Search results

From Self-sufficiency
Jump to: navigation, search
  • ...te and accurate summary of the health and medical history of an individual by gathering data from many sources and making this information accessible onl ...” is not new. The earliest mention of the term was in an article indexed by [[PubMed]] dated June 1978;<ref name=FIRST>{{cite journal |author= |title=C
    45 KB (6,263 words) - 21:37, 20 September 2010
  • ...mat that is capable of being shared across different health care settings, by being embedded in network-connected enterprise-wide information systems. Su EHR systems are claimed to help reduce medical errors by providing healthcare workers with decision support.{{Citation needed|date=D
    57 KB (8,295 words) - 21:37, 20 September 2010
  • ...ommunicating part or all of the Electronic Health Record (EHR) of a single subject of care (patient). This is to support the interoperability of systems and c • preserving the original clinical meaning intended by the author;
    6 KB (852 words) - 21:37, 20 September 2010
  • ...Civilisations of the Stone Age"/> Cannabis is also known to have been used by the ancient [[Hindus]] and [[Nihang|Nihang Sikhs]] of [[India]] and [[Nepal ...year=1976| isbn=3-5933-7442-0}} p. 305.</ref> Cannabis was also introduced by the Aryans to the [[Scythia]]ns and [[Thracians]]/[[Dacia]]ns, whose [[sham
    72 KB (10,341 words) - 22:11, 21 September 2010
  • ...adults. Cannabis Social Clubs are [[Non-profit organization|non-commercial organizations]] which organize the professional, collective cultivation of very limited a ...any cannabis purchased, and are required to ensure that it is not consumed by minors. In contrast to the [[Cannabis Buyers Club]] a CSC are not limited
    2 KB (269 words) - 22:11, 21 September 2010
  • ...rthcoming. Decisions to change global drug regulations are usually reached by informal consensus; without such agreement, reform is virtually impossible. ...ed to permit medical use of drugs. However, recreational use is prohibited by Article 4:
    13 KB (1,911 words) - 22:11, 21 September 2010
  • ...eceptor]]. Buprenorphine [[hydrochloride]] was first marketed in the 1980s by Reckitt & Colman (now [[Reckitt Benckiser]]) as an [[analgesic]], available ...macies running out and being unable to order more; this is being rectified by Roxane. [[Teva]] Pharmaceutical Laboratories of [[Tel Aviv]], [[Israel]] ha
    59 KB (8,561 words) - 22:13, 21 September 2010
  • ...tudies itself and to widen debate by Terrorism studies researchers in part by applying insights from [[Critical Theory]] generally and the [[Frankfurt Sc ...the creation of a new journal - Critical Studies in Terrorism - published by Routledge ([[Magnus Ranstorp]] is also on the editorial board).
    5 KB (670 words) - 21:56, 26 September 2010
  • ...inst a constituted authority (for example, an authority recognised as such by the [[United Nations]]) when those taking part in the rebellion are not rec ...with the [[law]] of the land, its use is neutral. However when it is used by a state or another authority under threat, "insurgency" often also carries
    43 KB (6,255 words) - 21:56, 26 September 2010
  • A 2003 study by Jeffrey Record for the [[United States Army|US Army]] quoted a source (Schm ...hist writer [[Johann Most]] helped popularize the modern sense of the word by dispensing "advice for terrorists" in the 1880s.<ref name="Crenshaw44">Cren
    70 KB (10,299 words) - 21:56, 26 September 2010
  • ...desire for social solidarity with other members of their organization than by political platforms or strategic objectives, which are often murky and unde ...e against opponents (such use of force may itself be described as "terror" by opponents of the state).<ref name=tws11janx33225/><ref name=tws11jan757>{{c
    75 KB (10,722 words) - 21:57, 26 September 2010
  • ...to instantly recognize a "thief in law". Most prison inmates are tattooed (by other inmates) to indicate their rank within the criminal world, noteworthy .... Since most 'suki' were tough, life long criminals and assassins hardened by the experience of brutal combat during World War 2, they decided to murder
    21 KB (3,244 words) - 21:58, 26 September 2010
  • |opponents = [[International Security Assistance Force|ISAF]] (led by [[NATO]])<br />[[Participants in Operation Enduring Freedom]] ...from madrasas for Afghan refugees in Pakistan, primarily ones established by the [[Jamiat Ulema-e-Islam]] (JUI).<ref>{{
    104 KB (15,254 words) - 21:58, 26 September 2010
  • ...tion]]. It can refer to the facilities that are controlled by the CIA used by the [[U.S. government]] in its [[War on Terror]] to detain alleged [[unlawf ...t [[George W. Bush]] acknowledged the existence of secret prisons operated by the CIA during a speech on September 6, 2006.<ref>{{cite news|url=http://ww
    80 KB (11,711 words) - 17:28, 27 September 2010
  • ...ommunications of people with known links to al Qaeda and related terrorist organizations." It is critical that Congress determine, as quickly as possible, exactly w ...low the Committee to perform its constitutional oversight is not satisfied by the briefings to the Congressional Intelligence Committees... <br>
    103 KB (16,549 words) - 17:28, 27 September 2010
  • ...ate to another.<ref name=MJC-2006-04-05/> "'''Torture by proxy'''" is used by some critics to describe situations in which the United States has transfer ...sen Dataplan]], Inc. involves five victims of CIA rendition, or “torture by proxy,” as it’s also known.
    124 KB (18,178 words) - 17:29, 27 September 2010
  • |motto = To protect Jews from [[antisemitism]] by whatever means necessary. ...m</ref> in 2001, and as a [[hate group]] involved in "anti-Arab terrorism" by the [[Southern Poverty Law Center]].<ref>http://www.splcenter.org/intel/int
    32 KB (4,835 words) - 17:29, 27 September 2010
  • ...that contains hundreds of billions of records of [[telephone call]]s made by U.S. citizens from the four largest [[telephone company|telephone carriers] Verizon and BellSouth have both claimed they were never contacted by the NSA, nor did they provide any information to the agency,<ref>[http://ww
    37 KB (5,583 words) - 17:30, 27 September 2010
  • An '''electronic surveillance program''' was implemented by the [[National Security Agency]] (NSA) of the United States in the wake of ...this is the original name of the program; the term was first used publicly by President Bush in a speech on January 23, 2006.<ref>[http://mediamatters.or
    30 KB (4,326 words) - 17:31, 27 September 2010
  • ...|date=2005-12-21|accessdate=2006-05-28}}</ref> This action was challenged by a number of groups including the United States Congress as unconstitutional ..., [[text messaging]], and other communication involving any party believed by the NSA to be outside the U.S., even if the other end of the communication
    147 KB (21,761 words) - 17:31, 27 September 2010

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)