- [[health-and-wellness]] [[long covid]] [[leo-galland]] Establishing a healthy gut brain axis after covid-19
- TLDW Summary (Level 1):
- Roadmap to re-establishing a healthy gut-brain axis
- Step 1: Stop viral proliferation in the gut
- Step 2: Reduce epithelial cell inflammation (in the gut)
- Step 3: Reverse gut bacterial dysbiosis created by Covid-19
- Step 4: Restore transport and metabolism of typtophan
- Reduce Intestinal permeability
- Step 5: Restore mucus layer (in the GI Tract)
- Roadmap to re-establishing a healthy gut-brain axis
- TLDW Summary (Level 1):
- Step 6: Restore tight junction integrity
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<Query Kind="Program"> | |
<Reference><RuntimeDirectory>\Microsoft.CSharp.dll</Reference> | |
<Reference><RuntimeDirectory>\System.Runtime.InteropServices.dll</Reference> | |
<Reference><RuntimeDirectory>\System.Runtime.InteropServices.WindowsRuntime.dll</Reference> | |
<NuGetReference>CodingArchitect.Utilities</NuGetReference> | |
<NuGetReference>Microsoft.Web.Administration</NuGetReference> | |
<NuGetReference>NHibernate</NuGetReference> | |
<NuGetReference>NUnitLite</NuGetReference> | |
<NuGetReference>SqlLocalDb</NuGetReference> | |
<Namespace>CodingArchitect.Utilities.AppDomain</Namespace> |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<Query Kind="Program"> | |
<Reference><RuntimeDirectory>\Microsoft.CSharp.dll</Reference> | |
<Reference><RuntimeDirectory>\System.Runtime.InteropServices.dll</Reference> | |
<Reference><RuntimeDirectory>\System.Runtime.InteropServices.WindowsRuntime.dll</Reference> | |
<Reference><RuntimeDirectory>\System.Runtime.Serialization.dll</Reference> | |
<Reference><RuntimeDirectory>\System.ServiceModel.dll</Reference> | |
<NuGetReference>Microsoft.Web.Administration</NuGetReference> | |
<NuGetReference>NUnitLite</NuGetReference> | |
<NuGetReference>CodingArchitect.Utilities</NuGetReference> | |
<Namespace>Microsoft.CSharp</Namespace> |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<Query Kind="Program"> | |
<Reference><RuntimeDirectory>\Microsoft.CSharp.dll</Reference> | |
<Reference><RuntimeDirectory>\System.Runtime.InteropServices.dll</Reference> | |
<Reference><RuntimeDirectory>\System.Runtime.InteropServices.WindowsRuntime.dll</Reference> | |
<Reference><RuntimeDirectory>\System.Runtime.Serialization.dll</Reference> | |
<Reference><RuntimeDirectory>\System.ServiceModel.dll</Reference> | |
<Reference><RuntimeDirectory>\System.Web.dll</Reference> | |
<NuGetReference>Castle.WcfIntegrationFacility</NuGetReference> | |
<NuGetReference>CodingArchitect.Utilities</NuGetReference> | |
<NuGetReference>Microsoft.Web.Administration</NuGetReference> |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<Query Kind="Program"> | |
<Reference><RuntimeDirectory>\System.ServiceModel.dll</Reference> | |
<Namespace>System.ServiceModel</Namespace> | |
</Query> | |
void Main() | |
{ | |
CallService(); | |
} |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
{ | |
"variables": { | |
"user_ocid":"{{env `user_ocid`}}", | |
"tenancy_ocid": "{{env `tenancy_ocid`}}", | |
"fingerprint":"{{env `fingerprint`}}", | |
"private_key_path":"{{env `private_key_path`}}", | |
"private_key_password":"{{env `TF_VAR_private_key_password`}}", | |
"availability_domain": "uwhB:EU-FRANKFURT-1-AD-1", | |
"region": "eu-frankfurt-1", | |
"base_image_ocid": "ocid1.image.oc1.eu-frankfurt-1.redacted", |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
2021/09/21 07:39:34 [INFO] (telemetry) Starting provisioner powershell | |
==> oracle-oci: Provisioning with Powershell... | |
2021/09/21 07:39:34 packer-provisioner-powershell plugin: Found command: & C:\Windows\Panther\Generalize.cmd | |
2021/09/21 07:39:34 packer-provisioner-powershell plugin: Found command: while($true) { $imageState = Get-ItemProperty HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Setup\State | Select ImageState; if($imageState.ImageState -ne 'IMAGE_STATE_GENERALIZE_RESEAL_TO_OOBE') { Write-Output $imageState.ImageState; Start-Sleep -s 10 } else { break } } | |
==> oracle-oci: Provisioning with powershell script: /tmp/powershell-provisioner557910254 | |
2021/09/21 07:39:34 packer-provisioner-powershell plugin: Opening /tmp/powershell-provisioner557910254 for reading | |
2021/09/21 07:39:34 packer-provisioner-powershell plugin: Uploading env vars to c:/Windows/Temp/packer-ps-env-vars-61498a73-f1d0-2cad-3480-cb143477bb4c.ps1 | |
2021/09/21 07:39:34 packer-provisioner-powershell plugin: [INFO] 76 bytes written for ' |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# set -x | |
# Source: https://docs.aws.amazon.com/general/latest/gr/sigv4-signed-request-examples.html | |
[[ -n "${AWS_ACCESS_KEY_ID}" ]] || { echo "AWS_ACCESS_KEY_ID required" >&2; exit 1; } | |
[[ -n "${AWS_SECRET_ACCESS_KEY}" ]] || { echo "AWS_SECRET_ACCESS_KEY required" >&2; exit 1; } | |
readonly method="GET" | |
readonly service="s3" | |
readonly region="eu-frankfurt-1" |
- Etiopathogenic theories about long COVID, Del Carpio-Orantes L. Etiopathogenic theories about long COVID. World J Virol 2023; 12(3): 204-208 [PMID: 37396704 DOI: 10.5501/wjv.v12.i3.204]
- Theory of viral persistence or viral particles:
- There is evidence that after an acute episode of COVID-19, there is persistence of viral particles in various organs up to one year after the episode and the organs mainly affected are: Brain, Gastrointestinal and Hemolymphatic; Similarly, they have been detected in blood, feces and urine
- Theory of endothelial dysfunction:
- This theory deals with the damage to the vascular endothelium that leads to endothelitis which, in turn, will favor platelet increase and activation, increased risk of thrombus formation with subsequent damage to organs and tissues by a mechanism of tissue ischemia that can affect the main organs and systems of the human body
- **Theory of plat
- Theory of viral persistence or viral particles:
OlderNewer