The document appears to be a collection of image citations and descriptions related to medical topics. There are over a dozen citations listed with descriptions of images related to medications like Aleve, Aralen, DHEA, Motrin, Plaquenil, Prednisone, and Tylenol. Other images cited relate to anatomy, like the auto nervous system, body parts, and synovial joints. Managerial images are also cited like a photo of a manager with documents.
The document discusses a project at CHOP and includes a 1 minute slideshow. It then provides citations for various images related to medical topics like parts of the body, medications, and healthcare providers. The citations include the image name, source, date accessed, and URL.
This document contains a list of citations for online images used in a work. The citations include the title of each image, its source website, its retrieval date, and its full URL. The images cover topics such as children, cancer prevention, cell division, depression, doctors, and playground activities.
The document discusses a 1 minute slideshow about a project at CHOP. It lists various medical terms and images related to pain treatment and the body that could potentially be included in the slideshow. These include names of medications like Aleve, Motrin, and Prednisone as well as images of parts of the body, prescription pads, and medical managers meeting with doctors.
This document contains citations for 14 online images used in a work. The citations include the title of each image, its source website, the date it was accessed online, and the full URL for the image. The images depict various subjects including children, cancer prevention, cell division, depression, doctors with children, and children playing or running.
This document contains citations for 14 online images used in a work. The citations include the title of each image, its source website, the date it was accessed online, and the full URL for the image. The images depict various subjects including children, cancer prevention, cell division, depression, doctors with children, and children playing or running.
The document appears to be a collection of image citations on medical topics without accompanying text. The citations include images related to:
- Common pain medications like Aleve, Motrin, and Tylenol.
- Medical conditions treated by medications like Aralen for malaria and Plaquenil for arthritis.
- Anatomical diagrams of the nervous system, body parts, and synovial joints.
- Other medical images like prescription pads, doctors meeting with patients, and the reumatrex medication bottle.
The document appears to be a collection of image citations on medical topics without accompanying text. The citations include images related to:
- Common pain medications like Aleve, Motrin, and Tylenol.
- Medical conditions treated by medications like Aralen for malaria and Plaquenil for arthritis.
- Anatomical diagrams of the nervous system, body parts, and synovial joints.
- Other medical images like prescription pads, doctors meeting with patients, and the reumatrex medication bottle.
The document discusses a project at CHOP and includes a 1 minute slideshow. It then provides citations for various images related to medical topics like parts of the body, medications, and healthcare providers. The citations include the image name, source, date accessed, and URL.
This document contains a list of citations for online images used in a work. The citations include the title of each image, its source website, its retrieval date, and its full URL. The images cover topics such as children, cancer prevention, cell division, depression, doctors, and playground activities.
The document discusses a 1 minute slideshow about a project at CHOP. It lists various medical terms and images related to pain treatment and the body that could potentially be included in the slideshow. These include names of medications like Aleve, Motrin, and Prednisone as well as images of parts of the body, prescription pads, and medical managers meeting with doctors.
This document contains citations for 14 online images used in a work. The citations include the title of each image, its source website, the date it was accessed online, and the full URL for the image. The images depict various subjects including children, cancer prevention, cell division, depression, doctors with children, and children playing or running.
This document contains citations for 14 online images used in a work. The citations include the title of each image, its source website, the date it was accessed online, and the full URL for the image. The images depict various subjects including children, cancer prevention, cell division, depression, doctors with children, and children playing or running.
The document appears to be a collection of image citations on medical topics without accompanying text. The citations include images related to:
- Common pain medications like Aleve, Motrin, and Tylenol.
- Medical conditions treated by medications like Aralen for malaria and Plaquenil for arthritis.
- Anatomical diagrams of the nervous system, body parts, and synovial joints.
- Other medical images like prescription pads, doctors meeting with patients, and the reumatrex medication bottle.
The document appears to be a collection of image citations on medical topics without accompanying text. The citations include images related to:
- Common pain medications like Aleve, Motrin, and Tylenol.
- Medical conditions treated by medications like Aralen for malaria and Plaquenil for arthritis.
- Anatomical diagrams of the nervous system, body parts, and synovial joints.
- Other medical images like prescription pads, doctors meeting with patients, and the reumatrex medication bottle.
This document contains citations for 14 online images used in a work. The citations include the title of each image, its source website, the date it was accessed online, and the full URL for the image. The images depict various subjects including children, cancer prevention, cell division, depression, doctors with children, and children playing or running.
Als we verder kijken dan het praten over sociale media op sociale media en 1001 weblogs; wat blijft er dan over? Wat zijn de kernwaarden? Wat zijn de negatieve bijwerkingen? En hoe onderscheiden we 'hype' van 'here to stay'?
Instagram Marketing: 'de Kracht van Verbeelding'Joost Geurtsen
'De Kracht van Verbeelding'
Presentatie over Instagram Marketing, op het Congres Facebook Marketing (11 juni 2013).
Video op slide 2: http://www.youtube.com/watch?v=Nn-dD-QKYN4
Seven ways to get rid of empty wallets are:
1. Start saving 10% of income and use 90% on necessary expenses to control finances without changing lifestyle.
2. Control expenses since what is considered necessary will always increase with income unless confronted. Spend every pound the right way.
3. Grow wealth through investments since savings are just the start; wealth comes from continuous income, so hire savings to continuously supply income.
4. Save wealth from wasting by studying safety levels of investments to protect capital and avoid being cheated by promises of fast wealth. Risk of loss is a probability.
5. Own a house.
6. Ensure a pension.
7. Increase
Harry S. Truman was the 33rd president of the United States. He took office in 1945 after Franklin Roosevelt died. As president, Truman faced major decisions including dropping the atomic bombs on Japan to end WWII, starting NATO and the Marshall Plan to rebuild Europe, and fighting communism through policies like the Truman Doctrine. He won an unlikely reelection victory in 1948. During his second term, Truman sent troops to Korea and fired General MacArthur, faced accusations of communism from Senator McCarthy, and oversaw the rebuilding of the White House. After leaving office in 1953, Truman worked to establish his presidential library and later died in 1972.
This document provides information about Seth Bhojraj & Company, an Indian company that exports and imports fresh fruits and vegetables. It has been in business for 58 years and is a prominent exporter supplying premium quality produce worldwide. The company aims to establish itself as the most trusted supplier of fresh fruits and vegetables through high quality products and reasonable prices. It sources fruits from reliable farmers and ensures product freshness and hygiene.
Lady Godiva lived in 11th century England and married the Duke Leofric. She saw that the people of Coventry did not have a good life and decided to help them. She made a deal with her husband that if she rode naked on a horse through town, he would lower taxes for the people. When the people heard of her plan, they stayed inside so as not to see her, and the Duke lowered taxes as promised.
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
This document contains citations for 14 online images used in a work. The citations include the title of each image, its source website, the date it was accessed online, and the full URL for the image. The images depict various subjects including children, cancer prevention, cell division, depression, doctors with children, and children playing or running.
Als we verder kijken dan het praten over sociale media op sociale media en 1001 weblogs; wat blijft er dan over? Wat zijn de kernwaarden? Wat zijn de negatieve bijwerkingen? En hoe onderscheiden we 'hype' van 'here to stay'?
Instagram Marketing: 'de Kracht van Verbeelding'Joost Geurtsen
'De Kracht van Verbeelding'
Presentatie over Instagram Marketing, op het Congres Facebook Marketing (11 juni 2013).
Video op slide 2: http://www.youtube.com/watch?v=Nn-dD-QKYN4
Seven ways to get rid of empty wallets are:
1. Start saving 10% of income and use 90% on necessary expenses to control finances without changing lifestyle.
2. Control expenses since what is considered necessary will always increase with income unless confronted. Spend every pound the right way.
3. Grow wealth through investments since savings are just the start; wealth comes from continuous income, so hire savings to continuously supply income.
4. Save wealth from wasting by studying safety levels of investments to protect capital and avoid being cheated by promises of fast wealth. Risk of loss is a probability.
5. Own a house.
6. Ensure a pension.
7. Increase
Harry S. Truman was the 33rd president of the United States. He took office in 1945 after Franklin Roosevelt died. As president, Truman faced major decisions including dropping the atomic bombs on Japan to end WWII, starting NATO and the Marshall Plan to rebuild Europe, and fighting communism through policies like the Truman Doctrine. He won an unlikely reelection victory in 1948. During his second term, Truman sent troops to Korea and fired General MacArthur, faced accusations of communism from Senator McCarthy, and oversaw the rebuilding of the White House. After leaving office in 1953, Truman worked to establish his presidential library and later died in 1972.
This document provides information about Seth Bhojraj & Company, an Indian company that exports and imports fresh fruits and vegetables. It has been in business for 58 years and is a prominent exporter supplying premium quality produce worldwide. The company aims to establish itself as the most trusted supplier of fresh fruits and vegetables through high quality products and reasonable prices. It sources fruits from reliable farmers and ensures product freshness and hygiene.
Lady Godiva lived in 11th century England and married the Duke Leofric. She saw that the people of Coventry did not have a good life and decided to help them. She made a deal with her husband that if she rode naked on a horse through town, he would lower taxes for the people. When the people heard of her plan, they stayed inside so as not to see her, and the Duke lowered taxes as promised.
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
"Scaling RAG Applications to serve millions of users", Kevin GoedeckeFwdays
How we managed to grow and scale a RAG application from zero to thousands of users in 7 months. Lessons from technical challenges around managing high load for LLMs, RAGs and Vector databases.
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
The Department of Veteran Affairs (VA) invited Taylor Paschal, Knowledge & Information Management Consultant at Enterprise Knowledge, to speak at a Knowledge Management Lunch and Learn hosted on June 12, 2024. All Office of Administration staff were invited to attend and received professional development credit for participating in the voluntary event.
The objectives of the Lunch and Learn presentation were to:
- Review what KM ‘is’ and ‘isn’t’
- Understand the value of KM and the benefits of engaging
- Define and reflect on your “what’s in it for me?”
- Share actionable ways you can participate in Knowledge - - Capture & Transfer
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
First Slide: describe what Lupus is and explain how it is an autoimmune disease that can attack any part of the body…the healthy cells…In lupus, something goes wrong with your immune system, which is the part of the body that fights off viruses, bacteria, and germs ("foreign invaders," like the flu)
I chose this topic because…Discuss what thesis is and then follow with findings.
People with Lupus need many different doctors who work together to treat their illness….most see rheumatologist: joints and muscles, dermatologist: cutaneous lupus for the skin, Nephrologist: kidney problems, Obsterician: Pregnancy…..
Autoimmune means your immune system cannot tell the difference between these foreign invaders and your body’s healthy tissues ("auto" means "self") and creates autoantibodies that attack and destroy healthy tissue. These autoantibodies cause inflammation, pain, and damage in various parts of the body.
Systematic lupus erythematosus: muscuoloskeletal system: kidneys, remove waste from our blood, inflammation of the nervous system and the brain, lasting effects, cause memory problems confusion, headaches and strokes
One of the major symptoms of lupus is PAIN. It can come from any of the diseases that lupus causes. One of the major causes of pain in lupus is patients in inflammation in various parts of the body. This inflammation can come from arthritis
Arthritis is one of the most common secondary diseases that comes along with lupus. It causes inflammation in the joints and bones and causes stiffness. It can affect, but is not limited to, fingers, toes, arms, feet and legs. This can be extremely uncomfortable for patients.
There are many different ways to treat inflammation. There is actually a category of medication called anti-inflammatories. Even though these medications give relief to patients, they can cause some serious side effects. There is more than one category for anti-inflammatories; non-steroidal and steroidal.
A few non-steroidal anti-inflammatories include tylenol, aleve, motrin, advil, and celebraex. Aleve, advil and motrin are over the counter and non-perscription and are also not expensive. But, these come with side affects. Asprin can cause stomach problems, tylenol can affect the liver and all of these can cause stomach irratation and gastrointestinal problems. All of these medications are used to treat other illnesses and were not made specifically to treat lupus.
Steroidal anti-inflammatories are nothing like the steroids that athletes may take for body building or strength. In addition to treating inflammation, it will help regulate blood pressure and the immune system. These are called corticosteroids. They decrease swelling, warmth, tenderness and pain. Different from non-steroidals, the can be taken through cream, IV or be injected directly into the muscle. The most common of these is prednisone This medication is also taken for many other diseases. Common side effects are acne, weight gain, fluid retention, easy bruising and other side affects that can last a lifetime.
Another type of steroid is called DHEA which as been used in recent clinical trials. It was originally a treatment for cancer, but is now being used for lupus patients. It was available over the counter and was once used as an anti-ager, a sexual enhancer and a cancer preventative. It can help women with an estrogen/testosterone imbalance, which is commonly found in lupus. Because lupus affects hormones, it can give the risk of gender based cancers. This medication balances the hormones to prevent that.
Since lupus patients can suffer serious side affects from meds such as anti-inflams, they might need a medication to help them lower the doses. This type of medication is called antimalarials. There are no antimalarials created specificially for the treatment of lupus. They can also descreaseblod clotting and autoantibody production. These drugs take more time to work than anti-inflammatories. Two examples of antimalarials are Plaquenil and Aralen. They do not cause many side affects but in few cases, it causes retina damage.
Some other medications which were originally made for other diseases are immunosupressives. These medications are also used to lower steroid dosage, but they make the immune system very very low. Even the smallest cut can be very serious. Cytonax and Rheumatrex were originally used to fight cancer. Cytonax is used to help with kidneys and lungs and Rheumatrex is used to treat arthritis. Another med is Imuran which also helps lower steroid dosage and control the lungs and kidneys. It was originally made for patients with kidney transplants to help them from rejecting.
Lupus patients suffer from, eye impairment, failure of the organs, and vasculitis, when traditional treatments fail…CHEMO…after chemotherapy, stemcells
After chemotherapy, bone marrow stem cells from own blood, develop into healthy immune cells, cells put back into bone marrow, form functioning imune system, since genes do not predetermine disease, they don’t develop into dangerous autoimmune cells
Wrap up presentation…discuss a little bit about survival…recap