950 resultados para third party liability insurance


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Did rank-and-file members of the German Social Democratic party before 1914 bother to read Marx? A number of studies of borrowing from trade union and other workers' libraries since the 1970s have indicated that workers who read Marx were rare, although this does not mean that workers' reading habits were not influenced by socialist ideas. However, for a broader understanding of the reception of Marx's writings among rank-and-file German socialists, it is necessary to consider not only books, but the pamphlet literature produced by the SPD in huge quantities, serialisations and other treatments in the party press, and oral communication. When the full range of sources is considered, the extent of the reception of Marx's writings, albeit often in very simplified forms, can be more fully appreciated.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The extracellular loop 3 (ECL3) of the mammalian gonadotropin-releasing hormone receptor (GnRH-R) contains an acidic amino acid (Glu(301) in the mouse GnRH-R,) that confers agonist selectivity for Are in mammalian GnRH. It is proposed that a specific conformation of ECL3 is necessary to orientate the carboxyl side chain of the acidic residue for interaction with Arg(8) of GnRH, which is supported by decreased affinity for Arg(8) GnRH but not Gln(8) GnRH when an adjacent Pro is mutated to Ala. To probe the structural contribution of the loop domain to the proposed presentation of the carboxyl side chain, we synthesized a model peptide (CGPEMLNRVSEPGC) representing residues 293-302 of mouse ECL3, where Cys and Gly residues are added symmetrically at the N and C termini, respectively, allowing the introduction of a disulfide bridge to simulate the distances at which the ECL3 is tethered to the transmembrane domains 6 and 7 of the receptor. The ability of the ECL3 peptide to bind GnRH with low affinity was demonstrated by its inhibition of GnRH stimulation of inositol phosphate production in cells expressing the GnRH-R. The CD bands of the ECL3 peptides exhibited a superposition of predominantly unordered structure and partial contributions from beta-sheet structure. Likewise, the analysis of the amide I and amide III bands from micro-Raman and FT Raman experiments revealed mainly unordered conformations of the cyclic and of the linear peptide. NMR data demonstrated the presence of a beta-hairpin among an ensemble of largely disordered structures in the cyclic peptide. The location of the turn linking the two strands of the hairpin was assigned to the three central residues L-296, N-297, and R-298. A small population of structured species among an ensemble of predominantly random coil conformation suggests that the unliganded receptor represents a variety of structural conformers, some of which have the potential to make contacts with the ligand. We propose a mechanism of receptor activation whereby binding of the agonist to the inactive receptor state induces and stabilizes a particular structural state of the loop domain, leading to further conformational rearrangements across the transmembrane domain and signal propagating interaction with G proteins. Interaction of the Glu(301) of the receptor with Arg(8) of GnRH induces a folded configuration of the ligand. Our proposal thus suggests that conformational changes of both ligand and receptor result from this interaction.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Movies, pieces of music, books, or newspapers can all be expressed in the same binary code. Discrete forms of analogue media are just different dialects of the language of computerese. Content is becoming a very liquid asset. To take Marshall McLuhan's famed dictum a step further: The message is now independent of the medium

Relevância:

20.00% 20.00%

Publicador:

Resumo:

By examining Japanese fictional novels, this article will discuss how anaphoric devices (noun phrases (NPs), third person pronouns (TPPs), and zero anaphors) are selected and arranged in a given discourse. The traditional view of anaphora considers the co-referential relationship between anaphoric devices to be syntagmatic; that is, a pronoun, for example, refers back to its antecedent. It also declares the hierarchical order of information values between anaphoric devices; NPs are semantically the most informative, indicating an episode boundary, and pronouns less informative. Furthermore, zero anaphora is the most referentially transparent, showing the most accessibility of a topic. However, real text shows the contrary. NPs occur frequently while there is no apparent discourse boundary, and the same episode is continuous. This is because zero anaphors and TPPs (if they occur) break down readily due to the nature of a forthcoming sentence and the NP is reinstated, in order to continue the same topic in a given discourse. Therefore, the article opposes the traditional view of anaphora. Based on the concept of text processing, using ‘mental representations’, this article will determine certain occurrence patterns of the three anaphoric devices.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Abstract: in Portugal, and in much of the legal systems of Europe, «legal persons» are likely to be criminally responsibilities also for cybercrimes. Like for example the following crimes: «false information»; «damage on other programs or computer data»; «computer-software sabotage»; «illegitimate access»; «unlawful interception» and «illegitimate reproduction of protected program». However, in Portugal, have many exceptions. Exceptions to the «question of criminal liability» of «legal persons». Some «legal persons» can not be blamed for cybercrime. The legislature did not leave! These «legal persons» are v.g. the following («public entities»): legal persons under public law, which include the public business entities; entities utilities, regardless of ownership; or other legal persons exercising public powers. In other words, and again as an example, a Portuguese public university or a private concessionaire of a public service in Portugal, can not commit (in Portugal) any one of cybercrime pointed. Fair? Unfair. All laws should provide that all legal persons can commit cybercrimes. PS: resumo do artigo em inglês.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Abstract: If we think there is a significant number of legal offshore in the globalized world, then there is not even a global consensus about what «corruption» is. The «illegal corruption» in a country may be legal in another. Moreover, the great global corruption is above the law or above democratic States. And not all democratic States are «Rule of Law». Therefore, the solution is global earlier in time and space law, democratic, free and true law. While the human being does not reach a consensus of what «corruption» really is, the discussion will not go further than a caricature. One of the other problems about «corruption» is that it is very difficult to establish the imputation of crimes, including «corruption» (v.g. Portugal) on some «companies», corporations. We have a juridical problem in the composition of the art. 11. of the Portuguese Penal Code.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study aimed to analyze the economic viability of the third milking in production systems using mechanical milking in a closed circuit, aiming to provide technicians and farmers with information to assist them in decision-making. Specifically, it intended: (a) to estimate the cost of one milking; (b) to estimate the cost of the third milking; (c) to develop a mathematical equation to estimate the minimum amount of milk produced with two milkings, from which it would be economically feasible to do the third milking. Data were collected from three dairy farms, from November 2010 to March 2011, keeping a twice-a-day milking frequency, with three data collections in each farm, totalizing nine collections. Considering the average data, it would be feasible to do the third milking if the average milk yield per day of lactating cows in a twice-a-day milking frequency was greater than or equal to 24.43 kg of milk.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

RESUMO: As relações que constituímos com aqueles que de mais perto nos rodeiam são uma das partes, senão a parte mais relevante da nossa vida (Canavarro, 1999). Assim, a teoria da vinculação coloca grande ênfase na natureza da relação de vinculação (Bowlby, 1979). No primeiro capítulo é elucidado o modelo de desenvolvimento da vinculação de Bowlby (1969/1982; 1988) e de Ainsworth e colaboradores (1978). No segundo capítulo são explicadas as mudanças que ocorrem na fase da adolescência. No terceiro capítulo, é destacado o padrão comportamental agressivo do adolescente, o qual se pode traduzir numa vinculação insegura (Almeida, 2000). Estas situações podem levar o sujeito a apresentar comportamentos de desesperança, conceito este que irá ser desenvolvido no quarto capítulo. Sendo o principal objectivo da investigação estudar em que medida a qualidade de vinculação aos pais e a estrutura familiar estão relacionadas com a desesperança e a agressividade nos adolescentes, conclui-se que o adolescente com uma história de vinculação insegura apresenta menos confiança, maior alienação e, consequentemente, maior desamparo e desesperança (Bowlby, 1969/1982, 1973; Bretherton & Waters, 1985). Relativamente à estrutura familiar, o estudo reporta que a coesão e a adaptabilidade estão correlacionadas positivamente com a confiança e negativamente com a alienação. ABSTRACT: The relationships that we form of those who surround us are closer to one party, if not the most important part of our lives (Canavarro, 1999). Thus, attachment theory places great emphasis on the nature of the attachment relationship (Bowlby, 1979). In the first chapter, is elucidated development model of the binding of Bowlby (1969/1982, 1988) and Ainsworth and colleagues (1978). The second chapter explains the changes that occur during adolescence. The third chapter is highlighted the behavioral patterns of aggressive adolescents, which may result in insecure attachment (Almeida, 2000). These situations can cause the subject to present behavior of hopelessness, that this concept will be developed in the fourth chapter. Since the main aim of the research study to what extent the quality of attachment to parents and family structure are related to hopelessness and aggression in teenagers, it is concluded that the adolescent with a history of insecure attachment have less trust, increased alienation and, consequently, greater helplessness and hopelessness (Bowlby, 1969/1982, 1973, Bretherton & Waters, 1985). With regard to family structure, the study reports that the cohesion and adaptability are positively correlated with the confidence and negatively with alienation.