An Error Was Encountered

Error Number: 1054

Unknown column 'cache_on' in 'field list'

UPDATE `aff_pdf_cache` SET `cache` = 'a:10:{i:0;O:8:\"stdClass\":13:{s:2:\"id\";s:4:\"4349\";s:6:\"status\";s:8:\"verified\";s:11:\"author_name\";s:6:\"shinta\";s:9:\"author_id\";s:3:\"377\";s:14:\"author_website\";s:0:\"\";s:5:\"title\";s:65:\" Caesarean birth & how to support women pre- and post surgery\";s:11:\"description\";s:2533:\"After episiotomy, caesarean section is the most common operation performed on women – over
\n20% of babies are born in this way in the UK, and in some countries over 40% (e.g. Brazil – up to
\n80% in private hospitals, a large part of Latin America, a great part of the Asian continent,
\nSouthern Italy – (Odent; 5)) (Gordon; 419). If the need becomes apparent during pregnancy (e.g.
\nplacenta praevia), a caesarean may be ‘planned’; if it occurs in labour, it is known as an
\n‘emergency caesarean’ (e.g. foetal distress, abnormal bleeding, high blood pressure, prolapsed
\numbilical cord and lack of oxygen to the baby), usually performed as it is considered essential to
\nthe baby’s safety; and if it is through personal choice it is termed ‘elective.’ Choosing to have a
\ncaesarean (elective) with no medical necessity is a topic of heated debate – some women may
\nchoose this option due to fear of the pain of vaginal birth (perhaps after a previous traumatic
\nexperience), fear of harming their baby or due to doubts over their physical ability, others due to
\nscars from physical abuse. In most cases, the preference is to avoid the operation unless it is
\nnecessary to deliver a baby safely – this is due to higher maternal risks, higher costs and a longer
\nrecovery period. (Gordon; 420)
\nMost midwives and antenatal classes encourage active engagement in maintaining good
\nantenatal health through balanced diet and a modified exercise programme (walking, swimming,
\nyoga) to increase the mother’s chances of a vaginal birth, which is what most desire as it is what
\nthey feel is natural and right. However, many caesareans are necessary and should not always
\nbe avoided – they can be life-saving to mother and baby in some cases. “Caesareans, and more
\nrarely chemical inductions of labour are sometimes necessary to the safety of mother or baby. At
\nthe same time we need to recognise that caesarean surgery significantly increases the risk of
\ndeath of a woman.” (Gaskin; 290)
\nMy interest in how to support women pre- and post- caesarean birth began during the course of
\nmy case studies when one of my clients, Mrs H, presented with placenta praevia – it was her first
\npregnancy, and another, Mrs T, with a breech presentation and a complicated history of labour -
\nher third pregnancy.
\n\";s:5:\"thumb\";s:73:\"images/t/44/caesarean-birth-how-to-support-women-pre-and-post-surgery.jpg\";s:6:\"thumb2\";s:74:\"images/t2/44/caesarean-birth-how-to-support-women-pre-and-post-surgery.jpg\";s:9:\"permalink\";s:57:\"caesarean-birth-how-to-support-women-pre-and-post-surgery\";s:5:\"pages\";s:2:\"17\";s:6:\"rating\";s:7:\"2.33333\";s:5:\"voter\";s:1:\"3\";}i:1;O:8:\"stdClass\":13:{s:2:\"id\";s:6:\"251185\";s:6:\"status\";s:8:\"verified\";s:11:\"author_name\";s:8:\"egestalt\";s:9:\"author_id\";s:5:\"28359\";s:14:\"author_website\";s:23:\"http://www.egestalt.com\";s:5:\"title\";s:69:\"Upcoming Webinar On Build and Streamline Your Security and Compliance\";s:11:\"description\";s:453:\"Delivering security and compliance services can be a time consuming, difficult-to-manage process for MSP´s, MSSP´s and anyone else offering these services. Automation of these processes can speed engagements, simplify management, deliver higher value to end users and allow you to focus on growing your practice. Join eGestalt for a free webinar where we will show you how SecureGRC can help you do this with some of its exciting new features.\";s:5:\"thumb\";s:87:\"images/t/2512/upcoming-webinar-on-build-and-streamline-your-security-and-compliance.jpg\";s:6:\"thumb2\";s:88:\"images/t2/2512/upcoming-webinar-on-build-and-streamline-your-security-and-compliance.jpg\";s:9:\"permalink\";s:69:\"upcoming-webinar-on-build-and-streamline-your-security-and-compliance\";s:5:\"pages\";s:1:\"1\";s:6:\"rating\";s:1:\"0\";s:5:\"voter\";s:1:\"0\";}i:2;O:8:\"stdClass\":13:{s:2:\"id\";s:6:\"297941\";s:6:\"status\";s:8:\"verified\";s:11:\"author_name\";s:13:\"aujasnetworks\";s:9:\"author_id\";s:5:\"77726\";s:14:\"author_website\";s:21:\"http://www.aujas.com/\";s:5:\"title\";s:142:\"Global Information Risk Management (IRM) company Announces Partnership with Exafort to Offer Information Security and Risk Management Services\";s:11:\"description\";s:288:\"The solution and services includes Compliance & Risk Management, Data Protection, Identity Management Solution, Network-Based Security and User Education. This offering will help Cloud services customers protect sensitive data and address concerns of security, compliance and privacy.\";s:5:\"thumb\";s:118:\"images/t/2980/global-information-risk-management-irm-company-announces-partnership-with-exafort-to-offer-informati.jpg\";s:6:\"thumb2\";s:119:\"images/t2/2980/global-information-risk-management-irm-company-announces-partnership-with-exafort-to-offer-informati.jpg\";s:9:\"permalink\";s:100:\"global-information-risk-management-irm-company-announces-partnership-with-exafort-to-offer-informati\";s:5:\"pages\";s:1:\"0\";s:6:\"rating\";s:1:\"0\";s:5:\"voter\";s:1:\"0\";}i:3;O:8:\"stdClass\":13:{s:2:\"id\";s:6:\"586372\";s:6:\"status\";s:8:\"verified\";s:11:\"author_name\";s:19:\"ieeecomputersociety\";s:9:\"author_id\";s:5:\"59084\";s:14:\"author_website\";s:24:\"http://www.computer.org/\";s:5:\"title\";s:68:\"Attend IEEE Symposium on Security and Privacy, May 18-21 in San Jose\";s:11:\"description\";s:193:\"Registration is open for the 35th annual IEEE Symposium on Security and Privacy (May 18-21) and the Security and Privacy Workshops (May 17-18) at the Fairmont San Jose Hotel in San Jose, Calif.\";s:5:\"thumb\";s:85:\"images/t/5864/attend-ieee-symposium-on-security-and-privacy-may-18-21-in-san-jose.jpg\";s:6:\"thumb2\";s:86:\"images/t2/5864/attend-ieee-symposium-on-security-and-privacy-may-18-21-in-san-jose.jpg\";s:9:\"permalink\";s:67:\"attend-ieee-symposium-on-security-and-privacy-may-18-21-in-san-jose\";s:5:\"pages\";s:1:\"1\";s:6:\"rating\";s:1:\"0\";s:5:\"voter\";s:1:\"0\";}i:4;O:8:\"stdClass\":13:{s:2:\"id\";s:6:\"554289\";s:6:\"status\";s:8:\"verified\";s:11:\"author_name\";s:12:\"jamesrichard\";s:9:\"author_id\";s:6:\"601898\";s:14:\"author_website\";s:0:\"\";s:5:\"title\";s:59:\"Security and Privacy in the Cloud - webinar By Melvin Greer\";s:11:\"description\";s:720:\"Overview: Many organizations today are feeling pressure to reduce IT costs and optimize IT operations. Cloud computing is rapidly emerging as a viable means to create dynamic, rapidly provisioned resources for operating platforms, applications, development environments, storage and backup capabilities, and many more IT functions. \n\nA staggering number of security considerations exist that information security professionals need to consider when evaluating the risks of cloud computing. Serious discussion of cloud security starts with a detailed introduction to the various delivery models of cloud computing ranging from Software as a Service (SaaS) to Infrastructure as a Service (IaaS) and everything in between. \";s:5:\"thumb\";s:75:\"images/t/5543/security-and-privacy-in-the-cloud-webinar-by-melvin-greer.jpg\";s:6:\"thumb2\";s:76:\"images/t2/5543/security-and-privacy-in-the-cloud-webinar-by-melvin-greer.jpg\";s:9:\"permalink\";s:57:\"security-and-privacy-in-the-cloud-webinar-by-melvin-greer\";s:5:\"pages\";s:1:\"1\";s:6:\"rating\";s:1:\"0\";s:5:\"voter\";s:1:\"0\";}i:5;O:8:\"stdClass\":13:{s:2:\"id\";s:6:\"574398\";s:6:\"status\";s:8:\"verified\";s:11:\"author_name\";s:12:\"leeshaferrnr\";s:9:\"author_id\";s:6:\"625045\";s:14:\"author_website\";s:0:\"\";s:5:\"title\";s:67:\"Growth of Homeland Security and Emergency Management Market to 2018\";s:11:\"description\";s:723:\"This report presents a complete analysis of the global homeland security market across the next five years. It analyses about the factors driving the market, the challenges faced by the industry and about the factors restraining the growth of the market. It also discusses the key industry trends, market trends and technology trends that is about to influence the global homeland security market. It provides a complete market size of the global homeland security market over the next five years and talks about the market share by different sub-sectors. It provides insight in to regional trends in spending and analysis the market size by region and also provides data on spending patterns by sub-sector for each region.\";s:5:\"thumb\";s:85:\"images/t/5744/growth-of-homeland-security-and-emergency-management-market-to-2018.jpg\";s:6:\"thumb2\";s:86:\"images/t2/5744/growth-of-homeland-security-and-emergency-management-market-to-2018.jpg\";s:9:\"permalink\";s:67:\"growth-of-homeland-security-and-emergency-management-market-to-2018\";s:5:\"pages\";s:1:\"5\";s:6:\"rating\";s:1:\"0\";s:5:\"voter\";s:1:\"0\";}i:6;O:8:\"stdClass\":13:{s:2:\"id\";s:6:\"594367\";s:6:\"status\";s:8:\"verified\";s:11:\"author_name\";s:8:\"piyucool\";s:9:\"author_id\";s:6:\"624847\";s:14:\"author_website\";s:0:\"\";s:5:\"title\";s:88:\" Security and Surveillance Radar Market is expected to reach worth $8.61 Billion by 2020\";s:11:\"description\";s:205:\"[161 Pages Report] Security & Surveillance Radar Market report provide detailed analysis of the market for military and commercial security & categorizes global market by Sub-sectors & Country.\";s:5:\"thumb\";s:104:\"images/t/5944/security-and-surveillance-radar-market-is-expected-to-reach-worth-8-61-billion-by-2020.jpg\";s:6:\"thumb2\";s:105:\"images/t2/5944/security-and-surveillance-radar-market-is-expected-to-reach-worth-8-61-billion-by-2020.jpg\";s:9:\"permalink\";s:86:\"security-and-surveillance-radar-market-is-expected-to-reach-worth-8-61-billion-by-2020\";s:5:\"pages\";s:1:\"2\";s:6:\"rating\";s:1:\"0\";s:5:\"voter\";s:1:\"0\";}i:7;O:8:\"stdClass\":13:{s:2:\"id\";s:6:\"407801\";s:6:\"status\";s:8:\"verified\";s:11:\"author_name\";s:8:\"egestalt\";s:9:\"author_id\";s:5:\"28359\";s:14:\"author_website\";s:23:\"http://www.egestalt.com\";s:5:\"title\";s:133:\"HIPAA/HITECH Compliance: How to effectively manage the security and compliance status for your business associates and subcontractors\";s:11:\"description\";s:238:\"Please join us for an educational webinar on April 2, 2013, 11:00am PST and April 9, 2013, 11:00am PST, exclusively designed to address the HIPAA/HITECH requirements for medical providers and their Business associates and sub-contractors.\";s:5:\"thumb\";s:118:\"images/t/4078/hipaa-hitech-compliance-how-to-effectively-manage-the-security-and-compliance-status-for-your-busine.jpg\";s:6:\"thumb2\";s:119:\"images/t2/4078/hipaa-hitech-compliance-how-to-effectively-manage-the-security-and-compliance-status-for-your-busine.jpg\";s:9:\"permalink\";s:100:\"hipaa-hitech-compliance-how-to-effectively-manage-the-security-and-compliance-status-for-your-busine\";s:5:\"pages\";s:1:\"1\";s:6:\"rating\";s:1:\"0\";s:5:\"voter\";s:1:\"0\";}i:8;O:8:\"stdClass\":13:{s:2:\"id\";s:6:\"576791\";s:6:\"status\";s:8:\"verified\";s:11:\"author_name\";s:19:\"ieeecomputersociety\";s:9:\"author_id\";s:5:\"59084\";s:14:\"author_website\";s:24:\"http://www.computer.org/\";s:5:\"title\";s:70:\"IEEE Security and Privacy Magazine to Host CISO Viewpoint Panel at RSA\";s:11:\"description\";s:253:\"Cigital CTO Dr. Gary McGraw will lead a panel of security industry leaders in a discussion of how established security principles operate in today\'s charged security environment during IEEE Security & Privacy magazine\'s panel at RSA Conference 2014.\";s:5:\"thumb\";s:88:\"images/t/5768/ieee-security-and-privacy-magazine-to-host-ciso-viewpoint-panel-at-rsa.jpg\";s:6:\"thumb2\";s:89:\"images/t2/5768/ieee-security-and-privacy-magazine-to-host-ciso-viewpoint-panel-at-rsa.jpg\";s:9:\"permalink\";s:70:\"ieee-security-and-privacy-magazine-to-host-ciso-viewpoint-panel-at-rsa\";s:5:\"pages\";s:1:\"1\";s:6:\"rating\";s:1:\"0\";s:5:\"voter\";s:1:\"0\";}i:9;O:8:\"stdClass\":13:{s:2:\"id\";s:6:\"251187\";s:6:\"status\";s:8:\"verified\";s:11:\"author_name\";s:8:\"egestalt\";s:9:\"author_id\";s:5:\"28359\";s:14:\"author_website\";s:23:\"http://www.egestalt.com\";s:5:\"title\";s:88:\"Upcoming webinar on Software Automation to Simplify Your Security and Compliance Process\";s:11:\"description\";s:130:\"Join eGestalt for a free webinar where we will show you how SecureGRC can help you do this with some of its exciting new features.\";s:5:\"thumb\";s:106:\"images/t/2512/upcoming-webinar-on-software-automation-to-simplify-your-security-and-compliance-process.jpg\";s:6:\"thumb2\";s:107:\"images/t2/2512/upcoming-webinar-on-software-automation-to-simplify-your-security-and-compliance-process.jpg\";s:9:\"permalink\";s:88:\"upcoming-webinar-on-software-automation-to-simplify-your-security-and-compliance-process\";s:5:\"pages\";s:1:\"1\";s:6:\"rating\";s:1:\"0\";s:5:\"voter\";s:1:\"0\";}}', `cache_on` = '2015-02-28 07:27:43' WHERE `aff_id` = '142108'