures if they involve loss of consciousness. • A complete physical and neurological examination —your muscle strength, reflexes, eye sight, hearing and ability to detect various sensations are tested so your doctors can better understand the cause of your seizures • An electroencephalogram (EEG), which measures electrical impulses in the brain. o This is the only test that directly detects electrical activity in the brain, and seizures are defined by abnormal electrical activity in the brain. During an EEG, electrodes (small metal disks) are attached to specific locations on your head. The electrodes are attached to a monitor to record the brain’s electrical activity. The EEG is useful not only to confirm a diagnosis of epilepsy, but also to determine the type of epilepsy. o A routine EEG only records about 20 minutes of brain waves (however, the routine EEG procedure takes about 90 minutes). Because 20 minutes is such a short amount of time, the results of routine EEG studies are often normal, even in people known to have epilepsy. Therefore, prolonged EEG monitoring may be necessary. Prolonged o EEG-video monitoring is an even better diagnostic method. During this type of monitoring, an EEG monitors the brain’s activity and cameras videotape body movements and behavior during a seizure. Prolonged monitoring often requires the patient to spend time in a special facility for several days. Prolonged EEG-video monitoring is the only definitive way to diagnose epilepsy. • Imaging studies of the brain, such as those provided by magnetic resonance imaging (MRI). This can identify the cause of the seizures, but the vast majority of patients with epilepsy have normal MRIs.
This task requires you to answer questions based solely on the information provided in the prompt. You are not allowed to use any external resources or prior knowledge. Respond in a bulleted list with additional information for each point. How can I distinguish different forms of seizures or epilepsy? Generalized seizures are produced by electrical impulses from throughout the entire brain, whereas partial seizures are produced (at least initially) by a relatively small part of the brain. The part of the brain generating the seizures is sometimes called the focus. Generalized Seizures • The most common and most dramatic is the generalized convulsion, also called the generalized tonic clonic (“grand mal”) seizure. The patient loses consciousness and usually collapses. There is generalized body stiffening (called the “tonic” phase) for 30 to 60 seconds, followed by violent jerking (the “clonic” phase) for 30 to 60 seconds, after which the patient goes into a deep sleep (the “postictal” or after-seizure phase). During these seizures, injuries and accidents may occur, such as tongue biting and urinary incontinence. • Absence seizures cause a short loss of consciousness (just a few seconds) with few or no other symptoms. The patient, most often a child, typically interrupts an activity and stares blankly. These seizures begin and end abruptly and may occur several times a day. Patients are usually not aware that they are having a seizure, except that they may be aware of “losing time.” • Myoclonic seizures consist of sporadic jerks, usually on both sides of the body. Patients sometimes describe the jerks as brief electrical shocks. When violent, these seizures may result in dropping or involuntarily throwing objects. • Clonic seizures are repetitive, rhythmic jerks that involve both sides of the body at the same time. • Tonic seizures are characterized by stiffening of the muscles. • Atonic seizures consist of a sudden and general loss of muscle tone, particularly in the arms and legs, which often result in a fall. Partial Seizures Partial seizures are divided into simple, complex, and those that evolve into (secondary) generalized seizures. The difference between simple and complex partial seizures is that during simple partial seizures, patients retain awareness; during complex partial seizures, they lose awareness. • Simple partial seizures are further subdivided into four categories according to the nature of their symptoms: motor, sensory, autonomic or psychological. o Motor symptoms include movements such as jerking and stiffening. o Sensory symptoms caused by seizures involve unusual sensations affecting any of the five senses (vision, hearing, smell, taste or touch). o When simple partial seizures cause sensory symptoms only (and no motor symptoms), they are called “auras.” o The only common autonomic symptom is a peculiar sensation in the stomach that is experienced by many patients with temporal lobe epilepsy. o Finally, simple partial seizures with psychological symptoms are characterized by various experiences involving memory (the sensation of deja-vu), emotions (such as fear or pleasure), or other complex psychological phenomena. • Complex partial seizures, by definition, include impairment of awareness. Patients seem to be “out of touch,” “out of it” or “staring into space” or “in a trance” during these seizures. There are often odd movements called automatisms, which are involuntary but coordinated movements that tend to be purposeless and repetitive. Common automatisms include lip smacking, chewing, fidgeting and walking. • The third kind of partial seizure is one that begins as a focal seizure and evolves into a generalized convulsive (“tonic clonic”) seizure. Most types of seizures occur in different types of epilepsy, and most patients with epilepsy experience more than one seizure type. This is because seizures are only symptoms. Therefore, it is essential that your neurologist diagnose your type of EPILEPSY, not just the type(s) of SEIZURE you are having. Epilepsy can be divided into two broad categories: idiopathic and symptomatic. Idiopathic epilepsy is caused by genetic factors, as opposed to brain damage. Symptomatic epilepsy is caused by physical defects in the brain. Based on the type of seizure affecting the patient, idiopathic and symptomatic epilepsies can be further categorized. Type 1: Idiopathic Generalized Epilepsy • This is a genetic and inherited group of disorders, so there is often, but not always, a family history of epilepsy. • Idiopathic generalized epilepsy tends to appear during childhood or adolescence, although it may not be diagnosed until adulthood. • In this type of epilepsy, there are no nervous system abnormalities other than the seizures; the brain is structurally normal. • People with idiopathic generalized epilepsy have normal intelligence, and the results of the neurological examination and brain scan are normal. • The results of the electroencephalogram (EEG - a test which measures electrical impulses in the brain) are also normal, except for the discharges associated with epilepsy. • The types of seizures affecting patients with idiopathic generalized epilepsy may include myoclonic, absence, and generalized tonic-clonic seizures, with one type predominating. Idiopathic generalized epilepsy is usually treated with medications and is a condition that is commonly outgrown, as in childhood absence epilepsy. Type 2: Idiopathic Partial Epilepsies • Idiopathic partial epilepsy begins in childhood (between ages 5 and 8) and runs in families. • Also known as benign focal epilepsy of childhood or benign Rolandic epilepsy, this is one of the mildest types of epilepsy. • It is almost always outgrown by puberty and is never diagnosed in adults. • Seizures tend to occur during sleep and are most often simple partial motor seizures that involve the face and secondarily generalized (grand mal) seizures. Type 3: Symptomatic Generalized Epilepsy • This is caused by widespread brain damage, and injury during birth is the most common cause. • When the cause of symptomatic general epilepsy cannot be identified, the disorder may be referred to as cryptogenic epilepsy. • Specific, inherited brain diseases, such as adrenoleukodystrophy (ADL, which was featured in the movie “Lorenzo’s Oil”), or brain infections (such as meningitis and encephalitis) can also cause symptomatic generalized epilepsy. • In addition to seizures, these patients often have other neurological problems, such as developmental delay, mental retardation or cerebral palsy. • These epilepsies include different subtypes—the most typical is the Lennox-Gastaut syndrome. Multiple types of seizures (generalized tonic-clonic, tonic, myoclonic, tonic, atonic and absence seizures) are common and can be difficult to control. Type 4: Symptomatic Partial Epilepsy • This is the most common type of epilepsy to begin in adulthood. • It is caused by a localized abnormality of the brain, which can result from strokes, tumors, trauma, scarring or “sclerosis” of brain tissue (common in the temporal lobe), cysts or infections. • Sometimes these brain abnormalities can be seen on magnetic resonance imaging (MRI) scans, but often they cannot be identified, despite repeated attempts, because they are microscopic. • When the cause of symptomatic partial epilepsy cannot be identified, the disorder may be referred to as cryptogenic epilepsy. The diagnosis is based on: • The patient’s medical history, including any family history of seizures, associated medical conditions and current medications. Some important questions you will be asked include: o At what age did the seizures begin? o What circumstances surrounded your first seizure? o What factors seem to bring on the seizures? o What do you feel before, during and after the seizures? o How long do the seizures last? o Have you been treated for epilepsy before? What medications were prescribed and in what dosages? Was the treatment effective? o Others who have often seen you before, during and after seizures, such as family and close friends, should be present to provide details of your seizures if they involve loss of consciousness. • A complete physical and neurological examination —your muscle strength, reflexes, eye sight, hearing and ability to detect various sensations are tested so your doctors can better understand the cause of your seizures • An electroencephalogram (EEG), which measures electrical impulses in the brain. o This is the only test that directly detects electrical activity in the brain, and seizures are defined by abnormal electrical activity in the brain. During an EEG, electrodes (small metal disks) are attached to specific locations on your head. The electrodes are attached to a monitor to record the brain’s electrical activity. The EEG is useful not only to confirm a diagnosis of epilepsy, but also to determine the type of epilepsy.
The user will provide a question. Answer based exclusively on the context block. Do not use any outside knowledge or any prior knowledge.
What could cause the flavor of my espresso to be kind of charred?
Thank you for choosing the Capresso Steam PRO Espresso & Cappuccino Machine. It is the perfect starter machine for espressos, cappuccinos and lattes. With a bit of practice you will be able to produce two to four cappuccinos or lattes at a time. Please read all of the instructions in this booklet before operating your new machine. Understanding and complying with these instructions is essential to ensure that the machine is utilized without risk and to ensure safety during operation and maintenance. 2. HOW TO REACH JURA-CAPRESSO Should you require further information or if particular problems occur that are not covered in this manual, please • CALL our toll free HELP LINE: 1-800-767-3554 Monday -Thursday 8AM to 9PM, Friday 8AM to 8PM and Saturday 9AM to 5PM Eastern Standard Time. Feel free to call at any time. If you are connected to our voicemail, PLEASE DO NOT HANG UP. Leave your name, telephone number and we will return your call. Please also leave the model number of your Capresso product, in this case it is #304. • FAX us at 1-201-767-9684 • E-MAIL us at [email protected] • VISIT our website at www.capresso.com • WRITE to Jura Capresso, Inc., Customer Service, P.O. Box 775, Closter, NJ 07624 3. DE-PRESSURIZING CAUTION! Never open the boiler cap and never remove the filter holder as long as there is pressure in the boiler container. In order to check if the machine is still under pressure follow these steps: 1. The machine is on, the filter holder is inserted and the boiler cap is closed. 2. Place an empty cup under the frother nozzle (fig. 10). 3. Move the coffee/steam selector to the steam symbol (fig. 8). 4. Open the steam knob (fig. 9). Wait until all steam is released. 6 5. Turn the power switch off (fig. 6). 6. Open and remove the boiler cap (see chapter 5) 7. It is now safe to remove the filter holder. 8. Move the coffee/steam selector to the cup symbol (fig. 8). Caution: Never try to remove the filter holder with the carafe in place. Pressure could force the filter holder down, smashing the carafe and causing severe injuries. Always remove the carafe first. Caution: Never leave machine unattended when it is turned on (red light in the power switch is illuminated). Always turn the machine off when finished. 5. SAFETY BOILER CAP To open the boiler cap: turn the cap a quarter turn counter clockwise. Slightly lift the cap and turn another quarter turn counter clockwise and lift the cap. To close the boiler cap: Place the cap onto the boiler neck and turn clockwise until cap sinks into the groove. Continue turning the cap until firmly locked. 6. HELPFUL HINTS • Espresso Drink: An espresso is a far richer drink with a more intense taste than regular brewed drip coffee. An espresso is normally 1 1/2 to 2 oz. of strong coffee. Espresso should be served immediately after brewing. If the espresso is too strong, you can add hot water. Add sugar to taste. • Preparing espresso is different than preparing regular drip coffee. The machine works under pressure, bringing the water to a boil and then forcing it through the ground coffee in a short period of time. • Important: The water in the boiler of the machine will get hotter during the brewing process. Towards the end of the brewing process the water will be so hot that it would burn your espresso. Therefore you never want to process all the water through the coffee as this will result in a burnt taste. • Which Coffee? Any coffee labeled "espresso" is suitable for your machine. Any coffee with at least 80% Arabica beans is ideal for espresso preparation. Check with your local coffee store • Which Grind? Steam boiler espresso machines, do not require a fine espresso grind. For maximum flavor and aroma we recommend a medium espresso grind or a fine drip grind. If you grind your own coffee we recommend using a burr or disk/burr grinder. Small blade grinders can create "coffee dust". Coffee dust can dramatically slow down the water flow during brewing resulting in bitter and overheated coffee taste. • Cappuccino: 1 1/2 to 2 oz. of espresso coffee with 3 to 4 oz. of steamed and frothed milk on top. Sprinkle chocolate shavings or cinnamon on top of 7 the milk froth. For a stronger taste increase the amount of coffee. For a milder taste increase the amount of milk. • Latte: 1 1/2 to 2 oz. of espresso coffee with 3 to 4 oz. of steamed milk (very little or no milk froth). • Frothing: Foamy layer of milk froth on top of hot milk. • Which kind of milk? Skim milk and 1% milk will produce more milk froth than 2% or regular milk. • Markings on Glass Carafe: The markings on the glass carafe help you in the preparation of brewing and frothing. Upper rim of metal band: Maximum capacity of boiler (approx. 10 oz.). For best results always fill the boiler with 10 oz. of fresh cold water. 4 cup marking: Maximum amount of espresso you should brew (approx. 8 oz.). If you brew more than 8 oz. the coffee will taste burnt. Depending on the coffee roast you might even want to brew a little less to avoid a bitter aroma. 2 cup marking: (approx. 4 oz.), guide line for a double shot of espresso. Bottom line marking: Once the coffee has reached this level there is enough pressure in the boiler for steaming and frothing. 7. PREPARING ESPRESSO Caution: Do not leave the machine alone during brewing. Keep children away during brewing. 1. Make sure the machine is plugged in and turned off. The glass carafe is removed from the drip tray. Important: The steam knob (fig. 9) must be in the closed position. The coffee/steam selector points to the cup symbol in front of the machine (stronger coffee). Moving the coffee/steam selector to the right, accelerates brewing and decreases coffee strength. 2. Fill the basket with ground coffee, using the measuring scoop (fig.1). The basket is marked on the inside indicating "2 cups" and "4 cups". Never overfill the basket. Clear any excess coffee from the rim of the filter holder. Important: it is not necessary to tamp (press down) the coffee. 3. Insert the basket into the filter holder (fig. 2), then insert the filter holder into the machine (fig. 3). 4. Turn filter holder to the right until it reaches the "locked" position (fig.1,8). 5. Fill the glass carafe to the upper rim of the metal band (approx. 10 oz.) with fresh, cold water. 6. Unscrew the boiler cap (see chapter 5). Using the glass carafe, fill the boiler with water (fig. 4) and close the boiler cap securely (see chapter 5). 7. Place the carafe lid on the carafe so that the opening on the lid points towards the pouring spout of the carafe (fig. 7). Place the carafe on the drip tray as shown in fig. 1. 8. Turn the power switch on (fig. 6). The power switch illuminates and the machine starts heating the water. 9. After approx. 2 1/2 to 3 minutes hot water will start forcing its way through the filter holder into the carafe. When you have enough espresso in the glass carafe turn the power switch off and turn the coffee/steam selector to the steam symbol on the left to stop the flow. Remove the carafe and serve. Add a bit of sugar and enjoy. Tip: To avoid a "burnt taste" never process all the water through the coffee. Once the brewing noise increases and steam develops, stop the brewing. 8 10. Important: Do not open the boiler cap. Do not remove the filter holder. First depressurize the machine. See chapter 3. 11. After de-pressurizing remove the filter holder by turning it to the left to the "open lock" symbol. Then push the thumb-guard of filter holder over the hot rim of the basket. Dump the used coffee (fig. 13) and rinse the basket and the filter holder under running water. Return the coffee/steam selector to the cup symbol.
The user will provide a question. Answer based exclusively on the context block. Do not use any outside knowledge or any prior knowledge. Thank you for choosing the Capresso Steam PRO Espresso & Cappuccino Machine. It is the perfect starter machine for espressos, cappuccinos and lattes. With a bit of practice you will be able to produce two to four cappuccinos or lattes at a time. Please read all of the instructions in this booklet before operating your new machine. Understanding and complying with these instructions is essential to ensure that the machine is utilized without risk and to ensure safety during operation and maintenance. 2. HOW TO REACH JURA-CAPRESSO Should you require further information or if particular problems occur that are not covered in this manual, please • CALL our toll free HELP LINE: 1-800-767-3554 Monday -Thursday 8AM to 9PM, Friday 8AM to 8PM and Saturday 9AM to 5PM Eastern Standard Time. Feel free to call at any time. If you are connected to our voicemail, PLEASE DO NOT HANG UP. Leave your name, telephone number and we will return your call. Please also leave the model number of your Capresso product, in this case it is #304. • FAX us at 1-201-767-9684 • E-MAIL us at [email protected] • VISIT our website at www.capresso.com • WRITE to Jura Capresso, Inc., Customer Service, P.O. Box 775, Closter, NJ 07624 3. DE-PRESSURIZING CAUTION! Never open the boiler cap and never remove the filter holder as long as there is pressure in the boiler container. In order to check if the machine is still under pressure follow these steps: 1. The machine is on, the filter holder is inserted and the boiler cap is closed. 2. Place an empty cup under the frother nozzle (fig. 10). 3. Move the coffee/steam selector to the steam symbol (fig. 8). 4. Open the steam knob (fig. 9). Wait until all steam is released. 6 5. Turn the power switch off (fig. 6). 6. Open and remove the boiler cap (see chapter 5) 7. It is now safe to remove the filter holder. 8. Move the coffee/steam selector to the cup symbol (fig. 8). Caution: Never try to remove the filter holder with the carafe in place. Pressure could force the filter holder down, smashing the carafe and causing severe injuries. Always remove the carafe first. Caution: Never leave machine unattended when it is turned on (red light in the power switch is illuminated). Always turn the machine off when finished. 5. SAFETY BOILER CAP To open the boiler cap: turn the cap a quarter turn counter clockwise. Slightly lift the cap and turn another quarter turn counter clockwise and lift the cap. To close the boiler cap: Place the cap onto the boiler neck and turn clockwise until cap sinks into the groove. Continue turning the cap until firmly locked. 6. HELPFUL HINTS • Espresso Drink: An espresso is a far richer drink with a more intense taste than regular brewed drip coffee. An espresso is normally 1 1/2 to 2 oz. of strong coffee. Espresso should be served immediately after brewing. If the espresso is too strong, you can add hot water. Add sugar to taste. • Preparing espresso is different than preparing regular drip coffee. The machine works under pressure, bringing the water to a boil and then forcing it through the ground coffee in a short period of time. • Important: The water in the boiler of the machine will get hotter during the brewing process. Towards the end of the brewing process the water will be so hot that it would burn your espresso. Therefore you never want to process all the water through the coffee as this will result in a burnt taste. • Which Coffee? Any coffee labeled "espresso" is suitable for your machine. Any coffee with at least 80% Arabica beans is ideal for espresso preparation. Check with your local coffee store • Which Grind? Steam boiler espresso machines, do not require a fine espresso grind. For maximum flavor and aroma we recommend a medium espresso grind or a fine drip grind. If you grind your own coffee we recommend using a burr or disk/burr grinder. Small blade grinders can create "coffee dust". Coffee dust can dramatically slow down the water flow during brewing resulting in bitter and overheated coffee taste. • Cappuccino: 1 1/2 to 2 oz. of espresso coffee with 3 to 4 oz. of steamed and frothed milk on top. Sprinkle chocolate shavings or cinnamon on top of 7 the milk froth. For a stronger taste increase the amount of coffee. For a milder taste increase the amount of milk. • Latte: 1 1/2 to 2 oz. of espresso coffee with 3 to 4 oz. of steamed milk (very little or no milk froth). • Frothing: Foamy layer of milk froth on top of hot milk. • Which kind of milk? Skim milk and 1% milk will produce more milk froth than 2% or regular milk. • Markings on Glass Carafe: The markings on the glass carafe help you in the preparation of brewing and frothing. Upper rim of metal band: Maximum capacity of boiler (approx. 10 oz.). For best results always fill the boiler with 10 oz. of fresh cold water. 4 cup marking: Maximum amount of espresso you should brew (approx. 8 oz.). If you brew more than 8 oz. the coffee will taste burnt. Depending on the coffee roast you might even want to brew a little less to avoid a bitter aroma. 2 cup marking: (approx. 4 oz.), guide line for a double shot of espresso. Bottom line marking: Once the coffee has reached this level there is enough pressure in the boiler for steaming and frothing. 7. PREPARING ESPRESSO Caution: Do not leave the machine alone during brewing. Keep children away during brewing. 1. Make sure the machine is plugged in and turned off. The glass carafe is removed from the drip tray. Important: The steam knob (fig. 9) must be in the closed position. The coffee/steam selector points to the cup symbol in front of the machine (stronger coffee). Moving the coffee/steam selector to the right, accelerates brewing and decreases coffee strength. 2. Fill the basket with ground coffee, using the measuring scoop (fig.1). The basket is marked on the inside indicating "2 cups" and "4 cups". Never overfill the basket. Clear any excess coffee from the rim of the filter holder. Important: it is not necessary to tamp (press down) the coffee. 3. Insert the basket into the filter holder (fig. 2), then insert the filter holder into the machine (fig. 3). 4. Turn filter holder to the right until it reaches the "locked" position (fig.1,8). 5. Fill the glass carafe to the upper rim of the metal band (approx. 10 oz.) with fresh, cold water. 6. Unscrew the boiler cap (see chapter 5). Using the glass carafe, fill the boiler with water (fig. 4) and close the boiler cap securely (see chapter 5). 7. Place the carafe lid on the carafe so that the opening on the lid points towards the pouring spout of the carafe (fig. 7). Place the carafe on the drip tray as shown in fig. 1. 8. Turn the power switch on (fig. 6). The power switch illuminates and the machine starts heating the water. 9. After approx. 2 1/2 to 3 minutes hot water will start forcing its way through the filter holder into the carafe. When you have enough espresso in the glass carafe turn the power switch off and turn the coffee/steam selector to the steam symbol on the left to stop the flow. Remove the carafe and serve. Add a bit of sugar and enjoy. Tip: To avoid a "burnt taste" never process all the water through the coffee. Once the brewing noise increases and steam develops, stop the brewing. 8 10. Important: Do not open the boiler cap. Do not remove the filter holder. First depressurize the machine. See chapter 3. 11. After de-pressurizing remove the filter holder by turning it to the left to the "open lock" symbol. Then push the thumb-guard of filter holder over the hot rim of the basket. Dump the used coffee (fig. 13) and rinse the basket and the filter holder under running water. Return the coffee/steam selector to the cup symbol. What could cause the flavor of my espresso to be kind of charred?
Only answer using the text I provide. Answer in four sentences that are no longer than 24 words each.
What are the pros and cons of restitution orders specifically related to victims?
Participation in restorative justice programs is voluntary. As a result, offenders often comply with restitution agreements when they have followed a restorative justice program (Van Hecke & Wemmers, 1992). Offenders who do not accept their responsibility and who are not open to the idea of reparation will not enter a program. Thus, once admitted into a restorative justice program, offenders are prone to accept responsibility for their behaviour and repair the harm caused to the victim and, as a result, the victims of these offenders are likely to receive reparation. In their meta-analysis, Umbreit, Coates and Vos (2001) found that 90% of cases that are addressed through mediation end in an agreement. In most cases, these agreements consisted of a monetary sum, community service, or services rendered directly to the victim, and around 80-90% of the agreements were respected. Several researchers studying restorative justice have also observed a very high rate of satisfaction among participants in victim-offender mediation who frequently perceive the process and the result as fair (Umbreit, Coates & Vos 2001; Wemmers & Canuto 2002; Strang 2002; Wemmers & Cyr 2005; Van Camp 2016). According to Carriere, Malsch, Vermunt and De Keijser (1998), victims are generally more satisfied with restitution when they suffer less psychological damages and when their damages are primarily material. In contrast, other researchers find that restorative justice is particularly satisfying for victims of serious violent crimes and that when these victims participate in restorative justice programs they are usually satisfied with mediation, and the restorative justice process often has a positive impact on their well-being (Strang 20 2002; Strang et al 2006; Van Camp 2015; Wemmers 2016). Besides financial needs, other needs often expressed by victims of crime are the need for recognition and validation (Wemmers, 2017). Victims of serious violent crime generally seek other forms of reparation besides compensation, such as recognition of the wrong done by the offender, which is often very important to the victims (Van Camp & Wemmers 2015; Van Camp 2016). In restorative justice, victims’ needs are important and reparation aims to address the consequences of victimization (Wemmers, 2014; 2017). As such, restorative justice is more flexible than restitution orders and, for this reason, it is better able to adapt to the specific needs of the victim. Restitution is an integral part of victim reparation, and its necessity is well recognized by the UN as well as in the Canadian Victims’ Bill of Rights. In Canada, the Criminal Code highlights restitution orders and their application. However, before the introduction of the Victims’ Bill of Rights, restitution orders were a seldom-used measure in the Canadian criminal justice system: Only 2.3% of cases where the offender was found guilty included a restitution order. In order to encourage and facilitate requests by victims for restitution, a standard form was introduced in 2015. Restitution includes numerous advantages, but also has important limitations. It lessens the consequences of the crime for the victim, can reinstate their confidence in the criminal justice system, and can increase denunciation (Hoskins, Care & Ruback, 2015). Nevertheless, Canadian criminal law gives priority to the offender’s rehabilitation and social reintegration. As such, the needs of the victim are secondary. An important obstacle observed across the different models presented, is the conflict between criminal law and civil law. This legal distinction makes it so that judges are often reluctant to issue a restitution order and, if they do so, damages must be easy to determine, which leads to the inapplicability of restitution for emotional or psychological injury. Although lawyers place great importance on this distinction, it is perceived by victims as artificial and is often misunderstood (Helby, Van Dongen & Lindenberg, 2014). Even if restitution is ordered by a criminal court, it is the offender’s civil obligation. The restitution order as well as the civil party pose difficulties for victims with regards to the collection of their money. Civil law is complex and victims lack information on the procedures to undertake in order to obtain restitution. We have seen that the state can implement services to facilitate the collection of restitution. For example, the state can treat the order as a fine and take responsibility for its collection. The state can even advance money to the victim and then use subrogation in order to recover the money from the offender. Studies are nevertheless necessary to evaluate the effects of these types of services on victims and their impact on the effectiveness of restitution. Victim reparation is wider than restitution. Restorative justice programs do not suffer from the same limitations as restitution orders. They give an important place to the victim and can recognize all their needs including recognition, validation, as well as their financial needs. Hence, they are not limited by the offender’s financial insolvency. Restitution remains, after all, a right clearly defined in the Canadian Victims’ Bill of Rights, and significant effort must be deployed in order to ensure its effective application. The information presented in this article clearly points to a lack of data on the implementation and effectiveness of restitution orders. It also highlights the necessity to give more attention to the needs of victims of crime, as well as address the obstacles that hinder the satisfaction of victims’ needs, in order to maximize the benefits of this penal measure for victims, offenders and society as a whole.
Only answer using the text I provide. Answer in four sentences that are no longer than 24 words each. Participation in restorative justice programs is voluntary. As a result, offenders often comply with restitution agreements when they have followed a restorative justice program (Van Hecke & Wemmers, 1992). Offenders who do not accept their responsibility and who are not open to the idea of reparation will not enter a program. Thus, once admitted into a restorative justice program, offenders are prone to accept responsibility for their behaviour and repair the harm caused to the victim and, as a result, the victims of these offenders are likely to receive reparation. In their meta-analysis, Umbreit, Coates and Vos (2001) found that 90% of cases that are addressed through mediation end in an agreement. In most cases, these agreements consisted of a monetary sum, community service, or services rendered directly to the victim, and around 80-90% of the agreements were respected. Several researchers studying restorative justice have also observed a very high rate of satisfaction among participants in victim-offender mediation who frequently perceive the process and the result as fair (Umbreit, Coates & Vos 2001; Wemmers & Canuto 2002; Strang 2002; Wemmers & Cyr 2005; Van Camp 2016). According to Carriere, Malsch, Vermunt and De Keijser (1998), victims are generally more satisfied with restitution when they suffer less psychological damages and when their damages are primarily material. In contrast, other researchers find that restorative justice is particularly satisfying for victims of serious violent crimes and that when these victims participate in restorative justice programs they are usually satisfied with mediation, and the restorative justice process often has a positive impact on their well-being (Strang 20 2002; Strang et al 2006; Van Camp 2015; Wemmers 2016). Besides financial needs, other needs often expressed by victims of crime are the need for recognition and validation (Wemmers, 2017). Victims of serious violent crime generally seek other forms of reparation besides compensation, such as recognition of the wrong done by the offender, which is often very important to the victims (Van Camp & Wemmers 2015; Van Camp 2016). In restorative justice, victims’ needs are important and reparation aims to address the consequences of victimization (Wemmers, 2014; 2017). As such, restorative justice is more flexible than restitution orders and, for this reason, it is better able to adapt to the specific needs of the victim. Restitution is an integral part of victim reparation, and its necessity is well recognized by the UN as well as in the Canadian Victims’ Bill of Rights. In Canada, the Criminal Code highlights restitution orders and their application. However, before the introduction of the Victims’ Bill of Rights, restitution orders were a seldom-used measure in the Canadian criminal justice system: Only 2.3% of cases where the offender was found guilty included a restitution order. In order to encourage and facilitate requests by victims for restitution, a standard form was introduced in 2015. Restitution includes numerous advantages, but also has important limitations. It lessens the consequences of the crime for the victim, can reinstate their confidence in the criminal justice system, and can increase denunciation (Hoskins, Care & Ruback, 2015). Nevertheless, Canadian criminal law gives priority to the offender’s rehabilitation and social reintegration. As such, the needs of the victim are secondary. An important obstacle observed across the different models presented, is the conflict between criminal law and civil law. This legal distinction makes it so that judges are often reluctant to issue a restitution order and, if they do so, damages must be easy to determine, which leads to the inapplicability of restitution for emotional or psychological injury. Although lawyers place great importance on this distinction, it is perceived by victims as artificial and is often misunderstood (Helby, Van Dongen & Lindenberg, 2014). Even if restitution is ordered by a criminal court, it is the offender’s civil obligation. The restitution order as well as the civil party pose difficulties for victims with regards to the collection of their money. Civil law is complex and victims lack information on the procedures to undertake in order to obtain restitution. We have seen that the state can implement services to facilitate the collection of restitution. For example, the state can treat the order as a fine and take responsibility for its collection. The state can even advance money to the victim and then use subrogation in order to recover the money from the offender. Studies are nevertheless necessary to evaluate the effects of these types of services on victims and their impact on the effectiveness of restitution. Victim reparation is wider than restitution. Restorative justice programs do not suffer from the same limitations as restitution orders. They give an important place to the victim and can recognize all their needs including recognition, validation, as well as their financial needs. Hence, they are not limited by the offender’s financial insolvency. Restitution remains, after all, a right clearly defined in the Canadian Victims’ Bill of Rights, and significant effort must be deployed in order to ensure its effective application. The information presented in this article clearly points to a lack of data on the implementation and effectiveness of restitution orders. It also highlights the necessity to give more attention to the needs of victims of crime, as well as address the obstacles that hinder the satisfaction of victims’ needs, in order to maximize the benefits of this penal measure for victims, offenders and society as a whole. What are the pros and cons of restitution orders specifically related to victims?
Answer this question in one concise paragraph. Use the text provided. Do not use text from any other online source.
How can review mining ensure it represents low-frequency terms in customer reviews?
**Mining and Summarizing Customer Reviews** Minqing Hu and Bing Liu Department of Computer Science University of Illinois at Chicago 851 South Morgan Street Chicago, IL 60607-7053 {mhu1, liub}@cs.uic.edu 1. INTRODUCTION With the rapid expansion of e-commerce, more and more products are sold on the Web, and more and more people are also buying products online. In order to enhance customer satisfaction and shopping experience, it has become a common practice for online merchants to enable their customers to review or to express opinions on the products that they have purchased. With more and more common users becoming comfortable with the Web, an increasing number of people are writing reviews. As a result, the number of reviews that a product receives grows rapidly. Some popular products can get hundreds of reviews at some large merchant sites. Furthermore, many reviews are long and have only a few sentences containing opinions on the product. This makes it hard for a potential customer to read them to make an informed decision on whether to purchase the product. If he/she only reads a few reviews, he/she may get a biased view. The large number of reviews also makes it hard for product manufacturers to keep track of customer opinions of their products. For a product manufacturer, there are additional difficulties because many merchant sites may sell its products, and the manufacturer may (almost always) produce many kinds of products. In this research, we study the problem of generating feature-based summaries of customer reviews of products sold online. Here, features broadly mean product features (or attributes) and functions. Given a set of customer reviews of a particular product, the task involves three subtasks: (1) identifying features of the product that customers have expressed their opinions on (called product features); (2) for each feature, identifying review sentences that give positive or negative opinions; and (3) producing a summary using the discovered information. Let us use an example to illustrate a feature-based summary. Assume that we summarize the reviews of a particular digital camera, digital_camera_1. The summary looks like the following: Digital_camera_1: Feature: **picture quality** Positive: 253 <individual review sentences> Negative: 6 <individual review sentences> Feature: **size** Positive: 134 <individual review sentences> Negative: 10 <individual review sentences> … **Figure 1: An example summary** In Figure 1, picture quality and (camera) size are the product features. There are 253 customer reviews that express positive opinions about the picture quality, and only 6 that express negative opinions. The <individual review sentences> link points to the specific sentences and/or the whole reviews that give positive or negative comments about the feature. With such a feature-based summary, a potential customer can easily see how the existing customers feel about the digital camera. If he/she is very interested in a particular feature, he/she can drill down by following the <individual review sentences> link to see why existing customers like it and/or what they complain about. For a manufacturer, it is possible to combine summaries from multiple merchant sites to produce a single report for each of its products. Our task is different from traditional text summarization in a number of ways. First of all, a summary in our case is structured rather than another (but shorter) free text document as produced by most text summarization systems. Second, we are only interested in features of the product that customers have opinions on and also whether the opinions are positive or negative. We do not summarize the reviews by selecting or rewriting a subset of the original sentences from the reviews to capture their main points as in traditional text summarization. As indicated above, our task is performed in three main steps: (1) Mining product features that have been commented on by customers. We make use of both data mining and natural language processing techniques to perform this task. For completeness, we will summarize its techniques in this paper and also present a comparative evaluation. (2) Identifying opinion sentences in each review and deciding whether each opinion sentence is positive or negative. Note that these opinion sentences must contain one or more product features identified above. To decide the opinion orientation of each sentence (whether the opinion expressed in the sentence is positive or negative), we perform three subtasks. First, a set of adjective words (which are normally used to express opinions) is identified using a natural language processing method. These words are also called opinion words in this paper. Second, for each opinion word, we determine its semantic orientation, e.g., positive or negative. A bootstrapping technique is proposed to perform this task using WordNet. Finally, we decide the opinion orientation of each sentence. An effective algorithm is also given for this purpose. (3) Summarizing the results. This step aggregates the results of previous steps and presents them in the format of Figure 1. 2. RELATED WORK Existing text summarization techniques mainly fall in one of the two categories: template instantiation and passage extraction. Work in the former framework emphasizes on identification and extraction of certain core entities and facts in a document, which are packaged in a template. This framework requires background knowledge in order to instantiate a template to a suitable level of detail. Therefore, it is not domain or genre independent. This is different from our work as our techniques do not fill any template and are domain independent. The passage extraction framework identifies certain segments of the text (typically sentences) that are the most representative of the document’s content. Our work is different in that we do not extract representative sentences, but identify and extract those specific product features and the opinions related to them. Boguraev and Kennedy propose to find a few very prominent expressions, objects or events in a document and use them to help summarize the document. Our work is again different as we find all product features in a set of customer reviews regardless whether they are prominent or not. Thus, our summary is not a traditional text summary. Most existing works on text summarization focus on a single document. Some researchers also studied summarization of multiple documents covering similar information. Their main purpose is to summarize the similarities and differences in the information content among these documents. Our work is related but quite different because we aim to find the key features that are talked about in multiple reviews. We do not summarize similarities and differences of reviews. In terminology finding, there are basically two techniques for discovering terms in corpora: symbolic approaches that rely on syntactic description of terms, namely noun phrases, and statistical approaches that exploit the fact that the words composing a term tend to be found close to each other and reoccurring. However, using noun phrases tends to produce too many non-terms (low precision), while using reoccurring phrases misses many low frequency terms, terms with variations, and terms with only one word. Our association mining based technique does not have these problems, and we can also find infrequent features by exploiting the fact that we are only interested in features that the users have expressed opinions on. 3. THE PROPOSED TECHNIQUES The inputs to the system are a product name and an entry Web page for all the reviews of the product. The output is the summary of the reviews as the one shown in the introduction section. The system performs the summarization in three main steps (as discussed before): (1) mining product features that have been commented on by customers; (2) identifying opinion sentences in each review and deciding whether each opinion sentence is positive or negative; (3) summarizing the results. These steps are performed in multiple sub-steps. Given the inputs, the system first downloads (or crawls) all the reviews, and put them in the review database. It then finds those “hot” (or frequent) features that many people have expressed their opinions on. After that, the opinion words are extracted using the resulting frequent features, and semantic orientations of the opinion words are identified with the help of WordNet. Using the extracted opinion words, the system then finds those infrequent features. In the last two steps, the orientation of each opinion sentence is identified and a final summary is produced. Note that POS tagging is the part-of-speech tagging from natural language processing, which helps us to find opinion features. 4. CONCLUSIONS Our experimental results indicate that the proposed techniques are very promising in performing their tasks. We believe that this problem will become increasingly important as more people are buying and expressing their opinions on the Web. Summarizing the reviews is not only useful to common shoppers, but also crucial to product manufacturers. In our future work, we plan to further improve and refine our techniques, and to deal with the outstanding problems identified above, i.e., pronoun resolution, determining the strength of opinions, and investigating opinions expressed with adverbs, verbs and nouns. Finally, we will also look into monitoring of customer reviews. We believe that monitoring will be particularly useful to product manufacturers because they want to know any new positive or negative comments on their products whenever they are available. The keyword here is new. Although a new review may be added, it may not contain any new information.
{Question} ================== How can review mining ensure it represents low-frequency terms in customer reviews? ---------------- {System Instruction} ================== Answer this question in one concise paragraph. Use the text provided. Do not use text from any other online source. ---------------- {Document} ================== **Mining and Summarizing Customer Reviews** Minqing Hu and Bing Liu Department of Computer Science University of Illinois at Chicago 851 South Morgan Street Chicago, IL 60607-7053 {mhu1, liub}@cs.uic.edu 1. INTRODUCTION With the rapid expansion of e-commerce, more and more products are sold on the Web, and more and more people are also buying products online. In order to enhance customer satisfaction and shopping experience, it has become a common practice for online merchants to enable their customers to review or to express opinions on the products that they have purchased. With more and more common users becoming comfortable with the Web, an increasing number of people are writing reviews. As a result, the number of reviews that a product receives grows rapidly. Some popular products can get hundreds of reviews at some large merchant sites. Furthermore, many reviews are long and have only a few sentences containing opinions on the product. This makes it hard for a potential customer to read them to make an informed decision on whether to purchase the product. If he/she only reads a few reviews, he/she may get a biased view. The large number of reviews also makes it hard for product manufacturers to keep track of customer opinions of their products. For a product manufacturer, there are additional difficulties because many merchant sites may sell its products, and the manufacturer may (almost always) produce many kinds of products. In this research, we study the problem of generating feature-based summaries of customer reviews of products sold online. Here, features broadly mean product features (or attributes) and functions. Given a set of customer reviews of a particular product, the task involves three subtasks: (1) identifying features of the product that customers have expressed their opinions on (called product features); (2) for each feature, identifying review sentences that give positive or negative opinions; and (3) producing a summary using the discovered information. Let us use an example to illustrate a feature-based summary. Assume that we summarize the reviews of a particular digital camera, digital_camera_1. The summary looks like the following: Digital_camera_1: Feature: **picture quality** Positive: 253 <individual review sentences> Negative: 6 <individual review sentences> Feature: **size** Positive: 134 <individual review sentences> Negative: 10 <individual review sentences> … **Figure 1: An example summary** In Figure 1, picture quality and (camera) size are the product features. There are 253 customer reviews that express positive opinions about the picture quality, and only 6 that express negative opinions. The <individual review sentences> link points to the specific sentences and/or the whole reviews that give positive or negative comments about the feature. With such a feature-based summary, a potential customer can easily see how the existing customers feel about the digital camera. If he/she is very interested in a particular feature, he/she can drill down by following the <individual review sentences> link to see why existing customers like it and/or what they complain about. For a manufacturer, it is possible to combine summaries from multiple merchant sites to produce a single report for each of its products. Our task is different from traditional text summarization in a number of ways. First of all, a summary in our case is structured rather than another (but shorter) free text document as produced by most text summarization systems. Second, we are only interested in features of the product that customers have opinions on and also whether the opinions are positive or negative. We do not summarize the reviews by selecting or rewriting a subset of the original sentences from the reviews to capture their main points as in traditional text summarization. As indicated above, our task is performed in three main steps: (1) Mining product features that have been commented on by customers. We make use of both data mining and natural language processing techniques to perform this task. For completeness, we will summarize its techniques in this paper and also present a comparative evaluation. (2) Identifying opinion sentences in each review and deciding whether each opinion sentence is positive or negative. Note that these opinion sentences must contain one or more product features identified above. To decide the opinion orientation of each sentence (whether the opinion expressed in the sentence is positive or negative), we perform three subtasks. First, a set of adjective words (which are normally used to express opinions) is identified using a natural language processing method. These words are also called opinion words in this paper. Second, for each opinion word, we determine its semantic orientation, e.g., positive or negative. A bootstrapping technique is proposed to perform this task using WordNet. Finally, we decide the opinion orientation of each sentence. An effective algorithm is also given for this purpose. (3) Summarizing the results. This step aggregates the results of previous steps and presents them in the format of Figure 1. 2. RELATED WORK Existing text summarization techniques mainly fall in one of the two categories: template instantiation and passage extraction. Work in the former framework emphasizes on identification and extraction of certain core entities and facts in a document, which are packaged in a template. This framework requires background knowledge in order to instantiate a template to a suitable level of detail. Therefore, it is not domain or genre independent. This is different from our work as our techniques do not fill any template and are domain independent. The passage extraction framework identifies certain segments of the text (typically sentences) that are the most representative of the document’s content. Our work is different in that we do not extract representative sentences, but identify and extract those specific product features and the opinions related to them. Boguraev and Kennedy propose to find a few very prominent expressions, objects or events in a document and use them to help summarize the document. Our work is again different as we find all product features in a set of customer reviews regardless whether they are prominent or not. Thus, our summary is not a traditional text summary. Most existing works on text summarization focus on a single document. Some researchers also studied summarization of multiple documents covering similar information. Their main purpose is to summarize the similarities and differences in the information content among these documents. Our work is related but quite different because we aim to find the key features that are talked about in multiple reviews. We do not summarize similarities and differences of reviews. In terminology finding, there are basically two techniques for discovering terms in corpora: symbolic approaches that rely on syntactic description of terms, namely noun phrases, and statistical approaches that exploit the fact that the words composing a term tend to be found close to each other and reoccurring. However, using noun phrases tends to produce too many non-terms (low precision), while using reoccurring phrases misses many low frequency terms, terms with variations, and terms with only one word. Our association mining based technique does not have these problems, and we can also find infrequent features by exploiting the fact that we are only interested in features that the users have expressed opinions on. 3. THE PROPOSED TECHNIQUES The inputs to the system are a product name and an entry Web page for all the reviews of the product. The output is the summary of the reviews as the one shown in the introduction section. The system performs the summarization in three main steps (as discussed before): (1) mining product features that have been commented on by customers; (2) identifying opinion sentences in each review and deciding whether each opinion sentence is positive or negative; (3) summarizing the results. These steps are performed in multiple sub-steps. Given the inputs, the system first downloads (or crawls) all the reviews, and put them in the review database. It then finds those “hot” (or frequent) features that many people have expressed their opinions on. After that, the opinion words are extracted using the resulting frequent features, and semantic orientations of the opinion words are identified with the help of WordNet. Using the extracted opinion words, the system then finds those infrequent features. In the last two steps, the orientation of each opinion sentence is identified and a final summary is produced. Note that POS tagging is the part-of-speech tagging from natural language processing, which helps us to find opinion features. 4. CONCLUSIONS Our experimental results indicate that the proposed techniques are very promising in performing their tasks. We believe that this problem will become increasingly important as more people are buying and expressing their opinions on the Web. Summarizing the reviews is not only useful to common shoppers, but also crucial to product manufacturers. In our future work, we plan to further improve and refine our techniques, and to deal with the outstanding problems identified above, i.e., pronoun resolution, determining the strength of opinions, and investigating opinions expressed with adverbs, verbs and nouns. Finally, we will also look into monitoring of customer reviews. We believe that monitoring will be particularly useful to product manufacturers because they want to know any new positive or negative comments on their products whenever they are available. The keyword here is new. Although a new review may be added, it may not contain any new information.
Answer using only information from the prompt and context block. Answer using only bullet points.
Compare and contrast the power sources used by the Mars Pathfinder during its cruise phase and after landing on Mars.
If the lander comes to rest on a rock, the entire lander may be tilted, but further maneuvering of the petals can be performed during surface operations to lower the overall tilt of the lander. Telecommunications during entry should provide significant information about the behavior of the entry, descent and landing subsystem. Digital data will not be acquired, however, because of the extremely weak signal. 25 The amplitude and frequency of the spacecraft will be observed in real-time during entry and descent, and may be seen during petal deployment, depending on the lander's orientation once it comes to a stop on the Martian surface. Changes in amplitude are expected at cruise stage separation, parachute deployment, surface impact and during the airbag retraction and petal deployment. Changes in frequency reflect changes in the spacecraft's speed and will be most pronounced during the period of peak deceleration. The spacecraft also will deliberately change the frequency of the subcarrier to signal other key events. These include heat shield separation, bridle deployment, crossing the threshold altitude of 600 meters (about 2,000 feet) above the surface, completion of airbag retraction and completion of the petal deployment sequence. These planned frequency changes -- called "semaphores" -- are not likely to be detected in real-time, but can be extracted by post-processing the recorded data. In addition, key spacecraft telemetry data will be recorded and played back after landing. Other key data to be transmitted to Earth include accelerometer measurements and selected atmospheric structure instrument measurements. The Deep Space Network's 70-meter (230-foot) and 34-meter (110-foot) antennas in Madrid, Spain, will be used to support entry communications. Prime Mission Mars Pathfinder's primary mission begins when its lander petals have been fully unfolded and the lander switches to a sequence of computer commands that will control its functions. The spacecraft lands about 2-1/2 hours before sunrise on Mars and will spend the time in darkness retracting its airbags, standing itself upright and opening the petals so that solar panels can be powered up after sunrise. The lander's first task will be to transmit engineering and science data collected during its descent through the thin atmosphere of Mars. If no errors are detected in these data and the spacecraft is basically healthy, a real-time command will be sent from Earth instructing the lander to unlock the imager camera head, deploy and point the high-gain antenna. If conditions are different than expected, which is not unlikely, the opeation team will execute a contingency plan that has been placed onboard the spacecraft in expectation of such conditions. In the normal plan, the lander's camera will begin taking images -- including a panoramic view of the Martian landscape -- and will begin transmitting the data directly to Earth at 2,250 bits per second. The first images of the Martian landscape will tell engineers whether the airbags are fully retracted and whether the rover's exit ramp can be safely and successfully deployed. Once either or both ramps are deployed, additional images will be acquired to show the terrain beyond the ramps so that engineers can decide on the safest exit route. If the highgain antenna is not available, data will be sent over the lander’s low-gain antenna at a much lower rate of 40 bits per second. In this case, only a few, highly compressed images will be sent. 26 Once a decision on the route has been made, commands will be sent to deploy the rover. Sojourner will spend about a quarter of an hour exiting its ramp. The rover should be deployed within the first three days after landing. Driving off onto the floor of an old outflow channel, Sojourner will explore the surface at the command of Earth-based operators, who will rely on lander-based images to select a path and target for the rover. The six-wheeled Sojourner travels at 1 centimeter (0.4 inch) per second, performing mobility tests, imaging its surroundings and deploying an alpha proton x-ray spectrometer designed to study the elemental composition of rocks. During its prime mission, the rover will likely range a few tens of meters (yards) from the lander. Also mounted on the lander are wind sensors, wind socks and high- and low-gain antennas. Instruments will be used to measure the pressure, temperature and density of the Martian atmosphere. Magnets mounted on the lander will collect magnetic specimens of Martian dust and soil as small as 100 microns (about 1/250th of an inch). Extended Missions The primary mission lasts seven Martian days, or "sols," for the rover, and 30 Martian days, or "sols," for the lander. The rover could carry out an extended mission beyond that period, depending on how long its power sources and electronics last; engineers expect that the most probable reason for it to stop functioning is hot-cold cycling of its onboard electronics between Martian day and night. Sojourner's extended mission activities would include repeating soil mechanics experiments on various soils; additional spectrometer measurements of both rocks and soil; obtaining images of selected areas with the rover camera, including close-ups of the lander; obtaining images of the lander's landing and tumbling path; and traveling longer distances, with the possibility of going over the horizon, up to hundreds of meters (yards). For the lander, an extended mission lasting up to one year after landing is possible. Lander activities in the extended mission would include continued use of the lander camera to obtain images of the terrain and atmosphere, collection of key engineering telemetry and continued collection of meteorology data. Mission Operations All operations for Mars Pathfinder will be conducted at JPL, where the operations and science teams reside. Science data, both raw and processed, will be transferred after a period of validation to NASA's Planetary Data System archive for access and use by the planetary community at large and the general public. The Planetary Data System home page is at http://pds.jpl.nasa.gov/pds_home.html . Images from planetary missions are also available via the web from NASA’s Planetary Photojournal at http://photojournal.jpl.nasa.gov . 27 Spacecraft At launch the Mars Pathfinder spacecraft weighed about 895 kilograms (1,973 pounds), including its cruise stage, heat shield and backshell (or aeroshell), solar panels, propulsion stage, medium- and- high-gain antennas and 94 kilograms (207 pounds) of cruise propellant. The cruise vehicle measures 2.65 meters (8.5 feet) in diameter and stands 1.5 meters (5 feet) tall. The lander is a tetrahedron, a small pyramid standing about 0.9 meter (3 feet) tall with three triangular-shaped sides and a base. When Pathfinder is poised to enter the Martian atmosphere, its main components are the aeroshell, folded lander and rover, parachute, airbag system and three rocket engines. Combined, the spacecraft’s mass is about 570 kilograms (1,256 pounds) at entry. Once it has landed and its airbags have been deflated, Pathfinder’s mass will be about 360 kilograms (793 pounds). Subsystems contributing to its landed weight include the opening/uprighting mechanism, lander cabling and electronics, instruments and rover. When it is unfolded and lying flat on the surface, the spacecraft will measure 2.75 meters (9 feet) across with a mast-mounted camera standing up about 1.5 meters (5 feet) from the ground. The lander is controlled by a derivative of the commercially available IBM 6000 computer. This processor and associated components are radiation-hardened and mounted on a single electronics board. The computer has a 32-bit architecture which executes about 20 million instructions per second. The computer will store flight software as well as engineering and science data, including images and rover information, in 128 megabytes of dynamic random access memory. During interplanetary cruise, the spacecraft requires 178 watts of electrical power, provided by 2.5 square meters (27 square feet) of gallium arsenide solar cells. The lander has three solar panels, with a total area of 2.8 square meters (30 square feet) and supplying up to 1,200 watt-hours of power per day on clear days. At night, the lander will operate on rechargeable silver zinc batteries with a capacity at the beginning of the Mars surface mission of more than 40 amp-hours. The Pathfinder lander carries a camera on a mast to survey its immediate surroundings. The camera has two optical paths for stereo imaging, each with a filter wheel giving 12 color bands in the 0.35 to 1.1 micron range; exposures through different filters can be combined to produce color images. The camera’s field-of-view is 14 degrees in both horizontal and vertical directions, and it will be able to take one frame (256 by 256 pixels) every two seconds.
Answer using only information from the prompt and context block. Answer using only bullet points. Compare and contrast the power sources used by the Mars Pathfinder during its cruise phase and after landing on Mars. If the lander comes to rest on a rock, the entire lander may be tilted, but further maneuvering of the petals can be performed during surface operations to lower the overall tilt of the lander. Telecommunications during entry should provide significant information about the behavior of the entry, descent and landing subsystem. Digital data will not be acquired, however, because of the extremely weak signal. 25 The amplitude and frequency of the spacecraft will be observed in real-time during entry and descent, and may be seen during petal deployment, depending on the lander's orientation once it comes to a stop on the Martian surface. Changes in amplitude are expected at cruise stage separation, parachute deployment, surface impact and during the airbag retraction and petal deployment. Changes in frequency reflect changes in the spacecraft's speed and will be most pronounced during the period of peak deceleration. The spacecraft also will deliberately change the frequency of the subcarrier to signal other key events. These include heat shield separation, bridle deployment, crossing the threshold altitude of 600 meters (about 2,000 feet) above the surface, completion of airbag retraction and completion of the petal deployment sequence. These planned frequency changes -- called "semaphores" -- are not likely to be detected in real-time, but can be extracted by post-processing the recorded data. In addition, key spacecraft telemetry data will be recorded and played back after landing. Other key data to be transmitted to Earth include accelerometer measurements and selected atmospheric structure instrument measurements. The Deep Space Network's 70-meter (230-foot) and 34-meter (110-foot) antennas in Madrid, Spain, will be used to support entry communications. Prime Mission Mars Pathfinder's primary mission begins when its lander petals have been fully unfolded and the lander switches to a sequence of computer commands that will control its functions. The spacecraft lands about 2-1/2 hours before sunrise on Mars and will spend the time in darkness retracting its airbags, standing itself upright and opening the petals so that solar panels can be powered up after sunrise. The lander's first task will be to transmit engineering and science data collected during its descent through the thin atmosphere of Mars. If no errors are detected in these data and the spacecraft is basically healthy, a real-time command will be sent from Earth instructing the lander to unlock the imager camera head, deploy and point the high-gain antenna. If conditions are different than expected, which is not unlikely, the opeation team will execute a contingency plan that has been placed onboard the spacecraft in expectation of such conditions. In the normal plan, the lander's camera will begin taking images -- including a panoramic view of the Martian landscape -- and will begin transmitting the data directly to Earth at 2,250 bits per second. The first images of the Martian landscape will tell engineers whether the airbags are fully retracted and whether the rover's exit ramp can be safely and successfully deployed. Once either or both ramps are deployed, additional images will be acquired to show the terrain beyond the ramps so that engineers can decide on the safest exit route. If the highgain antenna is not available, data will be sent over the lander’s low-gain antenna at a much lower rate of 40 bits per second. In this case, only a few, highly compressed images will be sent. 26 Once a decision on the route has been made, commands will be sent to deploy the rover. Sojourner will spend about a quarter of an hour exiting its ramp. The rover should be deployed within the first three days after landing. Driving off onto the floor of an old outflow channel, Sojourner will explore the surface at the command of Earth-based operators, who will rely on lander-based images to select a path and target for the rover. The six-wheeled Sojourner travels at 1 centimeter (0.4 inch) per second, performing mobility tests, imaging its surroundings and deploying an alpha proton x-ray spectrometer designed to study the elemental composition of rocks. During its prime mission, the rover will likely range a few tens of meters (yards) from the lander. Also mounted on the lander are wind sensors, wind socks and high- and low-gain antennas. Instruments will be used to measure the pressure, temperature and density of the Martian atmosphere. Magnets mounted on the lander will collect magnetic specimens of Martian dust and soil as small as 100 microns (about 1/250th of an inch). Extended Missions The primary mission lasts seven Martian days, or "sols," for the rover, and 30 Martian days, or "sols," for the lander. The rover could carry out an extended mission beyond that period, depending on how long its power sources and electronics last; engineers expect that the most probable reason for it to stop functioning is hot-cold cycling of its onboard electronics between Martian day and night. Sojourner's extended mission activities would include repeating soil mechanics experiments on various soils; additional spectrometer measurements of both rocks and soil; obtaining images of selected areas with the rover camera, including close-ups of the lander; obtaining images of the lander's landing and tumbling path; and traveling longer distances, with the possibility of going over the horizon, up to hundreds of meters (yards). For the lander, an extended mission lasting up to one year after landing is possible. Lander activities in the extended mission would include continued use of the lander camera to obtain images of the terrain and atmosphere, collection of key engineering telemetry and continued collection of meteorology data. Mission Operations All operations for Mars Pathfinder will be conducted at JPL, where the operations and science teams reside. Science data, both raw and processed, will be transferred after a period of validation to NASA's Planetary Data System archive for access and use by the planetary community at large and the general public. The Planetary Data System home page is at http://pds.jpl.nasa.gov/pds_home.html . Images from planetary missions are also available via the web from NASA’s Planetary Photojournal at http://photojournal.jpl.nasa.gov . 27 Spacecraft At launch the Mars Pathfinder spacecraft weighed about 895 kilograms (1,973 pounds), including its cruise stage, heat shield and backshell (or aeroshell), solar panels, propulsion stage, medium- and- high-gain antennas and 94 kilograms (207 pounds) of cruise propellant. The cruise vehicle measures 2.65 meters (8.5 feet) in diameter and stands 1.5 meters (5 feet) tall. The lander is a tetrahedron, a small pyramid standing about 0.9 meter (3 feet) tall with three triangular-shaped sides and a base. When Pathfinder is poised to enter the Martian atmosphere, its main components are the aeroshell, folded lander and rover, parachute, airbag system and three rocket engines. Combined, the spacecraft’s mass is about 570 kilograms (1,256 pounds) at entry. Once it has landed and its airbags have been deflated, Pathfinder’s mass will be about 360 kilograms (793 pounds). Subsystems contributing to its landed weight include the opening/uprighting mechanism, lander cabling and electronics, instruments and rover. When it is unfolded and lying flat on the surface, the spacecraft will measure 2.75 meters (9 feet) across with a mast-mounted camera standing up about 1.5 meters (5 feet) from the ground. The lander is controlled by a derivative of the commercially available IBM 6000 computer. This processor and associated components are radiation-hardened and mounted on a single electronics board. The computer has a 32-bit architecture which executes about 20 million instructions per second. The computer will store flight software as well as engineering and science data, including images and rover information, in 128 megabytes of dynamic random access memory. During interplanetary cruise, the spacecraft requires 178 watts of electrical power, provided by 2.5 square meters (27 square feet) of gallium arsenide solar cells. The lander has three solar panels, with a total area of 2.8 square meters (30 square feet) and supplying up to 1,200 watt-hours of power per day on clear days. At night, the lander will operate on rechargeable silver zinc batteries with a capacity at the beginning of the Mars surface mission of more than 40 amp-hours. The Pathfinder lander carries a camera on a mast to survey its immediate surroundings. The camera has two optical paths for stereo imaging, each with a filter wheel giving 12 color bands in the 0.35 to 1.1 micron range; exposures through different filters can be combined to produce color images. The camera’s field-of-view is 14 degrees in both horizontal and vertical directions, and it will be able to take one frame (256 by 256 pixels) every two seconds.
Answer the question based solely on the information provided in the passage. Do not use any external knowledge or resources. [user request] [context document]
I have a hernia in my lower back and my doctor wants to do a laminotomy. I want to know more information about this surgery. Please explain the different types of spinal decompression surgeries and what I should expect. Use more than 400 words.
What is spinal decompression surgery? Spinal decompression surgery is performed to relieve symptoms related to compression of the spinal cord or its roots, which may include back or neck pain and radiating limb pain (radiculopathy). What symptoms does spinal decompression surgery treat? Spinal nerve compression symptoms include pain, altered sensations, muscle weakness or dysfunction, and even gait abnormalities. These symptoms can be caused by a wide variety of conditions. In some of these, such as in cervical spinal stenosis that leads to cervical myelopathy, you may feel symptoms in the arms, hands, legs or feet, and/or have balance problems, or even incontinence issues (bowel dysfunction, unexpected need to urinate, etc.). A rapid onset of these symptoms can indicate a condition known as cauda equina syndrome, which can cause paralysis and other serious problems if not addressed in a timely manner. Pain and other symptoms treated by these surgeries are most common in the lower back (lumbar spine), followed by the neck (cervical spine). Symptoms in the upper back (thoracic spine) are possible but less common because it is the most stable part of the spine, due in part to its being connected to the rib cage. Neuropathies may involve feelings of numbness or a "pins and needles" tingling sensation and cause weakness or instability, primarily in lower the back. What happens during spinal decompression surgery? Every type of spinal decompression modifies or removes bone, spinal disc or soft tissues that are causing compression of a nerve. The techniques vary according to which tissues are causing the compression. For example, laminoplasty involves the reshaping of part of a vertebral lamina, a laminotomy the making of a small hole the lamina, and a laminectomy the complete removal of a lamina, all to relieve pressure on the nerves. What types of spine decompression surgery are there? Types of spine decompression surgery performed at HSS include laminectomy, laminotomy, laminoplasty, discectomy and microdiscectomy, among others. Lumbar decompression surgery may be used to address problems in the lower back, such as lumbar laminectomy, laminotomy, or microdiscectomy. Types of spinal decompression surgery Laminectomy is the removal in one or more vertebrae of the lamina (bony roof over the spinal canal). This decompresses both sides (left and right) of the canal. Laminotomy is removal of a small portion of the lamina to decompress one side (left or right) of the canal. This leaves most of the lamina intact. Microsurgical laminoplasty is a minimally invasive surgical decompression technique that uses small incisions viewed through an operating microscope. (Find a laminoplasty spine specialist.) Microdiscectomy (also known as spinal microdecompression surgery): This minimally invasive spine procedure is commonly performed on patients who have sciatica and/or a herniated disc in the lumbar section of the spine (lower back). Using muscle-sparing incisions, this removes portions of a herniated disc that is putting pressure on the spinal nerve and causing pain. Minimally invasive lumbar discectomy (also known as endoscopic percutaneous disc removal) is similar to microdiscectomy and uses a scope to make very small incisions in the skin, through which a portion of the herniated disc that is compressing spinal nerves is removed. Decompression with fusion Some decompression surgeries may require the addition of a fusion procedure simultaneously. This depends on the type of disease being treated and the technique being used to address the disease. This includes lumbar decompressions, such as lumbar interbody fusion (LIF) techniques, which may indirectly decompress the spine, or cervical decompressions, such as anterior cervical discectomy and fusion (ACDF surgery), which are dependent on the differential anatomy of the spine. Who is a good candidate for spinal decompression surgery? Decompression surgery can be a good option for people who have back or neck pain and/or neuropathies due to nerve compression caused by a herniated disc, spinal stenosis, spondylolisthesis, and for whom nonsurgical methods such as physical therapy, epidural steroid injections or pain management regimens have failed to provide relief. Find an HSS spine surgeon by decompression procedure all spinal decompression laminectomy laminoplasty discectomy and microdiscectomy Will I have to go under anesthesia for spinal decompression surgery? Most spinal decompression surgeries will be performed under general anesthesia, with the patient completely unconscious. Some modern techniques allow for spinal surgery under regional anesthesia (either spinal or epidural anesthesia). These techniques allow patients to breathe on their own without the need for mechanical assistance. These techniques may reduce complications associated with general anesthesia but are not widely available and may be performed on a case-by-case basis. How long will I stay in the hospital after spinal decompression surgery? In many cases, patients undergoing decompressions such as a laminectomy, discectomy, or microdiscectomy can go home the same day. This is often the case with a laminectomy, microdiscectomy, and there is research to suggest that even multilevel ACDF surgeries may be safely done on an outpatient basis. Some patients having spinal decompression may need to stay one or more nights including those who have chronic diseases or sleep. Some patients require a spinal fusion may stay overnight and return home one or two days after surgery. Rarely, a patient may need to stay as many longer. In addition, some decompression spine surgeries may be planned as an ambulatory (outpatient) procedure, but then converted to an overnight stay to monitor the patient. In one study of more than 1,000 patients who underwent an ambulatory one- or two-level lumbar decompression, 58% ended up staying over at least one night. How soon can I walk after a decompression spine surgery? At HSS patients are encouraged to walk the same day of most decompression surgeries. How soon can I return to work after spinal decompression? Depending on the specific procedure and other factors, patients generally are able to return to work between two and four weeks after surgery. Some patients who have a microdiscectomy decompression may be able to return to work after less than two weeks. What is the recovery time of spinal decompression surgery? The recovery time for decompression surgery alone is generally faster compared to procedures that include a fusion. Owing to the wide range of decompression surgery types and the number of spinal levels addressed with surgery there is likewise some variability in recovery duration. There is recent evidence that microdiscectomy patients can return to physical therapy and low impact aerobic exercise within four weeks of surgery. Patients undergoing laminectomy procedure can expect surgery pain to ease within two to four weeks of surgery and starting physical therapy and other activities by about six weeks. Fusion procedures are likewise highly variable and recovery times prolonged, approaching three to six months before patients can return to exercise or sports activities. Please confer with your surgeon regarding your procedure and expected recovery. What is the success rate of spinal decompression surgery? Precise success rates of spinal decompression surgery can be difficult to calculate due to the wide variety of procedures, severity of spinal conditions, and the age and health of individual patients. Patients can expect a significant decrease in their pain and an improvement in their overall function.
Answer the question based solely on the information provided in the passage. Do not use any external knowledge or resources. I have a hernia in my lower back and my doctor wants to do a laminotomy. I want to know more information about this surgery. Please explain the different types of spinal decompression surgeries and what I should expect. Use more than 400 words. What is spinal decompression surgery? Spinal decompression surgery is performed to relieve symptoms related to compression of the spinal cord or its roots, which may include back or neck pain and radiating limb pain (radiculopathy). What symptoms does spinal decompression surgery treat? Spinal nerve compression symptoms include pain, altered sensations, muscle weakness or dysfunction, and even gait abnormalities. These symptoms can be caused by a wide variety of conditions. In some of these, such as in cervical spinal stenosis that leads to cervical myelopathy, you may feel symptoms in the arms, hands, legs or feet, and/or have balance problems, or even incontinence issues (bowel dysfunction, unexpected need to urinate, etc.). A rapid onset of these symptoms can indicate a condition known as cauda equina syndrome, which can cause paralysis and other serious problems if not addressed in a timely manner. Pain and other symptoms treated by these surgeries are most common in the lower back (lumbar spine), followed by the neck (cervical spine). Symptoms in the upper back (thoracic spine) are possible but less common because it is the most stable part of the spine, due in part to its being connected to the rib cage. Neuropathies may involve feelings of numbness or a "pins and needles" tingling sensation and cause weakness or instability, primarily in lower the back. What happens during spinal decompression surgery? Every type of spinal decompression modifies or removes bone, spinal disc or soft tissues that are causing compression of a nerve. The techniques vary according to which tissues are causing the compression. For example, laminoplasty involves the reshaping of part of a vertebral lamina, a laminotomy the making of a small hole the lamina, and a laminectomy the complete removal of a lamina, all to relieve pressure on the nerves. What types of spine decompression surgery are there? Types of spine decompression surgery performed at HSS include laminectomy, laminotomy, laminoplasty, discectomy and microdiscectomy, among others. Lumbar decompression surgery may be used to address problems in the lower back, such as lumbar laminectomy, laminotomy, or microdiscectomy. Types of spinal decompression surgery Laminectomy is the removal in one or more vertebrae of the lamina (bony roof over the spinal canal). This decompresses both sides (left and right) of the canal. Laminotomy is removal of a small portion of the lamina to decompress one side (left or right) of the canal. This leaves most of the lamina intact. Microsurgical laminoplasty is a minimally invasive surgical decompression technique that uses small incisions viewed through an operating microscope. (Find a laminoplasty spine specialist.) Microdiscectomy (also known as spinal microdecompression surgery): This minimally invasive spine procedure is commonly performed on patients who have sciatica and/or a herniated disc in the lumbar section of the spine (lower back). Using muscle-sparing incisions, this removes portions of a herniated disc that is putting pressure on the spinal nerve and causing pain. Minimally invasive lumbar discectomy (also known as endoscopic percutaneous disc removal) is similar to microdiscectomy and uses a scope to make very small incisions in the skin, through which a portion of the herniated disc that is compressing spinal nerves is removed. Decompression with fusion Some decompression surgeries may require the addition of a fusion procedure simultaneously. This depends on the type of disease being treated and the technique being used to address the disease. This includes lumbar decompressions, such as lumbar interbody fusion (LIF) techniques, which may indirectly decompress the spine, or cervical decompressions, such as anterior cervical discectomy and fusion (ACDF surgery), which are dependent on the differential anatomy of the spine. Who is a good candidate for spinal decompression surgery? Decompression surgery can be a good option for people who have back or neck pain and/or neuropathies due to nerve compression caused by a herniated disc, spinal stenosis, spondylolisthesis, and for whom nonsurgical methods such as physical therapy, epidural steroid injections or pain management regimens have failed to provide relief. Find an HSS spine surgeon by decompression procedure all spinal decompression laminectomy laminoplasty discectomy and microdiscectomy Will I have to go under anesthesia for spinal decompression surgery? Most spinal decompression surgeries will be performed under general anesthesia, with the patient completely unconscious. Some modern techniques allow for spinal surgery under regional anesthesia (either spinal or epidural anesthesia). These techniques allow patients to breathe on their own without the need for mechanical assistance. These techniques may reduce complications associated with general anesthesia but are not widely available and may be performed on a case-by-case basis. How long will I stay in the hospital after spinal decompression surgery? In many cases, patients undergoing decompressions such as a laminectomy, discectomy, or microdiscectomy can go home the same day. This is often the case with a laminectomy, microdiscectomy, and there is research to suggest that even multilevel ACDF surgeries may be safely done on an outpatient basis. Some patients having spinal decompression may need to stay one or more nights including those who have chronic diseases or sleep. Some patients require a spinal fusion may stay overnight and return home one or two days after surgery. Rarely, a patient may need to stay as many longer. In addition, some decompression spine surgeries may be planned as an ambulatory (outpatient) procedure, but then converted to an overnight stay to monitor the patient. In one study of more than 1,000 patients who underwent an ambulatory one- or two-level lumbar decompression, 58% ended up staying over at least one night. How soon can I walk after a decompression spine surgery? At HSS patients are encouraged to walk the same day of most decompression surgeries. How soon can I return to work after spinal decompression? Depending on the specific procedure and other factors, patients generally are able to return to work between two and four weeks after surgery. Some patients who have a microdiscectomy decompression may be able to return to work after less than two weeks. What is the recovery time of spinal decompression surgery? The recovery time for decompression surgery alone is generally faster compared to procedures that include a fusion. Owing to the wide range of decompression surgery types and the number of spinal levels addressed with surgery there is likewise some variability in recovery duration. There is recent evidence that microdiscectomy patients can return to physical therapy and low impact aerobic exercise within four weeks of surgery. Patients undergoing laminectomy procedure can expect surgery pain to ease within two to four weeks of surgery and starting physical therapy and other activities by about six weeks. Fusion procedures are likewise highly variable and recovery times prolonged, approaching three to six months before patients can return to exercise or sports activities. Please confer with your surgeon regarding your procedure and expected recovery. What is the success rate of spinal decompression surgery? Precise success rates of spinal decompression surgery can be difficult to calculate due to the wide variety of procedures, severity of spinal conditions, and the age and health of individual patients. Patients can expect a significant decrease in their pain and an improvement in their overall function. https://www.hss.edu/condition-list_spinal-decompression-surgery.asp
For this task, you are only to answer questions based entirely on the information provided in the prompt. No external resources or prior knowledge are allowed in this case.
In simple language, tell me about the Supreme Court's Code of Conduct?
Recent Changes to Supreme Court Financial Disclosure Requirements Statutory Updates On May 13, 2022, President Biden signed the Courthouse Ethics and Transparency Act, which requires online publication of financial disclosure reports of judicial officers (including Supreme Court Justices), bankruptcy judges, and magistrate judges. While the EIGA always mandated public access to judicial officer financial disclosure reports, there was no central database to access the filings, and reports were available only “in paper documents or on thumb drives.” The new law directed the Administrative Office of the United States Courts (AO) to establish a “searchable internet database to enable public access to any report required to be filed” under the EIGA. The AO launched the public database on November 7, 2022, and the public can now access electronic versions of federal judges’ reports. The EIGA’s allowance for security-related redactions in judicial branch financial disclosure reports remains unchanged. The Courthouse Ethics and Transparency Act also extended the STOCK Act’s PTR requirements to judicial officers (including Supreme Court Justices), bankruptcy judges, and magistrate judges. Under the provisions discussed above, federal judges are now required to report any purchase, sale, or exchange of securities that exceeds $1,000 within 45 days of the transaction. The new public database includes access to all of these periodic transaction reports. Regulatory Updates Interpretation of the EIGA’s financial disclosure requirements as applied to judicial officers and employees has also recently changed. As mentioned above, the Committee on Financial Disclosure within the Judicial Conference prescribes rules regarding financial disclosure by judicial officers. Those rules are found in Volume 2, Part D, of the Guide to Judiciary Policy. As noted above, as part of their financial disclosure reports, all covered individuals are statutorily required to report gifts received from any source other than a relative with the exception of “food, lodging, or entertainment received as personal hospitality.” The EIGA defines personal hospitality of any individual as “hospitality extended for a nonbusiness purpose by an individual, not a corporation or organization, at the personal residence of that individual or the individual’s family or on property or facilities owned by that individual or the individual’s family.” According to a March 2023 letter from the director of the AO, the Committee on Financial Disclosure revised its regulations, effective March 14, 2023, specifically regarding the definition of personal hospitality. These updated regulations appear in the notes that accompany the definition of personal hospitality: (1) The personal hospitality gift reporting exemption applies only to food, lodging, or entertainment and is intended to cover such gifts of a personal, non-business nature. Therefore, the reporting exemption does not include: gifts other than food, lodging or entertainment, such as transportation that substitutes for commercial transportation; gifts extended for a business purpose; Congressional Research Service 4 gifts extended at property or facilities owned by an entity, rather than by an individual or an individual’s family, even if the entity is owned wholly or in part by an individual or an individual’s family; gifts paid for by any individual or entity other than the individual providing the hospitality, or for which the individual providing the hospitality receives reimbursement or a tax deduction related to furnishing the hospitality; or gifts extended at a commercial property, e.g., a resort or restaurant, or at a property that is regularly rented out to others for a business purpose. The notes also clarify that judicial officers and employees are never permitted “to solicit or accept anything of value from a person seeking official action from or doing business with the court or other entity served by the judicial officer or employee, or from any other person whose interests may be substantially affected by the performance or nonperformance of the judge’s official duties.” There is some uncertainty as to whether these regulations apply to the Supreme Court. Although the regulations explicitly include Justices in the definition of judicial officer, some have questioned whether the Judicial Conference has authority over the Supreme Court. In his 2011 Year-End Report, the Chief Justice explained that because the “Judicial Conference is an instrument for the management of the lower federal courts, its committees have no mandate to prescribe rules or standards for any other body.” Nonetheless, at least one Associate Justice has indicated his intention to follow the 2023 guidance going forward, and, as discussed further below, the Justices have stated that they comply with current Judicial Conference regulations on financial disclosure. Supreme Court Code of Conduct On November 13, 2023, the United States Supreme Court announced it was, for the first time, adopting a Code of Conduct “to set out succinctly and gather in one place the ethics rules and principles that guide the conduct of the Members of the Court.” Noting that most of the rules and principles within the Code “are not new,” the Court explained that the Code “largely represents a codification of principles that we have long regarded as governing our conduct.” The Code, discussed in more detail in another Legal Sidebar, is a set of five ethical canons and accompanying commentary. The canons are nearly the same as the existing canons in the Code of Conduct for U.S. Judges, which applies only to lower federal judges. While many provisions of the Supreme Court Code generally address conflicts of interest and appearances of impropriety, specific Code provisions discuss requirements related to financial activities and compliance with the EIGA. For example, Canon 4(H) declares the Justices’ commitment to comply with financial disclosure laws, and the commentary accompanying the Code states that the Justices comply with the EIGA, STOCK Act, and current Judicial Conference regulations on financial disclosure. Although the Code affirms the Justices’ compliance with existing financial disclosure laws and regulations, it seemingly does not impose any new financial disclosure requirements on the Justices. Considerations for Congress Financial disclosure laws are used to identify potential or actual conflicts of interest in order to promote integrity in the federal government. Congress may consider options to modify or clarify current financial disclosure requirements for judicial officers. For example, the Supreme Court Ethics, Recusal, and Transparency Act would, according to its sponsor, “improve disclosure of travel and hospitality for judges” by requiring the counselor to the Chief Justice (with approval of the Chief Justice) to adopt rules regarding disclosure of gifts, travel, and income that are “at least as rigorous as the House and Senate disclosure rules.” This proposal was introduced before the Justices released their November 2023 Code of Conduct, and it is unclear to what extent the Code may overlap with some of the requirements that this bill would impose. Congressional Research Service 5 LSB10949 · VERSION 2 · UPDATED Financial disclosure is only one facet of a wider theme of government ethics. The EIGA, as amended, includes not only the financial disclosure requirements discussed above but also gift and outside earned income and employment limitations that apply to all officers and employees of the government. While the Judicial Conference’s implementing regulations for these laws exclude Supreme Court Justices from coverage, the commentary accompanying the recent Supreme Court Code of Conduct states that the Justices comply with current Judicial Conference regulations on gifts, foreign gifts and decorations, and outside earned income, honoraria, and employment in addition to regulations about financial disclosure. This is consistent with the Justices’ long-standing voluntary compliance with certain Judicial Conference regulations. The Code, however, does not include any enforcement mechanisms, meaning there is no process to address alleged violations of the Code. Proposed legislation about Supreme Court financial disclosure and other ethics requirements, including congressional attempts to enforce the Supreme Court Code of Conduct through legislation or oversight, may raise questions regarding Congress’s authority to regulate the Supreme Court. Some scholars have suggested that Chief Justice Roberts in his 2011 Year-End Report questioned whether Congress may impose ethical requirements on the Supreme Court. Other scholars have argued that while constitutional obstacles—such as separation-of-powers issues—may exist, the Constitution does provide Congress with authority to regulate Supreme Court ethics. This authority, however, is untested, leaving a wide array of questions unanswered regarding the validity of current law and the extent to which Congress may impose future regulations. Despite any doubts as to congressional authority, the Justices, through their newly released Code of Conduct, have acknowledged that they file “the same financial disclosure reports as other federal judges.” Without enforcement mechanisms in the Code, however, compliance with federal ethics laws may be left to the discretion of the Justices.
[For this task, you are only to answer questions based entirely on the information provided in the prompt. No external resources or prior knowledge are allowed in this case.] [In simple language, tell me about the Supreme Court's Code of Conduct?] [Recent Changes to Supreme Court Financial Disclosure Requirements Statutory Updates On May 13, 2022, President Biden signed the Courthouse Ethics and Transparency Act, which requires online publication of financial disclosure reports of judicial officers (including Supreme Court Justices), bankruptcy judges, and magistrate judges. While the EIGA always mandated public access to judicial officer financial disclosure reports, there was no central database to access the filings, and reports were available only “in paper documents or on thumb drives.” The new law directed the Administrative Office of the United States Courts (AO) to establish a “searchable internet database to enable public access to any report required to be filed” under the EIGA. The AO launched the public database on November 7, 2022, and the public can now access electronic versions of federal judges’ reports. The EIGA’s allowance for security-related redactions in judicial branch financial disclosure reports remains unchanged. The Courthouse Ethics and Transparency Act also extended the STOCK Act’s PTR requirements to judicial officers (including Supreme Court Justices), bankruptcy judges, and magistrate judges. Under the provisions discussed above, federal judges are now required to report any purchase, sale, or exchange of securities that exceeds $1,000 within 45 days of the transaction. The new public database includes access to all of these periodic transaction reports. Regulatory Updates Interpretation of the EIGA’s financial disclosure requirements as applied to judicial officers and employees has also recently changed. As mentioned above, the Committee on Financial Disclosure within the Judicial Conference prescribes rules regarding financial disclosure by judicial officers. Those rules are found in Volume 2, Part D, of the Guide to Judiciary Policy. As noted above, as part of their financial disclosure reports, all covered individuals are statutorily required to report gifts received from any source other than a relative with the exception of “food, lodging, or entertainment received as personal hospitality.” The EIGA defines personal hospitality of any individual as “hospitality extended for a nonbusiness purpose by an individual, not a corporation or organization, at the personal residence of that individual or the individual’s family or on property or facilities owned by that individual or the individual’s family.” According to a March 2023 letter from the director of the AO, the Committee on Financial Disclosure revised its regulations, effective March 14, 2023, specifically regarding the definition of personal hospitality. These updated regulations appear in the notes that accompany the definition of personal hospitality: (1) The personal hospitality gift reporting exemption applies only to food, lodging, or entertainment and is intended to cover such gifts of a personal, non-business nature. Therefore, the reporting exemption does not include: gifts other than food, lodging or entertainment, such as transportation that substitutes for commercial transportation; gifts extended for a business purpose; Congressional Research Service 4 gifts extended at property or facilities owned by an entity, rather than by an individual or an individual’s family, even if the entity is owned wholly or in part by an individual or an individual’s family; gifts paid for by any individual or entity other than the individual providing the hospitality, or for which the individual providing the hospitality receives reimbursement or a tax deduction related to furnishing the hospitality; or gifts extended at a commercial property, e.g., a resort or restaurant, or at a property that is regularly rented out to others for a business purpose. The notes also clarify that judicial officers and employees are never permitted “to solicit or accept anything of value from a person seeking official action from or doing business with the court or other entity served by the judicial officer or employee, or from any other person whose interests may be substantially affected by the performance or nonperformance of the judge’s official duties.” There is some uncertainty as to whether these regulations apply to the Supreme Court. Although the regulations explicitly include Justices in the definition of judicial officer, some have questioned whether the Judicial Conference has authority over the Supreme Court. In his 2011 Year-End Report, the Chief Justice explained that because the “Judicial Conference is an instrument for the management of the lower federal courts, its committees have no mandate to prescribe rules or standards for any other body.” Nonetheless, at least one Associate Justice has indicated his intention to follow the 2023 guidance going forward, and, as discussed further below, the Justices have stated that they comply with current Judicial Conference regulations on financial disclosure. Supreme Court Code of Conduct On November 13, 2023, the United States Supreme Court announced it was, for the first time, adopting a Code of Conduct “to set out succinctly and gather in one place the ethics rules and principles that guide the conduct of the Members of the Court.” Noting that most of the rules and principles within the Code “are not new,” the Court explained that the Code “largely represents a codification of principles that we have long regarded as governing our conduct.” The Code, discussed in more detail in another Legal Sidebar, is a set of five ethical canons and accompanying commentary. The canons are nearly the same as the existing canons in the Code of Conduct for U.S. Judges, which applies only to lower federal judges. While many provisions of the Supreme Court Code generally address conflicts of interest and appearances of impropriety, specific Code provisions discuss requirements related to financial activities and compliance with the EIGA. For example, Canon 4(H) declares the Justices’ commitment to comply with financial disclosure laws, and the commentary accompanying the Code states that the Justices comply with the EIGA, STOCK Act, and current Judicial Conference regulations on financial disclosure. Although the Code affirms the Justices’ compliance with existing financial disclosure laws and regulations, it seemingly does not impose any new financial disclosure requirements on the Justices. Considerations for Congress Financial disclosure laws are used to identify potential or actual conflicts of interest in order to promote integrity in the federal government. Congress may consider options to modify or clarify current financial disclosure requirements for judicial officers. For example, the Supreme Court Ethics, Recusal, and Transparency Act would, according to its sponsor, “improve disclosure of travel and hospitality for judges” by requiring the counselor to the Chief Justice (with approval of the Chief Justice) to adopt rules regarding disclosure of gifts, travel, and income that are “at least as rigorous as the House and Senate disclosure rules.” This proposal was introduced before the Justices released their November 2023 Code of Conduct, and it is unclear to what extent the Code may overlap with some of the requirements that this bill would impose. Congressional Research Service 5 LSB10949 · VERSION 2 · UPDATED Financial disclosure is only one facet of a wider theme of government ethics. The EIGA, as amended, includes not only the financial disclosure requirements discussed above but also gift and outside earned income and employment limitations that apply to all officers and employees of the government. While the Judicial Conference’s implementing regulations for these laws exclude Supreme Court Justices from coverage, the commentary accompanying the recent Supreme Court Code of Conduct states that the Justices comply with current Judicial Conference regulations on gifts, foreign gifts and decorations, and outside earned income, honoraria, and employment in addition to regulations about financial disclosure. This is consistent with the Justices’ long-standing voluntary compliance with certain Judicial Conference regulations. The Code, however, does not include any enforcement mechanisms, meaning there is no process to address alleged violations of the Code. Proposed legislation about Supreme Court financial disclosure and other ethics requirements, including congressional attempts to enforce the Supreme Court Code of Conduct through legislation or oversight, may raise questions regarding Congress’s authority to regulate the Supreme Court. Some scholars have suggested that Chief Justice Roberts in his 2011 Year-End Report questioned whether Congress may impose ethical requirements on the Supreme Court. Other scholars have argued that while constitutional obstacles—such as separation-of-powers issues—may exist, the Constitution does provide Congress with authority to regulate Supreme Court ethics. This authority, however, is untested, leaving a wide array of questions unanswered regarding the validity of current law and the extent to which Congress may impose future regulations. Despite any doubts as to congressional authority, the Justices, through their newly released Code of Conduct, have acknowledged that they file “the same financial disclosure reports as other federal judges.” Without enforcement mechanisms in the Code, however, compliance with federal ethics laws may be left to the discretion of the Justices.]
"================ <TEXT PASSAGE> ======= [context document] ================ <QUESTION> ======= [user request] ================ <TASK> ======= You are an expert in question answering. Your task is to reply to a query or question, based only on the information provided by the user. It should only use information in the article provided."
Can you explain to me why staphylococcus aureus is a pathogen that is of particular worry for humans? What disease does it cause? What are the reasons behinds its success?
Staphylococcus aureus is a Gram-positive, nonmotile, coagulase-positive coccoid bacterium of the Firmicutes phylum. Although the Staphylococcus genus includes 52 species and 28 subspecies (List of Prokaryotic names with Standing in Nomenclature), S. aureus is by far the most clinically relevant. S. aureus is found in the human commensal microbiota of the nasal mucosa in 20–40% of the general population1,2. The reported prevalence varies owing to differences in the size and demographics of the study populations, quality of sampling and culture techniques utilized3. When the cutaneous and mucosal barriers are disrupted, for example, owing to chronic skin conditions, wounds or surgical intervention, S. aureus can gain access to the underlying tissues or the bloodstream and cause infection. Persons with invasive medical devices (such as peripheral and central venous catheters) or compromised immune systems are particularly vulnerable to S. aureus infection4. Methicillin-resistant S. aureus (MRSA) was first described in England in 1961 (Ref.5), soon after methicillin was introduced into clinical practice. Methicillin was initially widely used; however, because of its toxicity, it is now no longer marketed for human use and has largely been replaced by similar, more-stable penicillins such as oxacillin, flucloxacillin and dicloxacillin6. Nevertheless, the term methicillin-resistant S. aureus continues to be used. In the decade following its initial description, MRSA was responsible for hospital outbreaks (health-care-associated MRSA (HA-MRSA)) in many parts of the world7. A substantial change in MRSA epidemiology was observed when it was detected in individuals without previous health-care contact (referred to as community-associated MRSA (CA-MRSA)), notably among indigenous populations in Australia in the 1980s8 and otherwise healthy persons, including children, in the United States in the 1990s9. Since the mid-2000s, it has also been associated with livestock exposure (livestock-associated MRSA (LA-MRSA))10. Several S. aureus clones (that is, bacteria that are indistinguishable from each other by a variety of genetic tests (for example, pulsed-field gel electrophoresis, multilocus enzyme electrophoresis or ribotyping) or that are so similar that they are presumed to be derived from a common parent11) have developed into MRSA by uptake via horizontal gene transfer of staphylococcal cassette chromosome mec (SCCmec)12, a mobile genetic element that encodes the genes mecA or mecC, which confer resistance to methicillin and, therefore, to most β-lactam antibiotics. MRSA is often also resistant to multiple other antibiotic classes. Indeed, S. aureus has the remarkable ability to acquire resistance to any antibiotic7, which has major implications for current as well as future treatment options for this pathogen. Individuals with MRSA colonization or carriage (that is, the presence of bacteria that do not cause a detectable host immune response, cellular damage or clinical signs and symptoms of infection) have an increased risk of subsequent infection and are an important source of person-to-person transmission. Health-care facilities host persons who are predisposed to infection (for example, owing to invasive procedures and/or immune compromise) and are environments with high antibiotic selection pressure (which can contribute to the selection of antimicrobial resistance in bacteria) and frequent contact between individuals. These conditions have facilitated the epidemic spread of MRSA in hospitals; MRSA is now endemic in many health-care facilities throughout the world and, as a consequence, it has become a major focus for infection control efforts globally.
"================ <TEXT PASSAGE> ======= Staphylococcus aureus is a Gram-positive, nonmotile, coagulase-positive coccoid bacterium of the Firmicutes phylum. Although the Staphylococcus genus includes 52 species and 28 subspecies (List of Prokaryotic names with Standing in Nomenclature), S. aureus is by far the most clinically relevant. S. aureus is found in the human commensal microbiota of the nasal mucosa in 20–40% of the general population1,2. The reported prevalence varies owing to differences in the size and demographics of the study populations, quality of sampling and culture techniques utilized3. When the cutaneous and mucosal barriers are disrupted, for example, owing to chronic skin conditions, wounds or surgical intervention, S. aureus can gain access to the underlying tissues or the bloodstream and cause infection. Persons with invasive medical devices (such as peripheral and central venous catheters) or compromised immune systems are particularly vulnerable to S. aureus infection4. Methicillin-resistant S. aureus (MRSA) was first described in England in 1961 (Ref.5), soon after methicillin was introduced into clinical practice. Methicillin was initially widely used; however, because of its toxicity, it is now no longer marketed for human use and has largely been replaced by similar, more-stable penicillins such as oxacillin, flucloxacillin and dicloxacillin6. Nevertheless, the term methicillin-resistant S. aureus continues to be used. In the decade following its initial description, MRSA was responsible for hospital outbreaks (health-care-associated MRSA (HA-MRSA)) in many parts of the world7. A substantial change in MRSA epidemiology was observed when it was detected in individuals without previous health-care contact (referred to as community-associated MRSA (CA-MRSA)), notably among indigenous populations in Australia in the 1980s8 and otherwise healthy persons, including children, in the United States in the 1990s9. Since the mid-2000s, it has also been associated with livestock exposure (livestock-associated MRSA (LA-MRSA))10. Several S. aureus clones (that is, bacteria that are indistinguishable from each other by a variety of genetic tests (for example, pulsed-field gel electrophoresis, multilocus enzyme electrophoresis or ribotyping) or that are so similar that they are presumed to be derived from a common parent11) have developed into MRSA by uptake via horizontal gene transfer of staphylococcal cassette chromosome mec (SCCmec)12, a mobile genetic element that encodes the genes mecA or mecC, which confer resistance to methicillin and, therefore, to most β-lactam antibiotics. MRSA is often also resistant to multiple other antibiotic classes. Indeed, S. aureus has the remarkable ability to acquire resistance to any antibiotic7, which has major implications for current as well as future treatment options for this pathogen. Individuals with MRSA colonization or carriage (that is, the presence of bacteria that do not cause a detectable host immune response, cellular damage or clinical signs and symptoms of infection) have an increased risk of subsequent infection and are an important source of person-to-person transmission. Health-care facilities host persons who are predisposed to infection (for example, owing to invasive procedures and/or immune compromise) and are environments with high antibiotic selection pressure (which can contribute to the selection of antimicrobial resistance in bacteria) and frequent contact between individuals. These conditions have facilitated the epidemic spread of MRSA in hospitals; MRSA is now endemic in many health-care facilities throughout the world and, as a consequence, it has become a major focus for infection control efforts globally. https://www.nature.com/articles/nrdp201833 ================ <QUESTION> ======= Can you explain to me why staphylococcus aureus is a pathogen that is of particular worry for humans? What disease does it cause? What are the reasons behinds its success? ================ <TASK> ======= You are an expert in question answering. Your task is to reply to a query or question, based only on the information provided by the user. It should only use information in the article provided."
"================ <TEXT PASSAGE> ======= [context document] ================ <QUESTION> ======= [user request] ================ <TASK> ======= You are an expert in question answering. Your task is to reply to a query or question, based only on the information provided by the user. It should only use information in the article provided."
A streamer I like was recently diagnosed with bronchitis, and now I'm curious about what it is. Summarize this article on bronchitis for me and format your response in bullet form.
Cough is the most common illness-related reason for ambulatory care visits in the United States. Acute bronchitis is a clinical diagnosis characterized by cough due to acute inflammation of the trachea and large airways without evidence of pneumonia. Pneumonia should be suspected in patients with tachypnea, tachycardia, dyspnea, or lung findings suggestive of pneumonia, and radiography is warranted. Pertussis should be suspected in patients with cough persisting for more than two weeks that is accompanied by symptoms such as paroxysmal cough, whooping cough, and post-tussive emesis, or recent pertussis exposure. The cough associated with acute bronchitis typically lasts about two to three weeks, and this should be emphasized with patients. Acute bronchitis is usually caused by viruses, and antibiotics are not indicated in patients without chronic lung disease. Antibiotics have been shown to provide only minimal benefit, reducing the cough or illness by about half a day, and have adverse effects, including allergic reactions, nausea and vomiting, and Clostridium difficile infection. Evaluation and treatment of bronchitis include ruling out secondary causes for cough, such as pneumonia; educating patients about the natural course of the disease; and recommending symptomatic treatment and avoidance of unnecessary antibiotic use. Strategies to reduce inappropriate antibiotic use include delayed prescriptions, patient education, and calling the infection a chest cold. Acute bronchitis is most often caused by a viral infection.3,4 The most commonly identified viruses are rhinovirus, enterovirus, influenza A and B, parainfluenza, coronavirus, human metapneumovirus, and respiratory syncytial virus.3 Bacteria are detected in 1% to 10% of cases of acute bronchitis.3–5 Atypical bacteria, such as Mycoplasma pneumoniae, Chlamydophila pneumoniae, and Bordetella pertussis, are rare causes of acute bronchitis. In a study of sputum samples of adults with acute cough for more than five days, M. pneumoniae was isolated in less than 1% of cases and C. pneumoniae was not identified.6 Approximately 10% of patients presenting with a cough lasting at least two weeks have evidence of B. pertussis infection.7,8 During outbreaks, pertussis detection is more likely in children and those with prolonged coughs.6,9 Antibiotics can eradicate B. pertussis from the nasopharynx. They do not seem to shorten the course of illness unless given in the first one to two weeks.10 Isolated outbreaks of pertussis occur throughout the United States, and increased testing of adults and children should be considered during these periods. Cough is the predominant and defining symptom of acute bronchitis. The primary diagnostic consideration in patients with suspected acute bronchitis is ruling out more serious causes of cough, such as asthma, exacerbation of chronic obstructive pulmonary disease, heart failure, or pneumonia. The diagnoses that have the most overlap with acute bronchitis are upper respiratory tract infections and pneumonia. Whereas acute bronchitis and the common cold are self-limited illnesses that do not require antibiotic treatment, the standard therapy for pneumonia is antibiotics. Besides cough, other signs and symptoms of acute bronchitis include sputum production, dyspnea, nasal congestion, headache, and fever.4,11,12 The first few days of an acute bronchitis infection may be indistinguishable from the common cold. Patients may have substernal or chest wall pain when coughing. Fever is not a typical finding after the first few days, and presence of a fever greater than 100°F (37.8°C) should prompt consideration of influenza or pneumonia. Production of sputum, even purulent, is common and does not correlate with bacterial infection.13,14 Because the cough associated with bronchitis is so bothersome and slow to resolve, patients often seek treatment. Patients and clinicians may underestimate the time required to fully recover from acute bronchitis.15 The duration of acute bronchitis–related cough is typically two to three weeks, with a pooled estimate of 18 days in one systematic review.15 This corresponds to results of a prospective trial, which found that patients who had a cough for at least five days had a median of 18 days of coughing.16 On physical examination, patients with acute bronchitis may be mildly ill-appearing, and fever is present in about one-third of patients.4,11 Lung auscultation may reveal wheezes, as well as rhonchi that typically improve with coughing. It is important to rule out pneumonia. High fever; moderate to severe ill-appearance; hypoxia; and signs of lung consolidation, such as decreased breath sounds, bronchial breath sounds, crackles, egophony, and increased tactile fremitus, are concerning for pneumonia. Pneumonia is unlikely in nonfrail older adults who have normal vital signs and normal lung examination findings.17–20
"================ <TEXT PASSAGE> ======= Cough is the most common illness-related reason for ambulatory care visits in the United States. Acute bronchitis is a clinical diagnosis characterized by cough due to acute inflammation of the trachea and large airways without evidence of pneumonia. Pneumonia should be suspected in patients with tachypnea, tachycardia, dyspnea, or lung findings suggestive of pneumonia, and radiography is warranted. Pertussis should be suspected in patients with cough persisting for more than two weeks that is accompanied by symptoms such as paroxysmal cough, whooping cough, and post-tussive emesis, or recent pertussis exposure. The cough associated with acute bronchitis typically lasts about two to three weeks, and this should be emphasized with patients. Acute bronchitis is usually caused by viruses, and antibiotics are not indicated in patients without chronic lung disease. Antibiotics have been shown to provide only minimal benefit, reducing the cough or illness by about half a day, and have adverse effects, including allergic reactions, nausea and vomiting, and Clostridium difficile infection. Evaluation and treatment of bronchitis include ruling out secondary causes for cough, such as pneumonia; educating patients about the natural course of the disease; and recommending symptomatic treatment and avoidance of unnecessary antibiotic use. Strategies to reduce inappropriate antibiotic use include delayed prescriptions, patient education, and calling the infection a chest cold. Acute bronchitis is most often caused by a viral infection.3,4 The most commonly identified viruses are rhinovirus, enterovirus, influenza A and B, parainfluenza, coronavirus, human metapneumovirus, and respiratory syncytial virus.3 Bacteria are detected in 1% to 10% of cases of acute bronchitis.3–5 Atypical bacteria, such as Mycoplasma pneumoniae, Chlamydophila pneumoniae, and Bordetella pertussis, are rare causes of acute bronchitis. In a study of sputum samples of adults with acute cough for more than five days, M. pneumoniae was isolated in less than 1% of cases and C. pneumoniae was not identified.6 Approximately 10% of patients presenting with a cough lasting at least two weeks have evidence of B. pertussis infection.7,8 During outbreaks, pertussis detection is more likely in children and those with prolonged coughs.6,9 Antibiotics can eradicate B. pertussis from the nasopharynx. They do not seem to shorten the course of illness unless given in the first one to two weeks.10 Isolated outbreaks of pertussis occur throughout the United States, and increased testing of adults and children should be considered during these periods. Cough is the predominant and defining symptom of acute bronchitis. The primary diagnostic consideration in patients with suspected acute bronchitis is ruling out more serious causes of cough, such as asthma, exacerbation of chronic obstructive pulmonary disease, heart failure, or pneumonia. The diagnoses that have the most overlap with acute bronchitis are upper respiratory tract infections and pneumonia. Whereas acute bronchitis and the common cold are self-limited illnesses that do not require antibiotic treatment, the standard therapy for pneumonia is antibiotics. Besides cough, other signs and symptoms of acute bronchitis include sputum production, dyspnea, nasal congestion, headache, and fever.4,11,12 The first few days of an acute bronchitis infection may be indistinguishable from the common cold. Patients may have substernal or chest wall pain when coughing. Fever is not a typical finding after the first few days, and presence of a fever greater than 100°F (37.8°C) should prompt consideration of influenza or pneumonia. Production of sputum, even purulent, is common and does not correlate with bacterial infection.13,14 Because the cough associated with bronchitis is so bothersome and slow to resolve, patients often seek treatment. Patients and clinicians may underestimate the time required to fully recover from acute bronchitis.15 The duration of acute bronchitis–related cough is typically two to three weeks, with a pooled estimate of 18 days in one systematic review.15 This corresponds to results of a prospective trial, which found that patients who had a cough for at least five days had a median of 18 days of coughing.16 On physical examination, patients with acute bronchitis may be mildly ill-appearing, and fever is present in about one-third of patients.4,11 Lung auscultation may reveal wheezes, as well as rhonchi that typically improve with coughing. It is important to rule out pneumonia. High fever; moderate to severe ill-appearance; hypoxia; and signs of lung consolidation, such as decreased breath sounds, bronchial breath sounds, crackles, egophony, and increased tactile fremitus, are concerning for pneumonia. Pneumonia is unlikely in nonfrail older adults who have normal vital signs and normal lung examination findings.17–20 https://www.aafp.org/pubs/afp/issues/2016/1001/p560.html ================ <QUESTION> ======= A streamer I like was recently diagnosed with bronchitis, and now I'm curious about what it is. Summarize this article on bronchitis for me and format your response in bullet form. ================ <TASK> ======= You are an expert in question answering. Your task is to reply to a query or question, based only on the information provided by the user. It should only use information in the article provided."
In your response, you must only ever answer the question based on the information in the prompt. No external information may be used, nor prior knowledge you have about the topic. Each time you mention a sex or gender, replace it with the equivalent word for chickens. Split the answer into two sections, one for women, one for men. Respond in bullet points, with a short explanation after each point.
What factors might go into female and male athletes having different cardiovascular exercise requirements?
Fasted cardiovascular exercise was recommended by approximately two-thirds of par- ticipant coaches, with the most common reason for preference being the added utilization of yohimbine, growth hormone, and clenbuterol (their combination with fasted exercise is thought to enhance fat loss). A systematic review reported that fasted cardiovascular exercise is not more effective than fed cardiovascular exercise [13 ]. Notably, none of the studies included in the systematic review recruited competitive bodybuilders as subjects, nor did they look at subjects utilizing fasted cardiovascular exercise in tandem with these specific PEDs for an additional fat-burning effect. A review article by Escalante et al. sug- gests that physique athletes may perform fasted cardio at varying intensities, but it is not suggested for longer than 60 min to prevent fat-free mass losses [14]. Future research in this population is needed in which fasted cardiovascular exercise is paired with fat-burning compounds to determine if this pairing is (1) safe and (2) efficacious for fat loss outcomes. Participant coaches notably did not prefer HIIT cardiovascular exercise over LISS or MISS cardiovascular exercise for any of the populations. This recommendation is in line with previous research, as a systematic review and meta-analysis reported similarly effective fat-burning effects between HIIT and MISS [15 ]. Furthermore, authors of a narrative review suggested that HIIT cardiovascular exercise should not be used too frequently due to the increased recovery demands during natural bodybuilding contest preparation [16]. Further research in both enhanced and natural populations is warranted on this topic. Participant coaches recommended that female athletes perform more cardiovascular exercise during contest preparation, up to 740 min (12+ h) per week, and male bodybuilding athletes up to 480 min (8 h) per week. Given the potential of high volumes of resistance training to induce additional fatigue while dieting, authors of some reviews recommend the lowest amount of cardiovascular exercise needed to achieve the desired result to mitigate any negative impact of cardiovascular training [16 , 17]. The range of cardiovascular exercise frequencies and durations for athletes is notably very wide, and this is likely due to the individuality of every athlete’s energy expenditure, current body composition, genetics, timeline to achieve stage-leanness, required leanness for their respective division, and indi- vidual preference. Neither coaches nor researchers may be able to provide generalizations about the amount of cardiovascular exercise that will be required to obtain the desired leanness for specific divisions due to the individuality of each athlete.
System instruction: [In your response, you must only ever answer the question based on the information in the prompt. No external information may be used, nor prior knowledge you have about the topic. Each time you mention a sex or gender, replace it with the equivalent word for chickens. Split the answer into two sections, one for women, one for men. Respond in bullet points, with a short explanation after each point.] Question: [What factors might go into female and male athletes having different cardiovascular exercise requirements?] Context: [Fasted cardiovascular exercise was recommended by approximately two-thirds of par- ticipant coaches, with the most common reason for preference being the added utilization of yohimbine, growth hormone, and clenbuterol (their combination with fasted exercise is thought to enhance fat loss). A systematic review reported that fasted cardiovascular exercise is not more effective than fed cardiovascular exercise [13 ]. Notably, none of the studies included in the systematic review recruited competitive bodybuilders as subjects, nor did they look at subjects utilizing fasted cardiovascular exercise in tandem with these specific PEDs for an additional fat-burning effect. A review article by Escalante et al. sug- gests that physique athletes may perform fasted cardio at varying intensities, but it is not suggested for longer than 60 min to prevent fat-free mass losses [14]. Future research in this population is needed in which fasted cardiovascular exercise is paired with fat-burning compounds to determine if this pairing is (1) safe and (2) efficacious for fat loss outcomes. Participant coaches notably did not prefer HIIT cardiovascular exercise over LISS or MISS cardiovascular exercise for any of the populations. This recommendation is in line with previous research, as a systematic review and meta-analysis reported similarly effective fat-burning effects between HIIT and MISS [15 ]. Furthermore, authors of a narrative review suggested that HIIT cardiovascular exercise should not be used too frequently due to the increased recovery demands during natural bodybuilding contest preparation [16]. Further research in both enhanced and natural populations is warranted on this topic. Participant coaches recommended that female athletes perform more cardiovascular exercise during contest preparation, up to 740 min (12+ h) per week, and male bodybuilding athletes up to 480 min (8 h) per week. Given the potential of high volumes of resistance training to induce additional fatigue while dieting, authors of some reviews recommend the lowest amount of cardiovascular exercise needed to achieve the desired result to mitigate any negative impact of cardiovascular training [16 , 17]. The range of cardiovascular exercise frequencies and durations for athletes is notably very wide, and this is likely due to the individuality of every athlete’s energy expenditure, current body composition, genetics, timeline to achieve stage-leanness, required leanness for their respective division, and indi- vidual preference. Neither coaches nor researchers may be able to provide generalizations about the amount of cardiovascular exercise that will be required to obtain the desired leanness for specific divisions due to the individuality of each athlete.]
Your response should be based only on the text provided. No external resources or prior knowledge may be used to answer questions. Format your response using markdown where appropriate, and use numbered lists to structure your response.
What is known about gun ownership rule changes and their impact on suicide rates, according to Every-Palmer et al (2021)?
Restriction of other means of suicide Ease of access to certain means and substances used as methods of suicide are commonly associated with increased rates of suicides, and present key opportunities for prevention. These include restriction of gun ownership, pesticides, carbon monoxide gas, paracetamol, opioids, alcohol, and the modification of specific settings to reduce ease of hanging, and modifications to road networks outlined below. Gun ownership is associated with increased rates of suicide overall, as well as death by suicide using a firearm (Jin, Khazem, & Anestis, 2016; Mann & Michel, 2016) and non- suicide related firearm mortality among children (Zeoli et al., 2019). Like other approaches to means restriction, reducing suicide deaths by firearms requires multiple strategies including the use of locked gun cabinets, storing guns unloaded, separate storage of guns and ammunition and outside of the USA, a focus on more stringent licencing. Changes to licencing in New Zealand after the 1990 Aramoana tragedy reduced firearm suicides, particularly among young people (Beautrais, Fergusson, & Horwood, 2006; Mann & Michel, 2016). Most firearms deaths in New Zealand occurring among older men, who have lower than average rates of GP contacts and antidepressant prescriptions in the year prior to their death (see the Suicide Mortality Review Committee report here for more detail). The impact of more recent firearms amendments following the 2019 Christchurch tragedy (Every- Palmer, Cunningham, Jenkins, & Bell, 2021) is not yet clear, but needs to be evaluated from a suicide prevention perspective. Lethal means counselling usually focuses on firearms or medication advice and on parents taking care of a suicidal young person. Studies to date have focused on those presenting to Emergency Departments (ED’s) and have identified clinician hesitancy, perceived lack of skill and clinician sceptism about effectiveness as barriers to routine delivery of this approach to suicide prevention (Hunter et al., 2021). Ingestion of pesticides is a method of suicide associated with a number of agricultural communities and in low and low middle income countries (LMIC) particularly in the Western Pacific region (Mew et al., 2017). Consideration of pesticide ingestion as a method of suicide is becoming more relevant to prevention in New Zealand as we become more diverse as a nation. The evidence to date suggests that national bans, rather than safe storage (Reifels et al., 2019) or sales restrictions (Gunnell et al., 2017) of the most highly hazardous pesticides (HHP) is the most effective method of reducing deaths both by suicide and overall, without impacting agricultural outputs (Bonvoisin, Utyasheva, Knipe, Gunnell, & Eddleston, 2020; Gunnell et al., 2017; Mew et al., 2017). Means restriction to carbon monoxide gas has been the focus of a number of studies in the UK following changes in supply source for domestic gas (Sarchiapone, Mandelli, Iosue, Andrisano, & Roy, 2011). In New Zealand there has been a positive impact of regulations for catalytic convertors in motor vehicles (Suicide Mortality Review Committee, 2016), against a backdrop of reduced deaths (intentional and unintentional) due to carbon monoxide poisoning in Australasia (Long, Sun, Zhao, Liu, & Peng, 2021). Deaths by this method may further decline as the proportion of petrol vehicles in the fleet decreases over time. Paracetamol is a cheap, widely available compound which is commonly used in intentional self-poisoning and is associated with morbidity and mortality. Paracetamol controls, reducing both the number of tablets available in a package, and number of packs that can be purchased at once have been effective in reducing deaths associated with this method in the UK (Hawton et al., 2013) and Ireland. However, both countries report ongoing issues with paracetamol overdoses and researchers recommend further reductions in availability such as making this a pharmacy only medication (Casey et al., 2020; Daly et al., 2021). Paracetamol control in Scotland had some initial success following the introduction of pack size controls, but then returned to previous levels (Gorman, Bain, Inglis, Murphy, & Bateman, 2007). A number of Australian states have moved to implement paracetamol control based on the international evidence (Lim, Buckley, Chitty, Moles, & Cairns, 2021). In addition to paracetamol, interventions to reduce access to salicylates, dextropropoxyphene, barbiturates, and caffeine tablets have also been found to effective across a number of countries (Lim et al., 2021). Hanging has an extremely high case fatality rate and is the most common method of suicide among every population group in Aotearoa New Zealand, which makes this an important aspect of prevention to consider. In general population settings reducing access to ligatures and ligature points is not entirely feasible. However there is still scope for a reduction in deaths by this method in institutional settings such as hospitals, prisons and police custody using design for safety principles, ensuring adequate staffing and service user visibility (Jin et al., 2016; Sakinofsky, 2014). Internationally, certain common ligature points have been targeted for re-design to ensure they collapse under weight. There may be scope for this in New Zealand also, given that most deaths by hanging occur in the home. In addition, reducing unsafe reporting or social media content about this method is an important approach to reducing cognitive valence of this method (Cai, Junus, Chang, & Yip, 2022). Alcohol consumption is associated with elevated risk of suicide, at both an individual and population level. Both acute intoxication and alcohol misuse are potential targets for intervention given their association with low mood, loss of behaviour regulation and hopelessness (Norstrom & Rossow, 2016). Reducing access to alcohol, and increasing price are feasible and effective strategies for reducing alcohol related harm generally, and for reducing suicide in particular (Altavini et al., 2022), particularly among men and younger people (Kolves et al., 2020). Reducing access has been shown to be effective in Europe and North America, including with indigenous populations (Leske et al., 2020). The clinical treatment literature relating to alcohol is addressed in a later section. In terms of roading, New Zealand has a large road network, and each year there are transport- related suicides in which the deceased may be a driver or pedestrian. International evidence suggests that a proportion of transport accidents are suicides and suicide should be considered particularly in single vehicle accidents, for men 25 to 35 years and where the person has a prior experience of suicide attempt (Okolie et al., 2020a). There has been relatively little work in this area in New Zealand (Fortune, McDonald, Chafer, Lilley, & Mulder, 2022) and a recent review was unable to identify any intervention studies (Okolie et al., 2020a). There has been extensive coverage in both the mainstream media and academic publications on the impact on opioid prescribing on opioid related deaths, particularly in the USA. Opioids are of interest to suicide prevention practitioners in New Zealand. First, we already have intentional self-poisoning deaths due to opioid compounds particularly among older men (Fortune et al., 2022). Secondly, there is a known overlap between accidental and intentional self-poisoning deaths internationally, and thirdly, there has been recent media coverage suggesting that compounds such as fentanyl are being distributed in the community (see here for more details). A full consideration of this topic is beyond the scope of this review; however, it is likely a strong prescription drug monitoring system (in terms of dose, duration and frequency), patient and clinician education, (Ansari, Tote, Rosenberg, & Martin, 2020) (e.g., Beaudoin, Banerjee, & Mello, 2016) in addition to harm reduction measures such as the availability of naloxone is likely to be needed. The evidence for the latter is; however, mixed (e.g., (Ansari et al., 2020)).
Your response should be based only on the text provided. No external resources or prior knowledge may be used to answer questions. Format your response using markdown where appropriate, and use numbered lists to structure your response. What is known about gun ownership rule changes and their impact on suicide rates, according to Every-Palmer et al (2021)? Restriction of other means of suicide Ease of access to certain means and substances used as methods of suicide are commonly associated with increased rates of suicides, and present key opportunities for prevention. These include restriction of gun ownership, pesticides, carbon monoxide gas, paracetamol, opioids, alcohol, and the modification of specific settings to reduce ease of hanging, and modifications to road networks outlined below. Gun ownership is associated with increased rates of suicide overall, as well as death by suicide using a firearm (Jin, Khazem, & Anestis, 2016; Mann & Michel, 2016) and non- suicide related firearm mortality among children (Zeoli et al., 2019). Like other approaches to means restriction, reducing suicide deaths by firearms requires multiple strategies including the use of locked gun cabinets, storing guns unloaded, separate storage of guns and ammunition and outside of the USA, a focus on more stringent licencing. Changes to licencing in New Zealand after the 1990 Aramoana tragedy reduced firearm suicides, particularly among young people (Beautrais, Fergusson, & Horwood, 2006; Mann & Michel, 2016). Most firearms deaths in New Zealand occurring among older men, who have lower than average rates of GP contacts and antidepressant prescriptions in the year prior to their death (see the Suicide Mortality Review Committee report here for more detail). The impact of more recent firearms amendments following the 2019 Christchurch tragedy (Every- Palmer, Cunningham, Jenkins, & Bell, 2021) is not yet clear, but needs to be evaluated from a suicide prevention perspective. Lethal means counselling usually focuses on firearms or medication advice and on parents taking care of a suicidal young person. Studies to date have focused on those presenting to Emergency Departments (ED’s) and have identified clinician hesitancy, perceived lack of skill and clinician sceptism about effectiveness as barriers to routine delivery of this approach to suicide prevention (Hunter et al., 2021). Ingestion of pesticides is a method of suicide associated with a number of agricultural communities and in low and low middle income countries (LMIC) particularly in the Western Pacific region (Mew et al., 2017). Consideration of pesticide ingestion as a method of suicide is becoming more relevant to prevention in New Zealand as we become more diverse as a nation. The evidence to date suggests that national bans, rather than safe storage (Reifels et al., 2019) or sales restrictions (Gunnell et al., 2017) of the most highly hazardous pesticides (HHP) is the most effective method of reducing deaths both by suicide and overall, without impacting agricultural outputs (Bonvoisin, Utyasheva, Knipe, Gunnell, & Eddleston, 2020; Gunnell et al., 2017; Mew et al., 2017). Means restriction to carbon monoxide gas has been the focus of a number of studies in the UK following changes in supply source for domestic gas (Sarchiapone, Mandelli, Iosue, Andrisano, & Roy, 2011). In New Zealand there has been a positive impact of regulations for catalytic convertors in motor vehicles (Suicide Mortality Review Committee, 2016), against a backdrop of reduced deaths (intentional and unintentional) due to carbon monoxide poisoning in Australasia (Long, Sun, Zhao, Liu, & Peng, 2021). Deaths by this method may further decline as the proportion of petrol vehicles in the fleet decreases over time. Paracetamol is a cheap, widely available compound which is commonly used in intentional self-poisoning and is associated with morbidity and mortality. Paracetamol controls, reducing both the number of tablets available in a package, and number of packs that can be purchased at once have been effective in reducing deaths associated with this method in the UK (Hawton et al., 2013) and Ireland. However, both countries report ongoing issues with paracetamol overdoses and researchers recommend further reductions in availability such as making this a pharmacy only medication (Casey et al., 2020; Daly et al., 2021). Paracetamol control in Scotland had some initial success following the introduction of pack size controls, but then returned to previous levels (Gorman, Bain, Inglis, Murphy, & Bateman, 2007). A number of Australian states have moved to implement paracetamol control based on the international evidence (Lim, Buckley, Chitty, Moles, & Cairns, 2021). In addition to paracetamol, interventions to reduce access to salicylates, dextropropoxyphene, barbiturates, and caffeine tablets have also been found to effective across a number of countries (Lim et al., 2021). Hanging has an extremely high case fatality rate and is the most common method of suicide among every population group in Aotearoa New Zealand, which makes this an important aspect of prevention to consider. In general population settings reducing access to ligatures and ligature points is not entirely feasible. However there is still scope for a reduction in deaths by this method in institutional settings such as hospitals, prisons and police custody using design for safety principles, ensuring adequate staffing and service user visibility (Jin et al., 2016; Sakinofsky, 2014). Internationally, certain common ligature points have been targeted for re-design to ensure they collapse under weight. There may be scope for this in New Zealand also, given that most deaths by hanging occur in the home. In addition, reducing unsafe reporting or social media content about this method is an important approach to reducing cognitive valence of this method (Cai, Junus, Chang, & Yip, 2022). Alcohol consumption is associated with elevated risk of suicide, at both an individual and population level. Both acute intoxication and alcohol misuse are potential targets for intervention given their association with low mood, loss of behaviour regulation and hopelessness (Norstrom & Rossow, 2016). Reducing access to alcohol, and increasing price are feasible and effective strategies for reducing alcohol related harm generally, and for reducing suicide in particular (Altavini et al., 2022), particularly among men and younger people (Kolves et al., 2020). Reducing access has been shown to be effective in Europe and North America, including with indigenous populations (Leske et al., 2020). The clinical treatment literature relating to alcohol is addressed in a later section. In terms of roading, New Zealand has a large road network, and each year there are transport- related suicides in which the deceased may be a driver or pedestrian. International evidence suggests that a proportion of transport accidents are suicides and suicide should be considered particularly in single vehicle accidents, for men 25 to 35 years and where the person has a prior experience of suicide attempt (Okolie et al., 2020a). There has been relatively little work in this area in New Zealand (Fortune, McDonald, Chafer, Lilley, & Mulder, 2022) and a recent review was unable to identify any intervention studies (Okolie et al., 2020a). There has been extensive coverage in both the mainstream media and academic publications on the impact on opioid prescribing on opioid related deaths, particularly in the USA. Opioids are of interest to suicide prevention practitioners in New Zealand. First, we already have intentional self-poisoning deaths due to opioid compounds particularly among older men (Fortune et al., 2022). Secondly, there is a known overlap between accidental and intentional self-poisoning deaths internationally, and thirdly, there has been recent media coverage suggesting that compounds such as fentanyl are being distributed in the community (see here for more details). A full consideration of this topic is beyond the scope of this review; however, it is likely a strong prescription drug monitoring system (in terms of dose, duration and frequency), patient and clinician education, (Ansari, Tote, Rosenberg, & Martin, 2020) (e.g., Beaudoin, Banerjee, & Mello, 2016) in addition to harm reduction measures such as the availability of naloxone is likely to be needed. The evidence for the latter is; however, mixed (e.g., (Ansari et al., 2020)).
[question] [user request] ===================== [text] [context document] ===================== [instruction] Answer the question using only the information provided in the context. Do not rely on external knowledge or sources.
There's this case i can't find anything about, Schembri, but it's in this attached text. Can you summarize the facts and law of the case? Also, don't bother referencing legislative sections, as I'm not a specialist and won't look at the EI Act ever.
. Molchan v. Canada (Attorney General) [49] The issue in Schembri was whether the Commission was bound to take into account the claimant’s financial circumstances when determining the penalty to impose. The claimant in that case had failed to report his earnings and collected unemployment benefits for several months. The Commission had calculated that the claimant had received a benefit overpayment of $4,130, which it sought to recover. It had also assessed a penalty under section 38 of the EIA, because the claimant had received unemployment benefits by knowingly misreporting his income contrary to paragraph 38(1)(c) of the EIA. In determining the amount of penalty payable, the Commission considered the claimant’s gambling addiction and his efforts to deal with it, and reduced the penalty by 25% to $3,097. The Board of Referees later exonerated the claimant from any penalty. The Umpire then found that the Commission had erred when it failed to undertake, on its own initiative, an inquiry into the claimant’s financial circumstances and whether it would cause the claimant undue hardship to pay the proposed penalty. The Umpire reduced the penalty imposed by the Commission from 75% to 10% of the amount of the overpayment. [50] On judicial review, this Court held that the Commission was not required to initiate its own inquiries into a person’s financial circumstances before it imposed a penalty, noting that claimants have ample opportunities to request a reduction of the penalty on the ground of financial hardship at various stages of the process: before the penalty is imposed, on request for reconsideration and on appeal to the Board of Referees (Schembri at para. 14). Since the claimant had not raised the issue with the Commission and the Board of Referees, this Court decided that the Umpire should have held that the Board had no basis to interfere with the penalty. [51] In my view, this Court’s findings in Schembri do not extend to the reconsideration of a claimant’s entitlement to benefits. The overpayment in Schembri was not in dispute, only the amount of penalty the claimant would have to pay. Subsection 38(1) of the EIA specifies the acts or omissions for which a claimant may be subject to a penalty and subsection 38(2) sets the maximum penalties the Commission may impose. Under section 41 of the EIA, the Commission may rescind the imposition of a penalty or reduce it, on the presentation of new facts or on being satisfied that the penalty was imposed without knowledge of, or on the basis of a mistake as to, some material fact. Furthermore the Commission may issue, under section 41.1, a warning instead of setting the amount of a penalty for an act or omission under subsections 38(2) and 39(2) of the EIA. The Commission thus enjoys a wide discretion in assessing the amount of penalty and may consider financial hardship to the claimant as a mitigating factor. [52] This is consistent with the Commission’s policy regarding penalties, which mentions financial hardship as a possible mitigating circumstance when determining penalties (Digest of Benefit Entitlement Principles, section 18.5.2.2). It appears from the record that the Commission did not apply a penalty in Ms. Molchan’s case despite her false statements (Applicant’s record at 130, 173, 178). ..... [55] In my view, the Appeal Division’s comments regarding Ms. Molchan’s ability to seek a write-off of her debt are consistent with the legislation, which sets out a specific procedure, a write-off, for undue hardship cases. Subparagraph 56(1)(f)(ii) of the Employment Insurance Regulations explicitly provides the Commission with the authority to write off an amount payable under section 43 of the EIA if repayment of the amount due would result in undue hardship to the claimant. [56] That said, I am nonetheless of the view that the Appeal Division was clearly cognizant of and empathetic to the financial hardship to Ms. Molchan in having to repay her debt. Like the General Division, the Appeal Division implored the Commission and the Canada Revenue Agency to consider any request by Ms. Molchan to write off her debt, given the circumstances in which the overpayment arose. The Appeal Division even went as far as providing in a footnote the telephone number where she could call to seek relief.
[question] There's this case i can't find anything about, Schembri, but it's in this attached text. Can you summarize the facts and law of the case? Also, don't bother referencing legislative sections, as I'm not a specialist and won't look at the EI Act ever. ===================== [text] . Molchan v. Canada (Attorney General) [49] The issue in Schembri was whether the Commission was bound to take into account the claimant’s financial circumstances when determining the penalty to impose. The claimant in that case had failed to report his earnings and collected unemployment benefits for several months. The Commission had calculated that the claimant had received a benefit overpayment of $4,130, which it sought to recover. It had also assessed a penalty under section 38 of the EIA, because the claimant had received unemployment benefits by knowingly misreporting his income contrary to paragraph 38(1)(c) of the EIA. In determining the amount of penalty payable, the Commission considered the claimant’s gambling addiction and his efforts to deal with it, and reduced the penalty by 25% to $3,097. The Board of Referees later exonerated the claimant from any penalty. The Umpire then found that the Commission had erred when it failed to undertake, on its own initiative, an inquiry into the claimant’s financial circumstances and whether it would cause the claimant undue hardship to pay the proposed penalty. The Umpire reduced the penalty imposed by the Commission from 75% to 10% of the amount of the overpayment. [50] On judicial review, this Court held that the Commission was not required to initiate its own inquiries into a person’s financial circumstances before it imposed a penalty, noting that claimants have ample opportunities to request a reduction of the penalty on the ground of financial hardship at various stages of the process: before the penalty is imposed, on request for reconsideration and on appeal to the Board of Referees (Schembri at para. 14). Since the claimant had not raised the issue with the Commission and the Board of Referees, this Court decided that the Umpire should have held that the Board had no basis to interfere with the penalty. [51] In my view, this Court’s findings in Schembri do not extend to the reconsideration of a claimant’s entitlement to benefits. The overpayment in Schembri was not in dispute, only the amount of penalty the claimant would have to pay. Subsection 38(1) of the EIA specifies the acts or omissions for which a claimant may be subject to a penalty and subsection 38(2) sets the maximum penalties the Commission may impose. Under section 41 of the EIA, the Commission may rescind the imposition of a penalty or reduce it, on the presentation of new facts or on being satisfied that the penalty was imposed without knowledge of, or on the basis of a mistake as to, some material fact. Furthermore the Commission may issue, under section 41.1, a warning instead of setting the amount of a penalty for an act or omission under subsections 38(2) and 39(2) of the EIA. The Commission thus enjoys a wide discretion in assessing the amount of penalty and may consider financial hardship to the claimant as a mitigating factor. [52] This is consistent with the Commission’s policy regarding penalties, which mentions financial hardship as a possible mitigating circumstance when determining penalties (Digest of Benefit Entitlement Principles, section 18.5.2.2). It appears from the record that the Commission did not apply a penalty in Ms. Molchan’s case despite her false statements (Applicant’s record at 130, 173, 178). ..... [55] In my view, the Appeal Division’s comments regarding Ms. Molchan’s ability to seek a write-off of her debt are consistent with the legislation, which sets out a specific procedure, a write-off, for undue hardship cases. Subparagraph 56(1)(f)(ii) of the Employment Insurance Regulations explicitly provides the Commission with the authority to write off an amount payable under section 43 of the EIA if repayment of the amount due would result in undue hardship to the claimant. [56] That said, I am nonetheless of the view that the Appeal Division was clearly cognizant of and empathetic to the financial hardship to Ms. Molchan in having to repay her debt. Like the General Division, the Appeal Division implored the Commission and the Canada Revenue Agency to consider any request by Ms. Molchan to write off her debt, given the circumstances in which the overpayment arose. The Appeal Division even went as far as providing in a footnote the telephone number where she could call to seek relief. http://isthatlegal.ca/index.php?name=EI.penalties ===================== [instruction] Answer the question using only the information provided in the context. Do not rely on external knowledge or sources.
Answer the question based solely on the information provided in the passage. Do not use any external knowledge or resources. [user request] [context document]
I have the ps5 already and really like it. I recently heard the ps5 pro was revealed but people hate! What is the main reason the ps5 pro has garnered such negative attention? My boyfriend wants to get an xbox and I'm more of a PC person. What would be the point of getting the new console if I already have the first one?Give me more than 400 words.
PS5 Pro Reveal Breaks Unfortunate Record for Sony 4 By Raul Landaverde Published 2 days ago Thread 3 Follow Share Link copied to clipboard PlayStation 5 Pro Related Spider-Man and Aloy with PS5 Pro All Games Confirmed to Be Getting PS5 Pro Upgrades ps5 pro pre-order exclusive to playstation direct PS5 Pro Pre-Orders Come With a Catch ps5 pro inflation comparison PS5 Pro Price Compared to Past PlayStation Consoles When Adjusted for Inflation Sign in to your Game Rant account PS5 Pro reveal breaks a record for Sony Key Takeaways The PS5 Pro reveals video received over 141,000 dislikes in a single day, an unfortunate new record for Sony. The PS5 Pro has been met with outrage over its pricing, especially in the US, UK, and EU. Despite skepticism, analysts expect the PS5 Pro to sell better than expected once it launches in November. The PlayStation 5 Pro reveal set an unfortunate new record for Sony as the most disliked console reveal in the company's history on YouTube. As made clear on social media, many gamers are frustrated about the price of the PS5 Pro, which can exceed over $800 in certain cases. The PS5 Pro releases on November 7 as a disc-less console that offers a 45% boost in rendering power over the base PS5. The lead architect for the PS5, Mark Cerny, stated that the console is capable of running games at 60 frames per second with the visual fidelity that players can expect from a Graphics Mode, without needing to toggle a Performance Mode. This is thanks to the PS5 Pro's upgraded GPU, which features 67% more compute units compared to the PS5's GPU. The console's advanced ray tracing capabilities can double and triple the speeds of the current PS5, and the new AI-driven upscaling feature, PlayStation Spectral Super Resolution, ensures that performance and visual clarity is maintained with ray tracing effects. However, the steep $699.99 price point and lack of an included vertical stand or disc drive are making the PS5 Pro a hard sell for many gamers, and they've made their disappointment known on the YouTube video for the PS5 Pro reveal. Spider-Man and Aloy with PS5 Pro Related All Games Confirmed to Be Getting PS5 Pro Upgrades Sony has already confirmed over a dozen games that will be receiving the PS5 Pro enhancement treatment, and there are still dozens more to come. The PS5 Pro technical presentation is Sony's most disliked console reveal on YouTube with well over 141,000 dislikes in just a day, according to Push Square. There are over 93,000 likes on the PS5 Pro reveal video, which highlights a clear split in the gaming community's sentiment toward the new console. When compared to the 69,000 dislikes accrued over the four years following the original PS5 console's reveal, the PS5 Pro received more than doubled the amount of dislikes in record time. PS5 Pro is the Most Disliked Console in Sony's History on YouTube The PS5 Pro reveal video received over 141,000 dislikes in a day. The backlash is especially prevalent in the video's comments, with many fans being outraged at the pricing of the PS5 Pro in the US, UK, and EU especially. For example, YouTube users in the EU are confused and angered by Sony's decision to price the PS5 Pro at €799.99 (roughly $881), which is $180 more than US gamers would need to pay for the console at $699.99 (roughly €635). Analysts believe the PS5 Pro will sell better than expected, despite skepticism from tens of thousands of gamers online. The PS5 Pro was always meant to be a niche product by Sony that caters to PlayStation enthusiasts, but it's clear that many gamers believe the console's performance and visual upgrades are not enough to warrant the $699.99 price. The lack of new game announcements that highlight the PS5 Pro's improvements did not help, either.
Answer the question based solely on the information provided in the passage. Do not use any external knowledge or resources. I have the ps5 already and really like it. I recently heard the ps5 pro was revealed but people hate! What is the main reason the ps5 pro has garnered such negative attention? My boyfriend wants to get an xbox and I'm more of a PC person. What would be the point of getting the new console if I already have the first one?Give me more than 400 words. PS5 Pro Reveal Breaks Unfortunate Record for Sony 4 By Raul Landaverde Published 2 days ago Thread 3 Follow Share Link copied to clipboard PlayStation 5 Pro Related Spider-Man and Aloy with PS5 Pro All Games Confirmed to Be Getting PS5 Pro Upgrades ps5 pro pre-order exclusive to playstation direct PS5 Pro Pre-Orders Come With a Catch ps5 pro inflation comparison PS5 Pro Price Compared to Past PlayStation Consoles When Adjusted for Inflation Sign in to your Game Rant account PS5 Pro reveal breaks a record for Sony Key Takeaways The PS5 Pro reveals video received over 141,000 dislikes in a single day, an unfortunate new record for Sony. The PS5 Pro has been met with outrage over its pricing, especially in the US, UK, and EU. Despite skepticism, analysts expect the PS5 Pro to sell better than expected once it launches in November. The PlayStation 5 Pro reveal set an unfortunate new record for Sony as the most disliked console reveal in the company's history on YouTube. As made clear on social media, many gamers are frustrated about the price of the PS5 Pro, which can exceed over $800 in certain cases. The PS5 Pro releases on November 7 as a disc-less console that offers a 45% boost in rendering power over the base PS5. The lead architect for the PS5, Mark Cerny, stated that the console is capable of running games at 60 frames per second with the visual fidelity that players can expect from a Graphics Mode, without needing to toggle a Performance Mode. This is thanks to the PS5 Pro's upgraded GPU, which features 67% more compute units compared to the PS5's GPU. The console's advanced ray tracing capabilities can double and triple the speeds of the current PS5, and the new AI-driven upscaling feature, PlayStation Spectral Super Resolution, ensures that performance and visual clarity is maintained with ray tracing effects. However, the steep $699.99 price point and lack of an included vertical stand or disc drive are making the PS5 Pro a hard sell for many gamers, and they've made their disappointment known on the YouTube video for the PS5 Pro reveal. Spider-Man and Aloy with PS5 Pro Related All Games Confirmed to Be Getting PS5 Pro Upgrades Sony has already confirmed over a dozen games that will be receiving the PS5 Pro enhancement treatment, and there are still dozens more to come. The PS5 Pro technical presentation is Sony's most disliked console reveal on YouTube with well over 141,000 dislikes in just a day, according to Push Square. There are over 93,000 likes on the PS5 Pro reveal video, which highlights a clear split in the gaming community's sentiment toward the new console. When compared to the 69,000 dislikes accrued over the four years following the original PS5 console's reveal, the PS5 Pro received more than doubled the amount of dislikes in record time. PS5 Pro is the Most Disliked Console in Sony's History on YouTube The PS5 Pro reveal video received over 141,000 dislikes in a day. The backlash is especially prevalent in the video's comments, with many fans being outraged at the pricing of the PS5 Pro in the US, UK, and EU especially. For example, YouTube users in the EU are confused and angered by Sony's decision to price the PS5 Pro at €799.99 (roughly $881), which is $180 more than US gamers would need to pay for the console at $699.99 (roughly €635). Analysts believe the PS5 Pro will sell better than expected, despite skepticism from tens of thousands of gamers online. The PS5 Pro was always meant to be a niche product by Sony that caters to PlayStation enthusiasts, but it's clear that many gamers believe the console's performance and visual upgrades are not enough to warrant the $699.99 price. The lack of new game announcements that highlight the PS5 Pro's improvements did not help, either. https://gamerant.com/ps5-pro-reveal-most-disliked-record/
You are required to use only information provided in the prompt.
Explain the responsibilities of each department during Mr. Taylor's disability claim. Use a separate paragraph for each department.
Procedural History In 2007, Mr. Taylor filed a claim for service-connected disability benefits with VA. A VA medical examiner diagnosed Mr. Taylor with post-traumatic stress disorder (PTSD) resulting from his time at Edgewood, which was reaggravated during his time serving in Vietnam. Mr. Taylor was ultimately granted a total disability rating with an effective date of February 28, 2007, the day VA received his claim. VA relied on 38 U.S.C. § 5110 (implemented under 38 C.F.R. § 3.400) to establish this effective date. The provision specifies that, absent certain exceptions, the effective date for veterans benefits “shall not be earlier than the date of receipt of application therefor.” Mr. Taylor appealed the VA determination to the Board of Veterans’ Appeals (BVA) seeking an effective date of September 7, 1971, the day he was discharged from service. Mr. Taylor alleged that, since the secrecy oath prevented him from filing a claim, the effective date that he would have received in the absence of the oath should apply. The BVA, in July 2010, held that 38 U.S.C. § 5110 prevented the effective date for Mr. Taylor’s benefits from being any earlier than the day he filed his claim. The BVA stated that “there was nothing stopping [Mr. Taylor] from filing the claim . . . earlier and [VA] asking for a delay in the adjudication of the case following the obtaining of important evidence.” Mr. Taylor then appealed to the U.S. Court of Appeals for Veterans Claims (CAVC). In June 2013, the CAVC, in a single-judge decision, held that the BVA “failed to provide an adequate statement of reasons or bases for its . . . decision.” Specifically, the CAVC sought the language of the original secrecy oath. The CAVC vacated the BVA’s decision and remanded the case. The BVA, in February 2014, remanded the case to VA to ascertain the secrecy oath’s language and reassess the case. On remand, after VA procured a secrecy oath that most participants in the Edgewood program signed, VA and the BVA again concluded that Mr. Taylor was entitled to VA benefits starting February 28, 2007, the day VA received his claim, not September 7, 1971, the day he was discharged. The BVA made its determination in April 2017 and provided three reasons for its holding: (1) Mr. Taylor could have filed a disability claim earlier than 2007 premised on his experiences serving in Vietnam, which were partially responsible for his PTSD; (2) Mr. Taylor could have divulged his participation in the Edgewood program because he had done so on a previous occasion in pursuit of care, though the health care provider at that time did not believe him; and (3) Section 5110 delineates when VA benefits can begin and does not provide for equitable tolling (that is, exceptions to delineated time requirements to promote fairness). Mr. Taylor appealed to the CAVC for a second time. In April 2019, in a 2-1 decision, a panel of CAVC judges affirmed the BVA’s determination that Mr. Taylor was only entitled to VA disability benefits beginning February 28, 2007. The CAVC detailed three components of its analysis. First, Mr. Taylor was not entitled to relief under the Constitution’s Fifth Amendment Due Process Clause because he did not have a property interest in his VA benefits prior to February 28, 2007. Relying on Federal Circuit precedent, the CAVC held that individuals only gain a constitutionally cognizable property interest in VA benefits upon filing claims for such benefits. Second, the court determined that it lacked authority to provide Mr. Taylor with equitable relief by ordering VA to establish a process through which he and similarly situated veterans could establish effective dates for VA Congressional Research Service 3 benefits preceding their claim-filing dates. Third, the CAVC held that 38 U.S.C. § 5110 required the effective date for Mr. Taylor’s VA benefits to be February 28, 2007, the date he filed his claim. Mr. Taylor appealed the CAVC’s decision to the Federal Circuit. A three-judge Federal Circuit panel issued its opinion in June 2021, ruling in favor of Mr. Taylor. The court held the following: (1) “the Veterans Court may exercise such equitable powers, within the scope of its statutory jurisdiction, to ensure that all veterans entitled to benefits receive them” (that is, the CAVC had equitable powers beyond those specifically delineated by Congress); (2) the effective date requirement under 38 U.S.C. § 5110(a)(1) is not jurisdictional and can therefore be subject to equitable considerations and relief; (3) where “the Government has affirmatively and intentionally prevented” veterans from seeking medical care and VA benefits to which they are entitled under threat of criminal prosecution, the CAVC “is within its authority to hold the Government equitably estopped from asserting that those veterans are not entitled to an earlier effective date”; and (4) the government is equitably estopped from asserting 38 U.S.C. § 5110(a)(1) against Mr. Taylor because the government’s actions caused Mr. Taylor to file his benefits claim when he did. The Federal Circuit reversed the CAVC’s decision and remanded the case. In July 2021, however, the Federal Circuit voted to hear this case en banc. The full court heard oral argument on February 10, 2022, but weeks later, the U.S. Supreme Court granted review of Arellano v. McDonough, a case concerning whether 38 U.S.C. § 5110(b)(1), an exception to subsection (a)(1)’s requirements, is subject to equitable tolling. Section 5110(b)(1) mandates that “[t]he effective date of an award of disability compensation to a veteran shall be the day following the date of the veteran’s discharge or release if application therefor is received within one year from such date.” The Federal Circuit stayed all proceedings in Taylor until the Supreme Court decided Arellano. In January 2023, the Supreme Court held, in relevant part, that subsection (b)(1) is not subject to equitable tolling because “[t]he structure of §5110 reinforces Congress’s choice to set effective dates solely as prescribed in the text,” and because subsection (a)(1) provides “an instruction to attend to specifically enacted language to the exclusion of general, unenacted carveouts.” Following the Arellano decision, the Federal Circuit requested supplemental briefing by the parties in light of the Supreme Court’s holding. Taylor v. McDonough In June 2023, the full Federal Circuit decided in favor of Mr. Taylor. After finding equitable estoppel unavailable under Section 5110(a)(1) in light of Supreme Court precedent, the court held that the government violated Mr. Taylor’s constitutional right to due process under the Fifth Amendment. The court concluded that Mr. Taylor had “a constitutional right of access to adjudicatory forums” to vindicate his legal entitlements, and that the VA adjudicatory system and VA benefits are such a forum and entitlement, respectively. The Federal Circuit further held that the government unconstitutionally denied Mr. Taylor “access to the adjudication system of VA, the exclusive forum for securing his legal entitlement to the benefits at issue,” through the secrecy oath and threat of criminal prosecution for violating it. Thus, the court ruled that the relevant statutory limits on effective dates were “unconstitutional as applied” in Mr. Taylor’s case. The Federal Circuit determined that Mr. Taylor was entitled to “the effective date he would have had if no unconstitutional denial of access had occurred,” which could be September 7, 1971, the date Mr. Taylor was discharged, pending VA assessment of this issue on remand in accordance with the court’s decision. The Federal Circuit summarized its holding’s implications in the following terms: [W]hen a veteran has been determined to be entitled to benefits for one or more disabilities connected to participation in the Edgewood program at issue, the required effective date of such benefits is the date that the veteran would have had in the absence of the challenged government Congressional Research Service 4 conduct—imposition of the secrecy oath with no VA route for claim presentation and proof to vindicate the benefits entitlement. The court reversed the CAVC’s decision and remanded the case. The government has not sought Supreme Court review as of this writing, though it still has time to do so—petitions must be filed within 90 days of judgment.
Explain the responsibilities of each department during Mr. Taylor's disability claim. Use a separate paragraph for each department. Procedural History In 2007, Mr. Taylor filed a claim for service-connected disability benefits with VA. A VA medical examiner diagnosed Mr. Taylor with post-traumatic stress disorder (PTSD) resulting from his time at Edgewood, which was reaggravated during his time serving in Vietnam. Mr. Taylor was ultimately granted a total disability rating with an effective date of February 28, 2007, the day VA received his claim. VA relied on 38 U.S.C. § 5110 (implemented under 38 C.F.R. § 3.400) to establish this effective date. The provision specifies that, absent certain exceptions, the effective date for veterans benefits “shall not be earlier than the date of receipt of application therefor.” Mr. Taylor appealed the VA determination to the Board of Veterans’ Appeals (BVA) seeking an effective date of September 7, 1971, the day he was discharged from service. Mr. Taylor alleged that, since the secrecy oath prevented him from filing a claim, the effective date that he would have received in the absence of the oath should apply. The BVA, in July 2010, held that 38 U.S.C. § 5110 prevented the effective date for Mr. Taylor’s benefits from being any earlier than the day he filed his claim. The BVA stated that “there was nothing stopping [Mr. Taylor] from filing the claim . . . earlier and [VA] asking for a delay in the adjudication of the case following the obtaining of important evidence.” Mr. Taylor then appealed to the U.S. Court of Appeals for Veterans Claims (CAVC). In June 2013, the CAVC, in a single-judge decision, held that the BVA “failed to provide an adequate statement of reasons or bases for its . . . decision.” Specifically, the CAVC sought the language of the original secrecy oath. The CAVC vacated the BVA’s decision and remanded the case. The BVA, in February 2014, remanded the case to VA to ascertain the secrecy oath’s language and reassess the case. On remand, after VA procured a secrecy oath that most participants in the Edgewood program signed, VA and the BVA again concluded that Mr. Taylor was entitled to VA benefits starting February 28, 2007, the day VA received his claim, not September 7, 1971, the day he was discharged. The BVA made its determination in April 2017 and provided three reasons for its holding: (1) Mr. Taylor could have filed a disability claim earlier than 2007 premised on his experiences serving in Vietnam, which were partially responsible for his PTSD; (2) Mr. Taylor could have divulged his participation in the Edgewood program because he had done so on a previous occasion in pursuit of care, though the health care provider at that time did not believe him; and (3) Section 5110 delineates when VA benefits can begin and does not provide for equitable tolling (that is, exceptions to delineated time requirements to promote fairness). Mr. Taylor appealed to the CAVC for a second time. In April 2019, in a 2-1 decision, a panel of CAVC judges affirmed the BVA’s determination that Mr. Taylor was only entitled to VA disability benefits beginning February 28, 2007. The CAVC detailed three components of its analysis. First, Mr. Taylor was not entitled to relief under the Constitution’s Fifth Amendment Due Process Clause because he did not have a property interest in his VA benefits prior to February 28, 2007. Relying on Federal Circuit precedent, the CAVC held that individuals only gain a constitutionally cognizable property interest in VA benefits upon filing claims for such benefits. Second, the court determined that it lacked authority to provide Mr. Taylor with equitable relief by ordering VA to establish a process through which he and similarly situated veterans could establish effective dates for VA Congressional Research Service 3 benefits preceding their claim-filing dates. Third, the CAVC held that 38 U.S.C. § 5110 required the effective date for Mr. Taylor’s VA benefits to be February 28, 2007, the date he filed his claim. Mr. Taylor appealed the CAVC’s decision to the Federal Circuit. A three-judge Federal Circuit panel issued its opinion in June 2021, ruling in favor of Mr. Taylor. The court held the following: (1) “the Veterans Court may exercise such equitable powers, within the scope of its statutory jurisdiction, to ensure that all veterans entitled to benefits receive them” (that is, the CAVC had equitable powers beyond those specifically delineated by Congress); (2) the effective date requirement under 38 U.S.C. § 5110(a)(1) is not jurisdictional and can therefore be subject to equitable considerations and relief; (3) where “the Government has affirmatively and intentionally prevented” veterans from seeking medical care and VA benefits to which they are entitled under threat of criminal prosecution, the CAVC “is within its authority to hold the Government equitably estopped from asserting that those veterans are not entitled to an earlier effective date”; and (4) the government is equitably estopped from asserting 38 U.S.C. § 5110(a)(1) against Mr. Taylor because the government’s actions caused Mr. Taylor to file his benefits claim when he did. The Federal Circuit reversed the CAVC’s decision and remanded the case. In July 2021, however, the Federal Circuit voted to hear this case en banc. The full court heard oral argument on February 10, 2022, but weeks later, the U.S. Supreme Court granted review of Arellano v. McDonough, a case concerning whether 38 U.S.C. § 5110(b)(1), an exception to subsection (a)(1)’s requirements, is subject to equitable tolling. Section 5110(b)(1) mandates that “[t]he effective date of an award of disability compensation to a veteran shall be the day following the date of the veteran’s discharge or release if application therefor is received within one year from such date.” The Federal Circuit stayed all proceedings in Taylor until the Supreme Court decided Arellano. In January 2023, the Supreme Court held, in relevant part, that subsection (b)(1) is not subject to equitable tolling because “[t]he structure of §5110 reinforces Congress’s choice to set effective dates solely as prescribed in the text,” and because subsection (a)(1) provides “an instruction to attend to specifically enacted language to the exclusion of general, unenacted carveouts.” Following the Arellano decision, the Federal Circuit requested supplemental briefing by the parties in light of the Supreme Court’s holding. Taylor v. McDonough In June 2023, the full Federal Circuit decided in favor of Mr. Taylor. After finding equitable estoppel unavailable under Section 5110(a)(1) in light of Supreme Court precedent, the court held that the government violated Mr. Taylor’s constitutional right to due process under the Fifth Amendment. The court concluded that Mr. Taylor had “a constitutional right of access to adjudicatory forums” to vindicate his legal entitlements, and that the VA adjudicatory system and VA benefits are such a forum and entitlement, respectively. The Federal Circuit further held that the government unconstitutionally denied Mr. Taylor “access to the adjudication system of VA, the exclusive forum for securing his legal entitlement to the benefits at issue,” through the secrecy oath and threat of criminal prosecution for violating it. Thus, the court ruled that the relevant statutory limits on effective dates were “unconstitutional as applied” in Mr. Taylor’s case. The Federal Circuit determined that Mr. Taylor was entitled to “the effective date he would have had if no unconstitutional denial of access had occurred,” which could be September 7, 1971, the date Mr. Taylor was discharged, pending VA assessment of this issue on remand in accordance with the court’s decision. The Federal Circuit summarized its holding’s implications in the following terms: [W]hen a veteran has been determined to be entitled to benefits for one or more disabilities connected to participation in the Edgewood program at issue, the required effective date of such benefits is the date that the veteran would have had in the absence of the challenged government Congressional Research Service 4 conduct—imposition of the secrecy oath with no VA route for claim presentation and proof to vindicate the benefits entitlement. The court reversed the CAVC’s decision and remanded the case. The government has not sought Supreme Court review as of this writing, though it still has time to do so—petitions must be filed within 90 days of judgment. You are required to use only information provided in the prompt.
<TASK DESCRIPTION> Only use the provided text to answer the question, no outside sources. <QUESTION> [user request] <TEXT> [context document]
I'm considering a VBAC with my current pregnancy. My doctor has cautiously told me that it's an option. Can you tell me the benefits of this? I would also like to know the risks involved and the success rate. What are the criteria to work towards making this a successful option?
What is a VBAC in pregnancy? A vaginal birth after cesarean or VBAC is when you give birth through your vagina after previously having a C-section (cesarean section) delivery. A C-section involves your pregnancy care provider making a surgical cut (incision) through your belly and uterus to deliver your baby. The goal of a VBAC is to give a person who had a C-section the chance to have a vaginal delivery for their next pregnancy. It can sometimes be unsafe to have a vaginal delivery after having one or more C-section deliveries. The decision on whether to attempt a VBAC involves considering factors like: The type of incision your surgeon used for your C-section(s) and if you have had more than one C-section. Your health history. If you have any medical conditions. The position of the fetus and if the fetus has any known medical conditions. Your pregnancy care provider will tell you if they believe a VBAC is safe to try. They can discuss potential risks and benefits with you. Then, you can choose if you’d like to pursue a VBAC or have another C-section based on your discussions. Studies show that up to 75% of people who had one C-section went on to have a successful vaginal birth in their next pregnancy. But your chance of having a successful VBAC drops to about 50% if you’ve had two or more prior C-section deliveries. Healthcare providers sometimes refer to a VBAC as a trial of labor after cesarean (TOLAC). A TOLAC is an attempt to have a VBAC. If a TOLAC is successful, the result is a VBAC. If it’s not successful, the result is another C-section delivery. Why do people prefer a VBAC instead of another C-section? It’s mostly a personal preference. Some people prefer a vaginal delivery, but for some reason, they haven’t been able to have one. Or a person might prefer a vaginal delivery because recovering from a C-section typically takes longer. Even if you want a vaginal delivery, your healthcare provider may recommend another C-section due to the risks of a VBAC. Or they may tell you it’s OK to try for a VBAC. The benefits of VBAC compared to a C-section include: Faster recovery and shorter hospital stay. No abdominal surgery. Avoiding or lowering C-section risks like heavy bleeding and infection. Vaginal birth helps clear amniotic fluid from your baby’s lungs as it passes through the birth canal. This better prepares your baby to breathe oxygen after birth. Your baby gets an immune system boost as it travels through the birth canal during a vaginal delivery. Less risk of complications from repeat surgeries like scarring or injuries to nearby organs. Personal preference. Some people want the experience of a vaginal birth. What are the risks of a VBAC? Because a C-section leaves a scar on your uterus, the pressure of labor could cause your uterus to open (rupture) along your C-section scar. But recent studies show it’s possible to have a safe VBAC after having a C-section in most cases. Although rare, a uterine rupture is a serious complication that can have life-threatening results. If you’re at a high risk for uterine rupture, your healthcare provider will typically not attempt a VBAC. Other risks of attempting a VBAC are: Blood loss. Infection. Emergency C-section (which is riskier than a planned C-section). What’s the risk of a uterine rupture if you’ve had a previous C-section? The risk of uterine rupture if you’ve had a C-section with a transverse cut (sideways across the lower part of the uterus) is about 0.9% or slightly less than 1 in 100. Does the type of incision I got from my last C-section matter if I want a VBAC? Yes. There are different types of C-section incisions: A low transverse incision has the lowest risk of uterine rupture. This horizontal cut is made across the lower, thinner part of your uterus. A low vertical incision (up and down cut) has a higher risk of rupture than a low transverse incision. This vertical cut is made in the lower, thinner part of your uterus. A high vertical incision (“classical” incision) in the upper part of your uterus has the highest risk of uterine rupture. Surgeons may need to use this type of incision for a premature baby or one that’s in a difficult position to deliver. The location and direction of the outer incision on your belly doesn’t mean that the incision in your uterus is in the same location or the same direction. For example, it may appear that the scar on your belly is transverse, yet the scar on your uterus is vertical. The information about the location and direction of the incision on your uterus should be in your medical records. When you talk about how safe VBAC is with your provider, make sure they look at your medical records and the reasons for any C-sections you’ve had. Is a VBAC safer than a repeat C-section? Talk with your healthcare provider about your health history, current pregnancy and why you had a C-section in your last pregnancy. Your chances of having a successful VBAC may be higher if you: Have had previous C-section deliveries (one or two) with low transverse incisions. Have had a vaginal birth before. Haven’t had any other uterine surgeries (such as fibroid removal, also called myomectomy). Have no history of uterine rupture. Don’t have a medical condition (like fibroids or problems with the location of your placenta) that makes a vaginal delivery risky. Go into labor on your own before your due date. If you’ve already had a successful VBAC — without complications such as ruptured uterus — you’re more likely to have successful future vaginal deliveries. Your chances of having a successful VBAC may be lower if you: Had a prior C-section due to labor not progressing. This means you didn’t dilate (cervix opens) or efface (cervix shortens) during a vaginal delivery. Are older than 35. Have obesity or overweight. Are giving birth to a large fetus or expecting multiples. Are past your due date. Had a baby within the last 18 months (short time between pregnancies). Have preeclampsia. (Healthcare providers may prefer a C-section delivery.) What are the risks of multiple C-sections? There isn’t a set number of C-sections you can have. But some evidence shows that people who have many C-sections are at a higher risk for: Heavy bleeding. Bladder and bowel injury. Infection. Placental conditions like placenta previa or placenta accreta in a future pregnancy where the placenta is abnormally attached. Uterine rupture. Adhesions (scarring). These risks vary and depend mostly on your health history and the specific circumstances of each pregnancy and delivery. Your healthcare provider is the best person to talk to about the risks and benefits of a repeat C-section versus a VBAC. Topics to discuss with your pregnancy care provider include: Past pregnancies and deliveries. Reason(s) you had a C-section. Safety of VBAC and a repeat C-section for you and your baby. Reasons you should or shouldn’t consider VBAC. Reasons you should or shouldn’t consider repeat C-section. A plan for inducing labor (or not). If the healthcare facility can manage emergency deliveries. Your plan for more children. Just because you had a C-section delivery in the past, doesn’t mean you can’t have a VBAC in the future. You may have heard or read that the scars from a C-section may rupture in a future pregnancy. But every situation is unique. Discuss your wishes and concerns with your pregnancy care provider early in your pregnancy. They can discuss the risks and benefits with you and help you decide if a VBAC is safe. As your pregnancy progresses, make sure you and your provider discuss and review your delivery plan at your prenatal visits.
<TASK DESCRIPTION> Only use the provided text to answer the question, no outside sources. <QUESTION> I'm considering a VBAC with my current pregnancy. My doctor has cautiously told me that it's an option. Can you tell me the benefits of this? I would also like to know the risks involved and the success rate. What are the criteria to work towards making this a successful option? <TEXT> What is a VBAC in pregnancy? A vaginal birth after cesarean or VBAC is when you give birth through your vagina after previously having a C-section (cesarean section) delivery. A C-section involves your pregnancy care provider making a surgical cut (incision) through your belly and uterus to deliver your baby. The goal of a VBAC is to give a person who had a C-section the chance to have a vaginal delivery for their next pregnancy. It can sometimes be unsafe to have a vaginal delivery after having one or more C-section deliveries. The decision on whether to attempt a VBAC involves considering factors like: The type of incision your surgeon used for your C-section(s) and if you have had more than one C-section. Your health history. If you have any medical conditions. The position of the fetus and if the fetus has any known medical conditions. Your pregnancy care provider will tell you if they believe a VBAC is safe to try. They can discuss potential risks and benefits with you. Then, you can choose if you’d like to pursue a VBAC or have another C-section based on your discussions. Studies show that up to 75% of people who had one C-section went on to have a successful vaginal birth in their next pregnancy. But your chance of having a successful VBAC drops to about 50% if you’ve had two or more prior C-section deliveries. Healthcare providers sometimes refer to a VBAC as a trial of labor after cesarean (TOLAC). A TOLAC is an attempt to have a VBAC. If a TOLAC is successful, the result is a VBAC. If it’s not successful, the result is another C-section delivery. Why do people prefer a VBAC instead of another C-section? It’s mostly a personal preference. Some people prefer a vaginal delivery, but for some reason, they haven’t been able to have one. Or a person might prefer a vaginal delivery because recovering from a C-section typically takes longer. Even if you want a vaginal delivery, your healthcare provider may recommend another C-section due to the risks of a VBAC. Or they may tell you it’s OK to try for a VBAC. The benefits of VBAC compared to a C-section include: Faster recovery and shorter hospital stay. No abdominal surgery. Avoiding or lowering C-section risks like heavy bleeding and infection. Vaginal birth helps clear amniotic fluid from your baby’s lungs as it passes through the birth canal. This better prepares your baby to breathe oxygen after birth. Your baby gets an immune system boost as it travels through the birth canal during a vaginal delivery. Less risk of complications from repeat surgeries like scarring or injuries to nearby organs. Personal preference. Some people want the experience of a vaginal birth. What are the risks of a VBAC? Because a C-section leaves a scar on your uterus, the pressure of labor could cause your uterus to open (rupture) along your C-section scar. But recent studies show it’s possible to have a safe VBAC after having a C-section in most cases. Although rare, a uterine rupture is a serious complication that can have life-threatening results. If you’re at a high risk for uterine rupture, your healthcare provider will typically not attempt a VBAC. Other risks of attempting a VBAC are: Blood loss. Infection. Emergency C-section (which is riskier than a planned C-section). What’s the risk of a uterine rupture if you’ve had a previous C-section? The risk of uterine rupture if you’ve had a C-section with a transverse cut (sideways across the lower part of the uterus) is about 0.9% or slightly less than 1 in 100. Does the type of incision I got from my last C-section matter if I want a VBAC? Yes. There are different types of C-section incisions: A low transverse incision has the lowest risk of uterine rupture. This horizontal cut is made across the lower, thinner part of your uterus. A low vertical incision (up and down cut) has a higher risk of rupture than a low transverse incision. This vertical cut is made in the lower, thinner part of your uterus. A high vertical incision (“classical” incision) in the upper part of your uterus has the highest risk of uterine rupture. Surgeons may need to use this type of incision for a premature baby or one that’s in a difficult position to deliver. The location and direction of the outer incision on your belly doesn’t mean that the incision in your uterus is in the same location or the same direction. For example, it may appear that the scar on your belly is transverse, yet the scar on your uterus is vertical. The information about the location and direction of the incision on your uterus should be in your medical records. When you talk about how safe VBAC is with your provider, make sure they look at your medical records and the reasons for any C-sections you’ve had. Is a VBAC safer than a repeat C-section? Talk with your healthcare provider about your health history, current pregnancy and why you had a C-section in your last pregnancy. Your chances of having a successful VBAC may be higher if you: Have had previous C-section deliveries (one or two) with low transverse incisions. Have had a vaginal birth before. Haven’t had any other uterine surgeries (such as fibroid removal, also called myomectomy). Have no history of uterine rupture. Don’t have a medical condition (like fibroids or problems with the location of your placenta) that makes a vaginal delivery risky. Go into labor on your own before your due date. If you’ve already had a successful VBAC — without complications such as ruptured uterus — you’re more likely to have successful future vaginal deliveries. Your chances of having a successful VBAC may be lower if you: Had a prior C-section due to labor not progressing. This means you didn’t dilate (cervix opens) or efface (cervix shortens) during a vaginal delivery. Are older than 35. Have obesity or overweight. Are giving birth to a large fetus or expecting multiples. Are past your due date. Had a baby within the last 18 months (short time between pregnancies). Have preeclampsia. (Healthcare providers may prefer a C-section delivery.) What are the risks of multiple C-sections? There isn’t a set number of C-sections you can have. But some evidence shows that people who have many C-sections are at a higher risk for: Heavy bleeding. Bladder and bowel injury. Infection. Placental conditions like placenta previa or placenta accreta in a future pregnancy where the placenta is abnormally attached. Uterine rupture. Adhesions (scarring). These risks vary and depend mostly on your health history and the specific circumstances of each pregnancy and delivery. Your healthcare provider is the best person to talk to about the risks and benefits of a repeat C-section versus a VBAC. Topics to discuss with your pregnancy care provider include: Past pregnancies and deliveries. Reason(s) you had a C-section. Safety of VBAC and a repeat C-section for you and your baby. Reasons you should or shouldn’t consider VBAC. Reasons you should or shouldn’t consider repeat C-section. A plan for inducing labor (or not). If the healthcare facility can manage emergency deliveries. Your plan for more children. Just because you had a C-section delivery in the past, doesn’t mean you can’t have a VBAC in the future. You may have heard or read that the scars from a C-section may rupture in a future pregnancy. But every situation is unique. Discuss your wishes and concerns with your pregnancy care provider early in your pregnancy. They can discuss the risks and benefits with you and help you decide if a VBAC is safe. As your pregnancy progresses, make sure you and your provider discuss and review your delivery plan at your prenatal visits. https://my.clevelandclinic.org/health/articles/21687-vaginal-birth-after-cesarean-vbac