text
stringlengths
199
648k
id
stringlengths
47
47
dump
stringclasses
1 value
url
stringlengths
14
419
file_path
stringlengths
139
140
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
50
235k
score
float64
2.52
5.34
int_score
int64
3
5
Switch to browsing by GEM Subject (Fewer and Broader Classifications)Switch to browsing by Key Concept This site is a USGS open file report that includes data in the form of imagery, bathymetry, samples, and geologic interpretive coverages. Sidescan sonar mosaic imagery is featured (.gif). The area mapped extends from... The David Rumsey Map Collection, which is provided by Cartography Associates, "contains to date over 14,000 maps online and focuses on rare 18th and 19th century North and South America cartographic history materials."... A Dynamic Digital Map (DDM) is a stand-alone program that displays and links maps, images, movies, data and text, such as map explanations and field trip guides. DDMs appear as thematic maps containing camera icons and... This collection of images, published by the United States Geological Survey (USGS) Earth Resources Observation and Science (EROS) division, records events of historic significance, beautiful sights or images that stir... Next 5 Resources >>> Manage your resources Save, organize, and share resources that you find. Subscribe to bulletins Automatically be notified about new resources that match your interests. It's easy, fast, and FREE!
<urn:uuid:9490ce13-057d-4ed8-b8c6-ac86acfbca24>
CC-MAIN-2016-26
https://amser.org/b613828/geography_anthropology_recreation--mathematical_geography_cartography
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783391519.2/warc/CC-MAIN-20160624154951-00182-ip-10-164-35-72.ec2.internal.warc.gz
en
0.854723
262
2.65625
3
It would be reasonable to ask why there is so little attention paid to effective nutritional supplements such as fish oil. According to Goodwin’s and Jamison’s “Manic-Depressive Illness: Bipolar Disorders and Recurrent Depression” (2nd ed), 2007, the most authoritative medical text on bipolar: “Because nutritional supplements cannot be patented, there is no large industrial base of support for research on these compounds. . . clinical research thus far, while not definitive, has yielded some encouraging results . . . about the addition of omega-3 fatty acids [fish oil].” Basically any drug getting these sorts of results for bipolar depression would be heavily funded with lots of studies and applications to the FDA. Fortunately however, there are enough responsible clinicians like Goodwin and Jamison that the medical establishment has not completely overlooked healthy alternatives such as fish oil for bipolar disorder, and good research on fish oil bipolar treatment benefits does exist, as described later on below. Fish oil, omega-3s, and essential fatty acids Countries with high fish consumption have lower rates of depression. What are omega-3s and essential fatty acids? What do they have to do with fish oil? Essential fatty acids (EFAs) are fatty acids that cannot be constructed within the human body and therefore must be obtained from the diet. EFAs are significant, and are termed essential, because they are required for our bodies’ biological processes, and not just for fuel. There are are two families of EFAs: omega-3s, and omega-6s. Omega-3 fatty acids are important for cell membrane fluidity and neuronal signal transduction. The most widely available source of omega-3s is cold water oily fish such as wild salmon, herring, mackerel, anchovies and sardines. The EFAs that have been found to be helpful to bipolar people are the omega-3s found in fish oil. Interest in fish oil bipolar treatment benefits was initially sparked by studies that found lower rates of major depression and suicidal thinking in countries where people naturally consumed large amounts of fish oil as part of their regular diets. For example, in 1998 Hibbeln found that greater seafood consumption was related to lower lifetime rates of major depression. Fish consumption at least twice a week indicated a reduced risk for both depressive symptoms and suicidal thinking. In 2001, Tanskanen and colleagues reported lower rates of suicidal ideation amongst frequent eaters of fish in Finland, and a decrease in suicide risk amongst daily eaters of fish in Japan followed over 17 years. Clinicians became interested in conducting research into fish oil bipolar treatment benefits because of these observations that there seemed to be a link between high levels of fish oil consumption and low rates of bipolar and depression. Fish oil for bipolar research There are have been several controlled studies showing fish oil bipolar treatment benefits as an add-on to other medication. This means that it is a very good idea to take fish oil in addition to your regular medication. As yet, there is not enough research to prove fish oil alone can effectively treat either bipolar disorder or unipolar depression. 2. In 2005, Osher and colleagues found that 1.5-2 grams of EPA was associated with 50% or greater improvement in bipolar patients. 3. In 2006, Frangou and colleagues found add-on EPA is an effective and well-tolerated intervention in bipolar depression. There was significantly more improvement in the group treated with fish oil than in the placebo. Interestingly, this study used 2 different does of EPA – 1 grams and 2 grams. The results for the two different doses were the same. (That is, there was no measurable benefit to taking the higher dose.) There is other research that may shed light on some aspects of mania and fish oil benefits. Studies were conducted on prisoners in England where the inmates were fed seafood which contains Omega-3 Fatty acids. The higher consumption of these fatty acids led to a drop in the assault rates. Another Finnish study found that prisoners who were convicted of violence had lower levels of omega–3 fatty acids than prisoners convicted of nonviolent offenses. 4. In 2002, Nemets and colleagues found highly significant benefits of the addition of the omega-3 fatty acid compared with placebo by week 3 of treatment. 5. In 2003, Su and colleagues conducted an 8-week, double-blind, placebo-controlled trial, comparing omega-3s with a placebo, on the top of the usual treatment, in 28 patients with major depressive disorder. Patients in the omega-3 group had a significantly decreased score on the 21-item Hamilton Rating Scale for Depression than those in the placebo group. From the preliminary findings in this study, it seems omega-3s could improve the short-term course of illness and were well tolerated in patients with major depressive disorder. Taking fish oil for bipolar I am lucky – I actually love to eat canned fish such as red salmon and sardines. As I like these enough to eat them every day I could probably consume enough fish oil just from my diet to make an improvement in my mental health. However, I know many people do not share my enthusiasm for tinned sardines! If you do not wish to eat large amounts of fish, then taking fish oil or omega-3 capsules will work just as well. Some people like to use the liquid form and take a mixture of all the omegas as there are said to be health benefits from omega-6 and omega-9 as well. It is possible to buy mint and citrus tasting versions. An interesting feature of the studies outlined above is that many different doses were used – from 1 to 9 grams. Overall, it seems that the lower doses are just as effective. This means you can probably get fish oil bipolar treatment benefits from just 1 gram per day. Side effects of fish oil One risk of fish oil omega-3 supplementation may be heavy metal poisoning if the body accumulates heavy metals such as mercury and lead from poorly refined fish oil supplements. The fish oil industry has successfully improved the quality of fish oils on the market. An independent test in 2006 of 42 fish oils on the US market by www.consumerlab.com found that all of the products exceeded safety standards for potential contaminants. This is good news. It means we can enjoy fish oil bipolar treatment benefits without fear of heavy metal poisoning. However, if heavy metals or other contanimants continue to concern you, seek out a reputable brand that provides some guarantee on purity and some information on their refining process. Try a dose of 1 gram a day. Go up to 2 after a month if you do not feel any benefits. I have personally experienced huge fish oil bipolar treatment benefits. Also, fish oil for bipolar is the subject of many message from my readers, all of which are so far positive!
<urn:uuid:0e095f0c-de92-453f-a3f2-efd0d406d5b3>
CC-MAIN-2016-26
http://www.bipolar-lives.com/fish-oil-bipolar.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396959.83/warc/CC-MAIN-20160624154956-00059-ip-10-164-35-72.ec2.internal.warc.gz
en
0.964459
1,415
2.703125
3
The true masters of the Liaoning skies were pterosaurs, flying reptiles that preyed upon birds, mammals, small dinosaurs, and fish. Museum dioramas often depict them as giants, but some pterosaurs, like this specimen, were no bigger than swallows. A single, very elongated fourth finger formed the leading edge and support for the pterosaur's wing. The skin membrane stretched from wrist to ankle and even between the hind limbs. This fossil reveals an astounding covering of fuzz, suggesting that proto-feathers may have evolved in an animal that was a common ancestor to both pterosaurs and
<urn:uuid:e94e681c-4f62-4079-acff-74ee48221b8c>
CC-MAIN-2016-26
http://www.pbs.org/wgbh/nova/microraptor/foss-11.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395560.14/warc/CC-MAIN-20160624154955-00136-ip-10-164-35-72.ec2.internal.warc.gz
en
0.96325
140
2.9375
3
Print this page. Home / Browse / Dierks (Howard County) Latitude and Longitude: 1.9 square miles (2000 Census) 1,133 (2010 Census) June 4, 1907 Historical Population as per the U.S. Census: The city of Dierks in Howard County rose to prominence due to the thriving timber industry of the early twentieth century. Named for a well-known lumber businessman, the city has maintained its identity with an annual Pine Tree Festival but is also known as a tourist center in the Ouachita Mountains of western Arkansas. The first families to acquire land in the township were Henry Block, John Cesterson, and James Wallen, all of whom arrived in 1848. A few more families gradually bought land in the area, which was then a dense forest of pine, oak, and hickory trees. One wagon trail connected the settlement—which they named Hardscrabble—to the town of Center Point (Howard County), ten miles south. During the Civil War, the citizens of Hardscrabble firmly supported the Confederate cause, and Reconstruction-era tension was high between local families and the Union militia. The Ku Klux Klan was active in the area during that time. Hardscrabble’s first church, Holly Creek Missionary Baptist Church, was formed in 1889. Around 1900, the Dierks Lumber and Coal Company established offices in southwestern Arkansas and began to harvest timber from the area. The DeQueen and Eastern Railroad was established to move workers and supplies into the area and to carry lumber to market. Hardscrabble grew rapidly and changed its name to Dierks, honoring Hans Dierks, the oldest of the four brothers who co-owned the company. The Holman Hotel was built in 1903, and the first school in Dierks was completed in 1906. John William Pate opened a bottling company in Dierks in 1907 that produced fruit-flavored sodas, including strawberry, orange, and lemon. After 1910, the company also bottled Coca-Cola. Many farming families moved into the newly incorporated city as more men took jobs in the timber industry and in related fields. Hardwood was harvested first and was used largely for barrel staves. Around 1917, the hardwood had been exhausted, and interest turned to the softer pine wood. The Dierks company built a large sawmill in the city, and the population continued to grow. The racial composition of the community also began to change. At the time of the 1910 census, Dierks had been home to only one African-American resident, but in 1917, with the new sawmill—and with many men joining the armed forces during World War I—the company created a segregated neighborhood for black workers and their families. The neighborhood included a hotel, two churches, a school, and stores. The Dierks company also operated a large store (which they called the Big Store) for white residents of the area, and private enterprise also flourished in the city. During the 1920s, the company worked with the U.S. Department of Agriculture’s Forest Service to promote the preservation and conservation of forests. The lumber industry continued to operate during the Great Depression, but federal programs also had an impact on Dierks at this time. The Works Projects Administration (WPA) built streets and other structures in Dierks, including an American Legion building. A Civilian Conservation Corps (CCC) camp with 200 workers was established near Dierks in 1933. The CCC camp remained for more than two years, charged with controlling forest fires and preserving forested areas. During World War II, men again left the city to serve in the armed forces, and the sawmill hired twelve women, who called themselves “Victory Volunteers,” although they were paid for their hours of work. They were employed as planers, craters, and shippers. On December 11, 1944, the public school was destroyed by fire, but it was rebuilt quickly and was open for classes by 1947. A tornado struck Dierks on March 21, 1952, destroying many buildings and killing eight people. In August of the same year, the Dierks bank failed, due to a shortage of $160,000 in investor funds. By 1954, the Horatio State Bank was operating in the former building of the Dierks bank. In June 1968, the U.S. Army Corps of Engineers began construction of Dierks Dam on the Saline River, creating Dierks Lake by May 1975. The lake provides flood control for the area as well as recreational opportunities and preservation of fish and wildlife. In 1968, the Weyerhaeuser Corporation bought the property of the Dierks company (then called Dierks Forests Inc.). The Big Store closed in 1970. Schools had been desegregated in 1965, and Weyerhaeuser disassembled the African-American neighborhood to build a new plywood mill. By 1988, there were no African Americans living in Dierks. The city has been hit by two tornadoes in the twenty-first century, one of which destroyed the water treatment plant in 2009. The city of Dierks has seven churches—including an Assembly of God, a Church of Christ, a Methodist church, and four Baptist congregations—and several businesses, including four banks. Jack Clawson Park is an outstanding feature of the community, with ball fields, playground equipment, and party pavilions. The park also hosts the city’s annual Pine Tree Festival, held the first Saturday in August (but with some events held the day before, even when that Friday is July 31). In the 2010 census, the city reported 1,133 residents, including four African Americans and forty-eight Latinos. The Dierks School District, consisting of an elementary school and a high school, serves 550 students as of 2012. For additional information:Dierks, Arkansas. http://www.dierksarkansas.net/ (accessed January 13, 2012). Howard County Heritage Club. Howard County Heritage. Dallas, TX: Taylor Publishing Company, 1988. Kennedy, Steele T. “Dierks: City of Disasters.” Arkansas Democrat Sunday Magazine, May 15, 1955, pp. 1–3. Steven TeskeButler Center for Arkansas Studies Last Updated 9/30/2014 About this Entry: Contact the Encyclopedia / Submit a Comment / Submit a Narrative
<urn:uuid:728670a5-f548-421d-9881-1d1e36480139>
CC-MAIN-2016-26
http://www.encyclopediaofarkansas.net/encyclopedia/entry-detail.aspx?entryID=897
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396872.10/warc/CC-MAIN-20160624154956-00195-ip-10-164-35-72.ec2.internal.warc.gz
en
0.970427
1,348
2.71875
3
Self-styled progressive Catholics have, for over a generation, downplayed the role of charity in social action. They might revere Mother Teresa of Calcutta as a saint, but they dismissed her charitable approach as a superficial, Band-Aid response to poverty. Some even considered her approach dangerous, because she seemed to make more tolerable the oppression of an unjust social structure. In the minds of various Catholic social activists, justice should always trump charity. Pope Benedict XVI disagrees. He uses the strongest teaching instrument of the papacy to affirm the intrinsic salience of the Catholic Church’s charitable work. The pope understands that the secularization of charity in the West has been going on since the 16th century. Charitable acts, like helping widows, orphans, strangers and the sick, became more and more detached from belief in God. Stripped of a transcendent quality, service to others became a secular mantra for good citizenship and humanitarianism. Then, in the course of the 19th and 20th centuries, both secular and Christian charity became overshadowed by calls for social justice and human rights. During this period, Catholic social thought blossomed. An intellectually rich series of encyclicals, starting with Leo XIII’s Rerum Novarum in 1891, addressed a vast range of social problems. More recently, John Paul II wrote a trilogy of dense and sophisticated social encyclicals whose full implications will take years to unravel. But this body of modern Catholic social doctrine says little about charity. Reportedly, Benedict built the second part of his encyclical on an outline prepared under John Paul II. He avoids, however, quoting his predecessor at length. Although he does refer to modern Catholic social teaching—including the fundamental concepts of solidarity, subsidiarity and the common good—he refrains from any extensive citations from papal social encyclicals or from the documents of the Second Vatican Council. The pope prefers to draw upon a much older period, when charity was at the center of Catholic social teaching. Citing Scripture and the practice of the early church, Benedict places charitable service on the same theological plane as celebrating the liturgy and preaching the word of God. In the early church there was no single treatise on the virtue of charity, but charity embodied the Christian way of social action. Of the three core activities of the church, charitable service was the responsibility of the entire early Christian community. Benedict begins Part II of the new encyclical with a lofty quote from Doctor Caritas himself, St. Augustine: “If you see charity, you see the Trinity.” This suggests that charity is a gateway to God in a way that justice can never be. Even as late as St. Thomas Aquinas, the classic tradition was insisting that while justice signals healthy governance, justice alone can never fully bind a society. Only love can fill that role. Justice can overcome conflict, but it cannot bring about the union of hearts and minds in a social group. Benedict seizes on the relationship between church and state to elucidate his understanding of the relationship between justice and charity. The church, he says, should not take on the political battle for a just society. Justice is the work of the state, not the church. The proper work of the church is charity. What does the pope mean here by church? Nowhere in the encyclical does he define the word. As Cardinal Avery Dulles recently pointed out, Joseph Ratzinger the theologian saw the church as the people of God but he did not use that phrase in a sociological sense. Christians constitute a people only insofar as they are united sacramentally by Christ at all levels, from the local parish through to the universal church. The community of Christ is primarily a spiritual construct. Christ makes the church a sacrament and the sacrament makes the church a people. Benedict’s use of the word church in the encyclical should probably be viewed in that light. The pope seeks to right the balance between justice and charity in the mind of that spiritual community. He says that the duty to work for justice is the proper role of lay Catholics, who should take part in public life in their personal capacity as citizens. But building a just world is not the sacramental church’s prime responsibility. It would seem, by implication, that justice should also not be the central mission of a religious order, like the Jesuits. Faced with entrenched structural poverty in the world, the church’s first imperative is not to propose legislation or to change the political or economic system. The pope seems to be guiding it away from a role sometimes played by national conferences of bishops and by bishops themselves: the role of a special-interest lobby within the political system on key social issues. That does not mean that organizations of lay Catholics should cease political activity on issues of justice. But the encyclical does appear to take the sacramental church out of that direct political role. The church works for justice mainly, he says, by forming the consciences of lay people. The role of the church is to help those in civic life see the goals of justice more clearly, unclouded by personal ambition or special interests. He says that faith can purify reason of its blind spots. Instead of promoting Catholic social thought as a political agenda, the church takes on the role of teacher. It presents Catholic social thought as providing useful guidelines. It educates people to respect human dignity and work for the common good. In that way the church can have an indirect but powerful impact on the state. Does this mean that the sacramental church must withdraw from any direct engagement with political authorities? How will it continue to stand in concrete witness for human dignity and human rights? Benedict reminds the state that justice is the “aim of politics” and justice will be the criterion by which the work of the state will be judged. Presumably the church may take an active role in such a judgment, and that may be what he means when he says that the church must “not stand on the sidelines.” Benedict builds upon the complex teaching of John Paul II, who sometimes openly criticized governments for their failures to uphold human rights. Yet John Paul always gave the priority to spiritual, not political, renewal. He preferred to change structures by changing hearts. In his encyclical Sollicitudo Rei Socialis (Nos. 41 and 42) he notes that “the Church does not propose economic or political programs, nor does she show preference for one or another, provided human dignity is respected and the Church can carry out her ministry.” For Benedict an essential component of that ministry is charity. In his Lenten message for 2006, which appeared after publication of the encyclical, he explicitly states that the freedom to preach Christ and the freedom to offer charitable services are the criteria by which Christians should judge what is a just social order. No matter how good a society has become, if it lacks full freedom of religion, then in the Christian view that society lacks justice. The pope’s perspective might raise government eyebrows in such countries as China, Saudia Arabia, Vietnam and North Korea. Pope Benedict echoes the thought of Augustine, in which the two powers, each in its own sphere, are autonomous, distinct and independent. The pope does not confuse the virtuous practice of Christian charity with the secular political responsibility for justice. The church is not interested in becoming a theocracy. The autonomy of the state is not absolute, but the pope does not go as far as Augustine in saying that ultimately the secular power is subject to the spiritual power; nor does he reflect Augustinian pessimism that the secular state can ever realize true justice. Church and state appear linked in a complementary relationship. If charity lies at the root of a just society, then allowing the church its charitable activities becomes an essential component in the politics of building justice. This ancient Christian notion of spiritual autonomy and religious freedom laid the basis for modern notions of personal privacy, liberty and protection from the state. So Benedict may be trying to reconnect contemporary secular political culture with its religious roots. At one point in the document, Benedict takes charity outside of the confines of the nation state. Perhaps thinking of the vast charitable outpouring of help that followed the tsunami in Asia and the hurricanes in the Gulf of Mexico, the pope highlights a positive side of globalization: It facilitates charitable action that goes beyond the domestic self-interest of national societies. He then turns his attention to the global array of social service organizations that try to alleviate suffering. He praises church collaboration with nonchurch organizations. But the pope insists that church charity should not be just another form of social assistance. He says that the work must be grounded in prayer and a living relationship with God. This necessity for prayer has an intriguing pragmatic function in the pope’s eyes. He says that this personal relationship with God will prevent church workers from sinking into proselytism or from falling under the sway of fanatical ideas. While he affirms the need for the church’s charity workers to be professionally competent, he also insists on their spiritual training. Prayer should be fully integrated into their service. This is a tall order for many Catholic social agencies. Employees of the larger Catholic organizations seem indistinguishable from employees of secular organizations. They are evaluated on the basis of their effectiveness and professionalism—not the quality of their faith life. But the pope would seem once again to agree with Mother Teresa, who said, “God does not demand that I be successful. God demands that I be faithful.” He is uncomfortable with Christian social activity that is not rooted in faith. In discussing Catholic social work, the pope highlights a virtue rarely woven into the discourse around social justice—humility. In the face of the world’s enormous problems, Christians must accept their human limitations. They should do what they can and leave the rest to God. This modesty reflects an Augustinian sensitivity. Human attempts to build the kingdom of God on earth are destined for frustration, because this earth will never become our true home. The only organization explicitly named in the encyclical is Cor Unum. Founded by Pope Paul VI in 1971, it is that part of the Holy See charged with charitable relief. Its head, the German Archbishop Paul Josef Cordes, has been concerned about the relationship between Catholic social service organizations and the church. It is no secret that bishops around the world have complained about Catholic organizations initiating projects and contracting with governments without consulting the local bishop. Last year Caritas Internationalis—the coordinating federation of national Catholic charities that includes Catholic Charities USA and Catholic Relief Service—was given a formal juridical status in canon law. Pope Benedict put Caritas Internationalis under the supervision of Cor Unum and Archbishop Cordes. The pope must now approve the president and secretary general of Caritas. So when the encyclical says that Catholic charitable organizations should work closely with bishops, the pope can be seen as reinforcing the role of Cor Unum and pulling the Catholic social agencies closer into the fold of the church. It is too soon to say whether this emphasis on social charity also marks a shift of bureaucratic emphasis in the Roman Curia away from the Pontifical Council on Justice and Peace, with its focus on socioeconomic development and human rights. The encyclical does seem to emphasize active Christian service over the rhetoric of social justice. The pope insists that even if the state effectively tackles the problems of entrenched poverty and social injustice, there will still be a need for the charitable work of the church. Again he appears to follow Blessed Teresa of Calcutta’s perspective that the worst poverty is not to know Christ, and that the way to bring Christ to the poor is through charity. On the other hand, Pope Benedict has a special concern for peace in the world; and the Pontifical Council, under the direction of Cardinal Renato Raffaele Martino, could become the center for that concern. It was the pope’s namesake, Benedict XV, who during World War I brought discussions of peace into modern Catholic social teaching. In the name of peace the new pope brings charity back into the framework of that same teaching. As Cardinal Francis George of Chicago wisely observed, it may be the pope’s desire for peace that drives this elegantly written encyclical. For Benedict, peace begins with charity; and charity—the call to love—brings us back to the essence of Christianity. The encyclical is subtle and exquisitely balanced. But far from being a gentle papal valentine, Deus Caritas Est poses tough challenges to both state and church.
<urn:uuid:8658eb24-3070-464f-adaa-af0c790a4d52>
CC-MAIN-2016-26
http://www.americamagazine.org/issue/564/article/bringing-back-charity
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783403826.29/warc/CC-MAIN-20160624155003-00043-ip-10-164-35-72.ec2.internal.warc.gz
en
0.958058
2,588
2.921875
3
Overcoming Prejudice: Limitations Against Blacks in Nogales Did Not Stop Them from Accomplishments, by Francisco Castro Following is a typescript of an article which appeared in the January 20, 1998, Nogales International, Section B, Page 1. Permission to present this article was given by Mr. Don Henson, of the Nogales International newspaper. There was a time when racism and segregation were as American as apple pie. People of color were not allowed to go into restaurants, attended separate schools and had to wait until salons were closed to the general public to get their hair done. Prejudice in Nogales was little different. However, the challenges and limitations placed against blacks did not stop them from accomplishing deed that were just short of remarkable. Because of the historical interaction with Mexico, it was the blacks in town who got the worst part of this racism. The first large contingent of blacks came to Nogales as part of the U. S. 10th Cavalry, otherwise known as the Buffalo Soldiers. This unit, comprised of black soldiers, was established at Fort Leavenworth, Texas, in 1866. The soldiers got their name from the Comanches who thought the soldiers' hair resembled that of buffalo. The name stuck through a 50-year series of Indian campaigns in which the Buffalo Soldiers battled Sioux, Apaches and Comanches, helping to capture both Geronimo and Billy the Kid. The troops were first called to Nogales in vast numbers towards the end of 1910, following the outbreak of the Mexican revolution. Their numbers steadily increased during the years, establishing Camp Stephen D. Little, named after a private in the 12th U. S. Infantry Division killed while on guard duty at the top of the hill on Crawford Street in Nogales, Arizona, on November 26, 1915. The camp was located along what is now Western Avenue from Grand Avenue to Interstate 19. At one point, there were 12,000 troops stationed in Nogales. As the years went by, the number decreased until the camp was closed on May 13, 1933. One of the most famous of these army men especially well-known in Nogales was Henry Ossian Flipper. Born in Georgia as a slave in 1861, Flipper joined the Army after becoming the first black graduate of West Point. He was assigned to the American frontier in West Texas and spent seven years serving there. It was while he was stationed at Fort Davis four years later, in 1879, that he was court-martialed for embezzling money under his care. Although the verdict was not guilty on the charge, Flipper was found guilty of conduct not becoming an officer and a gentleman. He was discharged from the Army. It was after this incident that Flipper came to Nogales in 1885, preceded by his fame as engineer and Spanish translator, skills that would make him one of the most famous one-time Nogales residents. Because of his previous work as surveyor in Mexico for U. S. companies, Flipper was hired as a special agent to the court of Private Land Claims. It was in this position that he saved Nogales' residents from losing their parcels to land titles. In the 1880s, the people of Nogales, Arizona, were not allowed to own property because their lands were claimed by members of the Camou and Elias families. In the one-year battle that ensued, Flipper used his knowledge of Spanish and Mexican laws, as well as his Spanish translating skills, to win the case for Nogalians. This win made Flipper one of the most respected residents in town, where he lived until 1901, visiting as late as 1907. In 1895, Flipper also became the first black man to be an editor of an all-white newspaper when he served as editor of the Nogales Sunday Herald. But all of his fame and respect, did not prevent Flipper from the racism of the time. When he decided to marry a Mexican woman by the name of Luisa Montoya they were not allowed to legally marry because the laws of the time prohibited people of different races from marrying. The union lasted less than a year. Flipper died in 1963 in Atlanta, Georgia. Throughout his life, he had fought to clear his name, but he died before that happened. One hundred years after his court-martial, in 1976, his case was revised. His name was cleared by the Army Board for Corrections of Military Records, denying criminality and indicating that Flipper's punishment had been too severe and pointing out the mitigating circumstances of his court-martial. The records were changed to reflect an honorable discharge. But not all Buffalo Soldiers who came to town left without leaving descendants. On the contrary, many of them did marry Mexican women and started families. The descendants of these unions would in some cases become important town figures. Such is the case of Frank Reed, the first serviceman from Nogales to be killed in action in World War II. Reed was the son of Maria Molina, a woman from Hermosillo, and Chester Reed, who was a sergeant in the 10th Cavalry also known as the Buffalo Soldiers. Born in Nogales on June 21, 1920, Reed's short life was filled with all kinds of successes. He attended Grand Avenue School, more commonly referred to as the "colored school" and later named after him, and at Nogales High School excelled both in athletics and academics. Reed was part of the football, track, basketball and baseball teams. He was also editor of the school newspaper for a short time. He graduated from Nogales High School in 1941. Reed joined the Army and was killed in 1943. He was 22 years old. Reed's memory lives on in Nogales, with Frank Reed Drive, the street along Nogales High School, named after him. He was inducted into the Nogales High School Hall of Fame in 1992.
<urn:uuid:0cddbd9c-9172-4ae9-a92f-807eba9bcdeb>
CC-MAIN-2016-26
http://parentseyes.arizona.edu/esteban/bios_military_flipper_reed.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395548.53/warc/CC-MAIN-20160624154955-00056-ip-10-164-35-72.ec2.internal.warc.gz
en
0.988619
1,260
3.40625
3
by Dennis F. Daniels Research Branch, NC Office of Archives and History, 2005. The Lords Proprietors commissioned Captain Henry Wilkinson (b. ca. 1620) as governor of Albemarle in November 1680 with the hope that he would restore peace. Wilkinson made all the preparations to come to the colony, but he never left England. Born in York, England, around 1620, Wilkinson was a professional soldier who fought for the royalists during the English Civil War. When his military career ended, he tried to work in other occupations, but was a failure. Despite his difficulties, Wilkinson refused to seek a pension or an appointment from the royal government. Around 1679 Wilkinson and his family left York for London. After making the acquaintance of Wilkinson, the proprietors offered him the governorship of Albemarle. Due to the succession of problems created by Thomas Eastchurch and Thomas Miller, the proprietors placed importance on selecting the right man as governor. To the proprietors, Wilkinson seemed to be that man. He was a stranger with no connection to Albemarle’s factions. The Lords Proprietors believed that Wilkinson would manage the colony’s affairs with moderation and “doe equall justice to all partyes.” They also thought he would make sure the King’s customs duties were collected. Furthermore, Wilkinson offered traits of loyalty, experience, steadiness, and dependability to the proprietors. The Lords Proprietors instructed Wilkinson to create his government with the Fundamental Constitutions as its basis. They authorized him to establish an impartial court to settle disputes related to Culpeper’s Rebellion. Wilkinson could appoint an acting governor only with the approval of a majority of the council. They also wanted the boundary between Virginia and Carolina properly adjusted and an inquiry into the damages suffered by the King’s officials, so they could receive compensation. The proprietors commissioned one of Wilkinson’s sons as surveyor and proprietary deputy, and another son as register. Wilkinson received blank deputations to appoint new councilors in case the ones chosen by the proprietors do not “behave as they should, in healing all breaches that have been in the Colony.” Wilkinson made arrangements for his voyage to Albemarle, planning also to transport his family and servants. In August 1680 he petitioned the king for loan of a ship that was “supplied with Guns and ammunition at his Majesties charge,” but his request brought no reply. He secured the ship, Abigail, and a captain and ten crewmen in April 1681. The ship languished in harbor from April to August 1681 with Wilkinson paying to maintain it. His outstanding debt led to his arrest and he was jailed in London. He remained there for nearly two months before being moved to the King’s Bench Prison. While in prison, persons looking to incriminate one of the Lords Proprietors, Anthony Ashley Cooper, in a plot to seize King Charles II came to see Wilkinson. They hoped Wilkinson would provide incriminating evidence against Cooper. Even though he was bribed, Wilkinson stated that Cooper told him nothing about a plot to seize the king. Wilkinson remained in prison until November 1681, possibly longer. He never reached Albemarle and the rest of his life remained a mystery. Andrews, Charles M. 1916. Captain Henry Wilkinson. South Atlantic quarterly 15 (July): 216-222. Andrews, Charles McLean. 1915. Narratives of the insurrections, 1675-1690. New York: Charles Scribner's Sons. http://www.archive.org/details/narrativesofinsu01andr Fortescue, J. W. 1898. Calendar of state papers, colonial series, preserved in ....the Public Record Office..... [Vol.11], America and West Indies, 1681-1685. London: Published for Her Majesty's Stationery Office by Eyre and Spottiswoode. http://www.archive.org/details/colonialrecordsc11greauoft Grant, W. L., James Munro, and Almeric W. Fitzroy. 2005. Acts of the Privy Council of England Colonial series. Volume 1, A.D. 1613-1680. Burlington, Ont: TannerRitchie Pub. http://www.netlibrary.com/urlapi.asp?action=summary&v=1&bookid=235395. Parker, Mattie Erma Edwards, William S. Price, and Robert J. Cain. 1968. North Carolina higher-court records. The Colonial records of North Carolina, v. -. Raleigh, N.C.: State Dept. of Archives and History. Paschal, Herbert Richard. 1979. Proprietary North Carolina a study in colonial government. Thesis--University of North Carolina at Chapel Hill. Rankin, Hugh F. 1962. Upheaval in Albemarle; the story of Culpeper's Rebellion, 1675-1689. http://hdl.handle.net/2027/mdp.39015027788192. University of North Carolina at Chapel Hill. 2008. Colonial and state records of North Carolina. Vol. 1. [Chapel Hill, N.C.]: University Library, UNC-Chapel Hill. http://docsouth.unc.edu/csr/. Thomas Shepard, "King's Bench Prison, Principal Entrance," ca. 1828. 29 August 2005 | Daniels, Dennis F.
<urn:uuid:9f99a623-7a4c-4173-bcd4-a05717c5b683>
CC-MAIN-2016-26
http://ncpedia.org/node/295/backlinks
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783402746.23/warc/CC-MAIN-20160624155002-00148-ip-10-164-35-72.ec2.internal.warc.gz
en
0.945492
1,157
3.3125
3
MANILA, PHILIPPINES - Resurgent global food prices, which posted record increases in the first two months of 2011, are again threatening to push millions of people in developing Asia into extreme poverty, says a new report from the Asian Development Bank (ADB) titled 'Global Food Price Inflation and Developing Asia'. Food prices had been expected to continue a gradual ascent in the wake of the sharp spike in 2008. The report says that fast and persistent increases in the cost of many Asian food staples since the middle of last year, coupled with crude oil reaching a 31-month high in March, are a serious setback for the region which has rebounded rapidly and strongly from the global economic crisis. Domestic food inflation in many regional economies in Asia has averaged 10% in early 2011. The ADB study finds that a 10% rise in domestic food prices in developing Asia, home to 3.3 billion people, could push an additional 64 million people into extreme poverty based on the $1.25 a day poverty line. "For poor families in developing Asia, who already spend more than 60% of their income on food, higher food prices further reduce their ability to pay for medical care and their children's education," said ADB Chief Economist Changyong Rhee. "Left unchecked, the food crisis will badly undermine recent gains in poverty reduction made in Asia." The report adds that if the global food and oil price hikes seen in early 2011 persist for the remainder of the year, economic growth in the region could be reduced by up to 1.5 percentage points. In the short term, the pattern of higher and more volatile food prices is likely to continue the report says, noting that grain stocks have fallen. Adding to this are structural and cyclical factors that were at play during the 2007 to 2008 crisis including rising demand for food from more populous and wealthier developing countries, competing uses for food grains, shrinking available agricultural land, and stagnant or declining crop yields. The report notes that production shortfalls caused by bad weather along with the weak US dollar, high oil prices and subsequent export bans by several key food producing countries have caused much of the upward global price pressure since last June, with double digit increases seen in the price of wheat, corn, sugar, edible oils, dairy products and meat. Rice prices are likely to continue their uptrend as the effects of La Niña persist, prompting consumers to seek less costly and less nutritious substitutes. "To avert this looming crisis it is important for countries to refrain from imposing export bans on food items, while strengthening social safety nets," said Dr. Rhee. "Efforts to stabilize food production should take center stage, with greater investments in agricultural infrastructure to increase crop production and expand storage facilities, to better ensure grain produce is not wasted." Asian governments have already taken many short term measures to cushion the harsh impacts of food price inflation, including measures to stabilize prices. However rising demand for food from developing Asia and low food productivity mean policymakers must also focus on long term solutions to avert a future crisis, the report says. The report says there is also a need to calm speculative activities in food markets. It recommends enhanced market integration, and the elimination of policy distortions that create hurdles in transferring food from surplus to deficit regions. It also notes that cooperation between Asian nations can help better secure food supply for the region's people. The ASEAN Integrated Food Security Framework, under which the 10 member ASEAN group of countries has agreed to establish an emergency regional rice reserve system, is a positive step in that direction.
<urn:uuid:d63d1480-6e48-42b8-a201-3443959e2d3c>
CC-MAIN-2016-26
http://www.adb.org/news/soaring-food-prices-again-threaten-push-millions-asians-poverty-adb?ref=themes/social-development/news
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398516.82/warc/CC-MAIN-20160624154958-00190-ip-10-164-35-72.ec2.internal.warc.gz
en
0.95942
730
2.546875
3
Saudis 'find evidence of early horse domestication' Saudi officials say archaeologists have begun excavating a site that suggests horses were domesticated 9,000 years ago in the Arabian Peninsula. The vice-president of the Saudi Commission for Tourism and Antiquities said the discovery at al-Maqar challenged the theory it first took place 5,500 years ago in Central Asia. Ali al-Ghabban said it also changed what was known about the evolution of culture in the late Neolithic period. A number of artefacts were also found. They included arrowheads, scrapers, grain grinders, tools for spinning and weaving, and other tools that showed the inhabitants were skilled at handicrafts. Mr Ghabban said carbon-14 tests on the artefacts, as well as DNA tests on human remains also found there, dated them to about 7,000 BC. "This discovery will change our knowledge concerning the domestication of horses and the evolution of culture in the late Neolithic period," he told a news conference in Jeddah, according to the Reuters news agency. "The al-Maqar civilisation is a very advanced civilization of the Neolithic period. This site shows us clearly, the roots of the domestication of horses 9,000 years ago," he added. Although humans came into contact with horses about 50,000 years ago, they were originally herded for meat, skins, and possibly for milk. The first undisputed evidence for their domestication dates back to 2,000 BC, when horses were buried with chariots. By 1,000 BC, domestication had spread through Europe, Asia and North Africa. However, researchers have found evidence suggesting that the animals were used by the Botai culture in northern Kazakhstan 5,500 years ago.
<urn:uuid:2b20ad11-ce66-4abb-ac24-2d598329420b>
CC-MAIN-2016-26
http://dienekes.blogspot.com/2011/08/early-horse-domestication-in-neolithic.html?showComment=1314330721864
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396945.81/warc/CC-MAIN-20160624154956-00126-ip-10-164-35-72.ec2.internal.warc.gz
en
0.978399
370
3.265625
3
It'll work if you have firefox and is in alpha stages (and this version is far older in code development and data specification than the version I have on my box at home). Its purpose is to act like a "501 Spanish Verbs" style book which simply shows all the conjugations of a verb with some commentary about them when necessary. It is intended for composition, not translation.] After staring a LONG time (days) at pharr 807, 810, and 811, I think I finally saw near enlightenment about how the principal parts relate to the tense system and individual inflections of a verb. I think I've been labeling--and thinking about, principal parts wrongly: They should be specified (in my verb grinder) like this instead: 2. Future OR Future Mediopassive 3a. First Aorist 3b. Second Aorist 4a. First Perfect Active 4b. Second Perfect Active 5. Perfect Mediopassive 6a. First Aorist Passive 6b. Second Aorist Passive In the above, unless the voice is specified in pharr 807, it means all voices, and since no modes are specified, it means all modes (for each principal part). This was one of the major parts I didn't really understand until just now. Although, I'm a little confused in pharr 810 over the terminology "first (or second) perfect active)". Does this mean either or, or could it mean both? However, now if I had the "present" principal part (for lu/w), that means the same stem (lu-) is used for (channeling pharr 807): - Code: Select all The Passive voice only exists in the aorist tense, so by definition I cannot apply the Present principal part to it in any mode. Is this right? So, a small question, basic as it is, is how come there is no "Active Subjunctive Future" for lu/w, and would there EVER be such a thing (and what would it mean)? A large question is how do I know what tenses can go with what modes in general for a verb? Another question is how do the endings for the (say above specified present principal part specification) relate to the fact the stem is being used there? No relation at all? This is what I'm figuring.... Simply the stem is used in the right place and nothing more.... I just stumbled across this: "Note: There is no Future Subjunctive or Future Perfect Subjunctive, for a perfectly logical reason: The idea of the Future is part of a quasi-real set of parameters (Past Present Future), whereas the basic idea of the Subjunctive is vested in "Un-reality". In the realm of the Future the idea of Subjunctivity or un-reality simply does not fit!" Hopefully, I'm slowly beginning to understand this stuff. Am I on the right track? P.S. This is one of the major reasons why I'm so late with my homeworks for pharr-c. I just HAD to understand this stuff before I could continue. I was being destroyed by my misunderstandings on this topic since the verbs forms are all introduced so quickly and you're supposed to be able to understand how to inflect them as a combination of voice, mode, and tense, with a dictionary definition of only principal parts.
<urn:uuid:cc20ad58-5bec-4edb-b593-9228e4dfbc4d>
CC-MAIN-2016-26
http://www.textkit.com/greek-latin-forum/viewtopic.php?p=43441
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395039.24/warc/CC-MAIN-20160624154955-00059-ip-10-164-35-72.ec2.internal.warc.gz
en
0.926035
723
2.71875
3
Although I'm not a fan of using ancient history over much as an explanation for things going on today, I do think it has excellent entertainment value. So enjoy this series of links about the time when the Bear got its snout bloodied. Monday, August 11, 2008 I'm talking of course about the Winter War in which a million Soviet soldiers invaded the recently independent Republic of Finland in an attempt to reassert Russian domination of that country. The parallels to Georgia are many. Finland had been under Russian rule for centuries (since Peter the Great). So some might argue that Russia had an inherent right to dominate the new Republic. But when the Bear came growling in the Finish forrest, the Finns fought back. Tens of thousands of the Soviet invaders were encircled by quick moving Finnish volunteers in the frozen forests where they were besieged and largely left to starve. Hundreds of thousands of Russian died or were wounded. The outcome was ultimately a foregone conclusion (Finland lost 9% of their territory and much of their best farmland to the conquerers and still have not had it returned to them). Bert Q. Slushbrow can tell us a lot more about it I suspect. Sadly for the Georgians they aren't facing Stalin's purged army. Nor are they lucky enough to have the trackless Finnish forests to fight from. War is always a bad thing. But I do think it would benefit millions of people (not least the Russians themselves) if this adventure in Georgia would teach them that war cannot make Russia happy and prosperous. The Finns did their best to teach them that in 1939. Pitty Stalin wasn't obliged to learn. I suspect Putin is nearly as immune to popular constraints on his ambitions. Posted by Raised By Republicans at 6:01 PM
<urn:uuid:f04c9b60-bae4-492e-affd-0559c44d9eb8>
CC-MAIN-2016-26
http://thecitizens.blogspot.com/2008/08/remember-finland.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395679.92/warc/CC-MAIN-20160624154955-00066-ip-10-164-35-72.ec2.internal.warc.gz
en
0.982819
365
2.828125
3
Counting House - Experimental Hall Control Room Scientists can operate their experiment from this control room. They monitor over 30,000 channels of information to make certain that their experiments are running correctly. If something isn't working right, they can turn off the beam and go downstairs to fix it. Each experimental hall has its own control room, each running independently from the others.
<urn:uuid:a8075789-2103-46ec-ac4d-1fa8e7fc9afc>
CC-MAIN-2016-26
http://education.jlab.org/sitetour/countin.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783402516.86/warc/CC-MAIN-20160624155002-00188-ip-10-164-35-72.ec2.internal.warc.gz
en
0.961241
75
2.984375
3
Perhaps the best way to define the symbol is to contrast it with other representative forms that, like the symbol, stand for or point to something beyond themselves. IMAGES (pictures, statues, photographs)Each of these representative forms may take on a symbolic nature and/or may point to some particular aspect of the symbol, but they do not point to the peculiar nature of the symbol nor are they definitive in every situation. A symbol is a representation which indirectly reminds of or refers to some other reality, serves as a vehicle for the conception of that reality, and actually and effectively participates in that reality. A symbol may be arbitrary in which case it is established by common consent as opposed to having a natural or historic relationship with that which it represents: e.g., a key represents power or possession or a cross represents the Christian faith. A symbol may be evocative, in which case its meaning is suggested by engendering certain attitudes or feelings rather than by any direct statement: e.g., the American flag. Since symbols need not imitate what they represent and since they usually refer to something that is in a different and higher category, they are ideally suited for expressing religious truths. Images imitate what they represent; whereas symbols need not resemble the thing which they symbolize -- they need only to suggest or associate. GESTURES (shrugging the shoulders, bowing the head) Gestures express or embody their meaning as spontaneous, visible extensions of inner attitudes. While many gestures are symbolic, not all symbols are gestures or involve action. SIGNS (dinner bell, traffic sign, smoke) Signs announce some fact or give notification. Their role is practical or instrumental, they have an intellectual appeal and call for an immediate response. Baron Friedrich von Hugel was pointing to this in his statement, "I kiss my daughter in order to love her as well as because I love her." He kisses her because he loves her. Love requires an expression, a way of showing itself, of making itself felt; and a kiss is one way of doing this. But what of the other part of the statement? Kissing can express love, but can it create love? Probably not. But perhaps von Hugel is saying that his love for his daughter will grow as there are more outward expressions of it. The kiss is a symbol of love -- it enables him to communicate this love to his daughter who can in turn respond to it, thereby enriching that love. And at the time that he kisses her, the kiss is love. Man lives by symbols; and it is probably true that it would not be possible to live in any real sense without them. Suppose that two people want to exchange ideas on a subject. Their ideas are 'spirtual' -- or at least non-material -- as is the desire to share them. These ideas, then, can only be shared through some symbolic device. The individuals can speak or write to each other. The spoken word is an outward and audible symbol, the written word an outward and visible symbol of the ideas conveyed by it. In the absence of symbolic device, the two minds will never meet. Indeed there are those who would posit that this capacity for symbolization is what distinguishes man from the rest of creation. Man's conquest of the world undoubtedly rests on the supreme development of his brain, which allows him to synthesize, delay, and modify his reactions by the interpolation of symbols in the gaps and confusions of direct experience, and by means of verbal signs to add the experience of other people to his own. [F.W. Dillistone, Christianity and Symbolism, p. 23]. In the sacraments the Christian community has its peculiar symbols which are both formative of the community and necessary to its life. These symbols are the means of communicating to its people the reality and experience of the Risen Christ. Each of these sacraments is in a special way an extension of the Incarnation into the various needs and concerns of human life..... James M. Jensen, Evanston, Illinois, May, 1972, from "A Five-Week Adult Study Course on Christian Initiation," a Project Submitted to the Faculty of Seabury-Western Theological Seminary
<urn:uuid:cfb39f44-7a52-41c9-9628-4ff9757fd56f>
CC-MAIN-2016-26
http://ladyofsilencescalmdistress.blogspot.com/2010/04/use-of-religious-symbols-thoughts-from.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396106.25/warc/CC-MAIN-20160624154956-00095-ip-10-164-35-72.ec2.internal.warc.gz
en
0.966475
867
2.875
3
Ventricular tachycardia (VT) is a fast, abnormal heart rate. It begins in your heart’s lower chambers, called the ventricles. VT is defined as 3 or more heartbeats in a row, at a rate of more than 120 beats a minute. If VT lasts for more than a few seconds at a time, it can become life-threatening. The rapid heartbeat does not give your heart enough time to fill with blood before it contracts again. This can affect blood flow to the rest of your body. Ventricular tachycardia occurs when the heart’s electrical system causes the ventricles to beat too fast. Some heart problems can interfere with the heart’s normal electrical system and lead to VT. These include: VT is often linked to other heart problems that can damage or change normal heart muscle function. Damaged heart muscles can create abnormal electrical circuits that result in VT. You may be more at risk for VT if you have: Some types of genetic diseases can also lead to VT. These include: In rare cases, VT occurs when there are no other heart problems. When you have VT, your heart beats very fast. This may only last for a few seconds. Longer episodes are dangerous. The heart beats so fast that it can’t get enough blood to the rest of your body. Symptoms of VT may include: In some cases, there are no symptoms at all. To diagnose VT, your healthcare provider may order an EKG (electrocardiogram). This test records your heartbeat’s rate and rhythm. Your provider may want to closely watch your heart’s activity for a longer period of time. Then you may need to use a holter monitor or an event monitor. These are small devices that you wear while doing your normal activities. In some cases your provider may think you have VT, but hasn’t been able to document it. Then a tiny heart recording device can be implanted into your chest. It can record heart activity for 1 to 2 years. Treatment will depend on your symptoms. No treatment may be needed if: If you do have symptoms, your healthcare provider might prescribe medicine (a beta blocker or antiarrhythmic medicine) to control your heart rhythm. For VT that is long-term (chronic) or life-threatening, an implantable cardiac defibrillator (ICD) may be used. This small device is implanted into your chest. It is connected to your heart with wires. When an abnormal heartbeat occurs, the ICD sends out an electric shock to restore your normal heartbeat. Some VT may be treated with catheter ablation. This procedure uses radiofrequency energy to destroy the abnormal heart tissue that is causing the rapid heartbeat. Some people may have mild symptoms from VT, or no symptoms at all. But for others, VT can be very dangerous. It can lead to sudden cardiac arrest and death. VT prevention focuses on treating the underlying heart problems that cause the disorder. This may include: For some people, caffeine or alcohol can be a trigger for VT episodes. Avoid these things if they affect your VT. If your healthcare provider diagnoses VT, follow his or her treatment plan closely. Take all medicines as prescribed. And tell your provider about any medicines you may be taking for other health problems. Discuss your alcohol, tobacco, or caffeine use with your medical team. These things can contribute to an irregular heartbeat. If you have any of these symptoms, seek immediate medical help: Tips to help you get the most from a visit to your health care provider: Your Family's Health
<urn:uuid:c1901b37-e803-4a08-871c-fb690bb8dbed>
CC-MAIN-2016-26
http://www.missouribaptist.org/HealthLibrary/ViewContent.aspx?contentTypeId=134&contentId=231
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393533.44/warc/CC-MAIN-20160624154953-00106-ip-10-164-35-72.ec2.internal.warc.gz
en
0.914007
757
3.484375
3
Another sentence from Kanji in Context: 自分は偉いと思って人を見下しているとそのうち逆に他の人から見下されるようになる。 Those who think highly of themselves and look down on others will eventually themselves be looked down upon (by others). I've been puzzling over the choice to put は (instead of が) after 自分. It's the only は in the sentence and presumably marks the topic. Actually I find the topic itself unclear, if this was meant as a warning the topic could well be the listener, or this could just be a general observation of people. What bothers me most is the usage of は in a subordinate clause (of 思う) and nowhere else. Is this a sort of shorthand for not stating the topic explicitly? i.e. could this be reworded as 人は自分が偉いと思って etc?
<urn:uuid:f31f22db-0315-4bca-972a-499cb9ae2616>
CC-MAIN-2016-26
http://japanese.stackexchange.com/questions/12612/use-of-%E3%81%AF-with-%E8%87%AA%E5%88%86-in-a-subordinate-clause
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397567.28/warc/CC-MAIN-20160624154957-00132-ip-10-164-35-72.ec2.internal.warc.gz
en
0.858338
230
2.5625
3
On-line version ISSN 2221-4062 S. Afr. j. anim. sci. vol.44 n.1 Pretoria Jan. 2014 A. KotzéI, II; J.P. GroblerII; E. van Marle-KösterIII; T. JonkerIV; D.L. DaltonI, II INational Zoological Gardens of South Africa, P.O. Box 754, Pretoria 0001, South Africa IIDepartment of Genetics, University of the Free State, P.O. Box 339, Bloemfontein 9300, South Africa IIIDepartment of Animal & Wildlife Sciences, University of Pretoria, Private Bag X20, Hatfield, Pretoria 0028, South Africa IVNorthern Cape Department of Agriculture, Land Reform and Rural Development, Private Bag X5018, Kimberley 8300, South Africa The feral goats from Tankwa Karoo National Park in the Northern Cape, South Africa, constitute a potentially unique goat population, which dates back to the early 1900s, but is now at risk of extinction. A total of 66 feral goats from Tankwa Park and former Tankwa goats, now kept on a private farm were genotyped, using eight microsatellite markers. The data were compared with genotypic data of selected commercial breeds (Angora, Boer and Saanen dairy goats). Analysis of population structure using Bayesian and frequency-based methods suggests some uniqueness in the Tankwa populations. This uniqueness may reflect decades of random drift, but could also reflect alleles for adaptation to a harsh environment resulting from natural selection. These results are the first for the Tankwa goat and provide essential information for compiling a strategy for conservation and breeding of this genetic resource. Keywords: Conservation, genetic variability, goat biodiversity, Tankwa feral goats South Africa has a rich variety of farm animal genetic resources, used at different levels of commercial production. These local animals often include indigenous types with low production potential, which are nevertheless well adapted to the different climatic regions of South Africa compared with imported European breeds (Pieters, 2007; Van Marle-Köster et al., 2008). Several studies have been conducted to genetically characterize South African indigenous farm animal breeds and local types (Buduram, 2004; Kotze et al., 2004; Pieters, 2007; Van Marle-Koster et al., 2008; Soma et al., 2012). There are a number of examples worldwide where domesticated animals have turned wild and adapted to and survived in harsh climatic and environmental conditions. Examples include the wild horses of the Namib desert (Cothran et al., 2001), feral cattle on Chirikof Island (McNeil et al., 2007) and feral goats in numerous localities (Campbell & Donlan, 2005). A similar situation was highlighted in South Africa, when South African National Parks (SANParks) initiated the removal of feral goats from Tankwa Karoo National Park. The Northern Cape Department of Agriculture, Land Reform & Rural Development (NC-DALRRD) realized that these animals might represent unique genetic material, which has been exposed to intense natural selection over the years. The interest by the department was backed by its commitment to the goat industry in the Northern Cape and the Commercialisation of Goats Programme, which then spawned the Tankwa Goat conservation framework. It is estimated that the goats at Tankwa have been free roaming for more than 50 years, with a population size that varied between 100 and 300. There is a high degree of variation in the colour and coat appearance in the Tankwa goat, as indicated in Figure 1. The coat tends to be longer than the typical South African Boer goat and other indigenous types, and the primary coat colours are black, red, white and grey with mixtures of spotted, dappled and tri-colour variations (Jonker personal observation). Preliminary measurements taken on captured goats by NC-DALRRD indicate a respiratory type with long legs and long horns, especially in males. Although the collation of information on the phenotypic characteristics is ongoing, departmental officials have confirmed that Tankwa feral goats are well adapted to surviving under harsh grazing conditions, are parasite resilient, have good mothering abilities, and survive high predation pressures (Jonker personal observation). The aim of this study was to investigate the possible genetic uniqueness of the Tankwa feral goats in support of the conservation framework. Twenty-six Tankwa goats captured from Tankwa Karoo National Park were included in this study (designated Tan-TP). Samples were also taken from 40 Tankwa goats captured in another area of the Roggeveld mountains and relocated to a private farm near Calvinia approximately 20 years ago (designated former Tankwa or Tan-F). Blood (5 mL) was collected from each animal and stored at -20 °C until DNA extraction was performed. As representative of other goat breeds, 40 blood samples from Saanen dairy goats were collected from a private owner in the Middelpos region in the Northern Cape. Furthermore, genotypic data generated for Boer and Angora goat populations at the Department of Animal and Wildlife Sciences, University of Pretoria, were included for comparison. DNA was extracted from blood samples with the Qiagen© DNA isolation kit, following the manufacturer's protocol. Eight microsatellite loci were selected from the ISAG and FAO recommended lists for genetic diversity studies, namely ILStS087, MCM527, SRCRSP5, SRCRSP8, BM1329, SRCRSP24, SRCRSP23 and OarFcb20. Amplification was carried out in a 15 µL final volume containing 1 x PCR buffer, 1.5 - 2.5 mM MgCl2, 200 µM of each dNTP, 10 pmol of each of the forward and reverse primer, 1 unit (U) Promega GoTaq® DNA polymerase (Promega Corporation, Madison, WI, USA) and 50 ng genomic DNA template. PCR conditions were 5 min at 95 °C, 30 cycles for 30 sec at 95 °C, 30 sec at 50 - 65 °C and 30 sec at 72 °C, followed by 72 °C for 20 min. PCR products were run against GenescanTM 500 LIZTM internal size standard on an ABI 3130 genetic analyzer (Applied Biosystems, Inc., Foster City, CA). Samples were genotyped with GeneMapper v. 4.0 (Applied Biosystems). Genetic diversity was estimated as unbiased heterozygosity (Hz; Nei, 1987), observed heterozygosity (Ho) and the mean number of alleles per locus (A), using MSTOOLKIT (Park, 2001). To account for unequal sample sizes, genetic diversity was calculated as allelic richness (RS) using FSTAT version 18.104.22.168 software (Goudet, 2001). Conformation of genotypes to expected Hardy-Weinberg equilibrium (HWE) was calculated using ARLEQUIN version 3.1 software (Excoffier et al., 2005). The genetic relationships between goat populations were inferred via Baysian cluster analysis using STRUCTURE version 2.33 (Pritchard et al., 2000). A model was used that assumes admixture, but with uncorrelated allele frequencies. STRUCTURE was run for five replicates from K = 1 - 8, with a run-length of 200 000 MCMC repetitions, following a burn-in period of 100 000 iterations. The AK statistic of Evanno et al. (2005) was then calculated to further investigate results from structure, using STRUCTURE Harvester software (Earl et al., 2011). Genetic differentiation among populations was quantified using Fst (Wright, 1965), as implemented in ARLEQUIN software. This software was also used to implement a hierarchical investigation of the overall distribution of genetic diversity, through an analysis of molecular variance (AMOVA). Results of molecular and statistical analysis showed that all eight loci were polymorphic, with the number of alleles per marker varying from 7 to 15 over all the populations. No unique alleles were observed in the Tankwa populations. The levels of genetic diversity in the two Tankwa goat populations were similar and comparable with the values found in other breeds, but were on the lower end of the range (Table 1). For example, Hz values in the Tan-TP and Tan-F populations were 0.655 and 0.660 compared with values of 0.709 to 0.738 in the other goat breeds. Similarly, Rs values (a measure adjusted for sample size) were 4.318 and 4.159 in the Tankwa animals, compared with 5.402 to 6.488 in other breeds. Diversity values for the Angora breed were the highest in all instances. The diversity values should be seen in the correct context, however, since the values for the Tankwa populations are based on individuals from relatively small and isolated populations, whereas values for the other breeds are representative of the breeds, rather than individual populations. For example, in a study on a single population of Angora feral goats from Faure Island, an average of 3.9 alleles was reported (Balasingham et al., 1999), compared with 8.125 for pooled Angora animals in the current study. Values for the individual Tankwa populations can thus be seen to be comparatively high. The number of loci that deviated significantly (P <0.05) from HWE ranged from 1 to 5 per population. The Tankwa populations showed the fewest deviations (n = 2 in Tan-TP; n = 1 in Tan-F), with the highest number of deviations observed in the Angora breed (n = 5) and slightly lower numbers (n = 4) in the Boer and Saanen breeds. There was no pattern of deviations from HWE to suggest that any specific locus consistently deviates from HWE in goats, with the exception of the locus SRCRSP5, where significant deviations were observed in 4/5 groups. Although the Tankwa Tan-TP and Tan-F populations superficially have fewer deviations from HWE than the established goat breeds, the Tankwa are actual populations, whereas the other breeds are represented by grouped samples. Grouped samples are unlikely to conform to the conditions for maintenance of HWE, and deviations may not be representative of the retention of HWE in individual populations. Nevertheless, the Tankwa goats have been subjected to natural selection, which would contribute to the maintenance of HWE, compared with artificial selection in commercial breeds. The Bayesian and frequency-based measures of population structure and differentiation suggested considerable uniqueness in the Tankwa breed. First, results from STRUCTURE showed strong support for a true population structure, consisting of four clusters, with the ΔK approach of Evanno et al. (2006) indicating a value of K = 4 as the most likely outcome. Also, the mean of -Ln(K) values for K = 4 occurred at a point where -Ln(Pr) values plateau, and with little deviation among replicate runs. The proportion of membership of each individual to the four clusters is shown in Figure 2. At this K value, the Tan-TP and Tan-F animals grouped together, with the Angora, Boer and Saanen dairy goats breeds each contained in distinct clusters. There is an indication of a shared genetic background or introgression from Boer and Saanen breeds in a limited number of individual Tankwa animals. In the former Tankwa goats that are now being farmed as a commercial population, possible introgression from Boer and Saanen individuals was found, which is plausible. For the goats from Tankwa Karoo National Park, introgression from Boer and Saanen goats was also observed. This was expected in the Boer goat, if the region where these Tankwa goats occur is considered. Introgression from Saanen dairy goats is less easily explained and the apparent introgression of Saanen goat genetic material into the Tankwa populations may indicate ancient shared ancestry rather than recent events. Indeed, the Angora and Boer breeds show a signature of introgression from the Saanen dairy goat breed, supporting the hypothesis of a lack of recent admixture. Results from Fst support the hypothesis of some uniqueness in the Tankwa populations, with a lower Fst value between the two Tankwa populations compared with the differentiation between these populations and most of the remaining breeds (Table 2). The Fst value between goats from the two nominally Tankwa populations was 0.130, compared with larger values of 0.177 to 0.235 between Tankwa Park goats and representative Angora, Boer goat and Saanen dairy goat populations. An AMOVA with all breeds/populations treated as separate groups suggested considerable variation among breeds, with 19.7% of variation attributed to differences among breeds and 80.3% to within-breed diversity. Because almost 20% of overall variation in these goats resides between breeds, this suggests that there may be a significant reservoir of diversity for directed selection of goat breeds. Bayesian and frequency-based statistical approaches to population structure analysis suggest some uniqueness in the Tankwa breed. A significant proportion of this assumed uniqueness no doubt reflects simple drift resulting from decades of isolation. However, there may be an adaptive component to the uniqueness, resulting from an extended period of natural selection to the particular environmental conditions. Since the Tankwa has not been studied from a production perspective, it is not known what specific production advantages the breed may have. However, because these animals are highly adapted to a life without human intervention in a harsh environment, this suggests that the breed may offer exciting possibilities for commercialization. This study was the first attempt to provide genetic information on the feral Tankwa goat from South Africa. Results suggest a relatively high variability and detectable genetic differentiation compared with other breeds. These results serve as baseline information on the Tankwa goat and may guide further investigations into the conservation and breeding of these animals to ensure not only survival, but also utilization. We would like to thank the staff of Veterinary Services and Research from the Northern Cape Department of Agriculture, in particular Deon Kriel for providing samples, and Anri van Wyk from the National Zoo for technical assistance and DNA profiling. Balasingham, T.G., Robinson, N.A. & McGregor, B.A., 1999. Implications for the conservation of genetic diversity in mohair goats from a comparison of a relic island population with breeds farmed in Australia. Aust. J. Exp. Agric. 39, 411-418. [ Links ] Bourdon, R.M., 2000. Understanding Animal Breeding. Prentice Hall Inc., New Jersey. [ Links ] Buduram, P., 2004. Genetic characterization of Southern African sheep breeds using DNA markers. Unpublished M.Sc. dissertation, University of the Free State, South Africa. [ Links ] Campbell, K. & Donlan, C.J., 2005. Feral goat eradications on islands. Conserv. Biol. 19, 1362-1374. [ Links ] Cothran, E.G., Van Dyk, E. & Van der Merwe, F.J., 2001. Genetic variation in the feral horses of the Namib Desert, Namibia. J. S. Afr. Vet. Assoc. 72, 18-22. [ Links ] Earl, D.A. & Von Holdt, B.M., 2012. STRUCTURE HARVESTER: a website and program for visualizing STRUCTURE output and implementing the Evanno method. Con. Gen. Res. 4, 359-361. [ Links ] Evanno, G., Regnaut, S. & Goudet, J., 2005. Detecting the number of clusters of individuals using the software STRUCTURE: a simulation study. Mol. Ecol. 14, 2611-2620. [ Links ] Excoffier, L., Laval, G. & Schneider, S., 2005. Arlequin, version 3.0: An Integrated Software Package for Population Genetics Data Analysis. Computational and Molecular Population Genetics Laboratory (CMPG), Institute of Zoology, University of Berne, Switzerland. [ Links ] Goudet, J., 2001. FSTAT, a Program to Estimate and Test Gene Diversities and Fixation Indices. Version 293. Institut de Zoologie et d'Ecologie Animale, Universite de Lausanne, Lucerne, Switzerland. [ Links ] Groeneveld, L.F., Lenstra, J.A., Eding, H., Toro, M.A., Scherf, B., Pilling, D., Negrini, R., Finlay, E.K., Jianlin, H., Groeneveld, E. & Weigend, S.: GLOBALDIV Consortium, 2010. Genetic diversity in farm animals: A review. Anim. Genet. 1, 6-31. [ Links ] Kotze, A., Swart, H., Grobler, J.P. & Nemaangani, A., 2004. A genetic profile of the Kalahari Red goat breed from southern Africa. S. Afr. J. Anim. Sci. 34 (Suppl. 1), 10-12. [ Links ] McNeil, M.D., Cronin, M.A., Blackburn, H.D., Richards, C.M., Lockwood, D.R. & Alexander, L.J., 2007. Genetic relationships between feral cattle from Chirikof Island, Alaska and other breeds. Anim. Gen. 38, 193-197. Nei, M., 1987. Molecular Evolutionary Genetics. Columbia University Press, New York. 512 p. [ Links ] Park, S.D.E., 2001. Trypanotolerance in West African cattle and the population genetic effects of selection. Unpublished PhD. thesis, Dublin, University of Dublin, Ireland. [ Links ] Pieters, A., 2007. Genetic characterization of commercial goat populations in South Africa. Unpublished MSc. dissertation, University of Pretoria, South Africa. [ Links ] Pritchard, J.K., Stephens, M. & Donnelly, P., 2000. Inference of population structure using multilocus genotype data. Genetics 155, 945-959. [ Links ] Rosenberg, N., Burke, T., Elo, K., Feldman, M.W., Freidlin, P.J., Groenen, M.A.M., Hillel, J., Maki-Tanila, A., Tixier-Boichard, M., Vignal, A., Wimmers, K. & Weigend, S., 2001. Empirical evaluation of genetic clustering methods using multilocus genotypes from 20 Chicken breeds. Genetics 159, 699-713. [ Links ] Soma, P., Kotze, A., Grobler, J.P. & Van Wyk, J.P., 2012. South African sheep breeds: population genetic structure and conservation implications. Small Rumin. Res. 103, 112-119. [ Links ] Van Marle-Köster, E., Hefer, C.A., Nel, L.H. & Groenen, M.A.M., 2008. Genetic diversity and population structure of locally adapted South African chicken lines: Implications for conservation. S. Afr. J. Anim. Sci. 38, 271-281. [ Links ] Wright, S., 1965. The interpretation of population structure by F-statistics with special regard to systems of mating. Evolution 19, 395-420. [ Links ] Received 23 April 2013 Accepted 9 January 2014 First published online 13 February 2014
<urn:uuid:1872a05e-6f32-4700-8215-5f39b37e6078>
CC-MAIN-2016-26
http://www.scielo.org.za/scielo.php?script=sci_arttext&pid=S0375-15892014000100010&lng=en&nrm=iso&tlng=en
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783403825.35/warc/CC-MAIN-20160624155003-00057-ip-10-164-35-72.ec2.internal.warc.gz
en
0.90384
4,169
2.859375
3
Sea levels around the world could rise by as much as one metre by 2100, the International Scientific Congress on Climate Change has heard. Meeting in Copenhagen, Denmark, from March 10 to 12, researchers told the conference that it looks “increasingly likely” that sea levels will rise by no less than 50 centimetres by 2100 and that a rise of more than one metre is a real possibility. “This means that if emissions of greenhouse gases is not reduced quickly and substantially, even the best case scenario will hit low lying coastal areas housing one in ten humans on the planet hard,” a March 10 media release states. In December 2008, a B.C. Ministry of Environment report concluded that decisions regarding land use and major long-term infrastructure projects in the province must consider local sea-level changes to effectively manage risks. The ministry’s report stated that sea levels for the Fraser River delta could rise by as much as 120 centimetres by 2100. It cautions that while probable estimates for sea level rises in B.C. range from 11 centimetres for Nanaimo to 50 centimetres for the Fraser, the possible range could be much greater. New research presented at the ISCCC conference included estimates for rising sea levels that are significantly greater than earlier predictions made by the Intergovernmental Panel on Climate Change. The IPCC last delivered an assessment report on rising sea levels in 2007. That report predicted sea levels to rise by 18 to 59 centimetres by 2100. According to the release, the significant disparity between the two sets of data can in part be attributed to the 2007 report’s failure to take into account contributing factors to sea-level increases such as how ice sheets react to the effects of a warmer climate. The latest research includes insight based on the loss of ice from the Antarctic and Greenland ice sheets, according to the release. “The numbers from the last IPCC are a lower bound because it was recognized at the time that there was a lot of uncertainty about ice sheets,” Eric Rignot, a professor at the University of California at Irvine and senior research scientist at NASA’s Jet Propulsion Laboratory, states in the release. Konrad Steffen, of the University of Colorado at Boulder and cochair of the congress session on sea level rise, then states in the release, “The ice loss in Greenland has accelerated over the last decade. The upper range of sea level rise by 2100 might be above one metre or more on a global average, with large regional differences depending where the source of ice loss occurs.” John Church, of the Centre for Australian Weather and Climate Research and the lead speaker in the sea level session, attributed rising sea levels to continually warming oceans and the increasingly rapid rate at which mountain glaciers are melting. According to the release, more than 2,000 participants are registered to attend the ISCCC conference and nearly 1,600 scientific contributions from 70 countries were received by the ISCCC. You can follow Travis Lupick on Twitter at twitter.com/tlupick.
<urn:uuid:fd5fa7b5-07f3-4bec-bb96-8d295b94cc2a>
CC-MAIN-2016-26
http://www.straight.com/article-206041/rising-sea-levels-exceed-expectations-climate-change-congress-hears
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396027.60/warc/CC-MAIN-20160624154956-00122-ip-10-164-35-72.ec2.internal.warc.gz
en
0.951572
633
3.640625
4
1. [Diodorus Siculus 17.1.5] “Alexander’s ancestry went back to Heracles on his father’s side, while through his mother he was related to the Aeacids.” 2. [Plutarch, Alexander 2.1-2] “As for Alexander’s family, it is firmly established that he was descended from Heracles through Caranus on his father’s side and from Aeacus through Neoptolemus on his mother’s. The story goes that Philip was initiated into the mysteries at Samothrace along with Olympian. She was an orphan and he was still a very young man; he fell in love with her, and on the spure of the moment became betrothed to her after ganing the blessing of her brother Arybbas.” 3. [Justin 11.4.5] “Cleadas even appealed to the kind’s personal devotion to Hercules, who was born in their city; and from whom the clan of the Aeacidae[*] traced its descent and to the fact that his father Philip had spent his boyhood in Thebes. “ [*]This should read “Argeadae” His error may originate with Justin rather than Trogus. ”While these matters were proceeding successfully Philip married Olympias, daughter of Neoptolemus, king of the Molossians; the match was arranged by Arybbas. king of the Molossians, who was the girl’s cousin and guardian and was married to her sister Troas. This was the cause of Arrybas’ downfall and all his troubles. For, while he was hoping to increase his kingdom through his family ties with Philip, he was stripped of his own kingdom by the latter and grew old in exile. “ 5. [Theopompus of Chios (FGTH US F3SS – Tzetzes, ad Lycophr 1439)] “Olympias traced her line all the wav back to Pyrrhus son of Achilles and Helenus son of Priam, according to Theopompus and Pyrander. Pyrrhus’ line goes back to Aeacus. “ 6. [Pausanias, Description of Greece 1.9.8] “For Alexander was an Epirot, and related to the Aeacids on his mothers side ” 7. [Plutarch, On the fortune of Alexander 1.10 = Moratia 332a] ”Plutarch, in a fictitious passage, puts these words into Alexander’s mouth: “Forgive me for following the footsteps of Dionysus, divine founder and forefather of my line” 8. [Velleius Paterculus: “The Roman History” Book I, 5] ”In this period, sixty-five years before the founding of Rome, Carthage was established by the Tyrian Elissa, by some authors called Dido. 5 About this time also Caranus, a man of royal race, eleventh in descent from Hercules, set out from Argos and seized the kingship of Macedonia. From him Alexander the Great was descended in the seventeenth generation, and could boast that, on his mother’s side, he was descended from Achilles, and, on his father’s side, from Hercules.” 9. [Isocrates, To Philip, 32] <b> ”Argos is the land of your fathers, and is entitled to as much consideration at your hands as are your own ancestors…” 10. [Diodorus of Sicily, 17.4.1] “First he [Alexander] dealt with the Thessalians, reminding them of his ancient relationship to them through Heracles” 11. [Herodotus, The Histories 5.22] “ Now that the men of this family are Hellenes, sprung from Perdiccas, as they themselves affirm, is a thing which I can declare on my own knowledge, and which I will hereafter make plainly evident. That they are so has been already adjudged by those who manage the Pan-Hellenic contest at Olympia” 12. [Herodotus, The Histories 8.43] ”Now that these descendants of Perdiccas are Hellenes, as they themselves say, I myself chance to know” 13. [Herodotus V, 22, 1, Loeb, A.D. Godley] “The country by the sea which is now called Macedonia… Alexander, the father of Perdiccas, and his forefathers, who were originally Temenidae from Argos” 14. [Herodotus V, 22, 2, Loeb, A.D. Godley] “But Alexander proving himself to be an Argive, he was judged to be a Greek; so he contended in the furlong race and ran a dead heat for the first place”. 15. [Herodotus IX, 45, 2, Loeb, A.D. Godley ] ”For I myself am by ancient descent a Greek, and I would not willingly see Hellas change her freedom for slavery” 16. [Pausanias, 7.8] “Macedonia whose kings are from Argos, Your good and your bad come in the reign of Philip. One shall create lords for cities and for peoples: The other shall utterly destroy your glory Beaten down by eastern and western men.” 17. [Strabo 13.1.27] In my time, however, the deified Ceasar was far more thoughtful of them, at the same time also emulating the example of Alexander; for Alexander set out to provide for them on the basis of a renewal of ancient kinship, and also because at the same time he was fond of Homer; at any rate, we are told of a recension of the poetry of Homer, the Recension of the Casket, as it is called, which Alexander, along with Callisthenes and Anaxarchus, perused and to a certain extent annotated, and then deposited in a richly wrought casket which he had found amongst the Persian treasures. Accordingly, it was due both to his zeal for the poet and to his descent from the Aeacidae who reigned as kings of the Molossians–where, as we are also told, Andromache, who had been the wife of Hector, reigned as queen–that Alexander was kindly disposed towards the Ilians. 18. [The Suda “Caranus”] One of the Heraclids, he gathered an army from Greece and went into Macedonia, which at that time was an obscure place. He ruled there and handed down the rule so that it proceeded in succession all the way down to Philip.” 19. [Isocrates to Philip 113] My purpose in relating all this is that you may see that by my words I am exhorting you to a course of action which, in the light of their deeds, it is manifest that your ancestors chose as the noblest of all. 20. [Isocrates to Philip 115] And mark that I am summoning you to an undertaking in which you will make expeditions, not with the barbarians against men who have given you no just cause, but with the Hellenes against those upon whom it is fitting that the descendants of Heracles should wage war. 21. [Isocrates to Philip 127] Therefore, since the others are so lacking in spirit, I think it is opportune for you to head the war against the King; and, while it is only natural for the other descendants of Heracles, and for men who are under the bonds of their polities and laws, to cleave fondly to that state in which they happen to dwell, it is your privilege, as one who has been blessed with untrammeled freedom, to consider all Hellas your fatherland, as did the founder of your race, and to be as ready to brave perils for her sake as for the things about which you are personally most concerned. 22. [Arrian, Anabasis.3.3.2] And Alexander felt this drive to repeat the deeds of Perseus and Heracles, from whose two families he descended… 23. [Thucydides, Peloponnesian War.2.99] Alexander and his ancestors, originally Temenids from Argos… 24. [Arrian The Campaigns of Alexander, 4.11] ..but of Philip’s son, a man with the blood of Heracles and Aeacus in his veins, a man whose forefathers came from Argos to Macedonia, where theylong ruled not by force, but by law. From the YouTube Channel of SPARTANsenator2 SEE ALSO: Alexander the Great Articles Latest posts by Admin (see all) - ΠΟΥΛΑΝΕ τον ΟΤΕ στη Deutsche Telekom… ΠΟΥΛΑΝΕ και την ονομασία της ΜΑΚΕΔΟΝΙΑΣ; - April 18, 2011 - Αρχαία Ολυμπία – Λίμνη Καϊάφα: Γη των Θεών και της Ειρήνης - April 18, 2011 - Παίρνει τις περιουσίες των Ελλήνων της Χειμάρρας το αλβανικό κράτος! - April 18, 2011 Want more of this? See these Posts:
<urn:uuid:b0974aa6-d44d-4f7a-b80c-9826ba5e96e9>
CC-MAIN-2016-26
http://history-of-macedonia.com/2006/10/18/greek-ancestry-of-alexander-the-great/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395039.24/warc/CC-MAIN-20160624154955-00144-ip-10-164-35-72.ec2.internal.warc.gz
en
0.969904
2,181
2.703125
3
By injecting purified stem cells isolated from adult skeletal muscle, researchers have shown they can restore healthy muscle and improve muscle function in mice with a form of muscular dystrophy. Those muscle-building stem cells were derived from a larger pool of so-called satellite cells that normally associate with mature muscle fibers and play a role in muscle growth and repair. In addition to their contributions to mature muscle, the injected cells also replenished the pool of regenerative cells normally found in muscle. Those stem cells allowed the treated muscle to undergo subsequent rounds of injury repair, they found. "Our work shows proof-of-concept that purified muscle stem cells can be used in therapy," said Amy Wagers of Harvard University, noting that in some cases the stem cells replaced more than 90 percent of the muscle fibers. Such an advance would require isolation of stem cells equivalent to those in the mouse from human muscle, something Wagers said her team is now working on. Satellite cells were first described decades ago and have since generally been considered as a homogeneous group, Wagers said. While anatomically they look similar under a microscope, they nonetheless show considerable variation in their physiology and function. In a previous study, Wagers' identified a set of five markers that characterize the only subset of satellite cells responsible for forming muscle, which they also refer to as skeletal muscle precursors or SMPs. In the new study, the researchers analyzed the stem cell and regenerative properties of those SMPs. When engrafted into muscle of mice lacking dystrophin, purified SMPs contributed to up to 94 percent of muscle fibers, restoring dystrophin expression and significantly improving muscle structure and contractile function, they report. (The dystrophin gene encodes a protein important for muscle integrity. Mice lacking dystrophin, also known as mdx mice, are a model for Duchenne Muscular Dystrophy, the most prevalent form of muscular dystrophy.) " Importantly, high-level engraftment of transplanted SMPs in mdx animals shows therapeutic value--restoring defective dystrophin gene expression, improving muscle histology, and rescuing physiological muscle function," the researchers said. "Moreover, in addition to generating mature muscle fibers, transplanted SMPs also re-seed the satellite cell niche and are maintained there such that they can be recruited to participate in future rounds of muscle regeneration. "Taken together, these data indicate that SMPs act as renewable, transplantable stem cells for adult skeletal muscle. The level of myofiber reconstitution achieved by these myogenic stem cells exceeds that reported for most other myogenic cell populations and leads to a striking improvement of muscle contraction function in SMP-treated muscles. These data thus provide direct evidence that prospectively isolatable, lineage-specific skeletal muscle stem cells provide a robust source of muscle replacement cells and a viable therapeutic option for the treatment of muscle degenerative disorders." Wagers noted however that there may be complications in the delivery of cell therapy in humans, particularly for those with conditions influencing skeletal muscle throughout the body. Even so, the new findings present an "opportunity to understand what happens [to these regenerative cells] in disease and identify factors and pathways that may boost their activity," she said. "We may get a handle on drugs that could target muscle impairment" not only in those with muscular dystrophies, but also in elderly people suffering from the muscle wasting that comes with age. The researchers include Massimiliano Cerletti, Joslin Diabetes Center, Boston, MA, Harvard University, and Harvard Stem Cell Institute, Cambridge, MA; Sara Jurga, Joslin Diabetes Center, Boston, MA, Harvard University, and Harvard Stem Cell Institute, Cambridge, MA; Carol A. Witczak, Joslin Diabetes Center, Boston, MA; Michael F. Hirshman, Joslin Diabetes Center, Boston, MA; Jennifer L. Shadrach, Joslin Diabetes Center, Boston, MA, Harvard University, and Harvard Stem Cell Institute, Cambridge, MA; Laurie J. Goodyear, Joslin Diabetes Center, Boston, MA; and Amy J. Wagers, Joslin Diabetes Center, Boston, MA, Harvard University, and Harvard Stem Cell Institute, Cambridge, MA.
<urn:uuid:7e3b776d-83d9-4991-8aae-64b424d611e0>
CC-MAIN-2016-26
http://www.eurekalert.org/pub_releases/2008-07/cp-psc070708.php
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396945.81/warc/CC-MAIN-20160624154956-00011-ip-10-164-35-72.ec2.internal.warc.gz
en
0.921367
884
3.09375
3
Everyone loves pancakes and wants to know the secret of cooking them. And that partly depends on whether you’re after the thin, crêpe-like European style or the thicker ones more popular in North America as each requires a different approach. When you make pancake batter you are mixing a whole range of different chemicals (so all sorts of reactions take place in the cooking). The dry ingredients contain flour and sugar, as well as salt and maybe either baking powder or baking soda. Flour supplies protein, molecules made of lots of amino-acids joined in chains, along with starch, which similarly is made of lots of simple sugar molecules joined in chains. Much of the protein in flour is gluten. When you mix the flour with eggs and milk, the gluten molecules get more flexible and can bind to each other forming networks. The mixing causes carbon dioxide gas from the air to be trapped by these networks, which causes the pancake to rise (just like bread does) and creates its chewable texture. Eggs give you more protein, while sugar and butter give tenderness to the texture and the fluids help the mixing process and enable chemical reactions to occur. Thicker pancakes need a raising agent which produces carbon dioxide by itself when heated. This is typically sodium bicarbonate (baking soda) or baking powder, a mixture of sodium bicarbonate with a weak acid like cream of tartar. You might remember from chemistry lessons at school that when you mix an acid with a carbonate, you get a fizzing. This is the carbon dioxide gas. For a start, cooks always use too much batter' and that the pan should be hot, but not too hot ‘almost smoking - but not blue smoke’ and should just have a smear of butter or fat. He goes on to say that a “standing” period of between one and three hours before cooking is vital. It is important to beat the mixture hard, so that gluten forms, for the mixture to then stand to allow the starch to swell and any air bubbles to pop. Unless you do this, the structure of the pancake will be weak and it will be full of holes. Nigel Slater says that you don’t have to let the batter stand, but half an hour is probably best. It’s also important to remember that if you add buttermilk, which is slightly acidic, it will also react with the carbonates, and leave the batter too long, all the gas bubbles will have escaped, and your pancakes will be flat. Most chefs do not suggest a particular cooking temperature (moderate heat seems the norm). The pan should be hot enough for the pancake to brown in less than a minute, but not so hot that the batter “sets” when you put it on the pan, before it has time to spread. But all seem to agree on the importance of getting the right pan -– a nice heavy, flat one, which will hold the heat well. The aroma and colour of pancakes originate in the same chemical reaction, known as the Maillard reaction, after its French discoverer, Louis-Camille Maillard. It is caused by hot sugars reacting with amino-acids, generating a wide range of small molecules that escape from the mixture and carry their smells (such as nuts, bread or coffee) to your nose. Some of these brown compounds, also found in bread and coffee, are called melanoidins. If you are just a bit mathematically inclined, you will appreciate how university researchers have shown you can even use formulae for making pancakes – whether to work out how much batter you need or how to get the perfect flip. At a more complicated level, these formulae bring in factors such as the cooking time and the temperature of the pan to get as near perfection as you can. But ultimately, for all the formulae, advice from chefs and scietific tips, there’s only one thing for it – start mixing that batter.
<urn:uuid:16970b2a-2312-4b99-b625-2f96f707e452>
CC-MAIN-2016-26
http://theconversation.com/the-science-behind-making-a-perfect-pancake-54371
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397864.87/warc/CC-MAIN-20160624154957-00141-ip-10-164-35-72.ec2.internal.warc.gz
en
0.950489
827
3.28125
3
“Voice” is a term often used in describing a poet’s work, yet it remains a slippery concept. Does voice come from within the individual or elsewhere? Does each poet have a core voice, or can a writer work in several different voices successfully? This workshop offers an opportunity to explore these questions through writing experiments and discussion. What are the differences between poetry and prose? What are the strategies peculiar to each one? And in what way can an understanding of those strategies assist us in our own reading and writing of the prose poem? Carl Phillips leads a discussion that seeks to tame that sometimes nebulous but ever-persistent animal, the prose poem. On the 25th anniversary of his death, five esteemed colleagues read and re-examine the work of Robert Lowell, a three-time Pulitzer Prize winner and one of the most influential post-World War II poets. As part of Yari Yari: Black Women Writers and the Future: An International Conference on Literature by Women of African Descent, this reading and discussion celebrates the identity and independence of Black women poets from Africa and the African Diaspora. In a nation at the crossroads of Slavic, German and Mediterranean influences, poetry plays a major role in shaping Slovenian identity. Five of the country’s finest writers - Andrej Blatnik, Drago Jančar, Brane Mozetič, Boris A. Novak and Tomaž Šalamun - will read their work and discuss the role of the poet in a post-communist society.
<urn:uuid:52b15ff1-1281-4af2-84d7-5d8eba2f0503>
CC-MAIN-2016-26
http://www.poetshouse.org/node?page=131&mini=2014-04
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783391519.0/warc/CC-MAIN-20160624154951-00186-ip-10-164-35-72.ec2.internal.warc.gz
en
0.934781
322
2.53125
3
Remember Arthur C. Clarke’s “The Wind from the Sun”? The short story, telling of a race from the Earth to the Moon via solar sail, appeared in 1964, portraying the vessel Diana and its 50 million square foot sail, all linked to its command capsule by a hundred miles of cable. In those days, the sail idea was newly minted and more or less the domain of science fiction buffs, who had first encountered it in Carl Wiley’s “Clipper Ships of Space,” a non-fiction article written under a nom de plume for Astounding Science Fiction in 1951. The 1960s would see tales like Poul Anderson’s “Sunjammer” and Cordwainer Smith’s haunting “The Lady Who Sailed the Soul.” Addendum: When I say the idea was ‘newly minted’ (above), I’m referring to the engineering ideas that could go into an actual mission. The idea of solar sailing itself goes back much further — see my Centauri Dreams book for the whole backstory. Wiley’s sail concept was startlingly ambitious for its time, an 80-kilometer design that preceded the first scientific paper on solar sails by seven years. But science fiction would go on to bring even larger sails to spectacular imaginative life. Thus Clarke: All the canvas of all the tea clippers that had once raced like clouds across the China seas, sewn into one gigantic sheet, could not match the single sail that Diana had spread beneath the Sun. Yet it was little more substantial than a soap bubble; that two square miles of aluminized plastic was only a few millionths of an inch thick.” Image: Poul Anderson, writing as Winston P. Sanders, published “Sunjammer” in Analog‘s April, 1964 issue. Cordwainer Smith (Paul Linebarger) wrote of the “tissue-metal wings with which the bodies of people finally fluttered out among the stars.” That story, from the April, 1960 issue of Galaxy, described ‘the age of sailors’: The thousands of photo-reconnaissance and measuring missiles had begun to come back with their harvest from the stars. Planet after planet swam into the ken of mankind. The new worlds became known as the interstellar search missiles brought back photographs, samples of atmosphere, measurements of gravity, cloud coverage, chemical make-up and the like. Of the very numerous missiles which returned from their two? or three-hundred-year voyages, three brought back reports of New Earth, an earth so much like Terra itself that it could be settled. The first sailors had gone out almost a hundred years before. They had started with small sails not over two thousand miles square. Gradually the size of the sails increased… Entering the Age of Sail We’re a long way from the era of giant sails of the sort that these writers, and soon scientists like Robert Forward, would depict in their work. But reading through a recent article on solar sails in Nature brought these memories back because solar sails and their beamed-propulsion cousins, so-called ‘lightsails,’ have been at the forefront of interstellar research ever since those days. Today’s IKAROS and NanoSail-D experiments, soon to be joined, we hope, by LightSail-1, are the beginning. However long it has taken — and there was serious consideration about a NASA sail to Halley’s Comet well over thirty years ago — we’re at least getting sails into space. Japan’s IKAROS sail has just seen its mission extended until March of 2012. The first sail to make it into interplanetary space, IKAROS was a payload that would have reached Venus for its flyby with or without sail power, but that’s not the point. The idea was to shake out new technologies, and IKAROS did demonstrate acceleration from solar photons on its way to Venus, as well as giving controllers the chance to put its attitude control system to the test. The key result was to bulk up our data about sail technology so that engineers can build better ones in the future. And while NanoSail-D continues its flight, an attractive catch for space-minded photographers when conditions are right, its low-Earth orbit will soon cause atmospheric drag to bring it down, a fiery re-entry that will tell us about using such technologies to de-orbit decommissioned satellites. While IKAROS is a 200 square-meter sail, NanoSail-D is much smaller, but principal investigator Dean Alhorn is now designing FeatherSail, an attempt to go beyond low-Earth orbit with a sail that will measure 870 square meters. And as we’ve discussed in these pages before, JAXA aims to build a much larger sail for a Jupiter mission launched at the end of the decade. A Toast to Old Ideas Sometimes I like to look through abandoned mission concepts, out of curiosity and the frisson that comes from watching new and speculative ideas encounter the combative world of engineering and politics. I’ve already mentioned the NASA sail studies for Halley’s Comet, which were led by one of today’s leading sail proponents, Louis Friedman. Then there was the TAU (Thousand Astronomical Unit) mission, designed to push deep into the Kuiper Belt as a platform for astrophysics and astronomy. First conceived around nuclear-electric propulsion systems, TAU was also examined in terms of solar sailing, using a close solar pass to achieve the needed acceleration. No final choices were made for this mission that never flew. The Nature article referenced above notes one other abandoned sail concept, a solar sail satellite situated over the Moon’s south pole for use as a communications relay to a lunar base. The Constellation program, designed around future missions to the Moon, was considering such a sail before the program was canceled in February of 2010. But stay optimistic, because with IKAROS and NanoSail-D already in space, we’re only getting started. “There’s a niche for solar sails and it’s there for the taking,” JPL’s John West says in the article, and the advantages of leaving the propellant behind should soon become apparent as we unfurl still more sails in space. Sometimes abandoned missions are harbingers of the more realistic attempts that succeed.
<urn:uuid:86bdc498-d197-437d-8667-461d88368103>
CC-MAIN-2016-26
http://www.centauri-dreams.org/?p=16684
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397636.15/warc/CC-MAIN-20160624154957-00160-ip-10-164-35-72.ec2.internal.warc.gz
en
0.96057
1,362
3.03125
3
How creepy does that sound? A Disney Research team in Zurich, Switzerland, has invented a new robot-making technique dubbed “face cloning.” This process, as crazy as it sounds, involves 3d digital scanning of the face and then later use that information to create a silicon based face that will be emulate and recreate a real face, right down to wrinkles one creates when they smile! Once the CGI characters are created, a 3D mold is made into which liquid silicone is injected. After curing, the skin is attached to the animatronic robot head that will help recreate the facial expressions, except of course, the eyes. The optimized model of the head defines the robot’s range of movements and locates the optimum points to attach the artificial skin. In the future, the developers hope to give the skin more flexibility and introduce a multi-layered skin to provide more control over its movements.
<urn:uuid:bcb31e43-c90c-437a-be62-fbc8da77dc8f>
CC-MAIN-2016-26
http://www.designlaunches.com/gadgets/disney-to-clone-faces-to-emulate-realistic-expression.php
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393463.1/warc/CC-MAIN-20160624154953-00200-ip-10-164-35-72.ec2.internal.warc.gz
en
0.938706
186
2.859375
3
The Future Is Small For three decades, the symbol of the U.S. space program was the mighty Space Shuttle, an 86-ton reusable spacecraft that hauled astronauts, equipment, and supplies into orbit 135 times before being retired in 2011. Among candidates for the next symbol might be the shiny aluminum box located on a clean room assembly bench in Georgia Tech’s Engineering Science & Mechanics (ES&M) building. Made of space-grade metal, the 50 x 50 x 30 centimeter structure is rapidly being transformed into Prox-1, a micro satellite that will itself become a launcher for an even smaller satellite known as LightSail-B. Next fall, the two spacecraft will orbit the Earth together to study automated trajectory control required for close proximity flying in space. Beyond studying control issues, Prox-1 will help its mostly student crew learn how to design, build, launch, and operate spacecraft. The 60-kilogram satellite will also be Georgia Tech’s first entry into the era of small spacecraft — a phenomenon made possible by the same miniaturization and capability enhancements that put smartphones into nearly everyone’s pockets. And LightSail-B, designed and built by the Planetary Society, will highlight the role of CubeSats — tiny satellites just 10 centimeters square that can be constructed for as little as $20,000 apiece. These spacecraft, built in a standardized template to hitch rides on larger space vehicles, are giving universities and other organizations the kind of space access once reserved for NASA, the Department of Defense, and big corporations. VIDEO: The Prox-1 microsatellite will be Georgia Tech’s first complete spacecraft. “Where the space sector once revolved around mammoth spacecraft taking decades and billions of dollars to build, we are now breaking complex space objectives into smaller chunks,” said Robert Braun, a professor in Georgia Tech’s Daniel Guggenheim School of Aerospace Engineering and director of its Center for Space Technology and Research (C-STAR). “Working together, a dozen small spacecraft might accomplish that same big objective at a fraction of the cost. These small spacecraft might be the size of a trash can or a night table, and they can be developed much more quickly, providing opportunities to utilize the latest technology.” In all, Georgia Tech researchers expect to launch six small satellites into Earth orbit over the next five years. Beyond that, they’re thinking about planetary exploration, and are helping design the instruments aboard spacecraft that may visit Europa, a moon of Jupiter whose ocean may harbor life. Other researchers are looking toward Mars, with the idea that tiny spacecraft could hitch a ride on larger probes to explore that planet or its moons. But designing and building small spacecraft and their instruments isn’t the whole story of Georgia Tech’s growing presence in space. Researchers are also improving the electric propulsion systems that will power both large and small spacecraft — and perhaps even help haul supplies to Mars. And in early 2016 on the International Space Station, they expect to begin testing what may be a future generation of photovoltaic cells to provide space power. CUBESAT LAUNCHER AND TRACKER In June, Bill Nye — better known as the “Science Guy” — told reporters what was happening in space aboard LightSail-A, a tiny craft that was unfurling a 32-square-meter Mylar sail designed to test the ability to move a spacecraft by capturing photons from the sun. Nye is CEO of the Planetary Society, which designed the CubeSat mission. At about the same time, in a wood-beamed control room in the ES&M building, Dave Spencer and a group of Georgia Tech students were tracking LightSail-A — and cheering when a photograph confirmed the sail’s opening. The Georgia Tech role in LightSail-A encompassed mission planning, satellite tracking, and mission operations. Spencer and the student team are currently building the Georgia Tech Prox-1 spacecraft that will launch the follow-on mission to LightSail-A. “The Prox-1 mission is to demonstrate automated trajectory control of one spacecraft relative to another spacecraft,” explained Spencer, a professor of the practice in the Georgia Tech School of Aerospace Engineering. “We are actually bringing that other spacecraft with us and deploying it from Prox-1.” VIDEO: The first of The Planetary Society's two LightSail spacecraft rode to space aboard an Atlas V rocket in May 2015. Georgia Tech’s first complete spacecraft, Prox-1 will be a fully functioning vehicle with a single cold-gas thruster for propulsion. Solar panels will provide power; faculty and students will operate it from the ES&M control room. But the real novelty is a small door on the side of Prox-1 that will release LightSail-B into space. “Prox-1 will deploy LightSail-B, maneuver relative to it, and demonstrate automated station-keeping to keep the two spacecraft in a desired formation,” explained Spencer, who served as a mission designer and project manager for several Mars missions at the Jet Propulsion Laboratory (JPL) before joining Georgia Tech. “If all goes as planned, Prox-1 will provide on-orbit inspection of the LightSail-B solar sail deployment, returning visible and infrared images of the event.” Launch of the $1.2 million spacecraft is scheduled for September 2016 aboard a Space-X Falcon Heavy rocket, which will also carry two main spacecraft and about a dozen small satellites. “Prox-1 is an ambitious mission that, if done by industry or the Department of Defense, would have cost about $80 million,” Spencer said. “We have driven down the cost by much more than an order of magnitude by leveraging a lot of CubeSat technology, involving students, and also testing new capabilities that haven’t flown before in space.” Dave Spencer, principal investigator for the Prox-1 spacecraft, is shown with the antenna that will allow faculty and students to operate the satellite from Georgia Tech’s campus in midtown Atlanta. Prox-1 will space qualify a number of devices and instruments, including: • A thermal infrared sensor provided by Arizona State University. Using an uncooled commercial-off-the-shelf sensor, the imager will help track LightSail-B. • Control moment gyroscopes provided by Honeybee Robotics that will help control the spacecraft’s orientation. • A 3-D printed thruster produced at the University of Texas at Austin. In fall 2015, the team was conducting “Day-in-the-Life” testing to verify functionality of the spacecraft subsystems and flight software. Prox-1 will be fully integrated in early 2016, prior to shipment to the Air Force Research Laboratory for environmental testing and launch integration. Significant funding for Prox-1 came from the Air Force Office of Scientific Research University Nanosatellite Program. More than 150 students have been involved in the project over the past four years. CATALOGING SPACE DEBRIS Space may be infinite, but some parts of it are getting crowded. NASA reports that there are a half-million pieces of space debris orbiting the Earth, and only objects larger than 10 centimeters — about the size of a softball — can be reliably tracked on radar. But smaller objects still pose a threat to spacecraft traveling at 17,500 miles per hour. Georgia Tech’s RECONSO mission will help address that problem by testing new technologies for identifying these hazards. RECONSO’s wide field-of-view sensor will allow it to detect, track, and characterize objects, adding to the information available for collision avoidance. “The relative velocity of these objects is typically between 5 and 12 kilometers per second,” said Marcus Holzinger, an assistant professor in the Georgia Tech School of Aerospace Engineering and RECONSO’s principal investigator. “That’s faster than any projectiles we shoot on Earth. Since the collision energy depends on the square of the velocity, even small objects can cause catastrophic failures.” Should speeding space junk hit a large spacecraft, the collision could create thousands of additional pieces of debris, worsening the problem. The debris density is greatest in areas of space that are especially useful, such as polar orbits. RECONSO will be a six-unit CubeSat carrying a six-megapixel CMOS imager with a field of view of 9 x 11 degrees. The imager should be able to detect even very faint objects. As with most very small spacecraft, power will be a challenge. RECONSO’s solar panels will provide just 25 watts of power — less than most home lightbulbs. But Holzinger expects that will be enough to operate an onboard computer to analyze the images and reduce the amount of data that must be downlinked to Earth. “When I set out to work in space situational awareness, I never thought I would end up helping clean up space,” said Holzinger. “With the number of space objects increasing and economics pointing toward more launches, the space situational awareness and space debris problems will need substantial attention and investment.” RECONSO, also funded through the University Nanosatellite program, is expected to launch in 2017. About 40 students are currently involved in the program through the Space Systems Design Laboratory in the Georgia Tech School of Aerospace Engineering. Teresa Spinelli, an undergraduate student in the School of Aerospace Engineering, leaves a clean room where Georgia Tech’s Prox-1 spacecraft is being assembled. FORMATION FLYING IN SPACE The sat phones that make calls from anywhere in the world depend on an array of 66 Iridium satellites orbiting around the globe. In the future, hundreds or even thousands of inexpensive satellites could similarly provide global Internet access or real-time Earth observations such as imagery, precipitation data, or climate change information. Current large satellites often know their position in space with great precision, but future inexpensive arrays will need less costly ways to know where they are. The Ranging and Nanosatellite Guidance Experiment (RANGE), another planned Georgia Tech satellite mission, seeks to address this issue with a series of experiments involving two small CubeSats flying in a leader-follower formation. Each satellite will weigh less than 2 kilograms and will collect measurements of both their absolute and relative positions using a miniaturized inter-satellite laser ranging system, as well as an onboard GPS receiver. These measurements will be checked by a ground-based laser ranging system operated by the Naval Research Laboratory. “Some of the experiments we want to do with the mission, such as the inter-satellite laser ranging, haven’t been done with CubeSats before, so this presents some engineering challenges,” said Brian Gunter, an assistant professor in the Georgia Tech School of Aerospace Engineering who is the principal investigator for the project. “We’re asking these small satellites to do a number of complex tasks, so the details can get complicated, and there are a lot of things we have to get right.” The two CubeSats will have no propulsion systems of their own, but by rotating one of the satellites so that the atmospheric drag on the solar panels is different, the relative distance between the satellites can be controlled. To do this, the researchers will use on-board magnetic torquers, which change the attitude of the spacecraft by interacting with the Earth’s magnetic field, as well as a reaction wheel that acts like a gyroscope to provide better attitude control about one axis. “We want to better determine the absolute and relative positioning of the two satellites,” explained Gunter. “Once you have that, you can think about having constellations or large formations of satellites and coordinating where they are relative to the Earth and one another. This would open up a range of new possibilities for future CubeSat missions, to include missions beyond Earth.” RANGE will require the use of miniaturized atomic clocks, GPS positioning systems, laser transmitters, and laser detectors. Because laser light travels at a known and constant speed, the satellites can determine how far apart they are by knowing how much time it takes a laser pulse to travel between them. The same timing systems can also be used to send binary communications, creating a combined laser ranging and communication system. Using this system, researchers also hope to achieve another CubeSat first: using the satellites to complete a communications loop, with a data packet going up to one CubeSat, being transmitted to the other, and then back down to Earth. Though a date hasn’t been finalized, RANGE is expected to launch in late 2016. Gunter is also working on proposals and initiatives to send CubeSats along with larger missions to planetary destinations such as Mars or Europa. “CubeSats would be great for planetary exploration because they are so small,” he said. “They could rideshare with a larger dedicated spacecraft, requiring minimal extra resources. Their low cost makes them expendable, so they can be used to explore science objectives that are too risky or inaccessible to the primary mission.” For example, the Martian moons Phobos and Deimos are not likely to be the target of a dedicated mission in the near future but could be excellent targets for CubeSats on one of the upcoming Mars missions. INSTRUMENTS TO EUROPA Europa, one of Jupiter’s moons, attracts special interest because its icy surface is believed to harbor an ocean of liquid water heated by expansion and contraction caused by Jupiter’s powerful gravity. That ocean is among the most likely locations for hosting life elsewhere in our solar system. Associate Professor Carol Paty and Assistant Professor Britney Schmidt from the Georgia Tech School of Earth and Atmospheric Sciences (EAS) are among the scientists helping develop the science components for two CubeSat missions being planned for possible inclusion on the Europa flagship-class mission recently started as an official NASA flight project. Schmidt led a study funded by the Jet Propulsion Laboratory (JPL) for the Europa Plume and Exosphere CubeSat (EPEC), which involved Aerospace Engineering Professor Glenn Lightsey and 16 student engineers and scientists collaborating with Baylor University to develop an end-to-end study of the CubeSat. Paty and Schmidt also served as science team members for the Jovian Particles and Fields Mission (JPF), another Europa CubeSat mission study, led by Aerospace Engineering’s Dave Spencer. EPEC would fly a dust detector instrument and possibly a mass spectrometer to study particles in the moon’s exosphere that could have originated in plumes from its surface. JPF would include a magnetometer and radiation dosimeter to study the induction signal for Europa’s ocean as well as complete a study of the magnetic and particle field environment around Jupiter. Other Georgia Tech researchers who participated in the Europa proposals are James Wray, Sven Simon, Paul Steffes, Thomas Orlando, and Josef Dufek. While both CubeSat missions remain in the study phase, the researchers hope they’ll advance to the second phase — and, ultimately, that NASA will decide to launch CubeSats as part of the larger flagship mission. “I have chosen to focus on Europa because of its potential to have what other places may not have: a stable source of energy from the tides that can power geological cycles of the lifetime of the solar system,” said Schmidt. “We hope to be able to one day characterize the subsurface of Europa using radar sounding, landed seismology, or, perhaps, roving submersibles.” Paty focuses on understanding the dynamics of planetary magnetospheres using space-based instruments such as the Cassini and Galileo spacecraft and the Hubble Space Telescope. Being able to obtain data on Europa from a small spacecraft could add significantly to her understanding of how these systems operate. “I’m thrilled to be involved in planning instrumentation that would provide more information on Europa,” said Paty, whose research has focused on the icy moons of Jupiter and Saturn. “I’m interested in bridging the gap between magnetospheric and atmospheric sciences in these strange worlds.” Their involvement demonstrates another key aspect of Georgia Tech’s growth in the space sector: multi-disciplinary involvement. Beyond aerospace engineers, the program involves electrical and mechanical engineers, computer scientists, planetary scientists, chemists, physicists, policy experts, and researchers from the Georgia Tech Research Institute (GTRI). ELECTRICALLY POWERED SPACE THRUSTERS In space, there are no fueling stations to replenish supplies for spacecraft propelled by chemical rocket engines. When they lift off the ground, they’re carrying all the energy they’ll ever have. But spacecraft using electrically powered thrusters replenish their energy through photovoltaic panels. Though electric thrusters lack the power to hurl spacecraft into orbit, they’re perfect for keeping them in the right location or changing orbits over time while in space. With funding from NASA, Department of Defense agencies, and industrial companies, Mitchell Walker and his students are working to improve electric thrusters using a towering silvery vacuum chamber in the High-Power Electric Propulsion Laboratory housed at Georgia Tech’s North Avenue Research Area. About the size of a coffee can, electric thrusters must often operate for thousands of hours, compared to just a few minutes for the more powerful chemical rocket engines that launch vehicles into space. The vacuum chamber allows Walker to test the thrusters long-term under conditions approximating space. It also allows him to understand the physics required to improve their performance, lifetime, and integration with spacecraft. VIDEO: The High-Performance Electric Propulsion Laboratory improves spacecraft thrusters. Walker’s thrusters use electricity to ionize a propellant gas: xenon, which is inert, easy to ionize, and of sufficient mass. Once ionized, atoms of the gas fly out of the thruster, applying the same Newton’s Law as chemical engines. Electric thrusters are already used in satellites that provide DirecTV and SiriusXM Radio, and they can also move spacecraft into higher orbits — even to other planets. Beyond their ability to obtain additional energy in space, electric thrusters reduce launch mass by requiring an order of magnitude less propellant and utilizing the spacecraft’s existing electrical system instead of a separate chemical system. Walker is interested in small satellites and even CubeSat arrays that might be assembled on orbit to make spacecraft large enough to produce hundreds of watts of power to operate revenue-producing sensors and obtain significant data transfer rates — as well as switch on electric thrusters. New classes of flexible photovoltaic arrays designed to be unfurled in space, in concert with lightweight deployable structures, could help provide the necessary power. “When people talk about going to Mars, electric propulsion will probably take their supplies there because the reduced propellant mass enabled by electric thrusters would allow a significant increase in the supplies delivered by each launch vehicle. That would reduce the total number of launches required,” said Walker, who’s an associate professor in the Georgia Tech School of Aerospace Engineering. “Based on our current technology, people will probably ride in a chemically powered spacecraft because these provide shorter trip times.” Beyond boosting power levels, Walker expects to see other signs of maturity in small spacecraft: insurance on even the smaller satellites and a growing role for industry. VIDEO: Mitchell Walker explains electric propulsion for our bi-monthly series, TECH+knowledge+Y. TESTING PV ON THE SPACE STATION Most spacecraft today depend on electricity from photovoltaic systems. Boosting the amount of electricity produced by these systems could help address the critical problem of power management in small satellites. These small spacecraft can’t afford mechanical systems that align solar panels to catch the most sunlight. That’s where three-dimensional solar cells developed in the Georgia Tech Research Institute (GTRI) could help. Built with miniature carbon nanotube “towers” that capture sunlight from all angles, the cells developed in Jud Ready’s lab could boost the amount of power obtained from the small surface areas many satellites have. In early January 2016, an experimental module, including 20 photovoltaic cells, is scheduled to be launched to the International Space Station (ISS), where it will be installed on the exterior to study how well the 3-D cells operate and survive under space conditions. The module will include four types of PV devices: 3-D cells based on traditional cadmium telluride, 3-D cells based on less costly copper-zinc-tin-sulfide (CZTS) materials, traditional planar solar cells, and planar cells based on CZTS. “We want to see both the light-trapping performance of our 3-D solar cells and how they are going to respond to the harshness of space,” said Ready, who is a GTRI principal research engineer and adjunct professor in Georgia Tech’s School of Materials Science and Engineering. “We will also measure performance against temperature, because temperature has a great influence on the performance of a solar cell.” Ready knows firsthand the risks of small spacecraft. A CubeSat named ALICE, developed by the Air Force Institute of Technology, was to have provided the first test of his “cold cathodes” — another technology based on carbon nanotubes that could be useful in spacecraft. ALICE was successfully launched in December 2013 but never established contact and has not been heard from since. The 20-cell ISS payload has been scheduled — and then bumped — from three previous missions, fortuitously including one that later exploded on launch over Wallops Island, Virginia. RISE OF THE SMALL SATELLITE Through the Center for Space Technology and Research (C-STAR), Georgia Tech is helping create a future in which small satellites return significant scientific, economic, and national security benefits to the United States. While continuing to support traditional missions through NASA, Department of Defense agencies, and corporate partners, Georgia Tech’s initiative in small satellites offers an opportunity to get into space faster, at a lower cost, using cutting-edge technology — and in ways that can provide hands-on research experiences for more students. “The small satellite culture is well aligned with Georgia Tech’s high-risk, high-reward research philosophy,” said Robert Braun, who is former chief technologist at NASA. “You don’t have to work for the government or a large company today to build a spacecraft. Universities and small companies all over the country are building spacecraft in rapid sequence, and the pace of innovation in this area has been remarkable.” Glenn Lightsey is among Georgia Tech’s newest faculty members, but his background includes nearly 30 years of space experience, including development of a half-dozen small satellite projects during his time at the University of Texas at Austin. He sees small spacecraft making space exploration available to organizations that previously had been locked out by cost. “There are only two ways to reduce cost,” he said. “One is to reduce the cost of the delivery vehicles, and a lot of new U.S. companies created in the last decade are doing that. The other way is to accomplish the same function in a smaller package. That has been enabled in the last 20 years by the miniaturization of components in the cellphone mass market. We’re taking advantage of that.” Beyond miniaturization has been the standardization of the system used to launch CubeSats. Lightsey compares those to the cargo containers that revolutionized worldwide logistics by making it easier for goods to move from ships to trains and trucks. “Because we have that standard, we get an economy of scale we wouldn’t get otherwise,” he said. And some missions can be improved by using multiple smaller vehicles, which reduces the risk related to losing a single large spacecraft. “You can have much more sophisticated missions with smaller satellites than you could even five years ago,” Lightsey said. “I’m riding that wave with many of my colleagues to see what we can do with these smaller satellites.” Among the greatest beneficiaries of the small satellite revolution may be students. “We used to teach space systems engineering from a textbook,” noted Braun. “It was entirely theoretical. While we still teach the fundamentals, now an individual student can help conceive a space mission, build a space structure, integrate it with an electronic system, do the necessary testing, and participate in space mission operations. These systems are going from concept to flight in a time frame that is consistent with a student’s academic degree milestones.” In addition to NASA, Department of Defense agencies, and the large aerospace companies, space missions are now being performed by new companies like SpaceX, Planet Labs, Virgin Galactic, Google, and Sierra Nevada. Today, there is a broad range of opportunities across the growing civilian, military, and commercial space sectors for space systems engineers. “There is a fundamental change taking place, and our students have the opportunity to get in on the ground floor and be part of that innovation,” Lightsey said. “This is really an exciting time to be starting a career in aerospace. We’ll see things happen in the next 50 years that we can’t even imagine right now.” John Toon is director of research news at Georgia Tech and editor of Research Horizons magazine. He’s been writing about Georgia Tech research and economic development activities for more than 30 years. Research described in this article has been sponsored by the Air Force Office of Scientific Research, the Air Force Research Laboratory, and the National Aeronautics and Space Administration (NASA). Any conclusions or recommendations are those of the principal investigators and may not represent the official views of the sponsoring agencies.
<urn:uuid:837765bf-7b43-4e5f-be8c-871c6b412227>
CC-MAIN-2016-26
http://www.rh.gatech.edu/features/future-small
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783404826.94/warc/CC-MAIN-20160624155004-00078-ip-10-164-35-72.ec2.internal.warc.gz
en
0.931057
5,428
3.4375
3
The world is already on its way to a warmer future, and without radical change, experts said yesterday, that temperature rise soon will reach crisis levels. Scientists estimate that the planet has already warmed by about 0.8 degree Celsius since the 1850s, and new projections put temperature rise as high as 4 degrees by the middle of the 21st century if current emissions levels persist. Greenhouse gas reductions to date are failing to address climate change, said Naoko Ishii, CEO of the Global Environment Facility (GEF), the financial mechanism of the U.N. Framework Convention on Climate Change. "We are on the wrong track in terms of global environmental management," Ishii said yesterday at a discussion hosted by the American Association for the Advancement of Science. "We are dangerously close to the limits of safe planetary boundaries, and we are racing with time." According to a recent report by the GEF Scientific and Technical Advisory Panel (STAP), at current emissions levels, warming could reach 2 degrees Celsius by 2030 and up to 6 degrees before the end of the century. "The report makes it crystal-clear incremental improvement ... will not suffice," Ishii said. "We need a transformational change to arrest this very, very worrisome downward spiral." Viable ways remain to close the gap At the 2011 U.N. climate talks in Durban, South Africa, the global community agreed to signing an international climate treaty in 2015 that would come into effect in 2020 with the goal to keep temperature rise below 2 degrees Celsius by the end of the century. To achieve that goal, the "Emissions Gap Report 2012" by the U.N. Environment Programme (UNEP) found that greenhouse gas emissions needed to peak around 2020 or before. Emissions need to be a quarter below current levels by 2030 and 50 percent below current levels by 2050. If all existing pledges to reduce greenhouse gas emissions were implemented, there would still be a 14-gigaton surplus in the amount of emissions produced and where they need to be. However, the UNEP report also determined there are economically viable ways to close the gap. By combining strict compliance with more ambitious pledges, the potential exists to bring down emissions by 17 gigatons, said Joseph Alcamo, chief scientist at UNEP. But the key is to pursue policy packages that appeal to local and national self-interests. Implementing bus rapid transit and vehicle performance standards, for instance, has the almost immediate and calculable effects of improving local air quality and easing traffic, he said. It also has the associated benefit of cutting down carbon emissions. "Those in climate change have been narrow-minded with mitigation; now we need to see multiple connections between climate mitigation policies and increasing well-being all across the board," Alcamo said. The STAP report specifically recommends that the GEF broaden its focus in helping developing countries transition to a low-carbon economy. It advises a shift from promoting single-technology or single-sector solutions to systematic solutions that combine things like reducing energy demand with policy development and innovative information technology systems. Involvement from private sector essential Governments and institutions must also address adaptation, added Rosina Beirbaum, a professor of natural resources and the environment at the University of Michigan. "If we wait more, adaptation measures will be more costly and less effective," she said. To effectively tackle climate change would require investing 2 percent of global gross domestic product, or $1.5 trillion per year, to stop the increase in greenhouse gas emissions, said Pavan Sukhdev, head of UNEP's Green Advisory Economy Initiative. Funding from groups like the GEF and the World Bank can be leveraged to put in place effective decarbonization programs, but to have a real transformation toward low-carbon growth, funding has to come from the private sector, he argued. The private sector makes up 75 percent of GDP in the United States and around 60 percent globally, said Sukhdev. He recommended shifting corporations' behavior with policies that promote accountable advertising, resource taxation and measures for corporations to disclose the real costs of their actions beyond dollars and cents. "If today's private sector is pushing the economy in the direction toward resource use ... we want to get our hands around the need to change the way the private sector is incentivized and operates," he said. "What the world needs is not more money, but money spent better," he added. Reprinted from Climatewire with permission from Environment & Energy Publishing, LLC. www.eenews.net, 202-628-6500
<urn:uuid:aefdd3b0-f62d-4648-b9f9-c7fc157dcb9d>
CC-MAIN-2016-26
http://www.scientificamerican.com/article/nations-change-too-slowly-too-combat-climate-change/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395346.72/warc/CC-MAIN-20160624154955-00169-ip-10-164-35-72.ec2.internal.warc.gz
en
0.948294
941
3.40625
3
« Cobalt Technologies demonstrates capability of biocatalyst conversion of biomass sugars to n-butanol; confirms 40-60% cost reduction compared to petroleum-derived n-butanol | Main | US DOT to hold public meeting on Vehicle-to-Infrastructure research » New “convection battery” could significantly increase performance of existing as well as new, improved battery chemistries 8 March 2012 |Schematic of the convection cell. Credit: Prof. Galen Suppes. Click to enlarge.| Researchers at the University of Missouri’s Department of Chemical Engineering (MU) have developed and demonstrated a new type of battery, referred to as the “convection battery” or “convection cell”. The convection cell pumps electrolyte through porous electrodes to decrease diffusion overpotential losses and make the potential more uniform throughout the electrode. Research is being performed under the guidance of Galen J. Suppes, the J.C. Dowell Professor in Chemical Engineering. In a new paper submitted to AIChE Journal on the work, Dr. Suppes notes that a major difference between the new convection battery and conventional flow batteries (including air batteries) is that a single electrolyte is used in both the anode and cathode in the convection cell. Further, all active materials exist and remain in a solid state in the electrodes. The circulation of the electrolyte allows for the transfer of ionic intermediates between the electrodes to allow for the electrochemical reactions to proceed. By contrast, the flow battery requires two separate electrolytes because active species are dissolved in the electrolyte(s)—flowing through the separator would mix reactive species outside the desired half-cell scheme. Suppes and his colleagues initially validated their concept of the convection cell using a zinc-alkaline chemistry. In the paper reporting that work (Suppes et al. 2011), they concluded that: Flow batteries have a few major advantages over traditional diffusion-based battery designs. For instance, higher power output is possible with the flow (reported to 500 mA/ cm2) of electrolyte when one of the reagents is stored in the electrolyte. For these high-power output batteries, the flow of electrolyte also facilitates heat removal. Elimination or substantial reduction of membrane separators is another advantage of flow batteries. The flow battery proposed in this work is different than the traditional flow batteries because all reagents and products reside as solids, which are part of the electrodes. Ionic intermediates flow through the electrolyte but do not accumulate. An advantage of having solid reagents is that the activity of the reagents remains nearly constant during use, whereas both the concentration and voltages from soluble reagents will decrease with use. Solid-substrate batteries also tend to have higher energy densities because of a more constant voltage output and the higher molar densities of pure solid reagents vs. solvated reagents. ...This flow battery has the potential to gain higher energy densities than other types of flow batteries and provides an excellent platform for rechargeable lithium batteries that allow use of metallic lithium in the anode.—Suppes et al. 2011 For small batteries, the team notes, conventional diffusion-based architectures are superior because the cost of the circulating pump alone would be more than the cost of the traditional diffusion-based battery. However, for larger batteries, the savings in separator and cathode intercalation material costs can more than offset the cost of a pump. Typical applications of the new convection battery would be plug-in hybrid electric vehicles and electric grid energy storage, they suggested. Other advantages of the convection battery could include: Better use of thicker electrodes due to a more-uniform distribution of potential in the electrodes. Reduced separator and current collector materials which results in lower cost and higher energy density batteries. Mitigation of dendrite formation through multiple mechanisms including shear forces from flow which can inhibit single-crystal growth. Elimination of drying of electrodes through replenishing of electrolyte. Easy temperature management by flow of electrolyte through heat exchangers. Ability to routinely drain electrolyte from cells during non-use to increase cell life. Ability to increase electrode separation distance due to decreased concentration gradients across the separator. Ability to implement measures that will better-allow use of metallic lithium. In the new paper submitted to AIChE Journal, they validated their concept using lithium iron phosphate chemistry. The selected LiFePO4 for study because it is a lithium-ion battery technology widely regarded as having a good combination of high energy density, good cyclability, safety benefits, and reasonable cost. It is important to recognize that these are only initial, validating studies, the team cautions. Future studies will be needed to increase capacity utilization, identify the best match of materials with the needs of the convection battery, better distinguish between advantages of flow-by versus flow-through separators, and generally optimize performance. Research on the convection battery, initiated in 2008, has received funding from both the National Science Foundation and the Energy Innovations Small Grant Program of the California Energy Commission. Research results have been published in the American Institute of Chemical Engineers (AICHE) Journal and the Journal of Applied Electrochemistry. They were also presented at the AICHE annual meeting in October 2011. Since then, definitive data has been collected that validates increased power output and recharging capabilities. In the validating studies, the convection battery provided about six times as much power output as an identical, traditional battery without a pump, and a series of use and charge cycles yielded outstanding performance. One of the most promising aspects of this technology, the team notes, is that it can be used to improve the best available battery chemistries, as well as future breakthroughs in materials and chemistries. This compatibility is with traditional battery chemistries such as the lead-acid battery and the batteries currently used in electric vehicles—the convection battery is not necessarily compatible with “flow battery” or “air battery” chemistries. Multiple patents have been filed on the convection battery, and it is anticipated that the intellectual property will be preserved to allow major commercial opportunities in the US, estimated to be available by the end 2014. Professor Suppes was the recipient of the 2006 Presidential Green Chemistry Challenge Award. He is the co-author of the book entitled “Sustainable Nuclear Power”. Suppes, Galen J.; Bryan D. Sawyer; Michael J. Gordon (2011) High-Energy Density Flow Battery Validation. AIChE Journal 57(7): p. 1961-1967 doi: 10.1002/aic.12390 - Bryan D Sawyer; Michael J Gordon; Michael G Heidlage; Galen J Suppes (2011) Impact of electrode separator on performance of a zinc/alkaline/manganese dioxide packed-bed electrode flow battery. Journal of Applied Electrochemistry, 41(5), 543-550 doi: 10.1007/s10800-011-0264-5 TrackBack URL for this entry: Listed below are links to weblogs that reference New “convection battery” could significantly increase performance of existing as well as new, improved battery chemistries:
<urn:uuid:330122d1-615f-4531-a269-9607f65f8baf>
CC-MAIN-2016-26
http://www.greencarcongress.com/2012/03/suppes-20120308.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783403826.29/warc/CC-MAIN-20160624155003-00049-ip-10-164-35-72.ec2.internal.warc.gz
en
0.924108
1,517
2.734375
3
As your child gets older, he can begin to use the health care system on his own. When it comes to teenage health care, your child has responsibilities as well as rights. Health care and your teenager As your child matures she’ll become more responsible for different parts of her life, including her health care. It might be tricky to find a balance between guiding your child’s health care needs and encouraging her to be independent. The balance will keep changing too. The health care guidance your child needs at 12-14 years will be different from what he needs when he’s 15-17 years or 18-19 years. While your child is still in early adolescence, it can be a good idea for her to see the doctor on her own for part of a consultation. When your child should start seeing a health professional alone is something you and your child can work out together. Teenage health care: your child’s rights Consent for treatment As your child matures, health professionals such as GPs, specialists, psychologists, physiotherapists and dentists will start taking into account your child’s opinions and ability to make independent health care decisions. In fact, the law recognises that teenagers become more able to make health care decisions as they move towards adulthood. In Australia parents and teenagers both have rights to consent to a teenager’s treatment. The age at which a young person can consent to simple health care treatments without involving a parent or guardian is around 14 years. This means your teenage child can make start making decisions by himself and for himself, if health professionals believe he can understand the health problem, consequences of treatment choices and any potential risks from procedures or interventions. From the age of 16 years, your child can consent to medical and dental treatment with the same authority as an adult. But she doesn’t have an automatic right to refuse medical treatment, particularly life-saving treatment. As a parent, you have rights in relation to your child’s treatment. Parents or health professionals can mount a legal challenge if a teenager has refused medical treatment in life-threatening circumstances. Similarly, if the legal position of consent isn’t clear, or if there is a dispute about treatment, the court can make a decision based on the ‘best interests’ of the child. In general, when your child is 18 years old she’s considered to have full legal capacity to give consent to, and refuse, medical treatment. Confidentiality and teenagers Confidentiality means keeping health and personal information private and safe. In most situations, doctors and other health professionals can’t tell anybody else – including you – what your child tells them during a consultation, unless your child says that it’s OK. Health information includes things that are talked about and written in computer files or on paper, as well as treatment details. Confidentiality is a legal requirement for doctors and other health professionals. Health professionals can break your child’s confidentiality if they believe that your child is: - at risk of harming or killing himself - being harmed, or at risk of being harmed - harming someone else or at risk of harming someone else. Confidentiality might also be broken for legal reasons such as a court subpoena or other statutory requirements like child protection. This would only happen in very serious cases. Where possible health professionals would talk with your child about breaking confidentiality beforehand, explaining what they will share, who they will tell and why. Confidentiality is one of the biggest concerns for teenagers. If they feel that confidentiality might be broken, it can stop teenagers from seeking help. Time alone with health professionals can help teenagers feel confident to talk about personal issues, and build trust that the health professional will keep their health information private. You can help your child feel comfortable about seeking help by respecting her right to privacy and talking about confidentiality. Teenage health care: your child’s responsibilities Your child can take responsibility for his health care by: - going to appointments and telling services when he can’t - answering questions and giving information about his health in an open and honest way - letting health professionals know about changed circumstances that might put his health care at risk - letting health professionals know if he decides to change or stop treatment - respecting health care staff and other people using services, and thinking about other people’s rights and needs - taking an active part in his health care decisions and asking questions if he’s not sure about what’s happening to him - speaking up when he’s not happy about the care he’s getting so that issues can be dealt with quickly and fairly. Health records and sharing information All health professionals keep records of appointments. These records are kept confidentially, and there are laws and guidelines about how they’re shared. Your child’s e-Health record A national electronic health (e-Health) record system is now operating in Australia. Your child can create a secure, personally controlled online summary of her health information. Your child can control what goes into his record and who has access to it. The e-Health record allows your child and his doctors, hospitals and other health professionals to view and share his health information. Sharing your child’s health information So your child can get the best possible health care, health professionals might need to share information with treatment team members. Health professionals share only information that benefits your child’s treatment and care. On most occasions the professional will ask for your child’s permission to share information. If there are particular things your child doesn’t want to be shared, encourage her to tell the health professional. In public hospitals relevant health care information can be shared among treating health professionals (without formal consent) when it helps patient care – for example, test results and information about treatments or interventions. Sharing health information between public and private services or between private health professionals requires your child’s permission. Raising teenage health care concerns If your child has any concerns about privacy, confidentiality, type of treatment, length of treatment or the way he’s being treated, it’s best if he raises them with the health professional at the time. If this doesn’t sort out the concern, your child can lodge a complaint through the Australian Health Practitioner Registry Association (AHPRA). AHPRA manages the governing boards of many health professions. Your child’s health care entitlements Your child can get her own Medicare card when she’s 15, or younger if you request it. Your child can also choose to stay on your family Medicare card and have a copy made to keep with her. The Pharmaceutical Benefits Scheme (PBS) The PBS helps to cover the cost of prescription medicines. It includes over 4000 brands of prescription medicines. If the doctor writes a non-PBS or private prescription, you or your child will need to pay the full price for the medicine. Also, if your doctor prescribes a higher-priced brand of medicine, you might need to pay more. If your child is an Australian resident or visiting from a country that has a Reciprocal Healthcare Agreement with Australia, he can get medicine at a lower cost under the PBS. If you’re a veteran and your child is dependent on you, she can get PBS medicines and some other medicines at a lower cost under the Repatriation Benefits Scheme (RPBS). If your child is eligible, or as a family you’re eligible, for an Australian Government concession card, your child will also pay less for PBS medicines. This is when Medicare pays the whole cost of seeing a health professional. Medicare covers the cost of all public hospital clinics and treatment as a public (Medicare) patient in a public hospital. Medicare sometimes covers the whole cost of treatment by health professionals such as doctors, including specialists, participating optometrists and dentists. Not all health services or professionals bulk bill. If your child is making his own appointment, remind him to ask if the health care service or professional bulk bills. If they don’t, your child can ask about costs and whether he can get some of the fee or the whole fee back from Medicare. This is when Medicare pays part of the cost of seeing some health professionals, as part of the Medicare Benefits Scheme. It’s called getting a Medicare rebate. Many GPs and specialists can reimburse Medicare rebates at the time of the consultation, providing you’re registered with Medicare. Otherwise your child will have to go to a Medicare office with the receipt for her consultation. There’s often a gap between what health professionals charge and what Medicare pays. This is called a ‘gap fee’ and varies depending on what the health professional charges. Private health care As your child matures and takes on more responsibility for his own health care, you could consider arranging for him to have his own private health fund card (as part of a family policy, if you have private health insurance). This would send a strong message that you value your child’s right to health care privacy and confidentiality, and that you trust her to make decisions about her own health. Before taking this step, you might want to think about some of these questions: - Is my child ready to have his own private health fund card? - What do I need to discuss with my child before starting this arrangement? - What support might my child need to navigate and use health care systems? - What financial arrangements might I need to put in place to ensure that my child can use the card effectively, such as paying gap fees? - Am I ready to let go and encourage my child to access health care on her own? - How do I negotiate with my child to tell me about any serious health conditions so that I can support him?
<urn:uuid:b832eef4-2fc5-4e3d-953b-a8288ce180b3>
CC-MAIN-2016-26
http://raisingchildren.net.au/articles/teenage_health_care_rights.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783404405.88/warc/CC-MAIN-20160624155004-00170-ip-10-164-35-72.ec2.internal.warc.gz
en
0.950206
2,070
3.21875
3
At a mine near Timmins, Ontario, a research team found water hiding 1.5 miles deep below the surface, in what is the oldest part of North America’s crust, the Canadian Shield. The water is estimated to be around 2.64 billion years old, which would give scientists a glimpse into the climate of Earth’s past. The site at which the water was found is largely untouched by factors that would have tampered with the preservation of the water, such as seismic activity or standard erosion. Since the water wasn’t exposed to air while it was kept inside its sedimentary tomb, this means that the water contains gasses from the time period at which it was last exposed to air, thus providing researchers with a look at an ancient Earth climate. Rather than just teaching us about a past climate, the type of ground in which the water was found and the way in which the water was preserved, are similar to the way water could be trapped underneath the surface of Mars. This means it’s possible that Mars has hidden reservoirs of water trapped below tectonically stable terrain, and you know what every scientist likes to propose could possibly exist when discussing water on an alien planet. The scientists also noted that the water at the Timmins site was found to have as much hydrogen gas as the water found in areas with hydrothermal vents, which in turn are responsible for creating unique ecosystems in harsh, strange environments. So, you can bet scientists will use that nugget to nudge their proposal of potential alien life trapped below the surface of Mars.
<urn:uuid:34e4752f-06ef-4f34-98e5-2ad7041866be>
CC-MAIN-2016-26
http://www.geek.com/science/2-6-billion-year-old-water-found-hidden-below-canada-could-mean-water-and-life-still-on-mars-1555514/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397567.28/warc/CC-MAIN-20160624154957-00123-ip-10-164-35-72.ec2.internal.warc.gz
en
0.980475
324
4.3125
4
|Risk of extinction| The World Conservation Union (IUCN) are the experts on threatened species. They put threatened species into three groups, each group in more danger than the next: One way scientists can work out how threatened a species is, is to measure the birth and death rates. If a species becomes small in numbers, it can get to a critical point. This happens when there are not enough individuals left alive to continue the species (critical depensation). Species that are not a threatened species, but are still a concern, can be put into groups of Near Threatened, Least Concern, and Conservation Dependent. Conservation dependent is no longer used a group. When the species has not been studied, Not Evaluated, or there is not enough information, Data Deficient, the IUCN does not put them on the threatened species list. Threatened species are also called "red listed" species, because they are in the IUCN Red List of Threatened Species. United States definition[change | change source] Under the Endangered Species Act in the United States, "threatened" means any species which is likely to become endangered in the near future, in all, or a large part of its range. The Bay checkerspot butterfly (Euphydryas editha bayensis) is an example of a threatened species protected by the Endangered Species Act.
<urn:uuid:171a4fdf-bdd7-46cd-8097-24f9a60ece97>
CC-MAIN-2016-26
https://simple.wikipedia.org/wiki/Threatened_species
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783404826.94/warc/CC-MAIN-20160624155004-00074-ip-10-164-35-72.ec2.internal.warc.gz
en
0.90121
291
4.03125
4
Mission and goals Chemical engineering and chemical engineers provide the leading-edge solutions to the society’s needs: we need efficient and clean technologies for energy transformation, technologically advanced materials, better medicines, efficient food production techniques, a clean environment, a better utilization of the natural resources. Chemical Engineering plays a pivotal role because all these challenges have a common denominator: they involve chemical processes. Chemical engineers are the "engineers of chemistry": by making use of chemistry, physics and mathematics they describe the chemical processes from the molecular level to the macroscale (chemical plant), and design, operate, and control all processes that produce and/or transform materials and energy. Students holding a Bachelor degree and at least 15 years of education are eligible for application. For admission to the Master of Science in Chemical Engineering, a strong preparation both in general core disciplines (mathematics, physics, etc..,), and in those specific to chemical engineering and industrial engineering is required. The Chemical Engineering programme includes mandatory courses on Chemical reaction engineering and applied chemical kinetics; Advanced calculus; Industrial organic chemistry; Unit operations of chemical plants, Mechanics of solids and structures; Applied mechanics. Other courses can be selected by the students on many subjects related to e.g. chemical plants and unit operations, safety, process design, catalysis, material science, numerical methods, environmental protection, food production, energy, biomaterials, etc.. A proper selection of the eligible courses will lead to specializations as Process engineering, Project engineering or Product engineering. The Master of Science programme in Chemical Engineering completes the basic preparation of the bachelor chemical engineer and provide guided paths towards high-level professional profiles which are employed in various industrial sectors including the chemical, pharmaceutical, food, biological and automotive industry; energy production and management; transformation and process industries; engineering companies designing, developing and implementing processes and plant; research centres and industrial laboratories; technical structures in Public Administration; environmental and safety consultancy firms. This school offers programs in: Last updated May 12, 2016
<urn:uuid:f690bb2d-0bd3-4a6b-8dd9-d03658c1f6d4>
CC-MAIN-2016-26
http://www.masterstudies.com/Chemical-Engineering-PM/Italy/PdM/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396222.11/warc/CC-MAIN-20160624154956-00046-ip-10-164-35-72.ec2.internal.warc.gz
en
0.894646
413
2.765625
3
The 2014 World Cup Brazil is less than two months away and the only thing people are talking about is soccer, soccer and more soccer. But preparing a country for one of the world’s largest sporting events involves more. There is a bigger picture than just the game of soccer. Most people are unaware, but Brazil has been undergoing drastic changes. In order to get ready for the World Cup, the slums are being forced out of the outer cities of Brazil and into the capital city, Brasilia. Brazil does not have enough room to keep all the poor people, find a place to build soccer stadiums in 12 host cities, and cater to the mass amounts of people flooding Brazil for the World Cup. Getting ready for the World Cup has been at the cost of the slums and poverty in Brazil. Brazil has struggled to reclaim the slums where more than 11 million Brazilians live, and the World Cup is making it even harder. According to research, 19,200 families in and around Rio de Janeiro have been pushed out of their homes and an estimated additional 100,000 residents will continue to be moved leading up to the World Cup. The eviction of favelas has been largely due to the number of construction projects taking place. Brazil has had to build soccer stadiums, roads, highways, airports and public transportation in preparation. The government is moving people out of the slums because to them making their country look more developed and urbanized is more important than the poor people in Brazil. The construction projects have also demolished dozens of favelas because they were built in high-risk areas or the government needs the space to build and it is designated for public use. These poor people have nowhere to go, but the government has stepped into help. The government has offered some Brazilians homes in newly constructed complexes, but these locations are far form where people work and have lived their whole lives. Along with hurting the favelas, the upcoming World Cup in Brazil has affected people making a living on the streets. FIFA imposed a ban that will affect vendors who work the street corners. Brazil is also trying to regulate street vending for the World Cup by corralling sellers in officially designated areas. The 2014 World Cup is one of the world’s most historic sporting events. National teams prepare for four years to perform on a national stage trying to prove they are the best team in the world. Fans wait four years to travel around the world to see their favorite team play on the biggest stage in the world. The World Cup may seem as if it is only about soccer and who is the best team in the world. But to many the World Cup is more than that. It brings countries together and allows them to focus on nationalism for a straight month. It brings excitement, but also reality that people in the host country are being negatively effective.
<urn:uuid:aaf1de87-95e3-4361-8c80-7d0c04a93c72>
CC-MAIN-2016-26
http://isportsweb.com/2014/04/15/world-cup-bigger-picture/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783400031.51/warc/CC-MAIN-20160624155000-00013-ip-10-164-35-72.ec2.internal.warc.gz
en
0.978292
577
2.5625
3
You might think that the SecondaryNameNode is a hot backup daemon for the NameNode. You’d be wrong. The SecondaryNameNode is a poorly understood component of the HDFS architecture, but one which provides the important function of lowering NameNode restart time. This blog post describes how to configure this daemon in a large-scale environment. The default Hadoop configuration places an instance of the SecondaryNameNode on the same node as the NameNode. A more scalable configuration involves configuring the SecondaryNameNode on a different machine. About the SecondaryNameNode The NameNode is responsible for the reliable storage and interactive lookup and modification of the metadata for HDFS. To maintain interactive speed, the filesystem metadata is stored in the NameNode’s RAM. Storing the data reliably necessitates writing it to disk as well. To ensure that these writes do not become a speed bottleneck, instead of storing the current snapshot of the filesystem every time, a list of modifications is continually appended to a log file called the EditLog. Restarting the NameNode involves replaying the EditLog to reconstruct the final system state. The SecondaryNameNode periodically compacts the EditLog into a “checkpoint;” the EditLog is then cleared. A restart of the NameNode then involves loading the most recent checkpoint and a shorter EditLog containing only events since the checkpoint. Without this compaction process, restarting the NameNode can take a very long time. Compaction ensures that restarts do not incur unnecessary downtime. The duties of the SecondaryNameNode end there; it cannot take over the job of serving interactive requests from the NameNode. Although, in the event of the loss of the primary NameNode, an instance of the NameNode daemon could be manually started on a copy of the NameNode metadata retrieved from the SecondaryNameNode. Why should this run on a separate machine? - Scalability. Creating the system snapshot requires about as much memory as the NameNode itself occupies. Since the memory available to the NameNode process is a primary limit on the size of the distributed filesystem, a large-scale cluster will require most or all of the available memory for the NameNode. - Durability. When the SecondaryNameNode creates a checkpoint, it does so in a separate copy of the filesystem metadata. Moving this process to another machine also creates a copy of the metadata file on an independent machine, increasing its durability. Configuring the SecondaryNameNode on a remote host An HDFS instance is started on a cluster by logging in to the NameNode machine and running $HADOOP_HOME/bin/start-dfs.sh (or start-all.sh). This script starts a local instance of the NameNode process, logs into every machine listed in the conf/slaves file and starts an instance of the DataNode process, and logs into every machine listed in the conf/masters file and starts an instance of the SecondaryNameNode process. The masters file does not govern which nodes become NameNodes or JobTrackers; those are started on the machine(s) where bin/start-dfs.sh and bin/start-mapred.sh are executed. A more accurate filename might be “secondaries,” but that’s not currently the case. - Put each machine where you intend to run a SecondaryNameNode in the conf/masters file, one per line. (Note: currently, only one SecondaryNameNode may be configured in this manner.) - Modify the conf/hadoop-site.xml file on each of these machines to include the following property: 123456789<tt><property><name>dfs.http.address</name><value><em>namenode.host.address</em>:50070</value><description>The address and the base port where the dfs namenode web ui will listen on.If the port is 0 then the server will start on a free port.</description></property></tt> This second step is less obvious than the first and works around a subtlety in Hadoop’s data transfer architecture. Traffic between the DataNodes and the NameNode occurs over a custom RPC protocol; the port for this protocol is specified in the URI supplied to the fs.default.name property. The NameNode also runs a Jetty web servlet engine on port 50070. This servlet engine generates status pages detailing the NameNode’s operation. It also communicates with the SecondaryNameNode. The SecondaryNameNode actually performs an HTTP GET request to retrieve the current FSImage (checkpoint) and EditLog from the NameNode; it uses HTTP POST to upload the new checkpoint back to the NameNode. The conf/hadoop-default.xml file sets dfs.http.address to 0.0.0.0:50070; the NameNode listens on this host mask and port (by default, all inbound interfaces on port 50070), and the SecondaryNameNode attempts to use the same value as an address to connect to. It special-cases 0.0.0.0 as “localhost.” Running the SecondaryNameNode on a different machine requires telling that machine where to reach the NameNode. Usually this setting could be placed in the hadoop-site.xml file used by all daemons on all nodes. In an environment such as Amazon EC2, though, where a node is known by multiple addresses (one public IP and one private IP), it is preferable to have the SecondaryNameNode connect to the NameNode over the private (unmetered bandwidth) IP address, while you connect to the public IP address for status pages. Specifying dfs.http.address as anything other than 0.0.0.0 on the NameNode will cause it to bind to only one address instead of all available ones. In conclusion, larger deployments of HDFS will require a remote SecondaryNameNode, but doing so requires a subtle configuration tweak, to ensure that the SecondaryNameNode can communicate back to the remote NameNode.
<urn:uuid:c7144ac8-5c59-43a1-a9c4-25504f291504>
CC-MAIN-2016-26
http://blog.cloudera.com/blog/2009/02/multi-host-secondarynamenode-configuration/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395160.19/warc/CC-MAIN-20160624154955-00110-ip-10-164-35-72.ec2.internal.warc.gz
en
0.857181
1,261
2.625
3
‘Pearls in Peril ‘- securing the future of the freshwater pearl mussel in Great Britain ‘Pearls in Peril’ is a LIFE+ NATURE project co-funded by 14 organisations across Scotland, England and Wales. This nationwide project will act to safeguard important populations of freshwater pearl mussel (Margaritifera margaritifera). The project runs for four years, from September 2012 to September 2016. In that time, a wide range of conservation measures will be implemented in key river systems. The measures will aim to: - RESTORE the habitat of freshwater pearl mussel and salmonids; - SECURE the long term survival of existing freshwater pearl mussel populations; and COMMUNICATE with local, national and international audiences to raise awareness of freshwater pearl mussel conservation issues. Best practice methods will be used to secure freshwater pearl mussel populations. These actions include: - restoring and improving riparian habitat by planting native trees and fencing riverbanks; - restoring in-stream habitat for freshwater pearl mussels; - reducing diffuse pollution by ditch blocking, creating buffer strips and wetlands; - encysting juvenile salmon with local pearl mussel larvae; - monitoring habitat, water quality, and pearl mussel and host salmonid populations; - employing a riverwatch scheme to reduce the risk from wildlife crime; - delivering ‘Pearls In The Classroom’ – an education programme to raise awareness of the freshwater pearl mussel amongst children; and - raising awareness of freshwater pearl mussels and the project. A total of 21 rivers across Britain will be involved, all of which are NATURA 2000 sites and are designated as Special Areas of Conservation (SACs). In Scotland, these are the Rivers Dee, South Esk, Spey, Evelix, Naver, Borgie, Oykel, Fionaven, Abhainn Clais an Eas, Allt a’Mhuilinn, Ardvar & Loch a’Mhuilinn Woodlands, Inverpolly, Moidart, Kerry, Glen Beasdale, Ardnamurchan Burns, Rannoch Moor, North Harris, Moriston and Mingarry Burn on Mull. In England the project will involve the River Ehen in Cumbria and, in Wales, the Afon Eden in Snowdonia. “Maggie , my story” is a booklet produced by the Freshwater Pearl Mussel Practical Measures Project (2013) in Ireland and Northern Ireland. Aimed at young readers, the booklet tells the story of Maggie the Mussel’s lifecycle, history and threats to her species’ survival. Read the booklet by clicking on the image below. Pearl Mussel Activity Book – Maggie the Mussel Click to find out who our PROJECT PARTNERS are HERE Click to read the latest PROJECT NEWS HERE PROJECT STAFFSteff Ferguson – Agricultural Project Officer (Based at River Dee Office – job share) River Office Mill of Dinnet Aboyne Aberdeenshire AB34 5LA Tel 013398 80411 Mob 07760 178264 Email firstname.lastname@example.org Flora Grigor-Taylor – Agricultural Project Officer (Based at River Dee Office – job share) River Office Mill of Dinnet Aboyne Aberdeenshire AB34 5LA Tel 013398 80411 Mob 07748 986612 Email email@example.com Lorna Wilkie – Project Officer (Scotland) RAFTS Suite 1F40, 2 Commercial Street, Edinburgh, EH6 6JA Tel 0131 555 1158 Mob 07825 185178 Email firstname.lastname@example.org For more information about the project, please contact: ‘Pearls in Peril ‘- securing the future of the freshwater pearl mussel in Great Britain http://www.snh.gov.uk/protecting-scotlands-nature/protected-species/life-projects/pearls-in-peril/ LIFE11 NAT/UK/383
<urn:uuid:48ee17b6-dc14-4ee7-8629-353e0fc8d9b3>
CC-MAIN-2016-26
http://www.rafts.org.uk/pearls-in-peril/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398216.41/warc/CC-MAIN-20160624154958-00186-ip-10-164-35-72.ec2.internal.warc.gz
en
0.829291
853
2.78125
3
A private clinic in Brazil has recommended pregnant women wear burqas to protect themselves against Zika due to possible connections to the rare birth defect microcephaly. “A private clinic in Recife recommends pregnant women wear gloves, long-sleeved shirts, long pants, socks, and a burqa on the head against Zika,” wrote Ancelmo Gois in O Globo. Authorities consider Recife in Pernambuco state, located 1,433 miles north of Rio de Janeiro, the epicenter of the Zika outbreak. Brazil has recorded over 4,000 cases of microcephaly since 2015. At least 1,300 of those infants live in Pernambuco state. Microcephaly occurs if the brain does not form properly in pregnancy or stops growing after birth. Children can suffer from seizures, developmental delays, intellectual disability, and feeding problems. Aedes aegypti mosquitos carry the Zika virus. While primarily found in Africa, all but two nations on the Western Hemisphere boast significant populations (Chile and Canada are the exceptions). They also carry Dengue, yellow fever, and Chikungunya. Doctors found the disease in an infant during an autopsy, and numerous mothers reported symptoms. Neuro-pediatrician Dr. Vanessa Van Der Linden examined three infants in August and discovered calcification on their brain CT scans “caused by an infectious disease rather than a genetic abnormality, leading Van Der Linden to suspect that there was a new virus at work.” When her mother, another neuro-pediatrician, said seven more children in the waiting room had microcephaly, Van Der Linden contacted the state’s health secretary. Pediatrician Angela Rocha believes Osvaldo Cruz University hospital “has treated more than 300 babies with the condition.” She said the majority come from the poorer areas of the city where many lack running water. This means residents must store clean water, which become mosquito breeding sites. In November, the Recife government ordered the city’s 600 health workers to travel “house to house to eliminate potential breeding grounds and educate the public about the disease the mosquito carries.” Over 200 soldiers accompany the health workers. “Previously, people didn’t always want to let us into their homes,” explained Christine Penaforte, the executive secretary of health monitoring. “But the army is respected and so residents are more likely to let us in.” A month later, Rocha recommended females delay pregnancy for a year or two. “It’s a very personal decision, but at this moment of uncertainty, if families can put off their pregnancy plans, that’s what we’re recommending,” she told CNN. Fear of microcephaly and other complications have allegedly pushed women to illegal abortions in Brazil. Doctors indicate women in all social classes are seeking out these abortions “in despair over the possibility of deformity.” Some even go through with abortions without concrete proof of complications. Brazil outlawed abortion except in cases of rape, incest, or when the mother’s life is in danger. A judge must approve the case. One Brazilian judge announced he will grant Zika-infected women abortions if they can prove their unborn child has microcephaly. He insisted these abortions are “valid” if reports prove the child will “be born dead” or “life after birth is impossible.” He will require at least three separate medical records to reach his decision.
<urn:uuid:b183289a-776e-411d-897f-92de5e9c46bb>
CC-MAIN-2016-26
http://www.breitbart.com/national-security/2016/02/08/clinic-recommends-burqa-against-zika/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399522.99/warc/CC-MAIN-20160624154959-00130-ip-10-164-35-72.ec2.internal.warc.gz
en
0.942208
747
2.703125
3
When hunters go on a big hunt they get fetishes from Eagle Man which they bring along. When the hunter takes the heart out, the fetish is made to drink blood from the heart. These fetishes are kept in each family. Iatiku made the first one for Eagle Man and he taught the others how to make them. They should be made of a hard stone, flint, or gypsum, with eyes of turquoise set in pitch. Small ones are carried for protection and because they represent the prey animals. Any man can make a fetish, which he may call wolf, lion, or whatever he pleases. He then brings it to the Eagle Man of the Hunters' society. The Eagle Man and the society then pray to it and sing over it, putting into it the spirit and the power of the lion (north), wolf (west), lynx (south), wildcat (east). The power of the fetish is drawn from all these equally. The head man holds the fetish in the palms of his hands, swinging it to the four directions to the following song: It comes alive It comes alive, alive, alive. In the north mountain The lion comes alive In the north mountain, comes alive. With this the prey animal Will have power to attract deer, antelope; Will have power to be lucky. [paragraph continues] (Repeat for wolf of the west, lynx of the south, and wildcat of the east.) With each verse the Eagle Man faces the direction indicated, swinging his hands in that direction. The man who holds the fetish (head man) is praying another way and does not sing with the other singers. When the song is finished the fetish is laid in front of the altar beside the fetishes of the society where it remains over night. During this time it becomes alive. The next day it is given to its owner. When the new fetish has been placed in front of the altar each member of the society in turn approaches it and says, "Drink the blood of the lion (or whatever it has been named)." In the kiva is one large, fetish representing each of the four beasts of prey: múkaiĭtchă, "lion" (n); kakan, "wolf" (w); shohóna, 57 "lynx" (s); gyat "wildcat" (e). These names are preceded by Shaiyaika (Hunters' society) to indicate that they are fetishes. Each fetish is placed in its proper direction in front of the altar. The fetish to be given life is placed alongside the one for which it is named. The head man, when he places it in front of the altar, places it by its "mother" from which it draws its power, and it leaves as offspring of , quoting from S. F. Baird, Mammals of the Mexican Boundary, 1857, pp. 7-8. See, also, Bailey, 1937, pp. 283-284). Coronado's letter to Mendoza of August 3, 1540, sneaks of lions and tigers [jaguars] (Winship, 1896, p. 560).} the "mother." When the fetish is returned, it still has a connection with the one on the altar. It may be recalled from the owner if the society wants to use it. This is often done when the owner has been lucky in the hunt. When the society finishes with it, it is returned to the owner. These fetishes are handed down in the family. 58 When a hunter kills an antelope or a deer he brings it into the pueblo. The father or mother of the [hunter's] house comes out with some corn meal in her hand with which she makes a "road" into the house and up the ladder, if they live above. Then they help the hunter with his pack, and lay the deer on the floor with its head toward the fireplace, about 10 feet from the fire. Beads are laid on the neck. (Beads of lignite are preferred, as the hoofs of the deer are supposed to be made of this substance.) The deer would wear these back. They are taken away when they think the spirit has left, in about an hour. If relatives of the hunter come in, they go up to the deer and touch it and then rub their hands over their faces because they say the deer is pretty and not lazy. They say, "We are glad you have come to our home and have not been ashamed of our people." A dish of corn meal is placed near by and all visitors feed a little to the deer asking him to come next to their house, as they believe the deer will be reborn. When the beads are taken off, they blow them into the other room. (Beads are supposed to have power to attract; women wear beads to attract men.) They then start to skin the animal up to the neck. The skin is all taken off. The head is boiled in a pot without taking the horns off. In the pot is placed corn, pumpkin seeds, and piñon nuts. These are called the deer's ear rings. Before they eat this the hunter would call the clan of his father (not mother) to come and help eat the head. The mother of the hunter's father, if still living, takes the eyes and eats them. If she is not there, the oldest female relative in the father's clan does this. The hunter, or any man, is supposed not to eat the eyes of a deer lest he always have water in his eyes (tears) and not be able to see far. The hunter must not eat the tongue as this will make him thirsty. Nor may he eat the udder lest his teeth not be strong. After the meat is all eaten from the head, it will be placed on top of the house to dry. When he has time, the hunter takes it back into the mountains where he prays that it will come alive again. First it must be painted as the deer was originally. A black line is painted down the middle of the face; under the jaw is white. Balls of cotton are stuffed in the eye sockets and the centers painted black. Then a string is tied across the antlers and to this feathers are attached. 59 [paragraph continues] All large game is treated like the deer: mountain sheep, elk, buffalo, also lions, lynx, bear. Rabbit skulls are treated in the same way except that they are not painted or prepared in any way. This is the way Iatiku made the first hunting society. 23:57 The word co·ho·'nα (Boas, 1928, pt. 2, p. 42, l. 2), eastern Keres: ro'hona, is difficult to identify; it has been rendered lynx, weasel, jaguar. I am strongly inclined to believe that this animal is the jaguar. In a Santa Aria myth ro'hona is distinguished front mountain lion and front wildcat, and he is large enough to kill an antelope. One Santa Ana informant identified ro'hona as a jaguar from a colored picture in a manual on mammals of North America. In Boas' Laguna myth, "The origin of hunting customs," co·'ho·na is distinguished from mountain lion and from wildcat and is large enough to knock down a mountain sheep. Therefore this animal must be fairly large and powerful. Moreover, the co·'ho·na is assigned to the south, the direction of the home of the jaguar, with reference to the Pueblos. The jaguar was formerly found occasionally as far north as the Pueblo Indian country although his customary haunts are farther south. On April 10, it is reported that a jaguar killed four men in a convent at Peña Blanca (Seton, 1929, vol. 1, pt. 1, pp. 28-29 24:58 Cf. Laguna (Parsons, 1920, p. 127, fig. 20). 24:59 This corresponds closely with a recent account from Santa Ana (White, ms). Deer skulls and horns, with feathers attached to the antlers, could be seen in great numbers on the roofs of houses at Sia a few years ago.
<urn:uuid:fca819fd-55a2-46d6-83b0-6e0fb48d4f12>
CC-MAIN-2016-26
http://sacred-texts.com/nam/sw/oma/oma09.htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397873.63/warc/CC-MAIN-20160624154957-00049-ip-10-164-35-72.ec2.internal.warc.gz
en
0.970909
1,744
2.578125
3
Dynamic Designer Motion Motion Simulation embedded in Inventor Evaluate an unlimited number of design alternatives before you build and test a physical prototype. Understand collision effects Mechanisms containing cams,gears, latches, chains, belts, etc. are driven by contact parts. Dynamic Designer Motion helps you understand how such mechanism works. Select the correct actuation system Rack-and-pinion, screw actuators (e.g. jack screw), cams (disk, plate, cylindrical, etc.), cable, belt, chain, linkages (e.g. slider crank), etc. Dynamic Designer helps you design cams and the resulting system motion. All types of cams can be modeled including disk, cylinder, and translation. Understand part motion XY plots of part displacement, velocity, and accelerations provides the complement to animation necessary to understand the underlying motion. Gear drive development Dynamic Designer will show you how a gear driven mechanism moves and provide tools so you can analyze the gear interaction (e.g. backlash). Linkage layout and simulation Dynamic Designer shows you how a linkage system works and allows you to try alternative configurations. Conveyor speed and feed Dynamic Designer helps you design, synchronize, and tune conveyor belt motion.
<urn:uuid:a4914615-540c-499d-a85e-05fef1b0c830>
CC-MAIN-2016-26
http://www.design-simulation.com/DDM/Inventor/ddm/apps.php
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783404405.88/warc/CC-MAIN-20160624155004-00128-ip-10-164-35-72.ec2.internal.warc.gz
en
0.80712
270
2.953125
3
NRDC: Anti-Chemical Food Rules ‘Woefully Inadequate’ Federal protections to keep potentially unsafe chemicals out of foods are “woefully inadequate” and may be putting the health of Americans at risk, according to a Natural Resources Defense Council investigative report. The food safety protection system is marred by minimal supervision by the US Food and Drug Administration, rife with apparent conflicts of interest in safety evaluations, and rendered all but toothless by a gaping loophole that allows companies to simply declare as safe hundreds of chemicals added to our foods—without any notification to the FDA or the public, according to Generally Recognized as Secret: Chemicals Added to Food in the United States. The report shows: - Some 275 chemicals used by 56 companies appear to be marketed as “generally recognized as safe,” or GRAS, and used in many food products based on companies’ safety determinations that, pursuant to current regulations, did not need to be reported to the FDA or the public. - Information obtained under the federal Freedom of Information Act shows that when FDA does learn of a chemical proposed to be used in food, the agency often asks tough questions, but because of the GRAS loophole a company is not bound to answer them and not prohibited from continuing to sell the chemical for use in food. - Based on information from notices submitted to the FDA, but later withdrawn, companies have sometimes certified their chemicals as safe for use in food despite potentially serious allergic reactions, or adverse reactions in combination with common drugs, or have proposed using amounts of the chemicals in food at much higher levels than company-established safe levels. - When companies seek the FDA’s voluntary review of their GRAS safety determination, the agency rejects or triggers withdrawal of that determination in one out of every 5 cases. At least in some instances, companies may have withdrawn their notices in order to avoid having an FDA rejection made public. - The public and FDA are in the dark about hundreds of chemicals found in our food because companies aren’t required to submit the safety determination to FDA for its review. In February, Subway agreed to remove the GRAS chemical azodicarbonamide, a leavening and bleaching agent, from its bread, after a campaign by blogger Food Babe. More than 67,000 people signed a petition for Subway to stop using the chemical after the blogger took the company to task for the chemical, which she said is linked to asthma and cancer, and is “the same chemical used to make yoga mats and shoe rubber.” Energy Manager News - Energy-as-a-Service: Charting a Path Through Complexity - Demand Energy, EnerSys Complete Storage Project - Lunera Intros Pathway and Entryway LED - FPL to Buy and Phase Out Coal-Powered Plant, Saving Customers $129M - Environmental, Health and Safety Software Moves Forward - Johnson Controls: Interest, Investment in Energy Efficiency Up - First-Ever Statewide Endorsement of Retail Supplier, by Delaware, Goes to Direct Energy - Oberlin, Ohio, Ratepayers to Receive $2.2M in Rebates for Sale of RECs
<urn:uuid:7ffb56cf-62d3-447f-8706-cef70a573d45>
CC-MAIN-2016-26
http://www.environmentalleader.com/2014/04/11/nrdc-anti-chemical-food-rules-woefully-inadequate/?graph=full&id=1
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783394987.40/warc/CC-MAIN-20160624154954-00064-ip-10-164-35-72.ec2.internal.warc.gz
en
0.949581
659
2.71875
3
DOE, Hospitals Aim for Reduced GHG Emissions The U.S. Department of Energy (DOE) has launched the Hospital Energy Alliance (HEA) to drive energy efficiency and reduce greenhouse gas (GHG) emissions in the healthcare sector. This includes the integration of advanced energy efficiency and renewable technologies in hospital design, construction, retrofit, operations and maintenance. The DOE says under the new alliance, hospitals and healthcare organizations will have access to the resources and technical expertise available at DoE and its national laboratories to develop and deploy solutions to cut costs, lower energy usage, and reduce pollution. Hospitals use 836 trillion BTUs of energy annually and have more than 2.5 times the energy intensity and carbon dioxide emissions of commercial office buildings, producing more than 30 pounds of CO2 emissions per square foot, according to the DOE. By reducing the energy intensity in the healthcare industry, it will decrease its carbon footprint, alleviate stress on America’s electric power infrastructure and cut energy costs, says the DoE. HEA is the third energy alliance launched by DOE as part of its Net-Zero Commercial Building Initiative. In 2008, the Department also joined with large retail stores to form the Retailer Energy Alliance, and in April 2009, DOE joined with commercial real estate companies to introduce the Commercial Real Estate Energy Alliance (CREEA). According to the 2008 Healthcare Energy Efficiency Indicator study from The American Society for Healthcare Engineering and Johnson Controls, healthcare executives place a higher priority on energy efficiency than executives in other industries. Two thirds of healthcare organizations reported plans to spend capital on energy efficiency this year compared with 56 percent in the multi-industry survey. Hospitals, on their own, are also implementing other environmentally-friendly programs. As an example, the MetroWest Medical Center’s Go Green Team in Massachusetts implemented a pilot program to compost cafeteria scraps, turning nearly two tons of food scraps into farm fertilizer, reports The Daily News Tribune. In addition, the hospital started working with NStar to identify energy improvements, hoping to convince management to make a few investments, reports the newspaper. The Daily News Tribune also reports that other area hospitals are going green. Here’s a quick rundown: - At the Milford Regional Medical Center, the hospital now uses biodegradable paper products instead of Styrofoam in the cafeteria, encourages paperless communication and started a campaign to keep ordinary items out of biohazard collection bins. - At Newton-Wellesley Hospital, custodians have switched from string mops to microfiber models, saving 200,000 gallons of water each year. The hospital is also using high-pressure steam to generate some of its own electricity, and is using less toxic cleaning supplies. - Norwood Hospital, part of the Catholic Caritas Christi Health Care network, is replacing lights and heating equipment with energy efficient models and recycles. - Marlborough Hospital, looking to reduce consumption and emissions, plans to install solar-powered, automatic faucets and flush controls in its bathrooms, and altered its heating oil boilers to accept cleaner-burning natural gas. Energy Manager News - 30 Environmental Advocacy Groups Call on NARUC for Holistic Rate-Setting Guidelines - New York State’s Summer of Energy - Chicago Church Strives for Energy Efficiency - Small, Medium Size Commercial Building Efficiency Market to Grow - ERC: Price Benchmark Trends Week Ending June 24, 2016 - FERC Rules Against Tri-State Fee on Local Renewable Power - Marin Clean Energy to Reduce Rates and Expand Service Area in September - Drama Aside, Tesla’s Acquisition of SolarCity Makes Sense
<urn:uuid:69319c17-ed55-4c08-a1e4-e8f42609cf74>
CC-MAIN-2016-26
http://www.environmentalleader.com/2009/04/30/doe-hospitals-aim-for-reduced-ghg-emissions/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399428.8/warc/CC-MAIN-20160624154959-00066-ip-10-164-35-72.ec2.internal.warc.gz
en
0.919851
756
2.765625
3
Vividly bringing to life the epic struggles of the men and women who fought to end slavery, The Abolitionists tells the intertwined stories of Frederick Douglass, William Lloyd Garrison, Angelina Grimk, Harriet Beecher Stowe and John Brown. Fighting body and soul, they led the most important civil rights crusade in American history. What began as a pacifist movement became a fiery and furious struggle that forever changed the nation. Black and white, Northerners and Southerners, poor and wealthy, these passionate anti-slavery activists tore the nation apart in order to form a more perfect union. The series, which tells the story largely through period drama narrative, airs 150 years after the Emancipation Proclamation took effect in January 1863. Episode 1 will be broadcast on witf tv Tuesday January 8th at 9pm: Shared beliefs about slavery bring together Angelina Grimk, the daughter of a Charleston plantation family, who moves north and becomes a public speaker against slavery; Frederick Douglass, a young slave who becomes hopeful when he hears about the abolitionists; William Lloyd Garrison, who founds the newspaper The Liberator, a powerful voice for the movement; Harriet Beecher Stowe, whose first trip to the South changes her life and her writing; and John Brown, who devotes his life to the cause. The abolitionist movement, however, is in disarray and increasing violence raises doubts about the efficacy of its pacifist tactics. The series continues in three parts January 15th and 22nd at 9pm on witf tv. Support for WITF is provided by: Support for witf is provided by:
<urn:uuid:7a1ea520-c186-4f5b-bcf2-55d3ab2b1982>
CC-MAIN-2016-26
http://www.witf.org/on-air/2013/01/influential-abolitionists.php
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397864.87/warc/CC-MAIN-20160624154957-00021-ip-10-164-35-72.ec2.internal.warc.gz
en
0.955801
342
2.78125
3
STONINGTON - Peninsula Point is known not only for its lighthouse and bird watching opportunities, monarch butterflies can be found throughout the summer nectaring on the many wildflowers and milkweed plants. Volunteers are being sought to help with two university research projects involving the butterflies. Due to the large congregation of monarch butterflies in late summer-early autumn, Peninsula Point has become a popular area where monarchs are both observed and studied. Two nationwide monitoring projects continue at Peninsula Point. Information collected by citizens allows scientists to learn more about the monarch butterfly and track the annual numbers during the summer and fall months. Daily Press photo by Holly Richer A monarch butterfly is seen in the grass near the Escanaba Municipal Marina along Water Plant Road last summer. Volunteers are being sought to help with two university research projects being done locally involving the butterflies. Larval monitoring is a part of the Larval Monitoring Project at the University of Minnesota. Larval monitoring begins in May continuing through September and consists of measuring the milkweed plants and counting the number of monarch eggs and larvae each Wednesday morning. Migration census is conducted in early August through September consisting of counting the number of monarch butterflies. Tagging is also conducted during this time. Small tags are applied to the wing of the butterfly and the number recorded as part of the Monarch Watch Project, Kansas University. Recoveries of tagged monarchs help scientist determine the butterflies' migratory route. Information gathered will assist scientist at several colleges and universities working to conserve monarch butterflies. Volunteers are needed to help with the projects. If you are interested in participating in any of the above volunteer activities (small volunteer stipend available) or to learn more about this volunteer opportunity on the Hiawatha National Forest, contact Janet Ekstrum at (906) 474-6442 ext 140
<urn:uuid:225c33b0-4844-4015-b88e-35ee459ec33c>
CC-MAIN-2016-26
http://www.dailypress.net/page/content.detail/id/542228/Volunteers-needed-for-local-monarch-monitoring-project.html?nav=5009
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783402479.21/warc/CC-MAIN-20160624155002-00002-ip-10-164-35-72.ec2.internal.warc.gz
en
0.952769
375
2.765625
3
- Psychology & the public - What we do - Member networks - Careers, education & training Men are motivated by cute baby faces too Both Charles Darwin and Konrad Lorenz, the pioneering ethologist, wrote about the appeal of baby faces as a possible adaptive mechanism. They surmised that babies' perceived cuteness could be nature's way of ensuring the little terrors get looked after. Now a team led by Morten Kringelbach and Christine Parsons has shown that men are as motivated by baby faces as women. Kringelbach is the same researcher who a few years ago showed that looking at baby faces, as opposed to adult faces, is associated with a distinct pattern of brain activity in the orbitofrontal cortex - a kind of neural "cuteness response". For the new study, 31 men and 37 women (average age 20 years), all with limited experience of babies, looked at photographs of the faces of 70 babies (aged 3 to 12 months), each shown for five seconds, and rated their attractiveness. These results conformed to cultural stereotypes about gender differences, with the women tending to rate the babies as more attractive than the men (no such gender difference emerged for the rating of adult faces). A desire to conform to gender roles could have played a role here. However, both men and women rated as more attractive those baby faces that most closely conformed to the cute ideal: a large rounded forehead, large low-set eyes, a short and narrow nose and a small chin. In another part of the experiment, performed either before or after the attractiveness ratings, the participants were able to press a button repeatedly to control how long each baby face remained on the screen. This was taken as a measure of how much the participants were motivated to look at the faces. In this case the men scored just the same as the women. Moreover, for both men and women it was those faces that most closely conformed to the cute ideal that they made the effort to look at for longer. "Our findings indicate that both men and women appraise what is colloquially described as a 'cute' unfamiliar infant positively, and they will work to see that infant for longer than an infant with less 'cute' features," the researchers said. "This is in line with previous studies showing that 'cuter' infants are rated as more friendly, cheerful, and likeable and are rated as more 'adoptable'." Parsons, C., Young, K., Kumari, N., Stein, A., and Kringelbach, M. (2011). The Motivational Salience of Infant Faces Is Similar for Men and Women. PLoS ONE, 6 (5) DOI: 10.1371/journal.pone.0020632 This post was written for the BPS Research Digest.
<urn:uuid:f8ee021e-a10a-4103-836e-6afb561e15a9>
CC-MAIN-2016-26
http://www.bps.org.uk/news/men-are-motivated-cute-baby-faces-too
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395546.12/warc/CC-MAIN-20160624154955-00128-ip-10-164-35-72.ec2.internal.warc.gz
en
0.968589
582
2.515625
3
Using genetically modified pigs that lack the ability to grow their own pancreases, a team of Japanese scientists has succeeded in growing the gland in the pigs by injecting normal pig embryonic cells into their embryos. The achievement marks progress toward the team’s goal of creating human pancreases in pigs for transplantation into human diabetics, said the team, led by Hiromitsu Nakauchi, a professor at the University of Tokyo’s Institute of Medical Science. According to an article released online by the U.S. journal Proceedings of the National Academy of Sciences, the team used male white pig embryos that had been genetically modified to lose their ability to grow their own pancreases. The team, including Meiji University professor Hiroshi Nagashima, injected cells of normal female black pig embryos into the white pig embryos to create chimera blastocysts, which were then put into the wombs of other pigs. They gave birth to male white pigs with black pig pancreases. In 2010, Nakauchi and his colleagues announced they created pancreases of rats inside mice. Creating human pancreases in pigs by injecting human induced pluripotent stem cells into pancreas-deficient pig embryos is technologically difficult. In addition, it would be ethically problematic if pigs carry to term embryos injected with human iPS cells, creating chimeras made up of both human and pig cells.
<urn:uuid:2b5d98c6-7ebc-4df1-b35b-c4285e776ed2>
CC-MAIN-2016-26
http://www.japantimes.co.jp/news/2013/02/20/national/science-health/breakthrough-in-pig-pancreas-regeneration/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399385.17/warc/CC-MAIN-20160624154959-00147-ip-10-164-35-72.ec2.internal.warc.gz
en
0.956574
292
3.15625
3
Bisphenol A, or BPA, the organic compound used in plastic food and water containers, has repeatedly come under fire for safety concerns. Now there is one more head-scratcher of a data point that parents should know about: the estrogen-like chemical may be making our kids fat, new research suggests. Not all kids, however. Just white kids. Consumer groups and public health officials have in recent years pointed to mounting evidence that BPA readily accumulates in the body's fat stores and can disrupt hormones that play crucial roles in sexual development, energy use and fat deposition. A 2010 report from the United States Food and Drug Administration (FDA) warned of possible hazards to fetuses, infants, and young children. The use of BPA was banned in baby baby bottles in the US this year. Now in a new study of nearly 3,000 children and teens, researchers found that kids with the highest levels of BPA in their urine were 2.6 times more likely to be obese compared to those with low levels of the chemical. However, the link was only statistically significant for caucasian children and adolescents. Connections between the highest levels of BPA and obesity weren’t found in black or Hispanic youngsters, according to researchers. In the report, published in the latest issue of the Journal of the American Medical Association, researchers clarify that their findings don't prove that BPA causes weight gain. There are many other factors that contribute to childhood obesity, most notably an unhealthy diet and low levels of physical activity. Researchers aren't completely clear on what's going on here. Experimental studies have shown that BPA can make fat cells bigger. The chemical also has been shown to inhibit a hormone called adiponectin, which is involved in lowering heart disease risk. Because BPA is actually a weak synthetic estrogen, the chemical may also disrupt the balance of estrogen and testosterone, which may adversely affect caloric balance. Deemed safe in adults in low levels, BPA has been used in food packaging, metal can linings, and medical goods since the 1960s, and traces of the chemical can be found in most Americans. Do you pay attention to which products contain BPA when shopping for your kids? Let us know.
<urn:uuid:c9342317-20d4-4897-ab92-703fa29f6c2e>
CC-MAIN-2016-26
http://www.parenting.com/blogs/show-and-tell/brian-parentingcom/study-links-childhood-obesity-bpa?con=blog&loc=topprev
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393997.50/warc/CC-MAIN-20160624154953-00006-ip-10-164-35-72.ec2.internal.warc.gz
en
0.953904
461
3.0625
3
Things were different when Adam Bienenstock was a kid. As soon as the bell rang, he’d be up the creek near his house, climbing trees, building forts, collecting fossils and catching crayfish. “That was my playground,” says Bienenstock, now 48. “I was absolutely typical of that generation–I’d come back when the streetlights came on at dinnertime.” Fast-forward 40 years, and that kind of unfettered outdoor play is no more, thanks to overprotective parents and liability-obsessed school boards, who see every stick as a potential weapon and every patch of forest as a haven for perverts. In Bienenstock’s day, the average kid roamed, parentless, up to 10 kilometres from home. Today, that’s down to less than 275 metres–which, as Bienenstock points out, means that even if they live on the edge of a forest, they’re not going in. Instead, Canadian kids spend an average of seven hours and 48 minutes every day in front of screens. Almost one-third of them are overweight or obese. Bullying rates, ADHD and childhood anxiety disorders have soared. “We’ve never been more cautious of the welfare of our children, and we’ve created an environment that is killing them, literally,” says Bienenstock. “For the first time in history, we’ll have a longer lifespan than our kids will.” The way he sees it, the playground–the only place today’s kids are still allowed to romp–is the front line in the battle to save them from “nature-deficit disorder,” a term coined by U.S. children’s health advocate Richard Louv in his 2005 book Last Child in the Woods. Enter Bienenstock Natural Playgrounds, based in his hometown of Dundas, on the fringes of Steel City, which has designed and built more than 800 nature-based play spaces around the world. Instead of steel climbers and spring-loaded teeter-totters, Bienenstock’s parks feature slides built into grass-covered hillsides, pink granite boulders for climbing, and sturdy carved chairs, balance beams and obstacle courses fashioned from local logs that would otherwise end up in the chipper. Some have rope bridges and tree forts, water tables for preschoolers, giant wooden xylophones and drums, even mini-amphitheatres. In June, Bienenstock and his team–20 full-timers, including an early childhood educator (his wife, Jill), a landscape architect, a computer engineer, a kinesiologist, even a philosopher–shipped the final pieces of a 2.5-acre project to New Brunswick’s Fundy National Park, including a zip line, climbing walls and a massive chunk of black walnut, Bienenstock’s version of a jungle gym. The company’s century-old workshop is packed with crates bound for Edmonton, Red Deer and Whitehorse. A whiteboard used to track current projects is covered in black marker, with price tags ranging from $5,000 to half a million. One of the newest additions is a multiyear deal with the Ontario Science Centre (in partnership with Sustainable Trails of Port Hope, Ontario) to develop 40 acres around the centre with trails and outdoor exhibits. Bienenstock will also be working with Hildebrandt Learning Centers to “naturalize” 52 playgrounds across Pennsylvania. More jobs are being added every week. Bienenstock says sales have been growing by 40 per cent to 100 per cent a year since 2009, when he began to focus on natural playgrounds full-time. He’d been a landscaper for more than 30 years, having inherited a green thumb from his grandmother, and an avid belief in the link between mind and body from his parents. His mother, Dody, is a psychiatrist; his father, John, is a renowned immunologist (both still practise full-time, though they’re 79 and 83, respectively). “There’s no separation between mind and body,” says Bienenstock, describing his folks’ ethos. “Physical well-being is mental well-being.” After flunking out of Dalhousie, Bienenstock got a diploma in horticulture and set off for Vancouver in an old Honda Civic, where he designed private botanical gardens and curated “crazy” plant collections. At the height of the dot-com boom, he hooked up with an entrepreneur and began installing telecommunications hubs. Six months before the collapse, Bienenstock took a payout, did an executive MBA at Queen’s University and moved back to Dundas, where he reconnected with Jill, his high-school sweetheart. It’s no coincidence Bienenstock started Natural Playgrounds five years ago, when the couple’s two sons were toddlers. There are stacks of research supporting the notion that kids who spend more time in nature are less aggressive and more co-operative, score higher on tests, get along better with their peers, and are happier overall than children who spend the majority of their time indoors. A 2011 University of Illinois study even found that children with ADHD who don’t respond to medication experience milder symptoms when they play regularly in green spaces. Plus, Bienenstock says natural spaces are more engaging: According to a study from the University of Tennessee at Knoxville, the typical flat, treeless playground keeps kids busy for an average of nine minutes; on natural playgrounds, it’s 60 to 68 minutes. “They give every kid a place of mastery,” says Bienenstock–physical challenges, a quiet place to read or play music, and so on. Natural spaces also help build community, he says, since parents are chatting on benches, rather than running around with their hands out, waiting for their kids to fall (with good reason–more than 28,000 sustain playground injuries each year). Bienenstock admits his company, and a few other like-minded outfits, are capturing just a sliver of the $1.2-billion North American playground market. So he spends much of his time delivering TED-style talks worldwide. The goal isn’t just to drum up clients; it’s to inspire others to get into the game, too. Bienenstock’s hope is to build the market so that one-third of playground budgets go toward natural spaces (with his own company taking the top 10 per cent of that). “There’s no winning this on our own,” he says. “We have to build an industry at the same time as we’re building a business.”Report Typo/Error Follow us on Twitter:
<urn:uuid:a957884a-3f13-4f74-abdf-148ef25c42be>
CC-MAIN-2016-26
http://www.theglobeandmail.com/report-on-business/rob-magazine/venture-why-getting-kids-outside-is-no-walk-in-the-bark/article20199130/?cmpid=rss1
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393463.1/warc/CC-MAIN-20160624154953-00057-ip-10-164-35-72.ec2.internal.warc.gz
en
0.962669
1,459
2.609375
3
pencil and paper n. An archaic information storage and transmission device that works by depositing smears of graphite on bleached wood pulp. More recent developments in paper-based technology include improved `write-once' update devices which use tiny rolling heads similar to mouse balls to deposit colored pigment. All these devices require an operator skilled at so-called `handwriting' technique. These technologies are ubiquitous outside hackerdom, but nearly forgotten inside it. Most hackers had terrible handwriting to begin with, and years of keyboarding tend to have encouraged it to degrade further. Perhaps for this reason, hackers deprecate pencil-and-paper technology and often resist using it in any but the most trivial contexts.
<urn:uuid:c8f05128-7723-4235-9dc1-f83ef96a7980>
CC-MAIN-2016-26
http://www.kill-9.it/jargon/html/entry/pencil-and-paper.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399385.17/warc/CC-MAIN-20160624154959-00130-ip-10-164-35-72.ec2.internal.warc.gz
en
0.927481
143
2.96875
3
Liposarcoma is the most commonly diagnosed soft tissue tumor. They are also among the largest category of sarcomas reported. These tumors usually develop in the deep fatty tissue. They most commonly occur in the thigh, behind the knee, the groin, the gluteal area or behind the abdominal cavity (retroperitoneum). Liposarcomas are usually malignant (cancerous) and rarely are from a pre-existing lipoma, which is a non-cancerous tumor. They are most commonly found in adults between 30 and 60 years old and are slightly more common in men than women. Tumors are usually firm and bumpy and invade surrounding tissue aggressively. Metastases (spreading) to the lymph nodes occur in approximately 10% of patients with liposarcoma. They are very different than lipomas, which are superficial and typically soft and smooth and are mobile. Fibrosarcoma (Fibrous Tissue) Fibrosarcomas usually occur in the arms or legs or on the trunk but can occur in any of the soft tissues. They can occur around scars, muscles, nerves, tendons, and around the lining of the bone (periosteum). Local recurrence after surgery is common. Fibrosarcomas typically invade local tissues and can metastasize through the bloodstream to the lungs. Less than 5% of patients will experience metastases to the lymph nodes. This lesion develops as a tumor sticking out of the skin usually found on the back or abdomen. In the early stages the tumor remains under the skin and the skin surface appears dark red-violet. If untreated the tumor can break through the skin forming an open wound. It has a tendency to recur but rarely metastasizes. Treatment consists of wide surgical excision. Malignant Fibrous Histiocytoma (MFH) Malignant fibrous histiocytomas are the most commonly diagnosed soft tissue sarcoma in patients between the ages of 50 and 70. It is twice as common in men than women. There are four variations of MFH: storiform pleomorphic, myxoid malignant fibrous histiocytoma, malignant giant cell tumor of soft parts, and inflammatory malignant fibrous histiocytoma. Storiform and Myxoid MFH types are typically high grade (fast growing and invasive) tumors, whereas, malignant giant cell MFH and inflammatory MFH tend to be lower grade (slower growing and less invasive) tumors. While the Myxoid type is lower grade they tend to have local recurrence rate and therefore treatment usually consists of radical resection or amputation. Storiform pleomorphic MFH is typically a deep-seated large tumor of the thigh. The deeper and larger tumors found in MFH have a higher rate of metastases than the more superficial smaller tumors. Synovial Cell Sarcoma Synovial Cell sarcoma usually occurs in young adults. They are most commonly found in the arms or legs next to a joint. They are usually found around the joint capsule but rarely invade the joint itself. The most common site is adjacent to the knee. They are also commonly found near the foot, ankle and hand. Unlike other soft tissue sarcomas, synovial cell sarcomas are often painful. Treatment usually consists of radical excision with radiation and chemotherapy or amputation combined with chemotherapy. Epithelioid sarcomas typically occur in the hand or foot of young adults. They appear like small nodules, which sometimes merge together. Spreading to lymph nodes occurs in approximately 20% of patients. Because of their proximity to the joints, surgical excision can be difficult and often amputation is the surgery of choice for long-term survival. Rhabdomyosarcomas (Striated muscle tumor) Cancerous tumors in the striated or skeletal muscle are one of the most common types of soft tissue sarcoma, and account for about half the soft tissue sarcomas diagnosed in children. There are several different types, including pleomorphic, alveolar, embryonal and botryoid. - Embryonal Rhabdomyosarcoma This is the most common type of rhabdomyosarcoma, and is diagnosed most frequently in children under the age of 10. It can be found anywhere in the body, butoften occurs in the head and neck especially around the eye. Chemotherapy is very effective in these tumors. There is a high cure rate in these tumors when combination therapy is used (i.e. surgery and/or radiation combined with chemotherapy). - Alveolar Rhabdomyosarcoma This tumor is extremely aggressive and typically occurs in adolescents and young adults. Tumors metastasize widely at an early stage. Alveolar rhabdomyosarcoma almost always is associated with a translocation between two genes (PAX3 or PAX7 and FOX01). Treatment includes radiation and chemotherapy as well as surgery for some cases. Localized alveolar rhabdo responds fairly well to treatment. - Botryoid Rhabdomyosarcoma These lesions usually occur in children at the average age of 7. They generally occur in the genital region and urinary tract. They appear as a swollen lumpy mass. - Pleomorphic Rhabdomyosarcoma This tumor occurs most commonly in people over 30 years of age. It commonly affects males on their extremities but not exclusively. Because it grows in the skeletal muscle, it usually is deep in the limb. Tumors can arise at many sites within the same muscle group and grow very rapidly. The tumor spreads through the bloodstream although in approximately 15% of cases the tumor spreads through the lymphatic system. Rhabdomyosarcoma is often widely spread at the time of diagnosis. Treatment generally consists of surgery and combination chemotherapy (multiple drugs used). Leiomyosarcoma (Smooth Muscle Tumor) and Uterine SarcomaLeiomyosarcomas are cancerous tumors of the smooth muscle. They most commonly occur in the organs (e.g., gastrointestinal tract and the uterus). The average age of patients is 60 years. Of the tumors occurring in the GI tract 61% occur in the stomach, 29% in the small bowel, and 10% in the colon. Symptoms of GI or uterine leiomyosarcomas are significant bleeding and pain. Metastases occur in more than half of patients. Leiomyosarcomas of the retroperitoneum and the vena cava are found mostly in women. The growth of the tumors can accelerate during pregnancy. Metastases usually occur in the lungs except in GI tumors, which often metastasize in the liver. Treatment for uterine leiomyosarcoma is total abdominal hysterectomy. Gastrointestinal Sarcoma, otherwise known as Gastrointestinal Stromal Tumor (GIST). GIST develops in the stroma, the supporting connective tissue, of the stomach and intestines. It is now often treated with the biological agent Gleevec. Gleevec is a biologic agent that works by shutting down the activities of gtenes that apparently are needed for the tumor’s growth. In particular, it targets a gene called c-kit that produces inappropriate amounts of an enzyme that promotes the tumor growth. Extraosseous Tumors There are three types of Extraosseous tumors. They are giant cell tumors, osteosarcomas, and Ewing’s sarcoma. These are bone sarcomas, which are found in the soft tissue. They have very similar characteristics as their bone sarcoma variation, Extraosseous Ewing’s sarcomas respond well to radiation therapy. Myxomas occur in men and women averaging the age of 50. They are most often found in the arms and legs. Tumors can be small nodules or very large tumors. They do not metastasize; however, they do spread locally. Treatment is usually wide local excision. Mesenchymomas can be distributed throughout the body and approximately 75% are malignant. The tumors are invasive especially when they are located in the skeletal muscle. Treatment is wide excision sometimes combined with radiation and or chemotherapy. Vascular Sarcomas (containing many blood vessels) Hemangioendotheliomas are a very rare vascular (containing many blood vessels) tumor, which can be malignant. They occur in men and women but rarely in children. One variety of this tumor occurs in younger males and typically arises on the hand and tends to recur locally. Angiosarcomas represent 1% of all sarcomas. One-third of the cases occur on the skin, one-fourth of the cases occur in the soft tissue or organs such as breast, liver, heart and lungs. Tumors arising in the liver are seen in adults exposed to angiography, insecticides or plastics. Angiosarcomas of the breast typically occur in young or middle aged women. Additionally some angiosarcomas occur at the site of previous radiation therapy. Tumors metastasize widely. The most common form of treatment is radical amputation. Hemangiopericytomas are typically found in the thigh, retroperitoneum or near the kidneys. Intracranial hemangiopericytoma grow along the sinuses, tend to locally recur and can metastasize. Malignant Neurilemoma (Malignant Schwannoma & Neurosarcoma) Malignant Neurilemomas usually develop in young to middle aged adults, most commonly in males. They occur in the peripheral nerves (not brain or spinal cord nerves). Half of these tumors occur in people with Von Recklinghausen’s disease or multiple neurofibromatosis. The spreading of these tumors occurs in the surrounding soft tissue forming a nodular tumor. Metastases can occur through the bloodstream. Tumors can be painful, tender and sometimes nerve function is affected. Treatment is generally wide resection of the nerve in either direction. Radiation therapy and chemotherapy can be used as well. Alveolar Soft-Parts Sarcoma This is a very rare tumor that typically occurs in female adolescents and young adults. It is usually a slow growing tumor found in the extremities and commonly metastasizes to the lung. The typical form of treatment is wide resection of the lesion. Kaposi’s Sarcoma is a disease in which cancerous cells are found in the tissues under the skin or mucous membranes that line the mouth, nose and anus. There are three groups of patients for Kaposi’s sarcoma. The first group typically includes older men of Jewish, Italian or Mediterranean heritage. This type of Kaposi’s usually progresses slowly over 10-15 years. Patients commonly develop a bluish lesion on the front of the lower leg, which typically spreads to multiple lesions. After some time the disease can spread to other organs. The second group of Kaposi’s sarcoma occurs in patients who have received organ transplant. Due to the Immunosuppressive treatment following a transplant, patients immune systems are weakened thus are more susceptible to infection. The third group of Kaposi’s sarcoma is found in AIDS patients. This group is referred to as epidemic Kaposi’s sarcoma. Due to the weakened immune system cause by the HIV virus, Infections and other diseases such as Kaposi’s can invade the body. Kaposi’s sarcoma in people with AIDS usually spreads more quickly and can be found in many parts of the body. Radiation therapy is usually the treatment for Kaposi’s; however, when lesions have spread to the organs, chemotherapy is often used as well. For Additional Information Gastrointestinal Stromal Tumor (GIST) GIST Support International Gastrointestinal Stromal Tumor (GIST) Life Raft Group LMSarcoma Direct Research National Leiomyosarcoma Foundation Leiomyosarcoma News – LMSeAlerts LMS Lifeline, with new Articles added regularly Osteosarcoma and bone tumors Bone Tumor Information Osteosarcoma/Malignant Fibrous Histiocytoma of Bone Treatment Ewing Sarcoma and Pediatric Cancers The Alliance Against Alveolar Soft Part Sarcoma (ASPS) Synovial Survivors Network Look Up Specific Soft Tissue Sarcoma Diagnosis Here The National Cancer Institute’s Soft Tissue Sarcoma Home Page The National Cancer Institute’s Bone Cancer Home Page The National Cancer Institute’s Uterine Sarcoma Home Page General Sarcoma Information National Cancer Institute Adult Soft Tissue Treatment PDQ (Physician Data Query) University of Pennsylvania OncoLink Sarcoma Page British Columbia Cancer Agency – Bone and Connective Tissue Sarcomas Dr. Steve Fadem’s Sarcoma Page – Doctor with Sarcoma Surviving Cancer – Sarcoma Survivor’s Website Management of Soft Tissue Sarcomas: An Overview and Update Excellent article about soft tissue sarcoma in the journal The Lancet Oncology. There is a fee for the complete article. MDAnderson Cancer Center Sarcoma Practice Guidelines Sarcoma Specific Organizations The Sarcoma Foundation of America Connective Tissue Oncology Society Desmoplastic Small Round Cell Tumor – Gift to the Cure will help DSRCT patients with information and support: http://www.gifttocure.org Kristen Ann Carr Fund Sarcoma Forum Amschwand Sarcoma Cancer Foundation The Liddy Shriver Sarcoma Initiative CureSearch (Children’s Oncology Group / National Childhood Cancer Foundation Jennifer Hunter Yates Sarcoma Foundation Karen Wyckoff Rein Sarcoma Fund Northwest Sarcoma Foundation Organizations outside the United States SOS Desmoide Association
<urn:uuid:bb62cc31-fe61-4619-96a0-8dc4f68947c3>
CC-MAIN-2016-26
http://sarcomaalliance.org/what-you-need-to-know/sarcoma-specific-information/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397842.93/warc/CC-MAIN-20160624154957-00136-ip-10-164-35-72.ec2.internal.warc.gz
en
0.888272
2,997
2.734375
3
Within days of the September 11 attacks U.S. intelligence agencies were being blamed in many quarters for their failure to detect the terrorists' plans in advance. Mistakes in the formulation and execution of intelligence policy were no doubt made. Yet there is no one to blame for what is probably by far the greatest setback in recent years to American capabilities for keeping tabs on terrorists: the fact that it is now virtually impossible to break the encrypted communication systems that PCs and the Internet have made available to everyone—including, apparently, al Qaeda. The real culprits behind this intelligence failing are the advance of technology and the laws of mathematics. For more than a decade the National Security Agency has been keenly aware that the battle of wits between code users and code breakers was tipping ineluctably in favor of the code users. Their victory has been clinched by the powerful encryption software now incorporated in most commercial e-mail and Web-browser programs. It has always been theoretically possible to produce a completely unbreakable code, but only at considerable inconvenience. In the 1920s two groups of code users, Soviet spies and German diplomats, became aware of the vulnerability of their existing systems and began to rely on what are known as one-time pads. In this system sender and receiver are supplied with matching pages containing strings of numbers; each page is used as a key for encoding and decoding a single message and then discarded. If properly used, this scheme is unbreakable. Yet in practice corners were invariably cut, because the system was logistically complicated, involving—among other things— teams of couriers to deliver new one-time pads as the old ones were used up. Until the end of the twentieth century any more practical coding system that could be devised was susceptible to a basic flaw that a skilled code breaker could exploit. Language is extremely patterned—certain letters and words occur far more often than others. The essential task of a code key is to disguise that nonrandomness. The key might, for example, consist of a long string of random numbers specifying where in the alphabet each letter of the message text should be shifted. If the first letter of the message were A and the first key number 3, then that A would become D in the coded version of the text; if the fourth letter were A and the fourth key number 5, then that A would become F; and so on. Many schemes were developed to provide users with very long key strings, in an attempt to approach the security offered by the one-time pad. Some systems used code books containing tens of thousands of key numbers; others, such as the famous German Enigma machine of World War II, used rotating wheels containing wires and electrical contacts to generate a sequence of permutations. Yet eventually some of the strings of key would have to be used in more than one message, and when they were, the underlying patterns of language would begin to glow dimly through. The history of twentieth-century code breaking is at its heart the development of a series of increasingly sophisticated mathematical methods to detect nonrandomness. The best code breakers were usually able to keep pace with the latest advances in code making, because of the practical limitations of producing very long strings of truly random, nonrepeating key. The Enigma machine could be reset each day to one of a million million million million different key-string permutations, yet because of the machine's reliance on mechanically rotating wheels, those different combinations were not completely random or independent; subtle mathematical relationships connected one combination to another, and Allied code breakers were able to develop a brilliant mathematical technique that required them to test only a few thousand different combinations to break each day's setting. In effect, they discovered a shortcut, much like a safecracker's using a stethoscope to listen to the tumblers fall rather than attempting the "brute force" approach of trying every single combination. But the postwar advent of general-purpose computers—stimulated by funding from the NSA—began a process that by the end of the century gave code makers an unassailable lead. At first, when the extremely high price of computers ensured that government agencies would always have a commanding technological lead over the public, computers enabled the code breakers to abandon much subtlety in favor of brute force: the computers could simply run through every possible key setting to find the one that worked. But this was ultimately a losing proposition, because in terms of computing power it is always cheaper and easier to generate longer and longer keys than it is to test longer and longer keys. Once computers became widely available, the game was over. In 1998 a team of private-sector computer experts built a special-purpose computer that could test 92 billion different key sequences per second in the widely used Data Encryption Standard system, a mainstay of encoding for commercial electronic traffic, such as bank transfers. It took them fifty-six hours to break a message that was encoded in a version of DES that chooses from some 72 quadrillion possible keys for enciphering each message. (The number of possible keys available in a computer-generated code is typically measured in terms of the length of the binary numeral required to specify which key sequence to use; fifty-six bits give about 72 quadrillion combinations, so this version is called 56-bit DES.) That feat was hailed as a great technological triumph, and it undoubtedly was one. It was also clearly intended to make a statement—namely, that DES, which the U.S. government had promulgated, was deliberately designed to keep ordinary code users from employing anything too hard for the NSA to break. But there was an utterly trivial fix that DES users could employ if they were worried about security: they could simply encrypt each message twice, turning 56-bit DES into 112-bit DES, and squaring the number of key sequences that a code breaker would have to try. Messages could even be encrypted thrice; and, indeed, many financial institutions at the time were already using "Triple DES." Issued in 1977, DES was originally implemented in a computer chip, which made it possible at least in principle to control the spread of encryption technology through export restrictions. Huge increases in the processing power of PCs, however, subsequently made it easy to realize much more complex encryption schemes purely in software, and the Internet made it practically impossible to prevent the rapid spread of such software to anyone who wanted it. Today most Web browsers use 128-bit encryption as the basic standard; a brute-force attack would take the world's fastest supercomputer something like a trillion years at present. If someone develops a supercomputer that is twice as fast, a code user need only start using 129-bit encryption to maintain the same relative advantage. The standard e-mail encryption software, supplied with most computers, is the PGP ("pretty good privacy") system. In its latest version it is actually considerably better than pretty good. Users can select 2048-bit (equivalent to a little less than 128-bit DES) or even 4096-bit (equivalent to significantly more than 128-bit DES) keys. Osama bin Laden's network is suspected of employing additional methods to veil its communications. Some reports suggest that al Qaeda not only used encrypted e-mail but also hid encrypted message texts within picture files or other data that could be downloaded from a Web site. "Victory at Sea" (March 1999) The story of the American war is incomplete without the sweep and strategic stakes of the war at sea, in which 104,985 American sailors and Marines were wounded, 56,683 were killed, and more than 500 U.S. naval vessels were sunk. Lest we forget. By David M. Kennedy The implications of this fundamental shift in the balance of cryptologic power between the spies and the spied-upon are profound. Before World War II most Western governments and their military officials looked on intelligence with considerable contempt if they paid attention to it at all. Information from paid spies has always been notoriously unreliable—colored by ineptness, by a mercenary calculation of what the customer wants to hear, and sometimes by outright deceit. The explosion of intelligence from decoded enemy signals that took place during World War II, however, revolutionized both the profession of intelligence gathering and its impact. Signals intelligence was information coming unfiltered from the mouth of the enemy; its objectivity and authenticity were unparalleled. The proof was in the payoff. The victory at Midway, the sinking of scores of Japanese and German submarines, the rout of Rommel across North Africa, the success of D-Day—all depended directly and crucially on intelligence from decoded Axis communications. Signals intelligence is not completely dead, of course: bad guys make mistakes; they sometimes still use the phone or radio when they need to communicate in a hurry; and a surprising amount of useful intelligence can be gleaned from analyzing communication patterns even if the content of the communications is unreadable. Still, if encrypted-signals intelligence is to continue to provide information about enemy plans and organization, it must be accompanied by a significant increase in direct undercover operations. A hint of things to come emerged this past summer in the federal criminal trial of Nicodemo Scarfo Jr., who faces charges of running gambling and loan-sharking operations for the Gambino crime family. Federal agents, discovering that Scarfo kept records of his business in encrypted files on his PC, obtained a court order to surreptitiously install on his computer what was identified in court papers as a "key-logger system." The system (whether hardware or software is unclear) apparently recorded every keystroke typed into the computer, eventually enabling FBI agents to recover the password Scarfo used with his encryption software. Planting such electronic bugs directly in computers, or perhaps even sabotaging encryption software with a "back door" that code breakers could exploit, would generally require direct access to the machines. A plan proposed by the Clinton Administration would have obviated the need for direct access. But the plan, which would have required all American makers of encryption software to install a back door accessible by U.S. intelligence agencies acting with court approval, was abandoned, in part because of the argument that the requirement would not apply to foreign software makers, who are now perfectly capable of equaling the most sophisticated American-made commercial encryption software. An effort in the Senate to revive that plan and include it in the anti-terrorism bill that was signed into law October 26 received little support and was withdrawn, and on much the same grounds—that however powerful an intelligence tool code breaking was during its golden age, in World War II and the Cold War, the technical reality is that those days are gone. Code breaking simply cannot work the magic it once did.
<urn:uuid:2e6c0a9d-635d-4b7a-9504-f89c297a36eb>
CC-MAIN-2016-26
http://www.theatlantic.com/magazine/archive/2002/02/losing-the-code-war/302404/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395613.65/warc/CC-MAIN-20160624154955-00057-ip-10-164-35-72.ec2.internal.warc.gz
en
0.966344
2,196
3.078125
3
Dropping out of school has especially dire consequences for young people and for society as a whole. Twenty-five years ago, almost 90% of high school dropouts could find regular work. Today, slightly more than a third of young dropouts find full-time employment and only 11% of them are earning more than poverty wages. And while some full-time job opportunities remain, the ability to earn a living wage without a high school diploma is difficult at best in today’s society. Today, a dropout earns about $260,000 less in a lifetime than a high school graduate (Alliance for Excellent Education, September 2007). As we watch our nation develop and transition to a technology-based society, more and more workers are being displaced. High school graduation becomes imperative as high school graduates do twice as well, and college graduates fare six times better than dropouts. Clearly education pays off for students who complete high school. From the class of 2007 dropouts, the United States will lose $329 billion in wages, taxes, and productivity (Alliance for Excellent Education, September 2007). Beyond the personal costs of dropping out of school, the average dropout costs the community more than $300,000. We know that 75% of the individuals received by the Maryland Division of Corrections (1998 Dropout Prevention Taskforce Report) report themselves as high school dropouts. This means that approximately 17,250 of the 23,000 inmates are dropouts. Each year of incarceration costs state taxpayers more than $30,000 per inmate. Maryland spends about $518 million per year to house the 17,250 inmates who are dropouts. Dropping out is not the only challenge of this population, but we cannot dismiss the correlation between earning a high school diploma and incarceration. A five percent increase in Maryland’s male graduation rate could result in $160,557,762 annually in crime-related savings and $50,869,458 in additional earnings, for a total benefit to the State of $211,427,220 (Alliance for Excellent Education, August 2006) A ten percent increase in the male graduation rate could reduce murder and assault rates by about 20 percent, motor vehicle theft by 13 percent and arson by eight percent (Moretti, 2005). Thus, we need to do everything possible to ensure that our young people have every opportunity to graduate from high school. Each local school system (LSS) has developed strategies to address dropout prevention. A description of the services and interventions provided is included in the LSS Bridge to Excellence Master Plan, and the annual updates to that plan.
<urn:uuid:d344ec1a-b215-4a29-a52b-fc603b20566d>
CC-MAIN-2016-26
http://www.marylandpublicschools.org/MSDE/divisions/studentschoolsvcs/student_services_alt/alternative_programs/?WBCMODE=Presentatio%25%25%3E%25%3E%25%3E%25
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783391519.0/warc/CC-MAIN-20160624154951-00000-ip-10-164-35-72.ec2.internal.warc.gz
en
0.964075
529
2.9375
3
What are the four types of business ownership? Describe each of them. 1. What are the four types of business ownership? Describe each of them. 2. Identify and describe the five strategies that contribute to a successful small business? How does each strategy provide for successful results? 3. What are four small business opportunities that need to be considered when starting a new business? If you were to start a new small business in today s economic environment, which opportunity would you chose? Provide your reasons to support your answer. 4. There are many successful entrepreneurs, such as Bill Gates, Warren Buffet, and Steve Jobs. What are four traits they have in common? Were these entrepreneurs born with these traits, or did they develop these traits? Support your answer. - When the FASB issues new standards, the impleme... - Assume you are the ethics officer for a waste m... - Corporations define themselves in terms of bein... - Criminal Justice - Gender Studies - General Questions - Health Care - Political Science - Religious Studies
<urn:uuid:4d12b08e-cd4f-4386-9542-a4120cfc1edc>
CC-MAIN-2016-26
http://www.assignmenthole.com/general-questions/what-are-the-four-types-of-business-ownership-describe-each-of-them-2/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397748.48/warc/CC-MAIN-20160624154957-00094-ip-10-164-35-72.ec2.internal.warc.gz
en
0.940331
225
2.984375
3
A pinched nerve is one of the main reasons used to explain general lower back pain and is even more prevalent as the direct cause of sciatica. Compressed spinal nerve roots can occur in many patients, but also may be inaccurately diagnosed, making them possible sciatica scapegoats in some instances. Neuropathy conditions are the most difficult to accurately diagnose and pinched nerves are no exception to this rule. Statistics demonstrate a terrible incidence of misdiagnosis in patients deemed to be suffering from compressive neuropathy syndromes, especially those who were not diagnosed by a neurologist. This article will discuss how pinched spinal nerve roots may cause or contribute to sciatic nerve symptoms, as well as how compressed nerves are often mistakenly implicated in these same painful expressions. Compressed nerves occur when one or more of the spinal nerve root components, which exit the spinal canal at each vertebral level, are impinged upon by some other structure. The most commonly diagnosed causes of nerve compression are herniated discs and spinal osteoarthritis. The nerve is usually said to be pinched as it exits the neuroforaminal opening by the disc or bone structure. This process is known as foraminal stenosis. In other cases, the nerve roots may be affected individually or en masse in the central canal space through spinal stenosis. Remember, the spinal cord ends above the most affected lumbar levels which are involved in causing sciatica, so the cauda equina exists freely in the central canal space. Other less diagnosed causes of pinched spinal nerve roots might include extreme spondylolisthesis, scoliosis, hyperkyphosis or hyperlordosis. However, many other mechanical compression scenarios may exist in less common instances. Here are some lesser known or lesser considered facts about compressive neuropathy conditions: Although it is one the most common back and neck pain diagnoses, pinched spinal nerves rarely actually cause chronic pain. Instead, pain is typically transient and replaced by numbness and weakness over time. In order for a nerve to be truly pinched, the neuroforamen or central canal would have to be virtually completely sealed off. This is an extremely infrequent event, even in cases of severe trauma and degeneration. Pinched spinal nerves will usually elicit well defined and structured symptoms in specific locations of the anatomy. If symptoms do not correlate by expression or location, then the diagnosis may be unsound. Radicular pain is one of the most difficult syndromes to diagnose correctly, due to the complexity of the neurological system and the common incidence of circumstantial structural abnormalities, which may be present, but are not actually pinching any nerve tissue. Nerves are far smaller than the neuroforamen through which they pass. The cauda equina is much smaller than the central canal space. Therefore, there really must be significant stenosis of either space in order for nerve compression to occur. The spine has evolved over millions of years as the ideal structure for maintaining skeletal support and providing us all the amazing functionality that we, as humans, enjoy. Some pinched spinal nerve diagnoses are fundamentally flawed. To say that every degenerative process which is typical, normal and even universal in the spine would cause our very neurological systems to fail and cause us such pain, is ridiculous. The mere thought is illogical. I was diagnosed with radicular pain from 2 compressed nerves caused by herniated discs at L4/L5 and L5/S1. The diagnosis seemed to make perfect sense to me as a layman. That is, at the time. But, as my pain grew and became a nightmare of suffering and agony, I was sure something was not right. After all, if the diagnosis was correct, how come all of the treatments I attempted failed so abysmally? Well, with some independent research, I eventually got my brain up to speed on the actual sciatica facts which had eluded me for so long. I learned why many pinched spinal nerve diagnoses did not make sense and discovered that in my case, the symptoms were far too diverse to be explained by this mistaken diagnostic theory. This is even long before I discovered 10 more herniations in the upper end of my spine and the significant spinal cord displacement enacted by a particularly bad cervical disc prolapse. Do not wait if you suspect that something is not right in your diagnostic process. Be proactive and make it right. Seek neurological evaluation of any suspected pinched nerve from a specialist in spinal neurology. Also, take part in your care by learning all you can about your diagnosis and how it may or may not explain all your symptoms.
<urn:uuid:0ff8181e-1b36-465d-bf19-44fec7ebe8e1>
CC-MAIN-2016-26
http://www.sciatica-pain.org/pinched-nerve.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397213.30/warc/CC-MAIN-20160624154957-00196-ip-10-164-35-72.ec2.internal.warc.gz
en
0.952197
955
3.109375
3
JOHN CARLOS FREY: The coast of California has a wealth and variety of marine life. On beaches south of San Francisco hundreds of elephant seals bask in the sun, sea lions gather on docks in Monterey bay, while humpback whales, dolphins, sharks, and other sea life roam the open ocean. But these photos of dead sea life, caught in the drift gill-nets of commercial fishermen off the coast of California, have outraged conservationists. GEOFF SHESTER: We’re seeing these images of the decks just filled with these, you know, bloody dolphins, these– these amazing sea turtles. And to literally just be going through hundreds of these images is– you know, it makes me sick to my stomach. JOHN CARLOS FREY: Geoff Shester is the California Program Director for Oceana, an international organization that focuses on ocean conservation. Shester obtained these photos this February from NOAA, the National Oceanic and Atmospheric Administration, through a freedom of information request. These photos were taken by federal employees monitoring what’s known as by-catch: fish and other marine creatures caught by accident during commercial fishing. The photos were taken on California commercial fishing boats that use drift gillnets. One-mile-long mesh nets that are intended to catch swordfish. But end up catching other sea life as well. GEOFF SHESTER: In terms of the known deaths and mortalities to a lot of these iconic species, whether you’re talkin’ about large sharks– sea turtles, dolphins, and whales, I’m not aware of a single other activity that humans are doing that is actually causing the direct death of those– of such a large suite and number of animals. JOHN CARLOS FREY: Oceana estimates that for every five swordfish caught, one marine mammal dies in the gillnet because it either suffocates or succumbs to wounds inflicted by the net. While the practice of using drift gill-nets was outlawed in California State Waters for most types of fishing more than two decades ago, swordfishing was exempt, only facing some restrictions. Now Oceana is supporting new legislation in California to ban the use of gillnets for sword fishing as well. BARBARA BLOCK: We’re losing our ocean wildlife. What’s happening along California’s shores is that we have one of the richest ocean currents that flows across the most populous state, California. JOHN CARLOS FREY: World-renowned marine biologist Barbara Block has found that the waters off the coast of California have one of the most robust ecosystems on earth. A discovery that has given conservationists ammunition to demand stricter environmental protections. JOHN CARLOS FREY: And this is unlike any other place in the world? BARBARA BLOCK: Very few places are like this that have– intact ecosystems still in play. JOHN CARLOS FREY: Over the past 10 years Block and a team of scientists, based at Stanford University’s Hopkins Marine Station in Monterey, pioneered a practice of tracking the movements of large sea creatures. Through a program called TOPP.. Tagging of Pacific Predators.. Block and others fitted sharks, turtles, blue fin tuna, and other sea life with monitors that beamed data about their movements to satellites. What Block learned was that these animals traveled thousands of miles across the Pacific Ocean in migratory patterns akin to land based animals and always return to this sliver of ocean off California. BARBARA BLOCK: We’ve discovered that this is a place where wildlife gathers, equivalent to the greatest plains in Africa, where we see elephants, gazelles, and zebras, and crocodiles together. Instead, here we’ve got white sharks, bluefin tuna, makos. We’ve got elephant seals, humpback whales, blue whales, all within a stone’s throw from Monterey. JOHN CARLOS FREY: Block dubbed this region the “Blue Serengeti” because of its similarity with the African Serengeti, where animals roam freely. Now she’s part of a campaign to expand existing marine sanctuaries to protect more of this area. Sanctuary status would limit large-scale industrial efforts like oil and gas exploration in these areas as well as ban the use of certain recreational watercrafts like Jet skis. But sanctuaries don’t regulate commercial fishing and the use of gillnets off the coast of California, which is why Barbara Block supports a ban. BARBARA BLOCK: Gillnetting can be a very destructive form of fishing. BARBARA BLOCK: I think the oceans requires bold movement where we’re pointing out to everyone else on the globe that we’re taking a stand. We’re preserving these places, and we’re doing what it takes to protect the wildlife that exists here. JOHN CARLOS FREY: But the possibility of banning gillnets completely has these commercial fishers up in arms. KATHY FOSMARK: It’s sad. It’s sad. I mean, I– I don’t wanna say my grandfather’s rolling over in his grave right now. But you know, both my grandfathers were fishermen. JOHN CARLOS FREY: Kathy Fosmark says her family has been in the fishing industry here since the 1830’s. Before California was even a state in the union. Her ancestors were whalers. Today her family fishes mostly for swordfish, which they use gillnets to catch. KATHY FOSMARK: The majority of our livelihood comes from swordfishing. And all the boats here in Moss Landing that are fishing swordfish– it’ll take a third of their income or more. JOHN CARLOS FREY: If swordfish fishery disappears off the coast of California, a third of their salary is gone. KATHY FOSMARK: A third or more, yes. Most of the fishermen would probably go out of business. JOHN CARLOS FREY: Fosmark admits that marine animals do, at times, get caught in the gillnets on her husband and son’s boats… KATHY FOSMARK: All fisheries have a bicatch. JOHN CARLOS FREY: …But she says that swordfishing is already highly regulated.. making them, for example, lower their nets deeper in the ocean so that air breathing marine mammals like dolphins and seals don’t get trapped. KATHY FOSMARK: If they were to pass this bill all the swordfish would be imported and U.S. jobs would be lost. MICHAEL VINCENT MCGINNIS: Maritime cultures are endangered today. As much as these fishes are. Or these marine mammals are. JOHN CARLOS FREY: Michael Vincent McGinnis is an expert on marine policy and a professor at the Monterey Institute of International Studies. McGuiness is an ecologist at heart, but believes that California must not forget about the fishermen whose livelihoods and way of life hang in the balance. MICHAEL VINCENT MCGINNIS: The two go hand-in-hand: the fish and the fish story. And I think ideally, we need to make it more equitably about the loss of our– our maritime tradition and the fishing families that are part of that. JOHN CARLOS FREY: Conservationists, like Geoff Shester, are quick to say that they don’t want gillnet fishermen to lose their livelihood.. they just want them to fish in a different manor, such as using a harpoon. while some fishermen now use harpoons, many commercial fishers dismiss this idea as simply unsustainable. KATHY FOSMARK: You will not receive enough fish in a catch– for a trip, to make it commercially caught. It would cost too much money to go out there and drive your boat out there to catch one swordfish a day. JOHN CARLOS FREY: When I spoke to fishermen and brought up the idea of using harpoon, their response was: One fish at a time will put them outa business. GEOFF SHESTER: Harpooning requires, you know, a lot of skill in order to find the fish, et cetera. And you spend a lotta time searching, right? Whereas a gillnet, you just put it out. And you basically put a net out on a highway– you know, an ocean highway full of traveling everything. And– and it’s a lot easier. JOHN CARLOS FREY: Marine policy expert Michael Vincent McGinnis says that its unlikely that these gillnet fishermen can easily switch to harpooning. He also points out that Gill net fishing takes place on the coastal waters of every continent, except Anartica. And because these fish and marine mammals migrate back and forth across the ocean, if they are not caught in American gill-nets they may be caught in Chilean or Filipino gillnets. MICHAEL VINCENT MCGINNIS: It an important part of a puzzle that’s need to be seriously considered strategically. If we’re really interested in protecting sharks and mammals and dolphins and turtles, we need to work together. What happens in our jurisdiction may have an important part of a role in protecting a species, but other countries are still fishing. And they’re still using s– you know, the– the type of gear types that are indiscriminate. That– where you have a high level of bycatch. JOHN CARLOS FREY: Just last month, here in California, the proposed bill to ban gill-nets failed to make it past the Water, Parks, and Wildlife Assembly Committee by just one vote. That means advocates will have to wait till next year to try to end gill-net fishing off the coast of California.
<urn:uuid:5d3c967d-144f-4409-82a7-c14a387dd51c>
CC-MAIN-2016-26
http://www.pbs.org/newshour/bb/swordfishing-practices-scrutiny-californias-coast/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399106.96/warc/CC-MAIN-20160624154959-00109-ip-10-164-35-72.ec2.internal.warc.gz
en
0.931651
2,092
2.71875
3
Somniloquy literally means “sleep talking”. Although classified as a parasomnia, talking during sleep is generally considered of no medical or psychological consequence. Sleep talking can occur at any point in the sleep cycle. The lighter the sleep, the more intelligible the speech. In stages 1 and 2, the talking might sound intelligible. In deep sleep, somniloquy may be restricted to moans and gibberish. Popular myth associates sleep talking with dreams. While it is possible to talk in REM sleep, it isn't as likely as at other stages. During REM, our body undergoes temporary paralysis: a safety mechanism designed to prevent us from acting out our dreams and hurting ourselves. This paralysis usually includes the jaw and speech mechanisms. People who talk while asleep have no awareness that they are talking, and speak in an emotionless tone. Somniloquy is not generally considered a serious problem unless other disorders, such as somnambulism and apnea, are involved. Anxiety disorders, stress, and fevers generally make people talk more. Somnilioquy is one of the mysteries of sleep – scientists still don’t know why it happens. A recent study of toddlers found that over 80% talk in their sleep, a much higher percentage than kids who sleepwalk, wet their beds, or suffer bruxism or night terrors. Older kids and adults of all ages can talk in their sleep. If somniloquy proves irritating to others in the household, you can try these tips to reduce it.
<urn:uuid:1ee8ea8b-1d54-4cb9-a7fc-ec75931aea11>
CC-MAIN-2016-26
http://www.sleepdex.org/somniloquy.htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397842.93/warc/CC-MAIN-20160624154957-00086-ip-10-164-35-72.ec2.internal.warc.gz
en
0.959035
326
3.453125
3
LINCOLN’S OHIO SPEECHES When Lincoln, in opening the Senatorial campaign of Illinois, declared that the Republican cause must be intrusted to its own undoubted friends “who do care for the result,” he displayed a much better understanding of the character and aims of his opponent than those who, not so well informed, desired the adoption of a different course. Had the wishes of Greeley and others prevailed, had Douglas been adopted by the Illinois Republicans, the party would have found itself in a fatal dilemma, No sooner was the campaign closed than Douglas, having entered on his tour through the South, began making speeches, apparently designed to pave his way to a nomination for President by the next Democratic National Convention. Realizing that he had lost ground by his anti-Lecomptonism, and especially by his Freeport doctrine, and having felt in the late campaign the hostility of the Buchanan Administration, he now sought to recover prestige by publishing more advanced opinions indirectly sustaining and defending slavery. Hitherto he had declared he did not care whether slavery was voted down or voted up. He had said he would not argue the question whether slavery was right or wrong. He had adopted Taney’s assertion that the negro had no share in the Declaration of Independence. He had asserted that uniformity was impossible, but that freedom and slavery might abide together forever. But now that the election was over and a new term in the Senate secure, he was ready to conciliate pro-slavery opinion with stronger expressions. Hence, in a speech at Memphis, he cunningly linked together in argument unfriendly legislation, slavery, and annexation. He said: “Whenever a Territory has a climate, soil, and production making it the interest of the inhabitants to encourage slave property, they will pass a slave code.” Wherever these preclude the possibility of slavery being profitable, they will not permit it. On the sugar plantations of Louisiana it was not a question between the white man and the negro, but between the negro and the crocodile. He would say that between the negro and the crocodile, he took the side of the negro; but between the negro and the white man, he would go for the white man. The Almighty has drawn the line on this continent, on the one side of which the soil must be cultivated by slave labor; on the other by white labor. That line did not run on 36 and 30’ [the Missouri Compromise line], for 36 and 30’ runs over mountains and through valleys. But this slave line, he said, meanders in the sugar-fields and plantations of the South, and the people living in their different localities and in the Territories must determine for themselves whether their “middle bed” is best adapted to slavery or free labor. [Sidenote] Douglas, Memphis Speech, Nov. 29, 1858. Memphis “Eagle
<urn:uuid:f6727b39-f00e-4d0d-9501-7da8fb4b809d>
CC-MAIN-2016-26
http://www.bookrags.com/ebooks/11708/101.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395166.84/warc/CC-MAIN-20160624154955-00189-ip-10-164-35-72.ec2.internal.warc.gz
en
0.977995
604
3.109375
3
Physicist Velker Rose adjusts this synchrotron x-ray scanning tunnelling microscope for an experiment to look into nano scale materials. (Chuck Berman, Chicago Tribune) Argonne National Laboratory has a baseball stadium-size, X-ray machine that enables scientists to examine a vast array of materials in slivers as tiny as several atoms wide, work that some believe is key to breakthrough research on everything from curing cancer to making the perfect fuel cell. But, its advocates suggest, Argonne's Advanced Photon Source may be growing obsolete. The Department of Energy in late April gave preliminary approval to start designing a $300 million upgrade, which would enhance the brightness of Argonne's X-ray beams by 100 times and add more beams. That upgrade would substantially advance scientists' ability to examine materials at the atomic level and in shorter snatches of time, an improvement that is expected to lead to a greater understanding of how things work. "The percentage of materials we use today compared to those we could make is a very, very tiny percent," APS Director J. Murray Gibson said. He and other scientists call that shortage "a bottleneck" standing in the way of breathtaking scientific achievements. The APS' capacity to "look deep inside materials and watch what's happening while they're being created" has led to discoveries in disease prevention and energy conservation, Gibson and others at Argonne said. One of the more recent examples is the 2009 Nobel Prize in Chemistry, won by three biochemists who performed extensive research at Argonne's APS. In addition, other recent APS research has helped develop the anti-HIV drug Kaletra and the cancer-fighting drug Votrient. Scientists also are using the APS to gain a clearer understanding of the turbine engine, concrete's role in global warming and alternative fuels. "It's giving us the opportunity take leadership worldwide," Gibson said of the planned upgrade. Similar facilities exist in Japan and France. Opened in 1996, the APS serves more than 3,500 researchers every year, Gibson said, more than any other scientific user facility in the Western Hemisphere. Hundreds of U.S. companies and universities use the APS. But scientific advances in this area occur rapidly, said Gibson and Harriet Kung, associate director of science for Basic Energy Sciences at the U.S. Department of Energy. As those advances occur, the equipment needed to move the research forward needs enhancement, the scientists said. "It's vital to our mission to sustain our nation's position at the frontiers of materials characterization," Kung said. Materials characterization develops new energy technologies and more efficient substances. To maintain that leadership and "to improve our tools for research aimed at laying the foundations of a new energy economy," the Department of Energy on April 22 authorized Argonne to begin conceptual designs, she said. While Argonne, which is near Lemont, designs the upgrade, the Department of Energy will work to find the money at a time of acute public sensitivity to government spending. "I am not pessimistic about it at all," Gibson said "because I think it has tremendous economic impact." He said the improvements would create several hundred more jobs at Argonne, excluding the construction jobs that will emerge. "And," he said, "it will create new capabilities that will be very critical for new industries." Congress may be engaged in "partisan battles" now, said Fred Dylla, executive director of the American Institute of Physics. But he said he was optimistic representatives would understand that providing space for thousands of scientists conducting practical, potentially groundbreaking research is a wise investment of tax dollars. "It sounds expensive," Dylla said, "but given the number of scientists that use it, the number of experiments that can come out of it and given that the first machine was designed about two decades ago, this is really bargain science." U.S. Rep. Judy Biggert, R-Ill., whose district includes the 1,500-acre lab, called Argonne "the most widely utilized DOE user facility in the entire United States." She added that she is "very optimistic" that the upgrade will "receive strong bipartisan support," if her colleagues "are fully aware that this project is both a scientific priority and an investment in America's long-term economic competiveness." Those "scientific applications … are boundless but the facility is not," Biggert said. The upgrade "will exponentially improve our X-ray capabilities and open the facility to as many as 50 percent more users. Research in the material sciences could leap forward, and economic returns for the U.S. would not be far behind." If Congress funds the upgrade, construction could start by 2012, Gibson said, and be complete in 2017.
<urn:uuid:552d9d79-d2ee-40c6-a016-4f4e075a4894>
CC-MAIN-2016-26
http://articles.chicagotribune.com/2010-06-06/news/ct-met-argonne-upgrade-20100606_1_argonne-s-advanced-photon-source-argonne-national-laboratory-alternative-fuels
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397749.89/warc/CC-MAIN-20160624154957-00128-ip-10-164-35-72.ec2.internal.warc.gz
en
0.956871
973
3.109375
3
18 February 1932 A wave of covered wagons began their westward flow from the northern and eastern states into the southwest soon after the close of the Civil War. One of these covered wagons carried the household belongings of a Northern widow - widow of a missionary, who with her two small sons were on their way to a new home, new surroundings, new hardships, and new difficulties to a tract of land located in the northern part of the State of Texas - Grayson County - to what was to become Collinsville. This widow was Mrs. Lodoweska Collins from Ann Arbor, Michigan. Her husband, Rev. Walter D. Collins, missionary of the Methodist church, had been superintendent of education for the Cherokee and Choctaw Indians. It was while aiding her husband in his work in the Indian Territory that Mrs. Collins became vastly interested in the promotion of education. It was here that her two sons, Alpheus R. and Charles Collins were born. Mr. and Mrs. Collins had planned to make the long journey to their new home in the Southwest together but Mr. Collins' health failed and he had to give up his work with the Indians and return to Ann Harbor, where Mrs. Collins remained in Ann Arbor, Michigan, teaching so that her sons might have better educational advantages until after the Civil War. On her arrival in Grayson County, she immediately took up her philanthropy work. Here she opened and taught, at her own expense, the first free school in the state of Texas. This little school was a one-room construction of hewed logs. The cracks in the wall were filled with clay. The benches and desks used were from split-logs and wooden pegs being driven into the logs for legs. It was here that many prominent men and women, some of national fame, began their school days. Mrs. Collins was a graduate from the Weslyn Female College at Albion, Michigan. In 1885, Mrs. Collins went to St. Croix Falls, Wisconsin to attend a reunion of her family there. While there she read a poem which she had written for the occasion, the last stanza of which gives an insight to her feelings or her chosen home. My friends I bid you all good-bye; To my own Southern home hie; When next we meet, may one star lone Direct you to my Texas home! This poem was published in "The News" St. Croix Falls, Wisconsin July 16, 1885. Mrs. Collins' sons grew to manhood, entered various business enterprises and were successful. Alpheus R. Collins drew off and gave the community the town site that is Collinsville today. Before this time the town had been called "Toadsuck". Charles Collins was instrumental in locating the first post office in Collinsville. In 1877 Mrs. Collins accompanied her son, Charles, to California where he died. She returned and for a time made her home with Mr. and Mrs. John Dorchester at Sherman before going to live with her other son, Alpheus, who had moved to Denison and married Miss Hattie Daugherty of that city. The Daugherty family moved from Michigan where the two young people had met at Albion College where they were both students at that institution. Mrs. Collins' later years were spent in church and social welfare work in Denison. She died at the home of her son, May 16, 1886 at 4 p.m. o'clock. Funeral services for her were held in the Methodist Episcopal Church, North, May 17, 1886. Interment was in the Fairview Cemetery, Denison, Texas. Alpheus Remember Collins Alpehus Remember Collins became one of the most prominent and successful business men of Denison. He was interested in real estate, banking, and thoroughbred A.R. Collins' business card when he arrived in Denison Collins owned the A. R. Collins' Block at 511–513 West Main Street. He was an early Denison real estate dealer. A. R. Collins' impressive signature He owned two horses, which ranked high in the stock market at that time. Bonnie Medium, cousin of the famous Nancy Hanks, and the Duke of Clyds. Bonnie Medium was estimated to be valued at On February 11, 1892, Alpheus R. Collins died after a three years illness. His son, Walter, then fifteen years old was the only surviving member of the Collins family. C.E. Daugherty, brother-in-law of A.R. Collins, was appointed administrator of the Collins estate. The Sunday Gazetteer Sunday, February 19, 1893 A.R. Collins Estate lawsuit Sale of Property, 1894 Walter D. Collins Family
<urn:uuid:b7ef2858-9bef-49bd-849e-65ad43a50b46>
CC-MAIN-2016-26
http://www.rootsweb.ancestry.com/~txgrayso/bio/colllins/collinsfamily.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395160.19/warc/CC-MAIN-20160624154955-00173-ip-10-164-35-72.ec2.internal.warc.gz
en
0.981935
1,038
2.734375
3
Scientists hope to use cane toads' own poison against them in the fight to eradicate the species from Australia. Photo: AFP The cane toad's days may be numbered as new research shows the species' own poison could prove to be the best weapon in the fight against the pest. A team of researchers from the University of Sydney and the University of Queensland found the poisonous secretions of dead adult cane toads could be used as bait in traps set in water to catch and eradicate tens of thousands of toad tadpoles. The findings from the research were published in the Proceedings of Royal Society B today. Professor Rick Shine, from the University of Sydney's School of Biological Sciences, said a chemical "bait" produced from toad poison was "a real magnet for toad tadpoles". In a series of experiments, scientists collected more than 40,000 toad tadpoles and in less than 48 hours the entire clutch was eradicated. A cane toad can lay more than 30,000 eggs at a time. "When we use this chemical as bait in a funnel-trap we catch thousands of toad tadpoles and almost nothing else," he said. "In one natural pond, we collected more than 40,000 toad tadpoles in less than a week. And I think we got them all - over the next few weeks, not a single toad emerged from that pond." The cane toad was introduced to Australia in 1935 by the Bureau of Sugar Experiment Stations to combat an infestation of the native cane beetle in northern Queensland, but once the toads had arrived it was found they did not actually eat the beetles. Cane toads then spread in Queensland before moving into the Northern Territory and northern New South Wales, and more recently Western Australia. "We go to great lengths to protect the environment from human impact and then the toads come through and knock out thousands of varieties of native wildlife," Professor Robert Capon, of the University of Queensland's Institute of Molecular Bioscience, said. "The impact on the environment has been disastrous." The rate at which the toad reproduces has been one factor in the failed attempts so far to control it. "This means that even if you catch and kill 99 per cent of the adult toads in an area, the few that are left can produce so many offspring that before you know it you are back to where you started - just as many cane toads as ever," Professor Shine said. Professor Shine said the only solution was to stop toads from reproducing. "If we can do this, then removing the adult toads can make a big difference because there are no new toads being born to replace the ones we are eliminating," he said. Researchers intend to teach "toad-busting" community groups to use the traps but need to work on developing the technology so it can be handled safely. "This is the first time we have the prospect of knocking down the population in a managed way so local communities and farmers who are fed up have a chance to do something about it," Professor Capon said. Professor Capon said the technique the team developed was successful because cane toad tadpoles were cannibals. "They can smell out the eggs of another female and rush over to the eggs and eat them to get a good feed and get rid of competition from another genetic branch," he said. "Tadpoles are immediately attracted but ... other species are immediately alarmed and stay away from the traps." Professor Capon said this was the first stage of the project but the technique was expected to be developed further for release to local community groups and farmers.
<urn:uuid:ec2bd7f7-00c1-4e5d-8b79-628ca253dcf8>
CC-MAIN-2016-26
http://www.smh.com.au/environment/conservation/cane-toads-turn-out-to-be-their-own-worst-enemy-20120613-2097h.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399428.8/warc/CC-MAIN-20160624154959-00073-ip-10-164-35-72.ec2.internal.warc.gz
en
0.972486
764
3.25
3
Best if printed in landscape. Rules for Specific Foods Issues (often serious issues) have arisen for several food products in the past. As a consequence, Congress responded with unique laws to address specific food safety problems. This page reviews several of these specific food laws. FDA usually was given responsibility of administering these unique provisions. The following paragraphs are excerpts from NSW Food Authority, "Shelf stable acid preserved foods -- Factors affecting the shelf stability of acid foods -- Condiments, sauces and salad dressings", NSW/FA/FI035/0811. They provide some background information as to why low-acid canned foods have specific regulations. "Thermally processed acid foods have a good record of food safety and shelf stability... Products that have the right combination of low pH, adequate levels of acetic acid, salt and sugars can be filled without a thermal process and still be safe and stable... However, if products are not properly formulated there can be risks to food safety or shelf stability. In particular poorly acidified foods can lead to botulism and cold filled products with inadequate acetic acid can spoil. "Most foods on supermarket dry-grocery shelves are shelf stable products. Some foods such as dry pasta and rice are intrinsically shelf stable. "Other foods rely on a range of technologies to ensure shelf stability. These include the elimination of microorganisms capable of growing in the food system by retorting or UHT processing or by adjusting the environment in the food so that it is not suitable for the growth of microorganisms. Control of water availability, pH reduction, the use of organic acids or preservatives and heat shocks are common methods to inhibit microbial growth. "Acid and acidified foods are well represented on the supermarket shelf. The determinants of food safety and shelf stability are long established. However, the US Food and Drug Administration (FDA, undated) lists a history of botulism attributed to inadequately acidified foods and notes that products processed by 29 firms were found to be inadequately acidified. [Botulism is caused by the anaerobic, spore-forming microorganism Clostridium botulinum. Although outbreaks of botulism are extremely rare, the consequences can be lifethreatening.]" End of excerpts The following paragraph is an excerpt from FDA "Instructions for Establishment Registration and Processing Filing for Acidified and Low-Acid Canned Foods". "Improperly processed low-acid canned foods or acidified foods present life-threatening hazards; therefore registration of those establishments which manufacture, process, or pack low-acid canned foods or acidified foods and filing of the processes they use are necessary to identify processors and to monitor compliance with the regulations, to provide for immediate application of emergency permit control should a potential public health hazard be identified." [edited] "The purpose of FDA's requirements for registration, manufacturing, and process filing of low-acid canned foods and acidified foods in hermetically sealed containers is to ensure safety from harmful bacteria or their toxins, especially the deadly Clostridium botulinum (C botulinum). [Ensuring the safety] can only be accomplished by adequate processing, controls, and appropriate processing methods, such as cooking the food at the proper temperature for sufficient times, adequately acidifying the food, or controlling water activity." Taken from FDA web site that is no longer available. - "(n) Low-acid foods means any foods, other than alcoholic beverages, with a finished equilibrium pH greater than 4.6 and a water activity (aw) greater than 0.85. Tomatoes and tomato products having a finished equilibrium pH less than 4.7 are not classed as low-acid foods." see 21 CFR §113.3. - "(b) Acidified foods means low-acid foods to which acid(s) or acid food(s) are added; these foods include, but are not limited to, beans, cucumbers, cabbage, artichokes, cauliflower, puddings, peppers, tropical fruits, and fish, singly or in any combination. They have a water activity (aw) greater than 0.85 and have a finished equilibrium pH of 4.6 or below. These foods may be called, or may purport to be, "pickles'' or "pickled" ..." see 21 CFR §114.3. ... Infant Formula - "An infant formula, including an infant formula powder, shall be deemed to be adulterated if such infant formula does not provide nutrients as required ..., such infant formula does not meet the quality factor requirements ..., or the processing of such infant formula is not in compliance with the good manufacturing practices and the quality control procedures..." See 21 U.S.C. §350a - "All manufacturers of infant formula must begin with safe food ingredients, which are either generally recognized as safe (GRAS) or approved as food additives for use in infant formula. Once an infant formula product is formulated, current laws require that the manufacturer must provide FDA assurance of the nutritional quality of that particular formulation before marketing the infant formula. FDA has provisions that include requirements for certain labeling, nutrient content, manufacturers quality control procedures (to assure the nutrient content of infant formulas), as well as company records and reports." See 21 CFR 107 (Infant Formula) and 21 CFR 106 (Infant Formula quality control procedures) FDA Guidance & Regulatory Information for infant formula - Two unique features of the infant formula law: - Regulatory oversight includes nutrient content; not just safety concerns. The focus on nutrient content reflects the international concern at that time that infant formula was not providing the nutrition needed by infants and that infants around the world were being malnourished. This link provides some additional information. - FDA is authorized to mandate a recall of unsafe infant formula (21 CFR 107.200 et. seq.). - "FDA operates a mandatory safety program for all fish and fishery products..." - "FDA's ... regulations (21 CFR 123) ... require processors of fish and fishery products to develop and implement Hazard Analysis Critical Control Point (HACCP) systems for their operations." "The FDA operates an oversight compliance program for fishery products under which responsibility for the product's safety, wholesomeness, identity and economic integrity rests with the processor or importer, who must comply with regulations promulgated under the Federal Food, Drug and Cosmetic (FD&C) Act, as amended, and the Fair Packaging and Labeling Act (FPLA). In addition, FDA operates the Low-Acid Canned Food (LACF) program which is based on the Hazard Analysis Critical Control Point (HACCP) concept, and is focused on thermally processed, commercially sterile foods, including seafood such as canned tuna and salmon. Most FDA in-plant inspections consider product safety, plant/food hygiene and economic fraud issues..." excerpt from a previous web page "All juice (as defined in 21 CFR 120.1(a)) sold as juice or for use as an ingredient in other beverages is subject to the requirements of the juice HACCP regulation, with the exception of juice produced at a retail establishment ..." excerpt from Guidance for Industry: Juice HACCP Hazards and Controls... ... Fresh-Cut Fruits and Vegetables "The overarching goal of FDA's Action Plan is to minimize the incidence of foodborne illness associated with the consumption of fresh produce. To achieve this goal, the Action Plan has four general objectives: 1) Prevent Contamination of Fresh Produce with Pathogens; 2) Minimize the Public Health Impact When Contamination of Fresh Produce Occurs; 3) Improve Communication with Producers, Preparers, and Consumers about Fresh Produce; and 4) Facilitate and Support Research Relevant to Fresh Produce. For each objective, FDA's Action Plan identifies steps that could contribute to the achievement of the objective. "FDA believes that the most effective strategy for reducing foodborne illness from fresh produce is one that approaches the problem from several different angles. For this reason, the Action Plan anticipates that FDA's food safety partners in both the public and private sectors will participate in the identified activities. By working both independently and cooperatively, these agencies or groups will ensure maximum progress toward the goal of reducing the incidence of foodborne illness associated with the consumption of fresh produce." Produce Safety From Production to Consumption: 2004 Action Plan to Minimize Foodborne Illness Associated with Fresh Produce Consumption - FDA activities on produce safety (tomato, leafy greens, lettuce, coordinating with USDA, produce safety action plan, etc) - Guidance documents for sprouts … Dietary Supplements - "FDA regulates dietary supplements under a different set of regulations than those covering "conventional" foods and drug products..." - Overview of Dietary Supplements (an FDA web page with frequently asked questions about dietary supplements; appears to be a good place to start your reading on this topic) - "A dietary supplement is a product taken by mouth that contains a "dietary ingredient" intended to supplement the diet. The "dietary ingredients" in these products may include: vitamins, minerals, herbs or other botanicals, amino acids, and substances such as enzymes, organ tissues, glandulars, and metabolites. Dietary supplements can also be extracts or concentrates, and may be found in many forms such as tablets, capsules, softgels, gelcaps, liquids, or powders... [Dietary Supplement Health and Education Act of 1994 ] places dietary supplements in a special category under the general umbrella of "foods," not drugs, and requires that every supplement be labeled a dietary supplement." - Congress defines dietary supplements as food and thus they are not regulated as a drug - "... the dietary supplement manufacturer is responsible for ensuring that a dietary supplement is safe before it is marketed. FDA is responsible for taking action against any unsafe dietary supplement product after it reaches the market. Generally, manufacturers do not need to register with FDA nor get FDA approval before producing or selling dietary supplements. Manufacturers must make sure that product label information is truthful and not misleading." - Vitamins and minerals 21 U.S.C. §350; this section encompasses dietary supplements. [edited] "A dietary supplement is a vitamin, a mineral, an herb or other botanical, an amino acid, a dietary substance for use by man to supplement the diet by increasing the total dietary intake (e.g., enzymes or tissues from organs or glands), or a concentrate, metabolite, constituent or extract." [edited] "A new dietary ingredient is a dietary ingredient that was not sold in the U.S. in a dietary supplement before October 15, 1994. A manufacturer or distributor must notify FDA if the business intends to market a dietary supplement in the U.S. that contains a new dietary ingredient. The manufacturer (and distributor) must demonstrate to FDA why the ingredient is reasonably expected to be safe for use in a dietary supplement, unless it has been recognized as a food substance and is present in the food supply." "There is no authoritative list of dietary ingredients that were marketed before October 15, 1994. Therefore, manufacturers and distributors are responsible for determining if a dietary ingredient is "new", and if it is not, for documenting that the dietary supplements its sells, containing the dietary ingredient, were marketed before October 15, 1994." - The Proxmire Amendment (Sec. 411 FDCA, codified at 21 U.S.C. §350) prohibits FDA from specifying "maximum limits on the potency of any synthetic or natural vitamin or mineral within a food" - "...the Secretary may not establish ... maximum limits on the potency of any synthetic or natural vitamin or mineral within a food; the Secretary may not classify any natural or synthetic vitamin or mineral (or combination thereof) as a drug solely because it exceeds the level of potency which the Secretary determines is nutritionally rational or useful; the Secretary may not limit... the combination or number of any synthetic or natural vitamin, mineral, or other ingredient of food ... - "[This prohibition] shall not apply in the case of a vitamin, mineral, other ingredient of food, or food, which is represented for use by individuals in the treatment or management of specific diseases or disorders, by children, or by pregnant or lactating women." 21 CFR 190 - Labeling -- A Dietary Supplement Labeling Guide - Five statements are required on the package of a dietary supplement: 1) the statement of identity (name of the dietary supplement), 2) the net quantity of contents statement (amount of the dietary supplement), 3) the nutrition labeling, 4) the ingredient list, and 5) the name and place of business of the manufacturer, packer, or distributor. - The statement of identity and the net quantity of contents statement must appear on the principal display panel. - The information panel must contain the "Supplement Facts" panel, the ingredient list, and the name and place of business of the manufacturer, packer, or distributor if such information does not appear on the principal display panel. - The "Supplement Facts" panel is used on dietary supplements in place of the nutrient label that is required for food products. The major differences between "Supplement Facts" panel and "Nutrition Facts" panel are - A supplement facts panel must list dietary ingredients without RDIs or DRVs. - A supplement facts panel may list the source of a dietary ingredient. - A dietary ingredient does not have to be listed in the ingredient statement for dietary supplements if it is listed in the supplement facts panel. - The part of the plant from which a dietary ingredient is derived must be listed in the supplement facts panel. - "Zero" amounts of nutrients are not allowed in the supplement facts panel for dietary supplements. -- see organic commodities; discussed as part of commodity production and labeling. Organic foods are generally addressed by USDA, rather than FDA. Review USDA National Organic Program See 7 CFR 205 The USDA accredits private businesses, organizations, and state agencies to certify producers and handlers of agricultural products according to the NOP regulations. Certification is the process where a producer or handler is approved by an Accredited Certifying Agent as being in compliance with the NOP regulations and is then authorized to sell, label, or represent products as being “certified organic”. Organic Labeling and Marketing - Agricultural Products labeled as “100 percent organic” must contain (excluding water and salt) only organically produced ingredients and processing aids. Agricultural Products labeled “organic” must consist of at least 95 percent organically produced ingredients (excluding water and salt). - Processed products that contain at least 70 percent organic ingredients can use the phrase “made with organic ingredients” and list up to three of the organic ingredients or food groups on the principal display panel. Processed products that contain less than 70 percent organic ingredients cannot use the term organic anywhere on the principal display panel. However, they may identify the specific ingredients that are organically produced on the ingredients statement on the information panel. - The information panel of any product labeled as organic must - identify each organically produced ingredient in the ingredient - provide the name and address of the certifying agent of the final product. The National Organic Standards Board’s main mission is to make recommendations about whether a substance should be allowed or prohibited in organic production or handling, and to assist in the development of standards for substances to be used in organic production. "Responsibility for implementing the coordinated framework fell primarily to three agencies: USDA, the Environmental Protection Agency (EPA), and FDA. Within USDA, the Animal and Plant Health Inspection Service (APHIS) bears the main responsibility for assessing the environmental safety of GM crops. The primary focus of APHIS' review is to determine whether or not a plant produced through biotechnology has the potential to harm natural habitats or agriculture. Developers can petition APHIS to exempt a GM plant from regulation once sufficient and appropriate data have been collected regarding the potential environmental impact of a GM plant. APHIS' Role in Biotechnology (USDA) "APHIS regulates the introduction (importation, interstate movement, or environmental release) of certain genetically engineered (GE) organisms. All regulated introductions of GE organisms must be authorized by APHIS under either its permitting or notification procedures. "When a developer has collected enough evidence that a GE organism poses no more of a plant pest risk than an equivalent non-GE organism, the developer may petition APHIS to grant the GE organism non-regulated status. If the petition is approved by APHIS, the GE organism may then be introduced into the United States without any further APHIS regulatory oversight." excerpt from Permits, Notifications, and Petitions "To safeguard the environment and human health, EPA is responsible for regulating genetic modifications in plants that protect them from insects, bacteria, and viruses. These protectants are subject to the agency's regulations on the sale, distribution, and use of pesticides. EPA must review and grant a permit for field-testing plants with such protectants on more than 10 acres of land. Prior to commercialization of a GM plant with such a protectant, EPA reviews the application for approval of the protectant, solicits public comments, and may seek the counsel of external scientific experts. Microbial Products of Biotechnology: Final Regulations Under the Toxic Substances Control Act Summary "FDA has primary authority for the safety of most of the food supply. The Federal Food, Drug, and Cosmetic Act establishes the standard for food safety as food being in an unadulterated condition. FDA established its basic policy regarding the review of GM foods in its 1992 Policy on Foods Derived from New Plant Varieties. According to this policy, FDA relies on companies developing GM foods to voluntarily notify the agency before marketing the foods. Notification leads to a two-part consultation process between the agency and the company that initially involves discussions of relevant safety issues and subsequently the company's submission of a safety assessment report containing test data on the food in question. At the end of the consultation, FDA evaluates the data and may send a letter to the company stating that the agency has no further questions, indicating in effect that it sees no reason to prevent the company from marketing the GM food. In 1997, FDA supplemented its 1992 Policy with the current Guidance on Consultation Procedures, clarifying procedures for the initial and final consultations. Plant Biotechnology for Food and Feed (FDA) "It is the responsibility of the producer of a new food to evaluate the safety of the food and assure that the safety requirement of section 402(a)(1) of the act is met." "In regulating foods and their byproducts derived from new plant varieties, FDA intends to use its food additive authority to the extent necessary to protect public health. Specifically, consistent with the statutory definition of "food additive" and the overall design of FDA's current food safety regulatory program, FDA will use section 409 of the act to require food additive petitions in cases where safety questions exist sufficient to warrant formal premarket review by FDA to ensure public health protection." "... the agency does not believe that the method of development of a new plant variety (including the use of new techniques including recombinant DNA techniques) is normally material information within the meaning of 21 U.S.C. 321(n) and would not usually be required to be disclosed in labeling for the food." Guidance to Industry for Foods Derived from New Plant Varieties "In January 2001, FDA issued a proposed rule in the Federal Register that provides further information on these procedures and, more importantly, would require pre-market notification by companies. Among the reasons that FDA cited for this change are concerns expressed by consumers and public interest groups about the limited transparency and voluntary nature of the current process. FDA also pointed to the growing power of biotechnology to create potentially more complex safety issues that could require more stringent regulatory evaluations. FDA, tentatively, expects to finalize this rule as early as fiscal year 2003." Excerpt from GENETICALLY MODIFIED FOODS Experts View Regimen of Safety Tests as Adequate, but FDA's Evaluation Process Could Be Enhanced International response to GMOs in food Summary of Key Points - U.S. food law has a long history of evolving as new issues and concerns lead to political reaction. This has certainly been the trend for U.S. federal food law. This page introduced several U.S. federal food laws that address specific foods. Each of these laws has a history of events that caught national or international attention in the past 50 years. Persons involved in the food industry need to recognize the application of the general or encompassing food laws may be altered by additional or divergent legal requirements for specific foods. April 24, 2010
<urn:uuid:86a0feca-e807-4af3-9018-14290a17de7b>
CC-MAIN-2016-26
https://www.ndsu.edu/pubweb/~saxowsky/aglawtextbk/chapters/foodlaw/processR7.htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397749.89/warc/CC-MAIN-20160624154957-00048-ip-10-164-35-72.ec2.internal.warc.gz
en
0.923377
4,340
3.296875
3
|Lee De Forest| Birthplace: Council Bluffs, IA Location of death: Hollywood, CA Cause of death: unspecified Remains: Buried, San Fernando Mission Cemetery, Mission Hills, CA Race or Ethnicity: White Sexual orientation: Straight Party Affiliation: Republican Nationality: United States Executive summary: Inventor of the Audion vacuum tube Inventor and electrical engineer Lee De Forest held nearly 180 patents, but is best known by far for his 1907 improvements to the vacuum tube invented by John Ambrose Fleming. De Forest's innovation was a three-electrode vacuum tube, or triode, which he trademarked as the Audion. Capable of detecting, controlling, and even amplifying electrical signals, the Audion revolutionized electronics and formed the basis for subsequent technologies including telephone, television, radar, and early computer systems until the development of transistors in the late 1940s. De Forest's father was a Congregationalist minister and the President of Talladega College, an all-black school in Alabama. For teaching Negros the family was virtually shunned by white neighbors in Alabama, and all of young De Forest's friends as a child were blacks. A bright boy who enjoyed tinkering, he was sent to the Mount Hermon School for Boys in Massachusetts, where he was named "homeliest boy in school". From there he went to Yale, where he graduated with a thesis on "Reflection of Hertzian Waves from the Ends of Parallel Wires" -- radio. After graduating from college he worked at Western Electric, where he designed dynamos, telephone equipment, and early radio gear. In 1902 he opened his own business, the De Forest Wireless Telegraph Company, selling radio equipment and demonstrating the new technology by broadcasting Morse code signals. Within four years he had been squeezed out of the management of his own company. In the prospectus for his second try at business, De Forest Radio Telephone Company in 1907, he envisioned using radio to broadcast church meetings, lectures, even opera performances into people's homes. In 1910 he successfully broadcast Enrico Caruso's performance from the New York Metropolitan Opera to a small roomful of reporters some blocks away from the theater. For several years De Forest operated an experimental radio station, 2XG in High Bridge, New York, which broadcast music nightly and was received as far away as New Jersey. In 1913 he sold his patent for the Audion to AT&T, which used it to improve the quality of long-distance telephone service feasible. Still, acceptance and practical uses for his inventions came slowly, and after the collapse of his second company in 1912, De Forest was prosecuted for mail fraud. Prosecutors deemed his Audion a "worthless device", but he was exonerated at trial. He later spent 19 years in various courtrooms wrangling with Edwin H. Armstrong, who had first noted the Audion's ability to feed back (feedback) its signal to itself, thus amplifying signals or sound. De Forest won that battle at the US Supreme Court, though most experts found Armstrong's claim far more persuasive. De Forest was also victorious in a 1931 lawsuit against General Electric for patent infringement. Most of De Forest's many patents were for relatively minor technical advances, though almost any invention would be deemed minor in comparison to the Audion. His most notable other work was Phonofilm, a recording system that embedded a soundtrack in motion picture film, allowing talking movies. In the 1920s he ran the De Forest Phonofilm Company, using his movie sound system to make experimental shorts, mostly filming vaudeville acts at New York theaters. His Phonofilm was not the system used for The Jazz Singer in 1927 and the flood of "talkies" which followed. Still, he was given an honorary Oscar in 1960, "for his pioneering inventions which brought sound to the motion picture." As radio changed from a crystal-set hobby to a big business, De Forest was a frequently cited expert on the medium's early days. In 1930 he was elected President of the Institute of Radio Engineers, and he immediately made headlines with a public denouncement of the growing commercialization of radio, after which he was rarely invited onto the major networks. For the next few decades, De Forest's main work revolved around building and preserving his legacy as the "Father of Radio" — a term coined by De Forest, who often described himself as "a disappointed parent." In the 1950s he worked as a pitchman for shortwave radio sets, and wrote a column for The Hollywood Reporter on "The Coming Miracles of Science." In his last years he developed paranoid suspicions about friends, family, and former colleagues, and complained bitterly that his contributions to science had been unappreciated. He publicly referred to AT&T as the “chiseler” of his Audion patent rights. He was a cousin of actress Bebe Daniels, best known for the movie 42nd Street, and a great-uncle of TV oddity Calvert DeForest, who was a frequent presence on David Letterman's TV programs. His second wife, Nora Stanton Blatch Barney, was a well-known suffragette and civil engineer, and the granddaughter of Elizabeth Cady Stanton. Father: Henry Swift DeForest (Congregational minister, b. 17-Mar-1833, d. 27-Jan-1896) Mother: Anna Margaret Robbins DeForest (b. 2-Jul-1848, m. 25-Aug-1869, d. 8-Jun-1927) Sister: Mary De Forest (b. 1871) Brother: Charles Mills De Forest (author, b. 1878) Wife: Lucille Sheardown (clerical worker, m. 1906, annulled 1907) Wife: Nora Stanton Blatch Barney (suffragette, b. 1883, m. 24-Feb-1908, sep. 1909, div. 1912, d. 1971) Daughter: Harriot Stanton De Forest Allabem Wagner (flight instructor, b. 19-Jun-1909) Wife: Mary Mayo (opera singer, b. 1892, m. 23-Dec-1912, div. 1930) Daughter: Eleanor De Forest Peck ("Deena") Son: (b. 1926, d. infancy) Wife: Marie Mosquini (silent film star, b. 3-Dec-1899, m. Oct-1930 until his death, d. 21-Feb-1983) High School: Northfield Mount Hermon School, Northfield, MA (1892) University: BS, Sheffield School of Science, Yale University (1896) University: PhD, Sheffield School of Science, Yale University (1899) Western Electric Research (1899-1902) American Wireless Telegraph Company Research (1899-1902) De Forest Wireless Telegraph Company Founder and President (1902-06) De Forest Radio Telephone Company Founder and President (1907-12) De Forest Phonofilm Company Founder and President (1920-29) National Association for Better Radio and Television Vice President (1951) The Hollywood Reporter Columnist Bell Laboratories Research American Association for the Advancement of Science Society of Wireless Telegraph Engineers Institute of Radio Engineers President (1930-32) Oscar (honorary) 1960:For motion picture sound system National Inventors Hall of Fame 1977 IEEE Medal of Honor 1922 IEEE Edison Medal 1946 Hollywood Walk of Fame 1750 Vine St. (motion pictures) Radio Hall of Fame 1989 Mail Fraud Indicted 1913, acquitted Author of books: Father of Radio (1915, memoir) Television: Today and Tomorrow (1942, nonfiction) Do you know something we don't? Submit a correction or make a comment about this profile Copyright ©2014 Soylent Communications
<urn:uuid:d6c881b2-5cd6-44ad-b027-23974f0d1548>
CC-MAIN-2016-26
http://www.nndb.com/people/128/000083876/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399425.79/warc/CC-MAIN-20160624154959-00011-ip-10-164-35-72.ec2.internal.warc.gz
en
0.948467
1,666
2.859375
3
The Great Northern Railway (GNR) Class N2 is an 0-6-2T steam locomotive designed by Nigel Gresley and introduced in 1920. Further batches were built by the London and North Eastern Railway from 1925. They had superheaters and piston valves driven by Stephenson valve gear. Some locomotives were fitted with condensing apparatus for working on the Metropolitan line between King’s Cross and Moorgate. The N2s were designed for suburban passenger operations, and worked most of the duties out of King’s Cross and Moorgate, often hauling one or two quad-art sets of articulated suburban coaches. These ran to places such as New Barnet and Gordon Hill on the Hertford loop. They also hauled some empty coaching stock trains between King’s Cross and Ferme Park carriage sidings. (Source: Wikipedia) Nikon D60, 18-55 mm lens, handheld, f/3.5, 1/30, ISO 400, no flash. single file converted to 3 exposures in PS (-1, 0,1). tone mapped in Photomatix.
<urn:uuid:c9a27df8-a835-42af-8f59-b33a0bd41af0>
CC-MAIN-2016-26
http://www.redbubble.com/people/spectrumcry/works/5313748-the-heart-of-gnr-1744
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397696.49/warc/CC-MAIN-20160624154957-00183-ip-10-164-35-72.ec2.internal.warc.gz
en
0.967462
234
2.71875
3
Not every wind turbine is suitable for every site. A criterion for suitability for example could be the given climate conditions at the site: an experienced developer knows at which range of temperatures, wind conditions, etc. the considered wind turbine type is able to operate without restrictions. Another criterion e.g. is the Sound Power Level of a wind turbine type (being associated with its noise emission): there are significant differences between turbine types and manufacturers. A wind farm developer like NewEn has all relevant information about market proven wind turbines and is able to take all of these factors into account while planning the wind farm layout. How does a wind turbine work? The principle of a wind turbine is rather simple. The energy of the wind causes the propeller-like blades of the wind turbines to rotate. The rotor is connected to the main shaft inside the nacelle which connects to a gearbox that in turn converts the slow motion into a fast motion. The fast motion is required by the generator, which uses magnetic fields to convert the rotational energy into electrical energy. A transformer converts the electrical energy to the appropriate voltage for distribution via the existing grid. There are many different wind turbine designs, with plenty of scope for innovation and technological development. The dominant wind turbine design is an up-wind, three bladed, pitch controlled and variable speed machine. Components of a wind turbine: Wind turbines have just one, two or three blades. Nowadays most turbines have three. These are made from glass fibre reinforced plastic and lightwood. The colour of the blades can differ between various site locations. Often blades are marked with red stripes which is to improve flight security and depends on the surrounding area, maximum tip height and the appropriate law. Most manufacturers have a well developed lightning protection with special receptors mounted on the blade. Some manufacturers offer heating of the blades to avoid icing. The rotor hub connects the blades to the nacelle and transfers the power to the main shaft. Some years ago the connection of blades and hub had been rigid. Today the blades can be turned a) to secure the highest efficiency by rotating the blades to a position where the maximum energy of the wind can be harvested and b) to stop the operation of the turbine, which would be necessary for maintenance or when excessive winds might inflict danger on the wind turbine or in case of a failure. The system responsible to turn the blade into the right position is called ‘pitch system’. The pitch system (hydraulic or electric) is located in the hub. The nacelle houses the turbine including every mechanical and electrical component. The yaw mechanism turns the nacelle with the hub and the blades so that they face directly into the wind. It is situated between the nacelle and the tower. The control of the yaw system is influenced by the wind direction, measured on top of the nacelle. The main shaft is made of steel and passes the motion of the rotor to the gearbox. A bearing mounted on the bed plate of the nacelle is holding the main shaft in its position. There are different types of gearboxes on the market (spur gear, planetary gear or a combination of both). Their task is to convert the slow motion of the main shaft into the fast rotation required for the generator. Some manufacturers do not use a gearbox but install a generator working with low rotation (‘direct drive’). These generators have to be significantly larger but on the other hand the omission of a gearbox often results in reduced maintenance work. Generally a wind turbine has two brakes: one are the blades, reducing the speed can be accomplished by turning only one blade – or in general all blades “out of the wind” so that rotation is reduced or stopped alltogether. The other is a mechanical disc brake mostly mounted on the fast shaft between the gearbox and the generator. For wind turbine designs without any gearbox the manufacturers have found some other solutions for their brake system. For service and maintenance work the rotor can be locked manually. Generally there are two different types of wind generators: synchronious and asynchronius (induction generator). Nowadays most wind turbine manufacturers use doubly-fed asynchronius generators (allowing variable rotational speed). Turbine designs without gearboxes use synchronous generators (annular generators). All variable speed turbines need to convert their electrical energy coming from the generator to a certain frequency to ensure compliance with the grid code. The quality of the electricity produced by the generator is variable – depending on the rational speed of the shafts (therefore originally influenced by the wind). To fulfill the local grid code requirements the frequency converter transfers the electricity from alternating current (AC) to direct current (DC) and again to AC but with a certain frequency (e.g. 50 Hz in Europe, 60 Hz in Northamerica and Korea). The wind turbine generates low voltage energy which has to be transferred to middle voltage energy before being fed into any grid. Large wind farms require a substation to transform the middle voltage energy to high voltage energy to feed into the prevailing high voltage transmission line. The SCADA system (Supervisory Control And Data Acquisition) allows the telemonitoring of any turbine from the service centre of the manufacturer, provided there is a fast internet connection. All data collected at the wind turbine (e.g. temperature, wind direction, wind strenght, oil pressure) and any reaction of the turbine (e.g. pitch angle, yaw angle, heatening or cooling of components) are visible to the manufacturer online who controls each and every turbine throughout the entire year on a 24/7 basis. The owner and operator of the turbine very often can have access to the main data as well. Many of the instruments/sensors (e.g. anemometer, wind vane, shadow detector if any) are visibly mounted outside on the nacelle, some are connected inside (e.g. vibration sensors). There are many tower types on the market such as pure steel towers, concrete towers, lattice towers and hybrid towers (hybrid tower: concrete and steel for the upper part), cylindric or conical or a mixture from both. In general the height of a tower is decisive for the wind energy turbines efficiency. The higher the tower, the stronger the wind at hub height and the less turbulent – and as a result: the higher the annual electrical output. Naturally higher towers are more expensive, therefore each wind farm requires its own individual solution. NewEn has the experience to find the best solution for your wind farm
<urn:uuid:a728d9e0-6043-40e7-9368-61e69aec15b4>
CC-MAIN-2016-26
http://www.newen.com.au/html/s02_article/article_view.asp?keyword=Wind-turbines
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398873.39/warc/CC-MAIN-20160624154958-00196-ip-10-164-35-72.ec2.internal.warc.gz
en
0.915208
1,361
3.59375
4
Join U-M paleontologist Dr. Jeff Wilson and his colleague Geological Survey of India paleontologist Dr. Dhananjay Mohabey to hear the story of the discovery of a remarkable fossil from 67 million year old sediments in western India that captures a snake in the act of preying upon a dinosaur hatchling. The lecture will focus on an India before the rise of the Himalayas, during a time of intense geologic, geographic, and biotic change. The lecture celebrates the opening of a new exhibit at the U-M Museum of Natural History, featuring a spectacular sculptural recreation of the dramatic fossil scene by Chicago-area paleo-artist Tyler Keillor. The lecture is also part of the Winter 2014 LSA Theme Semester, India in the World. Sponsored by the University of Michigan Museum of Natural History.
<urn:uuid:f0d156d4-b742-4bfb-b1b0-d84fdd34579d>
CC-MAIN-2016-26
http://www.lsa.umich.edu/india/events/lectures/ci.indiabeforethehimalayaswhensnakesatedinosaurssat15feb2014_ci.detail
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398516.82/warc/CC-MAIN-20160624154958-00170-ip-10-164-35-72.ec2.internal.warc.gz
en
0.894131
175
2.96875
3
Risks and Rewards of Public-Private Partnerships for Highways December 29, 2011 Public-private partnerships (PPPs) for infrastructure are contracts between public and private entities for the provision of facilities in areas such as power, water, transportation, education and health. One of their primary benefits over traditional, state-run construction projects is that they deliver more efficient results in a timelier manner. States are increasingly using PPPs to deliver new transportation capacity, thereby improving road access without unduly increasing the burden on taxpayers. By restructuring the standard model of construction projects for the public, PPPs bring several benefits to all involved parties, says Baruch Feigenbaum, a policy analyst at the Reason Foundation. - PPPs offer a means to construct needed infrastructure during these times of tight state budgets, thereby allowing states to continue to modernize with little additional budget liability. - This new form of construction allows private companies to pull into the market new kinds of financing and sources of capital that otherwise have little involvement in the public sector. - PPPs allow state governments to shift the risks of a given project away from the taxpayer toward investors and lenders, thereby optimizing risk allocation for those who desire it. - Free market efficiencies and competitive pressures are more prevalent in PPP projects because the private sector is faster to react to customer needs and technological shortcomings. - PPPs will encourage greater experimentation and innovation because private sector entities are more likely to deviate from standard protocol. PPPs are extremely adaptable to a given situation, making them useful for state governments that have a multitude of differing construction needs. Three factors remain crucial in maximizing efficiency gains from PPPs: - The state should offer a well-defined and clear legal environment in which the private entity may operate. - States should maintain oversight over PPPs, perhaps by allocating responsibility to a given state committee. - PPPs should be employed primarily for large projects (more than $1 billion in cost), as this creates the greatest room for efficiency gains from the private market. If a state is able to implement policies that address these three factors, it will see the aforementioned benefits that PPPs have to offer. Source: Baruch Feigenbaum, "Risks and Rewards of Public-Private Partnerships for Highways," Reason Foundation, December 2011. Browse more articles on Government Issues
<urn:uuid:610f15ef-788c-4d48-93ad-7400e8ca031a>
CC-MAIN-2016-26
http://www.ncpa.org/sub/dpd/index.php?Article_ID=21436
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783392159.3/warc/CC-MAIN-20160624154952-00003-ip-10-164-35-72.ec2.internal.warc.gz
en
0.938077
490
2.515625
3
What is this process of witnessing, or bearing witness, that is more than just seeing? When we bear witness to a situation, we become each and every aspect of that situation. When we bear witness to Auschwitz, at that moment there is no separation between us and the people who died. There is also no separation between us and the people who killed. We ourselves, as individuals, with our identities and ego structure, disappear, and we become the terrified people getting off the trains, the indifferent or brutal guards, the snarling dogs, the doctor who points right or left, the smoke and ash belching from the chimneys. When we bear witness to Auschwitz, we are nothing but all the elements of Auschwitz. It is not an act of will, it is an act of letting go. What we let go of is the concept of the person we think we are. It's why we start from unknowing. Only then can we become all the voices of the universe -- those that suffer, those that inflict suffering, and those that stand idly by. For we are all these people. We are the universe. After five days of sitting at the Selection Site and chanting names, many could see themselves as those who had gone to the gas chambers, including those who had no direct family connection to Auschwitz. Mothers thought of themselves bringing their own children into the death chambers. Men saw their own bodies going up in smoke in the crematoria. It was harder to see oneself as a guard who'd herded people to their death. One of the retreat participants was a Vietnam veteran. He said that he could see himself as one of the guards on top of the guardposts, aiming his gun at the people below. But not many people could see themselves that way. The famous prayer about oneness, the Sh'ma Yisrael, begins with Listen: Listen, O Israel, the Lord our God, the Lord is One. Not only does oneness begin with listening, listening begins with oneness. And Zen Peacemaker Order's Buddhist service begins similarly: Attention! Attention! Raising the Mind of Compassion, the Supreme Meal is offered to all the hungry spirits throughout space and time, filling the smallest particle to the largest space. Listen! Attention! Bear witness! It can't happen if you want to stay away from pain and suffering. It probably won't happen if, like most people, you go to Auschwitz, look over the exhibits, and return to the buses for a quick getaway. When you come to Auschwitz, stay a while, and begin to listen to all the voices of that terrible universe -- the voices that are none other than you -- then something happens. http://188.8.131.52/search?q=cache:G3S ... clnk&cd=40
<urn:uuid:100e9b4f-2f08-4edb-826a-d8dd58cdd1b7>
CC-MAIN-2016-26
http://www.treeleaf.org/forums/showthread.php?6091-query-Bearing-Witness&p=19483
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393518.22/warc/CC-MAIN-20160624154953-00034-ip-10-164-35-72.ec2.internal.warc.gz
en
0.970781
578
2.53125
3
Apitherapy is the use of products from the bee to heal a variety of medical conditions and promote health. The products that are usually used include raw honey, royal jelly, pollen, propolis, bee wax and bee venom. The term apitherapy is derived from the words apis meaning bee and therapy meaning treatment. The apitherapy is claimed to be effective against a wide range of medical conditions ranging from arthritis and chronic pain to serious medical conditions like cancer and stroke. There is very little scientific evidence to support many of the claims of the apitherapists, however it remains one of the main branches of alternative medicine.
<urn:uuid:f95fdc1d-cdba-4cfa-a9d6-b61ea879bf2a>
CC-MAIN-2016-26
http://www.medicineworld.org/alternative/apitherapy/what-is-apitherapy.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783394987.40/warc/CC-MAIN-20160624154954-00109-ip-10-164-35-72.ec2.internal.warc.gz
en
0.957259
127
2.6875
3
Try grouping the dominoes in the ways described. Are there any left over each time? Can you explain why? Have a good look at these images. Can you describe what is happening? There are plenty more images like this on NRICH's Exploring Squares CD. Can you put the numbers from 1 to 15 on the circles so that no consecutive numbers lie anywhere along a continuous straight line? This was a problem for our birthday website. Can you use four of these pieces to form a square? How about making a square with all five pieces? Find out why these matrices are magic. Can you work out how they were made? Can you make your own Magic Matrix? Kaia is sure that her father has worn a particular tie twice a week in at least five of the last ten weeks, but her father disagrees. Who do you think is right? An investigation involving adding and subtracting sets of consecutive numbers. Lots to find out, lots to explore. Libby Jared helped to set up NRICH and this is one of her favourite problems. It's a problem suitable for a wide age range and best Contributions from three different schools helped to solve this Go to last month's problems to see more solutions. This article, written for teachers, looks at the different kinds of recordings encountered in Primary Mathematics lessons and the importance of not jumping to conclusions!
<urn:uuid:98aee8cc-0248-4a98-a353-084ace3e1748>
CC-MAIN-2016-26
https://nrich.maths.org/thismonth/1and2/2007/01
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396147.66/warc/CC-MAIN-20160624154956-00031-ip-10-164-35-72.ec2.internal.warc.gz
en
0.955694
297
3.25
3
Discussing a Socioscientific Issue in a Primary School Classroom: The Case of Using a Technology-Supported Environment in Formal and Nonformal Settings - Maria EvagorouAffiliated withSchool of Education, University of Nicosia (UNic) Email author Recent educational reports in the USA (Duschl, Schweingruber, & Shouse, 2007), the UK (Osborne, 2007), and elsewhere in Europe have called for a science education that places an emphasis on scientific literacy, and makes the connection between science and everyday life. The focus of this approach is on the social aspects of science, aiming to prepare young people for life beyond school. Aikenhead (2006) has attempted to define the term by explaining scientific literacy as acquiring knowledge for science—that is, both knowledge of the content and knowledge about science, which he sees as the social processes of science. Likewise, in national reform documents, the core of scientific literacy is related to understanding knowledge and processes of science, and the application of this knowledge (AAAS, 1993; National Research Council, 1996). - Discussing a Socioscientific Issue in a Primary School Classroom: The Case of Using a Technology-Supported Environment in Formal and Nonformal Settings - Book Title - Socio-scientific Issues in the Classroom - Book Subtitle - Teaching, Learning and Research - pp 133-159 - Print ISBN - Online ISBN - Series Title - Contemporary Trends and Issues in Science Education - Series Volume - Series ISSN - Springer Netherlands - Copyright Holder - Springer Science+Business Media B.V. - Additional Links - eBook Packages To view the rest of this content please follow the download PDF link above.
<urn:uuid:da33b187-4a0b-433b-9b97-557ff5b3b7f2>
CC-MAIN-2016-26
http://link.springer.com/chapter/10.1007/978-94-007-1159-4_8
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396875.58/warc/CC-MAIN-20160624154956-00174-ip-10-164-35-72.ec2.internal.warc.gz
en
0.859121
366
3.046875
3
What’s PUP.Optional.Tarma.A virus? Today we are going to talk about a highly dangerous virus, called PUP.Optional.Tarma.A. Its biggest feature is that it is able to download other PC threats onto the infected computer automatically, especially rogue antispyware and ransomware. Generally, PUP.Optional.Tarma.A is spread through spam e-mails. Hackers add malicious codes to the e-mails, so PUP.Optional.Tarma.A can be downloaded and installed without your consent. Once it gets inside successfully, it brings lots of troubles to you. Firstly, it installs other malware, which not only occupies a lot of system resources, but also seriously reduces computer performance. Secondly, hackers can control the infected computer remotely via PUP.Optional.Tarma.A to steal your confidential information, such as online bank accounts, passwords, logins and so on. Thirdly, the virus creates many system vulnerabilities through modifying the Windows registry and other important system settings. Hence, the infected computer becomes so vulnerable that it is easy to be attacked by other viruses. Like other Trojan viruses, only when PUP.Optional.Tarma.A is detected by antivirus programs, can you find out its existence. Therefore, in order to protect your computer, we suggest that you be more careful when surfing on the Internet. If PUP.Optional.Tarma.A is found out, you should delete it as soon as possible. Read more » What’s Trojan: Win32/Crilock.A virus? Recently, a new Trojan horse virus named Trojan: Win32/Crilock.A has attacked many computers. Experts warn you that this is a very malicious infection and you must be cautious about it. Generally, Trojan: Win32/Crilock.A is spread through spam attachments, porn websites, FTP servers and freeware. When it finds the system vulnerabilities, it sneaks into so quickly that antivirus software cannot catch it timely. After installation, it begins to damage your computer. First of all, it alters system settings, in order to disguise itself as an ordinary file and disable the firewall. Secondly, it encodes certain critical files and deletes the original versions, which makes you not able to recover those non-backup files. Thirdly, hackers can control the infected computer remotely and the virus is able to steal your sensitive information, including accounts, identities, logins and so on. Furthermore, the virus has the ability to install other malware on your computer, such as adware and browser hijacker viruses. As a result, your computer will run very slow and you cannot improve its performance. Owing to its techniques, only when the virus is detected by the antivirus programs, can you realize there is such a horrible virus running in your PC. Therefore, it is urgent for you to remove Trojan: Win32/Crilock.A as soon as possible before it causes greater damages. Read more » What Is Trojan.Spy.Bancos.gen!K Virus? If the antivirus programs keep warning you that Trojan.Spy.Bancos.gen!K is endangering your computer, your PC is severely damaged by a highly risky virus which is called Trojan.Spy.Bancos.gen!K. Generally speaking, Trojan.Spy.Bancos.gen!K is distributed via spam e-mails, corrupt websites, free software, P2P network and removable devices. So, you are likely to get infected with it by accident. Once Trojan.Spy.Bancos.gen!K virus finishes the installation, it will begin a series of unauthorized activities and then bring lots of troubles to you. First of all, to prevent itself from being deleted, Trojan.Spy.Bancos.gen!K modifies system settings and injects its codes to the registry. As a result, it can hide deeply in the system and some functions of the antivirus application are disabled. Because of Trojan.Spy.Bancos.gen!K virus, your computer will not work properly anymore. It breaks down frequently and often has BSOD error. On the sly, the virus exploits many security leaks, via which additional malware can sneak into without any effort. So many malware will make your system much weaker than before. What’s more, being a Trojan, the most harmful feature of Trojan.Spy.Bancos.gen!K virus is stealing data from the infected machine. That is to say, if you don’t get rid of it timely, hackers will take advantage of the stolen information to further damage your benefit. For example, they use your identity to apply for a credit card and overdraft the account. At the end, you are the person who should be responsible for the debt and interests. All in all, facing Trojan.Spy.Bancos.gen!K virus, the cleverest thing is installing a powerful antivirus and then deleting the virus without any hesitation. Read more » Trojan:Win32/Napolar.A Virus Description: When the antivirus warn you that Trojan:Win32/Napolar.A is endangering your system, you need to be cautious, because Trojan:Win32/Napolar.A is a highly risky Trojan infection that should be removed from your computer as soon as possible. At the very beginning, you may not notice Trojan:Win32/Napolar.A’s existence, for it hides deeply in system files and keeps changing its folder name and path. And through this way, Trojan:Win32/Napolar.A not only can avoid most security detection, but also can seriously compromise your system. Secondly, owing to Trojan:Win32/Napolar.A, the infected PC becomes more and more vulnerable. On one hand, it exploits system loopholes, via which additional malware can sneak into easily. On the other hand, this virus affects the running of security system, so that the antivirus and the firewall can’t work as properly as usual. Thirdly, owing to Trojan:Win32/Napolar.A and various infections, your workstation will run extremely slow and meet with many system faults, such as BSOD, freezes, crashes and so on. Furthermore, Trojan:Win32/Napolar.A is created by hackers for the purpose of collecting victims’ private data. So, if your PC is infected, all your privacy will be endangered. Generally speaking, Trojan:Win32/Napolar.A can steal data through monitoring the browsing activities and analyzing the surfing interest. Therefore, in addition to severe PC malfunctions, you are likely to encounter financial losses and other problems. All in all, once Trojan:Win32/Napolar.A is detected in your system, you should get rid of it as quickly as you can. Read more » Trojan Horse Generic34.bumw Virus Description: Trojan Horse Generic34.bumw virus is a destructive Trojan horse virus that deserves your attention. The virus is a rootkit Trojan, so that it is good at concealing itself. At the very beginning, Trojan Horse Generic34.bumw finds out security loopholes accurately, via which it can sneak into your system quickly and secretly. Most antivirus can’t block its invasion at the very beginning. After installation, there is no doubt that Trojan Horse Generic34.bumw will bring a series of severe problems to you. In order to protect itself, Trojan Horse Generic34.bumw alters system settings and injects its codes to the Windows registry. As a result, the security system can’t work properly and some of its functions are disabled. Trojan Horse Generic34.bumw is stealthy and stubborn, because it uses random folder name and keeps changing the location. It conceals deeply in the system and to completely delete it is a tough job. Besides, Trojan Horse Generic34.bumw virus encrypts and damages important system files. Because of this, you fail to run some programs and receive many system error messages, such as PropSchemaReg64.exe error, x2comsAY.dll error and so forth. All kinds of malfunctions become common, including BSOD, freezes, crashes, Internet connection failure and so on. Moreover, Trojan Horse Generic34.bumw virus is the major factor that should be blamed for the snail like computer running and performance. On the other hand, Trojan Horse Generic34.bumw is a virus which is designed to steal data from the infected machine. So, the information stored in your workstation is not safe anymore, and in addition to the problems we mentioned above, you are likely to encounter more and more troubles. To sum up, Trojan Horse Generic34.bumw virus is a vicious PC infection and to effectively protect your system, you should get rid of Trojan Horse Generic34.bumw virus as quickly as you can. Read more »
<urn:uuid:6a322f7a-f1a7-4b3f-abf9-a626808dc9e6>
CC-MAIN-2016-26
http://virusremovalhelps.com/category/trojans/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398869.97/warc/CC-MAIN-20160624154958-00039-ip-10-164-35-72.ec2.internal.warc.gz
en
0.925855
1,866
2.609375
3
Older adults have the right to live safely and manage their own affairs. When someone violates those rights and causes harm, that's abuse. Often the abuser is someone in a position of trust, like a family member, friend, or caregiver. Abuse can take many forms. - It is financial abuse if somebody tricks, threatens, or persuades older adults out of their money, property, or possessions. - It is emotional abuse if somebody threatens, insults, intimidates, or humiliates an older adult, treats the person like a child, or does not allow them to see their family and friends. - It is a violation of rights and freedoms if somebody interferes with an older adult's ability to make choices, especially when those choices are protected under the law. Examples include interfering with spiritual practices or traditions, withholding mail or information, dictating how someone else can spend their own money, or keeping someone in an institution without a legitimate reason. - It is neglect if somebody fails to provide the necessities of life, such as food, clothing, a safe shelter, medical attention, personal care, and necessary supervision. Neglect may be intentional or unintentional. Sometimes the people providing care do not have the necessary knowledge, experience, or ability. - It is sexual abuse if somebody forces an older adult to engage in sexual activity. This may include verbal or suggestive behaviour, not respecting personal privacy, sexual touching, or sex without the person's consent. - It is physical abuse if somebody hits an older adult or handles the person roughly, even if there is no injury. Giving a person too much or too little medication, or physically restraining a person, are also forms of physical abuse. Impolite behaviour or rudeness is not abuse. Arguments and conflicts are not abuse either. If both people have power in the relationship and can make choices about what happens next, then it is not an abusive situation. If an older adult tells you they are being abused or hurt, believe them!
<urn:uuid:00229b2b-279e-4087-ba94-b9318b7e72c6>
CC-MAIN-2016-26
http://www.novascotia.ca/seniors/stopabuse/booklet_1.asp
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395992.75/warc/CC-MAIN-20160624154955-00175-ip-10-164-35-72.ec2.internal.warc.gz
en
0.923961
410
3.015625
3
The Fourteen Holy Helpers Actually, the number of these saints venerated as a group was not always the same. In France, for in stance, the Fourteen Holy Helpers were fifteen, because Our Lady was added to the others. Furthermore, the list of the "Helpers" varied. In some places in Germany local favorite saints like St. Dorothy or St. Nicholas of Myra ("Santa Klaus") replaced some of the saints more widely invoked under this group title. It was apparently German Dominican priests who, in the 14th century, first promoted devotion to the cluster of fourteen well-known saints. Cistercian and Benedictine monks adopted the devotion and further promoted it. From Germany it spread to Bohemia, Moravia, Hungary, Italy and France; but Germany remained the real center. Why cultivate a group of saints? The theory was that since each of those 14 promised (or was said to have promised) while still alive to intercede after death on behalf of certain human needs, the intensive invocation of the whole company would take care of the majority of mankind's necessities. They were called in Germany the NOTHELFER - "Helpers in Need." The 14 usually included are the following. St. Denis of Paris (invoked against headaches and rabies); St. Erasmus of Elmo (for colic or cramps); St. Blaise (for throat ailments); St. Barbara (protector against lightning, fire, explosion, and sudden, unprovided death); St. Margaret (against diabolic possession and for pregnant women); St. Catherine of Alexandria (patroness of philosophers, students and wheelwrights); St. George (for soldiers); Sts. Achatius and Eustace (for hunters); St. Pantaleon the Physician (against tuberculosis); St. Giles (against epilepsy, insanity and sterility); St. Cyriac (against diabolic possession); St. Vitus (against epilepsy and "St. Vitus' Dance" - chorea); and St. Christopher the Giant (patron of travelers). In the middle of the 15th century, the devotion to the "Vierzehnheiligen" ("Fourteen Saints" or "Fourteen Martyrs") found its focus in the diocese of Bamberg. The literature distributed at their shrine told the following story about the origin of the cult. About 1445, it was said, the son of the shepherd employed by the Cistercian monastery at Langheim near Bamberg had a vision of the Christchild surrounded by 14 children. The Christ told the shepherd's son that these were the 14 Holy Helpers. They wished to have a chapel built in their honor on that spot, for they promised to dispense from thence group favors. The chapel was forthwith built. Destroyed in the Reformation period, it was reconstructed in 1553. The 1553 church was succeeded in 1772 by the present basilica, a notable model of German Rococo architecture by the famous architect Balthasar Neumann. This still remains a popular shrine for the dioceses of Bamberg and Wuerzburg. At one time there was at least one church in America dedicated to the Fourteen Holy Helpers - a church in Baltimore, presumably having a German-American congregation. But devotion to the Holy Helpers never took deep root in this country. No doubt these Holy Helpers, all recognized saints, inspired piety and obtained favors. It was, however, one of those medieval popular devotions that could easily create the impression that we venerate the saints, whether singly or in groups, simply because of their ability to grant favors, and not also as people whom we are expected to imitate. The "gimme" approach smacks of haggling in the marketplace; and while the saints, as our friends, cannot object to a little haggling, I am sure that they are willing to be our "need-helpers" mainly to persuade us to become more like the Christ who dispenses his graces through them. --Father Robert F. McNamara
<urn:uuid:edd06fda-adde-4d68-b66c-173cd86d45a1>
CC-MAIN-2016-26
http://kateriirondequoit.org/resources/saints-alive/fabiola-fursey/the-fourteen-holy-helpers/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397865.91/warc/CC-MAIN-20160624154957-00150-ip-10-164-35-72.ec2.internal.warc.gz
en
0.967299
847
3.046875
3
Investigation of the evolutionary history of our species allows for a much broader understanding of human craniofacial anatomy. On the one hand, research involving our most distant ancestors, Ardipithecus, Australopithecus, etc., provides an understanding of features of the human skull that are driven by changes in locomotion. These locomotor changes result in a significant restructuring of the skull, particularly in the nasal capsule, nasopharynx, and spinal cord regions. These modifications result in anatomical compromises that are the basis for numerous clinically relevant conditions in humans. On the other hand, focusing on only our own species, and closely related subspecies, provides us the ability to directly observe the primitive craniofacial form and how it has changed in the last ~300,000 years. We know that there has been positive selection on genes that both increase brain size and support its functions, but how these changes relate to other significant changes in craniofacial form (reduction of the face and dentition, significant changes in shape, etc.) are not known. As a member of the Middle Awash Research Project, I have access to fossil remains of the earliest modern humans recovered recently at Herto, Ethiopia (160-180,000 years old). Because such old human remains were previously unknown, these new fossils mean that we are now in a position to delimit changes that resulted in the appearance of a modern human cranial shape. Also, we now have the basis for all subsequent geographic variations that derive from that original form. This means that we are very close to unlocking what our original ancestors looked like and what changes occurred in the evolution of all the modern variants. My colleagues and I are employing a range of computed tomography facilities to generate images of varying resolutions (hospital CT, microCT, and synchrotron microCT) for our work on describing and interpreting fossil evidence from Herto, Ethiopia. Additionally, we are in the process of describing Neanderthal remains from Moula-Guercy, France. Although these remains are highly fragmented, we are employing 3D technologies to virtually reconstruct the crania. My work on the earliest modern human crania from Herto, Ethiopia will appear as a co-edited book with Dr. Berhane Asfaw, National Museum of Ethiopia, in a volume to be published by the University of California Press. My colleagues and I are also currently preparing a series of publications that will serve as a descriptive catalogue for the Neanderthal remains from Moula-Guercy, France. Dr. Gary D. Richards, email@example.com, 415.929.6573
<urn:uuid:74e84bc7-b1f1-46b5-b555-3b7433b86340>
CC-MAIN-2016-26
http://www.dental.pacific.edu/Faculty_and_Research/Research/Areas_of_Research_Interest/Craniofacial_Investigations/Craniofacial_evolution_in_hominids_and_apes.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395546.12/warc/CC-MAIN-20160624154955-00171-ip-10-164-35-72.ec2.internal.warc.gz
en
0.930114
541
2.5625
3
The story takes place in heaven ("Up") in the late twentieth century. Eleanor of Aquitaine, Empress Matilda, and William the Marshall are waiting for King Henry II to be admitted to heaven at last. The Abbot Suger stops to chat with Eleanor and stays to wait, too. To pass the time, the four recall Eleanor's time on Earth. The flashbacks on earth are set during the Middle Ages in France and England, with a brief trip to the Holy Land. The flashbacks trace the highlights of Eleanor's life from 1137—when she is fifteen years old and about to wed Louis Capet, soon to be King Louis VII of France—to her death in 1204. Her life encompasses the rule of England by her husband Henry II and by her sons Richard and John. (The entire section is 132 words.)
<urn:uuid:788942e9-5262-4330-a92d-7fc6c47a1896>
CC-MAIN-2016-26
http://www.enotes.com/topics/proud-taste/in-depth
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783400031.51/warc/CC-MAIN-20160624155000-00057-ip-10-164-35-72.ec2.internal.warc.gz
en
0.924435
171
3.078125
3
The Society of Ancient Ireland Heroic & Dark Fantasy and Science Fiction character Created by Kevin L. O'Brien reland had what could be called a sophisticated primitive society. This is a society that is otherwise quite advanced culturally and technologically, but lacks several key features that are normally associated with a non-primitive society. For the Irish, these features were a written language, urban centers (e.g., cities and towns), and money (e.g., currency). This essay describes what is currently known about ancient Irish society. Where necessary, singular and plural forms of Irish words are indicated by the following code: singular form / plural form. Please see the Pronunciation Guide for a key on how to pronounce the various word sounds. The ancient Irish social structure was stratified, though not as heavily stratified as other sophisticated primitives. Its hierarchy was established by three separate, yet superimposed, organizations. One was based on blood and kinship, another on profession, and the last on class. First and foremost in Irish society was the familial organization. The basis of this organization was the immediate family (fine / finí). An Irish family was not like a modern family, with just parents and children. It included everyone who lived under the same roof, which not only meant grandparents and grandchildren, but often unmarried aunts and uncles, and at times even nephews and nieces. Next up was the extended family (sept / septeanna), which included married aunts and uncles, and often closely related cousins. After that came the clan (clann / clanna), which included all the families that claimed lineage from a single ancestor. Several related clans then formed a tribe (tuath / tuatha), which was generally recognized as the smallest political unit. Several interrelated tribes formed a kingdom (dál / dála), while a number of individual kingdoms formed a province (coiced / coicedí). There were five provinces in ancient Ireland — Ulster (Ulaidh), Connaught (Connacht), Leinester (Laigin), Munster (Mamu), and Meath (Mide) — and while in later centuries Ulster and Meath got split up and recombined by various tribes, the other three remained intact until the disastrous failure of O'Neill's rebellion to force out the English. Superimposed on the familial organization was the professional organization, which was fairly simple. People were divided into three groups: the warriors (láech / láecheanna), the craftsmen (cerd / cerdí), and the laborer farmers (aithech / aithecheanna). The warriors were the elite. They ran the society at large, but they also protected it. As well, their status as heroes meant that, rather than resent them, the laborer farmers honored them, even revered them. Even so, the laborer farmers were the backbone of the society. They tended the land, raised the food, and herded the cattle. Without them, the warriors would starve, so rather than ride roughshod over the commoners as in other societies, the warriors treated the laborer farmers with respect. Meanwhile, the craftsmen (and women) composed the middle rank. They too depended upon the warriors for protection, but they also depended upon the laborer farmers for food. However, the other two classes depended upon the goods that the craftsmen created. They made the weapons, armor, and chariots the warriors used; they made the farm implements the laborers used; and they made the everyday items everyone needed, and the objets d'art everyone appreciated. They also included priests, musicians, poets, scholars, law keepers, physicians; anyone needed to make a civilization viable. The class organization was more complex, and sometimes crossed professional boundaries. There were six classes: the rulers, the aristocrats, the freemen, the laborers, the serfs, and the dependents. Each level had its own rights and privileges, and was in turn subdivided into additional levels and/or positions. However, unlike many other societies, this was not a caste system. No one was rigidly fixed into the profession, class, and position into which he or she was born. In fact, it was possible for anyone at any level, even the lowest, to advance to a higher level through hard work and diligence. The ruling class was composed of the chiefs and kings, who led each level of society. At the bottom was the clan chieftain (rí clainne). For the most part, clans tended to be rather small, so more often than not, the clan chieftain was also the village chieftain, but some clans were large enough to encompass a number of villages, in which case the subordinate village leaders were simply known as chiefs (rí / ríthe). Next up was the tribal chieftain (rí tuaithe), and above him was the leader of the local kingdom (rí dáil). Finally, the provincial leader (rí coicede) was high king (ard rí) over all within the province. Theoretically, the provincial kings were subordinate to the High King of Ireland (rí ruírech), but the high kingship was largely a ceremonial position, and the High King had authority only over the territory immediately around Tara. As such, the provincial kings were pretty much free to act as they saw fit. The only time the High King could rule undisputed was during a national calamity, and even then the provincial kings often were not fully cooperative. The first, and only, High King to truly rule undisputed was Brian Boru, and his power died with him at the Battle of Clontarf in 1014 C.E. The aristocrat class was privileged (nemhedh), which meant they could hold the land and control its usage and distribution. In Iron Age Ireland, land was not privately owned, but owned by the tribe as a whole. However, the aristocrats held the land in trust for the general tribal membership (céile). The tribe as a whole determined the division of arable tribal land between that held by the chief or king to support his rule, that held by the nobles and their tenants, and that shared by all the free commoners. The rest was non-arable wasteland, which was treated by the tribe as common land unclaimed by any class and could be used by all people for grazing, hunting and gathering food, collecting firewood, etc. Nonetheless, the leaders and aristocrats received the bulk of the arable land, and they were free to determine how to use it and who could work it. There were two types of aristocrats: the warrior nobility (uasal) and the professionals (flaith). All warriors, no matter how humble, were noblemen (airech / airecheanna), and needed land to support them so they could devote themselves to fighting. The highest rank a warrior could hold, however, was not the equivalent of a modern military or titled rank, but that of champion (fénnid / fénneada). This makes sense, though, considering the heroic nature of Irish Iron Age Celtic society. The professionals also needed land, to support themselves as they devoted their efforts to their professions. These included physicians (fáithliag / fáithliaig), historian poets (fili / filidh), law-keepers (breitheamh / breitheamha), and the priests (druih / druihe). The freemen (aire / airí) were not privileged (doernemhedh), so they could not hold land themselves, but they could rent it from a nobleman, or they could be granted it by the tribe as a whole. They could, however, own personal property, including cattle. Most freemen were farmers (bóaire / bóair), but among their ranks were also certain skilled tradesmen. These were people who performed tasks that were highly prized by the aristocracy; these included the musician poet (bard / baird), blacksmith (gobae / gobaí), and charioteer (arae / araí). This last might seem odd, but charioteers did not engage in battle themselves, except under the most dire circumstances. However, this was a way a freeman could be advanced to the aristocratic level, if he distinguished himself in combat. The laborers (féine / féiní), on the other hand, as well as being non-privileged, were not allowed to own personal property. Nor were they able to rent land from the aristocrats. Instead, they either lived on whatever land the general tribal membership assigned them to, or squatted on unclaimed tribal land. As with the freemen, most were farmers (bothach / bothaigh), but many worked at some sort of craft. These people were usually employed by the aristocrats, but were not held in as high regard as the free tradesmen. Some of these crafts included wright or carpenter (saer / saereanna), bodyguard (amuis / amosa), hospitaler (briugu / briugunna), watchman (dercia / derciana), chef (rannaire / rannairí), steward (rechteaire / rechteairí), and messenger (techt / techte). Yet despite their social handicaps, the freemen and the laborers were all free commoners and members of the tribe. This gave them a say in tribal affairs and full voting rights, including the election of the leader and the division of tribal land. In fact, they formed the bulk of the tribal membership, and so were the ultimate foundation of law and authority in Irish society. The serfs (sencleith / sencleithí) worked the land for the nobles and some of the free commoners who were granted land. They were tied to the land, unable to leave it without permission, but they were not slaves. They were in fact still considered to be members of the tribe, and while they had no voting rights, they still had a right to occupy tribal land and to prosper from their own labor. The dependents (fuidir / fuidirí), however, had no such rights, and were generally considered to be bonded, little better than slaves in most cases. There were two types of dependents. Outsiders (saer-fuidir / saer-fuidirí) were law-abiding strangers who, for whatever reason, were without a tribe. They were granted the right to squat on unclaimed tribal land by the chieftain or king, contingent on their continued good behavior, but they had no voice in tribal matters and were dependent upon the tribe's goodwill. The other type (daer-fuidir / daer-fuidirí), however, consisted of captives, criminals, and slaves, all of whom had no rights whatsoever. Even so, Irish law favored emancipation, and it was possible for anyone in this class to be freed and/or adopted by the tribe, as a reward for extraordinary service. Male slaves (mug / muig) were often called bondmen; female slaves (cumhal / cumhala) were often called bondmaids or bondwomen, and were used as a unit of currency to describe the worth of other valuable items. One other aspect of heroic Irish society that should be discussed is the rights of women. There is some confusion over this issue, with one group of people maintaining that the women were no better than chattel, and another arguing just as strongly that the women were equal, even superior, to men. What needs to be kept in mind is that the former derive their opinion from Medieval sources, whereas the latter derive theirs from the ancient sagas. However, both groups of sources are to some extent exaggerated; the truth most likely lies somewhere in between. Using these sources as guides, and adding other sources such as the Brehon Laws, the picture that one gets is that, while ancient Irish society was strongly paternalistic, women enjoyed many rights and could yield considerable power, given the right mix of talent, ambition, and opportunity. For example, in Medieval societies in general, it was the father's right to choose who his daughter would marry. In ancient Ireland, though, the woman was free to marry whomever she chose, regardless of her father's wishes. In addition, she was free to divorce her husband whenever she wanted. Whereas in Medieval Europe, women were restricted to being wives, nuns, or whores, in ancient Ireland no trade or craft was barred to them, not even the privileged professions. We know for a fact that they could hold any position in any class, even that of tribal, kingdom, or provincial leader. And in matters of property, whereas Medieval husbands were free to do whatever they wished with their wives' property, in ancient Ireland neither husband nor wife could sell, barter, or make contract for the property of the other without permission. Moreover, if a couple divorced, they divided up the property by the same ratio as they each held when they married. For example, if the wife owned twice as many cows as her husband when they married, she retained twice as many cows as he when they divorced, even if their collective herd had grown considerably. One particularly controversial issue is whether women fought as warriors in battles. Many scholars maintain that there is no credible evidence for Celtic women warriors, and that even historical figures such as Boudicca may have led battles, but they didn't fight in them. Yet we also have the testimony of contemporary Greek and Roman commentators of women fighting alongside men, and a law was passed in 697 C.E. that forbade women from fighting. So the issue is far from settled. For various reasons, Kevin L. O'Brien has chosen to accept the idea that Celtic women could be warriors just as the men, but he does not claim that this is an historical certainty. Still another aspect of ancient Irish society worth discussing is community structure. Before the coming of the Vikings, there were no true towns or even villages in Ireland. Instead, the people lived in what were more like homesteads and ranches in the Old West. They all shared the same basic design and are known as ring-forts. They consisted of a roughly circular area enclosed by a defensive ditch. Inside the inner perimeter, the dirt excavated to create the ditch was piled up to form a rampart (see the model below right); revetments were usually built into the inner face to protect it, and sometimes wooden palisades were erected along the top as an added barrier. At least one entrance was cut through the rampart, defended by a double-gate system, with smaller ramparts built up on either side of the path. Larger ring-forts had more elaborate defenses, including multiple concentric rings of rampart and ditch constructions, labyrinthine gate complexes, and, where possible for the largest structures, rock walls. Some were also defended by an outer barrier called a chevaux de frise. This consisted of a field of broken boulders, with their sharp points and edges facing outward. These served the same function as tank traps: they prevented chariots from getting too close, and they broke up massed infantry charges. Many forts were built on top of hills and raised mounds, taking advantage of their natural defenses; these are called hill forts. Some of the largest ring-forts were actually composite structures, with a number of closely-spaced smaller forts contained within a single large fort; these were the seats of the provincial kings and of the high king at Tara. There were three types of ring-forts. The small, simple ones (ráth / ráthanna) housed immediate families and sometimes even small extended families. The somewhat larger and more heavily fortified ones (caisel / caisil) housed extended families and smaller clans. The largest, most heavily fortified type (dún / dúnta) were the strongholds of the leaders. Some were large enough to house whole clans, and a few were much like towns, in that they tended to house the professionals, the tradesmen, and the craftsmen. Inside the defensive perimeter, there was at least one round house, usually with a number of smaller out-buildings. A round house consisted of a circular wall made out of wattle covered in mud daub; in rare cases, heavy unmortared stone could be substituted. There was a main entranced flanked by two smaller, secondary entrances, and usually there was a rear entrance as well. The roof was cone-shaped and covered in thatch, but with no hole for smoke from the central fire to escape. Instead, the smoke would accumulate inside the roof space and seep out through the thatch. This oxygen-poor environment was perfect for preserving and storing food, especially meat. A round house could be of any size, and the larger ones had an inner ring of posts to help support the roof rafters, but even small houses had considerable floor space. Back to Irish History.
<urn:uuid:2f2c40bd-cb06-4f0c-8850-ffa35bd1b162>
CC-MAIN-2016-26
http://www.medbherenn.com/society-of-ireland.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396945.81/warc/CC-MAIN-20160624154956-00149-ip-10-164-35-72.ec2.internal.warc.gz
en
0.983052
3,553
3.265625
3
Definition of Ptilocercus 1. Noun. Pentails. Generic synonyms: Mammal Genus Group relationships: Family Tupaiidae, Tupaiidae Member holonyms: Pen-tail, Pen-tailed Tree Shrew, Pentail Click the following link to bring up a new window with an automated collection of images related to the term: Ptilocercus Images Lexicographical Neighbors of Ptilocercus Literary usage of Ptilocercus Below you will find example usage of this term as found in modern and/or classical literature: 1. Treeshrews: An Account of the Mammalian Family Tupaiidae by Marcus Ward Lyon (1913) "Ptilocercus has a relatively wider and larger coronoid than the other genera of the Tupaiidae. A .well marked mental foramen is found under the first or ..." 2. Proceedings by Zoological Society of London (1848) "At first sight Ptilocercus has much the appearance of a marsupial animal allied to Cascas, but this resemblance proves to be only in the mere external form, ..." 3. Bulletin by Geological Society of America (1913) "Ptilocercus is somewhat more lemur-like than Tupaia in its skull and dentition. The malar and jaw are stouter; the tendency toward dipro- ..." 4. Catalogue of the Bones of Mammalia in the Collection of the British Museum by Edward Gerrard (1862) "Ptilocercus lowii. Gray, Voy. of HMS Samarang, pi. (skull). *a. Skull: the specimen figured. Borneo. From Mr. Low's Collection. ..."
<urn:uuid:37a0b6ad-043a-4130-9c45-87534bbae866>
CC-MAIN-2016-26
http://www.lexic.us/definition-of/Ptilocercus
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397213.30/warc/CC-MAIN-20160624154957-00017-ip-10-164-35-72.ec2.internal.warc.gz
en
0.8198
370
3.078125
3
Chief Justice of the United States, John G. Roberts, Jr. New England Law | Boston students learned about the United States Supreme Court from an extraordinary teacher – the Chief Justice himself – in an extraordinary setting – the magnificent campus of the National University of Ireland. Chief Justice John G. Roberts, Jr., taught “The United States Supreme Court in Historical Perspective” in July 2009 as part of the law school’s annual summer program in Galway, Ireland. The course was offered by the Irish Centre for Human Rights and the Consortium for Innovative Legal Education, Inc. (CILE). Students examined how the role and operation of the Supreme Court have changed since the nation’s founding, with particular emphasis on the role of the Chief Justice and the ways that several of the Chief Justices, from John Marshall to William Rehnquist, have influenced the Court’s role. The course also reviewed how advocacy before the Court has changed over time, with particular emphasis on some of the most effective advocates.
<urn:uuid:3a00ae26-8026-4580-884d-376868804873>
CC-MAIN-2016-26
http://www.nesl.edu/media/one_year_four_justices_roberts.cfm
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396538.42/warc/CC-MAIN-20160624154956-00034-ip-10-164-35-72.ec2.internal.warc.gz
en
0.961005
208
3.203125
3
Allied Victory Medal 1914-1918 (Greek Unofficial Type II), 1919 Obverse, Victory alighting bearing a wreath and a palm in one hand and more wreaths in the other Reverse, a plaque at the centre with the combatant states' names inscribed, and the infant Hercules wrestling the snakes atop it Allied Victory Medal 1914-1918 (Greek Unofficial Type II), 1919 (Great War 1914-1918) When the Great War of 1914-1918 had ended, there was a genuine feeling among the victorious Allies that their military efforts had been instrumental in preserving modern civilization, and this and the united spirit of the Alliance were commemorated in a combined issue of medals to those who had seen active service during the conflict. 13 nations in all issued a variety of this medal; all shared the rainbow ribbon and suspension, and all but the Japanese, who lacked a comparable symbolic figure, used a form of Victory on the obverse and a legend on the reverse. Some of the countries that issued Victory Medals delayed their official issues for some years, and authorized their veterans to wear interim unofficial copies. This example is such an unofficial version of the Greek issue, distinguishable by a missing letter 'o' in the reverse inscription and the lack of the designer's name in the obverse. It is unnamed, and it cannot be known to whom it was awarded. Lester Watson purchased it in or around the year 1930. The Museum is grateful to Mr Sawyer Rank for his information on this medal.
<urn:uuid:e0d1da18-2f4f-4126-8aef-38833c7f0519>
CC-MAIN-2016-26
http://www.fitzmuseum.cam.ac.uk/dept/coins/collection/watson/page367.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395546.12/warc/CC-MAIN-20160624154955-00136-ip-10-164-35-72.ec2.internal.warc.gz
en
0.957435
312
2.734375
3
This course teaches students how to develop and write programs in the C++ language and covers how to use constructors and destructors, polymorphism, casting in C++, overloaded functions and operators, the Standard Template Library, and exception handling. eBook versions are license controlled files that you download and view using Adobe Digital Editions software. Go to our eBook FAQ for more information. Outline, Sample/Evaluation, etc. |Audience||C programmers responsible for the development of advanced applications or systems programs in C++.| |Course Length||5 Days| |Instructor Kit Description||Instructor Kit Includes: |Student Files||Download Zip File|
<urn:uuid:11bc01d1-6fd5-48a8-85ad-567ad9d18e9e>
CC-MAIN-2016-26
http://www.itcourseware.com/e-print/e-print-programming-courseware/cplusplus-programming.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783391519.2/warc/CC-MAIN-20160624154951-00050-ip-10-164-35-72.ec2.internal.warc.gz
en
0.683839
140
2.59375
3
GEOGRAPHY AND POPULATION Afghanistan is a landlocked country in Central Asia with a total area of about 652 000 km². It is bordered by Turkmenistan, Uzbekistan and Tajikistan to the north, China to the north-east, Pakistan to the east and south and Iran to the west. It is characterized by its rugged terrain and an average elevation of 1 100 metres above sea level, ranging from 150 to 8 000 metres. About threequarters of the territory consist of mountains and hills, while lowlands include river valleys in the northern part, and desert regions in the southern and south-eastern part. TABLE 1 - Basic statistics and population |Area of the country||1995||65 209 000 ha| |Cultivable area||1978||8 000 000 ha| |Cultivated area||1990||3 344 000 ha| |- annual crops||1990||3 200 000 ha| |- permanent crops||1990||144 000 ha| |Total population||1995||20 141 000 inhabitants| |Population density||1995||31 inhab./km²| |Rural population||1995||80 %| |Water supply coverage:| |Urban population||1993||38 %| |Rural population||1993||17 %| The political instability prevailing in Afghanistan makes it extremely difficult to obtain reliable information on basic agricultural indicators. Most of the information presented below dates back to years prior to 1978. The cultivable area has been estimated at 8 million ha, which is 12% of the total area. In 1991, the area cultivated with annual crops was estimated at 3.2 million hectares, which is only 82% of the area cultivated in 1978. In addition, about 144 000 ha were estimated to consist of permanent crops in 1990. The total population is 20.1 million (1995), of which 80% is rural. Up to 6 million Afghans, perhaps one third of Afghanistan's 1978 population are estimated to have fled the country because of the war. Another 800 000 to 1 million people are thought to have been displaced by the fighting to the more remote, mountainous regions of the country or to the relative security of the country's few towns and cities. In 1991, 67% of the labour force was employed in the agricultural sector and agriculture accounted for almost 46% of GDP. CLIMATE AND WATER RESOURCES Afghanistan is characterized by a continental climate, though the presence of mountains causes many local variations. Temperatures vary from - 10°C in winter to 34°C in summer. The annual distribution of rainfall shows a picture of an essentially arid country, with more than 50% of the territory receiving less than 300 mm of rain. With the exception of the eastern border regions, which are at the far edges of monsoon influence, about 50% of the precipitation occurs in winter (January to March), much of which falls in the form of snow in the central mountainous regions. A further 30% falls in spring (April to rune). The runoff from snow melt, in the spring and summer months when day temperatures are high, is the lifeblood of Afghan agriculture. TABLE 2 - Water: sources and use |Renewable water resources:| |Internal renewable water resources||55||km³/yr| |Total (actual) renewable water resources||1995||65||km³/yr| |Total (actual) renewable water resources per inhabitant||1995||3 227||m³/yr| |Total dam capacity||-||106 m³| |- agricultural||1987||25 849||106 m³/yr| |- domestic||1987||261||106 m³/yr| |- industrial||1987||0||106 m³/yr| |Total water withdrawal||26 110||106 m³/yr| |as % of total (actual) renewable water resources||40.2||%| |Other water withdrawal||-||106 m³/yr| |Average groundwater depletion||-||106 m³/yr| |Wastewater - Non-conventional water sources:| |- produced wastewater||-||106 m³/yr| |- treated wastewater||-||106 m³/yr| |- reused treated wastewater||-||106 m³/yr| |Desalinated water||-||106 m³/yr| Based on the hydrographic systems, the country can be divided into four zones: Internal renewable water resources are estimated at 55 km³/year. The Kunar river, which originates in Pakistan, crosses the border with an average annual flow of 10 km³ and joins the Kabul river at Jalalabad about 180 km further downstream. The Kabul river flows again into Pakistan 80 km further downstream. Total water withdrawal was estimated at 26.11 km³ in 1987, of which 99% for agricultural purposes (Figure 1). Recently, there has been a large development of groundwater use in some provinces. TABLE 3 - Irrigation and drainage |1. Full or partial control irrigation: equipped area||1967||2385740||ha| |- surface irrigation||-||ha| |- sprinkler irrigation||1963||114 000||ha| |% of area irrigated from groundwater||1967||15.4||%| |% of area irrigated from surface water||1967||84.6||%| |% of area irrigated from non-conventional sources||1967||0.0||%| |% of equipped area actually irrigated||-||%| |2. Spate irrigation area||-||ha| |3. Equipped wetland and inland valley bottoms (i.v.b)||-||ha| |Total irrigation (1 +2+3)||1967||2385740||ha| |- as % of cultivated area||71||%| |4. Flood recession cropping area||-||ha| |Total water managed area (1 +2+3+4)||1967||2 385 740||ha| |- as % of cultivated area||71||%| |- increase over last 10 years||-||%| |- power irrigated area as % of water managed area||-||%| |Full or partial control irrigation schemes: Criteria| |Large-scale schemes > - ha||-||ha| |Small-scale schemes < - ha||-||ha| |Total number of households in irrigation| |Total irrigated grain production||-||tons| |as % of total grain production||-||%| |Harvested crops under irrigation (full or partial control)||-||ha| |- permanent crops: total||-||ha| |- annual crops: total||-||ha| |. other annual crops||-||ha| |Drainage - Environment:| |as % of cultivated area||-||%| |- drained areas in full or partial control irrigated areas||-||ha| |- drained areas in equipped wetland and i.v.b||-||ha| |- other drained areas||-||ha| |- total drained area with subsurface drains||-||ha| |- total drained area with surface drains||-||ha| |Area salinized by irrigation||-||ha| |Population affected by water-borne diseases||-||inhabitants| In 1986, there were two dams higher than 15 m. The installed capacity of the hydroelectric plants was 281 MW in 1992, which is about 70% of total installed capacity. There is considerable potential for the generation of hydropower, both by large dams and micro-hydropower stations. IRRIGATION AND DRAINAGE DEVELOPMENT By 1978, the surface water potential was more or less fully exploited by existing irrigation systems if no further regulation works were going to be constructed, although the efficiency of exploitation left room for considerable improvement. Irrigated areas could have been expanded by building major dams and other water regulation structures, all of which required large capital investment. There is no estimate, even rough, of irrigation potential. An estimated 27 to 36% of all irrigation systems were directly affected by war and these figures do not take into account the indirect effects of neglect and abandonment. Agriculture was said to be almost entirely dependent on irrigation, although this view tended to ignore the large areas of rainfed wheat grown on the steep rolling hills and steppes in the north. The most reliable figures for irrigated areas date back to 1967, giving a total of 2 385 740 ha. Irrigated land can be divided into 4 classes, according to the origin of the irrigation water. They are presented in Figure 2. In 1963, some 114000 ha were reported to be equipped for sprinkler irrigation. From 1967 up to the present, many different figures have been given for irrigated, rainfed and total cultivated areas. Unfortunately, most of them are unreliable. Some pre-war Publications suggest that 2.8 million hectares were cultivated, of which 1.4 million ha had sufficient water to support double-cropping. Figures for rainfed areas are generally cited as 1.4 million hectares, but recent satellite data (1992) indicate that the area might be much larger - a figure of 3.1 million hectares has been suggested. Irrigation systems can be divided into four main categories: Figure 1 - Water withdrawal (total: 26.11 km³ in 1987) Figure 2 - Origin of irrigation water f/p (total: 2 385 740 ha in 1967) In 1993, the average cost of irrigation scheme rehabilitation was estimated at $US 200/ha for small schemes. Rehabilitation costs for large, modern schemes, including main structures, are considerably higher. Cropping intensity varies widely from system to system according to the relative scarcity of water in relation to land. It might reach 200% in large formal systems with water control (upstream of the river systems, when climatic conditions allow an early wheat crop), while in other systems up to two-thirds of the equipped area are kept fallow each year on a rotation basis. Per caput wheat consumption in Afghanistan is one of the highest in the world. Pre-war, irrigated land produced 77 % of all wheat and 85 % of all food and agricultural crops. About 1 million ha of wheat was irrigated in 1990, although the 1978 figure may be as high as 1.3 million ha, and irrigated yields are estimated to be 3 times rainfed yields. Global cereal yields are estimated to have decreased by 30% between 1978 and 1987. Floods are generally violent and can cause serious damage to agricultural land or inhabited areas. About 50 gabion river protection works and 50 flood protection masonry walls were constructed before the war, mostly in the Nangarhar and Parwan provinces, in the eastern part of the country. The Central Authority for Water and Sewerage is responsible for the urban water supply and sanitation, under the aegis of the Central Authority for Housing and Town Planning, while the Ministry of Rural Development and Rehabilitation is responsible for the rural water supply. The Ministry of Water and Power was formed in 1988 as the merger of the former separate Ministry of Irrigation and Water Resources and the Ministry of Power. It is in charge of the hydrological network, the development of water resources and of large-scale and modern irrigation systems, especially of diversion structures on the rivers and main canals. The Ministry's Department of Water Management is operational in most provinces. The Department of Irrigation of the Ministry of Rural Rehabilitation and Development is in charge of small-scale irrigation systems and of irrigation systems downstream of the diversion structures on the main canal. The Ministry of Agriculture is in charge of production and, therefore, of on-farm infrastructure and water management. An Irrigation Secretariat within the Ministry of Planning is coordinating irrigation development planning. In some cases, the Irrigation Development Authorities are still operational. They are in charge of the development, operation and maintenance of large-scale irrigation systems. Government construction and consulting companies involved in irrigation are: A water law was passed in 1981. TRENDS IN WATER RESOURCES MANAGEMENT In 1993, the Ministry of Agriculture's most pessimistic estimates were that only 750 000 ha were still under satisfactory irrigation. A number of programmes have been proposed and some launched in order to rehabilitate the infrastructures, the human and other resources and the institutions and social infrastructure as related to irrigated agriculture. At the same time, rehabilitation works have to be carried out in a context of scarce human resources and funds, because the people must also address several other urgent needs and repair other basic infrastructures. Therefore, apart from improving water management and reducing water losses to increase irrigated areas, rehabilitation works have to aim at reducing future maintenance requirements through proper design. Under the last five-year plan, 76% of the budget for the agricultural sector was earmarked for irrigation works. Due to the increasing use of groundwater in recent years, there is a risk of over-exploitation and depletion in the absence of regulating and licensing authorities, which in some places might lead to the drying out of kareze or qanats, springs and wells, depending on the same water sources. MAIN SOURCES OF INFORMATION FAO. 1965. Survey on land and water resources. Afghanistan. Six volumes. Kabul. UNDP. 1993. Afghanistan rehabilitation strategy: Action plan for immediate rehabilitation. Six volumes. Kabul. UNORSA. 1993. Afghanistan irrigation subsector profile: Elements for a two-year agriculture rehabilitation action plan. Report prepared by T. Facon, FAO. Islamabad, Pakistan.
<urn:uuid:1cc2d687-a7c2-4d80-b035-0b29ba05c71d>
CC-MAIN-2016-26
http://www.fao.org/docrep/W4356E/w4356e07.htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783392527.68/warc/CC-MAIN-20160624154952-00110-ip-10-164-35-72.ec2.internal.warc.gz
en
0.911187
2,920
3.5
4
It is a well known fact that the women are the better manager than men from the starting age. Women are considered more capable than men as they handle all works along with their routine household works. Women have all the efficiencies to manage all kinds of work. In the past, it was the thinking of the people that men are the better manager. It was also believed that women are not as perfect as men when it comes to management. People in that age believe that the men are better than women in every field but now-a-days it is totally wrong. The fact is that the women were the better manager in the past and are the better manager even in present. Women are managing various types of works with their household works. They are managing all requirements of the family members in a fair manner. Earlier their work was just limited to household things as they were mostly illiterate. When it comes to present, most of the women are literate and they are so capable that they could manage all types of works that the men can do. In addition they are capable of fulfilling the requirement of the family members in the better manner as well. With the changing environment everything in the world is also changing. There are more opportunities for women as well as they are getting such heights that were earlier meant just for men. In order to study the changed forms of life many types of surveys are planned by several organizations from time to time. Different aspects of life are studied by the surveys like:- The New Australian survey concludes that in the filed of business management, men are less efficient in comparison to the women. This survey also revealed that the women are more capable to understand the fact of the business than men. According to the Australian survey that was conducted on the 1800 women and men, women are having more weightage in the issues like people skills, risk taking, humanity and aesthetics. But the issue of the emotional stability is same in the women as well as in the men. The new survey also revealed that the men are better in two areas only i.e. the command and the control but the women are superior in all the factors leaving these two factors. All these things prove that the women are the better manager than men.
<urn:uuid:ab4d9e04-5dc7-4865-a882-e9813568978e>
CC-MAIN-2016-26
http://www.ayushveda.com/magazine/women-are-better-managers-than-men/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783394605.61/warc/CC-MAIN-20160624154954-00194-ip-10-164-35-72.ec2.internal.warc.gz
en
0.991399
453
2.609375
3
1. What deformity does Kira suffer from? (a) A deformed spine. (b) A crippled leg. (d) A crippled arm. 2. In the beginning of Chapter 1, why is Kira in the Field of Leaving? (a) She is searching for her mother's body. (b) She is waiting for her mother's spirit to leave its body. (c) She is waiting for her father's spirit to leave its body. (d) She is searching for her father's body. 3. Where is Kira's father in Chapter 1? (a) At the cott. (b) Hunting with the other men. (c) Missing and presumed dead. (d) In the Council Edifice. 4. Why do the villagers regard Kira with contempt? (a) She has no useful skill or ability. (b) According to custom, she was supposed to be sent away. (c) According to custom, she was supposed to be destroyed at birth. (d) She is living alone and unmarried. 5. According to village custom, what happens to a person's property once he or she dies from illness? (a) All property and possessions are divided among the villagers. (b) All property and possessions are divided among relatives. (c) The Council of Guardians collects one-tenth of the property. (d) All property and possessions are burned. This section contains 4,843 words (approx. 17 pages at 300 words per page)
<urn:uuid:f2886cc5-d704-469c-8262-5273a24f5494>
CC-MAIN-2016-26
http://www.bookrags.com/lessonplan/gathering-blue/multiple.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397864.87/warc/CC-MAIN-20160624154957-00104-ip-10-164-35-72.ec2.internal.warc.gz
en
0.960006
332
2.625
3
LAWRENCE — Researchers working to measure and predict sea level rise based on changes to ice sheets in Greenland and Antarctica will soon have a new tool to use in their assessments. Jilu Li, assistant research professor with the Center for Remote Sensing of Ice Sheets (CReSIS) at the University of Kansas, received a three-year $299,178 grant through NASA’s New Investigator Program to provide a complete subsurface map at the point where the ice meets bedrock for Greenland and the West Antarctic Ice Sheet. Li’s team will utilize ice sheet data collected by CReSIS and KU researchers over the past two decades to piece together the maps. “We’ve collected all this data, but to this point, no one has integrated all of it to provide a basal condition map,” Li said. “When combined with what we already know about ice sheet thickness and ice bed elevations, this should improve the understanding of the overall dynamics of the ice sheet and help better predict future changes.” The condition at the base of an ice sheet varies from solid ice, to melting ice, to flowing water and has a major impact on the speed of the ice flow. The faster the ice flows, the more it affects sea level rise. “These maps essentially provide a more accurate picture of the full boundary conditions of an ice sheet,” Li said. “It means more information is available to researchers as they utilize computer modeling to predict ice flow. The more that’s known about the entire boundary conditions of an ice sheet, the more accurate those models will be.” Li’s research was one of only 21 projects selected for funding from a pool of more than 131 proposals. CReSIS, which was established by the National Science Foundation in 2005, has made great strides in research and fieldwork concerning changes in the ice sheets and their effect on sea level rise. Data collected by the Center were instrumental in developing a new, highly detailed map of the bedrock of Greenland. CReSIS data were also essential to the discovery of a mega-canyon buried under miles of ice in Greenland. Portions of the canyon are twice as deep at the Grand Canyon. KU serves as the lead institution of CReSIS, which is composed of six additional partner institutions: Elizabeth City State University, Indiana University, University of Washington, Pennsylvania State University, Los Alamos National Laboratory, and the Association of Computer and Information Science Engineering Departments at Minority Institutions. CReSIS researchers collaborate with scientists, engineers and institutions around the world.
<urn:uuid:a41e2231-ca89-4189-8978-52e4ec9d8f5c>
CC-MAIN-2016-26
http://news.ku.edu/nasa-grant-will-help-ku-researcher-reveal-polar-ice-details
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398516.82/warc/CC-MAIN-20160624154958-00016-ip-10-164-35-72.ec2.internal.warc.gz
en
0.949749
542
3.4375
3
As former officers, the people at Alert Technologies understand the issues and the facts that emergency responders face in real situations. I’ll never forget one pursuit of a felon driving a stolen vehicle. With lights and sirens, we were in pursuit, trying to keep it as safe as possible. But the suspect, with no regard for anyone else’s safety, ran a red light. A woman in a car with a child in a car seat in the back was approaching the intersection, listening to the radio on her way home, and she had the green light. She never heard the sirens or saw anything coming. There was a catastrophic accident. You, too, may know of a story like this one. This could have been prevented. The Radio Alert Transmitter 582, when installed and activated simultaneously with the siren, will alert drivers of oncoming emergency vehicles by transmitting a message over the AM / FM band radio interrupting the radio broadcast inside the vehicle. In two recent years, 156 people died in cars colliding with an emergency vehicle that had lights flashing and / or sirens activated in the United States. According to the Department of Transportation, almost 12,000 were injured. Officers, firefighters and ambulance drivers know the dangers to the public and themselves as first responders to an emergency. Today, the risks have become greater as car manufacturers make more and more soundproof vehicles and tinted windows, while drivers are distracted by music and cell phones. Lights and sirens just aren’t enough to alert drivers anymore. The idea for a better warning system to alert drivers of oncoming emergency vehicles came from the company’s founder, former Massachusetts State Trooper George Derome. He narrowly escaped death and suffered serious injury after a car struck him as he secured an accident scene. It was during Derome’s perseverance and recuperation that he came up with the idea for the Radio Alert Transmitter 582 in 1999. With five years in development and testing, the device is now U.S. patented with Canadian and International patents pending and is designed to meet FCC and CRTC regulations. Here’s how it works: the Radio Alert Transmitter is installed easily in an emergency vehicle and is activated by the siren to transmit a tone and voice message to vehicle radios up to 1,000 feet. Drivers hear an interruption in their car radio broadcast with the brief transmission alerting them of oncoming emergency vehicles with enough time to get out of the way. Then the broadcast returns to the radio station. The message could be “Warning… approaching emergency vehicle!” The alert message can be custom-recorded to suit individual departments. The transmitter operates only while the vehicle siren and / or flashing lights are operating and turns off automatically within nine seconds of the vehicle stop. This technology, developed by former officers at Alert Technologies, is in the final stages of FCC approval. Each unit costs under $1,000. The Radio Alert Transmitter has the support of many police and fire departments including the endorsement of the Massachusetts Police Chief’s Association and the New Hampshire State Police. Tom Macone is a former officer with the Somerville, MA, Police and is currently the president of ATI Corporation. He may be reached via e-mail at firstname.lastname@example.org. http://www.alerttechintl.com
<urn:uuid:03535e59-3468-4383-b506-a2410410c0ed>
CC-MAIN-2016-26
http://www.hendonpub.com/resources/article_archive/results/details?id=4627
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397865.91/warc/CC-MAIN-20160624154957-00188-ip-10-164-35-72.ec2.internal.warc.gz
en
0.96455
692
2.9375
3
FWS Report Sets Guidelines for Protecting Sage Grouse Utah and several other western states are working on plans to protect the sage grouse, with the goal of keeping the birds off the federal endangered species list. Those plans have to be acceptable to the U.S. Fish and Wildlife Service, and it's just issued a draft report that could give the states some guidance. Noreen Walsh, the deputy administrator for the Fish and Wildlife Service's Mountain Prairie Region, says it addresses the different circumstances such as energy development, predators and urban growth that threaten the sage grouse population across its 11-state range. "It's our hope," she says,"that this report will help those states, as well as the federal land management agencies, to really focus their plans on the actions that will really help the threats that are really most impacting this species right now." John Harja with the Utah Department of Agriculture and Food says the guidelines could allow Utah to set priority areas where it will make extra efforts to protect the sage grouse while allowing additional development in areas such as the Uintah Basin. Harja told KUER, "I don't know that anybody seeks to eliminate a population," he says, "but it does allow that each state can choose areas for protection, for enhanced focus for enhanced conservation, and allows that other areas may be affected by other things, like oil and gas or housing developments." Utah's working group on the sage grouse is expected to issue its report soon to Governor Gary Herbert as a basis for state action to protect the sage grouse, which occupies only about ten percent of its historic range across the West.
<urn:uuid:dd46dcd2-7e33-4421-9abd-01e5075e68ef>
CC-MAIN-2016-26
http://kuer.org/post/fws-report-sets-guidelines-protecting-sage-grouse
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397795.31/warc/CC-MAIN-20160624154957-00122-ip-10-164-35-72.ec2.internal.warc.gz
en
0.968908
336
2.71875
3
A recall is when a product is removed from the market or a correction is made to the product because it is either defective or potentially harmful. Sometimes a company discovers a problem and recalls a product on its own. Other times a company recalls a product after FDA raises concerns. If you have a medicine or device that has been recalled, talk to your health care professional about the best course of action. For other products, such as foods, dietary supplements, and cosmetics, take them back to the place of purchase and ask for a refund. Stores generally have a return and refund policy when a company has announced a recall of its products. - What is FDA Basics for Industry? - How did the Federal Food, Drug, and Cosmetic Act come about? - How do I find the latest information on the Web site? How do I sign up for e-mails and alerts? - What is a docket? How do I submit comments to a docket? How do I find comments submitted to a docket? - Can I buy medical products online? How do I know they're safe? - FDA's MedWatch Program: Voluntarily Reporting Problems to the FDA - What non-government websites does FDA recommend? - What other government-supported websites does FDA recommend as reliable sources for health-related information? - Where should I go to find consumer information on www.FDA.gov? - FDA Basics Webinar: FDA Office of Minority Health - Steps to Address Health Disparities - How do I report a problem with an FDA-regulated product? - Can I tell if FDA has approved a product by looking at the label? - FDA MedWatch Webinar - FDA Webinar on Foreign Inspections - How is a potential advisory committee member screened for conflicts of interests? - What is a financial conflict of interest waiver? - What is a conflict of interest? - How does an individual become a member of an FDA advisory committee? - What are the qualifications of a scientific member of an advisory committee? - What is an FDA Advisory Committee? - When and why was FDA formed? - How many people are employed by FDA and in what areas do they work? - Materials from Webinar on Inspection Process - Why are animals used for testing medical products? - How can I share my ideas and suggestions with FDA?
<urn:uuid:8654dbd5-7405-47bc-9aff-cfdf727791e4>
CC-MAIN-2016-26
http://www.fda.gov/AboutFDA/Transparency/Basics/ucm194885.htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393518.22/warc/CC-MAIN-20160624154953-00061-ip-10-164-35-72.ec2.internal.warc.gz
en
0.962155
490
2.734375
3
The keystrokes [ Ctrl + <comma> ] in Visual Studio 2010 is used to navigate to your line of interest! … and, you should soon forget about what [ Ctrl + F ] is, after using [ Ctrl + <comma> ] !! Suppose that you need to search for the string ‘ConnectToSqlDatabase’ in your solution, you can press [ Ctrl + <comma> ], and the [ Navigate To ] dialog pops up. Typing ‘Con’ for the search terms, and… What happened here is that the number of matching results are decreased as I type ‘Con’ character by character. You can then click on a matching result, and jump to the line of source code that matches the search term. Another useful feature is that [ Navigate To ] also recognize search terms in Pascal Case! Suppose that you do not know whether the function is called [ Connect…(something)…SqlDatabase ], or is called [ Change…(something)…SqlDatabase ], but you know that they both have pascal case ‘CSD’… And, pascal case is not just limited to Intellisense, but also for the search terms in the [ Navigate To ] feature…. ( Ctrl + <comma> ) So, may I ‘also’ forget about [ Ctrl + F ] even when I am using Microsoft Office… some day? … Just joking, of course 🙂
<urn:uuid:4eb6399c-096a-44e2-a935-80490066771f>
CC-MAIN-2016-26
http://blogs.msmvps.com/martinpoon/2010/04/24/addicted-to-ctrl-lt-comma-gt-in-visual-studio-2010/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395039.24/warc/CC-MAIN-20160624154955-00182-ip-10-164-35-72.ec2.internal.warc.gz
en
0.912424
312
2.53125
3
Murchison (AMNH 4378) The tiny white calcium-aluminum inclusions, or CAIs, in Murchison are exceptionally small—much smaller than the CAIs found in meteorites like Allende. Scientists have not determined why the size of CAIs can vary so much from meteorite to meteorite. September 28, 1969 Topic: Earth Science Keywords: Astrophysics, Chondrites (Meteorites), Astrogeology
<urn:uuid:cd4ef7c1-77e2-46fb-88e9-a0635c932d8f>
CC-MAIN-2016-26
http://www.amnh.org/exhibitions/permanent-exhibitions/earth-and-planetary-sciences-halls/arthur-ross-hall-of-meteorites/origins-of-the-solar-system/cais/the-oldest-rocks/murchison-amnh-4378
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393518.22/warc/CC-MAIN-20160624154953-00024-ip-10-164-35-72.ec2.internal.warc.gz
en
0.727613
96
3.375
3
An ancient Chinese story tells of a farmer who owns a famous racehorse. One day, the horse ran away. His friends commiserated with him, but the farmer replied, “This isn’t necessarily a bad thing.” Soon, his horse returned and brought another fine-looking horse. His friends congratulated him, but the farmer observed, “This isn’t necessarily a good thing.” Later, the farmer’s son is thrown while trying to tame the new horse. He broke his leg, which left him lame. The farmer’s friends offered condolences, but he responded, “This isn’t necessarily a bad thing.” Sure enough, war broke out and the son’s lameness prevented him from being conscripted. Though many neighbors’ sons were killed in the fighting, the farmer’s son was spared. Sometimes it’s hard to tell what’s good and what’s bad. Source: Future Hype: The Myths of Technology Change, Pages: 10 Contributed by: ~C4Chaos
<urn:uuid:f81baf3f-7f39-4ac3-9655-e613799a2b0d>
CC-MAIN-2016-26
http://blog.gaiam.com/quotes/topics/bad?page=1
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397749.89/warc/CC-MAIN-20160624154957-00116-ip-10-164-35-72.ec2.internal.warc.gz
en
0.959305
232
2.75
3
Finds in 141 tombs add to picture of ancient Macedonia Bronze helmet with gold decoration from a mid-sixth-century-BC warrior’s grave. Many Macedonian officers were buried in full armor, together with swords, spears and knives. By Iota Myrtsioti - Kathimerini The gold of the ancient Macedonians still gleams on the soldiers’ uniforms being unearthed by excavations in the ancient necropolis of Archontiko in Pella. Fully armed Macedonian aristocrats, gold-bedecked women in elaborate jewelry, faience idols and clay vases of exceptional beauty had lain concealed for centuries in 141 simple rectangular trench graves that were discovered recently in the ancient settlement. In their tombs, Macedonian officers wore armor and — in the late Classical and early Hellenistic periods — were equipped for the journey after death with coins for Charon, copper utensils made by local metalworkers, and rare incense or oil containers with the war of the giants depicted in relief. These are not the first discoveries of gold-embroidered uniforms at Archontiko. Archaeologists Pavlos and Anastassia Chrystostomou from the 17th Ephorate of Prehistoric and Classical Antiquities found the first warriors in full armor four years ago while excavating the cemetery. The contents of the latest 141 tombs to be discovered were presented recently at the ephorate’s archaeological conference. The typical Archontiko tomb contained gold masks, gold breastplates, clothes and shoes adorned with gold strips, helmets, shields, swords, spears and knives embellished with gold strips or rosettes. Though only 2 percent of the 20-hectare cemetery has been excavated, the harvest has already been rich. The dozens of finds help form an image of the socioeconomic organization, burial rituals, high living standard, aristocratic origins and leading role of the families in one of the most significant urban centers of ancient Macedonia from prehistoric times until the end of the fifth century BC. As the Chrysostomou couple explained, the ancient settlement built in the middle of the plain of Bottiaia, close to the ancient route connecting East and West — later name the Egnatia Road — was one of the most important urban centers before the foundation of the capital of Pella. This is confirmed by the 541 tombs dating from the Iron Age, through the Classical period and up to the early Hellenistic era (seventh century BC - 280 BC). This year’s investigation of a family cluster (in the broad sense of a clan) produced rich finds, as important as those of previous years. A trove of grave ornaments was found in the 25 male and 17 female tombs dating to the Archaic era (first half of the sixth century BC to the beginning of the fifth century BC). The men were mostly in full armor, with helmets adorned with incised gold strips, steel swords with gold on the handles, spears and knives. Gold foil sheets with embossed ornamentation adorn the leather breastplates, clothing, footwear and hand coverings of the warriors. Apart from gold and silver jewelry, numerous other objects, such as bronze and clay vases, clay idols, metal likenesses of farm carts, furniture and spits accompanied the male burials. These objects present the first impression of a warrior, while the other grave offerings reveal the deceased’s personal and social prestige, two centuries before the rule of Phillip II and Alexander III. The women were bedecked in jewelry that reveals their high social status. The grave ornaments (clay and metal vases, more rarely of glass of faience, or metal likenesses of carts) are related to the funeral customs of the journey to Hades. Impressive items among this year’s finds were large silver clasps with disk-shaped heads adorned with rosettes and an 85-centimeter braided chain decorated in a style that predates those of Ephesus, Rhodes, and Eleutherna in Crete. The necklace went around the chest where it was fastened by pins onto the clothing. It has gilded snake heads, seated lions and the heads of the female divinity Potnia of Thera. The funeral ornaments in the women’s graves seem to have come to Macedonia from distant places. Among them are faience idols, probably from workshops on Rhodes, and clay vases from Kerameikos in Athens and Corinthian and Ionian workshops.
<urn:uuid:805b9f68-6c7c-4fe7-8304-3b1643a73e8c>
CC-MAIN-2016-26
http://dienekes.blogspot.com/2005/02/digs-at-archontiko-pella-uncover-more.html?m=0
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393533.44/warc/CC-MAIN-20160624154953-00182-ip-10-164-35-72.ec2.internal.warc.gz
en
0.943818
946
2.953125
3
Sword Late Middle Ages And Renaissance A selection of articles related to sword late middle ages and renaissance. Original articles from our library related to the Sword Late Middle Ages And Renaissance. See Table of Contents for further available material (downloadable resources) on Sword Late Middle Ages And Renaissance. - Our Pagan Village: The Importance and Persuit of Honor - Candlelight flickers over the Beltaine revels. Food is laid out in the circle for the feast. Only one rule – no one can feed themselves. Each is dependent on friends and loved ones for sustenance, joy and delight. After an hour of laughter and revels and way... Paganism & Wicca >> Daily Life - What is hypnotic trance? Does it provide unusual physical or mental capacities? - 2.1 'Trance;' descriptive or misleading? Most of the classical notions of hypnosis have long held that hypnosis was special in some way from other types of interpersonal communication and that an induction (preparatory process considered by some to be... Parapsychology >> Hypnosis - Pagan Mythology - Is the traditional story presented as an historical event that serves to illustrate part of the world view of a people or explain a practice, belief, or natural phenomenon. The mythological beliefs a culture shares gives shape to its actions and choices.... Paganism & Wicca >> Holidays - The Religious Experience: A Wiccan Viewpoint - What is religion? Religion is a set of beliefs which allow us to understand and categorize our world and our place in it. A set of beliefs which define our culture, our expectations, our views of people and behaviors we expect. I have found several different... Religion & Philosophy >> Religions - Survivalists' Guide for the New Millennium: Chapter 6 - AS THE WORM TURNS Health and well being are part of the natural birthright of the human being. With all of its organs intact, the right diet, exercise and mental focus, a human body can overcome any disease. Even so, the effects of living in this... Philosophy >> Survivalists Guide for the New Millennium - Bringing it Down to Earth: A Fractal Approach - 'Clouds are not spheres, mountains are not cones, coastlines are not circles, and bark is not smooth, nor does lightning travel in a straight line.' B. Mandelbrot W e want to think about the future - it's our nature. Unlike other creatures, humans possess an... Mystic Sciences >> Astrology Sword Late Middle Ages And Renaissance is described in multiple online sources, as addition to our editors' articles, see section below for printable documents, Sword Late Middle Ages And Renaissance books and related discussion. Suggested News Resources - How the Christian king Alfonso the Wise was inspired by the Muslim world - His father had extinguished the military threat from a militant Muslim movement from North Africa, the Almohads, whom one historian has hyperbolically described as “the Al Qaeda of the Middle Ages. ... - Here are some club meetings and events happening this week in Annapolis, Anne - Using historical texts and manuscripts and accurate replicas of historical weapons, the group offers lessons on the sword arts from the Medieval and Renaissance eras and the 18th and 19th century. For information, call 410-263-0203 or visit www.mashs. - “SHADOW GLASS #1” (Comic Book Review) - The Renaissance brought a lot of things to the world: math, science, big poofy collars, the end to that Debbie-downer known as the Middle Ages (I mean, right?). But despite its ... Great care has been taken to prepare the information on this page. Elements of the content come from factual and lexical knowledge databases, realmagick.com library and third-party sources. We appreciate your suggestions and comments on further improvements of the site. Sword Late Middle Ages And Renaissance Topics carry on films regular actors frog distribution and status debit card types of debit card
<urn:uuid:621236c2-d969-47cd-81bf-c5534abd0bcc>
CC-MAIN-2016-26
http://www.realmagick.com/sword-late-middle-ages-and-renaissance/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395621.98/warc/CC-MAIN-20160624154955-00061-ip-10-164-35-72.ec2.internal.warc.gz
en
0.90196
853
2.75
3
The Canary Islands (sp. Islas Canarias), often referred to simply as “the Canaries”, are a group of about a dozen islands - mostly inhabited but some only wildlife reserves - in the eastern Atlantic Ocean some 100 km (about 60 m) off the coast of north-west Africa. It is a little over 1300 km (about 820 m) south of Spain of which it is an “Autonomous Community” divided into two provinces. Subsequently it has two capitals - Santa Cruz de Tenerife and Las Palmas de Gran Canaria. As part of Spain, it is considered part of the European Community. It has a total population of about 2.1 million. The archipelago is volcanic in origin and contains Western Europe’s highest volcano, Mount Teide which is a World Heritage site and an extremely popular tourist attraction. Good beaches, a mild sub-tropical maritime climate and the mixture of Spanish and African influences make the islands one of the most visited international holiday destinations on earth on. Whilst mostly rugged and barren, the many valleys support agriculture in the form of grains, citrus fruits, figs and wines. In ancient times it was known as “The Fortunate Isles”. It was rediscovered by Portuguese mariners in 1341, but granted to Castile by the Pope in 1344 and formally possessed in 1401. These latter discoverers found dogs there and the archipelago’s name derives from the Latin for dog – canis. It was fought over in the fifteenth century by Castile and Portugal whilst vying for the West African trade; then acquired by Aragon. During the Age of Exploration and colonial times it was the last “water hole” before setting off for the New World. Not only the Spanish, but other venturers used it - especially Tenerife - as a way station – legally or not; Drake called there to his detriment on his way to the Indies in 1595. The English “First Fleet” the convict laden vessels on their way to settle New South Wales in 1787, resupplied there. From the 17th to the early 19th century there was a flourishing trade with New England settlers – bartering wine for fish.
<urn:uuid:82d2362d-4079-4838-9557-8c203ef6569b>
CC-MAIN-2016-26
http://www.conservapedia.com/Canary_Islands
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783404382.73/warc/CC-MAIN-20160624155004-00191-ip-10-164-35-72.ec2.internal.warc.gz
en
0.9565
466
3.296875
3
In an attempt to curb escalating crime rates, Pakistan’s new government has ended a 2008 ban on the death penalty. The move came just a few days after Amnesty International released a statement asking Pakistan to “impose an immediate moratorium on the use of the death penalty,” rather than resume executions. While the government estimates that there are about 400 people currently on death row in overcrowded prisons throughout the country, Amnesty International assessed the real number to be up to 8,000—each of which could now be facing execution, according to the statement. “The sheer number of people at risk makes the new government policy of turning back to the death penalty even more horrendous,” said Polly Truscott, Amnesty International’s Deputy Asia Pacific Director. According to Pakistani Interior Ministry Spokesman Omar Hamid Khan’s comment to Reuters, the new policy of Prime Minister Nawaz Sharif’s government was to “execute all death row prisoners, except those pardoned on humanitarian grounds.” The original moratorium enforced in 2008 by the previous government—Pakistan’s People's Party, under chairman and capital punishment opponent Benazir Bhutto—expired on June 30, only two weeks after the 5th World Conference Against the Death Penalty took place in Madrid, Spain. The conference included the participation of 90 countries and focused on the abolition of the death penalty, adherence to human rights treaties, a moratorium on death penalty convictions and the establishment of penal code reforms. The largest portion of discussion centered on the Middle East and North Africa. The session began with Iraqi Minister of Justice Hassan Al Shammari defending Iraq’s retention of capital punishment as “the need to ensure exemplary punishment for crimes committed by ‘terrorists.’” The issue of the death penalty, he said, is heavily influenced by religion and culture—an argument many participants found to be the issue. “The main problem in not progressing toward an abolitionist position is rooted in the fact that these countries have made a poor interpretation of the Koran, which does not impose the application of Talion Law [i.e. “an eye for an eye”] for Muslims, but does, on the other hand, impose the preservation of life through forgiveness,” Tunisian anthropologist and philosopher Youssef Seddik said to the conference. It was determined that “a true democratization is necessary, which would protect human rights above all else, and would not be limited to the holding of elections” in order for any progress to be made toward eliminating the threat of the death penalty in many of the region's constitutions. Pakistan’s new government, however, deemed the death penalty a necessary practice in tackling the country’s law and order issues, according to Amnesty, despite a lack of evidence indicating that executions deter crime more successfully than life imprisonment. “At a time when Pakistan’s justice system is struggling to cope with the law and order situation, it can be all too easy for governments to see the death penalty as a quick fix solution,” Truscott said. “But the death penalty is not the answer to Pakistan’s justice problems.” According to Death Penalty Information Center’s global reports, Pakistan was listed as one of the top five countries with the most confirmed judicial executions, prior to the ban, from 2005 to 2008. Most commonly, Pakistan performs executions by hanging or shooting and in some more religiously nuanced cases, stoning. Iran, one of Pakistan’s neighboring countries, has had the second highest number of judicial executions from 2005 through 2012. Both of Pakistan’s other neighbors, India and Afghanistan, retain the death penalty also. Afghanistan has at least 189 individuals on death row. India has 499 inmates awaiting punishment, and has already performed seven executions so far this year, the report shows. The collected data mark a drastic gap between the number of inmates on death row for all three of Pakistan’s neighbors in the hundreds, and Pakistan’s in the thousands, even though Pakistan has far fewer prisoners per capita than both Iran and Afghanistan. When asked to comment on Amnesty International’s criticism, the Reuters article said, Omar Khan “pointed out the fact that capital punishment was still in use in parts of the United States… home to the best judicial system.” Indeed, the United States is number one in the world in prisoners per capita; with Texas having just last month executed its 500th inmate since the 1980s. The Death Penalty Information Center and the International Centre for Prison Studies have also consistently listed the US as one of the top fives countries with the most executions from 2005 to 2012, with 16 executions recorded so far this year as of June 27.
<urn:uuid:17797dd8-784f-4d47-be04-c3f829fb6180>
CC-MAIN-2016-26
http://www.globalpost.com/dispatches/globalpost-blogs/rights/pakistan-reinstates-death-penalty-despite-appeal
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396945.81/warc/CC-MAIN-20160624154956-00178-ip-10-164-35-72.ec2.internal.warc.gz
en
0.945124
995
2.546875
3
Doctors in the Netherlands are developing a protocol which will increase the number of organs from people who request euthanasia. Erasmus Medical Centre in Rotterdam and the University Hospital of Maastricht have written national guidelines which are being studied by the Dutch Transplant Foundation. If the procedures are approved, they would be binding on hospitals and doctors throughout the country. Spurring on this study is the feeling among transplant surgeons that healthy organs are sometimes wasted when patients are euthanased. In the words of a medical ethics expert with the Royal Dutch Medical Association, Gert van Dijk, “An estimated 5 to 10% of people who are euthanased could be considered for organ donation. Five percent does not seem like much, but this still means 250 to 500 potential organ donors every year.” He believes that Dutch doctors could even double the number of organs available for life-saving procedures. It could also give donors the consolation of knowing that they are saving lives even if they themselves have to die. Up to now, there have only been six case of organ donation after euthanasia in the Netherlands. More have been done in neighbouring Belgium, where euthanasia is also legal. While getting euthanasia patients to donate organs might sound easy, in practice there are a number of difficulties. Most euthanasia patients have cancer and so their organs are not suitable for donation. The most suitable patients are those with neurodegenerative diseases like ALS or multiple sclerosis. There are administrative issues as well. Most hospitals are adverse to allowing doctors to perform euthanasia if they are not staff members. Many euthanasia patients want to die at home, but if they want to donate their organs, they have to die in an operating theatre, away from their loved ones. The protocol will probably create some firm guidelines: - Procedures for euthanasia and organ donation must be completely separate. Only if a person fulfils all the criteria for euthanasia would he be eligible for organ donation. - The idea of donating organs must come from the patient, not the doctor. - Only a doctor who is not involved in the organ donation can confirm the patient’s eligibility for euthanasia. - The euthanasia doctor must sign a statement indemnifying the hospital against future lawsuits. This article is published by and BioEdge.org under a Creative Commons licence. You may republish it or translate it free of charge with attribution for non-commercial purposes following these guidelines . If you teach at a university we ask that your department make a donation. Commercial media must contact us for permission and fees. Some articles on this site are published under different terms.
<urn:uuid:3a1a81ad-5f14-4b86-8773-a6fb6886cc9a>
CC-MAIN-2016-26
http://www.bioedge.org/bioethics/bioethics_article/11242
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783394987.40/warc/CC-MAIN-20160624154954-00027-ip-10-164-35-72.ec2.internal.warc.gz
en
0.947828
541
2.8125
3
Today in Black History: Rosa J. Young Today in Black History: Rosa Jinsey Young was born on this date in 1890. The daughter of a Methodist circuit rider, she became a teacher and opened a private school (Concordia College) in 1912 in Rosebud, Alabama, for the Methodist church. When the school ran into financial problems, the Lutheran church offered help. Young joined the Lutheran church and founded the Alabama Lutheran Academy, which evolved into Concordia College, Selma. She wrote an autobiography, “Light in the Dark Belt,” and died in 1971. Get more details on her life and accomplishments: http://www.encyclopediaofalabama.org/face/Article.jsp?id=h-1373
<urn:uuid:69b6376c-3561-469d-bfc2-9541d3691dd5>
CC-MAIN-2016-26
http://wtug.com/today-in-black-history-rosa-j-young/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396100.16/warc/CC-MAIN-20160624154956-00113-ip-10-164-35-72.ec2.internal.warc.gz
en
0.968726
158
2.875
3
soldering and soldering irons Soldering is a means of joining together two metallic surfaces by using metal alloys called solder which have a lower melting point than the metals to be joined. The properties of the soldering metal are such that it not only penetrates rough and undercut surfaces and holds by solidification, but that it also chemically adheres to the metal surfaces, combining with them to form a compound "intermetallic" layer. Tin is a metal which will perform the above function and it therefore forms the basis of the soldering alloys. CleaningThe metals to be joined together must, after shaping, be cleaned of all grease and dirt. The grease can be removed by using a solvent or vapor. Special precautions are needed with many of these and generally they should not be used in an enclosed or confined space or room. Metals coated with tinplate, or tin-zinc galvanized, or terneplate (an inferior kind of tinplate containing lead), do not generally need further treatment prior to soldering, but other metals should be filed, scraped, wire-brushed, or rubbed with wire wool to provide a good mechanically clean surface. All traces of rust or corrosion must be removed. Industrial parts are frequently cleaned in acid to achieve this. Fluxes are classified as either active or inactive, depending upon their ability to attack the oxide layer on the metal. Active fluxes, which have acid properties, attack and dissolve the oxide layer, but after soldering is complete their residues absorb water from the atmosphere and quickly attack and corrode the parent metals. These residues are difficult to remove. Active flux may be neutralized by adding an equivalent amount of alkali to form a neutral salt, but this does not prevent its residue from corroding the parent metal. However, this type of residue can be removed by washing in a hot, dilute soda (sodium carbonate) solution, followed by a hot water wash. Such a cleaning process cannot be performed when electrical work is involved or when contact with water would be detrimental to the joined parts. It is for this class of work that the inactive or "safe" fluxes are used. Inactive fluxes are composed of substances that do not react appreciably with most metals at room temperature. But when raised to soldering heat they act as fluxes and protect previously cleaned surfaces. The most commonly used active flux is zinc chloride (killed spirit), whilst the inactive fluxes are generally resin based. Both of these may be obtained in the form of solutions or paste. The inactive fluxes may also be obtained in crystal form. Solder is often supplied as wire with a core of noncorrosive rosin flux. TinningThe process of forming a thin layer of solder on each part to be joined prior to assembly is called tinning. It is good practice to do this as it ensures adequate wetting of the parent metal by the solder, improves the flow of solder in the soldering operation, and makes for a better joint. The soldering bitThe bit is the name given to the tool which acts as a reservoir of heat, some of which it gives up to the workpiece during soldering. It stores the molten solder (generally on its tip) and delivers it to the joint or part to be tinned; and finally it is used to remove excess solder from the finished joint. The bit is generally made of high quality copper which should be free from oxygen. Copper is a good conductor of heat and warms up quickly. It is also capable of being readily tinned with solder. The size and shape of the bit is determined by the type and size of the work to be done. Too small a bit will prevent the easy flow of solder, its heat being given up too quickly, whilst too large a bit is unwieldy and may prevent the solder from cooling sufficiently quickly. As a general rule a 12-ounce bit is used for general engineering work, whilst a 4-ounce bit is suitable for small electrical joints. The hand bit may be heated by a gas flame or alternatively an electric soldering iron has a built-in heating element. Preparation of the bit for soldering is essential and is carried out by first filing the tip so that it is clean and smooth. Then with some ammonium chloride (sal ammoniac) crystals (a flux) placed on the hollow side of a brick the bit should be heated until it will melt with some solder readily. The bit should then be rubbed together with the solder and ammonium chloride against the brick until its faces are tinned with solder. Any excess solder should be wiped off with a clean cotton rag. This process must be repeated whenever the faces become tarnished or dirty in use. SoldersThe composition of solders are defined by the percentage of tin, lead, antimony, or silver they contain, and are selected for use depending upon the working conditions of the joint, the type of joint to be made, and the metals to be joined. Soft solders are usually alloys of lead and tin and have melting points between 200° and 300°C. Common examples are: Metals that can be solderedLead, copper, silver, sheet steel, tinplate, and tin-zinc galvanized metal can, with care, be readily joined by soldering, but brass may present some difficulty depending upon its composition. Bronzes and gunmetals, too, may require special care, but aluminum and silicon-bronze, beryllium-copper, cast iron, stainless and alloy steels need special fluxes. Zinc-based die castings and aluminum are extremely difficult to solder and call for special treatment. Related category• TOOLS Home • About • Copyright © The Worlds of David Darling • Encyclopedia of Science • Contact
<urn:uuid:a628025a-df60-4198-80e7-8c5d73af5a00>
CC-MAIN-2016-26
http://www.daviddarling.info/encyclopedia/S/AE_soldering_and_soldering_irons.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396100.16/warc/CC-MAIN-20160624154956-00144-ip-10-164-35-72.ec2.internal.warc.gz
en
0.951266
1,191
3.8125
4
Gold is a soft, heavy, shiny metal. It is a chemical element. Its chemical symbol is Au. Its atomic number is 79. It has been used for many thousands of years by people all over the world, for jewelry, decoration, and as money. Gold is important because it is rare, but also easier to use than other rare metals. It is also used to repair teeth and in electronic equipment such as computers. The color of this metal is also called gold. Often, gold is found as a native element. This means it is not part of an ore, and does not need extracting. Chemical properties[change | change source] In chemistry, gold is chemical element 79, a transition metal in Group 11. It has an atomic weight of 199.96 a.m.u. Its symbol is Au, from the Latin word for gold, aurum. It is a "noble metal" meaning it has low chemical reactivity. Gold is very soft. A goldsmith can hammer it into thin metal sheets. It is also ductile, which means it can be pulled into wire. When it is used in money or in jewelry, it is often mixed with silver or some other metal to make it harder. Language and culture[change | change source] Gold can mean that something or someone is very good or has done very well. A gold medal is often the given to the first place winner in a race or other sports. Something that is in some way good may be given gold status. References[change | change source] - "Relativity in Chemistry". Math.ucr.edu. http://math.ucr.edu/home/baez/physics/Relativity/SR/gold_color.html. Retrieved 2009-04-05. - Schmidbaur, Hubert; Cronje, Stephanie; Djordjevic, Bratislav; Schuster, Oliver (2005). "Understanding gold chemistry through relativity". Chemical Physics 311 (1–2): 151–161. doi:10.1016/j.chemphys.2004.09.023. Other websites[change | change source] |Wikimedia Commons has media related to: Gold| |The Simple English Wiktionary has a definition for: gold.|
<urn:uuid:d0d63a36-eb84-4214-9d89-020379e31983>
CC-MAIN-2016-26
https://simple.wikipedia.org/wiki/Gold
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397864.87/warc/CC-MAIN-20160624154957-00141-ip-10-164-35-72.ec2.internal.warc.gz
en
0.822187
476
3.546875
4
The Maloti-Drakensberg Park is a transboundary site composed of the uKhahlamba Drakensberg National Park in South Africa and the Sehlathebe National Park in Lesotho. The site has exceptional natural beauty in its soaring basaltic buttresses, incisive dramatic cutbacks, and golden sandstone ramparts as well as visually spectacular sculptured arches, caves, cliffs, pillars and rock pools. The site's diversity of habitats protects a high level of endemic and globally important plants. The site harbors endangered species such as the Cape vulture (Gyps coprotheres) and the bearded vulture (Gypaetus barbatus). Lesotho’s Sehlabathebe National Park also harbors the Maloti minnow (Pseudobarbus quathlambae), a critically endangered fish species only found in this park. This spectacular natural site contains many caves and rock-shelters with the largest and most concentrated group of paintings in Africa south of the Sahara. They represent the spiritual life of the San people, who lived in this area over a period of 4,000 years. Le Parc Maloti-Drakensberg est un site transfrontalier composé de l’uKhahlamba / Parc national de Drakensberg en Afrique du Sud et du Parc national de Sehlathebe au Lesotho. Le site offre une beauté naturelle exceptionnelle qui s’exprime tant à travers ses contreforts de basalte vertigineux, ses arrière-plans incisifs et spectaculaires et ses remparts de grès dorés que par ses grottes, falaises, piliers et bassins dans la roche. La diversité des habitats du site protège un grand nombre d’espèces de plantes endémiques et capitales au niveau mondial. Le site accueille des espèces menacées tel le vautour du Cap (Gyps coprotheres) et le gypaète barbu (Gypaetus barbatus). Le Parc national de Sehlathebe au Lesotho accueille également le poisson Cyprinidé (Pseudobarbus quathlambae), une espèce de poisson en voie d’extinction vivant exclusivement dans ce parc. Ce bien naturel spectaculaire compte également de nombreuses grottes et abris rocheux où l’on trouve le plus important et le plus dense groupe de peintures rupestres d’Afrique, au sud du Sahara. Ces peintures représentent la vie spirituelle du peuple San, qui a vécu sur ces terres pendant plus de quatre millénaires. Het Maloti-Drakensberg park is van uitzonderlijke schoonheid met z'n stijgende basaltische steunpilaren, dramatische dieptes, gouden zandsteenwallen, graslanden, steile rivierdalen en rotsachtige kloven. Het park strekt zich uit langs de grens met Lesotho, waardoor het een belangrijk toevluchtsoord is voor meer dan 250 endemische plantensoorten en bijbehorende fauna. Het gebied kent veel grotten en rotsen, met daarin de grootste, meest geconcentreerde groep rotstekeningen in Afrika ten zuiden van de Sahara. De tekeningen werden 4.000 jaar lang gemaakt door het inmiddels uitgestorven volk San. Ze weerspiegelen hun spirituele leven en zijn van uitstekende kwaliteit, divers qua onderwerpen en de manier waarop dieren en mensen worden weergegeven. Outstanding Universal Value The Maloti Drakensberg Transboundary World Heritage Site is a transnational property spanning the border between the Kingdom of Lesotho and the Republic of South Africa. The property comprises Sehlabathebe National Park (6,500ha) in Lesotho and uKhahlamba Drakensberg Park (242,813 ha) in South Africa. Maloti Drakensberg Transboundary World Heritage Site is renowned for its spectacular natural landscape, importance as a haven for many threatened and endemic species, and for its wealth of rock paintings made by the San people over a period of 4000 years. The property covers an area of 249,313 ha making it the largest protected area complex along the Great Escarpment of southern Africa. The Maloti Drakensberg range of mountains constitutes the principal water production area in Southern Africa. The areas along the international border between the two countries create a drainage divide on the escarpment that forms the watershed for two of southern Africa’s largest drainage basins. The Thukela River from uKhahlamba Drakensberg Park flows eastwards into the Indian Ocean. The rivers of southern Maloti Drakensberg including SNP drain into the Senqu/Orange River which flows westwards into the Atlantic Ocean, and extension of the UDP WHS to include SNP will add special hydrologic qualities to the area. The Senqu/Orange River from Sehlabathebe National Park flows westwards into the Atlantic Ocean. With its pristine steep-sided river valleys and rocky gorges, the property has numerous caves and rock shelters containing an estimated 665 rock art sites, and the number of individual images in those sites probably exceeds 35,000. The images depict animals and human beings, and represent the spiritual life of the San people, representing an exceptionally coherent tradition that embodies their beliefs and cosmology over several millennia. There are also paintings done during the nineteenth and twentieth centuries, attributable to Bantu speaking people. Extending along most of KwaZulu-Natal’s south-western border with Lesotho, the property provides a vital refuge for more than 250 endemic plant species and their associated fauna. It also holds almost all of the remaining subalpine and alpine vegetation in KwaZulu-Natal, including extensive high altitude wetlands above 2,750m and is a RAMSAR site. The Park has been identified as an Important Bird Area, and forms a critical part of the Lesotho Highlands Endemic Bird Area. Criterion (i): The rock art of the Maloti-Drakensberg Park is the largest and most concentrated group of rock paintings in Africa south of the Sahara and is outstanding both in quality and diversity of subject. Criterion (iii): The San people lived in the mountainous Maloti-Drakensberg area for more than four millennia, leaving behind them a corpus of outstanding rock art, providing a unique testimony which throws much light on their way of life and their beliefs. Criterion (vii): The site has exceptional natural beauty with soaring basaltic buttresses, incisive dramatic cutbacks and golden sandstone ramparts. Rolling high altitude grasslands, the pristine steep-sided river valleys and rocky gorges also contribute to the beauty of the site. Criterion (x): The property contains significant natural habitats for in situ conservation of biological diversity. It has outstanding species richness, particularly of plants. It is recognised as a Global Centre of Plant Diversity and endemism, and occurs within its own floristic region – the Drakensberg Alpine Region of South Africa. It is also within a globally important endemic bird area and is notable for the occurrence of a number of globally threatened species, such as the Yellow-breasted Pipit. The diversity of habitats is outstanding, ranging across alpine plateaux, steep rocky slopes and river valleys. These habitats protect a high level of endemic and threatened species. The uKhahlamba Drakensberg Park, composed of 12 protected areas established between 1903 and 1973 has a long history of effective conservation management. Covering 242,813 ha in area, it is large enough to survive as a natural area and to maintain natural values. It includes 4 proclaimed Wilderness areas almost 50% of the Park, while largely unaffected by human development, the property remains vulnerable to external land uses including agriculture, plantation forestry and ecotourism, although agreements between Ezemvelo KZN Wildlife and local stakeholders have been implemented to manage these threats. Invasive species and fire also threaten the integrity of the site, along with land claims in certain areas, infrastructural developments, soil erosion caused by fire and tourist impacts on vulnerable alpine trails, and poaching. The lack of formal protection of the mountain ecosystem over the border in Lesotho exacerbates these threats. Boundary issues highlighted at time of inscription included the gap belonging to the amaNgwane and amaZizi Traditional Council between the northern and much larger southern section of the Park. While planning mechanisms restrict development above the 1,650m contour to maintain ecological integrity, it was recommended that a cooperative agreement between the amaNgwane and amaZizi Traditional Council and Ezemvelo KZN Wildlife be envisaged. Extending conservation areas by agreements with privately-owned land along the escarpment to the south of the property was also recommended. Finally an important step to strengthening integrity has been the development of the Drakensberg Maloti Transfrontier Conservation and Development Area, which has recognised the importance of a Transboundary Peace Park linking the Sehlabathebe National Park (and eventually the contiguous Sehlabathebe and Mokhotlong Range Management Areas) in Lesotho with uKhahlamba Drakensberg Park. Project Coordinating Committees in both KwaZulu-Natal and Lesotho are cooperating in a planning process. The extension of the area to include SNP (6,500ha) has been protected since 1970 as a wildlife sanctuary and a national park, and gazetted in 2001 to enhance protection of the biodiversity and scenic qualities of the property. This area, added to the UDP World Heritage Site is sufficient to protect the biodiversity and cultural values of the area. The property contains the main corpus of rock art related to the San in this area. A comparatively high concentration of rock art sites seems present in the western buffer zone in Lesotho and future surveys of these should be undertaking with the surveys for rock art in the Maloti-Drakensberg Park to judge their potential contribution to the Outstanding Universal Value. Although the area has changed relatively little since the caves were inhabited, management practices, the removal of trees (which formerly sheltered the paintings) and the smoke from burning grass both have the capacity to impact adversely on the fragile images of the rock shelters, as does unregulated public access. The synthesis of rock art sites and their natural setting in Maloti-Drakensberg Park convey a very strong sense of authenticity in setting, location and atmosphere but also material, substance and workmanship. It should be noted as a positive factor that in large parts of the property no systematic conservation or consolidation treatment has been attempted, which has left the rock art sites perhaps more fragile but with the utmost possible degree of authenticity. The sites remain closely integrated with their surrounding landscape and credibly convey the narratives of San life and activity in respect to the harsh climatic conditions of the area and necessary exploitation of natural resources and shelter. Potential influences of UV rays and weathering on the images could lead to fading of colors and reduce the clarity of image content, which in turn that could lessen their ability to display their meaning. It is important that explanatory materials assist the interpretation of the image content as understood by the San people. Protection and Management requirements Management of the Park is guided by an Integrated Management Plan with subsidiary plans, and is undertaken in accordance with the World Heritage Convention Act, 1999 (South Africa, Act No. 49 of 1999); National Environmental Management: Protected Areas Act, 2003 (South Africa, Act 57 of 2003); National Environmental Management Biodiversity Act, 2004 (South Africa, Act No 10 of 2004); KwaZulu-Natal Nature Conservation Management Amendment Act (South Africa, No 5 of 1999); the Game Preservation Proclamation (Lesotho, No. 55 of 1951); the Historical Monuments, Relics, Fauna and Flora Act (Lesotho, No. 41 of 1967); the National Heritage Act 2011 and Environment Act (Lesotho, No. 10 of 2008); World Heritage Convention Operational Guidelines; Environment policies in Lesotho and Ezemvelo KZN Wildlife policies. In terms of these legislation, all development within or outside the property is subjected to an Environmental Impact Assessment and Heritage Impact Assessments respectively, which consider the Outstanding Universal Value of the property. In addition all World Heritage Sites are recognized as protected areas, meaning that mining or prospecting will be completely prohibited from taking place within the property or the proclaimed buffer zone. Furthermore, any unsuitable development with a potential impact on the property will not be permitted by the South African Minister of Water and Environmental Affairs and the Lesotho Minister of Environment and Culture who are responsible for the implementation of the World Heritage Convention. Invasive species and fire are major management challenges. At the time of inscription 1% of the property was covered with alien vegetation, including existing plantations and wattle infestations. This poses a threat to the ecological integrity of the Park as well as to the yield of water from its wetlands and river systems. Park management is actively addressing the removal of alien species. The interaction between the management of invasive species and the management of fire should also be carefully considered, taking into account the effects of fire on fire-sensitive fauna such as endemic frogs. Management of fire and invasive species needs to be addressed jointly by Lesotho and KwaZulu-Natal, ideally within the framework established for transboundary protected area cooperation.There is a need to ensure an equitable balance between the management of nature and culture through incorporating adequate cultural heritage expertise into the management of the Park and providing the responsible cultural heritage authorities with adequate budgets for the inventory, conservation and monitoring tasks. This shall ensure that all land management processes respect the paintings, that satisfactory natural shelter is provided to the rock art sites, that monitoring of the rock art images is conducted on a regular basis by appropriately qualified conservators, and that access to the paintings is adequately regulated. Furthermore, there is a need to ensure that Heritage Impact Assessments are undertaken in conjunction with Environmental Impact Assessments for any proposed development affecting the setting within the property. - Ngorongoro Conservation Area sets path for sustainable tourism Tuesday, 24 March 2015 - World Heritage stakeholders come together to develop a sustainable tourism strategy for Mosi-oa-Tunya/Victoria Falls Monday, 2 February 2015 - First Entrepreneurship Field Training held for African site managers and community representatives Wednesday, 22 October 2014 - Honghe Hani Rice Terraces inscribed on UNESCO’s World Heritage alongside an extension to the uKhahlamba Drakensberg Park Saturday, 22 June 2013 - Successful World Heritage Candidates for the 2012 Business Planning Programme Tuesday, 19 June 2012 - Rock Art and the World Heritage Convention - International Experts Meeting 03-Apr-2009-08-Apr-2009
<urn:uuid:710e0925-899c-444a-98a0-b9b80d935255>
CC-MAIN-2016-26
http://whc.unesco.org/pg_friendly_print.cfm?cid=31&www.unesco.org/fr/www.unesco.org/fr/prospective=&id_site=985
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396459.32/warc/CC-MAIN-20160624154956-00003-ip-10-164-35-72.ec2.internal.warc.gz
en
0.787058
3,263
2.65625
3
King, Clarence, 1842–1901, American geologist, b. Newport, R.I., grad. Sheffield Scientific School, Yale, 1862. After serving as a volunteer assistant in the California state geological survey (1863–65, 1866), he persuaded Congress to appropriate funds for the Fortieth Parallel Survey (1867–72), of which he was made geologist in charge. For the survey's reports he wrote the geological sections of J. D. Hague's Mining Industry (1870), a classic in economic geology, and Systematic Geology (1878), a reconstruction of the geologic history of the Cordilleran region. He also exposed the great diamond hoax of 1872, determining that the mine had been salted. King was appointed (1879) director of the newly created U.S. Geological Survey, which he organized; in 1881 he retired to private practice as a mining engineer. His often fabulous Mountaineering in the Sierra Nevada (1872) is occasionally fable. See biographies by T. Wilkins (1958) and R. Wilson (2006). The Columbia Electronic Encyclopedia, 6th ed. Copyright © 2012, Columbia University Press. All rights reserved.
<urn:uuid:ad6e9867-f3c6-4cb2-a5a0-36b7c3c0a0c4>
CC-MAIN-2016-26
http://www.factmonster.com/encyclopedia/people/king-clarence.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783404826.94/warc/CC-MAIN-20160624155004-00019-ip-10-164-35-72.ec2.internal.warc.gz
en
0.946846
251
2.609375
3
CHEAP AND CLEAN COMPRESSED AND LIQUIFIED NATURAL GAS FUELS FOR VEHICLES ARE ALREADY WIDELY AVAILABLE IN CONTINENTAL EUROPE – HENCE THE PRODUCTION OF ‘ECOFUEL‘ VEHICLES SUCH AS THE GAS-POWERED VOLKSWAGEN CADDY. ALAS, IN THE UK THE ONLY FORM OF WIDELY AVAILABLE GAS FOR VEHICLES IS LPG. HOWEVER, EVEN THAT HAS HAD ATTENDANT VEHICLE CONVERSION SUBSIDIES REMOVED BY A BRITISH GOVERNMENT THAT, LIKE ITS AMERICAN COUNTERPART, GIVES EVERY IMPRESSION OF WANTING THE BRITISH ECONOMY TO FAIL. THAT SAID, IT SEEMS EVEN THE U.S. GOVERNMENT IS HAVING DIFFICULTY STAVING OF THE REVOLUTION IN CHEAP NATURAL SHALE-GAS TRANSPORT: Companies and researchers are working on infrastructure and technologies to help bring the nation’s growing stock of natural gas to fuel tanks, including those of long-haul vehicles A different kind of truck stop is coming soon to Atlanta. Greg Roche, vice president for infrastructure at Clean Energy Fuels, is presently scouting locations to build one of the California-based company’s natural gas fueling stations for long-haul trucks by the end of this year. With fracking techniques freeing more and more natural gas in the U.S., the alternative fuel is suddenly much cheaper than those made from petroleum. “A trucker can save one third of his energy spend by switching to natural gas,” Roche notes, thanks to the historically low prices for the gaseous fuel occasioned by the boom in U.S. shale gas development via hydraulic fracturing. “It’s also good for the environment because it’s the cleanest fuel available for big-rig trucks.” Clean Energy Fuels already operates six fueling stations dispensing liquefied natural gas (LNG) to the big trucks that ply the nation’s highways, ranging from San Diego to Seville, Ohio. Truck stops that pump LNG can be distinguished by their tall, thin storage silos—capable of keeping up to 68,000 liters of this fuel at low temperatures and high pressures. The LNG, trucked in from big liquefying plants much like diesel fuel is trucked in from refineries, then powers the trucks over hundreds of kilometers. Such a station in the port of Long Beach, Calif., already can handle 1,200 trucks a day. “Trucks that you’re making here at this plant run on natural gas, and that makes them quieter, it makes them better for the environment, it makes them cheaper to fill up,” President Barack Obama said during a March 7 speech to announce his administration’s expanded alternative vehicle efforts at a Daimler truck factory in North Carolina. “But, at the end of the day, it doesn’t matter how much natural gas or flex-fuel or electric vehicles you have if there’s no place to charge them up or fill them up.” That’s the problem Clean Energy Fuels hopes to solve with “America’s Natural Gas Highway,” a bid to build more than 150 fuel stations from “coast to coast and border to border,” as Roche says, at a cost of $1.2 million or more per station. “The competition is for people to keep doing what they’ve always done and keep using expensive foreign oil.” Big rigs running on diesel fuel can cover roughly 1,900 kilometers between pit stops. Liquefied natural gas is the only other fuel that can begin to approach that kind of range, enabling truckers to cover more than 1,200 kilometers before refueling. Depending on the cost of diesel, switching to natural gas can save as much as $2 per gallon of fuel. That means the additional roughly $30,000 cost of natural gas trucks can be paid back in two years or less (assuming the trucks cover more than 95,000 kilometers a year). At present, although the Daimler truck factory has built more than 1,000 natural gas-fueled trucks, engine options from the major truck manufacturers are limited. “Building a natural gas engine isn’t that difficult,” argues physicist Nicholas Cizek, a fellow at the Advanced Research Projects Agency–Energy (ARPA–E) who has worked on its Methane Opportunities for Vehicular Energy, or MOVE, project. In fact, natural gas vehicles of all types are already popular in countries such as Argentina, India and Italy, among others. All told there are more than 13 million natural gas vehicles on the road worldwide. Gasoline taxes typically are used by national governments to promote the use of the alternative fuel. The idea is that natural gas, because it burns more cleanly than other liquid fuels and emits less carbon dioxide, reduces overall greenhouse gas emissions and other air pollution. In fact, Argonne National Laboratory estimates that natural gas vehicles emit 40 percent less CO2 than those that burn gasoline (pdf). But methane, the primary molecule in natural gas, is itself a potent greenhouse gas, and some studies have found that if significant amounts of unburned methane leak, whether during drilling, piping or fueling of natural gas, its emissions benefits may trickle down to none. In the U.S. natural gas use has largely been confined to large institutional fleets, whether buses or garbage trucks, that return to local depots at night to refuel. The fleet vehicles are commonly fueled with compressed natural gas (CNG), which comprises the same methane molecules, albeit stored at lower pressures, which result in less dense fuel. Burning the compressed gas helps reduce pollution from these vehicles, and Clean Energy Fuels already operates nearly 300 stations dispensing CNG nationwide. But compressed natural gas won’t work for big rigs. “It’s a simple physical problem,” explains chemical engineer Patrick Davis, program manager for vehicle technologies at the U.S. Department of Energy, which also encompasses ARPA–E. “You can’t package enough CNG on board a truck. It has to be LNG for no other reason than the density of the fuel. It’s required for long haul.” Made in the U.S.A. In a bid to wean the U.S. from the roughly $1 billion a day spent on importing oil, the Energy Department is funding a variety of efforts to develop natural gas–based alternative fuels. Miami-based start-up Vehicle Production Group also received an Energy loan guarantee for production of its minivan that runs on compressed natural gas burned in an engine built by Ford. For its part, MOVE is currently gathering applicants for $30 million in funding to explore better ways to store natural gas at both high and low pressures as well as opportunities to create affordable home refueling technology that might enable natural gas to become a fuel for the cars and trucks driven every day by Americans. The idea is to either find materials that can soak up methane like a sponge and store it at low pressures or to build a better (and cheaper) high-pressure storage tank. Of course, one of the main reasons that natural gas itself remains cheap is that there are currently limited options for using it in the U.S. Either it must be burned in a power plant to create electricity or used in the chemical and fertilizer sector. Already, the federal government has approved plans to export liquefied natural gas as well as to begin to use it in vehicles—both of which would ultimately drive up its price, thereby making it less economically attractive as an energy alternative. But if the U.S. were able to develop technologies to better use natural gas in vehicles, the nation could both reduce its trade deficit and potentially find a competitive advantage for the future. “If we can evolve robust technologies here and develop them for our domestic market, we can then export them to other places,” Cizek argues. And liquefying natural gas is only one of the ways to turn the gaseous molecule into a liquid fuel. “If we can convert it into a drop-in liquid fuel, that would be a great solution also,” Cizek notes of alternative fuels that would not need pressurization and could directly substitute for petroleum-derived gasoline, diesel or jet fuel. “That’s something we’re investigating.” That would be a solution for the nation’s largest single user of petroleum: the U.S. Department of Defense. “Natural gas won’t work for us,” Secretary of the Navy Ray Mabus said March 20 at the Bloomberg New Energy Finance Summit, because it would require retrofitting the armed forces’ many engines. “We need drop-in fuels.” It will also take time for such an energy transition—from diesel to liquefied natural gas—to occur, requiring the build-out of refueling infrastructure, new vehicles and new plants to convert natural gas to liquid fuel. “I’m not aware of a current LNG engine product that completely gives you the performance of a diesel engine product, allowing a loaded class 8 truck to go over the Rocky Mountains in the same way a diesel would,” DoE’s Davis notes. “It is something that is going to take quite a bit of time, but we believe investments in LNG technology could yield substantial benefits in terms of using domestic energy sources and reducing our dependence on foreign oil.” Already, engine manufacturers such as Navistar have promised a full range of natural gas–burning engines, up to 450 horsepower, by mid-2013. And large-truck fleet owners are beginning to make the switch, ranging from Waste Management, which now buys almost exclusively natural gas–powered trucks, to parcel delivery companies. In part of its bid to reduce the company’s use of six million liters of petroleum annually, FedEx plans to have its first prototype long-haul trucks burning LNG on the road this summer. When it comes to the personal vehicle market, any natural gas cars would have to compete with electric cars such as the Chevy Volt, but the two alternative fuel options may be more similar than different. “An EV is a kind of natural gas vehicle,” noted Edwin Feo, a managing partner at USRG Renewable Finance, at the Bloomberg summit on March 21. “It’s just turned to electricity first.” In the meantime Clean Energy plans to invest with partners some $450 million in building its network of 150 natural gas refueling stations, including two in Atlanta. Georgia will also host natural gas refueling stations in Dalton and Tifton. “We will be at truck stops on the Interstate,” Roche says, noting that the company also owns two plants in California and Texas that can create around 1.3 million liters of LNG per day. “The goal is to give [truckers] the same experience as when they get diesel fuel.” FOR FUTHER BACKGROUND INFORMATION SEE:
<urn:uuid:49a99b39-bbf0-4ac6-9d74-38917bb6fc52>
CC-MAIN-2016-26
http://www.sovereignindependentuk.co.uk/2012/04/25/transport-solution-the-globalist-greens-fear/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783408828.55/warc/CC-MAIN-20160624155008-00198-ip-10-164-35-72.ec2.internal.warc.gz
en
0.939842
2,371
2.828125
3
United Nations and international aid agencies warn drought and food shortages in the Sahel region of West Africa are causing millions of people to go hungry and threatening lives. The agencies are urging the international community to respond quickly to the region's acute needs. Aid agencies warn that international donors are starving Africa’s Sahel region of money needed to avert a humanitarian catastrophe. Momodou Larmin Fye, the Sahel regional representative in Dakar for the International Federation of Red Cross and Red Crescent Societies, says the estimated 10 to 14 million people currently affected by drought in the Sahel could rise to 23 million if this region continues to be neglected. “Like the Horn of Africa, the Red Cross and Red Crescent movement is extremely concerned that the situation unfolding in the Sahel could quickly develop into a humanitarian disaster if the world does not start paying attention to the plight of these people,” he said. The United Nations notes aid agencies have received only $135 million of the $720 million needed to fund humanitarian operations in six countries of the Sahel. The region has been hit by recurring droughts and food crises since 1973. The latest was in 2009 and 2010. Niger, Chad, Mali, Burkina Faso, Mauritania and Senegal once again are experiencing food insecurity due to poor harvests, caused by failed rains, pest attacks and localized flooding. Aid agencies say people are facing a crisis on a scale they have not experienced before. They say people are particularly vulnerable now because they lack the coping mechanisms to deal with this new emergency. In addition, the director of the United Nations Information Service in Geneva, Corinne Momal-Vanian, says insecurity is making it difficult for humanitarian agencies to access the region. She says last year's unrest in Libya, and to a lesser extent the crisis in Ivory Coast, are having significant consequences. “The return of hundreds of thousands of people has added to the vulnerability of the communities where they come from," she said. "And, of course, remittances have been lost, trade has been halted, and in addition, there has been an influx of weapons that has fueled insecurity. So, these factors are added factors this year. But, many of the vulnerabilities existed before the Libyan crisis.” The Sahel is plagued with chronic levels of food insecurity, poverty and malnutrition. The International Red Cross Federation reports more than 50 percent of the rural population lives on the edge of the crisis. It notes food prices in the region have increased between 35 and 85 percent over the past five years. The Red Cross says it is scaling up its operations. It says its priorities include food distribution, access to clean water and sanitation, and providing basic health care. The agency says it is very concerned about preventing and containing outbreaks of diseases, such as cholera, meningitis and measles.
<urn:uuid:badd16a2-1a3e-41f9-af2a-f009cf1697e6>
CC-MAIN-2016-26
http://www.voanews.com/content/red-cross-sahel-food-crisis-could-affect-23-million-139285708/152051.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783391766.5/warc/CC-MAIN-20160624154951-00153-ip-10-164-35-72.ec2.internal.warc.gz
en
0.955294
585
2.703125
3
A board that slides vertically through the keel of a sailboat to reduce sideways movement. Compare with centerboard. - Late last week, Kingfisher hit a submerged object and damaged her daggerboard. - If the rudder and daggerboard are made of plywood and glassed they will need to be primed and painted. - Contrary to popular belief, the daggerboard or centerboard does not keep the sailboat from tipping over. For editors and proofreaders Definition of daggerboard in: What do you find interesting about this word or phrase? Comments that don't adhere to our Community Guidelines may be moderated or removed.
<urn:uuid:77acc9c3-9705-4ca7-8f04-8d40b9539857>
CC-MAIN-2016-26
http://www.oxforddictionaries.com/us/definition/american_english/daggerboard
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395620.56/warc/CC-MAIN-20160624154955-00057-ip-10-164-35-72.ec2.internal.warc.gz
en
0.890233
134
2.703125
3
Some 44 years since its creation, the Kwanzaa celebration continues to stir a bevy of emotions. Founded in 1966 by Dr. Maulana Karenga, Kwanzaa was created as a means for African-Americans to reflect on their past, pay homage to their ancestors and connect with their African roots and heritage. Known by some to be an alternative to Christmas, many Christians have become largely critical of the seven day celebration which begins the day after Christmas. Some consider Kwanzaa to be a non-holiday. However, proponents of Kwanzaa consider its teachings and principles to parallel the same teachings of Christianity and believe it has a place in the church. Rev. Jesse Lee Peterson has been a longstanding critic of Kwanzaa. He considers Kwanzaa to be a form of socialism and believes that any church that celebrates Kwanzaa is not of God. “Kwanzaa is a made up holiday created by a Godless man who is anti-Christian,” said Peterson, founder and president of BOND, the Brotherhood Organization of a New Destiny. BOND, according to their website, is a national, nonprofit religious organization dedicated to rebuilding the families. “I would advise the members of a church where the pastor recognizes Kwanzaa to leave,” Peterson said. “That pastor is blind and cannot see.” Peterson references an article written in the late 70s as evidence to discredit Karenga and Kwanzaa. He said Karenga told a Washington Post reporter that Kwanzaa is not African by any means, even though many believe it is. “He says, ‘If black people knew Kwanzaa was American they wouldn’t celebrate it.’” Peterson said, adding that Kwanzaa falls around Christmas because, according to the interview with Karenga, a lot of blacks would be out partying. Peterson believes most black people celebrate Kwanzaa because they believe it to be pro-black. But by celebrating Kwanzaa black people are actually celebrating further segregation, he argues. “Until black folk wake up, become individuals and stop hating whitey, they will continue to be used by others,” he said. “If you believe in God then why would you need a Godless holiday like Kwanzaa that some racist, ex-felon created.”While Peterson points out that Kwanzaa has no mention of God, Karenga states in a 1994 “Message from the founder” that Kwanzaa is organized around five fundamental activities. Of those five, a “special reverence for the Creator and creation which recognizes and reaffirms the bond of mutuality between the divine, social and the natural” is the second activity mentioned. And while Peterson, along with many others on internet message boards, consider Kwanzaa to be more of paganism, witchcraft and a practice of black arts, Angela Harrington Rice sees Kwanzaa as an opportunity of unification. Rice is senior associate minister of Hillside International Truth Center in Atlanta, GA. Hillside International Truth Center is one of many churches in the country who holds a Kwanzaa celebration. “There has always been a Kwanzaa celebration at Hillside for as long as I have been there,” she said. “I came to Hillside in 1994 and there has either been some inclusion as a separate program or even a part of the traditional Sunday service.” Their Kwanzaa celebration would start at the church and then throughout the week someone would host the celebration at their private home. Most recently, Rice said, the members have been encouraged to have celebrations in their own homes. “Kwanzaa gives us a sense of racial pride, which I think is needed especially for our children,” Rice said. “It gives us an opportunity to celebrate our values and see how they fit with our spiritual traditions.” In the late 70s, Rice said she celebrated Kwanzaa for the first time. She said she is still surprised by the number of people intrigued by Kwanzaa. And for those arguments that Kwanzaa has no place in the church because it lacks God and does not mention God, Rice said Kwanzaa allows us to come together whether Muslim, Jewish or Christian. She said many times religion separates us when the holidays are supposed to be unification, a commemoration of who we are. “We do not see God as anything separate from who we are. God lives within us. God lives in each and every one of us,” she said. “Kwanzaa teaches us to live and be better. Kwanzaa teaches us self-determination, cooperative economics and carrying on building something that is meant to better our people. When we celebrate Kwanzaa I think we are experiencing God.” Black people, she said, are everywhere and worship in many different traditions.
<urn:uuid:a3e36b56-b296-479c-a6a3-66d88720a2f8>
CC-MAIN-2016-26
http://thegrio.com/2010/12/26/does-kwanzaa-clash-with-the-black-church/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396872.10/warc/CC-MAIN-20160624154956-00181-ip-10-164-35-72.ec2.internal.warc.gz
en
0.966561
1,056
2.890625
3